Volume XVI Notes from the Editor

The August 2020 Issue of Homeland Security Affairs features a review of an important book on women in homeland security, an essay examining the need for more adaptable standard operating procedures for first responders, and a research article which evaluates two recent CVE projects. In the first essay, Beth Windisch reviews “A Woman’s Place: U.S.

Book Review: A Woman’s Place: U.S. Counterterrorism Since 9/11 by Joana Cook

Reviewed by Beth Windisch Suggested Citation Windisch, Beth. Review of A Woman’s Place: U.S. Counterterrorism Since 9/11, by Joana Cook. Homeland Security Affairs 16, Article 4. hsaj.org/articles16072 In her foundational work in feminist international relations theory, Cynthia Enloe asked “Where are the Women?” 1 Joana Cook answers with her new book, A Women’s Place: U.S.

The Case for Adaptive SOPs in Complex Crises and Unpredictable Operating Environments

By Shawn Harwood and Wayne Porter, Ph.D. Abstract Standard operating procedures (SOPs) guide emergency responders in a crisis, providing predetermined steps to manage anticipated events. Modern disasters, however, often manifest as complex systems—susceptible to nonlinear interactions and feedback in the environment that produce unanticipated outcomes. As a consequence, the application of prediction-dependent SOPs to prediction-defiant

Assessing the Impact of the Boston CVE Pilot Program: A Developmental Evaluation Approach

By Elena Savoia, Megan McBride, Jessica Stern, Max Su, Nigel Harriman, Ajmal Aziz and Richard Legault Abstract This article describes the use of developmental evaluation as applied to countering violent extremism (CVE) programs. It discusses the application of this method to an evaluation of the Boston CVE Pilot Program, with specific attention given to two

Border Management in Europe: Is the Paradigm Evolving?

By Nadav Morag Abstract This article focuses on the European Union’s approach to border management. The concept of border management includes not only: 1) the physical control over borders and the flow of goods and persons through ports of entry; but also 2) the management of immigration, migrant flows, and asylum request;, as well as

Book Review: Inside the Enemy’s Computer: Identifying Cyber-Attackers by Clement Guitton

Reviewed by Mark T. Peters II, USAF, Retired Suggested Citation Peters, Mark T. Review of Inside the Enemy’s Computer: Identifying Cyber-Attackers, by Clement Guitton. Homeland Security Affairs 16, Article 2. www.hsaj.org/articles/15817 Expanding cyber-domain conflicts challenge modern strategists to create definitive attribution standards for who did what to whom, especially in developing national policy. Attribution’s importance

Enhancing the Organization of the United States Department of Homeland Security to Account for National Risk

By Michael H. Brody Abstract The Department of Homeland Security (DHS) must enhance its organization to more fully account for, align resources against, and act on the prioritized risks of the homeland security enterprise. This will require: (1) enhanced regionalization of DHS, achieved through the networking of stakeholders within and between DHS operational regions; (2)