SlideShare una empresa de Scribd logo
1 de 13
******For Kim Woods Only*****
Assignment 2: Intelligence Gathering
After terrorists attacked the United States on 9/11, the US
government implemented the USA Patriot Act, designed to
gather intelligence and prevent future terror attacks on the
United States. The USA Patriot Act reduced restrictions on law
enforcement agencies’ ability to monitor telephone
conversations, e-mail communications, and medical, financial,
and other records.
Additionally, the act eased restrictions on foreign intelligence
gathering within the United States; expanded the authority of
the secretary of the Treasury to regulate financial transactions,
particularly those involving foreign individuals and entities;
and broadened the discretion of law enforcement and
immigration authorities in detaining and deporting immigrants
suspected of terrorism-related acts.
However, critics of the USA Patriot Act opine that it is an
infringement on civil liberties and should be abolished.
Opponents of the law criticize the authorization of indefinite
detention of immigrants and search of a home or business
without the owner’s or the occupant’s permission or knowledge.
The USA Patriot Act also expanded the use of National Security
Letters, which allows the Federal Bureau of Investigation (FBI)
to tap telephone calls, e-mail, and financial records without a
court order, and expanded access to business records, including
library and financial records. Since its passage, several legal
issues have been brought against the act, and federal courts
have ruled that a number of provisions in the USA Patriot Act
are unconstitutional.
Click
here
to access a film titled
Spying on the Home Front
. The film has five segments, totaling about one hour. This film
explores some of the controversies surrounding the USA Patriot
Act.
http://www.pbs.org/wgbh/pages/frontline/video/flv/generic.html
?s=frol02p6d&continuous=1
Submission Details:
After watching all five segments of
Spying on the Home Front
, by
Saturday, June 11, 2016
, in a minimum of 250 words, post to the
Discussion Area
your response to the following:
What are the intelligence-gathering tools being used in the
United States to fight terrorism?
Is there adequate intelligence sharing between different law
enforcement agencies?
Do you think the USA Patriot Act is an effective tool for
fighting terrorism, or do you think it infringes on individual
civil liberties?
How have intelligence-sharing systems changed since 9/11?
Provide concrete examples that support your positions on each
of the above questions.
*****************************************************
*****************************************************
******************
Assignment 3: Weapons of Mass Destruction
Consider the following scenario:
A bomb has just exploded in a nuclear fuel storage facility in
Centervale. The Department of Homeland Security (DHS) is
worried because of the extremely high levels of radiation and
nuclear particulates contaminating air and water in Centervale.
Use the Argosy University online library resources and the
Internet to find examples of response plans to nuclear accidents.
Tasks:
Write a 2- to 3-page paper describing how you would respond to
this type of scenario? In your paper, focus on the following
points:
Which agencies would take the lead, and how would they
respond to a nuclear accident?
What type of interagency collaboration would be necessary to
effectively respond to a nuclear mishap?
What type of health risks would a nuclear mishap pose?
Your paper should be in APA format and double-spaced. The
font should be 12 point Times New Roman. Include citations of
your references.
Submission Details:
Save the paper as M1_A3_Lastname_Firstname.doc.
By
Wednesday, June 15, 2016
, submit your paper to the
M1: Assignment 3 Dropbox
.
*****************************************************
*****************************************************
***************
Assignment 1: First Responder Preparedness
During the terrorist attacks of 9/11, many agencies responded to
help the innocent victims caught in the twin towers of the World
Trade Center. Among the first responders were firefighters, law
enforcement personnel, and the US military.
Critics of the response say that rescue efforts could have been
better streamlined and coordinated. Some of the critics contend
that if firefighters had the proper communication equipment and
an incident command post (ICP) had been established quicker;
perhaps some more lives could have been saved.
After the horrific events of 9/11, a report titled "The 9/11
Commission Report" also came out suggesting that 9/11 could
have been prevented.
Refer to the
Webliography
for the complete report.
Tasks:
After reviewing the report and reflecting on the response by
first responders during 9/11, by
Saturday, June 18, 2016
, in a minimum of 250 words, post to the
Discussion Area
, your responses to the following:
What is an ICP and why is this important?
Could the events of 9/11 have been prevented?
Which agency do you think should lead the response to an event
like 9/11? Why would you choose the agency for this task?
*****************************************************
*****************************************************
****************
Assignment 2: Border Security and Technology
Consider the following scenario:
Today, law enforcement in the United States can use technology
and smart security to catch illegal immigrants trying to cross
the borders. Presently, various technologies are being used to
detect illegal immigrants.
Tasks:
Write a 2- to 3-page paper addressing the following:
Identify and discuss the various technologies currently being
employed by customs and border agents to detect illegal
immigrants. Explain the benefits of employing such
technologies.
Identify and discuss the current border patrol policies of the US
government.
Analyze the costs accrued to employ such technologies.
Explain how the effectiveness of border patrol is measured.
Describe the laws and regulations regarding immigration
enforcement.
Your paper should be in APA format and double-spaced. The
font should be 12 point Times New Roman. Include citations of
your references.
Submission Details:
Save the report as M2_A2_Lastname_Firstname.doc.
By
Wednesday, June 22, 2016
, submit your report to the
M2: Assignment 2 Dropbox
.
*****************************************************
*****************************************************
****************
Assignment 1: Homeland Security Agencies
In the United States, there are several agencies responsible for
safeguarding homeland security. The mission of the Office of
Homeland Security is "to develop and coordinate the
implementation of a comprehensive national strategy to secure
the United States from terrorist threats or attacks" (Bush, n.d.).
In carrying out its mission, the Office of Homeland Security
coordinates the anti-terrorism efforts of over 40 federal
agencies.
Reference
:
Bush, G. W. (n.d.).
Securing the homeland strengthening the nation. Using
21st century technology to defend the homeland
. Retrieved from
http://georgewbush-
whitehouse.archives.gov/homeland/homeland_
security_book.html#8
Tasks:
By
Saturday, June 25, 2016
, in a minimum of 300 words, post to the
Discussion Area
your responses to the following:
Select two of the following agencies responsible for
safeguarding the homeland security, and describe what they do,
who runs them, where they are located, and how and when they
are involved in issues related to terrorism.
The Directorate for National Protection and Programs
The Directorate for Science and Technology
The Directorate for Management
The Office of Policy
Use the Argosy University online library resources for
information regarding something the agencies did. Discuss what
changes, if any, you would make in preventing and resolving
issues related to authority, jurisdiction, and ethics. Provide a
minimum of two sources on how your response would work.
*****************************************************
*****************************************************
*******************
Assignment 2: LASA 1: Threat on Public Health
A war veteran discharged from active duty is unable to receive
the medical benefits that he believes he is entitled to. He also
faces problems in finding decent employment, but secures a
low-level, part-time position at a local water treatment plant in
a Centervale cleaning facility.
After several months on the job, with no benefits, he gets
depressed. He also starts questioning the reasons behind the
United States' military presence in Afghanistan and Iraq. He
feels that the United States is not justified in going to war with
Afghanistan and Iraq. All these reasons increase his resentment
toward the United States and its foreign policies.
In an effort to “get back” at the United States, he decides to
attack the water company he works for, including the canals and
major water sources, such as the Colorado River. He plans to
contaminate the water so that it causes major health problems or
even death, thereby resulting in the destruction of US citizens.
In his mission to carry out the attack on the water treatment
facility, he decides to recruit another low-level coworker who,
he believes, will help him. He tells this coworker the details of
his plan, and the coworker initially agrees to help him. A few
days before the plan is to be carried out the coworker gets
nervous and notifies the local Centervale Federal Bureau of
Investigation (FBI) office.
The director of the FBI assigns you to monitor the situation and
track the war veteran's behavior to prevent a domestic terror
attack. The Director expects a report on the disgruntled war
veteran along with the potential methods by which the attacks
on the water system might occur. Overall, your report should
help the city of Centervale prepare for this type of attack.
Instructions:
Your final APA-formatted report should be approximately 6–8
pages long. It should include a minimum of five reference
articles about water contamination or water accessibility at
local water treatment plants.
As you construct your report for the Director, take the following
items into consideration.
Examine the history and events that led to the creation of the
Department of Homeland Security. Discuss how history helps us
improve our responses for future events of a similar nature and
creates a sturdy foundation to handle new cases similar to the
attack this veteran was planning.
Compare and contrast your war veteran to the likes of Timothy
McVeigh, who was also a veteran responsible for blowing up
the Alfred P. Murrah Building in Oklahoma City on April 19,
1995.
Consider the threat that Transnational Organized Crime (TOC)
cells implanted on American soil have on national security.
Evaluate where and how the disgruntled war veteran might
acquire the resources necessary to launch an attack on the local
water treatment facility in Centervale keeping in mind that
Centervale is a town of seventy five thousand residents situated
outside a major metropolitan area of two million residents.
Consider the overarching mission, role, and function of the
Department of Homeland Security to protect the United States.
Using the available resources, create effective strategies to
verify the legitimacy of each potential terrorist resource without
violating the rights of Centervale's citizens.
Review the preparedness measures offered by the Department of
Homeland Security towards preparing the United Sates for
disasters by going to the website for the Federal Emergency
Management Agency (FEMA) at
http://www.fema.gov/
. You can find more specific information at
http://www.fema.gov/plan-prepare-mitigate
and/or
http://www.fema.gov/
response-recovery
. Select a preparedness measure and recommend how it might be
useful in helping Centervale prepare for an attack on public
health.
Submission Details:
Save the report as M3_A2_Lastname_Firstname.doc.
By
Wednesday, June 29, 2016
, submit your paper to the
M3: Assignment 2 LASA 1 Dropbox
.
*****************************************************
*****************************************************
***********
Assignment 1: US Agencies in an Effort to Coordinate the
Government's Efforts against Terrorism
In the United States there are several agencies responsible for
helping keep the United States safe. Prominent among these
agencies include the Office of Operations Coordination and
Planning, the Federal Law Enforcement Training Center, the
Domestic Nuclear Detection Office, the Transportation Security
Administration, the United States Customs and Border
Protection, and the United States Citizenship and Immigration
Services.
In this assignment, you are required to analyze and examine two
of these agencies.
Submission Details:
By
Saturday, July 2, 2016
, in a minimum of 300 words, post to the
Discussion Area
your responses to the following:
What is the primary role and function of the following agencies:
The Office of Operations Coordination and Planning
The Federal Law Enforcement Training Center
The Domestic Nuclear Detection Office
Transportation Security Administration
United States Customs and Border Protection
United States Citizenship and Immigration Services
Select two of the agencies given above. Describe what each
does, and then compare and contrast what they do differently.
*****************************************************
*****************************************************
*****************
Assignment 2: Homeland Security Research
Today, the Transportation Security Administration (TSA) uses
facial recognition technology and other security procedures to
track and monitor suspected terrorists, in an effort to prevent
future attacks on the Unites States. Facial recognition is one of
many security technologies currently being employed by the
TSA. This assignment requires you to discuss the use of
biometrics in security and the inherent ethical challenges.
Tasks:
Answer the following questions:
Analyze the effectiveness of the TSA as an enforcement
agency? How do you know TSA is effective for the Department
of Homeland Security (DHS)?
What are the benefits of employing technologies such as full-
body scanners, facial recognition, and sensors?
What is the cost to employ such technologies? Is it a means to
an end? Analyze what you have read so far and not what you
have watched on TV.
What one change would you implement effectively now?
Provide budget research and research analysis (Does your idea
make for safer air travel?). What would it cost, and can
terrorists defeat it?
Are civil liberties and security procedures at odds? Does more
security destroy freedoms? Can you somehow improve both in
order to live free and vibrant, yet have security from those who
want to harm the people?
Prepare a 2- to 3-page paper using APA format, double-spaced
Times New Roman, 12 point font. Include the questions or
scenario in your paper and citations of your references.
Submission Details:
Save the report as M4_A2_Lastname_Firstname.doc.
By
Wednesday, July 6, 2016
, submit your report to the
M4: Assignment 2 Dropbox
.
*****************************************************
*****************************************************
*********************
Assignment 1: LASA 2: Sleeper Cells
For the purpose of this LASA, a sleeper cell could be defined as
one or more individuals who are physically located in the
United States and are a part of a political movement against the
US ideology.
Consider the following scenario:
Three Afghanistan women are tired of being oppressed and look
more toward the Muslim religion for freedom. These three
women form an informal communication network with one
another and could be considered "sleepers." The three women
decide to create social unrest by taking radical steps of planning
three different terrorist attacks. The three women target the
East, West, and South Coasts of the U.S. respectively.
The women have very different backgrounds. The first woman is
the first Muslim elected to Congress and plans to attack the
Congressional building targeting the men in power. The second
woman is a former military Explosive Ordinance Disposal
(EOD) team member and plans to use her expertise to blow up
Lackland Air Force Base, Texas. The third woman works in a
child day care facility next to the Federal Law Enforcement
Training Center (FLETC) in Glynco, Georgia. Her target is the
day care facility, aiming to create a scene of fear and terror by
killing innocent children.
The three women have been communicating via phone; however,
their plan gets intercepted by the security agencies. The Patriot
Act provides the authority to various federal agencies to include
the National Security Agency (NSA) that can now monitor and
track the plots made by the women.
The NSA director has tasked you to monitor the situation and
coordinate an appropriate response to their threats. A formal
presentation on the group's activities and potential targets is
necessary toward the development of an appropriate response.
Instructions:
The following are the criteria for the 12- to 15-slide Microsoft
PowerPoint presentation. Be sure to use the Argosy University
online library resources and other online resources in addition
to your text as references to complete this project. Include a
title slide to introduce your presentation and a references slide
at the end. The body of the presentation should be of 12- to 15-
slides.
Tasks:
Research the topic,
Women and Terrorism in the United States
. Develop a profile for sympathizers, and discuss where female
terrorists are common and what other roles females from nations
who support terrorism may play in terrorist operations in the
United States.
Consider the components of the critical infrastructure and
associated threat assessment risk management procedures.
Develop a plan that would include all the necessary agencies to
respond to this type of coordinated attack.
Research and estimate the cost to combat this threat along with
the necessary interagency coordination to foil this plot.
Analyze the implications of these terrorist attacks on public
health from the initial responses to their overall management.
Propose an appropriate action plan and a recovery plan for the
potentially affected areas.
Analyze the media's perception of domestic terrorism compared
to international terrorism. Identify and discuss the media's
image of the typical international terrorist compared to the
typical domestic terrorist. How do women play a role in the
image of international and domestic terrorism?
Submission Details:
Save the final presentation as M5_A1_Lastname_Firstname.ppt.
By
Monday, July 11, 2016
, submit your final presentation to the
M5: Assignment 1 LASA 2 Dropbox
.
*****************************************************
*****************************************************
*****************
Assignment 2: Perspective of Terrorism and the United States
Response to Future Threats
This assignment provides an introduction to many aspects of
terrorism, focusing on the domestic threats of terrorism, the
historical origins, basic needs of preparedness, and the
psychological implications.
This assignment is designed to reflect on various aspects of
homeland security issues that are covered throughout the
course.
Submission Details:
By
Sunday, July 10, 2016
, in a minimum of 300 words, post to the
Discussion Area
your responses to the following questions:
What are the various types of attacks that the United States
might expect to encounter in the future?
What are the evidences that predict whether future attacks
originate from inside the United States or from outside?
What are the three agencies within the Department of Homeland
Security responsible for keeping the United States safe?
In what ways has this course opened your eyes on the
complexities involved in keeping the United States safe?

