scispace - formally typeset
Search or ask a question

Showing papers on "Homeland security published in 2011"


Book
25 Oct 2011
TL;DR: This comprehensive handbook offers gaps of available localization books presenting in-depth coverage from fundamentals of coordinates to advanced application examples.
Abstract: Radio systems capable of localization have emerging applications in homeland security, law enforcement, emergency response, defense command and control, multi-robot coordination and vehicle-to-vehicle and vehicle-to-pedestrian collision avoidance. In fact, high resolution localization is vital for many applications, including: traffic alert, emergency services, e.g., indoor localization for firefighters, and battlefield command and control. These systems promise to dramatically reduce society's vulnerabilities to catastrophic events and improve its quality of of life.While work this important area is progressing, limited resources are available to support graduate students and researchers in this important area. Specifically, a limited number of books has been published in this area covering selected subjects. This comprehensive handbook offers gaps of available localization books presenting in-depth coverage from fundamentals of coordinates to advanced application examples.

647 citations


Journal Article
TL;DR: This article presents the current state of the art and related research activities in the area of UAS communication, and focuses on the civilian concepts of operations (CONOPS) for UAV, in particular for small-scale UAV.
Abstract: IntroductionAs a result of advances in communication, computation, sensor and energy storage technologies, as well as carbon fiber-reinforced plastic materials, micro unmanned aerial vehicles (UAV) are available at affordable prices. On this basis many new application areas, such as the in-depth reconnaissance and surveillance of major incidents, will be possible. Uncontrolled emissions of liquid or gaseous contaminants in cases of volcanic eruptions, large fires, industrial incidents, or terrorist attacks can be analyzed by utilizing UAV (Figure 1). Hence, the use of cognitive Unmanned Aerial Systems (UAS) for distributing mobile sensors in incident areas is in general a significant value added for remote sensing, reconnaissance, surveillance, and communication purposes.1Figure 1: Deployment Scenario: Chemical Plume Detection with an Autonomous Micro UAV Mesh Network.In the near future police departments, fire brigades and other homeland security organizations will have access to medium- and small-size UAV and will integrate them in their work flow. The use of non-military frequencies and civil communication technologies gains in importance for purposes of safety and security missions, since the frequency pool is limited and nearly exhausted. In particular, regionally organized public authorities and small rescue organizations like fire brigades often have insufficient access to frequencies and expensive communication equipment. Thus, using civil mobile communication systems is often the only effective workaround for homeland security organizations.This is also one of the major issues for wireless communication in the area of unmanned aerial systems (UAS). Besides flight regulation, wireless communication is an important aspect of UAS as telemetry information (navigation, control, guidance) and sensor data usually have to be transmitted to a mission control center (MCC) in nearly real-time. Today, there is no viable alternative for this type of transmission besides using civil mobile communication networks. Unfortunately, there is no foreseeable solution in terms of frequency assignment for UAS. For efficient sensor coverage of large industrial and incident areas, fast and flexible strategies for collecting sensor data through an autonomous, reliably connected UAV need to be developed. In this article we focus on the civilian concepts of operations (CONOPS) for UAV, in particular for small-scale UAV. Viable concepts on the system level for leveraging public wireless communication networks for UAV-based cognitive remote sensing are presented with respect to both existing constraints and user requirements.The article is structured as follows: we first present the current state of the art and related research activities in the area of UAS communication. Civilian concepts of operations (CONOPS) for purposes of homeland security are discussed in the next section. Subsequent sections address the requirements, concepts and solutions for Air-to-Air (A2A), Air-to-Ground (A2G), and UAS-backend communication. On this basis we then show a methodology for agent-based UAV-mobility for areas with insufficient communication. The article ends suggestions for future research.Related Work and ProjectsSeveral research investigations have been done in the area of UAS. However, UAS communication aspects mostly address proprietary communication systems and usually do not consider public wireless infrastructures since these systems have been mostly deployed by military organizations in the past. Hence, we identify a demand for more in-depth contributions for UAS communication by means of public wireless networks.Tiwari and others have studied the placement planning problem of an airborne network.2 They offer a toolbox to optimize the ground coverage while maintaining a certain degree of reliability and connectivity. By introducing practical scenarios for deployment, the interaction between communication design and mobility planning is shown. …

189 citations


Book
01 Oct 2011
TL;DR: In this paper, the authors explore human smuggling in several forms and regions, globally examining its deep historic, social, economic, and cultural roots and its broad political consequences, and reflect on the moral economy of human smuggling and trafficking, the increasing percentage of the world's asylum seekers who escape political violence only by being smuggled, and the implications of human smugglers in a warming world.
Abstract: Ten years ago the topic of human smuggling and trafficking was relatively new for academic researchers, though the practice itself is very old. Since the first edition of this volume was published, much has changed globally, directly impacting the phenomenon of human smuggling. Migrant smuggling and human trafficking are now more entrenched than ever in many regions, with efforts to combat them both largely unsuccessful and often counterproductive. This book explores human smuggling in several forms and regions, globally examining its deep historic, social, economic, and cultural roots and its broad political consequences. Contributors to the updated and expanded edition consider the trends and events of the past several years, especially in light of developments after 9/11 and the creation of the U.S. Department of Homeland Security. They also reflect on the moral economy of human smuggling and trafficking, the increasing percentage of the world's asylum seekers who escape political violence only by being smuggled, and the implications of human smuggling in a warming world.

