| Preface |
|
xv | |
| Acknowledgments |
|
xix | |
| Author |
|
xxi | |
| Introduction |
|
xxiii | |
|
Chapter 1 The Idea and Origin of Homeland Security |
|
|
1 | (26) |
|
|
|
2 | (1) |
|
1.2 Threats to the Homeland: Twentieth-Century Military Movements |
|
|
2 | (4) |
|
1.3 Threats to the Homeland: The Cold War Experience |
|
|
6 | (7) |
|
1.4 Threats to the Homeland: Revolution, Riot, and Rightful Demonstration |
|
|
13 | (10) |
|
1.4.1 Domestic Terrorism: Pre-9/11 |
|
|
15 | (6) |
|
1.4.2 International Terrorism: Pre-9/11 |
|
|
21 | (2) |
|
|
|
23 | (4) |
|
|
|
23 | (1) |
|
|
|
24 | (1) |
|
|
|
24 | (1) |
|
|
|
25 | (2) |
|
Chapter 2 Terror, Threat, and Disaster Post 9/11: A New Paradigm of Homeland Security |
|
|
27 | (42) |
|
|
|
28 | (1) |
|
|
|
28 | (7) |
|
|
|
35 | (4) |
|
2.3.1 Evolution and Change in DHS |
|
|
36 | (3) |
|
2.4 Reorganization and Evolution of DHS: 2003--2015 |
|
|
39 | (26) |
|
2.4.1 Office of the Secretary of DHS |
|
|
41 | (6) |
|
|
|
47 | (1) |
|
2.4.2.1 Directorate for National Protection and Programs |
|
|
47 | (3) |
|
2.4.2.2 Directorate for Science and Technology |
|
|
50 | (1) |
|
2.4.2.3 Directorate for Management |
|
|
50 | (1) |
|
|
|
51 | (1) |
|
2.4.4 Agencies Swept into DHS |
|
|
51 | (2) |
|
|
|
53 | (3) |
|
2.4.4.2 U.S. Secret Service |
|
|
56 | (2) |
|
2.4.4.3 Federal Protective Service |
|
|
58 | (2) |
|
2.4.4.4 Federal Law Enforcement Training Center |
|
|
60 | (3) |
|
2.4.5 Advisory Panels and Committees |
|
|
63 | (2) |
|
|
|
65 | (4) |
|
|
|
66 | (1) |
|
|
|
66 | (1) |
|
|
|
67 | (1) |
|
|
|
67 | (2) |
|
Chapter 3 Homeland Security Law, Regulations, and Budgeting |
|
|
69 | (68) |
|
|
|
69 | (1) |
|
3.2 Homeland Security Law, Regulations, and Executive Orders |
|
|
70 | (19) |
|
3.2.1 Executive Order 13228: Origin of DHS |
|
|
70 | (1) |
|
3.2.2 Executive Order 12231: Protection of Infrastructure |
|
|
70 | (3) |
|
3.2.3 Executive Order 13493 of January 22, 2009 |
|
|
73 | (5) |
|
3.2.4 Executive Order 13567 of March 7, 2011 |
|
|
78 | (1) |
|
3.2.5 Homeland Security Act of 2002 |
|
|
79 | (1) |
|
3.2.5.1 Homeland Security Act and Posse Comitatus |
|
|
79 | (3) |
|
3.2.6 USA Patriot Act: USA Freedom Act of 2015 |
|
|
82 | (2) |
|
|
|
84 | (1) |
|
|
|
84 | (3) |
|
3.2.7.2 Office of Biometric Identity Management; Formerly Office of US-VISIT |
|
|
87 | (1) |
|
3.2.7.3 Chemical Facilities |
|
|
88 | (1) |
|
3.2.7.4 Invention and Technology: The SAFETY Act |
|
|
88 | (1) |
|
3.3 Budgeting, Finance, and Funding in Homeland Security |
|
|
89 | (42) |
|
|
|
89 | (1) |
|
|
|
90 | (9) |
|
|
|
99 | (6) |
|
|
|
105 | (4) |
|
|
|
109 | (3) |
|
|
|
112 | (5) |
|
3.3.7 Budget Years: 2009--2010 |
|
|
117 | (2) |
|
3.3.8 Budget Years: 2011--2012 |
|
|
