Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9781420077735 | 1420077732
- Cover: Nonspecific Binding
- Copyright: 6/17/2008
This volume is one of the first to examine the strategy that has characterized the department's first five years. It includes contributions from top military, international relations, and security experts. A variety of issues are addressed including privacy and civil liberties, nuclear terrorism, WMDs, military force vs. diplomacy, and intelligence as a means of countering terrorism.
Foreword | p. xiii |
Preface | p. xv |
Acknowledgment | p. xvii |
Contributors | p. xix |
Acronyms | p. xxiii |
The National Security Challenge: Developing Strategy for Terrorism and Homeland Security | |
Toward a Comprehensive Strategy for Terrorism and Homeland Security | p. 3 |
Strategy and the Strategic Discourse | p. 9 |
Terrorism and Other Forms of Political Violence | p. 10 |
Intelligence, Law Enforcement, Civil Liberties, and Human Rights | p. 11 |
Causal Understandings Related to Formulating Homeland Security Strategy | p. 13 |
Societal Grievances as a Cause of Terrorism and Other Forms of Political Violence | p. 14 |
Groups, Movements, or Insurgencies Using Political Violence | p. 16 |
Endnotes | p. 17 |
The Search for National and Homeland Security: An Integrated Grand Strategy | p. 19 |
The Basic Elements of Strategy | p. 21 |
Post-Gulf War I: Tracing U.S. Grand Strategy | p. 23 |
Homeland Security and National Security | p. 25 |
Conclusion | p. 28 |
Endnotes | p. 30 |
Assured Vulnerability: Homeland Security and the Cold War Legacy of Defenselessness | p. 33 |
The Roots of Vulnerability | p. 35 |
The Cold War Neglect of Homeland Security | p. 36 |
After 9/11: The Legacy of Neglect | p. 42 |
The Unfinished Task of Inventing Homeland Security | p. 45 |
The Role of Defense Intellectuals | p. 46 |
Developing Defense Orientations Within Homeland-Security Strategic Culture | p. 47 |
Endnotes | p. 49 |
Terrorism and Deterrence by Denial | p. 53 |
Terrorism as a Dynamic Process | p. 54 |
Terrorism and Deterrence by Denial | p. 56 |
Tactical Level: Deterrence by Denial of Opportunity | p. 56 |
Operational Level: Deterrence by Denial of Capability | p. 58 |
Strategic Level: Deterrence by Denial of Objectives | p. 58 |
International Implementation-the "Away Game" | p. 59 |
Identifying and Influencing the Target Population | p. 61 |
Denial Strategy-Marginalizing the Terrorist Message | p. 62 |
Denial of Capability: Public Diplomacy and Disrupting Recruitment and Retention | p. 63 |
Domestic Implementation-the "Home Game" | p. 65 |
Educating and Preparing Domestic Publics | p. 65 |
Concluding Comments | p. 66 |
Endnotes | p. 67 |
The Importance of Multinational and Transnational Cooperation Strategies for Homeland Security | p. 69 |
Homeland Security and Globalization | p. 71 |
Reconceptualizing Defensive Homeland Security | p. 73 |
Multinational and Transnational Cooperation on Homeland Security | p. 77 |
Judicial and Law Enforcement Cooperation | p. 77 |
Cooperation in Civil Security and Transportation | p. 79 |
Intelligence Cooperation | p. 81 |
Financial Cooperation | p. 83 |
Homeland Defense Cooperation | p. 83 |
Cooperation through the United Nations | p. 84 |
Areas for Improvement | p. 86 |
Concluding Comments | p. 89 |
Endnotes | p. 91 |
Terrorism, Homeland Security, and Weapons of Mass Destruction (WMD) | |
WMD Terrorism: New Threats, Revised Responses | p. 101 |
The Changing Threat of Modern Terrorism | p. 104 |
The First Wave | p. 104 |
The Second Wave | p. 105 |
The Third Wave | p. 106 |
The Fourth Wave | p. 106 |
WMD Terrorism | p. 107 |
Nuclear Weapons | p. 108 |
Biological Weapons | p. 109 |
Chemical Weapons | p. 110 |
U.S. Responses to the Threat from WMD Terrorism | p. 111 |
Responses to Fourth-Wave Terrorism | p. 112 |
Dealing with the Threat by Denying Access to Materials | p. 115 |
Concluding Comments | p. 116 |
Endnotes | p. 116 |
Nuclear and Radioactive Threats to Homeland Security: Prevention and Response | p. 119 |
Characterizing Nuclear and Radioactive Threats | p. 120 |
Current National Prevention and Response Strategies | p. 123 |
