Legislative Evaluation of Homeland Security Act of 2002 Evaluation Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The government’s National Strategy for Homeland Security was enacted in 2002, providing way for the establishment of a new Department of Homeland Security. It was formed mainly to safeguard the states’ infrastructure such as transport, communication and medical facilities. The bill created the department that would be in charge of evaluating the dangers and other catastrophes to the state’s infrastructure.

The suggestion had the new department charged with expansively assessing the susceptibility of America’s vital infrastructure, as well as foodstuff and water arrangements, farming, health structures and disaster services. The bill also sought to address issues of data collection and telecommunications in general, banking and investment, power resources such as electricity, nuclear energy, gasoline and lubricants.

While operating with state and limited administrators, other centralized organizations, and the clandestine subdivision, the proposal had the aimed at assisting the department to come up with suitable measures to care for high-risk targets (Jay, 2002).

Information allocation between civic and secretive units concerning terrorism and susceptibility to critical infrastructures was an essential element of the President’s plan, which was consequently initiated through a suggestion as HR 5005, the Homeland Security Act of 2002. Section 204 of HR 5005 avoided infrastructure susceptibility information from leaking under the sovereignty of Information Act (5 USC § 552).

The bill acknowledged that information given willingly by non-federal units or persons that concerns with infrastructure susceptibility or other exposure to bombing and is or has been in ownership of the subdivision of home defense should not be subordinated to section 552 of title 5, United States Code. This article endeavors to scrutinize the provisions of Homeland Security Act 2002 and tries to evaluate the bill by checking its strengths and weaknesses.

FEMA

The Federal Emergency Management Agency (FEMA) is the centralized organization in charge of harmonizing and distributing respite under the Stafford Act. Before the formation of the Department of Homeland Security, FEMA was a sovereign organization that was accountable unswervingly to the President.

Conversely, the Homeland Security Act of 2002, which formed the Department of Homeland Security and offers an official structure for the agency and actions of the section stirred FEMA into the Department of Homeland Security. In this latest agreement, FEMA persists to manage central tragedy reaction, although it has misplaced its sovereign administrative ability.

FEMA should seek guidance from the Secretary of the Department of Homeland Security and come up verdicts inside the bigger structure of the Department (Paige, 1998)

Provisions of Homeland Security Act of 2002

The bill proscribes whichever fascinated individual, outside the organization from creating, or calculatingly coming up with some ex parte messages pertinent to the qualities of the proceedings to one executive officer. Comparable manacles are applied on the organization officials, who are said to comprise of all members of the organization including the bureau, governmental law adjudicator, or any other worker who is or could sensibly be projected to be caught up in the decisional procedure.

When an indecent ex parte communication crops up, the APA obliges that it be noted on the public information book. It further stipulates that could it be a verbal message, a note abridging the message should be documented. After acknowledgment of an ex parte message deliberately made or intentionally grounded to be made by an individual in contravention to the APA, the organization, executive law referee, or any other worker chairing at the trial may call for the other individual to explain the basis why his argument or concern in the case should not be discharged.

Section 214(a) (1) (B) of the CIIA kept way from secluded decisive infrastructure data from APA exclusions on ex parte messages. Section 214(a) (1) (C) of the CIIA establishes an obvious proscription for cosseted information. Section 214(a)(1)(C) forbids the straight utilization, exclusive of the printed sanction of the data submitter, of secluded vital infrastructural data by such organization (DHS), some other centralized, state, or confined authority, or third agent in every public deed cropping up in centralized or state regulation if presented in excellent trust.

This fortification is restricted to severe communication messages that are freely presented to an enclosed centralized organization [DHS] for application by that bureau concerning the defense of essential infrastructure and secluded structure or other informational reason when escorted by an articulate declaration (Moteff & Marie, 2003).

This apparent constraint does not pertain to authoritarian or enforcement deeds by centralized, state, or confined legislative body, neither does it concern with public events when the message is acquired separately from the DHS. The judges may perhaps as well edge out the submission of evidentiary segregation in cases of awful devotion.

Public interest faction is troubled by the fact that this stipulation is enormous, and would guard proprietors and operatives from legal responsibility under antitrust, tort, duty, human rights, ecological, industry, purchaser fortification, and physical condition and security regulations.

