Sunday, April 26, 2020

Whatever They Told You About College Essay Examples Is Dead Wrong...And Heres Why

Whatever They Told You About College Essay Examples Is Dead Wrong...And Here's Why The College Essay Examples Trap Who knew essay writing may be so tough. It would likely not be troublesome for many folks to create an essay on any dilemma together with in stressful acquiescence with a number of the hints inside your School. The reasons may vary, as well as the approaches you might have while writing the essay. So in case you have an essay assigned that you require help with, you can purchase essay online cheap from us. There are lots of selections of essays, it isn't tough to drop your eye on all your writing assignments. Engaging A fantastic essay is engaging. Writing quality essays is the principal use of our services. College Essay Examples: No Longer a Mystery The type of essay you're looking for will be offered to you within the deadline provided to you. There's no need to say how important it's to compose high-quality writing assignments. As soon as you inform us about all of the paper information, we'll begin trying to find an ideal writer for your paper. You obtain a preview of your essay and ask to produce corrections if necessary. A Secret Weapon for College Essay Examples Our writers are pooled from the United States of america, UK, Canada, Australia in addition to the remaining Nordic nations. With our essay help you may make sure nobody shall receive a better mark for the work than you. Together with the assistance of others to be sure your essay is pristine. Try to remember, once you're reading an example essay that is already submitted to a college, you're taking a look at a last item. It's possible to choose the producing professional you feel is only an incredible match for your very own specific essay prerequisites. All our writers pass a considerable procedure to look at their abilities. If it's a process, attempt to allow the reader know of every step that's involved in the approach. For each one of the 7 Common App prompts, it supplies a minumum of a single sample essay including a comprehensive analysis. A superb structure is useless in the event the content is like rubbish. Content The content is additionally a very good gauge of the trustworthiness of the sample essay. These websites offer an assortment of sample essays. If you would like to create a thriving paper and to receive a high grade, you will need to have certain writing and research abilities. Paper Writing Services There is a significant large number of paper writing services sprouting on the web. If you don't understand how to write a college essay, start trying to find the location where it is possible to buy customized essays at a fair price. To make certain you get the proper essay that will satisfy your instructor's expectation always purchase essay that's custom written. Ideas for Descriptive Essay can be hard to find. Writing is a present that comes naturally. Writing a college essay can arrive in various forms and styles based on your taste. Writing a transfer essay isn't a mere formality. The Honest to Goodness Truth on College Essay Examples College admissions committees would like to find out about your targets and values and what you've discovered from your experiences. Colleges would like you to write concisely. Most colleges offer a number of scholarships. Students often consider the personal statement and don't have any clue where to begin. They lead busy lives and often forget about an upcoming deadline. Ahead of enrolling in college most students believe they have decided on the ideal major, the appropriate college, and even the most suitable place to study. Today, most college students find it difficult to compose an essay on a particular topic. A coherent essay will not provide you trouble understanding what you're reading. The very first verse is among my favorites. Obviously, you must be certain that basic things like punctuation, grammar and spelling are top notch. A Secret Weapon for College Essay Examples It is preferable to acquire professional writing assistance from the corresponding support. Any writing assignment that's provided to you by your teacher should summarize the knowledge you have during the full procedure for education. Therefore, if you don't find out how to write a college essay, just address our organization and we'll do our best in order to meet all your requirements. Now you can purchase genuine college essay online, one that is going to fit your financial plan and get your work done also. When you're an adult returning to school, the help of adult scholarships can definitely offset the expenses that arrive to your additional education. Adult scholarships are everywhere and there's a wide variety of adult scholarships to pick from. Other colleges can have a lot of entry committees who make the exact last decisions. Every student demands help with homework from time to time.

Examples For A Process Essay

Examples For A Process EssayWhen it comes to writing an example topics for a process essay, there are numerous topics that you can utilize. One of the best examples is the proverbial peanut gallery.The peanut gallery is a term used by dictionaries and other reference books that tell us what group of people we are talking about when we mention 'peanut gallery.' In this instance, the person has nothing else to do except to be in front of a camera or television watching you go through the alphabet. In many instances, however, there is more to the story than that.One good example topics for a process essay can be a group of friends. Instead of simply describing your friendships, why not demonstrate that by providing information about the activities that these friends share? For example, are they avid movie watchers? Are they big sports fans?If you have small children, may they participate in the activities described in your examples? Be sure to supply details such as the number of childr en, age, and gender of the children. Describe how the children choose the activity they want to do, what they look forward to most about doing the activity, and the activities they most enjoy participating in. This could include sports, soccer, arts and crafts, science experiments, etc.Perhaps the most interesting example topics for a process essay would be a family that has been together for many years. They are all members of a church, they have prayed together, and they also share meals together. Why do you think they share their meal together? Perhaps because they are members of the same church? Perhaps they are simply praying together or just sharing their thoughts about life?There are numerous other examples of examples topics for a process essay. Some examples include anything involving a particular topic. Other examples include any topic at all. You may discover that some topics become too much and you may only use one or two examples.One of the best example topics for a pro cess essay is time itself. Allow yourself to be creative. Think of something that is meaningful to you and think of ways that it could be depicted in a process essay. It is great practice and also provides a great example topic for a process essay.