Más contenido relacionado

Similar a For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx

Cja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comCja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comsholingarjosh76
 
Cja 426 Success Begins / snaptutorial.com
Cja 426  Success Begins / snaptutorial.comCja 426  Success Begins / snaptutorial.com
Cja 426 Success Begins / snaptutorial.comWilliamsTaylorza41
 
Cja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comCja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comStephenson25
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxSHIVA101531
 
Conflicts Affecting Economic Trade Between the UnitedSta.docx
Conflicts Affecting Economic Trade Between the UnitedSta.docxConflicts Affecting Economic Trade Between the UnitedSta.docx
Conflicts Affecting Economic Trade Between the UnitedSta.docxmaxinesmith73660
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referwildmandelorse
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era PaperTiffany Sandoval
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Erik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxErik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxSALU18
 
Military involvement in disasters
Military involvement in disastersMilitary involvement in disasters
Military involvement in disastersTimothy Makori
 

Similar a For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx (12)

Cja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.comCja 426 Technology levels--snaptutorial.com
Cja 426 Technology levels--snaptutorial.com
 
Cja 426 Success Begins / snaptutorial.com
Cja 426  Success Begins / snaptutorial.comCja 426  Success Begins / snaptutorial.com
Cja 426 Success Begins / snaptutorial.com
 
Cja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.comCja 426 Enthusiastic Study / snaptutorial.com
Cja 426 Enthusiastic Study / snaptutorial.com
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docxANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
ANSWER EACH QUESTION 100 WORDS MIN EACH1. The terrorist .docx
 
Conflicts Affecting Economic Trade Between the UnitedSta.docx
Conflicts Affecting Economic Trade Between the UnitedSta.docxConflicts Affecting Economic Trade Between the UnitedSta.docx
Conflicts Affecting Economic Trade Between the UnitedSta.docx
 
Each question should be done on a separate word document, with refer
Each question should be done on a separate word document, with referEach question should be done on a separate word document, with refer
Each question should be done on a separate word document, with refer
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era Paper
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Erik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docxErik S. LesserStringerGe.docx
Erik S. LesserStringerGe.docx
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Military involvement in disasters
Military involvement in disastersMilitary involvement in disasters
Military involvement in disasters
 

Más de zollyjenkins

Consider the following quote by the philosopher Ludwig Wittgenst.docx
Consider the following quote by the philosopher Ludwig Wittgenst.docxConsider the following quote by the philosopher Ludwig Wittgenst.docx
Consider the following quote by the philosopher Ludwig Wittgenst.docxzollyjenkins
 
Consider the following questions as you review 1. Is the conten.docx
Consider the following questions as you review 1. Is the conten.docxConsider the following questions as you review 1. Is the conten.docx
Consider the following questions as you review 1. Is the conten.docxzollyjenkins
 
Consider the discussion in Texass Shift from Blue to Red Informs 2.docx
Consider the discussion in Texass Shift from Blue to Red Informs 2.docxConsider the discussion in Texass Shift from Blue to Red Informs 2.docx
Consider the discussion in Texass Shift from Blue to Red Informs 2.docxzollyjenkins
 
Consider the different views of happiness discussed in Chapter 12, i.docx
Consider the different views of happiness discussed in Chapter 12, i.docxConsider the different views of happiness discussed in Chapter 12, i.docx
Consider the different views of happiness discussed in Chapter 12, i.docxzollyjenkins
 
Consider some of your primary interests (hobbies, favorite media, pr.docx
Consider some of your primary interests (hobbies, favorite media, pr.docxConsider some of your primary interests (hobbies, favorite media, pr.docx
Consider some of your primary interests (hobbies, favorite media, pr.docxzollyjenkins
 
consider how time series analysis can be applied.a. Research.docx
consider how time series analysis can be applied.a. Research.docxconsider how time series analysis can be applied.a. Research.docx
consider how time series analysis can be applied.a. Research.docxzollyjenkins
 
Consider Lydia’s and John’s cognitive and physical limitations as .docx
Consider Lydia’s and John’s cognitive and physical limitations as .docxConsider Lydia’s and John’s cognitive and physical limitations as .docx
Consider Lydia’s and John’s cognitive and physical limitations as .docxzollyjenkins
 
Consider how classification can be applied.a. Research compl.docx
Consider how classification can be applied.a. Research compl.docxConsider how classification can be applied.a. Research compl.docx
Consider how classification can be applied.a. Research compl.docxzollyjenkins
 
Consider experienced nurses you know or imagine the qualities requir.docx
Consider experienced nurses you know or imagine the qualities requir.docxConsider experienced nurses you know or imagine the qualities requir.docx
Consider experienced nurses you know or imagine the qualities requir.docxzollyjenkins
 
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docx
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docxConsider Furos transformation in A. Igoni Barretts novel, Blackass.docx
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docxzollyjenkins
 
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docx
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docxconsider a solution of Al(no3)3 in water. A)what ion pairs would be .docx
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docxzollyjenkins
 
consider a work of art (film, song, painting, play, novel, nonfictio.docx
consider a work of art (film, song, painting, play, novel, nonfictio.docxconsider a work of art (film, song, painting, play, novel, nonfictio.docx
consider a work of art (film, song, painting, play, novel, nonfictio.docxzollyjenkins
 
Consider a recent event, either in your personal life or in the news.docx
Consider a recent event, either in your personal life or in the news.docxConsider a recent event, either in your personal life or in the news.docx
Consider a recent event, either in your personal life or in the news.docxzollyjenkins
 
Consider a community that you are familiar with. What issuesthre.docx
Consider a community that you are familiar with. What issuesthre.docxConsider a community that you are familiar with. What issuesthre.docx
Consider a community that you are familiar with. What issuesthre.docxzollyjenkins
 
