Recent orders

Three Articles Review

Articles Review

Name of the Student

Name of the Institution

Introduction

This paper presents a critical review of three articles scheduled to be studied in class. Personal opinion is given on whether the content of each article is confusing, gripping, thought-provoking, resonant, commendable, laughable or frustrating.

Review

Bai, H. (2009). Reanimating the universe: Environmental education and philosophical animism.

In M. McKenzie, P. Hart, H. Bai, & B. Jickling (Eds.), Fields of green: Restoring culture, environment, and education (pp. 135–151). Cresskill, NJ: Hampton Press

In the above article, Bai (2009) takes a philosophical approach to sensitize the readers that they should avoid destroying ecosystem and be actively involved in protecting it from destruction. There are several notable aspects of the content of the article. Firstly, the author uses a gripping introduction, through comparing their inability to feel pain in the destruction of the ecosystem with ‘psychic numbing’ (Bai, 2009, p. 135). The concept is commonly used to describe people who do not feel pain when killing fellow human beings. The readers become eager to know how destruction of the ecosystem can be equated to killing of human beings. A notable laughable comment in the article is that “the soul enters through the soles,” (Bai, 2009, p. 150). The author elaborates the phrase by claiming that one can grow spiritually and develop passion for ecosystem through walking. In his elaboration, the author states that early philosophers had passion for preservation of ecosystem because they developed it through walking. Also, the author makes a thought-provoking comment that “extinction rate for elements of ecosystem has increased to at least 1,000 species per year” (Bai, 2009, p. 149).

However, the author confuses the reader through noting the immense positive impact of Plato and Descartes on western civilization and ultimately pointing out his influence in de-animation of humans. Bai (2009) argues that Descartes and Plato contributed immensely in enhancing civilized thinking in western nations. However, their influence led to ‘de-animation’ of human consciousness. Precisely, Bai (2009) argues that due to the influence of the two fathers of philosophy, people are no-longer sensitive of the ecosystem, and that is why they destroy it without feeling any pain. Despite this, the article is commendable because it deeply persuades the readers and challenges them to actively engage in preservation of the ecosystem. The content of the article is highly influential and it manages to reverse the status of mind of people so that they can view and appreciate the intrinsic worth of the world and thus, avoid engaging in further destruction of ecosystem.

Claxton, G. (1997). The speed of thought. In Hair brain, tortoise mind: How intelligence

increases when you think less (pp. 1–14). New York, NY: The Ecco Press

Claxton (1997), in the above article, argues that it is a good idea to rest, rather than working full time in search of new information and solutions. The article has a gripping introduction to the key issue discussed in it. The author uses the saying “the turtle buries its thoughts, like its eggs, in the sand, and allows the Sun to hatch the little ones” (Claxton, 1997, p. 1). The article becomes thought-provoking when the author elaborates the meaning of the saying and how it relates to the topic contained in the article. In the elaboration, the author states stronger and faster mind processes are not always the best ways of achieving natural intelligence. Claxton (1997) makes a provoking claim that the human mind is endowed with a certain kind of natural intelligence that is accessible when individual’s mind is not busy. Also, the author makes a surprising claim by stating that people in the Euro-American culture have neglected natural endowments through relentlessly searching for new information and solutions without giving their minds adequate time to rest. As a result, they miss the natural endowment or intelligence that the mind acquires when resting.

However, the article is a bit frustrating to the reader since the author wanders a lot before striking the key point. In fact, the author states the purposes of the article at the end. Despite this, the extensive elaboration about how the mind works enhances the resonance of the key message given by the author. The article is commendable because its content is fascinating and quite challenging to the reader. This is due to the fact that many people usually think that faster and stronger thinking is the only way of acquiring intelligence. The article enables the reader to understand that although people acquire various forms of intelligence through rushing and thinking strongly, some forms of intelligence can only be acquired when the mind is slow in speed or when it is at rest. Thus, the article drives the key point home that people should give their minds enough time to process different types of activities and take enough rest.

Zajonc, A. (2006). Love and Knowledge: Recovering the Heart of L earning through

Contemplation. Teachers College Record, 108(9), 1742–1759

In the above article, Zajonc (2006) explains the importance of contemplative learning in class. The gripping section of the article is the abstract, which gives a brief introduction and summary of the article. In the abstract, Zajonc (2006) notes that teachers in American higher education institutions are increasingly integrating contemplative learning approach with other pedagogical strategies. The author further states that, however, the use of contemplative learning approach is still limited. The author provokes the reader though pointing out that contemplative learning can be enhanced through adopting teaching methods that can enhance “contemplative, ethical, affective and reflective capacities of students” (Zajonc, 2006, p. 1742). The reader becomes eager to know the methods that can enhance contemplative learning.

However, the content of the summary may seem to be frustrating to most readers since it focuses on a topic that seems to be very common and obvious. The concept of ‘contemplating learning’ seems to be attractive to teachers and learners only. From the heading and the introduction, the author seems like he intended to focus on contemplative learning only. Despite this, the author extends the purpose of study to other concepts. While the topic of study is contemplating learning, the author notes that teachers should combine “conventional learning with experiential, transformative, and reflective pedagogy” (Zajonc, 2006, p. 1742). Adding other concepts may confuse the reader, even though the concepts may be related to the concept of contemplative learning.

The reader may also be confused by the concept of ‘epidemiology of love’ since the author takes an extensive approach to explain it, rather than giving a specific meaning. Despite the aforementioned issues, the content of the article becomes more interesting as the reader reads the practical implications of contemplative learning in the article. The article is commendable since the author uses a practical approach to reiterate the importance of using contemplating learning, in addition to the conventional pedagogical approaches.

References

Bai, H. (2009). Reanimating the universe: Environmental education and philosophical animism.

In M. McKenzie, P. Hart, H. Bai, & B. Jickling (Eds.), Fields of green: Restoring culture, environment, and education (pp. 135–151). Cresskill, NJ: Hampton Press

Claxton, G. (1997). The speed of thought. In Hair brain, tortoise mind: How intelligence

increases when you think less (pp. 1–14). New York, NY: The Ecco Press

Zajonc, A. (2006). Love and Knowledge: Recovering the Heart of L earning through

Contemplation. Teachers College Record, 108(9), 1742–1759

Threats to Management Information Systems

Management Information Systems

Name

Affiliation Introduction

As use web and related information transfers advances and systems has ended up pervasive ,utilization of these systems now makes another weakness for associations or organizations .These systems can be invaded or subverted various routes .accordingly ,associations or organizations will confronted threats that influence and helpless against data system security . Threats to data system can originate from a mixed bag of spots inside and outer to an associations or organizations .to secure system and data, every organization or association ought to break down the sorts of threats that will be confronted and how the threats influence data system security (Chaffey & White, 2010). Examples of threats such as unauthorized access (hacker and cracker) ,computer viruses ,theft ,sabotage ,vandalism and accidents .

Unauthorized Access

One of the most recognized security chances in connection to automated data systems is the risk of unapproved access to private information (Chaffey & White, 2010).The principle concern originates from undesirable gatecrashers, or software, who utilize the most recent innovation and their aptitudes to break into probably secure PCs or to impair them .An individual who obtains entrance to data system for malignant reason is regularly termed of saltine as opposed to a software. Software endeavoring to shroud their actual personality frequently parody, or distort themselves by utilizing fake email addresses or taking on the appearance of another person (Chen, Mocker, Preston & Teubner, 2010).

Computer Viruses

Computer virus is a kind of nasty software composed intentionally to enter a PC without the client’s authorization or learning ,with a capacity to copy itself ,subsequently keeping on spreading (Chen, Mocker, Preston & Teubner, 2010).Some threats do little yet copy others can bring about extreme mischief or unfavorably influence system and execution of the system .Virus project may in any case cause accidents and information misfortune .In numerous cases ,the harms created by PC threat may be inadvertent ,emerging only as the aftereffect of poor programming .Type of threats ,for instance ,worms and Trojan steeds .

Theft

The loss of important hardware, software or information can have noteworthy consequences for an association’s adequacy .Theft can be separated into three fundamental classifications: physical burglary, information robbery, and fraud (Chen, Mocker, Preston & Teubner, 2010).

A variety of threat that is focused at systems ,exploit security gaps in working systems and other programming to duplicate perpetually over the Internet ,consequently bringing about servers to crash ,which refuses assistance to Internet clients .Worms can devastate information and projects and in addition upset or even end the operation of PC systems.

