Academia.eduAcademia.edu

Theoretical Foundations of Homeland Security

In the two decades since 9/11 the United States has been forced to deal in a new area of public policy-Homeland Security-that lies between two heretofore well understood areas-National Security and Law Enforcement. National Security dealt with threats from abroad while Law Enforcement, or more broadly public safety, dealt with internal threats. Both were underpinned with ample theory. In the rush to 'do something about' Homeland Security there has been precious little intellectual capital spent on developing the needed theoretical underpinnings. In Theoretical Foundations of Homeland Security: Strategies, Operations and Structures, Ramsay, Cozine, and Comiskey have done this labor for us, in a readable and well thought out explication of the theory that should support such a broad integrated effort at all levels of government, including the private sector, including academia".

“In the two decades since 9/11 the United States has been forced to deal in a new area of public policy – Homeland Security – that lies between two heretofore well understood areas – National Security and Law Enforcement. National Security dealt with threats from abroad while Law Enforcement, or more broadly public safety, dealt with internal threats. Both were underpinned with ample theory. In the rush to ‘do something about’ Homeland Security there has been precious little intellectual capital spent on developing the needed theoretical underpinnings. In Theoretical Foundations of Homeland Security: Strategies, Operations and Structures, Ramsay, Cozine, and Comiskey have done this labor for us, in a readable and well thought out explication of the theory that should support such a broad integrated effort at all levels of government, including the private sector, including academia”. —Barry Zulauf, Professor of Applied Intelligence at Georgetown University, and President of IAFIE “Theoretical Foundations of Homeland Security: Strategies, Operations and Structures stands as one of the most significant contributions to the scholarship of homeland security studies. In developing the first-ever homeland security textbook specifically dedicated to theory; Ramsay, Cozine, and Comiskey have set a solid foundation upon which future scholars of this emerging discipline can build. In every regard, this textbook skillfully sets out and explains the related theories that have contributed to the emergence and evolution of the homeland security enterprise— ultimately forming the basis for an integrated theory of homeland security. This book is a must for inclusion in any homeland security or related academic program and also serves as a valuable tool for practitioners in the field”. —Kelly W. Sundberg, Mount Royal University, Fellow, Canadian Global Affairs Institute, Former Senior Policy Officer with the Ministry of Public Safety Canada, Citizenship and Immigration Canada Investigator, and Canada Border Services Agency Inland Enforcement Officer “Theoretical Foundations of Homeland Security: Strategies, Operations and Structures is an extremely useful book and an essential contribution to the debates about the concept of Homeland Security; a concept that is more than the sum of its parts - national security and internal security. The individual contributions offer up invaluable insights into the various aspects of Homeland Security and, taken together, provide an understanding of the concept that is both broad and deep. This book will be an indispensable resource for academics, students, and policymakers alike”. —David Strachan-Morris, Lecturer in Intelligence and Security, University of Leicester, UK “Theoretical Foundations of Homeland Security: Strategies, Operations and Structures takes on the mammoth challenge of developing a grand theory of homeland security. In a single volume, the book presents basic theoretical frameworks from more than a dozen disciplines that contribute to an understanding of contemporary and future homeland security problems. The text will offer unique value to college courses that seek to integrate practical and conceptual approaches to homeland security”. —Chris Bellavita, Director of Programs for the Naval Postgraduate School’s Center for Homeland Defense and Security “Theoretical Foundations of Homeland Security: Strategies, Operations and Structures is a recognition that acceptable levels of security can vary over time and across nations, depending upon a variety of factors. I saw this first-hand just within my three years as U.S. Secretary of Homeland Security. ‘Security’ as we know it is in reality a continuing effort to strike the right balance between the public’s basic physical security on the one hand and the preservation of the public’s basic freedom and privacy on the other. Those in public safety are the guardians of one as much as the other”. —Jeh Charles Johnson, Partner Paul, Weiss, Rifkind, Wharton & Garrison LLP, and former Secretary, US Department of Homeland Security “We live at a historic juncture as old notions of threat and security ring hollow and new paradigms must be currently found. Ramsay, Cozine and Comiskey’s ambitious book aims to do just that. By drawing on the established understanding in different areas of scholarship the authors masterfully redefine the field of homeland security for in the twenty first century. This is much more than a theoretical primer for students and neophytes. This volume will prove invaluable even to seasoned scholars and practitioners in the field”. —Allon J. Uhlmann and Stephen McCombie, Department of Security Studies and Criminology, Macquarie University, Australia Theoretical Foundations of Homeland Security This new textbook outlines the main theories and concepts from a variety of disciplines that support homeland security operations, structures and strategies. Following the terrorist attacks of September 11th, “homeland security” (HLS) grew in importance within the U.S. government (and around the world) and matured from a concept discussed among a relatively small cadre of policymakers and strategic thinkers to a broadly discussed issue in Congress and society with a growing academic presence. Yet the ability to discern a theory of homeland security that would support overall security strategy has been more elusive to both scholars and policymakers. This textbook aims to elucidate a grand theory of homeland security by leveraging the theoretical underpinnings of the disciplines that comprise the strategies, operations and structures of the HLS enterprise. In this way, each chapter contributes to a grand theory of homeland security as it explores a different discipline that influences or supports a domain of the homeland security enterprise. These chapters cover intelligence systems, terrorism origins and ideologies, emergency management, environmental and human security, cybersecurity policy, crime and security, global governance, risk management, public health, law and policy, technology, interagency collaboration and the sociology of security. This book will be essential reading for students of Homeland Security and Emergency Response, and recommended reading for students of terrorism, intelligence, cybersecurity, risk management and national security. James D. Ramsay is a professor of Security Studies and coordinator of the Homeland Security Program at the University of New Hampshire, the United States. He is also founding chair of the Department of Security Studies. Keith Cozine is an associate professor and director of the doctoral program in Homeland Security at St. John’s University, the United States. He has a decade and a half of law enforcement and intelligence experience including nearly ten years with the U.S. Department of Homeland Security. John Comiskey is an associate professor of Homeland Security at Monmouth University, the United States. He is a retired New York City Police Department Lieutenant and U.S. Coast Guard Senior Chief Petty Officer. Theoretical Foundations of Homeland Security Strategies, Operations, and Structures Edited by James D. Ramsay, Keith Cozine, and John Comiskey First published 2021 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN and by Routledge 52 Vanderbilt Avenue, New York, NY 10017 Routledge is an imprint of the Taylor & Francis Group, an informa business © 2021 selection and editorial matter, James D. Ramsay, Keith Cozine, and John Comiskey; individual chapters, the contributors The right of James D. Ramsay, Keith Cozine, and John Comiskey to be identified as the authors of the editorial material, and of the authors for their individual chapters, has been asserted in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data Names: Ramsay, James D., editor. | Cozine, Keith, 1972- editor. | Comiskey, John, 1964- editor. Title: Theoretical foundations of homeland security : strategies, operations, and structures / edited by James D. Ramsay, Keith Cozine, and John Comiskey. Description: Abingdon, Oxon ; New York, NY : Routledge, 2021. | Includes bibliographical references and index. Identifiers: LCCN 2020032411 (print) | LCCN 2020032412 (ebook) | ISBN 9780367201692 (hardback) | ISBN 9780367201708 (paperback) | ISBN 9780429259920 (ebook) Subjects: LCSH: United States. Department of Homeland Security. | Terrorism--United States--Prevention. | Terrorism--Prevention--Government policy--United States. | National security--United States--Management. Classification: LCC HV6432.4 .T44 2021 (print) | LCC HV6432.4 (ebook) | DDC 363.325/15610973--dc23 LC record available at https://lccn.loc.gov/2020032411 LC ebook record available at https://lccn.loc.gov/2020032412 ISBN: 978-0-367-20169-2 (hbk) ISBN: 978-0-367-20170-8 (pbk) ISBN: 978-0-429-25992-0 (ebk) Typeset in Times by KnowledgeWorks Global Ltd. To all those who promote and defend liberty around the globe. Contents List of figures List of tables List of contributors Foreword Acknowledgements List of abbreviations Glossary 1 Introduction to security theory xi xiii xiv xvi xix xxi xxiv 1 JAMES D. RAMSAY, KEITH COZINE AND JOHN COMISKEY 2 Risk assessment and the homeland security enterprise 16 BRIAN HARTE 3 The sociology of security 38 TERRENCE O’SULLIVAN 4 Crime and security 58 CHELSEA A. BINNS 5 Terrorism: origins, ideologies and goals 78 KYLE W. MCDONNELL AND KEITH COZINE 6 Interagency collaboration 99 JOHN COMISKEY 7 Emergency management—theories of preparedness, mitigation, response and recovery IRMAK RENDA-TANALI 121 x Contents 8 Global governance and the relationships between nations 148 KEITH COZINE 9 Intelligence and the theory of preventive action 168 ERIK J. DAHL 10 Human and environmental security theory 187 JAMES D. RAMSAY AND TERRY O’SULLIVAN 11 Public health security 208 TERRENCE M. O’SULLIVAN AND JAMES D. RAMSAY 12 Homeland security law and policy theory 231 MICHAEL MCDANIEL 13 Cybersecurity policy and theory 257 MAEVE DION 14 Theoretical underpinnings of homeland security technology 285 MICHAEL D. LARRAÑAGA AND PATRICK K. SMITH Index 307 Figures 2.1 2.2 2.3 2.4 6.1 6.2 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 Severity of event’s impact-decision matrix. Estimating the impact of an event utilizing probability and impact indicators. Global risk profile. COSO enterprise risk management cube. The US DHS logo. US federal government interagency collaborations regarding climate change. The aftermath of the Johnstown Flood. “Ruins from Site of the Hulburt House”. In: “History of the Johnstown Flood”, by Willis Fletcher Johnson, 1889, p. 181. Library call number M79.4 J71h. 1889 June. Photographer: Archival photograph by Mr. Steve Nicklas, NOS, NGS. Image source: Flickr.com Galveston, Texas hurricane devastation and destruction, image source: pixabay.com The great dust bowl, image source: pixabay.com Washington, D.C. World War II memorial. Image source: pixabay.com Flooding after Hurricane Betsy, 1965, Image source: flickr.com Days after Sep. 11 terrorist attacks, fires still burn amidst the rubble of the World Trade Center. U.S. Navy photo by Photographer’s Mate 2nd Class Jim Watson. (RELEASED) Source: flickr.com FEMA leadership organizational structure. Image source: FEMA Organizational chart of DHS and FEMA’s position. Image source: DHS National preparedness system, Source: FEMA Aerial views of the damage caused by Hurricane Sandy to the New Jersey coast taken during a search and rescue mission by 1-150 Assault Helicopter Battalion: New Jersey Army National Guard: Oct. 30: 2012. (U.S. Air Force photo by Master Sgt. Mark C. Olsen/Released) Source: Wikimedia 29 30 31 33 101 106 123 124 124 125 126 129 130 130 133 134 xii Figures 7.11 7.12 7.13 7.14 7.15 10.1 10.2 10.3 11.1 11.2 14.1 Cyber-attack. Source DHS.gov Explosives terrorism attack. Source: DHS.gov Major storms/severe weather event, source: DHS.gov Pandemics, source: DHS.gov National political conventions, source: DHS.gov Theoretical example of how environmental security may be tied to national security Relationships between homeland, national and environmental security. General structure of the environmental security construct, drivers and consequences Infectious disease triangle, Terrence M. O’Sullivan, adapted from CDC (2012) Medical Countermeasures (MCMs) used for Public Health Emergency/Disaster Response (graphic by FDA, 2019) Technology acceptance model (TAM) 139 140 141 141 142 193 197 199 210 212 292 Tables 6.1 7.1 7.2 7.3 10.1 11.1 14.1 Homeland security focusing events Hazard types based on originating source, Source: CPG 101, p. 1-8 Sample List of hazards based on originating source, Source: CPG 101, p. 4-10 FEMA’s current definition of key planning areas Suspected knowledge domains of homeland security CDC select category a bioagents and public health characteristics Capability domains and priorities 102 135 135 137 193 223 296 List of contributors Editors James D. Ramsay, Ph.D. is a full professor of security studies, coordinator of the Homeland Security program and founding chair of the department of security studies at the University of New Hampshire. Current research interests include climate security; homeland security theory, cyber-intelligence; and the relationship between environmental and human security and national security strategy. Keith Cozine, Ph.D. is an associate professor of Homeland Security at St. John’s University in Queens, NY. He earned an M.A. in Criminal Justice and Ph.D. in Global Affairs, both from Rutgers University. In addition, Dr. Cozine has nearly a decade and a half of law enforcement and intelligence experience. John Comiskey, Ed.D. is an associate professor of Homeland Security at Monmouth University. He is a retired NYPD Lieutenant and US Coast Guard Reserve Intelligence Officer. Current research includes climate security, homeland security theory, homeland security education and mass shootings. Contributors Chelsea Binns, Ph.D., is an assistant professor at John Jay College of Criminal Justice. She is the author of Fraud Hotlines: Design, Performance & Assessment (CRC Press), editor of The Art of Investigation (Routledge) and an expert in security & investigations who has a Ph.D. in Criminal Justice from the CUNY Graduate Center. Erik J. Dahl, Ph.D. is an associate professor of national security affairs at the Naval Postgraduate School in Monterey, California, and the author of Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond (Georgetown University Press, 2013). He is Chair of the Intelligence Studies Section of the International Studies Association. Maeve Dion, J.D. teaches cybersecurity and homeland security at UNH, where she directs the online M.S. in Cybersecurity Policy and Risk Management. Professor Dion specializes in the legal, policy and educational issues relating to cybersecurity and organizational resilience. Over the past two decades, she has supported efforts of the EU, COE, OECD, NATO CCDCOE; DHS, DOD, NSTAC, and ABA, among others. List of contributors xv Brian K. Harte, Ph.D. is a full professor of Homeland Security and Criminal Justice at St. John’s University. He formerly served as a probation administrator in the state of Texas. Currently, he serves as the Master of Professional Studies in Homeland Security and Criminal Justice Leadership Program Director at St. John’s University. Michael D. Larrañaga, Ph.D. is President of R.E.M. Risk Consulting, a science-based risk management firm. He has served as an appointed member of the Board of Scientific Counselors for the CDC’s National Institute for Occupational Safety and Health and the DHS First Responders Group. He is an innovation scholar and cofounder of the Center for Homeland Defense and Security’s HSx Advanced Thinking in Homeland Security initiative. Brigadier General (ret.) Michael McDaniel, J.D. is Associate Dean at Western Michigan University-Cooley Law School, Director of the Master of Laws in Homeland and National Security Law program and a tenured professor of Constitutional Law. He previously served as the Deputy Assistant Secretary of Defense for Homeland Defense Strategy and as Michigan’s first Homeland Security Advisor. McDaniel has a B.A. from St. Bonaventure University, a J.D. from Case Western Reserve University, and graduate degrees in security studies from the Army War College and the Naval Postgraduate School. Kyle W. McDonnell, M.P.S. is currently a senior project manager assigned to the NYPD’s Project Management Office (PMO), and an adjunct assistant professor at St. John’s University. He has served on active duty in the United States Army. He received his bachelor’s degree from LIU Post, his master’s degree in Criminal Justice Leadership & Homeland Security from St. John’s University and is currently a doctoral candidate in the St. John’s University’s Homeland Security Doctoral Program. Terry O’Sullivan, Ph.D., is an associate professor in the University of New Hampshire’s Security Studies program. His teaching, research and publications concentrate on domestic and international security studies, broadly writ—including pandemic disease, the climate crisis, community disaster resilience, terrorism, weapons of mass destruction, and the theoretical, policy and practice-level integration of homeland security and other security frameworks. Irmak Renda-Tanali, Ph.D. is a senior disaster risk specialist at the Pacific Disaster Center of the University of Hawaii. She specializes in risk assessment of natural and human-induced disasters. She has over 20 years of experience in researching, consulting and teaching in the emergency management field. She holds a doctoral degree in engineering management from George Washington University. Patrick K. Smith, Ph.D. is a partner with R.E.M. Risk Consultants. His expertise is technology innovation, continuous improvement, energy management and risk management in a variety of settings. Patrick has a background in data analytics and management information systems with experience managing and analyzing large data sets. Dr. Smith was previously a DHS Science, Technology, Engineering and Mathematics Fellow at Oklahoma State University. Foreword By Paul Stockton As a curriculum and field of research, homeland security rests on an enduring puzzle. What does homeland security comprise? In contrast to traditional graduate-level disciplines, such as biology or engineering, homeland security lacks a system of accreditation that rests on an agreed set of curricular requirements and learning outcomes. The absence of such accreditation reflects a deeper problem. Through innovation and constant revision, graduate and undergraduate programs in homeland security are still developing an agreed set of core principles and distinctive methodologies. By providing a grand theory of homeland security, this book is structured to advance consensus-building on the meaning of homeland security and the education and research components at its heart. The shifting priorities within and between homeland security programs reflect the abrupt changes in the practice of homeland security at all levels of government and— increasingly—by the owners and operators of critical infrastructure. The National Defense Panel’s 1997 report on “Transforming Defense: National Security in the 21st Century” helped coin the terms “Homeland Defense” and “Homeland Security”. That report exclusively focused on responding to terrorism and did not mention the emergency management or public safety requirement for preparedness against natural disasters. 9/11 sharpened and institutionalized that focus. As stated by the National Strategy for Homeland Security of 2002, homeland security comprises “a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur”. Hurricane Katrina in 2005 drove a fundamental rethinking of that emphasis. With the Post-Katrina Emergency Reform Act and subsequent initiatives, legislators, homeland security practitioners and their partners brought emergency management and public safety priorities into the core of the emerging discipline. Superstorm Sandy (2012) and Hurricane Maria spurred an equivalent expansion of the field to include the resilience of the electric grid and other critical infrastructure sectors, as well as associated expertise in engineering and incident response possessed by owners and operator of those systems—not government agencies. That evolution continues today. The COVID-19 pandemic is prompting a deep rethinking of supply chain resilience, catastrophic threats to public health, business continuity and a range of other education and research topics that forward-looking curricula must now embrace. Manmade threats must drive further changes. The Fourth Edition of the National Response Framework (2019) emphasized the need for preparedness efforts to support Foreword xvii US national security, including against nation state threats that possess capabilities dwarfing those of Al Qaeda or any other terrorist organization. Accordingly, the Framework (NRF) emphases the need to “help maintain essential services for critical national security installations” and other initiatives that have never before been a priority of homeland security. And all such changes, including those that should be considered for inclusion in homeland security curricula, must account for rise of cyber threats to US infrastructure and the emergence of information warfare against US citizens as the “new normal”. Without a guiding theoretical framework, homeland security is at risk of becoming an ever-changing grab bag of education and research priorities. That trend comes at a cost. We need an educated cadre of future homeland security leaders who can not only respond to threats of today but are also prepared to meet challenges that cannot be foreseen. The US National Preparedness Goal provides a starting point to identify the core requirements for developing such a cadre. The Goal calls for “A secure and resilient Nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk”. Helping fulfill that goal will require the development of shared expertise in specific methodologies—for example, risk-based analysis and data analytics. The diversity of threats confronting the United States will also require homeland security curricula to be multidisciplinary, and encompass emergency management, public health and safety, and a range of other disciples with their own deep roots for education and professional development. Maturing homeland security as an academic field will require new approaches to integrate these disparate parts into a coherent whole. That is, to truly become a profession, the discipline needs an organizing theoretical framework. This volume argues that such a framework should accomplish four goals: (1) it should guide and predict research on best practices and strategies to protect the nation; (2) the theory must support curriculum development; (3) it must explain how the disciplines that comprise the homeland security enterprise support and contribute to its mission; and (4) it must build upon the solid and progressive foundation already established in academic homeland security, which has been led by the Center for Homeland Defense and Security’s University and Agency Partnership Program (UAPP). At the time this text is set to be published, the Department of Homeland Security will be 18 years of age, and academic homeland security roughly 15 years of age. As the homeland security enterprise has matured, so has its corresponding academic component. For example, as of 2019, UAPP lists around 460 homeland security-related academic programs, including programs at the Associate, Bachelor, Masters and Doctoral levels. While several programs started as new programs, many others were merely extensions of existing programs in criminal justice or emergency preparedness. Since homeland security does not yet enjoy recognized accreditation, there has not been a set of learning outcomes shared across all homeland security programs as there is in medicine, law, engineering, nursing, etc. However, recent scholarship in this area indicates that degree programs tend to leverage a common set of knowledge domains including risk management, emergency management, terrorism, intelligence, strategic planning, law and policy, environmental and human security to name a few. Further, significant progress has been made in the development of a body of knowledge including journals dedicated to basic and applied research, the scholarship of teaching and learning, as well as resilience. Supporting development of scholarship, education, xviii Foreword networking and ideation, several annual conferences such as the Homeland Security Education Summit sponsored jointly by FEMA and the UAPP as well as FEMA’s Emergency Management Higher Education Symposium are held each year. An established theoretical foundation, an established common curriculum and a research agenda must be aligned to professionalize a discipline. In this way, homeland security can learn from medicine. Indeed, the parallels between how medicine grew and matured as a discipline and how it became a sovereign profession are already visible in homeland security. Consider that both homeland security and medicine share several characteristics. For example, modern medicine is complex and dynamic and is a composite of many disciplines such as anatomy, physiology, toxicology, chemistry, physics, biochemistry, psychology, epidemiology, to name a few. Not only does such a structure support the medical curriculum, it supports and guides research that optimizes best practices, strategies, and healthcare structures. And not surprisingly, theories of health and medicine contain elements from several disciplines. Indeed, advancements in component disciplines often find applications in medicine such as advancements in physics created MRI and PET scanners, while advancements in biochemistry have improved chemotherapy. Theoretical Foundations of Homeland Security: Strategies, Operations and Structures posits a grand theory of homeland security that will help the discipline professionalize. Ultimately, this volume is timely, necessary and meets a critical need in the growth and professional development of the homeland security discipline. I hope you enjoy it, learn from it and are empowered to advance the discipline as we continue to work together to protect the nation. Paul N. Stockton is the Managing Director of Sonecon, LLC. Before joining Sonecon, he served as the Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs from May 2009 until January 2013. Acknowledgments Anytime one endeavors to produce a complex product of high quality, one of the first things one notices is that they are going to need a great deal of help and support. This volume represents such a product. Theoretical Foundations of Homeland Security: Strategies, Operations and Structures has been years in the making. From initial talks with friends, to conference presentations and debate among colleagues, this book represents the cumulative expression of years of scholarship, debate and discourse. Interestingly, one of the complicating factors in producing this book was that it is somewhat the first of its kind. Establishing a grand theory of homeland security has been difficult in the past because of the nature of the discipline. Every aspect of the homeland security enterprise that enables it to function in a dynamic, interconnected world is also the leading prohibitor to a theory of what it is and how it works. Indeed, it would appear as though homeland security is a metadiscipline, that is a discipline of disciplines. It was logical for us, therefore, to enlist the help and support of scholars, practitioners and academics to contribute the individual components that together and collectively synergize into the strategies, operations and structures that represent homeland security. Toward this end, we would like to extend our heartfelt gratitude to Routledge for believing in this effort early on, to our contributing authors who labored long and hard to produce draft after draft and who were writing about a discipline in which they are experts, but who were attempting to create a chapter that blends with and mutually supports the other chapters, that together comprise the wholeness of homeland security. Specifically, we would like to thank Brian Harte for his expertise and vision in risk management, Terry O’Sullivan for his ability to focus the broad field of sociology in a way that supports homeland security strategy, for Chelsea Binns for recognizing just how criminology supports the mission of homeland security, for Kyle McDonnell who with Keith Cozine, was able to distill terrorism into digestible parts that illustrate its role in protecting the homeland, to Irmak Renda-Tanali for her keen insights into emergency management and her ability to tease out where emergency management synergizes with homeland security, and how its mission supports the practice of homeland security, to Erik Dahl for his insightful grasp of the intelligence discipline and how theories of intelligence work to support homeland defense and security, to Mike McDaniel who had the incredibly arduous task of explaining the role law and policy have in homeland security, to Maeve Dion for creating a compelling explanation of what cybersecurity is, and how the laws, and policies that define it are critical to homeland security, and finally to Mike Larrañaga and Patrick Smith for developing xx Acknowledgments a novel and innovative approach to our understanding of the role technology play in supporting how institutions and agencies work to protect its citizens. Next, we would like to extend our gratitude to our colleagues who gave us insightful comments and course corrections, to Chris Bellevita who forever asks “what is your claim and why should we believe you”, to Steve Recca for indulging and supporting the national conversation and debate over what may or may not be a theory of homeland security, to Linda Kiltz for inspiring us to a higher level of thought and who facilitates our ability to connect homeland security to other critical disciplines on which the enterprise depends, and to Paul Stockton who provides unparalleled perspective and insights into this discipline. Last but never least, we would like to thank our families for listening to us “think aloud”, for supporting us when things were not working well, for encouraging us to carry on and for just always being there. We sincerely hope you find this book of value, and we would welcome feedback and dialog as we continue to define, refine the discipline we love and ultimately to make the world a safer, more secure and happier place. Happy reading! James, Keith and John List of abbreviations AI APT ARPANET AST CC CDC&P CHDS CIA CISA COSO CPG CPTED CRS CTA DARPA DHS DOD DOI DOJ EOP EPA ERM ES EU FBI FEMA FINDER FRG FTC GAO GDP GHG HIPAA HLS HSIB ICAO Artificial Intelligence Advanced Persistent Threats Advanced Research Projects Agency Network Adaptive Structuration Theory Climate Change Centers for Disease Control and Prevention (aka CDC) Center for Homeland Defense and Security Central Intelligence Agency Cybersecurity and Infrastructure Security Agency Committee of Sponsored Organizations Comprehensive Preparedness Guide Crime Prevention through Environmental Design Congressional Research Service Clandestine Transnational Actor Defense Advanced Research Projects Agency U.S. Department of Homeland Security U.S. Department of Defense Diffusion of Innovation Theory U.S. Department of Justice Emergency Operations Plan(ing) U.S. Environmental Protection Agency Enterprise Risk Management Environmental Security European Union Federal Bureau of Investigation Federal Emergency Management Agency Finding Individuals for Disaster and Emergency Response First Responders Group U.S. Federal Trade Commission Government Accountability Office Gross Domestic Produce Greenhouse Gas(es) Health Insurance Portability and Accountability Act of 1996 Homeland Security Homeland Security Industrial Base International Civil Aviation Organization xxii List of abbreviations ICC Interagency Collaborative Capacity ICE U.S. Immigration and Customs Enforcement ICS Incident Command System IOCS-CERT Industrial Control Systems Cyber Emergency Response Team IGO International Governmental Organizations IMC Interagency mechanisms for collaboration IoT Internet of Things IPCC Intergovernmental Panel on Climate Change IR Incident Response ISIS Islamic State in Iraq and Syria ISO International Organization for Standardization IT Information Technology JIOCS Joint Intelligence Operations Centers JTTF Joint Terrorism Task Force LDC Less Developed Country(ies) MDC More Developed Country(ies) NAPA National Academy of Public Administration NCCIC National Cybersecurity and Communications Integration Center NCPC National Crime Prevention Council NCMEC National Center for Missing and Exploited Children NERC North American Energy Reliability Corporation NGA National Governors Association NGO Non-governmental Organization NIH U.S. National Institute of Health NIMS National Incident Management System NIST U.S. National Institute of Standards and Technology NIST-CSF National Institute of Standards and Technology-Cybersecurity Framework NOAA National Oceanic and Atmospheric Administration NRCC National Response Coordination Center NRF National Response Framework NTRO National Terrorism Response Objectives NYPD New York City Police Department ODNI Office of the Director of National Intelligence PCCIP President’s Commission on Critical Infrastructure Protection PCI-DSS Payment Card Industry Data Security Standard PDD Presidential Disaster Declarations PPD Presidential Policy Directive PEU Perceived Ease of Use PII Personally Identifiable Information PPD Presidential Policy Directive QDR Quadrennial Defense Review REDOPS Response and Defeat Operations Support RIC-M Radio Internet-Protocol Communications Model RRCC Regional Response Coordination Centers SARP Standards and Recommended Practices SAPBER Semi-Autonomous Pipe Bomb End Cap Remover SBIR Small Business Innovation Research List of abbreviations SMART Social Media Analytics and Reporting Toolkit SMT Social Movement Theory SNA Social Network Analysis SNRA Strategic National Risk Assessment STR Socio-Technical Systems Theory SSA Sector-Specific Agency TAM Technology Acceptance Model TAN Transnational Advocacy Networks THIRA Threat and Hazard Identification and Risk Assessment TSA U.S. Transportation Security Administration UN United Nations UTAUT unified theory of acceptance and use of technology USGCRP U.S. Global Change and Research Program VUCA volatile, uncertain, complex, and ambiguous WLFF-APPS Wildland Firefighter Advanced Personal Protective System xxiii Glossary1 Adaptation in human systems, the process of adjustment to actual or expected climate and its effects, in order to moderate harm or exploit beneficial opportunities. In natural systems, the process of adjustment to actual climate. All-hazards approach is a risk-based, integrated approach to emergency preparedness planning that focuses on capacities and capabilities that are critical to preparedness for a full spectrum of emergencies or disasters, including internal emergencies, terrorism, natural or man-made disasters. Anthropogenic resulting from or produced by human activities. For example, anthropogenic climate change (aka global warming) refers to changes in the earth’s climate due to human activities that produce emissions (i.e., greenhouse gases) that in turn warm the earth. Balance of Power the theory that security is enhanced when military capabilities are distributed so that no one state is strong enough to dominate all others. If one state gains too much power in relation to its neighbors, the theory predicts that it will take advantage of its strength and attack those weaker neighbors, thus providing an incentive for those threatened to unite in a defensive coalition. Bilateral Agreement an agreement where one state cooperates or enter into a formal arrangement with another state in return for some sort of preferential treatment. Bounded rationality logic that leads to decisions or actions within a broad sense within one part of a system, but which may not be reasonable within a broad context or when seen as a part of a wider system. Carbon neutrality achieving net zero carbon dioxide emissions at a global scale through the balance of residual carbon dioxide emissions with the same amount of carbon dioxide removal. Clandestine Transnational Actors (CTAs) non-state actors, operating across national borders in violation of law and evading law enforcement efforts. Climate is in a narrow sense usually defined as the average weather, or more rigorously, as the statistical description in terms of the mean and variability of relevant quantities over a period ranging from months to thousands or millions of years. Climate change refers to a change in the state of the climate that can be identified (e.g., by using statistical tests) by changes in the mean and/or the variability of its properties and that persists for an extended period, typically decades or longer. Climate change may be due to natural internal processes or external forcings such as modulations of the solar cycles, volcanic eruptions and persistent anthropogenic changes in the composition of the atmosphere or in land use. Glossary xxv Cognitive Dissonance a state of conflict or discomfort—dissonance—that happens when strongly held beliefs, emotions or assumptions are contradicted by new information that motivates someone to either convince themselves the new information does not exist, or to explain it away in order to relieve the emotional tension caused. Collaborative Federalism an approach to homeland security which contends that homeland security is a national problem that requires national solution. Congress and its executive agent, the Department of Homeland Security (DHS), should provide leadership and appropriate funding. DHS should be an agent of subnational levels of government, and states and local governments should collaborate with jurisdictions both vertically and horizontally. Conflict Theory social science theory that contends friction in the modern world has to do with a clash of the “old ways” versus the on-going march toward modernity and increased globalization. The preservation of traditional ways of life is often diametrically opposed to the rapidity of modernization, which has ultimately been sped up by the break-neck pace of technological advancement. Consequence the effect of an event, incident or occurrence. Consequence Assessment the product or process of identifying or evaluating the potential or actual effects of an event, incident or occurrence. Consequence Management include measures to protect public health and safety, restore essential government services and provide emergency relief to governments, businesses and individuals affected by the consequences of terrorism. Constructivism the classic international relations theory that asserts that the structures of human association are determined primarily by shared ideas rather than material forces, which is often referred to as an idealist approach to social life; and that the identities and interests of purposive actors are constructed by these shared ideas rather than given by nature, which is seen as holistic or structuralist approach that emphasizes the power of social structure as opposed to individualism. Crime Prevention Through Environmental Design (CPTED) the criminology concept that asserts that effective use of the “built environment” can lead to reduced crime and increased quality of life. It contends that properly designed spaces with surveillance opportunities, boundaries and a positive image discourage crime. Criminology the scientific study of crime that examines the people who commit crime, explores the reasons why they commit crime, the ways they can be stopped from committing crime and how society responds to this crime. Criticality the importance to a mission or function, or continuity of operations. Criticality Assessment the product or process of systematically identifying, evaluating and prioritizing based on the importance of an impact to mission(s), function(s) or continuity of operations. Cybersecurity includes the protection of information and computer and data processing infrastructure and operating systems from harmful interference from malicious actors (criminals, terrorists, pranksters). It thus involves not only national defense and homeland security but also law enforcement. Deepfake is a technology that uses AI to produce or edit contents of a video or an image to show something that may never have happened or did happen but in a different context. xxvi Glossary Defensible space the criminology theory that crime can be controlled through the design and structure of the environmental and can be addressed through a variety of security design concepts. Disaster any severe alterations in the normal functioning of a community or a society due to hazardous physical events interacting with vulnerable social conditions, leading to widespread adverse human, material, economic or environmental effects that require immediate emergency response to satisfy critical human needs and that may require external support for recovery. Economic Consequence effect of an incident, event or occurrence on the value of property or on the production, trade, distribution or use of income, wealth or commodities. Economic Security involves not only protecting the capacity of the economy to provide for the people but also the degree to which the government and the people are free to control their economic and financial decisions. It also entails the ability to protect a nation’s wealth and economic freedom from outside threats and coercion. Thus, it comprises not only economic policy and some law enforcement agencies but also international agreements on commerce, finance and trade. Emergency Management is the managerial function charged with creating the framework within which communities reduce vulnerability to hazards and cope with disasters. Energy and Natural Resources Security is most often defined as the degree to which a nation or people have adequate and sustainable access to such energy resources as oil, gas, water and minerals. Access includes availability of energy resources determined by the energy market without interference from other nations or political or military entities for non-market, political purposes. Enterprise Risk Management a comprehensive approach to risk management that engages organizational systems and processes together to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives. Environmental Security is a process for understanding how extreme environmental or climatic events, acting locally or trans-nationally, can destabilize countries or regions of the world, resulting in geopolitical instability, resource conflicts, and subsequently enhanced risk to critical infrastructure, or a combination of these. Epidemic refers to an increase, often sudden, in the number of cases of a disease above what is normally expected in that population in that area. Epidemics occur when an agent and susceptible hosts are present in adequate numbers, and the agent can be effectively conveyed from a source to the susceptible hosts. Extreme weather event An extreme weather event is an event that is rare at a particular place and time of year. Definitions of rare vary, but an extreme weather event would normally be as rare as or rarer than the 10th or 90th percentile of a probability density function estimated from observations. The characteristics of what is called extreme weather may vary from place to place in an absolute sense. When a pattern of extreme weather persists for some time, such as a season, it may be classed as an extreme climate event, especially if it yields an average or total that is itself extreme (e.g., drought or heavy rainfall over a season). Focusing events sudden, unpredictable and harmful events that gain the attention of policy makers and the public and drive national policy more so than other similar events. Glossary xxvii Food Security a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life (FAO, 2001). Fossil Fuels carbon-based fuels from fossil hydrocarbon deposits, including coal, oil and natural gas. Future shocks a dizzying disorientation brought upon by the premature arrival of the future. Game Theory a theory that seeks to explain strategies for dealing with competitive situations where the outcome of an individual’s choices depends critically on the other individuals involved in the competition. It has its roots in mathematics but has been used in the social sciences to explain the behavior of individuals, groups, organizations and nation states. Global governance when governance is utilized to address areas or issues of concern that affects more than one state or region and the actors involved in the process are transnational. It encompasses the institutions, policies, norms, procedures and initiatives through which states and their citizens try to bring more predictability, stability and order to their responses to transnational challenges in the absence of overarching political authority, such as in the international system. Global warming an increase in global mean surface temperature averaged over a 30-year period, relative to 1850–1900 unless otherwise specified. For periods shorter than 30 years, global warming refers to the estimated average temperature over the 30 years centered on that shorter period, accounting for the impact of any temperature fluctuations or trend within those 30 years. Globalization the increased connection of different parts of the world from advancement in communication and transportation technology resulting in the expansion of international cultural, economic and political activities. It is the movement and integration of goods and people among different countries. Governance the sum of many ways individuals and institutions, public and private, manage their common affairs. It is a continuing process through which conflicting or diverse interests may be accommodated and cooperative action may be taken. Greenhouse gas (GHG) greenhouse gases are those gaseous constituents of the atmosphere, both natural and anthropogenic, that absorb and emit radiation at specific wavelengths within the spectrum of terrestrial radiation emitted by the earth’s surface, the atmosphere itself and by clouds. This property causes the greenhouse effect. Water vapor (H2O), carbon dioxide (CO2), nitrous oxide (N2O), methane (CH4) and ozone (O3) are the primary GHGs in the earth’s atmosphere. Moreover, there are several entirely human-made GHGs in the atmosphere, such as the halocarbons and other chlorine- and bromine-containing substances, dealt with under the Montreal Protocol. Besides CO2, N2O and CH4, the Kyoto Protocol deals with the GHGs sulphur hexafluoride (SF6), hydrofluorocarbons (HFCs) and perfluorocarbons (PFCs). Hazard a natural or man-made source or cause of harm, or loss or difficulty. Homeland Security a value-laden term, which often means different things to different constituents, organizations or stakeholders. Generally, homeland security refers to a set of collective actions of all levels of government (local, tribal, state, federal), constituents, organizations or stakeholders (i.e., members of the homeland security enterprise) to prevent, protect against, mitigate, respond to and recover from threats and hazards that pose risk to the nation. xxviii Glossary Homeland Security Enterprise an umbrella term that describes a collective of all levels of government, institutions and disciplines that collectively contribute strategies, structures or operations to the homeland security mission. The “enterprise” often includes all levels of government, constituents, organizations or stakeholders such as law enforcement, fire service, public health, academia, emergency medical services, the military, public works, and the public and private sectors. The enterprise is synonymous with “whole-of-community” and “all-of-nation” approaches to homeland security. Human Agency Bias the condition wherein people and even entire societies are far more interested in human threats—versus natural ones. Human Security a condition that is met when the vital core of human lives is protected, and when people have the freedom and capacity to live in peace, security and with dignity. The term is multidimensional and will often include constituent elements such as economic security, environmental security, food security, health security, personal security, community security, political security and the protection of women and minorities. Its distinguishing characteristic is to avoid or downplay national security as a military problem between nation states, focusing instead on an assumed international “responsibility to protect” peoples from violence. It is to be determined and administered by the United Nations. Intelligence (basic definition) information that provides decision makers with knowledge or foreknowledge of the world around them for the purposes of supporting policy or other strategic decisions. Intelligence Cycle a process wherein policy makers (consumers) decide what information they need (intelligence requirements) followed by collectors who gather raw data and analysts who try to make sense of that data, and a dissemination system that provides intelligence to the consumer—at which point the cycle starts over again. Interagency Collaborative Capacity (ICC) the results of a process that takes bits and pieces of existing organizations and somehow gets them to cohere and create a functioning entity that is better than the sum of its parts (also known as craftsmanship theory). Interagency Mechanism for Collaboration (IMC) include an array of arrangements or applications that can facilitate collaboration among agencies, including interagency offices, groups, task forces, councils, conferences and communities of practice, collaborative technology and similar constructs. Intergovernmental Organization (IGO) a formal entity formed by an intergovernmental agreement such as a treaty, charter or statute that involves two or more nations working in good faith, on issues of common interest. Issue-attention Cycle the ascension of issues to the top of the national policy agenda followed by declining public interest and the fading of the issue from the center of public attention. Kyoto Protocol the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) was the seminal international treaty adopted in December 1997 in Kyoto, Japan, at the Third Session of the Conference of the Parties (COP3) to the UNFCCC. Liberalism the classic international relations theory that holds human nature is basically good, social progress is possible and human behavior is malleable and perfectible through institutions. It argues that injustice aggression and war are products of Glossary xxix inadequate or corrupt institutions or misunderstanding among leaders and therefore that injustice, aggression and war are not inevitable but can be eliminated by collective action and institutional reform. Subdisciplines of liberalism include neoliberalism, functionalism, regime theory and collective or public good. Lone Wolf Terrorism a form of terrorism that is usually purely a domestic threat, even though the causes and the actors may be from abroad. It occurs when an individual or group of individuals are inspired to take action in support of a terrorist organization’s goals or ideology even though they have no formal contention to that organization. Mitigation focuses on the impact of a hazard, encompasses the structural and nonstructural approaches taken to eliminate or limit a hazard’s presence; people’s exposure; or interactions with people, property and the environment. The emphasis on sustained actions to reduce long-term risk differentiates mitigation from those tasks that are required to survive an emergency safely. Multilateral Agreement an agreement where three or more states cooperate or enter into a formal arrangement with one another in return for some sort of preferential treatment. Nation state a sovereign state (country) whose citizens are relatively homogeneous in terms of such factors of culture, language and common descent. National Incidence Management System (NIMS) NIMS provides a common, nationwide approach to enable the whole community to work together to manage all threats and hazards. NIMS applies to all incidents, regardless of cause, size, location or complexity. National Preparedness is based on core capabilities that support “strengthening the security and resilience of the United States through systematic preparation for the threats that pose the greatest risk to the security of the Nation, including acts of terrorism, cyber-attacks, pandemics and catastrophic natural disasters”. National Preparedness Goal (NPG) FEMA defines the NPG as “A secure and resilient Nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk”. National Response Framework (NRF) The NRF is formerly the National Response Plan and is the basis for national-level planning for large-scale emergencies regardless of threat or hazard origin. National Security a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination or autonomy, prosperity, well-being and culture. Nongovernmental Organizations (NGOs) voluntary group of individuals or organizations, usually not affiliated with any government, that is formed around a particular issue or concern. Non-state actors an individual or organization that has significant influence of society but is not allied to a particular nation or state. Non-state actors that pose a threat to security include terrorists, narcotics traffickers, transnational crime groups, organized gangs and individual offenders. Offensible space when criminals and other bad actors use defensive space tactics to create a safe space where they can conduct their crimes. Pandemic refers to an epidemic that has spread over several countries or continents typically at the same time and usually affecting a very large number of people. xxx Glossary Paradigm scientific practice including theories, laws, applications and instrumentations that are generally accepted by scientific communities. Paris Agreement the Paris Agreement under the United Nations Framework Convention on Climate Change (UNFCCC) was adopted on December 2015 in Paris, France, at the 21st session of the Conference of the Parties (COP) to the UNFCCC. The agreement, adopted by 196 Parties to the UNFCCC, entered into force on 4 November 2016 and as of May 2018 had 195 Signatories and was ratified by 177 Parties. Political Economy the set of interlinked relationships between people, the state, society and markets as defined by law, politics, economics, customs and power that determine the outcome of trade and transactions and the distribution of wealth in a country or economy. Political Security refers to protecting the sovereignty of the government and political system and the safety of society from unlawful internal threats and external threats or pressures. It involves both national and homeland security and law enforcement. Public Health the science of protecting and improving the health of people and their communities achieved by promoting healthy lifestyles, researching disease and injury prevention, health promotion and detecting, preventing and responding to infectious diseases. Rational choice a social science theory that crosses multiple disciplines but draws heavily on the theoretical foundations of psychology and economics. It assumes that humans are motivated by personal goals reflecting their preferences. They achieve their goals by a mindful and calculated process, whereby they review their goals against the means of attaining them, and decide the best way to proceed in order to optimize the odds of success relative the odds of failing and make decisions accordingly. Rational Choice theory has been applied to individuals, groups, organizations and nation states. Realism the classic international relations theory that argues that the international system is anarchic; there is no actor above states capable of regulating their interactions; therefore, states must arrive at relations with other states on their own, rather than having it dictated to them by some higher controlling body. Adding to this anarchy is the idea that the international system exists in a state of constant antagonism. Since there is no higher controlling body, states are the most important actors in the international system. All states within the system are unitary, rational actors that tend to pursue self-interest and strive to attain as many resources as possible. Subdisciplines of realism include neorealism and rational choice. Recovery encompasses both short-term and long-term efforts for the rebuilding and revitalization of affected communities. Recovery planning builds stakeholder partnerships that lead to community restoration and future sustainability and resiliency. Referent Organizations centralized organization that formalizes institutions, establishes ground rules for membership and consensus building, and organizes the systematic mobilization of resources. Referent organizations are featured in IMCs. See Interagency Mechanism for Collaboration. Regime sets of implicit or explicit principles, norms, rules and decision-making procedures around which actors’ expectations converge in a given area of international concern that require collective action. Glossary xxxi Resilience as defined in PPD-21, is “the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions…[it] includes the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents”. Resilient infrastructure assets, systems and networks must also be robust, agile and adaptable. Mitigation, response and recovery activities contribute to strengthening critical infrastructure resilience. Response embodies the actions taken in the immediate aftermath of an incident to save and sustain lives, meet basic human needs and reduce the loss of property and the effect on critical infrastructure and the environment. Following an incident, response operations reduce the physical, psychological, social and economic effects of an incident. Risk in a risk management context, risk the potential for an unwanted outcome resulting from an incident, event or occurrence, as determined by its likelihood and the associated consequences. In the context of the assessment of climate impacts, the term risk is often used to refer to the potential for adverse consequences of a climate-related hazard, or of adaptation or mitigation responses to such a hazard, on lives, livelihoods, health and well-being, ecosystems and species, economic, social and cultural assets, services (including ecosystem services) and infrastructure. Risk results from the interaction of vulnerability (of the affected system), its exposure over time (to the hazard), as well as the (climate-related) hazard and the likelihood of its occurrence. Risk Assessment the product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision-making. Risk Control the deliberate action taken to reduce the potential for harm or maintain it at an acceptable level. Risk Management process of identifying, analyzing, assessing and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken. Risk Perception the subjective judgment that people make about the characteristics and severity of a risk. Routine Activity a criminology theory that focuses on criminal events and activities rather than focusing on the offender or crime setting. Under routine activity theory, crimes require the convergence of a motivated offender, a suitable target (victim), and needs to take place in circumstances where the target lacks protection of a capable guardian. Prevention consists of actions that reduce risk from human-caused incidents, primarily terrorism. Protection reduces or eliminates a threat to people, property and the environment. Primarily focused on adversarial incidents, the protection of critical infrastructure and key resources (CIKR) is vital to local jurisdictions, national security, public health and safety and economic vitality. Salafi jihadism movement which serves as the ideological base of most Sunni Islamic terrorist organizations, including al-Qaeda, ISIS and their affiliated groups. Salafi movements contend that only by returning to the way of life at the time of the prophet may Muslims once again experience a golden age. Salafi jihadists promote the use of violence to achieve this goal. Situational Crime Prevention a crime prevention concept that attempts to analyze specific incidents and activities—associated with a crime, rather than focus on xxxii Glossary offenders or their motivations. The context of the crime is more important than the offender or their motivation. If it is more difficult to carry out a crime, it increases the risk the offender takes by attempting the crime. Higher risk reduces the rewards (or the benefits) the offender expects to receive by committing the crime as well as the motivation used to justify their criminal action. Social Identity a theory that attempts to explain how individuals self-ascribed significance attached to the social groups or communities to which one belongs and with which one interacts directly, along with the feelings associated with participation in these groups’ activities. Social Movement a group of people with a common ideology who try together to achieve certain general goals and some level of social or political change through collective action. Social Network Analysis an application of social network theory that analyzes network nodes to understand who anything from networks, people and even things like events are linked. It looks at not only the inextricable links that bond together religious, familial or cultural groups but also the fluid and dynamic groupings that are more prevalent in a global society where transience and rootlessness in both the physical and digital world. Social Network Theory a social science theory that crosses multiple disciplines in fields as diverse as psychology to economics. It seeks to explain the factors contrite to the formation, cohesion, and continuation of links between individuals and groups that form networks. Network are examined in terms of “nodes”, which are tightly coupled groups of people that coalescence around complex-yet understandable relationships. Sustainable Development Goals the current set of 17 global goals for development for all countries established by the United Nations through a participatory process and elaborated in the 2030 UN Agenda for Sustainable Development which includes ending poverty and hunger; ensuring health and well-being, education, gender equality, clean water and energy, and decent work; building and ensuring resilient and sustainable infrastructure, cities and consumption; reducing inequalities; protecting land and water ecosystems; promoting peace, justice and partnerships; and taking urgent action on climate change. Target Hardening the crime prevention technique of employing security measures as a deterrence the use of alarms, barriers, gates, locks, fences or other security devices. It assumes that criminals are rational actors and would conduct a somewhat imaginary cost-benefit analyst on a given target beforehand to see if they will be able to successfully commit their crime. If a target that has been hardened it would be unattractive to a criminal. Terrorism there is no universally accepted definition of terrorism but for the purpose of this text terrorism will be defined as the use or the threat of violence or other destructive behavior by a non-state actor to inciting fear or intimate a population with the goal of achieving some level of social or political change. Theory a systematic and evidence-based approach to a processes or phenomena, and the presumed relationships between and among components of the process or phenomenon. Threat a natural or man-made occurrence, individual, entity or action that has or indicates the potential to harm life, information, operations, the environment and/or property. Glossary xxxiii Threat Assessment product or process of identifying or evaluating entities, actions or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, operations and/or property. Transgovernmentalism an emerging international relations theory that contends that globalization has created an environment traditional means of international interaction, like diplomacy and treaties, seem less effective in dealing with today’s threats to international security as may be too slow and cumbersome to combat certain problems in a globalized world as they were in dealing with past threats. Today’s threats require the development of relationships between similar agencies across governments, rather than dealing exclusively through foreign ministries. Governments operate internationally through transgovernmental networks comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts to help address the problems that arise when national actors or issues spill beyond their borders. Transgovernmental Network network comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts to help address the problems that arise when national actors or issues spill beyond a nation’s borders. Transnational Advocacy Networks (TANs) networks are constructed of “nodes” of individuals or groups which utilize modern technology to connect with other “nodes” around the globe who share their ideals or beliefs. Through their collective action, the nodes of the network can turn their attention to problems and issues of a global scale. Uncertainty (in science) the degree to which a calculated, estimated or observed value may deviate from the true value. Uncertainty is the state of incomplete knowledge that can result from a lack of information or from disagreement about what is known or even knowable. It may have many types of sources, from imprecision in the data to ambiguously defined concepts or terminology, incomplete understanding of critical processes, or uncertain projections of human behavior. Uncertainty can therefore be represented by quantitative measures (e.g., a probability density function) or by qualitative statements (e.g., reflecting the judgment of a team of experts). United Nations Framework Convention on Climate Change (UNFCCC) the UNFCCC was adopted in May 1992 and opened for signature at the 1992 Earth Summit in Rio de Janeiro. It entered into force in March 1994 and as of May 2018 had 197 Parties (196 States and the European Union). The Convention’s ultimate objective is the “stabilization of greenhouse gas concentrations in the atmosphere at a level that would prevent dangerous anthropogenic interference with the climate system”. The provisions of the Convention are pursued and implemented by two treaties: the Kyoto Protocol and the Paris Agreement. Unity of effort refers to organizations working together collaboratively. Vulnerability the qualitative or quantitative expression of the level to which an entity, asset, system, network or geographic area is susceptible to harm when it experiences a hazard. Vulnerability Assessment product or process of identifying physical features or operational attributes that render an entity, asset, system, network or geographic area susceptible or exposed to hazards. xxxiv Glossary Wave Theory (of terrorism) a theory that contends terrorism ebb and flow in increments of 40-year iterations. The different “waves” are products of the conditions and climate of the times in which they occur; driven by myriad factors that compel terroristic actors to heed the clarion call of violence in action around a particular ideology. Westphalian Sovereignty the assumption of international law that a nation state has sovereignty over its land and internal affairs, to the exclusion of all external powers, on the principle of non-interference in another country’s internal affairs, and that each state is equal in the eye of international law. Note 1 This glossary draws on terms and definitions from the US DHS Lexicon (2010) retrieved at: https://www.cisa.gov/sites/default/files/publications/dhs-risk-lexicon-2010_0.pdf, the IPCC Glossary (2018) Retrieved At: Https://Www.Ipcc.Ch/Site/Assets/Uploads/2018/11/ Sr15_Glossary.Pdf, and the Guide To Emergency Management And Related Terms, Definitions, Concepts, Acronyms, Organizations, Programs, Guidance, Executive Orders & Legislation (2007) by Wayne Blanchard, retrieved at: https://training.fema.gov/hiedu/ docs/terms%20and%20definitions/terms%20and%20definitions.pdf 1 Introduction to security theory James D. Ramsay, Keith Cozine and John Comiskey Description. Security is an elusive concept. It is dynamic, value-laden and complex. Ultimately it means different things to different people or governments and can even change in meaning over time to the same people or governments. Modern homeland security overlaps, but not entirely the notion of domestic, national and international security, which necessitates a broad integrated effort at all levels of government, including the private sector, as well as an interagency collaborative capacity. Complicating the structure and operation of homeland security is the terrific variation in security models and laws that are held by our allies internationally. Ultimately, “being secure” is an end state that all national security models pursue. How best to secure the US nation from threats foreign and domestic, including natural threats and hazards from climate change to landslides consumes much of the US federal government’s time and treasury and can be likened to a complex, adaptive system since the “problem set” that homeland security struggles to solve includes more wicked than tame problems. This chapter reviews the origins of theory, levels and models of theory, and will offer a brief overview of the nature of wicked problems. Upon successful completion of this chapter, students should be able to: 1. Describe what a theory is and how theory supports professional disciplines. 