Home Integrating Federal Approaches to Post-Cyber Incident Mitigation
Article
Licensed
Unlicensed Requires Authentication

Integrating Federal Approaches to Post-Cyber Incident Mitigation

  • Austen D. Givens EMAIL logo and Nathan E. Busch
Published/Copyright: July 31, 2013

Abstract

This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.


Corresponding author: Austen D. Givens, King’s College London, London, UK, e-mail:

  1. 1

    Although unnamed sources claimed that US Immigration and Customs Enforcement networks were affected by the virus, the agency officially denied that its networks had been impacted.

  2. 2

    Perhaps anticipating the need for excellent interagency cooperation, this memorandum addresses fundamental principles of communication, for cybersecurity between DOD and DHS.

  3. 3

    We acknowledge that there are certain details about federal cybersecurity activities that remain classified, and therefore may exist outside the public domain. This article is based entirely on unclassified, open source material.

  4. 4

    This GAO reports underlines the need for more clearly defined cybersecurity requirements across DOD.

  5. 5

    The two primary DOD entities involved in cybersecurity operations are US Cyber Command (USCYBERCOM) and the National Security Agency (NSA). The Director of the NSA is dual-hatted as commander of USCYBERCOM. The two organizations work closely together, but there are clear dividing lines between their areas of responsibility and those of DHS.

  6. 6

    Open source cybersecurity strategy documents for the CIA or FBI do not appear to be available.

  7. 7

    Toomer provides an excellent discussion of the armed forces’ supporting role in the War on Drugs and managing the 1992 Los Angeles riots. Fischer draws an analogy between these real-worlds events and those occurring in the cyber arena.

  8. 8

    There has been vigorous debate about whether DOD involvement in offensive cyber operations should legally be considered covert action.

  9. 9

    While beyond the scope of this article, the lowering of the information sharing “wall” remains controversial. The USA PATRIOT Act, a landmark law that helped to advance this idea, remains a particular point of contention among civil libertarians and privacy advocates.

  10. 10

    The authors thank an anonymous reviewer for this suggestion.

  11. 11

    The Strategy underlines the importance of international partnerships in the development of cyberspace, which suggests that an expanded global role for DHS role would be consistent with the EOP’s thinking.

  12. 12

    We are careful here to distinguish between monitoring and regulation. The former (which we favor) involves passive collection and analysis of information. The latter involves actively controlling individual or organizational access to Internet resources, with or without legal justification.

References

Alexander, Keith (2010) “U.S. Cybersecurity Policy and the Role of USCYBERCOM.” Transcript of Remarks at the Center for Strategic and International Studies Cybersecurity Policy Debate Series. Retrieved May 1, 2012, from csis.org: http://csis.org/files/attachments/100603csis-alexander.pdfSearch in Google Scholar

Armed Forces (2012) Title 10, United States Code.Search in Google Scholar

Ashford, Warwick (2013) Former US Cyber Czar Howard Schmidt tells Business not to Wait for Government. Retrieved March 22, 2013, from computerweekly.com: http://www.computerweekly.com/news/2240177283/Former-US-cyber-czar-Howard-Schmidt-tells-business-not-to-wait-for-government.Search in Google Scholar

Best, Richard A. (2011) Covert Action: Legislative Background and Possible Policy Questions. Washington, DC: Congressional Research Service.Search in Google Scholar

Buchalter, Alice R. (2007) Military Support to Civil Authorities: The Role of the Department of Defense in Homeland Defense. Washington, DC: Federal Research Division, Library of Congress.Search in Google Scholar

Busch, Nathan E. and Austen D. Givens (2012) “Public-Private Partnerships in Homeland Security: Opportunities and Challenges,” Homeland Security Affairs, 8(1):1–24.Search in Google Scholar

Busch, Nathan E. and Austen D. Givens (2013) “Achieving Resilience in Disaster Management: The Role of Public-Private Partnerships,” Journal of Strategic Security, 6(2):1–19.10.5038/1944-0472.6.2.1Search in Google Scholar

Center for the Protection of National Infrastructure (n.d.) Cyber Incident Response (CIR) Service. Retrieved June 4, 2013, from http://www.cpni.gov.uk/about/Who-we-work-with/cir/.Search in Google Scholar

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidence. Washington, DC.Search in Google Scholar

