Sunday, April 19, 2020
Police corruption free essay sample
Police corruption and citizen complaints relative to ethnicity. To begin, police corruption is a very complicated issue to deal with from all angles. From the perspective of most law enforcement agencies these ordeals are not easy to deal with. Corruption only has one side and that is internal with an external persuasion, meaning that there may be a top notch officer who believes in everything good and has exceptional morals but being around individuals who have the power to erasure you to do wrong doings tends to occurs a lot in law enforcement.Citizens have to remember that these men and women come from all walks of life whether its suburban or coming from the ghetto they are all human despite race, social background and gender. In certain areas of law enforcement you have sectors within the organization where peace officers have formed cliques, or even gangs within the agency. We will write a custom essay sample on Police corruption or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page To most this may be looked at as a conundrum because they have these gangs within an agency where they are sworn to protect against certain entities.Corruption is defined as something immoral or unethical or acting a specific way for personal gain; also officers indulge in activities in which they are supposed to prevent. To put it simply it means abuse of police authority whether it happens once or numerous times it is still unethical. A couple examples of police corruption are: Corruption of authority: when police officers receiving free something that they are not legal.Kickbacks: A kickback is a sum of money that is paid to someone illegally, or example money paid to an agent by a company because the agent can arrange for the company to be chosen to do an important Job. Shakedowns: agree to get bribes for not pursuing a criminal violation. Protection: where officers allow illegal activity to ensure profit and power. All of the above are definitely unethical and shouldnt be allowed in any agency whether its local , state , or federal.
Sunday, March 15, 2020
Typical Course of Study for 9th-Grade
Typical Course of Study for 9th-Grade Ninth grade is an exciting time for most teens. The beginning of the high school years marks the culmination of their primary education, and theà course requirements for high school studentsà begin their preparationà to enter college or the workforce after graduation. Curriculum for 9th-grade students shifts to address higher level thinking skills and autonomous study skills. In 9th grade, language arts prepares teens for effective oral and written communication. Typical courses in science include physical science and biology, while algebra is the standard for math. Social studies usually focuses on geography, world history, or U.S. history, and electives such as art become a vital part of a studentsà education. Language Arts A typical course of study for ninth grade language arts includesà grammar, vocabulary, literature, and composition. Students will also cover topics such as public speaking, literary analysis, citing sources, and writing reports. In 9th grade, students may also studyà myths, drama, novels, short stories, and poetry. Math Algebraà I is the math course that is typically covered in 9th grade. Some students may completeà pre-algebraà orà geometry. Ninth grade students will cover topics such as real numbers,à rational and irrational numbers, integers, variables,à exponentsà and powers,à scientific notation, lines, slopes, theà Pythagorean Theorem, graphing, and using equations to solve problems. They will also gain experience in reasoning skills by working through reading, writing, and solving equations, simplifying and rewriting equations to solve problems, and using graphs to solve problems. Science There is a wide range of topics that 9th-grade students can study for science. Standard high school courses include biology, physical science, life science,à earth science, and physics. Students may also take interest-led courses such as astronomy, botany, geology, marine biology, zoology, or equine science. In addition to covering standard science topics, itââ¬â¢s essential that students gain experience with science practices such as asking questions and forming hypotheses, designing and carrying out experiments,à organizing and interpreting data,à and evaluating and communicating results. This experience usually results from taking science courses with labs and learning to complete lab reports after each. Most colleges and universities expect high school studentsà to complete two or three lab sciences.à à Two of the most common science courses for ninth grade students are biology and physical science. Physical science is the study of the natural world and includes topics such as the earthââ¬â¢s structure, ecology, weather,à climate, erosion, Newtonââ¬â¢s laws of motion,à nature,à space, and astronomy. Physical science may also coverà general science principals such asà the scientific method andà simple and complex machines. Biology is the study of living organisms. Most biology courses begin with a study of the cell, the most basic component of all living things. Students will learn about cell structure, anatomy, taxonomy, genetics, human anatomy, sexual and asexual reproduction, plants, animals, and more. Social Studies As with science, there is a wide range of topics that students can study for ninth-grade social studies. Social studies encompass history, culture, people, places, and environments. Students need to gain experience withà social studies skills such as reading maps, using timelines,à critical thinking, evaluating data, problem-solving, and understanding how cultures are affected by geographic location, events, and economics. Standard high school courses for 9th-grade students include American history, world history,à ancient history, and geography. Students studying U.S. history will cover topics such as the exploration and settlement of America, Native Americans, the foundations of American democracy, the Declaration of Independence, the U. S. Constitution, taxation, citizenship, and types of government. They will also study wars such as the American Revolution and the Civil War. Ninth graders studying world history will learn about major world regions. They will learn about the patterns of migration and settlement in each, how the human population is distributed, how people adapt to their environment, and the effects of physical geography on cultures. They will also study wars such as World War I and World War II.à Geography can easily be incorporated into all history topics. Students should learn map and globe skills using a variety of map types (physical, political, topographical, etc.). Art Most high school coursework now requires art credit. Colleges and universities vary on how many elective credits they expect, but 6-8 is average. Art isà a broad topic with ample room for interest-led, electiveà studies. Art studiesà for ninth grade students can include visual arts such as drawing, photography, graphic design, or architecture. It can also consist of performance art such as drama, dance, or music. Art studies should allow students to develop skills such as watching or listening and responding to art, learning the vocabulary associated with the art topic being studied, and fostering creativity. It should also allow them to encounter topics such asà art history, famous artists and works of art, andà the contributions of various types of art to society and its impact on culture.
