This website uses cookies to ensure you have the best experience. Learn more

Homeland Security Research Design Essay

2565 words - 11 pages

Homeland Security Research Design
Chris Hix
HSM421: Research & Analysis in Homeland Security
Professor:  Kenneth Jenkins
March 7, 2016

Homeland Security Research Design
The United States has invested heavily in maintaining cyber security and border security in the homeland. Federal, State, and Local level initiatives have been implemented to escalate enforcement undertakings in communities across the country. These efforts are geared towards thwarting illegal border crossings and unlawful presence and occur in tandem with workplace enforcement to prevent illegal employment. However, these measures are not level with the excessive’ focus on terrorist threats displayed by ...view middle of the document...

Subsequently, the government uses the threat to justify foreign assignment of troops and military and surveillance equipment and justify the obscene expenditure on the various security apparatuses in the country. This sequence of events leads to the hypothesis that centralization, politics, and complacency are the key factors that affect decision-making on homeland security.
The Constitution of the United States divides power between federal, state and federal governments. This design was deliberately done to ensure there is no over-centralization of power in the capital. In the case of homeland security and emergency management, the state and local tiers of government have the best experience, resources, and geographic locus to deal with threats to the community. On the other hand, threats that are not of a national level rarely trouble the federal government, meaning it is likelier to discount local threats that cumulatively injure security in the homeland.
Like every other function of the government, homeland security and emergency management are also susceptible to politics. Each administration employs a unique foreign affairs and security approach, such that objectives differ from one administration to another. Furthermore, each member of Congress has constituents, corporations, and other stakeholders calling for more resources while each member of a congressional committee has assignments that help them make powerful friends. Consequently, the laws that are passed are politically motivated and utopian in nature. Politics fails to produce good policies, which in turn affects the direction taken by homeland security and emergency management interventions.
The third hypothesis entails the presence of complacency in the homeland security apparatus. Maintaining national security involves a competition between the homeland security agencies and innovative and determined adversaries. If these agencies become complacent, the country will be exposed to multiple threats. Complacency in the homeland security and emergency management systems in the United States is evident in the manner in which the country has consistently failed to take a definitive stand on matters that could threaten the security of the homeland. For instance, the country has dithered on its approach to the threat posed by the Islamic State, while the move of illegal substances and immigrants continues unabated in the border with Mexico.
Variables
The study will be governed by three variables: threat, exposure, and consequences. These three variables affect the country’s degree of complacency and the politics that serve to promote over-centralization. Assessing threats is reliant on multivariate and contextual factors such as the potential actors, their intentions, their capabilities, and their weaknesses (Forest, 2006). With the continued classification of terrorism as the key threat to the homeland, it is safe to assume that homeland security and emergency...

Other Papers Like Homeland Security Research Design

Policing Essay

408 words - 2 pages law enforcement agencies. Federal law enforcement agencies contain officers that work for agencies in different departments such as the department of justice, department of Treasury, and Department of Homeland Security. Law enforcement agencies are at the federal level only, but they enforce various laws. They try and level local crime to the State. According to “Discover Policing” (2008-2015), “There are more than 17,000 state and local law

Future Of Policing Paper

1153 words - 5 pages and increased demands to bear out homeland security needs” (Walker & Katz, 2010). Changes that need to be made to Effectively Address Critical Issues Firstly, expertise and training campaigns should be developed which demonstrate police officers and agencies about the development and implementation of informative sharing projects, missions and integrate databases to save the financial resources as there is subsequent loss on finance due to

Linux Security Technologies

919 words - 4 pages NSA is involved in this project is because this organization is responsible for carrying out the research and advanced development of technologies needed to enable NSA to provide the solutions, products, and services to achieve Information Assurance for information infrastructures critical to U.S. National Security interests. The NSA implemented a Mandatory Access control within the Linux Kernel. This MAC is named Flask.2 There are

Artificial Intelligence

2505 words - 11 pages artificial intelligence are also being widely deployed in homeland security, speech and text recognition, data mining, and e-mail spam filtering. Applications are also being developed for gesture recognition (understanding of sign language by machines), individual voice recognition, global voice recognition (from a variety of people in a noisy room), facial expression recognition for interpretation of emotion and non verbal queues. Other applications

