<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog &#8211; HLS.Today</title>
	<atom:link href="https://hls.today/topic/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://hls.today</link>
	<description>Homeland Security, Public Safety, Cyber and Intelligence News and Information</description>
	<lastBuildDate>Thu, 13 Oct 2022 11:09:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://hls.today/wp-content/uploads/2023/03/cropped-hlt.today-favicon--32x32.png</url>
	<title>Blog &#8211; HLS.Today</title>
	<link>https://hls.today</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Which Counter-Drone System is used by the US Army?</title>
		<link>https://hls.today/blog/hls-today-which-counter-drone-system-is-used-by-the-us-army/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 13 Oct 2022 07:57:22 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3530</guid>

					<description><![CDATA[HLS.Today &#8211; The United States Department of Defense coordinates and supervises all federal agencies and functions for its national security and armed forces. The US armed forces consist of six service branches; The Army, Marine Corps, Navy, Air Force, Space Force, and Coast Guard. The military forces led by the Joint Counter Small Unmanned Aerial [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">HLS.Today &#8211; The United States Department of Defense coordinates and supervises all federal agencies and functions for its national security and armed forces. The US armed forces consist of six service branches; The Army, Marine Corps, Navy, Air Force, Space Force, and Coast Guard. The military forces led by the Joint Counter Small Unmanned Aerial Systems Office (JCO) have been tasked to deploy long-term budgets, plans and measures to mitigate and protect its assets from unmanned aircraft systems and unmanned aerial vehicle attacks.</span></p>
<p><span style="font-weight: 400;">The targeted attacks from small UAS against military bases, facilities and installations pose a major threat to ground forces nationally and internationally. The goal is to protect the three operating environments, Homeland, Host nations, and Contingency locations. The most recent attacks brought to light in the mainstream media and online social media are from attacks in war zones like Syria and Iraq targeting US military forces. Much to be learned from the current use of UAS and C-UAS in the Russia-Ukraine war.</span></p>
<p><span style="font-weight: 400;">These headline news stories indicate a substantial increase in small drone attacks and their efficiency and abilities to reach their targets and cause damage to military infrastructures successfully. To name a few, the enemy uses such drones for intelligence gathering, engaging ground forces, and investigating bomb damage assessment.</span></p>
<p><span style="font-weight: 400;">The UAS sophistication of enemy forces grows rapidly and increasingly able to reach ground forces and breach installations. The following counter-drone systems have been chosen by the army forces to detect, track, identify, and destroy enemy UAS.</span></p>
<p><span style="font-weight: 400;">The DoD, the DOT&amp;E (Director, Operational Test &amp; Evaluation), in collaboration with the Combatant Commands, Service representatives, and the JDAT (Joint Deployable Analysis Team), assessed all C-sUAS (counter small unmanned aircraft systems) and approved three main categories of C-sUAS listed below.</span></p>
<p>&nbsp;</p>
<table>
<tbody>
<tr>
<td><b>C-sUAS Category</b></td>
<td><b>Detection Methods</b></td>
<td><b>Defeat Methods</b></td>
<td><b>Service</b></td>
</tr>
<tr>
<td><b>Fixed or Semi-Fixed Systems</b></td>
<td><span style="font-weight: 400;">RF, Radar, Camera, EO/IR</span></td>
<td><span style="font-weight: 400;">RF, GPS, Ballistic round</span></td>
<td><span style="font-weight: 400;">Army, Air Force, Marine Corps</span></td>
</tr>
<tr>
<td><b>Mounted or Mobile Systems</b></td>
<td><span style="font-weight: 400;">RF, Radar, Camera, EO/IR</span></td>
<td><span style="font-weight: 400;">RF, GPS, UAS</span></td>
<td><span style="font-weight: 400;">Army, Marine Corps</span></td>
</tr>
<tr>
<td><b>Handheld or Soldier-Worn Systems</b></td>
<td><span style="font-weight: 400;">RF, Visual</span></td>
<td><span style="font-weight: 400;">RF, GPS</span></td>
<td><span style="font-weight: 400;">Army, Navy</span></td>
</tr>
</tbody>
</table>
<p><i><span style="font-weight: 400;">Source: </span></i><a href="https://www.dote.osd.mil/Portals/97/pub/reports/FY2020/army/2020csuas.pdf?ver=6crsxi39hSu391uJVwa9wA%3D%3D" target="_blank" rel="noopener"><i><span style="font-weight: 400;">dote.osd.mil</span></i></a></p>
<p>&nbsp;</p>
<p><b>Process</b></p>
<p><span style="font-weight: 400;">The C-sUAS category table indicates as well the various methods of detection and defeating threatening drones. They are designed to detect, track, identify, defeat, and disable small unmanned aircraft systems (sUAS). Considering only single and multiple UAS threats from Group 1 type of off-the-shelf sUAS at under 20 pounds. Radars, radio frequency scanners, and electro-optical and infrared cameras are the most common detection methods. The most common way to disable communication of a malicious drone is by jamming the RF control and video link back to the drone’s operator. Jamming or spoofing the drone’s GNSS GPS coordinates. Disabling the UAS can be done by laser, projectile or in-flight interception.</span></p>
<p>&nbsp;</p>
<p><b>Assessment</b></p>
<p><span style="font-weight: 400;">Ground forces engaging in a C-UAS mission will detect, track and identify the proximity of a UAS and provide the command and control with relevant information to take action and complete the mission to reduce the threat or neutralise the danger.</span></p>
<p><span style="font-weight: 400;">Fixed or semi-fixed systems are large defense systems in a military base environment and are mostly used as an additional tool to an overall facility defense strategy.</span></p>
<p><span style="font-weight: 400;">Mounted or Mobile Systems are easily deployed and adaptable to specific environments. Such a platform can be positioned at will when and where ground forces need it.</span></p>
<p><span style="font-weight: 400;">Handheld or Soldier-Worn Systems are used for short-range missions independently or as part of a larger fixed-site system.</span></p>
<p><b>Objective</b></p>
<p><span style="font-weight: 400;">The US Army&#8217;s strategic objectives require all departments to work together to achieve an overall plan to provide the tools, training and capacity to handle any UAS threats in all three operating environments.</span></p>
<p><span style="font-weight: 400;">Empower all forces through practical training and deployment to protect all personnel, assets, and facilities. Partner with solution providers to develop internal processes to securely execute assigned missions and counter enemy attempts to disrupt our objectives. Increase allies&#8217; relationships and partners to protect the nation’s interest.</span></p>
<p><b>Budget</b></p>
<p><span style="font-weight: 400;">In May 2022, the US Congressional research service published the yearly budget of the Department of Defense, which plans to spend at least $668 million on counter-UAS (C-UAS) research and development and about $78 million on C-UAS procurement.</span></p>
<p><span style="font-weight: 400;">The fiscal year 2021 allocated $33.1 million and in 2022 $34.7 million for test centers to provide cUAS capabilities to detect, track, identify and collect data on hostile UAS. Command, Control, Communications, and Computers Intelligence, Surveillance and Reconnaissance facilities support and data management tools.</span></p>
<p><b>Conclusion</b></p>
<p><span style="font-weight: 400;">The DoD has empowered the Army to continuously develop and deploy counter-UAS capabilities. The integration of high-power microwaves is one of the planned implementations in the counter-drone swarm force. The Army-led Joint Counter Small Unmanned Aircraft Office (JCO) is creating a ‘low-collateral effects interceptor’ to face counter-sUAS systems. A prototype will be available from the third quarter of 2023. The Army in coordination with the Air Force are together committed to reach laser capabilities of 100 kW and reach up to 250-300 kW. These tools are of a vital importance given the recent events affecting the military forces nationally and internationally. Current testing, research and development on various innovations shows a promising future in terms of tools efficiency and accuracy. Improving current technologies and emphasizing on emerging technologies are of the essence.</span></p>
<p><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">HLS.Today Source: </span><a href="https://hls.today/"><span style="font-weight: 400;">HLS.Today</span></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Border Security?</title>
		<link>https://hls.today/blog/hls-today-what-is-border-security/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Thu, 13 Oct 2022 07:39:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3522</guid>

					<description><![CDATA[HLS.Today &#8211; Border security and arms trafficking Effective border security and timely information-sharing at the national, regional and international level are key in preventing the movement of terrorists and terrorist groups and to the effective implementation of counter-terrorism measures pursuant to Security Council resolution 1373 (2001) and other relevant Council resolutions. Border security is the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">HLS.Today &#8211; </span><b>Border security and arms trafficking</b></p>
