19 Dec 2022

112

What's Next for Homeland Security?

Format: APA

Academic level: University

Paper type: Term Paper

Words: 1078

Pages: 4

Downloads: 0

Since its inception in 2002, the Department of Homeland Security (DHS) has been a major hindrance to the launch of an attack at the levels of 9/11. Its existence has helped to secure the country against both external and internal threats that might threaten the wellbeing f American citizens and the country as a whole. Al Qaeda has been a major threat to the department since its inception (Nelson, 2013) . The guidelines the department has employed in its effort to prevent Al Qaeda’s influence in the country growing and the chances of it attacking the country have been specific ( Hennessey, 2017). However, Al Qaeda is not the only threat the DHS has to deal with. During its inception, the major threat was a terrorist attack (Nelson, 2013) . Over the almost two decades f its existence, new threats such as cyberattacks and information sharing security have been on the rise. As things stand, the major priority for DHS now is the counter these threats while at the same time keeping on thwarting Al Qaeda’s influence and threats. 

Analysis 

Every American who was present during the 9/11 attack knows how much mayhem terrorism can cause (Nelson, 2013) . Even those who came of age after or were born after have been treated to videos of the attack. They can all relate. Different wars such as the one in Syria and Yemen is a good reference for everyone on how extremism can lead to catastrophes ( Hennessey, 2017). The DHS has been pivotal in keeping such threats outside the country’s borders and keep its people safe. However, new threats such as cyberterrorism do not need the physical manifestation of an individual in American soil to carry attacks thanks to the internet (Trautman, 2016). Emerging sophisticated use of the internet has ensured that any person who can access the internet anywhere in the world can launch an attack on an online platform as long as it is can be accessed. The DHS now must tighten security and ensure such threats are thwarted and harm is reduced down to minimal. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Information safety can be connected to cyberterrorism (Nelson, 2013) . However, there can be involvement of physical elements such as people that threaten the security of information. For instance, a person can access a company’s website and print out sensitive information that they can physically pass to another person who is not mandated to have it. A person can also access the physical infrastructure of an institution such as computer hard drives and make away with them ( Hennessey, 2017). When such kind of information gets to the wrong people, it can threaten the security of such an institution hence threatening its security. 

Current financial situations mean that the funding of the DHS is threatened (Nelson, 2013) . Threats such as cyberterrorism are evolving as technology evolves. As such, it is hard to predict how things will be after a specific time such as six months as nobody knows what technology will have placed in the table by then. As such, the DHS needs to keep on par with such developments ( Hennessey, 2017). However, if there will be minimal funding, it means that the DHS will not be able t carry out is operations to perfection and the country will be vulnerable to cyberattacks. 

During the presidential campaigns in 2016, Hillary Clinton’s emails were published by WikiLeaks ( van Der Walt, 2017) . The emails were obtained when the email account of her campaign manager was attacked by a phishing malware that is said to have originated from Russia. The attack is a good example of the complications that the NHS faces in its efforts to thwart cyber attacks. As such, there is a need to invest in the department and make sure that it is well equipped to deal with similar cases that threaten the privacy and security of American people ( van Der Walt, 2017) . The head of the National Security Agency and the commander of USCYBERCOM, General Keith Alexander, noted that cyberattacks leave the country poorer as it was (Nelson, 2013) . This is because the information retrieved during attacks represents intellectual thefts. It also represents a threat to national security especially when that information lies at the hands of enemies. The biggest challenge to the DHS will be to stop these kinds of attacks but its capacity is limited ( Trautman, 2016) . To help the department, there will be a need to support it by establishing systems and infrastructures that give it an edge over potential attackers. 

All cyberattacks are similar. Current security systems in the country encourage information sharing between departments (Nelson, 2013) . That means that the whole country is at risk of cyberattacks. When one system gets compromised, information about another can be easily gotten without staging another attack (Nelson, 2013) . It is impossible to maintain national security without such information moving around different agencies (Hennessey, 2017) . It is therefore vital to make sure there is enough measure to protect vital information from landing into the wrong hands. Such measures include the provision of amicable means between the DHS and the private sector. Currently, the private sector holds more than 85% of the infrastructure the DHS is mandated to protect (Nelson, 2013) . If there were to be barriers such as high operational costs and vital information that can help the DHS being held from it by the private sector, it will be difficult for the department to deliver on its capacity. 

Cybergressors are always inventing new ways of launching attacks ( Trautman, 2016) . The DHS should therefore not dwell on methods that have been used before during cyber attacks. It should focus on interagency coordination to identify potential threats and new ways that can be used to launch attacks ( van Der Walt, 2017) . Although it is hard to perfectly predict trends in cyber attacks, the DHS will be equipped with the necessary tools to reduce the impacts of cyberattacks (Nelson, 2013) . Cyber attackers who have been identified should be tried and put in jail. Even though the DHS cannot identify a cyberattack before it happens, putting attackers behind bars will act as a deterrent to potential attacks after they know the repercussions that await them if they were to get caught. (Hennessey, 2017) 

Conclusion 

The DHS has played a major role in keeping the country safe since its founding. Even though many of the threats it is facing are unpredictable, given the right amount of support from the government, it can help to keep them minimal. Al Qaeda serves as a perfect example of how the DHS has been able to perform its job perfectly in keeping the country and its citizens safe (Nelson, 2013) . The coming decades will prove more difficult for DHS and its work. The government and the DHS must start preparing now instead of waiting or the inevitability to happen to take action ( Trautman, 2016) . That kind of approach will provide the DHS with an opportunity to counter new threats that threaten the security of American people and institutions. 

References 

Hennessey, S. (2017). Deterring cyberattacks: How to reduce vulnerability. Foreign Aff. , 96 , 39. 

Nelson, R. (2013). Homeland Security at a Crossroads: Evolving DHS to Meet the Next 

Generation of Threats . Csis.org. Retrieved from https://www.csis.org/analysis/homeland-security-crossroads-evolving-dhs-meet-next-generation-threats. 

Trautman, L. J. (2016). Is cyberattack the next Pearl Harbor. NCJL & Tech. , 18 , 233. 

van Der Walt, C. (2017). The impact of nation-state hacking on commercial cyber-security. 

Computer Fraud & Security , 2017 (4), 5-10. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). What's Next for Homeland Security?.
https://studybounty.com/whats-next-for-homeland-security-term-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 182

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 251

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration