This summary provides an overview of the document, which appears to be an annotated bibliography written by Jerica Knox for an English class. The bibliography includes summaries of five sources that Knox will use for a research paper on airport security. The sources evaluate whether security measures are effective at preventing terrorist threats on planes and in airports. One source criticizes the Department of Homeland Security for failing to adequately protect infrastructure. Another argues new legislation has not improved security and expresses doubt about the ability to fully secure borders. A film segment discusses how explosives can evade x-ray detection. The bibliography demonstrates Knox has selected sources from diverse formats to incorporate differing viewpoints in her evaluation of airport security.
Volume 7, Issue 1 (2014) of the Journal of Physical Security, a peer-reviewed journal devoted to research, development, modeling, testing, experimentation, and analysis of physical security. Includes both technical and social science approaches.
This issue has 7 papers on the following topics: testing locks; seals and nuclear safeguards; a security thought experiment; vulnerability assessment issues; the levels of critical infrastructure risk; and community partnerships for counteracting radicalization.
For more information about JPS, to download individual papers from this or earlier issues, or to get on the email notification list, see http://jps.anl.gov
In this research paper, I attempt to construct a consistent, malleable conceptualization of the contemporary drone. I draw on a wide variety of academic papers, articles, opinion pieces, and sources - The Intercept, Donna Harraway in the Feminist Studies journal, Pew Research Center etc.
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
Article Critique
This assignment provides you with an opportunity to read an article and then to share your thoughts about the article by critiquing the details, including the decisions made.In order to access the resource below, you must first log into the myCSU Student Portal and access the AcademicOneFile database within the CSU Online Library.This article includes details and assertions about the ethical choices/decisions made by Edward J. Snowden, a formerNational Security Agency (NSA) contractor. Here is the reference citation for the article:Securing our liberty. (2013). Commonweal, 140(12), 5.After reading the article, draft a two-page response by discussing the U.S. government’s decision to acquire phone andinternet data without disclosing its intentions to citizens. For this assignment, consider the NSA as an organization (i.e.,business) and Snowden as a manager. How have the decisions of this event impacted the fairness of the U.S.government, its citizens, and Snowden? How did ethics, perhaps, influence Snowden’s decision to leak information? Inthis event, what is the greater good and also the consequences/sacrifices of that greater good? Based on the details ofthis event, what can we learn about making important decisions as a leader and manager?This event was covered by several news and media organizations, so there should be plenty of articles in the library.Conduct a bit more research in the online library related to this event involving Edward Snowden and the U.S.government—see what else you can discover about the event to determine an appropriate punishment, if any, forSnowden’s conduct. Include at least one additional source from the library in your response.The purpose of this assignment is for you to think critically about managers (and other leaders) making importantdecisions, and the process managers use to make important decisions. Consider how important it is to collect all of thefacts before making an important decision, such as those involving fairness and ethics.Use APA Style to format your response. Proofread your work, and submit it in Blackboard for grading.Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Below is the article.
Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge.
Respond to my Classmate’s Post. Your responses should be substantivemickietanger
Respond to my Classmate’s Post. Your responses should be substantive in nature, meaning you should present discourse by asking questions of your peers (how did they arrive at their conclusion or what was the premise of their argument). You can challenge one another and present an alternative analysis. All of this should be supported by the research of scholarly, peer-reviewed articles, and authoritative reporting (government).
CLASSMATE’S POST
In an attempt to answer the question about 9/11, it's difficult to reflect on a day when so many people lost their lives in the worst terrorist attack on American soil in history. It's difficult to opine whether it could have been prevented or not. One issue I do believe is that, if President Bush had not made the decision to ground all the planes, there is the distinct possibility that more lives could have been lost. I think it's easy to look at these types of situations in hindsight. As Fred Borch (2003) notes in his article in the Journal of Military History, "There can be no discussion of whether that attacks...resulted from an 'intelligence failure' without defining the phrase. Does it mean these events were intelligence failures because information had been collected (or was available) that, if properly analyzed and disseminated to those in authority, would have provided tactical warning of the attack?" Yes, there were previous attacks on American warships and the World Trade Center, but intelligence officials have concluded that, although there was always a persistent threat of an attack, there was no credible or "imminent" threat that an attack would occur on September 11, 2001.
