Homeland Security -- Principles Of Term Paper

PAGES
3
WORDS
964
Cite

As a result of the various operations in about 40 states in America, the sleeper cells are carefully planning and waiting for their next attacks. The second major reason for America's vulnerability to operations of sleeper cells is that the country's first-line defenders are neither adequately trained nor prepared to deal with terrorism (Gaubatz, 2007). While there are numerous initiatives and plans that have been established by the government to counter terrorism, the first-line defenders are still inadequately trained and prepared to deal with terror attacks effectively. Actually, the local law enforcement agencies in the United States are not receiving enough assistance and funds from the Federal Government to tackle terrorism especially from sleeper cells. On the contrary, these sleeper cells are basically prepared to carry out terrorist attacks within America through nuclear material that is available to them. In addition to being prepared to die, the sleeper cells have the necessary tools to conduct their terror attacks.

Dealing with Sleeper Cells:

As these sleeper cells are adequately prepared and equipped with the necessary tools to carry out suicide terrorist attacks, there is need for collaborative efforts in America to identify and destroy them. In the wake of the current political, economic, and military issues, there are several things that can be done including establishment of improved surveillance and interrogation techniques. The enhanced surveillance and interrogation techniques would be critical in promoting broad spectrum of intelligence gathering that is evaluated and used by America's covert operations.

...

This is particularly because identifying sleeper cell terrorists has become a difficult venture for many law-enforcement officials. Regardless of the extensive tools that have been provided to the law enforcement officials through the enacted legislations after the 9/11 attacks, the legal barriers have hindered the detection of sleeper cell terrorists (Corsi, 2005).
In conclusion, while attempts to identify sleeper cells have been largely unsuccessful, the existence of these terrorist groups in America is undoubted. Due to their widespread operations within America, sleeper cells continue to pose a major security threat to the country.

Sources Used in Documents:

References:

Corsi, J. (2005, April 18). Sleeper Cells in America: 'Atomic Iran' Explains Terrorist Threats to U.S. Homeland. Retrieved December 4, 2011, from http://www.wnd.com/?pageId=29860

Gaubatz, D. (2007, February 2). Sleeper Cells in the United States and Canada. Retrieved December 4, 2011, from http://www.americanthinker.com/2007/02/sleeper_cells_in_the_united_st.html

"Islamic Extremists Invade U.S., Join Sleeper Cells." (2004, February 9). The Washington

Times. Retrieved December 4, 2011, from http://www.washingtontimes.com/news/2004/feb/9/20040209-115406-6221r/?page=all
Pike, J. (2011, July 11). Sleeper Cells. Retrieved December 4, 2011, from http://www.globalsecurity.org/military/world/para/al-qaida-sleeper-cells.htm


Cite this Document:

"Homeland Security -- Principles Of" (2011, December 04) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/homeland-security-principles-of-48185

"Homeland Security -- Principles Of" 04 December 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/homeland-security-principles-of-48185>

"Homeland Security -- Principles Of", 04 December 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/homeland-security-principles-of-48185

Related Documents

S. Department of Energy). Q3. Discuss the internet of things and its likely consequences for developing an enforceable information assurance (IA) policy and implementing robust security architecture. The internet of things refers to the inevitable connectedness of all things in all regions of the world through the internet. "The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination