Introduction
The private sector of the United States of America has obtained a unique role pertaining to the overall security of the nation. On one hand, the sector is responsible for the majority of critical infrastructure in the United States and, on the other, integrates with federal, state, and local agencies to ensure that assets are protected, technologies are developed, and relations are maintained. So besides being responsible for the majority of key infrastructure while integrating with other entities, how does the private sector contribute to the overall defense of the United States?
The Quadrennial Homeland Security Review of 2014 has established five key mission areas, the basic areas of the Department of Homeland Security’s (DHS) mission, to focus on and serve as a guide to security efforts that can
…show more content…
combat the evolving threats and hazards the nation could face today and tomorrow. The success of these missions depends greatly on the areas across the DHS and the numerous security partners’ abilities to establish unity of effort (DHS 2014, 14). This paper will list these mission areas and offer information about how private sector entities contribute to reach the overall goal set forth by the Department of Homeland Security. Mission 1: Prevent Terrorism and Enhance Security Terrorism has taken center stage since the attacks of September 11, 2001 and continues to be a constant threat to the United States.
Security remains a vital component which deters terrorist attacks towards critical domestic infrastructure and high-payoff targets. Chemical, biological, radiological, and nuclear threats still remain an area of high concern and these threats will, more than likely, be directed towards critical infrastructure often controlled by private sector organizations (DHS 2014, 19).
New policies established by the White House security strategy assigned the federal government an essentially passive role towards protecting assets located in the United States. According to Flynn and Prieto, the private sector has sufficient assets to supply protection, outside of national defense and border security, and should be relied upon to address certain aspects of securing infrastructure. Enhancing security directly contributes to the prevention of terrorism and the private sector is in the best position to address the expanding vulnerability of critical infrastructure (Flynn & Preito 2006,
11). Since the majority of infrastructure is owned and operated by the private sector, it only makes sense to include the owners and partners in any effort to confront terrorism. During the aftermath of 9/11, many private sector corporations developed a protocol for enhancing security known as the Customs-Trade Partnership against Terrorism (C-TPAT). This program has enlisted 5,800 companies to partner and work with government to improve national security and customs together (Flynn & Prieto 2006, 9). Countering the terrorist threat starts with creating hard targets. Most of those targets are owned and operated by members of the private sector. Mission 2: Secure and Manage our Borders The protection and management of America’s borders is a critical component that is necessary to achieve a stability that is vital for overall security. Criminal and trafficking networks, illegal immigrants, and terrorist infiltration are real world threats that may attempt access through the borders. Although securing and managing United States’ borders primarily falls on the government, the private sector contributes to this mission task a number of different ways. The major project to erect a 10-foot high fence in 1993 was completed primarily by private corporations that agreed to government contracts. Other innovations such as surveillance systems and stadium-type lighting were also put into place by private sector companies (Cornelius 2005, 779). These are tasks that are completed by private sector entities but are initiated and regulated by government policy and necessity. The projects put into place to protect, manage, and secure the borders is a direct result of government coordination with private-sector partners that are at the leading edge of technological development (Obama 2010, 18). Federal border patrol efforts are augmented with private sector products such as upgraded vehicles, state of the art surveillance equipment, intelligence and reconnaissance gear, and
Homeland Security Presidential Directive 5 directly relates to the National Incident Management System and the National Response Framework. In fact, it directly correlates with their missions. HSPD-5 was the directive that needed to start things in motion; NIMS and the NRF are the aftermath of the directive. With the formation of NIMS and soon after the NRF, America can operate successfully under one national manage...
After the fear of terrorism grew in the United States do to the Al Qaeda 9/11 attacks on the World Trade Center and Pentagon, the US Government found a need for a centralized department that umbrellas all other agencies when it comes to homeland security. The U.S. Government found this umbrella agency with the passage of the Homeland Security Act by Congress in November 2002, the Department of Homeland Security formally came into being as a stand-alone, Cabinet-level department to further coordinate and unify national homeland security efforts. (Homeland Security) With the creation of the new Department of Homeland Security (DHS) the government had a pinpoint location for the collection and gathering of intelligence, control of policies that effect national security, and a no fail mission. The Department of Homeland Security started to engulf other agencies and created many more, a total of 22 agencies now fall under the DHS. The DHS is control of all areas that deal with national security which included but are not limited to coastal and boarder protection, domestic terrorism, international terrorism, protection of the American people, protection of key infrastructure, protection of key resources and respond to natural disasters.
The general topic for this literature review will be an examination of the Department of Defense and the National Guard in terms of Homeland Security. The areas of Homeland Defense and Civil Support will be primary subsections of Homeland Security which will be reviewed. For purposes of defining a time period none of the literature reviewed will be prior to September 11, 2001. The reasoning for this being to examine Homeland Defense using literature pertaining to 9/11 and the Boston Marathon Bombing, and Civil Support using literature pertaining to Hurricane Katrina.
Homeland Security’s mission is “to secure the nation from the many threats we face. With honor and integrity, we will safeguard the American people, our homeland, and our values.”[3]
This paper will briefly discuss the formation of the Department of Homeland Security (DHS). With every government program or agency comes an alphabet soup of acronyms and DHS is no different from the rest. To better understand the agency and concepts that comprise DHS, this paper will also examine acronyms associated with DHS. They are QHSR, HSE, NRF, NIMS, ICS, and UC. Each will get a description while highlighting and discussing core elements or requirements that each acronym calls for or offers.
