Category: Homeland security

  • Article critique

    After reading the Flynn article located in your required reading for this unit, you will create an article critique in which you will summarize the contents of the article and respond to the following questions: What is the authors main point? Who is the authors intended audience? Do the authors arguments support the main point? Why is it important to involve U.S. citizens in the development of a homeland security strategy for counterterrorism? How can the U.S. federal government encourage citizens to become a part of the homeland security strategy? Within your article critique, you will also discuss the importance of considering intelligence; border, immigration, and customs enforcement; transportation security; and cybersecurity and critical infrastructure protection when developing a homeland security strategy for counterterrorism including how U.S. citizens could play a role in these specific areas. Your article critique should consist of at least three pages and utilize APA style formatting. Please use at least one additional academic source in addition to the assigned article, and be sure that all citations and references utilize proper APA style.

    In order to access the following resource, please click the link below: Flynn, S. (2011). Recalibrating homeland security. Foreign Affairs, 90(3), 130140. Retrieved from http://libraryresources.waldorf.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db =bsu&AN=60123119&site=ehost-live&scope=site

    Attached Files (PDF/DOCX): Recalibrating Homeland Security – EBSCO.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Essay

    After reading the unit lesson and Chapters 3 and 4 of the RAND report found in the required reading for this unit, compose an essay that addresses the following items: the meaning of terrorism and how it can impact all aspects of society, the threat of international terrorist groups and the ramifications of this threat on future trends related to hard and soft targets, and the threat of domestic terrorism and homegrown extremism and the ramifications of this threat on future trends. Your paper must be at least two pages in length. Use at least one outside source in addition to the RAND report to support your position. All sources used, including the article, must be referenced. Paraphrased and/or quoted materials must have accompanying in-text citations and references in APA style.

  • Persian Gulf Briefing

    This assignment is an Operational Briefing on the Persian Gulf.

    You will brief the Joint Chiefs of Staff on the current situation in the Persian Gulf. You should include the retaking the Iraqi city of Mosul. Include the past combat issues that have occurred. The strategies that have worked and failed in the region. The coalition bombing began in August 2014 of ISIS position, what has changed in 2017? INCLUDE facts, not alternate facts. Cite when you must. This is a broad topic, so you should not have any problems finding enough professional subject matter content.

    Standard Components of an Operational Briefing

    Operational or mission briefings typically follow the five-paragraph Operations Order (OPORD) format, often remembered by the acronym SMEAC:

    1. Situation: Provides a general picture of the operating environment, including terrain, weather, enemy forces (morale, equipment, courses of action), and friendly forces (missions two levels up).
    2. Mission: A clear, concise statement of the objective (Who, What, When, Where, and Why). This is typically stated twice for clarity.
    3. Execution: Details how the mission will be accomplished. This includes the Commander’s Intent (the desired end-state), the concept of operations, and specific tasks assigned to subordinate units.
    4. Sustainment (or Service/Support): Covers logistics, including supply, equipment, transportation, and medical evacuation plans.
    5. Command and Signal (or Command and Control): Outlines the chain of command and communication procedures, such as radio frequencies, call signs, and passwords.

    REQUIREMENTS:

    Follow all the mandated Requirements. APA, proper grammatical structure

    2-3 page paper, 12pt font. Cover sheet and reference page do not count towards the total page count.

    I’ve included two different examples of briefings. Feel free to submit this briefing in whichever format you find easier. BUT YOU MUST USE ONE OF THESE TWO FORMATS.

    Please contact me if you have any questions or require clarification regarding this assignment.

    Attached Files (PDF/DOCX): Intel-Debriefing-UA1.pdf, National Security Briefing.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • please discuss the use of Artificial Intelligence (AI), and…

    please discuss the use of Artificial Intelligence (AI), and websites such as ChatGPT. paper discussing the use of AI and problems that may arise with it, its future, should we even have it, can it be used with police report writing? It has been brought up that when AI platforms dont know the answer, it will make it up. An example of that is from the lawyers from Butler Snow in Huntsville, AL who used it for case law and it made the case law up and now there are repercussions. Please provide your thoughts.
  • 15 PAGE PAPER

    For my capstone research paper, I have chosen the topic of Policing and Law Enforcement Management, within the united states, or we can focus on the state of Florida, if better. My goal is to address the Drone Programs in Law Enforcement, Technology in Law Enforcement, Police-Community Relations, and Shift-Community Relations.

    Location: within the United States

    This needs to be a 15 page paper

    Relating this policy back to Homeland Security

    We need to focus this paper on analytical claims supported by research.

    We will need a clear thesis statement that unifies these subtopics rather than treating them as separate areas of curiosity.

    Your source list shows solid effort and demonstrates that you are gathering a mix of Bureau of Justice Statistics reports, Department of Justice publications, RAND research, and policy oriented materials. That is a good start. However, some of your sources, such as company blogs or organizational promotional content, may not meet scholarly standards. At the capstone level, peer reviewed journal articles, government reports, and academic texts should form the foundation of your argument.

  • Reflection Writing

    The referred course is Internet and Network Security.

    as the course winds down, it is time to reflect on your takeaway from this course. Use the questions below to help guide your thinking, but feel free to volunteer additional information if you feel it is relevant.

    • At the beginning of this course, what did you expect to learn?
    • Did it require more effort than you thought it would?
    • What did you like most about the course?
    • What did you like least about the course?
    • What could you have done to improve your grade in this course?
    • What was something unexpected that you learned?
    • What risk management approach(es) might you now employ based on what you have learned?
    • What was the most valuable thing that you learned?
    • What professional security skills will you use moving forward, and what research sources will you compile for future work?
    • How did this course help you with your career and/or major decisions for the future?
    • Would you recommend this course to another student?
    • What advice (about this course or about college in general) would you give to an incoming student?

    Your response must be at least four pages in length, double-spaced, 12-point font, and have paragraph indents. Use the attached to complete this assignment. In the template, include at least one paragraph for each question. If outside sources are used, please adhere to APA Style when creating citations and references for this assignment.

  • week 3 assignment

    The goal of the Week 3 Assignment is to select a research topic and brainstorm your approach to it.

    Description:

    In COMM120, the Weeks 3 and 5 Assignments all work towards and contribute to the Week 7 Final Project. The Week 3 Assignment: Topic and Brainstorming has you choose a topic that you will use for the rest of the class. For many, this topic relates to the degree or career they are pursuing, while for others, it may simply reflect a personal interestsuch as a hobby, activity, or a non-controversial aspect of history.

    Step 1: Prompt for CoPilot

    Please copy and paste the following prompt into CoPilot. When you do this, you will need to edit the prompt and add your own topic. Here are some examples of possible topics:

    • …getting a sociology degree and future career prospects.
    • …getting a cybersecurity degree and future career prospects.
    • …becoming a park ranger.

    You can go directly to or to .

    Prompt:

    Task: Create a brainstorming report about <enter topic here>

    Context:

    • 100-level college course on information literacy
    • This assignment is the first of three assignments that relate to each other. Week 3 Assignment: Topic and Brainstorming, Week 5 Assignment: Sources Evaluation, and Week 7 Assignment: Final Project

    Tone: Academic

    Output:

    • Topic: include topic of the project.
    • Scope: include the research scope of the project and the value it might bring to a persons personal and professional life.
    • Value: include how the topic will bring value to a persons personal and professional life.
    • Communication medium: what possible presentation software might be used such as PowerPoint or Prezi.
    • Brainstorming: include any additional brainstorming ideas that will create a well thought out project plan.

    Thank you!

    Step 2: Fill out Topic and Brainstorming Worksheet

    Once you get your output from CoPilot, fill out the . You will need to fill out the following:

    • Part I: Topic and Brainstorming
    • Take the CoPilot output and copy and paste it into the Worksheet.
    • You will paste this into the Template as-is (you will not change anything).
    • Part II: Critical Thinking Questions
    • Add critical thinking questions that will allow for greater investigation into the topic.
    • These questions need to be your own and you cannot use CoPilot or any other Gen AI tool to do this for you.
    • Part III: Reflection
    • Write two paragraphs where you reflect on your chosen topic and how you will use the information from CoPilot in your future assignments.
    • This reflection needs to be your own and you cannot use CoPilot or any other Gen AI tool to do this for you.
    • Part IV: Reference Page
    • Post the Reference for CoPilot.

    Step 3: Submit the Completed Week 3 Template

    Assignment Guidelines

    Submission:

    • Use the to complete the assignment.
    • Read all of the Learning Material in Weeks 1 through 3.
    • Make sure you followed the directions carefully and each section is complete.
    • Thoroughly edit. One way to catch mistakes is by reading it out loud a minimum of three times.
    • Your submission will go through Turnitin and the AI Detector.
    • Please double-check that your assignment was submitted.

    For more information about how the Week 3 Assignment: Topic and Brainstorming will be graded, please see the grading rubric.

  • HLSS154-Final Assignment

    A fundamental issue established at the outset of this course is the fact that becoming involved in terrorist activities is a process where numerous factors can affect the mindset and actions of an individual. We have covered many of these issues and influences, so concerning this matter, compare and contrast at least two different radicalization models that explain terrorist motivations. In this research paper also summarize behavioral and psychological factors associated with disengaging from terrorism and describes what efforts or programs are most effective in countering radicalization and why.

    Related Course Objectives:

    CO-3: Categorize means of communication and influence upon advancing terrorist narratives.

    • LO-3.1: Examine media use by terrorist and extremist groups.

    CO-4: Compare radicalization models that explain terrorist motivations.

    • LO-4.1: Describe characteristics of radicalization.
    • LO-4.2: Compare the inspiration of both politics and religion upon individuals who choose to carry out terrorist actions.

    CO-5: Summarize behavioral and psychological factors associated with disengaging from terrorism.

    • LO-5.1: Discuss factors that influence disengagement from terrorism.

    Directions

    For this assignment, complete the following steps:

    1. Download the assignment template to write your paper.
    2. Locate sources to aid in writing your paper.
    3. Introduce your topic and include a brief summary of what you will discuss (1/2 page);
    4. Describe two radicalization models that explain terrorist motivations by comparing and contrasting the models (2 pages);
    5. Discuss behavioral and psychological factors associated with disengaging from terrorism (1 1/2 pages):
    6. Describe what efforts or programs are most effective in countering radicalization and why (1 1/2 pages);
    7. Provide a conclusion summarizing your paper in a clear and concise manner (1/2 page).

    Submission Guidelines

    • Your paper must be at a minimum of 6 pages (the Title and Reference pages do not count towards the minimum requirement).
    • Scholarly and credible references should be used. At least 4 scholarly articles are required for this assignment.
    • Scholarly sources include peer-reviewed articles, government publications, and academic texts.
    • Type in Times New Roman, 12 point, and double space.
    • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
    • Points will be deducted for using Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
    • Use the Template that is provided to develop this assignment.
    • All submissions will be graded using the assignment rubric.

    Attached Files (PDF/DOCX): HLSS154 Final Template.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Terrorist organization profile and hypothetical attack on US…

    Instructions This assignment is the first portion of a three-part series of research papers employed over the course of this class, with papers due in weeks 3, 6, and 8. This week, you will select a terrorist organization likely to conduct a major and imminent attack within the United States and complete an in-depth profile on the group you selected. This same terrorist group and the hypothetical attack you describe in this Midterm paper will also be used for your following Progress and Final papers. In the next paper (progress assignment due in week 6), you will describe how to collect and analyze intelligence on this terrorist group. In the final paper, due in week 8, you will describe how to stop the attack by making recommendations on how the Homeland Security Enterprise can be better supported by domestic intelligence. Objectives: This assignment assesses CO-5; LO-5.1. [content page] Directions For this assignment, complete the following steps: Download the assignment template [download] to write your paper. Locate sources to aid in writing your paper. Write a MAX double spaced 57-page research paper that provides a description of the organization’s ideology, goals and objectives, leadership, funding, and terrorist capabilities. Describe the groups’ known or suspected weapons/lethal agents and delivery methods, and the tactics, techniques, and procedures they may use here in the homeland. In your paper, describe in detail at least one major hypothetical terrorist attack on the U.S. Homeland by this groupan event that could happen in the immediate future (an imminent attack). You do not need advance permission from the instructor on which group you choose, but if you are considering a group unlikely to attack the U.S. Homeland, pick a different group that could do so. Additional Assignment Information Selecting a Terrorist Organization Make sure you pick either an international terrorist group from the Department of State list of Foreign Terrorist Organizations [webpage] or, if you pick a domestic group, make sure it is really a terrorist organization (not just radicals). The Counter Extremist Project also has good details on extremist groups [webpage] (but make sure to pick a terrorist organization). For example, the KKK is not a terrorist group (or even illegal, in fact); they are a domestic hate group that has had members conduct violent acts and murder. For more on that, see the FBI’s definition for international terrorism and domestic terrorism [webpage] (while either a domestic or international group can work for these papers, overseas terrorist groups are the best ones to facilitate your following research papers). Purpose of the Red Cell Paper This first Red Cell paper is only to set you up to be able to research and write on how to conduct intelligence operations to protect the Homeland (the following papers). So, a domestic terrorist group may make your progress and final papers harder to write if the group is not sending terrorists from overseas. Describing the Attack You can describe the full spectrum of capabilities the group has to conduct attacks on our Homeland in your paper, from a specific single-site attack (an iconic building) to complex synchronized or multi-city attacks or even the use of WMDs. Describe only the terrorist capabilities and weapons that are relevant to an attack on our homeland (for example, it does not matter that ISIS had battle tanks and other major weapons for this paper, only what they have that could be brought here to attack the US or acquired here). You need to explain what the impending terrorist attack on the U.S. homeland would look like and how they would do it — such as attacking a specific sporting event or a certain target you select for the organization. When it comes to picking a target(s) in one or multiple cities for your hypothetical attack(s), you can use your imagination and try to think like a terrorist (big impact, well covered by media, and fear spreading). Restrictions and Requirements Also, it needs to be a planned attack by a group or at least a cell from the group; it can NOT be a lone wolf, nor can the attack be by a radicalized individual or citizens. While these homegrown attacks are much more likely, these lone wolf or radicalized individuals attacking within the U.S. do not allow you to develop your future research papers on how to collect, analyze, and then disrupt these attacks (the topics of your progress and final papers). In sum, you must describe a specific physical attack (not just a cyber attack) on a target or targets that you assess the organization is capable of conducting, and it must be an attack within the U.S. Homeland and be conducted by a trained group or a cell of terrorists (not a homegrown or cyber-only attack). In other words, if you pick al Qaeda or ISIS/ISIL, then the attack cell needs to come from overseas, like what happened on 9/11 or with the 2009 underwear bomber coming into Detroit or the New York City subway bombing plot, also in 2009 (a traditional terrorist cell that was trained overseas). Tell us how it was planned and surveyed, how they got into the U.S., how many there are in the attack cell, etc. If you are stumped on what they could target specifically, then I suggest this article, Soft Targets are Easy Terror Targets [webpage]. Using the Terrorist Attack Cycle Conducting a successful major terrorist attack is a complicated operation involving a lot of planning, resourcing, reconnaissance, and rehearsals. Most groups use the terrorist attack cycle and include separate teams or cells for each of the following functions: support and logistics, weapons and bomb-making, reconnaissance and scout teams, as well as the attack cell itself. In your paper, consider how your selected organization will use the terrorist attack cycle (see the STRATFOR video below for more information), and specify exactly how many terrorists are in this attack cell. Also, specify how they will do the scouting and reconnaissance, how will logistical and other support be secured, in what manner will practice runs and rehearsals take place, and exactly how the attack will unfold so you need to specify how exactly they will attack and what exact location or target will they attack in one specific city (or multiple simultaneous attacks within one or more cities). Attack Cell Requirements So, for your Red Cell papers, have your selected terrorist group use a cell of at least three personnel in the attack cell and use an attack model. Some example terrorist attack models include the Tokyo sarin gas attack of 1995 and the London subway/bus bombings of 2005. You could also describe a complex attack using multiple teams, like what happened in Mumbai, India, in 2008, the West Gate Mall in Kenya in 2013, and the Paris attack in 2015 (to name a few). But an attack by a single individual is NOT what we are looking for since a lone actor (an inspired/radicalized individual) is not an attack by a terrorist cell (so no homegrown-only attacks). Make sure to explain exactly how many terrorists are in the attack cells, who did the scouting/reconnaissance, who is providing logistical and other support, how they infiltrated into the US, etc. Submission Guidelines Your paper must be a MAXIMUM double spaced 5-7 pages (the Title and Reference pages do not count towards the minimum requirement). Scholarly and credible references should be used. At least 5 scholarly articles are required for this assignment. Scholarly sources include peer-reviewed articles, government publications, and academic texts. Type in Times New Roman, 12 point, and double-space. Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. Points will be deducted for using Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc. All submissions will be graded using the assignment rubric. Resources & Supports STRATFOR : Watch this 3-minute video on the terrorist attack cycle. Terrorist Planning Cycle [webpage]: See Appendix A in the Military Guide to Terrorism in the Twenty-First Century (page 121). APA Style Guide [webpage] and Reference List Examples [download]: Provides information on how to cite in proper APA format. APA 7 Example Paper [download]: Provides an example paper with annotations. Submitting and Confirming a Submission : Watch this 3-minute video if you need guidance on submitting your assignment. Attachments HLSS320 Midterm Assignment Template.docx (20.97 KB)
  • Domestic Terror Final Assignment

    Write a research paper addressing the following global terrorism issues: In week 3, we discussed the Dilemmas in the Deterrence of Terrorists (Chapter 4 in The Counter Terrorism Puzzle). Why is deterring terrorists a challenge? Do you think terrorists can be deterred? Address both sides of the argument (through diplomacy, information, military, economic, financial, intelligence and law enforcement (D.I.M.E.F.I.L.) means). The U.S. Government published the most recent National Strategy for Counterterrorism (NSCT) in October 2018. For this second topic you are to develop a framework for a brand-new National Strategy for Counter Terrorism of the United States. Address both domestic (homeland) components and offensive overseas elements. Make sure to address how you will balance domestic security with civil liberties at home and how you will be effective in dealing with terrorists abroad without creating even more terrorists in the process. Make sure your framework employs all elements of national power (diplomatic, informational, military, economic, intelligence, law enforcement, financial). Also describe the importance of gathering all sources of domestic and overseas intelligence for effective counter terrorism efforts. You do not need to write an entire strategy, just the outline or framework for a new NSCT; an executive summary or details of your pillars or plan of action for a comprehensive strategy. Technical Requirements Your paper must be at a minimum of 5-6 pages (the Title and Reference pages do not count towards the minimum limit). Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content; however, a minimum of eight (8) scholarly sources are required to support your paper. Type in Times New Roman, 12 point and double space. Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.