did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780205405817

When Terrorism Strikes Home Defending the United States

by
  • ISBN13:

    9780205405817

  • ISBN10:

    0205405819

  • Format: Paperback
  • Copyright: 2005-10-26
  • Publisher: Prentice Hall

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $81.80 Save up to $20.45
  • Buy Used
    $61.35
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

When Terrorism Strikes Home: Defending the United States focuses on the impact of the war on terrorism upon individuals, society, and government. It examines how the war on terrorism has affected first responders such as police and fire departments, how it has transformed local and state government planning and how it has defined a new relationship between state and federal government.

Table of Contents

Preface to Instructors ix
Preface to Students xi
Acknowledgments xiii
Introduction: The Awakening of the United States
1(18)
Introduction: Defending the Homeland
2(2)
Overview of When Terrorism Strikes Home
4(1)
Real Threats and Irrational Fears
4(2)
Awakening to Terrorism in the United States
6(1)
Responding to Terrorism in the United States
6(6)
Box 1.1 Consider This: Where to Go If You Want More Information
7(2)
Federal Government Policy and Strategy
9(3)
Criminals and Terrorism: Is There a Difference? Does It Matter?
12(2)
Conclusion: How Did We Get to This Point?
14(2)
Chapter Summary
16(1)
Terrorism and You
16(1)
Understanding This Chapter
16(1)
Thinking about How Terrorism Touches You
17(1)
Important Terms and Concepts
17(1)
Endnotes
17(2)
Terrorism in the United States: A Historical Overview
19(28)
Introduction: Why Terrorism?
21(1)
Historical Roots of the Definition of Terrorism
21(4)
David versus Goliath
22(2)
The Ends Justify the Means
24(1)
No Innocent Parties
24(1)
Early Worldwide Examples of Terrorism
25(4)
Zealot
25(1)
Assassin/Fedayeen
26(1)
Thugs
26(1)
Box 2.1 Consider This: Is There Prejudice against Muslims?
27(1)
Terror, Terrorism, Terrorist
28(1)
Class Warfare
29(2)
The Russian Revolution
30(1)
Early Terrorism in the United States
31(7)
The American Revolutionary War
31(1)
Terror against Native Americans
31(1)
The American Civil War
32(1)
Racism in the United States and Terrorism
33(1)
Why the Ku Klux Klan Emerged
34(1)
Box 2.2 Case Study: The Ku Klux Klan
35(1)
Terror Tactics of the KKK
36(2)
The Red Scare and the Cold War
38(4)
Origins of the Red Scare
38(2)
Box 2.3 Up Close and Personal: Lynne Steward Convicted
40(1)
The FBI and the Red Scare
41(1)
The Cold War
41(1)
Conclusion: Terrorism by Any Other Name
42(1)
Chapter Summary
42(1)
Terrorism and You
43(1)
Understanding This Chapter
43(1)
Thinking about How Terrorism Touches You
43(1)
Important Terms and Concepts
44(1)
Endnotes
44(3)
Defending the Homeland: The Rule of Law
47(38)
Introduction: Responding to Terrorism through Law
49(1)
Defending the Homeland with Law
49(1)
Law as a Double-Edged Sword
49(1)
Early Legislation to Promote National Security
50(3)
The Alien Act and the Sedition Act
50(1)
The Force Act and the Ku Klux Act
51(1)
The Espionage Act of 1918 and the Sedition Act of 1919
52(1)
The Beginning of the Age of Terrorism---1980s: Defending the Homeland by Presidential Directives and Legislation
53(9)
The Reagan Administration: Organizing the Government's Response to Terrorism
