Preface | p. xi |
Acknowledgments | p. xv |
About the Author | p. xvii |
Introduction: Homeland Security Vision | p. 1 |
The Desired State of Homeland Security | p. 1 |
The Current State of Homeland Security | p. 4 |
Homeland Security Issues and Challenges | p. 9 |
Everyone Has a Role in Homeland Security | p. 11 |
History of Terrorism | p. 12 |
The Direct Impact of Modern-Day Terrorism | p. 14 |
What's at Stake with Today's Terrorist Attacks | p. 15 |
Countering Terrorism with DHS Help | p. 20 |
DHS Help Is Not Enough | p. 23 |
Essential Threat Factors | p. 25 |
The Problem We Face with Threats | p. 25 |
General Threats to Security Hierarchy Components | p. 27 |
General Threat Effect on Homeland Security | p. 29 |
Threat Management Through Intelligence | p. 30 |
Terrorists' Operational Methodology | p. 33 |
Limitations of Early Warnings | p. 37 |
Creating Your Own Threat-Warning Capabilities | p. 40 |
Painful Lesson: The USS Cole Attack | p. 41 |
Implications of Not Understanding Threats | p. 43 |
Lesson Learned: First World Trade Center Attack, 1993 | p. 45 |
Lesson Learned: First American Hijacking, 1961 | p. 45 |
Homeland Security Roles and Misconceptions | p. 46 |
Sharing Information | p. 48 |
Threat Trends | p. 49 |
Conclusion | p. 51 |
Threat, Vulnerability, and Risk Components | p. 53 |
Overview | p. 53 |
DHS Risk Model and National Infrastructure Protection Plan (NIPP) | p. 57 |
Responsibility and Accountability per DHS | p. 60 |
How to Perform Your Own Threat Assessment | p. 60 |
NIPP as a Template | p. 62 |
A Framework for Taking the NIPP Approach | p. 64 |
A Framework for Assessing Threat | p. 65 |
What the Results Suggest | p. 70 |
Terrorist Activity Indicators | p. 71 |
Espionage or Insider Threats | p. 71 |
Information and Technical Threats | p. 71 |
How to Handle Discoveries of Threat and Vulnerabilities | p. 72 |
Determining Vulnerability | p. 73 |
Countermeasure | p. 76 |
Reporting Information | p. 77 |
Cost versus Investment | p. 78 |
Penalties | p. 80 |
Mini Case Study | p. 81 |
Risk Mitigation, Transference, and Elimination | p. 83 |
Risk Decision Principles | p. 84 |
Lessons Not Easily Learned | p. 89 |
Readiness Plans: Develop, Validate, and Update | p. 95 |
Overview | p. 95 |
How Terrorists Plan | p. 98 |
Collaboration with External Organizations | p. 99 |
Beginning the Development Process | p. 102 |
Plan Development | p. 105 |
Overlooked Plan Items | p. 107 |
Internal Communications Considerations | p. 108 |
External Communications | p. 109 |
Crisis and Media Communications | p. 109 |
Plan Response for Bomb Threats | p. 111 |
Addressing Loading Docks and Mailrooms | p. 112 |
Plan Validation | p. 113 |
Plan Updates | p. 114 |
Plan to Share Information | p. 114 |
What DHS Says about Protected Critical Infrastructure Information (PCII) | p. 117 |
Prevention, Detection, and Response Factors across Sectors | p. 119 |
Overview | p. 119 |
Innovative Prevention Approaches | p. 124 |
Innovative Detection Technology | p. 127 |
Investing in Response Capabilities through Partnership | p. 128 |
Other Contributors to Homeland Security | p. 132 |
Response Considerations | p. 133 |
Preparedness Snapshot | p. 135 |
Case Study | p. 136 |
Human Factors and Team Dynamics | p. 141 |
The Human Factor | p. 141 |
Humanity in Crisis and Hero Mode | p. 142 |
Female Terrorists: THE Human Factor Gone Wrong | p. 143 |
Humans in Conflict | p. 144 |
Human Overconfidence | p. 146 |
Human Technology | p. 149 |
SuperDiversity | p. 151 |
Diversity as a Problem Solver | p. 152 |
The "Human Factor" as a Tool | p. 153 |
