DOC PREVIEW
UW CSEP 590 - Introduction to Homeland Security

This preview shows page 1-2-3-4-5-6-7-8-54-55-56-57-58-59-60-109-110-111-112-113-114-115-116 out of 116 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 116 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PowerPoint PresentationSlide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15Slide 16Slide 17Slide 18Slide 19Slide 20Slide 21Slide 22Slide 23Slide 24Slide 25Slide 26Slide 27Slide 28Slide 29Slide 30Slide 31Slide 32Slide 33Slide 34Slide 35Slide 36Slide 37Slide 38Slide 39Slide 40Slide 41Slide 42Slide 43Slide 44Slide 45Slide 46Slide 47Slide 48Slide 49Slide 50Slide 51Slide 52Slide 53Slide 54Slide 55Slide 56Slide 57Slide 58Slide 59Slide 60Slide 61Slide 62Slide 63Slide 64Slide 65Slide 66Slide 67Slide 68Slide 69Slide 70Slide 71Slide 72Slide 73Slide 74Slide 75Slide 76Slide 77Slide 78Slide 79Slide 80Slide 81Slide 82Slide 83Slide 84Slide 85Slide 86Slide 87Slide 88Slide 89Slide 90Slide 91Slide 92Slide 93Slide 94Slide 95Slide 96Slide 97Slide 98Slide 99Slide 100Slide 101Slide 102Slide 103Slide 104Slide 105Slide 106Slide 107Slide 108Slide 109Slide 110Slide 111Slide 112Slide 113Slide 114Slide 115Slide 116Introduction to Homeland SecurityStephen M. MaurerGoldman School of Public PolicyAug. 31, 2005PhilosophyAn Inherently Interdisciplinary ProblemTechnology vs. Human FactorsSecurityConveniencePhilosophyExamples:The Encryption DebatePredicting The Aircraft ThreatRichard ClarkeFAASecurityConveniencePhilosophyDisclaimer: Social Science & ValuesMechanicsRequirements:White Paper/Policy AnalysisTeam ExerciseAttendance & ParticipationSyllabus:Terrorism WMDCybersecurityMechanicsCourse Web Site:http://www.cs.washington.edu/education/courses/csep590/CurrentQtr/Please sign up for E-Mail and Wiki!Special Night: Tuesday, September 13, 2005.Lecture 1:The Logic of TerrorismIntroduction to Homeland Security Aug. 31, 2005Stephen M. MaurerGoldman School of Public PolicyThe Rational Actor HypothesisEmbarrassments to the ModelThe Socialists Patients Collective (1975)SuicideYouthAlternative ExplanationsReligion?Sigmund Freud (1856 – 1939)Karl Popper (1902 – 1994)Romanticism, Napoleon & HitlerRole of the Individual “A Terrible Beauty”Dark Forces?The Invisible Man (1897)This LectureHistory - Three Waves of TerrorismGoals & Results Next LectureTerrorism-as-WarfareCapabilities & DefensesIntroductionAntecedentsMucius Scaevola (505 BC)The Sicarii (AD 66-73)The Assassins (11th – 13th Century AD)1790 – 1850State Terror (1793-94)Romanticism (ca. 1800)Primacy of GeniusRevolutionSuicideKarl Heinzen (1849)BeginningsTechnologyBlack PowderDynamite RevolversBeginnings1870s to World War IRussiaAnarchism (France & Italy)Periphery (Ireland, America, Balkans)The First WaveOverviewRussiaThe First Wave:People’s Will (1878 – 1881)500 members, 50 active.Widespread popular supportAssassinated Governor-General of St. Petersburg, Tsarist Political Police Chief, Czar Alexander IIThe Age of Scrupulous TerrorGoals“No Other Choice”Revolution: Destroying and Replacing the GovernmentSeeding Revolution By Example?ConcessionsThe First Wave:RussiaInertia Revenge, Prison Breaks, Inability to SurrenderResultsPromoting ReactionCountermeasuresInformers and SpiesFragility – and Persistence – of TerrorismThe First Wave:RussiaSocial Revolutionary TerrorismCombat OrganizationProfessionalizationTradecraft & Technology“Expropriations”$5–10m/yearThe First Wave:RussiaHistory:1901: Minister of Education1902: Minister of Interior1903: Two Governors (1903)1904: Interior Minister Plehve and Two Governors1905: 54 Assassinations, including Grand Duke1906: 82 Assassinations (+ 362 “Appropriations”)1907: 71 Assassinations1908: 3 Assassinations1909: 2 Assassinations1910: 1 Assassination1911: Organization ceases to exist but Stolypin assassinatedThe First Wave:RussiaResults:Matching Terror Against a Weakened State“All Ministers are human and they want to live.”