Introduction: Homeland Security Vision The Desired State of Homeland Security The Current State of Homeland Security Homeland Security Issues and Challenges Everyone Has a Role in Homeland Security History of Terrorism The Direct Impact of Modern-Day Terrorism What Is at Stake with Today¿s Terrorist Attacks Countering Terrorism with Help from the Department of Homeland Security Help from the Department of Homeland Security Is Not Enough Essential Threat Factors The Problem We Face with Threats General Threats to Security Hierarchy Components General Threat Effect on Homeland Security Threat Management through Intelligence Terrorists¿ Operational Methodology Limitations of Early Warnings Post-/ Era Threats and Warnings Creating Your Own Threat-Warning Capabilities Painful Lesson: The USS Cole Attack The Consequences of Not Understanding Threats Lesson Learned: First World Trade Center Attack, 1993 Lesson Learned: First American Hijacking, 1961 Homeland Security Roles and Misconceptions Sharing Information National Infrastructure Protection Plan for Threats, Vulnerability, Risk, and Resilience The Department of Homeland Security (DHS) Risk Model and National Infrastructure Protection Plan (NIPP) Responsibility and Accountability per DHS NIPP as a Template A Practical Framework for Taking the NIPP Approach A Practical Framework for Assessing Threat What the Results Suggest How to Handle Discoveries of Threat and Vulnerabilities Determining Vulnerability Simplified Assessment Model Countermeasures Reporting Information Cost versus Investment Methods for Small Business Security Practices Mini Case Study Risk Mitigation, Transference, and Elimination Risk Decision Principles Risk Management Lessons Not Easily Learned Readiness Plans: Develop, Validate, and Update How Terrorists Plan Collaboration with External Organizations Preplan Development Process Plan Development Overlooked Plan Items Plan Validation and Maintenance Plan Updates Plan to Share Information What the DHS Says about Protected Critical Infrastructure Information Prevention, Detection, and Response Factors across Sectors Innovative Prevention Approaches Innovative Detection Technology Investing in Response Capabilities through Partnership Case Study: Center for Homeland Defense and Security (CHDS) Alumnus Leads Review of SoCal Shooting Spree Other Contributors to Homeland Security Response Considerations Mini Case Study: Boston Marathon Bombing, April 15, 2013 Preparedness Snapshot Historical Case Study Human Factors and Team Dynamics The Human Factor Humanity in Crisis and Hero Mode Female Terrorists: The Human Factor Gone Wrong Humans in Conflict Overconfidence Human Technology Superdiversity Diversity as a Problem Solver The Human Factor as a Tool Dysfunctional Group Dynamics Discussion versus Dialogue How to Get Your Team to Dialogue Leadership versus Management Roadblocks to Effective Teamwork Chapter Exercise Innovative Ideas for Change Organizational Leadership Problem-Solving Exercises Why Workforce Breakdown Is Critical (by Personality Type, Leadership Style, and Team Role) Group Roles and Team Roles Low-Context and High-Context Communications Reactive versus Proactive Language The Forming, Storming, Norming, Performing Model Chapter Exercise Training and Exercises: Touch It, Feel It, Live It, Breathe It! Benefits of Training Adult Learning Training Methods Crawl¿Walk¿Run Methodology Video Example for Training Exercises Building an Exercise Training Evaluation Educational Programs Training Case Study Training Failures Interview of Rear Admiral Tim Sullivan A Subjective Method for Calculating Return on Investment (ROI) You Can Deter, But You Can¿t Interdict: Don¿t Cross the Line! Know Thy Limits Distinctions between Collecting Information and Collecting Intelligence How to Avoid Botching an Investigation Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies Appendix A: Sample Security Plan Appendix B: Bomb Threat Checklist Appendix C: Best Practices for Mail Center Security Appendix D: Fact Sheet on Dirty Bombs Appendix E: the Insider Threat Index.
Homeland Security and Private Sector Business : Corporations' Role in Critical Infrastructure Protection, Second Edition