develop an envisioned methodology and design a


Develop an envisioned methodology and design a research topic based on the research problem, purpose. Then write a research paper to identify the strengths and weaknesses of the envisioned method and design. In the paper, justify why the chosen method and design would be most appropriate for your research questions. Then justifying the chosen method and design, discuss why alternative methods/designs would be less desirable for this study.

Problem Statement

What does it mean to collect and share intelligence information within the United States? In essence, intelligence involves gathering and analyzing data about who, what, where and when someone is planning an attack of some kind. To do this, we must gather information about people and organizations that have not yet violated the law. Simply gathering the information does not make it intelligence however, analyzing it does. Hence lay one of many problems the physical taking and obtaining information for Department of Homeland Security (DHS). This information is collaboration between DHS and Regional Information Sharing System (RISS) (Department of Homeland Security 2006). Network system that cause communication data links that enable computer to communicate with each other. In international security, there are many different types of intelligence; including Signals Intelligence (SIGINT), Human Intelligence (HUMINT), Communications Intelligence (COMMINT), Imagery Intelligence (IMINT), Measurements and Signatures Intelligence (MASINT), and open source information (Larence, 2012).

The type of intelligence most appropriate shared between local law enforcement and the international intelligence community is Human Intelligence (HUMINT). These paper discuses the problems with not share information in the homeland community(Larence, 2012). It is also worthwhile to note that there are local government sources of data that may be trivial but valuable to share at a national level; such as parking ticket data collected by parking enforcement bureau's, text data on law enforcement's incident reports. It is also important that we define the routine low-level police records that are most important to feed into the human intelligence process (Larence, 2012). Some of the requirement includes the following:

Local law enforcement needs to know when a known terrorist is in their vicinity. International intelligence needs details of what a known terrorist is doing in a local community and details of specific targets within the United States.

Local resources may need to be tasked to look for anything involving certain targets and weapons such as; biological materials, known terrorists, explosives, financial transactions, infrastructure and weapons of mass destruction (Numerous Federal Networks Used to Support Homeland Security Need to Be Better Coordinated with Key State and Local Information-Sharing Initiatives, 2007).

Also by developing a full productive of information sharing within the federal government, state, local, and private sector. Although numerous of improvements have been made in protecting our country critical infrastructures and sharing information's efforts are in progress to continuing address these problems (Harold, 2004). The consequences of not addresses these problems made result into another traumatic even like September 11.

The purpose of this exploratory research was to examine the state level and the organizations created in the past six years. This research consisted of law enforcement and intelligence personnel from 50 states and 70% of the control study provided input. As a result the experimental procedures, treatments, and experiences of the participants that threatens the researcher's ability to able to draw correct inferences from the data about the population.

The potential threats to internal validity that may arise in this study, responses and actions: (1) some agencies may not want to share information with other agencies. Response and Action: The PATRIOT Act will then be enforced. This states that agencies have the right to gather intelligence from potential threats.

(2) The legality of sharing information.Responses and Action: This will limit the process due to the legal process of allowing states to share information with each other. To include federal, state, and local agencies, the law may prohibit the transferring of information because it may be classified information. (3) The legality aspect of collecting information then to process the information for intelligence. Response and Action: To have laws in effect to provide the necessary legal paperwork for warrants. (4) To notify the appropriate authorities for the proper response to the threat. Response and Action: The immediate approval to inform and share information with other agencies for the appropriate responses.

The manner in which validity issues could possibly impact my research is by (1) The PATRIOT Act should not be an issue because this is a law passed by congress. (2) Agencies being limited due to the legal procedures and or restraints of the US courts. Also, because of the classification of information being declassed may cause it to be delayed or denied to other agencies (3) the collection of information may also be delayed by how the information is ranked from low, medium, and to high importance. (4) Negligence may play a vital role when notifying the proper authorities within a timely matter.

Questions:

1. In your opinion, how prepared is your organization for homeland security in your region.

2. How, aware are you personally of homeland security threats facing your region.

3. How, aware is your organization of homeland security threats facing you region.

4. How prepared is your organization to prevent a homeland security attack in your region.

5. How prepared is you organization to respond to a homeland security emergency in you region.

6. How prepared is you organization to recover from an attack in your region.
What is the purpose and function of information sharing?

7.What would be measure timeliness, accuracy, or relevance for information sharing?

8. What does it mean to collect and share intelligence information within the United States to you?

9. Is it against the constitution to invade your privacy?

Request for Solution File

Ask an Expert for Answer!!
PHP Web Programming: develop an envisioned methodology and design a
Reference No:- TGS0506077

Expected delivery within 24 Hours