Premium Essay

The DHS Agency: The Definition Of Homeland Security

Submitted By
Words 267
Pages 2
The definition of Homeland Security by Collins English Dictionary the meaning of Homeland Security means, “precautions taken by the government of a specified country against terrorist attacks”,(Definition of homeland security. (n.d.). While I do not think that this is a complete definition, I feel that the definition should be something more like, Homeland Security is when any level of government takes actions to prevent or prepare for a natural disaster or an attack United States citizens and soil. The reason why I personally feel that the dictionary’s definition is wrong is the agencies that report to the DHS agency. Some of the Subordinate Agencies that report to DHS are United States Coast Guard (USCG), United States Citizenship and Immigration

Similar Documents

Premium Essay

U.S. Department of Homeland Security

...U.S. Department of Homeland Security Chris Cabral National American University Abstract The primary mission of the Homeland Security Act is to prevent terrorist attacks within the United States, reduce the vulnerability of the United States to terrorism, and minimize damage and assist in recovery for terrorist attacks that occur in the United States. The U.S Department of Homeland Security was established after the 9/11 attacks to counter terrorist activities against the United States. Homeland security is officially defined by the National Strategy for Homeland Security as "a concerted national effort to prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism, and minimize the damage and recover from attacks that do occur”. The major objective of the Patriot Act is “to deter and punish terrorist acts in the United States and around the world to enhance law enforcement investigatory tools" by dramatically reducing restrictions pertaining to law enforcement requests to search telephone records, e-mail communication, and health records. The Patriot Act allows for the emergency disclosure of electronic communications to protect life and broadens the definition of terrorism to include acts of domestic terrorism. Under the Foreign Intelligence Surveillance Act, the Patriot Act allows the director of the Federal Bureau of Investigation or a designee of the director to apply for an order requiring the "production of any tangible things (including...

Words: 3497 - Pages: 14

Free Essay

Department of Homeland Security

...attackers may change but the definition of terrorism today remains similar to the past. With the growing threats from extremists and terrorists from all over the world and especially after the attack on 9/11, United States was forced to ramp up its counter-terrorism policies and abilities. Counter-terrorism operations are offensive measures taken to prevent, deter and respond to terrorism. These CT operations include, but are not limited to, intelligence operations, hostage and sensitive material recovery and direct actions. There are certain units in the US military that are mainly tasked with counter-terrorism. There are also numerous departments within the US government that are tasked with counterterrorism as one of their primary missions, such as the CIA, FBI, DIA and DHS. Department of Homeland Security is one of the newer departments established in the US government. Tom Ridge, the Pennsylvania Governor at the time, was appointed as the first Director for this department about eleven days after the 9/11 attack. The Department of Homeland Security was fully acknowledged, established and operational by March 1, 20013. It is headed by the Secretary of Homeland Security, who is appointed by the President of the United States. The department specializes in protecting American citizens here on homeland and abroad. Its primary responsibilities include: Immigration, cyber securities, responding to natural disasters and now counter-terrorism. The DHS is also accountable for securing...

Words: 376 - Pages: 2

Free Essay

Customs and Border Protection

...support the Department of Homeland Security (DHS). This paper will provide you with facts, highlights, and challenges germane to CBP. You will understand how CBP interacts and operates with the intelligence community and the Armed Forces in order to meet up to their responsibilities. U.S. Customs and Border Protection History The origin of Customs and Border Protection can be dated back as early as the mid-1789, when U.S. congress passed the third of three acts that provided for administering customs tariffs and collecting duties. The Tariff Act of July 4, 1789 had also been passed by Congress followed by the Duties on Tonnage statute on July 20. Another landmark in the history of CBP is the establishment of the 1891 Immigration Act, which created the Office of the Superintendent of Immigration in the Treasury Department. The act allowed for the superintendent to have oversight of the new corps of immigrant inspectors stationed at the country’s principal ports of entry (CBP.Gov, 2014). On May 28, 1924, Congress established the Border Patrol as part of the Immigration Bureau in the Department of Labor through the Labor Appropriation Act of 1924 (CBP.Gov, 2014). The Border Patrol department became the more well-known of them all by majority Americans; they have been responsible for making our territorial lines secure. The attack of 9/11 has transformed the Border Patrol office by emerging the office into the Department of Homeland Security, in turn aligning with...

Words: 3909 - Pages: 16

Premium Essay

I Robot

...In today’s increasingly dangerous world, the need for security is at an all time high. One of the most effective ways to ensure security is to be proactive and deny hostile people the opportunity to attack. Biometrics has given security personnel the ability to accurately identify people. Because of this, government agencies are rapidly increasing the use of biometrics. Biometrics is the measurement and analysis of unique physical characteristics especially as a means of verifying personal identity (Biometrics - Definition). An ideal biometric trait should be universal (all people possess the trait), unique (no two people share the exact same trait), permanent (the trait cannot be changed or altered), and collectable (the trait is able to be read by a sensor and is easily verified) (Jain 92). The most common physical characteristics that are used are fingerprint recognition, hand geometry recognition, and iris recognition (Das 3). Fingerprint recognition involves mapping the various ridges and valleys that form the skin design of a fingerprint (Das 3). Hand geometry recognition deals with creating a three dimensional image of unique features that form the structure of a hand (Das 3). Iris recognition entails examining the unique features of the iris, namely the trabecular meshwork and physiological properties such as freckles, furrows, rings, and the corona (Das 3). All of these characteristics can be digitized and loaded onto a network to form a biometric database...

