Browse Results What Format Should I Choose?

Showing 1 through 16 of 16 results

Aptitude for Destruction, Volume 2

by Peter Chalk Kim Cragin Brian A. Jackson John C. Baker John V. Parachini

Better ways are needed to understand how terrorist groups increase their effectiveness and become more dangerous. Learning is the link between what a group wants to do and its ability to actually do it; therefore, a better understanding of group learning might contribute to the design of better measures for combating terrorism. This study analyzes current understanding of group learning and the factors that influence it. It presents detailed case studies of learning in five terrorist organizations and develops a methodology for ascertaining what and why groups have learned, providing insights into their learning processes.

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

by Peter Chalk Kim Cragin Brian A. Jackson John V. Parachini Bruce Newsome R. Kim Cragin

Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to understand terrorists' counter-technology efforts. Fully exploring adversaries' counter-technology behaviors can help make the best choices to protect from the nation from the threat of terrorism.

The Challenge of Domestic Intelligence in a Free Society

by Brian A. Jackson Agnes Gereben Schaefer Benjamin W Goldsmith Genevieve Lester Darcy Noricks

Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. This book examines such an agency's possible capability, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved.

Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement

by Lois M. Davis Brian A. Jackson William Schwabe

Under the American federal system, most law is cast as state statutes and local ordinances; accordingly, most law enforcement is the responsibility of state and local agencies. Federal law and federal law enforcement come into play only where there is rationale for it, consistent with the Constitution. Within this framework, a clear role has been identified for federal support of state and local agencies. This report provides findings of a study of technology in use or needed by law enforcement agencies at the state and local level, for the purpose of informing federal policymakers as they consider technology-related support for these agencies. In addition, it seeks to characterize the obstacles that exist to technology adoption by law enforcement agencies and to characterize the perceived effects of federal assistance programs intended to facilitate the process. The study findings are based on a nationwide Law Enforcement Technology Survey and a similar Forensics Technology Survey (FTS) conducted in late spring and early summer2000, interviews conducted throughout the year, focus groups conducted in autumn 2000, and review of an extensive, largely nonacademic literature. Companion reports: Schwabe, William, Needs and Prospects for Crime-Fighting Technology: The Federal Role in Assisting State and Local Law Enforcement, Santa Monica, Calif.: RAND, 1999. Davis, Lois M., William Schwabe, and Ronald Fricker, Challenges and Choices for Crime-Fighting Technology: Results from Two Nationwide Surveys, Santa Monica, Calif.: RAND, 2001.

Considering the Creation of a Domestic Intelligence Agency in the United States

by Cheryl Y. Marcum Brian A. Jackson Albert A. Robbert Andrew Riddile

With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. Case studies of five other democracies--Australia, Canada, France, Germany, and the UK--provide lessons and common themes that may help policymakers decide. The authors find that* most of the five countries separate the agency that conducts domestic intelligence gathering from any arrest and detention powers* each country has instituted some measure of external oversight over its domestic intelligence agency* liaison with other international, foreign, state, and local agencies helps ensure the best sharing of information* the boundary between domestic and international intelligence activities may be blurring.

Emerging Threats and Security Planning

by Henry H. Willis David R. Frelinger Brian A. Jackson Charles J. Bushman

Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. This paper explores an approach for assessing novel or emerging threats and prioritizing which merit specific security attention and which can be addressed as part of existing security efforts.

Evaluating Novel Threats to the Homeland

by David R. Frelinger Michael J. Lostumbo Robert W. Button Brian A. Jackson

Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This approach can help defense planners understand how the capabilities that different attack modes provide address key adversary operational problems. Given the insights this analysis produced about when these systems would likely be preferred by an attacker, RAND explored defensive options to address the threat. UAVs and cruise missiles represent a ?niche threat? within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general.

Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations

by Henry H. Willis Brian A. Jackson Kay Sullivan Faith

The ability to measure emergency preparedness is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This volume describes a method, based on the concept of system reliability, for evaluating the preparedness of emergency response systems.

Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector

by Richard Silberglitt Brian A. Jackson Brian G. Chow John S. Hollywood Dulani Woods Joe Russo George B. Drake John S. Shaffer Mikhail Zaydman

Given the challenges posed to the U. S. corrections sector, such as tightened budgets and increasingly complex populations under its charge, it is valuable to identify opportunities where changes in tools, practices, or approaches could improve performance. In this report, RAND researchers, with the help of a practitioner Corrections Advisory Panel, seek to map out an innovation agenda for the sector.

How Do We Know What Information Sharing Is Really Worth?: Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

by Brian A. Jackson

How Do We Know What Information Sharing Is Really Worth?: Exporing Methodologies to Measure the Value of Information Sharing and Fusion Efforts (Research Reports)

Protecting Emergency Responders

by Tom Latourrette Brian A. Jackson James T. Bartis Irene T. Brahmakulam D. J. Peterson

In December 2001, a conference held in New York City brought together individuals with firsthand knowledge of emergency responses to terrorist attacks to discuss ways to improve the health and safety of emergency workers who respond to large-scale disasters. The meeting considered the responses to the September 11, 2001 attacks at the World Trade Center and the Pentagon and the 1995 attack at the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, as well as the emergency responses to the anthrax incidents that occurred through Autumn 2001. This book is intended to help managers and decisiomakers understand the unique working and safety environment associated with terrorist incidents, understand the equipment needs of emergency workers, and improve education and training programs and activities directed at the health and safety of emergency responders.

Protecting Emergency Responders Volume 2

by Tom Latourrette Brian A. Jackson James T. Bartis D. J. Peterson Ari Houser

Firefighters, law enforcement officers, and emergency medical service responders play a critical role in protecting people and property in the event of fires, medical emergencies, terrorist acts, and numerous other emergencies. The authors examine the hazards that responders face and the personal protective technology needed to contend with those hazards. The findings are based on in-depth discussions with 190 members of the emergency responder community and are intended to help define the protective technology needs of responders and develop a comprehensive personal protective technology research agenda.

Securing America's Passenger-Rail Systems

by Brian A. Jackson K. Jack Riley Jeremy M. Wilson Paul Steinberg Mel Eisman

U.S. communities depend on reliable, safe, and secure rail systems. Each weekday, more than 12 million passengers take to U.S. railways. This book explains a framework for security planners and policymakers to guide cost-effective rail-security planning, specifically for the risk of terrorism. Risk is a function of threat, vulnerability, and consequences. This book focuses on addressing vulnerabilities and limiting consequences.

Sharing the Dragon's Teeth: Terrorist Groups and the Exchange of New Technologies

by Peter Chalk Sara A. Daly Kim Cragin Brian A. Jackson

Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists' adoption of new technologies.

Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

by David R. Frelinger Brian A. Jackson James Bonomo Giacomo Bergamo

Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States should urgently start discussions with key producer nations and also decide on an architecture needed to impose technical controls on new mortar systems that should enter development soon.

Understanding the Role of Deterrence in Counterterrorism Security

by Brian A. Jackson Andrew R. Morral

Deterrence--a central feature of counterterrorism security systems and a major factor in the cost-effectiveness of many security programs--is not well understood or measured. This paper offers a framework for understanding how security systems may deter or displace attacks and how to measure the relative deterrent value of alternative systems. This framework may aid in attempts to achieve increased security benefits with limited resources.

Showing 1 through 16 of 16 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.