Category: Homeland security

  • “The Growing Threat of Cybersecurity Breaches and the Need for Government Action” The Growing Threat of Cybersecurity Breaches and the Need for Government Action In recent years, cybersecurity breaches have become a growing concern for governments and individuals around the world.

    It is without a doubt that we as a nation have dealt with many emergencies and disasters in the past. In addition, it should not come as a surprise that as our power and technology grow, so does that of other countries. There are some opinions that demographic and economic trends may mark an end to the era in which the U.S. is a sole world power. Smaller and less powerful nations are amassing nuclear weapons. Our countries security system and secrets have been susceptible to outside hackers. Do you agree with the opinion that the United States is losing its superpower status?
    Select a topic from a current event that is or could be a possible security concern in the immediate future if our government does not address it properly.
    Why did you choose this threat or concern? How do you see it unraveling?
    Why do you think our national or local government is not addressing this concern?
    What recommendations would you provide to address the problem?
    Please write a 300 or more paragraph answering these questions. Do not use ai or plagerise. Include at least 1 reference. Thanks.

  • “Examining the Evolution of Domestic Terrorism: A Comparison of the 1996 Centennial Olympic Park Bombing and the 2013 Boston Marathon Bombing”

    You must identify a domestic pre-9/11 terrorist event and a domestic post-9/11 terrorist event that will be the focus of your
    research paper. Note: The two terrorist events that are selected must have occurred at least 5 years apart.
    *You will use the 1996 Centennial Olympic Park bombing vs the 2013 Boston Marathon Bombing
    The research paper must be written using the following outline structure:
    1. Title page
    2. Introduction: In this section, identify the two terrorist events that have been previously selected, and briefly explain why
    these events serve as good comparison points for evaluating how terrorist activities have evolved over time.
    3. Pre-9/11 terrorist event: In this section, describe the first terrorist event that is being used for comparison. The
    descriiption of this terrorist event must include the nature of the event, methods used by the terrorists, and eventual
    outcome of the event.
    4. Post-9/11 terrorist event: In this section, describe the second terrorist event that is being used for comparison. The
    descriiption of this terrorist event must include the nature of the event, methods used by the terrorists, and eventual
    outcome of the event.
    5. Terrorist events comparison: In this section, compare and contrast the two terrorist events that were described in the
    previous sections. Suggested areas for comparison include (1) motivations for attacks, (2) methods of attack, (3)
    impact on society, and (4) lessons learned from attacks that can be used to develop counterterrorist strategies. You
    should also discuss how terrorist strategies have evolved from the first event to the second event.
    6. Discuss how Geospatial Information Systems (GIS) and other technology can be used to prevent future similar
    attacks
    7. Summary and conclusions: In this section, summarize the evolution of terrorism based upon the two selected events.
    8. References: Provide a reference list.

  • Title: “Assessing Homeland Security Issues: Methodology, Analysis, and Recommendations”

    In this assignment, you will craft a research paper on a homeland security issue. In the prior assignment, you presented the first three sections of your paper. This week, you will add the final sections and present the full paper. Be sure to make any changes to your literature review based on instructor feedback. 
    The three main sections you should add to the paper for this submission are the Methodology and Research Strategy, Analysis and Findings, section and the Conclusions/Recommendations section. 
    Methodology and Research Strategy: This section provides the reader with a description of how you carried out your qualitative research project and the variables you identified and analyzed. It describes any special considerations and defines any limitations and terms specific to this project, if necessary. If you use any data, you will identify the data and its source. This section can be brief or more complicated, depending on the project, written in 1-2 pages. 
    Analysis and Findings: Analysis and findings are not the same as conclusions. In the analysis component of the paper, you identify how you analyzed the data. The second part is the findings you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. This section should be at least 2-5 pages. 
    Conclusions and Recommendations: is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what the researcher sees as the meaning of that data. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole. 
    Remember, your paper should seek to answer a question that helps to solve the research puzzle you identified. (Please see the research question, hypothesis, and variables in the attached research question and literature review paper).
    Technical Requirements
    Your paper must be at a minimum of 10-15 pages (the Title and Reference pages do not count towards the minimum limit). This limit includes the earlier sections of the paper completed in the first assignment. Please be sure to read the instructor’s feedback and incorporate any recommendations for improvement.
    Scholarly and credible references should be used. At least 8 scholarly sources are required for this assignment.
    Scholarly sources include peer-reviewed articles, government publications, and academic texts.
    Type in Times New Roman, 12 point, and double space.
    Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
    Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
    All submissions will be graded using the assignment rubric.

  • “Exploring the Role of the US Military in Domestic Homeland Security: Identifying Gaps and Filling the Void”

    Please share your research question with your classmates. How did you identify a gap in the current research and how will your thesis fill that gap? Refining your research question will provide a solid foundation from which to conduct your research.
    Research question is: The United States Military Role in Domestic Homeland Security in the United States of America

  • Title: The Growing Threat of Chemical, Biological, Radiological, and Nuclear Attacks on the United States: A Comprehensive Analysis Introduction: The United States has long been considered one of the most powerful and secure nations in the world. However, in

    Please see attached photos. Form a portion of a research paper following the template provided. Base the research around the topic of chemical, biological, radiological, and nuclear threats to the U.S. Feel free to be creative with this.

