9/11 attack was one of the horrifying incidents that have happened in America in which thousands of American citizen has lost their lives. As a result of this the frightened and horrified public of America wanted something to be done on the security check of the nation in terms of these kinds of future attacks (Coleman, 2009). After feeling emotional sentimental of the American citizen, the Bush government ordered a throw-out investigation in order to understand the loophole present in their security at that time and so that corrective action can be taken. Government at that time believed that they are really in need of something on the base of which they can answer to their citizens as a part of the responsibility to handle these terrorist threats. Hence, the American launched a program named under home security.
President of America on 8 October 2001, ordered their White House employees to form an office which will take care of national securities threats (Mabee, 2008). This office was handed over to the first director Governor Tom Ridge and was also backed by full public support to take any kind of action if needed.
After analyzing the environmental risk, the president of America and the whole congress of America proposed a plan to form a national home security department that will handle the issues related to the national threats. There were around 170,000 employees in that department and the budget was maintained around $ 40 billion. This was the world largest US federation in the world which permitted the department to play their games (Fair, 2011).
The government has divided the security in to three segments, one is prevent, react and protect because the government of America believed that the possibility of terrorism attach is not eliminated completely after a lot of efforts and in somehow these radical groups are still successful in motivating people to be part of such activities (Homolar, 2011). The government has formed this department on the base of narratives that if their prevention somehow failed while handling such incidents, they must be ready to reply in a much effective way on this attack so that if they may be any change of hazard, it should be minimized. It can be said that the main objective of this agency is to lower down the living hood of these terror group which are the real enemies of the humanity on the global level and many countries are suffering from their bad effect both developed as well as developing countries.
The standard operating procedure of these policies is to first identify the possible threats and the people who are involved in such activities and then take proper action according to their respected situation.
It is believed that it is the responsibility of the intelligence to prevent the occurrence of any kind of attack. So, these agencies are working pro-actively in order to crack down the hidden agenda of these group because these group usually keep their intentions hidden because of which America had to face huge loss in 9/11 attack.
These agencies started collecting large amount of raw data related after 9/11 attack and try to connect them in sequence to interpret the future possibilities in which the intelligence note down the important communication which has been done or is going on national level in order to form a necessary platform on which it can operate their strategy (Ismail, Singh, Dar and Mackill, 2013). In this operation, the agency or department also takes the help of other security agencies like CIA and FBI and share all the related information with them in case of complex problems. In many cases, it was found that there was ongoing competition between these agencies and hence, the flow of information among them was not proper which has caused lot of damage in such anti-terror missions. Hence the government has created a lot of pressure on these agencies in order to work in coordination for the sake of country love and has motivated to focus more on analytical parts by using high-level software which is operated by most brilliant minds of the world (McDaniel and McLaughlin, 2009). They have motivated to map out high-level sensibility along with huge responsibility to these agencies with the involvement of even defense department if needed.
It has been found out that the person who was the mastermind of this attack was himself studied, lived and traveled in all the part of the country and some were recognized as the suspected figures within the country. This information has truly shaken the whole congress of the America and hence came on the conclusion that for the safety of the nation the citizen has to give up some right which was given under American constitution like right to privacy and has overpowered these government agencies to put any individual or group on surveillance in the case of any doubt in more aggressive form (Ross, 2013). These agencies put close surveillance on every visitor to America, foreign student who came in the United States of America for study purpose and may get influenced by a hidden radical group and some infiltrate groups which can provoke any kind of violence in the nation. In case of need, these agency is capable enough to make every possible use of modern information technology to exploit, detect and even assess any kind of relevant data from both prospects individually as well as group wise (Durac and Cavatorta, 2009). This agency believes that it is better to recognize the threat before it actually starts working on the ground.
