Verified Document

Department Of Homeland Security DHS  Research Paper

gov. Border Security. 2012. PP. 1). Customs, Coast Guard, and Immigration (INS) are working departments in this area. Preparedness, Response, Recovery refers to "providing a coordinated, comprehensive federal response and mounting a swift and effective recovery effort" (DHS.gov. Preparedness. Response. Recovery. 2012. PP. 1). FEMA is the direct provider of government action and coordination in this realm.

On Immigration, "the Department is responsible for providing immigration-related services and benefits such as naturalization and work authorization" (DHS.gov. Immigration. 2012. PP. 1). INS is the primary vehicle in this context however, cross-over with Border Security functions are common.

Lastly, DHS engages in cyber security "keeping our federal civilian networks secure, and secure the cyberspace and critical infrastructure on which we all depend" (DHS.gov. Cyber Security. 2012. PP. 1 ). This issue is a growing one and according to President Obama is "one of the most serious economic and national security threats our nation faces" (DHS.gov. Cyber Security. 2012. PP. 1).

Part B

1. Is the department logically organized for effectively fulfilling its mission? If so, explain why / if not, explain why. Be detailed.

Succinctly, no! The encompassing mission of the DHS is so broad...

The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.
2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the

Sources used in this document:
Succinctly, no! The encompassing mission of the DHS is so broad as to incorporate far too many active departments, agencies directorates, and components for the structure to effectively work. The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.

2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the
Cite this Document:
Copy Bibliography Citation

Related Documents

Homeland Security and the War on Terror
Words: 4940 Length: 16 Document Type: Research Paper

Homeland Security and U.S. Intelligence Formation of Department of Homeland Security & U.S. Intelligence on Terrorism Definition of Intelligence Rationale for Formation of DHS Effectiveness of DHS Importance of Intelligence & Analysts Research Philosophy Research Methods & Its Limitations Data Collection & Analysis National security has been a major concern for United States in past few decades. However, since 2001, this concern has turn into a serious threat for national security. The given research is performed with the intent

Department of Homeland Security the
Words: 1212 Length: 4 Document Type: Research Proposal

The other major component of the Department of Homeland Security that doesn't belong is FEMA, the Federal Emergency Management Agency. This is the only component of the Department that is not involved in preventing security threats that human in nature; its main purpose is to aid citizens and local governments in times of natural disaster. Again, communication with the Department would be necessary, but involving the response agency's involvement

Department of Homeland Security the
Words: 985 Length: 3 Document Type: Essay

Their casualties go uncounted, their actions largely unmonitored and their crimes unpunished." Scahill relates that four years into the Iraq occupation "there is no effective system of oversight or accountability governing contractors and their operations, not is there any effective law - military or civilian being applied to their activities." (2007) According to Scahill's report: "Since the launch of the "global war on terror," the administration has systematically funneled

DHS and Its Use of Machine Learning for Security Purposes
Words: 2970 Length: 10 Document Type: Capstone Project

The Influence of AI on Future Performance of Homeland Security Functions in Cyber SecurityOverviewCyber security is a crucial aspect of Homeland Security in the Digital Age. Under the DHS, cyber security efforts focus on combating cyber crime, developing and implementing a cyber incident response function, maintaining the cyber security of networks within the federal government, securing critical infrastructure, implementing cyber security governance, and sharing information in a safe and effective

Homeland Security Assessment the State
Words: 1216 Length: 4 Document Type: Research Paper

("Lynchburg Virginia Emergency Operations Plan," 2012) Elements of Disaster Response, Recovery, and Incident Command In the event of a disaster, the City Manager is appointed as the local spokesperson for all issues, events and the coordination of resources. They work directly with the Mayor and the City Council (who sit as an advisory board to the City Manager). In the event that there are any political issues, the Mayor will interact

DHS App
Words: 493 Length: 2 Document Type: Essay

DHS: FEMA 2010 Compared to 2011 The objective of this study is to compare what happened within FEMA in 2010 and 2011. Toward this end, this study will conduct a review of literature in this area of inquiry. The United States Congress appropriate more than $34 billion in grant funding for homeland security preparedness from fiscal year 2002 through fiscal year 2012. It is additionally reported that between 2002 and 2012 that

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now