WorldCat Identities

Rand Homeland Security (Program)

Works: 25 works in 40 publications in 1 language and 2,509 library holdings
Publication Timeline
Most widely held works about Rand Homeland Security (Program)
Most widely held works by Rand Homeland Security (Program)
Reorganizing U.S. domestic intelligence : assessing the options by Gregory F Treverton( )

7 editions published in 2008 in English and held by 1,665 WorldCat member libraries worldwide

One of the questions in the fight against terrorism is whether the United States needs a dedicated domestic intelligence agency separate from law enforcement, on the model of many comparable democracies. To examine this issue, Congress directed that the Department of Homeland Security perform an independent study on the feasibility of creating a counterterrorism intelligence agency and the department turned to the RAND Corporation for this analysis but asked it specifically not to make a recommendation. This volume lays out the relevant considerations for creating such an agency. It draws on a variety of research methods, including historical and legal analysis; a review of organizational theory; examination of current domestic intelligence efforts, their history, and the public's view of them; examination of the domestic intelligence agencies in six other democracies; and interviews with an expert panel made up of current and former intelligence and law enforcement professionals. The monograph highlights five principal problems that might be seen to afflict current domestic intelligence enterprise; for each, there are several possible solutions, and the creation of a new agency addresses only some of the five problems. The volume discusses how a technique called break-even analysis can be used to evaluate proposals for a new agency in the context of the perceived magnitude of the terrorism threat. It concludes with a discussion of how to address the unanswered questions and lack of information that currently cloud the debate over whether to create a dedicated domestic intelligence agency
Sharing the dragon's teeth : terrorist groups and the exchange of new technologies by R. Kim Cragin( )

2 editions published in 2007 in English and held by 530 WorldCat member libraries worldwide

Organizational theory and terrorism -- Mindanao : a Mecca for transnational terrorism in Southeast Asia -- West Bank and Gaza : Israel as the common enemy -- Southwest Colombia : a safe haven for mutually beneficial exchanges -- Policy implications
Marrying prevention and resiliency : balancing approaches to an uncertain terrorist threat by Brian A Jackson( Book )

4 editions published in 2008 in English and held by 127 WorldCat member libraries worldwide

The uncertain nature of the terrorist threat is a fundamental challenge in the design of counterterrorism policy. To deal with this uncertainty, the author recommends a capabilities-based, portfolio approach to terrorism prevention planning, drawing examples from aviation security policy. While traditional terrorism-prevention measures seek to prevent all damage by stopping them completely, mitigation and resiliency measures buy a lower, but more certain, payoff: preventing only some of the damage from attacks, but doing so predictably across the many different ways in which threats might become manifest. In a prevention and mitigation portfolio, some measures would reach for the highest payoff of completely preventing attacks, while others would provide a more-stable protective return by limiting the damages any terrorist operation or other incident. Protective portfolios should be assessed to determine which will perform well across a range of possible futures and be judged less sensitive to threat uncertainty -- and therefore more attractive given an uncertain future
Understanding the role of deterrence in counterterrorism security by Andrew R Morral( Book )

3 editions published in 2009 in English and held by 107 WorldCat member libraries worldwide

Deterrence, a central feature of counterterrorism security systems and a major factor in the cost-effectiveness of many security programs, is not well understood or measured. This paper builds on a growing literature examining terrorist decisionmaking to examine the role of deterrence in counterterrorism strategy for homeland security. It discusses deterrence at the strategic, operational, and tactical levels and considers adaptations that would-be attackers are likely to make in response to security efforts. It also explores the connection between deterrence and risk transfer, which is the possibility that successful deterrence may result in increased danger to other targets, including those of higher value to the defender. This paper offers a conceptual model for understanding how security systems may deter (or merely displace) attacks and a measurement framework for establishing the relative deterrent value of alternative security systems. Because deterrence may be the most important effect of some counterterrorism security programs, this framework may be useful to security policymakers who are trying to increase the security benefits they can achieve with limited resources
Securing America's passenger-rail systems by Jeremy M Wilson( Book )

