Maps: ADJ 243 Homeland Security and the Law |
Home Page // Assignments Page // Notes 1 // Notes 2 // Notes 3 // Notes 4 // Exam Page // Books // Paper // Articles |
|
Date: |
Maps: |
|
Exam 1 |
|
Study Guide for Chapter 1
The Idea and Origin of Homeland Security
1. Define Homeland Security: efforts to ensure that the United States is safe, secure, and resilient against terrorism and other hazards.
2. Homeland Security covers all aspects of safety and security within the geographical limits of the United States. That is, within the U.S. it covers people, modes of transportation (aircraft, vessels. trains, subways), structures (including buildings, bridges, airports, dockyards, power plants, etc.) and cyber security.
3. Federal law, 18 U.S.C. 2331, defines the term "Terrorism" to include activities that involve:
a. violent acts or acts dangerous to human life that violate federal or state law,
b. where such acts appear intended to intimidate or coerce a civilian population, or
c. to influence the policy of a government by intimidation or coercion.
4. Two historical examples of states using terror to achieve political objectives:
a. Roman slave revolt led by Spartacus – the ancient Romans crucified 6,000 captured slaves along the ApianWay as an example of what happens to those that revolt from slavery.

b. The French Revolution and the Reign of Terror – The Committee of Public Safety executed hundreds of French citizens suspected of being enemies of the revolution (counter-revolutionaries).

5. A historical example of an individual act of terrorism:
In June 1914, a Serbian nationalist assassinated Archduke Franz Ferdinand of Austria, the nephew and heir to the Austro-Hungarian Empire, and his wife. This "shot heard around the world" was one of the causes of World War I.-- It has become associated with the assassination of Archduke Franz Ferdinand of Austria in Sarajevo on 28 June 1914, an event considered to be one of the immediate causes of World War I.

6. Three 20th Century examples of state terrorism:
a. Nazi Germany - The Final Solution/Holocaust" (extermination of the Jewish people). Also, the mass murder of any considered people considered inferior to Aryans – the infirm, the mentally feeble, and all resisters (resistance fighters, communists, clergy, anti-Nazis, etc.).

b. The Japan Empire - in 1937 the Japanese army invaded China and engaged in what is called "The Nanking Massacre or the Rape of Nanking." At that time Nanking was the capital of the Republic of China. Over a six week period the Imperial Japanese Army murdered an estimated 40,000 to over 300,000 Chinese civilians and disarmed combatants, and perpetrated widespread rape and looting.
c. The Soviet Union (USSR) under Joseph Stalin - it is estimated that under Stalin (1922-1952) the USSRmurdered perhaps 10 million people – mostly, its own citizens. Many were executed (including anti-communists, those charged with political offenses, and German prisoners from WW2), and others were killed because of state-caused famines in 1932-33.

7. Examples of groups that engaged in domestic terrorism prior to 9/11:
a. Klu Klux Klan - "Founded in 1866 by six former members of the Confederate Army the Klu Klux Klan (KKK) extended into almost every southern state and became a vehicle for white southern resistance to the Republican Party's Reconstruction-era policies aimed at establishing political and economic equality for blacks. Its members waged an underground campaign of intimidation and violence directed at white and black Republican leaders."

b. The Weathermen - Founded in 1968 the Weathermen issued a "Declaration of War" against the U.S. to "lead white kids into armed revolution." The group believed that "revolutionary violence" was needed to fight America's military foreign interventions such as the Vietnam War.

8. Example of a U.S. individual who engaged in domestic terrorism prior to 9/11:
Timothy McVeigh, an ex-U.S. Army soldier and security guard, used a rented Ryder truck filled with explosives to blow up the Alfred P. Murrah Federal Building in downtown Oklahoma City killing dozens. Among other reasons, McVeigh's motivation for the bombing was to retaliate against federal agents for their role in the Ruby Ridge standoff and the Branch Davidian siege at Waco, Texas.

9. Examples of terrorist acts and plots in the U.S. caused by foreign terrorists prior to 9/11:
a. 1993 bombing of the New York World Trade Center – Conspirators linked to Al Qaeda exploded a bomb in the parking garage beneath the World Trade Center. Six people were killed and over a thousand injured.

b. Millennium Plot - Ahmed Ressam, an Algerian national, engaged in a plot by Al Qaeda to detonate explosives at Los Angeles International Airport (LAX) on the eve of the new millennium, December 31, 1999. U.S. Customs inspectors at Port Angeles, Washington intercepted Ressam when he attempted to enter the U.S. with explosives hidden in the trunk of his car.

|
|
|
|
-
Study Guide for Chapter 2
Terror, Threat, and Disaster - Post 9/11
-
1. On September 11, 2001, Al Qaeda perpetrated the most deadly attack ever in the U.S. The attack is known as the 9/11 attack or 9/11 attacks and is a militant Sunni Islamist multi-national organization founded in 1988 by Osama bin Laden, Abdullah Azzam, and several other Arab volunteers who fought against the Soviet invasion of Afghanistan in the 1980s.
-
2. The loss of life and damage in New York were catastrophic – 2,600 people died at the World Trade Center, 125 people died at the Pentagon, and 256 on the four airplanes involved in the attacks. That is a total of 2,981 lives lost, more than lost during the Japanese surprise attack on Pearl Harbor in World War II.
-
3. "The 9/11 attacks drastically altered notions of security within the U.S. and many Americans, including leading government officials, became concernedabout safety from terrorism within U.S. borders."
-
4. Al-Qaeda is an international terrorist network founded around 1988 by Usama bin Laden, a wealthy national of Saudi Arabia.
-
5. One of Al Qaeda's main goals is to overthrow regimes it deems "non-Islamic" and to expel Westerners from Muslim countries.
-
6. Al Qaeda conducts terrorist acts to achieve its stated goal, with the U.S. as one of its main targets.
-
7. 9/11 caused the Federal Government to reexamine the entire approach to law enforcement and the overall security of the nation. This reexamination revealed critical problems that interfered with the ability of the US to identify and stop terrorist acts.
-
8. After 9/11 examination of U.S. antiterrorism efforts identified the following problems (among others):
FBI Problems:
a. The FBI did not adequately target terrorists: historically the FBI was concerned about the potential random acts of terrorists, but needed to shift into a more intense scrutiny of the terrorism threats to the US.
b. The FBI did not gather adequate intelligence on terrorists and terrorist threats:
c. The FBI also did not have a system for adequately tracking and sharing terrorism information, either internally or externally.
d. The FBI was more focused on foreign counter-intelligence (espionage) and drug counterterrorism cases, than terrorism cases.
Inter-Agency Coordination problems:
a. The events of 9/11 demonstrated a lack of coordination and interagency cooperation among the various entities with anti-terrorism responsibilities.
b. These entities included those involved in law enforcement (FBI, Customs, DEA, and ATF), the intelligence community (CIA), the immigration agency (INS) and other agencies.
c. It became known that a "wall" existed between the various agencies of government, not only at the federal level, but at the state and local level as well.
d. The CIA did not share adequate terrorism information with the FBI.
-
9. Reacting to problems with US anti-terrorism efforts identified by 9/11, Government officials began efforts to take corrective steps.
-
10. Before DHS was created (March 1, 2003) the federal government took steps to increase homeland security, for example:
a. The President established an Office of Homeland Security within the White House, with former Pennsylvania Governor Tom Ridge as its Director.
b. The Aviation and Transportation Security Act of 2001 was enacted. This legislation created TSA and provided several potent measures to increase aviation security (e.g., APIS Pre-Departure Certified Vendor List: CBP has developed a list of carriers or vendors that have completed testing to process interactive APIS Pre-Departure data and that have agreed to have their company included on the Certified Vendor List. and PNR to uniquely identify people attempting to board aircraft. It would expand the PNR field to include a few extra fields, like a full street address, date of birth, and a home telephone number. It would then cross-reference these fields with government records and private sector databases to ascertain the identity of the person, and then determine a number of details about that person. Law enforcement would be contacted in the event that the person was either present on a terrorist or most-wanted list or had outstanding Federal or state arrest warrants for violent crime).
-
11. Despite President Bush's creation of a White House Homeland Security Office, some members of Congress and other high ranking government officials believed that a new department was needed to address the deficiencies in U.S. homeland security efforts. An unstoppable momentum had begun towards creation of a new executive branch department that would be responsible for homeland security.
-
12. On November 19, 2002, Congress passed the Homeland Security Act of 2002 (P.L. 107-296).
-
13. Tom Ridge, former director of the Office of Homeland Security (and who also had been a Congressman and Governor of Pennsylvania) became the firstsecretary of the new Department of Homeland Security created by the act.
-
14. The Homeland Security Act (HSA) states, among other things, that the primary mission of the new department is to:
a. Prevent terrorist attacks within the United States;
b. Reduce the vulnerability of the United States to terrorism;
c. Minimize the damage, and assist in the recovery, from terrorist attacks that do occur within the United States;
-
15. The HSA organized DHS into four main areas:
1. border and transportation –
a. DHS became responsible for Immigration, Customs, Coast Guard, and transportation security functions.
b. How was this accomplished? By transferring Customs, Coast Guard, TSA, and the personnel, equipment, and functions of INS to DHS.
c. INS was abolished.
2. Emergency preparedness and response --
FEMA was transferred to DHS
3. Chemical, biological, radiological, and nuclear countermeasures
4. Information analysis and infrastructure protection
-
16. Within the Office of the Secretary DHS there are specialized offices, among those are:
a. Privacy Office - evaluates DHS programs, systems, and initiatives for potential privacy impacts, and provides mitigation strategies to minimize privacy impact.
b. Office of Civil Rights and Civil Liberties - Delivers policy advice to management on civil rights and civil liberties issues, investigates complaints from the public.
c. Office of General Counsel - Provides legal services to the Secretary and other DHS officials.
-
17. Like other Executive Branch departments, DHS has an Inspector General(IG). The IG is responsible for conducting investigations of alleged wrong doing by DHS employees. The IG also conducts audits of DHS programs.
-
18. DHS Agencies:
a. Customs and Border Protection (CBP)—the agency primarily responsible for the security of US borders and ports.
-
b. Citizenship and Immigration Services (CIS) —administers immigration and naturalization benefits.
c. Immigration and Customs Enforcement (ICE)—the investigative agency responsible for investigating possible violations of the customs and immigration laws, and all other laws regulating the movement of items and people across US borders (drugs, munitions, etc.).
d. Coast Guard—protection of nation's ports and waterways.
e. FEMA—manages national disasters, hazards and threats and responds thereto.
f. Secret Service—protection of the president, vice president, and other high-level officials; investigates certain financial crimes.
g. Transportation Security Agency (TSA)—protects the nation's transportation systems.
h. Domestic Nuclear Detection Office—coordinates threat response related to nuclear materials.
i. Federal Law Enforcement Training Center (FLETC) — the professional law enforcement training center located in Glynco, Georgia.
19. "The intent of the HSA was to combine, blend, and synthesize agency functions and to ensure such functions were placed within the appropriate DHS component. For both DHS and incoming agencies, this meant a drastic change of outlook and culture. The agencies transferred to DHS were required to adapt to the new mission and mindset."
-
20. One definition of corporate culture is: "A blend of values, beliefs, taboos, symbols, rituals and myths all companies develop over time. Whether written as a mission statement, or spoken or merely understood, corporate culture describes and governs the ways a company's owners and employees think, feel and act."
-
21. One major problem that DHS has faced since its creation is how to reconcile the different "corporate" cultures of agencies and personnel transferred to the department.
-
22. Abbreviations to know:
a. DHS – Department of Homeland Security
b. HSA – Homeland Security Act
c. S1 – Secretary of DHS
|
|
Week 3 |
September 23, 2017 |
Study Guide for Chapter 3
Homeland Security Laws and Regulations
1. The power of DHS comes from the legal authority that created it. Like other federal
departments, various laws, regulations, and executive orders enable DHS to carry out its aim and
purpose.
2. Some of these laws vest DHS with law enforcement and intelligence powers, while other laws
enable DHS to work with international, state, and local governments, private persons.
3. Sources of federal law include:
a. The Constitution of the United States (for example, the Bill of Rights).
b. Federal statutes: laws enacted by Congress and signed into law by the President (or by
Congress in case it overrides a Presidential veto). Among other places, these statutes can be
found in the United States Code (U.S.C.).
c. Federal regulations: are issued by federal departments and agencies. They must be
derived from and consistent with the legal authority otherwise granted to the department
or agency that issues the regulation. They have the force and effect of law and can be found
in the Code of Federal Regulations (CFR).
Regulations are vital to the government as they allow departments and agencies to
implement laws within their jurisdiction.
d. Case Law: Our system of law derives form English common law. Common law has been
described as judge made law. That is, when a judge has a case he or she applies applicable
law - which can be statutes, regulations, and previous judicial decisions (usually reported cases)
– to the facts and circumstances of their case and they issue a decision. That decision itself can
then become judge made law.
e. Treaties; Under the Constitution, treaties negotiated by the President that are ratified by the
Senate become law. Example: an extradition treaty.
4. Executive Orders are issued by the President, but they do not always have the effect of
law. They only have the force of law when they are pursuant to a statute or other source of
law (for example, a treaty).
5. Right after the 9/11 attacks, President George W. Bush took steps to protect the
homeland. He did this mainly using his Presidential authority to issue executive orders
concerning homeland security measures. Among these steps were:
a. Executive Order 13228: Established the Office of Homeland Security and the Homeland
Security Council and was authorized on October 29, 2001, and subsequently expanded on by Homeland Security Presidential Directive 1.
b. Executive Order 13231: Critical Infrastructure Protection in the Information Age. This
Executive Order was directed at protecting information systems for critical
infrastructure, including emergency preparedness communications and the physical assets that
support such systems
6. Homeland Security Act of 2002 (HSA) was passed in November 2002.
7. The HSA had bipartisan support and passed the Senate and the House of
Representatives by wide margins.
8. The HSA was a comprehensive response to terror threats and laid out a national blueprint for homeland security.
9. The HSA includes the following areas of vital national interest:
a. border security;
b. information and infrastructure;
c. chemical, biological, and nuclear threats; and,
d. emergency preparedness and response.
10. The Real ID Act established minimum standards for the issuance of driver's licenses,
including: (Passed by Congress in 2005, the REAL ID Act enacted the 9/11 Commission's recommendation that the Federal Government "set standards for the issuance of sources of identification, such as driver's licenses." )
a. Information and security features that must be incorporated into each card.
b. Proof of identity and U.S. citizenship or legal status of an applicant.
c. Verification of the source documents provided by an applicant.
d. Security standards for the offices that issue licenses and identification cards.
11. Although the REAL ID program is well over a decade old, it has yet to be implemented by
all states. Just a little over half the states have driver licenses that comply with REAL ID
identity document requirements.
