Solutions Manual for Private Security An Introduction to Principles and Practice 1st Edition Nemeth
|CHAPTER 2: CONCEPT, CONTEXT, AND DEFINITION: SECURITY|
|antiterrorism||Islamic extremism||Act of 2002|
|Black Panthers||jihadist||(SAFETY Act)|
|Cold War||Korean War||Third Reich|
|communism||Ku Klux Klan (KKK)||threat analysis|
|Cuban Missile Crisis||nuclear proliferation||Truman Doctrine|
|domestic terrorism||Office of Biometric||Command|
|Hamas||Identity||United States Northern|
|homeland security||Posse Comitatus Act||U.S. Freedom Act|
|Homeland Security Act||REAL ID Program||USA Patriot Act|
|Information Sharing and||Students for a||Vietnam War|
|Organizations (ISAOs)||(SDS)||Workers Party|
|intelligence||Support Antiterrorism by|
After completing this chapter, the student will be able to
- Discuss the various concepts and definitions of private security.
- Outline the various areas of private security involvement in international terrorism, homegrown terrorism, and homeland security in general.
- Identify the various laws, regulations, and executive orders that enable private security to carry out its aim and purpose.
- Evaluate how specialized homeland security laws impact how security services are provided.
- Recall the training and academic programs in homeland security sponsored by the Department of Homeland Security (DHS) as well as various colleges and universities.
- Describe the interplay between private security and homeland security in the twenty-first century.
- Explain how private sector security firms and personnel are central and integral in the defense of the nation.
- Summarize how DHS formally encourages the interplay and cooperation between private sector justice entities and public law enforcement.
Outline Of Study
Chapter 2 – Concept, Context, And Definition: Security 2.1 Security In Concept And Definition
2.2 Security, Terror, And Homeland Defense
2.3 Security: The Balance Of Rightful Demonstration And Threat
2.3.1 Security: The Challenge Of Domestic Terrorism—Pre-9/11
2.3.2 Security: The Challenge Of International Terrorism—Pre-9/11
2.4 Security: The Challenge Of 9/11 And Homeland Defense
2.5 Formalizing Security In The Homeland: Law, Legislation, And Executive Decree
2.5.1 Executive Order 13228: The Origin Of Dhs
2.5.2 Executive Order 12231: Protection Of Infrastructure
2.5.3 Executive Order 13493 Of January 22, 2009
2.5.4 Executive Order 13567 Of March 7, 2011
2.5.5 Executive Order 13691 Of February 13, 2015: Promoting Private Sector Cybersecurity Information Sharing
2.5.6 Homeland Security Act Of 2002
184.108.40.206 The Homeland Security Act And Posse Comitatus
2.5.7 Usa Patriot Act
2.5.8 Specialized Laws
220.127.116.11 The Real Id Program
18.104.22.168 Office Of Biometric Identity Management
22.214.171.124 Chemical Facilities
126.96.36.199 The Safety Act
2.6 Academic And Training Programs In Homeland Security
2.6.1 Office Of Grants And Training
2.6.2 Center For Domestic Preparedness
2.6.3 Emergency Management Institute
2.6.4 The Academic Discipline Of Security Management, Security Studies, And Homeland Security
2.7 The Private Sector And Homeland Security
ASIS International, Standard and Practices, https://www.asisonline.org/Standards-Guidelines/Documents/SGquickReferenceGuide.pdf
National Archives, Catalog of Japanese War Crimes in WWII, http://www. archives.gov/iwg/japanese -war-crimes/select-documents.pdf
Winston Churchill, The Sinews of Peace, http://www.nato.int/docu/ speech/1946/S460305a _e.htm
PBS Independent Lens, The Weather Underground,
|DHS, Cybersecurity Activities, https://www.dhs.gov/topic/Cybersecurity|
|EMI, Homeland Security/Emergency Management Programs,|
|Center for Homeland Defense and Security, Homeland Security Programs,|
|DHS Private Sector Office, Contact List,|
|True & False|
|1.||Thre Truman Doctrine established that the United States would provide political,|
|military, and economic assistance to all democratic nations under threat from|
|2.||external or internal authoritarian forces.|
|President Richard Nixon’s visit to China in 1972 had no effect the Cold War.|
|3.||During the Nixon era ordinary citizens were not perceived as troublemakers and|
|4.||seditionists for any protest to the policies of the president.|
|Domestic terrorism is considered that which is perpetrated by U.S. nationals and not|
|5.||the product of fringe Islamic extremists or jihadists.|
|During the 1980s, organized terrorist groups gained foundational and|
|organizational support from many quarters, in both a political and an economic|
|Terror does not have a progressive history; all terror events occur in a vacuum.|
|7.||Before 9/11, security, in a nationalized sense, had more to do with spies and our|
|8.||Cold War enemies than the modern-day terrorist plot.|
|The power of DHS is derived from its legal authority, including laws and executive|
|The least controversial pieces of legislation that arose from the turbulent post-9/11|
|period was the Patriot Act.|
- The Center for Domestic Preparedness (CDP) operates within the FEMA construct
and delivers key training and education in specialized fields.
