Computers and Homeland Security
Homeland Security is one of the most important departments in the United States. The United States Department of Homeland Security job is to reduce our vulnerability to terrorism and lead a national effort to help prevent terrorist attacks on our nation (Computer Concept, pg. 50). As technology evolves over the course of time, computers end up playing a crucial role in homeland security.
Computer systems are used throughout everyday lifestyles in order to make difficult tasks much simple. The government utilizes such systems in order to support their efforts in locating suspected terrorists throughout U.S. boundary lines. There are several software programs, which can be used in helping homeland security become successful. One program is known as the MATRIX, which is an abbreviation for the Multistate Anti-terrorism Information Exchange System. The MATRIX collects, analyzes, and exchanges terrorist and criminal intelligence data among state and federal agencies. It is a useful program because it contains data, such as criminal histories, driver licenses, and vehicle registrations. .
Computer technology has greatly increased the success of homeland security throughout recent years. It has increased the efficiency of homeland security because without software such as the MATRIX, identifying terrorists and locating criminal histories would become much more time consuming. Receiving satellite pictures and interfering phone calls with suspected terrorists would consume valuable time in the security process. Computers are beneficial because they can increase the speed of the security process and help us locate vital information with greater ease.
...
... middle of paper ...
...d much faster. Without computers we would be unable to track threats to our nation as fast, causing us to not be prepares, and would take to much time to look up histories of people without computers. They are also able to identify people by fingerprints with the computers to track histories of that person. Not only computers increased security, but they have also created more jobs for people to work with the government.
Works Cited
Oja, Dan, and Parsons, June J. Computer Concepts. 8th ed. Boston, MA, 2006.
Security-Enhanced Linux. January 7, 2005. October 4, 2005
.
Travel and Transportation. Feb. 24, 2004. US Department of Homeland Security.,
Washington, DC. October 5, 2005 .
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
Chapter 1-3 showed the beginnings of homeland security and the expansion and growth of Homeland Security. Chapter 4 shows the actions of homeland security, and the steps they take toward a problem to access it. The DHS above all needs to realized and understand how to address an attack quickly and efficiently, and have counter measure put into place beforehand. The DHS must be able to access the risks of any situation, and must decipher the potential hazard the situation could cause. When looking at the many functions of the DHS, nothing could be more important than the ability to understand or hinder or stop an attack man made or not. First Homeland Security studies the nature of the risk; this means that they study what is likely to happen in a certain situation. The texted explains risk as what can go wrong. A cigarette smoker takes a risk every time he lights up, and everyone take a risk when getting into a car. The DHS takes what they know from prior circumstances to determine the reality of the risk; the department must also anticipate any attack even without prior knowledge to the circumstance. The main questions of risk assessment are easy to understand, questions like will people be injured or harmed. But when looking at chapter 1 which asks the reader to look further into why terrorist commit terrorism, that’s when its easier to see the DHS skill at risk assessment. For example if you understand that a terrorist attack could be coming from radical Islamist terrorist; then you would understand a risk by understanding their motive behind the attack like their religious holidays. The DHS uses a three-fold method for risk assessment and they are threat, vulnerability and consequence. The Rand organization uses th...
The Department of Homeland Security faces challenges of failure to coordinate and cooperate in the latest fight against computer crimes as well as more general intelligence-gathering operations. (...
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
Homeland security is an American measure to ensure the security of the country. It is the national effort to ensure safety, security, and strength against terrorism and other issues, The goals of homeland security is to which will minimise the vulnerability of the U.S. to terrorism, and reduce the number of damages to the country.
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
With the government’s fear of another 9/11, preventing this from reoccurring is very crucial to the United States politicians and so through the use of modern technology, they are willing an...
Homeland security is the way Americans put forth the effort to ensure the homeland is safe, secure, and stands firm against terrorist acts and other hazard that could put the health and welfare of the American people. The mission of the Homeland Security is to prevent terrorism, secure and protect our open borders, uphold all immigration laws, safeguard and secure cyberspace, and be content and resilient when it pertains to disasters.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
The U.S. Police Departments needed a more efficient way to share information across the geographic locations to help prevent and response to crimes faster. After the 9/11, fusion center, enhance their security operations to collect better intelligence. The fusion centers are regional and very efficient when it comes to delivering information to local governments. Bart Johnson started as a law enforcement 32 years ago and seen many changes, which occurred in the fusion center for police department. According to (Roberts, 2011), Johnson says “With better intelligence, you can focus resources where they are needed most,” (para. 3).
Oliver, W. (2006). The Fourth Era of Policing: Homeland Security. International Review of Law, Computers & Technology, 20(1/2), 49-62. Doi: 10.1080/13600860600579696
September 11, is a time etched in history of the United States, more so than the majority any past conflicts or disasters felt on domestic land. This caused our country to consider its safety for family, friend, and country that has caused a shift in considered career paths or chosen professions. Larsen address the need for a different type expert needed to talk the threats of homeland security (n.d). Studies now show that the past prerequisite degrees like, biomedical are chemistry are no longer the normal backgrounds in the profession of homeland security. Furthermore, to meet the demand of the new career path, many colleges, and university to introduce and address the needs of the field. By 2012 nearly a quarter of all federal jobs were related to homeland security, while ...
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
Computers take part in a big role in the Criminal Justice Field. So far computers have allowed us to make it accessible for witnesses to go through and look for a suspect's picture on the screen. Computers have enabled us to be able to do DNA testing. Which now only takes the labs a short time to process, and finding criminals from cases 15+ years ago can now be charged for their actions.