Industrial Sabotage

Industrial sabotage is considered ordinarily done by a disappointed representative who wishes to exact some type of requital upon their boss .The rationale bomb, is a ruinous PC program that enacts at a certain or in response to a particular occasion, which is a no doubt understood illustration of haw a worker may bring about purposeful harm to the association’s data systems (Laudon & Laudon, J, 2010).

Vandalism

Deliberate damage cause to hardware, software and information is viewed as a genuine danger to data system security .The risk from vandalism lies in the way that the association is incidentally prevented access to somebody from securing its assets (Laudon & Laudon, J, 2010).Even moderately minor harm to parts of a system can have a huge impact on the association all in all.

Protective Measures that Companies and Customers can take

Restricted that clients can take defensive measures is by having a firewall to keep any data on their PCs from being taken away. A firewall is a piece of a PC system or system that is intended to square unapproved access while permitting approved access based upon an arrangement of guidelines and other criteria.

Firewalls can be introduced in either equipment or programming, or a mix of both. Firewalls are much of the time used to keep unapproved Internet clients from getting to private systems associated with the Internet, additionally it screens the web activity that is coming in and out. This is a viable manifestation of security that a client of Gaming Direct can take to keep any threats on the grounds that anything that is undesirable will be identified by the firewall, so for case a software will think that it difficult to go into one of Gaming Direct client’s PC in light of the fact that they can be effectively distinguished (Melville, 2010).

Another way that clients can help to keep any crucial data being presented to undesirable individuals is by having threat security. An threat security is programming that can identify and take out known threats after the PC downloads or runs sites (Melville, 2010). There are two normal systems that against threat uses to distinguish threats. The main strategy for threat location is by utilizing a rundown of threat mark (like a character to every threat) and afterward taking a gander at the substance of the PC’s memory (its RAM) and the documents put away on the hard commute or a medium and after that the opposition to threat begins to look at those records against a database of known threat marks (that is the reason it takes a considerable amount of time for the threat scanner to wrap up). The issue with this discovery strategy is that clients are just shielded from threats that originate before their last threat definition overhaul, so an out – of – date threat programming won’t distinguish new threats.

This technique is utilized for value-based sites that just permit Mastercards and charge cards. It was made by Visa to enhance the security of Internet installments and offered to value-based sites, for example, Gaming Direct and is called “Confirmed by Visa”. This has likewise been tackled via MasterCard and is called “MasterCard SecureCode (Melville, 2010). This is a viable manifestation of security for client points of interest in light of the fact that Gaming Direct are adding more security to their site, diminishing the danger of anything destructive event to their site and considers the site to twofold scout the exchanges that are occurring on it. It likewise permits clients to feel safe utilizing gaming Direct. A security measure that is taken by Gaming Direct is that they won’t take installment for anything until it has been dispatched. They will take an Authorization.

Part 2: Biometric Authentication

Biometric authentication

Biometric authentication is fundamentally a system to distinguish an individual’s extraordinary attributes and highlights. There are two arrangements of biometric validation; behavioral and physical biometrics (Melville, 2010). Behavioral biometric can be utilized for check while physical biometric is utilized for authentication and recognizable proof. Recognizable proof is fundamentally a methodology to focus an individual taking into account coordinating with database that contains recorded attributes of diverse individuals. Then again, check is the methodology of figuring out if the individual is precisely who they say they said, contrasted with distinguishing proof authentication obliges less handling power and time.

Biometric authentication systems contrast the current biometric information catch with put away, affirmed valid information in a database. In the event that both specimens of the biometric information match, authentication is affirmed and access is conceded. The procedure is some of the time piece of a multifaceted authentication system. Case in point, a cell phone client may sign on with his own distinguishing proof number (PIN) and afterward give an iris sweep to finish the authentication process (Sousa, & Oz, 2014). The most established known utilization of biometric check is fingerprinting. Thumbprints made on dirt seals were utilized as a method for interesting distinguishing proof as far back as old China. Advanced biometric authentication has gotten to be very nearly immediate, and is progressively precise with the coming of automated databases and the digitization of simple information.

Biometric authentication is viewed as a subset of biometric verification. The biometric advancements included are in view of the routes in which people can be remarkably distinguished through one or all the more recognizing organic attributes, for example, fingerprints, hand geometry, ear cartilage geometry, retina and iris examples, voice waves, keystroke progress, DNA and marks (Sousa, & Oz, 2014). Biometric validation is the utilization of that authentication of way of life as a major aspect of a procedure accepting a client for access to a system. Biometric advancements are utilized to secure a wide scope of electronic correspondences, including venture security, online business and managing an account – even simply logging into a PC or cell phone.

