Homeland Security Homeland Security An Introduction to Principles and Practice Fourth Edition Charles P. Nemeth Fourth edition published 2021 by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN and by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 © 2021 Charles P. Nemeth First edition published by CRC Press 2009 Sixth edition published by Routledge 2016 CRC Press is an imprint of Informa UK Limited The right of Charles P. Nemeth to be identified as author of this work has been asserted by him in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any e lectronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any informa- tion storage or retrieval system, without permission in writing from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for iden- tification and explanation without intent to infringe. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data Names: Nemeth, Charles P., 1951- author. Title: Homeland security : an introduction to principles and practice / Charles P. Nemeth. Description: 4 Edition. | Boca Raton : CRC Press, 2021. | Revised edition of the author’s Homeland security, [2017] | Includes bibliographical references and index. | Summary: “Homeland Security: An Introduction to Principles and Practice, Fourth Edition continues its record of providing a fully updated, no-nonsense textbook to reflect the latest policy, operational, and program changes to the Department of Homeland Security (DHS) over the last several years. The blend of theory with practical application instructs students on how to understand the need to reconcile policy and operational philosophy with the practical application of technologies and implementation of practices. The homeland security landscape of today is vastly different of that immediately following 9/11 and back when DHS was established in November of 2002. Domestic and international terrorism, gun violence, the geopolitical landscape, critical infrastructure security challenges, pandemic response-particularly with COVID-19-and disaster management have all become more complex and increasingly imperative. The new edition is completely updated to reflect changes to both new challenges and continually changing considerations. This includes: facial recognition, intelligence gathering techniques, informa- tion sharing databases, white supremacy, domestic terrorism and lone wolf actors, border security and immigration, the use of drones and surveillance technology, cybersecurity, the status of ISIS and Al Qaeda, the increased nuclear threat, COVID-19, ICE, DACA, and immigration policy challenges-among numerous others. Consideration of, and the coordi- nated response, to all these is housed among a myriad of federal agencies and departments. Homeland Security, Fourth Edition continues to serve as the comprehensive and authoritative text. The book presents the various DHS state and fed- eral agencies and entities within the government-their role, how they operate, their structure, and how the interact with other agencies-to protect U.S. domestic interests from various dynamic threats”— Provided by publisher. Identifiers: LCCN 2021001614 (print) | LCCN 2021001615 (ebook) | ISBN 9780367494414 (hardback) | ISBN 9781003176053 (ebook) Subjects: LCSH: United States. Department of Homeland Security. | National security—United States. | Terrorism—United States—Prevention. Classification: LCC HV6432.4 .N46 2021 (print) | LCC HV6432.4 (ebook) | DDC 353.30973—dc23 LC record available at https://lccn.loc.gov/2021001614 LC ebook record available at https://lccn.loc.gov/2021001615 ISBN: 978-0-367-49441-4 (hbk) ISBN: 978-1-032-01651-1 (pbk) ISBN: 978-1-003-17605-3 (ebk) Typeset in Minion Pro by codeMantra Access the Support Material: www.routledge.com/9780367494414 To Stephen Charles Nemeth, a former Marine officer, gentleman, and the type of son and man that impresses each and every day. To St. Thomas Aquinas who remarked: Nothing hinders one act from having two effects, only one of which is intended, while the other is beside the intention. Now moral acts take their species according to what is intended, and not according to what is beside the intention, since this is accidental as explained above. Accordingly the act of self-defense may have two effects, one is the saving of one’s life, the other is the slaying of the aggressor. Therefore this act, since one’s intention is to save one’s own life, is not unlawful, seeing that it is natural to everything to keep itself in “being,” as far as possible. Summa Theologica II-II, Question 64, Article 7 Contents Preface .......................................................................................................................................xv Acknowledgments ..................................................................................................................xix Author ......................................................................................................................................xxi Introduction ..........................................................................................................................xxiii Chapter 1 The Idea and Origin of Homeland Security ......................................................1 1.1 Introduction................................................................................................1 1.2 Threats to the Homeland: Twentieth-Century Military Movements ..................................................................................2 1.3 Threats to the Homeland: The Cold War Experience ...........................6 1.4 Threats to the Homeland: Iran, Terror, and the World Stage ............14 1.5 Threats to the Homeland: North Korea: An Old and New Enemy in the War on Terror .........................................................19 1.6 Threats to the Homeland: Revolution, Riot, and Rightful Demonstration ........................................................................22 1.6.1 Domestic Terrorism: Pre-9/11 ..................................................23 1.6.2 International Terrorism: Pre-9/11 ...........................................29 1.7 Conclusion ...............................................................................................30 Keywords ..............................................................................................................31 Discussion Questions .........................................................................................31 Practical Exercises ...............................................................................................32 Notes ....................................................................................................................32 Chapter 2 Terror, Threat, and Disaster Post 9/11: A New Paradigm of Homeland Security .............................................................................................35 2.1 Introduction.............................................................................................36 2.2 Genesis of DHS........................................................................................38 2.3 DHS: 2001–2003 ......................................................................................46 2.3.1 Evolution and Change in DHS .................................................46 2.4 Reorganization and Evolution of DHS: 2003–2015 ............................49 2.5 DHS in the Age of President Donald J. Trump: 2016–2021 ...............51 2.5.1 Office of the Secretary of DHS ..................................................51 2.5.2 DHS Directorates .......................................................................63 2.5.2.1 Cybersecurity and Infrastructure Security Agency (CISA): Former Directorate for National Protection and Programs ..........................63 2.5.2.2 Directorate for Science and Technology .................66 vii Contents 2.5.2.3 Directorate for Management ....................................68 2.5.3 DHS Offices: Support and Operational Components...........69 2.5.4 Agencies and Entities Swept into DHS ....................................73 2.5.4.1 U.S. Coast Guard .........................................................73 