Beruflich Dokumente
Kultur Dokumente
4
Topics
and
Threats
Bio‐terrorism
Chemical
Attacks
Suicide
bombing
WOD
Cyber‐attacks
Radiation
Attacks
Car
Bombs
Water
supply
Food
supply
Rights
vs
security
Floods
Earthquakes
Mass
Transit
Sea
Ports
Airlines
(freight)
Pipelines
Oil
Refineries
Power
Plants
National
Sporting
Events
Monuments
Wednesday
May
28
No
class
Wednesday
June
4
The
Problem
Did
9/11
occur
as
a
result
of
one
or
more
“point
failure”
or
a
“system
failure”?
Were
there
any
“lessons
learned”
from
events
prior
to
9/11
that
should
have
been
addressed
and
implemented
that
would
have
prevented
or
mitigated
9/11?
1. Kettl
Chapter
1
Stress
Test
2. Kettl
Chapter
2
Coordination
Dilemma
3. Flynn
Chapter
1
A
Brittle
Nation
4. Kettl
Chapter
3
Reshaping
the
Bureaucracy
5. 9/11
Report
Chs
8,
11,
13
http://www.gpoaccess.gov/911/Index.html
Wednesday
June
11
The
Threat
What
are
the
major
contributions
to
global
insecurity
and
instability
in
the
world
today?
How
door
should
these
affect
or
influence
planning,
preparedness
and
response
with
respect
to
U.S.
homeland
security?
What
will
be
the
greatest
threats
and
risks
to
U.S.
homeland
security
10
years
from
now?
1. Dishman,
Chris.
2005.
The
leaderless
nexus:
When
crime
and
terror
converge.
Studies
in
Conflict
&
Terrorism
28,
(3)
(May‐June):
237‐252.
2. Flynn
Chapter
2
Ready
to
Blow
3. Flynn
Chapter
3
Inviting
Disaster
4. Flynn
Chapter
4
Danger
on
the
Delta
5. Riedel,
Bruce.
2007.
Al
Qaeda
Strikes
Back.
Foreign
Affairs,
May/June,
pp
24‐40
6. Friedman,
Benjamin.
2005.
Homeland
security.
Foreign
Policy(149)
(Aug):
22‐28
7. Colin
Gray,
“Thinking
Asymmetrically
in
Times
of
Terror”
Parameters
Spring
2002
8. David
C.
Rapoport,
“The
Fourth
Wave:
September
11
in
the
History
of
Terrorism”
Current
History,
Volume
100,
Number
650
(December
2001
Wednesday
June
18
Organizing
DHS
Is
the
Department
of
Homeland
Security
necessary?
Why
was
the
department
organized
as
it
was?
What
were
the
aims
of
the
reorganization?
1. Michael
J.
Hillyard.
“Organizing
for
Homeland
Security”
in
Parameters,
Spring
2002,
US
Army
War
College:
Carlisle
Barracks,
PA,
pp.
75‐85
2. Ashton
Carter,
The
Architecture
of
Government
in
the
Face
of
Terrorism,
2002.
International
Security
‐
Volume
26,
Number
3,
Winter
2001/02,
pp.
5‐23
5
3. Waugh,
William
L.,
Jr.
and
Richard
T.
Sylves.
“Organizing
the
War
on
Terrorism,”
in
Public
Administration
Review,
September
2002,
8
pages.
4. Cohen,
Richard.
E.,
Siobhan
Gorman,
and
Sydney
J.
Freedberg,
Jr.
“The
Ultimate
Turf
War”
in
National
Journal,
January
4,
2003,
8
pages.
5. Wise,
Charles
R.,
and
Rania
Nader.
2002.
Organizing
the
federal
system
for
homeland
security:
Problems,
issues,
and
dilemmas.
Public
administration
review
62,
(Sept):
44‐57.