Thursday, February 27, 2020
The Struggle for Democracy and Democratic Consolidation Essay
The Struggle for Democracy and Democratic Consolidation - Essay Example The essay "The Struggle for Democracy and Democratic Consolidation" analyzes the struggle for democracy and democratic consolidation and their connection to such themes as corruption, populism, divided societies, and political activism. Society makes a shift to equality, and from there, policies will be yielded by one-person-one-vote and the nation will have more supporting power and the consequential cover, crown, and feast. However, changes in political institutions do not simply happen because the people require them. Transitions to democracy typically take place when the elite controlling the active regime broaden rights. Transfer of political power to the majority mostly guides to social choices that the elite does not like. The theory of democratization is crucial in power transition from the elite to the majority citizens. Revolutions attract citizens thus leading to democracy to stop revolutions from occurring. When revolutions happen much wealth of a society may be destroyed affecting the influential and citizens. These costs force the elite to allow for concession and democratization avoiding revolutions. The power is transferred to the people who participate in decision making through participation. Divided societies exist in a democracy and democratic consolidation is due to the different social classes. Leaders use the fact of classes to appeal to the citizen. Governing institutions for societies are alienated along the lines of customs, culture, language or creed. A historic minority as well as experiences of immigration waves cause divided societies. Futile democratic transitions in plural societies frequently upshot in the bloodiest quarrels and most destructive power strives in developing nations6 today. India has a multiparty parliamentary system of government, a majoritarian first-past-the-post (FPTP) electoral system, an incredibly varied party system with some ethnic-based and some programmatic parties7. Political corruption disguises a sev ere threat to democracy and its consolidation. Corruption, either petty or otherwise has become omnipresent in Indian society and politics. It varies from the bribes that ordinary citizens give to record a statement at the police station, to shady
Tuesday, February 11, 2020
Artist reaserch and comparison Essay Example | Topics and Well Written Essays - 1250 words
Artist reaserch and comparison - Essay Example Born in 1967, and currently around 43 years of age, Tomma Abts was born in Germany but she currently lives in London, England. In fact, she has been living in London since 1995. She had a tough time during her early days since she had to jobs in telemarketing positions, which is not ââ¬Å"her thing.â⬠However, things have changed and for the past few years, she has been able to finance her living with her painting and art. Tomma Abts is for sure, one of most interesting and fascinating painters of the present times. As mentioned earlier that she never had any formal training. May be that explains why she does not seem to be following any traditional and pre defined rules of painting (Hoptman, Verwoert & Hainley, pp. 32-39). She has a completely different approach as compared to the other painters as if she is challenging the traditional and classical approach to painting. Beginning the painting without any pre defined objective, name, thought or approach for painting, always sticking to small paintings, (she says that all her paintings are 48 x 38 centimeters) and others show that she has some what a rebel inside her (Hoptman, Verwoert & Hainley, pp. 32-39). The upcoming section of this paper would go in the detail of her paintings while comparing it with the painting of Brice Marden. Without any doubts, Brice Marden is one of the biggest names in art industry. Born on October 15, 1938, he joined the Boston University for studying fine and applied arts in the year 1961. Moreover, his biography also shows that he holds a Master of Fine Arts degree from Yale school of arts and architecture in the year 1963. Since then, he deserves the credit of brining up a new chapter in the art history. Although he is somewhat associated with the movement of minimalism in art, which is an old movement but he has taken it to completely different and levels in his own style. This American artist is not only a member of American Academy of art and Architecture but he has
Friday, January 31, 2020
The Sinking of the Aragon Essay Example for Free
The Sinking of the Aragon Essay With the outbreak of world one war the royal mail moved its home port to Newport, South Wales. However the Brittish government was in dire need of battle ships to strengthen their naval force. Many ships were converted from simply postal delivery vessels into war ready troop carrying ships. One of these ships was the Aragon The Aragon built in harland and wolf in Belfast was 9588 tons and could carry 306 first class 66 second class and 632 third class passengers. It was launched on the 23rd of Febuary 1905. The following information was gathered from an unsigned letter written by an officer of the Aragon to a Mr.