6,690 research outputs found

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work

    Potential Terrorist Uses of Highway-Borne Hazardous Materials, MTI Report 09-03

    Get PDF
    The Department of Homeland Security (DHS) has requested that the Mineta Transportation Institutes National Transportation Security Center of Excellence (MTI NTSCOE) provide any research it has or insights it can provide on the security risks created by the highway transportation of hazardous materials. This request was submitted to MTI/NSTC as a National Transportation Security Center of Excellence. In response, MTI/NTSC reviewed and revised research performed in 2007 and 2008 and assembled a small team of terrorism and emergency-response experts, led by Center Director Brian Michael Jenkins, to report on the risks of terrorists using highway shipments of flammable liquids (e.g., gasoline tankers) to cause casualties anywhere, and ways to reduce those risks. This report has been provided to DHS. The teams first focus was on surface transportation targets, including highway infrastructure, and also public transportation stations. As a full understanding of these materials, and their use against various targets became revealed, the team shifted with urgency to the far more plentiful targets outside of surface transportation where people gather and can be killed or injured. However, the team is concerned to return to the top of the use of these materials against public transit stations and recommends it as a separate subject for urgent research

    Report on DIMACS Working Group Meeting: Mathematical Sciences Methods for the Study of Deliberate Releases of Biological Agents and their Consequences

    Full text link
    55 pages, 1 article*Report on DIMACS Working Group Meeting: Mathematical Sciences Methods for the Study of Deliberate Releases of Biological Agents and their Consequences* (Castillo-Chavez, Carlos; Roberts, Fred S.) 55 page

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    A Quantitative Research Study on Probability Risk Assessments in Critical Infrastructure and Homeland Security

    Get PDF
    This dissertation encompassed quantitative research on probabilistic risk assessment (PRA) elements in homeland security and the impact on critical infrastructure and key resources. There are 16 crucial infrastructure sectors in homeland security that represent assets, system networks, virtual and physical environments, roads and bridges, transportation, and air travel. The design included the Bayes theorem, a process used in PRAs when determining potential or probable events, causes, outcomes, and risks. The goal is to mitigate the effects of domestic terrorism and natural and man-made disasters, respond to events related to critical infrastructure that can impact the United States, and help protect and secure natural gas pipelines and electrical grid systems. This study provides data from current risk assessment trends in PRAs that can be applied and designed in elements of homeland security and the criminal justice system to help protect critical infrastructures. The dissertation will highlight the aspects of the U.S. Department of Homeland Security National Infrastructure Protection Plan (NIPP). In addition, this framework was employed to examine the criminal justice triangle, explore crime problems and emergency preparedness solutions to protect critical infrastructures, and analyze data relevant to risk assessment procedures for each critical infrastructure identified. Finally, the study addressed the drivers and gaps in research related to protecting and securing natural gas pipelines and electrical grid systems

    Algorithmic Jim Crow

    Get PDF
    This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact

    The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)

    Get PDF
    This survey provides an in-depth analysis of existing research on the economic analysis of terrorism and counter-terrorist measures. First the existing evidence on the causes of terrorism is analyzed, then we consider the evidence of the consequences of terrorism and we demonstrate why it is important to regarding of the issue of counter-terrorism policy. Moreover the survey presents the existing knowledge on the interrelation between the economy and the issue of security and it incorporates analysis the level of knowledge about the causal chains between security and the economy. Also it focuses on perspective and methodologies from the discipline of economics but also refers to research from related disciplines (sociology, political science). It also assembles the knowledge on the impact of terrorism on the economy as reflected in macro-economic variables and its impact on specific sectors. Furthermore it assesses how potential an actual terrorist event determine consumer and producer behaviour, public policy, as well as terrorist responses to these policies. Finally a European perspective on the terrorism security annexes is discussed and here we analyze the causes of terrorism in Europe.

    The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)

    Get PDF
    This survey provides an in-depth analysis of existing research on the economic analysis of terrorism and counter-terrorist measures. First the existing evidence on the causes of terrorism is analyzed, then we consider the evidence of the consequences of terrorism and we demonstrate why it is important to regarding of the issue of counter-terrorism policy. Moreover the survey presents the existing knowledge on the interrelation between the economy and the issue of security and it incorporates analysis the level of knowledge about the causal chains between security and the economy. Also it focuses on perspective and methodologies from the discipline of economics but also refers to research from related disciplines (sociology, political science). It also assembles the knowledge on the impact of terrorism on the economy as reflected in macro-economic variables and its impact on specific sectors. Furthermore it assesses how potential an actual terrorist event determine consumer and producer behaviour, public policy, as well as terrorist responses to these policies. Finally a European perspective on the terrorism security annexes is discussed and here we analyze the causes of terrorism in Europe.risk, insecurity, survey, terrorism, counter-terrorism, security economics

    After the 'War on Terror': regulatory states, risk bureaucracies and the risk-based governance of terror

    Get PDF
    In March 2009, the Obama administration sent a message to senior Pentagon staff instructing them to refrain from using either of the terms ‘Long War’ or ‘Global War on Terror’ and to replace these terms with ‘Overseas Contingency Operations’. Similarly, the 2009 UK Strategy for Countering International Terrorism eschews military terminology, preferring instead National Risk Assessments whose overall aim is ‘to reduce the risk to the UK’. This paper seeks to explore what it terms an emerging risk-based approach being deployed by states. Such an approach has already played a significant role in the ‘War on Terror’ to date, particularly in relation to Anti-Terrorist Financing and Aviation security guidelines. The change in tone and, potentially, substance from the Obama White House may however create the opportunity for risk-based approaches to move further onto the centre stage in the war on terror, just as it has in the wider Risk Society. This paper argues that the end of the ‘War on Terror’ at the rhetorical level suggests a need to shift our academic attention towards developing appropriate analytical frameworks for examining such risk-based strategies for countering terrorism. Our framework proposed here deploys the twin concepts of ‘risk bureaucracies’ and risk regulatory regimes (RRRs) in examining terrorist financing and aviation security regulations
    corecore