Verified Document

White House Security Plan Threats And Risk Essay

White House Security Plan Threats and Risk Assessments

There are a variety of different threats posing various levels of risks to the White House and its workers and inhabitants. The risk of an actual penetration by a small group of terrorists or militants carries a fairly low risk, given current security procedures and personnel; a heavy artillery military attack is even less likely given national defense systems and the sheer geopolitical implications of such an act. Greater subterfuge is likely to be employed in any truly risky threat; hidden bomb attacks, biological or chemical attacks with timed detonators or active triggers must be carefully screened for, as these represent one of the greatest threats to White House security in terms of both their potential damage and the likelihood of such an attack being attempted due to potential anonymity and attacker distance.

There are also many non-intentional and human-based threats that affect the security and safety of the White House and those within its walls. A variety of natural disasters including potential fires, earthquakes, hurricanes, and even potential flooding could all occur, and although the risk level for most of these events is very low the results of any such disaster could be catastrophic without appropriate countermeasures and safety procedures in place (FEMA 2011). It is believed that proper procedures, evacuation plans, and safety measures exist for each of these contingencies at the current time, although a reassessment and revaluation of these procedures and safety implements would still be valuable (WhiteHouse 2011). Plane crashes and direct espionage are also threats that have elaborate contingency plans established (Douglass 1995).

Current Vulnerability Gaps

A major current vulnerability facing the white house is found in the sheer number of individuals that have access to various parts of the White House and its grounds (WhiteHouse 2011). Though there are security procedures in place to screen such individuals prior to their selection for White House positions and onsite security screenings to ensure unauthorized weapons and personnel are not permitted onto White House grounds, the threat of infiltration through direct espionage is still considerable. There do not appear to be any other major vulnerability gaps facing the White House at this time, as potential threats of many different types and mechanisms are often observed and eradicated long before they come within range...

Other physical threats to the structure and inhabitants of the White House are mitigated by structural elements of the building, several emergency escape routes, and advanced warning systems that provide time for evacuation and preparation in the event of a natural disaster (WhiteHouse 2011). Aggression by authorized personnel remains one of the greatest physical threats.
Information Security

Increases in the digital storage and transmission of information has profoundly changed the nature of information security as practiced in the White House, though certain protocols involving paper documents are still in effect (WHHA 2001). A variety of specifically-developed as well as more commonly available methods for protecting digital information are utilized to ensure the security of information at the White House, and information transmitted to or from White House computers and their devices (Russel & Gangemi 1991). Given the importance of much of the information created and transmitted to/from the White House information security is a top priority for White House officials and officers, and control of access to information is incredibly tight and restrictive (Russel & Gangemi 1991).

Personnel Security

The security of certain individuals within the White House, most especially the President and his family, is also of central importance to security measures and practices at the White House. The personnel and technologies that monitor the White House grounds and surrounding environs are highly effective at dissuading, rooting out, and eliminating any threats to individuals within the White House (Douglass 1995). In addition, the Secret Service is tasked with the specific priority duty of protecting the lives of the President, his family, and other key individuals that are often found in the White House, and this organization has a very high success rate (though with some notable failures) in carrying out this task (WHHA 2001).

Liability Issues

Due to the special nature of the White House as a piece of federally owned…

Sources used in this document:
References

Douglass, D. (1995). Public Report of the White House Security Review. Washington, D.C.: U.S. Dept. Of Treasury.

FEMA. (2011). Accessed 24 April 2011. http://www.fema.gov/

Russell, D. & Gangemi, G. (1991). Computer Security Basics. New York: O'Reilly.

WhiteHouse. (2011). Accessed 24 April 2011. http://www.whitehouse.gov/about/
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Security Analysis in the UK
Words: 2541 Length: 8 Document Type: Essay

Security Report In the present day, organizations are reliant on information in order to continue being relevant and not become obsolete. To be specific, organizations are reliant on the controls and systems that have been instituted in place, which provide the continuing privacy, veracity, and accessibility of their data and information (Lomprey, 2008). There is an increase and rise in threats to information contained within organizations and information systems (Lomprey, 2008).

Risk Minimization and Loss Prevention
Words: 16256 Length: 59 Document Type: Term Paper

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Risk Assessment for Homeland Security Programs
Words: 1485 Length: 5 Document Type: Essay

Homeland Security Risk Management Risk Management in Homeland Security This paper provides a brief examination of the role of risk management within the homeland security operations. The discussion first addresses issues related to risk assessment, which is a necessary, prudent step for publicly funded activities, and particularly so given the national scope and the potential consumption of resources. The Strategic National Risk Assessment (SNRA) serves as a vehicle to link policy --

Risk Aversion Over the Last
Words: 4225 Length: 14 Document Type: White Paper

This was because they were seeing one of their primary competitors (Travelers) merging with Citicorp (which created a juggernaut of: insurance, banking and brokerage activities). At which point, executives at AIG felt that in order to: maintain their dominance in the industry and offer new products they should become involved in similar activities. The difference was that they would grow the company by expanding into areas that were considered

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now