StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Homeland Security Products - Research Paper Example

Cite this document
Summary
This paper “Homeland Security Research Products” compares and contrasts two homeland security research reports as well as evaluation of their effectiveness. The first research is that of the New York Police Department titled Radicalization in the West: The homegrown threat…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Homeland Security Research Products
Read Text Preview

Extract of sample "Homeland Security Products"

Homeland Security Research Products The terrorist attacks of 9/11/2001 in the United States prompted the creation of the Department of Homeland Security, which has conducted extensive research on national security to avert terrorism related activities. This paper compares and contrasts two homeland security research reports as well as evaluation of their effectiveness. The first research is that of the New York Police Department titled Radicalization in the West: The homegrown threat (Silber and Bhatt, 2007). The report analyses the prevalence of homegrown terrorism within the U.S borders through focus on radicalization. Understanding the radicalization process is crucial in developing effective counter strategies. This is because potential terrorists begin and progress through radicalization processes. Successful counter strategies can only be achieved if the security structures identify the point where radicalization begins. The second report is that of the Department of Homeland Security titled Right-wing extremism: Current economic and political climate fueling resurgence in radicalization and recruitment (U.S Department of Homeland Security, 2009). The report provides an assessment of the threat posed by homegrown extremism from right wing groups. The report is an intelligence assessment that helps in facilitating a better understanding of the emergence of violent radicalization in the United States. The report lacks credible evidence that the right wing terrorists are planning any acts of violence. However, it bases its argument on the speculation that the extremists may be training more recruits owing to the fear related to several emergent issues i.e. the economic down turn and the election of the first African American president. To address the research question in detail, the report has focused on discussing issues such as the prevailing political and economic environment, exploitation of the economic down turn, the presidential election, illegal immigration and the legislative initial drivers among others. Analysis of NYPD Radicalization Report This report addresses the homegrown threat that terrorism activities pose in developed nations, for example, the United States. The study discusses radicalization factor that promotes terrorism activities. The research is successful in the use of case studies to explain the formation and advancement of the intentions that lead to terrorism. Use of case studies amounts to qualitative research. The case studies provided existing data and information on terrorism for the report. The case studies used in the report include Madrid’s March 2004 attack, Amsterdam’s Hofstad Group, London July 2005 attack, Australia’s Operation Pendennis and the Toronto 18 case. Data collection also involved the analysis of three United States homegrown terrorism cases and two New York City based cases. The research involved the use of both primary and secondary data sources. This was achieved through dispatching detectives and analysts in the field to conduct interviews and observations on law enforcement agencies, academics and intelligence officials on radicalization. Some of the secondary data sources reviewed in the compilation of the report include reference to atlas (Military Ideology Atlas), media (BBC, CNN, Washington Post, Militant Islam Monitor, Toronto Star, National Post) and Journals (Jamestown Foundation). Other include books such as Radical Islam Rising by Wiktorowicz and El Agujero: Espana Invadida por la Yihad by Jose Ma Irujo. Literature review on Jihadist ideology helped to identify the answer to the research question as well as the detailed report on radicalization. Detailed research was also carried out on the individual personality of the terrorists. The conclusions and findings of the report are fully supported by the data derived from the collection methods. The report has comprehensively addressed the four main stages of the research question that include pre-radicalization, self identification, indoctrination and jihadization. Analysis of DHS Right-wing Extremism Report The research addresses the right wing extremism related to the current economic and political climate promoting radicalization and terrorist recruitment. The factors identified as fuelling the spread of right wing extremism include economic downturn and the election of the first African American president. The sensitive nature of research required the use of primary data collection such as face-to-face interviews with the respondents and access to classified files. The research methods used to develop this report are the case studies, for instance, the case of shooting of three police officers that was fuelled by racist ideology. This report used qualitative research methods such as case studies. The case studies ensure that the report contains credible information as the results touch on national security. Data collection also involves research through the internet, for instance, the results on the right wing extremist chatter. An observation on the activities of these extremists was crucial in relation to the presidential elections and economic down turn. There is no evidence of the use of literary materials reviewed in support of conclusions and findings. Thus, the conclusions and analysis were not comprehensive; they did not emanate from a rich variety of either secondary or primary data sources. Therefore, most of the results are based on speculation. The only source of secondary data materials that could have been used is the media due to reporting on current political issues. The report’s conclusions and analysis were not supported as there was no research or data presented. Comparison The report that provided the best analysis is NYPD Radicalization Report. This is because it combined both qualitative and quantitative data collection methods. The use of detectives and analysts provided first-hand data that enhanced the credibility of the results. The framework of this report involved the analysis of individual case studies that relate to the topic under study. The analysis of the research results in DHS report is shallow. The findings are organized in sections related to the topic of discussion. The research methods used in both studies did not include descriptive studies such as providing counts and means regarding the study population. The methods did not apply the comparative studies that help in identifying the statistical differences between the study populations. Additionally, the methods did not involve explanatory studies that explore factors describing the characteristics of a population such as correlation and regression studies. The two reports use case studies in the analysis of their report findings. However, DHS Right-wing Extremism report uses fewer case studies that make conclusion and findings less detailed than that of NYPD Radicalization Report. DHS Right-wing Extremism report uses less secondary materials as compared to the NYPD Radicalization Report. The analysis and conclusion section of the NYPD Radicalization Report is more detailed than the DHS report. DHS report clearly indicates both primary and secondary data sources used during the research. The NYPD report provides a summary of the findings and conclusions without detailing the source of the research data and methods used. Conclusion Both reports touch on national security. The report that provided the best analysis is NYPD Radicalization Report owing to the use of both qualitative and quantitative data collection methods. The results of the two reports address the factors that affect global security as well as effective counter strategies. References Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The homegrown threat. New York Police Department. Retrieved from http://www.nyc.gov/html/nypd/downloads/pdf Public information/NYPD_Report-Radicalization_in_the_West.pdf U.S Department of Homeland Security (2009). (U//FOUO) Rightwing extremism: Current economic and political climate fueling resurgence in radicalization and recruitment. Office of Intelligence and Analysis Assessment. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Homeland Security Research Products Paper Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Homeland Security Research Products Paper Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/law/1782257-comparing-homeland-security-research-products
(Homeland Security Research Products Paper Example | Topics and Well Written Essays - 1000 Words - 1)
Homeland Security Research Products Paper Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/law/1782257-comparing-homeland-security-research-products.
“Homeland Security Research Products Paper Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/law/1782257-comparing-homeland-security-research-products.
  • Cited: 0 times

CHECK THESE SAMPLES OF Homeland Security Research Products

The Smithsonian Institute Senior Management

Abstract Being part of the senior management of a large construction firm that is responsible for the construction of commercial and instructional buildings, our firm can offer perfect contracting opportunities to the Smithsonian Institute and the Department of homeland security.... The Smithsonian Institute could use more reliable and cheaper supplier of air conditioner and services while the United States Department of homeland security needs a better and trustworthy surveillance cameras to do their job....
5 Pages (1250 words) Research Paper

Infrastructure Security of Agricultural and Food

Lack of internal quality control, increased production of genetically modified products are other factors making the food and agriculture sector in the country susceptible to agro-terrorism and higher levels of insecurity (Chalk, 2001, pp.... Infrastructure security of Agriculture and Food Name University Name Introduction: Considering the Food and Agriculture Sector in the United States (US), it can be realized that the sector is capable of providing the people of the nation with foods and clothes by going beyond the limitations of the country....
4 Pages (1000 words) Research Paper

Immigration and Customs Enforcement

The US Department of homeland security bears this responsibility and more, thus within the organization are branches to where specific missions are… The Immigration and Customs Enforcement (ICE) is best known for its presence in domestic and international airports, vigilant of possible threats to peace and order, and suspicious acts of terrorism.... Such is their most observable function, and basically what the name However, it seems that many had barely looked at the surface, while credits for the many accomplishments in the preservation of national security were enjoyed by renowned groups only....
12 Pages (3000 words) Research Paper

Evolution of Seaport Shipping Container Security Since 9/11

On this basis, any disruption of the maritime network will have a great disruption of the world economy....
10 Pages (2500 words) Research Paper

National Response Plan on Homeland Security

This plan complimented the key missions of the homeland security of preventing or… Therefore, it offered mechanisms to facilitate the prevention of terror attacks, reducing the risks of man-made and natural hazards, minimizing the National Response Plan on homeland security of Learning The National Response Plan was launched on December 2004 and was fully implemented five months later.... This plan complimented the key missions of the homeland security of preventing or intervening in all cases of security breach that could lead to injuries, loss of lives and damage to properties (Miskel, 2006)....
1 Pages (250 words) Research Paper

Disadvantages and Advantages of Beekeeping

Honey is perceived to be one of the most nutritious products consumed by human beings as it contains a wide collection of nutrients and minerals such as vitamins, copper, iodine, zinc, Magnesium, calcium etc.... This essay "Disadvantages and Advantages of Beekeeping" is a critical evaluation of beekeeping, discussing its advantages and disadvantages....
8 Pages (2000 words) Research Paper

Comparing Types of the Common Operating Picture

homeland security has a homeland security Information Network (HSIN), which is a secure and unclassified web communication system that serves the nation-wide information network (Copeland, 2008).... The network interconnects homeland security operations centre, federal and local organizations combating terrorism and critical private industry (Copeland, 2008)....
10 Pages (2500 words) Research Paper

U.S. Border Patrol

The author focuses on the homeland security in the US, under the jurisdiction of the U.... Department of homeland security, its primary responsibility is the protection of the U.... Within it are other agencies, vital in offering various forms of administrative duties such as - the Citizenship and Immigration, and the Immigration and Customs Enforcement services, in addition to the crucial homeland security Investigations agency.... Jeh Johnson, Secretary of homeland security in the U....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us