Threats to homeland security : reassessing the all hazards perspective /: reassessing the all hazards perspective. (2018)
- Record Type:
- Book
- Title:
- Threats to homeland security : reassessing the all hazards perspective /: reassessing the all hazards perspective. (2018)
- Main Title:
- Threats to homeland security : reassessing the all hazards perspective
- Further Information:
- Note: Richard J. Kilroy.
- Authors:
- Jr, Kilroy, Richard J
- Editors:
- Kilroy, Richard J
- Contents:
- Notes on Contributors xiii Preface xvi Acknowledgments xxiii 1. The Changing Nature of National Security 1 Introduction 2 1.1 Foundations of American Security Policy 2 1.1.1 Geopolitics at the Beginning of the Twentieth Century 3 1.1.2 National Security and World War II 6 Self-Check 8 1.2 Security in the Cold War Era 8 1.2.1 Bipolarity versus Multipolarity 10 1.2.2 Containing Communism 12 1.2.3 Non-Communist Threats 16 Self-Check 17 1.3 Security in the Post-Cold War Era: Pre-9/11 17 1.3.1 Changing Threats 18 1.3.2 New Conflicts, New Responses 18 1.3.3 Reorganization of National Security Policy 20 Self-Check 21 1.4 National Security and Terrorism: Post-9/11 21 1.4.1 Globalization and Geopolitics 22 1.4.2 The Bush Administration’s Global War on Terrorism 24 1.4.3 The Obama Administration’s New National Security Strategy 26 1.4.4 Homeland Security and National Security 27 Self-Check 28 Summary 29 Key Terms 30 Assess Your Understanding 35 Summary Questions 35 Applying This Chapter 36 You Try It 37 2. Reassessing the All-Hazards Perspective 38 Introduction 39 2.1 Natural Disasters: Things We Can Expect to Happen 39 2.1.1 The History of Natural Disasters in the United States 40 2.1.2 Natural Disaster Response 41 2.1.3 Natural Disasters in a Post-9/11 World 44 Self-Check 46 2.2 Accidental Hazards: Things We Can Try to Prevent 46 2.2.1 History of Accidental Hazards in the United States 46 2.2.2 Accidental Hazard Prevention and Response 48 2.2.3 Accidental Hazards in a Post-9/11Notes on Contributors xiii Preface xvi Acknowledgments xxiii 1. The Changing Nature of National Security 1 Introduction 2 1.1 Foundations of American Security Policy 2 1.1.1 Geopolitics at the Beginning of the Twentieth Century 3 1.1.2 National Security and World War II 6 Self-Check 8 1.2 Security in the Cold War Era 8 1.2.1 Bipolarity versus Multipolarity 10 1.2.2 Containing Communism 12 1.2.3 Non-Communist Threats 16 Self-Check 17 1.3 Security in the Post-Cold War Era: Pre-9/11 17 1.3.1 Changing Threats 18 1.3.2 New Conflicts, New Responses 18 1.3.3 Reorganization of National Security Policy 20 Self-Check 21 1.4 National Security and Terrorism: Post-9/11 21 1.4.1 Globalization and Geopolitics 22 1.4.2 The Bush Administration’s Global War on Terrorism 24 1.4.3 The Obama Administration’s New National Security Strategy 26 1.4.4 Homeland Security and National Security 27 Self-Check 28 Summary 29 Key Terms 30 Assess Your Understanding 35 Summary Questions 35 Applying This Chapter 36 You Try It 37 2. Reassessing the All-Hazards Perspective 38 Introduction 39 2.1 Natural Disasters: Things We Can Expect to Happen 39 2.1.1 The History of Natural Disasters in the United States 40 2.1.2 Natural Disaster Response 41 2.1.3 Natural Disasters in a Post-9/11 World 44 Self-Check 46 2.2 Accidental Hazards: Things We Can Try to Prevent 46 2.2.1 History of Accidental Hazards in the United States 46 2.2.2 Accidental Hazard Prevention and Response 48 2.2.3 Accidental Hazards in a Post-9/11 World 50 Self-Check 51 2.3 Man-Made Hazards: Things We Hope Don’t Happen 51 2.3.1 History of Man-Made Disasters Caused by Human Error in the United States 52 2.3.2 Man-Made Disaster Mitigation and Response 53 2.3.3 Man-Made Disasters in a Post-9/11 World 55 Self-Check 56 2.4 Reassessing the All-Hazards Perspective and Disasters 56 Self-Check 59 Summary 59 Key Terms 60 Assess Your Understanding 62 Summary Questions 62 Applying This Chapter 63 You Try It 64 3. Us Homeland Security Interests 65 Introduction 66 3.1 What Is Homeland Security? 