.

Tuesday, January 29, 2019

How to improve homeland security in the United States Essay

Since the occurrence of the September 9, 2001 terrorists rapes and the ageless threats by international terrorists such as the al Qaeda, and given the quite a little in opposite domestic terrorist networks within the unify States, several agencies hasten had to be high on the alert for possible attacks. Moreover, other industries hurt also experienced the adverse effect of this menace. The entertainment industry for instance, was at an any time low point after the terrorist attacks of September 9, 2001. dendriform Allen (2001) observed that E rattlingwhere you look in Hollywood since that tragic twenty-four hour period the entertainment landscape has been transformed, as if ripped asunder by a vast earthquake. People take over come to work feeling like jolting sleepwalkers, particularly after the studios received FBI warnings late last week that they could be possible targets for terrorism. Nearly every studio has been postponing films, giving them face lifts or tossing scripts out the window. Los Angeles Times 09/25/01 Despite efforts do by U. S. n liaison with other countries to root out this evil, terrorists organizations continue to arm themselves with various decomposable assortments of weapons, and training their disciples each dawn. The problem of terrorism has further been entangled by terrorist friendly countries that provide financial support, military equipment and other kinds of supporter that help perpetrate the crime. As Rondea (2008) posits Right now, terrorist friendly countries allow or support schools, training facilities and institutions that indoctrinate children into terrorist cause at a very early age.They be literally growing terrorists and terrorist sympathizers. Without ever having met an American, these children grow up into men and women who hate us and believe it is their duty to destroy our nation. These complex dynamic further complicates the problem, making efforts to stop terrorism futile. It is due to thes e gallant problems that this study has been undertaken in order to counter this problem and thus repair guarantor in the joined States. Greater focus has been put on the three most sensitive aras that have been frequently utilize in the past by terrorists to actualise access to the united States.These recognize areas are the aviation transport department, the visa waiver program, and the information technology. aviation lift Department Americas system for protecting and controlling commercial message aviation and guaranteeing its citizens safety continues to be a major are of concern, especially after the terrorist attacks of September 11, 2001. The menu Security System (TSA) employs the use of secret testing to discover techniques that are likely to be used by terrorists (Friedlander et. al 1979).This helps in identifying vulnerabilities and measuring the level of performance of airport systems. single of the methods used during these tests involve passing threat obje cts through with(predicate) passenger and baggage screen systems. This has been prompted by the realization that some terrorists smuggle dangerous chemicals onboard aircraft in order to construct explosives in flight (Clovis, 2008). Aviation guarantor is made up of several layers. One layer involves the federal governments efficiency to respond to threats, both actual and potential, while an aircraft is in flight.The Aviation and Transportation security Act which was enacted in November 2001 formed TSA as the influence in charge of securing all forms of transportation system. TSA has since then, cooperated with other stakeholders in developing a layered approach that would guarantee the security of commercial aviation. This approach involves several(a) insofar coordinated measures that include providing flight and cabin crews with essential security training, thorough and taxonomical screening of travelers and luggage (Dacey, 2003).Response to an in-flight threat is, howeve r, a duty well beyond the jurisdiction of the TSA. It involves four other departments to wit Justice, Defense, transportation, Homeland Security and the National Counterterrorism Center (NCTC). These agencies may coordinate their activities development interagency communication tools in case of security threats arising during in-flight. This coordination efforts are however non only intricate and complex, but also involving.The stages involved include identifying and notifying relate agencies of suspected threat discussing pertinent information and working in collaboration to assess the degree of the threat making a decision on the action to be undertaken to counter the threat, and taking the action and where necessary, finalizing the law enforcement receipt upon landing of the flight (Claude, 2008). TSA working in coordination with DHS has made some age to counter threats in the aviation industry. TSA has for instance, designed screen testing programs on a national and loca l level.These programs are risk-based and are aimed at achieving its goals of identifying and mitigating vulnerabilities in the aviation security system. Secondly, during the past s until now years, several successful interagency operations have been undertaken by federal agencies, some of which have led to puzzle and return of suspected terrorists to the United States to face trial. In addition, TSAs subroutine of Inspection (OI) has utilized information on terrorist threats to improve its national hiding tests and to select suitable airports for tests based on the likelihood of attack by terrorists.Moreover, the federal agencies have carried out more than 200 tests involving federal agencies, press out and local participants. However, some tests conducted by TSA have occasionally failed. It is suggested that some of these failures may have been a direct result of poor screening equipment that fails to witness threat objects or a failure on the part of Transportation Security authorisationrs (TSOs) to follow the screening procedures properly. Given that OI does not systematically land reasons for test failures, such failures can potentially limit TSAs ability to counter determine vulnerabilities.Various suggestions are, therefore offered to help extenuate picture that may arise as a result of such factors. First, documenting all specific causes for test failures related to Transportation Security Officers (TSOs) and those related to screening procedures, is critical to aviation security. This documentation should be done in the screen door testing database in order to help TSA recognize areas that need benefit and undertake the necessary steps towards making these improvements.It is also suggested that a systematic process of collecting, analyzing, passing of information on effective practices that are used by airports whose security levels are commendable, need to be put in place at other airports to help TSA managers improve the standards of ope ration in checkpoint screening operations. Moreover, the Office of Security Operations (OSO) needs to consider in time all recommendations that OI makes as a direct result of covert tests. It should then state its rationale for set about or not undertaking to sell the recommendations made.In addition, an evaluation need to be done to exit whether the steps taken to implement OIs recommendation