HM502
Unit 1 Assignment
For this assignment, you will create a 15-20 slide Microsoft® PowerPoint® presentation to analyze the three routinely used risk assessment methods below:
1. Exercises, scenarios, and game theory — Terrorism Risk Assessment and Management (TRAM)
2. Event-tree model — Biological Threat Risk Assessment (BTRA)
3. Community Preparedness - Thread and Hazards Identification and Risk Assessment (THIRA)
The analysis should determine threat, vulnerability, and consequence assessment validity and reliability. It should also identify at least three strengths and three weaknesses for each methodology. The criteria for assessing the methodologies is in the Review of the Department of Homeland Security’s Approach to Risk Analysis.
Note: This assignment will require outside research. Use at least two credible sources in addition to the assigned textbook/reading material and discuss how you evaluated the credibility of the resources used.
You may consult the Library, the internet, the textbook, other course material, and any other outside resources in supporting your task, using proper citations in APA style.
PowerPoint Formatting
The PowerPoint presentation should have the following characteristics.
· Contains a title and references slide.
· Bullets for your main points.
· Designed with a live audience in mind in order to inform your viewers about the topic.
· Must include speaker notes below the slides to fully explain what is being discussed in the slide bullet points as though you are presenting to an audience.
· Research from at least two reliable outside sources in addition to the assigned textbook/reading to support the main message.
· Incorporate information from course readings, the course materials, and other library sources to support your discussion. Properly cite all sources of information by including in-text citations and a list of references.
· Research and visuals are cited in APA citation format, both in-text and on a References slide. You need to quote material taken directly from a source.
· Avoid using images, graphics, or logos that are copyrighted.
· The same standards for documenting sources that apply to an essay, apply to a presentation. Refer to the APA Style® Central website for a digital library of APA Style quick guides and tutorials to refine your writing. You can access this site under Academic Tools.
Speaker Notes
To learn more about creating speaker notes in PowerPoint, review the website below.
GCF Learn Free (1998-2020). PowerPoint 2010-Slide Basics: Goodwill Community Foundation, Inc. Retrieved from https://www.gcflearnfree.org/powerpoint2010/slide-basics/6/
Directions for Submitting Your Assignment
Compose your presentation in Microsoft PowerPoint and save it with a name you will remember. Be sure to include your name, class, and section number. Submit your assignment by selecting the Unit 1: Assignment Dropbox by the end of Unit 1.
Download Unit 1 Assignment Checklist
RUBRIC ( Please follow)
1. ...
HM502Unit 1 Assignment For this assignment, you will create
1. HM502
Unit 1 Assignment
For this assignment, you will create a 15-20 slide Microsoft®
PowerPoint® presentation to analyze the three routinely used
risk assessment methods below:
1. Exercises, scenarios, and game theory — Terrorism Risk
Assessment and Management (TRAM)
2. Event-tree model — Biological Threat Risk Assessment
(BTRA)
3. Community Preparedness - Thread and Hazards Identification
and Risk Assessment (THIRA)
The analysis should determine threat, vulnerability, and
consequence assessment validity and reliability. It should also
identify at least three strengths and three weaknesses for each
methodology. The criteria for assessing the methodologies is in
the Review of the Department of Homeland Security’s Approach
to Risk Analysis.
Note: This assignment will require outside research. Use at least
two credible sources in addition to the assigned
textbook/reading material and discuss how you evaluated the
credibility of the resources used.
You may consult the Library, the internet, the textbook, other
course material, and any other outside resources in supporting
your task, using proper citations in APA style.
PowerPoint Formatting
The PowerPoint presentation should have the following
characteristics.
· Contains a title and references slide.
· Bullets for your main points.
· Designed with a live audience in mind in order to inform your
viewers about the topic.
· Must include speaker notes below the slides to fully explain
what is being discussed in the slide bullet points as though you
2. are presenting to an audience.
· Research from at least two reliable outside sources in addition
to the assigned textbook/reading to support the main message.
· Incorporate information from course readings, the course
materials, and other library sources to support your discussion.
Properly cite all sources of information by including in-text
citations and a list of references.
· Research and visuals are cited in APA citation format, both in-
text and on a References slide. You need to quote material taken
directly from a source.
· Avoid using images, graphics, or logos that are copyrighted.
· The same standards for documenting sources that apply to an
essay, apply to a presentation. Refer to the APA Style® Central
website for a digital library of APA Style quick guides and
tutorials to refine your writing. You can access this site under
Academic Tools.
Speaker Notes
To learn more about creating speaker notes in PowerPoint,
review the website below.
GCF Learn Free (1998-2020). PowerPoint 2010-Slide Basics:
Goodwill Community Foundation, Inc. Retrieved from
https://www.gcflearnfree.org/powerpoint2010/slide-basics/6/
Directions for Submitting Your Assignment
Compose your presentation in Microsoft PowerPoint and save it
with a name you will remember. Be sure to include your name,
class, and section number. Submit your assignment by selecting
the Unit 1: Assignment Dropbox by the end of Unit 1.
Download Unit 1 Assignment Checklist
RUBRIC ( Please follow)
1. All of the following is true for each of the three risk
assessment methodologies:
● Accurately identifies the primary characteristics of the risk
assessment methodology
● Accurately identifies at least three strengths of the risk
assessment methodology
3. ● Accurately identifies at least three weaknesses of the risk
assessment methodology.
2. All of the following is true for each of the three risk
assessment methodologies:
● Analyzes the threat assessment for the risk assessment
methodology
● Analyzes the vulnerability assessment for the risk assessment
methodology
● Analyzes the reliability and validity of the risk assessment
methodology
3. Both of the following are true:
● Includes two credible sources beyond the textbook/assigned
reading.
● Discusses the credibility of the outside sources.
4. All of the following are true:
● Uses appropriate PowerPoint format as per assignment
instructions.
● Content of the presentation concisely stays focused on the
topic.
● Provides 15-20 slides of content, excluding title slide and
reference slide.
5. The assignment meets all of the following:
● Clearly written in Standard English.
● Free of spelling, grammar, or punctuation errors.
● References or academic sources as required including in-text
citation(s).
● The document is properly formatted in APA style, per the
assignment instructions.
HM502
Unit 1 DQ (Only has a Topic 2, NO TOPIC #1)
Part 1
Topic 2: Risk Assessment Methods (Respond)
The Department of Homeland Security (DHS) has enormous
responsibilities. The missions of DHS are:
4. 1. Preventing terrorism and enhancing security
2. Securing and managing borders
3. Enforcing and administering immigration laws
4. Safeguarding and securing cyberspace
5. Ensuring resilience to disasters
As a result of this broad, expansive, and complex set of
missions, the DHS must assess risks from a range of threats to
homeland security. Also, in some cases, the DHS shares
responsibility with other entities, states, cities, or tribes, for
assessing risks and creating plans to prepare for, respond to,
and recover from man-made or natural disasters, threats, or
hazards. These diverse and multi-faceted risk assessments are
used in the process of risk management by decision makers to
mitigate these challenges.
Unfortunately, there is not just one risk assessment
methodology that is or can be employed by all the agenci es
within the DHS. Consequently, there are several methodologies
currently in use throughout the DHS to varying degrees of
effectiveness. Two measures of the effectiveness of these
methodologies are their validity and reliability (National
Research Council (NRC), 2010). Essentially, do these
methodologies assess what you want to assess accurately (valid)
and do these methodologies consistently/precisely measure what
the assessment intends them to measure (reliable)?
After reading about each of the different risk assessment
methodologies, what are the strengths and weaknesses of each
methodology?
What are some of the application and implementation challenges
that each method currently faces?
As you discuss the various attributes of each risk assessment
method, consider the validity and reliability of each method as
they relate to the threat, vulnerability, and consequence
assessment capabilities of the method.
Reference:
National Research Council. (2010). Review of the Department
of Homeland Security's approach to risk analysis. National
5. Academies Press. Retrieved from
http://www.nap.edu/catalog.php?record_id=12972
Part 2
Topic 2: Student Response #1 (Respond to Skyler)
Skyler Fry
Terrorism Risk Assessment and Management (TRAM)
TRAM is a computer program that was developed by FEMA to
compare risk against assets within specific geographical
boundaries (Stromgren & Ryan, 2008). TRAM identifies and
prioritizes upgrades in security, protection, response and
recovery in order to minimize the risks associated with a
potential threat (Stromgren & Ryan, 2008). A major benefit of
TRAM is its availability to various jurisdictions and across the
many levels of government. TRAM is focused on future threat
analysis and risk associated with facilities rather than
populations, therefore, the program is limited as to the extent of
effectiveness in regards to population threats (Stromgren &
Ryan, 2008).
