Preview

Assignment 3: Homeland Security Integrative Project

Best Essays
Open Document
Open Document
2640 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 3: Homeland Security Integrative Project
Homeland Security Integrative Project
Leone, Tom-James

June 11, 2013

Abstract

Having well-developed protocols on issues of security, as well as utilizing such well-developed protocols as part of a strategy in attending to security issues, and periodically reviewing such utilized security protocols as time passes-by in order to increase efficiency is the most enduring way to keep enriching the practices of , and in strengthening US homeland security. Due to lack of a single security protocol that could be utilized effectively in attending to all issues pertaining to security, the US government has continued to developing new security protocols, and equally deploys Existing Security Instruments (ESI) such as the
…show more content…
In summary FEMA avers that using ICS for every incident in emergency management would help the user, whether US Homeland security personnel, or a corporate body to develop and maintain skills which could be utilized in larger-scale incidents. Regarding the National Contingency Plan (NCP) which remains the blue-print and the principal management tool that is currently utilized in Oil spill disaster response and management, Jackson (2011) informs that the importance of NCP is that NCP provides the US federal government with a framework for notifying and communicating citizens with information regarding Oil spill disasters, and the modalities to be utilized when Oil spills …show more content…
Forest-Fires and Oil spills are two different disaster events that have different trajectories, and require the deployment and utilization of specialized tools and equipment. Mostly, the tools utilized in attending to Forest-fires by personnel would be different from the tools that would be deployed in Oil spills, and new tools when provided to the same personnel without adequate training, in utility do create additional challenges. Where and when this process is negated, matching skill-sets are done inefficiently. Some of these includes: Deploying disaster trained personnel such as the US Coast Guard in supporting administrative positions, and in resource or planning sections. A reference case in point includes during the DWHO where the U.S Coast Guards members were inefficient due to lacking appropriate training regarding Oil-spill response and activities. Rather, U.S Coast Guards member’s services had been traditionally utilized in attending to mass rescue operations, natural disasters and national security

You May Also Find These Documents Helpful

  • Good Essays

    Responding to a disaster can be a hectic time. A vital mitigation action of this chaos can be achieved by knowing who is leading what segment of the response and what each segment’s roles and responsibilities are. Therefore, it is wise that the emergency management team delegate Emergency Support Functions (ESFs) into the Emergency Operation Plan (EOP) for their jurisdiction. While it is not a recognized requirement to list and identify ESFs, but including them into the EOP allows all personnel involved in the Emergency Management (EM) team to understand what is expected of the functions, identifies resource management and therefore eases communication. The support functions are akin to a house of cards, removing any one of the support functions and the capabilities of the remaining functions be hindered, or will result in a failed EOP response. This paper will be addressing the role of ESF 7 Resource Support, commonly referred to as logistics.…

    • 625 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Yemen that is experiencing widespread armed conflict has been designated for Temporary Protected Status (TPS). Secretary of Homeland Security Jeh Johnson designated the country for TPS for 18 months. The designation will let the nationals of Yemen to remain and work in the U.S. TPS extension is effective from September 3, 2015 through March 3, 2015.…

    • 466 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    FEMA: Project Impact

    • 303 Words
    • 2 Pages

    To begin, I previously mentioned Leadership, which is mentioned in the (D & D) text. Strong effective leadership is key not only to emergency response preparedness, but in every aspect and every part of our county. We have a system in place in which we the people elect our leaders and those we would like to be in control in the event that something as small as a fire, something that escalates into a computer bug meant to devastate the masses in a computer-based society, to terrorism on American soil, either foreign or domestic. Leadership and management skills…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In an effort to maintain the security of our nation, the Department of Homeland Security has developed a system called the National Terrorism Advisory System that releases security threat updates that can be easily accessible to other departments, private organizations, and even the public. However, before the National Terrorism Advisory System, or NTAS, there was the Homeland Security Advisory System, or HSAS, which was a color-coded advisory system that correlated the threat level to that of green, blue, yellow, orange, and red. In this paper, the author will further explain the two systems as well as explain the differences in the systems and why there was a change. The author will begin with discussing the Homeland Security Advisory System.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Since 9/11, security specialists are concentrated on wide security investments to defend and protect targets from terrorist attacks which is the main threat nowadays, theft, criminality and harm. Security experts entrusted with ensuring these facilities must conform to redesigned principles and controls while tending to the necessities of people and airlines. Physical security is by all account not the only concentration in today's assessed dangers. Network security is as critically essential as physical security. The way to deal with "solidify" airports requires security staff to interest in innovation that offers more prominent assurance, insight and IT…

