StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Homeland Security: Community Threat Assessment - Assignment Example

Cite this document
Summary
The author states that it is important that state and local police have the capability to create and maintain computer records on all contacts with law enforcement. These face-to-face contacts can be valuable in revealing false documentation, criminal patterns, or other suspicious activity. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Homeland Security: Community Threat Assessment
Read Text Preview

Extract of sample "Homeland Security: Community Threat Assessment"

Homeland Security Part I and II According to Hickman and Reaves (2003), there are four critical issues that confront local and police forces in their efforts to gather and manage intelligence (p.23). First, it is important that state and local police have the capability to create and maintain computer records on all contacts with law enforcement. These face-to face contacts can be extremely valuable in revealing false documentation, criminal patterns, or other suspicious activity (p.24). Second, the officers need a system that allows them to input, update, and retrieve information in the field (p.23). While larger agencies are more likely to utilize computers for data retrieval as well as communications, the smaller agencies lag behind (p.25). Third, data sharing among agencies at all levels has become a critical component of an effective and efficient system. Again, there needs to be a focus on funding and "substantial federal assistance for technology enhancement" aimed at the smaller local agencies that may lag behind in this area (p.26). Fourth, advances in technology have made the recognition of individuals increasingly possible and important. Biometrics such as face recognition or iris scans can serve to discourage false identities and uncover deceptive practices. 2.) The ability and need to share information between the various agencies, from the federal level to the local, is a key factor in maximizing the efficiency of the system. Information sharing serves to insure that the information available is comprehensive, current, and complete. Information sharing serves a number of vital functions such as eliminating redundant processes and procedures, and identifying patterns in criminal or terrorist activity. These functions make law enforcement more efficient and the elimination of redundant activities can be a cost saving process. A key consideration for information sharing is the cost of system, which includes installation and maintenance. In addition, as with all technology based products, it may have a relatively short life span. In the past, systems such as the Wide Area Network (WAN) and Regional Information Sharing Systems (RISS) have been used with success in numerous locations (Russo and Labriola, 2003, p.31). The major drawback to these systems has traditionally been their reliance on large amounts of computer and networking hardware that incurred a significant cost (Russo and Labriola, 2003, p.31). Russo and Labriola (2003) suggest the use of a Virtual Private Network (VPN) as a means to emulate a Local Area Network (LAN), Intranet, or WAN at a fraction of the cost. Because the VPN utilizes the existing Internet structure, it is easy install and operate. In essence, the VPN is a highly secure Internet connection, and most facilities already have the equipment required to establish a VPN. In addition, modern encryption techniques can assure the safety of the data and can "shift many aspects of community policing from a reactive to a proactive mode" (Russo and Labriola, 2003, p.31). 3.) A community must continually evaluate the threats that they are exposed to, and constantly update their relationship to these threats. Flynt and Olin (2003) have developed a threat assessment model that can provide a cursory assessment for use by communities and organizations. The Flynt and Olin (2003) model uses a Venn diagram to illustrate whether the relevant threats are being adequately addressed. Plotting the threats, and the policy response, will reveal if all threats are being adequately addressed, as well as if threats are being addressed that do not exist (Flynt and Olin, 2003, p. 35). The model uses three colors, red, blue, and gray to indicate the threats, the self, and the environment. The threats would include known threats and threat actors. These threats need to be analyzed in regards to their "motive, means, methods, and mission" (Flynt and Olin, 2003, p.36). This will help managers develop a greater understanding of the threat and how the self will address the threat. The blue area, the self, is an evaluation of the capabilities, resources, contingency actions, and the desired outcome (Flynt and Olin, 2003, p.36). This helps individuals in agencies gain a better concept of where they fit in with respect to the threat policies. The gray area, the overlapping area, is the environment that the agency and the threat operate in. The Flynt and Olin model is a good point to begin a threat assessment as it offers an overview of the current condition, and provides insight and lays a foundation for a more extensive threat assessment. Homeland Security Part VI 1.) Local law enforcement agencies are met with the dilemma of reacting to a major federal event on the local level with local resources. For many small agencies, this can be an intimidating or daunting task. There is the fear that due to a lack of training, expertise, and resources, the local agency may respond inappropriately. McVey (2003) warns that waiting for a federal response in these situations can be disastrous, as time is extremely important in regards to the response (p.25). In addition, the federal response will probably be a generalized strategy (McVey, 2003, p.125). McVey contends that a local jurisdiction will have its own unique risk factors as well as response capabilities. This requires that "each agency must lay the necessary groundwork in preparation for these proposals by generating and incorporating into its individual administrative paradigm a basic understanding of the terrorist risk it faces and its own incident management capability" (McVey, 2003, p.125). If the local agency understands the threat, and is aware of their capabilities, the response will, in all likelihood, be appropriate in regards to the federal strategy. 