184 citations


Journal ArticleDOI
TL;DR: The authors argue that homeland security provides a preeminent example of the challenges of developing policy regimes that focus policymaking on a common goal across diverse subsystems All the ingredients for fashioning a powerful regime were in place after the terrorist attacks of September 2001, a common purpose, engaged stakeholders, and institutional redesign But for a variety of reasons that they discuss, the results are far from cohesive.
Abstract: This research addresses the strength of the homeland security policy regime that was constructed after the terrorist attacks of September 2001 We argue that homeland security provides a preeminent example of the challenges of developing policy regimes that focus policymaking on a common goal across diverse subsystems All the ingredients for fashioning a powerful regime were in place after the terrorist attacks of September 2001—a common purpose, engaged stakeholders, and institutional redesign But for a variety of reasons that we discuss, the results are far from cohesive The lessons we draw are more general ones regarding factors that influence the strength of boundary-spanning policy regimes

94 citations


Journal ArticleDOI
TL;DR: The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks.
Abstract: One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks.

90 citations


Journal Article
TL;DR: The cumulative increase in expenditures on U.S. domestic homeland security over the decade since 9/11 exceeds one trillion dollars as discussed by the authors and it is clearly time to examine these massive expenditures applying risk assessment and cost-benefit approaches that have been standard for decades.
Abstract: The cumulative increase in expenditures on U.S. domestic homeland security over the decade since 9/11 exceeds one trillion dollars. It is clearly time to examine these massive expenditures applying risk assessment and cost-benefit approaches that have been standard for decades. Thus far, officials do not seem to have done so and have engaged in various forms of probability neglect by focusing on worst case scenarios; adding, rather than multiplying, the probabilities; assessing relative, rather than absolute, risk; and inflating terrorist capacities and the importance of potential terrorist targets. We find that enhanced expenditures have been excessive. To be deemed cost-effective in analyses that substantially bias the consideration t oward t he o pposite conclusion, the security measures would have to deter, prevent, foil, or protect each year against 1,667 otherwise successful attacks that each inflicted some $100 million in damage (more than four per day) or 167 attacks inflicting $1 billion in damage (nearly one every two days). This is in the range of destruction of what might have happened had the Times-Square bomber of 2010 been successful. Although there are emotional and political pressures on the terrorism issue, this does not relieve politicians a nd b ureaucrats o f t he fundamental responsibility of informing the public of the limited risk that terrorism presents, of seeking to expend funds wisely, and of bearing in mind opportunity costs. Moreover, political concerns may be overwrought: restrained reaction has often proved to be entirely acceptable politically. And avoiding overreaction is by far the most cost-effective counterterrorism measure.

89 citations


Book
07 Oct 2011
TL;DR: The cumulative increase in expenditures on US domestic homeland security over the decade since 9/11 exceeds one trillion dollars as mentioned in this paper and it is clearly time to examine these massive expenditures applying risk assessment and cost-benefit approaches that have been standard for decades.
Abstract: The cumulative increase in expenditures on US domestic homeland security over the decade since 9/11 exceeds one trillion dollars. It is clearly time to examine these massive expenditures applying risk assessment and cost-benefit approaches that have been standard for decades. Thus far, officials do not seem to have done so and have engaged in various forms of probability neglect by focusing on worst case scenarios; adding, rather than multiplying, the probabilities; assessing relative, rather than absolute, risk; and inflating terrorist capacities and the importance of potential terrorist targets. We find that enhanced expenditures have been excessive: to be deemed cost-effective in analyses that substantially bias the consideration toward the opposite conclusion, they would have to deter, prevent, foil, or protect against 1,667 otherwise successful Times-Square type attacks per year, or more than four per day. Although there are emotional and political pressures on the terrorism issue, this does not relieve politicians and bureaucrats of the fundamental responsibility of informing the public of the limited risk that terrorism presents and of seeking to expend funds wisely. Moreover, political concerns may be over-wrought: restrained reaction has often proved to be entirely acceptable politically.

85 citations


Book
01 Sep 2011
TL;DR: In this article, the authors discuss how Punitive Immigration Policies Negatively Affect Citizens, Families, and Communities and the Immigration Industrial Complex: Who Profits from Immigration Policies Destined to Fail.
Abstract: Preface and Acknowledgments Introduction How Punitive Immigration Policies Negatively Affect Citizens, Families, and Communities Chapter 1 Roots of Immigration to the United States Chapter 2 The Department of Homeland Security and the Immigration Enforcement Regime of the Twenty-First Century Chapter 3 Racism and the Consequences of U.S. Immigration Policy Chapter 4 The Impossible Choice: Family versus Citizenship in U.S. Immigration Policies Chapter 5 The Immigration Industrial Complex: Who Profits from Immigration Policies Destined to Fail? Conclusion Immigration Policy and Human Rights Notes Bibliography Index About the Author

