Journal Reflection PDD 39 vs. HSPD 5

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

The major similarity between PDD 39 and HSPD 5 is that both are security organs that safeguard Americans from and handle acts of terror both within and abroad. The differences between the two policies lie in their specific details. On the one hand, PDD 39 aims to minimize vulnerabilities, deter terrorism, respond to terrorism, weapons of mass destruction, and implement. On the other hand, HSPD 5s purpose is to improve how the U.S. government manages domestic incidents by establishing a comprehensive, single national incident management system.

Possible reasons for potential tone differences in handling terrorism in the U.S. and attacks lie in promoting a coordinated and cooperative approach at every security level. The difference in approach and tone includes national authorities coordination, state cooperation, and, where appropriate, regional and international cooperation among security organizations. Additionally, the difference in tone and approach is associated with public-private partnerships in the private sector, the media, civil society, and state authorities.

With the creation of the Federal Bureau of Investigation (FBI) as the leading law in preventing and investigating international and domestic terrorism, the PDD 39 was successful. The FBI has been at the forefront of minimizing vulnerabilities through an expanded counterterrorism program by employing the policy. HSPD 5 has been successful in handling terrorism in the U.S. To date, the government has successfully created Homeland Security, whose mandate has been the implementation of plans, cadre, team formation, doctrine, and resource typing credentialing, among other activities.

With the advancements in technology, internet terrorist content is now easily detected and deleted faster than ever. Through crediting quantum computing, technology ensures accelerated processing of information which enables the tracing of terrorism and terror-related acts (Korstanje, 2020). Thanks to machine algorithms, it is now possible to detect and remove terror-related content from the internet in fifteen to twenty minutes (Korstanje, 2020). Further, increased expert knowledge exchange on technologies like synthetic biology, robotics, 3d printing, and nanotechnology, among others, help combat terrorism.

Reference

Korstanje, M. (2020). Terrorism, technology, and apocalyptic futures. Cham: Palgrave Macmillan.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now