Biological Threat Risk Assessment (BTRA)
BTRA is a strategic event tree based program that requires
subject matter expert level of understanding to be utilized
effectively (National Research Council, 2010). The model used
is 17 steps and very information based with "Frequency of
initiation by terrorist group, Target selection, Bioagent
selection, Mode of dissemination (also determines wet or dry
dispersal form), Mode of agent acquisition, Interdiction during
acquisition, Location of production and processing, Mode of
agent production, Preprocessing and concentration, Drying and
processing, Additives, Interdiction during production and
processing, Mode of transport and storage, Interdiction during
transport and storage, Interdiction during attack, Potential for
multiple attacks, and Event detection" all needing to be
6. identified in order to formulate the risk associated with a
specific potential event (National Research Council, 2010). The
BTRA is best utilized at the upper echelons of government with
highest probabilities being shared with potential target areas.
BTRA is not as useful for local governments as a biological
threat is much less likely when compared to other threats and
would distract resources that could be used
more efficiently elsewhere.
Threat and Hazards Identification and Risk Assessment
(THIRA)
The THIRA model is the best and most applicable across the
board as it doesn't deal with non realistic or low probability
threats and hazards but instead focuses on those that are more
likely to happen that would challenge the capabilities of a
specific jurisdiction. Based on model outcomes, a specific
location all the way up to the national level can identify what
capabilities will be needed in order to combat or mitigate
against possible outcomes (National Research Council, 2010).
THIRA is made up of four main components; risks and
associated impacts, capability targets, current capabilities, and
gaps (FEMA, 2019). The risks and associated impacts
component identifies and assesses threats and hazards(FEMA,
2019). The capability targets component utilizes likely impacts
to create capability goals in order to combat the potential threat
or hazard(FEMA, 2019). The current capabilities component
measures the current capabilities compared to needed
capabilities based on possible threats and hazards(FEMA,
2019). The gaps component identifies current gaps that would
hinder an effective response and assists in development of
strategies to close the gaps(FEMA, 2019).
National Research Council. (2010) Review of the Department of
Homeland Security's Approach to Risk Analysis. Washington,
DC: The National Academies
Press. https://doi.org/10.17226/12972.
FEMA. (2019). 2019 National Threat and Hazard Identification
and Risk Assessment (THIRA). Federal Emergency Management
7. Agency. https://www.fema.gov/sites/default/files/2020-
06/fema_national-thira-overview-methodology_2019_0.pdf.
Stromgren, C., & Ryan, K. (2008). Introduction to the Terrorism
Risk Assessment and Management (TRAM) Methodology.
Calhoun. https://calhoun.nps.edu/bitstream/handle/10945/51764/
Stromgren_Ryan_Introduction_to_the_Terrorism_Risk_CIP_Met
rics_Tools_2008.pdf?sequence=1&isAllowed=y.
Topic 2: Student Response #2 (Respond to Sunday)
Sunday Akinwunmi
Though risk management does not prevent events from
occurring, it does assist the department in focusing on the
occurrences of the more destructive events and assisting in the
avoidance or mitigation efforts. Risk management produces
analysis, which creates a better platform for decision making.
The potential perils are identified in terms of their likelihood to
occur to assist decision-makers in selecting, implementing, and
evaluating risk management alternatives. Different assessment
methods, such as TRAM, BTRA, and THIRA, are used to assess
and analyse threats, whether they are man-made or naturally
occurring (Ezell, et al., 2017). Scholars have criticized these
tools because terrorists can adapt to the preventive measures
developed, and the terrorist may be focused on maximizing a
specific consequence rather than all.
TRAM is a model that focuses on determining the threat,
capability, and intent of a terrorist attack. TRAM evaluates
critical scenarios. The framework of the model uses ratings
from various SMs to project the vulnerability and the
consequences of a potential threat. As a result, TRAM focuses
on identifying the critical infrastructure to be protected, as well
as the infrastructure's vulnerability and the consequences of the
risk if it occurs. However, the model is untrustworthy due to its
complicity, making effective employability and evaluation
difficult.