Connect the story of Pinocchio with the characteristics of Italian n.docx
Connect the story of Pinocchio with the characteristics of Italian n.docxConnect the story of Pinocchio with the characteristics of Italian n.docx
Connect the story of Pinocchio with the characteristics of Italian n.docxzollyjenkins
 
Consent, Confidentiality, and Privileged Communication can be tr.docx
Consent, Confidentiality, and Privileged Communication can be tr.docxConsent, Confidentiality, and Privileged Communication can be tr.docx
Consent, Confidentiality, and Privileged Communication can be tr.docxzollyjenkins
 
Connecting Knowledge with Research in Case StudiesTolulope Mos.docx
Connecting Knowledge with Research in Case StudiesTolulope Mos.docxConnecting Knowledge with Research in Case StudiesTolulope Mos.docx
Connecting Knowledge with Research in Case StudiesTolulope Mos.docxzollyjenkins
 
Conjecture Every card that has an even number on one side is .docx
Conjecture Every card that has an even number on one side is .docxConjecture Every card that has an even number on one side is .docx
Conjecture Every card that has an even number on one side is .docxzollyjenkins
 
Congress and the Presidency An Unequal RelationshipThe .docx
Congress and the Presidency An Unequal RelationshipThe .docxCongress and the Presidency An Unequal RelationshipThe .docx
Congress and the Presidency An Unequal RelationshipThe .docxzollyjenkins
 
Congratulations! The members of the United Nations found great value.docx
Congratulations! The members of the United Nations found great value.docxCongratulations! The members of the United Nations found great value.docx
Congratulations! The members of the United Nations found great value.docxzollyjenkins
 

Más de zollyjenkins (20)

Consider the following quote by the philosopher Ludwig Wittgenst.docx
Consider the following quote by the philosopher Ludwig Wittgenst.docxConsider the following quote by the philosopher Ludwig Wittgenst.docx
Consider the following quote by the philosopher Ludwig Wittgenst.docx
 
Consider the following questions as you review 1. Is the conten.docx
Consider the following questions as you review 1. Is the conten.docxConsider the following questions as you review 1. Is the conten.docx
Consider the following questions as you review 1. Is the conten.docx
 
Consider the discussion in Texass Shift from Blue to Red Informs 2.docx
Consider the discussion in Texass Shift from Blue to Red Informs 2.docxConsider the discussion in Texass Shift from Blue to Red Informs 2.docx
Consider the discussion in Texass Shift from Blue to Red Informs 2.docx
 
Consider the different views of happiness discussed in Chapter 12, i.docx
Consider the different views of happiness discussed in Chapter 12, i.docxConsider the different views of happiness discussed in Chapter 12, i.docx
Consider the different views of happiness discussed in Chapter 12, i.docx
 
Consider some of your primary interests (hobbies, favorite media, pr.docx
Consider some of your primary interests (hobbies, favorite media, pr.docxConsider some of your primary interests (hobbies, favorite media, pr.docx
Consider some of your primary interests (hobbies, favorite media, pr.docx
 
consider how time series analysis can be applied.a. Research.docx
consider how time series analysis can be applied.a. Research.docxconsider how time series analysis can be applied.a. Research.docx
consider how time series analysis can be applied.a. Research.docx
 
Consider Lydia’s and John’s cognitive and physical limitations as .docx
Consider Lydia’s and John’s cognitive and physical limitations as .docxConsider Lydia’s and John’s cognitive and physical limitations as .docx
Consider Lydia’s and John’s cognitive and physical limitations as .docx
 
Consider how classification can be applied.a. Research compl.docx
Consider how classification can be applied.a. Research compl.docxConsider how classification can be applied.a. Research compl.docx
Consider how classification can be applied.a. Research compl.docx
 
Consider experienced nurses you know or imagine the qualities requir.docx
Consider experienced nurses you know or imagine the qualities requir.docxConsider experienced nurses you know or imagine the qualities requir.docx
Consider experienced nurses you know or imagine the qualities requir.docx
 
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docx
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docxConsider Furos transformation in A. Igoni Barretts novel, Blackass.docx
Consider Furos transformation in A. Igoni Barretts novel, Blackass.docx
 
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docx
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docxconsider a solution of Al(no3)3 in water. A)what ion pairs would be .docx
consider a solution of Al(no3)3 in water. A)what ion pairs would be .docx
 
consider a work of art (film, song, painting, play, novel, nonfictio.docx
consider a work of art (film, song, painting, play, novel, nonfictio.docxconsider a work of art (film, song, painting, play, novel, nonfictio.docx
consider a work of art (film, song, painting, play, novel, nonfictio.docx
 
Consider a recent event, either in your personal life or in the news.docx
Consider a recent event, either in your personal life or in the news.docxConsider a recent event, either in your personal life or in the news.docx
Consider a recent event, either in your personal life or in the news.docx
 
Consider a community that you are familiar with. What issuesthre.docx
Consider a community that you are familiar with. What issuesthre.docxConsider a community that you are familiar with. What issuesthre.docx
Consider a community that you are familiar with. What issuesthre.docx
 
Connect the story of Pinocchio with the characteristics of Italian n.docx
Connect the story of Pinocchio with the characteristics of Italian n.docxConnect the story of Pinocchio with the characteristics of Italian n.docx
Connect the story of Pinocchio with the characteristics of Italian n.docx
 