-- Chief of OkhranaState Terror Nevertheless PrevailsCountermeasures:1904: Combat Organization Deputy Evno Azef provides information needed to arrest and convict his boss. 1912: Okhrana has 26,000 paid agents and a staff of 50,000The First Wave:RussiaMarxist Critique“The classes whom the state serves will always find new men – the mechanism remains intact and continues to function. Far deeper is the confusion that terrorist attempts introduce into the ranks of the working masses.”- Leon TrotskyThe First Wave:RussiaAnti-Bolshevik Terror (1917)Attacks on Bolsheviks & CounterrevolutionAttacks on German Diplomats & Derailing Peace TalksCountermeasuresMatching Terror Against A Weak State The True Meaning of “Asymmetric Warfare”The First Wave:RussiaGoals:Revolution – Destroying and Replacing the StateObtaining ConcessionsBlocking Peace Talks InertiaThe First Wave:RussiaCountermeasures:Liberalization InformersCensorshipMass ArrestsInternal ExileThe First Wave:RussiaAnarchismThe First Wave:AnarchismThe First Wave:AnarchismInternational Anarchist Congress (London 1881)The Anarchist MythIndividuals, Not GroupsExamples:1891: Ravachol bombs homes of judge, prosecutor and a barracks. Executed after waiter informs police.1893: Auguste Vaillant tries to throw bomb in Chamber of Deputies. Within days, Deputies overwhelmingly pass legislation to criminalizeanarchists, restrict press, and increase police force. 1894: Vaillant is executed. Police conduct 2000 raids onknown anarchists and sympathizers on New Year’s Day. The First Wave:Anarchism“Propaganda by Deed”Willingness to Die & Willingness to KillResultsThe Battle for Public SympathyLegislation and RepressionPolice Surveillance & Mass ArrestsPolice Exaggeration & ProvocationAnarchist OrthodoxyThe First Wave:AnarchismThe First Wave:AnarchismGoals:Revolution – Destroying and Replacing the StateObtaining ConcessionsBlocking Peace TalksPublicity & PropagandaInertiaCountermeasures:LiberalizationPublic OpinionInformersCensorshipMass ArrestsInternal ExileSurveillanceCriminalizing AdvocacyThe First Wave:AnarchismPeripheryThe First WaveIreland (1870s - 1880s)HistoryClerkenwell Explosion (1867)Phoenix Park Murders (1882)CountermeasuresRewards and informersForeign SponsorsThe First Wave:PeripheryUnited StatesMolly Maguires (1870s)Haymarket Square Bombing (1886)Assassination of Frank Steunenberg (1905)Los Angeles Times Bombing (1910)~ 100 bombings (1905-1910)Immigrant centered, usually economic.The First Wave:PeripherySpain Labor ViolenceArmenia (1896)Inviting Foreign InterventionThe Balkans (1914)Terrorism’s Biggest Result? Blocking ConcessionsA Russian Connection?The First Wave:PeripheryThe First Wave:PeripheryGoals:Revolution – Destroying and Replacing


View Full Document

UW CSEP 590 - Introduction to Homeland Security

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Introduction to Homeland Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction to Homeland Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction to Homeland Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?