3 editions published between 2007 and 2008 in English and held by 21 WorldCat member libraries worldwide

"This book explains a framework for security planners and policymakers to use to guide cost-effective rail-security planning, specifically for the risk of terrorism. Risk is a function of threat (presence of terrorists with intent, weapons, and capability to attack), vulnerability (likelihood of damage at a target, given an attack), and consequences (nature and scale of damages if an attack succeeds). While effective security solutions may address all three components of risk, this book focuses on addressing vulnerabilities and limiting consequences, since these are the two components of risk most within the realm of rail-security personnel. The analysis is based on a notional rail system that characterizes rail systems typically found in the United States. The methodology presented is useful for planning rail-security options."--BOOK JACKET
Reducing terrorism risk at shopping centers : an analysis of potential security options( )

1 edition published in 2006 in English and held by 20 WorldCat member libraries worldwide

Terrorist threat at shopping centers is a prominent concern, with over 60 terrorist attacks against shopping centers in 21 countries since 1998. Shopping center operators are beginning to explore and implement increased security efforts specifically designed to combat terrorism. This report offers qualitative and quantitative modeling approaches to help shopping center operators evaluate candidate security options in terms of their effectiveness at reducing terrorism risk, reaching the following the conclusions. First, a strategy to reduce terrorism risk will be similar for most shopping centers. Second, because terrorism security at shopping centers is based primarily on deterrence, disaster preparedness plans and exercises do little to reduce terrorism risk. Third, centers that implement terrorism security options early may experience both challenges (shoppers may be annoyed enough to go elsewhere) and advantages (shoppers may prefer shopping in centers they feel safer. Fourth, a tiered implementation may be the best strategy -- implementing security options most appropriate for now and developing plans for the future. Finally, this analysis provides useful guidance about prioritizing security options to reduce terrorism risk, but it does not address the risk of terrorism overall or when to begin implementing terrorism security options
An assessment of the Joint Requirements Council's (JRC) organization and staffing by Michael Vasseur( Book )

1 edition published in 2018 in English and held by 14 WorldCat member libraries worldwide

"The Joint Requirements Council (JRC) is an executive-level body in the Department of Homeland Security (DHS) charged with building a unified, effective, and efficient operational requirements process for DHS. This report offers actions to improve the JRC's efficacy, effectiveness, and ability to plan for the future. In conducting this assessment, we undertook a multimethod approach based on the Doctrine, Organization, Training, Material, Leadership, Personnel, Facilities framework to examine four mission areas of the JRC: implementation and execution of the Joint Requirements Integration and Management System, provision of training to DHS staff on the requirements process, analysis of joint capabilities and requirements, and requirements outreach. To assess these areas, we reviewed literature on common problems facing complex organizations, examined literature on best practices from other joint requirements councils, and interviewed program staff. We find that the present organizational and personnel systems in place for the JRC should be expanded to more fully address the mission of the JRC and that the JRC staff authorizations are insufficient to accomplish all tasks across its mission areas. Additionally, JRC staff members face a high degree of uncertainty in their work given the decentralized nature of decisionmaking in the DHS requirements process. We offer two preliminary recommendations to DHS leadership. First, the JRC staffing level should be increased to accommodate workload across mission areas. Second, DHS leadership should vest more authority over DHS requirements to the JRC to facilitate the implementation of an enterprise-wide joint requirements process."--Provided by publisher
Freedom and information : assessing publicly available data regarding U.S. transportation infrastructure security by Eric Landree( Book )

1 edition published in 2007 in English and held by 8 WorldCat member libraries worldwide

Describes a framework to guide assessments of the availability of data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses for planning attacks on the U.S. air, rail, and sea transportation infrastructure. Overall, the framework is useful for assessing what kind of information would be easy or hard for potential attackers to find
Network technologies for networked terrorists : assessing the value of information and communication technologies to modern terrorist organizations( )

1 edition published in 2007 in English and held by 4 WorldCat member libraries worldwide

Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and security forces' possible responses. The authors conclude that, instead of developing direct counters to these technologies, exploiting their use and the information they manage to enable more direct security force operations is a more promising option
Stealing the sword : limiting terrorist use of advanced conventional weapons by James Bonomo( Book )

1 edition published in 2007 in English and held by 3 WorldCat member libraries worldwide

"Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems in the hands of terrorists are explored: raising awareness of the threat, and reducing the threat through procedural and technical use controls. Technical use controls offer the surest limitations on terrorist use, but are by far most practical to incorporate when the system is in its design phase. GPS-guided mortars are the most worrisome of the advanced conventional weapons, attractive to terrorists and difficult to mitigate with only awareness and procedural controls. Fortunately, these systems are still in their design phase. For this reason, taking steps now to control GPS-guided mortars is urgent. Two initial steps are needed to begin placing additional procedural and technical use controls on these precise, indirect fire weapons: begin diplomatic discussions with the key producer nations to raise awareness of potential terrorist use of these systems, and commission a detailed technical study of the technical modules and architecture needed to implement proposed technical controls. The U.S. Department of Homeland Security (DHS) can play a key role in both these steps by pushing to begin diplomatic discussions and by conducting a detailed study, perhaps with the National Security Agency, of the technical architecture for use controls. Additionally, DHS should become a permanent member of the interagency panels considering arms exports. The time to begin negotiating and developing meaningful controls on GPS-guided mortars is now, before the opportunity is lost."--Rand web site
Should the United States establish a dedicated domestic intelligence agency for counterterrorism? by Kristin Leuschner( Book )

1 edition published in 2008 in English and held by 3 WorldCat member libraries worldwide

The problem of measuring emergency preparedness : the need for assessing "response reliability" as part of homeland security planning by Brian A Jackson( )

2 editions published in 2008 in English and held by 3 WorldCat member libraries worldwide

Decisionmakers today largely assess emergency preparedness and homeland security "in the rear view mirror," looking at performance in actual events and responding to perceived failures. While learning from real-world experience is important, better ways to assess preparedness prospectively will lead to better choices as to how and where to strengthen it. This paper frames a broad set of questions about how preparedness can be meaningfully measured and lays out some of the ingredients needed to answer them. To simplify the discussion, it focuses on response activities--the near-term actions taken by responder organizations when a disaster or terrorist incident is occurring or in its immediate aftermath that are intended to limit its consequences. It also provides some background on the national preparedness system and on current approaches for assessing emergency preparedness, and it introduces the concept of response reliability, an alternative way of thinking about measuring preparedness that can answer the public's and policy makers' fundamental question: How certain should we as a nation be that the systems we have put in place to respond to damaging events will be able to deliver when called upon?
Consequence prevention : a new model for addressing uncertainty about terrorist threats( Book )

1 edition published in 2008 in English and held by 2 WorldCat member libraries worldwide

A new approach for assessing emergency preparedness( Book )

1 edition published in 2008 in English and held by 2 WorldCat member libraries worldwide

Cybersecurity economic issues : corporate approaches and challenges to decisionmaking( Book )

1 edition published in 2008 in English and held by 2 WorldCat member libraries worldwide

Understanding the public health implications of prisoner reentry in California : phase I report by Lois M Davis( Book )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

The first phase of this study used a variety of approaches to assess the health care needs of California prisoners upon their release, the geographic distribution of state prisoners who return to local communities, and the health care services that are available in these communities to provide policymakers with a picture of communities' capacity to meet the needs of parolees and other underserved populations
Considering the creation of a domestic intelligence agency in the United States : lessons from the experiences of Australia, Canada, France, Germany, and the United Kingdom by Brian A Jackson( Book )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

