Combating Domestic Terrorism: A Problem-Solution Analysis Abstract The biggest problem faced today in United States Homeland Security is combating both domestic terrorism and lone wolf terrorism. This report will focus on the problems faced today by United States Homeland Security and the Federal Bureau of Investigation (FBI) in combating domestic terrorism, while providing solutions on […]
In 2001 security agencies in the United States proposed using prediction markets to assess the likelihood of a terrorist attack. That government program was cancelled in 2003 due to criticism from US Congress. Put forward a case for or against the use of markets to predict the likelihood of this type of event. Prediction markets […]
The concept of security is not a new one; scholars have catalogued its emergence from as far back as the Neolithic Revolution where the establishment of permanent settlements naturally led to the growth of territories, city states and later nation states and Empires[1]. Borne from this civil development was the concept of security; security of […]
“‘Brexit’ and the ‘migration crisis’ are just the most recent examples of migrants being presented as a threat.’” Discuss with reference to securitisation literature. In recent years, there has been a seemingly exponential increase in the British public’s hostility towards migration. For the most part, migrants are no longer viewed in a positive light by […]
Female Agency & Motivations Before venturing into gendered approaches to countering terrorism, it is useful to provide a brief summary of female motivation and mobilization. Despite the stereotypes and passivity often associated with women, studies suggest they are driven to engage in terrorism for many of the same reasons as men: political motives, sociopolitical […]
Traditional State Power limitation in dealing with Transnational Terrors Networks: and the role of Social Media Governments have been phased with challenging situations when implementing effective counterinsurgency measures against rebel groups that override national boundaries; even despite superior power. For example, the Afghan government and U.S./NATO coalitions forces and their inability to defeat Taliban and […]
At which stage of the ”intelligence cycle” is failure most likely to occur, and why? The most common, traditional paradigm for managing intelligence ‘flow’ is a cycle of four components: direction, collection, processing, and dissemination. Direction comes from policymakers: heads of government agencies, heads of state, senior government officials tasked with overseeing intelligence, and the […]
On the Limitations of Access Control Lists (ACL’s) in Network Security In basic security parlance, the Access Control List (ACL) directly determines which parties can access certain sensitive areas of the network. Usually, there are several. One enables general access to the network, which includes non-sensitive information about company policy and operations (Verma 2004). Access […]
Surveillance technology: The ethical and moral dilemma Introduction The global increase in terrorist atrocities, such as 9/11 in the United States and 7/7 in the United Kingdom, have undoubtedly led to the increase necessity for surveillance technology in order to protect society and it’s citizens. The question is how far have these developments reduced the “claim […]
Security Management Introduction Although historically security has experienced a relatively low priority in the corporation’s management structure, post the incidents of 9/11 in the US and 7/7 in the UK this situation has changed dramatically. Therefore, the position and skills of security managers is being looked at in a new light. Within this study, the […]