Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How are computers used in homeland security?
How are computers used in homeland security?
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: How are computers used in homeland security?
Computers in Homeland Security
The DHS, Department of Homeland Security, uses a color coded system for informing the general public of what state of readiness the country should be in, in case of a terrorists threat. The system they use is a five color system, with each color representing a different step in readiness. Green means low risk of terrorist attacks, blue is Guarded, or general risk of a terrorist attack, yellow means elevated, or significant risk of a terrorist attack. Orange means high risk of an attack, while red means severe risk of an attack. Today the country is always on either orange or red. Since President Bush has been in office the country itself, has been on high alert of an attack (http://www.whitehouse.gov/news/releases/2002/03/20020312-5.html).
As part of this paper I took a poll of how many people know about the use of homeland securities and to also see if they knew the meaning of the colors of our alert system.
-Question 1 was if a person knew if computers were used in homeland security.
-Question 2 was if they knew what the colors used in homeland security meant.
Names
Question #1
Question # 2
Jack
yes
yes
Jill
no
no
Tom
no
no
Andrew
yes
yes
Edrick
yes
yes
Mike
yes
yes
Dustin
no
no
Jorge
yes
yes
Shayla
no
no
Malika
no
no
Cheriene
no
no
Martha
yes
yes
Chris
no
no
Tim
no
no
Tomas
no
no
Jude
no
no
Jimmy
yes
yes
Kristina
yes
yes
Jackie
no
no
Tosin
yes
yes
Warren
yes
yes
Sam
yes
yes
Cory
no
no
Marshall
no
no
As technology has increased the importance of computers being involved with homeland security has increased significantly. They have started to use computers for ways to check passenger baggage. Notice how when someone goes through an airport they have to walk through several metal detectors. These detectors are run by computers in order to check what people have on them.
Another way computers are used is a complex system of watch lists and security triggers. These lists are what the airport security uses to decide who to take under heavy watch. Since more that 600 million people fly a year. They hope that a computer system called CAPPS 2 can help to check about 5% of the people who fly each year.
Another thing that Homeland security uses computers for is surveillance. This is probably the most used place for computers in Homeland Security. With surveillance, there has been a big discovery in cyber optics.
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
After 9/11 there was a great increase in security nationwide. One major example of this is the number of agencies created as a result of 9/11. Among these agencies include the creation of the TSA (Transportation Security Administration), the DHS (The Department of Homeland Security), the ICE (Immigration and Customs Enforcement), and lastly the massive advancement of the US Coast Guard. Every one of the budgets of these agencies has doubled since 9/11. The creation of the transportation and security administrations primary goal is to improve the safety of all American Citizens traveling by plane. The TSA started implementing, new policies and new technological advancements.
The Department of Homeland Security faces challenges of failure to coordinate and cooperate in the latest fight against computer crimes as well as more general intelligence-gathering operations. (...
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
The sequence of this literature review will start with The Department of Homeland Security. Additionally an analysis of the National Guard including a brief insight into its foundation followed by the equipment and facilities that it has at its disposal. Subsequent will be information belonging to Homeland Defense with literature reviews of several sources pertaining to 9/11 and the Boston Marathon Bombing. The second point of the main body will then be Civil Support with reviews relevant to Hurricane Katrina. The researcher will stick with a chronological examination of events pertaining to the proposed topic of the National Guard of benefits that it brings to the area of Homeland Security.
After September eleventh, President George W. Bush signed a congressional bill to create a department of Homeland Security. This department examines the levels of security risk at airports, ship ports, railway stations, and other public transportation locations. Both candidates Bush and Kerry agree that homeland security is a priority. Furthermore, the candidates have stated that it is essential to provide the American people with a strong common defense. For example, “both pledge to have the government spend more money to furnish first-responders-the police and firefighters who are the first to arrive on the scene of an accident or an attack-with the materials and equipment they need to do their jobs to the best of their ability” (David Dulio). The recent war in Iraq has divided the candidates on how to carry out the plan on homeland security. Bush believes that we must take a protective approach in Iraq to prevent further terrorist damage to the United States. Kerry on the other hand believes that the United States must seek international support in Iraq to insure safety at home and abroad.
Terrorism originated back as early as the 14th century. The French Revolution originated the word of “terrorist” and “terrorism” (Terrorism Research, n.d.). The use of the word "terrorism" began in 1795 in reference to the Reign of Terror initiated by the Revolutionary government. (Terrorism Research, n.d.). In recent years, there have been major terrorism events in the United States such as 9/11, U.S.S. Cole, Boston marathon, and the federal building bombing in Oklahoma. Shortly after 9/11, Homeland security implemented five threat conditions (Red, Orange, Yellow, Blue, Green) with red being severe and green being the lowest threat condition. The author further states that local police are in the best position to learn about intelligence regarding terrorist threats and potential targets. Many of the resources available to local law enforcement include crime prevention seminars, community policing and partnerships with local businesses particularly banks, realtors, car rental agencies and
The Department of Homeland Security’s “2014 Quadrennial Homeland Security Review” reviews six strategic challenges that are believed to be at high risk within the United States. Quadrennial Homeland Security Review is required to be updated every four years as it discusses present and futures risks, threats and consequences. The six strategic challenges that were analyzed from 2014 to 2018 are terrorist threats, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards. Local communities, to include counties and cities, have their own specific process tailored to the threats, hazards and risk they may encounter. These local areas also prioritize the specific threats to determine the resources
The concept of homeland security has developed over the last decade. Homeland security as a concept was precipitated by the terrorist attacks of 9/11. However, prior to 9/11 such entities as the Gilmore Commission and the United States Commission on National Security discussed the need to evolve the way national security policy was conceptualized due to the end of the Cold War and the rise of radicalized terrorism. After 9/11, policymakers concluded that a new approach was needed to address the large-scale terrorist attacks. A presidential council and department were established, and a series of presidential directives were issued in the name of “homeland security.” These developments established that homeland security was a distinct, but undefined
Homeland security is the way Americans put forth the effort to ensure the homeland is safe, secure, and stands firm against terrorist acts and other hazard that could put the health and welfare of the American people. The mission of the Homeland Security is to prevent terrorism, secure and protect our open borders, uphold all immigration laws, safeguard and secure cyberspace, and be content and resilient when it pertains to disasters.
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
The Office of Homeland Security has many functions that it will perform to ensure the safety of the...
Computers and Firefighting It seems that the advances of today are moving far more rapidly than people have ever thought about. The only question is how much farther can we go in the advancement of computer technology to support people? One of the ways to support people is in the area of Firefighting. In this field, the firemen with help of computers are allowed to help civilians when they are in need.
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.