How to Write a Social Issues List Essay Topic

How to Write a Social Issues List Essay TopicIf you want to know how to write a social issues list essay topic, then it is important that you research the most effective methods and tactics. The trick is in the timing. A fast essay submission usually means a fast essay grade. What you do, here, will be based on your understanding of the social issues that affect our society today.What are these issues? You need to find out these. Find out which ones are facing the greatest adversity. Which ones are causing the most harm to your community and our world?Once you know the most important issues, you can start thinking about the areas that are of interest to a particular interest group. And from there, the writing process starts.For example, if you have a small local school, the issues that are specific groups that you are going to address might be things like lack of access to food and water, gangs, or a lack of safe places for children to play. Find out which issues are pertinent to you r community. These issues are probably the most vital. People who live in poor communities face a lot of hardships.Once you know the issues that are most critical to those in the community, you can start focusing on the people who are most likely to influence your essay topic. Is it the politicians, the police, teachers, principals, administrators, parents? Once you know this, you can build the essay around the issues they are most concerned with.What is another important issue? The environment. Think about the issues that environmental activists are most concerned with.You will have a better idea of how to write a social issueslist essay topic, once you know the issues that matter most to the environment, or the environment activists. Once you have an idea of what is most important to them, it will give you the right tool to write an essay that will get you the high grade you deserve.

Introduction For Argumentative Essay

Introduction For Argumentative EssayThere are many reasons to write a sample introduction for argumentative essay. You can also see the same samples being used by some writers to guide their own writing and theory writing. Writing the introduction is one of the most important parts of an essay. Writing it properly is important because it gives students a chance to give their own thoughts on what is written, and it will also act as a guide for anyone to read over a section of the essay.A sample introduction for argumentative essay is quite easy to write. It will consist of something like a question that has been posed in the essay. It is vital that the student knows how to follow a question to its conclusion in order to complete the whole essay. So, in order to answer the question posed you must first know where the question is coming from, and where you are going to answer it.You can also consider asking someone who is close to you, to write your introduction. Just make sure that the introduction is written with sensitivity to your topic. The introduction for argumentative essay can help you when you are looking to find the right writer for your essay. They will help you choose the best writer for your essay. This is an essential part of writing an essay and getting an essay writer will be critical.Writing the introduction for an argumentative essay is a matter of personal choice, because it is something that can affect the future of your essay. One should decide what a great introduction will be and to keep the most important thing in mind. If a person is new to writing an essay then they should avoid starting a work that requires a sample introduction for argumentative essay.One may be introduced to essay writing at college, or even at high school, but there is no need to start your essay with a sample introduction for argumentative essay. After all, it is not a necessity to do so.When writing the introduction for argumentative essay, the good thing is that t here are some tips that you can follow to help the writer to write the introduction well. Some ways to accomplish this include asking a friend to ask you questions, or writing down things that the person knows about yourself. You could also suggest a sample, because this can also help you. To complete your sample, it is important that you have a short paragraph which can tell readers what you want to say.The introduction for argumentative essay can be long or short. However, the most important thing is that the introduction for an argumentative essay is the introduction that is used, so you have to think of one that you would like to use, so that you can begin to make your own introduction for argumentative essay.

