Purpose
This section includes Strategic Strategy Objectives. The core of this section is to develop, implement, and update a method to augment international cargo supply chain security. The strategy included reflects already established work from various agencies involved in the supply chain security and as describes how upcoming actions will be mandated and integrated by SAFE Port Act to achieve this goal. From here the section transitions into major improvements for international cargo supply chain security beginning with September 11, 2001. The kinds of improvements made have been: “the Maritime Transportation Security Act, the development of the National Strategy for Maritime Security and its eight supporting plans, and multiple individual agency initiatives” (DHS, p. 6).
The focus of the ‘Purpose’ section is to not replace more detailed plans that already exist. Rather, it is to seek to outline tactical and strategic plans connect with the multiple programs and initiatives already in process. Such a strategy describes security efforts beginning in cargo origination, drayage to foreign ports, conveyance or loading on vessels in foreign ports, arrival at or movement to domestic ports of entry, and so forth. Moreover, the strategy details trade resumption efforts, providing a more general decision tree to enable rapid prioritization of vessels and cargos in case there is supply chain disruption.
The section includes a definition of the problem, a description of the international cargo supply chain like: storage waiting for processing, movement to deconsolidation point, storage awaiting transport and so forth. The next part of this section covers securing the supply chain with focus on ensuring integrity of millions of maritime cargos contains that enter the U.S. each year. There is risk assessment, goals, and strategic objectives. Part III involves Scope which is a reiteration of the previous part and Part IV is Guiding Principles. These will be covered in the next two sections.
Scope
The Scope section addresses security of cargo moving via the international supply chain to and from the United States. “The approach is based on the principal the supply chain security is best accomplished as an end-to-end process with specific checks and verifications at critical nodes. The focus of this strategy are shipments” (DHS, p. 16). The focus of the shipments strategy is to recognize foreign sovereignty like foreign nations’ requirements...
References
DHS. (2015, July 13). International Supply Chain Security. Retrieved from https://www.dhs.gov/publication/international-supply-chain-security
Willis, H. H. (2016). Ten Years After the Safe Port Act, Are America's Ports Secure? Retrieved from https://www.rand.org/blog/2016/04/attractive-targets.html
Homeland Security and U.S. Intelligence Formation of Department of Homeland Security & U.S. Intelligence on Terrorism Definition of Intelligence Rationale for Formation of DHS Effectiveness of DHS Importance of Intelligence & Analysts Research Philosophy Research Methods & Its Limitations Data Collection & Analysis National security has been a major concern for United States in past few decades. However, since 2001, this concern has turn into a serious threat for national security. The given research is performed with the intent
Homeland Security and Preparedness, Response, Activities and Programs in Disaster Response or Disaster Recovery The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge. The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11,
They have also provided intelligent analysis to state, federal and local law enforcers promoting competency and improved support missions in and out of the United States. Navy and marine corps have participated in multi- service working groups to ensure to update and produce multi- service CBRNE defense. CBRNE is also incorporated into air command, where the training is incorporated into courses; the instruction in the course includes instructions addressing the
limitations and capabilities of intelligence for corroborating homeland security efforts? Sharing of intelligence and extensive threat analysis There are quite many intelligent agencies working round the clock analyzing the data yet no single agency is working on analyzing the incoming data regarding terrorism in United States of America. No agency is presently working to gather intelligence and look for trends (DHS, 2002). Under the United States' president, a new department was
Longest War Homeland Security & Emergency Management M6A1: Book Review Bergen, Peter. (2011). The longest war: The enduring conflict between America and al-Qaeda. New York: Free Press. As its title suggests, Peter Bergen's book, The longest war: The enduring conflict between America and al-Qaeda, is a chronicle of a war that defies the traditional conventions and definitions of warfare. The war of terror has no clear beginning and no clear end and has challenged many
Global Terrorism Right and left wing extremism, which are both forms of domestic or home-grown terrorism, have a rather long history in the U.S. Generally motivated by Marxist and communist ideologies, left wing extremism emerged as early as the late 19th century (White, 2016). Nonetheless, left wing extremism in the U.S. became more prominent in the 1960s and 1970s, with Weather Underground, Black Panthers, and Students for Democratic Society being the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now