Chapter 3 Homeland Security
.docx
keyboard_arrow_up
School
University of North Carolina, Pembroke *
*We aren’t endorsed by this school
Course
4200
Subject
Political Science
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DeanSalmon3953
1
Chapter 3
Aleaha Blue
CRJ-4210-800
The University of North Carolina at Pembroke
Instructor Jesse McQueen
September 7, 2023
2
1.
Legalistic responses are law enforcement and law related approaches for promoting
homeland security and managing domestic terrorist environments. A challenge that the
United States encounters is balancing the need for counterterrorist legislation against the
protection of constitutional rights. In severely strained terrorist environments, it is not
uncommon for nations including democracies to pass authoritarian laws to promote social
order at the expense of civil liberties (Martin, 2019, p.46). In the aftermath of September
11, the United States essentially maintained its previous legislative initiatives and
upgraded existing antiterrorist legal approaches. The nation also enacted new homeland
security legislation. In this regard, the legal foundations of homeland security are rooted
in efforts among nations and within the United States in recent decades to counter
international terrorism and state sponsorship of violent extremists (Martin, 2019, p.47). In
the United States, domestic policies are affected by international and domestic
counterterrorist laws when they are enacted in response to terrorist events. In this regard,
homeland security policies adapt to emerging legal environments which in turn must
adapt to emerging security environments (Martin, 2019, p.48).
2.
International law is based on tradition, custom, and formal agreements between nations.
It is essentially a cooperative concept because there is no international enforcement
mechanism comparable to domestic courts, law enforcement agencies, or crimes codes.
Nations recognize international legal authority through formal international agreements.
Two party and multiparty agreements are used to create an environment conducive to
international order maintenance under the authority of international law which these
formal agreements include treaties (Martin, 2019, p.48). Conventions and treaties
represent signatories’ agreement to extradite terrorist perpetrators or to prosecute them if
3
they are taken into custody within a signatory’s borders. International conventions and
treaties do not have the force of law in the United States without the passage of enabling
legislation by Congress (Martin, 2019, p.52).
3.
Before sending troops, they should have gotten more intel on why and who had
completed the attacks. Going in only thinking it was the work of a mob angered by the
promulgation of an American made film mocking the Prophet Muhammad instead of
knowing it was armed Islamists made the United States unprepared. The attack was not
adequately managed and could have been handled better and could have been more
prepared especially because of what occurred the year before on the exact day. Being
prepared on the anniversary of the September 11, 2011, attacks on the United States is
something we should be prepared for each year.
4.
In my opinion, the subsequent political crisis of the Benghazi attacks was caused by
armed Islamists to prove yet another point from the terrorist attack the United States
encountered just the year before by Islamic terrorists from the al Qaeda terrorist
organization.
5.
Several international treaties were enacted to promote cooperation in combating
international terrorism against diplomatic missions. The treaties that are included are
Convention to Prevent and Punish Acts of Terrorism Taking the Form of Crimes Against
Persons and Related Extortion That Are of International Significance which the purpose
of this agreement was to establish common ground for recognizing the violability of
diplomatic missions. The next treaty that is included is the Prevention and Punishment of
Crimes Against Internationally Protected Persons, Including Diplomatic Agents which the
purpose is to establish an internationally recognized common framework for suppressing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help