Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (12)
  • 1940-1944
  • Rand Corporation  (12)
  • Terrorism  (12)
Datasource
Material
Language
Years
Year
  • 1
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833085382 , 0833085387 , 9780833085351 , 0833085352
    Language: English
    Pages: 1 Online-Ressource (21 pages)
    Parallel Title: Erscheint auch als Willis, Henry H National security perspectives on terrorism risk insurance in the United States
    Keywords: United States Evaluation ; United States ; Terrorism History 21st century ; Terrorism Risk assessment ; Risk management Evaluation ; Risk (Insurance) Evaluation ; Terrorism insurance Evaluation ; Terrorism ; Terrorism ; Risk management ; Risk (Insurance) ; Terrorism insurance ; BUSINESS & ECONOMICS ; Insurance ; General ; United States ; History ; Evaluation ; Risk management ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Terrorism ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law provides a government reinsurance backstop in the case of a terrorist attack by providing mechanisms for avoiding an immediate drawdown of capital for insured losses or possibly covering the most extreme losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again reconsidering the appropriate government role in terrorism insurance markets. This policy brief examines the potential national security implications of allowing TRIA to expire. Examining the history of terrorism in the United States since the passage of TRIA and reviewing counterterrorism studies, the authors find that terrorism remains a real national security threat, but one that is very difficult for insurers to model the risk of. They also find that terrorism risk insurance can contribute to making communities more resilient to terrorism events, so, to the extent that terrorism insurance is more available with TRIA than without it, renewing the legislation would contribute to improved national security
    Note: "Policy Brief , "This work was conducted within the RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , "RAND Corporation , Caption title , Includes bibliographical references (pages 19-21)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833079190 , 0833083201
    Language: English
    Pages: 1 Online-Ressource (xxi, 88 pages)
    DDC: 303.6/2501
    Keywords: Terrorism ; Terrorism ; Insurgency ; Electronic books
    Abstract: Introduction -- Specifying the Model -- Implementation in a High-Level Language -- Looking Ahead to Exploratory Analysis Under Uncertainty -- Using the Model for Knowledge Elicitation, Discussion, and Diagnosis -- Appendix A: Primer on Factor Trees (a reprint) -- Appendix B: Verification and Validation -- Appendix C: Eliciting Factor Values -- Appendix D: Mathematics for "And" and "Or" Relationships
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833082091 , 0833083465 , 0833082094 , 9780833083463
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Rand Corporation research report series RR-415-OSD
    Keywords: Qaeda in the Islamic Maghreb ; Qaeda in the Islamic Maghreb ; Terrorism ; Terrorism ; Terrorism ; North Africa ; Qaeda in the Islamic Maghreb ; HISTORY ; Africa ; North ; Electronic books
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Note: Includes bibliographical references (pages 17-19)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : Rand Corp
    ISBN: 9780833077363 , 0833077368 , 9780833077028 , 083307735X , 0833077023 , 9780833077356
    Language: English
    Pages: 1 Online-Ressource (11, [1] pages)
    Series Statement: Occasional paper OP-390-RC (2012)
    Parallel Title: Print version Jenkins, Brian Michael Aviation security
    Keywords: Aeronautics Safety measures ; Terrorism Prevention ; Aeronautics, Commercial Security measures ; Airline passenger security screening ; Airports Security measures ; Aeronautics ; Terrorism ; Aeronautics, Commercial ; Airline passenger security screening ; Airports ; TRANSPORTATION ; Aviation ; General ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Aeronautics, Commercial ; Security measures ; Aeronautics ; Safety measures ; Airline passenger security screening ; Airports ; Security measures ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Electronic books
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Note: "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833076854 , 0833079743 , 083307685X , 9780833079749
    Language: English
    Pages: 1 Online-Ressource (xxii, 146 pages)
    Series Statement: RAND Corporation monograph series MG1241
    Parallel Title: Print version Modeling terrorism risk to the air transportation system
    Keywords: United States Rules and practice ; Evaluation ; United States ; Terrorism Prevention ; Aeronautics Safety measures ; Evaluation ; Aeronautics, Commercial Security measures ; Evaluation ; Risk management Mathematical models ; Terrorism ; Aeronautics ; Aeronautics, Commercial ; Risk management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; United States ; POLITICAL SCIENCE ; Political Freedom ; Risk management ; Mathematical models ; Terrorism ; Prevention ; United States ; Electronic book
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Note: At head of title: RAND Homeland Security and Defense Center , Includes bibliographical references (pages 135-146)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833059635 , 0833059637
    Language: English
    Pages: 1 Online-Ressource (xiii, 100 pages)
    Series Statement: Technical report TR-923-ANT
    Parallel Title: Erscheint auch als Clutterbuck, Lindsay Exploring Patterns of Behaviour in Violent Jihadist Terrorists : An analysis of six significant terrorist conspiracies in the UK
    Keywords: Jihad ; Terrorists Social networks ; Terrorists Conduct of life ; Terrorists Case studies ; Jihad ; Terrorists ; Terrorists ; Terrorists ; Terrorism ; Terrorism Religious aspects ; Islam ; SOCIAL SCIENCE ; Reference ; POLITICAL SCIENCE ; Terrorism ; Jihad ; Terrorists ; SOCIAL SCIENCE ; Essays ; Case studies ; Terrorism ; Terrorism ; Religious aspects ; Islam ; Great Britain ; Electronic books
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Note: "Prepared for the Airey Neave Trust , Includes bibliographical references (pages 57-62) , Title from PDF title page (viewed July 18, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049766 , 0833049860 , 0833049763 , 9780833049865
    Language: English
    Pages: 1 Online-Ressource (xxi, 185 pages)
    Series Statement: Rand Corporation monograph series MG-982-RC
    Parallel Title: Print version Jones, Seth G., 1972- Counterinsurgency in Pakistan
    Keywords: Counterinsurgency ; Terrorism Prevention ; Counterinsurgency ; Terrorism ; Politics and government ; Terrorism ; Prevention ; counterinsurgency ; Pakistan ; HISTORY ; POLITICAL SCIENCE ; Terrorism ; Pakistan ; Counterinsurgency ; Pakistan Politics and government 1988- ; Pakistan ; Electronic books
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Note: Includes bibliographical references (pages 145-167) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...