TRAM has a number of flaws, including the fact that the
analysis process is extremely complex, and that comparing the
8. minimum experience of the SMs on training makes determining
the exact target value difficult. Second, the process of
developing the criticality of risk assessment factors lacks
transparency, which can lead to misleading criticality
assessments. Finally, there is the uncertainty of estimating the
factors used to calculate venerability. As a result, it is
conclusive that TRAM reliability is not certain because its
complicity makes it extremely difficult to use effectively while
evaluating the model.
The model has advantages, such as the outputs being useful in
conceptualizing the risk space. Second, it discusses risk
mitigation options and how they affect the various ranks,
thereby improving cost-benefit analyses. The model also lowers
the risk of purchasing because it has the ability to improve
security systems in the various organizations that use it.
Using BTRA involves employing the logic tree, also known as
an event tree model. This assessment tool divides a complex
assessment into smaller and simpler segments that can be
addressed fully and effectively. There are two methods in the
tool: probability, event, and decision trees, as well as fault,
attack, and successful trees. Branches and nodes make up
probability, event, and decision trees.
The limitation of BTRA as a terrorism risk assessment tool,
according to Ezell et al. (2010), is the level of uncertainty,
incompleteness, and the fact that it is not static. The
incompleteness and uncertainty of the data collected make it
difficult to develop exact probabilities. For example, a terrorist
may plan to produce virus A in order to cause the greatest
number of casualties possible because the same virus is optimal
for virus B. However, because biological systems are complex,
such an attack may fail. Terrorists, being intelligent, examine
the US defensive mechanism and adapt to it while developing
new attack tactics. Understanding terrorist motivations, intent,
and capabilities is the most important strategy for preventing
attacks. As a result of the aforementioned flaws, the model is
only a snapshot of a specific time period.
9. References
James F. Broder, & Gene Tucker. (2012). Risk Analysis and the
Security Survey: Vol. 4th ed. Butterworth-Heinemann.
Ezell, B., Bennett, S. P., Winterfeldt, D. V., Sokolowski, J., &
Collins, A. J. (2017). Probabilistic Risk Analysis and Terrorism
Risk. Improving Homeland Security Decisions, 5-31.
doi:10.1017/9781316676714.002
CJ513
Unit 1 Assignment
Analysis and Application: Essay
After completing the assigned readings and Learning Activity,
write a 3- to 4-page paper that addresses the following:
· Identify the role of three major religions in the development of
social and political attitudes on terrorism and discuss at least
three different religious sects associated with each. Include a
discussion of the unique doctrines or worldviews on terrorism
associated with each sect.
· How does religion specifically impact the social and political
attitudes of the members of each of these sects?
· How does religion appear to shape the development of the
social and political attitudes on terrorism?
For each of your responses, provide examples along with
documentation and research that support your assertions and
analysis. Provide support for each of your assertions and
include specific examples.
Please double space your writing. Remember to follow APA
guidelines in your writing. Save your work in a Word document.
Submit it in the Dropbox.
Use at least two credible sources in addition the assigned
reading and discuss how you evaluated the credibility of each
source. You may consult the Library, the internet, the textbook,
10. other course material, and any other outside resources in
supporting your task, using proper citations and references in
APA style.
Download the Unit 1 Assignment Checklist.
Directions for Submitting Your Assignment
Compose your essay in Microsoft® Word® and save it with a
name you will remember. Be sure to include your name, class,
and unit number in your essay. Submit your Assignment by
selecting the Unit 1: Assignment Dropbox by the end of Unit 1.
1. All of the following are true:
● Identifies the role of three major religions in the development
of social and political attitudes on terrorism
● Discusses at least three different religious sects associated
with each religion selected.
● Includes a discussion of the unique doctrines or worldviews
on terrorism associated with each sect.
● Addresses how religion specifically impacts the social and
political attitudes of the members of each of these sects
● Explains how each religion appears to shape the development
of the social and political attitudes on terrorism
● Provides examples along with documentation and research
that support assertions and analysis.
● Provides support for each of assertions and includes specific
examples.
2. All of the following are true:
● Includes two credible sources beyond the textbook.
● Discusses the credibility of the outside sources.
