by
Jackson, Brian A., 1972-
Call Number
355.033573 22
Publication Date
2009
Summary
"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.
Format:
Electronic Resources
Relevance:
5.0168
by
Davis, Lynn E. (Lynn Etheridge), 1943-
Call Number
355.033573 23
Publication Date
2013
Format:
Electronic Resources
Relevance:
2.7756
View Other Search Results
by
Landree, Eric.
Call Number
363.32593880973 22
Publication Date
2006
Summary
How much data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses is publicly available and how easily could it be found by individuals seeking to harm U.S. domestic interests? The authors developed a framework to guide assessments of the availability of such information for planning attacks on the U.S. air, rail, and sea transportation infrastructure, and applied the framework in an information-gathering exercise that used several attack scenarios. Overall, the framework was useful for assessing what kind of information would be easy or hard for potential attackers to find. For each of the attack scenarios, a team of 'attackers' was unable to locate some of the information that a terrorist planner would need to gauge the likely success of a potential attack. The authors recommend that procedures for securing sensitive information be evaluated regularly and that information that can be obtained from easily accessible, off-site public information sources be included in vulnerability assessments.
Format:
Electronic Resources
Relevance:
2.6871
by
Brennan, Richard, 1954-
Call Number
355.450973 21
Publication Date
2002
Summary
RAND Arroyo Center has analyzed US Army Training and Doctrine Command's programme of homeland security games, seminars, and workshops. The issues raised here highlight emerging threats and vulnerabilities to the physical security of the USA.
Format:
Electronic Resources
Relevance:
0.3769
by
Treverton, Gregory F.
Call Number
327.73 22
Publication Date
2010
Summary
The National Intelligence Council's (NIC's) 2008 report Global Trends 2025: A Transformed World projects what the world will look like in 2025 based on recent trends. However, as an intelligence organization, the NIC limits its report to describing the impacts of future trends on the United States -- it cannot explore the important question: How should U.S. policy adapt now to account for these trends and the future that will result from them? This paper takes on that task. It focuses on important issues for which a long-term perspective leads to different immediate choices for U.S. policy than would result from only a short-term perspective. These include energy and climate change; defense policy, including the diffusion of nuclear weapons and the movement to abolish them; the reshaping of international law and institutions; the structure of the federal government; and the U.S. relationship with Mexico. For some other issues, long- and short-term thinking produce similar conclusions; yet for still others, the two perspectives seem difficult to reconcile.
Format:
Electronic Resources
Relevance:
0.3608
by
Bensahel, Nora, 1971-
Call Number
956.70443 22
Publication Date
2008
Summary
This monograph begins by examining prewar planning efforts or postwar Iraq, in order to establish what U.S. policymakers expected the postwar situation to look like and what their plans were for reconstruction. The monograph then examines the role of U.S. military forces after major combat officially ended on May 1, 2003; the analysis covers this period through the end of June 2004. Finally, the monograph examines civilian efforts at reconstruction after major combat ended, focusing on the activities of the Coalition Provisional Authority (CPA) and its efforts to rebuilding structures of governance, security forces, economic policy, and essential services prior to June 28, 2004, the day that the CPA dissolved and transferred authority to the Interim Iraqi Government. The authors conclude that the U.S. government was unprepared for the challenges of postwar Iraq for three reasons: a failure to challenge fundamental assumptions about postwar Iraq; ineffective interagency coordination; and the failure to assign responsibility and resources for providing security in the immediate aftermath of major combat operations.
Format:
Electronic Resources
Relevance:
0.3341
by
Kent, Glenn A., 1915-
Call Number
355.033073 22
Publication Date
2008
Summary
"Lieutenant General Glenn A. Kent was a uniquely acute analyst and developer of American defense policy in the second half of the twentieth century. His 33-year career in the Air Force was followed by more than 20 years as one of the leading analysts at RAND. This volume is not a memoir in the normal sense but rather a summary of the dozens of national security issues in which Glenn was personally engaged over the course of his career. These issues included creating the single integrated operational plan (SIOP), leading DoD's official assessment of strategic defenses in the 1960s, developing and analyzing strategic nuclear arms control agreements, helping to bring new weapon systems to life, and many others. Each vignette describes the analytical frameworks and, where appropriate, the mathematical formulas and charts that Glenn developed and applied to gain insights into the issue at hand. The author also relates his roles in much of the bureaucratic pulling and hauling that occurred as issues were addressed within the government."--Publisher's website.
Format:
Electronic Resources
Relevance:
0.2665
by
Kugler, Richard L.
Call Number
358.41357 21
Publication Date
1998
Summary
U.S. military forces stationed abroad play vital roles. As regional political and military dynamics shift, so too will the United States need to adjust its overseas military posture to accommodate new objectives and missions in new places. In general, that posture will need to become more flexible and more expeditionary, covering a wider array of challenges and broader geographic areas. Such changes can be unsettling to accomplish and may even worry allies and friends. Yet the United States cannot adequately reassure foreign countries with an outdated force posture. Planning for these changes should not be based on marginal adjustments to arbitrary manpower levels but should assess strategic objectives, missions, and requirements before considering the implications for manpower, units, activities, and money. This planning also should establish coherent goals and orderly means of reaching them, rather than muddle along in incremental ways that lack direction or can be blown off course by the shifting political winds. This study offers eight options that can be used to help guide thinking and planning for the coming era of change.
Format:
Electronic Resources
Relevance:
0.2665
by
Brennan, Richard, 1954-
Call Number
956.7044310973 23
Publication Date
2013
Summary
Over the course of the U.S. engagement in Iraq, the U.S. military managed hundreds of bases and facilities and used millions of pieces of equipment. The military was not only involved with security-related activities but also assisted in political and economic functions the host nation government or other U.S. departments would normally perform. A 2010 assessment identified that responsibility for 431 activities would need to be handed off to the government of Iraq, the U.S. embassy, U.S. Central Command, or other U.S. government departments. Ending the U.S. war in Iraq would also require redeploying over 100,000 military and civilian personnel and moving or transferring ownership of over a million pieces of property, including facilities, in accordance with U.S. and Iraqi laws, national policy, and DoD requirements. This book looks at the planning and execution of this transition, using information gathered from historical documents and interviews with key players. It examines efforts to help Iraq build the capacity necessary to manage its own security absent a U.S. military presence. It also looks at the complications that arose from uncertainty over just how much of a presence the United States would continue to have beyond 2011 and how various posttransition objectives would be advanced. The authors also examine efforts to create an embassy intended to survive in a hostile environment by being entirely self-sufficient, performing missions the military previously performed. The authors draw lessons from these events that can help plan for ending future wars.--
Format:
Electronic Resources
Relevance:
0.2384
by
Hall, Stacey.
Call Number
394.2
Publication Date
2022
Summary
Security and Risk Assessment for Facility and Event Managers introduces a risk assessment framework that helps readers identify and plan for potential security threats, develop countermeasures and emergency response strategies, and implement training programs to prepare staff.
Format:
Electronic Resources
Relevance:
0.2227
Limit Search Results