Monday, May 6, 2019
Homeland Security Advisory System Essay Example | Topics and Well Written Essays - 750 words
motherland guarantor Advisory governance - Essay ExampleThis efficient arranging is used to create structure and context for national discussion regarding threats that oppose the homeland and help in taking proper measures that can carry an appropriate role in protecting the country. This system seeks to facilitate and inform proper decision that identify to various levels of government and to local citizens present at work and home (Loeb, 2007).This powerful system was launched on March 11th 2002, by Homeland Security Presidential Directive 3 as a way to secure the conditions after 11th September 2001. It has the initiative to provide a comprehensive and potent means to disseminate information regarding the risk of terrorist acts to federal, state, and local authorities and to the American people. This was said by tom turkey Ridge, the assistant to the President for Homeland Security on 12th March 2002. However, the role of managing, implementing and developing the system was the duty of the U.S Attorney General (Loeb, 2007).On January 2003, a new department known as Homeland Security (DHS) started administering this system. Now, the decision to announce the occurrence of threat conditions is performed by the Secretary of Homeland Security in consultation with the Assistant to the President for Homeland Security. (Homeland Security Presidential Directive-5)The Homeland Security Advisory System that binds the services various levels of government and other private sectors. In this system, there are five holy terror Conditions that identify the description of the threat by the color they have. Each level of threat has a sequent color which describes the intensity of the expected attack. Each level from highest to lowest, following is the colorsThis proves that the higher the level of meander Conditions is the greater are the chances of terrorist attacks. The terrorist attacks include both the reason why the attack is occurring and the potential
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.