Homeland Security and Terrorism
Description:
Table of Contents
- Introduction to Homeland Security
- Introduction
- American and Terrorist Attacks
- What Is Homeland Security
- Homeland Security Missions and Goals
- Definitional Issues and Homeland Security
- Collateral Benefits from Homeland Security
- The Scope of Homeland Security
- Pre-9/11 Efforts to Improve Homeland Security
- The 9/11 Commission Report
- The National Strategy for Homeland Security
- Intelligence and Warning
- Border and Transportation Security
- Domestic Counterterrorism
- Protecting Critical Infrastructure
- Defend against Catastrophic Events
- Emergency Preparedness and Response
- Legal Initiatives
- Science and Technology
- Information Sharing and Systems
- International Cooperation
- Costs of Homeland Security
- Indirect Costs
- Summary
- Homeland Security Apparatus
- Introduction
- Department of Homeland Security
- Political Considerations in the Creation of the Department of Homeland Security
- White House and Congressional Oversight
- Agency Confusion and Mission Distortion
- The Structure of the Department of Homeland Security
- DHS Administrative and Support Agencies
- Transportation Security Administration
- U.S. Customs and Border Protection
- U.S. Immigration and Customs Enforcement
- Immigration Enforcement
- Investigating Illegal Movement of People and Goods
- U.S. Citizenship and Immigration Services
- U.S. Secret Service
- U.S. Coast Guard
- Federal Emergency Management Agency
- Federal Law Enforcement Training Center
- Domestic Nuclear Detection Office
- Department of Defense and Homeland Security
- State-Level Homeland Security
- Summary
- Overview of National Infrastructure Protection
- Introduction
- Threats to Critical Infrastructure
- Federal Agencies Involved in the Protection of American Assets
- Scope of American Critical Infrastructure Assets
- Critical Infrastructure Sectors
- National Critical Infrastructure Prioritization Program
- The National Infrastructure Protection Plan: Conceptual Operation of Homeland Security Protection
- Set Goals and Objectives
- Identify Infrastructure
- Assess and Analyze Risks
- Implement Risk Management Activities
- Measure Effectiveness
- Critique of the National Infrastructure Protection Plan Model
- A Bottom-Up Approach
- The Buffer Zone Protection Plan
- The Reality of Critical Infrastructure Protection: States'' Responsibilities
- Key Critical Infrastructure Sectors
- Water and Wastewater Systems
- Chemical Sector
- Commercial Facilities Sector
- Communications Sector
- Critical Manufacturing Sector
- Dams Sector
- Defense Industrial Base Sector
- Emergency Services Sector
- Energy
- Transportation Security
- Ground Transportation
- Infrastructure from the Terrorists'' Viewpoint
- Complacency: The Threat to Homeland Security
- Summary
- The Legal Aspects of Homeland Security
- Introduction
- Presidential Executive Orders and Directives
- Executive Orders of President Clinton
- Executive Orders of President George W. Bush
- Executive Orders of President Barack Obama
- Executive Orders of President Donald Trump
- Federal Antiterrorism Statutes
- Antiterrorism and Effective Death Penalty Act of 1996
- The USA Patriot Act
- U.S. Foreign Intelligence Surveillance Court
- Summary
- Political and Social Foundations of Terrorism
- Introduction
- Continuum of Social Conflict
- Defining Terrorism
- A Brief History of Terrorism
- Early Forms of Terrorism
- The French Revolution
- Late Nineteenth- and Early Twentieth Century Terrorism
- Terrorism in the Late Twentieth Century
- Terrorism in Early America
- Terrorism Today
- The Roots and Causes of Terrorism
- Globalization
- Religion
- Israeli-Palestinian Conflict
- Russian Invasion of Afghanistan
- Wahhabism
- Authoritarian Governments
- Failed States and Terrorism
- Individual Explanations of Terrorism
- Types of Terrorism
- State-Sponsored Terrorism
- Dissent Terrorism
- Terrorists on the Left and Right
- Religious Terrorism
