日本財団 図書館


I. Adhere to Constitutional Principles and the Rule of Law
  There is little, if any, disagreement over the absolute necessity of this first requirement. As the Hart-Rudman Commission put it. "Guaranteeing that homeland security is achieved within a framework of law that protects the civil liberties and privacy of United States citizens is essential. The United States Government must improve national security without compromising established constitutional principles."[7] Security measures, if carried too far, pose risks that may equal or even exceed those of terrorists and ill-intentioned foreign governments. Extreme restrictions on personal liberties would instill resentments against government and ultimately weaken the government's ability to protect the populace, In fact, such overreactions have sometimes been the result desired by terrorists. Similarly, badly designed border controls could endanger international trade and the American economy.
 
 There is one specific topic that must be addressed before moving on: posse comitatus. Some have suggested, erroneously, that the posse comitatus doctrine and law[8] preclude the use of military forces and personnel to perform homeland security functions. To the contrary, the posse comitatus doctrine has always allowed the use of military forces to support domestic law enforcement. However, that use has always been subject to constraints, including civilian control of the military. Further, there is the very significant question of whether such use is in the best interests of the nation. Too active or too aggressive a military role carries with it the risk that resentments against the military and/or government will result. More likely, and therefore of even greater concern, is that the use of combat forces to perform domestic security functions will degrade their ability to fight and win any future war.
 
II. Use all Four Levers of Power Appropriately
 A truly comprehensive homeland security program would include actions ranging from nuclear counterproliferation efforts overseas to consequence management operations here in the event of a successful attack. Given the range of actions required and the need to work both at home and in foreign venues, it will be necessary to use all four levers of power, Further, with many responsibilities being fulfilled by state and/or local authorities and with many potential targets being owned by the private sector, a truly national program will necessarily extend well beyond the federal government. Figure 3 depicts the full scope of organizational involvement while showing the split between military roles (homeland defense against military threats and military support to civil authorities) and civil functions at the federal, state, and local government levels and among private-sector owners or operators of critical infrastructure.
 
 
III. Employ Risk-Management Concepts in Developing Action Plans
 Risk is a function of probability and consequence. Effectively managing risk requires actions to address both these determinants of risk. Prevention is aimed at reducing the probability of an adverse event's occurring; consequence management and response capabilities must be available should prevention prove inadequate. Neither prevention nor consequence management is sufficient by itself. A comprehensive national strategy to meet the homeland security challenge requires both.
 
 Table 1 presents a broad spectrum of potential prevention measures and consequence management and response capabilities that could be applied to the homeland security problem. As shown, prevention starts with "over there" diplomatic and military measures and extends into "execution disruption" measures here at home. Consequence management and response pick up with "execution disruption" (such as hostage rescue) and run through the full range of recovery and reconstitution measures that would be required following a terrorist attack. Finding the right mix of prevention measures and consequence management and crisis response capabilities is the key to successfully meeting the homeland security challenge.
 
Table 1. Prevention and Consequence Management Concepts Applied to Homeland Security
 
 Prevention Measures (probability reduction and breaking "event chains" prior to reaching the crisis stage):
 
a. Antiproliferation and counterproliferation programs
b. Intelligence (traditional military and nontraditional economic intelligence)
c. Deterrence (through credible threat of massive retaliation)
d. Active self-protection and vulnerability reduction (antiterrorist measures)
e. Preemptive actions (including military and other counterterrorist measures)
f. Critical infrastructure protection and redundancy
g. In-transit interception, including national missile defense
h. Execution disruption (overlaps crisis response)
 
 Consequence Management and Crisis Response Capabilities (breaking end-stage "event chains" prior to full completion and mitigation of adverse impacts)
 
a. Execution disruption and crisis response (overlaps prevention)
b. Strong federal, state, and local incident command system in place
c. Robust emergency medical system capabilities
d. Hazardous material (chemical/biological/radiological) response
e. Large-scale disaster response
f. Military support to civil authorities
g. Reconstitution capabilities for essential services (food, energy, etc.)
h. Economic recovery programs
i. Investigation and follow-on actions (prosecution, military response, etc.)
 
IV. Select and Implement Best-Value Homeland Security Measures
 The risk-management approach described here provides the right conceptual framework for developing the comprehensive capability called for by Hart-Rudman and others. However, significant analysis and program development work would be required before this conceptual approach could be turned into concrete measures ready for implementation. The first step would be to develop detailed threat assessments addressing known and potential capabilities of our adversaries, our own vulnerabilities, and the logistics requirements and likely critical paths in executing attacks of various types. Understanding these aspects of threat in detail will allow us to target the weakest links to break event chains before harm comes to the nation. From this we can select specific prevention measures, based on probability of success rather than self-serving bureaucratic agendas, and determine the resources required for execution. Another essential analytic task would be to describe, in detail, the likely consequences of various forms of attack should they occur. This will allow us to determine the capabilities needed to conduct consequence management operations. Rigorous analysis of the sort described would allow us to identify the capabilities, operational competencies, and resources, including those not yet in existence, required for successful execution across the prevention and consequence management and response spectrum.
 
