An executive order issued by President George W. Bush on October 16, 2001 established the President’s Critical Infrastructure Protection Board. The Board was created with the goals of coordinating “cooperation with and protection of private sector critical infrastructure, state and local governments critical infrastructure, and supporting programs in corporate and academic organization; protection of federal departments and agencies critical infrastructure; and related national security programs” (The White House). The executive order established a set of responsibilities for the Board as follows: outreach to the private sector and state and local governments; share information; incident coordination and crisis response; recruitment, retention …show more content…
This specific section of the executive order calls for consultation with potentially affected communities purposely identifying legal, auditing, financial, and insurance communities as industries with which to consult. Additionally, the executive order also establishes a directive that the Board shall coordinate with the senior liaison officers of the Attorney General, the Secretaries of Energy, Commerce, Transportation, the Treasury, and Health and Human Services, and the Director of the Federal Emergency Management Agency. Additionally, the Board shall work in coordination with the Critical Infrastructure Assurance Office and the national Institute of Infrastructure Assurance Office and the national Institute of Standards and Technology of the Department of Commerce, the National Infrastructure Protection Center, and the National Communications System (The White House). This indicates the large amount of actors impacted by information security infrastructure. This author finds it compelling that departments and agencies specifically related to homeland security and protection such as the FBI, CIA, and Department of Homeland Security. In fact, throughout the Executive Order the Department of Justice is mentioned in incident coordination and crisis response and law enforcement coordination; however, the Secret Service is specifically mentioned. It appears there is a large emphasis on coordination between executive agencies. However, the Board’s Coordination committee includes the Federal Bureau of Investigation (The White
The Department of Homeland Security was created in the aftermath of one of our nation's greatest tragedies: the events of September 11, 2001 (Newman, 2002). Almost immediately the Department began overseeing 22 federal agencies that pre-existed 9/11. The rationale for this transformation was to improve the coordination of the federal government's various security efforts both internally and externally in an effort to forestall any future terrorist threats. What has occurred, however, is a Cabinet Department that is highly bureaucratic with too many divergent responsibilities. Its effectiveness is questionable and serious consideration should be given to the abolition of the Department and its agencies reassigned to other Departments.
The U.S. Department of Homeland Security was formed more than a decade ago with a very significant mission of safeguarding America's homeland from hazards, threats, and national disasters. This department conducts its mission through securing the country's borders, preventing terror attacks, and responding to incidents or threats to its citizens (Miller, n.d.). Generally, the most important roles of the Department of Homeland Security are to lead a concerted national effort in securing the United States and preserving the American way of life. The department was established in 2002 in reaction to the 9/11 terror attacks and has since developed a nationwide strategic plan for evaluating and updating its mission statement and effectiveness of operations. These plans can be updated and transformed to accomplish the needs of the Department for Homeland Security and the American people.
Intelligence and Warning is Border and Transportation Security is responsible for protecting America's borders, territorial waters, and transportation systems by centralizing information-sharing and databases that track and monitor all aspects of border control and America's transportation systems. Domestic Counterterrorism covers a wide variety of activities, ranging from National Security Agency monitoring of telephone conversations to local police monitoring of persons of interest. Protecting Critical Infrastructure and Key Assets identifies a clear set of national goals and objectives and outlines the guiding principles that will underpin our efforts to secure the infrastructures and assets vital to our national security, governance, public health and safety, economy, and public confidence. Defending against Catastrophic Threats reduces vulnerability of the United States to terrorism. Emergency Preparedness and Response will create one emergency response plan to be used at all levels of government and will ensure that first-responders, from the federal government level down to local levels, receive proper training and equipment.
The Issei (first generation immigrants) crossed the Pacific Ocean to come to America because there was a high demand for immigrants’ cheap labor. The Japanese left everything familiar to them. They established their own communities of Japanese culture. The Japanese were discriminated and faced with racial injustice. The Pearl Harbor attack was a spark for more people to hate Japanese living in the United States. Then the Executive order signed by Roosevelt forced hundreds of Japanese Americans to leave their homes and go to interment camps because people feared they were spies for Japan. Most young men wanted to prove their loyalty to America and restore family honor so they joined the war.
Less than one year into his second presidency, Franklin D. Roosevelt was tasked with consoling a country in a national state of hysteria. Events in World War II, including the Japanese attack on Pearl Harbor, lead to inflated paranoia and hostility towards people of Japanese descent in America. As a response to the Americans citizens anxiety, Franklin D. Roosevelt passed Executive Order 9066 in 1942. This order gave military personnel the authority to designate areas to be Internment camps to exile and deprive the rights of Japanese aliens, as well as innocent Japanese Americans. Mandatory evacuations were enforced all over the west coast, where those of Japanese descent were forced to relocate to the Internment Camps. Authorizing this situation
Ten weeks after the Japanese bombed Pearl Harbor, U.S. President Franklin D. Roosevelt signs Executive Order 9066, authorizing the removal of any or all people from military areas “as deemed necessary or desirable.” The military in turn defined the entire West Coast, home to the majority of Americans of Japanese ancestry or citizenship, as a military area. By June, more than 110,000 Japanese Americans were relocated to remote internment camps built by the U.S. military in scattered locations around the country. For the next two and a half years, many of these Japanese Americans endured extremely difficult living conditions and poor treatment by their military guards.
