ABSTRACT

The Handbooks of Homeland Security Handbook is a convenient, one-stop reference and guide to the latest regulations and developments in all things relevant to the homeland security and defense domain.

The book is divided into five parts and addresses such critical areas of as countering terrorism, critical infrastructure protection, information and cybersecurity, military and private sector support for Homeland Security, risk assessment, and preparedness for all-hazards and evolving threats. In total, more than 100 chapters outline the latest developments in homeland security policies, directives, and mandates as well as emergent threats and topical considerations for the Department of Homeland Security (DHS) and its stake-holders.

The diverse array of chapter topics covered—contributed to by dozens of top experts in the field—provides a useful and important resource for any student, professional, researcher, policy-maker, or library in understanding the domestic initiatives of public-sector Homeland Security entities and their responsibilities in the current global environment.

part I|160 pages

Department of Homeland Security (DHS) and Critical Infrastructure

chapter Chapter 2|3 pages

Body Scanners

chapter Chapter 6|8 pages

Critical Manufacturing Sector

chapter Chapter 10|6 pages

Energy (Power) Security and Grids

chapter Chapter 11|6 pages

Federal Aviation Administration (FAA)

chapter Chapter 12|8 pages

Federal Bureau of Investigation

chapter Chapter 13|7 pages

Immigration and Customs Enforcement (ICE)

chapter Chapter 14|5 pages

Industrial Resilience

chapter Chapter 15|5 pages

National Domestic Preparedness Office

chapter Chapter 17|4 pages

Partnership for Peace Consortium

chapter Chapter 19|7 pages

Riots and Rioting

chapter Chapter 20|3 pages

Secure Border Initiative

chapter Chapter 21|8 pages

Smuggling

part II|154 pages

Cybersecurity, Terrorism, and Asymmetric Threats

chapter Chapter 25|3 pages

Advanced Persistent Threats (APTs)

chapter Chapter 26|5 pages

Chain of Custody

chapter Chapter 27|7 pages

Conficker Worm

chapter Chapter 28|5 pages

Cryptocurrencies

chapter Chapter 29|10 pages

Cyber Security and Social Media

chapter Chapter 30|7 pages

Cyber Security Operations

Tactics, Techniques, and Procedures

chapter Chapter 31|6 pages

Cyberattacks

chapter Chapter 33|6 pages

Cybersecurity

chapter Chapter 34|6 pages

Cyberweapons

chapter Chapter 37|8 pages

Hackers and Hacktivism

chapter Chapter 38|3 pages

Internet of Things (IoT)

chapter Chapter 39|6 pages

Malware

chapter Chapter 40|9 pages

National Security Agency (NSA)

From the Cold War to Post-9/11

chapter Chapter 41|6 pages

Social Engineering

chapter Chapter 42|5 pages

Stuxnet

chapter Chapter 43|5 pages

Swatting

chapter Chapter 45|10 pages

US Cyber Command (USCYBERCOM)

part III|174 pages

Terrorism and Asymmetric Threats

chapter Chapter 46|8 pages

Al Qaeda in the Islamic Maghreb (AQIM)

chapter Chapter 47|10 pages

Al Qaeda

chapter Chapter 48|10 pages

Ansar Allah

chapter Chapter 49|6 pages

Basque Separatists

chapter Chapter 50|9 pages

Car Bombs

chapter Chapter 52|9 pages

Foreign Terrorist Fighters (FTF)

chapter Chapter 53|8 pages

Hezbollah

chapter Chapter 54|5 pages

Hijackings

chapter Chapter 55|10 pages

Improvised Explosive Devices (IEDs)

chapter Chapter 56|7 pages

Irish Republican Army (IRA)

chapter Chapter 57|10 pages

Lone Actor Terrorism

chapter Chapter 58|7 pages

Nationalists

chapter Chapter 59|11 pages

Right-Wing Extremism

chapter Chapter 60|9 pages

State-Sponsored Terrorism

chapter Chapter 61|6 pages

Suicide Bombers

chapter Chapter 62|9 pages

Target Hardening

chapter Chapter 63|10 pages

Terrorism Copycat Effects

chapter Chapter 64|12 pages

Urban Warfare

part IV|195 pages

United States (US) Domestic and Border Security

chapter Chapter 67|7 pages

Beltrán-Leyva Organization (BLO)

chapter Chapter 68|12 pages

Border Patrols and National Entry Points

chapter Chapter 71|5 pages

Domestic Security

chapter Chapter 72|9 pages

Gangs and Law Enforcement in the United States

chapter Chapter 73|10 pages

Improvised Explosive Devices (IEDs)

chapter Chapter 74|5 pages

Kidnappings

chapter Chapter 77|4 pages

Los Zetas Mexican Drug Cartel

chapter Chapter 79|5 pages

Maritime Domain Awareness (MDA)

chapter Chapter 80|9 pages

Militias

chapter Chapter 82|7 pages

Passive Surveillance

chapter Chapter 84|4 pages

Screening

chapter Chapter 85|8 pages

The Evolution and Future of SWAT

chapter Chapter 87|11 pages

The Sinaloa-Tijuana Complex

chapter Chapter 89|9 pages

United States–Mexico Border Fence

part V|107 pages

Emergency Planning and Preparedness and HeaLth Security

chapter Chapter 90|10 pages

Agroterrorism

chapter Chapter 91|10 pages

Anthrax

chapter Chapter 92|5 pages

Disaster Impact on Minorities

chapter Chapter 94|9 pages

Emergency Management and Response

chapter Chapter 95|8 pages

Homeland Security and the Arctic

chapter Chapter 97|11 pages

Nuclear Threats

chapter Chapter 98|6 pages

Ricin

chapter Chapter 99|7 pages

Sarin

chapter Chapter 100|7 pages

Smallpox

chapter Chapter 101|5 pages

Suspicious Packages

chapter Chapter 102|5 pages

Urban Search and Rescue (SAR)