Advanced search Help
Searching for terms: ALL (Domestic AND (U.S.) AND Terrorism) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Annual Report to Congress on Civil Aviation Security: January 1, 1996 - December 31, 1996
This report presents a summary of events. programs. and accomplishments in civil aviation scurity in 1996, including the effectiveness of screening in air transportation and foreign air carrier and airport security. Recent events, growth of the aviation industry, and the intelligence assessments that pointed to an increasing threat of terrorism within the United States raised concern about the standard everyday measures that formed the baseline of domestic aviation security. This concern, the tragedies of VluJet Fligth 592 and TWA Fligth 800, and major legislation drove a year of sweeping changes and growing partnerships and programs in civil aviation security.
United States. Federal Aviation Administration
1997
-
[Executive Summary of Joint FBI-CIA Report on Extent of Saudi Government Support for Terrorism]
"Since the 11 September 2001 attacks, the United States Intelligence Community (USIC) has been working to assess Saudi Arabia's ties to terrorism, including the 2001 terrorist acts, in order to address questions arising about the country's support for organizations that may have provided support for previous al-Qa'ida attakcs. [...] Recent cooperation between Saudi intelligence and the USIC is largely driven by the Saudi royal family's recognition of the domestic threat posed to it by al-Qa'ida following several bombings by group inside Saudi Arabia, starting in May 2003."
United States. Central Intelligence Agency
2005-09-01
-
There's a Pattern Here: The Case to Integrate Environmental Security into Homeland Security Strategy
"The time is long overdue to acknowledge that global climate and resource stresses, encompassed by the concept o f environmental security (ES), are an increasingly important part of 'homeland' security (HS) study and practice, by even the most restricted definitions of HS. Environmental security issues will affect global economic and political stability, US national interests, and the risk of war and terrorism. Just as homeland security encompasses many complex issues and interconnected subfields, environmental security (ES) is interdisciplinary by nature. In essence, ES is an emergent discipline borrowing from a combination of environmental studies -- which decades ago integrated environmental science with public policy -- and the broader observations of how environmental change, extreme weather events and resource scarcity issues impact domestic and international security. In a two-part argument, we first observe the growing environmental and resource-related security threats at every level of analysis, from global to individual levels as consequences of warming-induced climate alterations. Next, given the significant impacts on local, regional, and international geopolitical stability, we discuss why environmental security threats must be incorporated into both homeland and national security strategic planning. Developing a theory of environmental security seems central to a more complete understanding of homeland security and a more modern concept of national security."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
O'Sullivan, Terry M.; Ramsay, James D.
2013-06
-
Is it Time to Designate Coast Guard Special Operations Forces?
"This qualitative thesis examines the Coast Guard's historic participation in special operations and a potential national requirement for designated Coast Guard special operations forces. Some observers have rejected the label, "Global War on Terror," and embraced the notion of a "global counterinsurgency" characterized by a constant state of low-intensity conflict punctuated by short periods of mid- to high-intensity conflict. "Peacetime" and "wartime" are less useful terms. The Coast Guard's domestic missions have made it useful for niche missions in conflict, but Goldwater-Nichols overlooked Title 14, U.S. Code. There is no reason today administratively to transfer the Coast Guard to the Navy Department because neither the Secretary nor the Chief of Naval Operations is a warfighting commander. Likewise, Congress overlooked the Coast Guard when it created Special Operations Command. Insurgent, terrorist, and criminal networks all have cellular, compartmented structures and undermine legitimate governments. The Coast Guard is a natural enemy with considerable experience fighting them at home and abroad. Moreover, post-11 September Maritime Security Response requires prolific, robust, all-weather, day-night, opposed boarding capabilities with highly discriminate use of force to respond immediately to real-time, all-source intelligence. Homeland Security presents the opportunity to acknowledge the historical record and correct the policies and resourcing necessary for Coast Guard special operations forces."
U.S. Army Command and General Staff College
Bowen, Gary Russell
2005-06-17
-
Readout of Secretary Napolitano's Meeting with Airline Industry CEOs on Strengthening International Aviation Security [March 4, 2010]
"Department of Homeland Security (DHS) Secretary Napolitano today met with CEOs of the member airlines of the Air Transport Association of America (ATA), the largest airline trade association in the United States, and the International Air Transport Association (IATA), which represents approximately 230 airlines and more than 90 percent of the world's air traffic--part of her ongoing efforts to bring together major domestic and foreign air carriers to work on ways to bolster international aviation security. 'Government and the private sector must work collaboratively to develop and implement enhanced international security measures and standards,' said Secretary Napolitano. 'Working together with our partners in the aviation industry, we can and will strengthen the global aviation network to protect the traveling public from terrorism and other threats.' During the meeting, Secretary Napolitano and airline CEOs from across the United States and Europe discussed the international airline industry's important role in implementing stronger and more effective international aviation security measures to protect the traveling public."
United States. Department of Homeland Security. Press Office
2010-03-04
-
Secretary Napolitano Announces Major Aviation Security Milestone [June 7, 2010]
"Department of Homeland Security (DHS) Secretary Janet Napolitano today announced that 100 percent of passengers traveling within the United States and its territories are now being checked against terrorist watchlists through the Transportation Security Administration's (TSA) Secure Flight program--a major step in fulfilling a key 9/11 Commission recommendation. Before Secure Flight, airlines conducted passenger watchlist checking. 'Secure Flight fulfills a key recommendation of the of the 9/11 Commission Report, enabling TSA to screen passengers directly against government watchlists using passenger name, date of birth, and gender before a boarding pass is issued,' said Secretary Napolitano. 'This program is one of our many layers of security--coordinated with our partners in the airline industry and governments around the world--that we leverage to protect the traveling public against threats of terrorism.' Under Secure Flight, TSA prescreens passenger name, date of birth and gender against government watchlists for domestic and international flights. In addition to facilitating secure travel for all passengers, the program helps prevent the misidentification of passengers who have names similar to individuals on government watchlists."
United States. Department of Homeland Security. Press Office
2010-06-07
-
U.S. Department of Justice's Global Justice Information Sharing Initiative
"This booklet highlights key efforts supported by [the Global Justice Information Sharing Initiative (Global) Advisory Committee (GAC)]: vigilant preservation of privacy and civil liberties; fusion center partnerships; securing data we exchange and the networks we use; and harnessing the power of the latest innovations, so that new technology and standardized languages knock down barriers of siloed systems and the disparity of information 'haves' and 'have nots.'" The booklet references GAC resources available at http://www.it.ojp.gov/global. Background: "Chartered in 1998 as a Federal Advisory Committee by then U.S. Attorney General Janet Reno, the GAC was carefully structured to function as a unique partnership of justice-interested leaders, providing recommendations to America's chief law enforcement officer on standards-based electronic information exchange throughout the justice and public safety communities. Over the successive years, significant incidents have underscored the imperative of effective, efficient, and appropriate information sharing to address 'traditional' crimes, such as theft; high-profile crises, such as domestic and international terrorism; and new possibilities such as pandemics. With different agencies building disparate systems to address business-specific problems, the prospect of broadscale information sharing may seem, on its face, impossible. However, the collaborative process (which is a unique [GAC] hallmark) has resulted in support for development of numerous groundbreaking resources that have proven valuable in overcoming communication obstacles."
United States. Department of Justice
2009-04
-
Fact Sheet: Rewards for Justice Program
This fact sheet provides an overview of the Rewards for Justice Program, one of the most valuable U.S. Government assets in the fight against international terrorism. The fact sheet discusses how the program operates both domestically and overseas and summarizes its effectiveness over the past seven years by offering the total amount paid since the inception of the program.
United States. Department of State. Bureau of Public Affairs
2001-12-13
-
Agenda for Economic Security
This document is a lecture by R. Glenn Hubbard, Chairman of Council of Economic Advisers, entitled "An Agenda for Economic Security" as part of the Robert Weintraub Memorial Lecture at Baruch College on December 14, 2001. The lecture addressed the demands made on the American economy by the War on Terror and how to strengthen the economy in face of this. […] "the National Bureau of Economic Research recently made its official declaration that the United States is in recession. Although the NBER pointed to the events of September 11 as a key contributing factor, it dated the cyclical peak in March of 2001." Hubbard also discusses the agenda for the future, engineering faster growth, the steps for maintaining and improving growth, expanding the gains from trade, fueling growth through research, innovation, and improved technologies, tax reform, tort reform, supporting flexible markets, competition policies domestically and internationally, regulatory reform, market efficiency, displaced workers, efficiency in education, the progress of welfare reform, and improving health care.
Council of Economic Advisers (U.S.)
Hubbard, R. Glenn
2001-12-14
-
Tying US Defense Spending to GDP: Bad Logic, Bad Policy
"As the war in Iraq drags into its sixth year and cumulative spending approved by the Congress for the 'global war on terrorism' surpasses $850 billion, both the American public and security experts are becoming increasingly concerned about the present and future direction of US defense spending. One proposal under consideration is to allocate the defense budget each year as a specific percentage of America's gross domestic product (GDP).Advocates of this approach typically recommend pegging 'base' Department of Defense (DOD) spending, which excludes both supplemental appropriations for ongoing military operations in Iraq and Afghanistan and Department of Energy-administered nuclear weapons activities, at four percent of GDP. In an April 2008 speech on Iraq, President George W. Bush compared current defense spending to higher levels sustained during the Truman, Eisenhower, and Reagan administrations. He concluded that four percent of GDP 'is a large amount of money, but it is a modest fraction of our nation's wealth.' Republican presidential nominee Senator John McCain (R-Ariz.), top Pentagon officials, conservative security analysts, and several members of Congress have endorsed the four percent proposal. Media reports indicate that the proposal is under consideration by high-level Pentagon officials and 'may look very different by the time it reaches the White House or Capitol Hill."
Army War College (U.S.)
Sharp, Travis
2008-10
-
Readout of Secretary Napolitano's Remarks to the Aero Club on DHS Efforts to Bolster Aviation Security [April 26, 2010]
"Department of Homeland Security (DHS) Secretary Janet Napolitano today delivered remarks to domestic and international aviation leaders about the Department's ongoing efforts to bolster global aviation security at a luncheon hosted by the Aero Club of Washington. 'Protecting the international aviation system is a shared challenge that requires the mutual commitment of our international allies and private sector partners,' said Secretary Napolitano. 'We are committed to working closely with our partners around the world to deploy intelligence-based targeting, state-of-the art technologies and proactive screening measures to deter and disrupt terrorism and other threats to the global aviation system.' In her remarks, Secretary Napolitano commended the United States' many international partners who have taken steps to enhance aviation security through deployment of new technology, enhanced information sharing, and stronger standards to keep air travel safe. She also discussed DHS' ongoing efforts to bolster aviation security in the United States by assigning additional behavior detection officers, air marshals and explosives detection canine teams to airports around the country, and developing, updating and deploying the latest technology--highlighting the 450 Advanced Imaging Technology machines she has pledged to have in place by the end of 2010. The President's fiscal year 2011 budget proposal includes funding for the purchase and installation of 500 additional units."
United States. Department of Homeland Security. Press Office
2010-04-26
-
Operational Organization for Homeland Defense
In response to the growing threat of terrorism with chemical, biological and nuclear weapons, the United States government has developed a national concept of operations for responding to their use. This concept of operations consists of multiple agencies at the local, state and federal levels reacting to an incident with no clear operational organization for efficient command and control and effective response. A step in the right direction to resolve this potentially critical problem is to develop an organization under a single commander with the responsibility for domestic preparedness, response, and consequence management. Only with the proper command organization and subsequent unity of effort can we ensure the most effective employment of the many forces and resources currently tasked with homeland defense against and response to weapons of mass destruction.
Naval War College (U.S.)
Karol, Kevin P.
1999-05-17
-
Overcoming Ambivalence: The Case for Japanese Martial Internationalism
This thesis seeks to demonstrate that Japan can best satisfy its international security interests by assuming a combatant role in current and future multinational military coalitions. The thesis labels this alternative military posture "martial internationalism." An understanding of how Japanese military policy serves its overall international security interests is a central concern of this thesis. Japan's international security interests are defined as: (1) shaping a stable international security environment, (2) supporting the United Nations, and (3) upholding the Japan-United States alliance. Factors considered in this argument include trends in Japan's postwar military policy evolution and recent military activities and developments. The nature of Japan's current domestic military policy debate is analyzed in terms of relevant political, social, military, and economic perspectives. Regional and international ramifications of a more militarily assertive Japan are explored. The thesis investigates the potential for martial internationalism to realize Japan's international security interests and to permit a greater Japanese military contribution to the ongoing War on Terrorism. Finally, the thesis offers specific recommendations for both Japan and the United States toward implementing this alternative strategic design.
