Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
Going back to the attempted Northwest Airlines bombing in December 2009 by Umar Farouk Abdulmutallab, he was traveling on a multi-year, multiple-entry tourist visa issued to him in June 2008 (Garcia & Wasen, 2010). Thus, he was able to attain his U.S. visa legally even though if one was to look at his background, there will be "red flags" already pertaining to his terrorist leanings. It seems though that the State Department, the embassies, consulates and missions charged with the issuance of various visas to foreigners do not have the resources and capabilities to conduct proper and thorough screening. In this regard then, it is critical to have better systems, processes, and procedures in place that can better vet and investigate foreigners seeking visas to enter the United States. "The Enhanced Border Security and Visa Entry Reform Act of 2002 aimed to improve the visa issuance process abroad as well as immigration inspections at the border. It expressly required the development of an interoperable electronic data system to share information relevant to alien admissibility and removability and the implementation of an integrated entry-exit data system. (Garcia & Wasen, 2010)" The law is already in effect but better measures are required to strengthen the implementation thereto whereby the screening of legal visitors and immigrants will be stringent enough as to be able to identify any potential terrorist that want to enter the country.
After looking at the legal immigration side, it is then important to ensure that the U.S. borders from north and south to the eastern and western coasts are well protected and policed to prevent the entry of terrorists illegally. Auspiciously, this has been well planned in the various security strategies of the United States and several departments and agencies are in the lead to prevent any hostile entity from entering the country. But illegal immigration still remains a major threat to the nation because of the sheer size of the U.S. border. In this regard, the community level anti and counter-terrorism measures will prove invaluable because the grassroots level will provide the early warning system whenever unknown persons are in the community. This is not to insinuate having a "big brother" mentality of xenophobic tendencies by merely enabling the community to be able to determine if those in their communities are desirables or not without stepping on individual rights and liberties. This may be easier said than done because of the often conflicting nature of security and liberty but with due diligence, it will be possible to find a viable plan in doing so.
After looking at the various aspects of how homeland security further evolved since the 9-11 events, it is apparent that there are enough measures being done (with several wins on the matter) to ensure that the nation can defend itself and the home-front from terrorist attacks. The strategies developed are not only confined at the strategic level but goes all the way to the tactical and operational levels that see the community being involved in the fight against terrorism. This then brings about the question as to whether the nation is winning against the fight against terrorism especially on the home-front, history has provided the answer thereto. Consequently, for as long as there are those who have the will and wherewithal to wage terrorism on the United States, the cycle will go on and the only recourse for the American nation and its people is to not let their guard down otherwise terrorism will have another major victory similar to the 9-11 events.
Crowley, P.J. (2008). "Homeland security and the upcoming transition: What the next administration should do to make us safe at home." Harvard Law & Policy Review, 2: 289-312. Retrieved July 21, 2011 from http://www.hlpronline.com/Crowley_HLPR.pdf
Garcia, M.J. & Wasen, R.E. (2010, January 12). "Immigration: Terrorist grounds for exclusion, and removal of aliens." Congressional Research Service (CRS) Report for Congress 7-5700. Retrieved July 21, 2011 from http://www.fas.org/sgp/crs/homesec/RL32564.pdf
National security strategy 2010. (2010, May). Retrieved July 21, 2011 from http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
U.S. Department of Homeland Security. (2009, May 4). Brief documentary history of the Department of Homeland Security 2001 -- 2008. Retrieved July 21, 2011 from http://www.dhs.gov/xlibrary/assets/brief_documentary_history_of_dhs_2001_2008.pdf
U.S. Department of Homeland Security. (2008, September 24). One team, one mission, securing our homeland: U.S. Department of Homeland security strategic plan fiscal years 2008 -- 2013. Retrieved July 21, 2011 from http://www.dhs.gov/xlibrary/assets/DHS_StratPlan_FINAL_spread.pdf[continue]
"U S Defend The Home-Front Against" (2011, July 24) Retrieved October 22, 2016, from http://www.paperdue.com/essay/us-defend-the-home-front-against-43519
"U S Defend The Home-Front Against" 24 July 2011. Web.22 October. 2016. <http://www.paperdue.com/essay/us-defend-the-home-front-against-43519>
"U S Defend The Home-Front Against", 24 July 2011, Accessed.22 October. 2016, http://www.paperdue.com/essay/us-defend-the-home-front-against-43519
U.S. Reliance of the National Guard The National Guard is a private army (militia) of the United States of America. The United States' Constitution has authorized this militia and has also specified the different functions and roles of the National Guard in the federal and state governments. According to the Article 1 of the Section 8 in the United States' Constitution, the Congress has been granted the authority "to call forth
President Johnson became even more fearful of a communist take-over. In 1964, when two American ships were attacked by the North Vietnamese in the Gulf of Tonkin "the American Senate gave Johnson the power to give armed support to assist any country requesting help in defense of its freedom," effectively beginning the Vietnam War without a formal declaration of war (BBC 2009). The wide-scale bombing of the North in 'Operation
LEGALIZING PROSTITUTION IN THE U.S.A. The topic I have chosen to discuss is the legalization of prostitution in the United States of America. By prostitution, I refer to an act where money is exchanged for rendering sexual services. Presently, 49 states out of 50 in the United States have banned prostitution withonly some forms of it allowed in a few areas of Nevada. This is not the case in all developed
S. has to be active in supporting the International Law. He argues that our effort should not be to defeat a set of criminals, Osama Bin Laden, his Al-Qaeda network and a few like-minded groups, but we have to undermine the notion that any action is acceptable for a cause and slaughter of civilian is an acceptable political act. The fight against terrorism has to be based not on destroying a
Earth Liberation Front (ELF) This is a case study on Earth Liberation Front (ELF), which is an extremist group emerged to protect the Mother Nature. ELF's origin, structure, leadership, motivations, and goals have been included as the primary elements of analysis in the case study. These aspects have come under analysis to provide an understanding about the group. Since this group is also considered as one of the terrorist groups
Moreover, it is unclear whether Jim has attempted to reestablish any meaningful contact with his children; rather, his entire focus has been on becoming a better person. While there is certainly nothing wrong with that goal in and of itself (it is, after all, a universal human quality), he appears to have pursued this goal to the total exclusion of making any substantive reparations to his family. Finally, it is
Step 3: Discuss the Precipitating Event After relationship is recognized, the emphasis goes to the family insights of the condition, the sequence of proceedings leading up to the predicament, and the issue that started out the sequence of events (Graham-Bermann, S.A., 2002). Consultations inspect when and how the disaster happened, the causal conditions, and how the family endeavored to covenant with it. Step 4: Assess Strengths and Needs The Family valuation of strengths