Bisher 108,99 €**
106,99 €
versandkostenfrei*

inkl. MwSt.
**Früherer Preis
Versandfertig in über 4 Wochen
53 °P sammeln
    Broschiertes Buch

Addresses threats to homeland security from terrorism and emergency management from natural disastersThreats to Homeland Security, Second Edition examines the foundations of today's security environment, from broader national security perspectives to specific homeland security interests and concerns. It covers what we protect, how we protect it, and what we protect it from. In addition, the book examines threats from both an international perspective (state vs non-state actors as well as kinds of threat capabilities--from cyber-terrorism to weapons of mass destruction) and from a national…mehr

Produktbeschreibung
Addresses threats to homeland security from terrorism and emergency management from natural disastersThreats to Homeland Security, Second Edition examines the foundations of today's security environment, from broader national security perspectives to specific homeland security interests and concerns. It covers what we protect, how we protect it, and what we protect it from. In addition, the book examines threats from both an international perspective (state vs non-state actors as well as kinds of threat capabilities--from cyber-terrorism to weapons of mass destruction) and from a national perspective (sources of domestic terrorism and future technological challenges, due to globalization and an increasingly interconnected world).This new edition of Threats to Homeland Security updates previous chapters and provides new chapters focusing on new threats to homeland security today, such as the growing nexus between crime and terrorism, domestic and international intelligence collection, critical infrastructure and technology, and homeland security planning and resources--as well as the need to reassess the all-hazards dimension of homeland security from a resource and management perspective.* Features new chapters on homeland security intelligence, crime and domestic terrorism, critical infrastructure protection, and resource management* Provides a broader context for assessing threats to homeland security from the all-hazards perspective, to include terrorism and natural disasters* Examines potential targets at home and abroad* Includes a comprehensive overview of U.S. policy, strategy, and technologies for preventing and countering terrorism* Includes self-assessment areas, key terms, summary questions, and application exercises. On-line content includes PPT lessons for each chapter and a solutions key for academic adoptersThreats to Homeland Security, Second Edition is an excellent introductory text on homeland security for educators, as well as a good source of training for professionals in a number of homeland security-related disciplines.
  • Produktdetails
  • Verlag: Wiley / Wiley & Sons
  • Artikelnr. des Verlages: 1W119251810
  • 2. Aufl.
  • Seitenzahl: 576
  • Erscheinungstermin: 23. April 2018
  • Englisch
  • Abmessung: 249mm x 175mm x 28mm
  • Gewicht: 998g
  • ISBN-13: 9781119251811
  • ISBN-10: 1119251818
  • Artikelnr.: 51003686
Autorenporträt
Richard J. Kilroy, Jr., is an Assistant Professor of Politics at Coastal Carolina University in Conway, SC where he teaches courses in Intelligence Operations, Intelligence Analysis, Terrorism and Political Violence, Security Management and Risk Assessment, Homeland Security, and U.S.-Latin American Relations in support of Information Systems Technology, Political Science, and Intelligence and National Security Studies degree programs. He spent 23 years in active duty as an Army Intelligence and Latin America Foreign Area Officer.
Inhaltsangabe
Notes on Contributors xiiiPreface xviAcknowledgments xxiii1. The Changing Nature of National Security 1Introduction 21.1 Foundations of American Security Policy 21.1.1 Geopolitics at the Beginning of the Twentieth Century 31.1.2 National Security and World War II 6Self-Check 81.2 Security in the Cold War Era 81.2.1 Bipolarity versus Multipolarity 101.2.2 Containing Communism 121.2.3 Non-Communist Threats 16Self-Check 171.3 Security in the Post-Cold War Era: Pre-9/11 171.3.1 Changing Threats 181.3.2 New Conflicts, New Responses 181.3.3 Reorganization of National Security Policy 20Self-Check 211.4 National Security and Terrorism: Post-9/11 211.4.1 Globalization and Geopolitics 221.4.2 The Bush Administration's Global War on Terrorism 241.4.3 The Obama Administration's New NationalSecurity Strategy 261.4.4 Homeland Security and National Security 27Self-Check 28Summary 29Key Terms 30Assess Your Understanding 35Summary Questions 35Applying This Chapter 36You Try It 372. Reassessing the All-Hazards Perspective 38Introduction 392.1 Natural Disasters: Things We Can Expect to Happen 392.1.1 The History of Natural Disasters in the United States 402.1.2 Natural Disaster Response 412.1.3 Natural Disasters in a Post-9/11 World 44Self-Check 462.2 Accidental Hazards: Things We Can Try to Prevent 462.2.1 History of Accidental Hazards in the United States 462.2.2 Accidental Hazard Prevention and Response 482.2.3 Accidental Hazards in a Post-9/11 World 50Self-Check 512.3 Man-Made Hazards: Things We Hope Don't Happen 512.3.1 History of Man-Made Disasters Caused byHuman Error in the United States 522.3.2 Man-Made Disaster Mitigation and Response 532.3.3 Man-Made Disasters in a Post-9/11 World 55Self-Check 562.4 Reassessing the All-Hazards Perspective and Disasters 56Self-Check 59Summary 59Key Terms 60Assess Your Understanding 62Summary Questions 62Applying This Chapter 63You Try It 643. Us Homeland Security Interests 65Introduction 663.1 What Is Homeland Security? 663.1.1 The Merging of Traditions 673.1.2 Prevailing Homeland Security Theories 71Self-Check 763.2 Additional Context for Homeland Security 773.2.1 Urban Versus Rural 773.2.2 Technologies 783.2.3 Political and Economic Factors 793.2.4 Security Versus Civil Liberties 81Self-Check 843.3 Homeland Security Enterprise 843.3.1 Federal Partners 853.3.2 State and Local Partners 903.3.3 Whole Community Partners 91Self-Check 973.4 Revisiting the All-Hazards Approach 98Self-Check 100Summary 101Key Terms 101Assess Your Understanding 105Summary Questions 105Applying This Chapter 106You Try It 1084. Understanding Threat Assessments 109Introduction 1104.1 Background on Threat Assessments and Risk Management 1114.1.1 Risk Management and Threat Assessment from theAll-Hazards Perspective 1114.1.2 Assessing Threats and Civil Liberties 1134.1.3 Homeland Security Risk Management Doctrine 114Self-Check 1164.2 A General Framework of Analysis: What to Assess 1164.2.1 The Disaster Impact Process 1174.2.2 Pre-Impact Conditions 1174.2.3 Event-Specific Conditions 1204.2.4 Final Thoughts on What to Assess 122Self-Check 1224.3 A Matrix Approach: How to Assess 1234.3.1 Risk Matrices 1244.3.2 Composite Exposure Indicator 1274.3.3 HAZUS 1284.3.4 Vulnerability Assessments 1284.3.5 Threat and Hazard Identification and RiskAssessment 1294.3.6 Final Thoughts on How to Assess 130Self-Check 1334.4 The Whole-Community Approach of the NationalPreparedness System 1334.4.1 Prevention 1364.4.2 Protection 1374.4.3 Mitigation 1374.4.4 Response 1394.4.5 Recovery 140Self-Check 143Summary 144Key Terms 144Assess Your Understanding 148Summary Questions 148Applying This Chapter 148You Try It 1505. Critical Infrastructure Security, Emergency Preparedness, and Operational Continuity .151Introduction 1525.1 Defining Critical Infrastructure 1525.1.1 Defining the Sectors 1535.1.2 Information Sharing and Analysis Centers 154Self-Check 1575.2 Known Threats to Critical Infrastructure 1575.2.1 Natural Hazard Threats 1585.2.2 Terrorism and Human Threats 1625.2.3 Nontraditional Aviation Technology (NTAT) 1655.2.4 Cybersecurity Threats 166Self-Check 1685.3 Risk Identification, Analysis, and Management 1695.3.1 Inventory and Critical Assets and Functions 1695.3.2 Intelligence Functions .171Self-Check 1755.4 Emergency Operations and Continuity of Planning 1755.4.1 Critical Infrastructure Protection Planning and the All-Hazards Perspective 1755.4.2 Crisis Management Team 177Self-Check 178Summary 178Key Terms 179Assess Your Understanding 181Summary Questions 181Applying This Chapter 181You Try It 1826. State Actors and Terrorism 183Introduction 1846.1 Defining Terrorism and Other Forms of Collective Violence 1846.1.1 Legal Definitions of Terrorism 1906.1.2 The Heyday of State-Sponsored Terrorist Groups 1936.1.3 The End of the Cold War, Globalization, andthe Decline of State Sponsorship 195Self-Check 1976.2 Contemporary State Sponsors of Terrorism 1976.2.1 Iran 1996.2.2 Sudan 2016.2.3 Syria 203Self-Check 2056.3 International and Domestic Responses to State-Sponsored Terror 2056.3.1 United Nations Security Council (UNSC) 2056.3.2 Other Multilateral Efforts 2066.3.3 US International Counterterrorism Strategy 208Self-Check 210Summary 211Key Terms 214Assess Your Understanding 216Summary Questions 216Applying This Chapter 217You Try It 2187. Non-State Actors and Terrorism 219Introduction 2207.1 Explaining the Different Types of Non-state Actors 2207.1.1 Defining Violent Non-state Actors .2207.1.2 Defining Non-state Terrorism 2217.1.3 Terrorism and "Terrorists" 221Self-Check 2237.2 Non-state Terrorism as a Security Threat 2237.2.1 Reasons for the Prevalence of Violent Non-state Actors 2247.2.2 Non-state Terrorism as a Domestic and International Threat 2257.2.3 Assessing the Threat Posed by Violent Non-state Actors 227Self-Check 2287.3 The Typology of Violent Non-state Actors 2287.3.1 Political/Ideological Terrorism 2317.3.2 Ethno-Nationalist or Separatist Terrorism 2367.3.3 Religious Terrorism 2407.3.4 Motivational Trends in Non-state Terrorism 247Self-Check 2487.4 Methods of Non-state Violence 2487.4.1 Conventional and Unconventional Methods ofNon-state Violence 249Self-Check 2557.5 International Strategies for Countering Non-state Violence 2557.5.1 The Military Option 2577.5.2 The Political Option 259Self-Check 260Summary 261Key Terms 261Assess Your Understanding 265Summary Questions 265Applying This Chapter 266You Try It 2678. Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare 268Introduction 2698.1 The Cyber Threat 2698.1.1 Defining Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare 2718.1.2 What Can Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Do? 272Self-Check 2758.2 8.2 Assessing Capability and Intent 2758.2.1 Who Can Conduct Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare? 2758.2.2 Tools of Cyber-Terrorism 279Self-Check 2818.3 Assessing Consequences 2818.3.1 Why America Is Vulnerable to Cyber-Attacks 2838.3.2 The Impact of a Cyber-Terrorist Attack 285Self-Check 2868.4 Determining Defenses against Cyber-Crime , Cyber-Terrorism, and Cyber-Warfare 2868.4.1 The Government and Private Sector Response to Threats in Cyberspace 2888.4.2 The US Military Response to Cyber-Warfare 2918.4.3 The New Battlefields of Cyber-Warfare 295Self-Check 296Summary 296Key Terms 297Assess Your Understanding 301Summary Questions 301Applying This Chapter 302You Try It 3039. Weapons of Mass Destruction and Disruption 304Introduction 3059.1 Chemical Weapons and Their Consequences 3059.1.1 History of Chemical Weapons Use 3079.1.2 Chemical Agents and Their Effects 3089.1.3 The Threat of Chemical Weapons and Terrorism 311Self-Check 3139.2 Biological Weapons and Their Consequences 3139.2.1 History of Biological Weapons Use 3139.2.2 Biological Agents and Their Effects 3159.2.3 The Threat of Biological Weapons and Terrorism 316Self-Check 3199.3 Nuclear and Radiological Weapons and Their Consequences 3199.3.1 Radiological Materials and Their Effects 3219.3.2 History of Nuclear Material Discoveries and Weapons Development 3239.3.3 The Threat of Nuclear Weapons and Terrorism 3249.3.4 Managing Radiological Incidents and TheirAftermath 327Self-Check 329Summary 329Key Terms 330Assess Your Understanding 332Summary Questions 332Applying This Chapter 333You Try It 33410. Domestic Terrorism 335Introduction 33610.1 Terrorism in the United States: Across Time and Space 33710.1.1 Eighteenth- to Twentieth-Century Terrorism 33710.1.2 Late Twentieth-Century Terrorism 33910.1.3 Early Twenty-First-Century Terrorism 340Self-Check 34410.2 Homegrown "Leaderless Resistance" and Foreign Terrorists 34410.2.1 Understanding Leaderless Resistance 34510.2.2 Origins of Lone Wolves 34610.2.3 Assessing the Lone-Wolf Threat in theUnited States 34710.2.4 Foreign Terrorist Organizations 34910.2.5 Foreign Organizers 350Self-Check 35210.3 Crime and Terrorism 35310.3.1 Why Would Terrorism and Crime Converge? 35310.3.2 Where Terrorism and Crime Converge andWhy It Matters 354Self-Check 35610.4 The US Domestic Response to Terrorism 35610.4.1 Countering Violent Extremism (CVE) 35710.4.2 The Lead Agency Approach and Counterterrorism 35910.4.3 Police and Counterterrorism 360Self-Check 364Summary 365Key Terms 366Assess Your Understanding 369Summary Questions 369Applying This Chapter 370You Try It 37111. Enablers of Mass Effects 372Introduction 37311.1 The Power of Information and Ideas 37311.1.1 Ideas and Terrorism 37611.1.2 Ideas and Disasters 378Self-Check 38111.2 Media and Terrorism 38111.2.1 The Internet and Terrorism 38211.2.2 Social Media, Terrorism, and Disaster Response 386Self-Check 39511.3 The Role of Educational Institutions 39511.3.1 Alternative Educational Institutions 39611.3.2 International Students in the United States 396Self-Check 399Summary 399Key Terms 400Assess Your Understanding 402Summary Questions 402Applying This Chapter 402You Try It 40412. Homeland Security Intelligence 405Introduction 40612.1 Intelligence and Homeland Security 40612.1.1 NYPD Surveillance of Muslim Communities 40612.1.2 What Is Intelligence? 40712.1.3 The Limited Historical Role of Intelligence in Domestic Affairs 411Self-Check 41212.2 The Structure of Intelligence Organizations 41212.2.1 National-Level Intelligence Organizations 41412.2.2 The Department of Homeland Security and Intelligence 41812.2.3 State, Local, and Tribal Government 42012.2.4 The Private Sector 42212.2.5 Intelligence Collaboration 423Self-Check 42712.3 Methods of Collecting Intelligence Information 42712.3.1 Human Intelligence Collection 42912.3.2 Open-Source Intelligence Collection 43012.3.3 Technical Intelligence Collection .432Self-Check 43612.4 Challenges to Homeland Security Intelligence 43612.4.1 Balancing Liberty and Security in HomelandSecurity Intelligence 43712.4.2 Intelligence Support to Disaster Relief 440Self-Check 441Summary 441Key Terms 443Assess Your Understanding 446Summary Questions 446Applying This Chapter 447You Try It 44813. Homeland Security Planning and Resources 449Introduction 45013.1 Basics of Homeland Security Planning 45013.1.1 Planning for Homeland Security Activities 45113.1.2 Quadrennial Homeland Security Review 45213.1.3 Expanding on the QHSR: The DHS Strategic Plan 45413.1.4 Final Thoughts on the QHSR 456Self-Check 45713.2 Coordinating Homeland Security Planning 45713.2.1 The Six-Step Planning Process 45813.2.2 Performance Measurement: The Challenging "Art" of Measuring Success in Homeland Security Planning 46113.2.3 SMART Measurement 462Self-Check 46313.3 The Logic Model: A Process Framework to Visually Demonstrate the Performance Measurement Process 46313.3.1 Components of a Logic Model 46413.3.2 Challenges in Performance Measurement 467Self-Check 46713.4 Education in Homeland Security .46813.4.1 Homeland Security Education Core Curricula 46813.4.2 Research in Homeland Security: Trends and Future Thoughts 471Self-Check 473Summary 473Key Terms 474Assess Your Understanding 476Summary Questions 476Applying This Chapter 476You Try It 478References 479Index 538