12. At present, Virginia driver’s licenses do not comply with REAL ID identity document
requirements. Per the DHS website, starting January 22, 2018, a REAL ID compliant (that is, approved) driver’s license must be used by persons to clear TSA for domestic air travel.
13. US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology) is a DHS program to
track the entry and exit of travelers to the United States by biometric means, that is, digital
fingerprints and photographs.
14. The goals of US VISIT are:
a. Enhancing the security of U.S. citizens and visitors,
b. Facilitating legitimate travel and trade,
c. Ensuring the integrity of the U.S. immigration system, and
d. Protecting the privacy of visitors to the United States
Among other things, US-VISIT uses biometric information to:
a. Check a person's biometrics against watch lists of known or suspected terrorists, criminals,
and immigration violators.
b. Verify a person's identity by comparing
their biometrics with those concerning the identification document they present.
15. Per the DHS, the use of biometrics (that is, the unique physical characteristics of
fingerprints and digital photographs) enables DHS and its agencies to zero in on a
person’s identity in a highly dependable way.
16. The Western Hemisphere Travel Initiative (WHTI) change in travel document
requirements is the result of recommendations made by the 9/11 Commission, which
Congress subsequently passed into law in the Intelligence Reform and Terrorism
Prevention Act of 2004.
17. Under WHTI, U.S. citizens and citizens of Canada, and Bermuda traveling by air between
the U.S. and Canada, Mexico, Central and South America, the Caribbean, and Bermuda must present a valid passport or other WHTI-compliant documentation to enter (or depart) the U.S.
18. To enter or depart the U.S. by land or sea, citizens 19 years and older of the United States,
Canada, and Bermuda must present a government-issued photo ID, such as a driver’s license, along with proof of citizenship, such as a birth certificate or naturalization certificate.
19. All travelers including citizens of the United States, Canada, and Bermuda are now
required to present a valid passport when entering the United States at any airport. This
includes children of any age.
|
|
Exam Two |
October 7, 2017 |
Notes for Exam Two
Study Guide for Chapter 3 (b) | PDF
ADJ-243 Study Guide for Chapter 3, PART 2
Homeland Security Law, Regulations, and Budgeting
1. The Federal Statute referred to as the posse comitatus statute is 18 U.S.C. 1385 which provides: Whoever, except in cases and under circumstances expressly authorized by the Constitution or Act of Congress, willfully uses any part of the Army or the Air Force as a posse comitatus or otherwise to execute the laws shall be fined under this title or imprisoned not more than two years, or both.
The Posse Comitatus Act is a United States federal law (18 U.S.C. § 1385, original at 20 Stat. 152) signed on June 18, 1878 by President Rutherford B. Hayes. The purpose of the act – in concert with the Insurrection Act of 1807 – is to limit the powers of the federal government in using federal military personnel to enforce domestic policies within the United States. It was passed as an amendment to an army appropriation bill following the end of Reconstruction, and was subsequently updated in 1956 and 1981.
2. Despite the posse comitatus statute’s continuing prohibition against using the U.S. Armed Forces to execute law, over the past 30 years numerous laws have been passed that authorize the military to assist law enforcement agencies in antiterrorism and drug enforcement efforts.
3. The USA PATRIOT Act was signed into law in October 2001. The USA PATRIOT Act was developed out of the belief that intelligence had been so poor prior to the attacks. It sought to correct the perceived failures in intelligence.

4. The USA PATRIOT Act was passed nearly unanimously by the Senate 98-1, and 357-66 in the House, with the support of members from across the political spectrum. The USA PATRIOT Act is an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001".
5. Among the important provisions in the USA PATRIOT Act are those that:
a. Removed barriers to sharing of intelligence information concerning terrorism.
b. Expanded grounds for the use of National Security Letters (NSLs) to obtain records relating to possible terrorist activity. A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes.
c. Expanded the grounds for gathering foreign intelligence relating to terrorism.
d. Expanded the crime of providing material support for terrorism.
e. Expanded the use of “roving wiretaps” in terrorism investigations.
f. Liberalized the grant and extent of foreign intelligence wiretaps and electronic surveillance.
g. Expanded the use of “Sneak and peek warrants” in terrorism investigations A sneak and peek search warrant (officially called a Delayed Notice Warrant and also called a covert entry search warrant or a surreptitious entry search warrant) is a search warrant authorizing the law enforcement officers executing it to effect physical entry into private premises without the owner's or the occupant's permission or knowledge and to clandestinely search the premises; usually, such entry requires a stealthy breaking and entering. Under the USA PATRIOT Act signed into law during the 107th United States Congress on October 26, 2001, sneak and peek warrants for the first time in United States history were used as standard procedure in investigations.
6. According to Nemeth, “DHS benefits significantly from the USA Patriot Actand urges the United States Congress to reauthorize this proven tool in the global war on terror. The Patriot Act breaks down barriers to information sharing, enabling law enforcement and intelligence personnel to share information that is needed to help connect the dots and disrupt potential terror and criminal activity before they can carry out their plots. [For example, the] broad information sharing provisions better enables U.S. Customs and Border Protection to screen international visitors and determine whether an apprehended alien presents a threat to security or public safety.”
The USA Freedom Act (H.R. 2048, Pub.L. 114–23) is a U.S. law enacted on June 2, 2015 that restored in modified form several provisions of the Patriot Act, which had expired the day before. The act imposes some new limits on the bulk collection of telecommunication metadata on U.S. citizens by American intelligence agencies, including the National Security Agency. It also restores authorization for roving wiretaps and tracking lone wolf terrorists.
|
|
|
|
Study Guide for Chapter 4
Risk Management, Threats, and Hazards
Oct. 4, 2017, Lecture
1. DHS has stated, "Ultimately, homeland security is about effectively managing risks to the Nation's security." See 2010 Quadrennial Homeland Security Review.
2. At a fundamental level, risk management requires consideration of key variables,
including:
A. What to protect.
B. The threats faced.
C. Strategy and plans for dealing with threats.
3. The work of homeland security delves into the nature of risk, whether at airports
or busways, public courthouses, or national monuments.
4. One definition: Risk – a situation that involves exposure to danger or something bad.
5. In evaluating risk one must look at the nature of any risk AND the consequences of the risk.
6. A formula for risk can be expressed as:
RISK = HAZARD (potential harm) x EXPOSURE (the level and magnitude of exposure to the potential harm)
7. EXAMPLES of risks:
A. Great risk: a terrorist anthrax attack. The HAZARD [A deadly biological agent] x the
EXPOSURE [can cause fatalities to a large number of people].
B. Minimal risk: a candy truck that turns over and large number of candy bars spill out.
8. The homeland specialist must prepare for the risk posed by:
A. all types of terrorist attacks (known and anticipated), and
B. all manner of natural disasters (floods, hurricanes, earthquakes, etc.).
9. Sound risk reasoning demands that a measure of quantification be used when formulating policy about risk.
10. Although risk can be quantified, risk decision makers ultimately must make
some subjective decisions in quantifying risk.
11. Quantification (that is, using distinct variables with assigned point values to type the risk) is frequently used by various homeland security agencies in making risk assessments.
12. According to Nemeth, the DHS risk formula would look something like this:
Risk = Asset value × threat rating × vulnerability rating
13. The severity of a risk will be assessed in light of its value, the nature of the
threat itself, and the potential for harm and injury.
14. The Rand Organization suggests three methodologies of risk assessment:
A. Analytic: An analytic process must address all three factors that determine terrorism risk— threat, vulnerability, and consequences.
