Record:   Prev Next
Author Alperen, Martin J
Title Foundations of Homeland Security : Law and Policy
Imprint New York : John Wiley & Sons, Incorporated, 2017
©2017
book jacket
Edition 2nd ed
Descript 1 online resource (512 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Wiley Series on Homeland Defense and Security Ser
Wiley Series on Homeland Defense and Security Ser
Note Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- LIST OF CONTRIBUTORS -- ACKNOWLEDGMENTS -- ABOUT THE COMPANION WEBSITE -- CHAPTER 1 INTRODUCTION - OVERVIEW - BACKGROUND -- 9/11 -- WHAT IS HOMELAND SECURITY? -- Vision of Homeland Security -- Mission Statement -- Homeland Security Distinguished from Homeland Defense -- Definition of Homeland Security -- No Consensus -- A Different Name - A Different Focus -- Views of Emergency Management -- INDIVIDUAL RESPONSIBILITY AND FAITH-BASED ASSISTANCE -- WHAT DOES HOMELAND SECURITY LOOK LIKE FROM THE OUTSIDE? -- WHAT DOES HOMELAND SECURITY LOOK LIKE FROM THE INSIDE? -- EVERYONE IS A COMPONENT. EVERYTHING IS IMPORTANT -- WHAT IS HOMELAND SECURITY LAW? -- THE DEVELOPMENT OF HOMELAND SECURITY LAW -- A FEW DEFINITIONS OF TERRORISM -- DHS -- USA Patriot Act -- Domestic Terrorism, 802, codified at 18 USC 2331 -- International Terrorism, 18 USC 2332b -- CIA, State Department, 22 USC Sec. 2656f -- United Nations -- Hate Crimes -- Federal Hate Crime Law, 18 USC 24960 -- PURPOSE OF THIS TEXT -- LEARNING OBJECTIVES -- ABOUT THIS TEXT -- CONTRIBUTING AUTHORS -- DISCLAIMER -- NOTES -- CHAPTER 2 METACOGNITION AND ERRORS IN JUDGMENT RELATED TO DECISION-MAKING IN HOMELAND SECURITY -- THE TRIUNE BRAIN -- The Brainstem -- The Limbic Region -- The Prefrontal Cortex -- THE PATTERN-SEEKING BRAIN -- NEGATIVITY BRAIN BIAS -- Our Social Brain -- UNDERSTANDING PERCEPTION AND COGNITION -- Metacognition -- Social Construction of Reality -- JUDGMENT, HEURISTICS AND BIASES -- Dual Process Theory -- Bounded Rationality -- Heuristics -- Cognitive Biases -- THINKING ABOUT THINKING TO SOLVE PROBLEMS -- Critical and Lateral Thinking -- CONCLUSION -- NOTES -- CHAPTER 3 ETHICAL, LEGAL, AND SOCIAL ISSUES IN HOMELAND SECURITY - WHAT THEY ARE AND HOW TO ADDRESS THEM -- THE ORIGINS AND ESSENCE OF ELSI -- ELSI COMPONENTS DEFINED
SECURITY CULTURE AS A FRAMEWORK FOR ASSESSING AND ADDRESSING ELSI -- MAIN ELSI DOMAINS -- THE RELEVANCE OF ELSI -- HOMELAND SECURITY LEGISLATION AND THE INTENT OF THE CONSTITUTION -- USA PATRIOT Act -- USA FREEDOM Act -- DOMESTIC SURVEILLANCE AND HOMELAND SECURITY TECHNOLOGY SUCH AS UNMANNED AERIAL SYSTEMS -- National Security Agency -- Unmanned Aerial Systems (UAS) -- ELSI ACROSS THE HOMELAND SECURITY CYCLE -- Prevention -- Protection -- Mitigation -- Response -- Recovery -- INTERNATIONAL PERSPECTIVES -- HOW TO ADDRESS ELSI IN EVERYDAY HOMELAND SECURITY -- NOTES -- CHAPTER 4 STRATEGIC ENVIRONMENT -- DEFINITION: WHAT IS STRATEGIC ENVIRONMENT? -- SOURCES -- New World Coming: American Security In The 21St Century, Major Themes And Implications, The Phase I Report On The Emerging Global Security Environment For The First Quarter Of The 21St Century, The United States Commission On National Security/21St Centur -- …Conclusions -- Road Map For National Security: Imperative For Change, February 15, 2001 -- Quadrennial Defense Review Report, February, 2010 -- 2012-2017 