Organization of homeland security threats facing you region

Assignment Help Business Law and Ethics
Reference no: EM13226365

Develop an envisioned methodology and design a research topic based on the research problem, purpose. Then write a research paper to identify the strengths and weaknesses of the envisioned method and design. In the paper, justify why the chosen method and design would be most appropriate for your research questions. Then justifying the chosen method and design, discuss why alternative methods/designs would be less desirable for this study.

Problem Statement

What does it mean to collect and share intelligence information within the United States? In essence, intelligence involves gathering and analyzing data about who, what, where and when someone is planning an attack of some kind. To do this, we must gather information about people and organizations that have not yet violated the law. Simply gathering the information does not make it intelligence however, analyzing it does. Hence lay one of many problems the physical taking and obtaining information for Department of Homeland Security (DHS). This information is collaboration between DHS and Regional Information Sharing System (RISS) (Department of Homeland Security 2006). Network system that cause communication data links that enable computer to communicate with each other. In international security, there are many different types of intelligence; including Signals Intelligence (SIGINT), Human Intelligence (HUMINT), Communications Intelligence (COMMINT), Imagery Intelligence (IMINT), Measurements and Signatures Intelligence (MASINT), and open source information (Larence, 2012).

The type of intelligence most appropriate shared between local law enforcement and the international intelligence community is Human Intelligence (HUMINT). These paper discuses the problems with not share information in the homeland community(Larence, 2012). It is also worthwhile to note that there are local government sources of data that may be trivial but valuable to share at a national level; such as parking ticket data collected by parking enforcement bureau's, text data on law enforcement's incident reports. It is also important that we define the routine low-level police records that are most important to feed into the human intelligence process (Larence, 2012). Some of the requirement includes the following:

Local law enforcement needs to know when a known terrorist is in their vicinity. International intelligence needs details of what a known terrorist is doing in a local community and details of specific targets within the United States.

Local resources may need to be tasked to look for anything involving certain targets and weapons such as; biological materials, known terrorists, explosives, financial transactions, infrastructure and weapons of mass destruction (Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information-Sharing Initiatives, 2007).

Also by developing a full productive of information sharing within the federal government, state, local, and private sector. Although numerous of improvements have been made in protecting our country critical infrastructures and sharing information's efforts are in progress to continuing address these problems (Harold, 2004). The consequences of not addresses these problems made result into another traumatic even like September 11.

The purpose of this exploratory research was to examine the state level and the organizations created in the past six years. This research consisted of law enforcement and intelligence personnel from 50 states and 70% of the control study provided input. As a result the experimental procedures, treatments, and experiences of the participants that threatens the researcher's ability to able to draw correct inferences from the data about the population.

The potential threats to internal validity that may arise in this study, responses and actions: (1) some agencies may not want to share information with other agencies. Response and Action: The PATRIOT Act will then be enforced. This states that agencies have the right to gather intelligence from potential threats.

(2) The legality of sharing information.Responses and Action: This will limit the process due to the legal process of allowing states to share information with each other. To include federal, state, and local agencies, the law may prohibit the transferring of information because it may be classified information. (3) The legality aspect of collecting information then to process the information for intelligence. Response and Action: To have laws in effect to provide the necessary legal paperwork for warrants. (4) To notify the appropriate authorities for the proper response to the threat. Response and Action: The immediate approval to inform and share information with other agencies for the appropriate responses.

The manner in which validity issues could possibly impact my research is by (1) The PATRIOT Act should not be an issue because this is a law passed by congress. (2) Agencies being limited due to the legal procedures and or restraints of the US courts. Also, because of the classification of information being declassed may cause it to be delayed or denied to other agencies (3) the collection of information may also be delayed by how the information is ranked from low, medium, and to high importance. (4) Negligence may play a vital role when notifying the proper authorities within a timely matter.

Questions:

1. In your opinion, how prepared is your organization for homeland security in your region.

2. How, aware are you personally of homeland security threats facing your region.

3. How, aware is your organization of homeland security threats facing you region.

4. How prepared is your organization to prevent a homeland security attack in your region.

5. How prepared is you organization to respond to a homeland security emergency in you region.

6. How prepared is you organization to recover from an attack in your region.
What is the purpose and function of information sharing?

