REPLY TO EACH RESPONSE 100 WORDS MIN EACH 1. As I mentioned in my introduction

**REPLY TO EACH RESPONSE 100 WORDS MIN EACH**

1. As I mentioned in my introduction week 1, Im a resident of the great state of Wisconsin. While were known as Americas Dairyland, we also have a great deal of other agriculture in the state, most notable corn (maize). I actually just this morning watched a tractor till up the cornfield that my house backs up to! With that said, agriculture is near and dear to my heart, and Ive learned more than I bargained for about the industry in my time living here. Im inclined to agree with Tommy Thompson that it is amazing nobody has attempted to attack our nations food supply, and I firmly believe that when that attack finally does come, it will be on our nations corn crops. The reason I am so convinced the attack would come against corn crops is that corn has become absolutely ubiquitous. If you name a critical food staple, Ill explain to you how corn contributes to its production. The field behind my house, for example, grew feed corn this year. Both beef and dairy cows (Yes, they are different breeds, and you wouldnt want to eat a dairy cow!) eat corn-based feed products. If you destroy a feed corn crop, you not only decrease the dairy cows output, but you may kill off some of the population due to hunger, and the same is true of beef cows. In addition to those issues, theres also the glaring problem of corn grown for human consumption being destroyed. This would not only affect corn sold on the cob, frozen, and in cans, but corn that is then refined into products like corn meal and high-fructose corn syrup. If we lose the corn crop, your favorite soda will likely go with it! Another consideration is that corn is also commonly grown for energy. Ethanol, a corn-based alcohol, is found in the majority of gasoline nowadays. While E85, an 85
% ethanol-15
% gasoline mixture, is somewhat less popular than it was circa 2010, its not uncommon to see up to 15
% ethanol in gasoline pumps. Its particularly common in higher concentrations in premium, higher-octane fuels used in premium and high performance vehicles because it is a cost-effective way to boost fuels octane rating. This is why you will often see mid-grade gasoline being sold cheaper than regular, because it has a higher ethanol content. Overall, I think its very easy to see why corn crops would be such a valuable target for potential agroterrorists. While corn has become an extremely useful crop, our dependence on a single crop for so much of our food supply and energy supply definitely opens up the possibility for wide-spread damage to the economy should that crop fail due to an agroterrorism attack.

2. When people think of a terrorist attack, images of explosions or 9/11 flash through their minds. When people think of CBRN attacks, they think of people gasping for breath or think of recent pictures of chemical attacks in Syria. But few people think about potential attacks against agriculture, or Agroterrorism. Agroterrorism is deliberate, attacks against a nation’s agricultural industry, most often focused on a nation’s food supply. Even though, economically, the U.S. agricultural industry is not the largest or the most powerful industry in the country, every single person relies on it. Imagine a biological agent (disease) was introduced to something as simple as wheat. This agent spreads quickly and completely destroys the wheat plants it infects. Wheat is used in almost every aspect of the food industry. Whether it’s bread, paper, pharmaceuticals, soaps, adhesives or feed for animals, wheat is used far beyond what most people believe. If a biological agent managed to infect the nation’s supply of wheat, every single industry mentioned above would be affected. Not only that, but many of wheat’s uses still involve being ingested or coming into contact with it, whether by people or animals. This in turn could lead to this sickness spreading or causing other illnesses. This in turn would cause a panic throughout the public, as fear of getting sick from their food would spread. Which could then lead to even greater economic downturn far beyond the wheat industry. Look what happens when there is a beef recall due to Salmonella or some other problem. If people found out that cattle had been eating tainted wheat, would they want to buy beef? Probably not. The threat of Agroterrorism is a far more significant threat than most people realize. The scenario above only looks at one type of agricultural product being attacked, even thought there a many more than just wheat. An attack on any type of agricultural product would have effects far outside the immediate product.

3. Focusing on HUMINT first, this is the collection of information provided by a human source either through oral conversation or documentation (ODNI, 2013). HUMINT is typically collected in either an overt or clandestine methodology. Considering this is the only intelligence discipline in which the collector speaks directly to the source, it has significant capabilities in the amount of information that can be collected. Example, HUMINT is often described as the intelligence discipline that can provide you the “Ground Truth”. It can penetrate a target in ways that no other discipline can. An example of this is to say you are trying to build a pattern of life of a specific building. You may be able to monitor it through ISR to observe people going in and out but it will be extremely difficult to gather everything that is going on inside. A HUMINT source on the other hand who has placement and access to this building could provide you details on specific intel gaps you have about that building. One of the limitations is the timeliness of HUMINT. Every step in the HUMINT recruiting and tasking cycle takes time… A LOT of time. You will not always get the answer you are looking for right away and that is something that people need to really understand about HUMINT if they are trying to leverage it real-time.

