Homeland Security - Edited

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Running Head: HOMELAND SECURITY

Your name

Institution

Course

Date
HOMELAND SECURITY

Introduction

Homeland Security refers to all of the security agencies that operate together as a single

entity to prevent any security mistakes from occurring (Smith, 2005). Following the

catastrophic assault on the Twin Towers in September 2011, this security agency was formed.

Terrorists used planes to blow up the World Trade Center buildings, resulting in a massive

loss of life, and America promised that such an incident would never happen again. Because

prior security units were readily infiltrated by terrorists, the government required something

more impenetrable, and so Homeland Security was created. It addresses all potential hazards

and threats ((LaCrosse, 2005).

Research Question

The Department of Homeland Security was established in 2002. Homeland Security is

made up of 22 security departments that work together to protect the country (Brook & King,

2007: Flynn, 2006). It has total authority to work wherever in the globe and to avoid any

threats to the United States of America. Security of state and interstate borders, customs at

various airports, immigration rules, preventing natural catastrophes, dealing with terrorism,

and crimes linked to cybersecurity are just a few of the tasks entrusted to Homeland Security.

As a result, it is accurate to say that Homeland Security has stretched its wings to cover every

corner of the United States of America. The question that has to be answered is to what

degree may Homeland Security go to restrict individuals' rights and privacy to protect the

country's security?

Hypothesis

The research will utilize 2 hypothesis cases.


HOMELAND SECURITY

Hypothesis 1

When it comes to maintaining security in the country, Homeland Security has been

granted carte blanche. As a result, it is no longer subject to any civil freedoms. The major

articulation of this second theory is based on the seemingly limitless powers granted by

Homeland Security. Because this flexibility allows Homeland Security agents to frisk,

question, and enter anybody at any time, regardless of location, if they are suspected of

engaging in criminal activities. Even medical departments are sometimes obliged to release

information about suspected persons, even if they were initially innocent, following thorough

investigations.

Rationale

The first Hypothesis's rationale is concerned with determining how far the Homeland

Security Services utilize their free-willed capabilities to monitor its suspects through

surveillance. The goal of this investigation is to gather all available information on the sorts

of surveillance technologies used by Homeland Security agencies while questioning

suspected offenders. We'll also look into whether the level of pressure used by these agencies

to elicit information from suspects is within the psychological and physical boundaries of the

human mind and body. This is arguably one of the most essential aspects of Homeland

Security since those conducting interrogations should be aware of the lines between torture,

intimidation, and what constitutes bigotry and hatred while dealing with people who are

being monitored due to suspicion. Several examples of prisoners of war in the Guantanamo

Bay region having been tortured beyond their capacities just to extract information have been

discovered.
HOMELAND SECURITY

However, homeland security can be sued if the techniques employed for interrogation

are deemed to be excessive, even if the goal is to safeguard the country from security

concerns (Brook & King, 2007). Some examples of ordinary individuals migrating to

different nations or states only to avoid active surveillance, even though they are completely

harmless and are simply going about their daily lives. Only because the people of America

are aware of the monitoring systems and violence is one of the ways that they may express

their hate for the system, the limit of tolerance has dramatically decreased and there has been

a significant increase in criminal activity. Depression is also on the rise since most

individuals believe they are always being watched.

Hypothesis 2

According to the law, the Department of Homeland Security does not have the

authority to restrict the United States people's rights and privacy for the sake of maintaining

state security.

Rationale

According to the second hypothesis, Homeland Security has unrestricted powers,

which has resulted in a reduction in the degree of freedom enjoyed by American residents.

But, if this limitless authority were just utilized to deal with criminals, it would be a wise

move; however, this is not the case; instead, this power is being utilized against the average

man. It is used to pry into the privacy of companies or, in certain cases, political parties in

power, to monitor any political maneuvers by a rival party. This severely infringes on the

privacy of all Americans and limits their freedom. The network monitoring system was

another mistake that was worth billions but was ineffective in proportion to the amount of

money spent on it. Larger corporations have also taken legal action against Homeland
HOMELAND SECURITY

Security to eliminate smaller enterprises that deal with government monitoring to eliminate

rivals.

As a result, when homeland security personnel are put under duress, they have little

choice but to comply with these beaurocrats to prevent conflict. This project aims to

investigate and examine the lengths to which the Department of Homeland Security is

prepared to go to undermine the people's freedom. Here, we want to draw a line between

security services and ordinary people's freedom. So that Homeland Security is aware of the

lines that should not be crossed when on the lookout for a suspect. However, when dealing

with persons who pose a national security danger, they should not be prevented if they have

complete proof against them.

Research Design Analysis

We will utilize both qualitative and quantitative analyses to better understand the

research. Some individuals will be included in this analysis so that we can better comprehend

the circumstance. The participants’ written agreement will be acquired, and they will be told

about the study (Smith & Messina, 2004). Interviews with select Homeland Security

personnel will also be conducted to obtain their perspectives on both the hypotheses that have

been developed before as well as the question that is at the heart of our Homeland Security

investigation.

Statistics will be utilized to understand more about the people, their security, and how

they feel about the situation as a whole. There will be a comparison between those who agree

to this system and those who do not. This is critical because homeland security must clearly

define its borders and restrictions so that it can do its duties more effectively. The response of

the general public to Homeland Security will be the dependent variable. The actions that
HOMELAND SECURITY

homeland security takes as an independent variable will be investigated as well (Lepore,

2012).

The data will be gathered through interviews. They will be performed both in-person

and online. The information gathered during the interviews will be split and analyzed. After

the statistics have been evaluated, the mathematical analysis will be performed, which will be

followed by a qualitative examination. Following that, all of the relevant data will be

segregated and gathered. Data will be collected thoroughly during the entire procedure.

Following the start of the analysis, the results will be computed, and a discussion based on

the findings of the analysis and the research findings will be held. Only after the study's

findings have been formulated can confirmation be given as to whether the statement of the

research question is accepted or rejected. In addition, the analysis will be cross-checked

against the results acquired from secondary data sources.

Conclusion

The goal of this research is to determine how well the Department of Homeland

Security uses the authorities that have been granted to it to safeguard the country from

security hazards and catastrophes. This will go a long way toward defining the limits of the

powers that have been granted and how they should be utilized by Homeland Security

(White, 2018). If there is a contradiction between residents' safety and their freedom, steps

must be made to ensure that people of the United States of America may live a life of equality

without feeling like they are being watched. Homeland security must be made aware of the

necessity for clear demarcations as to where they must draw the line since failing to do so

would result in serious harm to residents of America who are going about their daily lives and

are not involved in any illegal activity (Stewart & Vocino, 2013).
HOMELAND SECURITY

References

Brook, D., & King, C. (2007). Civil Service Reform as National Security: The Homeland

Security Act of 2002. Public Administration Review, 67(3), 399-407.

https://doi.org/10.1111/j.1540-6210.2007.00723.x
HOMELAND SECURITY

Flynn, J. (2006). Homeland Security Law and Policy. Journal Of Homeland Security And

Emergency Management, 3(2). https://doi.org/10.2202/1547-7355.1218

LaCrosse, T. (2005). Homeland Security and Homeland Defense: America’s New Paradigm.

Connections: The Quarterly Journal, 04(3), 3-16.

https://doi.org/10.11610/connections.04.3.02

Lepore, B. (2012). Homeland defense. U.S. Govt. Accountability Office.

Smith, N., & Messina, L. (2004). Homeland security. H.W. Wilson Co.

Smith, R. (2005). What Is Homeland Security? Developing a Definition Grounded in the

Curricula. Journal Of Public Affairs Education, 11(3), 233-246.

https://doi.org/10.1080/15236803.2005.12001396

Stewart, K., & Vocino, J. (2013). Homeland Security in Higher Education: The State of

Affairs. Journal Of Public Affairs Education, 19(1), 13-29.

https://doi.org/10.1080/15236803.2013.12001718

White, R. (2018). A Theory of Homeland Security. Journal Of Homeland Security And

Emergency Management, 15(1). https://doi.org/10.1515/jhsem-2017-0059

You might also like