Skip to main content

Redefining Homeland Security

  • Conference paper
  • First Online:
Critical Infrastructure Protection XVII (ICCIP 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 686))

Included in the following conference series:

  • 77 Accesses

Abstract

Definitions are important, especially in the U.S. federal government. They are the basis of laws that justify budgets, fund programs and determine capabilities. However, definitions are notoriously difficult to cast because they must contend with exceptions and changing circumstances. This is the case with the U.S. definition of homeland security.

Despite its importance, the definition of homeland security has languished for years. The definition posted on the U.S. Department of Homeland Security website is a throwback to the original 2002 definition and apparently ignores the lessons of history that demonstrate it is deficient. In 2007, the U.S. Congress passed a law mandating a Quadrennial Homeland Security Review to prevent future lapses in homeland security. However, the definition that emerged from the first review in 2010 persists. Although it improves on the original 2002 definition, it does not adequately consider new and resurgent threats that face the nation.

This chapter examines various definitions of homeland security, discusses why they are inadequate and proposes a new definition that is accurate and concise. A good definition is important to help shape the U.S. Department of Homeland Security mission, set priorities, justify budgets and ensure that programs are successful.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Advanced Law Enforcement Rapid Response Training Center and Federal Bureau of Investigation, Active Shooter Incidents in the United States in 2016 and 2017, Texas State University, San Marcos, Texas and Washington, DC (2018). www.fbi.gov/file-repository/active-shooter-incidents-us-2016-2017.pdf

  2. Barnes, J.: Pentagon computer networks attacked, Los Angeles Times (2008)

    Google Scholar 

  3. Bowen, A.: Ukrainian Military Performance and Outlook, CRS In Focus IF12150. Congressional Research Service, Washington, DC (2022)

    Google Scholar 

  4. Bram, J., Orr, J., Rapaport, C.: Measuring the effects of the September 11 attack on New York City. Econ. Policy Rev. 8(2), 5–20 (2002)

    Google Scholar 

  5. Bush, G.: The Department of Homeland Security. The White House, Washington, DC (2002)

    Google Scholar 

  6. DHS Press Office, Statement by Secretary Johnson on the Orlando, Florida attack, Press Release, U.S. Department of Homeland Security, Washington, DC (2016)

    Google Scholar 

  7. Electricity Information Sharing and Analysis Center (E-ISAC), TLP: White - Analysis of the Cyber Attack on the Ukrainian Power Grid, Defense Use Case, Washington, DC (2016)

    Google Scholar 

  8. Homeland Security Council: National Strategy for Homeland Security. The White House, Washington, DC (2007)

    Google Scholar 

  9. Homeland Security National Preparedness Task Force, Civil Defense and Homeland Security: A Short History of National Preparedness Efforts, U.S. Department of Homeland Security, Washington, DC (2006)

    Google Scholar 

  10. Kerr, P., Rollins, J., Theohary, C.: The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, CRS Report R41524. Congressional Research Service, Washington, DC (2010)

    Google Scholar 

  11. McGuinness, D.: How a cyber attack transformed Estonia, BBC News (2017)

    Google Scholar 

  12. National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report, Washington, DC (2004)

    Google Scholar 

  13. Neifert, A.: Case Study: Sarin Poisoning of Subway Passengers in Tokyo, Japan in March 1995. Camber Corporation, Huntsville, Alabama (1999)

    Google Scholar 

  14. Office of the Press Secretary, DHS statement on Las Vegas shooting, Press Release, U.S. Department of Homeland Security, Washington, DC (2017)

    Google Scholar 

  15. President’s Commission on Critical Infrastructure Protection: Critical Foundations: Protecting America’s Infrastructures. The White House, Washington, DC (1997)

    Google Scholar 

  16. Saturno, J., Heniff, B., Lynch, M.: The Congressional Appropriations Process: An Introduction, CRS Report R42388. Congressional Research Service, Washington, DC (2016)

    Google Scholar 

  17. Tatum, S.: U.S. accuses Russia of cyber attacks on power grid, CNN (2018)

    Google Scholar 

  18. The White House, PDD-39 - U.S. Policy on Counterterrorism, Washington, DC (1995)

    Google Scholar 

  19. The White House, National Strategy for Homeland Security, Washington, DC (2002)

    Google Scholar 

  20. The White House, The Federal Response to Hurricane Katrina - Lessons Learned, Washington, DC (2006)

    Google Scholar 

  21. U.S. Congress, Public Law 112–265, Investigative Assistance for Violent Crimes Act of 2012, 112th Congress, Washington, DC (2012)

    Google Scholar 

  22. U.S. Department of Homeland Security, Quadrennial Homeland Security Review Report: A Strategic Framework for a Secure Homeland, Washington, DC (2010)

    Google Scholar 

  23. U.S. Department of Homeland Security, DHS Lexicon, Washington, DC (2023). www.dhs.gov/publication/dhs-lexicon

  24. U.S. Department of Homeland Security, Mission, Washington, DC (2023). www.dhs.gov/mission

  25. White, R., Bynum, T., Supinski, S. (eds.) Homeland Security: Safeguarding the U.S. from Domestic Catastrophic Destruction, CW Productions, Colorado Springs, Colorado (2016)

    Google Scholar 

  26. Zeller, M.: Myth or reality - Does the Aurora vulnerability pose a risk to my generator? In: Proceedings of the Sixty-Fourth Annual Conference for Protective Relay Engineers, pp. 130–136 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard White .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

White, R. (2024). Redefining Homeland Security. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XVII. ICCIP 2023. IFIP Advances in Information and Communication Technology, vol 686. Springer, Cham. https://doi.org/10.1007/978-3-031-49585-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49585-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49584-7

  • Online ISBN: 978-3-031-49585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics