Protection Management and the Study of Terrorism

Why should everyone employed and those who seek employment in the intelligence field consider the study of protection management and particularly the study of terrorism? The answer is multifaceted and versatile, yet ultimately simple. First, to do your job better; second, to understand your enemy so that you can defeat him/her; and third, to better protect your country. Of course, an added benefit would be job promotion, and accordingly, better pay.

What exactly is protection management? There are two types of protection management. Data Protection Management (DPM), which is the use of backup processes to ensure that data is securely backed up and recoverable; and Population Protection Management (PPM), which is the all-encompassing methodology used to protect and ensure the safety of the population through use of security video cameras, metal detectors, and surveillance drones. Population Protection Management is particularly tricky, as the U.S. Constitution must be considered at all times in order to balance the public’s safety and protection, and to guarantee that the people are not subjected to unreasonable searches and seizures.

Since the collapse of the Soviet Union, terrorism has risen to become the primary threat to United States (U.S.) national security; several studies on terrorism have led to the U.S. Government enacting certain protection management measures that have been subject to public controversy, such as the Federal Bureau Investigations\’ (FBI) operation of surveillance drones over U.S. territory. Many civil libertarians view an act such as this, in the name of Population Protection Management as an abuse of government power, though they do not clearly understand the nature of the operations. It is in cases such as these where it is necessary to educate the population on the purpose and intent of Population Protection Management measures the government is enacting and what oversight measures are in place to ensure the integrity of American Civil Liberties.

From the study of terrorism and protection management as taught by experts in the field, we can learn to improve the provision of safety and protection education to the public, so that the public is aware of potential suspicious packages and what to do if they encounter such an item. Rule number one is \’Don\’t touch it.’ Rule number two: ‘Call the authorities.\’ We can further secure computers by consistent use of anti-hacking programs and detailed security programs. We can methodically increase surveillance of our reservoirs and waterways and we can intelligently increase the use of surveillance cameras accompanied by the use of surveillance drones, among other protection management initiatives.

Through the systemic study of terrorism and protection management, we are able to address and resolve problems such as the issue of the use of surveillance cameras, their proliferation, utility, and reliability. The study of terrorism and protection management will provide those employed in the intelligence field with the insight and additional tools with which to better do their respective jobs. Finally, one can pursue the study of terrorism at their leisure through online education or through traditional brick and mortar institutions.

Dan Sommer works for Henley-Putnam University, a leading educational institution in the field of Strategic Security. For more info on Henley-Putnam University, protection management, study of terrorism, call 888-852-8746 or visit us online at http://www.Henley-Putnam.edu

Dan Sommer works for Henley-Putnam University, a leading educational institution in the field of Strategic Security. For more info on Henley-Putnam University, protection management, study of terrorism, call 888-852-8746 or visit us online at http://www.Henley-Putnam.edu

Author Bio: Dan Sommer works for Henley-Putnam University, a leading educational institution in the field of Strategic Security. For more info on Henley-Putnam University, protection management, study of terrorism, call 888-852-8746 or visit us online at http://www.Henley-Putnam.edu

Category: Education
Keywords: protection management,study of terrorism

Leave a Reply