Understanding homeland security

Author(s)

Bibliographic Information

Understanding homeland security

Gus Martin

SAGE, c2015

Available at  / 1 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

The pedagogical approach of Understanding Homeland Security is designed to stimulate critical thinking by readers. Each chapter follows a sequence of instruction that builds on previous chapters and thus incrementally enhances the reader's knowledge of each topic. Chapters incorporate the following features: Opening Viewpoints. At the beginning of each chapter, Opening Viewpoints present relevant examples of theories and themes discussed in each chapter and serve as "reality checks" for readers Chapter Introduction. Each chapter is introduced by an overview of the subject under investigation. The introduction provides perspective for the incorporation of each chapter's topic into the broader themes of the textbook Chapter Perspectives. Chapters incorporate focused presentations of perspectives that explore people, events, organizations, and movements that are relevant to the subject matter of each chapter Chapter Summary. A concluding discussion recapitulates the main themes of each chapter and introduces the subject matter of the following chapter Discussion Boxes. Discussion Boxes present provocative information and pose challenging questions to stimulate critical thinking and further debate Key Terms and Concepts. Important terms and ideas introduced in each chapter are listed for review and discussion. These Key Terms and Concepts are further explored and defined in the book's glossary Recommended Web Sites and Web Exercises. Web exercises at the ends of chapters have been designed for students, professionals, and instructors to explore and discuss information found on the Internet Recommended Readings. Suggested readings are listed at the end of each chapter for further information or research on each topic

Table of Contents

Part I: Foundations of Homeland Security Chapter 1. Policy and History: Defining Homeland Security Opening Viewpoint: The Concept of Homeland Security Defining an Era: What is Homeland Security? The Modern Era of Homeland Security Conceptual Foundation: Central Attributes of Homeland Security The Homeland Security Environment: A Dynamic Construct A New Focus: The Quadrennial Homeland Security Review Report Policy Options: Domestic Security and Threats to the Homeland Domestic Policy Options The Past as Prologue: Historical Perspectives on Homeland Security External Threats to the Early Republic Domestic Threats to the Early Republic Modern Precursors to Homeland Security Discussion Box: After the Next 9/11 Chapter 2. Homeland Security and the All-Hazards Umbrella Opening Viewpoint: Understanding the All-Hazards Umbrella The Homeland Security Nexus: Terrorist and Non-Terrorist Threats Background: Recent Difficulties in Disaster Relief All-Hazards Emergency Management: Core Concepts Case in Point: Non-Terrorist Mass Shootings Natural Hazards Tropical Cyclonic Storms Earthquakes Tornadoes Floods Wildland Fires Technological Scenarios Hazardous Material Accidents Grid Infrastructure Malfunctions Non-Wildland Fires The Terrorism Nexus: Conventional and Unconventional Hazards Conventional Weapons Common Explosives Chemical, Biological, Radiological, and Nuclear Hazards Guest Essay Discussion Box: Challenges of Integrating Homeland Security Intervention Chapter 3. Legal Foundations of Homeland Security Opening Viewpoint: Homeland Security and Applying the Rule of Law Background: Legal Precedent and Homeland Security International and Domestic Law: Policy Challenges Historical Context: State Sponsorship of International Terrorism Legitimizing Legal Authority: Classifying State Sponsors and Foreign Terrorist Organizations International Law and Counterterrorist Cooperation by the World Community Homeland Security: Statutory Authority Anti-Terrorism and Effective Death Penalty Act of 1996 USA PATRIOT Act of 2001 Department of Homeland Security Act of 2002 USA PATRIOT Improvement and Reauthorization Act of 2005 In Perspective: Homeland Security, Counterterrorism, and the Law Guest Essay Discussion Box: The Utility of Homeland Security Legislation Chapter 4. Civil Liberties and Securing the Homeland Opening Viewpoint: Freedom of Reporting and Security Priorities Security and Liberty: Historical Perspectives The Early Republic and Civil War Communism and the Red Scares Wartime Internment Camps Achieving Security Practical Considerations: Civil Liberty and Government Responses Civil Liberty and Countering Extremism Through Reform Balancing Civil Liberties and Homeland Security Terrorist Profiling The Problem of Labeling the Enemy The Ker-Frisbie Rule and Extraordinary Renditions Case in Point: The Torture Debate Discussion Box: Civil Liberty Protection and the "Ticking Bomb" Scenario Chapter 5. Agencies and Missions: Homeland Security at the Federal Level Opening Viewpoint: The Long Reach of Homeland Security: The Capture of Mir Aimal Kansi Scope of the Homeland Security Bureaucracy Conceptual Background: The Bureaucratic Context The Federal Bureaucracy Prior to September 11, 2001 Bureaucratic Transformation After September 11, 2001 The Department of Homeland Security Office of the Secretary Department of Homeland Security Administrative Centers Homeland Security Missions of Other Federal Agencies Department of Agriculture (USDA) Department of Defense (DOD) Department of Energy (DOE) Department of Health and Human Services (HHS) Department of the Interior Department of the Treasury Environmental Protection Agency (EPA) The Role of the Military Discussion Box: Homeland Security and Responding to the "Stateless Revolutionaries" Chapter 6. Agencies and Missions: Homeland Security at the State and Local Level Opening Viewpoint: The National and Local Nexus State Level Homeland Security Systems State Government and Homeland Security: Principal Roles State Government and Emergency Management: Configuration of Services National Collaboration: The National Emergency Management Association Regional Collaboration: Networking and Assistance Across Jurisdictions Local Homeland Security Networking Initiatives National Association of Counties National League of Cities U.S. Conference of Mayors Homeland Security and Law Enforcement Agencies The Police Mission in Homeland Security Environments The Operational Impact of Terrorism: Adaptations by Law Enforcement Agencies Case in Point: Joint Terrorism Task Forces Discussion Box: Operational Utility of the Joint Terrorism Task Force Model Part II: Threats and Vulnerabilities Chapter 7. Sea Change: The New Terrorism and Homeland Security Opening Viewpoint: The New Terrorism and Soft Targets Learning Objectives The "Old Terrorism" Prior to September 11, 2001 The Pre-September 11 Terrorist Environment Proxy War: The Cold War and the "Old Terrorism" September 11, 2001 and the New Terrorism Religion and Terrorism in the Modern Era Case in Point: The New Terrorism and Globalization Plausible Scenarios: The New Terrorism and New Modes of Warfare Weapons of Mass Destruction and the Objectives of the New Terrorism Netwar: A New Organizational Theory Case in Point: Asymmetrical Warfare Policy Options Countering Extremism Countering the New Terrorism Discussion Box: The One True Faith Chapter 8. The Threat at Home: Domestic Terrorism Opening Viewpoint: Lynching-Vigilante Communal Terrorism in the United States Extremism in America Left-Wing Extremism in the United States Right-Wing Extremism in the United States Sources of International Terrorism Left-Wing Terrorism in the United States Generational Rebellion: New Left Terrorism Civil Strife: Ethnonationalist Terrorism on the Left The Revolution Continues: Leftist Hard Cores Single-Issue Violence on the Left Right-Wing Terrorism in the United States The Past as Prologue: Historical Legacy of the Ku Klux Klan Racial Mysticism: Neo-Nazi Terrorism Patriot Threats Case in Point: Moralist Terrorism The New Terrorism in the United States Jihad in America September 11, 2001 Case in Point: The Threat from Homegrown Jihadists Discussion Box: Domestic Terrorism in the American Context Chapter 9. Porous Nodes: Specific Vulnerabilities Opening Viewpoint: Aviation Terrorism and Manipulation of the Media-The Case of TWA Flight 847 Cyber Security Cyber Terror: The Threat Cyber Terror: Potential Targets Cyber Terror: Feasibility and Likelihood Aviation Security Symbolic Value: Airline Attacks and Maximum Propaganda Effect The Complexity of Aviation Security Implementing Aviation Security Priorities Border Security Undocumented Immigration and Border Security Plausible Scenarios: Crime and Insecurity on the Southern Border Port Security Understanding the Terrorist Threat Port Security Initiatives and Priorities Discussion Box: Threat Scenario: WMDs Hidden in Cargo Containers Part III: Preparedness, Response, Recovery Chapter 10. Critical Resources: Preparedness and Planning Opening Viewpoint: International Perspective: The European Approach to Homeland Security Preparedness The Role of Proper Planning Foundational Concept: The National Incident Management System (NIMS) Local Planning: The Private Sector Local Planning: Emerging Roles at the Local Government Level Case in Point: Health and Medical Preparedness Strategies Prevention and Mitigation Planning Components of the Prevention and Mitigation Process Federal Mitigation Assistance Chemical and Biological Hazard Planning A Complex Dilemma: Mitigating Chemical and Biological Incidents Case in Point: Centers for Disease Control and Prevention Guidelines Radiological and Nuclear Hazard Planning Coordinating Nuclear Security: The Role of the U.S. Nuclear Regulatory Commission Case in Point: Weaponization of Radiological Agents Revisited Discussion Box: Domestic Preparedness and Weapons of Mass Destruction Chapter 11. Always Vigilant: Intelligence and Hardening the Target Opening Viewpoint: Intelligence Miscalculation: Weapons of Mass Destruction and the Iraq Case The Intelligence Community Background: Intelligence Collection and Jurisdiction The U.S. Intelligence Community: Mission The U.S. Intelligence Community: Challenges Information Security: Cyberwar and Hardening Cyberspace Cyberwar as a Counterterrorist Option Modern Surveillance Technologies Case in Point: The Echelon Satellite Surveillance Network Hardening Critical Infrastructure Securing Critical Infrastructure: Background and Context Federal Guidance: The DHS Building and Infrastructure Protection Series (BIPS) Options for Critical Infrastructure Security and Target Hardening Border Control: Securing National Entry Points Security Considerations and Patrolling the Border Hardening the Border: Three Agencies Transportation Security A Complex Arrangement: Components of the Transportation System The Transportation Security Administration Discussion Box: The Early Warning Role of Intelligence Chapter 12. Critical Outcomes: Response and Recovery Opening Viewpoint: The Vulnerability of Soft Targets National Response and Recovery: Fostering Administrative Coordination Federal National Planning Frameworks and the National Preparedness Goal Case in Point: Presidential Declarations Federal Response Coordination Background: The Progression of Federal Response Planning Case in Point: Implementing the National Response Framework State and Local Response and Recovery Planning Response and Recovery Planning by State Authorities Response and Recovery Planning by Local Authorities Discussion Box: The Viability of Recommended Command and Response Structures Part IV: Homeland Security: An Evolving Concept Chapter 13. The Future of Homeland Security Opening Viewpoint: Terrorist "Waves" and Near-Term Threats to Homeland Security Near-Term Projections Adaptive Measures: Theoretical and Practical Considerations Controlling Terrorism: Understanding Fundamental Challenges Case in Point: International Collaboration on Law Enforcement and Intelligence Threat Environments in the 21st Century Defending the Homeland: Ongoing Patterns of Political Violence Discussion Box: Countering Future Terror: The Case for International Cooperation

by "Nielsen BookData"

Details

Page Top