119 | (4) |
|
|
|
123 | (3) |
|
|
|
126 | (2) |
|
|
|
128 | (3) |
|
|
|
131 | (6) |
|
|
|
131 | (1) |
|
|
|
132 | (1) |
|
|
|
132 | (1) |
|
|
|
133 | (4) |
|
Chapter 4 Risk Management, Threats, and Hazards |
|
|
137 | (68) |
|
|
|
138 | (1) |
|
|
|
138 | (9) |
|
|
|
139 | (1) |
|
|
|
140 | (5) |
|
4.2.3 CARVER+Shock Assessment Tool |
|
|
145 | (2) |
|
|
|
147 | (35) |
|
4.3.1 Concept of Threat and Hazard |
|
|
147 | (6) |
|
4.3.2 Weapons of Mass Destruction |
|
|
153 | (1) |
|
|
|
153 | (6) |
|
|
|
159 | (3) |
|
|
|
162 | (7) |
|
|
|
169 | (11) |
|
4.3.2.5 Improvised Explosive Devices |
|
|
180 | (2) |
|
4.4 Computer Security and Information Infrastructure |
|
|
182 | (9) |
|
4.4.1 National Cyber Security Division |
|
|
187 | (1) |
|
4.4.2 US-CERT: Computer Emergency Response Team |
|
|
188 | (3) |
|
4.5 Private Sector and Homeland Security |
|
|
191 | (6) |
|
|
|
197 | (8) |
|
|
|
198 | (1) |
|
|
|
199 | (1) |
|
|
|
200 | (1) |
|
|
|
201 | (4) |
|
Chapter 5 Training and Exercises in Homeland Security |
|
|
205 | (34) |
|
|
|
206 | (1) |
|
|
|
207 | (7) |
|
5.3 Center for Domestic Preparedness |
|
|
214 | (1) |
|
5.4 Emergency Management Institute |
|
|
215 | (3) |
|
5.5 Homeland Security Exercise and Evaluation Program |
|
|
218 | (4) |
|
5.6 Lessons Learned: Best Practices (LLIS.GOV)/Homeland Security Digital Library (HSDL) |
|
|
222 | (2) |
|
5.7 Community Emergency Response Teams |
|
|
224 | (1) |
|
5.8 National Incident Management System |
|
|
225 | (8) |
|
|
|
233 | (6) |
|
|
|
236 | (1) |
|
|
|
236 | (1) |
|
|
|
237 | (1) |
|
|
|
237 | (2) |
|
Chapter 6 DHS Challenges: National versus State and Local, National Security versus Homeland Security |
|
|
239 | (48) |
|
|
|
240 | (2) |
|
6.2 Challenge of National Policy at the State and Local Levels |
|
|
242 | (19) |
|
6.2.1 Structure at the State Level |
|
|
242 | (8) |
|
6.2.2 Structure at the Local Level |
|
|
250 | (7) |
|
|
|
257 | (3) |
|
6.2.3 Funding and Local Initiatives |
|
|
260 | (1) |
|
6.3 Fine Line of National and Homeland Security |
|
|
261 | (22) |
|
6.3.1 Department of Defense and Homeland Security |
|
|
267 | (4) |
|
6.3.2 Intelligence Gathering and Sharing |
|
|
271 | (1) |
|
6.3.2.1 Office of Naval Intelligence |
|
|
271 | (1) |
|
6.3.2.2 Air Force Intelligence |
|
|
272 | (2) |
|
6.3.2.3 U.S. Marine Corps |
|
|
274 | (2) |
|
|
|
276 | (1) |
|
6.3.3 Specialized Military/Defense Units Dedicated to Homeland Security |
|
|
277 | (1) |
|
6.3.3.1 National Maritime Intelligence-Integration Office (NMIO) |
|
|
278 | (1) |
|
6.3.3.2 National Reconnaissance Office |
|
|
278 | (1) |
|
6.3.3.3 Weapons of Mass Destruction Civil Support Teams |
|
|
279 | (1) |
|
6.3.3.4 Defense Threat Reduction Agency and USSTRATCOM Center for Combating WMD and Standing Joint Force Headquarters Elimination |
|
|
280 | (3) |
|
|
|
283 | (4) |
|
|
|
284 | (1) |
|
|
|
284 | (1) |
|
|
|
285 | (1) |
|
|
|
285 | (2) |
|
Chapter 7 FEMA, Response, and Recovery |
|
|
287 | (34) |
|
7.1 Historical Foundation for FEMA |
|
|
288 | (5) |
|
7.1.1 Federal Emergency Management Agency: Pre-9/11 |
|
|
288 | (1) |
|
7.1.2 Federal Emergency Management Agency: Post-9/11 |
|
|
289 | (4) |
|
7.2 FEMA and Preparedness |
|
|
293 | (17) |
|
7.2.1 Role of Mitigation in the Preparedness Model |
|
|
299 | (11) |
|
7.3 FEMA Response and Recovery |
|
|
310 | (7) |
|
7.3.1 National Response Framework |
|
|
311 | (6) |
|
|
|
317 | (4) |
|
|
|
317 | (1) |
|
|
|
318 | (1) |
|
|
|
318 | (1) |
|
|
|
319 | (2) |
|
|
|
321 | (38) |
|
|
|
321 | (1) |
|
|
|
322 | (3) |
|
8.3 Terror, Threats, Disaster, and Intelligence Agencies |
|
|
325 | (28) |
|
8.3.1 Federal Bureau of Investigation |
|
|
327 | (2) |
|
8.3.1.1 Joint Terrorism Task Forces |
|
|
329 | (3) |
|
8.3.1.2 National Security Branch |
|
|
332 | (3) |
|
8.3.1.3 Analysis of Intelligence |
|
|
335 | (1) |
|
8.3.2 Central Intelligence Agency |
|
|
336 | (4) |
|
8.3.2.1 Directorate of Analysis |
|
|
340 | (1) |
|
8.3.2.2 Office of Clandestine Services |
|
|
341 | (1) |
|
8.3.2.3 Directorate of Science and Technology |
|
|
341 | (1) |
|
8.3.2.4 Directorate of Digital Innovation |
|
|
341 | (1) |
|
8.3.2.5 Directorate of Support |
|
|
342 | (1) |
|
|
|
342 | (1) |
|
8.3.3 Offices of the Director |
|
|
343 | (3) |
|
8.3.3.1 National Counterterrorism Center |
|
|
346 | (1) |
|
8.3.3.2 National Counterintelligence and Security Center |
|
|
347 | (2) |
|
8.3.3.3 National Intelligence Council |
|
|
349 | (2) |
|
8.3.4 Defense Intelligence Agency |
|
|
351 | (2) |
|
|
|
353 | (6) |
|
|
|
354 | (1) |
|
|
|
354 | (1) |
|
|
|
355 | (1) |
|
|
|
356 | (3) |
|
Chapter 9 Border Security, U.S. Citizenship, and Immigration Services |
|
|
359 | (38) |
|
|
|
360 | (1) |
|
9.2 U.S. Customs and Border Protection |
|
|
360 | (23) |
|
|
|
362 | (4) |
|
9.2.1.1 Secure Border Initiative: Its Creation and Demise |
|
|
366 | (5) |
|
9.2.1.2 CBP Air and Marine |
|
|
371 | (2) |
|
9.2.2 CBP and the Facilitation of Trade and Commerce |
|
|
373 | (1) |
|
|
|
374 | (9) |
|
9.3 U.S. Citizenship and Immigration Services |
|
|
383 | (10) |
|
9.3.1 Project Shield America Initiative |
|
|
384 | (3) |
|
9.3.2 Fugitive Operations Program |
|
|
387 | (2) |
|
9.3.3 Cornerstone Initiative |
|
|
389 | (1) |
|
9.3.4 Cyber Crimes Center |
|
|
389 | (3) |
|
9.3.5 US-VISIT Program/Office of Biometric Identity Management |
|
|
392 | (1) |
|
|
|
393 | (4) |
|
|
|
394 | (1) |
|
|
|
395 | (1) |
|
|
|
395 | (1) |
|
|
|
395 | (2) |
|
Chapter 10 Transportation Security |
|
|
397 | (66) |
|
|
|
398 | (1) |
|
10.2 Transportation Security Administration |
|
|
398 | (19) |
|
10.2.1 Federal Air Marshals |
|
|
405 | (1) |
|
10.2.2 Federal Flight Deck Officers |
|
|
405 | (1) |
|
10.2.3 Law Enforcement Officers Flying Armed |
|
|
406 | (1) |
|
10.2.4 TSA's Canine Explosive Detection Unit |
|
|
406 | (2) |
|
10.2.5 Risk Management Programs |
|
|
408 | (1) |
|
10.2.6 TSA Technology and Innovation |
|
|
409 | (1) |
|
10.2.6.1 Trace Portals and Their Demise |
|
|
409 | (1) |
|
10.2.6.2 Millimeter Wave/Advanced Imaging Technology |
|
|
410 | (2) |
|
|
|
412 | (5) |
|
|
|
417 | (21) |
|
10.3.1 National Strategy for Maritime Security |
|
|
419 | (1) |
|
10.3.2 Other Maritime Plans |
|
|
420 | (1) |
|
10.3.2.1 National Plan to Achieve Maritime Domain Awareness |
|
|
421 | (1) |
|
10.3.2.2 Maritime Transportation System Security Plan |
|
|
421 | (1) |
|
10.3.3 DHS: Borders and Marine Division |
|
|
421 | (2) |
|
10.3.4 Role of the Coast Guard in Maritime Security |
|
|
423 | (1) |
|
10.3.4.1 Emergency Safety |
|
|
424 | (1) |
|
10.3.4.2 Security and Law Enforcement |
|
|
425 | (6) |
|
|
|
431 | (7) |
|
10.4 Rail and Mass Transit |
|
|
438 | (14) |
|
10.4.1 Representative Security Programs for Rail and Transit |
|
|
444 | (1) |
|
|
|
445 | (2) |
|
10.4.1.2 CSX: The Freight Line |
|
|
447 | (3) |
|
10.4.1.3 SEPTA: Rail Mass Transit |
|
|
450 | (2) |
|
|
|
452 | (11) |
|
|
|
458 | (1) |
|
|
|
459 | (1) |
|
|
|
459 | (1) |
|
|
|
460 | (3) |
|
Chapter 11 Homeland Security and Public Health |
|
|
463 | (56) |
|
|
|
463 | (1) |
|
|
|
464 | (11) |
|
11.3 Agriculture and Food |
|
|
475 | (20) |
|
11.3.1 Strategic Partnership Program on Agroterrorism |
|
|
479 | (5) |
|
11.3.2 Infectious Animals |
|
|
484 | (4) |
|
11.3.3 Infectious Diseases and Bioterrorism |
|
|
488 | (4) |
|
11.3.3.1 Project BioShield |
|
|
492 | (1) |
|
11.3.3.2 Strategic National Stockpile |
|
|
492 | (3) |
|
11.3.3.3 National Select Agent Registry Program |
|
|
495 | (1) |
|
|
|
495 | (16) |
|
11.4.1 Planning, Preparedness, and Response |
|
|
505 | (6) |
|
|
|
511 | (8) |
|
|
|
516 | (1) |
|
|
|
516 | (1) |
|
|
|
516 | (1) |
|
|
|
517 | (2) |
|
Chapter 12 The Future of Homeland Security |
|
|
519 | (20) |
|
|
|
519 | (4) |
|
12.2 Growth without Reason |
|
|
523 | (2) |
|
12.3 Curbing Expansionism in Mission |
|
|
525 | (3) |
|
12.4 The Merits of Decentralization |
|
|
528 | (1) |
|
12.5 The Rise of Technology |
|
|
529 | (4) |
|
12.6 The Need for a New Way of Thinking: Jump Out of the Box |
|
|
533 | (6) |
|
|
|
536 | (3) |
| Appendix I |
|
539 | (4) |
| Appendix II |
|
543 | (10) |
| Appendix III |
|
553 | (40) |
| Appendix IV |
|
593 | (12) |
| Appendix V |
|
605 | (6) |
| Index |
|
611 | |