Verified Document

9 11 Commission Report And Its Recommendations Research Paper

Study of Recommendations from the / Commission

Recommendations from the 9/11 Commission

Among the US citizens, 9/11 is one of the renowned dates that has remained clear onto their memory calendar following terror incidents. As a result, there was an absolute need for the federal government to develop an extensive security framework as soon as possible. Such a security framework was to protect American residents from any form of external attacks coming from abroad and enable the local, state, and federal to prepare and respond to internal challenges and threats. Subsequently, a commission was put in place to conduct security inquiry and analysis to inform the countrys next step of action. In response to the framework, a critical element that includes creating the Department of Homeland security encompassed 22 different offices and agencies into one cabinet department. The commission was founded with the co-principle of protecting the people of America from threats of terrorism activities. The Department of Homeland Security (DHS), with other partners and communities across the country, has helped to strengthen the enterprise of homeland security to mitigate any potential threats (Kean & Hamilton 2004).

Consequently, the United States has progressively made substantial efforts to secure the nation from any terror attack from September 11 attacks. However, due to time, the countrys terror threats have evolved over the last two decades. With the emergence of new challenges, the Department of Homeland Security continues to concentrate on minimizing terror risks while maximizing the countrys ability to recover and respond to any form of attacks and security disasters of all forms. As a result, to address some of the commissions recommendations of 9/11, the country adopted some of the key recommendations that, to date, have effectively contributed to safety and security enhancement within the United States borders. Such recommendations include;

a) Expanding sharing of information; With the creation of a department of homeland security, United States has significantly improved the enterprise of homeland security that included several components like sharing of security information that was not in place as of 9/11. Also, an established 72 fusion centers across the nation serve as the central point of gathering, receiving, sharing, and analyzing any threat-related data between the federal government and tribal, private, local, and territorial sector partners. An established Countrywide Suspicious activity alerting body educates the local and state law enforcers to detect indications related to terrorism and other threats. The body also has the mandate to standardize how such observations are analyzed, documented, and dispatched to the nations federal government and other communities. Furthermore, the systems of national terrorism advisory currently provide detailed and timely data about threats of terrorism and recommend various security measures to the government agencies, public, private sector, and transportation hubs (Kean & Hamilton 2004).

b) Creation and adoption of risk-based security strategies on transportation; Department of homeland security has implemented tangible progress in risk-based security as from 9/11 and focused on intelligence-motivated structured security across all the modes of transportation. The approach has heightened pre-screening of cargo and passengers while paying attention to resources on those that present threats to national transportation networks. Some of the measures currently taken include; carrying out security assessments across maritime, surface transportation networks, and aviation sectors. The United States has also come up with new global aviation standards to strengthen global supply chain security. There is...

…System and the communications integration center used as the central hub for executing cyber response efforts (Hastedt, 2006).

Nonetheless, some of the 9/11 commission also have not been very instrumental in ensuring America is secure. For instance, on a personal assessment, the commissions recommendation of complete safeguard of civil liberties, civil rights, and privacy has not effectively attained its intended purpose. Currently, the DepartmentDepartment of homeland security has opened a private office for all the federal agencies, where the enforcement of civil rights, civil liberties, and privacy protection takes operation. The requirement of the DepartmentDepartment of homeland security to partner with every component of the DepartmentDepartment of homeland security to assess systems, policies, programs, privacy risks, technologies and to recommend appropriate mechanisms of handling personal information has for a long time worked against the interest of securing vital information by the security experts. Protecting individual freedom and personal information is a human right; however, whenever such rights compromise the countrys security and its citizens, the DepartmentDepartment of Homeland security opts to have the mandate to override such freedoms (Kean & Hamilton 2004).

To conclude, most of the 9/11 commissions recommendations were very good and have significantly contributed to security enhancement in the United Stats. However, the challenges of insecurity worldwide evolve daily, thus making some adjustments to the commissions recommendations to cope with the current challenges. Subsequently, one of such recommendations that deserve an adjustment is heightening the border security and identifying documents. Due to increased use of technology and forgery of documents, including travel documents, the United States should refocus on biometric identification at its borders as a mandatory screening form to filter out some individual who still manages to get away with…

Sources used in this document:

References

Shea, D. A., & Morgan, D. (2007, April). Detection of explosives on airline passengers: Recommendation of the 9/11 Commission and related issues. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.

Kahan, J. H. (2013). What’s in a name? The meaning of homeland security. Journal of Homeland Security Education, 2, 1.

Fong, I. K. (2010). Current State of Homeland Security, The. Rutgers L. Rev., 63, 1135.

Hastedt, G. (2006). 9/11 Intelligence Reform: an opportunity lost. American Diplomacy.

Kean, T., & Hamilton, L. (2004). The 9/11 commission report: Final report of the national commission on terrorist attacks upon the United States (Vol. 3). Government Printing Office.

Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Securities Regulation of Nonprofit Organizations
Words: 12607 Length: 45 Document Type: Dissertation or Thesis complete

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now