100% (1)
page:
8 pages/≈2200 words
Sources:
8
Style:
APA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 41.47
Topic:

Domestic Intel to Stop the Attack

Research Paper Instructions:

1. Introduction:

For this final paper you condense two previous papers into a single research paper and then add 3 substantive recommendations on how you propose that domestic intelligence can be employed more effective to support the HSE to stop terrorist attacks. This is essentially what you need to know to write this final paper.

2. Full Spectrum Domestic Intelligence to Counter Terrorism within the Homeland:

Develop a comprehensive 6-8 page paper summarizing the content and research from your first two papers, and then make at least three substantive recommendations on how to prevent or thwart your selected terrorist group from succeeding in their hypothetical attack on the United States homeland. Use the Organizational Profile (Red Cell paper) you prepared for your Midterm Assignment and combine it with the Progress Assignment you prepared about collecting and analyzing on that group (making all necessary changes based on instructor feedback) and melding them both into one seamless research paper that also adds a major new section to address your specific recommendations to counter your selected terrorist organization's planned attack in the homeland. Make sure your recommendations are focused only on what happens within the homeland as this is not a foreign policy or international relations course. The recommendations need to be something new or enacting a policy or procedure that is not already in place (do not describe how we already protect the homeland or discuss what current agencies do). Be original or cite ideas from others on how to adapt or reform how intelligence can better support homeland security here domestically to stop your hypothetical attack. Also, make sure your recommendations address a role for state and local agencies (as we discussed in week 4).

The focus of this paper is to address how intelligence, law enforcement and homeland security officials from all three levels of government can prevent or disrupt this attack here in the U.S. (not overseas) by clearly specifying your recommendations of counter-measures to stop or interdict the terrorists here at home before the attack occurs. Employ all that you have learned about intelligence to support Homeland Security and feel free to express your own opinions when making recommendations for Homeland Security intelligence. Just listing what the government already does to collect and analyze and conduct law enforcement on the terrorism threat to the Homeland is not sufficient -- make some original or even controversial proposals if you like. Do not discuss defensive or protective measures such as increasing physical security -- the thrust of your recommendations needs to be focused on domestic intelligence (that is what this class is about). You can recommend a change to policy, procedure or an organizational change to how the IC (or an individual agency) supports the homeland which directly contributes to stopping a terrorist attack. Feel free to make radical proposals or even changes to existing laws, but do not make proposals that are illegal or unconstitutional (but you can propose changing a law). Remember your hypothetical attack was supposed to be imminent (in the immediate future), so longer term proposals may not be viable for this paper.



Your paper needs to clearly identify your three homeland security intelligence and law enforcement recommendations at the end of your paper before your conclusions, and include specific section headings for each recommendation with the short title for each recommendation. Your proposals to stop a terrorist attack are the heart of your final assignment, this will be the primary criteria for grading this paper and the comprehensive and culminating event for this course. You must use sections headings like these:



Recommendation 1: Your idea to improve homeland security (domestic) intelligence and law enforcement to specifically stop this impending attack; only what you think should be done at home -- DO NOT make overseas recommendations. All three must be homeland intelligence focused proposals and not address anything going on abroad -- that is not the subject of this course.



Recommendation 2: Make sure at least one recommendation includes a role for the all-important state and local agencies (week 4).



Recommendation 3: Intelligence is about collecting, analyzing, collaborating, sharing/disseminating, etc, so your recommendations must fall somewhere within the intelligence cycle/process we covered about in week 3. Do NOT make recommendations about increased security measures or 'force protection' and defensive approaches -- remember this course is about INTELLIGENCE (which is proactive / preventative, not protective / reactive).



Make sure your ideas are original and something you think the government can do better related to intelligence -- not status quo or what we are already doing. If you are at a total loss for ideas about how intelligence could stop an attack or be improved with domestic homeland security intelligence, then I suggest looking back over the required reading in week 4 on Fusion Centers for Homeland Security in the section on recommendations on page 24, or consider Tromblay, D. E. (2019). Spying: Assessing U.S. Domestic Intelligence since 9/11. Chapter 12: Lessons Observed (if not learned). Lynne Rienner Publishers. (pp 209-218) available as an ebook in our library.