The present world is the world of technological advance which results in the form of producing lots of data. As the United States of America is known as one of the advanced technology countries in the form and hence the amount of data produced on a daily base are in large quantity. It has been found out they in the previous time, enter of terrorists has happened on the base of legal US Visa due to various loophole present in that process. But now, US government has tightened there rules with the Visa which has impacted a lot to these terror networks (Avant and Sigelman, 2010). Each visitor is being matched with the profile which has been obtained from the collection of these data. In many case the weapons are being transported by means of commercial routes and so these agencies have bird eyes on the supply chain of every commercial route. But due to globalization, the challenges related to these routes are increasing day by day due to their large volume and to handle this situation government has to increase their security check on all the shipping ports (Park, 2011). Each shipment is scanned with high-level technology and even each vehicle passing from each border are checked through which will help in controlling the flow of traffic. The main objective is to present the entry of weapon which can be used in these activities.
It is believed that illegal entry of people are motivating illegal entry of weapons and it is very difficult to control all the lines of the border to stop these activities and present programs of US are making more complicated for easy entry and in some cases even risky to their lives (Argomaniz, 2009). Presently US government has decided to seal complete US-Mexico border but it is difficult to say in terms of success from these terror threats.
In 9/11 case the attackers have used commercial plan which was beyond the imagination of any country. This has actually given the government an impression that any vehicle which is carrying any kind of fuel in their body can be converted into high-level explosives. Hence the government decided to control their all transport means from security purposes (Lee, Palekar and Qualls, 2011). The government has involves high-level security sensors which actually detects all level of threats from both chemicals as well as biological weapons through their air filter detectors along with manufacturing of high-level weapons which has the capability of filter the air in case of attack by these weapons. Everything cannot be protected but their occurrence can be stopped by focusing on identifying these suspicious activities happening inside the city.
Certain elements on the list of perilous infrastructure have fascinated specific attention for one purpose or another – fears to community water provisions and to power grids, most possibly any extremist attack that deprived of such fundamentals to large statistics of persons would cause enormous dislocations. Singular captivation and anxiety appear to ascribe to situations connecting which has been named “cyber terrorism,” which is a kind of electronic motivated outbreaks on computer systems and infrastructures (Melgar-Quinonez, Nord, Perez-Escamilla, and Segall-Correa, 2008). Defensive the “electronic arrangement” is allocated particular importance in the US policy, on the lands that an effective cyber-attack might “waterfall across subdivisions. There is a various question related to critical worries, but the public discussion does not vintage clear inferences about how susceptible the internet is how big or permanent the belongings of an attack would be. Accountable events in the US administration have pronounced thoughtful worries.
It has been found out that the US government is in need of special weapons which will help them in handling these situations in case of attack in order to avoid any kind of casualty on their side because in various such attacks America has lots their various brave policeman and government was not able to understand how to face relatives of these brave American citizens (Kienscherf, 2011). Hence, they have invested a large amount of financial support in their Weapon research and development to extend their maximum capability and provide full protection to their citizens.
Us government has actually introduced a public health safety programs for their citizen to make them about the symptoms and effect of the chemical and biological attack. They are also offering various training programs in which the public are provided with the detail information in which they can protect themselves from the impact of such attacks (Schweller and Pu, 2011). The government has located great importance on creating the citizen health community more conscious of the terrorist risk, refining its capability to reply to CBW attacks and creation advance arrangements for providing alternative care in the occasion of disastrous violence. This has been a rapid impression of the program of creativities and ambitions that fall below the headline of motherland safeguard. But having an approach or a strategy is only the chief step in creating the United States of America more protected in contradiction to the risk of terrorism.
After analyzing violence situations around the world, US government has implemented to increase their reach beyond their nation in order to secure their nation from any kind of possible threats and in case are capable enough to share this information with their associate country partners, so that an anti-terror environment can be spread all over the globe because the whole world is suffering from this kind of problem (Avey and Desch, 2014).
