Organization of homeland security threats facing you region

Assignment Help Business Law and Ethics
Reference no: EM13226365

Develop an envisioned methodology and design a research topic based on the research problem, purpose. Then write a research paper to identify the strengths and weaknesses of the envisioned method and design. In the paper, justify why the chosen method and design would be most appropriate for your research questions. Then justifying the chosen method and design, discuss why alternative methods/designs would be less desirable for this study.

Problem Statement

What does it mean to collect and share intelligence information within the United States? In essence, intelligence involves gathering and analyzing data about who, what, where and when someone is planning an attack of some kind. To do this, we must gather information about people and organizations that have not yet violated the law. Simply gathering the information does not make it intelligence however, analyzing it does. Hence lay one of many problems the physical taking and obtaining information for Department of Homeland Security (DHS). This information is collaboration between DHS and Regional Information Sharing System (RISS) (Department of Homeland Security 2006). Network system that cause communication data links that enable computer to communicate with each other. In international security, there are many different types of intelligence; including Signals Intelligence (SIGINT), Human Intelligence (HUMINT), Communications Intelligence (COMMINT), Imagery Intelligence (IMINT), Measurements and Signatures Intelligence (MASINT), and open source information (Larence, 2012).

The type of intelligence most appropriate shared between local law enforcement and the international intelligence community is Human Intelligence (HUMINT). These paper discuses the problems with not share information in the homeland community(Larence, 2012). It is also worthwhile to note that there are local government sources of data that may be trivial but valuable to share at a national level; such as parking ticket data collected by parking enforcement bureau's, text data on law enforcement's incident reports. It is also important that we define the routine low-level police records that are most important to feed into the human intelligence process (Larence, 2012). Some of the requirement includes the following:

Local law enforcement needs to know when a known terrorist is in their vicinity. International intelligence needs details of what a known terrorist is doing in a local community and details of specific targets within the United States.

Local resources may need to be tasked to look for anything involving certain targets and weapons such as; biological materials, known terrorists, explosives, financial transactions, infrastructure and weapons of mass destruction (Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information-Sharing Initiatives, 2007).

Also by developing a full productive of information sharing within the federal government, state, local, and private sector. Although numerous of improvements have been made in protecting our country critical infrastructures and sharing information's efforts are in progress to continuing address these problems (Harold, 2004). The consequences of not addresses these problems made result into another traumatic even like September 11.

The purpose of this exploratory research was to examine the state level and the organizations created in the past six years. This research consisted of law enforcement and intelligence personnel from 50 states and 70% of the control study provided input. As a result the experimental procedures, treatments, and experiences of the participants that threatens the researcher's ability to able to draw correct inferences from the data about the population.

The potential threats to internal validity that may arise in this study, responses and actions: (1) some agencies may not want to share information with other agencies. Response and Action: The PATRIOT Act will then be enforced. This states that agencies have the right to gather intelligence from potential threats.

(2) The legality of sharing information.Responses and Action: This will limit the process due to the legal process of allowing states to share information with each other. To include federal, state, and local agencies, the law may prohibit the transferring of information because it may be classified information. (3) The legality aspect of collecting information then to process the information for intelligence. Response and Action: To have laws in effect to provide the necessary legal paperwork for warrants. (4) To notify the appropriate authorities for the proper response to the threat. Response and Action: The immediate approval to inform and share information with other agencies for the appropriate responses.

The manner in which validity issues could possibly impact my research is by (1) The PATRIOT Act should not be an issue because this is a law passed by congress. (2) Agencies being limited due to the legal procedures and or restraints of the US courts. Also, because of the classification of information being declassed may cause it to be delayed or denied to other agencies (3) the collection of information may also be delayed by how the information is ranked from low, medium, and to high importance. (4) Negligence may play a vital role when notifying the proper authorities within a timely matter.

Questions:

1. In your opinion, how prepared is your organization for homeland security in your region.

2. How, aware are you personally of homeland security threats facing your region.

3. How, aware is your organization of homeland security threats facing you region.

4. How prepared is your organization to prevent a homeland security attack in your region.

5. How prepared is you organization to respond to a homeland security emergency in you region.

6. How prepared is you organization to recover from an attack in your region.
What is the purpose and function of information sharing?

