Free Essay

Homeland Security Abstract

In:

Submitted By worleybyrd77
Words 1112
Pages 5
Clauset, A., M. Young, and K. S. Gleditsch, “On The Frequency of Severe Terrorist Events,” Journal of Conflict Resolution, vol. 51, no. 1, pp. 58–87, February 2007

Lashkar-e-Taiba has been outlawed in India, Britain and by the United Nations. The US administration classified Lashkar-e-Taiba as a Foreign Terrorist Organization in 2001. The LeT was banned in Pakistan in January of 2002 due the pressure of the 9/11 attacks.

Curtis, Lisa . “Bad Company: Lashkar-e-Tayyiba and the Growing Ambition of Islamist Militancy in Pakistan” Testimony to US Congress Committee on Foreign Affairs. Washington, DC. 2010 Restoration on islamic rule over all of India is the main ideology behind Lashkar-e-Taiba. Challenging India’s rule over Jammu and Kashmir is only part of what LeT is trying to accomplish. Uniting all Muslim majority regions in all countries surrounding Pakistan is also a goal of the LeT. To safeguard all Muslims in the world and defend Muslims under non-Muslim rule is another ideological goal. LeT has regularly supported using force to achieve its goals, andhas sworn the flag of Islam would be planted in Washington.

Fair, C. Christine. “Lashkar-e-Taiba Beyond Bin Laden: Enduring Challenges for the Region and the International Community.” Testimony Prepared for the United States Senate Foreign Relations Committee’ Hearing on “Al Qaeda, the Taliban, and Other Extremist Groups in Afghanistan and Pakistan.” May 24, 2011.

Lashkar-e-Tabia attacked Indian army wives and children in May 2002. The United States stepped in to prevent war. This activity caused to U.S. military forces in Afghanistan.

Jayshree Bajoria. “Profile: Lashkar-e-Taiba (Army of the Pure) (a.k.a. Lashkare-Tayyiba, Lashkar e-Toiba; Lashkar-i-Taiba)”. Council on Foreign Relations. 2010.

Attacks In New Delhi, Mumbai, Bangalore, Hyderabad, Varanasi, Kolkata, and Gujarat India have all been linked to Lashkar-e-Taiba. Their main area of operation is Jammu and Kashmir, but it has been reported they have other cells outside of these cities. LeT has connections to other Islamic extremist groups across India. With training camps spread across Pakistan and Kashmir, the LeT is able to have offices and recruitment centers across the country.

Padukone, Neil. “The Nexy al-Qaeda? Lashkar-e-Taiba and the Future of Terrorism in South Asia” World Affairs. 2011

“The Lashkar today has emerged as a very major force. It has connectivity with west Asia, Europe....Actually there was an LeT module broken in Virginia and some people were picked up. It is as big as and omnipotent as al Qaeda in ever sense of the term.” This was said by India’s National Security Adviser M. K. Narayanan on August 11, 2006. There are extensive LeT networks that run through Pakistan and India. There are branches in Saudi Arabia, United Kingdom, Bangladesh and South East Asia.

Prashant, Pandey (2001-12-17). “Jaish, Lashkar Carried Out Attack With ISI Guidance: Police”. The Hindu. 2009

In November 2008, Mumbai, a city in India, came under attack. Lashkar-e-Taiba launched a ten man team to attack multiple targets. 166 people were killed in several places throughout the community. Lashkar-e-Taiba has been linked to the ISI, Pakistan’s Inter-Services Intelligence.

Raman, B. (December 15, 2001). “The Lashkar-e-Toiba (LET). South Asia Analysis Group. 2008 The LeT is funded by several sources including donations from the Pakistani people in the Persian Gulf and the United Kingdom. They have ties to religious and military groups around the world. From the Philippines to the middle East they have been connected through the al Qaeda network. Reports have said the LeT has had ties to the Bosnian campaign against the Serbs.

Rao, Aparna, Michael Bollig & Monika Böck. (ed.). (2008) The Practice of War: Production, Reproduction and Communication of Armed Violence, Oxford: Berghahn Books, pp.136-7

-Lashkar-e-Taiba established several training camps in Afghanistan in 1987. Muaskar-e-Taiba and the Muaskar-e-Aqsa were established in two providences. We have one detainee in the Guantanamo Bay prison who reportedly attended these training camps. In 2002, Abu Zubaydah, a senior al-Qaida member was captured at a Lashkar-e-Taiba safe house. His capture indicates perhaps Lashkar-e-Taiba is a supporter of the al-Qaida. In 2003, 11 Lashkar-e-Taiba terrorists were arrested in Virginia.