There are multiple instances of a failure to communicate. Certain leads that possibly weren't investigated thoroughly and there was a two-year long investigation into the attacks by the "9/11 commission." Errors in human judgment in determination of whether every lead is credible or not can play a factor but those judgment errors alone could not prevented the overall coordinated attack that occurred on 9/11. "The investigation turned up no single damning piece of evidence that would have led agents directly to the impending attacks" (Isikoff, Klaidman, & Reno, 2003). There is simply not enough time or manpower to investigate every threat made against the U.S. Government or America itself. Federal agents, in their knowledge and expertise, must use their own judgment to determine whether to follow up on credible leads whether it be an attack on private citizens or property, a plot to kill the President, bombing of a federal building, or other such terroristic events. Again, while it is easy to examine an issue in hindsight, it is the opinion of this writer that this coordinated terrorist attack took too long to plan and was so precise and detailed that there was no way to prevent it.
REFERENCES
...
RUNNING HEADER: TERRORISM 1
Terrorism in America
Position Paper 1
CJUS 380
Kenton Shatzer
Liberty University
Introduction
“Have you forgotten how it felt that day? To see your homeland under fire and her people blown away. Have you forgotten when those towers fell? We had neighbors still inside going thru a living hell and you say we shouldn’t worry ‘bout bin Laden. Have you forgotten?” (Worley. 2003). Have forgotten what happened on 9/11 and do you ever wonder what the United States could have done to ensure that the terrorist attack did not happen on that faithful day? 9/11 was not the first terrorist attack on the United States and it was not the last. On April 14, 1972, in New York City, “ten members of a local mosque phoned in a false alarm and then ambushed responding officer, killing one” (TheReligionofPeace.com. 2015). In Moore, OK on September 25, 2014, “A Sharia advocate beheaded a woman after calling for Islamic terror and posting an Islamist beheading photo” (TheReligionofPeace.com. 2015.).
So what is terrorism? “There are more than 100 definitions of terrorism in the literature. The United Nations defines terrorism as “an anxiety-inspiring method of repeated violent action, employed by clandestine individual, group or state actors, for idiosyncratic, criminal or political reason, whereby- in contrast to assassinations- the direct targets of violence are not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg. 490). The problem with terrorism is that terrorists want to attack when their target is not ready, but also when there is a large crowd that will be watching and knowing that the attack will kill and injury many innocent people. So how can terrorist attacks be stopped or be limited? Can countries stop terrorist from attacking their countries? The learner of this paper firmly believes that countries can limit and stop terrorist attacks.
Literature Review
Like stated above, terrorism has been around since the first attack in 1972 and has continued to present day when the last terrorist attack was in September 2014. “The largest act of international terrorism occurred on September 11, 2001 in a set of co-ordinated attacks on the United States of America, where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC” (Terrorism Research). Since 9/11, the United States has cracked down and created new laws to help protect the American citizens. The learner firmly believes that the laws have enhanced the security and protection of the United States and the citizens.
The United States government created a new policy after 9/11 known as the “Homeland Security,” and in this new policy is an act called the USA PARTRIOT Act. The Bush Administration passed this acted and also updated elect.
Case Analysis: Calling 911 Essay examples
9/11 Evidence Analysis
9/11 Thesis
The Change in Airport Security from 9/11 Essay
911 Case Study
Fahrenheit 9/11 Essay
911 Attacks Research Paper
911 Operator Research Paper
Descriptive Essay On 9/11 Attacks
Personal Narrative Essay On 9/11 Attacks
Research Paper On 9/11
Impact Of 911
9/11 Short Paragraph
How 9/11 Changed the World
9/11 Research Paper
Essay About 9/11
Narrative Essay On 9/11 Terrorist Attacks
9/11 Inside Job Research Paper
9/11 Conspiracy Essay
Volume 7, Issue 1 (2014) of the Journal of Physical Security, a peer-reviewed journal devoted to research, development, modeling, testing, experimentation, and analysis of physical security. Includes both technical and social science approaches.
This issue has 7 papers on the following topics: testing locks; seals and nuclear safeguards; a security thought experiment; vulnerability assessment issues; the levels of critical infrastructure risk; and community partnerships for counteracting radicalization.
For more information about JPS, to download individual papers from this or earlier issues, or to get on the email notification list, see http://jps.anl.gov
In this research paper, I attempt to construct a consistent, malleable conceptualization of the contemporary drone. I draw on a wide variety of academic papers, articles, opinion pieces, and sources - The Intercept, Donna Harraway in the Feminist Studies journal, Pew Research Center etc.
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
Article Critique
This assignment provides you with an opportunity to read an article and then to share your thoughts about the article by critiquing the details, including the decisions made.In order to access the resource below, you must first log into the myCSU Student Portal and access the AcademicOneFile database within the CSU Online Library.This article includes details and assertions about the ethical choices/decisions made by Edward J. Snowden, a formerNational Security Agency (NSA) contractor. Here is the reference citation for the article:Securing our liberty. (2013). Commonweal, 140(12), 5.After reading the article, draft a two-page response by discussing the U.S. government’s decision to acquire phone andinternet data without disclosing its intentions to citizens. For this assignment, consider the NSA as an organization (i.e.,business) and Snowden as a manager. How have the decisions of this event impacted the fairness of the U.S.government, its citizens, and Snowden? How did ethics, perhaps, influence Snowden’s decision to leak information? Inthis event, what is the greater good and also the consequences/sacrifices of that greater good? Based on the details ofthis event, what can we learn about making important decisions as a leader and manager?This event was covered by several news and media organizations, so there should be plenty of articles in the library.Conduct a bit more research in the online library related to this event involving Edward Snowden and the U.S.government—see what else you can discover about the event to determine an appropriate punishment, if any, forSnowden’s conduct. Include at least one additional source from the library in your response.The purpose of this assignment is for you to think critically about managers (and other leaders) making importantdecisions, and the process managers use to make important decisions. Consider how important it is to collect all of thefacts before making an important decision, such as those involving fairness and ethics.Use APA Style to format your response. Proofread your work, and submit it in Blackboard for grading.Information about accessing the Blackboard Grading Rubric for this assignment is provided below.
Below is the article.
Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge.
Respond to my Classmate’s Post. Your responses should be substantivemickietanger
Respond to my Classmate’s Post. Your responses should be substantive in nature, meaning you should present discourse by asking questions of your peers (how did they arrive at their conclusion or what was the premise of their argument). You can challenge one another and present an alternative analysis. All of this should be supported by the research of scholarly, peer-reviewed articles, and authoritative reporting (government).
CLASSMATE’S POST
In an attempt to answer the question about 9/11, it's difficult to reflect on a day when so many people lost their lives in the worst terrorist attack on American soil in history. It's difficult to opine whether it could have been prevented or not. One issue I do believe is that, if President Bush had not made the decision to ground all the planes, there is the distinct possibility that more lives could have been lost. I think it's easy to look at these types of situations in hindsight. As Fred Borch (2003) notes in his article in the Journal of Military History, "There can be no discussion of whether that attacks...resulted from an 'intelligence failure' without defining the phrase. Does it mean these events were intelligence failures because information had been collected (or was available) that, if properly analyzed and disseminated to those in authority, would have provided tactical warning of the attack?" Yes, there were previous attacks on American warships and the World Trade Center, but intelligence officials have concluded that, although there was always a persistent threat of an attack, there was no credible or "imminent" threat that an attack would occur on September 11, 2001.
There are multiple instances of a failure to communicate. Certain leads that possibly weren't investigated thoroughly and there was a two-year long investigation into the attacks by the "9/11 commission." Errors in human judgment in determination of whether every lead is credible or not can play a factor but those judgment errors alone could not prevented the overall coordinated attack that occurred on 9/11. "The investigation turned up no single damning piece of evidence that would have led agents directly to the impending attacks" (Isikoff, Klaidman, & Reno, 2003). There is simply not enough time or manpower to investigate every threat made against the U.S. Government or America itself. Federal agents, in their knowledge and expertise, must use their own judgment to determine whether to follow up on credible leads whether it be an attack on private citizens or property, a plot to kill the President, bombing of a federal building, or other such terroristic events. Again, while it is easy to examine an issue in hindsight, it is the opinion of this writer that this coordinated terrorist attack took too long to plan and was so precise and detailed that there was no way to prevent it.
REFERENCES
...
RUNNING HEADER: TERRORISM 1
Terrorism in America
Position Paper 1
CJUS 380
Kenton Shatzer
Liberty University
Introduction
“Have you forgotten how it felt that day? To see your homeland under fire and her people blown away. Have you forgotten when those towers fell? We had neighbors still inside going thru a living hell and you say we shouldn’t worry ‘bout bin Laden. Have you forgotten?” (Worley. 2003). Have forgotten what happened on 9/11 and do you ever wonder what the United States could have done to ensure that the terrorist attack did not happen on that faithful day? 9/11 was not the first terrorist attack on the United States and it was not the last. On April 14, 1972, in New York City, “ten members of a local mosque phoned in a false alarm and then ambushed responding officer, killing one” (TheReligionofPeace.com. 2015). In Moore, OK on September 25, 2014, “A Sharia advocate beheaded a woman after calling for Islamic terror and posting an Islamist beheading photo” (TheReligionofPeace.com. 2015.).
So what is terrorism? “There are more than 100 definitions of terrorism in the literature. The United Nations defines terrorism as “an anxiety-inspiring method of repeated violent action, employed by clandestine individual, group or state actors, for idiosyncratic, criminal or political reason, whereby- in contrast to assassinations- the direct targets of violence are not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg. 490). The problem with terrorism is that terrorists want to attack when their target is not ready, but also when there is a large crowd that will be watching and knowing that the attack will kill and injury many innocent people. So how can terrorist attacks be stopped or be limited? Can countries stop terrorist from attacking their countries? The learner of this paper firmly believes that countries can limit and stop terrorist attacks.
Literature Review
Like stated above, terrorism has been around since the first attack in 1972 and has continued to present day when the last terrorist attack was in September 2014. “The largest act of international terrorism occurred on September 11, 2001 in a set of co-ordinated attacks on the United States of America, where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC” (Terrorism Research). Since 9/11, the United States has cracked down and created new laws to help protect the American citizens. The learner firmly believes that the laws have enhanced the security and protection of the United States and the citizens.
The United States government created a new policy after 9/11 known as the “Homeland Security,” and in this new policy is an act called the USA PARTRIOT Act. The Bush Administration passed this acted and also updated elect.
Case Analysis: Calling 911 Essay examples
9/11 Evidence Analysis
9/11 Thesis
The Change in Airport Security from 9/11 Essay
911 Case Study
Fahrenheit 9/11 Essay
911 Attacks Research Paper
911 Operator Research Paper
Descriptive Essay On 9/11 Attacks
Personal Narrative Essay On 9/11 Attacks
Research Paper On 9/11
Impact Of 911
9/11 Short Paragraph
How 9/11 Changed the World
9/11 Research Paper
Essay About 9/11
Narrative Essay On 9/11 Terrorist Attacks
9/11 Inside Job Research Paper
9/11 Conspiracy Essay
Case Analysis: Calling 911 Essay examples
9/11 Evidence Analysis
9/11 Thesis
The Change in Airport Security from 9/11 Essay
911 Case Study
Fahrenheit 9/11 Essay
911 Attacks Research Paper
911 Operator Research Paper
Descriptive Essay On 9/11 Attacks
Personal Narrative Essay On 9/11 Attacks
Research Paper On 9/11
Impact Of 911
9/11 Short Paragraph
How 9/11 Changed the World
9/11 Research Paper
Essay About 9/11
Narrative Essay On 9/11 Terrorist Attacks
9/11 Inside Job Research Paper
9/11 Conspiracy Essay
Freedom and Democracy In AmericaPlease respond to the following di.docxhanneloremccaffery
Freedom and Democracy In America
Please respond to the following discussion topic and submit it to the discussion forum as a single post. Your initial post should be 75-150 words in length. Then, make at least two thoughtful responses to your fellow students’ posts. If you haven’t recently, please review the Rules of Discussion.
In 2002, Benjamin Netanyahu, former Israeli Prime Minister, said: “Contrary to popular belief, the motivating force behind terror is neither desperation nor destitution. It is hope — the hope of terrorists that their savagery will break the will of their enemies.”
What PM Netanyahu was saying is terrorist use their tactics, which are unorthodox, brutal and inhumane, against a force they couldn't otherwise defeat, in an attempt to break the spirit of those they oppose. Many say the 9/11 attacks against America have played into the hands of those who attacked us. They (terrorists) want to cause fear within the population. According to this week's presentation, the result of this fear is that "[I]n times of perceived severe threats, people will often trade their freedom for even the illusion of safety."
As an example, many would point to the security process we (Americans) must go through, even after many years since the 9/11 attacks, just to board an aircraft.
In your initial post, discuss how did the 9/11 terrorist attacks (and any terror, or threat of terror attacks afterwards) change the way we look at freedom and democracy in America?
Do you agree with the statement form this week's presentation that "[I]n times of perceived severe threats, people will often trade their freedom for even the illusion of safety"?
If so, why? If not, why? If there a better way? What would that look like?
Take a stand and defend your position.
should be 150 words, but may go longer depending on the topic.If you use any source outside of your own thoughts, you should reference that source.Include solid grammar, punctuation, sentence structure, and spelling.
...
Volume 6, Issue 1 of the Journal of Physical Security. This issue has papers about Fukushima implications, lock bumping, tamper-indicating seals, election security, stresses on windows for explosions vs. projectiles, and private security in Serbia and in Nigeria.
The costs and consequences of drone warfare MICHAEL J. BOYLE*MYO AUNG Myanmar
http://onlinelibrary.wiley.com/doi/10.1111/1468-2346.12002/epdf
file:///C:/Users/aung/Downloads/BOYLE-2013-International_Affairs.pdf
On 21 June 2010, Pakistani American Faisal Shahzad told a judge in a Manhattan
federal court that he placed a bomb at a busy intersection in Times Square as
payback for the US occupations of Afghanistan and Iraq and for its worldwide use
of drone strikes. When the judge asked how Shahzad could be comfortable killing
innocent people, including women and children, he responded: ‘Well, the drone
hits in Afghanistan and Iraq, they don’t see children, they don’t see anybody. They
kill women, children, they kill everybody. It’s a war and in war, they kill people.
