Edudorm Facebook

Research Intelligence on Terrorist Organizations and Groups Globally

Questions We Can Help You To Answer

Paper instructions:

minimum 350 words per question. 3 citations each apa

these are the questions you have to write about


1.    Research Intelligence on Terrorist Organizations and Groups Globally.  Visit and preview the Terrorism Research and Analysis Consortium (TRAC), created by the Beacham Group, LLC on the Internet at:  www.terrorismresearch.org.  Watch the sites on the Internet and provides an efficient series of filters in which to study various types of terrorist targets, tactics, and groups.  Play with the filters, watch some of the posted videos, read some of the articles on ideology, and read the intelligence reports about the latest information on active groups in any area of your choosing.  TRAC is a private entity and was specifically designed to fulfill the research and intelligence needs of faculty, scholars, students, government and defense professionals studying terrorism. Now, visit the National Counter Terrorism Center (NCTC) from the public sector at www.nctc.gov.  The two core missions of the NCTC are: 1) to serve as the primary organization in the United States for the analysis and integration of terrorism intelligence, and 2) to conduct strategic operational planning for counter terrorism activities.  Name the key partners associated with the NCTC and view the Counter Terrorism Calendar.  Now explore career possibilities within the intelligence field.  What types of career opportunities exist within the Intelligence Community at all levels?  As important, what are the knowledge, skills and abilities required to fulfill these types of positions … and are you qualified?  

2.    Is the U.S. Constitution out of Date?  The first ten amendments to the United States Constitution are more commonly known as the “Bill of Rights” and were ratified by Congress in 1791.  The Bill of Rights, and the U.S. Constitution have survived for nearly 225 years of history.  However, the founding fathers never imagined a technological world marked by amazing global communication through computers and the Internet at the current scale, nor a lifestyle that often hinges on personal telephone usage, texting, gaming, and access to online and social media sites.  Should the Constitution be updated and re-written to address such changes in our society?  Why or why not?

3.    Torture and the U.S. Government.  Search the Internet on the subject of “torture by the U.S. government” and read the accounts of such activity by members of the CIA and the military over the last decade. Now, search the Internet under Human Rights Watch and Amnesty International to gain a different perspective. Do you think that torture should be used to illicit information from suspects? How reliable is information obtained from torture?  Are you willing to allow torture of some suspects in order to potentially prevent another terrorist attack on the homeland on the scale of 9/11?
4.    The Texas-Mexican Border.  Texas has a 1,200 mile-border with Mexico that creates unique problems for that state’s homeland security effort. Visit the website of the Texas Governor at https//: www.governor.state.tx.us.  Search for Initiatives under Safety and Security that focus on the border.  Read about the use of the National Guard on the border, the building of a wall to keep America safe from illegal entry, issues involving Mexican cartels, transnational gangs, illegal entry, and public health threats on the Texas-Mexico Border.  Choose one of these topics and develop a plan to diminish the threat posed by one of these issues.  Do you think we can totally secure our border with Mexico?  Do you think we should use the military to patrol the border?  Should we build a wall?  What will be the impact of a secure border to the social and economic systems of both Mexico and the United States?  How will securing the borders of the United States impact the terrorist threat?

5.    Fire Eye. Visit the Fire Eye website at: https://www.fireye.com.
Check out the ‘Assess and Prepare,’ ‘Detect and Prevent,’ and ‘Analyze & Respond’ areas to learn more about the use of malware, social engineering and other tactics and strategies often employed by people attempting to gain illegal access to computer systems.  Watch the video entitled, “Anatomy of an Attack.”  Now, read the M-Trends Report for the year.  What new threats lurk in the cyber world to our infrastructure?  Discuss the huge issue of cybersecurity and information warfare as a major threat to our infrastructure.  Can you think of additional ways to make our country less vulnerable from these types of attack?  Think outside the box! 

756 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...