Homeland Security and Terrorism
Häftad, Engelska, 2018
2 279 kr
Produktinformation
- Utgivningsdatum2018-04-09
- Mått216 x 276 x 19 mm
- Vikt789 g
- FormatHäftad
- SpråkEngelska
- Upplaga2
- FörlagPearson Education (US)
- ISBN9780134549170
Tillhör följande kategorier
About our authors Larry K. Gaines is a professor and chair of the Criminal Justice Department at California State University at San Bernardino. He received his doctorate in criminal justice from Sam Houston State University. He has police experience with the Kentucky State Police and the Lexington, Kentucky, Police Department. Additionally, he served as the executive director of the Kentucky Association of Chiefs of Police for 14 years. Dr. Gaines is also a past president of the Academy of Criminal Justice Sciences. His research centers on policing and drugs.In addition to numerous articles, he has coauthored books in the field: Police Operations; Police Administration; Managing the Police Organization; Community Policing: A Contemporary Perspective; Policing Perspectives: An Anthology; Policing in America; Drugs, Crime, and Justice; Criminal Justice in Action; and Readings in White Collar Crime. His current research agenda involves the evaluation of police tactics in terms of their effectiveness in reducing problems and fitting within the community policing paradigm. He is also researching the issue of racial profiling in various California cities.Janine Kremling is an associate professor at California State University San Bernardino. She has taught a wide variety of classes, such as transnational crime, which includes components of homeland security and terrorism. She has also published three textbooks: Cyberspace, Cybersecurity, and Cybercrime (2017) with Amanda Sharp-Parker; Why Students Resist Learning (2016) with Anton Tolman; and Drugs, Crime, and Justice (2014) as coauthor with Larry Gaines.
- 1. Introduction to Homeland SecurityIntroductionAmerican and Terrorist AttacksWhat Is Homeland SecurityHomeland Security Missions and GoalsDefinitional Issues and Homeland SecurityCollateral Benefits from Homeland SecurityThe Scope of Homeland SecurityPre-9/11 Efforts to Improve Homeland SecurityThe 9/11 Commission ReportThe National Strategy for Homeland SecurityIntelligence and WarningBorder and Transportation SecurityDomestic CounterterrorismProtecting Critical InfrastructureDefend against Catastrophic EventsEmergency Preparedness and ResponseLegal InitiativesScience and TechnologyInformation Sharing and SystemsInternational CooperationCosts of Homeland SecurityIndirect CostsSummary2. Homeland Security ApparatusIntroductionDepartment of Homeland SecurityPolitical Considerations in the Creation of the Department of Homeland SecurityWhite House and Congressional OversightAgency Confusion and Mission DistortionThe Structure of the Department of Homeland SecurityDHS Administrative and Support AgenciesTransportation Security AdministrationU.S. Customs and Border ProtectionU.S. Immigration and Customs EnforcementImmigration EnforcementInvestigating Illegal Movement of People and GoodsU.S. Citizenship and Immigration ServicesU.S. Secret ServiceU.S. Coast GuardFederal Emergency Management AgencyFederal Law Enforcement Training CenterDomestic Nuclear Detection OfficeDepartment of Defense and Homeland SecurityState-Level Homeland SecuritySummary3. Overview of National Infrastructure ProtectionIntroductionThreats to Critical InfrastructureFederal Agencies Involved in the Protection of American AssetsScope of American Critical Infrastructure AssetsCritical Infrastructure SectorsNational Critical Infrastructure Prioritization ProgramThe National Infrastructure Protection Plan. Conceptual Operation of Homeland Security ProtectionSet Goals and ObjectivesIdentify InfrastructureAssess and Analyze RisksImplement Risk Management ActivitiesMeasure EffectivenessCritique of the National Infrastructure Protection Plan ModelA Bottom-Up ApproachThe Buffer Zone Protection PlanThe Reality of Critical Infrastructure Protection. States' ResponsibilitiesKey Critical Infrastructure SectorsWater and Wastewater SystemsChemical SectorCommercial Facilities SectorCommunications SectorCritical Manufacturing SectorDams SectorDefense Industrial Base SectorEmergency Services SectorEnergyTransportation SecurityGround TransportationInfrastructure from the