Verified Document

DHS App Essay

DHS: FEMA 2010 Compared to 2011 The objective of this study is to compare what happened within FEMA in 2010 and 2011. Toward this end, this study will conduct a review of literature in this area of inquiry.

The United States Congress appropriate more than $34 billion in grant funding for homeland security preparedness from fiscal year 2002 through fiscal year 2012. It is additionally reported that between 2002 and 2012 that Federal Emergency Agency (FEMA) administers grew "from 8…to 17…as the result of congressional and executive branch actions." (Government Accountability Office, 2013, p.1)

The Government Accountability Office reports that FEMA fails to "compare and coordinate grant applications across its preparedness programs to identify potential duplication." (Government Accountability Office, 2013, p.1) Additionally reported is that FEMA has failed to establish "…measurable...

FEMA 2010
The Government Accountability Office reported in October 2010, that FEMA had failed to develop national preparedness capability requirement that were of a measurable nature resulting in the January 2011 establishment of a strategic priority by FEMA Administrator that was referred to as "Whole of Community'. This strategy identified specific requirement and capabilities for ensuring that actions for recovery and response are motivated by the affected community needs in times of catastrophic disaster.

The plan for FEMA is the generation of measurable national preparedness capacity requirements and criteria for evaluation. It is stated that until FEMA…

Sources used in this document:
Works Cited

Homeland security/Law enforcement (2012) Government Accountability Office. Retrieved from: http://www.gao.gov/modules/ereport/handler.php?1=1&path=/ereport/GAO-11-318SP/data_center/Homeland_security -- Law_enforcement/FEMA_needs_to_improve_its_oversight_of_grants_and_establish_a_framework_for_assessing_capabilities_to_identify_gaps_and_prioritize_investments

FEMA's Efforts To Recoup Improper Payments in Accordance With the Disaster Assistance Recoupment Fairness Act of 2011 (6) Department of Homeland Security. Retrieved from: http://www.oig.dhs.gov/assets/Mgmt/2013/OIG_13-100_Jun13.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Homeland Security and United States V. Jones, 565 U.S. 2012
Words: 2776 Length: 9 Document Type: Essay

Introduction Homeland Security is tasked with the responsibility of safeguarding the US from threats, both foreign and domestic. In the age of technological revolution unseen and unrivaled in any previous era of human history, digital surveillance is both more commonly accepted and viewed suspiciously by people who use cell phones, the Internet, social media, or even vehicles where GPS tracking systems are built-in. Many people allow Google, a public company, to

Security Policy and Risk Strategy
Words: 1383 Length: 4 Document Type: Essay

The most appropriate products that could be used by MMC to achieve this objective would be: IP San and a Snap Lock. An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide

Security for Mobile Devices
Words: 1739 Length: 6 Document Type: Research Paper

Security: Mobile Protection As the Internet has become the dominant means of communicating, sharing information, tending to business, storing data, and maintaining records in the Digital Age, the importance of security for the digital world has become more and more realized (Zhang et al., 2017). Not only do companies have to invest in digital security in order to safeguard against threats and risks such as hacking or malware, but individuals also

Terrorism Is at This Point One of
Words: 2444 Length: 8 Document Type: Term Paper

Terrorism is at this point one of the main threats that decision makers in the field of national security have to deal with especially in the United States. The issue has been raised mainly after the events from 9/11 2001, but have been a constant concern for the law enforcement agencies since the beginning of the 90s and even before. The United States have a particular way in which it

Invention of the Internet Has
Words: 6685 Length: 20 Document Type: Capstone Project

This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now