Friday, January 31, 2020

Major Component Agencies of the Dhs Essay Example for Free

Major Component Agencies of the Dhs Essay This paper will discuss what are the major component agencies of DHS and their primary functions. Major Component Agencies of the DHS Major agencies of the Department of Homeland Security (DHS) are; The Directorate for National Protection and Programs, The Science and Technology Directorate, The Office of Health Affairs, The Federal Emergency Management Agency (FEMA), U. S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), The Office of Investigations, The Office of Detention and Removal Operations, The Federal Protective Service, The Office of Intelligence, The Office of Intelligence and Analysis, The Office of Operations Coordination, The Domestic Nuclear Detection Office, The Transportation Administration (TSA), The Federal Law Enforcement Training Center (FLETC), The Citizenship and Immigration Services, The Coast Guard, and The Secret Service. Their Primary Functions The Directorate for National Protection and Programs has five divisions that work to advance the DHS’s risk-reduction mission. The primary development and research arm of the department belongs to the Science and Technology Directorate. The Office of Health Affairs coordinates all medical activities to ensure appropriate preparation for the response to incidents having medical significance. The Federal Emergency Management Agency (FEMA) manages federal response and recovery efforts following any national incident, administers the National Flood Insurance Program, and prepares the nation for hazards. The CBP prevents terrorists and their weapons from entering the United States. They are responsible for protecting U. S. borders, while simultaneously facilitating the flow of legitimate trade and travel. The largest investigative arm of DHS is ICE. They are responsible for identifying and shutting down vulnerabilities both in the nation’s borders and in economic, infrastructure security, and transportation. The Office of Investigations investigates a wide range of international and domestic activities that violate customs laws and immigration and threatens national security. The department who is ensures the departure from the United States of all illegal aliens through the fair enforcement of the nation’s immigration laws is the Office of Detention and Removal Operations. The Federal Protective Service is responsible for securing, ensuring a safe environment, and policing in which federal agencies can conduct their business at more than 8,800 federal facilities nationwide. Collecting, analyzing, and disseminating strategic and tactical intelligence data belongs to the Office of Intelligence. The Office of Intelligence and Analysis is responsible for using information and intelligence from multiple sources to identify and assess current and future threats to the U. S. The responsibility for monitoring the security of the U. S. on a daily basis and coordinating activities within the department and with governors, law enforcement partners, DHS advisors, and critical infrastructure operators in all fifty states and more than fifty major urban areas nationwide falls under the Office of Operations Coordination. The Domestic Nuclear Detection Office works to enhance the nuclear detection efforts of federal, tribal, states, territorial, and local governments and the private sector and to ensure a coordinated response to such threats. This department protects the nation’s transportation systems. In addition, agents also inspect air carrier operations to the United States, fly air marshal missions, assess security of airports overseas, and training overseas security personnel is TSA. The FLETC provides career–long training to law enforcement professionals to help them fulfill their responsibilities safely and proficiently. The Citizenship and Immigration Services is responsible for the administration of immigration and naturalization adjudication functions and the establishment of immigration service’s policies and priorities. This department is also consider a military department, which protects the public, the environment, and U. S. economic interests in the nation’s ports, along the coast, on international waters, on its waterways, or in any maritime region as required to support national security. Finally, we have the Secret Service who protects the president and other high-level officials and investigates counterfeiting and other financial crimes, identity theft, computer fraud, including financial institution fraud, and computer-based attacks on our nation’s financial, banking, and telecommunications infrastructure. Final Thoughts The Department of Homeland Security was activated in January 2003 from the Homeland Security Act of 2002 to help combat terrorism after the September 11 attacks on the United States. An outline is provided of what happened when the DHS was formed. Our lives in the United States as we knew it, has forever been changed since 9-1-1. We still have a long way to go to become more aware and secure, but it is not impossible. There are still many loopholes to tackle, red tape to cut, and the lack of proper equipment and training which still needs to be addressed on a continuous basis. On March 1, 2003, the DHS absorbed the Immigration and Naturalization Service and assumed its duties. By doing this, it divided the enforcement and services functions into two separate and new agencies: ICE and Citizenship and Immigration Services. The investigative divisions and intelligence gathering units of the INS and Customs Service were merged forming Homeland Security Investigations. Additionally, the border enforcement functions of the INS, including the U.S. Border Patrol, the U.S. Customs Service, and the Animal and Plant Health Inspection Service were consolidated into a new agency under DHS: U.S. Customs and Border Protection (Creation of DHS, n.d.). References Creation-department-homeland-security, n.d. Retrieved on 1215/2012 from http://www.dhs.gov/creation-department-homeland-security Peak, K. J., 2012. Policing America challenges and best practices. Retrieved on 12/15/2012 from Chapter Two, Pages 44-48.

Thursday, January 23, 2020

philisophical paper -- essays research papers

As Christians today we are faced with many ethical issues living in our society. Every time we turn on the TV to watch the news, pick up a newspaper and read the headlines, or read a magazine about world issues we can see situations happening in this world that challenge our morals and ethics. It is our duty as Christians to know what we believe and where we stand so we can back up our beliefs and try to interact with this world as morally correct as possible. There are some situations that we have no control over that appear ethically wrong to us and there is not much we can do if anything at all. At the same time there are things that we can do to try and reach people in some situations. It is our job to know the difference and stand up where we can but not force our own morals and ethical principles on everyone we come in contact with.   Ã‚  Ã‚  Ã‚  Ã‚  One issue that is very prevalent in the world today and all through out the history or the earth is the issue or war and combatancy. Now as Christians we know the bible says, â€Å"Thou shall not kill,† but is this issue really that simple? If we just took that stance and said that as Christians we shouldn’t go to war then our country and the world we live in would suffer. Let me get something straight right now before I go into this topic, I do not like war; I think it is an ugly thing, and I wish there would not be any more wars on this earth for the rest of its existence. But the fact of the matter is that there is war, there always was war and there will always be war until the second coming of Jesus Christ. War has become a way of life, it was not God’s original plan, but because of the entrance of sin into our universe, war was created. The first war we know of was a war in heaven between Satan and his angles and Jesus and His angels. Al l throughout the old testament we see the Israelites, God’s people, lead by God, going to war to obtain the land that God had promised to them. War is real and has become a necessity.   Ã‚  Ã‚  Ã‚  Ã‚  Just because war is here does not mean that it is an ok thing to do. War came about as a result of sin; with the beginning of sin there was the beginning of war. War has become a necessary means to get by in a sinful world. To protect the peace and the free way of living that we enjoy here in America, sometimes, we must go to war. As members of socie... ...o many people told them when they were growing up that they shouldn’t do it. You see, it’s not so much that they like it but they were just told not to do these things, so they did them. We have to inform people and let them make their own decisions; we cannot just force our opinions on them, and that never works. This is the same for all of our views as Christians. It does not just stop with health but it extends into our entire way of life. We must live our lives as examples for all to see.   Ã‚  Ã‚  Ã‚  Ã‚  As you see in all these issues we, as Christians, must take stands on what we believe is right, but we should not force our opinions and beliefs on others. This is what everything boils down to. God gave us the gift of choice, and this is something he gave everyone. As Christians we are called to try to lead people to God and his work not to force them. If they want to come to him that is a personal decision, all we can do is help them along, not push them. The best way to help someone is to show him or her by example. If we set good examples for other people in all the ways mentioned in this paper then we can begin to reach other people and help them to change.

Wednesday, January 15, 2020

Computer Dynamics

I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network.Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Assumptions: The two buildings with Ethernet are wired with at least Cat5e cabling and all wiring is run back to a central closet on each floor to a data switch.To connect the floors in the building a fiber cable is run between the closets to connect them to each other, a chassis based switch with a router module installed, and the local service providers WAN. Rewire the building that has Token Ring to at least Cat5e cabling, Token Ring will not be able to withstand the network load or the anticipated network traffic growth. Install a chassis based switch with router modules installed and fiber ports to connect this building to the newly designed backbone.Chassis switches are robust and scalable; they will survive the demands of the network for the next 3 years. Connect the three building via the chassis switches using fiber from building to building and a dedicated point to point circuit to the service provider’s WAN. This will allo w the three buildings to share resources across the network, communicate with each other through the network, and share applications across the network. Install a DHCP server to issue IP addresses to the computers on the company’s networks so they will recognize that they are a part of the same network.