2.) According to McVey (2003), the four parts of risk assessment are external general, external specific, internal general, and internal specific. External general events are events that occur in the world that may elevate or diminish the threat level, but lie outside the jurisdiction and are general in nature such as political or ideological. External specific events are events that have a "specific relationship to the jurisdiction in question" (McVey, 2003, p.128). These factors impact the conduciveness of a jurisdiction to attract and sustain terrorist operations. These can include easy travel access and favorable population demographics that are attractive to terrorists. Internal general events are factors that have a general relationship to the formation of terrorist group such as elevated levels of activism, radical news organizations, and initial political or social violence occurring within a jurisdiction (McVey, 2003, p.128). Internal specific variables are the specific resources that a jurisdiction has that relate to their counter-terrorism capabilities. These include training, expertise, and preparation (McVey, 2003, p.129). 3.) The crisis response team (CRT) consists of subunits that are each responsible for a specific role. The law enforcement liaison unit maintains the cooperation and integration of the interactions between the various agencies and law enforcement (McVey, 2003, p.129). The intelligence unit gathers and maintains the ongoing intelligence on the jurisdiction. The logistics unit maintains the material resources. The operations unit is responsible for the ongoing operations of the unit, and may consist of other specialized units such as explosives. The civilians unit maintains the relationship between the CRT and civilian organizations, such as volunteer groups, or civilian watch groups. The media liaison counters the existing propaganda and promotes their own public relations. The legal unit prevents and defends against legal charges arising from the guerillas forces. The emergency operations center operates as the headquarters of the CRT. 4.) During the mitigation phase, the federal government is responsible for offering federal assistance in the way of training and expertise. During this phase, the state and local governments are responsible for implementing adequate building codes and inspecting the structures. In addition, local authorities will maintain a risk assessment, and prepare evacuation and temporary housing arrangements (Kemp, 2003, p.136) During the preparedness phase, the federal government will continue to offer support and training in making the preparedness plans. However, it is the role of the local and state authorities to designate responsibilities for public safety and law enforcement officers. Combined efforts between DHS and the local emergency teams will insure that the proper resources are in place in the event of a disaster. During the response phase, the federal role becomes more pronounced. Federal authorities will manage and coordinate the response to a terrorist act. However, the first responders will, by necessity be local, and the local emergency management team will need to provide the initial response and resources. As the federal units become more integrated into the response, they will offer the management and expertise necessary to adequately respond to a terrorist act. They will additionally handle communications and the media (Kemp, 2003, p.136). During the recovery phase, the federal government will have almost exclusive responsibility. Local authorities may act as coordinators or as a source of information, but resources and planning will be accomplished at the federal level (Kemp, 2003, 136). References Flynt, B., & Olin, R. (2003). Community threat assessment: A model for police. In R. L. Kemp (Ed.), Homeland security: Best practices for local government (pp. 33-37). Washington, DC: ICMA Press. Hickman, M. J., & Reaves, B. A. (2003). Intelligence gathering and networking. In R. L. Kemp (Ed.), Homeland security: Best practices for local government (pp. 23-27). Washington, DC: ICMA Press. Kemp, R.L., (2003). The future of homeland security. In R. L. Kemp (Ed.), Homeland security: Best practices for local government (pp. 125-130). Washington, DC: ICMA Press. McVey, P.M., (2003). The local role in fighting terrorism. In R. L. Kemp (Ed.), Homeland security: Best practices for local government (pp. 125-130). Washington, DC: ICMA Press. Russo, J., & Labriola, D. (2003). Information sharing by local agencies. In R. L. Kemp (Ed.), Homeland security: Best practices for local government (pp. 29-32). Washington, DC: ICMA Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Homeland Security: Community Threat Assessment Assignment, n.d.)
Homeland Security: Community Threat Assessment Assignment. Retrieved from https://studentshare.org/social-science/1510675-homeland-security-essay
(Homeland Security: Community Threat Assessment Assignment)
Homeland Security: Community Threat Assessment Assignment. https://studentshare.org/social-science/1510675-homeland-security-essay.
“Homeland Security: Community Threat Assessment Assignment”, n.d. https://studentshare.org/social-science/1510675-homeland-security-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Homeland Security: Community Threat Assessment