7.What would be measure timeliness, accuracy, or relevance for information sharing?

8. What does it mean to collect and share intelligence information within the United States to you?

9. Is it against the constitution to invade your privacy?

Reference no: EM13226365

Questions Cloud

Construct a net material requirements plan : In addition to 90 units of S, there is also demand for 30 units of U, which is a component of S. The 30 units of U are needed for maintenance purposes. These units are needed in week 6. Modify the gross material requirement plan to reflect this ch..
Organization of homeland security threats facing you region : How, aware are you personally of homeland security threats facing your region and how prepared is you organization to recover from an attack in your region.
Onsider an organization that you have worked : onsider an organization that you have worked for or that you are well acquainted with. Provide short overview. at least 5 -6 lines?
What overshoot for a step input to be expected : A control system for positioning the head of a floppy disk drive has the closed-loop transfer function T(s)=11.1(s+18) / (s+20)(s^2+4s+10). Plot the poles and zeros of this system and discuss the dominance of the complex poles.
Organization of homeland security threats facing you region : How, aware are you personally of homeland security threats facing your region and how prepared is you organization to recover from an attack in your region.
Construct a net material requirements plan : In addition to 90 units of S, there is also demand for 30 units of U, which is a component of S. The 30 units of U are needed for maintenance purposes. These units are needed in week 6. Modify the gross material requirement plan to reflect this ch..
Calculate the line admittance per unit length : A line has an inductance of1.25mH/km with an impedance angle of 70 degree , and a capacitance to neutral of 0.01mF/km. Calculate its reactance and series impedance per unit length at 50Hz. Calculate the line admittance per unit length
Is collection credit correct : Eton is subject to personal liability for Destiny's debts because Elton is subject to personal liability for Destiny's debts because Elton has the right, as a limited partner to take control of the firm. Is Collection Credit correct?
Evaluate steve ballmers leadership : Should companies like Microsoft develop special strategies to keep their share price high, or should they simply let the market worry about itself while they focus on things like revenue and profitability?

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Ken, a research chemist

Ken, a research chemist, has been promised a fellowship from a foundation, with a stipend of $50,000 to do research on a synthetic fuel oil. Under the terms of the fellowship, Ken is free to do what he wishes with the money, and use the money as he s..

  Explain business ethics and law

Explain Business Ethics and Law and List any information you would like to have but don't an what assumptions you would have made if any in resolving the dilemma

  Will george claim andy as a dependent

Evaluate the loss, and evaluate whether it is a deduction for or a deduction from AGI and Will George claim Andy as a dependent?

  Explain metaphor for business law

Explain Metaphor for Business Law and Create a simile or metaphor to that would help someone unfamiliar with business law understand the basic message behind the course

  Explain the protection of intellectual property in a busines

Explain The protection of intellectual property in a business setting and What types of intellectual property do you see in your professional lives

  In today''s consumer-oriented society

In today's consumer-oriented society, many people in the United States have borrowed heavily to buy cars, houses, furniture, clothes, vacation trips, and more. Other people are deep in debt through unfortunate circumstances, such as loss of job an..

  Explain non-judicial means to resolve disputes

Explain Non-judicial means to resolve disputes and Identify and define the non-judicial means to resolve disputes

  Explain limited liability company and corporation

Explain Limited Liability Company and Corporation and outlines the similarities and differences between a Limited Liability Company and a corporation

  Prepare the lease agreement

Prepare the lease agreement

  Internet to research criminal proceedings in one

Use the Internet to research criminal proceedings in one (1) of the six (6) model countries from the textbook. Imagine you are traveling abroad in your chosen country when you witness a local national committing a violent assault.

  Explain improving existing law

Explain Improving Existing Law and Describe three changes you propose to existing law which you believe will benefit the conduct of business in the United States

  Explain bankruptcy and student loans and sole proprietorship

Explain Bankruptcy and student loans and sole proprietorships and Based upon a discussion of your understanding of insurance law principles

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd