Verified Document

Department Of Homeland Security DHS  Research Paper

gov. Border Security. 2012. PP. 1). Customs, Coast Guard, and Immigration (INS) are working departments in this area. Preparedness, Response, Recovery refers to "providing a coordinated, comprehensive federal response and mounting a swift and effective recovery effort" (DHS.gov. Preparedness. Response. Recovery. 2012. PP. 1). FEMA is the direct provider of government action and coordination in this realm.

On Immigration, "the Department is responsible for providing immigration-related services and benefits such as naturalization and work authorization" (DHS.gov. Immigration. 2012. PP. 1). INS is the primary vehicle in this context however, cross-over with Border Security functions are common.

Lastly, DHS engages in cyber security "keeping our federal civilian networks secure, and secure the cyberspace and critical infrastructure on which we all depend" (DHS.gov. Cyber Security. 2012. PP. 1 ). This issue is a growing one and according to President Obama is "one of the most serious economic and national security threats our nation faces" (DHS.gov. Cyber Security. 2012. PP. 1).

Part B

1. Is the department logically organized for effectively fulfilling its mission? If so, explain why / if not, explain why. Be detailed.

Succinctly, no! The encompassing mission of the DHS is so broad...

Parts of this document are hidden

View Full Document
svg-one

The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.
2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the

Sources used in this document:
Succinctly, no! The encompassing mission of the DHS is so broad as to incorporate far too many active departments, agencies directorates, and components for the structure to effectively work. The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.

2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the
Cite this Document:
Copy Bibliography Citation

Related Documents

Border Security Karina Ordonez Discusses Border Security
Words: 718 Length: 2 Document Type: Essay

Border Security Karina Ordonez discusses border security issues that relate to homeland security, specifically the Arizona/Sedona portion of the U.S. / Mexico border. Although it is only a small portion of the actual border, it is currently the most porous part of the border. Therefore, as strategies are implemented to deal with border security, they are going to have to deal with this border. Despite that fact, Ordonez cautions against focusing

Border Security Effective Ways to Measure the
Words: 2610 Length: 9 Document Type: Essay

Border Security Effective Ways to Measure the Efficacy of Border Patrols According to the Department of Homeland Security (DHS): "protecting our borders from the illegal movement of weapons, drugs, contraband, and people, while promoting lawful entry and exit, is essential to homeland security, economic prosperity, and national sovereignty… Through increases in Border Patrol staffing; construction of new infrastructure and fencing; use of advanced technology -- including sensors, radar, and aerial assets --

Border Security in the United
Words: 2032 Length: 6 Document Type: Term Paper

Increased border security would keep this youngster at home where he belongs, and would also help do away with the smugglers (coyotes) who prey on the immigrants and charge them exorbitant sums to lead them across desolate deserts undetected. Along with increased border security, it makes good sense to strengthen the Customs Department and streamline the immigration process for legal immigrants who choose to follow the rules when they enter

Improvements in Border Security Since the Events
Words: 1290 Length: 4 Document Type: Research Paper

Improvements in Border Security Since the events of September 11, 2001 border security has been an increasingly contentious issue in United States politics and in everyday life. While most everyone in the country agreed that something must be done to stem the tide of illegal immigrants pouring into the U.S. seemingly unabated, there was some disagreement about the nature of the changes that needed to be implemented. While border security has

How Border Security Interacts with Homeland Security
Words: 1527 Length: 5 Document Type: Term Paper

National borders are far from arbitrary; they are important demarcations between one sovereign state and another. The foundation of national sovereignty depends on each nation protecting its own border, to achieve its own homeland security goals. In the United States, homeland security goals center on protecting the nation from foreign and domestic threats. To protect the nation from threats, it is essential to prevent would-be terrorists and criminals from entering,

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now