Details

Threats to Homeland Security


Threats to Homeland Security

Reassessing the All-Hazards Perspective
2. Aufl.

von: Richard J. Kilroy

88,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 26.02.2018
ISBN/EAN: 9781119251965
Sprache: englisch
Anzahl Seiten: 576

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Addresses threats to homeland security from terrorism and emergency management from natural disasters</b></p> <p><i>Threats to Homeland Security, Second Edition</i> examines the foundations of today's security environment, from broader national security perspectives to specific homeland security interests and concerns. It covers what we protect, how we protect it, and what we protect it from. In addition, the book examines threats from both an international perspective (state vs non-state actors as well as kinds of threat capabilities—from cyber-terrorism to weapons of mass destruction) and from a national perspective (sources of domestic terrorism and future technological challenges, due to globalization and an increasingly interconnected world).</p> <p>This new edition of <i>Threats to Homeland Security</i> updates previous chapters and provides new chapters focusing on new threats to homeland security today, such as the growing nexus between crime and terrorism, domestic and international intelligence collection, critical infrastructure and technology, and homeland security planning and resources—as well as the need to reassess the all-hazards dimension of homeland security from a resource and management perspective.</p> <ul> <li>Features new chapters on homeland security intelligence, crime and domestic terrorism, critical infrastructure protection, and resource management</li> <li>Provides a broader context for assessing threats to homeland security from the all-hazards perspective, to include terrorism and natural disasters </li> <li>Examines potential targets at home and abroad</li> <li>Includes a comprehensive overview of U.S. policy, strategy, and technologies for preventing and countering terrorism</li> <li>Includes self-assessment areas, key terms, summary questions, and application exercises. On-line content includes PPT lessons for each chapter and a solutions key for academic adopters</li> </ul> <p><i>Threats to Homeland Security, Second Edition</i> is an excellent introductory text on homeland security for educators, as well as a good source of training for professionals in a number of homeland security-related disciplines.</p>
<p>Notes on Contributors xiii</p> <p>Preface  xvi</p> <p>Acknowledgments  xxiii</p> <p><b>1.  The Changing Nature of National Security 1</b></p> <p>Introduction 2</p> <p>1.1 Foundations of American Security Policy 2</p> <p>1.1.1 Geopolitics at the Beginning of the Twentieth Century 3</p> <p>1.1.2 National Security and World War II 6</p> <p>Self-Check  8</p> <p>1.2 Security in the Cold War Era 8</p> <p>1.2.1 Bipolarity versus Multipolarity 10</p> <p>1.2.2 Containing Communism  12</p> <p>1.2.3 Non-Communist Threats  16</p> <p>Self-Check  17</p> <p>1.3 Security in the Post-Cold War Era: Pre-9/11 17</p> <p>1.3.1 Changing Threats 18</p> <p>1.3.2 New Conflicts, New Responses 18</p> <p>1.3.3 Reorganization of National Security Policy 20</p> <p>Self-Check  21</p> <p>1.4 National Security and Terrorism: Post-9/11 21</p> <p>1.4.1 Globalization and Geopolitics 22</p> <p>1.4.2 The Bush Administration’s Global War on Terrorism 24</p> <p>1.4.3 The Obama Administration’s New National</p> <p>Security Strategy 26</p> <p>1.4.4 Homeland Security and National Security 27</p> <p>Self-Check  28</p> <p>Summary  29</p> <p>Key Terms 30</p> <p>Assess Your Understanding 35</p> <p>Summary Questions 35</p> <p>Applying This Chapter 36</p> <p>You Try It  37</p> <p><b>2.  