Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (26)
  • Rand Corporation  (26)
  • Terrorism  (26)
Datasource
Material
Language
  • English  (26)
  • 1
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833094537 , 0833094351 , 083309453X , 9780833094353
    Language: English
    Pages: 1 Online-Ressource (ix, 57 pages)
    Series Statement: Perspectives PE-192-RC
    Keywords: Terrorism Risk assessment 21st century ; Intelligence service Methodology ; Terrorism Prevention 21st century ; Civil-military relations ; National security 21st century ; Terrorism ; Intelligence service ; Terrorism ; Civil-military relations ; National security ; POLITICAL SCIENCE ; Security (National & International) ; Administrative agencies ; Reorganization ; Executive advisory bodies ; Interagency coordination ; Military readiness ; Decision making ; National security ; Decision making ; United States ; Electronic book
    Abstract: "Every president needs a decisionmaking system that harnesses the full capabilities and accumulated wisdom of the U.S. government and the nation's many stakeholders. Yet national security professionals--the officials who must advise the president on the most-difficult decisions -- cite a range of structural problems that hinder effective policymaking. While a more focused and timely decisionmaking process will not necessarily improve outcomes for the United States, poor choices could be calamitous. This Perspective analyzes a range of management challenges in the national security system and presents eight recommendations for strengthening U.S. decisionmaking and oversight of policy implementation. Among the conclusions: The National Security Council staff size should be reduced to better focus on high-priority areas. Civil-military operations should be planned by a new joint office at the State Department with a military general officer as deputy. Red-team and lessons-learned efforts would help ensure that the system is adaptive and responsive. Better integration of intelligence insights and secondments of senior officials across agencies can improve the quality and coherence of decisionmaking. And the use of special envoys, or "czars," should be limited"--Publisher's description
    Description / Table of Contents: Foreword -- Acknowledgments -- Chapter 1: Introduction: Evolution of Strategies and Systems -- Chapter 2: Why Process Matters -- Chapter 3: How Did the National Security System Evolve? -- How Do Other Nations Make Decisions? -- Chapter 4: Previous Attempts at Reform -- Chapter 5: Changing Environment -- Chapter 6: Recommendations for the National Security Decision Structure -- NSC Staff Size -- Civil-Military Cooperation and Resource Sharing -- Decline of Disciplined, Organizational Messaging Systems -- Including the Right Agencies -- Integrating Intelligence Insights -- Groupthink and Embedded Assumptions -- Continuity, Integration, and Professional Staff Development -- Overuse of Czars -- Chapter 7: Conclusion: Strategizing, Decisionmaking, and Policy Implementation -- Abbreviations -- Bibliography -- About the Author.
    Note: "April 5, 2016"--Table of contents page , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833092106 , 0833092103
    Language: English
    Pages: 1 Online-Ressource (xxxv, 148 pages)
    Parallel Title: Print version Robinson, Linda, 1962- U.S. Special Operations Forces in the Philippines, 2001-2014
    DDC: 363.325/1709599
    Keywords: United States ; United States ; Combined operations (Military science) ; Operation Enduring Freedom, 2001- ; Counterinsurgency ; Transnational crime Prevention ; International cooperation ; Terrorism Prevention ; Combined operations (Military science) ; Operation Enduring Freedom, 2001- ; Counterinsurgency ; Transnational crime ; Terrorism ; United States ; Strategic aspects of individual places ; Terrorism ; Prevention ; United States ; Operation Enduring Freedom (2001- ) ; Combined operations (Military science) ; Counterinsurgency ; Military relations ; Philippines ; Philippines Military relations ; Philippines Strategic aspects 21st century ; United States Military relations ; Philippines ; Philippines ; United States ; Electronic book
    Abstract: "This report examines the role of U.S. special operations forces in Operation Enduring Freedom -- Philippines from 2001 to 2014. The report documents the chief activities of U.S. special operations forces and their effects on transnational terrorist threats in the southern Philippines, the capacity and capability of the Philippine security forces, and the U.S.-Philippines bilateral relationship. The purpose of the report is to provide an authoritative and comprehensive account of a long-duration special operations mission to aid policymakers and military planners, as well as for use in professional military education." -- Page iii
    Abstract: "This report examines the role of U.S. special operations forces in Operation Enduring Freedom -- Philippines from 2001 to 2014. The report documents the chief activities of U.S. special operations forces and their effects on transnational terrorist threats in the southern Philippines, the capacity and capability of the Philippine security forces, and the U.S.-Philippines bilateral relationship. The purpose of the report is to provide an authoritative and comprehensive account of a long-duration special operations mission to aid policymakers and military planners, as well as for use in professional military education." -- Page iii
    Note: "National Defense Research Institute , "RR-1236-OSD"--Cover page 4 , "Prepared for the Office of the Assistant Secretary of Defense , Includes bibliographical references (pages 139-148)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833091864 , 0833093800 , 0833091867 , 9780833093806
    Language: English
    Pages: 1 Online-Ressource (23 pages)
    Series Statement: Research report RR-1267-OSD
    Parallel Title: Print versionShatz, Howard J Islamic state we knew
    Keywords: IS (Organization) ; IS (Organization) ; Terrorism Prevention ; International cooperation ; Radicalism ; Islamic fundamentalism ; Terrorism ; Radicalism ; Islamic fundamentalism ; Radicalism ; Terrorism ; Prevention ; International cooperation ; Middle East ; HISTORY ; General ; IS (Organization) ; Islamic fundamentalism ; Electronic books
    Abstract: "The group calling itself the Islamic State poses a grave threat, not just to Iraq and Syria but to the region more broadly and to the United States and its global coalition partners. A deadly and adaptive foe, the Islamic State seemed to come out of nowhere in June 2014, when it conquered Mosul. However, the Islamic State of today is the direct descendant of a group that Iraq, the United States, and their partners once fought as al-Qa'ida in Iraq and then as the Islamic State of Iraq. The wealth of publicly available information about the group indicates that the Islamic State's reemergence in 2014, and especially its methods and goals, should not have come as a surprise, although the strength and scope of that reemergence were rightfully shocking. The history considered in this report provides information known by the end of 2011 about the group's origins, finances, organization, methods of establishing control over territory, and response to airpower. Now that the Islamic State has reemerged, countering it can rely, in part, on the great deal of accumulated knowledge available. Because Iraqis and coalition forces routed the group once, the group's history can inform four components of a successful strategy against the Islamic State: degrading the group's finances, eliminating its leadership and potential leadership, creating a better strategy to hold recaptured territory, and making use of airpower"-- Provided by publisher
    Note: "This report is derived from a May 27, 2015 talk presented at the 11th Annual National Security Conference of the Fisher Institute for Air and Space Strategic Studies in Herzliya, Israel, "Winning Small Wars and the Role of Air Power." The talk appeared in a session titled "Knowing, Perceiving, Understanding: What We Knew but Did Not Understand." The full conference agenda and videos of selected presentations are available on the Fisher Instituter's website"-- Back cover , Includes bibliographical references (pages 20-23)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833091512 , 0833091549 , 0833091514 , 9780833091543
    Language: English
    Pages: 1 Online-Ressource (35 pages)
    Series Statement: Strategic rethink
    Series Statement: Research reports RR-1223-RC
    Keywords: Terrorism Prevention 21st century ; International cooperation ; Civil-military relations 21st century ; Security, International 21st century ; Strategic planning 21st century ; National security 21st century ; Terrorism ; Civil-military relations ; Security, International ; Strategic planning ; National security ; Security, International ; Strategic planning ; Terrorism ; Prevention ; International cooperation ; POLITICAL SCIENCE ; Terrorism ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; United States ; Civil-military relations ; National security ; United States Armed Forces ; Operational readiness ; United States Foreign relations 21st century ; Decision making ; United States Armed Forces ; Appropriations and expenditures ; United States ; United States ; United States ; Electronic book
    Abstract: "This report is the second in RAND's ongoing Strategic Rethink series, in which RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report analyzes defense options available to the United States in responding to the re-emergence of a belligerent Russia, the seizure of significant territory in Iraq and Syria by violent extremists, growing Chinese military power and assertiveness, and other threats to U.S. security and interests. It focuses on ways that the United States might adapt military instruments to meet these emerging challenges, assessing in broad terms the cost of defense investments commensurate with the interests at stake. The report argues that currently projected levels of defense spending are insufficient to meet the demands of an ambitious national security strategy"--Publisher's description
    Description / Table of Contents: Preface -- Acknowledgments -- America's Security Deficiit -- Changing Demands on Defense -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Abbreviations -- References -- Figures -- Tables.
    Note: Includes bibliographical references (pages 33-35)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833085382 , 0833085387 , 9780833085351 , 0833085352
    Language: English
    Pages: 1 Online-Ressource (21 pages)
    Parallel Title: Erscheint auch als Willis, Henry H National security perspectives on terrorism risk insurance in the United States
    Keywords: United States Evaluation ; United States ; Terrorism History 21st century ; Terrorism Risk assessment ; Risk management Evaluation ; Risk (Insurance) Evaluation ; Terrorism insurance Evaluation ; Terrorism ; Terrorism ; Risk management ; Risk (Insurance) ; Terrorism insurance ; BUSINESS & ECONOMICS ; Insurance ; General ; United States ; History ; Evaluation ; Risk management ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Terrorism ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law provides a government reinsurance backstop in the case of a terrorist attack by providing mechanisms for avoiding an immediate drawdown of capital for insured losses or possibly covering the most extreme losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again reconsidering the appropriate government role in terrorism insurance markets. This policy brief examines the potential national security implications of allowing TRIA to expire. Examining the history of terrorism in the United States since the passage of TRIA and reviewing counterterrorism studies, the authors find that terrorism remains a real national security threat, but one that is very difficult for insurers to model the risk of. They also find that terrorism risk insurance can contribute to making communities more resilient to terrorism events, so, to the extent that terrorism insurance is more available with TRIA than without it, renewing the legislation would contribute to improved national security
    Note: "Policy Brief , "This work was conducted within the RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , "RAND Corporation , Caption title , Includes bibliographical references (pages 19-21)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833079190 , 0833083201
    Language: English
    Pages: 1 Online-Ressource (xxi, 88 pages)
    DDC: 303.6/2501
    Keywords: Terrorism ; Terrorism ; Insurgency ; Electronic books
    Abstract: Introduction -- Specifying the Model -- Implementation in a High-Level Language -- Looking Ahead to Exploratory Analysis Under Uncertainty -- Using the Model for Knowledge Elicitation, Discussion, and Diagnosis -- Appendix A: Primer on Factor Trees (a reprint) -- Appendix B: Verification and Validation -- Appendix C: Eliciting Factor Values -- Appendix D: Mathematics for "And" and "Or" Relationships
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833082091 , 0833083465 , 0833082094 , 9780833083463
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Rand Corporation research report series RR-415-OSD
    Keywords: Qaeda in the Islamic Maghreb ; Qaeda in the Islamic Maghreb ; Terrorism ; Terrorism ; Terrorism ; North Africa ; Qaeda in the Islamic Maghreb ; HISTORY ; Africa ; North ; Electronic books
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Note: Includes bibliographical references (pages 17-19)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : Rand Corp
    ISBN: 9780833077363 , 0833077368 , 9780833077028 , 083307735X , 0833077023 , 9780833077356
    Language: English
    Pages: 1 Online-Ressource (11, [1] pages)
    Series Statement: Occasional paper OP-390-RC (2012)
    Parallel Title: Print version Jenkins, Brian Michael Aviation security
    Keywords: Aeronautics Safety measures ; Terrorism Prevention ; Aeronautics, Commercial Security measures ; Airline passenger security screening ; Airports Security measures ; Aeronautics ; Terrorism ; Aeronautics, Commercial ; Airline passenger security screening ; Airports ; TRANSPORTATION ; Aviation ; General ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Aeronautics, Commercial ; Security measures ; Aeronautics ; Safety measures ; Airline passenger security screening ; Airports ; Security measures ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Electronic books
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Note: "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833076854 , 0833079743 , 083307685X , 9780833079749
    Language: English
    Pages: 1 Online-Ressource (xxii, 146 pages)
    Series Statement: RAND Corporation monograph series MG1241
    Parallel Title: Print version Modeling terrorism risk to the air transportation system
    Keywords: United States Rules and practice ; Evaluation ; United States ; Terrorism Prevention ; Aeronautics Safety measures ; Evaluation ; Aeronautics, Commercial Security measures ; Evaluation ; Risk management Mathematical models ; Terrorism ; Aeronautics ; Aeronautics, Commercial ; Risk management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; United States ; POLITICAL SCIENCE ; Political Freedom ; Risk management ; Mathematical models ; Terrorism ; Prevention ; United States ; Electronic book
