Department Of Homeland Security DHS  Research Paper

PAGES
3
WORDS
870
Cite

gov. Border Security. 2012. PP. 1). Customs, Coast Guard, and Immigration (INS) are working departments in this area. Preparedness, Response, Recovery refers to "providing a coordinated, comprehensive federal response and mounting a swift and effective recovery effort" (DHS.gov. Preparedness. Response. Recovery. 2012. PP. 1). FEMA is the direct provider of government action and coordination in this realm.

On Immigration, "the Department is responsible for providing immigration-related services and benefits such as naturalization and work authorization" (DHS.gov. Immigration. 2012. PP. 1). INS is the primary vehicle in this context however, cross-over with Border Security functions are common.

Lastly, DHS engages in cyber security "keeping our federal civilian networks secure, and secure the cyberspace and critical infrastructure on which we all depend" (DHS.gov. Cyber Security. 2012. PP. 1 ). This issue is a growing one and according to President Obama is "one of the most serious economic and national security threats our nation faces" (DHS.gov. Cyber Security. 2012. PP. 1).

Part B

1. Is the department logically organized for effectively fulfilling its mission? If so, explain why / if not, explain why. Be detailed.

Succinctly, no! The encompassing mission of the DHS is so broad...

...

The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.
2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the

Sources Used in Documents:

Succinctly, no! The encompassing mission of the DHS is so broad as to incorporate far too many active departments, agencies directorates, and components for the structure to effectively work. The flow chart itself is complex in its reporting and layered approach. The unification which is necessary to protect the U.S. from threats is not possible under the auspices of a broad tent approach to control and information dissemination. As an example, a recent report indicated "86 reported attacks on computer systems in the U.S. that control infrastructure, factories, and databases between October 2011 and February 2012" (Schmidt, M. March 13, 2012. PP. 1); yet no one Federal agency "has the authority to compel businesses that run the nation's infrastructure to improve their security" (Schmidt, M. March 13, 2012. PP. 1). If the DHS were to assume control of this task, the assumption would be that economies of scale in resources and scope would allow for greater efficacy. The counter is that the nimbleness and coordination necessary to prevent such hacking is anathema under a monolithic structure. Decentralization would be a more logical method of countering the multiple risks to homeland security.

2. Are there any federal, state, and/or local agencies present in DHS that do not belong? If so, explain why / if not, explain why. Be detailed.

The best example, and most obvious is FEMA, the


Cite this Document:

"Department Of Homeland Security DHS " (2012, May 15) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/department-of-homeland-security-dhs-57794

"Department Of Homeland Security DHS " 15 May 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/department-of-homeland-security-dhs-57794>

"Department Of Homeland Security DHS ", 15 May 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/department-of-homeland-security-dhs-57794

Related Documents

Homeland Security and U.S. Intelligence Formation of Department of Homeland Security & U.S. Intelligence on Terrorism Definition of Intelligence Rationale for Formation of DHS Effectiveness of DHS Importance of Intelligence & Analysts Research Philosophy Research Methods & Its Limitations Data Collection & Analysis National security has been a major concern for United States in past few decades. However, since 2001, this concern has turn into a serious threat for national security. The given research is performed with the intent

These teams are called in to deal with highly dangerous and threatening situations, including terrorist attacks. Some of the "special operations" tactics that may be employed to deal with active shooters, barricades, and hostage situations include: three or four man entries using shields, power flooding for "large structure clearing," mobile hostage rescues, "linear entry techniques," and vehicle takedowns (Navy Seals, 2010). Weapons of Mass Destruction Weapons of mass destruction (WMD) include

DHS and Homeland Security
PAGES 6 WORDS 2282

limitations and capabilities of intelligence for corroborating homeland security efforts? Sharing of intelligence and extensive threat analysis There are quite many intelligent agencies working round the clock analyzing the data yet no single agency is working on analyzing the incoming data regarding terrorism in United States of America. No agency is presently working to gather intelligence and look for trends (DHS, 2002). Under the United States' president, a new department was

The other major component of the Department of Homeland Security that doesn't belong is FEMA, the Federal Emergency Management Agency. This is the only component of the Department that is not involved in preventing security threats that human in nature; its main purpose is to aid citizens and local governments in times of natural disaster. Again, communication with the Department would be necessary, but involving the response agency's involvement

Their casualties go uncounted, their actions largely unmonitored and their crimes unpunished." Scahill relates that four years into the Iraq occupation "there is no effective system of oversight or accountability governing contractors and their operations, not is there any effective law - military or civilian being applied to their activities." (2007) According to Scahill's report: "Since the launch of the "global war on terror," the administration has systematically funneled

("Lynchburg Virginia Emergency Operations Plan," 2012) Elements of Disaster Response, Recovery, and Incident Command In the event of a disaster, the City Manager is appointed as the local spokesperson for all issues, events and the coordination of resources. They work directly with the Mayor and the City Council (who sit as an advisory board to the City Manager). In the event that there are any political issues, the Mayor will interact