Wiley Pathways Threats to Homeland Security: An All-Hazards Perspective
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title Wiley Pathways Threats to Homeland Security: An All-Hazards Perspective

English

The threats to homeland security are exposed in this comprehensive resource. It takes readers through the natural and accidental disasters, as well as premeditated acts of domestic and international terrorism that threaten this country. They'll also find a detailed examination of terrorism, its processes and consequences. And they'll gain a better understanding of the various domestic and international terrorist groups that are trying to do us harm.

English

1 The Changing Nature of National Security 1

Introduction 2

1.1 Foundations of American Security Policy 2

1.1.1 Geopolitics at the Beginning of the Twentieth Century 3

1.1.2 National Security and World War II 5

Self-Check 8

1.2 Security in the Cold War Era 8

1.2.1 Bipolarity vs. Multipolarity 10

1.2.2 Containing Communism 12

1.2.3 Non-Communist Threats 17

Self-Check 18

1.3 Security in the Post–Cold War Era, Pre-9/1118

1.3.1 Changing Threats 18

1.3.2 New Conflicts, New Responses 19

1.3.3 Reorganization of National Security Policy 21

Self-Check 22

1.4 Security in the Global War on Terrorism, Post-9/11 22

1.4.1 Globalization and Geopolitics 23

1.4.2 Reorganization for the Global War on Terrorism 25

Self-Check 28

Summary 28

Key Terms 29

Summary Questions 32

Applying This Chapter 33

You Try It 34

2 U.S. Homeland Security Interests 35

Introduction 36

2.1 Human Security: Protecting People 36

2.1.1 Social Factors 38

2.1.2 Political Factors 40

Self-Check 48

2.2 Critical Infrastructure and Key Resources 48

2.2.1 Major Initiatives 50

2.2.2 Types of Protection 53

Self-Check 55

2.3 Economic Pressures and Activities 56

2.3.1 Protecting the U.S. Economy 56

2.3.2 Economic Recovery After an Incident 57

2.3.3 The Costs of Homeland Security 58

Self-Check 62

2.4 Societal Values: Protecting Democracy 62

2.4.1 A Controversy as Old as Our Country 63

2.4.2 The Bill of Rights and Constitutional Issues 63

Self-Check 67

Summary 67

Key Terms 67

Summary Questions 71

Applying This Chapter 72

You Try It 73

3 The All-Hazards Perspective 74

Introduction 75

3.1 Natural Disasters: Things We Can Expect to Happen 75

3.1.1 The History of Natural Disasters in the United States 76

3.1.2 Natural Disaster Response 78

3.1.3 Natural Disasters in a Post-9/11 World 80

Self-Check 82

3.2 Accidental Hazards: Things We Can Try to Prevent 82

3.2.1 History of Accidental Hazards in the United States 83

3.2.2 Accidental Hazard Prevention and Response 84

3.2.3 Accidental Hazards in a Post-9/11 World 87

Self-Check 88

3.3 Man-made Hazards: Things We Hope Don’t Happen 88

3.3.1 History of Man-made Disasters Caused by Human Error in the United States 89

3.3.2 Man-made Disaster Mitigation and Response 90

3.3.3 Man-made Disasters in a Post-9/11 World 92

Self-Check 93

Summary 93

Key Terms 94

Summary Questions 97

Applying This Chapter 98

You Try It 99

4 A Conceptual Framework—Assessing Threats and Interests 100

Introduction 101

4.1 A General Framework of Analysis—What to Assess 101

4.1.1 The Disaster Impact Process 102

4.1.2 Pre-Impact Conditions 103

4.1.3 Event-Specific Conditions 106

4.1.4 Final Thoughts on What to Assess 107

Self-Check 108

4.2 A Matrix Approach—How to Assess 108

4.2.1 Risk Matrices 110

4.2.2 Composite Exposure Indicator 112

4.2.3 HAZUS 114

4.2.4 Vulnerability Assessments 115

4.2.5 Final Thoughts on How to Assess 116

Self-Check 117

4.3 The Emergency Management Planning Model 117

4.3.1 Mitigation 117

4.3.2 Risk Reduction 119

4.3.3 Preparedness 120

4.3.4 Response 120

4.3.5 Recovery 123

Self-Check 124

Summary 125

Key Terms 125

Summary Questions 128

Applying This Chapter 129

You Try It 130

5 State Actors and Terrorism 131

Introduction 132

5.1 Defining Terrorism 132

5.1.1 The Historical Context of Terrorism 134

5.1.2 Terrorism and Political Violence 135

Self-Check 136

5.2 States and the Use of Force in the Inter-State System 136

5.2.1 The State and the Use of Force 137

5.2.2 The State and Intervention 138

Self-Check 140

5.3 State Actors: What Is State Terrorism? 140

5.3.1 Internal State Terrorism 140

5.3.2 External State Terrorism 143

Self-Check 145

5.4 The Global Response 145

5.4.1 The United Nations and Collective Security 145

5.4.2 The United Nations’ Response to Terrorism 147

Self-Check 149

5.5 The United States and State Sponsors of Terrorism 149

5.5.1 Cuba 150

5.5.2 Iran 152

5.5.3 Libya 154

5.5.4 North Korea 155

5.5.5 Sudan 155

5.5.6 Syria 156

Self-Check 158