Ã John William Hannay the father of a VAD on board the Aragon on her way to serve in palestine and Egypt. For two weeks the Aragon laid at anchor in the shelter of the harbour at Marseilles. Every day they would await sailing orders. At last they recieved orders and the ship, set sail. It set of in company with another transporter ship called the Nile and also with an escort of destroyers. On board there was 160 nursing sisters, 150 military officers, 2200 troops and the ships own officers and crew. In total there was 2700 poeople on board the Aragon. One of these men was my great grand uncle Thomas Cassin who was an Irish man and inlisted as a British solider. Along with the thousands of people on board ready to serve there was also 2500 bags of Christmas destined for Egypt. From Marseilles they set sail to Malta in safety. However There was some fierce weather and the sea became quite heavy. Many became sick. Miss Hannay the VAD nurse being sick for just one day. They arrived at the windy bay in Malta on the 23rd of December where they remained for four days until the 27th. They spent their Christmass holidays here in safety. On the fourth day they set out to sail again still in the company of the NIle and a fresh escort of destroyers. There were three destroyers in number, two of which were Japanese and the other British. They arrived near their destination, Alexandria Egypt, on the 30th of December in the morning. The port was just becoming visible to the naked eye on the horizion. Everyone was very excited to reach shore and every vantage point on the boat was filled with eager passengers looking on ward at the port. Many had packed their luggage and were already attired for disembarkation. It was heard that many were congradulating themselves on a safe voyage. The Aragon with the British destroyer Attack was entering the channel that leads to the port. They were already past the first buoy which indicated entrance into the channel. At this point a wireless message was intercepted from trawlers in the channels that there were mines further on. The Attack, being the senior ship, imediately signalled to the Aragon to follow them as they turned seawards. The trawelers which were there to direct the ships through the channel were doing the same and retreating. The Aragon had to keep well away from the buoy that they had already passed by when entering the port. Unkown to both the Aragon and the Attack there was a German submarine lurking in the depths of the waters right beside the buoy. It was unable to fire before because of the close proximity of the ship, if they did they would have endangered their own submarine. However now that the Aragon was turning seawards, she presented a perfect target for the Germans who took full advantage. The officers of the Aragon on duty on the bridge saw the periscope of the submarine and at the next instant the wake of a torpedo which was heading straight for the ship. In a desperate effort for surrvival the passengers and crew tried to turn the ship to avoid the torpedo but this was to no avail as the ship was quite slow. The explosion was a dull crashing blast and the ship shuddered violently. An officer who was on duty at the time was covered in glass as all the windows on the boat shattered. In the next instant the ship became aware to the fact that they had all been dreading. Everyone on board was at their sations in record time, orders were obeyed with precision. The first order given was the rescue of every sister. They were lowered into the rescue boats before doing anything else. This only took a few minutes and was carried out without a hitch. The boats they got on were the best in the ship and in a position to afford greatest possible facility for getting off. The Aragon sent a call for assitance to the shore and recieved a reply within seconds. By the time the sisters ships had got clear, the ship had taken a heavy list to starboard and had sunk deep astern. It remained like this for a few minutes. The Destroyer took this time to run up along side and the remaing passengers were ordered to get off. They managed to do this by attaching ropes from the Aragon to the Destoryer Attack. On other parts of the ship troops were ordered to take water as the rafts were let loose. In just moments the sea was full of struggling men. Many of the officers and troops were trying to get the remaining life boats into the water but they had become jammed by the list. The crew could now feel her sinking fast. It had become impossible to stand upon the deck. It was about fifteen minutes after the inicial explosion. The commander gave the order every man for himself! . There was a rush to get over the side of the boat but nowhere was there any sign of panic. The discipline was astounding as the troops clung on to each other, singing and cheering until they reached the water level. Then they broke into struggling masses. Then it was heard shes going and the Aragon began to sink rapidly astern. The Destroyer was still at rescue work but only one rope remained. One officer was trying to cross when they finally cut the remaining rope. He was thrown into the water between the two ships. He sank like a stone because his full uniform restricted him to swim. However he still managed to get to the surface and make his way onto the Destroyer. The Attack was full of both injured and dying. The Aragon was sinking rapidly, one could hear a roar of rushing water and smashing of internal fittings. Dozens of men still clung to the decks and at the last moment jumping into the water rather than be sucked under along with the ship. Many of their efforts for survial were futile as with the height that the bow had been raised because the ship had