Sunday, April 19, 2020

The Concept of the Homeland Security After the September 11 Incident

Introduction Following the glaring terrorist attacks on September 11, 2001, the homeland security became a key national concern. Law enforcement bodies and their respective roles changed at the federal, state, and local levels. The United States’ Congress responded to the attacks by enacting the U.S.Advertising We will write a custom research paper sample on The Concept of the Homeland Security After the September 11 Incident specifically for you for only $16.05 $11/page Learn More Patriot Act, which sought to restructure the federal, state, and local bureaucracies coupled with disseminating powers to law enforcement bodies across various agency departments (Davis 2010, 44). Even though most of the traditional security policies changed drastically, law enforcement personnel is yet to understand how to adapt to these new roles and powers towards curbing terrorism. In many respects, many people may perceive the Homeland Security as a recent policy a rea developed to react to the terrorist attacks of September 11. However, it is not a new idea since the U.S. government has been dealing with domestic invasions for a long time. In addition, much attention since the World War I has been given to safeguarding the home front from internal and external enemies. However, the concept of the homeland security shaped as an internal policy after the September 11 incident. Research question Several national intelligence issues continue to pose threat to the future of the Department of the Homeland Security (DHS) including strict bureaucratic structures, inadequate finances, lack of coordination, reluctance to share intelligence information, fragmentation as opposed to integration, and lack of accountability (Jenkins, Liepman, and Willis 2014, 19). In addressing these issues, this article will be answering the question on the challenges that the DHS will continue to face in the future. These areas will continue to pose challenges because the decision makers seem to be contented with the existing bureaucratic organization. Second, the same bureaucratic leadership is tasked with the allocation of finances meaning that considerable time will be wasted while trying to distribute funds to the security bodies. Furthermore, due to the bureaucratic systems, information sharing is highly restricted to a few people, thus leading to mistrust and further fragmentation of intelligence bodies (Goldstein 2013, 11).Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More Purpose statement The most prominent future intelligence challenges encountering the DHS are much attributable to the September 11 attacks. Most notably, the immediate response issued by the George Bush administration was an enforcement of strict bureaucratic systems across the national intelligence community. This approach did not solve the problem, but it created differences since many workers were demoralized due to working under highly bureaucratized structures. This system has been reflected in the current Obama administration not only in the security systems, but also in other departments that influence the performance of the security agencies. Currently, the process of recruitment, training, and firing of workers is strictly bureaucratized. For instance, the incumbent Secret Service Permanent Chief, Joseph Clancy, has often expressed his regrets over the complex system deterring him to take swift actions to security agents and other officers who engage in mischievous and unacceptable behaviors (Rogers 2014, 337). Following the intensive consultations in decision-making, achieving timely interventions has been in vain. In addition, lack of adequate finance has led to poor service delivery and yet the government looks reluctant to utilize soft power to mitigate this issue. Literature Review Even before the September 11 attacks, intelligence analysts had explored the risks and threats of terrorism in a bid to fill the gaps that persisted within the US security system (Hymans 2006, 457). The experts repeatedly identified the lack of cooperation and poor coordination as the eminent concern amongst the several bodies linked to the Homeland Security. Prior to these attacks, the law enforcement system was majorly divided and bureaucratized. For example, the CIA addressed foreign threats while the FBI handled internal threats. This fragmentation encouraged division and different versions of intelligence operations. In most cases, the National Security Agencies (NSA) dealt with similar problems, thus overlapping each other. Before the attacks, the US government lacked a clear framework for pulling its intelligence expertise together to offer protection against terrorism. Apparently, insufficient information sharing by key federal entities remains the primary indicator in the security gaps in the US.Advertising We will write a cus tom research paper sample on The Concept of the Homeland Security After the September 11 Incident specifically for you for only $16.05 $11/page Learn More Most of the post-attack responses made it common knowledge that the U.S.s security efforts suffered poor coordination. This aspect led to the formation of the DHS to foster coordination among all security entities with a mission of preventing future attacks together with enhancing preparedness and response (Kamien 2006, 31). In a bid to mitigate the foreseen challenges facing the DHS and the American fraternity as a whole, this review will address various issues that are seen as weak ends destabilizing the homeland security framework. For instance, the bureaucratic system is still acting as a barrier to implement the recommended changes. The main national intelligence challenge facing the DHS is poor coordination and this aspect brings forth the possibility that attacks will continue to happen if not contr olled. Coordination does not only involve the intelligence entities, but it also extends to the Congress, which passes budgetary allocations coupled with enacting key security laws. The current workforce in the DHS is inadequately equipped in terms of resources, empowerment, and training. For example, after the September 19 2014 White House incident in which a man managed to jump over the White House fence, Cummiskey, a former DHS agent, argued that the security flaw was purely attributable to the lack of funds (Shear and Schmidt 2014). Further investigations backed this claim by showing that several agents on duty had no appropriate skills to handle the situation. In addition, the majority had no idea on how White House Communication radio operated under such circumstances. This assertion holds due to the lack of enough financial resources, which should not be a reason to expose prominent leaders such as the president to any sort of security threats. Despite the evident commitment and progress demonstrated amongst government agencies, this review notes that there has been lacking professional exchange of intelligence information amongst security agencies. Furthermore, military and law enforcement training is yet to upgrade to the standards of the 21st Century technology that can assist in promoting the US security level (Rychnovska 2014, 27). It is about 14 years down the line since the September 11 attacks, but the US government continues to delve into research and forums to develop strategies to enhance the homeland security. It has become increasingly evident that the U.S. security entities are suffering due to the lack of interconnectedness.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More In light of this impasse, President Obama, in a directive to evaluate the DHS and its efforts towards counterterrorism, retaliated that the DHS is inseparable from other security agents and they should be functionally thought as a unit rather than separate entities (LaPira 2014, 230). Contrary, the federal state still faces conceptual and functional differences. This aspect has weakened integration, efficiency, and cohesive approaches that promote the national security since the bureaucratic system inhibits the formulation of ways that reflect this reality. In a bid to address the underlying mission of the homeland security, it is good to understand that the burgeoning campaign against terrorism is a multifaceted endeavor. The federal machinery has to deploy every tool at its disposal to wage this fight; for instance, international training, law enforcement, finance, diplomacy, as well as the new tools that are being invented. In this regard, it is noteworthy to review the works of Joseph Nye, viz. Soft Power: The Means to Success in World Politics. Soft power is a concept developed as an alternative to use of force, coercion, or monetary compensation to persuade others to adhere to what one wants (Nye 2004, 74). Nye (2004) had keenly observed how the American society was struggling with hard power, yet enemies were in a position to not only hit, but also hit hard regardless of the alleged preparedness of the US security agencies. Nye’s conviction of power as possessing the ability to lure others to get to the preferred destination is currently given a chance albeit in part by various security entities across the world (Nye 2004, 98). The US Congress has shown reluctance in allocating more money to cater for security matters. In the last decade, in spite of the security concerns, the budget allocation to ensure a more secure homeland has always fallen short. Consequently, planning and implementation have overlooked key security factors that gradually co ntinue to affect the homeland security negatively. The US government can adopt soft power and save chunks of taxpayers money used on hard power like the military. Soft power and hard power should be used alongside each other, but the former should be granted much attention in terms of implementation and financing. It is evident that soft power is hugely overlooked, and this aspect contributes partly to the current fall in the US power influence over the past five decades. The old image of the US as the representative of democracy and a symbol for others to emulate has declined dramatically. The use of hard power by the US has doubled the fear rather than instilling optimism. The US security entities have developed an old versioned tendency of using tactics employed in past wars to address current concerns. While there are positives to be drawn from history, facing the 21st Century terrorism requires a paradigm shift. Since the case is new, security agents should adapt quickly to new measures and act in new ways. So far, the existing partnerships encouraged by President Obama’s administration are yet to materialize, as there is still overlapping of critical roles by different intelligence partners. The CIA’s chronic failure prior to the September 11 attacks to inform partner agencies about the names of the alleged terrorists in the country enabled them to stay and orchestrate the attacks. Therefore, information- sharing continues to suffer from significant flaws. In order to learn from past events, it is necessary to change the bureaucracy that encourages information hoarding and empower experts to take full responsibility for their roles with less closed systems. This hindrance can be overcame by developing a paradigm shift whereby experts have the power to react to an urgent situation at best of their knowledge instead of waiting for commands from the top, which are time wasting and uninformed in most cases (Puyvelde 2013, 142). Despite the many advantages of soft power, it has some shortcomings. Americans are scientifically oriented, and thus they resist soft power because they find the design behind it difficult to trace and research. As a society, the US is used to quick answers and it seeks immediate satisfaction. Unfortunately, soft power is a long diplomatic investment with no assured outcomes. This aspect explains why the US government prefers hard power even though it is expensive. In addition, soft power is not purely owned by the government like the case with hard power. Many public and private entities engage in soft power, thus making it hard to collect information