Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Foundations of Homeland Security: Law and Policy
Foundations of Homeland Security: Law and Policy
Foundations of Homeland Security: Law and Policy
Ebook1,991 pages15 hours

Foundations of Homeland Security: Law and Policy

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The Complete Guide to Understanding the Structure of Homeland Security Law
  • New topics featuring leading authors cover topics on Security Threats of Separatism, Secession and Rightwing Extremism; Aviation Industry’s 'Crew Resource Management' Principles'; and Ethics, Legal, and Social Issues in Homeland Security
  • Legal, and Social Issues in Homeland Security. In addition, the chapter devoted to the Trans-Pacific Partnership is a description of economic statecraft, what we really gain from the TPP, and what we stand to lose. The Power of Pop Culture in the Hands of ISIS describes how ISIS communicates and how pop culture is used expertly as a recruiting tool
  • Text organized by subject with the portions of all the laws related to that particular subject in one chapter, making it easier to reference a specific statute by topic
  • Allows the reader to recognize that homeland security involves many specialties and to view homeland security expansively and in the long-term
  • Includes many references as a resource for professionals in various fields including: military, government, first responders, lawyers, and students
  • Includes an Instructor Manual providing teaching suggestions, discussion questions, true/false questions, and essay questions along with the answers to all of these
LanguageEnglish
PublisherWiley
Release dateJan 10, 2017
ISBN9781119289135
Foundations of Homeland Security: Law and Policy

Related to Foundations of Homeland Security

Titles in the series (2)

View More

Related ebooks

Politics For You

View More

Related articles

Reviews for Foundations of Homeland Security

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Foundations of Homeland Security - Martin J. Alperen

    1

    INTRODUCTION – OVERVIEW – BACKGROUND

    We Have Some Planes1

    No book about homeland security is complete without mention of 9/11 and reference to The 9/11 Commission Report² and other factual reporting about the attack. There is then a discussion of what homeland security is. There are sections on what homeland security looks like from the outside and from the inside, and a discussion about the development ofhomeland security law since 9/11. Next are definitions of terrorism, a list of goals or learning objectives for the reader, and then a little about this text.

    9/11

    Understanding what happened and how September 11, 2001, affected America and the world is important for understanding homeland security law and policy, but is beyond the scope of this book. I recommend readers familiarize themselves with the documented history and background. The 9/11 Commission Report, the result of an intensive government‐sponsored investigation, is the official version of the events. Columbia University’s The World Trade Center Attack: The Official Documents,³ and City University of New York/George Mason University’s The September 11th Digital Archives⁴ both have a wealth of information.

    This book and what you are learning about is not just an academic exercise. For a reminder of 9/11, see this poignant video of the burning towers, the people, scene, etc., set to music by Enya.

    Up From Zero, a one‐hour video from the U.S. Department of Labor, is an uplifting profile of the tradespeople who removed what was left of the World Trade Center after 9/11/2001. A remarkable story in itself, made even more so because some of the same workers also helped to build it years earlier.

    The Boston Marathon bombing on April 15, 2013, is the topic of a remarkable 14‐minute video by Chris Bellavita and the CHDS media team. Lilacs out of the Dead Land: 9 Lessons to be Learned from Last Week, introduces many of the issues relevant to understanding homeland security.

    WHAT IS HOMELAND SECURITY?

    Vision of Homeland Security

    According to the Homeland Security Council in 2007, the United States, through a concerted national effort that galvanizes the strengths and capabilities of Federal, State, local, and Tribal governments; the private and non‐profit sectors; and regions, communities, and individual citizens – along with our partners in the international community – will work to achieve a secure Homeland that sustains our way of life as a free, prosperous, and welcoming America.

    More recently, the 2014 Quadrennial Homeland Security Review described the Homeland Security Vision as A homeland that is safe, secure, and resilient against terrorism and other hazards, where American interests, aspirations, and way of life can thrive.

    Mission Statement

    The Department of Homeland Security lists five missions:

    Prevent terrorism and enhancing security;

    Secure and manage our borders;

    Enforce and administer our immigration laws;

    Safeguard and secure cyberspace;

    Ensure resilience to disasters.¹⁰

    Homeland Security Distinguished from Homeland Defense

    Homeland security and homeland defense are complementary components of the National Security Strategy. Homeland defense is the protection of US sovereignty, territory, domestic population, and critical defense infrastructure against external threats and aggression, or other threats… Missions are defined as homeland defense if the nation is under a concerted attack. The Department of Defense (DOD) leads homeland defense and is supported by the other federal agencies. In turn, the DOD supports the nation's homeland security effort, which is led by the Department of Homeland Security (DHS).¹¹

    Definition of Homeland Security

    Homeland Security is defined as a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.¹²

    No Consensus

    Despite the definition, mission statement, and vision, there is no consensus among practitioners and the public as to what the term Homeland Security actually means. Different groups view it differently.¹³ The extremes of opinion are represented, for the narrow view, by those who feel homeland security is only about terrorism. They believe focusing on anything additional dilutes, distracts, and weakens the homeland security mission.

    Others say its focus is terrorism and natural disasters. Still others claim homeland security is about all hazards (terrorism, man‐made disasters, and natural disasters). To some, homeland security is focused on jurisdictional hazards (i.e. homeland security means different things to different jurisdictions depending upon that jurisdiction’s particular hazards, risks, and level of preparedness). Examples of some of the jurisdictional hazards include hurricanes, tornadoes, flooding, and earthquakes.

    At the other extreme, the broad view of homeland security advocates that homeland security is about everything – that it implicates almost every sector of our lives and there is very little which does not relate to it in some way.

    Under this view, the arts (painting, poetry, music, dance, theater, food) have homeland security implications. Known to break down barriers and overcome cultural differences, sometimes the arts are the only connection between otherwise hostile/unfriendly countries.¹⁴ We must never forget that art is not a form of propaganda; it is a form of truth.¹⁵ Even food counts. It's often said that the closest interaction many Americans have with other countries' cultures is through food. That kind of culinary diplomacy is particularly common in Washington, D.C., where immigrants from all over the world have cooked up a diverse food scene….¹⁶

    One practitioner uses the term generational hazards. These are hazards created by the present generation that take many decades to metastasize before finally reaching a disastrous end‐state that impacts future generations.¹⁷ Global warming is one example.

    For those who think homeland security must also include global and ideological issues such as freedom, self‐determination, democracy, sustainable growth and consumption, overpopulation, environmental degradation, inadequate health care, extreme poverty, intolerance, social injustice, etc., homeland security is synonymous with One World Security.¹⁸ We can plan to prevent, prepare for, and recover from a terrorist attack. We can also take the broader and longer‐term view and work to make the world a better place where there will be fewer terrorists.

    A Different Name – A Different Focus

    The titles we used and the focus of what we now call homeland security have changed over the years¹⁹. During the Cold War, we called it Civil Defense, focused on nuclear war with the Soviets. When the Cold War ended, the focus moved to natural hazards. After 9/11, we called it homeland security, focused on terrorism. Homeland security is now focused on all hazards (terrorism + natural disasters + man‐made disasters). Within this list of terms should also be public safety.

    Views of Emergency Management

    Further insight into what is homeland security can be gained by examining different models of emergency management. Michael D. Selves²⁰ describes two philosophically different views of emergency management – the emergency services model and the public administration model.

    The emergency services [model is] primarily concerned with the coordination of emergency services. Among other things, Selves points out that under the emergency services model

    Organizational interactions tend to be primarily with emergency services agencies. Managers operating under the E‐S model may be reluctant to interact with non‐emergency services agencies and especially with senior, elected officials. Often emergency management functions are embedded within an emergency service agency. This has the effect of isolating them further from the policy making functions of the jurisdiction. Access to local executives and elected officials is often indirect and limited by the organizational structure. Interaction with policy level officials is also often characterized by an attitude that the politicians are a nuisance during response operations and should be kept somewhere so they don’t get in the way.

    The public administration model is much broader.

    The P‐A model is based on a philosophy which views emergency management as an element of the overall administration of government.It sees emergency management as that aspect of public administration which deals with the operation of government during crisis. Because of this, there is an interest in the political, social and psychological factors that are involved in crisis management. The concern is focused on not just the emergency services response, but on the impact of the disaster/emergency in terms of larger jurisdictional issues…

    Practitioners operating under the P‐A model tend to approach emergency management as a discipline, subject to academic research and debate with the results … being used as tools in implementing a local program…

    The emergency services model is narrow, restricted, and limited. The public administration model is, by comparison, broad, full, and robust. The public administration model must address the full range of issues while the emergency services model just makes sure the fire is out.

    Furthering the broad view of homeland security, President Obama stated there is no distinction between homeland security and national security.²¹ He described the nation's energy challenges as both a matter of national security and environmental protection.²² The U.S. Commission on National Security wrote, We have taken a broad view of national security. In the new era, sharp distinctions between foreign and domestic no longer apply…²³ The Director of National Intelligence said growing worldwide energy demand, global warming, food and water shortages, and increasing population are national security issues.²⁴ The Department of Defense, National Defense Strategy reflects this same sentiment.²⁵ The 2010 National Security Strategy states that the danger from climate change is real, urgent, and severe.

    Additional examples of the broad view of homeland security include, The capacity of America’s educational system to create a 21st century workforce second to none in the world…²⁶ and America’s heavy dependence on a global petroleum market that is unpredictable, to say the least.²⁷ Former president Jimmy Carter said in May 2009, our inseparable energy and environmental decisions will determine how well we can maintain a vibrant society, protect our strategic interests, regain worldwide political and economic leadership, meet relatively new competitive challenges, and deal with less fortunate nations. Collectively, nothing could be more important.²⁸

    INDIVIDUAL RESPONSIBILITY AND FAITH‐BASED ASSISTANCE

    Hurricane Katrina will be examined thoroughly in the FEMA chapter of this volume (Ch. 8) and blame for the poor response can be debated and assigned to several management‐level individuals, entities, and levels of government. It does not, however, fall on them alone. There must be some individual responsibility. The question, is just how much?

    Many of the people who perished and suffered were very poor, ill, frail, and/or disenfranchised. Is it good governance to expect a person who can barely feed themselves to, on their own, relocate to another city, or go to a hotel for a few days? Which level of government and which individuals were in the best position to know the existing infrastructure weaknesses, the severity of the coming storm, and the constituents?

    Although taking individual responsibility is admired in our society, the term is not a focus in the homeland security literature. That said, America has a long history of religious organizations taking responsibility for those less fortunate. The White House Office of Faith‐based and Neighborhood Partnerships works to build bridges between the federal government and nonprofit organizations, both secular and faith‐based, to better serve Americans in need.²⁹ There is the DHS Center for Faith‐based & Neighborhood Partnerships³⁰ and FEMA's Voluntary, Faith‐Based, & Community‐Based Organizations.³¹

    WHAT DOES HOMELAND SECURITY LOOK LIKE FROM THE OUTSIDE?

    Using an Office of Homeland Security/Emergency Management (HSEM)³² as an example, homeland security looks like or reflects the breadth‐of‐homeland‐security view of its leaders. For those with an ‘emergency services’ orientation we would expect to see major involvement by emergency services providers only (police, fire, EMS, etc.). This system might have the best equipment and respond with military precision, yet if these are the only participants, then the job is done as soon as the scene is safe.

    An HSEM office with a public administration focus would have a vastly broader area of responsibility. This HSEM would involve not just a city’s first responders but also all subsequent responders; those represented in part by the city agencies that will have a role in recovery. These include public works, parks and recreation, public health, education, animal control, building inspection, child support, city engineer, information technology, environment, housing, mayor or administrator, medical examiner or coroner, power, planning, port authority, zoo, and the finance and tax people. Every city agency would be involved with the HSEM. After surviving a disaster, when the first responders are done, these subsequent responders will make a city resilient.

    At the very least, a broad‐minded HSEM office will have all of its agencies working as soon after a disaster as possible. Ideally, all of the agencies have practiced working together in alternative locations and with limited communications capabilities. All agencies should have ways to obtain essential equipment, supplies, and other vital resources even without a fully functional city government. For example, the public health department procures latex gloves from the local pharmacy when the traditional supplier is unavailable. In addition, all of this should be practiced and coordinated with federal, state, and tribal governments, the private and non‐profit sectors, and regions, communities, and individual citizens. For more on this, see the chapters on preparedness and resilience in this volume (chapters 22 and 23).

    WHAT DOES HOMELAND SECURITY LOOK LIKE FROM THE INSIDE?

    America faces an evolving landscape of homeland security threats and hazards. The Deepwater Horizon oil spill in 2010, Hurricane Sandy in 2012, and the Boston Marathon bombing in 2013 illustrate these evolving threats and hazards. We must constantly learn from them and adapt.³³

    Homeland security is not static, absolute, or permanent. It is continuous and adaptive. It is dynamic. On every level, homeland security requires cooperation, joint operations, and collaboration. It is integrated, interrelated, and interagency. The challenges to national security today defy traditional categories. National security now involves a wide array of issues that can be addressed only with a broader set of highly integrated and carefully calibrated capabilities.³⁴ The evolution of the terrorist threat demands a well‐informed, highly agile, and well‐networked group of partners and stakeholders…³⁵

    Emergency services agencies (first responders) all over the country have a grand history of cooperating with each other. Thus homeland security has horizontal integration. Almost every statute and policy document related to homeland security requires that a certain plan or action be coordinated with federal, state, county, city, town, tribal, and regional governments, and with the private sector. There is also, at least in theory, vertical integration.

    The 9/11 Commission Report called the attacks a failure of imagination.³⁶ How we think about the subject, or don’t think about it, can be as important as any other aspect of homeland security. We can't solve problems by using the same kind of thinking we used when we created them.³⁷ Truly successful decision making… demands more than just a picture of the world as it is. It demands in addition a picture of the world as it will (or at least may) be.³⁸

    Homeland security requires that new ways of thinking about or looking at a problem, and new vision, be nourished and encouraged. There must always be room at the table for them. (See chapter 2, Metacognition and Errors in Judgment Related to Decision Making in Homeland Security.)

    EVERYONE IS A COMPONENT. EVERYTHING IS IMPORTANT

    Homeland security has many components and they are all critical. For example, no matter what type of incident, whether it is a storm, earthquake, flood, tornado, man‐made disaster such as a train wreck with deadly chemicals aboard, or terrorism, without communications, intelligence cannot reach decision‐makers and direction cannot be conveyed to the people in the position to take action. Without good intelligence, those in charge will not know the best actions to take, regardless of whether they can communicate. Without trained, prepared, and properly equipped responders to take action, communication and intelligence are meaningless.

    This is a more important point than it might appear to be at first glance because everyone is a lot. It includes not just the decision‐makers, intelligence officials, and first responders mentioned in the preceding paragraph. Everyone is a component means the entire community. For example, if there is a major catastrophe and if members of the community know basic first aid, that will free up overwhelmed first responders to deal with major injuries. FEMA’s CERT (Community Emergency Response Team, sometimes it goes by other names) training is an excellent resource that increases the number of people who can contribute. Please see chapters 22 and 23 on preparedness and resilience.

    WHAT IS HOMELAND SECURITY LAW?

    One definition of homeland security is that it is a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.³⁹ Adding the Department of Homeland Security’s all hazards approach, it follows logically, then, that Homeland Security Laws are those statutes enacted to prevent, mitigate, respond to, and recover from man‐made or natural disasters, catastrophic accidents, or terrorist attacks.⁴⁰

    Homeland Security Law had its official beginning on September 11, 2001. Prior to then, our nation lacked a unifying vision, a cohesive strategic approach, and the necessary institutions within government to secure the Homeland against terrorism.…[That day] transformed our thinking.⁴¹ Six weeks later, October 26, 2001, Congress passed the USA Patriot Act.⁴² On November 25, 2002, it passed the Homeland Security Act⁴³ establishing the Department of Homeland Security (DHS).⁴⁴

    Documents called National Strategies, produced by the Executive Branch of government, enunciate the nation’s overriding homeland security strategies. For example, there is the National Security Strategy, the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, and the National Strategy for Combatting Terrorism. A complete list of these and other related documents can be found in the Homeland Security Digital Library.⁴⁵ We will discuss some of these later in the book.

    Presidential Directives are much shorter than the strategies. Each one is focused on a specific subject area. Some of them are public, and some classified. The administration of President George W. Bush called them Homeland Security Presidential Directives (HSPDs). HSPD 7 relates to critical infrastructure identification, prioritization, and protection. HSPD 8 deals with national preparedness. HSPD 9 is entitled Defense of United States Agriculture and Food.

    In President Barack Obama’s administration, they are called Presidential Policy Directives (PPDs). PPD 2 is about Implementation of the National Strategy for Countering Biological Threats. PPD 20, about U.S. Cyber Operations Policy, is classified and only a fact sheet is available, not the full text. PPD 21 is entitled Critical Infrastructure Security and Resilience. PPD 28 is about signals intelligence. We will study some of these.

    The Disaster Relief Act of 1974 established the procedures for presidential disaster declarations. The Federal Emergency Management Agency (FEMA), created during the administration of President Jimmy Carter in 1979, consolidated under one agency the disaster management functions that previously were scattered among several independent agencies. The Robert T. Stafford Disaster Relief and Emergency Assistance Act⁴⁶ (1988) amended and incorporated the provisions of the 1974 Disaster Relief Act. The Stafford Act, as it is called, sets forth the procedures for declaring a disaster and requesting federal assistance, and then guides the subsequent emergency response through ultimate recovery.

    After a clearly inadequate response to hurricane Katrina, the Post‐Katrina Emergency Management Reform Act⁴⁷ (PKEMRA), made significant changes to FEMA and DHS, and helped to clarify the State and Federal Government’s roles, including FEMA’s and DHS’s roles, for responding to large‐scale events.

    The national strategies, HSPDs, PPDs, and statutes such as the Patriot Act, the Homeland Security Act, the Stafford Act, PKEMRA, and others, executive orders, plus portions of related statutes, comprise homeland security law and policy and are the homeland security framework and are what this book is about. The Department of Homeland Security itself and all homeland security actions it takes exist only in compliance with these foundational documents.

    THE DEVELOPMENT OF HOMELAND SECURITY LAW

    It is impossible to understand the complexity, scope, and depth of the Patriot Act without reading the statute, thus significant portions are reproduced here. The Patriot Act was extremely controversial and invoked public protests claiming it violated rights to privacy. One of its most controversial provisions involved increasing the availability of surveillance without the need for a judicially approved warrant. Supporters of the Patriot Act claim it was sharply focused to achieve its goal and to decisively correct some of the country’s security weaknesses.⁴⁸

    Regardless of whether one approved of the Patriot Act or not, it was an intellectual accomplishment representing a tremendous effort in a very short time period. It involved understanding many complex and interrelated statutes covering many areas of existing law, and it created new law.

    Although the Homeland Security Act was not written in the same short time period as the Patriot Act, and not under the immediate shock of 9/11, it too was a remarkable document. Even though many disagree with some of its provisions, organizational structure, or the inclusion of FEMA as an agency within DHS, in creating DHS the Act accomplished the largest reorganization of government in more than fifty years. (See chapter 7 about DHS and chapter 8 about FEMA.)

    The Homeland Security Act created DHS, brought FEMA under DHS control, and transferred more than two‐dozen federal entities – some in their entirety, some only in part – and 180,000 employees to the new department.⁴⁹

    From its inception, homeland security included an important focus on science and technology. Homeland security relies on technology for many purposes, including situational awareness, early detection and monitoring of weapons of mass destruction, and communication. DHS promotes the expedited development, acquisition, and introduction of new technology.

    The Homeland Security Act mandated:

    … that [DHS] agencies’ databases be compatible with one another and with other federal agencies.

    It

    established within the Department of Justice an Office of Science and Technology … to serve as the national focal point for work on law enforcement technology; and … to carry out programs that, through the provision of equipment, training, and technical assistance, improve the safety and effectiveness of law enforcement technology and improve access to such technology by Federal, State, and local law enforcement agencies.⁵⁰

    The homeland security framework was designed and implemented at an extraordinarily rapid pace. For example, in addition to the Patriot Act coming only six weeks after 9/11, a particular HSPD would have deadlines for each subsequent step, such as the design or implementation of the related national strategy. For example, for the National Incident Management System (NIMS), first mentioned in HSPD 5, dated February 28, 2003, the Secretary of DHS was directed to have guidelines, standards, and protocols to implement NIMS by June 1, 2003. Each Federal Department was to have a plan to adopt and fully implement NIMS by August 1, 2003.

    A FEW DEFINITIONS OF TERRORISM

    There is no consensus as to the definition of terrorism.⁵¹

    DHS⁵²

    (15) The term terrorism means any activity that—

    involves an act that—

    is dangerous to human life or potentially destructive of critical infrastructure or key resources; and

    is a violation of the criminal laws of the United States or of any State or other subdivision of the United States; and

    appears to be intended—

    to intimidate or coerce a civilian population;

    to influence the policy of a government by intimidation or coercion; or

    to affect the conduct of a government by mass destruction, assassination, or kidnapping.

    USA Patriot Act

    Domestic Terrorism, § 802, codified at 18USC2331

    ⁵³

    (5) the term domestic terrorism means activities that—

    involve acts dangerous to human life that are a violation of the criminal laws of the United States or of any State;

    appear to be intended—

    to intimidate or coerce a civilian population;

    to influence the policy of a government by intimidation or coercion; or

    to affect the conduct of a government by mass destruction, assassination, or kidnapping; and

    occur primarily within the territorial jurisdiction of the United States.

    International Terrorism, 18 USC 2332b

    ⁵⁴

    PROHIBITED ACTS.—

    OFFENSES.—Whoever, involving conduct transcending national boundaries and in a circumstance described in subsection (b)—

    kills, kidnaps, maims, commits an assault resulting in serious bodily injury, or assaults with a dangerous weapon any person within the United States; or

    creates a substantial risk of serious bodily injury to any other person by destroying or damaging any structure, conveyance, or other real or personal property within the United States or by attempting or conspiring to destroy or damage any structure, conveyance, or other real or personal property within the United States;

    in violation of the laws of any State, or the United States, shall be punished as prescribed in subsection (c).

    Treatment of threats, attempts and conspiracies.—Whoever threatens to commit an offense under paragraph (1), or attempts or conspires to do so, shall be punished under subsection (c).

    JURISDICTIONAL BASES.—

    CIRCUMSTANCES.—The circumstances referred to in subsection (a) are—

    the mail or any facility of interstate or foreign commerce is used in furtherance of the offense;

    the offense obstructs, delays, or affects interstate or foreign commerce, or would have so obstructed, delayed, or affected interstate or foreign commerce if the offense had been consummated;

    the victim, or intended victim, is the United States Government, a member of the uniformed services, or any official, officer, employee, or agent of the legislative, executive, or judicial branches, or of any department or agency, of the United States;

    the structure, conveyance, or other real or personal property is, in whole or in part, owned, possessed, or leased to the United States, or any department or agency of the United States;

    the offense is committed in the territorial sea (including the airspace above and the seabed and subsoil below, and artificial islands and fixed structures erected thereon) of the United States; or

    the offense is committed within the special maritime and territorial jurisdiction of the United States.

    CO‐CONSPIRATORS AND ACCESSORIES AFTER THE FACT.—Jurisdiction shall exist over all principals and co‐conspirators of an offense under this section, and accessories after the fact to any offense under this section, if at least one of the circumstances described in subparagraphs (A) through (F) of paragraph (1) is applicable to at least one offender.

    CIA, State Department, 22 USC Sec. 2656f

    ⁵⁵

    (d) DEFINITIONS. As used in this section—

    the term international terrorism means terrorism involving citizens or the territory of more than 1 country;

    the term terrorism means premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents;

    United Nations

    The UN does not have an agreed upon definition of terrorism. On Dec. 9, 1994, however, Resolution 49/60,⁵⁶ Measures to eliminate international terrorism was adopted by the General Assembly, containing the following:

    3. Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them.

    On October 8, 2004, Security Council Resolution 1566⁵⁷ was adopted containing the following:

    3. criminal acts, including against civilians, committed with the intent to cause death or serious bodily injury, or taking of hostages, with the purpose to provoke a state of terror in the general public or in a group of persons or particular persons, intimidate a population or compel a government or an international organization to do or to abstain from doing any act,…are under no circumstances justifiable by considerations of a political, philosophical, ideological, racial, ethnic, religious or other similar nature…

    Links to more definitions of terrorism are in this footnote⁵⁸

    Hate Crimes

    In some cases, it is difficult to distinguish a hate crime from terrorism.

    A hate crime is a traditional offense like murder, arson, or vandalism with an added element of bias. For the purposes of collecting statistics, the FBI has defined a hate crime as a criminal offense against a person or property motivated in whole or in part by an offender’s bias against a race, religion, disability, sexual orientation, ethnicity, gender or gender identity.⁵⁹

    Federal Hate Crime Law, 18 USC 249

    ⁶⁰

    IN GENERAL.—

    OFFENSES INVOLVING ACTUAL OR PERCEIVED RACE, COLOR, RELIGION, OR NATIONAL ORIGIN.—Whoever, whether or not acting under color of law, willfully causes bodily injury to any person or, through the use of fire, a firearm, a dangerous weapon, or an explosive or incendiary device, attempts to cause bodily injury to any person, because of the actual or perceived race, color, religion, or national origin of any person—

    shall be imprisoned not more than 10 years, fined in accordance with this title, or both; and

    shall be imprisoned for any term of years or for life, fined in accordance with this title, or both, if—

    death results from the offense; or

    the offense includes kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill.

    OFFENSES INVOLVING ACTUAL OR PERCEIVED RELIGION, NATIONAL ORIGIN, GENDER, SEXUAL ORIENTATION, GENDER IDENTITY, OR DISABILITY.—

    In General.—Whoever, whether or not acting under color of law, in any circumstance described in subparagraph (B) or paragraph (3), willfully causes bodily injury to any person or, through the use of fire, a firearm, a dangerous weapon, or an explosive or incendiary device, attempts to cause bodily injury to any person, because of the actual or perceived religion, national origin, gender, sexual orientation, gender identity, or disability of any person—

    shall be imprisoned not more than 10 years, fined in accordance with this title, or both; and

    shall be imprisoned for any term of years or for life, fined in accordance with this title, or both, if—

    death results from the offense; or

    the offense includes kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill.

    Circumstances described.—For purposes of subparagraph (A), the circumstances described in this subparagraph are that—

    the conduct described in subparagraph (A) occurs during the course of, or as the result of, the travel of the defendant or the victim—

    across a State line or national border; or

    using a channel, facility, or instrumentality of interstate or foreign commerce;

    the defendant uses a channel, facility, or instrumentality of interstate or foreign commerce in connection with the conduct described in subparagraph (A);

    in connection with the conduct described in subparagraph (A), the defendant employs a firearm, dangerous weapon, explosive or incendiary device, or other weapon that has traveled in interstate or foreign commerce; or

    the conduct described in subparagraph (A)—

    interferes with commercial or other economic activity in which the victim is engaged at the time of the conduct; or

    otherwise affects interstate or foreign commerce.

    OFFENSES OCCURRING IN THE SPECIAL MARITIME OR TERRITORIAL JURISDICTION OF THE UNITED STATES.— Whoever, within the special maritime or territorial jurisdiction of the United States, engages in conduct described in paragraph (1) or in paragraph (2)(A) (without regard to whether that conduct occurred in a circumstance described in paragraph (2)(B)) shall be subject to the same penalties as prescribed in those paragraphs.

    GUIDELINES.— All prosecutions conducted by the United States under this section shall be undertaken pursuant to guidelines issued by the Attorney General, or the designee of the Attorney General, to be included in the United States Attorneys’ Manual that shall establish neutral and objective criteria for determining whether a crime was committed because of the actual or perceived status of any person.

    CERTIFICATION REQUIREMENT.—

    IN GENERAL.—No prosecution of any offense described in this subsection may be undertaken by the United States, except under the certification in writing of the Attorney General, or a designee, that—

    the State does not have jurisdiction;

    v the State has requested that the Federal Government assume jurisdiction;

    the verdict or sentence obtained pursuant to State charges left demonstratively unvindicated the Federal interest in eradicating bias‐motivated violence; or

    a prosecution by the United States is in the public interest and necessary to secure substantial justice.

    RULE OF CONSTRUCTION.— Nothing in this subsection shall be construed to limit the authority of Federal officers, or a Federal grand jury, to investigate possible violations of this section.

    DEFINITIONS. In this section—

    the term bodily injury has the meaning given such term in section 1365(h)(4) of this title, but does not include solely emotional or psychological harm to the victim;

    the term explosive or incendiary device has the meaning given such term in section 232 of this title;

    the term firearm has the meaning given such term in section 921(a) of this title;

    the term gender identity means actual or perceived gender‐related characteristics; and

    the term State includes the District of Columbia, Puerto Rico, and any other territory or possession of the United States.

    STATUTE OF LIMITATIONS.—

    OFFENSES NOT RESULTING IN DEATH.— Except as provided in paragraph (2), no person shall be prosecuted, tried, or punished for any offense under this section unless the indictment for such offense is found, or the information for such offense is instituted, not later than 7 years after the date on which the offense was committed.

    DEATH RESULTING OFFENSES.—An indictment or information alleging that an offense under this section resulted in death may be found or instituted at any time without limitation.

    PURPOSE OF THIS TEXT

    The purpose of this text is threefold. First, it is to familiarize the reader with the extensive and complex legal codes that come under the heading of homeland security. Second, it is to demonstrate the importance of thinking to homeland security – critical thinking, creative thinking, outside‐the‐box thinking – and keeping an open mind. Third, to teach that homeland security is a complex and ever‐changing interplay of many things.

    LEARNING OBJECTIVES

    Know the threat terrorism presents.⁶¹ The Strategic Environment chapter (chapter 4) and the Extreme Right Wing Ideologues chapter (chapter 5) describe the current and near future threats to the United States as well as some possible future strategic environments.

    Put terrorism in perspective. We face bird flu, swine flu, global warming, migrating fire ants, killer bees, hurricanes, earthquakes, floods, tornadoes, and the full spectrum of man‐made accidents. Terrorism is a real threat, but one of these other catastrophes is more likely to happen to you.

    Develop a conceptual understanding of homeland security law and policy – the foundation and framework of homeland security.

    Appreciate the complexity of this framework. For example, the Critical Infrastructure Protection chapter (chapter 13) has approximately twenty‐five contributing documents. There are 100 legal authorities that guide the structure, development, and implementation of the National Response Framework…⁶²

    Evaluate homeland security law and policy and its application. Does what we have established work? Why are we doing it? How can we improve it? Is a proposed new idea worth implementing?

    Engage in meaningful discussion about America’s homeland security.

    Recognize that the government, whether it is state, local, tribal, or federal, cannot protect us from every hazard all the time, and whether it is a natural disaster, man‐made disaster, or terrorism, it may take three or more days for rescue to arrive. Thus, we must be able to take care of ourselves, our families, and our neighbors, without electricity, running water, or communications. The cry, where’s my FEMA water,⁶³ may simply not be heard. Every community and everyone in those communities must participate in preparedness.

    Recognize that resiliency, our ability to return to normal after a disaster, catastrophic accident, or terrorist attack, depends both on us as individuals and on our infrastructure. It is a cooperative endeavor between all levels of government, the private sector, faith based providers, and individuals.

    Recognize that [c]ritical infrastructure is the enabler of our national economic and social activity,⁶⁴ and that resiliency requires resilient infrastructure.

    Recognize that a significant portion of our nation’s infrastructure is in need of repair, and that there are several predictable, foreseeable, and preventable ‘cascading infrastructure failures’ – disasters – that are ready to happen.⁶⁵ Recognize that we must take action now to rebuild and repair our infrastructure, to prevent these predictable disasters and to achieve resiliency.

    ABOUT THIS TEXT

    On any topic, the material in this this text is not exhaustive – there is more than is presented here. My goal is to scratch the surface in a way that captivates – to whet the appetite.

    The statutes and other documents are edited, vast portions are omitted, and I include only those sections sufficient to present the essence of the document. If you want the full document, finding it is easier because everything in this book has a citation. Also, repetitive material has been eliminated. For example, almost every directive contains instructions that the Secretary of DHS or the Administrator of FEMA is to cooperate with or consult with, followed by a long list of names. To save space and repetition, these have been omitted. In addition, almost every program came with a requirement for a mandatory report to Congress on the program’s progress, for the establishment of a method of measuring the program’s performance, and to monitor implementation. These paragraphs have been eliminated too.

    In addition to being organized by topic, the book is organized chronologically. The older documents come first in the chapter. Many of the acts, like the Patriot Act and the Homeland Security Act have had changes or amendments made to them. Where the original act is available, the portions reproduced here are in their original form. Amendments coming later in time are presented later in the chapter. However, there are a few instances where only the most up‐to‐date version is reproduced. For example, the Insurrection Act of 1807 (10 USC § 331).

    Homeland security had its beginnings on September 11, 2001 and with only a few exceptions, that is the starting point of the material in this text. This 2nd edition does not delete the older documents – it adds on the newer ones with the ending point in 2016. This provides the unique opportunity of being able to see the development of the field over time and to see how it has changed.

    Where appropriate, the chapter summaries highlight the most important of the acts included in each chapter.

    CONTRIBUTING AUTHORS

    There are truly extraordinary contributing author chapters that round out the text and make it greater than the sum of its parts. They are written by experts in their field and are not available anywhere else. Chapter 2, Metacognition and Errors in Judgment Related to Decision‐Making in Homeland Security by Angi English is about thinking, how we think, and how that can affect homeland security. Ethical, Legal, and Social Issues in Homeland Security –What They Are and How to Address Them, chapter 3, by Alexander Siedschlag discusses how what we do must be grounded in the law and ethics. Chapter 5, Extreme Right Wing Ideologues, Conservative Secession and Terrorism, by Tobias T. Gibson and Richard Q. Sterns is about home grown terrorists. They are already here.

    Cybersecurity Legislation and Critical Infrastructure Vulnerabilities, by William A. Carter and Daniel G. Sofio, chapter 14, describes some past attacks on critical infrastructure and then discusses the state of cybersecurity legislation in the United States.

    In chapter 25, Creating the Guardians: The Status of Homeland Security Education, Laura Manning Johnson and Robert Hayhurst discuss how After the attacks of 9/11 Americans recognized the need for more and different security, directed towards a different kind of enemy, by a new group of ‘guardians’ with the broad‐based wisdom and skills to prevent or protect against transnational threats and to respond to and recover from attacks as needed. Their chapter is about homeland security education.

    Chapter 26, Applying Management and Organizational Theory Education to Create Effective Agencies by Judson M. Freed, discusses the need for and benefits of applying management and organizational theory to homeland security.

    U.S. Economic Statecraft, Homeland Security, and the Trans‐Pacific Partnership, chapter 27, by David A. Parker and Daniel G. Sofio, is a fascinating study of economic statecraft, its relationship to homeland security, and how the Trans‐Pacific Partnership can be a part of that.

    Chapter 28, Deconstructing Latin American Security, by Pablo Brum, is much more than a brilliant essay about deconstructing. It is also about thinking – how we describe Latin America to ourselves, and the homeland security implications of a one‐size‐fits‐all approach.

    Chapter 29, The Power of Pop Culture in the Hands of Isis, By Joseph Russo, is about how popular culture is being utilized by ISIS.

    DISCLAIMER

    All of the documents in this text have been edited and much has been omitted. In addition, statutes and policy documents are continuously updated. Because of this, this text should not be used as a substitute for the complete and up‐to‐the‐minute authorities themselves.

    NOTES

    1. Title of 1st chapter of The 9/11 Commission Report, from a radio transmission from American Flight 11. We have some planes. Just stay quiet, and you’ll be okay. We are returning to the airport. Final Report of the National Commission on Terrorists Attacks Upon the United States, n.d., p. 19. Accessed July 30, 2015. http://www.9‐11commission.gov/report/911Report.pdf http://govinfo.library.unt.edu/911/report/index.htm.

    2. The 9/11 Commission Report. See previous footnote.

    3. Columbia University, The World Trade Center Attack: The Official Documents. Accessed March 13, 2016. http://library.columbia.edu/locations/usgd/wtc.html.html.

    4. The September 11 Digital Archive. Accessed March 13, 2016. http://911digitalarchive.org.

    5. Video of the burning towers. Accessed July 30. 2015. http://www.patriotwatch.com/911.htm.

    6. Up From Zero video, U.S. Department of Labor, S‐1524, c. 2003, www.HomelandSecurityLaw.US

    7. Christopher Bellavita, Lilacs out of the Dead Land: 9 Lessons to be Learned from Last Week, April 23, 2013. Center for Homeland Defense and Security at the Naval Postgraduate School. Accessed May 2, 2013. www.HomelandSecurityLaw.US.

    8. National Strategy for Homeland Security, Homeland Security Council, October 5, 2007, p. 13. Accessed July 30, 2015. http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf.

    9. 2014 Quadrennial Homeland Security Review, June 18, 2014, p.14. Accessed March 13, 2016. http://www.dhs.gov/publication/2014‐quadrennial‐homeland‐security‐review‐qhsr.

    10. DHS The Core Missions. Accessed March 13, 2016. http://www.dhs.gov/our‐mission.

    11. Multi‐Service Tactics, Techniques, and Procedures for Defense Support of Civil Authorities and Integrating With National Guard Civil Support, p.1. Accessed February, 2013. April 22, 2016. https://info.publicintelligence.net/MTTP‐DSCA.pdf.

    12. National Strategy for Homeland Security, Homeland Security Council, October 5, 2007, p. 3. Accessed March 13, 2016. http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf.

    13. Christopher Bellavita, Changing Homeland Security: What is Homeland Security?, Homeland Security Affairs 4, Article 1 (June 2008). Accessed March 14, 2016. https://www.hsaj.org/articles/118.

    14. Cuba and the US, for example. Accessed March 13, 2016. http://www.npr.org/2014/12/18/371721096/music‐a‐longtime‐feature‐of‐cuba‐u‐s‐cultural‐exchange

    http://www.uscubaartistexchange.org/.

    From the mid‐1950s and continuing through the 1970s, many American jazz greats traveled the globe as music envoys under the sponsorship of the U.S. Department of State. Today’s music diplomacy programs, including American Music Abroad, Center Stage, OneBeat, and Next Level, and the State Department’s other arts‐based initiatives, serve to open dialogue with new audiences, encourage collaboration, create economic opportunities, and empower women and youth by providing positive and popular avenues for engagement. U.S. Dept. of State, April 16, 2015. Accessed March 13, 2016. http://www.state.gov/r/pa/prs/ps/2015/04/240749.htm.

    15. John F. Kennedy, October 26, 1963.

    16. Linda Poon, Gastrodiplomacy: Cooking Up A Tasty Lesson On War And Peace, by Linda Poon, NPR, March 24, 2014. Accessed March 13, 2016. http://www.npr.org/blogs/thesalt/2014/03/24/291980375/gastrodiplomacy‐cooking‐up‐a‐tasty‐lesson‐on‐war‐and‐peace?sc=17&f=1001>.

    17. Patrick J. Massey, Generational Hazards. Massey’s Generational hazards are: 1. The Soaring Federal Fiscal and Current‐Account Debts; 2. Global Warming; 3. Failing Math, Science, and Engineering Education; and 4. Decaying Physical Infrastructure. Massey, Patrick J.. Generational Hazards. Homeland Security Affairs 3, Article 3 (September 2007), section entitled The Generational Hazards. Accessed March 14, 2016. https://www.hsaj.org/articles/142.

    18. The author’s term.

    19. Massey, Patrick J. Generational Hazards. Section: Things Change – The Profession Adapts to Meet New Threats, Homeland Security Affairs 3, Article 3 (September 2007), Accessed March 14. 2016. https://www.hsaj.org/articles/142.

    20. Michael D. Selves, Local Emergency Management: A Tale of Two Models, July 27, 2004. No longer available from www.training.fema.gov.

    21. President Obama, Presidential Study Directive 1, February 23, 2009, pp.1–2. Accessed March 14, 2016. http://fas.org/irp/offdocs/psd/psd‐1.pdf.

    22. Richard S. Dunham, Obama defends climate bill’s cap‐and‐trade plan, Hearst Washington Bureau Thursday, San Francisco Chronicle, June 25, 2009. Accessed March 14, 2016. http://www.sfgate.com/green/article/Obama‐defends‐climate‐bill‐s‐cap‐and‐trade‐plan‐3294664.php.

    23. Road Map for National Security: Imperative for Change, The Phase III Report of the U.S. Commission on National Security/21st Century, The United States Commission on National Security/21st Century, February 15, 2001. Accessed March 14, 2016. http://www.au.af.mil/au/awc/awcgate/nssg/phaseIIIfr.pdf.

    24. Dennis C. Blair, Director of National Intelligence, February 12, 2009, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, pp. 41– 43. Accessed March 14, 2016. www.intelligence.senate.gov/sites/default/files/hearings/blair%20(1).pdf.

    25. National Defense Strategy, June 2008, p.5. Accessed March 14, 2016. http://archive.defense.gov/pubs/2008NationalDefenseStrategy.pdf.

    26. Road Map for National Security: Imperative for Change, The Phase III Report of the U.S. Commission on National Security/21st Century, February 15, 2001, p. 38. Gary Hart and Warren B. Rudman, Co‐Chairs. Accessed March 14, 2016. http://www.au.af.mil/au/awc/awcgate/nssg/phaseIIIfr.pdf.

    27. Testimony of General Charles F. Wald, United States Air Force (Ret.), Member, Energy Security Leadership Council, Before the U.S. Senate Committee on Foreign Relations May 12, 2009. Accessed March 14, 2016. http://www.foreign.senate.gov/imo/media/doc/WaldTestimony090512p1.pdf.

    28. The Honorable Jimmy Carter, Former President of the United States, Hearing Before The Committee On Foreign Relations United States, May 12, 2009. Accessed March 14, 2016. http://www.foreign.senate.gov/hearings/energy‐security‐historical‐perspectives‐and‐modern‐challenges http://www.cartercenter.org/news/editorials_speeches/BostonGlobe‐energy‐security‐hearings.html.

    29. The White House Office of Faith‐based and Neighborhood Partnerships. https://www.whitehouse.gov/administration/eop/ofbnp.

    30. DHS Center for Faith‐based & Neighborhood Partnerships. https://www.dhs.gov/dhs‐center‐faith‐based‐neighborhood‐partnerships.

    31. FEMA’s Voluntary, Faith‐Based, & Community‐Based Organizations. http://www.fema.gov/voluntary‐faith‐based‐community‐based‐organizations.

    32. The terms Office, or Department, or Agency of Emergency Services, or Emergency Management, or Homeland Security are, or should in practice be, synonyms. HSEM covers them all.

    33. The 2014 Quadrennial Homeland Security Review, p. 5. Accessed March 14, 2016. http://www.dhs.gov/sites/default/files/publications/2014‐qhsr‐final‐508.pdf.

    34. James R. Locher III, The Most Important Thing: Legislative Reform of the National Security System, p. 20. Accessed March 14, 2016. http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_2008IAR0630_art006.pdf. James R. Locher III was the Executive Director of the Project of National Security Reform. The Project on National Security Reform was established to assist the nation as it seeks to better equip itself to operate in this 21st century security environment… It has ended operations. www.pnsr.org/

    35. The 2014 Quadrennial Homeland Security Review, p. 18. Accessed March 14, 2016. http://www.dhs.gov/sites/default/files/publications/2014‐qhsr‐final‐508.pdf.

    36. The 9/11 Commission Report. Ch. 11, p. 339.

    37. Albert Einstein.

    38. James Surowiecki, The Wisdom of Crowds, c. 2005, p. 11.

    39. National Strategy for Homeland Security, Homeland Security Council, October 5, 2007, p. 3. Accessed March 15, 2016. http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf.

    40. This is the author’s definition. There is not yet an agreed upon definition.

    41. National Strategy for Homeland Security, Homeland Security Council, October 5, 2007, p. 3. Accessed March 15, 2016. http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf.

    42. The USA Patriot Act, 107th Congress, 2001. Accessed March 15, 2016. https://www.congress.gov/bill/107th‐congress/house‐bill/3162

    http://www.gpo.gov/fdsys/pkg/BILLS‐107hr3162enr/pdf/BILLS‐107hr3162enr.pdf.

    43. The Homeland Security Act, 2002, November 25, 2002. Accessed August 2, 2015. http://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf

    https://www.congress.gov/bill/107th‐congress/house‐bill/5005.

    44. This compilation tells the story of the creation and the organizational history of the first five years of the Department of Homeland Security through its founding documents…Brief Documentary History of the Department of Homeland Security: 2001–2008. March 15, 2016. https://www.hsdl.org/?view&did=37027.

    45. HSDL. Accessed August 2, 2015. https://www.hsdl.org/?collection&id=4#National_Security.

    46. The Stafford Act. Accessed March 15, 2016. http://www.fema.gov/media‐library‐data/1383153669955‐21f970b19e8eaa67087b7da9f4af706e/stafford_act_booklet_042213_508e.pdf.

    47. PKEMRA, PUBLIC LAW 109–295—OCT. 4, 2006, Begins at Title VI. Accessed March 15, 2016. http://www.gpo.gov/fdsys/pkg/PLAW‐109publ295/pdf/PLAW‐109publ295.pdf.

    48. … after the first National Security Council meeting, the President turned to the Attorney General and said very simply, ‘John you make sure this does not happen again.’ The Attorney General then turned to the men and women of the justice [sic] and asked for a very carefully vetted set of proposals that would serve to prosecute the war against terrorism on the short term and to win that war in the long term…

    The USA Patriot Act served a very, very central purpose. That is to update the law to the technology so that the terrorists and other criminals … can not evade investigations simply by switching cell phone [sic] or changing from phone to internet. And likewise and much more significantly, Congress allowed for the criminal investigators to communicate with our intelligence investigators and vice versa. So when all hands are on deck, in order to fight the common fight against terrorism the right hand knows what the left hand is doing so that we can coordinate action … contrary to the law of separation that existed prior to the USA Patriot Act… Viet Dinh, principal author of the Patriot Act, interview by Bryant Gumbel, Sacrifices of Security with Bryant Gumbel and Gwen Ifil, 07/15/2003. Accessed March 15, 2016. http://www.pbs.org/flashpointsusa/20030715/infocus/topic_03/trans_pat_act.html.

    49. David Heyman and James Jay Carafano, Ph.D., Homeland Security 3.0, Building a National Enterprise to Keep America Safe, Free, and Prosperous, The Heritage Foundation Special Report, Center for Strategic and International Studies, SR‐23, September 18, 2008, p. 3. Accessed March 15, 2016. http://www.heritage.org/research/reports/2008/09/homeland‐security‐30‐building‐a‐national‐enterprise‐to‐keep‐america‐safe‐free‐and‐prosperous.

    50. Homeland Security Act, 2002, sec. 231(a). Accessed March 15, 2016. https://www.congress.gov/bill/107th‐congress/house‐bill/5005.

    51. For detailed discussions of the problem of definition see: Terrorism: A Very Short Introduction, ch. 1, by Charles Townshend, Oxford University Press, 2011; and Inside Terrorism, ch. 1, by Bruce Hoffman, Columbia University Press, 2006.

    52. Homeland Security Act, 107th Congress, 2002, sec. 2(15). Accessed March 15, 2016. http://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf

    https://www.congress.gov/bill/107th‐congress/house‐bill/5005.

    53. 18 U.S.C. 2331. Accessed March 15, 2016. http://uscode.house.gov/view.xhtml?path=/prelim@title18/part1/chapter113B&edition=prelim.

    54. 18 U.S.C. 2332b. Accessed March 15, 2016. http://www.gpo.gov/fdsys/pkg/USCODE‐2011‐title18/html/USCODE‐2011‐title18‐partI‐chap113B‐sec2332b.htm

    55. 22 U.S.C. sec. 2656f(d), 2013 ed. Accessed March 15, 2016. http://www.gpo.gov/fdsys/pkg/USCODE‐2013‐title22/html/USCODE‐2013‐title22‐chap38‐sec2656f.htm.

    56. United Nations. Accessed March 15, 2016. http://www.un.org/documents/ga/res/49/a49r060.htm.

    57. United Nations. Accessed March 15, 2016. http://www.un.org/press/en/2004/sc8214.doc.htm, http://www.cfr.org/international‐organizations‐and‐alliances/un‐security‐council‐resolution‐1566‐terrorism/p11223.

    58. Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1‐02, as amended through 15 Feb. 2016, p. 241. Accessed March 15, 2016. http://fas.org/irp/doddir/dod/jp1_02.pdf.

    Army Field Manual 3‐0, 27 Feb. 2008, at 2‐60. Accessed March 15, 2016. http://downloads.army.mil/fm3‐0/FM3‐0.pdf.

    Code of Federal Regulations. 28 CFR 0.85(l). Accessed March 15, 2016. http://www.gpo.gov/fdsys/pkg/CFR‐2010‐title28‐vol1/pdf/CFR‐2010‐title28‐vol1‐sec0‐85.pdf.

    FEMA. Section 4.1, p. 148. Accessed March 15, 2016. http://www.fema.gov/pdf/areyouready/terrorism.pdf.

    59. FBI, Hate Crimes. Accessed June 13, 2016. https://www.fbi.gov/about‐us/investigate/civilrights/hate_crimes.

    60. 18 U.S.C. sec. 249. Accessed June 13, 2016. https://www.law.cornell.edu/uscode/text/18/249.

    61. We lack insight into specific details, timing, and intended targets of potential, current US Homeland plots, although we assess al‐Qa’ida continues to pursue plans for Homeland attacks and is likely focusing on prominent political, economic, and infrastructure targets designed to produce mass casualties, visually dramatic destruction, significant economic aftershocks, and/or fear among the population. Dennis C. Blair, Director of National Intelligence, February 12, 2009, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, p.6. Accessed October 1, 2016. http://www.au.af.mil/au/awc/awcgate/dni/threat_assessment_12feb09.pdf.

    62. Legal Authorities for NRF. Accessed August 2, 2015. http://www.fema.gov/pdf/emergency/nrf/nrf‐authorities.pdf.

    63. Lieutenant General Russell L. Honore, USA (Ret.), March 13, 2008, Third Annual Homeland Defense and Security Education Summit. George Washington University. March 13, 2009.

    64. Top Ten Challenges … Homeland Security Advisory Council, September 11, 2008, pp. 11–12. Accessed August 15, 2015. http://fas.org/irp/agency/dhs/topten.pdf.

    65. See, The Edge of Disaster, by Stephen Flynn, 2007, for several well described existing, predictable infrastructure failures.

    See, The Really Big One. An earthquake will destroy a sizable portion of the coastal Northwest. The question is when.? by Kathryn Schulz, The New Yorker, July 20, 2015. Accessed March 15, 2016. http://www.newyorker.com/magazine/2015/07/20/the‐really‐big‐one.

    2

    METACOGNITION AND ERRORS IN JUDGMENT RELATED TO DECISION‐MAKING IN HOMELAND SECURITY

    Angi English

    Decision‐making and judgment in complex environments is difficult and fraught with error‐making potential. This is in part due to the way the brain processes information and how people have evolved in social environments to attach meaning to any given input. The human brain is the most complex organ in the entire universe. It has 100 billion neurons and can create over 100 trillion synapses booting up each morning at full capacity ready to take on numerous inputs.¹ Over eighty billion massively interconnected neurons form the most complex parallel‐processing biological computer imaginable, and it’s right there in your head controlling your every move.² Millions of bits of data flow into our brains through our five senses: sight, hearing, touch, smell, and taste. An estimated eleven million bits of data flow from the senses every second; all of us regularly rely on the gist of things in our reasoning, while only a woeful fifty bits of information per second make it to our conscious brain.³ When people talk about the mind, they are usually referring to the conscious mind. Conscious thought has such a dominating influence on us that we naturally overlook the fact that most of what goes on in our brain actually happens unconsciously.⁴ Despite its wonderful complexity, the mind is not always a perfect calculating machine and often uses shortcuts such as heuristics, or rules‐of‐thumb thinking and biases to help guide the decision‐making process. Heuristics are simple, efficient rules – either hardwired in our brains or learned – that kick in on occasion, especially when we're facing problems with incomplete information, while cognitive biases are any inclination toward a particular belief or perspective – most often one that is ill‐supported by reason or evidence.⁵ Heuristics and biases are not all bad, but they can keep us from making the most appropriate decision in an environment that is complex. The brain also looks for patterns and clusters of information to make sense of the world. This chapter will explore how the brain and its subsequent thinking processes are influenced by the organic mechanisms of the brain, the social dynamics of groups and the social construction of reality by people in general.

    THE TRIUNE BRAIN

    For the purposes of this chapter, the triune brain model is useful in understanding the basic organic structure of the brain and how it relates to ways we think. The triune brain has three basic regions – the brainstem, the limbic area, and the prefrontal cortex.⁶ The triune brain model, originally developed by Paul MacLean in 1990, postulated an understanding that each of these areas of the brain work together as one.⁷

    The Brainstem

    The brainstem is commonly referred to as the reptilian brain.⁸ The brainstem receives input from the body and sends information back down to regulate the basic physical processes of the body such as the functioning of our heart and lungs.⁹ The brainstem helps us determine if we are hungry and recognize other states of arousal such as sexual desire. Clusters of neurons in the brainstem also come into play when certain conditions seem to require a rapid mobilization of energy distribution throughout the body and brain.¹⁰ This so‐called fight–flight–freeze response is responsible for our survival at times of danger. Working in concert with the evaluative processes of both the limbic and the higher cortical regions, the brainstem is the arbiter of whether we respond to threats either by mobilizing our energy for combat or for flight, or by freezing in helplessness, collapsing in the face of an overwhelming situation.¹¹ When we feel a strong drive to behave in a certain way, chances are the brainstem is working closely with the limbic area of the brain.¹²

    The Limbic Region

    The Limbic area of the brain operates many of our emotions and motivations, particularly those that are related to survival. There are three main parts to the limbic system: the amygdala, the hippocampus, and the hypothalamus.¹³

    Amygdala – The amygdala is an almond‐shaped organ involved in emotional responses, hormonal secretions, and memory. The amygdala is responsible for fear conditioning or the associative learning process by which we learn to fear something.¹⁴ The part of the brain where the instinctive fight, flight or freeze signal is first triggered is in the amygdala. It receives incoming stimuli before other parts of the brain have time to think things over. Subsequently, in an ongoing response to potential peril, the brain assures that we are likely to feel more and think less.¹⁵ In other words, the wiring of the brain in our evolutionary history is such that connections from the emotional systems to the cognitive systems are stronger than connections from the cognitive systems to the emotional systems.¹⁶

    Hippocampus – The hippocampus acts as a memory indexer – sending memories out to the appropriate part of the cerebral hemisphere for long‐term storage and retrieving them when necessary.

    Hypothalamus – The hypothalamus is an organ about the size of a pearl in the limbic region. Responsible for a multitude of functions, it wakes us up each morning, and gets our adrenaline flowing. The hypothalamus is also an important emotional center, controlling the molecules that make you feel exhilarated, angry, or unhappy.¹⁷

    The Prefrontal Cortex

    The most recently developed part of the human brain – the prefrontal cortex – enables self‐reflective, abstract thought. We can think about ourselves as if we are not part of ourselves.¹⁸ In other words, it allows us to think about thinking, also called metacognition. Beyond the bodily and survival concerns of the brainstem, beyond the evaluative and emotional limbic functions, beyond even the perceptual processes of the posterior cortex and the motor functions of the posterior portion of the frontal lobe, we come upon the more abstract and symbolic forms of information flow that seem to set us apart as a species in the prefrontal cortex.¹⁹ It is in this prefrontal realm that representations of concepts such as time, a sense‐of‐self, and moral judgments are made.²⁰ In other words, this is the main integration center for the triune brain model where patterns and clusters of information are formulated.

    THE PATTERN‐SEEKING BRAIN

    The human brain seeks efficiency through the use of patterns and clusters of information to make predictions and assumptions about the world. Often, the brain’s need for order in pattern‐making and predictability by making assumptions, can lead to making patterns where there are none. Through the pattern recognition of the brain, the world appears more orderly and more predictable.²¹ However, this drive for pattern recognition may seek out causal relationships between events where there are none, which can lead to errors in judgment. Usually the brain uses familiar patterns because we’ve known them to be true in the past. However, this over‐reliance on our favorite patterns, limits our choices and problem solving ideas.²² The human brain evolved to identify patterns by connecting pieces of information in our environment and while this hardwired habit has been vital to our survival and generally serves us well, it also leads us to make something out of nothing.²³ The key point here is that the brain uses a lot of what it already knows to make sense of the world, even when presented with brand new information, which makes us prone to biases.

    NEGATIVITY BRAIN BIAS

    Have you ever noticed that negative comments have the potential to hold your attention longer than positive comments? Why do insults hurled at us stick inside our skull, sometimes for decades?²⁴ The answer is, for the same reason political smear campaigns outperform positive ones – nastiness just makes a bigger impact on our brains.²⁵ This is the brain’s negativity bias at work. Negativity bias has its roots in our evolutionary history because our very survival depended on our skills of recognizing and dodging danger.²⁶ Negative information has more weight because it is linked to our ancestral survival brain. Negativity bias is linked to prospect theory, when people have a pronounced risk aversion when decisions about uncertain outcomes are framed in terms of negative results.²⁷ When intense negative emotions are involved, as in the case of terrorist threats, our attention is captured by the dreaded outcome, and we overlook the relatively small chance of the threat actually occurring.²⁸ Such probability neglect is an important contributor to sustaining disproportionate fears of terrorism.²⁹

    Our Social Brain

    The human brain evolved to solve problems in the physical environment first, for example, food and shelter needs. In modern times, for many of us, the ancestral brain no longer needs to be focused on basic survival needs – instead we focus on each other.³⁰ Humans have come to rely on each other to get their needs met and most desperately want to be included in social groups. We are hardwired to connect with each other. We socially influence each other, meaning thoughts, feelings, ideas, and behaviors are all contagious.³¹ Amazingly, our brains are so wired to connect that it practices doing actions we merely observe in others, as if we were doing them ourselves.³² If you’ve ever watched an intense fan at a basketball game, you know what this looks like – the fan twitches at every mistake, aching to give his motor actions to the players on the court. When we see players run, jump, or shoot, it is not only our visual cortex or even the part of our brain that thinks about what we are observing that is activated, but

    Enjoying the preview?
    Page 1 of 1