The Biometric Advantage

Obviously, one-time watchword tokens can be lost and additionally possibly hacked, so depending on “something they have” is not generally a secure methodology.

Rather, a much more secure two-element system can be in light of “something they are” – that is, biometric data got from quantifiable natural or behavioral attributes (Sousa, & Oz, 2014).

Basic natural attributes utilized for big business authentication are fingerprints, palm or finger vein designs, iris highlights, and voice or face designs. These last three include no physical contact with a biometric sensor, which makes them less meddlesome to utilize.

Behavioral qualities, for example, keystroke progress – a measure of the way that a client sorts, examining highlights, for example, writing pace and the measure of time they “abide” on a given key – can likewise be utilized to verify a client.

The greatest development territory is the arrangement of systems that make utilization of a cell phone as a convenient biometric sensor, as indicated by Ant Allan, an exploration VP at Gartner. “There is a blast in the decision of authentication routines open to associations, and we are surely seeing a movement towards biometric systems that exploit sensors in cell phones – the cam, for face or iris acknowledgment, the receiver for voice acknowledgment, and the console for writing beat (Sousa, & Oz, 2014)

The preferences of this cell phone based methodology are that it is not important to buy any extraordinary biometric equipment, in light of the fact that clients are liable to have their telephone with them whenever they have to sign on to a system, and the telephone’s cell or Wi-Fi network can be utilized to transmit biometric data to a back-end validation system.

The principle advantage of utilizing a biometric authentication figure rather than a physical token is that biometrics can’t undoubtedly be lost, stolen, hacked, copied, or imparted. They are likewise impervious to social building assaults – and since clients are obliged to be available to utilize a biometric component, it can likewise keep exploitative representatives from revoking obligation regarding their activities by guaranteeing a fraud had signed on utilizing their authentication accreditations when they were not display (Spears & Barki, 2010). “Biometric systems can be substantially more advantageous than tokens and different systems, and are valuable to enlarge existing security systems like passwords. For included security they are likewise once in a while utilized as a third element,” he included.

Drawbacks

The principle downside of any biometric system is that it can never be 100 percent exact. To utilize a biometric system, it is first important for every client to select by giving one or more examples of the biometric being referred to, (for example, a unique mark) which is utilized to make a “layout” of that biometric. At the point when a client endeavors to validate, the biometric they furnish is then contrasted and their put away format (Spears & Barki, 2010). The system then surveys whether the specimen is sufficiently comparative to the layout to be judged to be a match.

A measure of a system’s precision is usually given by two measurements: False Non Match Rate (FNMR) and False Match Rate (FMR). The previous measures how frequently a biometric is not coordinated to the layout when it ought to be, while the recent measures how regularly a false biometric is coordinated (and authentication is permitted) when it shouldn’t be. Most biometric systems can be “tuned” to diminish one of these two estimations, more often than not to the detriment of the other (Spears & Barki, 2010). “It’s essential to comprehend that when a client supplies a secret key or a number from an OTP (one time watchword) token, it is either right or it isn’t.

Conclusion

Threats is circumstances that may intentionally or coincidentally abuse vulnerabilities bringing on data system security episodes .Cannot deny that, everybody of people, associations or organizations are debilitated and possibly powerless against the threats .In the nutshell, mindfulness and controls are the best barrier .Through mindfulness and controls, we can ensure individual and participate data while keeping up the advantages of data.

References

Chaffey, D., & White, G. (2010). Business information management: improving performance using information systems. Pearson Education.

Chen, D. Q., Mocker, M., Preston, D. S., & Teubner, A. (2010). Information systems strategy: reconceptualization, measurement, and implications. MIS quarterly, 34(2), 233-259.

Laudon, K., & Laudon, J. (2010). Management Information Systems: International Edition, 11.

Melville, N. P. (2010). Information systems innovation for environmental sustainability. MIS quarterly, 34(1), 1-21.

Sousa, K., & Oz, E. (2014). Management information systems. Cengage Learning.

Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management. MIS quarterly, 34(3), 503-522.

Threats To Homeland Security Immigration Laws In Combating CBRN Terrorism

Threats To Homeland Security: Immigration Laws In Combating CBRN Terrorism

Contents

TOC o “1-3” h z u HYPERLINK l “_Toc380294531” Introduction PAGEREF _Toc380294531 h 1

HYPERLINK l “_Toc380294532” Loopholes in the immigration policies PAGEREF _Toc380294532 h 5

HYPERLINK l “_Toc380294533” The flaw of focusing on ethnic groups in immigration reforms combating CBRN threats PAGEREF _Toc380294533 h 7

HYPERLINK l “_Toc380294534” Recommendation and conclusion PAGEREF _Toc380294534 h 8

IntroductionThe importance of security of a country can never be gainsaid as far as its wellbeing is concerned. In fact, security has been recognized as one of the most crucial and fundamental pillars to the growth, development and sustainability of a country. This is especially considering its bearing on the capacity or ability of an individual to undertake economic activities as it tends to guarantee the enjoyment of other fundamental human rights. Needless to say, it would be impossible for individuals to engage in any activity, economic or otherwise unless they are guaranteed of a certain level of security. This explains why many governments have been spending an enormous amount of their budgets in averting threats to their national securities both inside and outside their borders. It goes without saying, however, that the threats of terrorism have increased in the 21st century. This has especially been enhanced by the advanced technology, which has not only enhanced the lethal nature of the weaponry but also complicated or hampered the capacity of security organs to combat such insecurity. These have taken the form of chemical, biological, radiological and nuclear threats. The increased threats of Chemical, Biological, Radiological and Nuclear weapons triggered the United States into forming Homeland Security, charged with the responsibility of securing the United States from the numerous security threats that it faces. Its vision is stated as ensuring that the homeland is safe, secure, as well as resilient against any acts of terror or any hazards. In attains this vision through the prevention of terrorism and improving security, enforcement and administering of the immigration laws, securing and management of the borders, as well as securing and safeguarding cyberspace, alongside ensuring resilience to terrorism and other disasters.

Scholars note that the United States currently does not have a comprehensive or all-inclusive strategy for countering terrorism threats that involve nuclear, radiological, chemical, and especially biological weapons. As much as local, federal and state governments may have undertaken impressive strides in preparation for terrorism that involves these weapons, the sum of parts remains significantly larger than the whole. The United States is at crossroads on strategies that could comprehensively or ultimately eliminate the threats posed by terrorism.

Nevertheless, Homeland Security, while concentrating on the entirety of the CBRN threat, has paid close attention to the issue of immigration. As its mission states, Homeland Security aims at administering and enforcing immigration laws. The department has concentrated on effective and smart enforcement of the United States laws pertaining to immigration while facilitating, as well as streamlining the legal immigration process. It has taken measures that reform the enforcement of immigration, while placing its priority on the identification, as well as removal of criminal illegal immigrants who threaten public safety.

The question of illegal immigrants has been a contentious one since time immemorial. It is known to be an emotive issue even during political campaigns with different political factions calling for different measures pertaining to immigrants. Questions emerge as to the connection between immigration (especially illegal immigrants) and terrorism.

While there is no obvious or explicit link between the two, security experts are quick to point out that in the September 11 bombings, the 19 terrorists involves were foreign citizens. It is worth noting that while 13 of them may have gotten into the United States as students, tourists or business travelers, no data could be traced accounting for the entry of the rest. This is also connected to the fact that the perpetrators of other terrorist attacks were from abroad, most of whom may have entered the United States through legal means. For example, Ramzi Yousef who masterminded the first bombing of the World Trade Center in 1993, Sheik Omar Abdel- Rahman who was convicted for plotting acts of terror in New York in 1995 and Amal Kasi, the individual who, in 1993, murdered two employees of the Central Intelligence Agency. Scholars note that, as much as it is essential that illegal immigrants (more so Muslim immigrants) are not used as scapegoats, it is imperative that policy makers acknowledge that the current threats of terrorism in the United States emanate, almost exclusively people who come from abroad. In essence, the immigration policy including border control, permanent and temporary visas issuance, as well as efforts that will deal aliens or illegal immigration are crucial in alleviating or lowering the likelihood of an attack in the future.

In addition, scholars have attempted to show how terrorists use almost every possible means to get into the United States including acquisition of legitimate visas and passports for entry or even stowing away illegally on gas tankers. Apart from seeking to to link immigration to terrorism, scholars focus on political refuges and asylum seekers as potential terrorists. They note that the political asylum comes as an appropriate route through which terrorists enter the United States. It is worth noting that the asylum keeps such individuals from being deported quickly, in which case they are presented with an opportunity to traverse the country. On the same note, a large percentage of asylum decisions are not founded on hard evidence, rather they are based on the words or the statements that applicants make. In essence, terrorists find it easy as they can make fraudulent claims and get into the United States.

In a detailed study that examined 212 known terrorists who had been killed or arrested in Europe and North America, Martin and Martin (2004) noted that all of them were visitors or 1st or 2nd generation immigrants. They hold the opinion that terrorists take advantage of the generous immigration policies in the West in order to infiltrate the United States so as to carry out the recruitment of new members, establish facilities that will promote their cause, as well as form sleeper cells in readiness for terrorist attacks.

While terrorism experts note that most illegal aliens have gainful employment in the United States, pat taxes and even have established roots and families in the society, they note that the current upsurge of illegal aliens and individuals who overstay their visas has increased the difficulty for the interior and border enforcement agencies in focusing or organized criminals, terrorists and violent felons. This is because such individuals make use of the anonymity that came with the current chaotic situation. On the same note, such individuals are seen to be fundamentally crucial in ferrying weapons as they are extremely difficult to track and net using the current laws. This underlines the importance of reexamining the immigration aspect in combating terrorism especially involving CBNR threats.

Loopholes in the immigration policiesIn examining the link between immigration reform and the proliferation of the CNBR terrorism, scholars have examined the challenges in the immigration policy that leave loopholes exploited by terrorists in gaining entry into the United States. This reexamination is carried out using the case of the 9/11 attacks, noting that the same strategies could be used by future terrorists. First, it is noteworthy that when the 9/11 hijackers entered into the United States, they presented travel documents to the immigration officers at the port of entry. As much as their names and details were checked against the computerized systems, they had easy time obtaining the visas at the United States consulates, as well as pass through the inspection at the entry points. In this regard, it is apparent that intelligence pertaining to at least two of the hijackers was not shared between the consulates and the immigration authorities until these criminals had entered into the country. Secondly, tightening the procedures that are used in screening individuals entering in the United States using legal means would not necessarily have averted the possibility of these criminals entering the US. This is especially considering that illegal entry’s backdoor in the borders of Canada and Mexico is considerably open and accessible to any would-be immigrant. As much as the a large percentage of individuals getting into the United States through illegal means may be doing it for purposes of work and even pose no substantial security threat, the same vulnerabilities in regulation and control of borders that allow large-scale unauthorized migration may be taken advantage of by terrorists. Third, it is evident from terrorists’ activities that the United States does not track the activities and movements of immigrants and foreigners. This is especially considering that one of the hijackers had gained entry into the United States after being admitted to study English. However, he did not attend or go to the school in which he was admitted yet no consequences befell him. This is blamed on the fact that the procedure followed by the Immigration and Naturalization Service (INS) in notifying schools about the arrival of a student into the United States takes at least 6 months, not to mention the additional months taken for the response of the school to reach the INS. In essence the INS is supposed to make a decision on the priority it should place in locating a foreigner who entered the United States but failed to participate in the activities that are permitted in his or her visa. It is noteworthy that tracking foreigners in real-time would not only be expensive but also expensive in such instances. Forth and most important is the fact that the hijackings underlined variations in the manner in which foreigners are treated across countries as shown by the variation in the manner in which a number of the hijackers in the US, Germany and Canada were treated, as well as the inability of the data systems of immigration and law enforcement agencies to share information between and within governments.

The flaw of focusing on ethnic groups in immigration reforms combating CBRN threatsNumerous governments have, for a long time, underlined the importance of undertaking sweeping measures that would reform the Immigration Policies so as to avert the possibility of CBNR terrorist attacks. However, it is noted that focusing on certain religions and ethnic groups undermines the legitimacy that western governments have in fighting against terror. Scholars note that the al-Qaeda among other CBNR terrorists tend to characterize the war against terror as the United States against Arabs or the West against the religion of Islam. The more the United States acts in a manner that paints the picture of West vs. Islam, the higher the likelihood that terrorist groups would attract support (and sympathy) for their terrorist cause. It is worth noting that an international response is required to meet international terrorism, in which case it is imperative that the broadest coalition between different governments is maintained. However, counterterrorism policies that seem to target certain religions or ethnic communities based on their nationality may antagonize their home governments or even the nationals counterparts at home, whose cooperation may be imperative in combating terror. In fact, countries may respond to measures that seem to target its citizens through withdrawing or a reduction in their support for initiatives that combat international terrorism.

On the same note, harsh measures related to immigration have reverberated in the immigrant community lowering the will of Muslims and Arabs to cooperate with the agencies in fighting terrorism. Immigrant populations have faced antagonism from these measures, in which case they fear law enforcement. This has hindered investigation efforts on terrorist activities the communities as they have increased government’s mistrust, in which case there is the likelihood of alienating immigrant populations that would be willing to cooperate.

Recommendation and conclusionDespite the ineffectiveness of immigration policy frameworks, Homeland Security must use them in preventing CBNR terrorism. Of course, reforms in immigration policies may not prevent terrorism but they come as fundamental in combating it. These policies are aimed at identifying, deterring the entry of, as well as apprehending terrorists.

First, it is imperative that Homeland Security synchronizes its data systems pertaining to criminal records. This data should be freely shared among all agencies that are charged with the admission of immigrants and foreigners, so as to allow the agencies to carry out comprehensive searches before allowing a foreigner to enter into the country.

Second, the Mexican and Canada borders come as crucial in the fight against CBNR terrorism. This is especially considering its porous nature that allows for the entry of illegal immigrants into the United States. While it may be costly and ineffective to close it, eliminating the possibility of entry for terrorists of any nature would be imperative. In this regard, it is recommended that the refugee and immigration policies between the United States and Canada, as well as Mexico are harmonized. This will allow for the preservation of a considerably open border without antagonizing immigrant communities and even without compromising on the security of the United States.

Third, it is imperative that communication between Immigration and Naturalization Service and other bodies is enhanced so as to allow for tracking, as well as early and easy detection and prevention of acts that would jeopardize the security of the United States. Individuals who seem to have stopped or diverted from their initial goal stated in their visas and passports would be detected early enough and either deported or investigated, which would allow for early detection and prevention of terrorism acts.

Needless to say, terrorism involving Chemical, Biological, Radiological and Nuclear weapons is rife and an immense threat to the stability of the United States. With homeland Security being charged with ensuring safety of United States, it is imperative that it reexamines its policies pertaining to immigrants and seeks their reform so as to enhance cooperation with immigrants and make it difficult for terrorists to exploit the loopholes to get to the United States.

Bibliography

Cilluffo, F. J., Cardash, S. L., Lederman, G. N., & CSIS Homeland Defense Project. Combating chemical, biological, radiological, and nuclear terrorism: A comprehensive strategy : a report of the CSIS Homeland Defense Project. Washington D.C: CSIS. 2001

Martin, Susan and Martin, Philip : “International Migration and Terrorism: Prevention, Prosecution and Protection”, Georgetown Immigration Law Journal, Vol. 18, pp. 329-344. 2004

Pickering, Sharon. “Border Terror: Policing, Forced Migration and Terrorism”, Global Change, Peace & Security, Vol. 16, No. 3, 2004.

Romero, Victor C. “Decoupling “Terrorist” from “Immigrant”: An Enhanced Role for the Federal Courts Post 9/11”, Journal of Gender, Race & Justice, Vol. 7, 2003

Sidebothom, Theresa. “Immigration Policies and the War on Terrorism”, Denver Journal of International Law and Policy, Vol. 32, No. 3, 2004

Spencer, Alexander. “Questioning the Concept of „New Terrorism‟”, Peace, Conflict and Development: An Interdisciplinary Journal , Vol. 8, 2006

Tirman, John. “Introduction: The Movement of People and the Security of States” in John Tirman (eds.) The Maze of Fear – Security and Migration after 9/11, New York: The New Press, 2004

Tudge, Colin. “When men have lost their reason: is the war on terrorism working?”, New Statesman, April 12, 2004.

United-Nations. Trends in Total Migration Stock: The 2003 Revision, New York: United Nations Population Division. 2003

Walker, Clive. Policy Options and Priorities: British Perspectives. In Van Leeuwen, Marianne (ed.) Confronting Terrorism: European Experiences, Threat Perceptions and Policies,The Hague: Kluwer International, 2003

Zard, Monette. “Exclusion, terrorism and the Refugee Convention”, Forced Migration Review, Vol. 13, 2002