Learning Resources (see attachments)
Readings
- Course Text: McEntire, D. A. (2019). Introduction to homeland security: Understanding terrorism with emergency management (2nd ed.). New York: Wiley.
- Chapter 8, “Preventing Terrorist Attacks: Root Causes, Law, Intelligence, and Counterterrorism” (pp. 161 -166)
- Article: Carter, D. L. & Carter, J. G. (2009). The intelligence fusion process for state, local, and tribal law enforcement. Criminal Justice and Behavior, 36(12), 13231339.
Retrieved from the Walden Library databases. - Article: Dahl, E. J. (2005). Warning of terror: Explaining the failure of intelligence against terrorism. The Journal of Strategic Studies, 28(1), 31-55.
Retrieved from the Walden Library databases. - Article: Department of Homeland Security. (2009). Homeland security: Progress in implementing 9/11 Commission recommendations. Retrieved from
- Article: Kean, T. H., Hamilton, L. H., Ben-Veniste, R., Fielding, F. F., Gorelick, J.S., Gorton, S. et al. (2005). Final report on 9/11 Commission recommendations. 9/11 Public Discourse Project, 1-5.Retrieved from the Walden Library databases.
- Article: Mahnken, T. (2005). Spies and bureaucrats: Getting intel right. Public Interest, 159, 22-42.
Retrieved from the Walden Library databases. - Article: The Library of Congress. (2002). Legislation related to the attacks of September 11, 2001. Retrieved from
Optional Resources
Application: Predicting and Preventing Terrorist Attacks
U.S. and foreign intelligence organizations have averted a number of terrorist plots, including several directed at the United States. Nevertheless, it is not good enough to foil most terrorist attacks; intelligence organizations are expected to foil all of them. Since the 9/11 terrorist attacks, the United States has reformed its intelligence organizations to make them better able to predict terrorist activity. These reforms include the establishment of the Office of the Director of National Intelligence to coordinate intelligence activities, as well as the National Counter Terrorism Center to develop counterterrorism strategy and planning. Although reforms and new legislative actions can help provide a means to prevent terrorist attacks, the most important component to counterterrorism efforts is having accurate and timely intelligence. There are many challenges inherent to collecting data on terrorists and terrorist organizations. For instance, the extensive amount of data collected can make it difficult to distinguish useful information from irrelevant information. It is important to be aware of and consistently address challenges like this, because they can make predicting and preventing terrorist attacks very difficult.
To prepare for this assignment:
- Review the online article “Strategic Choices, Intelligence Challenges.” Think about challenges intelligence officials encounter.
- Read the article “Spies and Bureaucrats: Getting Intel Right.” Consider the difficulty related to monitoring and understanding intelligence data.
- Review the assigned pages in Chapter 8 of the text Introduction to Homeland Security. Focus on intelligence challenges as well as post-9/11 reforms that have addressed these challenges.
- Review the articles “Homeland Security: Progress in Implementing 9/11 Commission Recommendations,” “Final Report on 9/11 Commission Recommendations,” and “Legislation Related to the Attacks of September 11, 2001.” Reflect on the extent to which post-9/11 reforms have addressed the intelligence challenges related to forecasting and preventing terrorist attacks.
- Think about how the difficulty of gathering intelligence affects the forecasting and prevention of terrorist attacks.
- Consider the extent to which post-9/11 reforms have addressed the intelligence challenges to forecasting and preventing terrorist attacks.
The assignment: (12 pages)
- Explain why it is so difficult to forecast and prevent terrorist attacks. Be sure to include brief descriptions of some of the major challenges.
- Explain the extent to which post-9/11 reforms have addressed the intelligence challenges to forecasting and preventing terrorist attacks. Be specific and use examples to support your explanation.
Support your Application with specific references to all resources used in its preparation. You are asked to provide a reference list only for those resources not included in the Learning Resources for this course.