 Having identified what needs to be done, the next step would be to determine which agencies and levels of government are most appropriate to carry out specific functions. The key to ensuring that we get the best value for our money, always an essential requirement for good government, is to build on existing agency legal authorities, missions. capabilities, and competencies to the maximum extent possible. Where new legal authorities and/or operational capability is required, give them to the agencies best suited to the task by virtue of their existing tasking, and avoid duplication wherever feasible.
 
 Finally, identified agencies must be given clear homeland security tasking, together with unambiguous direction on their new priorities and adequate resources for tasks assigned. There are those, including the Hart-Rudman Commission, who also believe that restructuring is a prerequisite to effecting the necessary cross-functional coordination and to changing priorities at agencies that have historically paid little attention to existing or potential homeland security responsibilities. The counter to that argument is simple: agencies respond to the policies and priorities of the administration and Congress, as reflected in appropriated budgets. If agencies have not given sufficient priority to homeland security issues in the past, it is because they have not been tasked or funded to do so. In the past, such attention wasn't needed to the degree that it is now. A more moderate approach would be to acknowledge the necessity of clear tasking and adequate resources while admitting that restructuring may be required for more effective cross-functional coordination and to clearly indicate that priorities have shifted dramatically. In short, restructuring may be needed, but clear tasking, well-defined priorities, and adequate resources are absolutely essential.
 
A Case Study in Practicality
 
 Building on existing law enforcement authority and blending in proven risk-management practices and a range of traditional and nontraditional national security and economic information, the Maritime Domain Awareness concept developed by the Coast Guard serves as an excellent example of commonsense application of the principles discussed above. Maritime Domain Awareness involves fusing ship, cargo, passenger, and crew databases from multiple sources to give the various security and enforcement agencies a far more complete advance picture of who and what is coming their way. Compared to the incomplete information available within agency stovepipes today, this cross-agency integration and correlation of data elements will yield a quantum-step improvement in government's ability to protect the homeland from threats arriving by sea.
 
 As noted previously, international trade is both a source of animosity in some quarters and a means of access to our shores. Well over 95 percent of our foreign trade that is not under the North American Free Trade Agreement is carried by ship, which illustrates that America is connected to the global economy, not primarily by aviation and the Internet, but by maritime commerce. [9] Every year, thousands of foreign ships, carrying multinational crews and cargoes from around the globe, enter U.S. ports. Unfortunately, in a time when access to WMD may be growing, the resources and methods available to our border control agencies are not adequate to protect the homeland from the myriad threats that could arrive by sea. As a result, asymmetrical "military" and terrorist threats have a natural gateway to America's shores via the marine transportation system. Given the importance of international goods and materials to the U.S. economy, closing our borders is out of the question. Further, with our growing reliance on just-in-time deliveries of foreign goods, even slowing the flow long enough for more complete random inspections may be economically intolerable. The challenge facing the Coast Guard, the Customs Service, and the other border control agencies is to develop ways to better protect the nation without sacrificing economic vitality in the process and without breaking the federal budget. [10]
 
 Information is the key. Databases from agencies and services, each with a partial view, must be fused so that the total picture emerges and effective intelligence is produced. With sufficient advance information about inbound ships, cargoes, and crews, the border control agencies will have a significantly enhanced ability to separate the good from the bad. Thus armed, they will be better able to intercept the bad before it becomes a problem for the country. This idea―exploiting available information to separate the good from the bad, and to then stop the bad―is at the heart of Maritime Domain Awareness. The potential of this idea is so powerful that it has received National Security Council support, and a multiagency Memorandum of Agreement aimed at Maritime Domain Awareness implementation has been executed.
 
 Much of the information required for Maritime Domain Awareness must already be submitted to various agencies, although not always in a timely manner to satisfy homeland security intelligence requirements. While earlier submissions may incur a cost, that cost should be minor. To carry the concept a step further, a properly conceived system could be designed so that it actually expedites properly documented cargoes originating in countries whose customs and security authorities have entered reciprocal arrangements with the United States, thus facilitating legitimate commerce rather than impeding it.
 
The Evidence Is In
 
 America is entering a new era filled with dangers we have either never faced or have not seriously confronted for a long time. Clear are the calls for action to deal with these emerging threats. Less clear has been what to do in response to these calls to action.
 
 Dr. Kevin O'Prey, a defense analyst with Defense Forecasts International, has observed that the homeland security issue is extremely difficult to deal with due to its inherent nature. He describes the homeland security threat as involving low-probability, high-consequence events that are impossible to absolutely prevent and impossible to politically ignore. Further, while acknowledging that specific threat scenarios may involve individually low probabilities, Dr. O'Prey quotes former Secretary of Defense William Cohen that "the question is 'When?'- not 'If?'"[11]
 
 This perspective reveals parallels between homeland security and commercial aviation that lend support to the principles and basic approach outlined earlier. The traveling public knows that dangers do exist in flying, but the benefits of flying are too strong to resist. The public's response to the risks inherent in flying has been the demand for rigorous safety programs (prevention) coupled with emergency preparedness and effective accident investigation (response) and availability of insurance (consequence management). The benefits of America's political, military, and economic place in the world are, like those of commercial air travel, too attractive to forgo. However, unlike with aviation, our recognition of the threats facing us is so new that we have yet to develop a comprehensive national suite of prevention programs and consequence management and response capabilities to deal with the homeland security problem.
 