Note on the three paper assignment series: This final assignment combines all that you wrote in the first two papers (they build on each other) for a total of 6-8 FULL pages of content (not including title and reference pages). The final paper is not 6-8 pages of completely new writing since this paper integrates what you wrote for the midterm assignment in week 3 (summarize that first 5-7 page midterm paper with 1-2 pages of content in this final paper), then add information from the progress assignment on collecting and analyzing on them (summarize that second 5-7 page progress paper with 1-2 more pages of content in this final paper as well) -- making sure to improve that writing based on my feedback. Then add new information where you are making at least three recommendations (3-4 pages of new material). So, the first 2-4 pages of the final paper will summarize your first two papers, and then the last 3-4 pages or so address your recommendations and summarize the whole paper.



Again, in plain terms, for this final paper, all you have to do is condense your two previous papers (as a research paper) and then make 3 recommendations on how to better stop attacks at the end.



Technical Requirements:

Your paper must be at a MAXIMUM of 6-8 pages (the Title and Reference pages do not count towards the minimum limit).

Scholarly and credible references should be used. A minimum of 6-8 scholarly sources are required to be used on this assignment.

Type in Times New Roman, 12 point and double space.

Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.

Points will be deducted for the use of Wikipedia or encyclopedic type sources. Websites or news articles are not scholarly sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.

All submissions will be graded using the attached rubric.

Final Assignment Domestic Intel to Stop the Attack

Research Paper Sample Content Preview:

