Security Objectives Components

Security Objectives Components - Security Objectives...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Objectives Components 1 Security Objectives Components Dana Dutch CJS 250 Axia Colllege of University of Phoenix
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Objectives Components 2 Security Objective Components The text suggests that people have a lot to fear from criminals with guns inside churches. The fact that the articles mentioned that many people would usually think this location would be the “safest” location to be are not paying attention to trends. There has become in the national zietgiest a trend toward mistrust and speculation of Christianity, and in fact all religion. The mental capacity to commit religious based crimes is not unknown in our evolution. This isn't a sudden and terrifying threat. The Irish have lived with this fear for decades. In the early twenties the IRA would bomb and set fires to churches, facilities and killed between 400 and 500 people over the course of the 2 year conflict. (Parkinson F., A., 2004) In later years, the US funded IRA militants roamed about with their AK47's and detonators waiting to kill each other over religious conflict. (PBS 1996) The fact that now it is suddenly appearing in America should clue people in to a reality that is sitting in front of their faces. People are either so dead set in their ways to practice and the name of the deity that supposedly rules all creation, that they are willing to slaughter others who do not believe, or they are simply fed up with the violence that religion has caused for centuries. The religious battle is becoming more mainstream and the reports are now coming in that the
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/26/2010 for the course CJS 250 taught by Professor N/a during the Spring '10 term at University of Phoenix.

Page1 / 5

Security Objectives Components - Security Objectives...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online