Center for Strategic and International Studies (2011) Cybersecurity Two Years Later: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency. Washington, DC.Search in Google Scholar

Center for Strategic and International Studies (2013) Significant Cyber Incidents Since 2006. Washington, DC. Retrieved June 4, 2013, from http://csis.org/files/publication/130514_Significant_Cyber_Incidents_Since_2006_0.pdf.Search in Google Scholar

Chabinsky, Steven R. (2010) “Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line,” Journal of National Security Law & Policy, 4:27–39.Search in Google Scholar

Chesney, Robert M. (2012) “Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate,” Journal of National Security Law & Policy, 5:539–629.Search in Google Scholar

Chittister, Clyde G. and Yacov Y. Haimes (2011) “The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions,” Journal of Homeland Security and Emergency Management, 8(1):1–19.10.2202/1547-7355.1577Search in Google Scholar

Clapper, James R. (2013) Worldwide Threat Assessment to the Senate Select Committee on Intelligence. Retrieved March 22, 2013, from intelligence.gov: http://www.dni.gov/files/documents/Intelligence%20Reports/WWTA%20Remarks%20as%20delivered%2012%20Mar%202013.pdf.Search in Google Scholar

“Cyber Incidents Hit 90% of U.S. Firms” (2011) The Information Management Journal, 8.Search in Google Scholar

Deloitte (n.d.) Your Cyber Attack Mitigation Strategy? ‘Offline’ is not the Only Option. Retrieved June 3, 2013, from http://www.deloitte.com/assets/Dcom-Iceland/Local%20Assets/Documents/24607A%20Cyber%20attack.pdf.Search in Google Scholar

Department of Defense (2009) Memorandum to the Secretaries of the Military Departments from Robert Gates, Secretary of Defense, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations. Retrieved April 13, 2012, from http://info.publicintelligence.net/OSD05914.pdf.Search in Google Scholar

Department of Defense (2011) Department of Defense Strategy for Operating in Cyberspace.Search in Google Scholar

Department of Defense (2013) Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China. Retrieved June 4, 2013, from http://www.defense.gov/pubs/2013_china_report_final.pdf.Search in Google Scholar

Department of Homeland Security and Department of Defense (2010) Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity. Retrieved April 13, 2012, from dhs.gov: http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf.Search in Google Scholar

Department of Homeland Security (n.d.) Office of Cybersecurity and Communications. Retrieved March 22, 2013, from dhs.gov: http://www.dhs.gov/office-cybersecurity-and-communications.Search in Google Scholar

Department of Homeland Security (2010) National Cyber Incident Response Plan [Interim Version].Search in Google Scholar

Department of Justice (2004) Report From The Field: The USA PATRIOT Act At Work. Retrieved March 22, 2013, from http://www.justice.gov/olp/pdf/patriot_report_from_the_field0704.pdf.Search in Google Scholar

Dipert, Randall R. (2010) “The Ethics of Cyberwarfare,” Journal of Military Ethics, 9(4):394–410.10.1080/15027570.2010.536404Search in Google Scholar

Doyle, Charles (2002) The USA Patriot Act: A Sketch. Retrieved May 7, 2012, from http://www.fas.org/irp/crs/RS21203.pdf.Search in Google Scholar

Dunlap, Charles J. (2011) “Perspectives for Cyber Strategists on Law for Cyberwar,” Strategic Studies Quarterly, 5(1):81–99.Search in Google Scholar

Etzioni, Amitai (2011) “Cybersecurity in the Private Sector,” Issues in Science and Technology, 28(1):58–62.Search in Google Scholar

Federal Bureau of Investigation (2012) National Cyber Security Awareness Month 2012: Are You the Weakest Link? Retrieved March 22, 2013, from fbi.gov: http://www.fbi.gov/news/news_blog/national-cyber-security-awareness-month-2012.Search in Google Scholar

Federal Emergency Management Agency (2013) Cyber Attack. Retrieved June 4, 2013, from http://www.ready.gov/cyber-attack.Search in Google Scholar

Federal Laboratory Consortium for Technology Transfer (2013) Spotlight On: Air Force Research Laboratory-Rome Research. Retrieved March 22, 2013, from Site: http://www.flcnortheast.org/200607_03.html.Search in Google Scholar

Fischer, Eric A. (2011) Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions. Washington, DC: Congressional Research Service.Search in Google Scholar

