Free Essay

Private Sector Influence on Homeland Security Mission

In:

Submitted By bj8538
Words 1192
Pages 5
Running head: PRIVATE SECTOR INFLUENCE ON HOMELAND SECURITY MISSION

Private Sector Influence on Homeland Security Missions

Private Sector Influence on Homeland Security Missions The private sector plays many important roles in assisting the United States Department of Homeland Security (DHS) in achieving five security missions as outlined within the organization’s “Quadrennial Homeland Security Review” (“The 2014 Quadrennial,” 2014). DHS has broken down specific types of security threats and needs so that the organization may develop strategies for addressing related risks and also receive assistance from others in achieving objectives pertaining to each threat segment. An examination of the five main missions described in the above-referenced review focuses on the ways the private sector assists DHS in addressing these matters.
Terrorism Prevention and Improved Security A critical aspect of DHS and successful completion of its missions is the organization’s ability to partner with others in the public and private sectors. This gives DHS access to many resources and it also helps to mitigate threats or problems that occurring outside of the DHS line of sight. Threats and hazards related to terrorism and terroristic threats continue to remain at the forefront of many of DHS’s goals. A challenge DHS will continue to face regarding the prevention of terroristic threats and activities is that the nature of these problems is constantly changing. As some of the threats become more sophisticated or complex, DHS experiences a greater degree of difficulty in identifying these threats before they escalate and eliminating them before harm is done. Members of the private sector may take steps in passively and actively assisting the DHS in identifying threats and mitigating them. Partnerships with various law enforcement organizations and members of the private sector provide increased opportunities for addressing security-related problems. Members of the private sector have technology, knowledge, and resources that if allocated toward increasing the security of the nation’s critical infrastructure. However, these partnerships require communication and some degree of intelligence sharing to ensure both sides receive the full benefits of the working alliance (“Engaging the Private,” 2005).
A remaining obstacle, preventing the private sector from being more influential in helping DHS achieve its terrorism-related mission is the communication barrier stemming from mistrust on either side, reluctance to share sensitive information, and the sharing of inaccurate or unsupported information. Overcoming this problem requires DHS and members of the private sector to work toward developing additional formal partnerships that help to build trust over time and are reciprocal in nature to ensure all sides benefit (“Engaging the Private,” 2005).
Managing and Securing the Nation’s Borders Managing borders and taking steps to secure them is interconnected with other DHS missions because when implemented effectively it helps to reduce exposure to threats stemming from people or organizations outside the United States. Members of the private sector may assist by taking measures to become more alert during trading, transportation, and employment activities. The increase of trading activities provides opportunities for breaches, but taking proactive steps to improve security throughout the process would help to reduce the threat (“The 2014 Quadrennial,” 2014).
Immigration Law The private sector plays a direct role in DHS’s ability to achieve goals related to upholding immigration law by refraining from employing those that are in the U.S. illegally. The promotion of hiring and employment practices of people that have lawfully immigrating to the U.S. is logical and affords the U.S. with many benefits. However, those gaining entrance into the U.S. illegally may or may not pose a terroristic or other security threat. This mission is linked to the managing and securing of borders as well because private organizations that engage in various hiring practices may have more opportunity to identify situations where a person has entered the country unlawfully (“The 2014 Quadrennial,” 2014).
Securing Cyberspace The securing of cyberspace from terroristic or other threats is a challenging mission that continues to pose problems for DHS as well as countless private and public sector firms. Rapidly advancing technology makes it increasingly difficult for public and private sector members to identify potential threats before they result in substantial financial and data losses. Because many members of the private sector also maintain the similar goal of protecting against intentional or unintentional losses, these organizations gather information and technologies that assist in providing protection. Some private sector members are better at proactively identifying and subsequently eliminating cybersecurity threats than others because the sharing of related information is somewhat limited. The reality is that the sharing of technological systems, findings, and information would provide all parties involved with increased protection. A challenge that remains with regard to the open sharing of information, however, is that it can prompt individuals or organizations seeking to cause a security breach to develop new methods for staging an attack. Additionally, the open sharing of this information could assist these parties in finding weaknesses and vulnerabilities in existing systems (“The 2014 Quadrennial,” 2014).
For the above reason, the sharing of information between members of the private and public sectors should take place in a manner that safeguards the intelligence as much as possible. Forming formal partnerships may reduce problems such as a lack of trust between members of each sector and may also provide a means of establishing procedures that help to secure the information effectively (“The 2014 Quadrennial,” 2014).
Preparedness and Resilience The past has highlighted the need for members of the public and private sectors to work closely with DHS in developing strategies for identifying natural and manmade threats that may materialize in significant human and economic losses. In the past, a lack of quick and effective communication has exacerbated this problem as seen in the attempt to coordinate activities among the sectors prior to, during, and after Hurricane Katrina (Koliba, Mills, & Zia, 2011).
Partnerships between the private sector and DHS should outline strategies for addressing emergencies that occur and must outline the specific roles all parties are expected to play in the event such an emergency does occur. These partnerships are essential to improve communication surrounding these events and also in promoting resilience in the days and years following such an event (“The 2014 Quadrennial,” 2014).
Conclusion
DHS has five main security-related missions that are intended to safeguard, protect, and strengthen the nation’s critical infrastructure. Though the private sector is impacted by security threats and events, there continues to be a lack of cooperation among the sectors in the interest of achieving security-related goals. These goals impact the nation as a whole and should become shared missions so that strategies intended to achieve the objectives become a primary focus.

References
Engaging the private sector to promote Homeland Security: Law enforcement-private security partnerships. (2005). Bureau of Justice Assistance. Retrieved from https://www.ncjrs.gov/pdffiles1/bja/210678.pdf
Koliba, C., Mills, R., & Zia, A. (2011). Accountability in governance networks: An assessment of public, private, and nonprofit emergency management practices following Hurricane Katrina. Public Administration Review, 71(2), 210-220.
The 2014 Quadrennial Homeland Security Review. (2014). U.S. Department of Homeland Security. Retrieved from http://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf

Similar Documents

Free Essay

The Elements of a Risk Management Plan

...Chapter 7: Statutory Authority Chapter Outline 1. Introduction of topics and concepts to be discussed in the chapter. a. Legal basis of modern emergency management in the United States. b. Budget authority. c. Program eligibility. d. Roles and responsibilities. 2. Case Studies a. The National Earthquake Hazard Reduction Program (NEHRP): Legislation to Address a Particular Hazard b. The Homeland Security Act of 2002: A New Emergency Management c. The Disaster Mitigation Act of 2000: A Shift to Pre-Disaster Mitigation 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. NEHRP c. Homeland Security Act of 2002 d. DMA 2000 7. Suggested Out of Class Exercises Introduction No emergency management system anywhere in the world can properly function without statutory authority and consistent budget appropriations. Statutory authority defines disasters programs, determines who is eligible for these programs, provides the legal support needed to implement disaster programs and establishes the legal foundation for funding the programs and activities of the disaster agency. Without such authority, a government agency is powerless. Legal Basis of Modern Emergency Management in the United States The first recorded emergency management legislation in the United States occurred in 1803 when a Congressional Act was passed to provide financial...

Words: 25108 - Pages: 101

Free Essay

Terrorism

...Terrorism and Homeland Security: The Impacts on Preventative Measures Abstract This paper explores four different topics on homeland security and anti-terrorism policies. The creation of the Department of Homeland Security or (HDS). What policies had to be implemented and what did the creation of a new agency affected or benefit. The impact that international terrorism has caused the United States of America and how this policies and changes help build a stronger defense against them. The implementation of local enforcement agencies and the community in the fight to deter terrorist attacks. The Federal Emergency Management Agency or (FEMA) and how organizational bureaucracy hindered cooperation and communication among local and federal agencies. This paper will address what measures have been and can be taken in the future to improve inter-agency cooperation and communication. Table of Content Terrorism and Homeland Security: The Impacts on Preventative Measures Abstract……………………………………………………………………………………………2 Introduction………………………………………………………………………………………..4 Terrorism and the creation of the DHS………................................................................................4 USA PATRIOT ACT……………………………………………………………………………...5 Appropriate roles of agencies and community………………………………………………….5-6 Preventative plans…………………………………………………………………………………6 Community Emergency Response………………………………………………………………...6 FEMA……………………………………………………………………………………………..7 National Response Plan…………………………………………………………………………...

Words: 2744 - Pages: 11

Premium Essay

The Bureaucracy

...The Bureaucracy This report is based upon the topic bureaucracy being compared to the course textbook. This book breaks down what is a bureaucracy, the federal bureaucracy, becoming a bureaucrat, the bureaucracy and policymaking, and also reforming the bureaucracy. A bureaucracy is a way of administratively organizing large numbers of people who need to work together. As the textbook goes more in depth defining bureaucracy as a form of organization that operates through impersonal, uniform rules and procedures. Also, stating that bureaucracy actually at one time in history meant fast, effective, and rational administration. Organizations in the public and private sector, including universities and governments, rely on bureaucracies to function. The term bureaucracy literally means “rule by desks or offices,” a definition that highlights the often impersonal character of bureaucracies. Even though bureaucracies sometimes seem inefficient or wasteful, setting up a bureaucracy helps ensure that thousands of people work together in compatible ways by defining everyone’s roles within a hierarchy. Government bureaucrats perform a wide variety of tasks. We often think of bureaucrats as paper-pushing desk clerks, but bureaucrats fight fires, teach, and monitor how federal candidates raise money, among other activities. The job of a bureaucrat is to implement government policy, to take the laws and decisions made by elected officials and put them into practice. Some bureaucrats implement...

Words: 1522 - Pages: 7

Premium Essay

Communication in Science

...to be discussed in the chapter. a. Mission b. Principles i. Customer Focus ii. Leadership Commitment iii. Inclusion of Communications in Planning and Operations iv. Information Collection, Analysis and Dissemination v. Media Partnership c. Conclusion 2. Case Studies a. Risk Communication During the Washington D.C. Sniper Crisis b. The Homeland Security Advisory System c. A Comparison of Leadership Between Two Outbreaks of Smallpox in the United States: New York City, 1947, and Milwaukee, 1894 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. Washington, DC Sniper c. Homeland Security Advisory System d. Smallpox Outbreaks 7. Suggested Out of Class Exercises Introduction Communications has become an increasingly critical function in emergency management. The dissemination of timely and accurate information to the general public, elected and community officials and the media plays a major role in the effective management of disaster response and recovery activities. Communicating preparedness, prevention and mitigation information promotes actions that reduce the risk of future disasters. Communicating policies, goals and priorities to staff, partners and participants enhances support and promotes a more efficient disaster management operation. Mission The mission of an effective disaster communications...

Words: 23767 - Pages: 96

Premium Essay

Iran Economic Swot

...Trade Organization (www.jetro.go.jp) Created in 1958 to promote Japanese exports From the 80s it expands to developing countries. 21st century: To promote FDI into Japan To help small & medium sized companies to export. 4  USA (1992, 1993): Bill Clinton Policy  "Putting People First, A National Economic Strategy For America" Governor Bill Clinton June 21, 1992  Opening up world markets. […] we will move aggressively to open foreign markets to quality American goods and services (for instance, NAFTA)  Economic security council / Advocacy Center / CIA / FBI –Economic Counterintelligence Program The stakes in this game are high! 5 FRANCE: UBIFRANCE -Offices in France (partnership with chambers of trade) -80 offices in 60 different countries (156 in 120 countries if Economic Missions considered) -More than 1,400 collaborators MISSION: to make French exports easier, to support and to monitor French companies abroad. 6 7 “Private economic war”  International competition   Is it replacing military conflicts? Competitive intelligence and/or industrial spying?   Information is a weapon (by/for/against) Law could also be a weapon Macro: norms (protect innovation/advantage)  Micro: lawsuit as guerrilla wars  Economic/ industrial spying increases each year (30% in the U.S.). 8 Geopolitics, International Environment and Business Risks identification Major international risks 9...

Words: 1787 - Pages: 8

Free Essay

Usps Blue Ocean Strategy

... The USPS should exploit their vehicle fleet and extensive delivery routes to outfit their vehicles with sensors to become a data collection network. According to an article in Popular Science, the Postal Service’s fleet of vehicles could be equipped “with an array of cheap sensors, mail trucks could wireless deliver real time information on weather, pollutants, traffic, road conditions, and even locate gaps in cell phone coverage and television signals” (Dillow, 2010). The data collected could have homeland security implications as well, as noted in Popular Science, by sensors being able to identify chemical-biological threats as well as radiological threats. Threats are always prevalent to an organization, especially one that is trying to implement a new business opportunity to their existing business. The USPS is unique because they have threats that come from the private sector and threats that come from Congress in the public sector. The threats from the private sector come from other data collection companies who already have the technology and infrastructure in place. The competition that was able to identify this market is already established and looking towards the future of the data collection industry. Congress is also a threat to the USPS and change in its organization. In January of 2015, Emily Kopp from the Federal...

