Preview

Homeland Security Case Study

Good Essays
Open Document
Open Document
1045 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Homeland Security Case Study
MIS
Case Study: Ch. 7

Database Woes Plague Homeland Security and Law Enforcement

1. It is important to connect as much of the data in many of the federal, state, and local information systems because it will help stop future attacks and events to happen to the United States. After September 11, the federal government created a new cabinet called the homeland security. The cabinet has a database of thousands of federal, state and local organizations. They collect as much of the information necessary to combat future terrorist attacks as well as fight domestic crime. Bringing together this information to make them useful for fighting terrorism and crime is provided to be an immense task. Ben Gianni, the vice president of the homeland
…show more content…
One of the most important pieces of data is to tack terrorist activity through these three organizations, the Immigration Naturalization Service (INS), Customs, and the Coast Guard. All three collect and store data on people and products that enter the United States. Bringing some of those data together would be useful for defending the country. However, these organizations have many databases, most of which are old and have been created independently. They have different computing platforms, data names, data definitions, data sizes, and data files. This is a problem that many global corporations have been addressing for years. Many are managing to interconnect their multitude of data systems, but it has been both time consuming and very costly. The FBI culture has been a mind-set to keep information to itself, a problem highlighted by and after 9/11. New York's senator Charles Schumer said, "One of the worst kept secrets in law enforcement is the chronic lack of communications between federal and local …show more content…
This universal database will allow all local and federal government to get access and receive information about a person, place, or anything. This database will have levels of classification and protection with ID numbers and thumb print analysis that are given to each individual to enter before getting access to the information. The second approach will be updating

You May Also Find These Documents Helpful

  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    For example, SFO which is part of the private security program, SPP, conducts emergency exercises each year even though it is required by federal regulations to carry out such a drill every three years. SFO Airport Director declares that this concept is adopted by SFO to maintain high level of training and preparedness against any threat (John L. Martin, 2014).…

    • 789 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This worker met with Mr. Ali at the Hennepin County Public Safety facility. Privacy practices and Tennessen notices were verbally reviewed. The interview was not recorded due to Mr. Ali being in jail and the interview took place through phone.…

    • 192 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In an effort to maintain the security of our nation, the Department of Homeland Security has developed a system called the National Terrorism Advisory System that releases security threat updates that can be easily accessible to other departments, private organizations, and even the public. However, before the National Terrorism Advisory System, or NTAS, there was the Homeland Security Advisory System, or HSAS, which was a color-coded advisory system that correlated the threat level to that of green, blue, yellow, orange, and red. In this paper, the author will further explain the two systems as well as explain the differences in the systems and why there was a change. The author will begin with discussing the Homeland Security Advisory System.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The agency of the U.S. Department of Homeland Security (DHS) that plays a major part in leading federal investigation of human trafficking are U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations’ (HSI). Since 2006 the amount of arrest has risen by double digits. Human trafficking investigation in 2013 led to 894 investigations, 967 arrests, equaling 559 indictments and 381 convictions. The Homeland Security Investigations collaborate with a variety of agencies with the arrest and capture of human trafficker that ends with prosecution. HSI officers training at the Federal Law Enforcement Training Center (FLETC) on human trafficking the modules are made apart of the regular curriculum.…

    • 106 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Nsa Deep Packet Inspection

    • 2249 Words
    • 9 Pages

    With so much happening in the world, and so much going wrong for the United States, the National Security Agency’s chief task is in gathering huge amounts of information and making it immediately useful to prevent terror and cyber warfare threats from damaging United States interests. The NSA’s most challenging task at this point is not in gathering huge amounts of information, but in making it useful. They have the facilities to monitor most telephone calls and email communication that happens in the United States, and with the new Utah Data Center which is currently under construction, they should be able to monitor almost all of it and be able to store it effectively. Ironically, the biggest disadvantage to having a huge amount of data at your disposal is that you have a huge amount of data that you have to sift through in order to get anything useful. This is why the NSA depends so heavily on a technology called Deep Packet Inspection (DPI) which helps the Agency to decrypt and organize internet traffic. Without this emerging technology, the Agency would have to rely on simple searches and manual filtering to find information that is relevant to national security, a very expensive process in terms of both time and money which would ultimately waste the…