6. CRS
Selected
Federal
Homeland
Security
Assistance
Programs:
A
Summary,
updated
January
31,
2008
7. Haynes,
Wendy.
2004.
Seeing
around
corners:
Crafting
the
new
department
of
homeland
security.
The
Review
of
Policy
Research
21,
(3)
(May):
369‐395.
Wednesday
June
25
Intelligence
To
what
areas
of
homeland
security
does
or
should
intelligence
make
the
most
significant
contributions
to
planning,
operations
and
preparedness?
What
are
the
gaps
and
challenges?
Which
intelligence
agencies
have
or
should
have
the
most
significant
roles
and
responsibilities
for
homeland
security?
How
should
information
be
shared
and
kept
secret?
What
are
the
civil
liberty
issues
in
regard
to
intelligence?
1. Overview
of
the
Intelligence
Community,
www.fas.org/irp/offdocs/int023.html
2. Office
of
the
Director
of
National
Intelligence,
www.dni.gov
(read
through
“About
ODNI”)
3. ODNI’s
500‐Day
Plan:
Integration
and
Collaboration,
www.dni.gov/500‐day‐plan.pdf
4. McConnell,
Mike.
2007.
(On
cover,
as
“Making
Intelligence
Smarter”)
Overhauling
Intelligence.
Foreign
Affairs,
July/August,
pp
49
–
58
5. Hulnick,
Arthur
S.
2005.
Indications
and
warning
for
homeland
security:
Seeking
a
new
paradigm.
International
Journal
of
Intelligence
and
Counterintelligence
18,
(4)
(winter):
593‐608.
(Intelligence)
6. Martin,
Kate,
“Domestic
Intelligence
and
Civil
Liberties”
SAIS
Review
Volume
24,
Number
1,
Winter‐Spring
2004
7. Richard
A.
Best,
Jr.,
“Intelligence
Issues
for
Congress
CRS
Issue
Brief
for
Congress”
http://www.fas.org/sgp/crs/intel/IB10012.pdf
8. Treverton,
Gregory.
“Terrorism,
Intelligence
and
Law
Enforcement:
Learning
the
Right
Lessons.”
Intelligence
and
National
Security
18,
no.
4
(2003):
121‐140.
Wednesday
July
2
Collaboration
with
other
agencies
Who
has
or
should
have
the
primary
responsibility
and
authority
(Federal,
state,
local;
and
private
sector)
for
ensuring
the
security,
safety
and
resiliency
of
the
public
before,
during
and
after
a
terrorist
attack
or
natural
catastrophe?
What
are
necessary
components
for
acceptable
public
safety,
security
and
resiliency
at
the
federal,
state
and
local
levels
with
respect
to
homeland
security?
1. Kettl
Chapter
4
The
Federalism
Jumble
2. Lehrer,
Eli.
2004.
The
homeland
security
bureaucracy.
The
Public
interest(156)
(summer):
71‐85.
3. Scavo,
Carmine,
Richard
C.
Kearney,
and
Richard
J.
Kilroy
Jr.
2008.
Challenges
to
federalism:
Homeland
security
and
disaster
response.
Publius
38,
(1)
(Winter):
81‐110.
4. Waugh,
William
L.,
and
Gregory
Streib.
2006.
Collaboration
and
leadership
for
effective
emergency
management.
Public
administration
review
66,
(s1)
(Dec):
131‐140.
6
5. Thacher,
David.
2005.
The
local
role
in
homeland
security.
Law
&
Society
Review
39,
(3)
(Sept):
635‐676.
6. Tulak,
Arthur
N.,
Robert
W.
Kraft,
and
Don
Silbaugh.
2003.
State
defense
forces
and
homeland
security.
Parameters
33,
(4)
(winter):
132‐146.
7. Felicetti,
Gary,
and
John
Luce.
2004.
The
posse
comitatus
act:
Liberation
from
the
lawyers.
Parameters
34,
(3)
(autumn):
94‐107.
