Premium Essay

Importance Of US National Security

Submitted By
Words 1498
Pages 6
Cynthia Howard
The Importance of Protecting U.S. National Security and the Health and Safety of People and Property from Terrorists
Word Count:
Dr. Leerburger

The Importance of Protecting U.S. National Security and the Health and Safety of People and Property from Terrorists Terrorism is real and is increasing in frequency. Terrorist incidents are designed to cause as much damage as possible, and to cause as much injury as possible and death. In the world today, emergency responders and the people who help them encounter more advanced challenges that risk not only their lives but the public’s lives as well. The risks that emergency responders encounter in the world today puts them at a higher level of danger, because they may …show more content…
As a first responder, safety is your most important concern. You must protect yourself so that you can protect your fellow responders and the public. If you do not arrive safely at the incident scene, or if you become injured or incapacitated in any way, you will not be able to provide the services required by the initial call for help. We need to examine some of the pertinent issues of scene control, keeping your safety and survival in mind. The use of personal protective equipment (PPE) coupled with positive pressure self-contained breathing apparatus (SCBA) will greatly increase your …show more content…
Preparing for an uncertain future includes challenges that the military will face in the coming years, what kind of military will be needed, and how to build the right military. Leaving the comfort zone includes realizing there is a different set of enemies than before, new forms of weapons, and new battlegrounds. Thinking about the next war includes highlighting the kinds of challenges the military must prepare for, and how to prepare for it. The response would include collaboration from all agencies. There would be a warning about the attack. The borders would be protected, and the water, land, and air would also be protected. Infrastructures including buildings, railways, utilities, and national symbols would be protected. Identify as best as possible who is behind the attack and how and why they are attacking. For this to happen each agency or group will have to communicate and collaborate with each other. If there were no collaboration between agencies everyone would be running around in circles around each other not knowing if something was done or not. A lot of time, money, and resources would be wasted if collaboration was not being

Similar Documents

Free Essay

Social Engineering Attacks and Counterintelligence

...Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Social Engineering Attacks and Counterintelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and Iraq War Logs. WikiLeaks is an open website that reveals classified documents to the general public. Voice of America stated that “WikiLeaks releases 400,000 classified US Military files (Pessin, 2010). WikiLeaks is a serious threat to national security. WikiLeaks is a threat for three reasons: reveals the identities of operatives, defaces the name of the USA to foreign countries, and threatens the safety of the USA. A danger of WikiLeaks is it reveals the identities of operatives both foreign and domestic. WikiLeaks allows the names of many allies and operative missions to be posted on a public website. This type of exposure endangers many oversea...

Words: 1115 - Pages: 5

Premium Essay

Role of Intelligence in India’s Security

...RN KAO MEMORIAL LECTURE BY SHRI NARESH CHANDRA India’s Security Challenges in the next decade – Role of Intelligence I feel greatly honoured and privileged to have been asked to deliver the R. N. Kao Memorial Lecture this year. I believe, it is the sixth in the series started in 2007 by Shri Tharakan, the then Secretary, R&AW . It feels good to be following the five distinguished speakers who have delivered the lecture in previous years. Before this distinguished gathering, it is hardly necessary to enumerate the achievements of Shri Ramji Kao, one of the most celebrated civil servants of our time and the architect of our secret service. He was given charge of organizing the R&AW in September, 1968. Shri Kao had been associated with the creation of the Aviation Research Centre after 1962. He was able to set up and harness the capacities for both human and technical intelligence so successfully that within a period of less than three years, the Organisation was able to make a most valuable contribution to our triumph in the 1971 conflict. He is recognized as a father figure and role model for all officers, young and old, in the R&AW and the Directorate General of Security. As a person Shri Kao had an elegant and striking presence. He was measured and precise with his words yet had a keen sense of humour, an amazing human touch and a love for arts. A significant feature of Shri Kao’s vision for the R&AW was to lay strong emphasis on the quality of manpower...

Words: 5434 - Pages: 22

Premium Essay

Do Economic or Security Interests Play a Greater Role in Shaping the Foreign Policy of the United States? Has This Changed Since the End of the Cold War?

...Do economic or security interests play a greater role in shaping the foreign policy of the United States? Has this changed since the end of the Cold War? Attempting to separate economic and security interests in terms of American foreign policy is no easy feat as both play, and have always played, a major role in the decisions made by the government at different times over recent years. Since the terrorist attacks of 9/11, security interests appear to be of the utmost importance, but prior to that, since the end of the Cold War, economic interests seemed to be the priority. Over the past seventy five years or so, the interests of the United States has fluctuated between security and economy, but all of this has relied upon the world situation at the time. For example, during the Cold War, the U.S. had the worry that they would be the target of missile attacks, making security the number one priority; as is to be expected. However, prior to this, during the depression, the economy was clearly the number one concern. In an attempt to distinguish between the two, the following essay will cover a number of separate occasions where the interests of the United States have swayed between their economy and national security, and how foreign policy was affected by this; those cases being the Great Depression, the Cold War, America’s support for Israel, the terrorist attacks of 9/11 and the very recent Global Financial Crisis, or GFC. With this evidence a conclusion will be made which...

Words: 1806 - Pages: 8

Premium Essay

Iran’s Nuclear Weapons: Realist and Idealist Paradigms

...international affairs. Observations of the relationship will firmly accommodate the two paradigms. The aim will be to elaborate clearly the use of international law and organizations on all the paradigms in connection to international security and inter-state relationships. Realist Paradigm Realism is mounted on the notion that, world politics is driven by competitive self-interests and a struggle for power that is aimed at preserving and improving military, security and economic interests. To realists, the presence of war is essential in a state system as it clearly underlines the hypothesis of international conflict. Such states are characterized by chaos and revolutions, which are directly linked to vested national interests, distribution of power and conflict. a. Political realism The Iranian nuclear program has attracted much attention within the international arena due to the interest devoted by nation’s states on their foreign policies (Bowen & Brewer2011). In international relations, realists and idealists paradigms are important as they concern themselves with substantive issues affecting nations and states while making foreign policy decisions. Political realists argue that states struggle to secure conflicting national interests creating the main action on the globe (Rourke, 2007). Iranian nuclear activities open up the possibility of a secret relationship between her religion and the ongoing nuclear standoff that is mounting international pressure...

Words: 1772 - Pages: 8

Premium Essay

Venezuela Research Paper

...Russia and China, and finally US national security and trade interests in Venezuela. 2. Nearly two times the size of the state of California according to the CIA World Fact Book, Venezuela is situated on the northern tip of South America. Venezuela’s available natural resources are abundant, and, according to Heather D. Heckle, in her article for the Encyclopedia Britannica, include some of the world’s largest natural gas deposits, iron ore, vast coal reserves, gold, diamonds,...

Words: 946 - Pages: 4

Free Essay

Scenario Planning

...the source is acknowledged. The information contained in this publication is, to the best of our knowledge, true and accurate although the forward looking statements herein are by their nature subject to risk factors which may affect the outcome of the matters covered. Opinions from independent experts are presented as their own views in separate inserts with their approval. None of Shell International The companies in which Royal Dutch Petroleum Company and The “Shell” Transport and Trading Company, p.l.c. directly or indirectly own investments are separate and distinct entities. The expressions “Royal Dutch/Shell Group” and “Group” are used to refer to the companies of the Royal Dutch/Shell Group as a whole. The words “Shell”, “we”, “us” and “our” are used in some places to refer to the Group and in others to an individual Shell company or companies where no particular purpose is served by identifying the specific company or companies. Limited, its affiliates and their respective officers, employees and agents represents the accuracy or completeness of the information set forth herein and none of the foregoing shall be liable for any loss, cost, expense or damage (whether arising from negligence or otherwise) relating to the use of such information. Introducing our Global Business Environment To use the metaphor of air navigation, the work of the Shell Scenarios team is designed to help charter routes across three interrelated levels: the Jet Stream level of long-term...

Words: 5392 - Pages: 22

Free Essay

Cyber Ethics

...outline an Acceptable Use policy, Internet Use policy, Security policy, and acceptable conduct policy for its employees that is supposed to be required reading. Like with any law, in cyber security there are always law-breakers waiting for the chance to exploit a weak firewall, a patch in the system, or a careless employee who leaves login information open for the wrong eyes to see. For this reason government and private sector alike must constantly update security measures and do thorough investigations of employees upon hiring. The internet is so large and open that it is a serious security threat for individual corporations and especially government agencies. The US government defends against countless internet attacks every day and because of the vast connections between private companies and government it is both the responsibility of private and public sector to insure everyone’s safety. Developing a widespread Code of Ethics in regards to Cyber Security is an increasingly difficult task. New advances in technology make it difficult to have up to date policies on cyber issues. In the US every state has different laws regarding cyber issues so it complicates how business is run on an interstate or even transnational level regarding customer data. The different state laws affect corporate transparency and what information is required to be shared with internal and external stakeholders, as well as, in the case of a security...

Words: 2222 - Pages: 9

Free Essay

Rise and Risk of China

...transition of China “becoming a formidable global power” (Ikenberry 2011, 26) is of growing importance to Australia’s economic prosperity and security (Shen 2009, 110). But as relative power begins to shift, the latest defence White Paper released last Friday May 3, stated “the relationship between the United States and China, the region’s and the globe’s two most powerful states, will more than any other single factor determine our strategic environment over coming decades” (Probyn and Wright 2013). Drawing upon the Research Thesis of Yi Shen at the University of NSW, the aim of this essay is to examine the repercussions of the US-China strategic rivalry over Taiwan. In the event of conflict, Australia would be forced to side with the US which “has kept Asia peaceful and Australia secure for many decades” (White 2011, 81). Maintaining a military alliance with the US as well as ongoing economic opportunities with China requires stable relations amongst Asian powers by adopting “the logic of concert” (White 2011, 90). As China becomes an ongoing threat to US primacy in Asia, it is in the best interest of Australia to maintain dual relations by the establishment of a new order that ensures regional stability and security throughout Asia. Clash over Taiwan Australia’s ability to maintain dual relations with the United States and China in the long-term remain uncertain due to the US-China strategic rivalry over Taiwan (Shen 2009). Political and military tensions in the Taiwan...

Words: 1673 - Pages: 7

Premium Essay

Critical Infrastructure Analysis

...About (inter)national critical infrastructures 1.1 Defining critical infrastructures A country’s critical infrastructures are the specific facilities, services and informational systems that are vital to its national security, economy, public health, and for the security and well functioning of the Government itself. The failure or destruction of such critical infrastructures could heavily weaken or threaten the latter. As such, both the management and protection of critical infrastructures go hand in hand. Each country is responsible for identifying the national infrastructures that are critical for its security and stability. However, there are certain infrastructures deemed critical by most states. Which are Romania’s critical...

Words: 2254 - Pages: 10

Free Essay

Geopolitics

...personality of your state affects the way you interpret the world. * Content of geopolitical codes. * Popular and elite codes. * Scale of geopolitical codes. * Modelski’s World Leadership. * Critiques. * Regional power. * Regional power hierarchies. * Regional power characteristics. * Components of power: * Indicators of military power. * Indicators of economic power. * Importance of economic power. * Indicators of demographic power. * Indicators off soft power. * Indicators of willingness to act. * Yalta February 1945. * Post-war geopolitical representations. * Kennan on containment. * Truman doctrine. * Soviet geopolitical representations > American imperialism. * Confining national discourses. Session 3 * Confining national discourses. * Domino theory. * US interventionism. * US cold war interventionism. * Soviet interventionism. * Proxy wars. * Cold war= bloody war. * Political realism and institutions. * Security Dilemma. * National security states. *...

Words: 303 - Pages: 2

Premium Essay

Essay On Fourth Amendment

...Over the past two decades the United States has been more and more involved in combatting the ‘War on Terrorism’, both on a global scale and within the United States. Within the United States the idea of achieving National Security, in some cases, often comes with the sacrifice of certain civil liberties in order to afford safety for its citizens, preserving the ability for each person to achieve life, liberty, and the pursuit of happiness. Some of the laws that have been enacted and that have been highly debated of wearing down American civil liberties, are that of those laws that have illegally invaded our right to privacy. There are two distinct laws that provide the American government with power for covert surveillance and that of...

Words: 1064 - Pages: 5

Premium Essay

Merging Data

...Merging Resources and Analyzing Data Domestic and Global Intelligence for Security Management Merging Resources and Analyzing Data It is essential for any organization to have effective utilization of all of its resources In order to do so, an organization must have sound policies and procedures in place. In regards to homeland security these procedures are led by multiple law enforcement partnerships. Bringing uniformity to multiple organizations to collectively analyze data is certainly a challenge. Many Federal, State, and local agencies have been providing good intelligence products, still there are areas that require improvement. These areas potentially hinder the gathering and sharing of intelligence. Legal, procedural and cultural barriers add up to what the 9/11 Commission refers to as the “human or systemic resistance to sharing information” (Kean et al., 2004). Combining local, state and federal law enforcement agencies to work together in order to protect and deter against potential threats is the mission for Homeland Security. When analyzing the multiple areas of law enforcement, they must be looked at both individually and nationally. By doing so, we are able to design the state and local roles while maintaining our homeland security’s overall mission. It’s important for the flow or information or intelligence be passed along both smoothly and accurately. Ultimately, the collection and analysis of all information will help increase our ability to prevent...

Words: 873 - Pages: 4

Premium Essay

The History of Human Resource Management

...factories replace cottage industries, and small-scale replaced large-scale production. The US economy converted from agri-based to industry-based. This new system required an well-organized structure, and led to recruitment of a large number of immigrants. Employment were created for the immigrants, recruitment and management of individuals gained vitality. Managers were higher than the employees. This system created a gap between the labour force and the management. Social welfare approached in the early HRM helped the immigrants to get adjusted to their jobs and to 'American' way of life. The programs was assigned to ensured an increase in productivity. In the 1790s, employees empower considerably and increased at a quick pace .In the 1800s and 1900s the advent of Labour Union led HR department more capable in politics and diplomacy. HR department has management, labour unions, and Frederick W. Taylor's (1856-1915) theory of 'Scientific Management'. In 1902, National Cash Register was formed to handle employee grievances, record keeping, wage management and other employee-related functions. In 1913, the US Department of Labour promoted the welfare of employees. In 1920s and 30s, the impact of the Hawthorne studies enhanced the physical work conditions for employees changes from workers' efficiency to efficiency through work satisfaction. In 1938, the Fair Labour Standards Act provided security and helped increased the standard of the employees. Since then, the welfare of workers...

Words: 522 - Pages: 3

Premium Essay

The Commodification of Free Speech

...aspects of this effort against violent extremism, which violate human and constitutional rights, such as drone strikes, waterboarding, and black prison sites, are specifically targeted toward a specific population, it is the subtler aspects of mass surveillance and corporate and governmental intrusion of privacy which present an overwhelming threat to human rights and quality of life. As has been made clear by recent revelations of the scope and depth of these intrusions, internet users specifically have many reasons to suspect that private information entered online is vulnerable to un-ethical intrusions by third parties. However, many groups and individuals have come together to bring resolution to the issue of personal privacy and national security. According to article 12 of the Universal Declaration of Human Rights, no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honor and reputation (Lachmayer 749). However, the more subtle aspects of the new counter-terrorism age include a heightened amount of internet surveillance, video surveillance of public spaces, electronic eavesdropping, and data retention. Additionally governments have access to bank accounts, travel booking information, and data held in cloud storage (749). In other words, nearly every aspect of modern life can not only be monitored, but due to recent technological expanses, the captured information can also be stored for indefinite...

Words: 2685 - Pages: 11

Premium Essay

U.S. Department of Homeland Security

...U.S. Department of Homeland Security Chris Cabral National American University Abstract The primary mission of the Homeland Security Act is to prevent terrorist attacks within the United States, reduce the vulnerability of the United States to terrorism, and minimize damage and assist in recovery for terrorist attacks that occur in the United States. The U.S Department of Homeland Security was established after the 9/11 attacks to counter terrorist activities against the United States. Homeland security is officially defined by the National Strategy for Homeland Security as "a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur”. The major objective of the Patriot Act is “to deter and punish terrorist acts in the United States and around the world to enhance law enforcement investigatory tools" by dramatically reducing restrictions pertaining to law enforcement requests to search telephone records, e-mail communication, and health records. The Patriot Act allows for the emergency disclosure of electronic communications to protect life and broadens the definition of terrorism to include acts of domestic terrorism. Under the Foreign Intelligence Surveillance Act, the Patriot Act allows the director of the Federal Bureau of Investigation or a designee of the director to apply for an order requiring the "production of any tangible things (including...

Words: 3497 - Pages: 14