Ebook647 pages13 hours
Next-Generation Homeland Security: Network Federalism and the Course to National Preparedness
By John Morton
Rating: 0 out of 5 stars
()
About this ebook
Security governance in the second decade of the 21st century is ill-serving the American people. Left uncorrected, civic life and national continuity will remain increasingly at risk. At stake well beyond our shores is the stability and future direction of an international political and economic system dependent on robust and continued U.S. engagement. Outdated hierarchical, industrial structures and processes configured in 1947 for the Cold War no longer provide for the security and resilience of the homeland. Security governance in this post-industrial, digital age of complex interdependencies must transform to anticipate and if necessary manage a range of cascading catastrophic effects, whether wrought by asymmetric adversaries or technological or natural disasters. Security structures and processes that perpetuate a 20th century, top-down, federal-centric governance model offer Americans no more than a single point-of-failure. The strategic environment has changed; the system has not. Changes in policy alone will not bring resolution. U.S. security governance today requires a means to begin the structural and process transformation into what this book calls Network Federalism. Charting the origins and development of borders-out security governance into and through the American Century, the book establishes how an expanding techno-industrial base enabled American hegemony. Turning to the homeland, it introduces a borders-in narrative—the convergence of the functional disciplines of emergency management, civil defense, resource mobilization and counterterrorism into what is now called homeland security. For both policymakers and students a seminal work in the yet-to-be-established homeland security canon, this book records the political dynamics behind the creation of the Department of Homeland Security, the impact of Hurricane Katrina and the ongoing development of what is now called the Homeland Security Enterprise. The work makes the case that national security governance has heretofore been one-dimensional, involving horizontal interagency structures and processes at the Federal level. Yet homeland security in this federal republic has a second dimension that is vertical, intergovernmental, involving sovereign states and local governments whose personnel are not in the President’s chain of command. In the strategic environment of the post-industrial 21st century, states thus have a co-equal role in strategy and policy development, resourcing and operational execution to perform security and resilience missions. This book argues that only a Network Federal governance will provide unity of effort to mature the Homeland Security Enterprise. The places to start implementing network federal mechanisms are in the ten FEMA regions. To that end, it recommends establishment of Regional Preparedness Staffs, composed of Federal, state and local personnel serving as co-equals on Intergovernmental Personnel Act (IPA) rotational assignments. These IPAs would form the basis of an intergovernmental and interdisciplinary homeland security professional cadre to build a collaborative national preparedness culture. As facilitators of regional unity of effort with regard to prioritization of risk, planning, resourcing and operational execution, these Regional Preparedness Staffs would provide the Nation with decentralized network nodes enabling security and resilience in this 21st century post-industrial strategic environment.
Related to Next-Generation Homeland Security
Related ebooks
Your Government Failed You: Breaking the Cycle of National Security Disasters Rating: 4 out of 5 stars4/59/11 Report: Final Report of the National Commission on Terrorist Attacks Upon the United States Rating: 0 out of 5 stars0 ratingsHomeland Security: Assessing the First Five Years Rating: 0 out of 5 stars0 ratingsUnited States of America – Right Now: Distortion of the Dream Rating: 0 out of 5 stars0 ratingsThe 9/11 Commission Report: Full and Complete Account of the Circumstances Surrounding the September 11, 2001 Terrorist Attacks Rating: 0 out of 5 stars0 ratings9/11 Final Report of the National Commission Rating: 0 out of 5 stars0 ratings9/11 Final Report: Official Statement of the National Commission on Terrorist Attacks Upon the United States Rating: 0 out of 5 stars0 ratingsGoverning Security: The Hidden Origins of American Security Agencies Rating: 0 out of 5 stars0 ratingsThe Closing of the American Border: Terrorism, Immigration, and Security Since 9/11 Rating: 0 out of 5 stars0 ratingsAmerica the Vulnerable: How Our Government is Failing to Protect Us Against Terrorism Rating: 3 out of 5 stars3/5Open Target: Where America Is Vulnerable to Attack Rating: 2 out of 5 stars2/5The 9/11 Commission Report Rating: 1 out of 5 stars1/5Projections of Power: Framing News, Public Opinion, and U.S. Foreign Policy Rating: 4 out of 5 stars4/5The Commission Report on 9/11 Rating: 0 out of 5 stars0 ratingsProxy Warriors: The Rise and Fall of State-Sponsored Militias Rating: 0 out of 5 stars0 ratingsThe 9/11 Report: The National Commission on Terrorist Attacks Upon the United States Rating: 4 out of 5 stars4/5Killing Detente: The Right Attacks the CIA Rating: 4 out of 5 stars4/5Living with the UN: American Responsibilities and International Order Rating: 0 out of 5 stars0 ratingsPresidential Secrecy and the Law Rating: 0 out of 5 stars0 ratingsIntroduction to Homeland Security: Principles of All-Hazards Risk Management Rating: 5 out of 5 stars5/5Govern Like Us: U.S. Expectations of Poor Countries Rating: 0 out of 5 stars0 ratingsDivision: Chandler Scott, #3 Rating: 0 out of 5 stars0 ratingsVolunteers: 2047 - A Murder of Consequence Rating: 0 out of 5 stars0 ratingsSquandered Opportunity: Neoclassical Realism and Iranian Foreign Policy Rating: 0 out of 5 stars0 ratingsWho Governs?: Emergency Powers in the Time of COVID Rating: 0 out of 5 stars0 ratingsWastrels of Defense: How Congress Sabotages U.S. Security Rating: 0 out of 5 stars0 ratingsEbenezer: National Security from a Biblical Perspective Rating: 0 out of 5 stars0 ratings24 Hours Inside the President's Bunker: 9-11-01: the White House Rating: 0 out of 5 stars0 ratings