Naval Postgraduate School (U.S.)
Greig, Alex R.
2002-09
-
South Carolina National Guard Secure Area Duty Officer Program: A Reserve Component Active Shooter Contingency Case Study
From the thesis abstract; "On July 16, 2015, five military reservists were murdered during an active shooter attack on two reserve component military facilities. This act of domestic terrorism was only the latest in a series targeting U.S. military facilities in recent years. Since the Fort Hood Massacre in 2009, at least 37 military personnel have been killed and 55 wounded while at their place of duty in the United States. In response to this threat the South Carolina National Guard, in collaboration with the South Carolina Law Enforcement Division, established an active shooter contingency program called the Secure Area Duty Officer Program, or SADOP. The focus of this single case study thesis is to determine whether SADOP is an effective method to mitigate risk posed by the dynamic active shooter threat. The assertion that this innovative approach achieves its purpose is supported by the deliberate development methodology and interviews with key decision makers instrumental in the crisis-action response concept planning and program implementation. The findings of this study indicate that SADOP resourcefully employs a force protection framework tailored to the success of the reserve component as opposed to obliging its organizations to utilize legacy force-protection regulations designed by and for the active component of the military."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Ramey, Barry N.
2017-12
-
U.S. Military's Capabilities to Respond to Domestic Terrorist Attacks Involving the Use of Weapons of Mass Destruction, Hearing Before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, United States Senate, One Hundred Seventh Congress, First Session, May 1, 2001
From the opening statement of Pat Roberts: "The Subcommittee on Emerging Threats and Capabilities meets this afternoon to review the U.S. military's capability to respond to domestic terrorist attacks, and those attacks involving the use of weapons of mass destruction. Since its establishment in 1999, this subcommittee has worked to ensure that the Department of Defense is adequately prepared, organized, and funded for its critical combating terrorism mission, and today's hearing is a continuation of this process." Statements, letters, and materials submitted for the record include those of the following: Robert J. Lieberman, Russell C. Davis, Michael D. Maples, Bruce M. Lawlor, and Pat Roberts.
United States. Government Printing Office
2002
-
Winning the Invisible War: An Agricultural Pilot Plan for Afghanistan
"When this paper was undertaken in the summer of 2007, one of its purposes was to sound the alarm over Afghanistan and the critical need for comprehensive action across all sectors of society to prevent that country from becoming a failed state. The second purpose was to lay out the major areas that needed immediate attention, largely within the civil side of reconstruction and development. The third was to propose specific pilot plans for rejuvenating the agricultural sector. These plans were developed by experienced American farmers and other experts with long careers in government, agriculture, and development. The principle participants are co-authors. Now, six months later, it appears that the Bush administration and NATO [North Atlantic Treaty Organization] are taking that warning seriously. At least three studies are underway: one at Central Command; a second at the State Department; and a third at NATO. Those studies need not take much time to finish. The issues are clear. At the strategic level, what happens in Afghanistan and beyond its borders can have even greater long-term consequences than how the struggle to bring a measure of stability and order to Iraq turns out. Failure would be disastrous for the United States and the region. Afghanistan could again become a breeding ground for insurgency and terrorism, possibly worse than before the Taliban government was overthrown in 2001. The thriving drug trade also presents major national security and domestic criminal dangers. And what happens in Iraq, Iran, and Pakistan will influence and be influenced by conditions in Afghanistan."
National Defense University. Center for Technology and National Security Policy. Center for Complex Operations
Borcherdt, Edward; Carson, Austin; Kennefick, Frank
2008-03
-
Applying Private Sector Media Strategies to Fight Terrorism
From the Executive Summary: "The ideological threat of violent extremism is a global problem with domestic implications. Extremist groups conduct continuous communications campaigns, targeting vulnerable and receptive individuals to get them to self-radicalize and conduct violence in the name of extremist ideologies. As evidenced by Americans who have joined terrorist organizations or conducted mass casualty attacks, such as those witnessed in Orlando, Florida, and San Bernardino, California, the implications of violent extremist propaganda campaigns are becoming more complex, more widespread, and more deadly. The United States government (USG) currently spends billions of dollars each year to understand, communicate with, and engage various audiences, but its efforts in countering extremist propaganda remains fractured, uncoordinated, and inefficient. There have been numerous studies, reports, and reviews identifying problems and recommending solutions but no sustained success. There have also been attempts to enlist America's private sector to fight terrorism."
United States. Office of the Director of National Intelligence
2016?
-
Financial Services Sector Open Source Digest: July 2010
"The Sector Open Source Digest (SOSD) is a sector-wide summary of events that have taken place during the past month domestically and internationally. The SOSD is primarily a compilation and reorganization of reporting drawn from the Daily Open Source Intelligence Report (OSIR). The SOSD may also contain additional reporting not originally published in the OSIR. The source materials for the OSIR and SOSD are found using open source research methodologies and include imagery; local, national, and international media reports; academia and industry sources; multimedia and blogs; and other relevant publicly available sources. The SOSD is a compilation of unclassified source material and does not provide analysis or projection. The content found within the SOSD is strictly for sector situational awareness." This edition contains the following articles: "Account Takeover: The new wrinkle"; "Newest attack on your credit card: ATM shims"; "Police: Man drove car bomb into a bank"; "Gunman makes terror threat, robs downtown office"; "41% of IT pros admit to snooping on confidential information"; "Six indicted in Colorado on bank fraud charges"; "Fla. man indicted in $880M Ponzi scheme"; "Bank Failures: 2010 Pace Exceeds 2009"; and "Europe votes to send secret bank data to U.S. authorities".
United States. Department of the Treasury. Financial and Banking Information Infrastructure Committee
2010-07
-
Fiscal Year 2004 Competitive Training Grants Program (CTGP)
"The Office for Domestic Preparedness, United States Department of Homeland Security, is pleased to announce the FY2004 Competitive Training Grants Program (CTGP). The grants funded by this program will expand ODP's mission to prepare the nation's emergency responders to prevent, deter, respond to, and recover from incidents of Weapons of Mass Destruction terrorism in the United States. Enclosed in this packet is the Grant Application Kit with guidance for submitting materials through the Grants Management System, as well as the FY2004 CTGP Fact Sheet to assist applicants in understanding the process through which applications will be evaluated."
United States. Department of Homeland Security. Office for Domestic Preparedness
Mencer, Constance Suzanne, 1947-
2004-05-04
-
Development and Recognition of Homeland Security Law
"The thesis considers those laws created since 9/11 in direct response to that terrorist attack and intended to protect the American Homeland from further attack. Just as Congress passed thousands of pages of legislation in response to the events of 9/11, the Department of Homeland Security, created by one of those new laws, is churning out thousands of pages of federal regulations, and thousands of federal workers now seek to regulate and impose new legal standards, on U.S. citizens and businesses. After analyzing the congressional responses to 9/11, a survey was created and sent to those attorneys who hold themselves out as practicing or teaching 'Homeland Security Law.' The intent was to determine whether the legal profession should now recognize Homeland Security Law as a separate practice area, and if not, what steps are necessary before a practice area is recognized. A substantial majority in each survey, and in the interviews, found that anti-terrorism laws, emergency management and critical infrastructure resiliency and protection are included within the area of 'Homeland Security Law.' A working definition of Homeland Security Law then, is 'those laws and regulations enacted or promulgated to ensure domestic security from man made or natural attack or disaster'."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
McDaniel, Michael C.
2007-03
-
Utilizing Routine Water Quality Instruments and Artificial Neural Networks for Monitoring Distribution System Security
"Drinking water system security concerns have been a considerable issue in the United States in recent years, but in the last two years this issue has risen to new levels of urgency. The tragic events of September 11th highlighted America's vulnerability to terrorism and spurred a domestic security response unprecedented since World War II. Drinking water systems were identified almost immediately as a potential target for future attacks and were urged by the FBI to implement security measures. To address these threats, research and development efforts aimed at new technology for contaminant specific detection have increased significantly. Even though considerable additional research in this area is needed, there are concerns about this technology due to the potential costs, and the specificity of the monitoring being easily defeated. Currently, significant purposeful contamination of a water system won't be properly characterized until post-symptomatic epidemiological events are manifested in the affected community. Most drinking water systems currently monitor a significant number of water quality parameters at the plant. These are required for compliance and maintenance of water quality as the water enters the distribution system. In the distribution system, water quality is usually monitored through grab samples with an analysis turn-around time of hours to days."
United States. Department of the Air Force
Byer, David E.
2003-05-22
-
Review of the FBI's Investigative Activities Concerning Potential Protesters at the 2004 Democratic and Republican National Political Conventions
"In August 2004, newspaper articles reported that the Federal Bureau of Investigation (FBI) had questioned political demonstrators across the United States in advance of threatened violent and disruptive protests at the July 2004 Democratic National Convention and the August 2004 Republican National Convention. The initial articles stated that 'dozens of people' had been interviewed in at least six states, including past protesters and their friends and family members, and that anarchist groups reported being 'harassed' by federal agents. The articles also stated that grand jury subpoenas had been issued to several individuals calling for them to appear before the grand jury during the Democratic convention, thereby preventing them from attending the convention. In these articles, civil liberties groups alleged that the FBI was attempting to chill protesters from exercising their First Amendment rights. In response, the Department of Justice (Department or DOJ) suggested that the interviews were largely limited to efforts to disrupt a threatened bombing at the Democratic convention, and law enforcement officials placed the number of interviews at no more than 24. After publication of the initial news articles, three members of Congress asked the Office of the Inspector General (OIG) to initiate an investigation into 'possible violations of First Amendment free speech and assembly rights by the Justice Department in connection with their investigations of possible protests at the Democratic and Republican political conventions in Boston and New York and other venues.' At the time of the request, the OIG was conducting a review of the FBI's compliance with the Attorney General's Investigative Guidelines which govern domestic terrorism, criminal intelligence, and general crimes investigations. We determined that there were authorities available to the FBI to prepare for the 2004 political conventions in addition to the Investigative Guidelines, and we therefore decided to examine the allegations regarding the FBI's convention interviews in a separate review.6 This report describes the results of our review of the FBI's interviews and investigative activity related to potential protesters in connection with the 2004 Democratic and Republican national political conventions."
United States. Department of Justice. Office of the Inspector General
2006-04-27
-
Crisis Management- Operational Logistics & Asset Visibility Technologies
"The purpose of this MBA Project was to identify and explore logistical frameworks that leverage technology to overcome problems associated with coordinated logistics operations during crisis management. Over the past ten years, there have been significant advances in RFID, satellite and other related asset visibility technologies. These advances are mature enough to significantly increase the probability of achieving a useful common operational picture during emergency response activities. Recent crisis response operations that would have benefited from improved asset visibility include the Indian Ocean tsunami, the Pakistani earthquake, Hurricane Katrina and those related to the Global War on Terror. In each of these cases, multi-agency involvement, both foreign and domestic, compounded the complexity of asset tracking and communication protocols. The establishment of a logistics-tracking framework that provides adequate asset visibility, while maintaining operational security, will greatly increase the effectiveness of future crisis response operations. The proposed logistics framework serves as a viable solution for common logistical problems encountered by the U.S. and other industrialized nations while conducting crisis response operations. The framework identifies concepts, technologies and protocols that can be used to improve crisis operations on a global scale."
Naval Postgraduate School (U.S.)
Braunbeck, Richard A.; Mastria, Michael F.
2006-06
-
Federal Response to a Domestic Nuclear Attack
"The United States government needs to plan for and prepare against terrorist attacks. Terrorism, when combined with weapons of mass destruction, increases the planning complexity. In the event of a nuclear terrorist attack, the government will need to conduct consequence management in the affected areas, govern the non-affected areas, and prevent future attacks. This paper examines what actions, following a nuclear terrorist attack on domestic soil, produce the broadest and deepest results and what options the President has to address such a national emergency. The federal government must address the national effects caused by the attack itself as well as the anticipated results caused by communities enacting protective measures at the detriment of their neighbors. To produce the list of coordinated actions and options, this paper uses a scenario where a terrorist loads a 10-kiloton (kt) weapon into a truck, drives it to the nation's capital, and detonates it. After detonation, the government must attempt to mitigate the weapon's real and perceived effects. A review of the mitigating responses reveals that some actions are nearly impossible without prior planning and coordination. Additionally, the government must operate within a framework of constitutionally granted authorities. Continuity of government is assumed sufficient to exercise command and control and is beyond the scope of this paper. It is also beyond the scope of this paper to present more than a cursory overview of preventing a subsequent attack."
USAF Counterproliferation Center
Mercer, James C.
2009-08
-
Guidelines for Responding to a Chemical Weapons Incident [Revision 1 August 2003]
This "Guidelines for Responding to a Chemical Weapons Incident" document has been developed by the Domestic Preparedness Program (DPP)and has been updated as of 1 August 2003. Through the U.S. Army Soldier and Biological Chemical Command (SBCCOM), Chemical Weapons Improved Response Program (CWIRP), members of the Law Enforcement, Health and Safety, and the Emergency Response Functional Groups designed these guidelines with the intent to give assistance to all response personnel in dealing with critical incident management decisions consistent with an actual chemical weapons (CW) emergency response. These guidelines are neither mandated nor required procedures for response to the scene of a chemical terrorism incident. Rather, they are presented to provide technical and operational guidance for those agencies wishing to improve their response and related operations should a CW incident occur in their community. The focus of these guidelines was to validate the procedures and recommendations developed through the series of emergency response technical reports that have already been published by the CWIRP. That validation process was conducted via a forum consisting of representatives from the fire, Emergency Medical Services (EMS), police, and health and safety communities.
U.S. Army Chemical and Biological Defense Command
2003-08-01
-
Hearing on H.R. 5533, the Chemical Facilities Act of 2008 and H.R. 5577, the Chemical Facility Anti-Terrorism Act of 2008, Hearing Before the Subcommittee on Environment and Hazardous Materials of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, Second Session, June 12, 2008
From the statement of Hilda L. Solis: "The terrorist attacks of September 11 brought to the forefront the risks posed to our infrastructure by intentional acts of vandalism and terrorism, both foreign and domestic. These events and others also raise serious questions about our Nation's preparedness to respond to future attacks. This preparedness includes our drinking water system. I am pleased to have a representative with us today from southern California, a region which is particularly vulnerable to any threat to our water system, given our lack of water resources. The risk to our communities from chemical facilities and drinking water facilities, which use dangerous chemicals, as you know, are many. In addition to the damage to infrastructure, the economy and public health, such an incident would also seriously damage public confidence in our ability to secure our Nation. The risks we are discussing are widespread. Across our Nation, more than 7,000 chemical facilities may each pose risk to the health of 1,000 or more people. One hundred of these plants each risk one million people." Statements, letters, and materials submitted for the record include those of the following: John B. Shadegg, Lois Capps, Joe Barton, G.K. Butterfield, John D. Dingell, Cliff Stearns, John Sullivan, Benjamin Grumbles, Robert B. Stephan, Brad Coffey, P.J. Crowley, Marty Durbin, and Andrea Kidd Taylon.
United States. Government Printing Office
2008
-
Federal Bureau of Investigation (Part III), Hearing Before the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, Second Session, September 16, 2008
From John Conyers' opening statement: "The Federal Bureau of Investigation is the anchor of our Nation's Federal law enforcement and has the important responsibility of not only combating crime, conducting surveillance, initiating investigations but now have the responsibility of dealing with the issue of terrorism on top of all their other existing duties. We appreciate the Bureau's efforts to get us answers on our letters, particularly the September 5 letter. Director Mueller, we are trying to get a proposed copy of the Attorney General FBI guidelines. We are trying to identify what specific safeguards will prevent improper undercover FBI spying against domestic groups and citizens, abusive investigation techniques like pretext interviews; and improper racial and ethnic profiling. I would also like a statement as to whether the guidelines of former Attorney General Edward Levy to protect against improper invasions of privacy were rescinded by former Attorney General Ashcroft and, if they were, will they be reinstated? We have numerous questions on the anthrax issue, and we need an explanation of the improper collection of reporters' phone records and what disciplinary action will be taken for the FBI's improper collection of reporters' phone records and abuses, particularly concerning exigent letters and national security letters. And, finally, we need to know how many FBI agents were devoted to mortgage fraud issues before and after a top FBI official warned about this problem back in 2004. Included in that is, of course, an explanation of why fewer resources were devoted to mortgage fraud after the 2004 warnings." Statements, letters, and materials submitted for the record include those of the following: John Conyers Jr., Lamar Smith, Jerrold Nadler, Robert C. "Bobby" Scott, Louis Gohmert, and Robert S. Mueller, III.