8. CRS
Report
RS22393,
“State
and
Urban
Area
Homeland
Security
Plans
and
Exercises;
Issues
for
the
110th
Congress”,
January
3,
2007
(updated)
www.fas.org/sgp/crs/homesec/RS22393.pdf
Wednesday
July
9
Specific
Critical
Infrastructure
Is
it
possible
to
fully
secure
the
borders
of
the
U.S.
against
all
serious
threats
to
homeland
security
to
U.S.
infrastructure?
Is
it
possible
to
“know
everything,
protect
everything
and
secure
everyone”
at
all
times
in
a
free
society?
What
level
of
risk
is
reasonable,
acceptable
or
realistic?
1. Flynn
Chapter
5
Ailing
Foundations
2. Flynn
Chapter
6
Best
Defense
is
a
Good
Defense
3. Field,
Mary
A.
2004.
Highway
security
and
terrorism.
The
Review
of
Policy
Research
21,
(3)
(May):
317‐328.
4. Waugh
W.L
..
2004.
Securing
mass
transit:
A
challenge
for
homeland
security.
The
Review
of
Policy
Research
21,
(3)
(May):
307‐316.
5. CRS
Vulnerability
of
Concentrated
Critical
Infrastructure:
Background
and
Policy
Options,
updated
January
26,
2007
www.fas.org/sgp/crs/homesec/RL33206.pdf
6. GAO
report
08‐140T
Transportation
Security
October
2007
www.gao.gov/new.items/d08140t.pdf
Wednesday
July
16
Political
Control,
Risk,
and
Accountability
How
and
by
whom
should
the
Department
of
Homeland
Security
be
held
accountable
regarding
setting
and
accomplishing
its
priorities,
requirements,
goals
and
objectives?
What
about
other
agencies
with
key
missions
that
support
homeland
security?
Who
and
how
should
the
overseers
be
held
accountable?
Does
Congress’
committee
oversight
structure
for
homeland
security
enable
or
impede
success
in
homeland
security
or
it
is
about
right?
Do
Congressionally‐
directed
appropriations
(aka
“pork”)
further
or
impede
the
national
goals
and
objectives
in
homeland
security?
1. Christensen,
Tom,
and
Per
Laegreid.
2007.
Regulatory
agencies‐the
challenges
of
balancing
agency
autonomy
and
political
control.
Governance:
An
International
Journal
of
Policy
20,
(3)
(July):
499‐520.
2. Roberts,
Patrick
S.
2005.
Shifting
priorities:
Congressional
incentives
and
the
homeland
security
granting
process.
The
Review
of
Policy
Research
22,
(4)
(July):
437‐449.
3. Waugh,
William
L.,
Jr.
2006.
The
political
costs
of
failure
in
the
Katrina
and
Rita
disasters.
The
Annals
of
the
American
Academy
of
Political
and
Social
Science
604,
(Mar):
10‐25.
4. Kettl
Chapter
5
Political
Costs
of
Managing
Risks
5. Harvey,
Frank
P.
2007.
The
homeland
security
dilemma:
Imagination,
failure
and
the
escalating
costs
of
perfecting
security.
Canadian
Journal
of
Political
Science/Revue
canadienne
de
science
politique
40,
(2)
(June):
283‐316.
7
6. CRS
The
Department
of
Homeland
Security’s
Risk
Assessment
Methodology:
Evolution,
Issues,
and
Options
for
Congress,
February
2,
2007
Wednesday
July
23
Effectiveness
of
Response
How
should
risk
assessments
be
designed,
performed
and
used
to
effect
policy
decisions,
programs
and
measures
of
effectiveness?
Do
or
could
major
natural
disasters
impact
our
homeland
security
in
a
significant
way?
Currently,
is
the
U.S.
Government
properly
organized
and
resourced
to
effectively
address
natural
disasters
and
recovery?
Does
the
US
spend
too
little,
too
much,
or
on
the
wrong
things?
Do
or
should
rights
and
freedoms
have
to
be
modified
to
increase
national
and
societal
security
and
protection?
1. The
Federal
Response
to
Hurricane
Katrina:
Lessons
Learned
(23
February
2006)
2. CRS
9/11
Commission
Recommendations:
Implementation
Status,
December
4,
2006
www.fas.org/sgp/crs/homesec/RL33742.pdf
3. Shapiro,
Jacob
N.,
and
Dara
Kay
Cohen.
2007.
Color
bind:
Lessons
from
the
failed
homeland
security
advisory
system.
International
Security
32,
(2)
(Fall):
121‐154.
4. Ingraham,
Patricia
W.
2006.
The
challenge
and
the
opportunity.
The
American
Review
of
Public
Administration
36,
(4)
(Dec):
374‐381.
5. Kettl
Chapter
6
Balancing
Liberty
with
Protection
6. Kettl
Chapter
7
Gauging
the
Stress
Test
Wednesday
July
30
Reform?
Is
U.S.
homeland
security
organized
(structurally
and
functionally;
naturally
or
purposefully)
as
an
effective
“system
of
systems”?
In
other
words,
do
US
security
agencies
reasonably
and
effectively
prevent,
disrupt,
defeat,
defend,
mitigate
and
recover
from
terrorist
and
other
catastrophic
events?
If
it
is
not,
why?
What
further
reforms
are
necessary
create
and
sustain
a
better
system?
1. Final
Report
on
9/11
Commission
Recommendation
www.9‐11pdp.org
2. Sagarin,
Raphael.
2003.
Adapt
or
die.
What
Charles
Darwin
can
teach
Tom
Ridge
about
homeland
security.
Foreign
Policy(138)
(Sept‐Oct):
68‐69.
3. Flynn
Chapter
7
Getting
it
Right
4. Flynn
Chapter
8
Tapping
the
Private
Sector
5. Flynn
Chapter
9
Preparing
for
the
Worst
6. Flynn
Chapter
10
A
Resilient
Society
7. GAO
07‐375
HOMELAND
SECURITY
Progress
Has
Been
Made
to
Address
the
Vulnerabilities
Exposed
by
9/11,
but
Continued
Federal
Action
Is
Needed
to
Further
Mitigate
Security
Risks
January
2007
www.gao.gov/new.items/d07375.pdf
Wednesday
August
6
Reading
Week
Wednesday
August
13
Exam
Due
4:00
pm
in
my
office
GR
3.209
8
Adapted
from
Duke
university
guidelines
for
writers,
AVOIDING
PLAGIARISM
GATHERING
RESEARCH
MATERIAL
Take
time
to
make
careful
choices
among
‐‐
and
learn
to
use
‐‐
the
research
tools
available
to
you.
You
will
probably
find
that
your
favorite
Web
search
engine
is
not
adequate,
by
itself,
for
college‐level
research.
Consult
with
your
professor
or
a
librarian.
You
may
need
to
use
specialized
research
tools,
some
of
which
may
require
learning
new
searching
techniques.
Expect
to
make
trips
to
the
library.
While
you
can
access
many
of
the
library's
resources
from
your
home
computer,
you
may
find
that
you
need
to
make
several
trips
to
the
library
to
use
materials
or
research
tools
that
are
not
accessible
remotely.
Of
course
you
will
be
seeking
the
best
information,
not
settling
for
sources
simply
because
they
happen
to
be
available
online.
Allow
time
for
gathering
materials
that
are
not
available
at
UTD.
The
Interlibrary
Loan
office
can
borrow
articles
and
books
from
other
libraries,
but
this
process
takes
additional
time.
Allow
time
for
reading,
rereading,
absorbing
information,
taking
notes,
synthesizing,
and
revising
your
research
strategy
or
conducting
additional
research
as
new
questions
arise.
TAKING NOTES
Sloppy
note‐taking
increases
the
risk
that
you
will
unintentionally
plagiarize.
Unless
you
have
taken
notes
carefully,
it
may
be
hard
to
tell
whether
you
copied
certain
passages
exactly,
paraphrased
them,
or
wrote
them
yourself.
This
is
especially
problematic
when
using
electronic
source
materials,
since
they
can
so
easily
be
copied
and
pasted
into
your
own
documents.
Identify
words
that
you
copy
directly
from
a
source
by
placing
quotation
marks
around
them,
typing
them
in
a
different
color,
or
highlighting
them.
(Do
this
immediately,
as
you
are
making
your
notes.
Don't
expect
to
remember,
days
or
weeks
later,
what
phrases
you
copied
directly.)
Make
sure
to
indicate
the
exact
beginning
and
end
of
the
quoted
passage.
Copy
the
wording,
punctuation
and
spelling
exactly
as
it
appears
in
the
original.
Jot
down
the
page
number
and
author
or
title
of
the
source
each
time
you
make
a
note,
even
if
you
are
not
quoting
directly
but
are
only
paraphrasing.
Keep
a
working
bibliography
of
your
sources
so
that
you
can
go
back
to
them
easily
when
it's
time
to
double‐
check
the
accuracy
of
your
notes.
If
you
do
this
faithfully
during
the
note‐taking
phase,
you
will
have
no
trouble
completing
the
"works
cited"
section
of
your
paper
later
on.
Keep
a
research
log.
As
you
search
databases
and
consult
reference
books,
keep
track
of
what
search
terms
and
databases
you
used
and
the
call
numbers
and
url's
of
information
sources.
This
will
help
if
you
need
to
refine
your
research
strategy,
locate
a
source
a
second
time,
or
show
your
professor
what
works
you
consulted
in
the
process
of
completing
the
project.
9
DOCUMENTING
SOURCES
You must cite direct quotes.
You
must
cite
paraphrases.
Paraphrasing
is
rewriting
a
passage
in
your
own
words.
If
you
paraphrase
a
passage,
you
must
still
cite
the
original
source
of
the
idea.
For
detailed
examples
and
a
discussion,
see
Appropriate
Uses
of
Sources.
You must cite ideas given to you in a conversation, in correspondence, or over email.
You
must
cite
sayings
or
quotations
that
are
not
familiar,
or
facts
that
are
not
"common
knowledge."
However,
it
is
not
necessary
to
cite
a
source
if
you
are
repeating
a
well
known
quote
such
as
Kennedy's
"Ask
not
what
your
country
can
do
for
you
.
.
.,"
or
a
familiar
proverb
such
as
"You
can't
judge
a
book
by
its
cover."
Common
knowledge
is
something
that
is
widely
known.
For
example,
it
is
common
knowledge
that
Bill
Clinton
served
two
terms
as
president.
It
would
not
be
necessary
to
cite
a
source
for
this
fact.
Printed
sources:
books,
parts
of
books,
magazine
or
journal
articles,
newspaper
These
types
of
sources
should
be
articles,
letters,
diaries,
public
or
private
documents.
documented.
There
is
a
common
misconception
that
only
Electronic
sources:
web
pages,
articles
from
e‐journals,
newsgroup
postings,
printed
sources
of
information,
like
books
and
graphics,
email
messages,
software,
databases.
magazine
articles,
need
to
be
formally
cited.
In
fact,
audiovisual
and
electronic
sources
‐‐
even
email
messages
‐‐
must
be
documented
as
Images:
works
of
art,
illustrations,
cartoons,
tables,
charts,
graphs.
well,
if
you
use
ideas
or
words
from
them
in
your
writing.
Here
are
some
examples
of
the
Recorded
or
spoken
material:
course
lectures,
films,
videos,
TV
or
radio
kinds
of
sources
that
should
be
cited:
broadcasts,
interviews,
public
speeches,
conversations.
10