Domestic Intel to Stop the Attack
Author’s Name
The Institutional Affiliation
Course Number and Name
Instructor Name
Assignment Due Date
1. Introduction
Domestic intelligence collection (IC) is necessary for countries to protect penetration from terrorist groups and secure homeland security. Homeland intelligence in the United States of America (US) involves various law enforcement agencies (LEAs) and other sources for data collection, examination, and creation of actionable strategies to neutralize terror attacks. The Department of Homeland Security (DHS) has worked diligently since the 9/11 attacks to mitigate emerging threats and exhibit responsiveness towards existing terrorism agendas (Tromblay, 2019). However, DHS efforts sometimes fail to neutralize the attacks due to weak collaboration with institutional bodies and LEAs at micro-security levels.
Hence, this research emphasizes domestic intelligence to neutralize attacks planned by Boko Haram, a Nigerian terrorist group, on US soil. The research will discuss Boko Haram’s terrorist competency and agendas to enter US soil. The discussion will exhibit a brief overview of domestic IC members engaged in data collection and analysis. Lastly, the research will propose three strategic recommendations to assist domestic intelligence in neutralizing the attack by performing inevitable changes in actionable roadmaps and collaborations with LEAs and institutional bodies.
2. Discussion
2.1 Terrorist Group Profile and Attack Focus
Boko Haram is a Nigerian terrorist group that became an unavoidable threat to local government and global LEAs in 2009. Boko Haram aims to impose Sharia principles in Africa by boycotting the Western education system in the continental jurisdiction. Statistically, Boko Haram is the eighth-largest terrorist organization that operates as anti-US and practices Jihad to impose Sharia principles (Amao, 2020). The group terrorized the Nigerian political leaders through suicide bombings, assignations, abductions, and ransom.
Boko Haram’s ideology practices violence to force Christians, liberal Muslims, and other religions to embrace Sharia principles. The group intervenes in socioeconomic goals in Nigeria to achieve the political objective. Boko Haram operates by forming strategic collaboration with other terrorist groups like Al-Qaeda and ‘Islamic State of Iraq and the Levant (ISIS)’ to strengthen regional positions as terrorist groups (Amao, 2020). Boko Haram’s core agenda is to abuse power and acquire the state’s socio-political control through financial dominance and misguided Islamic provisions.
Boko Haram’s attack pattern is systematic and focuses on maximum damage. The group attracts media attention to communicate influence on global LEAs while operating as anti-US. The group gained significant attention from the mass media after conducting political assignations, kidnappings, bombings, public beheadings of citizens, and conspiring terror attacks in Nigeria (Omenma et al., 2020). Boko Haram forcefully recruits children, particularly young girls, to perform terror activities.
Nonetheless, the group practices prohibition of Western education and forces children to attend conventional schools as a protest against non-Islamic academic curriculum. The actions caused socioeconomic disruptions in the country by preventing national harmony and distributing power among radicals. The group operates according to the Jihadi framework by engaging children to carry bombs in school bags and perform blasts in public areas like shopping malls, main street markets, and transport (Omenma et al., 2020). As a result, the group shifted focus to United Nations (UN) engagement in Nigerian territory to promote education among children.
Recently, the UN announced a financial compensation program in Nigeria to promote national education. UN confirmed that Nigerian youth will receive $600 during each academic session to support education prospects. UN took the initiative in Nigeria to achieve its Sustainable Development Goals (SDGs) of promoting education as an equal right. As a response, Boko Haram planned an imminent attack on the UN’s headquarters (UNHQ) in Midtown Manhattan. The global networking with Al-Qaeda and specialization in suicide bombing facilitated Boko Haram to access financial support, arms, ammunition, and immediate terrorist recruits to attack UNHQ.
The group trained five suicide bombers for the mission. The bombers are young students aged between 18 and 20 years, misguided by Boko Haram’s Islamic agendas. The group plans to visit Manhattan as tourists. Each member received $10,000, suicide jackets containing royal demolition explosives (RDX), and attack rehearsals. The participants planned to reach Manhattan three days before the attack on UNHQ.
2.2 Domestic Intelligence Collection and Analysis: Members & Strategies
DHS and US national security engaged immediately in data collection, members’ selection, and analysis to neutralize the attack Boko Haram plans on UNHQ. US national security will utilize three IC sources. First, ‘Open Source Intelligence (OSINT)’ will provide access to public platforms to track communication, news, and other engagements that educate IC members about the attack (Chaudhary & Bansal, 2022). IC members will monitor the internet, digital media, newspapers, television (TV), and public databases to gather necessary information about Boko Haram’s strategies and probability of entering US soil. Besides, OSINT informs about anticipated tactics, strategies, and networks Boko Haram plans to utilize for entering UNHQ. OSINT is a primary source to empower IC members in preparing actionable strategies.
Secondly, the IC members would utilize ‘Human Intelligence (HUMINT)’ to acquire information on the terror group and planned activities. Theoretically, HUMINT is a raw information platform that IC members use to gather essential details by interviewing suspects and witnesses. HUMINT is a conventional approach for IC members when planning to neutralize terror activities. HUMINT is a real-time information platform for IC members to strategize responses and prevent terror activities (Riza, 2022). IC members will use HUMINT by interacting with domestic informers, prisoners, and other suspects in institutions to gather information. IC team will collaborate with other LEAs to strengthen monitoring functions in sensitive areas like hospitals, airports, and dockyards. LEAs will assist IC members by providing micro details of suspicious movements that lead to Boko Haram or other terrorist groups.
Nonetheless, finalizing the IC team is necessary to gather information from specified sources and progress to neutralize terrorist attacks. First, the US national security department will designate the National Security Agency (NSA) to access OSINT data collection. NSA enjoys empowerment to intervene in American communication databases and decode ciphers and sensitive information (NSA, 2023). NSA will study coded patterns between terrorist groups and engage LEAs to respond proactively after decrypting information.
Furthermore, the US national security department will engage the Department of Homeland Security (DHS) to gather data by engaging military and government officials. The research suggested that terrorism is neutralized by intervening in suspicious financial movements, seizing illicit commodities, and preventing illegal immigrants from entering US soil (Akartuna et al., 2022). DHS is authorized to interact with the US Customs and Border Protection (CBP) and US Immigration and Customs Enforcement (ICE) to monitor terrorist activities. DHS will utilize ICE interventions to track illicit financial movements, integration of suspicious commodities like RDX, and unusual interactions between individuals or groups. Besides, DHS will use CBP support to increase monitoring procedures on the US border to seize suspicious individuals, illegal arms, and weapons of mass destruction. CBP provides fundamental support to DHS by screening immigrants and local tourists to prevent threats proactively.
Lastly, the designated IC members will analyze the gathered data using quality of information check (QIC), devil’s advocacy, and brainstorming to extract meaningful information. Each assessment strategy impr...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!