Hakim / Blackstone | Safeguarding Homeland Security | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 292 Seiten

Hakim / Blackstone Safeguarding Homeland Security

Governors and Mayors Speak Out
1. Auflage 2009
ISBN: 978-1-4419-0371-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Governors and Mayors Speak Out

E-Book, Englisch, 292 Seiten

ISBN: 978-1-4419-0371-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



The terrorist attack of September 11, 2001, and the natural disasters of Hurricanes Katrina and Rita demonstrated the challenges that governments face in initial response and recovery efforts. This book details the important steps that governors and mayors have initiated to address the serious problems illustrated by these recent disasters. The innovative solutions include developing more reliable communications, creating public-private partnerships to supplement public emergency services, establishing fusion c- ters that interpret information, and creating joint operations centers to manage the response to the event. There are important lessons to be learned from the managerial and technological innovations that the governors and mayors describe in this book. As the Mayor of Philadelphia and now as the Governor of Pennsylvania, I have contributed to three books on best practices of state and local governments. I am pleased to participate in the efforts of the Center for Competitive Government of the Fox School at Temple University to address the important issues faced by governments. This book makes an important contribution to the public discussion on the public and private sectors' role in homeland security. Commonwealth of Pennsylvania Governor Edward G. Rendell vii Acknowledgement The editors would like to acknowledge Dr. M. Moshe Porat, Dean of the Fox School at Temple where the Center for Competitive Government is located. His strong c- tribution and support for the Mayors' Summits is most appreciated. Many chapters for our books including this one emanated from these Summits.

Hakim / Blackstone Safeguarding Homeland Security jetzt bestellen!

Weitere Infos & Material


1;Foreword;5
2;Acknowledgement;6
3;Contents;7
4;Contributors;9
5;About the Editors;11
6;1 The Role of the Private Sector in Homeland Security;12
6.1; Introduction;12
6.2; Background;13
6.3; Restructuring Public Emergency Services;15
6.4; Engaging the Private Sector in Homeland Security;18
6.5; Establishing Regulated Insurance Programs;22
6.6; Employing Technology;26
6.7; Conclusions;29
7;References;31
8;2 Creating the Boston Medical Reserve Corps;33
8.1; Introduction;33
8.2; The Boston Medical Reserve Corps;34
8.2.1; Volunteer Recruitment;34
8.2.2; Basic Training;35
8.2.3; Leadership Training;36
8.2.4; Lectures to Maintain Interest of Volunteers ;37
8.2.5; Exercises;38
8.3; Support for Non-CRI Events;39
8.4; Future;40
9;3 The Hierarchy of Emergency Preparedness;41
9.1; Local Threats;42
9.2; The Hierarchy of Emergency Preparation;42
9.3; Individual Cooperation;43
9.4; Organizational Cooperation;44
9.5; A Regional Model;45
9.6; Local Government Cooperation;46
9.7; Technological Cooperation;47
9.8; Conclusion;49
10;4 Border Security and State Safety and Security: Addressing Common Agendas;51
10.1; Introduction;51
10.2; Safeguarding the Borders;53
10.3; State and Local Cooperation on the Southern Border;53
10.4; Volunteer Groups and State Defense Forces;55
10.5; On the Northern Border;56
10.6; Infrastructure Improvement;57
10.7; Interior Enforcement;58
10.8; Conclusion;60
10.9; Notes;60
11;5 Lessons Learned from the 2004 Atlantic Hurricane Season: How This Highly Active Year Helped Jacksonville, Florida, Build a Better Emergency Response System;63
11.1; Development of Standard Operating Guidelines for Internal and External Communication Procedures;65
11.2; Improving the Management Procedures of the Special Needs Database;66
11.3; Development of Policy and Guidelines Outlining Expectations of FEMA and Mutual Aid Reimbursements;67
11.4; Development of a Duval County Debris Management Plan;68
11.5; Development of Standard Operating Guidelines for Meeting Human Needs;69
11.6; Mandatory Emergency Operations Center Training;70
11.7; Conclusion;70
12;6 Disaster Management: Privatization as a Viable Alternative;71
12.1; The Ideal Disaster Organization;71
12.2; A Critical Introspection;72
12.3; A Complementary Path: Privatization;72
12.3.1; Privatized Disaster Market;73
12.3.2; Private Market Attractions;73
12.4; People Power;73
12.5; A Case Study in Israel;74
12.5.1; Ready to Pay;74
12.5.2; Quality Services;75
12.5.3; Family Safety Net;75
12.5.4; Seeking Information;76
12.5.5; Who Wants to Pay?;76
12.5.6; Are the Rich Safer?;77
12.5.7; A Social Decision;77
12.5.8; Organizational Adaptation;78
12.5.8.1; Sharing Resources;78
12.5.8.2; Manpower Reserves;78
12.5.8.3; NGO Volunteers;79
12.5.8.4; Flexibility and Change;79
12.6; Pros and Cons;79
12.7; Notes;80
13;References;81
14;7 Caring for the Evacuees from Hurricane Katrina and Rita;82
14.1; Introduction;82
14.2; What Happened;83
14.3; Lessons Learned;85
14.3.1; Carefully Defining Goals;85
14.3.2; Break Big Jobs Down into Manageable Tasks and Empower Those Assigned the Task to Make Decisions;86
14.3.3; Enlist the Most Competent People in Organizations for each Task;86
14.3.4; Strict Accountability;87
14.3.5; Improvise and Use What Works;87
15;8 Sheltering and Evacuating from Hurricanes Katrina and Rita;89
15.1; Contributing Factors;93
15.2; Managerial Strategies;93
15.3; Technological Strategies;94
15.4; In Conclusion;94
16;9 Local Government Contingency Planning for Public Security and Public Safety Innovative and Remedial Efforts;95
16.1; Introduction;95
16.2; Innovative Security and Safety Approaches Regional Logistics Center;96
16.2.1; Emergency Response and Recovery Gap;96
16.2.2; Enhance Logistics Capabilities;98
16.2.3; Defining the Role of an RLC;99
16.2.4; A Public--Private Partnership Approach;100
16.3; Innovative Security and Safety Approaches Inter-metropolitan Municipal Mutual Aid Agreements;100
16.4; Contingency Planning;103
16.4.1; Reverse 911;103
16.4.2; Evacuation Transportation Capacity;103
16.4.3; Coordinated Regional Evacuation Planning;104