<p><span style="font-weight: 400;">Effective border security and timely information-sharing at the national, regional and international level are key in preventing the movement of terrorists and terrorist groups and to the effective implementation of counter-terrorism measures pursuant to Security Council resolution 1373 (2001) and other relevant Council resolutions. Border security is the first line of defence against the illegal cross-border movement of terrorists, including foreign terrorist fighters (FTFs), goods and cargo.</span></p>
<p><span style="font-weight: 400;">Maintaining secure air, land and maritime borders is a challenge faced by all Member States. In their efforts to protect their air borders, many States struggle to ensure basic aviation-security measures, including the screening of goods and the cross-checking of travellers against national and international counter-terrorism watch lists and databases. This requires financial and human resources, equipment, specific regulations, and specialist skills, as well as intra-State and inter-State cooperation. Security Council resolution 2309 (2016) was the first resolution to focus specifically on terrorist threats to civil aviation. It highlights a number of steps which should be prioritized by Member States in order to strengthen their implementation of security-related International Civil Aviation Organization (ICAO) Standards and Recommended Practices (SARPs), including forging better coordination among their related domestic departments and agencies. In 2017, the Council adopted its resolution 2396, in which it welcomed ICAO’s approval of the Global Aviation Security Plan (GASeP).</span></p>
<p><span style="font-weight: 400;">Land borders can be very lengthy and porous and thus difficult to monitor. Border security includes controls on the movement of people and goods across borders, as well as the prevention of unlawful interference in maritime navigation and international cargo movement. Maintaining secure maritime borders and policing sea and coastal areas requires a high level of technical capacity and resources in order to effectively patrol vast marine spaces and maintain a presence at physical borders and checkpoints. Special measures to enhance maritime security are also set forth in the International Ship and Port Facility Security (ISPS) Code, which is a mandatory instrument for the contracting parties to the 1974 Safety of Life at Sea (SOLAS) Convention. The aim of the ISPS Code is to ensure that the applicable ocean-going vessels and port facilities of International Maritime Organization (IMO) member States are implementing the highest possible standards of security, according to a system of survey, verification, and control.</span></p>
<p><b>Border security is a top priority for governments worldwide</b></p>
<p><span style="font-weight: 400;">As it enables them to protect their country, citizens, residents and third-country visitors. Whether at land, air or sea borders, legal border crossing should happen with ease, while illegal crossings need to be prevented. IDEMIA provides an interoperable, fully scalable suite of products and services that help governments design their border control solution. Our biometric technologies identify with certainty every person crossing the border and help officers quickly determine if a person should be allowed into the country or not. We currently serve more than 30 border control agencies worldwide.</span></p>
<p><b>Person-centric border security management</b></p>
<p><span style="font-weight: 400;">IDEMIA’s border security management systems are no longer based on a document-centric approach, but rather focus on a person-centric approach. Putting the traveler at the center, allows border guards to make decisions based on the complete traveler profile. Crucial to this is the use of biometric technology, which can accurately identify an individual in mere seconds, guaranteeing a high level of security without increasing processing time.</span></p>
<p><b>Secure, automated border crossing points</b></p>
<p><span style="font-weight: 400;">At border crossing points, travelers should feel secure, while experiencing a fast and convenient process. IDEMIA’s walk-through, touchless, at-a-distance and non-intrusive biometric systems permit fast, highly reliable and frictionless identity checks.</span></p>
<p><span style="font-weight: 400;">For identity checks to be 100% undisputable, the quality of the data captured, the reliability of the equipment and the quality of the algorithms has to be optimal. It is essential for the border security equipment to be adapted to the infrastructure, environment and population (including group and family processing) where it is deployed. In addition to self-service solutions like eGates or kiosks, border guard-attended counters remain necessary. With IDEMIA’s automated border security solutions, border guards can focus on preventing illegitimate border crossings. They can also help bona fide travelers who may need assistance to complete the necessary identity checks.</span></p>
<p>&nbsp;</p>
<p><b>International Organization for Migration (IOM)</b></p>
<p><span style="font-weight: 400;">As the leading intergovernmental organization in the field of migration, the International Organization for Migration (IOM) is increasingly called upon by Member States to assist in addressing complex migration and border management challenges in order to maintain the delicate balance between the facilitation of cross-border movements, while upholding border security and protecting migrants’ rights.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">IOM provides technical assistance and capacity building interventions to help States respond to and mitigate threats at their borders. IOM assists agencies working on border security to improve their institutional and human resource capacities, while enhancing cooperation at the intra-service, inter-agency and international levels to increase information-sharing and streamlining of operations.</span></p>
<p><b>Border Security</b></p>
<p><span style="font-weight: 400;">Protecting our borders from the illegal movement of weapons, drugs, contraband, and people, while promoting lawful entry and exit, is essential to homeland security, economic prosperity, and national sovereignty.</span></p>
<p><span style="font-weight: 400;">America shares 7,000 miles of land border with Canada and Mexico, as well as rivers, lakes and coastal waters around the country. These borders are important economic gateways that account for trillions of dollars in trade and travel each year. They are also home to some of our nation’s largest — and safest — cities and communities.</span></p>
<p><span style="font-weight: 400;">A top priority for DHS is to keep terrorists and their weapons from entering the U.S. while welcoming all legitimate travelers and commerce. DHS Officers and Agents enforce all applicable U.S. laws, including against illegal immigration, narcotics smuggling, and illegal importation. DHS deploys highly trained law enforcement personnel who apprehend more than 1,000 individuals each day for suspected violations of U.S. laws at and between our ports of entry.</span></p>
<p><b>Border Control</b></p>
<p><span style="font-weight: 400;">Border control refers to measures taken by governments to monitor and regulate the movement of people, animals, and goods across land, air, and maritime borders. While border control is typically associated with international borders, it also encompasses controls imposed on internal borders within a single state.</span></p>
<p><span style="font-weight: 400;">Border control measures serve a variety of purposes, ranging from enforcing customs, sanitary and phytosanitary, or biosecurity regulations to restricting migration. While some borders (including most states&#8217; internal borders and international borders within the Schengen Area) are open and completely unguarded, others (including the vast majority of borders between countries as well as some internal borders) are subject to some degree of control and may be crossed legally only at designated checkpoints. Border controls in the 21st century are tightly intertwined with intricate systems of travel documents, visas, and increasingly complex policies that vary between countries.</span></p>
<p><span style="font-weight: 400;">HLS.Today Source: </span><a href="https://www.un.org/" target="_blank" rel="noopener"><span style="font-weight: 400;">UN.ORG</span></a><span style="font-weight: 400;">  </span><a href="https://www.iom.int/" target="_blank" rel="noopener"><span style="font-weight: 400;">IOM.INT</span></a><span style="font-weight: 400;">  </span><a href="https://www.dhs.gov/" target="_blank" rel="noopener"><span style="font-weight: 400;">DHS.GOV</span></a><span style="font-weight: 400;">  </span><a href="https://en.wikipedia.org/" target="_blank" rel="noopener"><span style="font-weight: 400;">WIKI.ORG</span></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Difference Between FEMA and Homeland Security?</title>
		<link>https://hls.today/blog/hls-today-what-is-the-difference-between-fema-and-homeland-security/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Wed, 12 Oct 2022 13:36:41 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3423</guid>

					<description><![CDATA[FEMA is a federal agency within the U.S Department of Homeland Security (DHS). The FEMA administrator reports directly to the DHS Secretary. The administrator also has a direct line of access to the U.S. President during periods of disaster response. FEMA is comprised of: Headquarters in Washington, D.C. where the Office of the Administrator and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">FEMA is a federal agency within the U.S Department of Homeland Security (DHS). The FEMA administrator reports directly to the DHS Secretary. The administrator also has a direct line of access to the U.S. President during periods of disaster response.</span></p>
