StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Super-Powered Individuals - Report Example

Cite this document
Summary
According to research findings of the paper “Super-Powered Individuals”, super-powered individuals are an emerging threat and surveillance is one component in ensuring the threat is contained. It is evident that internal terrorism and radicalization could be financed by these groups of people…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Super-Powered Individuals
Read Text Preview

Extract of sample "Super-Powered Individuals"

Super-Powered Individuals al Affiliation Super-Powered Individuals Introduction Homeland security has been the major concern of the country’s security policy. The national security policies are changing due to the increased threats from both local and international threats. These policies are being based on efficiency, the ethical consideration and their constitutionality. Homeland security is all about safeguarding the security interest of the citizens. As the world changes integrated polices are being enacted to ensure that they are in line with the international requirement. There exist emerging issues in national security and it is the duty of the homeland security to enhance mechanisms that will ensure major issues are tackled. Surveillance and profiling has been a major concern in matters security. The country is court between the bill of rights and national security. Among major functions of department of homeland is to ensure the internal defense by coordinating functions with other departments. Internal threats are more complex since it is difficult to identify potential threats. In this case super-powered individuals have been a major concern. Super-powered individuals are an emerging threat and surveillance is one component in ensuring the threat is contained. Overview The country is faced with different kinds of threats. The major concern is super-powered individuals as an emerging trend in homeland security. The existence of this factor in the country’s jurisdiction, limits the international collaborative action. The concept is different from international terrorism where combine forces are needed to eliminate the threat. The economical stability of is a defining concept in positioning the country within social groups Super-powered individuals have been major concern to the Department of Homeland security. In most cases these group of Individuals posses both economic and social strengths. There social strength allow individual to access to high-tech equipment and under the firearm act, the individuals are able to acquire guns and other forms of ammunition. The major concern of the Homeland security is how to control this type of group given their technological and financial prowess. While dealing with these threats the government is required to consider the ethical impact, legal concepts and the availability of resources (Thaler & Bea, 2005). Prevention is an effective model while dealing with terrorism. The models deployed by the Homeland security needs to determine the potential threats caused by these groups of people. This means monitoring their activities through available data and constant checks of their actions and moves. Intelligence is an integral component while combating terrorism and any other form of crime. National security relay on intelligence through security departmental collaborations. Implement plans that will ensure a safe environment to the citizens is a major priority to the department of Homeland Security. The major threat caused by this group is the ability to radicalized groups and fund extremist, access intelligence information though the government’s database. There is need to focus on their activities in an effort to ensure their actions are contained (Thaler & Bea, 2005). Available resources should be channeled towards ensuring the homeland is safe. The security dockage should the concern of any government. Equipping this department will mean that the country will effectively deal with threats and prevent attacks from happening. IT has been a major concept in ensuring security components are functional are able to work according to their designated purposes. In an effort to enhance intelligence, the country requires a comprehensive plan that bases on technology. Surveillance and interdepartmental communication would be effective. The action will be effective in planning, preventing and developing an action plan in an event super-powered individuals poses a threat to national security. The homeland security department requires an overhaul of existing system to adapt mechanisms that will enhance security by dealing with emerging issues. The focus of the department will be how to use available mechanism ethically and within the law. A collective role from the executive and the legislature arms of government are needed in an effort to eliminate chances of a conflict resulting from unconstitutionality of a certain action aimed at ensuring national security. The major components in surveillance include Cyber, Video surveillance, and use of automated device in ensuring security to the locals (Thaler & Bea, 2005). Cyber Security and surveillance The major concern of the department of homeland security is how to manage the activities of the super-powered individuals. Radicalization in the 21st century mainly takes place online. The cyber related terror is as a result of the locals being influenced by these group of people though social media and other forms of communication through the internet. The unlimited access to the internet their technological advancement creates a major threat to the homeland security. The department of Homeland security has the obligation to filter information from the internet and in collaboration with the Federal Bureau of investigation act on suspicious messages and information exchanged through the internet. The unmanned channels could pose a major threat to the security wellbeing of the state (Landau, 2010).these groups have the ability to navigate the legal concept set aside by the country. According to Young (2011), Electronic communication privacy Act and the Foreign Intelligence Surveillance Act are the two legal concepts that limit the use of cyber surveillance as a tool in national security. The privacy rule limits the government from spying on online information shared between individuals. In an international level there is the aspect of jurisdiction in that the government could be limited in the manner in which they interact with cyber information. The legislations require a clear court or legal permit to conduct an online surveillance. The government has to specify on the nature of surveillance. The limitation could be a negative while pursing intelligence models. The national security threats are changing and mechanisms are in place to allow the National Security Agency to use foreign and domestic internet data to be used for intelligence purposes. The section 702 of the Foreign Intelligence Surveillance Act allows the government to spy telephones conversations and retrieve internet data from both international and local targets. Under this act the NSA plays an integral role (Rollins & Liu, 2013). This is a means by the government to curb new trends in national security. The information retrieved from the internet is analyzed and shared with appropriate department. According to Domestic Surveillance Directorate (2010) the government established the PRISM program to allow the NSA to directly intercept internet data from suspect. This includes tapping internet communication between locals and the suspected super-powered individuals. Under the program the intelligence service has a mandate to monitor social media communication and filter suspicious elements with the social media domains. The effort is to ensure the online radicalization is monitored and suspects apprehended before they turn into local terrorist. Under the FISA act the intelligence service has the jurisdiction to invade privacy in an event national security is under threat (Pauline, 2012). Video surveillance and profiling Human profiling and surveillance is an initiative by government to monitor activities of citizens. The information gathered through this means could be effective while combating threats cased by super-powered individuals. The activities of suspected targets are monitored and are phone records analyzed in an effort to retrieve vital information. As far as a number of local terrorist are either radicalized or extremist. In some cases they are a result of activism. These activists are triggered by either perceived oppression by the government regime. The use of CCCTV cameras mounted at different locations in the country could be essential in preventing and minimizing the activities of super-powered individuals. Information collected would be essential in planning. Intergovernmental agency are required in the planning an execution of an action plan. The major issue could be the ethical concept. The government is caught between identifying the potential target and spying on them without infringing the right to privacy of other innocent citizens. The need to separate suspects from other citizens is crucial and profiling is means in which the government utilizes to achieve this action (Pauline, 2012). Phone records and tapping calls are essential elements in human profiling but it could be subject to ethical concerns. According to the National Intelligence (2014), the aim of video surveillance is provide the department of Homeland Security with decision making advantage and minimize on the impact of a given terrorist action to the common citizens. Phone tapping requires a collaborative effort of mobile service providers and the government’s intelligence service. The initial objective of the video surveillance was to enhance safety but it could also be used as a toll of ensuring local terrorists to not execute their plans. The community involvement in curbing super-powered individuals could be enhanced by surveillance as means of monitoring movement. The concept of surveillance is to initiate a plan. The process requires a collective role. The local police department is essential in the execution of the plan. The local and federal government needs to work on mechanisms that would minimize threats. CCTV cameras mounted in public places could also be effective in apprehending perpetrators in an event an attack occurs. Use of UAV as a surveillance tool Apart from CCTV and phone records the government may use Unmanned Aerial Vehicle as a tool of intelligence sourcing and surveillance. The effectiveness of the device would depend on their cost benefit analysis basis. The amount of invested on these tools should reflect on the outcome (Pauline, 2012). The government may spend more in an effort to balance between national security and economic concern. The tool could be expensive to deploy in a larger scale. This tool could be if used for intelligence purpose could be effective. In some cases local terrorist suspect financed and radicalized by super-powered individuals may be hostile and human elements in seeking intelligence data could ineffective. The use of UAV could be effective in this scenario as it will minimize on the human casualty. Super-powered individuals require a mechanism that enhances communication to advance their activities. In this case a command center is created to coordinate their activities and monitor government plans. Integrated model in dealing with super-powered individuals Interdepartmental collaboration would be effective in dealing threats caused by super-powered individuals. The country needs civic education to educate citizens on the importance of patriotism and limitations of their rights when national security is under threat. From this perspective the homeland security should engage with local community as means of information sourcing. The information gathered should go a long way in ensuring that the homeland is protected from potential terrorism. The surveillance of the local population would be effective in identify suspects. The concept of surveillance should be done in accordance to the constitution to avoid aspects of unethical conduct arising. Surveillance and intelligence seeking should be the work of the NSA in that relevant information is collected and analyzed at a control point. Different agencies should be considered in the execution plan. The police and special units should be deployed to prevent an attack financed and orchestrated by super-powered individuals In an event an attack occurs, the Homeland should be in position to minimize the impact by deploying models that will sensitize the public on safety concerns. The use of Video surveillance, Unmanned Aerial Vehicles, phone tapping and internet controls should be effective in matters intelligence. The identification process should shift to avoid conflict of interest. The government under the legislature should place laws that ensure the model works. Ion matters bill of rights exceptions should be in place. This means the government should be able to access information from suspected terrorism and act upon them before an attack is carry out. Conclusion Homeland security is facing major threats. Emerging trends in matters security makes it impossible for the homeland security to deploy same models. The department needs advanced models to deal with internal threats. These threats include super-powered individuals. It is evident that internal terrorism and radicalization could be financed by these groups of people. Super-powered individuals are an emerging threat and surveillance is one component in ensuring the threat is contained. The use of video and internet surveillance in the integrated model would minimize the impact of super-powered individuals on national security. The government should invest in models that limit the activities of radicalized groups and extremist. This means emerging the local while at the same time spying on suspects to avert an attack. This problem is caused by various components and it is the duty of the Department of Homeland security to ensure that the problem is dealt with at its initial stages before it acuminate into a national disaster. The government develops models that are aimed at national security and it’s the duty of the Homeland security department to implement them. Reference Carter, D. (2004). Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies. Washington, DC: U.S. Department of Justice. Domestic Surveillance Directorate.(2010). Surveillance Techniques: How Your Data Becomes Our Data. Retrivied from https://nsa.gov1.info/surveillance/ Landau, S.E. (2010).Surveillance Or Security?: The Risks Posed by New Wiretapping Technologies. Boston, MA: MIT Press National Intelligence . (2014).The National Intelligence Strategy of the United States of America. Retrieved from. http://cryptome.org/2015/02/us-spy-strategy-2014.pdf Pauline, R. (2012). Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization: Cyberterrorism, Information Warfare, and Internet Immobilization. Hershey, PA: IGI Global. Rollins, J.W. & Liu, E.C. (2013). NSA Surveillance Leaks: Background and Issues for Congress. Washington, DC: Congressional Research Service. Thaler, W.M. &Bea, K. (2005). Emerging Issues in Homeland Security. New York: NOVA Publisher. Young, M. (2011).Electronic Surveillance in an Era of Modern Technology and Evolving Threats to National Security. Stanford Law & Policy Review, 22 (1) pp. 11-39 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Super-Powered Individuals Report Example | Topics and Well Written Essays - 2000 words, n.d.)
Super-Powered Individuals Report Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/politics/1867124-super-empowered-individuals
(Super-Powered Individuals Report Example | Topics and Well Written Essays - 2000 Words)
Super-Powered Individuals Report Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/politics/1867124-super-empowered-individuals.
“Super-Powered Individuals Report Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/politics/1867124-super-empowered-individuals.
  • Cited: 0 times

