by
Baker, John C., 1949-
Call Number
363.3470285 22
Publication Date
2004
Summary
Annotation Following the attacks of September 11, 2001, many agencies within the federal government began restricting some of their publicly available geospatial data and information from such sources as the World Wide Web. As time passes, however, decisionmakers have begun to ask whether and how such information specifically helps potential attackers, including terrorists, to select U.S. homeland sites and prepare for better attacks. The research detailed in this book aims to assist decisionmakers tasked with the responsibility of choosing which geospatial information to make available and which to restrict.
Format:
Electronic Resources
Relevance:
4.5722
by
Cecchine, Gary.
Call Number
363.3497 22
Publication Date
2004
Summary
Even before the events of September 11, 2001, threat assessments suggested that the United States should prepare to respond to terrorist attacks inside its borders. This monograph examines the use of military medical assets to support civil authorities in the aftermath of a chemical, biological, radiological, nuclear, or conventional high explosives attack inside the United States. In conducting this study, the authors focused on the following questions: Under what circumstances could military medical assets be requested? What sort of asset is likely to be requested? Are appropriate assets and related planning processes in place for civil support? What are the legal (and other) barriers to military support to civil authorities, and how can they be overcome, if necessary? In addition to a discussion of the applicable literature and laws, this monograph also includes historical case studies focusing on instances in which military medical assets were requested to assist civil authorities following natural disasters. It also includes a review of two exercises, based on postulated attacks, involving senior officials from local, state, and federal agencies-one involving a smallpox attack in Georgia and another involving a "dirty bomb" attack in California.
Format:
Electronic Resources
Relevance:
4.4910
View Other Search Results
by
Davis, Lois M.
Call Number
363.32517 22
Publication Date
2006
Summary
This book presents the results of the third and final wave of a national survey to elicit assessments of state and local response agencies of the activities they have undertaken after 9/11 to respond to terrorist-related incidents and of federal programs intended to improve preparedness and readiness for terrorism.
Format:
Electronic Resources
Relevance:
4.0875
by
Barkun, Michael.
Call Number
363.325160973 22
Publication Date
2011
Summary
This title explores the gap between the reality of terrorism and the imagined threat of terrorism. Linking this gap between reality and paranoia to the Bush administration's 'overreaction' to terrorist threats, the author focuses on the issue of unseen dangers.
Format:
Electronic Resources
Relevance:
3.0853
by
Bullock, Jane A.
Call Number
363.320973 22
Publication Date
2006
Summary
Completely revised and updated new edition of best-selling text complete with full color throughout!
Format:
Electronic Resources
Relevance:
2.9513
by
Libicki, Martin C.
Call Number
355.343 22
Publication Date
2009
Summary
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Format:
Electronic Resources
Relevance:
2.5011
by
Ellis, John W., 1947-
Call Number
353.30973 23
Publication Date
2014
Summary
The mission, authority, organization, role, function, and the fundamental terminology that affects homeland security in the United States is examined in this book. Homeland security demands quick, effective organization to operate in emergencies, but simultaneously defies it by the limited time frame and sheer scope of the problem. The author focuses on the five core missions of homeland security: preventing terrorism, securing borders, enforcing immigration law, safeguarding cyber systems, and ensuring resilience to disasters. These core missions require five common skill areas for homeland s.
Format:
Electronic Resources
Relevance:
2.4716
by
Jackson, Brian A., 1972-
Call Number
355.033573 22
Publication Date
2009
Summary
"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.
Format:
Electronic Resources
Relevance:
2.3705
by
Davis, Lois M.
Call Number
363.325160973 22
Publication Date
2010
Summary
Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets.
Format:
Electronic Resources
Relevance:
2.3546
10.
by
Philpott, Don, 1946-
Call Number
658.473 22
Publication Date
2006
Summary
This is a manual for commercial and government building and facility security managers who are responsible for developing their security plans based on estimated risks and threats, natural or terrorist. It was produced under the leadership of the Homeland Defense Journal and written by a team of nationally recognized architects, engineers and security experts. The Integrated Physical Security Handbook is the essential handbook for facility security managers and all managers and supervisors tasked with the security and safety of the buildings in which they operate and the people with whom they work. It sets out how to manage change and how to conduct crucial threat and risk assessments, the basis for all integrated physical security planning. Using checklists and standard practices, it provides a hands-on, how-to guide that leads the user in a user-friendly way through all the steps and processes needed to evaluate, design and implement an effective integrated physical security system.
Format:
Electronic Resources
Relevance:
2.2521
by
Stiennon, Richard, 1959-
Call Number
355.343 22
Publication Date
2010
Summary
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. The author argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In this book the author introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. It provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill, and finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats.
Format:
Electronic Resources
Relevance:
2.1198
by
Chalk, Peter.
Call Number
363.32 22
Publication Date
2004
Summary
Over the past decade, the United States has endeavored to increase its ability to detect, prevent, and respond to terrorist threats and incidents. The agriculture sector and the food industry in general, however, have received comparatively little attention with respect to protection against terrorist incidents. This study aims to expand the current debate on domestic homeland security by assessing the vulnerabilities of the agricultural sector and the food chain to a deliberate act of biological terrorism. The author presents the current state of research on threats to agricultural livestock and produce, outlines the sector's importance to the U.S. economy, examines the capabilities that are needed to exploit the vulnerabilities in the food industry, and explores the likely outcomes of a successful attack. The author addresses the question of why terrorists have yet to employ agricultural assaults as a method of operation and offers proposed recommendations for the U.S. policymaking community.
Format:
Electronic Resources
Relevance:
2.0086
Limit Search Results