Stephen Tankel, “Lashkar-e-Taiba In Perspective: An Evolving Threat,” New America Foundation Counterterrorism Strategy Initiative Policy Paper, February 2010.

The Markaz Dawa ul Irshad organization headquarters have schools, a hospital with an ambulance service, Islamic Institutions, mobile clinics, a seminary, and a large residential area. Maulana Abdul Wahid Kashmiri is believed to be the leader of Lashkar-e-Taiba, although reports have claimed Hafiz Muhammed Saeed is still in charge of the group.

Tankel, Stephen . “Lashkar-e-Taiba: Past Operations and Future Prospects”. National Security Studies Program Policy Paper. Washington, DC: New America Foundation. 2011

Lashkar-e-Taiba has had sucessful attacks in India. Killing 166 people by striking two hotels, a cafe, a railway system, and a community. LeT was once paired with al-Qaeda’s global attack against the United States, the group is strongly influenced by its region. India is its primary target since the mid-1990’s. The LeT has many ideologic and strategic approaches to their attack. The non-violent activities of LeT in Pakistan is show in by the growth of the social welfare activities and propaganda operations.

Tankel, Stephen. “Lashkar-e-taiba: From 9/11 to mumbai,” Developments in Radicalisation and Political Violence, International Centre for the Study of Radicalization and Political Violence. 2009

Lashkar-e-Taiba was banned from Pakistan from Pervez Mushaffaf, the former president. The pressure from the 9/11 attacks influenced his decision. LeT once operated openly in Pakistan, collecting money for their fighting efforts in India in ever town. In the wake of the September 11, 2001 attacks on U.S. soil, former president Mushaffaf inplemented new policies and strategies, which several members of LeT disagreed with. LeT was later blamed with anti-government attacks in Pakista.

Zaigham Khan, “Allah's Army Waging Jihad In Kashmir,” Herald (Karachi), January 1998

Markaz Dawa ul Irshad was the organization that began Lashkar-e-Tabia in the 1980’s. Muridke became home of the Markaz Dawa ul Irshad. Known for its hardline views on Islam, its congregation would attract up to 100,000 people. Lashkar-e-Taiba became the militant wing of Markaz. With its headquarters in Pakistan, Markaz Dawa ul Irshad members were non-Kashmiri. Lashkar-e-Tabia preferred to act alone from the United Jihad Council. Bold attacks against Indian troops became the signature of Lashkar-e-Taiba members, earning the name “Fedayaeen fighters.”

Similar Documents

Free Essay

Assignment 2: Critical Infrastructure Protection

...Critical Infrastructure Protection Benard Braxton, Jr. Dr. Bouaffo Kouame CIS 502 – Theories of Security Management May 17, 2015 The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015). These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department of Homeland Security. These objectives and goals says what it means to prevent, to protect, to respond, and to recover. They also shows how build in security, to ensure resilience, and to facilitate customs and exchange (DHS, 2015). There are thousands of people from across the all over the country who are responsible for executing these missions. These are the people who interact with the public, are responsible for security and public safety, operate our country’s critical services and infrastructures, develop technology, perform research, watch, prepare for, and respond to emerging disasters and threats (DHS, 2015). The five homeland security core missions are to prevent terrorism and enhancing security; secure and manage our borders; enforce and administer our immigration laws; safeguard and secure...

Words: 1124 - Pages: 5

Premium Essay

Restructuring to Improve Efficiency

...Restructuring to Increase Efficiency Tom Harper HCS/325 May 26, 2014 Connie Woods Restructuring to Increase Efficiency In healthcare, the utilization of call centers to assist in triaging patient calls have become more advanced and serviced over time. These centers triage calls such as medication refills, appointment scheduling, emergency medical questions and advice, and simple insurance related questions. The calls in our facility have increased due to the increasing number of patients merging into our facility and clinics. With the current struggle of budgeting and providing sufficient patient care, our department must implement new policies, procedures, and protocols in order to meet the growing demand. With a budget set for the current fiscal year, our department lacks the financial resources needed to hire additional staff, which makes the task even more difficult to address. The leaders from other facilities, corporations, and departments must come together and share options that work well for them and others that have failed in the past. Utilizing other industries will give our facility a greater view of the platform that it can move on. Throughout the next few months, it is upon the leadership and staff to accommodate to the changes and team structures that are unveiled to address the concerning and continued issue regarding patient care. In all aspects of healthcare, teamwork is essential to provide the care to all patients that should report to our facility...

Words: 1945 - Pages: 8

Premium Essay

Assignment 2 Critical Infrastructure Protection

...University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (dhs.gov, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and administer immigration laws; safeguard and secure cyberspace; ensure...

Words: 1685 - Pages: 7

Free Essay

The Homeland Security Act of 2002

...The Homeland Security Act of 2002 and the Department of Homeland Security Benjamin K. Hickman Embry-Riddle Aeronautical University ABSTRACT This paper explores The Homeland Security Act of 2002 and its effect on the security landscape of the United States of America. The Homeland Security Act of 2002 created a new cabinet level department within the executive branch that would be called The Department of Homeland Security (DHS). Since its inception, the Department of Homeland Security has absorbed numerous agencies that had previously fallen under other departments for their importance in performing national security functions. Some of the agencies absorbed by DHS perform minor peripheral national security functions. Others, however, are very well-known agencies that stand on the front lines of American national security, like the United States Coast Guard (USCG), the Secret Service, and the Transportation Security Administration (TSA). In this paper, we will examine some of these departments and discuss their roles in national security. Additionally, we will analyze the DHS in the context of successful and unsuccessful national security operations since the Homeland Security Act of 2002 was passed. The Homeland Security Act of 2002 and the Department of Homeland Security Following the terrorist attacks of September 11, 2001, the US Congress determined the need for a new department within the U.S. government. This department would...

Words: 1390 - Pages: 6

Free Essay

Criminology Personal Application

...SEAPORT SECURITY: CRITICAL CHALLENGE FOR DEPARTMENT OF HOMELAND SECURITY BY COLONEL DREFUS LANE, SR. United States Army DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. U.S. Army War College, Carlisle Barracks, PA 17013-5050 USAWC CLASS OF 2009 The U.S. Army War College is accredited by the Commission on Higher Education of the Middle State Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters...

Words: 6659 - Pages: 27

Free Essay

Anthrax Vaccine as a Component of the Strategic National Stockpile: a Dilemma for Homeland Security

...POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ANTHRAX VACCINE AS A COMPONENT OF THE STRATEGIC NATIONAL STOCKPILE: A DILEMMA FOR HOMELAND SECURITY by Thomas L. Rempfer December 2009 Thesis Advisor: Second Reader: Stanley Supinski Dean Lynch Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE 2. REPORT DATE December 2009 3. REPORT TYPE AND DATES COVERED Master’s Thesis 5. FUNDING NUMBERS Anthrax Vaccine as a Component of the Strategic National Stockpile: A Dilemma for Homeland Security 6. AUTHOR(S) Thomas L. Rempfer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000...

Words: 3672 - Pages: 15

Free Essay

Assesment of Drug Trafficking Example

...Assessment of Human Trafficking Cole Bootz Arizona State University Abstract Assessing the crime of Human Trafficking over the Arizona border from Mexico there were a lot of effective methods and non-effective methods used when trying to prevent human trafficking. It was most commonly found in my research, there were more ineffective methods than effective ones. During the assessment I continually focus on the more positive ways to combat human trafficking because of the significant impact the positive results have been outweighing the negative and ineffective results. What was discovered is that the border patrol is an extremely answer to finding and preventing human trafficking over the Mexico/Arizona border and how they are trained and what is planned to make them better at defending the borders. Other ways that have been found most effective are charities and campaigns and charities that bring light to the human trafficking situation that have been shown to be very effective as well, though not as proactive. Throughout there will be provided evidence to give examples and proof of how well the strategies legitimately work, and what can be added to improve the effectiveness of the implemented policies. Human trafficking is a tremendous problem that plagues America, with a growing issue such as this ideal solutions need to be found in order so stop the imminent threat of Human Trafficking. Various ideas and tactics have been implemented to counteract trafficking...

