Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals


Book Description

Improvised explosive devices (IEDs) are a type of unconventional explosive weapon that can be deployed in a variety of ways, and can cause loss of life, injury, and property damage in both military and civilian environments. Terrorists, violent extremists, and criminals often choose IEDs because the ingredients, components, and instructions required to make IEDs are highly accessible. In many cases, precursor chemicals enable this criminal use of IEDs because they are used in the manufacture of homemade explosives (HMEs), which are often used as a component of IEDs. Many precursor chemicals are frequently used in industrial manufacturing and may be available as commercial products for personal use. Guides for making HMEs and instructions for constructing IEDs are widely available and can be easily found on the internet. Other countries restrict access to precursor chemicals in an effort to reduce the opportunity for HMEs to be used in IEDs. Although IED attacks have been less frequent in the United States than in other countries, IEDs remain a persistent domestic threat. Restricting access to precursor chemicals might contribute to reducing the threat of IED attacks and in turn prevent potentially devastating bombings, save lives, and reduce financial impacts. Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals prioritizes precursor chemicals that can be used to make HMEs and analyzes the movement of those chemicals through United States commercial supply chains and identifies potential vulnerabilities. This report examines current United States and international regulation of the chemicals, and compares the economic, security, and other tradeoffs among potential control strategies.




Countering the Threat of Improvised Explosive Devices


Book Description

Attacks in London, Madrid, Bali, Oklahoma City and other places indicate that improvised explosive devices (IEDs) are among the weapons of choice of terrorists throughout the world. Scientists and engineers have developed various technologies that have been used to counter individual IED attacks, but events in Iraq and elsewhere indicate that the effectiveness of IEDs as weapons of asymmetric warfare remains. The Office of Naval Research has asked The National Research Council to examine the current state of knowledge and practice in the prevention, detection, and mitigation of the effects of IEDs and make recommendations for avenues of research toward the goal of making these devices an ineffective tool of asymmetric warfare. The book includes recommendations such as identifying the most important and most vulnerable elements in the chain of events leading up to an IED attack, determining how resources can be controlled in order to prevent the construction of IEDs, new analytical methods and data modeling to predict the ever-changing behavior of insurgents/terrorists, a deeper understanding of social divisions in societies, enhanced capabilities for persistent surveillance, and improved IED detection capabilities.




Journal of the House of Representatives of the United States


Book Description

Some vols. include supplemental journals of "such proceedings of the sessions, as, during the time they were depending, were ordered to be kept secret, and respecting which the injunction of secrecy was afterwards taken off by the order of the House."




Terrorism and U.S. Foreign Policy


Book Description

The United States government-backed by the overwhelming support of the American public-takes a hard line against international terrorism. The tenets of official U.S. counterterrorist policy are: make no concessions or deals with terrorists; bring them to justice for their crimes; isolate and apply pressure on states that sponsor terrorism; and bolster the counterterrorist capabilities of countries willing to work with the United States. While these tenets are sound principles, their application, specifically overseas, raises difficult questions. Does the "no deal" policy actually deter terrorists acts? Are there cases where agreements might reduce terrorism, while advancing other U.S. interests? Do isolation and pressure really force offending states to alter their support for terrorists? What factors affect the willingness, not just the capability, of foreign governments to help the United States in counterterrorism? In this critical study, a career CIA officer provides a guide to constructing and executing counterterrorist policy, urging that it be formulated as an integral part of broader U.S. foreign policy. In the first four chapters, Paul R. Pillar identifies the necessary elements of counterterrorist policy, he examines why the United States is a prime terrorist target, and he reveals why the counterterrorist policies that seem strongest are not always the most effective. Chapter 5 examines the widely varying nature of terrorist groups and the policy tools most appropriately applied to them. Chapter 6 focuses on states that sponsor terrorism (including Iran, Libya, North Korea, and Cuba), along with those that enable it to occur (particularly Greece and Pakistan). Pillar examines ways in which the American public's perspective toward terrorism can actually constrain counterterrorist policy, and he concludes that terrorism cannot be "defeated" only reduced, attenuated, and to some degree, controlled. The final chapter summarizes his recommendations f







Natural Security


Book Description

Arms races among invertebrates, intelligence gathering by the immune system and alarm calls by marmots are but a few of nature's security strategies that have been tested and modified over billions of years. This provocative book applies lessons from nature to our own toughest security problems—from global terrorism to the rise of infectious disease to natural disasters. Written by a truly multidisciplinary group including paleobiologists, anthropologists, psychologists, ecologists, and national security experts, it considers how models and ideas from evolutionary biology can improve national security strategies ranging from risk assessment, security analysis, and public policy to long-term strategic goals.




Infantry


Book Description




The Power of Diversity in the Armed Forces


Book Description

While countries throughout the world rely on immigrants to support their populations and economies, access to the military is limited, denied to those who have not yet acquired citizenship. Precluding immigrants from serving in their host country’s armed forces is an issue of moral equity and operational effectiveness. Allowing immigrants to enlist ensures that the military represents the population it serves and encourages inclusivity and cultural change within the institution, while also creating a more effective military force. The Power of Diversity in the Armed Forces investigates how different countries approach the inclusion or exclusion of immigrants in their armed forces and offers immigrant military participation as a pathway to citizenship and a way to foster greater societal integration and achieve a more equitable, diverse, and inclusive military. By surveying international perspectives on immigrant and non-citizen military participation in twelve countries, The Power of Diversity in the Armed Forces introduces and examines a new way to unlock the power of diversity in military organizations globally.