Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
Check Instructions
Style:
APA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 15.55
Topic:

Domestic Intel to Stop the Attack

Research Paper Instructions:

Add 3 substantive recommendations on how you propose that domestic intelligence can be employed more effective to support the Homeland Security Enterprise (HSE) to stop terrorist attacks.
• Describe in detail at least one major hypothetical terrorist attack on the U.S. Homeland by Boko Haram -- an event that could happen in the immediate future (an imminent attack)Make at least three substantive recommendations on how to prevent or thwart Boko Haram from succeeding in their hypothetical attack on the United States homeland.
•Make sure your recommendations are focused only on what happens within the homeland as this is not a foreign policy or international relations course. The recommendations need to be something new or enacting a policy or procedure that is not already in place (do not describe how we already protect the homeland or discuss what current agencies do). Be original or cite ideas from others on how to adapt or reform how intelligence can better support homeland security here domestically to stop your hypothetical attack. Also, make sure your recommendations address a role for state and local agencies.
•Your paper needs to clearly identify your three homeland security intelligence and law enforcement recommendations, and include specific section headings for each recommendation with the short title for each recommendation. Your proposals to stop a terrorist attack are the heart of this assignment, this will be the primary criteria for grading this paper and the comprehensive and culminating event for this course. You must use sections headings like these:
Recommendation 1: Your idea to improve homeland security (domestic) intelligence and law enforcement to specifically stop this impending attack; only what you think should be done at home -- DO NOT make overseas recommendations. All three must be homeland intelligence focused proposals and not address anything going on abroad -- that is not the subject of this course.
Recommendation 2: Make sure at least one recommendation includes a role for the all-important state and local agencies.
Recommendation 3: Intelligence is about collecting, analyzing, collaborating, sharing/disseminating, etc, so your recommendations must fall somewhere within the intelligence cycle/process we covered. Do NOT make recommendations about increased security measures or 'force protection' and defensive approaches -- remember this course is about INTELLIGENCE (which is proactive / preventative, not protective / reactive).
Make sure your ideas are original and something you think the government can do better related to intelligence -- not status quo or what we are already doing. If you are at a total loss for ideas about how intelligence could stop an attack or be improved with domestic homeland security intelligence, then I suggest looking back over the required reading in week 4 on Fusion Centers for Homeland Security in the section on recommendations on page 24, or consider Challenges and Way Ahead (chapter 12) in the book by Buckley (2014) titled Managing Intelligence: A Guide for Law Enforcement Professionals available as an ebook in our library.
For reference, I have also attached the two previous papers that has been done for me pertaining to this terrorist group.

Research Paper Sample Content Preview:

Domestic Intel to Stop the Attack
Name
Institutional Affiliation
Domestic Intel to Stop the Attack
Hypothetical Terrorist Attack
Boko Haram poses a significant threat to the United States (U.S.) when it comes related to terrorist activities. This assertion arises from the previous activities that are associated with this group and more importantly, their inception towards negativity. In this regard, the most formidable terrorist attack that supersedes the present state of defense involves the use of biological weapons. Biological weapons include disease-producing agents including, toxins, fungi, Rickettsia, viruses, and bacteria that can be utilized as weapons against people. In this regard, biological agents, including plague, botulinum toxin, and anthrax are major public health challenges resulting in many casualties in a relatively short period. On the other hand, it remains a very difficult thing to contain. Beyond this aspect, biological weapons remain existential risks that can be used in mass destruction. Further, it is a challenge even to health institutions to provide an antidote to the health hazard at hand. This position demands the integration of better precautions so that the Homeland Security Enterprise (HSE) can be proactive towards such threats.
Detect to Protect Programs
A major step in the right direction is the implementation of bio-detection systems. Their primary design aims to “detect to treat.” The Science and Technology (S&T) department at the Department of Homeland Security (DHS) has conducted bio-attacks, as well as chemical attacks on subways, indicate that bio-aerosols spread through these areas quite quickly. Such environments highlight the need for rapid and tight connections that exist in-between release and response actions. The complexity of these systems implies that they are quite a challenge to build considering that there must be an intricate balance between their capabilities for fast detection and the actual reality that associated sensors are prone to false alarms.
In retrospect, the S&T ought to pursue a multi-tiered bio-aerosol detect to protect programs that sense bio-attacks within stadia, buildings, airports, and metro-systems (O'Toole, 2011). Such sensors would prove to be protective action in slowing the spread of an agent. These systems would be central in turning on a confirmation sensor while at the same time changing air flows in the locations they are installed. Confirmation sensors facilitate high-impact actions including alerting public health officials, warnings to shelter in place, and establishing evacuations.
Safeguard and Secure the Country’s Cyberspace
The advancement in technology has resulted in massive benefits that have tagged along with its primary demerits. Criminals have seized the opportunities presented in these platforms to orchestrate underhand methods that they...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!