together. After evaluating the social learning theory, one is in a position to identify that not all cultures are receptive of other nations’ strategies and ideas (Lieven and Hulsman 2006, 61). In this regard, these theorists challenge soft power as not many cultures find the US values and ideologies admirable to follow. Therefore, there is a possibility that soft power can backfire especially when in control of the wrong people. Cultural exchanges have developed to serve as measures to control national security. Through cultural exchanges, different people are in a position to gain better understanding of others. Similarly, other individuals get the opportunity to acquire greater understanding of the US mainstream culture. For instance, some scholars attribute the fall of the Soviet Union to social exchanges gained after visiting the US the international relations theory advocates for multilateral relations between the state and non-state actors. Developing mutual understandings is one way through which the DHS can achieve its mission of ensuring security at both domestic and international levels. This theory further suggests that mutual relations are difficult since every state has its own ambitions and if they fail to reciprocate with those of the other state, then cooperation is not possible. So far, the Government A ccountability Office’s (GAO) appraisal of the federal government and its security agencies indicates that there has been positive progress yet not enough to guarantee sustainability. For example, in a report done on September 2013, GAO reported on the activities that DHS had taken in regard to the use of resources outside the US. The GAO established that the DHS had not identified strategic plans like target zones to combat crime and secure the US borders. The DHS also lacked mechanisms to capture resource deployment neither did it have a reliable cost data to make informed resource-allocation decisions. This aspect implies that the DHS is failing significantly in planning since it does not consider data monitoring and analysis on expenditure abroad. Without this data, it is hard to disseminate funds on future programs. In addition, this aspect manifests poor intelligence planning and data collection gaps, hence poor analysis. In a bid to avoid this issue, the DHS must inform its resource deployment outside the US as well as encourage screening. Theoretical analysis Following a review of the past literature, this theoretical approach seeks to test the hypothesis that poor gathering and utilization of intelligence data will continue to hinder the performance of the DHS in the future. Looking at the state of affairs in the US intelligence community, it is largely generalizable that the US law enforcement and intelligence bodies depict the overarching problems of coordination and sharing of intelligence information based on baseless assumptions. Although the US Congress and the Obama administration have shown efforts to eradicate some of the misunderstandings that hinder coordination, there is still no confidence in sharing of critical intelligence information. Nevertheless, the social learning theory offers an appropriate approach to learn the changing social context of the American Society as well as its potential enemies concerning the significance link ed to the national intelligence community. This theory claims that learning is a cognitive process that prevails in a social environment through provided directives or observation. In this case, according to the GAO, the US security services have shown the desire to learn through observation of past attacks, but that desire has been jeopardized by the slow rate of behavior change and adaptation to new trends in the management of security affairs. Some of the stringent measures adopted by the US Congress and the George Bush administration following the September 11 attacks have failed to impede security threats. Critiques posit that the bureaucratic measures have led to a string of security gaps even in the White House. To critics like Hummel, tight bureaucratic measures foster a circular sluggishness in decision-making. The policymakers have been reluctant to initiate a paradigm shift in security affairs. On the contrary, they keep on twisting old strategies to solve emergent proble ms. For instance, the DHS and the Secret Service require strong and flexible leadership, which is open to criticism and ready to share security information with relevant bodies. Working under strict bureaucracies is discouraging for workers and if it proves hard to avoid the protocols, then it is also difficult to enhance performance and coordination. Bureaucratic values discourage teamwork and decrease trust among security machinery, thus meaning that information sharing is minimal if any. This approach has proved inadequate particularly after the September 19, 2014 invasion of the White House by a stranger who managed to jump over the fence without being noticed. Models that influence leadership In a bid to understand the research on human intelligence, it is crucial to explore the triarchic theory of intelligence. In this theory, Sternberg defines human intelligence as mental activity focused on a specified goal and shaping of real world events influencing one’s life (Spar ks and Sulmasy 2006, 34). This assertion implies that intelligence entails how effective a person can handle changes occurring throughout life. His model entailed three components including problem solving, performance, and knowledge acquisition. The combination of all the three components completes tasks that entail selective choice of information from irrelevant sources or unforeseen events. In addition, these components assist in putting together the several pieces of information collected and analyzed to establish any possible cues. Different people have disparate abilities to learn new information depending on training. The DHS has expertise with the potential to utilize these three components fully and come up with useful intelligence information. The challenge comes in when experts seek to change