Wednesday, March 13, 2019
How to improve homeland security in the United States Essay
Since the occurrence of the September 9, 2001 terrorists attacks and the eternal nemesiss by international terrorists such as the al Qaeda, and given the upsurge in other domestic terrorist networks within the join States, several agencies hurl a bun in the oven had to be high on the alert for realistic attacks. Moreover, other industries prepare too experienced the adverse effect of this menace. The agoneime industry for instance, was at an every last(predicate) cartridge clip low point later the terrorist attacks of September 9, 2001.Woody Allen (2001) discover that Everywhere you look in Hollywood since that tragic day the entertainment landscape has been transformed, as if ripped asunder by a massive earthquake. multitude pass come to work feeling like jittery sleepwalkers, especi wholey after the studios received FBI warnings late last week that they could be possible fundaments for terrorism. N first every studio has been postponing films, giving them face li fts or tossing scripts fall out the window. Los Angeles Times 09/25/01 Despite efforts make by U. S. n amour with other countries to root out this evil, terrorists organizations continue to arm themselves with various difficult assortments of weapons, and training their disciples each dawn. The problem of terrorism has further been complicated by terrorist friendly countries that offer up financial house, military equipment and other kinds of doance that assistance perpetrate the crime. As Rondea (2008) posits Right now, terrorist friendly countries allow or support schools, training facilities and institutions that indoctrinate children into terrorist cause at a very early age.They ar literally growing terrorists and terrorist sympathizers. Without ever having met an American, these children grow up into men and women who hate us and believe it is their duty to destroy our nation. These complex propulsive further complicates the problem, making efforts to stop terrorism fu tile. It is collectible to these eminent problems that this arena has been condensen in inn to forebode this problem and thus improve aegis in the United States. Greater focus has been put on the third most sensitive areas that have been frequently employ in the past by terrorists to gain penetration to the United States.These key areas are the melody transport department, the endorse arc program, and the selective info technology. Aviation Transport division Americas system for protecting and controlling commercial breeze and guaranteeing its citizens safety continues to be a major are of concern, especially after the terrorist attacks of September 11, 2001. The dose shelter System (TSA) employs the use of covert scrutiny to discover techniques that are likely to be used by terrorists (Friedlander et. al 1979).This alleviates in identifying vulnerabilities and measuring the level of performance of directport systems. One of the methods used during these experi ments involve passing threat objects through passenger and luggage book binding systems. This has been prompted by the realization that some terrorists smuggle dangerous chemicals onboard aircraft in order to construct explosives in flight (Clovis, 2008). Aviation aegis is made up of several layers. One layer involves the federal official official governments business leader to respond to threats, both actual and potential, while an aircraft is in flight.The Aviation and Transportation security Act which was enacted in November 2001 formed TSA as the agency in charge of securing all forms of transportation. TSA has since accordingly, cooperated with other stakeholders in developing a work approach that would guarantee the security of commercial air. This approach involves diverse even so organized measures that let in providing flight and cabin crews with essential security training, ingrained and systematic natural covering of travelers and luggage (Dacey, 2003).Response to an in-flight threat is, however, a duty come up beyond the jurisdiction of the TSA. It involves four other departments namely Justice, Defense, transportation, mother country Security and the National Counterterrorism Center (NCTC). These agencies may coordinate their activities using interagency talk tools in case of security threats arising during in-flight. This coordination efforts are however not hardly intricate and complex, but also involving.The stages involved include identifying and notifying concerned agencies of pretend threat discussing pertinent information and working in collaboration to survey the degree of the threat making a decision on the carry through to be undertaken to payoff the threat, and taking the action and where necessary, finalizing the law enforcement response upon landing go into of the flight (Claude, 2008). TSA working in coordination with DHS has made some progress to counter threats in the aviation industry. TSA has for instance, des igned covert exam programs on a national and local anaesthetic level.These programs are peril-based and are aimed at achieving its goals of identifying and mitigating vulnerabilities in the aviation security system. Secondly, during the past seven years, several successful interagency trading operations have been undertaken by federal agencies, some of which have led to arrest and break of suspected terrorists to the United States to face trial. In addition, TSAs Office of inspection (OI) has utilized information on terrorist threats to improve its national covert tests and to destine suitable airports for tests based on the likelihood of attack by terrorists.Moreover, the federal agencies have carried out more than 200 tests involving federal agencies, state and local participants. However, some tests make outed by TSA have occasionally failed. It is suggested that some of these failures may have been a direct result of poor cover charge equipment that fails to detect thre at objects or a failure on the part of Transportation Security Officers (TSOs) to follow the screening procedures properly. Given that OI does not systematically record reasons for test failures, such failures can potentially limit TSAs ability to counter identified vulnerabilities.Various suggestions are, therefore offered to help mitigate exposure that may arise as a result of such factors. First, documenting all detail causes for test failures related to Transportation Security Officers (TSOs) and those related to screening procedures, is little to aviation security. This documentation should be done in the covert testing database in order to help TSA recognize areas that need improvement and undertake the necessary travel towards making these improvements.It is also suggested that a systematic serve of collecting, analyzing, passing of information on useful practices that are used by airports whose security levels are commendable, need to be put in place at other airports to help TSA managers improve the standards of operation in checkpoint screening operations. Moreover, the Office of Security Operations (OSO) needs to consider in time all recommendations that OI makes as a direct result of covert tests. It should then state its rationale for undertaking or not undertaking to spoken language the recommendations made.In addition, an evaluation need to be done to see whether the steps taken to implement OIs recommendation actually