Homeland Security Exercise Program

Donna Purcell Order 541145 27 May 2011 homeland security: The States, In Relation to Exercise, Design, and Evaluation.... ?? There are many things that homeland security does to protect us.... homeland security provides border and transportation security, 2.... homeland security also focuses on prevention of terrorists, detection, and being prepared to respond, protect, and recover from any activity.... While homeland security is most often thought of as a government responsibility it is also the responsibility of the private sector to work with Federal, State, and local government agencies, owner/operators of business, nonprofit organizations, academic institutions, nongovernmental organizations and other infrastructure stakeholders such as trade associations....
5 Pages (1250 words) Research Paper

Risk Management Practices in Sea Ports

The advent of seaports dealing with ongoing threat efficiently is more likely with a substantial well thought of risk management plan.... A risk management plan would allow a seaport to manage risks such as security breaches, public relations, on-site injuries among others. The risks that a port might be exposed to can be assessed and evaluated to further determine the costs for implementing a risk management plan....
12 Pages (3000 words) Essay

Managing Homeland Security

I work with all the city, state, and federal agencies that may be needed in the preparation, response, and recovery from an emergency event. Initially, my department will be coordinating a risk assessment and mitigation project, where we will assess the potential for damage and work to lessen any foreseeable damage that may occur.... hellip; In addition, I work to get the community restored back to the pre-event state.... We will be appointing numerous emergency planners in the major institutions and organizations in the community that we can coordinate our activity with in the event of an emergency....
6 Pages (1500 words) Essay

Department of Homeland Security

The author of this essay "Department of homeland security" comments on the establishment of DHS.... If it continues to use such non-verified methods, it will not be able to perform its critical role and without appropriately satisfying its role, it will instead of decreasing the cyber security threat.... he reason for choosing this weakness is that the cyber security becomes more serious and grave threat than the scourge of extremism and terrorism....
9 Pages (2250 words) Essay

Securing America and Private Sector Role In National Security

The private security organizations have been put under the same pressure to ensure that people and information are protected with the collaboration with homeland security.... Despite protecting the same people, and properties of the United States, the private security organizations, and homeland security have rarely collaborated (National Research Council (U.... For instance, through community policing, private law enforcement agencies have collaborated with other private security agencies but with homeland security....
7 Pages (1750 words) Term Paper

Managing Homeland Security

An author of the paper "Managing homeland security" intends to critically evaluate the US government's efforts to strengthen homeland security and handle the threats of terrorism.... Thus, the paper provides an analysis of the US homeland security department operation....  … The growth of terrorism and terrorist upheavals all throughout the world has alarmed the world nations and this turbulent condition has forced countries to reconsider their homeland security measures and tactics....
8 Pages (2000 words) Term Paper

Homeland Security in the USA

This paper, homeland security in the USA, stresses that on September eleven 2001, nineteen al-Qaeda terrorists hijacked four passenger airlines and intentionally crashed two of them into the Twin Towers in NYC.... hellip; According to the paper, the homeland security can simply be defined as an established role of the government to prevent terrorism within the US, reduce America's susceptibility to terrorism and minimize the damage and subsequently recover from the occurrence of such attacks....
12 Pages (3000 words) Term Paper

Homeland Security Strategies in the United States

This research paper “homeland security Strategies in the United States” aims at studying the functions and objectives of the homeland security Strategies and analyzing them in detail.... It starts with giving a brief introduction and history of the homeland security.... hellip; The research paper has tried to highlight important issues regarding the heavy economic costs that the homeland security Strategies has incurred....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us