ebook img

Handbook Of Security Science PDF

1192 Pages·2022·18.183 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook Of Security Science

Anthony J. Masys Editor Handbook of Security Science Handbook of Security Science Anthony J. Masys Editor Handbook of Security Science With97Figuresand52Tables Editor AnthonyJ.Masys CollegeofPublicHealth UniversityofSouthFlorida Tampa,FL,USA ISBN978-3-319-91874-7 ISBN978-3-319-91875-4(eBook) https://doi.org/10.1007/978-3-319-91875-4 ©SpringerNatureSwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. SectionEditorAugustusW.FountainIIImadehiscontributiontothisworkinhisprivatetimeoutsideof hisofficialdutiesasDeputyArmyChiefScientistandtheviewsexpressedinthebookdonotnecessarily representtheviewsoftheArmy,DoD,orU.S ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG. Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Themodernsecuritylandscapecanbedescribedasdynamicandcomplexstemming fromtheemergingthreatsandrisksthatarepersistentandtransborder.Globalization, climate change, terrorism, transnational crime, and misuse of edging underlying technologycanhavesignificantimpactonsocietyandforcesonetore-evaluatewhat “national security” means. Recent global events such as the COVID-19 pandemic, climate change (extreme weather events), mass migration, terrorist acts, and cyber threats highlight the inherent vulnerabilities to our current national and global securityposture. The Handbook ofSecuritySciencewas developedfrom ashared concern ofthe need for thought leadership and practical guidance for both academic and security professionalspertainingtomattersofbothnationalandglobalsecurity. Thishandbookprovidesasurveyofcurrentandemergingtrendsinsecurity.The breadthofthechaptersoffersinsightsintohowscience(physical,natural,andsocial) and technology can support new developments to manage the complexity resident withintheevolvingthreatandrisklandscape. Our primary objective is to facilitate the generation and diffusion of thought leadership on security science that go beyond conventional thinking and current practice. A second objective is to provide theoretical as well as practical insight into nationalandglobalsecuritychallenges. Specifically, the Handbook addresses the need for the continued dialogue, idea- tion,andinnovationacrossthesecuritysciencelandscape. The chapters in the Handbook represent various approaches to the application of securityscience,boththeoreticalandpractical.Inthisway,eachindividualchapteras wellastheHandbookasawholeexploresthedominantparadigmspertainingtonational andglobalsecurityandproposesalternativeframing,approaches,andstrategies. The Handbook is organized in four parts that encompass both theoretical and practicalperspectives: Part1:ConceptsinSecurityStudies Part2:NationalDefense(CBRNE) Part3:TerrorismandTransnationalOrganizedCrime Part4:PhysicalSecurity,CyberSecurity,andCriticalInfrastructure:AnIntroduction v vi Preface Part1,ConceptsinSecurityStudies,groundsthesecuritydiscoursebyframing and exploring the all-hazards landscape and multidisciplinary approaches defining terms.Thisincludestraditionalandemergingsecuritydomainsandchallenges(e.g., terrorismandcriticalinfrastructuresprotection,violentextremism,migration,disin- formation, COVID-19, economic security, climate security, human security, or space) as well as practical and analytical methods (intelligence, systems thinking, modelingandsimulation,securitization,securitycultures,threatassessment,critical thinkingaswellasethical,legal,andsocialissues,etc.). In so doing, Part 1 combines theoretical perspectives with deriving operational applicationstoprovidecontemporaryfoundationsofevolvingsecurityscience. Part 2, National Defense (CBRNE), explores both theory and applications of securityscienceacrosstheChemical,Biological,Radiological,Nuclear,andExplo- sive (CBRNE) problem space. The twenty-first century has shown that chemical warfareisnotpassé,andtherecentpandemichasgivenusaglimpsewhatregionalor global biological warfare could look like. Part 2 provides unprecedented contribu- tions from authors representing government, industry, and not-for-profit organiza- tionstoaddressawidevarietyofCBRNEthreats,issues,andtechnologies. Part 3, Terrorism and Transnational Organized Crime, outlines the global threatofterrorismandorganizedcrime.Itdescribeshowterrorismcontinuestobean enduringglobalsecuritythreatwhichhasgrownandmodernizedduetotheubiquity andinfluenceoftechnologicalinnovation,poorgovernance,endemicstatefragility, conflict, and war. The section takes a historical approach, describing how Salafi- Jihadism has evolved, as well as concentrating on several specific hot-spots of religious extremism, including the Middle East, North Africa, and South Asia. Specificchaptersalsofocusonfar-rightextremismbasedonethnicity,race,religion, gender, and sexual orientation, focusing largely on the Americas and Europe. The section also focuses on the nexus of terror and organized crime which has led to human insecurity due to illegal migration, trafficking, and smuggling. Crime also influences both licit and illicit markets which in turn exacerbate the triple threat of corruption, crime, and terror. Several chapters outline how to counter and prevent violentextremismthroughpublichealthandeducationapproacheswhileexamining bestpracticesandstandards.Thesectionoffersasolidfoundationofthedefinitions and issues enabling readers to gain greater insights into extremism, terrorism, and transnationalorganizedcrime. Part 4, Physical Security, Cyber Security, and Critical Infrastructure: An Introduction, presents a more technical view of the issues and challenges and providesselectedsolutions. It is clear from a perusal of the chapters selected and solicited by our section editorsthattheneedforideationandinnovationonmatterspertainingtonationaland global security is paramount. Today’s security leaders, professionals, and analysts mustdecidehowtheywillmanagetheinterdependenciesandinterconnectivitythat characterizethecomplexsecuritylandscape. As coeditors of this Handbook, we would like to recognize the outstanding thought leadership from our contributing authors. In addition, we owe deep appre- ciation to Springer for its support of the project and in particular to our publishing Preface vii team,AnneliesKersbergen,LydiaMueller,SonalNagpal,andJubyGeorge,fortheir enthusiasmandwisdominshapingthewholeeffort. With the ever-evolving security risks and complex security landscape, we view thishandbookasanorganicdocument,onethatcangrowtoencompassnewinsights andinnovativethinking. Tampa,USA Dr.AnthonyJ.Masys Middletown,USA Dr.AlexanderSiedschlag Edgewood,USA Dr.AugustusWayFountainIII Geneva,Switzerland Dr.ChristinaSchoriLiang Como,Italy ProfessorMaurizioMartellini September2022 Contents PartI ConceptsinSecurityStudies .......................... 1 1 CriticalInfrastructureRiskAnalysisandManagement ........ 3 RyanK.BaggettandAutumnL.Stout 2 CriticalThinkingandEffectiveCommunicationinSecurity Domains .............................................. 23 CihanAydiner 3 DisinformationandFakeNews ............................ 41 WalterSeboeck,BettinaBiron,ThomasJ.Lampoltshammer, HeidiScheichenbauer,ChristofTschohl,andLisaSeidl 4 USHomelandSecurity .................................. 63 SamMcGhee 5 DomesticTerrorism ..................................... 85 JenniferC.Gibbs 6 InsiderThreat:ApplyingNoDarkCornersDefenses .......... 103 NickCatrantzos 7 Post-9/11RadicalizationTheoryandItsImpactonViolent Extremism ............................................ 123 AdibFarhadi 8 CounterterrorismPolicy ................................. 149 BrionyElspethCallander 9 EmergencyManagementSystemApplicationinManagement ofTerroristIncidents ................................... 173 EricK.Griffin 10 Securitization .......................................... 207 RichardJ.KilroyJr. ix x Contents 11 Ethical,Legal,andSocialIssues(ELSI) ..................... 225 AndreaJerkovićandAlexanderSiedschlag 12 IntelligenceforSecurity ................................. 243 DanielW.B.Lomas 13 ReconceptualizingSecurityThreats ........................ 261 ChristianKaunertandOriWertman 14 ReconceptualizingSecurityChallenges ...................... 275 MunirZamir 15 CivicHomelandSecurityCulture:APollStudyApproach andtheExampleofPennsylvania .......................... 295 AlexanderSiedschlag 16 ReconceptualizingSecurityVulnerabilities ................... 319 RobertMcCreight 17 HumanSecurity ....................................... 341 Ygnacio“Nash”Flores 18 HomelandSecurity:Concepts,Definitions,andEvolution ....... 361 StephanieLipsonMizrahi 19 EconomicSecurity:ConceptualandOperationalIntersection ofTradePolicyandNationalSecurity ...................... 379 JohnLash 20 SocietalSecurityandCOVID-19 .......................... 395 JenniferD.OsetekandKeithW.Ludwick 21 Counterterrorism ...................................... 415 TimothyM.Luko 22 ClimateSecurity:ChallengesandOpportunitiesfor HomelandSecurity ..................................... 427 JohnComiskey,MichaelLarrañaga,andCameronCarlson 23 ModelingandSimulationforSecurity:AnOverview .......... 447 EricBest 24 Non-traditionalSecurity:ARisk-CentricView ............... 459 AnthonyJ.Masys 25 Migration,SecurityChallenges,andNationalSecurity ......... 475 JoãoEstevens 26 SpaceSecurity ......................................... 495 ArthurJ.Simental,T.Bynum,J.Holst,andW.A.Cain 27 AligningSecuritytoGeneralSystemsTheory ................ 527 KeithD.Willett Contents xi 28 SystemsThinkingandSecurity ............................ 553 KeithD.Willett 29 SecurityModelingandSimulation ......................... 573 KeithD.WillettandIvanTaylor 30 FoodSecurityandComplexDisasters ...................... 599 AshleyHydrickandElizabethDunn 31 CyberSecurityandDrones ............................... 619 PaoloCrippa 32 HealthSecurity ........................................ 635 MarissaJ.Levine 33 DisasterManagementofaMajorCBRNAccident ............ 661 MarcoCarbonelli,AlbaIannotti,andAndreaMalizia 34 CyberThreatsandNationalSecurity:TheUseandAbuse ofArtificialIntelligence .................................. 679 RezaMontasari PartII NationalDefense(CBRNE) ........................... 701 35 Chemical,Biological,Radiological,Nuclear,andExplosive Threats:AnIntroduction ................................ 703 AugustusWayFountainIII 36 High-ThreatChemicalAgents:CurrentTrendsandFuture Perspective ........................................... 709 EdenJoyPacsial-Ong 37 BiologicalAgents:ThreatandResponse .................... 739 JamesJ.ValdesandEricaR.Valdes 38 RadiologicalDispersalDevices:Detection,Response,and Remediation .......................................... 771 GlenI.Reeves 39 NuclearSecurityScience ................................. 795 DavidLaGraffe 40 ExplosiveThreats:TheChallengestheyPresentand ApproachestoCounteringThem .......................... 829 PeterJ.Hotchkiss

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.