Nevertheless, a centralized body could independently get hold of the vital infrastructure message and put forward to the DHS for its infrastructure defense agenda in the course of the application of self-regulating authorized establishments, and utilize such data in every action (Moteff & Marie, 2003).

The CIIA does not restrain the capability of regimes, units, or third agents to acquire separately significant infrastructural data or to apply important infrastructure message for incomplete rationales.

Part 214(a) (1) (B) of the CIIA states that enclosed data will not be exposed to organization’s regulations or court dogmas vis-à-vis ex-parte infrastructure. The Executive Process Act forms the policies for bureaus to stick on to with deference to ex parte communications in organizational events.

The bill describes ex parte communication as a spoken or printed statement not on the civic documentation with reverence to which preceding rational notice to the entire agencies is not issued. Subdivision 556(e) of the Executive Process Act integrates the standard that official bureau adjudications are to be determined exclusively based on documentation substantiation.

The act states that the record of authentication and evidence, jointly with the entire credentials and needs documented in the schedules, comprise the particular testimony for judgment (Moteff and Marie, 2003). The rationale behind this snobbery documentation standard is to offer justice to the parties to guarantee eloquent contribution. Difficulty to the superiority of documentation happens, once there are ex parte associates – infrastructure.

Section 214(a) (1)(D) of the CIIA rules out application or revelation of vital infrastructural message by US bureaucrats or workers, exclusive of approval, for illegal reasons; and sanctions the exploitation or confession of such information by bureaucrats and workers in expansion of exploration or for exposure to legislature or the universal secretarial agency.

The head of state’s signature to the bill associated with the Homeland Security Act of 2002 specifically tackled this condition. It affirms that the managerial division does not interpret this stipulation to inflict any autonomous or assenting obligation to carve up such information with the legislature or the Comptroller General.

It continues to state that the bill will be interpreted through any approach unswerving with the legitimate establishment of the President to administer the unitary administrative division and to hold back information the confession of which possibly will damage overseas affairs, the public safety, the deliberative procedure of the administration, or the work of the administration’s legitimate responsibility.

Evaluation of the Act

Weaknesses

The Homeland Security Act has been vilified for interfering with the civilian unit agenda identified as useful information that is, bombing Information and hindrance organization. This disapproval is observed to be from the panic that the rebuffing of information may include impediments to public freedom safety such as the right to solitude and blocking civic entrance to information.

The enacted Homeland Security Act aggravates three questions in the United States that is abridged seclusion, augmented regime privacy and reinforced regime fortification for particular welfare. Another issue that has been hoisted with reverence to the illicit punishment stipulation in section 214(f) of the CIIA that concerns an official or member of staff of the United States is the possibility of associates of legislature and their personnel to be dishonestly accountable for the discharge of secluded vital infrastructure information.

The CIIA does not take account of a description of bureaucrat or worker of the United States. Section 214(C) of CIIA forbids with no printed sanction the utilization or revelation of secluded information by any bureaucrat or worker of the United States for illegal reasons except when revelation would be for unlawful trial or examination, to legislature, or to GAO seemingly for reasons of omission.

From the time when it was created, a few years back, the Department of Homeland Security has not up until now hence revealing some cryptogram of weakening. It has dealt with the entire impediments frontally and has reacted to all intimidation and anxiety wittily. This is apparent in the reality that no rebel assault has taken place in the United States since the development of the section.

Conversely, the DHS is still unconscious as to the aims of certain rebel factions, specifically Al-Qaeda. This puts the DHS in a precarious state and obstructs its own goals, and that is thwarting any efforts of radical assaults. It cannot be argued that DHS has clogged all terrorists from contemplating entering the US because that is impossible. However, it can be concluded that the DHS is restraining the probability of a rebel assault as much as it can.

The major limitation affecting all security agencies in the world, DHS included, is the issue of hacking. This problem affects all agencies and other organizations in charge of security worldwide. Hacking is a term used to mean the amalgamation of political campaigning and computer laceration.

The utilization of hacking has been eminent in remonstration actions ever since the Electronic Disturbance Theater (EDT) initiated a sequence of alleged net express events, particularly web page disfigurement and rejection of service assaults not in favor of web sites belonging to the Mexican administration in 1998.