<p><span style="font-weight: 400;">FEMA is comprised of:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Headquarters in Washington, D.C. where the Office of the Administrator and various program offices are located.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ten regional offices that work directly with states, territories and tribes.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Field offices that manage disaster response and recovery in disaster locations.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Various warehouses and staging areas throughout the country.</span></li>
</ul>
<p><span style="font-weight: 400;">The Federal Emergency Management Agency (FEMA) employs more than 20,000 people nationwide. Headquartered in Washington, D.C., we have 10 regional offices located across the country. We leverage a tremendous capacity to coordinate within the federal government to make sure America is equipped to prepare for and respond to disasters.</span></p>
<a href="https://hls.today/wp-content/uploads/2022/10/HLS.Today-publication-one_english_2019.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">HLS.Today publication-one_english_2019</a>
<p><b>Mission, Values and History</b></p>
<p><b>Our Mission</b></p>
<p><span style="font-weight: 400;">FEMA’s mission is helping people before, during and after disasters, and our core values and goals help us achieve it.</span></p>
<p><b>Strategic Plan</b></p>
<p><span style="font-weight: 400;">The goals and objectives laid out in the 2022-2026 Strategic Plan will help ensure success for our agency, the emergency management community, and those we serve. The Plan outlines three bold, ambitious goals to meet this challenge:</span></p>
<p>&nbsp;</p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Instill equity as a foundation of emergency management</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lead whole of community in climate resilience</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Promote and sustain a ready FEMA and prepared nation</span></li>
</ul>
<p><b>Core Values</b></p>
<p><span style="font-weight: 400;">The core values that guide our agency can be found in our capstone doctrine, “We Are FEMA”. Helps us understand our role in the emergency management community and gives our agency direction in how we conduct ourselves each day.</span></p>
<p>&nbsp;</p>
<p><strong>History of FEMA</strong></p>
<p><span style="font-weight: 400;">FEMA was officially created in 1979 through an executive order by President Jimmy Carter. Our history can be traced as far back as 1803. </span><span style="font-weight: 400;">On March 1, 2003, FEMA became part of the Department of Homeland Security.</span></p>
<p>&nbsp;</p>
<a href="https://hls.today/wp-content/uploads/2022/10/HLS.Today-fema_2022-2026-strategic-plan.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="top" data-toolbar-fixed="on">HLS.Today fema_2022-2026-strategic-plan</a>
<p>&nbsp;</p>
<p><iframe title="Investing in the Future: A Review of the Fiscal Year 2023 Budget Request for FEMA" width="800" height="450" src="https://www.youtube.com/embed/NVtXrLzIPME?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><iframe title="FEMA: Building a Workforce Prepared and Ready to Respond Part 2" width="800" height="450" src="https://www.youtube.com/embed/_dBXEMDObf8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">HLS.Today Source: </span><a href="https://www.fema.gov/" target="_blank" rel="noopener"><span style="font-weight: 400;">FEMA.GOV</span></a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What does Homeland Security do?</title>
		<link>https://hls.today/blog/hls-today-what-does-homeland-security-do/</link>
		
		<dc:creator><![CDATA[HLS.Today]]></dc:creator>
		<pubDate>Wed, 12 Oct 2022 13:15:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://hls.today/?p=3414</guid>

					<description><![CDATA[What Does DHS Do? &#8211; DHS the Department of Homeland Security helps American citizens by: Helping When Disaster Strikes The Department of Homeland Security (DHS) is responsible for preparing for disasters and responding to disasters when and if they happen. Whether it is the Federal Emergency Management Agency (FEMA), the U.S. Coast Guard, or Customs [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>What Does DHS Do? &#8211; DHS the Department of Homeland Security helps American citizens by:</p>
<p><strong>Helping When Disaster Strikes</strong></p>
<p><img decoding="async" src="https://www.dhs.gov/sites/default/files/styles/large_card/public/2022-02/22_0211-kids-corner-helping-disaster.png?h=73306683&amp;itok=7gM51nXP" alt="Warning sign" data-wp-editing="1" /></p>