54(3)
The Clinton Administration: The Foundation of Post-September 11, 2001, Legislation
57(1)
Box 3.1 Up Close and Personal: The Integrity of the Rule of Law
58(2)
The Omnibus Counterterrorism Act of 1995 and the Anti-Terrorism and Effective Death Penalty Act of 1996 (Public Law 104-132)
60(2)
Post-September 11, 2001, Legislation
62(7)
Enemy Combatant Executive Order
63(1)
Box 3.2 Consider This: What Are Military Tribunals?
64(2)
Box 3.3 Case Study: Why Gitmo?
66(3)
The USA Patriot Act
69(4)
Criticisms of the USA Patriot Act
71(2)
Never Again: Defense of the Patriot Act and the Call for Expanded Powers
73(2)
The Movement for Expanded Power: Patriot II
73(2)
Prosecuting Terrorists to the Fullest Extent of the Law
75(1)
Conclusion: The Balance between Liberty and National Security
76(2)
Chapter Summary
78(1)
Terrorism and You
79(1)
Understanding This Chapter
79(1)
Thinking about How Terrorism Touches You
79(1)
Important Terms and Concepts
80(1)
Endnotes
80(5)
Terrorists on Main Street, USA
85(30)
Introduction: Nearer than You Think
87(1)
The Terrorists: Posed to Strike Main Street
88(6)
Why Do They Hate Us?
88(1)
Why Do They Attack Main Street?
89(4)
Box 4.1 Up Close and Personal: Suicide Bombers
93(1)
The U.S. Role in Creating Terrorists: Osama Bin Laden and Al-Qaida
94(6)
Terrorism as a By-Product of the Cold War
95(1)
Europe as a Breeding Ground and Home Base for Terrorists
96(1)
Terrorists on Main Street
96(3)
Box 4.2 Case Study: Brandon Mayfield
99(1)
Preferred Weapon of the Terrorist: The Bomb
100(2)
Fuses
101(1)
Explosive Material
101(1)
The Targets
102(6)
Understanding the Purpose of a Terrorist Attack
102(1)
Symbolic Targets
103(1)
Box 4.3 Consider This: Politicians as Targets
104(1)
Targets Everywhere
105(1)
Increased Threats to Infrastructure Targets
105(3)
Conclusion
108(1)
Chapter Summary
108(1)
Terrorism and You
109(1)
Understanding This Chapter
109(1)
Thinking about How Terrorism Touches You
109(1)
Important Terms and Concepts
110(1)
Endnotes
110(5)
Defending Main Street, USA
115(36)
Introduction: A Nation in Danger
117(1)
Defending Main Street: Intelligence and Prevention
118(1)
Intelligence
118(7)
Post-9/11 Changes in Intelligence
119(1)
New Intelligence Agencies: Connecting the Dots
120(2)
Intelligence and Local and State Law Enforcement
122(1)
The Need for Federal-Local Partnerships
123(1)
Box 5.1 Up Close and Personal: Citizen Reporting
124(1)
Prevention: Who Protects Main Street?
125(10)
Federal Agencies
125(3)
Local and State Agencies
128(3)
Volunteer and Self-Defense Groups
131(1)
Box 5.2 Case Study: Surveillance of Main Street
132(3)
Prevention: What Is Being Done?
135(8)
Prevention of Truck Bombs
136(1)
Physical Security: The Last Line of Defense
137(1)
Box 5.3 Consider This: Would a National ID Card Help Fight Terrorism?
138(2)
The Transformation of Public Spaces
140(2)
Nonvehicle Suicide Bombers
142(1)
Conclusion: Will It Be Enough?
143(1)
Chapter Summary
144(1)
Terrorism and You
145(1)
Understanding This Chapter
145(1)
Thinking about How Terrorism Touches You
145(1)
Important Terms and Concepts
146(1)
Endnotes
146(5)
Defending Aviation against Terrorism
151(34)
Introduction: Aviation---The Sleeping Threat
153(1)
The Emergence of Aviation Security
154(2)
The Regulation of Commercial Aviation
154(1)
The Origins of Aviation Security: Bombs and Hijacking