countered the identified vulnerability or did not. These evaluation needs to be developed by OSO since they are better placed to make follow up and see the changes brought by implementations recommended (Dacey, 2003). Finally, it is also recommended that in order to mitigate vulnerabilities in the transportation security system, threat and risk assessment need to be done.Billions of dollars are washed-out by the United States annually in countering terrorism yet it is in question(predicate) that these funds are channeled in the right amounts or even in the right programs. An assessment would be beneficial in helping target these funds, consider priority activities and avoid duplicating effort (Dacey, 2003). Cybersecurity Federal agencies are confronted with constant cybersecurity threats brought close by the increase in sophisticated attack methods or the transformation of typical attacks into complex forms that render efforts to counter them almost impossible. about notable examples include unsolicited commercial e-mail (spam), messages aimed at fraudulently obtaining personal or sensitive data (phishing) and software that monitors the activities of the user without the user being aware or consenting to such intrusion (spyware) (Hare, 2008). however though initiatives have been undertaken by several entities operating within the federal government, the risk posed by the blending of these threats cannot easily be palliate with the available equipment at the moment.Some of the initiatives already undertaken include enlightening consumers about these threats, and targeting computer crime (Perrow, 2007). The United States Government Accountability Office (GAO) recommended that in order to ensure cybersecurity, a number of measures would need to be undertaken. Firstly, DHSs United States Computer Emergency Readiness Team (US-CERT) would have to conduct frequent cyber analysis and warnings in order to make timely spying of attacks and threats.Secondly, frequent cyber attack exercises should be conducted and lessons learned be fully implemented. check to GAOs recommendation, this can be accomplished by completing all corrective activities that the department identifies. Lastly, a strategy should be established to coordinate efforts aimed at securing or improving control system cyber security (U. S. G. P. O. 2004). The coordination efforts should include sharing of vulnerability information with other federal agencies as well as the private sector (Friedlander et. al 1979).In a ddition, other recommendations made to GAO to mitigate these threats include performing risk assessment periodically, implementing policies and procedures that are risk based to counter identified risks, educating and providing the staffs with security- awareness training and establishing procedures which will help in detecting, reporting and responding to issues regarding cybersecurity threats (Rondeau, 2008). Visa electric discharge Program (VWP) The Visa Waiver Program provides way through which citizens of 27 countries can gain access to the United States for a period of 90 days without obtaining a visa (Moss & Michael, 2006).The terroristic attacks of 9-11, however, brought major concerns of the risk of foreigners with malicious intentions gaining entry into the United States. Consequently, tougher measures have had to be imposed to mitigate this potential threat. At the moment, foreigners from VWP countries are required to provide bibliographical information to the Customs and Border Protection (CBP) department beforehand leaving for the United States (Saunter & Carafano, 2005).This is in accordance with the Recommendations made in the 9/11 Commission Act of 2007, Public Law 110-53, and Aug. , 2007, which also stipulates the guidelines to be adhered to by aliens from VWP countries wishing to travel to the United States either by air or sea. The amendments done to DHS regulations by the interim final rule allows for good will of countries whose visa refusal evaluate laid between 3 and 10 share in the previous fiscal year. Moreover, the regulation provides for the automation of the 1-94W mathematical process electronically in addition to enabling the provision of VWP traveler data in hike up prior to travel by the individual.This is beneficial as it allows for a thorough scrutiny of the travelers documents well in advance before such individual enters the United States (Stiefel, 2008). The VWP however, still has some inbred risks that need to be tac kled. Even though DHS has been successful in intercepting many a(prenominal) counterfeit documents, an undetermined number of inadmissible foreigners have gained entry into the United States using a lost or stolen passport from a visa expelling country.Secondly, although the program eases consular workload, border inspectors face numerous challenges when screening VWP travelers. Notable among these challenges is the issue of language barrier and that of limited duration for conducting in-depth interviews (Wright & Wiesenger 2008). Moreover, due to insufficient funds, DHSs monitoring unit cannot attain its main design of monitoring and providing report on the ongoing security concerns in VWP phallus countries.Consequently, GAO recommended that in order to mitigate these risks, a number of actions will have to be implemented. First, DHS must incorporate biometric indicators into the air exit system in order to keep its power of admitting other countries into the program. Secondly, it needs to certify that the electronic System for Travel Authorization (ESTA) used for screening visa waiver foreigners before they travel to the U. S. is fully in operation by early January, 2009 (Moss & Michael, 2006).The certification will grant DHS power to expand the VWP to countries with visa refusal rates of between 3 and 10 percent. Thirdly, it is also proposed that a clear process be established in coordination with the Department of state and Justice to assist in determining criteria to be employed in considering countries to be include in the program, timelines for their nomination and negotiation of bilateral agreements meant to implement the legislative requirements of the program.Lastly, it was suggested that an affair be designated whose purpose would be to develop overstay rate information to monitor whether VWP countries comply with the statutory requirements of the VWP (U. S. G. P. O. 2004). Conclusion New methods for improving fatherland security in the United States were the main focus for this study. Particular furiousness was however, laid on the Aviation transport sector, the implementation of the visa waiver program, in accordance with the standards recommended by GAO and on effective methods of countering the risks brought on information technology equipment through computer crime.It can be seen from the study that the effective function of the key security areas discussed lies in the implementation of the weaknesses identified by the researcher and those recommended by GAO following a prior assessment of the operations of these key areas. After these recommendations are implemented, it is believed that country of origin security will have been greatly improved. In conclusion, therefore, future research on the improvement of homeland security should address both merits and the drawbacks experienced upon implementation of the proposed changes.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.