Conclusion
9/11 attack has focused the American attention towards the difficult of national security. The US Government has replied with an approach that is imposing, wide-ranging, refined, but it has hardly made a commencement in identifying the terrorist danger. Each major statement so far – whether from self-governing commands from CIA agency – has arbitrated that the US government is becoming complex as susceptible nowadays from 9/11 attack. In some portion, it is reflecting that the gauge of the national safety challenge had gone through the application of various improvements. It is also reflecting the supremacy of the difficulties of operative nation protection. Development has been completed, but there will be no surprise when the succeeding big extremist attack happens on American land. It is extensively unspoken that this is motionless conceivable, maybe even probable. It might be possible that the government of US comprehends of the thoughtful complications of forming effective national security assistance to clarify the President’s obsession with an aggressive reply in countries like Iraq and Afghanistan. Many scholars proverb that the finest protection is a decent offense may be predominantly appropriate to the novel fight against this terrorism.
References
Argomaniz, J. (2009) When the EU is the ‘Norm?taker’: The Passenger Name Records Agreement and the EU’s Internalization of US Border Security Norms. European integration, 31(1), pp.119-136.
Avant, D. and Sigelman, L. (2010) Private security and democracy: Lessons from the US in Iraq. Security Studies, 19(2), pp.230-265.
Avey, P.C. and Desch, M.C. (2014) What do policymakers want from us? Results of a survey of current and former senior national security decision makers. International Studies Quarterly, 58(2), pp.227-246.
Coleman, M. (2009) What counts as the politics and practice of security, and where? Devolution and immigrant insecurity after 9/11. Annals of the Association of American Geographers, 99(5), pp.904-913.
Durac, V. and Cavatorta, F. (2009) Strengthening authoritarian rule through democracy promotion? Examining the paradox of the US and EU security strategies: the case of Bin Ali’s Tunisia. British journal of Middle Eastern studies, 36(1), pp.3-19.
Fair, C.C. (2011) Under the shrinking US security umbrella: India’s end game in Afghanistan?. The Washington Quarterly, 34(2), pp.179-192.
Homolar, A. (2011) Rebels without a conscience: The evolution of the rogue states narrative in US security policy. European Journal of International Relations, 17(4), pp.705-727.
Ismail, A.M., Singh, U.S., Singh, S., Dar, M.H. and Mackill, D.J. (2013) The contribution of submergence-tolerant (Sub1) rice varieties to food security in flood-prone rainfed lowland areas in Asia. Field Crops Research, 152, pp.83-93.
Kienscherf, M. (2011) A programme of global pacification: US counterinsurgency doctrine and the biopolitics of human (in) security. Security Dialogue, 42(6), pp.517-535.
Lee, J., Palekar, U.S. and Qualls, W. (2011) Supply chain efficiency and security: Coordination for collaborative investment in technology. European Journal of Operational Research, 210(3), pp.568-578.
Mabee, B. (2008) Re-imagining the Borders of US Security after 9/11: Securitisation, Risk, and the Creation of the Department of Homeland Security. Globalizations, 4(3), pp.385-397.
McDaniel, P. and McLaughlin, S. (2009) Security and privacy challenges in the smart grid. IEEE Security & Privacy, 3, pp.75-77.
Melgar-Quinonez, H.R., Nord, M., Perez-Escamilla, R. and Segall-Correa, A. (2008) Psychometric properties of a modified US-household food security survey module in Campinas, Brazil. European Journal of Clinical Nutrition, 62(5), p.665.
Park, J.J. (2011) The US-led alliances in the Asia-Pacific: hedge against potential threats or an undesirable multilateral security order?. The Pacific Review, 24(2), pp.137-158.
Ross, R.S. (2013) US grand strategy, the rise of China, and US national security strategy for East Asia. Strategic Studies Quarterly, 7(2), pp.20-40.
Schweller, R.L. and Pu, X. (2011) After unipolarity: China’s visions of international order in an era of US decline. International Security, 36(1), pp.41-72.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download