Pub Date : 1900-01-01DOI: 10.7551/mitpress/13831.003.0005
{"title":"DHS and the Counterterrorism Enterprise","authors":"","doi":"10.7551/mitpress/13831.003.0005","DOIUrl":"https://doi.org/10.7551/mitpress/13831.003.0005","url":null,"abstract":"","PeriodicalId":285671,"journal":{"name":"Beyond 9/11","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126888588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.7551/mitpress/13831.003.0004
{"title":"Organizing Homeland Security: The Challenge of Integration at DHS","authors":"","doi":"10.7551/mitpress/13831.003.0004","DOIUrl":"https://doi.org/10.7551/mitpress/13831.003.0004","url":null,"abstract":"","PeriodicalId":285671,"journal":{"name":"Beyond 9/11","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122237378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.7551/mitpress/13831.003.0016
Frank J. Cilluffo
2 Chairman Lieberman, Ranking Member Collins, and distinguished Members of the Committee, thank you for the opportunity to testify before you today. This first in a series of hearings looking both back at what has been accomplished and ahead to what remains to be done in the area of homeland security is a prudent and thoughtful approach. While a host of constructive and valuable changes to policy and practice have been formulated and implemented in the decade plus since 9/11, there remain important gaps and shortfalls in our homeland and national security posture and readiness. Though we do not often laud those individuals, such as yourselves, who have remained steadfast and dedicated to the cause of improving the safety and security of Americans day in, day out, for years—even when the public mind and public opinion may have made the task more challenging than it already was—it bears remembering that we have made significant strides and in a relatively short period of time. Having said that, some significant shortcomings still exist, and some of these are more urgent than others to remedy or at least redress in part. My remarks today will focus on two major areas: counterterrorism and cybersecurity. My approach, which I hope will be helpful, is to identify weaknesses and vulnerabilities in U.S. strategy and operations on both counts—with an eye to offering recommendations on how best to move forward, particularly in an economic climate in which resources are limited. Indeed, to the extent that we can derive greater bang for our buck, it is our shared responsibility to do so. What I would urge against however, is a more broadbrush approach (from a financial perspective) which runs the risk of privileging convenience over thoughtful strategic action, and may thereby do damage to our national/homeland security posture, even if inadvertently. Blunt cuts are simply not the answer. Instead we should prune and trim carefully, by prioritizing according to risk, by allowing good programs to live, and by taking off life support those programs that should rightfully expire. Counterterrorism As many counterterrorism officials have observed recently, al Qaeda's Senior Leadership is back on their heels. Key leaders have met their demise including, of course, Usama Bin Laden and Anwar al-Awlaki. Nevertheless, the ideology that Bin Laden and others such as the culturally fluent American-born extremist and self-styled cleric al-Awlaki have propounded lives on. This ideology is the lifeblood …
{"title":"The Future of Homeland Security","authors":"Frank J. Cilluffo","doi":"10.7551/mitpress/13831.003.0016","DOIUrl":"https://doi.org/10.7551/mitpress/13831.003.0016","url":null,"abstract":"2 Chairman Lieberman, Ranking Member Collins, and distinguished Members of the Committee, thank you for the opportunity to testify before you today. This first in a series of hearings looking both back at what has been accomplished and ahead to what remains to be done in the area of homeland security is a prudent and thoughtful approach. While a host of constructive and valuable changes to policy and practice have been formulated and implemented in the decade plus since 9/11, there remain important gaps and shortfalls in our homeland and national security posture and readiness. Though we do not often laud those individuals, such as yourselves, who have remained steadfast and dedicated to the cause of improving the safety and security of Americans day in, day out, for years—even when the public mind and public opinion may have made the task more challenging than it already was—it bears remembering that we have made significant strides and in a relatively short period of time. Having said that, some significant shortcomings still exist, and some of these are more urgent than others to remedy or at least redress in part. My remarks today will focus on two major areas: counterterrorism and cybersecurity. My approach, which I hope will be helpful, is to identify weaknesses and vulnerabilities in U.S. strategy and operations on both counts—with an eye to offering recommendations on how best to move forward, particularly in an economic climate in which resources are limited. Indeed, to the extent that we can derive greater bang for our buck, it is our shared responsibility to do so. What I would urge against however, is a more broadbrush approach (from a financial perspective) which runs the risk of privileging convenience over thoughtful strategic action, and may thereby do damage to our national/homeland security posture, even if inadvertently. Blunt cuts are simply not the answer. Instead we should prune and trim carefully, by prioritizing according to risk, by allowing good programs to live, and by taking off life support those programs that should rightfully expire. Counterterrorism As many counterterrorism officials have observed recently, al Qaeda's Senior Leadership is back on their heels. Key leaders have met their demise including, of course, Usama Bin Laden and Anwar al-Awlaki. Nevertheless, the ideology that Bin Laden and others such as the culturally fluent American-born extremist and self-styled cleric al-Awlaki have propounded lives on. This ideology is the lifeblood …","PeriodicalId":285671,"journal":{"name":"Beyond 9/11","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.7551/mitpress/13831.003.0008
{"title":"The Challenge of Securing the Global Supply System","authors":"","doi":"10.7551/mitpress/13831.003.0008","DOIUrl":"https://doi.org/10.7551/mitpress/13831.003.0008","url":null,"abstract":"","PeriodicalId":285671,"journal":{"name":"Beyond 9/11","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.7551/mitpress/13831.003.0022
{"title":"About the Belfer Center for Science and International Affairs","authors":"","doi":"10.7551/mitpress/13831.003.0022","DOIUrl":"https://doi.org/10.7551/mitpress/13831.003.0022","url":null,"abstract":"","PeriodicalId":285671,"journal":{"name":"Beyond 9/11","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}