Understanding homeland security
Author(s)
Bibliographic Information
Understanding homeland security
SAGE, c2015
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Description and Table of Contents
Description
The pedagogical approach of Understanding Homeland Security is designed to stimulate critical thinking by readers. Each chapter follows a sequence of instruction that builds on previous chapters and thus incrementally enhances the reader's knowledge of each topic. Chapters incorporate the following features:
Opening Viewpoints. At the beginning of each chapter, Opening Viewpoints present relevant examples of theories and themes discussed in each chapter and serve as "reality checks" for readers
Chapter Introduction. Each chapter is introduced by an overview of the subject under investigation. The introduction provides perspective for the incorporation of each chapter's topic into the broader themes of the textbook
Chapter Perspectives. Chapters incorporate focused presentations of perspectives that explore people, events, organizations, and movements that are relevant to the subject matter of each chapter
Chapter Summary. A concluding discussion recapitulates the main themes of each chapter and introduces the subject matter of the following chapter
Discussion Boxes. Discussion Boxes present provocative information and pose challenging questions to stimulate critical thinking and further debate
Key Terms and Concepts. Important terms and ideas introduced in each chapter are listed for review and discussion. These Key Terms and Concepts are further explored and defined in the book's glossary
Recommended Web Sites and Web Exercises. Web exercises at the ends of chapters have been designed for students, professionals, and instructors to explore and discuss information found on the Internet
Recommended Readings. Suggested readings are listed at the end of each chapter for further information or research on each topic
Table of Contents
Part I: Foundations of Homeland Security
Chapter 1. Policy and History: Defining Homeland Security
Opening Viewpoint: The Concept of Homeland Security
Defining an Era: What is Homeland Security?
The Modern Era of Homeland Security
Conceptual Foundation: Central Attributes of Homeland Security
The Homeland Security Environment: A Dynamic Construct
A New Focus: The Quadrennial Homeland Security Review Report
Policy Options: Domestic Security and Threats to the Homeland
Domestic Policy Options
The Past as Prologue: Historical Perspectives on Homeland Security
External Threats to the Early Republic
Domestic Threats to the Early Republic
Modern Precursors to Homeland Security
Discussion Box: After the Next 9/11
Chapter 2. Homeland Security and the All-Hazards Umbrella
Opening Viewpoint: Understanding the All-Hazards Umbrella
The Homeland Security Nexus: Terrorist and Non-Terrorist Threats
Background: Recent Difficulties in Disaster Relief
All-Hazards Emergency Management: Core Concepts
Case in Point: Non-Terrorist Mass Shootings
Natural Hazards
Tropical Cyclonic Storms
Earthquakes
Tornadoes
Floods
Wildland Fires
Technological Scenarios
Hazardous Material Accidents
Grid Infrastructure Malfunctions
Non-Wildland Fires
The Terrorism Nexus: Conventional and Unconventional Hazards
Conventional Weapons
Common Explosives
Chemical, Biological, Radiological, and Nuclear Hazards
Guest Essay
Discussion Box: Challenges of Integrating Homeland Security Intervention
Chapter 3. Legal Foundations of Homeland Security
Opening Viewpoint: Homeland Security and Applying the Rule of Law
Background: Legal Precedent and Homeland Security
International and Domestic Law: Policy Challenges
Historical Context: State Sponsorship of International Terrorism
Legitimizing Legal Authority: Classifying State Sponsors and Foreign Terrorist Organizations
International Law and Counterterrorist Cooperation by the World Community
Homeland Security: Statutory Authority
Anti-Terrorism and Effective Death Penalty Act of 1996
USA PATRIOT Act of 2001
Department of Homeland Security Act of 2002
USA PATRIOT Improvement and Reauthorization Act of 2005