2. Distinguish between four levels of theory: grand theory, macro-theory, mesotheory and micro-theory. 3. Offer a working definition of homeland security. 4. Distinguish between wicked and tame problems. 5. Describe how individual disciplines contribute structure, strategy and theory to modern homeland security, thus creating a theoretical underlayment for a “grand theory of homeland security”. 1.1 Introduction The term homeland security first came into the American lexicon ten days after the September 11th terrorist attacks in 2001 when the U.S. President George W. Bush created the Office of Homeland Security. The office was created to “develop and coordinate the implementation of a comprehensive national strategy to secure the United States from terrorist threats or attacks”. (History.com Editors, 2019; White House, 2001). President Bush appointed former Pennsylvania governor Tom Ridge as inaugural director of the office the following month. The idea and concept of homeland security were further solidified with the passage of the Homeland 2 James D. Ramsay, Keith Cozine and John Comiskey Security Act of 2002, which created the Department of Homeland Security (DHS) as a cabinet-level federal department. However, both the term homeland security and the concept of a specific agency dedicated to preserving it predate the September 11 terrorist attacks. The U.S. Commission on National Security in the 21st Century, also known as the Hart-Rudman Commission, under President Clinton, was established in 1998 to provide a comprehensive review of US national security requirements in the 21st century. The commission argued that the United States was facing a radically new security environment in which the threat of a mass casualty attack on the American homeland was real, and called for a “National Homeland Security Agency” to deal with this new (and mostly domestic-facing) threat environment (Roxborough, 2001). Over the last 18 years, we have witnessed an evolution in both the DHS and its role in preserving and protecting liberty and the free flow of people and commerce. It has grown into something much more than a single government agency. As the 2014 Quadrennial Homeland Security Review points out, providing for the safety and security of the American people from a variety of natural and man-made threats requires partnerships between federal departments and agencies; state, local, tribal and territorial governments; nongovernmental and private sector organizations; our foreign allies; and the American public (DHS, 2014). While the term “homeland security” is somewhat uniquely American, the underlying concepts, strategies and structures constituting the homeland security enterprise are not. Indeed, a Federal Department whose mission is squarely focused on a coordinated and seamless effort involving all levels of government to confront the complex and wicked threat environment of the 21st Century as outlined in the HartRudman Commission is not only logical, but present in most developed nations. After the events of September 11, 2001, the United States as well as several other peer nations especially within the Anglosphere, strategically restructured their government at the national level in order to be better situated to protect its populations. In a post “9/11” world, domestic security suddenly seemed more dynamic, asymmetric, transnational, complex and pernicious. In 2003, Public Safety Canada was created to “ensure coordination across all federal departments and agencies responsible for national security and the safety of Canadians” and included the Canada Border Services Agency (CBSA), Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP) in the Department. (Public Safety Canada, 2015). Since 2001, the United Kingdom has periodically restructured several of its security agencies to now include the UK Border Force, the UK Visas and Immigration (UKVI) office and the Immigration Enforcement (IE) office all within the Home Office. In addition to the Home Office, there are other security and safety agencies such as HM Inspectorate of Constabulary and Fire & Rescue Services, National Counter Terrorism Security Office and UK Security Service (MI5). In 2013, the National Crime Agency (NCA) was established to combat organized crime; human, weapon and drug trafficking; cybercrime; and economic crime that goes across regional and international borders (Cozine, 2016). In December of 2017, Australia created the Department of Home Affairs with the responsibilities for immigration and customs border policy; national security and law enforcement policy; emergency management, including crisis management and disaster recovery; countering terrorism; cyber-security policy; countering foreign interference; critical infrastructure protection; and transportation security. Agencies within Home Affairs include the Criminal Intelligence Introduction to security theory 3 Commission, Australian Border Force, Australian Federal Police, AUSTRAC (the Australian Transaction Reports and Analysis Centre) and Australian Intelligence and Security Organizations (Home Affairs, 2019). Along with the development of federal “homeland security” organizations within the Anglosphere, a tremendous growth of homeland security academic programs at colleges and universities has occurred, particularly in the United States. As of 2019, the University Agency Partnership Program administered by the Naval Post Graduate School’s Center for Homeland Defense and Security lists 460 homeland security-related academic programs, including programs at the Associate, Bachelor, Masters and Doctoral levels (UAPP, 2019). While some of these programs emerged from existing criminal justice or emergency management programs, others were built from the ground up drawing academic content from existing fields such as criminal justice, emergency management, political science, public administration and security studies to name but a few. Over the past decade and a half, homeland security programs have evolved core topics and curricula centered on all-hazard threats, critical infrastructure, critical thinking, collaboration, cyber security, emergency management, intelligence, law and policy, leadership, preparedness, risk management, strategy and terrorism (Comiskey, 2018). Another recent development in the maturation of homeland security as an academic discipline was the International Society for Preparedness, Resiliency, and Security (INSPRS) identification of nine knowledge domains, which should be part of undergraduate homeland security curricula. These include critical infrastructure and resilience, emergency management, human and environmental security, intelligence, law and policy, professionalism, risk management, strategic planning and terrorism. Knowledge domains refer to the knowledge, skills, abilities and behaviors that should be part of a discipline’s curricula (Ramsay & Renda-Tanali, 2018). Despite these steps and initiatives to move homeland security forward as an academic discipline, no grand theory or overarching framework of homeland security has evolved. As Comiskey (2018) points out, “homeland security academics as well as practitioners have an obligation to the evolving discipline to identify, develop, and test theories and methodologies that will prepare practitioners for the field and to address homeland security problems”. He continues, “they must introduce, explain, analyze, test, develop and generate theory and other methodologies that will grow and mature the field”. (Comiskey, 2018) A profession uses its underlying theory to establish best practices and legitimacy of practice. As knowledge evolves, theory evolves, and vice versa. It turns out that theory, though a critical underlayment to all disciplines, is not static. As in all disciplines, theory is both dynamic and foundational and continues to evolve as research, changes in technology, best practices, lessons learned all contribute to the body of knowledge of the field. Theory also subsequently serves as a guide for ongoing research and scientific inquiry. In short, theories are the pillars of any academic discipline, and ultimately, any profession. But what exactly is theory? 1.2 What is a theory? In everyday use, the word “theory” often means an untested hunch, or a guess without supporting evidence. However, for the academic, the scholar or the scientist, a theory has nearly the opposite meaning and is nearly always accompanied by observation and other data to support the relationships theorized. To these professionals, theory 4 James D. Ramsay, Keith Cozine and John Comiskey is a well-substantiated explanation of some aspect of the natural world that can incorporate laws, hypotheses and facts (American Museum of Natural History, 2005). A theory provides reasoning (or suspected logic) for why something may occur the way it does, or why things may be related the way they appear to be, or it may attempt to explain observed patterns in behavior. Theories appear from many sources with varying quantities (and quality) of evidence that reinforces an observed relationship. Some theories have little to no evidence, and seem mostly constituted by observation while others are supported by considerably more empirical evidence. Components of a definition of theory should include a set of assumptions, propositions or accepted facts that attempt to provide a plausible or rational explanation of cause-and-effect (causal) relationships among a group of observed phenomena. One of the major functions of a theory is to provide an answer to the question “why?”. Asking “why?” is central to our need to understand how the world works, to increase our knowledge of a subject area or to predict what might happen next, or to realign thoughts and opinions. Asking “why?”, therefore, is an essential skill for anybody who wants to learn and develop and grow. Defining “theory”, therefore, must consider the “why?” question. But a more complete theory is necessarily deeper than merely asking “why?”. A more robust theory also includes an attempt to explain why and so to provide understanding. A theory is not just “any” explanation—a theory comes into being when a series of ideas or observations come to be held and accepted by a wider community of people as being factual. Moreover, a theory is not only factually based, but how we understand and provide explanations about real-world phenomena also involves one’s cultural background as well as one’s worldview. What then is a theory? Put simply, a theory not only is a logical attempt to explain observed phenomena and known facts; it also allows scientists to make predictions of what they should expect to observe were their theory true. In this sense, theories are testable. New evidence should be compatible with a theory. If it is not, the theory is refined or rejected. A theory can never be considered wholly true. Indeed, a well-evidenced theory that is widely considered factual at a given point in time may, in the future, need to be modified upon the discovery of new evidence. Similarly, a theory with little supporting evidence may, in time, be corroborated by evidence gained through the development of new technologies and research techniques. In this way, theories can be modified or amended over time as understanding of the subject matter evolves, as technologies are invented that can gather better evidence, or as repeated application of the theory may reveal confirming or disconfirming evidence. Just as no theory can ever be considered pure fact, no theory can likewise be completely discredited even if there is an overwhelming amount of opposing physical evidence. In fact, competing theories can complement each other or conflict with each other. This is healthy, encourages critical analysis, supports the scientific method and leads eventually, to a more robust and in depth understanding of each theory and the evidence/research that supports it. The longer the central elements of a theory hold—the more observations it predicts, the more tests it passes, the more facts it explains—the stronger the theory. For example, Darwin’s theory of evolution explains why so many plants and animals—some very similar and some very different—exist on Earth now and in the past, as revealed by the fossil record. Many advances in science—the development of genetics after Darwin’s death, for example—have greatly enhanced evolutionary thinking. Yet even with these new advances, the theory of evolution persists today, much as Darwin first described Introduction to security theory 5 it, and is universally accepted by scientists as valid (American Museum of Natural History, 2005; Darwin, 1859). 1.3 The goal of theory development and the rise of homeland security theory Theories are developed for many reasons. A common goal of theory development is, for example, to better predict future events. Understanding how certain businesses tend to react under certain circumstances can, for example, lead to more successful investment strategies. However, we also point out that the goal of theory development is not always the same and the type of theory developed often has its origins in the initial question of “why?” For instance, in an attempt to better understand what might constitute appropriate content in academic homeland security curricula, Comiskey (2018) identified five types of theory widely utilized in homeland security studies as an academic discipline; descriptive theory, explanatory theory, normative theory and predictive theory, as well as the inductive process referred to as grounded theory. Descriptive theory describes or classifies specific dimensions or characteristics of individuals, groups, situations or events by summarizing the commonalities found in discrete observations (Godfrey-Smith, 2003; Joas & Knobol, 2009). Explanatory theory predicts precise or causative relationships between dimensions or characteristics of phenomena or differences between groups (Fawcett & Downes, 1986; Turner, 2017). Normative theories make value judgments; they prescribe what should be (Godfrey-Smith, 2003; Sjoberg & Nett, 1968). Predictive theory predicts outcomes (Betts, 1982; Bookstaber, 2017). Last, grounded theory is the product of inductive inquiries from which general theories of processes, actions or interactions are derived (Glaser, 1967). Just as the “why?” is important to theory development, “what” is being studied, or the level of analysis of the study, also plays an equally important role. Combining the “why”, with the “what” leads to four super-ordinate levels of theory: grand theory, macro-theory, meso-theory and micro-theory. Grand theory attempts an overall explanation of social life, history or human experience. Grand theory also provides a general framework for many smaller theories (Ek & Tesfahuney, 2011; Mills, 1959; Skinner, 1985). Macro-level theories explain larger social systems, processes and institutions. Meso-, or midlevel theories, are less ambitious than their macro-level counterparts, tend to be less abstract while they emphasize midscale processes and interactions, and as the name implies, often links macro and micro theories (Creswell, 2009). Microlevel theories provide explanations of smaller social groups, systems, processes and institutions (Ougaard, 2013). Understanding the origins and types of theory is helpful when trying to understand the discipline of homeland security, or at least in our attempt to apply a theoretical description of it. In fact, using theory to better explain homeland security is rather important to the overall health and safety of the nation. Consider that a good theory of homeland security would enhance our ability to be prepared for pandemics, hurricanes or terrorist attacks. Indeed, a robust theory of homeland security would improve how we teach the next generation of practitioners and ultimately is key to our national preparedness and our national security. In addition, this complexity begets the question security studies academics have pondered since the advent of the first academic degree programs; that is, what do we teach students of homeland security and why? However, 6 James D. Ramsay, Keith Cozine and John Comiskey it is at this point that our understanding of homeland security needs to be checked. Like medicine and engineering, homeland security is actually more complex than one might think at first blush. In practice, homeland security acts more like a discipline of disciplines, or a meta-discipline (Ramsay, 2012; Ramsay & Renda-Tanali, 2018). In other words, modern homeland security is component of several extant disciplines including criminal justice, emergency management, cybersecurity, risk management, preparedness, resilience, communication, strategy and decision-making, intelligence and terrorism to name a few. From the perspective of theory development, the dilemma this poses is whether it is possible to develop a theory of a meta-discipline? When attempting to consider a “theory of homeland security”, it is immediately obvious that theory typology and levels of analysis are central to this task. To start, let us explore the complexity of the concept of “security”. The term “security” derives from the Latin word securitas whose root is securus meaning “without care”. Further, security has been ascribed various definitions within academic literature. Manunta (1999) has defined security as a “basic need”. Another view of security offered by Fischer and Green (2004) is that it “implies a stable, relatively predictable environment in which an individual or group may pursue its ends without disruption or harm and without fear of disturbance or injury”. Security is often tied to feelings of safety as indicated in a hierarchy of needs as proposed by Maslow. Security has been classified as the second-most important need for all humans, trailing only the physiological necessities such as food, water and shelter (McLeod, 2007). Security is a combination of material circumstances and the physiological state produced by those circumstances. Security is as much about peace of mind, order and stability as it is about physical wellbeing (Caldwell & Williams, 2016). Wolfers’ (2011) work addresses security as a value, defining security as the absence of threats to acquired values, or the fear that those values will be under threat. These are but a few of the many definitions of security found in the academic literature. For our purposes a simple definition of security is as a condition or state of being free from a threat of harm. Security it seems, in its most basic form covers a broad terrain and implies several levels. On one extreme it is an individual’s perception of well-being when one is free from threats to one’s welfare. Yet, on the other extreme, security can imply a condition where either a nation or even the international community is stable and free of conflict. The perspective that security subsumes a broad array of levels from individual well-being to global security mirrors the concept of the Homeland Security Enterprise. As suggested above, the Homeland Security Enterprise concept includes a broad and expansive effort, across several levels of government and the private sector, to provide for the safety and security of the American people from a variety of natural and man-made threats. Specifically, such an effort requires partnerships between federal departments and agencies; state, local, tribal and territorial governments; nongovernmental and private sector organizations; our foreign allies; and the American public (DHS, 2014). Clearly, this is the case if security concerns encompass individual, the international system, and several levels of security in between. As such, it is readily apparent that all four levels of theory; grand theory, macro-theory, meso-theory and micro-theory are important to the development of homeland security theory. Likewise, as homeland security programs have evolved core topics and curricula centered on all-hazard threats, critical infrastructure, critical thinking, collaboration, cyber security, emergency management, intelligence, Introduction to security theory 7 law and policy, public health, leadership, preparedness, risk management, strategy and terrorism; the diversity of these topics means that descriptive theory, explanatory theory, normative theory and predictive theory will be equally important in the future development of homeland security theory. Consequently, the theories mentioned here will serve as pillars on which a distinct homeland security theory will begin to be built. As we’ve discussed, a theory is critical to a discipline’s ability to test, evaluate and advance its operations or strategies. What aids theory development is the degree to which the concept can be defined. After all, it seems inherently difficult to develop a theory around something that cannot be defined. Toward this end, the next section will offer a working definition of homeland security and the nature of the problems it attempts to manage. 1.4 Wicked vs. tame problems and the homeland security problem set A decision science perspective would describe the challenges that confront the Homeland Security enterprise as wicked problems. Wicked problems are those that exhibit the following characteristics: the solution depends on how the problem is framed; the problem can change in response to an attempted solution; stakeholders vary considerably in how they define and understand the problem or what a solution would be; suspended judgment and iteration are key in resolving the problem; the constraints and resources available to address the problem change over time; and the problem is never (totally) solved—that is wicked problems are better managed than solved.1 The primary difference between wicked problems and their counterparts, tame problems, is that although tame problems can be complex (i.e., building a jet engine), there is typically broad agreement on the solution pathway, benchmarks of success and general agreement on what the end state should be. Wicked problems do not tend share these characteristics. For example, classic issues homeland security grapples with that we would classify as wicked include climate change, immigration and border security, pandemic preparedness, asymmetric violent extremism and cybersecurity. Herein lies the difficult with a precise definition of what homeland security is, and logically, what it is not. The next section will promote a working definition of homeland security. 1.4.1 A working definition for homeland security It seems logical that to develop a theory of something, we would first need to define it. Several have attempted robust definitions of homeland security (Bellavita, 2008, 2011; Ramsay, 2013; Ramsay & O’Sullivan, 2013; Ramsay & Renda-Tanali, 2018). The difficulty in devising a simple definition is that homeland security is a conceptual framework that we suspect contains at least three generic, primary characteristics: 1. Homeland security is complex. That is, it is multifaceted and multidimensional and interdisciplinary—it is a composite system of systems, which even in its simplest conceptions (as primarily terrorism-focused) involves multiple levels and realms, from local to international, and a diversity of institutions, societies and demographics. 2. Homeland security is dynamic. As both concept and practice and given the evolving nature of possible threats (including the perceptions of and responses 8 James D. Ramsay, Keith Cozine and John Comiskey to those threats), what is and is not homeland security can itself be expected to change in concept, as well as in application over time. 3. Homeland security is value laden. That is, homeland security can be expected to hold different meaning to different constituents or stakeholders. In order to begin to devise a grand theoretical framework for homeland security, we offer a broad working definition of homeland security. We offer this with the caveat that it is neither an all-inclusive nor perfect definition, and that homeland security will in many regards always be a contested term. But by having a working definition, we have a clearer path toward establishing of a working theory of homeland security; that is, a theory that needs to be inclusive of the range of policy, law, practice, operations, strategies, structures and objectives that collectively comprise the homeland security enterprise. Thus, as follows: Homeland Security2 may be described as risk-based, multidimensional (or interdisciplinary) complex adaptive system3 which includes an integrated national effort by all levels of government – federal, state, local and tribal – as well robust domestic and international partnerships between the public and private sectors and nongovernmental organizations to protect the people, property, the environment and territories of the United States from natural, accidental, and unconventional (nonmilitary) manmade threats and hazards in order to defend liberty and ensure the free flow of people and commerce. The above definition offers a robust operationalization of the homeland security concept, and would include the relative contributions of several subdimensions, from academic to applied, among them (not a comprehensive, but also a working, list—for the sake of framing the broader argument): public health, science and technology, environmental systems and security, law and policy, pubic administration, systems engineering, organizational and leadership theory, criminal justice, critical infrastructure protection, economic analysis, public opinion and social psychology (from a variety of social science perspectives), politics4 and international relations, intelligence analysis, counterterrorism and emergency management. With a working definition in mind, we are ready to consider how a “theory of homeland security” might be constituted. 1.5 A theory of homeland security? As alluded to above, the search for a “grand theory of homeland security” is vexed by its expansive nature, its operational dependencies and the types of problems the homeland security enterprise seeks to resolve. Due to the wicked nature of the homeland security problem set, some have characterized the nature of homeland security as a meta-discipline, or a discipline of disciplines with different functions and specialties that range from counter terrorism to national security, border security to intelligence and critical infrastructure protection to environmental and human security (Church, 2010; Ramsay, 2012; Ramsay & Renda-Tanali, 2018; Simon, 2009). That is, homeland security as academic discipline is by its nature, inherently interdisciplinary. Indeed, a recent study by Comiskey (2015) found that that the majority of all collegiate homeland security curricula in the United States were categorized as either multidisciplinary or interdisciplinary drawing their content from a variety of other disciplines further corroborating homeland security’s interdisciplinary nature. Though such a nature complicates Introduction to security theory 9 our search for a theory of homeland security, it seems rather common for emergent academic disciplines to “borrow” content and theory from other disciplines. Consider the growth of medicine. Medicine today is a composite of many subdisciplines such as chemistry, physics, anatomy, physiology, toxicology, biochemistry, psychology and epidemiology, to name a few. As research has supported the practice of medicine, theories of medicine have improved from disbalances of humors in ancient Greece, to germ theory to the modern use of pharmaceuticals or the use of positron emission tomography (PET). Likewise, interdisciplinarity is an important characteristic of homeland security in terms of theory development because it supports the very goals of the kind of research that informs the discipline. For instance, the purpose of interdisciplinary research is not merely to integrate information, but to provide a more comprehensive collection of information from different fields in order to optimize understanding, application or prediction. Consequently, interdisciplinary research explicitly attempts to integrate the plurality of information (Pohl, Truffeer, & Hadron, 2017). Whether labeled interdisciplinary, multidisciplinary or a meta-discipline, it is clear that several more established academic disciplines have an impact on the intellectual and operational aspects of modern homeland security, and as such, confirming that it is an integrated academic discipline. That is, we assert that an overall theory of homeland security can be constructed by leveraging its interdisciplinary nature. As such, we attempt to establish a grand theory of homeland security as the composite of theories of its component parts. Further, components of the practice, organization or strategy of homeland security would seem to be critical to the formation of an overall or grand theory. Hence, by establishing how the component disciplines of homeland security support either the strategy, the operations or the structural organization of the homeland security enterprise, we approach a grand theory of homeland security as the integrated set of theories of its component disciplines. For instance, homeland security is largely based on law. By understanding the theory of law, how law supports operations, tactics, strategy and structure of domestic security (i.e., its agencies, operations, practices, policies), we discover a component of the larger whole, that is, overall homeland security theory. The subsequent chapters of this text will examine how the component disciplines of homeland security support its operations, strategies, tactics and structure. The theories described in this text may serve to guide academic and practitioners when researching homeland security problems, issues and concepts. It is our hope that such future research and subsequent inductive inquiries will lead to the development of a grounded theory of homeland security. From this, it would be possible to derive more general theories of processes, actions, or interactions of homeland security that in turn inform academic curricula that in turn supports national workforce development, policy development and the identification of best practices. Last, were such a grand theory to evolve and mature, we expect for example that our nation’s ability to anticipate disasters, develop resilience or avert violent extremism would improve, thus defending liberty and enhancing the safety and security of the nation and its people. 1.6 Organization and overview of this text Including this introduction, this text is organized into 14 chapters. Chapters 2-14 each discusses a core discipline upon which the modern profession of homeland security draws expertise that supports its organization, structure, strategy or operations. Each 10 James D. Ramsay, Keith Cozine and John Comiskey chapter describes how that discipline is organized and how its own theoretical underpinnings directly impact aspects of the practice of homeland security. The following synopses briefly overview each of the remaining chapters. Chapter 2. Risk and the Homeland Security Enterprise by Brian Harte. The dynamism and complexity of the homeland security environment requires the use of a variety of risk frameworks, models and theoretical applications to effectively assess both current and future threats, risks and vulnerabilities. Moreover, the need for comprehensive resiliency building and risk management strategies are also apparent within this environment. The primary goal of this chapter is to illustrate how risk and risk management work and lie at the heart of modern homeland security practice and strategy. Chapter 3. The Sociology of Security by Terrence O’Sullivan. Security is often understood as a perception of reality by individuals, social groups and institutions. Whether one’s perspective is from that of a government and adviser or a member of society, security is a perception of the social world which has profound consequences for the way we live our daily lives. A better understanding of the sociology of security helps us formulate theory, strategy and operations. Chapter 4. Crime and Security Chelsea Binns. Criminology, like homeland security, initially drew its theoretical foundations from other disciplines. Now, criminology has its own theoretical base, much of which is in turn contributing to the emerging theory in homeland security. This is particularly true of theories related to deterrence and crime prevention. This chapter will examine some of these theories and how they are specifically applicable to deal with security threats and hazards faced by security professionals. Case studies will be used to demonstrate how these theories have been applied in the real world. Chapter 5. Terrorism: Origins, Ideologies and Goals by Kyle McDonnell and Keith Cozine. It is imperative that security policy makers, practitioners and researchers understand the political, historical and social theoretical underpinnings of international and domestic terrorism. While there is no universally accepted definition of terrorism, this chapter will nonetheless attempt to define terrorism. Next, it will examine the various social theories of terrorism and how they contribute to the development of the different types of terrorism. Finally, the chapter will explore how these theories might help develop an estimation of what the terrorism will look like in the future so that effect policy and strategies to counter terrorism can be developed. Chapter 6. Interagency Collaborative Capacity by John Comiskey. Homeland security draws on expertise and requires working relationships with dozens of other agencies and organizations. When one considers the origins of terrorism, for example, one realizes that to understand and defeat terrorism requires expertise from sociologists, the legal and law enforcement communities, the intelligence community, the military as well as the State Department to name a few. Interagency collaborative capacity (ICC) theory provides a practical framework for homeland security policy makers and practitioners to cooperate, coordinate and collaborate effectively to protect the Nation. This chapter will trace homeland security’s interagency collaboration imperative to the post-World War II U.S. security and intergovernmental relations landscape. The chapter will then describe the post-9/11 and post-Hurricane Katrina threat landscape and the Introduction to security theory 11 multiple interagency partnerships and processes that developed as a result. It will describe interagency initiatives that were brought about by new challenges such as catastrophic natural disasters, industrial accidents and cyber vulnerabilities. The chapter will illuminate interagency partnerships and initiatives that exemplify ICC’s efficiencies and effectiveness. Chapter 7. Emergency Management and Theories of Prevention, Response and Recovery by Irmak Renda-Tanali. The theory of being “secure nation” does not mean that adverse events never occur. Indeed, the hallmark of a secure nation is indeed the resilience and preparedness capabilities of a nation, and its ability to withstand and recover from adverse events. Hence, existing theories from both emergency management and security to describe the degree to which the United States is prepared for, can prevent, respond to and recover from adverse events including acts of mankind (i.e., terrorism, violent crime) or of Mother Nature (i.e., weather-related challenges, natural disasters, climate change). As a result, the United States has developed a national preparedness goal. The field of emergency management plays a critical role in supporting and sustaining a national workforce capable of accomplishing the national preparedness goal. This chapter will provide a history of the law and policy that gave rise to and that supports the emergency management discipline. It will also provide a basis for including emergency management into a more inclusive concept of human security and as a necessary basis for a more complete model of national security. Chapter 8. Global Governance and The Relationships Between Nations by Keith Cozine. International Relations theory explains why nations do or do not cooperate with other to address issue that is transnational in nature. Global governance theory tries to explain the mechanisms used to facilitate this cooperation. The chapter will first define global governance in terms of the concept of governance in the absence of government and how this approach is used to address the natural and man-made security threats faces today. Key theories and concepts explored in the chapter include the theory of the State, Anarchy, Multilateralism, hard and soft law, international norms, regime theory and network theory. Various tools of global governance will be discussed in terms of how they are used to combat various natural and man-made threats to security. Chapter 9. Intelligence and Theory of Preventive Action by Erik Dahl. Intelligence in its most basic definition is about providing decision makers with knowledge or foreknowledge of the world around them. Good intelligence is essential to developing policies and strategies to deal with the wide range of threats and hazards faced by security professional today. Theories of intelligence and its use date back to the fifth century BCE and Sun Tzu’s Art of War. While Tzu’s theory focused primarily on intelligence for military conquest, uses for intelligence has expanded overtime so too have theories on intelligence and its use. This chapter examines these theories and their applications in today’s diverse threat environment Chapter 10. Human and Environmental Security Theory by James Ramsay and Terrence O’Sullivan. This chapter describes some of the various dimensions of human security—a highly complex system of “wicked problems”, and the link to an environmental security mandate, in the face of climate disruption. The 12 James D. Ramsay, Keith Cozine and John Comiskey all-encompassing climate security magnifies the need to use human security as a strategic planning priority, integrated across the more traditional notions of national and homeland security. Chapter 11. Public Health as a Critical Infrastructure by Terrence O’Sullivan and James Ramsay. One of the Nation’s 16 Critical Infrastructure Sectors, the Healthcare and Public Health Sector protects the Nation from hazards such as terrorism, infectious disease outbreaks and natural disasters. Public health can proxy several challenges posed by large complex and adaptive systems that comprise the many sectors of our nation’s economy. For example, the public health sector exemplifies the need for public–private partnerships, cybersecurity, civil liberties, privacy and international relations and the implications of climate change on security. From a threat intelligence perspective, public health includes both pandemics (such as the current COVID-19 pandemic) and epidemics as significant threats to liberty, and the free flow of people and commerce making public health an integral component of homeland security theory. Chapter 12. Law, Policy and Domestic Security by Michael McDaniel. At the end of the day, homeland security is a discipline based on law and policy. This chapter will provide an overview of key legal, policy and ethical issues and the legal and policy bases to modern Homeland Security. The chapter will examine legal concepts regarding constitutional rights of individuals, the legal process, access to courts, the law(s) of war and national security principles as they relate to homeland security legislation and policy initiatives. Legal principles of due process, habeas corpus, search and seizure, compulsory process and international agreements are explored in greater depth. The law of war will be examined in the context of preemptive war and the current National Security Strategy, as well as issues involving the status of combatants and detention. Chapter 13. Cybersecurity Policy and Theory by Maeve Dion. Both modern lifestyles and modern concepts of national security are dependent on a safe, stable and resilient cyberspace. However, to create and sustain a safe and secure cyberspace is itself a wicked problem as the threat environment is dynamic, complex and policy responses untested and value laden. This chapter will provide a survey of the broad and emergent field of cybersecurity and information assurance and how it is critical to preparedness and resilience of modern governments and private industry. Specifically, topics will include a definition of information security, the concept of threat vectors, offensive and defense policies and strategies, ethical and legal issues that surround the practice environment, risk management strategies planning and information security technology. Chapter 14. Technology—Adaptation, Management and Application by Michael Larrañaga and Patrick Smith. Technological advances are shaping the human experience at an exponential rate. There are a few theories, frameworks and models attempting to address technology, which tend to be associated with the disciplines of science and technology and communication studies. The theories attempt to address the relationship between technology and society and prompt questions about agency, determinism/autonomy and teleonomy. Homeland security professionals are charged with preventing terrorism, securing the Nation’s borders, enforcing and administering immigration laws, safeguarding and Introduction to security theory 13 securing cyberspace and ensuring resilience to disasters. Each of these mission spaces is impacted by new and emerging technologies. This chapter examines a multitude of existing and emerging technological theories, frameworks and models and their applications in the homeland security ecosystem. 1.7 Summary and conclusions This chapter discussed the nature of “theory” and presented several types of theories and how they might be used in social science research. Among these was the notion of a “grand theory”. Grand theories attempt to provide an overall explanation of social life, history or human experience. In addition, a grand theory also provides a general framework for many smaller theories—a key aspect we leveraged in order to accommodate a “theory” of homeland security. Supporting the use of a grand theoretical framework regarding homeland security, we described (and characterized) the homeland security discipline as a “discipline of disciplines” or “meta-discipline”; hence, any theory that would envelop the gestalt the homeland security enterprise would need to accommodate the breadth inherent in the component parts, or pillars, that constitute the strategies, operations and structure of the homeland security discipline. Toward this end, each chapter described above represents a pillar or contributing discipline of homeland security. Collectively, in this way, “homeland security theory” is a composite of the theoretical foundations of its disciplines that contribute to the operations, strategies and institutional structures of the homeland security enterprise. Just as all theories evolve in the presence of new research, best practices and improvements in technology, so will a grand theory of homeland security evolve as new revelations of our understanding of public health, terrorism, crime, emergency management arise, or as other disciplines contribute to the strategies, operations or even structures of the enterprise, or as improvements in technology and cybersecurity evolve. This evolution is healthy, appropriate and even expected given the wicked nature of the homeland security problem set. We hope you enjoy and benefit from this text. Notes 1. A full discussion of wicked and tame problems is beyond the scope of this chapter. Interested readers should see: Rittel and Webber (1973). Dilemmas in a general theory of planning, Policy Science, 4, 155–169; and Wicked Problems by T. Ritchey (2011), Swedish Morphological Society, Springer Publications, VI, ISBN 978-3-642-19653-9. 2. Many have commented as Bellavita that even the term “homeland security”, can have multiple meanings to different constituents; see for example: Bellavita, Christopher. (2008). Changing homeland security: What is homeland security? Homeland Security Affairs, 4(2). http://www.hsaj.org/?article=4.2.1. Hence the authors here conclude that given the institutional reality of the Department of Homeland Security, for the time being we are likely stuck with the name. 3. Complex adaptive systems are systems “… in which large networks of components with no central control and simple rules of operation give rise to complex collective behavior, sophisticated information processing, and adaptation via learning or evolution”. Mitchell (2009). Complexity: A guided tour (p. 13). USA: Oxford University Press. 4. Up to and including political ideology, which is prominent in critical current U.S. political debates about the appropriate role of government in providing public goods, from human security (social welfare safety nets, critical infrastructure and disaster response) to national (and homeland-) security priorities. 14 James D. Ramsay, Keith Cozine and John Comiskey References American Museum of Natural History. (2005). Darwin. Available at: https://www.amnh.org/ exhibitions/darwin Bellavita, Christopher. (2008). Changing homeland security: What is homeland security? Homeland Security Affairs, 4(2). Available at: http://www.hsaj.org/?article = 4.2.1 (accessed February 4, 2020). Bellavita, Christopher. (2011). Changing homeland security: In 2010 was homeland security useful? Homeland Security Affairs Journal, 6(1). Betts, R. K. (1982). Surprise attack. Washington, DC: Brookings Institute Press. Bookstaber, R. (2017). The end of theory: Financial crises, the failure of economics, and the sweep of human interaction. Princeton, NJ: Princeton University Press. Caldwell, D., & Williams Jr, R. E. (2016). Seeking security in an insecure world. Rowman & Littlefield. Church, K. (2010). Enhancing unity of effort in homeland defense, homeland security, and civil support through interdisciplinary education (Master’s thesis). Retrieved from http://www.hsdl. org/?abstract&did=25735 Comiskey, J. (2015). How do college homeland security curricula prepare students for the field? Journal of Homeland Security Education, 4, 20–40. http://www.journalhse.org/v4-comiskey. html Comiskey, J. (2018). Theory for homeland security. Journal of Homeland Security Education, 7, 29–45. Cozine, K. (2016). Fragmentation and interdependency: Border security intelligence in North America and Europe. The International Journal of Intelligence, Security, and Public Affairs, 18(3), 175–197. Creswell. J. W. (2009). Research design: Qualitative, quantitative, and mixed method approaches (3rd ed.). Los Angeles, CA: Sage. Crenshaw, M (1990). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice. Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. New York: Cambridge University Press, pp. 7–24. Darwin, C. (1859). The origin of species by means of natural selection. London: John Murray Department of Homeland Security. (2014). Quadrennial homeland security review. Available at: https://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf Dorothy Estrada-Tanck has published Human Security and Human Rights under International Law: The Protections Offered to Persons Confronting Structural Vulnerability (Hart Publishing 2016). Ek, R., & Tesfahuney, M. (2011). Theorizing the earth. In Corvellec, H. (Ed.). What is theory?: Answers from the social sciences. Copenhagen, Denmark: CBR Press. Fawcett, J., & Downs, F. (1986). The relationship of theory and research. Norwalk, CT: Appleton Century Crofts. Fischer, R.J. and Green, G. (2004) Introduction to Security. Boston, MA: ButterworthHeinemann. Glaser, B. G. (1967). The discovery of grounded theory: Strategies for qualitative observations. Chicago, IL: Aldine Publishing. Godfrey-Smith, P. (2003). Theory and reality: An introduction to the philosophy of science. Chicago, IL: University of Chicago Press. History.com Editors. (2019). The Office of Homeland Security is founded. A&E Television Networks. Available at: https://www.history.com/this-day-in-history/office-of-homelandsecurity-founded. Home Affairs. (2019). Who are we. Available at: https://www.homeaffairs.gov.au/about-us/ who-we-are/overview Joas, H., & Knobol, W. (2009). What is theory? In Social theory: Twenty introductory lectures. Cambridge, United Kingdom: Cambridge University Press. Introduction to security theory 15 Manunta, G. (1999). What is Security?. Security Journal, 12(3), 57–66. McLeod, S. (2007). Maslow’s hierarchy of needs. Simply Psychology, 1. Mills, J. S. (1959). The sociological imagination. Oxford, United Kingdom: Oxford University Press. Mitchell, Melanie. (2009). Complexity: A guided tour (p. 13). USA: Oxford University Press. Ougaard, M. (2013). What is theory in political science? In Corvellec, H. (Ed.). What is theory? Answers from the social and cultural sciences. Stockholm, Sweden: Copenhagen Business School Press. Pohl, C., Truffeer, B., & Hadron, G. H. (2017). Addressing wicked problems through transdisciplinary research. In Frodeman, R., Klein, J. T., & Pacheco, R. C. S. (Eds.). The Oxford handbook of interdisciplinarity. Oxford, United Kingdom: Oxford University Press. Public Safety Canada. (2015). About public safety Canada. Retrieved from http://www.publicsafety.gc.ca/cnt/bt/index-en.aspx#prtfl Ramsay, J. (2012). Epilogue. In Logan, K. G., & Ramsay, J. D. (Eds.) Introduction to homeland security. Boulder, CO: Westview Press. Ramsay, J. (2013). The case for accreditation in homeland security. Journal of Homeland Security Education, 2. Ramsay, J., & T. O’Sullivan. (2013). “There’s a pattern here”: The search for a theoretical framework for modern homeland security and the case of environmental security. Homeland Security Affairs Journal, Spring. Ramsay, J. D., & Renda-Tanali, I. (2018). Development of competency-based education standards for homeland security academic programs. Journal of Homeland Security and Emergency Management, 15(3). Ritchey, Tom. (2011). Wicked problems (Swedish Morphological Society, © 2005, revised 2013). http://www.swemorph.com/pdf/wp.pdf Rittel, H. W. & Webber, M. M. (1973). Dilemmas in a general theory of planning, Policy Science, 4, 155–169. Roxborough, I. (2001). The Hart-Rudman Commission and Homeland Defense, Army War College (U.S.). Strategic Studies Institute. Available at: https://www.hsdl.org/?view&did=2085 Simon, C. (2009). Safety first. The New York Times. Retrieved from http://www.nytimes. com/2010/01/03/education/edlife/03homeland.html Sjoberg, G., & Nett, R. (1968). A methodology for social research. New York, NY: Harper & Row Publishers. Skinner, Q. (1985). The return of grand theory in the human sciences. Cambridge, United Kingdom: Cambridge University Press. Turner, S. (2017). Knowledge formations: An analytic framework. In Froderman, R., Kline, J. T., & Pacheco, R. C. S. (Eds.). The Oxford handbook of interdisciplinarity (2nd ed.). Oxford, United Kingdom: Oxford University Press. University Agency Partnership Program (UAPP). (2019). Homeland security programs. Available at: https://www.uapi.us/programs/category/programs White House. (2001). Executive Order 13228: Establishing the Office of Homeland Security and the Homeland Security Council. Wolfers, A. (2011). National security as an ambiguous symbol. In Security studies: A reader (pp. 5–10). References Bernoulli, D. (1954). Evolution of a new theory on the measurement of risk (reprint). Econometrica, 22(1). 23–36. Buchanan, L., & O’Connell, A. (2006). A brief history on decision making. Harvard Business Review, 84(1), 32. Committee of Sponsored Organizations of the Treadway Commission. (2004). Enterprise risk management: Integrated framework. Retrieved from https://www.coso.org/Documents/ COSO-ERM-Executive-Summary.pdf Committee of Sponsored Organizations of the Treadway Commission. (2017). Guidance on enterprise risk management. Retrieved from https://www.coso.org/Pages/erm.aspx Department of Homeland Security. (2006). Risk analysis for fiscal year 2006 homeland security grants. Risk Management Division and DHS Office of Grants and Training. Department of Homeland Security. (2008). DHS risk lexicon. Retrieved from https://www.dhs. gov/dhs-risk-lexicon Department of Homeland Security. (2011). Risk management fundamentals: Homeland security management doctrine. Retrieved from: https://www.dhs.gov/sites/default/files/publications/ rma-risk-management-fundamentals.pdf Department of Homeland Security. (2015). Strategic national risk assessment (SNRA). Retrieved from https://www.dhs.gov/strategic-national-risk-assessment-snra Gigerenzer, G., & Selten, R. (2001). Bounded rationality: The adaptive toolbox. MIT Press. Head, B. W. (2019). Forty years of wicked problems literature: Forging closer links to policy studies. Policy and Society, 38(2), 180–197. Iowa State University. (2018). COSO. Retrieved from https://www.internalaudit.iastate.edu/ internal-controls/coso Laplace, P.S. (1902). A philosophical essay on probabilities. Translated by Frederick Wilson Truscott and Frederick Lincoln Emory, New York, NY: John Wiley & Sons. Nutley, S. M., Walter, I., & Davies, H.T.O. (2007). Using evidence: How research can inform public service. Bristol, United Kingdom: The Policy Press. Quadrennial Homeland Security Review. (2010). Quadrennial homeland security review report. Retrieved from https://www.dhs.gov/sites/default/files/publications/2010-qhsrexecutive-summary.pdf Rittle, H. W. J., & Webber, M. M. (1973). Developments in design methodology. New York, NY: John Wiley & Sons. Van der Waal, D., & Versluis, V. (2017). Introduction to risk management: Main principles of the risk management process. Retrieved from http://www.perm.lv/wp-content/uploads/2017/11/ PermIntroToRM.pdf Anti-Defamation League. (2019). Murder and extremism in the United States in 2018. New York: ADL. Ausserladscheider, V. (2019). Beyond economic insecurity and cultural backlash: Economic nationalism and the rise of the far right. Sociology Compass, 13(4), e12670. Azarian, B. (2016). Fear and anxiety drive conservatives’ political attitudes. Psychology Today (December 31, 2016). https://www.psychologytoday.com/us/blog/ mind-in-the-machine/201612/fear-and-anxiety-drive-conservatives-political-attitudes Bajc, V. (2013). Sociological reflections on security through surveillance. Sociological Forum, 28(3). Bajc, V., & De Lint, W. (Eds.). (2011). Security and everyday life (Vol. 10). Routledge. Bakir, V. (2015). ‘Veillant panoptic assemblage’: Mutual watching and resistance to mass surveillance after Snowden. Media and Communication, 3(3) 12–25. Baldwin, D.A. (1997). The concept of security. Review of International Studies, 23(1), 5–26. Bamber, J. L., et al. (2019). Ice sheet contributions to future sea-level rise from structured expert judgment. Proceedings of the National Academy of Sciences, 116(23), 11195–11200. Bates, A. (2017). Stingray: A new frontier in police surveillance. Cato Institute Policy Analysis, 809. Bauman, Z., et al. (2014). After Snowden: Rethinking the impact of surveillance. International Political Sociology, 8(2), 121–144. Baylis, J., Smith, S., & Owens, P. (Eds.). (2017). The globalization of world politics: An introduction to international relations. Oxford University Press. BBC News. (2019). Europe and right-wing nationalism: A country-by-country guide (November 13, 2019). https://www.bbc.com/news/world-europe-36130006 Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland Security Affairs, 4(2), http://www.hsaj.org/?Article = 4.2.1 Bellavita, C. (2011). Changing homeland security: In 2010 was homeland security useful? Homeland Security Affairs Journal, 6, 1 (February). Borns, P. (2018). The Great Recession was a big step backward for black homeowners. USA Today (February 24). Bricker, J., Kennickell, A. B., Moore, K. B., & Sabelhaus, J. (2012). Changes in US family finances from 2007 to 2010: Evidence from the survey of consumer finances. Federal Reserve Bulletin, 98(2), 1–80. Buchheit, P. (2018). What just happened? $30 trillion to the richest White Americans since 2008. Common Dreams (September 3) Buzan, B., Wæver, O., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers. Calhoun, C. (2002). Dictionary of the social sciences. Oxford University Press. Chappelow, J. (2019). Gig economy. Investopedia (June 25). https://www.investopedia.com/ terms/g/gig-economy.asp Chetty, R., Grusky, D., Hell, M., Hendren, N., Manduca, R., & Narang, J. (2017). The fading American dream: Trends in absolute income mobility since 1940. Science, 356(6336), 398–406. Christakis, N. A., & Fowler, J. H. (2013). Social contagion theory: Examining dynamic social networks and human behavior. Statistics in Medicine, 32(4), 556–577. Citrin, J., & Stoker, L. (2018). Political trust in a cynical age. Annual Review of Political Science, 21, 49–70. Coats, Daniel R. (2019). Worldwide threat assessment of the US intelligence community. Washington, DC: Office of the director of national intelligence. Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: Sacrificing civil liberties in the name of national security. The New Press. Cole, D., Blanton, T., Wasserman, E., & Mills, J. (2015). After Snowden: Privacy, secrecy, and security in the information age. Macmillan. Conger, K., Fausset, R., & Kovaleski, S. F. (2019). San Francisco bans facial recognition technology. New York Times, 15. Corbett, J. (2019). More than 90% of Democratic voters want 2020 candidate to make climate action and Medicare for All top priorities: Poll. Common Dreams (April 30). Corbridge, S. (2004). From Marshall plan to Washington consensus? Globalization, democratization, and ‘national’ economic planning. In The Marshall plan today: Model and metaphor (pp. 241–269). Cornwell, Susan, & Patricia Zengerle (2020). U.S. Senate approves nearly $500 billion more for coronavirus bailout. Reuters (April 21, 2020). Craig, Stephen C. (2018). Broken contract?: Changing relationships between Americans and their government. Routledge. Crawford, N. C. (2019). United States budgetary costs and obligations of post-9/11 wars through FY2020: $6.4 Trillion. Watson Institute Report (November 1, 2013). Dabla-Norris, M. E., Kochhar, M. K., Suphaphiphat, M. N., Ricka, M. F., & Tsounta, E. (2015). Causes and consequences of income inequality: A global perspective. International Monetary Fund. Dale, C. (2014). The 2014 quadrennial defense review (QDR) and defense strategy: Issues for Congress. Congressional Research Service. Da Silva, C. (2019). Nearly 80 percent of Americans do not believe immigration boosts crime. Newsweek (March 14, 2019). https://www.newsweek.com/ americans-poll-immigration-boosts-crime-1363060 Devereux, S., & Edwards, J. (2004). Climate change and food security. IDS Bulletin, 35(3), 22–30. Drake, B. (2015). Divide between blacks and whites on police runs deep. Pewresearch.org, 19. Dunlap, R. E. (2019) Partisan polarization on the environment grows under Trump. Gallup (April 5, 2019). https://news.gallup.com/opinion/gallup/248294/partisan-polarizationenvironment-grows-trump.aspx Dunlap, R. E., Aaron M. McCright &Jerrod H. Yarosh (2016). The political divide on climate change: Partisan polarization widens in the U.S., Environment: Science and Policy for Sustainable Development, 58(5), 4–23. https://doi.org/10.1080/00139157.2016.1 208995 Estrada-Tanck, D. (2016). Human security and human rights under international law: The protections offered to persons confronting structural vulnerability. Bloomsbury Publishing. Farley, R. (June 27, 2018). Is illegal immigration linked to more or less crime? Factcheck. org. https://www.factcheck.org/2018/06/is-illegal-immigration-linked-to-more-or-lesscrime/ Friedman, L. (2019). In a switch, some Republicans start citing climate change as driving their policies. New York Times (April 30, 2019). https://www.nytimes.com/2019/04/30/climate/ republicans-climate-change-policies.html Gifford, R. (2015). The road to climate hell. New Scientist, 227(3029), 28–33. Gottfried, J., & Shearer, E. (2017). Americans’ online news use is closing in on TV news use. Pew Research Center, 7. Graetz, M. J. (2018). Foreword-The 2017 tax cuts: How polarized politics produced precarious policy. Yale LJF, 128, 315. Greenwald, G. (2014). How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations. The Intercept (February 24, 2014). https://theintercept.com/2014/02/24/ jtrig-manipulation/ Grieco, K. A. (2018). The 2018 national defense strategy: Continuity and competition. Strategic Studies Quarterly, 12(2), 3–9. Hinds, J., & Joinson, A. (2017). Radicalization, the internet and cybersecurity: Opportunities and challenges for HCI. International conference on human aspects of information security, privacy, and trust. Cham: Springer. Hymas, L. (2019). Climate silence was the big problem in 2018. In 2019, we’ve got new challenges: Fox News is distorting the national dialogue about the Green New Deal just as it’s getting going. Media Matters (April 3, 2019). Illing, S. (2019). An autopsy of the American dream: A conversation with Tailspin author Steven Brill. Vox.com (March 12, 2019). https://www.vox.com/2018/6/28/17469080/ american-dream-steven-brill-inequality-poverty-tailspin Irish Parliament. (2019). Irish Parliament declares a climate emergency. The Guardian (May 10, 2019). Retrieved from https://www.theguardian.com/environment/2019/may/10/ irish-parliament-declares-climate-emergency Jones, C. I. (2015). Pareto and Piketty: The macroeconomics of top income and wealth inequality. Journal of Economic Perspectives, 29(1), 29–46. Jones, S. G. (2018). The rise of far-right extremism in the United States. CSIS Briefs, 7. Krause, K. (1998). Critical theory and security studies: The research programme of critical security studies. Cooperation and Conflict, 33(3), 298–333. Krugman, Paul (2020). Covid-19 brings out all the usual zombies: Why virus denial resembles climate denial. New York Times (March 28, 2020). Lightman, D., Lowry, B., & Clark, L. (2019). Democrats plan new push on election security, voting rights. McClatchy (May 7, 2019). https://www.mcclatchydc.com/news/politics-government/congress/article230076034.html Lyon, D. (2015). Surveillance after Snowden. John Wiley & Sons. Mantyla, K. (2019). Rick Wiles Is ‘Trying to Provoke a Goyim Uprising’ to Overthrow America’s Jewish Slave Masters. Right Wing Watch (May 23, 2019). https://www.rightwingwatch.org/post/rick-wiles-is-trying-to-provoke-a-goyim-uprising-to-overthrow-americasjewish-slave-masters/ McCreight, R. (2019). Grid collapse security, stability and vulnerability issues: Impactful issues affecting nuclear power plants, chemical plants and natural gas supply systems. Journal of Homeland Security and Emergency Management, 16(1). McGrath, M. (2016). 63% of Americans don’t have enough savings to cover a $500 emergency. Forbes.com. Mekhennet, Souad (2020). Far right and radical Islamist groups are exploiting coronavirus turmoil. Washington Post (April 10, 2020). Milman, O., & Harvey, F. (2019). US is hotbed of climate change denial; major global survey finds. The Guardian. Retrieved from https://www.theguardian.com.environment/2019/may/07/ us-hotbed-climate-change-denial-international-poll Monmouth University Polling Institute. (2018). Climate concerns increase; most republicans now acknowledge change (November 29, 2018). https://www.monmouth.edu/polling-institute/ reports/monmouthpoll_us_112918/ Norman, J. (2018). Americans’ concerns about national crime abating. Gallup (November 17, 2018). https://news.gallup.com/poll/244394/americans-concerns-national-crime-abating. aspx O’Sullivan, T. M., & Ramsay, J. (2015). Defining and distinguishing homeland from national security and climate-related environmental security, in theory and practice. Journal of Homeland Security and Emergency Management, 12(1), 43–66. Oswald, Margit E., & Grosjean, Stefan (2012). Confirmation bias. In Cognitive illusions (pp. 91–108). Psychology Press. Pohl, R. F. (2012). Introduction: Cognitive illusions. In Cognitive illusions (pp. 13–32). Psychology Press. Pachauri, R. K., & Reisinger, A. (2007). IPCC fourth assessment report. Geneva: IPCC. Pew Research Center. (2018). The generational gap in America: Race, immigration, same-sex marriage, abortion, global warming, gun policy, marijuana legalization (March 1, 2018). Pew Research Center. (2019). Public’s 2019 priorities: Economy, health care, education and security all near top of list (January 24, 2019). https://www.people-press.org/2019/01/ 24/publics-2019-priorities-economy-health-care-education-and-security-all-near-topof-list/ Pickering, J., & Barry, C. (2012). On the concept of climate debt: Its moral and political value. Critical Review of International Social and Political Philosophy, 15(5), 667–685. https://doi.org /10.1080/13698230.2012.727311 Poushter, J., & Huang, C. (2019). Climate change still seen as the top global threat, but cyberattacks a rising concern. Pew Research Center (February 10, 2019). Public Policy Polling (PPP). (2018). Data from March 9-11, 2018. https://socialsecurityworks. org/wp-content/uploads/2018/03/Nat-Social-Security-March-18-2-Results.pdf Robinson, P. (2005). The CNN effect: The myth of news, foreign policy and intervention. Routledge. Romm, J. (2019). 2018 was a year of alarming climate reports, but you wouldn’t know it watching TV news. Think Progress (March 11, 2019). https://thinkprogress.org/ climate-change-mainstream-media-coverage-2018-4d76f27dbbf8/ Rothschild, E. (1995). What is security? Daedalus, 124(3), 53–98. Retrieved from www.jstor.org/ stable/20027310 Rydgren, J. (Ed.). (2018). The Oxford handbook of the radical right. Oxford University Press. Schwartzburg, R. The ‘white replacement theory’ motivates alt-right killers the world over. The Guardian (August 5, 2019). https://www.theguardian.com/commentisfree/2019/aug/05/ great-replacement-theory-alt-right-killers-el-paso Shepherd, S. (2018). Gun control support surges in polls. Politico (February 28, 2018). https:// www.politico.com/story/2018/02/28/gun-control-polling-parkland-430099 Stein, L., Cornwall, S., & Tanfani, J. (2018). Inside the progressive movement roiling the Democratic Party. Reuters (August 23, 2018). https://www.reuters.com/investigates/ special-report/usa-election-progressives/ Stokel-Walker, C. (2019). The backlash against face recognition has begun. New Scientist, 242(3232) 9. Šulović, V. (2010). Meaning of security and theory of securitization. Belgrade Centre for Security Policy, 1–7. Tackett, M. (2019). Key takeaways from Trump’s decision to use a National Emergency Declaration to build a border wall. New York Times (February 15, 2019). The Hill. (6 February 2019). New poll finds overwhelming support for an annual wealth tax (February, 6, 2019). https://thehill.com/hilltv/what-americas-thinking/428747-new-pollamericans-overwhelmingly-support-taxing-the-wealth-of Tipson, F. S. (2013). Natural disasters as threats to peace. U.S. Institute of Peace (Special Report 325) (February 2013). Trombetta, M. J. (2008). Environmental security and climate change: Analysing the discourse. Cambridge Review of International Affairs, 21(4) 585–602. Urwin, D. W. (2014). The community of Europe: A history of European integration since 1945. Routledge. U.S. Department of Defense. (2014). Department of Defense 2014 Climate Change Adaptation Roadmap. Office of the Deputy Under Secretary of Defense for Installations and Environment. U.S. State Department. (2019). The Truman Doctrine and Marshall Plan. https://history.state. gov/departmenthistory/short-history/truman (accessed March 2019) Wæver, O. (1993). Identity, migration and the new security agenda in Europe. Pinter Publishers. Wæver, O. (2010). Towards a political sociology of security studies. Security Dialogue, 41(6), 649–658. Wendt, A. (1999). Social theory of international politics. Cambridge University Press. Williams, Z. (2018). ‘Raw hatred’: Why the “incel” movement targets and terrorises women [Internet]. The Guardian. Wuebbles, D. J., Fahey, D. W., & Hibbard, K. A. (2017). Climate science special report: Fourth national climate assessment (Vol. I). Zaitchik, A. (2010). ‘Patriot’ Paranoia: A look at the top ten conspiracy theories. Southern Poverty Law Center. Zimmerman, R., Zhu, Q., De Leon, F., & Guo, Z. (2017). Conceptual modeling framework to integrate resilient and interdependent infrastructure in extreme weather. Journal of Infrastructure Systems, 23(4), 04017034. Anderton, C. H., & Carter, J. R. (2005). On rational choice theory and the study of terrorism. Defence and Peace Economics, 16(4), 275–282. Asal, Victor H., et al. (2009). The softest of targets: A study on terrorist target selection. Journal of Applied Security Research, 4(3). 258–278. https://doi.org/10.1080/19361610902929990 Atlas, Randall. (1990). ‘Offensible Space’ – Law and order obstruction through environmental design. In Proceedings of the human factors society annual meeting. Atlas, Randall. (1991). The other side of CPTED. Security Management Magazine, March 1991. https://www.cpted-security.com/wp-content/uploads/the_other_side_cpted.pdf Bailey, William C., & Smith, Ronald W. (1972). Punishment: Its severity and certainty. The Journal of Criminal Law, Criminology, and Police Science, 63(4), 530. https://doi.org/ 10.2307/1141807 Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland Security Affairs, 4(2). Bosworth, M., & Hoyle, C. (2011). What is criminology? An introduction. In What is Criminology? (pp. 1–11). Oxford University Press. Brantingham, Paul J., & Faust, Frederic L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284–296. https://doi.org/10.1177/001112877602200302 Canetti-Nisim, Daphna, et al. (2006). Victimization from terrorist attacks: Randomness or routine activities? Terrorism and Political Violence, 18(4), 485–501. https://doi.org/ 10.1080/09546550600880237 Caplan, Bryan. (2006). Terrorism: The relevance of the rational choice model. Public Choice, 128(1–2), 91–107. https://doi.org/10.1007/s11127-006-9046-8 Casteel, Carri, & Peek-Asa, Corinne. (2000). Effectiveness of crime prevention through environmental design (CPTED) in reducing robberies. American Journal of Preventive Medicine, 18(4), 99–115. https://doi.org/10.1016/s0749-3797(00)00146-x Cauley, J., & Im, E. (1988). Intervention policy analysis of skyjackings and other terrorist incidents. American Economic Review, 78(2), 27–31. Clarke, R. V. G., & Newman, Graemer R. (2006). Outsmarting the terrorists. Praeger Security International. Clarke, Ronald V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150. https:// doi.org/10.1086/449230 Clarke, R. V. G. (1980). ‘Situational’ crime prevention: Theory and practice. The British Journal of Criminology, 20(2), 136–147. https://doi.org/10.1093/oxfordjournals.bjc.a047153 Coaffee, Jon. (2004). Rings of steel, rings of concrete and rings of confidence: Designing out terrorism in central London pre and post September 11th. International Journal of Urban and Regional Research, 28(1). Cohen, Lawrence E., & Marcus Felson. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588. https://doi.org/ 10.2307/2094589. Comiskey, John. (2017). Homeland-hometown security: A coherent national strategy to protect the homeland. Journal of Human Security and Resilience, 1(2). Congressional Research Service (CRS). (2004). Report for Congress “Guarding America: Security Guards and U.S. Critical Infrastructure Protection” November 12, 2004. Cornish, Derek B., & Clarke, Ronald V. (1989). Crime specialisation, crime displacement and rational choice theory. In Criminal behavior and the justice system research in criminology (pp. 103–117). https://doi.org/10.1007/978-3-642-86017-1_7 Cornish, Derek B., & Clarke, Ronald V. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933–948. https://doi .org/10.1111/j.1745-9125.1987.tb00826.x Cothren, Jackson, et al. (2008). Geospatial and temporal patterns of preparatory conduct among American terrorists. International Journal of Comparative and Applied Criminal Justice, 32(1), 23–41. https://doi.org/10.1080/01924036.2008.9678776 Cozens, P. M. (2008). New urbanism, crime and the suburbs: A review of the evidence. Urban Policy and Research, 26(4), 429–444. Cozens, Paul Michael, et al. (2005). Crime prevention through environmental design (CPTED): A review and modern bibliography. Property Management, 23(5), pp. 328–356. https://doi.org/ 10.1108/02637470510631483 Cozens, Paul, & Love, Terence. (2017). The dark side of crime prevention through environmental design (CPTED). In Oxford research encyclopedia of criminology and criminal justice. https://doi.org/10.1093/acrefore/9780190264079.013.2 Cozens, Paul, & Love, Terence. (2015). A review and current status of crime prevention through environmental design (CPTED). Journal of Planning Literature, 30(4), 393–412. https://doi.org/ 10.1177/0885412215595440 Crowe, Timothy D. (2000). Crime prevention through environmental design: Applications of architectural design and space management concepts. Butterworth-Heinemann. Ditton, J., & Farrall, S. (Eds.). (2015). The fear of crime. Routledge Eck, J. E., Rothman, J., Bailey, J., & Dammert, L. (2006). Police-community conflict and crime prevention in Cincinnati, Ohio (pp. 225–244). Pittsburgh, PA: University of Pittsburgh Press. Ekblom, Paul. (2010). Deconstructing CPTED… and reconstructing it for practice, knowledge management and research. European Journal on Criminal Policy and Research, 17(1), 7–28. https://doi.org/10.1007/s10610-010-9132-9 Elster, Jon. (1986). Rational choice. New York University Press. Felson, Marcus. (1994). Crime and everyday life: Insights and implications for society. Sage. Felson, Marcus. (1995). Those who discourage crime. Crime and Place, 4, 53–66. Felson, Marcus, & Clarke, R. V. G. (1998). Opportunity makes the thief: Practical theory for crime prevention. Great Britain: Home Office, Policing and Reducing Crime Unit. Freilich, Joshua D., & Lafree, Gary. (2014). Criminology theory and terrorism: Introduction to the special issue. Terrorism and Political Violence, 27(1), 1–8. https://doi.org/10.1080/ 09546553.2014.959405 FEMA. (2013). Defensible space and CPTED: Origins and applications. https://www.fema.gov/ media-library-data/20130726-1624-20490-3298/430_a.pdf Fussey, Pete. (2009). An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Security Journal, 24(1), 85–99. https://doi.org/10.1057/sj.2009.11 Global Society of Homeland Security Professionals (GSHSP). (2019). Law Enforcement and the Fusion Center. Globalhomeland.org. Hale, C. (1996). Fear of crime: A review of the literature. International Review of Victimology, 4(2), 79–150. https://doi.org/10.1177/026975809600400201. Hsu, Henda Y., & Mcdowall, David. (2017). Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. Journal of Research in Crime and Delinquency, 54(6), 930–957. https://doi.org/ 10.1177/0022427817719309 Jacobs, J. (1961). The uses of sidewalks: safety. The City Reader, 114–118. Jeffery, C. R. (1959). Pioneers in criminology: The historical development of criminology. The Journal of Criminal Law, Criminology, and Police Science, 50(1), 3–19. Kettl, Donald F. (2003). Contingent coordination. The American Review of Public Administration, 33(3), 253–277. https://doi.org/10.1177/0275074003254472 Kiltz, Linda, & Ramsay, James D. (2012). Perceptual framing of homeland security. Homeland Security Affairs, 8, Article 16. https://www.hsaj.org/articles/230 Kleemans, Edward R., et al. (2012) Organized crime, situational crime prevention and routine activity theory. Trends in Organized Crime, 15(2–3), 87–92. https://doi.org/10.1007/ s12117-012-9173-1 Laufer, W. (2017). The criminology of criminal law. Routledge. Matijosaitiene, Irina, & Petriashvili, Ana. (2017). Urban planning and design for terrorism resilient cities. Journal of Sustainable Architecture and Civil Engineering, 18(1), https://doi.org/ 10.5755/j01.sace.18.1.15443 Matusitz, Jonathan Andre. (2015). Symbolism in terrorism: Motivation, communication, and behavior. Rowman & Littlefield. McGee, Jim. (2001). Ex-FBI officials criticize tactics on terrorism. The Washington Post, WP Company, 28 Nov. 2001. www.washingtonpost.com/archive/politics/2001/11/28/ ex-f bi-officials-criticize-tactics-on-terrorism/51b59615-12bd-4c72-97dc-859183d12640/? noredirect=on Merry, Sally E. (1981). Defensible space undefended. Urban Affairs Quarterly, 16(4), 397–422. https://doi.org/10.1177/107808748101600401 Moffatt, Ian. (1983). Modelling the environment as a dynamic system. Environmental Conservation, 10(4), 348–349. https://doi.org/10.1017/s0376892900013084 NCPC (National Crime Prevention Council). (2019). Best practices for using crime prevention through environmental design in weed and seed sites. https://www.ncpc.org/wp-content/ uploads/2017/11/NCPC_BestPracticesCPTED.pdf NCPC (National Crime Prevention Council). (2017). Crime prevention through environmental design training program. National Crime Prevention Council, 18 Nov. 2017. www.ncpc. org/resources/home-neighborhood-safety/crime-prevention-through-environmentaldesign-training-program/ National Institute of Hometown Security (2020) About us, available at https://www.thenihs. org/aboutus New Jersey State Department of Transportation (NJDOT) (2017) Employing crime prevention through environmental design in the NJ safe routes to school program, a review of literature and recommendations: available at: http://www.saferoutesnj.org/wp-content/ uploads/2018/09/SRTS-CPTED-Topic-Report.pdf Newman, O. (1972). Defensible space. New York: Macmillan. Newman, O., & National Institute of Law Enforcement and Criminal Justice. (1973). Architectural design for crime prevention (pp. 2700–00161). Washington, DC: National Institute of Law Enforcement and Criminal Justice. Newman, O. (1975). Reactions to the “defensible space” study and some further findings. International Journal of Mental Health, 4(3), 48–70. Newman, Oscar. (1996). Creating defensible space. BiblioGov Project. Newmann, W. W. (2002). Reorganizing for national security and homeland security. Public Administration Review, 62, 126–137. Nunn, Sam. (2005). Preventing the next terrorist attack: The theory and practice of homeland security information systems. Journal of Homeland Security and Emergency Management, 2(3), https://doi.org/10.2202/1547-7355.1137 NYC.Gov. (n.d.). Active design supplement: Promoting safety. https://www1.nyc.gov/assets/doh/ downloads/pdf/environmental/promoting-safety.pdf Olajide, S. E., Lizam, M., & Adewole, A. (2015). Towards a crime-free housing: CPTED versus CPSD. Journal of Environment and Earth Science, 5(18), 53–63. Ostrom, Elinor. (1998). A behavioral approach to the rational choice theory of collective action: Presidential address, American Political Science Association, 1997. American Political Science Review, 92(1), 1–22. https://doi.org/10.2307/2585925. Parkin, W. S., & Freilich, J. D. (2014). Routine activities and right-wing extremists: An empirical comparison of the victims of ideologically-and non-ideologically-motivated homicides committed by American far-rightists. Terrorism and Political Violence, 27(1), 182–203. Perry, Simon, & Hasisi, Badi. (2014). Rational choice rewards and the jihadist suicide bomber. Terrorism and Political Violence, 27(1), 53–80. https://doi.org/10.1080/09546553.2014.962991 Reese, S. (2012). Defining homeland security: Analysis and congressional considerations. Congressional Research Service, Library of Congress. Relyea, H. C. (2002, August). Homeland Security: Department Organization and Management. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE. Reynald, Danielle M., & Elffers, Henk. (2009). The future of Newman’s defensible space theory. European Journal of Criminology, 6(1), 25–46. https://doi.org/10.1177/1477370808098103 Reynald, Danielle M. (2010). Translating CPTED into crime preventive action: A critical examination of CPTED as a tool for active guardianship. European Journal on Criminal Policy and Research, 17(1), 69–81. https://doi.org/10.1007/s10610-010-9135-6 Rossmo, D. Kim, & Harries, Keith. (2011). The geospatial structure of terrorist cells. Justice Quarterly, 28(2), 221–248. https://doi.org/10.1080/07418820903426197 Row, Arthur T., & Jacobs, Jane. (1962). The death and life of great American cities. The Yale Law Journal, 71(8), 1597. https://doi.org/10.2307/794509 Rutgers and U.S. DOT (Department of Transportation). (2017). Employing crime prevention through environmental design in the NJ safe routes to school program: A review of literature and recommendations, Nov. 2017. http://www.saferoutesnj.org/wp-content/uploads/2018/09/ SRTS-CPTED-Topic-Report.pdf Schneider, Richard H. (2003) American anti-terrorism planning and design strategies: Applications for Florida growth management, University of Florida Journal of Law and Public Policy, 15, 129. Scott, John. (2000). Rational choice theory. In Understanding contemporary society: Theories of the present (pp. 126–138). https://doi.org/10.4135/9781446218310.n9 Shearing, C. D. (1989). Decriminalizing criminology: Reflections on the literal and topological meaning of the term. Canadian Journal of Criminology, 31, 169. Smith, R. W. (2005). What is homeland security? Developing a definition grounded in the curricula. Journal of Public Affairs Education, 11(3), 233–246. Stark, Rodney. (1987). Deviant places: A theory of the ecology of crime. Criminology, 25(4), 893–910. https://doi.org/10.1111/j.1745-9125.1987.tb00824.x St. Petersburg Police Dept. (n.d.). CPTED brochure. https://police.stpete.org/crime-prevention/ brochures/cpted-brochure.pdf Vito, G. F., & Maahs, J. R. (2015). Criminology. Jones & Bartlett Publishers. Weiser, Benjamin, & Baker, Al. (2011). A bridge under scrutiny, by plotters and the police. The New York Times. Yancey, William L. (1971). Architecture, interaction, and social control. Environment and Behavior, 3(1), 3–21. https://doi.org/10.1177/001391657100300101 Abrahams, M. (2008). What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy. International Security, 32(4), 78–105. Adamson, F. B. (2005). “Globalisation, Transnational Political Mobilisation, and Networks of Violence” Cambridge Review of International Affairs, Vol. 18, No. 1 April 2005. Arce M, D. G., & Sandler, T. (2003). An evolutionary game approach to fundamentalism and conflict. Journal of Institutional and Theoretical Economics (JITE)/Zeitschrift für die gesamte Staatswissenschaft, 132–154. Arendt, H. (1963). Eichmann in Jerusalem: A report on the banality of evil. New York, N.Y., U.S.A: Penguin Books. Barber, B. (1996). Jihad vs. McWorld. New York: Ballantine Books. Beck, C. J. (2008). The contribution of social movement theory to understanding terrorism. Sociology Compass, 2(5), 1565–1581. Borgatti, S. P., Mehra, A., Brass, D. J., & Labianca, G. (2009). Network analysis in the social sciences. Science, 323(5916), 892–895. Braithwaite, A., & Chu, T. S. (2018). Civil Conflicts Abroad, Foreign Fighters, and Terrorism at Home. Journal of Conflict Resolution, 62(8), 1636–1660. https://doi.org/10.1177/ 0022002717707304 Celso, A. N. (2015). The Islamic state and Boko Haram: Fifth wave jihadist terror groups. Orbis, 59(2), 249–268. Cowell, F. (1985). Microeconomic Principles. Oxford: Oxford University Press. Cozine, K. (2010). Transgovernmental networks as a tool to combat terrorism: How ICE attachés operate overseas to combat terrorist travel (Doctoral dissertation, Rutgers UniversityGraduate School-Newark). Crenshaw, M. (1981). The Causes of Terrorism. Comparative Politics, 13(4), pp. 379–399. Crenshaw, M. (1988). Theories of Terrorism: Instrumental and Organizational Approaches. Inside Terrorist Organizations. New York: Columbia University Press, pp. 13–31. Crenshaw, M (1990). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice. Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. New York: Cambridge University Press, pp. 7–24. Dalgaard-Nielsen, A. (2008). Studying violent radicalization in Europe I: The potential contribution of social movement theory. Danish Institute for International Studies. Enders, W., & Sandler, T. (1993). The Effectiveness of Antiterrorism Policies: A VectorAutoregression-Intervention Analysis. American Political Science Review, 87(4), 829–844. doi:10.2307/2938817 Enders, W., Sandler, T. (1995). Terrorism: Theory and applications. Handbook of Defense Economics, 1, 213–249. Frey, B. S., & Luechinger, S. (2005). Measuring terrorism. Law and the State: A Political Economy Approach: New Horizons in Law and Economics, Cheltenham, UK: Edward Elgar Publishing, 142–181. Gallagher, M. J. (2017). The 2016 ‘lone wolf’tsunami-Is Rapoport’s ‘religious wave’ending?. Journal of Strategic Security, 10(2), 60–76. Gibbs, J. (2018) Terrorist attacks targeting the police: the connection to foreign military presence, Police Practice and Research, 19:3, 222–240, DOI: 10.1080/15614263.2017.1295245 Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78, 1360–1380. Hamm, M. S., & Spaaij, R. (2017). The Age of Lone Wolf Terrorism. La Vergne: Columbia University Press. Huntington, Samuel. “P,(1996). The Clash of Civilizations and the Remaking of World Order.” Simon and Schuster: New York. Hirschmann, K. (2000) The Changing Face of Terrorism. International Politik und Gesellschaft. No. 3. pp 299–310. Hoffman, B. (2006). Inside terrorism. New York, NY: Columbia University Press. Honig, O., & Yahel, I. (2019). A fifth wave of terrorism? The emergence of terrorist semi-states. Terrorism and Political Violence, 31(6), 1210–1228. Huntington, S. (1996). The Clash of Civilizations and the Remaking of World Order. New York: Touchstone Books. Jackson, B. A. (2006). Groups, networks, or movements: A command-and-control-driven approach to classifying terrorist organizations and its application to al-Qaeda. Studies in Conflict & Terrorism, 29(3), 241–262. https://doi.org/10.1080/10576100600564042 Jensen, L. (2003). Coming of age in a multicultural world: Globalization and adolescent cultural identity formation. Applied Developmental Science, 7(3), 189–196. Kaplan, J. (2007). The fifth wave: The new tribalism? Terrorism and Political Violence, 19(4), 545–570. Kellner, D. (2002). September 11, social theory and democratic politics. Theory, Culture & Society, 19(4), 147–159. https://doi.org/10.1177/0263276402019004011 Kreps, D. (1990). A course in microeconomic theory (p. 480). Princeton, NJ: Princeton University Press. Langhorne, R. (2006). Global civil society. In The essentials of global politics, London, United Kingdom: Hodder Arnold. Laqueur, W. (1996). Postmodern terrorism. Foreign Affairs, September/October 1996, pp. 24–36. McCormack, W. (2003). The Military-Judicial Nexus in Response to Terrorism: KKK and AlQaeda. bepress Legal Series, 46. McEvily, B., Brass, D. J., Labianca, G., Mehra, A., Halgin, D. S., & Borgatti, S. P. (2014). Do you know my friend? Attending to the accuracy of egocentered network data. Contemporary perspectives on organizational social networks, 40, 295-313. Milgram, S. (1967). The small world problem, Psychology Today, 60–67. Neiberg, M. (2017). No more elsewhere: France faces the new wave of terrorism, The Washington Quarterly, 40(1), 21–38. https://doi.org/10.1080/0163660X.2017.1302736 Oberschall, A. (2004). Explaining terrorism: The contribution of collective action theory. Sociological Theory, 22(1), 26–37. Retrieved from http://www.jstor.org/stable/3648957 Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. PS: Political Science and Politics, 44(1), 45–50. Perrow, C. (1986). Complex organizations: A critical essay New York, NY: Random House. Porta, D. d. (1992). Introduction: In individual motivations in underground political organizations. In Dontaella della Porta (Ed.). Social movements and violence. London, United Kingdom: JAI Press. Post, J. M., McGinnis, C., & Moody, K. (2014). The changing face of terrorism in the 21st century: The communications revolution and the virtual community of hatred. Behavioral Sciences & the Law, 32, 306–334. https://doi.org/10.1002/bsl.2123 Rapoport, D. C. (2004). The four waves of modern terrorism. Attacking terrorism: Elements of a grand strategy (p. 54, 3–11). Washington, DC: Georgetown University Press 2004. Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2. Riker, W. (1995). The political psychology of rational choice theory. Political Psychology, 16(1), 37. Sageman, Marc, (2004). Understanding Terror Networks, Philadelphia: University of Pennsylvania Press. Sandler, T. & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy. 20. 301–316. 10.1016 Schock, K. (2005). Unarmed insurrections: People power movements in nondemocracies. Minneapolis, MN: University of Minnesota Press. Schwartz, S., Dunkel, C., & Waterman, A. (2009). Terrorism: An identity theory perspective. Studies in Conflict and Terrorism, 32(6), 537–559. https://doi.org/10.1080/10576100902888453 Smith, G. D. (1998). Single issue terrorism. Canadian Security Intelligence Service, Commentary No. 74. Simon, J. (2010). Technological and lone operator terrorism. In Rosenfeld, J., Rasler, K., Thompson, W., et al. (Eds.). Terrorism, identity and legitimacy: The four waves theory and political violence. Tajfel, H., & Turner, J. (1986). The social identity theory of intergroup behavior. In The Psychology of Intergroup Behavior (pp. 7–24). Chicago, IL: Nelson Hall. Tarrow, S. G. (1998). Power in movement: Social movements and contentious politics, Cambridge, England: Cambridge University Press. Tarrow, S. (2002). The New Transnational Contention: Organization, Coalition. Mechanisms. Presentation at the Panel on “Social Movements and Transnational Social Movements” American Political Science Association Annual Meeting, September 1, 2002, Chicago. Tavares, J. (2004). The open society assesses its enemies: Shocks, disasters and terrorist attacks. Journal of Monetary Economics, 51, 1039–1107. Taylor, M. & Quayle, E. (1994). Terrorist lives. London, United Kingdom: Brassey’s Defence Publishers. US Department of State. (2002). Patterns of global terrorism, Washington, DC: US Department of State. Weinberg, L. (2013). The end of terrorism?. London Routledge. Weinberg, L. &Eubank, W. (2010). An end to the fourth wave of terrorism? Studies in Conflict & Terrorism, 33(7), 594–602. https://doi.org/10.1080/1057610X.2010.483757 Wojciechowski, S. (2017). Reasons of contemporary terrorism: An analysis of main determinants. In Sroka, A., Garrone, F., & Kumbrián, R. (Eds.). Radicalism and terrorism in the 21st century: Implications for security (pp. 49–70). Frankfurt am Main, Germany: Peter Lang AG. Zutlevics, T. L. (2002). Towards a theory of oppression. Ratio, 15(1), 80. https://doi.org/ 10.1111/1467-9329.00177 Agranoff, R. (2005). Managing collaborative performance: Changing the boundaries of the state? Public Performance & Management Review, 29(1). Alexander, R. A. (2012). Emergent social software platforms for sharing and collaboration on criminal information and intelligence (Master’s thesis). Naval Postgraduate School, Monterey, CA. Ansell, G., & Gash. A. (2005). Collaborative governance in theory. Journal of Public Administration Research and Theory. https://doi.org.10.1093/jopart/mumo32 Bardach, E. (1998). Getting agencies to work together: The practice and theory of managerial craftsmanship. Washington, DC: Brookings Institute. Behn, R. D. (2014). The PerformanceStat potential: A leadership strategy for producing results. Washington, DC: Brookings Institute. Billeaudeaux, M. A. (2007). Leveraging citizens and cultivating vigilance for force multiplication in the maritime domain (Master’s thesis). Naval Postgraduate School, Monterey, CA. Birkland, T. A. (1997). After disaster: Agenda setting, public policy, and focusing events. Washington, DC: Georgetown University Press. Bleakney, E. (2009). Finding the “sweet spot” for catastrophic incident search and rescue (Master’s thesis). Naval Postgraduate School, Monterey, CA. Bradley, D. J. (2015). Applying the THIRA to special events: A framework for capabilities planning adoption in local governments (Master’s thesis). Naval Postgraduate School, Monterey, CA. Bratton, W., & Tumin, Z. (2012). Collaborate or perish: Reaching across boundaries in a networked world. New York, NY: Random House. Campasano, N. (2010). Community preparedness: Creating a model for change (Master’s thesis). Naval Postgraduate School, Monterey, CA. Center for Disease Control. (2020, February 7). 2019 Novel coronavirus (2019-nCoV) situation summary. Washington, DC: Author. Retrieved from https://www.cdc.gov/ coronavirus/2019-nCoV/summary.html Chertoff, M. (2009). Homeland security: Assessing the first five years. Philadelphia, PA: University of Pennsylvania Press. Church, K. (2010). Enhancing unity of effort in homeland defense, homeland security, and civil support through interdisciplinary education (Master’s thesis). Naval ion Postgraduate School, Monterey, CA. Clovis, S. H. (2006). Federalism, homeland security, and national preparedness: A case study in the development of public policy. Homeland Security Affairs, 2(3). Retrieved from http:// www.hsaj.org/?article=2.3.4 Coates, D. R. (2019). Statement for the record of the U.S. Intelligence community: Worldwide threat assessment. Senate Select Committee on Intelligence. Office of the Director of National Intelligence. Washington. DC: Author. Comiskey, J. (2017). Homeland-hometown security: A coherent national strategy to protect the homeland. Journal of Human Security and Resilience, 1(2). Comiskey, J., & Larrañaga, M. (2019). Climate security: A pre-mortem approach to a sustainable future. Homeland Security Affairs. 15(8). Commission on Intergovernmental Affairs. (1955). A report to the president for transmittal to congress. Washington, DC: Government Printing Office. Creech, B. (1994). The five pillars of TQM: How to make total quality management work for you. New York, NY: Dutton Adult. Cromwell, B. (2018). Area maritime security committees and the maritime transportation system (Master’s thesis). Naval Postgraduate School, Monterey, CA. Dale, C. (2012). In brief: Clarifying the concept of “Partnership” in national security. CRS Report No. R42516). Washington, DC: Congressional Research Service. Department of Homeland Security. (2003). Department of homeland security seal. Press Release. https://www.dhs.gov/department-homeland-security-seal Department of Homeland Security. (2005a). Interim national preparedness goal. Washington, DC: Author. Department of Homeland Security. (2005b). Interim infrastructure protection plan. Washington, DC: Author. Department of Homeland Security. (2008). National response framework. Washington, DC: Author. Department of Homeland Security. (2010a). Quadrennial homeland security review report. Washington. DC: Author. Department of Homeland Security. (2010b). Risk lexicon. Washington, DC: Author. Department of Homeland Security. (2011a). The strategic national risk assessment in support of PPD8: A comprehensive risk-based approach toward a secure and resilient nation. Washington, DC: Author. Department of Homeland Security. (2011b). National preparedness goal. Washington, DC: Author. Department of Homeland Security. (2012). Climate change adaptation roadmap. Washington, DC: Author. Department of Homeland Security. (2013). NIPP 2013: Partnering for critical infrastructure security and resilience. Washington, DC: Author. Department of Homeland Security. (2015a). National preparedness goal. Washington, DC: Author. Department of Homeland Security. (2015b). National preparedness report. Washington, DC: Author. Department of Homeland Security. (2016). Tools and resources to help businesses plan, prepare, and protect from an attack. Washington, DC: Author. Retrieved from https://www.dhs.gov/ sites/default/files/publications/Hometown-Security-Fact-Sheet-04062016-508.pdf Department of Homeland Security. (2017). National preparedness report. Washington, DC: Author. Department of Homeland Security. (2019a). 2019 National threat and hazard identification and risk assessment (THIRA). Washington, DC: Author. Department of Homeland Security. (2019b). The Department of Homeland Security strategic plan. Fiscal years 2020–2024. Washington, DC: Author. Department of Homeland Security. (2019c). Confronting the opioid crisis [fact sheet]. Washington, DC: Author. Retrieved from https://www.dhs.gov/sites/default/files/ publications/19_0424_s1_opioid-fact-sheet_v2.pdf DiGiacomo, R.J. (2010). Prostitution as a possible funding mechanism for terrorism (Master’s thesis). Naval Postgraduate School, Monterey, CA. Downs, A. (1972). Up and down with ecology: The issue-attention cycle, The Public Interest, 28, 38–50. Duggan, J. (2011). The New York City Urban search and rescue team (NY-TF-1): A case study of interagency effectiveness (Master’s thesis). Naval Postgraduate School, Monterey, CA. Emerson, K. & Nabatchi, T. (2015). Collaborative governance regime. Washington, DC: Georgetown University Press. Esposito, J. (2011). New York City Fire Department chief officer’s evaluation of the citywide incident management system as it pertains to interagency emergency response (Master’s thesis). Naval Postgraduate School, Monterey, CA. Fahey, M. J. (2012). Understanding “swift trust” to improve interagency collaboration in New York City (Master’s thesis). Naval Postgraduate School, Monterey, CA. Federal Emergency Management Agency. (2019). National Threat and Hazard Assessment (THIRA). Washington, DC: Author. Foster-Fishman, P.G., Berkowitz, S. L, Lounsbury, D. W., Jacobson, S., & Allen, N. (2001). Building collaborative capacity in community coalitions: A review and integrative framework. American Journal of Community Psychology, 29(2). Gomez, D. (2013). Should cops be spies? Evaluating the collection and sharing of national security intelligence by state, local, and tribal law enforcement (Master’s thesis). Naval Postgraduate School, Monterey, CA. Government Accountability Office. (2005). Report to the Chairman, Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Results-oriented government: Practices that can help enhance collaboration among federal agencies (GAO-06-15). Washington, DC: Government Printing Office. Government Accountability Office. (2009). Report to Congressional committees, Interagency collaboration: Key issues for congressional oversight of national security strategies, organizations, workforce, and information sharing (GAO-09-904SP). Washington, DC: Government Printing Office. Government Accountability Office. (2012). Managing for results: Key considerations for implementing interagency collaborative mechanisms (GAO-12-1022). Washington, DC: Government Printing Office. Government Accountability Office. (2018a). National security: Long-range emerging threats facing the United States as identified by federal agencies (GAO-19-204SP). Washington, DC: Government Printing Office. Government Accountability Office. (2018b). Managing for results: Government-wide actions needed to improve agencies’ use of performance information in decision making (GAO-18-609SP). Washington, DC: Government Printing Office. Government Accountability Office. (2018c). Clearer roles and responsibilities for the office of strategy, Policy, and Plans and workforce planning would enhance its effectiveness. Report to the subcommittee on oversight and management efficiency, committee on homeland security, house of representatives (GAO-18-590). Washington, DC: Government Printing Office. Government Accountability Office. (2019). High-risk series. Substantial efforts needed to achieve greater progress on high-risk areas (GAO-19-157SP). Washington, DC: Government Printing Office. Hall, R. D. (2011). Smart practices in building interorganizational collaborative capacity to strengthen the Florida comprehensive disaster management enterprise (Master’s thesis). Naval Postgraduate School, Monterey, CA. Hamel, G., Doz, Y. L., & Prahalad, C. K. (1989). Collaborate with your competitors and win. Harvard Business Review (January–February), 133–139. Harrington, M. (2014). New York City’s first responders: Enhancing collaboration between NYPD and FDNY (Master’s thesis). Naval Postgraduate School, Monterey, CA. Hocevar, S. P., Thomas, G. F., & Jansen, E. (2006). Building collaborative capacity: An innovative strategy for homeland security preparedness. In Beyerlein, M., Beyerlein, S., & Kennedy, F. Innovation through collaboration, Advances in Interdisciplinary Studies of Work Teams (Vol. 12, pp. 255–274). Amsterdam: Elsevier Ltd. Hocevar, S. P., Thomas, G. F, & Jansen, E. (2011). Inter-organizational collaboration: Addressing the challenge. Homeland Security Affairs, 7, (September, the 9/11 essays). Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2136. Retrieved from http://www .dhs.gov/xlibrary/assets/hr_5005_enr.pdf Imperial, M. (2005). Using collaboration as a governance strategy: Lessons from six watershed management programs. Administration and Society, 37(3), 281–320. Intelligence Reform and Prevention of Terrorism Act. (2004). Pub. L. No. 108-458, 118 Stat. 3638. Johnson, J. (2014, April 22). Memorandum for DHS leadership. Washington, D.C: Author. Retrieved from file:///C:/Users/john/Downloads/805139%20(1).pdf Kaiser, F. M. (2011). Interagency collaborative arrangements and activities: Types, rationales, considerations (CRS Report No. R41803). Washington, DC: Congressional Research Service. Kamarck, E. C. (2002). Applying 21st century government to the challenge of homeland security. The Forum, 1(2). Kettl, D. F. (2003). Contingent coordination: Practical and theoretical puzzles for homeland security. American Review of Public Administration, 33(3). https://doi.org.10.1177/0275074003254472 Kirk, P. (2014). Community preparedness: Alternate approaches to citizen engagement in homeland security (Master’s thesis). Naval Postgraduate School, Monterey, CA. Knoke, D. (1990). Political networks: The structural perspective. Cambridge, UK: Cambridge University Press. Marie, C. (2010). Arctic region policy: Information sharing model options (Master’s thesis), Naval Postgraduate School, Monterey, CA. McChrystal, S., Collins, T., Silverman, D., & Fussel, C. (2015). Team of teams: New rules of engagement for a complex world. New York, NY: Penguin. Meadows, D.H.(2008). Thinking in systems: A primer. White River Junction, VT: Chelsea Green Publishing. Merriam-Webster. (2005). Merriam-Webster’s dictionary (11th ed.). Springfield, MA: Merriam-Webster. Morton, J. F. (2012). The next-generation homeland security: Network federalism and the course to national preparedness. Annapolis, MD: Naval Institute Press. Mueller, R. (2019). Report on the investigation into Russian interference in the 2016 presidential election (Vol. I). Washington. DC: Special Counsel Robert Mueller. Napolitano, J. (2019). How safe are we? Homeland security since 9/11. New York, NY: Hachette Book Group. National Commission on Terrorist Attacks Upon the United States. (2004). The 9/11 commission report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: Author. National Governor’s Association. (1979). Comprehensive emergency management. Washington, DC: Author. National Intelligence Council. (2017). Global trends. Paradox of progress. Washington, DC: Author. Nielsen, K. (2019). State of homeland security. Washington, DC: George Washington University. Osborne, D., & Gaebler, T.A. (1992). Reinventing government: How the entrepreneurial spirit is transforming the public sector. Reading, MA: Addison-Wesley. Pelfrey, W. V. (2005). The cycle of preparedness: Establishing a framework to prepare for terrorist threats, Journal of Homeland Security and Emergency Management, 2(1). Pelfrey, W. V., & Kelley, W. D. (2013). Homeland security: A way forward. Homeland Security Affairs, 9(3). Retrieved from http://www.hsaj.org/?article=9.1.3 Pfeffer, J., & Salancik, G. R. (1978). The external control of organizations: A Resource dependence perspective. New York, NY: Harper and Row. Philips, S. C. (2012). Rethinking disasters: Finding efficiencies through collaboration (Master’s thesis). Naval Postgraduate School, Monterey, CA. Pilkington, W. F. (2014). Risk, politics, and money: The need for a value-based model for financing public health preparedness and response (Master’s thesis). Naval Postgraduate School, Monterey, CA. Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. Research in Organizational Behavior, 12, 295–336. Ridge. T. (2004). Remarks by Secretary Ridge to National Press Club. Retrieved from http:// www.crime-research.org/library/DHS.html Ridge, T. (2009). The test of our times: America under siege….and how we can be safe again. New York, NY: Thomas Dunn Books. Rittel, H. W. &Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Science, 4, 155–169. Rodriguez, G. A. (2011). Creating domestipol; increasing national resilience by reflecting on the NYPD counterterrorism model (Master’s thesis). Naval Postgraduate School, Monterey, CA. Schaffer, P. A. (2018). Climate security threat—America’s Achilles’ heel (Master’s thesis). Naval Postgraduate School, Monterey, CA. Sekar, K. &Cornell, A.S. (2020). Domestic public health response to COVID-19: Current status and resource guide. Washington, DC: Congressional Research Service. Shannon, T. (2010). Leveraging successful collaborative processes to improve performance outcomes in large-scale event planning: Superbowl, a planned homeland security event (Master’s thesis). Naval Postgraduate School, Monterey, CA. Stevenson, W. H. (2008). Enhancing the effectiveness of National Guard support of civil authorities by improving interagency coordination (Master’s thesis). Naval Postgraduate School, Monterey, CA. Trist. E. (1983). Referent organizations and the development of interorganizational domains. Human Relations, 36(1), 269–284. United Nations. (1992). Framework convention on climate change. Secretary-General of the United Nations [Depository]. Retrieved from https://unfccc.int/resource/docs/convkp/conveng.pdfe U.S. Secret Service and Department of Education. (2004). The final report and findings of the safe school initiative: Implications for the prevention of school attacks in the United States. Washington, DC: Authors. U.S. Senate. (2006). Hurricane Katrina: A nation still unprepared. Washington, DC: Government Printing Office. USA Patriot Act. (2001). P.L. 107-56 (October 26, 2001). Wade, C. L. (2010). The California law enforcement community’s intelligence-led policing capacity (Master’s thesis). Naval Postgraduate School, Monterey, CA. Werner, A. (2008). The potential transformative impact of web 2.0 technology on the intelligence community (Master’s thesis). Naval Postgraduate School, Monterey, CA. Wesling, J. C. (2010). Securing the northern maritime border through maritime domain awareness (Master’s thesis). Naval Postgraduate School, Monterey, CA. White House. (2002). National strategy for homeland security. Washington. DC: Author. Retrieved from https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf White House. (2007). National strategy for homeland security. Washington. DC: Author. Retrieved from https://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf White House. (2010). National security strategy. Washington. DC: Author. Retrieved from http://nssarchive.us/NSSR/2010.pdf White House. (2015). National security strategy. Washington. DC: Author. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_ strategy_2.pdf White House. (2017). National security strategy. Washington. DC: Author. Retrieved from https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017- 0905.pdf White House. (2018a). National security strategy. Washington, DC. Author. White House. (2018b). National strategy for counterterrorism of the United States of America. Washington, DC: Author. White House. (2018c). National biodefense strategy. Washington, DC: Author. Retrieved from https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Biodefense-Strategy.pdf White House. (2020). Proclamation on declaring a national emergency concerning the novel coronavirus disease (COVID-19) outbreak. Brown, J. T. (2011). Presidential Policy Directive 8 and the National Preparedness System: Background and issues for Congress. CRS Report R42073. Federation of American Scientists. https://fas.org/sgp/crs/homesec/R42073.pdf Congressional Research Service. (2019). Stafford Act and acts of terrorism. Federation of American Scientists. https://fas.org/sgp/crs/homesec/R44801.pdf Disaster Mitigation Act. (2000). Public Law 106-390. FEMA. https://www.fema.gov/ media-library/assets/documents/4596 Disaster Relief Act. (1974). Public Law 93-288. Homeland Security Digital Library. https:// www.hsdl.org/?abstract&did=458661 Drabek, T. E. (1989). Emergency management, definition, vision, mission, principles. Emergency Management Institute, FEMA. https://training.fema.gov/hiedu/docs/emprinciples/0907_176% 20em%20principles12x18v2f%20johnson%20(w-o%20draft).pdf Federal Emergency Management Agency (FEMA). (2010a). Developing and maintaining emergency operations plans: Comprehensive Preparedness Guide (CPG) 101 (2nd ed.). https://www. fema.gov/media-library-data/20130726-1828-25045-0014/cpg_101_comprehensive_preparedness_guide_developing_and_maintaining_emergency_operations_plans_2010.pdf FEMA. (2010b). Publication 1. https://www.fema.gov/media-library-data/20130726-1823-250458164/pub_1_final.pdf FEMA. (2013). The Stafford Act: Robert T Stafford disaster relief and emergency assistance act, as amended. Federation of American Scientists. https://fas.org/irp/agency/dhs/fema/ stafford.pdf FEMA. (2018a). Comprehensive Preparedness Guide (CPG) 201: Threat and Hazard Identification and Risk Assessment (THIRA) and Stakeholder Preparedness Review (SPR) Guide. https:// www.fema.gov/media-library/assets/documents/165308 FEMA. (2018b). National exercise program. https://www.fema.gov/national-exercise-program FEMA. (2019a). About the agency. https://www.fema.gov/about-agency FEMA. (2019b). 2019 National threat and hazard identification and risk assessment (THIRA)— Overview and methodology. https://www.fema.gov/media-library/assets/documents/181470 Flood Control Act. (1965). Public Law 89-298. Cornell University. https://www.law.cornell. edu/topn/flood_control_act_of_1965 Homeland Security Presidential Directive 8. (2003). FAS. https://fas.org/irp/offdocs/nspd/ hspd-8.html Kahan, J. (2015). Emergency management and homeland security: Exploring the relationship. Journal of Emergency Management, 13(6), 483–498. https://doi.org/10.5055/jem.2015.0258 Kosar, K.R. (2005). Disaster response and appointment of a recovery czar: The Executive Branch’s response to the Flood of 1927. CRS Report RL 3326. Federation of American Scientists. https://fas.org/sgp/crs/misc/RL33126.pdf McCreight, R. (2009). Educational challenges in homeland security and emergency management. Journal of Homeland Security and Emergency Management, 6(1). https://doi.org/ 10.2202/1547-7355.1576 McCreight, R. (2011). Introduction to the journal of homeland security and emergency management special issue. Journal of Homeland Security and Emergency Management, Article 5. National Governors Association. (1978). Emergency preparedness project: Final report. NGA. Post Katrina Emergency Reform Act. (2006). 6 U.S.C. Ch.2, Subch. II, Part A, §748(b)(3) (2006). U.S. Congress. https://www.congress.gov/bill/109th-congress/senate-bill/3721 Ramsay, J., & Renda-Tanali, I. (2018). Development of competency-based education standards for homeland security academic programs. Journal of Homeland Security and Emergency Management, 15(3). https://doi.org/10.1515/jhsem-2018-0016 Renda-Tanali, I. (2013). Higher education in Homeland Security: Current state and future trends. In D. G. Kamien (Ed.), McGraw-Hill homeland security handbook: The definitive guide for law enforcement, EMT, and all other security professionals (2nd ed., pp. 917–935). McGraw-Hill. Robert, T. (1988). Stafford Disaster Relief and Emergency Assistance Act of 1988, Public Law 100-707. Homeland Security Digital Library. https://www.hsdl.org/?abstract&did=806354 Rubin, C. B. (2014). Local emergency management: Origins and evolution. In W. Waugh & K. Tierney (Eds.) Emergency management: Principles and practice for local government (2nd ed., pp. 25–37). ICMA Press. Rubin, C. B. (Ed.). (2020). Emergency management: The American experience (3rd ed.). Routledge. Sandy Recovery Improvement Act. (2013). Public Law 113-2. FEMA. https://www.fema.gov/ sandy-recovery-improvement-act-2013 Sylves, R. (2020). Federal emergency management comes of age, 1979–2001. In C.B. Rubin (Ed.) The American experience (3rd ed., Chapter 5). Routledge. U.S. Department of Homeland Security. (2011). The strategic national risk assessment in support of PPD 8: A comprehensive risk-based approach toward a secure and resilient nation. http:// www.dhs.gov/xlibrary/assets/rma-strategic-national-risk-assessment-ppd8.pdf U.S. DHS. (2015). National preparedness goal (2nd ed.). FEMA. https://www.fema.gov/medialibrary-data/1443799615171-2aae90be55041740f97e8532fc680d40/National_Preparedness_ Goal_2nd_Edition.pdf U.S. DHS. (2016a). What DHS does during steady-state. https://www.dhs.gov/what-dhs-doesduring-steady-state U.S. DHS. (2016b). What DHS does during a cyber attack. https://www.dhs.gov/what-dhs-doesduring-cyber-attack U.S. DHS. (2016c). What DHS does during an explosives terrorist attack. https://www.dhs.gov/ what-dhs-does-during-explosives-terrorist-attack U.S. DHS. (2016d). What DHS does during major storms and extreme weather events. https:// www.dhs.gov/what-dhs-does-during-major-storms-and-severe-weather-events U.S. DHS. (2016e). What DHS does during pandemics. https://www.dhs.gov/what-dhs-doesduring-pandemics U.S. DHS. (2016f). What DHS does during political conventions. https://www.dhs.gov/what-dhsdoes-during-political-convention U.S. DHS/Federal Emergency Management Agency (FEMA). (2017). National Incident Management System (3rd ed.). https://www.fema.gov/media-library-data/1508151197225ced8c60378c3936adb92c1a3ee6f6564/FINAL_NIMS_2017.pdf White House. (2002). National Strategy for Homeland Security. Office of Homeland Security. https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf Andreas, Peter. (2003). Redrawing the line: Borders and security in the twenty-first century, International Security, 28(2), 78–11. Andreas, P., & Nadelmann, E. (2006). Policing the globe. In Criminalization and crime control in international relations. New York, NY: Oxford University Press. Bertone, Andrea M. (2008). Combating Human Smuggling: Transnational Advocacy Networks between Thailand and the United States. Presented at the 49th Annual International Studies Association Convention, March 24–28, 2008. Bull, H. (2012). The anarchical society: A study of order in world politics. Macmillan International Higher Education. Carment, D. (2003). Assessing state failure: Implications for theory and policy. Third World Quarterly, 24(3), 407–427. Cozine, K. (2016). Fragmentation and interdependency: Border security intelligence in North America and Europe. The International Journal of Intelligence, Security, and Public Affairs, 18(3), 175–197. Donnelly, J. (2000). Realism and international relations. Cambridge University Press. Hajer, M., & Versteeg, W. (2005). Performing governance through networks. European Political Science, 4(3), 340–347. Hardin, G. (1968). The tragedy of the commons. Science, 162(3859), 1243–1248. Harvard Law School. (2019). Intergovernmental Organizations (IGOs). Retrieved from: https:// hls.harvard.edu/dept/opia/what-is-public-interest-law/public-service-practice-settings/ public-international-law/intergovernmental-organizations-igos/ International Civil Aviation Organization. (2009). Strategic objectives for ICAO. Retrieved from: http://www.icao.int/icao/en/strategic_objectives.htm International Committee of the Red Cross. (2019). What we do? Retrieved from: https://www .icrc.org/en/who-we-are Karns, M. A., & Mingst, K. A. (2010). International organizations: The politics and processes (2nd ed.). Boulder, CO: Lynne Rienner Publishers, Inc. Keck, M. E., & Sikkink, K. (1998). Activists beyond borders. Cornell University Press. Keohane, R. O., & Nye, J. S. (1974). Transgovernmental relations and international organizations. World Politics, 27(1), 39–62. Koslowski, R. (2008). Global Mobility and the Quest for an International Migration Regime. Presentation at Conference on International Migration and Development: Continuing the Dialogue – Legal and Policy Perspectives, the Center for Migration Studies (CMS) and the International Organization for Migration (IOM), New York, New York, January 17–18, 2008. Revised April 2008. Lascurettes, K. (2017). The concert of Europe and great power governance today: What can the order of 19th-century Europe teach policymakers about international order in the 21st century. RAND National Defense Research Institute Santa Monica United States. Milner, H. (1991). The assumption of anarchy in international relations theory: A critique. Review of International Studies, 17(1), 67–85. Naim, M. (2003). Five wars of globalization: The illegal trade in drugs, arms, intellectual property, people, and money is booming, Foreign Policy, 134, 28–37. Pawlak, P. (2007). From hierarchy to networks: Transatlantic Governance of homeland security, Journal of Global Change and Governance, 1(1). Rees, W. (2006). Transatlantic-counterterrorism cooperation: The new imperative, London, UK: Routledge. Rosenau, J. N. (1995). Governance in the twenty-first century, Global Governance, 1. Slaughter, A. (2004). A new world order. Princeton, NJ: Princeton University Press. Slaughter, A., & Zaring D. (2006). Networking goes international: An update. Annual Review of Law and Social Science, 2, 211–229. Telbami, S. (2002). Kenneth Waltz, neorealism, and foreign policy. Security Studies, 11(3), 158–170. United Nations. (2014). Global governance and global rules for development in the post-2015 era. Retrieved from https://www.un.org/en/development/desa/policy/cdp/cdp_publications/ 2014cdppolicynote.pdf Wapner, P. (1995). Politics beyond the states: Environmental activism and world civic politics. World Politics, 47(3). Watson, A. (2002). Evolution of international society. London, UK: Routledge. Wendt, A. (1999). Social theory of international politics. Cambridge, UK: Cambridge University Press. White House. (2011). Beyond the border: A shared vision for perimeter security and economic competitiveness, Declaration by President Obama and Prime Minister Harper of Canada—Beyond the Border, Office of the Press Secretary. Retrieved from: https:// obamawhitehouse.archives.gov/the-press-off ice/2011/02/04/declaration-presidentobama-and-prime-minister-harper-canada-beyond-bord Winston, A. (2018). Stationed overseas, but solving crimes in New York City. The New York Time (August 21, 2018). Retrieved from: https://www.nytimes.com/2018/08/21/nyregion/ terrorism-nypd-intelligence-crime.html Wyckoff, J. (2014). The prisoner’s dilemma, 1000-Word Philosophy. Retrieved from: https://1000wordphilosophy.com/2014/04/24/the-prisoners-dilemma/ Young, O. R. (Ed.). (1997). Global governance: Drawing insights from the environmental experience. MIT Press. Andrew, C., Aldrich, R. J., & Wark, W. K. (2009). Secret intelligence: A reader. New York, NY: Routledge. Betts, R. K. (1978). Analysis, war, and decision: Why intelligence failures are inevitable. World Politics, 31(1), 61–89. Betts, R. K. (1980–81). Surprise despite warning: Why sudden attacks succeed. Political Science Quarter, 95(4), 551–572. Brooks, D. (2005). The Art of Intelligence. New York Times, April 2. Builta, J. A., & Heller, E. N. (2011). Reflections on 10 years of counterterrorism analysis. Studies in Intelligence, 55(3), 1–15. Burch, J. (2007). A domestic intelligence agency for the United States? A comparative analysis of domestic intelligence agencies and their implications for homeland security. Homeland Security Affairs, 3(2), 1–16. Colby, E. A. (2007). Making intelligence smart. Hoover Institution Policy Review, August and September. https://www.hoover.org/research/making-intelligence-smart Copeland, T. E. (2017). Intelligence failure theory. Oxford Research Encyclopedia of International Studies. http://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001. 0001/acrefore-9780190846626-e-27 Dahl, E. J. (2013). Intelligence and surprise attack: Failure and success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Dahl, E. J. (2014). Finding Bin Laden: Lessons for a new American way of intelligence. Political Science Quarterly, 129(2), 179–210. Dahl, E. J. (2015). A homeland security net assessment needed now! Strategic Studies Quarterly, 9(4), 62–86. Dahl, E. J. (2018). Not your father’s intelligence failure: Why the intelligence community failed to anticipate the rise of ISIS. In al-Istrabadi, F., & Ganguly, S. (Eds.). The Future of ISIS: Regional and international implications (pp. 41–65). Washington, DC: Brookings Institution Press. Davies, P. H. J. (2002). Ideas of intelligence. Harvard International Review, 24(3), pp. 62–66. Davies, P. H. J. (2009). Theory and intelligence reconsidered. In Gill, P., Marrin, S., & Phythian, M. (Eds.). Intelligence theory: Key questions and debates (pp. 186–207). London, UK: Routledge. Davis, J. (1992). The Kent–Kendall debate of 1949. Studies in Intelligence, 36(5) 91–103. Davis, J. (2002). Sherman Kent and the profession of intelligence analysis. Sherman Kent Center for Intelligence Analysis Occasional Paper, 1(5). https://www.cia.gov/library/kent-centeroccasional-papers/vol1no5.htm Davis, J. (2009). Strategic warning: Intelligence support in a world of uncertainty and surprise. In Johnson, L. K. (Ed.). Handbook of intelligence studies (pp. 173–188). New York, NY: Routledge. Elder, G. (2006). Intelligence in war: It can be decisive. Studies in Intelligence, 50(2). https:// www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/ studies/vol50no2 Ferris, J. (2018). Intelligence in war. Oxford Research Encyclopedia of International Studies. http://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.0001/ acrefore-9780190846626-e-405 Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: Offense, defense, and deception in cyberspace. Security Studies, 24(2), 316–348. Gentry, J. A. (2016). Toward and theory of non-state actors’ intelligence. Intelligence and National Security, 31(4), 465–489. Gentry, J. A., & Gordon, J. S. (2018). U.S. strategic warning intelligence: Situation and prospects. International Journal of Intelligence and CounterIntelligence, 31(1), 19–53. Gill, Peter. (2010). Theories of intelligence. In Johnson, L. K. (Ed.). The Oxford handbook of national security intelligence (pp. 43–58). New York, NY: Oxford University Press. Griffith, S. B. (1963). Sun Tzu the art of war (translation). London, UK: Oxford University Press. Handel, M. (1984). Intelligence and the problem of strategic surprise. The Journal of Strategic Studies, 7(3), 229–281. Handel, M. (2001). Masters of war: Classical strategic thought (3rd ed.). London, UK: Routledge. Hastedt, G. P., & Skelley, B. D. (2009). Intelligence in a turbulent world: Insights from organization theory. In Gill, P., Marrin, S., & M. Phythian, Intelligence theory: Key questions and debates (pp. 112–130). London, UK: Routledge. Hedley, J. H. (2009). Analysis for strategic intelligence. In Johnson, L. K. (Ed.), Handbook of intelligence studies (pp. 211–226). New York, NY: Routledge. Heidenrich, J. G. (2007). The intelligence community’s neglect of strategic intelligence. Studies in Intelligence, 51(2), 15–26. Herman, M. (2005). Review of John Keegan. Intelligence in War. War in History, 12(4), 453–485. Hillebrand, C., & Hughes, R. G. (2017). The quest for a theory of intelligence. In R. Dover, H. Dylan, & M. Goodman (Eds.), The Palgrave handbook of security, risk and intelligence (pp. 1–24). Basingstoke, UK: Palgrave. Honig, O. R. (2007). A new direction for theory-building in intelligence studies. International Journal of Intelligence and CounterIntelligence, 20(4), 699–716. Hughes, R. G., & Koutsoukis, A. (2018). Clausewitz first, and last, and always: War, strategy and intelligence in the twenty-first century. Intelligence and National Security, 34(3), 438–455. Hulnick, A. (2006). What’s wrong with the intelligence cycle. Intelligence and National Security, 21(6), 959–979. Jenkins, B. M. (2006). Unconquerable Nation: Knowing our enemy, strengthening ourselves. Santa Monica, CA: RAND Corporation. Jervis, R. (2010). Why intelligence fails: Lessons from the Iranian revolution and the Iraq War. Ithaca, NY: Cornell University Press. Johnson, L. K. (2003). Preface to a theory of strategic intelligence. International Journal of Intelligence and CounterIntelligence, 16(4), 638–663. Johnson, L. K. (2010). Bricks and mortar for a theory of intelligence. Comparative Strategy, 22(1), 1–28. Joint Chiefs of Staff. (2013). Joint Publication 2-0, Joint Intelligence. Washington, DC. Kahn, D. (1986). Clausewitz and intelligence. The Journal of Strategic Studies, 9(2–3), 117–126. Kahn, D. (2001). An historical theory of intelligence. Intelligence and National Security, 16(3), 79–92. Keegan, J. (2004). Intelligence in war: The value—and limitations—of what the military can learn about the enemy. New York, NY: Vintage Books. Kendall, W. (1949). The function of intelligence. World Politics, 1(4), 542–552. Kent, S. (1949). Strategic intelligence for American World Policy. Princeton, NJ: Princeton University Press. Lewandowski, C., & Guidetti, R. (2018). The role of fusion centers in homeland security. In Logan, K. G. (Ed.), Homeland security and intelligence (2nd ed., pp. 173–192). Santa Barbara, CA: ABC-CLIO. Logan, K. G. (Ed.). (2018). Homeland security and intelligence (2nd ed.). Santa Barbara, CA: Praeger. Lowenthal, M. M. (2017). Intelligence: From secrets to policy (7th ed.). Thousand Oaks, CA: CQ Press. MacEachin, D. (2005). Analysis and estimates: Professional practices in intelligence production. In Sims, J. E., & Gerber, B. (Eds.). Transforming U.S. Intelligence (pp. 115–133). Washington, DC: Georgetown University Press. Marrin, S. (2007). Intelligence analysis theory: Explaining and predicting analytic responsibilities. Intelligence and National Security, 22(6), 821–846. Marrin, S. (2014). Improving intelligence studies as an academic discipline. Intelligence and National Security, 31(2), 266–279. Marrin, W. (2018). Evaluating intelligence theories: Current state of play. Intelligence and National Security, 33(4), 479–490. Medina, C. (2002). What to do when traditional models fail: The coming revolution in intelligence analysis. Studies in Intelligence, 46(3). https://www.cia.gov/library/ center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3 National Research Council. (2011). Intelligence analysis for tomorrow: Advances from the behavioral and social sciences. Committee on behavioral and social science research to improve analysis for national security. Washington, DC: National Academies Press. Phythian, M. (2009). Intelligence theory and theories of international relations: Shared world or separate worlds? In Gill, P., Marrin, S., & Phythian, M. (Eds.), Intelligence theory: Key questions and debates (pp. 54–72). London, UK: Routledge. Priest, D., &Arkin, W. M. (2011). Top secret America: The rise of the new American security state. New York, NY: Little, Brown and Company. Rogg, J. P. (2018). ‘Quo Vadis?’ A comparatist meets a theorist searching for a grand theory of intelligence. Intelligence and National Security, 33(4), 541–552. Scott, L., & Jackson, P. (2004). The study of intelligence in theory and practice. Intelligence and National Security, 19(2), 139–169. Sims, J. (2014). The theory and philosophy of intelligence. In Dover, R., Goodman, M. S., & Hillebrand, C. (Eds.), Routledge companion to intelligence studies (pp. 42–49). London, UK: Routledge. Steiner, J. E. (2015). Homeland security intelligence. Los Angeles, CA: CQ Press. The Economist. (2003). America needs more spies. The Economist, July 10. Treverton, G. F. (2018). Theory and practice. Intelligence and National Security, 33(4), 472–478. Treverton, G. F., Jones, S. G., Boraz, S., & Lipscy, P. (2006). Toward a theory of intelligence: Workshop report. Santa Monica, CA: RAND. United States Secret Service National Threat Assessment Center. (2019). Protecting America’s Schools: A U.S. Secret Service Analysis of Targeted School Violence. Washington, DC. Warner, M. (2002). Wanted: A definition of ‘intelligence’. Studies in Intelligence, 46(3). https:// www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/ studies/vol46no3/article02.html Warner, M. (2004). Review of intelligence in war: Knowledge of the enemy from Napoleon to al-Qaeda. Studies in Intelligence, 48(2), 67–69. Warner, M. (2006). The divine skein: Sun Tzu on Intelligence. Intelligence and National Security, 21(4), 483–492. Warner, M. (2014). Theories of intelligence: The state of play. In Dover, R., Goodman, M. S., & Hillebrand, C. (Eds.), Routledge Companion to Intelligence Studies (pp. 25–32). London, UK: Routledge. Webb, J.M. (2009). Review of intelligence theory: Key questions and debates. Studies in Intelligence, 53(2). https://www.cia.gov/library/center-for-the-study-of-intelligence/csipublications/csi-studies/studies/vol53no2/intelligence-theory-key-questions-and-debates.html Wheaton, K. J., & Beerbower, M. T. (2006). Towards a new definition of intelligence. Stanford Law and Policy Review, 17, 319–330. Wirtz, J. J. (2003). Theory of surprise. In Betts, R. K. & Mahnken, T. G. (Eds.), Paradoxes of strategic intelligence: Essays in honor of Michael I. Handel (pp. 101–116). New York, NY: Routledge. Wirtz, J. J. (2006). Responding to surprise. Annual Review of Political Science, 9, 45–65. Zegart, A. B. (2007). Spying blind: The CIA, the FBI, and the origins of 9/11. Princeton, NJ: Princeton University Press. Alley, Richard B. (2011). Earth: An operator’s manual. New York, NY: W. W. Norton & Company. Associate Press (AP). (2012). Climate change fears overblown, says ExxonMobil boss. The Guardian (June 28, 2012). http://www.guardian.co.uk/environment/2012/jun/28/ exxonmobil-climate-change-rex-tillerson Baragona, S. (2011). Food price spikes helped trigger Arab Spring, researchers say. Voice of America (December 13, 2011). http://www.voanews.com/content/article-2011-food-pricespikes-helped-trigger-arab-spring-135576278/149523.html Bellavita, C. (2008). Changing homeland security: What is homeland security? Homeland Security Affairs, IV(2). http://www.hsaj.org/?article=4.2.1# Bhattacharyya, A., & Werz, M. (2012). Climate change, migration, and conflict in Southern Asia: Rising tensions and policy options across the subcontinent. Center for American Progress Report (December 2012). Breisinger, C., Ecker, O., & Al-Riffai, P. (2011), Economics of the Arab awakening. Washington, DC: International Food Policy Research Institute. http://www.ifpri.org/publication/ economics-arab-awakening Buzan, B., & Hansen, L. (2009). The Evolution of international security studies. Cambridge, MA: Cambridge University Press. Buzan, B., Wæver, O., Wæver, O., & de Wilde, J. (1998), Security: A new framework for analysis. Boulder, CO: Lynne Rienner Publishers. Caballero-Anthony, M. (Ed.). (2015). An introduction to non-traditional security studies: A transnational approach. Sage. Cai, Y., & Lontzek, T. S. (2019). The social cost of carbon with economic and climate risks. Journal of Political Economy, 127(6), 2684–2734. https://doi.org/10.1086/701890 Chalecki, E. (2002). Environmental security: A case study of climate change. Pacific Institute for Studies of Development, Environment, and Security. http://www.pacinst.org/reports/ environment_and_security/ Commission on Human Security (CHS). (2003). Human security now. New York. https://reliefweb.int/sites/reliefweb.int/files/resources/91BAEEDBA50C6907C1256D19006A9353-chssecurity-may03.pdf Conway, E. (2008). What’s in a name? Global warming vs. climate change. Washington, DC: National Aeronautics and Space Administration (NASA). Internet Resource, News Topics> Looking at Earth> Feature (December 5). Cook, J. (2010). The scientific guide to global warming skepticism. SkepticalScience.com (December 2010). http://www.physics.smu.edu/pseudo/GlobalWarming/Guide_to_ Skepticism.pdf Cook, J. (2016). Countering climate science denial and communicating scientific consensus. In Oxford Research Encyclopedia of Climate Science. https:// ox for d r e.c o m /c l i m at e s c i e n c e / v i e w/10.10 93/a c r e for e /978 019 022 862 0.0 01.0 0 01/ acrefore-9780190228620-e-314?print=pdf Cook, J., Supran, G., Lewandowsky, S., Oreskes, N., & Maibach, E. (2019). America misled: How the fossil fuel industry deliberately misled Americans about climate change. Fairfax, VA: George Mason University Center for Climate Change Communication. Dennis, B. (2019). Trump makes it official: U.S. will withdraw from the Paris climate accord. Washington Post (November 4, 2019). https://www.washingtonpost.com/climate-environment/ 2019/11/04/trump-makes-it-official-us-will-withdraw-paris-climate-accord/ Eckstein, D., Hutfils, M.L., & Winges, M. (2018). Global climate risk index 2019: Who suffers most from extreme weather events? Weather-related loss events in 2017 and 1998 to 2017. Germanwatch Nord-Süd Initiative eV. Estrada-Tanck, 2016 Human Security and Human Rights under International Law: The Protections Offered to Persons Confronting Structural Vulnerability. London, Hart Publishing, 360 pp. ISBN 9781509902385 Gilmore, E. A., & St. Clair, T. (2018). Budgeting for climate change: Obstacles and opportunities at the US state level. Climate policy, 18(6), 729–741. Jay, A., Reidmiller, D., Avery, C., Barrie, D., DeAngelo, B., Dave, A. & Dzaugis, M. (2018). The Fourth National Climate Assessment: Summary findings and overview. https://doi.org/10.1002/ essoar.10500761.1 Jotzo, F., Depledge, J., & Winkler, H. (2018). US and international climate policy under President Trump. Kirsten, H. E. (2016). Climate change federalism. In Elgar encyclopedia of environmental law (pp. 337–347). Edward Elgar Publishing Limited. Lanicci, J., Ramsay, J., & Murray, E. (2017) Reconceptualizing environmental security as resilience: Strategic planning for human and national security. Journal of Human Security and Resilience, 1(1). Lenton, T. M., Rockström, J., Gaffney, O., Rahmstorf, S., Richardson, K., Steffen, W., & Schellnhuber, H. J. (2019). Climate tipping points—too risky to bet against. Nature, 575, 592–595. Lewandowsky, S., Pilditch, T. D., Madsen, J. K., Oreskes, N., & Risbey, J. S. (2019). Influence and seepage: An evidence-resistant minority can affect public opinion and scientific belief formation. Cognition, 188, 124–139. Lloyd, E. A., & Oreskes, N. (2019). Climate change attribution. Epistemology and Philosophy of Science, 56(1), 185–201. Maier, C. S. (1990). Peace and security for the 1990s. Unpublished paper for the MacArthur Fellowship Program, Social Science Research Council (June 12, 1990). Mann, M. E., Lloyd, E. A., & Oreskes, N. (2017). Assessing climate change impacts on extreme weather events: The case for an alternative (Bayesian) approach. Climatic Change, 144(2), 131–142. Mason, J. (2013). The history of climate science. Skeptical Science (April 7, 2013). http://www. skepticalscience.com/history-climate-science.html Masson-Delmotte, V., Zhai, P., Pörtner, H. O., Roberts, D., Skea, J., Shukla, P. R., … &Connors, S. (2018). Summary for policymakers. Global warming of 1.5°C. An IPCC Special Report on the impacts of global warming of 1.5°C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change. https://www.ipcc.ch/2018/10/08/summaryfor-policymakers-of-ipcc-special-report-on-global-war ming-of-1-5c-approved-bygovernments/ Mattis, J. (2018). Summary of the 2018 national defense strategy of the United States of America. Department of Defense Washington United States. McElroy, M. B., & Baker, D. J. (2013). Climate extremes: Recent trends with implications for national security. Vermont Journal of Environmental Law, 15, 727. Millennium Project. (n.d.). Environmental security definitions. http://www.millennium-project .org/millennium/es-2def.html Moore, G., Hatzodony, J., Cronin, K., & Brekenridge, M. (2010). Homeland security-related education and the private liberal arts college, Homeland Security Affairs, VI(2). http://www. hsaj.org/?article=6.2.4 Moulson, G. (2012). Japan tsunami pushes 2011 into record for insurance losses. Associated Press (January 8, 2012). http://www.tulsaworld.com/business/article. aspx?subjectid=51&articleid=20120108_51_E2_CUTLIN520922 Munich RE. (2019). The natural disasters of 2018 in figures (last updated January, 2019). https://www.munichre.com/topics-online/en/climate-change-and-natural-disasters/naturaldisasters/the-natural-disasters-of-2018-in-figures.html National Intelligence Council (NIC). (2012). Global trends 2030: Alternative worlds (December 2012). https://www.dni.gov/files/documents/GlobalTrends_2030.pdf Obama, B. (2015). 2015 US National Security Strategy. https://obamawhitehouse.archives.gov/ sites/default/files/docs/2015_national_security_strategy_2.pdf O’Sullivan, T.M., & Ramsay, J. (2012). Environmental security and public health, In Keith Logan &James Ramsay, (Eds.). Introduction to homeland security. Westview Press. O’Sullivan, T. M., & Ramsay, J. (2014). Defining and distinguishing homeland from national security and climate-related environmental security, in theory and practice. Journal of Homeland Security and Emergency Management, 12(1), 43–66. Pew Project on Energy, Security and Climate. (2010) Pew Project on National Security, Energy and Climate Reacts to Department of Defense’s Quadrennial Defense Review, Press Release (February 3, 2010). http://www.pewtrusts.org/news_room_detail. aspx?id=57140. Poloczanska, E., Mintenbeck, K., Portner, H. O., Roberts, D., & Levin, L. A. (2018, February). The IPCC special report on the ocean and cryosphere in a changing climate. In 2018 Ocean Sciences Meeting. AGU. Polson, C., Persyn, J., & Cupp, S. (2010). Partnership in progress: A model for development of a homeland security graduate degree program, Homeland Security Affairs, VI(2). http://www .hsaj.org/?article=6.2.3 Preiser, R., Biggs, R., De Vos, A., & Folke, C. (2018). Social-ecological systems as complex adaptive systems: Organizing principles for advancing research methods and approaches. Ecology and Society, 23(4). Ramsay, J. D., & O’Sullivan, T. M. (2013). There’s a pattern here: The case to integrate environmental security into homeland security strategy. Homeland Security Affairs, 9(6). Retrieved from https://commons.erau.edu/db-security-studies/10 Ramsay, J., & Renda-Tenali, I. (2018) Journal of Homeland Security and Emergency Management. https://doi.org/10.1515/jhsem-2018-0016 Ramsay, J., Cutrer, D. & Raffel, R. (2010). Development of an outcomes-based, undergraduate curriculum in homeland security. Homeland Security Affairs, VI(2). http://www.hsaj. org/?article=6.2.4; Ramsay, J., & Kiltz, L. (2013). Critical issues within the homeland security enterprise: A casebook. Boulder, CO: Westfield Press, Praeger Publications. Reese, S. (2013). Defining homeland security: Analysis and congressional considerations (Congressional Research Service, January 8, 2013). Revelle, R., & Suess, H. E. (1957). Carbon dioxide exchange between atmosphere and ocean and the question of an increase of atmospheric CO2 during the past decades. Tellus, 9(1), 18–27. Ricke, K., Drouet, L., Caldeira, K. et al. Country-level social cost of carbon. Nature Clim Change 8, 895–900 (2018). https://doi.org/10.1038/s41558-018-0282-y Romm, J. J. (1993). Defining national security: The nonmilitary aspects (p. 5). New York: Council on Foreign Relations Press. Rosenthal, E. (2012). Race is on as ice melt reveals Arctic treasures. New York Times (September 18, 2012). http://www.nytimes.com/2012/09/19/science/earth/arctic-resourcesexposed-by-warming-set-off-competition.html?pagewanted=all&_r=0 Ritchey, T. (2013). Wicked problems. Swedish Morphological Society (2005, revised 2013). http:// www.swemorph.com/pdf/wp.pdf Samet, J. M., & Woodward, A. (2018). National government denial of climate change and state and local public health action in a federalist system. American Journal of Public Health, 108(S2), S112–S113. ScienceDaily. (2011). Climate change threatens global security, warn medical and military leaders. From the British Medical Journal as cited at ScienceDaily (April 5, 2011). http://www. sciencedaily.com/releases/2011/04/110405194110.htm Sen, B. (2018). The brutal racial politics of climate change and pollution: Trump administration policies are systematically making natural disasters more harmful for the poor and people of color. Indigenous Policy Journal, 28(3). Shi, W, Wang, S, & Yang, Q. (2010). Climate change and global warming, Reviews in Environmental Science and Bio/Technology, 9, 99–102. Snell, M.B. (2018). Unlikely Ally: How the military fights climate change and protects the environment. Heyday Press. Steinbruner, J. D., Stern, P., & Husbands, J. L. (2013). Climate and social stress: Implications for security analysis. National Academies of Science Report (p. 1). Tankersley, J., & Hart, A. C. (2009). Bush-era EPA document on climate change released. Los Angeles Times (October 1, 2009). http://articles.latimes.com/2009/oct/14/nation/ na-epa-climate14 Thunberg, Greta (2019). Our house in on fire: Greta Thunberg, 16, urges leaders to act on climate. The Guardian (January 25, 2019). https://www.theguardian.com/environment/2019/ jan/25/our-house-is-on-fire-greta-thunberg16-urges-leaders-to-act-on-climate Townsend, M., & Harris, P. (2004). Now the Pentagon tells us: Climate change will destroy us. The Guardian UK (February 21, 2004). http://www.guardian.co.uk/environment/2004/feb/22/ usnews.theobserver UN Environment Programme. (2019). Emissions gap report 2019. United Nations (26 November). https://www.unenvironment.org/resources/emissions-gap-report-2019 United Nations Human Security Unit. (2009). Human security in theory and practice. United Nations Trust Fund for Human Security. http://hdr.undp.org/en/media/HS_ Handbook_2009.pdf US Department of Defense. (2011). The quadrennial defense review (May 2011). http://www .defense.gov/qdr/ USGCRP. (2017). In D. J. Wuebbles et al. (Eds.), Climate science special report: Fourth national climate assessment (NCA4) (Vol. 1, 470 pp). U.S. Global Change Research Program. https:// doi.org/10.7930/J0J964J6 Vidal, J. (2012). Arctic expert predicts final collapse of sea ice within four years. The Guardian UK (September 17, 2012). http://www.guardian.co.uk/environment/2012/sep/17/ arctic-collapse-sea-ice Waever, Ole. (1995). Securitization and desecuritization. In Ronnie Lipschutz (Ed.), On security (pp. 46–86). New York, NY: Columbia University Press. Watts, J. (2019). ‘No doubt left’ about scientific consensus on global warming, say experts. The Guardian (July 24, 2019). https://www.theguardian.com/science/2019/jul/24/ scientific-consensus-on-humans-causing-global-warming-passes-99 White House. (2006). United States National Security Strategy of 2006. Washington, DC: Government Printing Office. http://merln.ndu.edu/whitepapers/USnss2006.pdf Wirsing, R. G. (2012). The Brahmaputra: Water hotspot in Himalayan Asia. Global Water Forum (June 2, 2012). http://www.globalwaterforum.org/2012/06/02/the-brahmaputrawater-hotspot-in-himalayan-asia/ World Bank (2012). Turn down the heat: Why a 4°C warmer world must be avoided (World Bank Report, Potsdam Institute for Climate Impact Research and Climate Analytics, November 2012). Yale Global Online. (2012). Climate skeptic reverses course (August 1, 2012). http://yaleglobal .yale.edu/content/koch-funded-climate-change-skeptic-reverses-course Adalja, A. A., Toner, E., & Inglesby, T. V. (2015). Clinical management of potential bioterrorism-related conditions. New England Journal of Medicine, 372(10), 954–962. Barry, J. M. (2004). The site of origin of the 1918 influenza pandemic and its public health implications. Journal of Translational medicine, 2(1), 3. Brown, G. G., & Cox, Jr, L. A. (2011). How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis: An International Journal, 31(2), 196–204. CDC. (2012). Lessons of disease occurrence: Section 8: Concepts of disease occurrence. Retrieved from https://www.cdc.gov/csels/dsepd/ss1978/lesson1/section8.html (Accessed April 12, 2020). CDC (2013). Untreatable: Report by CDC details today’s drug-resistant health threats. Retrieved from: https://www.cdc.gov/media/releases/2013/p0916-untreatable.html, Accessed September 20, 2020. Centers for Disease Control and Prevention (CDC). (2018). The public health system and the 10 essential public health services. USA. Retrieved from https://www.cdc.gov/publichealthgateway/publichealthservices/essentialhealthservices.html (Accessed December 2019). CDC. (2019). Cities readiness initiative. Retrieved from https://www.cdc.gov/cpr/readiness/ mcm/cri.html (Accessed December 2019). CDC Foundation. (2019). What is public health? Retrieved from https://www.cdcfoundation .org/what-public-health (Accessed November 2019). Charrel, R. N., de Lamballerie, X., & Raoult, D. (2007). Chikungunya outbreaks-the globalization of vectorborne diseases. New England Journal of Medicine, 356(8), 769. Committee on Prepositioned Medical Countermeasures for the Public. (2011). Institute of Medicine. In Stroud, C., Viswanathan, K., Powell, T., & Bass, R. R. (Eds.), Prepositioning antibiotics for anthrax. National Academies Press. Cooper, L., Kang, S. Y., Bisanzio, D., Maxwell, K., Rodriguez-Barraquer, I., Greenhouse, B., … & Eckhoff, P. (2019). Pareto rules for malaria super-spreaders and super-spreading. Nature communications, 10(1), 1–9. Cyber Security and Infrastructure Security Agency (CISA) & U.S. Department of Homeland Security. (2020). Critical infrastructure sectors: Public health and healthcare. Retrieved from https://www.cisa.gov/healthcare-and-public-health-sector (Accessed January 10, 2020). Delamater, P. L., Street, E. J., Leslie, T. F., Yang, Y. T., & Jacobsen, K. H. (2019). Complexity of the basic reproduction number (R0). Emerging infectious diseases, 25(1), 1. Dollar, D. (2001). Is globalization good for your health? Bulletin of the World Health Organization, 79, 827–833. EJF. (2020). Protecting climate refugees. Retrieved from https://ejfoundation.org/what-we-do/ climate/protecting-climate-refugees?gclid=Cj0KCQ jwyur0BRDcARIsAEt86ICidUx2XPn f Bjr- 6QMgV6Ew pV lwW2ieLHv6Tsg ukHe8EzBPUSBPBoaAvo-EALw_wcB (Accessed February 2020). Fauci, A. S. (2012). Research on highly pathogenic H5N1 influenza virus: The way forward. mBio, 3(5), e00359–12. Federal Emergency Management Agency (FEMA). (2019). DRAFT, W. (2019). National response framework. Food and Drug Administration (FDA). (2019). What are medical countermeasures? FDA Medical Countermeasures Initiative (MCMi). Retrieved from https://www.fda.gov/ emergency-preparedness-and-response/about-mcmi/what-are-medical-countermeasures (Accessed January 10, 2020). Fouchier, R. A., García-Sastre, A., Kawaoka, Y., Barclay, W. S., Bouvier, N. M., Brown, I. H., & Cox, N. J. (2013). Transmission studies resume for avian flu. Science, 339(6119), 520–521. Georgetown University Medical Center. (2019, March 28). Science news. Retrieved from https:// www.sciencedaily.com/releases/2019/03/190328150856.htm (Accessed March 2020). Gould, D. W., Walker, D., & Yoon, P. W. (2017). The evolution of BioSense: Lessons learned and future directions. Public Health Reports, 132(suppl. 1), 7S–11S. Graham, B., Talent, J., Larsen, R., & Kidder, L. (2011). Bio-response report card. WMD Center. Hampton, T. (2013). Report reveals scope of US antibiotic resistance threat. Journal of the American Medical Association, 310(16), 1661–1663. Health and Human Services, U.S. Department of (HHS). (2019a). Emergency preparedness and response. Retrieved from https://www.hhs.gov/programs/emergency-preparedness/index.html (Accessed January 2020). Health and Human Services, U.S. Department of (HHS). (2019b). Chemical, biological, radiological, and nuclear (CBRN) threat programs. Retrieved from https://www.medicalcountermeasures.gov/BARDA/CBRN.aspx (Accessed January 2020). Health and Human Services, U.S. Department of (HHS), Assistant Secretary for Preparedness and Response (ASPR). (2019a). Strategic national stockpile. Retrieved from https://www.phe .gov/about/sns/Pages/default.aspx (Accessed December 2019). HHS, Office of Assistant Secretary of Preparedness and Response (ASPR). (2019b). National disaster medical system. Retrieved from https://www.phe.gov/Preparedness/responders/ ndms/Pages/default.aspx Heymann, D. L. (2017). Global health security: The global outbreak alert and response network. Hyde, J. K., & Shortell, S. M. (2012). The structure and organization of local and state public health agencies in the US: A systematic review. American Journal of Preventive Medicine, 42(5), S29–S41. Institute of Medicine (US) Committee for the Study of the Future of Public Health. (1988). The Future of Public Health. Washington (DC): National Academies Press (US). Appendix A, Summary of the Public Health System in the United States. Retrieved from https://www.ncbi. nlm.nih.gov/books/NBK218212/ Jack, A. (2015). Why the panic? South Korea’s MERS response questioned. British Medical Journal, 350, h3403. Jiang, F., & Doudna, J. A. (2017). CRISPR – Cas9 structures and mechanisms. Annual Review of Biophysics, 46, 505–529. Knobler, S. L., Mack, A., Mahmoud, A., & Lemon, S. M. (2005). Summary and assessment. In The threat of pandemic influenza: Are we ready? workshop summary. National Academies Press (US). Knobler S, Mahmoud A, Lemon S, et al., eds. (2004). Learning from SARS: Preparing for the Next Disease Outbreak. Institute of Medicine (US) Forum on Microbial Threats, Washington (DC): National Academies Press (US). DOI: 10.17226/10915 Lee, A. (2003). Will the SARS epidemic recur? Host and environment are key factors. Journal of Epidemiology & Community Health, 57(10), 770–771. http://dx.doi.org/10.1136/jech.57.10.770 Maciosek, M. V., Coffield, A. B., Flottemesch, T. J., Edwards, N. M., & Solberg, L. I. (2010). Greater use of preventive services in US health care could save lives at little or no cost. Health Affairs, 29(9), 1656–1660. McLeman, R. (2019). International migration and climate adaptation in an era of hardening borders. Nature Climate Change, 9(12), 911–918. McGill, N. (2015). Public health looks to lessons from past in MERS outbreak: Experience with SARS offers insights. Memish, Z. A., Assiri, A., Turkestani, A., Yezli, S., al Masri, M., Charrel, R., … & Gautret, P. (2015). Mass gathering and globalization of respiratory pathogens during the 2013 Hajj. Clinical Microbiology and Infection, 21(6), 571–e1. National Center for Biotechnology Information (NCBI). (2017). Polymerase Chain Reaction (PCR). National Institutes of Health. https://www.ncbi.nlm.nih.gov/probe/docs/techpcr/ (Accessed January 2019). National Institutes of Health (NIH) (2011). Press Statement on the NSABB Review of H5N1 Research. Retrieved at: https://webcache.googleusercontent.com/search? q=cache:b8RddeYeQRMJ:https://europepmc.org/books/n/nap18255/appb/+&cd=1&hl= en&ct=clnk&gl=us. Accessed September 20, 2020. Nabel, G. J., & Fauci, A. S. (2010). Induction of unnatural immunity: Prospects for a broadly protective universal influenza vaccine. Nature Medicine, 16(12), 1389–1391. Olaitan, A. O., Morand, S., & Rolain, J. M. (2016). Emergence of colistin-resistant bacteria in humans without colistin usage: A new worry and cause for vigilance. O’Sullivan, Terrence M. (2017). Mitigating extreme infectious disease disaster risk. In Risk in extreme environments: Preparing, avoiding, mitigating, and managing (pp. 162–173). Vicki Bier, Edit (October). Parida, SK, Axelsson-Robertson, R, Rao, MV, Singh, N, Master, I, Lutckii, A, Keshavjgee, S, Anderson, J, Zumla, A, Maeurer, M., (2015) “Totally drug-resistant tuberculosis and adjunct therapies.” Journal of Internal Medicine, vol 277(4). Park, H. Y., Lee, E. J., Ryu, Y. W., Kim, Y., Kim, H., Lee, H., & Yi, S. J. (2015). Epidemiological investigation of MERS-CoV spread in a single hospital in South Korea, May to June 2015. Eurosurveillance, 20(25), 21169. Paules, C. I., & Fauci, A. S. (2019). Influenza vaccines: Good, but we can do better. The Journal of Infectious Diseases, 219(Suppl. 1), S1–S4. Pike, Jamison, Tiffany Bogich, Sarah Elwood, David C. Finoff, & Peter Daszak (2014) Economic Optimization of a global strategy to address the pandemic threat. Proceedings of the National Academy of Sciences, 111(52), 18519–18523. Rai, A., & Khan, T. (2018). Overview of drug resistant mycobacterium tuberculosis. International Journal of Life-Sciences Scientific Research, 4(3), 1795–1800. Ravi, S., & Adalja, A. A. (2017). Strengthening the US medical countermeasure enterprise for biological threats. Health Security, 15(1), 12–14. The Report of the Commission on the Prevention of WMD Proliferation and Terrorism (WMD Report) (2008) Retrieved at: https://web.archive.org/web/20090130205134/http://documents. scribd.com/docs/15bq1nrl9aerfu0yu9qd.pdf. Accessed September 20, 2020. Rigaud, K. K., Jones, B., Bergmann, J., Clement, V., Ober, K., Schewe, J., … & Midgley, A. (2018). Groundswell: Preparing for internal climate migration. Washington, DC: World Bank. Roberts, M (2019) “Low Trust in Vaccinations a Global Crisis” BBC News. Retrieved at: https://www.bbc.com/news/health-48512923 Samet, J. M., & Woodward, A. (2018). National government denial of climate change and state and local public health action in a federalist system. Silverman, E. (2020, April 15). As demand surges, half of prescriptions needed for Covid-19 patients on ventilators are going unfilled. Retrieved from https://www.statnews.com/ pharmalot/2020/04/15/covid19-coronavirus-ventilators-drug-shortages/ Shelton, S., et al. (2012). Bioterrorism and biological threats dominate federal health security research; other priorities get scant attention. Health Affairs, 31 (12), 2755–2763. Suk, J. E., Zmorzynska, A., Hunger, I., Biederbick, W., Sasse, J., Maidhof, H., & Semenza, J. C. (2011). Dual-use research and technological diffusion: Reconsidering the bioterrorism threat spectrum. PLoS Pathogens, 7(1). Taubenberger, J. K., & Morens, D. M. (2006). Influenza revisited. Emerging Infectious Diseases, 12(1), 1. Tucker, J. B. (2004). Biological threat assessment: Is the cure worse than the disease? Arms Control Today, 34(8), 13–19. Tucker, J. B., & Zilinskas, R. A. (2006). The promise and perils of synthetic biology. The New Atlantis, (12), 25–45. United Nations Refugee Agency (UNHCR). (2019). Climate Change and Disaster Displacement. UNHCR website. Retrieved from https://www.unhcr.org/climate-change-and-disasters.html (Accessed December 2019). Walker, B. (1989). The future of public health: The Institute of Medicine’s 1988 report. Journal of Public Health Policy, 10(1), 19–31. Wein, L. M., & Liu, Y. (2005). Analyzing a bioterror attack on the food supply: The case of botulinum toxin in milk. Proceedings of the National Academy of Sciences, 102(28), 9984–9989. Wong, G., Liu, W., Liu, Y., Zhou, B., Bi, Y., & Gao, G. F. (2015). MERS, SARS, and Ebola: The role of super-spreaders in infectious disease. Cell Host & Microbe, 18(4), 398–401. World Health Organization (WHO). (2017). Vector-borne diseases. WHO (October 31, 2017). Retrieved from https://www.who.int/news-room/fact-sheets/detail/vector-borne-diseases (Accessed June 20, July 28, 2015). World Health Organization (WHO). (2015) Intensified public health measures help control MERS-CoV outbreak in the Republic of Korea. World Health Organization (July 28, 2015). Retrieved from http://www.wpro.who.int/mediacentre/releases/2015/20150728/en/ World Bank (2018). “Climate Change Could Force Over 140 Million to Migrate Within Countries by 2050: World Bank Report.” Retrieved from: https://www.worldbank.org/en/ news/press-release/2018/03/19/climate-change-could-force-over-140-million-to-migratewithin-countries-by-2050-world-bank-report, Accessed September 20 2020. Wappes, John. (2016). Highly resistant MCR-1 ‘superbug’ found in U.S. for first time. CIDRAP (May 26, 2016). http://www.cidrap.umn.edu/news-perspective/2016/05/highly-resistant-mcr1-superbug-found-us-first-time Anonymous. (2006). 10 U.S.C. § 275. Al-Aulaqi v. Panetta. (2014). 35 F. Supp. 3d 56 (D.D.C. 2014). Allan, H. K. (2017). Paradoxes of sovereignty and citizenship: Humanitarian intervention at home. CUNY Law Review, 20(2), 389. Amar, A. R. (2005). America’s constitution, a biography. New York, NY :Random House. Bank Secrecy Act. (2012). 31 U.S.C. §§ 5311–5338. Bier, V. (2006). Hurricane Katrina as a bureaucratic nightmare. On Risk and Disaster. https:// doi.org/10.9783/9780812205473.243 Birkland, T. A. (2015). An introduction to the policy process: Theories, concepts, and models of public policy making. New York, NY: Routledge. Calabresi, S. G., & Agudo, S. E. (2008). Individuals rights under state constitutions when the Fourteenth Amendment was ratified in 1868: What rights are deeply rooted in American history and tradition? Texas Law Review, 87(1), 7. Carroll v. United States. (1925). 267 U.S. 132. Chesney, R. (2011). Who may be killed? Anwar al-Awlaki as a case study in the international legal regulation of lethal force. Yearbook of International Humanitarian Law, 13, 3–60. https://doi.org/10.1007/978-90-6704-811-8_1 Cole, D. (2004). Uncle Sam is watching you. Georgetown Law Faculty Publications and Other Works. 1. David Cole. New York Times Review of Books (November 18, 2004). Cole, D., & Dempsey, J. X. (2006). Terrorism and the constitution: Sacrificing civil liberties in the name of national security. New York, NY: New Press. Dolan, C. J. (2006). In war we trust: The Bush doctrine and the pursuit of just war. Aldershot: Ashgate. Electronic Communications Privacy Act. (2002). 18 U.S.C. §§ 2511, et seq. Foreign Intelligence Surveillance Act. (2019). 50 U.S.C. §§ 1801, et seq. Gibbons v Ogden. (1824). 22 U.S. (9 Wheat.) 1. Griswold v Connecticut. (1965). 381 U.S. 479. Halchin, E., Hogue, H., Kaiser, F., Love, N., McCarthy, F. X., Reese, S., & Schwemle, B. (2007). Federal emergency management policy changes after Hurricane Katrina: A summary of statutory provisions, congressional research service. Keith Bea, Coordinator Specialist, American National Government, Government and Finance Division, Government and Finance Division. Congressional Research Center (CRS Report RL33729). https://fas.org/ sgp/crs/homesec/RL33729.pdf Homeland Security Act. (2002). 6 U.S.C. §§ 101–557 (2002), 49 U.S.C. § 44918 (2019). Insurrection Act. (n.d.). 10 U.S.C. §§ 331–335. Ito, S. (2011, October 3). After Al-Aulaqi’s killing, why due process matters. ACLU. https:// www.aclu.org/blog/national-security/targeted-killing/after-al-aulaqis-killing-whydue-process-matters Katz v. United States. (1967). 389 U.S. 347. Kyllo v. United States. (2001). 533 U.S. 27. Laurie, C. D., & Cole, R. H. (1997). The role of federal military forces in domestic disorders, 1877–1945. Washington, DC: Center of Military History, U.S. Army. Marbury v. Madison. (1803). 5 U.S. 137. McCulloch v. Maryland. (1819). 17 U.S. (4 Wheat.) 316. Posse Comitatus Act. (1878). 18 U.S.C. § 1385. Post-Katrina Emergency Management Reform Act. (2006). Pub. L. No. 93-288, 88 Stat. 143–164 (2006), as amended, 42 U.S.C. §§ 5121 et seq. Rahinah Ibrahim v Dept. of Homeland Security, et al. (2019). No. 14-16161; 14-17272 (9th Cir. 2019). Robert T. Stafford Disaster Relief and Emergency Assistance Act. (1988). 42 U.S.C. §§ 5121–5170. Sampaio, A. A., & Vedovato, L. R. (2015). With the stroke of a pen: Legal standards for adding names to government kill lists. International Human Rights Law Review, 4(2), 194–221. https://doi.org/10.1163/22131035-00402001 Sinnar, S. (2016). Rule of law tropes in national security. Harvard Law Review, 129, 1566. Story, J. (1833). Commentaries on the constitution of the United States: With a preliminary review of the constitutional history of the colonies and states, before the adoption of the Constitution. Boston: Hilliard, Gray, and Company. Sylves, R., & Cumming, W. R. (2004). FEMA’s Path to Homeland Security: 1979–2003. Journal of Homeland Security and Emergency Management, 1(2). https://doi.org/10.2202/1547-7355.1023 Taft, W. H. (1916). Our chief magistrate and his powers. Columbia University Press. Torbet v. United Airlines, Inc. (2002). 298 F.3d 1087, 1089. U.S. Const. art. II, § 2. USA PATRIOT Act Amendments to Foreign Intelligence Surveillance Act Authorities. (2005, April 27). https://archives.fbi.gov/archives/news/testimony/usa-patriot-act-amendments-toforeign-intelligence-surveillance-act-authorities USA PATRIOT Act. (2001). Pub. L. No. 107-56, 115 Stat. 272. United States v. Davis. (1973). 482 F.2d 893, 895 (9th Cir. 1973). United States v. Red Feather. (1975). 392 F. Supp. 916, 922. United States v. Forrester. (2007). 495 F.3d 1041 (9th Cir. 2007). United States v Maxwell. (1996). 45 M.J. 406 (CCAF, 1996). United States v. Ramsey. (1977). 431 U.S. 606. United States v. Warshak. (2010). 631 F.3d 266 (6th Cir. 2010). Youngstown Sheet & Tube Company v. Sawyer. (1952). 343 U.S. 579. Aisenberg, M. A. (2018). State & local ICT policy: A framework for cybersecurity. SciTech Lawyer, 14(3), 14–19. Appeals court upholds FTC authority over data security. (2015, November/December). Information Management Journal, 49(6), 7. Bahajji, Z. A., & Illyes, G. (2014, August 6). HTTPS as a ranking signal [Blog post]. Retrieved from the Google Webmaster Central Blog: https://webmasters.googleblog.com/2014/08/ https-as-ranking-signal.html Brown, K. A. (2006). Critical path: A brief history of critical infrastructure protection in the United States. Fairfax, VA: Spectrum Publishing Group. Bugcrowd. (n.d.). How it works. Retrieved from https://www.bugcrowd.com/products/ how-it-works/ Capezza, T. A. (2017). New York state rule reaches beyond the state’s borders in requiring corporate boards to implement cybersecurity protections. Business Lawyer, 73, 239–242. Carnegie Endowment for International Peace. (n.d.). Cyber norms index. Retrieved from https:// carnegieendowment.org/publications/interactive/cybernorms Children’s Online Privacy Protection Act. (1998). Pub. L. No. 105-277 (Title XIII), 112 Stat. 2681 (1998). Clinger-Cohen Act. (1996). Pub. L. No. 104-106 (Div. D and E), 110 Stat. 186, 642 (1996). Commonwealth of Australia, Department of the Prime Minister and Cabinet. (2016). Australia’s cyber security strategy. Retrieved from the Department of Home Affairs: https:// cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-CyberStrategy.pdf Computer Security Act. (1987). Pub. L. No. 100-235, 101 Stat. 1724 (1988). Cook, C. (2018). Cross-border data access and active cyber defense: Assessing legislative options for a new international cybersecurity rulebook. Stanford Law & Policy Review, 29, 205–236. Department of Homeland Security, U.S. Government. (2018). Cybersecurity strategy. Retrieved from https://www.dhs.gov/sites/default/files/publications/DHS-CybersecurityStrategy_1.pdf Directive (EU) 2016/1148. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (OJ L 194, 19.7.2016, pp. 1–30). Executive Order No. 13,800. (2017). 3 C.F.R. 349. Fair Credit Reporting Act. (1970). Pub. L. No. 91-508 (Title VI), 84 Stat. 1114 (1970). Federal Information Security Management Act. (2002). Pub. L. No. 107-347 (Title III), 116 Stat. 2899 (2002). Federal Information Security Modernization Act. (2014). Pub. L. No. 113-283, 128 Stat. 3073 (2014). Federal Trade Commission, U.S. Government. (2006, April). Financial institutions and customer information: Complying with the safeguards rule. Retrieved from https://www.ftc.gov/tips-advice/ business-center/guidance/financial-institutions-customer-information-complying Federal Trade Commission, U.S. Government. (2013, May). Fighting identity theft with the red flags rule: A how-to guide for business. Retrieved from https://www.ftc.gov/tips-advice/ business-center/guidance/fighting-identity-theft-red-flags-rule-how-guide-business Federal Trade Commission Act. (1914). 15 U.S.C. § 45 (1914, as revised). Finland, Secretariat of the Security Committee. (2013). Finland’s cyber security strategy [Government resolution 24.1.2013]. Retrieved from the Ministry of Defence: https://www. defmin.fi/files/2378/Finland_s_Cyber_Security_Strategy.pdf Gebhart, G. (2018, July 30). Google Chrome now marks HTTP sites “not secure” [Blog post]. Retrieved from the Electronic Frontier Foundation: https://www.eff.org/deeplinks/2018/07/ google-chrome-now-marks-http-sites-not-secure Gibson, B. (2016). Systems theory. In Encyclopædia Britannica. Retrieved from https://www. britannica.com/topic/systems-theory Google. (n.d.). HTTPS encryption on the web. Retrieved July 1, 2019, from https://transparencyreport.google.com/https/overview Gramm-Leach-Bliley Act. (1999). Pub. L. No. 106-102, 113 Stat. 1338 (1999). Greenwald, E. A. (2010). History repeats itself: The 60-day cyberspace policy review in context. Journal of National Security Law & Policy, 4(1), 41–60. Retrieved from http://jnslp.com/ HackerOne. (n.d.-a). Product overview. Retrieved from https://www.hackerone.com/product/ overview HackerOne. (n.d.-b). Vulnerability disclosure guidelines. Retrieved from https://www.hackerone .com/disclosure-guidelines Health Information Technology for Economic and Clinical Health Act. (2009). Pub. L. No. 111-5 (Title XIII), 123 Stat. 115 (2009). Health Insurance Portability and Accountability Act. (1996), Pub. L. No. 104-191, 110 Stat. 1936 (1996). Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2135 (2002). International Committee of the Red Cross. (2011, November 28–December 1). International humanitarian law and the challenges of contemporary armed conflicts: Report from the 31st International Conference of the Red Cross and Red Crescent. Retrieved from https://www. icrc.org/eng/resources/documents/report/31-international-conference-ihl-challengesreport-2011-10-31.htm Italy, Presidency of the Council of Ministers. (2013). National strategic framework for cyberspace security. Retrieved from the Intelligence System for the Security of the Republic: http://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2014/02/italian-nationalstrategic-framework-for-cyberspace-security.pdf Kennedy, M. (2018, March 28). Ecuador disconnects Julian Assange from the internet. NPR. Retrieved from https://www.npr.org/sections/thetwo-way/2018/03/28/597695729/ ecuador-disconnects-julian-assange-from-the-internet Mauck, D., & Rady, K. (2017). Cybersecurity meets securities: What should be done. Securities Regulation Law Journal, 45(3), 301–340. McGuiness, T. (2019). Defense in depth, version 1.2E. Retrieved from the SANS Institute Information Security Reading Room: https://www.sans.org/reading-room/whitepapers/ basics/defense-in-depth-525 National Institute of Standards and Technology, U.S. Department of Commerce. (n.d.). NIST timeline. Retrieved from https://www.nist.gov/timelinelist National Institute of Standards and Technology, U.S. Department of Commerce. (2018, April 16). Framework for improving critical infrastructure cybersecurity, version 1.1. https://doi.org/ 10.6028/NIST.CSWP.04162018 Paperwork Reduction Act. (1995). Pub. L. No. 104-13, 109 Stat. 163 (1995). Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. EURASIP Journal on Information Security, 2018(4), 1–21. https://doi.org/10.1186/s13635-018-0074-y PCI Security Standards Council. (2018a). About us. Retrieved from https://www.pcisecuritystandards.org/about_us/ PCI Security Standards Council. (2018b, May). Payment card industry (PCI) data security standard: Requirements and security assessment procedures, version 3.2.1. Retrieved from https://www.pcisecuritystandards.org/document_library People’s Republic of Bangladesh. (2014). The national cybersecurity strategy of Bangladesh. Retrieved from Department of Printing and Publications: http://www.dpp.gov.bd/upload_ file/gazettes/10041_41196.pdf Policy. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/policy Power, M. (2007). Organized uncertainty: Designing a world of risk management. Retrieved from https://ebookcentral.proquest.com President’s Commission on Critical Infrastructure Protection. (1997). Critical foundations: Protecting America’s infrastructures. Presidential Policy Directive/PPD-21. (2013). Critical infrastructure security and resilience. Pub. Papers 106-115 (February 12, 2013). Regulation (EU) 2016/679. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/ EC (OJ L 119, 4.5.2016, pp. 1–88). Republic of Austria, Federal Chancellery, Department IV—Coordination, Division IV/6— Security Policy Affairs. (2013). Austrian cyber security strategy. Retrieved from the Federal Ministry of Interior: https://www.bmi.gv.at/504/files/130415_strategie_cybersicherheit_en_ web.pdf Sarbanes Oxley Act. (2002). Pub. L. No. 107-204, 116 Stat. 745 (2002). SB-1386 Personal Information: Privacy. (n.d.). Cal. Civ. Code § 1798.29; 1798.82 et seq (as revised). Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 53–74. https://doi.org/10.15394/ jdfsl.2017.1476 Scott, T. (2015, June 8). Policy to require secure connections across federal websites and web services (Office of Management and Budget Memorandum M-15-13). Retrieved from https:// www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2015/m-15-13.pdf SEC Statement. (2018). SEC Statement and Guidance on Public Company Cybersecurity Disclosures, 17 C.F.R. pts. 229 & 249. Security. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/security Self-regulation. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/self-regulation Standard. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/standard Switzerland, The Federal Council. (2018). National strategy for the protection of Switzerland against cyber risks (NCS) 2018-2022 [SN002]. Retrieved from the Federal IT Steering Unit: https://www.isb.admin.ch/isb/en/home/ikt-vorgaben/strategien-teilstrategien/sn002nationale_strategie_schutz_schweiz_cyber-risiken_ncs.html The Danish Government, Ministry of Finance. (2018). Danish cyber and information security strategy. Retrieved from https://uk.fm.dk/publications/2018/danish-cyber-and-informationsecurity-strategy The Institute of World Politics. (2016, May 27). Cyber security: Why is this (still) so hard? [Video file]. Retrieved from https://youtu.be/47zJPU0VHSQ The White House, U.S. Government. (n.d.). Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure. Retrieved March 11, 2019 from the Department of Energy: https://www.energy.gov/sites/prod/files/cioprod/documents/ Cyberspace_Policy_Review_final.pdf The White House, U.S. Government. (2011, May). International strategy for cyberspace. Retrieved from https://obamawhitehouse.archives.gov/blog/2011/05/16/launching-us-internationalstrategy-cyberspace Theory. (n.d.). In Merriam-Webster.com Dictionary. Retrieved from https://www.merriamwebster.com/dictionary/theory United Nations General Assembly, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (2015, July 22). Report of the group of governmental experts on developments in the field of information and telecommunications in the context of international security (A/70/174). Retrieved from http://undocs.org/A/70/174 United Nations Office for Disarmament Affairs. (n.d.). Developments in the field of information and telecommunications in the context of international security. Retrieved from https://www. un.org/disarmament/ict-security/ U.S. Chief Information Officer & the Federal CIO Council. (n.d.). Why HTTPS for everything? Retrieved from https://https.cio.gov/everything/ W3 Techs. (2019, July 1). Historical trends in the usage of site elements for websites. Retrieved from https://w3techs.com/technologies/history_overview/site_element/all/y Young, W., & Leveson, N. G. (2014). Inside risks: An integrated approach to safety and security based on systems theory. Communications of the ACM, 57(2), 31–35. https://doi .org/10.1145/2556938 Appelbaum, S. (1997). Socio‐technical systems theory: An intervention strategy for organizational development. Management Decision, 35(6). 452–463. https://doi.org/10.1108/ 00251749710173823 Baggett, R. K., Foster, C. S., & Simpkins, B. K. (Eds.). (2017). Homeland security technologies for the 21st century. Praeger Security International. Bellavita, C. (2012). Waiting for homeland security theory. Homeland Security Affairs. 8(15). Birkland, T. (1997). After disaster: Agenda setting, public policy, and focusing events. Washington, DC: Georgetown University Press. Bond, S. (2020, April 24). Facebook launches rival to video-meeting app zoom. National Public Radio. https://www.npr.org/sections/coronavirus-live-updates/2020/04/24/844360404/facebooklaunches-rival-to-video-meeting-app-zoom Bothamley, J. (2002). Dictionary of theories. New York, NY: Barnes & Noble Press. Cartelli, A. (2007). Socio-technical theory and knowledge construction: Towards new pedagogical paradigms? Issues in Informing Science and Information Technology, 4. Clearview AI. (2020). Clearview AI: Computer vision for a safer world. [Webpage] Author. https://clearview.ai/ Coats, D. R. (2019). Worldwide threat assessment of the US intelligence community. Senate Select Committee on Intelligence. Washington, DC: Author. Comiskey, J. (2010). Effective state, local, and tribal police intelligence (Master’s thesis). Naval Post Graduate School. http://www.justiceacademy.org/iShare/Library-NPS/10Mar_ Comiskey.pdf Comiskey, J. (2018). Theory for homeland security. Journal of Homeland Security Education, 7, 29–45. https://ijspre.org/theory-for-homeland-security Comiskey, J., & Larrañaga, M. (2019). Climate security: A premortem approach to a sustainable global future. Homeland Security Affairs, 15(8). Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical Models. Management Science, 35(8), 982–1003. Department of Homeland Security. (2010). Quadrennial homeland security review: A strategic framework for a secure homeland, National Preparedness Goal. Washington, DC: Author. Department of Homeland Security. (2011). The strategic national risk assessment in support of PPD 8: A comprehensive risk-based approach toward a secure and resilient nation. Washington, DC: Author. Department of Homeland Security. (2012). Project responder 3 toward the first responder of the future. Washington, DC: Author. https://www.nisconsortium.org/portal/resources/bin/ Project_Responder_3:_1423591018.pdf Department of Homeland Security. (2013). Smart scavenging – Technology foraging at DHS. Washington, DC: Author. https://www.dhs.gov/st-snapshot-tech-foraging Department of Homeland Security. (2014a). The 2014 quadrennial homeland security review. Washington, DC: Author. Department of Homeland Security. (2014b). Project responder 4 2014 national technology plan for emergency response to catastrophic incidents. Washington, DC: Author. https://www.dhs .gov/sites/default/files/publications/Project%20Responder%204_1.pdf Department of Homeland Security. (2015a). National preparedness goal. Washington, DC: Author. Department of Homeland Security. (2015b). Science & technology directorate: Strategic plan 2015–19. Washington, DC: DHS Science & Technology Directorate. Department of Homeland Security. (2016). First responder resource group (FRRG): An emergency response and preparedness think tank fact sheet. Washington, DC: Author. https:// www.dhs.gov/sites/default/files/publications/First-Responder-Resource-Group_Fact-Sheet_ v3-508.pdf Department of Homeland Security. (2017). Project Responder 5. Washington, DC: Author. https:// www.dhs.gov/sites/default/files/publications/Project-Responder-5-Report_170814-508.pdf Department of Homeland Security. (2019a). DHS strategic plan fiscal years 2020–2024. Washington, DC: Author. Department of Homeland Security. (2019b). Directorate of science and technology strategic plan 2015–2019. Washington, DC: Author. Eason, K. (2009). Before the internet: The relevance of socio-technical systems theory to emerging forms of virtual organisation. International Journal of Socio-technology a Knowledge Development, 1(2). 