...Chapter 7: Statutory Authority Chapter Outline 1. Introduction of topics and concepts to be discussed in the chapter. a. Legal basis of modern emergency management in the United States. b. Budget authority. c. Program eligibility. d. Roles and responsibilities. 2. Case Studies a. The National Earthquake Hazard Reduction Program (NEHRP): Legislation to Address a Particular Hazard b. The Homeland Security Act of 2002: A New Emergency Management c. The Disaster Mitigation Act of 2000: A Shift to Pre-Disaster Mitigation 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. NEHRP c. Homeland Security Act of 2002 d. DMA 2000 7. Suggested Out of Class Exercises Introduction No emergency management system anywhere in the world can properly function without statutory authority and consistent budget appropriations. Statutory authority defines disasters programs, determines who is eligible for these programs, provides the legal support needed to implement disaster programs and establishes the legal foundation for funding the programs and activities of the disaster agency. Without such authority, a government agency is powerless. Legal Basis of Modern Emergency Management in the United States The first recorded emergency management legislation in the United States occurred in 1803 when a Congressional Act was passed to provide financial...
Words: 25108 - Pages: 101
...It is important to have a clearer understanding of the nature of homeland security problems and how coordination can address these through better identifying and connecting the dots between the organizations and actors involved in certain projects. What are the key concepts/constructs under study? Are operational definitions provided? One term in this article is called the floor. This is where the federal government should identify clear baseline goals for homeland security and measure the performance of state and local actors against these goals through establishing strong and clear federal performance reporting standards. How does the author situate himself within the framework of other research in the field? In the article the author, looks at past experience and results and develops a grade of success or lack there of. The author refers to how the United States experienced several crises and disasters during the 1990s, it was not until the September 11 attacks and Hurricane Katrina that the lack of effective coordination routines were brought into public knowledge. Other articles are mentioned in his article that it has been suggested that better training and exercises need to be put in place to improve the emergency...
Words: 790 - Pages: 4
...SEAPORT SECURITY: CRITICAL CHALLENGE FOR DEPARTMENT OF HOMELAND SECURITY BY COLONEL DREFUS LANE, SR. United States Army DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. U.S. Army War College, Carlisle Barracks, PA 17013-5050 USAWC CLASS OF 2009 The U.S. Army War College is accredited by the Commission on Higher Education of the Middle State Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters...
Words: 6659 - Pages: 27
...degree requirements for the BA in Security Management Abstract The purpose of this proposal is to address the importance of Critical Infrastructure Protection (CIP) and the mythology behind this since the attacks of 9/11, as well as a brief history of Critical Infrastructure Protection pass to the present to include attacks from the cyber arena. These attacks are prone to come indirect or direct which will and could affect our need and use for resources for life as we know it based on living naturally on a daily bases, these threats maybe man made or by natural disaster. Problem statement Prior to the attacks of 9/11 there was no main concern with the protection of Critical Infrastructure within the United States from any avenue. As we moved on into the 21 century the threat has evolved from more than just protecting water source, and power plants. With the information age this issue has shown another form of crippling the United States economy with just the push of a button. How we to protect these infrastructures from threats that may not be seen or those from natural disasters is a question for now and the future. Purpose statement I have chosen this particular subject due to the nature of its importance to national security, economy, as well as the everyday needs of Americans to survive. The awareness for the protection of our critical infrastructure is a necessity for the present and future of America’s well fair. Research questions Q1. When did the United...
Words: 786 - Pages: 4
...are the large-scale, reliable and essential products and services which support our society. In Canada, under the National Security Policy (NSP) there are 10 National Critical Infrastructure (NCI) sectors. Federal, provincial and territorial governments are collaborating to provide policies, directive, knowledge, and funds to protect these 10 NCIs, as a disruption to them will have a severe impact on national security. However, the education sector is not listed as an NCI, which leaves education sector and significant portion of Canadians under protected. This paper introduces the research and provides a discussion on the contextual background of the research concerns and problem statement. It will identify the research problem and supporting research questions, and conclude with a list of recommendation. Contextual Background Critical Infrastructure (CI) is the lifeblood of Canada, and the high availability, reliability, integrity and confidentiality of the CI is paramount in maintaining the sovereignty, national security, and economic health and wellbeing of the Canadian society. The education sector should be created as a separate NCI because recent reports and studies emphasize that education must be a national security matter (Council on Foreign Relations, 2012). Hence, the failure of education sector can pose significant threats to national security and economic growth. Problem Statement According to Statistics Canada, there are approximately 15,500 schools (elementary...
Words: 3488 - Pages: 14
...as an executive department or an independent agency. The purpose of U.S. Environmental Protection Agency is to protecting human health and the environment by writing and enforcing regulations based on laws passed by Congress. According to EPA website, Born in the wake of elevated concern about environmental pollution, EPA was established on December 2, 1970 to consolidate in one agency a variety of federal research, monitoring, standard-setting and enforcement activities to ensure environmental protection. This agency, US Environment Protection Agency is run by its Administrator. The current Administrator is Lisa P. Jackson. The President appoints an administrator for U.S. Environment Protection Agency and Congress can approve or decline the person. The US Environmental Protection Agency is an independent agency. The agency has approximately 17,000 full-time employees and engages many more people on a contractual basis. The purpose of U.S. Army of Corps of Engineer is to provide vital public engineering services in peace and war to strengthen the nation's security, energize the economy, and reduce risks from disasters. According to US Army of Corp Engineers website, the history of United States Army Corps of Engineers can be traced back to June 16, 1775, when the Continental Congress organized an army with a chief engineer and two assistants. Colonel Richard Gridley became General George Washington's first chief engineer; however, it was not until 1779 that Congress created...
Words: 1513 - Pages: 7
...and the Global Intelligence Working Group (GIWG). Working in concert, the CICC and the GIWG advocates for local police force agencies in the development and communicating of criminal intelligence to promote public safety and our Nation’s security. The recognition by the National Criminal Intelligence Sharing Plan (NCISP) of the prominence of the state, local, and tribal law enforcement (SLTLE) are vital ingredients concerning our country’s intelligence process. In order to establish the link necessary for improving intelligence and data sharing at all echelons of government, the creation of the CICC was a product of the NCISP. Law enforcement agencies from varying levels of government comprise this Council. In May 2004, the CICC was formally established and provided advice the refinement and implementation of the NCISP. (Carter, 2009). The U.S. Office of Justice Programs funded the Global Justice Information Sharing Initiatives which exists also charged with the development of methods and guidelines to effectively share information across the criminal justice system. The Global Initiative is responsible for the creation of the subgroup, the Global Intelligence Working Group (GIWG). The NCISP was the first product the GIWG created. By design, the GIWG’s mission is to make available law enforcement organizations a capability to gather, analyze, protect, share reliable and timely intelligence information through the development of the NCISP. The intelligence information collected...
Words: 894 - Pages: 4
...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...
Words: 1288 - Pages: 6
...illegal immigration and the burden attributable to the resulting population explosion is placing on the governments and citizens as well as legal residents of states and counties in the United States (Martin, 2008). The recent enforcement of U. S. Department of Homeland Security (U.S. DHS) laws, which started in 2006, is working (Camarota & Jensenius, 2008) but the enforcement is not reducing illegal immigration, especially on the United States’ Southern border (Ewing, 2008). Baker et al, in a U. S. Department of Homeland Security report show, from 2006 to 2007 the illegal immigrant population increased by 4% (Baker, Hoefer, & Rytina, 2008). Illegal immigrant population is declining because of border enforcement of immigration laws (Camarota & Jensenius, 2008). The loss of jobs due to economic downturn in the country can also account for declining illegal immigrant population (Grayson, 2008). Despite the declining population of illegal immigrants due to enforcement, illegal immigration is still a challenge (Ewing, 2008). The persistence of illegal immigration on the border implies that the countermeasures in use in fighting illegal immigration on the borders appear to need revisions (Ewing, 2008). Statement of the Research Problem Statement of the Problem According to a report by US DHS on estimates of illegal immigrants in the United States, the population of illegal immigrants in the state of Texas increased from about 1.1 million in 2000 to about 1.7 million in 2007, an increase...
Words: 4165 - Pages: 17
...Week 3 Case Study 2 Submission Asa J Opie Sec 310 Professor Nerove Strayer 7-20-2014 Week 3 Case Study 2 Submission A critical infrastructure is defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and way of life. (http://www.dhs.gov/xlibrary/assets/NIPP_InfoSharing.pdf)In short, critical infrastructure is by definition essential for the survival of the nation. The USA PATRIOT Act specifically defines critical infrastructure as "systems and assets, whether physical or virtual, (Jena Baker McNeill and Richard Weitz, 2010) so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters." FEMA defines critical infrastructure as "personnel, physical assets, and communication (cyber) systems that must be intact and operational 24x7x365 in order to ensure survivability, continuity of operations, and mission success, or in other words, the essential people, equipment, and systems needed to deter or mitigate the catastrophic results of disasters." (http://www.dhs.gov/xlibrary/assets/NIPP_InfoSharing.pdf) The DHS Daily Open Source Infrastructure Reports specify the following sectors as part of critical infrastructure: Energy, Chemicals, Nuclear Reactors, Materials and Waste, Defense Industrial Base, Dams; Banking...
Words: 1253 - Pages: 6
...Research Brief Homeland Security A RAN D IN FRAST RUCT URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE C ybersecurity economics is an emerging field. There is a significant need for better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. In two articles, RAND senior scientist Shari Lawrence Pfleeger and her colleagues addressed these key cybersecurity concerns and identified how different types of companies or organizations perceive the importance of cybersecurity and make cybersecurity investment decisions. Abstract The emerging field of cybersecurity economics could benefit from better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity...
Words: 2167 - Pages: 9
...Engineers The U.S. Army corps of Engineers agency lies in the administrative structure of the federal government and is located in the executive branch as an independent agency of government in the Department of Defense. The U.S. Army Corps of Engineers is a federal agency. The U.S. Corps of Engineers is made up of both army and civilian personnel. The Army Corps makes up the world's largest (public) engineering, design and construction business in the United States and all over the world. The U.S. Army Corps was developed to provide public engineering services in both peace and war to assist in providing security to the Nation. The Corps further works with partners all over the world to assist in this endeavor. The U.S. Army Corps builds and structures in which assists in training two great military forces; the Army and the Air Force. Both Armed Forces use these structures for training when they are deployed for war. The U.S. Army Corps develops security measures for Homeland Security and FEMA or Federal Emergency Management Agency. They assist with security planning, research development, quick response and overall protection. Emergency response falls under two major public laws (1) the Flood Control and Coastal Emergency Act and (2) the Stafford Disaster Relief and Emergency Assistance Act. It is noted by usace.army.mil that the USACE responds to at least 30 or more disasters annually and other state and local emergencies. The Corps further assist in providing water resources...
Words: 1592 - Pages: 7
...from all non-vulnerable states.” (Bishop & Bailey, 1996, p. 2). Their report focuses on computer vulnerabilities from a state configuration view where computers are state devices, and a vulnerability is any flaw in software that allows a user (whether authorized or unauthorized) to transition the system from an “authorized state” to an “unauthorized state.” We commonly reference these types of vulnerabilities today as buffer overflow vulnerabilities, input validation vulnerabilities, improper system configuration, etc. 2. Longley and Shain define a vulnerability using several different methods. "1) In computer security, a weakness in automated systems security procedures, administrative controls, Internet controls, etc., that could be exploited by a threat to gain unauthorized access to information of to disrupt critical processing. 2) In computer security, a weakness in the physical layout, organization, procedures, personnel, management, administration, hardware or...
Words: 3201 - Pages: 13
...NIMS and the Incident Command System The way this nation prepares for and responds to domestic incidents is about to change. It won't be an abrupt change; best practices that have been developed over the years are part of this new comprehensive national approach to incident management known as the National Incident Management System (NIMS). But it will change � and for the better. Developed by the Department of Homeland Security and issued in March 2004, the NIMS will enable responders at all jurisdictional levels and across all disciplines to work together more effectively and efficiently. Beginning in FY 2006, federal funding for state, local and tribal preparedness grants will be tied to compliance with the NIMS. One of the most important 'best practices' that has been incorporated into the NIMS is the Incident Command System (ICS), a standard, on-scene, all-hazards incident management system already in use by firefighters, hazardous materials teams, rescuers and emergency medical teams. The ICS has been established by the NIMS as the standardized incident organizational structure for the management of all incidents. Although many agencies now use various forms of ICS, there...
Words: 3765 - Pages: 16
...Developed by the Department of Homeland Security and issued in March 2004, the NIMS will enable responders at all jurisdictional levels and across all disciplines to work together more effectively and efficiently. Beginning in FY 2006, federal funding for state, local and tribal preparedness grants will be tied to compliance with the NIMS. One of the most important 'best practices' that has been incorporated into the NIMS is the Incident Command System (ICS), a standard, on-scene, all-hazards incident management system already in use by firefighters, hazardous materials teams, rescuers and emergency medical teams. The ICS has been established by the NIMS as the standardized incident organizational structure for the management of all incidents. Although many agencies now use various forms of ICS, there is considerable uncertainty about NIMS ICS and the impact it will have on systems and processes currently in place. These are important questions because one of the FY 2005 requirements for implementing NIMS is "institutionalizing the use of ICS, across the entire response system." This paper is intended to provide an historical perspective on the development of ICS, explain how NIMS ICS works, describe how it is different from previous systems, and discuss the future of NIMS ICS training. Background In Homeland Security Presidential Directive-5 (HSPD-5), President Bush called on the Secretary of Homeland Security to develop a national...
Words: 3765 - Pages: 16