Strategies to improve collaboration and cooperation between the Homeland Security agencies
The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland Security Review) was completed in the year 2010 with an objective of establishing an incorporated strategy for the goals and missions of homeland security (Homeland Security, 2005). Following this, DHS carried out a BUR (Bottom up Review). The objective was to synchronize organizational structure and programmatic activities in order to effectively achieve the goals and missions of homeland security.
The primary duty of homeland security is to protect the U.S. from any terrorism. The counterterrorism duties of the DHS are concentrated on these three goals i.e. First goal is protecting and resisting any terrorist attacks: In this, the DHS prevents illegal acquisition, movement, importation, or application of biological, chemical, nuclear and radiological materials and such capabilities inside the U.S (DHS, 2018). The second goal is to reduce key resource and critical infrastructure vulnerability, prevent terrorist attacks on major events, essential leadership and other such like hazards. DHS secretary, Napolitano initiated and guided the worldwide initiative for enhancing the international systems of aviation through collaboration and partnerships with industry and governments, new technology investment, and strengthened targeting initiatives (DHS, 2018).
The secretary also started the awareness campaign encouraging people to be vigilant. This has been an effective and simple strategy that helps to raise the level of public awareness with respect to terrorism indicators, threat and crime indicators as well as accentuate the need to report any unusual activities to the enforcement agencies. This campaign was initiated in collaboration with SAR (Suspicious Activity Reporting) initiative (DHS, 2018). SAR encouraged administrative efforts towards training the local and state enforcement agencies on behavior recognition strategies and the pointers associated with terrorist activities and specific threats as well as sharing and reporting of information concerning awkward activities or incidents. The reports trigger an analysis aimed at identifying broad trends (DHS, 2018).
DHS has also continually enhanced the fusion centers in the urban areas. It is DHS that secures the air, sea, and land boarders in order to protect the country from illegal activities while at the same time facilitating lawful trade and travel (DHS, 2018). The management efforts for border security is focused on 3 goals that are related and they are effective security for the sea, air and land borders, streamlining and safeguarding lawful travel and trade, and dismantling and disrupting transnational terrorist and criminal organizations. DHS continues to position resources, technology, and personnel along the southwestern border while at the same time getting into agreements with the international partners and the national law enforcement (DHS, 2018). This helps encourage cooperation and enhance information sharing in order to narrow down on any transnational threats without compromising trade and travel (DHS, 2018).
In combating the detrimental crime of human trafficking DHS initiated the blue movement which entails advanced training for local and state enforcement officers. The blue movement entails international radio, video, and print campaign, multilingual awareness campaigns locally in newspapers printed in fifty foreign languages, assistance materials for victims distributed at the entry port, as well as the DHS website which...
Homeland Security and Preparedness, Response, Activities and Programs in Disaster Response or Disaster Recovery The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge. The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11,
Traffic Analysis/Homeland Security One of the biggest challenges currently faced by the Department of Homeland Security is guaranteeing cybersecurity. Each and every day some type of cyber crime occurs. Such crimes have the potential to affect the country's national security. This paper investigates the significance of internet traffic and analysis to Homeland Security. It will look at the importance of internet traffic and analysis to Homeland Security as well as encrypted
Global Terrorism Right and left wing extremism, which are both forms of domestic or home-grown terrorism, have a rather long history in the U.S. Generally motivated by Marxist and communist ideologies, left wing extremism emerged as early as the late 19th century (White, 2016). Nonetheless, left wing extremism in the U.S. became more prominent in the 1960s and 1970s, with Weather Underground, Black Panthers, and Students for Democratic Society being the
The Failures of the Intelligence Community Leading to 9/11IntroductionThe investigation of the 9/11 terrorist attacks revealed a massive failure of the U.S. intelligence community. Despite numerous signs pointing to an impending terrorist attack, the intelligence community failed to prevent the deadliest terrorist attack on U.S. soil. One of the main issues was the lack of coordination and seriousness among the various branches of US intelligence. This paper discusses these failures
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now