    • 97 Words
    • 1 Page
    Good Essays
  • Good Essays

    The author also explains that involving the people would be critical since presuming their submissiveness risks creating resentment and lack of cooperation over time. It is important to make the people to understand the appropriateness of security measures to increase their willingness to collaborate to achieve security goals. Further, the author advocates for opening up of homeland security work to avoid working in secrecy and involve the private sector and the general public. The author sees the move to insulate information from the public as undermining the defense of critical…

    • 872 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Incident Command System

    • 1697 Words
    • 7 Pages

    2017 has seen many challenges to first responders nationwide. These include terrorist attacks, hurricanes, wildfires, and other mass response situations. These had great responses by first responders. This is due in part to the creation of the Incident Command System (ICS). This system allows for communication between different agencies and allows for a better response to mass incidents.…

    • 1697 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    After the attacks of September 11, 2001, the United States system went through a change in reforming government agencies to protect the American borders against any threats. The government established the Department of Homeland Security, which mission is to protect America borders against external or internal threats that could potential cause harm in our nation. Since the Department of Homeland Security continues improving the national security protection of this nation by establishing effective programs and activities…

    • 2663 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    One of the major responsibilities the President is known to have would be that of protecting the people. The Department of Homeland Security was established in response to the biggest terrorist attack on U.S. soil on September 11, 2001. This attack sparked the nation and caused fear among citizens as well as opening eyes of the government to how much stronger the security level had to be in the country. U.S. officials began to reconstruct the Office of Homeland Security once they recognized their shortcomings.…

    • 256 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Blank and Blank (Year) state that, “terrorist attacks can produce conditions that resemble disasters, such as the following: Kill or injure large numbers of people, affect a large geographic area and many jurisdiction…” (p. 108). This is why the Incident Command System can be tremendously important. When a major terrorist attack happens, it will involve multiple agencies. The September 11 attacks are an example of how interoperability can fail. The radios utilized by the NYPD and FDNY were not compatible with each other, because the individual agencies did not want to speak to each other (Newman, Year, p. 126). This led to a lapse in communications. The ICS contains pre-established chains of command that serves to mitigate inoperability between differing agencies. In incidents involving weapons of mass destructions, there is an added danger. Through the use of chemical, biological, radiological, or nuclear (CBRN) hazards; terrorists can make a dangerous situation even deadlier. The introduction of CBRN agents can make an attack more deadly and contagious. The proper identification of symptoms and their causes is not always readily apparent either. Information sharing is enormously vital in this regard. All responders must be made aware of any possible CBRN contamination in order to mitigate the effects as much as…

    • 605 Words
    • 3 Pages
    Good Essays
  • Better Essays

    This paper covers how The Department of Homeland Security combats domestic terrorism in the United States. It takes into account the terrorist problems, factions involved and the counter measured imposed. This paper also takes into account the critics levied on the policies outlined in the Department of Homeland Security and solution propositions. The paper achieves this through the Socratic approach which mainly capitalizes on a debating argument that enhances critical thinking on the matters at hand. Various terrorist organizations are reviewed, their ideologies explained and solution to their grievances explained. Also, the overall assumption on the relationship between…

    • 2698 Words
    • 11 Pages
    Better Essays
  • Good Essays

    The Department of Homeland Security has faced many challenges from the beginning of operation. One, of many challenges, is leadership. The Department of Homeland Security consist of many high ranking officials, whom all have different opinions and views. At times, the differences of opinions can lead to disagreements and a lack of cooperation needed to implement an achievable national strategy. There are multiple agencies involved with Homeland Security, but they all have the same goal in mind and that is to protect us Americans and the American soil. Their need to be one approval authority to have the final voice to initiate a strategy within the DHS. This way we all can have a solid plan to be better proactive and reactive when facing a natural…

    • 236 Words
    • 1 Page
    Good Essays
  • Better Essays

    The evolution of Homeland Security seems like a relatively new one, but really the history leading up to it began in the 1800s. Over time, however, improved preparedness, response and recovery, and creation of certain protective documents influenced how we view Homeland Security today. Bottom line, Homeland Security and its governing documents, specifically the National Incident Management System (NIMS) and National Response Framework (NRF), exist for a reason, these reasons and the documents are important to review.…

    • 950 Words
    • 4 Pages
    Better Essays