Part 1 All parts are to be done in separate word documents
In 250 words, review the core missions of the Department of Homeland Security (DHS) and describe an application from your experience and/or knowledge that illustrates a core mission. List the five core missions identified by DHS. Select one core mission, its goals and describe from your knowledge or experience how that incident and your actions and/or response (or that of your unit) exemplifies that core mission. Ensure the following three topics are addressed:
Select either first person or third person perspective and avoid shifts in person agreement. Document the references you use in preparation of the 250 word essay in APA Styles format.
Reading
Oliver, W.M., Marion, N.E., & Hill, J.B. (2015). Introduction to Homeland Security. MA: Jones & Bartlett Learning. Chapter 1, Chapter 2, and Chapter 8.Â
Part 2 All parts are to be done in separate word documents
Nearly two decades have passed since 9/11, and today’s terrorist threat environment is much more complicated and menacing than that posed by Al Qaeda back then. The new Secretary of Homeland Security (John Kelly) explains at the Aspen Institute July 19, 2017 in a video interview titled Securing the Homeland in the Post-Post 9/11 Era, how he grapples with the challenge and the Trump administration’s plans for meeting it. Pay particular attention to the last ten minutes when DHS Secretary Kelly responds to Jane L Harman, President & CEO of the Wilson Center, question and Kelly describes the former DHS secretary Jeh Johnson’s theme of “Unity of Effort.”
Select a threat described by DHS Secretary Kelly. Using government sources and journal articles, prepare a 250 word essay on a current domestic terrorist threat to American interests. Summarize the nature of the threat, the group or groups posing the threat, potential consequences, and counter terrorism strategies for reducing or responding to the threat. Document your sources of information.​
Video:
Kelly, J.B., (July 19, 2017). “Securing the Homeland in the Post-Post 9/11 Era,” The Aspen Institute. Retrieved fromhttps://www.youtube.com/watch?v=q92WzKAmoWA&feature=youtu.be (Links to an external site.)Links to an external site.
Reading:
Oliver, W.M., Marion, N.E., & Hill, J.B. (2015). Introduction to Homeland Security. MA: Jones & Bartlett Learning. Chapter 1 and Chapter 2, pp 19 – 39.Â
Suggested Sources for Supplemental Information:
Central Intelligence Agency Library https://www.cia.gov/library (Links to an external site.)Links to an external site. (Links to an external site.)Links to an external site.
Clapper, J.R. (2014). Statement for the Record: Worldwide Threat Assessment of the U.S. Intelligence Community. Retrieved from http://www.intelligence.senate.gov/140129/clapper.pdf (Links to an external site.)Links to an external site.
Federal Bureau of Investigation (2013). Terrorism webpage. Retrieved from http://www.fbi.gov/about-us/investigate/terrorism (Links to an external site.)Links to an external site.
Homeland Security Digital Library https://www.hsdl.org/?home (Links to an external site.)Links to an external site.
National Counter-Terrorism Center (2013). Counterterrorism Calendar http://www.nctc.gov/site/index.html (Links to an external site.)Links to an external site.
U.S. Department of State Bureau of Counterterrorism http://www.state.gov/j/ct/index.htm (Links to an external site.)
Part 3 All parts are to be done in separate word documents
The question remains while many studies ask the question “Why do young people radicalize and convert to violent extremism?” Technology further compounds this emerging social trend when, seemingly lone wolves self-radicalize and commit acts of terrorism with what appears as no social network to support their radicalization. The integration of local law enforcement with state and local homeland security authorities has become more important than ever before. This assignment is intended to help students understand the radicalization process, its sources and exporters while demonstrating the need for coordination among local law enforcement, state fusion centers and United States intelligence sources.
Watch Paul Gigot’s (July 16, 2017) interview of Seth Jones in the aftermath of Iraq’s defeat of ISIS in Mosul. Take a look at “Understanding Lone Wolves” and “The Attraction of Young Adults to ISIS” and then research one recent terrorist attack in the United States.
In about 250 words, summarize your analysis. On the basis of your research, draw some conclusion whether the terrorist threat to America is receding, stable or growing. Document your sources of information in APA Style format.
Video:
Gigot, P., (July 16, 2017), “Iraq Declares Victory over ISIS in Mosul,” Interview with Seth Jones, Journal Editorial Report, Retrieved from http://www.foxnews.com/on-air/journal-editorial-report/index.html#/v/5508983051001 (Links to an external site.)Links to an external site.
Reading:
Leenaars, J. and Reed A. (April 2016). “Understanding Lone Wolves: Towards a Theoretical Framework for Comparative Analysis,” International Centre for Counter-Terrorism, The Hague. See Course Materials or click on article title.
Woodward, C.T., (2016). “The Attraction of Young Adults to ISIS through Societal Relationships and Social Media.” Master’s Thesis, Duke University. See Course Materials or click on article title.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more