Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The role of homeland security
The role of homeland security
How are computers used in homeland security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The role of homeland security
Computers in Homeland Security Ever since September 11th, 2001, our nation has been completely obsessed with our own security and prevention of another tragic incident. Through this experience leaders of our country have developed a system that would allow civilians of the status of our nation?s safety. It is called Homeland Security. Homeland Security was developed with several purposes. These include: increase overall preparedness, particularly for catastrophic events, Create better transportation security systems to move people and cargo more securely and efficiently, Strengthen border security and interior enforcement and reform immigration processes, Enhance information sharing with our partners, Improve DHS financial management, human resource development, procurement and information technology, Realign the DHS organization to maximize mission performance (Home Land Security Agenda). President Bush even came up with a color code that warns the nation of the terror threat. Red means severe. Orange is High. Yellow is elevated. Blue is guarded. Green is low. However, it is made up of some of the most advanced technology in the world. These computers allow the leaders to use their color coded system to send out warnings which allow us to prevent being vulnerable. Computers are the technology and they are what the government relies on to ensure that we are all safe. One important part of the Homeland Security is the US-CERT. The US-CERT program was invented in 2003, and severs as our internet infrastructure. This branch of Homeland Security is run by the National Cyber Security Division. The acting director of US-CERT is Donald A. Purdy Jr. It protects our internet from cyber attacks. This technology is responsible for analyzing and reducing cyber threats and vulnerabilities, disseminating cyber threat warning information, as well as coordinating incident response activities. The locations of US-CERT are in Arlington, Virginia and Pittsburg, Pennsylvania. ?It relates to the Department of Homeland Security because it was established to serve as the federal government?s cornerstone for cyber security coordination and preparedness, including implementation of the National Strategy to Secure Cyberspace? (Department of Homeland Security). This technology regulates the internet protocols in hopes to make virus and cyber attacks easier to detect and prevent. They also are targeting such crimes as identity theft, financial fraud, and network intrusions. Another crucial point of this security system is being ready for the worst.
Homeland Security Presidential Directive 5 directly relates to the National Incident Management System and the National Response Framework. In fact, it directly correlates with their missions. HSPD-5 was the directive that needed to start things in motion; NIMS and the NRF are the aftermath of the directive. With the formation of NIMS and soon after the NRF, America can operate successfully under one national manage...
After 9/11 there was a great increase in security nationwide. One major example of this is the number of agencies created as a result of 9/11. Among these agencies include the creation of the TSA (Transportation Security Administration), the DHS (The Department of Homeland Security), the ICE (Immigration and Customs Enforcement), and lastly the massive advancement of the US Coast Guard. Every one of the budgets of these agencies has doubled since 9/11. The creation of the transportation and security administrations primary goal is to improve the safety of all American Citizens traveling by plane. The TSA started implementing, new policies and new technological advancements.
and their use. In Committee on Deterring Cyber attacks: Informing Strategies and Developing Options (Ed.), Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. Washington, D.C.: National Academies Press.
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
This paper will briefly discuss the formation of the Department of Homeland Security (DHS). With every government program or agency comes an alphabet soup of acronyms and DHS is no different from the rest. To better understand the agency and concepts that comprise DHS, this paper will also examine acronyms associated with DHS. They are QHSR, HSE, NRF, NIMS, ICS, and UC. Each will get a description while highlighting and discussing core elements or requirements that each acronym calls for or offers.
As we move steadfast into the twenty-first century we are confronted with more complex and compromising issues affecting the intricately connected global system. New forms of aggression and threat are the faces that greet policy-makers as they spend countless hours configuring ways to counter future attacks such as terrorism or massive drug trafficking within and across national borders. Instead of submitting ourselves to the tyranny of chance, which cruelly deals out futures blighted with catastrophes that can remain vivid in our memories, President George W. Bush has issued a mandate in an attempt to regain control over future acts of aggression such as terrorism in the United State; he issued the Executive Order of Homeland Security as that initial step.
Homeland security was developed by the United States government to protect the country from external aggression, reduce the likelihood of terrorist attacks and manage the damage that occurs in case of attacks. To this end, the government set up and reconstituted numerous agencies to aid in the fight against terrorism in the United States. The United States Department of Justice and Department of Homeland Security constitute the most prominent departments under the United States law to champion the fight against any attacks by extremist groups. Federal, State and local law enforcement agencies, as well as the United States’ military also have a role to play in homeland security. With the increasing cases of attacks and acts of aggression towards the United States, the government sought to strengthen the resolve to curb any attacks aimed at killing or maiming the citizens or destruction of government institutions and installations. In the wake of the September 11 attacks, it was apparent that stringent measures were needed to prevent attacks on American soil and protect the citizens of the country. This paper examines the duties; responsibility and intelligence methods used by the military, federal, State and local law enforcement agencies, as well as homeland security agencies in the fight against terrorism, with the aim of drawing similarities and differences.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
The first area is the Department of Homeland Security’s mission. The Department of Homeland Security (DHS) was created in 2002 by the Homeland Security Act. In 2003 the DHS started their operations. The DHS primary responsibilities and objectives includes prevention, protection, and response to issues that threaten national security. There are five core missions that define the DHS: Managing and securing our nation’s borders, strengthening security initiatives to help prevent terrorism, administering and enforcing the nation’s immigration laws, ensuring that the nation can rebound fast and or prevent disasters, and ensuring the internet is secure by instituting safeguards that protect the nation against cyber-attacks. (TWH, 2003)
Col. Randy Larson, renown author and Director of the Weapons of Mass Destruction (WMD) Center, speaks on an in-depth prospective of the field of homeland security and factors that drive the continued efforts to address future threats to the nation for the 21 century. The area of focus presented in the interview are the various ways an individual may enter the field but are not limited to a particular area of study. For example, health care, agriculture, or political science, there is essential no set track for finding a career in homeland security. Challenges surrounding area of homeland security are the mounting financial burdens and the need for the appointment of leadership at a national executive level to address this realistic future threat. Despite these concerns, evidence suggests quality system practices can assist in guiding theses area and the adoption of tools that support quality improvement when addressing homeland security and future concerns.
It is unrealistic to imagine that the copious amount of departments responsible for cybersecurity are able to adequately protect the country; therefore, the government needs to form one department that can be responsible for all cybersecurity problems and cyberattacks. When forming this new department, resources from other groups that currently share responsibility can be moved in order to decrease the amount of resources needed for the new group. But, it is also unfathomable for the government to be responsible for all cybersecurity as “... the reality is that while the lion’s share of the cybersecurity expertise lies in the federal government, more than 90 percent of the physical infrastructure of the Web is owned by private industry” (McConnell 4). Therefore the government must collaborate with the private sector. This cooperation can be utilized to help form the new government group as “there is also an opportunity for the new agency to be formed in a more deliberate way, drawing on leadership from the private economy to promote efficiency and cost-effectiveness” (Cohen 2). By working with the private sector, the new agency can reduce costs of personnel and equipment, increase performance, and maintain diverse cybersecurity plans. Once a
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
Tragedies like 9/11 and domestic terrorism can both be prevented with increased homeland security. To prevent attacks like 9/11 from happening in the future, address issues with domestic terrorism, and the growth of homeland security, the U.S. still needs to be concerned with terrorism. Disasters like 9/11 still need to be prevented in the United States. The U.S. needs to be more involved with terrorism in general to keep domestic attacks from happening. Homeland security needs to be studied and improved in order to prevent terrorism.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.