Use our essay title generator to get ideas and recommendations instantly
esearch Databases - Nursing
The incidence and mortality rates for stroke differ markedly along racial lines, with African-Americans having a much higher risk of stroke and death from stroke compared to Whites (Howard, 2013). Approximately 40% of this difference can be explained by the variables included within the Framingham Stroke isk Score, while another 10% can be explained by socioeconomic status. Other contributing factors probably include differential health care access and quality. Accordingly, the Surgeon General of the United States (2014) recently issued a statement describing government actions being taken to reduce health disparities and published a list of recommendations for providers. Among these recommendations are focusing on at-risk communities, improving care access and quality, improved provider training, and better evaluations of stroke risk among minorities. For these reasons I have chosen to focus on stroke incidence and mortality in African-Americans.
270 words for each database
Howard, V.J. (2013). Reasons underlying racial differences in stroke incidence and mortality. Stroke, 44(6 Suppl. 1), S126-8.
Surgeon General of the United States. (2014). National Prevention Strategy. Elimination of health disparities. Retrieved from http://www.surgeongeneral.gov/initiatives/prevention/strategy/health-disparities.pdf .
The background checks can take months and months, so they're walking around with a card in the meantime & #8230;That's why so many of these airport employees are arrested so long after the fact, and are continuing to be arrested in sweeps by the Justice Department. When the information finally
does come back, they see they've got somebody out there that has a felony and lied on his application, or has a warrant out, or is in the country illegally"
Civil ights Issues in Passenger Screening
While the security protocols in relation to typical potential "weapons" in the possession of passengers are fundamentally flawed, federal authorities working with British security services did identify a specific threat in 2006 that precipitated necessary precautions against more than a certain amount of liquid allowed per passenger. Unlike the other senseless concern over nail files and cosmetic scissors, this precaution was justified…
Dershowitz, a. (2002). Shouting Fire: Civil Liberties in a Turbulent Age. New York:
Little Brown & Co.
Dyer, C., McCoy, R., Rodriguez, J., Van Duyn, D. "Countering Violent Islamic
Extremism" the FBI Law Enforcement Bulletin; Vol. 76 No. 12: 3-9 (2007).
These words, 'necessary and proper,' in such an instrument, are probably to be considered as synonymous. Necessarily, powers must here intend such powers as are suitable and fitted to the object; such as are best and most useful in relation to the end proposed. If this be not so, and if congress could use no means but such as were absolutely indispensable to the existence of a granted power, the government would hardly exist; at least, it would be wholly inadequate to the purposes of its formation. 17 U.S. 316, 324-325.
Furthermore, the Court firmly established the supremacy of the Federal government, by determining that state action could not impede the Federal government's valid exercise of power. The Court determined that:
The constitution, therefore, declares, that the constitution itself, and the laws passed in pursuance of its provisions, shall be the supreme law of the land, and shall control all…
ACSBlog. "Issue Brief: 'A Call to Protect Civilian Justice: Beware the Creep of Military
Tribunals." Separation of Powers. 2008. ACSBlog. 19 Mar. 2008 http://www.acsblog.org/cat-separation-of-powers.html.
Clinton v. Jones, 520 U.S. 681 (1997).
Cole, David. "The Constitution." Harper's Magazine. 2007. The Harper's Magazine
The bottom line on ethical behavior for "civilian" agencies of the Bush Administration is that since September 11, 2001, they can follow what laws they want to, ignore what laws they want to, and even write their own laws that serve their unethical interests. Since the terrorist attacks of 2001, it is clear that Congressional oversight is very much subject to what the executive branch decides is acceptable, not what federal law requires.
Eggan, Dan. "Bush Authorized Domestic Spying." ashington Post 16 Dec. 2005, Retrieved July 30, 2006, at http://www.washingtonpost.com.
Fuchs, Meredith, & Blanton, Thomas. "CIA Claims the Right to Decide hat is News." The National Security Archive, 14 June, 2006. Retrieved July 30 at http://www.gwu.edu/~nsarchiv/news/20060614/index.htm.
Hersh, Seymour M. "National Security Dept. Listening In." New Yorker 82.15 (2006): 24-25.
The National Security Agency. "Organization and Management / Overview." Retrieved July
31, 2006, through The National Security Archive, http://www.gwu.edu/.…
Eggan, Dan. "Bush Authorized Domestic Spying." Washington Post 16 Dec. 2005, Retrieved July 30, 2006, at http://www.washingtonpost.com .
Fuchs, Meredith, & Blanton, Thomas. "CIA Claims the Right to Decide What is News." The National Security Archive, 14 June, 2006. Retrieved July 30 at http://www.gwu.edu/ ~nsarchiv/news/20060614/index.htm' target='_blank' REL='NOFOLLOW'>
Following the terrorist attacks of September 11, 2001 there has been a significant effort to protect America from any further terrorist attacks. The purpose of this discussion is to examine the U.S. National Security Agency's ability to identify and monitor the communications of terrorists and prevent terrorism from occuring. The research will also investigate how the implications of employing these techniques for foreign intelligence surveillance suggests that the Foreign Intelligence Surveillance Act ("FISA") is inadequate in addressing recent technological developments. These developments include the transition from circuit-based to packet-based communications; the globalization of communications infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis. The research will also focus on how FISA is challenged by technological developments.
The Monitoring of Communications
The National Security agency was created to "protect U.S. national security systems and to produce foreign signals intelligence information." The strategic plan of the…
Bill to Amend FISA. (2007) The United States Select Committee on Intelligence. Retrieved March 4, 2009 from; http://intelligence.senate.gov/071019/fisa.pdf
Feingold, R. (2008) Remarks of U.S. Senator Russ Feingold
Opposing H.R. 6304, FISA Amendments Act of 2008. Retrieved March 4, 2009 from;
Terrorist is Created:
Terrorist acts are usually motivated by two major reasons i.e. The belief that violence or its threat will be suitable in contributing to change and social and political injustice. Throughout history, many terrorists have stated that they chose violence because they felt they had no alternative after long deliberations. In this case, these terrorists have considered violent acts justify the ends following long deliberations. Notably, there are various factors that contribute to the development and recruitment of terrorists, especially political, religious, economic, and cultural conditions. In most cases, the political and social conditions have been considered as the major factors that result in the creation of a terrorist. Through these conditions, people choose terrorism in attempts to right perceived wrongs in their social or political lives. These individuals resort to violence or its threats when they feel that they have been stripped of their land or denied…
"The NSA Program to Detect and Prevent Terrorist Attacks -- Myth v. Reality." (2006, January
27). Office of Public Affairs. Retrieved from U.S. Department of Justice website: http://www.justice.gov/opa/documents/nsa_myth_v_reality.pdf
Zalman, A. (n.d.). The Causes of Terrorism. Retrieved November 13, 2012, from http://terrorism.about.com/od/causes/a/causes_terror.htm
This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights is followed by a summary of the research and important findings concerning this issue in the conclusion.
Background of the Issue
Beginning in June 2013, Edward Snowden, a computer analyst working for the National Security Agency began leaking thousands of classified documents. These classified documents were disclosed to the Guardian and alleged that the NSA routinely gathered telephonic metadata from telecommunications companies, allowing them to scrutinize American citizens’ Internet activities (Morrison, 2014). According to Francheschi-Bicchierai (2014), among the thousands of…
Abdo's (2013) testimony to the American Civil Liberties Union (ACLU) is about the NSA privacy breaches first exposed in depth by Edward Snowden. The speaker accuses the NSA of using intrusive and "in certain respects unlawful" surveillance methods (p. 2). The NSA has also used their surveillance techniques outside as well as inside of the United States. Abdo (2013) speaks directly to the ACLU to outline the scope of the NSA's surveillance program. The overall purpose of the speech is to suggest what role the ACLU can and should play in promoting civil liberties, which is of course the mission of the organization.
Because NSA surveillance is a direct threat to privacy and civil liberties, the subject matter is directly relevant to the core goals of the ACLU. First, the author lists some of the main components of the NSA surveillance program. A few of the components are rooted in…
Abdo, A. (2013). Testimony to ACLU.
Some of the violations of civil and human rights that have resulted for the PA include "aggressive deportations, crackdowns at borders, surveillance of mosques and homes...destroyed livelihoods, splintered families and the loss of a sense of belonging and citizenship," the group asserts on their eb site. Moreover, many peace activists, demonstrators at anti-war rallies, animal-rights groups, student organizations, and critics of the U.S. policy towards Cuba, have been monitored and added to FBI and CIA databases as potential "enemies of America."
ID CHIPS: An article in ABA Journal (Tebo, 2006) points out that employees of some companies are being asked to have ID chips implanted in their arms so their employers "can monitor their movements," Tebo writes. And while the company that is using these ID chips, (www.Cityatcher.com) can rightly say absolute security is pivotal to their customers, many experts, the article continues, "worry that the law is not…
American Civil Liberties Union. (2006). Federal Court Strikes down NSA Warrantless
Surveillance Program. Retrieved 27 Oct. 2006 at http://www.aclu.org /safefree/nsaspying/26489prs20060817.html.
Berghel, Hal. (2006). Phishing Monger and Posers. Communications of the ACM, 49(4), 21-25.
Eggan, Dan. (2005). Bush Authorized Domestic Spying. Washington Post, Retrieved 27 Oct, 2006, at http://www.washingtonpost.com .
S. mainland. The court can reject the procedures only if it finds the plan for complying with the law as "clearly erroneous." The program may also continue for a year although the law is scheduled for renewal in six months. Warrant-less eavesdropping may begin immediately and ahead of the security court approval of the procedures (Savage).
Spur of the Moment and Secret Order
Weeks after the 9/11 attacks, President ush signed a secret order, which authorized NSA to wiretap international phone calls and emails without a court order (Savage 2007).
It was expressly prohibited by the 1978 warrant law. President ush claimed that war-time powers authorized him to bypass that law. In January this year, the Attorney General said that the program was brought under the supervision of the national security court. A judge allowed some form of surveillance to continue. Several months ago, however, another judge ruled that the…
Bush, George W. The Protect America Act of 2007. National Security Agency, September 19, 2007. Retrieved on October 23, 2007 at http://www.lifeandliberty.gov/docs/bush-disc-paa07.pdf
Fact Sheet: the Protect America Act of 2007. The White House News: the White House, August 5, 2007. http://www.whitehouse.gov/news/releases/2007/08/20070806-5.html
Cable News Network. Bill Would Require Details of All Eavesdropping Since 2001. CNN Politics. CNN: Time Warner Company, October 9, 2007
Bush: Surveillance Bill Must Not Hamper Fight Against Terrorism. CNN Politics. CNN: Time Warner Company, October 10, 2007
Organized Crime elated Intelligence
Those interested in global intelligence would recognize acronyms like CIA, KGB and MSS however for the sake of those who have no knowledge in this area, they mean Central Intelligence Agency -- United States, KGB (Komitet gosudarstvennoy bezopasnosti) -- Soviet Union/ussia, and the Ministry for State Security (MSS) -- China and their activities are covered well by contemporary media. However, here we consider the less famous and covert intelligence agencies that operate currently or used to exist. A number of these agencies had specific job descriptions while the function of the rest were quite vague, however, all these agencies fulfilled their common responsibility of giving their superiors in-depth knowledge of a situation to aid their decisions (Powell, 2014)
The Frumentarii, who bear close similarities to the contemporary "secret police" like the SAVAK of Iran and the Kempeitai who existed in Japan during World War…
Greenberg, M. R., & Haass, R. (1996). Making Intelligence smarter. Council on Foreign Relations.
Juul, P. (2013, july 23). Adapting to the Future of Intelligence Gathering. Retrieved from American Progress: https://www.americanprogress.org/issues/security/reports/2013/07/23/70281/adapting-to-the-future-of-intelligence-gathering/
Nomikos, J. M. (2008). Greek Intelligence Service: A Brief Description. European Journal of Intelligence Studies.
Powell, J. (2014, July 11). A Historical View of Intelligence Gathering: From the Kryptia to the CIA. Retrieved from https://sofrep.com/37879/obscure-intelligence-agents-agencies-part-1/
Blanton, Thomas. (2006, February 4). iretap debate deja vu. National Security Archive.
Retrieved April 22, 2009 at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/index.htm
Congresswoman calls alleged wiretap 'abuse of power' (2009, April 2009). CNN.com
Retrieved April 22, 2009 at http://www.cnn.com/2009/POLITICS/04/21/harman.wiretap/
Lewis, Neil A. & Mark Mazzetti. (2009, April 20). Lawmaker is said to have aided lobbyists.
The New York Times. Retrieved April 22, 2009 at http://www.nytimes.com/2009/04/21/us/politics/21harman.html?_r=1&em
Maclin, Tracey. (2009). iretapping and electronic surveillance. Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2323/iretapping-Eavesdropping.html
iretapping and Eavesdropping -- contemporary legal status. (2009). Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2319/iretapping-Eavesdropping-contemporary-legal-status-wiretapping-eavesdropping.html
iretapping and Eavesdropping - early restrictions on electronic surveillance. Law Library.
Crime and Justice: Volume 4. Retrieved April 22, 2009 at http://law.jrank.org/pages/2318/iretapping-Eavesdropping-Early-restrictions-on-electronic-surveillance.html
iretapping and eavesdropping - The impact of electronic surveillance on personal privacy.
Law Library. Crime and Justice: Volume 4. Retrieved April 22, 2009
Blanton, Thomas. (2006, February 4). Wiretap debate deja vu. National Security Archive.
Retrieved April 22, 2009 at http://www.gwu.edu/ ~nsarchiv/NSAEBB/NSAEBB178/index.htm' target='_blank' REL='NOFOLLOW'>
The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the public could gain access of huge amount of data from anywhere in the world. The following list tells us how Internet can be used to spread evil, and assist terrorist organizations to apply more danger and fear to the world. According to Weimann (2004), the Internet has:
- easily approachable
- no single controller or regulator to control or censor information
- the makings for widespread spectators all round the globe
- the power for the user to remain…
Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training Doctrine Command, Handbook No. 1.02
Bridis, T. (2005, May 26). USA Today. Retrieved September 14, 2011, from "Silent Horizon" war games wrap up for The CIA:
Coleman, K. (2003, October 10 ). Cyber Terrorism. Retrieved September 14, 2011, from Cyber Terrorism Article: http://www.directionsmag.com/article.php?article_id=432&trv=1
The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to…
Byman, D., Wittes, B. (2014). Reforming the NSA. Foreign Affairs. 93(3), 127-138.
This source considers a number of possibilities for reforming the NSA which are viable in the wake of Snowden's security breach. It examines other country's approaches to espionage as well. In provides an in-depth read into the considerations the NSA must make for securing the country
Hackett, K. (2013). Edward Snowden: the new brand of whistle blower. Quill. 101(5), 26-31. This source examines the ramifications of the actions of whistle blowers, and attempts to deconstruct the privacy issues associated with security concerns in the U.S. It details the actions of Snowden.
Nuna, D., Di Domenica, M. (2013). Market research and the ethics of big data. International Journal of Market Research. 55(4), 2-13. This source considers the practice of amassing and analyzing big data largely from a marketing research perspective. It details the wide scope of data that is regularly stored and scrutinized regarding the lives of citizens.
FISA's recent rise to fame has been due to attempts by the Bush Administration to apply the law as justification for warrant-less wiretaps of U.S. citizens in apparent disregard of their Fourth Amendment protections. This issue will be examined in more detail below, however, it is important to first discuss some of the key court cases that help establish the Constitutionality of FISA. Specifically, this report will address three cases that directly feed into the Constitutional requirements of FISA: Olmstead v. U.S. (1928), Katz v. U.S. (1967), and U.S. v. U.S. (1972).
Olmstead v. U.S. (1928)
For the civil libertarian, the case of Olmstead v. U.S. (1928) is a nightmare violation of constitutionally guaranteed Fourth and Fifth Amendment rights. In the case, oy Olmstead was convicted of bootlegging during the Prohibition years of U.S. history. Without obtaining any kind of judicial approval, federal agents placed wiretaps in the building Olmstead…
Fein, B. (2007, March). Presidential authority to gather foreign intelligence. Presidential Studies Quarterly, 37(1), pp. 23-36.
Katz v. United States. (1967). FindLaw for Legal Professionals. Retrieved March 25, 2008, at http://laws.findlaw.com/us/389/347.html
Malooly, D.J. (1998, Winter). Physical searches under FISA: a constitutional analysis. American Criminal Law Review, 35(2), pp. 411-424.
Olmstead v. United States (1928). The Oyez Project. Retrieved March 25, 2008, at http://www.oyez.org/cases/1901-1939/1927/1927_493/
he growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. he internet is becoming a domain all to itself, with its own rules, and requirements. he internet is creating new opportunities for the business and communication industries. It is also creating new demands. he internet is now facing a period in its evolution similar to the period of our country's history of westward expansion, and settlement
Wild Wild West years of the internet have passed with the bursting of the ech bubble in the early 21st century. Now business is building entire enterprises on the net. As hundreds of thousands of dollars change hands based on digital bleeps, the needs for government, business, and individuals to protect their data is becoming of paramount importance. Who will be the exas Ranger's of the internet,…
The Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-Code" Act: (1997) Hearing on S. 1726 Before the Senate Comm. On Commerce, Science, and Transportation, 104th Cong. 13.
U.S. Government Restrictions on Cryptography Exports and the Plight of Philip Zimmermann, 13 GA. ST U.L. REV. 581, 592-600 (1997)
Yoshida, J. (1996, Oct. 14) Intel Weighs in on DVD Encryption, Elecrtronic Engineering Times.
Agnes Meyer Driscoll
Like Yardley, Agnes Meyer Driscoll was born in 1889, and her most significant contribution was also made during World War I. Driscoll worked as a cryptanalyst for the Navy, and as such broke many Japanese naval coding systems. In addition, Driscoll developed many of the early machine systems. Apart from being significantly intelligent for any person of her time and age, Driscoll was also unusual in terms of her gender. Her interests led her to technical and scientific studies during her college career, which was not typical for women of the time (NA). When she enlisted in the United tates Navy during 1918, Driscoll was assigned to the Code and ignal section of Communications, where she remained as a leader in her field until 1949.
As mentioned above, Driscoll's work also involved remerging technology in terms of machine development. These were aimed not only at creating ciphers,…
Kovach, Karen. Frank B. Rowlett: The man who made "Magic." INSCOM Journal, Oct-Dec 1998, Vol. 21, No 4. http://www.fas.org/irp/agency/inscom/journal/98-oct-dec/article6.html
Ligett, Byron. Herbert O. Yardley: Code Breaker and Poker Player. Poker Player, 3 Oct 2005. http://www.*****/viewarticle.php?id=681
McNulty, Jenny. Cryptography. University of Montana, Department of Mathematical Sciences Newsletter, Spring 2007. http://umt.edu/math/Newsltr/Spring_2007.pdf
National Security Agency. Agnes Meyer Driscoll (1889-1971). http://www.nsa.gov/honor/honor00024.cfm
The author of this report is asked to answer to a number of questions relating to counter-terrorism frameworks. First, the author is asked to provide a revised framework for the national terrorism prevention and response agencies in the United States. Per the parameters of the assignment, there are to be at least three agencies involved in the revised framework. Subsequent to that, the author is asked to answer to how and when the agencies will interact and why. The author is asked what tools can be used to help the agencies function and do their jobs and that will be included in the framework summary. The author is asked to wrap up the paper by enumerating at least three policy and/or procedural recommendations that should be implemented to make the existing framework gel and function more effectively.
The existing framework for law enforcement and…
Boehm, E. (2013, August 20). New audit finds IRS can't keep track of its own software Watchdog.org. Watchdog.org - The Government Watchdog. Retrieved September 2, 2013, from http://watchdog.org/101977/new-audit-finds-irs-cant-keep-track-of-its-own-software/
Cillizza, C. (2013, May 21). Everything you need to know about the IRS scandal. The Washington Post: National, World & D.C. Area News and Headlines - The Washington Post. Retrieved September 1, 2013, from http://www.washingtonpost.com /blogs/the-fix/wp/2013/05/21/what-we-know-and-what-we-dont-about-the-irs-scandal/
DOJ. (2004, November 1). Special Report: A Review of the FBI's Handling of Intelligence Information Prior to the September 11 Attacks. Welcome to the United States Department of Justice. Retrieved September 2, 2013, from http://www.justice.gov/oig/special/0506/chapter2.htm
Poulson, K. (2013, August 29). New Snowden Leak Reports 'Groundbreaking' NSA Crypto-Cracking | Threat Level | Wired.com. wired.com . Retrieved September 2, 2013, from http://www.wired.com/threatlevel/2013/08/black-budget/
The NSA had been illegally investigating several journalists and even violating their privacy by monitoring their telephone use through systems and capabilities designed for use against terrorist suspects only.
Fourth Amendment constitutional rights prohibit any such use of surveillance without judicial authorization, typically, a search warrant or wire tap warrant issued after a formal presentation of evidence and the establishment of probable cause, as required by the original text of the Fourth Amendment (Schmalleger, 2008). According to the accounts published, the NSA specifically targeted journalists known to have been critical of the presidential administration of George . Bush, which may raise other significant constitutional problems even beyond the Fourth Amendment issues (Scmalleger, 2008).
Possible Solutions to Balancing Effective Counterterrorism and the Fourth Amendment:
As pointed out by national security expert Randall Larsen (2007), one of the main problems with the so-called ar on Terror as conceived by the former presidential…
Larsen, R. (2007). Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing.
Schmalleger, F. (2008). Criminal Justice Today: An Introductory Text for the 21st
Century. New Jersey: Prentice Hall.
America's War on Terrorism since the attacks of eptember 11th, 2001.
America's war on Terrorism since 9/11 has largely been conducted in intensifying domestic security in all areas. The highlight has been capturing Osama bin Laden, followed by a phased extraction of the American Army out of Iraq. Nonetheless, security alert is on an all-time high and Defense receives a high proportion of fiscal allocation and focus.
government has also stepped up its surveillance system constructing a highly intricate and controversial eavesdropping data-system base that is run by the National ecurity Agency and contains trillions of e-mails, web searches and commercial transactions." (McGregor 2011)). A similar system, on as massive a scale, will almost be complete in an Antonio, Texas. Both of these systems support the NA's headquarters in Fort Meade, Maryland and house everything "from records of phone calls to and from Iran to credit card purchases by potential…
Some see U.S. policy after 9/11 as being driven by an ebullient arrogant stance of force rather than talk and by a hubris that came from their knocking down Saddam Hussein. McGregor (2011), however, concludes that "ten years after 9/11, the U.S. is war-weary and introspective in a way it has not been for a generation." The federal budget has been depleted, and the country is insecure. Nonetheless, positive things have occurred as a result. The different government departments have been brought together, new ones have been constructed, and old ones reformed. And the country is watched over as it has never been before.
McGregor, R (September 6, 2011) America after 9/11: A nation fixated with its security. Analysis http://www.ft.com/cms/s/0/60886c9e-d892-11e0-8f0a-00144feabdc0.html#axzz2923vp4uc
Iraq invaded Kuwait. The invasion lasted a few days and on August 8th Iraq announced that Kuwait was its nineteenth province. The same day the invasion began, the United Nations denounced the attack and passed Resolution 660, which condemned the Iraqi invasion and called for immediate and unconditional withdrawal from Kuwait. The United States began mobilizing its military on August 7th.
y the time the UN deadline arrived in January of 1991, The United States had amassed hundreds of thousands of troops in the Persian Gulf Region. The war began on January 17th with bombing sorties. Over the next month, 67,000 sorties would be flown over Iraq. Operation Desert Storm was launched on February 24th, and Coalition ground forces entered the fight. The war was won in less than four days. The cease-fire began on 8am, February 28th. Iraq was defeated and Kuwait was liberated.
In a strategic sense, Operation…
April Glaspie Transcript." What Really Happened. 1996. What Really Happened. 9 Mar 2004 http://www.whatreallyhappened.com/ARTICLE5/april.html
Chronology of the Kuwait Crisis." The Kuwait Information Office. 2004. The Kuwait
Information Office. 9 Mar 2004 http://www.kuwait-info.org
Final Report to Congress: Conduct of the Persian Gulf War." Apr 1992. The National Security Archive 11 Feb 2004. George Washington University. 9 Mar 2004 http://www.gwu.edu/ ~nsarchiv/nsa/the_archive.html
In an ever increasingly complex governmental infrastructure, the importance of communication, mission and strategy are of the utmost importance. The Department of Defense (DOD) and all of its law enforcement agencies are in a pervasive struggle to attain both accurate and actionable intelligence in order to perform their duties to the best of their capabilities and intentions.
The purpose of this research paper is to explore the failure of the intelligence process due to extraneous levels of bureaucratic organization. This essay will attempt to explain the many failures of the Department of Defense law enforcement entities as a result of this type of organization.
In order to understand this argument, this essay will first look at the problem itself and try to identify the root cause of these failures. Past failures of intelligence gathering will be examined to help contextualize the argument and give credence to the idea…
Chesney, R. (2011). Military-Intelligence Convergence and the Law of Title 10/Title 50 Debate. J. Nat'l Sec. L. & Pol'y, 5, 539.
Clapper, J. (2011). How 9/11 Transformed the Intelligence Community. The Wall Street Journal 7 Sep 2011. Retrieved from http://online.wsj.com/news/articles/SB10001424053111904537404576554430822300352
Foust, J. (2013). Throwing the Intelligence Community Under the Bus. Beacon Journal 29 Oct 2013. Retrieved from http://www.beaconreader.com/joshua-foust/throwing-the-intelligence-community-under-the-bus
Gusterson, H. (2011). Atomic Escapism? American Scientist, Jan -- Feb 2011. Retrieved from http://www.americanscientist.org/bookshelf/pub/atomic-escapism
This as an important moment in the history of the Cold War because it marked the start of a new series of talks between the Palestinians and the Israeli side. This moment also proved the importance of the State Secretary in relation to the issues of foreign policy and the international community.
At this moment, some of the most important cabinets in the executive concern issues such as internal affairs and job security. These are essential portfolios from the perspective of internal and external factors. The homeland security refers in particular to aspects which take place inside the borders of the U.S. And tackle the threats that are visible on the U.S. territory. There are several departments inside the Homeland Security portfolio. These concern issues of counterterrorism, border security, immigration, or cybersecurity
. Counterterrorism measures are crucial at this moment, especially given the national security advisory which changed to orange…
Department of Homeland Security. 2010. Accessed from http://www.dhs.gov/index.shtm
Department of Homeland Security. Counterterrorism. 2010. Accessed from http://www.dhs.gov/files/counterterrorism.shtm
Department of Labor. On the Recovery Act. 2009. Accessed from http://www.dol.gov/recovery/
Department of Defense. Travels with Gates. 2010. Accessed from http://www.defense.gov /' target='_blank' REL='NOFOLLOW'>
Meanwhile Congress was reluctant to challenge Bush (members feared being termed "unpatriotic" since Bush argued that the safety of Americans depended on the secret surveillance done by NSA) immediately, but in the past few months Congress (the House Intelligence and Judiciary Committees) has demanded - and in part received - access to internal documents on the wiretapping program. "That access could ultimately help persuade skeptical lawmakers in the House, which so far has rejected the immunity idea, to sign on to the hite House's Plan" (Lichtblau 2008) according to the New York Times.
Indeed the Senate in January 2008 gave immunity for the phone companies that helped the NSA tap phones secretly, which means Verizon, at&T, et al., cannot be sued for assisting the Bush Administration with its warrantless wiretapping program (there are over 40 lawsuits pending over the phone companies' roles in the wiretapping). So here is a case…
American Civil Liberties Union (ACLU). "Safe and Free: Restore our Constitutional Rights."
Retrieved February 7, 2008, at http://www.aclu.org .
Cornell University Law School. "United States Constitution: Article I." Retrieved February 7, 2008 at http://www.law.cornell.edu/constitution/constitution.articlei.html .
Cutler, Leonard. "Human Rights Guarantees, Constitutional Law, and the Military Commissions
He sat on the issue until he was able to retire and then brought the unethical actions into the light. In the meantime, the government through the NSA was amassing significant information about the Internet usage of American citizens. No matter the justification for this action, it cannot be supported ethically. As individuals, we may have nothing to hide, but the erosion of civil liberties and privacy is a dangerous precedent to set. The information gathered today could easily be used against American citizens in the future, should some new justification be conjured up. It is crucial that unethical it behavior is rooted out at every possible opportunity. Only by speaking out against illicit behavior can we operate in the it world with clear consciences.
Gibbs, Mark. "iretapping, histle Blowing and it Ethics." Network orld. 9 Nov. 2007. 28 Nov. 2007 http://www.networkworld.com/columnists/2007/110907backspin.html.
Gibbs, Mark. "Wiretapping, Whistle Blowing and it Ethics." Network World. 9 Nov. 2007. 28 Nov. 2007 http://www.networkworld.com/columnists/2007/110907backspin.html .
"We have the right to question this situation," Zrihen said in the statement. "The presidency of the EU, which is a central element of the European legislative process, and is supposed to obey the democratic principles, accepts to be sponsored by a private company whose economic interests are directly put into cause by a legislative proposition on the agenda of the Council...Furthermore, knowing that the 'compromise' proposal emanating from the Irish presidency rejects all of the European parliament's first lecture amendments, which corresponds to the demands of Microsoft, there is a feeling of great worry"(Preimesberger, May, 14, 2004).
To conclude with, no one can deny Microsoft's positive impact on Germany, but this mustn't be used as a screen for its reprobatory actions that should be made public by the mass-media according to their gravity.
Ketmann, Steve. "Germany Denies Microsoft an." Wired News. 19 March 2001.
Ketmann, Steve. "MS Denies…
Ketmann, Steve. "Germany Denies Microsoft Ban." Wired News. 19 March 2001.
Ketmann, Steve. "MS Denies Windows 'Spy Key'." Wired News. 3 September 1999.
Peregrano, Rob. "Microsoft Windows: Insecure by Design." Washington Post. 24 September 2003.
Preimesberger, Chris. "Anti-Microsoft protest planned for EP session May 17." News Forge. 14 May 2004.
On the other hand, hittaker Chambers was "a contributing editor of Time (...) from 1925 to April 1938, (he) had been a Communist, a writer of radical literature, an editor of the Communist Daily orker. He had also been what was then vaguely known as a Communist courier."
The major starting point of the case was Chambers' disappointment with the communist doctrine and the dual attitude Stalin had when signing the 1939 pact with the Nazi leadership. Therefore, according to Time Magazine, he "abandoned the party in revulsion and despair, and became a determined enemy of Communism." Consequently, outraged by the dramatic turn that the soviet politics had taken, he began expressing his views on the collaborators of the soviet regime in the U.S. It is in this way that Chambers contacted Berle, who, after the discussion he had with the former communist partisan, wrote in his notes from September…
Abrahamsen, David. Nixon vs. Nixon: An Emotional Tragedy. New York: Farrar, Straus and Giroux, 1976
Adolf Berle's Notes on his Meeting with Whittaker Chambers. Responses, reflections, and occasional papers. Avaliable on Internet, http://www.johnearlhaynes.org/page100.html#_ftnref3 . Accessed 15 October 2006
Crowell, William P. Remembrances of Venona. Available from Internet, http://history.sandiego.edu/gen/text/coldwar/venona-crowell.html. Accessed 15 October 2006
Excerpts from Grand Jury Hearings Relating to the Alger Hiss Case December, 1948. Available from Internet, http://www.law.umkc.edu/faculty/projects/ftrials/hiss/hissgrandjury.html. Accessed 15 October 2006.
U.S. intelligence refers to some of the most formidable and top intelligence available in the world. The United States has long led the way in the practice of gathering the most up-to -- the minute and esoteric intelligence regarding the actions of other countries, other armies and the other enemies. The current modern age has demonstrated the steady advancement in this regard of a range of sound technological tools which America has harnessed consistently for the effective pursuit of the most current and hard to gather intelligence.
The use of combat drones has been something that America has long used to gather intelligence and to engage in warfare with enemies or suspected enemies. However, in the last 12 months, the usage of drones has steadily decreased. "The number of drone strikes approved by the Obama administration on suspected terrorists has fallen dramatically this year, as the war with al…
Aljazeera.com. (2013, October). U.S. 'drone strike' kills senior Shabab members. Retrieved from aljazeera.com: http://www.aljazeera.com/news/africa/2013/10/drone-strike-kills-senior-shabab-members-20131028184651994308.html
BBC. (2013, October). Pakistan says drones killed 67 civilians since 2008. Retrieved from BBC.co.uk: http://www.bbc.co.uk/news/world-us-canada-24742037
FAS.org. (n.d.). Military Intelligence Satellites. Retrieved from Fas.org: https://www.fas.org/irp/imint/docs/rst/Intro/Part2_26e.html
Galbraith, P. (2013, October). NSA spying on Europe gives the U.S. more intelligence, but not better. Retrieved from Theguardian.com: http://www.theguardian.com/commentisfree/2013/oct/29/nsa-spying-europe-us-intelligence
Privacy & Civil Liberties
needs to communicate goals to the American public that include protecting the nation against threats to national security, ensuring the safety of citizens, friends, allies, and nations with cooperative relationships (Clarke, 2013). Promote national security and foreign policy interests, including counterintelligence, counteracting, and international elements of organized crime. Protect the right to privacy. Protect democracy, civil liberties, and the rule of law, eliminating excessive surveillance and unjustified secrecy. Promote prosperity, security, and openness in a networked world adopting and sustaining policies that support technological innovation globally and establish and strengthen international norms of Internet freedom and security. Protect strategic alliances that preserve and strengthen strategic relationships, protect those relationships, and recognize the importance of 'cooperative relationships'.
The U.S. government must protect national security and personal privacy that includes Fourth Amendment rights. Risk management should involve the rights to privacy, freedom and liberties on the internet and…
Clarke, R.A. (2013). Liberty and Security in a Changing World. The President's Review Group on Intelligence and Communications Technologies.
Best Practice Wireless Network Security
Best Practices for Network Security
Wireless network is a technology that relies on radio waves instead of wires in connecting computer devices to the internet. There is a transmitter, with the name wireless access point or gateway, wired into an internet connection, which provides a "hotspot" transmitting the connectivity over radio waves. Hotspot has the capability to identify information, that include an item known as an SSID (service set identifier), that enable computer devices to locate them. For computer and other devices that have been equipped with wireless card as well as have permission to access the wireless frequency can then have the opportunity to connect to the network. There are some computer and other devices that may be able to automatically identify open wireless networks within a particular area, and for some you may be required to locate and enter the information manually like…
Gast. Matthew S. (2002) "802.11 Wireless Networks" The Definitive Guide O'Reilly & Associates Inc., Sebastopol, CA.
James F. Kurose, Keith W. Ross, (2001) "Computer Networking, A top-down approach featuring the Internet," 1st edition, Pearson Education.
Matt Lytle (2010) Securing Wireless Networks. Retrieved June 20, 2014. http://www.us-cert.gov/ncas/tips/ST05-003
Molta .D. (2002) WLAN security on the rise. Network Computing, 3(3):86 -- 9
Policy Case Study
The author of this report has been asked to act as a consultant for a major security consulting firm. Contained within this report will be several topics that were requested to be covered and thus they will be with the appropriate amount of vigor and detail. The first topic will be a brief overview of the overall legal environment for non-information technology managers when it comes to things like constitutional law, administrative law, civil law, criminal law, due care, due diligence and overall fiduciary duty. Another major topic that will be covered is the applicable information security laws and practices. Next up will be the impact of policies, regulations and laws when it comes to the information security sphere. The next topic, and a very controversial one in the eyes of many, is the Central Intelligence Agency including is practices, what has been in the news about…
ABA. (2015). What Are the Limits of Employee Privacy? | Solo, Small Firm and General
Practice Division. Americanbar.org. Retrieved 10 June 2015, from http://www.americanbar.org/publications/gp_solo/2012/november_december2012pr
DHS. (2004). Information Security Governance - A Call To Action. Department of Homeland Security. Retrieved 10 June 2015, from https://www.dhs.gov/sites/default/files/publications/csd-informationsecuritygovernance-acalltoaction-2004.pdf
ight to privacy has been under attack in recent years from many sources. Issues such as terrorism and technological development has provided an opportunity and an excuse to lessen the protections that have been previously awarded Americans, as well as citizens of a number of other countries, in the name of their own protection. Albeit the threats of terrorism are real, there are also a series of threats that come from the violation of citizens' right to maintain their privacy in their daily activities. It is not only an invasion of privacy from the governments around the world that is an issue, but private organizations are also able to collect an immense amount of intrusive data about their customers or target markets. A legitimate balance between these concerns must be reached and in a timely manner because there is a significant amount of evidence that this balance is uneven and…
Gellman, B. (2013, December 23). Edward Snowden, after months of NSA revelations, says his mission's accomplished. Retrieved from The Washington Post: https://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
Sadowski, J. (2013, February 26). Why Does Privacy Matter? One Scholar's Answer. Retrieved from The Atlantic: http://www.theatlantic.com/technology/archive/2013/02/why-does-privacy-matter-one-scholars-answer/273521/
Federal Intelligence Surveillance Court (FISA Court)
According to a recent CNN report on surveillance, the Federal Intelligence Surveillance Court (FISA Court) is "the most powerful court you have never heard of" (Mears & Abdullah 2014). Because authorization to 'snoop' cannot be given in a public forum, the court was created to approve various National Security Agency requests to spy on private citizens. However, critics contend that the court's lack of transparency means that it "rubber-stamps nearly every National Security Agency request to snoop that it receives" (Mears & Abdullah 2014). Interestingly enough the FISA Court was actually intended introduce at least some accountability and 4th Amendment protections for Americans in the Cold War era when national security concerns had generated highly secretive government entities like the CIA and FBI, both of which functioned with little oversight from Congress or the judiciary. As specified by the Foreign Intelligence Surveillance Act (1978)…
Ackerman, S. & Ball, J. (2014). NSA performed warrantless searches on Americans' calls and emails -- Clapper. The Guardian. Retrieved from:
Lindeman, T. (2013). Foreign Intelligence Surveillance Court. The Washington Post. Retrieved from: https://www.washingtonpost.com/politics/the-foreign-intelligence-surveillance - court/2013/06/07/4700b382-cfec-11e2-8845-d970ccb04497_graphic.html
Mears, B. & Abdullah, H. (2014). What is the FISA court? CNN. Retrieved from:
Privacy Matters: Introduction to Sociology.
As Glenn Greenwald points out, the Internet has been turned into a tool of mass surveillance, notably with the NSA always lurking and spying on the Digital Era’s best means of communication. To some extent this type of spying and violation of privacy has become accepted as the norm because sociopolitical discourse in the modern era presupposes that there are two types of people in the world, as Greenwald puts it—those who are good (who do not plot against the state) and those who are bad (terrorists who do plot against the state). Those who are good have nothing to hide and therefore should not mind if the state snoops around and peeks into one’s personal messages and private life to make sure you are still one of the good guys. The problem with this is that it is a violation of trust and privacy…
S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate under some circumstances cannot be used in circumstances where they are inappropriate under U.S. law.
4. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist about expanding the use of FISA?
The Foreign Intelligence and Surveillance Act of 1978 (FISA) was established to regulate the use of surveillance by the executive branch of government in the wake of various unconstitutional investigations conducted by the Nixon administration in connection with monitoring political rivals and government opposition groups. The FISA Act authorized the covert monitoring of information and communication exchanges of entities of foreign governments engaged in espionage and intelligence collection activities in the U.S. pursuant…
It was also a pivotal tool in discovering the ussian nuclear missile sites that sparked the Cuban Missile Crisis in 1962. The U.S. also gained spy satellites in 1960, and combined with the U-2 and other tools, American technological superiority began to assert itself. The spy satellites were a direct result of rocketry experimentation during and after World War II, and many German rocket scientists transplanted to America helped create the rockets that would launch the satellites. The scope of the intelligence operations was growing, and so were the technological advances that helped the agencies grow and learn more every day.
There are many who believe that factors such as the Cold War may help develop new agencies, but they have little to do with how the agencies evolve. Author Zegat continues, "The truth is that international factors such as the onset of the Cold War may catalyze the…
Andres, Christopher. For the President's Eyes Only. (New York: HarperPerennial), 1996.
Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century. New York: Doubleday, 2001.
Painter, David S. The Cold War: An International History. London: Routledge, 1999.
Powers, Thomas. Intelligence Wars: American Secret History from Hitler to al-Qaeda. New York: New York Review Books, 2002.
This software is used to perform common tasks like storage, data back up and data transfers.
Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage.
The flying Organizations
Smart companies are looking at the various aspects of the cloud and pushing some application into the cloud and some into the traditional data center environment. The most significant value of cloud computing is not just the cost benefit but agility for the whole business. This is done by creating an opportunity for firms to upload anything concerning their IT infrastructure to an outside provider. With cloud you only contract for the services you need and at the…
Allen, B (2009).Cloud Computing Will Reshape IT Forever
Beaman, K. (2010). "Continued Growth of SaaS for HCM."
Under Clinton's administration, the CIA was a low-priority issue and American intelligence services became sucked up into the Washington political circles and in useless bureaucracy. Business trumped national security in terms of importance, which is why the CIA reduced the numbers of field operatives like Baer. Fewer officers were trained in local languages and customs in order to infiltrate terrorist organizations before they could wreak havoc. The reduced numbers of field officers meant less intelligence and more potential for terrorists to organize attacks such as September 11.
Most readers will find Baer's book shocking and frightening, given that it will take many years for American intelligence to grow back in stature and effectiveness. Additionally, the CIA's emphasis on technology over people, on business over security, on political correctness over the real and gritty work of a real security officer, might come as a surprise to those who still believe that…
The law enforcement in the U.S.A. today is better equipped to handle the terrorism attacks and any terrorism threats than it was before the 9/11 incidence in America. This is evident in the general ways through which the security measures are implemented in the country and the intricate manner of investigations that take place to counter terrorism.
Due to the nature of the data and information that is needed here, the scientific method employed was statistical data collection. This was due to the fact that there is need to have objective information on the facts surrounding the various arms of law enforcement. The best way to have facts behind the changes that took place after the 9/11 in terms of the quality of training and the number of law enforcement agencies, it was not feasible to conduct interviews among the Americans as they would only give a general…
Central Intelligence Agency, (2011). About CIA. Retrieved January 29, 2011 from https://www.cia.gov/about-cia/index.html
National commission on Terrorist Attack Upon United States, (2004). Counter Terrorism evolves. Retrieved January 28, 2011 from http://govinfo.library.unt.edu/911/report/911Report_Ch3.htm
US Department of Justice, (2006). Legal Authorities Supporting the Activities of the National SECURITY Agency Described by the President. Retrieved January 28, 2011 from http://www.justice.gov/opa/whitepaperonnsalegalauthorities.pdf
Airport Screening for Terrorists
There are a variety of reasons why United States security does not profile terrorists, particularly at major national and international venues such as airports. The main reason why terrorists are not profiled in this setting is because it is virtually impossible to devise a neat, categorical description of what a quintessential terrorist is/looks like. It is true that virtually all of the terrorists involved in the destruction of the World Trade Center were Middle Eastern men from the ages of 20 and 40. Does this fact mean that a Middle Eastern man who is 41, for instance, could not be a terrorist? Or perhaps one that is 19? Although the terrorists who destroyed the World Trade Center all fit one neat category, others do not. For instance, the young man from Nigeria who attempted to detonate some sort of homemade explosive while above Detroit was not…
Faris, S. (2013). "Have the NSA leaks compromised big data's future?" DATAVERSITY. Retrieved from http://www.dataversity.net/have-the-nsa-leaks-compromised-big-datas-future/
Huddy, L. Feldman, S. (2011). "Americans respond politically to 9/11: Understanding the impact of the terrorist attacks and their aftermath." American Psychologist. 66 (6): 455-467. Retrieved from http://ehis.ebscohost.com.ezp.waldenulibrary.org/eds/pdfviewer/pdfviewer?vid=3&sid=6c5746c9-4b73-4b98-b07f-37a2c3b154f1%40sessionmgr13&hid=4
Neria, Y., DiGrande, L, Adams, B.G. (2011). "Posttraumatic stress disorder following the September 11, 2001, terrorist attacks." American Psychologist. 66 (6): 429-446. http://ehis.ebscohost.com.ezp.waldenulibrary.org/eds/pdfviewer/pdfviewer?sid=6c5746c9-4b73-4b98-b07f-37a2c3b154f1%40sessionmgr13&vid=4&hid=4
ationalism Politics Impacts Public's View
The six deadly sins in public administration are mandated in Drucker's "The deadly sins in public administration." The first one is to have too great of a "lofty objective" (Drucker, 1980, p. 103) in the aim that a program is trying to achieve. Programs need to have objectives that are specific and not targeted towards some general good. The next one is to incorporate too wide a scope of objectives in programs. It is much better to start out with a finite (or a single) objective and then attempt to move on to another initiative than to do too many things at one time. The third deadly sin is overstaffing. Simply by sending a great number of people to address a problem will never replace adequately thinking through a solution.
The fourth is to not sufficiently test a theory before applying it. Administrators need to…
Behn, R.D. (2003). "Why measure performance? Different purposes require different measures." Public Administration Review. 63 (5): 586-606.
Drucker, P.F. (1980). "The deadly sins in public administration." Public Administration Review. 40 (2): 103-106. Retrieved from http://ehis.ebscohost.com.ezp.waldenulibrary.org/eds/resultsadvanced?sid=22c51486-3a0f-4394-93b3-bb44ec64223d%40sessionmgr14&vid=4&hid=17&bquery= (public+administration)+AND+(deadly+sins)&bdata=JmNsaTA9RlQmY2x2MD1ZJnR5cGU9MSZzaXRlPWVkcy1saXZlJnNjb3BlPXNpdGU%3d
Faris, S. (2013). "Have the NSA leaks compromised big data's future?" www.dataversity.net. Retrieved from http://www.dataversity.net/have-the-nsa-leaks-compromised-big-datas-future/
9/11 and the ITPA
Under the National Security Act of 1947, the Director of Central Intelligence (DCI) was charged with the task of coordinating all national intelligence activities within the U.S. government. One major reason for this change was the failure of coordination and analysis across the intelligence agencies in predicting the attack on Pearl Harbor in 1941. Indeed, so glaring were the failures to 'connect the dots' in determining the intentions of the Japanese that they gave rise to at least as many conspiracy theories as the September 11 attacks, such as the idea that Franklin oosevelt knew about the attack in advance and permitted it to happen so the U.S. would enter the Second World War. In practice, the coordination of intelligence activities never really occurred, and many similar failures occurred in the future, such as the CIA's inability to predict the outbreak of the Korean War or…
Best, R.A. And A. Cumming. (2011). "Director of National Intelligence Statutory Authorities: Status and Proposals." Congressional Research Service. 7-7500, January 12, 2011.
Fingar, T. (2008). "Analytic Transformation: Unleashing the Potential of a Community of Analysts." Office of the Director of National Intelligence, September 1, 2008.
Hearing of the Senate Select Committee on Intelligence. (2007). Progress on Intelligence Reform, January 23, 2007.
Progress on Intelligence Reform. (2007). Office of the Director of National Intelligence. Statement to the Senate Select Committee on Intelligence, January 23, 2007.
Tonkin Gulf Crisis
The Debate over the Tonkin Gulf Crisis
The Tonkin Gulf Crisis 1964 ranks with the Japanese attack on Pearl Harbor and the assassination of President John F. Kennedy as events that David Kaiser of the U.S. Naval War College refers to as "controversies in American political history that dwarf all others (Ford, 1997)."
There is evidence that President Lyndon Johnson deliberately lied about the incidents leading to the Vietnam War to ensure that plans for war were supported. However, many opponents of this claim say that this is not so. According to Sedgwick Tourison in the book Secret Army, Secret War and Dr. Edwin Moise's Tonkin Gulf and the Escalation of the Vietnam War, evidence that Johnson's administration was deceitful is becoming clearer than it was (Ford, 1997).
Today, Tonkin Gulf researchers are still examining the evidence to determine whether or not Johnson's administration intentionally instigated the…
Austin, Anthony. (1971). The President's War. Lippincott.
Cohen, Jeff. Solomon, Norman. (July 27, 1994). 30-Year Anniversary: Tonkin Gulf Lie Launched Vietnam War. Media Beat. Retrieved from the Internet at http://www.fair.org/media-beat/940727.html .
Department of State Bulletin. (August 24, 1964) The Tonkin Gulf Incident: President Johnson's Message to Congress. Retrieved from the Internet at http://pages.xtn.net/~wingman/docs/tonkin.htm.
Ford, Ronnie. (August, 1997). New Light On Gulf Of Tonkin. Vietnam Magazine, pp. 165-172.
Fear of the Return of Totalitarian Architecture Due to Technological Advancements
This paper examines some of the different aspects of the coming worldwide technological totalitarianism and the expanding of it influence. The argument that this is both a conscious and accidental program of influential individuals and organizations carried out through the procedure of reification of philosophical beliefs which are misshapen into institutions, services, technologies policies and in the end, culture. Some experts that have explored this topic believe that by pay no attention to the costs of new technologies, what there may be some kind of loss in the bargain and that it can lean so something that is immeasurable and potentially disastrous. It is obvious that history was not or is not all the way inevitable, however, it is likewise a question of human values in connection to changes that are looked at as being natural. Although there have…
Carpo, Mario. "Architecture in the Age of Printing." The History of Architectural Theory. Library of Congress Cataloging-in-Publication Data, 6 March 1998.
-- . "The Alphabet and the Algorithm." Library of Congress Cataloging-in-Publication Data. The MIT Press, 7 May 1995.
Giroux, Henry. Totalitarian Paranoia in the Post-Orwellian Surveillance State. 14 Feruary 2014. http://billmoyers.com/2014/02/11/totalitarian-paranoia-in-the-post-orwellian-surveillance-state/ . 18 March 2014.
Keller, Marcello Sorce. "Why is Music so Ideological, Why Do Totalitarian States Take It So Seriously: A Personal View from History, and the Social Sciences",." Journal of Musicological Research, XXVI 2.3 (2007): 91 -- 122.
Company's Data Needs
Data protection is an important aspect of modern day businesses and organizations because data is the lifeblood of their business and operations. Some of the major examples of a company's data include financial information, legal records, and customer information. Given the significance of this type of information, it is increasingly critical for a company to protect its data in order to guarantee successful operations. In the recent past, data protection has emerged as a major factor for companies' operations because of the numerous challenges brought by rapid technological advancements. egardless of the size and industry of the company, many organizations experience challenges associated with data backup and recovery ("Data Protection," n.d.). The most appropriate way of dealing with these challenges involves determining a company's data and planning for data needs through effective data security policies and approaches.
The Company's Data
Google Inc. is a search engine company…
"Data Protection." (n.d.). Quantum - Solutions. Retrieved August 30, 2014, from http://www.quantum.com/solutions/dataprotection/index.aspx
"Example Data Protection Policy." (n.d.). Kogan Page. Retrieved August 30, 2014, from http://www.koganpage.com/static/document?id=1545
Gellman, B. & Soltani, A. (2013, October 30). NSA Infiltrates Links to Yahoo, Google Data
Centers Worldwide, Snowden Documents Say. The Washington Post. Retrieved August 30, 2014, from http://www.washingtonpost.com /world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
Israel collects intelligence on American foreign policy related to Israel and the Middle East, as well as on scientific and technological developments, including those from the private sector. The gathering of intelligence from a foreign ally is neither an unusual nor new practice. Moreover, the United States reciprocates the favor and likewise gathers intelligence on Israel. The Untied States certainly cannot expect Israel or any other nation to refrain from using surveillance, while at the same time gathering intelligence against those very same nations. For Israel, areas of general interest for Israeli intelligence collectors include military and economic policy and of course, intelligence services themselves such as the CIA (Caramela, 2014). Intelligence is used to bolster Israel's own national security, military, and technological capabilities. The methods Israel uses to gather intelligence are varied and range from computer hacking to communications surveillance. easons for gathering intelligence on an ally are…
Caramela, S. (2014). The impact of Israeli intelligence collection on the United States. Retrieved online: http://www.academia.edu/6604031/The_Impact_of_Israeli_Intelligence_Collection_on_the_United_States
Giraldi, P. (2008). The spy who loves us. The American Conservative. 2 June, 2008. Retrieved online: http://www.theamericanconservative.com/articles/the-spy-who-loves-us/
Ketcham, C. (2009). Israeli spying in the United States. Counterpunch. Retrieved online: http://www.counterpunch.org/2009/03/12/israeli-spying-in-the-united-states/
Nakamura, D. & DeYoung, K. (2013). Obama defends U.S. intelligence-gathering tactics. The Washington Post. 1 July, 2013. Retrieved online: http://www.washingtonpost.com /world/europe/kerry-in-brunei-faces-european-anger-of-snowdens-nsa-disclosures/2013/07/01/b223aeb8-e247-11e2-a11e-c2ea876a8f30_story.html
Traffic Analysis/Homeland Security
One of the biggest challenges currently faced by the Department of Homeland Security is guaranteeing cybersecurity. Each and every day some type of cyber crime occurs. Such crimes have the potential to affect the country's national security. This paper investigates the significance of internet traffic and analysis to Homeland Security. It will look at the importance of internet traffic and analysis to Homeland Security as well as encrypted traffic and its implications to cyber-security. The manner in which the U.S. has handled cybersecurity over the past twenty years and the methods that the government has used in this time period will be discussed. Encrypted mobile messaging applications will also be discussed. At the end of the discussions, solutions are recommended and a conclusion given.
In the recent past, the DHS (Department of Homeland Security) and the DoD (Department of Defense) signed an agreement to enhance the…
Bobby, M. (2010, November 10). Harvard National Security Journal. Harvard National Security Journal -- DoD-DHS Memorandum of Understanding Aims to Improve Cybersecurity Collaboration. Retrieved January 27, 2016, from http://harvardnsj.org/2010/11/dod-dhs-memorandum-of-understanding-aims-to-improve-cybersecurity-collaboration/
(2012). DHS Can Strengthen Its International Cybersecurity Programs. Retrieved January 27, 2016, from http://www.oig.dhs.gov/assets/Mgmt/2012/OIGr_12-112_Aug12.pdf
(2015, May 10). Fox News - Breaking News Updates -- Latest News Headlines -- Photos & News Videos. 'Terrorism has gone viral': U.S. officials, lawmakers warn of growing jihad-inspired attacks -- Fox News. Retrieved January 27, 2016, from http://www.foxnews.com/politics/2015/05/10/mccaul-terrorism-has-gone-viral.html
Harknett, R., & Stever, J. (2015). The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen. Journal of Homeland Security and Emergency Management, 6(1).
It is difficult to assess whether the creation of the Department of Homeland Security has been effective in protection national security. The most obvious issue is that there are a lot of variables at play, and "protecting national security" is a hopelessly vague concept that would have to be operationalized before making such an assessment, in any meaningful empirical way. The DHS was created in 2002 in response to the 9/11 terrorist attacks. The prevailing sentiment at the time was that there were communication failures among different agencies that created gaps in national security, gaps that the terrorists exploited. Agencies that were rolled into DHS included the U.S. Customs Service, INS, the TSA, FEMA, the U.S. Coast Guard and the Secret Service. In that sense, DHS is an amalgam of existing resources, and the main benefit of its creation should have been improved interagency communication (DHS, 2016)
DHS.gov (2016). Website, various pages. Department of Homeland Security. Retrieved May 13, 2016 from https://www.dhs.gov/
New America.net (2016). Deadly attacks since 9/11. New America.net. Retrieved May 13, 2016 from http://securitydata.newamerica.net/extremists/deadly-attacks.html
The United States of America's PATIOT Act (formally the Uniting and Strengthening America by Providing Appropriate Tools equired to Interpret and Obstruct Terrorism Act) was a hurriedly created legislation against terrorism reacting to the terror attack on September 11, 2001. Little debate and oversight was given to the large, complex law by the Congress and President George W. Bush signed it into law on October 26, 2001. PATIOT offers sweeping surveillance, and search to both domestic officers and foreign intelligence agencies and removes many checks and balances that initially gave the courts the chance to make sure that the powers were never abused. The developing PATIOT and follow-up legislation (Gouvin, 2003) threaten the basic rights of most Americans.
The United States of America PATIOT Act, also known as USAPA brought in several legislative amendments that had a significant increase on the investigative and surveillance powers of…
Condon, S. (June 2, 2015). NSA surveillance reform bill now law. CBS News. Retrieved from http://www.cbsnews.com/news/senate-passes-nsa-reform-bill-the-usa-freedom-act / on 22 March 2016
Gouvin, Eric J. (2003). Bringing Out the Big Guns: The U.S.A. PATRIOT Act, Money Laundering and the War on Terrorism. Baylor Law Review 55: 955.
Liu, Edward C. (2011). Amendments to FISA Extended to 2015. Congressional Research Service.
Michaels, C. William. (2005). No Greater Threat: America Since September 11 and the Rise of the National Security State. Algora Publishing.
Contemporary Political Issue: The War on Terror
On September 20th, 2001, President George W. Bush proposed the new Office of Homeland Security to help confront a new threat to national security in the first step of what became the War on Terrorism (Select Committee on Homeland Security, 2004). One week earlier, Congress had signed off on the Authorization for Use of Military Force (AUMF), allowing the president broad scope for using military force against countries or organizations who “planned, authorized, committed, or aided” terrorism (Ackerman & Hathaway, 2011). 17 years and more than $2 trillion later, the War on Terrorism continues with no sign of easing up (Amadeo, 2018). Though President Trump ran a campaign on getting American soldiers out of the Middle East and letting other countries handle the ISIS threat, the war on terror rhetoric out of the White House has continued unabated, with sights now set…
Third, birth control and condoms (for STD control as well) are far more available, as are clinics and a woman's access to birth control. Despite the issues of disease, many young people feel invincible, and especially when relaxing or alchohol is involved, tend to see sexual activity as a process for unwinding, not necessarily a sharing of intimacy between people. In fact, many believe that sex is not the most intimate activity they have with another person. When barriers to behavior fall because of substances, one of the responses is to seek physical pleasure. There are also more pharmaceuticals on the market now that, legal or illegal, enhance or intensify sexual pleasure: the Viagra types for male erection, Esctacy for both, Amyl Nitrate as an additional high, and more (What Drugs have You Used To Enhance Sex?, 2007).
Still, despite almost 50 years of Women's Liberation, Sex Education classes, more…
In practice, the use of various provisions of PL 107-56 did not conform to required protocols, demonstrated the difficulty of ensuring proper adherence to intended safeguards against misuse, and, in fact, included numerous instances where government agents misused provisions intended to address terrorism for acts of political persecution and to intimidate public critics of the U.S. government (Huffington Post, 2009).
Should terrorism be treated as a criminal act or an act of war?
There are good reasons for both approaches as well as equally good reasons for arguing against both approaches. To the extent that terrorism is perpetrated by state-actors, it is appropriately prosecuted as an act of war. However, it is highly impractical (and logically indefensible) to treat lone terrorists or autonomous extremist groups who commit acts of terror as enemy combatants under the Geneva Convention, which would be required if terrorism were prosecuted as a war (Larsen, 2007).…
Dershowitz, a. (2002). Shouting Fire: Civil Liberties in a Turbulent Age New York:
Little Brown & Co.
Huffington Post. (2009). "NSA Whistleblower Reveals Bush Administration Snooping
on U.S. Citizens, Journalists." Retrieved March 29, 2011 from the HuffingtonPost.com website, at:
President Johnson became even more fearful of a communist take-over.
In 1964, when two American ships were attacked by the North Vietnamese in the Gulf of Tonkin "the American Senate gave Johnson the power to give armed support to assist any country requesting help in defense of its freedom," effectively beginning the Vietnam War without a formal declaration of war (BBC 2009). The wide-scale bombing of the North in 'Operation olling Thunder' began in February 1965. By March 1965, the first American ground troops had landed in South Vietnam and by December 1965, there were 150,000 servicemen stationed in the country (BBC 2009).
ichard Nixon was elected to the presidency in 1968, promising a policy of Vietnamization or the taking-over of the war against the North by native Vietnamese troops. However, it would be four more years before substantial withdrawals of American servicemen occurred. Nixon also supported dictators in Laos…
An overview of the crisis. (1997). The Cuban Missile Crisis. Crisis Center. Thinkquest.
Retrieved January 1, 2009 at http://library.thinkquest.org/11046/days/index.html
The Berlin Airlift. (2010). Cold War Museum. Retrieved January 1, 2009 at http://www.coldwar.org/articles/40s/berlin_airlift.asp
Chang, Laurence & Peter Kornbluh. (1998). A national security archive documents reader.
However, the suggested equivalence of the (rightful) criticism of those relationships and support for Israel are fundamentally flawed and invalid. Specifically, the phrase "at the expense of the Palestinians" (p796) ignores the reality of how the Palestinian became "refugees" in the first place, the degree to which Israel tried to negotiate a fair settlement during the Clinton administration, and the degree to which corrupt Palestinian leaders undermined those efforts for personal gain and to perpetuate rather than end violence in the region.
The author also equates the justified and measured U.S. military response in Afghanistan in 2001 with the invasion of Iraq in 2003 under (what in retrospect was) a fabricated justification on the part of the Bush administration. Likewise, the author presents an inaccurate view of civilian casualties and ignores the tremendous extent to which the U.S. military has always made every possible attempt to limit them in wartime.…
he other major component of the Department of Homeland Security that doesn't belong is FEMA, the Federal Emergency Management Agency. his is the only component of the Department that is not involved in preventing security threats that human in nature; its main purpose is to aid citizens and local governments in times of natural disaster. Again, communication with the Department would be necessary, but involving the response agency's involvement in a department whose main goal is detection and prevention of criminally threatening or destructive acts against the nation seems a very inefficient way to handle emergency situations.
here are also several agencies not represented in the Department of Homeland Security whose role in the protection of our nation and its citizens has long been a vital part of the United States' defense system. Most notable among the missing are the Federal Bureau of Investigation, Central Intelligence Agency, and the National…
There are also several agencies not represented in the Department of Homeland Security whose role in the protection of our nation and its citizens has long been a vital part of the United States' defense system. Most notable among the missing are the Federal Bureau of Investigation, Central Intelligence Agency, and the National Security Agency. The functions of these three independent government are often nebulously defined and seem to be rather redundant. All are involved in the detection and prevention of acts against the United States; though the FBI tends to be more involved in home-soil affairs and the CIA and NSA are known -- at least in the popular folklore -- for their infiltration of foreign governments and other international activities, they ostensibly share the same collective goals of keeping the people of the United States safe, which is also the primary function of the Department of Homeland Security. Again, the creation of this Department was to in large part to create a consolidation of the information and powers that could be effectively used in the protection of our national security. The exclusion of these organizations from under the umbrella of the Department can only have been politically motivated, and makes no practical sense.
In it's brief history spanning slightly less than seven years, the Department of Homeland Security has undergone several massive reorganizations. It's first proposal by President Bush in 2002 was a stated attempt to consolidate the patchwork of office concerned wit national security into one centralized and coordinated department, and the 2003 organization structure did much to accomplish that, with approximately nine offices and three directorates -- Border and Transportation Security, Emergency Preparedness and Response, and Information Analysis and Infrastructure Protection. This set-up seems far more streamlined and efficient tan the current system, which was set up in 2005, though many of the redundancies and inefficiencies that exist today were problems then, too. The 2005 reorganization was a further attempt at centralization, but meant to accomplish this through the creation of new offices such as the Office of Intelligence and Analysis and the Office of Operations Coordination. A more effective way to streamline the Department would have been to consolidate current offices under more direct leadership, rather than the creation of new ones.
The current structure of the Department of Homeland Security is not as well equipped to handle issues of national security as its older incarnations. The increased division and redundancies of the component offices and agencies makes the operation of this Department far less efficient. Specifically, the various offices meant to handle information gathering and sharing, and those devoted to day-to-day operations of law enforcement personnel in multiple agencies, ought to be consolidated into single office to maximize synthesis of information and action. The ever-increasing number of components at each tier of the Department's organization increases the inefficiency of the Department, which could lead to an unawareness of vital information or a hindrance of necessary action.
" (Muntenu, 2004)
According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical estimation represents the basis for quantitative models." Muntenu states conclusion that in each of these approaches the "moral hazard of the analyst has influence on the results because human nature is subjective. He must use a sliding window approach according to business and information systems features, balancing from qualitative to quantitative assessment." (2004) qualitative study of information systems security is reported in a study conducted in U.S. academic institutions in the work of Steffani a. urd, Principal Investigator for…
Burd, Steffani a. (2006) Impact of Information Security in Academic Institutions on Public Safety and Security: Assessing the Impact and Developing Solutions for Policy and Practice. Final Report." NCJ 215953, United States Department of Justice. National Institute of Justice, Oct 2006.
Muntenu, Adrian (2004) Managing Information in the Digital Economy: Issues & Solutions Information Security Risk Assessment: The Qualitative vs. Quantitative Dilemma
Full text PDF: http://www.ncjrs.gov/pdffiles1/nij/grants/215953.pdfMunteanu , Adrian (2004) the Information Security Risk Assessment: The Qualitative vs. Quantitative Dilemma. Managing Information in the Digital Economy: Issues & Solutions.
Age, race open. I'd like to chat so if you're interested.
M4W: Are you ready to truly be happy? Me too...glad I found you - (Almost) 39
Are you looking for a man to treat you like you have never been treated before? Do you want a man who can't wait to hurry and get home to you at the end of the day and wrap his arms around you like he is never going to see you again? Do you want a man you know you can trust never to let you down and know you can always turn to him for anything no matter how big or how small?... I am looking for my forever, not just sex or a one night stand... A man who will always be there for you 24/7 well then I am glad we found each other.... I look forward to spending the…
Buss, David M.. (1999). Evolution of Desire. Retrieved October 15, 2008, at http://www.geocities.com/protopop_1999/evde.html
Conklin, Ellis E.. "Board With Her Love Life North Bend Woman Advertises Big in Search of a Relationship." Seattle Post-Intelligencer (Seattle, WA), November 19, 1998. Retrieved October 15, 2008, at http://www.highbeam.com/doc/1G1-64606411.html
Craigslist, Inc. (2000-2008). BusinessWeek. The McGraw-Hill Companies. Inc. Retrieved October 15, 2008, at http://investing.businessweek.com/research/stocks/private/snapshot.asp?privcapId=1125097
Guidelines, Professors (2008) Class Handout
" (Lindsey, 2004, p.1) it is interesting to note that one of the young protestors stated: "[the world leaders] are sitting over there on Sea Island having their little party only talking about how to fix things, but we are over here actually doing something to make things better" -- Laurel Paget-Seekins (Lindsey, 2004, p. 1) the U.S.A. Patriot Act has been touted to do just this - or to make things better in terms of security of American citizens and it is certain that the provisions of this Act have served to increase levels of security for American citizens but this security has come with a cost attached and for some Americans the cost is too high and too intrusive upon their basic civil rights. One such instance of the complexity created within the security paradigm are the no-fly lists that have been implemented in U.S. airports since September…
Bohn, Kevin (2003) Patriot Act Reports Documents Civil Rights Complaints. 31 July 2003. CNN Law Center. Online available at http://www.cnn.com/2003/LAW/07/21/justice.civil.liberties/index.html
Carafano, James Jay (2007) Securing the Home Front. The Heritage Foundation. 10 July 2007. Online available at http://www.heritage.org/Press/Commentary/ed071107a.cfm
Drew, Kevin (2002) Balancing Life and Liberty: Danger to Civil Liberties when Security is Strengthened - CNN Law Center 10 Sept 2002. Online available at http://archives.cnn.com/2002/LAW/09/05/ar911.civil.liberties/
Houses, spaces raided throughout the Twin Cities (2008) Coldsnap Legal 30 Aug 2008. Online available at http://coldsnaplegal.wordpress.com/2008/08/30/houses-spaces-raided-throughout-the-twin-cities/
In other words, up until the middle of the 19th century, there were no cases of note or significance that indicated that the executive branch of the UNITED STATES government had the authority to render suspects or criminals to foreign locations outside of the explicit authority granted through a signed treaty with a foreign government.
It was during the Civil War that the first major break with this established legal tradition was made. The incident involved the capture of a foreign citizen in New York City during wartime and performed by presidential authority alone. The man captured was Jose Augustin Arguelles, a Spanish subject, who captured illegal slave traders, claimed a reward, then sold the slaves to plantation owners. Under Spanish law he was a criminal, but the United States had no extradition treaty with Spain. Despite having no legal authority to do so, Lincoln authorized the capture of the…
Elsea, J.K. And Kim, J. (2007, January 23). Undisclosed UNITED STATES detention sites overseas: background and legal issues. CRS Report for Congress. Congressional Research Service. Retrieved November 29, 2007, at http://www.fas.org/sgp/crs/intel/RL33643.pdf
Grey, S. (2005, December 19). Torture's tipping point. New Statesman, pp. 24-25.
Grey, S. (2006, November 20). Missing presumed tortured. New Statesman, pp. 12-15.
Gutierrez, D. (2006, January-February). The extraordinary cruelty of "extraordinary rendition." The Humanist, pp. 11-15.
S. There were 2,794,130 Americans of East Asian decent in the United States in 1990. Not all of these people practice a traditional East Asian religion, and reliable figures for the religious affiliations of East Asians are impossible to obtain because the United States Census does not ask questions about religion. In addition, the religious groups are very disparate and keep different kinds of records, and many East Asians observe traditional religious practices only in a family and not in an institutional context. Still, it is clear that the number is sizeable. In addition, many Americans of occidental background have also become involved in East Asian religions, sometimes through a spiritual quest, sometimes through marriage, and sometimes as a by-product of an interest in meditation or the martial arts. Commitment may range from entering a Zen monastery to taking class or doing practices on a lower level. Figures for this…
Bendure, G. & Friary, N. (1993). Hawaii. Berkeley: Lonely Planet.
Cook, F.H. (1994). Heian, Kamakura, and Tokugawa Periods in Japan in Buddhism: A Modern Perspective, C.S. Prebish (ed.), 223-228. University Park: Pennsylvania State University Press.
Ellwood, R.S. (1994). East Asian Religions in Today's America. In World Religions in America, J. Neusner (ed.), 219-242. Louisville, Kentucky: Westminster/John Knox Press.
Hammoind, P. & Machacek, D. (1999). Supply and Demand: The Appeal of Buddhism in America. In American Buddhism: Methods and Findings in Recent Scholarship, C.S. Queen & D.R. Williams (eds.), 100-114. Surrey, England: Curzon Press.