Defense Intelligence Agency Strategy, 2011 -- National Security Space Strategy, Unclassified Summary, January, 2011 -- National Strategy for Counterterrorism, June, 2011 -- The Threat We Face -- Strategic National Risk Assessment, December, 2011 -- Overview -- Strategic National Risk Assessment Scope -- Overarching Themes to an All‐Hazards Approach -- Analytic Approach -- Department of Homeland Security Strategic Plan: Fiscal Years 2012-2016, February, 2012 -- Appendix C -- Global Trends 2030: Alternative Worlds, December 2012, National Intelligence Council -- Megatrends -- Game-Changers -- Potential Worlds -- Tectonic Shifts Between Now and 2030 -- Potential Black Swans that Would Cause the Greatest Disruptive Impact
National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience -- Risk Environment -- 2014 Quadrennial Homeland Security Review, June 18, 2014 -- The Evolving Terrorism Threat -- Information and Communications Technology -- Natural Disasters, Pandemics, and Climate Change -- Interdependent and Aging Critical Infrastructure Systems and Networks -- Flows of People and Goods: Increasing Volume and Speed -- Budget Drivers -- Prevailing Challenges that Pose the Most Strategically Significant Risk -- Potential "Black Swans" -- National Intelligence Strategy, September, 2014 -- Domestic Environment -- Global Environment -- Technology -- Natural Resources -- National Security Strategy, February, 2015 -- Build Capacity to Prevent Conflict -- Prevent the Spread and Use of Weapons of Mass Destruction -- Confront Climate Change -- Assure Access to Shared Spaces -- Cybersecurity -- Air and Maritime Security -- Increase Global Health Security -- Worldwide Threat Assessment of the US Intelligence Community, February, 2015 -- GLOBAL THREATS -- The National Military Strategy of the United States of America, June 2015 -- I. The Strategic Environment -- II. The Military Environment -- Our Changing Planet: The U.S. Global Change Research Program for Fiscal Year 2016 -- NOTES -- ADDITIONAL RESOURCES -- CHAPTER 5 EXTREME RIGHT-WING IDEOLOGUES, CONSERVATIVE SECESSION, AND TERRORISM -- SECESSION INTRODUCTION -- The Legality of Secession in America: A Brief History -- The Recent Resurgence of American Secessionist Movements -- Defining Secession -- The State of Jefferson -- The Texas independence movement -- Conclusion: The National Security Implications of Secession -- RIGHTWING DOMESTIC TERRORISM -- A Brief History of Domestic Terror -- Sovereign Citizens and White Supremacists -- CONCLUSION -- INSERTS
Texas v. White, 74 U.S. 700, 726 (1868): (holding that when a state joins the United States it is an indissoluble relation)93 -- Williams v. Bruffy, 96 U.S. 176, 186 (1877) -- Federalist Paper #9, Alexander Hamilton -- Executive Order 12977 (E. O. 12977), Interagency Security Committee, October 19, 1995 -- Executive Order 13133-Working Group on Unlawful Conduct on the Internet August 5, 1999 -- Court Security Improvement Act of 2007 (key excerpts) -- TITLE I-JUDICIAL SECURITY IMPROVEMENTS AND FUNDING -- NOTES -- CHAPTER 6 INTELLIGENCE GATHERING -- DEFINITIONS -- SOURCES -- Project on National Security Reform "Forging a New Shield," November 2008 -- National Security Act of 1947 -- TITLE I-COORDINATION FOR NATIONAL SECURITY -- National Security Council -- Central Intelligence Agency -- Establishment of the National Military Establishment -- Secretary of Defense -- Joint Chiefs of Staff -- Executive Order 13228 of October 8, 2001, Establishing The Office of Homeland Security and the Homeland Security Council -- Homeland Security Council and National Security Council Merged in 2009 -- Title III of the Omnibus Crime Control and Safe Streets Act, Wiretapping and Electronic Surveillance, June 19, 1968 -- FINDINGS -- Foreign Intelligence Surveillance Act, October 25, 1978 -- USA PATRIOT Act, October 26, 2001 -- TITLE II-ENHANCED SURVEILLANCE PROCEDURES -- TITLE IX-IMPROVED INTELLIGENCE -- Intelligence Reform and Terrorism Prevention Act of 2004, (IRTPA) -- TITLE I-REFORM OF THE INTELLIGENCE COMMUNITY -- TITLE II-FEDERAL BUREAU OF INVESTIGATION -- TITLE VI-TERRORISM PREVENTION -- USA PATRIOT Improvement and Reauthorization Act of 2005 -- Implementing Recommendations of the 9/11 Commission Act of 2007, August 3, 2007 -- TITLE VI-CONGRESSIONAL OVERSIGHT OF INTELLIGENCE -- Protect America Act of 2007, August 5, 2007
Executive Order 13462, February 29, 2008, President's Intelligence Advisory Board and Intelligence Oversight Board -- FISA Amendments Act Of 2008, July 10, 2008 -- TITLE I-FOREIGN INTELLIGENCE SURVEILLANCE -- TITLE II-PROTECTIONS FOR ELECTRONIC COMMUNICATION SERVICE PROVIDERS -- The National Intelligence Strategy, September, 2014 -- Introduction to Mission Objectives -- Introduction to Enterprise Objectives -- Usa Freedom Act, Public Law 114-23, June 2, 2015 -- TITLE I-FISA BUSINESS RECORDS REFORMS -- TITLE II-FISA PEN REGISTER AND TRAP AND TRACE DEVICE REFORM -- TITLE V-NATIONAL SECURITY LETTER REFORM -- NOTES -- CHAPTER 7 THE DEPARTMENT OF HOMELAND SECURITY -- SOURCES -- Road Map for National Security: Imperative for Change, February 15, 2001 -- Homeland Security Act of 2002, November 25, 2002 -- TITLE I-DEPARTMENT OF HOMELAND SECURITY -- TITLE II-INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION -- TITLE III-SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY -- TITLE IV-DIRECTORATE OF BORDER AND TRANSPORTATION SECURITY -- TITLE V-EMERGENCY PREPAREDNESS AND RESPONSE -- USA Patriot Improvement and Reauthorization Act of 2005 -- Executive Order 13397-Responsibilities of the Department of Homeland Security With Respect to Faith‐Based and Community Initiatives, Thursday, March 9, 2006 -- The Post-Katrina Emergency Management Reform Act of 2006 -- Bottom-Up Review Report, July 2010, Annex B -- Annex B. -- Department of Homeland Security Strategic Plan: Fiscal Years 2012-2016, February 2012 -- MISSION 2: SECURING AND MANAGING OUR BORDERS -- Goal 2.1: Secure U.S. Air, Land, and Sea Borders -- Goal 2.2: Safeguard Lawful Trade and Travel -- Goal 2.3: Disrupt and Dismantle TransnationalCriminal Organizations -- The 2014 Quadrennial Homeland Security Review, June 2014 -- 4. GUIDING PRINCIPLES
The Cornerstone of Homeland Security is Preventing Terrorism, But Homeland Security Must be Multi-Threat and All-Hazard
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
Link Print version: Alperen, Martin J. Foundations of Homeland Security : Law and Policy New York : John Wiley & Sons, Incorporated,c2017 9781119289111
Subject Terrorism - Prevention - Law and legislation - United States
Electronic books
Record:   Prev Next