Homeland Security Essay

Total Length: 2043 words ( 7 double-spaced pages)

Total Sources: 3

Page 1 of 7

Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action." The hypothesis that is presented at the outset of the article is that even though Congressional leaders have attempted to "redefine military preparatory operations as intelligence activities," those efforts are "legally and historically unsupportable" (Wall, 2011, p. 85). Moreover, the author expresses in the Abstract that Congress should "revise its antiquated oversight structure" to more accurately reflect the military's "integrated and interconnected world" (Wall, 85). Wall, who served as legal consultant for the U.S. Special Operations Command Central between 2007 and 2009, certainly has the experience and the insider's knowledge of this issue, and it comes through in his narrative. This is a unique study and the author's thesis and concerns are spelled out thoroughly.

The author begins the piece noting that Navy SEALS killed Osama bin Laden in May, of 2011, which is public knowledge and in fact brought a sense of closure to many Americans, including those that lost loved ones in the terrorist attacks of September, 2001. But when the U.S. government made the announcement (well after President Obama had gone on television that Sunday night in May), it was the head of the CIA, Leon Panetta making the statement that the raid on bin Laden's hideout was a "covert Title 50" operation. Panetta noted that the chain of command in this instance put him in the position of the president's representative but the man who was actually in charge of the operation was Vice Admiral William McCraven, the head of the Joint Special Operations Command (Wall, 86).

In other words, even though Obama was given a lot of credit for authorizing the operation (he had a choice of just blowing the bin laden compound up with a drone missile but he went with the Navy SEALS) the man in charge of killing bin Laden was McCraven. So what is the problem in that regard? Wall is concerned that the "long-simmering debate" that has been going on within the national security community has been re-kindled in this instance. The issue is over "Title 10" vs. "Title 50" and the authorities that deal with those two titles. Panetta invoked "Title 50" but Wall wants to know why Panetta did so. Both of the titles are part of the U.S. Code but Wall's point is that the Panetta statement simply brings up the congressional oversight flaws that the author mentioned earlier.

["…The bin Laden operation could have been carried out under Title 10 or Title 50, and the mere involvement of the military does not exclude it from the realm of Title 50" (Smart, 2011).]

There has been ongoing confusion over the two titles, Wall explains (87). "Title 10" has traditionally referred to the Department of Defense (DOD) operations (above board, transparent operations) while "Title 50" has alluded to intelligence agencies. The rub for Wall is that when a leader states that an operation is "Title 50" the image of a "dark and shadowy world" comes to mind. Those who advocate "transparency" for the American military prefer to have soldiers' reputations "untarnished by association with the shadowy world of espionage" (Wall, 88). That word "untarnished" is used by Wall because he worries that clandestine operations ("Title 50") could be seen as in violation of the Geneva Conventions (e.g., treating prisoners as spies rather than the POWs). Also, military personnel serving overseas could conceivably lose the "moral high ground" when they are branded with "Title 50" (Wall, 89).

Another policy problem Wall mentions refers to "rice bowls" (military jargon for "programs, resources and responsibilities"); bureaucrats "jealously guard" their rice bowls because that keeps their options open in matters of policy such as CIA policies. Wall suggests that the CIA's rice bowl is Title 50, which makes the CIA the lead agency for covert action on the one hand. On the other hand, the military is stealing from the CIA's rice bowl because the military (think the Navy SEALS) is more and more "expanding its human intelligence capabilities under the guise of Title 10 authorities" (Wall, 90).

Wall makes very clear that the more the military expands its use of intelligence the more the CIA's role is diminished. According to Wall, it's not just a matter that the CIA will be giving up authority in matters of covert operations, but it is also possible that military operatives could be "unintentionally impeding or even exposing each other's human intelligence efforts" (91). What worries Wall and others is the obvious fact that when two American organizations are both conducting intelligence-gathering activities, there can be conflicting assignment and misunderstandings as to who is really in charge (91). In this respect, Wall is most concerned about (and his professional career places him in an insider's position to know) the Congressional obsession over who does any particular mission -- the military or the intelligence agencies.


How well does the author explain his research and do his findings back up his thesis and his goals? Wall is extremely thorough in his narrative, and if anything, he reviews certain particulars vis-a-vis Title 10 vs. Title 50 differences and dynamics with redundancy. Wall carefully explains the role of the President of the United States vs. The role of Congress when it comes to using the military and waging war. He also summarizes the debate over war powers (the clash between Congressional authority and presidential authority found within various interpretations of the U.S. Constitution). On pages 99-100 Wall breaks down the roles of each title and shows the reader -- by putting a narrative microscope on the precise language that authorizes various kinds of intelligence and military policies and actions -- the bigger picture.

To wit, if the Department of Defense is supposed to be operating under the guidelines of Title 10, then is seems a possible overlapping of security responsibilities (and a potential conflict of authority) to also give the DOD responsibilities under Title 50. That is exactly Wall's point. He does a good job of alluding to the theoretical collision of authority (within the intelligence genre) when he points out that while Title 50 clearly "defines and delineates authorities within the intelligence community (e.g., the NSA and "Defense Intelligence Agency"), the authority to create policy is also in the hands of the Under Secretary of Defense for Intelligence. The authorization for the Under Secretary to "…collect (including through clandestine means), analyze, produce, and disseminate information and intelligence [as well as] defense and defense-related intelligence and counterintelligence" came from Executive Order 12,333 (Wall, 99).

In page after page of this lengthy scholarship, Wall digs deeply into the issues of authority and sifts through the potential points of confusion over Title 10 and Title 50. Again and again he returns to the salient theme of this paper: congressional oversight "…and its attendant internecine power struggles" is the culprit for any confusion that exists between Title 10 and Title 50. Wall is clearly imploring the reader to place blame where it belongs. Blame Congress, he asserts, but don't blame the DOD or the specific intelligence-gathering agencies.

One of the main points of contention that Wall presents is that the executive branch can use the blurred distinction over Title 10 and Title 50 to avoid Congressional oversight of planned covert activities. Under Title 10 "…there is no requirement to notify Congress" of planned activities; but intelligence activities that are carried out under Title 50 must be verified by presidential findings and reported to Congress (Wall, 102). And while Congressional oversight of military activities "is straightforward" (the House and Senate Armed Services Committees have full jurisdiction over "all aspects of DOD"), Wall reports that Congressional oversight of "intelligence activities is considerably more complex" (Wall, 104).

Hence, the author offers (from an insider's knowledge and experience) a pivotal suggestion to the U.S. Congress: in order to put an end to the Title 10 -- Title 50 debate, why not reform and reconfigure the process of oversight? Congress should be asking "who is funding the activity" and "who is exercising direction and control"? This suggestion from Wall actually is a follow up to the 9/11 Commission's recommendation -- to align congressional oversight with "statutory authorities" and to reform its "bifurcated intelligence authorization and appropriations functions" (108). And by doing so Congress could dispense with the current "dysfunctional" oversight, Wall explains.

Meanwhile Wall takes great pains to paint a picture of shifting policies in terms of how the terrorist attacks in September, 2001 -- and the subsequent "war on terror" -- helped put in motion some of the more glaring shifts of authority (Title 10 vs. Title 50). After the terrorist attacks the U.S. was determined to push the Taliban out of leadership positions in Afghanistan, so the CIA sent a paramilitary officer to Afghanistan with $9 million in cash. That money was disperses to various "Afghan warlords" -- basically buying their cooperation and loyalty so they would fight with the CIA and Special Forces to drive the Taliban out.….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Homeland Security and the Distinction Between ISR and IAA

are aimed at improving the informational and situation awareness to the department of homeland security. The capabilities of ISR have increased in demand since the incident of Hurricane Katrina. The same capabilities of ISR are the ones that are termed Incident Awareness and Assessment (IAA). The Incident Awareness and Assessment (IAA) capabilities have been leveraged to respond to various kinds of threats such as hurricanes, wildfires or even ocean oil spill. The ISR has the capability to provide invaluable situational awareness from various intelligence disciplines. The intelligence can be in the form of signals or imagery to the military commanders. Improved ISR provides… Continue Reading...

Private Security and Homeland Security

Private Security Trends and Movements Private security plays such a significant role in the efforts of the Department of Homeland Security (DHS) that the DHS published in 2010 a Private Sector Resources Catalog that “centralizes access to all DHS resources targeted for the private sector including small and large businesses, academia, trade associations, and other non-governmental organizations” (DHS, 2018). One example of a private security firm within the catalog is TRIPwire Community Gateway (TWCG)—“a web portal designed specifically for the nation’s CIKR owners, operators, and private security personnel.” The TWCG serves as a portal for private security groups to give analysis of threats, reports, and planning phases, helping private… Continue Reading...

