Computers in Homeland Security Ever since September 11th, 2001, our nation has been completely obsessed with our own security and prevention of another tragic incident. Through this experience leaders of our country have developed a system that would allow civilians of the status of our nation?s safety. It is called Homeland Security. Homeland Security was developed with several purposes. These include: increase overall preparedness, particularly for catastrophic events, Create better transportation security systems to move people and cargo more securely and efficiently, Strengthen border security and interior enforcement and reform immigration processes, Enhance information sharing with our partners, Improve DHS financial management, human resource development, procurement and information technology, Realign the DHS organization to maximize mission performance (Home Land Security Agenda). President Bush even came up with a color code that warns the nation of the terror threat. Red means severe. Orange is High. Yellow is elevated. Blue is guarded. Green is low. However, it is made up of some of the most advanced technology in the world. These computers allow the leaders to use their color coded system to send out warnings which allow us to prevent being vulnerable. Computers are the technology and they are what the government relies on to ensure that we are all safe. One important part of the Homeland Security is the US-CERT. The US-CERT program was invented in 2003, and severs as our internet infrastructure. This branch of Homeland Security is run by the National Cyber Security Division. The acting director of US-CERT is Donald A. Purdy Jr. It protects our internet from cyber attacks. This technology is responsible for analyzing and reducing cyber threats and vulnerabilities, disseminating cyber threat warning information, as well as coordinating incident response activities. The locations of US-CERT are in Arlington, Virginia and Pittsburg, Pennsylvania. ?It relates to the Department of Homeland Security because it was established to serve as the federal government?s cornerstone for cyber security coordination and preparedness, including implementation of the National Strategy to Secure Cyberspace? (Department of Homeland Security). This technology regulates the internet protocols in hopes to make virus and cyber attacks easier to detect and prevent. They also are targeting such crimes as identity theft, financial fraud, and network intrusions. Another crucial point of this security system is being ready for the worst.
Until September 11, 2001 public security was not very hard to bypass. On this horrific day in history not only was the United States shaken, but also every country in the world surrounding it. Airport security had failed the nation and had hence led to the event, which is now known as the “9/11 terrorist attacks.” Four planes had been hijacked the morning of the attacks with the first plane hitting the North Tower of the World Trade Center. Next came the second plane into the South Tower. The third plane then hit the western face of the Pentagon. Finally, the fourth plane landed in a field in Pennsylvania, but it was originally targeted for the White House (Kean). As a result of this event, airport security around the world has been tightened. America was targeted in retaliation of America’s support to Israel throughout the Persian Gulf War. This group was also known as al Qaeda (“9/11 attacks”). By studying the causes and effects of 9/11 people can be more aware of their surrounding and feel much more safe.
After 9/11 there was a great increase in security nationwide. One major example of this is the number of agencies created as a result of 9/11. Among these agencies include the creation of the TSA (Transportation Security Administration), the DHS (The Department of Homeland Security), the ICE (Immigration and Customs Enforcement), and lastly the massive advancement of the US Coast Guard. Every one of the budgets of these agencies has doubled since 9/11. The creation of the transportation and security administrations primary goal is to improve the safety of all American Citizens traveling by plane. The TSA started implementing, new policies and new technological advancements.
... of the government to meet an evolving terror threat actually ends up masking the far more important government responsibility for overall national preparedness, not just guarding against terrorism. The billions of dollars and staggering amount of effort spent on crafting the mushrooming homeland defense/homeland security enterprise certainly helped plug some existing holes, but the rampant inefficiency continues to be a point of contention today. The overly broad notions of counter-terrorism and homeland defense means “any expense can be justified” as proven by the decade long rise in DHS budgets and numerous instances of wasteful spending. The headfirst plunge into the world of homeland security was a uniquely American undertaking. No other nation possessed the fiscal means to enact such drastic measures on so many levels, and in such a short amount of time.
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
After September eleventh, President George W. Bush signed a congressional bill to create a department of Homeland Security. This department examines the levels of security risk at airports, ship ports, railway stations, and other public transportation locations. Both candidates Bush and Kerry agree that homeland security is a priority. Furthermore, the candidates have stated that it is essential to provide the American people with a strong common defense. For example, “both pledge to have the government spend more money to furnish first-responders-the police and firefighters who are the first to arrive on the scene of an accident or an attack-with the materials and equipment they need to do their jobs to the best of their ability” (David Dulio). The recent war in Iraq has divided the candidates on how to carry out the plan on homeland security. Bush believes that we must take a protective approach in Iraq to prevent further terrorist damage to the United States. Kerry on the other hand believes that the United States must seek international support in Iraq to insure safety at home and abroad.
USCYBERCOM unifies the command of the cyberspace efforts and units of the United States military. The United States Department of Defense also has outlined the principles that form its cyber defense strategy, building and maintaining ready forces and capabilities to conduct cyberspace operations, defend the DoD information network, secure DoD data, and mitigate risks to DoD missions. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environments at all stages. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability. The five pillars of cyber security, confidentiality, integrity, availability, non-repudiation, and authentication. Protecting information from disclosure to unauthorized individuals, systems or entities, Protect information, systems, and services from unauthorized modification or destruction, Timely, reliable access to data and information services by authorized users, the ability to correlate a recorded action with its originating individual or entity, and the ability to verify the identity of an individual or entity
September 11, 2001 marked the most horrific day in history for United States of America. The events of this day changed the lives of those residing in America forever. United States was considered somewhat safe, in regards to terrorists’ attacks. However, this all came to a screeching halt when 19 militants known to be a part of the Al-Qaeda terrorist group hijacked four planes for the purpose of destroying targeted areas in the United States. As a result of the deadly attack on the United States, security measures drastically changed. Although, security measures throughout the United States have been in place, extreme caution came into effect. All departments looked at different measures to improve preventing terrorists’ attacks. Department of Homeland Security, Aviation and US Customs and Immigration were some of the main areas that changed their security measures.
“The U.S. Government has spent more than $7.6 trillion on defense and homeland security since the 9/11 attacks” (“National Priorities Project” 2011). According to Alycia B. Taylor, CPO and Sara Steedman, “The need for security and how it was going to be implemented was top priority.” In other words, the united states was mainly worried about how safe the country and the people in the country were. The airline industry was the fastest to upgrade their security methods, since the planes that crashed into the twin towers were hijacked by terrorists. Their main goal was to make people safe while flying. This involves better background and luggage checks. Personal security has also increased as well. Overall, security in the United States after the attacks of 9/11 has become stronger and is still increasing
The recent horrific attacks on France highlighted one of the number one threats to Homeland Security, which is the evolving terrorist. The Evolving terrorist threat is of major concern since 9/11 because “its demonstrated and continued interest in advancing plots to attack the United States” (). A major concern in this area for the United States is the propaganda that is used to motivate individuals who have not participated in terrorist activities or traveled to conflict zones, teaching and training them to plot and carry out attacks on civilian populations. Another huge concern to Homeland security is the threat to our cyber-physical infrastructure. “A vast array of interdependent information technology network, systems, services, and resources enable communication, facilitate travel, power our homes, run our economy and provide essential government services” (). The everyday citizen is so reliant on technology and everything in our country is so interconnected that if the cyber-physical infrastructure would to be compromised it would create a devastating chain reaction across the country. The third concern for Homeland Security is the threat of a pandemic. Even though it is noted as being a very low probability, the impact of it happening even once would be very high impact. “Increasing global
Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security.
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
Col. Randy Larson, renown author and Director of the Weapons of Mass Destruction (WMD) Center, speaks on an in-depth prospective of the field of homeland security and factors that drive the continued efforts to address future threats to the nation for the 21 century. The area of focus presented in the interview are the various ways an individual may enter the field but are not limited to a particular area of study. For example, health care, agriculture, or political science, there is essential no set track for finding a career in homeland security. Challenges surrounding area of homeland security are the mounting financial burdens and the need for the appointment of leadership at a national executive level to address this realistic future threat. Despite these concerns, evidence suggests quality system practices can assist in guiding theses area and the adoption of tools that support quality improvement when addressing homeland security and future concerns.
...ts of terrorism against the United States. Homeland security has not only proven to be effective, it has shown that it is providing safety for the U.S. and its citizens against terrorist attacks.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
As the Department of Homeland Security continues to improve cyber security across all critical information sectors as well as in cyber infrastructure and network they are not effective. This lack of effectiveness comes from the overwhelming work load that is being put on one department which can cause one purpose to fail more than another and as a result the purpose fails as a