16.4.4; Role of the Mass Media;104
16.4.5; Hosting Emergency Evacuees;105
16.4.6; Emergency Planning Scale;105
17;10 Technological and Regional Cooperation Strategies: Securing the City and Port of Oakland, California;107
17.1; The Port of Oakland;109
17.2; Protecting the Port Infrastructure;109
17.3; Interagency Cooperation and Collaboration;110
17.4; Real Life Scenario: The M/V COSCO BUSAN;111
17.5; Regional Collaboration Efforts;113
17.6; Regional Exercises and Skill Building;114
17.7; Maritime Interdiction Training;115
17.8; Real-Life Scenario: I-80at I-580/I-880 Freeway Deck Collapse;116
17.9; Real-Life Scenarios: Loma Prieta Earthquake and OaklandHills Fire;116
17.10; Enabling Technologies;118
17.11; Interoperable Communications;118
17.12; Data Sharing, Reporting, and Analysis Strategies;119
17.13; Acoustic Sensor and Image-Processing Technologies;120
17.14; Surveillance Camera Technologies;120
17.15; Oaklands Citywide Broadband Wireless Initiative;121
17.16; Vision for the Future Resources and Funding;121
17.16.1; Port and City of Oakland Integrated Monitoring and Coordination System ;121
17.17; Contributors;124
17.18; Notes;124
18;11 Innovative Anti-terror Information Sharing: Marylands Federal, State, and Local Partnership Model;125
18.1; Introduction;125
18.2; Partnerships Produce Results;125
18.3; Fusion Centers: A New Approach to Information Sharing;126
18.3.1; What is a Fusion Center?;126
18.3.2; What Do Fusions Centers Do?;127
18.3.3; Case Study: Part 1;128
18.3.3.1; London, England -- August 2006;128
18.4; An Overview of the MCAC;128
18.4.1; Brief History;128
18.4.2; Mission;129
18.4.3; Organizational Structure;130
18.4.3.1; The Watch Section;130
18.4.3.2; The Strategic Analysis Section;131
18.4.3.3; The Role of the Public;131
18.4.4; Products;132
18.4.5; Governance and Leadership;133
18.4.6; Case Study: Part 2;133
18.4.6.1; Baltimore, Maryland -- October 2006;134
18.5; The Value of the MCACs Information-Sharing Function;134
18.5.1; Case Study: Part 3;135
18.6; Conclusion;136
18.7; Notes;136
19;12 Public Safety and Homeland Security Solutions: An Evolution of Technology and Policy;138
19.1; Pennsylvanias Public Safety Continuum;138
19.2; The Starting Point Justice Silos;139
19.2.1; Technology and Policy Factors -- Justice Silos;139
19.3; Significant Event 1994 Pennsylvania Gubernatorial Race;140
19.4; Pennsylvanias Integrated Justice;140
19.4.1; Background;140
19.4.2; Technology and Policy Factors -- Integrated Justice;141
19.4.3; Pennsylvania--s Integrated Justice Initiative -- JNET;142
19.4.3.1; JNET Technology Advances;143
19.4.3.2; JNET Service Expansion;143
19.4.3.3; JNET Data Standards -- Proprietary, GJXDM, and NIEM;143
19.4.3.4; JNET Business Reference Model;145
19.4.3.5; JNET Governance;145
19.5; Significant Events September 11 and Katrina;146
19.6; Pennsylvanias Homeland Security;146
19.6.1; Background;146
19.6.2; Technology and Policy Factors -- Homeland Security;147
19.6.3; Pennsylvania Homeland Security Initiatives;148
19.6.3.1; Governance;148
19.6.3.2; The Fusion Environment;149
19.6.3.3; Challenges;149
19.6.3.4; Pennsylvania--s Fusion Starting Point -- PaCIC;149
19.6.3.5; Anticipated Challenges;150
19.6.3.6; Fusion Data Standards;150
19.6.3.7; Fusion Business Reference Model;150
19.6.3.8; Fusion Alignment;151
19.6.3.9; Identity Protection and Management;152
19.6.3.10; Continuity of Government;152
19.7; Planning for the Future;153
19.7.1; Device Convergence;153
19.7.2; IT Commoditization;153
19.7.3; Conclusions -- From Technology to Policy;154
19.8; Glossary;155
20;13 Utilizing Technology Within the Delaware Information and Analysis Center;156
20.1; Introduction;156
20.2; Concept and Development of the Delaware Information and Analysis Center (DIAC);157
20.3; Technological Systems;158
20.4; Current Status of the DIAC;161
20.5; Information Resources;163
20.6; Products;163
20.7; Privacy and Civil Liberties;163
20.8; Conclusion;163
21;References;164
22;14 From Curiosity to Collaboration: Leveraging Technology to Improve Situational Awareness;165
22.1; Business Issues and Background;166
22.2; EVOC and Its Supporting Technologies;169
22.3; Case Study: Windy Ridge Wildfire;174
22.4; Case Study: Golden Guardian 2007;176
22.5; Future Plans for EVOC;178
22.6; Conclusion;181
22.7; Notes;182
23;15 How a Midwestern Digital City Serves and Protects the Public;183
23.1; One Villages Response;184
23.2; The New Surveillance;185
23.3; Praise from Constituents;186
23.4; Taking the Next Step;187
23.5; Introducing Red Light Technology;187
23.6; More Plans for Technology;189
23.7; What We Have Learned;189
24;16 Hurricanes and Modern Communications Infrastructure;191
24.1; Hurricane Experience;192
24.2; Actions Taken;194
24.2.1; Public Safety Radio System;194
24.2.2; Data Network;194
24.2.3; Telephone System;195
24.2.4; Amateur Radio;195
24.3; Conclusion;195
25;17 The First Line of Defense: Cities Using Technology in Homeland Defense;196
25.1; About Providence;197
25.2; MESH Network;198
25.3; How It Works;199
25.4; What Precipitated the Move to MESH;199
25.5; The Comparison Between Old and New systems;200
26;18 Full Interoperability for All South Dakota Public Safety;202
26.1; Several Radio Frequencies in Use;202
26.2; Agencies Cannot Talk When Most Needed;203
26.3; Legislature Took Action in 1999;203
26.4; Funding Found;204
26.5; Motorolas VHF Solution Best for South Dakota;204
26.6; One Frequency Ensures a Smooth Transition to the Statewide System;204
26.7; Digital Radios Outperformed Analog Radios;204
26.8; Data, Not Just Voice, Travels the System;205
26.9; Trunking Technology Ensures Optimal System Performance;205
26.10; Radio System Coverage Best It Can Be;206
26.11; Digital Radios Act Like Computers;207
26.12; Radio System Works Like Telephone System;208
26.13; State Will Maintain a State-of-the-Art Radio System;208
26.14; Talk Groups are Facilitated;209
26.15; New Radios Can Be Used on Existing Radio Systems;209
26.16; State and Locals Can Make Radio System Succeed;209
26.17; Easier, Least Costly Migration Path;209
26.18; State Continues to Expand System;210
26.19; One-of-a-Kind System;210
27;19 Evolutionary Planning for the Technology Revolution;211
27.1; Introduction;211
27.2; Background;212
27.3; Plan, Plan, Plan;212
27.4; The Rebooted LEADS Plan;214
27.5; Planning Produces Results;217
27.6; Managing the Winds of Change;218
27.7; Planning for the Future;219
28;20 History of Regional Unified and Integrated Public Safety and Public Service Communication and Transportation Systems;221
28.1; Background and Statement of the Problem;221
28.2; Forming the Coalition;222
28.3; Details of the Individual Integrated Projects;223
28.3.1; Regional Radio System;223
28.3.2; State Radio Coalition;224
28.3.3; Computer-Aided Dispatch;225
28.4; Mobile Data Computer;227
28.5; Combined Transportation, Emergency and Communications Center (CTECC);229
28.6; Regional System Operations;231
28.7; Regional System Yields Benefits;233
29;21 Interoperability in the City of Tampa: A Partnership with the Department of Homeland Security;236
29.1; Design of the Regional Technology Program;238
29.2; Implementation;240
29.3; Conclusion;242
30;22 Capital Connections: Washingtons Public Safety Communications Suite;243
30.1; Introduction;243
30.2; Getting It Together: A Comprehensive Public Safety Communications Suite;244
30.3; Getting Over the Hurdles: Obstacles and Challenges;252
30.4; Conclusion;254
31;23 Information, Leadership and Decisiveness, All in One Room;255
31.1; Introduction;255
31.2; Our Joint Operations Center;256
31.3; Consolidated Response a Growing Tradition;257
31.4; One Night in the Joint Operations Center;259
31.5; The Extended Joint Operations Center;260
31.6; Conclusion;261
32;24 Beyond an Information Technology Approach to Continuity of Operations: The Commonwealth of Virginia Story;262
32.1; Introduction;263
33;25 The Soft Stuff is Still the Hard Stuff;270
33.1; Build the Governance Scaffold;272
33.2; Understanding the Strategic Interplay of People, Process, and Technology ;276
33.2.1; People;278
33.2.2; Technology;280
33.2.3; Process;282
33.3; In Conclusion;284
33.4; Appendix: Primer in Security Technologies;285
34;Index;287



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.