Reorganizing the Army for 21st Century Needs: Simultaneously Addressing Stability and Support Operations and Homeland Security Requirements

2004 ◽  
Author(s):  
Scott Gorske
Author(s):  
Katina Michael ◽  
Amelia Masters

The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and military circles. At the core of advancement are four main positioning technologies: the global positioning system (GPS), second generation (2G) and beyond mobile telephone networks (including wireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). For all positioning technologies, both separately and when combined, it is of primary importance to their continued adoption that the controlling powers have an in-depth understanding of the causality between implementation, usage and flow-on effect. This relies on an alignment of defense strategy, knowledge systems, security requirements and citizen rights within the broader social context. This social context must respond to continuing security breaches, advancements in technology and the ever-changing face of bureaucracy. There is, however, great difficulty in creating an uncompromising foundation for homeland security, which is at all times both void of complexity and suitable to all. Even more difficult, though, is to predict both the events and consequences that will herald from the systems now being created.


Author(s):  
Roy Ladner ◽  
Fred Petry ◽  
Frank McCreedy

In this article we provide an overview of e-government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of Web services and service-oriented architectures to aid in information sharing and reduction of IT costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This article provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Significance Though researchers had identified vulnerabilities in the voting system for years prior to 2016, Russian influencer cybercampaigns during that election highlighted the urgency of federal support for state-led security upgrades. Yet only some states have been willing to receive support and guidance from the Department of Homeland Security (DHS) on this. Impacts Companies supplying electoral voting equipment face rising auditing and security requirements. Disinformation campaigns since 2016 have reduced overall public trust in the integrity of US elections. At the state and county-level, cybersecurity awareness will remain far lower than at the federal level, impeding action.


2020 ◽  
pp. 209-240
Author(s):  
Melissa Ames

The final study presented in this book focuses on one of the most impactful events of the 21st century: the 2016 U.S. Presidential Election, which likely ended as it did in part due to a combination of the cultural fears discussed throughout the previous chapters. For example, the presidential campaign run by Donald Trump played on post-9/11 insecurities about homeland security and employed fear-based, divisive rhetoric about race, gender, class, and sexuality. The acceptance of this rhetoric -- and his ultimate victory -- may be explained by the process of phobic construction highlighted in this text. Chapter 10 analyzes the final months of the election cycle, in particular the televised presidential debates between Trump and Hillary Clinton and the ways in which they stimulated conversation among viewers during the live broadcast and ongoing dialogue and activism beyond it.


2011 ◽  
pp. 1305-1322
Author(s):  
Katina Michael ◽  
Amelia Masters

The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted within homeland security and military circles. At the core of advancement are four main positioning technologies: the global positioning system (GPS), second generation (2G) and beyond mobile telephone networks (including wireless data networks), radio-frequency identification (RFID) and geographic information systems (GIS). For all positioning technologies, both separately and when combined, it is of primary importance to their continued adoption that the controlling powers have an in-depth understanding of the causality between implementation, usage and flow-on effect. This relies on an alignment of defense strategy, knowledge systems, security requirements and citizen rights within the broader social context. This social context must respond to continuing security breaches, advancements in technology and the ever-changing face of bureaucracy. There is, however, great difficulty in creating an uncompromising foundation for homeland security, which is at all times both void of complexity and suitable to all. Even more difficult, though, is to predict both the events and consequences that will herald from the systems now being created.


2016 ◽  
pp. 632-652
Author(s):  
Starlett Michele Martin

The 21st century US can be characterized as a period of globalization, during which countries have become increasingly interconnected. However, since the 9-11 terrorist attacks on US soil—unease about the possibility of subsequent attacks and other transnational crimes has become ever more prevalent. While traditional security agencies, such as the FBI and CIA, have changed since this phenomenon, US police have been forced to assume a greater share of the responsibility as part of a comprehensive homeland-security framework. Consequently, through an in-depth descriptive analysis of transnational crime and the strategies and methods police agencies presently have at their disposal to combat it, one can determine if US police have the tools needed to handle this salient issue. Thus, recommendations can be made of ways to improve the efficacy of US policing agencies in the pursuit of their homeland-security directives, and moreover, methods of implementing these recommendations can be devised.


Sign in / Sign up

Export Citation Format

Share Document