B. Deliberative: A deliberative process is necessary because the notion of a
cold, actuarial terrorism risk assessment is unrealistic.
C. Practical: Finally, risk assessment must be practical.
15. Risk assessment can be departmentally and programmatically driven.Thus, risk
for CBP may be distinctively different than the risks of concern to the Federal Emergency Management Agency (FEMA).
16. Each agency and department needs to perceive risk in light of its overall mission.
17. Whatever approach is taken with risk assessment, it is critical to gather information,
anticipate events and incidents, understand the value of assets and potential harm, and weigh
and contrast the functionality and importance of geographic territory.
18. CARVER + Shock Assessment Tool
The CARVER system employs various criteria labeled as CARVER; CARVER is an acronym for the following six attributes used to evaluate the attractiveness of a target for attack: Criticality, Accessibility, Recuperability, Vulnerability, Effect, and Recognizability.
In addition, the modified CARVER tool evaluates a seventh attribute, the combined health, economic and psychological impacts of an attack, or the shock attributes of a target.
19. Nemeth explains that "Threats and hazards are often distinguished by their motive and purpose."
20. Hazards - are generally construed as acts of nature, unintentional events without political motive or purpose.
21. Threats - are usually bound to some improper aim or end, such as terrorism.
22. Recognize the distinction between threats and hazards: Natural disasters such as "hurricanes and floods are events lacking any intent and, as such, are relegated to the hazard category."
23. Natural hazards include: Hurricanes, Tornadoes, Floods, Winter storms, Heat-related emergencies, Droughts, Wildfires, Thunderstorms, and Geologic events (for example, earthquakes).
24. THREATS include crimes and terrorism.
25. Acts of terrorism include assassinations, kidnappings, hijackings, bomb scares, and bombings.
26. High-risk targets for acts of terrorism include military and civilian government facilities, international airports, large cities, and high-profile landmarks.
27. Homeland security officials assessing risk must understand that threats are constantly evolving. Thus, they must consider known threats and potential new threats.
28. According to Nemeth, there are four generally accepted categories of WMD: Nuclear (atomic); Radiological; Biological; and Chemical.
29. Some terrorist organizations, such as Al Qaeda, openly declare their desire to acquire and use nuclear weapons.
30. Most experts believe that because of the technology required to produce a nuclear weapon it seems unlikely that a terrorist group can actually produce (that is, manufacture) one.
31. The real fear is that terrorists will use the Back Market to procure atomic material. For example, there are industrial and commercial products (certain medical devices) that have small amounts of radioactive material. And though this radioactive material is the type that can trigger a nuclear reaction, it can be used to make a dirty bomb (i.e., using regular explosives to spread the radioactive material).
32. When a dirty bomb detonates, aside from the immediate injuries inflicted, there will be severe collateral damage from the nuclear material itself and it is is a speculative radiological weapon that combines radioactive material with conventional explosives. The purpose of the weapon is to contaminate the area around the dispersal agent/conventional explosion with radioactive material, serving primarily as an area denial device against civilians.
33. Bioterrorism is the deliberate dispersal of pathogens through food, air, water, or living organisms to launch disease and other harms to the public.
34. Anthrax (a deadly bacteria) and Ricin (a toxin made from castor beans) are two biological agents that in the wrong hands (terrorists, criminals, etc.) can pose a threat to homeland security.
35. Chemical weapons can cause high levels of mortality.
36. Sarin, invented as a pesticide in Germany before World War 2, is one of most deadly and feared chemical nerve agents. A very small amount of Sarin is potentially deadly to persons exposed to it.
37. In 1995, a Japanese religious cult used Sarin gas to attack part of the Tokyo subway system and a residential neighborhood causing fatalities and numerous injuries.The Tokyo subway sarin attack (Subway Sarin Incident (地下鉄サリン事件 Chikatetsu Sarin Jiken)), was an act of domestic terrorism perpetrated on March 20, 1995, in Tokyo, Japan, by members of the cult movement Aum Shinrikyo. Sarin Gas.

|
|
Week 6 |
October 11, 2017 |
Study Guide for Chapter
ADJ 243, Study Guide for Chapter 6 (Nemeth)
DHS Challenges: National vs. State and Local, National Security vs. Homeland Security
1. From the start, the creators of DHS envisioned the widespread participation of states and localities as the programs and policies of Homeland Security were implemented.
2. Stated another way, almost from the beginning of DHS its leadership recognized the necessity of local involvement and local control in homeland security efforts.
3. There are approximately 15,400 state and local police departments and agencies in the U.S. with over 475,000 state and local police officers employed by those departments.
4. Homeland Security Presidential Directive (HSPD) 5, issued by President Bush on Feb. 2003, made it clear that the Federal Government wanted a collaborative and integrated approach with state and local governments in homeland security efforts. The National Response Framework (NRF), which replaced HSPD 5, continues this same principle.
The National Response Framework is a guide to how the Nation responds to all types of disasters and emergencies. This Framework is always in effect and describes the doctrine under which the Nation responds to incidents.
Prevention: The capabilities necessary to avoid, prevent, or stop a threatened or actual act of terrorism. Within the context of national preparedness, the term "prevention" refers to preventing imminent threats.
Protection: The capabilities necessary to secure the homeland against acts of terrorism and manmade or natural disasters.
Mitigation: The capabilities necessary to reduce loss of life and property by lessening the impact of disasters.
Response: The capabilities necessary to save lives, protect property and the environment, and meet basic human needs after an incident has occurred.
Recovery: The capabilities necessary to assist communities affected by an incident to recover effectively.
5. Initial responsibility for managing domestic incidents generally falls on state and local authorities (first responders).
6. Among other things, with regard to domestic incidents the NRF provides:
A. The Federal Government will assist State and local authorities when their resources are overwhelmed, or when Federal interests are involved.
B. The Secretary will coordinate with State and local governments to ensure adequate planning, equipment, training, and exercise activities.
C. The Secretary DHS will also provide assistance to State and local governments to develop all-hazards plans and capabilities, including those of greatest importance to the security of the United States, and will ensure that state, local, and Federal plans are compatible.
7. Following 9/11 the states created their own Homeland Security entities to ensure they were prepared at the front lines for terrorist attacks.
8. How states choose to construct their Offices of Homeland Security is unique to the given jurisdiction. Most states relied upon the governor to designate a person to be a homeland security director. Virginia's Bill Moran
9. Virginia has a Secretary for Public Safety and Homeland Security, who is appointed by the Governor and is a member of his cabinet. The Secretary is responsible for administering a statewide homeland security strategy, and for evaluating and overseeing state procedures for emergency management, disaster, and terrorism. The Secretary is the primary point of contact for DHS, and is responsible for overseeing federal homeland security grant funding in the state.
10. The word “fusion” may be defined as the process or result of joining two or more things together to form a single entity. Virginia's Fusion Center
11. On its website, DHS explains that a fusion center is a collaborative effort of two or more agencies that provide resources, expertise and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.
12. Fusion centers are also described as places where information and intelligence can be shared by the centers’ members for homeland security purposes.
13. There are over 70 Homeland Security fusion centers around the country, and each state now as at least one fusion center,
14. Fusion centers must have the following abilities:
A. Ability to receive classified/unclassified information from federal partners (this requires cleared personnel and secure networks for the transmission/processing of classified information.
B. Ability to assess local implications of threat information through formal risk assessment process.
C. Ability to further disseminate threat information to concerned law enforcement personnel and private sector entities.
D. Ability to gather locally generated information, aggregate it, analyze it, and share it with federal partners, as appropriate.
15. The DHS Office of Intelligence and Analysis provides personnel with operational and intelligence skills to staff the fusion centers.
16. Virginia has a fusion center that was established by state statute. That statute provides, among other things, that the Governor shall establish, organize, equip, staff, and maintain a multiagency fusion intelligence center to receive and integrate terrorist-related intelligence and information.
17. Virginia also has enacted a statute that provides immunity from liability provisions for officers and personnel working at the Center, and for persons who provide information regarding any suspected criminal violation to the Department of Public Safety and Homeland Security.
18. DHS issues money grants to states to help them fund fusion centers. DHS also issues grants to help the preparedness of state and local governments for homeland security incidents (terrorism, hazards, etc.).
19. Grants are probably one of the most significant ways that DHS funds state and local homeland security activities.
20. Senator Tom Coburn issued a report in January 2015 concerning DHS missions and performance. Among other things the report stated that since its creation in 2003, DHS has spent more than $38 billion on preparedness grants to state and local governments.
|
|
Week 7 |
|
|
|
Week 8 |
|
|
|
Week 9 |
October 19, 2017 |
Study Guide for Chapter 7 PDF
1. The Stafford Act constitutes the statutory authority for most Federal disaster response activities.
2. The Stafford Act vests responsibility for emergency preparedness jointly in the Federal government, state, tribal and territorial governments and their political subdivisions.
3. The Stafford Act also gives FEMA responsibility for coordinating Federal government response to support state, local, tribal, and territorial efforts.
4. Main provisions of the Stafford Act regarding Federal Government preparedness support to state and local governments:
a. The President is authorized to establish a program of disaster preparedness that coordinates with state and locals, and that uses services of all appropriate agencies.
b. The President shall insure that all appropriate federal agencies are prepared to issue warnings of disasters to state and locals.
c. The President shall provide technical assistance to States in developing preparedness, response, mitigation, and recovery plans for disasters/hazards.
d. The President is authorized to make grants to States for the development of preparedness plans.
5. To obtain disaster assistance from the Federal Government under the Stafford Act, state governors must request a declaration by the President that a major disaster exists that is beyond the capabilities of the state and local governments ands that Federal assistance is necessary.
6. In a major disaster, the Stafford Act authorizes the President to direct any Federal agency to assist state and local response and recovery efforts, including precautionary evacuations.
7. A “major disaster” is defined in the Stafford Act as any natural catastrophe which the President determines causes damage of sufficient severity and magnitude to warrant assistance to supplement efforts by states, charitable organizations, etc., in alleviating the damage, loss, hardship, or suffering.
8. Under the Stafford Act the Federal Government may render assistance to state and local governments, and to private persons needed to meet immediate threats to life and property resulting from a natural disaster. Such assistance includes:
a. coordinating disaster relief assistance.
b. providing technical and advisory assistance to state/locals.
c. assisting state/locals in the distribution of meds, food, and consumable supplies, and other emergency assistance.
d. lending or donating federal equipment, supplies, facilities, personnel, and other resources.
e. providing rescue, care, and shelter.
f. providing work and services essential to save lives, preserve public health and safety, and to protect property.
9. The Stafford Act authorizes the President to help fund:
a. state/local hazard preparedness costs.
b. repair or replace public facilities damaged or destroyed by a major disaster.
c. private persons who as a direct result of a major disaster have necessary expenses and serious needs and are unable to meet such expenses.
This assistance may include food expenses, housing expenses, unemployment and/or reemployment assistance, etc.
10. The Stafford Act vests the Director of FEMA with powers and responsibilities under the Act, including to assist and encourage States to enter into interstate emergency preparedness compacts with each other (and even with neighboring nations – Canada and Mexico - through the State Department).
11. Any effective response, recovery, or other answer to a threat or catastrophe heavily depends upon preparedness.
12. Preparedness means that the agency, community, and constituency affected, and public and private partners, stand ready to deal with the threat in an effective manner.
13. Preparedness also means one has to have the capacity to plan, organize, train, equip, exercise, evaluate, and improve.
14. FEMA has extensive resources regarding preparedness and recovery that are available to the public and state/local authorities.
15. FEMA uses high-level technology to estimate and predict damage and potential harm. It has developed comprehensive software programs that are crucial to predicting the outcomes of particular events.
16. HAZUS is a FEMA software program that uses current scientific and engineering knowledge, coupled with the latest geographic information systems (GIS) technology, to produce estimates of hazard-related damage before, or after, a disaster occurs.
17. The term “mitigation” implies an intervention before the threat or catastrophe takes place.
18. Mitigation is the effort to reduce loss of life and property by lessening the impact of disaster.
19. FEMA encourages a variety of mitigation programs to minimize and limit damage and threat.
20. FEMA provides grants and other financial support to implement mitigation plans and programs.
21. The term “response” primarily means immediate actions to save lives, protect property and the environment, and meet basic human needs.
22. Response also includes the execution of emergency plans and actions to support short-term recovery.
23. The National Response Framework (NRF) is a guide for a national, all-hazards response—from the smallest incident to the largest catastrophe.
24. The chief aim of the NRF is to have communities, states, the federal government, the private sector, and nongovernmental partners apply key response principles so that there is a coordinated, effective national response to disasters.
25. NRF operates on the presumption that disaster response must be first and foremost a local one. As FEMA points out:
26. Incidents begin and end locally, and most are wholly managed at the local level. Many incidents require unified response from local agencies, NGOs, and the private sector, and some require additional support from neighboring jurisdictions or the State. A small number require Federal support.
27. However, the scope and magnitude of a disaster sometimes make the federal authorities the dominant force.
|
|
Week 10 |
October 25, 2017 |
ADJ 243, Study Guide for Chapter 8 (Nemeth)
Intelligence
1. For purposes of our course we use the following definition of “intelligence” (taken form the CIA World Fact Book):
"Intelligence- The product resulting from the collection, evaluation, collation, interpretation, [and] analysis of all available information concerning the intentions, capabilities and objectives of other countries [and international terrorist groups] which are significant to a government's development and execution of plans, policies, decisions, and courses of action."
2. The term “Intelligence cycle” is defined as: the process of developing raw information into finished intelligence for policy makers to use in decision making and action.
3. There are five steps that constitute the Intelligence Cycle:
Planning and Direction – establishing the consumer’s intelligence requirements and plan intelligence activities accordingly.
Collection – gathering the raw data required to produce the finished product.
Processing and Exploitation – converting the raw data into a comprehensible format that is usable for production of the finished product.
Analysis and Production – integrating, evaluating, analyzing, and preparing the processed information for inclusion in the finished product.
Dissemination – delivering the finished product to the consumer that requested it and to others as applicable.
4. Nemeth makes the following points about the importance of intelligence to DHS:
a. Intelligence is, at its base, nothing more than information assessment.
b. Without intelligence and shared distribution of the same, homeland security officials work in the dark.
c. Intelligence helps take the guesswork out of homeland security.
5. DHS promotes the integrative approach to intelligence, whereby information is gathered by the various arms of government, including the military;federal departments and agencies, and state and local governments.
6. DHS encourages cooperation among historic competitors in the bureaucratic sense. It calls upon agencies of government to shun traditional turf systems and parochial protection mechanisms that hardly promoted a policy of sharing.
7. The Office of Intelligence and Analysis (I&A) is the Intelligence arm of DHS.
8. The DHS Office of Intelligence and Analysis (I&A):
a. serves as the information conduit and intelligence advocate for state, local, tribal, and territorial governments.
b. supports the “National Network of Fusion Centers” which DHS considers the hub of much of the two-way intelligence and information flow between the federal government and its state, local, tribal, and territorial partners.
9. The Fusion Centers are instrumental to the DHS Suspicious Activity Report(SAR) Initiative.
10. DHS defines “Suspicious activity” as “observed behavior reasonably indicative of pre-operational planning associated with terrorism or other criminal activity.”
11. The National Security Council’s (NSC) primary function is to advise and assist the president on national security and foreign policies. The Council also serves as the president's principal arm for coordinating these policies among various government agencies.
12. The primary agencies in the Intelligence Community include:
•Office of the Director of National Intelligence (ODNI)
•Central Intelligence Agency (CIA)
•Defense Intelligence Agency (DIA)
•Federal Bureau of Investigation (FBI)
•National Security Agency (NSA)
•Department of Homeland Security (DHS)
•Department of State
13. Federal statutes define the responsibilities of the CIA. These responsibilities include:
a. collecting intelligence through human sources (HUMINT) and by other appropriate means.
b. correlating and evaluating intelligence related to the national security and providing appropriate dissemination of such intelligence.
c. performing such other functions and duties related to intelligence affecting the national security as the President or the Director of National Intelligence may direct.
14. The federal statutes governing the CIA specifically provide that the Central Intelligence Agency shall have no police, subpoena, or law enforcement powers or internal security functions.
15. The CIA conducts clandestine (that is, undercover) operations. Examples of CIA clandestine operations are the Bay of Pigs failed invasion of Cuba, and the CIA operating secret prisons for the interrogation of terrorists.
16. The Office of the Director of National Intelligence (ODNI) was created in response to a recommendation by the 9/11 Commission. That recommendation sought to cure the lack of coordination among US intelligence agencies that was thought to be one of the reasons why the 9/11 attacks were not detected.
17. By federal statute, ODNI responsibilities include:
a. Ensuring that timely and objective national intelligence is provided to the president, the heads of departments and agencies of the executive branch, the military, and the Congress;
b. Establishing objectives and priorities for collection, analysis, production, and dissemination of national intelligence;
c. Ensuring maximum availability of and access to intelligence information within the Intelligence Community.
18. Within ODNI, the National Counterterrorism Center (NCTC) was created to be a central clearinghouse for integrating and analyzing terrorism information. NCTC comprises people from its many partner agencies and is a center based on cooperation, collaboration, and partnership.
19. The FBI National Security Branch is charged with protecting the US against:
a. terrorist attacks,
b. foreign intelligence operations, and
c. espionage.
20. The FBI’s Joint Terrorism Task Forces (JTTFs) are comprised of federal, state, and local law enforcement in major American cities. JTTFs are instrumental in investigating terrorist threats.
21. JTTF personnel responsibilities include:
a. chasing down leads;
b. gathering evidence and making arrests;
c. collecting and sharing intelligence; and
d. responding to threats and incidents.
22. The Defense Intelligence Agency (DIA) collects and produces foreign military intelligence for the Department of Defense. DIA reports to the defense agencies as well as the NSC, Congress, and military commanders.
23. DIA intelligence covers a broad spectrum of topics, including:
•Foreign military and paramilitary forces
•Proliferation of weapons of mass destruction
•International terrorism
•International narcotics trafficking
•Information operations
•Defense-related foreign political, economic, industrial, geographic, and medical and health issues
24. The National Security Agency (NSA), part of the Department of Defense, is responsible for conducting signals intelligence activities and disseminating the product to authorized recipients, including the President, the NSC, Department of Defense officials, and military commanders.
25. Signals intelligence (SIGINT) is defined as intelligence derived form electronic signals and systems (such as communication systems, radars, and weapons systems) used by foreign targets.
26. Generally speaking, members of the Intelligence Community (IC) can conduct authorized intelligence activities only against:
a. foreign persons, foreign organizations, and foreign powers (foreign powers include: foreign nations, foreign political parties, foreign military groups, international drug trafficking organizations, and foreign-based terrorist groups), and
b. agents of foreign powers (that is, persons working for or at the direction of a foreign nation).
27. Generally speaking, and subject to some limited exceptions, members of the Intelligence Community (IC) are prohibited from conducting intelligence activities against a U.S. person (a citizen, permanent resident, or U.S. corporation) unless the U.S. person is working for or at the direction of a foreign power, person, or an international terrorist group.
The three items below are a Supplement to this Study Guide:
1. The Terrorist Screening Center (TSC) is an organization administered by the FBI that maintains and operates the U.S. Government’s consolidated Terrorist Screening Database (TSDB), often referred to as the “Terrorist Watchlist.”
2. TSC serves as a bridge between law enforcement, Homeland Security (including CBP and TSA) and the Intelligence Community.
3. The TSDB is the unclassified database that is derived from TIDE (Terrorist Identities Datamart Environment). TIDE is the classified terrorist database maintained by the National Counterterrorism Center (NCTC).
|
|
Week 11 |
|
2. Under the INA, U.S. Customs and Border Protection (CBP) must determine whether persons seeking entry into the United States are U.S. citizens, Lawful Permanent Resident aliens (LPRs), or aliens.
3. Important definitions in the INA:
a. Alien: a person not a citizen or national of the U.S.
b. Visa: an endorsement on a passport that the holder is allowed to enter, leave, or stay for a specified period of time in a country. U.S. law sets forth numerous visa categories.
c. Immigrants – aliens that seek to migrate to the U.S. (that is, they intend to live in the U.S.).
d. Non-Immigrants – aliens seeking to come into the U.S. for a temporary period of time, such as tourists.
e. Visa Waiver Program: A reciprocal program where the U.S. and other nations allow tourist and business visitors to enter their nations without visas.
4. Aliens seeking admission into the U.S. must present required documents(passports, visas, etc.) and must establish to the satisfaction of the inspecting Customs and Border Protection Officer (CBPO) that they are admissible (that is, they are not inadmissible under the INA).
The INA provides that arriving aliens will be denied admission to the U.S. if they fall into one or more grounds of inadmissibility. Among the grounds for inadmissibility specified in the INA are:
A. Health Grounds – communicable disease of public health significance.
B. Crimes – Crimes Involving Moral Turpitude (which includes a large range of felonies) or crimes involving Controlled Substances (illegal drugs).
C. Security – Terrorism or espionage.
5. There are two main procedures for removing inadmissible aliens from the United States:
A. Removal: the process by which an inadmissible alien is expelled (deported)from the U.S. after appropriate proceedings in Immigration Court.
B. Expedited Removal: CBP may administratively remove an arriving alien if the alien does not have a passport (or alternative required document for entry to the U.S.) or has a fraudulent passport.
6. At primary inspection a CBPO makes an initial decision whether an arriving person is a U.S. citizen. Arriving U.S. citizens are not subject to the INA and are quickly cleared through immigration processing.
7. The following automated systems are available to assist CBPOs in making decisions regarding persons seeking entry into the United States:
A. APIS (Advance Passenger Information System) essentially, passport information.
B. ATS (Automated Targeting System) – CBP’s main passenger and cargo risk management system.
C. PNR (Passenger Name Record) – essentially, airline reservation information.
D. NCIC (National Crime Information Center) - FBI criminal information database.
E. TECS (The Enforcement Communications System) – CBP’s principal enforcement database. TECS contains information on persons listed in the TSDB (Terrorist Screening Database).
8. CBP uses its automated systems to:
A. Make decisions on customs and immigration clearance of persons.
B. Identify persons that are listed in the TSDB.
C. Identify persons that are the subject of arrest warrants.
9. Global Entry is a CBP trusted traveler program with the following features:
A. Global Entry is for low risk persons.
B. Global Entry applicants must pass background checks and are interviewed by a CBPO before they are accepted into the program.
C. Global Entry participants get expedited CBP clearance.
D. Global Entry participants are automatically entered into the TSA Precheckprogram.
10. All merchandise brought into the U.S. must be declared to CBP. Merchandise includes all items including contraband and items prohibited by law. For example, illegal drugs and illegal weapons are “merchandise” under the Customs laws and must be declared.
11. All commercial shipments must be entered (declared) with CBP to ensure:
A. Compliance with all applicable laws.
B. Proper classification and appraisement of merchandise so that applicable duties may be collected.
12. The Customs laws authorize CBP officers to conduct border searches. Border searches may be conducted without a warrant and without suspicion and are still considered reasonable under the Fourth Amendment.
13. There are severe criminal and civil penalties for violating the Customs laws. These include:
A. Imprisonment.
B. Monetary penalties.
C. Seizure and civil forfeiture of illegally imported merchandise
14. Civil Forfeiture – a legal proceeding where title to property used in violation of law is taken from the owner and transferred to the Government.
15. In United States v. Flores-Montano, 541 U.S. 149 (2004), the Supreme Court ruled that the disassembly and search of a car’s gas tank at the border was a valid border search and required no suspicion.
16. Conveyances (that is, vehicles, vessels and aircraft) with a connection to the border are subject to border searches. A connection to the border includes:
A. A conveyance that has crossed the border (a car or train that arrives into the U.S. from Canada).
B. A conveyance that enters the border area (a car about to exit the U.S. into Mexico).
17. Persons with a connection to the border are also subject to border searches. A connection to the border includes:
A. A person that crossed the border (a pedestrian from Mexico that has walked across the border and is waiting to be cleared at a U.S. port of entry).
B. A person that enters the border area (a longshoreman unloading a vessel from a foreign country that has arrived at a U.S. port).
18. In furtherance of its antiterrorism mission and other missions, CBP uses a multi-layered approach to ensure the integrity of the supply chain from the point a container is stuffed at a foreign port through its arrival at a U.S. port of entry. This multi-layered approach includes:
A. CBP getting advance information about the cargo destined for the U.S.
B. CBP using its risk assessment tool - the Automated Targeting System (ATS) - to screen cargo destined for the U.S.
C. Partnerships with foreign governments, such as the Container Security Initiative (CSI) and the Secure Freight Initiative (SFI) where CBP works with foreign governments to secure world trade against terrorism.
D. C-TPAT (Customs Trade Partnership Against Terrorism) - a partnership with industry and the private sector to secure the supply chain against the threat of terrorism or other crimes.
19. CBP Border Patrol Agents are responsible for detecting and apprehending persons and items unlawfully entering or attempting to enter the U.S. between ports of entry.
20. Border Patrol roving patrol stops (that is, car stops) for a border search are not allowed without establishing reason for an extended border search. For example, if the Border Patrol follows a car from the time it crosses the border from Mexico and then stops it ten miles north of the border a border search would be permissible. However, if the Border Patrol spots a car ten miles from the border and the car has no connection to the border, the Border Patrol could not border search the car.
21. Border Patrol checkpoints are setup along roads that lead from the border. Border Patrol agents at such checkpoints may conduct only a brief stop of a car to question and check the nationality of the driver and passengers. Border searches are not allowed at checkpoints.
22. U.S. Immigration and Customs Enforcement (ICE) is a sister DHS agency of CBP, and like CBP it enforces the customs and immigration laws.
23. The investigative arm of ICE is called Homeland Security Investigations (HSI). HSI workforce includes 6,500 special agents assigned to cities throughout the United States and to offices around the world.
24. HSI works closely with CBP in several ways:
A. It provides investigative follow-up to CBP arrests.
B. It conducts controlled deliveries resulting from CBP’s detection of drug loads.
C. It works with CBP on targeting suspicious importations/exportations.
25. HSI has broad legal authority to enforce numerous federal laws. It uses this authority to investigate all types of cross-border criminal activity, including:
A. Money laundering and bulk cash smuggling.
B. Commercial fraud.
C. Human smuggling and trafficking.
D. Immigration fraud.
E. Controlled substances and weapons smuggling/trafficking.
F. Export enforcement.
26. ICE also has an important office – The Office of Enforcement and Removal Operations - that handles its immigration enforcement responsibilities.
27. The Office of Enforcement and Removal Operations two primary missions:
A. The identification and apprehension of criminal aliens and other removable individuals located in the United States; and,
B. The detention and removal of those individuals apprehended in the interior of the U.S., and those apprehended by CBP at the border.
Intelligence Agencies: Keep secrets and do not want the informaion leaked while law enforcement prosecutes and wants information public. Generally, these agencies are not involved with domestic issues but foreign issues such as foreign powers and foreign people.
Office of the Director of Intelligence (ODNI)--The Director of National Intelligence serves as the head of the Intelligence Community, overseeing and directing the implementation of the National Intelligence Program budget and serving as the principal advisor to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to national security.
Provides coordination between the intelligence agencies.
--- Within is the National Counterterrorism Center (NCTC) a Terrorist Threat Integration Center to merge and analyze all threat information in a single location. In charge of Classified (TIDE--Terrorist Identities Datamart Environment of the National Counterterrorism Office)
Central Intelligence Agency (CIA)--The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. [Human inelligence gathering HUMINT] They have NO domestic authority. Clandestine operations.
The CIA is separated into five basic components: the Directorate of Operations, the Directorate of Analysis, the Directorate of Science & Technology, the Directorate of Support, and the Directorate of Digital Innovation. They carry out “the intelligence cycle,” the process of collecting, analyzing, and disseminating intelligence information to top US government officials.

Defense Intelligence Agency (DIA)--specializing in defense and military intelligence. DIA is a part of the Department of Defense. Broad spectrum of coverage: military, WMD, International Terrorism, Information Operations.
Federal Bureau of Investigation (FBI)--is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency. [both a law enforcement and intelligence agency]
--- Within is the National Security Branch (NSB)-combines the missions, capabilities, and resources of the FBI's counterterrorism, counterintelligence, and intelligence elements under the leadership of a senior FBI official for terrorist attacks, foregian intelligence operations, and espinage.
--- Within is the Joint Terrorism Taks Forces (JTTFs)-The JTTFs provide one-stop shopping for information regarding terrorist activities. They enable a shared intelligence base across many agencies.
--- Terrorist Screening Center (TSC) Ther terrorist watch list. Two: Classified (TIDE--Terrorist Identities Datamart Environment of the National Counterterrorism Office) Unclassified: (TSDB--Terrorist Screeening Data Base)
National Security Agency (NSA)--leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) such as electronic signals, radars, communication systems, etc. and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances. It is part of the Department of Defense.
Department of Homeland Security (DHS)--to secure the nation from the many threats we face.
---Office of Intelligence and Analysis (I&A) is the Intelligence arm of DHS--The mission of the Office of Intelligence and Analysis (I&A) is to equip the Homeland Security Enterprise with the timely intelligence and information it needs to keep the Homeland safe, secure, and resilient.
Department of State--is to shape and sustain a peaceful, prosperous, just, and democratic world and foster conditions for stability and progress for the benefit of the American people and people everywhere.
|
|
Week 12 |
November 25, 2017 |
ADJ-243, Study Guide
Chapter 10, Transportation Security PDF
1. In the broadest context, transportation security encompasses air, rail, bus, shipping and ports, and mass transit safety. Most of these centers of movement can properly be characterized as critical infrastructure.
2. Many agencies of government deal with transportation safety and security questions. Aside from DHS (TSA, Coast Guard, CBP), numerous federal, state, and local agencies are involved with transportation security.
3. TSA's mission includes the development of various layers of security protection at the facilities it is entrusted with.
4. Checkpoints are one of the primary security measures that TSA employs to detect threats.
5. TSA works to identify questionable passengers long before the security checkpoint including intelligence analysis, watch lists and passenger manifests, and random canine searches.
6. The Federal Air Marshal (FAM) program plants undercover law enforcement on airline flights.
7. Federal air marshals (FAMs) are skilled in the use of weaponry and defense/offense tactics that involve restraint. FAMs must blend in with passengers, keeping any unsuspecting terrorist unaware of his or her presence on that plane.
8. FAMs employ investigative techniques, criminal terrorist behavior recognition, firearms proficiency, aircraft-specific tactics, and close-quarters self-defense measures to protect the flying public.
9. The Federal Flight Deck Officer (FFDO) program permits aviation pilots to be fully armed in the cockpit.
10. TSA identifies and trains qualified pilots for the FFDO position. FFDOs are authorized by TSA to use firearms to defend against an act of criminal violence or air piracy that attempts to gain control of an aircraft.
11. TSA uses canines to detect explosives at airports, seaports, and harbor areas.
12. At airports, TSA uses metal detectors and millimeter wave imaging technology (body scans) to help identity objects hidden on persons that may pose a safety or security threat.
13. Maritime security is an interagency operation at the federal level with the prime players being Coast Guard, Customs and Border Protection (CBP), andImmigration and Customs Enforcement (ICE).
14. The maritime domain is defined as all areas and things of, on, under, relating to, adjacent to, or bordering on a sea, ocean, or other navigable waterway, including all maritime-related activities, infrastructure, people, cargo, and vessels, and other conveyances. The maritime domain for the United States includes the Great Lakes and all navigable inland waterways, such as the Mississippi River and the Intracoastal Waterway.
15. In the most general terms, maritime security seeks to accomplish the following ends:
•Prevent terrorist attacks and criminal or hostile acts
•Protect maritime-related population centers and critical infrastructures
•Minimize damage and expedite recovery
•Safeguard the ocean and its resources
16. The Coast Guard's central mission relates to maritime activities. The Coast Guard's five-part mission focuses on issues integral to a safe maritime environment.
•Maritime safety
•Maritime security
•Maritime mobility
•National defense
•Protection of natural resources
17. The Coast Guard enforces or assists in the enforcement of all applicable Federal laws on, under, and over the high seas and waters subject to the jurisdiction of the United States.
18. Port facilities are subject to a wide array of safety and security standards. Coast Guard personnel inspect the facilities—some 3,200 facilities in the United States alone. Each facility is required under the Maritime Security Act of 2002 to develop and implement a security plan. The Coast Guard is responsible forassessing these plans and working with these parties to adjust and correct any identified deficiencies.
19. Coast Guard is also responsible for safety inspections of cargo and containers.
20. On the high seas and waterways, the Coast Guard has jurisdictional authority to board vessels for inspection purposes. This practice is one of its most crucial missions. Section 89 of Title 14 of the U.S. Code authorizes the Coast Guard to board vessels subject to the jurisdiction of the United States, anytime upon the high seas and upon waters over which the United States has jurisdiction, to make inquiries, examinations, inspections, searches, seizures, and arrests.
21. The task of securing the country's rail and mass transit system is just as critical as the air industry protections. The country's rail system, a series of weaving lines for both freight and passenger traffic, constitutes a major part of this country's economic life.
22. TSA uses the following measures to help secure rail and mass transit systems:
1.Layers of Security: The TSA mindset on the various layers of security has now become part of the rail and mass transit approach.
2.Transit Inspectors through the Surface Transportation Security Program.
3.VIPR Teams: Using canines, advanced screening technology, and behavioral detection, the Visible Intermodal Protection Response Team can be dispatched to any rail location.
4.Grants and Funding: The rail industry as well as the public transit systems may participate in funding programs which advance security.
5.Mobile Checkpoints: An economical way to view containers for security breaches.
6.Site Assessments: At any location inspectors and TSA officers can give insight and professional advice on the security and safety of an installation.
7.Security and Emergency Preparedness Action Items: The top 20 steps the industry must take to prepare for security risks.
8.Training for Employees: Security awareness and skill is essential for all employees.
9.TSA's Land Transportation Anti-Terrorism Training Program (LTATP): Offered at the Federal Law Enforcement Training Center (FLETC).
10.Connecting Communities: A program which highlights the unique security and emergency issues that arise in transit situations.
|
|
Week 13 |
|
|
|
Week 14 |
|
Study Guide for Privacy/Civil Rights in Homeland Security
ADJ-243, Fall 2017
1. Achieving the proper balance between law enforcement efforts and individual privacy/civil rights is a constant and difficult problem in a democratic nation.
2. The U.S. Constitution, and particularly its Bill of Rights (the first ten amendments) set the ground rules for achieving this critical balance.
3. Given the stakes involved with Homeland Security (particularly, preventing terrorism) those responsible for Homeland Security efforts can be expected to take aggressive and wide ranging steps to protect the nation.
4. Some Homeland Security efforts are controversial - for example, CBP searches of electronic devices at the border; and, perhaps the most controversial, the NSA’s mass surveillance programs (as first revealed by the Snowden leaks).
5. In recent years the rapid advancement of technology has given law enforcement and Homeland Security officials tools that implicate privacy/civil rights to a much greater extent than in past years.
[Note: Numbers 6 and 7 below are taken verbatim (except for the numbering) from Journalists Resource, “Do body cameras change the way police interact with the public?” July 1, 2016 (accessed Dec. 3, 2017).
https://journalistsresource.org/studies/government/criminal-justice/body-cameras-police-interact-with-public
6. “Police use of force has been heavily scrutinized for more than a year after fatal police encounters with unarmed black men in New York City, Ferguson, Mo., Baltimore and other parts of the U.S. The increased attention has renewed calls for law-enforcement officers to wear video cameras while on duty.”
7. “Despite the national push, local law enforcement remains divided over the use of such technology, with some agencies blatantly resisting. Some of the agencies that have tried using them, however, are reporting decreased use of force and fewer complaints from residents.”
8. “A FOIA request by the Electronic Frontier Foundation unearthed the fact that Customs and Border Patrol lent drones to national and local agencies over 700 times between 2010 and 2012 for “domestic surveillance.”
[see: The National Review, “On Police Drones, Lawmakers are Behind the Times” (Nov. 9, 2017, accessed Dec. 3, 2017).
http://www.nationalreview.com/article/453544/police-drones-law-falling-behind-technology
9. Case law provides that aerial camera surveillance of items in open fields or on public roads, areas, etc., is not a search under the Fourth Amendment and thus police do not need probable cause or a search warrant to conduct such surveillance.
10. Some drones carry technology other than cameras: Thermal imaging, Cell Site Location identifiers, etc.
Study Guides and other materials that I provide to students whether by hardcopy or via Blackboard are solely for the personal use of students taking the class. Such material and any portion thereof may not be released to third persons or otherwise disseminated in any way (including transmitting the same by electronic means, posting online or uploading to the Internet or any automated system, etc.). However, such materials may be shared with other students enrolled in this class for use in connection with the class (for example, study groups).
|
|
|
|
|
|
|
|
|
|