Flowers, Angelyn, Sherali Zeadally and Acklyn Murray (2013) “Cybersecurity and US Legislative Efforts to address Cybercrime,” Journal of Homeland Security and Emergency Management, 10(1):1–27.10.1515/jhsem-2012-0007Search in Google Scholar

Givens, Austen D. and Nathan E. Busch (2013a) “Information Sharing and Public-Private Partnerships: The Impact on Homeland Security,” Homeland Security Review 7(2), forthcoming.Search in Google Scholar

Givens, Austen D. and Nathan E. Busch (2013b) “Realizing the Promise of Public-Private Partnerships in US Critical Infrastructure Protection,” International Journal of Critical Infrastructure Protection, 6(1):39–50.10.1016/j.ijcip.2013.02.002Search in Google Scholar

Grewe, Barbara A. (2004) Legal Barriers to Information Sharing: The Erection of a Wall Between Intelligence and Law Enforcement Investigations. Commission on Terrorist Attacks Upon the United States Staff Monograph. Retrieved May 7, 2012, from: http://www.fas.org/irp/eprint/wall.pdf.Search in Google Scholar

Groll, Elias (2013) NSA Swears Its Spy Programs Are No Big Deal in PRISM Spin War, Round Two. Retrieved July 17, 2013, from foreignpolicy.com: http://blog.foreignpolicy.com/posts/2013/06/17/prism_spin_war_round_two_nsa_swears_its_intel_programs_are_no_big_deal.Search in Google Scholar

Guinchard, Audrey (2011) “Between Hype and Understatement: Reassessing Cyber Risks As Security Strategy,” Journal of Strategic Security, 4(2):75–96.10.5038/1944-0472.4.2.5Search in Google Scholar

Harknett, Richard J. and James A. Stever (2009) “The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen,” Journal of Homeland Security and Emergency Management, 6(1):1–14.10.2202/1547-7355.1649Search in Google Scholar

Harknett, Richard J., John P. Callaghan and Rudi Kauffman (2010) “Leaving Deterrence Behind: War-Fighting and National Cybersecurity,” Journal of Homeland Security and Emergency Management, 7(1):1–24.10.2202/1547-7355.1636Search in Google Scholar

Hayden, Michael (2011) The Cyber Threat. Statement for the Record, House Permanent Select Committee on Intelligence. Retrieved March 22, 2013, from http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/100411CyberHearingHayden.pdf.Search in Google Scholar

Hollis, David M. (2010) “USCYBERCOM: The Need for a Combatant Command versus a Subunified Command,” Joint Forces Quarterly, 58(3):48–53.Search in Google Scholar

Homeland Security Act (2002) Pub. L. No. 107-296, 116 STAT. 2135.Search in Google Scholar

Johnson, Nicole (2012) DHS to Hire 600 Cyber Professionals. Retrieved March 22, 2013, from federaltimes.com: http://blogs.federaltimes.com/federal-times-blog/2012/10/31/dhs-to-hire-600-cyber-professionals/Search in Google Scholar

Kaiser, Tiffany (2011) Former CIA/NSA Head: Cyber Security Threats \u201bHorribly Overclassified.’ Retrieved March 22, 2013, from dailytech.com: http://www.dailytech.com/Former+CIANSA+Head+Cyber+Security+Threats+Horribly+OverClassified/article22953.htm.Search in Google Scholar

Kaplan, Jeremy A. (2010) Beware of Link: E-Mail Virus Plays Havoc with Internet. Retrieved May 16, 2012, from foxnews.com: http://www.foxnews.com/scitech/2010/09/09/beware-link-e-mail-virus-plays-havoc-internet/.Search in Google Scholar

Lowenberg, Timothy J. (n.d.) The Role of the National Guard in Homeland Defense and Homeland Security. National Guard Association of the United States. Retrieved May 7, 2012, from: http://www.ngaus.org/ngaus/files/ccLibraryFiles/Filename/000000000457/primer%20fin.pdf.Search in Google Scholar

Lynn, William J. (2010) “Defending a New Domain,” Foreign Affairs, 89(5):97–108.Search in Google Scholar

Mandiant (2013) APT1: Exposing One of China′s Cyber Espionage Units. Retrieved March 22, 2013, from http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.Search in Google Scholar

McConnell, Michael, Michael Chertoff and William Lynn (2012) “China’s Cyber Thievery Is National Policy – And Must Be Challenged,” The Wall Street Journal, Retrieved June 4, 2013 from ABI/INFORM Complete.Search in Google Scholar

McCullagh, Declan (2012) Opposition Grows to CISPA ′Big Brother′ Cybersecurity Bill. cnet.com. Retrieved May 16, 2012, from http://news.cnet.com/8301-31921_3-57419540-281/opposition-grows-to-cispa-big-brother-cybersecurity-bill/.Search in Google Scholar

McGraw, Gary (2013) “Cyber War Is Inevitable (Unless We Build Security In),” Journal of Strategic Studies, 36(1):109–119.10.1080/01402390.2012.742013Search in Google Scholar

Mills, Elinor (2010) ′Here You Have′ Virus Spreading Through the Internet. CBSNews.com. Retrieved May 16, 2012, from: http://www.cbsnews.com/8301-501465_162-20016098-501465.html?tag=contentMain;contentBody.Search in Google Scholar

Mueller, Robert (2012) Statement before the Senate Committee on Homeland Security and Governmental Affairs. Retrieved March 22, 2013, from fbi.gov: http://www.fbi.gov/news/testimony/homeland-threats-and-agency-responses.Search in Google Scholar

Mueller, Robert (2013) Remarks at RSA Cyber Security Conference. Retrieved March 22, 2013, from fbi.gov: http://www.fbi.gov/news/speeches/working-together-to-defeat-cyber-threats.Search in Google Scholar

Nakashima, Ellen (2010a) “White House Declassifies Outline of Cybersecurity Program,” The Washington Post. Retrieved May 17, 2012, from: http://www.washingtonpost.com/wp-dyn/content/article/2010/03/02/AR2010030202113.html.Search in Google Scholar

Nakashima, Ellen (2010b) “Pentagon is Debating Cyber-Attacks,” The Washington Post. Retrieved May 15, 2012, from http://www.washingtonpost.com/wp-dyn/content/article/2010/11/05/AR2010110507464.html.Search in Google Scholar

Nakashima, Ellen (2013a) “U.S. said to be Target of Massive Cyber-Espionage Campaign,” The Washington Post. Retrieved June 4, 2013 from http://www.washingtonpost.com/world/national-security/us-said-to-be-target-of-massive-cyber-espionage-campaign/2013/02/10/7b4687d8-6fc1-11e2-aa58-243de81040ba_story.html.Search in Google Scholar

Nakashima, Ellen (2013b) “Confidential Reports Lists Weapons System Designs Compromised by Chinese Cyberspies.” The Washington Post. Retrieved June 4, 2013, from http://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html.Search in Google Scholar

National Commission on Terrorist Attacks Upon the United States (2004) The 9/11 Commission Report. Retrieved March 22, 2013, from http://www.9-11commission.gov/report/911Report.pdf.Search in Google Scholar

National Institute of Standards and Technology (2011) National Initiative for Cybersecurity Education Strategic Plan: Building a Digital Nation [DRAFT].Search in Google Scholar

Newmeyer, Kevin P. (2012) “Who Should Lead U.S. Cybersecurity Efforts?” Prism, 3(2): 115–126.Search in Google Scholar

Nojeim, Greg T. (2010) “Cybersecurity and Freedom on the Internet,” Journal of National Security Law & Policy, 4:119–137.Search in Google Scholar

Office of the Director of National Intelligence (n.d.) Intelligence Reform and Terrorism Prevention Act of 2004. Retrieved March 22, 2013, from dni.gov: http://www.dni.gov/index.php/about/organization/ic-legal-reference-book-2012/ref-book-irtpa.Search in Google Scholar

Sanger, David E. (2013) “U.S. Blames China’s Military Directly for Cyberattacks,” The New York Times. Retrieved June 4, 2013, from http://www.nytimes.com/2013/05/07/world/asia/us-accuses-chinas-military-in-cyberattacks.html?pagewanted=all&_r=0;.Search in Google Scholar

Sanger, David E. and John Markoff (2009) “Obama Outlines Coordinated Cyber-Security Plan,” The New York Times. Retrieved May 17, 2012, from: http://www.nytimes.com/2009/05/30/us/politics/30cyber.html.Search in Google Scholar

Schneider, Anne and Helen Ingram (1990) “Behavioral Assumptions of Policy Tools,” The Journal of Politics, 52(2):510–529.10.2307/2131904Search in Google Scholar

Seventeen Agencies and Organizations United Under One Goal (n.d.) intelligence.gov Retrieved March 22, 2013, from intelligence.gov: http://www.intelligence.gov/about-the-intelligence-community/.Search in Google Scholar

Sharp, Walter G. (2010) “The Past, Present, and Future of Cybersecurity,” Journal of National Security Law & Policy, 4:13–26.Search in Google Scholar

Shaughnessy, Larry (2011) 10 Years of War: Missiles and Horses. Retrieved May 17, 2012, from cnn.com: http://security.blogs.cnn.com/2011/10/03/war-in-afghanistan-started-with-cruise-missiles-stealth-bombers-and-horses/.Search in Google Scholar

Slabodkin, Greg (2013) Air Force Plans to Hire 1,000 Cyber Warriors Starting in Fiscal 2014. Retrieved March 22, 2013, from fiercegovernmentit.com: http://www.fiercegovernmentit.com/story/air-force-Plans-Hire-1000-Cyber-Warriors-Starting-Fiscal-2014/2013-01-23.Search in Google Scholar

Toomer, Jeffrey K. (2002) A Strategic View of Homeland Security: Relooking the Posse Comitatus Act and DOD’s Role in Homeland Security. Retrieved April 21, 2012, from dtic.mil: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA403866.10.21236/ADA403866Search in Google Scholar

Tuutti, Camille (2012) What Cyber Czar′s Departure Means for White House Cyber Priorities. Retrieved March 24, 2013, from fcw.com: http://fcw.com/articles/2012/05/22/howard-schmidt-impact-cyber-priorities.aspx.Search in Google Scholar

The White House (2003) Homeland Security Presidential Directive 5: Management of Domestic Incidents. Retrieved April 13, 2012, from http://www.fas.org/irp/offdocs/nspd/hspd-5.html.Search in Google Scholar

The White House (2009a) Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. Retrieved July 18, 2013, from http://www.whitehouse.gov/documents/cyberspace_policy_review_final.pdf.Search in Google Scholar

The White House (2009b) Remarks By The President On Securing Our Nation′s Cyber Infrastructure. Retrieved May 1, 2012, from http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure.Search in Google Scholar

The White House (2010) Comprehensive National Cybersecurity Initiative.Search in Google Scholar

The White House (2011) International Strategy for Cyberspace: Prosperity, Security, and Opennness in a Networked World. Retrieved July 18, 2013, from http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.Search in Google Scholar

The White House (2013) Presidential Policy Directive – Critical Infrastructure Security and Resilience. Retrieved March 22, 2013, from http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil. United States Computer Emergency Readiness Team (n.d.) About Us. Retrieved June 4, 2013, from https://www.us-cert.gov/about-us/.Search in Google Scholar

Uniting and Strengthening America by Providing Appropriate Tools to Intercept and Obstruct Terrorism (USA PATRIOT Act) of 2001, Pub. L. No. 107-56, 115 STAT. 272 (2001).Search in Google Scholar

U.S. Army Corps of Engineers (2011) Hurricane and Storm Damage Risk Reduction: Background Information. Retrieved May 17, 2012, from http://www.mvn.usace.army.mil/hps2/hps_background.asp.Search in Google Scholar

“U.S. Cities, States Fight PATRIOT Act” (2003) The Information Management Journal, 12.Search in Google Scholar

U.S. Government Accountability Office (2011a) Cybersecurity: Continued Attention Needed to Protect Our Nation’s Cyber Infrastructure. Statement of Gregory C. Wilshusen Before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, U.S. House of Representatives.Search in Google Scholar

U.S. Government Accountability Office (2011b) Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities. Report No. GAO-11-75.Search in Google Scholar

U.S. Government Accountability Office (2011c) Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities. Report No. GAO-11-421.Search in Google Scholar

Westby, Jody R. (2007) Homeland Security v. Homeland Defense: Gaps Galore. Paper for St. Mary′s University School of Law, Center for Terrorism Law.Search in Google Scholar

White, Brian M. and Gus P. Coldebella (2010) “Foundational Questions Regarding the Federal Role in Cybersecurity,” Journal of National Security Law & Policy, 4:233–245.Search in Google Scholar

Published Online: 2013-07-31
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Articles in the same Issue

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Downloaded on 26.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0001/html
Scroll to top button