Friday, March 29, 2019

Terrorism Prevention Program for Homeland Security

terrorism Prevention Program for Homeland suretyJacob MaloneThe Department of Homeland protections resource is a homeland that is safe, secure, and resilient against terrorism and other hazards, where American interests, aspirations, and agency of life can thrive. In parliamentary law to accomplish this, according to trash Fulghum (2016), DHS employs over 225,000 people in jobs from b format bail to cybersecurity analysis and mustiness work together to combat a wide range of curses. With a wide array of job duties it is clear that their main goal is to lionize America safe.According to Roger Kemp (2012), The Department of Homeland Security (DHS) formally came into beingness as a standalone, Gabinet-level, department to further coordinate the unify subject atomic number 18a homeland security efforts, opening its doors on March 1,2003 (p. 28). DHS primary military commission is to prevent terrorism and enhance security. Stopping and preventing terrorism is the keystone of DHS. The threat of terrorism to the nation has get ond over the years since the last quadrennial canvass in 2010. It remains real and even harder to detect. An example of this evolution is the capital of battalionach physical exertiontts Marathon bombing. We are facing more lone wolf snipeers that are inspired and encouraged by fanatical ideologies to radicalize to violence and commit diabolically terrorist acts towards Americans. These independent acts are the hardest to detect and DHS will remain vigilant in identifying and countering these threats.DHS Priorities to Secure Against the Evolving Terrorism ThreatIdentify, Investigate, and Interdict Threats as Early as PossibleShrink the Haystack puff out Risk Based SecurityFocus on Countering Violent Extremism and service to Prevent Complex Mass Casualty AttacksReduce Vulnerabilities recant Resources, Deny TargetsUncover Patterns and Faint Signals provoke Data Integration and summaryTable 1Identify, Investigate, and Interd ict Threats as Early as Possible Due to the present and development of strength attacks and threats, a prime concern is that these vicious fanatical can fall upon undetected across boarders within conflict zones. An example would be the conflicts in Syria and Yemen where they can train other like-minded people in tactics, skills, and weapons for the use of terrorism. In addition to, many other nations are incapable of securing their feature borders and prevent illegitimate run of people and goods and the inability to collect impost revenues to support governance. As a result, they are on the verge of acres failure.DHS and the Departments of State, Defense, and Justice will address the vulnerabilities and improve the safe and protected roleplayment of people and goods by prioritizing support to external partners to increase their border supervision, tradition integrity, and the capacities and capabilities of their law enforcement. In addition, it is vital to use the culture we receive in advance to screen abroad based on risk preferably of waiting to screen upon the arrival of the United States.Shrink the Haystack Expand Risk-Based Security Due to the decentralized nature of the present threat makes it of the essence(predicate) that we migrate away from a one-size-fits-all type of security move up and move in the direction of risk informed and intelligence-driven. With this new mindset, DHS will strain more on identifying visit risk travelers and cargo in order to spend more time and resources on the people we know slight about or pose a higher threat. According to DHS, trusted traveler and shipper programs such as Global Entry, TSA Pre, and the Customs-Trade Partnership Against Terrorism advance these objectives and show that effective security and the expedited flow of goods and people can be achieved together (DHS, 2017). They will use several ways to identify lower risk travelers. For example, they will use background check and recognize fo reign partner trusted traveler programs.Focus On Countering Violent Extremism and Helping to Prevent Complex Mass Casualty Attacks DHS does not focalize on just one form of one particular ideology or protected First Amendment activities, but rather all forms all forms of frenzy when it comes to countering violent extremism within the U.S. Their efforts to opposing vicious extremism highlight the power of topical anaesthetic communities and the premise that well-informed and well- tallyped families and communities represent the best defense against these violent acts. DHS supports residential area based problem solving and local anaesthetic law enforcement programs in order to disrupt and deter recruitment to radicalized violence. According to DHS, DHS phrasely develops with federal, state, local, tribal, and territorial partners develop for frontline law enforcement officers on behaviors that may be indicative of violent extremist activity (DHS, 2017).Comparable research int o non-ideologically motivated violence provides enhanced arrangement into pre-incident behavioral indicators that are linked to mass violence. This give DHS the ability to equip partners with the best tools to identify and mitigate an array of violent attacks.Reduce Vulnerabilities Deny Resources, Deny Targets Violent extremists will tend to seek out and attack symbolic venues, mass gathering, and critical infrastructure. The best way to protect against these targets is to take in approaches that are intelligence-led, analytical driven, and pursued in close collaboration with federal, state, local, and clandestine sector partners in addition to the public. The DHS Security Strategy for Mass traverse and Passenger Rail dives further into detail into how they have employed this approach to improve the security of our infrastructure. According to DHS, They will continue to increase an accent mark on deterrence, including enhancing efforts to publicly communicate tailored descripti ons of homeland security capabilities to form the perception, risk calculations, and behaviors of adversaries (DHS, 2017).Uncover Patterns and Faint Signals Enhance Data Integration and Analysis DHS and its partners must continue and constantly maintain situational awareness. In addition, DHS is dedicated to compound its selective information sources, including federating vetting operations. Homeland Security will adopt big info management solutions that will give the investigators and analysts the ability to identify relationships that were once serious to distinguish. It allow fors them to identify harmful activity earlier and to intervene or pulley block these attacks from ever happening.A vital source of data is the Suspicious activity Reporting from stat, local, and private sector partners that are members of the Nationwide Suspicious action at law Reporting Initiative. Another source with a critical role is the If You fit Something, Say Something campaign. This campai gn encourages citizens to report any suspicious activity to local law enforcement. These efforts will help protect our privacy, civil liberties, and civil rights and allow the FBI Joint Terrorism Task Force to quickly view information and share with other FBI Field Intelligence Groups for further analysis. DHS will grade and swiftly distribute local or regional joint products by dint of the National Network of Fusion Center and other mechanisms. According to DHS, These joint products, produced collaboratively by federal, state, local, tribal, and territorial partners, support operations and provide detailed incursion on emerging community or region-specific threats (DHS, 2017).In conclusion, DHS has an enormous responsibility in keeping our nation safe, secure, and resilient against all enemies and other hazards. In order to accomplish this DHS employs over 240,000 people in jobs from border security to cybersecurity analysis. In order to protect us they came up with five priori ties in order to secure against the evolving terrorism threat identify, investigate, and interdict threats as archaeozoic as possible, shrink the haystack expand risk based security, focus on countering violent extremism and helping to prevent complex mass incident attacks, reduce vulnerabilities deny resources, deny targets, and uncover patterns and faint signals by enhancing data integration and analysis.ReferencesDHS. (2014). Fiscal Years 2014-2018 Strategic Plan . Retrieved March 21, 2017, from https//www.dhs.gov/sites/ negligence/files/publications/FY14-18%20Strategic%20Plan_0_0.PDFDHS. (2014). The 2014 Quadrennial Homeland Security Review. Retrieved March 21, 2017, from https//www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdfFulghum, C. (2016). Securing the resources that secure the homeland. Armed Forces Comptroller, 61(3), 6-9.Kahan, J. H. (2013). Whats in a name? the meaning of homeland security. Journal of Homeland Security Education, 2(1), 18.Kemp, R. L. (2012). Homeland security in america past, present, and future. World Future Review, 4(1), 28-33.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.