Intelligence | p. 124 |
Port Security | p. 124 |
DHS Role in Preparedness and Response | p. 125 |
Response to Nuclear and Radiological Incidents | p. 126 |
Federal Guidance on Radiation | p. 127 |
Drawbacks to the Current Guidance | p. 128 |
Survey of Public Resources for Nuclear and Radiological Terrorism Threats | p. 128 |
Assessment: A Strong Effort, but Gaps Remain | p. 129 |
Priorities for a National Homeland Security Strategy | p. 130 |
Conclusion: Integrating Prevention and Response | p. 136 |
Endnotes | p. 137 |
Strategy and the Safeguarding of Society and its Infrastructure from Terrorism and other Threats | |
Comparative Risk Analysis: Biological Terrorism, Pandemics, and Other "Forgotten" Catastrophic Disaster Threats | p. 147 |
A Note about Comparative Risk Assessment | p. 149 |
Debates about Homeland Security Strategy in Theory and Practice | p. 150 |
The Muddled Homeland Security Mandate: FEMA the "Stepchild" | p. 150 |
The Elusive Comparative Risk Analysis Approach | p. 151 |
Elemental Natural Disasters and Forces Majeures | p. 152 |
Hurricanes | p. 152 |
Earthquakes | p. 152 |
Tsunamis | p. 153 |
Floods | p. 154 |
For Better and Worse: Globalization, Infectious Diseases, and the Biological Century | p. 154 |
The Bioterrorism-Bird Flu Nexus | p. 154 |
Globalization Externalities: Public Health Goods and "Bads" | p. 155 |
Naturally Occurring Disease Outbreaks and Civilian Biodefense | p. 156 |
SARS | p. 157 |
Avian Influenza: The Inter-Pandemic Period, and Planning for the Inevitable | p. 157 |
Bioweapons and Bioterrorism: The Dark Side of the Biotechnology Revolution | p. 159 |
How Dangerous Is Bioterrorism? The BT Technology Growth Curve | p. 160 |
Variables in Using BT Weapons | p. 162 |
Agricultural Bioterrorism | p. 163 |
The Comparative Dimensions of Homeland Security Risk Analysis | p. 164 |
The Brave New World of Katrina and Osama-But with Tradeoffs | p. 165 |
Endnotes | p. 166 |
Homeland Security Strategy and Policy Choices: A Local Government Perspective | p. 171 |
Consequences and Consequence Planning | p. 174 |
Prevention, Mitigation, and Preparedness | p. 178 |
Financing and Staffing State and Local Homeland Security Efforts | p. 181 |
Organizing and Coordinating Federal, State, and Local Efforts | p. 184 |
Concluding Comments | p. 186 |
Endnotes | p. 188 |
Democracy, Civil Society, and the Damage-Limitation Component of Strategy | p. 191 |
Making Democracy Survivable | p. 192 |
Homeland Security Spending and Damage Limitation | p. 194 |
The Private Sector, Civil Society, and All-Hazards Response | p. 197 |
Reviving Civil-Defense Education | p. 199 |
Concluding Comments | p. 201 |
Endnotes | p. 201 |
Transportation as a Component of Homeland Security Strategy | p. 207 |
Modes of Transportation | p. 209 |
Intermodal Passenger Systems | p. 212 |
Freight Systems | p. 216 |
The Dimensions of Transportation Security | p. 220 |
Concluding Comments | p. 223 |
Endnotes | p. 224 |
Redefining U.S. Energy Security in the Twenty-First Century | p. 227 |
Conceptualizing Energy Security | p. 229 |
The U.S. Energy System: Vital Energy Sectors and Critical Infrastructure Protection | p. 235 |
Petroleum | p. 236 |
Natural Gas | p. 237 |
Electricity | p. 239 |
Coal | p. 240 |
Nuclear Power | p. 240 |
Critical Infrastructure Protection | p. 241 |
Critical Vulnerabilities and Homeland Security Implications | p. 243 |
Summary Conclusions | p. 245 |
Endnotes | p. 246 |
Afterword: Terrorism and Securing the Homeland | p. 253 |
Endnotes | p. 261 |
The National Strategy for Homeland Security | p. 263 |
Strategic Objectives | p. 264 |
Threat and Vulnerability | p. 264 |
Organizing for a Secure Homeland | p. 264 |
Critical Mission Areas | p. 265 |
The Foundations of Homeland Security | p. 269 |
Costs of Homeland Security | p. 272 |
Conclusion: Priorities for the Future | p. 272 |
Endnotes | p. 274 |
Bibliography | p. 275 |
Books | p. 275 |
Articles | p. 281 |
Documents | p. 284 |
Web sites | p. 288 |
Glossary | p. 291 |
Index | p. 309 |
Table of Contents provided by Ingram. All Rights Reserved. |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.