Table of contents for Homeland security and private sector business : corporations' role in critical infrastructure protection / Elsa Lee.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
 
Contents
Preface xi
Acknowledgments xv
About the Author xvii
1 Introduction: Homeland Security Vision 1
The Desired State of Homeland Security 1
The Current State of Homeland Security 4
Homeland Security Issues and Challenges 9
Everyone Has a Role in Homeland Security 11
History of Terrorism 12
The Direct Impact of Modern-Day Terrorism 14
What¿s at Stake with Today¿s Terrorist Attacks 15
Countering Terrorism with DHS Help 20
DHS Help Is Not Enough 23
2 Essential Threat Factors 25
The Problem We Face with Threats 25
General Threats to Security Hierarchy Components 27
General Threat Effect on Homeland Security 29
Threat Management through Intelligence 30
Terrorists¿ Operational Methodology 33
Limitations of Early Warnings 37
Creating Your Own Threat-Warning Capabilities 40
Painful Lesson: The USS Cole Attack 41
Implications of Not Understanding Threats 43
Lesson Learned: First World Trade Center Attack, 1993 45
Lesson Learned: First American Hijacking, 1961 45
Homeland Security Roles and Misconceptions 46
Sharing Information 48
Threat Trends 49
Conclusion 51
AU7078.indb 5 8/13/08 2:57:20 PM
Contents
vi
3 Threat, Vulnerability, and Risk Components 53
Overview 53
DHS Risk Model and National Infrastructure Protection Plan (NIPP) 57
Responsibility and Accountability per DHS 60
How to Perform Your Own Threat Assessment 60
NIPP as a Template 62
A Framework for Taking the NIPP Approach 64
A Framework for Assessing Threat 65
What the Results Suggest 70
Terrorist Activity Indicators 71
Espionage or Insider Threats 71
Information and Technical Threats 71
How to Handle Discoveries of Threat and Vulnerabilities 72
Determining Vulnerability 73
Countermeasure 76
Reporting Information 77
Cost versus Investment 78
Penalties 80
Mini Case Study 81
4 Risk Mitigation, Transference, and Elimination 83
Risk Decision Principles 84
Example 1: 86
Example 2: 86
Lessons Not Easily Learned 89
5 Readiness Plans: Develop, Validate, and Update 95
Overview 95
How Terrorists Plan 98
Collaboration with External Organizations 100
Beginning the Development Process 103
Plan Development 106
Overlooked Plan Items 108
Internal Communications Considerations 108
External Communications 109
Crisis and Media Communications 109
Plan Response for Bomb Threats 111
AU7078.indb 6 8/13/08 2:57:20 PM
Contents
vii
Addressing Loading Docks and Mailrooms 112
Plan Validation 113
Plan Updates 114
Plan to Share Information 115
What DHS says about Protected Critical Infrastructure Information (PCII) 117
6 Prevention, Detection, and Response Factors across Sectors 119
Overview 119
Innovative Prevention Approaches 124
Innovative Detection Technology 127
Investing in Response Capabilities through Partnership 128
Other Contributors to Homeland Security 132
Response Considerations 133
Preparedness Snapshot 135
Case Study 136
7 Human Factors and Team Dynamics 141
The Human Factor 141
Humanity in Crisis and Hero Mode 142
Female Terrorists: The Human Factor Gone Wrong 143
Humans in Conflict 144
Human Overconfidence 146
Human Technology 149
Superdiversity 151
Diversity as a Problem Solver 152
The ¿Human Factor¿ as a Tool 153
Dysfunctional Group Dynamics 156
Discussion versus Dialogue 158
How to Get Your Team to Dialogue 159
Leadership versus Management 160
Roadblocks to Effective Teamwork 162
Roadblock 1: Lack of Proper Foundation 164
Roadblock 2: Linguistic Differences 165
Roadblock 3: Conflicts 166
Chapter Exercise 167
AU7078.indb 7 8/13/08 2:57:20 PM
Contents
viii
8 Toolkits and Innovative Ideas for Change 169
Overview 169
Organizational Leadership 170
Fundamental Management Knowledge 171
Stephen Covey 171
Problem-Solving Exercises 173
Appreciation Exercises: Extracting Maximum Information from Facts 173
How to Use the Tool 174
Example 174
Key Points 174
5 Whys: Quickly Getting to the Root of a Problem 174
Why Use the Tool? 174
How to Use the Tool 175
Example 175
Key Points 175
Fundamental Terrorism Knowledge 176
Gary Berntsen 176
Peter L. Bergen 177
Michael Scheuer 177
Steven Emerson 178
Brian Jenkins 178
Jessica Stern 179
Wafa Sultan 180
Why Workforce breakdown is Critical (By Personality Type, Leadership
Style, and Team Role) 182
Theory X and Theory Y 182
Myers-Briggs Type Indicator 183
Group Roles and Team Roles 186
Low-Context and High-Context Communications 188
Reactive versus Proactive Language 189
Active Listening 190
What to Avoid 190
What We Achieve by Listening 190
How to Listen 190
What to Do 190
The Forming, Storming, Norming, Performing Model 191
Chapter Exercise 194
AU7078.indb 8 8/13/08 2:57:20 PM
Contents
ix
9 Training and Exercises: Touch It, Feel It, Live It, Breathe It! 197
Overview 197
Benefits of Training 198
Adult Learning 199
Training Methods 200
Crawl Walk Run Methodology 203
Video Example for training 205
Another Show Solving a Problem 205
Exercises 206
Building an Exercise 211
Other Key Factors 211
How Often Should You Exercise? 212
Training Evaluation 213
Training Failures 215
A Subjective Method for Calculating Return on Investment (ROI) 216
10 You Can Deter But You Can¿t Interdict: Don¿t Cross the Line! 219
Know Thy Limits 219
Distinctions between Collecting Information and Collecting Intelligence 220
How to Avoid Botching Up an Investigation 221
Stumbling Across Evidence of a Crime: How to Preserve It and Relinquish It
to Law Enforcement Agencies 223
APPEN DIX A: National Infrastructure Protection Plan Table of Contents 225
APPEN DIX B: ASCE Report on Critical Infrastructure 231
APPEN DIX C: Bomb Threat Checklist 239
APPEN DIX D: Best Practices for Mail Center Security 241
General Mail Operation Preventive Recommendation 241
Employee Security Procedures 242
General Safety and Security Procedures for Incoming¿
Outgoing Mail Areas 243
Access to Information: Education and Communications 244
Guidelines for Mail Center Theft Prevention 245
AU7078.indb 9 8/13/08 2:57:20 PM
Contents
x
APPEN DIX E: FY07 National Incident Management System (NIMS)
Training Guidelines 247
APPEN DIX F: Fact Sheet on Dirty Bombs 249
Background 249
Impact of a Dirty Bomb 249
Protective Actions 250
Sources of Radioactive Material 250
Control of Radioactive Material 251
Risk of Cancer 251
Other Contact Information 252
APPEN DIX G: Arab American Psychiatrist Wafa Sultan: There Is No
Clash of Civilizations But a Clash between the Mentality of the
Middle Ages and That of the 21st Century 253
References 255
APPEN DIX H: Homeland Security Exercise And Evaluation Program 257
INDEX 265

Library of Congress Subject Headings for this publication:

Infrastructure (Economics) -- Security measures -- United States -- Planning.
Corporations -- Security measures -- United States -- Planning.
Business enterprises -- Security measures -- United States -- Planning.
Industries -- Security measures -- United States -- Planning.
Preparedness -- United States.
Terrorism -- Prevention.
United States. Dept. of Homeland Security. National infrastructure protection plan.