How We Hire Writers

custom writing

All applicants go through a series of tests that check their level of English and knowledge of formatting styles. The applicant is also required to present a sample of writing to the Evaluation Department. If you wish to find out more about the procedure, check out the whole process.

How We Ensure Quality

Our Quality Control Department checks every single order for formatting, style, word usage, and authenticity. This lets us deliver certified assignment assistance that has no Internet rivals.

DISCUSSION POST

DISCUSSION POST#1

Cybersecurity / Science Technology

It seems that every day we hear of another cyber-attack on the United States. Some of these attacks are targeting databases of corporations, others are against the government or our critical infrastructure, some are in retaliation and are designed to be destructive, and others are designed to hold information or computers hostage until people or corporations pay ransom to get control of their computers and get their information back. Some of these attacks are by States and others by criminal elements. All of these come under the purview of the Department of Homeland Security.

Prior to posting your initial post go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a scholarly source and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to cyber security. Please ensure your references are less than 5 years old. Then go to the Department of Homeland Security website to review the Safeguard and Secure Cyberspace mission.
As you analyze the types of cyber-attacks, current science and technology, and the mission of the Department of Homeland Security do you believe the Department of Homeland Security is up to the task of defending and securing the nations cyberspace? Does the Department of Homeland Security have the tools, tactics, and techniques available to defend and secure the cyberspace? Your initial post must be a minimum of 300 words in length. Support your claims with in-text citations and provide an APA reference list.

DISCUSSION POST 2

Future of Homeland Security

The Department of Homeland Security and state offices of homeland security were created in large scale after the terrorist attacks of September 11, 2001. Homeland security and emergency response has continued to evolve. New threats from Mexican drug cartels, cyber-attacks, lone-wolf terrorist attacks and new threats to aviation security have expanded the role and scope of homeland security organizations and personnel.
Prior to beginning on this forum review the latest DHS 2014 Quadrennial Homeland Security Review . Based on your collective study in Homeland Security and Emergency Management, identify two or three changes or trends you believe will occur in the Homeland Security and Emergency Response discipline in the next ten years. Identify those threats and sub-disciplines that will become more important between now and the next 10 years. What will be the new homeland security and emergency management challenges the United States will face in the next 10 years?

Your initial post should be at least 300 words in length. Support your claims with examples from required material(s) and/or other scholarly resources, and properly cite any references. Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Use APA style.

REQUIRED RESOURCES
Text
Brians, C.L, Willnat, L., Manheim, J.B., & Rich, R.C. (2011). Empirical political analysis (8th ed.). Retrieved from https://redshelf.com

The full-text version of this e-book is available through your online classroom.
Articles
Brands, H., & Feaver, P. (2017). Trump and terrorism: U.S. strategy after ISIS. Foreign Affairs, 96(2), 28-36. Retrieved from https://www.foreignaffairs.com/

Kelly, J. F., Schumer, C., McCaskill, C., Slaughter, L., Biggs, A., Carter, J., Stodder, S. M M., & Camarota, S. A. (2017). The pros and cons of a Mexico border wall: Should congress fund the construction of a wall along the U.S. southern border? Congressional Digest, 96(8), 8-29. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Klassen, J. (2013). Immigration and U.S. policy. In Research Starters: Sociology (Online Edition). Retrieved from https://www.ebscohost.com/discovery/content/research-starters

President Trump’s executive order on immigration. (2017). Congressional Digest, 96(3), 4-7. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Multimedia
Mullins, B. (2016, January 20). Defeating the hackers – BBC documentary (Links to an external site.) [Video file]. Retrieved from https://youtu.be/HQJMg6FdcvQ

Wollman, L. (2013, January 3). Hypothesis 101 (and other Social Science concepts) (Links to an external site.). Center for Homeland Defense and Security Course: Research Methods, Naval Post Graduate School. Retrieved from https://www.chds.us/m/media/player?id=2928

Web Pages
Legal Information Institute. (n.d.). U.S. Constitution: Fifth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fifth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: First Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/first_amendment

Legal Information Institute. (n.d.). U.S. Constitution: 14th Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/amendmentxiv

Legal Information Institute. (n.d.). U.S. Constitution: Fourth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fourth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: Sixth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/sixth_amendment

Research Reports
Bjelopera, J. P. (2017). Domestic terrorism: An overview (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44921.pdf

Bjelopera, J. P. (2016). The Islamic States acolytes and the challenges they pose to U.S. law enforcement (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44521.pdf

U.S. Department of Homeland Security. (2010). Bottom-Up review report (Links to an external site.). Retrieved from https://www.dhs.gov/sites/default/files/publications/bur_bottom_up_review.pdf

RECOMMENDED RESOURCES
Articles
Deflem, M., & McDonough, S. (2015). The fear of counterterrorism: Surveillance and civil liberties since 9/11. Society, 52(1), 70-79. doi:10.1007/s12115-014-9855-1

Lewis, C. W. (2005). The clash between security and liberty in the U.S. response to terror. Public Administration Review, 65(1), 18-30. doi:10.1111/j.1540-6210.2005.00427.x

Mondale, W. F., Stein, R. A., & Fisher, C. (2016). No longer a neutral magistrate: The Foreign Intelligence Surveillance Court in the wake of the war on terror. Minnesota Law Review, 100(6), 2251-2312. Retrieved from http://www.minnesotalawreview.org/

Pea, A. (2007). Protecting Muslim civil and human rights in America: The role of Islamic, national, and international organizations. Journal of Muslim Minority Affairs, 27(3), 387-400. doi:10.1080/13602000701737236

Reinhardt, S. (2008). Weakening the Bill of Rights: A victory for terrorism. Michigan Law Review, 106(6), 963-973. Retrieved from http://michiganlawreview.org

Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving America’s way of life (Links to an external site.). Notre Dame Journal of Law, Ethics & Public Policy, 19(1), 289-308. Retrieved from http://scholarship.law.nd.edu

West, D. M. (2012). A vision for Homeland Security in the Year 2025 (Links to an external site.).  Retrieved from http://www.insidepolitics.org/brookingsreports/homeland_security.pdf

Multimedia
Jennings, T. (Producer, Director & Writer). (2015). American terrorist. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=114683

Smith, M. (Producer & Writer), & Hirsch, L. (Producer). (2014). The rise of ISIS. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=60691

Smith, S. (Producer and Director). (2017). The new Al Qaeda. British Broadcasting Corp. Retrieved from https://youtu.be/-f7yxaw78dU

Thompson, G., & Corcoran, M. (Producers). (2017). Escape from Marawi. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=145249

TEDx Talks. (2015, June 29). Cyberwar | Amy Zegart | TEDxStanford (Links to an external site.) [Video file]. Retrieved from https://youtu.be/JSWPoeBLFyQ

TEDx Talks. (2012, April 22). Predicting the 9 biggest weather disasters in the next 30 years | Jeff Masters | TEDxBermuda (Links to an external site.) [Video file]. Retrieved from https://youtu.be/ZlojvcmgfQA

Web Pages
Border Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/border-security

Civil Rights and Civil Liberties (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/civil-rights-and-civil-liberties

Cybersecurity (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/cybersecurity

Disasters (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/disasters

Immigration Enforcement (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/immigration-enforcement 

Law Enforcement Partnerships (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/law-enforcement-partnerships

Preventing Terrorism (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/preventing-terrorism

Transportation Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/transportation-security

U.S. Department of Homeland Security. (2015, October 27). Written testimony of S&T under Secretary Dr. Reginald Brothers for a House Committee on Science, Space, and Technology hearing titled A Review of Progress by the Department of Homeland Security, Science and Technology Directorate. (Links to an external site.) Retrieved from https://www.dhs.gov/news/2015/10/27/written-testimony-st-under-secretary-house-committee-science-space-and-technology

Research Report
Tehan, R. (2017). Cybersecurity: Critical infrastructure authoritative reports and resources (Links to an external site.). Retrieved from https://fas.org/sgp/crs/misc/R44410.pdf

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes