“In the two decades since 9/11 the United States has been forced to deal in a new
area of public policy – Homeland Security – that lies between two heretofore well
understood areas – National Security and Law Enforcement. National Security dealt
with threats from abroad while Law Enforcement, or more broadly public safety,
dealt with internal threats. Both were underpinned with ample theory. In the rush
to ‘do something about’ Homeland Security there has been precious little intellectual capital spent on developing the needed theoretical underpinnings. In Theoretical
Foundations of Homeland Security: Strategies, Operations and Structures, Ramsay,
Cozine, and Comiskey have done this labor for us, in a readable and well thought out
explication of the theory that should support such a broad integrated effort at all
levels of government, including the private sector, including academia”.
—Barry Zulauf,
Professor of Applied Intelligence
at Georgetown University, and President of IAFIE
“Theoretical Foundations of Homeland Security: Strategies, Operations and
Structures stands as one of the most significant contributions to the scholarship of
homeland security studies. In developing the first-ever homeland security textbook
specifically dedicated to theory; Ramsay, Cozine, and Comiskey have set a solid
foundation upon which future scholars of this emerging discipline can build. In every
regard, this textbook skillfully sets out and explains the related theories that have
contributed to the emergence and evolution of the homeland security enterprise—
ultimately forming the basis for an integrated theory of homeland security. This book
is a must for inclusion in any homeland security or related academic program and
also serves as a valuable tool for practitioners in the field”.
—Kelly W. Sundberg,
Mount Royal University, Fellow, Canadian Global Affairs Institute,
Former Senior Policy Officer with the Ministry of Public Safety Canada,
Citizenship and Immigration Canada Investigator,
and Canada Border Services Agency Inland Enforcement Officer
“Theoretical Foundations of Homeland Security: Strategies, Operations and
Structures is an extremely useful book and an essential contribution to the debates
about the concept of Homeland Security; a concept that is more than the sum of its
parts - national security and internal security. The individual contributions offer up
invaluable insights into the various aspects of Homeland Security and, taken together,
provide an understanding of the concept that is both broad and deep. This book will
be an indispensable resource for academics, students, and policymakers alike”.
—David Strachan-Morris,
Lecturer in Intelligence and Security,
University of Leicester, UK
“Theoretical Foundations of Homeland Security: Strategies, Operations and
Structures takes on the mammoth challenge of developing a grand theory of homeland security. In a single volume, the book presents basic theoretical frameworks
from more than a dozen disciplines that contribute to an understanding of contemporary and future homeland security problems. The text will offer unique value to college courses that seek to integrate practical and conceptual approaches to homeland
security”.
—Chris Bellavita,
Director of Programs for the Naval Postgraduate School’s Center
for Homeland Defense and Security
“Theoretical Foundations of Homeland Security: Strategies, Operations and
Structures is a recognition that acceptable levels of security can vary over time and
across nations, depending upon a variety of factors. I saw this first-hand just within
my three years as U.S. Secretary of Homeland Security. ‘Security’ as we know it is
in reality a continuing effort to strike the right balance between the public’s basic
physical security on the one hand and the preservation of the public’s basic freedom
and privacy on the other. Those in public safety are the guardians of one as much as
the other”.
—Jeh Charles Johnson,
Partner Paul, Weiss, Rifkind, Wharton & Garrison LLP,
and former Secretary, US Department of Homeland Security
“We live at a historic juncture as old notions of threat and security ring hollow and
new paradigms must be currently found. Ramsay, Cozine and Comiskey’s ambitious
book aims to do just that. By drawing on the established understanding in different
areas of scholarship the authors masterfully redefine the field of homeland security
for in the twenty first century. This is much more than a theoretical primer for students and neophytes. This volume will prove invaluable even to seasoned scholars and
practitioners in the field”.
—Allon J. Uhlmann and Stephen McCombie,
Department of Security Studies and Criminology,
Macquarie University, Australia
Theoretical Foundations of
Homeland Security
This new textbook outlines the main theories and concepts from a variety of disciplines that support homeland security operations, structures and strategies.
Following the terrorist attacks of September 11th, “homeland security” (HLS) grew
in importance within the U.S. government (and around the world) and matured from a
concept discussed among a relatively small cadre of policymakers and strategic thinkers to a broadly discussed issue in Congress and society with a growing academic
presence. Yet the ability to discern a theory of homeland security that would support
overall security strategy has been more elusive to both scholars and policymakers.
This textbook aims to elucidate a grand theory of homeland security by leveraging the
theoretical underpinnings of the disciplines that comprise the strategies, operations
and structures of the HLS enterprise. In this way, each chapter contributes to a grand
theory of homeland security as it explores a different discipline that influences or supports a domain of the homeland security enterprise. These chapters cover intelligence
systems, terrorism origins and ideologies, emergency management, environmental
and human security, cybersecurity policy, crime and security, global governance, risk
management, public health, law and policy, technology, interagency collaboration
and the sociology of security.
This book will be essential reading for students of Homeland Security and
Emergency Response, and recommended reading for students of terrorism, intelligence, cybersecurity, risk management and national security.
James D. Ramsay is a professor of Security Studies and coordinator of the Homeland
Security Program at the University of New Hampshire, the United States. He is also
founding chair of the Department of Security Studies.
Keith Cozine is an associate professor and director of the doctoral program in Homeland Security at St. John’s University, the United States. He has a decade and a half of
law enforcement and intelligence experience including nearly ten years with the U.S.
Department of Homeland Security.
John Comiskey is an associate professor of Homeland Security at Monmouth University, the United States. He is a retired New York City Police Department Lieutenant and
U.S. Coast Guard Senior Chief Petty Officer.
Theoretical Foundations of
Homeland Security
Strategies, Operations, and Structures
Edited by James D. Ramsay,
Keith Cozine, and John Comiskey
First published 2021
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
52 Vanderbilt Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
© 2021 selection and editorial matter, James D. Ramsay, Keith Cozine, and
John Comiskey; individual chapters, the contributors
The right of James D. Ramsay, Keith Cozine, and John Comiskey to be
identified as the authors of the editorial material, and of the authors for their
individual chapters, has been asserted in accordance with sections 77 and 78
of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or
utilized in any form or by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying and recording, or in any
information storage or retrieval system, without permission in writing from
the publishers.
Trademark notice: Product or corporate names may be trademarks or
registered trademarks, and are used only for identification and explanation
without intent to infringe.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
Names: Ramsay, James D., editor. | Cozine, Keith, 1972- editor. | Comiskey,
John, 1964- editor.
Title: Theoretical foundations of homeland security : strategies,
operations, and structures / edited by James D. Ramsay, Keith Cozine,
and John Comiskey.
Description: Abingdon, Oxon ; New York, NY : Routledge, 2021. | Includes
bibliographical references and index.
Identifiers: LCCN 2020032411 (print) | LCCN 2020032412 (ebook) | ISBN
9780367201692 (hardback) | ISBN 9780367201708 (paperback) | ISBN
9780429259920 (ebook)
Subjects: LCSH: United States. Department of Homeland Security. |
Terrorism--United States--Prevention. |
Terrorism--Prevention--Government policy--United States. | National
security--United States--Management.
Classification: LCC HV6432.4 .T44 2021 (print) | LCC HV6432.4 (ebook) |
DDC 363.325/15610973--dc23
LC record available at https://lccn.loc.gov/2020032411
LC ebook record available at https://lccn.loc.gov/2020032412
ISBN: 978-0-367-20169-2 (hbk)
ISBN: 978-0-367-20170-8 (pbk)
ISBN: 978-0-429-25992-0 (ebk)
Typeset in Times
by KnowledgeWorks Global Ltd.
To all those who promote and defend liberty around the globe.
Contents
List of figures
List of tables
List of contributors
Foreword
Acknowledgements
List of abbreviations
Glossary
1 Introduction to security theory
xi
xiii
xiv
xvi
xix
xxi
xxiv
1
JAMES D. RAMSAY, KEITH COZINE AND JOHN COMISKEY
2 Risk assessment and the homeland security enterprise
16
BRIAN HARTE
3 The sociology of security
38
TERRENCE O’SULLIVAN
4 Crime and security
58
CHELSEA A. BINNS
5 Terrorism: origins, ideologies and goals
78
KYLE W. MCDONNELL AND KEITH COZINE
6 Interagency collaboration
99
JOHN COMISKEY
7 Emergency management—theories of preparedness,
mitigation, response and recovery
IRMAK RENDA-TANALI
121
x
Contents
8 Global governance and the relationships between nations
148
KEITH COZINE
9 Intelligence and the theory of preventive action
168
ERIK J. DAHL
10 Human and environmental security theory
187
JAMES D. RAMSAY AND TERRY O’SULLIVAN
11 Public health security
208
TERRENCE M. O’SULLIVAN AND JAMES D. RAMSAY
12 Homeland security law and policy theory
231
MICHAEL MCDANIEL
13 Cybersecurity policy and theory
257
MAEVE DION
14 Theoretical underpinnings of homeland security technology
285
MICHAEL D. LARRAÑAGA AND PATRICK K. SMITH
Index
307
Figures
2.1
2.2
2.3
2.4
6.1
6.2
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
Severity of event’s impact-decision matrix.
Estimating the impact of an event utilizing probability
and impact indicators.
Global risk profile.
COSO enterprise risk management cube.
The US DHS logo.
US federal government interagency collaborations
regarding climate change.
The aftermath of the Johnstown Flood. “Ruins from Site
of the Hulburt House”. In: “History of the Johnstown Flood”,
by Willis Fletcher Johnson, 1889, p. 181. Library call number
M79.4 J71h. 1889 June. Photographer: Archival photograph
by Mr. Steve Nicklas, NOS, NGS. Image source: Flickr.com
Galveston, Texas hurricane devastation and destruction,
image source: pixabay.com
The great dust bowl, image source: pixabay.com
Washington, D.C. World War II memorial. Image source:
pixabay.com
Flooding after Hurricane Betsy, 1965, Image source:
flickr.com
Days after Sep. 11 terrorist attacks, fires still burn amidst
the rubble of the World Trade Center. U.S. Navy photo
by Photographer’s Mate 2nd Class Jim Watson.
(RELEASED) Source: flickr.com
FEMA leadership organizational structure.
Image source: FEMA
Organizational chart of DHS and FEMA’s position.
Image source: DHS
National preparedness system, Source: FEMA
Aerial views of the damage caused by Hurricane Sandy
to the New Jersey coast taken during a search and
rescue mission by 1-150 Assault Helicopter Battalion:
New Jersey Army National Guard: Oct. 30: 2012.
(U.S. Air Force photo by Master Sgt. Mark C. Olsen/Released)
Source: Wikimedia
29
30
31
33
101
106
123
124
124
125
126
129
130
130
133
134
xii Figures
7.11
7.12
7.13
7.14
7.15
10.1
10.2
10.3
11.1
11.2
14.1
Cyber-attack. Source DHS.gov
Explosives terrorism attack. Source: DHS.gov
Major storms/severe weather event, source: DHS.gov
Pandemics, source: DHS.gov
National political conventions, source: DHS.gov
Theoretical example of how environmental security
may be tied to national security
Relationships between homeland, national and
environmental security.
General structure of the environmental security
construct, drivers and consequences
Infectious disease triangle, Terrence M. O’Sullivan, adapted
from CDC (2012)
Medical Countermeasures (MCMs) used for Public
Health Emergency/Disaster Response (graphic by FDA, 2019)
Technology acceptance model (TAM)
139
140
141
141
142
193
197
199
210
212
292
Tables
6.1
7.1
7.2
7.3
10.1
11.1
14.1
Homeland security focusing events
Hazard types based on originating source,
Source: CPG 101, p. 1-8
Sample List of hazards based on originating source,
Source: CPG 101, p. 4-10
FEMA’s current definition of key planning areas
Suspected knowledge domains of homeland security
CDC select category a bioagents and public
health characteristics
Capability domains and priorities
102
135
135
137
193
223
296
List of contributors
Editors
James D. Ramsay, Ph.D. is a full professor of security studies, coordinator of the
Homeland Security program and founding chair of the department of security
studies at the University of New Hampshire. Current research interests include
climate security; homeland security theory, cyber-intelligence; and the relationship
between environmental and human security and national security strategy.
Keith Cozine, Ph.D. is an associate professor of Homeland Security at St. John’s
University in Queens, NY. He earned an M.A. in Criminal Justice and Ph.D. in
Global Affairs, both from Rutgers University. In addition, Dr. Cozine has nearly a
decade and a half of law enforcement and intelligence experience.
John Comiskey, Ed.D. is an associate professor of Homeland Security at Monmouth
University. He is a retired NYPD Lieutenant and US Coast Guard Reserve
Intelligence Officer. Current research includes climate security, homeland security
theory, homeland security education and mass shootings.
Contributors
Chelsea Binns, Ph.D., is an assistant professor at John Jay College of Criminal Justice.
She is the author of Fraud Hotlines: Design, Performance & Assessment (CRC
Press), editor of The Art of Investigation (Routledge) and an expert in security &
investigations who has a Ph.D. in Criminal Justice from the CUNY Graduate
Center.
Erik J. Dahl, Ph.D. is an associate professor of national security affairs at the Naval
Postgraduate School in Monterey, California, and the author of Intelligence
and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond
(Georgetown University Press, 2013). He is Chair of the Intelligence Studies Section
of the International Studies Association.
Maeve Dion, J.D. teaches cybersecurity and homeland security at UNH, where she
directs the online M.S. in Cybersecurity Policy and Risk Management. Professor Dion
specializes in the legal, policy and educational issues relating to cybersecurity and
organizational resilience. Over the past two decades, she has supported efforts of the
EU, COE, OECD, NATO CCDCOE; DHS, DOD, NSTAC, and ABA, among others.
List of contributors
xv
Brian K. Harte, Ph.D. is a full professor of Homeland Security and Criminal Justice at
St. John’s University. He formerly served as a probation administrator in the state
of Texas. Currently, he serves as the Master of Professional Studies in Homeland
Security and Criminal Justice Leadership Program Director at St. John’s University.
Michael D. Larrañaga, Ph.D. is President of R.E.M. Risk Consulting, a science-based
risk management firm. He has served as an appointed member of the Board of
Scientific Counselors for the CDC’s National Institute for Occupational Safety
and Health and the DHS First Responders Group. He is an innovation scholar
and cofounder of the Center for Homeland Defense and Security’s HSx Advanced
Thinking in Homeland Security initiative.
Brigadier General (ret.) Michael McDaniel, J.D. is Associate Dean at Western Michigan
University-Cooley Law School, Director of the Master of Laws in Homeland and
National Security Law program and a tenured professor of Constitutional Law.
He previously served as the Deputy Assistant Secretary of Defense for Homeland
Defense Strategy and as Michigan’s first Homeland Security Advisor. McDaniel
has a B.A. from St. Bonaventure University, a J.D. from Case Western Reserve
University, and graduate degrees in security studies from the Army War College
and the Naval Postgraduate School.
Kyle W. McDonnell, M.P.S. is currently a senior project manager assigned to the
NYPD’s Project Management Office (PMO), and an adjunct assistant professor
at St. John’s University. He has served on active duty in the United States Army.
He received his bachelor’s degree from LIU Post, his master’s degree in Criminal
Justice Leadership & Homeland Security from St. John’s University and is currently
a doctoral candidate in the St. John’s University’s Homeland Security Doctoral
Program.
Terry O’Sullivan, Ph.D., is an associate professor in the University of New Hampshire’s
Security Studies program. His teaching, research and publications concentrate on
domestic and international security studies, broadly writ—including pandemic
disease, the climate crisis, community disaster resilience, terrorism, weapons of
mass destruction, and the theoretical, policy and practice-level integration of
homeland security and other security frameworks.
Irmak Renda-Tanali, Ph.D. is a senior disaster risk specialist at the Pacific Disaster
Center of the University of Hawaii. She specializes in risk assessment of natural
and human-induced disasters. She has over 20 years of experience in researching,
consulting and teaching in the emergency management field. She holds a doctoral
degree in engineering management from George Washington University.
Patrick K. Smith, Ph.D. is a partner with R.E.M. Risk Consultants. His expertise
is technology innovation, continuous improvement, energy management and risk
management in a variety of settings. Patrick has a background in data analytics
and management information systems with experience managing and analyzing
large data sets. Dr. Smith was previously a DHS Science, Technology, Engineering
and Mathematics Fellow at Oklahoma State University.
Foreword
By Paul Stockton
As a curriculum and field of research, homeland security rests on an enduring puzzle.
What does homeland security comprise? In contrast to traditional graduate-level disciplines, such as biology or engineering, homeland security lacks a system of accreditation that rests on an agreed set of curricular requirements and learning outcomes.
The absence of such accreditation reflects a deeper problem. Through innovation and
constant revision, graduate and undergraduate programs in homeland security are
still developing an agreed set of core principles and distinctive methodologies. By
providing a grand theory of homeland security, this book is structured to advance
consensus-building on the meaning of homeland security and the education and
research components at its heart.
The shifting priorities within and between homeland security programs reflect the
abrupt changes in the practice of homeland security at all levels of government and—
increasingly—by the owners and operators of critical infrastructure. The National
Defense Panel’s 1997 report on “Transforming Defense: National Security in the 21st
Century” helped coin the terms “Homeland Defense” and “Homeland Security”.
That report exclusively focused on responding to terrorism and did not mention the
emergency management or public safety requirement for preparedness against natural
disasters.
9/11 sharpened and institutionalized that focus. As stated by the National Strategy
for Homeland Security of 2002, homeland security comprises “a concerted national
effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur”.
Hurricane Katrina in 2005 drove a fundamental rethinking of that emphasis. With
the Post-Katrina Emergency Reform Act and subsequent initiatives, legislators,
homeland security practitioners and their partners brought emergency management
and public safety priorities into the core of the emerging discipline. Superstorm Sandy
(2012) and Hurricane Maria spurred an equivalent expansion of the field to include
the resilience of the electric grid and other critical infrastructure sectors, as well as
associated expertise in engineering and incident response possessed by owners and
operator of those systems—not government agencies.
That evolution continues today. The COVID-19 pandemic is prompting a deep
rethinking of supply chain resilience, catastrophic threats to public health, business
continuity and a range of other education and research topics that forward-looking
curricula must now embrace.
Manmade threats must drive further changes. The Fourth Edition of the National
Response Framework (2019) emphasized the need for preparedness efforts to support
Foreword xvii
US national security, including against nation state threats that possess capabilities
dwarfing those of Al Qaeda or any other terrorist organization. Accordingly, the
Framework (NRF) emphases the need to “help maintain essential services for critical
national security installations” and other initiatives that have never before been a
priority of homeland security. And all such changes, including those that should be
considered for inclusion in homeland security curricula, must account for rise of cyber
threats to US infrastructure and the emergence of information warfare against US
citizens as the “new normal”.
Without a guiding theoretical framework, homeland security is at risk of becoming
an ever-changing grab bag of education and research priorities. That trend comes at
a cost. We need an educated cadre of future homeland security leaders who can not
only respond to threats of today but are also prepared to meet challenges that cannot
be foreseen. The US National Preparedness Goal provides a starting point to identify
the core requirements for developing such a cadre. The Goal calls for “A secure and
resilient Nation with the capabilities required across the whole community to prevent,
protect against, mitigate, respond to, and recover from the threats and hazards that
pose the greatest risk”.
Helping fulfill that goal will require the development of shared expertise in specific
methodologies—for example, risk-based analysis and data analytics. The diversity of
threats confronting the United States will also require homeland security curricula
to be multidisciplinary, and encompass emergency management, public health and
safety, and a range of other disciples with their own deep roots for education and professional development. Maturing homeland security as an academic field will require
new approaches to integrate these disparate parts into a coherent whole. That is, to
truly become a profession, the discipline needs an organizing theoretical framework.
This volume argues that such a framework should accomplish four goals: (1) it should
guide and predict research on best practices and strategies to protect the nation; (2) the
theory must support curriculum development; (3) it must explain how the disciplines
that comprise the homeland security enterprise support and contribute to its mission;
and (4) it must build upon the solid and progressive foundation already established in
academic homeland security, which has been led by the Center for Homeland Defense
and Security’s University and Agency Partnership Program (UAPP).
At the time this text is set to be published, the Department of Homeland Security
will be 18 years of age, and academic homeland security roughly 15 years of age. As
the homeland security enterprise has matured, so has its corresponding academic
component. For example, as of 2019, UAPP lists around 460 homeland security-related
academic programs, including programs at the Associate, Bachelor, Masters and
Doctoral levels. While several programs started as new programs, many others were
merely extensions of existing programs in criminal justice or emergency preparedness.
Since homeland security does not yet enjoy recognized accreditation, there has not
been a set of learning outcomes shared across all homeland security programs as there
is in medicine, law, engineering, nursing, etc. However, recent scholarship in this area
indicates that degree programs tend to leverage a common set of knowledge domains
including risk management, emergency management, terrorism, intelligence, strategic
planning, law and policy, environmental and human security to name a few. Further,
significant progress has been made in the development of a body of knowledge including journals dedicated to basic and applied research, the scholarship of teaching and
learning, as well as resilience. Supporting development of scholarship, education,
xviii
Foreword
networking and ideation, several annual conferences such as the Homeland Security
Education Summit sponsored jointly by FEMA and the UAPP as well as FEMA’s
Emergency Management Higher Education Symposium are held each year.
An established theoretical foundation, an established common curriculum and a
research agenda must be aligned to professionalize a discipline. In this way, homeland
security can learn from medicine. Indeed, the parallels between how medicine grew
and matured as a discipline and how it became a sovereign profession are already visible in homeland security. Consider that both homeland security and medicine share
several characteristics. For example, modern medicine is complex and dynamic and
is a composite of many disciplines such as anatomy, physiology, toxicology, chemistry, physics, biochemistry, psychology, epidemiology, to name a few. Not only does
such a structure support the medical curriculum, it supports and guides research that
optimizes best practices, strategies, and healthcare structures. And not surprisingly,
theories of health and medicine contain elements from several disciplines. Indeed,
advancements in component disciplines often find applications in medicine such as
advancements in physics created MRI and PET scanners, while advancements in biochemistry have improved chemotherapy.
Theoretical Foundations of Homeland Security: Strategies, Operations and Structures
posits a grand theory of homeland security that will help the discipline professionalize. Ultimately, this volume is timely, necessary and meets a critical need in the growth
and professional development of the homeland security discipline. I hope you enjoy
it, learn from it and are empowered to advance the discipline as we continue to work
together to protect the nation.
Paul N. Stockton is the Managing Director of Sonecon, LLC. Before joining Sonecon,
he served as the Assistant Secretary of Defense for Homeland Defense and Americas’
Security Affairs from May 2009 until January 2013.
Acknowledgments
Anytime one endeavors to produce a complex product of high quality, one of the first
things one notices is that they are going to need a great deal of help and support. This
volume represents such a product. Theoretical Foundations of Homeland Security:
Strategies, Operations and Structures has been years in the making. From initial talks
with friends, to conference presentations and debate among colleagues, this book represents the cumulative expression of years of scholarship, debate and discourse.
Interestingly, one of the complicating factors in producing this book was that it is
somewhat the first of its kind. Establishing a grand theory of homeland security has
been difficult in the past because of the nature of the discipline. Every aspect of the
homeland security enterprise that enables it to function in a dynamic, interconnected
world is also the leading prohibitor to a theory of what it is and how it works. Indeed,
it would appear as though homeland security is a metadiscipline, that is a discipline of
disciplines. It was logical for us, therefore, to enlist the help and support of scholars,
practitioners and academics to contribute the individual components that together
and collectively synergize into the strategies, operations and structures that represent
homeland security.
Toward this end, we would like to extend our heartfelt gratitude to Routledge for
believing in this effort early on, to our contributing authors who labored long and
hard to produce draft after draft and who were writing about a discipline in which
they are experts, but who were attempting to create a chapter that blends with and
mutually supports the other chapters, that together comprise the wholeness of homeland security.
Specifically, we would like to thank Brian Harte for his expertise and vision in risk
management, Terry O’Sullivan for his ability to focus the broad field of sociology in a
way that supports homeland security strategy, for Chelsea Binns for recognizing just
how criminology supports the mission of homeland security, for Kyle McDonnell who
with Keith Cozine, was able to distill terrorism into digestible parts that illustrate
its role in protecting the homeland, to Irmak Renda-Tanali for her keen insights into
emergency management and her ability to tease out where emergency management
synergizes with homeland security, and how its mission supports the practice of homeland security, to Erik Dahl for his insightful grasp of the intelligence discipline and
how theories of intelligence work to support homeland defense and security, to Mike
McDaniel who had the incredibly arduous task of explaining the role law and policy have in homeland security, to Maeve Dion for creating a compelling explanation
of what cybersecurity is, and how the laws, and policies that define it are critical to
homeland security, and finally to Mike Larrañaga and Patrick Smith for developing
xx
Acknowledgments
a novel and innovative approach to our understanding of the role technology play in
supporting how institutions and agencies work to protect its citizens.
Next, we would like to extend our gratitude to our colleagues who gave us insightful
comments and course corrections, to Chris Bellevita who forever asks “what is your
claim and why should we believe you”, to Steve Recca for indulging and supporting
the national conversation and debate over what may or may not be a theory of homeland security, to Linda Kiltz for inspiring us to a higher level of thought and who facilitates our ability to connect homeland security to other critical disciplines on which
the enterprise depends, and to Paul Stockton who provides unparalleled perspective
and insights into this discipline.
Last but never least, we would like to thank our families for listening to us “think
aloud”, for supporting us when things were not working well, for encouraging us to
carry on and for just always being there.
We sincerely hope you find this book of value, and we would welcome feedback and
dialog as we continue to define, refine the discipline we love and ultimately to make the
world a safer, more secure and happier place.
Happy reading!
James, Keith and John
List of abbreviations
AI
APT
ARPANET
AST
CC
CDC&P
CHDS
CIA
CISA
COSO
CPG
CPTED
CRS
CTA
DARPA
DHS
DOD
DOI
DOJ
EOP
EPA
ERM
ES
EU
FBI
FEMA
FINDER
FRG
FTC
GAO
GDP
GHG
HIPAA
HLS
HSIB
ICAO
Artificial Intelligence
Advanced Persistent Threats
Advanced Research Projects Agency Network
Adaptive Structuration Theory
Climate Change
Centers for Disease Control and Prevention (aka CDC)
Center for Homeland Defense and Security
Central Intelligence Agency
Cybersecurity and Infrastructure Security Agency
Committee of Sponsored Organizations
Comprehensive Preparedness Guide
Crime Prevention through Environmental Design
Congressional Research Service
Clandestine Transnational Actor
Defense Advanced Research Projects Agency
U.S. Department of Homeland Security
U.S. Department of Defense
Diffusion of Innovation Theory
U.S. Department of Justice
Emergency Operations Plan(ing)
U.S. Environmental Protection Agency
Enterprise Risk Management
Environmental Security
European Union
Federal Bureau of Investigation
Federal Emergency Management Agency
Finding Individuals for Disaster and Emergency Response
First Responders Group
U.S. Federal Trade Commission
Government Accountability Office
Gross Domestic Produce
Greenhouse Gas(es)
Health Insurance Portability and Accountability Act of 1996
Homeland Security
Homeland Security Industrial Base
International Civil Aviation Organization
xxii List of abbreviations
ICC
Interagency Collaborative Capacity
ICE
U.S. Immigration and Customs Enforcement
ICS
Incident Command System
IOCS-CERT Industrial Control Systems Cyber Emergency Response Team
IGO
International Governmental Organizations
IMC
Interagency mechanisms for collaboration
IoT
Internet of Things
IPCC
Intergovernmental Panel on Climate Change
IR
Incident Response
ISIS
Islamic State in Iraq and Syria
ISO
International Organization for Standardization
IT
Information Technology
JIOCS
Joint Intelligence Operations Centers
JTTF
Joint Terrorism Task Force
LDC
Less Developed Country(ies)
MDC
More Developed Country(ies)
NAPA
National Academy of Public Administration
NCCIC
National Cybersecurity and Communications Integration Center
NCPC
National Crime Prevention Council
NCMEC
National Center for Missing and Exploited Children
NERC
North American Energy Reliability Corporation
NGA
National Governors Association
NGO
Non-governmental Organization
NIH
U.S. National Institute of Health
NIMS
National Incident Management System
NIST
U.S. National Institute of Standards and Technology
NIST-CSF National Institute of Standards and Technology-Cybersecurity
Framework
NOAA
National Oceanic and Atmospheric Administration
NRCC
National Response Coordination Center
NRF
National Response Framework
NTRO
National Terrorism Response Objectives
NYPD
New York City Police Department
ODNI
Office of the Director of National Intelligence
PCCIP
President’s Commission on Critical Infrastructure Protection
PCI-DSS
Payment Card Industry Data Security Standard
PDD
Presidential Disaster Declarations
PPD
Presidential Policy Directive
PEU
Perceived Ease of Use
PII
Personally Identifiable Information
PPD
Presidential Policy Directive
QDR
Quadrennial Defense Review
REDOPS
Response and Defeat Operations Support
RIC-M
Radio Internet-Protocol Communications Model
RRCC
Regional Response Coordination Centers
SARP
Standards and Recommended Practices
SAPBER
Semi-Autonomous Pipe Bomb End Cap Remover
SBIR
Small Business Innovation Research
List of abbreviations
SMART
Social Media Analytics and Reporting Toolkit
SMT
Social Movement Theory
SNA
Social Network Analysis
SNRA
Strategic National Risk Assessment
STR
Socio-Technical Systems Theory
SSA
Sector-Specific Agency
TAM
Technology Acceptance Model
TAN
Transnational Advocacy Networks
THIRA
Threat and Hazard Identification and Risk Assessment
TSA
U.S. Transportation Security Administration
UN
United Nations
UTAUT
unified theory of acceptance and use of technology
USGCRP
U.S. Global Change and Research Program
VUCA
volatile, uncertain, complex, and ambiguous
WLFF-APPS Wildland Firefighter Advanced Personal Protective System
xxiii
Glossary1
Adaptation in human systems, the process of adjustment to actual or expected climate and its effects, in order to moderate harm or exploit beneficial opportunities.
In natural systems, the process of adjustment to actual climate.
All-hazards approach is a risk-based, integrated approach to emergency preparedness planning that focuses on capacities and capabilities that are critical to
preparedness for a full spectrum of emergencies or disasters, including internal
emergencies, terrorism, natural or man-made disasters.
Anthropogenic resulting from or produced by human activities. For example, anthropogenic climate change (aka global warming) refers to changes in the earth’s climate due to human activities that produce emissions (i.e., greenhouse gases) that
in turn warm the earth.
Balance of Power the theory that security is enhanced when military capabilities are
distributed so that no one state is strong enough to dominate all others. If one
state gains too much power in relation to its neighbors, the theory predicts that it
will take advantage of its strength and attack those weaker neighbors, thus providing an incentive for those threatened to unite in a defensive coalition.
Bilateral Agreement an agreement where one state cooperates or enter into a formal
arrangement with another state in return for some sort of preferential treatment.
Bounded rationality logic that leads to decisions or actions within a broad sense
within one part of a system, but which may not be reasonable within a broad context or when seen as a part of a wider system.
Carbon neutrality achieving net zero carbon dioxide emissions at a global scale
through the balance of residual carbon dioxide emissions with the same amount
of carbon dioxide removal.
Clandestine Transnational Actors (CTAs) non-state actors, operating across national
borders in violation of law and evading law enforcement efforts.
Climate is in a narrow sense usually defined as the average weather, or more rigorously, as the statistical description in terms of the mean and variability of relevant
quantities over a period ranging from months to thousands or millions of years.
Climate change refers to a change in the state of the climate that can be identified
(e.g., by using statistical tests) by changes in the mean and/or the variability of its
properties and that persists for an extended period, typically decades or longer.
Climate change may be due to natural internal processes or external forcings such
as modulations of the solar cycles, volcanic eruptions and persistent anthropogenic changes in the composition of the atmosphere or in land use.
Glossary xxv
Cognitive Dissonance a state of conflict or discomfort—dissonance—that happens
when strongly held beliefs, emotions or assumptions are contradicted by new
information that motivates someone to either convince themselves the new information does not exist, or to explain it away in order to relieve the emotional tension caused.
Collaborative Federalism an approach to homeland security which contends that
homeland security is a national problem that requires national solution. Congress
and its executive agent, the Department of Homeland Security (DHS), should provide leadership and appropriate funding. DHS should be an agent of subnational
levels of government, and states and local governments should collaborate with
jurisdictions both vertically and horizontally.
Conflict Theory social science theory that contends friction in the modern world has
to do with a clash of the “old ways” versus the on-going march toward modernity
and increased globalization. The preservation of traditional ways of life is often
diametrically opposed to the rapidity of modernization, which has ultimately
been sped up by the break-neck pace of technological advancement.
Consequence the effect of an event, incident or occurrence.
Consequence Assessment the product or process of identifying or evaluating the
potential or actual effects of an event, incident or occurrence.
Consequence Management include measures to protect public health and safety,
restore essential government services and provide emergency relief to governments, businesses and individuals affected by the consequences of terrorism.
Constructivism the classic international relations theory that asserts that the structures of human association are determined primarily by shared ideas rather
than material forces, which is often referred to as an idealist approach to social
life; and that the identities and interests of purposive actors are constructed by
these shared ideas rather than given by nature, which is seen as holistic or structuralist approach that emphasizes the power of social structure as opposed to
individualism.
Crime Prevention Through Environmental Design (CPTED) the criminology concept
that asserts that effective use of the “built environment” can lead to reduced crime
and increased quality of life. It contends that properly designed spaces with surveillance opportunities, boundaries and a positive image discourage crime.
Criminology the scientific study of crime that examines the people who commit
crime, explores the reasons why they commit crime, the ways they can be stopped
from committing crime and how society responds to this crime.
Criticality the importance to a mission or function, or continuity of operations.
Criticality Assessment the product or process of systematically identifying, evaluating and prioritizing based on the importance of an impact to mission(s), function(s) or continuity of operations.
Cybersecurity includes the protection of information and computer and data processing infrastructure and operating systems from harmful interference from
malicious actors (criminals, terrorists, pranksters). It thus involves not only
national defense and homeland security but also law enforcement.
Deepfake is a technology that uses AI to produce or edit contents of a video or an
image to show something that may never have happened or did happen but in a
different context.
xxvi Glossary
Defensible space the criminology theory that crime can be controlled through the
design and structure of the environmental and can be addressed through a variety
of security design concepts.
Disaster any severe alterations in the normal functioning of a community or a society due to hazardous physical events interacting with vulnerable social conditions,
leading to widespread adverse human, material, economic or environmental
effects that require immediate emergency response to satisfy critical human needs
and that may require external support for recovery.
Economic Consequence effect of an incident, event or occurrence on the value of
property or on the production, trade, distribution or use of income, wealth or
commodities.
Economic Security involves not only protecting the capacity of the economy to provide for the people but also the degree to which the government and the people
are free to control their economic and financial decisions. It also entails the ability to protect a nation’s wealth and economic freedom from outside threats and
coercion. Thus, it comprises not only economic policy and some law enforcement
agencies but also international agreements on commerce, finance and trade.
Emergency Management is the managerial function charged with creating the framework within which communities reduce vulnerability to hazards and cope with
disasters.
Energy and Natural Resources Security is most often defined as the degree to which
a nation or people have adequate and sustainable access to such energy resources
as oil, gas, water and minerals. Access includes availability of energy resources
determined by the energy market without interference from other nations or political or military entities for non-market, political purposes.
Enterprise Risk Management a comprehensive approach to risk management that
engages organizational systems and processes together to improve the quality of
decision making for managing risks that may hinder an organization’s ability to
achieve its objectives.
Environmental Security is a process for understanding how extreme environmental
or climatic events, acting locally or trans-nationally, can destabilize countries or
regions of the world, resulting in geopolitical instability, resource conflicts, and
subsequently enhanced risk to critical infrastructure, or a combination of these.
Epidemic refers to an increase, often sudden, in the number of cases of a disease
above what is normally expected in that population in that area. Epidemics occur
when an agent and susceptible hosts are present in adequate numbers, and the
agent can be effectively conveyed from a source to the susceptible hosts.
Extreme weather event An extreme weather event is an event that is rare at a particular place and time of year. Definitions of rare vary, but an extreme weather event
would normally be as rare as or rarer than the 10th or 90th percentile of a probability density function estimated from observations. The characteristics of what is
called extreme weather may vary from place to place in an absolute sense. When
a pattern of extreme weather persists for some time, such as a season, it may be
classed as an extreme climate event, especially if it yields an average or total that
is itself extreme (e.g., drought or heavy rainfall over a season).
Focusing events sudden, unpredictable and harmful events that gain the attention of
policy makers and the public and drive national policy more so than other similar
events.
Glossary xxvii
Food Security a situation that exists when all people, at all times, have physical,
social and economic access to sufficient, safe and nutritious food that meets their
dietary needs and food preferences for an active and healthy life (FAO, 2001).
Fossil Fuels carbon-based fuels from fossil hydrocarbon deposits, including coal, oil
and natural gas.
Future shocks a dizzying disorientation brought upon by the premature arrival of
the future.
Game Theory a theory that seeks to explain strategies for dealing with competitive
situations where the outcome of an individual’s choices depends critically on the
other individuals involved in the competition. It has its roots in mathematics but
has been used in the social sciences to explain the behavior of individuals, groups,
organizations and nation states.
Global governance when governance is utilized to address areas or issues of concern
that affects more than one state or region and the actors involved in the process
are transnational. It encompasses the institutions, policies, norms, procedures
and initiatives through which states and their citizens try to bring more predictability, stability and order to their responses to transnational challenges in the
absence of overarching political authority, such as in the international system.
Global warming an increase in global mean surface temperature averaged over
a 30-year period, relative to 1850–1900 unless otherwise specified. For periods
shorter than 30 years, global warming refers to the estimated average temperature
over the 30 years centered on that shorter period, accounting for the impact of any
temperature fluctuations or trend within those 30 years.
Globalization the increased connection of different parts of the world from advancement in communication and transportation technology resulting in the expansion
of international cultural, economic and political activities. It is the movement and
integration of goods and people among different countries.
Governance the sum of many ways individuals and institutions, public and private,
manage their common affairs. It is a continuing process through which conflicting
or diverse interests may be accommodated and cooperative action may be taken.
Greenhouse gas (GHG) greenhouse gases are those gaseous constituents of the
atmosphere, both natural and anthropogenic, that absorb and emit radiation
at specific wavelengths within the spectrum of terrestrial radiation emitted by
the earth’s surface, the atmosphere itself and by clouds. This property causes the
greenhouse effect. Water vapor (H2O), carbon dioxide (CO2), nitrous oxide (N2O),
methane (CH4) and ozone (O3) are the primary GHGs in the earth’s atmosphere.
Moreover, there are several entirely human-made GHGs in the atmosphere, such
as the halocarbons and other chlorine- and bromine-containing substances, dealt
with under the Montreal Protocol. Besides CO2, N2O and CH4, the Kyoto Protocol
deals with the GHGs sulphur hexafluoride (SF6), hydrofluorocarbons (HFCs) and
perfluorocarbons (PFCs).
Hazard a natural or man-made source or cause of harm, or loss or difficulty.
Homeland Security a value-laden term, which often means different things to different constituents, organizations or stakeholders. Generally, homeland security
refers to a set of collective actions of all levels of government (local, tribal, state,
federal), constituents, organizations or stakeholders (i.e., members of the homeland security enterprise) to prevent, protect against, mitigate, respond to and
recover from threats and hazards that pose risk to the nation.
xxviii
Glossary
Homeland Security Enterprise an umbrella term that describes a collective of all levels of government, institutions and disciplines that collectively contribute strategies, structures or operations to the homeland security mission. The “enterprise”
often includes all levels of government, constituents, organizations or stakeholders such as law enforcement, fire service, public health, academia, emergency
medical services, the military, public works, and the public and private sectors.
The enterprise is synonymous with “whole-of-community” and “all-of-nation”
approaches to homeland security.
Human Agency Bias the condition wherein people and even entire societies are far
more interested in human threats—versus natural ones.
Human Security a condition that is met when the vital core of human lives is protected, and when people have the freedom and capacity to live in peace, security
and with dignity. The term is multidimensional and will often include constituent
elements such as economic security, environmental security, food security, health
security, personal security, community security, political security and the protection of women and minorities. Its distinguishing characteristic is to avoid or
downplay national security as a military problem between nation states, focusing
instead on an assumed international “responsibility to protect” peoples from violence. It is to be determined and administered by the United Nations.
Intelligence (basic definition) information that provides decision makers with knowledge or foreknowledge of the world around them for the purposes of supporting
policy or other strategic decisions.
Intelligence Cycle a process wherein policy makers (consumers) decide what information they need (intelligence requirements) followed by collectors who gather
raw data and analysts who try to make sense of that data, and a dissemination
system that provides intelligence to the consumer—at which point the cycle starts
over again.
Interagency Collaborative Capacity (ICC) the results of a process that takes bits and
pieces of existing organizations and somehow gets them to cohere and create a
functioning entity that is better than the sum of its parts (also known as craftsmanship theory).
Interagency Mechanism for Collaboration (IMC) include an array of arrangements
or applications that can facilitate collaboration among agencies, including interagency offices, groups, task forces, councils, conferences and communities of practice, collaborative technology and similar constructs.
Intergovernmental Organization (IGO) a formal entity formed by an intergovernmental agreement such as a treaty, charter or statute that involves two or more
nations working in good faith, on issues of common interest.
Issue-attention Cycle the ascension of issues to the top of the national policy agenda
followed by declining public interest and the fading of the issue from the center of
public attention.
Kyoto Protocol the Kyoto Protocol to the United Nations Framework Convention
on Climate Change (UNFCCC) was the seminal international treaty adopted in
December 1997 in Kyoto, Japan, at the Third Session of the Conference of the
Parties (COP3) to the UNFCCC.
Liberalism the classic international relations theory that holds human nature is basically good, social progress is possible and human behavior is malleable and perfectible through institutions. It argues that injustice aggression and war are products of
Glossary xxix
inadequate or corrupt institutions or misunderstanding among leaders and therefore that injustice, aggression and war are not inevitable but can be eliminated by
collective action and institutional reform. Subdisciplines of liberalism include neoliberalism, functionalism, regime theory and collective or public good.
Lone Wolf Terrorism a form of terrorism that is usually purely a domestic threat,
even though the causes and the actors may be from abroad. It occurs when an
individual or group of individuals are inspired to take action in support of a terrorist organization’s goals or ideology even though they have no formal contention to that organization.
Mitigation focuses on the impact of a hazard, encompasses the structural and nonstructural approaches taken to eliminate or limit a hazard’s presence; people’s
exposure; or interactions with people, property and the environment. The emphasis on sustained actions to reduce long-term risk differentiates mitigation from
those tasks that are required to survive an emergency safely.
Multilateral Agreement an agreement where three or more states cooperate or enter
into a formal arrangement with one another in return for some sort of preferential
treatment.
Nation state a sovereign state (country) whose citizens are relatively homogeneous in
terms of such factors of culture, language and common descent.
National Incidence Management System (NIMS) NIMS provides a common, nationwide approach to enable the whole community to work together to manage all
threats and hazards. NIMS applies to all incidents, regardless of cause, size, location or complexity.
National Preparedness is based on core capabilities that support “strengthening the
security and resilience of the United States through systematic preparation for the
threats that pose the greatest risk to the security of the Nation, including acts of
terrorism, cyber-attacks, pandemics and catastrophic natural disasters”.
National Preparedness Goal (NPG) FEMA defines the NPG as “A secure and resilient Nation with the capabilities required across the whole community to prevent,
protect against, mitigate, respond to, and recover from the threats and hazards
that pose the greatest risk”.
National Response Framework (NRF) The NRF is formerly the National Response
Plan and is the basis for national-level planning for large-scale emergencies
regardless of threat or hazard origin.
National Security a capacity to control those domestic and foreign conditions that
the public opinion of a given community believes necessary to enjoy its own
self-determination or autonomy, prosperity, well-being and culture.
Nongovernmental Organizations (NGOs) voluntary group of individuals or organizations, usually not affiliated with any government, that is formed around a particular issue or concern.
Non-state actors an individual or organization that has significant influence of society but is not allied to a particular nation or state. Non-state actors that pose
a threat to security include terrorists, narcotics traffickers, transnational crime
groups, organized gangs and individual offenders.
Offensible space when criminals and other bad actors use defensive space tactics to
create a safe space where they can conduct their crimes.
Pandemic refers to an epidemic that has spread over several countries or continents
typically at the same time and usually affecting a very large number of people.
xxx
Glossary
Paradigm scientific practice including theories, laws, applications and instrumentations that are generally accepted by scientific communities.
Paris Agreement the Paris Agreement under the United Nations Framework
Convention on Climate Change (UNFCCC) was adopted on December 2015 in
Paris, France, at the 21st session of the Conference of the Parties (COP) to the
UNFCCC. The agreement, adopted by 196 Parties to the UNFCCC, entered into
force on 4 November 2016 and as of May 2018 had 195 Signatories and was ratified
by 177 Parties.
Political Economy the set of interlinked relationships between people, the state, society and markets as defined by law, politics, economics, customs and power that
determine the outcome of trade and transactions and the distribution of wealth in
a country or economy.
Political Security refers to protecting the sovereignty of the government and political system and the safety of society from unlawful internal threats and external threats or pressures. It involves both national and homeland security and law
enforcement.
Public Health the science of protecting and improving the health of people and their
communities achieved by promoting healthy lifestyles, researching disease and
injury prevention, health promotion and detecting, preventing and responding to
infectious diseases.
Rational choice a social science theory that crosses multiple disciplines but draws
heavily on the theoretical foundations of psychology and economics. It assumes
that humans are motivated by personal goals reflecting their preferences. They
achieve their goals by a mindful and calculated process, whereby they review their
goals against the means of attaining them, and decide the best way to proceed
in order to optimize the odds of success relative the odds of failing and make
decisions accordingly. Rational Choice theory has been applied to individuals,
groups, organizations and nation states.
Realism the classic international relations theory that argues that the international
system is anarchic; there is no actor above states capable of regulating their interactions; therefore, states must arrive at relations with other states on their own, rather
than having it dictated to them by some higher controlling body. Adding to this
anarchy is the idea that the international system exists in a state of constant antagonism. Since there is no higher controlling body, states are the most important actors
in the international system. All states within the system are unitary, rational actors
that tend to pursue self-interest and strive to attain as many resources as possible.
Subdisciplines of realism include neorealism and rational choice.
Recovery encompasses both short-term and long-term efforts for the rebuilding and
revitalization of affected communities. Recovery planning builds stakeholder
partnerships that lead to community restoration and future sustainability and
resiliency.
Referent Organizations centralized organization that formalizes institutions, establishes ground rules for membership and consensus building, and organizes the
systematic mobilization of resources. Referent organizations are featured in
IMCs. See Interagency Mechanism for Collaboration.
Regime sets of implicit or explicit principles, norms, rules and decision-making procedures around which actors’ expectations converge in a given area of international concern that require collective action.
Glossary xxxi
Resilience as defined in PPD-21, is “the ability to prepare for and adapt to changing
conditions and withstand and recover rapidly from disruptions…[it] includes the
ability to withstand and recover from deliberate attacks, accidents, or naturally
occurring threats or incidents”. Resilient infrastructure assets, systems and networks must also be robust, agile and adaptable. Mitigation, response and recovery activities contribute to strengthening critical infrastructure resilience.
Response embodies the actions taken in the immediate aftermath of an incident to
save and sustain lives, meet basic human needs and reduce the loss of property
and the effect on critical infrastructure and the environment. Following an incident, response operations reduce the physical, psychological, social and economic
effects of an incident.
Risk in a risk management context, risk the potential for an unwanted outcome resulting
from an incident, event or occurrence, as determined by its likelihood and the associated consequences. In the context of the assessment of climate impacts, the term risk
is often used to refer to the potential for adverse consequences of a climate-related
hazard, or of adaptation or mitigation responses to such a hazard, on lives, livelihoods, health and well-being, ecosystems and species, economic, social and cultural
assets, services (including ecosystem services) and infrastructure. Risk results from
the interaction of vulnerability (of the affected system), its exposure over time (to the
hazard), as well as the (climate-related) hazard and the likelihood of its occurrence.
Risk Assessment the product or process which collects information and assigns
values to risks for the purpose of informing priorities, developing or comparing
courses of action, and informing decision-making.
Risk Control the deliberate action taken to reduce the potential for harm or maintain it at an acceptable level.
Risk Management process of identifying, analyzing, assessing and communicating
risk and accepting, avoiding, transferring or controlling it to an acceptable level
considering associated costs and benefits of any actions taken.
Risk Perception the subjective judgment that people make about the characteristics
and severity of a risk.
Routine Activity a criminology theory that focuses on criminal events and activities
rather than focusing on the offender or crime setting. Under routine activity theory, crimes require the convergence of a motivated offender, a suitable target (victim), and needs to take place in circumstances where the target lacks protection
of a capable guardian.
Prevention consists of actions that reduce risk from human-caused incidents, primarily terrorism.
Protection reduces or eliminates a threat to people, property and the environment.
Primarily focused on adversarial incidents, the protection of critical infrastructure and key resources (CIKR) is vital to local jurisdictions, national security,
public health and safety and economic vitality.
Salafi jihadism movement which serves as the ideological base of most Sunni Islamic
terrorist organizations, including al-Qaeda, ISIS and their affiliated groups.
Salafi movements contend that only by returning to the way of life at the time
of the prophet may Muslims once again experience a golden age. Salafi jihadists
promote the use of violence to achieve this goal.
Situational Crime Prevention a crime prevention concept that attempts to analyze
specific incidents and activities—associated with a crime, rather than focus on
xxxii Glossary
offenders or their motivations. The context of the crime is more important than
the offender or their motivation. If it is more difficult to carry out a crime, it
increases the risk the offender takes by attempting the crime. Higher risk reduces
the rewards (or the benefits) the offender expects to receive by committing the
crime as well as the motivation used to justify their criminal action.
Social Identity a theory that attempts to explain how individuals self-ascribed significance attached to the social groups or communities to which one belongs and
with which one interacts directly, along with the feelings associated with participation in these groups’ activities.
Social Movement a group of people with a common ideology who try together to
achieve certain general goals and some level of social or political change through
collective action.
Social Network Analysis an application of social network theory that analyzes network nodes to understand who anything from networks, people and even things
like events are linked. It looks at not only the inextricable links that bond together
religious, familial or cultural groups but also the fluid and dynamic groupings
that are more prevalent in a global society where transience and rootlessness in
both the physical and digital world.
Social Network Theory a social science theory that crosses multiple disciplines in
fields as diverse as psychology to economics. It seeks to explain the factors contrite to the formation, cohesion, and continuation of links between individuals
and groups that form networks. Network are examined in terms of “nodes”, which
are tightly coupled groups of people that coalescence around complex-yet understandable relationships.
Sustainable Development Goals the current set of 17 global goals for development
for all countries established by the United Nations through a participatory process and elaborated in the 2030 UN Agenda for Sustainable Development which
includes ending poverty and hunger; ensuring health and well-being, education,
gender equality, clean water and energy, and decent work; building and ensuring resilient and sustainable infrastructure, cities and consumption; reducing
inequalities; protecting land and water ecosystems; promoting peace, justice and
partnerships; and taking urgent action on climate change.
Target Hardening the crime prevention technique of employing security measures
as a deterrence the use of alarms, barriers, gates, locks, fences or other security
devices. It assumes that criminals are rational actors and would conduct a somewhat imaginary cost-benefit analyst on a given target beforehand to see if they
will be able to successfully commit their crime. If a target that has been hardened
it would be unattractive to a criminal.
Terrorism there is no universally accepted definition of terrorism but for the purpose
of this text terrorism will be defined as the use or the threat of violence or other
destructive behavior by a non-state actor to inciting fear or intimate a population
with the goal of achieving some level of social or political change.
Theory a systematic and evidence-based approach to a processes or phenomena,
and the presumed relationships between and among components of the process
or phenomenon.
Threat a natural or man-made occurrence, individual, entity or action that has or
indicates the potential to harm life, information, operations, the environment
and/or property.
Glossary xxxiii
Threat Assessment product or process of identifying or evaluating entities, actions
or occurrences, whether natural or man-made, that have or indicate the potential
to harm life, information, operations and/or property.
Transgovernmentalism an emerging international relations theory that contends
that globalization has created an environment traditional means of international
interaction, like diplomacy and treaties, seem less effective in dealing with today’s
threats to international security as may be too slow and cumbersome to combat
certain problems in a globalized world as they were in dealing with past threats.
Today’s threats require the development of relationships between similar agencies across governments, rather than dealing exclusively through foreign ministries. Governments operate internationally through transgovernmental networks
comprised of government officials from various nations, forming both formal
and informal global networks that reach out to their foreign counterparts to help
address the problems that arise when national actors or issues spill beyond their
borders.
Transgovernmental Network network comprised of government officials from various nations, forming both formal and informal global networks that reach out to
their foreign counterparts to help address the problems that arise when national
actors or issues spill beyond a nation’s borders.
Transnational Advocacy Networks (TANs) networks are constructed of “nodes” of
individuals or groups which utilize modern technology to connect with other
“nodes” around the globe who share their ideals or beliefs. Through their collective action, the nodes of the network can turn their attention to problems and
issues of a global scale.
Uncertainty (in science) the degree to which a calculated, estimated or observed
value may deviate from the true value. Uncertainty is the state of incomplete
knowledge that can result from a lack of information or from disagreement about
what is known or even knowable. It may have many types of sources, from imprecision in the data to ambiguously defined concepts or terminology, incomplete
understanding of critical processes, or uncertain projections of human behavior.
Uncertainty can therefore be represented by quantitative measures (e.g., a probability density function) or by qualitative statements (e.g., reflecting the judgment
of a team of experts).
United Nations Framework Convention on Climate Change (UNFCCC) the UNFCCC
was adopted in May 1992 and opened for signature at the 1992 Earth Summit in
Rio de Janeiro. It entered into force in March 1994 and as of May 2018 had 197
Parties (196 States and the European Union). The Convention’s ultimate objective is the “stabilization of greenhouse gas concentrations in the atmosphere at a
level that would prevent dangerous anthropogenic interference with the climate
system”. The provisions of the Convention are pursued and implemented by two
treaties: the Kyoto Protocol and the Paris Agreement.
Unity of effort refers to organizations working together collaboratively.
Vulnerability the qualitative or quantitative expression of the level to which an
entity, asset, system, network or geographic area is susceptible to harm when it
experiences a hazard.
Vulnerability Assessment product or process of identifying physical features or operational attributes that render an entity, asset, system, network or geographic area
susceptible or exposed to hazards.
xxxiv
Glossary
Wave Theory (of terrorism) a theory that contends terrorism ebb and flow in increments of 40-year iterations. The different “waves” are products of the conditions
and climate of the times in which they occur; driven by myriad factors that compel terroristic actors to heed the clarion call of violence in action around a particular ideology.
Westphalian Sovereignty the assumption of international law that a nation state has
sovereignty over its land and internal affairs, to the exclusion of all external powers, on the principle of non-interference in another country’s internal affairs, and
that each state is equal in the eye of international law.
Note
1 This glossary draws on terms and definitions from the US DHS Lexicon (2010) retrieved
at: https://www.cisa.gov/sites/default/files/publications/dhs-risk-lexicon-2010_0.pdf, the
IPCC Glossary (2018) Retrieved At: Https://Www.Ipcc.Ch/Site/Assets/Uploads/2018/11/
Sr15_Glossary.Pdf, and the Guide To Emergency Management And Related Terms, Definitions, Concepts, Acronyms, Organizations, Programs, Guidance, Executive Orders &
Legislation (2007) by Wayne Blanchard, retrieved at: https://training.fema.gov/hiedu/
docs/terms%20and%20definitions/terms%20and%20definitions.pdf
1
Introduction to security theory
James D. Ramsay, Keith Cozine and John Comiskey
Description. Security is an elusive concept. It is dynamic, value-laden and complex.
Ultimately it means different things to different people or governments and can even
change in meaning over time to the same people or governments. Modern homeland
security overlaps, but not entirely the notion of domestic, national and international
security, which necessitates a broad integrated effort at all levels of government, including the private sector, as well as an interagency collaborative capacity. Complicating
the structure and operation of homeland security is the terrific variation in security
models and laws that are held by our allies internationally. Ultimately, “being secure”
is an end state that all national security models pursue. How best to secure the US
nation from threats foreign and domestic, including natural threats and hazards from
climate change to landslides consumes much of the US federal government’s time and
treasury and can be likened to a complex, adaptive system since the “problem set” that
homeland security struggles to solve includes more wicked than tame problems. This
chapter reviews the origins of theory, levels and models of theory, and will offer a brief
overview of the nature of wicked problems.
Upon successful completion of this chapter, students should be able to:
1. Describe what a theory is and how theory supports professional disciplines.
2. Distinguish between four levels of theory: grand theory, macro-theory, mesotheory and micro-theory.
3. Offer a working definition of homeland security.
4. Distinguish between wicked and tame problems.
5. Describe how individual disciplines contribute structure, strategy and theory
to modern homeland security, thus creating a theoretical underlayment for a
“grand theory of homeland security”.
1.1 Introduction
The term homeland security first came into the American lexicon ten days after
the September 11th terrorist attacks in 2001 when the U.S. President George W.
Bush created the Office of Homeland Security. The office was created to “develop
and coordinate the implementation of a comprehensive national strategy to secure
the United States from terrorist threats or attacks”. (History.com Editors, 2019;
White House, 2001). President Bush appointed former Pennsylvania governor Tom
Ridge as inaugural director of the office the following month. The idea and concept of homeland security were further solidified with the passage of the Homeland
2
James D. Ramsay, Keith Cozine and John Comiskey
Security Act of 2002, which created the Department of Homeland Security (DHS)
as a cabinet-level federal department. However, both the term homeland security and
the concept of a specific agency dedicated to preserving it predate the September 11
terrorist attacks. The U.S. Commission on National Security in the 21st Century,
also known as the Hart-Rudman Commission, under President Clinton, was established in 1998 to provide a comprehensive review of US national security requirements in the 21st century. The commission argued that the United States was facing
a radically new security environment in which the threat of a mass casualty attack
on the American homeland was real, and called for a “National Homeland Security
Agency” to deal with this new (and mostly domestic-facing) threat environment
(Roxborough, 2001).
Over the last 18 years, we have witnessed an evolution in both the DHS and its role
in preserving and protecting liberty and the free flow of people and commerce. It
has grown into something much more than a single government agency. As the 2014
Quadrennial Homeland Security Review points out, providing for the safety and security of the American people from a variety of natural and man-made threats requires
partnerships between federal departments and agencies; state, local, tribal and territorial governments; nongovernmental and private sector organizations; our foreign
allies; and the American public (DHS, 2014).
While the term “homeland security” is somewhat uniquely American, the underlying concepts, strategies and structures constituting the homeland security enterprise are not. Indeed, a Federal Department whose mission is squarely focused on
a coordinated and seamless effort involving all levels of government to confront the
complex and wicked threat environment of the 21st Century as outlined in the HartRudman Commission is not only logical, but present in most developed nations.
After the events of September 11, 2001, the United States as well as several other peer
nations especially within the Anglosphere, strategically restructured their government at the national level in order to be better situated to protect its populations. In
a post “9/11” world, domestic security suddenly seemed more dynamic, asymmetric,
transnational, complex and pernicious. In 2003, Public Safety Canada was created
to “ensure coordination across all federal departments and agencies responsible for
national security and the safety of Canadians” and included the Canada Border
Services Agency (CBSA), Canadian Security Intelligence Service (CSIS) and the Royal
Canadian Mounted Police (RCMP) in the Department. (Public Safety Canada, 2015).
Since 2001, the United Kingdom has periodically restructured several of its security
agencies to now include the UK Border Force, the UK Visas and Immigration (UKVI)
office and the Immigration Enforcement (IE) office all within the Home Office. In
addition to the Home Office, there are other security and safety agencies such as
HM Inspectorate of Constabulary and Fire & Rescue Services, National Counter
Terrorism Security Office and UK Security Service (MI5). In 2013, the National Crime
Agency (NCA) was established to combat organized crime; human, weapon and drug
trafficking; cybercrime; and economic crime that goes across regional and international borders (Cozine, 2016). In December of 2017, Australia created the Department
of Home Affairs with the responsibilities for immigration and customs border policy;
national security and law enforcement policy; emergency management, including
crisis management and disaster recovery; countering terrorism; cyber-security policy; countering foreign interference; critical infrastructure protection; and transportation security. Agencies within Home Affairs include the Criminal Intelligence
Introduction to security theory 3
Commission, Australian Border Force, Australian Federal Police, AUSTRAC (the
Australian Transaction Reports and Analysis Centre) and Australian Intelligence and
Security Organizations (Home Affairs, 2019).
Along with the development of federal “homeland security” organizations within
the Anglosphere, a tremendous growth of homeland security academic programs
at colleges and universities has occurred, particularly in the United States. As of
2019, the University Agency Partnership Program administered by the Naval Post
Graduate School’s Center for Homeland Defense and Security lists 460 homeland
security-related academic programs, including programs at the Associate, Bachelor,
Masters and Doctoral levels (UAPP, 2019). While some of these programs emerged
from existing criminal justice or emergency management programs, others were built
from the ground up drawing academic content from existing fields such as criminal
justice, emergency management, political science, public administration and security studies to name but a few. Over the past decade and a half, homeland security
programs have evolved core topics and curricula centered on all-hazard threats, critical infrastructure, critical thinking, collaboration, cyber security, emergency management, intelligence, law and policy, leadership, preparedness, risk management,
strategy and terrorism (Comiskey, 2018). Another recent development in the maturation of homeland security as an academic discipline was the International Society
for Preparedness, Resiliency, and Security (INSPRS) identification of nine knowledge
domains, which should be part of undergraduate homeland security curricula. These
include critical infrastructure and resilience, emergency management, human and
environmental security, intelligence, law and policy, professionalism, risk management, strategic planning and terrorism. Knowledge domains refer to the knowledge,
skills, abilities and behaviors that should be part of a discipline’s curricula (Ramsay &
Renda-Tanali, 2018).
Despite these steps and initiatives to move homeland security forward as an academic discipline, no grand theory or overarching framework of homeland security
has evolved. As Comiskey (2018) points out, “homeland security academics as well as
practitioners have an obligation to the evolving discipline to identify, develop, and test
theories and methodologies that will prepare practitioners for the field and to address
homeland security problems”. He continues, “they must introduce, explain, analyze,
test, develop and generate theory and other methodologies that will grow and mature
the field”. (Comiskey, 2018) A profession uses its underlying theory to establish best
practices and legitimacy of practice. As knowledge evolves, theory evolves, and vice
versa. It turns out that theory, though a critical underlayment to all disciplines, is not
static. As in all disciplines, theory is both dynamic and foundational and continues to
evolve as research, changes in technology, best practices, lessons learned all contribute to the body of knowledge of the field. Theory also subsequently serves as a guide
for ongoing research and scientific inquiry. In short, theories are the pillars of any
academic discipline, and ultimately, any profession. But what exactly is theory?
1.2 What is a theory?
In everyday use, the word “theory” often means an untested hunch, or a guess without
supporting evidence. However, for the academic, the scholar or the scientist, a theory
has nearly the opposite meaning and is nearly always accompanied by observation
and other data to support the relationships theorized. To these professionals, theory
4
James D. Ramsay, Keith Cozine and John Comiskey
is a well-substantiated explanation of some aspect of the natural world that can incorporate laws, hypotheses and facts (American Museum of Natural History, 2005). A
theory provides reasoning (or suspected logic) for why something may occur the way
it does, or why things may be related the way they appear to be, or it may attempt to
explain observed patterns in behavior. Theories appear from many sources with varying quantities (and quality) of evidence that reinforces an observed relationship. Some
theories have little to no evidence, and seem mostly constituted by observation while
others are supported by considerably more empirical evidence. Components of a definition of theory should include a set of assumptions, propositions or accepted facts
that attempt to provide a plausible or rational explanation of cause-and-effect (causal)
relationships among a group of observed phenomena. One of the major functions of a
theory is to provide an answer to the question “why?”. Asking “why?” is central to our
need to understand how the world works, to increase our knowledge of a subject area
or to predict what might happen next, or to realign thoughts and opinions. Asking
“why?”, therefore, is an essential skill for anybody who wants to learn and develop and
grow. Defining “theory”, therefore, must consider the “why?” question. But a more
complete theory is necessarily deeper than merely asking “why?”. A more robust theory also includes an attempt to explain why and so to provide understanding. A theory
is not just “any” explanation—a theory comes into being when a series of ideas or
observations come to be held and accepted by a wider community of people as being
factual. Moreover, a theory is not only factually based, but how we understand and
provide explanations about real-world phenomena also involves one’s cultural background as well as one’s worldview.
What then is a theory? Put simply, a theory not only is a logical attempt to explain
observed phenomena and known facts; it also allows scientists to make predictions
of what they should expect to observe were their theory true. In this sense, theories
are testable. New evidence should be compatible with a theory. If it is not, the theory is refined or rejected. A theory can never be considered wholly true. Indeed, a
well-evidenced theory that is widely considered factual at a given point in time may,
in the future, need to be modified upon the discovery of new evidence. Similarly, a
theory with little supporting evidence may, in time, be corroborated by evidence
gained through the development of new technologies and research techniques. In
this way, theories can be modified or amended over time as understanding of the
subject matter evolves, as technologies are invented that can gather better evidence,
or as repeated application of the theory may reveal confirming or disconfirming
evidence. Just as no theory can ever be considered pure fact, no theory can likewise be completely discredited even if there is an overwhelming amount of opposing
physical evidence. In fact, competing theories can complement each other or conflict
with each other. This is healthy, encourages critical analysis, supports the scientific
method and leads eventually, to a more robust and in depth understanding of each
theory and the evidence/research that supports it. The longer the central elements
of a theory hold—the more observations it predicts, the more tests it passes, the
more facts it explains—the stronger the theory. For example, Darwin’s theory of
evolution explains why so many plants and animals—some very similar and some
very different—exist on Earth now and in the past, as revealed by the fossil record.
Many advances in science—the development of genetics after Darwin’s death, for
example—have greatly enhanced evolutionary thinking. Yet even with these new
advances, the theory of evolution persists today, much as Darwin first described
Introduction to security theory 5
it, and is universally accepted by scientists as valid (American Museum of Natural
History, 2005; Darwin, 1859).
1.3 The goal of theory development and the rise of homeland
security theory
Theories are developed for many reasons. A common goal of theory development is,
for example, to better predict future events. Understanding how certain businesses
tend to react under certain circumstances can, for example, lead to more successful
investment strategies. However, we also point out that the goal of theory development is not always the same and the type of theory developed often has its origins
in the initial question of “why?” For instance, in an attempt to better understand
what might constitute appropriate content in academic homeland security curricula,
Comiskey (2018) identified five types of theory widely utilized in homeland security
studies as an academic discipline; descriptive theory, explanatory theory, normative
theory and predictive theory, as well as the inductive process referred to as grounded
theory. Descriptive theory describes or classifies specific dimensions or characteristics of individuals, groups, situations or events by summarizing the commonalities found in discrete observations (Godfrey-Smith, 2003; Joas & Knobol, 2009).
Explanatory theory predicts precise or causative relationships between dimensions or characteristics of phenomena or differences between groups (Fawcett &
Downes, 1986; Turner, 2017). Normative theories make value judgments; they prescribe what should be (Godfrey-Smith, 2003; Sjoberg & Nett, 1968). Predictive theory predicts outcomes (Betts, 1982; Bookstaber, 2017). Last, grounded theory is the
product of inductive inquiries from which general theories of processes, actions or
interactions are derived (Glaser, 1967).
Just as the “why?” is important to theory development, “what” is being studied,
or the level of analysis of the study, also plays an equally important role. Combining
the “why”, with the “what” leads to four super-ordinate levels of theory: grand theory, macro-theory, meso-theory and micro-theory. Grand theory attempts an overall
explanation of social life, history or human experience. Grand theory also provides
a general framework for many smaller theories (Ek & Tesfahuney, 2011; Mills, 1959;
Skinner, 1985). Macro-level theories explain larger social systems, processes and
institutions. Meso-, or midlevel theories, are less ambitious than their macro-level
counterparts, tend to be less abstract while they emphasize midscale processes
and interactions, and as the name implies, often links macro and micro theories
(Creswell, 2009). Microlevel theories provide explanations of smaller social groups,
systems, processes and institutions (Ougaard, 2013).
Understanding the origins and types of theory is helpful when trying to understand
the discipline of homeland security, or at least in our attempt to apply a theoretical
description of it. In fact, using theory to better explain homeland security is rather
important to the overall health and safety of the nation. Consider that a good theory of
homeland security would enhance our ability to be prepared for pandemics, hurricanes
or terrorist attacks. Indeed, a robust theory of homeland security would improve how
we teach the next generation of practitioners and ultimately is key to our national preparedness and our national security. In addition, this complexity begets the question
security studies academics have pondered since the advent of the first academic degree
programs; that is, what do we teach students of homeland security and why? However,
6
James D. Ramsay, Keith Cozine and John Comiskey
it is at this point that our understanding of homeland security needs to be checked.
Like medicine and engineering, homeland security is actually more complex than one
might think at first blush. In practice, homeland security acts more like a discipline
of disciplines, or a meta-discipline (Ramsay, 2012; Ramsay & Renda-Tanali, 2018). In
other words, modern homeland security is component of several extant disciplines
including criminal justice, emergency management, cybersecurity, risk management,
preparedness, resilience, communication, strategy and decision-making, intelligence
and terrorism to name a few. From the perspective of theory development, the dilemma
this poses is whether it is possible to develop a theory of a meta-discipline?
When attempting to consider a “theory of homeland security”, it is immediately
obvious that theory typology and levels of analysis are central to this task. To start,
let us explore the complexity of the concept of “security”. The term “security”
derives from the Latin word securitas whose root is securus meaning “without care”.
Further, security has been ascribed various definitions within academic literature.
Manunta (1999) has defined security as a “basic need”. Another view of security
offered by Fischer and Green (2004) is that it “implies a stable, relatively predictable
environment in which an individual or group may pursue its ends without disruption
or harm and without fear of disturbance or injury”. Security is often tied to feelings of safety as indicated in a hierarchy of needs as proposed by Maslow. Security
has been classified as the second-most important need for all humans, trailing
only the physiological necessities such as food, water and shelter (McLeod, 2007).
Security is a combination of material circumstances and the physiological state produced by those circumstances. Security is as much about peace of mind, order and
stability as it is about physical wellbeing (Caldwell & Williams, 2016). Wolfers’ (2011)
work addresses security as a value, defining security as the absence of threats to
acquired values, or the fear that those values will be under threat. These are but
a few of the many definitions of security found in the academic literature. For our
purposes a simple definition of security is as a condition or state of being free from
a threat of harm. Security it seems, in its most basic form covers a broad terrain and
implies several levels. On one extreme it is an individual’s perception of well-being
when one is free from threats to one’s welfare. Yet, on the other extreme, security
can imply a condition where either a nation or even the international community is
stable and free of conflict.
The perspective that security subsumes a broad array of levels from individual well-being to global security mirrors the concept of the Homeland Security
Enterprise. As suggested above, the Homeland Security Enterprise concept includes
a broad and expansive effort, across several levels of government and the private
sector, to provide for the safety and security of the American people from a variety of natural and man-made threats. Specifically, such an effort requires partnerships between federal departments and agencies; state, local, tribal and territorial
governments; nongovernmental and private sector organizations; our foreign allies;
and the American public (DHS, 2014). Clearly, this is the case if security concerns
encompass individual, the international system, and several levels of security in
between. As such, it is readily apparent that all four levels of theory; grand theory,
macro-theory, meso-theory and micro-theory are important to the development of
homeland security theory. Likewise, as homeland security programs have evolved
core topics and curricula centered on all-hazard threats, critical infrastructure, critical thinking, collaboration, cyber security, emergency management, intelligence,
Introduction to security theory 7
law and policy, public health, leadership, preparedness, risk management, strategy
and terrorism; the diversity of these topics means that descriptive theory, explanatory theory, normative theory and predictive theory will be equally important in the
future development of homeland security theory. Consequently, the theories mentioned here will serve as pillars on which a distinct homeland security theory will
begin to be built. As we’ve discussed, a theory is critical to a discipline’s ability to
test, evaluate and advance its operations or strategies. What aids theory development is the degree to which the concept can be defined. After all, it seems inherently
difficult to develop a theory around something that cannot be defined. Toward this
end, the next section will offer a working definition of homeland security and the
nature of the problems it attempts to manage.
1.4 Wicked vs. tame problems and the homeland security problem set
A decision science perspective would describe the challenges that confront the
Homeland Security enterprise as wicked problems. Wicked problems are those that
exhibit the following characteristics: the solution depends on how the problem is
framed; the problem can change in response to an attempted solution; stakeholders
vary considerably in how they define and understand the problem or what a solution
would be; suspended judgment and iteration are key in resolving the problem; the
constraints and resources available to address the problem change over time; and the
problem is never (totally) solved—that is wicked problems are better managed than
solved.1 The primary difference between wicked problems and their counterparts,
tame problems, is that although tame problems can be complex (i.e., building a jet
engine), there is typically broad agreement on the solution pathway, benchmarks of
success and general agreement on what the end state should be. Wicked problems
do not tend share these characteristics. For example, classic issues homeland security grapples with that we would classify as wicked include climate change, immigration and border security, pandemic preparedness, asymmetric violent extremism
and cybersecurity. Herein lies the difficult with a precise definition of what homeland
security is, and logically, what it is not. The next section will promote a working definition of homeland security.
1.4.1 A working definition for homeland security
It seems logical that to develop a theory of something, we would first need to define it.
Several have attempted robust definitions of homeland security (Bellavita, 2008, 2011;
Ramsay, 2013; Ramsay & O’Sullivan, 2013; Ramsay & Renda-Tanali, 2018). The difficulty in devising a simple definition is that homeland security is a conceptual framework that we suspect contains at least three generic, primary characteristics:
1. Homeland security is complex. That is, it is multifaceted and multidimensional
and interdisciplinary—it is a composite system of systems, which even in its
simplest conceptions (as primarily terrorism-focused) involves multiple levels
and realms, from local to international, and a diversity of institutions, societies
and demographics.
2. Homeland security is dynamic. As both concept and practice and given the
evolving nature of possible threats (including the perceptions of and responses
8
James D. Ramsay, Keith Cozine and John Comiskey
to those threats), what is and is not homeland security can itself be expected to
change in concept, as well as in application over time.
3. Homeland security is value laden. That is, homeland security can be expected to
hold different meaning to different constituents or stakeholders.
In order to begin to devise a grand theoretical framework for homeland security, we
offer a broad working definition of homeland security. We offer this with the caveat
that it is neither an all-inclusive nor perfect definition, and that homeland security will
in many regards always be a contested term. But by having a working definition, we
have a clearer path toward establishing of a working theory of homeland security; that
is, a theory that needs to be inclusive of the range of policy, law, practice, operations,
strategies, structures and objectives that collectively comprise the homeland security
enterprise. Thus, as follows:
Homeland Security2 may be described as risk-based, multidimensional (or interdisciplinary) complex adaptive system3 which includes an integrated national effort by all levels
of government – federal, state, local and tribal – as well robust domestic and international partnerships between the public and private sectors and nongovernmental organizations to protect the people, property, the environment and territories of the United
States from natural, accidental, and unconventional (nonmilitary) manmade threats
and hazards in order to defend liberty and ensure the free flow of people and commerce.
The above definition offers a robust operationalization of the homeland security concept, and would include the relative contributions of several subdimensions, from academic to applied, among them (not a comprehensive, but also a working, list—for the
sake of framing the broader argument): public health, science and technology, environmental systems and security, law and policy, pubic administration, systems engineering, organizational and leadership theory, criminal justice, critical infrastructure
protection, economic analysis, public opinion and social psychology (from a variety of
social science perspectives), politics4 and international relations, intelligence analysis,
counterterrorism and emergency management. With a working definition in mind,
we are ready to consider how a “theory of homeland security” might be constituted.
1.5 A theory of homeland security?
As alluded to above, the search for a “grand theory of homeland security” is vexed by
its expansive nature, its operational dependencies and the types of problems the homeland security enterprise seeks to resolve. Due to the wicked nature of the homeland
security problem set, some have characterized the nature of homeland security as a
meta-discipline, or a discipline of disciplines with different functions and specialties that
range from counter terrorism to national security, border security to intelligence and
critical infrastructure protection to environmental and human security (Church, 2010;
Ramsay, 2012; Ramsay & Renda-Tanali, 2018; Simon, 2009). That is, homeland security as academic discipline is by its nature, inherently interdisciplinary. Indeed, a recent
study by Comiskey (2015) found that that the majority of all collegiate homeland security
curricula in the United States were categorized as either multidisciplinary or interdisciplinary drawing their content from a variety of other disciplines further corroborating homeland security’s interdisciplinary nature. Though such a nature complicates
Introduction to security theory 9
our search for a theory of homeland security, it seems rather common for emergent
academic disciplines to “borrow” content and theory from other disciplines. Consider
the growth of medicine. Medicine today is a composite of many subdisciplines such as
chemistry, physics, anatomy, physiology, toxicology, biochemistry, psychology and epidemiology, to name a few. As research has supported the practice of medicine, theories
of medicine have improved from disbalances of humors in ancient Greece, to germ theory to the modern use of pharmaceuticals or the use of positron emission tomography
(PET). Likewise, interdisciplinarity is an important characteristic of homeland security
in terms of theory development because it supports the very goals of the kind of research
that informs the discipline. For instance, the purpose of interdisciplinary research is
not merely to integrate information, but to provide a more comprehensive collection
of information from different fields in order to optimize understanding, application or
prediction. Consequently, interdisciplinary research explicitly attempts to integrate the
plurality of information (Pohl, Truffeer, & Hadron, 2017).
Whether labeled interdisciplinary, multidisciplinary or a meta-discipline, it is clear
that several more established academic disciplines have an impact on the intellectual
and operational aspects of modern homeland security, and as such, confirming that
it is an integrated academic discipline. That is, we assert that an overall theory of
homeland security can be constructed by leveraging its interdisciplinary nature. As
such, we attempt to establish a grand theory of homeland security as the composite of
theories of its component parts. Further, components of the practice, organization or
strategy of homeland security would seem to be critical to the formation of an overall or grand theory. Hence, by establishing how the component disciplines of homeland
security support either the strategy, the operations or the structural organization of the
homeland security enterprise, we approach a grand theory of homeland security as the
integrated set of theories of its component disciplines. For instance, homeland security
is largely based on law. By understanding the theory of law, how law supports operations, tactics, strategy and structure of domestic security (i.e., its agencies, operations,
practices, policies), we discover a component of the larger whole, that is, overall homeland security theory.
The subsequent chapters of this text will examine how the component disciplines
of homeland security support its operations, strategies, tactics and structure. The
theories described in this text may serve to guide academic and practitioners when
researching homeland security problems, issues and concepts. It is our hope that such
future research and subsequent inductive inquiries will lead to the development of a
grounded theory of homeland security. From this, it would be possible to derive more
general theories of processes, actions, or interactions of homeland security that in
turn inform academic curricula that in turn supports national workforce development, policy development and the identification of best practices. Last, were such a
grand theory to evolve and mature, we expect for example that our nation’s ability to
anticipate disasters, develop resilience or avert violent extremism would improve, thus
defending liberty and enhancing the safety and security of the nation and its people.
1.6 Organization and overview of this text
Including this introduction, this text is organized into 14 chapters. Chapters 2-14 each
discusses a core discipline upon which the modern profession of homeland security
draws expertise that supports its organization, structure, strategy or operations. Each
10 James D. Ramsay, Keith Cozine and John Comiskey
chapter describes how that discipline is organized and how its own theoretical underpinnings directly impact aspects of the practice of homeland security. The following
synopses briefly overview each of the remaining chapters.
Chapter 2. Risk and the Homeland Security Enterprise by Brian Harte. The dynamism and complexity of the homeland security environment requires the use of
a variety of risk frameworks, models and theoretical applications to effectively
assess both current and future threats, risks and vulnerabilities. Moreover, the
need for comprehensive resiliency building and risk management strategies are
also apparent within this environment. The primary goal of this chapter is to
illustrate how risk and risk management work and lie at the heart of modern
homeland security practice and strategy.
Chapter 3. The Sociology of Security by Terrence O’Sullivan. Security is often understood as a perception of reality by individuals, social groups and institutions.
Whether one’s perspective is from that of a government and adviser or a member of society, security is a perception of the social world which has profound
consequences for the way we live our daily lives. A better understanding of the
sociology of security helps us formulate theory, strategy and operations.
Chapter 4. Crime and Security Chelsea Binns. Criminology, like homeland security, initially drew its theoretical foundations from other disciplines. Now, criminology has its own theoretical base, much of which is in turn contributing to
the emerging theory in homeland security. This is particularly true of theories
related to deterrence and crime prevention. This chapter will examine some
of these theories and how they are specifically applicable to deal with security
threats and hazards faced by security professionals. Case studies will be used to
demonstrate how these theories have been applied in the real world.
Chapter 5. Terrorism: Origins, Ideologies and Goals by Kyle McDonnell and Keith
Cozine. It is imperative that security policy makers, practitioners and researchers understand the political, historical and social theoretical underpinnings of
international and domestic terrorism. While there is no universally accepted
definition of terrorism, this chapter will nonetheless attempt to define terrorism. Next, it will examine the various social theories of terrorism and how they
contribute to the development of the different types of terrorism. Finally, the
chapter will explore how these theories might help develop an estimation of what
the terrorism will look like in the future so that effect policy and strategies to
counter terrorism can be developed.
Chapter 6. Interagency Collaborative Capacity by John Comiskey. Homeland security draws on expertise and requires working relationships with dozens of other
agencies and organizations. When one considers the origins of terrorism, for
example, one realizes that to understand and defeat terrorism requires expertise from sociologists, the legal and law enforcement communities, the intelligence community, the military as well as the State Department to name a few.
Interagency collaborative capacity (ICC) theory provides a practical framework
for homeland security policy makers and practitioners to cooperate, coordinate
and collaborate effectively to protect the Nation. This chapter will trace homeland security’s interagency collaboration imperative to the post-World War II
U.S. security and intergovernmental relations landscape. The chapter will then
describe the post-9/11 and post-Hurricane Katrina threat landscape and the
Introduction to security theory 11
multiple interagency partnerships and processes that developed as a result. It
will describe interagency initiatives that were brought about by new challenges
such as catastrophic natural disasters, industrial accidents and cyber vulnerabilities. The chapter will illuminate interagency partnerships and initiatives that
exemplify ICC’s efficiencies and effectiveness.
Chapter 7. Emergency Management and Theories of Prevention, Response and
Recovery by Irmak Renda-Tanali. The theory of being “secure nation” does not
mean that adverse events never occur. Indeed, the hallmark of a secure nation
is indeed the resilience and preparedness capabilities of a nation, and its ability
to withstand and recover from adverse events. Hence, existing theories from
both emergency management and security to describe the degree to which the
United States is prepared for, can prevent, respond to and recover from adverse
events including acts of mankind (i.e., terrorism, violent crime) or of Mother
Nature (i.e., weather-related challenges, natural disasters, climate change). As
a result, the United States has developed a national preparedness goal. The
field of emergency management plays a critical role in supporting and sustaining a national workforce capable of accomplishing the national preparedness
goal. This chapter will provide a history of the law and policy that gave rise to
and that supports the emergency management discipline. It will also provide
a basis for including emergency management into a more inclusive concept of
human security and as a necessary basis for a more complete model of national
security.
Chapter 8. Global Governance and The Relationships Between Nations by Keith
Cozine. International Relations theory explains why nations do or do not
cooperate with other to address issue that is transnational in nature. Global
governance theory tries to explain the mechanisms used to facilitate this cooperation. The chapter will first define global governance in terms of the concept of governance in the absence of government and how this approach is
used to address the natural and man-made security threats faces today. Key
theories and concepts explored in the chapter include the theory of the State,
Anarchy, Multilateralism, hard and soft law, international norms, regime theory and network theory. Various tools of global governance will be discussed
in terms of how they are used to combat various natural and man-made threats
to security.
Chapter 9. Intelligence and Theory of Preventive Action by Erik Dahl. Intelligence
in its most basic definition is about providing decision makers with knowledge
or foreknowledge of the world around them. Good intelligence is essential to
developing policies and strategies to deal with the wide range of threats and
hazards faced by security professional today. Theories of intelligence and its use
date back to the fifth century BCE and Sun Tzu’s Art of War. While Tzu’s theory focused primarily on intelligence for military conquest, uses for intelligence
has expanded overtime so too have theories on intelligence and its use. This
chapter examines these theories and their applications in today’s diverse threat
environment
Chapter 10. Human and Environmental Security Theory by James Ramsay and
Terrence O’Sullivan. This chapter describes some of the various dimensions of
human security—a highly complex system of “wicked problems”, and the link
to an environmental security mandate, in the face of climate disruption. The
12
James D. Ramsay, Keith Cozine and John Comiskey
all-encompassing climate security magnifies the need to use human security as
a strategic planning priority, integrated across the more traditional notions of
national and homeland security.
Chapter 11. Public Health as a Critical Infrastructure by Terrence O’Sullivan and
James Ramsay. One of the Nation’s 16 Critical Infrastructure Sectors, the
Healthcare and Public Health Sector protects the Nation from hazards such
as terrorism, infectious disease outbreaks and natural disasters. Public health
can proxy several challenges posed by large complex and adaptive systems that
comprise the many sectors of our nation’s economy. For example, the public
health sector exemplifies the need for public–private partnerships, cybersecurity, civil liberties, privacy and international relations and the implications
of climate change on security. From a threat intelligence perspective, public
health includes both pandemics (such as the current COVID-19 pandemic)
and epidemics as significant threats to liberty, and the free flow of people and
commerce making public health an integral component of homeland security
theory.
Chapter 12. Law, Policy and Domestic Security by Michael McDaniel. At the end of
the day, homeland security is a discipline based on law and policy. This chapter
will provide an overview of key legal, policy and ethical issues and the legal
and policy bases to modern Homeland Security. The chapter will examine legal
concepts regarding constitutional rights of individuals, the legal process, access
to courts, the law(s) of war and national security principles as they relate to
homeland security legislation and policy initiatives. Legal principles of due process, habeas corpus, search and seizure, compulsory process and international
agreements are explored in greater depth. The law of war will be examined in the
context of preemptive war and the current National Security Strategy, as well as
issues involving the status of combatants and detention.
Chapter 13. Cybersecurity Policy and Theory by Maeve Dion. Both modern lifestyles and modern concepts of national security are dependent on a safe, stable and resilient cyberspace. However, to create and sustain a safe and secure
cyberspace is itself a wicked problem as the threat environment is dynamic,
complex and policy responses untested and value laden. This chapter will provide a survey of the broad and emergent field of cybersecurity and information assurance and how it is critical to preparedness and resilience of modern
governments and private industry. Specifically, topics will include a definition
of information security, the concept of threat vectors, offensive and defense
policies and strategies, ethical and legal issues that surround the practice
environment, risk management strategies planning and information security
technology.
Chapter 14. Technology—Adaptation, Management and Application by Michael
Larrañaga and Patrick Smith. Technological advances are shaping the human
experience at an exponential rate. There are a few theories, frameworks and
models attempting to address technology, which tend to be associated with the
disciplines of science and technology and communication studies. The theories
attempt to address the relationship between technology and society and prompt
questions about agency, determinism/autonomy and teleonomy. Homeland security professionals are charged with preventing terrorism, securing the Nation’s
borders, enforcing and administering immigration laws, safeguarding and
Introduction to security theory 13
securing cyberspace and ensuring resilience to disasters. Each of these mission
spaces is impacted by new and emerging technologies. This chapter examines
a multitude of existing and emerging technological theories, frameworks and
models and their applications in the homeland security ecosystem.
1.7 Summary and conclusions
This chapter discussed the nature of “theory” and presented several types of theories
and how they might be used in social science research. Among these was the notion of
a “grand theory”. Grand theories attempt to provide an overall explanation of social
life, history or human experience. In addition, a grand theory also provides a general
framework for many smaller theories—a key aspect we leveraged in order to accommodate a “theory” of homeland security. Supporting the use of a grand theoretical
framework regarding homeland security, we described (and characterized) the homeland security discipline as a “discipline of disciplines” or “meta-discipline”; hence, any
theory that would envelop the gestalt the homeland security enterprise would need to
accommodate the breadth inherent in the component parts, or pillars, that constitute
the strategies, operations and structure of the homeland security discipline. Toward
this end, each chapter described above represents a pillar or contributing discipline of
homeland security. Collectively, in this way, “homeland security theory” is a composite of the theoretical foundations of its disciplines that contribute to the operations,
strategies and institutional structures of the homeland security enterprise. Just as all
theories evolve in the presence of new research, best practices and improvements in
technology, so will a grand theory of homeland security evolve as new revelations of
our understanding of public health, terrorism, crime, emergency management arise,
or as other disciplines contribute to the strategies, operations or even structures of the
enterprise, or as improvements in technology and cybersecurity evolve. This evolution
is healthy, appropriate and even expected given the wicked nature of the homeland
security problem set.
We hope you enjoy and benefit from this text.
Notes
1. A full discussion of wicked and tame problems is beyond the scope of this chapter. Interested readers should see: Rittel and Webber (1973). Dilemmas in a general theory of
planning, Policy Science, 4, 155–169; and Wicked Problems by T. Ritchey (2011), Swedish
Morphological Society, Springer Publications, VI, ISBN 978-3-642-19653-9.
2. Many have commented as Bellavita that even the term “homeland security”, can have
multiple meanings to different constituents; see for example: Bellavita, Christopher.
(2008). Changing homeland security: What is homeland security? Homeland Security
Affairs, 4(2). http://www.hsaj.org/?article=4.2.1. Hence the authors here conclude that
given the institutional reality of the Department of Homeland Security, for the time being
we are likely stuck with the name.
3. Complex adaptive systems are systems “… in which large networks of components with
no central control and simple rules of operation give rise to complex collective behavior,
sophisticated information processing, and adaptation via learning or evolution”. Mitchell
(2009). Complexity: A guided tour (p. 13). USA: Oxford University Press.
4. Up to and including political ideology, which is prominent in critical current U.S. political debates about the appropriate role of government in providing public goods, from
human security (social welfare safety nets, critical infrastructure and disaster response)
to national (and homeland-) security priorities.
14 James D. Ramsay, Keith Cozine and John Comiskey
References
American Museum of Natural History. (2005). Darwin. Available at: https://www.amnh.org/
exhibitions/darwin
Bellavita, Christopher. (2008). Changing homeland security: What is homeland security?
Homeland Security Affairs, 4(2). Available at: http://www.hsaj.org/?article = 4.2.1 (accessed
February 4, 2020).
Bellavita, Christopher. (2011). Changing homeland security: In 2010 was homeland security
useful? Homeland Security Affairs Journal, 6(1).
Betts, R. K. (1982). Surprise attack. Washington, DC: Brookings Institute Press.
Bookstaber, R. (2017). The end of theory: Financial crises, the failure of economics, and the sweep
of human interaction. Princeton, NJ: Princeton University Press.
Caldwell, D., & Williams Jr, R. E. (2016). Seeking security in an insecure world. Rowman &
Littlefield.
Church, K. (2010). Enhancing unity of effort in homeland defense, homeland security, and civil
support through interdisciplinary education (Master’s thesis). Retrieved from http://www.hsdl.
org/?abstract&did=25735
Comiskey, J. (2015). How do college homeland security curricula prepare students for the field?
Journal of Homeland Security Education, 4, 20–40. http://www.journalhse.org/v4-comiskey.
html
Comiskey, J. (2018). Theory for homeland security. Journal of Homeland Security Education,
7, 29–45.
Cozine, K. (2016). Fragmentation and interdependency: Border security intelligence in North
America and Europe. The International Journal of Intelligence, Security, and Public Affairs,
18(3), 175–197.
Creswell. J. W. (2009). Research design: Qualitative, quantitative, and mixed method approaches
(3rd ed.). Los Angeles, CA: Sage.
Crenshaw, M (1990). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic
Choice. Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. New
York: Cambridge University Press, pp. 7–24.
Darwin, C. (1859). The origin of species by means of natural selection. London: John Murray
Department of Homeland Security. (2014). Quadrennial homeland security review. Available at:
https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf
Dorothy Estrada-Tanck has published Human Security and Human Rights under International
Law: The Protections Offered to Persons Confronting Structural Vulnerability (Hart
Publishing 2016).
Ek, R., & Tesfahuney, M. (2011). Theorizing the earth. In Corvellec, H. (Ed.). What is theory?:
Answers from the social sciences. Copenhagen, Denmark: CBR Press.
Fawcett, J., & Downs, F. (1986). The relationship of theory and research. Norwalk, CT: Appleton
Century Crofts.
Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: ButterworthHeinemann.
Glaser, B. G. (1967). The discovery of grounded theory: Strategies for qualitative observations.
Chicago, IL: Aldine Publishing.
Godfrey-Smith, P. (2003). Theory and reality: An introduction to the philosophy of science.
Chicago, IL: University of Chicago Press.
History.com Editors. (2019). The Office of Homeland Security is founded. A&E Television
Networks. Available at: https://www.history.com/this-day-in-history/office-of-homelandsecurity-founded.
Home Affairs. (2019). Who are we. Available at: https://www.homeaffairs.gov.au/about-us/
who-we-are/overview
Joas, H., & Knobol, W. (2009). What is theory? In Social theory: Twenty introductory lectures.
Cambridge, United Kingdom: Cambridge University Press.
Introduction to security theory 15
Manunta, G. (1999). What is Security?. Security Journal, 12(3), 57–66.
McLeod, S. (2007). Maslow’s hierarchy of needs. Simply Psychology, 1.
Mills, J. S. (1959). The sociological imagination. Oxford, United Kingdom: Oxford University
Press.
Mitchell, Melanie. (2009). Complexity: A guided tour (p. 13). USA: Oxford University Press.
Ougaard, M. (2013). What is theory in political science? In Corvellec, H. (Ed.). What is theory?
Answers from the social and cultural sciences. Stockholm, Sweden: Copenhagen Business
School Press.
Pohl, C., Truffeer, B., & Hadron, G. H. (2017). Addressing wicked problems through transdisciplinary research. In Frodeman, R., Klein, J. T., & Pacheco, R. C. S. (Eds.). The Oxford
handbook of interdisciplinarity. Oxford, United Kingdom: Oxford University Press.
Public Safety Canada. (2015). About public safety Canada. Retrieved from http://www.publicsafety.gc.ca/cnt/bt/index-en.aspx#prtfl
Ramsay, J. (2012). Epilogue. In Logan, K. G., & Ramsay, J. D. (Eds.) Introduction to homeland
security. Boulder, CO: Westview Press.
Ramsay, J. (2013). The case for accreditation in homeland security. Journal of Homeland
Security Education, 2.
Ramsay, J., & T. O’Sullivan. (2013). “There’s a pattern here”: The search for a theoretical
framework for modern homeland security and the case of environmental security. Homeland
Security Affairs Journal, Spring.
Ramsay, J. D., & Renda-Tanali, I. (2018). Development of competency-based education
standards for homeland security academic programs. Journal of Homeland Security and
Emergency Management, 15(3).
Ritchey, Tom. (2011). Wicked problems (Swedish Morphological Society, © 2005, revised 2013).
http://www.swemorph.com/pdf/wp.pdf
Rittel, H. W. & Webber, M. M. (1973). Dilemmas in a general theory of planning, Policy
Science, 4, 155–169.
Roxborough, I. (2001). The Hart-Rudman Commission and Homeland Defense, Army War
College (U.S.). Strategic Studies Institute. Available at: https://www.hsdl.org/?view&did=2085
Simon, C. (2009). Safety first. The New York Times. Retrieved from http://www.nytimes.
com/2010/01/03/education/edlife/03homeland.html
Sjoberg, G., & Nett, R. (1968). A methodology for social research. New York, NY: Harper &
Row Publishers.
Skinner, Q. (1985). The return of grand theory in the human sciences. Cambridge, United
Kingdom: Cambridge University Press.
Turner, S. (2017). Knowledge formations: An analytic framework. In Froderman, R., Kline,
J. T., & Pacheco, R. C. S. (Eds.). The Oxford handbook of interdisciplinarity (2nd ed.). Oxford,
United Kingdom: Oxford University Press.
University Agency Partnership Program (UAPP). (2019). Homeland security programs.
Available at: https://www.uapi.us/programs/category/programs
White House. (2001). Executive Order 13228: Establishing the Office of Homeland Security and
the Homeland Security Council.
Wolfers, A. (2011). National security as an ambiguous symbol. In Security studies: A reader
(pp. 5–10).