The Executive Order Establishing Office of Homeland Security Council puts forth an agenda on countering terrorist acts; it is done to prevent untold a...
September 11, 2001 marked the most horrific day in history for United States of America. The events of this day changed the lives of those residing in America forever. United States was considered somewhat safe, in regards to terrorists’ attacks. However, this all came to a screeching halt when 19 militants known to be a part of the Al-Qaeda terrorist group hijacked four planes for the purpose of destroying targeted areas in the United States. As a result of the deadly attack on the United States, security measures drastically changed. Although, security measures throughout the United States have been in place, extreme caution came into effect. All departments looked at different measures to improve preventing terrorists’ attacks. Department of Homeland Security, Aviation and US Customs and Immigration were some of the main areas that changed their security measures.
According to Cambridge Dictionaries Online (2016), defense spending is “money spent by a government to provide its military with weapons, equipment, and soldiers.” Defense spending is what keeps us safe and can include a wide array of expenditures from the acquisition of weaponry to the recruitment of a high school student for military training. Allocating funds for national defense within a country is of great importance because it “is one of the most important objectives of any government because national security is a necessary condition for a government to pursue other policy objectives” (Heo & Bohte, 2012, p. 416). Essentially, in order for citizens to feel safe and secure, it is important that the United States have a national defense budget in case a threat arises. Just like a homeowner takes out an insurance policy and has a security system installed, they hope that these will never have to be utilized, but are available if needed to protect the family. Similarly, the United States has equipped itself with air, naval, ground bases as well as a stockpile of weaponry in the event that we find ourselves offensively or defensively
(Kidwell, 2005) The government typically hires private security contractors to provide services that formally belonged to military forces such as the protection of high profile dignitaries and the guarding of military installations overseas. The proliferation of private military companies jumped significantly after the events of 9/11. The Bush Administration enacted a three-phase plan to increase the number of private contractors hired. The first phase in the hiring process was to try to release the military to fight the war on terrorism; the second phase was to allow commanders to focus their efforts on winning the war by outsourcing supplementary functions; third, it would support the President’s Management Agenda.
However, some sources say that the DHS lead National Infrastructure Protection Plan (NIPP) falls well short because of not listening and not sharing information with critical infrastructure owner/operators. The NIPP document created by the DHS is for the government and is not a plan to improve resilience. The document is said to lack private sector information and most feel that the meetings with the government about the document were not heard. As for the information sharing part of the document there are shortcomings that do not enhance national level situational awareness. However, there are seven topics raised in the new document after its original creation four years ago. The first is to elevate security and resilience as the primary aim of CIP efforts. Second, expanding and updating critical infrastructure risk management. Third, focus on national priorities jointly determined by public and private sector. Fourth, integrate cyber and physical security. Fifth, affirm the reality that critical infrastructure security and resilience require international collaboration. Sixth, show continued progress to support execution of the plan at both national and community levels. Lastly, present a detailed Call to Action that includes steps the federal government will undertake to work with partners to make progress toward security and
Once coming up with a defense policy, it is important that we define the existing threats in the world so that we minimize the potential chances for failure. There are many threats in the international community that could make success of these policies very difficult. Such issues as the threat of nuclear war and the threat of shortages of natural resources could make implementation of these policies virtually impossible. Along with recognizing the threats to the Unites States from the international community, it is important that we not neglect the internal issues that could threaten the U.S. as a superpower. Recognizing this, it is important to makes sure that the United States maintains a strong economy.
...the nation’s critical infrastructure. With the creation of the DHS the government has shown that they are investing money and resources into protecting our nation’s infrastructure.
Col. Randy Larson, renown author and Director of the Weapons of Mass Destruction (WMD) Center, speaks on an in-depth prospective of the field of homeland security and factors that drive the continued efforts to address future threats to the nation for the 21 century. The area of focus presented in the interview are the various ways an individual may enter the field but are not limited to a particular area of study. For example, health care, agriculture, or political science, there is essential no set track for finding a career in homeland security. Challenges surrounding area of homeland security are the mounting financial burdens and the need for the appointment of leadership at a national executive level to address this realistic future threat. Despite these concerns, evidence suggests quality system practices can assist in guiding theses area and the adoption of tools that support quality improvement when addressing homeland security and future concerns.
It is unrealistic to imagine that the copious amount of departments responsible for cybersecurity are able to adequately protect the country; therefore, the government needs to form one department that can be responsible for all cybersecurity problems and cyberattacks. When forming this new department, resources from other groups that currently share responsibility can be moved in order to decrease the amount of resources needed for the new group. But, it is also unfathomable for the government to be responsible for all cybersecurity as “... the reality is that while the lion’s share of the cybersecurity expertise lies in the federal government, more than 90 percent of the physical infrastructure of the Web is owned by private industry” (McConnell 4). Therefore the government must collaborate with the private sector. This cooperation can be utilized to help form the new government group as “there is also an opportunity for the new agency to be formed in a more deliberate way, drawing on leadership from the private economy to promote efficiency and cost-effectiveness” (Cohen 2). By working with the private sector, the new agency can reduce costs of personnel and equipment, increase performance, and maintain diverse cybersecurity plans. Once a
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.