Journal Reflection PDD 39 vs. HSPD 5

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Journal Reflection PDD 39 vs. HSPD 5

The major similarity between PDD 39 and HSPD 5 is that both are security organs that safeguard Americans from and handle acts of terror both within and abroad. The differences between the two policies lie in their specific details. On the one hand, PDD 39 aims to minimize vulnerabilities, deter terrorism, respond to terrorism, weapons of mass destruction, and implement. On the other hand, HSPD 5s purpose is to improve how the U.S. government manages domestic incidents by establishing a comprehensive, single national incident management system.

Possible reasons for potential tone differences in handling terrorism in the U.S. and attacks lie in promoting a coordinated and cooperative approach at every security level. The difference in approach and tone includes national authorities coordination, state cooperation, and, where appropriate, regional and international cooperation among security organizations. Additionally, the difference in tone and approach is associated with public-private partnerships in the private sector, the media, civil society, and state authorities.

With the creation of the Federal Bureau of Investigation (FBI) as the leading law in preventing and investigating international and domestic terrorism, the PDD 39 was successful. The FBI has been at the forefront of minimizing vulnerabilities through an expanded counterterrorism program by employing the policy. HSPD 5 has been successful in handling terrorism in the U.S. To date, the government has successfully created Homeland Security, whose mandate has been the implementation of plans, cadre, team formation, doctrine, and resource typing credentialing, among other activities.

With the advancements in technology, internet terrorist content is now easily detected and deleted faster than ever. Through crediting quantum computing, technology ensures accelerated processing of information which enables the tracing of terrorism and terror-related acts (Korstanje, 2020). Thanks to machine algorithms, it is now possible to detect and remove terror-related content from the internet in fifteen to twenty minutes (Korstanje, 2020). Further, increased expert knowledge exchange on technologies like synthetic biology, robotics, 3d printing, and nanotechnology, among others, help combat terrorism.

Reference

Korstanje, M. (2020). Terrorism, technology, and apocalyptic futures. Cham: Palgrave Macmillan.

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!