  • “Exploring the Effectiveness of Border Security Programs in Protecting America: A Scientific Analysis”

    This summative assignment represents the Capstone Project of the entire Homeland Security and Emergency Management degree program. For this assignment, conduct research on a Homeland Security and Emergency Management topic utilizing the steps of the scientific method. This assignment will have incremental assignments to submit during Week 1 and Week 2 of this course in order to ensure that you are progressing in proper research methodology and scope. The research question and hypothesis approval is due in Week 1 and a literature review will be due in Week 2. These assignments support the project, but they are graded separately and retain their own values separate from the Capstone Research Project.
    Conduct an original research project in one of the following topic areas. For reference purposes and review, these key homeland security areas and sub-disciplines can be reviewed at the U.S. Department of Homeland SecurityLinks to an external site. website.
    Topics
    Counterterrorism activities and programs in aviation security or law enforcement
    General Counterterrorism ( see Preventing TerrorismLinks to an external site.)
    Aviation (see Transportation SecurityLinks to an external site.)
    Law Enforcement (see Law Enforcement PartnershipsLinks to an external site.)
    Border security activities and programs in protecting America (See Border Security)Links to an external site.
    Preparedness, response and recovery activities and programs in disaster response or disaster recovery (See DisastersLinks to an external site.)
    Immigration activities and programs in immigration enforcement (See Immigration EnforcementLinks to an external site.)
    Homeland security activities and programs in cybersecurity and privacy protection (See CybersecurityLinks to an external site.)
    Once a topic area has been selected, formulate a research question and supporting hypotheses for approval by the instructor at the conclusion of Week 1.
    Use your approved research questions and hypotheses to develop research variables and a literature review for submission during Week 2.
    During Week 3, 4, and 5, conduct research and write a research paper that is between 10 to 12 pages in length and includes the following basic structure. 
    Identify a key issue and supporting research question in Homeland Security and Emergency Management (one page).
    Create one research hypothesis that may answer the research question. You may use one that you formulated for Week 1 assignment, “Research Project Preparation” (one page). The hypothesis must be clearly stated in a stand-alone statement then supported with a paragraph discussion.
    Establish research variables for analysis and subsequent confirmation or refute of the research hypothesis (roughly two to three pages). The research variables must be clearly stated in a stand-alone statement then supported with a paragraph discussion to describe the type of variable, whether is it dependent or independent.
    Conduct a Literature Review for the topic selected. This research must be supported by at least eight scholarly, professional, or official government resources, five of which can be found in the UAGC Library. Use the Scholarly, Peer Reviewed, and Other Credible SourcesLinks to an external site. document for guidance. The course textbook will not be considered a valid reference for the resources requirement (two to four pages).
    Analyze the research question and supporting hypothesis (one to two pages).
    Construct a conclusion of research (results and answer of the research) ( one to two pages).

  • “Assessing the Impact of “Terror, Security, and Money” on Emergency Management, Homeland Security, and Society”

    Provide a minimum 750-word assessment of the content. What crisis did the author depict that requires action? What solutions did the author propose – if any? What did you learn? What impact will it have on emergency management and homeland security? On your profession? On society? My Proffession is firefighter/paramedic. The chosen book is Terror, security, and money: Balancing the risks, benefits, & costs of homeland security by Mueller, J. & Stewart, M. (2011).
    The book aims to explore whether the funds spent on security measures are worth the gains in security, rather than simply asking if we are safer due to the measures taken post 9/11. The authors utilize risk and cost-benefit analysis to answer this question, a technique that has been used by regulators, academics, and businesses worldwide for decades. However, a recent National Academy of Science study suggests that those administering homeland security funds have not capably applied this analytical approach. Given the limited risk terrorism poses, expenses meant to reduce it have largely been deemed not cost-effective. For instance, increased American homeland security expenditures would need to have prevented up to 1,667 attacks similar to the Times Square incident in 2010 every day to be considered cost-effective. “Terror, Security, and Money” highlights the mistakes the US has made and continues to make in managing homeland security programs. The book has the potential to redirect our efforts towards a more productive and cost-effective path

  • Title: Risk Management and Cybersecurity in Homeland Security: Protecting Critical Infrastructure

    Drawing upon resource material provided and that discovered while conducting your own research, address both of the following topics:
    Examine the role of risk management within the homeland security enterprise and related resources. Additionally, select one of the critical infrastructure sectors and specify how activities related to risk management are currently being employed to effectively address identified areas of risk, those that include (but not limited to) resource/grant allocation, strategic and other forms of planning, etc., from the federal level to state and local efforts.
    Address how cyber-security relates to our nation’s critical infrastructure, as well as challenges related to providing such security within the homeland security enterprise.
    Your paper must be at a minimum of 4-6 pages (the Title and Reference pages do not count towards the minimum limit).
    Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
    Type in Times New Roman, 12 point and double space with 1 inch margins all around.
    Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. For more on this see the APA style guide
    CHECK PAPER FOR AI USAGE AND REVIEW PAPER

