Introduction to Homeland Security - David A. McEntire - E-Book

Introduction to Homeland Security E-Book

David A. McEntire

0,0
92,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Explore the growing concerns about security with this vital book

Homeland Security has never been a more important part of the American social and political fabric. Risk assessment, attack prediction and prevention, preparedness measures, response to terrorist activity, and natural disaster management all fall under the purview of homeland security. It is a key focus of the US security state, which has expanded massively in recent decades.

Introduction to Homeland Security provides an overview of this subject for professors, students, and practitioners in the field. Drawing upon a rich foundation of scholarship and academic literature, it focuses principally on terrorism prevention and protection, and offers new content related to novel threats and security concerns. Its practitioner-centered approach and attention to both governmental and non-governmental stakeholders make it an indispensable introduction to the subject.

Readers will also find:

  • Coverage of the four traditional phases of emergency management
  • New and additional treatment of border control, drug trafficking, organized crime, mass shootings, protests, riots, pandemics, and climate change
  • Companion websites including extensive pedagogical materials, student self-assessment tests, and an image gallery

Introduction to Homeland Security is ideal for professors and students in homeland security and emergency management programs, as well as practitioners involved in this important profession.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 933

Veröffentlichungsjahr: 2024

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Introduction to Homeland Security

Terrorism Prevention, Public Safety and Emergency Management

Third Edition

DAVID A. MCENTIRE, PHD

Utah Valley University

 

 

 

This edition first published 2024.

© 2024 by John Wiley & Sons, Inc.

Edition HistoryJohn Wiley & Sons, Inc. (1e, 2008) (2e, 2019)

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of David A. McEntire to be identified as the author of this work has been asserted in accordance with law.

Registered Office(s)John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

Editorial Office111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

In view of new threats, ongoing research, changes in governmental regulations, and the constant flow of information relating to terrorism, public safety, and homeland security, the reader is urged to carefully review and evaluate the material in this book and consider what practices might be best for the reader’s particular situation. While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Hardback ISBN: 9781394234325

Library of Congress Cataloging-in-Publication Data

Names: McEntire, David A., author.

Title: Introduction to homeland security : terrorism prevention, public safety and emergency management / David A. McEntire, PHD, Utah Valley University.

Description: Third edition. | Hoboken, NJ : John Wiley & Sons, 2024. | Includes bibliographical references and index. | Summary: “United States policy regarding international affairs, terrorism, and disasters has witnessed an ongoing tension between the security and emergency management points of view. Since the late 1940s, there has been recurring disagreement about the priority given to conflict events versus other types of hazards. Several events elevated the stakes in this debate and created additional urgency to find some sort of consensus about future priorities”—Provided by publisher.

Identifiers: LCCN 2024004838 (print) | LCCN 2024004839 (ebook) | ISBN 9781394234325 (hardback) | ISBN 9781394234332 (epub) | ISBN 9781394234349 (adobe pdf)

Subjects: LCSH: Terrorism—United States—Prevention. | Terrorism—Government policy—United States. | Emergency management—United States. | Computer security—Government policy—United States. | United States—Military policy.

Classification: LCC HV6432.M3854 2024 (print) | LCC HV6432 (ebook) | DDC 363.340973—dc23/eng/20240131

LC record available at https://lccn.loc.gov/2024004838

LC ebook record available at https://lccn.loc.gov/2024004839

 

 

For Mason, Madison, Kailey, and Ashleyand the future of children and grandchildren everywhere

Table of Contents

Cover

Title Page

Copyright

Dedication

Table of Contents

About the Author

Foreword

Preface

Acknowledgments

About the Companion Website

CHAPTER 1 Understanding a Global Priority

Introduction

1.1 Diverse Threats and Terrorism are the New Normal

1.2 A Growing Risk

1.3 9/11: A Wake-Up Call

1.4 The Nature of Homeland Security

1.5 Disciplines Involved in Homeland Security and the Emergency Management Profession

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 2 Identifying Terrorism

Introduction

2.1 Defining Terrorism

2.2 Common Characteristics of Terrorism

2.3 Types of Terrorism

2.4 Relation of Terrorism to Other Disasters

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 3 Recognizing the Causes of Terrorism

Introduction

3.1 Frequently Mentioned Causes of Terrorism

3.2 Political Causes

3.3 Cultural and Religious Causes

3.4 Ideology

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 4 Comprehending Terrorists and their Behavior

Introduction

4.1 Terrorists and Terrorist Organizations

4.2 Personal Characteristics

4.3 The Behavior and Tactics of Terrorists

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 5 Uncovering the Dynamic Nature of Terrorism

Introduction

5.1 The Appearance of Terrorism

5.2 The Evolution of Terrorism Abroad

5.3 Terrorism and The United States

5.4 Terrorism Today

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 6 Evaluating a Major Dilemma

Introduction

6.1 Changes in The Media Over Time

6.2 Terrorists and The Media

6.3 The Media and Terrorism

6.4 Government and The Media

6.5 Censorship and Self-Censorship

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 7 Contemplating a Quandary

Introduction

7.1 War, Terrorism, and Law

7.2 Security and Liberty

7.3 Cases and Considerations

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 8 Preventing Terrorist Attacks

Introduction

8.1 Addressing Root Causes

8.2 Policy and Legislation

8.3 Intelligence

8.4 Counterterrorism

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 9 Securing the Nation

Introduction

9.1 Border Control

9.2 Protecting Air Transportation

9.3 Rail Transportation Security

9.4 Protection of Sea Ports and Maritime Transportation

9.5 Protection of Petrochemical Facilities

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 10 Protecting Against Potential Attacks

Introduction

10.1 Threat Assessment

10.2 Structural and Nonstructural Mitigation

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 11 Preparing for the Unthinkable

Introduction

11.1 The Importance and Nature of Preparedness

11.2 Foundations of Local Preparedness

11.3 Planning

11.4 Other Measures

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 12 Responding to Attacks

Introduction

12.1 Investigation and Apprehension

12.2 Other Crucial Functions

12.3 Coordination Mechanisms

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 13 Recovering From Impacts

Introduction

13.1 Initial Recovery Steps

13.2 Key Recovery Functions

13.3 The Importance of Disaster Assistance

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 14 Assessing Significant Threats

Introduction

14.1 The Future of Terrorism and WMD

14.2 Radiological Weapons

14.3 Nuclear Weapons

14.4 Biological Weapons

14.5 Chemical Weapons

14.6 Cyberterrorism

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 15 Evaluating Other Pressing Problems

Introduction

15.1 Criminal Activity

15.2 Social Disturbances

15.3 Epidemics and Pandemics

15.4 Global Warming and Climate Change

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

CHAPTER 16 Looking Toward the Future

Introduction

16.1 The Lessons of This Book

16.2 Accountability in Homeland Security

16.3 Clarification of Homeland Security Policy

16.4 Research Needs and Recommendations for the Future

Summary

Assess Your Understanding

Summary Questions

Applying This Chapter

Be a Homeland Security Professional

Key Terms

References

Glossary

Index

End User License Agreement

List of Illustrations

CHAPTER 1

FIGURE 1-1

Mass shootings like the Orlando nightclub shooting reveal the significant impact...

FIGURE 1-2

The news is dominated by stories about terrorism and terrorist attacks. Source: ...

FIGURE 1-3

Terrorists used passenger jets to attack the United States on September 11, 2001...

FIGURE 1-4

This shield illustrates that the Federal Emergency Management Agency is an organ...

FIGURE 1-5

The Homeland Security Advisory System did not warn citizens about what to do if ...

CHAPTER 2

FIGURE 2-1

Terrorists often launch attacks in visible locations to achieve maximum visibili...

FIGURE 2-2

Car bombings, such as this one in 2017 in the Ukraine, are examples of random te...

FIGURE 2-3

9/11 has features of both conflict and consensus disasters. It was initiated by ...

CHAPTER 3

FIGURE 3-1

Many Arabs oppose the establishment of Israel in the Middle East. Source: © Shut...

FIGURE 3-2

Without sufficient feedback and adaptation, a political system may be affected b...

FIGURE 3-3

Timothy McVeigh was influenced by

The Turner Diaries

, and this led him to bomb t...

CHAPTER 4

FIGURE 4-1

Some individuals, like Eric Rudolph pictured here, use terrorist tactics to achi...

FIGURE 4-2

Many, but not all, terrorists are young. During a march in Pakistan on October 5...

FIGURE 4-3

Terrorists spend a lot of time planning attacks, as was the case in the twin Afr...

CHAPTER 5

FIGURE 5-1

Many leaders in Latin America have employed terrorist tactics in the name of com...

FIGURE 5-2

Coalition forces attacking ISIS—one of the most brutal terrorist organiza...

FIGURE 5-3

The United States has had to deal with terrorist organizations, like the Ku Klux...

CHAPTER 6

FIGURE 6-1

News can be quickly broadcast around the world with modern technology. Source: G...

FIGURE 6-2

The media was used extensively by terrorists in the 1972 Olympics. Source: © Pop...

FIGURE 6-3

Aerial view of Branch Davidian compound near Waco, Texas, in flames on April 19,...

FIGURE 6-4

Journalists are often killed or held hostage by terrorist organizations. Source:...

CHAPTER 7

FIGURE 7-1

The U.S. Constitution promotes both liberty and security concerns. Source: © Nat...

FIGURE 7-2

Ben Franklin declared that those who give up liberty for security deserve neithe...

FIGURE 7-3

During World War II, over 100,000 people of Japanese descent were relocated to d...

CHAPTER 8

FIGURE 8-1

The Seal of the Department of Homeland Security (DHS) reflects its mission. The ...

FIGURE 8-2

Thousands of employees help to collect, interpret, and disseminate intelligence ...

FIGURE 8-3

The role of counterterrorism centers is to thwart attacks before they happen. So...

FIGURE 8-4

Russian Special Forces were able to kill terrorists at a Russian theater. Unfort...

FIGURE 8-5

Counterterrorism organizations like Grenzschutzgruppe 9, the tactical unit of th...

CHAPTER 9

FIGURE 9-1

There are many government employees who work to secure U.S. borders. Source: © U...

FIGURE 9-2

TSA agents have the goal of preventing terrorist attacks against aircraft. Sourc...

FIGURE 9-3

Trains may be the target of terrorism due to the confinement of a large number o...

FIGURE 9-4

Subways are vulnerable to attacks because they are accessible to terrorists and ...

FIGURE 9-5

The Coast Guard has specially trained teams to deter attacks that could create s...

FIGURE 9-6

Numerous efforts are being undertaken to prevent terrorist attacks against chemi...

CHAPTER 10

FIGURE 10-1

Bombings are the most common threats from terrorists, but other attacks are poss...

FIGURE 10-2

Chemical attacks are 1 of 15 anticipated attacks against the United States. Sour...

FIGURE 10-3

Bollards like these can prevent vehicle-delivered bombs from reaching their inte...

CHAPTER 11

FIGURE 11-1

Congressional officials pass laws to help the nation prepare for terrorist attac...

FIGURE 11-2

The National Response Framework is a plan that describes the principles, roles, ...

FIGURE 11-3

EOCs are equipped locations to help you manage response and recovery operations....

FIGURE 11-4

Training is a great way to educate your public servants or first responders abou...

FIGURE 11-5

The Red Cross can help you educate your community about terrorist attacks and ot...

CHAPTER 12

FIGURE 12-1

The FBI is one of many agencies that attempt to find terrorists, prevent attacks...

FIGURE 12-2

Numerous law enforcement officials will confront terrorists and initiate an inve...

FIGURE 12-3

The scene of a terrorist attack can be extremely dangerous. Source: US Depart...

FIGURE 12-4

An important priority after a terrorist attack is emergency medical care. Sou...

FIGURE 12-5

Decontamination is vital to prevent the transmission of dangerous chemicals or h...

FIGURE 12-6

Sharing information with the public via the media can help your community respon...