In view of the fact that the bigger remonstration society has exposed dexterities in computer-based associated potentialities for remonstration proceedings in general, and network expresses events specifically, together of which have been rising gradually, many protestors have adopted the system.

Strengths

One of the strongest points of the Department of Homeland Security is its seriousness as to the threat level posed by terrorists. It is also dedicated to ensuring the safety of the citizens of the United States. It takes all necessary measures to achieve its goals.

One of its greatest achievements was on May 10, 2003, when the Department of Homeland Security instigated a full time, complete general exercise in Chicago, tried to quantify, and evaluate the nation’s reaction to a scorn revolutionary attack. This type of action facilitates investigation and verification of standpoint towards crisis vigilance.

This data is imperative if the US needs to triumph over fatalities if an authentic rebel attack was to occur. This approach is referred to as complete tipoff. The TOPOFF actions are a significant ingredient of the state awareness tactic. If the US wishes to enhance its response structure, they initially have to categorize where potencies and limitations subsist.

Policymakers should define and describe clearly the role of TOPOFF. These demanding circumstances enforced the US to estimate their promptness, analyze their interior infrastructure, and strengthen relations. The TOPOFF team yet replicated sharing of information to a conjured medium outlet to experiment the US’ capacity to offer judicious and precise information to the community.

From the time when the DHS was formed, the United States has never come across any radical assail. The airfield defense point has hugely amplified. Fewer refugees are being acceptable to traverse over the boundary; nonetheless, refugees inside the US are benefit from additional constitutional rights. US people are feeling secure day after the other.

The DHS has satisfied numerous objectives and as of now, it has been triumphant. In spite of the potency of the DHS, this does not denote that they are 100% sure that there are nil probabilities of a rebel assault. Or else, all the captives at Guantanamo Bay would be allowed to go liberated, and there could be no fluctuations in the risk stages.

Nevertheless, the rationale behind the confinement of the inmates and the variations in the risk intensities is not as of the limitations of the DHS; it is for the reason of terrorists and their tactics. The DHS has bought to a standstill several of these likely assaults, and it has splintered on rebel monetary system. However, it still cannot be guaranteed that no rebel harassment may happen.

By maintenance of the captive in Guantanamo Bay, the DHS is declining the probability of the happening of such assaults, and that is the degree of its capability to defend the US always.

Conclusion

In summary, the act can be said to have improved the security situation of the state. Terrorists no longer have easy access to governmental infrastructure. The cooperation between private and public agencies has managed to come up with a formula that makes it hard for terrorist actions to go on.

On the other side, a lot has to be done for there to be effective infrastructural protection. The state agencies in charge of security should carry out substantive research and communicate the same to the legislative council for proper amendments to the act.

References

Jay, S. (2002).Speech or Debate Clause Constitutional Immunity: An Overview. New York, NY: CRS Report RL30843.

Moteff, J. & Marie, S. (2003). Critical Infrastructure Information Disclosure and Homeland Security: Issues and Concerns. New York, NY: CRS Report RL31547.

Paige, W. (1998). Whistleblower Protections for Federal Employees. New York, NY: CRS Report 97-787.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 27). Legislative Evaluation of Homeland Security Act of 2002. https://ivypanda.com/essays/legislative-evaluation-of-homeland-security-act-of-2002/

Work Cited

"Legislative Evaluation of Homeland Security Act of 2002." IvyPanda, 27 June 2019, ivypanda.com/essays/legislative-evaluation-of-homeland-security-act-of-2002/.

References

IvyPanda. (2019) 'Legislative Evaluation of Homeland Security Act of 2002'. 27 June.

References

IvyPanda. 2019. "Legislative Evaluation of Homeland Security Act of 2002." June 27, 2019. https://ivypanda.com/essays/legislative-evaluation-of-homeland-security-act-of-2002/.

1. IvyPanda. "Legislative Evaluation of Homeland Security Act of 2002." June 27, 2019. https://ivypanda.com/essays/legislative-evaluation-of-homeland-security-act-of-2002/.


Bibliography


IvyPanda. "Legislative Evaluation of Homeland Security Act of 2002." June 27, 2019. https://ivypanda.com/essays/legislative-evaluation-of-homeland-security-act-of-2002/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1