Computers and Homeland Security
Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security.
Computer systems are used throughout everyday lifestyles in order to make difficult tasks much simple. The government utilizes such systems in order to support their efforts in locating suspected terrorists throughout U.S. boundary lines. There are several software programs, which can be used in helping homeland security become successful. One program is known as the MATRIX, which is an abbreviation for the Multistate Anti-terrorism Information Exchange System. The MATRIX collects, analyzes, and exchanges terrorist and criminal intelligence data among state and federal agencies. It is a useful program because it contains data, such as criminal histories, driver licenses, and vehicle registrations. .
Computer technology has greatly increased the success of homeland security throughout recent years. It has increased the efficiency of homeland security because without software such as the MATRIX, identifying terrorists and locating criminal histories would become much more time consuming. Receiving satellite pictures and interfering phone calls with suspected terrorists would consume valuable time in the security process. Computers are beneficial because they can increase the speed of the security process and help us locate vital information with greater ease.
...
... middle of paper ...
...d much faster. Without computers we would be unable to track threats to our nation as fast, causing us to not be prepares, and would take to much time to look up histories of people without computers. They are also able to identify people by fingerprints with the computers to track histories of that person. Not only computers increased security, but they have also created more jobs for people to work with the government.
Works Cited
Oja, Dan, and Parsons, June J. Computer Concepts. 8th ed. Boston, MA, 2006.
Security-Enhanced Linux. January 7, 2005. October 4, 2005
.
Travel and Transportation. Feb. 24, 2004. US Department of Homeland Security.,
Washington, DC. October 5, 2005 .
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the potential hazard the situation could cause. When looking at the many functions of the DHS, nothing could be more important than the ability to understand or hinder or stop an attack man made or not. First Homeland Security studies the nature of the risk; this means that they study what is likely to happen in a certain situation. The texted explains risk as what can go wrong. A cigarette smoker takes a risk every time he lights up, and everyone take a risk when getting into a car. The DHS takes what they know from prior circumstances to determine the reality of the risk; the department must also anticipate any attack even without prior knowledge to the circumstance. The main questions of risk assessment are easy to understand, questions like will people be injured or harmed. But when looking at chapter 1 which asks the reader to look further into why terrorist commit terrorism, that’s when its easier to see the DHS skill at risk assessment. For example if you understand that a terrorist attack could be coming from radical Islamist terrorist; then you would understand a risk by understanding their motive behind the attack like their religious holidays. The DHS uses a three-fold method for risk assessment and they are threat, vulnerability and consequence. The Rand organization uses th...
The Department of Homeland Security faces challenges of failure to coordinate and cooperate in the latest fight against computer crimes as well as more general intelligence-gathering operations. (...
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
Homeland security is an American measure to ensure the security of the country. It is the national effort to ensure safety, security, and strength against terrorism and other issues, The goals of homeland security is to which will minimise the vulnerability of the U.S. to terrorism, and reduce the number of damages to the country.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
Homeland security is the way Americans put forth the effort to ensure the homeland is safe, secure, and stands firm against terrorist acts and other hazard that could put the health and welfare of the American people. The mission of the Homeland Security is to prevent terrorism, secure and protect our open borders, uphold all immigration laws, safeguard and secure cyberspace, and be content and resilient when it pertains to disasters.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
The U.S. Police Departments needed a more efficient way to share information across the geographic locations to help prevent and response to crimes faster. After the 9/11, fusion center, enhance their security operations to collect better intelligence. The fusion centers are regional and very efficient when it comes to delivering information to local governments. Bart Johnson started as a law enforcement 32 years ago and seen many changes, which occurred in the fusion center for police department. According to (Roberts, 2011), Johnson says “With better intelligence, you can focus resources where they are needed most,” (para. 3).
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
Oliver, W. (2006). The Fourth Era of Policing: Homeland Security. International Review of Law, Computers & Technology, 20(1/2), 49-62. Doi: 10.1080/13600860600579696
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
As the Department of Homeland Security continues to improve cyber security across all critical information sectors as well as in cyber infrastructure and network they are not effective. This lack of effectiveness comes from the overwhelming work load that is being put on one department which can cause one purpose to fail more than another and as a result the purpose fails as a
Computers have had large impacts, in both negative and positive ways, on law enforcement related professions.With the introduction of the laptop, many vehicles were equipped to carry them in the dash.With these in place, officers can run warrant checks or find other necessary information about you and the vehicle when they pull you over and perform a search.But those same laptops, not the ones used in the cars, and other PCs have also led to a new form of crime that has been rather difficult for police agencies to investigate—cyber crime. So as in many areas, the computer has been a great work tool, but at the same time hinders some of the activities of the police.