 Certainly, many good ideas have been put forward outlining how this nation could deal with specific aspects of the overall problem. What has been lacking has been a more encompassing, holistic view of the homeland security issue and a set of principles and a methodology to guide our future actions. While much remains to be done, we have attempted to provide a framework with which the United States can build the comprehensive national response the nation needs.
 
 While adhering to constitutional principles and the rule of law, the President and Congress can use risk-management concepts to select, from among the many options available, those measures and capabilities that provide the best value in safety and security. The key is to understand the true nature of the threats and use all four national security levers of power appropriately. The American people deserve no less.
 
Click on an endote number to return to the article.
 
[1] Richard A. Falkenrath, Robert D. Newman, and Bradley A. Thayer, America's Achilles' Heel (Cambridge, MA: MIT press, 1999), p. 213.
 
[2] Michael E. O'Hanlon, "Beyond Missile Defense: Countering Terrorism and Weapons of Mass Destruction." Policy Brief #86. Brookings Institution, August 2001.
 
[3] Roadmap for National Security: Imperative for Change, U.S Commission on National Security/21st Century Phase III Report, 15 February 2001, pp. 2, 10.
 
[4] Ibid., p. 10.
 
[5] Ibid., p. 11, Recommendation 1.
 
[6] New World Coming: American Security in the 21st Century, U.S. Commission on National Security/21st Century Phase I Report, "Supporting Research and Analysis," 15 September 1999, p. 130.
 
[7] "Roadmap for National Security," Phase III Report, "Addendum on Implementation," 15 April 2001, p 3-B.
 
[8] The posse comitatus law (18 USC 1385), adopted in response to Reconstruction-era abuses, precludes the use of military forces for general law enforcement. The law applies only to the Army and the Air Force. The posse comitatus doctrine has been extended to the Navy and Marine Corps by Defense Department policy. The Coast Guard, while a branch of the armed forces of the United States at all times (14 USC 1 and 10 USC 101(a)(4)), has specifically been granted broad federal maritime law enforcement authority by statute (14 USC 2 and 89). The Coast Guard is unique in being both a military service and a civil authority/law enforcement agency. For additional commentary on the status of the posse comitatus doctrine, see "The Myth of Posse Comitatus," by Major Craig T. Trebilcock, U.S. Army Reserve, Journal of Homeland Security, 27 October 2000.
 
[9] "An Assessment of the Marine Transportation System: A Report to Congress," U.S. Department of Transportation, September 1999, p. 2
 
[10] Stephen E. Flynn. "Beyond Border Control," Foreign Affairs, Nov.-Dec. 2000, and Stephen E. Flynn, "A Transportation Security Agenda for the 21st Century," Transportation Research News, Nov.-Dec. 2000, No. 211, pp. 3-7.
 
[11] Kevin P. O'Prey, Executive Vice President, Defense Forecasts International, comments at the Quadrennial Defense Review 2001 seminar, National Defense University, 9 November 2000.
 
Suggested Reading
 
 Thomas L. Friedman, The Lexis and the Olive Tree (Vintage Anchor Publishing, 2000).
 
 Reports of the Hart-Rudman Commission (the Commission on National Security/21st Century)
 
 Report of the Seaport Crime and Security Commission (sometimes referred to as the Graham commission). This report describes the security vulnerabilities arising from the United States' relatively ineffective port security and control measures for contraband entering via otherwise legitimate international marine commerce.
 
 Reports of the Gilmore Commission (the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving WMD). The commission's reports describe the United States' current low state of preparedness to deal with a range of mass-consequence events such as a nuclear attack or the release of a lethal contagious disease such as anthrax or smallpox. The Gilmore Commission appears to be moving beyond mere "response" and toward a more comprehensive view of prevention.
 
 The Center for Strategic and International Studies has produced reports dealing with homeland defense (a subset of homeland security) and with preparedness for attacks with biological weapons).
 
 The Cato Institute has prepared a limited number of reports dealing with homeland security. Cato Policy Analysis No. 306, "Protecting the Homeland: The Best Defense Is to Give No Offense," is recommended only for its description of the potential threats.
 
 At the Council on Foreign Relations, Dr. Steve Flynn, an active-duty Coast Guard officer. is working on a project to examine "Border Control in an Era of Global Economic Integration." He has also published two shorter articles on his work: "Beyond Border Control" (Foreign Affairs, Nov.-Dec. 2000) and "A Transportation Security Strategy for the 21st Century" (Transportation Research News, Nov.-Dec, 2000). Additional information can be obtained through the ANSER Institute for Homeland Security.







日本財団図書館は、日本財団が運営しています。

  • 日本財団 THE NIPPON FOUNDATION