the norms to suit the situation. The bureaucratic machine fails to acknowledge change from outside since all decisions come from the top. Even though the DHS is willing to adapt to n ew environments that contend with real world situations, the pace is too slow and it might keep on playing catch-ups with its enemies. The policy regime theory holds that in the policy world, major attacks are rare and in most cases, unpredictable, but they have huge effects. Unexpected external disruptions often influence routine policy goals and government activities. Policy theorists refer to these events as ‘shocker moments’ that force some drastic shifts in government concerns to issues that had for a long time been overlooked. The September 11 attack is an example of these trigger events. Such moment causes dramatic focus by government machinery, but the attention quickly fades away soon after. The issue may not be completely forgotten as it was the case before the attack, but it fails to keep the heightened concentration that was employed amid the attack. The government seems to assume that the adversaries disappear entirely, and thus get reluctant once again (Th achuk 2007, 71). Contrary to these views by the policy regime theorists, this paper affirms that government security agencies such as the DHS have enough intelligence to foresee attacks and neutralize them before they hit the targets. The fact that large-scale attacks are rare should provide enough time for the intelligence community to organize and identify all security loopholes that may be exploited by terrorist groups. In addition, the work of the DHS is to ensure security, and thus there should be heightened attention continuously irrespective of whether there is a looming attack or not. The government demand-oriented theories for interest representation argue that the government itself engages in activities that encourage groups to foster political action merely by orchestrating concerns that those groups will benefit. In other words, the government demand theory advocates the idea that groups as well as individuals react to policy agendas determined by only the government ins titutions. This theory fails to consider the efforts of non-governmental agencies. This aspect is reflected in the lack of cooperation as experienced by the US security agencies. This view is different from the Truman’s classic pluralist disturbance theory, which claimed that different groups, both governmental and non-governmental, should come together in response to some foreseen threats in the society. This aspect implies that problems outside and inside the government motivate like-minded people to respond cohesively to try to find a permanent solution. This model influences the leaders’ behavior as the government shows attention to factors that might affect a group like the DHS, and thus it is more likely that the DHS will work towards government objectives (Stana 2003, 84). When leaders in the DHS get financial support from the government, they feel obligated to perform effectively. Future threats to the homeland security Military researchers and defense technolo gists are recently exploring possible challenges that face not only the US, but also the entire global security. This review gives a forecast of four potential traditional and non-traditional security challenges that may catch the US unawares in the near future. This assertion holds because the pace of research is slow and it may not match that of the terrorists. First, there is the possibility that biological weapons will be used in large scale in a terrorist attack. In 2009, the White House came up with a National Strategy for Countering Biological Threats with an assumption that such weapons might be used for major attacks (Robinson, Xinsheng, Stoutenborough, and Vedlitz 2013, 715). With these insights, the US government has acted too slowly to identify ways to ensure that it can prevent deadly viruses from being used as weapons of mass destruction. Due to the lack of coordination and bureaucratic structures, it is hard to attain timely insight on possible attacks as well as taki ng swift measures in case one is detected. Since this phenomenon is new, researchers need to anticipate widely by closing all potential gaps that might be useful to terrorists. The second issue is the eminent threat of cyber-attacks. Cyber warfare is a traditional security threat to global peace that has persisted for years. Terrorist networks are using the same technologies that propel developments to sabotage the critical structures, which are necessary for public safety (Thachuk 2007, 99). The US intelligence community has embarked on cyber security activities to ensure timely fixes, but it is now evident that the sophistication of attacks is outdoing the available security measures. Therefore, solutions should surpass the traditional approach, which requires more funds to upgrade the system and catch up with the enemy. This assertion holds because in the near future, attacks on computer systems are about to cross the line from mere theft and disruption to serious terrorist attac ks. These attacks will be controlled remotely and devastating damages will occur if such circumstances happen. These postulations are within the realm of the possible given what has been witnessed when hackers overwhelm networks. The National Security Agency and the Cyber Command have a wide array of expertise, but they lack the commitment to share classified information. The private sector in most cases is not ready to reveal attacks for the fear of losing clients or facing lawsuits. The lack of enough network security personnel remains a concern in the private sector as well as the government (Sun 2008, 170). Therefore, it is time to create incentives and issue bonuses as a way of retaining and motivating experts. The third aspect is the existence of the transnational crime. The US intelligence community views transnational terror as a key global security challenge (Nakaya 2005, 93). These groups lead to instability and blackmail to governmental organizations through