More Subjects
Terrorism and Homeland Security
[Name of the Writer]
[Name of the Institution]
Terrorism and Homeland Security
I believe that the new concept of the Homeland Security Enterprise is valid because it incorporates a more comprehensive and global approach. It works for achieving the goal of both homeland security and enterprise with a shared vision and integrated operations which are based on the result.
Pros
It helps the federal government for trimming the cost, eliminating the duplication, streamlining the operations, and managing the resources in the better way across the Department. This effort can increase the efficiency with the new initiatives (White, 2016).
Cons
This new concept of Homeland Security Enterprises can add responsibility for them which can create new challenges and can also increase complications for them.
The areas of recommendation which were identified by the commission of 9/11 in order to prevent the future terrorist attacks include unity of effort and command, radio interoperability and spectrum, executive power and civil liberties, congressional reform, National Intelligence director, security of transformation, Entry-Exit system of biometric screening, secure and standardized identification, and development of coalition standards for the detention of terrorist.
There are several new hazards which are associated with the terrorism in the United States of America such as nerve gas, pathogens, and lethal plant toxin which are vulnerable to chemical or biological threats and also explosives. In response to these hazards, the quick mobilization of public health workers, private providers of healthcare, and the emergency responder are necessary. Outbreaks of large scale also require distribution and procurement of huge quantities of vaccines and drugs that should be quickly available. Such hazards also require an immediate response from EMS personnel, fire, and police. All these new hazards require sheltering, evacuating or quarantining on the basis of the situation and condition at the time of hazards.
CDC's strategic plan will be coordinated by Bioterrorism response and preparedness program of CDC by collaborating with public health organizations, professional societies, medical examiners, medical research centers and emergency response units. CDC will assist the local and state health agencies for developing expertise and resources to investigate unexplained illness and unusual events. It will be prepared for mitigating the injuries and illness which results from the actions of chemical and biological terrorism. Well-trained health workers will be available in every state. The activities related to terrorism should be coordinated by efficient and rapid communication systems which links the public health agencies of the United States. It can increase the expenses and are not cost effective as it requires the cost of equipment and facilities for dealing with these terrorist-related hazards.
Following are the key intelligence agencies of the United States:
• Central Intelligence agency (CIA): Most significant intelligence agency of the USA and its role is to spy on foreign government and to conduct covert operations.
•National Security Agency: Its role is to protect the information system of U.S from any external penetration.
• Defense Intelligence Agency: DIA shares the information of foreign militaries with the leaders of military and defense policymaker for the defense of the country.
• Army Military Intelligence: It intercepts all type of electronic communication and provides information, ground imagery, and maps on the foreign forces for assisting fighters in the battlefield (Richelson, 2018).
•Office of Naval Intelligence: It keeps tabs on foreign technological and scientific research, readiness and tactics of foreign naval forces for identifying any illicit activity.
•Federal Bureau of Investigation: It maintains the watch list of terrorists of government and also involved in the high-value interrogation.
Protecting the border from the illegal movement of people, contraband, drugs, and weapons for promoting lawful travel and trade which is considered to be the national sovereignty, prosperity, economic, and security of the homeland. According to the researchers, the safe border of any nation has the capability for offering a favorable domestic environment to the growth of the economy of that nation. Borders could have an advantage of geography in attracting firms as a result of its proximity to foreign markets. Moreover, the manufacturing activities which required constant usage of transportation are also be located along the borders. Border also provide the physical security to any country by limiting the access of any unauthorized person in the country which can really help in eradicating the terrorism and threat of the nation.
The different mode of transportation includes road transportation, pipelines, rail transportation, maritime transportation, air transportation, intermodal transportation, and telecommunications. The transportation security administration is the agency of the United States which has the responsibility of defending the transportation system of US. The transportation security planning includes incident response, disaster response, hazardous transportation of materials and response and recovery of the disaster which provide a springboard for enhancing the incident response and security. So the expert dealing with concerns about travel safety should have an understanding of tradeoffs between other nations and states (Williams, et, al., 2016). Transportation should also embrace the broader set of goal including environmental and social factors.
The information network of Department of Defense is considered to be set of information capabilities which are associated processes for processing, storing, collecting, managing and disseminating information on demand to support personnel, policymakers, and warfighters whether stand-alone or interconnected including leased and owned data security services, national security systems, computing and communication services, and systems. DOD relies on the protection of its Information network for coordinating the forces sustainment. The operation mission of DOD related to cyberspace includes the action of operations which are taken to sustain, maintain, extend, operate, configure and secure the cyberspace of DOD for preserving and creating the integrity, confidentiality, and availability of the information network (Presley & Landry, 2016).
References
Presley, S. S., & Landry, J. P. (2016). A Process Framework for Managing Cybersecurity Risks in Projects.
Richelson, J. T. (2018). The US intelligence community. Routledge.
White, J. R. (2016). Terrorism and homeland security. Cengage Learning
Williams, A. D., Osborn, D., Jones, K. A., Kalinina, E. A., Cohn, B., Parks, M. J., ... & Mohagheghi, A. H. (2016). A New Look at Transportation Security: A Complex Risk Mitigation Framework for the Security of International Spent Nuclear Fuel Transportation (No. SAND2016-11712C). Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia National Laboratories.
More Subjects
Join our mailing list
© All Rights Reserved 2023