List of Selected Homeland Security References and Resources

Revised August 15, 2010

Prepared by Paula D. Gordon, Ph.D.

Inclusion in this list does not imply endorsement.
**Two asterisks indicated that an item has been added or modified since May 25, 2010.

***Three asterisks indicate that an item has been added or modified since August 15, 2010.

Table of Contents for Parts 1 and 2

Part 1
1) Selected homeland security and critical infrastructure articles, reports, and books
2) Cyber concerns including vulnerable systems and Y2K-related lessons and legacies for homeland security
3) Selected government documents: legislation, congressional documents, public laws, executive orders, and presidential directives
4) Information concerning some selected government efforts
5) Task groups, partnerships, consortia, councils, commissions, and other efforts
6) Public health and safety-related concerns, including pandemic flu concerns
7) Communication, monitoring, and tracking concerns
8) Online portals, Web sites, resources, and libraries of particular note

Part 2

9) Selected newsletters and other publications
10) Conferences, workshops, and symposia proceedings
11) Policy and program planning, implementation and management concerns
12) Technical information and technology innovation
13) Emergency preparedness, mitigation, response, recovery, resilience, and contingency planning and management, and continuity of operations planning
14) FEMA, DHS, and Hurricane Katrina

15) NEW: The 2010 Gulf Oil Spill

16) Education, training, and internship initiatives
17) Terrorism-related references and resources
18) Miscellaneous

Part 1

[NOTE: See Part 2 of the Extensive List of HS & EM References and Resources for Categories 9 through 18 posted in the Files Section at and

.]

1) Selected Homeland Security and Critical Infrastructure Articles, Reports, and Books

American Society for Civil Engineers annual reports cards on the status of the nation's infrastructure: See Also see "Renewing America's Infrastructure - A Citizen's Guide", 2001 at

American Society for Civil Engineers, The Critical Infrastructure Partnership,

Brookings Institution - Protecting the American Homeland: A Preliminary Analysis (May 2002, revised May 2003). See

Council on Foreign Relations, Gary Hart and Warren B. Rudman, Co-Chairs, Terrorism Task Force Report "America Still Unprepared - America Still in Danger," (November 14, 2002) ID: 173844. See

Robert F. Dacey, Director, Information Security Issues, "Computer Security: Progress Made, But Critical Federal Operations and Assets Remain at Risk", Testimony before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, November 19, 2002.

Robert F. Dacey, Director, Information Security Issues, "Critical Infrastructure Protection: Significant Challenges Need to Be Addressed", Testimony before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, July 24, 2002, Oversight Hearing on "Cyber-terrorism: Is the Nation's Critical Infrastructure Adequately Protected?" GAO-02-961T.

Robert C. Dacey, “Information Security: Progress Made but Challenges remain to Protect Federal Systems and the Nation’s Critical Infrastructure,” Congressional Testimony on Technology, Information Policy, Intergovernmental Relations and the Census, Committee on Government Reform, House of Representatives, Washington, DC: GAO, April 08, 2003.

*Darrell L. Darnell, GWU, 6/23/10 Transcript of Forum Presentation: Critical Infrastructure and Key Resources; Protection and Resilience ( ).

Ronald L. Dick, Director, National Infrastructure Protection Center, Federal Bureau of Investigation, Statement before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, Oversight Hearing on "Cyber-terrorism: Is the Nation's Critical Infrastructure Adequately Protected?" July 24, 2002. GAO-03-303T.

LTC Bill Flynt, "Capabilities Required to Perceive Cyber Attacks Against Distributed Complex Systems", Paper presented at InfowarCon 2002, Washington, DC, September 5, 2002.

Gartner Group, The Results of the Digital Pearl Harbor War Game. See
Gartner Group, Sector 5 Conference, August 21 - 23, 2002. See C-SPAN Archives at or view online at .

Jeffrey R. Gaynor, "Critical Infrastructure Protection/Assurance," A 21st Century National and Homeland Security Imperative, Presentation to: Computer Security and Information Assurance V: Best Practices and Lessons Learned Conference, Potomac Forum, Ltd., Washington, D.C., January 23, 2002.

Joel N. Gordes, "Cyberthreats and Grid Vulnerability," Paper presented at InfowarCon 2002, Washington, DC, September 5, 2002.

Paula D. Gordon, "Education and Training Initiatives Needed to Address Threats and Challenges to Homeland Security," August 14, 2002. See Also see

Paula D. Gordon, "Improving Homeland Security and Critical Infrastructure Protection and Continuity Efforts," March 25, 2003. Posted at

*Paula D. Gordon, “ The Homeland Security Impact Scale: An Alternative Approach to Assessing Homeland Security and Critical Infrastructure Protection Efforts and a Frame of Reference for Understanding and Addressing Current Challenges” in “Improving Homeland Security & Critical Infrastructure Protection and Continuity Efforts.” ( use link at .

