By Paul Jara “I think the best use of the Guard right now is doing what they are doing. And that is working in what we call a Title 32 status for the governors of their states and then dealing with the challenges that the governor needs them to deal with at the state and…
Volume XVI
Book Review: A Woman’s Place: U.S. Counterterrorism Since 9/11 by Joana Cook
Reviewed by Beth Windisch Suggested Citation Windisch, Beth. Review of A Woman’s Place: U.S. Counterterrorism Since 9/11, by Joana Cook. Homeland Security Affairs 16, Article 4. hsaj.org/articles16072 In her foundational work in feminist international relations theory, Cynthia Enloe asked “Where are the Women?” 1 Joana Cook answers with her new book, A Women’s Place: U.S.…
The Case for Adaptive SOPs in Complex Crises and Unpredictable Operating Environments
By Shawn Harwood and Wayne Porter, Ph.D. Abstract Standard operating procedures (SOPs) guide emergency responders in a crisis, providing predetermined steps to manage anticipated events. Modern disasters, however, often manifest as complex systems—susceptible to nonlinear interactions and feedback in the environment that produce unanticipated outcomes. As a consequence, the application of prediction-dependent SOPs to prediction-defiant…
Assessing the Impact of the Boston CVE Pilot Program: A Developmental Evaluation Approach
By Elena Savoia, Megan McBride, Jessica Stern, Max Su, Nigel Harriman, Ajmal Aziz and Richard Legault Abstract This article describes the use of developmental evaluation as applied to countering violent extremism (CVE) programs. It discusses the application of this method to an evaluation of the Boston CVE Pilot Program, with specific attention given to two…
Call for Papers | Special COVID-19 Response Issue
The Editorial Committee for Homeland Security Affairs invites the submission of short (2,000-3,000 words) essays analyzing lessons learned from jurisdiction and agency responses to the COVID-19 pandemic. The essays can focus on policy, strategic, operational or tactical issues. This call for papers is ongoing. There is no submission deadline. Manuscripts will be vetted by the…
Border Management in Europe: Is the Paradigm Evolving?
By Nadav Morag Abstract This article focuses on the European Union’s approach to border management. The concept of border management includes not only: 1) the physical control over borders and the flow of goods and persons through ports of entry; but also 2) the management of immigration, migrant flows, and asylum request;, as well as…
Book Review: Inside the Enemy’s Computer: Identifying Cyber-Attackers by Clement Guitton
Reviewed by Mark T. Peters II, USAF, Retired Suggested Citation Peters, Mark T. Review of Inside the Enemy’s Computer: Identifying Cyber-Attackers, by Clement Guitton. Homeland Security Affairs 16, Article 2. www.hsaj.org/articles/15817 Expanding cyber-domain conflicts challenge modern strategists to create definitive attribution standards for who did what to whom, especially in developing national policy. Attribution’s importance…
Enhancing the Organization of the United States Department of Homeland Security to Account for National Risk
By Michael H. Brody Abstract The Department of Homeland Security (DHS) must enhance its organization to more fully account for, align resources against, and act on the prioritized risks of the homeland security enterprise. This will require: (1) enhanced regionalization of DHS, achieved through the networking of stakeholders within and between DHS operational regions; (2)…