turned whilst it was sinking, they died on impact with the water. With a great surge, a roar of rushing water and the explosion of the ships boilers the Aragon was no more and it went beneath the surface. There was now silence over the men. The place where the ship once was, was now replaced by struggling men clinging to upturned boats and wreckage. The Destroyer was now alive with activity. As they attempted to move ahead to the safety of the harbour with all their injured on board, one man shouted and screamed and next instant there was a terrible explosion. The Destroyer was hit by another torpedo. The middle of the Destroyer had been smashed sending men flying into the air. OIl, fumes, splinters of wood and steel were sent in every direction. She broke into two halves and began to sink immedietly. Both the bow and the stern rising into the air as the middle(wher the torpedo hit) sank rapidly. Everyone jumped for the water. It was chaos around the remains of the destroyer. The only hope left for survival was two trawlers which were near at hand. Except for the trawlers the only rescue boats were the rafts from the Aragon which were already on their way to shore. Only wreckage and struggling men remained in the water, everything else had disappeared. However the rafts did an ecellent job, bringing hundreads to the trawlers near by. Other trawlers became visable on the horizon as the rushed at full speed towars the wreckage. However as the port was 80 miles away it took them some time to arrive and many men perished in this time. The temperature of the water was very cold and this contributed to some of the deaths. It took the trawlers an hour to reach the men but without them few would have survived. The VAD sisters who were the first to leave the Aragon arrived on shore at arround 2:30pm. It wasnt untill 4:30pm when the trawlers with the wounded and survivours arrived. The people on the shore were ready for them when they arrived and the wounded were rushed to hospital. In conclusion the Aragon was torpedoed 8 miles from Alexandria Egypt at 11am on Sunday December 30th 1917 and sank in twenty minutes. The escort for the Aragon the British Destroyer The Attack was also torpedoed about 5 minutes later. It took between 5 to 7 minutes to sink. The other transport ship The Nile with two Japanese destroyer escorts left the Aragon at day break, the day of the attack. They also came under submarine attack but managed to reach their destination safely. My great uncle unfortunately perished that day. It was hard for an Irish man to join the Brittish army. I imagine he would have recieved a lot of criticism for doing so, but he did what he thought was right. He fought with the allies and aggainst evil and for that my family is very proud of him.
Thursday, January 23, 2020
The Bonesetterââ¬â¢s Daughter Essay -- English Literature:
Bones constitute on important part in The Bonesetterââ¬â¢s Daughter. What is the significance of the bookââ¬â¢s title? ââ¬Å"The Bonesetterââ¬â¢s Daughterâ⬠in my opinion holds a deeper meaning as a title. Amy Tan could have called the book ââ¬Å"Precious Auntieâ⬠or ââ¬Å"Liu Xing Guâ⬠if you directly translate the bonesetterââ¬â¢s daughter. Why did Amy Tan choose this title? These three words must contain some deeper meaning and therefore we should not judge the title at face value. The first thing that we should look at is what these three words are signifying. They are putting emphasis on the bonesetter by saying that this book is about His daughter. Tan could have paraphrased the title into ââ¬Å"The Daughter of the Bonesetterâ⬠This means that there must be some importance laid on this bonesetter. The term ââ¬Å"daughter of the famous bonesetterâ⬠is only used a few times within the contents. Amy Tan wanted to accentuate two bits of information. One of those words is daughter. Since most of the book is mostly feminine based, it should, naturally, have a more feminine title. Before reading the book we are told that this story is about a girl or a woman and perhaps her father. However, we are not told about the bonesetterââ¬â¢s daughter until page 155. This is telling us something. We thought that the main character in this book had to be the bonesetterââ¬â¢s daughter. We now find out that this is perhaps not so and that it will be difficult to pin point the main character in this book. The main difficulty is within the fact that this book has no immediate plot. It is more of a mixture between psychological drama and the autobiography of a woman. Nobody can summarize the book effectively within one sentence. The story is far too intricate. This is exact... ...ere used as a way to speak to the gods and ask them questions whose answers could be read from the cracks which appeared on the rocks. Bones are a very important part of the Chinese culture and are used for a holy purpose. Naturally, this again links to the curse that this family is haunted by. If bones really hold that much power over people by being able to communicate with the gods, then if they are misused and disturbed like the way the Gu family did, they can therefore be able to curse them. The curse has grown in importance for LuLing ever since she has realized why it has followed them and what kind of disasters it may lead to. Precious Auntie is the key link between the bonesetter and LuLing and Ruth. She is also the one who suffered most from this curse. This is why she is such an important character. This is why she forms the title of this book.
Wednesday, January 15, 2020
Terrorism
1. Philosohies and rules of war dictate that it is both sound and practical that groups with the same opponent and the same schema forge alliances or common supportive coexistence, and there is a very high probability that that dogma would be followed, considering the fact that terror group leaders are learned men. But the question of having the same agenda is putting terrorism in a very general and pop culture perspective since the truth is that these types of militant extremists have, at some level, varying aims and goals. But another important point is the fact that these different groups can be brought together to act as one unit in a full scale operation. The best example of this tendency is the 9/11 bombing, described by the FBI a few days after the incident as a handiwork of an alliance of terrorists. 2. The pall of gloom that terrorism brought not just in the US but around the world is not just the threat to life, but as well as the threat to liberty. Because of the growing manhunt for suspected terrorists and the increased drive to take the upper hand and identify terrorists even before they can accomplish their missions, some elements of the law enforcement agencies are willing to overstep their boundaries marked by the exercise of individuals of their most basic human right, ready to trespass the domain of private communication with the use of many and all technologies available, including the Internet. Terror groups also found the use of Internet for their cause ââ¬â ransom demands are telecast via video streaming while home made and improvised bombs know-how is just a few mouse clicks away. For this new problem, the solution may lie in old practices ââ¬â kill the head of the serpent and the body ceases to be dangerous. The Internet should not be the target, as US knows it cannot afford to start a new war ââ¬â even in cyberspace. 3. Michael Hamm reported that motor vehicle violations, counterfeiting, smuggling weapons of mass destruction and armed bank robbery, are several criminal acts terrorist participate in. The most common criminal action that terrorists do is the falsification of documents and forgery. Almost every terrorist who entered the country carries a false identification. This criminal act is very crucial in the operation of terrorist cells in the country since the first and most important part of a terrorist mission is the entry of a terrorist in a country or place wherein the terrorist action would take place. This is the reason why border officials are consistently monitoring the many entry and exit points of the country. 4. The most significant findings and information contained in the Hamm report is the moving away of the image of the mythical militant extremists to purely purist forms of terrorism from the true terrorists which is much less now conformed in the mold of idealist / hero into nothing more than a common criminal. The implications for the criminal justice system of this newfound knowledge consist of the possible responsibility law enforcement and criminal justice elements when it comes to profiling active and prospective terrorists by investigating the offenses for they are in trial for. Hamm concluded how a certain set of criminal acts bend towards particular groups as its identifiable crime suspects and this newfound information can be utilized as another efficient tool to battle terrorism. 5. Both international and domestic terrorism presents a clear and urgent threat to the US, simply because a threat to even one single life is an important issue to the US government, or to any government for that matter. Domestic and international terrorism may have many similarities and differences which include M.O. (method of operation), financing, training, orientation, goals, aims and motivation, strength in numbers, leadership hierarchy. Intelligence network and arms and ammunitions supplies, terrorism still wears the same face and the government's efforts to counter it do not diminish based on the type of terror group it faces. Terrorism and the government's fight against it is a microcosm of the proverbial battle of good versus evil; the truth is that there will always be a group of people who will try to use force and intimidation to achieve there cause. Terrorists might have a different name in the future, and the government which the people created is always tasked to battle a constant threat to life presented by another man as a result of differences in ideology. References: Hamm, M. S. (2005). Crimes Committed by Terrorist Groups: Theory, Research and Prevention. US Department of Justice. Retrieved October 10, 2007, from http://www.ncjrs.gov/pdffiles1/nij/grants/211203.pdf Schmid, A. (2005). Links between Terrorism and Drug Trafficking: A Case of ââ¬Å"Narco terrorismâ⬠. Retrieved October 10, 2007. Sisk, R. and Smith, G. B. (2001). Feds Have Names Of 19 In Dark Alliance. The New York Daily News. Retrieved October 10, 2007, from