Security Initiative Essays and Research Papers

Instructions for Security Initiative College Essay Examples

Title: USS Cole

  • Total Pages: 3
  • Words: 802
  • Sources:4
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: These are discussion questions.
I have also uploaded the material for each question. The response only needs to be 3 paragraphs each.
• Discuss the USS Cole Commission Report, 2001.
• Discuss the CRS report for Congress, Proliferation Security Initiative, 2006.
• What is our National Strategy for Combating Terrorism, 2003?
• Comment on Homeland Security: The New Role for Defense, Tomisek, 2002.

There are faxes for this order.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:

According to the National Strategy for Combating Terrorism published in February of 2003, the first major objective in the nation's antiterrorism strategy is simply to defeat the terrorists and their organizations. This seems almost laughably simple, but victory against terrorism is difficult to define; the report itself acknowledges this and includes in its strategy efforts to "compress the scope and capability of terrorist organizations, isolate them regionally, and destroy them within state borders." Even defining when these disparate features have been met is difficult, and thus the strategy itself is somewhat ill-defined in many places. There are two primary objectives that carry more concrete meaning -- and more in-depth explanation -- in the report, but these are grand projects that themselves have ill-defined boundaries and murky understandings of true possibilities. Attempts to deny support to terrorists, through financial and material means as well as through the provision of sanctuary or even simple encouragement, are certainly warranted, but defining which organizations are terrorists is something that cannot be accomplished unilaterally if it is to have any meaning, yet multilateral agreement is often highly difficult to reach. The same can be said of the objective to diminish the conditions that terrorists exploit -- at some point, the level of control needed for this (regardless of the practical difficulties) becomes tyrannical and dictatorial, removed from terrorism only for its level of organization and official sanction.


Especially in the beginning of this report, notably in the first figure presented, the increasing need for homeland security looks suspiciously like the increasing militarization of United States' society. This does indeed seem to be the almost overt stance of the authors of this report at times, though it is never explicitly stated as such. The level of civilian "support" it has been deemed necessary for the Department of Defense to involve itself in, however, is disconcerting. That being said, it is also clear that national security awareness needs to be raised, and that certain situations can increase the risk of a terrorist attack, and thus some extra military involvement in at least an informational manner is definitely warranted. A balance needs to be found between the provision of security and the presence of the military, however, and this report seems highly reactionary and extreme in its conclusions and recommendations.

Order Custom Essay On This Topic

Title: Web 2 0

  • Total Pages: 24
  • Words: 6227
  • References:18
  • Citation Style: APA
  • Document Type: Research Paper
Essay Instructions: Requesting same writer as for Paper 82567

Web 2.0, what exactly is it?
Here’s a good site about it and the person who coined the term.
• It isn’t new technology nor even an upgrade as the numerical 2.0 reference would suggest.
• The WEB, www as we know it is still the same except for access and speed. Other than Internet2 there are basically no new changes in the infrastructure of the World Wide Web (www).
• In fact, I believe this so-called change is exactly what the original intent of the internet, when initially made available to the public/Higher Ed Institutions. You can reference the history of the internet in the respect to University involvement (Paper 82567 which I requested in Oct 31, 2007). Can a correlation be made with what the original “academics” envisioned and how WEB 2.0 is used today?
• Transition back to if it’s not new infrastructure then what is it? What’s the hoopla? Wikipedia has a good definition can other supporting resources be found to back it up. My thoughts are that WEB2.0 is more of a conceptual thing in which applications are used to facilitate communications which have in turned created web-based communities. I.e. facebook, youtube, myspace & Twitter
• I think these online communities then created a need to “attract” user and be cool and developers then created a host of applications that could be integrated in website, mobile device and now can encompass the lives users.
• These users mostly young are now evolving into the corporate arena…not just fun or cool apps or something to spend time when on the internet. IBM is banking on it and has a division devoted to WEB 2.0 and how it can Work for Business.
• IBM has attempted to create standard and security initiatives so that corporate can better embrace WEB2.0.
• What can this social computing for business and everyday life lead to?
• What are the overall benefits and advantages of WEB2.0
• What are the disadvantages? One good one is that youthful users do not understand the risks of posting info on Facebook, let alone sex predators lurking within. Posting and usage can lead to very unintended consequences: &
o Can you specifically reference these two articles above?
• However, the apps that have been created under the guise of WEB2.0 are numerous. Here are several ….
• One good just use of WEB2.0 can be found here…I definitely would like this to be included Web 2.0 for R & R an article about how Stanford Univ. is making use of it.
• What will come about in the future? Web 3.0 is already being discussed. Just back in Jan. 8th Fortune magazine claims WEB 2.0 is over.
• What will be com e of the WEB 2, 3, 4 etc? The article’s focus is on the money/revenue aspect.
• Will the disadvantages of Web 2.0 be addressed? How will Web 3.0 work? What’s the future?
• Conclude possibly referencing back to the History of the Internet. My surmise is that it will always be fluid and ever changing. Just as its original purpose…”to keep user (military at the time) to be connected and maintain communications at all times, even if it is social... that vision has been accomplished. (I’ll trust your judgment)
• Thank you!

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:


Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42. (Accessed March 14, 2009)

Robert Boeri. (2007, December). Content 2.0 Converges. EContent, 30(10), 22.

Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1394701741).

Eric Bonabeau. (2009). Decisions 2.0: the Power of Collective Intelligence. MIT Sloan Management Review, 50(2), 45-52. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1625861001).

Roxanne E. Christ, Jeanne S. Berges, Shannon C. Trevino. 2007. Social Networking Sites: To Monitor or Not to Monitor Users and Their Content? Intellectual Property & Technology Law Journal 19, no. 7 (July 1): 13-17. (Accessed March 14, 2009).

John J. Cronin. (2009). Upgrading to Web 2.0: An Experiential Project to Build a Marketing Wiki. Journal of Marketing Education, 31(1), 66. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1666114781).

Derek Eccleston, Luca Griseri. (2008). How does Web 2.0 stretch traditional influencing patterns? International Journal of Market Research, 50(5), 591.

Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1569170581).

Silvio Galea. (2007). Leveraging your content's value. Journal of Digital Asset Management, 3(5), 259-262. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1412386941).

Sona Hathi 2008. Billions lost from social networking. Strategic Communication Management 12, no. 2 (February 1): 9. (Accessed March 14, 2009).

Sona Hathi (a) (2008). Are Companies Truly Ready for Enterprise 2.0? Strategic Communication Management, 13(1), 9. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1632687221).

Christoph Hauser, Gottfried Tappeiner, Janette Walde. 2007. The Learning Region: The Impact of Social Capital and Weak Ties on Innovation. Regional Studies 41, no. 1 (February 1): 75. (Accessed March 14, 2009).

John-Paul Hatala, Joseph George Lutta. (2009). Managing information sharing within an organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5. Retrieved March 26, 2009, from ABI/INFORM Global database. (Document ID: 1644932411).

Darius Hedgebeth 2007. Making use of knowledge sharing technologies.

VINE 37, no. 1 (January 1): 49. (accessedA March 20, 2009).

Jessi Hempel. (2009, January). Web 2.0 Is So Over. Welcome to Web 3.0. Fortune, 159(1), 36. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1622579851).

Jovan Chia-Jung Hsu, Chao-Min Hsu. (2008). The Relationships Between Service Quality and Customer Satisfaction in a Leading Chinese Web 2.0 Company. The Business Review, Cambridge, 11(1), 84-89. Retrieved March 21, 2009, from ABI/INFORM Global database. (Document ID: 1611095051).

C. Derrick Huang, Ravi S. Behara. 2007. Outcome-Driven Experiential Learning with Web 2.0. Journal of Information Systems Education 18, no. 3 (October 1)

http://www.proquest, com (Accessed March 14, 2009).

Ashley Jones 2008. Let's Give Them Something to Talk About.

EContent, March 1, 10-11. (Accessed March 14, 2009).

Ajit Kambil. (2008). What is your Web 5.0 strategy? The Journal of Business Strategy, 29(6), 56-58. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1582844701).

Scott Kirsner 2007. Web 1.0 vs. Web 2.0; a critical look back at the hype surrounding Web 2.0 and how it compares to the dotcom boom. CIO, July 1, 1. (Accessed March 14, 2009).

Andrew P. McAfee 2006. Enterprise 2.0: The Dawn of Emergent Collaboration. MIT Sloan Management Review 47, no. 3 (April 1): 21-28. (Accessed March 14, 2009).

O'Reilly, 2005. What is Web 2.0. Design Patterns and Business Models fo the next generation of Software. Tim O'Reilly. September 30, 2005. Accessed from the Internet on March 14, 2009:

Laurie Rowell. (2008). In search of WEB 3.0. NetWorker, 12(3), 18. Retrieved March 26, 2009, from ABI/INFORM Global database. (Document ID: 1644103041).

Gerard J. Tellis, Eden Yin, Rakesh Niraj. (2009). Does Quality Win? Network Effects vs. Quality in High-Tech Markets. JMR, Journal of Marketing Research, 46(2), 135. Retrieved March 20, 2009, from ABI/INFORM Global database. (Document ID: 1662216371).

Order Custom Essay On This Topic

Title: al Qaeda's Campaign of Terror

  • Total Pages: 3
  • Words: 930
  • Works Cited:3
  • Citation Style: MLA
  • Document Type: Essay
Essay Instructions: Write a 3 page paper summarizing al Qaeda’s campaign against the United
States and explain what homeland security initiatives and policies have
arisen since the events of 9-11. There are variations in how things are
spelled in the Islamic vocabulary, but for the sake of the paper, the common
spellings are bin Laden and al Qaeda.

Complete your paper by stating your views on these initiatives and if they
are compatible to constitutionality, or if they affect civil rights.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Works Cited:


Council on Foreign Relations (CFR). "al-Qaeda (a.k.a. al-Qaida, al-Qa'ida)." 7 July 2005. Retrieved Dec 9, 2006 at

Timeline: Al-Qaeda." BBC News. 4 Sept 2006. Retrieved Dec 9, 2006 at

US Department of State. "Office of Homeland Security: Basic Facts." Retrieved Dec 9, 2006 at

Order Custom Essay On This Topic

Title: DRNC Convention

  • Total Pages: 3
  • Words: 837
  • Bibliography:3
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: Read the below case, guidelines, and rubric for the Module 7 Written Exercise. At the end of the case, you will be writing an essay related to this scenario.


The following story is a fictional account of planning and preparation leading up to the mythical Democratic-Republican National Convention (DRNC) event in Miami, Florida. The story is loosely based on an amalgamation of real life occurrences in the lead up to the Free Trade Area of the Americas conference in Miami, Florida in 2003. The names of all the characters in the story are fictional.
As you read the story, keep in mind what contemporary criminal justice issues are likely to arise. At the end of the story, you will be asked to respond to several questions related to this scenario.
Miami-Dade Police has been designated as the lead local agency and lead operational planner for the event security. This policy differs significantly from the 2003 FTAA in which the City of Miami was designated as the lead local agency. Director Melanie Duncan is the head of the Miami-Dade Police Department.
Since this event meets the criteria of a National Special Security Event (NSSE), the U.S. Secret Service has been designated as the lead coordinating agency with overarching statutory authority for the planning and execution of the event. Supervisory Special Agent Samantha Salerno has been appointed as the lead agent in-charge for the event.
Organization charts of the Security Subcommittee are provided for your reference.

