
Homeland Security and Terrorism, 2nd edition
Your access includes:
- Search, highlight, and take notes
- Easily create flashcards
- Use the app for access anywhere
- 14-day refund guarantee
$10.99per month
4-month term, pay monthly or pay $43.96
Learn more, spend less
-
Listen on the go
Learn how you like with full eTextbook audio
-
Special partners and offers
Enjoy perks from special partners and offers for students
-
Find it fast
Quickly navigate your eTextbook with search
-
Stay organized
Access all your eTextbooks in one place
-
Easily continue access
Keep learning with auto-renew
Overview
Homeland Security covers homeland security and terrorism, examining the threats and operations of terrorist organizations along with US counterterrorism efforts. This revision analyzes issues such as immigration and border security, cybercrime, cybersecurity, disaster response system (FEMA), and more.
Published by Pearson (July 14th 2021) - Copyright © 2019
ISBN-13: 9780137516988
Subject: Criminal Justice
Category: Terrorism & Homeland Security
Table of contents
1. Introduction to Homeland Security
Introduction
American and Terrorist Attacks
What Is Homeland Security
Homeland Security Missions and Goals
Definitional Issues and Homeland Security
Collateral Benefits from Homeland Security
The Scope of Homeland Security
Pre-9/11 Efforts to Improve Homeland Security
The 9/11 Commission Report
The National Strategy for Homeland Security
Intelligence and Warning
Border and Transportation Security
Domestic Counterterrorism
Protecting Critical Infrastructure
Defend against Catastrophic Events
Emergency Preparedness and Response
Legal Initiatives
Science and Technology
Information Sharing and Systems
International Cooperation
Costs of Homeland Security
Indirect Costs
Summary
2. Homeland Security Apparatus
Introduction
Department of Homeland Security
Political Considerations in the Creation of the Department of Homeland Security
White House and Congressional Oversight
Agency Confusion and Mission Distortion
The Structure of the Department of Homeland Security
DHS Administrative and Support Agencies
Transportation Security Administration
U.S. Customs and Border Protection
U.S. Immigration and Customs Enforcement
Immigration Enforcement
Investigating Illegal Movement of People and Goods
U.S. Citizenship and Immigration Services
U.S. Secret Service
U.S. Coast Guard
Federal Emergency Management Agency
Federal Law Enforcement Training Center
Domestic Nuclear Detection Office
Department of Defense and Homeland Security
State-Level Homeland Security
Summary
3. Overview of National Infrastructure Protection
Introduction
Threats to Critical Infrastructure
Federal Agencies Involved in the Protection of American Assets
Scope of American Critical Infrastructure Assets
Critical Infrastructure Sectors
National Critical Infrastructure Prioritization Program
The National Infrastructure Protection Plan. Conceptual Operation of Homeland Security Protection
Set Goals and Objectives
Identify Infrastructure
Assess and Analyze Risks
Implement Risk Management Activities
Measure Effectiveness
Critique of the National Infrastructure Protection Plan Model
A Bottom-Up Approach
The Buffer Zone Protection Plan
The Reality of Critical Infrastructure Protection. States' Responsibilities
Key Critical Infrastructure Sectors
Water and Wastewater Systems
Chemical Sector
Commercial Facilities Sector
Communications Sector
Critical Manufacturing Sector
Dams Sector
Defense Industrial Base Sector
Emergency Services Sector
Energy
Transportation Security
Ground Transportation
Infrastructure from the Terrorists' Viewpoint
Complacency. The Threat to Homeland Security
Summary
4. The Legal Aspects of Homeland Security
Introduction
Presidential Executive Orders and Directives
Executive Orders of President Clinton
Executive Orders of President George W. Bush
Executive Orders of President Barack Obama
Executive Orders of President Donald Trump
Federal Antiterrorism Statutes
Antiterrorism and Effective Death Penalty Act of 1996
The USA Patriot Act
U.S. Foreign Intelligence Surveillance Court
Summary
5. Political and Social Foundations of Terrorism
Introduction
Continuum of Social Conflict
Defining Terrorism
A Brief History of Terrorism
Early Forms of Terrorism
The French Revolution
Late Nineteenth- and Early Twentieth Century Terrorism
Terrorism in the Late Twentieth Century
Terrorism in Early America
Terrorism Today
The Roots and Causes of Terrorism
Globalization
Religion
Israeli-Palestinian Conflict
Russian Invasion of Afghanistan
Wahhabism
Authoritarian Governments
Failed States and Terrorism
Individual Explanations of Terrorism
Types of Terrorism
State-Sponsored Terrorism
Dissent Terrorism
Terrorists on the Left and Right
Religious Terrorism
Criminal Terrorism
Level of Terrorist Activities
Strategies for Dealing with Terrorism
Crushing Terrorist Groups Unilaterally
Crushing Terrorist Groups Multilaterally
Containment
Defense
Diversion
Delegitimation
Transforming Terrorist Breeding Grounds
Women Terrorists
Summary
6. The Nature and Geography of Terrorist Groups, State Sponsors of Terror, and Safe Havens
Introduction
Foreign Terrorist Organizations
Middle East and North Africa Groups
African Groups
Asian Groups
Latin American Groups
European Groups
Terrorism in America
Radical Muslim-Inspired Terrorism
Right-Wing Terrorists and Militias
Eco-Terrorism and Animal Rights Groups
Summary
7. Transnational Organized Crime and Terrorism
Introduction
Defining Transnational Organized Crime
Distinguishing Types or Categories of Crime
Impact of Transnational Organized Crime
Conditions Facilitating Transnational Organized Crime
Networking. The Etiology of Transnational Organized Crime Groups
Political Models
Economic Models
Social Models
How Transnational Crime Is Organized
Standard Hierarchy
Regional Hierarchy
Clustered Hierarchy
Core Group
Criminal Network
Transnational Organized Crime Activities
Drug Trafficking
Human Trafficking
Smuggling of Technology and WMD Materials
Arms Trafficking
Trafficking in Precious Gems
Piracy
Non-Drug Contraband Smuggling
Counterfeiting
Theft
Financial Fraud
Environmental Crimes
Failed States and Transnational Organized Crime and Terrorism
Links between Transnational Organized Crime and Terrorist Organizations
The Continuum of Terrorism and Transnational Organized Crime
Incentives for TOC and Terrorist Organizations to Cooperate
Summary
8. Intelligence and Counterintelligence and Terrorism
Introduction
Intelligence Failure - What Does It Mean?
Advisory
The Director of National Intelligence
National Counterterrorism Center
Conceptual Overview of Homeland Security Intelligence
Types of Intelligence Collection Activities
Human Intelligence
Signals Intelligence
Measures and Signatures Intelligence
Imagery Intelligence
Open-Source Intelligence
Agencies within the American Intelligence Community
Central Intelligence Agency
Defense Intelligence Agency
Department of Energy
Department of Homeland Security
Department of State
Department of the Treasury
Drug Enforcement Administration
Federal Bureau of Investigation
National Geospatial-Intelligence Agency
National Reconnaissance Office
National Security Agency
Armed Services Intelligence
Intersection of Policy Decisions and Intelligence. The Intelligence Cycle
Joint Special Operations Command Specialized Military Antiterrorism Agencies
Counterintelligence
The Globalization of Intelligence
Domestic Industrial Espionage
Summary
9. Homeland Security and Weapons of Mass Destruction
The National Terrorism Advisory System. Warning the American People
Introduction
Defining Weapons of Mass Destruction
National Terrorism Advisory System
History of the Deployment of WMDs
Historical Precedents for Biological WMDs
Historical Precedents for Chemical WMDs
The Threat of Nuclear Weapons of Mass Destruction. Destructiveness, Potential for Use, and Availability
Nuclear and Radiological WMDs
Availability of Nuclear Materials
Nuclear Bombs or Weapons
The Spread of Nuclear Material and Information
Smuggling Nuclear Weapons and Materials
Terrorist Attacks Using Dirty Bombs and Attacks on Nuclear Facilities
Biological Weapons of Mass Destruction
Types of Biological Weapons
How Biological Weapons Work
Creating Biological Weapons
Threat Assessment and Biological Weapons
Chemical Weapons of Mass Destruction
Advantages of Chemical Weapons
Weaponizing Chemicals
Factors Constraining Terrorists from Using WMDs
Relative Destructiveness of WMDs
Examining Which Groups Might Use WMDs
Summary
10. Cybercrime and Terrorism
Introduction
Methods of Attacking Cyber Infrastructure
Tools Used in Hacking and Cyberattacks
What Is Cyber Terrorism?