66 3.1.1 The Merging of Traditions 67 3.1.2 Prevailing Homeland Security Theories 71 Self-Check 76 3.2 Additional Context for Homeland Security 77 3.2.1 Urban Versus Rural 77 3.2.2 Technologies 78 3.2.3 Political and Economic Factors 79 3.2.4 Security Versus Civil Liberties 81 Self-Check 84 3.3 Homeland Security Enterprise 84 3.3.1 Federal Partners 85 3.3.2 State and Local Partners 90 3.3.3 Whole Community Partners 91 Self-Check 97 3.4 Revisiting the All-Hazards Approach 98 Self-Check 100 Summary 101 Key Terms 101 Assess Your Understanding 105 Summary Questions 105 Applying This Chapter 106 You Try It 108 4. Understanding Threat Assessments 109 Introduction 110 4.1 Background on Threat Assessments and Risk Management 111 4.1.1 Risk Management and Threat Assessment from the All-Hazards Perspective 111 4.1.2 Assessing Threats and Civil Liberties 113 4.1.3 Homeland Security Risk Management Doctrine 114 Self-Check 116 4.2 A General Framework of Analysis: What to Assess 116 4.2.1 The Disaster Impact Process 117 4.2.2 Pre-Impact Conditions 117 4.2.3 Event-Specific Conditions 120 4.2.4 Final Thoughts on What to Assess 122 Self-Check 122 4.3 A Matrix Approach: How to Assess 123 4.3.1 Risk Matrices 124 4.3.2 Composite Exposure Indicator 127 4.3.3 HAZUS 128 4.3.4 Vulnerability Assessments 128 4.3.5 Threat and Hazard Identification and Risk Assessment 129 4.3.6 Final Thoughts on How to Assess 130 Self-Check 133 4.4 The Whole-Community Approach of the National Preparedness System 133 4.4.1 Prevention 136 4.4.2 Protection 137 4.4.3 Mitigation 137 4.4.4 Response 139 4.4.5 Recovery 140 Self-Check 143 Summary 144 Key Terms 144 Assess Your Understanding 148 Summary Questions 148 Applying This Chapter 148 You Try It 150 5. Critical Infrastructure Security, Emergency Preparedness, and Operational Continuity .151 Introduction 152 5.1 Defining Critical Infrastructure 152 5.1.1 Defining the Sectors 153 5.1.2 Information Sharing and Analysis Centers 154 Self-Check 157 5.2 Known Threats to Critical Infrastructure 157 5.2.1 Natural Hazard Threats 158 5.2.2 Terrorism and Human Threats 162 5.2.3 Nontraditional Aviation Technology (NTAT) 165 5.2.4 Cybersecurity Threats 166 Self-Check 168 5.3 Risk Identification, Analysis, and Management 169 5.3.1 Inventory and Critical Assets and Functions 169 5.3.2 Intelligence Functions .171 Self-Check 175 5.4 Emergency Operations and Continuity of Planning 175 5.4.1 Critical Infrastructure Protection Planning and the All-Hazards Perspective 175 5.4.2 Crisis Management Team 177 Self-Check 178 Summary 178 Key Terms 179 Assess Your Understanding 181 Summary Questions 181 Applying This Chapter 181 You Try It 182 6. State Actors and Terrorism 183 Introduction 184 6.1 Defining Terrorism and Other Forms of Collective Violence 184 6.1.1 Legal Definitions of Terrorism 190 6.1.2 The Heyday of State-Sponsored Terrorist Groups 193 6.1.3 The End of the Cold War, Globalization, and the Decline of State Sponsorship 195 Self-Check 197 6.2 Contemporary State Sponsors of Terrorism 197 6.2.1 Iran 199 6.2.2 Sudan 201 6.2.3 Syria 203 Self-Check 205 6.3 International and Domestic Responses to State-Sponsored Terror 205 6.3.1 United Nations Security Council (UNSC) 205 6.3.2 Other Multilateral Efforts 206 6.3.3 US International Counterterrorism Strategy 208 Self-Check 210 Summary 211 Key Terms 214 Assess Your Understanding 216 Summary Questions 216 Applying This Chapter 217 You Try It 218 7. Non-State Actors and Terrorism 219 Introduction 220 7.1 Explaining the Different Types of Non-state Actors 220 7.1.1 Defining Violent Non-state Actors .220 7.1.2 Defining Non-state Terrorism 221 7.1.3 Terrorism and “Terrorists” 221 Self-Check 223 7.2 Non-state Terrorism as a Security Threat 223 7.2.1 Reasons for the Prevalence of Violent Non-state Actors 224 7.2.2 Non-state Terrorism as a Domestic and International Threat 225 7.2.3 Assessing the Threat Posed by Violent Non-state Actors 227 Self-Check 228 7.3 The Typology of Violent Non-state Actors 228 7.3.1 Political/Ideological Terrorism 231 7.3.2 Ethno-Nationalist or Separatist Terrorism 236 … (more)
- Edition:
- Second edition
- Publisher Details:
- Hoboken, New Jersey : John Wiley & Sons, Inc
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 355.033073
Terrorism -- United States -- Prevention
National security -- United States
Civil defense -- United States
Emergency management -- United States - Languages:
- English
- ISBNs:
- 9781119251989
9781119251965 - Related ISBNs:
- 9781119251811
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.268741
- Ingest File:
- 02_313.xml