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Note: At head of title: RAND Homeland Security and Defense Center , Includes bibliographical references (pages 135-146)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833059635 , 0833059637
    Language: English
    Pages: 1 Online-Ressource (xiii, 100 pages)
    Series Statement: Technical report TR-923-ANT
    Parallel Title: Erscheint auch als Clutterbuck, Lindsay Exploring Patterns of Behaviour in Violent Jihadist Terrorists : An analysis of six significant terrorist conspiracies in the UK
    Keywords: Jihad ; Terrorists Social networks ; Terrorists Conduct of life ; Terrorists Case studies ; Jihad ; Terrorists ; Terrorists ; Terrorists ; Terrorism ; Terrorism Religious aspects ; Islam ; SOCIAL SCIENCE ; Reference ; POLITICAL SCIENCE ; Terrorism ; Jihad ; Terrorists ; SOCIAL SCIENCE ; Essays ; Case studies ; Terrorism ; Terrorism ; Religious aspects ; Islam ; Great Britain ; Electronic books
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Note: "Prepared for the Airey Neave Trust , Includes bibliographical references (pages 57-62) , Title from PDF title page (viewed July 18, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049766 , 0833049860 , 0833049763 , 9780833049865
    Language: English
    Pages: 1 Online-Ressource (xxi, 185 pages)
    Series Statement: Rand Corporation monograph series MG-982-RC
    Parallel Title: Print version Jones, Seth G., 1972- Counterinsurgency in Pakistan
    Keywords: Counterinsurgency ; Terrorism Prevention ; Counterinsurgency ; Terrorism ; Politics and government ; Terrorism ; Prevention ; counterinsurgency ; Pakistan ; HISTORY ; POLITICAL SCIENCE ; Terrorism ; Pakistan ; Counterinsurgency ; Pakistan Politics and government 1988- ; Pakistan ; Electronic books
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Note: Includes bibliographical references (pages 145-167) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : Rand Homeland Security
    ISBN: 9780833039156 , 0833042491 , 0833039156 , 9780833042491
    Language: English
    Pages: 1 Online-Ressource (xxii, 114 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version
    Keywords: Terrorism Technological innovations ; Terrorism ; Terrorism ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; Terrorism ; Technological innovations ; Terrorism ; Electronic books
    Abstract: Terrorist groups -- both inside and outside the al Qaeda network -- sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies
    Abstract: Terrorist groups -- both inside and outside the al Qaeda network -- sometimes form mutually beneficial partnerships to exchange "best practices." These exchanges provide terrorist groups with the opportunity to innovate (i.e., increase their skills and expand their reach). Understanding how terrorist groups exchange technology and knowledge, therefore, is essential to ongoing and future counterterrorism strategies. This study examines how 11 terrorist groups in three areas (Mindanao, the West Bank and Gaza Strip, and southwest Colombia) have attempted to exchange technologies and knowledge in an effort to reveal some of their vulnerabilities. The analysis provides the Department of Homeland Security and other national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies
    Note: "MG-485-DHS , Includes bibliographical references , Title from PDF title screen (viewed June 12, 2007)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833039651 , 0833042874 , 9781281181268 , 1281181269 , 9780833042873 , 0833039652
    Language: English
    Pages: 1 Online-Ressource (xxvii, 126 pages)
    Parallel Title: Print version Stealing the sword
    Keywords: Terrorism Prevention ; Terrorism Prevention ; Arms control ; Weapons systems ; Terrorism ; Terrorism ; Arms control ; Weapons systems ; POLITICAL SCIENCE ; Security (National & International) ; Arms control ; Terrorism ; Prevention ; Weapons systems ; Armies ; Military & Naval Science ; Law, Politics & Government ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Note: "MG-510"--Page 4 of cover , Includes bibliographical references (pages 117-126)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833038340 , 0833040936 , 0833038346 , 9780833040930
    Language: English
    Pages: 1 Online-Ressource (xxiii, 66 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Estimating terrorism risk
    Keywords: Federal aid to terrorism prevention Planning ; Terrorism Prevention ; Terrorism Risk assessment ; Federal aid to terrorism prevention ; Terrorism ; Terrorism ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Electronic books
