0% found this document useful (0 votes)
47 views9 pages

Brainstorming

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 9

Running head: UNIT 1 ASSIGNMENT 1 1

Unit 1 Assignment 1

Julia Pearson

CJ/526

October 17, 2017

David White
UNIT 1 ASSIGNMENT 1 2

Unit 1 Assignment 1

Part 1 Brainstorming

After the attacks on September 11, the Department of Homeland Security was developed

to help federal, state, and local law enforcement share information to reduce linkage blindness

(Grant & Terry, 2012). (maybe use this to talk about the relationship between DHS & local law

enforcement)

Detail the attacks of September 11, 2011 that lead to the creation of the Department of

Homeland security.

After the terrorist attack on September 11, 2001, then President George W. Bush led a

movement to reorganize the structure of federal law enforcement (Walker & Katz, 2011). The

Homeland Security Act was passed by Congress on November 25, 2002, creating the

Department of Homeland Security (DHS), and launching the largest government restructuring

since 1947 (Walker & Katz, 2011). According to Grant & Terry (2012), “The aim of this

reorganization was to better coordinate the intelligence and law enforcement resources of the

U.S. government in the war on terror by attempting to eliminate the problems of linkage

blindness (need age number).” The six largest agencies are Customs and Border Protection

(CBP), Immigration and Customs Enforcement (ICE), Federal Emergency Management Agency

(FEMA), Transportation Security Administration (TSA), U.S. Coast Gard, and U.S. Secret

Service (Walker & Katz, 2011).


UNIT 1 ASSIGNMENT 1 3

The Department of Homeland Security (DHS) has twenty-two agencies, employs 230,000

people, and includes over 87,000 federal, state, and local jurisdictions (Grant & Terry, 2012).

(find todays numbers & todays budget)

Homeland Security includes:

Emergency preparedness and response (natural disasters and terrorism)

Domestic and International intelligence (FBI, CIA, NSA)

Infrastructure and border protection and control (land, maritime and country borders)

Cybercrimes

Transportation security (aviation and maritime)

Biodefense, Detection of radioactive and radiological materials (List Departments that

handle such things)

Education- became a field of study

President Bush had a plan to strengthen homeland security and made that part of the

mission of the DHS. The plan provided $3.5 billion dollars to pay for training, equipment, and

local anti-terrorism planning for first responders, such as, police, firefighters, and medical

personal (Walker & Katz, 2011). Also, “$700 million dollars was used to improve the federal

government’s capacity to gather and share intelligence with other federal agencies as well as,

with state and city governments,” as stated by Walker & Katz (2011). Under the DHS, the

Immigration and Customs Enforcement (ICE)’s Law Enforcement Support Center (LESC)

provides assistance and information to federal, state, and local law enforcement. Information

about foreign nationals is the primary benefit to state and local agencies (Grant & Terry, 2012).
UNIT 1 ASSIGNMENT 1 4

Additional programs under DHS that help law enforcement are, the Joint Regional Information

Exchange System (JRIES), the Office of State and Local Government Coordination (SLGC), and

the Commercial Equipment Direct Assistance Program (CEDAP) (Grant & Terry, 2012).

After the 9/11 attacks Tom Ridge introduced the Homeland Security Advisory System. It

is a color-coded system to communicate a terrorist threat level to federal and local agencies

along with communities. Went into effect on March 12, 2002. Was replaced on April 12, 2011

with the two-level National Terrorism Advisory System.

Local police are typically the first to respond to a terrorist event. Local police are the

agency that most citizens will contact with suspicious activity. Turf battles and the unwillingness

of federal law enforcement to share critical information with local law enforcement have caused

some police chiefs to state that they are treated like second-class citizens by DHS, yet they are

expected to be the first to respond to a security threat (Grant & Terry, 2012).

DHS and Cybercrime with advancing technology

The way criminals use the internet for cybercrimes is changing. Today criminals use

smartphones, tablets, virtual private numbers (VPN), and other hardware to commit cybercrimes.

Cybercrimes are any crimes that involve the use of a computer (Maguire & Okada, 2011). There

are many types of cybercrimes such as identity theft, hacking, child pornography, piracy, and

cyber staking. The Department of Homeland Security (DHS) (2016), states, “it works with other

agencies in conducting high-impact criminal investigations to disrupt and defeat cyber criminals,

prioritize the recruitment and training of technical experts, develop standardized methods, and

broadly share cyber response best practices and tools.”


UNIT 1 ASSIGNMENT 1 5

Patriot Act

The USA PATRIOT Act (commonly known as the "Patriot Act") is an act of the U.S.

Congress that was signed into law by President George W. Bush on October 26, 2001. Stand for

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and

Obstruct Terrorism Act of 2001 (Department of Justice, n.d.).

Controversy and privacy Homeland Security and Patriot Act, 4th Amendment

Sneak and peek warrants (Delayed Notice Warrant) are an extreme version of the no-

knock warrant. Under the Patriot Act, sneak and peak warrants were used as standard procedure

in investigations. addressed in Section 213, under Title II or the Enhanced Surveillance

Procedures. Sneak and peak warrants are not limited to acts of foreign and domestic terrorism.

They are applicable to any federal crime, including misdemeanors. Under a Sneak and peak

warrant, investigators may enter and search and person's business or dwelling and may “delay

notification for up to 30 days or longer 'if 'the facts of the case justify' it, and then obtain an

indefinite number of 90-day extensions (citation needed).”

After a judge’s authorization, police are allowed to secretly break into private property

without first announcing themselves or presenting the subject of the search with a signed

warrant. Using this variety of warrant, officers intentionally wait until the subject is not

present. The operations are performed covertly, and with the intention of masking the fact

that any police activity took place (Citation needed).

http://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1104&context=fac_pm

Roving wiretaps and sting ray devices, Biometrics (week 3) airports


UNIT 1 ASSIGNMENT 1 6

HIPAA privacy rule on April 14, 2003, enemy combatant change in definition Geneva

Convention.

Education has become a degree and certificate programs

Other countries equivalent


UNIT 1 ASSIGNMENT 1 7

Reference

Department of Justice. (n.d.). The USA PATRIOT Act: Preserving Life and Liberty. Retrieved

from https://www.justice.gov/archive/ll/highlights.htm

Grant, H. B., & Terry, K. J. (2012). Law Enforcement in the 21st Century (3rd ed.). Upper

Saddle River, NJ: Pearson Education, Inc

The Department of Homeland Security. (2016, January 8). Combating Cyber Crime. Retrieved

from https://www.dhs.gov/topic/combating-cyber-crime

Walker, S., & Katz, C. M. (2011). The Police In America (7th ed.). New York, NY: McGraw-

Hill.

Falkenrath, R. A. (2004). The 9/11 Commission Report: A Review Essay. International Security,

29(3), 170-190. doi:10.1162/0162288043467469


UNIT 1 ASSIGNMENT 1 8

Part 2

Introduction

1. After the terrorist attack on September 11, 2001, then President George W. Bush led a
movement to reorganize the structure of federal law enforcement.

2. The Homeland Security Act was passed by Congress on November 25, 2002, creating the
Department of Homeland Security (DHS)

Creation of the Department of Homeland Security

A. Terrorist attacks on September 11, 2001

3. Who were the terrorists

4. Where did they come from?

5. Why did they attack the United States?

6. Planning and implementing the attacks

B. Organization of Homeland Security

1. Largest government restructuring

2. What areas are covered

Relationship between DHS and Local Law Enforcement

A. President Bush’s Plan to strengthen homeland security

1. Training, equipment, and local anti-terrorism planning

2. Improving gathering and sharing of information among law enforcement agencies

3. Additional programs

DHS and Cybercrime with advancing technology


UNIT 1 ASSIGNMENT 1 9

A. Types of cybercrimes

B. Combating cybercrimes

Academic Education

A. Degree and Certification programs

Conclusion

A. Department of Homeland Security

B. Creation of DHS, Relationship between DHS and local law enforcement, Cybercrimes, Academic
Education

C. After the terrorist attack on September 11, 2001, the Department of Homeland Security was
created. It was the largest government restructuring since 1947. The Department of Homeland
Security was developed to help federal, state, and local law enforcement share information to
reduce linkage blindness. The Department of Homeland Security (DHS) works with other
agencies to combat cybercrime. Homeland security, terrorism, cybercrimes have become new
field of study in the academic world.

You might also like