Posted: June 19th, 2015

Topic: MATRIX-Terrorism

 

Citation:

Clovis, Samuel. “Promises Unfulfilled: The Suboptimization of Homeland Security National Preparedness.” Homeland Security Affairs 4, Article 3 (October 2008). https://www.hsaj.org/articles/116

Summary:

The article commences by underscoring the high detail that has been attached to the Homeland Security after the bombing of 9/11. It brings forth the antagonism that has permeated the Federal government and the State. This is mainly because of their differing approaches to Homeland Security and the stances both states have adopted in the implementation of Homeland security policies. The particular article touches on legislations that have been enacted as a result of the strong focus on Homeland Security and how their implementation is to be effected.

The legislations in perspective include the Homeland Security Act 2002, National Homeland Security Strategy and the Homeland Security Presidential Direction. The Homeland Security Act is the seminal legislation while the rest only provide Policy Guidelines to the Federal and State Governments (Carafano).

Also, the article lists the departments that are in charge of implementing these policies. The department whose role has been so much interrogated is the Homeland Security that became fully operational in the year 2003 under the Executive arm of government. The article outlines the challenges that face the department in its operations and the legislative changes aimed at improving its services. Moreover, it evaluates the effectiveness of these changes in the functionality of the Homeland Security Department.

The role Congress plays in the implementation of policy is canvassed in the article. Notably, the role of Congress in combating terrorism is explored. The paper is emphatic that Congress the supervisory role over the Homeland Security Department has been the mandate of Congress. The article examines this role deeply (Mills).

Key quotations:

“A series of “foundational” documents began to populate the homeland security policy arena after 9/11. Along with the seminal legislation found in the Homeland Security Act of 2002 came a series of documents such as the National Homeland Security Strategy and Homeland Security Presidential Directives providing policy guidance to federal, state, and local governments.”

“The national government, however, has remained focused primarily on acts of terror. This divergence in perspective has led to ever-increasing tensions between the federal government and state and local governments when policies related to homeland security national preparedness are at issue.”

Evaluation:

The article provides a broad understanding of the legislative framework that regulates the Homeland Security Department. It’s an eye opener on the historical development of the legislations and the challenges they have successfully solved as well as those that they have not been so successful in solving (Mills). It gives information on institutions tasked with implementing homeland security and their performance thus far. The article also examines the important question of political and its effects on implementation.

Citation:

Russell, Brenda, and John Purcell. Online Research Essentials: Implementing and Designing Research Studies. San Francisco: Jossey-Bass, 2009. Print.

Summary:

Online Research Essentials: Implementing and Designing Research Studies is a book targeting to equip students research skills. It deals extensively with carrying out of online research and provides students with practical skills in planning, creating, testing and deploying online research. In the book, there is also a simple but detailed explanation of how to analyze information acquired. Further, useful programs that aid the achievement of effective online research are also explained in the book (Krane). The dos and don’ts of online research and the tricks that enable a researcher have an easy time in the course of research are also given.

The book also clears the air on some issues that present difficulties during research. Of particular concern is the scientific method of research which is sometimes hard for the students to understand. It also explains research designs in unequivocal and unambiguous terms. Most importantly, it outlines the ethical issues to be taken into consideration in the course of research (Krane). Finally, the book offers guidance on how research ought to conduct online research without breaching internet rules

Key quotations:

“That is why it is important to consider two key things carefully when deciding your study. First, will the measurement you choose enable you to answer your research question or hypothesis in a valid manner? Second, because the measurement you choose will dictate which statics you can use, will the scale of measurement you choose enable you to examine statistically the outcome of your study as you intended?”(14)

“Ethics should be considered when planning, conducting, interpreting and reporting the contents of your research (Cozby, 2001). For example, supposing you were asked to assess the general well-being of employees and to recommend programs that could enhance employees health insurance cost. You would need to consider all research questions being careful not to harm potential participants for the study.”(19)

Evaluation:

This work proves useful in providing guidance as to how to efficiently conduct online research. The findings of this study will depend to a large extent on the information gotten from research. The research that will be employed will by large be online research (Baker). With the guidance of this work, it is easy to get accurate results and also analyzes the results correctly.

Citation:

Herrmann, Jeffrey W. Handbook of Operations Research for Homeland Security. New York: Springer, 2013. Print.

Summary:

The book deals with the application of operation research models in homeland security models .it explores the art of employing research models to prevent terrorism by early detection. The book has a collection of articles that contain responses strategies to natural and malicious threats to public security and happiness. It brings to light the importance of the power of operation research in organizations in planning for and responding to natural disasters, terrorist attack, and public health emergencies.

The book gives an insight to policy makers and decision makers as to what operation research models can do and its relevance to their particular concerns (Bardach). It outlines steps to be followed involved in dealing with the problem faced. The four steps give the concerned party a well-structured method of applying operation research in providing solutions to security issues and others kinds of problems.

Key quotations:

“this chapter describes how to assess the vulnerability of operational system by using interdiction models we do so in the context of four application from the literature: delaying an adversary development of a first nuclear weapon; understanding vulnerability in electricity power system; locating sensors to rapid detect ant illicit contaminant injected into a municipal water system; and locating radiation system to detect a nuclear smuggle.” (73)

“monitoring and patrolling are an essential component of law enforcement in security domains generating schedules off or this patrols, it is important to account for varying weights of the target being protected as well as the fact that potential attackers can often observe procedure being used. This chapter describes scheduling assistants for the LAX police, ARMOR, and the FAMS IRIS, which provide game theoretical solutions to this problem.”(70)

Evaluation:

The book makes significant contributions to the research. It is important because it give actual solutions to the problem under research. Furthermore, an explanation of how to combat and prevent terrorism is given (Bardach). Mostly, it recognizes that the research should bring out solutions to the terrorism problem. The book also hints at the direction that research should take.

Citation:

Congress and the Nation 2001-2004: Politics and Policy in the 107th and 108th Congresses. Washington: Congressional Quarterly Service, 2006. Print.

Summary:

This book points out the challenges that insecurity posed in America especially in the reign of George W Bush. It outlines how Bush Congress struggled to confront and at times benefit from the then rampant insecurity. Congress both failed and succeeded in some instances. Additionally it states that Bush and the Republicans gained a lot from the whole quagmire in the short run. (Derthick)The book underscores the effects that the September 11 attack had and how the measures taken after that affected the general population and governance of America.

The attack changed how the politics of America played out. It provided a diversion from the domestic issues all focus was drawn on measures of combating terrorism and preventing future attacks. During this time, the Congress passed several legislations to help fight terrorism and prevent future attack it is then that homeland security department was established (Derthick). The legislature agreed to increase funding to fight terrorism but turned down the request to turn down some measures suggested by the Bush administration.

Key quotation:

“(Sec. 104) Authorizes the Attorney General to request the Secretary of Defense to provide assistance in support of Department of Justice (DOJ) activities relating to the enforcement of Federal criminal code (code) provisions regarding the use of weapons of mass destruction during an emergency situation involving a weapon (currently, chemical weapon) of mass destruction”

“(Sec. 203) Amends rule 6 of the Federal Rules of Criminal Procedure (FRCrP) to permit the sharing of grand jury information that involves foreign intelligence or counterintelligence with Federal law enforcement, intelligence, protective, immigration, national defense, or national security officials (such officials), subject to specified requirements.”

“(Sec. 208) Increases (from seven to 11) the number of district court judges designated to hear applications for and grant orders approving the electronic surveillance. Requires that no fewer than three reside within 20 miles of the District of Columbia.”

Evaluation:

Through this work, we can appreciate the effect that the terrorism prevention measures have had on the general population. There is also an appreciation of how politics and security have interacted especially under the watch of Bush administration. Different facets namely the law politics and social life which are all paramount in any given community are examined, and their interaction explained. This helps to expand the scope of the research.

Citation:

Morbidity and Mortality Weekly Report; Special Issue September 11, 2002 / Vol. 51

Summary:

This is an article that looks at the effect that September 11 had in the nation. Emphasis is laid on how different departments responded to the disaster in trying to rescue survivors. The predicament of the people who responded to help the situation is brought to the fore. The firefighters and first aiders some losing their life under the while rescuing the wounded and some of them contracting diseases that would come to live with them for the rest of their lives.

Medical officers give their personal accounts of their experience both during the attack and after the attack. They outline the challenges that they face to date due to their participation in the rescue mission. Through their accounts, we can appreciate the seriousness of the attack and hence the necessity to prevent any future occurrence of such a magnitude.

Key quotation:

“During the 48 hours after the attacks, approximately 90% of 10,116 FDNY rescue workers evaluated at the WTC site reported an acute cough often accompanied by nasal congestion, chest tightness, or chest burning; only three FDNY rescue workers required hospitalization” (4)

“Dr. Kelly: As I made my way toward the nearest firehouse (Ladder 10/ Engine 10 on Liberty Street) in lower Manhattan, I saw people and debris rain in from the towers. A group of FDNY firefighters called for me to help a firefighter who had just been hit by a

Civilian falling from the tower. The injury appeared fatal. We attempted to resuscitate him and then placed him in a nearby ambulance. A captain then escorted me across West Street towards the command center.” (3)

“During the 11 months after the attacks, 1,277 stress-related incidents were observed

Among FDNY rescue workers, a 17-fold increase compared with the 75 stress-related

Incidents reported during the 11 months preceding the attacks. As of August 28, 2002, a total of 250 FDNY rescue workers remain on leave with service-connected, stress-

Related problems.”(6)

Evaluation:

This article helps to appreciate the seriousness of terrorism. It shows that terrorism has far-reaching effects some immediate and others in the future. It prompt us to look for solutions to preventing terrorism bearing in mind that it affects not only those present during impact but also those who come to the scenes moment later and even ultimately future inhabitant of affected area.

Citation:

Shawn Reese: Defining Homeland Security: Analysis and Congressional Considerations January 8, 2013 Congressional Research Service New York. Online http://fas.org/sgp/crs/homesec/R42462.pdf

Summary:

This is a report that discusses evolution and subsequent development of homeland security. It explores how several legislations and policies have developed over time after the September 11 bombing. The department of homeland security is put under scrutiny and laws made to empower the department in the dispensing of functions entrusted to it. On a thorough examination, it is evident that the report does not address the issue of implementation of the department strategy. If this question had been included the source would have proved more valuable in my research. It, however, concentrates more on the documentation part of the department rather than the implementation part.

Key quotation:

“The concept of homeland security has evolved over the last decade. Homeland security as a concept was precipitated by the terrorist attacks of 9/11. However, prior to 9/11 such entities as

The Gilmore Commission and the United States Commission on National Security discussed the

Need to evolve the way national security policy was conceptualized due to the end of the Cold

War and the rise of radicalized terrorism. After 9/11, policymakers concluded that a new approach was needed to address the large-scale terrorist attack.”

“Definitions and missions are part of strategy development. Policymakers develop the strategy by identifying national interests, prioritizing missions to achieve those national interests, and arraying instruments of national power to achieve national interests.”

Evaluation:

The report traces the development of the department of homeland security and laws and policies empowering the department. The importance of this resource is to help in understanding the department. The department is very central in combating terrorism and the use of weapons of mass destruction.

Citation:

Shawn Cupp and Michael G. Spight. A Homeland Security Model for Assessing US Domestic Threats .web. 2007

Summary

The writer talks about risk assessment and measures that have been undertaken to prevent terrorism in areas that are classified as high-risk areas. The high-risk areas include but are not limited to shopping malls, learning institution. Means of assessing terrorism risk are well elaborated in the article with a step by step explanation of how the risks are evaluated (Probost).it also outlines how to determine whether a terrorist group possess a security or terrorism group. This terrorist groups and risks classification helps know where and which terrorists are likely to strike and hence counter them and prevent attack

Key quotation

“Currently within the US domestic threats or terrorist groups can be categorized into five basic typologies. They are left-wing, right-wing, and special interest.”

“A domestic terrorist group’s capability rating is directly tied to the domestic terrorism definition outlined in the US Code Title 18 (Government Printing

Office, 2006). The capability rating increases with each group based on the total number and type of attacks. Targets that are attacked are also factored into the higher ratings.”

Evaluation:

The assessment of risks is crucial in combating terrorism. Prowess in assessing risk is vital because it indicates where to place emphasis in terms of putting a high alert on terrorism. Prevention becomes easy if this sought of assessment is already done beforehand. The article equips knowledge of assessment of risk and in my research this is going to be invaluable in determining where to employ more strict measures of preventing terrorism.

Citation:

J.J. Carafano, “Homework: Congress Needs to Return with a Better Plan to Reform Homeland Security Oversight,” Heritage Foundation Web Memo #528 (2004), http://www.heritage.org/Research/HomelandDefense/wm527.cfm

Summary:

The article by Professor Carafano provides in-depth analysis of the Department of Homeland Security. He assesses how the department has been performing its work. This article looks at how the department can foil terrorist attacks. He points out some of the loopholes that are in the system

Key quotation:

“Building an effective department requires sound strategies, robust programs, personnel reforms, and integrating information technologies. Congressional oversight-lead by committees and professional staffs with the experience and expertise to address difficult, complex issues plays a significant role in achieving these ends. To this point, the Congress has failed to provide that kind of leadership.”

“From just the last legislative season, there is more than enough experience to suggest that it is long past time for Congress to establish permanent committees to oversee homeland security in the House and Senate.”

Valuation:

This information is crucial in highlighting the loophole that exist in the security arena. The research that is to be undertaken will find it essential to identify these gaps. With the identification of the same then the research can be able to prescribe the most suitable knowledge having a good understanding of the problem.

 

References

Baker, David. Modern Research: How to Conduct Effective online Research. New York: Penguin, 2010. Print.

Bardach, Eugene. A Practical Guide for Policy Analysis. Washington, D.C: Tyndale, 2005. Print.

Carafano, J.J. Homeland Security Needs Responsible Oversight. New York: Heritage Foundation, 2004. Online.

Derthick, M. Where Federalism Didn’t Fail. Washington: Journal of Federalism, 2007. Print.

Krane, Duane. Effective online research. New York: hull, 2008. Print.

Mills, R.M. R.M. Hills, “The Political Economy of Cooperative Federalism: Why State Autonomy Makes Sense and ‘Dual Sovereignty’ Doesn’t’. Washington D.C: Michigan Law Review, 2004. Print.

Probost, Leader S.H &. The Earth Liberation Front and Environmental Terrorism. Washington, 3rd January 2004.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp