How safe is the American homeland?



Similar documents
GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

Confrontation or Collaboration?

Espionage and Intelligence. Debra A. Miller, Book Editor

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE

A Policy Forum on the Use of Big Data in Homeland Security

HOMELAND SECURITY INTELLIGENCE RPAD 556

How To Help The War On Terror

THE STRATEGIC POLICING REQUIREMENT. July 2012

HOMELAND SECURITY INTERNET SOURCES

Description of Homeland Security

GAO COMBATING TERRORISM. Issues in Managing Counterterrorist Programs. Testimony

National Security Agency

WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO Course Syllabus

Purpose of the Governor s strategy. Guiding Principles

Teaching an Overview of Homeland Security

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

Subject: National Preparedness

Table of Contents. Ezenia Inc. Evolution of Multi-Level Security

Civil Liberties and Security: 10 Years After 9/11

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

The Strategic Importance, Causes and Consequences of Terrorism

The Need to Share: The U.S. Intelligence Community and Law Enforcement

CRS Report for Congress

The European Security Strategy Austrian Perspective

Assessment Profile of Curricula for US PhD and Master s Degree Programs in Homeland Security and Related Fields 1. March 2011

148 Summaries Intelligence services in Europe and America; the reorientation since the collapse of the Berlin wall and September 11th 2001

While interagency education and training have long been staples of the intelligence and

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Honourable members of the National Parliaments of the EU member states and candidate countries,

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

Training Courses Catalog 2015

LLB (Hons) International Law Module Information

The Interagency Security Committee and Security Standards for Federal Buildings

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?

REPORT ON PROTECTING THE NONPROFIT SECTOR FROM TERRORIST ABUSE

The Ethics of Information Sharing Between the FBI and CIA

STATE OF MARYLAND Strategy for Homeland Security

MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION

Academic Standards for Civics and Government

The Comprehensive National Cybersecurity Initiative

The Design of an Undergraduate Program In Homeland Security

GAO COMBATING TERRORISM. Comments on Counterterrorism Leadership and National Strategy. Testimony

How To Get A Masters Degree In Intelligence Analysis

PO BoxA147 Sydney South NSW November 2014

Home Security: Russia s Challenges

Bush Lets U.S. Spy on Callers Without Courts

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

Summary of key points & outcomes

The War on Terror in Classrooms and Clinics: An Inventory

REDUCING THE RISK TO AMERICA: INTEGRATING THE DEPARTMENT OF HOMELAND SECURITY S CBRN EFFORTS

WRITTEN TESTIMONY OF

How To Learn About Politics At Sacred Heart University

WikiLeaks Document Release

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

IACP Capitol Report. President Sends Congress Legislation to Create New Dept. of Homeland Security

Cyber Security Strategy for Germany

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision

v. 03/03/2015 Page ii

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

Intelligence Analysis for Homeland Security RPAD 557

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists

Request under the Freedom of Information Act 2000 (FOIA)

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Assessment Profile: Establishing Curricular Categories for Homeland Security Education

STATE HOMELAND SECURITY GRANT PROGRAM

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?

How To Implement International Terrorism Agreements

MISSION BRIEF. Syllabus

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Ten Steps for Preventing a terrorist Attack

MASTER OF PROFESSIONAL STUDIES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session

Brief Documentary History of the Department of Homeland Security

Surveillance and Security Systems

Key Concepts Chart (The United States after the Cold War)

U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST

Information Technology s Role in Homeland Security

Who pulls the strings? Why we need transparency of political donations in Northern Ireland

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Transcription:

The Oxford Council on Good Governance OCGG Security Section Advice Program US Foreign, Security, and Defence Policy Governance Area US Security Policy You may not be interested in war, but war is interested in you. Leon Trotsky s aphorism from a century ago took on a new meaning on September 11, 2001. The events in New York and Washington lead to general and bipartisan calls by American politicians for improved security measures and laws. Driven by the wish to be er shield America from terrorist a acks, a major institutional shake-up gave birth to a How safe is the American homeland? Recommendation to the Government of the United States of America Department of Homeland Security, flanked by the Patriot Act granting the government new powers of investigation. by Jean-Michel Rousseau The issue of homeland security nevertheless remains at the centre of the debate in the current electoral runup. It could gain even more weight should terrorist groups repeat or try to repeat the scheme of the Madrid bombings. This would not only O CG G S E C U R I T Y R E CO M M E N D AT I O N N O 2 MAIN POINTS Despite US security reforms in the wake of 9/11, shortcomings remain in three areas: domestic and international homeland security, intelligence gathering, and civil liberties. To prevent another terrorist attack on American soil, policy-makers need to beef up security while protecting fundamental freedoms. ABOUT THE AUTHOR Jean-Michel Rousseau is an Analyst in the OCGG Security Section and a graduate student in conflicts and security at Sciences Po in Paris. He did his undergraduate studies at Sciences Po and Georgetown. He can be contacted at jean-michel_rousseau@web.de ABOUT THE OCGG The Oxford Council on Good Governance is an independent, non-partisan, and non-profit think tank based at Oxford and other world leading universities that gives actionable advice to high-level policy-makers based on cutting-edge research. For more information, please visit www.oxfordgovernance.org O C T 0 4

How safe is the American homeland? 2 highlight potential loop-holes in the US national security perimeter, but could prove decisive for the outcome of the presidential elections as well. An analysis of the efforts done on homeland security measures since September 11th therefore seems of the highest importance. Terrorism has introduced an uncomfortable element of uncertainty in US foreign policy. At times causing the US to lash out, at other times inducing it to retreat behind protective barriers. When the US lashes out results are mixed to say the least. Still in search of effective offensive tactics the US defence must be all the stronger. So how firm are those barriers? I will here look into obvious shortcomings in three key sectors: domestic and international homeland security, intelligence gathering, and civil liberties. I N E F F E C T I V E D O M E S T I C S E C U R I T Y M E A S U R E S For a European traveller, it is surprising to see the lack of public awareness for and preparedness against terrorism in American cities. This range from the multitude of large dust bins that might be used as bomb depots to the absence of effective security perimeters around public institutions. Hard targets such as power plants, chemical and biological facilities and government institutions may be better secured these days, but so targets are abundant in every American street. Authorities do not always seem prepared to deal with unexpected circumstances. Let s imagine for a second that during the big blackouts of last winter, sleeper cells would spontaneously have decided to a ack the hundreds of thousands of pedestrians by guns or by car bombs, or would try to recreate a similar scenario of panic for their purposes. Was the government prepared, or would it be, to deal with such a plot? An analysis of border protection reveals obvious flaws as well. To this very date, a significant part of information related to persons visiting the US still is not directly entered into the INS database by customs officers (due to the missing equipment of all entry points with the necessary technology). Instead, this takes place manually at another time and location. Equally, customs officers still do not control who is leaving the country. Apart from people, the entry of goods into the US is still largely uncontrolled territory, which becomes especially visible in container security. Few policy makers (with the notable exception of Senator Graham from Florida) have paid a ention to this