84 citations


01 Jan 2011
TL;DR: The second edition of Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet.
Abstract: Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. The second edition goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet. It also includes a Forward by Michael Chertoff (former Secretary of Homeland Security) and several guest essays, including one by Melissa Hathaway, former senior advisor to the Director of National Intelligence and Cyber Coordination Executive. Get an in-depth look at hot topics including: * The role of social networks in fomenting revolution in the Middle East and Northern Africa * The Kremlin's strategy to invest heavily in social networks (including Facebook) and how it benefits the Russian government * How the U.S. Cyber Command and equivalent commands are being stood up in other countries * The rise of Anonymous with analysis of its anti-structure and operational style or tempo * Stuxnet and its predecessors, and what they reveal about the inherent weaknesses in critical infrastructure * The Intellectual Property (IP) war, and how it has become the primary focus of state-sponsored cyber operations

83 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a compendium of disaster resilience in the face of disasters due to natural causes, human negligence or mischief, as well as with the terrorist threat that occupies so much of the political and public agenda.
Abstract: Whowould buy this work,which is no comfortable evening reading and is priced at over $1,250? It may be that the price will keep this away from libraries that are too easily available to the general public, and this may be no bad thing. For sure, this remarkable compendium needs to be accessible to CEOs of large organizations, municipal emergency planners, police authorities, the military, and indeed any organization concerned with community resilience in the face of disasters due to natural causes, human negligence or mischief, as well as with the terrorist threat that occupies so much of the political and public agenda. Its relevance is marked by the publication dates of its contributions, which are very recent, most after 2008. Managers should issue a “read this and letme have your comments and action recommendations”directive to consider specific parts of theHandbook.Price should be no deterrent to purchase – it is goldwith the price of phosphor bronze!

83 citations


Journal ArticleDOI
TL;DR: This article found that there has been little emphasis on curricular goals in the U.S. of the transnational and global application of homeland security strategies and operations and that the lack of explicit academic programs in this field in that continent was a major barrier to the development of curricular outcomes and competencies for homeland security education.
Abstract: It is vital that U.S. academic institutions pay heed to the important global challenges that HS academics and practitioners must face. This article finds in an overview of the development of prescriptions for curricular outcomes and competencies for homeland security education in the U.S. that there has been little emphasis on curricular goals in the U.S. of the transnational and global application of homeland security strategies and operations. Transatlantic links in homeland security education between U.S. universities and their counterparts in Europe will be hampered by the virtual lack of explicit academic programs in this field in that continent. An examination of program goals and curricular offerings in U.S. post-baccalaureate programs indicates a modest attempt to provide students some grounding in transnational and global applications of homeland security strategies and operations.

Journal ArticleDOI
Lauren Martin1
TL;DR: In this article, the T. Don Hutto Family Residential Facility, a former medium-security prison operated by the Corrections Corporation of America, was investigated for violating children's rights.
Abstract: In May 2006, the US Department of Homeland Security (DHS) began detaining noncitizen families at the T. Don Hutto Family Residential Facility, a former medium-security prison operated by the Corrections Corporation of America. In April 2007, a group of lawyers sued DHS, arguing that Hutto's conditions violated children's rights. This article first situates family detention in relation to two relatively separate literatures – immigration geopolitics and children's rights – and legal precedent. Second, it shows how noncitizen children are framed more as ‘child-objects’ in immigration law than agential, liberal subjects. Immigration law figures adults, however, as criminalized migrant-subjects, ineligible for the due process on which liberal legal regimes are based. The article then analyzes how the judge balanced ‘irreparable harm’ to detained children, the ‘public interest’, and US Immigration and Customs Enforcement's (ICE) discretion to detain noncitizens. Relying upon ‘geostrategic discourses’ of extern...

Journal ArticleDOI
TL;DR: In this article, the authors infer utility functions that reflect the level of risk averseness of regulatory agencies when adopting new safety measures, such as investing $75 billion per year of the homeland security budget to avert terrorist attacks in the USA.
Abstract: Governments and their regulatory agencies normally exhibit risk-neutral attitudes in their decision-making. However, for low probability-high consequence events many decision-makers tend to be risk-averse because of the catastrophic or dire nature of the hazard or event. The degree of risk averseness can be described by utility theory. This paper will infer utility functions that reflect the level of risk averseness of regulatory agencies when adopting new safety measures - such as investing $75 billion per year of the homeland security budget to avert terrorist attacks in the USA. The utility analysis considers threat probability, risk reduction caused by regulatory action, cost of regulatory action, and losses. The expected utilities using an identical risk-averse utility function for: 1 no enhanced security expenditure 2 regulatory action associated with $75 billion of enhanced homeland security expenditure are compared and made equal to each other by modifying the risk-averse utility function. This means that both policy options are equally preferable so if the decision-maker is more risk-averse than suggested by the risk-averse utility function then regulatory action is preferable. It will be shown that the level of risk averseness needed to justify current expenditures for homeland security is considerable.