    Abstract: The Department of Homeland Security (DHS) is responsible for protecting the United States from terrorism. It achieves this goal partly through the Urban Areas Security Initiative, which allocates resources to states and urban areas. Until DHS can know the effectiveness of available risk-reduction alternatives or determine reasonable minimum standards for community preparedness, allocating homeland security resources based on risk is the next best approach; areas at higher risk are likely to have more and larger opportunities for risk reduction than areas at lower risk. This monograph offers a method for constructing an estimate of city risk shares, designed to perform well across a wide range of threat scenarios and risk types. It also proposes and demonstrates a framework for comparing the performance of alternative risk estimates given uncertainty in measuring the elements of risk. Finally, it makes five recommendations for improving the allocation of homeland security resources: DHS should consistently define terrorism risk in terms of expected annual consequences; DHS should seek robust risk estimators that account for uncertainty about terrorism risk and variance in citizen values; DHS should develop event-based models of terrorism risk; until reliable event-based models are constructed, DHS should use density-weighted population rather than population as a simple risk indicator; and DHS should fund research to bridge the gap between terrorism risk assessment and resource allocation policies that are cost-effective
    Abstract: The Department of Homeland Security (DHS) is responsible for protecting the United States from terrorism. It achieves this goal partly through the Urban Areas Security Initiative, which allocates resources to states and urban areas. Until DHS can know the effectiveness of available risk-reduction alternatives or determine reasonable minimum standards for community preparedness, allocating homeland security resources based on risk is the next best approach; areas at higher risk are likely to have more and larger opportunities for risk reduction than areas at lower risk. This monograph offers a method for constructing an estimate of city risk shares, designed to perform well across a wide range of threat scenarios and risk types. It also proposes and demonstrates a framework for comparing the performance of alternative risk estimates given uncertainty in measuring the elements of risk. Finally, it makes five recommendations for improving the allocation of homeland security resources: DHS should consistently define terrorism risk in terms of expected annual consequences; DHS should seek robust risk estimators that account for uncertainty about terrorism risk and variance in citizen values; DHS should develop event-based models of terrorism risk; until reliable event-based models are constructed, DHS should use density-weighted population rather than population as a simple risk indicator; and DHS should fund research to bridge the gap between terrorism risk assessment and resource allocation policies that are cost-effective
    Note: "MG-388-RC"--Page 4 of cover , Includes bibliographical references (pages 63-66)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833038593 , 0833040944 , 0833038591 , 9780833040947
    Language: English
    Pages: 1 Online-Ressource (xxii, 68 pages)
    Parallel Title: Print version State and local intelligence in the war on terrorism
    Keywords: War on Terrorism, 2001-2009 ; Law enforcement ; Intelligence service ; Terrorism Prevention ; War on Terrorism, 2001-2009 ; Law enforcement ; Intelligence service ; Terrorism ; Terrorism ; Prevention ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; War on Terrorism (2001-2009) ; Intelligence service ; Law enforcement
    Abstract: One aspect of combating terrorism that is often discussed but seldom examined in detail concerns the overlap of intelligence and law enforcement and the role of state and local law enforcement agencies as the ultimate "eyes and ears" in the war on terrorism. This report helps fill that gap by examining how state and local law enforcement agencies conducted and supported counterterrorism intelligence activities after 9/11. It analyzes data from a 2002 survey of law enforcement preparedness in the context of intelligence and reports the results of case studies showing how eight local law enforcement agencies handle intelligence operations. Finally, it suggests ways that the job of gathering and analyzing intelligence might best be shared among federal, state, and local agencies
    Abstract: One aspect of combating terrorism that is often discussed but seldom examined in detail concerns the overlap of intelligence and law enforcement and the role of state and local law enforcement agencies as the ultimate "eyes and ears" in the war on terrorism. This report helps fill that gap by examining how state and local law enforcement agencies conducted and supported counterterrorism intelligence activities after 9/11. It analyzes data from a 2002 survey of law enforcement preparedness in the context of intelligence and reports the results of case studies showing how eight local law enforcement agencies handle intelligence operations. Finally, it suggests ways that the job of gathering and analyzing intelligence might best be shared among federal, state, and local agencies