- FromhomelandwasWorldWarlargelyItoWorldtheresultWarofII (WWII), the concept of threats to the
c.d. imperialallofthe empireabove building
- AfterrepublicanWWIIprinciples?whichtwo countries shared the core values of freedom and democratic,
a.b. PolandBritian andand HungarytheUS
c.d. TheRussiaUS andand GermanyGermany
- Trumana.KoreanDoctrineWarwasandcitedthe Vietnaminwhich Warofthe following conflicts?
b.c. KoreanKorean War,War, thethe BayCubanof Pigs,MissileandCrisis,theVietnamandthe WarVietnam War
- Thed.prospectsWWIIandfor theincreasinglyCubanMissileimprovedCrisisRussian–U.S. relations
a.b. Seemsappeartoa pipebea realdreampossibilityatpresentwith the global atmosphere of cooperation
c.d. hasnonealreadyofthe aboveshown a marked improvement
- The internal, urban violence of the 1960s, triggered and prompted by generations of
inequalitya.To unilaterallyandinjustice,condemncaused lawallactionsenforcementofprotest
- to challenge their historic reactions to public protest
- to see that “enemies” or protagonists of the government may actually be operating from a higher moral plane.
- A and B
- B and C
- Before 9/11 it is obvious that
- public and private operatives suffered from a lack of coordination and interagency cooperation
- a wall did not exist between the various agencies of government
- public and private sectors routined cooperated in matter of homeland security
- all of the above
- Soon after 9/11,
- agencies developed and learned new strategies and tactics for prevention and mitigation.
- the safety community began to reevaluate long-established practices in light of this tragedy.
- Both A and B
- Neither A nor B
- The REAL ID program sets which minimal standards for driver’s liceses?
- Information and security features that must be incorporated into each card
- Proof of identity and U.S. citizenship or legal status of an applicant
- Verification of the source documents provided by an applicant
- Security standards for the offices that issue licenses and identification cards
- All of the above
- Which of the following is not a guiding principle of OIBM:
- Enhance the security of foreign citizens
- Facilitate legitimate travel and trade
- Ensure the integrity of the immigration system
- Protect the privacy of our visitors
- Which of the following is a significant problem with leaving licensure regulation to the security market?
- the industry’s self-regulation track record has been exceptional
- profit margins in the security industry are tight because many companies view security as a necessary evil
- recent attempts to increase qualification
- none of the above
- List some core functions that define the parameters of private security.
- Which Russian–Iranian partnership has fueled global tension and increased distrust?
- Terrorism on the domestic front can be driven by diverse motivations. List three rationales employed.
- List the five major historic restrictions that the Patriot Act expanded.
- What modifications did the US Freedom Act make to the Patriot Act? Essay Topics
- Highlight the philosophy and major purpose of the Homeland Security Act of 2002.
- Analyze the legal and constitutional concerns that some parties have regarding the USA Patriot Act and the USA Freedom Act. Be specific.
- What is the role and function of EMI? What types of training does EMI offer? What makes EMI a unique provider of training in the world of homeland security?
Class Activities and Exercises
- Divide the class into four discussion groups (4 – 6 students in each). Assign each group a problem from the list below. Ask the group to first appoint a designated spokesperson for the group. Allow 15 minutes for the group to assess and analyze the problem. At the end of that period, ask the spokesperson to summarize its findings and conclusion. The report should last 5 minutes.
- Think about the original construction of the DHS. Should it have been done differently? What alternative design should have been considered?
- Discuss the sense and sensibility of the various reorganizations of the DHS. What are the positive and negative aspects of the current incarnation in light of previous structures?
- Does DHS take seriously the input of external bodies and individuals into its policymaking?
- Visit www.whitehouse.gov. Find and summarize three recent executive orders relating to homeland security.
- Assess and evaluate recent amendments to the Homeland Security Act of 2002. List four major categories of adaptation and adjustment in the act since 2002.
- Compare and contrast the original USA Patriot Act and its subsequent provisions with the recently enacted USA Freedom Act of 2015. Highlight the differences and novelties of the new act when compared to the old.
- Prepare a form file for the Office of Biometric Identity Management program.
- Write to EMI for a course catalog.