References
Bernoulli, D. (1954). Evolution of a new theory on the measurement of risk (reprint).
Econometrica, 22(1). 23–36.
Buchanan, L., & O’Connell, A. (2006). A brief history on decision making. Harvard Business
Review, 84(1), 32.
Committee of Sponsored Organizations of the Treadway Commission. (2004). Enterprise
risk management: Integrated framework. Retrieved from https://www.coso.org/Documents/
COSO-ERM-Executive-Summary.pdf
Committee of Sponsored Organizations of the Treadway Commission. (2017). Guidance on
enterprise risk management. Retrieved from https://www.coso.org/Pages/erm.aspx
Department of Homeland Security. (2006). Risk analysis for fiscal year 2006 homeland security
grants. Risk Management Division and DHS Office of Grants and Training.
Department of Homeland Security. (2008). DHS risk lexicon. Retrieved from https://www.dhs.
gov/dhs-risk-lexicon
Department of Homeland Security. (2011). Risk management fundamentals: Homeland security
management doctrine. Retrieved from: https://www.dhs.gov/sites/default/files/publications/
rma-risk-management-fundamentals.pdf
Department of Homeland Security. (2015). Strategic national risk assessment (SNRA).
Retrieved from https://www.dhs.gov/strategic-national-risk-assessment-snra
Gigerenzer, G., & Selten, R. (2001). Bounded rationality: The adaptive toolbox. MIT Press.
Head, B. W. (2019). Forty years of wicked problems literature: Forging closer links to policy
studies. Policy and Society, 38(2), 180–197.
Iowa State University. (2018). COSO. Retrieved from https://www.internalaudit.iastate.edu/
internal-controls/coso
Laplace, P.S. (1902). A philosophical essay on probabilities. Translated by Frederick Wilson
Truscott and Frederick Lincoln Emory, New York, NY: John Wiley & Sons.
Nutley, S. M., Walter, I., & Davies, H.T.O. (2007). Using evidence: How research can inform
public service. Bristol, United Kingdom: The Policy Press.
Quadrennial Homeland Security Review. (2010). Quadrennial homeland security review
report. Retrieved from https://www.dhs.gov/sites/default/files/publications/2010-qhsrexecutive-summary.pdf
Rittle, H. W. J., & Webber, M. M. (1973). Developments in design methodology. New York, NY:
John Wiley & Sons.
Van der Waal, D., & Versluis, V. (2017). Introduction to risk management: Main principles of the
risk management process. Retrieved from http://www.perm.lv/wp-content/uploads/2017/11/
PermIntroToRM.pdf
Anti-Defamation League. (2019). Murder and extremism in the United States in 2018. New York:
ADL.
Ausserladscheider, V. (2019). Beyond economic insecurity and cultural backlash: Economic
nationalism and the rise of the far right. Sociology Compass, 13(4), e12670.
Azarian, B. (2016). Fear and anxiety drive conservatives’ political attitudes.
Psychology Today (December 31, 2016). https://www.psychologytoday.com/us/blog/
mind-in-the-machine/201612/fear-and-anxiety-drive-conservatives-political-attitudes
Bajc, V. (2013). Sociological reflections on security through surveillance. Sociological Forum,
28(3).
Bajc, V., & De Lint, W. (Eds.). (2011). Security and everyday life (Vol. 10). Routledge.
Bakir, V. (2015). ‘Veillant panoptic assemblage’: Mutual watching and resistance to mass surveillance after Snowden. Media and Communication, 3(3) 12–25.
Baldwin, D.A. (1997). The concept of security. Review of International Studies, 23(1), 5–26.
Bamber, J. L., et al. (2019). Ice sheet contributions to future sea-level rise from structured expert
judgment. Proceedings of the National Academy of Sciences, 116(23), 11195–11200.
Bates, A. (2017). Stingray: A new frontier in police surveillance. Cato Institute Policy
Analysis, 809.
Bauman, Z., et al. (2014). After Snowden: Rethinking the impact of surveillance. International
Political Sociology, 8(2), 121–144.
Baylis, J., Smith, S., & Owens, P. (Eds.). (2017). The globalization of world politics: An introduction to international relations. Oxford University Press.
BBC News. (2019). Europe and right-wing nationalism: A country-by-country guide (November
13, 2019). https://www.bbc.com/news/world-europe-36130006
Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland
Security Affairs, 4(2), http://www.hsaj.org/?Article = 4.2.1
Bellavita, C. (2011). Changing homeland security: In 2010 was homeland security useful?
Homeland Security Affairs Journal, 6, 1 (February).
Borns, P. (2018). The Great Recession was a big step backward for black homeowners. USA
Today (February 24).
Bricker, J., Kennickell, A. B., Moore, K. B., & Sabelhaus, J. (2012). Changes in US family
finances from 2007 to 2010: Evidence from the survey of consumer finances. Federal Reserve
Bulletin, 98(2), 1–80.
Buchheit, P. (2018). What just happened? $30 trillion to the richest White Americans since
2008. Common Dreams (September 3)
Buzan, B., Wæver, O., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis.
Lynne Rienner Publishers.
Calhoun, C. (2002). Dictionary of the social sciences. Oxford University Press.
Chappelow, J. (2019). Gig economy. Investopedia (June 25). https://www.investopedia.com/
terms/g/gig-economy.asp
Chetty, R., Grusky, D., Hell, M., Hendren, N., Manduca, R., & Narang, J. (2017). The fading American dream: Trends in absolute income mobility since 1940. Science, 356(6336),
398–406.
Christakis, N. A., & Fowler, J. H. (2013). Social contagion theory: Examining dynamic social
networks and human behavior. Statistics in Medicine, 32(4), 556–577.
Citrin, J., & Stoker, L. (2018). Political trust in a cynical age. Annual Review of Political Science,
21, 49–70.
Coats, Daniel R. (2019). Worldwide threat assessment of the US intelligence community.
Washington, DC: Office of the director of national intelligence.
Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: Sacrificing civil liberties in the
name of national security. The New Press.
Cole, D., Blanton, T., Wasserman, E., & Mills, J. (2015). After Snowden: Privacy, secrecy, and
security in the information age. Macmillan.
Conger, K., Fausset, R., & Kovaleski, S. F. (2019). San Francisco bans facial recognition technology. New York Times, 15.
Corbett, J. (2019). More than 90% of Democratic voters want 2020 candidate to make climate
action and Medicare for All top priorities: Poll. Common Dreams (April 30).
Corbridge, S. (2004). From Marshall plan to Washington consensus? Globalization, democratization, and ‘national’ economic planning. In The Marshall plan today: Model and metaphor
(pp. 241–269).
Cornwell, Susan, & Patricia Zengerle (2020). U.S. Senate approves nearly $500 billion more for
coronavirus bailout. Reuters (April 21, 2020).
Craig, Stephen C. (2018). Broken contract?: Changing relationships between Americans and their
government. Routledge.
Crawford, N. C. (2019). United States budgetary costs and obligations of post-9/11 wars through
FY2020: $6.4 Trillion. Watson Institute Report (November 1, 2013).
Dabla-Norris, M. E., Kochhar, M. K., Suphaphiphat, M. N., Ricka, M. F., & Tsounta, E.
(2015). Causes and consequences of income inequality: A global perspective. International
Monetary Fund.
Dale, C. (2014). The 2014 quadrennial defense review (QDR) and defense strategy: Issues for
Congress. Congressional Research Service.
Da Silva, C. (2019). Nearly 80 percent of Americans do not believe immigration boosts crime. Newsweek (March 14, 2019). https://www.newsweek.com/
americans-poll-immigration-boosts-crime-1363060
Devereux, S., & Edwards, J. (2004). Climate change and food security. IDS Bulletin, 35(3),
22–30.
Drake, B. (2015). Divide between blacks and whites on police runs deep. Pewresearch.org, 19.
Dunlap, R. E. (2019) Partisan polarization on the environment grows under Trump. Gallup
(April 5, 2019). https://news.gallup.com/opinion/gallup/248294/partisan-polarizationenvironment-grows-trump.aspx
Dunlap, R. E., Aaron M. McCright &Jerrod H. Yarosh (2016). The political divide
on climate change: Partisan polarization widens in the U.S., Environment: Science and
Policy for Sustainable Development, 58(5), 4–23. https://doi.org/10.1080/00139157.2016.1
208995
Estrada-Tanck, D. (2016). Human security and human rights under international law: The protections offered to persons confronting structural vulnerability. Bloomsbury Publishing.
Farley, R. (June 27, 2018). Is illegal immigration linked to more or less crime? Factcheck.
org. https://www.factcheck.org/2018/06/is-illegal-immigration-linked-to-more-or-lesscrime/
Friedman, L. (2019). In a switch, some Republicans start citing climate change as driving their
policies. New York Times (April 30, 2019). https://www.nytimes.com/2019/04/30/climate/
republicans-climate-change-policies.html
Gifford, R. (2015). The road to climate hell. New Scientist, 227(3029), 28–33.
Gottfried, J., & Shearer, E. (2017). Americans’ online news use is closing in on TV news use.
Pew Research Center, 7.
Graetz, M. J. (2018). Foreword-The 2017 tax cuts: How polarized politics produced precarious
policy. Yale LJF, 128, 315.
Greenwald, G. (2014). How covert agents infiltrate the internet to manipulate, deceive, and
destroy reputations. The Intercept (February 24, 2014). https://theintercept.com/2014/02/24/
jtrig-manipulation/
Grieco, K. A. (2018). The 2018 national defense strategy: Continuity and competition. Strategic
Studies Quarterly, 12(2), 3–9.
Hinds, J., & Joinson, A. (2017). Radicalization, the internet and cybersecurity: Opportunities
and challenges for HCI. International conference on human aspects of information security,
privacy, and trust. Cham: Springer.
Hymas, L. (2019). Climate silence was the big problem in 2018. In 2019, we’ve got new challenges: Fox News is distorting the national dialogue about the Green New Deal just as it’s
getting going. Media Matters (April 3, 2019).
Illing, S. (2019). An autopsy of the American dream: A conversation with Tailspin author
Steven Brill. Vox.com (March 12, 2019). https://www.vox.com/2018/6/28/17469080/
american-dream-steven-brill-inequality-poverty-tailspin
Irish Parliament. (2019). Irish Parliament declares a climate emergency. The Guardian
(May 10, 2019). Retrieved from https://www.theguardian.com/environment/2019/may/10/
irish-parliament-declares-climate-emergency
Jones, C. I. (2015). Pareto and Piketty: The macroeconomics of top income and wealth inequality. Journal of Economic Perspectives, 29(1), 29–46.
Jones, S. G. (2018). The rise of far-right extremism in the United States. CSIS Briefs, 7.
Krause, K. (1998). Critical theory and security studies: The research programme of critical
security studies. Cooperation and Conflict, 33(3), 298–333.
Krugman, Paul (2020). Covid-19 brings out all the usual zombies: Why virus denial resembles
climate denial. New York Times (March 28, 2020).
Lightman, D., Lowry, B., & Clark, L. (2019). Democrats plan new push on election security,
voting rights. McClatchy (May 7, 2019). https://www.mcclatchydc.com/news/politics-government/congress/article230076034.html
Lyon, D. (2015). Surveillance after Snowden. John Wiley & Sons.
Mantyla, K. (2019). Rick Wiles Is ‘Trying to Provoke a Goyim Uprising’ to Overthrow
America’s Jewish Slave Masters. Right Wing Watch (May 23, 2019). https://www.rightwingwatch.org/post/rick-wiles-is-trying-to-provoke-a-goyim-uprising-to-overthrow-americasjewish-slave-masters/
McCreight, R. (2019). Grid collapse security, stability and vulnerability issues: Impactful issues
affecting nuclear power plants, chemical plants and natural gas supply systems. Journal of
Homeland Security and Emergency Management, 16(1).
McGrath, M. (2016). 63% of Americans don’t have enough savings to cover a $500 emergency.
Forbes.com.
Mekhennet, Souad (2020). Far right and radical Islamist groups are exploiting coronavirus
turmoil. Washington Post (April 10, 2020).
Milman, O., & Harvey, F. (2019). US is hotbed of climate change denial; major global survey
finds. The Guardian. Retrieved from https://www.theguardian.com.environment/2019/may/07/
us-hotbed-climate-change-denial-international-poll
Monmouth University Polling Institute. (2018). Climate concerns increase; most republicans
now acknowledge change (November 29, 2018). https://www.monmouth.edu/polling-institute/
reports/monmouthpoll_us_112918/
Norman, J. (2018). Americans’ concerns about national crime abating. Gallup (November 17,
2018).
https://news.gallup.com/poll/244394/americans-concerns-national-crime-abating.
aspx
O’Sullivan, T. M., & Ramsay, J. (2015). Defining and distinguishing homeland from national
security and climate-related environmental security, in theory and practice. Journal of
Homeland Security and Emergency Management, 12(1), 43–66.
Oswald, Margit E., & Grosjean, Stefan (2012). Confirmation bias. In Cognitive illusions
(pp. 91–108). Psychology Press.
Pohl, R. F. (2012). Introduction: Cognitive illusions. In Cognitive illusions (pp. 13–32).
Psychology Press.
Pachauri, R. K., & Reisinger, A. (2007). IPCC fourth assessment report. Geneva: IPCC.
Pew Research Center. (2018). The generational gap in America: Race, immigration, same-sex
marriage, abortion, global warming, gun policy, marijuana legalization (March 1, 2018).
Pew Research Center. (2019). Public’s 2019 priorities: Economy, health care, education and
security all near top of list (January 24, 2019). https://www.people-press.org/2019/01/
24/publics-2019-priorities-economy-health-care-education-and-security-all-near-topof-list/
Pickering, J., & Barry, C. (2012). On the concept of climate debt: Its moral and political value.
Critical Review of International Social and Political Philosophy, 15(5), 667–685. https://doi.org
/10.1080/13698230.2012.727311
Poushter, J., & Huang, C. (2019). Climate change still seen as the top global threat, but cyberattacks a rising concern. Pew Research Center (February 10, 2019).
Public Policy Polling (PPP). (2018). Data from March 9-11, 2018. https://socialsecurityworks.
org/wp-content/uploads/2018/03/Nat-Social-Security-March-18-2-Results.pdf
Robinson, P. (2005). The CNN effect: The myth of news, foreign policy and intervention.
Routledge.
Romm, J. (2019). 2018 was a year of alarming climate reports, but you wouldn’t know
it watching TV news. Think Progress (March 11, 2019). https://thinkprogress.org/
climate-change-mainstream-media-coverage-2018-4d76f27dbbf8/
Rothschild, E. (1995). What is security? Daedalus, 124(3), 53–98. Retrieved from www.jstor.org/
stable/20027310
Rydgren, J. (Ed.). (2018). The Oxford handbook of the radical right. Oxford University Press.
Schwartzburg, R. The ‘white replacement theory’ motivates alt-right killers the world over.
The Guardian (August 5, 2019). https://www.theguardian.com/commentisfree/2019/aug/05/
great-replacement-theory-alt-right-killers-el-paso
Shepherd, S. (2018). Gun control support surges in polls. Politico (February 28, 2018). https://
www.politico.com/story/2018/02/28/gun-control-polling-parkland-430099
Stein, L., Cornwall, S., & Tanfani, J. (2018). Inside the progressive movement roiling the
Democratic Party. Reuters (August 23, 2018). https://www.reuters.com/investigates/
special-report/usa-election-progressives/
Stokel-Walker, C. (2019). The backlash against face recognition has begun. New Scientist,
242(3232) 9.
Šulović, V. (2010). Meaning of security and theory of securitization. Belgrade Centre for
Security Policy, 1–7.
Tackett, M. (2019). Key takeaways from Trump’s decision to use a National Emergency
Declaration to build a border wall. New York Times (February 15, 2019).
The Hill. (6 February 2019). New poll finds overwhelming support for an annual wealth tax
(February, 6, 2019). https://thehill.com/hilltv/what-americas-thinking/428747-new-pollamericans-overwhelmingly-support-taxing-the-wealth-of
Tipson, F. S. (2013). Natural disasters as threats to peace. U.S. Institute of Peace (Special
Report 325) (February 2013).
Trombetta, M. J. (2008). Environmental security and climate change: Analysing the discourse.
Cambridge Review of International Affairs, 21(4) 585–602.
Urwin, D. W. (2014). The community of Europe: A history of European integration since 1945.
Routledge.
U.S. Department of Defense. (2014). Department of Defense 2014 Climate Change
Adaptation Roadmap. Office of the Deputy Under Secretary of Defense for Installations
and Environment.
U.S. State Department. (2019). The Truman Doctrine and Marshall Plan. https://history.state.
gov/departmenthistory/short-history/truman (accessed March 2019)
Wæver, O. (1993). Identity, migration and the new security agenda in Europe. Pinter
Publishers.
Wæver, O. (2010). Towards a political sociology of security studies. Security Dialogue, 41(6),
649–658.
Wendt, A. (1999). Social theory of international politics. Cambridge University Press.
Williams, Z. (2018). ‘Raw hatred’: Why the “incel” movement targets and terrorises women
[Internet]. The Guardian.
Wuebbles, D. J., Fahey, D. W., & Hibbard, K. A. (2017). Climate science special report: Fourth
national climate assessment (Vol. I).
Zaitchik, A. (2010). ‘Patriot’ Paranoia: A look at the top ten conspiracy theories. Southern
Poverty Law Center.
Zimmerman, R., Zhu, Q., De Leon, F., & Guo, Z. (2017). Conceptual modeling framework
to integrate resilient and interdependent infrastructure in extreme weather. Journal of
Infrastructure Systems, 23(4), 04017034.
Anderton, C. H., & Carter, J. R. (2005). On rational choice theory and the study of terrorism.
Defence and Peace Economics, 16(4), 275–282.
Asal, Victor H., et al. (2009). The softest of targets: A study on terrorist target selection. Journal
of Applied Security Research, 4(3). 258–278. https://doi.org/10.1080/19361610902929990
Atlas, Randall. (1990). ‘Offensible Space’ – Law and order obstruction through environmental
design. In Proceedings of the human factors society annual meeting.
Atlas, Randall. (1991). The other side of CPTED. Security Management Magazine, March 1991.
https://www.cpted-security.com/wp-content/uploads/the_other_side_cpted.pdf
Bailey, William C., & Smith, Ronald W. (1972). Punishment: Its severity and certainty.
The Journal of Criminal Law, Criminology, and Police Science, 63(4), 530. https://doi.org/
10.2307/1141807
Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland
Security Affairs, 4(2).
Bosworth, M., & Hoyle, C. (2011). What is criminology? An introduction. In What is
Criminology? (pp. 1–11). Oxford University Press.
Brantingham, Paul J., & Faust, Frederic L. (1976). A conceptual model of crime prevention.
Crime & Delinquency, 22(3), 284–296. https://doi.org/10.1177/001112877602200302
Canetti-Nisim, Daphna, et al. (2006). Victimization from terrorist attacks: Randomness
or routine activities? Terrorism and Political Violence, 18(4), 485–501. https://doi.org/
10.1080/09546550600880237
Caplan, Bryan. (2006). Terrorism: The relevance of the rational choice model. Public Choice,
128(1–2), 91–107. https://doi.org/10.1007/s11127-006-9046-8
Casteel, Carri, & Peek-Asa, Corinne. (2000). Effectiveness of crime prevention through environmental design (CPTED) in reducing robberies. American Journal of Preventive Medicine,
18(4), 99–115. https://doi.org/10.1016/s0749-3797(00)00146-x
Cauley, J., & Im, E. (1988). Intervention policy analysis of skyjackings and other terrorist incidents. American Economic Review, 78(2), 27–31.
Clarke, R. V. G., & Newman, Graemer R. (2006). Outsmarting the terrorists. Praeger Security
International.
Clarke, Ronald V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150. https://
doi.org/10.1086/449230
Clarke, R. V. G. (1980). ‘Situational’ crime prevention: Theory and practice. The British Journal
of Criminology, 20(2), 136–147. https://doi.org/10.1093/oxfordjournals.bjc.a047153
Coaffee, Jon. (2004). Rings of steel, rings of concrete and rings of confidence: Designing out
terrorism in central London pre and post September 11th. International Journal of Urban and
Regional Research, 28(1).
Cohen, Lawrence E., & Marcus Felson. (1979). Social change and crime rate trends: A
routine activity approach. American Sociological Review, 44(4), 588. https://doi.org/
10.2307/2094589.
Comiskey, John. (2017). Homeland-hometown security: A coherent national strategy to protect
the homeland. Journal of Human Security and Resilience, 1(2).
Congressional Research Service (CRS). (2004). Report for Congress “Guarding America:
Security Guards and U.S. Critical Infrastructure Protection” November 12, 2004.
Cornish, Derek B., & Clarke, Ronald V. (1989). Crime specialisation, crime displacement and
rational choice theory. In Criminal behavior and the justice system research in criminology
(pp. 103–117). https://doi.org/10.1007/978-3-642-86017-1_7
Cornish, Derek B., & Clarke, Ronald V. (1987). Understanding crime displacement:
An application of rational choice theory. Criminology, 25(4), 933–948. https://doi
.org/10.1111/j.1745-9125.1987.tb00826.x
Cothren, Jackson, et al. (2008). Geospatial and temporal patterns of preparatory conduct
among American terrorists. International Journal of Comparative and Applied Criminal
Justice, 32(1), 23–41. https://doi.org/10.1080/01924036.2008.9678776
Cozens, P. M. (2008). New urbanism, crime and the suburbs: A review of the evidence. Urban
Policy and Research, 26(4), 429–444.
Cozens, Paul Michael, et al. (2005). Crime prevention through environmental design (CPTED):
A review and modern bibliography. Property Management, 23(5), pp. 328–356. https://doi.org/
10.1108/02637470510631483
Cozens, Paul, & Love, Terence. (2017). The dark side of crime prevention through environmental design (CPTED). In Oxford research encyclopedia of criminology and criminal justice.
https://doi.org/10.1093/acrefore/9780190264079.013.2
Cozens, Paul, & Love, Terence. (2015). A review and current status of crime prevention through
environmental design (CPTED). Journal of Planning Literature, 30(4), 393–412. https://doi.org/
10.1177/0885412215595440
Crowe, Timothy D. (2000). Crime prevention through environmental design: Applications of
architectural design and space management concepts. Butterworth-Heinemann.
Ditton, J., & Farrall, S. (Eds.). (2015). The fear of crime. Routledge
Eck, J. E., Rothman, J., Bailey, J., & Dammert, L. (2006). Police-community conflict
and crime prevention in Cincinnati, Ohio (pp. 225–244). Pittsburgh, PA: University of
Pittsburgh Press.
Ekblom, Paul. (2010). Deconstructing CPTED… and reconstructing it for practice, knowledge
management and research. European Journal on Criminal Policy and Research, 17(1), 7–28.
https://doi.org/10.1007/s10610-010-9132-9
Elster, Jon. (1986). Rational choice. New York University Press.
Felson, Marcus. (1994). Crime and everyday life: Insights and implications for society. Sage.
Felson, Marcus. (1995). Those who discourage crime. Crime and Place, 4, 53–66.
Felson, Marcus, & Clarke, R. V. G. (1998). Opportunity makes the thief: Practical theory for
crime prevention. Great Britain: Home Office, Policing and Reducing Crime Unit.
Freilich, Joshua D., & Lafree, Gary. (2014). Criminology theory and terrorism: Introduction
to the special issue. Terrorism and Political Violence, 27(1), 1–8. https://doi.org/10.1080/
09546553.2014.959405
FEMA. (2013). Defensible space and CPTED: Origins and applications. https://www.fema.gov/
media-library-data/20130726-1624-20490-3298/430_a.pdf
Fussey, Pete. (2009). An economy of choice? Terrorist decision-making and criminological rational
choice theories reconsidered. Security Journal, 24(1), 85–99. https://doi.org/10.1057/sj.2009.11
Global Society of Homeland Security Professionals (GSHSP). (2019). Law Enforcement and the
Fusion Center. Globalhomeland.org.
Hale, C. (1996). Fear of crime: A review of the literature. International Review of Victimology,
4(2), 79–150. https://doi.org/10.1177/026975809600400201.
Hsu, Henda Y., & Mcdowall, David. (2017). Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. Journal of Research in Crime and Delinquency, 54(6), 930–957. https://doi.org/
10.1177/0022427817719309
Jacobs, J. (1961). The uses of sidewalks: safety. The City Reader, 114–118.
Jeffery, C. R. (1959). Pioneers in criminology: The historical development of criminology. The
Journal of Criminal Law, Criminology, and Police Science, 50(1), 3–19.
Kettl, Donald F. (2003). Contingent coordination. The American Review of Public Administration,
33(3), 253–277. https://doi.org/10.1177/0275074003254472
Kiltz, Linda, & Ramsay, James D. (2012). Perceptual framing of homeland security. Homeland
Security Affairs, 8, Article 16. https://www.hsaj.org/articles/230
Kleemans, Edward R., et al. (2012) Organized crime, situational crime prevention and routine activity theory. Trends in Organized Crime, 15(2–3), 87–92. https://doi.org/10.1007/
s12117-012-9173-1
Laufer, W. (2017). The criminology of criminal law. Routledge.
Matijosaitiene, Irina, & Petriashvili, Ana. (2017). Urban planning and design for terrorism
resilient cities. Journal of Sustainable Architecture and Civil Engineering, 18(1), https://doi.org/
10.5755/j01.sace.18.1.15443
Matusitz, Jonathan Andre. (2015). Symbolism in terrorism: Motivation, communication, and
behavior. Rowman & Littlefield.
McGee, Jim. (2001). Ex-FBI officials criticize tactics on terrorism. The Washington Post,
WP Company, 28 Nov. 2001. www.washingtonpost.com/archive/politics/2001/11/28/
ex-f bi-officials-criticize-tactics-on-terrorism/51b59615-12bd-4c72-97dc-859183d12640/?
noredirect=on
Merry, Sally E. (1981). Defensible space undefended. Urban Affairs Quarterly, 16(4), 397–422.
https://doi.org/10.1177/107808748101600401
Moffatt, Ian. (1983). Modelling the environment as a dynamic system. Environmental
Conservation, 10(4), 348–349. https://doi.org/10.1017/s0376892900013084
NCPC (National Crime Prevention Council). (2019). Best practices for using crime prevention through environmental design in weed and seed sites. https://www.ncpc.org/wp-content/
uploads/2017/11/NCPC_BestPracticesCPTED.pdf
NCPC (National Crime Prevention Council). (2017). Crime prevention through environmental design training program. National Crime Prevention Council, 18 Nov. 2017. www.ncpc.
org/resources/home-neighborhood-safety/crime-prevention-through-environmentaldesign-training-program/
National Institute of Hometown Security (2020) About us, available at https://www.thenihs.
org/aboutus
New Jersey State Department of Transportation (NJDOT) (2017) Employing crime prevention through environmental design in the NJ safe routes to school program, a review of
literature and recommendations: available at: http://www.saferoutesnj.org/wp-content/
uploads/2018/09/SRTS-CPTED-Topic-Report.pdf
Newman, O. (1972). Defensible space. New York: Macmillan.
Newman, O., & National Institute of Law Enforcement and Criminal Justice. (1973).
Architectural design for crime prevention (pp. 2700–00161). Washington, DC: National
Institute of Law Enforcement and Criminal Justice.
Newman, O. (1975). Reactions to the “defensible space” study and some further findings.
International Journal of Mental Health, 4(3), 48–70.
Newman, Oscar. (1996). Creating defensible space. BiblioGov Project.
Newmann, W. W. (2002). Reorganizing for national security and homeland security. Public
Administration Review, 62, 126–137.
Nunn, Sam. (2005). Preventing the next terrorist attack: The theory and practice of homeland
security information systems. Journal of Homeland Security and Emergency Management,
2(3), https://doi.org/10.2202/1547-7355.1137
NYC.Gov. (n.d.). Active design supplement: Promoting safety. https://www1.nyc.gov/assets/doh/
downloads/pdf/environmental/promoting-safety.pdf
Olajide, S. E., Lizam, M., & Adewole, A. (2015). Towards a crime-free housing: CPTED versus
CPSD. Journal of Environment and Earth Science, 5(18), 53–63.
Ostrom, Elinor. (1998). A behavioral approach to the rational choice theory of collective action:
Presidential address, American Political Science Association, 1997. American Political
Science Review, 92(1), 1–22. https://doi.org/10.2307/2585925.
Parkin, W. S., & Freilich, J. D. (2014). Routine activities and right-wing extremists: An empirical comparison of the victims of ideologically-and non-ideologically-motivated homicides
committed by American far-rightists. Terrorism and Political Violence, 27(1), 182–203.
Perry, Simon, & Hasisi, Badi. (2014). Rational choice rewards and the jihadist suicide bomber.
Terrorism and Political Violence, 27(1), 53–80. https://doi.org/10.1080/09546553.2014.962991
Reese, S. (2012). Defining homeland security: Analysis and congressional considerations.
Congressional Research Service, Library of Congress.
Relyea, H. C. (2002, August). Homeland Security: Department Organization and Management.
LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH
SERVICE.
Reynald, Danielle M., & Elffers, Henk. (2009). The future of Newman’s defensible space theory. European Journal of Criminology, 6(1), 25–46. https://doi.org/10.1177/1477370808098103
Reynald, Danielle M. (2010). Translating CPTED into crime preventive action: A critical examination of CPTED as a tool for active guardianship. European Journal on Criminal Policy and
Research, 17(1), 69–81. https://doi.org/10.1007/s10610-010-9135-6
Rossmo, D. Kim, & Harries, Keith. (2011). The geospatial structure of terrorist cells. Justice
Quarterly, 28(2), 221–248. https://doi.org/10.1080/07418820903426197
Row, Arthur T., & Jacobs, Jane. (1962). The death and life of great American cities. The Yale
Law Journal, 71(8), 1597. https://doi.org/10.2307/794509
Rutgers and U.S. DOT (Department of Transportation). (2017). Employing crime prevention
through environmental design in the NJ safe routes to school program: A review of literature
and recommendations, Nov. 2017. http://www.saferoutesnj.org/wp-content/uploads/2018/09/
SRTS-CPTED-Topic-Report.pdf
Schneider, Richard H. (2003) American anti-terrorism planning and design strategies:
Applications for Florida growth management, University of Florida Journal of Law and
Public Policy, 15, 129.
Scott, John. (2000). Rational choice theory. In Understanding contemporary society: Theories of
the present (pp. 126–138). https://doi.org/10.4135/9781446218310.n9
Shearing, C. D. (1989). Decriminalizing criminology: Reflections on the literal and topological
meaning of the term. Canadian Journal of Criminology, 31, 169.
Smith, R. W. (2005). What is homeland security? Developing a definition grounded in the curricula. Journal of Public Affairs Education, 11(3), 233–246.
Stark, Rodney. (1987). Deviant places: A theory of the ecology of crime. Criminology, 25(4),
893–910. https://doi.org/10.1111/j.1745-9125.1987.tb00824.x
St. Petersburg Police Dept. (n.d.). CPTED brochure. https://police.stpete.org/crime-prevention/
brochures/cpted-brochure.pdf
Vito, G. F., & Maahs, J. R. (2015). Criminology. Jones & Bartlett Publishers.
Weiser, Benjamin, & Baker, Al. (2011). A bridge under scrutiny, by plotters and the police. The
New York Times.
Yancey, William L. (1971). Architecture, interaction, and social control. Environment and
Behavior, 3(1), 3–21. https://doi.org/10.1177/001391657100300101
Abrahams, M. (2008). What Terrorists Really Want: Terrorist Motives and Counterterrorism
Strategy. International Security, 32(4), 78–105.
Adamson, F. B. (2005). “Globalisation, Transnational Political Mobilisation, and Networks of
Violence” Cambridge Review of International Affairs, Vol. 18, No. 1 April 2005.
Arce M, D. G., & Sandler, T. (2003). An evolutionary game approach to fundamentalism and
conflict. Journal of Institutional and Theoretical Economics (JITE)/Zeitschrift für die gesamte
Staatswissenschaft, 132–154.
Arendt, H. (1963). Eichmann in Jerusalem: A report on the banality of evil. New York, N.Y.,
U.S.A: Penguin Books.
Barber, B. (1996). Jihad vs. McWorld. New York: Ballantine Books.
Beck, C. J. (2008). The contribution of social movement theory to understanding terrorism.
Sociology Compass, 2(5), 1565–1581.
Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G. (2009). Network analysis in the social
sciences. Science, 323(5916), 892–895.
Braithwaite, A., & Chu, T. S. (2018). Civil Conflicts Abroad, Foreign Fighters, and Terrorism
at Home. Journal of Conflict Resolution, 62(8), 1636–1660. https://doi.org/10.1177/
0022002717707304
Celso, A. N. (2015). The Islamic state and Boko Haram: Fifth wave jihadist terror groups.
Orbis, 59(2), 249–268.
Cowell, F. (1985). Microeconomic Principles. Oxford: Oxford University Press.
Cozine, K. (2010). Transgovernmental networks as a tool to combat terrorism: How ICE attachés
operate overseas to combat terrorist travel (Doctoral dissertation, Rutgers UniversityGraduate School-Newark).
Crenshaw, M. (1981). The Causes of Terrorism. Comparative Politics, 13(4), pp. 379–399.
Crenshaw, M. (1988). Theories of Terrorism: Instrumental and Organizational Approaches.
Inside Terrorist Organizations. New York: Columbia University Press, pp. 13–31.
Crenshaw, M (1990). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic
Choice. Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. New York:
Cambridge University Press, pp. 7–24.
Dalgaard-Nielsen, A. (2008). Studying violent radicalization in Europe I: The potential contribution of social movement theory. Danish Institute for International Studies.
Enders, W., & Sandler, T. (1993). The Effectiveness of Antiterrorism Policies: A VectorAutoregression-Intervention Analysis. American Political Science Review, 87(4), 829–844.
doi:10.2307/2938817
Enders, W., Sandler, T. (1995). Terrorism: Theory and applications. Handbook of Defense
Economics, 1, 213–249.
Frey, B. S., & Luechinger, S. (2005). Measuring terrorism. Law and the State: A Political
Economy Approach: New Horizons in Law and Economics, Cheltenham, UK: Edward Elgar
Publishing, 142–181.
Gallagher, M. J. (2017). The 2016 ‘lone wolf’tsunami-Is Rapoport’s ‘religious wave’ending?.
Journal of Strategic Security, 10(2), 60–76.
Gibbs, J. (2018) Terrorist attacks targeting the police: the connection to foreign military presence, Police Practice and Research, 19:3, 222–240, DOI: 10.1080/15614263.2017.1295245
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78,
1360–1380.
Hamm, M. S., & Spaaij, R. (2017). The Age of Lone Wolf Terrorism. La Vergne: Columbia
University Press.
Huntington, Samuel. “P,(1996). The Clash of Civilizations and the Remaking of World Order.”
Simon and Schuster: New York.
Hirschmann, K. (2000) The Changing Face of Terrorism. International Politik und Gesellschaft.
No. 3. pp 299–310.
Hoffman, B. (2006). Inside terrorism. New York, NY: Columbia University Press.
Honig, O., & Yahel, I. (2019). A fifth wave of terrorism? The emergence of terrorist semi-states.
Terrorism and Political Violence, 31(6), 1210–1228.
Huntington, S. (1996). The Clash of Civilizations and the Remaking of World Order. New York:
Touchstone Books.
Jackson, B. A. (2006). Groups, networks, or movements: A command-and-control-driven
approach to classifying terrorist organizations and its application to al-Qaeda. Studies in
Conflict & Terrorism, 29(3), 241–262. https://doi.org/10.1080/10576100600564042
Jensen, L. (2003). Coming of age in a multicultural world: Globalization and adolescent cultural identity formation. Applied Developmental Science, 7(3), 189–196.
Kaplan, J. (2007). The fifth wave: The new tribalism? Terrorism and Political Violence, 19(4),
545–570.
Kellner, D. (2002). September 11, social theory and democratic politics. Theory, Culture &
Society, 19(4), 147–159. https://doi.org/10.1177/0263276402019004011
Kreps, D. (1990). A course in microeconomic theory (p. 480). Princeton, NJ: Princeton University
Press.
Langhorne, R. (2006). Global civil society. In The essentials of global politics, London, United
Kingdom: Hodder Arnold.
Laqueur, W. (1996). Postmodern terrorism. Foreign Affairs, September/October 1996,
pp. 24–36.
McCormack, W. (2003). The Military-Judicial Nexus in Response to Terrorism: KKK and
AlQaeda. bepress Legal Series, 46.
McEvily, B., Brass, D. J., Labianca, G., Mehra, A., Halgin, D. S., & Borgatti, S. P. (2014). Do
you know my friend? Attending to the accuracy of egocentered network data. Contemporary
perspectives on organizational social networks, 40, 295-313.
Milgram, S. (1967). The small world problem, Psychology Today, 60–67.
Neiberg, M. (2017). No more elsewhere: France faces the new wave of terrorism, The Washington
Quarterly, 40(1), 21–38. https://doi.org/10.1080/0163660X.2017.1302736
Oberschall, A. (2004). Explaining terrorism: The contribution of collective action theory.
Sociological Theory, 22(1), 26–37. Retrieved from http://www.jstor.org/stable/3648957
Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and
political violence. PS: Political Science and Politics, 44(1), 45–50.
Perrow, C. (1986). Complex organizations: A critical essay New York, NY: Random House.
Porta, D. d. (1992). Introduction: In individual motivations in underground political
organizations. In Dontaella della Porta (Ed.). Social movements and violence. London,
United Kingdom: JAI Press.
Post, J. M., McGinnis, C., & Moody, K. (2014). The changing face of terrorism in the 21st
century: The communications revolution and the virtual community of hatred. Behavioral
Sciences & the Law, 32, 306–334. https://doi.org/10.1002/bsl.2123
Rapoport, D. C. (2004). The four waves of modern terrorism. Attacking terrorism: Elements of
a grand strategy (p. 54, 3–11). Washington, DC: Georgetown University Press 2004.
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present,
and future research. Homeland Security Affairs, 2.
Riker, W. (1995). The political psychology of rational choice theory. Political Psychology, 16(1), 37.
Sageman, Marc, (2004). Understanding Terror Networks, Philadelphia: University of
Pennsylvania Press.
Sandler, T. & Enders, W. (2004). An economic perspective on transnational terrorism. European
Journal of Political Economy. 20. 301–316. 10.1016
Schock, K. (2005). Unarmed insurrections: People power movements in nondemocracies.
Minneapolis, MN: University of Minnesota Press.
Schwartz, S., Dunkel, C., & Waterman, A. (2009). Terrorism: An identity theory perspective.
Studies in Conflict and Terrorism, 32(6), 537–559. https://doi.org/10.1080/10576100902888453
Smith, G. D. (1998). Single issue terrorism. Canadian Security Intelligence Service, Commentary
No. 74.
Simon, J. (2010). Technological and lone operator terrorism. In Rosenfeld, J., Rasler, K.,
Thompson, W., et al. (Eds.). Terrorism, identity and legitimacy: The four waves theory and
political violence.
Tajfel, H., & Turner, J. (1986). The social identity theory of intergroup behavior. In The
Psychology of Intergroup Behavior (pp. 7–24). Chicago, IL: Nelson Hall.
Tarrow, S. G. (1998). Power in movement: Social movements and contentious politics, Cambridge,
England: Cambridge University Press.
Tarrow, S. (2002). The New Transnational Contention: Organization, Coalition. Mechanisms.
Presentation at the Panel on “Social Movements and Transnational Social Movements”
American Political Science Association Annual Meeting, September 1, 2002, Chicago.
Tavares, J. (2004). The open society assesses its enemies: Shocks, disasters and terrorist attacks.
Journal of Monetary Economics, 51, 1039–1107.
Taylor, M. & Quayle, E. (1994). Terrorist lives. London, United Kingdom: Brassey’s Defence
Publishers.
US Department of State. (2002). Patterns of global terrorism, Washington, DC: US Department
of State.
Weinberg, L. (2013). The end of terrorism?. London Routledge.
Weinberg, L. &Eubank, W. (2010). An end to the fourth wave of terrorism? Studies in Conflict &
Terrorism, 33(7), 594–602. https://doi.org/10.1080/1057610X.2010.483757
Wojciechowski, S. (2017). Reasons of contemporary terrorism: An analysis of main determinants. In Sroka, A., Garrone, F., & Kumbrián, R. (Eds.). Radicalism and terrorism
in the 21st century: Implications for security (pp. 49–70). Frankfurt am Main, Germany:
Peter Lang AG.
Zutlevics, T. L. (2002). Towards a theory of oppression. Ratio, 15(1), 80. https://doi.org/
10.1111/1467-9329.00177
Agranoff, R. (2005). Managing collaborative performance: Changing the boundaries of the
state? Public Performance & Management Review, 29(1).
Alexander, R. A. (2012). Emergent social software platforms for sharing and collaboration
on criminal information and intelligence (Master’s thesis). Naval Postgraduate School,
Monterey, CA.
Ansell, G., & Gash. A. (2005). Collaborative governance in theory. Journal of Public
Administration Research and Theory. https://doi.org.10.1093/jopart/mumo32
Bardach, E. (1998). Getting agencies to work together: The practice and theory of managerial
craftsmanship. Washington, DC: Brookings Institute.
Behn, R. D. (2014). The PerformanceStat potential: A leadership strategy for producing results.
Washington, DC: Brookings Institute.
Billeaudeaux, M. A. (2007). Leveraging citizens and cultivating vigilance for force multiplication
in the maritime domain (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Birkland, T. A. (1997). After disaster: Agenda setting, public policy, and focusing events.
Washington, DC: Georgetown University Press.
Bleakney, E. (2009). Finding the “sweet spot” for catastrophic incident search and rescue
(Master’s thesis). Naval Postgraduate School, Monterey, CA.
Bradley, D. J. (2015). Applying the THIRA to special events: A framework for capabilities planning
adoption in local governments (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Bratton, W., & Tumin, Z. (2012). Collaborate or perish: Reaching across boundaries in a
networked world. New York, NY: Random House.
Campasano, N. (2010). Community preparedness: Creating a model for change (Master’s
thesis). Naval Postgraduate School, Monterey, CA.
Center for Disease Control. (2020, February 7). 2019 Novel coronavirus (2019-nCoV)
situation summary. Washington, DC: Author. Retrieved from https://www.cdc.gov/
coronavirus/2019-nCoV/summary.html
Chertoff, M. (2009). Homeland security: Assessing the first five years. Philadelphia, PA:
University of Pennsylvania Press.
Church, K. (2010). Enhancing unity of effort in homeland defense, homeland security, and
civil support through interdisciplinary education (Master’s thesis). Naval ion Postgraduate
School, Monterey, CA.
Clovis, S. H. (2006). Federalism, homeland security, and national preparedness: A case study
in the development of public policy. Homeland Security Affairs, 2(3). Retrieved from http://
www.hsaj.org/?article=2.3.4
Coates, D. R. (2019). Statement for the record of the U.S. Intelligence community: Worldwide
threat assessment. Senate Select Committee on Intelligence. Office of the Director of National
Intelligence. Washington. DC: Author.
Comiskey, J. (2017). Homeland-hometown security: A coherent national strategy to protect the
homeland. Journal of Human Security and Resilience, 1(2).
Comiskey, J., & Larrañaga, M. (2019). Climate security: A pre-mortem approach to a
sustainable future. Homeland Security Affairs. 15(8).
Commission on Intergovernmental Affairs. (1955). A report to the president for transmittal to
congress. Washington, DC: Government Printing Office.
Creech, B. (1994). The five pillars of TQM: How to make total quality management work for you.
New York, NY: Dutton Adult.
Cromwell, B. (2018). Area maritime security committees and the maritime transportation
system (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Dale, C. (2012). In brief: Clarifying the concept of “Partnership” in national security. CRS Report
No. R42516). Washington, DC: Congressional Research Service.
Department of Homeland Security. (2003). Department of homeland security seal. Press Release.
https://www.dhs.gov/department-homeland-security-seal
Department of Homeland Security. (2005a). Interim national preparedness goal. Washington, DC:
Author.
Department of Homeland Security. (2005b). Interim infrastructure protection plan.
Washington, DC: Author.
Department of Homeland Security. (2008). National response framework. Washington, DC: Author.
Department of Homeland Security. (2010a). Quadrennial homeland security review report.
Washington. DC: Author.
Department of Homeland Security. (2010b). Risk lexicon. Washington, DC: Author.
Department of Homeland Security. (2011a). The strategic national risk assessment in support of
PPD8: A comprehensive risk-based approach toward a secure and resilient nation. Washington,
DC: Author.
Department of Homeland Security. (2011b). National preparedness goal. Washington, DC: Author.
Department of Homeland Security. (2012). Climate change adaptation roadmap. Washington,
DC: Author.
Department of Homeland Security. (2013). NIPP 2013: Partnering for critical infrastructure
security and resilience. Washington, DC: Author.
Department of Homeland Security. (2015a). National preparedness goal. Washington, DC: Author.
Department of Homeland Security. (2015b). National preparedness report. Washington, DC: Author.
Department of Homeland Security. (2016). Tools and resources to help businesses plan, prepare,
and protect from an attack. Washington, DC: Author. Retrieved from https://www.dhs.gov/
sites/default/files/publications/Hometown-Security-Fact-Sheet-04062016-508.pdf
Department of Homeland Security. (2017). National preparedness report. Washington, DC: Author.
Department of Homeland Security. (2019a). 2019 National threat and hazard identification and
risk assessment (THIRA). Washington, DC: Author.
Department of Homeland Security. (2019b). The Department of Homeland Security strategic
plan. Fiscal years 2020–2024. Washington, DC: Author.
Department of Homeland Security. (2019c). Confronting the opioid crisis [fact sheet].
Washington, DC: Author. Retrieved from https://www.dhs.gov/sites/default/files/
publications/19_0424_s1_opioid-fact-sheet_v2.pdf
DiGiacomo, R.J. (2010). Prostitution as a possible funding mechanism for terrorism (Master’s
thesis). Naval Postgraduate School, Monterey, CA.
Downs, A. (1972). Up and down with ecology: The issue-attention cycle, The Public Interest,
28, 38–50.
Duggan, J. (2011). The New York City Urban search and rescue team (NY-TF-1): A case study
of interagency effectiveness (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Emerson, K. & Nabatchi, T. (2015). Collaborative governance regime. Washington, DC:
Georgetown University Press.
Esposito, J. (2011). New York City Fire Department chief officer’s evaluation of the citywide
incident management system as it pertains to interagency emergency response (Master’s
thesis). Naval Postgraduate School, Monterey, CA.
Fahey, M. J. (2012). Understanding “swift trust” to improve interagency collaboration in New
York City (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Federal Emergency Management Agency. (2019). National Threat and Hazard Assessment
(THIRA). Washington, DC: Author.
Foster-Fishman, P.G., Berkowitz, S. L, Lounsbury, D. W., Jacobson, S., & Allen, N. (2001).
Building collaborative capacity in community coalitions: A review and integrative
framework. American Journal of Community Psychology, 29(2).
Gomez, D. (2013). Should cops be spies? Evaluating the collection and sharing of national
security intelligence by state, local, and tribal law enforcement (Master’s thesis). Naval
Postgraduate School, Monterey, CA.
Government Accountability Office. (2005). Report to the Chairman, Subcommittee on Oversight
of Government Management, the Federal Workforce, and the District of Columbia, Committee
on Homeland Security and Governmental Affairs, U.S. Senate. Results-oriented government:
Practices that can help enhance collaboration among federal agencies (GAO-06-15).
Washington, DC: Government Printing Office.
Government Accountability Office. (2009). Report to Congressional committees, Interagency
collaboration: Key issues for congressional oversight of national security strategies,
organizations, workforce, and information sharing (GAO-09-904SP). Washington, DC:
Government Printing Office.
Government Accountability Office. (2012). Managing for results: Key considerations for
implementing interagency collaborative mechanisms (GAO-12-1022). Washington, DC:
Government Printing Office.
Government Accountability Office. (2018a). National security: Long-range emerging threats
facing the United States as identified by federal agencies (GAO-19-204SP). Washington, DC:
Government Printing Office.
Government Accountability Office. (2018b). Managing for results: Government-wide
actions needed to improve agencies’ use of performance information in decision making
(GAO-18-609SP). Washington, DC: Government Printing Office.
Government Accountability Office. (2018c). Clearer roles and responsibilities for the office of
strategy, Policy, and Plans and workforce planning would enhance its effectiveness. Report to
the subcommittee on oversight and management efficiency, committee on homeland security,
house of representatives (GAO-18-590). Washington, DC: Government Printing Office.
Government Accountability Office. (2019). High-risk series. Substantial efforts needed to achieve
greater progress on high-risk areas (GAO-19-157SP). Washington, DC: Government Printing
Office.
Hall, R. D. (2011). Smart practices in building interorganizational collaborative capacity to
strengthen the Florida comprehensive disaster management enterprise (Master’s thesis).
Naval Postgraduate School, Monterey, CA.
Hamel, G., Doz, Y. L., & Prahalad, C. K. (1989). Collaborate with your competitors and win.
Harvard Business Review (January–February), 133–139.
Harrington, M. (2014). New York City’s first responders: Enhancing collaboration between
NYPD and FDNY (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Hocevar, S. P., Thomas, G. F., & Jansen, E. (2006). Building collaborative capacity: An innovative strategy for homeland security preparedness. In Beyerlein, M., Beyerlein, S., & Kennedy,
F. Innovation through collaboration, Advances in Interdisciplinary Studies of Work Teams
(Vol. 12, pp. 255–274). Amsterdam: Elsevier Ltd.
Hocevar, S. P., Thomas, G. F, & Jansen, E. (2011). Inter-organizational collaboration:
Addressing the challenge. Homeland Security Affairs, 7, (September, the 9/11 essays).
Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2136. Retrieved from http://www
.dhs.gov/xlibrary/assets/hr_5005_enr.pdf
Imperial, M. (2005). Using collaboration as a governance strategy: Lessons from six watershed
management programs. Administration and Society, 37(3), 281–320.
Intelligence Reform and Prevention of Terrorism Act. (2004). Pub. L. No. 108-458, 118 Stat. 3638.
Johnson, J. (2014, April 22). Memorandum for DHS leadership. Washington, D.C: Author.
Retrieved from file:///C:/Users/john/Downloads/805139%20(1).pdf
Kaiser, F. M. (2011). Interagency collaborative arrangements and activities: Types, rationales, considerations (CRS Report No. R41803). Washington, DC: Congressional Research Service.
Kamarck, E. C. (2002). Applying 21st century government to the challenge of homeland
security. The Forum, 1(2).
Kettl, D. F. (2003). Contingent coordination: Practical and theoretical puzzles for homeland security. American Review of Public Administration, 33(3). https://doi.org.10.1177/0275074003254472
Kirk, P. (2014). Community preparedness: Alternate approaches to citizen engagement in
homeland security (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Knoke, D. (1990). Political networks: The structural perspective. Cambridge, UK: Cambridge
University Press.
Marie, C. (2010). Arctic region policy: Information sharing model options (Master’s thesis), Naval
Postgraduate School, Monterey, CA.
McChrystal, S., Collins, T., Silverman, D., & Fussel, C. (2015). Team of teams: New rules of
engagement for a complex world. New York, NY: Penguin.
Meadows, D.H.(2008). Thinking in systems: A primer. White River Junction, VT: Chelsea
Green Publishing.
Merriam-Webster. (2005). Merriam-Webster’s dictionary (11th ed.). Springfield, MA:
Merriam-Webster.
Morton, J. F. (2012). The next-generation homeland security: Network federalism and the course
to national preparedness. Annapolis, MD: Naval Institute Press.
Mueller, R. (2019). Report on the investigation into Russian interference in the 2016 presidential
election (Vol. I). Washington. DC: Special Counsel Robert Mueller.
Napolitano, J. (2019). How safe are we? Homeland security since 9/11. New York, NY: Hachette
Book Group.
National Commission on Terrorist Attacks Upon the United States. (2004). The 9/11 commission
report: Final report of the National Commission on Terrorist Attacks upon the United States.
Washington, DC: Author.
National Governor’s Association. (1979). Comprehensive emergency management. Washington,
DC: Author.
National Intelligence Council. (2017). Global trends. Paradox of progress. Washington, DC: Author.
Nielsen, K. (2019). State of homeland security. Washington, DC: George Washington University.
Osborne, D., & Gaebler, T.A. (1992). Reinventing government: How the entrepreneurial spirit is
transforming the public sector. Reading, MA: Addison-Wesley.
Pelfrey, W. V. (2005). The cycle of preparedness: Establishing a framework to prepare for
terrorist threats, Journal of Homeland Security and Emergency Management, 2(1).
Pelfrey, W. V., & Kelley, W. D. (2013). Homeland security: A way forward. Homeland Security
Affairs, 9(3). Retrieved from http://www.hsaj.org/?article=9.1.3
Pfeffer, J., & Salancik, G. R. (1978). The external control of organizations: A Resource dependence perspective. New York, NY: Harper and Row.
Philips, S. C. (2012). Rethinking disasters: Finding efficiencies through collaboration (Master’s
thesis). Naval Postgraduate School, Monterey, CA.
Pilkington, W. F. (2014). Risk, politics, and money: The need for a value-based model for
financing public health preparedness and response (Master’s thesis). Naval Postgraduate
School, Monterey, CA.
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. Research
in Organizational Behavior, 12, 295–336.
Ridge. T. (2004). Remarks by Secretary Ridge to National Press Club. Retrieved from http://
www.crime-research.org/library/DHS.html
Ridge, T. (2009). The test of our times: America under siege….and how we can be safe again. New
York, NY: Thomas Dunn Books.
Rittel, H. W. &Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Science,
4, 155–169.
Rodriguez, G. A. (2011). Creating domestipol; increasing national resilience by reflecting on the NYPD counterterrorism model (Master’s thesis). Naval Postgraduate School,
Monterey, CA.
Schaffer, P. A. (2018). Climate security threat—America’s Achilles’ heel (Master’s thesis). Naval
Postgraduate School, Monterey, CA.
Sekar, K. &Cornell, A.S. (2020). Domestic public health response to COVID-19: Current status
and resource guide. Washington, DC: Congressional Research Service.
Shannon, T. (2010). Leveraging successful collaborative processes to improve performance
outcomes in large-scale event planning: Superbowl, a planned homeland security event
(Master’s thesis). Naval Postgraduate School, Monterey, CA.
Stevenson, W. H. (2008). Enhancing the effectiveness of National Guard support of civil
authorities by improving interagency coordination (Master’s thesis). Naval Postgraduate
School, Monterey, CA.
Trist. E. (1983). Referent organizations and the development of interorganizational domains.
Human Relations, 36(1), 269–284.
United Nations. (1992). Framework convention on climate change. Secretary-General of the United
Nations [Depository]. Retrieved from https://unfccc.int/resource/docs/convkp/conveng.pdfe
U.S. Secret Service and Department of Education. (2004). The final report and findings of the
safe school initiative: Implications for the prevention of school attacks in the United States.
Washington, DC: Authors.
U.S. Senate. (2006). Hurricane Katrina: A nation still unprepared. Washington, DC: Government
Printing Office.
USA Patriot Act. (2001). P.L. 107-56 (October 26, 2001).
Wade, C. L. (2010). The California law enforcement community’s intelligence-led policing
capacity (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Werner, A. (2008). The potential transformative impact of web 2.0 technology on the intelligence
community (Master’s thesis). Naval Postgraduate School, Monterey, CA.
Wesling, J. C. (2010). Securing the northern maritime border through maritime domain
awareness (Master’s thesis). Naval Postgraduate School, Monterey, CA.
White House. (2002). National strategy for homeland security. Washington. DC: Author.
Retrieved from https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf
White House. (2007). National strategy for homeland security. Washington. DC: Author.
Retrieved from https://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf
White House. (2010). National security strategy. Washington. DC: Author. Retrieved from
http://nssarchive.us/NSSR/2010.pdf
White House. (2015). National security strategy. Washington. DC: Author. Retrieved from
https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_
strategy_2.pdf
White House. (2017). National security strategy. Washington. DC: Author. Retrieved from
https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017- 0905.pdf
White House. (2018a). National security strategy. Washington, DC. Author.
White House. (2018b). National strategy for counterterrorism of the United States of America.
Washington, DC: Author.
White House. (2018c). National biodefense strategy. Washington, DC: Author. Retrieved from
https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Biodefense-Strategy.pdf
White House. (2020). Proclamation on declaring a national emergency concerning the novel
coronavirus disease (COVID-19) outbreak.
Brown, J. T. (2011). Presidential Policy Directive 8 and the National Preparedness System:
Background and issues for Congress. CRS Report R42073. Federation of American
Scientists. https://fas.org/sgp/crs/homesec/R42073.pdf
Congressional Research Service. (2019). Stafford Act and acts of terrorism. Federation of
American Scientists. https://fas.org/sgp/crs/homesec/R44801.pdf
Disaster Mitigation Act. (2000). Public Law 106-390. FEMA. https://www.fema.gov/
media-library/assets/documents/4596
Disaster Relief Act. (1974). Public Law 93-288. Homeland Security Digital Library. https://
www.hsdl.org/?abstract&did=458661
Drabek, T. E. (1989). Emergency management, definition, vision, mission, principles. Emergency
Management Institute, FEMA. https://training.fema.gov/hiedu/docs/emprinciples/0907_176%
20em%20principles12x18v2f%20johnson%20(w-o%20draft).pdf
Federal Emergency Management Agency (FEMA). (2010a). Developing and maintaining emergency operations plans: Comprehensive Preparedness Guide (CPG) 101 (2nd ed.). https://www.
fema.gov/media-library-data/20130726-1828-25045-0014/cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf
FEMA. (2010b). Publication 1. https://www.fema.gov/media-library-data/20130726-1823-250458164/pub_1_final.pdf
FEMA. (2013). The Stafford Act: Robert T Stafford disaster relief and emergency assistance
act, as amended. Federation of American Scientists. https://fas.org/irp/agency/dhs/fema/
stafford.pdf
FEMA. (2018a). Comprehensive Preparedness Guide (CPG) 201: Threat and Hazard Identification
and Risk Assessment (THIRA) and Stakeholder Preparedness Review (SPR) Guide. https://
www.fema.gov/media-library/assets/documents/165308
FEMA. (2018b). National exercise program. https://www.fema.gov/national-exercise-program
FEMA. (2019a). About the agency. https://www.fema.gov/about-agency
FEMA. (2019b). 2019 National threat and hazard identification and risk assessment (THIRA)—
Overview and methodology. https://www.fema.gov/media-library/assets/documents/181470
Flood Control Act. (1965). Public Law 89-298. Cornell University. https://www.law.cornell.
edu/topn/flood_control_act_of_1965
Homeland Security Presidential Directive 8. (2003). FAS. https://fas.org/irp/offdocs/nspd/
hspd-8.html
Kahan, J. (2015). Emergency management and homeland security: Exploring the relationship.
Journal of Emergency Management, 13(6), 483–498. https://doi.org/10.5055/jem.2015.0258
Kosar, K.R. (2005). Disaster response and appointment of a recovery czar: The Executive
Branch’s response to the Flood of 1927. CRS Report RL 3326. Federation of American
Scientists. https://fas.org/sgp/crs/misc/RL33126.pdf
McCreight, R. (2009). Educational challenges in homeland security and emergency management. Journal of Homeland Security and Emergency Management, 6(1). https://doi.org/
10.2202/1547-7355.1576
McCreight, R. (2011). Introduction to the journal of homeland security and emergency management special issue. Journal of Homeland Security and Emergency Management, Article 5.
National Governors Association. (1978). Emergency preparedness project: Final report. NGA.
Post Katrina Emergency Reform Act. (2006). 6 U.S.C. Ch.2, Subch. II, Part A, §748(b)(3)
(2006). U.S. Congress. https://www.congress.gov/bill/109th-congress/senate-bill/3721
Ramsay, J., & Renda-Tanali, I. (2018). Development of competency-based education standards
for homeland security academic programs. Journal of Homeland Security and Emergency
Management, 15(3). https://doi.org/10.1515/jhsem-2018-0016
Renda-Tanali, I. (2013). Higher education in Homeland Security: Current state and future
trends. In D. G. Kamien (Ed.), McGraw-Hill homeland security handbook: The definitive
guide for law enforcement, EMT, and all other security professionals (2nd ed., pp. 917–935).
McGraw-Hill.
Robert, T. (1988). Stafford Disaster Relief and Emergency Assistance Act of 1988, Public Law
100-707. Homeland Security Digital Library. https://www.hsdl.org/?abstract&did=806354
Rubin, C. B. (2014). Local emergency management: Origins and evolution. In W. Waugh &
K. Tierney (Eds.) Emergency management: Principles and practice for local government
(2nd ed., pp. 25–37). ICMA Press.
Rubin, C. B. (Ed.). (2020). Emergency management: The American experience (3rd ed.).
Routledge.
Sandy Recovery Improvement Act. (2013). Public Law 113-2. FEMA. https://www.fema.gov/
sandy-recovery-improvement-act-2013
Sylves, R. (2020). Federal emergency management comes of age, 1979–2001. In C.B. Rubin
(Ed.) The American experience (3rd ed., Chapter 5). Routledge.
U.S. Department of Homeland Security. (2011). The strategic national risk assessment in support
of PPD 8: A comprehensive risk-based approach toward a secure and resilient nation. http://
www.dhs.gov/xlibrary/assets/rma-strategic-national-risk-assessment-ppd8.pdf
U.S. DHS. (2015). National preparedness goal (2nd ed.). FEMA. https://www.fema.gov/medialibrary-data/1443799615171-2aae90be55041740f97e8532fc680d40/National_Preparedness_
Goal_2nd_Edition.pdf
U.S. DHS. (2016a). What DHS does during steady-state. https://www.dhs.gov/what-dhs-doesduring-steady-state
U.S. DHS. (2016b). What DHS does during a cyber attack. https://www.dhs.gov/what-dhs-doesduring-cyber-attack
U.S. DHS. (2016c). What DHS does during an explosives terrorist attack. https://www.dhs.gov/
what-dhs-does-during-explosives-terrorist-attack
U.S. DHS. (2016d). What DHS does during major storms and extreme weather events. https://
www.dhs.gov/what-dhs-does-during-major-storms-and-severe-weather-events
U.S. DHS. (2016e). What DHS does during pandemics. https://www.dhs.gov/what-dhs-doesduring-pandemics
U.S. DHS. (2016f). What DHS does during political conventions. https://www.dhs.gov/what-dhsdoes-during-political-convention
U.S. DHS/Federal Emergency Management Agency (FEMA). (2017). National Incident
Management System (3rd ed.). https://www.fema.gov/media-library-data/1508151197225ced8c60378c3936adb92c1a3ee6f6564/FINAL_NIMS_2017.pdf
White House. (2002). National Strategy for Homeland Security. Office of Homeland Security.
https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf
Andreas, Peter. (2003). Redrawing the line: Borders and security in the twenty-first century,
International Security, 28(2), 78–11.
Andreas, P., & Nadelmann, E. (2006). Policing the globe. In Criminalization and crime control
in international relations. New York, NY: Oxford University Press.
Bertone, Andrea M. (2008). Combating Human Smuggling: Transnational Advocacy Networks
between Thailand and the United States. Presented at the 49th Annual International Studies
Association Convention, March 24–28, 2008.
Bull, H. (2012). The anarchical society: A study of order in world politics. Macmillan International
Higher Education.
Carment, D. (2003). Assessing state failure: Implications for theory and policy. Third World
Quarterly, 24(3), 407–427.
Cozine, K. (2016). Fragmentation and interdependency: Border security intelligence in North
America and Europe. The International Journal of Intelligence, Security, and Public Affairs,
18(3), 175–197.
Donnelly, J. (2000). Realism and international relations. Cambridge University Press.
Hajer, M., & Versteeg, W. (2005). Performing governance through networks. European Political
Science, 4(3), 340–347.
Hardin, G. (1968). The tragedy of the commons. Science, 162(3859), 1243–1248.
Harvard Law School. (2019). Intergovernmental Organizations (IGOs). Retrieved from: https://
hls.harvard.edu/dept/opia/what-is-public-interest-law/public-service-practice-settings/
public-international-law/intergovernmental-organizations-igos/
International Civil Aviation Organization. (2009). Strategic objectives for ICAO. Retrieved
from: http://www.icao.int/icao/en/strategic_objectives.htm
International Committee of the Red Cross. (2019). What we do? Retrieved from: https://www
.icrc.org/en/who-we-are
Karns, M. A., & Mingst, K. A. (2010). International organizations: The politics and processes
(2nd ed.). Boulder, CO: Lynne Rienner Publishers, Inc.
