Term Paper on "Criminal Justice - Intelligence Does the Projected"
Term Paper 8 pages (2835 words) Sources: 1+
[EXCERPT] . . . .
Criminal Justice - IntelligenceDoes the projected space warfare/ballistic missile threat to the U.S. homeland justify a National Missile Defense, a Global Collective Strategic Defense, or some other solution?
The issue of protecting the United States cannot simply be accomplished by a single pronged effort because of the complex nature of the threats that face the nation. From the growing threat posed by the Chinese Communists to the infiltration by terrorist groups, the issue of national defense must take into consideration both massive threats from powerful nation states to virtually unpreventable attacks launched by groups whose only allegiance is to a religion or a movement. Therefore, to understand the methodology that should be employed to protect the U.S. from the space warfare, ballistic missile threats and alternate uses of ballistic missile warheads that are presented to the nation is a function of understanding the origin of the threats and the capabilities of those who would seek or do presently seek to attack the U.S. Defending the United States from missile attack is ultimately the responsibility of America alone and cannot be abdicated to another body such as the United Nations or NATO and yet, attempting to face the threat alone could prove disastrous for the country.
The first of the major types of threats that is posed to the United States comes in the form of ideological adversaries in China, Iran or other similarly belligerent and potentially hostile nations. According to a recent article in The New American a Bush administration official is quoted as saying "We know the Chinese will enhance their nuclear capability anyway, and we a
download full paper ⤓
With threats posed by fighting forces that have no affiliation to a specific nation but rather seek to destroy their enemy by any means possible including suicide, Islamo-fascists and other terror groups have presented an extremely complex problem for national defense. It has long been the goal of such groups as Al-Qaeda to acquire a nuclear weapon and with the increased availability of such weapons it seems less a matter of if, but a matter of when. The Pakistani proliferation of nuclear WMD technology has made the goal of nuclear acquisition for terrorists closer than ever before. But the threat from these groups does not likely come in the form of intercontinental missiles although that is possible. Instead, the threat lies mainly in smuggling and detonating a bomb in one of the vital sectors of the United States that would damage the economy and/or cause massive casualties. Thus, a missile defense system would do little to protect the nation from the growing threat posed by fundamentalist groups that hate the U.S.
With the issues outlined it is clear that protecting the U.S. from attack requires more than a solution that focuses on delivery of missiles from one area or another. Rather, the nation will need to create a network of protections that include missile defense, international cooperation and a degree of coordination between the two that includes international intelligence. With the aid of allied nations, the United States could more easily construct a missile defense system that protects not only America but provides an umbrella of protection for U.S. allies as well. Further, with an integrated network of nations sharing security concerns and exchanging intelligence information, the U.S. could create a series of road blocks and snares to prevent the use of weapons by terrorist organizations.
2. How can intelligence be used to nullify terrorist organizations over the long-term as a threat to U.S. Homeland Security without compromising U.S. civil liberties?
Answering the knotty question of how to balance security while maintaining and protecting the civil liberties of U.S. citizens involves assessing the methods by which intelligence could and should be used. In addition, the question has a philosophical aspect to it that addresses the fears of many people who would gladly exchange liberties for the safety and protection of themselves and their families. However, to answer the question for how intelligence can be used to thwart the activities of terrorist groups requires careful explanation to assure that despite the fact that intelligence could be used to prevent terrorist acts the question of whether or not it should be used is not ignored. After all "[W]e don't want to trade a situation in which no one gives priority to safeguarding our civil liberties for one in which a Potemkin review board gives reflexive approval to government actions that unreasonably encroach on constitutional liberties." ("In Defense of," 2004, p. A24) Using intelligence to nullify terrorist actions is absolutely possible because of the immense capability that the U.S. has to gather information and track personnel and yet, the behavior required by the government to carry out precisely those acts is often at odds with the principles and fundamental ideals upon which the United States was founded.
Intelligence can be used as a weapon against terrorist organizations in myriad ways. Specifically, federal and local governments can track the movement of persons, purchases made with credit cards, communications, and affiliations and can build all of this information into a profile. Once assembled, the government has the ability through powers granted by the Patriot Act to search, seize and hold individuals suspected of terrorist activities. These actions can most certainly prevent certain acts from taking place that would intend harm against the American population and in many cases intend harm upon Western civilization.
