In the fourth novel of this thrilling series, the Pentagon suspects that the brutal murder of the daughter of a revered Army general is tied to a string of deadly assassinations of U.S. military personnel. Counterintelligence Staff Sergeant David DeLuca and his CI team of specialists are brought in to investigate.
In the fourth novel of this thrilling series, the Pentagon suspects that the brutal murder of the daughter of a revered Army general is tied to a string of deadly assassinations of U.S. military personnel. Counterintelligence Staff Sergeant David DeLuca and his CI team of specialists are brought in to investigate. Original.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
This edited volume uses a ‘constructivist/reflexive’ approach to address critical infrastructure protection (CIP), a central political practice associated with national security. The politics of CIP, and the construction of the threat they are meant to counter, effectively establish a powerful discursive connection between that the traditional and normal conditions for day-to-day politics and the exceptional dynamics of national security. Combining political theory and empirical case studies, this volume addresses key issues related to protection and the governance of insecurity in the contemporary world. The contributors track the transformation and evolution of critical infrastructures (and closely related issues of homeland security) into a security problem, and analyze how practices associated with CIP constitute, and are an expression of, changing notions of security and insecurity. The book explores aspects of ‘securitisation’ as well as at practices, audiences, and contexts that enable and constrain the production of the specific form of governmentality that CIP exemplifies. It also explores the rationalities at play, the effects of these security practices, and the implications for our understanding of security and politics today.
This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software
A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland. Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safeguard life and property within the U.S. homeland. As noted in the U.S. Department of Homeland Security's National Preparedness Goal, the mission area of protection is vital to the homeland in its focus on actions to protect people, vital interests, and our nation's way of life. With that in mind, this book discusses strategies such as risk analysis and assessment, information sharing, and continuity planning. The authors focus on relevant and timely threats and hazards facing specific infrastructure components including, but not limited to, agriculture and food, banking and finance, water, energy, telecommunications, and transportation. The dynamic posture of critical infrastructure security and resilience (CISR) underscores the importance of an integrated, layered all-hazards approach. In describing this approach, the book includes new chapters on planning and guidance, public and private partnerships, cyber issues and threats, and careers in infrastructure protection. Additions such as discussion questions, learning objectives, and fundamental concepts for each chapter provide additional direction for instructors and students alike.
Although military policy seems focused on overseas threats, defending the homeland is, of course, the ultimate objective. This guide examines emergent threats to the USA homeland such as speciality weapons, cyber attacks and ballistic missiles and delineates the army's responsibilities.
In a story so explosive that he can only tell it as fiction, former counterintelligence special agent David DeBatto takes us onto a new kind of battlefield, beyond the reach of reporters, and into the covert ops of elite tactical intelligence teams. Their number one job: to pierce the secrets of an enemy -- before the enemy reaches us . . . Staff Sgt. David DeLuca had a love/hate relationship with the Armed Forces. Then came 9/11. After a career as a street cop, he went to war-and put his skills to work in a secret army within an army. Part detective, con man, spy, and soldier, DeLuca is now hunting a Saddam loyalist Centcom thought was dead. To catch his prey, he'll have to outmaneuver him using microscopic forensic evidence, high-tech espionage tools, and gut instincts. But as he follows a deadly trail out of the Sunni Triangle into Iran, a horrifying picture is coming clear to DeLuca and his elite "red" team: a terrorist group already has its fangs in the USA -- and needs to be hunted down and eliminated right now . . .
At the outset of the new Admin., the Department of Homeland Security Intelligence (DHSI) enterprise consists of the intelligence elements of 6 DHS operational components: Customs and Border Protection, Immigration and Customs Enforcement, Citizenship and Immigration Services, the Transport. Security Admin., Coast Guard, and the Secret Service. This report provides an overview of DHSI both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. Illustrations.
The Rapid Visual Screening (RVS) handbook can be used by trained personnel to identify, inventory, and screen buildings that are potentially seismically vulnerable. The RVS procedure comprises a method and several forms that help users to quickly identify, inventory, and score buildings according to their risk of collapse if hit by major earthquakes. The RVS handbook describes how to identify the structural type and key weakness characteristics, how to complete the screening forms, and how to manage a successful RVS program.