http://www.fromthewilderness.com/timeline/2001/nydailynews091501.html à à à à Terrorism Assignment 2. ââ¬Å"Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. â⬠BRIEFING ON THE THREAT OF TERRORISM POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose: The purpose of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom organisation operating in the Democtratic Republic of Congo (DRC) and to make recommendations on how to mitigate the risk.Background: Terrorism: ââ¬Å"the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism: ââ¬Å"Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racia l, ethnic, religious or any other nature that may be invoked to justify them. http://en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations involved in those conflicts like the United States (9/11) and Great Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE LIBYAN CRISIS states ââ¬Å"obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. â⬠In stating this the point that I am making is, although Vodacom is a South African operation, we must take into conciderati on that Vodafone, a British entity is our major hareholder and the building where our head office is located, Building Gulf Oil is an American institution. Thus it would be a grave mistake to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation: STRATEGIC ENVIRONMENT Emerging Terrorist Networks ââ¬Å"As al-Qaeda has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting weak governance and under-governed spaces, and remain determined to harm the United States, our partners and Allies, and innocent civilians. â⬠General Carter Ham, USA Commander, USA Africa Command in his address to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operat ing in numerous African countries now including but not limited to: Country| Active Terrorist Networks (only major listed)|Cameroon| Al Qaeda ââ¬â Movement for Democracy and Development (MDD)| Chad| Al Qaeda ââ¬â Movement for Democracy and Justice in Chad (MDJC) +2| Egypt| Al Qaeda + 11| Eritrea| Al Qaeda ââ¬â Eritrean Islamic Jihad Movement (EIJH)| Ethiopia| Al Qaeda ââ¬â Ethiopian Islamic Jihad Movement (EIJH) + 6| Kenya| Al Qaeda ââ¬â Al Shabaab| Libya| Al Qaeda ââ¬â Libyan Islamic Fighting Group (LIFG)| Morocco| Al Qaeda ââ¬â Moroccan Combatant Islamic Group (MCIG)| Nigeria| Al Qaeda ââ¬â Boko Haram| Somalia| Al Qaeda ââ¬â Al-Shabaab| Sudan | Al Qaeda ââ¬â Sudan People Liberation Army (SPLA) ââ¬â Hezbollah| Syria| Al Qaeda ââ¬â Al Nusra| Tanzania| Al Qaeda ââ¬â People Liberation Party|Zambia| Riyadus-Salikhin Reconnaissance ââ¬â Al Nusra| Source: http://en. wikipedia. org/wiki/Terrorism and www. crimicweb. org ââ¬Å"The Ho rn of Africa is Africaââ¬â¢s bridge to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures within Africa, from east to west. â⬠(John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations: The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing contingency plans is suggested; general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security measures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed: * Access a nd egress control policies should be enforced for effective visitor control and especially with vehicles entering premises and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, rubbish collection and building perimeters. (Security Management Bulletin no: 6.Countermeasures of threats of terrorist action) Training for these officers should focus on the following types of terrorist attack: * Person borne IED (improvised explosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit card fraud for financing purposes * Assassination of key figures Security Management Bulletin no: 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to: * Penetrate * Avoid * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be noted that due to the recent attacks in Boston, that security at airports across the United States and Great Britain has increased substantially. Business travelers are advised to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security p rocess has increased due to additional random bag searches. Hotel security has increased as well; travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacomââ¬â¢s parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of thought that postulates ââ¬Å"as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futileâ⬠is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacomââ¬â¢s offices are located in a building owned by an American entity and the building is shared by Chevron Oil which is an American owned company, it would therefore be foolish not to recognize the direct threat to the company, itââ¬â¢s employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existanceâ⬠. (Security management Bulletin 5. Disaster Planning) It is therefore imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are prime targets where lots of people gather. A balance of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. Emergency Procedures ââ¬â Major Disasters. Rachel Briggs, R. and Edwards, C. The business of re silience. DEMOS 2006 The Security Institute. Security Management Bulletin No: 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7 Human Rights Watch: In the name of security, www. hrw. org Wikipedia Website: http://en. ikipedia. org/wiki/Terrorism Michael Burleigh; Al-Qaeda and a Decade of Terror Andre Burstin; European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon; 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat Linked to the Libyan Crisis. 