OCGG Security Recommendation No 2 3 issue. Yet, it is probably on this precise field that the security of the United States especially with regards to WMD terrorism hinges. Given the sheer amount of goods entering the country every day packed into containers, this means of transportation appears to be the easiest route for smuggling weapons and people into the US with possibly devastating consequences. Put bluntly: Despite clear and present danger the United States authorities still have insufficient oversight about who and what is entering the country. A F A R F R O M E F F E C T I V E I N T E L L I G E N C E C O M M U N I T Y US efforts seem guided by the belief that the existence of several intelligence and counter-terrorism agencies necessarily spurns concurrence and synergies, enhancing the quality of results. This is a dangerous assumption. Inter-agency competition might work in a parliamentarian system with only one recipient of information - the government. But it is doubtful whether this logic can deliver results in a system where Executive and Legislative branches compete. Furthermore, European states have traditionally prevented inter-agency task sharing and preferred assigning tasks to designated agencies. In the US the number of security agencies has surpasses the dozen, and worst of all, a DCI worth its name is still lacking. U N I L A T E R A L I S M A N D S E C U R I T Y I S S U E S Even worse than these domestic failures is the missing acknowledgement of US officials that an international zone of security would be a more effective option than a national solution. The question is not about applying the Container Security Initiative to other security domains. Indeed, it is precisely the bad example of an enlarged security zone since it relies not upon trust into the quality of the security services of other countries, but in the forward deployment of US officials to the most important ports with regards to container shipment to the US. Hence, the current strategy relies not upon trust into the capabilities of other countries, but into erecting a national wall around the country. Yet, a top US priority should be a multinational development of common security standards that would be enforced by the participating countries and the validity of which would be recognized by the other partner countries

How safe is the American homeland? 4 (similar to the European Schengen model). This would ensure an enforced US legitimacy in global security, which in turn could lead to a growing recognition by other countries for the need of improved security measures, and contribute to more effectiveness by pooling knowledge. A W A R E N E S S O F W E S T E R N C O R E V A L U E S There is a marked contrast in the way the two respective sides of the Atlantic define homeland security. It seems as if Europeans are more flexible than Americans in bending some rules when it comes to issues of national security, but that specific rules - such as the interdiction of torture stand solid - as captured in the quote the Italian state of law can survive the assassination of Aldo Moro but not the introduction of torture. Americans, on the other side, are best described as contradictory as they o en seem to stick either too much or not enough to rules of law in the domain of national security. The Bush administration has repeatedly displayed a failure of comprehension: the West only can win the War on Terror by upholding its fundamental values - especially the rule of law and the principle of human rights - even under the worst circumstances. Arguments claiming that the Constitution was wri en at another time in history and does not reflect current issues should be viewed with caution; Constitutions are designed to protect individual rights especially in times of crisis. In this regard, it is reason to caution against those who call for the FBI to have both criminal and anti-terrorism competences. The two fields ought never to be mixed. Every other liberal democracy has been wise enough to separate these two functions, and the US should learn from its own example. Despite an impressive spending record on counter-terrorist efforts, there is reason to question whether the United States is indeed, sufficiently prepared to effectively counter terrorist threats. Part of the problem is a belief that erecting a wall around the country will be sufficient to prevent new a acks from occurring. That the US going it alone in the world outside the wall will be more effective than if it were to cooperate with other countries. When it comes to the issue of US homeland security, the question is not whether things have improved - given the poor previous record they undeniably have. The more relevant question is whether

OCGG Security Recommendation No 2 5 things have considerably changed to achieve a level of security that will shield the country from further a acks while preserving civil liberties. This is much more questionable. While it is certainly difficult to precisely distribute responsibility for this state of affairs, suffice is to say that the US homeland security system still has holes that policymakers ought to close as soon as possible. If they want to live up to their commitment and prevent future terror a acks on American soil, security will have to be beefed up the challenge is to do so while protecting the freedoms that is America.

Legal Information This is a publication of the Oxford Council on Good Governance, an independent, non-partisan, and nonprofit think tank registered in England as a private company limited by guarantee. Company number: 04964367 Registered Address: 141 Rampart Rd Salisbury SP1 1JA United Kingdom Copyright All rights reserved. Apart from fair dealing for the purposes of research or private study or criticism or review, as permitted under the UK Copyright, Design and Patents Act 1988, no part of this publication may be reproduced, stored or transmitted in any form or by any means without the prior permission in writing of the Publisher. Authorisation to photocopy items for the purpose of policymaking and governance is granted by the Publisher. Disclaimer The Oxford Council on Good Governance cannot be held responsible for errors or any consequences arising from the use of information contained in this publication. The views and opinion expressed do not necessarily reflect those of the Oxford Council on Good Governance, neither does the publication of advertisements constitute any endorsement by the OCGG of the products or services advertised.