3. All of the following are true:
● Uses appropriate format as per assignment instructions.
● Content of the paper concisely stays focused on the topic.
● Overall length meets the assignment parameters of 3-4 pages,
excluding cover page and reference page.
11. 4. The assignment meets all of the following:
● Clearly written in Standard English.
● Free of spelling, grammar, or punctuation errors.
● References or academic sources as required including in-text
citation(s).
● The document is properly formatted in APA style, per the
assignment instructions.
CJ513
Unit 1 DQ
Discussion topics support this unit’s objectives and should be
completed after reading all materials (No Less than 100 words).
Your responses should include original evaluation, synthesis, or
analysis of the topic and contribute to the weekly Discussion in
a meaningful way. Refer to the Discussion Board Rubric in
Course Documents for additional requirements.
Part 1
Topic #1: The Role of Religion (Respond)
Discuss the role of religion in the development of social and
political attitudes on terrorism. Identify three examples of
terrorist incidents motivated by religious beliefs. Discuss the
ideology used to justify each of these incidents. Where do each
of these attitudes fall on the classical ideological continuum?
Be sure to include APA citations and references for any sources
used to inform or support your posts.
Part 2
Topic #1 Student Response #1(Respond to Damon)
Damon Bradshaw
Religion is a significant factor in influencing different attitudes
leading to terrorism. Extremist ideologies that are religious in
the description are the leading cause of acts of terrorism.
Different religions have been caught up with acts of terrorism
that are majorly due to radicalization (Rodger et al., 2007).
Terrorists influenced by religious views feel they have a role to
play in society by accomplishing their act, where their religion
12. allegedly justifies. Religion has different influences socially
and politically, and these are critical elements in society—
wrong perceptions and manipulations advocate for the same
influences to be channeled into terrorism.
On September 21, 2013, a terrorist attack was reported in a mall
Nairobi, Kenya, with Al-Shabaab, a Somalia-based extremist
group taking responsibility. The act was a retaliation to the
Kenyan military forces’ presence in Somalia, and they believe it
is their duty in the Holy war. There are conflicting reports on
the death toll, but the attack resulted in hostages, mass
shootings, and damages, with 71 reported deaths (Blanchard,
2013). The attack strategically targeted an entity that would
strike a blow and not involve fellow Muslims but rather more of
foreigners and other religious groups.
Al-Shabaab is a group influenced by religion's role in the
development of social and political attitudes towards terrorism.
The extremist group follows a social way of life guided by
Sharia laws, not the nation's constitution. Politically the group
feels they are obligated to liberate the nation to a Sharia rule
state, resulting in conflicts with the national government, with a
spillover to neighboring countries like Kenya that sent its
troops to Somalia to bring peace and extend security to its
borders, something the militia term as an invasion from infidels
or the non-believers and unclean (Anderson & McKnight, 2015).
Their actions in this particular day were based on religious
extremism.
September 11, 2001, popularly known as 9/11, was a terror
event influenced by religious affiliation on a specific group.
The terror event was a series of attacks on American soil by an
extremist group known Al Qaeda. The group planned attacks by
19 of their militants. They hijacked four airplanes and embarked
on a suicide mission. The first two airplanes were directed at
the World Trade Center at the Twin Towers in New York.
Another plane crashed into the Pentagon, and the last one
crashed in a field in Pennsylvania (Gus, 2010). The attacks led
to a death toll estimated at 3000. The group took responsibility
13. through their leader Osama Bin Laden, advocating for the
invasion of western powers to the Middle East.
The 9/11 attack was an example of a classical ideological
continuum involving terrorism and extremism as the root
source. The two aspects are clearly influenced by religious
affiliation playing out in the social and political structures i n
the Middle East. The Al Qaeda extremist group advocate for the
Jihadi war, which refers to a Holy war in other terms. The
involvement of United States troops in the Middle East brought
about the campaign against non-Muslim believers meddling
with the political state. The extremist group beliefs they are at
war with any allies to Jewish, Christianity affiliations (Gus,
2010). It brings about the ideology that anyone not of Muslim
belief is against them, and actions against them will bring a
particular reward in the afterlife. These beliefs and actions
influenced the rise of different extremist groups under the Al
Qaeda Islamic extremist group.
