Homeland Secureness, Border Patrol, Bioterrorism, Biometric Technology


Excerpt from Capstone Project:

Homeland Secureness and Preparedness, Response, Activities and Courses in Devastation Response or perhaps Disaster Recovery

We will write a custom essay sample on
A Fever You Can't Sweat Out by Panic! At the Disco
or any similar topic specifically for you
Do Not Waste
Your Time

Only $13.90 / page

The focus on this study is a homeland secureness issue since it relates to the preparedness of the U. H. A. government and individuals in response to the emergencies which may emerge.

The research question in this study is definitely one that demands in light in the past disasters experienced by the United States like the events of September eleven, 2001, and Hurricane Katrina among others, would be the emergency response agencies and the law enforcement firms in a better position to take care of disasters coming from preparation to response and ultimately restoration effectively in the instance of disasters or perhaps terrorist episodes?


The importance of the analysis in this analyze is that the success of the preparedness of Homeland Security initiatives should be addressed as it is difficult to know where and when disaster will following strike as well as the consequences on this disaster are great and require a great deal of intervention to get back normalcy in operation.

Research Hypothesis

The research hypothesis in this study is one particular stating which the law enforcement in the United States is today better equipped to handle terrorist attacks and any terrorist threat than it was prior to the events of September 10, 2011.

Literary works Review

The work of Warwick (2009) entitled “Drug Drones” reports that the evaluation of unmanned aircraft in anti-drug operations came about in Central American while using U. S. Navy traveling by air a leased Israel Aeronautical Industries Heron from Este Salvador when it comes to detecting and identifying ocean going targets. The 100 flight-hour demonstration was reported to be funded by U. H. counter-narcoterrorism spending budget. The heron medium-altitude long-endurance UAS comes with the “vessel automatic identity system. (AIS). ” (Warwick, 2009, g. 1)

This may not be the only tool that police is applying in crime prevention and arrest endeavours of those intimidating national security. The Terrorist Screening Center (TSC) can be reported being a “unified enjoy list of noted or appropriately suspected terrorists that can be used by simply every official sworn to guard the United States – from edge patrol and transportation officials to National agents and native police officers working their is better than. ” (Bowman, 2007, l. 5) Movie director of TSC, Donna Bucella reported within a FBI hq briefing which the list can be “not a stagnant list. We add, modify, and delete every day. The information that flows into the TSC comes from the FBI (domestic terrorist information) plus the National Counter-top Terrorism Center (International terrorist information) which in turn gets data from more than a dozen intellect agencies such as the Central Brains Agency plus the Department of Homeland Security, under the umbrella of the Overseer of Countrywide Intelligence. inch (Bowman, 3 years ago, p. 5)

Edwards (2012) reports that police are greatly dependent upon “information and communication. In today’s world, youthful offenders communicate, network, socialize, boast and expose their carry out on the Web through e-mail, smart phones and Blackberries. Communication is usually carried in a new theatre of current availability and simple methods. inch (p. 19) It is reported that current communication devices require a tiny investment nevertheless the result is definitely stated to become “tremendous dividends. ” (Edwards, 2012, l. 19) Federal agencies happen to be reported to be reliant in “their frontline law environment partners. For the environment is out there that allows every officers to possess knowledge and use it to work, communicate, and coordinate, premier results can produce. ” (Edwards, 2012, g. 20)

Cleverness led policing (ILP) is definitely cited being a great assist in the area info improvement as well as in intelligence sharing. It is reported that the present push for “state and regional blend centers as well as the development of Police Online (LEO) is a real0time controlled-access marketing and sales communications and information-sharing data repository” (Edwards, 2012, p. 20) It is reported that ILP believes that the notion that rural officials should have “access to current technology, including smart phones and Blackberries, like a real-time conduit for relating past data to current intelligence data. Rural sheriffs and law enforcement chiefs coming together to create a single central clearinghouse for information collection, analysis, and dissemination constitutes another ILP concept. Ground breaking policies, types of procedures, protocols, and structures require collaboration among sheriffs and chiefs to get common fascination, shared gains, notoriety, credit, and successful results. ” (Edwards, 2012, p. 21)

Intelligence Led Policing is definitely reported to be based on a three-step method as follows:

(1) The first step may be the incorporation from the Intelligence Led Policing Model, which involves use of the ILP model, which in turn maintains, ‘Intelligence-led policing is a business model and managerial beliefs where info analysis and criminal intellect are critical to an aim decision-making platform that makes it possible for crime and problem reduction, disruption, and prevention through both ideal management and effective observance tactics that target proli-c and serious offenders’. ” (Edwards, 2012, g. 22)

(2) The second step is reported to be including “incorporating guidelines for guarding privacy – mandatory if the intelligence method is supported by federal government funds. Intellect gathering plus the pooling of intelligence can lead to more effective policing. However , the collection and writing of intellect also can implicate signi-can’t privateness concerns. Appropriately, if the intellect system is maintained federal money, the firm must make use of within the Legal Intelligence Systems Operating Procedures at Subject 28, Code of National Regulations, portion 23. ” (Edwards, 2012, p. 22)

(3) Another step consists of stakeholder contribution in “aggressive information gathering, speci-c research, and organised classi-cation of real-time conversation paths, supporting actionable cleverness dissemination. inch (Edwards, 2012, p. 22)

Specialized training is provided in Evans County, Georgia including teaching, equipment and information showing policies and procedures for officers because knowledge of occurrences that have occurred enables law enforcement officials agencies to “maintain situational awareness” which is reported being greatly aiding in “identifying, preventing, disrupting, and resolving crimes. inch (Edwards, 2012, p. 22)

According to one report The state of michigan State Police force has outfitted its officers with the AN-PVS-21 Low Profile Nighttime Vision Glas?gon. The night eyesight technology along with “its ground breaking heads-up screen capability, will assist enhance officers’ safety and situational awareness and give officers greater response capability. ” (Business Cable, 2005, p. 1) Nevertheless , the most important issue that can be done based on the United States Department of Defense in a Reports Briefing is to develop a advanced of cooperation and incorporation among law enforcement officials authorities and intelligence agencies. ” (2003, p. 1) This is where cleverness led policing comes in and the process applied is the one that includes this elements which includes system, process and result:

The system component is E-roll call and the process entails an intellect analyst digitally sending all local, federal and state officers a directory of calls through the night before plus the result is the fact law enforcement turns into aware of almost all incidents and events. Secondly, a system element is the ‘shift report’ plus the process involves deputies, dispatchers and jailors reading and initialing the calls for service report improvements since all their last shift. The result is that staff turns into aware of situations and occasions that have occurred. The third program component offered is ‘problem adoption’ and it is a process through which “deputies notice of problems from people, adopt these problems, recognize strategies for solutions and continue with techniques. ” (Edwards, 2012, l. 25) The results is the fact relationships are made that lead to trust and the development of intellect information. inch (Edwards, 2012, p. 25) The fourth system components is explained to be regarding ‘Web Tips” which is a procedure involving resident provided tips via a site that are e-mailed to an intellect analyst and investigator. inches (Edwards, 2012, p. 25) The leads to “information research [that] provide intelligence. inches (Edwards, 2012, p. 25) The 5th system aspect is that of patrol alerts and open circumstance alerts and is a process in which “flyers are produced and distributed by email, then submitted in the procedures center. inches (Edwards, 2012, p. 25) The result is ‘total situational awareness’. (Edwards, 2012, p. 25) The 6th system element is that of ‘inmate information collection document’ which is a process where the investigator “regularly interviews neighborhood jail inmates regarding felony information’. (Edwards, 2012, l. 25) In this way that this assets “provide corroborative intelligence on histories, tendencies, patterns, and methods of lawbreaker operation. inch (Edwards, 2012, p. 25) The 7th system part is that of deputies information binder which is a method involving A three-ring binding containing current intelligence, memos, and most recent officer consciousness and security information. inches (Edwards, 2012, p. 25) The result is the “binder increases intelligence companies communication. inches (Edwards, 2012, p. 25) The eighth system aspect is that of the matter board and it is a process by which “a light board can be used to highlight significant communications for all. ” (Edwards, 2012, p. 25) The result is that information is “disseminated and distributed. ” (Edwards, 2012, s. 25) The ninth program component is a ‘status board’ and is also a process when the board “gives status of pending express, local, and federal brought on. ” (Edwards, 2012, g. 25) The result is that “pending case expertise is shared. ” (Edwards, 2012, s. 25)

Listed below are also system components, processes and results mentioned:

(1) Job Board A huge white table is used to get projection of presentations and real-time group data exploration. The table enhances intellect

Prev post Next post
Get your ESSAY template and tips for writing right now