Homeland Security Essay

Total Length: 910 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

Evolution of the Incident Command System (ICS)

Out of concern for the lack of a uniform protocol for emergency management, the concept of the Incident Command System (ICS) was developed in combined effort by Federal, State, and local governments during the 1970s (Dudfield, 2008, p. 31). This system was developed in response to the catastrophic wildfires that occurred during 1970 in South California by fire agencies at the federal, state, and local levels (Cardwell, 2000, p. 10). The intent of ICS is to provide an organizational structure to use to coordinate response efforts to incidents of any scope ranging from minor to large-scale incidents such as natural disasters, fires, accidents, or attacks. The original ICS system has evolved into what is known today as the National Incident Management System (NIMS) that still utilizes the tenets of ICS.

According to the Federal Emergency Management Agency (FEMA),

ICS is a standardized, on-scene, all-hazards incident management approach that

Allows for the integration of facilities, equipment, personnel, procedures, and communications operating within a common organizational structure.

Enables a coordinated response among various jurisdictions and functional agencies, both public and private.

Establishes common processes for planning and managing resources.(FEMA)

This system can be applied to any type of incident ranging from a simple to complex incidents and is used at all government levels ranging from federal, state, and local governments to the private sector as a means of response.
It employs eight basic management concepts that work together to provide a coordinated response to any emergency situation. These eight concepts are: "modular organization, unified command, manageable span-of-control, common terminology, consolidated action plans, comprehensive resource management, integrated communications, and predesignated incident facilities" (Cardwell p. 12). With its modular organization, it is used to facilitate organizational actions in five main areas: command, operations, planning, logistics, and Finance/Administration in order to maintain an organized structure to responding to emergencies.

"ICS existed for nearly 10 years before the law enforcement community began to study and embrace the concept" (Cardwell, p. 11). The concept of ICS was slow to be accepted at first by agencies outside of the fire service. Part of the hesitance may have been the misconception that this system took away control of the situation from state and local authorities' jurisdiction and gave control to the federal government where control was not needed. This; however, was not the case with ICS; it merely acted as a framework to provide a structure to use when responding to incidents and would allow for easier integration of services that may be needed in order to respond to those incidents. According to Aden Hogan, Jr. (2011), city manager of Evans Colorado when asked about his experience with the response to the Oklahoma City bombing….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Homeland Security and the Distinction Between ISR and IAA

are aimed at improving the informational and situation awareness to the department of homeland security. The capabilities of ISR have increased in demand since the incident of Hurricane Katrina. The same capabilities of ISR are the ones that are termed Incident Awareness and Assessment (IAA). The Incident Awareness and Assessment (IAA) capabilities have been leveraged to respond to various kinds of threats such as hurricanes, wildfires or even ocean oil spill. The ISR has the capability to provide invaluable situational awareness from various intelligence disciplines. The intelligence can be in the form of signals or imagery to the military commanders. Improved ISR provides… Continue Reading...

Private Security and Homeland Security

Private Security Trends and Movements Private security plays such a significant role in the efforts of the Department of Homeland Security (DHS) that the DHS published in 2010 a Private Sector Resources Catalog that “centralizes access to all DHS resources targeted for the private sector including small and large businesses, academia, trade associations, and other non-governmental organizations” (DHS, 2018). One example of a private security firm within the catalog is TRIPwire Community Gateway (TWCG)—“a web portal designed specifically for the nation’s CIKR owners, operators, and private security personnel.” The TWCG serves as a portal for private security groups to give analysis of threats, reports, and planning phases, helping private… Continue Reading...

Ethics and Technology at Homeland Security

Ethical Considerations for the Use of Technology to Meet Selected Homeland Security Objectives Introduction The Digital Age has transformed the way the world works for better or worse. Technology exists to bring down nations’ infrastructures without ever firing a missile (Ten, Manimaran & Liu, 2010). New technology has been developed that can allow agencies to spy, snoop, monitor, and retrieve conversations had online, through email, on cell phones, or via text messaging. To meet security needs, using this technology has very real and practical advantages. At the same time, there are privacy rules and regulations that have to be considered… Continue Reading...

