Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
- Introduction
- Strengthen Bio and Nuclear Security
- Improving intelligence capacity and information sharing
- Enhancing global technology development and co-ordination
- Promote the Resiliency of Physical and Social Infrastructure
- Pursue Comprehensive Trans-border Security
- Ensure Effective Incident Management
- Conclusion
- Bibliography
- Footnotes
Introduction
One problem facing the United States in the 21st century is how to keep its borders free from terror attacks; the country’s department of security has a budget of over $ 5 billion to protect its citizens and maintain the countries values and ideals. The department has the following objectives:
- preventing terrorist attacks
- preparing and planning for emergencies,
- Investing in strong response and recovery capabilities1.
To fulfill its main objective of protecting the American citizens against 21st security threats, the sector of the government should embark on the following measures:
Strengthen Bio and Nuclear Security
The country should embark on measures to reduce bio-chemical attacks; it should not concentrate on remedy areas but should aim at developing mechanisms for detecting an attack.
It should develop nuclear detection architecture such that incase of a probable attack, then it can have detected the attack early enough. Other than ensuring that its country is free from attacks, the country should also strengthen its own nuclear reactants not to explode.
Improving intelligence capacity and information sharing
Security information whether collected internally or from other countries is important; the country should strengthen its collection, gathering and analysis of security data.
The strengthened intelligence collection unit should vet the data it interpolates and endure that reliable and efficient data is the only one used to make decision. Information quality can be improved by sharing; however shared information can be used against a country thus the unit should share intelligence information with those people share same security adherence objectives.
Enhancing global technology development and co-ordination
As the largest economy, the country should ensure that the global digital Information and Communications Infrastructure is secure, there are the areas that it can enhance communication among people and have surveillance measures put in place.
When addressing security issues in the 21st century, the United States should empower other countries to develop mechanisms that can enhance security in their boarders; this will ensure that attacks do not pass through countries with weak systems into the United States2.
Promote the Resiliency of Physical and Social Infrastructure
Areas of attacks should be resilient to ensure that they are secure and can detect any threat; these places include high ways, electricity pathways, airports and maritime areas. When security and surveillance in these areas has been enhanced, then attack and target points will be managed effectively in the efforts of preventing an attack.
Pursue Comprehensive Trans-border Security
The country should embark on maintaining good neighborhood and corporation from other countries: it should ensure that neighbors have adequate security measures and share the common goal of protecting humanity.
This can be attained by collaboration and ratification of international regulations and treaties that support the idea of preventing terror attack. When a certain country has been figured out to be a threat, the country should not shy off from condemning the country; it’s should in the forefront and ensure the threat has been neutralized.
Ensure Effective Incident Management
When an attack occurs the country should ensure that there are adequate damage prevention measures and mechanisms. The country should ensure that there are fast, efficient and reliable methods of minimizing damage to properties, and people in the case of a terror attack.
These include fast response and rescue systems. In case a certain country has faced the tragedy, the United States should give its equipments to assist; this will grow the net of countries against terror attacks. People should also be trained on the rescue and emergency response methods3.
Conclusion
To ensure that the United States citizens are secure, the government should strengthen bio and nuclear security, improve intelligence capacity and information sharing, ensuring a secure global digital information and communications infrastructure, promotes the resiliency of physical and social infrastructure, pursue comprehensive trans-border security, and ensure effective incident management.
Bibliography
Arquilla, John, and Ronfeldt, David. 1996. The Advent of Netwar. Santa Monica: Rand.
Arquilla, John, and Ronfeldt, David. 2001.Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica: Rand.
Franklin, Kramer, Stuart H. Starr, and Larry, Wentz. 2009. Cyber power and National Security.Washington: National Defense University Press.
Footnotes
1 Arquilla, John, and Ronfeldt, David. 2001.Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica: Rand.
2 Franklin, Kramer, Stuart H. Starr, and Larry, Wentz. 2009. Cyber power and National Security.Washington: National Defense University Press.
3 Arquilla, John, and Ronfeldt, David. 1996. The Advent of Netwar. Santa Monica: Rand.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.