Preface |
|
xi | |
Acknowledgments |
|
xv | |
About the Author |
|
xvii | |
|
Introduction: Homeland Security Vision |
|
|
1 | (24) |
|
The Desired State of Homeland Security |
|
|
1 | (3) |
|
The Current State of Homeland Security |
|
|
4 | (5) |
|
Homeland Security Issues and Challenges |
|
|
9 | (2) |
|
Everyone Has a Role in Homeland Security |
|
|
11 | (1) |
|
|
12 | (2) |
|
The Direct Impact of Modern-Day Terrorism |
|
|
14 | (1) |
|
What's at Stake with Today's Terrorist Attacks |
|
|
15 | (5) |
|
Countering Terrorism with DHS Help |
|
|
20 | (3) |
|
|
23 | (2) |
|
|
25 | (28) |
|
The Problem We Face with Threats |
|
|
25 | (2) |
|
General Threats to Security Hierarchy Components |
|
|
27 | (2) |
|
General Threat Effect on Homeland Security |
|
|
29 | (1) |
|
Threat Management Through Intelligence |
|
|
30 | (3) |
|
Terrorists' Operational Methodology |
|
|
33 | (4) |
|
Limitations of Early Warnings |
|
|
37 | (3) |
|
Creating Your Own Threat-Warning Capabilities |
|
|
40 | (1) |
|
Painful Lesson: The USS Cole Attack |
|
|
41 | (2) |
|
Implications of Not Understanding Threats |
|
|
43 | (2) |
|
Lesson Learned: First World Trade Center Attack, 1993 |
|
|
45 | (1) |
|
Lesson Learned: First American Hijacking, 1961 |
|
|
45 | (1) |
|
Homeland Security Roles and Misconceptions |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (2) |
|
Threat, Vulnerability, and Risk Components |
|
|
53 | (30) |
|
|
53 | (4) |
|
DHS Risk Model and National Infrastructure Protection Plan (NIPP) |
|
|
57 | (3) |
|
Responsibility and Accountability per DHS |
|
|
60 | (1) |
|
How to Perform Your Own Threat Assessment |
|
|
60 | (1) |
|
|
61 | (3) |
|
A Framework for Taking the NIPP Approach |
|
|
64 | (1) |
|
A Framework for Assessing Threat |
|
|
65 | (5) |
|
|
70 | (2) |
|
Terrorist Activity Indicators |
|
|
71 | (1) |
|
Espionage or Insider Threats |
|
|
71 | (1) |
|
Information and Technical Threats |
|
|
71 | (1) |
|
How to Handle Discoveries of Threat and Vulnerabilities |
|
|
72 | (4) |
|
Determining Vulnerability |
|
|
73 | (3) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (3) |
|
|
80 | (1) |
|
|
81 | (2) |
|
Risk Mitigation, Transference, and Elimination |
|
|
83 | (12) |
|
|
84 | (5) |
|
Lessons Not Easily Learned |
|
|
89 | (6) |
|
Readiness Plans: Develop, Validate, and Update |
|
|
95 | (24) |
|
|
95 | (3) |
|
|
98 | (1) |
|
Collaboration with External Organizations |
|
|
99 | (3) |
|
Beginning the Development Process |
|
|
102 | (3) |
|
|
105 | (2) |
|
|
107 | (7) |
|
Internal Communications Considerations |
|
|
108 | (1) |
|
|
109 | (1) |
|
Crisis and Media Communications |
|
|
109 | (2) |
|
Plan Response for Bomb Threats |
|
|
111 | (1) |
|
Addressing Loading Docks and Mailrooms |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Plan to Share Information |
|
|
114 | (3) |
|
What DHS Says about Protected Critical Infrastructure Information (PCII) |
|
|
117 | (2) |
|
Prevention, Detection, and Response Factors across Sectors |
|
|
119 | (22) |
|
|
119 | (5) |
|
Innovative Prevention Approaches |
|
|
124 | (3) |
|
Innovative Detection Technology |
|
|
127 | (1) |
|
Investing in Response Capabilities through Partnership |
|
|
128 | (4) |
|
Other Contributors to Homeland Security |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
136 | (5) |
|
Human Factors and Team Dynamics |
|
|
141 | (28) |
|
|
141 | (1) |
|
Humanity in Crisis and Hero Mode |
|
|
142 | (1) |
|
Female Terrorists: The Human Factor Gone Wrong |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (3) |
|
|
149 | (2) |
|
|
151 | (1) |
|
Diversity as a Problem Solver |
|
|
152 | (1) |
|
The ``Human Factor'' as a Tool |
|
|
153 | (3) |
|
Dysfunctional Group Dynamics |
|
|
156 | (2) |
|
Discussion versus Dialogue |
|
|
158 | (1) |
|
How to Get your Team to Dialogue |
|
|
159 | (1) |
|
Leadership versus Management |
|
|
160 | (2) |
|
Roadblocks to Effective TeamWork |
|
|
162 | (5) |
|
Roadblock 1: Lack of Proper Foundation |
|
|
164 | (1) |
|
Roadblock 2: Linguistic Differences |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
|
Toolkits and Innovative Ideas for Change |
|
|
169 | (28) |
|
|
169 | (1) |
|
Organizational Leadership |
|
|
170 | (1) |
|
Fundamental Management Knowledge |
|
|
171 | (2) |
|
|
171 | (2) |
|
Problem-Solving Exercises |
|
|
173 | (3) |
|
Appreciation Exercises: Extracting Maximum Information from Facts |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
5 Whys: Quickly Getting to the Root of a Problem |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Fundamental Terrorism Knowledge |
|
|
176 | (6) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role) |
|
|
182 | (4) |
|
|
182 | (1) |
|
Myers-Briggs Type Indicator |
|
|
183 | (3) |
|
Group Roles and Team Roles |
|
|
186 | (2) |
|
Low-Context and High-Context Communications |
|
|
188 | (1) |
|
Reactive versus Proactive Language |
|
|
189 | (2) |
|
|
190 | (1) |
|
|
190 | (1) |
|
What We Achieve by Listening |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
The Forming, Storming, Norming, Performing Model |
|
|
191 | (3) |
|
|
194 | (3) |
|
Training and Exercises: Touch It, Feel It, Live It, Breathe It! |
|
|
197 | (22) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (3) |
|
Crawl Walk Run Methodology |
|
|
203 | (2) |
|
Video Example for Training |
|
|
205 | (1) |
|
Another Show Solving a Problem |
|
|
205 | (1) |
|
|
206 | (5) |
|
|
211 | (2) |
|
|
211 | (1) |
|
How Often Should You Exercise? |
|
|
212 | (1) |
|
|
213 | (2) |
|
|
215 | (1) |
|
A Subjective Method for Calculating Return on Investment (ROI) |
|
|
216 | (3) |
|
You Can Deter But You Can't Interdict: Don't Cross the Line! |
|
|
219 | (6) |
|
|
219 | (1) |
|
Distinctions between Collecting information and Collecting Intelligence |
|
|
220 | (1) |
|
How to Avoid Botching Up an Investigation |
|
|
221 | (2) |
|
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies |
|
|
223 | (2) |
|
Appendix A: National Infrastructure Protection Plan --- Table of Contents |
|
|
225 | (6) |
|
Appendix B: ASCE Report on Critical Infrastructure |
|
|
231 | (8) |
|
Appendix C: Bomb Threat Checklist |
|
|
239 | (2) |
|
Appendix D: Best Practices for Mail Center Security |
|
|
241 | (6) |
|
General Mail Operation Preventive Recommendation |
|
|
241 | (1) |
|
Employee Security Procedures |
|
|
242 | (1) |
|
General Safety and Security Procedures for Incoming-Outgoing Mail Areas |
|
|
243 | (1) |
|
Access to Information: Education and Communications |
|
|
244 | (1) |
|
Guidelines for Mail Center Theft Prevention |
|
|
245 | (2) |
|
Appendix E: FY07 National Incident Management System (NIMS) Training Guidelines |
|
|
247 | (2) |
|
Appendix F: Fact Sheet on Dirty Bombs |
|
|
249 | (4) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Sources of Radioactive Material |
|
|
250 | (1) |
|
Control of Radioactive Material |
|
|
251 | (1) |
|
|
251 | (1) |
|
Other Contact information |
|
|
252 | (1) |
|
Appendix G: Arab American Psychiatrist Wafa Sultan |
|
|
253 | (4) |
|
There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Century |
|
|
253 | (4) |
|
|
255 | (2) |
|
Appendix H: Homeland Security Exercise and Evaluation Program |
|
|
257 | (8) |
Index |
|
265 | |