Edudorm Facebook

Private security

Week 10 Discussion 1 CRJ 44

Law enforcement intelligence and private security work together in combatting domestic terrorism. The role of law enforcement intelligence is to gather information. Intelligence agencies collect information, analyses, and circulate the information to other agencies such as military units, state agencies, federal agencies, and others (Bolz et al., 2001). These agencies use the information to conduct the investigation. In general, law enforcement intelligence prevents terrorism through information sharing. The agencies responsible for combatting terrorism must share effective information, and when the information is combined, it should provide an insight and a culture of awareness. The goal of information must be for counterterrorism activity, and the information sharing must use technical capabilities (Bolz et al., 2001).The agencies use the information to understand the nature of threats, develop response strategies, allocate resources, and prevent threats. On private security, it is important to understand the private security has invested in national infrastructures such as transportation, manufacturing, and more. The private sector coordinate security plans with intelligence agencies (Bolz et al., 2001). Through collaboration and coordination, the private sector gains information which helps the agencies protect transportation and other properties. Private security organization and investigators combat terrorism threats such as computer crime, identity theft, counterfeiting, and other offenses. They use specialized equipment such as tactical robots.

The law enforcement intelligence should increase effectiveness through creating a working relationship so that the agencies can understand intelligence functions. In other words, there should be functions integration between regulatory and intelligence agencies (Rose, 2014). Integration of functions will allow these two areas to understand contemporary events and eliminate uncertainty. The second recommendation is that the intelligence functions should be extended. This means that law enforcement intelligence should employ a business intelligence approach. The purpose of extending the role to include professional business intelligence is to assess risk in areas of interest (Rose, 2014). For example, money laundering activities in one enterprise may proceed to other enterprises. Therefore, business intelligence will help understand emerging crime risk. The last recommendation is that the private security sector needs training and development. The security environment is changing, and therefore, the private security personnel should receive training so that they can handle terrorist scenarios such as high-tech crime (Rose, 2014). The terrorists are improving their techniques, and so it is important to increase security education so that the security agencies can be well prepared to address terrorism-related crimes.

On labeling a suspect as an enemy of combatants, I feel that the court should have the authority to designate. This is because all suspects of crimes should face trial in the court so that the judge can hear the evidence and make a decision (Napolitano, 2007). The issue on who should label someone as an enemy of combat is a current debate. Note that the president has been designating suspects as an enemy of combatant and this means that the president has the authority. However, I argue that the totalitarian system that gives the president the authority to act as a dictator should be eliminated and allow the court to protect the citizen's rights.  The court should decide if a suspect is an enemy of combatant or a criminal through a court hearing (Napolitano, 2007). Note that the court will apply well-established criteria, use judicial review, and implement the principles of international law to decide whether someone is an enemy of a combatant.

 

 

References

 

Bolz, Jr Frank., Dudonis J. Kenneth., & Schulz P. David.  (2001). The Counterterrorism

Handbook: Tactics, Procedures, and Techniques, Second Edition. CRC Press

 

 Rose Gregory. (2014). Following the Proceeds of Environmental Crime: Fish, Forests and

Filthy Lucre. Routledge.

 

Napolitano, A. P. (2007). The constitution in exile: How the federal government has seized

power by rewriting the supreme law of the land. Nashville, Tenn: Thomas Nelson.

 

631 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...