Strategies to Improve Collaboration and Cooperation Between the Homeland Security Agencies

Strategies to improve collaboration and cooperation between the Homeland Security agencies The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland Security Review) was completed in the year 2010 with an objective of establishing an incorporated strategy for the goals and missions of homeland security (Homeland Security, 2005). Following this, DHS carried out a BUR (Bottom up Review). The objective was… Continue Reading...

Fema Dhs and Emergency Management at Local Levels

local efforts before, during, and after incidents,” (United States Department of Homeland Security, 2008, p. 6). States in many ways play the least visible role in emergency management, often working as liaisons between local governments requesting additional support and the federal government needing more information about the situation. Not all incidents require state or federal intervention and assistance, and city councils should not be concerned about losing control. Compliance with the Incident Command System (ICS) helps to unify disparate organizations involved in emergency response, ensuring interoperability. According to the Department of Homeland Security (2016), emergency response is tiered even though the… Continue Reading...

Port Security Customs and Border Protection

Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated with an objective of preventing illegal drugs, mass destruction weapons and contraband… Continue Reading...

National Security Impact of Immigration Policy

homeland security department incorporated an Immigration and Naturalization Service, thereby institutionalizing migration as an internal security threat. Numerous experts advocate for restrictions in migration policy for defending internal security within the destination country. Therefore, the ideal means to shut out undesirable persons from other countries would be: decreasing the nation’s yearly migrant intake. Immigration and Public Security Akin to migration’s link to terrorism,… Continue Reading...

Critical Infrastructure Security Information Technology

Synopsis Because the majority of critical infrastructure components in the United States are privately owned, compliance with Department of Homeland Security risk assessment methods remains voluntary. Risk assessments of critical infrastructure focus on threat, vulnerability, and consequences, with all types of assessments integral to helping improve resilience and mitigate problems (GAO, 2017). A vulnerability analysis of the nation’s information technology critical infrastructure reveals several points of weakness and security gaps. The Department of Homeland Security (2018) infrastructure survey tool can be used alongside the systems dynamics approach to vulnerability assessment. These tools reveal the inherent strengths of complex, interdependent information technology systems, while also revealing the potential weaknesses in… Continue Reading...

Safety and Spills Prevention

DHS and Plainsville In order to comply with the priorities handed down through Department of Homeland Security (DHS) Grant Programs and state mandates, Plainsville, Colorado, must address the situation of its critical rail line running through its community. The rail line is crucial for industrial use in manufacturing a hazardous material that is not manufactured anywhere else. However, the rail line is two centuries old and in need of repair. To assess the issues and risks at hand, the city has been tasked with bringing a committee of experts together that can share information on a range of issues, including: the integrity of the rail… Continue Reading...

The US Grant Programs for Emergencies

Department of Homeland Security Grants The HSGP (Homeland Security Grant Program) for the fiscal year 2017 contributes significantly to NPS (National Preparedness System) implementation through promoting the creation, delivery and sustenance of key capabilities vital to the achievement of America’s NPG (National Preparedness Goal) geared at improving its security and resilience. The provision of key capabilities necessitates integrated community-wide efforts and not the sole, independent endeavors of a particular governmental level or agency. HSGP’s allowable expenses foster attempts at developing and sustaining key capabilities over the Protection, Prevention, Mitigation, Recovery and Response… Continue Reading...

Counter Terrorism Community Policing and Changes

September 11, local law enforcement like Javier's department became more responsible for participating in and ensuring homeland security. While the role of police in homeland security might seem natural or obvious, diverting the attention and resources of police towards the federal concerns of homeland security can have some detrimental outcomes. One of the most important changes Javier noticed was the breakdown in the community policing model that the department had worked so hard to establish. Focusing more on counterterrorism efforts than on building relationships with community members damages the relationships between police and members of the community in serious ways. Police officers are expected to become… Continue Reading...

National Infrastructure Protection Plan NIPP

NIPP (National Infrastructure Protection Plan) The NIPP was drafted in the year 2006 by the DHS (Department of Homeland Security). The Plan was part of Presidential Directive 7 for Homeland Security and it was developed to boost security, and resilience and to help secure critical infrastructures from security threats. The plan included a thorough risk management guideline and defined the roles and responsibilities of the DHS with regards to CIP (Critical Infrastructure Protection). Included in the guideline were also the roles and responsibilities of the federal government, state governments, local governments, tribal governments, federal agencies, and private actors towards CIP in their jurisdictions. CIP is important for overall… Continue Reading...

Court Process, Judicial Process, and Constitutional Issues

9/11 terror attacks was characterized by enactment of new laws and executive orders that focused on enhancing homeland security. However, these laws and orders have become controversial because they have ceded power to the executive branch and limited people's rights. Some examples of these limitations include restrictions on privacy, limitation of free speech and association rights, and limitation of religious freedom. While these actions were necessary to help prevent another attack, they are inappropriate since they compromise civil rights and checks and balances established in America's democracy. The federal government would have taken less drastic measures through reordering priorities of law enforcement instead of generating fundamental changes… Continue Reading...

Improving Collaboration Between Agencies

relevant and should not be taken lightly. One year following the assaults, the Homeland Security Act of 2002 initiated the central Department of Homeland Security. This led to a ripple effect in numerous regions which developed individual divisions focused on safe keeping the motherland as well as handling crisis. There was complete overhaul in the already existing divisions in order to meet the novel standards (Bush, 2002). Handling crisis is imperative. Federal regions are mandated to address the shift in weather conditions which have led to adverse regular climatic conditions. The 50 regions as well as the entire nation have to contend with… Continue Reading...

The Importance of Communications As a Critical Infrastructure

Published by the Department of Homeland Security (DHS) in 2003, authored by President George W. Bush, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets is the first document of its kind. After September 11 and the creation of the DHS, swift action was taken to synergize national security efforts and interests. The National Strategy redefines the meaning and definition of critical infrastructure and key assets, offering guidance to individual sectors for risk management, risk mitigation, information sharing, and more (Erbschloe, 2004). Moreover, the National Strategy takes into account the diversity… Continue Reading...

Emergency Response Crisis Management and CERT

plan and coordinate resources for effective emergency management. Homeland Security CERT plays an integral role in the maintenance of homeland security objectives. Homeland security refers to the protection of national borders, the promotion of community resilience to withstand crises including natural disasters and terrorist attacks, and the prevention or response to other crises such as cyberattacks. Because so many emergencies are localized, it is critical that local service providers engage with federal agencies that coordinate responses. The Department of Homeland Security (2018) is the presiding federal agency that can provide resources and information to CERT organizations. Business Continuity… Continue Reading...

The Active Shooter Crisis in America

massacre (Fox and Levin 8). Criminal justice agencies and the Department of Homeland Security differentiate active shooters from both mass shooters and domestic terrorists, although these all may share methods and tactics in common. An active shooter is defined as “an individual actively engaged in killing or attempting to kill people in a confined and populated area,” but with no apparent pattern or logic in their means of targeting victims (United States Department of Homeland Security 2). Active shooters are “active” because they will continue to kill as long as they have access to victims, which makes quick responses critical to saving… Continue Reading...

Public Administration Government and Interagency Relationships

for managing those relationships and mandating accountability. The most notable example of mandatory interagency partnerships is in the realm of homeland security. Prior to the creation of the Department of Homeland Security, interagency partnerships existed but tended to be loose and often ineffective (Hagen, 2006). The Department of Homeland Security created a new model of interagency partnership that enhanced the effectiveness and scope of the homeland security enterprise, taking into account multiple disparate stakeholders (Marcella, 2004). Interagency partnerships also flourish in law enforcement and criminal justice, as with the Organized Crime and Drug Enforcement Task Forces (United States Department of Justice, 2017). Rescue, relief, and emergency management also highlights the… Continue Reading...

What is Critical Infrastructure

and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and water filtration plants; national monuments and government facilities; telecommunications and transportation systems; chemical facilities” (“CIKR,” 2009, par.1). Although the majority of CIKR is privately owned, according to DHS, the government still has a vital protective role to ensure it works correctly. Cybersecurity Although the Internet was… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Homeland Security" (2012, May 12) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/homeland-security-111698

Latest MLA Format (8th edition)

Copy Reference
"Homeland Security" 12 May 2012. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/homeland-security-111698>

Latest Chicago Format (16th edition)

Copy Reference
"Homeland Security", 12 May 2012, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/homeland-security-111698