Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack

Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack PDF Author:
Publisher: DIANE Publishing
ISBN: 1428980245
Category :
Languages : en
Pages : 58

Get Book

Book Description
The DSB addressed this threat in previous studies conducted in 1997 (also chaired by Richard Wagner) and 1999/2000 (chaired by Roger Hagengruber). Much has changed since then. The 11 Sept. 2001 attacks demonstrated the intent of terrorists to inflict massive damage. Nuclear proliferation has proceeded apace, with North Korea and Iran achieving nuclear weapon capability or coming closer to it, and it could spread further. The United States is engaged in a war against terrorism, and DoD is beginning to devote significant effort to combating WMD. The Department of Homeland Security (DHS) has been established. Thinking about the threat of clandestine nuclear attack has changed, and some efforts to explore defenses have begun. However, one thing has not changed: little has actually been done against the threat of clandestine nuclear attack. The DSB Summer Study on Transnational Threats (1997) first developed the ambitious idea of a very large, multi-element, global, layered civil/military system of systems of scope sufficient to have some prospect of effectively thwarting this threat. There was little resonance with this vision (outside of the Task Forces in 1997 and 2000), but since then, and especially since the attacks of 11 Sept. 2001, it has begun to be discussed more widely. This report will revisit such a national/global system, largely as context for the main focus of the Task Force: DoD's roles and capabilities. Following briefings from many government agencies and subject matter experts, the Task Force arrived at its basic findings and recommendations in early 2003. Since then, those results have been discussed in over 40 meetings within DoD and elsewhere, leading to certain refinements. This report reflects the outcomes of that process and weaves together viewgraphs used in the discussions with elaborating text.

Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack

Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack PDF Author:
Publisher: DIANE Publishing
ISBN: 1428980245
Category :
Languages : en
Pages : 58

Get Book

Book Description
The DSB addressed this threat in previous studies conducted in 1997 (also chaired by Richard Wagner) and 1999/2000 (chaired by Roger Hagengruber). Much has changed since then. The 11 Sept. 2001 attacks demonstrated the intent of terrorists to inflict massive damage. Nuclear proliferation has proceeded apace, with North Korea and Iran achieving nuclear weapon capability or coming closer to it, and it could spread further. The United States is engaged in a war against terrorism, and DoD is beginning to devote significant effort to combating WMD. The Department of Homeland Security (DHS) has been established. Thinking about the threat of clandestine nuclear attack has changed, and some efforts to explore defenses have begun. However, one thing has not changed: little has actually been done against the threat of clandestine nuclear attack. The DSB Summer Study on Transnational Threats (1997) first developed the ambitious idea of a very large, multi-element, global, layered civil/military system of systems of scope sufficient to have some prospect of effectively thwarting this threat. There was little resonance with this vision (outside of the Task Forces in 1997 and 2000), but since then, and especially since the attacks of 11 Sept. 2001, it has begun to be discussed more widely. This report will revisit such a national/global system, largely as context for the main focus of the Task Force: DoD's roles and capabilities. Following briefings from many government agencies and subject matter experts, the Task Force arrived at its basic findings and recommendations in early 2003. Since then, those results have been discussed in over 40 meetings within DoD and elsewhere, leading to certain refinements. This report reflects the outcomes of that process and weaves together viewgraphs used in the discussions with elaborating text.

Preventing and Defending Against Clandestine Nuclear Attack

Preventing and Defending Against Clandestine Nuclear Attack PDF Author: William Schneider, Jr.
Publisher:
ISBN: 9780756748173
Category :
Languages : en
Pages : 50

Get Book

Book Description
Report of the Defense Science Board Task Force, which was established in March 2002 as part of the ongoing examination of DoD capabilities to deal with strategic terrorism, WMD proliferation, & asymmetric threats. Addresses the threat of nuclear or radiological attack, by anyone for any purpose in any scenario, against the U.S. or U.S. military operations, delivered by any means other than missiles or aircraft. In effect, this means hidden/smuggled nuclear weapons, devices, or materials. This threat is serious enough, & that there are sufficient indications that effective means of preventing successful attack might be developed over the long term, to warrant starting a DoD effort to develop comprehensive capabilities. Illustrations.

U.S. Defense Plan Against Clandestine Nuclear Attacks

U.S. Defense Plan Against Clandestine Nuclear Attacks PDF Author: Department of Defense
Publisher: Cosimo, Inc.
ISBN: 1596051914
Category : Political Science
Languages : en
Pages : 85

Get Book

Book Description
Today, it would be easy for adversaries to introduce and detonate a nuclear explosive clandestinely in the United States. In or near a city, such an explosion would kill a great many people. Any nuclear explosion by an adversary against the United States would have repercussions that could profoundly impact the nation politically, economically, and even culturally in a variety of ways. Events would be set in motion that could affect world history, perhaps in catastrophic ways.It is a central thesis of this report that a clandestine nuclear attack and the defense against it should be treated as an emerging aspect of strategic warfare. U.S. DEFENSE PLAN AGAINST NUCLEAR ATTACKS provides information relating to: .DoD's main operational roles and missions: Discussion and recommendations.Clandestine attack scenarios vs. protection architectures.Imperfect defenses and improvements to intelligence capabilities .Operational changes and increased radiation detection performance.Plans for achieving the needed capabilities and effective implementationIncludes a handbook intended to supply information for use in making a preliminary assessment of a situation in which possible chemical, biological or radiological materials is suspected along with a comprehensive glossary of terms and list of additional reference materials.THE DEFENSE SCIENCE BOARD TASK FORCE was established in March 2002 as part of the ongoing Defense Science Board's examination the Department of Defense's capabilities to deal with the issues of strategic terrorism and WMD proliferation. The Chemical/Biological/Radiological Incident Handbook was produced by the Chemical, Biological and Radiological (CBRN) Subcommittee of the Interagency Intelligence Committee on Terrorism (IICT).

Report of the Defense Science Board Task Force on Information Warfare - Defense (Iw - D)

Report of the Defense Science Board Task Force on Information Warfare - Defense (Iw - D) PDF Author: Department of Defense
Publisher: CreateSpace
ISBN: 9781480186439
Category : History
Languages : en
Pages : 216

Get Book

Book Description
The Defense Science Board Task Force on Information Warfare (Defense) was established at the direction of the Under Secretary of Defense for Acquisition and Technology. The Task Force was directed to "focus on protection of information interests of national importance through the establishment and maintenance of a credible information warfare defensive capability in several areas, including deterrence." Specifically, the Task Force was asked to: Identify the information users of national interest who can be attacked through the shared elements of the national information infrastructure; Determine the scope of national information interests to be defended by information warfare defense and deterrence capabilities; Characterize the procedures, processes, and mechanisms required to defend against various classes of threats to the national information infrastructure and the information users of national interest; Identify the indications and warning, tactical warning, and attack assessment procedures, processes, and mechanisms needed to anticipate, detect, and characterize attacks on the national information infrastructure and/or attacks on the information users of national interest; Identify the reasonable roles of government and the private sector, alone and in concert, in creating, managing, and operating a national information warfare-defense capability; Provide specific guidelines for implementation of the Task Force's recommendations. Information infrastructures are vulnerable to attack. While this in itself poses a national security threat, the linkage between information systems and traditional critical infrastructures has increased the scope and potential of the information warfare threat. For economic reasons, increasing deregulation and competition create an increased reliance on information systems to operate, maintain, and monitor critical infrastructures. This in turn creates a tunnel of vulnerability previously unrealized in the history of conflict. Information warfare offers a veil of anonymity to potential attackers. Attackers can hide in the mesh of inter-netted systems and often use previously conquered systems to launch their attacks. Information warfare is also relatively cheap to wage, offering a high return on investment for resource-poor adversaries. The technology required to mount attacks is relatively simple and ubiquitous. During information warfare, demand for information will dramatically increase while the capacity of the information infrastructure will most certainly decrease. The law, particularly international law, is currently ambiguous regarding criminality in and acts of war on information infrastructures. This ambiguity, coupled with a lack of clearly designated responsibilities for electronic defense hinders the development of remedies and limits response options. The current Administration's national security strategy for the United States suggests that the nation's "economic and security interests are increasingly inseparable" and that "we simply cannot be successful in advancing our interests-political, military and economic-without active engagement in world affairs." In the broad sense, then, the scope of national information interests to be defended by information warfare defense and deterrence capabilities are those political, military, and economic interests. These include the continuity of a democratic form of government and a free market economy, the ability to conduct effective diplomacy, a favorable balance of trade, and a military force that is ready to fight and that can be deployed where needed. Some of these activities are critical to the nation's political, military, and economic interests. These critical functional activities, in turn, depend on information technology and critical infrastructures such as banking and finance, electric power, telecommunications, and transportation.

Responding to War, Terrorism, and WMD Proliferation

Responding to War, Terrorism, and WMD Proliferation PDF Author: Bianka Janssen Adams
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 164

Get Book

Book Description


Global Nuclear Detection Architecture

Global Nuclear Detection Architecture PDF Author: Dana A. Shea
Publisher: DIANE Publishing
ISBN: 143792042X
Category : Technology & Engineering
Languages : en
Pages : 22

Get Book

Book Description
The Global Nuclear Detection Architecture (GNDA) is a multi-layered system of detection technol., programs, and guidelines designed to enhance the nation¿s ability to detect and prevent a radiological or nuclear attack. Among its components are existing programs in nuclear detection operated by other fed. agencies and new programs put into place by the Domestic Nuclear Detection Office (DNDO). Contents of this report: (1) Intro.: Fed. Efforts; DNDO; (2) What is the GNDA?: Layered Defense; Methodology and Metrics for Eval¿n.; Priority Setting; Interagency Coord¿n.; (3) Priorities and Funding Levels Within the GNDA; Balance Between Incremental and Transformational Changes to the GNDA; Long-Term Maint. of the GNDA; R&D Coord. Tables.

Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set

Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set PDF Author: John G. Voeller
Publisher: John Wiley & Sons
ISBN: 0471761303
Category : Science
Languages : en
Pages : 2950

Get Book

Book Description
The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection of resources designed to support the effective communication of homeland security research across all disciplines and institutional boundaries. Truly a unique work this 4 volume set focuses on the science behind safety, security, and recovery from both man-made and natural disasters has a broad scope and international focus. The Handbook: Educates researchers in the critical needs of the homeland security and intelligence communities and the potential contributions of their own disciplines Emphasizes the role of fundamental science in creating novel technological solutions Details the international dimensions of homeland security and counterterrorism research Provides guidance on technology diffusion from the laboratory to the field Supports cross-disciplinary dialogue in this field between operational, R&D and consumer communities

The Virtual Weapon and International Order

The Virtual Weapon and International Order PDF Author: Lucas Kello
Publisher: Yale University Press
ISBN: 0300226292
Category : Computers
Languages : en
Pages : 333

Get Book

Book Description
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times.

DHS Coordination of Nuclear Detection Efforts

DHS Coordination of Nuclear Detection Efforts PDF Author: United States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack
Publisher:
ISBN:
Category : History
Languages : en
Pages : 80

Get Book

Book Description


Freedom and Information

Freedom and Information PDF Author: Eric Landree
Publisher: Rand Corporation
ISBN: 0833042858
Category : Technology & Engineering
Languages : en
Pages : 111

Get Book

Book Description
Describes a framework to guide assessments of the availability of data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses for planning attacks on the U.S. air, rail, and sea transportation infrastructure. Overall, the framework is useful for assessing what kind of information would be easy or hard for potential attackers to find.