2011 Jason A; Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 Subscriber Journal, 16 April 2013 Terrorism Assignment 2. ââ¬Å"Prepare a written briefing for a Board (you can choose any company real or imaginary) explaining why they should increase or decrease their security in relation to the threat of terrorism. â⬠BRIEFING ON THE THREAT OF TERRORISM POSED TOWARDS TELECOMS ORGANISATIONS OPERATING IN AFRICA Purpose: The purpose of this briefing note is to present an overview of terrorist threats within Africa, spesifically towards the Vodacom organisation operating in the Democtratic Republic of Congo (DRC) and to make recommendations on how to mitigate the risk.Background: Terrorism: ââ¬Å"the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism: ââ¬Å"Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racia l, ethnic, religious or any other nature that may be invoked to justify them. http://en. wikipedia. org/wiki/Definitions_of_terrorism Terrorism has become a global threat and is not just confined to the theatre of war, it is also not only targeted at nations involved in those conflicts like the United States (9/11) and Great Britain (the July 7 London Bombings) but also with any nation and organization that is seen as an ally of such nations.ESICS Briefing on THE TERRORISM THREAT LINKED TO THE LIBYAN CRISIS states ââ¬Å"obviously on the top of the list of likely targets for Colonel Gaddafi are the United Kingdom and France, they are closely followed by the United States (an old and usual enemy of Libya but also by the Arab countries taking part in the coalition, every single national participating in the operations could be seen as a legitimate target. â⬠In stating this the point that I am making is, although Vodacom is a South African operation, we must take into conciderati on that Vodafone, a British entity is our major hareholder and the building where our head office is located, Building Gulf Oil is an American institution. Thus it would be a grave mistake to make the assumption that the company cannot be seen as a target of militant action and sensationalism. Current Situation: STRATEGIC ENVIRONMENT Emerging Terrorist Networks ââ¬Å"As al-Qaeda has syndicated its ideology and violence, its affiliates and adherents in Africa and the Arabian Peninsula have become increasingly networked and adaptable in their recruiting, training, financing, and operations.Violent extremist organizations, insurgents, and criminal organizations are exploiting weak governance and under-governed spaces, and remain determined to harm the United States, our partners and Allies, and innocent civilians. â⬠General Carter Ham, USA Commander, USA Africa Command in his address to the Senate of Armed Services Committee, 2 March 2013(sic). Terrorist organisations are operat ing in numerous African countries now including but not limited to: Country| Active Terrorist Networks (only major listed)|Cameroon| Al Qaeda ââ¬â Movement for Democracy and Development (MDD)| Chad| Al Qaeda ââ¬â Movement for Democracy and Justice in Chad (MDJC) +2| Egypt| Al Qaeda + 11| Eritrea| Al Qaeda ââ¬â Eritrean Islamic Jihad Movement (EIJH)| Ethiopia| Al Qaeda ââ¬â Ethiopian Islamic Jihad Movement (EIJH) + 6| Kenya| Al Qaeda ââ¬â Al Shabaab| Libya| Al Qaeda ââ¬â Libyan Islamic Fighting Group (LIFG)| Morocco| Al Qaeda ââ¬â Moroccan Combatant Islamic Group (MCIG)| Nigeria| Al Qaeda ââ¬â Boko Haram| Somalia| Al Qaeda ââ¬â Al-Shabaab| Sudan | Al Qaeda ââ¬â Sudan People Liberation Army (SPLA) ââ¬â Hezbollah| Syria| Al Qaeda ââ¬â Al Nusra| Tanzania| Al Qaeda ââ¬â People Liberation Party|Zambia| Riyadus-Salikhin Reconnaissance ââ¬â Al Nusra| Source: http://en. wikipedia. org/wiki/Terrorism and www. crimicweb. org ââ¬Å"The Ho rn of Africa is Africaââ¬â¢s bridge to the Middle East. That fact explains much about the complex interrelationships between differing Islamic cultures within Africa, from east to west. â⬠(John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7) Vodacom Congo has up till now not considered terrorism to be a significant threat to business operations but rather conventional security threats as in fire, arson, bomb threats and armed robbery to name but a few.Recommendations: The risk management department recommends that the company review all emergency response, disaster recovery and business continuity protocols. Establishing contingency plans is suggested; general training for all employees would result in more efficient