330 likes | 1.72k Views
Chapter 14: An Introduction to Homeland Security. Defining Homeland Security. Searching for Defined Roles While not completely defined, agencies have made progress over the last few years, especially in the area of information sharing and cooperation.
E N D
Defining Homeland Security • Searching for Defined Roles • While not completely defined, agencies have made progress over the last few years, especially in the area of information sharing and cooperation. • The reason for the confusion about policy: America had no common definition of homeland security • The new Department of Homeland Security (DHS) was responsible for protecting the borders and the country’s interior. • A host of private businesses, nonprofit organizations, and health care systems were involved in security efforts.
Defining Homeland Security • Keeping the country safe • Agencies are beginning to understand their roles and the concept of homeland security. • Homeland security protects lives, property, and infrastructure. • Divided into three functions: • preventing terrorism • responding to attacks • providing technical support to local agencies • Critics maintain that confusion remains and that the country is not prepared.
Security Missions • The policy guiding homeland security has not been fully developed. • Executives are not quite sure of the way that all the missions of various agencies fit together. • Homeland security involves civil defense. • Homeland security is much more than the sum of agencies charged with protecting the United States. • A major portion of security is a civic responsibility.
Agencies Charged with Preventing and Interdicting Terrorism • The Department of Homeland Security • Created from the Office of Homeland Security in 2003 as a direct result of the 9-11 attacks. • Has several different missions. • Many DHS agencies are involved in intelligence. • Office of Intelligence and Analysis coordinates these efforts. • Many DHS employees are employed in law enforcement tasks. • They have arrest powers. • The are trained in the Federal Law Enforcement Training Center (FLETC).
Agencies Charged with Preventing and Interdicting Terrorism • The Department of Justice • DOJ maintains several functions in the realm of terrorism and the most noted agency is the FBI. • The Department of Justice is involved in other areas. • The U.S. Marshall’s Service • The Bureau of Alcohol, Tobacco, and Firearms (ATF)
Agencies Charged with Preventing and Interdicting Terrorism • The Department of Defense • In time of war, the military organizations in the Department of Defense (DOD) play the leading role. • DOD operates the United States Northern Command for the purpose of homeland security. • In times of emergency military forces can provide much needed assistance to local units of government.
Agencies Charged with Preventing and Interdicting Terrorism • The Intelligence Community • Underwent massive changes after 9-11 and the failure to find WMD after the invasion of Iraq. • The purpose of the ODNI: • To unite America’s national security intelligence under one umbrella. • To coordinate information from national security and military intelligence. • To run intelligence operations from the Department of State. • To incorporate federal law enforcement intelligence under its umbrella.
Agencies Charged with Preventing and Interdicting Terrorism • State, Local, and Tribal Enforcement • Collect tactical intelligence for the prevention of terrorism and other crimes. • Utilize intelligence for planning and the deployment of resources. • Enhance counterterrorism efforts through the information sharing. • When it comes to terrorism, state, local, and tribal agencies are crucial to homeland security.
Rethinking Conflict • Networks and Law Enforcement • Homeland security is more than counterterrorism. • Law enforcement has a major role in stopping international networks that wage modern conflict. • The primary job of law enforcement in preventing terrorism is to stop criminal activity within networks. • Arquilla and Ronfeldt: five factors must be in place for networks to operate. • Technology • Social support • Narrative • Organizational structure • Tactical doctrine
Rethinking Conflict • Rethinking conflict: • Networks have changed the tactical structure of conflict. • The principles of conflict remain the same. • Terrorist group have to have a structure units for operations. • Terrorists have to effectively communicate with one another. • Terrorists must: • Move material • Seize and maintain the initiative • Sass at the enemy’s weak point • Psychologically convince the enemy that there is no point in fighting • The rule set has changed; not the nature of war.
Blurring War and Peace • Blurring War and Peace • The practice of terrorism has blurred the distinction between war and peace. • The Constitution states that only Congress has the power to declare war. • Terrorism is changing the nature of conflict. • Law enforcement agencies, courts, and corrections joined in the battle, even though they are not constitutionally associated with military power.
Networks and Classical Theories of Conflict • Carl von Clausewitz • Prussian general and military philosopher • Studied the Thirty Years’ War (1618–1648) and Frederick the Great (1740 –1786). • Joined the Russian Army in 1812 to fight Napoleon and the German War of Liberation. • Emphasized that the purpose of military action is to seek a decisive engagement. • Terrorism, however, is designed to produce the opposite effect, seeking to avoid direct confrontation with force.
Networks and Classical Theories of Conflict • American law enforcement • Does not seek a decisive battle with enemy forces. • Its purpose can never be the imposition of political will. • Will be involved in combating terrorism. • Because the goals of terrorism are to create panic and cause social systems to break. • Sun Tzu, a Chinese philosopher • Produced a treatise on the paradoxes of war. • War and politics were psychological forces held together by the belief in power. • Concept of strength-to-weakness • In modern military parlance this is called asymmetry. • It means competing forces are out of balance, a weak force fights a much stronger power.
Pearl Harbor and 9-11: Two Different Worlds • Pearl Harbor and 9-11: Two Different Worlds • Indicated that America was vulnerable to attack • Occurred with no formal declaration of war • Involved civilian casualties • The purpose of the Japanese surprise attack was to destroy U.S. military capabilities in the Pacific • The purposes of the September 11 terrorists were • To temporarily destroy America’s capacity to wage war • To achieve political objectives with military might • To negotiate a truce from a position of strength • To create drama and fear • To persuade Western institutions to change their behavior • To attack globalization
Operating Deeply in Our Society • Arthur Cebrowski the U.S. armed forces need to: • Develop the ability to operate “deeply” in society • Fully understand, accept, and defend America with a complete comprehension of American culture combined with the willingness to completely understand any enemy society in depth • Create a new defense culture that permeates all levels of society and that breaks down barriers between organizations • Martin van Creveld: • A war for existence changes the nature of conflict because the strategic rules of war and the rational extension of policy are thrown out the window. • If military forces approach homeland security as a continuation of national policy, they will bring the wrong weapons to the wrong war.
Building Intelligence Systems • The Intelligence Process • Police intelligence systems can be modeled after academic research • Involves general information about a subject and its sub-disciplines • Involves gathering basic information about a target and real-time information about current activities • Involves collecting, analyzing, and forwarding information • National Security and Criminal Intelligence • In network-to-network conflict, bureaucracies should not change their role. • Each organization in a network has its own function. • The key to success in a network is sharing information.
Building Intelligence Systems • National security intelligence • Gathered to defend the nation • Is not used in criminal prosecutions • Is not subject to legal scrutiny • Criminal intelligence • Gathered by law enforcement and prosecuting attorneys • Cannot be gathered, analyzed, or stored without reason to believe that a crime is about to or has taken place • Law enforcement should plan and develop two channels for information • Aimed at law enforcement intelligence • Prepared to pass information along to defense sources
Building Intelligence Systems • A Checkered Past • Law enforcement and national defense intelligence came under difficult times during the administration of President Jimmy Carter. • The president tried to correct the abuse of power and end the scandal of using covert operations against American citizens. • The USA Patriot Act increases the ability of law enforcement and intelligence agencies to share information. • The abuses of the past cannot be repeated if police agencies want to develop effective intelligence systems.
Building Intelligence Systems • The New Jersey Intelligence System • The NJSP Intelligence Service Section is made up of three main divisions. • The Intelligence Bureau, composed of six units: • The Analytical Unit • The Casino Intelligence Unit • The Electronic Surveillance Unit • The Liaison Computerized Services Unit • The Services Unit • The Street Gang Unit • The Central Security Unit • The Solid Waste Unit
Building Intelligence Systems • The California Intelligence System • The center linked federal, state, and local information services in one system and divided operational zones into five administrative areas. • Trained intelligence analysts operated within civil rights guidelines and utilized information in a secure communications system. • It combined intelligence • Gathered by computers and other automated devices • Gathered from a variety of police agencies • California created new systems under the tight control of regional law enforcement agencies and in partnership with four regional Joint Terrorism Task Forces.
Building Intelligence Systems • The NYPD Intelligence System • Police Commissioner Raymond Kelly created two new units: • One for counterterrorism and • One for intelligence • Kelly stated that he wanted the NYPD to do a better job of intelligence analysis and to work more closely with the federal government.
Building Intelligence Systems • US Attorneys and the JTTFs • The DOJ has created two intelligence systems • One in federal prosecutors’ offices • The other in law enforcement • Each U.S. Attorney’s office has an Anti-Terrorist Assistance Coordinator (ATAC) • Coordinate the collection of criminal intelligence • To share intelligence among federal, state, local, and tribal law enforcement agencies • That hold security clearances • Each Joint Terrorism Task Force (JTTF) is made up of: • Officers from all levels of American law enforcement • Officers from a variety of different types of agencies • Agents that received a national security intelligence clearance
Building Intelligence Systems • Plans, Networks, and Fusion Centers • The National Criminal Intelligence Sharing Plan (NCISP) • Created by the International Association of Chiefs of Police (IACP) and the Department of Justice • The purpose of the plan: • To establish norms for collecting, analyzing, and storing criminal intelligence within legal guidelines. • To suggest manners in which information could be shared among agencies
Issues in Homeland Security • Criminal intelligence networks in operation after 9-11: • The Regional Information Sharing System (RISS) • The Anti-Terrorism Information Exchange (ATIX) • FBI’s Law Enforcement Online (LEO) • The Law Enforcement Intelligence Unit (LEIU) • The Homeland Security Information Network (HSIN)
Law Enforcement’s Special Role • Law Enforcement’s Special Role • Responsible for breaking some of America’s most formidable terrorist cells. • If state and local agencies shift to offensive thinking and action, two results will inevitably develop: • Police contact with potential terrorists will increase. • Proactive measures demand increased intelligence gathering, and much of the information will have no relation to criminal activity. • Police intelligence operations and drug enforcement units can add counterterrorism to their agendas. • Patrol and investigative units can be trained to look for terrorist activities in the course of their normal duties.
The Role of Symbols and Structures • The Role of Symbols and Structures • Asymmetrical war is waged against symbolic targets • Homeland security is designed to secure symbols • Americans represent symbolic targets of military value • Styles of terrorism • Symbolic terrorism is a dramatic attack to show vulnerability. • Pragmatic terrorism involves a practical attempt to destroy political power. • Systematic terrorism is waged over a period of time to change social conditions. • Terrorists use symbolic attacks or attacks on symbols to achieve pragmatic or systematic results.
Creating a Culture of Information Sharing • The National Strategy for Homeland Security calls for increased information sharing among law enforcement agencies. • Intelligence is not properly analyzed, and agencies do not coordinate information. • Despite criticism, information sharing is growing into a law enforcement norm. • Police agencies should: • Adopt community policing strategies • Developed skills in problem solving • Build community partnerships • Gather and analyze the information needed to deal with crime and social problems in a local community
Intelligence and the 9-11 Commission Report • The 9-11 Commission Report suggested several reforms for restructuring government: • Focus on defense, intelligence, information sharing, homeland security, and law enforcement • The current position of Director of Central Intelligence should be replaced by a National Intelligence Director • Integrating the U.S. border security system into a larger network • The central question for criminal justice focuses on the role of law enforcement. • The question of balancing security with freedom is delicate, and the new intelligence infrastructure has not dealt with all the issues.