Consent, Confidentiality, and Privileged Communication can be tr.docx
Consent, Confidentiality, and Privileged Communication can be tr.docxConsent, Confidentiality, and Privileged Communication can be tr.docx
Consent, Confidentiality, and Privileged Communication can be tr.docx
 
Connecting Knowledge with Research in Case StudiesTolulope Mos.docx
Connecting Knowledge with Research in Case StudiesTolulope Mos.docxConnecting Knowledge with Research in Case StudiesTolulope Mos.docx
Connecting Knowledge with Research in Case StudiesTolulope Mos.docx
 
Conjecture Every card that has an even number on one side is .docx
Conjecture Every card that has an even number on one side is .docxConjecture Every card that has an even number on one side is .docx
Conjecture Every card that has an even number on one side is .docx
 
Congress and the Presidency An Unequal RelationshipThe .docx
Congress and the Presidency An Unequal RelationshipThe .docxCongress and the Presidency An Unequal RelationshipThe .docx
Congress and the Presidency An Unequal RelationshipThe .docx
 
Congratulations! The members of the United Nations found great value.docx
Congratulations! The members of the United Nations found great value.docxCongratulations! The members of the United Nations found great value.docx
Congratulations! The members of the United Nations found great value.docx
 

Último

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

For Kim Woods OnlyAssignment 2 Intelligence Gathering.docx

  • 1. ******For Kim Woods Only***** Assignment 2: Intelligence Gathering After terrorists attacked the United States on 9/11, the US government implemented the USA Patriot Act, designed to gather intelligence and prevent future terror attacks on the United States. The USA Patriot Act reduced restrictions on law enforcement agencies’ ability to monitor telephone conversations, e-mail communications, and medical, financial, and other records. Additionally, the act eased restrictions on foreign intelligence gathering within the United States; expanded the authority of the secretary of the Treasury to regulate financial transactions, particularly those involving foreign individuals and entities; and broadened the discretion of law enforcement and immigration authorities in detaining and deporting immigrants suspected of terrorism-related acts. However, critics of the USA Patriot Act opine that it is an infringement on civil liberties and should be abolished. Opponents of the law criticize the authorization of indefinite detention of immigrants and search of a home or business without the owner’s or the occupant’s permission or knowledge. The USA Patriot Act also expanded the use of National Security Letters, which allows the Federal Bureau of Investigation (FBI) to tap telephone calls, e-mail, and financial records without a court order, and expanded access to business records, including library and financial records. Since its passage, several legal issues have been brought against the act, and federal courts have ruled that a number of provisions in the USA Patriot Act are unconstitutional. Click here to access a film titled Spying on the Home Front . The film has five segments, totaling about one hour. This film explores some of the controversies surrounding the USA Patriot
  • 2. Act. http://www.pbs.org/wgbh/pages/frontline/video/flv/generic.html ?s=frol02p6d&continuous=1 Submission Details: After watching all five segments of Spying on the Home Front , by Saturday, June 11, 2016 , in a minimum of 250 words, post to the Discussion Area your response to the following: What are the intelligence-gathering tools being used in the United States to fight terrorism? Is there adequate intelligence sharing between different law enforcement agencies? Do you think the USA Patriot Act is an effective tool for fighting terrorism, or do you think it infringes on individual civil liberties? How have intelligence-sharing systems changed since 9/11? Provide concrete examples that support your positions on each of the above questions. ***************************************************** ***************************************************** ****************** Assignment 3: Weapons of Mass Destruction Consider the following scenario: A bomb has just exploded in a nuclear fuel storage facility in Centervale. The Department of Homeland Security (DHS) is worried because of the extremely high levels of radiation and nuclear particulates contaminating air and water in Centervale. Use the Argosy University online library resources and the Internet to find examples of response plans to nuclear accidents. Tasks: Write a 2- to 3-page paper describing how you would respond to this type of scenario? In your paper, focus on the following points:
  • 3. Which agencies would take the lead, and how would they respond to a nuclear accident? What type of interagency collaboration would be necessary to effectively respond to a nuclear mishap? What type of health risks would a nuclear mishap pose? Your paper should be in APA format and double-spaced. The font should be 12 point Times New Roman. Include citations of your references. Submission Details: Save the paper as M1_A3_Lastname_Firstname.doc. By Wednesday, June 15, 2016 , submit your paper to the M1: Assignment 3 Dropbox . ***************************************************** ***************************************************** *************** Assignment 1: First Responder Preparedness During the terrorist attacks of 9/11, many agencies responded to help the innocent victims caught in the twin towers of the World Trade Center. Among the first responders were firefighters, law enforcement personnel, and the US military. Critics of the response say that rescue efforts could have been better streamlined and coordinated. Some of the critics contend that if firefighters had the proper communication equipment and an incident command post (ICP) had been established quicker; perhaps some more lives could have been saved. After the horrific events of 9/11, a report titled "The 9/11 Commission Report" also came out suggesting that 9/11 could have been prevented. Refer to the Webliography for the complete report. Tasks: After reviewing the report and reflecting on the response by
  • 4. first responders during 9/11, by Saturday, June 18, 2016 , in a minimum of 250 words, post to the Discussion Area , your responses to the following: What is an ICP and why is this important? Could the events of 9/11 have been prevented? Which agency do you think should lead the response to an event like 9/11? Why would you choose the agency for this task? ***************************************************** ***************************************************** **************** Assignment 2: Border Security and Technology Consider the following scenario: Today, law enforcement in the United States can use technology and smart security to catch illegal immigrants trying to cross the borders. Presently, various technologies are being used to detect illegal immigrants. Tasks: Write a 2- to 3-page paper addressing the following: Identify and discuss the various technologies currently being employed by customs and border agents to detect illegal immigrants. Explain the benefits of employing such technologies. Identify and discuss the current border patrol policies of the US government. Analyze the costs accrued to employ such technologies. Explain how the effectiveness of border patrol is measured. Describe the laws and regulations regarding immigration enforcement. Your paper should be in APA format and double-spaced. The font should be 12 point Times New Roman. Include citations of your references. Submission Details: Save the report as M2_A2_Lastname_Firstname.doc. By