Paula D. Gordon, Improving Homeland Security - Continuing Challenges and Opportunities.
Presentation to EIIP Virtual Forum, 3/24/2004 . Posted at

“John Koskinen's Responses to Questions from Paula Gordon Concerning National and Global Aspects of Y2K, March 22, 2000 (With Notes Added 4/4/2000)". Posted at or click on link at .

Paula D. Gordon, "Strategic Planning and Y2K Technology Challenges: Lessons and Legacies for Homeland Security". PA TIMES, Vol. 24, No. 11, November 2001. Also see

Paula D. Gordon, "Infrastructure Threats and Challenges: Before and After September 11, 2001". PA Times, 24:12, December 2001, and Journal of Homeland Security, April 16, 2002. Also see

Paula D. Gordon, "International Relations and National Agendas After September 11, 2001". PA TIMES, Vol. 25, Issue 2, February 2002. Also see

Paula D. Gordon, "Selected Homeland Security References and Resources," Business Briefing: Exploration and Production, Markets Research Centre, January 2003. See

Paula D. Gordon, "Using E-Technology to Advance Homeland Security Efforts". PA TIMES, Vol. 25, No. 1, January 2002. Also see

Paula D. Gordon, "Comparative Scenario and Options Analysis: Important Tools for Agents of Change Post 9/11 and Post Hurricane Katrina," Homeland Security Review, Vol. 1 No. 2, 2006. Also posted at or

Heritage Foundation - Homeland Security Task Force Report, January 2002,

Robert Lemos, "Nation's Infrastructure Far from Secure". December 2, 2002, ZDNet (article about the views of Ken Watson, head of the Partnership for Critical Infrastructure Security, on the nation's infrastructure.)

Ted G. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley, 2006, ISBN - 13: 978-0-471-78628-3 and ISBN - 10 #047178284 (A CD accompanies the book.) (Note: The Lewis text on Critical Infrastructure Protection includes numerous technical portions that would be of particular interest to engineers and others with an extensive technical background.)

Richard G. Little, "Controlling Cascading Failure: Understanding the Vulnerabilities of Interconnected Infrastructures," Journal of Urban Technology, 9:1 (2002) 109 -123.

Richard G. Little, "Educating the Infrastructure Professional: A New Curriculum for a New Discipline," Public Works Management & Policy, 4:2 (October 1999) 93 - 99.

Richard G. Little, "Understanding and Controlling Cascading Failure: A Systems Approach to Multi-Hazard Mitigation." Presented at the 9th Annual Conference of the International Emergency Management Society Facing the Realities of the Third Millennium, May 14 - 17, 2002, Waterloo, Ontario, Canada.

Richard G. Little, "The Role of Organizational Culture and Values in the Performance of Critical Infrastructure Systems" 10/11/2004. For abstract see

J.D. Moteff, "Critical Infrastructures: Background, Policy, and Implementation" Updated July 30, 2002, Report to Congress, Congressional Research Service (December 2001),

J.D. Moteff, Claudia Copeland, and John Fischer, "Critical Infrastructures: What Makes an Infrastructure Critical?" August 30, 2002,

National Research Council, Board on Infrastructure and the Constructed Environment, Protecting People and Buildings from Terrorism: Technology Transfer for Blast-effects Mitigation, National Academy of Sciences Press, 2001.

Eric Pianin, Marc Kaufman, Lucy Shackelford, et al., "How Experts Grade Homeland Security," The Washington Post, September 10, 2002, pp. A20 - A21.

Michael Scardaville and Jack Spencer, "9/11 One Year Later: Progress and Promise," Heritage Foundation Backgrounder No. 1584, September 10, 2002.
See

See the website of the Satellite Industry Association ( ) for papers on Satellites as Critical Infrastructure and The Role of Satellites in Homeland Security.

The Center for Strategic International Studies (CSIS) conducted simulation called Silent Vector in October 2002. The simulation was "of an increasingly credible but ambiguous terrorist attack on U.S. critical energy infrastructure." This CSIS effort involved hosting "a series of four roundtable working groups on topics of aviation security, nuclear security, the homeland threat advisory system, and security at chemical facilities. These working groups generated a number of lessons concerning the strategic importance of developing a balanced approach to homeland security." The report of entitled “Silent Vector Roundtable: Issues of Concern and Policy Recommendations” is posted at For more information on the Silent Vector exercise, see

Dr. Roger Johnston heads the Vulnerability Assessment Team at Los Alamos National Laboratory. His group has compiled papers on a CD on the topics of cargo security, GPS spoofing, nuclear safeguards, physical security, rapid sampling tools, tamper indicator seals, and the conduct of vulnerability assessments. For a copy of this CD, contact
Roger Johnston, Ph.D., CPP, Vulnerability Assessment Team, LANL, MS J565, Los Alamos, NM 87545. E-mail: . The CD includes work on GPS spoofing and remedies that is of particular importance.

