Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.cengage.com/cj/white Jonathan R. White Rosemary Arway Hodges University Chapter 15: Law Enforcement Bureaucracy and Homeland Security.

Similar presentations


Presentation on theme: "Www.cengage.com/cj/white Jonathan R. White Rosemary Arway Hodges University Chapter 15: Law Enforcement Bureaucracy and Homeland Security."— Presentation transcript:

1 Jonathan R. White Rosemary Arway Hodges University Chapter 15: Law Enforcement Bureaucracy and Homeland Security

2 The Bureaucracy Challenge  Currently, a variety of Senate and House committees are responsible for different aspects of security in the U.S. oFederal, state, local, tribal agencies and private corporations  Max Weber oCoined the term of bureaucracy to describe professional, rational organizations designed to serve a purpose.  Bureaucracy and Preventing Terrorism  There is a controversy concerning homeland security bureaucracy oEfficiency of consolidating power oEfficiency of decentralized services

3 Intelligence and Bureaucracy  FBI is a leading agency for counterterrorism.  Important services are shared with Border Patrol, Secret Service and CIA.  Under the intelligence reform law of 2004 all intelligence coordination must take place in the National Counterterrorism Center (NCTC).

4 State, Local, and Tribal Law Enforcement Bureaucracies  There are more than 800,000 state, local, and tribal law enforcement agencies in the U.S.A.  Law enforcement executives must support task orientated methods in counterterrorism. oTask orientation focuses the actions of individuals and departments.  Additionally, commitment to threat analysis and identification of pre-incident indicators have to be taken into consideration.

5 Border Protection  Borders of the U.S. are vulnerable in several areas: oLong stretches of unprotected areas along the northern and southern borders are wide open for infiltration. oOver 300 seaports must be secured. oAir travel and entry points require security. oNoncitizens within U.S. borders to be accounted for.  The DHS must coordinate the activities of different agencies responsible for border protection. oCustom Service oImmigration and Customs Enforcement oCoast Guard

6 Policy Disputes  The 9-11 Commission Report addressed border security, recommending reforms.  More than 500M people cross U.S. borders every year; 330M are foreigners.  The system is unable to provide security or monitor foreigners in the U.S.  An agency as broad as DHS will face criticism from various outside and inside groups with conflicting demands.  DHS issues: oDeployment of personnel oPolicies concerning international travelers oResponsibility of local agencies

7 Immigration Debate  Boarder Security involves issues of: oTightening entry of illegal immigrants oTighter controls on immigration from countries that may harbor hostility toward the United States  Diminyatz notes four major threats related to protection of the southern border: oTerrorism and weapon of mass destruction oDrug trafficking oHuman smuggling oInfectious diseases

8 Immigration Debate  Buchanan oUnregulated flow of immigrants from the southern border opens the door to terrorist infiltration and to destruction of American culture.  To correct the situation, U.S. military forces should be deployed along the border until civilian law enforcement can be consolidated and effective barriers can be established.  The federal government needs to form partnership with local law enforcement. oThere is a danger this would impede effective local law enforcement which requires contacts within illegal immigrant communities.

9 Infrastructure Protection  Clarke – There are a number of threats facing the nation’s infrastructure. oInformation systems ▪Most computer systems are vulnerable to viruses. oInternet and computer networks that support transportation and economic systems are also vulnerable to attack. ▪Shut down electrical grids and computers – shut down transportation and communication oEnergy ▪The nation’s power system and technological organizations that support it are vulnerable to disruptions.

10 Private vs. Governmental Partnership  Private industries (i.e., General Motors, Wal-Mart) have excellent information gathering and security systems. oInformation used for competition and profit  Private industries often share information with the government for the public good. oOne-way flow of information  Police forces need to be linked with security forces charged with infrastructure protection.  Cybersecurity also requires expertise beyond the scope of most law enforcement agencies.

11 Infrastructure Protection  All levels of law enforcement are faced with the problems of technical specialists and access to privately owned portions of the infrastructure.  Links with the public and private organizations are necessary.  Linkages should be developed in two crucial areas: oPolice should be linked to the security forces already associated with infrastructure functions. oState and local law enforcement agencies must establish formal and informal networks with the organizations in their jurisdictions.