In Perspective: Homeland Security, Counterterrorism, and the Law
Guest Essay
Discussion Box: The Utility of Homeland Security Legislation
Chapter 4. Civil Liberties and Securing the Homeland
Opening Viewpoint: Freedom of Reporting and Security Priorities
Security and Liberty: Historical Perspectives
The Early Republic and Civil War
Communism and the Red Scares
Wartime Internment Camps
Achieving Security
Practical Considerations: Civil Liberty and Government Responses
Civil Liberty and Countering Extremism Through Reform
Balancing Civil Liberties and Homeland Security
Terrorist Profiling
The Problem of Labeling the Enemy
The Ker-Frisbie Rule and Extraordinary Renditions
Case in Point: The Torture Debate
Discussion Box: Civil Liberty Protection and the "Ticking Bomb" Scenario
Chapter 5. Agencies and Missions: Homeland Security at the Federal Level
Opening Viewpoint: The Long Reach of Homeland Security: The Capture of Mir Aimal Kansi
Scope of the Homeland Security Bureaucracy
Conceptual Background: The Bureaucratic Context
The Federal Bureaucracy Prior to September 11, 2001
Bureaucratic Transformation After September 11, 2001
The Department of Homeland Security
Office of the Secretary
Department of Homeland Security Administrative Centers
Homeland Security Missions of Other Federal Agencies
Department of Agriculture (USDA)
Department of Defense (DOD)
Department of Energy (DOE)
Department of Health and Human Services (HHS)
Department of the Interior
Department of the Treasury
Environmental Protection Agency (EPA)
The Role of the Military
Discussion Box: Homeland Security and Responding to the "Stateless Revolutionaries"
Chapter 6. Agencies and Missions: Homeland Security at the State and Local Level
Opening Viewpoint: The National and Local Nexus
State Level Homeland Security Systems
State Government and Homeland Security: Principal Roles
State Government and Emergency Management: Configuration of Services
National Collaboration: The National Emergency Management Association
Regional Collaboration: Networking and Assistance Across Jurisdictions
Local Homeland Security Networking Initiatives
National Association of Counties
National League of Cities
U.S. Conference of Mayors
Homeland Security and Law Enforcement Agencies
The Police Mission in Homeland Security Environments
The Operational Impact of Terrorism: Adaptations by Law Enforcement Agencies
Case in Point: Joint Terrorism Task Forces
Discussion Box: Operational Utility of the Joint Terrorism Task Force Model
Part II: Threats and Vulnerabilities
Chapter 7. Sea Change: The New Terrorism and Homeland Security
Opening Viewpoint: The New Terrorism and Soft Targets
Learning Objectives
The "Old Terrorism" Prior to September 11, 2001
The Pre-September 11 Terrorist Environment
Proxy War: The Cold War and the "Old Terrorism"
September 11, 2001 and the New Terrorism
Religion and Terrorism in the Modern Era
Case in Point: The New Terrorism and Globalization
Plausible Scenarios: The New Terrorism and New Modes of Warfare
Weapons of Mass Destruction and the Objectives of the New Terrorism
Netwar: A New Organizational Theory
Case in Point: Asymmetrical Warfare
Policy Options
Countering Extremism
Countering the New Terrorism
Discussion Box: The One True Faith
Chapter 8. The Threat at Home: Domestic Terrorism
Opening Viewpoint: Lynching-Vigilante Communal Terrorism in the United States
Extremism in America
Left-Wing Extremism in the United States
Right-Wing Extremism in the United States
Sources of International Terrorism
Left-Wing Terrorism in the United States
Generational Rebellion: New Left Terrorism
Civil Strife: Ethnonationalist Terrorism on the Left
The Revolution Continues: Leftist Hard Cores
Single-Issue Violence on the Left
Right-Wing Terrorism in the United States
The Past as Prologue: Historical Legacy of the Ku Klux Klan
Racial Mysticism: Neo-Nazi Terrorism
Patriot Threats
Case in Point: Moralist Terrorism
The New Terrorism in the United States
Jihad in America
September 11, 2001
Case in Point: The Threat from Homegrown Jihadists
Discussion Box: Domestic Terrorism in the American Context
Chapter 9. Porous Nodes: Specific Vulnerabilities
Opening Viewpoint: Aviation Terrorism and Manipulation of the Media-The Case of TWA Flight 847
Cyber Security
Cyber Terror: The Threat
Cyber Terror: Potential Targets
Cyber Terror: Feasibility and Likelihood
Aviation Security
Symbolic Value: Airline Attacks and Maximum Propaganda Effect
The Complexity of Aviation Security
Implementing Aviation Security Priorities
Border Security
Undocumented Immigration and Border Security
Plausible Scenarios: Crime and Insecurity on the Southern Border
Port Security
Understanding the Terrorist Threat
Port Security Initiatives and Priorities
Discussion Box: Threat Scenario: WMDs Hidden in Cargo Containers
Part III: Preparedness, Response, Recovery
Chapter 10. Critical Resources: Preparedness and Planning
Opening Viewpoint: International Perspective: The European Approach to Homeland Security Preparedness
The Role of Proper Planning
Foundational Concept: The National Incident Management System (NIMS)
Local Planning: The Private Sector
Local Planning: Emerging Roles at the Local Government Level
Case in Point: Health and Medical Preparedness Strategies
Prevention and Mitigation Planning
Components of the Prevention and Mitigation Process
Federal Mitigation Assistance
Chemical and Biological Hazard Planning
A Complex Dilemma: Mitigating Chemical and Biological Incidents
Case in Point: Centers for Disease Control and Prevention Guidelines
Radiological and Nuclear Hazard Planning
Coordinating Nuclear Security: The Role of the U.S. Nuclear Regulatory Commission
Case in Point: Weaponization of Radiological Agents Revisited
Discussion Box: Domestic Preparedness and Weapons of Mass Destruction
Chapter 11. Always Vigilant: Intelligence and Hardening the Target
Opening Viewpoint: Intelligence Miscalculation: Weapons of Mass Destruction and the Iraq Case
The Intelligence Community
Background: Intelligence Collection and Jurisdiction
The U.S. Intelligence Community: Mission
The U.S. Intelligence Community: Challenges
Information Security: Cyberwar and Hardening Cyberspace
Cyberwar as a Counterterrorist Option
Modern Surveillance Technologies
Case in Point: The Echelon Satellite Surveillance Network
Hardening Critical Infrastructure
Securing Critical Infrastructure: Background and Context
Federal Guidance: The DHS Building and Infrastructure Protection Series (BIPS)
Options for Critical Infrastructure Security and Target Hardening
Border Control: Securing National Entry Points
Security Considerations and Patrolling the Border
Hardening the Border: Three Agencies
Transportation Security
A Complex Arrangement: Components of the Transportation System
The Transportation Security Administration
Discussion Box: The Early Warning Role of Intelligence
Chapter 12. Critical Outcomes: Response and Recovery
Opening Viewpoint: The Vulnerability of Soft Targets
National Response and Recovery: Fostering Administrative Coordination
Federal National Planning Frameworks and the National Preparedness Goal
Case in Point: Presidential Declarations
Federal Response Coordination
Background: The Progression of Federal Response Planning
Case in Point: Implementing the National Response Framework
State and Local Response and Recovery Planning
Response and Recovery Planning by State Authorities
Response and Recovery Planning by Local Authorities
Discussion Box: The Viability of Recommended Command and Response Structures
Part IV: Homeland Security: An Evolving Concept
Chapter 13. The Future of Homeland Security
Opening Viewpoint: Terrorist "Waves" and Near-Term Threats to Homeland Security
Near-Term Projections
Adaptive Measures: Theoretical and Practical Considerations
Controlling Terrorism: Understanding Fundamental Challenges
Case in Point: International Collaboration on Law Enforcement and Intelligence
Threat Environments in the 21st Century
Defending the Homeland: Ongoing Patterns of Political Violence
Discussion Box: Countering Future Terror: The Case for International Cooperation
by "Nielsen BookData"