2.5.4.2 U.S. Secret Service ......................................................79 2.5.4.3 Federal Law Enforcement Training Center ............83 2.5.5 Advisory Panels and Committees ...........................................86 2.6 Conclusion ...............................................................................................87 Keywords .............................................................................................................88 Discussion Questions ........................................................................................88 Practical Exercises ..............................................................................................89 Notes ....................................................................................................................89 Chapter 3 Homeland Security Law, Regulations, and Budgeting ..................................93 3.1 Introduction..............................................................................................93 3.2 Homeland Security Law, Regulations, and Executive Orders ..........94 3.2.1 Executive Order 13228: Origin of DHS ..................................94 3.2.2 Executive Order 13231: Protection of Infrastructure ...........94 3.2.3 Executive Order 13223: September 14, 2001 ..........................94 3.2.4 Executive Order 13493 of January 22, 2009 ...........................98 3.2.5 Executive Order 13567 of March 7, 2011 ...............................103 3.2.6 Executive Order 13846 of August 6, 2018 ............................104 3.2.7 Homeland Security Act of 2002 .............................................104 3.2.7.1 Homeland Security Act and Posse Comitatus .....106 3.2.8 USA Patriot Act: USA Freedom Act of 2015 .........................107 3.2.9 Specialized Laws ......................................................................109 3.2.9.1 REAL ID Program ...................................................109 3.2.9.2 Office of Biometric Identity Management (Formerly Office of US-VISIT) ................................112 3.2.9.3 Chemical Facilities ....................................................113 3.2.9.4 Invention and Technology: The SAFETY Act .......114 3.3 Budgeting, Finance, and Funding in Homeland Security ...............115 3.3.1 Budget Year: 2003 .....................................................................115 3.3.2 Budget Year: 2004 .....................................................................118 3.3.3 Budget Year: 2005 ....................................................................123 3.3.4 Budget Year: 2006 ....................................................................130 3.3.5 Budget Year: 2007 ....................................................................134 3.3.6 Budget Year: 2008 ....................................................................138 3.3.7 Budget Years: 2009–2010 .........................................................142 3.3.8 Budget Years: 2011–2012 ..........................................................142 3.3.9 Budget Year: 2013 ......................................................................147 3.3.10 Budget Year: 2014 ......................................................................149 3.3.11 Budget Year: 2015 ......................................................................152 3.3.12 Budget Year: 2016 ......................................................................153 3.3.13 Budget Year: 2017 .....................................................................156 3.3.14 Budget Year: 2018 ......................................................................157 3.3.15 Budget Year: 2019 ......................................................................160 3.3.16 Budget Year: 2020 .....................................................................162 viii Contents 3.4 Conclusion ..............................................................................................163 Keywords ...........................................................................................................164 Discussion Questions .......................................................................................165 Practical Exercises .............................................................................................165 Notes ..................................................................................................................165 Chapter 4 Risk Management, Threats, and Hazards .....................................................171 4.1 Introduction............................................................................................171 4.2 Risk Management ..................................................................................172 4.2.1 The Nature of Risk ....................................................................172 4.2.2 Risk Assessment ........................................................................174 4.2.3 CARVER+Shock Assessment Tool .......................................180 4.3 Threats and Hazards ..............................................................................185 4.3.1 Concept of Threat and Hazard ...............................................186 4.3.2 Weapons of Mass Destruction ...............................................190 4.3.2.1 Nuclear .......................................................................190 4.3.2.2 Radiological ..............................................................196 4.3.2.3 Biological ...................................................................198 4.3.2.4 Chemical ....................................................................206 4.3.2.5 Improvised Explosive Devices .................................218 4.4 Computer Security and Information Infrastructure .......................222 4.4.1 Cyber Challenges and the American Electoral Process .....227 4.4.2 National Cyber Security Division .........................................228 4.4.3 US-CERT: Computer Emergency Response Team .............229 4.5 Private Sector and Homeland Security ..............................................232 4.6 Conclusion .............................................................................................239 Keywords ...........................................................................................................240 Discussion Questions ......................................................................................241 Practical Exercises ............................................................................................241 Notes ..................................................................................................................242 Chapter 5 Training and Exercises in Homeland Security ............................................249 5.1 Introduction...........................................................................................249 5.2 Grants and Training ..............................................................................251 5.3 Center for Domestic Preparedness .....................................................260 5.4 Emergency Management Institute .....................................................261 5.5 Homeland Security Exercise and Evaluation Program ...................265 5.6 Lessons Learned: Best Practices (LLIS.GOV)/Homeland Security Digital Library (HSDL) .........................................................270 5.7 Community Emergency Response Teams .........................................272 5.8 National Incident Management System ..............................................274 5.9 Conclusion ..............................................................................................281 Keywords ...........................................................................................................282 Discussion Questions ......................................................................................285 Practical Exercises ............................................................................................285 Notes ..................................................................................................................285 ix