Reassessing the All-Hazards Perspective  38</b></p> <p>Introduction 39</p> <p>2.1 Natural Disasters: Things We Can Expect to Happen  39</p> <p>2.1.1 The History of Natural Disasters in the United States 40</p> <p>2.1.2 Natural Disaster Response  41</p> <p>2.1.3 Natural Disasters in a Post-9/11 World 44</p> <p>Self-Check  46</p> <p>2.2 Accidental Hazards: Things We Can Try to Prevent 46</p> <p>2.2.1 History of Accidental Hazards in the United States 46</p> <p>2.2.2 Accidental Hazard Prevention and Response 48</p> <p>2.2.3 Accidental Hazards in a Post-9/11 World 50</p> <p>Self-Check  51</p> <p>2.3 Man-Made Hazards: Things We Hope Don’t Happen  51</p> <p>2.3.1 History of Man-Made Disasters Caused by</p> <p>Human Error in the United States 52</p> <p>2.3.2 Man-Made Disaster Mitigation and Response 53</p> <p>2.3.3 Man-Made Disasters in a Post-9/11 World  55</p> <p>Self-Check  56</p> <p>2.4 Reassessing the All-Hazards Perspective and Disasters  56</p> <p>Self-Check  59</p> <p>Summary  59</p> <p>Key Terms 60</p> <p>Assess Your Understanding 62</p> <p>Summary Questions 62</p> <p>Applying This Chapter 63</p> <p>You Try It  64</p> <p><b>3.  Us Homeland Security Interests         65</b></p> <p>Introduction 66</p> <p>3.1 What Is Homeland Security? 66</p> <p>3.1.1 The Merging of Traditions 67</p> <p>3.1.2 Prevailing Homeland Security Theories 71</p> <p>Self-Check  76</p> <p>3.2 Additional Context for Homeland Security 77</p> <p>3.2.1 Urban Versus Rural 77</p> <p>3.2.2 Technologies 78</p> <p>3.2.3 Political and Economic Factors 79</p> <p>3.2.4 Security Versus Civil Liberties 81</p> <p>Self-Check  84</p> <p>3.3 Homeland Security Enterprise  84</p> <p>3.3.1 Federal Partners 85</p> <p>3.3.2 State and Local Partners 90</p> <p>3.3.3 Whole Community Partners 91</p> <p>Self-Check  97</p> <p>3.4 Revisiting the All-Hazards Approach 98</p> <p>Self-Check  100</p> <p>Summary  101</p> <p>Key Terms 101</p> <p>Assess Your Understanding 105</p> <p>Summary Questions 105</p> <p>Applying This Chapter 106</p> <p>You Try It  108</p> <p><b>4.  Understanding Threat Assessments     109</b></p> <p>Introduction 110</p> <p>4.1 Background on Threat Assessments and Risk Management 111</p> <p>4.1.1 Risk Management and Threat Assessment from the</p> <p>All-Hazards Perspective  111</p> <p>4.1.2 Assessing Threats and Civil Liberties  113</p> <p>4.1.3 Homeland Security Risk Management Doctrine  114</p> <p>Self-Check  116</p> <p>4.2 A General Framework of Analysis: What to Assess 116</p> <p>4.2.1 The Disaster Impact Process 117</p> <p>4.2.2 Pre-Impact Conditions 117</p> <p>4.2.3 Event-Specific Conditions 120</p> <p>4.2.4 Final Thoughts on What to Assess  122</p> <p>Self-Check  122</p> <p>4.3 A Matrix Approach: How to Assess 123</p> <p>4.3.1 Risk Matrices  124</p> <p>4.3.2 Composite Exposure Indicator 127</p> <p>4.3.3 HAZUS 128</p> <p>4.3.4 Vulnerability Assessments 128</p> <p>4.3.5 Threat and Hazard Identification and Risk</p> <p>Assessment 129</p> <p>4.3.6 Final Thoughts on How to Assess 130</p> <p>Self-Check  133</p> <p>4.4 The Whole-Community Approach of the National</p> <p>Preparedness System 133</p> <p>4.4.1 Prevention  136</p> <p>4.4.2 Protection 137</p> <p>4.4.3 Mitigation 137</p> <p>4.4.4 Response  139</p> <p>4.4.5 Recovery 140</p> <p>Self-Check  143</p> <p>Summary  144</p> <p>Key Terms 144</p> <p>Assess Your Understanding 148</p> <p>Summary Questions 148</p> <p>Applying This Chapter 148</p> <p>You Try It  150</p> <p><b>5.  