4. Some of the capabilities of HUMINT is the collection efforts can be used in any situation and accomplished with minimal equipment. According to the United States Army (2006), operators can deploy in all types of environments and support offensive, defensive, stability and reconstruction operations, or civil support operations. HUMINT operations are done through overt, covert, or clandestine means. It uses human sources to identify elements, intentions, composition, strength, dispositions, tactics, equipment, personnel, and capabilities. Information is obtained through observations, elicitation, debriefings, and exploitation of documents or media. Some of the limitations of HUMINT collection and operations are the human error factors and the time it takes to establish rapport and develop leads as reliable and credible sources. Some of the capabilities of technical collection, such as SIGINT, IMINT, and MASINT, are that all three technical collection disciplines employ electro-optical and radio frequency-based systems to provide unique collection capabilities. These methods enable collectors to intercept signals or communications transmitted electronically through radars, radios, or weapons systems. These transmissions help identify equipment type and locations, i.e. cell phone activity and credit card purchases. Some of the limitations to technical collection are the expensive costs to develop and implement. Technical collection is
also limited by the technological capabilities of the intelligence organization. Some technology is relatively easy to out date and countermeasures are often simple (IOSS, 1996).

5. Risk management is pretty much the first step for homeland security to be effective in their goal to protect the nation. Risks must be identified first before any planning can take place with the goal of preventing or dealing with them. Improved homeland security depends on connecting information about risks, activities and capabilities and using this information to guide prevention, protection, response, and recovery efforts. The establishment of sound risk management practices across DHS and the homeland security enterprise will help protect and enhance national interests, conserve resources, and assist in avoiding or mitigating the effects of emerging or unknown risks.(Risk Management Fundamentals, 2011) Simply, you can not protect without first determining what you must protect against. In the case of not being able to protect against something, steps and actions must be taken to make the impact less severe and resilience easier. Cyber-security factors into Critical Infrastructure Protection and risk management being that a cyber attack on any of our critical infrastructure sectors could leave us vulnerable and open our nation to other attacks. With updated and more modern technology, all our systems have been connected to the internet in some way. Because the computer network is tied to the internet, hackers can compromise the industrial control system and wreck havoc on everything from the power grid to transportation networks and more.(Why Cyber Security is Vital for Homeland Security) Cyber-security wasnt really an issue in the past, but now, you can achieve almost anything online.

6. This week we are to answer what specific roles does risk management play in homeland security efforts and how does cyber security factor in critical infrastructure. Risk management plays a huge role in risk management.
So much in fact that in April of 2011 the Department of Homeland Security published Risk Management Fundamentals Doctrine.
In this doctrine they cover a wide array of risk management. Topics such as internal and external source of risk and he risk management process to homeland security. This is not all as throughout homeland security there are various programs and documents outlining steps to avoid risk. One area is under Cybersecurity and Infrastructure Security (CISA), the name is National Risk Management Center (NMRC).”The National Risk Management Center (NRMC) helps fulfill the Agency’s risk advisor role by leveraging sector and stakeholder expertise to identify the most significant risks to the nation, and to coordinate risk reduction activities to ensure critical infrastructure is secure and resilient both now and into the future”(CISA, 2020, Para 3). Similar to the DHS and their doctrine it outlines the steps to avoid risk, CISA’s being Identify, Analyze, prioritize and manage (CISA, 2020). Another area I would like to highlight is under Federal Emergency Management Agency (FEMA) with the National Preparedness System. The National Preparedness System is broken up in six components all aimed the management of risk. The six are all steps taken to achieve the national Preparedness goal. Homeland Security in its self is a form of risk management because risk is a form of danger, threat or hazard. The Homeland Security enterprise assess and manages threats and hazards of all kinds, using various documents like the threat assessment. As technology develops it plays an increasing role in our daily life including our infrastructures. If a critical infrastructure were to be hacked it could spell disaster depending on which infrastructure is hacked. CISA plays a huge role in this field by using functions like the National Cybersecurity and Communications Integration Center (NCCIC). Operating nonstop “the NCCIC shares information among the public and private sectors to provide greater understanding of cybersecurity and communications situation awareness of vulnerabilities, intrusions, incidents, mitigation, and recovery actions” (CISA, 2020,para 4). Furthermore, they work hard with all levels of government and law enforcement to minimize risks associated to the infrastructures by increasing knowledge amongst sectors and employing Computer Emergency Response teams (CERTs) (CISA, 2020).
There are more programs geared in the protection of the infrastructures like Cyber safety, insurance and governance to name a few In short cybersecurity plays a huge role. Have a good week

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′ − 4y′ + 3y = x ; use y1 = e3x vi. y′′ + 5y′ + 6y = e2xcos(x) vii. y′′ + y = sec(x) tan(x)

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′