7.What would be measure timeliness, accuracy, or relevance for information sharing?

8. What does it mean to collect and share intelligence information within the United States to you?

9. Is it against the constitution to invade your privacy?

Reference no: EM13226365

Questions Cloud

Construct a net material requirements plan : In addition to 90 units of S, there is also demand for 30 units of U, which is a component of S. The 30 units of U are needed for maintenance purposes. These units are needed in week 6. Modify the gross material requirement plan to reflect this ch..
Organization of homeland security threats facing you region : How, aware are you personally of homeland security threats facing your region and how prepared is you organization to recover from an attack in your region.
Onsider an organization that you have worked : onsider an organization that you have worked for or that you are well acquainted with. Provide short overview. at least 5 -6 lines?
What overshoot for a step input to be expected : A control system for positioning the head of a floppy disk drive has the closed-loop transfer function T(s)=11.1(s+18) / (s+20)(s^2+4s+10). Plot the poles and zeros of this system and discuss the dominance of the complex poles.
Organization of homeland security threats facing you region : How, aware are you personally of homeland security threats facing your region and how prepared is you organization to recover from an attack in your region.
Construct a net material requirements plan : In addition to 90 units of S, there is also demand for 30 units of U, which is a component of S. The 30 units of U are needed for maintenance purposes. These units are needed in week 6. Modify the gross material requirement plan to reflect this ch..
Calculate the line admittance per unit length : A line has an inductance of1.25mH/km with an impedance angle of 70 degree , and a capacitance to neutral of 0.01mF/km. Calculate its reactance and series impedance per unit length at 50Hz. Calculate the line admittance per unit length
Is collection credit correct : Eton is subject to personal liability for Destiny's debts because Elton is subject to personal liability for Destiny's debts because Elton has the right, as a limited partner to take control of the firm. Is Collection Credit correct?
Evaluate steve ballmers leadership : Should companies like Microsoft develop special strategies to keep their share price high, or should they simply let the market worry about itself while they focus on things like revenue and profitability?

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Responsible for the execution of management

Who is legally responsible for the execution of management of a corporation ?

  Johny did not repay the loan and tony went overseas

In Dec 1999, Johny borrowed RM10,000 from Tony. Johny promised to repay the loan within a month. However, Johny did not repay the loan and Tony went overseas for further studies. He returned to Malaysia last month and demanded repayment from Jo..

  Explain business law- major media station

Explain Business Law- Major Media Station and What arguments do you think Marco will make in his suit against Major Media Station

  Could the company be found guilty of motor vehicle homicide

The state charged the Todesca corporation with motor vehicle homicide, and the jury found the company guilty. The trial judge imposed a fine-of $2,500. The court of appeals reversed the conviction, and the prosecution appealed to the state's highe..

  Explain reason for the occupational safety and health act

Explain Reason for the Occupational Safety and Health Act and Present the history of the Occupational Safety and Health Act and why it was enacted

  Explain postdated check and holder in due course right

Explain Postdated Check and Holder in Due Course Right- Check and Funds Transfer Case and David refused to pay claiming this was improper because he was protected as a holder in due course.

  John agosta and his brother salvatore

John Agosta and his brother Salvatore had formed a corporation, but disagreements between the two brothers caused John to petition for voluntary dissolution of the corporation

  Write on topic enterprise and entrepreneurship

Write on topic  Enterprise and entrepreneurship, choosing the right legal structure, conducting start up market research, costs revenues and profit and break-even analysis

  Explain making donations

Explain Making Donations and Before taking off on a cruise, the Shreks put their silver, jewelry and a wallet containing their credit cards in bags and stored them in their attic

  Why is a non charitable trust is invalid

Why is a non charitable trust is invalid and a charitable trust valid? when charitable trust doesn't not have an identifiable beneficiary? And does this section come all under one of the three certainties? i.e the objects of trust?

  Two of the eight categories

"compare and contrast two of the eight categories that attempt to explain criminal behavior". Class is CJS200 at University of phoenix......need it by end of night though

  Presentation is one of the marking criteria

Presentation is one of the marking criteria for this assignment: check that your charts are properly formatted and include an overall title as well as axes titles, make sure that you proofread your assignment for grammar and spelling mistakes. Please..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd