92,99 €
Explore the growing concerns about security with this vital book
Homeland Security has never been a more important part of the American social and political fabric. Risk assessment, attack prediction and prevention, preparedness measures, response to terrorist activity, and natural disaster management all fall under the purview of homeland security. It is a key focus of the US security state, which has expanded massively in recent decades.
Introduction to Homeland Security provides an overview of this subject for professors, students, and practitioners in the field. Drawing upon a rich foundation of scholarship and academic literature, it focuses principally on terrorism prevention and protection, and offers new content related to novel threats and security concerns. Its practitioner-centered approach and attention to both governmental and non-governmental stakeholders make it an indispensable introduction to the subject.
Readers will also find:
Introduction to Homeland Security is ideal for professors and students in homeland security and emergency management programs, as well as practitioners involved in this important profession.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 933
Veröffentlichungsjahr: 2024
Third Edition
DAVID A. MCENTIRE, PHD
Utah Valley University
This edition first published 2024.
© 2024 by John Wiley & Sons, Inc.
Edition HistoryJohn Wiley & Sons, Inc. (1e, 2008) (2e, 2019)
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The right of David A. McEntire to be identified as the author of this work has been asserted in accordance with law.
Registered Office(s)John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
Editorial Office111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
In view of new threats, ongoing research, changes in governmental regulations, and the constant flow of information relating to terrorism, public safety, and homeland security, the reader is urged to carefully review and evaluate the material in this book and consider what practices might be best for the reader’s particular situation. While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Hardback ISBN: 9781394234325
Library of Congress Cataloging-in-Publication Data
Names: McEntire, David A., author.
Title: Introduction to homeland security : terrorism prevention, public safety and emergency management / David A. McEntire, PHD, Utah Valley University.
Description: Third edition. | Hoboken, NJ : John Wiley & Sons, 2024. | Includes bibliographical references and index. | Summary: “United States policy regarding international affairs, terrorism, and disasters has witnessed an ongoing tension between the security and emergency management points of view. Since the late 1940s, there has been recurring disagreement about the priority given to conflict events versus other types of hazards. Several events elevated the stakes in this debate and created additional urgency to find some sort of consensus about future priorities”—Provided by publisher.
Identifiers: LCCN 2024004838 (print) | LCCN 2024004839 (ebook) | ISBN 9781394234325 (hardback) | ISBN 9781394234332 (epub) | ISBN 9781394234349 (adobe pdf)
Subjects: LCSH: Terrorism—United States—Prevention. | Terrorism—Government policy—United States. | Emergency management—United States. | Computer security—Government policy—United States. | United States—Military policy.
Classification: LCC HV6432.M3854 2024 (print) | LCC HV6432 (ebook) | DDC 363.340973—dc23/eng/20240131
LC record available at https://lccn.loc.gov/2024004838
LC ebook record available at https://lccn.loc.gov/2024004839
For Mason, Madison, Kailey, and Ashleyand the future of children and grandchildren everywhere
Cover
Title Page
Copyright
Dedication
Table of Contents
About the Author
Foreword
Preface
Acknowledgments
About the Companion Website
CHAPTER 1 Understanding a Global Priority
Introduction
1.1 Diverse Threats and Terrorism are the New Normal
1.2 A Growing Risk
1.3 9/11: A Wake-Up Call
1.4 The Nature of Homeland Security
1.5 Disciplines Involved in Homeland Security and the Emergency Management Profession
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 2 Identifying Terrorism
Introduction
2.1 Defining Terrorism
2.2 Common Characteristics of Terrorism
2.3 Types of Terrorism
2.4 Relation of Terrorism to Other Disasters
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 3 Recognizing the Causes of Terrorism
Introduction
3.1 Frequently Mentioned Causes of Terrorism
3.2 Political Causes
3.3 Cultural and Religious Causes
3.4 Ideology
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 4 Comprehending Terrorists and their Behavior
Introduction
4.1 Terrorists and Terrorist Organizations
4.2 Personal Characteristics
4.3 The Behavior and Tactics of Terrorists
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 5 Uncovering the Dynamic Nature of Terrorism
Introduction
5.1 The Appearance of Terrorism
5.2 The Evolution of Terrorism Abroad
5.3 Terrorism and The United States
5.4 Terrorism Today
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 6 Evaluating a Major Dilemma
Introduction
6.1 Changes in The Media Over Time
6.2 Terrorists and The Media
6.3 The Media and Terrorism
6.4 Government and The Media
6.5 Censorship and Self-Censorship
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 7 Contemplating a Quandary
Introduction
7.1 War, Terrorism, and Law
7.2 Security and Liberty
7.3 Cases and Considerations
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 8 Preventing Terrorist Attacks
Introduction
8.1 Addressing Root Causes
8.2 Policy and Legislation
8.3 Intelligence
8.4 Counterterrorism
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 9 Securing the Nation
Introduction
9.1 Border Control
9.2 Protecting Air Transportation
9.3 Rail Transportation Security
9.4 Protection of Sea Ports and Maritime Transportation
9.5 Protection of Petrochemical Facilities
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 10 Protecting Against Potential Attacks
Introduction
10.1 Threat Assessment
10.2 Structural and Nonstructural Mitigation
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 11 Preparing for the Unthinkable
Introduction
11.1 The Importance and Nature of Preparedness
11.2 Foundations of Local Preparedness
11.3 Planning
11.4 Other Measures
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 12 Responding to Attacks
Introduction
12.1 Investigation and Apprehension
12.2 Other Crucial Functions
12.3 Coordination Mechanisms
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 13 Recovering From Impacts
Introduction
13.1 Initial Recovery Steps
13.2 Key Recovery Functions
13.3 The Importance of Disaster Assistance
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 14 Assessing Significant Threats
Introduction
14.1 The Future of Terrorism and WMD
14.2 Radiological Weapons
14.3 Nuclear Weapons
14.4 Biological Weapons
14.5 Chemical Weapons
14.6 Cyberterrorism
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 15 Evaluating Other Pressing Problems
Introduction
15.1 Criminal Activity
15.2 Social Disturbances
15.3 Epidemics and Pandemics
15.4 Global Warming and Climate Change
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
CHAPTER 16 Looking Toward the Future
Introduction
16.1 The Lessons of This Book
16.2 Accountability in Homeland Security
16.3 Clarification of Homeland Security Policy
16.4 Research Needs and Recommendations for the Future
Summary
Assess Your Understanding
Summary Questions
Applying This Chapter
Be a Homeland Security Professional
Key Terms
References
Glossary
Index
End User License Agreement
CHAPTER 1
FIGURE 1-1
Mass shootings like the Orlando nightclub shooting reveal the significant impact...
FIGURE 1-2
The news is dominated by stories about terrorism and terrorist attacks. Source: ...
FIGURE 1-3
Terrorists used passenger jets to attack the United States on September 11, 2001...
FIGURE 1-4
This shield illustrates that the Federal Emergency Management Agency is an organ...
FIGURE 1-5
The Homeland Security Advisory System did not warn citizens about what to do if ...
CHAPTER 2
FIGURE 2-1
Terrorists often launch attacks in visible locations to achieve maximum visibili...
FIGURE 2-2
Car bombings, such as this one in 2017 in the Ukraine, are examples of random te...
FIGURE 2-3
9/11 has features of both conflict and consensus disasters. It was initiated by ...
CHAPTER 3
FIGURE 3-1
Many Arabs oppose the establishment of Israel in the Middle East. Source: © Shut...
FIGURE 3-2
Without sufficient feedback and adaptation, a political system may be affected b...
FIGURE 3-3
Timothy McVeigh was influenced by
The Turner Diaries
, and this led him to bomb t...
CHAPTER 4
FIGURE 4-1
Some individuals, like Eric Rudolph pictured here, use terrorist tactics to achi...
FIGURE 4-2
Many, but not all, terrorists are young. During a march in Pakistan on October 5...
FIGURE 4-3
Terrorists spend a lot of time planning attacks, as was the case in the twin Afr...
CHAPTER 5
FIGURE 5-1
Many leaders in Latin America have employed terrorist tactics in the name of com...
FIGURE 5-2
Coalition forces attacking ISIS—one of the most brutal terrorist organiza...
FIGURE 5-3
The United States has had to deal with terrorist organizations, like the Ku Klux...
CHAPTER 6
FIGURE 6-1
News can be quickly broadcast around the world with modern technology. Source: G...
FIGURE 6-2
The media was used extensively by terrorists in the 1972 Olympics. Source: © Pop...
FIGURE 6-3
Aerial view of Branch Davidian compound near Waco, Texas, in flames on April 19,...
FIGURE 6-4
Journalists are often killed or held hostage by terrorist organizations. Source:...
CHAPTER 7
FIGURE 7-1
The U.S. Constitution promotes both liberty and security concerns. Source: © Nat...
FIGURE 7-2
Ben Franklin declared that those who give up liberty for security deserve neithe...
FIGURE 7-3
During World War II, over 100,000 people of Japanese descent were relocated to d...
CHAPTER 8
FIGURE 8-1
The Seal of the Department of Homeland Security (DHS) reflects its mission. The ...
FIGURE 8-2
Thousands of employees help to collect, interpret, and disseminate intelligence ...
FIGURE 8-3
The role of counterterrorism centers is to thwart attacks before they happen. So...
FIGURE 8-4
Russian Special Forces were able to kill terrorists at a Russian theater. Unfort...
FIGURE 8-5
Counterterrorism organizations like Grenzschutzgruppe 9, the tactical unit of th...
CHAPTER 9
FIGURE 9-1
There are many government employees who work to secure U.S. borders. Source: © U...
FIGURE 9-2
TSA agents have the goal of preventing terrorist attacks against aircraft. Sourc...
FIGURE 9-3
Trains may be the target of terrorism due to the confinement of a large number o...
FIGURE 9-4
Subways are vulnerable to attacks because they are accessible to terrorists and ...
FIGURE 9-5
The Coast Guard has specially trained teams to deter attacks that could create s...
FIGURE 9-6
Numerous efforts are being undertaken to prevent terrorist attacks against chemi...
CHAPTER 10
FIGURE 10-1
Bombings are the most common threats from terrorists, but other attacks are poss...
FIGURE 10-2
Chemical attacks are 1 of 15 anticipated attacks against the United States. Sour...
FIGURE 10-3
Bollards like these can prevent vehicle-delivered bombs from reaching their inte...
CHAPTER 11
FIGURE 11-1
Congressional officials pass laws to help the nation prepare for terrorist attac...
FIGURE 11-2
The National Response Framework is a plan that describes the principles, roles, ...
FIGURE 11-3
EOCs are equipped locations to help you manage response and recovery operations....
FIGURE 11-4
Training is a great way to educate your public servants or first responders abou...
FIGURE 11-5
The Red Cross can help you educate your community about terrorist attacks and ot...
CHAPTER 12
FIGURE 12-1
The FBI is one of many agencies that attempt to find terrorists, prevent attacks...
FIGURE 12-2
Numerous law enforcement officials will confront terrorists and initiate an inve...
FIGURE 12-3
The scene of a terrorist attack can be extremely dangerous. Source: US Depart...
FIGURE 12-4
An important priority after a terrorist attack is emergency medical care. Sou...
FIGURE 12-5
Decontamination is vital to prevent the transmission of dangerous chemicals or h...
FIGURE 12-6
Sharing information with the public via the media can help your community respon...
FIGURE 12-7
Incident Command Vehicles like this one may facilitate coordination at the scene...
CHAPTER 13
FIGURE 13-1
Political leaders are often present when a disaster is declared or to remember t...
FIGURE 13-2
Debris from 9/11: Debris is an important, but often neglected, function that mus...
FIGURE 13-3
People will donate goods and supplies to the Red Cross and other organizations f...
FIGURE 13-4
Victims of large terrorist attacks may be able to seek assistance at a FEMA Disa...
CHAPTER 14
FIGURE 14-1
The Ayatollah Khamenei is an example of an Iranian leader who has espoused revol...
FIGURE 14-2
Civil Support Teams can help local jurisdictions deal with attacks involving we...
FIGURE 14-3
The atomic bomb in Japan was devastating. Today’s nuclear weapons are far...
FIGURE 14-4
Deadly diseases can be acquired by terrorists from bio-medical labs. Source: © N...
FIGURE 14-5
The Tokyo Subway is one of the world’s busiest commuter transport systems...
FIGURE 14-6
A computer may look like an innocent piece of technology, but it can be a very d...
CHAPTER 16
FIGURE 16-1
Professors and practitioners must work with students to help advance knowledge a...
FIGURE 16-2
We must reverse the socialization of children into violence. Source: © ZouZou/Sh...
FIGURE 16-3
Professionals are needed in homeland security to advance efforts to prevent atta...
CHAPTER 10
TABLE 10-1
Risk assessment matrix
TABLE 10-2
Measures to mitigate attacks
Cover
Title Page
Copyright
Dedication
Table of Contents
About the Author
Foreword
Preface
Acknowledgments
About the Companion Website
CHAPTER 1 Understanding a Global Priority
Glossary
Index
End User License Agreement
i
ii
iii
iv
v
vi
vii
viii
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
David A. McEntire, PhD, is a professor at Utah Valley University and the former dean of the College of Health and Public Service. Prior to these appointments, he was a professor in the Emergency Administration and Planning (EADP) Program in the Department of Public Administration at the University of North Texas.
Dr. McEntire has taught emergency management, homeland security, and national security courses in both undergraduate and graduate programs. His academic interests include emergency management theory, international disasters, community preparedness, response coordination, terrorism, and vulnerability reduction.
Dr. McEntire has received several grants funded by the Natural Hazards Center at the University of Colorado and the National Science Foundation, among others, which allowed him to conduct research on disasters and emergency management in Australia, Costa Rica, the Dominican Republic, Haiti, New Zealand, Peru, California, New York, Texas, and Utah.
Dr. McEntire is the author of Disaster Response and Recovery (Wiley) and Comparative Emergency Management (Federal Emergency Management Agency (FEMA)) and the editor of Disciplines, Disasters and Emergency Management (C.C. Thomas) and The Distributed Functions of Emergency Management and Homeland Security (CRC Press). His research has also been published in Public Administration Review, the Australian Journal of Emergency Management, Disasters, the International Journal of Mass Emergencies and Disasters, the Journal of Emergency Management, International Journal of the Environment and Sustainable Development, Sustainable Communities Review, the International Journal of Emergency Management, the Towson University Journal of International Affairs, the Journal of the American Society of Professional Emergency Planners, and the Journal of International and Public Affairs, among others. His articles in Disaster Prevention and Management received Highly Commended and Outstanding Paper awards.
Dr. McEntire completed an instructor guide for FEMA and is a contributing author to the Handbook of Disaster Research and the Handbook of Disaster Management. He also has a chapter in Emergency Management, a book published by the International City/County Management Association.
Dr. McEntire provided terrorism response training for FEMA in Arkansas and Oklahoma. He has been a contributing author for a study of Texas homeland security preparedness for the Century Foundation and two IQ reports for the International City/County Management Association. In addition, McEntire has presented papers in Hungary, Japan, Mexico, and Norway, and at the National Science Foundation, the National Academy of Sciences, and the Higher Education Conference at FEMA’s Emergency Management Institute in Emmitsburg, Maryland. He is a former member of Congressman Michael C. Burgess’s Homeland Security Advisory Council and of the Fire Protection Publications Advisory Board. He has reviewed books for Delmar Learning and is on the editorial staff for the Journal of Emergency Management.
In a prior position at the University of North Texas, Dr. McEntire served as an undergraduate coordinator, Ph.D. coordinator, assistant chair, associate dean, and director of summer sessions. Prior to his first academic appointment, Dr. McEntire attended the Graduate School of International Studies at the University of Denver. While pursuing his degree, he worked for the International and Emergency Services Departments at the American Red Cross.
3rd Edition, Introduction to Homeland Security
Homeland security—both in professional practice and as an academic discipline—continues to mature from its relatively recent roots in the U.S. government restructuring following the attacks in New York, Washington, DC, and Pennsylvania on 9/11. The early focus was unambiguous, with terrorism as the field’s unquestionable raison d’etre. This period is what some have termed “Homeland Security 1.0.”
This priority and attention given to terrorism was blurred with the devastation wrought by Hurricane Katrina in 2005 and the national angst over the impacts of the Global War on Terror. “Homeland Security 2.0” ushered in a nominally more balanced, all-hazards approach to meeting the diverse security and emergency management challenges of the first decade of the century. As fear of another 9/11 magnitude attack waned, the emphasis shifted to high-likelihood, low-consequence events impacting U.S. communities. Planning, preparation, and exercising for diverse natural hazards (e.g., tropical storms, flooding, and earthquakes as well as a growing recognition of cyber threats) took priority as jurisdictions focused on the most probable needs of their communities. Conventional and unconventional military operations abroad also dispersed the threat of Al Qaeda and the Islamic State, and regional terror groups—Boko Haram, Al-Shabab, and Lashkar-e-Tayyiba, among others—appeared to pose limited challenges to the security of the U.S. homeland. Thus, emphasizing terrorism as a principal focus for the U.S. federal government, as well as state, local, tribal, and territorial jurisdictions and among partner nations, seemed less intuitive.
Yet terrorism has not gone away as borne out by recent events. Rather, the threat has diversified, metastasized, and matured, presenting an enduring and complex challenge for security policymakers and practitioners. As an example, Al Qaeda was indeed dispersed but reconstituted as franchise operations throughout North Africa, the Middle East, and Southwest Asia in loosely affiliated forces to be reckoned with, either independently or in loose collaboration with other regional terror groups.
At the time of this writing, homeland security faces perhaps the most demanding set of wicked problems ever. This includes brutal, industrial-age nation-state warfare in Europe with the possibility of global consequences; the potential for Great Power conflict in East Asia; proxy warfare in Yemen, Iraq, and Syria, with intermittent but continuing attacks on U.S. and allied personnel and facilities; mass migration and resultant border immigration crises; slow-onset potential mega-disasters related to climate change impacts; political conflict and uncertainty as the United States approaches another national election; the rapidly expanding use of information technologies that both shape public opinion and enable malign activities by sophisticated groups and nations; and, of course, the evolution of terrorism that takes advantage of the latter.
The most graphic reminder of the ongoing challenges and dynamic nature of terrorism was the horrific events in Israel on October 7, 2023, and the aftermath that will play out over the succeeding months and perhaps beyond. Is the homeland security enterprise up to the task of dealing with each of these vexing issues simultaneously?
The answer to the myriad challenges (as if one were ready at hand!) would seem to rest in our critical analysis of the threat and hazard landscape and the ability to identify, build, and deliver the multifaceted approaches to meet the diverse homeland security requirements in 2024 and 2025 and into future generations. The “how” of homeland security (although the precise method is both uncertain and subject to changes due to the threats we likely will face) must necessarily have its foundation in understanding; understanding that is based on the art and science of scholarly research applied to practice.
We should therefore congratulate and thank Dr. Dave McEntire for approaching “Homeland Security 3.0” with an unparalleled expertise in his clear-eyed exposition of the fundamental issues of homeland security in this third edition. Here, Dr. McEntire has refreshed our understanding of the professional field and academic discipline that may have diverged from the critical—indeed, life-threatening—impact that homeland security must address.
The third edition reintroduces students to essential elements of terrorism and the deadly intent of this form of violence in its modern form. Through an integrated approach to understanding homeland security, the author correctly encourages us to see the threats and hazards described earlier in the context of the larger system of national and global resilience and human security. The third edition is consequently comprehensive and complete and is a timely, single-source volume that provides the necessary vaccination to prevent a future failure of imagination.
Steve Recca
11.20.2023
Naval Postgraduate School
Center for Homeland Defense & Security
Monterey, California
U.S. policy regarding international affairs, terrorism, and disasters has witnessed ongoing tension between the security and emergency management points of view. Since the late 1940s, there has been recurring disagreement about the priority given to conflict disasters versus other types of hazards. Several events elevated the stakes in this debate and created additional urgency to find some sort of consensus about future priorities.
First, the 9/11 attacks and the recent Hamas violence in Israel underscore the fact that the threat of terrorism needs to be taken seriously by disaster scholars and emergency managers. No one should pretend that the world is the way it once used to be.
Second, Hurricane Katrina and a plethora of other disasters remind homeland security officials that they must not disregard human vulnerability to natural hazards. The frequency of natural, technological, and anthropogenic disasters is simply too great to ignore. In addition, the consequences of compound interactions are getting worse over time.
With these observations in mind, it is the opinion of this author that both homeland security and emergency management functions need to be addressed concomitantly in the future. Terrorist attacks are increasing in frequency, and their negative outcomes are widespread. While the possibility of terrorism involving weapons of mass destruction or cyberterrorism is uncertain, the impact of such attacks would indeed be overwhelming. More resources will be needed to address every type of threat.
However, government attention and resource distribution should also take into account the broad aspects of homeland security. Terrorism has been given the lion’s share of public support in recent years, but this attention should not be allowed to overshadow the essential functions and contributions of emergency management.
Unfortunately, policy makers unintentionally created a substantial divide between the homeland security and disaster communities. Politicians may have overreacted to 9/11, and their decisions initially diminished the existing emergency management system of the 1990s. This has caused some ill feelings among emergency managers toward the military and the law enforcement communities, which is not a good situation when one considers the fact that terrorists have vowed to kill Americans everywhere (including at home).
Added to this ongoing discussion is the fact that additional risks have become more prevalent in recent years. This includes a rise in various types of crime, the occurrence of riots, the global COVID-19 pandemic, and concerns about climate change. Thus, those involved in homeland security and emergency management must also work collaboratively with other public safety, public health, and environmental agencies and officials to address the challenges of our day.
This book, Introduction to Homeland Security: Terrorism Prevention, Public Safety and Emergency Management, Third Edition, aims to provide a foundation that could assist in spanning the chasm between the disaster and terrorism communities. Its focus on terrorism may help to educate those who do not yet understand the need to prepare for this expanding threat. Its concentration on emergency management will remind homeland security officials that reinventing of the wheel is not only unnecessary but problematic. In addition, the book educates homeland security and emergency management professionals about other important considerations pertaining to unabated crime, social discord, physical well-being, and our precious natural resources.
Of course, taking this approach could result in increased antagonism between the different parties. It is also possible that the author has not adequately portrayed the specific details pertinent to all of the actors involved in the broad and interdisciplinary array of homeland security, emergency management, public safety, public health, and environmental protection activities. Nevertheless, it is the author’s hope that this work will educate those working in each area and help promote a synergy of effort.
Chapter 1, “Understanding a Global Priority: Diverse Threats, Terrorism, Homeland Security, and Emergency Management,” examines the significant impacts of 9/11, the Hamas attacks in Israel, and other events in world history. It also defines homeland security and supplements homeland security with an emergency management perspective, thereby offering a broader view of how to deal with terrorist attacks.
Chapter 2, “Identifying Terrorism: Ideologically Motivated Acts of Violence and Their Relation to Disasters,” identifies the numerous definitions and perspectives of terrorism, comparing how these are both alike and dissimilar. This chapter also looks at the connections between terrorism and other types of disasters.
Chapter 3, “Recognizing the Causes of Terrorism: Differing Perspectives and the Role of Ideology,” explores what motivates people to participate in terrorism, paying special attention to how historical conflicts, mistakes in foreign policy, and extreme levels of poverty may impel some to engage in terrorist attacks.
Chapter 4, “Comprehending Terrorists and Their Behavior: Who They Are and What They Do,” assesses the nature of individual terrorists and those associated with groups and states and identifies how they finance operations, communicate with secret codes, and carry out attacks.
Chapter 5, “Uncovering the Dynamic Nature of Terrorism: History of Violence and Change over Time,” explores why terrorism initially emerged, how it evolved in other nations, and the ways it has manifested in the United States.
Chapter 6, “Evaluating a Major Dilemma: Terrorism, the Media, and Censorship,” looks at the difficult relationship between terrorism and the media, how to predict how reporters view terrorism, and the drawbacks and limitations of censorship.
In Chapter 7, “Contemplating a Quandary: Terrorism, Security, and Liberty,” you learn why, as a participant in homeland security, it is imperative that you assess the tradeoffs between security and rights and why terrorism exploits the tension between them.
Chapter 8, “Preventing Terrorist Attacks: Root Causes, Law, Intelligence, and Counterterrorism,” addresses the root causes of terrorism and explores primary ways of preventing attacks, like promoting laws that prohibit terrorism and punish those who support it, protecting all points of entry into the United States, and relying on human and other sources of intelligence to apprehend terrorists before they strike.
In Chapter 9, “Securing the Nation: Border Control and Sector Safety,” the permeability of the U.S. border is mentioned along with measures to prevent the infiltration of terrorists onto American soil. It also discusses the vulnerability of various economic sectors and describes ways to secure railways, air transportation, sea ports, and chemical facilities.
Chapter 10, “Protecting Against Potential Attacks: Threat Assessment, Mitigation, and Other Measures,” looks at the benefits of mitigation practices, such as working with others to assess threats posed to critical infrastructure, key assets, and soft targets, as well as differentiating between structural and nonstructural mitigation methods.
In Chapter 11, “Preparing for the Unthinkable: Efforts for Readiness,” it is revealed that preparing for terrorism is one of the central responsibilities of homeland security. To help your community prepare for possible terrorist attacks, you will need to be familiar with the executive orders and legislation issued by the president and congress and set the foundation for preparedness by creating an advisory council, passing ordinances, acquiring monetary resources, and establishing an EOC.
Chapter 12, “Responding to Attacks: Important Functions and Coordination Mechanisms,” examines effective ways to react to terrorist attacks, including the numerous functions involved, such as investigation, the protection of first responders, and the treatment of the victims of terrorist attacks.
Chapter 13, “Recovering from Impacts: Short- and Long-term Measures,” addresses the variety of recovery measures that need to be performed after a terrorist attack takes place, including declaring a disaster or state of emergency, addressing mass fatality issues, disposing debris, and providing emotional support for those who have been emotionally impacted by the event.
Chapter 14, “Assessing Significant Threats: WMD and Cyberterorrism,” assesses the probability that terrorists will launch more unique and devastating attacks. It identifies the threat of radiological, nuclear, biological, and chemical weapons along with numerous recommendations to counter such assaults. The chapter also describes the risk of cyberterrorism and mentions the measures being taken to increase preparedness in this area.
Chapter 15, “Evaluating Other Pressing Problems: Criminal Activity, Social Disturbances, Pandemics, and Climate Change,” explores additional risks that must be taken into consideration today by both homeland security and emergency management professionals. These risks include a variety of problems relating to organized crime, illegal drugs, human trafficking, protests, riots, COVID-19, and global warming.
In Chapter 16, “Looking Toward the Future: Challenges and Opportunities,” the need for accountability in homeland security is identified. A discussion about policy occurs, and recommendations are provided for both researchers and practitioners.
Each chapter of Introduction to Homeland Security: Terrorism Prevention, Public Safety and Emergency Management, Third Edition features a number of learning and study aids, described in the following sections, to activate students’ prior knowledge of the topics and orient them to the material.
This bulleted list focuses on the subject matter that will be taught. It tells students what they will be learning in this chapter and why it is significant for their careers. It also helps students understand why the chapter is important and how it relates to other chapters in the text.
The online assessment tool in introduces chapter material, but also helps students anticipate the chapter’s learning outcomes. By focusing students’ attention on what they do not know, the self-check test provides students with a benchmark against which they can measure their own progress. The pre-test is available online at www.wiley.com/go/mcentire/homelandsecurity3e.
This bulleted list emphasizes capabilities and skills that students will learn as a result of reading the chapter and notes the sections in which they will be found. It prepares students to synthesize and evaluate the chapter material and relate it to the real world.
The following learning aids are designed to encourage analysis and synthesis of the material, support the learning process, and ensure success during the evaluation phase.
This section orients the student by introducing the chapter and explaining its practical value and relevance to the book as a whole. Short summaries of chapter sections preview the topics to follow.
These boxes tie section content to real-world organizations, scenarios, and applications. Engage stories of professionals and institutions—challenges they faced, successes they had, and their ultimate outcome.
Each chapter concludes with a summary paragraph that reviews the major concepts in the chapter and links back to the “Do You Already Know” list.
To help students develop a professional vocabulary, key terms are bolded when they first appear in the chapter and are also shown in the margin of the page with their definitions. A complete list of key terms with brief definitions appears at the end of each chapter and again in a glossary at the end of the book. Knowledge of key terms is assessed by all assessment tools (see next).
The evaluation phase consists of a variety of within-chapter and end-of-chapter assessment tools that test how well students have learned the material and their ability to apply it in the real world. These tools also encourage students to extend their learning into different scenarios and higher levels of understanding and thinking. The following assessment tools appear in every chapter.
Related to the “Do You Already Know” bullets and found at the end of each section, this battery of short-answer questions emphasizes student understanding of concepts and mastery of section content. Though the questions may be either discussed in class or studied by students outside of class, students should not go on before they can answer all questions correctly.
This online post-test should be taken after students have completed the chapter. It includes all of the questions in the pre-test so that students can see how their learning has progressed and improved. The post-test is available online at www.wiley.com/go/mcentire/homelandsecurity3e.
These questions drive home key ideas by asking students to synthesize and apply chapter concepts to new, real-life situations and scenarios.
Found at the end of each chapter, “Be a …” questions are designed to extend students’ thinking and are thus ideal for discussion or writing assignments. Using an open-ended format and sometimes based on web sources, they encourage students to draw conclusions using chapter materials applied to real-world situations, which foster both mastery and independent learning.
Introduction to Homeland Security: Terrorism Prevention, Public Safety, and Emergency Management, Third Edition, is available with the following teaching and learning supplements. All supplements are available online at the text’s Book Companion Website, located at www.wiley.com/go/mcentire/homelandsecurity3e.
The Instructor’s Resource Guide provides the following aids and supplements for teaching a Homeland Security course:
Text summary aids: For each chapter, these include a chapter summary, learning objectives, definitions of key terms, and answers to in-text question sets.
Teaching suggestions: For each chapter, these include at least three suggestions for learning activities (such as ideas for speakers to invite, videos to show, and other projects) and suggestions for additional resources.
PowerPoints: Key information is summarized in 10–15 PowerPoints per chapter. Instructors may use these in class or choose to share them with students for class presentations or to provide additional study support.
Test Bank: The test bank features one test per chapter, as well as a midterm and two finals–one cumulative and one noncumulative. Each includes true/false, multiple-choice, and open-ended questions. Answers and page references are provided for the true/false and multiple-choice questions, while page references are given for the open-ended questions. Tests are available in Microsoft Word and computerized formats.
I express appreciation to those individuals who have made substantial contributions to Introduction to Homeland Security. I am indebted first and foremost to Laura Town, Brian Baker, Summer Scholl, and Judy Howarth (editors at Wiley) for their critical assessment of the text and their useful recommendations for improvement. I am also grateful to the additional members of the Wiley staff—Stefanie Volk, Katrina Maceda, J. Hari Priya, and Rajeev Kumar—who helped format the text and find pictures for the entire document. Others including Kailey Birchall, Ashley Layton, Tres Layton, and Madison Rojas provided valuable assistance in the preparation of this manuscript.
I am likewise appreciative of several reviewers for their beneficial suggestions on this version and earlier drafts of the manuscript. This includes:
Robin Ebemyer, Utah Valley University
Vincent J. Doherty, Naval Postgraduate School
John J. Kiefer, The University of New Orleans
Scott D. Lassa, Milwaukee Area Technical College
David W. Lewis, University of Maryland
Steve Recca, Naval Postgraduate School
Ronald P. Timmons, University of North Texas
Brandon Amacher, Utah Valley University
Ryan Vogel, Utah Valley University
While I am solely responsible for the content of this book, I am thankful for all those who have shared valuable insights and unique perspectives. Their areas of expertise and years of experience have undoubtedly assisted me during the publication process.
Finally, I would be remiss if I did not recognize the many scholars and practitioners whom I have come across during my involvement in this field. Your knowledge and professionalism have not only helped to educate me about terrorism and disasters; you have also underscored the significant need for homeland security and emergency management functions in our society. More importantly, I am cognizant that your persistent efforts will enable our nation to reduce vulnerability and increase our ability to react effectively when exigency exists. For this I am truly grateful.
David A. McEntire, PhD
This book is accompanied by a companion website: www.wiley.com/go/mcentire/homelandsecurity3e
The instructor website includes:
Instructor’s resource material
Powerpoint slides
Pre-test
Post-test
Test bank
Image gallery
The student website includes:
Pre-test
Post-test
Image gallery
Why we should be concerned about threats to our security
If terrorist attacks are becoming more frequent
Why 9/11 changed the world
How to define homeland security
Why many professions, including emergency management, can help us deal more effectively with terrorist attacks
For additional questions to assess your current knowledge of terrorism and homeland security, go to www.wiley.com/go/mcentire/homelandsecurity3e
WHAT YOU WILL LEARN
WHAT YOU WILL BE ABLE TO DO
1.1
Threats facing the United States
1.2 The probability of additional attacks in the future
1.3 The far-reaching effects of 9/11
1.4 Definitions of homeland security
1.5 The breadth of organizations involved in homeland security
List terrorist activity in recent years
Evaluate the consequences of terrorism
Convey how the world changed after the 9/11 hijackings
Describe the mission of the homeland security profession
Assess how various disciplines can help practitioners deal with terrorism
Welcome to the important discipline and profession of homeland security! If you are interested in this important field of study and desire to work in this area of practice, it is imperative that you comprehend the variety of threats facing the United States and what can be done to deal with them in an effective manner. This book has the purpose of helping you achieve these goals by exploring the fundamental concepts and principles of the homeland security profession. While reading this introductory chapter, you will gain a basic understanding of numerous security concerns in general and the perplexing problem of terrorism in particular. You will learn how the terrorist attacks on September 11, 2001, changed the world and initiated a new era in global history. You will acquire knowledge about the mission and scope of homeland security along with the challenges it currently faces. The importance of approaching homeland security from a holistic perspective is then mentioned, enabling you to recognize why many professions—including emergency management—must form an integral part of efforts to deal with terrorist attacks and other threats.
Anytime you watch the news, search the Internet, or scroll through social media, you will likely see several stories depicting threats to the security, safety, and well-being of people, organizations, and nations around the world. For instance:
Mass shootings are all too frequently witnessed at school, in the workplace, or any location where many people congregate. Individuals and families are worried about their safety in the mall, at church, or while attending a sporting event. This concern appears to be warranted due to the fact that there were 689 mass shootings in 2021, 645 in 2022, and over 500 at the time of this writing in 2023 (Nazzaro 2023).
The commission of crimes—including physical assaults and property theft—rose dramatically from 2020 to 2022 (Grawert and Kim 2023). People feel unsafe at home or in the streets, and businesses are worried about their profitability and future viability under these disturbing conditions.
The manufacturing and distribution of illegal drugs in the United States have risen to epic proportions. Government reports reveal that more than 100,000 persons die annually from illicit substances like fentanyl (National Institute on Drug Abuse 2023).
Human trafficking is enslaving thousands of people in the United States and elsewhere. Exploited sex workers and other forced laborers suffer as a result of this, the most significant human rights violation of our time. For instance, since the inception of the National Human Trafficking Hotline in 2007, more than 82,000 cases have been reported in the United States, which have involved over 164,000 victims (see https://humantraffickinghotline.org/en/statistics).
Social demonstrations have become increasingly common in recent years, and this has caused Verisk Maplecroft (a strategic consulting firm) to place the United States within the high-risk category for social unrest (Campbell and Hribernik 2020). Some of the recent protests over the death of George Floyd and the 2020 election results exploded into riot behavior, which resulted in the loss of life, hundreds of injuries, and the destruction of property valued at billions of dollars.
Public health emergencies have been seen repeatedly over the past few decades. Our recent experience with the Covid-19 pandemic illustrates the significant impact contagious diseases can have on lives and livelihoods. There is evidence that our public health institutions are inadequately prepared for deadly outbreaks that may occur in the future (Baker and Ivory 2021).
Global warming and climate change are frequently discussed by politicians and environmental activists. Concerns about the possibility of further environmental disasters appear to be warranted and suggest a future of additional and aggravated risks (see https://www.usgs.gov/faqs/how-can-climate-change-affect.natural-disasters).
As can be seen, each of these threats may result in injuries, death, and/or physical, economic, emotional, and other types of harm. While these problems are typically addressed by law enforcement personnel, public health organizations, and environmental agencies, they have not always been the focus of a holistic, concerted, or systematic effort. This is changing, however, because local, state, and federal governments recognize that more must be done to prevent such occurrences and react to them in a more effective manner.
Source: TapTheForwardAssist/Wikimedia Commons
According to the National Oceanic and Atmospheric Administration, the United States experienced 18 weather and climate-related disasters in 2022, which caused more than $1 billion in damage each (Smith 2023). This included one winter storm, one wildfire, one heatwave/drought, one flood, two tornadoes, three tropical cyclones, and nine severe weather/hail events. Taken together, these disasters killed 474 people and totaled over $165 billion in losses in a single year. Evidence seems to suggest that the risk of disasters is increasing at alarming rates. Disasters are just one of many different threats facing the United States today and into the future.
Although there are grave concerns about criminal activity, social disturbances, public health emergencies, and climate-related disasters, another threat has garnered significant attention from policy makers than those mentioned earlier. This issue has transformed the nature of government in the United States over the past two decades. That concern is known as terrorism.
In simple terms, terrorism is the use or threat of violence to support ideological purposes. Individuals, groups, and even nation-states participate in terrorism to achieve social, political, economic, and other objectives. Recent events might cause you to think that these terrorist attacks are more frequent and deadly than in prior decades. Your instinct is certainly justified according to the London Institute for Economics and Peace (Cassidy 2015). Although there are a whole host of problems that must be addressed by politicians and public safety personnel, terrorism appears to be ever present and its impacts cannot be denied. Attacks are not only more common than in the past—they are also more consequential. Five cases illustrate the “new normal” we are facing today.
On April 15, 2013, Tamerlan and Dzhokhar Tsarnaev—Chechen brothers who were residing in the United States—detonated two homemade pressure cooker bombs at the Boston Marathon in Massachusetts. The bombs exploded in the late afternoon about 200 yards apart near the finish line of the race on Boylston Street. Three people died from the blasts, and over 260 others were injured. The marathon was suspended while athletes and bystanders were directed to safety and treated by law enforcement and emergency medical personnel. A massive manhunt was soon underway to find those involved in the attack. One of the brothers was killed during a confrontation with police. The other was apprehended and is now incarcerated in a maximum-security prison in Florence, Colorado.
On December 2, 2015, a mass shooting took place in San Bernardino, California, at the Inland Regional Center. The perpetrators were Syed Rizwan Farook and his wife, Tashfeen Malik. This married couple killed 14 people and injured 22 when they opened fire at a holiday party being held by the county’s Department of Public Health. While this was clearly devastating, the incident could have been more consequential. Three pipe bombs found at the scene failed to explode. The terrorists were killed in a shoot-out with police a short time later.
On June 12, 2016, a security guard named Omar Mateen instigated one of the most despicable acts of violence in U.S. history (see Figure 1-1). With the use of a pistol and a semiautomatic rifle, he killed 49 people and wounded 53 others at the Pulse—a gay nightclub in Orlando, Florida. After a 3-h standoff, the terrorist was shot and killed by the officers from the Orlando Police Department. The carnage was the result of one of the worst mass shootings in the United States to date.
From September 17 to September 19, 2016, several bombs were detonated and found unexploded in New York and New Jersey. One pipe bomb was placed in a trash can and exploded during a 5K race in the community of Seaside Park. No one was injured in the incident, but additional bombs were discovered in the area and disposed of. That same day, another bomb exploded in a dumpster in New York City near a construction site. Thirty-one people were injured as a result of this pressure cooker bomb that was filled with metal bearings. Another bomb was identified nearby and reported to the authorities. The following day, additional bombs were discovered in Elizabeth, New Jersey. Ahmed Khan Rahimi, an Islamic extremist, was captured after fingerprints, a mobile phone, DNA evidence, and purchase receipts revealed who the culprit was.
FIGURE 1-1 Mass shootings like the Orlando nightclub shooting reveal the significant impact a lone terrorist can have on innocent citizens. Source: Orlando Police Department/Wikimedia Commans/Public Domain.
On October 31, 2017, a man named Sayfullo Habibullaevic Saipov used a rented pickup truck as a weapon on a bike path in a park near the Hudson River. Over a 1-mile stretch, Saipov ran into and over cyclists and joggers, killing 8 people and injuring 11 others. He eventually crashed the vehicle into a bus and then engaged in a shoot-out with police. Saipov was shot and arrested. During the investigation, it was determined that Saipov launched the attack in support of the Islamic State of Iraq and the Levant (ISIL). This terrorist was convicted of murder and is incarcerated for life.
The aforementioned attacks are not isolated. The list of such events has increased over the past 25 years. For instance, Hesham Mohamed Hadayet opened fire at the El Al ticket counter at the Los Angeles Airport. His attack killed two people and injured four others on July 4, 2002. On March 3, 2006, Mohammed Reza Taheri-azar intentionally drove a vehicle into a crowd at the University of North Carolina at Chapel Hill. He injured nine people. In November 2009, Nidal Malik Hasan murdered 14 people at the Fort Hood military base in Texas.
On February 18, 2010, a disgruntled man named Joseph Stack flew his private plane into an Internal Revenue Service building in Austin, Texas. In the small town of Moore, Oklahoma, Alton Nolen beheaded a woman at a Vaughan Foods plant on September 24, 2014. Robert Lewis Dear killed three people at a Planned Parenthood clinic in Colorado Springs, Colorado, on November 27, 2015. Micah Xavier Johnson killed five police officers on July 7, 2016. This disturbing sniper attack took place in Dallas, Texas, at a Black Lives Matter protest. It wounded nine others, including two civilians.
The list of terrorist attacks seems to be never ending. Fifteen incidents illustrate the prevalence of attacks along with a diversity of targets and divergent methods:
Bruce Edwards Ivins mailed several letters containing anthrax spores to news outlets and two Democratic senators. Five people were killed, and seventeen others were injured from September 18 to October 9, 2001.
John Allen Williams and Lee Boyd Malvo (the “Beltway Snipers”) murdered 10 people and injured 3 others in Washington, D.C., Maryland, and Virginia over a three-week period in October 2002.
John Patrick Bedell injured two police officers at the entrance of the Pentagon on March 4, 2010.
Wade Michael Page gunned down six people at a Sikh Temple in Wisconsin on August 5, 2012.
Ali Muhammad Brown killed three civilians in Seattle, Washington, during a period from April 27, 2014, to June 1, 2014.
Zale Thompson attacked two police officers with a hatchet in Queens, New York, on October 23, 2014.
Ismaaiyl Brinsley killed two police officers in an ambush in Brooklyn, New York, on December 20, 2014.
Elton Simpson and Nadir Soofi opened fire at a conference that was hosting an exhibition of a cartoon of Prophet Muhammad in Garland, Texas, on May 3, 2015.
Muhammad Youssef Abdulazeez shot and killed four marines and a sailor at a military base in Chattanooga, Tennessee, on July 16, 2015.
Faisal Mohammad attacked students with a knife at a university in Merced, California, on November 4, 2015.
Samuel Woodward, a member of a far-right/neo-Nazi group named the Atomwaffen Division, stabbed a gay Jewish University of Pennsylvania student on January 2, 2018.
John T. Earnest, a 19-year-old young man who was sympathetic to alt-right and anti-Semitic thought, set the Dar-ul-Arqam Mosque on fire in Escondido, California, on March 24, 2019.
Mohammed Saeed Alshamrani, a Saudi Air Force Second Lieutenant who was being trained in the United States, shot and killed three U.S. Navy sailors and injured eight others in a classroom at the Naval Air Station in Pensacola, Florida, on December 6, 2019.
Anderson Lee Aldrich, a 22-year-old man with anti-LGBT sentiment, killed five people and injured twenty-five others in a shooting at the Club Q bar in Colorado Springs, Colorado, on November 19, 2022.
Audrey Hale, a 28-year old transgender man, used a firearm to kill three adults and three children at the Covenant Christian School in Nashville, Tennessee, on March 27, 2023.
The terrorist attacks mentioned earlier were not the first to occur in the United States or around the world. Nor will they be the last ones to take place in this country or elsewhere. There have been many unsuccessful attacks in New York as well as in Arkansas, Dallas, Florida, Illinois, Michigan, Missouri, New Jersey, Washington, D.C., and so on. This is to say nothing about terrorist attacks initiated in other nations, which are even more prevalent and deadly.
One of the most consequential bouts of terrorism occurred on November 13, 2015, when terrorists carried out a number of coordinated attacks in France and Belgium. Six locations were targeted in the assaults, ranging from the Stade de France stadium to popular bars in and around Paris. The bloodshed began when suicide bombers wearing explosive devices detonated them near a major soccer match being played between France and Germany. A few minutes later, gunmen began unleashing heavy gunfire at several restaurants in Paris. The most fatal of the attacks occurred in the Bataclan theater. Three perpetrators entered the concert hall and fired assault rifles into the audience. Some members of the crowd were able to escape through exits, but 89 people lost their lives and many more were wounded. By the time each of the individual but coordinated attacks concluded, 130 people were killed and 368 were injured.