    Note: "MG-394 , Includes bibliographical references (pages 65-68)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corp
    ISBN: 9780833035202 , 0833048171 , 9781598754131 , 1598754130 , 9781282451223 , 1282451227 , 9780833048172 , 0833035207
    Language: English
    Pages: 1 Online-Ressource (xxx, 155 pages)
    Parallel Title: Print version Out of the ordinary
    Keywords: Criminal methods ; Terrorism Forecasting ; Terrorism Psychological aspects ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Terrorism ; Terrorism ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Security (National & International) ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Intelligence service ; National security ; Terrorism ; Forecasting ; Terrorism ; Psychological aspects ; United States ; Electronic books
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Note: "MG-126-RC , Includes bibliographical references (pages 151-155) and appendices , Title from title screen (viewed 11/23/2004)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833035134 , 0833036149 , 0833035134 , 9780833036148
    Language: English
    Pages: 1 Online-Ressource (xxi, 67 pages)
    Parallel Title: Print version Chalk, Peter Confronting "the enemy within
    Keywords: Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; France ; Great Britain ; Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; France ; Great Britain ; Intelligence service Cross-cultural studies ; Internal security Cross-cultural studies ; Terrorism Cross-cultural studies Prevention ; Intelligence service ; Internal security ; Terrorism ; Electronic books ; France ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Terrorism ; Intelligence service ; Internal security ; Terrorism ; Prevention ; Great Britain ; Cross-cultural studies ; Australian Security Intelligence Organization ; Canadian Security Intelligence Service ; Electronic books
    Abstract: Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of fo
    Abstract: Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of fo
    Note: "MG-100 , Includes bibliographical references (pages 59-66)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833034946 , 0833034944 , 9780833036216 , 0833036211 , 9781282451469 , 1282451464
    Language: English
    Pages: 1 Online-Ressource (xx, 106 pages)
    DDC: 303.6/25
    Keywords: Terrorism ; Threats ; Behavioral assessment ; Terrorism ; Terrorists ; Electronic books ; Electronic books ; Electronic books
    Abstract: Introduction -- Assessing terrorist threats -- Terrorist groups' capabilities -- Terrorist groups as dynamic entities -- Conclusion -- Appendix: Trends in terrorist attacks
    Abstract: As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. In addition, the struggle against terrorism likely will be in constant competition with other U.S. international policy issues that come to the fore. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess, analyze, and prioritize the danger posed by various terrorist organizations around the world. The authors also look at how different terrorist groups adapt and change over time, emphasizing that understanding these changes may help policymakers identify terrorists' greatest vulnerabilities. Of course, the very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy may build
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833032072 , 0833032232 , 0833032070 , 9780833032232
    Language: English
    Pages: 1 Online-Ressource (52 pages)
    Parallel Title: Print version Karasik, Theodore William Toxic warfare
    Keywords: Terrorism ; Biological warfare ; Radioactive wastes War use ; Hazardous substances War use ; Toxins War use ; Poisons War use ; Terrorism ; Biological warfare ; Radioactive wastes ; Hazardous substances ; Toxins ; Poisons ; Chemical Warfare Agents ; Hazardous Substances ; Environmental Exposure ; Weapons ; Poisons ; Environmental Pollutants ; Environmental Pollution ; Armed Conflicts ; Weapons of Mass Destruction ; Violence ; Social Problems ; Crime ; Manufactured Materials ; Toxic Actions ; Specialty Uses of Chemicals ; Noxae ; Public Health ; Chemical Actions and Uses ; Criminology ; Environment and Public Health ; Sociology ; Technology, Industry, and Agriculture ; Social Sciences ; Chemicals and Drugs ; Delivery of Health Care ; Technology, Industry, Agriculture ; Anthropology, Education, Sociology and Social Phenomena ; Chemical Warfare ; Chemical Warfare Agents adverse effects ; Environmental Exposure adverse effects ; Hazardous Substances adverse effects ; Terrorism ; Electronic books ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Biological warfare ; Terrorism ; Military Engineering ; Military & Naval Science ; Law, Politics & Government ; HISTORY ; Military ; Biological & Chemical Warfare ; United States ; Electronic books