Journal ArticleDOI
TL;DR: In 2011, Roberts and Mark J. as mentioned in this paper published a book "Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions," edited by Dale L. June (Boca Raton, FL: CRC Press, 2011).
Abstract: This Book Review is brought to you for free and open access by the USF Libraries at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized administrator of Scholar Commons. For more information, please contact scholarcommons@usf.edu. Recommended Citation Roberts, Mark J.. ""Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions," Edited by Dale L. June (Boca Raton, FL: CRC Press, 2011)." Journal of Strategic Security 4, no. 3 (2011): 69-72. DOI: http://dx.doi.org/10.5038/1944-0472.4.3.6

Journal Article
TL;DR: Fusion centers as discussed by the authors have become a hallmark of the Obama administration's domestic security apparatus and have been widely used in the U.S. since the terrorist attacks of September 11, 2001, with many of them listed as "intelligence centers" or "information analysis centers".
Abstract: THE U.S. "WAR ON TERROR" HAS FUELED REMARKABLE DEVELOPMENTS IN STATE surveillance. In the aftermath of the terrorist attacks of September 11, 2001, the country witnessed a rise in domestic spying programs, including warrantless wiretaps of the communications of citizens, investigations into the borrowing habits of library patrons, infiltration of peace-activist groups by government agents, and the establishment of tip hotlines to encourage people to report suspicious others (Monahan, 2010). Rather than interpret these and similar developments as originating with the "war on terror," scholars in the field of surveillance studies have correctly noted that the events of September 11 provided an impetus for a surge in many preexisting, but perhaps dormant, forms of state surveillance (Wood, Konvitz, and Ball, 2003). Similarly, such domestic surveillance practices neither began nor ended with the George W. Bush administration; instead, state surveillance has grown and mutated in response to changing perceptions of the nature of terrorist threats and the predilections of the Obama administration. In particular, the Department of Homeland Security (DHS) has renewed its commitment to creating a robust, nationwide network of "fusion centers" to share and analyze data on citizens and others. As of 2010, at least 72 fusion centers existed at the state and regional levels throughout the United States, with many of them listed as "intelligence centers" or "information analysis centers." Officially, such centers prioritize counterterrorism activities, such as conducting "threat assessments" for events and linking "suspicious activities reports" to other data to create profiles of individuals or groups that might present terrorist risks. In this capacity, fusion centers engage in aform of "intelligence-led policing" that targets individuals who match certain profiles and singles them out for further monitoring or preemptive intervention (Ratcliffe, 2003; Wilson and Weber, 2008). Most fusion centers are located within state and local police departments. Police, FBI, and DHS analysts, whose salaries are usually funded by their respective organizations, typically staff the centers. A common exception is when police representatives are funded in part or completely by DHS grants for the centers. In addition to conducting threat assessments and compiling suspicious-activities reports, fusion center analysts routinely respond to requests for information from state and local police, other fusion centers, or government agencies and organizations such as the FBI, DHS, the Secret Service, or the Department of Defense. When seen as pertinent, fusion centers also share information with private companies, such as those operating public utilities or managing other critical infrastructures (Electronic Privacy Information Center, 2008; Monahan, 2009). Although the Los Angeles County Terrorism Early Warning Center, established in 1996, is often credited as being the first fusion center (German and Stanley, 2008), most were formed after the release of the September 11 Commission Report in 2004. The early fusion centers built upon and often incorporated the Federal Bureau of Investigation's "Joint Terrorism Task Force" (JTTF) program, thereby hardwiring FBI connections into fusion centers, but allowing for greater information sharing than JTTFs afforded (German and Stanley, 2007). Since their inception, the orientation of many fusion centers has expanded to include "all hazards" and "all threats," such as responding to environmental catastrophes or investigating non-terrorist criminal gangs (Rollins, 2008). One likely reason for this expansion is that the police departments housing fusion centers are trying to translate DHS priorities and apply DHS funds to address local needs (Monahan and Palmer, 2009). Fusion centers are rapidly becoming a hallmark of the Obama administration's domestic security apparatus. Since 2009, 14 more fusion centers have come on line and the DHS and the Department of Justice have pledged more funding support for fusion centers (Burdeau, 2010; Geiger, 2009). …

Journal ArticleDOI
TL;DR: The authors explains why Americans demand too much homeland security and offers ways to manage the problem of overreaction to terrorism in the U.S. But for those willing to look, the history of health and safety regulation and defense policy reveals strategies to limit overreactions.
Abstract: Americans want more homeland security than they need. That is the politics of homeland security in a nutshell. It results from two things. First, cognitive biases cause people to worry more about terrorists than they should and to demand more protection from them than cost–benefit analysis recommends. Second, U.S. citizensʼ information about terrorism comes largely from politicians and government organizations with an interest in reinforcing excessive fears. These tendencies create political demand for ill-conceived counterterrorism policies. Few policymakers will buck that demand and fight overreaction to terrorism. But for those willing to look, the history of health and safety regulation and defense policy reveals strategies to limit overreaction. Policymakers can improve communication strategies by promoting a stiff-upper-lip attitude toward terrorism that emphasizes strength, not vulnerability. They can use cost–benefit analysis to justify decisions that limit the provision of defenses. They can design resource-allocating institutions to compare different kinds of risks and remedies against them—making the cost of homeland security measures more transparent. A more cynical approach is to embrace security theater, answering demands for counterterrorism with policies that serve other purposes while holding down spending. All these strategies are used today, but not enough. This essay explains why Americans demand too much homeland security and offers ways to manage the problem. That focus requires limiting discussion of the idea that terrorism is less of a threat than one generally hears. Still, the

