| Dedication |
|
iii | |
| Acknowledgments |
|
v | |
| Preface |
|
ix | |
| Part I Threats Against the United States and the Creation of Homeland Security |
|
1 | |
|
Chapter 1 Homeland Security in the Making |
|
|
3 | |
|
|
|
3 | |
|
|
|
3 | |
|
From the 1960's to the 1990's |
|
|
9 | |
|
|
|
11 | |
|
|
|
16 | |
|
Changing Global Perspective |
|
|
20 | |
|
Chapter 2 The 9/11 Attacks |
|
|
27 | |
|
|
|
27 | |
|
|
|
28 | |
|
|
|
30 | |
|
|
|
30 | |
|
|
|
32 | |
|
|
|
33 | |
|
|
|
33 | |
|
The New York City Fire Department (FDNY) |
|
|
33 | |
|
The New York City Police Department (NYPD) |
|
|
34 | |
|
The Port Authority Police Department (PAPD) |
|
|
35 | |
|
Office of Emergency Operations |
|
|
36 | |
|
|
|
36 | |
|
|
|
36 | |
|
|
|
37 | |
|
American Airlines Flight 11 |
|
|
40 | |
|
United Airlines Flight 175 |
|
|
41 | |
|
American Airlines Flight 77 |
|
|
42 | |
|
United Airlines Flight 93 |
|
|
43 | |
|
|
|
44 | |
|
|
|
48 | |
|
|
|
50 | |
|
Chapter 3 9/11 Commission and the Department of Homeland Security |
|
|
57 | |
|
|
|
57 | |
|
|
|
68 | |
|
9/11 Commission Recommendations |
|
|
68 | |
| Part II The Homeland Security Transformation |
|
83 | |
|
Chapter 4 The Intelligence Community |
|
|
85 | |
|
|
|
85 | |
|
Intelligence and Homeland Security |
|
|
86 | |
|
Intelligence Reform and Terrorism Prevention Act of 2004 |
|
|
94 | |
|
National Counterterrorism Center |
|
|
96 | |
|
National Counterproliferation Center |
|
|
96 | |
|
Joint Intelligence Community Council |
|
|
97 | |
|
Chapter 5 The Role of the U.S. Military in Homeland Security |
|
|
103 | |
|
|
|
103 | |
|
The Creation of Northern Command |
|
|
104 | |
|
The Role of NORTHCOM in Counterterrorism |
|
|
107 | |
|
|
|
109 | |
|
Disposition and Transportation of a WMD |
|
|
109 | |
|
|
|
109 | |
|
Requests for Tactical Assistance |
|
|
110 | |
|
Legal Framework for Military Intervention in Homeland Defense |
|
|
110 | |
|
The Insurrection Statutes |
|
|
111 | |
|
Military Tactical Assistance Operational Response |
|
|
112 | |
|
Chapter 6 Public-Private Partnerships |
|
|
117 | |
|
|
|
117 | |
|
The Federal Government and the Private Sector |
|
|
118 | |
|
|
|
119 | |
|
Terror Attacks on American Interests Abroad |
|
|
121 | |
|
Department of Homeland Security Outreach Programs |
|
|
123 | |
|
Information Security and Analysis Center (ISAC) |
|
|
123 | |
|
Office of the Private Sector |
|
|
125 | |
|
Protected Critical Infrastructure Information (PCII) Program |
|
|
126 | |
|
Office of Interoperability and Compatibility |
|
|
127 | |
|
|
|
127 | |
|
|
|
127 | |
|
Information Technology Acquisition Center |
|
|
128 | |
|
|
|
128 | |
|
|
|
129 | |
|
Citizen-Ready Initiatives of DHS |
|
|
129 | |
|
|
|
129 | |
|
Community Emergency Response Teams (CERT) |
|
|
129 | |
|
|
|
129 | |
|
|
|
130 | |
|
Homeland Security Advisory System |
|
|
130 | |
|
Homeland Security Information Network (HSIN) |
|
|
130 | |
|
|
|
131 | |
|
Transit and Rail Inspection Pilot (TRIP) Program |
|
|
131 | |
|
Law Enforcement and Security Officers Working Together |
|
|
131 | |
| Part III Homeland Security Strategies and Initiatives |
|
137 | |
|
Chapter 7 Critical Infrastructure Protection |
|
|
139 | |
|
|
|
139 | |
|
What Is Critical Infrastructure? |
|
|
139 | |
|
|
|
141 | |
|
|
|
142 | |
|
Critical Infrastructure Sectors |
|
|
143 | |
|
|
|
143 | |
|
|
|
144 | |
|
|
|
146 | |
|
|
|
148 | |
|
|
|
149 | |
|
|
|
150 | |
|
|
|
151 | |
|
|
|
152 | |
|
|
|
153 | |
|
Chemical and Hazardous Materials |
|
|
154 | |
|
|
|
155 | |
|
Chapter 8 Transportation Infrastructure in the U.S. |
|
|
159 | |
|
|
|
159 | |
|
Transportation Infrastructure in the U.S. |
|
|
159 | |
|
|
|
160 | |
|
Roads/Highway Infrastructures |
|
|
160 | |
|
|
|
161 | |
|
|
|
163 | |
|
|
|
163 | |
|
Freight and Long-Haul Passenger Rail |
|
|
164 | |
|
Regulatory Agencies for Transportation Infrastructure |
|
|
165 | |
|
|
|
167 | |
|
Initiatives to Border Security Since 9/11 |
|
|
168 | |
|
|
|
168 | |
|
|
|
169 | |
|
|
|
170 | |
|
|
|
171 | |
|
Chapter 9 Communications and Information Technology |
|
|
175 | |
|
Threat and Vulnerability Assessment |
|
|
175 | |
|
Why Computer Attacks Are Successful |
|
|
177 | |
|
Why Computer Vulnerabilities Persist |
|
|
178 | |
|
Possible Effects of Cyber Attacks |
|
|
179 | |
|
Physical Security: Lower Risk, but Less Drama |
|
|
179 | |
|
|
|
180 | |
|
Possible Links Between Hackers and Terrorists |
|
|
182 | |
|
Level 1, the Home User/Small Business |
|
|
182 | |
|
Level 2, Large Enterprises |
|
|
183 | |
|
Level 3, Critical Sectors/Infrastructures |
|
|
183 | |
|
Level 4, National Issues and Vulnerabilities |
|
|
183 | |
|
|
|
183 | |
|
Chapter 10 Counterterrorism and Homeland Security |
|
|
187 | |
|
|
|
187 | |
|
Types of Counterterrorism Investigations |
|
|
190 | |
|
|
|
192 | |
|
|
|
192 | |
|
|
|
194 | |
|
|
|
195 | |
|
Joint Terrorism Task Forces (JTTFs) |
|
|
196 | |
|
|
|
197 | |
|
Toward New Models of Terrorist Funding and Operations |
|
|
200 | |
|
Chapter 11 Weapons of Mass Destruction |
|
|
205 | |
|
|
|
205 | |
|
|
|
206 | |
|
Chemical Weapons of Mass Destruction |
|
|
207 | |
|
Biological Weapons of Mass Destruction |
|
|
212 | |
|
|
|
212 | |
|
|
|
214 | |
|
|
|
216 | |
|
|
|
216 | |
|
Radiological & Nuclear Weapons of Mass Destruction |
|
|
222 | |
|
U.S. Strategies to Combat Weapons of Mass Destruction |
|
|
223 | |
| Part IV Homeland Security and Beyond |
|
229 | |
|
Chapter 12 Responding to Natural Disasters |
|
|
231 | |
|
Fall 2005 Hurricane Season |
|
|
231 | |
|
|
|
231 | |
|
|
|
235 | |
|
Chapter 13 Legal Issues in Homeland Security |
|
|
241 | |
|
|
|
241 | |
|
|
|
243 | |
|
Title I: Enhancing Domestic Security Against Terrorism |
|
|
244 | |
|
Title II: Enhanced Surveillance Procedures |
|
|
245 | |
|
Title III: International Money Laundering Abatement and Anti-Terrorist Financing Act of 2001 |
|
|
248 | |
|
Title IV: Protecting the Border |
|
|
249 | |
|
Title V: Removing Obstacles to Investigating Terrorism |
|
|
250 | |
|
Title VI: Providing for Victims of Terrorism, Public Safety Officers, and Their Families |
|
|
251 | |
|
Title VII: Increased Information Sharing for Critical Infrastructure Protection |
|
|
251 | |
|
Title VIII: Strengthening the Criminal Laws Against Terrorism |
|
|
251 | |
|
Title IX: Improved Intelligence |
|
|
252 | |
|
|
|
252 | |
|
Foreign Intelligence Surveillance Act (FISA) |
|
|
253 | |
|
Communications Assistance for Law Enforcement Act (CALEA) |
|
|
256 | |
|
Terrorism Risk Insurance Act |
|
|
256 | |
|
Chapter 14 The Future: Critical Issues in Homeland Security |
|
|
261 | |
|
|
|
261 | |
|
|
|
262 | |
|
|
|
263 | |
|
Weapons of Mass Destruction |
|
|
265 | |
|
|
|
267 | |
|
|
|
269 | |
|
|
|
269 | |
|
Responses to Terrorist Attacks and Other Disasters |
|
|
270 | |
|
|
|
270 | |
|
The Aftermath of Disaster |
|
|
271 | |
|
|
|
272 | |
| Appendices |
|
275 | |
|
Appendix 1: Selected Commission Recommendations |
|
|
277 | |
|
Appendix 2: 9/11 Hijackers |
|
|
283 | |
|
Appendix 3: Organizational Charts and Mission Statements of Selected Agencies |
|
|
289 | |
| Name Index |
|
309 | |
| Subject Index |
|
311 | |