Chapter 3 Homeland Security

.docx

School

University of North Carolina, Pembroke *

*We aren’t endorsed by this school

Course

4200

Subject

Political Science

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by DeanSalmon3953

Report
1 Chapter 3 Aleaha Blue CRJ-4210-800 The University of North Carolina at Pembroke Instructor Jesse McQueen September 7, 2023
2 1. Legalistic responses are law enforcement and law related approaches for promoting homeland security and managing domestic terrorist environments. A challenge that the United States encounters is balancing the need for counterterrorist legislation against the protection of constitutional rights. In severely strained terrorist environments, it is not uncommon for nations including democracies to pass authoritarian laws to promote social order at the expense of civil liberties (Martin, 2019, p.46). In the aftermath of September 11, the United States essentially maintained its previous legislative initiatives and upgraded existing antiterrorist legal approaches. The nation also enacted new homeland security legislation. In this regard, the legal foundations of homeland security are rooted in efforts among nations and within the United States in recent decades to counter international terrorism and state sponsorship of violent extremists (Martin, 2019, p.47). In the United States, domestic policies are affected by international and domestic counterterrorist laws when they are enacted in response to terrorist events. In this regard, homeland security policies adapt to emerging legal environments which in turn must adapt to emerging security environments (Martin, 2019, p.48). 2. International law is based on tradition, custom, and formal agreements between nations. It is essentially a cooperative concept because there is no international enforcement mechanism comparable to domestic courts, law enforcement agencies, or crimes codes. Nations recognize international legal authority through formal international agreements. Two party and multiparty agreements are used to create an environment conducive to international order maintenance under the authority of international law which these formal agreements include treaties (Martin, 2019, p.48). Conventions and treaties represent signatories’ agreement to extradite terrorist perpetrators or to prosecute them if
3 they are taken into custody within a signatory’s borders. International conventions and treaties do not have the force of law in the United States without the passage of enabling legislation by Congress (Martin, 2019, p.52). 3. Before sending troops, they should have gotten more intel on why and who had completed the attacks. Going in only thinking it was the work of a mob angered by the promulgation of an American made film mocking the Prophet Muhammad instead of knowing it was armed Islamists made the United States unprepared. The attack was not adequately managed and could have been handled better and could have been more prepared especially because of what occurred the year before on the exact day. Being prepared on the anniversary of the September 11, 2011, attacks on the United States is something we should be prepared for each year. 4. In my opinion, the subsequent political crisis of the Benghazi attacks was caused by armed Islamists to prove yet another point from the terrorist attack the United States encountered just the year before by Islamic terrorists from the al Qaeda terrorist organization. 5. Several international treaties were enacted to promote cooperation in combating international terrorism against diplomatic missions. The treaties that are included are Convention to Prevent and Punish Acts of Terrorism Taking the Form of Crimes Against Persons and Related Extortion That Are of International Significance which the purpose of this agreement was to establish common ground for recognizing the violability of diplomatic missions. The next treaty that is included is the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents which the purpose is to establish an internationally recognized common framework for suppressing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help