Book
28 Feb 2011
TL;DR: In this article, the authors present a survey of the history of illegal immigration from 1848-1990, including restrictions, depression, and deportation, and the Bracero Era from 1942-1964.
Abstract: List of Figures. Series Editor's Preface. Acknowledgments. Introduction. 1. Beginnings: 1848-1920. 2. Restriction, Depression, and Deportation: The 1920s and 1930s. 3. The Bracero Era: 1942-1964. 4. Illegal Immigration and Response: 1964-1990. 5. Free Trade and Homeland Security: 1990-Present. Epilogue and Conclusion.


Book ChapterDOI
28 Feb 2011
TL;DR: The 2021 President's Budget proposes to transfer the United States Secret Service (USSS) to the Department of the Treasury, and reorganize the Cybersecurity and Infrastructure Security Agency's (CISA) Program, Project, and Activity (PPA) structure.
Abstract: The Department of Homeland Security's (DHS) mission is to safeguard the American people, our homeland, and our values with honor and integrity. Threats to our safety and security are constantly evolving and require continuous risk assessments and adaptive strategies to effectively address them. The men and women at DHS demonstrate agility and dedication to our mission by protecting our Nation from threats by land, sea, air, and cyber. The 2021 budgetary data are presented in the same consolidated account structure as enacted in the 2020 Consolidated Appropriations Act (Defense, CJS, FSGG, Homeland Security) (P.L. 116–93) with two notable exceptions, as described below. The 2021 President's Budget proposes to transfer the United States Secret Service (USSS) to the Department of the Treasury. Please consult the Department of the Treasury chapter for more information on this account. Additionally, the 2021 President's Budget proposes to reorganize the Cybersecurity and Infrastructure Security Agency's (CISA) Program, Project, and Activity (PPA) structure. In November 2018, Congress passed the Cybersecurity and Infrastructure Security Agency Act of 2018 reorganizing the former National Protection and Programs Directorate (NPPD) into CISA, which today serves as the DHS operational Component focused on leading the national effort to understand and manage cyber and physical risks to critical U.S. infrastructure. The 2021 President's Budget reorganizes the PPA structure to fully reflect this vision.

BookDOI
01 Jan 2011
TL;DR: Forst, Forst, Greene, and Lynch as mentioned in this paper discuss the etiology of terrorism, data, and methods, as well as the strategies for intervention to prevent terrorism in the US.
Abstract: 1. Introduction and overview Brian Forst, Jack R. Greene and James P. Lynch Part I. Nature of the Problem: 2. Manifestations of aggression: terrorism, crime, and war David Klinger and Charles 'Sid' Heal 3. The etiology of terrorism: theory, data, and methods Quint Thurman and Wayman Mullins 4. An ecological perspective of terrorism Bryan Vila and Joanne Savage 5. Gangs and terrorist cells David Curry 6. Women, crime, and terrorism Rita Simon and Adrienne Tranel Part II. Strategies for Intervention: 7. Crime prevention strategies and terrorism Cynthia Lum and Christopher Koper 8. Routine activities theory and the prevention of terrorism James P. Lynch 9. Soldiers and spies, police and detectives Tomas Mijares and Jay Jamieson 10. Community policing and homeland security Jack R. Greene 11. Go analyze! (Connecting the dots) Jean-Paul Brodeur 12. Managing the fear of terrorism Brian Forst 13. Should profiling be used to prevent terrorism? A. Daktari Alexander 14. Federal and local coordination in homeland security Ed Maguire and William King 15. Liberty and security in an era of terrorism John Kleinig 16. Regulating terrorism John Braithwaite Part III. Thinking About Tomorrow: 17. Countering myths about terrorism: some lessons learned from the global terrorism database Gary LaFree 18. Criminal justice and terrorism: a research agenda Brian Forst.

Book ChapterDOI
28 Feb 2011

03 Feb 2011
TL;DR: The U.S. Senate Committee on Homeland Security and Governmental Affairs launched an investigation of the events preceding the attack with two purposes: (1) to assess the information that the U. S. Government possessed prior to the attack and the actions that it took or failure to take in response to that information; and (2) to identify steps necessary to protect the United States against future acts of terrorism by homegrown violent Islamist extremists as mentioned in this paper.
Abstract: : On November 5, 2009, a lone attacker strode into the deployment center at Fort Hood, Texas. Moments later, 13 Department of Defense (DoD) employees were dead and another 32 were wounded in the worst terrorist attack on U.S. soil since September 11, 2001. The U.S. Senate Committee on Homeland Security and Governmental Affairs launched an investigation of the events preceding the attack with two purposes: (1) to assess the information that the U.S. Government possessed prior to the attack and the actions that it took or failure to take in response to that information; and (2) to identify steps necessary to protect the United States against future acts of terrorism by homegrown violent Islamist extremists. This investigation flows from the Committee's four-year, bipartisan review of the threat of violent Islamist extremism to our homeland which has included numerous briefings, hearings, consultations, and the publication of a staff report in 2008 concerning the internet and terrorism. In our investigation of the Fort Hood attack, we have been cognizant of the record of success by DoD and the Federal Bureau of Investigation (FBI) in the ten years since 9/11. We recognize that detection and interdiction of lone wolf terrorists is one of the most difficult challenges facing our law enforcement and intelligence agencies. Every day, these agencies are presented with myriad leads that require the exercise of sound judgment to determine which to pursue and which to close out. Leaders must allocate their time, attention, and inherently limited resources on the highest priority cases. In addition, the individual accused of the Fort Hood attack, Army Major Nidal Malik Hasan, is a U.S. citizen. Even where there is evidence that a U.S. citizen may be radicalizing, the Constitution appropriately limits the actions that government can take.