Keck, M. E., & Sikkink, K. (1998). Activists beyond borders. Cornell University Press.
Keohane, R. O., & Nye, J. S. (1974). Transgovernmental relations and international
organizations. World Politics, 27(1), 39–62.
Koslowski, R. (2008). Global Mobility and the Quest for an International Migration Regime.
Presentation at Conference on International Migration and Development: Continuing the
Dialogue – Legal and Policy Perspectives, the Center for Migration Studies (CMS) and the
International Organization for Migration (IOM), New York, New York, January 17–18, 2008.
Revised April 2008.
Lascurettes, K. (2017). The concert of Europe and great power governance today: What can the
order of 19th-century Europe teach policymakers about international order in the 21st century.
RAND National Defense Research Institute Santa Monica United States.
Milner, H. (1991). The assumption of anarchy in international relations theory: A critique.
Review of International Studies, 17(1), 67–85.
Naim, M. (2003). Five wars of globalization: The illegal trade in drugs, arms, intellectual
property, people, and money is booming, Foreign Policy, 134, 28–37.
Pawlak, P. (2007). From hierarchy to networks: Transatlantic Governance of homeland
security, Journal of Global Change and Governance, 1(1).
Rees, W. (2006). Transatlantic-counterterrorism cooperation: The new imperative, London, UK:
Routledge.
Rosenau, J. N. (1995). Governance in the twenty-first century, Global Governance, 1.
Slaughter, A. (2004). A new world order. Princeton, NJ: Princeton University Press.
Slaughter, A., & Zaring D. (2006). Networking goes international: An update. Annual Review
of Law and Social Science, 2, 211–229.
Telbami, S. (2002). Kenneth Waltz, neorealism, and foreign policy. Security Studies, 11(3),
158–170.
United Nations. (2014). Global governance and global rules for development in the post-2015
era. Retrieved from https://www.un.org/en/development/desa/policy/cdp/cdp_publications/
2014cdppolicynote.pdf
Wapner, P. (1995). Politics beyond the states: Environmental activism and world civic politics.
World Politics, 47(3).
Watson, A. (2002). Evolution of international society. London, UK: Routledge.
Wendt, A. (1999). Social theory of international politics. Cambridge, UK: Cambridge University
Press.
White House. (2011). Beyond the border: A shared vision for perimeter security and economic competitiveness, Declaration by President Obama and Prime Minister Harper
of Canada—Beyond the Border, Office of the Press Secretary. Retrieved from: https://
obamawhitehouse.archives.gov/the-press-off ice/2011/02/04/declaration-presidentobama-and-prime-minister-harper-canada-beyond-bord
Winston, A. (2018). Stationed overseas, but solving crimes in New York City. The New York
Time (August 21, 2018). Retrieved from: https://www.nytimes.com/2018/08/21/nyregion/
terrorism-nypd-intelligence-crime.html
Wyckoff, J. (2014). The prisoner’s dilemma, 1000-Word Philosophy. Retrieved from:
https://1000wordphilosophy.com/2014/04/24/the-prisoners-dilemma/
Young, O. R. (Ed.). (1997). Global governance: Drawing insights from the environmental
experience. MIT Press.
Andrew, C., Aldrich, R. J., & Wark, W. K. (2009). Secret intelligence: A reader. New York, NY:
Routledge.
Betts, R. K. (1978). Analysis, war, and decision: Why intelligence failures are inevitable. World
Politics, 31(1), 61–89.
Betts, R. K. (1980–81). Surprise despite warning: Why sudden attacks succeed. Political Science
Quarter, 95(4), 551–572.
Brooks, D. (2005). The Art of Intelligence. New York Times, April 2.
Builta, J. A., & Heller, E. N. (2011). Reflections on 10 years of counterterrorism analysis. Studies
in Intelligence, 55(3), 1–15.
Burch, J. (2007). A domestic intelligence agency for the United States? A comparative analysis
of domestic intelligence agencies and their implications for homeland security. Homeland
Security Affairs, 3(2), 1–16.
Colby, E. A. (2007). Making intelligence smart. Hoover Institution Policy Review, August and
September. https://www.hoover.org/research/making-intelligence-smart
Copeland, T. E. (2017). Intelligence failure theory. Oxford Research Encyclopedia of International
Studies. http://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.
0001/acrefore-9780190846626-e-27
Dahl, E. J. (2013). Intelligence and surprise attack: Failure and success from Pearl Harbor to 9/11
and beyond. Washington, DC: Georgetown University Press.
Dahl, E. J. (2014). Finding Bin Laden: Lessons for a new American way of intelligence. Political
Science Quarterly, 129(2), 179–210.
Dahl, E. J. (2015). A homeland security net assessment needed now! Strategic Studies Quarterly,
9(4), 62–86.
Dahl, E. J. (2018). Not your father’s intelligence failure: Why the intelligence community failed
to anticipate the rise of ISIS. In al-Istrabadi, F., & Ganguly, S. (Eds.). The Future of ISIS:
Regional and international implications (pp. 41–65). Washington, DC: Brookings Institution
Press.
Davies, P. H. J. (2002). Ideas of intelligence. Harvard International Review, 24(3), pp. 62–66.
Davies, P. H. J. (2009). Theory and intelligence reconsidered. In Gill, P., Marrin, S., &
Phythian, M. (Eds.). Intelligence theory: Key questions and debates (pp. 186–207). London,
UK: Routledge.
Davis, J. (1992). The Kent–Kendall debate of 1949. Studies in Intelligence, 36(5) 91–103.
Davis, J. (2002). Sherman Kent and the profession of intelligence analysis. Sherman Kent Center
for Intelligence Analysis Occasional Paper, 1(5). https://www.cia.gov/library/kent-centeroccasional-papers/vol1no5.htm
Davis, J. (2009). Strategic warning: Intelligence support in a world of uncertainty and surprise. In Johnson, L. K. (Ed.). Handbook of intelligence studies (pp. 173–188). New York, NY:
Routledge.
Elder, G. (2006). Intelligence in war: It can be decisive. Studies in Intelligence, 50(2). https://
www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/
studies/vol50no2
Ferris, J. (2018). Intelligence in war. Oxford Research Encyclopedia of International Studies.
http://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.0001/
acrefore-9780190846626-e-405
Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: Offense, defense, and deception in
cyberspace. Security Studies, 24(2), 316–348.
Gentry, J. A. (2016). Toward and theory of non-state actors’ intelligence. Intelligence and
National Security, 31(4), 465–489.
Gentry, J. A., & Gordon, J. S. (2018). U.S. strategic warning intelligence: Situation and
prospects. International Journal of Intelligence and CounterIntelligence, 31(1), 19–53.
Gill, Peter. (2010). Theories of intelligence. In Johnson, L. K. (Ed.). The Oxford handbook of
national security intelligence (pp. 43–58). New York, NY: Oxford University Press.
Griffith, S. B. (1963). Sun Tzu the art of war (translation). London, UK: Oxford University
Press.
Handel, M. (1984). Intelligence and the problem of strategic surprise. The Journal of Strategic
Studies, 7(3), 229–281.
Handel, M. (2001). Masters of war: Classical strategic thought (3rd ed.). London, UK: Routledge.
Hastedt, G. P., & Skelley, B. D. (2009). Intelligence in a turbulent world: Insights from organization theory. In Gill, P., Marrin, S., & M. Phythian, Intelligence theory: Key questions and
debates (pp. 112–130). London, UK: Routledge.
Hedley, J. H. (2009). Analysis for strategic intelligence. In Johnson, L. K. (Ed.), Handbook of
intelligence studies (pp. 211–226). New York, NY: Routledge.
Heidenrich, J. G. (2007). The intelligence community’s neglect of strategic intelligence. Studies
in Intelligence, 51(2), 15–26.
Herman, M. (2005). Review of John Keegan. Intelligence in War. War in History, 12(4), 453–485.
Hillebrand, C., & Hughes, R. G. (2017). The quest for a theory of intelligence. In R. Dover,
H. Dylan, & M. Goodman (Eds.), The Palgrave handbook of security, risk and intelligence
(pp. 1–24). Basingstoke, UK: Palgrave.
Honig, O. R. (2007). A new direction for theory-building in intelligence studies. International
Journal of Intelligence and CounterIntelligence, 20(4), 699–716.
Hughes, R. G., & Koutsoukis, A. (2018). Clausewitz first, and last, and always: War, strategy
and intelligence in the twenty-first century. Intelligence and National Security, 34(3), 438–455.
Hulnick, A. (2006). What’s wrong with the intelligence cycle. Intelligence and National Security,
21(6), 959–979.
Jenkins, B. M. (2006). Unconquerable Nation: Knowing our enemy, strengthening ourselves.
Santa Monica, CA: RAND Corporation.
Jervis, R. (2010). Why intelligence fails: Lessons from the Iranian revolution and the Iraq War.
Ithaca, NY: Cornell University Press.
Johnson, L. K. (2003). Preface to a theory of strategic intelligence. International Journal of
Intelligence and CounterIntelligence, 16(4), 638–663.
Johnson, L. K. (2010). Bricks and mortar for a theory of intelligence. Comparative Strategy,
22(1), 1–28.
Joint Chiefs of Staff. (2013). Joint Publication 2-0, Joint Intelligence. Washington, DC.
Kahn, D. (1986). Clausewitz and intelligence. The Journal of Strategic Studies, 9(2–3), 117–126.
Kahn, D. (2001). An historical theory of intelligence. Intelligence and National Security, 16(3),
79–92.
Keegan, J. (2004). Intelligence in war: The value—and limitations—of what the military can learn
about the enemy. New York, NY: Vintage Books.
Kendall, W. (1949). The function of intelligence. World Politics, 1(4), 542–552.
Kent, S. (1949). Strategic intelligence for American World Policy. Princeton, NJ: Princeton
University Press.
Lewandowski, C., & Guidetti, R. (2018). The role of fusion centers in homeland security. In
Logan, K. G. (Ed.), Homeland security and intelligence (2nd ed., pp. 173–192). Santa Barbara,
CA: ABC-CLIO.
Logan, K. G. (Ed.). (2018). Homeland security and intelligence (2nd ed.). Santa Barbara, CA:
Praeger.
Lowenthal, M. M. (2017). Intelligence: From secrets to policy (7th ed.). Thousand Oaks, CA:
CQ Press.
MacEachin, D. (2005). Analysis and estimates: Professional practices in intelligence production.
In Sims, J. E., & Gerber, B. (Eds.). Transforming U.S. Intelligence (pp. 115–133). Washington,
DC: Georgetown University Press.
Marrin, S. (2007). Intelligence analysis theory: Explaining and predicting analytic
responsibilities. Intelligence and National Security, 22(6), 821–846.
Marrin, S. (2014). Improving intelligence studies as an academic discipline. Intelligence and
National Security, 31(2), 266–279.
Marrin, W. (2018). Evaluating intelligence theories: Current state of play. Intelligence and
National Security, 33(4), 479–490.
Medina, C. (2002). What to do when traditional models fail: The coming revolution
in intelligence analysis. Studies in Intelligence, 46(3). https://www.cia.gov/library/
center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3
National Research Council. (2011). Intelligence analysis for tomorrow: Advances from the behavioral and social sciences. Committee on behavioral and social science research to improve
analysis for national security. Washington, DC: National Academies Press.
Phythian, M. (2009). Intelligence theory and theories of international relations: Shared world
or separate worlds? In Gill, P., Marrin, S., & Phythian, M. (Eds.), Intelligence theory: Key
questions and debates (pp. 54–72). London, UK: Routledge.
Priest, D., &Arkin, W. M. (2011). Top secret America: The rise of the new American security
state. New York, NY: Little, Brown and Company.
Rogg, J. P. (2018). ‘Quo Vadis?’ A comparatist meets a theorist searching for a grand theory of
intelligence. Intelligence and National Security, 33(4), 541–552.
Scott, L., & Jackson, P. (2004). The study of intelligence in theory and practice. Intelligence and
National Security, 19(2), 139–169.
Sims, J. (2014). The theory and philosophy of intelligence. In Dover, R., Goodman, M. S., &
Hillebrand, C. (Eds.), Routledge companion to intelligence studies (pp. 42–49). London, UK:
Routledge.
Steiner, J. E. (2015). Homeland security intelligence. Los Angeles, CA: CQ Press.
The Economist. (2003). America needs more spies. The Economist, July 10.
Treverton, G. F. (2018). Theory and practice. Intelligence and National Security, 33(4), 472–478.
Treverton, G. F., Jones, S. G., Boraz, S., & Lipscy, P. (2006). Toward a theory of intelligence:
Workshop report. Santa Monica, CA: RAND.
United States Secret Service National Threat Assessment Center. (2019). Protecting America’s
Schools: A U.S. Secret Service Analysis of Targeted School Violence. Washington, DC.
Warner, M. (2002). Wanted: A definition of ‘intelligence’. Studies in Intelligence, 46(3). https://
www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/
studies/vol46no3/article02.html
Warner, M. (2004). Review of intelligence in war: Knowledge of the enemy from Napoleon to
al-Qaeda. Studies in Intelligence, 48(2), 67–69.
Warner, M. (2006). The divine skein: Sun Tzu on Intelligence. Intelligence and National Security,
21(4), 483–492.
Warner, M. (2014). Theories of intelligence: The state of play. In Dover, R., Goodman, M. S., &
Hillebrand, C. (Eds.), Routledge Companion to Intelligence Studies (pp. 25–32). London, UK:
Routledge.
Webb, J.M. (2009). Review of intelligence theory: Key questions and debates. Studies in
Intelligence,
53(2).
https://www.cia.gov/library/center-for-the-study-of-intelligence/csipublications/csi-studies/studies/vol53no2/intelligence-theory-key-questions-and-debates.html
Wheaton, K. J., & Beerbower, M. T. (2006). Towards a new definition of intelligence. Stanford
Law and Policy Review, 17, 319–330.
Wirtz, J. J. (2003). Theory of surprise. In Betts, R. K. & Mahnken, T. G. (Eds.), Paradoxes of
strategic intelligence: Essays in honor of Michael I. Handel (pp. 101–116). New York, NY:
Routledge.
Wirtz, J. J. (2006). Responding to surprise. Annual Review of Political Science, 9, 45–65.
Zegart, A. B. (2007). Spying blind: The CIA, the FBI, and the origins of 9/11. Princeton, NJ:
Princeton University Press.
Alley, Richard B. (2011). Earth: An operator’s manual. New York, NY: W. W. Norton &
Company.
Associate Press (AP). (2012). Climate change fears overblown, says ExxonMobil boss.
The Guardian (June 28, 2012). http://www.guardian.co.uk/environment/2012/jun/28/
exxonmobil-climate-change-rex-tillerson
Baragona, S. (2011). Food price spikes helped trigger Arab Spring, researchers say. Voice of
America (December 13, 2011). http://www.voanews.com/content/article-2011-food-pricespikes-helped-trigger-arab-spring-135576278/149523.html
Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland
Security Affairs, IV(2). http://www.hsaj.org/?article=4.2.1#
Bhattacharyya, A., & Werz, M. (2012). Climate change, migration, and conflict in Southern
Asia: Rising tensions and policy options across the subcontinent. Center for American
Progress Report (December 2012).
Breisinger, C., Ecker, O., & Al-Riffai, P. (2011), Economics of the Arab awakening. Washington,
DC: International Food Policy Research Institute. http://www.ifpri.org/publication/
economics-arab-awakening
Buzan, B., & Hansen, L. (2009). The Evolution of international security studies. Cambridge,
MA: Cambridge University Press.
Buzan, B., Wæver, O., Wæver, O., & de Wilde, J. (1998), Security: A new framework for analysis.
Boulder, CO: Lynne Rienner Publishers.
Caballero-Anthony, M. (Ed.). (2015). An introduction to non-traditional security studies:
A transnational approach. Sage.
Cai, Y., & Lontzek, T. S. (2019). The social cost of carbon with economic and climate risks.
Journal of Political Economy, 127(6), 2684–2734. https://doi.org/10.1086/701890
Chalecki, E. (2002). Environmental security: A case study of climate change. Pacific Institute
for Studies of Development, Environment, and Security. http://www.pacinst.org/reports/
environment_and_security/
Commission on Human Security (CHS). (2003). Human security now. New York. https://reliefweb.int/sites/reliefweb.int/files/resources/91BAEEDBA50C6907C1256D19006A9353-chssecurity-may03.pdf
Conway, E. (2008). What’s in a name? Global warming vs. climate change. Washington, DC:
National Aeronautics and Space Administration (NASA). Internet Resource, News Topics>
Looking at Earth> Feature (December 5).
Cook, J. (2010). The scientific guide to global warming skepticism. SkepticalScience.com
(December
2010).
http://www.physics.smu.edu/pseudo/GlobalWarming/Guide_to_
Skepticism.pdf
Cook, J. (2016). Countering climate science denial and communicating scientific consensus. In Oxford Research Encyclopedia of Climate Science. https://
ox for d r e.c o m /c l i m at e s c i e n c e / v i e w/10.10 93/a c r e for e /978 019 022 862 0.0 01.0 0 01/
acrefore-9780190228620-e-314?print=pdf
Cook, J., Supran, G., Lewandowsky, S., Oreskes, N., & Maibach, E. (2019). America misled:
How the fossil fuel industry deliberately misled Americans about climate change. Fairfax, VA:
George Mason University Center for Climate Change Communication.
Dennis, B. (2019). Trump makes it official: U.S. will withdraw from the Paris climate accord.
Washington Post (November 4, 2019). https://www.washingtonpost.com/climate-environment/
2019/11/04/trump-makes-it-official-us-will-withdraw-paris-climate-accord/
Eckstein, D., Hutfils, M.L., & Winges, M. (2018). Global climate risk index 2019: Who suffers most from extreme weather events? Weather-related loss events in 2017 and 1998 to 2017.
Germanwatch Nord-Süd Initiative eV.
Estrada-Tanck, 2016 Human Security and Human Rights under International Law: The
Protections Offered to Persons Confronting Structural Vulnerability. London, Hart Publishing,
360 pp. ISBN 9781509902385
Gilmore, E. A., & St. Clair, T. (2018). Budgeting for climate change: Obstacles and opportunities at the US state level. Climate policy, 18(6), 729–741.
Jay, A., Reidmiller, D., Avery, C., Barrie, D., DeAngelo, B., Dave, A. & Dzaugis, M. (2018). The
Fourth National Climate Assessment: Summary findings and overview. https://doi.org/10.1002/
essoar.10500761.1
Jotzo, F., Depledge, J., & Winkler, H. (2018). US and international climate policy under President
Trump.
Kirsten, H. E. (2016). Climate change federalism. In Elgar encyclopedia of environmental law
(pp. 337–347). Edward Elgar Publishing Limited.
Lanicci, J., Ramsay, J., & Murray, E. (2017) Reconceptualizing environmental security as resilience: Strategic planning for human and national security. Journal of Human Security and
Resilience, 1(1).
Lenton, T. M., Rockström, J., Gaffney, O., Rahmstorf, S., Richardson, K., Steffen, W., &
Schellnhuber, H. J. (2019). Climate tipping points—too risky to bet against. Nature, 575,
592–595.
Lewandowsky, S., Pilditch, T. D., Madsen, J. K., Oreskes, N., & Risbey, J. S. (2019). Influence
and seepage: An evidence-resistant minority can affect public opinion and scientific belief
formation. Cognition, 188, 124–139.
Lloyd, E. A., & Oreskes, N. (2019). Climate change attribution. Epistemology and Philosophy of
Science, 56(1), 185–201.
Maier, C. S. (1990). Peace and security for the 1990s. Unpublished paper for the MacArthur
Fellowship Program, Social Science Research Council (June 12, 1990).
Mann, M. E., Lloyd, E. A., & Oreskes, N. (2017). Assessing climate change impacts on extreme
weather events: The case for an alternative (Bayesian) approach. Climatic Change, 144(2),
131–142.
Mason, J. (2013). The history of climate science. Skeptical Science (April 7, 2013). http://www.
skepticalscience.com/history-climate-science.html
Masson-Delmotte, V., Zhai, P., Pörtner, H. O., Roberts, D., Skea, J., Shukla, P. R., …
&Connors, S. (2018). Summary for policymakers. Global warming of 1.5°C. An IPCC
Special Report on the impacts of global warming of 1.5°C above pre-industrial levels
and related global greenhouse gas emission pathways, in the context of strengthening the
global response to the threat of climate change. https://www.ipcc.ch/2018/10/08/summaryfor-policymakers-of-ipcc-special-report-on-global-war ming-of-1-5c-approved-bygovernments/
Mattis, J. (2018). Summary of the 2018 national defense strategy of the United States of America.
Department of Defense Washington United States.
McElroy, M. B., & Baker, D. J. (2013). Climate extremes: Recent trends with implications for
national security. Vermont Journal of Environmental Law, 15, 727.
Millennium Project. (n.d.). Environmental security definitions. http://www.millennium-project
.org/millennium/es-2def.html
Moore, G., Hatzodony, J., Cronin, K., & Brekenridge, M. (2010). Homeland security-related
education and the private liberal arts college, Homeland Security Affairs, VI(2). http://www.
hsaj.org/?article=6.2.4
Moulson, G. (2012). Japan tsunami pushes 2011 into record for insurance losses.
Associated Press (January 8, 2012). http://www.tulsaworld.com/business/article.
aspx?subjectid=51&articleid=20120108_51_E2_CUTLIN520922
Munich RE. (2019). The natural disasters of 2018 in figures (last updated January, 2019).
https://www.munichre.com/topics-online/en/climate-change-and-natural-disasters/naturaldisasters/the-natural-disasters-of-2018-in-figures.html
National Intelligence Council (NIC). (2012). Global trends 2030: Alternative worlds (December
2012). https://www.dni.gov/files/documents/GlobalTrends_2030.pdf
Obama, B. (2015). 2015 US National Security Strategy. https://obamawhitehouse.archives.gov/
sites/default/files/docs/2015_national_security_strategy_2.pdf
O’Sullivan, T.M., & Ramsay, J. (2012). Environmental security and public health, In Keith
Logan &James Ramsay, (Eds.). Introduction to homeland security. Westview Press.
O’Sullivan, T. M., & Ramsay, J. (2014). Defining and distinguishing homeland from national
security and climate-related environmental security, in theory and practice. Journal of
Homeland Security and Emergency Management, 12(1), 43–66.
Pew Project on Energy, Security and Climate. (2010) Pew Project on National Security,
Energy and Climate Reacts to Department of Defense’s Quadrennial Defense Review,
Press Release (February 3, 2010). http://www.pewtrusts.org/news_room_detail.
aspx?id=57140.
Poloczanska, E., Mintenbeck, K., Portner, H. O., Roberts, D., & Levin, L. A. (2018, February).
The IPCC special report on the ocean and cryosphere in a changing climate. In 2018 Ocean
Sciences Meeting. AGU.
Polson, C., Persyn, J., & Cupp, S. (2010). Partnership in progress: A model for development of
a homeland security graduate degree program, Homeland Security Affairs, VI(2). http://www
.hsaj.org/?article=6.2.3
Preiser, R., Biggs, R., De Vos, A., & Folke, C. (2018). Social-ecological systems as complex
adaptive systems: Organizing principles for advancing research methods and approaches.
Ecology and Society, 23(4).
Ramsay, J. D., & O’Sullivan, T. M. (2013). There’s a pattern here: The case to integrate environmental security into homeland security strategy. Homeland Security Affairs, 9(6). Retrieved
from https://commons.erau.edu/db-security-studies/10
Ramsay, J., & Renda-Tenali, I. (2018) Journal of Homeland Security and Emergency Management.
https://doi.org/10.1515/jhsem-2018-0016
Ramsay, J., Cutrer, D. & Raffel, R. (2010). Development of an outcomes-based, undergraduate curriculum in homeland security. Homeland Security Affairs, VI(2). http://www.hsaj.
org/?article=6.2.4;
Ramsay, J., & Kiltz, L. (2013). Critical issues within the homeland security enterprise: A casebook.
Boulder, CO: Westfield Press, Praeger Publications.
Reese, S. (2013). Defining homeland security: Analysis and congressional considerations
(Congressional Research Service, January 8, 2013).
Revelle, R., & Suess, H. E. (1957). Carbon dioxide exchange between atmosphere and
ocean and the question of an increase of atmospheric CO2 during the past decades.
Tellus, 9(1), 18–27.
Ricke, K., Drouet, L., Caldeira, K. et al. Country-level social cost of carbon. Nature Clim
Change 8, 895–900 (2018). https://doi.org/10.1038/s41558-018-0282-y
Romm, J. J. (1993). Defining national security: The nonmilitary aspects (p. 5). New York:
Council on Foreign Relations Press.
Rosenthal, E. (2012). Race is on as ice melt reveals Arctic treasures. New York Times
(September 18, 2012). http://www.nytimes.com/2012/09/19/science/earth/arctic-resourcesexposed-by-warming-set-off-competition.html?pagewanted=all&_r=0
Ritchey, T. (2013). Wicked problems. Swedish Morphological Society (2005, revised 2013). http://
www.swemorph.com/pdf/wp.pdf
Samet, J. M., & Woodward, A. (2018). National government denial of climate change and state
and local public health action in a federalist system. American Journal of Public Health,
108(S2), S112–S113.
ScienceDaily. (2011). Climate change threatens global security, warn medical and military
leaders. From the British Medical Journal as cited at ScienceDaily (April 5, 2011). http://www.
sciencedaily.com/releases/2011/04/110405194110.htm
Sen, B. (2018). The brutal racial politics of climate change and pollution: Trump administration policies are systematically making natural disasters more harmful for the poor and
people of color. Indigenous Policy Journal, 28(3).
Shi, W, Wang, S, & Yang, Q. (2010). Climate change and global warming, Reviews in
Environmental Science and Bio/Technology, 9, 99–102.
Snell, M.B. (2018). Unlikely Ally: How the military fights climate change and protects the
environment. Heyday Press.
Steinbruner, J. D., Stern, P., & Husbands, J. L. (2013). Climate and social stress: Implications
for security analysis. National Academies of Science Report (p. 1).
Tankersley, J., & Hart, A. C. (2009). Bush-era EPA document on climate change released.
Los Angeles Times (October 1, 2009). http://articles.latimes.com/2009/oct/14/nation/
na-epa-climate14
Thunberg, Greta (2019). Our house in on fire: Greta Thunberg, 16, urges leaders to act on
climate. The Guardian (January 25, 2019). https://www.theguardian.com/environment/2019/
jan/25/our-house-is-on-fire-greta-thunberg16-urges-leaders-to-act-on-climate
Townsend, M., & Harris, P. (2004). Now the Pentagon tells us: Climate change will destroy us.
The Guardian UK (February 21, 2004). http://www.guardian.co.uk/environment/2004/feb/22/
usnews.theobserver
UN Environment Programme. (2019). Emissions gap report 2019. United Nations (26 November).
https://www.unenvironment.org/resources/emissions-gap-report-2019
United Nations Human Security Unit. (2009). Human security in theory and practice.
United Nations Trust Fund for Human Security. http://hdr.undp.org/en/media/HS_
Handbook_2009.pdf
US Department of Defense. (2011). The quadrennial defense review (May 2011). http://www
.defense.gov/qdr/
USGCRP. (2017). In D. J. Wuebbles et al. (Eds.), Climate science special report: Fourth national
climate assessment (NCA4) (Vol. 1, 470 pp). U.S. Global Change Research Program. https://
doi.org/10.7930/J0J964J6
Vidal, J. (2012). Arctic expert predicts final collapse of sea ice within four years. The
Guardian UK (September 17, 2012). http://www.guardian.co.uk/environment/2012/sep/17/
arctic-collapse-sea-ice
Waever, Ole. (1995). Securitization and desecuritization. In Ronnie Lipschutz (Ed.), On security
(pp. 46–86). New York, NY: Columbia University Press.
Watts, J. (2019). ‘No doubt left’ about scientific consensus on global warming, say experts.
The Guardian (July 24, 2019). https://www.theguardian.com/science/2019/jul/24/
scientific-consensus-on-humans-causing-global-warming-passes-99
White House. (2006). United States National Security Strategy of 2006. Washington, DC:
Government Printing Office. http://merln.ndu.edu/whitepapers/USnss2006.pdf
Wirsing, R. G. (2012). The Brahmaputra: Water hotspot in Himalayan Asia. Global Water
Forum (June 2, 2012). http://www.globalwaterforum.org/2012/06/02/the-brahmaputrawater-hotspot-in-himalayan-asia/
World Bank (2012). Turn down the heat: Why a 4°C warmer world must be avoided (World
Bank Report, Potsdam Institute for Climate Impact Research and Climate Analytics,
November 2012).
Yale Global Online. (2012). Climate skeptic reverses course (August 1, 2012). http://yaleglobal
.yale.edu/content/koch-funded-climate-change-skeptic-reverses-course
Adalja, A. A., Toner, E., & Inglesby, T. V. (2015). Clinical management of potential bioterrorism-related conditions. New England Journal of Medicine, 372(10), 954–962.
Barry, J. M. (2004). The site of origin of the 1918 influenza pandemic and its public health
implications. Journal of Translational medicine, 2(1), 3.
Brown, G. G., & Cox, Jr, L. A. (2011). How probabilistic risk assessment can mislead terrorism
risk analysts. Risk Analysis: An International Journal, 31(2), 196–204.
CDC. (2012). Lessons of disease occurrence: Section 8: Concepts of disease occurrence. Retrieved
from https://www.cdc.gov/csels/dsepd/ss1978/lesson1/section8.html (Accessed April 12, 2020).
CDC (2013). Untreatable: Report by CDC details today’s drug-resistant health threats.
Retrieved from: https://www.cdc.gov/media/releases/2013/p0916-untreatable.html, Accessed
September 20, 2020.
Centers for Disease Control and Prevention (CDC). (2018). The public health system and the 10
essential public health services. USA. Retrieved from https://www.cdc.gov/publichealthgateway/publichealthservices/essentialhealthservices.html (Accessed December 2019).
CDC. (2019). Cities readiness initiative. Retrieved from https://www.cdc.gov/cpr/readiness/
mcm/cri.html (Accessed December 2019).
CDC Foundation. (2019). What is public health? Retrieved from https://www.cdcfoundation
.org/what-public-health (Accessed November 2019).
Charrel, R. N., de Lamballerie, X., & Raoult, D. (2007). Chikungunya outbreaks-the
globalization of vectorborne diseases. New England Journal of Medicine, 356(8), 769.
Committee on Prepositioned Medical Countermeasures for the Public. (2011). Institute of
Medicine. In Stroud, C., Viswanathan, K., Powell, T., & Bass, R. R. (Eds.), Prepositioning
antibiotics for anthrax. National Academies Press.
Cooper, L., Kang, S. Y., Bisanzio, D., Maxwell, K., Rodriguez-Barraquer, I., Greenhouse, B., … &
Eckhoff, P. (2019). Pareto rules for malaria super-spreaders and super-spreading. Nature
communications, 10(1), 1–9.
Cyber Security and Infrastructure Security Agency (CISA) & U.S. Department of Homeland
Security. (2020). Critical infrastructure sectors: Public health and healthcare. Retrieved from
https://www.cisa.gov/healthcare-and-public-health-sector (Accessed January 10, 2020).
Delamater, P. L., Street, E. J., Leslie, T. F., Yang, Y. T., & Jacobsen, K. H. (2019). Complexity
of the basic reproduction number (R0). Emerging infectious diseases, 25(1), 1.
Dollar, D. (2001). Is globalization good for your health? Bulletin of the World Health
Organization, 79, 827–833.
EJF. (2020). Protecting climate refugees. Retrieved from https://ejfoundation.org/what-we-do/
climate/protecting-climate-refugees?gclid=Cj0KCQ jwyur0BRDcARIsAEt86ICidUx2XPn f Bjr- 6QMgV6Ew pV lwW2ieLHv6Tsg ukHe8EzBPUSBPBoaAvo-EALw_wcB
(Accessed February 2020).
Fauci, A. S. (2012). Research on highly pathogenic H5N1 influenza virus: The way forward.
mBio, 3(5), e00359–12.
Federal Emergency Management Agency (FEMA). (2019). DRAFT, W. (2019). National
response framework.
Food and Drug Administration (FDA). (2019). What are medical countermeasures? FDA
Medical Countermeasures Initiative (MCMi). Retrieved from https://www.fda.gov/
emergency-preparedness-and-response/about-mcmi/what-are-medical-countermeasures
(Accessed January 10, 2020).
