Understanding hs ch 09

Post on 13-Feb-2017

135 views 0 download

Transcript of Understanding hs ch 09

Chapter 9

Porous NodesPorous NodesSpecific VulnerabilitiesSpecific Vulnerabilities

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Undocumented Immigration and Border Undocumented Immigration and Border SecuritySecurity

Plausible Scenarios: Crime an Insecurity Plausible Scenarios: Crime an Insecurity on the Southern Borderon the Southern Border

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Undocumented Immigration and Border Undocumented Immigration and Border SecuritySecurity

The Immigration DebateThe Immigration Debate Countervailing PositionsCountervailing Positions Homeland Security Context Homeland Security Context

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Plausible Scenarios: Crime and Insecurity Plausible Scenarios: Crime and Insecurity on the Southern Borderon the Southern Border

Case in Point: The Tri-Border Area of South Case in Point: The Tri-Border Area of South AmericaAmerica

Case in Point: The Mexican Drug WarCase in Point: The Mexican Drug War

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Symbolic Value: Airline Attacks and Symbolic Value: Airline Attacks and Maximum Propaganda EffectMaximum Propaganda Effect

The Complexity of Aviation SecurityThe Complexity of Aviation Security Implementing Aviation Security PrioritiesImplementing Aviation Security Priorities

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Symbolic Value: Airline Attacks and Symbolic Value: Airline Attacks and Maximum Propaganda EffectMaximum Propaganda Effect

Available Weapons for Use Against Aircraft and Available Weapons for Use Against Aircraft and TerminalsTerminals

Case in Point: The PFLP and the Origin of Case in Point: The PFLP and the Origin of Modern Aviation TerrorismModern Aviation Terrorism

Case: Northwest Airlines Flight 253Case: Northwest Airlines Flight 253

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

The Complexity of Aviation SecurityThe Complexity of Aviation Security

2003 National Strategy for Aviation Security2003 National Strategy for Aviation Security The Problem of Reactive PlanningThe Problem of Reactive Planning Lessons From September 11, 2001Lessons From September 11, 2001 Unique Protection Challenges for AviationUnique Protection Challenges for Aviation

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Implementing Aviation Security PrioritiesImplementing Aviation Security Priorities

Collaborative Aviation Protection InitiativesCollaborative Aviation Protection Initiatives Aviation and Transportation Security Act of Aviation and Transportation Security Act of

20012001 Richard Reid the Shoe BomberRichard Reid the Shoe Bomber Case in Point: The Chemical Plot and 3-1-1 RuleCase in Point: The Chemical Plot and 3-1-1 Rule

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Understanding the Terrorist ThreatUnderstanding the Terrorist Threat Port Security Initiatives and PrioritiesPort Security Initiatives and Priorities

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Understanding the Terrorist ThreatUnderstanding the Terrorist Threat

CBRN Explosive DevicesCBRN Explosive Devices Terrorist Strategic Priorities and Maritime Terrorist Strategic Priorities and Maritime

TargetingTargeting Contagion EffectContagion Effect Case in Point: Maritime Cargo ContainersCase in Point: Maritime Cargo Containers

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.

Port Security Initiatives and PrioritiesPort Security Initiatives and Priorities

Complexity of Port Infrastructure ComponentsComplexity of Port Infrastructure Components 2002 Container Security Initiatives2002 Container Security Initiatives

Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.