Evaluation of Homeland Security Department

Evaluation of Homeland Security Department

            The Homeland Security Department is a federal institution that was created to protect U.S. citizens against threats. Its substantial roles entail border regulation, cybersecurity, aviation security and emergency response. According to the Homeland Security Department's mission statement, the institution contains five prime security objectives. These include to:

  • Manage and secure United States Borders.
  • Administer and enforce United States immigration rules
  • Secure and safeguard cyberspace
  • Enhance security through terrorism prevention

            My interest was drawn to the organization due to the recent rise in cases of terrorist attacks since the 9/11, 2001 U.S. bombing. Despite the establishment of stringent mitigation measures, terror attacks have been on the rise, especially in Europe. For instance, the terrorist attacks that were witnessed in several parts of the world, such as the Paris shooting on 20th April 2017, as well as the Stockholm attack on 7th April 2017, which left four individuals dead and at least 16 others injured. The worst and most devastating attack was the recent bombing in Somalia’s capital, Mogadishu, on October 14th, 2017, where about 519 people were killed and thousands injured. These terrorist attacks have drawn my attention in the field of security as I would like to explore and understand the various vulnerabilities related to the threats and mitigation measures that have been taken to ensure the safety of U.S. citizens.

            Mitigation of terror attacks against high occupancy structures has proved to be a difficult task. It is challenging to project when, how, and why terrorists may attack. Several factors have to be deliberated in constructing a secure building atmosphere. This research illustrates several assets of the Homeland Security Department that are at risk. These intangible assets consist of:

  • The sophisticated cybersecurity infrastructure that is used against cyber-attacks
  • The risk-specific evaluation tools, such as the risk personal-examination tool, enable stadium managers to determine security susceptibilities to minimize risks to the profit-making amenities.

Other tangible assets comprise physical infrastructure, which entails security equipment such as:

  • Search and rescue dogs
  • Heavy high-tech combat artillery,
  • Military vehicles (Armored combat support vehicles)
  • Organization premises such as the Homeland Security Department Headquarters at Southwest, Washington, D.C.

 

The Interview

            To gain an understanding of this topic, an interview was conducted, which involved two individuals, both of whom have served in a top managerial position at the Homeland Security Department as the Director of the Emergency Service Department (ESD). The other interviewee served as the former Assistant Director of the Domestic Nuclear Identification Agency (DNIA). ESD deals with emergency response and provision of a wide range of recovery, preparedness, and prevention services during calamity operations. Domestic Nuclear Identification Agency (DNIA), on the other hand, develops research, assessment, and tests of radiological and nuclear recognition technologies and is charged with the duty of securing the technological schemes necessary for the implementation of the national portions of the universal atomic recognition architecture. DNIA also offers standardized technical support through hazard response and training procedures, as well as threat evaluations for both non-federal and federal organizations. Since both interviewees preferred their identities to be anonymous, it was considered appropriate not to disclose their names.

            The selection of these two interviewees was suitable for this research since the individuals have an excellent score in the grading of persons with technical expertise in the field of hazard risk assessment within the Homeland Security Department, as indicated in the U.S. Department of Defense personnel data record. Both of them had direct input in the decision-making process within the selected institutions; hence, by using insights from the interview, I was able to gather information concerning some of the threats, vulnerabilities, and consequences related to the Homeland Security Department. For instance, according to the former Director of the Emergency Service Department, personal communication, February 3rd 2018) articulated that the organization faces multiple management crises due to the vulnerability components such as the ageing workforce, alarming cases of fraud, biological attacks and coordination,, and failures. These constituents have a profound impact on the organization's performance as they lead to a wide set of technical hitches to the standard of everyday operations. For example, the former Assistant Director of DNIA, personal communication, January 18th 2018) admitted that failure in emergency response coordination systems during the October 22nd, 2016 biological attack in Iraq resulted in the death of 3 American soldiers and left 1700 individuals severely injured.

            In regards to the disruptive national disasters, both interviews described that tornadoes, hurricanes, wild forest fires and buzzards are some of the prime contributors to death and property destruction in the country. They are associated with vulnerability aspects, which may consist of the proximity to specific geographical locations, such as residents near ocean coats and forests. The former director of the Emergency Service Department, personal communication, February 12, 2018) argued that the events of the hurricane and tornado attacks have killed thousands of U.S. citizens since the year 1980. Furthermore, studies reveal statistical evidence of damage to properties and the related financial loss caused by forest fires and blizzards in several parts of the country, which are prone to attacks. In light of this interview, the correlation between threats, vulnerabilities and the associated consequences was therefore well established, as indicated in the tables below.

