Critical Analysis of the Homeland Security Act
September 11, 2001 also known as 9/11 has become a historic event that changed the life of the Americans public, but also government. On Tuesday morning four American Airlines airplanes were highjacked by radicals that were associated with the Islamic extremist group al Qaeda as directed by their leader Osama Bin Laden. These airplanes were all directed to fly into the biggest cities to command the attention and bring fear to the American public. As each airplane was directed to hit the twin towers of the World Trade Center in New York City, the Pentagon just outside Washington, D.C., and Shanksville, Pennsylvania. It has been labeled one of the deadliest attacks in history calculating to an estimated 2,974 death (Bergen, 2020). The hijacking of aircraft used to destroy Americans lives was something never seen before as a result the United States made it their mission to implement new guidelines to prevent another catastrophic event from occurring. In this paper readers will be able to understand what the 2002 Homeland Security Act is, the goal, what the job of home land security entails, subcategories ran by homeland security, and the National Terrorism Advisory team.
George W. Bush,the 43rd president of the United States, signed the Homeland Security Act of 2002 and began a level of large national security since the act of 1947 (Department of Homeland Security, 2017). The act was implemented as a result of president and other executive officials trying to impede refuge from coming to the United States to commit another tragedy. It was stated by the Kirstjen Nielsen, the Homeland Security Secretary on April 12,2019 “that the lack of coordination and intelligence sharing among government agencies was a central concern that led to the cabinet department’s creation” (Anderson, 2019). As a result, the primary goal that President Bush had in mind when creating this act was a way to hinder terrorist attacks within the United States.
The goals of the Homeland Security Act are to prevent terrorism such as outside threat and decrease the susceptibility of terrorism attack. Until 9/11 occurred the United States, did not have one particular branch that focused on security; just an assortment of federal agencies and the military.
[bookmark: OLE_LINK1][bookmark: OLE_LINK2] The Homeland Security Act offers the secretary of Homeland Security the ability to direct and control enquiries that require access to information needed to investigate and prevent terrorism. The Homeland Security has the authority to investigate minors without the consent of parent or legal guardian if the U.S feels that they are a treat (dhs.gov). Like the Health Insurance Portability and Accountability Act also known as HIPAA, the information that is found is protected from unauthorized personnel. As younger terrorist are being trained by the elders and technology keeps advancing the Homeland security team tracks everyone that they may feel is a threat to its citizens.
As technology keeps advancing many of the Homeland Security accomplishments are to block foreign attacks by illuminating tactics to the public, in addition to tools that may help facilitate an attack. In the article, Department of Homeland Security Strategic Framework for Countering Terrorism and Targeted Violence it states that the Department has used a multi-tiered approach for protection against attacks such as using modern technology, augmenting its intelligence and analytic capabilities, offering innovative training o frontline personnel, and building the capacity of our international partners. The Department of Homeland Security states that forming this new approach it will allow them to “push the borders outward” as the things continue to develop and terrorist continue to think outside the box. As many of the homeland security employees have acknowledged the critical role advances in technology has facilitated in the spread, advancement, and collaboration of violent ideologies and plots of personal throughout the world.
The Homeland Security Act is also recognized as the US Department of Homeland Security. The Department of Homeland Security includes other organizations, such as the Federal Emergency Management Agency, Cybersecurity and Infrastructure, U.S customs and Border protection, FEMA, Federal law enforcement training center, U.S. immigration and Customs enforcement, US Coast Guard, US Secret Service, and Transportation Security Administration (dhs.gov). Without the major subcomponent listed above the Department of Homeland Security will not be able to provide the outmost safety to its citizens, It has been stated that each year 730 million people travel on commercial aircraft, and more than 700 million pieces of luggage are screened for explosive, 11.2 million trucks and 2.2 million rails cars cross into the United States, and 7,500 foreign flagships make 51,000 calls in U.S ports (Dempsey, 2020). As the U.S is the most visited city and holds the most citizens having many of these major subcomponents allows visitors and its citizens to be properly screened to decrease the chances of attacks.
As many of foreigners come to the U.S the Department of Homeland Security initiated a program called US-VISIT and Transportation Security Agency. The US VISIT program is another part of an extent security measurement that begins outside the U.S and continues until the visitors decides to depart. This program is extremely important as it heightens reassurance to its citizens and visitors while permitting legitimate travel and trades across the borders by securing the borders, and facilitating entry and exit. While the Transportation Security Agency also known as TSA is considered the front lines of the nation’s effort to secure air transportation from terrorism ((Dempsey,2020). The TSA employees have been trained to investigate any criminal terrorist behaviors, confiscate firearms, aircraft specific attics, and close quarters self-defense measures to protect the flying public (Dempsey,2020).
