The development of Homeland Security began in the last decade for the management of internal and external security of a nation. The Security Act by Congress in November 2002 led to the development of Department of Homeland Security. The department was to safeguard the nation against terrorism as well as act upon any future attacks.
The first participation of the Department of Homeland Security was the terrorist attack in September 2011. The department is a federal agency structured to ensure protection of the US against threats. The unit is assigned responsibilities such as aviation security, border control, emergency response and cyber security. The first director of the Department after the September 2011 terror attack was Governor Tom Ridge. The manuscript herein is a discussion on the US Department of Homeland Security. Accurately analyzing its current state and providing recommendations to be adopted to perfect their performance (Carafano & Heyman, 2004).
Assessment of the US Homeland Department is highly based on the advancing strategies from the enemies. To meet the mission and vision of the department, provide a safe, secure and resilient homeland. The legal systems related to home security in the US are well funded. The funding by private organizations, individuals, and the Congress has reduced the burden on the federal government. It is for this purpose that the US security is highly maintained as compared to that of other nations that have less funding laid on homeland security. In case of limited resources, the federal government comes in to fill the gap, and the Congress ensures that unclear policies are well prioritized to avoid any element that would hamper homeland security (Guard, 2011).
In the current times, the White House and DHS provide the primary strategies for homeland security in the US. President Obama works tirelessly towards securing the US community against 21st-century attacks. The procedures lay down by the president, and the DHS are geared towards preparation and planning for emergencies as well as investigating a stable response and recovery capabilities. The president laid an elaborate cutting edge strategy to fight transnational arranged crimes. The approach is called National Strategy for Counter Terrorism launched in 2010 during his SAIS speech dubbed “Ensuring al-Qa’ida’s Demise”. The DHS also employ advanced technology in protecting American people against cyber insecurity. In consideration to this, several computer software programs have been put in place to identify hackers and cyber robbers. Indeed, the American authorities are working tirelessly towards homeland security (Carafano & Heyman, 2004).
Despite the substantial efforts by the government and DHS, insecurity is still experienced in America. To deal with the existing loopholes, the US needs to advance its technology beyond the knowledge of the terrorists. To achieve this, additional funds and secret DHS laboratory needs to be developed to achieve the primary goal of DHS. Additionally, the US needs to work together with their allies to understand the aspects that lead to the development of terrorist groups. Collaboration with other nations is proper as it widens security knowledge as well as finds ways to prevent terrorists from getting into other countries and perform their attack on the US properties. Therefore, the choice of DHS working with concrete developed countries and sidelining developing nations in matters of homeland security is not proper. The practice profoundly endangers their state (Guard, 2011).
References
Carafano, J. J., & Heyman, D. (2004). DHS 2.0: rethinking the Department of Homeland Security. Heritage Foundation.
Guard, U. C. (2011). US Department of Homeland Security. Boston, MA.
With the free school education in place in kenya, it emerged that a high number of turkana county children did not go to school for lack of food. A group of students from this region resolved to support a food program through a donation page that would offer free essay resources to university students. Touched with this story, we ask for your support to show that poor turkana child that we care for their education and a better future
Subscribe to:
Post Comments (Atom)
Leadership Trends in Common Wealth Bank
Overview of Common Wealth Bank of Australia Commonwealth bank of Australia is one out of four largest integrated financial institutions. T...
-
Introduction SAP an acronym for Systems, Applications, and Products in Data Processing, refers to software that has wide range of applicat...
-
Introduction The rise in globalization has led to the diversification of workforce. With the concept of employee diversification, people f...
-
Overview of Common Wealth Bank of Australia Commonwealth bank of Australia is one out of four largest integrated financial institutions. T...
No comments:
Post a Comment