A paper by Jon S. Warner and Roger G. Johnston on "GPS Spoofing Countermeasures" was originally published as Los Alamos research paper LAUR-03-6163. Contributors to this work included Anthony Garcia, Adam Pacheco, Ron Martinez, Leon Lopez, and Sonia Trujillo. See

Critical Infrastructure Task Force. Washington, DC: Homeland Security Advisory Council, January 2006 (50 pages). Accessed at: Report_v2.pdf

Homeland Security: DHS Is Taking Steps to Enhance Security at Chemical Facilities, but Additional Authority Is Needed. GAO-06-150, February 27, 2006. See Highlights -

International Critical Information Infrastructure Protection Handbook 2006 (Vol. I) An Inventory of 20 National and 6 International Critical Information Infrastructure Protection Policies. Authors: Isabelle Abele-Wigert, Myriam Dunn. Editors: Andreas Wenger, Victor Mauer. Published April 13, 2006 by The Center for Security Studies in Zurich, Switzerland. ISBN: 3-905696-07-X. Available in PDF form. From the Center's website at "Volume I of the 2006 International Critical Information Infrastructure Protection (CIIP) Handbook focuses on national government efforts to protect critical information infrastructure and provides an overview of CIIP protection practices in 20 countries and six international organizations. In this 2006 edition the scope has been extended and the country survey section expanded to include Asia, and in particular India, Japan, the Republic of Korea, Malaysia, Singapore, and Russia. Written with security policy analysts, researchers, and practitioners in mind, this publication can be used either as a reference work of current CIIP methods and models or as a starting point for further, in-depth research."

SCADA Security/Critical Infrastructure Protection (CIP) Conferences. Michael D. LeMay, Univ. of Illinois at Champaign Urbana. See

National Infrastructure Fortification Strategies 2005 (December 5-7. 2005, Miami) This conference was to produce a requirements and solution domain document for use by industry and government that can guide the refinement and development of specific solution domains to the challenge of protecting and increasing the resilience of critical infrastructure. See .

Infrastructure planning.

American Lifelines Alliance (ALA) Roundtable Summary Report. Protecting Our Critical Infrastructure: Findings and Recommendations from the ALA Roundtable. The American Lifelines Alliance ( is a public-private partnership intended to foster reliable performance of utility and transportation systems during and after the occurrence of natural hazards and man-made threat events. The ALA's key clients and stakeholders are lifeline operators and the communities they serve, standards development organizations, engineering and risk management professionals, and policy makers. The ALA facilitates the development, dissemination, and implementation of planning, design, construction, rehabilitation, and risk management guidance and encourages use of this information to improve the performance and reliability of new and existing critical infrastructure lifelines against all hazards. For additional information write Claret Heider, VP, The Building Seismic Safety Council and the Multihazard Mitigation Council of the National Institute of Building Sciences at .

"The Public Entity Risk Institute (PERI) has just released a new book on the history of emergency management in the United States. The book, Emergency Management: The American Experience, 1900-2005 covers more than a century of catastrophic events including earthquakes, hurricanes, floods, droughts, a pandemic, and an explosion… Emergency Management: The American Experience, 1900-2005 provides a unique analytic approach, focusing on policy and administrative changes that have been implemented over the past century and providing historical context for the changes….Emergency Management: The American Experience, 1900-2005 was edited by Claire B. Rubin and designed for use as a textbook for college courses and a resource for policymakers, researchers, and emergency managers. The book is available in PERI's online bookstore at for $35, which includes shipping and handling. A $5.00 discount is available to students who purchase the book as a textbook for a college course….Additional information including the full updated table of contents is available at A limited number of review copies are available for academics interested in using the book in their courses. To request a review copy, send an email to Pamela Marino at . A Time Line Chart developed as a companion to the book can also be purchased.

Homeland Security: A Documentary History, by Bruce Maxwell, October 2004 CQ Press, ISBN: 1-56802-884-9. 512 pages

Homeland Security: A Complete Guide to Understanding, Preventing, and Surviving Terrorism by Mark A. Sauter and James Jay Carafano, McGraw Hill, 2005, ISBN 0-07-144064-X.

Introduction to Homeland Security by Jane Bullock, George Haddow, Damon Coppola, Erdem Ergin, Lisa Westerman, Sarp Yeletaysi. Hardcover. 552 pages. 2nd ed., 2006, Elsevier.

The Edge of Disaster ~ Rebuilding a Resilient Nation by Stephen E. Flynn (Released 2/20/2007) ISBN 1400065518

The Resilient Enterprise ~ Overcoming Vulnerability for Competitive Advantage by Yossi Sheffi. Mitpress.mit.edu (2007). ISBN 978-0-262-69349-3 pb.

Critical Path ~ A Brief History of Critical Infrastructure Protection in the United States by Kathi Ann Brown (June 2006) Spectrum Publishing Group, Inc., Fairfax, VA ISBN 978-0-913969-06-9

Terrorism and Homeland Security ~ An Introduction with Applications by Philip Purpura, Butterworth-Heinemann (An imprint of Elsevier) 2007 ISBN 13: 978-0-7506-7843-8

GAO, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve. GAO-07-706R, July 10, 2007. See

"Security Bug Exposes World's Critical Infrastructure" To read the full article, click here:

David A. McEntire, Introduction to Homeland Security: Understanding Terrorism with an Emergency Management Perspective, Wiley, New York, 2008, ISBN:987-0-470-12752-0

Paula D. Gordon, "The State of Emergency Management and Homeland Security" PA TIMES, Vol. 30, Issue 8, August 2007. (PA TIMES is a publication of the American Society for Public Administration.) Also see or

Department of Homeland Security, Office of Inspector General. Efforts to Identify Critical Infrastructure Assets and Systems (OIG-09-86). Washington, DC: DHS OIG, June 2009, 52 pages. Accessed at:

The National Emergency Management Association (NEMA), in conjunction with the Federal Emergency Management Agency and the assistance of numerous other organizations, has released a White paper July 10, 2009 entitled “Recommendations for an Effective National Mitigation Effort.” The white paper outlined “the importance of mitigation efforts aimed at building disaster resiliency across the nation.” (8 pages)

The United States Computer Emergency Readiness Team (US CERT) at .

Critical Infrastructure Resilience Final Report (9/09) (PDF, 54 pages - 287 KB)

Framework for Dealing with Disasters and Related Interdependencies Final Report (7/09) (PDF, 57 pages - 255 KB )

NIAC Critical Infrastructure Protection Strategic Assessment Final Report (10/08)(PDF, 64 pages - 500 KB)

Insider Threat to Critical Infrastructures Report and Recommendations (04/08)(PDF, 56 pages - 393 KB)

Chemical, Biological, and Radiological Events and the Critical Infrastructure Workforce Report and Recommendations (01/08)(PDF, 88 pages - 635 KB)

A video of the April 2003 PBS Frontline program entitled "Cyber War" is available through PBS Video 1-800-424-7963. # FROL - 2116. 60 minutes. Go to and search on "cyberwar”.

For background interviews and material bearing on the April 2003 PBS Frontline program on "Cyber War", go to and search on "cyberwar" or see

Transcript of interview with Joe Weiss for the April 2003 PBS Frontline program on "Cyber War" accessible at

Transcript of interview with O. Sami Saydhari for the April 2003 PBS Frontline program on "Cyber War" accessible at

2) Cyber Concerns Including Vulnerable Systems and Y2K-Related Lessons and Legacies for Homeland Security

Note: Y2K-related references are included here since scenarios similar to those possible with Y2K are possible with terrorism, including cyberterrorism, cyberwarfare, sabotage, and mischievous acts.

Paula D. Gordon, "Strategic Planning and Y2K Technology Challenges: Lessons and Legacies for Homeland Security". PA TIMES, Vol. 24, No. 11, November 2001. Also see

Paula D. Gordon, "A Call to Action: National and Global Implications of the Year 2000 and Embedded Systems Crisis: A Working White Paper on Y2K," 1998 and 1999, for link see The archived material on this website remains pertinent after 9/11 since mid-range to worst case scenarios such as the kind that were possible with Y2K could still be triggered as a result of cascading infrastructure failures, including those caused by terrorism or cyberterrorism and cyberwarfare, sabotage, or mischievous acts. Many of the references there, including those on preparedness, also remain pertinent.

“John Koskinen's Responses to Questions from Paula Gordon Concerning National and Global Aspects of Y2K, March 22, 2000 (With Notes Added 4/4/2000)". Posted at or click on link at .

Naval War College, "Naval War College Year 2000 International Security Dimension Project," 1999,

Alan Paller, Director of Research, The SANS Institute, Testimony before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, Oversight Hearing on "Cyber-terrorism: Is the Nation's Critical Infrastructure Adequately Protected?" July 24, 2002.

Kevin Poulsen, "Slammer worm crashed Ohio nuke plant network," SecurityFocus, August 19, 2003,

Riptech, Inc., "White Paper on Understanding SCADA System Vulnerability," January 200l. See

John S.Tritak, Director, Critical Infrastructure Assurance Office, Bureau of Industry and Security, U.S. Department of Commerce, Statement before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, Oversight Hearing on "Cyber-terrorism: Is the Nation's Critical Infrastructure Adequately Protected?" July 24, 2002.