Distinguishing Hacking, Cybercrime, Cyber Terrorism, and Cyber Warfare
Cybercrime
Cyber Warfare
Points of Cyberattacks
Cyber Terrorism
Physical Attacks on Communications Infrastructure
Significant Cyber Gaps
Deterring Cyber Intrusions and Attacks
Terrorists' Use of the Internet
Terrorists and Social Media
Overview of Terrorist Websites
Audiences
How Terrorists Use the Internet
Terrorists and Social Media
Agencies Charged with Combating Cyber Terrorism
FBI's Cybercrime Division
Department of Homeland Security's Cyber Security Systems
Summary
11. Terrorist Financing
Introduction
Terrorist Financing of the 9/11 Attacks
Distinguishing Terrorist Financing and Money Laundering
Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering
U.S. Enforcement Actions
Financial Action Task Force on Money Laundering
Means and Methods of Terrorist Financial Transactions
Earning and Acquiring Resources
Donor Support of Terrorism
Criminal Activity
Charities
Legitimate Businesses
Moving or Laundering Money
Precious Commodities
Banking and Wire Transfers
Money Brokers or Hawaladars
Storing or Banking Money
Black Market Oil and Gas
Saudi Arabia's Financing of Terrorism. An American Conundrum
Identity Fraud and Theft
Real ID Act
Breeder Documents and the Mechanics of Identity Fraud
Terrorists' Financial Needs
Summary
12. Border Security and Immigration
Introduction
Immigration
Originating Countries of American Immigrants
Border Security Issues
Illegal Border Migration. A Case Study in Tucson
Border Apprehensions
Terrorist Infiltration via Illegal Immigration
Border Protection Philosophy after 9/11
Secure Border Initiative
The Border Security and Immigration Enforcement Improvements Executive Order
Increase in Customs and Border Protection Agents
Expanded Detention and Removal Capabilities
Improved Technology
Increased Infrastructure Protection (Fencing)
Enhanced Enforcement of Immigration Laws. Interior Enforcement as Deterrence
Formulating a Coherent Policy for Border Security
US-Visit Program
Types of Visas
Non-Visa or Visa Waiver Program
Vehicular Screening at Border Crossings
Port and Marine Security
CTPAT and CSI
Summary
13. The Response to Homeland Security Incidents
Introduction
FEMA. The Primary Response Agency When Disaster Occurs
Response Goals and Objectives
National Response Framework
National Response Framework. An Analysis
Local Responsibilities under the National Response Framework
State Responsibilities under the National Response Framework
Federal Responsibilities under the National Response Framework
Response as Dictated by the National Response Framework
Prevention
Protection and Prevention Core Capabilities
Mitigation/Recovery
Roles and Responsibilities of Community Entities
Response
Recovery
Critique of Past Responses and the National Response Framework
Procedures for Activating Federal Assistance in an Emergency
National Incident Management System
Preparedness
Communications and Information Management
Resource Management
Command and Management at an Incident
Ongoing Management and Maintenance
Medical Response to Critical Incidents
National Response Teams
Summary
14. Homeland Security and Policing
Introduction
Community Policing and Homeland Security
Police Departments and Homeland Security. Where Are We?
Policing Muslim Communities
Homeland Security Public Education Programming
Examining Police Calls for Service for Terrorist Leads
Police Efforts to Safeguard Local Critical Infrastructure
Critical Incident Response Plans
Partnerships between Law Enforcement and Critical Infrastructure Security Personnel
Private Security
Police Organization and Terrorism
Intelligence-Led Policing
The Intelligence Process
Sources of Intelligence Raw Data
Intelligence Products
Tactical and Strategic Intelligence
Fusion Centers
Police Tactical Considerations
Immediate Police Response to an Act of Terrorism
New York City. A Case Study in Local Homeland Security
Summary
Your questions answered
Pearson+ is your one-stop shop, with eTextbooks and study videos designed to help students get better grades in college.
A Pearson eTextbook is an easy‑to‑use digital version of the book. You'll get upgraded study tools, including enhanced search, highlights and notes, flashcards and audio. Plus learn on the go with the Pearson+ app.
Your eTextbook subscription gives you access for 4 months. You can make a one‑time payment for the initial 4‑month term or pay monthly. If you opt for monthly payments, we will charge your payment method each month until your 4‑month term ends. You can turn on auto‑renew in My account at any time to continue your subscription before your 4‑month term ends.
When you purchase an eTextbook subscription, it will last 4 months. You can renew your subscription by selecting Extend subscription on the Manage subscription page in My account before your initial term ends.
If you extend your subscription, we'll automatically charge you every month. If you made a one‑time payment for your initial 4‑month term, you'll now pay monthly. To make sure your learning is uninterrupted, please check your card details.
To avoid the next payment charge, select Cancel subscription on the Manage subscription page in My account before the renewal date. You can subscribe again in the future by purchasing another eTextbook subscription.
Channels is a video platform with thousands of explanations, solutions and practice problems to help you do homework and prep for exams. Videos are personalized to your course, and tutors walk you through solutions. Plus, interactive AI‑powered summaries and a social community help you better understand lessons from class.
Channels is an additional tool to help you with your studies. This means you can use Channels even if your course uses a non‑Pearson textbook.
When you choose a Channels subscription, you're signing up for a 1‑month, 3‑month or 12‑month term and you make an upfront payment for your subscription. By default, these subscriptions auto‑renew at the frequency you select during checkout.
When you purchase a Channels subscription it will last 1 month, 3 months or 12 months, depending on the plan you chose. Your subscription will automatically renew at the end of your term unless you cancel it.
We use your credit card to renew your subscription automatically. To make sure your learning is uninterrupted, please check your card details.