Critical Infrastructure Security, Emergency Preparedness, and Operational Continuity            .151</b></p> <p>Introduction 152</p> <p>5.1 Defining Critical Infrastructure 152</p> <p>5.1.1 Defining the Sectors 153</p> <p>5.1.2 Information Sharing and Analysis Centers  154</p> <p>Self-Check  157</p> <p>5.2 Known Threats to Critical Infrastructure 157</p> <p>5.2.1 Natural Hazard Threats 158</p> <p>5.2.2 Terrorism and Human Threats  162</p> <p>5.2.3 Nontraditional Aviation Technology (NTAT) 165</p> <p>5.2.4 Cybersecurity Threats 166</p> <p>Self-Check  168</p> <p>5.3 Risk Identification, Analysis, and Management 169</p> <p>5.3.1 Inventory and Critical Assets and Functions 169</p> <p>5.3.2 Intelligence Functions   .171</p> <p>Self-Check  175</p> <p>5.4 Emergency Operations and Continuity of Planning 175</p> <p>5.4.1 Critical Infrastructure Protection Planning and the All-Hazards Perspective 175</p> <p>5.4.2 Crisis Management Team 177</p> <p>Self-Check  178</p> <p>Summary  178</p> <p>Key Terms 179</p> <p>Assess Your Understanding 181</p> <p>Summary Questions 181</p> <p>Applying This Chapter 181</p> <p>You Try It  182</p> <p><b>6.  State Actors and Terrorism 183</b></p> <p>Introduction 184</p> <p>6.1 Defining Terrorism and Other Forms of Collective Violence 184</p> <p>6.1.1 Legal Definitions of Terrorism 190</p> <p>6.1.2 The Heyday of State-Sponsored Terrorist Groups 193</p> <p>6.1.3 The End of the Cold War, Globalization, and</p> <p>the Decline of State Sponsorship 195</p> <p>Self-Check  197</p> <p>6.2 Contemporary State Sponsors of Terrorism 197</p> <p>6.2.1 Iran 199</p> <p>6.2.2 Sudan 201</p> <p>6.2.3 Syria 203</p> <p>Self-Check  205</p> <p>6.3 International and Domestic Responses to State-Sponsored Terror 205</p> <p>6.3.1 United Nations Security Council (UNSC) 205</p> <p>6.3.2 Other Multilateral Efforts 206</p> <p>6.3.3 US International Counterterrorism Strategy  208</p> <p>Self-Check  210</p> <p>Summary  211</p> <p>Key Terms 214</p> <p>Assess Your Understanding 216</p> <p>Summary Questions 216</p> <p>Applying This Chapter 217</p> <p>You Try It  218</p> <p><b>7.  Non-State Actors and Terrorism   219</b></p> <p>Introduction 220</p> <p>7.1 Explaining the Different Types of Non-state Actors 220</p> <p>7.1.1 Defining Violent Non-state Actors              .220</p> <p>7.1.2 Defining Non-state Terrorism 221</p> <p>7.1.3 Terrorism and “Terrorists” 221</p> <p>Self-Check  223</p> <p>7.2 Non-state Terrorism as a Security Threat 223</p> <p>7.2.1 Reasons for the Prevalence of Violent Non-state Actors 224</p> <p>7.2.2 Non-state Terrorism as a Domestic and International Threat 225</p> <p>7.2.3 Assessing the Threat Posed by Violent Non-state Actors 227</p> <p>Self-Check  228</p> <p>7.3 The Typology of Violent Non-state Actors 228</p> <p>7.3.1 Political/Ideological Terrorism 231</p> <p>7.3.2 Ethno-Nationalist or Separatist Terrorism 236</p> <p>7.3.3 Religious Terrorism 240</p> <p>7.3.4 Motivational Trends in Non-state Terrorism 247</p> <p>Self-Check  248</p> <p>7.4 Methods of Non-state Violence 248</p> <p>7.4.1 Conventional and Unconventional Methods of</p> <p>Non-state Violence 249</p> <p>Self-Check  255</p> <p>7.5 International Strategies for Countering Non-state Violence 255</p> <p>7.5.1 The Military Option 257</p> <p>7.5.2 The Political Option 259</p> <p>Self-Check  260</p> <p>Summary  261</p> <p>Key Terms 261</p> <p>Assess Your Understanding 265</p> <p>Summary Questions 265</p> <p>Applying This Chapter 266</p> <p>You Try It  267</p> <p><b>8.  Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare  268</b></p> <p>Introduction 269</p> <p>8.1 The Cyber Threat 269</p> <p>8.1.1 Defining Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare  271</p> <p>8.1.2 What Can Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Do?  272</p> <p>Self-Check  275</p> <p>8.2 8.2 Assessing Capability and Intent 275</p> <p>8.2.1 Who Can Conduct Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare?  275</p> <p>8.2.2 Tools of Cyber-Terrorism  279</p> <p>Self-Check  281</p> <p>8.3 Assessing Consequences 281</p> <p>8.3.1 Why America Is Vulnerable to Cyber-Attacks 283</p> <p>8.3.2 The Impact of a Cyber-Terrorist Attack 285</p> <p>Self-Check  286</p> <p>8.4 Determining Defenses against Cyber-Crime , Cyber-Terrorism, and Cyber-Warfare  286</p> <p>8.4.1 The Government and Private Sector Response to Threats in Cyberspace 288</p> <p>8.4.2 The US Military Response to Cyber-Warfare 291</p> <p>8.4.3 The New Battlefields of Cyber-Warfare 295</p> <p>Self-Check  296</p> <p>Summary  296</p> <p>Key Terms 297</p> <p>Assess Your Understanding 301</p> <p>Summary Questions 301</p> <p> </p> <p>Applying This Chapter 302</p> <p>You Try It  303</p> <p><b>9.  Weapons of Mass Destruction and Disruption   304</b></p> <p>Introduction 305</p> <p>9.1 Chemical Weapons and Their Consequences  305</p> <p>9.1.1 History of Chemical Weapons Use 307</p> <p>9.1.2 Chemical Agents and Their Effects 308</p> <p>9.1.3 The Threat of Chemical Weapons and Terrorism  311</p> <p>Self-Check  313</p> <p>9.2 Biological Weapons and Their Consequences 313</p> <p>9.2.1 History of Biological Weapons Use 313</p> <p>9.2.2 Biological Agents and Their Effects 315</p> <p>9.2.3 The Threat of Biological Weapons and Terrorism  316</p> <p>Self-Check  319</p> <p>9.3 Nuclear and Radiological Weapons and Their Consequences 319</p> <p>9.3.1 Radiological Materials and Their Effects 321</p> <p>9.3.2 History of Nuclear Material Discoveries and Weapons Development  323</p> <p>9.3.3 The Threat of Nuclear Weapons and Terrorism 324</p> <p>9.3.4 Managing Radiological Incidents and Their</p> <p>Aftermath 327</p> <p>Self-Check  329</p> <p>Summary  329</p> <p>Key Terms 330</p> <p>Assess Your Understanding 332</p> <p>Summary Questions 332</p> <p>Applying This Chapter 333</p> <p>You Try It  334</p> <p><b>10.  Domestic Terrorism   335</b></p> <p>Introduction 336</p> <p>10.1 Terrorism in the United States: Across Time and Space 337</p> <p>10.1.1 Eighteenth- to Twentieth-Century Terrorism 337</p> <p>10.1.2 Late Twentieth-Century Terrorism  339</p> <p>10.1.3 Early Twenty-First-Century Terrorism 340</p> <p>Self-Check  344</p> <p>10.2 Homegrown “Leaderless Resistance” and Foreign Terrorists  344</p> <p>10.2.1 Understanding Leaderless Resistance  345</p> <p>10.2.2 Origins of Lone Wolves 346</p> <p>10.2.3 Assessing the Lone-Wolf Threat in the</p> <p>United States  347</p> <p>10.2.4 Foreign Terrorist Organizations  349</p> <p>10.2.5 Foreign Organizers 350</p> <p>Self-Check  352</p> <p>10.3 Crime and Terrorism 353</p> <p>10.3.1 Why Would Terrorism and Crime Converge? 