National Security Strategy

National Security Strategy

Based on the National  Security Strategy for 2017, a number of strategic methods to combat terrorism should be implemented. First would be the improvement of the protection of virtual information by having companies that operate on U.S soil do reasonable check ups on their users to report any suspicious information (Whincop, et al.,2018). We currently live in a digital age where theft or mishandling of state information can be devastating for any country. It is therefore important that virtual methods of protecting data are used. Such methods include use of fire walls and encryption codes.

The state of The Department of Homeland Security in terms of operational strategy to combat terrorism should also improve. The department is tasked with the mandate of combating terrorist attacks on US soil (van Oorschot,2018). It was formed after the September 11th attack on the twin towers. Their services have been slowed down by several issues including police corruption and a breakdown in communication when working with other agencies. Some of the major changes that would improve on law enforcement through the department include shift to modern policing techniques such as incorporating the use of better devices for security checks, investing more resources to prepare for terrorist attacks, increasing liaison between state and federal law enforcement units and gathering intelligence from the most unlikely sources to ward off possible threats. Other changes include the creation of more counter terrorism divisions and reassignment of officers from other divisions such as drug enforcement. Legal considerations that have evolved for law enforcement include refining the police training to be better equipped in dealing with terrorism and other related threats.

The Department of Homeland Security works hand in hand with several other organizations although unsuccessfully at times due to bureaucratic frameworks and conflict of laws (Gao, et al.,2018). Conflict of laws refers to a specific part of law that is taught to students of the profession about a private conflict that includes a foreign element. In this case, it becomes a conflicting point of law between local law and foreign ones.

The strategies to reduce on conflict of laws in international contracts include legislative measures that are in harmony with international law in the first place. This also involves inter-parliamentary effort for cohesive legislation (Whincop, et al, 2018). This will counter the effects of conflict of laws in international contracts and also ensure smooth flow of legal issues in the said country. A reduction in conflict of laws will also help reduce loopholes that people can exploit for illegal motives. Conflict of laws can also be reduced by forming regional blocks of agreements on legal matters by various states. Such agreements also make work easier for members of the judicial system because they do not present a clash of interest for the opposing legal teams.Other strategies include constitutional amendments by the state to accommodate different international laws that can effectively assist with internal legal issues in the event that they involve a foreigner.

These varying  interests therefore create clashing opinions legally and otherwise and result in a stalemate (Born & Rutledge,2018). It is therefore important to untangle such differences in law before an incident that is related to terrorism breaks out and there a jurisdictional hurdles to jump.The effectiveness of the authorities involved in counter terrorism and how they collaboratively work is another vital factor that can aid the fight against terrorism. It is also quite true to conclude that a defensive strategy is better than a reformative one after an act of terrorism.

 

 

 

 

 

 

References

Born, G. B., & Rutledge, P. B. (2018). International civil litigation in United States courts . WoltersKluwer Law & Business.

Gao, J., Ping, Q., & Wang, J. (2018). Resisting re-identification mining on social graph data. World Wide Web, 1-13.

van Oorschot, P.C., (2018). Internet of Things Security: Is Anything New?. IEEE Security &Privacy.

Whincop, M. J., Keyes, M., & Posner, R. A. (2018). Policy and Pragmatism in the Conflict of Laws. Routledge.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"