Homeland Security also developed a National Threat Advisory system to enhance protection to its citizens through the usage of colors. The National Threat Advisory system utilizes color-coded levels to specify the state of dangers to the country. For example, the color green is considered low threat while red is considered severe. This color system was developed to prepare for forthcoming terrorist attacks and allow for successful communication to occur between parties in a timely and detailed manor.
The Department of Homeland Security ensures to hire the most knowledgeable, qualified, skillful employees, in addition to granting successes in its mission to prevent foreign terrorist whom seek to harm the public. Homeland Security has continually denied entries to foreigners that poses a threat by stopping them at our border or even before they reach it by conducting a thorough background checks and following guideline implementation. The Homeland Security is a department that was solely built to prevent, safeguard against, alleviate, react to, and augment recovery from multidimensional threats to the United States. In conclusion, readers have been able to identify what the 2002 Homeland Security Act is, the goal, what the job of home land security entails, subcategories ran by homeland security, and the National Terrorsism Advisory team.
During the last weeks, the students were introduced to Homeland Security and Homeland Defense; the students learned how to manage risks and get a deeper understanding of cybersecurity in the homeland. Each individual was able to recognize the homeland security enterprise and how the Department of Homeland Security accomplished its risk assessment process. Students have the opportunity to read the cybersecurity strategy from 2018 to collect an appreciation of the hard work and goals that DHS has established when it...
The United States homeland security environment is complex and filled with competing requirements, interests, and incentives that must be balanced and managed effectively to ensure the achievement of key national objectives. The key objective of applying risk management is to build security, safety, and resiliency into all aspects of Homeland Security planning. How does the Department of Homeland Security decide exactly what needs protecting and to what level the protection shall be? It all starts with the risk assessment formula...
It was a very tragic event. On September 11, 2001, a group of terrorists from Al Qaeda launched a large-scale attack on the United States. About 3,000 people died that day. The US government responded quickly to these attacks by creating the Homeland Security Act of 2002 which created the Department of Homeland Security (DHS). The DHS is responsible for border security, immigration, and preventing terror attacks. You’d be surprised to hear that the DHS is also responsible for the...
American Safety after 9/11 The September 11, 2001, coordinated attacks on America’s twin towers that claimed almost 3000 lives changed America’s security and safety measures taken to secure Americans. The attack, being the first foreign attack on Americans since the 1941 Pearl Harbor by Japan, caught the security apparatus unaware thus revealing the various loopholes in the national security system. However, the lessons learnt from the terrorist attack on America’s soil have been applied to improve safety within the borders...
As it stands Homeland Security is doing their utmost to prevent cyber terrorism, but the field is always growing, introducing new ways to code and create programs, thus creating new ways for terrorism to occur. The issue is so bad that the European Union has made a convention to prevent cyber attacks in the 21st century. This allows for a standard of prosecution for those of which who have committed Cyber Attacks on whichever country it happened in. As technology...
Is the Department of Homeland Security fulfilling its main purpose? Filomena, 5, has been crying frequently and has occasionally even vomited out of sorrow since Border Patrol authorities separated her from her father on May 16. Numerous young immigrants have horrifying incidents like the one described above. The Department of Homeland Security (DHS) was specifically instructed by the Trump Administration to prevent illegal immigration, which resulted in these horrible occurrences. But the real question is: What direct threat is currently...
Abstract Homeland Security and Emergency Preparedness has become a valued college program since the September 11th terrorist attacks. The general purpose of homeland security and emergency preparedness courses is to help individuals develop critical thinking and problem-solving skills through active learning, discussions and case studies so that they are able to adapt successfully in an ever changing environment. This study path however can be a challenge because the critical thinking methods of teaching are debatable. This paper will assess key...
I. Differences between the following elements: a) International security and national security Worldwide security additionally refers to the worldwide security of the United States and the remainder of the world. Accordingly, universal security refers to the measures taken by nations including the US, the UN, the EU, and other pertinent bodies to guarantee the shared survival of mankind and human progress. Moves made by nations incorporate confirmed military and political estimates that guarantee shared security, for example, the military settlements,...
There are so many situations happening in the world. One of the biggest problems we have in our community would be veterans/ people being homeless. I believe that just because someone is homeless it does not mean they are different from anyone else. We are all equal and no one is better than another. I assure that homeless people should be helped and heard instead of people making fun of them or not caring just because they are fine. I...
01 / 09
Fair Use Policy
EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via email@example.com.
We are here 24/7 to write your paper in as fast as 3 hours.