Saturday, January 25, 2020

Church Burnings :: essays research papers

â€Å"Racism Blamed in Shock Wave of Church Burnings,† read the screaming headline in the New York Daily News. â€Å"The South is Burning: A Rash of Torching at Black Churches Has Resurrected the Ugly Specter of Racism,† chimed in the Toronto Star. Newsweek warned of â€Å"Terror in the Night Down South,† While USA Today reported that â€Å"Arson at Black Churches Echoes Bigotry of Past.†(Fumento 1) In the summer of 1996, the U.S. media widely reported a surge in white racist burnings of black churches in the American South. It all started the Center for Democratic Renewal announced a huge increase in arsons against black churches by whites. Black churches were burning at the rate of one per week, mostly due to arson (Swett 2). The media jumped on the story.   Ã‚  Ã‚  Ã‚  Ã‚  The racial church burnings soon became issues of Politicians. President Bill Clinton was running for re-election and desperately needed the votes of the black communities. Clinton made the discrimination issue a priority. Clinton held a White House summit on the issue and assigned the FBI to investigate. Eventually, he passed a law authorizing 12 million dollars to fight arsons of churches. During a passionate speech President Clinton shared that he had, â€Å"vivid and painful memories of black churches being burned in my own state when I was a child.† Ironically, historians and civil rights activists in Arkansas could find no mention of any church arsons in the state during his childhood. Furthermore, Al Gore was quoted â€Å"For a very large number of the burnings, what you will find ultimately, I predict, is that a common thread of underlying racism is present.†(Elven 2)   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"The church burnings had all the makings of a great story: mystery, race, religion and an eerie echo of the past.†(Heyboer 1). Michael Fumento a journalist for the Wall Street Journal wrote, â€Å"It appears that the public may be finally catching on that the black church burning epidemic of 1996 is actually one of the biggest hoaxes to come along in years.† In fact, independent investigations by several reporters, including those at the Associated press, The New Yorker and USA Today have revealed no plague and little evidence of racism. Michael Kelly, reported that fires at churches both white and black had sharply decreased since 1980, and that the overall number in 1994 was the lowest in fifteen years. Kelly explains the rise in church burnings was impart because of copycat arsons who may have been racist but who also had been inspired by the media attention given to the fires.

Thursday, January 16, 2020

Critical Infrastructure Protection Essay

The mission of the Department of Homeland Security is stop acts of terrorist within the United States, not have the United States be vulnerable to terrorist attacks, and reduce the damage to the United States if there would be a terrorist attack. Since this department inception in 2003, the Department of Homeland Security has a component in place to support its mission and has been a member of the U.S. Intelligence Community. In July of 2005, the DHS was reorganized and called the Second Stage Review or â€Å"2SR†. The former Secretary of DHS, Michael Chertoff, began a strengthened office of Intelligence and Analysis (I&A) and made the Assistant Secretary for Information Analysis the Chief Executive Officer for that department. He also tasked I&A with ensuring that intelligence is coordinated, fused, and analyzed within the Department to provide a common operational picture; provide a primary connection between DHS and the IC as a whole; and to act as a primary source of infor mation for state, local and private sector partners. The Homeland Security Act of 2002, assigned the original DHS intelligence component—the Directorate of Information Analysis and Infrastructure Protection—with responsibility to receive, analyze, and integrate law enforcement and intelligence information in order to— â€Å"(A) identify and assess the nature and scope of terrorist threats to the homeland; (B) detect and identify threats of terrorism against the United States; and (C) understand such threats in light of actual and potential vulnerabilities of the homeland.† Congress also made information sharing a top priority of the new DHS intelligence organization, requiring it â€Å"to disseminate, as appropriate, information analyzed by the Department within the Department, to other agencies of the Federal government with responsibilities related to homeland security, and to agencies of State and local government and private sector entities, with such responsibilities in  order to assist in the deterr ence, prevention, preemption of, or response to, terrorist attacks against the United States (Randol, 2010)†. A critical infrastructure is defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and way of life. In short, critical infrastructure is by definition essential for the survival of the nation. The US Patriot Act defines it as â€Å"systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.† FEMA defines critical infrastructure as â€Å"personnel, physical assets, and communication (cyber) systems that must be intact and operational 24x7x365 in order to ensure survivability, continuity of operations, and mission success, or in other words, the essential people, equipment, and systems needed to deter or mitigate the catastrophic results of disasters.† Critical Infrastructure Protection (CIP) consists of all proactive activities to protect indispensable people, physical assets, and systems (especially communications or cyber systems) which are guided by a systematic and reliable decision making process which assists leaders to determine exactly what needs protection, where, and how. It is proactive in the same sense that mitigation in emergency management is proactive and goes beyond normal security, defensive postures. The basic steps of CIP consist of: identifying the critical infrastructures, determining the threats against those infrastructures, analyzing the vulnerabilities of threatened infrastructures, assessing the risks of degradation or loss of a critical infrastructure, and applying countermeasures where risk is unacceptable (â€Å"The Safety†, 2014). Within the Department of Defense, a streamlined command and control structure and growth of the cyber force in size and skills, including offensive capabilities, are required to effectively operate as well as to provide some deterrent to attack. Meanwhile, legal code for cybersecurity has not kept pace with technological developments. Comprehensive cybersecurity legislation is required—beginning with mandatory participation of critical infrastructure owners and operators in federal information-sharing programs in a way that incorporates appropriate safeguards for industry liability and citizen privacy—in order to completely  bridge the current public-private division of responsibilities for collective defense. Cybersecurity has grown to be a key issue for the administration and indeed for the nation in the last several years even though concern for the integrity of Critical Infrastructure (CI) functions was evident in the 1990s. For CI, which includes a range of sensitive data and performs valuable functions that support the health, safety, and economic vitality of our modern nation, the growth of networked connections in cyberspace has meant the introduction of new threat vectors