Analysis of Terrorism and Homeland Security Management: Unit 3

Verified

Added on  2022/09/17

|4
|713
|32
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: - TERRORISM AND HOMELAND SECURITY MANAGEMENT UNIT 3
Terrorism and Homeland Security Management
Name of the Student:-
Name of the University
Author’s Note: -
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Terrorism and Homeland Security Mnagement
After the heinous crime committed against the humanity on 9/11, an initiative was taken
to ensure the internal security of United States of America. During the tenure of President
George W. Bush, the Department Of Homeland Security was established to look after the
internal security of the nation (Baggett and Simpkins,2018). The utmost responsibility of the
department was to neutralize any possible threat to the nation. This department consists of
several sub-departments that initiate several adoptive measures to ensure the security.
Department of Homeland Security consists of several sub-departments that look after the
security of the state. As been said earlier, after the macabre happened on 9/11, the US
government has imposed stringent vigilance on the internal security. Any possible threat and
breaches to the security shall be eliminated with utmost urgency. To keep an eye on the internal
security a covert set up was needed. The secret service was inducted to the homeland security in
2002 (Order,2017). Since its inception in 1865, the agency has been keeping a track on the
monetary and financial transaction security of the state. It is quite obvious to say that any
militant organization needs a huge amount of capital to carry on their armed insurgency. This
agency keeps an eye on all the monetary transactions and ensures that the militants do not get
access to the capital.
The Cyber-Security and Infrastructure Security Agency is another branch of homeland
security department that ensures to neutralize any possible threat to the nation. By securing cyber
based infrastructure, this organization keeps an eye on all the secret documents and cyber
generated nuclear warheads of the United States (Ortmeier,2017). The utmost aim of the agency
Document Page
2Terrorism and Homeland Security Mnagement
is to provide cyber-security tools that eventually restore the secretive details of the US ARMED
FORCES, NUCLEAR WEAPONARY and other civil details. CSISA also provides security to
other field agencies by adopting several security measures.
In most of the cases it can be seen that the Modus Operand of the said agencies are same.
Both of this agencies keep on monitoring the internal security. Although the secret service
chiefly operate as a counterfeiting agency still it does have some resemblance to the way CSISA
operates. The secret service, apart from providing the security to the financial sector also looks
after the counter-insurgency system. The operating system of CSISA is bit different from than
that of the Secret Service. CSISA chiefly looks after the cyber-security of the homeland based
operative systems that includes banking, secret service agencies, presidential documents and
nuclear warheads (Boukalas,2014). CSISA is mostly operative in virtual mode, whereas the
secret service is chiefly a field agency.
Although the operative system and execution of operations are different, still it can be
deduced from their modus operand that these two agencies are inseparable, because of the
commonness they inherit. Chiefly their objective is to secure the homeland and internal security
of the state. Both the agencies are at their steadfast readiness in neutralizing any possible threat
to the country. It can be concluded that apart from their structures and few differences in
operational output, these agencies are with a single aim, and that is to defend their country from
any possible threat.
Document Page
3Terrorism and Homeland Security Mnagement
Reference List
Baggett, R. K., & Simpkins, B. K. (2018). Homeland security and critical infrastructure
protection. ABC-CLIO.
Boukalas, C. (2014). No exceptions: authoritarian statism. Agamben, Poulantzas and homeland
security. Critical Studies on Terrorism, 7(1), 112-130.
ORDER, E. (2017). Executive order: Border security and immigration enforcement
improvements.
Ortmeier, P. J. (2017). Introduction to security. Pearson.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]