They’re killing all Muslims.’1
In a videotape released after his arrest, Shahzad
revealed that among his motives for the attack on New York City was revenge
for the death of Baitullah Mehsud, a Pakistani Taliban leader killed in a drone
strike in August 2009.2
While his comments were reported in the American press,
the Obama administration never acknowledged that it was revulsion over drone
strikes—which Shahzad was rumoured to have seen at first hand when training
with militant groups in Pakistan—that prompted his attack.3
In his official statement
on the attack, President Obama fell back on language reminiscent of his
predecessor to describe Shahzad as just another of those ‘who would attack our
citizens and who would slaughter innocent men, women and children in pursuit
of their murderous agenda’ and ‘will stop at nothing to kill and disrupt our way of
life’.4
That the Times Square attack was blowback from the growing use of drone
strikes in Afghanistan, Pakistan and elsewhere was never admitted.
Each question should be done on a separate word document, with referwildmandelorse
Each question should be done on a separate word document, with references.
Question 1
Revelations about the collection of vast amounts of data on telephone and computer use by the National Security Agency (NSA) have raised concerns about the threat to privacy. At the same time, many private companies collect extensive information on computer users. Read Craig Mundie (2014) "
Privacy
(Links to an external site.)Links to an external site.
pragmatism: A
(Links to an external site.)Links to an external site.
focus on data use, not data collection (Links to an external site.)Links to an external site.
." (right-click to open in new window)Â
Foreign Affairs,
Mar.-Apr. 2014. Retrieved from Columbia College online library,
Global Issues in Context
database. Look for a copy in
Files
Also, take a look at this one page brief by the
National Review (Links to an external site.)Links to an external site.
on the unmasking of U.S. Citizens. Does this review give you a reason for heartburn over not just the unmasking, but then leaking to the press? Click on the National Review link or see in course materials Unit 4. For background on the legal requirements of NSA unmasking and the 702 warrants see Hirsch and Maxey (March 24, 2017).
What are the arguments for changing the way we think about privacy in the modern world?
What concerns do you have about the extent to which government and corporations store and use information collected from citizens to spy on those same citizens? What benefits do you see?
References
Hirsch, S. and Maxey, L., (March 24, 2017). "Unmasking of U.S. Citizens in NSA Intercepts," The Cipher Brief. Retrieved from
https://www.thecipherbrief.com/article/exclusive/north-america/unmasking-us-citizens-found-nsa-intercepts-1091 (Links to an external site.)
Question 2
Watch the Frontline episode “Top Secret America: 9/11 to the Boston Bombings” that recounts a history of American intelligence efforts since 9/11. The program touches on many highly controversial intelligence issues including the justification for the Iraq War, the use of rendition and torture to gather intelligence, the use of drone weapons, broad surveillance of telephone and computer communications, widespread use of license plate and facial recognition technology, and camera surveillance. There has been a substantial investment in intelligence capabilities to conduct the War on Terror and prevent terrorist attacks. Is this effort relevant today?
Please address the following questions with brief answers (about 150 to 200 words):
Write using third person perspective
Justify using authoritative sources (peer review journals, published sources, FBI, etc.)
What questions does “Top Secret America” raise about U.S. intelligence gathering?
Is the gathering of intelligence infringing on civil liberties? Justify your answer.
Is the intelligence effort making America safe? Justify your answer.
Are these efforts relevant today?
Video
Frontline (2013). ...
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
WMD Proliferation, Globalization, and International Security:
Whither the Nexus and National Security?
Strategic Insights, Volume V, Issue 6 (July 2006)
by James A. Russell
Strategic Insights is a bi-monthly electronic journal produced by the Center for Contemporary
Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are
those of the author(s) and do not necessarily represent the views of NPS, the Department of
Defense, or the U.S. Government.
For a PDF version of this article, click here.