Fouchier, R. A., García-Sastre, A., Kawaoka, Y., Barclay, W. S., Bouvier, N. M., Brown, I. H., &
Cox, N. J. (2013). Transmission studies resume for avian flu. Science, 339(6119), 520–521.
Georgetown University Medical Center. (2019, March 28). Science news. Retrieved from https://
www.sciencedaily.com/releases/2019/03/190328150856.htm (Accessed March 2020).
Gould, D. W., Walker, D., & Yoon, P. W. (2017). The evolution of BioSense: Lessons learned
and future directions. Public Health Reports, 132(suppl. 1), 7S–11S.
Graham, B., Talent, J., Larsen, R., & Kidder, L. (2011). Bio-response report card. WMD Center.
Hampton, T. (2013). Report reveals scope of US antibiotic resistance threat. Journal of the
American Medical Association, 310(16), 1661–1663.
Health and Human Services, U.S. Department of (HHS). (2019a). Emergency preparedness and
response. Retrieved from https://www.hhs.gov/programs/emergency-preparedness/index.html
(Accessed January 2020).
Health and Human Services, U.S. Department of (HHS). (2019b). Chemical, biological,
radiological, and nuclear (CBRN) threat programs. Retrieved from https://www.medicalcountermeasures.gov/BARDA/CBRN.aspx (Accessed January 2020).
Health and Human Services, U.S. Department of (HHS), Assistant Secretary for Preparedness
and Response (ASPR). (2019a). Strategic national stockpile. Retrieved from https://www.phe
.gov/about/sns/Pages/default.aspx (Accessed December 2019).
HHS, Office of Assistant Secretary of Preparedness and Response (ASPR). (2019b). National
disaster medical system. Retrieved from https://www.phe.gov/Preparedness/responders/
ndms/Pages/default.aspx
Heymann, D. L. (2017). Global health security: The global outbreak alert and response network.
Hyde, J. K., & Shortell, S. M. (2012). The structure and organization of local and state public
health agencies in the US: A systematic review. American Journal of Preventive Medicine,
42(5), S29–S41.
Institute of Medicine (US) Committee for the Study of the Future of Public Health. (1988). The
Future of Public Health. Washington (DC): National Academies Press (US). Appendix A,
Summary of the Public Health System in the United States. Retrieved from https://www.ncbi.
nlm.nih.gov/books/NBK218212/
Jack, A. (2015). Why the panic? South Korea’s MERS response questioned. British Medical
Journal, 350, h3403.
Jiang, F., & Doudna, J. A. (2017). CRISPR – Cas9 structures and mechanisms. Annual Review
of Biophysics, 46, 505–529.
Knobler, S. L., Mack, A., Mahmoud, A., & Lemon, S. M. (2005). Summary and assessment.
In The threat of pandemic influenza: Are we ready? workshop summary. National Academies
Press (US).
Knobler S, Mahmoud A, Lemon S, et al., eds. (2004). Learning from SARS: Preparing for
the Next Disease Outbreak. Institute of Medicine (US) Forum on Microbial Threats,
Washington (DC): National Academies Press (US). DOI: 10.17226/10915
Lee, A. (2003). Will the SARS epidemic recur? Host and environment are key factors. Journal of
Epidemiology & Community Health, 57(10), 770–771. http://dx.doi.org/10.1136/jech.57.10.770
Maciosek, M. V., Coffield, A. B., Flottemesch, T. J., Edwards, N. M., & Solberg, L. I. (2010).
Greater use of preventive services in US health care could save lives at little or no cost.
Health Affairs, 29(9), 1656–1660.
McLeman, R. (2019). International migration and climate adaptation in an era of hardening
borders. Nature Climate Change, 9(12), 911–918.
McGill, N. (2015). Public health looks to lessons from past in MERS outbreak: Experience with
SARS offers insights.
Memish, Z. A., Assiri, A., Turkestani, A., Yezli, S., al Masri, M., Charrel, R., … & Gautret,
P. (2015). Mass gathering and globalization of respiratory pathogens during the 2013 Hajj.
Clinical Microbiology and Infection, 21(6), 571–e1.
National Center for Biotechnology Information (NCBI). (2017). Polymerase Chain Reaction
(PCR). National Institutes of Health. https://www.ncbi.nlm.nih.gov/probe/docs/techpcr/
(Accessed January 2019).
National Institutes of Health (NIH) (2011). Press Statement on the NSABB Review
of H5N1 Research.
Retrieved at: https://webcache.googleusercontent.com/search?
q=cache:b8RddeYeQRMJ:https://europepmc.org/books/n/nap18255/appb/+&cd=1&hl=
en&ct=clnk&gl=us. Accessed September 20, 2020.
Nabel, G. J., & Fauci, A. S. (2010). Induction of unnatural immunity: Prospects for a broadly
protective universal influenza vaccine. Nature Medicine, 16(12), 1389–1391.
Olaitan, A. O., Morand, S., & Rolain, J. M. (2016). Emergence of colistin-resistant bacteria in
humans without colistin usage: A new worry and cause for vigilance.
O’Sullivan, Terrence M. (2017). Mitigating extreme infectious disease disaster risk. In Risk
in extreme environments: Preparing, avoiding, mitigating, and managing (pp. 162–173). Vicki
Bier, Edit (October).
Parida, SK, Axelsson-Robertson, R, Rao, MV, Singh, N, Master, I, Lutckii, A, Keshavjgee, S,
Anderson, J, Zumla, A, Maeurer, M., (2015) “Totally drug-resistant tuberculosis and
adjunct therapies.” Journal of Internal Medicine, vol 277(4).
Park, H. Y., Lee, E. J., Ryu, Y. W., Kim, Y., Kim, H., Lee, H., & Yi, S. J. (2015). Epidemiological
investigation of MERS-CoV spread in a single hospital in South Korea, May to June 2015.
Eurosurveillance, 20(25), 21169.
Paules, C. I., & Fauci, A. S. (2019). Influenza vaccines: Good, but we can do better. The Journal
of Infectious Diseases, 219(Suppl. 1), S1–S4.
Pike, Jamison, Tiffany Bogich, Sarah Elwood, David C. Finoff, & Peter Daszak (2014)
Economic Optimization of a global strategy to address the pandemic threat. Proceedings of
the National Academy of Sciences, 111(52), 18519–18523.
Rai, A., & Khan, T. (2018). Overview of drug resistant mycobacterium tuberculosis. International
Journal of Life-Sciences Scientific Research, 4(3), 1795–1800.
Ravi, S., & Adalja, A. A. (2017). Strengthening the US medical countermeasure enterprise for
biological threats. Health Security, 15(1), 12–14.
The Report of the Commission on the Prevention of WMD Proliferation and Terrorism (WMD
Report) (2008) Retrieved at: https://web.archive.org/web/20090130205134/http://documents.
scribd.com/docs/15bq1nrl9aerfu0yu9qd.pdf. Accessed September 20, 2020.
Rigaud, K. K., Jones, B., Bergmann, J., Clement, V., Ober, K., Schewe, J., … & Midgley, A.
(2018). Groundswell: Preparing for internal climate migration. Washington, DC: World Bank.
Roberts, M (2019) “Low Trust in Vaccinations a Global Crisis” BBC News. Retrieved at:
https://www.bbc.com/news/health-48512923
Samet, J. M., & Woodward, A. (2018). National government denial of climate change and state
and local public health action in a federalist system.
Silverman, E. (2020, April 15). As demand surges, half of prescriptions needed for Covid-19
patients on ventilators are going unfilled. Retrieved from https://www.statnews.com/
pharmalot/2020/04/15/covid19-coronavirus-ventilators-drug-shortages/
Shelton, S., et al. (2012). Bioterrorism and biological threats dominate federal health security
research; other priorities get scant attention. Health Affairs, 31 (12), 2755–2763.
Suk, J. E., Zmorzynska, A., Hunger, I., Biederbick, W., Sasse, J., Maidhof, H., & Semenza, J. C.
(2011). Dual-use research and technological diffusion: Reconsidering the bioterrorism threat
spectrum. PLoS Pathogens, 7(1).
Taubenberger, J. K., & Morens, D. M. (2006). Influenza revisited. Emerging Infectious Diseases,
12(1), 1.
Tucker, J. B. (2004). Biological threat assessment: Is the cure worse than the disease? Arms
Control Today, 34(8), 13–19.
Tucker, J. B., & Zilinskas, R. A. (2006). The promise and perils of synthetic biology. The New
Atlantis, (12), 25–45.
United Nations Refugee Agency (UNHCR). (2019). Climate Change and Disaster Displacement.
UNHCR website. Retrieved from https://www.unhcr.org/climate-change-and-disasters.html
(Accessed December 2019).
Walker, B. (1989). The future of public health: The Institute of Medicine’s 1988 report. Journal
of Public Health Policy, 10(1), 19–31.
Wein, L. M., & Liu, Y. (2005). Analyzing a bioterror attack on the food supply: The case of
botulinum toxin in milk. Proceedings of the National Academy of Sciences, 102(28), 9984–9989.
Wong, G., Liu, W., Liu, Y., Zhou, B., Bi, Y., & Gao, G. F. (2015). MERS, SARS, and Ebola: The
role of super-spreaders in infectious disease. Cell Host & Microbe, 18(4), 398–401.
World Health Organization (WHO). (2017). Vector-borne diseases. WHO (October 31, 2017).
Retrieved from https://www.who.int/news-room/fact-sheets/detail/vector-borne-diseases
(Accessed June 20, July 28, 2015).
World Health Organization (WHO). (2015) Intensified public health measures help control
MERS-CoV outbreak in the Republic of Korea. World Health Organization (July 28, 2015).
Retrieved from http://www.wpro.who.int/mediacentre/releases/2015/20150728/en/
World Bank (2018). “Climate Change Could Force Over 140 Million to Migrate Within
Countries by 2050: World Bank Report.” Retrieved from: https://www.worldbank.org/en/
news/press-release/2018/03/19/climate-change-could-force-over-140-million-to-migratewithin-countries-by-2050-world-bank-report, Accessed September 20 2020.
Wappes, John. (2016). Highly resistant MCR-1 ‘superbug’ found in U.S. for first time. CIDRAP
(May 26, 2016). http://www.cidrap.umn.edu/news-perspective/2016/05/highly-resistant-mcr1-superbug-found-us-first-time
Anonymous. (2006). 10 U.S.C. § 275.
Al-Aulaqi v. Panetta. (2014). 35 F. Supp. 3d 56 (D.D.C. 2014).
Allan, H. K. (2017). Paradoxes of sovereignty and citizenship: Humanitarian intervention at
home. CUNY Law Review, 20(2), 389.
Amar, A. R. (2005). America’s constitution, a biography. New York, NY :Random House.
Bank Secrecy Act. (2012). 31 U.S.C. §§ 5311–5338.
Bier, V. (2006). Hurricane Katrina as a bureaucratic nightmare. On Risk and Disaster. https://
doi.org/10.9783/9780812205473.243
Birkland, T. A. (2015). An introduction to the policy process: Theories, concepts, and models of
public policy making. New York, NY: Routledge.
Calabresi, S. G., & Agudo, S. E. (2008). Individuals rights under state constitutions when the
Fourteenth Amendment was ratified in 1868: What rights are deeply rooted in American
history and tradition? Texas Law Review, 87(1), 7.
Carroll v. United States. (1925). 267 U.S. 132.
Chesney, R. (2011). Who may be killed? Anwar al-Awlaki as a case study in the international
legal regulation of lethal force. Yearbook of International Humanitarian Law, 13, 3–60.
https://doi.org/10.1007/978-90-6704-811-8_1
Cole, D. (2004). Uncle Sam is watching you. Georgetown Law Faculty Publications and Other
Works. 1. David Cole. New York Times Review of Books (November 18, 2004).
Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: Sacrificing civil liberties in the
name of national security. New York, NY: New Press.
Dolan, C. J. (2006). In war we trust: The Bush doctrine and the pursuit of just war. Aldershot:
Ashgate.
Electronic Communications Privacy Act. (2002). 18 U.S.C. §§ 2511, et seq.
Foreign Intelligence Surveillance Act. (2019). 50 U.S.C. §§ 1801, et seq.
Gibbons v Ogden. (1824). 22 U.S. (9 Wheat.) 1.
Griswold v Connecticut. (1965). 381 U.S. 479.
Halchin, E., Hogue, H., Kaiser, F., Love, N., McCarthy, F. X., Reese, S., & Schwemle, B.
(2007). Federal emergency management policy changes after Hurricane Katrina: A summary
of statutory provisions, congressional research service. Keith Bea, Coordinator Specialist,
American National Government, Government and Finance Division, Government and
Finance Division. Congressional Research Center (CRS Report RL33729). https://fas.org/
sgp/crs/homesec/RL33729.pdf
Homeland Security Act. (2002). 6 U.S.C. §§ 101–557 (2002), 49 U.S.C. § 44918 (2019).
Insurrection Act. (n.d.). 10 U.S.C. §§ 331–335.
Ito, S. (2011, October 3). After Al-Aulaqi’s killing, why due process matters. ACLU. https://
www.aclu.org/blog/national-security/targeted-killing/after-al-aulaqis-killing-whydue-process-matters
Katz v. United States. (1967). 389 U.S. 347.
Kyllo v. United States. (2001). 533 U.S. 27.
Laurie, C. D., & Cole, R. H. (1997). The role of federal military forces in domestic disorders,
1877–1945. Washington, DC: Center of Military History, U.S. Army.
Marbury v. Madison. (1803). 5 U.S. 137.
McCulloch v. Maryland. (1819). 17 U.S. (4 Wheat.) 316.
Posse Comitatus Act. (1878). 18 U.S.C. § 1385.
Post-Katrina Emergency Management Reform Act. (2006). Pub. L. No. 93-288, 88 Stat.
143–164 (2006), as amended, 42 U.S.C. §§ 5121 et seq.
Rahinah Ibrahim v Dept. of Homeland Security, et al. (2019). No. 14-16161; 14-17272
(9th Cir. 2019).
Robert T. Stafford Disaster Relief and Emergency Assistance Act. (1988). 42 U.S.C. §§ 5121–5170.
Sampaio, A. A., & Vedovato, L. R. (2015). With the stroke of a pen: Legal standards for adding names to government kill lists. International Human Rights Law Review, 4(2), 194–221.
https://doi.org/10.1163/22131035-00402001
Sinnar, S. (2016). Rule of law tropes in national security. Harvard Law Review, 129, 1566.
Story, J. (1833). Commentaries on the constitution of the United States: With a preliminary review
of the constitutional history of the colonies and states, before the adoption of the Constitution.
Boston: Hilliard, Gray, and Company.
Sylves, R., & Cumming, W. R. (2004). FEMA’s Path to Homeland Security: 1979–2003. Journal of
Homeland Security and Emergency Management, 1(2). https://doi.org/10.2202/1547-7355.1023
Taft, W. H. (1916). Our chief magistrate and his powers. Columbia University Press.
Torbet v. United Airlines, Inc. (2002). 298 F.3d 1087, 1089.
U.S. Const. art. II, § 2.
USA PATRIOT Act Amendments to Foreign Intelligence Surveillance Act Authorities. (2005,
April 27). https://archives.fbi.gov/archives/news/testimony/usa-patriot-act-amendments-toforeign-intelligence-surveillance-act-authorities
USA PATRIOT Act. (2001). Pub. L. No. 107-56, 115 Stat. 272.
United States v. Davis. (1973). 482 F.2d 893, 895 (9th Cir. 1973).
United States v. Red Feather. (1975). 392 F. Supp. 916, 922.
United States v. Forrester. (2007). 495 F.3d 1041 (9th Cir. 2007).
United States v Maxwell. (1996). 45 M.J. 406 (CCAF, 1996).
United States v. Ramsey. (1977). 431 U.S. 606.
United States v. Warshak. (2010). 631 F.3d 266 (6th Cir. 2010).
Youngstown Sheet & Tube Company v. Sawyer. (1952). 343 U.S. 579.
Aisenberg, M. A. (2018). State & local ICT policy: A framework for cybersecurity. SciTech
Lawyer, 14(3), 14–19.
Appeals court upholds FTC authority over data security. (2015, November/December).
Information Management Journal, 49(6), 7.
Bahajji, Z. A., & Illyes, G. (2014, August 6). HTTPS as a ranking signal [Blog post]. Retrieved
from the Google Webmaster Central Blog: https://webmasters.googleblog.com/2014/08/
https-as-ranking-signal.html
Brown, K. A. (2006). Critical path: A brief history of critical infrastructure protection in the
United States. Fairfax, VA: Spectrum Publishing Group.
Bugcrowd. (n.d.). How it works. Retrieved from https://www.bugcrowd.com/products/
how-it-works/
Capezza, T. A. (2017). New York state rule reaches beyond the state’s borders in requiring
corporate boards to implement cybersecurity protections. Business Lawyer, 73, 239–242.
Carnegie Endowment for International Peace. (n.d.). Cyber norms index. Retrieved from https://
carnegieendowment.org/publications/interactive/cybernorms
Children’s Online Privacy Protection Act. (1998). Pub. L. No. 105-277 (Title XIII), 112 Stat.
2681 (1998).
Clinger-Cohen Act. (1996). Pub. L. No. 104-106 (Div. D and E), 110 Stat. 186, 642 (1996).
Commonwealth of Australia, Department of the Prime Minister and Cabinet. (2016).
Australia’s cyber security strategy. Retrieved from the Department of Home Affairs: https://
cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-CyberStrategy.pdf
Computer Security Act. (1987). Pub. L. No. 100-235, 101 Stat. 1724 (1988).
Cook, C. (2018). Cross-border data access and active cyber defense: Assessing legislative
options for a new international cybersecurity rulebook. Stanford Law & Policy Review, 29,
205–236.
Department of Homeland Security, U.S. Government. (2018). Cybersecurity strategy.
Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-CybersecurityStrategy_1.pdf
Directive (EU) 2016/1148. (2016). Directive (EU) 2016/1148 of the European Parliament and
of the Council of 6 July 2016 concerning measures for a high common level of security of
network and information systems across the Union (OJ L 194, 19.7.2016, pp. 1–30).
Executive Order No. 13,800. (2017). 3 C.F.R. 349.
Fair Credit Reporting Act. (1970). Pub. L. No. 91-508 (Title VI), 84 Stat. 1114 (1970).
Federal Information Security Management Act. (2002). Pub. L. No. 107-347 (Title III), 116 Stat.
2899 (2002).
Federal Information Security Modernization Act. (2014). Pub. L. No. 113-283, 128 Stat. 3073
(2014).
Federal Trade Commission, U.S. Government. (2006, April). Financial institutions and customer
information: Complying with the safeguards rule. Retrieved from https://www.ftc.gov/tips-advice/
business-center/guidance/financial-institutions-customer-information-complying
Federal Trade Commission, U.S. Government. (2013, May). Fighting identity theft with the
red flags rule: A how-to guide for business. Retrieved from https://www.ftc.gov/tips-advice/
business-center/guidance/fighting-identity-theft-red-flags-rule-how-guide-business
Federal Trade Commission Act. (1914). 15 U.S.C. § 45 (1914, as revised).
Finland, Secretariat of the Security Committee. (2013). Finland’s cyber security strategy
[Government resolution 24.1.2013]. Retrieved from the Ministry of Defence: https://www.
defmin.fi/files/2378/Finland_s_Cyber_Security_Strategy.pdf
Gebhart, G. (2018, July 30). Google Chrome now marks HTTP sites “not secure” [Blog post].
Retrieved from the Electronic Frontier Foundation: https://www.eff.org/deeplinks/2018/07/
google-chrome-now-marks-http-sites-not-secure
Gibson, B. (2016). Systems theory. In Encyclopædia Britannica. Retrieved from https://www.
britannica.com/topic/systems-theory
Google. (n.d.). HTTPS encryption on the web. Retrieved July 1, 2019, from https://transparencyreport.google.com/https/overview
Gramm-Leach-Bliley Act. (1999). Pub. L. No. 106-102, 113 Stat. 1338 (1999).
Greenwald, E. A. (2010). History repeats itself: The 60-day cyberspace policy review in context.
Journal of National Security Law & Policy, 4(1), 41–60. Retrieved from http://jnslp.com/
HackerOne. (n.d.-a). Product overview. Retrieved from https://www.hackerone.com/product/
overview
HackerOne. (n.d.-b). Vulnerability disclosure guidelines. Retrieved from https://www.hackerone
.com/disclosure-guidelines
Health Information Technology for Economic and Clinical Health Act. (2009). Pub. L.
No. 111-5 (Title XIII), 123 Stat. 115 (2009).
Health Insurance Portability and Accountability Act. (1996), Pub. L. No. 104-191, 110 Stat.
1936 (1996).
Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2135 (2002).
International Committee of the Red Cross. (2011, November 28–December 1). International
humanitarian law and the challenges of contemporary armed conflicts: Report from the 31st
International Conference of the Red Cross and Red Crescent. Retrieved from https://www.
icrc.org/eng/resources/documents/report/31-international-conference-ihl-challengesreport-2011-10-31.htm
Italy, Presidency of the Council of Ministers. (2013). National strategic framework for
cyberspace security. Retrieved from the Intelligence System for the Security of the Republic:
http://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2014/02/italian-nationalstrategic-framework-for-cyberspace-security.pdf
Kennedy, M. (2018, March 28). Ecuador disconnects Julian Assange from the internet.
NPR. Retrieved from https://www.npr.org/sections/thetwo-way/2018/03/28/597695729/
ecuador-disconnects-julian-assange-from-the-internet
Mauck, D., & Rady, K. (2017). Cybersecurity meets securities: What should be done. Securities
Regulation Law Journal, 45(3), 301–340.
McGuiness, T. (2019). Defense in depth, version 1.2E. Retrieved from the SANS Institute
Information Security Reading Room: https://www.sans.org/reading-room/whitepapers/
basics/defense-in-depth-525
National Institute of Standards and Technology, U.S. Department of Commerce. (n.d.). NIST
timeline. Retrieved from https://www.nist.gov/timelinelist
National Institute of Standards and Technology, U.S. Department of Commerce. (2018, April 16).
Framework for improving critical infrastructure cybersecurity, version 1.1. https://doi.org/
10.6028/NIST.CSWP.04162018
Paperwork Reduction Act. (1995). Pub. L. No. 104-13, 109 Stat. 163 (1995).
Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. EURASIP
Journal on Information Security, 2018(4), 1–21. https://doi.org/10.1186/s13635-018-0074-y
PCI Security Standards Council. (2018a). About us. Retrieved from https://www.pcisecuritystandards.org/about_us/
PCI Security Standards Council. (2018b, May). Payment card industry (PCI) data security
standard: Requirements and security assessment procedures, version 3.2.1. Retrieved from
https://www.pcisecuritystandards.org/document_library
People’s Republic of Bangladesh. (2014). The national cybersecurity strategy of Bangladesh.
Retrieved from Department of Printing and Publications: http://www.dpp.gov.bd/upload_
file/gazettes/10041_41196.pdf
Policy. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/policy
Power, M. (2007). Organized uncertainty: Designing a world of risk management. Retrieved from
https://ebookcentral.proquest.com
President’s Commission on Critical Infrastructure Protection. (1997). Critical foundations:
Protecting America’s infrastructures.
Presidential Policy Directive/PPD-21. (2013). Critical infrastructure security and resilience. Pub.
Papers 106-115 (February 12, 2013).
Regulation (EU) 2016/679. (2016). Regulation (EU) 2016/679 of the European Parliament and of
the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/
EC (OJ L 119, 4.5.2016, pp. 1–88).
Republic of Austria, Federal Chancellery, Department IV—Coordination, Division IV/6—
Security Policy Affairs. (2013). Austrian cyber security strategy. Retrieved from the Federal
Ministry of Interior: https://www.bmi.gv.at/504/files/130415_strategie_cybersicherheit_en_
web.pdf
Sarbanes Oxley Act. (2002). Pub. L. No. 107-204, 116 Stat. 745 (2002).
SB-1386 Personal Information: Privacy. (n.d.). Cal. Civ. Code § 1798.29; 1798.82 et seq (as
revised).
Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber
security. Journal of Digital Forensics, Security and Law, 12(2), 53–74. https://doi.org/10.15394/
jdfsl.2017.1476
Scott, T. (2015, June 8). Policy to require secure connections across federal websites and web
services (Office of Management and Budget Memorandum M-15-13). Retrieved from https://
www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2015/m-15-13.pdf
SEC Statement. (2018). SEC Statement and Guidance on Public Company Cybersecurity
Disclosures, 17 C.F.R. pts. 229 & 249.
Security. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/security
Self-regulation. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/self-regulation
Standard. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/standard
Switzerland, The Federal Council. (2018). National strategy for the protection of Switzerland
against cyber risks (NCS) 2018-2022 [SN002]. Retrieved from the Federal IT Steering
Unit: https://www.isb.admin.ch/isb/en/home/ikt-vorgaben/strategien-teilstrategien/sn002nationale_strategie_schutz_schweiz_cyber-risiken_ncs.html
The Danish Government, Ministry of Finance. (2018). Danish cyber and information security
strategy. Retrieved from https://uk.fm.dk/publications/2018/danish-cyber-and-informationsecurity-strategy
The Institute of World Politics. (2016, May 27). Cyber security: Why is this (still) so hard? [Video
file]. Retrieved from https://youtu.be/47zJPU0VHSQ
The White House, U.S. Government. (n.d.). Cyberspace policy review: Assuring a trusted and
resilient information and communications infrastructure. Retrieved March 11, 2019 from
the Department of Energy: https://www.energy.gov/sites/prod/files/cioprod/documents/
Cyberspace_Policy_Review_final.pdf
The White House, U.S. Government. (2011, May). International strategy for cyberspace. Retrieved
from
https://obamawhitehouse.archives.gov/blog/2011/05/16/launching-us-internationalstrategy-cyberspace
Theory. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/theory
United Nations General Assembly, Group of Governmental Experts on Developments in the
Field of Information and Telecommunications in the Context of International Security.
(2015, July 22). Report of the group of governmental experts on developments in the field of information and telecommunications in the context of international security (A/70/174). Retrieved
from http://undocs.org/A/70/174
United Nations Office for Disarmament Affairs. (n.d.). Developments in the field of information
and telecommunications in the context of international security. Retrieved from https://www.
un.org/disarmament/ict-security/
U.S. Chief Information Officer & the Federal CIO Council. (n.d.). Why HTTPS for everything?
Retrieved from https://https.cio.gov/everything/
W3 Techs. (2019, July 1). Historical trends in the usage of site elements for websites. Retrieved
from https://w3techs.com/technologies/history_overview/site_element/all/y
Young, W., & Leveson, N. G. (2014). Inside risks: An integrated approach to safety and
security based on systems theory. Communications of the ACM, 57(2), 31–35. https://doi
.org/10.1145/2556938
Appelbaum, S. (1997). Socio‐technical systems theory: An intervention strategy for organizational development. Management Decision, 35(6). 452–463. https://doi.org/10.1108/
00251749710173823
Baggett, R. K., Foster, C. S., & Simpkins, B. K. (Eds.). (2017). Homeland security technologies
for the 21st century. Praeger Security International.
Bellavita, C. (2012). Waiting for homeland security theory. Homeland Security Affairs. 8(15).
Birkland, T. (1997). After disaster: Agenda setting, public policy, and focusing events. Washington,
DC: Georgetown University Press.
Bond, S. (2020, April 24). Facebook launches rival to video-meeting app zoom. National Public Radio.
https://www.npr.org/sections/coronavirus-live-updates/2020/04/24/844360404/facebooklaunches-rival-to-video-meeting-app-zoom
Bothamley, J. (2002). Dictionary of theories. New York, NY: Barnes & Noble Press.
Cartelli, A. (2007). Socio-technical theory and knowledge construction: Towards new pedagogical paradigms? Issues in Informing Science and Information Technology, 4.
Clearview AI. (2020). Clearview AI: Computer vision for a safer world. [Webpage] Author.
https://clearview.ai/
Coats, D. R. (2019). Worldwide threat assessment of the US intelligence community. Senate Select
Committee on Intelligence. Washington, DC: Author.
Comiskey, J. (2010). Effective state, local, and tribal police intelligence (Master’s thesis).
Naval Post Graduate School. http://www.justiceacademy.org/iShare/Library-NPS/10Mar_
Comiskey.pdf
Comiskey, J. (2018). Theory for homeland security. Journal of Homeland Security Education, 7,
29–45. https://ijspre.org/theory-for-homeland-security
Comiskey, J., & Larrañaga, M. (2019). Climate security: A premortem approach to a sustainable global future. Homeland Security Affairs, 15(8).
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology:
A comparison of two theoretical Models. Management Science, 35(8), 982–1003.
Department of Homeland Security. (2010). Quadrennial homeland security review: A strategic
framework for a secure homeland, National Preparedness Goal. Washington, DC: Author.
Department of Homeland Security. (2011). The strategic national risk assessment in support of
PPD 8: A comprehensive risk-based approach toward a secure and resilient nation. Washington,
DC: Author.
Department of Homeland Security. (2012). Project responder 3 toward the first responder of
the future. Washington, DC: Author. https://www.nisconsortium.org/portal/resources/bin/
Project_Responder_3:_1423591018.pdf
Department of Homeland Security. (2013). Smart scavenging – Technology foraging at DHS.
Washington, DC: Author. https://www.dhs.gov/st-snapshot-tech-foraging
Department of Homeland Security. (2014a). The 2014 quadrennial homeland security review.
Washington, DC: Author.
Department of Homeland Security. (2014b). Project responder 4 2014 national technology plan
for emergency response to catastrophic incidents. Washington, DC: Author. https://www.dhs
.gov/sites/default/files/publications/Project%20Responder%204_1.pdf
Department of Homeland Security. (2015a). National preparedness goal. Washington, DC:
Author.
Department of Homeland Security. (2015b). Science & technology directorate: Strategic plan
2015–19. Washington, DC: DHS Science & Technology Directorate.
Department of Homeland Security. (2016). First responder resource group (FRRG): An emergency response and preparedness think tank fact sheet. Washington, DC: Author. https://
www.dhs.gov/sites/default/files/publications/First-Responder-Resource-Group_Fact-Sheet_
v3-508.pdf
Department of Homeland Security. (2017). Project Responder 5. Washington, DC: Author. https://
www.dhs.gov/sites/default/files/publications/Project-Responder-5-Report_170814-508.pdf
Department of Homeland Security. (2019a). DHS strategic plan fiscal years 2020–2024.
Washington, DC: Author.
Department of Homeland Security. (2019b). Directorate of science and technology strategic plan
2015–2019. Washington, DC: Author.
Eason, K. (2009). Before the internet: The relevance of socio-technical systems theory to emerging forms of virtual organisation. International Journal of Socio-technology a Knowledge
Development, 1(2). 23–32. https://doi.org/10.4018/jskd.2009040103
Food and Drug Administration. (2017). Emergency use authorization of medical products and
related authorities. Washington, DC: Author.
Harden, J. D. (2018, June 8). Delayed 911 Responses during Harvey left some residents waiting
days for help. Houston Chronicle. https://www.houstonchronicle.com/news/houston-texas/
houston/article/Delayed-911-responses-during-Harvey-left-12979327.php
Harris, C. (2019, June 26). Testimony before the Subcommittee on Government Operations,
Committee on Oversight and Reform, House of Representatives: Information Technology U.S.
Government Accounting Office.
Heslop, B. (2019, March 4). By 2030, each person will own 15 connected devices – Here’s what that
means for your business and content. MTA Martech Advisor.
Hopmeier, M. (2012). Technology foraging: A novel approach to technology problem solving
within DHS Science and Technology Directorate. In Kamien, D. G. (Ed.). Homeland security
handbook. New York, NY: McGraw Hill.
Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2136 (2002).
Hubona, G. S., & Whisenand, T.G. (1995). External variables and the technology acceptance
model. In AMCIS 1995 Proceedings, 85. http://aisel.aisnet.org/amcis1995/85
International Business Machines. (2020). What is quantum computing? Author. https://www
.ibm.com/quantum-computing/learn/what-is-quantum-computing/
Kellon, L. (2020, April 10). Coronavirus: Apple and Google team up to contact trace Covid-19.
British Broadcasting Corporation. https://www.bbc.com/news/technology-52246319
Kelly, H. (2012, June 30). 5 ways the iPhone changed our lives. CNN Business. https://www.cnn
.com/2012/06/28/tech/mobile/iphone-5-years-anniversary/index.html
Kleinman, Z. (2020, April 10). Coronavirus: Can we 3D-print our way out of the PPE shortage?