CHECK THESE SAMPLES OF Super-Powered Individuals

Solar water heaters: an analysis and discussion of thermosiphons

In the United States alone, approximately 3000 kWh per year are utilized for each individual as a means of heating water.... As such, this represents the second highest energy need after heating and cooling.... hellip; Due to the fact that hot water has become a fixture of the developed world and is required in all societies, seeking to utilize more efficient means of hot water generation is something that engages environmentalists and engineers alike....
7 Pages (1750 words) Essay

WK1_Strategic Plan, Part I: Conceptualizing a Business

Table of Contents Introduction 3 Defining the business 4 Vision, Mission and Values of Super Fit 5 Analysis of the mission, vision and values 6 … Super Fit Table of Contents Table of Contents 2 Introduction 3 Defining the business 4 Vision, Mission and Values of Super Fit 5 Analysis of the mission, vision and values 6 Evaluation of the organization's addressing of the customer needs 6 Reference 8 Introduction The world of the 21st century is progressing at a rapid pace....
4 Pages (1000 words) Essay

How Capitalism Is Killing Democracy by Robert Reich

In the paper “How Capitalism Is Killing Democracy by Robert Reich” the author focuses on capitalism, which is on a rampage to decimate democracy because the pursuit of profit has possessed the minds of corporate entities as well as investors and customers.... hellip; The author states that the eventual success of capitalism, fueled by billions of dollars of plutocratic money as well as the desire of governments for high economic growth that would hopefully position them as one of the highly industrialized and/or commercialized economies in the world, has created a huge monster....
3 Pages (750 words) Article

Influence of Culture on Values and Expectations in Ones Life

In the paper “Influence of Culture on Values and Expectations in One's Life” the author discusses a direct influence of culture on our attitudes and lifestyles.... Culture forces us to reassess our values and expectations via the images.... nbsp;… The author claims that as the level of one's expectations rises, the sense of satisfaction is generally lowered because people are prone to attribute such high expectations from their careers and relationships that they are unable to achieve what they aspire....
2 Pages (500 words) Essay

Technology in the Next 25 Years

The aim of the following assignment "Technology in the Next 25 Years" is to provide critical analysis of the major predictions regarding future development in technology and, moreover, how it will affect individual human beings and society as a whole.... hellip; The world has changed and will continue changing in many aspects in the coming 25 years....
2 Pages (500 words) Assignment

Analysis of Globalization: The Super-story by Thomas

efore the eyes of Friedman, globalization is a force multiplier that gives nations, global markets, and individuals at different levels of incorporation are empowered to communicate and us the available resources.... "Analysis of Globalization: The Super-story by Thomas" paper focuses on the article in which the author creates an interesting passage on globalization that touches on the essential elements of security and its impacts on peace....
5 Pages (1250 words) Essay

New Product: Super-Treadmill

The treadmills made before power machines were used in industries in order to harness the power of individuals when working.... The device was introduced into the market before the discovery of power machines.... The treadmills made before power machines were used… The current treadmills have conveyor belts, which are powered by electric motor....
2 Pages (500 words) Essay

Particular Stage Of Human Development

… For the sake of anonymity, we shall refer to the subject as “Sue”.... Sue is a 28 year old college student currently in the 4th year of her studies.... She grew up bearing many issues from her restricted childhood.... A brief glimpse of her childhood reveals For the sake of anonymity, we shall refer to the subject as “Sue”....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us