Buy Homeland Security and Terrorism by Victor E. Kappeler
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Society and Social Sciences > Social services and welfare, criminology > Crime and criminology > Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)
Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)

Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. For introductory courses in homeland security. A complete picture of homeland security and terrorism – past and present Homeland Security provides a comprehensive overview of homeland security and terrorism. Acknowledging that homeland security is primarily a response to terrorism, the text examines the threats and operations of terrorist organizations before moving on to U.S. counterterrorism efforts. Homeland security measures are assessed alongside laws and presidential directives from the early 2000s to the present day. The 2nd edition includes new analysis of hotly contested issues such as immigration and border security, cybercrime and cybersecurity, the disaster response system (FEMA), and U.S. government guidance on protecting critical infrastructure and key assets from acts of terrorism.

Table of Contents:
1. Introduction to Homeland Security Introduction American and Terrorist Attacks What Is Homeland Security Homeland Security Missions and Goals Definitional Issues and Homeland Security Collateral Benefits from Homeland Security The Scope of Homeland Security Pre-9/11 Efforts to Improve Homeland Security The 9/11 Commission Report The National Strategy for Homeland Security Intelligence and Warning Border and Transportation Security Domestic Counterterrorism Protecting Critical Infrastructure Defend against Catastrophic Events Emergency Preparedness and Response Legal Initiatives Science and Technology Information Sharing and Systems International Cooperation Costs of Homeland Security Indirect Costs Summary 2. Homeland Security Apparatus Introduction Department of Homeland Security Political Considerations in the Creation of the Department of Homeland Security White House and Congressional Oversight Agency Confusion and Mission Distortion The Structure of the Department of Homeland Security DHS Administrative and Support Agencies Transportation Security Administration U.S. Customs and Border Protection U.S. Immigration and Customs Enforcement Immigration Enforcement Investigating Illegal Movement of People and Goods U.S. Citizenship and Immigration Services U.S. Secret Service U.S. Coast Guard Federal Emergency Management Agency Federal Law Enforcement Training Center Domestic Nuclear Detection Office Department of Defense and Homeland Security State-Level Homeland Security Summary 3. Overview of National Infrastructure Protection Introduction Threats to Critical Infrastructure Federal Agencies Involved in the Protection of American Assets Scope of American Critical Infrastructure Assets Critical Infrastructure Sectors National Critical Infrastructure Prioritization Program The National Infrastructure Protection Plan. Conceptual Operation of Homeland Security Protection Set Goals and Objectives Identify Infrastructure Assess and Analyze Risks Implement Risk Management Activities Measure Effectiveness Critique of the National Infrastructure Protection Plan Model A Bottom-Up Approach The Buffer Zone Protection Plan The Reality of Critical Infrastructure Protection. States' Responsibilities Key Critical Infrastructure Sectors Water and Wastewater Systems Chemical Sector Commercial Facilities Sector Communications Sector Critical Manufacturing Sector Dams Sector Defense Industrial Base Sector Emergency Services Sector Energy Transportation Security Ground Transportation Infrastructure from the Terrorists' Viewpoint Complacency. The Threat to Homeland Security Summary 4. The Legal Aspects of Homeland Security Introduction Presidential Executive Orders and Directives Executive Orders of President Clinton Executive Orders of President George W. Bush Executive Orders of President Barack Obama Executive Orders of President Donald Trump Federal Antiterrorism Statutes Antiterrorism and Effective Death Penalty Act of 1996 The USA Patriot Act U.S. Foreign Intelligence Surveillance Court Summary 5. Political and Social Foundations of Terrorism Introduction Continuum of Social Conflict Defining Terrorism A Brief History of Terrorism Early Forms of Terrorism The French Revolution Late Nineteenth- and Early Twentieth Century Terrorism Terrorism in the Late Twentieth Century Terrorism in Early America Terrorism Today The Roots and Causes of Terrorism Globalization Religion Israeli-Palestinian Conflict Russian Invasion of Afghanistan Wahhabism Authoritarian Governments Failed States and Terrorism Individual Explanations of Terrorism Types of Terrorism State-Sponsored Terrorism Dissent Terrorism Terrorists on the Left and Right Religious Terrorism Criminal Terrorism Level of Terrorist Activities Strategies for Dealing with Terrorism Crushing Terrorist Groups Unilaterally Crushing Terrorist Groups Multilaterally Containment Defense Diversion Delegitimation Transforming Terrorist Breeding Grounds Women Terrorists Summary 6. The Nature and Geography of Terrorist Groups, State Sponsors of Terror, and Safe Havens Introduction Foreign Terrorist Organizations Middle East and North Africa Groups African Groups Asian Groups Latin American Groups European Groups Terrorism in America Radical Muslim-Inspired Terrorism Right-Wing Terrorists and Militias Eco-Terrorism and Animal Rights Groups Summary 7. Transnational Organized Crime and Terrorism Introduction Defining Transnational Organized Crime Distinguishing Types or Categories of Crime Impact of Transnational Organized Crime Conditions Facilitating Transnational Organized Crime Networking. The Etiology of Transnational Organized Crime Groups Political Models Economic Models Social Models How Transnational Crime Is Organized Standard Hierarchy Regional Hierarchy Clustered Hierarchy Core Group Criminal Network Transnational Organized Crime Activities Drug Trafficking Human Trafficking Smuggling of Technology and WMD Materials Arms Trafficking Trafficking in Precious Gems Piracy Non-Drug Contraband Smuggling Counterfeiting Theft Financial Fraud Environmental Crimes Failed States and Transnational Organized Crime and Terrorism Links between Transnational Organized Crime and Terrorist Organizations The Continuum of Terrorism and Transnational Organized Crime Incentives for TOC and Terrorist Organizations to Cooperate Summary 8. Intelligence and Counterintelligence and Terrorism Introduction Intelligence Failure - What Does It Mean? Advisory The Director of National Intelligence National Counterterrorism Center Conceptual Overview of Homeland Security Intelligence Types of Intelligence Collection Activities Human Intelligence Signals Intelligence Measures and Signatures Intelligence Imagery Intelligence Open-Source Intelligence Agencies within the American Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of Energy Department of Homeland Security Department of State Department of the Treasury Drug Enforcement Administration Federal Bureau of Investigation National Geospatial-Intelligence Agency National Reconnaissance Office National Security Agency Armed Services Intelligence Intersection of Policy Decisions and Intelligence. The Intelligence Cycle Joint Special Operations Command Specialized Military Antiterrorism Agencies Counterintelligence The Globalization of Intelligence Domestic Industrial Espionage Summary 9. Homeland Security and Weapons of Mass Destruction The National Terrorism Advisory System. Warning the American People Introduction Defining Weapons of Mass Destruction National Terrorism Advisory System History of the Deployment of WMDs Historical Precedents for Biological WMDs Historical Precedents for Chemical WMDs The Threat of Nuclear Weapons of Mass Destruction. Destructiveness, Potential for Use, and Availability Nuclear and Radiological WMDs Availability of Nuclear Materials Nuclear Bombs or Weapons The Spread of Nuclear Material and Information Smuggling Nuclear Weapons and Materials Terrorist Attacks Using Dirty Bombs and Attacks on Nuclear Facilities Biological Weapons of Mass Destruction Types of Biological Weapons How Biological Weapons Work Creating Biological Weapons Threat Assessment and Biological Weapons Chemical Weapons of Mass Destruction Advantages of Chemical Weapons Weaponizing Chemicals Factors Constraining Terrorists from Using WMDs Relative Destructiveness of WMDs Examining Which Groups Might Use WMDs Summary 10. Cybercrime and Terrorism Introduction Methods of Attacking Cyber Infrastructure Tools Used in Hacking and Cyberattacks What Is Cyber Terrorism? Distinguishing Hacking, Cybercrime, Cyber Terrorism, and Cyber Warfare Cybercrime Cyber Warfare Points of Cyberattacks Cyber Terrorism Physical Attacks on Communications Infrastructure Significant Cyber Gaps Deterring Cyber Intrusions and Attacks Terrorists' Use of the Internet Terrorists and Social Media Overview of Terrorist Websites Audiences How Terrorists Use the Internet Terrorists and Social Media Agencies Charged with Combating Cyber Terrorism FBI's Cybercrime Division Department of Homeland Security's Cyber Security Systems Summary 11. Terrorist Financing Introduction Terrorist Financing of the 9/11 Attacks Distinguishing Terrorist Financing and Money Laundering Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering U.S. Enforcement Actions Financial Action Task Force on Money Laundering Means and Methods of Terrorist Financial Transactions Earning and Acquiring Resources Donor Support of Terrorism Criminal Activity Charities Legitimate Businesses Moving or Laundering Money Precious Commodities Banking and Wire Transfers Money Brokers or Hawaladars Storing or Banking Money Black Market Oil and Gas Saudi Arabia's Financing of Terrorism. An American Conundrum Identity Fraud and Theft Real ID Act Breeder Documents and the Mechanics of Identity Fraud Terrorists' Financial Needs Summary 12. Border Security and Immigration Introduction Immigration Originating Countries of American Immigrants Border Security Issues Illegal Border Migration. A Case Study in Tucson Border Apprehensions Terrorist Infiltration via Illegal Immigration Border Protection Philosophy after 9/11 Secure Border Initiative The Border Security and Immigration Enforcement Improvements Executive Order Increase in Customs and Border Protection Agents Expanded Detention and Removal Capabilities Improved Technology Increased Infrastructure Protection (Fencing) Enhanced Enforcement of Immigration Laws. Interior Enforcement as Deterrence Formulating a Coherent Policy for Border Security US-Visit Program Types of Visas Non-Visa or Visa Waiver Program Vehicular Screening at Border Crossings Port and Marine Security CTPAT and CSI Summary 13. The Response to Homeland Security Incidents Introduction FEMA. The Primary Response Agency When Disaster Occurs Response Goals and Objectives National Response Framework National Response Framework. An Analysis Local Responsibilities under the National Response Framework State Responsibilities under the National Response Framework Federal Responsibilities under the National Response Framework Response as Dictated by the National Response Framework Prevention Protection and Prevention Core Capabilities Mitigation/Recovery Roles and Responsibilities of Community Entities Response Recovery Critique of Past Responses and the National Response Framework Procedures for Activating Federal Assistance in an Emergency National Incident Management System Preparedness Communications and Information Management Resource Management Command and Management at an Incident Ongoing Management and Maintenance Medical Response to Critical Incidents National Response Teams Summary 14. Homeland Security and Policing Introduction Community Policing and Homeland Security Police Departments and Homeland Security. Where Are We? Policing Muslim Communities Homeland Security Public Education Programming Examining Police Calls for Service for Terrorist Leads Police Efforts to Safeguard Local Critical Infrastructure Critical Incident Response Plans Partnerships between Law Enforcement and Critical Infrastructure Security Personnel Private Security Police Organization and Terrorism Intelligence-Led Policing The Intelligence Process Sources of Intelligence Raw Data Intelligence Products Tactical and Strategic Intelligence Fusion Centers Police Tactical Considerations Immediate Police Response to an Act of Terrorism New York City. A Case Study in Local Homeland Security Summary