    Abstract: Since the 1990s there has been an increase in the use of toxic weapons; for example, inexpensive and easily acquired chemicals and industrial waste. This work examines the implications of toxic weapon use for military planning and concludes that such weapons merit further analysis
    Abstract: Since the 1990s there has been an increase in the use of toxic weapons; for example, inexpensive and easily acquired chemicals and industrial waste. This work examines the implications of toxic weapon use for military planning and concludes that such weapons merit further analysis
    Note: "MR-1572 , Includes bibliographical references (pages 45-52)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833032645 , 0833034073 , 083303264X , 9780833034076
    Language: English
    Pages: 1 Online-Ressource (xi, 30 pages)
    Parallel Title: Print version Jenkins, Brian Michael Countering al Qaeda
    Keywords: Qaida (Organization) ; Qaida (Organization) ; War on Terrorism, 2001-2009 ; Terrorism Government policy ; Terrorism ; War on Terrorism, 2001-2009 ; Terrorism ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; War on Terrorism (2001-2009) ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Military policy ; Terrorism ; Terrorism ; Government policy ; Qaida (Organization) ; United States ; United States Military policy ; United States ; Electronic books
    Abstract: Having achieved its initial goals in the war on terrorism, the United States is now in a second, more complex phase of the campaign. This monograph reviews events since the attacks of September 11, 2001, and discusses the current state of the al Qaeda organization and the kinds of actions that can be expected of it in the foreseeable future. Because al Qaeda constitutes the most serious immediate threat to the security of the United States, it is imperative that the campaign against terrorism remain focused and pragmatic. This monograph outlines and describes the essential, central elements that must be emphasized in this campaign, the ultimate aim of which is the destruction of a terrorist enterprise that threatens American security and, by extension, the security of the world
    Abstract: Having achieved its initial goals in the war on terrorism, the United States is now in a second, more complex phase of the campaign. This monograph reviews events since the attacks of September 11, 2001, and discusses the current state of the al Qaeda organization and the kinds of actions that can be expected of it in the foreseeable future. Because al Qaeda constitutes the most serious immediate threat to the security of the United States, it is imperative that the campaign against terrorism remain focused and pragmatic. This monograph outlines and describes the essential, central elements that must be emphasized in this campaign, the ultimate aim of which is the destruction of a terrorist enterprise that threatens American security and, by extension, the security of the world
    Note: "MR-1620-RC , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833031495 , 0833032577 , 083303149X , 9780833032577
    Language: English
    Pages: 1 Online-Ressource (xx, 89 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Conference proceedings 176
    Parallel Title: Print version Protecting emergency responders
    Keywords: Industrial safety Congresses ; Employees Congresses Safety measures ; Protective clothing ; Industrial safety ; Employees ; Protective clothing ; Rescue Work ; Risk Management ; Terrorism ; Protective Devices ; Emergency Medical Technicians ; Occupational Health ; Social Welfare & Social Work - General ; Social Welfare & Social Work ; Technology - General ; TECHNOLOGY & ENGINEERING ; Fire Science ; MEDICAL ; Occupational & Industrial Medicine ; Employees ; Safety measures ; Industrial safety ; Protective clothing ; Engineering & Applied Sciences ; Social Sciences ; Conference papers and proceedings ; United States ; Electronic books ; Congress
    Abstract: Preface; Executive Summary; Acknowledgments; Acronyms and Abbreviations; Chapter One: INTRODUCTION; Chapter Two: THE TERRORIST INCIDENTS; Chapter Three: PERFORMANCE AND AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; Chapter Four: INFORMATION AND TRAINING; Chapter Five: SITE MANAGEMENT FOR PERSONAL PROTECTION; Chapter Six: RECOMMENDATIONS FOR MOVING FORWARD; Chapter Seven: CONCLUDING REMARKS; Appendix A:; Appendix B:; Appendix C:; Appendix D
    Abstract: Preface; Executive Summary; Acknowledgments; Acronyms and Abbreviations; Chapter One: INTRODUCTION; Chapter Two: THE TERRORIST INCIDENTS; Chapter Three: PERFORMANCE AND AVAILABILITY OF PERSONAL PROTECTIVE EQUIPMENT; Chapter Four: INFORMATION AND TRAINING; Chapter Five: SITE MANAGEMENT FOR PERSONAL PROTECTION; Chapter Six: RECOMMENDATIONS FOR MOVING FORWARD; Chapter Seven: CONCLUDING REMARKS; Appendix A:; Appendix B:; Appendix C:; Appendix D
    Note: Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...