353</p> <p>10.3.2 Where Terrorism and Crime Converge and</p> <p>Why It Matters 354</p> <p>Self-Check  356</p> <p>10.4 The US Domestic Response to Terrorism 356</p> <p>10.4.1 Countering Violent Extremism (CVE) 357</p> <p>10.4.2 The Lead Agency Approach and Counterterrorism 359</p> <p>10.4.3 Police and Counterterrorism 360</p> <p>Self-Check  364</p> <p>Summary  365</p> <p>Key Terms 366</p> <p>Assess Your Understanding 369</p> <p>Summary Questions 369</p> <p>Applying This Chapter 370</p> <p>You Try It  371</p> <p><b>11.  Enablers of Mass Effects  372</b></p> <p>Introduction 373</p> <p>11.1 The Power of Information and Ideas 373</p> <p>11.1.1 Ideas and Terrorism  376</p> <p>11.1.2 Ideas and Disasters 378</p> <p>Self-Check  381</p> <p>11.2 Media and Terrorism 381</p> <p>11.2.1 The Internet and Terrorism 382</p> <p>11.2.2 Social Media, Terrorism, and Disaster Response 386</p> <p>Self-Check  395</p> <p>11.3 The Role of Educational Institutions 395</p> <p>11.3.1 Alternative Educational Institutions  396</p> <p>11.3.2 International Students in the United States 396</p> <p>Self-Check  399</p> <p>Summary  399</p> <p>Key Terms 400</p> <p>Assess Your Understanding 402</p> <p>Summary Questions 402</p> <p>Applying This Chapter 402</p> <p>You Try It  404</p> <p><b>12.  Homeland Security Intelligence  405</b></p> <p>Introduction 406</p> <p>12.1 Intelligence and Homeland Security 406</p> <p>12.1.1 NYPD Surveillance of Muslim Communities 406</p> <p>12.1.2 What Is Intelligence?  407</p> <p>12.1.3 The Limited Historical Role of Intelligence in Domestic Affairs 411</p> <p>Self-Check  412</p> <p>12.2 The Structure of Intelligence Organizations  412</p> <p>12.2.1 National-Level Intelligence Organizations 414</p> <p>12.2.2 The Department of Homeland Security and Intelligence 418</p> <p>12.2.3 State, Local, and Tribal Government 420</p> <p>12.2.4 The Private Sector 422</p> <p>12.2.5 Intelligence Collaboration 423</p> <p>Self-Check  427</p> <p>12.3 Methods of Collecting Intelligence Information  427</p> <p>12.3.1 Human Intelligence Collection 429</p> <p>12.3.2 Open-Source Intelligence Collection 430</p> <p>12.3.3 Technical Intelligence Collection .432</p> <p>Self-Check  436</p> <p>12.4 Challenges to Homeland Security Intelligence 436</p> <p>12.4.1 Balancing Liberty and Security in Homeland</p> <p>Security Intelligence 437</p> <p>12.4.2 Intelligence Support to Disaster Relief  440</p> <p>Self-Check  441</p> <p>Summary  441</p> <p>Key Terms 443</p> <p>Assess Your Understanding 446</p> <p>Summary Questions 446</p> <p>Applying This Chapter 447</p> <p>You Try It  448</p> <p><b>13.  Homeland Security Planning and Resources    449</b></p> <p>Introduction 450</p> <p>13.1 Basics of Homeland Security Planning  450</p> <p>13.1.1 Planning for Homeland Security Activities 451</p> <p>13.1.2 Quadrennial Homeland Security Review 452</p> <p>13.1.3 Expanding on the QHSR: The DHS Strategic Plan  454</p> <p>13.1.4 Final Thoughts on the QHSR 456</p> <p>Self-Check  457</p> <p>13.2 Coordinating Homeland Security Planning 457</p> <p>13.2.1 The Six-Step Planning Process  458</p> <p>13.2.2 Performance Measurement: The Challenging “Art” of Measuring Success in Homeland Security Planning 461</p> <p>13.2.3 SMART Measurement 462</p> <p>Self-Check  463</p> <p>13.3 The Logic Model: A Process Framework to Visually Demonstrate the Performance Measurement Process 463</p> <p>13.3.1 Components of a Logic Model  464</p> <p>13.3.2 Challenges in Performance Measurement 467</p> <p>Self-Check  467</p> <p>13.4 Education in Homeland Security   .468</p> <p>13.4.1 Homeland Security Education Core Curricula  468</p> <p>13.4.2 Research in Homeland Security: Trends and Future Thoughts  471</p> <p>Self-Check  473</p> <p>Summary  473</p> <p>Key Terms 474</p> <p>Assess Your Understanding 476</p> <p>Summary Questions 476</p> <p>Applying This Chapter 476</p> <p>You Try It  478</p> <p>References    479</p> <p>Index 538</p>
