Discuss Shakespeare’s presentation of the court and the courtiers in the play Richard II.
Homegrown terrorism is an area of difficulty when detecting possible and future attacks. The use of the internet is the most effective tool these individuals are using to create connections, the call to follow the ideology, conduct copycat attacks, and learn deadly methods to use against citizens. Homegrown terrorist live among us, these are not individuals that are coming into our country from other western countries, some without any criminal history making it difficult to detect for law enforcement, and most of their planning occurs alone and in secret. (Johnson) Successful programs that have been created in the mist of terrorist attacks is the “see something say something program”, which has raised public awareness and information on how to report suspicious activity. Fighting terrorism is a national effort and citizens are going to sometimes witness or come across material on the internet that is considered harmful to our nation. By continuing to raise public awareness these individuals can assist the government fight the war on terrorism by reporting suspicious activity. It’s also vital that propaganda production is eliminated, social media sites must reevaluate the terms and user agreement to avoid potential issues with the first amendment. A partnership with these private groups would assist in removing propaganda and recruitment efforts. DHS should also look into funding for “photo DNA” similar to scanning for child pornography would be useful for government officials. This would allow the government to successfully remove information while its being posted and shut down websites that promote violent extremism. Terrorism warfare is changing, the use of armed drones in Syria against military forces is occurring and new technology is presenting itself. The possibility of this occurring in the US and other countries is possible and creating new safety procedures is needed. This is an area that must be evaluated drones are easily accessible and available all over the country, as a nation our air defense will take shape on how to tackle this potential threat. Small drones are filling our skies for recreational use and fears are growing of potential terrorist attacks and other crimes occurring. The FAA and congress have taken a slow approach in responding despite the growing concerns. With current regulations for commercial usage only, there will need to be stronger regulations and rules for drones even if they are grounded until better laws are created. (Bergen) Immigration and Border Security There is a lot of work to be done to secure our borders and fixing a system that many Americans believe to be broken. (Johnson) The Department of Homeland Security works diligently to protect our borders and safeguard our country from illegally activity. To this point there has been a lack of technology that Border Patrol utilizes, this is an area that must improve. DHS officials have claimed that the borders have been more secure than ever, even with significant evidence showing the vast span of southern and northern borders that remain uncontrolled and are vulnerable to illegal entry. The use of technology is not there, the inability to effectively use its technological assets, like drones and aerial surveillance equipment to monitor borders and assist personnel on the ground. Instead of actively using the technology we are re-seeing the use of national guard troops be redeployed under President Trump to assist border patrol agents. (Coburn) DHS has worked towards and reformed immigration enforcement prioritizing the removal of illegals that pose a threat to our nation. The use of national guard troops at the border is nothing new and has been successful in the past with Operation Jump Start that assisted border patrol agents in detecting immigrants attempting to cross the border. Training between the two agencies would be beneficial and areas that border patrol is lacking can be taught from the DoD. This partnership and training would teach border patrol new tactics and proper usage of technology to assist securing the borders. Using a virtual fence with a series of sensor cameras that would detect unlawful movement and illegal intrusions, as well thermal imaging would assist agents capture illegal immigrants. The use of technology could greatly assist agents with 24/7 monitoring instead of foot patrols that are dangerous in the extreme heat. The department has also struggled with administering the nation’s immigration system including vetting, processing, tracking immigration benefits for non-citizen, and monitoring individuals that are in the US on a visa. (Coburn) Either we must look into reforming and ending immigration benefit programs that pose vulnerable to criminal and national security threats. Utilizing biometrics such as face and voice recognistion could assist immigration officials with identifying and monitoring immigrants entering the US. Paper applications is in the past, we’ve become more mobile and technology is beneficial to keep track and put immigration needs to take the next stage while transforming immigration. Cybersecurity The large threat the US is faced with is the threat of cyberspace. We live in an interconnected world and are reliant on electronics. Threats are evolving and becoming more sophisticated in their attacks. Cyber threats will become more aggressive as information and communication technology continues to evolve at a rapid rate. Domestic terrorism threats, cyberattacks against the government and private>GET ANSWER