Politics For You
The Prince Rating: 4 out of 5 stars4/5The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health Rating: 4 out of 5 stars4/5The Anarchist Cookbook Rating: 2 out of 5 stars2/5The Great Reset: And the War for the World Rating: 4 out of 5 stars4/5Sex Trafficking: Inside the Business of Modern Slavery Rating: 4 out of 5 stars4/5The Girl with Seven Names: A North Korean Defector’s Story Rating: 4 out of 5 stars4/5The Parasitic Mind: How Infectious Ideas Are Killing Common Sense Rating: 4 out of 5 stars4/5Daily Stoic: A Daily Journal On Meditation, Stoicism, Wisdom and Philosophy to Improve Your Life Rating: 5 out of 5 stars5/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5The Great Awakening: Defeating the Globalists and Launching the Next Great Renaissance Rating: 4 out of 5 stars4/5The U.S. Constitution with The Declaration of Independence and The Articles of Confederation Rating: 5 out of 5 stars5/5Disloyal: A Memoir: The True Story of the Former Personal Attorney to President Donald J. Trump Rating: 4 out of 5 stars4/5The Gulag Archipelago [Volume 1]: An Experiment in Literary Investigation Rating: 4 out of 5 stars4/5Fear: Trump in the White House Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 3 out of 5 stars3/5The Only Plane in the Sky: An Oral History of 9/11 Rating: 5 out of 5 stars5/5On Palestine Rating: 4 out of 5 stars4/5The Republic by Plato Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5The January 6th Report Rating: 4 out of 5 stars4/5Ever Wonder Why?: and Other Controversial Essays Rating: 5 out of 5 stars5/5Blackout: How Black America Can Make Its Second Escape from the Democrat Plantation Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Rating: 4 out of 5 stars4/5Speechless: Controlling Words, Controlling Minds Rating: 4 out of 5 stars4/5
Reviews for Next-Generation Homeland Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Next-Generation Homeland Security - John Morton
ݡNa book_preview_excerpt.html ˒ג-+ѓnH1IQc*K&dV9j
7
@LBSPg;6}?ї I6:b}e_m.W.>}|w_߽~ٻ_?\~uշs;6_Ue)\(/Λ|7;חM[E[?7x䋷M7v|w_?^W.];zzR=+s7˺~=iK,[ěյ62r<_,>8}XvőUUjw<ɷ7~qRk
yhB+fMظ]1m,_M[}YȿZH+MDuAr6~voWMy5,zUlM̛`WZ?oZ|5nXxwu+o?҃tݮfRܖbMu@xۖ=l
};̄tkߞ)gkwxsPjVr崬Wfx!߄+DIq'tk>^n6;?diYQ.tL͙moֳn]=)Kn}/EUklPy[_+,sN>>>I/NOe/sݻw'O@ׁFI@?;<:)>mZЍqb[قp6=/e_z|'*Uţ9N>e'/˶9h˚o>L&9o6ۦ+Ag78Dň ""qWᅏ?EN~]pn
BSvѡYzʳQ9Bݞ_$a^mm-oQrJfq!3ZOcsBW|2T%ʵnQ6Př𘐪lOpe~簬WP:!݁$/n^nϊ]Q,O`f?ek=O7M5pdBnyXYٖ8Bλ脾s*uSa7jκlU!+s|Sk]^j)ֿ.3~ӷ>[͋Q}(W.Wgo oo!"[p"|/n@~_.~8'n &R-^^={ƿBǾ
$ϐG%+IpB8~kĖmU ~%`cQc<;B/Rpj3⣱L\nVRU+]V|
rQ?W_zo~sv@iNx\}ss^ռ6=ʓaA{r͏5cء>BC^eLh]rT͖z[*L">Y[OgE^m>W|-0%.&ץnޖ#+.\G}v=?dwrю5`o>iS܊ژS;oJ}l&fI]#ngϓ{;7ĵN979\E%ֵ5\b#I]>jhM=}-v}
C
B%1BB[BjnštݑP뇅%m(V(Brlm$8m{zCR%ݮLI[)E}Mde^hZ|:J0) xtOȇ`KRыi
Ԥ1eXyBɭI6s+n[tds-|?M3wZE&:6}^eJuUі<@n~qȯajLˢZEQO~1)|)\+CZw[w3FwEZ<>9jn87LK7TrjhB.Eُ>Gp媍9Ozb`bNhb Ju
2'Jߋ;1y'͓z5v&OTgBIU}7)D6]uMpa4v15;{&^(1(''1â|wBXfɿxpS{'IdLJ+y/G|I.|5Fn dBltU:p{O}`n#0x?GVg4Ļ
%̞j!l!TrP6uk8o7An_
Y'EcUS'J.j 'd^b[~Q`CF@xdVP?m1qo/5#x0QÍG/벇I|X5C7eTcg{-\LJxM\y_B5;)̹E=kɻUek*9qrmy༞i[ny'EO3x
R~/e{/DNٵ
gn}R[uZK -r>Zz%w^O Za2~HmD$֝9Y/2z57ڝ-MJ!{ EӂPrɼd^^TY˒PRN_aWhI,IfvS
ߒ ;nJ|rDDLk:s)BfQH;a!Rд|.ӸM4U@zh$7 oíb6BRyx.bF)Zu1t_]졹$J
MYAZwb-rjuiQb[?Ռ&_cg=/ͤ3B>u6h``LӊE4 F<#.rI 8[ߴ+1h
c&2~mte}}}S~rRȪxG=)zB-=@75w8tbdlpF~DהD@H3i2Rj!CmjmU 8n&g>V$yY`f2ږҵARu ow"W`[EykCns!J[fW[qwcb[No?BX^k sWJ"Q"gH azݟi6_S+u@2(Nux9pQ5ަ$ĺD6)Cb?n!}
@[8R>Zp 9Q+ދ9ԣM
|[+0GQ\o&FU$1HfRPKYBH%j$!Κ'5EM{Cx#w7@8;VzXeW
Y1YfDvJ.˹qJ#Z4+s؞\:/
QWK;ѿ&WLMݨCӊ?HB\0'4lp1Fۆ29:\]⏥Lf)oʅHybQvխukaWKbԴb6y1|C%Tu^ ~n`+fL*\ULEw\&zpHDxXd=M0ʘ:@GhF|!zQfpEv7s^:-t|B0\!D@)uxDO+D)TdOIXIU8WyigH86ЀtEmHi `+CXr<sK'
_!Xh3 *DpnNE?G.4
BK8e] ¹mSKPkqj]Mxzoe">khnQuk'"B68+"^cvZv4
2$feD^pb9dbJ~gE D;ޖ1!2~U UVnԷG-,f~$~S2Nؙ+R'E5E3["]PL(]M'=UKUw[D2)%QjN[,x2e3L<<joN4D18Lr癧k
^5SC5Š,#BoxqA)43@(^9-JL- gRY~VP[FoʤbJVࢷ_>IcYH/-,-X)\+1)3>IlskUePYv{هf'cE%LWT̝ߩ;3pUĺ^-:3ܢ/"z1[U\f9i%9ec0F&8#DUIky؝yd%̋g|J$̾Q+Eq)}i~&
"vZ'r%odw lcH$~7Ovr+5rFf&\0X%&YQȐ9!Nh- dT%x!j)|E]SȒ*eѺeLVe'
DY
4L)-4)1fE-|<*0l/r+x x@2gB79SQ! LRDU#|bC" Hl|pՄԸr3_0P|Bƈ|WZ=fP(jyGiڢƫ - R^î&.тR+adcfԇ2(er,Pg6*ͽKn/GU$#|GxY>\R||岇߮Kaa9t[. ʚ%Vm,ABdd5*l("YhjĎ5rekƑ1!YbS q^5.+ŻLDžݪ ZĊں7x./
N ,qe.Z
feD~|si%ʭK3!V:ivu::v©HpLT2b~a}!(3/ />
1frQVGN_ Cȁ(gb>d
9b[ġt
fe?խ`i\N乭[vROGx7C)W0C1H cMAq6v,z1[Q߆Ȑ&cNe-MW=~ىs>Ģ(y0oQ(eVDF+o)`K-j&;ѝ܈bm1#\J!jaa$м6+F8Lh47ʄ%3WJ&j(Wi@E։.OUh!<䚂aPj hcC>,a 5%ʭaC`IeXj@ЪEּV3*aA%X0y$"c"KY=FdP*z:BF )QA}!L#
p]8hZs6ŋ"KʊoVJ<=m[NcJbb#MkJǸ8eyЩ;v2b^eUH8**bQ(\}~H\AGC@ܝeidˬomax(
BQm`eEa,-3tSc+
C飠i]<&ډoYPePJLS3B>-E :KBQt6@bLtWq$g4M+jEn"%0)`
% G0㲥6&Z|[~
,C7oNíxO:+jdxs2qJĖ@Gs.qwzwӐiSvh$ӄNB$,I4E6˝ek-I;e!n\3byMVsBU"l<
!;f(å-2^t"bp >t)k5߱z{HDX?%
C#YT4_/Qjɦ@{SnsJ
, AwF7ph33y(T
3uߨ
g!1C,4m%
n._;ZՍ*+wvzi\҇97jY,f`
O"|"Pϝy
e;bY@0(/Zw[[br#!06tQͶK}(*0X@O&f1#̩>s]ډИВ94\jTkɢsnS+w/b|SSF癰,6s kKUK|-Ia P4\k
-GX |
~d]Fj k SMOOCϿCLNxt" [AyڍW;}ϛ _?oڪz7އ
eo|06'~0+b(&lTUӀ! Ti ˥C=o@)\q^Z*Y6uCLIjY%R"uDDGw~m2h,;D feQbErdJFd8^l [73bG*>WxVeL12K,2 PVKX59y79蘿^GD7] ~q7VNU,[.z
xTP7Qw?cI]ڏu'0F8_uFɨ)k"e/<Z&ӯp!6 g-z+cAt=SuEdtyҌ\x,4xJAMByF:s~u5ĕwQ&LwwB݊IY!?n&4Yj< [ zK.*
y,[zH_
ŠGk/;W]
)C#q [u'[|C;l:\)\J/b!PhHC4At3]yfZEk\j8 ) Wnt'PXeeE{L#G5JkXWLs j5],$h$@V&
yťD\ɐR\Q29#N7w4 !ə'چRs3:&bH=hԱ@H\Q2b42
ɖ'?zbicZԇm"4XHo,"/D0cQC8ἳ=U[iC@^-6ڋ)lݳuUئdb;\G͡g)}maI[m#oUyTˈi˅9Sp.h[[ӀK#\^v`sQ'5bŎl
+1h"
Zv,Q>4;!
jS؈WQķ,gܖڠL]N{QkRֳ}Ga@Co8_u.HyW{ؐ_{)r
-> <>Qv+#,pS>^>9L(a)OEQu6phPyp(0"$yfa|=zG\JaINb
P+YbYk_0V`8|6 o\F*"^ӾZwFBnn6
{`OO昉'wȡ+kMid]$x@R_'Nnebe! 16ȃ ^qIӰ
eL f!̧EϾ;|]7(+r'A wϟN[V[42.@0p!7XUlsrFãZ
֎D[B{'ɻp R[ă!lϴ-E,Juh}=+Lwi+%Y
F5 R,ҴbIrA}+dZy?Vv^HU*xznbw8Vki_ dnʛI[XeʸF^EAL}WR*jò_srʱFʂ ,y7s[y㥑ons7a[<Ø1wQ]].P
SM+s_ ~9tk{iwH,F|P#C,
I="AT%U5Y~9WߜcI7۾ f/)XgۭWМ*Wc1Oȵa֟أmC,'*P#"dh3YȁQEGEϯU">/+[Sęw{pr1,-_DTonsFoDU
@VᴬUNpv`篫50Yܬ4HI6Bh$s# 84yS51" LE}|4Q#[YD5Zt@Pm5h-?8_Kwn܊L;qMfX})fIb6,Vdތ8r?)E|PHܓ6&BC;TnUE+<˕!]IL*{BwBsjKt4mfNJ ^vFCMXBIo-:y^XѮ!&cQ`f՞M2M4/*E彐$A1Ae0;nbGL!
':+RB, L)YʉgFY~e7%XK.3N4y@öuӬkil˄
QMJF2?wR8hdsS-r?Շm0n-[a1)];Nac^xh9 C@(qۘ
)GC+u'UjcYfc-<(ېR:!/v0H'yxZG1R {jz[j1e6խm Bm{.%MGeC#W^h^%ݜ&693g!ibd9Ix,{a0ev^-[)Gm~RB03oڭԺS-*f55(BOVj *ؑ/qߧڸ%|!n4ݹ#Rr7ꧤFti럂Cv3IEs a#}Reݍ?Y95)Cq(Tyov=!hct#EL4s'JӃ0
rPҩ19Ju"D\Λ%WRwsG:Hha6[T07U.wх>"1