Tuesday, January 7, 2020

Interview Analysis - 988 Words

Marion: Yes. We see a lot of different things from different clients. Just like Amazon. Amazon wants to get into the messenger business as well. But we’ll see what happens. That would be huge for them. Might knock off some of the smaller ones, but†¦ Interviewer: (34:11) Were there different options that you looked into? I’m just trying to understand. This is used to be something very industry-specific so maybe there are not so many businesses out there. Marion: There’s not very many. There are quite a few. But they’re not thousands of them. There may be a couple hundred out there. Interviewer: (34:38) That’s still a lot. Marion: Yes. Interviewer: (34:39) Because then among those few hundreds, you still--- Marion: You still have to narrow it†¦show more content†¦Marion: It’s not a party. It’s so on a different level. Interviewer: (36:14) I get that. To what extent are you involved in researching vendors and vetting initial solutions? Marion: Whatever I research, and I just do it randomly or when he says, â€Å"I need you to do this† or â€Å"I need you to do that.† He usually requests for me to do it. I’ll just start hacking away, looking into different software systems for our type of business. Then I’ll make phone calls and I’ll go and visit. They’ll ask us what we’re using and what we’re looking for. I’ll come back with all the information. We’ll sit around, talk about it. And because I use it more than he does, it’s like, â€Å"Which one do you think is best?† I may say, â€Å"This system is better because this is what we need, and this is what we need.† And put it all out in a presentation to him so that he can see it for himself. But it’s still the networking events that they have. Interviewer: (37:19) What kind of information are you looking for when putting together that presentation? Which is almost like pitch to him. Marion: Mm-hmm. (Agreement.) That’s all it is. Interviewer: (37:28) You’re pitching it to him. What’s the kind of information that you require to put together that page, that pitching information? Where do you retrieve it from? I would assume most of it is from the vendors’ website? Marion: Most of it is from the vendors’ website. A lot of it comes from visitingShow MoreRelatedInterview, Process Analysis, And Analysis1526 Words   |  7 PagesI have conducted an interview with a client and in my paper I will explain my experience and how I used the skills we have gone over in class. In the paper I will have a description of my client, my assessment, a summary of the interview, process analysis, and analysis of professional use of self. Not only will I assess the interviewer but myself as well. I will include all the interviewing skills I used and the ones I didn’t. Also, whether or not I used a particular skill or technique in the rightRead MoreCritical Incident Analysis : Placement Interview1898 Words   |  8 PagesCritical Incident Analysis - Placement Interview Current stress profile and stress management strategies I tend to usually maintain a healthy stress profile due to implementing decent, effective and timely management strategies. Whatever is going on in my life, I always seek to do things immediately, or stick to a schedule where deadlines are met at least a week in advance. As a reflector, I cannot just churn a piece of work out, or say the first thing that pops into my head as the result is oftenRead MoreThe Role Of Interview Data Research And Discuss The Key Characteristics Of The Processes Of Data Collection And Analysis When Using1669 Words   |  7 PagesCritically evaluate the role of interview data in qualitative research and discuss the key characteristics of the processes of data collection and analysis when using interviews as main data source. Introduction Interview is a research-based communication that widely used in qualitative research. It collects research data through the conversation and interaction between interviewers and interviewees. This kind of conversation differs from daily one. Kahn and Cannell (1957, p. 149) described interviewingRead MoreInterview Analysis887 Words   |  4 PagesInterview Analysis Jessica Kennedy, Jennifer Torres, Rena Philpot Spalding University Interview Analysis For the interview section of the group project, I decided to interview a twenty-five year old woman who resides in the San Francisco bay area in California. Choosing to have her personal identity remain anonymous, the interviewee has granted us permission to refer to her as the alias Mary. Mary is currently married to a thirty year old man and has one nine year old son. Surprisingly,Read MoreInterview Analysis1505 Words   |  7 Pagesinjure people. One of the articles in the book that we read, â€Å"The uses of Poverty†, talks about how poverty serves important functions in our society and that unless we find a way to get these functions elsewhere, it won’t disappear . After the interview with Geoff, I think that the article hit the nail on the head. There needs to be a class of people that are so desparate for work that they will work inconsistent hours. The restaurant benefits from this because it can match the amount they pay inRead MoreA Thematic Analysis Of An Interview Essay1495 Words   |  6 PagesResults A thematic analysis of an interview was used to help students develop an understanding of the role of an RC. This role is dynamic and challenging; it offers great opportunities to grow and work in an academic team based environment that fosters constant learning. Often RCs play a significant role in the process of bringing a project from conception to completion which requires a variety of qualifications and leadership qualities. An inductive approach to this process, beginning with dataRead MoreAnalysis Of The Interview Process705 Words   |  3 Pagesunder law and that any security/fingerprint records were properly completed and did not contain any derogatory information that would result in postponing the interview and/or require my completing a detailed report/analysis outlining the issue of concern or suspected fraud and referral for a resolution or further investigation. Interview individuals in a one a one setting or if applicable with the aid of an interpreter to review application/petition for accuracy addressing any events which mayRead MoreInterview Analysis : Today I Interview881 Words   |  4 PagesToday I interview Josiah. Josiah is an 8 year old African American boy in the third grade at King Elementary School. Josiah who also goes by the nickname Jojo is tall for his age; he stands about 4ft 5in and weighs close to 70 pounds. Josiah is a very happy young man throughout our interview he smiles and laughs frequently. His energy level is also very high during our interview I had to redirect his attention and allow him to take breaks to stretch. Josiah was very outgoing and open to talk withRead MoreInterview Skill Analysis904 Words   |  4 Pagesâ€Å"The Challenge of Love† Some of the biggest challenges in relationships are rooted between the push and pull of give and take. People tend to enter into relationships to gain something: they re trying to find someone who s going to make them feel good. In reality, the only way love is true is if the relationship comes from a place of giving. For some love is primarily taking, for some love is primarily giving and for some it is more evenly a matter of give take. A person driven byRead MoreFamily Interview Analysis1218 Words   |  5 PagesThe couple that I interview was a Mexican married couple name Maria and Juan. Maria is 78 years old and a retired nurse, and Juan is 80 years old and a retired Veteran. Maria completed her Bachelor Degree in Nursing at Indiana University Bloomington graduating at 23 years old, and Juan stated that he join the army after completing high school. Maria stated that she didn’t have a lot of racial/discrimination experience, however, Juan stated that he experience some discrimination in the service