preview

Homeland Security Vs Homeland Defense

Decent Essays

Introduction With the events that happened on September 11, 2001, the American people and all government leadership realized that the U.S. was fight a whole new other type of war. The U.S. has dealt with foreign terrorist networks abroad and the 1993 World Trade Center bombings. With the tragic event of 9/11, it became something of a nightmare because no American in history had the knowledge to deal with this kind of attack. Foreign Terrorist Organizations (FTO) wants nothing more than to destroy America and the threat of another attack is imminent but, when? Every year these FTO’s will evolve and want to use chemical, biological, radiological and nuclear weapons (CBRN). As long as the U.S. is fight the war on terror and other threats against …show more content…

Even if those two parties fall under DHS and DoD their main goal and purpose is to defend America and its citizens. Homeland Defense highest priority for DoD is the defense of the homeland against external threats and foreign aggression. Homeland defense also plays role in national defense. The DoD is responsible for deterring attacks against the U.S., its territories, and possessions (Goss, T. (2006). There are three key concepts which form the foundation of Homeland Security which are: security, resilience, customs and exchange. In turn, these key concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. These missions are enterprise-wide, and not limited to the Department of Homeland Security (Department of Homeland Security, 2016). DHS will prepare its efforts to prevent any terrorist attacks and reduce the America’s liability to terrorism, when damages and recovery are at a minimum. The difference between the two is that DoD has missile defenses and provides support to civil …show more content…

Both parties need to accomplish these objectives with every strategy in protecting the U.S. With having a firm plan that will lead to any issue that both parties are committed to. Critical infrastructure has to have the best analyses and the most modern technology for the best protection. Critical Infrastructure can be protected by assessing the threats and vulnerability. After that, a plan to counter threats and vulnerabilities should be developed (International Journal of Control and Automation, n.d.). There is no such thing as a perfect plan or a perfect world. Just because there are vulnerabilities does mean it can be fixed or brought down to a minimum. These are the best results to ensure Critical Infrastructure Protection from the International Journal of Control and Automation:
• Assess Critical Infrastructure vulnerabilities to cyber or physical

Get Access