ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

What is the Level of Accountability in US Homeland Security?

Updated on February 10, 2022
Nyamweya profile image

Nyamweya is an award winning journalist attached with a leading media firm in Kenya

Introduction

Homeland security is a United States cabinet department charged with the responsibility of securing the public. This entity has stated missions which include border security, antiterrorism, customs and immigration, disaster management and prevention, as well as cyber-security. The department was established as a response to the attacks on September 11 which shook the American government.

Discussion

There have been discussions as to whether or not the Department of Homeland Security (DHS) had been effective in its mandate. Accordingly, some reports have showcased that DHS has not been effective in fulfilling its missions. A recent federal oversight report (DHS IG OIG 16-130) discovered that despite its achievement, the department has grave shortcomings and various problems (DHS, 2016). This may owe to the fact the agency does not have a formal structure and personnel to fulfill its missions. The report claimed that the agency has management appointees who are inexperienced and as such, aggravated its main weakness which is the lack of experience and expertise in security tradecraft, supply-chain operations, and technology. In essence, the department of homeland security does not harbor adequate means to gather and analyze intelligence. This level of amateurism is what brings about the compromised ability of DHS to make the land and sea ports of entry to America safe.

The report also presented details on the money spent by the agency on spa trips, incompetent strategies, and practices for cyber-security. In addition, it establishes no specific plan for mitigating an Ebola pandemic, and un-trained federal guards in weapon screening. The report goes on to state that based on evidence which it had gathered, the department of homeland security is not executing any among its missions successfully, and several programs started by the agency should be reconsidered since they are ineffective. Among the key findings, one states that DHS spent over 50 billion dollars on counterterrorism programs over the past 11 years, including other initiatives of anti-terrorism, but the agency has nothing to show as a result and cannot even demonstrate if it has made the nation safe and secure as a result.

According to another report published in 2012, (Homeland Security Advisory Council Report, better known as HSACR) every assessment on the DHS top five missions only shows a dreadful litany of incompetence and failure, disinterest and corruption. and this characterizes the DHS as an inefficient and ineffective program and questions its worthiness. Moreover, the report stipulates that the information and intelligence sharing programs of DHS provide little or no value to the American country.

A more precise example is the report which accuses DHS of being lousy at cyber-security. It stresses that the department is a dysfunctional culture providing details of wasted and misspent money, disasters brought about by cyber-security disasters and most importantly a country under the protection of government contractors who are mostly untrained. According to the report, the prevalent weaknesses sported in the information security practices of the federal government portray a substantial vulnerability which adversaries can exploit and create a potential threat to the citizens of America and the national security as a whole. This is troubling as one ponders on this query, ‘How can a department that struggles to maintain its information security protect the whole of the American country?’ The report further reveals that recurrent audits by the inspector general showed that even the employees and officers of the department fail to comply with the policies and federal rules for the cyber-security of the department. The inspector general also discovered that DHS failed to carry out regular reviews on security to ensure its classified systems were secure, up-to-date and safe.

One might have thought that after the snowden incident, classified systems became the top priority for DHs with regards to cyber-security. But the report published by the DHS stewardship shows that this is downright not the case. The report additionally stipulates that the approaches used by DHS in mitigating vulnerability is simply a lost cause. This aligns with the opinions of several InfoSec professionals who stated that, DHS would not protect the American people from cyber-security threats and other sophisticated attacks. This is because of the poor DH’s strategies for cyber-security, particularly because the strategies have primarily focused on mitigation of vulnerability. It should be considered that adversaries have the ability to develop new tools continuously with a possibility of defeating many network defenses. The report advises the DHS to reconsider its current strategy since it only focuses on vulnerability mitigation and as such is ineffective and cannot prevent grave threats of cyber-security. This, according to the report, is one among the many ways the DHS can improve its efficiency and fulfill its five foremost missions

Conclusion

It is logical to conclude that the U.S Department of Security does not have obligatory leadership and proficiency that will safeguard the security of the nation. It is influenced by external agencies, internal operational issues, academics, and interest groups which have no experience and knowledge in carrying out this vital mission. For this and many other reasons, the department of defense is ineffective in executing its mandate of protecting the nation.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)