StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Homeland Security - Essay Example

Comments (0) Cite this document
Summary
Homeland Security Agency 1 1. Name of the Agency Defense Intelligence Agency (DIA) of the US a. Jurisdiction The agency, i.e. DIA was established in the year 1961 which was later merged with the Department of Homeland Security (DHS). Being a member of United States Intelligence Community, it operates under the Federal jurisdiction of the nation (Defense Intelligence Agency, 2013)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Homeland Security
Read Text Preview

Extract of sample "Homeland Security"

Download file to see previous pages Currently, it employs more than 16,500 members from military and civil sectors accumulatively. Moreover, its network can also be observed to spread worldwide rendering greater access to valuable information concerning the homeland security issues (Defense Intelligence Agency, 2013). c. Mission The principle mission of DIA is to provide safety and security to the population of the US from unsocial and criminal activities with the assistance of policymakers, war-fighters and defense planners. However, it also intends to assist other nations in securing their homelands (Defense Intelligence Agency, 2013). 2. Role in Homeland Defense a. What does the agency itself say about its own role in homeland defense? The role of DIA can be identified to be principally focused on the collection of valuable and highly reliable information through human and technical resources comprising documentary affairs and managing media from all around the world. It also attempts to evaluate the impacts caused by foreign military affairs to the US civilian policymakers and commanders in the military sectors of the nation. ...
As revealed by Schmitt (2012), DIA has been expanding its reach in the global dimension to avail more in-depth information concerning the terrorism activities which is now intended to be encompassing spy operations especially designed for Afghanistan and Iraq . Hence, it can be affirmed that over the past years, DIA has been actively performing its activities to satisfy its mission as an intelligence agency. 3. Summarize and Discuss Since its establishment, the DIA has been actively reporting multiple instances of planned terrorism attacks making the military force of the nation more cautious to combat such disasters. For instance, as the DIA had reported, around 61 detainees who had been released from the prison of Guantanamo Bay had joined terrorism groups by the year 2009. This particular information was further confirmed with a report, recent to the release of the terrorism activities which revealed that few of those detainees had already shipped to the border area of Afghanistan and Pakistan by 2004. This information proved to be quite effective for the US military force to take precautionary measures in dealing with the issue (Lucas, 2010). 4. Core Values a. List of Core Values of DIA The core values of DIA are identified as teamwork, integrity, excellence and service (Defense Intelligence Agency, 2013). b. Discuss how the core values of each of the three agencies compare with the SLU core values DIA maintains its core values through cooperation among members at every level of its operations fostering development of the community in all spheres, with especial concern to its defense or security system. Its strategies has been thus focused towards accomplishing its sole objective to ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Homeland Security Essay Example | Topics and Well Written Essays - 2000 words - 1”, n.d.)
Retrieved from https://studentshare.org/law/1467163-homeland-security
(Homeland Security Essay Example | Topics and Well Written Essays - 2000 Words - 1)
https://studentshare.org/law/1467163-homeland-security.
“Homeland Security Essay Example | Topics and Well Written Essays - 2000 Words - 1”, n.d. https://studentshare.org/law/1467163-homeland-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Homeland Security

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages (2750 words) Report

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages (1500 words) Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages (2250 words) Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages (1500 words) Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages (1500 words) Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages (1750 words) Assignment

Security Options

...Security options The Computer Security concentration focuses on basic security matters that occur in the design, study, and execution of distributed systems.  This concentration offers in-detail coverage of the hypothesis and relevance of identity, authentication, access control, auditing, appraisal and avoidance of software vulnerabilities, and cryptography, in the perspective of modern enterprise-scale and web-based systems. Setting up a corporate security policy is one of the vital steps in establishing a strong and secured organizational context. Even though the guidelines that require to be taken may be strenuous, they are essential to the progress and security of the whole institution. There are various motives to establish written...
8 Pages (2000 words) Assignment

Role of the Police and Private Security

... terrorism. Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding. Three levels of law enforcement: The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has...
8 Pages (2000 words) Case Study

Comprehensive Security Plan

...Comprehensive security plan Comprehensive security plan Introduction This paper is designed to look into the security plan of New York public library. The library has almost 53 million items. Thus, it is the second largest public library in the entire United States. It is independently managed NGO which has both private and public financing. The library has affiliations with other academic and also professional libraries in New York. The various branches of the library are open to the members of the public. It was established in 1895 The body of the paper covers the various aspects of detailed security plan with the different areas appropriately covered. The New York public library has a very small security force operating within...
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Homeland Security for FREE!

Contact Us