British Broadcasting Corporation. https://www.bbc.com/news/health-52201696
Kuhn, T. S. (1962). The structure of scientific revolutions. Chicago, IL: University of Chicago
Press.
Lai, P. C. (2017). The literature review of technology adoption models and theories for the novelty technology. JISTEM Brazil, 14(1). 21–38.
LaMorte, W. W. (2018). Diffusion of innovation theory. Boston University School of Public
Health.
http://sphweb.bumc.bu.edu/otlt/MPH-Modules/SB/BehavioralChangeTheories/
BehavioralChangeTheories4.html
Lewis, T. G. (2014). Book of extremes – Why the 21st century isn’t like the 20th century. New
York, NY: Springer.
Merchant, B. (2017). The one device: The secret history of the iPhone. New York, NY: Little
Brown & Company.
National Homeland Security Consortium. (2010). Protecting Americans in the 21st century:
Imperatives for the homeland. Washington, DC: Author. Retrieved from https://knowledgecenter
.csg.org/kc/system/files/NHSC_White_Paper_Updated_2010.pdf
National Institute of Standards and Technology. (2019). Chexia face recognition [webpage].
https://www.nist.gov/programs-projects/chexia-face-recognition
Pelfrey, W. V. & Kelley, W. D. (2013). Homeland security: A way forward. Homeland Security
Affairs, 9(3). Retrieved from http://www.hsaj.org/?article=9.1.3
Pitt, J. (2019, February 19). Deepfake videos and DDoS attacks – Deliberate denial of satire.
IEEE Technology and Society. https://technologyandsociety.org/deepfake-videosand-ddos-attacks-deliberate-denial-of-satire/
Poole, M. S. (2008). Adaptive structuration theory. In A first look at communication theory. New
York, NY: McGraw Hill.
Ramsay, J. (2012). Epilogue. In Logan, K. G. & Ramsay, J. D. (Eds.), Introduction to homeland
security. Boulder, CO: Westview Press.
Ranger, S. (2018, February 3). What is the IoT? Everything you need to know about the Internet of Things
right now. ZDNet Cybersecurity in an IOT and mobile world. https://www.zdnet.com/article/
what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/
Reese, S. (2014). Quadrennial homeland security review: Evolution of a strategic review.
Washington, DC: Congressional Research Service.
Rich, R. (2013, November 22). The great recession. Federal Reserve History. https://www
.federalreservehistory.org/essays/great_recession_of_200709
Rogers, E. M. (1962). Diffusion of innovations. New York, NY: Free Press of Glencoe.
Ryan, B., & Gross, N. T. (1943). The diffusion of hybrid seed corn. Rural Sociology, 8(1).
Silver, S. (2018, June 29). The story of the original iPhone that nobody thought was possible. Apple
Insider.
https://appleinsider.com/articles/18/06/29/the-story-of-the-original-iphone-thatnobody-thought-was-possible
Sinclair, J. K., & Vogus, C. E. (2011). Adoption of social networking sites: An exploratory adaptive structuration perspective for global organizations. Information Technology Management,
12, 293–314. https://doi.org/10.1007/s10799-011-00865
Toffler, A. (1970). Future shocks. New York, NY: Random.
United States v. Merrell. (2016). 842, F.3d 577 (8th Cir, 2016). https://scholar.google.com/
scholar_case?case=3974630246904000623&hl=en&as_sdt=6,33&as_vis=1
Venkatesh, V. &Bala, H. (2008). Technology acceptance model three and a research agenda on
interventions. Decision Science, 39(2), 273–312.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance
model: Four longitudinal field studies. Management Science, 46(2), 186–204.
Venkatesh, V., Morris, M. G., Davis, F. D., & Davis, G. B. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 425–478.
Ward, M. (2020, March 27). Tesla, Apple, and Ford are stepping up to address global shortages
of ventilators, hand sanitizer, face masks, and gowns. Here’s a running list of companies
helping out. Business Insider. https://www.businessinsider.com/coronavirus-companieshelping-meet-shortages-of-ventilators-gowns-masks-hand-sanitizer-healthcare
White House. (2018). National cybersecurity strategy of the United States. Washington, DC:
Author.
White House. (2020). Proclamation on declaring a national emergency concerning the novel coronavirus disease (COVID-19) outbreak. Washington, DC: Author.
Notes
1. Source: COSO Model for Internal Controls Based Upon the Enterprise Risk Management Integrated Framework Model Developed by the Committee of Sponsoring Organizations of the Treadway Commission by permission.
1. See, for instance, Souad Mekhennet (2020), “Far right and radical Islamist groups are
exploiting coronavirus turmoil”, Washington Post (April 10, 2020).
2. For a look at actual events and perspectives from the Federal Emergency Management
Agency, see 2019 National Threat and Hazard Identification and Risk Assessment
(THIRA): Overview and Methodology (FEMA, 2019).
3. See Chapter 11 in this volume, on Public Health Security, for discussion of the coronavirus/COVID pandemic and its implications for homeland security.
4. “In a gig economy, temporary, flexible jobs are commonplace and companies tend toward
hiring independent contractors and freelancers instead of full-time employees. A gig
economy undermines the traditional economy of full-time workers who rarely change
positions and instead focus on a lifetime career” (Chappelow, 2019). One example of this
would be Uber and Lyft drivers.
5. Cognition is “the mental action or process of acquiring knowledge and understanding
through thought, experience, and the senses”. Oxford Dictionary www.oxforddictionaries.com.
6. The Truman Doctrine and Marshall Plan. U.S. State Department (2019). https://history.
state.gov/departmenthistory/short-history/truman.
7. And then of course the startling dramatic impact of the 2020 COVID pandemic, the full
impact of which is yet to be determined.
8. The City of San Francisco passed an ordinance in 2019 banning future facial recognition surveillance, in anticipation (and fear) of the growing adoption worldwide
(Conger, Fausset, & Kovaleski, 2019).
1. In criminology, the fear of crime is a significant problem which has been extensively
researched. See for example Ditton and Farrall (2017) and Hale (1996).
2. Note that, euphemistically, all terrorism is considered criminal.
3. See Chapter 5 for a detailed discussion of terrorist target selection.
4. Critical infrastructures are systems and assets which are so important to the United
States, that their incapacitation would have a “debilitating impact” (NIHS, 2019).
5. See Chapter 8 for a discussion of the application of rational choice theory as it applies to
nation-states.
6. See Chapter 5 for an alternative discussion on rational choice and terrorism.
1. See Chapter 4 for a discussion on rational choice as it relates to crime and security.
2. See Chapter 8 for a description of game theory in terms of nation-state decision-making.
1. The registry has been replaced by the American Red Cross Safe and Well, Facebook
Safety Check, and Google Person Finder. FEMA maintains a “How Do I Find My
Family” webpage https://www.fema.gov/how-do-i-find-my-family.
2. For an example of the breadth of such interagency collaborations, the reader is referred to
the Government Accountability Office (2012). Managing for Results: Key Considerations
for Implementing Interagency Collaborative Mechanisms. GAO-12-1022. Washington,
DC. Government Printing Office.
3. Source: Government Accountability Office (2012). Managing for Results: Key Considerations for Implementing Interagency Collaborative Mechanisms. GAO-12-1022.
Washington, DC. Government Printing Office.
1. Drabek (1989). FEMA. See https://training.fema.gov/hiedu/docs/emprinciples/0907_176%
20em%20principles12x18v2f%20johnson%20(w-o%20draft).pdf
2. See https://www.fema.gov/about-agency
3. Rubin, C. B. (Ed.). (2020). Emergency management: The American experience (3rd ed.).
Routledge.
4. Rubin, C. B. (2014). Local emergency management: Origins and evolution. In W. Waugh, &
K. Tierney (Eds.). Emergency management: Principles and practice for local government
(2nd ed., pp. 25–37). Washington, DC: ICMA Press.
5. https://www.flickr.com/photos/noaaphotolib/5424752205/in/photolist-9gngQr-jkBvHJJTHCoz-c5YhCL-24cFvzR-qsvMtP-e3kEaT-4vFgcG-c5YeCf-c5YgrW-XXZdi7-aLzzbBc61cEJ-F8MDz-Xmr5BB-28hKCGC-5i3X1g-ap3jpd-prnFvi-YPPyTr-hnbtR1-WQApZk5i8gvA-8MK8sr-8kELj7-owhKTB-j7N7Dx-8ydXAL-53TZBH-gH8hZs-7thR5w-21obJih8MNeWJ-224QA8J-dLTq92-pySNRs-WVppEA-bVVh7M-icWsDM-GFZ7TE-DDxRCrWYXTm4-pEm9TG-24PF7w1-cuR7Jm-X7Z58x-nPCASC-5i8gjs-7a8sNf-fqVr94
6. https://pixabay.com/photos/hurricane-devastation-destruction-60550/
7. https://cdn.pixabay.com/photo/2012/10/26/01/08/buried-62989_960_720.jpg
8. https://cdn.pixabay.com/photo/2015/04/03/20/16/wwii-705767_960_720.jpg
9. See https://www.hsdl.org/?abstract&did=456688
10. https://www.flickr.com/photos/keyslibraries/2846421152/in/photolist-6zaTiT-6zaTh4fakDkg-faA2Nh-5kwDQL-5kso7Z-mf8et-SDzGdR-TTi9CZ
11. See https://www.fema.gov/media-library/assets/documents/21010; National Flood
Insurance Act. (1968a). Flood disaster protection Act of 1973. FEMA. https://www.fema.
gov/media-library/assets/documents/7277; National Flood Insurance Act. (1968b). As
amended, and Flood Disaster Protection Act of 1973, as amended, 42 U.S.C. 4001 et. seq.
FEMA. https://www.fema.gov/media-library/assets/documents/21010
12. See https://www.fema.gov/media-library/assets/documents/7277
13. See https://www.hsdl.org/?abstract&did=458661
14. NGA was founded in 1908 as a bipartisan organization to “share best practices, speak
with an informed voice on national policy and develop innovative solutions that improve
citizens’ lives through state government and support the principles of federalism” (Source:
https://www.nga.org/about/).
15. John Macy, who was the Director of the Civil Service Commission under Presidents
Eisenhower, Kennedy and Johnson, was appointed as FEMA’s first Director. He “recognized the commonalities between natural hazards preparedness, civil defense activities,
and what would come to be known as the “dual-use approach” to emergency preparedness planning and resources” (FEMA, 2010b, p. 7).
16. NAPA was congressionally chartered in 1967 as a non-partisan nonprofit academy. It
“has provided expert advice to government leaders in building and managing more effective, efficient, accountable and transparent organizations” (Source: https://www.napawash.org/about-us/who-we-are).
17. See https://www.fema.gov/media-library/assets/documents/4596
18. See https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf
19. Today the DHS consists of 22 agencies with a federal workforce of around 240,000 people.
20. See https://www.flickr.com/photos/slagheap/243442250/in/photolist-nvGUb-nvGU75kVU2c-cWrpXW-gUPpD-cF7cz-cF7Ae-cWrq1m-amhJd6-cWrq2o-cWrqYA-5yLUxdes3skw-cWrpeY-cWrqdf-cWrq4Q-cWrq8Q-cWrpp5-cWrpC3-cWrqmw-cWrqHj-cWrqw78B1wJa-8zkiXr-8zJi1X-8B1zEg-VmEQVh-cWrqJA-cWrrh9-es3r5Y-cWrr7L-cWroVjcWrre1-cWrqFS-cWrr35-cWrrTf-cWrrHN-cWrqtU-cWrq6U-q5SWn-cWrrJJ-cWrpFJ-cWrrUq-cWrrGq-cWrrPw-cWrrBd-cWrpto-dapurN-8BtuGa-cWrpiS
21. See Post Katrina Emergency Reform Act (2006) https://www.congress.gov/bill/109thcongress/senate-bill/3721
22. See https://www.fema.gov/media-library-data/1571336142501-c914622674a919294dd2a964
aaeda0d1/FEMA_Org_Chart.pdf
23. https://www.dhs.gov/publication/department-homeland-securitys-strategic-plan-fiscalyears-2020-2024
24. “Stafford Act is designed to bring an orderly and systemic means of federal natural disaster assistance for state and local governments in carrying out their responsibilities to
aid citizens. Congress’ intention was to encourage states and localities to develop comprehensive disaster preparedness plans, prepare for better intergovernmental coordination in the face of a disaster, encourage the use of insurance coverage, and provide
federal assistance programs for losses due to a disaster. This Act constitutes the statutory
authority for most federal disaster response activities especially as they pertain to FEMA
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
and FEMA programs” (FEMA, 2019, 2019b); see also: Robert T. (2016). Stafford Disaster
Relief and Emergency Assistance Act, as amended, and Related Authorities as of August
2016. FEMA. https://www.fema.gov/media-library/assets/documents/15271.
Two main challenges were observed concerning Stafford Act Assistance and the acts of
terrorism where the tactics used in the post 9-11 incidents such as the 2015 San Bernardino,
California, the 2016 Orlando, Florida mass shootings and the 2016 Ohio State University
vehicular and knife attack (CRS, 2019): (a) According to the Stafford Act, the major disaster definition lists specific incident types that are eligible for federal assistance where
there is fire and explosions. It is still unclear whether incidents without a fire or explosion
would fit under a major disaster, and (b) FEMA’s recommendation to the President to
issue a major disaster declaration is based on the damage on public infrastructure as
compared to the population of the state. Hence, the numbers affected and the public
infrastructure damage are limited in terrorism cases. See the CRS report on Stafford Act
Assistance and Acts of Terrorism (2019) regarding this debate.
See National Wildfire Coordinating Group. (2018). Mission. https://www.nwcg.gov/
See https://www.fema.gov/national-incident-management-system
See https://fas.org/irp/offdocs/nspd/hspd-8.html
See https://www.fema.gov/media-library-data/1443799615171-2aae90be55041740f97e8532fc
680d40/National_Preparedness_Goal_2nd_Edition.pdf
See CRS Report on PPD-8 and NPS https://fas.org/sgp/crs/homesec/R42073.pdf
U.S. Department of Homeland Security (2011). The strategic national risk assessment in support of PPD 8: A comprehensive risk-based approach toward a secure and resilient nation.
http://www.dhs.gov/xlibrary/assets/rma-strategic-national-risk-assessment-ppd8.pdf
See https://www.fema.gov/media-library-data/1487864847326-9b0a1ce43c03c8b7aaf084fd4ea84266/NPS_Graphic_large.png
See https://www.fema.gov/national-exercise-program
https://upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Hurricane_Sandy_damage_Long_Beach_Island.jpg/800px-Hurricane_Sandy_damage_Long_Beach_Island.jpg
See https://www.fema.gov/sandy-recovery-improvement-act-2013
See https://www.hsdl.org/c/tl/sandy-recovery-improvement-act-2013/
CPG 101, 2010, pp. 4-8 and 4-9.
against impacts on the human, health, economic, social, political, environmental, etc.
which are commonly considered as components of an “all-hazards approach”
See https://www.fema.gov/media-library/assets/documents/4241
Ibid.
THIRA 2019. See https://www.fema.gov/media-library/assets/documents/181470
Ibid.
See https://training.fema.gov/hiedu/docs/comprehensive%20em%20-%20nga.doc
See https://www.fema.gov/media-library-data/1443799615171-2aae90be55041740f97e8532fc
680d40/National_Preparedness_Goal_2nd_Edition.pdf
See https://www.fema.gov/media-library-data/1527613746699-fa31d9ade55988da1293192f1b18f4e3/CPG201Final20180525_508c.pdf
THIRA 2019.
THIRA 2019. See https://www.fema.gov/media-library/assets/documents/181470
Ibid.
source: Comprehensive Preparedness Guide 101, FEMA.gov, pp. 1-8 and 1-9.
See https://www.dhs.gov/what-dhs-does-during-cyber-attack
Ibid.
See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-CyberAttack_0.jpg
Note that FBI is agency located within US Attorney General’s Office not within DHS.
FBI partners with the Director of National Intelligence and other U.S. intelligence
agencies to collect and analyze intelligence involving terrorism-related offenses.
See https://www.dhs.gov/what-dhs-does-during-explosives-terrorist-attack
See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-A-TerroristIncident.jpg
See https://www.dhs.gov/what-dhs-does-during-major-storms-and-severe-weather-events
58. See https://www.dhs.gov/what-dhs-does-during-pandemics
59. See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-MajorStorm.jpg
60. Ibid.
61. See https://www.dhs.gov/what-dhs-does-during-political-convention
62. See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-Pandemics.
jpg
63. Ibid. https://www.dhs.gov/sites/default/files/images/What%20DHS%20does%20during%20
National%20Conventions%20Slide_4.jpg
64. The Journal of Homeland Security and Emergency Management has its mission to bridge
the gap between the two disciplines.
65. McCreight (2009, 2011), Renda-Tanali (2013) and Kahan (2015).
66. Ramsay and Renda-Tanali (2018); Blanchard (2005); Feldman-Jensen (2017).
1. Mark Lowenthal offers a similar definition, writing that intelligence can be thought about
as the process by which information is gathered, analyzed, and disseminated; the products
of the intelligence community; and the organizations that make up the IC (Lowenthal,
2017, p. 11).
2. For a concise discussion of Kent’s view of intelligence analysis, see Davis (2002).
3. I discuss these three schools in more detail in my book (Dahl, 2013), upon which this
section is drawn.
4. Useful discussions of homeland security intelligence include Burch (2007), Logan (2018)
and Steiner (2015).
1. The so-called “Westphalian System” is a global system of norms predicated on the international legal principle that each nation has sovereignty over its own territory and its own
domestic affairs; that external powers should not interfere in another nation’s domestic
affairs; and that every nation has a similar right to sovereign domestic self-determination
under international law. The doctrine is named after the 1648 Peace Treaty of Westphalia.
2. UNEP (2019).
3. Greta Thunberg (2019).
4. Many people are unaware that simply measuring atmospheric heat buildup is wholly
inadequate for assessing the scope of the problem. According to the IPCC, the oceans
have absorbed more than 90% of the additional trapped heat. This is good for the shortterm atmospheric implications, but very bad for the long-term overall climate change,
fisheries, ocean currents, etc.—since that stored energy will change ecosystem dynamics radically. For a good graph of the IPCC data, see http://www.skepticalscience.com/
graphics.php?g=12
5. Both global warming and climate change beget each other in the end—see, for instance,
Shi, Wang, and Yang (2010). For a thorough timeline of climate change science over the
last 150 years, see Mason (2013) at http://www.skepticalscience.com/history-climatescience.html
6. Previously cautious about tying specific extreme weather to climate, scientists are much
more confident about calculating the weight and import of the connection. See, for
instance, Lloyd and Oreskes (2019).
7. Wicked problems are problems that exhibit the following characteristics: the solution
depends on how the problem is framed, stakeholders vary considerably in how they
define and understand the problem, the constraints and resources available to address
the problem change over time, the problem is never (totally) solved. See Tom Ritchey
(2013), Wicked Problems (Swedish Morphological Society, 2005, revised 2013), http://
www.swemorph.com/pdf/wp.pdf
8. The following sections are adapted from O’Sullivan and Ramsay (2012) and Ramsay and
O’Sullivan (2013).
9. See for example, http://www.cdc.gov/climateandhealth/publications.htm; the Environmental Protection Agency at http://www.epa.gov/climatechange/; and the U.S. Department of Agriculture at http://www.usda.gov/oce/climate_change/.
10. “International security” is also a contested concept, and the most orthodox (Cold
War-era especially) definitions addressed primarily military issues. But many scholars and analysts now advocate far broader definitions that include other, non-military,
threats to the security of nations. For a discussion of this evolving thinking, see Buzan
and Hansen (2009) and Buzan et al. (1998).
11. A review of policies and acts related to the design and production of US national security
varies depending on the context. See, for example, Maier’s (1990) definition: “National
security... is best described as a capacity to control those domestic and foreign conditions
that the public opinion of a given community believes necessary to enjoy its own selfdetermination or autonomy, prosperity and wellbeing”.
12. Adapted from Lanicci, Ramsay, and Murray (2017).
13. This section adapted from Ramsay and O’Sullivan (2013). The reader is also referred to
Ramsay and Renda-Tenali (2018) in the fall issue of the Journal of Homeland Security
and Emergency Management or a more complete treatment of homeland security knowledge domains.
14. See Homeland Security Affairs VI, no. 2 (May 2010) special issue dedicated to homeland security program development. Specifically, Ramsay, Cutrer, and Raffel (2010),
Moore, Hatzodony, Cronin, and Brekenridge (2010), Polson, Persyn, and Cupp (2010)
and Bellavita (2008).
15. Adapted from Ramsay and O’Sullivan (2013).
16. Though if tipping points are reached in sub-Arctic permafrost deterioration, or melting
of deep ocean Arctic frozen methane, this could lead to a rapid, massive “carbon bomb”
that would rival human emissions, according to experts.
17. The seminal article at the time, demonstrating that human carbon emissions were not just
being absorbed by the oceans, was Revelle and Suess (1957).
18. The lighter carbon-12 from fossil fuels burning is contrasted with heavier, natural
carbon-13 (Cook, 2010).
19. Decline in arctic ice keeps breaking records and exceeding the models (USGCRP, 2017;
Vidal, 2012).
20. From O’Sullivan, T. M., & Ramsay, J. (2015). Defining and distinguishing homeland from
national security and climate-related environmental security, in theory and practice.
Journal of Homeland Security and Emergency Management, 12(1), 43–66.
21. Adapted from Ramsay and O’Sullivan (2013).
22. Ibid.
1. In contrast to the rest of the Western nations, all of which have some variation on universal healthcare systems.
2. The 1918–1919 Flu is estimated to have killed between 50 and 100 million people
worldwide.
3. Severe Acute Respiratory Syndrome—Coronavirus, which spread to at least two dozen
countries on 4 continents. https://www.cdc.gov/sars/index.html
4. See for instance Maciosek et al. (2010). Vaccines, for instance, are almost universally cost
effective from a societal perspective, compared to the diseases they prevent.
5. The federally coordinated Laboratory Response Network (LRN) is a network of laboratories that can respond to biological and chemical threats and other public health
emergencies, and now includes state and local public health, veterinary, military, and
international labs. https://emergency.cdc.gov/lrn/index.asp
6. Research funding and support for biomedical and health services exists and is administered through entities such as the National Institutes of Health, the National Science
Foundation, and the CDC.
7. For instance, given a certain situation, a more rural area or state might experience an
overwhelming disaster, where an urban area with better resources would not.
8. https://www.phe.gov/Preparedness/planning/authority/Pages/default.aspx#stafford
9. The lifelines are basic services categories “designed to enable emergency managers, infrastructure owners and operators, and other partners to analyze the root cause of an incident impact and then prioritize and deploy resources to effectively stabilize the lifeline…
This construct maximizes the effectiveness of federally supported, state managed, and
locally executed response.” (FEMA, 2019)
10. See Department of Homeland Security, https://www.dhs.gov/cisa/critical-infrastructuresectors
11. See Delamater et al. (2019) for further discussion of virulence and reproductive rates of
selected pathogens (i.e., Ro).
12. Epidemics are any unusual disease outbreak, and pandemics are epidemics covering
multiple countries or continents.
13. Vectors are disease transmitters such as mosquitoes, flies, fleas, snails, and ticks. Vector-borne
diseases such as malaria, dengue, yellow fever, Chagas disease, leishmaniasis and schistosomiasis account for more than 17% of all infectious diseases, causing more than 700,000
deaths annually. Malaria alone causes up to 400,000 of those deaths. (WHO, 2017)
14. The incubation period is the time between infection of the host and evident manifestations of disease.
15. The following is partially adapted from O’Sullivan (2017).
16. The 1918 Influenza lasted more than 18 months, and passed in a series of waves that went
from weeks to months at a time.
17. Once again, however, nothing compared to the global “lock-downs” that occurred in
virtually every country in the world after SARS-CoV-2, COVID-19 disease appeared.
18. The anthrax attacks were thus dubbed “5/11” by many public health analysts.
19. Zoonotic diseases are those transmitted across species, as happens with avian (bird) or
swine (pig) influenzas that can become infectious to humans. The SARS-COV2 virus was
identified as a bat coronavirus likely transmitted via another animal to humans at one or
more of the live animals “wet markets” in Wuhan.
20. Huang, C., Wang, Y., Li, X., Ren, L., Zhao, J., Hu, Y., ... & Cheng, Z. (2020). Clinical
features of patients infected with 2019 novel coronavirus in Wuhan, China. The Lancet,
395(10223), 497–506.
21. LiveScience Staff (6-March-2020). Coronavirus cases top 100,000: Live updates on
COVID-19. LiveScience. https://www.livescience.com/coronavirus-updates.html?utm_
source=Selligent&utm _ medium=email&utm _campaig n=14899&utm _content=
20200306_LS_Essentials_Coronavirus+-+adhoc+&utm_term=3699115&m_i=Mf2Mi
ExrM9m6gA4rLTkYlHBvVMSB1WUPt02_HwZzvC0hElSMXmSXMRtM2GYQjLRq
YRMxhfbFYoc%2BQbdhtmWAb6a1zYceNAzyMU
22. Daniel Bachman (March 3, 2020). The economic impact of COVID-19 (novel coronavirus).
Deloitte Insights.
23. Andy Sullivan and Richard Cowan (March 6, 2020). After U.S. Congress and Fed’s quick
coronavirus response, next steps likely tougher for Washington. Reuters. https://www.
reuters.com/article/us-health-coronavirus-usa-politics-idUSKBN20T2W5
24. James Hamblin (January 30, 2020). We don’t have enough masks. The Atlantic. https://
www.theatlantic.com/health/archive/2020/01/viral-masks/605761/
25. It went on to note that American policy should be aimed at developing a new plan for
bioweapons proliferation and bioterrorism prevention, emphasizing renewal of the
neglected and insufficient 1972 Biological Weapons Convention (BWC). The Commission
also urged renewed efforts to evaluate domestic sources of dangerous disease agents, and
improved oversight for research labs from which germs might be stolen or accidentally
released (WMD Report, 2008).
26. Such as CRISPR gene editing (Jiang & Doudna, 2017), and high throughput Polymerase
Chain Reaction (PCR) gene copying technologies (NCBI, 2017).
27. Which was criticized because of fears it presented a “how-to” level of published detail.
28. According to the WHO, H5N1 has a mortality rate of about 60%, but a lack of thorough
population sero-surveys of previous exposure in the countries most affected may have
missed subclinical survivors or cases that were missed by the medical system; hence,
the fatality rate could be much higher. See for example: https://www.who.int/influenza/
human_animal_interface/avian_influenza/h5n1_research/faqs/en/
29. Though as one Harvard epidemiology noted, by limiting the research restrictions to the
15 specific agents, would-be bioterrorists could simply work around it by manipulating
other agents not on the list (Akst, 2014b).
1. Consider the laws passed just in the first 12 months, post 9/11: USA PATRIOT Act of 2001,
Pub.L. 107-56, 115 Stat 272 (2001); Homeland Security Act of 2002, Pub. L. No. 107-296,
116 Stat 2135 (2002); Public Health Security and Bioterrorism Preparedness Response
Act of 2002, Pub.L. 177-188, 116 Stat. 594 (2002); The Aviation and Transportation Security Act of 2001, Pub.L. 107-71, 115 Stat. 597(2001); Support Anti-Terrorism by Fostering
Effective Technologies Act of 2002, Pub.L. 107-296, 116 Stat. 2135 (2002); The Critical
Infrastructure Information Act of 2002, 6 U.S.C. §§ 131–134 (2002); The Cyber Security
Enhancement Act of 2002, 6 U.S.C. § 657 (2002); The Maritime Transportation Security
Act of 2002, Pub.L. 107-295, 116 Stat. 2064–2134 (2002); The Terrorism Risk Insurance
Act of 2002, Pub.L. 107-297, 116 Stat. 2322 (2002).
2. See U.S. Constitution, Art VI, §1, cl. 3.
3. “The Senators and Representatives before mentioned, and the Members of the several
State Legislatures, and all executive and judicial Officers, both of the United States and
of the several States, shall be bound by Oath or Affirmation, to support this Constitution;
but no religious Test shall ever be required as a Qualification to any Office or public Trust
under the United States”.
4. See for example The Maritime Transportation Security Act of 2002, 46 U.S.C. § 70102
(2002) (requiring the Secretary of the Department of Homeland Security “to identify
those vessel types and United States facilities that pose a high risk of being involved in a
transportation security incident”.
5. See for example: McCulloch v. Maryland, 17 U.S. (4 Wheat.) 316 (1819) Chisholm v.
Georgia, 2 U.S. (2 Dall.) 419 (1793); Martin v. Hunter’s Lessee, 14 U.S. (1 Wheat.) 304
(1816).
6. Note that spelling and grammar as used in the US Constitution have been preserved.
7. The 10th Amendment to the US Constitution provides that: “The powers not delegated
to the United States by the Constitution, nor prohibited by it to the States, are reserved
to the States respectively, or to the people”. U.S. Const. amend. X.
8. Without the power of the purse, that is, the ability to raise revenues to fund a military
expedition, the power to declare war is almost meaningless. An oft-noted example of the
frailty of the central government was its inability to timely seat a quorum to ratify the
Treaty of Paris, marking its independence or to pay the expense of sending the ratified
treaty to England. See, e.g., U.S. Code 1952 Edition, Articles of Confederation—1777.
9. The implied powers of Congress were first recognized by the US Supreme Court in
McCulloch v. Maryland, 17 U.S. 316 (1819).
10. 18 U.S.C. §§ 2701–2712 addresses voluntary and compelled disclosure of “stored wire and
electronic communications and transactional records” held by third-party internet service providers. It was enacted as Title II of the Electronic Communications Privacy Act
of 1986.
11. “All legislative powers herein granted shall be vested in a Congress….” U.S. Const. art. 1, § 1.
12. Congress, through the Taft-Hartley Act, had created a mechanism to resolve such labor
disputes, which would have prevented the ensuing United Steel Workers Union strike.
13. See discussion of the Insurrection Act.
14. Unfortunately, the Court also included a poorly phrased methods-based caveat to the
test, adding “at least where (as here) the technology in question is not in general public
use”.
15. The Maxwell decision will seem quaint today in its discussion of the applicable technology. But the Court’s continuing struggle, well-demonstrated in this case, to balance the
4th Amendment promise of a reasonable expectation of privacy with law enforcement
needs to combat technology-facilitated crimes may serve as the basis of another case
study. The Court’s application of the “Third Party Doctrine”, finding no reasonable
expectation of privacy in data held by a third party, should be explored simultaneously.
See Smith v Maryland, 442 U.S. 735 (1979), and Carpenter v. United States, 138 S.Ct.
2206 (2018).
16. While the Fifth Amendment is directed at the federal government, the Fourteenth
Amendment has a parallel limitation on state and local governments, also requiring that
an act by the government against its people must be undertaken with due process of law.
17. The U.S. Supreme Court case in Plyer v. Doe, involved the State of Texas’ revision of its
laws to exclude the children of undocumented immigrants from being eligible to attend
K-12 school. The Court held that the children of undocumented immigrants are “people”
as stated in the 14th Amendment, and under the Equal Protection clause one’s immigration status is not a sufficient rational basis for denying benefits afforded to other residents.
18. DoDD 5525.5, DoD Cooperation with Civilian Law Enforcement Officials.
1. That is, even though it may not draw a profit itself, cybersecurity can help lessen the
likelihood of an incident and can help mitigate the harm/costs that could result from an
incident.
2. Rules have also been established to deter cybercrime behavior, but these laws are not
central to maintaining confidentiality, integrity, availability, or resilience; such aspects of
our criminal and civil code are not discussed in this chapter. It should be noted that such
rules generally prohibit the security concept of “hacking back” by victim organizations
against a perceived aggressor (Cook, 2018).
3. Rather, most national governments outlaw other countries’ intelligence operations on
domestic soil. This is a matter of national law, not international law.
4. Although the title invokes an emphasis on critical infrastructure, this framework is suitable for all types of organizations, from businesses to non-profits to government agencies.
NIST also provides some more particularized framework guidance for certain sectors,
such as manufacturing, and for organizations concerned about the security and resilience
of industrial control systems.
1. Unless otherwise cited, the information contained in section 14.4.5 (Non-Competitive
and Unconstrained Biometrics) derives from the personal involvement of the author in
technology-development initiatives for DHS. See the National Institute of Standards and
Technology (2019) Chexia Face Recognition webpage listed in this chapter’s reference
section for additional resources on this topic.