    • 2249 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    Joe, 500 million people entering into the United States each year is astonishing. It certainly puts into perspective the difficulty that multiple agencies probably had communicating with one another prior to consolidating the agencies under the Department of Homeland Security [DHS]. Additionally, it shows just how important not only transportation and border security is, but also the responsibility placed upon the intelligence community. An article by The Center of Immigration Studies [CIS] showed that there were 48 foreign-born militant Islamic terrorists that were charged or admitted involvement in terrorism within the United States between 1993 and 2001. Of those 48, 45 had some sort of contact with a border inspector prior to carrying out…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The evolution of Homeland Security seems like a relatively new one, but really the history leading up to it began in the 1800s. Over time, however, improved preparedness, response and recovery, and creation of certain protective documents influenced how we view Homeland Security today. Bottom line, Homeland Security and its governing documents, specifically the National Incident Management System (NIMS) and National Response Framework (NRF), exist for a reason, these reasons and the documents are important to review.…

    • 950 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Homeland security is not just about the physical barriers to keep terrorists and criminals out. It is a process to secure an area and keep people and assets safe. Cyber security is just as important as having a guard checking credentials at the entry of a port facility. As technology continues to grow so does the threat of cyber-attacks. So far technology as given way to x-ray scanners that allow containers to examined for nuclear/radioactive material without ever being opened. Port Security Officers have the ability to check shipment manifest quickly and identify dangerous materials that may require a more inadept inspection and properly prepare staff for action if needed. Port security officers are able to monitor operations through…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Counter Terrorism

    • 2173 Words
    • 9 Pages

    In recent years, there has been much debate in the intelligence community relating to the balance between human intelligence and technical intelligence in order to satisfy states’ intelligence requirements. This paper addresses the argument from both sides, and suggests that there has been an over reliance on technical intelligence in recent years, leading to inadequacies in intelligence gathering.…

    • 2173 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Information sharing among difference agencies was not done among the local, national and international law enforcement agencies prior to the September 11 attacks; consequence of the terror act prompt the needs for information sharing among different agencies as a tool to help counter and combat terrorism. Department of homeland security host the web based data exchange plate form for the information sharing among the different law enforcements agencies." The constantly evolving national security threat requires an adaptable information sharing strategy"(FBI,2012) As terrorists keep evolving different method to carry out their plot, information sharing adaptation to such threats is prominent as to help prevent, detect, counter and combat such…

    • 455 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    store and access information. As more and more personal and classified information gets stored, it is…

    • 3842 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    The concept illustrated in this case is about consolidating multiple databases into a single strong list. Furthermore, agencies are using data warehouses to queried information gather by all government departments. Agencies can receive a data mart, a subset of data, which pertains to its specific task. For instance, airlines use data supplied by the TSA system in their NoFly and Selectee lists for prescreening passengers, while the U.S. Customs and Border Protection system uses the watch list data to help screen travelers entering the United States. Managing data resources effectively and efficiently is very important in this case. No information policy has been established to specify the rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information. Data administration seems to be poor. Data governance that would help the organizations manage the availability, usability, integrity, and security of the data seems to be missing. It would help increase the privacy, security, data quality, and compliance with government regulations. Lastly, data quality audits and data cleansing are desperately needed to decrease the number of inconsistent record counts, duplicate records, and records that lacked data fields or had unclear sources for the data.…

    • 850 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data on Sale

    • 657 Words
    • 3 Pages

    In one hand, from the case, we know that information that data brokers provide or sell to its customers like Internal Revenue Service and Department of Homeland Security and Justice have used for law enforcement and counterterrorism. More broadly, these data are being used to locate the assets of delinquent taxpayers, and screen candidates for federally controlled airport security workforce. Likewise, the insurance companies, banks and state and local government agencies benefits from these vast pool of personal information to develop new products and services and/or to devise their marketing strategies. In short, the data brokers are…

    • 657 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Homeland security is a very big one since 911. Also what happen during Hurricane Katrina made homeland security looked on more. Homeland security has been propelled to the forefront.These was two incidents we felt like would never happen in our country. Homeland security is an example of the importance of preserving the delicate balance between individual rights and public safety (Baker,2015). The advent of homeland security has had a significant impact on this united direction, particularly in regard to law enforcement.Homeland security had to be sit up because before we was not focus on Homeland security, but being attacked by terrorist made us think twice (Baker,2015).…

    • 377 Words
    • 2 Pages
    Satisfactory Essays