Preparing for the Psychological Consequences of Terrorism


Book Description

The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.




Terrorism and the Electric Power Delivery System


Book Description

The electric power delivery system that carries electricity from large central generators to customers could be severely damaged by a small number of well-informed attackers. The system is inherently vulnerable because transmission lines may span hundreds of miles, and many key facilities are unguarded. This vulnerability is exacerbated by the fact that the power grid, most of which was originally designed to meet the needs of individual vertically integrated utilities, is being used to move power between regions to support the needs of competitive markets for power generation. Primarily because of ambiguities introduced as a result of recent restricting the of the industry and cost pressures from consumers and regulators, investment to strengthen and upgrade the grid has lagged, with the result that many parts of the bulk high-voltage system are heavily stressed. Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a large region of the country at least partially disabled for a very long time. Although there are many examples of terrorist and military attacks on power systems elsewhere in the world, at the time of this study international terrorists have shown limited interest in attacking the U.S. power grid. However, that should not be a basis for complacency. Because all parts of the economy, as well as human health and welfare, depend on electricity, the results could be devastating. Terrorism and the Electric Power Delivery System focuses on measures that could make the power delivery system less vulnerable to attacks, restore power faster after an attack, and make critical services less vulnerable while the delivery of conventional electric power has been disrupted.




Science and Technology to Counter Terrorism


Book Description

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.




Information Technology for Counterterrorism


Book Description

Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




Making the Nation Safer


Book Description

This report describes many ways in which science and engineering can contribute to making the nation safer against the threat of catastrophic terrorism. The report identifies key actions that can be undertaken now, based on knowledge and technologies in hand, and, equally important, describes key opportunities for reducing current and future risks through longer-term research and development activities.




Terrorism: Reducing Vulnerabilities and Improving Responses


Book Description

This book is devoted primarily to papers prepared by American and Russian specialists on cyber terrorism and urban terrorism. It also includes papers on biological and radiological terrorism from the American and Russian perspectives. Of particular interest are the discussions of the hostage situation at Dubrovko in Moscow, the damge inflicted in New York during the attacks on 9/11, and Russian priorities in addressing cyber terrorism.




The Long Shadow of 9/11


Book Description

This book provides a multifaceted array of answers to the question, In the ten years since the 9/11 terrorist attacks, how has America responded? In a series of essays, RAND authors lend a farsighted perspective to the national dialogue on 9/11's legacy. The essays assess the military, political, fiscal, social, cultural, psychological, and even moral implications of U.S. policymaking since 9/11. Part One of the book addresses the lessons learned from America's accomplishments and mistakes in its responses to the 9/11 attacks and the ongoing terrorist threat. Part Two explores reactions to the extreme ideologies of the terrorists and to the fears they have generated. Part Three presents the dilemmas of asymmetrical warfare and suggests ways to resolve them. Part Four cautions against sacrificing a long-term strategy by imposing short-term solutions, particularly with respect to air passenger security and counterterrorism intelligence. Finally, Part Five looks at the effects of the terrorist attacks on the U.S. public health system, at the potential role of compensation policy for losses incurred by terrorism, and at the possible long-term effects of terrorism and counterterrorism on American values, laws, and society.--Publisher description.




Intelligence Guide for First Responders


Book Description

This Interagency Threat Assessment and Coordination Group (ITACG) Intelligence Guide for First Responders is designed to assist state, local, tribal law enforcement, firefighting, homeland security, and appropriate private sector personnel in accessing and understanding Federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting. Most of the information contained in this guide was compiled, derived, and adapted from existing Intelligence Community and open source references. The ITACG consists of state, local, and tribal first responders and federal intelligence analysts from the Department of Homeland Security and the Federal Bureau of Investigation, working at the National Counterterrorism Center (NCTC) to enhance the sharing of federal counterterrorism, homeland security, and weapons of mass destruction information with state, local, and tribal consumers of intelligence.




Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings


Book Description

The text provides guidance to the building science community of architects and engineers, to reduce physical damage to buildings, related infrastructure, and people caused by terrorist assaults. It presents incremental approaches that can be implemented over time to decrease the vulnerability of buildings to terrorist threats. Many of the recommendations can be implemented quickly and cost-effectively. The manual contains many how-to aspects based upon current information contained in Federal Emergency Management Agency (FEMA), Department of Commerce, Department of Defense, Department of Justice, General Services Administration, Department of Veterans Affairs, Centers for Disease Control and Prevention/National Institute for Occupational Safety and Health, and other publications. It describes a threat assessment methodology and presents a Building Vulnerability Assessment Checklist to support the assessment process. It also discusses architectural and engineering design considerations, standoff distances, explosive blast, and chemical, biological, and radiological (CBR) information. The appendices includes a glossary of CBR definitions as well as general definitions of key terminologies used in the building science security area. The appendices also describe design considerations for electronic security systems and provide a listing of associations and organizations currently working in the building science security area.