View my article, International Cooperation in Homeland Security.
Terrorism against the United States, post-9/11, reaches far beyond the U.S. borders. In order to effectively prevent and react to terrorism within the homeland, the U.S. must think of security internationally. International security efforts touch on key issues such as travel security, border control, immigration, intelligence, and financing terrorism. This article examines the U.S. effort at international cooperation in homeland security by examining security and threat assessment in order to analyze current developments and necessary progress moving forward. Further, this article explores comparative efforts at international cooperation in homeland security by examining Canada, Japan, and the E.U. in terms of security and threat assessment. Finally, this article offers recommendations and articulates criteria by which the U.S. can improve vital efforts at international cooperation in homeland security.
To ensure effective counterterrorism, the U.S. must follow a two step process. First, the U.S. must take measures to protect the homeland. Those measure include: promoting travel security by implementing sophisticated technology; promoting border security by securing the Northern border; implementing intelligence sharing between agencies; creating a coordinated plan to promote travel and border security; undergoing training and simulation, and finally; ensuring institutionalized continuity from one Administration to the next.
After taking action to protect the homeland, the U.S. must use these factors as a foundation on which to establish international cooperation. To establish effective international cooperation in homeland security, the U.S. must take measures including the following: forging international partnerships; sharing intelligence related to travel security; creating a coordinated international security plan; running international training and simulation exercises, and finally; implementing international institutionalized continuity.
Cross posted on National Security Advisors.
Similarly posted on Legal Theory Blog.