  • Hurricane Chester Leadership Exercise Report

    To complete this assignment, perform the following tasks:
    Please first read the Hurricane Chester Exercise Instructions that provides an overview of the assignment.
    Next, please read the Participant Guide that provides detailed guidance on how to conduct the exercise.
    If you have any questions on how to complete the exercise, please contact me.
    Once you fully understand the assignment, please conduct the exercise by reading the HMLS 495 Exercise Slides.
    Finally, please complete the Hurricane Chester Exercise Report Template as the template is. You can use the PDF form and fill it in. If you need to convert it to MS Word that is fine as well. Please use the Hurricane Chester Exercise Report Template v1.1 attached; this is crucial to the project do not modify the template.
    Remember to turn in the completed report on time.
    PDF – HMLS 495 Exercise Slides
    https://leocontent.umgc.edu/content/dam/course-content/tus/hmls/hmls-495/document/HMLS%20495%20Exercise%20Slides.pdf?ou=930931
    PDF – Participant Guide
    https://leocontent.umgc.edu/content/dam/course-content/tus/hmls/hmls-495/document/Participants%20Guide.pdf?ou=930931
    PDF – Hurricane Chester Exercise Instructions v1.2
    https://leocontent.umgc.edu/content/dam/course-content/tus/hmls/hmls-495/document/Participants%20Guide.pdf?ou=930931
    PDF – Hurricane Chester Exercise Report Template v1.1
    https://leocontent.umgc.edu/content/dam/course-content/tus/hmls/hmls-495/document/Hurricane%20Chester%20Exercise%20Report%20Template%20v1.1.pdf?ou=930931
    The leadership exercise activity is based on the physical characteristics and resources of a real facility located in New York City. The exercise focuses on an operational and planning scenario and includes the development of an Exercise Report also known as an After-Action Report (AAR).
    The AAR is created by incorporating targeted leadership knowledge development, self-assessment assignments, and homeland security or public safety leadership analysis with your observations from the leadership exercise. The AAR represents a personal understanding and plan of public safety leadership based on the course research, lecture content, conferences, reports, the leadership exercise, and your leadership performance. The completed AAR correlates with professional homeland security and public safety leadership best practices, resulting in a tangible product that can become a base for future leadership development.
    The AAR will be developed using the provided template and structured to cover all of the following topics:
    Presentation and discussion of academic and anecdotal resource materials
    Deconstruction of current homeland security or public safety leadership
    Identification of acceptable and effective professional homeland security or public safety leadership principles
    Collation of data from personal leadership self-assessment assignments and Personal Leadership History Report
    Comparison and contrast of self-assessment data, to include applicability, with best practices and identified leadership principles
    Presentation and discussion of future personal leadership development and opportunity

  • “Guidelines for Completing Your Capstone Research Paper in Criminal Justice or Homeland Security”

    Instructions
    Review the rubric to make sure you understand the criteria for earning your grade.
    Review Chapter 12, “Evaluation and Policy Analysis ” in The Practice of Research in Criminology and Criminal Justice , the textbook used for the course CRJ–467 Research Methods and Analysis in Criminal Justice.
    Download and review the Chapter 12 presentation
    Download the Research Paper Criteria.docx  file. Use this document to review and evaluate your capstone research paper in progress against the required criteria. Is your work on each section of the paper satisfactory, or does it need improvement?
    As you review your paper, check to make sure that:
    The problem statement is framed in an open–ended way, with empirical questions so open that your study helps to answer them.
    Research questions are strong, answerable, and match your research study design and methodology (the case study, which is the design portion of the qualitative method).
    All proposed questions have associated data collection strategies.
    You have provided a clear description of your sampling criteria without too many disparate variables; it should be clear who is being interviewed, and why!
    You provide a thorough discussion of your analytic process, which is qualitative in nature, further explaining how the data was collected and then interpreted. 
    Before completing your research paper, review an example of an APA paper on the OCLS APA Style page. 
    Prepare a 10–page research paper on your selected research topic in criminal justice or homeland security. Note: the body content of your paper should be 10 pages. This does not include the title page.
    Begin your paper with a title page. Present your abstract as page two of your paper.
    Include the following sections in your research paper, adhering to proper research techniques and methods:
    Section 1: Introduction and Research Problem (this includes your thesis statement)
    Section 2: Literature Review
    Section 3: Methodology (QUALITATIVE) (design is a Case Study)
    Section 4: Analysis and Presentation of Findings
    Section 5: Discussion and Conclusion
    APA in–text citations and references should be used for all references made in your writing.