Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask PHP Expert

Develop an envisioned methodology and design a research topic based on the research problem, purpose. Then write a research paper to identify the strengths and weaknesses of the envisioned method and design. In the paper, justify why the chosen method and design would be most appropriate for your research questions. Then justifying the chosen method and design, discuss why alternative methods/designs would be less desirable for this study.

Problem Statement

What does it mean to collect and share intelligence information within the United States? In essence, intelligence involves gathering and analyzing data about who, what, where and when someone is planning an attack of some kind. To do this, we must gather information about people and organizations that have not yet violated the law. Simply gathering the information does not make it intelligence however, analyzing it does. Hence lay one of many problems the physical taking and obtaining information for Department of Homeland Security (DHS). This information is collaboration between DHS and Regional Information Sharing System (RISS) (Department of Homeland Security 2006). Network system that cause communication data links that enable computer to communicate with each other. In international security, there are many different types of intelligence; including Signals Intelligence (SIGINT), Human Intelligence (HUMINT), Communications Intelligence (COMMINT), Imagery Intelligence (IMINT), Measurements and Signatures Intelligence (MASINT), and open source information (Larence, 2012).

The type of intelligence most appropriate shared between local law enforcement and the international intelligence community is Human Intelligence (HUMINT). These paper discuses the problems with not share information in the homeland community(Larence, 2012). It is also worthwhile to note that there are local government sources of data that may be trivial but valuable to share at a national level; such as parking ticket data collected by parking enforcement bureau's, text data on law enforcement's incident reports. It is also important that we define the routine low-level police records that are most important to feed into the human intelligence process (Larence, 2012). Some of the requirement includes the following:

Local law enforcement needs to know when a known terrorist is in their vicinity. International intelligence needs details of what a known terrorist is doing in a local community and details of specific targets within the United States.

Local resources may need to be tasked to look for anything involving certain targets and weapons such as; biological materials, known terrorists, explosives, financial transactions, infrastructure and weapons of mass destruction (Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information-Sharing Initiatives, 2007).

Also by developing a full productive of information sharing within the federal government, state, local, and private sector. Although numerous of improvements have been made in protecting our country critical infrastructures and sharing information's efforts are in progress to continuing address these problems (Harold, 2004). The consequences of not addresses these problems made result into another traumatic even like September 11.

The purpose of this exploratory research was to examine the state level and the organizations created in the past six years. This research consisted of law enforcement and intelligence personnel from 50 states and 70% of the control study provided input. As a result the experimental procedures, treatments, and experiences of the participants that threatens the researcher's ability to able to draw correct inferences from the data about the population.

The potential threats to internal validity that may arise in this study, responses and actions: (1) some agencies may not want to share information with other agencies. Response and Action: The PATRIOT Act will then be enforced. This states that agencies have the right to gather intelligence from potential threats.

(2) The legality of sharing information.Responses and Action: This will limit the process due to the legal process of allowing states to share information with each other. To include federal, state, and local agencies, the law may prohibit the transferring of information because it may be classified information. (3) The legality aspect of collecting information then to process the information for intelligence. Response and Action: To have laws in effect to provide the necessary legal paperwork for warrants. (4) To notify the appropriate authorities for the proper response to the threat. Response and Action: The immediate approval to inform and share information with other agencies for the appropriate responses.

The manner in which validity issues could possibly impact my research is by (1) The PATRIOT Act should not be an issue because this is a law passed by congress. (2) Agencies being limited due to the legal procedures and or restraints of the US courts. Also, because of the classification of information being declassed may cause it to be delayed or denied to other agencies (3) the collection of information may also be delayed by how the information is ranked from low, medium, and to high importance. (4) Negligence may play a vital role when notifying the proper authorities within a timely matter.

Questions:

1. In your opinion, how prepared is your organization for homeland security in your region.

2. How, aware are you personally of homeland security threats facing your region.

3. How, aware is your organization of homeland security threats facing you region.

4. How prepared is your organization to prevent a homeland security attack in your region.

5. How prepared is you organization to respond to a homeland security emergency in you region.

6. How prepared is you organization to recover from an attack in your region.
What is the purpose and function of information sharing?

7.What would be measure timeliness, accuracy, or relevance for information sharing?

8. What does it mean to collect and share intelligence information within the United States to you?

9. Is it against the constitution to invade your privacy?

PHP , Programming

  • Category:- PHP
  • Reference No.:- M9752817

Have any Question?


Related Questions in PHP

Question using the course software and week one template as

Question: Using the course software and Week One Template as a starting point, create a new HTML webpage and include the following: • Write the code to display your name in the largest-size heading element. • Write the m ...

In php write a simple addtion calculator that reads in two

In PHP write a simple addtion calculator that reads in two values and then add them together and display the output. Be sure to validate both inputs and ensure that it can add 0+0 = Sum: 0. The user should be able to inp ...

Question continue to build on the skills of providing web

Question: Continue to build on the skills of providing Web page content and structure with HTML and Web page style and layout using CSS. Demonstrate the skill of creating a dynamic Web page that includes JavaScript clien ...

Question develop a 5-6 page word document that describes

Question: Develop a 5-6 page Word document that describes the design for a small Web site that meets the following specifications. 1. The Web site includes four or more Web pages designed according to current usability g ...

Final project assignment -requirements specifications -1

FINAL PROJECT ASSIGNMENT - REQUIREMENTS / SPECIFICATIONS - 1. For the final project, you will have to make good use of your CMS using PHP and MySQL for the content delivery. You will have to be able to deliver the conten ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As