|
Chapter 1 Understanding a New Global Priority: Terrorism, Homeland Security, and Emergency Management |
|
|
1 | (30) |
|
|
2 | (1) |
|
1.1 Terrorism Is the New Normal |
|
|
2 | (4) |
|
1.1.1 Boston Marathon Bombing |
|
|
2 | (1) |
|
1.1.2 San Bernardino Regional Center Shooting |
|
|
2 | (1) |
|
1.1.3 Orlando Nightclub Shooting |
|
|
3 | (1) |
|
1.1.4 Other Notable Attacks |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
6 | (3) |
|
1.2.1 Reasons to Anticipate More Attacks |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
1.4 The Nature of Homeland Security |
|
|
11 | (5) |
|
1.4.1 Definitions of Homeland Security |
|
|
12 | (1) |
|
1.4.2 Agreement About Homeland Security |
|
|
12 | (4) |
|
|
16 | (1) |
|
1.5 Disciplines Involved in Homeland Security and the Emergency Management Profession |
|
|
16 | (15) |
|
1.5.1 The Role of Emergency Management |
|
|
17 | (4) |
|
1.5.2 Important Terminology |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Assess Your Understanding |
|
|
24 | (1) |
|
|
25 | (1) |
|
Be a Homeland Security Professional |
|
|
26 | (1) |
|
|
26 | (2) |
|
|
28 | (3) |
|
Chapter 2 Identifying Terrorism: Ideologically Motivated Acts of Violence and Their Relation to Disasters |
|
|
31 | (16) |
|
|
32 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
2.2 Common Characteristics Of Terrorism |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (3) |
|
|
38 | (1) |
|
2.4 Relation of Terrorism to Other Disasters |
|
|
38 | (9) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Assess Your Understanding |
|
|
43 | (1) |
|
|
44 | (1) |
|
Be a Homeland Security Professional |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Chapter 3 Recognizing the Causes of Terrorism: Differing Perspectives and the Role of Ideology |
|
|
47 | (22) |
|
|
48 | (1) |
|
3.1 Frequently Mentioned Causes of Terrorism |
|
|
48 | (3) |
|
3.1.1 Historical Grievances |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (5) |
|
|
52 | (1) |
|
|
52 | (1) |
|
3.2.3 Political Functions |
|
|
53 | (1) |
|
3.2.4 Political Structure |
|
|
54 | (2) |
|
|
56 | (1) |
|
3.3 Cultural and Religious Causes |
|
|
56 | (4) |
|
3.3.1 Cultural Dimensions of Terrorism |
|
|
56 | (1) |
|
3.3.2 The Role of Religion in Terrorism |
|
|
57 | (3) |
|
|
60 | (1) |
|
|
60 | (9) |
|
3.4.1 The Nature of Ideologies |
|
|
61 | (1) |
|
3.4.2 Ideological Dimensions of Terrorism |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Assess Your Understanding |
|
|
64 | (1) |
|
|
65 | (1) |
|
Be a Homeland Security Professional |
|
|
65 | (1) |
|
|
66 | (2) |
|
|
68 | (1) |
|
Chapter 4 Comprehending Terrorists and Their Behavior: Who They are and What They Do |
|
|
69 | (26) |
|
|
70 | (1) |
|
4.1 Terrorists and Terrorist Organizations |
|
|
70 | (5) |
|
4.1.1 Terrorist Classification |
|
|
73 | (2) |
|
|
75 | (1) |
|
4.2 Personal Characteristics |
|
|
75 | (3) |
|
4.2.1 Distinct Differences |
|
|
76 | (2) |
|
|
78 | (1) |
|
4.3 The Behavior and Tactics of Terrorists |
|
|
78 | (17) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (2) |
|
|
81 | (1) |
|
4.3.5 False Documents, Travel, and Safe Haven |
|
|
82 | (1) |
|
4.3.6 Code Words and Secret Communications |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
4.3.9 Acts of Civil Disorder or Terrorisms |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Assess Your Understanding |
|
|
89 | (1) |
|
|
90 | (1) |
|
Be a Homeland Security Professional |
|
|
91 | (1) |
|
|
91 | (2) |
|
|
93 | (2) |
|
Chapter 5 Uncovering the Dynamic Nature of Terrorism: History of Violence and Change Over Time |
|
|
95 | (20) |
|
|
96 | (1) |
|
5.1 The Appearance of Terrorism |
|
|
96 | (2) |
|
|
98 | (1) |
|
5.2 The Evolution of Terrorism Abroad |
|
|
98 | (4) |
|
|
101 | (1) |
|
5.3 Terrorism and the United States |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
105 | (10) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Assess Your Understanding |
|
|
111 | (1) |
|
|
112 | (1) |
|
Be a Homeland Security Professional |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Chapter 6 Evaluating a Major Dilemma: Terrorism, the Media, and Censorship |
|
|
115 | (20) |
|
|
116 | (1) |
|
6.1 Changes in the Media Over Time |
|
|
116 | (1) |
|
|
117 | (1) |
|
6.2 Terrorists and the Media |
|
|
117 | (3) |
|
|
120 | (1) |
|
6.3 The Media and Terrorism |
|
|
120 | (3) |
|
|
123 | (1) |
|
6.4 Government and the Media |
|
|
123 | (3) |
|
|
126 | (1) |
|
6.5 Censorship and Self-Censorships |
|
|
126 | (9) |
|
|
129 | (1) |
|
|
129 | (1) |
|
Assess Your Understanding |
|
|
130 | (1) |
|
|
131 | (1) |
|
Be a Homeland Security Professional |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Chapter 7 Contemplating a Quandary: Terrorism, Security and Liberty |
|
|
135 | (18) |
|
|
136 | (1) |
|
7.1 War, Terrorism, and Law |
|
|
136 | (2) |
|
|
138 | (1) |
|
|
138 | (4) |
|
|
142 | (1) |
|
7.3 Cases and Considerations |
|
|
142 | (11) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Assess Your Understanding |
|
|
149 | (1) |
|
|
150 | (1) |
|
Be a Homeland Security Professional |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
Chapter 8 Preventing Terrorist Attacks: Root Causes, Law, Intelligence, and Counterterrorism |
|
|
153 | (28) |
|
|
154 | (1) |
|
8.1 Addressing Root Causes |
|
|
154 | (2) |
|
|
156 | (1) |
|
8.2 Policy and Legislation |
|
|
156 | (5) |
|
|
157 | (1) |
|
8.2.2 Legislation After 9/11 |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (6) |
|
8.3.1 The Need for Intelligence |
|
|
161 | (1) |
|
8.3.2 The Intelligence Cycle |
|
|
162 | (1) |
|
8.3.3 Challenges Facing the Intelligence Community |
|
|
163 | (3) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (14) |
|
|
170 | (1) |
|
8.4.2 Learning from Other Nations |
|
|
171 | (2) |
|
8.4.3 Controversy Regarding Counterterrorism |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Assess Your Understanding |
|
|
175 | (1) |
|
|
176 | (1) |
|
Be a Homeland Security Professional |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (2) |
|
Chapter 9 Securing the Nation: Border Control and Sector Safety |
|
|
181 | (26) |
|
|
182 | (1) |
|
|
182 | (7) |
|
9.1.1 What Is the Border? |
|
|
182 | (1) |
|
|
183 | (2) |
|
9.1.3 Participants Involved in Border Control |
|
|
185 | (1) |
|
9.1.4 Measures to Secure Borders |
|
|
186 | (2) |
|
|
188 | (1) |
|
9.2 Protecting Air Transportation |
|
|
189 | (3) |
|
|
192 | (1) |
|
9.3 Rail Transportation Security |
|
|
192 | (3) |
|
|
195 | (1) |
|
9.4 Protection of Sea Ports and Maritime Transportation |
|
|
195 | (4) |
|
|
198 | (1) |
|
9.5 Protection of Petrochemical Facilities |
|
|
199 | (8) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Assess Your Understanding |
|
|
202 | (1) |
|
|
203 | (1) |
|
Be a Homeland Security Professional |
|
|
203 | (1) |
|
|
204 | (2) |
|
|
206 | (1) |
|
Chapter 10 Protecting Against Potential Attacks: Threat Assessment Mitigation, and Other Measures |
|
|
207 | (22) |
|
|
208 | (1) |
|
|
208 | (9) |
|
10.1.1 Critical Infrastructure, Key Assets, and Soft Targets |
|
|
208 | (2) |
|
10.1.2 Collaboration with Others to Identify Threats |
|
|
210 | (2) |
|
10.1.3 Points of Consideration |
|
|
212 | (5) |
|
|
217 | (1) |
|
10.2 Structural and Nonstructural Mitigation |
|
|
217 | (12) |
|
10.2.1 Architectural Design and Construction |
|
|
218 | (1) |
|
10.2.2 Zoning and Set-back Regulations |
|
|
219 | (1) |
|
10.2.3 Other Protective Measures |
|
|
220 | (3) |
|
|
223 | (1) |
|
|
223 | (1) |
|
Assess Your Understanding |
|
|
224 | (1) |
|
|
225 | (1) |
|
Be a Homeland Security Professional |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Chapter 11 Preparing For the Unthinkable: Efforts For Readiness |
|
|
229 | (30) |
|
|
230 | (1) |
|
11.1 The Importance and Nature of Preparedness |
|
|
230 | (7) |
|
11.1.1 Federal and State Initiatives |
|
|
231 | (6) |
|
|
237 | (1) |
|
11.2 Foundations of Preparedness |
|
|
237 | (5) |
|
11.2.1 Preparedness Councils |
|
|
238 | (1) |
|
|
239 | (1) |
|
11.2.3 Budgets and Grants |
|
|
239 | (2) |
|
11.2.4 Emergency Operations Centers |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (3) |
|
|
245 | (1) |
|
|
245 | (14) |
|
|
245 | (2) |
|
|
247 | (2) |
|
11.4.3 Community Education |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Assess Your Understanding |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
|
|
255 | (1) |
|
|
255 | (3) |
|
|
258 | (1) |
|
Chapter 12 Responding to Attacks: Important Functions and Coordination Mechanisms |
|
|
259 | (28) |
|
|
260 | (1) |
|
12.1 Behavior and Major Priorities |
|
|
260 | (10) |
|
12.1.1 Initial Investigation and Apprehension |
|
|
261 | (2) |
|
12.1.2 Safety and Security |
|
|
263 | (3) |
|
|
266 | (1) |
|
12.1.4 Medical Care and Triage |
|
|
266 | (1) |
|
|
267 | (1) |
|
12.1.6 Closing the Investigation |
|
|
268 | (2) |
|
|
270 | (1) |
|
12.2 Other Crucial Functions |
|
|
270 | (5) |
|
12.2.1 Warning, Intelligence, and Public Information |
|
|
271 | (2) |
|
12.2.2 Evacuation and Sheltering |
|
|
273 | (1) |
|
|
274 | (1) |
|
12.3 Coordination Mechanisms |
|
|
275 | (12) |
|
12.3.1 The Incident Command System |
|
|
275 | (2) |
|
12.3.2 Strengths and Weakness of ICS |
|
|
277 | (1) |
|
12.3.3 Utilization of Emergency Operations Centers |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Assess Your Understanding |
|
|
282 | (1) |
|
|
283 | (1) |
|
Be a Homeland Security Professional |
|
|
283 | (1) |
|
|
284 | (2) |
|
|
286 | (1) |
|
Chapter 13 Recovering From Impacts: Short- and Long-Term Measures |
|
|
287 | (24) |
|
|
288 | (1) |
|
13.1 Initial Recovery Steps |
|
|
288 | (4) |
|
|
288 | (1) |
|
13.1.2 Damage Assessment Concerns and Procedures |
|
|
289 | (1) |
|
13.1.3 Declaring a Disaster and Seeking Help |
|
|
290 | (2) |
|
|
292 | (1) |
|
13.2 Key Recovery Functions |
|
|
292 | (6) |
|
13.2.1 Mass Fatality Management |
|
|
292 | (2) |
|
|
294 | (2) |
|
|
296 | (1) |
|
|
297 | (1) |
|
13.3 The Importance of Disaster Assistance |
|
|
298 | (13) |
|
13.3.1 Volunteer and Donation Management |
|
|
298 | (2) |
|
13.3.2 Individual and Public Assistance |
|
|
300 | (2) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Assess Your Understanding |
|
|
305 | (1) |
|
|
306 | (1) |
|
Be a Homeland Security Professional |
|
|
307 | (1) |
|
|
307 | (3) |
|
|
310 | (1) |
|
Chapter 14 Assessing Significant Threats: Wmd and Cyberterrorism |
|
|
311 | (32) |
|
|
312 | (1) |
|
14.1 The Future of Terrorism and WMD |
|
|
312 | (5) |
|
|
317 | (1) |
|
14.2 Radiological Weapons |
|
|
317 | (4) |
|
|
321 | (1) |
|
|
321 | (4) |
|
|
325 | (1) |
|
|
325 | (5) |
|
|
329 | (1) |
|
|
330 | (3) |
|
|
333 | (1) |
|
|
333 | (10) |
|
|
337 | (1) |
|
|
337 | (1) |
|
Assess Your Understanding |
|
|
338 | (1) |
|
|
339 | (1) |
|
Be a Homeland Security Professional |
|
|
339 | (1) |
|
|
340 | (2) |
|
|
342 | (1) |
|
Chapter 15 Looking Toward the Future: Challenges and Opportunities |
|
|
343 | (20) |
|
|
344 | (1) |
|
15.1 The Lessons of this Book |
|
|
344 | (4) |
|
|
348 | (1) |
|
15.2 Accountability in Homeland Security |
|
|
348 | (3) |
|
|
351 | (1) |
|
15.3 Clarification of Homeland Security Policy |
|
|
351 | (3) |
|
|
353 | (1) |
|
15.4 Research Needs and Recommendations for the Future |
|
|
354 | (9) |
|
15.4.1 Direction for Researchers |
|
|
354 | (2) |
|
15.4.2 Guidance for Practitioners |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
359 | (1) |
|
Assess Your Understanding |
|
|
360 | (1) |
|
|
361 | (1) |
|
Be a Homeland Security Professional |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
Glossary |
|
363 | (14) |
Index |
|
377 | |