4,120 research outputs found

    Quantitative Risk-Based Analysis for Military Counterterrorism Systems

    Get PDF
    The article of record as published may be found at http://dx.doi.org/10.1002/sysThis paper presents a realistic and practical approach to quantitatively assess the risk-reduction capabilities of military counterterrorism systems in terms of damage cost and casualty figures. The comparison of alternatives is thereby based on absolute quantities rather than an aggregated utility or value provided by multicriteria decision analysis methods. The key elements of the approach are (1) the use of decision-attack event trees for modeling and analyzing scenarios, (2) a portfolio model approach for analyzing multiple threats, and (3) the quantitative probabilistic risk assessment matrix for communicating the results. Decision-attack event trees are especially appropriate for modeling and analyzing terrorist attacks where the sequence of events and outcomes are time-sensitive. The actions of the attackers and the defenders are modeled as decisions and the outcomes are modeled as probabilistic events. The quantitative probabilistic risk assessment matrix provides information about the range of the possible outcomes while retaining the simplicity of the classic safety risk assessment matrix based on Mil-Std-882D. It therefore provides a simple and reliable tool for comparing alternatives on the basis of risk including confidence levels rather than single point estimates. This additional valuable information requires minimal additional effort. The proposed approach is illustrated using a simplified but realistic model of a destroyer operating in inland restricted waters. The complex problem of choosing a robust counterterrorism protection system against multiple terrorist threats is analyzed by introducing a surrogate multi-threat portfolio. The associated risk profile provides a practical approach for assessing the robustness of different counterterrorism systems against plausible terrorist threats. The paper documents the analysis for a hypothetical case of three potential threats.This work was performed as part of the Naval Postgraduate School institutionally funded research

    Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy

    Get PDF
    This paper develops a deductive theoretical framework for assessing the EU's added value in the fight against terrorism. The first part argues that public good theory helps to conceptualize objectives of international counterterrorism cooperation and the respective role of international organizations. It critically evaluates existing discussions of security cooperation from this theoretical perspective and sets out a typology of policies according to three aggregation technologies (weaker links, summation, better shot), each of which is linked to a specific set of governance challenges. The second part surveys the EU's counterterrorism efforts on this basis. Weaker link issues - such as the protection of the movement of people, goods and capital - and the related problem of mutual assurance have been quite successfully addressed, even if there is increasing uncertainty over the boundaries of cooperation. In contrast, the EU fell short with regard to joint efforts in the fight against terrorism due to the non-excludable nature of benefits, as in the case of foreign policy, or (partial) rivalry of consumption, as in the case of intelligence sharing or disaster response capacities. Finally, the EU increasingly supports better shot initiatives to develop new instruments and technologies to combat terrorism, but is often overtaken by mini-lateral forms of cooperation.counterterrorism, public good theory, international organisations, European Union

    An Examination of Factors Affecting Information Sharing among Law Enforcement Agencies

    Get PDF
    The purpose of the present study was to investigate using survey data to find factors or barriers which contributed to local law enforcement participation and support of intelligence information sharing. Following the September 11, 2001, attacks in New York City and Arlington, Virginia, new homeland security initiatives and directives were created from the legislative and executive branches of the federal government. Several new initiatives and directives provided new communication opportunities for partnerships between all levels of law enforcement to combat the future threat of domestic terrorism. The evaluation literature indicated that a majority of post-9/11, initiatives, including the creation of the Department of Homeland Security, were strategically implemented using a top-down, reactive approach to terrorism-related intelligence gathering. Technological, organizational, or cultural breakdowns between the federated jurisdictions of law enforcement contributed to the vulnerability of United States defense capabilities. Disparate pieces of intelligence information were available to several federal, state, and local terror investigation agencies, but the agencies were not able to piece together the information in a timely manner. The study examined implementation issues from a bottom-up perspective with participant local law enforcement departments in four separate states, across four geographic areas of the country. In order to examine these issues, responses of participants in the study were analyzed through the administration of a survey instrument. Participants also were provided an optional opportunity to provide qualitative data on the last page of the survey instrument. One of the goals of the study was to identify barriers so a more proactive approach with more partnerships can be implemented through the development of a seamless communicative network where terror information can be shared interoperable across all levels of law enforcement

    Evaluating U.S. Counterterrorism Policy on Domestic Terrorism Using the Global Terrorism Database

    Get PDF
    The United States has a long history of domestic terrorism, yet U.S. counterterrorism policy has focused almost completely on the threat from international terrorism. The gap in the literature was the absence of an empirical evaluation of U.S. counterterrorism policy on domestic terrorism in general. The purpose of this quantitative study was to describe the impact of 21st century U.S. counterterrorism policy on incidence, lethality, and cost of domestic terrorism using data from the Global Terrorism Database. The multiple streams framework and the power elite theory were used. In this longitudinal trend study using secondary data analysis, domestic terrorism data were analyzed from 749 terrorist attacks using descriptive statistics, visual analysis, and the series hazard model to examine any changes in the frequency and hazard of domestic terrorism in relation to the following 5 policies: USA PATRIOT Act, USA PATRIOT Improvement and Reauthorization Act, Animal Enterprise Terrorism Act, Implementing Recommendations of the 9/11 Commission Act, and USA FREEDOM Act. The results empirically supported the greater threat of domestic terrorism and showed that domestic terrorism changed in relation to counterterrorism policy. Further, the addition of the series hazard model in the analysis of domestic terrorism following policy implementation added additional depth to the results. This study contributed to positive social change by providing policy makers and counterterrorism agencies with an empirical, evidence-based method for evaluating U.S. counterterrorism policy and for a non-partisan, non-political, evidence-based method for quantitatively determining terrorist threat

    SOPHIA

    Get PDF
    The Iraqi Insurgency (2003–2011) has commonly been characterized as demonstrating the tendency for violence to cluster and diffuse at the local level. Recent research has demonstrated that insurgent attacks in Iraq cluster in time and space in a manner similar to that observed for the spread of a disease. The current study employs a variety of approaches common to the scientific study of criminal activities to advance our understanding of the correlates of observed patterns of the incidence and contagion of insurgent attacks. We hypothesize that the precise patterns will vary from one place to another, but that more attacks will occur in areas that are heavily populated, where coalition forces are active, and along road networks. To test these hypotheses, we use a fishnet to build a geographical model of Baghdad that disaggregates the city into more than 3000 grid cell locations. A number of logistic regression models with spatial and temporal lags are employed to explore patterns of local escalation and diffusion. These models demonstrate the validity of arguments under each of three models but suggest, overall, that risk heterogeneity arguments provide the most compelling and consistent account of the location of insurgency. In particular, the results demonstrate that violence is most likely at locations with greater population levels, higher density of roads, and military garrisons

    Large emergency-response exercises: qualitative characteristics - a survey

    Get PDF
    Exercises, drills, or simulations are widely used, by governments, agencies and commercial organizations, to simulate serious incidents and train staff how to respond to them. International cooperation has led to increasingly large-scale exercises, often involving hundreds or even thousands of participants in many locations. The difference between ‘large’ and ‘small’ exercises is more than one of size: (a) Large exercises are more ‘experiential’ and more likely to undermine any model of reality that single organizations may create; (b) they create a ‘play space’ in which organizations and individuals act out their own needs and identifications, and a ritual with strong social implications; (c) group-analytic psychotherapy suggests that the emotions aroused in a large group may be stronger and more difficult to control. Feelings are an unacknowledged major factor in the success or failure of exercises; (d) successful large exercises help improve the nature of trust between individuals and the organizations they represent, changing it from a situational trust to a personal trust; (e) it is more difficult to learn from large exercises or to apply the lessons identified; (f) however, large exercises can help develop organizations and individuals. Exercises (and simulation in general) need to be approached from a broader multidisciplinary direction if their full potential is to be realized

    Is resilience a favourable concept in terrorism research? The multifaceted discourses of resilience in the academic literature

    Get PDF
    The concept of resilience is frequently found in academic documents describing the favoured solution for how to address the threat of terrorism. Despite this, few attempts have been made to critically examine what resilience means and whether it is a favourable concept in terrorism research. Since multiple researchers in other disciplines have claimed that the resilience concept serves as an umbrella concept for a range of positive attributes, this study investigates the different discourses that resilience in the academic terrorism literature is built upon. The analysis outlines five different discourses in the academic literature that contain different descriptions of what it means to be resilient regarding terrorism. It is concluded that the meaning of terrorism resilience in the academic literature is multifaceted, ambiguous and sometimes contradictory. The positive connotation embedded in the concept of resilience and the absence of a description of what it means not to be resilient is problematic because it turns resilience into a utopian goal rather than a realistic counterterrorism project. Moreover, resilience normalises the view of terrorism as a ubiquitous omnipresent threat and legitimises counterterrorism measures as a positive, depoliticised necessity. Resilience is serving ideological purposes, and thus researchers should not uncritically accept resilience as the solution to the threat of terrorism.publishedVersio

    The National Dialogue on the Quadrennial Homeland Security Review

    Get PDF
    Six years after its creation, the Department of Homeland Security (DHS) undertook the first Quadrennial Homeland Security Review (QHSR) to inform the design and implementation of actions to ensure the safety of the United States and its citizens. This review, mandated by the Implementing the 9/11 Commission Recommendations Act of 2007, represents the first comprehensive examination of the homeland security strategy of the nation. The QHSR includes recommendations addressing the long-term strategy and priorities of the nation for homeland security and guidance on the programs, assets, capabilities, budget, policies, and authorities of the department.Rather than set policy internally and implement it in a top-down fashion, DHS undertook the QHSR in a new and innovative way by engaging tens of thousands of stakeholders and soliciting their ideas and comments at the outset of the process. Through a series of three-week-long, web-based discussions, stakeholders reviewed materials developed by DHS study groups, submitted and discussed their own ideas and priorities, and rated or "tagged" others' feedback to surface the most relevant ideas and important themes deserving further consideration.Key FindingsThe recommendations included: (1) DHS should enhance its capacity for coordinating stakeholder engagement and consultation efforts across its component agencies, (2) DHS and other agencies should create special procurement and contracting guidance for acquisitions that involve creating or hosting such web-based engagement platforms as the National Dialogue, and (3) DHS should begin future stakeholder engagements by crafting quantitative metrics or indicators to measure such outcomes as transparency, community-building, and capacity

    National Security Pedagogy: The Role of Simulations

    Get PDF
    This article challenges the dominant pedagogical assumptions in the legal academy. It begins by briefly considering the state of the field of national security, noting the rapid expansion in employment and the breadth of related positions that have been created post-9/11. It considers, in the process, how the legal academy has, as an institutional matter, responded to the demand. Part III examines traditional legal pedagogy, grounding the discussion in studies initiated by the American Bar Association, the Carnegie Foundation, and others. It suggests that using the law-writ-large as a starting point for those interested in national security law is a mistake. Instead, it makes more sense to work backwards from the skills most essential in this area of the law. The article then proposes six pedagogical goals that serve to distinguish national security law: (1) understanding the law as applied, (2) dealing with factual chaos and uncertainty, (3) obtaining critical distance—including, inter alia, when not to give legal advice, (4) developing nontraditional written and oral communication skills, (5) exhibiting leadership, integrity, and good judgment in a high-stakes, highly-charged environment, and (6) creating continued opportunities for self-learning. Equally important to the exercise of each of these skills is the ability to integrate them in the course of performance. These goals, and the subsidiary points they cover, are neither conclusive nor exclusive. Many of them incorporate skills that all lawyers should have—such as the ability to handle pressure, knowing how to modulate the mode and content of communications depending upon the circumstances, and managing ego, personality, and subordination. To the extent that they are overlooked by mainstream legal education, however, and present in a unique manner in national security law, they underscore the importance of more careful consideration of the skills required in this particular field. Having proposed a pedagogical approach, the article turns in Part IV to the question of how effective traditional law school teaching is in helping to students reach these goals. Doctrinal and experiential courses both prove important. The problem is that in national security law, the way in which these have become manifest often falls short of accomplishing the six pedagogical aims. Gaps left in doctrinal course are not adequately covered by devices typically adopted in the experiential realm, even as clinics, externships, and moot court competitions are in many ways ill-suited to national security. The article thus proposes in Part V a new model for national security legal education, based on innovations currently underway at Georgetown Law. NSL Sim 2.0 adapts a doctrinal course to the special needs of national security. Course design is preceded by careful regulatory, statutory, and Constitutional analysis, paired with policy considerations. The course takes advantage of new and emerging technologies to immerse students in a multi-day, real-world exercise, which forces students to deal with an information-rich environment, rapidly changing facts, and abbreviated timelines. It points to a new model of legal education that advances students in the pedagogical goals identified above, while complementing, rather than supplanting, the critical intellectual discourse that underlies the value of higher legal education
    corecore