- Criminal Terrorism
- Level of Terrorist Activities
- Strategies for Dealing with Terrorism
- Crushing Terrorist Groups Unilaterally
- Crushing Terrorist Groups Multilaterally
- Containment
- Defense
- Diversion
- Delegitimation
- Transforming Terrorist Breeding Grounds
- Women Terrorists
- Summary
- The Nature and Geography of Terrorist Groups, State Sponsors of Terror, and Safe Havens
- Introduction
- Foreign Terrorist Organizations
- Middle East and North Africa Groups
- African Groups
- Asian Groups
- Latin American Groups
- European Groups
- Terrorism in America
- Radical Muslim-Inspired Terrorism
- Right-Wing Terrorists and Militias
- Eco-Terrorism and Animal Rights Groups
- Summary
- Transnational Organized Crime and Terrorism
- Introduction
- Defining Transnational Organized Crime
- Distinguishing Types or Categories of Crime
- Impact of Transnational Organized Crime
- Conditions Facilitating Transnational Organized Crime
- Networking: The Etiology of Transnational Organized Crime Groups
- Political Models
- Economic Models
- Social Models
- How Transnational Crime Is Organized
- Standard Hierarchy
- Regional Hierarchy
- Clustered Hierarchy
- Core Group
- Criminal Network
- Transnational Organized Crime Activities
- Drug Trafficking
- Human Trafficking
- Smuggling of Technology and WMD Materials
- Arms Trafficking
- Trafficking in Precious Gems
- Piracy
- Non-Drug Contraband Smuggling
- Counterfeiting
- Theft
- Financial Fraud
- Environmental Crimes
- Failed States and Transnational Organized Crime and Terrorism
- Links between Transnational Organized Crime and Terrorist Organizations
- The Continuum of Terrorism and Transnational Organized Crime
- Incentives for TOC and Terrorist Organizations to Cooperate
- Summary
- Intelligence and Counterintelligence and Terrorism
- Introduction
- Intelligence Failure--What Does It Mean?
- Advisory
- The Director of National Intelligence
- National Counterterrorism Center
- Conceptual Overview of Homeland Security Intelligence
- Types of Intelligence Collection Activities
- Human Intelligence
- Signals Intelligence
- Measures and Signatures Intelligence
- Imagery Intelligence
- Open-Source Intelligence
- Agencies within the American Intelligence Community
- Central Intelligence Agency
- Defense Intelligence Agency
- Department of Energy
- Department of Homeland Security
- Department of State
- Department of the Treasury
- Drug Enforcement Administration
- Federal Bureau of Investigation
- National Geospatial-Intelligence Agency
- National Reconnaissance Office
- National Security Agency
- Armed Services Intelligence
- Intersection of Policy Decisions and Intelligence: The Intelligence Cycle
- Joint Special Operations Command Specialized Military Antiterrorism Agencies
- Counterintelligence
- The Globalization of Intelligence
- Domestic Industrial Espionage
- Summary
- Homeland Security and Weapons of Mass Destruction
- The National Terrorism Advisory System: Warning the American People
- Introduction
- Defining Weapons of Mass Destruction
- National Terrorism Advisory System
- History of the Deployment of WMDs
- Historical Precedents for Biological WMDs
- Historical Precedents for Chemical WMDs
- The Threat of Nuclear Weapons of Mass Destruction: Destructiveness, Potential for Use, and Availability
- Nuclear and Radiological WMDs
- Availability of Nuclear Materials
- Nuclear Bombs or Weapons
- The Spread of Nuclear Material and Information
- Smuggling Nuclear Weapons and Materials
- Terrorist Attacks Using Dirty Bombs and Attacks on Nuclear Facilities
- Biological Weapons of Mass Destruction
- Types of Biological Weapons
- How Biological Weapons Work
- Creating Biological Weapons
- Threat Assessment and Biological Weapons
- Chemical Weapons of Mass Destruction
- Advantages of Chemical Weapons
- Weaponizing Chemicals
- Factors Constraining Terrorists from Using WMDs<
We're an Amazon Associate. We earn from qualifying purchases at Amazon and all stores listed here.