About the Author :
About our authors Larry K. Gaines is a professor and chair of the Criminal Justice Department at California State University at San Bernardino. He received his doctorate in criminal justice from Sam Houston State University. He has police experience with the Kentucky State Police and the Lexington, Kentucky, Police Department. Additionally, he served as the executive director of the Kentucky Association of Chiefs of Police for 14 years. Dr. Gaines is also a past president of the Academy of Criminal Justice Sciences. His research centers on policing and drugs. In addition to numerous articles, he has coauthored books in the field: Police Operations; Police Administration; Managing the Police Organization; Community Policing: A Contemporary Perspective; Policing Perspectives: An Anthology; Policing in America; Drugs, Crime, and Justice; Criminal Justice in Action; and Readings in White Collar Crime. His current research agenda involves the evaluation of police tactics in terms of their effectiveness in reducing problems and fitting within the community policing paradigm. He is also researching the issue of racial profiling in various California cities. Janine Kremling is an associate professor at California State University San Bernardino. She has taught a wide variety of classes, such as transnational crime, which includes components of homeland security and terrorism. She has also published three textbooks: Cyberspace, Cybersecurity, and Cybercrime (2017) with Amanda Sharp-Parker; Why Students Resist Learning (2016) with Anton Tolman; and Drugs, Crime, and Justice (2014) as coauthor with Larry Gaines.


Best Sellers


Product Details
  • ISBN-13: 9780134549170
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Binding: Paperback
  • Height: 276 mm
  • Language: English
  • Returnable: N
  • Spine Width: 19 mm
  • Weight: 789 gr
  • Width: 216 mm
  • ISBN-10: 0134549171
  • Publisher Date: 09 Apr 2018
  • Binding: Paperback
  • Height: 276 mm
  • Language: English
  • No of Pages: 448
  • Series Title: World Classics
  • Sub Title: The Search for Equity, Peace, and Sustainability
  • Weight: 789 gr
  • Width: 216 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)
Pearson Education (US) -
Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Homeland Security and Terrorism: The Search for Equity, Peace, and Sustainability(World Classics)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!