Aircraft Solutions

1902 words - 8 pages assignment, additional information on geographic layout, business process, and IT architecture were presented. With the information provided, and based on additional research, the primary objective in this assessment was to identify the possible presence of vulnerabilities within the overall framework of Aircraft Solutions operations. Company Overview Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component

Taking Away The Nation's Existence

2688 words - 11 pages the Ahiskans were transported to many different places before they came to America, many settled in Dayton, Ohio. In my research Problem/Solution Paper, I will educate my reader about the refugee-status, the challenges Ahiskans had in finding a new home, while at the same time parents and their elders desire to move back to their original homeland, which was taken from them, perhaps never to be seen again. The primary focus of my paper will

Project: Access Control Proposal

2458 words - 10 pages Project: Access Control Proposal * Phase I: Risk mitigation plan to identify critical IT assets * Phase II: Policies and procedures for protecting the IT assets Contents I. Introduction 2 II. Diagram of the proposed solution 3 III. Phase I:Access Control Risk Mitigation 3 1. Identified Treats and vulnerabilities 3 2. IT assets 4 3. Treats and vulnerabilities per IT Domain 4 4. The System Security Team 5 5. Access

Electronics

406 words - 2 pages CIS245 Network Research Project You work for the ABC Networking Company and you have been hired by the network Administrator of the Concord ECPI campus to conduct a network analysis of the schools network. This includes the following: 1. A logical mapping of the site created in Visio. This will include a generalized site map of both floors including a logical network diagram. THIS DOES NOT HAVE TO INCLUDE A PHYICAL LAYOUT OF EVERY PC! It

The Internet Postive And Negative

1953 words - 8 pages can recognize. This dilemma that plagues us all though is not going on unrecognized. The issue is of such importance that the Homeland Security Presidential 7 Directive was enacted to require that the (DHS) Department of Homeland Security put together a plan to protect the infrastructures of our nation. Once this directive was implemented two different reports came on the “ Interim National Infrastructure Plan” and “The National Plan for

Strategic Plan Ii

1567 words - 7 pages business to be in an office instead of out of the house. Another idea would be to advertise in surrounding counties about the financial services that Sprong Security Financial Services would offer to the clients. Sprong Security Financial Services will do research and development other financial services that would be offer to the clients. The company needs to understand the client’s needs and their wants to be able to better help them with their

Cannabis

764 words - 4 pages , under these laws a person that advises a grower to “water in the morning” is equally guilty of growing the cannabis garden, even if he never saw the garden. The new “Homeland Security Act” further erodes personal rights of individuals. Never visit or telephone other growers, if visitng another grow room that grower can implicate you with circumstantial evidence and you are considered as guilty as the grower. Law enforcement must have a

Related Essays

Relationship Between Public And Private Policing

1566 words - 7 pages been busy performing not only their regular duties of crime prevention and response, but also taking on a large number of homeland security functions and all of this during a time when local, state and federal budgets are ever tightening. Similarly, private security institutions are under comparable pressure to carry out their traditional duties to provide protection of information, property and people, as well as sharing the additional duties of

Sdf Sekfjhks Fskf Essay

531 words - 3 pages approach. Science Applications International Corporation (SAIC) The 9/11 attacks increased political pressure for better homeland security and data sharing between 6 agencies. Responding to this pressure, the FBI made promises to bring forward deployment of the new VCF case management system by 6 months - to December 2002. Then they received an additional $78m of funding and promised to chop off another 6 months from the schedule

Mhe 512 Module 1 Case Assignment

1972 words - 8 pages ), Department of Homeland Security. Retrieved from: http://www.uscg.mil/hq/cg5/cg534/nsarc/Catastrophic_Incident_Annex.pdf Catastrophic Incident Annex of the National Response Plan (2008), Department of Homeland Security. Retrieved from: http://www.fema.gov/pdf/emergency/nrf/nrf_CatastrophicIncidentAnnex.pdf Forgette, R., Dettrey, B., Boening, M., and Swanson, D. (2009). Before, now, and after: Assessing Hurricane Katrina relief. Population Research and

Rough Paper

4020 words - 17 pages determined, the Challenge is to design a reporting structure that balances the competing needs of each of the Communities of interest. The placement of the information security unit in the reporting structure often reflects the fact that no one actually wants to manage it, and thus the unit is moved from place to place within the organization without regard to the impact on its effectiveness. Organizations should find a rational