Homeland Security and Private Sector Business : Corporations' Role in Critical Infrastructure Protection, Second Edition book cover
SAVE
$18.99
2nd Edition

Homeland Security and Private Sector Business
Corporations' Role in Critical Infrastructure Protection, Second Edition




ISBN 9781482248586
Published December 11, 2014 by CRC Press
288 Pages - 37 B/W Illustrations

 
SAVE ~ $18.99
was $94.95
USD $75.96

Prices & shipping based on shipping country


Preview

Book Description

Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets.

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes:

  • Updates to the NIPP (National Infrastructure Protection Plan)
  • New case studies of both proper security policies and procedures in practice versus costly security breaches
  • Greater focus on smaller business and practical "immediate use" guidance
  • New measures for assessing and addressing vulnerabilities and threats
  • New appendices with sample plans and practical checklists

Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayers—providing a clear blueprint for securing people and assets.

Table of Contents

Introduction: Homeland Security Vision
The Desired State of Homeland Security
The Current State of Homeland Security
Homeland Security Issues and Challenges
Everyone Has a Role in Homeland Security
History of Terrorism
The Direct Impact of Modern-Day Terrorism
What Is at Stake with Today’s Terrorist Attacks
Countering Terrorism with Help from the Department of Homeland Security
Help from the Department of Homeland Security Is Not Enough
Essential Threat Factors
The Problem We Face with Threats
General Threats to Security Hierarchy Components
General Threat Effect on Homeland Security
Threat Management through Intelligence
Terrorists’ Operational Methodology
Limitations of Early Warnings
Post-/ Era Threats and Warnings
Creating Your Own Threat-Warning Capabilities
Painful Lesson: The USS Cole Attack
The Consequences of Not Understanding Threats
Lesson Learned: First World Trade Center Attack, 1993
Lesson Learned: First American Hijacking, 1961
Homeland Security Roles and Misconceptions
Sharing Information
National Infrastructure Protection Plan for Threats, Vulnerability, Risk, and Resilience
The Department of Homeland Security (DHS) Risk Model and National Infrastructure Protection Plan (NIPP)
Responsibility and Accountability per DHS
NIPP as a Template
A Practical Framework for Taking the NIPP Approach
A Practical Framework for Assessing Threat
What the Results Suggest
How to Handle Discoveries of Threat and Vulnerabilities
Determining Vulnerability
Simplified Assessment Model
Countermeasures
Reporting Information
Cost versus Investment
Methods for Small Business Security Practices
Mini Case Study
Risk Mitigation, Transference, and Elimination
Risk Decision Principles
Risk Management
Lessons Not Easily Learned
Readiness Plans: Develop, Validate, and Update
How Terrorists Plan
Collaboration with External Organizations
Preplan Development Process
Plan Development
Overlooked Plan Items
Plan Validation and Maintenance
Plan Updates
Plan to Share Information
What the DHS Says about Protected Critical Infrastructure Information
Prevention, Detection, and Response Factors across Sectors
Innovative Prevention Approaches
Innovative Detection Technology
Investing in Response Capabilities through Partnership
Case Study: Center for Homeland Defense and Security (CHDS) Alumnus
Leads Review of SoCal Shooting Spree
Other Contributors to Homeland Security
Response Considerations
Mini Case Study: Boston Marathon Bombing, April 15, 2013
Preparedness Snapshot
Historical Case Study
Human Factors and Team Dynamics
The Human Factor
Humanity in Crisis and Hero Mode
Female Terrorists: The Human Factor Gone Wrong
Humans in Conflict
Overconfidence
Human Technology
Superdiversity
Diversity as a Problem Solver
The Human Factor as a Tool
Dysfunctional Group Dynamics
Discussion versus Dialogue
How to Get Your Team to Dialogue
Leadership versus Management
Roadblocks to Effective Teamwork
Chapter Exercise
Innovative Ideas for Change
Organizational Leadership
Problem-Solving Exercises
Why Workforce Breakdown Is Critical (by Personality Type, Leadership Style, and Team Role)
Group Roles and Team Roles
Low-Context and High-Context Communications
Reactive versus Proactive Language
The Forming, Storming, Norming, Performing Model
Chapter Exercise
Training and Exercises: Touch It, Feel It, Live It, Breathe It!
Benefits of Training
Adult Learning
Training Methods
Crawl–Walk–Run
Methodology
Video Example for Training
Exercises
Building an Exercise
Training Evaluation
Educational Programs
Training Case Study
Training Failures
Interview of Rear Admiral Tim Sullivan
A Subjective Method for Calculating Return on Investment (ROI)
You Can Deter, But You Can’t Interdict: Don’t Cross the Line!
Know Thy Limits
Distinctions between Collecting Information and Collecting Intelligence
How to Avoid Botching an Investigation
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies
Appendix A: Sample Security Plan
Appendix B: Bomb Threat Checklist
Appendix C: Best Practices for Mail Center Security
Appendix D: Fact Sheet on Dirty Bombs
Appendix E: the Insider Threat
Index

...
View More

Author(s)

Biography

Elsa Lee served as a U.S. Army counterintelligence officer and special agent for 20 years in the fight against terrorism and espionage in the United States, Europe, Central America, and Asia. She is now a lecturer and the CEO and founder of Advantage SCI, LLC, a professional services firm with offices in Washington, D.C.; Texas; and California. The company provides corporate, homeland, and national security services to government and private industry. Lee works with key member representatives of the critical national infrastructures, the academic community, and the U.S. government. She has been quoted extensively in national and international newspapers and professional journals and has appeared on Univision, Telemundo, CNN, Fox News, CBS News, Voice of America, and Canada Business Channel.

Reviews

"Lee argues that while terrorism is one threat, there are many risks that require a thorough understanding of the causes and effects of 17 critical factors that threaten many key resources. From chemical warfare to cyber threats, workplace violence to narcotics trafficking, Lee emphasizes the need to constantly learn from every incident as past lessons are not easily learned. Real cases prove her points. This is a must read for those who care about national security."
—Senator Ted W. Lieu (D), State Senator of Senate District 28