Introduction
Throughout the 1990s, the United States national security establishment gradually espoused the
idea of a growing threat posed by the proliferation of a variety weapons and weapons
technologies that could cause mass casualties to combatants and noncombatants alike. Nuclear
weapons had long occupied the rhetorical space used by policy makers to describe weapons that
could kill on a mass scale, but gradually the result was that the term “weapons of mass
destruction” was reinvigorated and quickly became an accepted term in the lexicon of national
security policy. The term is believed to have surfaced in the media in the aftermath of the German
bombing of Guernica, the Basque seat of power, in April 1937. It reappeared periodically during
World War II in reference to the indiscriminate killing of civilians by aircraft.[1] Today, the term is
defined in U.S. Code Title 50 as “any weapon or device that is intended, or has the capability, to
cause death or serious bodily injury to a significant number of people through the release,
dissemination, or impact of toxic or poisonous chemicals or their precursors; a disease organism;
radiation or radioactivity."[2] For the purposes of this analysis, the term is defined as weapons
that can inflict mass casualties on combatants and noncombatants using nuclear and radiological
devices, long range missiles, and lethal chemical- and biological agents.[3]
Arguably, the kick-off to the more recent formal shift in emphasis in the U.S. national security
bureaucracy came in September 1993 when President Clinton told the United Nations General
Assembly:
One of our most urgent priorities must be attacking the proliferation of weapons of mass
destruction, whether they are nuclear, chemical or biological; and the ballistic missiles
that can rain them down on populations hundreds of miles away… If we do not stem the
proliferation of the world’s deadliest weapons, no democracy can feel secure.[4]
Following the speech, President Clinton signed Presidential Directive 18, which ordered the
Department of Defense to develop a new approach in addressing the proliferation of weapons of
mass destruction. At the time of the initiative, the United States was particularly concerned with
the prospect of thousands of unsecured nuclear warheads in the former Soviet republics—the
problem of “loose nukes.”
In late 1993, Secretary of Defense Les Aspi.
AMERICAN PUBLIC UNIVERSITY SYSTEMFINAL PAPER.docxnettletondevon
AMERICAN PUBLIC UNIVERSITY SYSTEM
FINAL PAPER
KAELA SEAY
INTL434: Threat Analysis
26 February 2017
FINAL PAPER: ESSAY QUESTION ONE
Throughout history, threats have evolved significantly. Following the terrorist attacks on September 11th, 2001, the face of threats began to change. Traditionally, threats originated from other nation and nation-states’ military forces. However, threats can now originate from a plethora of other, non-traditional sources that can potentially pose a far more dangerous threat. The infinite possibilities of threat that can be faced forces the United States government to analyze these new threats, their capabilities, and how they need to adjust their approach to better detect, prevent, and combat them. This essay will discuss where non-traditional threats may originate, how capable they are, how the United States government should approach them, and the problems they may face when doing so.
Today, the United States government faces many threats from non-state actors. Non-states can be anything a nation-state is not. Non-state threats are considered non-traditional threats, which makes analyzing them more difficult. These new, non-state actor threats can originate from one of the following sources: terrorist organization, criminal organizations, private organizations, extremist activist groups, lone wolf actors, and even pirates. Today, one of the largest threats the United States finds itself faced with is terrorist that originates from terrorist organizations. Non-traditional threats have presented the United States “with adversaries that are constantly changing and adapting to their environment and who will present fewer obvious patterns to analyze” (Haddock, n.d.). With the endless number of possible threats the United States is faced with, it would be impractical for the United States government to approach all non-state actor threats unilaterally.
Non-state actors have evolved into extremely capable and resourceful entities. “International terrorism once threatened Americans only when they were outside the country. Today international terrorists attack us on our own soil” (Countering the Changing Threat of International Terrorism, n.d.). One of the most common examples of a terrorist organization that the United States has faced threats from is Al Qaeda. Non-state actors such as Al Qaeda have similar characteristics, which include: international operations, funding, and logistical networks, less dependence on state sponsors, developed communication technologies, and lethal objectives (Countering the Changing Threat of International Terrorism, n.d.). Due to the capabilities of non-state actors, the United States government must look to international cooperation to detect, prevent, and combat these non-traditional threats.
Detecting, preventing, and combatting non-traditional threats from non-state actors such as terrorism is no easy task. Following the terrorist attacks on September 11th, 2001, the Uni.
1. Knox 1
Jerica Knox
Professor Alicia Bolton
English 101
November 8, 2012
Annotated Bibliography: Steven Casey's “Signal Detection”
Since 9/11, the standard way of thinking about airport security is that it is strict. From the
searching of luggage to going through scanners, passengers believe security would not let the slightest
questionable person on board. However, in Steven Casey's “Signal Detection”, a suspected terrorist
was allowed to ride the American Airlines. He, Richard Reid, carried no clothes and a passport that
seemed to be missing a few pages. Although alarms for this man were going off left and right, security
allowed him to get on the plane, putting everyone in danger. Reid, a declared terrorist who was loyal to
Osama bin Laden, attempted to light a shoe bomb and if it weren't for the flight attendants and a few
passengers, their lives could all be gone right now.
There are others out there that are just as smart and capable as Reid, if not more. If Reid was
allowed to get on the American Airlines, then so could other terrorists. Some may actually succeed and
this would be truly sad because airport securities could prevent this. The lives of sisters, brothers, and
other family and friends are at stake. Although terrorism is a threat, and security has attempted to
improve, we can all agree, there should be better precautions for terrorists who plan to destroy the
innocent lives of people. This may mean taking a longer time in line and the criticism of
discrimination at some point, but it serves a purpose to keep everyone's lives as safe as possible. My
research paper will inform citizens that they should not be so comfortable with the safety of America.
My research paper will reflect on this bibliography, which serves as the basis for my research.
Claybrook, Joan. “Homeland Security is a Failure.” At Issue: National Security. Ed. David M. Haugen.
New York: Greenhaven Press, 2008. 68-75. Print.
2. Knox 2
The anthology, National Security, by David Haugen offers different viewpoints on National
Security. In particular, “Homeland Security is a Failure,” by Joan Claybrook, clearly states that
Americans are not safer today as a result of legislation after the 2001 attacks. She bluntly argues that
there has not been enough done to protect American soil and that Americans are ignorant of this fact:
“Amidst all the claims of government action to protect against terrorism, most citizens are completely
unaware that little has been done to protect our sensitive and critical infrastructure from real threats to
communities across America” (Haugen 69). This fact is widely unknown, and because of this, the
government is doing little to nothing to protect citizens from potentially harmful terrorist attacks.
Claybrook goes on to evaluate the transportation systems and how they are under attack. These
transport vehicles are targets of terrorists because they can do much harm and protection is slim.
This anthology was published merely 4 years ago, in 2008. Not much time has passed since
then, and, unfortunately, security lingers as it has been. Lawyer, Joan Claybrook, is the former
president of Public Citizen. This organization is based in Washington, D.C which advocated for the
public interest. Claybrook has also formerly served as the head of the National Highway Traffic Safety
Administration during the Jimmy Carter administration. Therefore, she is a trustworthy source with
much experience dealing with the security of America.
Claybrook topic of homeland security being a failure is exactly what my research paper is
about. It will be easy to use her inside my paper. She is completely against national security, as she
clearly states, “the answer is a resounding no,” (Haugen 69) in the anthology. Claybrook includes a
section all about transportation systems and how they are vulnerable. Because this is what I am talking
about in my research paper to some extent, I can take advantage of this. She describes what has been
done since the 2001 attacks and concludes that it just is not enough. All of this can be used in my
paper.
Katel, Peter. "Homeland Security." CQ Researcher 19.6 (2009): 129-52. Web. 6 Nov. 2012.
3. Knox 3
This article, by Peter Katel, evaluates national security following the September 11, 2001
terrorist attacks. It begins by explaining how the U.S government, since then, has created the
Department of Homeland Security, which is supposed to prevent terrorist attacks. Although former
President, George W. Bush gave credit to this action step, the article goes on to say that there are
arguments that the new department has failed to do its duty: “The huge and diverse department wins
little praise for organization (Katel 135). The article criticizes the new department for leaving out
certain agencies, both on membership and vital information. Potential new attacks still remain. Katel
also argues that the resources of the Homeland Security are not being used in the right places. From all
of this, Katel concludes that Americans should learn to live with the possibility of terrorist threats
instead of being completely secure in the safety of America.
This article was written a couple years ago, in 2009. Katel is not just a random person with an
opinion. He is a veteran journalist who previously served as a bureau chief for Time magazine. He has
had experience for public opinion, working as a reported for 11 years for several non-governmental
organizations, including International Social Service and The World Bank. Katel has several awards
under his belt. Furthermore, he is also a graduate of the University of New Mexico in University
studies. Katel has, therefore, heard his share of opposing views on homeland security. He is credible
because, inside the article, he collected the opinions of several experienced security people, such as
Marc Sageman, a former CIA officer.
This article will prove to be useful in my paper because it gets the opinions of many
experienced, important people in relation to homeland security. I can use this to my advantage.
Because of the various opinions, my paper will seem much more open-minded. Plus, it will make me
seem better-rounded. Katel includes an opposing view which I can then use for my counterargument to
make my paper stronger and seem more reliable.
Marshall, Patrick. "Policing the Borders." CQ Researcher 12.7 (2002): 145-68. Web. 6 Nov. 2012.
4. Knox 4
In Marshall’s article, “Policing the Borders,” he explains what areas are monitored by security
agencies to keep America safe from terrorism. Monitoring includes both land and sea, the millions of
non-citizens that visit each year, and vehicles. However, Marshall goes on to criticize security: “But
experts disagree over with security steps would be most cost-effective and least disruptive to trade and
Americans’ daily lives.” Securities resources are not being properly used for the right thing. With this
being said, Marshall argues that it is difficult to guard the borders of America without problems rising.
Although President Bush created the Homeland Security to coordinate national strategy against terrorist
attacks, “policy experts say the office largely depends upon presidential coattails for influence, because
it has no direct authority over any of the agencies involved in protecting the borders and very little
experience in dealing with the issues” (Marshall 152). This puts a hole in this new security strategy.
Without proper authority, this agency cannot deal with the issues it is supposed to be addressing.
This article was written only some years ago, in 2002, and Patrick Marshall is no stranger to
research. He is a freelance writer who writes about public policy and technology issues. Like my other
sources, Marshall has taken the opportunity of getting other people’s opinion on his topic. For
example, he has taken advantage of using David Masci, who specializes in social policy and foreign
affairs. This only adds to Marshall’s credibility, and in turn, mine. By using other opinions he has
received, he makes himself seem more credible which will then help me along the way.
I can incorporate Marshall’s article in my research paper by explaining what he has said about
the Homeland Security. He criticized it for not having an effective chain of command, and because of
this, it is not able to function properly. I can also use this article by using some of the opinions
mentioned in it. Going back to what I said about the opinions making Marshall reliable, I can also use
this to give me the same credibility. Moving on, Marshall mentioned recommendations in the article
about a tighter security. I can use these to my advantage. I, too, am recommending ideas for a tighter
security, and with his, I can create my own.
5. Knox 5
Outsmarting Terror. “Airport/Airplane Security.” Films Media Group, 2006. Films on Demand. Web.
06 November 2012. <http://storm.hgtc.edu:2048/login?url=http://digital.films.com/
PortalPlaylists.aspx?aid=3503&xtid=40808&loid=90555>
In Outsmarting Terror, the film question if high-tech weapons and defense systems can really
outsmart the world’s leading terrorists. The film looks at innovations being created for security
purposes. Such innovations include guns that shoot around corners and robots that detect and disarm
explosives. Specifically, the segment I will use in my research paper, “Airport/Airplane Security,” talks
about the story that was mentioned in Signal Detection, with Richard Reid. The segment goes on to
say that explosives can easily be taken through security, manipulating its way on to planes.
This film is a National Geographic production, which automatically proves its credibility. It
talks about real life technologies and shows actual proof of it. Since this film is scholarly, it is already
proven to be reliable.
I can use this film in my research project by reiterating what it says about x-rays not being
enough these days. It has been said that “...in the modern war of terror, x-ray isn't enough. It can't tell
the difference between a bar of chocolate and a chunk of TNT” (Outsmarting Terror, “Airport/Airplane
Security”). This information is very crucial to my paper because it shows that x-rays are definitely not
as a effective as they used to be when they first appeared years ago. This proves that while technology
is not improving, terrorists are. Terrorists learn new tricks that can easily manipulate the standard
safety measures of x-rays.
Wallis, Rodney. How Safe are our Skies?: Assessing the Airlines Response to Terrorism. Praeger, 2003.
eBook Collection (EBSCOhost). Web. 6 Nov. 2012.
Former Director of Security, International Air Transport Association, Rodney Wallis wrote the
book How Safe are our Skies?: Assessing the Airlines Response to Terrorism. Wallis talks about
security issues and assesses the international and U.S domestic air travel. Along with this, he addresses
the legislation made after the September 11, 2001 attacks. One particular thing Wallis mentioned
6. Knox 6
referred to the President signing a new aviation law: “President George W. Bush signed into law the
Aviation and Transportation Security Act, believing it ‘should give all American’s greater confidence
when they fly.’ New aviation laws hadn’t achieved their objectives in the past, and those who listened
to the president’s words were entitled to wonder if they would do so on this occasion” (Wallis 30).
This law simply required bags to be screened. However, Wallis goes on to say that bags had previously
been screened as well when terrorists’ attacks had been carried out. It is an evaluation, and also a
recommendation; as Wallis goes on to give out his own ideas for a new security.
This book was published only 9 years ago, in 2003. Wallis has, therefore, had enough time to
evaluate the airport security since the September 11, 2001 attacks. Wallis is very credible, being that he
is the former Director of Security in the International Air Transport Association. No one could be more
reliable than him. He has looked at both opposing views of the security system, whether it is an
effective approach or a dangerous one. Because of this, he makes himself seem open-minded, which in
turn makes him even more credible.
Since I am writing about the evaluation of airport security, this book will be the perfect start to my
research. By using this book, I am getting information from the former top dog himself. Therefore,
this will make me more reliable and easier to persuade readers of my evaluation. I will consider both
possibilities of security—the good and bad—just as Wallis has. Specifically, I will be using chapter 3
to show how the security has not improved much since the 2001 attacks. Wallis shows in detail proof
of this and examples to go along. This will surely help in the development of my paper.