Terrorists' ViewpointComplacency. The Threat to Homeland SecuritySummary4. The Legal Aspects of Homeland SecurityIntroductionPresidential Executive Orders and DirectivesExecutive Orders of President ClintonExecutive Orders of President George W. BushExecutive Orders of President Barack ObamaExecutive Orders of President Donald TrumpFederal Antiterrorism StatutesAntiterrorism and Effective Death Penalty Act of 1996The USA Patriot ActU.S. Foreign Intelligence Surveillance CourtSummary5. Political and Social Foundations of TerrorismIntroductionContinuum of Social ConflictDefining TerrorismA Brief History of TerrorismEarly Forms of TerrorismThe French RevolutionLate Nineteenth- and Early Twentieth Century TerrorismTerrorism in the Late Twentieth CenturyTerrorism in Early AmericaTerrorism TodayThe Roots and Causes of TerrorismGlobalizationReligionIsraeli-Palestinian ConflictRussian Invasion of AfghanistanWahhabismAuthoritarian GovernmentsFailed States and TerrorismIndividual Explanations of TerrorismTypes of TerrorismState-Sponsored TerrorismDissent TerrorismTerrorists on the Left and RightReligious TerrorismCriminal TerrorismLevel of Terrorist ActivitiesStrategies for Dealing with TerrorismCrushing Terrorist Groups UnilaterallyCrushing Terrorist Groups MultilaterallyContainmentDefenseDiversionDelegitimationTransforming Terrorist Breeding GroundsWomen TerroristsSummary6. The Nature and Geography of Terrorist Groups, State Sponsors of Terror, and Safe HavensIntroductionForeign Terrorist OrganizationsMiddle East and North Africa GroupsAfrican GroupsAsian GroupsLatin American GroupsEuropean GroupsTerrorism in AmericaRadical Muslim-Inspired TerrorismRight-Wing Terrorists and MilitiasEco-Terrorism and Animal Rights GroupsSummary7. Transnational Organized Crime and TerrorismIntroductionDefining Transnational Organized CrimeDistinguishing Types or Categories of CrimeImpact of Transnational Organized CrimeConditions Facilitating Transnational Organized CrimeNetworking. The Etiology of Transnational Organized Crime GroupsPolitical ModelsEconomic ModelsSocial ModelsHow Transnational Crime Is OrganizedStandard HierarchyRegional HierarchyClustered HierarchyCore GroupCriminal NetworkTransnational Organized Crime ActivitiesDrug TraffickingHuman TraffickingSmuggling of Technology and WMD MaterialsArms TraffickingTrafficking in Precious GemsPiracyNon-Drug Contraband SmugglingCounterfeitingTheftFinancial FraudEnvironmental CrimesFailed States and Transnational Organized Crime and TerrorismLinks between Transnational Organized Crime and Terrorist OrganizationsThe Continuum of Terrorism and Transnational Organized CrimeIncentives for TOC and Terrorist Organizations to CooperateSummary8. Intelligence and Counterintelligence and TerrorismIntroductionIntelligence Failure - What Does It Mean?AdvisoryThe Director of National IntelligenceNational Counterterrorism CenterConceptual Overview of Homeland Security IntelligenceTypes of Intelligence Collection ActivitiesHuman IntelligenceSignals IntelligenceMeasures and Signatures IntelligenceImagery IntelligenceOpen-Source IntelligenceAgencies within the American Intelligence CommunityCentral Intelligence AgencyDefense Intelligence AgencyDepartment of EnergyDepartment of Homeland SecurityDepartment of StateDepartment of the TreasuryDrug Enforcement AdministrationFederal Bureau of InvestigationNational Geospatial-Intelligence AgencyNational Reconnaissance OfficeNational Security AgencyArmed Services IntelligenceIntersection of Policy Decisions and Intelligence. The Intelligence CycleJoint Special Operations Command Specialized Military Antiterrorism AgenciesCounterintelligenceThe Globalization of IntelligenceDomestic Industrial EspionageSummary9. Homeland Security and Weapons of Mass DestructionThe National Terrorism Advisory System. Warning the American PeopleIntroductionDefining Weapons of Mass DestructionNational Terrorism Advisory SystemHistory of the Deployment of WMDsHistorical Precedents for Biological WMDsHistorical Precedents for Chemical WMDsThe Threat of Nuclear Weapons of Mass Destruction. Destructiveness, Potential for Use, and AvailabilityNuclear and Radiological WMDsAvailability of Nuclear MaterialsNuclear Bombs or WeaponsThe Spread of Nuclear Material and InformationSmuggling Nuclear Weapons and MaterialsTerrorist Attacks Using Dirty Bombs and