Saturday, February 29, 2020
Approaches to Combating Terrorism
Approaches to Combating Terrorism Discuss intelligence approaches to combating terrorism? In 2011, DOJ and FBI operate 104 Joint Terrorism Task Force (JTTF) in the United States of America. Both the agencies includes 4,000 law interpreting officers and agents whose duty is to inquire the terrorism related events taking place in USA. To investigate terrorist plots their operations are highly tactual and focused on the investigation. Through investigation intelligence got constituted to restrict and defeat terrorist acts. JTTFs develop an important system to share intelligence news with FBI who further conveys it to other agencies to overpower terrorism. The other major work of these task forces is to develop harmony between low interpreting sources and the state with United States of America on intelligence related matters. The threat of homegrown jihadists occurred and the several top most security clearance issued to local police working with JTTF. A significant dilemma for law enforcement and intelligence offi cials who straddle the public realm of ideas and the secretive realm of terrorist operations is how to sift the law-abiding, nonviolent radical attracted to jihadist rhetoric from the would-be terrorist who merits targeting. The vast amount of terrorist-related material available on the Internet in a relatively anonymous setting attracts homegrown individuals open to radicalization. Many of these individuals may show great interest in radical content, engage in radical discourse, but not become terrorists. A growing pool of those who view jihadist as ââ¬Å"coolâ⬠and engage in online ââ¬Å"talkâ⬠may make it harder for police to identify actual terrorists. After 9/11 attacks law interpreting got more focused and prioritized factor of intelligence got highlighted in the inquiry process. Deputy Attorney General, Paul McNulty, while working described the law abiding sector focused, proactive and intelligence attitude towards terrorist acts and to prevent it for the security of the nation. Intelligence gathering is one of the basics in inquiring and get rid of any other emergence of terrorist attack in future. Investigations require some level of factual predication, while an assessment does not.206 However; assessments are to follow a specifically articulated purpose. The guidelines have established six authorized purposes: Check leads on individuals or activities, Check leads on groups or organizations, Collect information to analyze potential threats and vulnerabilities, Gather information for intelligence analysis or planning, Vet and manage the agencyââ¬â¢s confidential human sources (informants), and Collect foreign intelligence. The American Civil Liberties Union (ACLU) has criticized the FBIââ¬â¢s amassing of racial and ethnic data based on the new guidelines. It allows for the collection of information about ethnic or racial communities and justifies the gathering of such information for proactive purposes. The guidelines s tate that it should be done if it ââ¬Å"will reasonably aid the analysis of potential threats and vulnerabilities, and, overall, assist domain awareness for the purpose of performing intelligence analysis. One ACLU official has described this as racial profiling of entire communities. Discuss the role of state and local law enforcement? Terrorist attacks take place in United States of America, whether from foreign or homegrown terrorists. The local and homegrown terrorist attacks and their propagation like weapons explosives and participants all take place in local territories. The whole plan of terrorist attack got prepared locally so, to prevent from these kind of attacks responsibility not only lies on central government it also the part of local and tribal government take action against it. On daily basis up to 17,000 officials gather investigation report suspicious individuals and incidents which as crime connect with any possible terrorism activity. The case of Oklahoma C ity bomber Timothy McVeigh. He was arrested after a traffic stop when Oklahoma State Trooper Charles J. Hanger noticed that McVeighââ¬â¢s yellow 1977 Mercury Marquis had no license plate.233 Using his home state as an example, a former U.S. Attorney maintains that ââ¬Å"evidence of a potential terrorist threat or organized criminal enterprise is far more likely to be found in the incidental contact with the 10,000 police officers in the state of Washington than by the less than 150 FBI agents assigned to the Seattle Field Division. The role of state tribal and local both are very important because any kind of intriguing act take place locally security agencies should be high alert to take action against it as soon as it occurs because it may be connected to any kind of terrorism activity which will harm the nation on high extent further to check and balance locally will help to detect brutal terrorists. The Nationwide Suspicious Activity Report Initiative (NSI) is a program to p ush terrorism-related information generated locally between and among federal, state, local, and tribal levels. Specifically, it is a framework to support the reporting of suspicious activityââ¬âfrom the point of initial observation to the point where the information is available in the information sharing environment.245 It is a standardized, integrated approach to gathering, documenting, processing, analyzing, and sharing information about suspicious activity that is potentially terrorism-related while protecting the privacy and civil liberties of Americans. The intent is for this locally generated suspicious activity reporting to be combined in a systematic way with other sources of intelligence at the federal level to uncover criminal activity, including terrorism.
Wednesday, February 12, 2020
Management Accounting & Activity Based Costing Essay
Management Accounting & Activity Based Costing - Essay Example production process encompasses various activities such as operation of machines, maintaining the machinery, as well as supervising the production process. Operators operate the machines; maintenance mechanics perform the machine set ups and maintain machines when molding and the supervisors provide supervision for the maintenance mechanics and machine operators. Other activities include building, administration and sales. The resources used include energy for the set-up and molding process by the molding machines. Machines consume 6.3KW of energy on an hourly basis. Also, other consumable shop supplies like lubricants and hoses form the major resources within the company. A cost driver refers to characteristics of events or activities which results in business incurring costs. Activity based costing have the products consuming activities and the activities consume the resources (Kallunki& Hanna 2008, p. 62-79). In the case study above, the production process has the number of orders and number of set up machines as the cost drivers.The Cost drivers for machine operation include the number of the operators and machines available. Machine maintenance cost drivers include the number of machines to be maintained and the number of technicians. The supervision cost drivers include the number of supervisors and number of people to supervise. Cost drivers for the building include insurance and rent costs. Number of machine hour in production may be used in calculating the rate of machine hour relating to repair, depreciation and maintenance processes. Also, the production process will have the number of inspections as the cost drivers. In making of the product, inspection for quality evaluation requires the appointment of experts who consume money in terms of salary, travel, electricity, as well as the depreciation of the equipment. The overheads may be calculated based on the number of tests. Each batch requires 4 tests, and suppose the available batches are 200,
Saturday, February 1, 2020
The Three Important Benefits That IBM Will Receive From Outsourcing Essay
The Three Important Benefits That IBM Will Receive From Outsourcing Their HR Functions To Fidelity - Essay Example This is called outsourcing. Many large companies now outsource jobs such as call center services, e-mail services, and payroll. These jobs are handled by separate companies that specialize in each of the services by means of contracts. Today more and more companies are resorting to outsourcing. This is attributed mainly to the increased efficiency and cost cuts. Earlier small companies and companies which were newly established would resort to outsourcing, but today even giants like IBM are making use of it. In July 2002, a deal was negotiated between International Business Machines Corp. and Fidelity's Employer Service Co. According to the deal, Fidelity's Employer Services Co. unit was to take over key human-resources functions for 260,000 IBM employees and retirees. Fidelity was to hire 450 of IBM's 1,200 U.S. human-resources employees. Among the jobs Fidelity would handle for IBM were health-plan administration, career services and pension administration. IBM would continue to provide other functions in house, including payroll (Johannes L. and Armstrong D. 2002). According to the article "The benefits of outsourcing for small businesses (n. d)", "Though reducing expenditure is not the prime reason for outsourcing, it is certainly a major factor. Outsourcing converts fixed costs into variable costs and releases capital for investment elsewhere in the business. Outsourcing makes the firm more attractive to investors, since of the ability to pump more capital directly into revenue-producing activities." Though true for small companies, it applies equally well for giants like IBM. In the case of IBM this is exemplified by the fact that the human resource functions of 260,000 workers and retirees have been taken over by Fidelity which has specialization in the field. If the former were to do the same job, it would certainly prove more costly than that of the latter. The funds saved, if invested elsewhere in the company would improve revenues. Also this would make IBM more attractive to investors, as the saved capital can be invested in the revenue generating areas and core fields. Increase in efficiency: As IBM is a research oriented company specializing in manufacturing computers, it has a high research and development expenditure. Fidelity's cost structure and economy of scale can give IBM Corp an important and strategic advantage. This would help in decreasing the labor costs. The success of IBM depends upon short term projects that it undertakes. Hiring and training workers for short-term projects can be very expensive and short term employees don't always live up to the desired expectations (The benefits of outsourcing for small businesses). IBM's deal with fidelity will play a leading role in improving overall efficiency by decreasing labor costs. About 450 workers in IBM Corp.'s Raleigh employee service center will transfer to Fidelity Investments beginning Aug. 1, as part of an agreement that allows Boston-based Fidelity to administer IBM's pension plan, the 12th largest in the United States (450 IBM employees to transfer to Fidelity. July 2002). The transfer of 450 out of 12 00 members in the human resource division would certainly decrease the labor costs by more than one third in that particular division. Also as the number of employees is decreased, it increases the scope for other employees to make their jobs secure. More security means more productivity which in turn means more efficiency. Focus on core businesses. IBM, too, like any other company has
Subscribe to:
Comments (Atom)