Show Less
Restricted access

The Business of Counterterrorism

Public-Private Partnerships in Homeland Security


Nathan E. Busch and Austen D. Givens

The Business of Counterterrorism focuses on the opportunities and challenges that public-private partnerships (PPPs) face in the post-9/11 world. Although these partnerships are a major topic of discussion and study among businesses and government agencies involved in homeland security efforts, they have received a much less thorough analysis by scholars. The Business of Counterterrorism identifies the essential role that PPPs are now taking in homeland security and explores the implications of this transformative shift in the field. In its discussion, it focuses on five areas in homeland security – critical infrastructure protection, cybersecurity, information sharing, security at U.S. ports of entry, and disaster recovery.
Show Summary Details
Restricted access



Government Documents, Primary Sources

Best Jr., Richard A. “Intelligence Information: Need-to-Know vs. Need-to-Share.” Congressional Research Service, Report No. R41848, June 6, 2011, sgp/crs/intel/R41848.pdf.

BP. Deepwater Horizon: Accident Investigation Report. September 8, 2010.

Buccella, Donna. “Border Security Threats to the Homeland: DHS’ Response to Innovative Tactics and Techniques.” Written testimony by the Assistant Commissioner of the U.S. Customs and Border Protection Office of Intelligence and Investigative Liaison before the House Committee on Homeland Security, Subcommittee on Border and Maritime Security, 112th Cong., 2nd Sess., June 15, 2012,

California Emergency Management Agency. Golden Guardian 2010: After Action Report Executive Summary. N.d.,

Cellucci, Thomas A. “Innovative Public-Private Partnerships: Pathway to Effectively Solving Problems.” U.S. Department of Homeland Security. July 2010.

———. “FutureTECH: Concept of Operations.” U.S. Department of Homeland Security. N.d.,

———. Partnership Program Benefits Taxpayers as Well as Public and Private Sectors. U.S. Department of Homeland Security. 2008.

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.