Sunday, June 16, 2019

Homeland Security Advisory System Essay Example | Topics and Well Written Essays - 750 words

homeland Security Advisory System - Essay ExampleThis efficient system is used to fabricate structure and context for national discussion regarding menaces that oppose the homeland and help in taking proper measures that can play an appropriate role in protecting the country. This system seeks to facilitate and inform proper decision that rate to various levels of presidential term and to local citizens present at work and home (Loeb, 2007).This stringy system was launched on March 11th 2002, by Homeland Security Presidential Directive 3 as a way to secure the conditions afterward 11th September 2001. It has the initiative to provide a comprehensive and effective means to disseminate information regarding the risk of terrorist acts to federal, state, and local authorities and to the American people. This was tell by Tom Ridge, the assistant to the President for Homeland Security on 12th March 2002. However, the role of managing, implementing and developing the system was the d uty of the U.S Attorney worldwide (Loeb, 2007).On January 2003, a new department known as Homeland Security (DHS) started administering this system. Now, the decision to announce the occurrence of threat conditions is performed by the Secretary of Homeland Security in consultation with the Assistant to the President for Homeland Security. (Homeland Security Presidential Directive-5)The Homeland Security Advisory System that binds the services various levels of government and other private sectors. In this system, there are five Threat Conditions that identify the description of the threat by the color they have. Each level of threat has a subsequent color which describes the intensity of the expected attack. Each level from highest to lowest, following is the colorsThis proves that the higher the level of Thread Conditions is the greater are the chances of terrorist attacks. The terrorist attacks let in both the reason why the attack is occurring and the potential

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.