Attacks on Nuclear FacilitiesBiological Weapons of Mass DestructionTypes of Biological WeaponsHow Biological Weapons WorkCreating Biological WeaponsThreat Assessment and Biological WeaponsChemical Weapons of Mass DestructionAdvantages of Chemical WeaponsWeaponizing ChemicalsFactors Constraining Terrorists from Using WMDsRelative Destructiveness of WMDsExamining Which Groups Might Use WMDsSummary10. Cybercrime and TerrorismIntroductionMethods of Attacking Cyber InfrastructureTools Used in Hacking and CyberattacksWhat Is Cyber Terrorism?Distinguishing Hacking, Cybercrime, Cyber Terrorism, and Cyber WarfareCybercrimeCyber WarfarePoints of CyberattacksCyber TerrorismPhysical Attacks on Communications InfrastructureSignificant Cyber GapsDeterring Cyber Intrusions and AttacksTerrorists' Use of the InternetTerrorists and Social MediaOverview of Terrorist WebsitesAudiencesHow Terrorists Use the InternetTerrorists and Social MediaAgencies Charged with Combating Cyber TerrorismFBI's Cybercrime DivisionDepartment of Homeland Security's Cyber Security SystemsSummary11. Terrorist FinancingIntroductionTerrorist Financing of the 9/11 AttacksDistinguishing Terrorist Financing and Money LaunderingFederal Mechanisms Used to Counter Terrorist Financing and Money LaunderingU.S. Enforcement ActionsFinancial Action Task Force on Money LaunderingMeans and Methods of Terrorist Financial TransactionsEarning and Acquiring ResourcesDonor Support of TerrorismCriminal ActivityCharitiesLegitimate BusinessesMoving or Laundering MoneyPrecious CommoditiesBanking and Wire TransfersMoney Brokers or HawaladarsStoring or Banking MoneyBlack Market Oil and GasSaudi Arabia's Financing of Terrorism. An American ConundrumIdentity Fraud and TheftReal ID ActBreeder Documents and the Mechanics of Identity FraudTerrorists' Financial NeedsSummary12. Border Security and ImmigrationIntroductionImmigrationOriginating Countries of American ImmigrantsBorder Security IssuesIllegal Border Migration. A Case Study in TucsonBorder ApprehensionsTerrorist Infiltration via Illegal ImmigrationBorder Protection Philosophy after 9/11Secure Border InitiativeThe Border Security and Immigration Enforcement Improvements Executive OrderIncrease in Customs and Border Protection AgentsExpanded Detention and Removal CapabilitiesImproved TechnologyIncreased Infrastructure Protection (Fencing)Enhanced Enforcement of Immigration Laws. Interior Enforcement as DeterrenceFormulating a Coherent Policy for Border SecurityUS-Visit ProgramTypes of VisasNon-Visa or Visa Waiver ProgramVehicular Screening at Border CrossingsPort and Marine SecurityCTPAT and CSISummary13. The Response to Homeland Security IncidentsIntroductionFEMA. The Primary Response Agency When Disaster OccursResponse Goals and ObjectivesNational Response FrameworkNational Response Framework. An AnalysisLocal Responsibilities under the National Response FrameworkState Responsibilities under the National Response FrameworkFederal Responsibilities under the National Response FrameworkResponse as Dictated by the National Response FrameworkPreventionProtection and Prevention Core CapabilitiesMitigation/RecoveryRoles and Responsibilities of Community EntitiesResponseRecoveryCritique of Past Responses and the National Response FrameworkProcedures for Activating Federal Assistance in an EmergencyNational Incident Management SystemPreparednessCommunications and Information ManagementResource ManagementCommand and Management at an IncidentOngoing Management and MaintenanceMedical Response to Critical IncidentsNational Response TeamsSummary14. Homeland Security and PolicingIntroductionCommunity Policing and Homeland SecurityPolice Departments and Homeland Security. Where Are We?Policing Muslim CommunitiesHomeland Security Public Education ProgrammingExamining Police Calls for Service for Terrorist LeadsPolice Efforts to Safeguard Local Critical InfrastructureCritical Incident Response PlansPartnerships between Law Enforcement and Critical Infrastructure Security PersonnelPrivate SecurityPolice Organization and TerrorismIntelligence-Led PolicingThe Intelligence ProcessSources of Intelligence Raw DataIntelligence ProductsTactical and Strategic IntelligenceFusion CentersPolice Tactical ConsiderationsImmediate Police Response to an Act of TerrorismNew York City. A Case Study in Local Homeland SecuritySummary