Abstract
Homeland security is a recognized practice, profession and field without a unifying theory to guide its study and application. The one previous attempt by Bellavita [2] acknowledges its own shortcomings and may be considered incomplete at best. The failure may be attributed to the lack of an underlying correlating factor. This chapter demonstrates that “domestic catastrophic destruction” is the correlating factor that unites key historical homeland security incidents and this observation is leveraged to propose a theory of homeland security that is descriptive, prescriptive and predictive. The proposed theory is descriptive because it can differentiate between what is and what is not homeland security. The theory is prescriptive because it can suggest an optimum homeland security strategy. It is predictive because it renders homeland security into a technical problem and demonstrates how its effects may eventually be blunted through the technological evolution and revolution of the critical infrastructure. Accordingly, the proposed theory embodies a set of foundational principles to guide the study and application of the practice, profession and field of homeland security.
Chapter PDF
Similar content being viewed by others
References
9/11 Commission, The 9/11 Commission Report, Washington, DC, 2004.
C. Bellavita, Waiting for homeland security theory, Homeland Security Affairs, vol. 8, article 16, 2012.
Bremer Commission, Report of the National Commission on Terrorism, Washington, DC, 2000.
Center for the Study of the Presidency and Congress, Securing the U.S. Electrical Grid, Washington, DC (www.thepresidency.org/sites/default/files/Final%20Grid%20Report_0.pdf), 2014.
Counterproliferation Program Review Committee, Report on Activities and Programs for Countering Proliferation and NBC Terrorism, Volume I: Executive Summary, Washington, DC, 2011.
Gilmore Commission, First Annual Report to The President and The Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, I. Assessing the Threat, Washington, DC, 1999.
Gilmore Commission, Second Annual Report to The President and The Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, II. Towards a National Strategy for Combating Terrorism, Washington, DC, 2000.
A. Neifert, Case Study: Sarin Poisoning of Subway Passengers in Tokyo, Japan in March 1995, Camber Corporation, Huntsville, Alabama, 1999.
North American Electric Reliability Corporation and U.S. Department of Energy, High-Impact, Low-Frequency Event Risk to the North American Bulk Power System, Washington, DC, 2010.
Office of Homeland Security, National Strategy for Homeland Security, Washington, DC, 2002.
P. Polityuk, O. Vukmanovic and S. Jewkes, Ukraine’s power outage was a cyber attack: Ukrenergo, Reuters, January 18, 2017.
President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructures, Washington, DC, 1997.
Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina, A Failure of Initiative: Final Report of the Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina, 109th Congress, 2nd Session, U.S. House of Representatives, Washington, DC, 2006.
United States Commission on National Security/21st Century, New World Coming: American Security in the 21st Century, Washington, DC, 1999.
United States Commission on National Security/21st Century, Seeking a National Strategy: A Concert for Preserving Security and Promoting Freedom, Washington, DC, 2000.
United States Commission on National Security/21st Century, Road Map for National Security: Imperative for Change, Washington, DC, 2001.
U.S. Congress, HR 1158 - National Homeland Security Agency Act, 107th Congress, Washington, DC, 2001.
U.S. Congress, Implementing Recommendations of the 9/11 Commission Act of 2007, Public Law 110–53 - August 3, 2007, Washington, DC, 2007.
U.S. Department of Homeland Security, The 2014 Quadrennial Homeland Security Review, Washington, DC, 2014.
U.S. Government, 18 U.S. Code §2331 - Definitions, Washington, DC (www.law.cornell.edu/uscode/text/18/2331), 1992.
R. White, T. Bynum and S. Supinski (Eds.), Homeland Security: Safeguarding the U.S. from Domestic Catastrophic Destruction, CW Productions, Colorado Springs, Colorado, 2016.
Wikipedia Contributors, 1900 Galveston Hurricane, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=1900Galvestonhurricane&oldid=817635245), 2017.
Wikipedia Contributors, 2017 Las Vegas Shooting, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=2017LasVegasshooting&oldid=817903631), 2017.
Wikipedia Contributors, Battle of Antietam, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=BattleofAntietam&oldid=816312607), 2017.
Wikipedia Contributors, Bhopal Disaster, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=Bhopaldisaster&oldid=786710332), 2017.
Wikipedia Contributors, Oklahoma City Bombing, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=OklahomaCitybombing&oldid=785180008), 2017.
Wikipedia Contributors, Phreaking, Wikipedia, The Free Encyclopedia (en.wikipedia.org/w/index.php?title=Phreaking&oldid=816928925), 2017.
C. Williams, Prospects for macroterrorism, presented at the Pugwash Conference on Science and World Affairs, paper no. 25, 2002.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 IFIP International Federation for Information Processing
About this paper
Cite this paper
White, R. (2018). A Theory of Homeland Security. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XII. ICCIP 2018. IFIP Advances in Information and Communication Technology, vol 542. Springer, Cham. https://doi.org/10.1007/978-3-030-04537-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-04537-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04536-4
Online ISBN: 978-3-030-04537-1
eBook Packages: Computer ScienceComputer Science (R0)