12 Thinking Internationally  Terrorism is an abstract concept fluctuating according to political circumstances.  Security forces require people with critical thinking skills. oAbstract reasoning skills oKnowledge of international politics and history ▪Specialized expertise in particular regions  Law enforcement agencies in the U.S. generally do not have skilled specialists. oPresents problems as DHS tries to create information networks.

13 Rivalries  Federal agencies, at times, act more like rivals than partners. o9-11 Commission noted this in its report.  Federal agencies’ failure to cooperate with each other can influence local police relationships.  Many police executives in the U.S. are not convinced the FBI is in partnership with efforts to stop terrorism.  If law enforcement in the U.S. is to become part of homeland defense, the relationship between the FBI and local law enforcement must improve.

14 Local Control and Revenue Sources  Civil libertarians believe consolidated police power will erode civil rights.  Local government officials worry their agendas will be lost in the federal maze.  Costs of homeland security responsibilities adds a level of frustration to local governments. oSome jurisdictions want homeland security money distributed evenly. oLarger jurisdictions argue that money should be distributed according to likelihood of attack. oOthers are concerned that homeland security grants are given to local governments for bizarre reasons. ▪$36,000 to the state of Kentucky to keep terrorists from infiltrating bingo halls.

15 Border Security: Critique and Reform  Bureaucracies in the U.S. are squandering the opportunity to defend it.  Flynn – U.S. has made two crucial mistakes: oHomeland security separated from national security. oUnder-qualified personnel that cannot maintain national security.  U.S. has not organized its resources for defense.  Prepared to fight overseas while neglecting to protect the home front.

16 Border Security: Critique and Reform  Flynn – According to the CIA, weapons of mass destruction would most likely be smuggled into the U.S. by sea. oDifficult to inspect all of the cargo containers in seaports. oOceans represent an opportunity for terrorists.  Bush administration has done very little to protect the nation’s seaports. oU.S., in 2004, spent more money every three days to fight the war in Iraq than it has in three years of protecting seaports.

17 Border Security: Critique and Reform  Nation’s critical infrastructure remains open to attack. oDepartment of Defense, in 2005, was allotted $7.6 billion to enhance the fortifications of its bases.  In the same budget, the infrastructure for the entire nation received $2.6 billion. oDirty bombs and chemical threats can be developed from hazardous material.  Over the past three years funds to secure the disposal of such material have been drastically reduced.

18 Border Security: Critique and Reform  While enhanced border security is necessary, this alone will not protect the U.S. against a terrorist attack.  Jihadists are fully aware of vulnerabilities in the infrastructure.  Safest and most effect way to hit the U.S. is to hit the infrastructure. oJihadists understand the economic effect of their actions.

19 Border Security: Critique and Reform  Flynn – Development of an integrated system against terrorism would reduce the drug trade, contraband smuggling, and theft.  Law enforcement agencies should look for weaknesses in the system, probe them, and make changes based on the results.  Not every attack can be prevented; however, most terrorism can be deterred through cooperative partnership.

20 Successful Law Enforcement  New approaches to the law enforcement mission: oPolice must be prepared to look beyond the arrest situations to communicate intelligence beyond local jurisdiction. oLocal police can expand their skills in detecting and reporting deceptive behavior. oHomeland Security must develop emergency response plans that would define roles and responsibilities to be put into place after an incident. oJoint terrorism Task Forces ▪System that separates criminal and national security intelligence.

21 JTTF System  The JTTF system may serve as an example for the first step in law enforcement cooperation.  Regional units designed to combat terrorism combine oLocal police officers oState police officers oVarious federal police officers oProsecutors oCorrectional officers

22 JTTF System  Local and state officers are given federal authority; these officers’ presence give federal agents the ability to act in local jurisdictions.  Local police are in a perfect position to engage in intelligence gathering activities. oFrance oGermany oCanadians and British


Download ppt "Www.cengage.com/cj/white Jonathan R. White Rosemary Arway Hodges University Chapter 15: Law Enforcement Bureaucracy and Homeland Security."

Similar presentations


Ads by Google