TG- The Nexus of Homeland Security and Terrorism
docx
keyboard_arrow_up
School
Liberty University *
*We aren’t endorsed by this school
Course
480
Subject
Political Science
Date
Dec 6, 2023
Type
docx
Pages
16
Uploaded by MegaOryxPerson929
The Nexus of Homeland Security and Terrorism
1
The Nexus of Homeland Security and Terrorism
Tyler J. Gregory
HLSC 610 | Dr. Richards
Helms School of Government, Liberty University
July 04, 2023
The Nexus of Homeland Security and Terrorism
2
Abstract
Terrorism has had a presence on American soil for decades and no signs appear to be pointing
towards a cease fire on their behalf. With advancements in technology and weaponry today, it is
more evident than ever to include all support functions and organizations in the counterterrorism
efforts put out by the United States and its allies. While examining the nexus of homeland
security and terrorism, it is obvious to include the disaster life cycle as it relates to terrorism. By
utilizing important pieces of these phases such as the Incident Command System (ICS), the
National Disaster Recovery Framework (NDRF), the Threat and Hazards Identification and Risk
Assessment process (THIRA), and the Targeted Violence and Terrorism Prevention grant
program (TVTP), emergency management can effectively manage terrorism and the threat it
poses to United States communities. Since the 9/11 attacks in 2001, terrorism has become a focal
point for the entire globe, justifying the creation of a department with a sole purpose to counter
terroristic threats on American soil and abroad, a department that would one day host 22 agencies
in support of the counterterrorism mission. This paper aims to examine the nexus of homeland
security and terrorism while placing an emphasis on the five disaster management phases:
mitigation; prevention; preparedness; response; and recovery. At the conclusion of the paper, the
reader will better understand how terrorism relates to homeland security and how it is
approached throughout the various phases of the disaster life cycle.
Keywords
:
Terrorism; Homeland; Security; Disaster; DHS; FEMA
The Nexus of Homeland Security and Terrorism
3
The Nexus of Homeland Security and Terrorism
The United States may be a country based on democracy, giving its people the right to
have disagreements and vote for what they believe is right in their lens. However, there is
nothing more agreed upon within the country than the dismissal of both radicalization and those
who wish to commit acts of terrorism on US soil. Following 9/11, the United States called upon
the Homeland Security Act of 2002, creating the Department of Homeland Security with the
mission to intercept and prevent terrorist attacks from wreaking havoc on US soil once more
(dhs, 2002). The nexus of homeland security and terrorism are rooted in the creation of a
department with the sole purpose to mitigate and deter terrorism in the United States. As the
years have passed since 9/11, there have been nearly 500 terrorism incidents in the United States
alone, proving that terrorism in the homeland is still a very imminent threat, requiring the hefty
involvement of the DHS and fellow federal agencies (newamerica.org, 2023). When facing
terrorism to the extent of the United States, it is imperative that procedures and practices are
followed to ensure maximum efficiency in the phases of emergency management.
Mitigation Phase Concerning Terrorism
One of the most effective ways to deter and lessen the effects of terrorism throughout the
United States is through the mitigation phase of the disaster life cycle. Mitigation is the use of
techniques and tactics that ultimately lessen the impact and effects of a disaster, in this case
terrorism (Gougalet, 2015). Mitigation is an ongoing process that utilizes the whole community
approach, bringing all organizations and members together to produce a mitigation plan that
addresses the threat of terrorism.
Threat and Hazard Identification and Risk Assessment (THIRA)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Nexus of Homeland Security and Terrorism
4
The Threat and Hazard Identification and Risk Assessment (THIRA) process is complex
in nature, so much so that organizations who require assistance from the Federal Emergency
Management Agency (FEMA) must complete a THIRA annually to qualify (fema, 2018). The
THIRA process essentially helps communities understand the risks and hazards that are present
in their community. According to the state of Oklahoma, the THIRA process consists of three
steps in such order; identifying the threats and hazards, giving the threats and hazards context,
and to establish capability targets (Oklahoma, 2022). The THIRA process is critical in the
mitigation of terrorism as it identifies the vulnerabilities and gaps within a community, allowing
emergency management professionals to create a mitigation plan and mitigate threats
(Zimmerman, 2014).
Structural and Non-Structural Mitigation
Mitigation, in addition to the THIRA process, includes structural as well as non-structural
mitigation. As it pertains to terrorism, structural mitigation can include many efforts such as
protecting buildings by implementing constructional change as well as crafting structures to
protect critical infrastructures from being damaged in a terrorist attack (Delaware, 2018).
Structural and non-structural mitigation are used in such terms to better communicate and
understand when speaking upon a mitigation plan. For example, structural mitigation when
paired with an all-hazards approach while focusing on terroristic threats, might include plans to
reinforce the masonry within the structure of buildings, making it more resilient to explosions
(ucop.edu, 2017). Non-structural mitigation deals with all aspects of the community that are not
physical structures. Regarding terrorism and the mitigation of terrorist attacks, non-structural
mitigation focuses on things such as diplomacy strategy, education, and safety inspections
(Texas, 2015). In some aspect, it might be easier for the reader to understand the difference
The Nexus of Homeland Security and Terrorism
5
between structural mitigation and non-structural mitigation as it applies to terrorism as structural
mitigation being the men and women carrying out hands on work, whereas non-structural
mitigation is the brains of the men and women that are making differences in the community.
Disciplines
The Department of Homeland Security and its efforts in the mitigation phase string across
countless disciplines as it applies to terrorism. These disciplines are in active in a vast majority of
other operations pertaining homeland security, further creating a nexus between terrorism and
homeland security. However, law enforcement, firefighters, intelligence operatives, military
personnel, medical professionals, volunteers, construction workers, and more all make up the
diverse community who regularly cooperate in grand efforts to mitigate terrorism and the
potential of it occurring on US soil (McEntire, 2006). Terrorism directly affects all these
professions once it occurs, giving them even more reason to join the fight and assist in mitigation
plans with a whole community approach. Although focused on mitigation, the efforts put forth
within these disciplines help emergency management officials better utilize prevention plans,
leading to better preparedness, response, and recovery operations as the attack unfolds.
Prevention of Terrorism
Within emergency management, there are typically four phases that make up the disaster
life cycle: mitigation, preparedness, response, and recovery. However, to many that work in the
counterterrorism field, prevention is an added phase of the disaster life cycle. According to Bexar
County Emergency Management, prevention focuses on preventing disasters whether they be
natural or terrorism related, and differs from mitigation due to being a more permanent solution
to the disasters in the community (bexar.org, 2023).
Counterterrorism
The Nexus of Homeland Security and Terrorism
6
As terrorism and homeland security are connected, prevention and counterterrorism are
as well, leaning on one another to carry out operations, making the US soil a more resilient state.
Counterterrorism began as a preventative measure in the mid 1990s, growing into a global scale
focus following the 9/11 attacks (FBI, 2002). Beginning in 2004, each sovereign nation was
required to complete an annual report on terrorist activity as it applies within their borders,
creating greater awareness for terrorism and whether it was still scaling globally (State.gov,
2023). Reports such as these annual reports on the country’s terrorist activity help grow the
counterterrorism division of homeland security, further building that nexus between the two.
Counterterrorism also offers the TVTP or Targeted Violence and Terrorism Prevention Grant
Program, providing funds to state, local, tribal, and territorial governments as well as non-profit
organizations for the implementation of preventative measures against terrorism and targeted
violence (dhs, 2023).
Communication
Communication plays a pivotal role in any field of homeland security, but none greater
than terrorism. Communication is one of the difficulties that has pressed the United States and
allies for years, oftentimes being the root cause for a failure in preventing a terrorist attack,
giving the International Centre for Counter Terrorism (ICCT) a reason to spearhead the Counter
Terrorism Strategic Communication (CTSC) project (icct.nl, 2023). This project aims to
incorporate global information sharing as well as greater interconnectedness between
government agencies and organizations, providing all key actors with the information to take
preventative actions within their community. As prevention is an emergency management phase
consistent with terrorism and targeted violence, the preparedness phase follows, taking a more
macro approach to the nexus of terrorism and homeland security.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Nexus of Homeland Security and Terrorism
7
Preparing for an Attack
The preparedness phase as it relates to terrorism is concerned with the consistent training,
exercising, planning, and testing of response plans and day zero operations (bexar.org, 2023).
The preparedness phase utilizes methodologies such as the all-hazards approach, as well as
training and exercise techniques such as tabletop exercises and red teaming.
All-Hazards Approach
During the preparedness phase it is important to utilize an all-hazards approach due to the
importance of being prepared for any disaster that might strike. During the planning phase within
preparedness, it is normal to target vulnerabilities in your community as your THIRA exposed,
however, it is crucial to not turn a blind eye to the possibility of any given disaster occurring
(ready.gov, 2021). The all-hazards approach will look at all potential disasters as they relate to
your environment with the addition of threats of terrorism.
Training and Exercise
Training and exercise throughout the preparedness phase are imperative, as it will likely
be the only source of information an individual can resort to in the event a terrorist attack occurs
(unr.edu, 2023). An emergency manager with the intent of preparing their community for a
terrorist attack would find good use in providing training and exercises to schools, local
organizations, and business gatherings. In addition to these efforts, tabletop exercises such as
walkthroughs of proper escape methods, providing first-aid, and using available communications
are excellent ways to give individuals a feel for what they should be doing in an emergency such
as a terrorist attack (nyc.gov, 2004). An extra measure that is often used to expand defensive
capabilities is a process called red teaming. Red teaming is the exercise of simulating an
adversary or enemy to give first-hand experience dealing with a terrorist or hostile situation
The Nexus of Homeland Security and Terrorism
8
without the participants knowing that it is a training exercise (Ackerman & Clifford, 2021).
Through training and exercises, a community can feel prepared for a terrorist attack being that
they have been put through an array of practice scenarios, giving them context to resort to during
the real threat.
Response
When a terrorist attack occurs, it is obviously going to be a surprise. Unlike hurricanes,
floods, droughts, or tornadoes, there is no time to react and prevent or prepare for the impact of a
terrorist attack. One factor that affects the initial shock of a terrorist attack is the time lapse from
a previous attack or similar experience (National Research Council, 2002). As more time passes
since the last violent incident, individuals become more comfortable with letting their “guard
down” and they forget that obliviousness results in being unprepared. The response phase can be
looked at from an athletic standpoint, seeing it as “game time” and all the previous phases being
the practice, preparing you to perform.
Coordination and Management of Resources
As soon as there is report of an attack, the response phase begins and emergency
managers as well as first responders begin coordinating and communicating evacuation plans,
establishing an Emergency Operations Center (EOC), and assessing whether the threat is still a
threat (iafc.org, 2007). Communicating with resources established during the mitigation and
preparedness phase are going to allow for a much faster and orderly evacuation of the affected
area, getting more individuals to safety and allowing first responders to enter the attack zone
(osha.gov, 2023). Resource management is also an essential piece to the response phase as it
gives emergency managers the flexibility to call on resources when needed throughout the
response operation. For example, an emergency manager might require assistance with finding
The Nexus of Homeland Security and Terrorism
9
mass transit options for the unaffected individuals from the attack. In this case, it would be
beneficial to have staging areas established where available resources will congregate, waiting
for any request the emergency manager might make of them (Greenhoe, 2013). However, while
communication and resources are a critical part of the response phase, the Incident Command
System (ICS) is the guide to the entire response operation and the management of personnel on
scene.
Utilizing the ICS
As mentioned above, the Incident Command System (ICS) is a standardized guide that
allows all key actors on scene to be brought up to speed on common terminology, roles and
duties, as well as establishing a chain of command (usda, 2023). The ICS is utilized at the EOC
and translated throughout the field to ensure immediate direction during the response to a
terrorist attack. While at the EOC, the ICS will provide guidance on shift changes as well as the
transfer of command and how to properly do so during the response phase (nwcg.gov, 2022).
Nonetheless, the ICS gives unmatched support to the operation and serves as the master guide for
as long as the EOC is activated.
Recovering From a Terrorist Attack
The recovery phase regarding terrorism is never easy, oftentimes being seen as a harder
task than recovering from natural disasters. In a natural disaster, victims are upset and angry at
nature for the damages that it caused, while also feeling relieved that it is over with and there
will be a period with no disruption. In the event of a terrorist attack, it is likely that victims are
going to feel very scared and upset with law enforcement for not stopping the attack, making it
more difficult for emergency managers to work with the victims in efforts of returning to
normalcy. Emergency managers throughout the recovery phase rely on non-governmental
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Nexus of Homeland Security and Terrorism
10
organizations (NGOs) and faith-based organizations (FBOs) to provide services and resources to
victims of the attack, putting the community on a better track to recovery (syr.edu, 2015). By
using medical support, utilizing the National Disaster Recovery Framework (NDRF), and
exhausting all possible resources, normalcy can be re-established in a community impacted by a
terrorist attack.
NGOs and FBOs Role in Recovery
Both NGOs and FBOs play pivotal roles in the recovery from a terrorist attack. NGOs
work closely with FEMA and other local, state, tribal, and territorial governments to provide
resources as needed. According to the Rand Corporation, NGOs are oftentimes favored over the
use of government resources being that they are received well by the general public for the good
that they do for the community (Chandra & Acosta, 2009). NGOs such as the American Red
Cross and The Salvation Army have specialized emergency services that can support operations
and open mass care (ESF-6) facilities to shelter and feed large amounts of victims or those
displaced due to the attack (floridadisaster.org, 2011). FBOs offer not only church services, but
they open their doors to house the displaces families, provide the community with meals, and
disperse their Chaplains for the victim’s use (Sheikhi et al, 2020).
Mental Health Support
Following a terrorist attack, there are many victims that never let that experience escape
their minds. Twenty-two years later, there are victims of 9/11 that still require mental health
services and attend these services on a weekly basis (cdc.gov, 2023). Victims can utilize mental
health services typically for no charge if they are impacted by the terrorist attack as long as it is a
declared disaster. As mentioned above, FBOs offer Chaplains to provide spiritual services for
those that have been affected, and cannot attend church or their church has been affected by the
The Nexus of Homeland Security and Terrorism
11
attack. Needless to say, FBOs and NGOs play massive roles in the recovery of a community and
the support arms of the emergency management office.
NDRF (National Disaster Recovery Framework)
The NDRF was first approved in 2011 by the Obama Administration and provides
superior guidance to the recovery phase and emphasizes that the recovery process is not just
about returning a community to normalcy, but rather it is about building resiliency and ensuring
the attacks or disasters do not have such a significant impact if it were to happen again (doi,
2023). Under the NDRF, there is advanced coordination of resources and assisting organizations,
guidance that suggest the chronological order of operations, and assists in the drawing of a
recovery plan, creating a more uniformed operation that ensures consistency and fluidity when
recovering from a terrorist attack (fema, 2023).
Biblical Implication
The Bible states in Matthew 25:13, “Watch therefore, you know neither the day nor the
hour.” (The Holy Bible, 2016). This verse suggests that individuals be prepared for a terrorist
attack because you know neither the day nor the hour that an attack can happen in your
community. By following preparedness guides and the educational pieces given in this paper, the
reader can be better suited to withstand a terrorist attack.
The Nexus of Homeland Security and Terrorism
12
References
5 phases of emergency management: Organizational resilience
. University of Nevada, Reno.
(2023). https://www.unr.edu/organizational-resilience/phases#:~:text=Training%20and
%20exercising%20plans%20is,respond%20when%20a%20disaster%20occurs.
Ackerman, G., & Clifford, D. (2021, August 31).
Red teaming and crisis preparedness
. Oxford
Research Encyclopedia of Politics.
https://oxfordre.com/politics/display/10.1093/acrefore/9780190228637.001.0001/acrefore-
9780190228637-e-1969
All-Hazard Mitigation Plan
. dema.gov. (2018).
https://www.dema.delaware.gov/contentFolder/pdfs/HazardMitigationPlan.pdf
Berger, J. M., Ingram, H. J., Reed, A., Fitzgerald, M., Adebiyi, K., Muindi, M., Amarasingam,
A., & Rizwie, R. (2016, May 26).
Counter-terrorism strategic communications
. ICCT.
https://www.icct.nl/project/counter-terrorism-strategic-communications
Centers for Disease Control and Prevention. (2023).
About the WTC Health Program
. Centers
for Disease Control and Prevention. https://www.cdc.gov/wtc/about.html
Chandra, A., & Acosta, J. D. (2009, September 18).
More support is needed to integrate
nongovernmental agencies in human recovery from disasters
. RAND Corporation.
https://www.rand.org/pubs/occasional_papers/OP277.html
Comparing oral reading fluency growth to ...
Syracuse.edu. (2015).
https://surface.syr.edu/cgi/viewcontent.cgi?article=1032&context=honors_capstone
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Nexus of Homeland Security and Terrorism
13
Department of Labor Logo United Statesdepartment of Labor
. Emergency Preparedness and
Response: Getting Started | Occupational Safety and Health Administration. (2023).
https://www.osha.gov/emergency-preparedness/getting-started#evacuation
FBI. (2002, February 6).
The terrorist threat confronting the United States
. FBI.
https://archives.fbi.gov/archives/news/testimony/the-terrorist-threat-confronting-the-
united-states
The Five Phases of Emergency Management
. The Five Phases of Emergency Management |
Bexar County, TX - Official Website. (2023). https://www.bexar.org/694/Five-
Phases#:~:text=Prevention%20focuses%20on%20preventing%20human,all%20disasters
%20can%20be%20prevented.
Gougelet, R. M. (2016).
Disaster mitigation
. Ciottone’s Disaster Medicine.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7152083/
Greenhoe, G. (2017, September 12).
Emsi
. EMSI. https://www.emsics.com/effective-use-
management-staging-areas/
Home
. FloridaDisaster.org. (2011). https://www.floridadisaster.org/
ICS 100 – Incident Command System - USDA
. Ics100. (n.d.).
https://www.usda.gov/sites/default/files/documents/ICS100.pdf
Matthew 25:13
. Matthew 25:13 ESV - - Bible Gateway. (2016).
https://www.biblegateway.com/passage/?search=Matthew%2B25%3A13&version=ESV
The Nexus of Homeland Security and Terrorism
14
McEntire, D. E. (2006).
Academic emergency management and related courses (AEMRC) for the
higher education program
. Federal Emergency Management Agency | Emergency
Management Institute.
https://training.fema.gov/hiedu/aemrc/booksdownload/ddemtextbook/
National disaster recovery framework
. FEMA.gov. (2021). https://www.fema.gov/emergency-
managers/national-preparedness/frameworks/recovery#:~:text=The%20National
%20Disaster%20Recovery%20Framework,a%20unified%20and%20collaborative
%20manner.
National disaster recovery framework
. U.S. Department of the Interior. (2018, October 16).
https://www.doi.gov/recovery/about-recovery/ndrf#:~:text=Recent%20disasters%20have
%20shown%20the,by%20President%20Obama%20in%202011.
News, F. (2004).
New Technology the EPCR comes to fdny*ems
. NYC.gov.
https://www.nyc.gov/html/fdny/pdf/emp_resources/viewpoint/2004/july/vp_july_page5.pdf
Planning
. Planning | Ready.gov. (2023). https://www.ready.gov/planning
Public law 107–296 107th Congress an act
. DHS.gov. (2002).
https://www.dhs.gov/sites/default/files/publications/hr_5005_enr.pdf?ftag=MSF0951a18
Read “Making the nation safer: The role of science and technology in countering terrorism” at
nap.edu
. Front Matter | Making the Nation Safer: The Role of Science and Technology in
Countering Terrorism | The National Academies Press. (2002).
https://nap.nationalacademies.org/read/10415/chapter/1
The Nexus of Homeland Security and Terrorism
15
Sheikhi, R. A., Seyedin, H., Qanizadeh, G., & Jahangiri, K. (2020, February 17).
Role of
religious institutions in Disaster Risk Management: A systematic review: Disaster
Medicine and Public Health Preparedness
. Cambridge Core.
https://www.cambridge.org/core/journals/disaster-medicine-and-public-health-
preparedness/article/abs/role-of-religious-institutions-in-disaster-risk-management-a-
systematic-review/0F02455A3070D31B12D57E836394F919
Targeted violence and terrorism prevention grant program
. Targeted Violence and Terrorism
Prevention Grant Program | Homeland Security. (2022). https://www.dhs.gov/tvtpgrants
Terrorism in America after 9/11
. New America. (2023).
https://www.newamerica.org/international-security/reports/terrorism-in-america/terrorism-
cases-2001-today/
Terrorism response - international association of fire chiefs
. iafc.org. (n.d.).
https://www.iafc.org/docs/default-source/lg-scale-
response/terrorismchecklist_4thedition.pdf?sfvrsn=0
Texas
. egrants.gov. (2015).
https://egrants.gov.texas.gov/FileDirectory/TxHomelandSecStratPlan2015-
2020_PRIORITY_ACTIONS_October_2015.pdf
Threat and hazard identification and risk assessment (thira) and ...
FEMA.gov. (2023).
https://www.fema.gov/sites/default/files/2020-04/CPG201Final20180525.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The Nexus of Homeland Security and Terrorism
16
Threat and hazard identification and risk assessment (Thira)
. Office of Homeland Security.
(2022). https://oklahoma.gov/homeland-security/critical-infrastructure/threat-and-hazard-
identification-and-risk-assessment.html#:~:text=Program%20Purpose,can%20then
%20make%20smarter%20decisions.
Transfer of command
. NWCG. (2022). https://www.nwcg.gov/committee/6mfs/transfer-of-
command
U.S. Department of State. (2023).
Bureau of Counterterrorism
. U.S. Department of State.
https://www.state.gov/bureaus-offices/under-secretary-for-political-affairs/bureau-of-
counterterrorism/
University of California Hazard Mitigation Progress Report - UCOP
. UCOP.edu. (2017).
https://www.ucop.edu/risk-services/_files/emergency/hazard_mitigation_rpt.pdf
Zimmerman, R. (2014).
Integrated Risk Management at the local level: The gap between
theory ...
bush.tamu.edu. https://bush.tamu.edu/wp-content/uploads/2020/02/Capstone-
Publication-Integrated-Risk-Management-Published-Copy.pdf