We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Homeland Security-Policy Analysis - Essay Example

Comments (0)
Summary
Homeland Security-Policy Analysis Name: Institution: Homeland Security-Policy Analysis The need for protection of the American people by the Bush administration on realizing the government’s laxity after the September 11 attacks that left over 3000 people dead saw the creation of the Homeland Security Act(HSA) of 2002, (Pub…
Download full paper
GRAB THE BEST PAPER
Homeland Security-Policy Analysis
Read TextPreview

Extract of sample
Homeland Security-Policy Analysis

Download file to see previous pages... The act pointed out the major reason for the creation of the Homeland Department as the need to prevent radical assault in the U.S. Homeland Security Presidential Directive (HSPD) 12 – Policy for a Common Identification Standard for Federal Employees and Contractors There are several policies related to homeland security. One of these policies is the Homeland Security Presidential Directive 12. This policy is a general recognition standard for federal workforce and contractors. There are broad disparities in the value and security of recognition used to get access to secure amenities where there is the prospective for terrorist attacks. In order to eradicate these disparities, the United States Homeland Security Presidential Directive12 policy is designed to handle the following legal issues: Enhance security Enhance government efficiency Decrease identity fraud Protect individual privacy All these will be achieved through the creation of mandatory, government broad principles for secure and consistent identification given by the federal government to its workers and contractors. This directive policy authorizes a federal principle to implement secure and reliable forms of recognition. The Homeland Security Presidential Directive is based on the following policy legalities: The need to eradicate wide disparities in the quality and security of types of identification used to get access to protected federal and other amenities where there is possibility for terrorist attacks. Therefore, it is the mandate of this policy to improve security, enhance government efficiency, secure individual privacy and decrease identity fraud. This is enabled through establishment of mandatory, government extensive standards for secure and trustworthy identification forms provided for by the federal to its workers and contractors. To execute the above policy task, the secretary of commerce shall propagate in harmony with applicable law, a federal standard for secure and consistent identification forms not more than six months after the day of the directive in discussion with the state secretary, attorney general, defense secretary and the secretary of Homeland Security. It also involves consultations with the director of office of science and technology and the director of the office of budget and management (OMB) according to Alperen (2011). The secretary of commerce is mandate to review the legal standards regularly and inform the standard as suitable in discussion with the affected agencies. The reason for secure and consistent forms of recognition directive policy which refers to recognition that:; Is provided for based on sound principles for verifying given workers identity Is powerfully resistant to identity deceit terrorist explosion, counterfeiting and interference Can be swiftly valid electronically Is given only by the providers whose trustworthiness has been established by an executive accreditation process The standard for ensuring the above characters will involve graduated criteria, from less secure to more secure to guarantee flexibility in choosing the right level of security for every application. The standard shall not concern to recognition associated with state security systems. In a period of not more than four months following the dissemination of the standard, the heads of administrative departments and organizations shall have a program designed to warrant that ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Homeland security
Terrorist financing is often fought using three key approaches which include; the traditional and non-traditional law enforcement techniques that dismantle and disrupt terrorists financiers networks, global efforts to deter terrorist financing and capacity building programs that serve to improve domestic financial, regulatory and legal institutions in the US and across the world.
3 Pages(750 words)Essay
Homeland Security - Capstone
Owing to the increased attention, resources, and efforts toward the reduction and prevention of terrorist attacks, it has been of paramount importance to determine whether anti-terrorism strategies are highly effective. The current study will then look into the role of homeland security in the prevention of terrorism, such as the terrorist attacks launched in September 11, along with the possible anti-terrorism strategies that can contribute to the success of the government in reducing the occurrence rates of terrorism.
6 Pages(1500 words)Essay
Department of Homeland Security, and Science and Technology Policy and Politics
Thus, the Department of Homeland Security strengthens further its attempt in protecting and securing the US community through its different programs and strategies that involves the use of science and technology. Science and politics are two different issues that co-exist in the society.
9 Pages(2250 words)Essay
Crimianl justice/ homeland security
The ability to know that the borders and the coastlines were safe from outside harm and to accept the fact that, while there may be those in the world that seek to do harm, that such harm would be prevented from happening in the future, with the right plan put into place.
8 Pages(2000 words)Essay
Homeland Security
The author states that the Homeland Security Act and the creation of the DHS have been instrumental in preventing any subsequent attacks within our borders, as new technologies and increased surveillance have contributed to a reduced level of terrorist threats in America. The goal of preventing future terrorist attacks has been reached by the DHS.
6 Pages(1500 words)Essay
Managing Homeland Security
rgency management is not only finding out ways to prevent a red-alert situation, but also to find ways to control the circumstances if a red-alert situation does actually arise. Emergency Management plays a key role in ensuring the safety of citizens of the nation, and is thus a
5 Pages(1250 words)Essay
Homeland security preparedness
The main reason for this has been the success of the intelligence agencies in the aftermath of terrorist attacks of 9/11. After September 11, the need for better intelligence once again
12 Pages(3000 words)Essay
HomeLand Security
The introductory course tries to delve on emergence of terrorism and any kind of insecurity. How terrorist organizations operate, history, how they are formed, the past lessons learned from fighting
4 Pages(1000 words)Essay
Roles in homeland security
way they live can develop well through the efforts of the nation to hinder terrorist attacks within the US, minimize the vulnerability to terrorism, and reduce the damage that results from the attacks that do happen (Bullock, et al 2012). The term came about in 2003 when many
5 Pages(1250 words)Essay
Security Policy Analysis
rivate sector and other federal agencies, are empowered to conduct high level cyber security risk assessment on a sector by sector sequence, develop procedures for certain critical infrastructure, identify performance issues and implement plans for restoration. The authority
1 Pages(250 words)Essay
Let us find you another Essay on topic Homeland Security-Policy Analysis for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us