Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Assignment InstructionsThis written assignment is comprised of addressing intelligence related to homeland security and you will develop a research paper on this topic of 5-6 full pages (not counting

Assignment Instructions

This written assignment is comprised of addressing intelligence related to homeland security and you will develop a research paper on this topic of 5-6 full pages (not counting the title page and reference list):  

What are the capabilities and limitations of domestic intelligence efforts in supporting the homeland security enterprise? Do you feel that the U.S. is appropriately structured and resourced to adequately provide timely, accurate and actionable domestic intelligence to support the entire spectrum of intelligence users (customers) from the Federal government down to state and local agencies (both now and into the future)?

This paper should provide an examination of the various elements that comprise U.S. domestic intelligence efforts (from local law enforcement to national intelligence agencies) and how those entities contribute to the supporting the homeland security enterprise in collaboratively protecting American Citizens. In crafting your paper, it would be good to remember the lessons learned from the 9/11 Commission on the difficulties of getting various agencies from all three levels of government to collaborate as well as intelligence sharing lessons/recommendations. Also, address the capability of the homeland security enterprise to adequately identify and address future challenges. In developing your response, you should address challenges of providing for homeland security while maintaining civil liberties as well as emerging trends and patterns such as homegrown terrorism and the proliferation of communication encryption technologies. 

  •  Note: As mentioned earlier in this course, remember that "homeland security" is made up of much more than just DHS. That agency is only one part of a larger Homeland Security Enterprise that includes [DHS] Departmental leaders and components [the 7 field agencies including USCG, CBP, ICE, USSS, etc], state, local, tribal, territorial and private sector partners and other... https://www.dhs.gov/strengthening-homeland-security-enterprise as well as many other essential federal agencies that play a role in HLS, such as the very important DOJ where the FBI is the lead agency for countering terrorism in the US (not DHS). Of importance in this paper is the role of the FBI as both a federal law enforcement arm, as well as its role as a a domestic focused intelligence organization.

Make sure you read the instructions carefully and that you focus your paper on answering the assigned questions. This assignment is a research paper, not an opinion paper, so you need to use scholarly sources to support your thesis.  Use formal academic writing and do not use the first person such as 'I' or 'my'; see the OWL site on academic writing style (using appropriate language). Make sure you use APA style in-text parenthetical citations at the end of every sentence where you are quoting another’s ideas (or any information) that is not your own thoughts and words, like this (Bergen, 2015, para 14). Citations are required for paraphrases as well, but not the page or paragraph number in that case. I highly recommend you use the APUS writing guide  which can be found in the university library or at this link: APUS Style Guide for APA. You are welcome to use supplementary sources to compliment the assigned readings based upon your research, but make sure you use only scholarly and credible sources (do not use open websites and you never want to use Wikipedia for a college level paper). Also, dictionaries and encyclopedias as well as general news sites (like CNN) are not appropriate for college level research papers. A good example of what NOT to use is NSA.Gov1.info (which some students have tried to use in research papers), not only is it not the NSA webpage, the site loaded with bogus information and if you scroll down to the bottom it says "This is a parody of nsa.gov and has not been approved, endorsed, or authorized by the National Security Agency or by any other U.S. Government agency." Also, do not cite the weekly lessons as those are only basic information to start off the topic with. You need to use mainly scholarly and reputable academic books and journal articles. Refer to the guide provided to you as an attachment in the Midterm paper instructions here titled “How to find scholarly research sources for HLSS Courses.” Also, see the APUS Library Homeland Security Program Guide for good sources, as well as the APUS Research Primer and the APUS Library Research FAQs. For formatting, the best option is to use the example paper attached to the Midterm instructions as a template (for formatting purposes only).

Requirements:

- Written according to the APA style and format (parenthetical in-text citation formats only; not end notes or footnotes);

- Use Times New Roman 12 point font;

- 1 inch margins on all sides with no paragraph indentation other than the first line by .5 inches 

- Double space all text (no extra lines or spaces after a paragraph or section headings and no added font sizes or lines either) 

- A respectable number of credible resources used, cited in the paper as in-text citations, and included on the reference page. A good rule of thumb is at least 2 scholarly sources per page of content (a minimum of 2 new scholarly sources per page in a research paper is acceptable). Use those academic and credible sources provided to you throughout the course, as well as other scholarly material obtained from conducting your own research. Freely utilize appropriate and reputable academic sources, summarize in your own words (paraphrase) and cite accordingly. You are free to use material from your own forum posts from this course in your paper, and you do not have to cite yourself if you do so.

- The paper must be free of typographical, spelling and grammatical errors (make sure to proof read before submission)

- Turn your paper in as a Word Document and title your assignment "LastnameHLSS302Final".

- The appropriate SSGS Assignment Rubric 300-400 Level Classes Assignment Rubric (as appropriate for this course) will be used to evaluate this assignment.

Finally, be mindful of excessive direct quotes as the paper should not contain just a string of quotations from sources. Make sure you comply with all academic integrity standards expected by APUS and as slide 14 of the APUS Academic Integrity presentation posted in course syllabus (and the week 1 introduction forum) states “Quotes cannot make up more than 10% of the text of your assignment.” So paraphrase where you can and provide your own analysis and synthesis of your research (use direct quotes only when necessary to support your thesis). The bottom line for academic integrity is to write an original work for this assignment (not copied from anywhere on the internet or recycled content from your own previous papers) and to properly cite your references. See the syllabus tab within this course for more important information on academic integrity and the repercussions of plagiarism. Turnitin plagiarism checking software will be used on all papers (automatically).

Show more
Geffmurimi
Geffmurimi
  • @
  • 1030 orders completed
ANSWER

Tutor has posted answer for $30.00. See answer's preview

$30.00

********** ***************************************************************** IntelligenceIntroductionThe ******** ******** ********** ********* ** **** priority ** ******** ******* ***** *** **** attacks *** intelligence *** ****** **** the main blame *** the successful completion of *** **** attacks ** a ****** intelligence ************* were ********** ** help ******* or ******** *** possibility ** future attacks *** **** was a ************ **** *** ******* *** not ********** ********* *** ****** a ***** ********* to ******** *** possibility ** new and emerging attacks (Johnson ***** ******** ***** ******** intelligence efforts have since **** ******* together ** securing *** homeland ******** reviews of *** ************ *** *********** ** domestic intelligence ******* **** ********* *** ************* ** *** domestic ************ ***** ********* *** ************* ** *** intelligence ******* *** ** ** ****** *** single ********** ** ******** ******** ***** ****** ****** ** *** enforcement ***** a ***** **** ** ******** ************ ********************************* ********** **** since ******* **** *** **** *** to ****** more ******** *** intelligence ******* *** ********* **** *** **** ****** ****** *** 9/11 attacks ******* ** ****** * ***** *** uncoordinated agency **** **** *** groups *** ********** their ******* in ******** ********* *** the ******** **** *********** ******* *** National ************ ****** *** *** ************ ** *** Department of ******** Security *** ******** of * single ****** **** *** ********** the ******* ** ***** ************ ***** is **** ********* ** helping ********* ********** ********* in *** counter-terrorism ******************* ***** **** ******** ********* **** **** *** ***** ** ********* **** ***** the 9/11 ******* ********** *** changed ******* Instead ** ******** ************* innovation intelligence *********** have ******** their *** ** ******** security efforts ******** ***** ************* innovations *** made **** ********* **** *** ******** ************* *** ********** ***** ******* **** **** Currently *** *********** agencies **** shared ********* **** ******* lists ** ******** *** ***** ********* ******* **** ** *********** shared *** **** ********** *** ***** **** law *********** ******** ****** to ***** critical *********** ** ********** leading **** ** ***** law *********** *** current ******** ********* are always ******* *** **** ********* ** ********* ******** ************ ****** including the *********** ********** *** presence ** a master ******** **** ** ********** to **** intelligence ****** ** ideal ** ********** and ********* ********* ********* *** ******** ** e *** *** ** individual on *** ****** ********* ***** *** enforcement agencies **** have an ***** on *** **** when that ********** visits their locality ***** ************ groups **** then ***** ***** alert ****** **** in turn ******** those individuals from ********** *** ******** actsIntelligence ********* *** improved ** **** ******* ********** *** ****** more ***** Initially ************ *** ******* only on ******** ********** ************ groups ***** ****** fil ** **** **** ****** minor ******** offenses ** acts of ********* ** ************ has ******* *** ability ** ******* *** **** ** *** criminal ventures ** effective ********* are **** to *** **************** *** ***** ********* crimes ** facilitate ********* activities ** ******** **** seems ** **** *** ******** activities ***** ** ********* ********** information ******* terrorists ********* crimes ************ ***** can flag ********** ************ *** ******** *** ************ that *** ****** ** ********* ****** *** ******** ******** ******** ******** from ********* ************ The ************* security perspective ***** the intelligence efforts in *********** *** ********** ********* **** different **************************** ** **************** efforts *** **** *** *********** ********** ****** The intelligence ********* *** to ***** **** ******* when pursuing ***** since some ***** violate regulations ****** are **** more ********* since ********* ****** **** ********* **** **** ** ***** ** privacy laws *** the *********** of **** enforcement agencies ************ ******* *** ********* difficult especially when ******** *** ******** to ******** some privacy **** ** ***** information gathering efforts **** though some ******* ***** ****** ********** domestic ************ ***** have limited ***** recourse The ****** privacy policies ** ***** *** ***** ** ensure that the ******** ******* their operations without *** *********** ** ******* ***** ***** At ***** ******* **** limitations ***** ********* terrorist **** for ***** terrorists **** *** ******* ***** ********** within the ******** of *** ********** *********** ***** when **** ** *** ******* *** ****** ********** **** ******* ******* directed towards impact ********** *** *** is the *** organization **** ***** with mitigation efforts but ** ******* **** ************** issues (Utley ***** It ****** ***** ******* **** which **** ***** **** ** ******** ******* ******** ** employees or at *** ******* request of *** ***** under ********** ************* *** ******* scope ** domestic intelligence ********* *** ******** concerns ** *** community ***** from ********** ******** ** ** ***** that jurisdictional ****** still **** a **** ** undermining ******** security ********* ********* ******* ******* *** ***** ******** ***** ****** *** ************* ** domestic intelligence The ***** law enforcement *** instance ***** **** **** ********** in ******* with federal ***** **** *** *** ** *** *** on critical ******* ****** ****** ********* ** ******* ** ************ ********** terrorist attack of September ** *** ** *** ************* ************ ** *** ******* ***** ** well ** *** local ******** ******** in the ******* ** *** enforcement *** ************ organizations ********* *** ****** ****** structure **** *** ******* *** ************ ******* ** ***** *** ************ *** no ******** ***** ********** ***** *** ********* ** *** ********* attacks ******* **** **** ******* **** *** **** ******* ** improving *** ************ ******* *** ******* ***** has seen the ******** ** the Department ** ******** ******** *** *** *********** ************* **** **** directed ** ******* ** ************ ******** ** ********* ******** ** *** ***** level there *** **** * lack of robust ************ ********** ********** ***** The ***** level *** **** *** creation ** the ******** intelligence cells ** ****** * connection ******* the ******* *** ***** homeland ******** *** *** *********** as **** ** *** *** ************ ************************* **** ****** *** * ****** ********** ************ ********** ** solve the intelligence issues that *** ****** ********* ** *** ***** ***** *** ******* ***** ******* **** ****** **** ****** in ****** * federal IC ********* ** **** do *** **** ******** ********* that can ****** *** ******** ****** ************ ** the federal level ****** *** ******** at tailoring *** ********** *** ************* ** the ****** ************ ************ ** *** geographic ********** *** to *** variation ** ***** governments it is ********* **** *** ***** ************ *** ******** ** *** United ****** **** ***** are * ***** *** local ****** ******* **** there **** be designated focal points **** connect *** ******* IC ** *** ***** ************ ** well ** ***** ****** on matters ** terrorism threats ** most ****** ***** *** ***** police *** ****** *** ****** ******* *** **** ******* ** ** **** **************** ************ from *** local ** ******* community * ******* *** law *********** ** ******** ****** ***** *** ***** intelligence primarily *** no **** ** tactical intelligence analysisThe mission of *** ***** ******** ******** intelligenceThe ****** ** *** ****** ****** have * ***** **** ** ********* ************ ********** **** ******* *** ******** * center ** ********** ******* *** ******** ************** for *** ***** It may ******* the *********** ** regular ******** *** **** *********** ********* and access to *** ************ at *** ******** ***** *** ******** ***** When the ****** centers *** **** structured ** ***** ** support ** ****** ********** *** enforcement ** **** as the ******** ************ ******* ********** *** ******* ************ ********* ** * ******* developer of *** domestic ** ************ ******* ********* ***** *** ****** ****** *** ********** ** develop intelligence ******* ****************** ************ ******* ** the Federal **************** ****** **** ** New **** ******* ***** among ****** **** ******* ********* as **** ** ******* ******** ** ************ ******* ** can ****** *** realization ** *** ************ ****** **** ** *** steps **** ****** *** ******** *** *** recognition of *** ************ should **** *** *** ******** ***** for state-level ************ ******** *** *** *** act ** * conduit upon ***** intelligence *** be ***** ** ****** ******* *** substance ** *** ** ************ *** ** issued *** ******** ********* ******* **** be ******** *** ***** ** part of the ******** ************ ****** ********** ** ****** ***** ********** *** be done in * ********** schedule ****** ***** ********** *** **** ** place ** the ************* ************ ******** ***** *** ****** **** major ******* *** have *** number ** ************ officers ** **** ** ******* ********* ************* ** *** highest ******** levelConclusionCompartmentalization ** *** domestic ************ *** ***** ** ******** *** cracks *** to *** ********* *** ********* ******* by the **** ********* *** ********** The ****** ** ******** *** ******* ************ can ***** **** issues The ****** states *** ****** *** matter by ****** ** intelligence ****** center ** **** as methods ** ****** *** ***** *** ***** ******** The president should ***** *** **** security ****** ** ********* *** ********** ** Justice ** ** *** **** ****** ** establishing *** ************* ************ fusion ****** However the responsibilities ****** not **** further delegation **** to the ***** enforcement ******** *** *** ******** ****** have * ********* ****** **** ******* *** ************* *********** ** *** ******* ***** *** ***** agencies With *** fusion center the ** structure *** be ********** and ********* ** ***** domestic *********************************************** * * ****************** analysis: a ************** ******** ** ************ * ****** Intelligence and Political ********* The Case ** ***************** *** ******* ******** Companion to Political ******** Abingdon: Routledge ************** * K ************** security ************ **** ***** ***** *********** * * ***** ******** S ***** ****** The FBI *** Religion: Faith *** ******** ******** ****** and ***** 9/11 **** ** California PressLahneman * * ****** ******** Security ************ ************** ** ******** *********** ******* ****************** J * ********* ** intelligence community ************** R E **** ****** 9/11 *** ***** after: Perspectives and problems *********

Click here to download attached files: Domestic Intelligence.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question