<p>The Department of Homeland Security (DHS) is responsible for preparing for disasters and responding to disasters when and if they happen. Whether it is the Federal Emergency Management Agency (FEMA), the U.S. Coast Guard, or Customs and Border Protection, DHS makes sure that communities across the country have what they need to prepare for and respond to emergencies of all kinds.</p>
<p>Whether it’s a hurricane, an earthquake, a flood, or a terrorist attack—when an emergency happens DHS is there, working side-by-side with local leaders and residents to help communities respond and recover.</p>
<p><strong>Help Communities Plan and Prepare</strong><br />
Imagine a world where a terrorist attack or natural disaster causes little damage, no deaths, and only a few injuries. This is the future DHS is aiming for. How are they doing it? By helping communities make smart decisions now that will help stop or reduce damage from future emergencies.</p>
<p><strong>Respond During Emergencies Search and Rescue</strong><br />
When the going gets tough, DHS is always there. When Hurricane Katrina devastated New Orleans in 2005 and caused lots of Americans to be trapped by rising water, DHS was there to help. Using Coast Guard helicopters and boats, hundreds of people were rescued from roof tops or other places they used trying to escape the water. No matter what or where the emergency is, when disaster strikes, DHS will be there to help save lives.</p>
<p><strong>Provide Support &#8211; Food, Shelter, and Money</strong><br />
A big disaster, such as a hurricane, might leave hundreds or even thousands of people without a house to live in or food to eat. DHS to the rescue! DHS works with state and local governments and other relief agencies like the American Red Cross and The Salvation Army to provide food and help people find places to live. DHS also gives out millions of dollars to help people fix or rebuild their damaged houses.</p>
<p>&nbsp;</p>
<p><iframe title="We Are DHS" width="800" height="450" src="https://www.youtube.com/embed/0KRJcSu750A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><strong>Protecting Our Economy</strong></p>
<p><img decoding="async" src="https://www.dhs.gov/sites/default/files/styles/large_card/public/2022-02/22_0211-kids-corner-protecting-economy.png?h=73306683&amp;itok=MOLxal_4" alt="Dollar sign" /></p>
<p>The economy is made up of buyers and sellers and includes all the things that we make in our factories and sell to other countries, and the things we buy from other countries. It also includes things we buy from and sell to each other, like trucks and trains that move stuff from factories to stores, farms that grow the food we eat, and boats and planes that take things we make to other countries. The economy includes jobs we have and money we have in the bank. Everything we make, or buy, or sell, or do, is part of the economy. One of the Department of Homeland Security’s (DHS) biggest jobs is to protect this country’s economy. Here are some of the ways it does that.</p>
<p><strong>Enforce Our Trade Laws</strong><br />
Trade laws help make sure that everybody plays by the rules when it comes to buying and selling things. Some businesses might try to sell fake products, or try not to pay the taxes they owe, or maybe steal some business secrets. DHS checks the things (called goods) coming into and going out of the U.S. to make sure they are safe and ensure that businesses follow the rules.</p>
<p><strong>Guard Our Transportation System</strong><br />
The economy depends on the transportation system—the planes, trains, boats, cars, trucks, subways, and other things—that move people and the things we buy and sell around. DHS works with other government agencies to protect the train stations, airports, bridges, ports, and highways to make sure the economy keeps moving.</p>
<p><strong>Patrol Our Rivers, Lakes, and Oceans</strong><br />
Lots of goods move aboard ships and big flat-bottomed boats, called barges. The U.S. Coast Guard is the part of DHS that keeps our waterways safe and open for business. The Coast Guard patrols our rivers, lakes, and oceans with small boats, big ships, planes, and helicopters. They guard our coasts to make sure nobody tries to sneak drugs, other bad things, or people into our country. The Coast Guard takes care of light houses, buoys, and other navigation devices. They use icebreakers to keep frozen waterways open. DHS rescues people from sinking boats or natural disasters and enforces laws on the waters near the United States. The Coast Guard also protects fish, manatees, whales, and other marine life from polluters, illegal fishing, and other threats.</p>
<p>&nbsp;</p>
<p><strong>Protecting U.S. Borders</strong></p>