Case Study ? Surveillance Drones for the Police

It was early Tuesday afternoon, and the Security Subcommittee of the DRNC Host Committee was meeting for fourth time. The DRNC was still seven months away, but pace of the meetings had picked up considerably since it was first learned that Miami-Dade was going to host the event. Clearly, there was considerable trepidation on the part of the Security Subcommittee members as to what they were about to embark on. At the last meeting, the subcommittee members had been briefed by a Major from the Tampa Police Department about their experiences with the Republican National Convention in 2012. They had also been briefed about the turmoil that the police agencies in Minneapolis, Minnesota had experienced during the 2008 RNC. Director Duncan had her own memories of the FTAA in Miami, Florida (2003) to contend with. At the time, she served as one of several Mobile Field Force commanders on the front lines in the clashes with the Black Bloc tactic protestors. This was nothing new to Duncan, but for subcommittee chair Samantha Salerno, this would be a quick tutorial on what to expect from the anti-globalization protestors that were expected to amass in Miami for the DRNC. Accompanying Director Duncan at the meeting today was Major Louis Warren. Warren had asked to be allowed to address the full subcommittee regarding a request that had been made by some of his Mobile Field Force lieutenants. Recently, Miami-Dade County had been awarded $1.9 million from the U.S. Department of Homeland Security to partially defray the cost of security for the event. Warren and his lieutenants wanted to use part of that $1.9 million to purchase a $300,000 unmanned helicopter drone so that they could have a nearly continuous and indefatigable ?eye in the sky? during the week of the convention. Warren and his lieutenants wanted to explain to the subcommittee members how the purchase of the drone would save considerable costs associated with the regular police helicopters. It was estimated that to keep a regular manned police helicopter flying costs approximately $320 per hour. This estimate includes fuel costs, as well as other related expenses necessary to operate the aircraft. By contrast, the cost to operate the drone aircraft amounted to only $50 per hour? a fraction of the cost of the manned helicopter. But it was not just a cost issue. There was also the matter of pilot fatigue associated with manned surveillance aircraft. During the FTAA Conference civil disturbances in 2003, Major Warren and his lieutenants had seen for themselves how effective the aerial surveillance of the protestors had been in predicting their next moves. The police helicopters had played an instrumental role during the event by providing timely ?real time? information on the movements of the protestors to the police commanders on the ground. Having that eye in the sky proved to be one of the most important factors for the success of the police during the FTAA disturbances; however, there simply were not enough pilots and aircraft to keep a constant watch over the protestors during the entire week of the event. In 2003, there were many coverage gaps as the manned helicopters had to refuel regularly and the pilots had to rest. Major Warren remembered that from his own experiences, and he wanted to purchase the unmanned drone in order to fill those coverage gaps. Moreover, Warren had been a commander of a tactical unit prior to his current assignment, and he knew full well how important it was to keep the high ground surveillance of suspects during hostage and barricaded subject calls. The drone helicopter would be used by the MDPD Special Response Teams (SRT) long after the RNC had concluded. Or at least, that was the proposed plan. Unfortunately for Major Warren, he faced an unexpected barrier to his proposal from FBI Assistant Agent in Charge (ASAC) Felicia Fontaine, who was one of the main members of the subcommittee. It appeared that ASAC Fontaine had a different use for the Homeland Security grant money. Fontaine had not said what she wanted to spend the grant money on, but clearly she indicated that she was opposed to the purchase of the $300,000 drone aircraft. The ultimate decision on whether to purchase the unmanned drone aircraft for the DRNC event was going to be made by policy makers associated with the Miami area Urban Area Security Initiative (UASI) group, but the recommendation of the subcommittee would carry considerable weight for making the final determination on how to spend the $1.9 million grant money. There were many factors to consider before the final decision would be made. Costs alone would not be the only determining factor.

Assignment Instructions

For the purpose of this assignment, you are to play the role of U.S. Secret Service ASAC, Samantha Salerno. Your job is to weigh the risk and cost-benefit factors associated with the purchase of the unmanned drone. Consider all sides (the pros and cons) associated with the purchase of the drone aircraft. Take into consideration a broad array of stakeholder concerns with the use of unmanned drone aircraft for law enforcement purposes. Do not limit your
analysis to cost variables only. Your recommendations will likely be heeded by the policy makers at the Miami UASI. In a narrative essay not to exceed 1,200 words, explain how you arrived at your conclusions. Your report is important because it will form the basis for planning the DRNC and the implementation of policy.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:


1) Gal-Or, Benjamin (May 1990). Vectored Propulsion, Supermaneuverability & Robot Aircraft. Retrieved from Springer Verlag. ISBN 0-387-97161-0

2) Owens, Hudson L.; Flannes, M. ( Feb 2011). "Drone Warfare: Blowback from the New American Way of War." Retrieved from Middle East Policy 18: 122 -- 132.

3) Martin, Rachel (Dec 19, 2011). "Report: High Levels Of 'Burnout' In U.S. Drone Pilots." Retrieved from NPR

Order Custom Essay On This Topic
Request A Custom Essay On This Topic Request A Custom Essay
“I really do appreciate I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.’’ Tiffany R
“I have had all positive experiences with I will recommend your service to everyone I know. Thank you!’’ Charlotte H
“I am finished with school thanks to They really did help me graduate college.’’ Bill K