Table 1: Disruptive Disasters / Catastrophes

Threats

Vulnerabilities

Consequences

Earthquake

  • Proximity to the fault line
  • Weak infrastructure

 

  • Property loss
  • Death of residents
  • Injuries to the residents

 

Floods

  • Damaged infrastructure, such as the flood walls
  • Region topography

 

  • Property damage
  • Displacement of local residents

Hurricanes

  • Proximity to the ocean
  • Weak infrastructure, such as the damaged bridge walls
  • Property damages such as roads and homes
  • Death and of residents
  • Displacement of the residents

Environmental Degradation

  • Huma activities such as mining, oil spillage, release of untreated effluent into rivers
  • Extinction of wildlife
  • Destruction of ecosystem

Volcanic Eruption

  • Presence of fault line

 

  • Air pollution
  • Evacuation of families living in active volcanic zones,

Tornadoes

  • Prediction faults in changing weather patterns
  • Death and injuries of residents
  • Damage to properties such as roads and homes

Forest fires

  • Inadequate fire management resources
  • Property destruction
  • Air pollution

Drought

  • Environmental pollution
  • Loss of human and animal lives

Global warming

  • Political challenges
  • Depletion of the ozone layer
  • Changing climate patterns

Tsunamis

  • Proximity to the areas
  • Death of residents
  • Destruction of property

Blizzards

  • Geographical location
  • Diseases to residents
  • Property damages

Thunderstorms

  • Geographical zone
  • Flash Floods, tornadoes and heavy rains
  • Death of animals

 

 

Table 2: Business or Management Crises

Threats

Vulnerabilities

Consequences

Aging Workforce and Aging Infrastructure

  • Incompetent personnel at work
  • Deteriorated or outdated infrastructure
  • Organizational knowledge is lost
  • Widespread causalities

 

Interdepend Infrastructure Failure

  • Laxity in maintenance

 

  • Collapse of bridges and power transmission lines

 

Workforce Illness

  • Organization complacency
  • Reduced job performance

Coordination Failures

  • Infrastructure failure
  • Increase death cases

Fraud

  • Incompetent audit personnel
  • Financial loss

Water system hitches

  • Improper water management systems
  • Chemical contamination

Cyber attacks

  • Use weak software
  • Psychological impact, such as drawing fear among citizens

Biological Threats

  • Improper conceptual risk assessment model
  • Death and illness among citizens

 

Analysis of Vulnerability and Consequence Patterns

            Given the above examples, it is clear that there are patterns in the consequences and vulnerabilities concerning national security threats. An example is the case of biological attack natural disaster occurrence, which can be projected regarding the estimated mortality rate (the fraction of individuals who die due to the attack) and the expected rate of attack (the portion of persons who become affected during a set amount of time). The patterns in the consequence and vulnerability of risk determine the typical periodic rate of threat occurrence which can help decision-makers within the organization to prepare for an emergency.

Application of Hazard-Management Approach

            These network disruption and systems resilience models (which supplant and move away from current limitations of TVC analyses for CIKR) are ideal for longer-term investment decisions and capabilities planning to enhance infrastructure systems’ resiliency beyond just site-based protection. Such models have been used in other private sector and military applications to assist decision-makers in improving the continuity of operations.

Acknowledgement of Potential Disasters by Organizations

            Despite the comprehensive knowledge of the potential crises and disasters, organizations find it difficult to identify potential hazards due to perceptions that devastating calamities would not have severe impacts enough to merit the investment of necessary resources in preparedness operations. Most institutions are also inadequately prepared, rendering continuity of suitable response actions after a disaster challenging.

 

Mitigation Response by Organizations

            Studies also indicate that numerous organizations frequently discredit the occurrence of impending threats; hence they are reluctant to invest in resources (time and money) and diversify their investments. Most of the organizations perceive that taking such actions is unnecessary as they act against the established financial success strategy of the business. Numerous organizational managers, hence, find it opposing to support operations that recognize risks to the policies they facilitated during their formulation.

Insights Gained During the Assignment

            This assignment has significantly assisted in the understanding of the fact that risk management entails five fundamental features which are risk response, reporting risks, risk management policies, evaluation of risks and then residual risk reporting. Through these elements, organizations can protect its assets by conformance to hedging practices which mitigate the occurrence of potential threats.

Application of the Knowledge of Risk Management

            The knowledge in risk management applies to my work area as it can be used in the identification of all probable hazards that are intrinsic to the job. For example, while working in the laboratory, the first step would be the identification of the risks through checking the manufacturer's description of the equipment and chemicals for use. The instructions act as guidelines for potential hazards which can be traced in case an accident has occurred in the work area.

 

 

Statement Attesting to Original Work

 

"This paper, examination, report, or the section thereof for which I have indicated responsibility, is my own work. Any assistance I received in its preparation is acknowledged within the report or examination, in accordance with academic practice. For any data, ideas, words, diagrams, pictures, or other information from any source, quoted or not, I have cited the sources fully and completely in the text, in endnotes, or in footnotes and bibliographical entries, as required. Furthermore, I certify that the material was prepared by me specifically for this class and has not been submitted, in whole or significant part, to any other class in this university or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit this material to a professional publication, peer-reviewed journal, or professional conference. In adding my name following the word 'Signature', I intend this certification to have the same authority and authenticity as a document executed with my hand-written signature."

 

Signature ______________________________ Date ______________




Place your order