Words: 1050 - Pages: 5

Free Essay

Critical Infrastructure Protection

...S. York CIS502, Dr. Glenn Hines 2/14/15 Abstract The explosion of the accessibility of information and data via the today’s Web has brought along the concern and need for cyber security. With these issues of cyber security has also come the need to protect national informational assets from hackers and such who utilize the Web as a means to attack information that can aid in cyber terrorism. Information professionals are now looking to measures of protection that will ensure private citizens are not put into danger by the threat of cyber espionage. This also has extended to the protection of critical infrastructure within the United States and abroad. Critical Infrastructure Protection With the ever evolving presence of cyber-attacks that threaten to put citizens’ privacy and Internet security at risk, the government has had to intervene in order to take measures to protect its’ citizens due to the alarming fact that cyber-attacks are replacing other modes of attacks by terrorists. The Department of Homeland Security, created in 2002, was developed to carry out broad missions such as preventing terrorist attacks within the United States. This was mainly in response to the terrorist attacks that occurred on U.S. soil on September 11, 2001. Since then the DHS has taken on the mission of developing security that extends to information security and developing plans to implement critical infrastructure. The Homeland Security Act of 2002 extends the mission of this department...

Words: 1329 - Pages: 6

Free Essay

Change Managment

...Cyber Terrorism Mahesh kanneboina Wilmington University Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator...

Words: 2007 - Pages: 9

Premium Essay

U.S. Department of Homeland Security

...U.S. Department of Homeland Security Chris Cabral National American University Abstract The primary mission of the Homeland Security Act is to prevent terrorist attacks within the United States, reduce the vulnerability of the United States to terrorism, and minimize damage and assist in recovery for terrorist attacks that occur in the United States. The U.S Department of Homeland Security was established after the 9/11 attacks to counter terrorist activities against the United States. Homeland security is officially defined by the National Strategy for Homeland Security as "a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur”. The major objective of the Patriot Act is “to deter and punish terrorist acts in the United States and around the world to enhance law enforcement investigatory tools" by dramatically reducing restrictions pertaining to law enforcement requests to search telephone records, e-mail communication, and health records. The Patriot Act allows for the emergency disclosure of electronic communications to protect life and broadens the definition of terrorism to include acts of domestic terrorism. Under the Foreign Intelligence Surveillance Act, the Patriot Act allows the director of the Federal Bureau of Investigation or a designee of the director to apply for an order requiring the "production of any tangible things (including...

Words: 3497 - Pages: 14

Free Essay

Terrorism

...Terrorism and Homeland Security: The Impacts on Preventative Measures Abstract This paper explores four different topics on homeland security and anti-terrorism policies. The creation of the Department of Homeland Security or (HDS). What policies had to be implemented and what did the creation of a new agency affected or benefit. The impact that international terrorism has caused the United States of America and how this policies and changes help build a stronger defense against them. The implementation of local enforcement agencies and the community in the fight to deter terrorist attacks. The Federal Emergency Management Agency or (FEMA) and how organizational bureaucracy hindered cooperation and communication among local and federal agencies. This paper will address what measures have been and can be taken in the future to improve inter-agency cooperation and communication. Table of Content Terrorism and Homeland Security: The Impacts on Preventative Measures Abstract……………………………………………………………………………………………2 Introduction………………………………………………………………………………………..4 Terrorism and the creation of the DHS………................................................................................4 USA PATRIOT ACT……………………………………………………………………………...5 Appropriate roles of agencies and community………………………………………………….5-6 Preventative plans…………………………………………………………………………………6 Community Emergency Response………………………………………………………………...6 FEMA……………………………………………………………………………………………..7 National Response Plan…………………………………………………………………………...

Words: 2744 - Pages: 11

Premium Essay

Border Security After 9/11

...Border Security Post 9/11 ABSTRACT U.S. border security in the post 9/11 era requires careful attention to all potential threats with particular focus on mitigating circumstances that lead to reductions in citizen safety and security. These efforts must be balanced with protection of U.S. citizens’ rights to freedom of movement and commerce. Additionally, security activities must protect borders while minimizing interference with international trade. Primary concerns at the land borders include tracking movements of people into and out of the U.S. (including potential terrorists) at the traditional borders, curtailing illegal immigration and stopping drug trafficking. Sea borders are the primary route of illegal smuggling and now have more coordinated efforts between federal agencies, law enforcement, and private interests. Skies are protected by the DHS and its private entity the TSA but often include invasive search procedures for passengers. With the post 9/11 realization of America’s vulnerability to external threats, border security became a subject of greater inquiry and action. United States border security can be categorized by the three mediums of transportation across borders – land, sea, and sky. Significant changes have occurred in the domestic security protocols utilized in all three mediums to reduce terrorist threats on U.S. soil, drug trafficking, and illegal immigration. While it seems obvious in the post 9/11 perspective that domestic security measures...

Words: 2521 - Pages: 11

Free Essay

Becoming a Border Patrol Agent

...------------------------------------------------- Customs and Border Protection Border Patrol Agent April 18, 2014 Valance Lausch CJC 161 Intro Homeland Security April 18, 2014 Valance Lausch CJC 161 Intro Homeland Security Table of Contents Abstract …………………………………………………………………………………………..2 Introduction……………………………………………………………………………………….3 CBP Mission……………………………………………………………………………………...3 Requirements and Qualifications…………………………………………………………………3 Application Process……………………………………………………………………………….4 Employment Benefits……………………………………………………………………………..4 Training…………………………………………………………………………………………...6 Hazards…………………………………………………………………………………………....6 Conclusion………………………………………………………………………………………...7 Works Cited……………………………………………………………………………………….8 Customs and Border Protection Abstract The purpose of this report is to research a potential company that I plan to work for to evaluate and inform myself of everything that I may want to know about this company. I will be researching and reporting on the United States Customs and Border Protection Agency. I wish to become a U.S. Border Patrol agent or possibly work in another area within the U.S. CBP. I chose this profession because I wish to be a part of protecting this country and keeping the people safe. I plan to research the hiring process which may include the application method, interviews, physical fitness tests, weapons qualifications and language proficiency tests. I will also search for desired duty locations and...

Words: 2314 - Pages: 10

Free Essay

Customs and Border Protection

...United States Customs and Border Protection Mr. Angelo, Joseph CJ 355 Jonathan Mesngon July 20, 2014 Abstract This paper explores an overview of the mission and the overall organization of the United States Customs and Border Protection (CBP). It will also discuss the roles and responsibilities of the organization, its history, and how they support the Department of Homeland Security (DHS). This paper will provide you with facts, highlights, and challenges germane to CBP. You will understand how CBP interacts and operates with the intelligence community and the Armed Forces in order to meet up to their responsibilities. U.S. Customs and Border Protection History The origin of Customs and Border Protection can be dated back as early as the mid-1789, when U.S. congress passed the third of three acts that provided for administering customs tariffs and collecting duties. The Tariff Act of July 4, 1789 had also been passed by Congress followed by the Duties on Tonnage statute on July 20. Another landmark in the history of CBP is the establishment of the 1891 Immigration Act, which created the Office of the Superintendent of Immigration in the Treasury Department. The act allowed for the superintendent to have oversight of the new corps of immigrant inspectors stationed at the country’s principal ports of entry (CBP.Gov, 2014). On May 28, 1924, Congress established the Border Patrol as part of the Immigration Bureau in the Department of Labor through the...

Words: 3909 - Pages: 16

Premium Essay

Cjus254 Unit 5 Ip

...Moore Abstract My director is not aware of the relationships between the Department of Homeland Security and private sector companies. She has requested an information paper that shows her why these relationships are important, as well as how the DHS uses these companies as a tool for the protection of critical infrastructure and key resources. To: Director, Executive Secretariat of the Office of the Secretary, DHS From: Action Officer, Executive Secretariat of the Office of the Secretary, DHS Ma’am, Cooperation with all levels and forms of security entities is of paramount importance. We cannot profess to be the best at what we do if we are blind to this fact. There are hundreds of security firms that specialize in all different types, as well as local, state, tribal, and territorial governments and law enforcement agencies that just know the area, the terrain, and the local customs and day to day operations better than any federal agencies ever could. This is why it is important for us to work with these agencies on the ground when we are tasked with preventing or reacting to any security emergencies. This is important because the private sector actually owns and controls the grand majority of the infrastructure that we are sworn to protect. This makes it slightly more complicated for us to control the safety of anything, if we aren’t in direct control. Rather than create a fascist state that dictates laws that may not be the best for the security of a particular...

Words: 1338 - Pages: 6