to systems that were not des igned to securely connect to today’s Internet. Because improving the cybersecurity of CI encompasses such a large body of work, widely distributed across government and private sector entities, unity of effort is difficult to achieve. President Obama admits that â€Å"when it comes to cybersecurity, federal agencies have overlapping missions and don’t coordinate and communicate nearly as well as they should – with each other or with the private sector (La Bash and Landis, 2013)† The vulnerabilities that should concern IS professionals who protect the U.S.’s critical infrastructure is not having a system that would advise them of current, present, and future vulnerabilities. A system of this would be able to advise you of early indicators of vulnerability In order to accomplish this task, a survey of all operations should be undertaken. The survey should include: General Administrative Information, Management Awareness and Control Programs, Identification of Hazards/Potential rises; and Business Characterization. The ultimate benefits to be gained from this type of survey are in terms of identifying areas in need of attention, establishing a list of potential crisis situations, determining what commitments your organization is comfortable with and documenting current efforts. Once the survey program has been developed and implemented, it must be evaluated and kept up-to-date. This can be accomplished by reviewing actual responses and by conducting a detailed audit of each element of the business. The survey program is the initial step, toward reducing vulnerability. Next, you must organize the operation. The management chain is critical to this process. You must ensure that all levels of management become part of the program. (Sikich, 1998). Make a senior manager directly responsible to top management and the board of directors. The formal assignment of a senior manager to the position of â€Å"Crisis Management Programs, Director,† or some other appropriate title, can accomplish the initial portion of this item. Set aside specific time for reports on crisis management preparedness issues. This can be accomplished by preparing an agenda for senior staff and board of director meetings that includes a discussion of crisis management preparedness as a mandatory item. You have to give it more than lip service though. Also, you must make the discussion substantive. Provide more than the dull and tiring statistics on reportable accidents, etc. Communicate compliance through all levels of the organization through company policy and procedures. This can be accomplished through formal adoption of policy at the highest levels of the company. The Protecting Cyberspace as a National Asset Act, was introduced last June by Sen. Joseph Lieberman (I-Conn.) and revised in December by the Senate Committee on Homeland Security and Governmental Affairs. It calls for the formation of a National Center for Cybersecurity and Communications (NCCC) within the U.S. Department of Homeland Security (DHS) that would be responsible for protecting both federal computer networks and critical infrastructure owned by the private sector against cyber attacks. Although the White House already has broad wartime powers, making aspects of the proposed act redundant, opposition to the bill has centered on its provision to give the federal government the authority to define what is meant by â€Å"critical infrastructure.† According to the bill the government can â€Å"take measures to protect any computer system whose destruction or disruption of reliable operation would cause national or regional catastrophic effects.† This could include cutting off the system from the Internet. Owners of facilities labeled as critical infrastructure would be notified as soon as this designation is made. An owner could appeal this designation but, as the bill is currently written, the government would make the final decision to disconnect, which is not subject to judicial review (Greenemeier, 2011). References Greenemeier, L. (2011). What is the Best Way to Protect U.S. Critical Infrastructure from a Cyber Attack? Retrieved from http://www.scientificamerican.com La Bash, M. and Landis, C. (2013, August). Legal, Policy, and Organizational Impedients to the Protection of Critical Infrastructure from Cyber Threats. Retrieved from http://www.cmu.edu/mits/files/mits2-paths.com Randol, M. (2010, March). The Department of Homeland Security Intelligence Enterprise: Oper- Rational Overview and Oversight Challenges for Congress. Retrieved from http://fas.org/sgp/crs/homesec/R40602.pdf Sikich, G. (1998). Critical InfrastructureVulnerability. Retrieved from http://www.disaster-resource.com The Safety and Security of Critical Infrastructure. (2014, January). Retrieved from http://www.drtomoconnor.com/3430/3430lecto1a.htm

Wednesday, January 8, 2020

The Uniform Crime Reporting System - 1623 Words

The Uniform Crime Reporting System (UCR) is a voluntary city, university and college, county, state, tribal, and federal law enforcement program that provides a nationwide view of crime based on the submission of statistics by law enforcement agencies throughout the country (â€Å"UCR, 2013). The UCR crime statistics are used in many ways and serve many purposes. It provides resources for different audiences such as businesses, intelligence partners, law enforcement, communities, crime victims, parents , researchers and students. Individual agencies used the reports to analyze data related to their location for accuracy. The program offers advantages for the public and various agencies but if not appropriately studied it may lead to inaccurate forecasting and adverse effects. The crime statistics available varies from specific offenses within categories of violent crimes, property crimes, hate crimes, etc. Burglary is a specific property crime that will be analyzed using the UCR rep orts. The UCR site offers an array of useful information in regards to criminal statistics compiled by the Federal Bureau of Investigation (FBI). Individual agencies classify information that is pertinent to their research through the publications, resources, program updates and data collected. Through the publications on this site, agencies can classify by offenses, region, state, and local agency. Some of the data that can be obtained are related to offenses for violent crime and property crime,Show MoreRelatedPredicting Crime With The Uniform Crime Reporting System1518 Words   |  7 Pages Predicting Crime with the Uniform Crime Reporting System Published: 28, March 2016 The Uniform Crime Reporting (UCR) Program has been the beginning spot for law implementation administrators, understudies of criminal equity, analysts, individuals from the media, and general society everywhere looking for data on wrongdoing in the country. The system was considered in 1929 by the International Association of Chiefs of Police to address the issue for solid uniform wrongdoing insights for the countryRead MoreThe Uniform Crime Reporting System Essay1525 Words   |  7 PagesAccording to O’Brien (1985) The Uniform Crime Reporting system (UCR) was developed in the 1920’s in order to create a system that would report crime uniformly across the many different jurisdictions in the United States. For the purpose of this paper I am going to discuss the debate between the relationships of the overrepresentation of minorities in crime statics and if the results are biased based on race. There is a debate regarding the accuracy of the statistics provided by offic ial data resourcesRead MoreThe Flawed System Of The Uniform Crime Reporting Program882 Words   |  4 PagesThe two flawed systems that are in use for collecting crime statistics in the United States are, Uniform Crime Reporting Program (UCR), and the National Incident-Based Reporting System (NIBRS). These programs were developed by the Federal Bureau of Investigations to collect crime data from around the United States. Both systems are outdated and need to be updated. Although these programs may be flawed, they are still used to collect very important data that is collected to write new policies thatRead MoreThe Uniform Crime Reports The National Incident Based Reporting System978 Words   |  4 PagesThe Uniform Crime Reports verses The National Incident Based Reporting System The purpose of this abstract is to critically review the primary data sources used in the criminological research. The two key factors that measures crime are distinguished: official crime statistics, which are based on the compile data records of offenders and offenses processed by the police, courts, and corrections agencies; and unofficial crime statistics, which are produced by people and agencies outside the criminalRead MoreThe Uniform Crime Report And The National Incident Based Reporting System2077 Words   |  9 Pagesorting System fall under the Uniform Crime Reporting Program that provides information on crime all of the United States. This includes regions, states, counties, cities, towns, tribal law enforcement, colleges and universities. In this paper we will compare and contrast the two primary crime data sources used within the United States, the Uniform Crime Report and the National Incident-Based Reporting System. Before we do this, we will discuss each source ind ividually and how it is used in CriminologicalRead Morepredicting crime with the unifrom crime reporting system Essay1427 Words   |  6 PagesPREDICTING CRIME WITH THE UNIFORM CRIME REPORTING SYSTEM Predicting Crime With the Uniform Crime Reporting System Mitchell Adair Introduction to Criminal Justice: CJA 105-AUO A01 Argosy University 1 The Uniform Crime Reporting System is a statistical effort that is said to be cooperative of more than ten thousand state, city, and county law enforcement agencies on a basis that is considered Read MoreMeasuring Crime Essay914 Words   |  4 Pages Measuring Crime Crime measurement and statistics for police departments are very important when it comes to money allotment, staffing needs or termination and it is also used to determine the effectiveness of new laws and programs. There are three tools used to measure major crime in the United States: Uniform Crime Reports, National Crime Victimization Survey and the National Incident Based Reporting System- which is currently being tested to replace the Uniform Crime Reports. AlthoughRead MoreMeasuring Crime1070 Words   |  5 PagesMeasuring Crime in the United States Kyra Pettit CJA/204 August 5, 2013 Dr. Wafeeq Sabir Measuring Crime in the United States In the following paper, these criminal justice students will address the three major points of crime measurement in the United States. Even though there may be changes of crime statistics, but not changes in the crime rate; that is because crime can be measured in numerous ways. Two measuring systems being the National Crime Victimization Survey (NCVS) and Uniform CrimeRead MoreFBI Uniform Crime Report1064 Words   |  5 Pagesï » ¿ Uniform Crime Reporting Gabriel Padua CJA/314 January 20, 2015 Paulina Solis Uniform Crime Report Ever wonder how crimes are measured? What is FBI Uniform Crime Report data? How these Crime Statistics are produce? And how is burglary define? FBI Uniform Crime Reporting Data The Uniform Crime Reporting (UCR) Program is one of the two ways crime rates are measured in the United States. The Uniform Crime Reports (n.d.) website, UCR is the starting place for law enforcement executives, criminalRead MoreThe Sources Of Criminal Statistics872 Words   |  4 PagesThe Sources of Criminal Statistics The two flawed systems that are in use for collecting crime statistics in the United States are, Uniform Crime Reporting Program (UCR), and the National Incident-Based Reporting System (NIBRS). These programs were developed by the Federal Bureau of Investigations to collect crime data from around the United States. Both systems are outdated and need to be updated. Although these programs may be flawed, they are still used to collect very important data that are