Ethics and Technology at Homeland Security

Ethical Considerations for the Use of Technology to Meet Selected Homeland Security Objectives Introduction The Digital Age has transformed the way the world works for better or worse. Technology exists to bring down nations’ infrastructures without ever firing a missile (Ten, Manimaran & Liu, 2010). New technology has been developed that can allow agencies to spy, snoop, monitor, and retrieve conversations had online, through email, on cell phones, or via text messaging. To meet security needs, using this technology has very real and practical advantages. At the same time, there are privacy rules and regulations that have to be considered… Continue Reading...

Strategies to Improve Collaboration and Cooperation Between the Homeland Security Agencies

Strategies to improve collaboration and cooperation between the Homeland Security agencies The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland Security Review) was completed in the year 2010 with an objective of establishing an incorporated strategy for the goals and missions of homeland security (Homeland Security, 2005). Following this, DHS carried out a BUR (Bottom up Review). The objective was… Continue Reading...

Fema Dhs and Emergency Management at Local Levels

state agencies is “to supplement local efforts before, during, and after incidents,” (United States Department of Homeland Security, 2008, p. 6). States in many ways play the least visible role in emergency management, often working as liaisons between local governments requesting additional support and the federal government needing more information about the situation. Not all incidents require state or federal intervention and assistance, and city councils should not be concerned about losing control. Compliance with the Incident Command System (ICS) helps to unify disparate organizations involved in emergency response, ensuring interoperability. According to the Department of Homeland Security (2016), emergency response is tiered even though the… Continue Reading...

Port Security Customs and Border Protection

Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated with an objective of preventing illegal drugs, mass destruction weapons and contraband… Continue Reading...

National Security Impact of Immigration Policy

homeland security department incorporated an Immigration and Naturalization Service, thereby institutionalizing migration as an internal security threat. Numerous experts advocate for restrictions in migration policy for defending internal security within the destination country. Therefore, the ideal means to shut out undesirable persons from other countries would be: decreasing the nation’s yearly migrant intake. Immigration and Public Security Akin to migration’s link to terrorism,… Continue Reading...

Critical Infrastructure Security Information Technology

Synopsis Because the majority of critical infrastructure components in the United States are privately owned, compliance with Department of Homeland Security risk assessment methods remains voluntary. Risk assessments of critical infrastructure focus on threat, vulnerability, and consequences, with all types of assessments integral to helping improve resilience and mitigate problems (GAO, 2017). A vulnerability analysis of the nation’s information technology critical infrastructure reveals several points of weakness and security gaps. The Department of Homeland Security (2018) infrastructure survey tool can be used alongside the systems dynamics approach to vulnerability assessment. These tools reveal the inherent strengths of complex, interdependent information technology systems, while also revealing the potential weaknesses in… Continue Reading...

Safety and Spills Prevention

DHS and Plainsville In order to comply with the priorities handed down through Department of Homeland Security (DHS) Grant Programs and state mandates, Plainsville, Colorado, must address the situation of its critical rail line running through its community. The rail line is crucial for industrial use in manufacturing a hazardous material that is not manufactured anywhere else. However, the rail line is two centuries old and in need of repair. To assess the issues and risks at hand, the city has been tasked with bringing a committee of experts together that can share information on a range of issues, including: the integrity of the rail… Continue Reading...

The US Grant Programs for Emergencies

Department of Homeland Security Grants The HSGP (Homeland Security Grant Program) for the fiscal year 2017 contributes significantly to NPS (National Preparedness System) implementation through promoting the creation, delivery and sustenance of key capabilities vital to the achievement of America’s NPG (National Preparedness Goal) geared at improving its security and resilience. The provision of key capabilities necessitates integrated community-wide efforts and not the sole, independent endeavors of a particular governmental level or agency. HSGP’s allowable expenses foster attempts at developing and sustaining key capabilities over the Protection, Prevention, Mitigation, Recovery and Response… Continue Reading...

Counter Terrorism Community Policing and Changes

September 11, local law enforcement like Javier's department became more responsible for participating in and ensuring homeland security. While the role of police in homeland security might seem natural or obvious, diverting the attention and resources of police towards the federal concerns of homeland security can have some detrimental outcomes. One of the most important changes Javier noticed was the breakdown in the community policing model that the department had worked so hard to establish. Focusing more on counterterrorism efforts than on building relationships with community members damages the relationships between police and members of the community in serious ways. Police officers are expected to become… Continue Reading...

National Infrastructure Protection Plan NIPP

NIPP (National Infrastructure Protection Plan) The NIPP was drafted in the year 2006 by the DHS (Department of Homeland Security). The Plan was part of Presidential Directive 7 for Homeland Security and it was developed to boost security, and resilience and to help secure critical infrastructures from security threats. The plan included a thorough risk management guideline and defined the roles and responsibilities of the DHS with regards to CIP (Critical Infrastructure Protection). Included in the guideline were also the roles and responsibilities of the federal government, state governments, local governments, tribal governments, federal agencies, and private actors towards CIP in their jurisdictions. CIP is important for overall… Continue Reading...

Court Process, Judicial Process, and Constitutional Issues

9/11 terror attacks was characterized by enactment of new laws and executive orders that focused on enhancing homeland security. However, these laws and orders have become controversial because they have ceded power to the executive branch and limited people's rights. Some examples of these limitations include restrictions on privacy, limitation of free speech and association rights, and limitation of religious freedom. While these actions were necessary to help prevent another attack, they are inappropriate since they compromise civil rights and checks and balances established in America's democracy. The federal government would have taken less drastic measures through reordering priorities of law enforcement instead of generating fundamental changes… Continue Reading...

Improving Collaboration Between Agencies

became apparent that dealing with these vices is relevant and should not be taken lightly. One year following the assaults, the Homeland Security Act of 2002 initiated the central Department of Homeland Security. This led to a ripple effect in numerous regions which developed individual divisions focused on safe keeping the motherland as well as handling crisis. There was complete overhaul in the already existing divisions in order to meet the novel standards (Bush, 2002). Handling crisis is imperative. Federal regions are mandated to address the shift in weather conditions which have led to adverse regular climatic conditions. The 50 regions as well as the entire nation have to contend with… Continue Reading...

The Importance of Communications As a Critical Infrastructure

Published by the Department of Homeland Security (DHS) in 2003, authored by President George W. Bush, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets is the first document of its kind. After September 11 and the creation of the DHS, swift action was taken to synergize national security efforts and interests. The National Strategy redefines the meaning and definition of critical infrastructure and key assets, offering guidance to individual sectors for risk management, risk mitigation, information sharing, and more (Erbschloe, 2004). Moreover, the National Strategy takes into account the diversity… Continue Reading...

Emergency Response Crisis Management and CERT

plan and coordinate resources for effective emergency management. Homeland Security CERT plays an integral role in the maintenance of homeland security objectives. Homeland security refers to the protection of national borders, the promotion of community resilience to withstand crises including natural disasters and terrorist attacks, and the prevention or response to other crises such as cyberattacks. Because so many emergencies are localized, it is critical that local service providers engage with federal agencies that coordinate responses. The Department of Homeland Security (2018) is the presiding federal agency that can provide resources and information to CERT organizations. Business Continuity… Continue Reading...

The Active Shooter Crisis in America

the 1999 Columbine school massacre (Fox and Levin 8). Criminal justice agencies and the Department of Homeland Security differentiate active shooters from both mass shooters and domestic terrorists, although these all may share methods and tactics in common. An active shooter is defined as “an individual actively engaged in killing or attempting to kill people in a confined and populated area,” but with no apparent pattern or logic in their means of targeting victims (United States Department of Homeland Security 2). Active shooters are “active” because they will continue to kill as long as they have access to victims, which makes quick responses critical to saving… Continue Reading...

Public Administration Government and Interagency Relationships

most notable example of mandatory interagency partnerships is in the realm of homeland security. Prior to the creation of the Department of Homeland Security, interagency partnerships existed but tended to be loose and often ineffective (Hagen, 2006). The Department of Homeland Security created a new model of interagency partnership that enhanced the effectiveness and scope of the homeland security enterprise, taking into account multiple disparate stakeholders (Marcella, 2004). Interagency partnerships also flourish in law enforcement and criminal justice, as with the Organized Crime and Drug Enforcement Task Forces (United States Department of Justice, 2017). Rescue, relief, and emergency management also highlights the… Continue Reading...

What is Critical Infrastructure

nation run. It encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and water filtration plants; national monuments and government facilities; telecommunications and transportation systems; chemical facilities” (“CIKR,” 2009, par.1). Although the majority of CIKR is privately owned, according to DHS, the government still has a vital protective role to ensure it works correctly. Cybersecurity Although the Internet was… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Homeland Security" (2012, September 17) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/homeland-security-108888

Latest MLA Format (8th edition)

Copy Reference
"Homeland Security" 17 September 2012. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/homeland-security-108888>

Latest Chicago Format (16th edition)

Copy Reference
"Homeland Security", 17 September 2012, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/homeland-security-108888