Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition, 2nd Edition (Hardback) book cover

Homeland Security and Private Sector Business

Corporations' Role in Critical Infrastructure Protection, Second Edition, 2nd Edition

By Elsa Lee

CRC Press

288 pages | 37 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781482248586
pub: 2014-12-11
SAVE ~$18.19
$90.95
$72.76
x
eBook (VitalSource) : 9780429256677
pub: 2014-12-11
from $45.48


FREE Standard Shipping!

Description

Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious.They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets.

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes:

  • Updates to the NIPP (National Infrastructure Protection Plan)
  • New case studies of both proper security policies and procedures in practice versus costly security breaches
  • Greater focus on smaller business and practical "immediate use" guidance
  • New measures for assessing and addressing vulnerabilities and threats
  • New appendices with sample plans and practical checklists

Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayers—providing a clear blueprint for securing people and assets.

Reviews

"Lee argues that while terrorism is one threat, there are many risks that require a thorough understanding of the causes and effects of 17 critical factors that threaten many key resources. From chemical warfare to cyber threats, workplace violence to narcotics trafficking, Lee emphasizes the need to constantly learn from every incident as past lessons are not easily learned. Real cases prove her points. This is a must read for those who care about national security."

—Senator Ted W. Lieu (D), State Senator of Senate District 28

Table of Contents

Introduction: Homeland Security Vision

The Desired State of Homeland Security

The Current State of Homeland Security

Homeland Security Issues and Challenges

Everyone Has a Role in Homeland Security

History of Terrorism

The Direct Impact of Modern-Day Terrorism

What Is at Stake with Today’s Terrorist Attacks

Countering Terrorism with Help from the Department of Homeland Security

Help from the Department of Homeland Security Is Not Enough

Essential Threat Factors

The Problem We Face with Threats

General Threats to Security Hierarchy Components

General Threat Effect on Homeland Security

Threat Management through Intelligence

Terrorists’ Operational Methodology

Limitations of Early Warnings

Post-/ Era Threats and Warnings

Creating Your Own Threat-Warning Capabilities

Painful Lesson: The USS Cole Attack

The Consequences of Not Understanding Threats

Lesson Learned: First World Trade Center Attack, 1993

Lesson Learned: First American Hijacking, 1961

Homeland Security Roles and Misconceptions

Sharing Information

National Infrastructure Protection Plan for Threats, Vulnerability, Risk, and Resilience

The Department of Homeland Security (DHS) Risk Model and National Infrastructure Protection Plan (NIPP)

Responsibility and Accountability per DHS

NIPP as a Template

A Practical Framework for Taking the NIPP Approach

A Practical Framework for Assessing Threat

What the Results Suggest

How to Handle Discoveries of Threat and Vulnerabilities

Determining Vulnerability

Simplified Assessment Model

Countermeasures

Reporting Information

Cost versus Investment

Methods for Small Business Security Practices

Mini Case Study

Risk Mitigation, Transference, and Elimination

Risk Decision Principles

Risk Management

Lessons Not Easily Learned

Readiness Plans: Develop, Validate, and Update

How Terrorists Plan

Collaboration with External Organizations

Preplan Development Process

Plan Development

Overlooked Plan Items

Plan Validation and Maintenance

Plan Updates

Plan to Share Information

What the DHS Says about Protected Critical Infrastructure Information

Prevention, Detection, and Response Factors across Sectors

Innovative Prevention Approaches

Innovative Detection Technology

Investing in Response Capabilities through Partnership

Case Study: Center for Homeland Defense and Security (CHDS) Alumnus

Leads Review of SoCal Shooting Spree

Other Contributors to Homeland Security

Response Considerations

Mini Case Study: Boston Marathon Bombing, April 15, 2013

Preparedness Snapshot

Historical Case Study

Human Factors and Team Dynamics

The Human Factor

Humanity in Crisis and Hero Mode

Female Terrorists: The Human Factor Gone Wrong

Humans in Conflict

Overconfidence

Human Technology

Superdiversity

Diversity as a Problem Solver

The Human Factor as a Tool

Dysfunctional Group Dynamics

Discussion versus Dialogue

How to Get Your Team to Dialogue

Leadership versus Management

Roadblocks to Effective Teamwork

Chapter Exercise

Innovative Ideas for Change

Organizational Leadership

Problem-Solving Exercises

Why Workforce Breakdown Is Critical (by Personality Type, Leadership Style, and Team Role)

Group Roles and Team Roles

Low-Context and High-Context Communications

Reactive versus Proactive Language

The Forming, Storming, Norming, Performing Model

Chapter Exercise

Training and Exercises: Touch It, Feel It, Live It, Breathe It!

Benefits of Training

Adult Learning

Training Methods

Crawl–Walk–Run

Methodology

Video Example for Training

Exercises

Building an Exercise

Training Evaluation

Educational Programs

Training Case Study

Training Failures

Interview of Rear Admiral Tim Sullivan

A Subjective Method for Calculating Return on Investment (ROI)

You Can Deter, But You Can’t Interdict: Don’t Cross the Line!

Know Thy Limits

Distinctions between Collecting Information and Collecting Intelligence

How to Avoid Botching an Investigation

Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies

Appendix A: Sample Security Plan

Appendix B: Bomb Threat Checklist

Appendix C: Best Practices for Mail Center Security

Appendix D: Fact Sheet on Dirty Bombs

Appendix E: the Insider Threat

Index

About the Author

Elsa Lee served as a U.S. Army counterintelligence officer and special agent for 20 years in the fight against terrorism and espionage in the United States, Europe, Central America, and Asia. She is now a lecturer and the CEO and founder of Advantage SCI, LLC, a professional services firm with offices in Washington, D.C.; Texas; and California. The company provides corporate, homeland, and national security services to government and private industry. Lee works with key member representatives of the critical national infrastructures, the academic community, and the U.S. government. She has been quoted extensively in national and international newspapers and professional journals and has appeared on Univision, Telemundo, CNN, Fox News, CBS News, Voice of America, and Canada Business Channel.

Subject Categories

BISAC Subject Codes/Headings:
COM053000
COMPUTERS / Security / General
LAW041000
LAW / Forensic Science
POL012000
POLITICAL SCIENCE / Political Freedom & Security / International Security