First, improving the preventions of terrorist travel will aid in curbing acts of terrorism within the States of America. Better policies and strategies of thwarting the terrorist travel should be established for as long as terrorism continues to exist. For example, security within various traveling points should be enhanced, and travelers that are suspicious should be subject to strict scrutiny. This will be an effective way of reducing the number of tourists that get into the country through different means, hence reducing
Homeland security is responsible for preventing terrorist attacks in the United States, reducing the nation’s vulnerability to terrorism, minimizing damage and assisting in the recovery of attacks that occur, ensuring that the overall economic security of the United States is not diminished by efforts, activities, and programs aimed at securing the homeland, and lastly monitoring connections between illegal drug trafficking and terrorism. Cyber security is a growing field that is tasked with preventing damage or prevention the unauthorized use or exploitation of electronic information and communication. Some issues that relate to the Homeland security is that the agency is too large to manage. The reason behind that is because of the vast array of agencies with varying missions related to homeland security. Funding is allocated without regard to a risk assessment of where attacks might occur.
Lowenthal describes the Joint Terrorism Task Forces (JTTF) as a means of improving liaison between federal and local law enforcement agencies. They are also being primarily staffed by state law enforcement personnel. Lowenthal also seems to question their value, as he states that they have yet to prove their abilities to provide the desired level of integration and liaison (Lowenthal, 2012, p. 248). By stark contrast, the FBI describes JTTFs as a one-stop shop for information regarding terrorist activities. Their primary purpose is to support shared intelligence across multiple agencies and to create a familiarity amongst investigators and managers prior to a crisis occurring.
The conception of the surveillance program was an attempt to protect the american citizens from terrorist activity as well as act as a form of counterterrorism abroad in many other countries. These positive aspects of the massive surveillance system show that there is a benevolent practice of surveillance that should be
Counterintelligence: The Sword and Shield in Counterterrorism Michael Jay Smith American Military University INTL 498 Senior Seminar Dr. Lamont Colucci Misunderstood Capabilities “All Warfare is based upon deception”- Sun Tzu In most instances, Counterintelligence operations are often misunderstood in the capabilities they provide to counter-terror operations. Counterintelligence operations offer many options in order to ensure that intelligence collection is attainable in instances of terrorism both domestically and internationally. These collections are available from electronic and physical surveillance to the use of covert actions. In the realm of terror and counter-terror operations, the use of Counterintelligence shows the ability to
There are different responsibilities and powers of the Texas legislature and many are somewhat difficult to understand for some. However, the Texas Legislature is the dominant branch of state government within the state constitutional framework of separation of powers. The legislature may also at times exercise the state 's inherent police power to
In this paper I will be discussing the roles and responsibilities of a forensics officer in a crime scene. When working any crime scene the first and most important rule is maintaining secure control of the scene, and ensuring the safety of bystanders as well as the other personnel working in the area. The easiest way to ensure safety is as soon as the scene is located; you want to cordon off the entire scene with 365 degree security. The purpose for that is to guarantee nothing, or no one goes in or out of the crime scene without proper verification. That not only keeps the crime scene from contamination, but also provides a way to maintain a proper chain of custody on all potential evidence.
I believe that there are a number of weak links within the current justice system. One of which is troublesome is the number of unsolved homicides in the United States. There seems to be several different speculations as to why this may be. Strom and Hickman (2010)(6p4) suggests that is could be because of the lengthy backlog of the forensic laboratories. Another theory they offer is that law enforcement on the scene may not have the training necessary to collect evidence correctly (6p4).
The only thing clear is that a solution for the problem has to be provided. It is understandable that for many, the enforcement of the border and the implementation of stricter securities measures are critical. After all, concerns about the current illegal immigration situation goes further than just people being in the United States without the proper documentation. These concerns are also about the constant increment of drug trafficking across the border and even worse the infiltration of members pertaining to terrorist organizations like Al-Qaida and the Islamic State in order to commit terrorist attack in national soil. Also it is understandable that many believe that the current eleven million of undocumented immigrant are more of a burden for tax payers, since it is believed that most of these immigrant, take advantage of the existing welfare polices, abuse assistance programs, and do not pay taxes on the income they generate.
We value our freedom above all else, going to nearly any cost to defend it. Along with this, however, we also gain a strong attachment to our privacy, defending it as vivaciously as we do our freedom. This attachment to privacy is evidenced by the outrage expressed at the NSA’s surveillance programs. These programs were set up by the US government to detect terrorists and criminals operating covertly within our borders, and included such activities as warrantless wiretapping and recording of all internet traffic. While these activities are disturbing, and should definitely have been more well-regulated and transparent, they are necessary for the security of our country.