Monday, April 13, 2020

Homeland Security Department

Introduction Homeland Security Department (DHS) continues to face security threats even after the egregious attacks of September 11. Following these attacks, the traditional security measures changed dramatically, security enforcement systems and roles changed significantly in a bid to close all identified loopholes (Clark 2007, 33).Advertising We will write a custom critical writing sample on Homeland Security Department specifically for you for only $16.05 $11/page Learn More However, this research develops the hypothesis that the security challenges will remain imminent given that security implementation personnel are yet to comprehend their new roles and responsibilities. Research Design This study employs the Lockwood Analytical Method for Prediction (LAMP) to offer a predictive analysis by use of qualitative empirical data. The Lamp provides a unique model for data analysis, targeting to establish the potential solutions to the foreseeable and unfo reseeable problems (Sparks, and Sulmasy 2006, 69). This article will try to respond to the question that, will the DHS combat the security threats it is facing. The research purpose is to identify the underlying challenges that the DHS will continue to face in the future. In this study, the causes of insecurity are the independent variables while the effects are the dependent variables. Data Collection LAMP utilizes qualitative empirical data collected through interviews and observation to demonstrate how this approach is useful when dealing with real world problems. For example, LAMP enables the researcher to foresee the most likely results for various certain research problems such as the likelihood of terrorist attack(Puyvelde 2013, 144). The selection of research method by the Intelligence community matters a lot since an in-depth analysis helps to come up with the appropriate method for the current research problem. Thus, the LAMP approach is necessary to advance the collection of essential data concerning values, beliefs and the convictions propelling heinous acts (Puyvelde 2013, 142). Involving the intelligence circle in focus group discussions would improve coordination, preparedness and response in anticipation of attacks.Advertising Looking for critical writing on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More Data Analysis This research uses measurement scales that include nominal, ordinal, interval and ratio scales to assess variables such as values, policies, and behavior. The historical data collection approach is employed to collect views on the topic and show that the National Intelligence community started evolving since the World War I when the military engaged in protecting the home front from its enemies. However, following the September 11 event, Homeland Security magnified to a prominent policy (Robinson et al. 2013, 717). Prior to the attacks, the system was less bureaucratic, and sharing of intelligence information was a bit faster, even though there was the reluctance to act. After the attacks, the President George Bush’s administration and the Congress enforced strict bureaucratic measures within the Intelligence Community.  Qualitative analysis by military researchers and Intelligence analysts indicate that U.S remains vulnerable to both traditional and non-traditional security problems (Schmid 2011, 103). Such threats include transnational crime like human and drug trafficking, the existence of nuclear weapons, cyber sabotage, and biological weapons. These threats will persist due to the lack of sufficient funds to boost the pace of research, training and recruitment. Besides, the terrorist network is widespread, well orchestrated, less bureaucratic, and unpredictable. Thus, it is difficult for the DHS to track down terrorist activities (Clark 2007, 47). Conclusion Since national and global security is a multifaceted agenda, the U.S Intellig ence community should advance intercultural literacy. Both governmental and non-governmental agencies have shown efforts to fight global insecurity, human and drug trafficking. However, these efforts will bear fruit if communication begins from a central position whereby the leaders can easily link to large groups without wasting time and resources. Therefore, adoption of such conclusions is dependent on consistent patterns that reflect the effectiveness of the LAMP predictions. References Clark, Robert M. 2007. Intelligence Analysis: A Target-Centric Approach. Washington, D.C: CQ Press.Advertising We will write a custom critical writing sample on Homeland Security Department specifically for you for only $16.05 $11/page Learn More Puyvelde, Damien. 2013. â€Å"Intelligence Accountability and the Role of Public Interest Groups in the United States.† Intelligence and National Security 28, no. 2 (May): 139-158.  https://www.researchgate.net/publi cation/263693937_Intelligence_Accountability_and_the_Role_of_Public_Interest_Groups_in_the_United_States . Robinson, Scott, Liu Xinsheng, James Stoutenborough, and Arnold Vedlitz. 2013. â€Å"Explaining Popular Trust in the Department of Homeland Security.† Journal of Public Administration Research Theory 23, no. 3 (June): 713-733. Schmid, Alex P. 2011. The Routledge Handbook of Terrorism Research. New York: Routledge. Sparks, Thomas McK., and Glenn M. Sulmasy. 2006. International Law Challenges: Homeland Security and Combating Terrorism. Newport, R.I: Naval War College. This critical writing on Homeland Security Department was written and submitted by user Yuliana O. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.