When the topic of Homeland Security is introduced, the first thought that comes to mind is either 9/11 or the Transportation Security Administration, TSA for short. No matter the reference, most Americans know that Homeland Security has something to do with Terrorism. Until an actual attack occurs, or election season begins, the average person may never give any thought or credit to the Department of Homeland Security. Homeland Security goes far beyond terrorism and terrorism prevention. Homeland Security does not just encompass holding individuals up at airports for multiple hours to intentionally hinder passengers from catching their flight out of the Caribbean. Homeland Security is multiple levels of legislation; law and policy to prevent …show more content…
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
“The Homeland Security Act of 2002 established the federal United States Department of Homeland Security. Its stated mission is to secure the nation against terrorist attacks, to protect against and respond to threats and to ensure safe and secure borders” (Andrew, C., & Walter, F., 2013). “In addition to reducing the nation’s vulnerability to terrorism, the act was also created minimize the damage and facilitate recovery from any attacks that may occur” (Homeland Security, Department of, 2017). Many people want protection from dangerous situations, but what’s the cost of protection.
The Department of Homeland Security is responsible for securing our nation’s borders and transportation systems, they manage who and what enters our homeland and work to prevent the entry of terrorists and the instruments of terrorism. In addition, if it is really hard for the terrorist or the bad to enter the country. It will be extremely hard for them to attack the United States. Many suspicious terrorist groups and organizations are under a microscopic viewpoint from the group of Homeland Security because it is their job to help secure our borders, airports, seaports, and waterways. In the article it says, “Data suggest that, in the year after the attacks, agencies' participation in all of Stewart and Morris' homeland security activities was not high and statistically significant differences
1. Is the "war on terrorism" truly a war? In your opinion, how has the New Terrorism affected and redefined how nations pursue warlike options?
The original goal of the Department was to enhance the safety of the American citizenry. Unfortunately, this has not occurred as the resources of the Department of Homeland Security have been so widely spread that increasing the safety level of the nation has taken a back seat to other concerns and what additional security that has been provided has come at the expense of the civil rights of the American citizens (Kettl, 2004).
Security, however you may think of it the measures we take for it can never enough. It's like insurance you have it not because you want something to happen but because you know that things do happen. That is the United States Border Patrol and Customs they are our first line of defense to the war on drugs and the war on terrorism, for that they have the illegal immigration policy and the pros and cons (www.kyma.com/news/securing-america/646148044.).
As previously mentioned, the purpose of the Department of Homeland Security is to promote concerted nationwide efforts in securing the American homeland and way of life. This purpose is achieved through securing the nation's borders, thwarting terrorist attacks, and responding to threats effectively. The department also works to thwart, contain, and counter threats from international criminal activities and national disasters. As part of accomplishing its objectives, the Department of Homeland Security has
Homeland Security is a relatively new concept that became a national issue following the terrorist attacks on September 11, 2001. There are multiple definitions that define what Homeland Security is. According to Defining Homeland Security: Analysis and Congressional Consideration, “Homeland Security, regardless of the definition or strategic document, is a combination of law enforcement, disaster, immigration, and terrorist issues. It is the responsibility of civilian agencies at all levels. It is a coordination of efforts at all levels of government” (Reese, 2013). The 2010 Quadrennial Homeland Security Review and Report defines Homeland Security as” a concerted national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive”. (Homeland Security, 2010) There are multiple Federal, State and Local agencies involved in
Later, the federal, state, and local government responses to disasters such as Hurricane Katrina expanded the concept of homeland security to include significant disasters, major public health emergencies, and other events that threaten the United States, its economy, the rule of law, and government operations (2). Homeland security is the combination of law enforcement, immigration, disaster relief, and terrorist activities within the United States’ borders. This would be based on the local agencies and civilian departments to safeguard the people from any threat within while being assisted by the government. In some aspects of terror attacks, there will be a combination of both homeland security and homeland defense. 9/11 is the perfect example as homeland security was responding to the local disasters and threats while the homeland defense, military, was deploying to get to the root of the threats. This is essential to the way homeland security operates because this will stop the attack on the nation’s soil before it reaches the borders and local government agencies are required. The biggest issue with the homeland security aspect is that the
The Department of Homeland Security has an annual budget of 50 billion dollars but within the department there are nearly two dozen separate administrative agencies that have a variety of different tasks. The agencies depend on others such as the National Science Foundation to provide resources on the study of terrorism. Information from the different agencies is used to make decisions and develop policies (Eller, Gerber 2010).
In this research paper, I am going to discuss the plan that the Department of Homeland Security has set forth for the years of 2012-2016. This plan outlines the entire vision of the department to essentially accomplish their missions and goals. The plan consists of missions varying from border security to cyber security. We must not forget the men and women on the front line working hard to ultimately secure and provide safety for the United States of America.
“We have learned as a Nation that we must maintain a constant, capable, and vigilant posture to protect ourselves against new threats and evolving hazards. But we have also learned that vigilance and protection are not ends in and of themselves, but rather necessary tools in the service of our national purpose.”(Napolitano, 2010, p.iv) In the wake of the September 11th, 2001 attacks our nation has taken upon itself extreme vigilance to ensure the security and defense of the American people. The relationship between homeland security and homeland defense is one that is tightly knit. Each has a very distinct mission set but somewhere along the spectrum they cross over and mutually support each other in the best interest of the nation.
Secretary Johnson, this memo is being addressed to you on the basis that the foreign policy issue that is threats to cyber security is of interest to the Department of Homeland Security. In brief explanation of the issue at hand, it can be concluded that the major foreign policy problem of cyber security threats has created and will continue to create imitate danger to the United States of America. The act of breaching the security sustained around private networks has become renowned as a type of terrorism, one that has rapidly evolved since the beginning of the 21st century and has gained even more strength with the increased use of computers. This threat has the potential to risk the exposure of the nation’s most valuable information including government documents, military plans that are considered top secret, and even the United States power grid. The convenience and the ease of use has made this threat greater as individuals conducting what has become known as cyber attacks can be thousands of miles away from the network they hack into. In order for this threat to be combated efficiently, a brief history based around the issue must be conducted as well as an examination of possible alternatives before concluding with the best proposed solution that will bring this threat under control and ultimately aim to eliminate it.
From the advent of the Internet, there came with it the opportunity for any of its users to have access to any information they seeked right at their fingertips. With this access; entertainment, market opportunities, educational information, productivity, and global communication were able to grow and flourish, however with these gains seen came with it the weakening of the once secure national strength seen in nations. In the last two decades cyberspace has been defined as the 'fifth battleground’ for international relations, with the aspects of cyber war, cyber terrorism, and cybercrime as some of the largest threats to the security of the national and international community. (Popović, 2013) With this ‘fifth battleground’ of the cyberspace thrown into the international battlegrounds of old, its effectiveness and effect on the both the modern state and the international bodies of the world, posing the question of how will this increased accessibility to the cyberspace will affect national security in the coming years?
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent threats of critical systems failure. Although currently Americas’ critical infrastructures are coordinated by controlled systems, majority of these systems are indeed connected to the American cyberspace. This exposes one of America’s most vulnerable spot amidst cyber security. Another major vulnerable spot within the nations IT security would be the geographical physical location for each of Americas primary infrastructures, as well as their productivity. Due to the proximal locations, the major infrastructures could very well be infiltrated by one efficient CNA.
Every state in the nation should have a comprehensive IT security policy due to the “growing array of state and non-state actors are compromising, stealing, changing, or destroying information and could cause critical disruptions to U.S. systems” ("Cyberspace policy RevIew", 2016). Because of “ the dual challenge of maintaining an environment that promotes efficiency, innovation, economic prosperity, and free trade while also promoting safety, security, civil liberties, and privacy rights” ("Cyberspace policy RevIew", 2016). It is the responsibility of state and the federal government “ to address strategic vulnerabilities in cyberspace and ensure that the United States and the world realize the full potential of the information technology revolution” ("Cyberspace policy RevIew", 2016).