Preparing for the Psychological Consequences of Terrorism
Title | Preparing for the Psychological Consequences of Terrorism PDF eBook |
Author | Institute of Medicine |
Publisher | National Academies Press |
Pages | 184 |
Release | 2003-08-26 |
Genre | Political Science |
ISBN | 0309167922 |
The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.
Terrorism and the Electric Power Delivery System
Title | Terrorism and the Electric Power Delivery System PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 165 |
Release | 2012-11-25 |
Genre | Political Science |
ISBN | 0309114047 |
The electric power delivery system that carries electricity from large central generators to customers could be severely damaged by a small number of well-informed attackers. The system is inherently vulnerable because transmission lines may span hundreds of miles, and many key facilities are unguarded. This vulnerability is exacerbated by the fact that the power grid, most of which was originally designed to meet the needs of individual vertically integrated utilities, is being used to move power between regions to support the needs of competitive markets for power generation. Primarily because of ambiguities introduced as a result of recent restricting the of the industry and cost pressures from consumers and regulators, investment to strengthen and upgrade the grid has lagged, with the result that many parts of the bulk high-voltage system are heavily stressed. Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a large region of the country at least partially disabled for a very long time. Although there are many examples of terrorist and military attacks on power systems elsewhere in the world, at the time of this study international terrorists have shown limited interest in attacking the U.S. power grid. However, that should not be a basis for complacency. Because all parts of the economy, as well as human health and welfare, depend on electricity, the results could be devastating. Terrorism and the Electric Power Delivery System focuses on measures that could make the power delivery system less vulnerable to attacks, restore power faster after an attack, and make critical services less vulnerable while the delivery of conventional electric power has been disrupted.
Science and Technology to Counter Terrorism
Title | Science and Technology to Counter Terrorism PDF eBook |
Author | International Strategic and Security Studies Programme of the National Institute of Advanced Studies |
Publisher | National Academies Press |
Pages | 180 |
Release | 2007-03-27 |
Genre | Political Science |
ISBN | 0309104998 |
This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.
Information Technology for Counterterrorism
Title | Information Technology for Counterterrorism PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 145 |
Release | 2003-04-07 |
Genre | Computers |
ISBN | 0309087368 |
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Protecting Individual Privacy in the Struggle Against Terrorists
Title | Protecting Individual Privacy in the Struggle Against Terrorists PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 376 |
Release | 2008-09-26 |
Genre | Computers |
ISBN | 0309134447 |
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Preparing for Terrorism
Title | Preparing for Terrorism PDF eBook |
Author | Institute of Medicine |
Publisher | National Academies Press |
Pages | 330 |
Release | 2002-07-11 |
Genre | Political Science |
ISBN | 0309169364 |
The Metropolitan Medical Response System (MMRS) program of the U. S. Department of Health and Human Services (DHHS) provides funds to major U. S. cities to help them develop plans for coping with the health and medical consequences of a terrorist attack with chemical, biological, or radiological (CBR) agents. DHHS asked the Institute of Medicine (IOM) to assist in assessing the effectiveness of the MMRS program by developing appropriate evaluation methods, tools, and processes to assess both its own management of the program and local preparedness in the cities that have participated in the program. This book provides the managers of the MMRS program and others concerned about local capabilities to cope with CBR terrorism with three evaluation tools and a three-part assessment method. The tools are a questionnaire survey eliciting feedback about the management of the MMRS program, a table of preparedness indicators for 23 essential response capabilities, and a set of three scenarios and related questions for group discussion. The assessment method described integrates document inspection, a site visit by a team of expert peer reviewers, and observations at community exercises and drills.
Cyberterrorism
Title | Cyberterrorism PDF eBook |
Author | Gabriel Weimann |
Publisher | |
Pages | 12 |
Release | 2004 |
Genre | Computer crimes |
ISBN |