Название: The Handbook of Homeland Security Автор: Scott N. Romaniuk, Martin Scott Catino, C. Augustus Martin Издательство: CRC Press Год: 2023 Страниц: 848 Язык: английский Формат: pdf (true) Размер: 10.3 MB
The Handbooks of Homeland Security Handbook is a convenient, one-stop reference and guide to the latest regulations and developments in all things relevant to the homeland security and defense domain.
The book is divided into five parts and addresses such critical areas of as countering terrorism, critical infrastructure protection, information and cybersecurity, military and private sector support for Homeland Security, risk assessment, and preparedness for all-hazards and evolving threats. In total, more than 100 chapters outline the latest developments in homeland security policies, directives, and mandates as well as emergent threats and topical considerations for the Department of Homeland Security (DHS) and its stake-holders.
The Central Intelligence Agency (CIA) is an important USA government agency with a national security mandate to collect intelligence globally. This chapter explains the establishment and role of the CIA within the wider USA’s intelligence community. There were four agencies involved in intelligence which heralded the establishment of the CIA. These agencies were the Office of the Coordinator of Information (COI), Office of Strategic Service (OSS), Strategic Services Unit (SSU), and Central Intelligence Group (CIG). Established on July 11, 1941, the COI was designed to gather strategic and economic intelligence during World War II. It lasted less than one year, only for 337 days, because World War II had come to an end. However, this agency managed to coordinate the intelligence gathered from the USA’s Department of State, the army, the navy, and the Federal Bureau of Investigations (FBI) and was able to disseminate this intelligence in an organized and coordinated way to USA’s President Franklin D. Roosevelt. The COI engaged in collaborations with other countries such as Britain. For instance, it liaised with the British intelligence agencies to obtain training and information.
This chapter reviews the intricate nature of cyber security operations for their tactics, techniques, and procedures. There is a tremendous amount of variety for potential cyber operations due to the realities of crafting operations, their purposes, and their resources. The way of appreciating cyber security operations is by understanding how these operations are in fact a culmination of various components. Tactics, techniques, and procedures (TTPs) are one of these components and feature evidently in all types of cyber operations. This view can go so far as to cover functions such as, but not limited to:
◾ Intelligence gathering and open source intelligence work ◾ Disinformation and deception campaigns ◾ Red, blue, and purple teaming ◾ Penetration testing ◾ Offensive and defense engagement (from seizure to warfare) ◾ Exploit, general tooling development and reverse engineering ◾ Infrastructure engineering and data preservation ◾ Cryptographic operations ◾ Signals and telemetry, including data transmission or lack thereof ◾ Computer engineering and architecture design.
The diverse array of chapter topics covered—contributed to by dozens of top experts in the field—provides a useful and important resource for any student, professional, researcher, policy-maker, or library in understanding the domestic initiatives of public-sector Homeland Security entities and their responsibilities in the current global environment.
Contents:
I: Department of Homeland Security (DHS) and Critical Infrastructure 1. Blackouts and Brownouts or Power Outages 2. Body Scanners 3. Bureau of Alcohol, Tobacco, Firearms, and Explosives 4. Central Intelligence Agency (CIA) and the Intelligence Community 5. Critical Infrastructure and Key Resources 6. Critical Manufacturing Sector 7. Department of Homeland Security (DHS) 8. Domestic Nuclear Detection Office (DNDO) 9. Emergency Response Task Forces to Address Physical and Cyber Threats 10. Energy (Power) Security and Grids 11. Federal Aviation Administration (FAA) 12. Federal Bureau of Investigation 13. Immigration and Customs Enforcement (ICE) 14. Industrial Resilience 15. National Domestic Preparedness Office 16. National Protection and Programs Directorate 17. Partnership for Peace Consortium (PfPC) 18. Protecting Critical Infrastructure and Key Resources 19. Riots and Rioting 20. Secure Border Initiative 21. Smuggling 22. The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) 23. The National Biosurveillance Integration Center (NBIC) 24. The National Emergency Management Association (NEMA) 25. The United States Citizenship and Immigration Services (USCIS) II: Cybersecurity, Terrorism, and Asymmetric Threats 26. Advanced Persistent Threats (APTs) 27. Chain of Custody 28. Conficker Worm 29. Cryptocurrencies 30. Cyber Security and Social Media 31. Cyber Security Operations – Tactics, Techniques, and Procedures 32. Cyberattacks 33. Cybercrime, National Security, and Internet Governance 34. Cybersecurity 35. Cyberweapons 36. Distributed Denial-of Service (DDoS) Threats and Attacks 37. Government Communications Headquarters (GCHQ) 38. Hackers and Hacktivism 39. Internet of Things (IoT) 40. Malware 41. National Security Agency (NSA) 42. Social Engineering 43. Stuxnet 44. Swatting 45. Third Department of the People’s Liberation Army General Staff Headquarters (3PLA) 46. US Cyber Command (USCYBERCOM) III: Terrorism and Asymmetric Threats 47. Al Qaeda in the Islamic Maghreb (AQIM) 48. Al Qaeda 49. Ansar Allah 50. Basque Separatists 51. Car Bombs 52. Chemical and Biological Weapons (CBW) 53. Foreign Terrorist Fighters (FTF) 54. Hezbollah 55. Hijackings 56. Improvised Explosive Devices (IEDs) 57. Irish Republican Army (IRA) 58. Lone Actor Terrorism 59. Nationalists 60. Right-Wing Extremism 61. State-Sponsored Terrorism 62. Suicide Bombers 63. Target Hardening 64. Terrorism Copycat Effects 65. Urban Warfare IV: United States (US) Domestic and Border Security 66. Active Shootings on College and University Campuses 67. Barrio Azteca (Los Aztecas) Mexican-American Gang 68. Beltrán-Leyva Organization (BLO) 69. Border Patrols and National Entry Points 70. Civil Liberties and Homeland Security 71. Disaster Management and Assistance (DMA) 72. Domestic Nuclear Detection Office (DNDO) 73. Domestic Security 74. Gangs and Law Enforcement in the United States 75. Improvised Explosive Devices (IEDs) 76. Kidnappings 77. La Familia Michoacana (LFM) Mexican Drug Cartel 78. Law Enforcement and Legal Foundations of Homeland Security 79. Los Zetas Mexican Drug Cartel 80. Mara Salavatrucha (MS-13) International Criminal Gang 81. Maritime Domain Awareness (MDA) 82. Militias 82. National Preparedness for Natural and Human-Caused Hazards 83. Passive Security 84. Radicalization Prevention and Response (RPR) 85. Screening 86. The Evolution and Future of SWAT 87. The National Security Strategy (NSS) of the United States 88. The Sinaloa-Tijuana Complex 89. United States Citizenship and Immigration Services (USCIS) 90. United States-Mexico Border Fence V: Emergency Planning and Preparedness and Heath Security 91. Agroterrorism 92. Anthrax 93. Disaster Impact on Minorities 94. Earthquakes and US National Security 95. Emergency Management and Response 96. Homeland Security and the Arctic 97. Legal Frameworks of Interstate Disaster Management 98. Nuclear Threats 99. Ricin 100. Sarin 101. Smallpox 102. Suspicious Packages 103. Urban Search and Rescue (SAR)
Скачать The Handbook of Homeland Security
|