Homeland Security and Preparedness Response Activities and essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

Homeland Security and Preparedness, Response, Activities and Programs in Disaster Response or Disaster Recovery

The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge.

The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11, 2001, and Hurricane Katrina among others, are the emergency response agencies and the law enforcement agencies in a better position to handle disasters from preparation to response and ultimately recovery effectively in the event of disasters or terrorist attacks?

Significance

The significance of the research in this study is that the effectiveness of the preparedness of Homeland Security initiatives should be addressed as it is not possible to know where and when disaster will next strike and the consequences of such a disaster are great and require a great deal of intervention to regain normalcy in operation.

Research Hypothesis

The research hypothesis in this study is one stating that the law enforcement in the United States is today better equipped to handle terrorist attacks and any terrorist threat than it was prior to the events of September 11, 2011.

Literature Review

The work of Warwick (2009) entitled "Drug Drones" reports that an evaluation of unmanned aircraft in anti-drug operations took place in Central American with the U.S. Navy flying a leased Israel Aerospace Industries Heron from El Salvador for the purpose of detecting and identifying maritime targets. The 100 flight-hour demonstration was reported to be funded by the U.S. counter-narcoterrorism budget. The heron medium-altitude long-endurance UAS is equipped with the "vessel automatic identification system. (AIS)." (Warwick, 2009, p.1)

This is not the only tool that law enforcement is using in crime prevention and arrest initiatives of those threatening national security. The Terrorist Screening Center (TSC) is reported as a "unified watch list of known or appropriately suspected terrorists that can be used by every official sworn to protect the United States -- from border patrol and transportation officials to Federal agents and local police officers working their beats." (Bowman, 2007, p.5) Director of TSC, Donna Bucella reported during a FBI headquarters briefing that the list is "not a stagnant list. We add, modify, and delete every day. The information that flows into the TSC comes from the FBI (domestic terrorist information) and the National Counter Terrorism Center (International terrorist information) which gets information from more than a dozen intelligence agencies such as the Central Intelligence Agency and the Department of Homeland Security, under the umbrella of the Director of National Intelligence." (Bowman, 2007, p.5)

Edwards (2012) reports that police are greatly dependent on "information and communication. In today's world, youthful offenders communicate, network, socialize, boast and reveal their conduct on the Web via e-mail, smart phones and Blackberries. Communication is carried into a new theater of real-time availability and simple methods." (p.19) It is reported that current communication systems require a small investment but the result is stated to be "tremendous dividends." (Edwards, 2012, p.19) Federal agencies are reported as being reliant on "their frontline law environment partners. When an environment exists that allows all officers to possess knowledge and use it to cooperate, communicate, and coordinate, premier results can develop." (Edwards, 2012, p.20)

Intelligence led policing (ILP) is cited as being a great help in the area of information improvement as well as in intelligence sharing. It is reported that the present push for "state and regional fusion centers and the development of Law Enforcement Online (LEO) is a real0time controlled-access communications and information-sharing data repository…" (Edwards, 2012, p.20) It is reported that ILP believes that the notion that rural officers should have "access to current technology, such as smart phones and Blackberries, as a real-time conduit for relating past data to current intelligence information. Rural sheriffs and police chiefs working together to create one central clearinghouse for information collection, analysis, and dissemination constitutes another ILP concept. Innovative policies, procedures, protocols, and structures require collaboration between sheriffs and chiefs for common interest, shared gains, notoriety, credit, and productive results." (Edwards, 2012, p.21)

Intelligence Led Policing is reported as being based on a three-step process as follows:

(1) The first step is the incorporation of the Intelligence Led Policing Model, which involves incorporation of the ILP model, which maintains, 'Intelligence-led policing is a business model and managerial philosophy where data analysis and criminal intelligence are pivotal to an objective decision-making framework that facilitates crime and problem reduction, disruption, and prevention through both strategic management and effective enforcement tactics that target proli-c and serious offenders'." (Edwards, 2012, p.22)

(2) The second step is reported to be inclusive of "…incorporating guidelines for protecting privacy -- mandatory if the intelligence system is supported by federal funds. Intelligence gathering and the pooling of intelligence can lead to more effective policing. However, the collection and sharing of intelligence also can implicate signi-can't privacy concerns. Accordingly, if the intelligence system is supported by federal funds, the agency must employ within the Criminal Intelligence Systems Operating Policies at Title 28, Code of Federal Regulations, part 23." (Edwards, 2012, p.22)

(3) The third step involves stakeholder participation in "aggressive information gathering, speci-c analysis, and structured classi-cation of real-time communication paths, supporting actionable intelligence dissemination." (Edwards, 2012, p.22)

Specialized training is provided in Evans County, Georgia including training, equipment and information sharing policies and procedures for officers because knowledge of incidents that have occurred enables law enforcement agencies to "maintain situational awareness" which is reported to be greatly assistive in "identifying, preventing, disrupting, and solving crimes." (Edwards, 2012, p.22)

According to one report Michigan State Law Enforcement has equipped its officers with the AN-PVS-21 Low Profile Night Vision Goggle. The night vision technology combined with "its innovative heads-up display capability, will help enhance officers' safety and situational awareness and give officers greater response capability." (Business Wire, 2005, p.1) However, the most important thing that can be done according to the United States Department of Defense in a News Briefing is to develop a high level of cooperation and integration among law enforcement authorities and intelligence agencies." (2003, p.1) This is where intelligence led policing comes in and the process used is one that includes the following elements including system, process and result:

