My mind has stories forming all the time; they tend to get wrapped up in life and never on paper. My works are scattered within real life.
Kindle Stories: https://www.amazon.com/author/hunteralex
For my father
Father, I've wanted to do this challenge, but the words I wish to speak cannot come to my mind. I grew up admiring you, but you were never home, and mother would play the game, "Wait till your father gets home!". That would pin fear into my brother and me to the point that we wanted to cry.
Preventing Violent Extremism
Preventing Violent Extremism Within the United States Violent extremism threats have been part of the United States history since its flag was first planted. There have been domestic terrorist organizations such as neo-Nazi groups to anti-Semitic hate groups, and now international terrorist organizations have begun to recruit, radicalize, causing United States citizens to indulge in acts of terrorism.
Terrorism can strike at anytime and anywhere; it is a mechanism that people use as a fear tactic to influence the way that others will think. Terrorists believe that nothing else will work or that all roads have led to the point that violence is the only answer. They use their methods when it comes to changing political views or laws when they feel that their religion is in danger or when they do not share the same beliefs like the ones around them. However, one does not become a terrorist overnight; it is a slow descent into the void of terrorism, through a process that has come to be called radicalization. Many psychological and behavioral factors have been researched to find the steps that cause one to radicalization; in this paper, two of those radicalization models, Moghaddam’s Staircase to Terrorism and Borum’s Pathway, will be compared to aid in finally entering and understanding the mind of a terrorist.
The Boston Tea Party Aftermath
The Boston Tea Party was a pivot point in American History; it was due to a set of events between the British and Americans, which ended up leading to the American Revolution and eventually to the Treaty of Paris declaring America its freedom. The reason that the act was committed was, due to the fact, that the English had proclaimed a monopoly on tea and was taxing it through the British East India Company.
For my mother
Dear Mom, I never told you how proud I am of you. For the longest time, I was in pain. Pain for what I thought you had caused me, for the lies, the betrayal. However, it was not you that lied, it was not you that betrayed, it was not you. I was blinded by the lights and sparkles of something different; I was young and naive.
Elden Ring Review
I am a gamer! Since I was three years old, I have been playing video games, and Mario was hopping across the screen. I've played everything from JRPGS to Western RPG, FPS, Adventure games, platforms, MMORPG, etc. Some of my favorites are the Zelda series, Assassin Creed series, Border Lands, and World of Warcraft (from back in the day), but yes, my heart belongs to RPGs.
Iran Nuclear Deal
In 2015 under the Obama administrator, the United States, United Kingdom, France, Russia, China, and Germany worked with Iran to create the Iran nuclear deal or Joint Comprehensive Plan of Action (JCPOA) to limit Iran's nuclear power activities. In this deal, Iran promised to reduce its stockpiles of uranium by 98% for the next 15 years. In return, most of the sanctions that were imposed from the United Nations (UN), United States (US), and European Union (EU) were lifted to help bring economic stability. If Iran did not violate the deal, the sanctions would stay removed (BBC News, 2015), which led Iran to gain access to more than $100bn in frozen assets, resuming to sell oil, and using the global financial system for trade (BBC News, 2019).
Homeland Security Enterprise
The Department of Homeland Security (DHS) has the unique role of defending the United States against foreign and domestic threats. They do this by following a set of core values and six overarching missions that involve Counterterrorism, securing borders, securing cyberspace and critical infrastructure, strengthening preparedness and resilience (Department of Homeland Security, 2019). When it comes to these mission sets, DHS must examine its policies and procedures to ensure that all its strategies preserve the civil liberties and rights of U.S. citizens while securing the home front without causing ethical and legal issues. This paper will allow the reader to understand which document is essential at this time within the homeland security field while discussing risk sectors within the critical infrastructures. The reader will also understand challenges that arise when protecting the Homeland and balancing civil liberties within the present and into the future.
In 2010 President Obama stated, "The single biggest threat to U.S. security, both short-term, medium-term, and long-term, would be the possibility of a terrorist organization obtaining a nuclear weapon "(Mauroni, 2012). However, this has been a concern for decades, with the rise of transnational terrorism and missile capabilities to deploy nuclear materials. How prepared is the United States if a terrorist were to use a nuclear weapon on the homeland, and what changes could occur to the National Security Strategy (NSS) to increase overall security.
Threat Agents within Agricultural and Food Industries
Agroterrorism is a subset of bioterrorism, it is defined as introducing a disease into animals, such as livestock, or into plants for the purpose of generating fear, economic losses, and undermining social stability (Olson, 2012). Agroterrorism is normally broken down into three modes, a direct attack on livestock or plants through a virus to cause illness, an introduction of toxins into food supplies to cause illness and economic impact, and finally, a vector-borne disease to attack both humans and animals (RAND, 2004).
The flow of imports and exports coming into and out of the United States is a massive part of the United States economy and critical infrastructure to the global economy. Before 9/11, the focus on these ports would be general criminal activity, physical and cargo security of the premises, access control, and military mobilization security. It was estimated that only about two percent of cargo containers were checked (Pate, Taylor, & Kubu, 2008).