HLS 3302, American Homeland Security

HLS 3302, American Homeland Security

1

Course Learning Outcomes for Unit VIII

At the end of this unit, you should be able to:

1. Discuss the factors influencing terrorism.

1.4 Predict emerging threats and future challenges in homeland security using strategic foresight

tools.

4. Determine tactical response options to terrorism based on available resources and jurisdictional

procedures.

4.3 Propose a future homeland security policy.

4.4 Examine the structure of U.S. counterterrorism policy.

Required Unit Resources

Article: The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and Information Policy

Research in Libraries: Issues, Impacts, and Questions for Libraries and Researchers (ULO 1.4)

This article is 19 pages.

Unit Lesson

Lesson: Evaluating U.S. Responses to Terrorism, Resilience Planning, and Future Strategic

Challenges in Homeland Security (ULOs 1.4, 4.3, and 4.4)

The final unit of this course challenges students to critically evaluate how the United States has responded to

terrorism over the past two decades, with special attention to the intersection of strategy, resilience, and

future-facing policy development. While the early 2000s saw an intense focus on counterterrorism driven by

the events of 9/11, the subsequent evolution of threats, including domestic violent extremism (DVE),

cyberterrorism, and disinformation campaigns, demands a more nuanced, adaptive, and integrated response

framework. This lesson encourages students to not only assess what has worked, but also to identify policy

and capability gaps that persist in homeland security and emergency management planning.

Evaluating Historical U.S. Responses to Terrorism

Since the attacks on September 11, 2001, the U.S. homeland security apparatus has undergone extensive

transformation. The establishment of the Department of Homeland Security (DHS), the USA PATRIOT Act,

the expansion of intelligence-sharing mechanisms (including fusion centers), and the militarization of local

police forces are all direct responses to external and internal terrorist threats. In the years following 9/11,

responses to events such as the Boston Marathon bombing (2013), the Pulse Nightclub shooting in Orlando

(2016), and the January 6 Capitol attack in Washington, D.C. (2021) have provided insights into both the

operational readiness and the vulnerabilities of U.S. counterterrorism infrastructure.

Critically, these incidents illustrate how threat typologies have shifted. Foreign terrorism is no longer the sole,

or even primary, threat. Domestic actors motivated by ideological, racial, or anti-government beliefs now

constitute the most persistent terrorism risk according to DHS and FBI threat assessments (Simon & Jenkins,

2016). Thus, the United States must evaluate how adaptable its current frameworks are in identifying and

mitigating non-state, decentralized threats.

UNIT VIII STUDY GUIDE

Future ChallengesHLS 3302, American Homeland Security

2

UNIT x STUDY GUIDE

Title

Resilience Planning as a Strategic Imperative

Resilience has emerged as a central organizing principle in contemporary homeland security policy. Defined

by the ability to anticipate, absorb, adapt to, and recover from adverse events, resilience planning moves

beyond the traditional prevention-focused models of counterterrorism. Instead, it emphasizes continuity of

operations, rapid recovery, community capacity-building, and long-term societal adaptation.

Resilience planning is now institutionalized in several national strategies, including the National Preparedness

Goal and the National Mitigation Framework, which emphasize whole-of-community approaches and cross

sector collaboration (Alperen, 2024). For example, infrastructure resilience initiatives led by CISA prioritize

systems interdependency mapping and cybersecurity enhancements, while FEMA promotes community

based resilience through programs such as BRIC (building resilient infrastructure and communities).

One of the challenges in resilience implementation lies in balancing federal, state, and local responsibilities.

Fragmented jurisdictional mandates and varying levels of capacity have resulted in uneven preparedness

outcomes across the nation. Additionally, social equity concerns—particularly the differential impact of

disasters and terrorism on marginalized communities—must be embedded into any strategic planning effort.

Students should interrogate not only the operational mechanisms of resilience but also its ethical and

distributive dimensions.

Emerging Strategic Challenges in Homeland Security

Looking forward, several strategic challenges must be addressed by homeland security professionals,

policymakers, and emergency managers:

The Rise of Technologically Enabled Threats

(Edwards, n.d.)

Artificial intelligence (AI), deep-fake technologies, and drone capabilities introduce complex new risks. While

these tools may enhance security capabilities, they also democratize access to powerful means of disruption,

particularly in the hands of non-state actors.HLS 3302, American Homeland Security

3

UNIT x STUDY GUIDE

Title

Polarization and Political Violence

(Ryabokon, n.d.)

The erosion of social trust and the rise of politically motivated violence threaten the domestic stability on

which homeland security depends. Countering violent extremism must therefore include behavioral health,

public education, and digital literacy components to address root causes.

Climate Change and Compound Threats

(Plieva, n.d.)

The increasing frequency and severity of natural disasters, coupled with potential cascading impacts (e.g.,

power outages during terrorist attacks or pandemics), require integrated planning across all mission areas:

prevention, protection, response, recovery, and mitigation.HLS 3302, American Homeland Security

4

UNIT x STUDY GUIDE

Title

Cybersecurity and Critical Infrastructure

(Stevanovicigor, n.d.)

The SolarWinds attack, Colonial Pipeline ransomware event, and persistent phishing campaigns targeting

government systems underscore the fragility of the digital backbone of homeland security. Public-private

partnerships and enhanced cyber hygiene must be integral to future strategies.

Policy and Governance Considerations

The future of homeland security depends heavily on how institutions govern under conditions of uncertainty.

This includes developing adaptable legal frameworks, ethical surveillance protocols, and public accountability

measures. Interagency coordination remains a persistent issue, especially when overlapping jurisdictions

create gaps or redundancies in response.

Students should consider how tools such as policy memos, threat assessments, and resilience can be used

to bridge strategic planning with real-world implementation. Moreover, cultivating leadership that is both agile

and ethically grounded will be essential to navigating the homeland security challenges of the coming

decades. The question is no longer whether we can stop every attack, but how well our systems and

communities are prepared to absorb and recover from them while upholding democratic values.

References

Alperen, M. J. (2024). Foundations of homeland security and emergency management: Law and policy (3rd

ed.). Wiley. https://online.vitalsource.com/#/books/9781394191611

Edwards, M. (n.d.). ID 214795010 [Image]. Dreamstime. https://www.dreamstime.com/deepfake-concept

matching-facial-movements-different-face-another-person-swapping-impersonation-image214795010

Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USAPATRIOT Act, the Foreign

Intelligence Surveillance Act, and Information Policy Research in Libraries: Issues, Impacts, and

Questions for Libraries and Researchers. The Library Quarterly: Information, Community, Policy,

74(2),99–121. https://research-ebsco

com.libraryresources.columbiasouthern.edu/linkprocessor/plink?id=dffdfa96-2481-3705-a9ce-

36e7f6e92161

Plieva, O. (n.d.). ID 332167101 [Image]. Dreamstime. https://www.dreamstime.com/downed-power-lines

devastating-hurricane-image332167101 HLS 3302, American Homeland Security

5

UNIT x STUDY GUIDE

Title

Ryabokon, Y. (n.d.). ID 308627804 [Image]. Dreamstime. https://www.dreamstime.com/riot-civil-unrest

protest-generate-ai-smoke-people-fictional-person-image308627804

Simon, J. D., & Jenkins, B. M. (2016). Lone wolf terrorism: Understanding the growing threat. Prometheus.

Stevanovicigor. (n.d.). ID 133406131 [Image]. Dreamstime. https://www.dreamstime.com/cybersecurity

concept-faceless-hooded-male-person-low-key-red-blue-lit-image-digital-glitch-effect

image133406131