Protecting People and Buildings from Terrorism


Book Description

Concerned with the vulnerability of U.S. civilian and military personnel to terrorist bombing attacks, the U.S. Congress directed the Department of Defense to undertake a comprehensive research and testing program aimed at protecting people in buildings from such attacks. The Blast Mitigation for Structures Program (BMSP) was initiated in 1997 and has produced a large volume of experimental and analytical data that will permit the design of new, more robust buildings as well as the development of methods to retrofit a large number of vulnerable existing structures. This report reviews the BMSP program and investigates a process that would use existing institutional infrastructures (i.e., building code and standards-writing organizations, professional and technical organizations, universities, and research centers) to disseminate knowledge.




Science and Technology to Counter Terrorism


Book Description

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




Soft Target Hardening


Book Description

The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. ​Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.




Preparing for the Psychological Consequences of Terrorism


Book Description

The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.




Terrorism and the Electric Power Delivery System


Book Description

The electric power delivery system that carries electricity from large central generators to customers could be severely damaged by a small number of well-informed attackers. The system is inherently vulnerable because transmission lines may span hundreds of miles, and many key facilities are unguarded. This vulnerability is exacerbated by the fact that the power grid, most of which was originally designed to meet the needs of individual vertically integrated utilities, is being used to move power between regions to support the needs of competitive markets for power generation. Primarily because of ambiguities introduced as a result of recent restricting the of the industry and cost pressures from consumers and regulators, investment to strengthen and upgrade the grid has lagged, with the result that many parts of the bulk high-voltage system are heavily stressed. Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a large region of the country at least partially disabled for a very long time. Although there are many examples of terrorist and military attacks on power systems elsewhere in the world, at the time of this study international terrorists have shown limited interest in attacking the U.S. power grid. However, that should not be a basis for complacency. Because all parts of the economy, as well as human health and welfare, depend on electricity, the results could be devastating. Terrorism and the Electric Power Delivery System focuses on measures that could make the power delivery system less vulnerable to attacks, restore power faster after an attack, and make critical services less vulnerable while the delivery of conventional electric power has been disrupted.




Making the Nation Safer


Book Description

This report describes many ways in which science and engineering can contribute to making the nation safer against the threat of catastrophic terrorism. The report identifies key actions that can be undertaken now, based on knowledge and technologies in hand, and, equally important, describes key opportunities for reducing current and future risks through longer-term research and development activities.




Protection of Federal Office Buildings Against Terrorism


Book Description

Federal office buildings and the threat of terrorism -- Guidelines for security management -- Threat assessment and vulnerability analysis -- Security guidelines for sites and buildings -- Conclusions and recommendations -- Appendix A: Vulnerability checklist.




Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings


Book Description

The text provides guidance to the building science community of architects and engineers, to reduce physical damage to buildings, related infrastructure, and people caused by terrorist assaults. It presents incremental approaches that can be implemented over time to decrease the vulnerability of buildings to terrorist threats. Many of the recommendations can be implemented quickly and cost-effectively. The manual contains many how-to aspects based upon current information contained in Federal Emergency Management Agency (FEMA), Department of Commerce, Department of Defense, Department of Justice, General Services Administration, Department of Veterans Affairs, Centers for Disease Control and Prevention/National Institute for Occupational Safety and Health, and other publications. It describes a threat assessment methodology and presents a Building Vulnerability Assessment Checklist to support the assessment process. It also discusses architectural and engineering design considerations, standoff distances, explosive blast, and chemical, biological, and radiological (CBR) information. The appendices includes a glossary of CBR definitions as well as general definitions of key terminologies used in the building science security area. The appendices also describe design considerations for electronic security systems and provide a listing of associations and organizations currently working in the building science security area.