corruption. T hese groups are very well organized without strict bureaucratic systems. They generate funds through engaging in illicit activities such as human and drug trafficking. Much of the US efforts to counter terrorism have been concentrated in the Middle East, thus forgetting that al-Qaida sympathizers are located everywhere (Murray 2003, 66). The last aspect is the proliferation of nuclear weapons. For at least the past five decades, the US has spent huge sums of money and time trying to find, monitor, and impede all means through which they are developed. Non-state actors such as terrorist groups are hiding nuclear weapons deep in the ground. Finding and destroying these weapons has remained an increasingly complicated endeavor. Thus, the US government will need weapons that can unravel these mysteries. Due to lack of adequate finance and poor coordination, it will be hard for the US to destroy nuclear weapons in the possession of terrorist groups any time soon (Mullins 2010, 102). Find ings Based on the reviewed articles, there are clear signals that the frequency and intensity of attacks on the US and its allies will escalate. Since terrorism is a strategy that can be used by any enemy, the DHS must be ready to react to foreseeable and unforeseeable threats coming from expected as well as unfamiliar origins. As technology evolves and becomes readily available to a larger population of actors, potential attackers are motivated to use terrorism. This aspect has been attributable to the gaps left in the innovation of these technologies. For instance, computer manufacturers should redesign their products in a way that it is hard to manipulate its functioning to suit the terrorists’ desires. The movement of people across borders has also increased the ease of movement by terrorists. The Internet has served as a key platform for terrorist activities ranging from recruitment and training to planning and attacking. Of huge concern is the spread of religious radica lization, which is taking root in the Muslim society due to different reasons. These tensions have become widespread via the Internet even to countries like the US, which have a better understanding of the Muslim populations (Maxwell 2004, 94). Increased funding is now needed than ever to advance training and purchase sophisticated facilities because threats continue to evolve. The DHS must be in a stable financial state to cater for learning programs and ensure good pay for security agents to ensure that they are motivated to perform well (Marion and Cronin 2009, 22). The enemies are proactive, innovative, adequately funded, always learning, and adapting to the dynamics of a globalizing world. The DHS must be in a position to surpass the adversary tactics and reflect the evolving threat environment. The DHS has so far issued analysis of possible future occurrences, but it is yet to demonstrate its capabilities to counter those threats. Furthermore, effective collection and utilizat ion of intelligence data will only be achieved if the DHS is allocated enough money to cater for its extensive activities (Walker 2007, 74). The increase in funding should also target all avenues of international cooperation to bolster the existing and create new alliances to create and sustain international networks that embrace information sharing. The Sternberg’s intelligence theory helps in answering the research question as it shows what the DHS lacks and the consequences it has to face for its ignorance. For instance, Sternberg talks of divergent thinking, which is brought by activities like task switching and domineering management. The DHS must learn specific skills to help in coping with the ever-changing environment. Strategies to impede future threats The primary strategy is impudent leadership. Combining tools of soft power with selected hard power can transform the National Security apparatus greatly. Leadership is a common tool that the US has embraced for decad es. The question is how this leadership has influenced matters of national security. From previous reviews, it is evident that the American leadership both at home and abroad has suffered poor coordination, thus leaving gaps for terrorists to exploit. Adopting the soft power model brings forth leadership styles that mobilize people with an objective and the leader helps the people in attaining those shared targets. It is time for the US leadership system to abandon the hierarchical leadership pyramid and shift to what Nye (2004, 106) refers to as leading from the center of a circle. The current leadership model in the DHS is a rigid one because information flow is often slow from top to the bottom or from bottom to the top. In addition, information is subject to distortion amid intended or unintended additions and omissions. The second model is more flexible because leaders at the center of the circle find it easy to coordinate large groups via persuasion and influence. Leaders are in a position to link straight to the subordinates, and thus their influence is felt on a wide scope. In a fast globalizing world, the US should ensure that it encourages leadership from the center since it is the way to impertinent leadership. The former Secretary of State, Hillary Clinton, echoed these sentiments by reaffirming the need to embrace civilian power in line with military power as essential pillars in enhancing global security. The role of international training and cultural exchanges by the DHS can be a starting point in a bid to make a huge effect on both national and global security by utilizing soft tools as opposed to hard power. Given that the homeland security has a direct link to the global community, embracing intercultural literacy is paramount. Leadership in the homeland security has to understand the dynamics of culture. This aspect can enable them to act as pioneers of transformational leadership that motivates individuals from various diverse origins to f ight global criminal cartels and ensure national security. These changes can only be possible if improvements are done on communication both within the