Depth in Appointment

Author(s):  
Stephen Skowronek ◽  
John A. Dearborn ◽  
Desmond King

This chapter examines depth in appointment, focusing on the tension between qualifications for administrative office and expectations for presidential control. What Trump’s administration has brought to the fore are the suspicions harbored by a unitary executive toward qualifications per se and in the broadest sense of the term. Ability, sound judgment, commitment to assigned duties are all presumptive conditions on presidential control, implicit limits on political subordination, anticipated brakes on personal will. Conversely, the demand for executive branch unity elevates loyalty above all other qualifications. Here, we offer snapshots of the drive to dissolve administrative qualifications into loyalty to the president at several sites, considering: a hybrid arrangement at the National Security Council; the use of acting appointments at the Office of the Director of National Intelligence, Department of Homeland Security, and the Consumer Financial Protection Bureau; the assault on merit-based appointments for administrative law judges; and protections against at-will removal at independence agencies like the Federal Reserve.

Author(s):  
María Cristina García

In response to the terrorist attacks of 1993 and 2001, the Clinton and Bush administrations restructured the immigration bureaucracy, placed it within the new Department of Homeland Security, and tried to convey to Americans a greater sense of safety. Refugees, especially those from Iraq, Afghanistan, and Syria, suffered the consequences of the new national security state policies, and found it increasingly difficult to find refuge in the United States. In the post-9/11 era, refugee advocates became even more important to the admission of refugees, reminding Americans of their humanitarian obligations, especially to those refugees who came from areas of the world where US foreign policy had played a role in displacing populations.


Subject Deepfake technology. Significance The US Senate on October 24 passed an act that requires the Department of Homeland Security to publish a yearly report on how ‘deepfake’ technology may be used to harm national security. Deepfakes are believable digital videos, audios or photos created using artificial intelligence (AI) to portray a person saying or doing something that the person never said or did, or portraying an event as real that never took place. The level of sophistication of this technology has leapfrogged over the past two years, raising a wide spectrum of concerns. Impacts A market for anti-deepfake verification technologies will emerge. Lawmakers will need to define the lines between art/entertainment and malicious deepfakes. Upcoming elections will be impacted by the existence of this technology.


Author(s):  
Roy Ladner ◽  
Fred Petry ◽  
Frank McCreedy

In this article we provide an overview of e-government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of Web services and service-oriented architectures to aid in information sharing and reduction of IT costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This article provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Roy Ladner

In this chapter we provide an overview of electronic government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of web services and service oriented architectures to aid in information sharing and reduction of Information Technology (IT) costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This chapter provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Shahid M. Shahidullah

This chapter examines the issues and concerns raised in the context of the recent growth of federal mining programs. The chapter argues that in the context of the war on terror, intelligence gathering on terrorist activities both within and outside the United States has emerged as one of the core strategies for homeland security. The major national security related federal agencies such as the Department of Justice, Department of Homeland Security, and the Department of Defense have developed a number of data mining programs to improve terrorism intelligence gathering and analysis in the wake of the events of September 11, 2001. Some data mining programs have, however, raised a number of issues related to privacy protections and civil liberties. These issues have given birth to a wider debate in the nation and raised new tensions about how to search for a balance between the needs for the protection of privacy and civil liberties, and the needs for national security. The authors believe that the future of this debate is intimately connected to the future of the war on terror. Currently, Congress and the federal courts seem to be more in favor of supporting the preeminent needs of protecting national security. Through a number of enactments, Congress has broadened the federal power for collecting terrorism intelligence both at home and abroad. In a number of cases, the federal courts have ruled in favor of the doctrines of the “state secret privilege” and the “inherent power of the President” to emphasize the overriding need for protecting national security in the context of the war on terror. As America has embarked on a long and protracted ideological war against radical militant Islam, issues of national security and the need for data mining for detecting and analyzing terrorist activities are likely to remain dominant for a long time.


Author(s):  
Deserai A. Crow

As with countless other policy areas, natural hazard policy can be viewed as a jurisdictional competition between executive and legislative branches. While policymaking supremacy is delegated to the legislative branch in constitutional democracies, the power over implementation, budgeting, and grant-making that executive agencies enjoy means that the executive branch wields considerable influence over outcomes in natural hazards policymaking. The rules that govern federal implementation of complex legislative policies put the implementing agency at the center of influence over how policy priorities play out in local, county, and state processes before, during, and after disasters hit. Examples abound related to this give-and-take between the legislative and executive functions of government within the hazards and disaster realm, but none more telling than the changes made to US disaster policy after September 11th, which profoundly affected natural hazards policy as well as security policy. The competition and potential for mismatch between legislative and executive priorities has been heightened since the Federal Emergency Management Agency (FEMA) was reorganized under the Department of Homeland Security. While this may appear uniquely American, the primacy of terrorism and other security-related threats not only dwarfs natural hazards issues in the United States, but also globally. Among the most professionalized and powerful natural hazards and disaster agencies prior to 9/11, FEMA has seen its influence diminished and its access to decision-makers reduced. This picture of legislative and executive actors within the natural hazards policy domain who compete for supremacy goes beyond the role of FEMA and post-9/11 policy. Power dynamics associated with budgets, oversight and accountability, and relative power among executive agencies are ongoing issues important to understanding the competition for policy influence as natural hazards policy competes for attention, funding, and power within the broader domain of all-hazards policy.


Author(s):  
A.V. Manoilo

The fight against terrorism in the United States today is one of the priority areas for ensuring national security. Counterterrorism is carried out by US ministries and departments in close coordination and interaction with each other, with the wide involvement of the resources of various public associations and civil society structures. At the same time, the activity of US law enforcement agencies to counter terrorism at the federal level (in the US executive branch) is largely decentralized and is carried out mainly by the forces of five key ministries and departments: the Department of Defense, the Department of Homeland Security, the Department of Justice, the Department of the Treasury and the United States Postal Service; moreover, the US Department of Homeland Security plays the role of a system integrator – an «umbrella structure», which brought together under its leadership various departments and services involved in the fight against terrorism (except for the CIA and the FBI). The American strategy of combating terrorism is based on the principles of inevitability of punishment, «no negotiations and concessions», and pressure on countries that, to one degree or another, «support» terrorism. In general, the system of combating terrorism in the United States is modern and meets the latest realities, challenges and threats in this area. It is constantly being improved and reformed, increasing its effectiveness. At the same time, modern terrorism, responding to new forms and methods of struggle, is constantly evolving, striving to adapt to the new conditions of its existence; the emergence of its new, evolutionarily more advanced, structurally more complex forms requires new organizational and technological solutions from the US counterterrorism system.


Cyber Crime ◽  
2013 ◽  
pp. 936-965
Author(s):  
Shahid M. Shahidullah ◽  
Mokerrom Hossain

This chapter examines the issues and concerns raised in the context of the recent growth of federal mining programs. The chapter argues that in the context of the war on terror, intelligence gathering on terrorist activities both within and outside the United States has emerged as one of the core strategies for homeland security. The major national security related federal agencies such as the Department of Justice, Department of Homeland Security, and the Department of Defense have developed a number of data mining programs to improve terrorism intelligence gathering and analysis in the wake of the events of September 11, 2001. Some data mining programs have, however, raised a number of issues related to privacy protections and civil liberties. These issues have given birth to a wider debate in the nation and raised new tensions about how to search for a balance between the needs for the protection of privacy and civil liberties, and the needs for national security. The authors believe that the future of this debate is intimately connected to the future of the war on terror. Currently, Congress and the federal courts seem to be more in favor of supporting the preeminent needs of protecting national security. Through a number of enactments, Congress has broadened the federal power for collecting terrorism intelligence both at home and abroad. In a number of cases, the federal courts have ruled in favor of the doctrines of the “state secret privilege” and the “inherent power of the President” to emphasize the overriding need for protecting national security in the context of the war on terror. As America has embarked on a long and protracted ideological war against radical militant Islam, issues of national security and the need for data mining for detecting and analyzing terrorist activities are likely to remain dominant for a long time.


Sign in / Sign up

Export Citation Format

Share Document