The system component is E-roll call and the process involves an intelligence analyst electronically sending all local, state and federal officers a list of calls from the night before and the result is that law enforcement becomes aware of all incidents and events. Secondly, a system component is the 'shift report' and the process involves deputies, dispatchers and jailors reading and initialing the calls for service report updates since their last shift. The result is that staff becomes aware of incidents and events that have occurred. The third system component cited is 'problem adoption' and is a process in which "deputies hear of problems from citizens, adopt these problems, identify strategies for solutions and proceed with tactics." (Edwards, 2012, p.25) The results is that relationships are built that lead to trust and the production of intelligence information." (Edwards, 2012, p.25) The fourth system components is stated to be that of 'Web Tips" which is a process involving citizen provided tips via a web site that are emailed to an intelligence analyst and investigator." (Edwards, 2012, p.25) The results in "information analysis [that] provide intelligence." (Edwards, 2012, p.25) The fifth system component is that of patrol alerts and open case alerts and is a process in which "flyers are produced and distributed by email, then posted in the operations center." (Edwards, 2012, p.25) The result is 'total situational awareness'. (Edwards, 2012, p.25) The sixth system component is that of 'inmate information collection document' which is a process in which the investigator "regularly interviews local jail inmates regarding criminal information'. (Edwards, 2012, p.25) The result is that this resources "provide corroborative intelligence on histories, trends, patterns, and methods of criminal operation." (Edwards, 2012, p.25) The seventh system component is that of deputies information binder which is a process involving A three-ring binder containing current intelligence, memos, and latest officer awareness and safety information." (Edwards, 2012, p.25) The result is that the "binder enhances intelligence products and communication." (Edwards, 2012, p.25) The eighth system component is that of the issue board and is a process in which "a white board is used to highlight important communications for all." (Edwards, 2012, p.25) The result is that important information is "disseminated and shared." (Edwards, 2012, p.25) The ninth system component is that of a 'status board' and is a process in which the board "gives status of pending state, local, and federal investigations." (Edwards, 2012, p.25) The result is that "pending case knowledge is shared." (Edwards, 2012, p.25)

The following are also system components, processes and results cited:

(1) Project Board A large white board is used for projection of presentations and real-time collective data mining. The board enhances intelligence…[continue]

Cite This Essay:

"Homeland Security And Preparedness Response Activities And" (2012, July 29) Retrieved December 8, 2016, from http://www.paperdue.com/essay/homeland-security-and-preparedness-response-81289

"Homeland Security And Preparedness Response Activities And" 29 July 2012. Web.8 December. 2016. <http://www.paperdue.com/essay/homeland-security-and-preparedness-response-81289>

"Homeland Security And Preparedness Response Activities And", 29 July 2012, Accessed.8 December. 2016, http://www.paperdue.com/essay/homeland-security-and-preparedness-response-81289

Other Documents Pertaining To This Topic

  • Homeland Security the World Has

    On the other hand, the Department in itself was projected to deal with a large number of aspects surrounding homeland security. The arguments supporting the idea were focused on the principle that the citizens must be protected from foreign threats, such as terrorism, and they must be given the help needed to face the treacheries of nature. In aiming to accomplish the latter, the Federal Emergency Management Directorate was established.

  • Department of Homeland Security DHS

    Regarding Border Security, "the Department of Homeland Security prevents and investigates illegal movements across our borders, including the smuggling of people, drugs, cash, and weapons" (DHS.gov. Border Security. 2012. PP. 1). Customs, Coast Guard, and Immigration (INS) are working departments in this area. Preparedness, Response, Recovery refers to "providing a coordinated, comprehensive federal response and mounting a swift and effective recovery effort" (DHS.gov. Preparedness. Response. Recovery. 2012. PP. 1). FEMA is

  • Homeland Security Assessment the State

    ("Lynchburg Virginia Emergency Operations Plan," 2012) Elements of Disaster Response, Recovery, and Incident Command In the event of a disaster, the City Manager is appointed as the local spokesperson for all issues, events and the coordination of resources. They work directly with the Mayor and the City Council (who sit as an advisory board to the City Manager). In the event that there are any political issues, the Mayor will interact

  • Homeland Security Strategies

    Homeland Security Strategies The United Sates Department of Homeland Security (DHS) Strategic Plan outlines the Department's vision for homeland security as outlined in the Department's Quadrennial Homeland Security Review (QHSR). The plan is a unified, strategic framework for homeland security missions and goals. The Bottom-Up Review (BUR) compliments efforts to align DHS's programmatic activities and organizational structure to better serve the department's goals and missions. The plan enables the Department to

  • Homeland Security Terrorist Attacks Involving

    They have also provided intelligent analysis to state, federal and local law enforcers promoting competency and improved support missions in and out of the United States. Navy and marine corps have participated in multi- service working groups to ensure to update and produce multi- service CBRNE defense. CBRNE is also incorporated into air command, where the training is incorporated into courses; the instruction in the course includes instructions addressing the

  • Homeland Security Weaknesses and Strengths

    National Incident Management System: NIMS has been designed with the sole purpose of integrating emergency practices on all levels of government. These practices include mitigation, preparedness, response and recovery and NIMS provides the single platform where all these practices would merge in order to better respond to national terrorist crises. The strengths of the program are: 1. It provides standards for organizational structures, processes and procedures 2. It also offers standards for planning,

  • Homeland Security Effects of Terrorism

    Beginning in October of 2005, organizational arrangements for emergency management functions on a federal level were put into place, in the reorganization begun by Secretary Chertoff. Pros and Cons about the Homeland Security Program There are good things about the Homeland Security Program in the U.S. A list of positives would include the fact that some safeguards must be implemented in order to keep the country safe. Local and national law


Read Full Essay
Copyright 2016 . All Rights Reserved