Sunday, August 11, 2019

Homeland Security Advisory System Essay Example | Topics and Well Written Essays - 750 words

Homeland Security Advisory System - Essay Example This efficient system is used to create structure and context for national discussion regarding threats that oppose the homeland and help in taking proper measures that can play an appropriate role in protecting the country. This system seeks to facilitate and inform proper decision that rate to various levels of government and to local citizens present at work and home (Loeb, 2007). This powerful system was launched on March 11th 2002, by Homeland Security Presidential Directive 3 as a way to secure the conditions after 11th September 2001. It has the initiative to provide a â€Å"comprehensive and effective means to disseminate information regarding the risk of terrorist acts to federal, state, and local authorities and to the American people." This was said by Tom Ridge, the assistant to the President for Homeland Security on 12th March 2002. However, the role of managing, implementing and developing the system was the duty of the U.S Attorney General (Loeb, 2007). On January 2003, a new department known as Homeland Security (DHS) started administering this system. Now, the decision to â€Å"announce the occurrence of threat conditions is performed by the Secretary of Homeland Security in consultation with the Assistant to the President for Homeland Security.† (Homeland Security Presidential Directive-5) The Homeland Security Advisory System that binds the services various levels of government and other private sectors. In this system, there are five Threat Conditions that identify the description of the threat by the color they have. Each level of threat has a subsequent color which describes the intensity of the expected attack. Each level; from highest to lowest, following is the colors: This proves that the higher the level of Thread Conditions is the greater are the chances of terrorist attacks. The terrorist attacks include both; the reason why the attack is occurring and the potential

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.