Tracking the movement of individuals in the nation is one of the most powerful intelligence tools the government can use. Gathering information about where its citizens go, when they go, with whom they associate and the purposes of those meetings gives detailed intelligence about growing threats. This information can be used to track suspected criminals and prevent attacks.
Communications can be monitored in a number of ways and coordinated in massive governmental databases. E-mail message interception, cell phone transcript logging, internet search examining and monitoring home and business telephones as well as monitoring conversations that take place in homes, churches, mosques and places of employment provide the government with virtually unlimited access to plans of terrorists. This information not only provides insight into the activities planned by those being monitored but also provides leads and connections that implicate others with similar ambitions.
Other activities that can be used to identify suspicious behavior and to help track the location and affiliation of individuals can be accomplished by the use of credit card transaction tracking. Enormous repositories of information about financial transactions can be tracked and stored at intelligence gathering facilities in a virtual world. This information can be used to evaluate whether actions being taken by individuals pose a potential threat to the U.S.
The search and seizure of individuals and property is both frightening and important. The government has the power to hold a citizen and question him without representation if the individual is deemed to be an enemy combatant. A great deal of effort has been made to prevent such actions from taking place even to the point of asking the Supreme Court to intervene. In the end, the U.S. Army has agreed to provide those being held with a hearing in front of a military tribunal virtually guaranteeing that control is maintained over the citizen until the government sees fit to free the person.
It is clear that there are difficult trade-offs required for achieving security. Long-term security can be maintained while certain liberties are encroached upon only if the government has set in place a body designed specifically to protect civil liberties. Such an institution is proposed but its powers will need to be substantial in order for it to overcome the government's thirst for more control.
3. Evaluate the strengths and weaknesses of the intelligence efforts of the major participants in… READ MORE
Quoted Instructions for "Criminal Justice - Intelligence Does the Projected" Assignment:
4 seperate questions 2 pages each:
1. Does the projected space warfare/ballistic missile threat to the US homeland justify a National Missile Defense, a Global Collective Strategic Defense, or some other solution?
2. How can intelligence be used to nullify terrorist organizations over the long term as a threat to US Homeland Security without compromising US civil liberties?
3. Evaluate the strengths and weaknesses of the intelligence efforts of the major participants in the Cuban Missile Crisis, and the lessons this crisis offers for avoiding future strategic surprises.
4. How does cyberwarfare threaten US Homeland Security, and can it be countered effectively without an unacceptable sacrifice of US civil liberties?
How to Reference "Criminal Justice - Intelligence Does the Projected" Term Paper in a Bibliography
“Criminal Justice - Intelligence Does the Projected.” A1-TermPaper.com, 2005, https://www.a1-termpaper.com/topics/essay/criminal-justice-intelligence/53265. Accessed 5 Oct 2024.
Related Term Papers:
Criminal Justice and Criminology the Chicago Alternative Research Proposal
Criminal Justice and Criminology
The Chicago alternative policing strategy came into effect in the year 1993. The strategy initially took place in five police district then moved to include the… read more
Research Proposal 15 pages (5114 words) Sources: 14 Topic: Crime / Police / Criminal Justice
Criminal Justice/Forensics Undercover Thesis
Criminal Justice/Forensics
Undercover" is a term that has made its way into the public vernacular, thanks in large part to movies and television programs. Undercover, at its fundamental level, means… read more
Thesis 35 pages (11198 words) Sources: 10 Style: APA Topic: Crime / Police / Criminal Justice
Hostage Negotiation Thesis
Criminal Justice - Hostage Negotiation
HOSTAGE NEGOTIATIONS
The history of hostage negotiation is traceable as far back as ancient Greek and Roman literature, and likely predates recorded history altogether (Butler,… read more
Thesis 2 pages (573 words) Sources: 4 Style: APA Topic: Crime / Police / Criminal Justice
Criminal Behavior Theories That Relate to Armed Robbery Thesis
Armed Robbery and Criminal Behavior Theories
There are well-documented theories in the field of criminology to help researchers understand why incidents of armed robbery take place -- but many questions… read more
Thesis 5 pages (1735 words) Sources: 10 Style: APA Topic: Crime / Police / Criminal Justice
Creating a Police Department Capstone Project
Silver Spring Police Department
[Sealed proposals for Implementing a police department in Silver Springs, FL. Silver Springs Police Departments shall be received at Silver Springs Police Department, c/o Jessica Johnson… read more
Capstone Project 20 pages (5079 words) Sources: 20 Topic: Crime / Police / Criminal Justice
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!