The homeland security is a department responsible for developing various mechanisms aimed at ensuring that the country is safe. The main focus of homeland security is to shield or reduce the cases of terror attacks. The prevention and response to both manmade and natural disasters also fall under homeland security (McElreath, Jensen, and Wigginton, 10). The Department of Homeland Security, therefore, has a broad range of responsibilities. At its formation in 2003, the department was composed of twenty-two federal agencies with over 180,000 employees. Homeland security’s formation was necessitated by the September 11th attacks in United States. Today, the Department of Homeland Security
It is essential to understand America’s critical infrastructure and key resources (CIKR) and National Infrastructure Protection Program (NIPP) to ensure survivability of its critical assets, while maintaining security for America. “The plans are carried out in practice by an integrated network of Federal departments and agencies, State and local government agencies, private sector entities, and a growing number of regional consortia (DHS, 2009, p. I).” Several agencies work together to mitigate attacks on CIKR to protect public safety and security of the nation. A terrorist may stop at nothing to carry out an attack on CIKR. If an attack or natural disaster does transpire, each agency working together to restore the damage must be timely. Additionally, NIPP helps to identify hazards associated with the various sectors, and provides necessary security measures to harden resources (DHS,
Fifteen years after the 9/11 terrorist attacks there has been adjustments made since then when protecting the nation from threats that are unknown. In 2001, President Bush proposed a new department that will be in charge along with other government agencies to work together to make sure threats don’t get out of hand (Tom Ridge). This new department,The Department of Homeland Security (DHS), was created after the 9/11 terrorist attacks and their main job is to protect the people. In order to execute this goal the Department of Homeland Security must “secure the nation against terrorist attacks, to protect against and respond to threats” (Andrew). Eleven days after the 9/11 terrorist attacks Tom
As Director of Homeland Security my function is to pull together, evaluate, preserve and circulate data that will support local, state and federal law enforcement agencies, administration agencies, and private sector to identify, avert, thwarting while preparing for the response and recovery from hazards and threats of terrorist circumstances, as pursuant to O.R.C § 5502.03 (The Library of Congress, 2007). I’ve include information which I believe will help assist each department head present to better understand homeland security function and responsibility to ensure the security of our city. Also include is the legal basis for
“We have learned as a Nation that we must maintain a constant, capable, and vigilant posture to protect ourselves against new threats and evolving hazards. But we have also learned that vigilance and protection are not ends in and of themselves, but rather necessary tools in the service of our national purpose.”(Napolitano, 2010, p.iv) In the wake of the September 11th, 2001 attacks our nation has taken upon itself extreme vigilance to ensure the security and defense of the American people. The relationship between homeland security and homeland defense is one that is tightly knit. Each has a very distinct mission set but somewhere along the spectrum they cross over and mutually support each other in the best interest of the nation.
The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure (The White House Office of the Press Secretary, February 2013). It is imperative for every nation to develop a critical infrastructure protection plan that will provide the essential services to its society. To archive this, a government must be proactive and coordinate its efforts that will reinforce and maintain secure, functioning, and
The Federal Government needs to create information systems which are more effective shielded systems to protect their assets and resources at home. The foundation of any mandated cybersecurity strategies that secure our nation national security must incorporate worldwide or state local threats whether targeted toward the federal government or the private sector forces. The OPM breach highlighted the insufficient and inconsistence security approaches the federal government has already used in modernizing the existing cybersecurity policies. There is a requirement for the United States government to institute polices that would incorporate and implement new government cybersecurity structures and centralized the protection of their assets to avert future breaches (Source). Examining the inadequacies in the current national cybersecurity policies and regulations is disappointing as OPM choice to implement these mechanisms and the current authoritative propositions to cybersecurity must change immediately. It was reported that OPM only spent $2 million in 2015 to avert pernicious digital assaults, while the Department of Agriculture spent $39 million. The Department of Commerce, Department of Education, and Department of Labor likewise invested more money in cybersecurity resources than the Office of Personnel Management. The Small Business Administration devoted a similar amount into cybersecurity to recognizing, examining, and alleviate any cyber breaches as OPM, however
Nearly every community has some sort of community risk, threat, and assessment plan that takes into account one of the six potential risks that are of concern to homeland security. Though each of these plans will likely differ from one another, many communities will have the same types of information in their plans. This essay will look at the Threat and Hazard Identification and Risk Assessment Guide (THIRA), the Community Risk Reduction Planning Guide, as well as FEMA’s National Preparedness plan. Any combination of these guides are a good starting point for every community in America. At top of every communities list as well as the nation is the protection of the critical infrastructure. Loss of infrastructure regardless of how big or small the community is could have very crippling effects on that community.
The distinction between homeland security and homeland defense is pivotal in gaining a better understanding of how these agencies work and how they correlate to our nations infrastructure. We must understand the designated missions set forth for both these agencies while learning how they meet the tasks appointed to them and resources utilized to accomplish the mission. Learning the fundamentals of our nations infrastructure information must be provided to showcase how these agencies utilize the appropriate resources to guarantee the security of these critical infrastructures. Offering an opinion in the definition of homeland security and how resources are being utilized to fix vulnerabilities is vital to showcase what is being distributed and learned on a researchers and readers level. Homeland security and homeland defense play a pivotal role in ensuring our borders are protected.