  • 5. Wednesday, June 22, 2016 , submit your report to the M2: Assignment 2 Dropbox . ***************************************************** ***************************************************** **************** Assignment 1: Homeland Security Agencies In the United States, there are several agencies responsible for safeguarding homeland security. The mission of the Office of Homeland Security is "to develop and coordinate the implementation of a comprehensive national strategy to secure the United States from terrorist threats or attacks" (Bush, n.d.). In carrying out its mission, the Office of Homeland Security coordinates the anti-terrorism efforts of over 40 federal agencies. Reference : Bush, G. W. (n.d.). Securing the homeland strengthening the nation. Using 21st century technology to defend the homeland . Retrieved from http://georgewbush- whitehouse.archives.gov/homeland/homeland_ security_book.html#8 Tasks: By Saturday, June 25, 2016 , in a minimum of 300 words, post to the Discussion Area your responses to the following: Select two of the following agencies responsible for safeguarding the homeland security, and describe what they do, who runs them, where they are located, and how and when they are involved in issues related to terrorism. The Directorate for National Protection and Programs
  • 6. The Directorate for Science and Technology The Directorate for Management The Office of Policy Use the Argosy University online library resources for information regarding something the agencies did. Discuss what changes, if any, you would make in preventing and resolving issues related to authority, jurisdiction, and ethics. Provide a minimum of two sources on how your response would work. ***************************************************** ***************************************************** ******************* Assignment 2: LASA 1: Threat on Public Health A war veteran discharged from active duty is unable to receive the medical benefits that he believes he is entitled to. He also faces problems in finding decent employment, but secures a low-level, part-time position at a local water treatment plant in a Centervale cleaning facility. After several months on the job, with no benefits, he gets depressed. He also starts questioning the reasons behind the United States' military presence in Afghanistan and Iraq. He feels that the United States is not justified in going to war with Afghanistan and Iraq. All these reasons increase his resentment toward the United States and its foreign policies. In an effort to “get back” at the United States, he decides to attack the water company he works for, including the canals and major water sources, such as the Colorado River. He plans to contaminate the water so that it causes major health problems or even death, thereby resulting in the destruction of US citizens. In his mission to carry out the attack on the water treatment facility, he decides to recruit another low-level coworker who, he believes, will help him. He tells this coworker the details of his plan, and the coworker initially agrees to help him. A few days before the plan is to be carried out the coworker gets nervous and notifies the local Centervale Federal Bureau of Investigation (FBI) office. The director of the FBI assigns you to monitor the situation and
  • 7. track the war veteran's behavior to prevent a domestic terror attack. The Director expects a report on the disgruntled war veteran along with the potential methods by which the attacks on the water system might occur. Overall, your report should help the city of Centervale prepare for this type of attack. Instructions: Your final APA-formatted report should be approximately 6–8 pages long. It should include a minimum of five reference articles about water contamination or water accessibility at local water treatment plants. As you construct your report for the Director, take the following items into consideration. Examine the history and events that led to the creation of the Department of Homeland Security. Discuss how history helps us improve our responses for future events of a similar nature and creates a sturdy foundation to handle new cases similar to the attack this veteran was planning. Compare and contrast your war veteran to the likes of Timothy McVeigh, who was also a veteran responsible for blowing up the Alfred P. Murrah Building in Oklahoma City on April 19, 1995. Consider the threat that Transnational Organized Crime (TOC) cells implanted on American soil have on national security. Evaluate where and how the disgruntled war veteran might acquire the resources necessary to launch an attack on the local water treatment facility in Centervale keeping in mind that Centervale is a town of seventy five thousand residents situated outside a major metropolitan area of two million residents. Consider the overarching mission, role, and function of the Department of Homeland Security to protect the United States. Using the available resources, create effective strategies to verify the legitimacy of each potential terrorist resource without violating the rights of Centervale's citizens. Review the preparedness measures offered by the Department of Homeland Security towards preparing the United Sates for disasters by going to the website for the Federal Emergency
  • 8. Management Agency (FEMA) at http://www.fema.gov/ . You can find more specific information at http://www.fema.gov/plan-prepare-mitigate and/or http://www.fema.gov/ response-recovery . Select a preparedness measure and recommend how it might be useful in helping Centervale prepare for an attack on public health. Submission Details: Save the report as M3_A2_Lastname_Firstname.doc. By Wednesday, June 29, 2016 , submit your paper to the M3: Assignment 2 LASA 1 Dropbox . ***************************************************** ***************************************************** *********** Assignment 1: US Agencies in an Effort to Coordinate the Government's Efforts against Terrorism In the United States there are several agencies responsible for helping keep the United States safe. Prominent among these agencies include the Office of Operations Coordination and Planning, the Federal Law Enforcement Training Center, the Domestic Nuclear Detection Office, the Transportation Security Administration, the United States Customs and Border Protection, and the United States Citizenship and Immigration Services. In this assignment, you are required to analyze and examine two of these agencies. Submission Details: By Saturday, July 2, 2016 , in a minimum of 300 words, post to the
  • 9. Discussion Area your responses to the following: What is the primary role and function of the following agencies: The Office of Operations Coordination and Planning The Federal Law Enforcement Training Center The Domestic Nuclear Detection Office Transportation Security Administration United States Customs and Border Protection United States Citizenship and Immigration Services Select two of the agencies given above. Describe what each does, and then compare and contrast what they do differently. ***************************************************** ***************************************************** ***************** Assignment 2: Homeland Security Research Today, the Transportation Security Administration (TSA) uses facial recognition technology and other security procedures to track and monitor suspected terrorists, in an effort to prevent future attacks on the Unites States. Facial recognition is one of many security technologies currently being employed by the TSA. This assignment requires you to discuss the use of biometrics in security and the inherent ethical challenges. Tasks: Answer the following questions: Analyze the effectiveness of the TSA as an enforcement agency? How do you know TSA is effective for the Department of Homeland Security (DHS)? What are the benefits of employing technologies such as full- body scanners, facial recognition, and sensors? What is the cost to employ such technologies? Is it a means to an end? Analyze what you have read so far and not what you have watched on TV. What one change would you implement effectively now? Provide budget research and research analysis (Does your idea make for safer air travel?). What would it cost, and can terrorists defeat it?
  • 10. Are civil liberties and security procedures at odds? Does more security destroy freedoms? Can you somehow improve both in order to live free and vibrant, yet have security from those who want to harm the people? Prepare a 2- to 3-page paper using APA format, double-spaced Times New Roman, 12 point font. Include the questions or scenario in your paper and citations of your references. Submission Details: Save the report as M4_A2_Lastname_Firstname.doc. By Wednesday, July 6, 2016 , submit your report to the M4: Assignment 2 Dropbox . ***************************************************** ***************************************************** ********************* Assignment 1: LASA 2: Sleeper Cells For the purpose of this LASA, a sleeper cell could be defined as one or more individuals who are physically located in the United States and are a part of a political movement against the US ideology. Consider the following scenario: Three Afghanistan women are tired of being oppressed and look more toward the Muslim religion for freedom. These three women form an informal communication network with one another and could be considered "sleepers." The three women decide to create social unrest by taking radical steps of planning three different terrorist attacks. The three women target the East, West, and South Coasts of the U.S. respectively. The women have very different backgrounds. The first woman is the first Muslim elected to Congress and plans to attack the Congressional building targeting the men in power. The second woman is a former military Explosive Ordinance Disposal (EOD) team member and plans to use her expertise to blow up Lackland Air Force Base, Texas. The third woman works in a
  • 11. child day care facility next to the Federal Law Enforcement Training Center (FLETC) in Glynco, Georgia. Her target is the day care facility, aiming to create a scene of fear and terror by killing innocent children. The three women have been communicating via phone; however, their plan gets intercepted by the security agencies. The Patriot Act provides the authority to various federal agencies to include the National Security Agency (NSA) that can now monitor and track the plots made by the women. The NSA director has tasked you to monitor the situation and coordinate an appropriate response to their threats. A formal presentation on the group's activities and potential targets is necessary toward the development of an appropriate response. Instructions: The following are the criteria for the 12- to 15-slide Microsoft PowerPoint presentation. Be sure to use the Argosy University online library resources and other online resources in addition to your text as references to complete this project. Include a title slide to introduce your presentation and a references slide at the end. The body of the presentation should be of 12- to 15- slides. Tasks: Research the topic, Women and Terrorism in the United States . Develop a profile for sympathizers, and discuss where female terrorists are common and what other roles females from nations who support terrorism may play in terrorist operations in the United States. Consider the components of the critical infrastructure and associated threat assessment risk management procedures. Develop a plan that would include all the necessary agencies to respond to this type of coordinated attack. Research and estimate the cost to combat this threat along with the necessary interagency coordination to foil this plot. Analyze the implications of these terrorist attacks on public health from the initial responses to their overall management.
  • 12. Propose an appropriate action plan and a recovery plan for the potentially affected areas. Analyze the media's perception of domestic terrorism compared to international terrorism. Identify and discuss the media's image of the typical international terrorist compared to the typical domestic terrorist. How do women play a role in the image of international and domestic terrorism? Submission Details: Save the final presentation as M5_A1_Lastname_Firstname.ppt. By Monday, July 11, 2016 , submit your final presentation to the M5: Assignment 1 LASA 2 Dropbox . ***************************************************** ***************************************************** ***************** Assignment 2: Perspective of Terrorism and the United States Response to Future Threats This assignment provides an introduction to many aspects of terrorism, focusing on the domestic threats of terrorism, the historical origins, basic needs of preparedness, and the psychological implications. This assignment is designed to reflect on various aspects of homeland security issues that are covered throughout the course. Submission Details: By Sunday, July 10, 2016 , in a minimum of 300 words, post to the Discussion Area your responses to the following questions: What are the various types of attacks that the United States might expect to encounter in the future? What are the evidences that predict whether future attacks originate from inside the United States or from outside?
  • 13. What are the three agencies within the Department of Homeland Security responsible for keeping the United States safe? In what ways has this course opened your eyes on the complexities involved in keeping the United States safe?