actually countered the identified vulnerability or did not. These evaluation needs to be developed by OSO since they are better placed to make follow up and pay heed the changes brought by implementations recommended (Dacey, 2003). Finally, it is also recommended that in order to mitigate vulnerabilities in the transportation security system, threat and risk assessment need to be done.Billions of dollars are spent by the United States annually in countering terrorism yet it is doubtful that these funds are channeled in the right amounts or even in the right programs. An assessment would be beneficial in fortune target these funds, consider priority activities and avoid duplicating effort (Dacey, 2003). Cybersecurity Federal agencies are confronted with constant cybersecurity threats brought about by the increase in sophisticated attack methods or the transformation of typical attacks into complex forms that render efforts to counter them intimately impossible.Some notable examples include unsolicited commercial e-mail (spam), messages aimed at fraudulently obtaining personal or sensitive data (phishing) and software that monitors the activities of the drug user without the user being aware or consenting to such infraction (spyware) (Hare, 2008). Even though initiatives have been undertaken by several entities operating within the federal government, the risk posed by the blending of these threats cannot easily be mitigated with the available equipment at the moment.Some of the initiatives already undertaken include instruct consumers about these threats, and targ eting computer crime (Perrow, 2007). The United States Government Accountability Office (GAO) recommended that in order to ensure cybersecurity, a number of measures would need to be undertaken. Firstly, DHSs United States Computer Emergency Readiness Team (US-CERT) would have to conduct frequent cyber analysis and warnings in order to make by the bye detection of attacks and threats.Secondly, frequent cyber attack exercises should be conducted and lessons learned be amply implemented. According to GAOs recommendation, this can be accomplished by finish all corrective activities that the department identifies. Lastly, a strategy should be realised to coordinate efforts aimed at securing or improving control system cyber security (U. S. G. P. O. 2004). The coordination efforts should include sharing of vulnerability information with other federal agencies as well as the private sector (Friedlander et. al 1979).In addition, other recommendations made to GAO to mitigate these thre ats include performing risk assessment periodically, implementing policies and procedures that are risk based to counter identified risks, educating and providing the staffs with security- awareness training and establishing procedures which pass on help in detecting, reporting and responding to issues regarding cybersecurity threats (Rondeau, 2008). visa Waiver Program (VWP) The Visa Waiver Program provides way through which citizens of 27 countries can gain access to the United States for a period of 90 days without obtaining a visa (Moss & Michael, 2006).The terroristic attacks of 9-11, however, brought major concerns of the risk of foreigners with malicious intentions gaining entry into the United States. Consequently, tougher measures have had to be imposed to mitigate this potential threat. At the moment, foreigners from VWP countries are required to provide bibliographical information to the Customs and Border justification (CBP) department before leaving for the United States (Saunter & Carafano, 2005).This is in consonance with the Recommendations made in the 9/11 Commission Act of 2007, earthly concern Law 110-53, and Aug. , 2007, which also stipulates the guidelines to be adhered to by aliens from VWP countries wishing to travel to the United States either by air or sea. The amendments done to DHS formulas by the retardation final rule allows for consideration of countries whose visa refusal rates laid mingled with 3 and 10 percent in the previous fiscal year. Moreover, the regulation provides for the automation of the 1-94W process electronically in addition to enabling the planning of VWP traveler data in advance prior to travel by the individual.This is beneficial as it allows for a thorough scrutiny of the travelers documents well in advance before such individual enters the United States (Stiefel, 2008). The VWP however, still has some inherent risks that need to be tackled. Even though DHS has been successful in intercepting many counterfeit documents, an undetermined number of inadmissible foreigners have gained entry into the United States using a lost or stolen passport from a visa waiver country.Secondly, although the program eases consular workload, couch inspectors face numerous challenges when screening VWP travelers. Notable among these challenges is the issue of language parapet and that of limited duration for conducting in-depth interviews (Wright & Wiesenger 2008). Moreover, due to insufficient funds, DHSs monitor unit cannot attain its main objective of monitoring and providing report on the ongoing security concerns in VWP member countries.Consequently, GAO recommended that in order to mitigate these risks, a number of actions allow for have to be implemented. First, DHS must co-ordinated biometric indicators into the air exit system in order to keep its authority of admitting other countries into the program. Secondly, it needs to certify that the Electronic System for Travel effecti veness (ESTA) used for screening visa waiver foreigners before they travel to the U. S. is fully in operation by early January, 2009 (Moss & Michael, 2006).The certification will grant DHS power to expand the VWP to countries with visa refusal rates of between 3 and 10 percent. Thirdly, it is also proposed that a clear process be establish in coordination with the Department of state and Justice to assist in ascertain criteria to be employed in considering countries to be included in the program, timelines for their nominating speech and negotiation of bilateral agreements meant to implement the legislative requirements of the program.Lastly, it was suggested that an office be designated whose affair would be to develop overstay rate information to monitor whether VWP countries honor with the statutory requirements of the VWP (U. S. G. P. O. 2004). Conclusion New methods for improving homeland security in the United States were the main focus for this study. Particular empha sis was however, laid on the Aviation transport sector, the implementation of the visa waiver program, in conformance with the standards recommended by GAO and on effective methods of countering the risks brought on information technology equipment through computer crime.It can be seen from the study that the effective function of the key security areas discussed lies in the implementation of the weaknesses identified by the researcher and those recommended by GAO following a prior assessment of the operations of these key areas. later on these recommendations are implemented, it is believed that homeland security will have been greatly improved. In conclusion, therefore, future research on the improvement of homeland security should address both merits and the drawbacks experienced upon implementation of the proposed changes.

No comments:

Post a Comment