154(2)
The Crisis in Public Confidence
156(1)
The Aviation Security Revolution
156(1)
The Failure to Anticipate New Terrorist Strategies
157(1)
The New Aviation Security Model: Government Control
157(1)
Airport Security
157(1)
Passenger Identification and Security Screening
158(15)
Passenger Identification: Immigration Controls
159(1)
Passenger Identification: Computer-Assisted Passenger Prescreening System
160(2)
Secure Flight
162(1)
Racial Profiling
163(1)
Other Passenger Identification Systems
163(1)
Intelligence-Based Passenger Screening: The No-Fly List
163(2)
Passenger Security Screening
165(1)
Box 6.1 Up Close and Personal: Air Travel in the Twenty-First Century---10 New Rules
166(3)
Evaluation of Passenger Security Screening by TSA
169(1)
Box 6.2 Consider This: Security Screening Vigilantes
170(1)
The Use of Technology to Detect Weapons and Explosives
171(1)
Box 6.3 Case Study: Checkpoint Security Failures
172(1)
Airport Proximity Security: Aircraft Security during Takeoffs and Landings
173(2)
Sniper Rifles
173(1)
The Threat from Portable Surface-to-Air Missiles
173(1)
Protecting against Portable Surface-to-Air Missiles
174(1)
In-Flight Security
175(3)
Reinforced Cockpit Doors
175(1)
Armed Pilots
176(1)
Air Marshals
176(1)
Domestic Air Defense
177(1)
The Tip of the Iceberg
178(1)
Conclusion: ``The Fear of God''
179(1)
Chapter Summary
179(2)
Terrorism and You
181(1)
Understanding This Chapter
181(1)
Thinking about How Terrorism Touches You
181(1)
Important Terms and Concepts
181(1)
Endnotes
182(3)
Defending the Homeland: Weapons of Mass Destruction
185(30)
Introduction: Trump Card---Weapons of Mass Destruction
187(1)
Nuclear Threat from Terrorists
187(10)
Box 7.1 Up Close and Personal: Got Security?
188(1)
Nuclear Attack on a Population Center
189(5)
Attack on an Existing Nuclear Facility or Nuclear Material in Transit or Storage
194(2)
Box 7.2 Consider This: Is It Justified to Suspend Civil Rights?
196(1)
Biological and Chemical Threats
197(7)
Biological Weapons of Mass Destruction
197(3)
Box 7.3 Case Study: One Man's Terrorist Is Another Man's Artist
200(2)
Chemical Weapons of Mass Destruction
202(2)
Problems in Defending the Homeland against Nuclear, Biological, and Chemical Threats
204(3)
Public Opposition to Counteract Bio-Terrorism Strategies
205(1)
Other Problems in Responding to Nuclear, Biological, and Chemical Terrorism
206(1)
Conclusion: Thinking Outside the Box
207(2)
Chapter Summary
209(1)
Terrorism and You
209(1)
Understanding This Chapter
209(1)
Thinking about How Terrorism Touches You
210(1)
Important Terms and Concepts
210(1)
Endnotes
211(4)
The Day After: Rebuilding Main Street, USA
215(36)
Gary Helfand
Ross Prizzia
Introduction: The Day After
217(1)
The Federal Emergency Management Agency
218(1)
3 Ps: Planning, Partnerships, and Preparation
219(2)
Box 8.1 Up Close and Personal: The Optimism Bias
220(1)
Emergency Operation Plans
221(4)
Box 8.2 Case Study: FEMA Strategic Plan (Fiscal Years 2003--2008)
223(2)
Emergency Response to Terrorism
225(2)
Hazard Mitigation
226(1)
Capability Assessment for Readiness
226(1)
FEMA and Federal Multiagency Coordination
227(4)
Primary Federal Agencies
228(2)
Policies and Federal Agency Authorities
230(1)
Federal Emergency Response Assistance
231(3)
Lead Federal Agency Designation
231(1)
Requests for Federal Assistance
232(1)
Funding
232(1)
Deployment/Employment Priorities
232(1)
Planning Assumptions and Considerations
233(1)
Training and Exercises
233(1)
Emergency Response to a Terrorist Attack Involving Weapons of Mass Destruction
234(3)
Differences between WMD Incidents and Other Incidents
234(1)
Threat Levels
235(1)
Lead Federal Agency Responsibilities
236(1)
FEMA and State and Local Multiagency Coordination
237(2)
Other Planning Considerations
239(7)
Identification and Protection of Critical Infrastructure
239(1)
Inventory of Critical Response Assets
240(1)
Interstate and Intrastate Mutual Aid Agreements
240(1)
Box 8.3 Consider This: Who's Liable for Injuries the Day After
241(2)
Resource Typing
243(1)
Resource Standards
244(1)
Continuity of Operations (COOP) and Continuity of Government (COG)
245(1)
The Role of Citizen and Family Preparedness, Including Citizen Corps
246(1)
Conclusion: Alphabet Soup---Confusion or Cure?
246(1)
Chapter Summary
247(1)
Terrorism and You
248(1)
Understanding This Chapter
248(1)
Thinking about how Terrorism Touches You
248(1)
Important Terms and Concepts
249(1)
Endnotes
249(2)
Defending Liberty: Today and Tomorrow
251(36)
Introduction: A Threat with No End in Sight
253(1)
Continuous Vigilance
253(1)
Cyber-Terrorism
254(13)
Use of the Internet to Promote Terrorism
255(1)
Cyber-Intelligence and Cyber-Attacks
256(4)
Attacks on Critical Infrastructures Using the Internet
260(2)
Cyber-Warfare
262(1)
Defending Cyber-Space
263(4)
Immigration Control and Border Security
267(12)
Box 9.1 Up Close and Personal: May I See Your ID?
268(1)
Immigration Control
269(2)
Box 9.2 Case Study: Security or Discrimination?
271(1)
International Students: Separating Friend from Foe
272(1)
High-Tech Passports: The Promise for More Secure Borders?
273(1)
Deportation: A Simple Solution or Misguided Bureaucracy?
274(1)
Box 9.3 Consider This: Getting under Your Skin
275(3)
Our Neighbors: Canada and Mexico
278(1)
Conclusion: Can the United States Be Terror-Proofed?
279(2)
Chapter Summary
281(1)
Terrorism and You
282(1)
Understanding This Chapter
282(1)
Thinking about How Terrorism Touches You
282(1)
Important Terms and Concepts
283(1)
Endnotes
283(4)
The Cost of Freedom
287(31)
Introduction: Counting the Costs
289(1)
How Terrorists Get Their Money
289(3)
Fund-Raising for Terrorism
289(1)
Funding Terrorism through Criminal Enterprises
290(1)
Cutting Off the Flow of Cash
291(1)
The Cost of the War on Terrorism
292(5)
Kinks in the System
292(3)
Box 10.1 Consider This: 88009
295(1)
Terror-Related Fraud
296(1)
The Other Costs of the War on Terrorism: Extremism in the Defense of Liberty
297(7)
The War on Terrorism and Privacy
297(1)
Box 10.2 Case Study: Freedom of Speech
298(3)
The War on Terrorism and Torture
301(1)
Correcting Extremism
302(2)
The Growing Conflict with Foreigners
304(2)
Racial Profiling
305(1)
International Relations
306(4)
Lessons from Others
308(2)
Conclusion: A Terror-Focused Government
310(2)
Floo Floo Bird Syndrome
311(1)
Box 10.3 Up Close and Personal: Should Those Wrongly Accused Be Compensated?
312(1)
Chapter Summary
312(1)
Terrorism and You
313(1)
Understanding This Chapter
313(1)
Thinking about How Terrorism Touches You
314(1)
Important Terms and Concepts
314(1)
Endnotes
314(4)
Index 318

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program