INTRODUCTION TO U.S. STRATEGIES DESIGNED TO PROTECT THE HOMELAND FROM AIR, GROUND, AND MARITIME INFILTRATIONS

Terrorist threats have become more complex and diverse than before.

On June 6, [2018], an American Reaper drone killed four Islamic State fighters near Bani Walid, Libya, about 110 miles southeast of Tripoli, Libya’s capital. A week later, another Reaper killed a Qaeda operative 50 miles southeast of Bani Walid. Ten days later, in central Yemen, American airstrikes attacked Qaeda fighters in the contested central Hadramout region. (Schmitt, 2018, para. 28)

Retaliation has become a standard terrorist tactic. It is unconfirmed yet suspected through U.S. Intelligence Community activity that members of global terrorist groups have already entered U.S. soil by air, land, or sea.

Your Task:

  • Discuss some primary elements that constitute a strategic prevention model.

In your brief strategic prevention model, integrate some available U.S. resources, which include Department of Homeland Security; federal, state, and local law enforcement; and civilian stakeholders.

Helpful Hints: Start with these sources below to help respond to the assignment:

Countering the changing threat of international terrorism. (n.d.). Report of the National Commission on Terrorism, Pursuant to Public Law 277, 105th Congress. Retrieved from https://fas.org/irp/threat/commission.html Search for the word prevent in the website.

Wright, P. D., Liberatore, M. J., & Nydick, R. L. (2006). A survey of operations research models and applications in homeland security. Interfaces, 36(6), 514-529, 617-618. Retrieved from the Trident Online Library.

Keeney, R. L., & von Winterfeldt, D. (2011). A value model for evaluating Homeland Security decisions. Risk Analysis: An International Journal, 31(9), 1470-1487. Retrieved from the Trident Online Library.

DHS. (2019). Department of Homeland Security strategic framework for countering terrorism and targeted violence. Retrieved from https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf

SLP Assignment Expectations

Your essay should be 3 full pages not counting the title and reference pages. The use of APA formatting is recommended in your essay with 1-inch margins,12-point type, and double spacing throughout. Include a title/cover page, an introduction, answers to the questions (introduced with subtitles), and a concluding paragraph. Provide specific examples to support your point of view when developing your responses to each question. Remember to include in-text citations within the body of the essay when referencing your resources—for example: (Smith, 2019). Also, be sure to include a reference section at the end of your assignment listing all resources (including the required readings) you used to complete your essay. Use strong, credible sources—peer-reviewed references, government documents, and subject matter expert materials—to support your answer.

Direct quotes should be limited and must be designated by quotation marks. Paraphrased ideas must give credit to the original author—for example, (Smith, 2019). Direct copying from “homework help” websites will not receive credit. Once you have completed your assignment within a Word document, please upload your final version to the SLP 1 Dropbox. Please note your Turnitin originality score and make revisions as needed. Please contact your instructor with any questions.

Required Reading

Bloom, M., & Daymon, C. (2018). Assessing the future threat: ISIS’s virtual caliphate. Orbis, (62)3, 372-388. Retrieved from the Trident Online Library. (Please read pages 372-387.)

Countering the changing threat of international terrorism. (n.d.). Report of the National Commission on Terrorism, Pursuant to Public Law 277, 105th Congress. Retrieved from https://fas.org/irp/threat/commission.html

DHS. (2019). Department of Homeland Security strategic framework for countering terrorism and targeted violence. Retrieved from https://www.dhs.gov/publication/dhs-strategic-framework-countering-terrorism-and-targeted-violence.

Haddal, C. C. (2010). People crossing borders: An analysis of U.S. border protection policies. Congressional Research Service. Retrieved from Trident University Library.

Keeney, R. L., & von Winterfeldt, D. (2011). A value model for evaluating Homeland Security decisions. Risk Analysis: An International Journal, 31(9), 1470-1487. Retrieved from the Trident Online Library.

National Border Patrol strategy. (n.d.). Office of Border Patrol. Retrieved from https://www.cbp.gov/border-security/along-us-borders/strategy

Ordonez, K. (2008). Securing the United States-Mexico border: An on-going dilemma. Homeland Security Affairs, Supplement 2, (4)11, 1-10. Retrieved from the Trident Online Library. (Please read pages 1-8.)

Schmitt, E. (2018, July 6). ISIS may be waning, but global threats of terrorism continue to spread. New York Times (Online). Retrieved from the Trident Online Library.

Tussing, B. (2008). New requirements for a new challenge: The military’s role in border security. Homeland Security Affairs, (4)3. Retrieved from the Trident Online Library.

United States Department of Homeland Security. (2023). Quadrennial homeland security reviews. Retrieved from https://www.dhs.gov/quadrennial-homeland-security-review

Wright, P. D., Liberatore, M. J., & Nydick, R. L. (2006). A survey of operations research models and applications in homeland security. Interfaces, 36(6), 514-529, 617-618. Retrieved from the Trident Online Library.

Required Websites

Border Patrol History. CPB. http://www.cbp.gov/border-security/along-us-borders/history

Commission de la frontière internationale | International Boundary Commission. http://www.internationalboundarycommission.org/

Homeland Security Act of 2002. DHS. http://www.dhs.gov/homeland-security-act-2002

Colorado Division of Homeland Security & Emergency Management (2023) Eight signs of terrorism. Retrieved from https://dhsem.colorado.gov/ciac/eight-signs-of-terrorism

Significant Attacks Against U.S. Diplomatic Facilities and Personnel, 2007-2016. Retrieved from https://diplopundit.net/2017/08/24/significant-attacks-against-u-s-diplomatic-facilities-and-personnel-2016/.

U.S. Department of State. https://www.state.gov/

Required Video

NBC News. (2017, January 25). CBP intelligence chief: Securing the border is “attainable” [Video file]. Retrieved from https://www.youtube.com/watch?v=mahpLdV6vZQ

Do you need help with this paper? 🏆 - Let us help you write it!

Why Choose Our Essay Writing Service?

  • ✅ Original writing: Our expert writers will write each paper from scratch, ensuring complete originality, zero plagiarism and AI free content.
  • ✅ Expert Writers: Our seasoned professionals are ready to deliver top-quality papers tailored to your needs.
  • ✅ Guaranteed Good Grades: Impress your professors with outstanding work.
  • ✅ Fast Turnaround: Need it urgently? We've got you covered!
  • ✅ 100% Confidentiality: Customer privacy is our number one priority. Your identity is anonymous to our writers.
🎓 Why wait? Let us help you succeed! Our Writers are waiting..

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.