Book
01 Jan 2011
TL;DR: The National Security Enterprise: Institutions, Cultures and Politics as discussed by the authors is an excellent overview of the history of the NSC process and its application in the United States military and government.
Abstract: ForewordLt. Gen. Brent Scowcroft, USAF (Ret.) Preface Introduction: The National Security Enterprise: Institutions, Cultures and PoliticsRoger Z. George and Harvey Rishikof Part I: The Interagency Process 1. History of the Interagency Process for Foreign Relations in the United States: Murphy's Law?Jon J. Rosenwasser and Michael Warner 2. The Evolution of the NSC ProcessDavid Auerswald 3. The Office of Management and Budget: The President's Policy ToolGordon Adams 4. The State Department: Culture as Interagency Destiny?Marc Grossman 5. The Office of the Secretary of Defense: Civilian Masters?Frederick C. Smith and Franklin C. Miller 6. The Military: Forging a Joint Warrior CultureMichael J. Meese and Isaiah Wilson III 7. Office of the Director of National Intelligence: Promising Start Despite Ambiguity, Ambivalence, and AnimosityThomas Fingar 8. Central Intelligence Agency: The President's OwnRoger Z. George 9. The Evolving FBI: Becoming a New National Security Enterprise AssetHarvey Rishikof 10. The Department of Homeland Security: Chief of CoordinationGary M. Shiffman and Jonathan Hoffman Part II: The President's Partners and Rivals 11. Congress: Checking Presidential PowerGerald Felix Warburg 12. The United States Supreme Court: The Cult of the Robe in the National Security EnterpriseHarvey Rishikof Part III: The Outside Players 13. Lobbyists: U.S. National Security and Special InterestsGerald Felix Warburg 14. Think Tanks: Supporting Cast Players in the National Security EnterpriseEllen Laipson 15. The Media: Witness to the National Security EnterpriseJohn Diamond Conclusion: Navigating the Labyrinth of the National Security EnterpriseHarvey Rishikof and Roger Z. George Contributors Index

Book ChapterDOI
01 Jan 2011
TL;DR: This chapter will examine why water infrastructure is so critical to the USA and describe why drinking water and wastewater systems need to be protected, what threats to consider, and identify the vulnerabilities that increase risks and leave assets susceptible to an attack or large-scale system failure.
Abstract: Protecting the nation’s critical infrastructure requires a multilayered security program tailored for each system and protective measures in the form of policies, procedures, and security investments to reduce risks to critical infrastructure. Water and wastewater utilities are part of the water sector which is one of the 18 critical infrastructures as defined by homeland security experts and officials. As of 2006, there were approximately 160,000 public drinking water utilities and more than 16,000 wastewater utilities in the USA. A high percentage of the US population receives potable water and sanitary sewer service from these utilities which are owned and/or managed by private, municipal, and special purpose districts, spread across thousands of jurisdictions from coast to coast. This chapter will examine why water infrastructure is so critical to the USA and describe why drinking water and wastewater systems need to be protected, what threats to consider, and identify the vulnerabilities that increase risks and leave assets susceptible to an attack or large-scale system failure. Hazards that could threaten and disable an entire system will be examined and vulnerabilities and the potential consequences of an intentional attack on a water system will be illustrated. Other issues to be discussed are the drivers for security improvements and physical security countermeasures available to prevent security incidents and to protect against, prepare for, and respond to large-scale water system failure.

Book
01 Jan 2011
TL;DR: This paper presents a case study of the response of the United Kingdom to the Bioterrorism Preparedness Program in the aftermath of the 9/11 attacks, which highlighted the need for a coherent strategy to deal with the threat of biological weapons proliferation.
Abstract: Preface. Contributors. Acknowledgment. Abu Sayyaf Group. Aerosol. Agricultural Bioterrorism. Aliens of America: A Case Study. Al-Quida. Animal Aid Association: A Case Study. Anthrax (Bacillus anthracis). Anthrax Hoaxes: Case Studies and Discussion. Anti-Material Agents. Armed Islamic Group: A Case Study. Army of God. Army Technical Escort Unit. Assassinations. Aum Shinrikyo and the Aleph. Baader-Meinhof Gang. Biological Simulants. Bioregulators. Biosecurity: Protecting High Consequence Pathogens and Toxins Against Theft and Diversion. Biotechnology and Bioterrorism. Bioterrorist Attack, Stages, and Aftermath. Botulinum Toxin. Breeders: A Case Study. Brucellosis (Brucella spp.). Camelpox. CDC Category C Agents. Centers for Disease Control and Prevention's Bioterrorism Preparedness Program. Central Intelligence Agency. Characteristics of Future Bioterrorists. Chechen Separatists. Christian Identity. Consequence Management. Cost-Effectiveness of Biological Weapons. Crisis Management. Cuba. Dark Harvest. Dark Winter. Defense Threat Reduction Agency. Defense Research and Development Canada-Suffield. Delivery Methodologies. Department of Defense. Department of Health and Human Services. Department of Homeland Security. Department of Justice. Department of State. Detection of Biological Agents. Diane Thompson: A case Study. Director of Central Intelligence Counterterrorist Center. DoD Policies on Force Health Protection: Medical Defense Against Biological Warfare Agents. Dual-Use Equipment and Technology. Dugway Proving Ground. Edgewood Chemical Biological Center (Formerly Edgewood Arsenal), Aberdeen Proving Ground. Education for Biodefense. Epidemiology in Bioterrorism. Equine Encephalitis, Venezuelen, and Related Alphaviruses. Ethnic Weapons. Fatality Management. Federal Bureau of Investigation. Food and Beverage Sabotage. Food and Drug Administration. Food and Waterborne Pathogens. Fort Detrick and USAMRIID. Glanders (Burkholderia mallei). HAMAS. Hemorrhagic Fever Viruses. Hizballah. Homeland Defense. Human Immunodeficiency Virus. Influenza. Intelligence Collection and Analysis. International Cooperation and Bioterrorism Preparedness. International Regulations and Agreements Pertaining to Bioterrorism. Iran. Iraq. Islam, Shi'a and Sunna. Islamism. Israel. Joint Task Force Civil Support. Korea, Democratic People's Republic of Kurdistan. Laboratory Response to Bioterrorism. Larry Wayne Harris. Lawrence Livermore National Laboratory. Liberation Tigers of Tamil Eelam. Libya. Los Alamos National Laboratory. Marine Algal Toxins. Marine Corps Chemical and Biological Incident Response Force. Mau-Mau. Media and Bioterrorism. Metropolitan Medical Response System. Minnesota Patriots Council. Minutemen: Case Studies. Modeling the Public Health Response to Bioterrorism. National Institutes of Health and National Institute of Allergy and Infectious Diseases. NATO and Bioterrorism Defense. North American Militia. NORTHCOM (U.S. Northern Command). Office International des Epizooties: World Organization for Animal Health. Orange October: A Case Study. Palestine Liberation Organization. Palestinian Islamic Jihad. Pharmaceutical Industry. Pine Bluff Arsenal. Plague (Yersinia pestis). POLISARIO. Prevention and Treatment of Biological Weapons-Related Infection and Disease. Prion Diseases. Psychological and Social Sequelae of Bioterrorism. Public Health Preparedness in the United States. Rajneesjees. Republic of Texas: A Case Study. Ricin and Abrin. RISE: A Case Study. Risk Assessment in Bioterrorism. Sandia National Alboratories. Scientists, Societies, and Bioterrorism Defense in the United States. Smallpox. Staphylococcal Enterotoxins. Sudan, Republic of. Suicide Terrorism. Syndromic Surveillance. Syria. Terrorist Group Identification. Threat Reduction in the Former Soviet Union. TOPOFF. TOPOFF 2. Toxins: Overview and General Principles. Tularemia (Francisella tularensis). Typhus, Epidemic (Rickettsia prowazekii). United Kingdom: Bioterrorism Defense. United States Department of Agriculture. United States Legislation and Presidential Directives. Water Supply: Vulnerability and Attack Specifics. Weapons of Mass Destruction Civil Support Teams. Weather Underground: A Case Study. Index.

Journal ArticleDOI
TL;DR: The conceptual common denominator of resilience is identified based on the results of a literature survey and according to the way it has been used in different contexts to demonstrate the defining of a universally accepted definition.
Abstract: The concept of resilience has been used among a diversity of fields with a myriad of definitions. A systems approach to discovering the essence of resilience could aid in understanding its concept and provide opportunities to distinguish its systemic characteristics that can be identified, planned, or analyzed regardless of the field in which it is considered. In order to begin executing such an approach, a comprehensive study of the literature on the topic and circumstances in which resilience has been used or referred to in several fields of studies is necessary. In this paper, the conceptual common denominator of resilience is identified based on the results of a literature survey and according to the way it has been used in different contexts. This basis leads to the objective of this effort, and that is to recognize the systemic characteristics of resilience and demonstrate the defining of a universally accepted definition. Using a soft systems methodology and a supporting systemic diagramming technique entitled Systemigrams, we present the formulation of defining resilience in maritime homeland security. In this effort, many stakeholders contributed their thoughts and concerns on the meaning and operational use of resilience through a repetitive process to formulate a definition of the term. The result of this methodic approach is a general definition of resilience that has been refined in a collaborative environment via the application the Boardman Soft Systems Methodology.

01 Jan 2011
TL;DR: Hiemstra et al. as discussed by the authors investigated how the chaos of detention and deportation extends transnationally to countries of migrant origin to produce insecurity precisely at the scale of the home for migrants' families, communities, and for returned migrants.
Abstract: The central argument of this dissertation is that while the immigration enforcement policies of detention and deportation are politically positioned as critical strategies for protecting U.S. homeland security, these policies actually create insecurity at multiple scales. The project, grounded in both critical geopolitics and feminist political geography, endeavors to interrogate the master narratives‘ behind these restrictive policies. First, the dissertation explores the historical, political, and cultural factors behind the United States‘ increased use of detention and deportation, as well as the deepseated structural factors driving Ecuadorian migration to the United States. Then, drawing on ethnographic fieldwork in Ecuador with deportees and family members of detained migrants, the study seeks to understand ways in which these policies are embodied both within and outside U.S. borders. It is suggested that the detention and deportation system engenders chaos – or the appearance of chaos – in numerous spaces and for various groups of individuals. Three chaotic geographies‘ of the system are explored in order to scrutinize the enactment of immigration policy: the operation of the system itself, detainees‘ experiences, and reverberations of detention and deportation in Ecuador. Data show that inside U.S. borders, these enforcement policies interact recursively with processes of racialization and criminalization to generate insecurity for detained migrants and discipline employees to behave in particular ways. In addition, due to its inherent disorder and confusion, the detention and deportation system projects a cloak of impenetrability that hides the powerful actors behind its expansion, faults, and abuses. The dissertation then investigates how the chaos of detention and deportation extends transnationally to countries of migrant origin to produce insecurity precisely at the scale of the home for migrants‘ families, communities, and for returned migrants. In Ecuador, detention and deportation increase economic and ontological insecurity for family members and returned migrants in ways that spread throughout communities. Moreover, data from Ecuador illustrate that policymakers‘ objectives of deterrence do not play out as anticipated. In this project, the author joins critical scholars in calling for an expanded understanding of the concept of security, one which incorporates multiple scales and operates across political borders. THE VIEW FROM ECUADOR: SECURITY, INSECURITY, AND CHAOTIC GEOGRAPHIES OF U.S. MIGRANT DETENTION AND DEPORTATION By Nancy Hiemstra B.A. University of Virginia, 1994 M.A. University of Oregon, 2005

Journal ArticleDOI
TL;DR: This article explored broad themes and exemplar works within the field over the last few years and pointed out that policy scholars are gradually coming to terms with this new reality and are beginning to focus on security and defense in a way that informs policymakers and advances policy theory.
Abstract: Though the policy science movement was born with the purpose of counseling the Department of Defense on a plethora of security matters, modern research within the field of public policy has tended to neglect issues of defense and security focusing instead on a wide variety of domestic problems. This nearly exclusive focus on domestic issues remained largely intact until September 11, 2001, when the threat of terrorism propelled defense and security back onto the disciplinary research agenda. Though exceptionally slow to adjust, policy scholars are gradually coming to terms with this new reality and are beginning to focus on security and defense in a way that informs policymakers and advances policy theory. This research note is meant to introduce interested readers to this trend by exploring broad themes and exemplar works within the field over the last few years.

Journal ArticleDOI
TL;DR: The broad issue of professional education and the need to include information on Homeland Security has been the subject of workshops by the National Science Foundation and the National Academies and there is general agreement on the content of curricula, except for components related to Homeland Security.
Abstract: The education of professional emergency managers has been the subject of workshops by the National Science Foundation and the National Academies. There is general agreement on the content of curricula, except for components related to Homeland Security. This article looks at the broad issue of professional education and the need to include information on Homeland Security.

Book
25 Oct 2011
TL;DR: In this paper, the authors study the role of the MILITARY in security and support for local authorities in the provision of security in the home country of the United States, focusing on domestic and international security policies.
Abstract: Preface ix INTRODUCTION: STUDYING INTERNATIONAL HOMELAND SECURITY POLICIES 1 1 COUNTRY OVERVIEW 15 2 COUNTERTERRORISM STRATEGIES, LAWS, AND INSTITUTIONS 63 3 LAW ENFORCEMENT INSTITUTIONS AND STRATEGIES 147 4 INTEGRATION AND COUNTER-RADICALIZATION 175 5 THE ROLE OF THE MILITARY IN SECURITY AND SUPPORT FOR CIVIL AUTHORITIES 207 6 BORDER SECURITY AND IMMIGRATION POLICIES 239 7 SECURITY POLICIES: CRITICAL INFRASTRUCTURE PROTECTION, PUBLIC PRIVATE PARTNERSHIPS, AND AVIATION, MARITIME, AND SURFACE-TRANSPORT SECURITY 261 8 EMERGENCY PREPAREDNESS, RESPONSE, AND MANAGEMENT 291 9 PUBLIC HEALTH STRATEGIES AND INSTITUTIONS 335 CONCLUSION: INTERNATIONAL HOMELAND SECURITY 359 References 363 Index 383