<p> <b>Richard J. Kilroy, Jr.,</b> is an Assistant Professor of Politics at Coastal Carolina University in Conway, SC where he teaches courses in Intelligence Operations, Intelligence Analysis, Terrorism and Political Violence, Security Management and Risk Assessment, Homeland Security, and U.S.-Latin American Relations in support of Information Systems Technology, Political Science, and Intelligence and National Security Studies degree programs. He spent 23 years in active duty as an Army Intelligence and Latin America Foreign Area Officer.
<p> <b>Addresses threats to homeland security from terrorism and emergency management from natural disasters</b> <p> <i>Threats to Homeland Security, Second Edition</i> examines the foundations of today's security environment, from broader national security perspectives to specific homeland security interests and concerns. It covers what we protect, how we protect it, and what we protect it from. In addition, the book examines threats from both an international perspective (state vs non-state actors as well as kinds of threat capabilities–from cyber-terrorism to weapons of mass destruction) and from a national perspective (sources of domestic terrorism and future technological challenges, due to globalization and an increasingly interconnected world). <p> This new edition of <i>Threats to Homeland Security</i> updates previous chapters and provides new chapters focusing on new threats to homeland security today, such as the growing nexus between crime and terrorism, domestic and international intelligence collection, critical infrastructure and technology, and homeland security planning and resources–as well as the need to reassess the all-hazards dimension of homeland security from a resource and management perspective. <ul> <li>Features new chapters on homeland security intelligence, crime and domestic terrorism, critical infrastructure protection, and resource management</li> <li>Provides a broader context for assessing threats to homeland security from the all-hazards perspective, to include terrorism and natural disasters</li> <li>Examines potential targets at home and abroad</li> <li>Includes a comprehensive overview of U.S. policy, strategy, and technologies for preventing and countering terrorism</li> <li>Includes self-assessment areas, key terms, summary questions, and application exercises. On-line content includes PPT lessons for each chapter and a solutions key for academic adopters</li> </ul> <br> <p> <i>Threats to Homeland Security, Second Edition</i> is an excellent introductory text on homeland security for educators, as well as a good source of training for professionals in a number of homeland security-related disciplines.

Diese Produkte könnten Sie auch interessieren:

Product Realization
Product Realization
von: Mileta Tomovic, Shaoping Wang
PDF ebook
96,29 €
Rapid Prototyping
Rapid Prototyping
von: Ali K. Kamrani, Emad Abouel Nasr
PDF ebook
149,79 €
Computer Based Design and Manufacturing
Computer Based Design and Manufacturing
von: Emad Abouel Nasr, Ali K. Kamrani
PDF ebook
149,79 €