5.6 Implications of the U.S. Response to State-Sponsored Terrorism 157

5.6.1 Criticisms of the State-Sponsored List 158

5.6.2 How Can the State Sponsor List Be Improved? 160

Self-Check 162

Summary 163

Key Terms 163

Summary Questions 165

Applying This Chapter 166

You Try It 167

6 Non-State Actors and Terrorism 168

Introduction 169

6.1 Non-State Terrorism and Its Impact on the Inter-State System 169

6.1.1 The Threat of Non-State Terrorism to a State 171

6.1.2 History of Ideas Underpinning Terrorist Movements 173

6.1.3 The Internationalization of Terrorism 176

6.1.4 The Meaning Behind the Internationalization of Terrorism 177

Self-Check 179

6.2 Different Types of Terrorist Organizations 179

6.2.1 Ethno-Nationalist/Separatist Terrorism 180

6.2.2 Ideological Terrorism 182

6.2.3 Religious Terrorism 187

Self-Check 192

6.3 Terrorist Methods 193

6.3.1 Primary Tactics of Terrorism 193

6.3.2 Use of Weapons of Mass Destruction 194

6.3.3 Suicide Terrorism 197

Self-Check 202

6.4 Counter-terrorism Efforts 202

6.4.1 Counter-terrorism Against Ethno-Nationalist/Separatist and Ideological Terrorism 203

6.4.2 Counter-terrorism Against Religious Terrorism 205

6.4.3 Counter-terrorism Against Suicide Terrorism 208

Self-Check 211

Summary 211

Key Terms 212

Summary Questions 214

Applying This Chapter 215

You Try It 216

7 Cyber-Terrorism and Cyber-Warfare 217

Introduction 218

7.1 The Cyber-Terrorism Threat 218

7.1.1 Defining Cyber-Terrorism and Cyber-Warfare 220

7.1.2 What Can Cyber-Terrorism and Cyber-Warfare Do? 221

Self-Check 224

7.2 Assessing Capability and Intent 224

7.2.1 Who Can Conduct Cyber-Terrorism and Cyber-Warfare? 225

7.2.2 Tools of Cyber-Terrorism 228

Self-Check 230

7.3 Assessing Consequences 230

7.3.1 Why America Is Vulnerable to Cyber-Terrorism 231

7.3.2 The Impact of a Cyber-Terrorist Attack 232

Self-Check 234

7.4 Determining Defenses Against Cyber-Terrorism and Cyber-Warfare 234

7.4.1 The Government and Private Sector Response to Cyber-Terrorism 237

7.4.2 The U.S. Military Response to Cyber-Warfare 240

Self-Check 244

Summary 244

Key Terms 245

Summary Questions 247

Applying This Chapter 248

You Try It 249

8 Weapons of Mass Destruction 250

Introduction 251

8.1 Chemical Weapons and Their Consequences 251

8.1.1 History of Chemical Weapons Use 251

8.1.2 Chemical Agents and Their Effects 252

8.1.3 The Threat of Chemical Weapons and Terrorism 253

Self-Check 255

8.2 Biological Weapons and Their Consequences 256

8.2.1 History of Biological Weapons Use 256

8.2.2 Biological Agents and Their Effects 258

8.2.3 The Threat of Biological Weapons and Terrorism 258

Self-Check 260

8.3 Radiological Weapons and Their Consequences 260

8.3.1 Radiological Materials and Their Effects 262

8.3.2 History of Nuclear Materials Discoveries and Weapons Development 265

8.3.3 The Threat of Nuclear Weapons and Terrorism 267

8.3.4 Managing Radiological Incidents and Their Aftermath 269

Self-Check 271

Summary 271

Key Terms 272

Summary Questions 274

Applying This Chapter 275

You Try It 276

9 Domestic Terrorism 277

Introduction 278

9.1 Analyzing the Domestic Terrorist Threat 278

9.1.1 Overview of Domestic Terrorism 279

9.1.2 Homegrown Terrorists 280

9.1.3 Foreign Terrorists 284

9.1.4 Foreign Terrorist Organizers 286

9.1.5 Final Thoughts on the Domestic Terrorist Threat 288

Self-Check 289

9.2 The Operational Environment for Terrorism 290

9.2.1 The Physical Environment 290

9.2.2 The Political Environment 291

9.2.3 The Security Environment 294

9.2.4 The Resource Environment 296

9.2.5 Final Thoughts on the Operational Environment 298

Self-Check 298

9.3 The U.S. Response to Terrorism 299

9.3.1 The Lead Agency Approach and Counterterrorism 299

9.3.2 The Criminal Justice Approach 301

9.3.3 Final Thoughts on the U.S. Response to Terrorism 304

Self-Check 305

Summary 305

Key Terms 306

Summary Questions 309

Applying This Chapter 310

You Try It 311

10 Enablers of Mass Effects 312

Introduction 313

10.1 The Power of Information and Ideas 313

10.1.1 Ideas and Terrorism 317

10.1.2 Ideas and the All-Hazards Assessment 318

Self-Check 321

10.2 The Role of the Media in the Global War on Terrorism 321

10.2.1 The Use of Media by Terrorist Groups 322

Self-Check 324

10.3 The Internet and Other Global Communications Means 324

Self-Check 330

10.4 The Role of Educational Institutions 331

10.4.1 Alternative Educational Institutions 331

10.4.2 International Students in the United States 332

10.4.3 Education of Domestic Students in Security 333

Self-Check 335

Summary 335

Key Terms 336

Summary Questions 338

Applying This Chapter 339

You Try It 340

Bibliography 341

Glossary 358

Index 372

loading