Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Pros and cons of the homeland security act
Pros and cons of the homeland security act
Homeland security act essay
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Pros and cons of the homeland security act
The Homeland Security Act of 2002 impacted the American people without many of them realizing it. The act called for increased monitoring of computer networks, phone lines, and online history inside the United States and allowed the government to deport suspects (ACLU). What was created by the act has snaked its way into all aspects of our lives, creating a sense of order and restricting some freedom. However, some say that this imposition into our daily lives limits our freedoms and actions allowed us by the Constitution. Many interest groups voice strong resentment for the act while others try to demonstrate the strengths and triumphs of the Homeland Security Act. This paper will show the differing viewpoints of those that feel that the act has increased order and those that feel it has not done what it was intended to do. The Homeland Security Act was created in 2002 to try and improve coordination among the security related bureaucracies after September 11th. The act created an overarching organization that directed smaller bureaucracies such as the Transportation Security Administration, U.S. Secret Services, and the U.S. Coast Guard (Janda). As established in the act, the Department of Homeland Security’s primary mission is to “prevent terrorist attacks…reduce the vulnerability of the United States to terrorism...and…monitor connections between illegal drug trafficking and terrorism” among many other points of interest. The act gave powers to the Secretary that were to be carried out through the different subagencies (THOMAS). There are many that find that the act is too restrictive of the freedoms of citizens. For example, the American Civil Liberties Union (ACLU) provides cases of what they feel is the Homeland Securit... ... middle of paper ... ...hich side is correct based on their own beliefs and the factual information that is available. Works Cited Albanesius, Chloe. “ACLU Sues DHS over Laptop Searches.” PCMag.com. 26 Aug. 2009. Web. 10 Feb. 2010. American Civil Liberties Union. “Homeland Security Gave Pentagon Information on Anti-War Student Groups in California.” ACLU.com. 18 Jul. 2006. Web. 10 February 2010. Chaddock, Gail Russell. “Security Act to Pervade Daily Lives.” Csmonitor.com. 21 Nov. 2002. Web. 10 Feb. 2010. Fowler, Daniel. “Lawmakers Praise Obama’s Moves to Beef Up Cybersecurity.” Cqpolitics.com. 29 May 2009. Web. 10 Feb. 2010. Global Security. “National Strategy for Homeland Security.” GlobalSecurity.com. Web. 10 Feb. 2010. Homeland Security Act of 2002. House Rep. 107-609. 25 Nov. 2002. Web. Linder, Doug. “Exploring Constitutional Conflicts.” Law.umkc.edu. 2009. Web. 10 Feb. 2010.
Less than one week after the devastating terrorist attacks of September 11, 2001, the U.S.A. Patriot Act was introduced to Congress. One month later, the act passed in the Senate with a vote of 98-1. A frightened nation had cried for protection against further attacks, but certainly got more than they had asked for. Russell Feingold, the only Senator to vote down the act, referred to it as, “legislation on the fly, unlike anything [he] had ever seen.” In their haste to protect our great nation, Congress suspended, “normal procedural processes, such as interagency review and committee hearings,” and, “many provisions were not checked for their constitutionality, lack of judicial oversight, and potential for abuse.” Ninety-eight senators were willing to overlook key civil liberty issues contained within the 342 page act. The lone dissenting vote, Wisconsin Senator Russell Feingold, felt that our battle against terrorism would be lost “without firing a shot” if we were to “sacrifice the liberties of the American people.” Feingold duly defended American civil liberties at the risk of his career, truly exemplifying political courage as defined by John F. Kennedy.
Homeland Security Presidential Directive 5 directly relates to the National Incident Management System and the National Response Framework. In fact, it directly correlates with their missions. HSPD-5 was the directive that needed to start things in motion; NIMS and the NRF are the aftermath of the directive. With the formation of NIMS and soon after the NRF, America can operate successfully under one national manage...
U.S. Department of Justice. The USA PATRIOT Act: Preserving Life and Liberty. n.d. web. 11 November 2013.
Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: sacrificing civil liberties in the name of national security. New York: New Press.
American Civil Liberties Union. (n.d.). American Civil Liberties Union. Retrieved March 9, 2014, from https://www.aclu.org/fusion-centers-force-multiplier-spying-local-communities
After 9/11 there was a great increase in security nationwide. One major example of this is the number of agencies created as a result of 9/11. Among these agencies include the creation of the TSA (Transportation Security Administration), the DHS (The Department of Homeland Security), the ICE (Immigration and Customs Enforcement), and lastly the massive advancement of the US Coast Guard. Every one of the budgets of these agencies has doubled since 9/11. The creation of the transportation and security administrations primary goal is to improve the safety of all American Citizens traveling by plane. The TSA started implementing, new policies and new technological advancements.
Creating and managing agency budgets is a complicated process. How an agency receives and allocates its funds determines how, when, and if the agency will remain viable and how it will achieve its mission. “As a practical matter, therefore, agencies often base their annual budget request on last year’s budget after making incremental categorical changes of previous expenditures” (Stojkovic, Kalinich, & Klofas, 2012, p. 40). Organizations, however, are affected by the political climate around them. The September 11, 2001 attack on America brought a substantive reaction, including military deployment abroad and increased surveillance within the homeland. As a result, the Department of Homeland Security was created to control and coordinate a number of federal law enforcement and
Rose, Carol. "American Civil Liberties Union." American Civil Liberties Union. N.p., 08 Dec. 2012. Web. 12 Mar. 2014.
Richards, Neil M. "The Dangers Of Surveillance." Harvard Law Review 126.7 (2013): 1934-1965. Academic Search Elite. Web. 8 Feb. 2014.
Since September 11, 2001 many people can say that America has changed. Many people question if America has changed for the better or has it just gotten worse. Since the day those four planes crashed around the United States people’s lives have been changed. Many may not realize how their lives have changed, but with new laws passed life is different within America. The United States Patriot Act is one of the laws passed after 9/11: singed into order on October 26, 2001 just 45 days after the attack. The United States Patriot Act was put in place in order to protect Americans, yet has been affecting American’s civil liberties and caused controversy all over the United States.
September 11th 2001 was not only the day when the delicate facade of American security was shattered, but it was also the events of this day that led to the violation of the rights of millions of American citizens. After relentless reprehension by the American masses on the approach that was taken after the 9/11 attacks ,the Bush administration enacted the Patriot Act on October 26th, 2001, a mere 56 days after this tragic event.The Patriot Act expanded the authority of U.S. law enforcement agencies so that they could hopefully avert future terrorist attacks. Under the Patriot Act The NSA (National Security Agency) could entrench upon the privacy of the citizens of the U.S. without public knowledge, consent or, probable cause. The particular incident which had the general public up at arms was when the NSA illicit surveillance came to public knowledge.
ACLU. "What's Wrong With Public Video Surveillance?" American Civil Liberties Union. N.p., 25 Feb. 2002. Web. 10 Nov. 2013.
In recent years, many possible plans to enact government regulation to improve cybersecurity have been suggested. Most recently, in 2017, then U.S. president Barack Obama implemented the Cybersecurity National Action Plan (CNAP). The plan would have invested $19 billion in cybersecurity by gathering experts to make recommendations in regards to cyber security, help secure the government IT group, and encourage more advanced security measures (Daniel 1). However, while CNAP does present a way to solve the problem, it just adds another program that attempts to enhance cybersecurity: “It is the multiplicity of programs and division of responsibility that diminishes their effectiveness. At least eleven federal agencies bear significant responsibility for cybersecurity” (Cohen 1). Every so often, another cybersecurity program will be established, but former plans are seldom removed. This leads to a large amount of departments to share responsibility, which creates general confusion and limits each department’s power. Furthermore, widespread government regulation may weaken cybersecurity. Many fear that any regulation would not be flexible enough and would instead allow easier hacking (Ridge 3). If every system in the entire nation had the same security measures, it would be much easier to break into as by breaking into one system, a hacker a could break into everything.
Gonchar, Michael. “What Is More Important: Our Privacy or National Security?” New York Times. New York Times, 17 Sept. 2013. Web. 22 Feb. 2014.
...ama, B. (2009, May). Remarks by the President on Securing Our Nation’s Cyber Infrastructure (President). Conducted at the East Room of the White House, Washington, DC. Retrieved from http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure