Law Question
Style | APA |
Number of words | 985 |
Number of sources | 0 |
Spacing | Double |
PowerPoint slides | 0 |
Module 4 – Case
DOMESTIC SECURITY AND CYBERTERRORISM
Assignment Overview
The purpose of this case is twofold. First, students will become familiar with agencies involved in domestic security and counterterrorism. There are too many agencies to present; therefore, I request the student read their missions and histories. Students are encouraged to deviate from the posted readings and look at the provided DHS organizational chart, seek the charts from the Department of Health and Human Services, the Military, the State Department, and the Justice Department to find out more. The organizations of the Federal Aviation Administration (FAA) and Federal Emergency Management Agency (FEMA) are deliberately left out because the students should cover both of these agencies in-depth in other classes. The Case questions concern the interaction of key federal agencies when responding to acts of terrorism.
Secondly, the narrative for this module outlined and suggested further student research in domestic/international terrorism and a beginning in Cyberterrorism. All three are linked and part of the fundamentals of this course. The questions for the last module relate to all of the module’s backgrounds. When answering the questions consider the level of the terrorist group mentioned, the organizations that would combat them, and the tactics used. Boyd Theory and Gaming Theory are the key backgrounds for combating this type of terror. The readings in guerrilla and terrorist tactics are important in understanding the groups involved. Again, individual copy cats and lone-wolf terrorists are considered a part of the whole they are trying to emulate. These individuals are the most difficult to detect and thwart. Consider the past modules’ references to the Patriot Act and independent surveillance portended across national and international borders and the reaction from dissident groups concerning their “rights” infringement.
Case Assignment
Answer the following questions:
1.In Merutka, C. E. (2013). Use of the Armed Forces for domestic law enforcement, Conclusion on p. 23: “The Armed Forces have always engaged in domestic law enforcement.” Provide a recent example.
2.In the realm of counterterrorism, briefly explain the roles and responsibilities of the a) Federal Bureau of Investigation (FBI), b) Centers for Disease Control (CDC), and c) United States Border Patrol.
3.Comment on a recent example of cyberterrorism. How is cyberterrorism being addressed operationally and legislatively?
The following items will be assessed in particular:
1.Your ability to apply your understanding of the roles of the assigned agencies in combating domestic terrorism and their interrelationships.
2.Your ability to express the effectiveness of the changes in the entire spectrum of homeland security as applied to domestic terrorism.
3.In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.
Assignment Expectations
Length: This Case Assignment should be at least 4-6 pages not counting the title page and references.
References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When the material is copied verbatim from external sources, it MUST be enclosed in quotes. The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).
Organization: Subheadings should be used to organize your paper according to the question.
Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standards guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity.
The following items will be assessed in particular:
Relevance: All content is connected to the question.
Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion: Present and integrate points that lead to deeper issues.
Breadth: Multiple perspectives and references, multiple issues and factors considered.
Evidence: Points are well-supported with facts, statistics, and references.
Logic: Presented discussion makes sense, conclusions are logically supported by premises, statements, or factual information.
Clarity: Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity: Avoid the use of first-person and subjective bias.
___________________________________________________________________________________________
Module 4 – Background
DOMESTIC SECURITY AND CYBERTERRORISM
Required Reading
Cyberterrorism: The invisible threat of stealth cyber predators in a climate of escalating risk. (2010). Foreign Affairs, 89(6), 24A. Retrieved from the Trident Online Library.
Haddal, C. C. (2010). Border security: The role of the U.S. Border Patrol. Congressional Research Office. Retrieved from: http://www.fas.org/sgp/crs/homesec/RL32562.pdf
Homegrown violent extremist mobilization indicators. (2019). Retrieved from the Office of the Director of National Intelligence at https://www.dni.gov/files/NCTC/documents/news_docu…
Read pages 87-90 in:
Hughes, G. (2011). The military’s role in counterterrorism: Examples and implications for liberal democracies. U.S. Army War College. Retrieved from http://www.strategicstudiesinstitute.army.mil/pdff…
Merutka, C. E. (2013). Use of the Armed Forces for domestic law enforcement. Defense Technical Information Center. Retrieved from www.dtic.mil/get-tr-doc/pdf?AD=ADA589451
McNeal, G. S. (2008). Cyber embargo: Countering the internet Jihad. Case Western Reserve Journal of International Law; 2007/2008, 39(3), 789. Retrieved from ProQuest in the Trident Online Library.
Tactical response and operations standard for law enforcement agencies. (2015). National Tactical Officers Association. Retrieved from http://ntoa.org/pdf/swatstandards.pdf
Theohary, C. A., & Rollins, J. (2011). Terrorist use of the internet: Information operations in cyberspace. Congressional Research Service. Retrieved from: http://www.fas.org/sgp/crs/terror/R41674.pdf
The police response to active shooter incidents. (2014). Critical Issues in Policing Series. Retrieved from http://www.policeforum.org/assets/docs/Critical_Is…
Required Websites
Department of Homeland Security. (n.d.). Active shooter preparedness. Retrieved from https://www.dhs.gov/active-shooter-preparedness
Federal Bureau of Investigation. (n.d.). Active shooter resources. Retrieved from https://www.fbi.gov/about/partnerships/office-of-p…
Federal Bureau of Investigation. (n.d.). Critical incident response group (CIRG). Retrieved from https://www.fbi.gov/services/cirg
K-12 School Shooting Database. Retrieved from https://www.chds.us/ssdb/category/graphs/
Storyful News. (2017, June 1) Police corner mass killer in Pulse Nightclub [Video file]. Retrieved from
20210131205350edm501_mod4_background