Homeland Security Aspects Analysis Essay (Article)

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

Authored by Kemp (2012), ‘Homeland Security: Past, Present, and Future’ is an informative journal article that discusses the developments that have been witnessed in the Department of Homeland Security (DHS), which was formed in 2002 to help in the fight against terrorism after the 9/11 events. It analyzes the developments in three major categories, namely the National Warning Systems, Citizen Assistance and Support Groups, and Homeland Security of the Future. Kemp (2012) reveals how the Homeland Security Advisory System (HSAS) and the National Terrorism Advisory System (NTAS) have facilitated communication among government stakeholders and citizens on how to counter terrorism. The journal also analyzes some of the citizen assistance support groups that have developed over the years. The goal is to sow how the public can benefit from such organizations. Kemp (2012) asserts that the Homeland Security is a sector that focuses on structuring buildings to blend with the environment, enhancing cyber security, and encouraging public participation in the fight against terrorism.

Key Findings of Journal Article

Kemp (2012) categorizes the main issues in the journal into three categories, namely the national warning systems, citizen assistance and support groups, and the future of Homeland Security. Under national warning systems, the journal identifies two systems: HSAS and NTAS. The reader realizes the role of HSAS, which was developed to help in communicating suspected terrorist assaults to the government and the public. It would also inform the state of the degree of the threat and/or changes in the condition of the attack using color codes. The article also presents the channel of communication of various issues. For instance, high-degree cases were communicated to the citizens while those of low condition were reported to the relevant agencies for further investigation. Moreover, the HSAS was replaced by NTAS to improve efficiency. The new system informs the authorities and the public about the looming terrorist in addition to the efforts that are made to avert. As the reader realizes, this plan gives citizens the opportunity to not only report suspicious activities but also suggest a means of quelling terrorist assaults.

On the issue of citizen assistance and support, the journal concisely discusses some of the organizations that work closely with DHS among others in fighting the extremism. The eight organizations include Medical Reserve Corps (MRC), Citizen Corps (CC), Community Emergency Response Team (CERT), Fire Corps (FC), Volunteers in Police Services (VIPS), USAonWatch (USAOW), Corporation for National and Community Services (CNCS), and the IfraGard (IG). According to Kemp (2012), it is imperative for citizens to familiarize themselves with these groups. Besides, they should know their locations such that they can easily contact them for assistance whenever a need arises. Currently, the journal acknowledges the increased participation from the various levels of the government on issues of terrorism. The state is also striving to ensure that buildings blend with the community to minimize chances of being targeted.

Summary of Recommendations

Due to the increased level of involvement of public officials in matters about extremism, Kemp (2012) proposes the need to recognize accessible resources and services when emergencies arise. He also recommends that the construction of future public buildings should discourage the creation of underground car parking to limit the case of car bomb attacks. Moreover, terrorists have migrated into the US such that most of the assaults are not perpetrated by foreigners but rather residents of the US. It follows that there should be increased vigilance even within the borders. Besides, citizens should assist the government in identifying residents who intend to harm the country. Cyber security should be enhanced to deter terrorists from accessing information that they can use to assault the US. Cyber hackers can be controlled through the creation of duplicate systems and continuous supervision of computer usage.

Analysis of the Article as it applies to the Criminal Justice Policy Issue

This article is a criminal justice policy tool since it addresses the issue of enhancing social control, preventing and controlling criminal activities, or reprimanding perpetrators. Terrorism is a crime that not only poses a threat to the US but also the world. It has led to massive deaths such as those that were witnessed in the 9/11 attack. Thus, terrorism is an issue that criminal justice scholars and policymakers should study and develop the most pertinent mitigating policies. DHS was formed after 9/11 assault to prevent and control terrorist activities in the US. Kemp’s (2012) article analyzes not only the progress that has been made by the DHS but also the future developments. He also points out the role that citizens can play to counter terrorism. Hence, Kemp’s (2012) article is useful to criminal justice policymakers, especially when developing policies for enhancing homeland security.

Criminal Justice Policy Matters that arise from the establishment of the DHS

Penn (2013) confirms that the formation of the DHS has triggered several criminal justice policy issues, including the issue of how to handle international terrorist activities using the domestic criminal justice processes. Furthermore, the arrest and trial of suspects of terrorism have raised human rights issues. Criminal justice policymakers continue to develop strategies that can ensure that they reprimand extremists without violating their rights. Furthermore, terrorism is largely associated with radical Islamism. Indeed, the 9/11 attack was perpetrated by radical Muslims via the Al-Qaeda group. Subsequently, it caused unwarranted suspicions and arrest of Muslims. Therefore, criminal justice policies should examine how the existing stereotypes can be eliminated even as the fight against terrorism continues. The DHS has also caused the need to shift from the conventional methods of policing to intelligence-led policing techniques that consider the complexity of the terrorists’ network.

Reference List

Kemp, R. (2012). Homeland Security in America: Past, Present, and Future. World Future Review, 1(1), 28-33.

Penn, E. (2013). Homeland Security and Criminal Justice: Five Years after 9/11. New York, NY: Routledge.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, April 16). Homeland Security Aspects Analysis. https://ivypanda.com/essays/homeland-security-aspects-analysis/

Work Cited

"Homeland Security Aspects Analysis." IvyPanda, 16 Apr. 2022, ivypanda.com/essays/homeland-security-aspects-analysis/.

References

IvyPanda. (2022) 'Homeland Security Aspects Analysis'. 16 April.

References

IvyPanda. 2022. "Homeland Security Aspects Analysis." April 16, 2022. https://ivypanda.com/essays/homeland-security-aspects-analysis/.

1. IvyPanda. "Homeland Security Aspects Analysis." April 16, 2022. https://ivypanda.com/essays/homeland-security-aspects-analysis/.


Bibliography


IvyPanda. "Homeland Security Aspects Analysis." April 16, 2022. https://ivypanda.com/essays/homeland-security-aspects-analysis/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1