Words: 6061 - Pages: 25

Premium Essay

Notes

...firewalls, and any other components necessary to keep the network running are assets. • Software applications—Any application that can be installed on a computer system is considered a tangible asset. • Data—This includes the large­scale databases that are integral to many businesses. It also includes the data used and manipulated by each employee or custome The intangible value includes: • Future lost revenue—Any additional purchases the customers make with the other company is a loss to your company. • Cost of gaining the customer—A lot of money is invested to attract customers. It is much easier to sell to a repeat customer than it is to acquire a new customer. If you lose a customer, you lose the investment. Customer influence—Customers have friends, families, and business partners. They commonly share their experience with others, especially if the experience is exceptionally positive or negative Generally acceptable accounting principles (GAAP) refer to client confi­ dence as goodwill Profitability—The ability of a company to make a profit. Profitability is calculated as revenues minus costs. • Survivability—The ability of a company to survive loss due to a risk. Some losses such as fire can be disastrous and cause the business to fail. User...

Words: 3234 - Pages: 13

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...

Words: 4562 - Pages: 19

Premium Essay

Use of Data Mining by Government Agencies and Practical Applications

...Project Title Use of Data mining by government agencies and practical applications (Describe the Data Mining technologies, how these are being used in government agencies. Provide practical applications and examples) Compiled By:- Sneha Gang (Student # - 84114) Karan Sawhney (Student # - 85471) Raghunath Cherancheri Balan (Student # - 86088) Sravan Yella (Student # - 87041) Mrinalini Shah (Student # - 86701) Use of Data mining by government agencies and practical applications * Abstract (Sneha Garg) With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. It is a modern and powerful tool, automatizing the process of discovering relationships and combinations in raw data and using the results in an automatic decision support. This project provides an overview of data mining, how government uses it quoting some practical examples. Data mining can help in extracting predictive information from large quantities of data. It uses mathematical and statistical calculations to uncover trends and correlations among the large quantities of data stored in a database. It is a blend of artificial intelligence technology, statistics, data warehousing, and machine learning. These patterns...

Words: 4505 - Pages: 19

Free Essay

How Will a Severe Terrorist Alert Effect Tourism in South Carolina

...HOW WILL A SEVERE TERRORIST ALERT EFFECT TOURISM IN SOUTH CAROLINA Brianne Buckner Dr. BRIAN MCCUE PAD 590 JUNE 21, 2010 STRAYER UNIVERSITY CHARLESTON, SC CAMPUS This Directed Research Project (DRP), was conducted and orally presented By ………………………………………………………………………………. Brianne Buckner, Student We hereby certify that this DRP submitted by Brianne Buckner conforms to acceptable standards, and as such is fully adequate in scope and quality. It is therefore approved as the fulfillment of the requirement of the degree of Hospitality and Tourism Management, MBA Approved:_________________________________________ Supervising Faculty__________________________________ Peer Review/Technical Advisor________________________ TABLE OF CONTENTS Page APROVAL PAGE………………………………………………………………………...i ABSTRACT………………………………………………………………………………ii TABLE OF CONTENTS...................................................................................................iii LIST OF TABLES AND FIGURES………………………………………………….….iv CHAPTER 1: INTRODUCTION TO THE STUDY………………………………….….6 Context of the Problem……………………………………………………………6 Statement of the Problem………………………………………………………….7 Main Research Question and Sub-questions………………………………………7 Significance of the Study…………………...…………………………….……….8 Research Design and Methodology………...

Words: 17727 - Pages: 71

Premium Essay

Party Platform

...Party Platforms Democratic Party on Abortion Strongly and unequivocally support Roe v. Wade. (Sep 2012) Invest in stem cell and other medical research. (Nov 2006) Pursue embryonic stem cell research. (Jul 2004) Support right to choose even if mother cannot pay. (Jul 2004) Choice is a fundamental, constitutional right. (Aug 2000) Democratic Party on Budget & Economy Create an economy built to last & built from the middle out. (Sep 2012) Restore the budget discipline of the 1990s. (Nov 2006) Cut the deficit in half over the next four years. (Jul 2004) Democrats reversed economic stagnation of previous years. (Aug 2000) Democrats must continue to lead Americans to prosperity. (Aug 2000) G.O.P. creates debt, Dems create surpluses. (Aug 2000) Democrats will eliminate publicly held debt by 2012. (Aug 2000) Policy should encourage home ownership & affordable housing. (Aug 2000) Democratic Party on Civil Rights Enable disability access; plus 100,000 federal jobs. (Sep 2012) Equal treatment under law for same-sex couples. (Sep 2012) Racial and religious profiling is wrong. (Jul 2004) Keep marriage at state level; no federal gay marriage ban. (Jul 2004) Strengthen some parts of Patriot Act and change other parts. (Jul 2004) Support affirmative action to redress discrimination. (Jul 2004) Police should have zero tolerance of racial profiling. (Aug 2000) Pass hate crime legislation...

Words: 3138 - Pages: 13

Premium Essay

Authority on Cyber Warfare

...Authority on cyber warfare As we approach a new generation of warfare, we face new problems. Each generation before us has shown that there are continued advancements in warfare technology and with new technology there are different guidelines and terms of use in concordance with international law. The art of war has not changed since the beginning of time. Yes, there are new weapons, but the content for the most part is the same. Defeat your enemy, rendering them unable to strike back, or attack them where it hurts so that they do not want to proceed in the war. Through the evolution of war, the United States has conquered and been defeated. We may not always be law abiding, but we do what we deem necessary to defend the nation. In the process of defending, we learned that technological advancements are not always a positive thing, and technology can become too powerful for any one nation alone. The creation of the nuclear bomb was just that. Now that there is this terrifying new advancement in warfare technology, how do we stop it from getting into the hands of the wrong people? Executive summary, In this paper, I will discuss how the Stuxnet virus was used to stop the use and development of nuclear weaponry in Iran. The laws on proper use will also be discussed, exploring whether it was lawful to deploy the virus, with relation to the use of Traditional Military Activities and presidential findings. In addition...

Words: 6507 - Pages: 27

Premium Essay

Religions of the World

...settlers who met the statute's five-year-residency and improvement requirements. In one of the great ironies of American history, the lawless squatters underwent a dramatic image makeover to become, in the gauzy romanticism of our collective memory, heroic settlers” Illegal immigration is an act that should be penalized by federal laws since every body should follow the standard regulations of the law. The ironic part here is that some of those people that are now talking about the criminalization of illegal immigration are biological descendents of those that we proudly and loudly called, “pioneers or settlers” people who initially came to this country and some way or another took private or public lands to establish themselves and their families. Indeed, squatting was very popular mostly in sectors like California and Western states....

Words: 3068 - Pages: 13

Free Essay

Abcccc

...ACKNOWLEDGEMENT I express my sincere thanks to my project guide Mrs. for guiding me right from the inception till the successful completion of the project. I sincerely acknowledge her for extending their valuable guidance, support for literature, critical review for project and the report and above all the moral support she provided me with all stages of this project. I would also like to thank the supporting facilities of my institute, department for their help and co-operation throughout my project. MBA PART-1 Sem.-II INTRODUCTION Terrorism has given up as global threat and terrorists have free flow of information, communication, Information Technology and so forth. Threats from terrorist groups have grown alarmingly and pose a greater challenge to nations. Terrorists conduct their activities with the aim of destruction. The fear of terrorism is looming large in our daily life. There are innumerable incidents of such fear and insecurity. Terrorists attacks has its impact globally –be it tourism, Gross domestic product, medical industry, productivity, aviation industry, stock market etc. Terrorism creates feeling of hatredness, frustration and panic...

Words: 7635 - Pages: 31

Premium Essay

Strategy

...University The Grand Strategy of the United States R.D. Hooker, Jr. INSS Strategic Monograph National Defense University Press Washington, D.C. October 2014 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Portions of this work may be quoted or reprinted without permission, provided that a standard source credit line is included. NDU Press would appreciate a courtesy copy of reprints or reviews. Cover: President Barack Obama and Vice President Joe Biden meet with members of the National Security Council in the Situation Room of the White House hours before his national address, September 10, 2014 (The White House/Pete Souza) First printing, October 2014 Contents The Roots of American Grand Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A Century Like No Other. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The Ends of Grand Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 The Means of Grand Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 The Ways of Grand Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The...

Words: 14241 - Pages: 57