Words: 1207 - Pages: 5

Free Essay

The Elements of a Risk Management Plan

...be discussed in the chapter. a. Legal basis of modern emergency management in the United States. b. Budget authority. c. Program eligibility. d. Roles and responsibilities. 2. Case Studies a. The National Earthquake Hazard Reduction Program (NEHRP): Legislation to Address a Particular Hazard b. The Homeland Security Act of 2002: A New Emergency Management c. The Disaster Mitigation Act of 2000: A Shift to Pre-Disaster Mitigation 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. NEHRP c. Homeland Security Act of 2002 d. DMA 2000 7. Suggested Out of Class Exercises Introduction No emergency management system anywhere in the world can properly function without statutory authority and consistent budget appropriations. Statutory authority defines disasters programs, determines who is eligible for these programs, provides the legal support needed to implement disaster programs and establishes the legal foundation for funding the programs and activities of the disaster agency. Without such authority, a government agency is powerless. Legal Basis of Modern Emergency Management in the United States The first recorded emergency management legislation in the United States occurred in 1803 when a Congressional Act was passed to provide financial assistance to a New Hampshire town devastated by fire. This is the first example of the...

Words: 25108 - Pages: 101

Premium Essay

Fema

... the total death toll has reached 1,836 as of May 2006, and the experts estimated the total cost of Hurricane Katrina at $81.2 billion or more. It was true that Katrina was a natural disaster; therefore, it was unpredictable and unavoidable. Federal Emergency Management Agency (FEMA) saw its approach to Katrina as a success story. However, many of the criticisms were directed toward the ill-prepared FEMA and the lack of coordination in the rescue operation, in which FEMA refuse volunteers¡¦ help including manpower and food. Some even suggested the abolishment of FEMA for good. The point at issue here is whether FEMA is effective in doing what it is suppose to do. We would identify the strength FEMA possesses, as well as the weaknesses the agency contained. Recommendations would be made in the end by using organizational behavior tools. What is FEMA? The Federal Emergency Management Agency (FEMA) was established as an independent agency by presidential executive order on March 31, 1979. However, after the terrorist attacks of Sept. 11th, FEMA became a part of Department of Homeland Security (DHS) on March 1, 2003. Basically, FEMA integrates the emergency-related programs of Nations and is the central agency within the Federal Government for emergency planning, preparedness, mitigation, response and recovery. FEMA works closely with State and local governments so that FEMA has the capability to offer money for emergency programs, technical guidance and training and also sets...

Words: 4926 - Pages: 20

Free Essay

Supporting Leaders Element and ... Main Executive Element ... Police. Attache. Protocol Dept. Service for. Official. Guest .

...Review question Ch 1 1.Sheriff, Constable, Coroner and the Justice of the Peace. 2.The principle of civil control of the military remained intact, the true legacy of Colonial policing after the Revolutionary War. 3. 4.Law Enforcement in the Wild West wasn't very good. They law officers were essentially bounty hunters, they had a lot of trouble with stopping crime but they did what they could to find the man/woman responsible for a crime as long as they knew who he/she was. 5. He had 9 principles you had to go by here they are. The basic mission for which the police exist is to prevent crime and disorder. The ability of the police to perform their duties is dependent upon public approval of police actions. Police must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. The degree of co-operation of the public that can be secured diminishes proportionately to the necessity of the use of physical force. Police seek and preserve public favour not by catering to public opinion but by constantly demonstrating absolute impartial service to the law. Police use physical force to the extent necessary to secure observance of the law or to restore order only when the exercise of persuasion, advice and warning is found to be insufficient. Police, at all times, should maintain a relationship with the public that gives reality to the historic tradition that the police are the...

Words: 1448 - Pages: 6

Premium Essay

Homelndsecurity

...HOMELAND SECURITY Terry Davis CJAD 495 Professor R. Moser Introduction Since the birth of this nation, there has been concern for security and freedom of all the citizens of the United States. We have fought wars across our nation, across borders and across the globe, all in the pursuit to protect our freedom and the American way of life. There have been many threats against the American pursuit of freedom that started with the Revolutionary War, a young nation fighting to break away from a nation of strength. Then our battle over land expansion and the taking of the land from the Native Americans, some perceived them as savages or maybe even terrorist. Then we turned to secure our borders to prevent other nations from coming into our nation and grabbing up land. Then our pursuit of freedom expanded the globe and with other nations as we assisted in the attempt to spread democracy in countries struggling to become nations. In this attempt, there have been many enemies formed that despise the US and the pursuit of freedom. This has become a major concern of the US and on September 11, 2001, this concern became a reality. How could something so devastating be carried out against a world-leading nation? What was wrong with the infrastructure and how could it be fixed to prevent other terrorist attacks. The answer was to form a department in the federal government that would have the power to act and the power to share intelligence information. Terrorism and US Threats ...

