Table Of ContentAnthony J. Masys
Editor
Handbook of
Security
Science
Handbook of Security Science
Anthony J. Masys
Editor
Handbook of Security
Science
With97Figuresand52Tables
Editor
AnthonyJ.Masys
CollegeofPublicHealth
UniversityofSouthFlorida
Tampa,FL,USA
ISBN978-3-319-91874-7 ISBN978-3-319-91875-4(eBook)
https://doi.org/10.1007/978-3-319-91875-4
©SpringerNatureSwitzerlandAG2022
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe
materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,
broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology
nowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
SectionEditorAugustusW.FountainIIImadehiscontributiontothisworkinhisprivatetimeoutsideof
hisofficialdutiesasDeputyArmyChiefScientistandtheviewsexpressedinthebookdonotnecessarily
representtheviewsoftheArmy,DoD,orU.S
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG.
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Preface
Themodernsecuritylandscapecanbedescribedasdynamicandcomplexstemming
fromtheemergingthreatsandrisksthatarepersistentandtransborder.Globalization,
climate change, terrorism, transnational crime, and misuse of edging underlying
technologycanhavesignificantimpactonsocietyandforcesonetore-evaluatewhat
“national security” means. Recent global events such as the COVID-19 pandemic,
climate change (extreme weather events), mass migration, terrorist acts, and cyber
threats highlight the inherent vulnerabilities to our current national and global
securityposture.
The Handbook ofSecuritySciencewas developedfrom ashared concern ofthe
need for thought leadership and practical guidance for both academic and security
professionalspertainingtomattersofbothnationalandglobalsecurity.
Thishandbookprovidesasurveyofcurrentandemergingtrendsinsecurity.The
breadthofthechaptersoffersinsightsintohowscience(physical,natural,andsocial)
and technology can support new developments to manage the complexity resident
withintheevolvingthreatandrisklandscape.
Our primary objective is to facilitate the generation and diffusion of thought
leadership on security science that go beyond conventional thinking and current
practice.
A second objective is to provide theoretical as well as practical insight into
nationalandglobalsecuritychallenges.
Specifically, the Handbook addresses the need for the continued dialogue, idea-
tion,andinnovationacrossthesecuritysciencelandscape.
The chapters in the Handbook represent various approaches to the application of
securityscience,boththeoreticalandpractical.Inthisway,eachindividualchapteras
wellastheHandbookasawholeexploresthedominantparadigmspertainingtonational
andglobalsecurityandproposesalternativeframing,approaches,andstrategies.
The Handbook is organized in four parts that encompass both theoretical and
practicalperspectives:
Part1:ConceptsinSecurityStudies
Part2:NationalDefense(CBRNE)
Part3:TerrorismandTransnationalOrganizedCrime
Part4:PhysicalSecurity,CyberSecurity,andCriticalInfrastructure:AnIntroduction
v
vi Preface
Part1,ConceptsinSecurityStudies,groundsthesecuritydiscoursebyframing
and exploring the all-hazards landscape and multidisciplinary approaches defining
terms.Thisincludestraditionalandemergingsecuritydomainsandchallenges(e.g.,
terrorismandcriticalinfrastructuresprotection,violentextremism,migration,disin-
formation, COVID-19, economic security, climate security, human security, or
space) as well as practical and analytical methods (intelligence, systems thinking,
modelingandsimulation,securitization,securitycultures,threatassessment,critical
thinkingaswellasethical,legal,andsocialissues,etc.).
In so doing, Part 1 combines theoretical perspectives with deriving operational
applicationstoprovidecontemporaryfoundationsofevolvingsecurityscience.
Part 2, National Defense (CBRNE), explores both theory and applications of
securityscienceacrosstheChemical,Biological,Radiological,Nuclear,andExplo-
sive (CBRNE) problem space. The twenty-first century has shown that chemical
warfareisnotpassé,andtherecentpandemichasgivenusaglimpsewhatregionalor
global biological warfare could look like. Part 2 provides unprecedented contribu-
tions from authors representing government, industry, and not-for-profit organiza-
tionstoaddressawidevarietyofCBRNEthreats,issues,andtechnologies.
Part 3, Terrorism and Transnational Organized Crime, outlines the global
threatofterrorismandorganizedcrime.Itdescribeshowterrorismcontinuestobean
enduringglobalsecuritythreatwhichhasgrownandmodernizedduetotheubiquity
andinfluenceoftechnologicalinnovation,poorgovernance,endemicstatefragility,
conflict, and war. The section takes a historical approach, describing how Salafi-
Jihadism has evolved, as well as concentrating on several specific hot-spots of
religious extremism, including the Middle East, North Africa, and South Asia.
Specificchaptersalsofocusonfar-rightextremismbasedonethnicity,race,religion,
gender, and sexual orientation, focusing largely on the Americas and Europe. The
section also focuses on the nexus of terror and organized crime which has led to
human insecurity due to illegal migration, trafficking, and smuggling. Crime also
influences both licit and illicit markets which in turn exacerbate the triple threat of
corruption, crime, and terror. Several chapters outline how to counter and prevent
violentextremismthroughpublichealthandeducationapproacheswhileexamining
bestpracticesandstandards.Thesectionoffersasolidfoundationofthedefinitions
and issues enabling readers to gain greater insights into extremism, terrorism, and
transnationalorganizedcrime.
Part 4, Physical Security, Cyber Security, and Critical Infrastructure: An
Introduction, presents a more technical view of the issues and challenges and
providesselectedsolutions.
It is clear from a perusal of the chapters selected and solicited by our section
editorsthattheneedforideationandinnovationonmatterspertainingtonationaland
global security is paramount. Today’s security leaders, professionals, and analysts
mustdecidehowtheywillmanagetheinterdependenciesandinterconnectivitythat
characterizethecomplexsecuritylandscape.
As coeditors of this Handbook, we would like to recognize the outstanding
thought leadership from our contributing authors. In addition, we owe deep appre-
ciation to Springer for its support of the project and in particular to our publishing
Preface vii
team,AnneliesKersbergen,LydiaMueller,SonalNagpal,andJubyGeorge,fortheir
enthusiasmandwisdominshapingthewholeeffort.
With the ever-evolving security risks and complex security landscape, we view
thishandbookasanorganicdocument,onethatcangrowtoencompassnewinsights
andinnovativethinking.
Tampa,USA Dr.AnthonyJ.Masys
Middletown,USA Dr.AlexanderSiedschlag
Edgewood,USA Dr.AugustusWayFountainIII
Geneva,Switzerland Dr.ChristinaSchoriLiang
Como,Italy ProfessorMaurizioMartellini
September2022
Contents
PartI ConceptsinSecurityStudies .......................... 1
1 CriticalInfrastructureRiskAnalysisandManagement ........ 3
RyanK.BaggettandAutumnL.Stout
2 CriticalThinkingandEffectiveCommunicationinSecurity
Domains .............................................. 23
CihanAydiner
3 DisinformationandFakeNews ............................ 41
WalterSeboeck,BettinaBiron,ThomasJ.Lampoltshammer,
HeidiScheichenbauer,ChristofTschohl,andLisaSeidl
4 USHomelandSecurity .................................. 63
SamMcGhee
5 DomesticTerrorism ..................................... 85
JenniferC.Gibbs
6 InsiderThreat:ApplyingNoDarkCornersDefenses .......... 103
NickCatrantzos
7 Post-9/11RadicalizationTheoryandItsImpactonViolent
Extremism ............................................ 123
AdibFarhadi
8 CounterterrorismPolicy ................................. 149
BrionyElspethCallander
9 EmergencyManagementSystemApplicationinManagement
ofTerroristIncidents ................................... 173
EricK.Griffin
10 Securitization .......................................... 207
RichardJ.KilroyJr.
ix
x Contents
11 Ethical,Legal,andSocialIssues(ELSI) ..................... 225
AndreaJerkovićandAlexanderSiedschlag
12 IntelligenceforSecurity ................................. 243
DanielW.B.Lomas
13 ReconceptualizingSecurityThreats ........................ 261
ChristianKaunertandOriWertman
14 ReconceptualizingSecurityChallenges ...................... 275
MunirZamir
15 CivicHomelandSecurityCulture:APollStudyApproach
andtheExampleofPennsylvania .......................... 295
AlexanderSiedschlag
16 ReconceptualizingSecurityVulnerabilities ................... 319
RobertMcCreight
17 HumanSecurity ....................................... 341
Ygnacio“Nash”Flores
18 HomelandSecurity:Concepts,Definitions,andEvolution ....... 361
StephanieLipsonMizrahi
19 EconomicSecurity:ConceptualandOperationalIntersection
ofTradePolicyandNationalSecurity ...................... 379
JohnLash
20 SocietalSecurityandCOVID-19 .......................... 395
JenniferD.OsetekandKeithW.Ludwick
21 Counterterrorism ...................................... 415
TimothyM.Luko
22 ClimateSecurity:ChallengesandOpportunitiesfor
HomelandSecurity ..................................... 427
JohnComiskey,MichaelLarrañaga,andCameronCarlson
23 ModelingandSimulationforSecurity:AnOverview .......... 447
EricBest
24 Non-traditionalSecurity:ARisk-CentricView ............... 459
AnthonyJ.Masys
25 Migration,SecurityChallenges,andNationalSecurity ......... 475
JoãoEstevens
26 SpaceSecurity ......................................... 495
ArthurJ.Simental,T.Bynum,J.Holst,andW.A.Cain
27 AligningSecuritytoGeneralSystemsTheory ................ 527
KeithD.Willett
Contents xi
28 SystemsThinkingandSecurity ............................ 553
KeithD.Willett
29 SecurityModelingandSimulation ......................... 573
KeithD.WillettandIvanTaylor
30 FoodSecurityandComplexDisasters ...................... 599
AshleyHydrickandElizabethDunn
31 CyberSecurityandDrones ............................... 619
PaoloCrippa
32 HealthSecurity ........................................ 635
MarissaJ.Levine
33 DisasterManagementofaMajorCBRNAccident ............ 661
MarcoCarbonelli,AlbaIannotti,andAndreaMalizia
34 CyberThreatsandNationalSecurity:TheUseandAbuse
ofArtificialIntelligence .................................. 679
RezaMontasari
PartII NationalDefense(CBRNE) ........................... 701
35 Chemical,Biological,Radiological,Nuclear,andExplosive
Threats:AnIntroduction ................................ 703
AugustusWayFountainIII
36 High-ThreatChemicalAgents:CurrentTrendsandFuture
Perspective ........................................... 709
EdenJoyPacsial-Ong
37 BiologicalAgents:ThreatandResponse .................... 739
JamesJ.ValdesandEricaR.Valdes
38 RadiologicalDispersalDevices:Detection,Response,and
Remediation .......................................... 771
GlenI.Reeves
39 NuclearSecurityScience ................................. 795
DavidLaGraffe
40 ExplosiveThreats:TheChallengestheyPresentand
ApproachestoCounteringThem .......................... 829
PeterJ.Hotchkiss