23–32. https://doi.org/10.4018/jskd.2009040103 Food and Drug Administration. (2017). Emergency use authorization of medical products and related authorities. Washington, DC: Author. Harden, J. D. (2018, June 8). Delayed 911 Responses during Harvey left some residents waiting days for help. Houston Chronicle. https://www.houstonchronicle.com/news/houston-texas/ houston/article/Delayed-911-responses-during-Harvey-left-12979327.php Harris, C. (2019, June 26). Testimony before the Subcommittee on Government Operations, Committee on Oversight and Reform, House of Representatives: Information Technology U.S. Government Accounting Office. Heslop, B. (2019, March 4). By 2030, each person will own 15 connected devices – Here’s what that means for your business and content. MTA Martech Advisor. Hopmeier, M. (2012). Technology foraging: A novel approach to technology problem solving within DHS Science and Technology Directorate. In Kamien, D. G. (Ed.). Homeland security handbook. New York, NY: McGraw Hill. Homeland Security Act. (2002). Pub. L. No. 107-296, 116 Stat. 2136 (2002). Hubona, G. S., & Whisenand, T.G. (1995). External variables and the technology acceptance model. In AMCIS 1995 Proceedings, 85. http://aisel.aisnet.org/amcis1995/85 International Business Machines. (2020). What is quantum computing? Author. https://www .ibm.com/quantum-computing/learn/what-is-quantum-computing/ Kellon, L. (2020, April 10). Coronavirus: Apple and Google team up to contact trace Covid-19. British Broadcasting Corporation. https://www.bbc.com/news/technology-52246319 Kelly, H. (2012, June 30). 5 ways the iPhone changed our lives. CNN Business. https://www.cnn .com/2012/06/28/tech/mobile/iphone-5-years-anniversary/index.html Kleinman, Z. (2020, April 10). Coronavirus: Can we 3D-print our way out of the PPE shortage? British Broadcasting Corporation. https://www.bbc.com/news/health-52201696 Kuhn, T. S. (1962). The structure of scientific revolutions. Chicago, IL: University of Chicago Press. Lai, P. C. (2017). The literature review of technology adoption models and theories for the novelty technology. JISTEM Brazil, 14(1). 21–38. LaMorte, W. W. (2018). Diffusion of innovation theory. Boston University School of Public Health. http://sphweb.bumc.bu.edu/otlt/MPH-Modules/SB/BehavioralChangeTheories/ BehavioralChangeTheories4.html Lewis, T. G. (2014). Book of extremes – Why the 21st century isn’t like the 20th century. New York, NY: Springer. Merchant, B. (2017). The one device: The secret history of the iPhone. New York, NY: Little Brown & Company. National Homeland Security Consortium. (2010). Protecting Americans in the 21st century: Imperatives for the homeland. Washington, DC: Author. Retrieved from https://knowledgecenter .csg.org/kc/system/files/NHSC_White_Paper_Updated_2010.pdf National Institute of Standards and Technology. (2019). Chexia face recognition [webpage]. https://www.nist.gov/programs-projects/chexia-face-recognition Pelfrey, W. V. & Kelley, W. D. (2013). Homeland security: A way forward. Homeland Security Affairs, 9(3). Retrieved from http://www.hsaj.org/?article=9.1.3 Pitt, J. (2019, February 19). Deepfake videos and DDoS attacks – Deliberate denial of satire. IEEE Technology and Society. https://technologyandsociety.org/deepfake-videosand-ddos-attacks-deliberate-denial-of-satire/ Poole, M. S. (2008). Adaptive structuration theory. In A first look at communication theory. New York, NY: McGraw Hill. Ramsay, J. (2012). Epilogue. In Logan, K. G. & Ramsay, J. D. (Eds.), Introduction to homeland security. Boulder, CO: Westview Press. Ranger, S. (2018, February 3). What is the IoT? Everything you need to know about the Internet of Things right now. ZDNet Cybersecurity in an IOT and mobile world. https://www.zdnet.com/article/ what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/ Reese, S. (2014). Quadrennial homeland security review: Evolution of a strategic review. Washington, DC: Congressional Research Service. Rich, R. (2013, November 22). The great recession. Federal Reserve History. https://www .federalreservehistory.org/essays/great_recession_of_200709 Rogers, E. M. (1962). Diffusion of innovations. New York, NY: Free Press of Glencoe. Ryan, B., & Gross, N. T. (1943). The diffusion of hybrid seed corn. Rural Sociology, 8(1). Silver, S. (2018, June 29). The story of the original iPhone that nobody thought was possible. Apple Insider. https://appleinsider.com/articles/18/06/29/the-story-of-the-original-iphone-thatnobody-thought-was-possible Sinclair, J. K., & Vogus, C. E. (2011). Adoption of social networking sites: An exploratory adaptive structuration perspective for global organizations. Information Technology Management, 12, 293–314. https://doi.org/10.1007/s10799-011-00865 Toffler, A. (1970). Future shocks. New York, NY: Random. United States v. Merrell. (2016). 842, F.3d 577 (8th Cir, 2016). https://scholar.google.com/ scholar_case?case=3974630246904000623&hl=en&as_sdt=6,33&as_vis=1 Venkatesh, V. &Bala, H. (2008). Technology acceptance model three and a research agenda on interventions. Decision Science, 39(2), 273–312. Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. Venkatesh, V., Morris, M. G., Davis, F. D., & Davis, G. B. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 425–478. Ward, M. (2020, March 27). Tesla, Apple, and Ford are stepping up to address global shortages of ventilators, hand sanitizer, face masks, and gowns. Here’s a running list of companies helping out. Business Insider. https://www.businessinsider.com/coronavirus-companieshelping-meet-shortages-of-ventilators-gowns-masks-hand-sanitizer-healthcare White House. (2018). National cybersecurity strategy of the United States. Washington, DC: Author. White House. (2020). Proclamation on declaring a national emergency concerning the novel coronavirus disease (COVID-19) outbreak. Washington, DC: Author. Notes 1. Source: COSO Model for Internal Controls Based Upon the Enterprise Risk Management Integrated Framework Model Developed by the Committee of Sponsoring Organizations of the Treadway Commission by permission. 1. See, for instance, Souad Mekhennet (2020), “Far right and radical Islamist groups are exploiting coronavirus turmoil”, Washington Post (April 10, 2020). 2. For a look at actual events and perspectives from the Federal Emergency Management Agency, see 2019 National Threat and Hazard Identification and Risk Assessment (THIRA): Overview and Methodology (FEMA, 2019). 3. See Chapter 11 in this volume, on Public Health Security, for discussion of the coronavirus/COVID pandemic and its implications for homeland security. 4. “In a gig economy, temporary, flexible jobs are commonplace and companies tend toward hiring independent contractors and freelancers instead of full-time employees. A gig economy undermines the traditional economy of full-time workers who rarely change positions and instead focus on a lifetime career” (Chappelow, 2019). One example of this would be Uber and Lyft drivers. 5. Cognition is “the mental action or process of acquiring knowledge and understanding through thought, experience, and the senses”. Oxford Dictionary www.oxforddictionaries.com. 6. The Truman Doctrine and Marshall Plan. U.S. State Department (2019). https://history. state.gov/departmenthistory/short-history/truman. 7. And then of course the startling dramatic impact of the 2020 COVID pandemic, the full impact of which is yet to be determined. 8. The City of San Francisco passed an ordinance in 2019 banning future facial recognition surveillance, in anticipation (and fear) of the growing adoption worldwide (Conger, Fausset, & Kovaleski, 2019). 1. In criminology, the fear of crime is a significant problem which has been extensively researched. See for example Ditton and Farrall (2017) and Hale (1996). 2. Note that, euphemistically, all terrorism is considered criminal. 3. See Chapter 5 for a detailed discussion of terrorist target selection. 4. Critical infrastructures are systems and assets which are so important to the United States, that their incapacitation would have a “debilitating impact” (NIHS, 2019). 5. See Chapter 8 for a discussion of the application of rational choice theory as it applies to nation-states. 6. See Chapter 5 for an alternative discussion on rational choice and terrorism. 1. See Chapter 4 for a discussion on rational choice as it relates to crime and security. 2. See Chapter 8 for a description of game theory in terms of nation-state decision-making. 1. The registry has been replaced by the American Red Cross Safe and Well, Facebook Safety Check, and Google Person Finder. FEMA maintains a “How Do I Find My Family” webpage https://www.fema.gov/how-do-i-find-my-family. 2. For an example of the breadth of such interagency collaborations, the reader is referred to the Government Accountability Office (2012). Managing for Results: Key Considerations for Implementing Interagency Collaborative Mechanisms. GAO-12-1022. Washington, DC. Government Printing Office. 3. Source: Government Accountability Office (2012). Managing for Results: Key Considerations for Implementing Interagency Collaborative Mechanisms. GAO-12-1022. Washington, DC. Government Printing Office. 1. Drabek (1989). FEMA. See https://training.fema.gov/hiedu/docs/emprinciples/0907_176% 20em%20principles12x18v2f%20johnson%20(w-o%20draft).pdf 2. See https://www.fema.gov/about-agency 3. Rubin, C. B. (Ed.). (2020). Emergency management: The American experience (3rd ed.). Routledge. 4. Rubin, C. B. (2014). Local emergency management: Origins and evolution. In W. Waugh, & K. Tierney (Eds.). Emergency management: Principles and practice for local government (2nd ed., pp. 25–37). Washington, DC: ICMA Press. 5. https://www.flickr.com/photos/noaaphotolib/5424752205/in/photolist-9gngQr-jkBvHJJTHCoz-c5YhCL-24cFvzR-qsvMtP-e3kEaT-4vFgcG-c5YeCf-c5YgrW-XXZdi7-aLzzbBc61cEJ-F8MDz-Xmr5BB-28hKCGC-5i3X1g-ap3jpd-prnFvi-YPPyTr-hnbtR1-WQApZk5i8gvA-8MK8sr-8kELj7-owhKTB-j7N7Dx-8ydXAL-53TZBH-gH8hZs-7thR5w-21obJih8MNeWJ-224QA8J-dLTq92-pySNRs-WVppEA-bVVh7M-icWsDM-GFZ7TE-DDxRCrWYXTm4-pEm9TG-24PF7w1-cuR7Jm-X7Z58x-nPCASC-5i8gjs-7a8sNf-fqVr94 6. https://pixabay.com/photos/hurricane-devastation-destruction-60550/ 7. https://cdn.pixabay.com/photo/2012/10/26/01/08/buried-62989_960_720.jpg 8. https://cdn.pixabay.com/photo/2015/04/03/20/16/wwii-705767_960_720.jpg 9. See https://www.hsdl.org/?abstract&did=456688 10. https://www.flickr.com/photos/keyslibraries/2846421152/in/photolist-6zaTiT-6zaTh4fakDkg-faA2Nh-5kwDQL-5kso7Z-mf8et-SDzGdR-TTi9CZ 11. See https://www.fema.gov/media-library/assets/documents/21010; National Flood Insurance Act. (1968a). Flood disaster protection Act of 1973. FEMA. https://www.fema. gov/media-library/assets/documents/7277; National Flood Insurance Act. (1968b). As amended, and Flood Disaster Protection Act of 1973, as amended, 42 U.S.C. 4001 et. seq. FEMA. https://www.fema.gov/media-library/assets/documents/21010 12. See https://www.fema.gov/media-library/assets/documents/7277 13. See https://www.hsdl.org/?abstract&did=458661 14. NGA was founded in 1908 as a bipartisan organization to “share best practices, speak with an informed voice on national policy and develop innovative solutions that improve citizens’ lives through state government and support the principles of federalism” (Source: https://www.nga.org/about/). 15. John Macy, who was the Director of the Civil Service Commission under Presidents Eisenhower, Kennedy and Johnson, was appointed as FEMA’s first Director. He “recognized the commonalities between natural hazards preparedness, civil defense activities, and what would come to be known as the “dual-use approach” to emergency preparedness planning and resources” (FEMA, 2010b, p. 7). 16. NAPA was congressionally chartered in 1967 as a non-partisan nonprofit academy. It “has provided expert advice to government leaders in building and managing more effective, efficient, accountable and transparent organizations” (Source: https://www.napawash.org/about-us/who-we-are). 17. See https://www.fema.gov/media-library/assets/documents/4596 18. See https://www.dhs.gov/sites/default/files/publications/nat-strat-hls-2002.pdf 19. Today the DHS consists of 22 agencies with a federal workforce of around 240,000 people. 20. See https://www.flickr.com/photos/slagheap/243442250/in/photolist-nvGUb-nvGU75kVU2c-cWrpXW-gUPpD-cF7cz-cF7Ae-cWrq1m-amhJd6-cWrq2o-cWrqYA-5yLUxdes3skw-cWrpeY-cWrqdf-cWrq4Q-cWrq8Q-cWrpp5-cWrpC3-cWrqmw-cWrqHj-cWrqw78B1wJa-8zkiXr-8zJi1X-8B1zEg-VmEQVh-cWrqJA-cWrrh9-es3r5Y-cWrr7L-cWroVjcWrre1-cWrqFS-cWrr35-cWrrTf-cWrrHN-cWrqtU-cWrq6U-q5SWn-cWrrJJ-cWrpFJ-cWrrUq-cWrrGq-cWrrPw-cWrrBd-cWrpto-dapurN-8BtuGa-cWrpiS 21. See Post Katrina Emergency Reform Act (2006) https://www.congress.gov/bill/109thcongress/senate-bill/3721 22. See https://www.fema.gov/media-library-data/1571336142501-c914622674a919294dd2a964 aaeda0d1/FEMA_Org_Chart.pdf 23. https://www.dhs.gov/publication/department-homeland-securitys-strategic-plan-fiscalyears-2020-2024 24. “Stafford Act is designed to bring an orderly and systemic means of federal natural disaster assistance for state and local governments in carrying out their responsibilities to aid citizens. Congress’ intention was to encourage states and localities to develop comprehensive disaster preparedness plans, prepare for better intergovernmental coordination in the face of a disaster, encourage the use of insurance coverage, and provide federal assistance programs for losses due to a disaster. This Act constitutes the statutory authority for most federal disaster response activities especially as they pertain to FEMA 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. and FEMA programs” (FEMA, 2019, 2019b); see also: Robert T. (2016). Stafford Disaster Relief and Emergency Assistance Act, as amended, and Related Authorities as of August 2016. FEMA. https://www.fema.gov/media-library/assets/documents/15271. Two main challenges were observed concerning Stafford Act Assistance and the acts of terrorism where the tactics used in the post 9-11 incidents such as the 2015 San Bernardino, California, the 2016 Orlando, Florida mass shootings and the 2016 Ohio State University vehicular and knife attack (CRS, 2019): (a) According to the Stafford Act, the major disaster definition lists specific incident types that are eligible for federal assistance where there is fire and explosions. It is still unclear whether incidents without a fire or explosion would fit under a major disaster, and (b) FEMA’s recommendation to the President to issue a major disaster declaration is based on the damage on public infrastructure as compared to the population of the state. Hence, the numbers affected and the public infrastructure damage are limited in terrorism cases. See the CRS report on Stafford Act Assistance and Acts of Terrorism (2019) regarding this debate. See National Wildfire Coordinating Group. (2018). Mission. https://www.nwcg.gov/ See https://www.fema.gov/national-incident-management-system See https://fas.org/irp/offdocs/nspd/hspd-8.html See https://www.fema.gov/media-library-data/1443799615171-2aae90be55041740f97e8532fc 680d40/National_Preparedness_Goal_2nd_Edition.pdf See CRS Report on PPD-8 and NPS https://fas.org/sgp/crs/homesec/R42073.pdf U.S. Department of Homeland Security (2011). The strategic national risk assessment in support of PPD 8: A comprehensive risk-based approach toward a secure and resilient nation. http://www.dhs.gov/xlibrary/assets/rma-strategic-national-risk-assessment-ppd8.pdf See https://www.fema.gov/media-library-data/1487864847326-9b0a1ce43c03c8b7aaf084fd4ea84266/NPS_Graphic_large.png See https://www.fema.gov/national-exercise-program https://upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Hurricane_Sandy_damage_Long_Beach_Island.jpg/800px-Hurricane_Sandy_damage_Long_Beach_Island.jpg See https://www.fema.gov/sandy-recovery-improvement-act-2013 See https://www.hsdl.org/c/tl/sandy-recovery-improvement-act-2013/ CPG 101, 2010, pp. 4-8 and 4-9. against impacts on the human, health, economic, social, political, environmental, etc. which are commonly considered as components of an “all-hazards approach” See https://www.fema.gov/media-library/assets/documents/4241 Ibid. THIRA 2019. See https://www.fema.gov/media-library/assets/documents/181470 Ibid. See https://training.fema.gov/hiedu/docs/comprehensive%20em%20-%20nga.doc See https://www.fema.gov/media-library-data/1443799615171-2aae90be55041740f97e8532fc 680d40/National_Preparedness_Goal_2nd_Edition.pdf See https://www.fema.gov/media-library-data/1527613746699-fa31d9ade55988da1293192f1b18f4e3/CPG201Final20180525_508c.pdf THIRA 2019. THIRA 2019. See https://www.fema.gov/media-library/assets/documents/181470 Ibid. source: Comprehensive Preparedness Guide 101, FEMA.gov, pp. 1-8 and 1-9. See https://www.dhs.gov/what-dhs-does-during-cyber-attack Ibid. See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-CyberAttack_0.jpg Note that FBI is agency located within US Attorney General’s Office not within DHS. FBI partners with the Director of National Intelligence and other U.S. intelligence agencies to collect and analyze intelligence involving terrorism-related offenses. See https://www.dhs.gov/what-dhs-does-during-explosives-terrorist-attack See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-A-TerroristIncident.jpg See https://www.dhs.gov/what-dhs-does-during-major-storms-and-severe-weather-events 58. See https://www.dhs.gov/what-dhs-does-during-pandemics 59. See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-MajorStorm.jpg 60. Ibid. 61. See https://www.dhs.gov/what-dhs-does-during-political-convention 62. See https://www.dhs.gov/sites/default/files/images/opa/What-DHS-Does-During-Pandemics. jpg 63. Ibid. https://www.dhs.gov/sites/default/files/images/What%20DHS%20does%20during%20 National%20Conventions%20Slide_4.jpg 64. The Journal of Homeland Security and Emergency Management has its mission to bridge the gap between the two disciplines. 65. McCreight (2009, 2011), Renda-Tanali (2013) and Kahan (2015). 66. Ramsay and Renda-Tanali (2018); Blanchard (2005); Feldman-Jensen (2017). 1. Mark Lowenthal offers a similar definition, writing that intelligence can be thought about as the process by which information is gathered, analyzed, and disseminated; the products of the intelligence community; and the organizations that make up the IC (Lowenthal, 2017, p. 11). 2. For a concise discussion of Kent’s view of intelligence analysis, see Davis (2002). 3. I discuss these three schools in more detail in my book (Dahl, 2013), upon which this section is drawn. 4. Useful discussions of homeland security intelligence include Burch (2007), Logan (2018) and Steiner (2015). 1. The so-called “Westphalian System” is a global system of norms predicated on the international legal principle that each nation has sovereignty over its own territory and its own domestic affairs; that external powers should not interfere in another nation’s domestic affairs; and that every nation has a similar right to sovereign domestic self-determination under international law. The doctrine is named after the 1648 Peace Treaty of Westphalia. 2. UNEP (2019). 3. Greta Thunberg (2019). 4. Many people are unaware that simply measuring atmospheric heat buildup is wholly inadequate for assessing the scope of the problem. According to the IPCC, the oceans have absorbed more than 90% of the additional trapped heat. This is good for the shortterm atmospheric implications, but very bad for the long-term overall climate change, fisheries, ocean currents, etc.—since that stored energy will change ecosystem dynamics radically. For a good graph of the IPCC data, see http://www.skepticalscience.com/ graphics.php?g=12 5. Both global warming and climate change beget each other in the end—see, for instance, Shi, Wang, and Yang (2010). For a thorough timeline of climate change science over the last 150 years, see Mason (2013) at http://www.skepticalscience.com/history-climatescience.html 6. Previously cautious about tying specific extreme weather to climate, scientists are much more confident about calculating the weight and import of the connection. See, for instance, Lloyd and Oreskes (2019). 7. Wicked problems are problems that exhibit the following characteristics: the solution depends on how the problem is framed, stakeholders vary considerably in how they define and understand the problem, the constraints and resources available to address the problem change over time, the problem is never (totally) solved. See Tom Ritchey (2013), Wicked Problems (Swedish Morphological Society, 2005, revised 2013), http:// www.swemorph.com/pdf/wp.pdf 8. The following sections are adapted from O’Sullivan and Ramsay (2012) and Ramsay and O’Sullivan (2013). 9. See for example, http://www.cdc.gov/climateandhealth/publications.htm; the Environmental Protection Agency at http://www.epa.gov/climatechange/; and the U.S. Department of Agriculture at http://www.usda.gov/oce/climate_change/. 10. “International security” is also a contested concept, and the most orthodox (Cold War-era especially) definitions addressed primarily military issues. But many scholars and analysts now advocate far broader definitions that include other, non-military, threats to the security of nations. For a discussion of this evolving thinking, see Buzan and Hansen (2009) and Buzan et al. (1998). 11. A review of policies and acts related to the design and production of US national security varies depending on the context. See, for example, Maier’s (1990) definition: “National security... is best described as a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own selfdetermination or autonomy, prosperity and wellbeing”. 12. Adapted from Lanicci, Ramsay, and Murray (2017). 13. This section adapted from Ramsay and O’Sullivan (2013). The reader is also referred to Ramsay and Renda-Tenali (2018) in the fall issue of the Journal of Homeland Security and Emergency Management or a more complete treatment of homeland security knowledge domains. 14. See Homeland Security Affairs VI, no. 2 (May 2010) special issue dedicated to homeland security program development. Specifically, Ramsay, Cutrer, and Raffel (2010), Moore, Hatzodony, Cronin, and Brekenridge (2010), Polson, Persyn, and Cupp (2010) and Bellavita (2008). 15. Adapted from Ramsay and O’Sullivan (2013). 16. Though if tipping points are reached in sub-Arctic permafrost deterioration, or melting of deep ocean Arctic frozen methane, this could lead to a rapid, massive “carbon bomb” that would rival human emissions, according to experts. 17. The seminal article at the time, demonstrating that human carbon emissions were not just being absorbed by the oceans, was Revelle and Suess (1957). 18. The lighter carbon-12 from fossil fuels burning is contrasted with heavier, natural carbon-13 (Cook, 2010). 19. Decline in arctic ice keeps breaking records and exceeding the models (USGCRP, 2017; Vidal, 2012). 20. From O’Sullivan, T. M., & Ramsay, J. (2015). Defining and distinguishing homeland from national security and climate-related environmental security, in theory and practice. Journal of Homeland Security and Emergency Management, 12(1), 43–66. 21. Adapted from Ramsay and O’Sullivan (2013). 22. Ibid. 1. In contrast to the rest of the Western nations, all of which have some variation on universal healthcare systems. 2. The 1918–1919 Flu is estimated to have killed between 50 and 100 million people worldwide. 3. Severe Acute Respiratory Syndrome—Coronavirus, which spread to at least two dozen countries on 4 continents. https://www.cdc.gov/sars/index.html 4. See for instance Maciosek et al. (2010). Vaccines, for instance, are almost universally cost effective from a societal perspective, compared to the diseases they prevent. 5. The federally coordinated Laboratory Response Network (LRN) is a network of laboratories that can respond to biological and chemical threats and other public health emergencies, and now includes state and local public health, veterinary, military, and international labs. https://emergency.cdc.gov/lrn/index.asp 6. Research funding and support for biomedical and health services exists and is administered through entities such as the National Institutes of Health, the National Science Foundation, and the CDC. 7. For instance, given a certain situation, a more rural area or state might experience an overwhelming disaster, where an urban area with better resources would not. 8. https://www.phe.gov/Preparedness/planning/authority/Pages/default.aspx#stafford 9. The lifelines are basic services categories “designed to enable emergency managers, infrastructure owners and operators, and other partners to analyze the root cause of an incident impact and then prioritize and deploy resources to effectively stabilize the lifeline… This construct maximizes the effectiveness of federally supported, state managed, and locally executed response.” (FEMA, 2019) 10. See Department of Homeland Security, https://www.dhs.gov/cisa/critical-infrastructuresectors 11. See Delamater et al. (2019) for further discussion of virulence and reproductive rates of selected pathogens (i.e., Ro). 12. Epidemics are any unusual disease outbreak, and pandemics are epidemics covering multiple countries or continents. 13. Vectors are disease transmitters such as mosquitoes, flies, fleas, snails, and ticks. Vector-borne diseases such as malaria, dengue, yellow fever, Chagas disease, leishmaniasis and schistosomiasis account for more than 17% of all infectious diseases, causing more than 700,000 deaths annually. Malaria alone causes up to 400,000 of those deaths. (WHO, 2017) 14. The incubation period is the time between infection of the host and evident manifestations of disease. 15. The following is partially adapted from O’Sullivan (2017). 16. The 1918 Influenza lasted more than 18 months, and passed in a series of waves that went from weeks to months at a time. 17. Once again, however, nothing compared to the global “lock-downs” that occurred in virtually every country in the world after SARS-CoV-2, COVID-19 disease appeared. 18. The anthrax attacks were thus dubbed “5/11” by many public health analysts. 19. Zoonotic diseases are those transmitted across species, as happens with avian (bird) or swine (pig) influenzas that can become infectious to humans. The SARS-COV2 virus was identified as a bat coronavirus likely transmitted via another animal to humans at one or more of the live animals “wet markets” in Wuhan. 20. Huang, C., Wang, Y., Li, X., Ren, L., Zhao, J., Hu, Y., ... & Cheng, Z. (2020). Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China. The Lancet, 395(10223), 497–506. 21. LiveScience Staff (6-March-2020). Coronavirus cases top 100,000: Live updates on COVID-19. LiveScience. https://www.livescience.com/coronavirus-updates.html?utm_ source=Selligent&utm _ medium=email&utm _campaig n=14899&utm _content= 20200306_LS_Essentials_Coronavirus+-+adhoc+&utm_term=3699115&m_i=Mf2Mi ExrM9m6gA4rLTkYlHBvVMSB1WUPt02_HwZzvC0hElSMXmSXMRtM2GYQjLRq YRMxhfbFYoc%2BQbdhtmWAb6a1zYceNAzyMU 22. Daniel Bachman (March 3, 2020). The economic impact of COVID-19 (novel coronavirus). Deloitte Insights. 23. Andy Sullivan and Richard Cowan (March 6, 2020). After U.S. Congress and Fed’s quick coronavirus response, next steps likely tougher for Washington. Reuters. https://www. reuters.com/article/us-health-coronavirus-usa-politics-idUSKBN20T2W5 24. James Hamblin (January 30, 2020). We don’t have enough masks. The Atlantic. https:// www.theatlantic.com/health/archive/2020/01/viral-masks/605761/ 25. It went on to note that American policy should be aimed at developing a new plan for bioweapons proliferation and bioterrorism prevention, emphasizing renewal of the neglected and insufficient 1972 Biological Weapons Convention (BWC). The Commission also urged renewed efforts to evaluate domestic sources of dangerous disease agents, and improved oversight for research labs from which germs might be stolen or accidentally released (WMD Report, 2008). 26. Such as CRISPR gene editing (Jiang & Doudna, 2017), and high throughput Polymerase Chain Reaction (PCR) gene copying technologies (NCBI, 2017). 27. Which was criticized because of fears it presented a “how-to” level of published detail. 28. According to the WHO, H5N1 has a mortality rate of about 60%, but a lack of thorough population sero-surveys of previous exposure in the countries most affected may have missed subclinical survivors or cases that were missed by the medical system; hence, the fatality rate could be much higher. See for example: https://www.who.int/influenza/ human_animal_interface/avian_influenza/h5n1_research/faqs/en/ 29. Though as one Harvard epidemiology noted, by limiting the research restrictions to the 15 specific agents, would-be bioterrorists could simply work around it by manipulating other agents not on the list (Akst, 2014b). 1. Consider the laws passed just in the first 12 months, post 9/11: USA PATRIOT Act of 2001, Pub.L. 107-56, 115 Stat 272 (2001); Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat 2135 (2002); Public Health Security and Bioterrorism Preparedness Response Act of 2002, Pub.L. 177-188, 116 Stat. 594 (2002); The Aviation and Transportation Security Act of 2001, Pub.L. 107-71, 115 Stat. 597(2001); Support Anti-Terrorism by Fostering Effective Technologies Act of 2002, Pub.L. 107-296, 116 Stat. 2135 (2002); The Critical Infrastructure Information Act of 2002, 6 U.S.C. §§ 131–134 (2002); The Cyber Security Enhancement Act of 2002, 6 U.S.C. § 657 (2002); The Maritime Transportation Security Act of 2002, Pub.L. 107-295, 116 Stat. 2064–2134 (2002); The Terrorism Risk Insurance Act of 2002, Pub.L. 107-297, 116 Stat. 2322 (2002). 2. See U.S. Constitution, Art VI, §1, cl. 3. 3. “The Senators and Representatives before mentioned, and the Members of the several State Legislatures, and all executive and judicial Officers, both of the United States and of the several States, shall be bound by Oath or Affirmation, to support this Constitution; but no religious Test shall ever be required as a Qualification to any Office or public Trust under the United States”. 4. See for example The Maritime Transportation Security Act of 2002, 46 U.S.C. § 70102 (2002) (requiring the Secretary of the Department of Homeland Security “to identify those vessel types and United States facilities that pose a high risk of being involved in a transportation security incident”. 5. See for example: McCulloch v. Maryland, 17 U.S. (4 Wheat.) 316 (1819) Chisholm v. Georgia, 2 U.S. (2 Dall.) 419 (1793); Martin v. Hunter’s Lessee, 14 U.S. (1 Wheat.) 304 (1816). 6. Note that spelling and grammar as used in the US Constitution have been preserved. 7. The 10th Amendment to the US Constitution provides that: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people”. U.S. Const. amend. X. 8. Without the power of the purse, that is, the ability to raise revenues to fund a military expedition, the power to declare war is almost meaningless. An oft-noted example of the frailty of the central government was its inability to timely seat a quorum to ratify the Treaty of Paris, marking its independence or to pay the expense of sending the ratified treaty to England. See, e.g., U.S. Code 1952 Edition, Articles of Confederation—1777. 9. The implied powers of Congress were first recognized by the US Supreme Court in McCulloch v. Maryland, 17 U.S. 316 (1819). 10. 18 U.S.C. §§ 2701–2712 addresses voluntary and compelled disclosure of “stored wire and electronic communications and transactional records” held by third-party internet service providers. It was enacted as Title II of the Electronic Communications Privacy Act of 1986. 11. “All legislative powers herein granted shall be vested in a Congress….” U.S. Const. art. 1, § 1. 12. Congress, through the Taft-Hartley Act, had created a mechanism to resolve such labor disputes, which would have prevented the ensuing United Steel Workers Union strike. 13. See discussion of the Insurrection Act. 14. Unfortunately, the Court also included a poorly phrased methods-based caveat to the test, adding “at least where (as here) the technology in question is not in general public use”. 15. The Maxwell decision will seem quaint today in its discussion of the applicable technology. But the Court’s continuing struggle, well-demonstrated in this case, to balance the 4th Amendment promise of a reasonable expectation of privacy with law enforcement needs to combat technology-facilitated crimes may serve as the basis of another case study. The Court’s application of the “Third Party Doctrine”, finding no reasonable expectation of privacy in data held by a third party, should be explored simultaneously. See Smith v Maryland, 442 U.S. 735 (1979), and Carpenter v. United States, 138 S.Ct. 2206 (2018). 16. While the Fifth Amendment is directed at the federal government, the Fourteenth Amendment has a parallel limitation on state and local governments, also requiring that an act by the government against its people must be undertaken with due process of law. 17. The U.S. Supreme Court case in Plyer v. Doe, involved the State of Texas’ revision of its laws to exclude the children of undocumented immigrants from being eligible to attend K-12 school. The Court held that the children of undocumented immigrants are “people” as stated in the 14th Amendment, and under the Equal Protection clause one’s immigration status is not a sufficient rational basis for denying benefits afforded to other residents. 18. DoDD 5525.5, DoD Cooperation with Civilian Law Enforcement Officials. 1. That is, even though it may not draw a profit itself, cybersecurity can help lessen the likelihood of an incident and can help mitigate the harm/costs that could result from an incident. 2. Rules have also been established to deter cybercrime behavior, but these laws are not central to maintaining confidentiality, integrity, availability, or resilience; such aspects of our criminal and civil code are not discussed in this chapter. It should be noted that such rules generally prohibit the security concept of “hacking back” by victim organizations against a perceived aggressor (Cook, 2018). 3. Rather, most national governments outlaw other countries’ intelligence operations on domestic soil. This is a matter of national law, not international law. 4. Although the title invokes an emphasis on critical infrastructure, this framework is suitable for all types of organizations, from businesses to non-profits to government agencies. NIST also provides some more particularized framework guidance for certain sectors, such as manufacturing, and for organizations concerned about the security and resilience of industrial control systems. 1. Unless otherwise cited, the information contained in section 14.4.5 (Non-Competitive and Unconstrained Biometrics) derives from the personal involvement of the author in technology-development initiatives for DHS. See the National Institute of Standards and Technology (2019) Chexia Face Recognition webpage listed in this chapter’s reference section for additional resources on this topic.