Preface |
|
xi | |
Acknowledgments |
|
xv | |
About the Author |
|
xvii | |
1 Introduction: Homeland Security Vision The Desired State of Homeland Security |
|
1 | (26) |
|
The Current State of Homeland Security |
|
|
4 | (5) |
|
Homeland Security Issues and Challenges |
|
|
9 | (3) |
|
Everyone Has a Role in Homeland Security |
|
|
12 | (2) |
|
|
14 | (1) |
|
The Direct Impact of Modern-Day Terrorism |
|
|
15 | (2) |
|
What Is at Stake with Today's Terrorist Attacks |
|
|
17 | (4) |
|
Countering Terrorism with Help from the Department of Homeland Security |
|
|
21 | (5) |
|
Help from the Department of Homeland Security Is Not Enough |
|
|
26 | (1) |
2 Essential Threat Factors |
|
27 | (32) |
|
The Problem We Face with Threats |
|
|
27 | (2) |
|
General Threats to Security Hierarchy Components |
|
|
29 | (3) |
|
General Threat Effect on Homeland Security |
|
|
32 | (1) |
|
Threat Management through Intelligence |
|
|
33 | (4) |
|
Terrorists' Operational Methodology |
|
|
37 | (4) |
|
Limitations of Early Warnings |
|
|
41 | (3) |
|
Post-9/11 Era Threats and Warnings |
|
|
44 | (3) |
|
|
44 | (1) |
|
Elliot Rodger's Killing Rampage |
|
|
45 | (1) |
|
Chinese Cyberattacks against U.S. Companies |
|
|
46 | (1) |
|
|
47 | (1) |
|
Creating Your Own Threat-Warning Capabilities |
|
|
47 | (2) |
|
Painful Lesson: The USS Cole Attack |
|
|
49 | (1) |
|
The Consequences of Not Understanding Threats |
|
|
50 | (2) |
|
Lessons Learned: First World Trade Center Attack, 1993 |
|
|
52 | (1) |
|
Lessons Learned: First American Hijacking, 1961 |
|
|
53 | (1) |
|
Homeland Security Roles and Misconceptions |
|
|
53 | (2) |
|
|
55 | (2) |
|
|
57 | (2) |
3 National Infrastructure Protection Plan for Threats, Vulnerability, Risk, and Resilience |
|
59 | (32) |
|
|
59 | (5) |
|
The Department of Homeland Security (DHS) Risk Model and National Infrastructure Protection Plan (NIPP) |
|
|
64 | (3) |
|
Responsibility and Accountability per DHS |
|
|
67 | (1) |
|
|
68 | (1) |
|
A Practical Framework for Taking the NIPP Approach |
|
|
69 | (2) |
|
A Practical Framework for Assessing Threat |
|
|
71 | (5) |
|
|
76 | (2) |
|
How to Handle Discoveries of Threat and Vulnerabilities |
|
|
78 | (1) |
|
Determining Vulnerability |
|
|
79 | (3) |
|
Simplified Assessment Model |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
Methods for Small Business Security Practices |
|
|
87 | (2) |
|
|
89 | (2) |
4 Risk Mitigation, Transference, and Elimination |
|
91 | (12) |
|
|
93 | (4) |
|
|
97 | (2) |
|
Lessons Not Easily Learned |
|
|
99 | (4) |
5 Readiness Plans: Develop, Validate, and Update |
|
103 | (24) |
|
|
103 | (3) |
|
|
106 | (2) |
|
Collaboration with External Organizations |
|
|
108 | (2) |
|
Preplan Development Process |
|
|
110 | (3) |
|
|
113 | (2) |
|
|
115 | (6) |
|
Internal Communications Considerations |
|
|
115 | (1) |
|
|
116 | (1) |
|
Crisis and Media Communications |
|
|
116 | (2) |
|
|
118 | (1) |
|
Plan Response for Bomb Threats |
|
|
119 | (1) |
|
Addressing Loading Docks and Mailrooms |
|
|
120 | (1) |
|
Plan Validation and Maintenance |
|
|
121 | (1) |
|
|
122 | (1) |
|
Plan to Share Information |
|
|
123 | (2) |
|
What the DHS Says about Protected Critical Infrastructure Information |
|
|
125 | (2) |
6 Prevention, Detection, and Response Factors across Sectors |
|
127 | (22) |
|
|
127 | (2) |
|
Innovative Prevention Approaches |
|
|
129 | (4) |
|
Innovative Detection Technology |
|
|
133 | (1) |
|
Investing in Response Capabilities through Partnership |
|
|
133 | (4) |
|
Case Study: Center for Homeland Defense and Security (CHDS) Alumnus Leads Review of SoCal Shooting Spree |
|
|
137 | (2) |
|
Other Contributors to Homeland Security |
|
|
139 | (1) |
|
|
140 | (1) |
|
Mini Case Study: Boston Marathon Bombing, April 15, 2013 |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (5) |
7 Human Factors and Team Dynamics |
|
149 | (28) |
|
|
149 | (1) |
|
Humanity in Crisis and Hero Mode |
|
|
150 | (1) |
|
Female Terrorists: The Human Factor Gone Wrong |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
154 | (3) |
|
|
157 | (1) |
|
|
158 | (2) |
|
Diversity as a Problem Solver |
|
|
160 | (1) |
|
The Human Factor as a Tool |
|
|
161 | (2) |
|
Dysfunctional Group Dynamics |
|
|
163 | (3) |
|
Discussion versus Dialogue |
|
|
166 | (1) |
|
How to Get Your Team to Dialogue |
|
|
167 | (1) |
|
Leadership versus Management |
|
|
168 | (2) |
|
Roadblocks to Effective Teamwork |
|
|
170 | (4) |
|
Roadblock 1: Lack of Proper Foundation |
|
|
171 | (1) |
|
Roadblock 2: Linguistic Differences |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (3) |
8 Innovative Ideas for Change |
|
177 | (22) |
|
|
177 | (3) |
|
Getting Assistance from the Federal Bureau of Investigation |
|
|
180 | (1) |
|
Organizational Leadership |
|
|
180 | (2) |
|
Problem-Solving Exercises |
|
|
182 | (2) |
|
Appreciation Exercises: Extracting Maximum Information from Facts |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
5 Whys: Quickly Getting to the Root of a Problem |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Why Workforce Breakdown Is Critical (by Personality Type, Leadership Style, and Team Role) |
|
|
184 | (5) |
|
|
185 | (1) |
|
Myers-Briggs Type Indicator |
|
|
186 | (1) |
|
Keirsey Temperament Sorter |
|
|
187 | (2) |
|
Group Roles and Team Roles |
|
|
189 | (2) |
|
Low-Context and High-Context Communications |
|
|
191 | (1) |
|
Reactive versus Proactive Language |
|
|
192 | (2) |
|
|
193 | (14) |
|
|
193 | (1) |
|
What We Achieve by Listening |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
The Forming, Storming, Norming, Performing Model |
|
|
194 | (3) |
|
|
197 | (2) |
9 Training and Exercises: Touch It, Feel It, Live It, Breathe It! |
|
199 | (26) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Crawl-Walk-Run Methodology |
|
|
205 | (2) |
|
Video Example for Training |
|
|
207 | (1) |
|
Another Show Solving a Problem |
|
|
207 | (1) |
|
|
208 | (5) |
|
|
213 | (2) |
|
|
213 | (1) |
|
How Often Should You Exercise? |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Interview of Rear Admiral Tim Sullivan |
|
|
221 | (2) |
|
A Subjective Method for Calculating Return on Investment (ROI) |
|
|
223 | (2) |
10 You Can Deter, But You Can't Interdict: Don't Cross the Line! |
|
225 | (6) |
|
|
225 | (1) |
|
Distinctions between Collecting Information and Collecting Intelligence |
|
|
226 | (1) |
|
How to Avoid Botching an Investigation |
|
|
227 | (2) |
|
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies |
|
|
229 | (2) |
Appendix A: Sample Security Plan |
|
231 | (8) |
|
Section 1: About AlphaBravoCharlie |
|
|
231 | (1) |
|
|
231 | (1) |
|
My Security Plan Is Proprietary |
|
|
231 | (1) |
|
Section 2: Assessment Results |
|
|
232 | (3) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (6) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Project Time Line and Responsibilities |
|
|
237 | (1) |
|
|
237 | (1) |
|
Ongoing Maintenance and Compliance |
|
|
237 | (2) |
Appendix B: Bomb Threat Checklist |
|
239 | (2) |
Appendix C: Best Practices for Mail Center Security |
|
241 | (6) |
|
General Mail Operation Preventive Recommendation |
|
|
241 | (1) |
|
Employee Security Procedures |
|
|
242 | (1) |
|
General Safety and Security Procedures for Incoming-Outgoing Mail Areas |
|
|
243 | (1) |
|
Access to Information: Education and Communications |
|
|
244 | (1) |
|
Guidelines for Mail Center Theft Prevention |
|
|
245 | (2) |
Appendix D: Fact Sheet on Dirty Bombs |
|
247 | (4) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Sources of Radioactive Material |
|
|
248 | (1) |
|
Control of Radioactive Material |
|
|
248 | (1) |
|
|
249 | (1) |
|
Other Contact Information |
|
|
249 | (2) |
Appendix E: The Insider Threat |
|
251 | (4) |
Index |
|
255 | |