With terrorism still prominent on the U.S. agenda, whether the country's prevention efforts match the threat the United States faces continues to be central in policy debate. Does the country need a dedicated domestic intelligence agency? Case studies of five other democracies--Australia, Canada, France, Germany, and the UK--provide lessons and common themes that may help policymakers decide
Exploring terrorist targeting preferences by Martin C Libicki( Book )

1 edition published in 2007 in English and held by 1 WorldCat member library worldwide

"Al Qaeda, the jihadist network personified by Osama bin Laden, uses terror to restore a caliphate free of Western influence. Understanding al Qaeda's strategic logic might suggest what U.S. targets it may seek to strike and why. This book posits four hypotheses to link means and ends. The coercion hypothesis suggests that terrorists are interested in causing pain, notably casualties, to frighten the United States into pursuing favorable policies. The damage hypothesis posits that terrorists want to damage the U.S. economy to weaken its ability to intervene in the Islamic world. The rally hypothesis holds that terrorism in the United States would be carried out to attract potential recruits' and supporters' attention. The franchise hypothesis argues that today's jihadists pursue their own, often local, agendas with, at most, support and encouragement from al Qaeda itself. The authors conclude that the coercion and damage hypotheses are most are most consistent with prior attack patterns, expert opinion, and al Qaeda statements. The rally hypothesis appears to have weaker explanatory power. The franchise hypothesis coincides with the majority of post-9/11 attacks, but, unless such franchises are active in the United States, may not indicate what the next attack in the United States might be."--Jacket
RAND : research areas : terrorism and homeland security( )

in English and held by 1 WorldCat member library worldwide

For over 30 years, RAND has been a world leader in terrorism research and analysis. As a public service, RAND disseminates all unclassified research as printed documents or online. Much of this research is managed by the Homeland Security program of RAND Infrastructure, Safety, and Environment
Investor and industry perspectives on investment advisers and broker-dealers by Gregory F Treverton( Book )

1 edition published in 2008 in English and held by 1 WorldCat member library worldwide

In theory, financial professionals are relatively distinct: A broker conducts transactions in securities on behalf of others; a dealer buys and sells securities for his or her own accounts; and an investment adviser provides advice to others regarding securities. Broker-dealers and investment advisers are subject to different regulatory structures. But trends in the financial services market since the early 1990s have blurred the boundaries between them. Regulatory reform requires a clearer understanding of the industry's complexities. The U.S. Securities and Exchange Commission asked RAND to conduct this study to examine the professionals' current business practices and whether investors understand differences between and relationships among them. The report describes a heterogeneous industry, with firms taking many different forms and offering a multitude of services and products and with investors failing to distinguish broker-dealers and investment advisers along regulatory lines. Despite this, investors express high levels of satisfaction with the services they receive from their own financial service providers. This satisfaction was much more frequently reported to arise from the personal attention the investor receives than from the actual financial returns arising from this relationship
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.11 (from 0.04 for Reorganizi ... to 0.73 for Consequenc ...)

Reorganizing U.S. domestic intelligence : assessing the options
Sharing the dragon's teeth : terrorist groups and the exchange of new technologiesUnderstanding the role of deterrence in counterterrorism securitySecuring America's passenger-rail systemsReducing terrorism risk at shopping centers : an analysis of potential security optionsFreedom and information : assessing publicly available data regarding U.S. transportation infrastructure securityNetwork technologies for networked terrorists : assessing the value of information and communication technologies to modern terrorist organizationsStealing the sword : limiting terrorist use of advanced conventional weaponsUnderstanding the public health implications of prisoner reentry in California : phase I reportExploring terrorist targeting preferences
Alternative Names
Homeland Security Program (Rand Infrastructure, Safety, and Environment (Organization))

Rand Infrastructure, Safety, and Environment (Organization). Homeland Security Program

Rand Infrastructure, Safety, and Environment (Organization). Rand Homeland Security

English (36)