DHS and within other agencies. Evidently, the homeland security has failed to speak a common language on various occasions, and thus increasing communication is necessary. Communication should not only focus on the security agencies, but also engage the public since security is everyone’s responsibility. The DHS should collaborate with learning institutions, media, and religious bodies to sensitize the public on terrorism. As the US adopts a new paradigm, civil rights and individual freedoms must be observed. Even though some risks have to be taken, this move will ensure that the process does not interfere with human dignity. The DHS in partnership with the media should embark on instilling trust in the public by keeping the society well informed with accurate and timely information (Caponi and Belmont 2015, 17). Conclusion Af ter the September 11 attacks, homeland security has gained national interests with key projects focused toward promoting the safety of the US citizens. This review has established that the US Homeland Security faces many conceptual, structural, organizational, and functional problems that are posing threats to security. A review of several cases shows that even the White House has become vulnerable to attacks due to poor coordination and training of security agents. These dysfunctions have been directly linked to the lack of enough funding and rigid leadership that discourages innovation as well as employee motivation. Cultural diversity has also been identified as a possible problem impeding interagency cooperation. Consequently, this paper has predicted various challenges that ought to face the DHS including cyber attacks, biological weapons, nuclear weapons, and transnational crimes. The DHS in partnership with other bodies of the intelligence community has a chance to prevent th ese attacks from happening. As indicated earlier, the application of soft power is a major way forward since it does away with bureaucratic systems, whilst keeping the critical values of that system. However, through proper coordination and information sharing amongst security agencies, the US will stand a better position to promote homeland security. Reference List Caponi, Steven, and Kate Belmont. 2015. â€Å"Maritime Cybersecurity: A Growing Threat Goes Unanswered.† Intellectual Property Technology Law Journal 27, no. 1 (January): 16-18. Davis, Lois. 2010. Long-Term Effects of Law Enforcement’s Post-9/11 Focus on  Counterterrorism and Homeland Security. Santa Monica, CA: RAND Corporation. Goldstein, Mark. 2013. â€Å"Homeland Security: Federal Protective Service Continues to Face Challenges with Contract Guards and Risk Assessments at Federal Facilities: Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate.† United Stat es Government Accountability Office. Web. Hymans, Jacques. 2006. â€Å"Theories of nuclear proliferation: The state of the field.† Nonproliferation Review 13, no. 3 (May): 455-465. Jenkins, Brian, Andrew Liepman, and Henry Willis. 2014. Identifying Enemies among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing. Santa Monica, CA: Rand. Kamien, David. 2006. The McGraw-Hill Homeland Security Handbook. New York, NY: McGraw-Hill. LaPira, Timothy. 2014. â€Å"Lobbying after 9/11: Policy Regime Emergence and Interest Group Mobilization.† The Policy Studies Journal 42, no. 2 (June): 226-251. Lieven, Anatol, and John Hulsman. 2006. Ethical Realism: A Vision for America’s Role  in the World. New York, NY: Pantheon Books. Marion, Nancy, and Kelley Cronin. 2009. â€Å"Law Enforcement Responses to Homeland Security Initiatives: The Case of Ohio.† Southwest Journal of Criminal Justice 6, no. 1 (M ay): 4-24. Maxwell, Bruce. 2004. Homeland Security: A Documentary History. Washington, D.C.: CQ Press, 2004. Mullins, Matt. 2010. Homeland Security. Ann Arbor, MI: Cherry Lake Pub. Murray, Williamson. 2003. National Security Challenges for the 21st Century. Carlisle, PA: Strategic Studies Institute, U.S. Army War College. Nakaya, Andrea. 2005. Homeland Security. Detroit, MI: Greenhaven Press. Nye, Joseph. 2004. Soft Power: The Means to Success in World Politics. New York, NY: Public Affairs. Puyvelde, Damien. (2013) â€Å"Intelligence Accountability and the role of public interest groups in the United States.† Intelligence and National Security 28, no. 2 (May): 139-158. Robinson, Scott, Liu Xinsheng, James Stoutenborough, and Arnold Vedlitz. 2013. â€Å"Explaining Popular Trust in the Department of Homeland Security.† Journal of Public Administration Research Theory 23, no. 3 (June): 713-733. Rogers, Christopher. 2014. â€Å"A Slow March Towards Thought Crime: How Th e Department of Homeland Security’s Fast Program Violates the Fourth Amendment.† American University Law Review 64, no. 1 (December): 335-337. Rychnovska, Dagmar. 2014. â€Å"Securitization and the Power of Threat Framing.†Ã‚  Perspectives: Central European Review of International Affair 22, no. 2 (May): 9-31. Shear, Michael, and Michael Schmidt. 2014. â€Å"Armed Intruder at White House Got to East Room.† The New York Times, September 29. Web. Sparks, Thomas, and Glenn Sulmasy. 2006. International Law Challenges: Homeland Security and Combating Terrorism. Newport, R.I.: Naval War College. Stana, Richard. 2003. Homeland Security Challenges to Implementing the Immigration  Interior Enforcement Strategy. Washington, D.C: U.S. General Accounting Office. Sun, Henry. 2008. â€Å"International Political Marketing: a Case Study of United States Soft Power and Public Diplomacy.† Journal of Public Affairs 8, no. 3 (August): 165-183. Thachuk, Kimberley. 200 7. Transnational Threats: Smuggling and Trafficking in Arms, Drugs, and Human Life. Westport, CT: Praeger. Walker, David. 2007. Homeland Security Management and Programmatic Challenges Facing the Department of Homeland Security: Testimony Before the House Homeland Security Committee. Washington, D.C: U.S. Government Accountability Office. This research paper on The Concept of the Homeland Security After the September 11 Incident was written and submitted by user Jayden E. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.