United States. Government Printing Office
2009
-
Military Operations Other than War: Air Force Doctrine Document 2-3
"The United States faces ambiguous and regionally-focused challenges to its national interests. Military operations other than war (MOOTW) address these challenges, in concert with other instruments of national power, by deterring conflict and promoting stability both internationally and domestically. MOOTW comprise the entire range of capabilities the military offers in support of national security interests, short of conducting sustained combat operations. These capabilities include such small scale contingencies as show-of-force operations, limited strikes, noncombatant evacuations, sanctions enforcement, counterterrorism operations, peace operations, foreign humanitarian assistance, and military support to civilian authorities following a natural disaster in the United States. Air Force doctrine for MOOTW not only addresses how best to use aerospace power, but also stresses that lessons from these operations can enhance our combat capability. Aerospace forces often provide the critical capabilities required for success. Air Force doctrine for MOOTW will help all airmen understand how best to apply their abilities to these demanding missions. This change updates Air Force MOOTW doctrine by improving the discussions on the need for Air Force commanders to recognize the dynamic and volatile nature of the MOOTW environment during peace operations; by adding a discussion on the key roles of air mobility, the Air Force Medical Service, and chaplains in MOOTW; by expanding the discussion of the COMAFFOR [Commander of Air Force Forces], the role of the JAOC [Joint Air Operations Center], and C2 system; by introducing text that highlights the key role of information operations and counterintelligence operations in MOOTW; by clarifying the importance of exit strategies in certain MOOTW; by clarify the role of Judge Advocates in civil affairs roles; by expanding the narrative on MOOTW principles and providing more detail about MOOTW training and education."
United States. Department of the Air Force
2000-07-03
-
National Guard [website]
"Following the attacks of September 11, 2001, tens of thousands of Guard members have mobilized into federal service to provide security at home and combat terrorism abroad. These men and women served in harm's way during Operation Iraqi Freedom in Iraq (2003-2011) and Operation Enduring Freedom in Afghanistan (2002-present). In the largest and swiftest response to a domestic disaster in history, the Guard deployed more than 50,000 troops in support of the Gulf States following Hurricane Katrina in 2005. The National Guard continued to assist friends and neighbors as they endured multiple deployments overseas, and also trained to effectively respond to local contingencies and other emergencies. The National Guard continues its historic dual mission, providing trained units to the states, territories and the District of Columbia and keeping itself equipped to protect life and property. The Guard also provides trained units to the nation equipped and ready to defend the United States and its interests all over the globe."
United States. National Guard Bureau
-
Terrorist Watch List Screening: Efforts to Help Reduce Adverse Effects on the Public, Report to Congressional Requesters
"A consolidated watch list managed by the FBI's Terrorist Screening Center (TSC) contains the names of known or suspected terrorists, both international and domestic. Various agencies whose missions require screening for links to terrorism use watch list records. For example, U.S. Customs and Border Protection (CBP) screens travelers at ports of entry. Because screening is based on names, it can result in misidentifications when persons not on the list have a name that resembles one on the list. Also, some names may be mistakenly included on the watch list. In either case, individuals can be negatively affected and may express concerns or seek agency action, or redress, to prevent future occurrences. This report addresses: (1) the extent to which the numbers of misidentified persons are known and how they could be affected, (2) the major reasons misidentifications occur and the actions agencies are taking to reduce them or minimize their effects, and (3) the opportunities for redress available to individuals with watch list-related concerns. In conducting work at TSC and the principal federal agencies that use watch list data, GAO reviewed standard operating procedures and other relevant documentation and interviewed responsible officials."
United States. Government Accountability Office
2006-09-29