FIGURE 12-7

Incident Command Vehicles like this one may facilitate coordination at the scene...

CHAPTER 13

FIGURE 13-1

Political leaders are often present when a disaster is declared or to remember t...

FIGURE 13-2

Debris from 9/11: Debris is an important, but often neglected, function that mus...

FIGURE 13-3

People will donate goods and supplies to the Red Cross and other organizations f...

FIGURE 13-4

Victims of large terrorist attacks may be able to seek assistance at a FEMA Disa...

CHAPTER 14

FIGURE 14-1

The Ayatollah Khamenei is an example of an Iranian leader who has espoused revol...

FIGURE 14-2

Civil Support Teams can help local jurisdictions deal with attacks involving we...

FIGURE 14-3

The atomic bomb in Japan was devastating. Today’s nuclear weapons are far...

FIGURE 14-4

Deadly diseases can be acquired by terrorists from bio-medical labs. Source: © N...

FIGURE 14-5

The Tokyo Subway is one of the world’s busiest commuter transport systems...

FIGURE 14-6

A computer may look like an innocent piece of technology, but it can be a very d...

CHAPTER 16

FIGURE 16-1

Professors and practitioners must work with students to help advance knowledge a...

FIGURE 16-2

We must reverse the socialization of children into violence. Source: © ZouZou/Sh...

FIGURE 16-3

Professionals are needed in homeland security to advance efforts to prevent atta...

List of Tables

CHAPTER 10

TABLE 10-1

Risk assessment matrix

TABLE 10-2

Measures to mitigate attacks

Guide

Cover

Title Page

Copyright

Dedication

Table of Contents

About the Author

Foreword

Preface

Acknowledgments

About the Companion Website

CHAPTER 1 Understanding a Global Priority

Glossary

Index

End User License Agreement

Pages

i

ii

iii

iv

v

vi

vii

viii

ix

x

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

About the Author

David A. McEntire, PhD, is a professor at Utah Valley University and the former dean of the College of Health and Public Service. Prior to these appointments, he was a professor in the Emergency Administration and Planning (EADP) Program in the Department of Public Administration at the University of North Texas.

Dr. McEntire has taught emergency management, homeland security, and national security courses in both undergraduate and graduate programs. His academic interests include emergency management theory, international disasters, community preparedness, response coordination, terrorism, and vulnerability reduction.

Dr. McEntire has received several grants funded by the Natural Hazards Center at the University of Colorado and the National Science Foundation, among others, which allowed him to conduct research on disasters and emergency management in Australia, Costa Rica, the Dominican Republic, Haiti, New Zealand, Peru, California, New York, Texas, and Utah.

Dr. McEntire is the author of Disaster Response and Recovery (Wiley) and Comparative Emergency Management (Federal Emergency Management Agency (FEMA)) and the editor of Disciplines, Disasters and Emergency Management (C.C. Thomas) and The Distributed Functions of Emergency Management and Homeland Security (CRC Press). His research has also been published in Public Administration Review, the Australian Journal of Emergency Management, Disasters, the International Journal of Mass Emergencies and Disasters, the Journal of Emergency Management, International Journal of the Environment and Sustainable Development, Sustainable Communities Review, the International Journal of Emergency Management, the Towson University Journal of International Affairs, the Journal of the American Society of Professional Emergency Planners, and the Journal of International and Public Affairs, among others. His articles in Disaster Prevention and Management received Highly Commended and Outstanding Paper awards.

Dr. McEntire completed an instructor guide for FEMA and is a contributing author to the Handbook of Disaster Research and the Handbook of Disaster Management. He also has a chapter in Emergency Management, a book published by the International City/County Management Association.

Dr. McEntire provided terrorism response training for FEMA in Arkansas and Oklahoma. He has been a contributing author for a study of Texas homeland security preparedness for the Century Foundation and two IQ reports for the International City/County Management Association. In addition, McEntire has presented papers in Hungary, Japan, Mexico, and Norway, and at the National Science Foundation, the National Academy of Sciences, and the Higher Education Conference at FEMA’s Emergency Management Institute in Emmitsburg, Maryland. He is a former member of Congressman Michael C. Burgess’s Homeland Security Advisory Council and of the Fire Protection Publications Advisory Board. He has reviewed books for Delmar Learning and is on the editorial staff for the Journal of Emergency Management.

In a prior position at the University of North Texas, Dr. McEntire served as an undergraduate coordinator, Ph.D. coordinator, assistant chair, associate dean, and director of summer sessions. Prior to his first academic appointment, Dr. McEntire attended the Graduate School of International Studies at the University of Denver. While pursuing his degree, he worked for the International and Emergency Services Departments at the American Red Cross.

Foreword

3rd Edition, Introduction to Homeland Security

Homeland security—both in professional practice and as an academic discipline—continues to mature from its relatively recent roots in the U.S. government restructuring following the attacks in New York, Washington, DC, and Pennsylvania on 9/11. The early focus was unambiguous, with terrorism as the field’s unquestionable raison d’etre. This period is what some have termed “Homeland Security 1.0.”

This priority and attention given to terrorism was blurred with the devastation wrought by Hurricane Katrina in 2005 and the national angst over the impacts of the Global War on Terror. “Homeland Security 2.0” ushered in a nominally more balanced, all-hazards approach to meeting the diverse security and emergency management challenges of the first decade of the century. As fear of another 9/11 magnitude attack waned, the emphasis shifted to high-likelihood, low-consequence events impacting U.S. communities. Planning, preparation, and exercising for diverse natural hazards (e.g., tropical storms, flooding, and earthquakes as well as a growing recognition of cyber threats) took priority as jurisdictions focused on the most probable needs of their communities. Conventional and unconventional military operations abroad also dispersed the threat of Al Qaeda and the Islamic State, and regional terror groups—Boko Haram, Al-Shabab, and Lashkar-e-Tayyiba, among others—appeared to pose limited challenges to the security of the U.S. homeland. Thus, emphasizing terrorism as a principal focus for the U.S. federal government, as well as state, local, tribal, and territorial jurisdictions and among partner nations, seemed less intuitive.

Yet terrorism has not gone away as borne out by recent events. Rather, the threat has diversified, metastasized, and matured, presenting an enduring and complex challenge for security policymakers and practitioners. As an example, Al Qaeda was indeed dispersed but reconstituted as franchise operations throughout North Africa, the Middle East, and Southwest Asia in loosely affiliated forces to be reckoned with, either independently or in loose collaboration with other regional terror groups.

At the time of this writing, homeland security faces perhaps the most demanding set of wicked problems ever. This includes brutal, industrial-age nation-state warfare in Europe with the possibility of global consequences; the potential for Great Power conflict in East Asia; proxy warfare in Yemen, Iraq, and Syria, with intermittent but continuing attacks on U.S. and allied personnel and facilities; mass migration and resultant border immigration crises; slow-onset potential mega-disasters related to climate change impacts; political conflict and uncertainty as the United States approaches another national election; the rapidly expanding use of information technologies that both shape public opinion and enable malign activities by sophisticated groups and nations; and, of course, the evolution of terrorism that takes advantage of the latter.

The most graphic reminder of the ongoing challenges and dynamic nature of terrorism was the horrific events in Israel on October 7, 2023, and the aftermath that will play out over the succeeding months and perhaps beyond. Is the homeland security enterprise up to the task of dealing with each of these vexing issues simultaneously?

The answer to the myriad challenges (as if one were ready at hand!) would seem to rest in our critical analysis of the threat and hazard landscape and the ability to identify, build, and deliver the multifaceted approaches to meet the diverse homeland security requirements in 2024 and 2025 and into future generations. The “how” of homeland security (although the precise method is both uncertain and subject to changes due to the threats we likely will face) must necessarily have its foundation in understanding; understanding that is based on the art and science of scholarly research applied to practice.

We should therefore congratulate and thank Dr. Dave McEntire for approaching “Homeland Security 3.0” with an unparalleled expertise in his clear-eyed exposition of the fundamental issues of homeland security in this third edition. Here, Dr. McEntire has refreshed our understanding of the professional field and academic discipline that may have diverged from the critical—indeed, life-threatening—impact that homeland security must address.

The third edition reintroduces students to essential elements of terrorism and the deadly intent of this form of violence in its modern form. Through an integrated approach to understanding homeland security, the author correctly encourages us to see the threats and hazards described earlier in the context of the larger system of national and global resilience and human security. The third edition is consequently comprehensive and complete and is a timely, single-source volume that provides the necessary vaccination to prevent a future failure of imagination.

 

Steve Recca

11.20.2023

Naval Postgraduate School

Center for Homeland Defense & Security

Monterey, California

Preface

U.S. policy regarding international affairs, terrorism, and disasters has witnessed ongoing tension between the security and emergency management points of view. Since the late 1940s, there has been recurring disagreement about the priority given to conflict disasters versus other types of hazards. Several events elevated the stakes in this debate and created additional urgency to find some sort of consensus about future priorities.

First, the 9/11 attacks and the recent Hamas violence in Israel underscore the fact that the threat of terrorism needs to be taken seriously by disaster scholars and emergency managers. No one should pretend that the world is the way it once used to be.

Second, Hurricane Katrina and a plethora of other disasters remind homeland security officials that they must not disregard human vulnerability to natural hazards. The frequency of natural, technological, and anthropogenic disasters is simply too great to ignore. In addition, the consequences of compound interactions are getting worse over time.

With these observations in mind, it is the opinion of this author that both homeland security and emergency management functions need to be addressed concomitantly in the future. Terrorist attacks are increasing in frequency, and their negative outcomes are widespread. While the possibility of terrorism involving weapons of mass destruction or cyberterrorism is uncertain, the impact of such attacks would indeed be overwhelming. More resources will be needed to address every type of threat.

However, government attention and resource distribution should also take into account the broad aspects of homeland security. Terrorism has been given the lion’s share of public support in recent years, but this attention should not be allowed to overshadow the essential functions and contributions of emergency management.

Unfortunately, policy makers unintentionally created a substantial divide between the homeland security and disaster communities. Politicians may have overreacted to 9/11, and their decisions initially diminished the existing emergency management system of the 1990s. This has caused some ill feelings among emergency managers toward the military and the law enforcement communities, which is not a good situation when one considers the fact that terrorists have vowed to kill Americans everywhere (including at home).

Added to this ongoing discussion is the fact that additional risks have become more prevalent in recent years. This includes a rise in various types of crime, the occurrence of riots, the global COVID-19 pandemic, and concerns about climate change. Thus, those involved in homeland security and emergency management must also work collaboratively with other public safety, public health, and environmental agencies and officials to address the challenges of our day.

This book, Introduction to Homeland Security: Terrorism Prevention, Public Safety and Emergency Management, Third Edition, aims to provide a foundation that could assist in spanning the chasm between the disaster and terrorism communities. Its focus on terrorism may help to educate those who do not yet understand the need to prepare for this expanding threat. Its concentration on emergency management will remind homeland security officials that reinventing of the wheel is not only unnecessary but problematic. In addition, the book educates homeland security and emergency management professionals about other important considerations pertaining to unabated crime, social discord, physical well-being, and our precious natural resources.

Of course, taking this approach could result in increased antagonism between the different parties. It is also possible that the author has not adequately portrayed the specific details pertinent to all of the actors involved in the broad and interdisciplinary array of homeland security, emergency management, public safety, public health, and environmental protection activities. Nevertheless, it is the author’s hope that this work will educate those working in each area and help promote a synergy of effort.

Chapter 1, “Understanding a Global Priority: Diverse Threats, Terrorism, Homeland Security, and Emergency Management,” examines the significant impacts of 9/11, the Hamas attacks in Israel, and other events in world history. It also defines homeland security and supplements homeland security with an emergency management perspective, thereby offering a broader view of how to deal with terrorist attacks.

Chapter 2, “Identifying Terrorism: Ideologically Motivated Acts of Violence and Their Relation to Disasters,” identifies the numerous definitions and perspectives of terrorism, comparing how these are both alike and dissimilar. This chapter also looks at the connections between terrorism and other types of disasters.

Chapter 3, “Recognizing the Causes of Terrorism: Differing Perspectives and the Role of Ideology,” explores what motivates people to participate in terrorism, paying special attention to how historical conflicts, mistakes in foreign policy, and extreme levels of poverty may impel some to engage in terrorist attacks.

Chapter 4, “Comprehending Terrorists and Their Behavior: Who They Are and What They Do,” assesses the nature of individual terrorists and those associated with groups and states and identifies how they finance operations, communicate with secret codes, and carry out attacks.

Chapter 5, “Uncovering the Dynamic Nature of Terrorism: History of Violence and Change over Time,” explores why terrorism initially emerged, how it evolved in other nations, and the ways it has manifested in the United States.

Chapter 6, “Evaluating a Major Dilemma: Terrorism, the Media, and Censorship,” looks at the difficult relationship between terrorism and the media, how to predict how reporters view terrorism, and the drawbacks and limitations of censorship.

In Chapter 7, “Contemplating a Quandary: Terrorism, Security, and Liberty,” you learn why, as a participant in homeland security, it is imperative that you assess the tradeoffs between security and rights and why terrorism exploits the tension between them.

Chapter 8, “Preventing Terrorist Attacks: Root Causes, Law, Intelligence, and Counterterrorism,” addresses the root causes of terrorism and explores primary ways of preventing attacks, like promoting laws that prohibit terrorism and punish those who support it, protecting all points of entry into the United States, and relying on human and other sources of intelligence to apprehend terrorists before they strike.

In Chapter 9, “Securing the Nation: Border Control and Sector Safety,” the permeability of the U.S. border is mentioned along with measures to prevent the infiltration of terrorists onto American soil. It also discusses the vulnerability of various economic sectors and describes ways to secure railways, air transportation, sea ports, and chemical facilities.

Chapter 10, “Protecting Against Potential Attacks: Threat Assessment, Mitigation, and Other Measures,” looks at the benefits of mitigation practices, such as working with others to assess threats posed to critical infrastructure, key assets, and soft targets, as well as differentiating between structural and nonstructural mitigation methods.

In Chapter 11, “Preparing for the Unthinkable: Efforts for Readiness,” it is revealed that preparing for terrorism is one of the central responsibilities of homeland security. To help your community prepare for possible terrorist attacks, you will need to be familiar with the executive orders and legislation issued by the president and congress and set the foundation for preparedness by creating an advisory council, passing ordinances, acquiring monetary resources, and establishing an EOC.

Chapter 12, “Responding to Attacks: Important Functions and Coordination Mechanisms,” examines effective ways to react to terrorist attacks, including the numerous functions involved, such as investigation, the protection of first responders, and the treatment of the victims of terrorist attacks.

Chapter 13, “Recovering from Impacts: Short- and Long-term Measures,” addresses the variety of recovery measures that need to be performed after a terrorist attack takes place, including declaring a disaster or state of emergency, addressing mass fatality issues, disposing debris, and providing emotional support for those who have been emotionally impacted by the event.

Chapter 14, “Assessing Significant Threats: WMD and Cyberterorrism,” assesses the probability that terrorists will launch more unique and devastating attacks. It identifies the threat of radiological, nuclear, biological, and chemical weapons along with numerous recommendations to counter such assaults. The chapter also describes the risk of cyberterrorism and mentions the measures being taken to increase preparedness in this area.

Chapter 15, “Evaluating Other Pressing Problems: Criminal Activity, Social Disturbances, Pandemics, and Climate Change,” explores additional risks that must be taken into consideration today by both homeland security and emergency management professionals. These risks include a variety of problems relating to organized crime, illegal drugs, human trafficking, protests, riots, COVID-19, and global warming.

In Chapter 16, “Looking Toward the Future: Challenges and Opportunities,” the need for accountability in homeland security is identified. A discussion about policy occurs, and recommendations are provided for both researchers and practitioners.

Pre-Reading Learning Aids

Each chapter of Introduction to Homeland Security: Terrorism Prevention, Public Safety and Emergency Management, Third Edition features a number of learning and study aids, described in the following sections, to activate students’ prior knowledge of the topics and orient them to the material.

Do You Already Know?

This bulleted list focuses on the subject matter that will be taught. It tells students what they will be learning in this chapter and why it is significant for their careers. It also helps students understand why the chapter is important and how it relates to other chapters in the text.

The online assessment tool in introduces chapter material, but also helps students anticipate the chapter’s learning outcomes. By focusing students’ attention on what they do not know, the self-check test provides students with a benchmark against which they can measure their own progress. The pre-test is available online at www.wiley.com/go/mcentire/homelandsecurity3e.

What You Will Learn and What You Will Be Able to Do

This bulleted list emphasizes capabilities and skills that students will learn as a result of reading the chapter and notes the sections in which they will be found. It prepares students to synthesize and evaluate the chapter material and relate it to the real world.

Within-Text Learning Aids

The following learning aids are designed to encourage analysis and synthesis of the material, support the learning process, and ensure success during the evaluation phase.

Introduction

This section orients the student by introducing the chapter and explaining its practical value and relevance to the book as a whole. Short summaries of chapter sections preview the topics to follow.

In the Real World

These boxes tie section content to real-world organizations, scenarios, and applications. Engage stories of professionals and institutions—challenges they faced, successes they had, and their ultimate outcome.

Summary

Each chapter concludes with a summary paragraph that reviews the major concepts in the chapter and links back to the “Do You Already Know” list.

Key Terms and Glossary

To help students develop a professional vocabulary, key terms are bolded when they first appear in the chapter and are also shown in the margin of the page with their definitions. A complete list of key terms with brief definitions appears at the end of each chapter and again in a glossary at the end of the book. Knowledge of key terms is assessed by all assessment tools (see next).

