Chapter 9
Porous NodesPorous NodesSpecific VulnerabilitiesSpecific Vulnerabilities
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Undocumented Immigration and Border Undocumented Immigration and Border SecuritySecurity
Plausible Scenarios: Crime an Insecurity Plausible Scenarios: Crime an Insecurity on the Southern Borderon the Southern Border
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Undocumented Immigration and Border Undocumented Immigration and Border SecuritySecurity
The Immigration DebateThe Immigration Debate Countervailing PositionsCountervailing Positions Homeland Security Context Homeland Security Context
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Plausible Scenarios: Crime and Insecurity Plausible Scenarios: Crime and Insecurity on the Southern Borderon the Southern Border
Case in Point: The Tri-Border Area of South Case in Point: The Tri-Border Area of South AmericaAmerica
Case in Point: The Mexican Drug WarCase in Point: The Mexican Drug War
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Symbolic Value: Airline Attacks and Symbolic Value: Airline Attacks and Maximum Propaganda EffectMaximum Propaganda Effect
The Complexity of Aviation SecurityThe Complexity of Aviation Security Implementing Aviation Security PrioritiesImplementing Aviation Security Priorities
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Symbolic Value: Airline Attacks and Symbolic Value: Airline Attacks and Maximum Propaganda EffectMaximum Propaganda Effect
Available Weapons for Use Against Aircraft and Available Weapons for Use Against Aircraft and TerminalsTerminals
Case in Point: The PFLP and the Origin of Case in Point: The PFLP and the Origin of Modern Aviation TerrorismModern Aviation Terrorism
Case: Northwest Airlines Flight 253Case: Northwest Airlines Flight 253
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
The Complexity of Aviation SecurityThe Complexity of Aviation Security
2003 National Strategy for Aviation Security2003 National Strategy for Aviation Security The Problem of Reactive PlanningThe Problem of Reactive Planning Lessons From September 11, 2001Lessons From September 11, 2001 Unique Protection Challenges for AviationUnique Protection Challenges for Aviation
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Implementing Aviation Security PrioritiesImplementing Aviation Security Priorities
Collaborative Aviation Protection InitiativesCollaborative Aviation Protection Initiatives Aviation and Transportation Security Act of Aviation and Transportation Security Act of
20012001 Richard Reid the Shoe BomberRichard Reid the Shoe Bomber Case in Point: The Chemical Plot and 3-1-1 RuleCase in Point: The Chemical Plot and 3-1-1 Rule
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Understanding the Terrorist ThreatUnderstanding the Terrorist Threat Port Security Initiatives and PrioritiesPort Security Initiatives and Priorities
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Understanding the Terrorist ThreatUnderstanding the Terrorist Threat
CBRN Explosive DevicesCBRN Explosive Devices Terrorist Strategic Priorities and Maritime Terrorist Strategic Priorities and Maritime
TargetingTargeting Contagion EffectContagion Effect Case in Point: Maritime Cargo ContainersCase in Point: Maritime Cargo Containers
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.
Port Security Initiatives and PrioritiesPort Security Initiatives and Priorities
Complexity of Port Infrastructure ComponentsComplexity of Port Infrastructure Components 2002 Container Security Initiatives2002 Container Security Initiatives
Martin, Understanding Homeland Security © 2015 SAGE Publication, Inc.