by
Jackson, Brian A., 1972-
Call Number
303.625 22
Publication Date
2005
Format:
Electronic Resources
Relevance:
30590.6660
2.
by
Jackson, Brian A., 1972-
Call Number
628.92 21
Publication Date
2002
Summary
Based on a 2001 conference held in New York City that looked at ways of improving health and safety for emergency workers who respond to terrorist attacks. It is intended for managers and decisionmakers to help them understand the working and safety environment associated with such attacks.
Format:
Electronic Resources
Relevance:
30590.5156
View Other Search Results
by
Jackson, Brian A., 1972-
Call Number
363.32572 22
Publication Date
2007
Summary
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups? efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris.
Format:
Electronic Resources
Relevance:
30562.5293
by
Jackson, Brian A., 1972-
Call Number
363.325 22
Publication Date
2008
Summary
Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners, and a decision must be made about whether they merit changes in current defenses or the development of new defensive approaches. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups or other asymmetric actors to attack homeland targets. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine the threat of UAVs and cruise missiles, RAND utilized a "red analysis of alternatives" approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of cruise missiles and UAVs was compared against other options, such as vest bombs, car bombs, and mortars. This approach identifies the operational problems faced by a potential adversary to help the defense understand how the capabilities that different attack modes provide may overcome those problems. Given the insights this analysis of alternatives produced into the circumstances under which UAVs and cruise missiles might be preferred by an attacker, RAND explored defensive options to address the threat. This analysis considered defensive options targeting the full range of adversary activities, including activities before, during, and after an attack, rather than a preferential focus on classical terminal-defense strategies. UAVs and cruise missiles represent a "niche threat" within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general.
Format:
Electronic Resources
Relevance:
30558.9199
by
Jackson, Brian A., 1972-
Call Number
355.033573 22
Publication Date
2009
Summary
"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.
Format:
Electronic Resources
Relevance:
30546.6973
by
Jackson, Brian A., 1972-
Call Number
363.3480684 22
Publication Date
2010
Summary
The ability to measure emergency preparedness - to predict the likely performance of emergency response systems in future events - is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. --From publisher description.
Format:
Electronic Resources
Relevance:
30546.6367
by
Jackson, Brian A., 1972-
Call Number
303.625 22
Publication Date
2005
Summary
Understanding how terrorist groups learn may aid in developing strategies to combat terrorist activities.
Format:
Electronic Resources
Relevance:
30541.6582
by
Jackson, Brian A., 1972-
Call Number
363.3251630973 22
Publication Date
2009
Summary
Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. To inform future policy decisionmaking, this book examines, from a variety of perspectives, the policy proposal that such an agency be created. These include its possible capabilities, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved in creating such an agency. Reflecting the limits in the data available and the significant uncertainty associated with this policy area, if there is a unifying message from the study, it is one of caution and deliberation. In an area in which direct assessment and analysis are limited, there is a need to carefully consider the implications and potential outcomes of such significant policy changes. In doing so, examination from different perspectives and through different approaches -- to ideally capture a sufficient picture of the complexity to see not just the benefits we hope to gain from policy change but the layers of effects and interactions that could either help or hurt the chances of those benefits appearing -- is a critical ingredient of policy deliberation and design.
Format:
Electronic Resources
Relevance:
30532.7266
by
Jackson, Brian A., 1972-
Call Number
363.28 22
Publication Date
2009
Summary
With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. Case studies of five other democracies--Australia, Canada, France, Germany, and the UK --provide lessons and common themes that may help policymakers decide. The authors find that: most of the five countries separate the agency that conducts domestic intelligence gathering from any arrest and detention powers; each country has instituted some measure of external oversight over its domestic intelligence agency; liaison with other international, foreign, state, and local agencies helps ensure the best sharing of information; the boundary between domestic and international intelligence activities may be blurring.--Publisher description.
Format:
Electronic Resources
Relevance:
30528.9199
by
Schwabe, William, 1942-
Call Number
363.20284 21
Publication Date
2001
Summary
This report provides findings of a study of technology in use or needed by law enforcement agencies at the state and local level, for the purpose of informing federal policymakers as they consider technology-related support for these agencies.
Format:
Electronic Resources
Relevance:
1110.5381
Limit Search Results