Defending the Homeland: Domestic Intelligence, Law Enforcement, and Security

Defending the Homeland: Domestic Intelligence, Law Enforcement, and Security

Author: Jonathan White

Publisher: Cengage Learning

Published: 2003-04-02

Total Pages: 144

ISBN-13: 9780534621698

DOWNLOAD EBOOK

The United States government is reorganizing to increase domestic security. How will these changes impact the American criminal justice system? DEFENDING THE HOMELAND: DOMESTIC INTELLIGENCE, LAW ENFORCEMENT, AND SECURITY is the only book that illustrates up-to-the minute information on how our criminal justice system has changed since 9/11. Written by an expert on academic leave to provide training for the Department of Defense, White provides an insider's look at issues related to restructuring of federal law enforcement and recent policy challenges. The book discusses the problem of bureaucracy, interaction between the law enforcement and intelligence communities, civil liberties, and theories of war and police work. From a practical perspective, the book examines offensive and defensive strategies. The book gives an introduction to violent international religious terrorism and an overview of domestic terrorist problems still facing law enforcement. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.


Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

Author: Anthony H. Cordesman

Publisher: Bloomsbury Publishing USA

Published: 2001-11-30

Total Pages: 462

ISBN-13: 0313006903

DOWNLOAD EBOOK

There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.


Protecting the American Homeland

Protecting the American Homeland

Author: Michael E. O'Hanlon

Publisher: Rowman & Littlefield

Published: 2011-10-25

Total Pages: 236

ISBN-13: 9780815764540

DOWNLOAD EBOOK

A good deal has been done to improve the safety of Americans on their own soil since the attacks of September 11, 2001. Yet there have been numerous setbacks. The Bush administration and Congress wasted at least six months in 2002 due to partisan disagreement over a new budget for homeland security, and as one consequence, resources were slow to reach first responders across the country. Most improvements in homeland security have focused on "refighting the last war"—improving defenses against attacks similar to those the country has already suffered. Not enough has been done to anticipate possible new kinds of terrorist actions. Policymakers have also focused too much attention on the creation of a department of homeland security—rather than identifying and addressing the kinds of threats to which the country remains vulnerable. While the creation of a cabinet-level agency focusing on homeland security may have merit, the authors of this study argue that the department will not, in and of itself, make Americans safer. To the contrary, the complexity of merging so many disparate agencies threatens to distract Congress and the administration from other, more urgent security efforts. This second edition of Protecting the American Homeland urges policymakers to focus on filling key gaps that remain in the current homeland security effort: identifying better protection for private infrastructure; using information technology to share intelligence and more effectively "connect the dots" that could hold hints to possible terrorist tactics; expanding the capacities of the Coast Guard and Customs Service, as well as airline transportation security; dealing with the possible threat of surface-to-air missiles to airliners; and encouraging better coordination among intelligence agencies. While acknowledging the impossibility of preventing every possible type of terrorist violence, the authors recommend a more systematic approach to homeland security that focuses


Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA)

Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA)

Author: Bert B. Tussing

Publisher: CRC Press

Published: 2014-11-24

Total Pages: 226

ISBN-13: 1466595671

DOWNLOAD EBOOK

The application of our Armed Forces within the states and territories of the United States is far from intuitive. The challenges of defending the country against assaults within the homeland are much more complex than engaging our enemies on foreign soil. Likewise, the introduction of the military’s appreciable capabilities in response to disasters, be they natural or manmade, comes with authorities and restrictions reflective of an American ethos that will always hold those forces as the servants of the people, never their overseers. Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA): The U.S. Military’s Role to Support and Defend examines the requirements and regulations that guide the utilization of our forces in the domestic environment. Topics include: The importance of the distinctions between homeland security, homeland defense, and Defense Support of Civil Authorities as they pertain to both authorities and responsibilities The deliberately subservient position of the military to civil authorities when engaged in response and recovery operations following a disaster The unique relationship between the United States Navy and the United States Coast Guard in a mutually supportive effort that bridges requirements between defense on the high seas and law enforcement in territorial waters The air defense mission over the United States, orchestrating manned aircraft, unmanned aircraft, and cruise missiles against threats of the same nature The exceptional challenges that would be associated with the application of land forces in a defense mission on American soil The development of the CBRN (Chemical, Biological, Radiological, Nuclear) Enterprise as a function of the nation’s focus on preventing, responding to and recovering from a Weapons of Mass Destruction attack New challenges emerging in the domestic environment that will call for the application of military resources, to include the Arctic, complex catastrophes, and cybersecurity issues


Critical Infrastructure Protection in Homeland Security

Critical Infrastructure Protection in Homeland Security

Author: Ted G. Lewis

Publisher: John Wiley & Sons

Published: 2006-03-31

Total Pages: 488

ISBN-13: 0471789534

DOWNLOAD EBOOK

A scientific approach to the new field of critical infrastructure protection This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector. The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure--the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector. A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows(r) and Apple Macintosh(r) compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us. This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.


Hate in the Homeland

Hate in the Homeland

Author: Cynthia Miller-Idriss

Publisher: Princeton University Press

Published: 2022-01-11

Total Pages: 288

ISBN-13: 0691234299

DOWNLOAD EBOOK

A startling look at the unexpected places where violent hate groups recruit young people Hate crimes. Misinformation and conspiracy theories. Foiled white-supremacist plots. The signs of growing far-right extremism are all around us, and communities across America and around the globe are struggling to understand how so many people are being radicalized and why they are increasingly attracted to violent movements. Hate in the Homeland shows how tomorrow's far-right nationalists are being recruited in surprising places, from college campuses and mixed martial arts gyms to clothing stores, online gaming chat rooms, and YouTube cooking channels. Instead of focusing on the how and why of far-right radicalization, Cynthia Miller-Idriss seeks answers in the physical and virtual spaces where hate is cultivated. Where does the far right do its recruiting? When do young people encounter extremist messaging in their everyday lives? Miller-Idriss shows how far-right groups are swelling their ranks and developing their cultural, intellectual, and financial capacities in a variety of mainstream settings. She demonstrates how young people on the margins of our communities are targeted in these settings, and how the path to radicalization is a nuanced process of moving in and out of far-right scenes throughout adolescence and adulthood. Hate in the Homeland is essential for understanding the tactics and underlying ideas of modern far-right extremism. This eye-opening book takes readers into the mainstream places and spaces where today's far right is engaging and ensnaring young people, and reveals innovative strategies we can use to combat extremist radicalization.


Security Mom

Security Mom

Author: Juliette Kayyem

Publisher: Simon and Schuster

Published: 2016-04-05

Total Pages: 272

ISBN-13: 1476733775

DOWNLOAD EBOOK

In “a lively debut…[with] plenty of enthusiastic ‘can-do’ advice” (Publishers Weekly), a Homeland Security advisor and a Pulitzer Prize–nominated columnist—and mother of three—delivers a timely message about American security: it begins at home. Soccer Moms are so last decade. Juliette Kayyem is a “Security Mom.” At once a national security expert who worked at the highest levels of government, and also a mom of three, she’s lived it all—from anthrax to lice to the BP oil spill—and now she tells it all with her unique voice of reason, experience, and humility. Weaving her personal story of marriage and motherhood into a fast-paced account of managing the nation’s most perilous disasters, Juliette recounts the milestones that mark the path of her unpredictable, daring, funny, and ultimately relatable life. Security Mom is modern tale about the highs and lows of having-it-all parenthood and a candid, sometimes shocking, behind-the-scenes look inside the high-stakes world of national security. In her signature refreshing style, Juliette reveals how she came to learn that homeland security is not simply about tragedy and terror; it is about us as parents and neighbors, and what we can do every day to keep each other strong and safe. From stocking up on coloring books to stashing duplicate copies of valuable papers out of state, Juliette’s wisdom does more than just prepare us to survive in an age of mayhem—it empowers us to thrive. “You got this,” Juliette tells her readers, providing accessible advice about how we all can better prepare ourselves for a world of risks.


Military Transformation and Modern Warfare

Military Transformation and Modern Warfare

Author: Elinor Sloan

Publisher: Bloomsbury Publishing USA

Published: 2008-02-28

Total Pages: 196

ISBN-13: 1573569895

DOWNLOAD EBOOK

Military transformation can be understood as comprising three overlapping and sometimes competing layers—the conventional-force dominated revolution in military affairs, a more recent irregular warfare emphasis, and a wider dimension including homeland defense, space and nuclear policy. The Western world is currently focusing its attention on transformation's middle layer, while China and Russia are focusing on the RMA and transformation's wider aspects. This dynamic indicates the United States and its allies should continue to prepare for the full range of conflicts. This book establishes the meaning of military transformation, assesses the manner in which certain countries are transforming their military forces, discusses the relevancy of transformation efforts to modern conflict and, in drawing out the key areas of emphasis on the part of various countries, provides a window on the future global security environment. It is divided into seven chapters, plus a conclusion. The first chapter focuses on the meaning of military transformation, establishing a framework through which national militaries can be examined. This comprises transformation's revolution in military affairs components, its newer special operations forces, counterinsurgency, and stabilization and reconstruction aspects, and its wider homeland defense, space and deterrence dimensions. The book devotes two chapters to the United States and one each to China, Russia, and NATO. It also has a chapter that looks individually at each of Australia, Britain, Canada, France and Germany. An assessment of the relevancy of force transformation to modern warfare is integrated into the discussion of what transformation means, how the United States is responding, and the concluding chapter. The book contains a biographical sketch of Andrew Marshall, Andrew Krepinevich, William Owens, Arthur Cebrowski, Donald Rumsfeld, and Thomas Barnett, all of whom have been involved in some aspect of military transformation.