Listing 1 - 10 of 60 | << page >> |
Sort by
|
Choose an application
With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. Case studies of five other democracies--Australia, Canada, France, Germany, and the UK--provide lessons and common themes that may help policymakers decide. The authors find that* most of the five countries separate the agency that conducts domestic intelligence gathering from any arrest and detentio
Intelligence service --United States. --- Intelligence service --Western countries. --- Terrorism --Government policy --United States. --- Terrorism --United States --Prevention. --- Intelligence service --- Terrorism --- Prevention --- Government policy --- Prevention. --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Public administration --- Research --- Disinformation --- Secret service
Choose an application
The sharing of intelligence and law enforcement information is a central part of U.S. domestic security efforts, yet there are concerns about the effectiveness of information-sharing and fusion activities and their value relative to the public funds invested in them. This report lays out the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.
Domestic intelligence -- United States. --- Exchange of government information -- United States. --- Government information -- Access control -- United States. --- Information policy -- United States. --- Intelligence service -- United States. --- Intelligence service --- Domestic intelligence --- Information policy --- Domestic national security intelligence
Choose an application
Police. --- Law enforcement. --- Enforcement of law --- Criminal justice, Administration of --- Cops --- Gendarmes --- Law enforcement officers --- Officers, Law enforcement --- Officers, Police --- Police forces --- Police --- Police officers --- Police service --- Policemen --- Policing --- Criminal justice personnel --- Peace officers --- Public safety --- Security systems --- Legal status, laws, etc.
Choose an application
Terrorism --- Radicalism --- Violence --- Prevention.
Choose an application
Researchers examined past U.S. countering violent extremism and terrorism prevention efforts and explored policy options to strengthen terrorism prevention in the future. This document summarizes findings from the main report, including that current terrorism prevention capabilities are relatively limited and that there is a need for federal efforts to help strengthen local capacity. However, any federal efforts will need to build community trust to be successful.
Terrorism --- Violence --- Domestic terrorism --- National security --- Prevention.
Choose an application
The level of threat posed by a terrorist group is determined in large part by its ability to build its organizational capabilities and bring those capabilities to bear in violent action. As part of homeland security efforts, technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. Terrorist organizations are acutely aware of government efforts to deploy these systems and actively seek ways to evade or counteract them. This study draws on relevant data from the history of a variety of terroris
National security. --- Security systems. --- Terrorism. --- War on Terrorism, 2001-. --- War on Terrorism, 2001-2009 --- Security systems --- Terrorism --- National security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Technology. --- Prevention. --- Global Struggle Against Violent Extremism, 2001-2009 --- Global War on Terror, 2001-2009 --- GWOT, 2001-2009 (War on Terrorism) --- Terror War, 2001-2009 --- Terrorism War, 2001-2009 --- War against Terrorism, 2001-2009 --- War on Terror, 2001-2009 --- National security policy --- NSP (National security policy) --- Security policy, National --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Security measures --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Government policy --- Military history, Modern --- World politics --- Afghan War, 2001 --- -Iraq War, 2003-2011 --- Operation Enduring Freedom, 2001 --- -National security --- Economic policy --- International relations --- Military policy --- Burglary protection --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Afghan War, 2001-2021 --- Iraq War, 2003-2011 --- -Technology.
Choose an application
Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether --or how much--they should concern security planners.
Civil defense -- United States. --- National security -- United States -- Planning. --- Strategic planning -- United States. --- Terrorism -- United States -- Prevention. --- United States -- Defenses -- Planning. --- National security --- Terrorism --- Strategic planning --- Civil defense --- Armies --- Military & Naval Science --- Law, Politics & Government --- Planning --- Prevention --- Planning. --- Prevention. --- United States --- Defenses --- National security policy --- NSP (National security policy) --- Security policy, National --- Government policy --- U.S.A. --- Jungtinės Amerikos valstybės --- Soedinennye Shtaty Si︠e︡vernoĭ Ameriki --- Soedinennye Shtaty Severnoĭ Ameriki --- Si︠e︡vero-Amerikanskīe Soedinennye Shtaty --- Severo-Amerikanskie Soedinennye Shtaty --- Zlucheni Derz︠h︡avy --- USA --- US --- Arhab --- Ar. ha-B. --- Artsot ha-Berit --- ولايات المتحدة الامريكية --- Wilāyāt al-Muttaḥidah al-Amirīkīyah --- ABSh --- Amerika Birlăshmish Shtatlary --- ABŞ --- Amerika Birlăşmi Ştatları --- Forente stater --- Spojené staty americké --- Severo-Amerikanskie Shtaty --- Sjedinjene Američke Države --- Zʹi︠e︡dnani Derz︠h︡avy Ameryky --- Amerikai Egyesült Államok --- Yhdysvallat --- Verenigde Staten --- Egyesült Államok --- Hiwsisayin Amerikayi Miatsʻeal Tērutʻiwnkʻ --- Estados Unidos de América --- United States of America --- Fareyniḳṭe Shṭaṭn --- Artzois Ha'bris --- Estados Unidos da América do Norte --- SShA --- Soedinennye Shtaty Ameriki --- VSA --- États-Unis d'Amérique --- Vereinigte Staaten von Amerika --- Stati Uniti d'America --- Estados Unidos --- EE.UU. --- Stany Zjednoczone --- ĒPA --- Amerika Qūrama Shtattary --- Amerika Qŭshma Shtatlari --- SAD --- Saharat ʻAmērikā --- Hēnomenai Politeiai Amerikēs --- ZSA --- Mei-kuo --- Meiguo --- Mei guo --- ZDA --- Združene države Amerike --- U.S. --- America (Republic) --- Amirika Carékat --- Verenigde State van Amerika --- VS --- ولايات المتحدة --- Wilāyāt al-Muttaḥidah --- ولايات المتّحدة الأمريكيّة --- Wilāyāt al-Muttaḥidah al-Amrīkīyah --- Estatos Unitos --- Estatos Unitos d'America --- Ètats-Unis d'Amèrica --- Estaos Xuníos d'América --- Estaos Xuníos --- Tetã peteĩ reko Amérikagua --- Istadus Unidus --- Amerika Birlăşmiş Ştatları --- Amerika ka Kelenyalen Jamanaw --- Bí-kok --- Amerika Qushma Shtattary --- AQSh --- Злучаныя Штаты Амерыкі --- Zluchanyi︠a︡ Shtaty Ameryki --- Yunaeted Stet blong Amerika --- Yunaeted Stet --- Vaeinigte Staatn --- Vaeinigte Staatn vo Amerika --- Stadoù-Unanet Amerika --- Sŭedineni amerikanski shtati --- САЩ --- SASht --- Съединените щати --- Sŭedinenite shtati --- Америка (Republic) --- Amerika (Republic) --- Estats Units d'Amèrica --- Америкӑри Пӗрлешӳллӗ Штатсем --- Amerikări Pĕrleshu̇llĕ Shtatsem --- Stati Uniti --- SUA (Stati Uniti d'America) --- Unol Daleithiau America --- Unol Daleithiau --- Amerikas Forenede Stater --- Vereinigte Staaten --- Wááshindoon Bikéyah Ałhidadiidzooígíí --- Zjadnośone staty Ameriki --- Ameerika Ühendriigid --- Ηνωμένες Πολιτείες της Αμερικής --- Hēnōmenes Politeies tēs Amerikēs --- Η.Π.Α. --- Ē.P.A. --- Usono --- Unuiĝintaj Ŝtatoj de Ameriko --- Американь Вейтьсэндявкс Штаттнэ --- Amerikanʹ Veĭtʹsėndi︠a︡vks Shtattnė --- Ameriketako Estatu Batuak --- Feriene Steaten --- Feriene Steaten fan Amearika --- FS --- Stâts Unîts di Americhe --- Stâts Unîts --- Stáit Aontaithe Mheiriceá --- Steatyn Unnaneysit America --- Steatyn Unnaneysit --- S.U.A. --- Na Stàitean Aonaichte --- NSA --- Mî-koet --- 미국 --- Miguk --- Amerikayi Miatsʻyal Nahangner --- Miatsʻyal Nahangner --- Economic policy --- International relations --- Military policy --- Американь Вейтьсэндявкс Штаттнэ --- Spojené obce severoamerické --- États-Unis --- É.-U. --- ÉU --- Homeland defense --- Homeland security
Choose an application
Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners, and a decision must be made about whether they merit changes in current defenses or the development of new defensive approaches. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups or other asymmetric actors to attack homeland targets. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine the threat of UAVs and cruise missiles, RAND utilized a "red analysis of alternatives" approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary.
Air defenses -- United States. --- Cruise missiles. --- Drone aircraft. --- Terrorism -- Prevention. --- Drone aircraft --- Cruise missiles --- Air defenses --- Terrorism --- Air Forces --- Military & Naval Science --- Law, Politics & Government --- Prevention --- Prevention. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Missiles, Cruise --- Drones (Aircraft) --- Pilotless aircraft --- Remotely piloted aircraft --- UAVs (Unmanned aerial vehicles) --- Unmanned aerial vehicles --- United States -- Military policy. --- Guided missiles --- Flying-machines --- Vehicles, Remotely piloted --- Airplanes --- Radio control --- Nuclear warfare. --- National security --- Strategic forces. --- Security, International. --- Deterrence (Strategy) --- United States --- Military policy. --- Military policy --- Psychology, Military --- Strategy --- First strike (Nuclear strategy) --- Nuclear crisis stability --- Collective security --- International security --- International relations --- Disarmament --- International organization --- Peace --- Armed Forces --- Homeland defense --- Homeland security --- Atomic warfare --- CBR warfare --- Nuclear strategy --- Nuclear war --- Thermonuclear warfare --- War --- Nuclear crisis control --- Nuclear weapons
Choose an application
Choose an application
Whether U.S. terrorism-prevention efforts match the threat continues to be central in policy debate. Part of this debate is whether the United States needs a dedicated domestic counterterrorism intelligence agency. This book examines such an agency's possible capability, comparing its potential effectiveness with that of current efforts, and its acceptability to the public, as well as various balances and trade-offs involved.
Listing 1 - 10 of 60 | << page >> |
Sort by
|