¶ … Department of Homeland Security is clearly start-up: How quickly can DHS be up and running? The department formally began operating on January 24, 2003, and by March 1 had absorbed representatives from most of its component parts. The formal process of transferring agencies is expected to be completed by September 30, 2003, but analysts suggest full integration of agencies will take at least several years.
Notwithstanding, as a practical matter, the new department today is preoccupied with day-to-day start-up issues: finding a physical location, improving communications capabilities, and personnel management tasks. Finding a location for the agency is key. DHS headquarters is currently at a temporary location with the majority of additional personnel scattered elsewhere. Practical staff questions about, for example, new office location and supervisor, remain for the most part unanswered.
Questions abound about how the new organizational components will communicate with each other. Linking phone systems and databases (most of the 22 agencies have their own internal computer systems and communications systems, as well as different e-mail systems) remains a pressing challenge of the first magnitude.
Human resources issues abound as well, for example, hiring, firing, retirement, processing of the payroll, and assignment to new tasks. Enormous pressure exists to fill positions. Yet, as of early March 2003, most of the senior and critical jobs in DHS were still unfilled. Only 3 of the department's top 23 man-agers had been confirmed by the Senate, and nominees for most of those jobs had not been decided.
What are some of the challenges and practical problems facing DHS as it seeks to integrate agencies such as the Coast Guard, the INS, and the Transportation Security Administration (TSA) into one organization, while at the same time not incorporating others, such as the FBI and CIA? Compounding this concern is the relative autonomy of some of the transferred federal agencies, such as the Coast Guard and Secret Service. What new controls and guidance will they face? In a broader context, the new department has been likened to an interior ministry but without a national police component.
A major challenge facing the department is how to effectively join border security functions and interior functions into an organization that has centralized leadership and decentralized operations. Moreover, DHS must coordinate a net-work of disaster response capabilities, while at the same time seeking to become a central focal point for analysis and dissemination of intelligence. At the same time, the organization is charged with joining research and development efforts to detect and counter potential terror attacks with the goal of shoring up vulnerabilities of the nation's critical infrastructures to include its ports, utilities, and food and water supply -- no small task!
A second issue relates to the functions that differing DHS components will perform. Clearly, in this new organizational arrangement, some agencies, such as the Coast Guard and Secret Service, will probably not change dramatically in the way they are managed and operate. However, the way that functions of other agencies will be orchestrated in this new setup is far from finalized. Yet to be seen are the additional functions or components that will emerge from the department. One new function is likely to be creation of a full-time, permanent red team that will simulate terrorist threats and test the security of installations, such as nuclear plants and government buildings. Another new function assigned to the department is oversight of visa processing. How will this be worked out with the State Department? Moreover, what, if any, will the operational role of DHS be in its many areas of responsibility?
A third and crucial issue is how intelligence will be moved through the system and shared. It is not clear the degree to which the department will have its own intelligence analysis group. Absent a strong in-house intelligence analysis component, it may be that DHS will have to rely more heavily on predigested information from many other agencies. As it starts up, the new department ' s intelligence role will be limited, primarily linking analysis from a newly created interagency Terrorist Threat Integration Center (TTIC; see below) to efforts to strengthen the defenses of critical infrastructures.
On January 28, 2003, President Bush announced creation of the Terrorist Threat Integration Center. The new center will be responsible for fusing and analyzing domestic and foreign intelligence related to terrorist threats. It is chaired by the Director of Central Intelligence (DCI) and will be staffed by members of the intelligence community, the law enforcement community, and DHS. Reportedly, the center will have access to all intelligence information available to the U.S. government, both raw and processed. Creation of the TTIC, however, is considered controversial by some in Congress who are...
Weapons of Mass Destruction 1 An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a
Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year
Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now