Evaluation and Assessment Tools

The evaluation phase consists of a variety of within-chapter and end-of-chapter assessment tools that test how well students have learned the material and their ability to apply it in the real world. These tools also encourage students to extend their learning into different scenarios and higher levels of understanding and thinking. The following assessment tools appear in every chapter.

Self-Check

Related to the “Do You Already Know” bullets and found at the end of each section, this battery of short-answer questions emphasizes student understanding of concepts and mastery of section content. Though the questions may be either discussed in class or studied by students outside of class, students should not go on before they can answer all questions correctly.

Understand: What Have You Learned?

This online post-test should be taken after students have completed the chapter. It includes all of the questions in the pre-test so that students can see how their learning has progressed and improved. The post-test is available online at www.wiley.com/go/mcentire/homelandsecurity3e.

Applying This Chapter

These questions drive home key ideas by asking students to synthesize and apply chapter concepts to new, real-life situations and scenarios.

Be a Homeland Security Professional

Found at the end of each chapter, “Be a …” questions are designed to extend students’ thinking and are thus ideal for discussion or writing assignments. Using an open-ended format and sometimes based on web sources, they encourage students to draw conclusions using chapter materials applied to real-world situations, which foster both mastery and independent learning.

Instructor and Student Package

Introduction to Homeland Security: Terrorism Prevention, Public Safety, and Emergency Management, Third Edition, is available with the following teaching and learning supplements. All supplements are available online at the text’s Book Companion Website, located at www.wiley.com/go/mcentire/homelandsecurity3e.

Instructor’s Resource Guide

The Instructor’s Resource Guide provides the following aids and supplements for teaching a Homeland Security course:

Text summary aids: For each chapter, these include a chapter summary, learning objectives, definitions of key terms, and answers to in-text question sets.

Teaching suggestions: For each chapter, these include at least three suggestions for learning activities (such as ideas for speakers to invite, videos to show, and other projects) and suggestions for additional resources.

PowerPoints: Key information is summarized in 10–15 PowerPoints per chapter. Instructors may use these in class or choose to share them with students for class presentations or to provide additional study support.

Test Bank: The test bank features one test per chapter, as well as a midterm and two finals–one cumulative and one noncumulative. Each includes true/false, multiple-choice, and open-ended questions. Answers and page references are provided for the true/false and multiple-choice questions, while page references are given for the open-ended questions. Tests are available in Microsoft Word and computerized formats.

Acknowledgments

I express appreciation to those individuals who have made substantial contributions to Introduction to Homeland Security. I am indebted first and foremost to Laura Town, Brian Baker, Summer Scholl, and Judy Howarth (editors at Wiley) for their critical assessment of the text and their useful recommendations for improvement. I am also grateful to the additional members of the Wiley staff—Stefanie Volk, Katrina Maceda, J. Hari Priya, and Rajeev Kumar—who helped format the text and find pictures for the entire document. Others including Kailey Birchall, Ashley Layton, Tres Layton, and Madison Rojas provided valuable assistance in the preparation of this manuscript.

I am likewise appreciative of several reviewers for their beneficial suggestions on this version and earlier drafts of the manuscript. This includes:

Robin Ebemyer, Utah Valley University

Vincent J. Doherty, Naval Postgraduate School

John J. Kiefer, The University of New Orleans

Scott D. Lassa, Milwaukee Area Technical College

David W. Lewis, University of Maryland

Steve Recca, Naval Postgraduate School

Ronald P. Timmons, University of North Texas

Brandon Amacher, Utah Valley University

Ryan Vogel, Utah Valley University

While I am solely responsible for the content of this book, I am thankful for all those who have shared valuable insights and unique perspectives. Their areas of expertise and years of experience have undoubtedly assisted me during the publication process.

Finally, I would be remiss if I did not recognize the many scholars and practitioners whom I have come across during my involvement in this field. Your knowledge and professionalism have not only helped to educate me about terrorism and disasters; you have also underscored the significant need for homeland security and emergency management functions in our society. More importantly, I am cognizant that your persistent efforts will enable our nation to reduce vulnerability and increase our ability to react effectively when exigency exists. For this I am truly grateful.

David A. McEntire, PhD

About the Companion Website

This book is accompanied by a companion website: www.wiley.com/go/mcentire/homelandsecurity3e

The instructor website includes:

Instructor’s resource material

Powerpoint slides

Pre-test

Post-test

Test bank

Image gallery

The student website includes:

Pre-test

Post-test

Image gallery

CHAPTER 1Understanding a Global Priority Diverse Threats, Terrorism, Homeland Security, and Emergency Management

DO YOU ALREADY KNOW?

Why we should be concerned about threats to our security

If terrorist attacks are becoming more frequent

Why 9/11 changed the world

How to define homeland security

Why many professions, including emergency management, can help us deal more effectively with terrorist attacks

For additional questions to assess your current knowledge of terrorism and homeland security, go to www.wiley.com/go/mcentire/homelandsecurity3e

WHAT YOU WILL LEARN

WHAT YOU WILL BE ABLE TO DO

1.1

Threats facing the United States

1.2 The probability of additional attacks in the future

1.3 The far-reaching effects of 9/11

1.4 Definitions of homeland security

1.5 The breadth of organizations involved in homeland security

List terrorist activity in recent years

Evaluate the consequences of terrorism

Convey how the world changed after the 9/11 hijackings

Describe the mission of the homeland security profession

Assess how various disciplines can help practitioners deal with terrorism

Introduction

Welcome to the important discipline and profession of homeland security! If you are interested in this important field of study and desire to work in this area of practice, it is imperative that you comprehend the variety of threats facing the United States and what can be done to deal with them in an effective manner. This book has the purpose of helping you achieve these goals by exploring the fundamental concepts and principles of the homeland security profession. While reading this introductory chapter, you will gain a basic understanding of numerous security concerns in general and the perplexing problem of terrorism in particular. You will learn how the terrorist attacks on September 11, 2001, changed the world and initiated a new era in global history. You will acquire knowledge about the mission and scope of homeland security along with the challenges it currently faces. The importance of approaching homeland security from a holistic perspective is then mentioned, enabling you to recognize why many professions—including emergency management—must form an integral part of efforts to deal with terrorist attacks and other threats.

1.1 Diverse Threats and Terrorism are the New Normal

Anytime you watch the news, search the Internet, or scroll through social media, you will likely see several stories depicting threats to the security, safety, and well-being of people, organizations, and nations around the world. For instance:

Mass shootings are all too frequently witnessed at school, in the workplace, or any location where many people congregate. Individuals and families are worried about their safety in the mall, at church, or while attending a sporting event. This concern appears to be warranted due to the fact that there were 689 mass shootings in 2021, 645 in 2022, and over 500 at the time of this writing in 2023 (Nazzaro 2023).

The commission of crimes—including physical assaults and property theft—rose dramatically from 2020 to 2022 (Grawert and Kim 2023). People feel unsafe at home or in the streets, and businesses are worried about their profitability and future viability under these disturbing conditions.

The manufacturing and distribution of illegal drugs in the United States have risen to epic proportions. Government reports reveal that more than 100,000 persons die annually from illicit substances like fentanyl (National Institute on Drug Abuse 2023).

Human trafficking is enslaving thousands of people in the United States and elsewhere. Exploited sex workers and other forced laborers suffer as a result of this, the most significant human rights violation of our time. For instance, since the inception of the National Human Trafficking Hotline in 2007, more than 82,000 cases have been reported in the United States, which have involved over 164,000 victims (see https://humantraffickinghotline.org/en/statistics).

Social demonstrations have become increasingly common in recent years, and this has caused Verisk Maplecroft (a strategic consulting firm) to place the United States within the high-risk category for social unrest (Campbell and Hribernik 2020). Some of the recent protests over the death of George Floyd and the 2020 election results exploded into riot behavior, which resulted in the loss of life, hundreds of injuries, and the destruction of property valued at billions of dollars.

Public health emergencies have been seen repeatedly over the past few decades. Our recent experience with the Covid-19 pandemic illustrates the significant impact contagious diseases can have on lives and livelihoods. There is evidence that our public health institutions are inadequately prepared for deadly outbreaks that may occur in the future (Baker and Ivory 2021).

Global warming and climate change are frequently discussed by politicians and environmental activists. Concerns about the possibility of further environmental disasters appear to be warranted and suggest a future of additional and aggravated risks (see https://www.usgs.gov/faqs/how-can-climate-change-affect.natural-disasters).

As can be seen, each of these threats may result in injuries, death, and/or physical, economic, emotional, and other types of harm. While these problems are typically addressed by law enforcement personnel, public health organizations, and environmental agencies, they have not always been the focus of a holistic, concerted, or systematic effort. This is changing, however, because local, state, and federal governments recognize that more must be done to prevent such occurrences and react to them in a more effective manner.

Source: TapTheForwardAssist/Wikimedia Commons

In The Real World

Disasters on the Rise?

According to the National Oceanic and Atmospheric Administration, the United States experienced 18 weather and climate-related disasters in 2022, which caused more than $1 billion in damage each (Smith 2023). This included one winter storm, one wildfire, one heatwave/drought, one flood, two tornadoes, three tropical cyclones, and nine severe weather/hail events. Taken together, these disasters killed 474 people and totaled over $165 billion in losses in a single year. Evidence seems to suggest that the risk of disasters is increasing at alarming rates. Disasters are just one of many different threats facing the United States today and into the future.

Although there are grave concerns about criminal activity, social disturbances, public health emergencies, and climate-related disasters, another threat has garnered significant attention from policy makers than those mentioned earlier. This issue has transformed the nature of government in the United States over the past two decades. That concern is known as terrorism.

In simple terms, terrorism is the use or threat of violence to support ideological purposes. Individuals, groups, and even nation-states participate in terrorism to achieve social, political, economic, and other objectives. Recent events might cause you to think that these terrorist attacks are more frequent and deadly than in prior decades. Your instinct is certainly justified according to the London Institute for Economics and Peace (Cassidy 2015). Although there are a whole host of problems that must be addressed by politicians and public safety personnel, terrorism appears to be ever present and its impacts cannot be denied. Attacks are not only more common than in the past—they are also more consequential. Five cases illustrate the “new normal” we are facing today.

1.1.1 Boston Marathon Bombing

On April 15, 2013, Tamerlan and Dzhokhar Tsarnaev—Chechen brothers who were residing in the United States—detonated two homemade pressure cooker bombs at the Boston Marathon in Massachusetts. The bombs exploded in the late afternoon about 200 yards apart near the finish line of the race on Boylston Street. Three people died from the blasts, and over 260 others were injured. The marathon was suspended while athletes and bystanders were directed to safety and treated by law enforcement and emergency medical personnel. A massive manhunt was soon underway to find those involved in the attack. One of the brothers was killed during a confrontation with police. The other was apprehended and is now incarcerated in a maximum-security prison in Florence, Colorado.

1.1.2 San Bernardino Regional Center Shooting

On December 2, 2015, a mass shooting took place in San Bernardino, California, at the Inland Regional Center. The perpetrators were Syed Rizwan Farook and his wife, Tashfeen Malik. This married couple killed 14 people and injured 22 when they opened fire at a holiday party being held by the county’s Department of Public Health. While this was clearly devastating, the incident could have been more consequential. Three pipe bombs found at the scene failed to explode. The terrorists were killed in a shoot-out with police a short time later.

1.1.3 Orlando Nightclub Shooting

On June 12, 2016, a security guard named Omar Mateen instigated one of the most despicable acts of violence in U.S. history (see Figure 1-1). With the use of a pistol and a semiautomatic rifle, he killed 49 people and wounded 53 others at the Pulse—a gay nightclub in Orlando, Florida. After a 3-h standoff, the terrorist was shot and killed by the officers from the Orlando Police Department. The carnage was the result of one of the worst mass shootings in the United States to date.

1.1.4 Bombings in New York and New Jersey

From September 17 to September 19, 2016, several bombs were detonated and found unexploded in New York and New Jersey. One pipe bomb was placed in a trash can and exploded during a 5K race in the community of Seaside Park. No one was injured in the incident, but additional bombs were discovered in the area and disposed of. That same day, another bomb exploded in a dumpster in New York City near a construction site. Thirty-one people were injured as a result of this pressure cooker bomb that was filled with metal bearings. Another bomb was identified nearby and reported to the authorities. The following day, additional bombs were discovered in Elizabeth, New Jersey. Ahmed Khan Rahimi, an Islamic extremist, was captured after fingerprints, a mobile phone, DNA evidence, and purchase receipts revealed who the culprit was.

FIGURE 1-1 Mass shootings like the Orlando nightclub shooting reveal the significant impact a lone terrorist can have on innocent citizens. Source: Orlando Police Department/Wikimedia Commans/Public Domain.

1.1.5 Hudson River Bike Path Attack

On October 31, 2017, a man named Sayfullo Habibullaevic Saipov used a rented pickup truck as a weapon on a bike path in a park near the Hudson River. Over a 1-mile stretch, Saipov ran into and over cyclists and joggers, killing 8 people and injuring 11 others. He eventually crashed the vehicle into a bus and then engaged in a shoot-out with police. Saipov was shot and arrested. During the investigation, it was determined that Saipov launched the attack in support of the Islamic State of Iraq and the Levant (ISIL). This terrorist was convicted of murder and is incarcerated for life.

1.1.6 Other Notable Attacks

The aforementioned attacks are not isolated. The list of such events has increased over the past 25 years. For instance, Hesham Mohamed Hadayet opened fire at the El Al ticket counter at the Los Angeles Airport. His attack killed two people and injured four others on July 4, 2002. On March 3, 2006, Mohammed Reza Taheri-azar intentionally drove a vehicle into a crowd at the University of North Carolina at Chapel Hill. He injured nine people. In November 2009, Nidal Malik Hasan murdered 14 people at the Fort Hood military base in Texas.

On February 18, 2010, a disgruntled man named Joseph Stack flew his private plane into an Internal Revenue Service building in Austin, Texas. In the small town of Moore, Oklahoma, Alton Nolen beheaded a woman at a Vaughan Foods plant on September 24, 2014. Robert Lewis Dear killed three people at a Planned Parenthood clinic in Colorado Springs, Colorado, on November 27, 2015. Micah Xavier Johnson killed five police officers on July 7, 2016. This disturbing sniper attack took place in Dallas, Texas, at a Black Lives Matter protest. It wounded nine others, including two civilians.

A Short List of Attacks

The list of terrorist attacks seems to be never ending. Fifteen incidents illustrate the prevalence of attacks along with a diversity of targets and divergent methods:

Bruce Edwards Ivins mailed several letters containing anthrax spores to news outlets and two Democratic senators. Five people were killed, and seventeen others were injured from September 18 to October 9, 2001.

John Allen Williams and Lee Boyd Malvo (the “Beltway Snipers”) murdered 10 people and injured 3 others in Washington, D.C., Maryland, and Virginia over a three-week period in October 2002.

John Patrick Bedell injured two police officers at the entrance of the Pentagon on March 4, 2010.

Wade Michael Page gunned down six people at a Sikh Temple in Wisconsin on August 5, 2012.

Ali Muhammad Brown killed three civilians in Seattle, Washington, during a period from April 27, 2014, to June 1, 2014.

Zale Thompson attacked two police officers with a hatchet in Queens, New York, on October 23, 2014.

Ismaaiyl Brinsley killed two police officers in an ambush in Brooklyn, New York, on December 20, 2014.

Elton Simpson and Nadir Soofi opened fire at a conference that was hosting an exhibition of a cartoon of Prophet Muhammad in Garland, Texas, on May 3, 2015.

Muhammad Youssef Abdulazeez shot and killed four marines and a sailor at a military base in Chattanooga, Tennessee, on July 16, 2015.

Faisal Mohammad attacked students with a knife at a university in Merced, California, on November 4, 2015.

Samuel Woodward, a member of a far-right/neo-Nazi group named the Atomwaffen Division, stabbed a gay Jewish University of Pennsylvania student on January 2, 2018.

John T. Earnest, a 19-year-old young man who was sympathetic to alt-right and anti-Semitic thought, set the Dar-ul-Arqam Mosque on fire in Escondido, California, on March 24, 2019.

Mohammed Saeed Alshamrani, a Saudi Air Force Second Lieutenant who was being trained in the United States, shot and killed three U.S. Navy sailors and injured eight others in a classroom at the Naval Air Station in Pensacola, Florida, on December 6, 2019.

Anderson Lee Aldrich, a 22-year-old man with anti-LGBT sentiment, killed five people and injured twenty-five others in a shooting at the Club Q bar in Colorado Springs, Colorado, on November 19, 2022.

Audrey Hale, a 28-year old transgender man, used a firearm to kill three adults and three children at the Covenant Christian School in Nashville, Tennessee, on March 27, 2023.

The terrorist attacks mentioned earlier were not the first to occur in the United States or around the world. Nor will they be the last ones to take place in this country or elsewhere. There have been many unsuccessful attacks in New York as well as in Arkansas, Dallas, Florida, Illinois, Michigan, Missouri, New Jersey, Washington, D.C., and so on. This is to say nothing about terrorist attacks initiated in other nations, which are even more prevalent and deadly.

One of the most consequential bouts of terrorism occurred on November 13, 2015, when terrorists carried out a number of coordinated attacks in France and Belgium. Six locations were targeted in the assaults, ranging from the Stade de France stadium to popular bars in and around Paris. The bloodshed began when suicide bombers wearing explosive devices detonated them near a major soccer match being played between France and Germany. A few minutes later, gunmen began unleashing heavy gunfire at several restaurants in Paris. The most fatal of the attacks occurred in the Bataclan theater. Three perpetrators entered the concert hall and fired assault rifles into the audience. Some members of the crowd were able to escape through exits, but 89 people lost their lives and many more were wounded. By the time each of the individual but coordinated attacks concluded, 130 people were killed and 368 were injured.