Words: 3262 - Pages: 14

Free Essay

Change Managment

...Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator somewhere made a small mistake that generated bogus routing information...

Words: 2007 - Pages: 9

Premium Essay

Communication in Science

...Chapter 6: Communication Chapter Outline 1. Introduction of topics and concepts to be discussed in the chapter. a. Mission b. Principles i. Customer Focus ii. Leadership Commitment iii. Inclusion of Communications in Planning and Operations iv. Information Collection, Analysis and Dissemination v. Media Partnership c. Conclusion 2. Case Studies a. Risk Communication During the Washington D.C. Sniper Crisis b. The Homeland Security Advisory System c. A Comparison of Leadership Between Two Outbreaks of Smallpox in the United States: New York City, 1947, and Milwaukee, 1894 3. Additional Sources of Information 4. Glossary of Terms 5. Acronyms 6. Discussion Questions a. General b. Washington, DC Sniper c. Homeland Security Advisory System d. Smallpox Outbreaks 7. Suggested Out of Class Exercises Introduction Communications has become an increasingly critical function in emergency management. The dissemination of timely and accurate information to the general public, elected and community officials and the media plays a major role in the effective management of disaster response and recovery activities. Communicating preparedness, prevention and mitigation information promotes actions that reduce the risk of future disasters. Communicating policies, goals and priorities to staff, partners and participants enhances support and promotes a more efficient disaster...

Words: 23767 - Pages: 96

Premium Essay

Risk Management Security

...Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP). Scope The risk management plan is for the organization use only and its network, including remote access company owned building in United States. Outside sources from this scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to the fact that the outside source may not protected to interact with other outside sources allowing hackers to infiltrate your system and steal important files. Compliances Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance...

Words: 1365 - Pages: 6

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ..................................................................

Words: 13816 - Pages: 56

Free Essay

How Will a Severe Terrorist Alert Effect Tourism in South Carolina

...HOW WILL A SEVERE TERRORIST ALERT EFFECT TOURISM IN SOUTH CAROLINA Brianne Buckner Dr. BRIAN MCCUE PAD 590 JUNE 21, 2010 STRAYER UNIVERSITY CHARLESTON, SC CAMPUS This Directed Research Project (DRP), was conducted and orally presented By ………………………………………………………………………………. Brianne Buckner, Student We hereby certify that this DRP submitted by Brianne Buckner conforms to acceptable standards, and as such is fully adequate in scope and quality. It is therefore approved as the fulfillment of the requirement of the degree of Hospitality and Tourism Management, MBA Approved:_________________________________________ Supervising Faculty__________________________________ Peer Review/Technical Advisor________________________ TABLE OF CONTENTS Page APROVAL PAGE………………………………………………………………………...i ABSTRACT………………………………………………………………………………ii TABLE OF CONTENTS...................................................................................................iii LIST OF TABLES AND FIGURES………………………………………………….….iv CHAPTER 1: INTRODUCTION TO THE STUDY………………………………….….6 Context of the Problem……………………………………………………………6 Statement of the Problem………………………………………………………….7 Main Research Question and Sub-questions………………………………………7 Significance of the Study…………………...…………………………….……….8 Research Design and Methodology………...

Words: 17727 - Pages: 71

Premium Essay

Cyber Crime

...State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ....................................................

Words: 13816 - Pages: 56

Premium Essay

Notes

...Risk is the likelihood that a loss will occur. Losses occur when a threat exposes a vulnerability Threat—A threat is any activity that represents a possible danger. • Vulnerability—A vulnerability is a weakness. • Loss—A loss results in a compromise to business functions or assets. Assets can have both tangible and intangible values. The tangible value is the actual cost of the asset. The intangible value is value that cannot be measured by cost, Tangible includes • Computer systems—Servers, desktop PCs, and mobile computers are all tangible assets. • Network components—Routers, switches, firewalls, and any other components necessary to keep the network running are assets. • Software applications—Any application that can be installed on a computer system is considered a tangible asset. • Data—This includes the large­scale databases that are integral to many businesses. It also includes the data used and manipulated by each employee or custome The intangible value includes: • Future lost revenue—Any additional purchases the customers make with the other company is a loss to your company. • Cost of gaining the customer—A lot of money is invested to attract customers. It is much easier to sell to a repeat customer than it is to acquire a new customer. If you lose a customer, you lose the investment. Customer influence—Customers have friends, families, and business partners. They commonly share their experience with others, especially if the experience is...

Words: 3234 - Pages: 13