response should an emergency occur and is highly recommended. It is imperative that all security measures are reevaluated and a gap analysis be conducted. Recommended areas where improvements are needed: * Access a nd egress control policies should be enforced for effective visitor control and especially with vehicles entering premises and deliveries of parcels. Do an assessment of all CCTV and monitoring services and place additional cameras where needed. * At the moment the local security service provider is ill equipped, there are no personal body scanners available at the building entrances. * There is no equipment available to search vehicles, i. e. stemmed mirrors etc. * Retraining of security personnel, the security officers have not been trained on what to look for and how to search vehicles and people properly. * General housekeeping, rubbish collection and building perimeters. (Security Management Bulletin no: 6.Countermeasures of threats of terrorist action) Training for these officers should focus on the following types of terrorist attack: * Person borne IED (improvised explosive device) * Vehicle borne IED * Bombs directed against property and infrastructure, delivered in trucks, vehicles, packages, briefcases, laptop bags and also in postal items * Fire bombs using chemicals and incendiaries * Improvised mortar attacks * Riots and civil disturbance * Kidnapping for ransom and extortion * Armed robbery, fraud and credit card fraud for financing purposes * Assassination of key figures Security Management Bulletin no: 6. Countermeasures of threats of terrorist action) In a nutshell the security department should do a threat analysis and identify areas where the terrorist would want to: * Penetrate * Avoid * Exploit * Attack Jason A, 16 April 2013, Boston Marathon Bombings, in his briefing after the bombings, also suggest that it should be noted that due to the recent attacks in Boston, that security at airports across the United States and Great Britain has increased substantially. Business travelers are advised to allow extra time to get to the ticket counters and to their gates.There are long queues at the check-in counter and the duration of the security p rocess has increased due to additional random bag searches. Hotel security has increased as well; travelers are advised to adhere to corporate security policies as well as local policies. In saying that if employees travel to the United States or the United Kingdom for the purpose of visiting Vodacomââ¬â¢s parent company or any other business travel, it is advised to monitor local media for additional security measures. This will also apply to the other countries mentioned where known terrorist cells are operating. ConclusionA school of thought that postulates ââ¬Å"as major disasters never occur at a time or in a manner that may be anticipated, pre-catastrophe planning is futileâ⬠is a gross abdication of reponsibilty and cannot be supported. (Security Management bulletin 5. Disaster Planning) Vodacom Congo has clear ties with the United Kingdom due to alliances and shareholding agreements, Vodacomââ¬â¢s offices are located in a building owned by an American entity and the building is shared by Chevron Oil which is an American owned company, it would therefore be foolish not to recognize the direct threat to the company, itââ¬â¢s employees and assets. It would be surprising if many businesses and orginisations could avoid the consequences of terrorism at some time in their existanceâ⬠. (Security management Bulletin 5. Disaster Planning) It is therefore imperative that urgent security focus is placed on the threat that terrorism poses to the company and its operations, large walk in customer care areas are prime targets where lots of people gather. A balance of security measure are very important to maintain a vigilant level of protection without creating too much discomfort to the employees, visitors, business partners and customers.References Martin Gill, The Handbook of Security. 2006 The Security Institute. Security Management Bulletin 5. Emergency Procedures ââ¬â Major Disasters. Rachel Briggs, R. and Edwards, C. The business of re silience. DEMOS 2006 The Security Institute. Security Management Bulletin No: 6. Countermeasures to threats of terrorist action. John Harbeson, The War on Terrorism in Africa; Princeton N. Lyman from Africa in World Politics p7 Human Rights Watch: In the name of security, www. hrw. org Wikipedia Website: http://en. ikipedia. org/wiki/Terrorism Michael Burleigh; Al-Qaeda and a Decade of Terror Andre Burstin; European Strategic Intelligence and Security Center (ESISC), Boko Haram and the Risk of Terrorism in Northern Cameroon; 01 April 2012 Claude Moniquet, European Strategic Intelligence and Security Center (ESISC), The Terrorist Threat Linked to the Libyan Crisis. 2011 Jason A; Boston Marathon Bombing, Aon Crisis Management Consulting/ Global Risk Consulting. p4 Subscriber Journal, 16 April 2013
Subscribe to:
Posts (Atom)