<p><img decoding="async" src="https://www.dhs.gov/sites/default/files/styles/large_card/public/2022-02/22_0211-kids-corner-protecting-us-border.png?h=73306683&amp;itok=6yn-WJNz" alt="Southwest U.S. border" /></p>
<p>The Department of Homeland Security (DHS) protects our country’s borders and manages the flow of people and products into and out of the United States. Here are some of the ways they do this.</p>
<p><strong>Protect and Manage Air, Land, and Water Borders</strong><br />
DHS guards our land borders with Canada and Mexico, and patrols our coasts including the Atlantic, Pacific, and Arctic oceans, as well as the Gulf of Mexico. They also guard our ‘borders in the air’ at each airport where planes from foreign countries land. Whether it’s a Customs and Border Patrol agent on horseback, a Coast Guard member on a boat, or a Transportation Safety Administration employee at an airport, DHS employees are working to protect our borders.</p>
<p><strong>Work Around the Globe to Secure the Nation</strong><br />
While its agents patrol the land border and shoreline, other teams of DHS employees are working to stop criminals and illegal activity before reaching the United States. DHS partners with other countries and international law enforcement organizations to identify, research, and restrict criminals who live outside of the United States and try to smuggle drugs, people, or conduct other illegal activities within the United States.</p>
<p><strong>Enforce U.S. Immigration Laws</strong><br />
DHS employees enforce the law, including immigration laws, to make sure that only U.S. citizens and visitors with permission live in the United States. They make sure that travelers who are visiting here go home when they are supposed to, and they make sure that people who aren’t supposed to be here are safely returned to their country.</p>
<p><strong>Manages Immigration Benefits for New Citizens</strong><br />
DHS works hard to make sure people from other countries who want to come to the United States follow the right steps to live in or visit the United States legally. If immigrants and visitors follow the correct process, DHS helps to make sure that they have the same rights and benefits as the rest of us.</p>
<p>&nbsp;</p>
<p><strong>Securing Cyberspace and Critical Infrastructure</strong></p>
<p><img decoding="async" src="https://www.dhs.gov/sites/default/files/styles/large_card/public/2022-02/22_0211-kids-corner-cybersecurity.png?h=73306683&amp;itok=Z7xuVDXU" alt="Laptop" /></p>
<p>Computers are everywhere in modern life (in case you forgot, you’re using one now.) Computers are used to control what’s called ‘Critical Infrastructure’ – a fancy way of saying ‘important things,’ like our water supply and our electricity. Computers and the networks that connect them are sometimes called ‘cyberspace,’ and cyberspace contains lots of information that criminals would like to steal if they could. Protecting cyberspace is called ‘cybersecurity,’ and the Department of Homeland Security (DHS) has got it covered!</p>
<p>CISA, which stands for the Cybersecurity and Infrastructure Security Agency, is in charge of protecting the United States from attacks on our important, computer-connected things—our critical infrastructure. Here are some of the ways DHS protects our computers and the information they hold.</p>
<p><strong>Protect the Government’s Computer Networks</strong><br />
The U.S. Government is big, and so are the computer networks that it uses. These networks store important information about laws and government programs, and even secret information about special government operations. It’s the duty of DHS to protect government computer networks from cybercriminals who want to steal, erase, or corrupt the information stored on them.</p>
<p><strong>Strengthen the Security of Critical Infrastructure</strong><br />
Nuclear power plants, water treatment facilities, and cell phone and Internet service providers all operate powerful equipment that is connected to large computer networks. DHS works with these businesses to show them how to make their networks and equipment more secure.</p>
<p><strong>Study the Latest Technology for Risks</strong><br />
DHS is constantly studying and testing the latest technology to try to find out if that technology has any weaknesses that criminals might use to attack us or steal from us, and then try to fix those problems before anything happens. They work with the best scientists and experts in both government and business to try to keep our networks and information safe.</p>
<p>&nbsp;</p>
<p><iframe title="Why We Serve: A Conversation with the Women who Lead DHS" width="800" height="450" src="https://www.youtube.com/embed/oKfftx72YZo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">HLS.Today Source: </span><a href="https://www.dhs.gov/" target="_blank" rel="noopener"><span style="font-weight: 400;">DHS.GOV</span></a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