Dysfunctional Group Dynamics | p. 156 |
Discussion versus Dialogue | p. 158 |
How to Get your Team to Dialogue | p. 159 |
Leadership versus Management | p. 160 |
Roadblocks to Effective TeamWork | p. 162 |
Lack of Proper Foundation | p. 164 |
Linguistic Differences | p. 165 |
Conflicts | p. 166 |
Chapter Exercise | p. 167 |
Toolkits and Innovative Ideas for Change | p. 169 |
Overview | p. 169 |
Organizational Leadership | p. 170 |
Fundamental Management Knowledge | p. 171 |
Stephen Covey | p. 171 |
Problem-Solving Exercises | p. 173 |
Appreciation Exercises: Extracting Maximum Information from Facts | p. 173 |
How to Use the Tool | p. 174 |
Example | p. 174 |
Key Points | p. 174 |
5 Whys: Quickly Getting to the Root of a Problem | p. 174 |
Why Use the Tool? | p. 174 |
How to Use the Tool | p. 175 |
Example | p. 175 |
Key Points | p. 175 |
Fundamental Terrorism Knowledge | p. 176 |
Gary Berntsen | p. 176 |
Peter L. Bergen | p. 177 |
Michael Scheuer | p. 177 |
Steven Emerson | p. 178 |
Brian Jenkins | p. 178 |
Jessica Stern | p. 179 |
Wafa Sultan | p. 180 |
Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role) | p. 182 |
Theory X and Theory Y | p. 182 |
Myers-Briggs Type Indicator | p. 183 |
Group Roles and Team Roles | p. 186 |
Low-Context and High-Context Communications | p. 188 |
Reactive versus Proactive Language | p. 189 |
Active Listening | p. 190 |
What to Avoid | p. 190 |
What We Achieve by Listening | p. 190 |
How to Listen | p. 190 |
What to Do | p. 190 |
The Forming, Storming, Norming, Performing Model | p. 191 |
Chapter Exercise | p. 194 |
Training and Exercises: Touch It, Feel It, Live It, Breathe It! | p. 197 |
Overview | p. 197 |
Benefits of Training | p. 198 |
Adult Learning | p. 199 |
Training Methods | p. 200 |
Crawl Walk Run Methodology | p. 203 |
Video Example for Training | p. 205 |
Another Show Solving a Problem | p. 205 |
Exercises | p. 206 |
Building an Exercise | p. 211 |
Other Key Factors | p. 211 |
How Often Should You Exercise? | p. 212 |
Training Evaluation | p. 213 |
Training Failures | p. 215 |
A Subjective Method for Calculating Return on Investment (ROI) | p. 216 |
You Can Deter But You Can't Interdict: Don't Cross the Line! | p. 219 |
Know Thy Limits | p. 219 |
Distinctions between Collecting information and Collecting Intelligence | p. 220 |
How to Avoid Botching Up an Investigation | p. 221 |
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies | p. 223 |
National Infrastructure Protection Plan - Table of Contents | p. 225 |
ASCE Report on Critical Infrastructure | p. 231 |
Bomb Threat Checklist | p. 239 |
Best Practices for Mail Center Security | p. 241 |
General Mail Operation Preventive Recommendation | p. 241 |
Employee Security Procedures | p. 242 |
General Safety and Security Procedures for Incoming-Outgoing Mail Areas | p. 243 |
Access to Information: Education and Communications | p. 244 |
Guidelines for Mail Center Theft Prevention | p. 245 |
FY07 National Incident Management System (NIMS) Training Guidelines | p. 247 |
Fact Sheet on Dirty Bombs | p. 249 |
Background | p. 249 |
Impact of a Dirty Bomb | p. 249 |
Protective Actions | p. 250 |
Sources of Radioactive Material | p. 250 |
Control of Radioactive Material | p. 251 |
Risk of Cancer | p. 251 |
Other Contact information | p. 252 |
Arab American Psychiatrist Wafa Sultan | p. 253 |
There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Century | p. 253 |
Reference | p. 255 |
Homeland Security Exercise and Evaluation Program | p. 257 |
Index | p. 265 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.