On July 22, 2011, Norway experienced terrorist attacks in Oslo
and the island of Utoya. The bombing attack was strategically
placed near governmental offices. The police responded to the
terrorist attack. It was realized the terrorist used the bombing as
a decoy while another attack took place at the island of Utoya
where some youths were camping (Meyer, 2013). The terrorist
opened fire on the campers with nowhere to escape on the
island. The gunman massacred 68 people on the island, and a
total count was 80 people in addition to the bombing.
The gunman was a member of Neo-Nazi and Anti-Islamic
groups, according to police investigations. The perpetrator
published a manifesto listing the reasons and the changes he
demanded. The root cause influence by the hatred towards the
Muslim religion and any Jewish affiliation. This motive
radicalized and influenced his actions. It was a clear classical
continuum of terrorism. The gunman raised an issue with the
Norwegian government allowing cultural mix, significantly
increasing Muslims within the nation. The gunman identified
himself as a martyr. His hate towards Muslims and Jews
14. influenced a fascist ideology that led him into a Neo-Nazi
affiliation mission.
References
Anderson, D., & McKnight, J. (2015). Understanding al-
Shabaab: clan, Islam and insurgency in Kenya. Journal Of
Eastern African Studies, 9(3), 536-
557. https://doi.org/10.1080/17531055.2015.1082254
Blanchard, L. (2013). The September 2013 Terrorist Attack in
Kenya: In Brief. Fas.org. Retrieved 5 August 2021,
from https://fas.org/sgp/crs/row/R43245.pdf.
Gus, M. (2010). Terrorism and homeland security. California,
Cal: Sage Publications.
Meyer, S. (2013). Impeding lone-wolf attacks: lessons derived
from the 2011 Norway attacks. Crime Science, 2(1), 1-
13. https://doi.org/10.1186/2193-7680-2-7
Rogers, M., Loewenthal, K., Lewis, C., Amlôt, R., Cinnirella,
M., & Ansari, H. (2007). The role of religious fundamentalism
in terrorist violence: A social psychological
analysis. International Review of Psychiatry, 19(3), 253-
262. https://doi.org/10.1080/09540260701349399
Topic #1 Student Response #2 (Respond to Travis)
Travis Reed
Hello Y’all
Religion is often a big contributor towards the development of
various political and social attitudes towards terrorism. Religion
influences social and political injustices which lead to
terrorism (Borum, & Neer, 2017). As people try to adhere to
accepted religious ideology or rather what they perceive as
political or social right, and then another religious ideology
strips them of their rights, an attitude of violence may
arise (Borum, & Neer, 2017). This comes in because of the
belief that the use or threat of violence will be effective in
ushering in change. Many terrorists have confessed that they
chose violence after a long consideration because they felt that
15. they had no choice.
Christmas day bombings at Madall, Gadaka, and Jos churches in
Northern Nigeria by the Boko Haram is an example of a
terrorist attack motivated by Islamic religious beliefs. The
ideology behind these killings by Boko Haram group was that it
was on mission to kill those against the Islamic associated
group. This incidence was a clear manifestation of right–wing
extremism because the Boko Haram felt like their glory to the
Muslim belief had been lost to Christianity (Crossen, 2019). In
another incidence in Garissa University College in Kenya, 148
people were killed by gunmen from Al-Shabaab group. The
group held hostage more than 700 people but released the
Muslims and killed those who identified as Christians. The
mission was carried out to kill those against Shabaab, for
reasons of removing Kenyan troops deployed in Somalia, and to
claim the Muslim land which had been ‘colonized’ by non-
Muslims. These shootings were an expression of both right-
wing extremism and left-wing extremism because killings were
done due to an oppressive system and religious inferiority. In
2017, a suicide bomber of Islamist extremist origin attacked
Manchester Arena in UK, killing 22 people and injuring 1017
others. The attacker claimed he was motivated by injustices to
Muslim children which makes it a case of right-wing extremism.
v/r
Reed
References
Borum, R., & Neer, T. (2017). Terrorism and violent extremism.
In Handbook of behavioral criminology (pp. 729-745).
Springer, Cham.
Crossen, C. E. (2019). The Nature of the Beast: Transformations
of the Werewolf from the 1970s to the Twenty-first Century.
University of Wales Press.