Homeland Security Assignment: Policy And Practice Spring 2019
The reasoning for this approach is three-fold:
1. Provides appropriate time to carefully research and review the test questions from lecture, assigned readings, current events and your own notes;
2. Allows for careful consideration and revision of your written work; and
3. Creates a reality-based approach to written work. Under no circumstances will you ever write a report as part of your future employment in a blue book in 45 minutes.
The intent of this choice is to allow you to select choices that you feel demonstrate your competence and understanding of that particular topic. Play to your strongest understanding and choose the most appropriate questions based on your interest, comprehension and ability to respond. The expectation will be that you leave no concept, answer or idea unexplained in your analysis. If you use a course term, you need to demonstrate your knowledge of that concept.
QUESTIONS:
1. We have explored the idea that homeland security policy is really about two concepts-the US Department of Homeland Security, and the broader "Homeland Security Enterprise" that includes state, federal, local, and private sector partners among others. Within those two concepts are a variety of statements about what the homeland security mission is. In many ways, both the passage of time, and the particular level of government (state, federal, local) practicing "homeland security" have influenced concepts and frustrated a common understanding of the term "homeland security." For this question, evaluate the following:
A. Using the course material, develop your own concept of what homeland security is? Write your own definition, that summarizes your view of what homeland security is, based on the readings, using citation.
B. Explain your definition of homeland security, using no fewer than five concepts of homeland security (e.g. academic sources, government doctrine, and text book readings) to explain your reasoning. Those may rely upon Bellavita, but not exclusively. Regardless of choice, provide analysis of that choice.
2. The Emergency Management Cycle has been used as a model to help homeland security practitioners evaluate and manage threats. As Emergency Management (EM) as a discipline pre-dates the creation of Homeland Security by about 40 years, EM provides a certain trailblazing approach to how to manage multiple agencies during a crisis. For this question, evaluate the following:
3. Create a hypothetical disaster. Define and evaluate each step of the EM cycle against the hypothetical disaster, emergency and/or catastrophe, drawing upon the potential list of hazards discussed in the readings
4. Marion et. al. suggest that the EM mission may have been diluted since being added to "homeland security." Should FEMA be reorganized to assure that the EM model has not been spread too far from its initial mission, and can continue to address all-hazards? Or is the model useful for other disciplines. Explain.
A. One of the challenges in coordinating all homeland security management activities is managing our national culture and laws, including the relationship among the people, and their governments. This challenge is rooted in our Constitutional federalism-one people with two sovereigns (the state, and the federal governments respectively). During the course, we have discussed classical notions and sources of federalism and how they impact 21st century Homeland Security policymaking. For this question, evaluate the following:
a. How does federalism affect homeland security and emergency management?
b. i. Identify four examples (from any week thus far), and explain how the concept of federalism impacts how governments respond to disaster or terrorism.
ii. Provide an analysis of the benefits and detriments of the federalism relationship for securing the homeland for each example you choose.
B. Rephrasing the famous quote from Justice Potter Stewart, do we "know terrorism when we see it?" Over the course of the semester, we have evaluated several concepts of what terrorism is and could be. One challenge, according to Schmid, seems to be that there is no consensus definition in the literature. Moreover, federal law varies on what terrorism is. For this question, evaluate the following:
a. Evaluate four of those ideas from the readings, including the challenges each of them pose for how to either counter their messages or tactics, or how to arrest individuals who practice terrorism.
b. Use course materials and case studies to defend your choices, above.(Note, this question is not intended to be limited to the Schmid reading--please evaluate a from a variety of authors' perspectives.)
C. The evolution of terrorism has mirrored the evolution of social media as a tool to spread information. According to Schmid, this is "terrorism as propaganda." In a pre-9/11 world, terrorists used to have to send people to radicalize individuals face-to-face. Now, social media provides unlimited means to radicalize people in their own homes. Recent works, like the NCTC indicators, seem to reaffirm the need to minimize the impact of radicalization on "homegrown terrorists." Using course materials and case studies, answer the following:
a. What is a homegrown violent extremist?
b. How is a homegrown violent extremist possibly radicalized?
c. What limitations are placed on the government to thwart propaganda?
d. Lastly, provide a recommendation on how the government should counter terrorism propaganda through social networks and social media, based on your own understanding of social media and citing sources (e.g NCTC) from the course material. Provide justifications for your recommendation.
Format your assignment according to the following formatting requirements:
1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.