The Strategic Importance, Causes and Consequences of Terrorism



Similar documents
Ohio Homeland Security Strategic Plan

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

Flooding Emergency Response Exercise

Teaching an Overview of Homeland Security

State of Ohio Homeland Security STRATEGIC PLAN

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

How To Write A Book On Risk Management

Subject: Critical Infrastructure Identification, Prioritization, and Protection

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Purpose of the Governor s strategy. Guiding Principles

National Domestic Preparedness Consortium. Preparing the Nation through Training

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

Project Management Plan

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO Course Syllabus

Qualifications FISK CONSULTANTS

On the European experience in critical infrastructure protection

STATE HOMELAND SECURITY GRANT PROGRAM

v. 03/03/2015 Page ii

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

Assessment Profile: Establishing Curricular Categories for Homeland Security Education

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

STATE OF MARYLAND Strategy for Homeland Security

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

NEBRASKA STATE HOMELAND SECURITY STRATEGY

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE

Seoul Communiqué 2012 Seoul Nuclear Security Summit

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

National and Transnational Security Implications of Big Data in the Life Sciences

U.S. Cyber Security Readiness

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

Terrorism. Facing Fear 6 8. Tough Issues LESSON PLAN 3. Key Terms and Concepts. Purpose. Objectives

Training Courses Catalog 2015

How To Implement International Terrorism Agreements

Homeland Security Presidential Directive/HSPD-5 1

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

working group on foreign policy and grand strategy

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Privacy and Security in Healthcare

Subject: National Preparedness

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

DHS, National Cyber Security Division Overview

University of Maryland University College. American Military University. Henley-Putnam University

For Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan (TEP) July 27, For Official Use Only

Introduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

How To Become A National Security Consultant

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Cyber Security Research and Development: A Homeland Security Perspective

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Risk Assessment and Risk Management: Necessary Tools for Homeland Security

Threat and Hazard Identification and Risk Assessment

Common Threats and Vulnerabilities of Critical Infrastructures

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

CYBER SECURITY GUIDANCE

National Cybersecurity & Communications Integration Center (NCCIC)

State of Oklahoma Council on Law Enforcement Education and Training

2015 Emergency Management Course Schedule

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

MSE 6201, Homeland Security Course Syllabus. Course Description. Course Textbook. Course Learning Outcomes. Credits.

Threat Intelligence: Friend of the Enterprise

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004

Historical Grant Funding Awarded to U.S. Colleges and Universities

Health Security Intelligence Enterprise. State and Local Initiatives Branch Office of Health Affairs Department of Homeland Security

El Camino College Homeland Security Spring 2016 Courses

How To Be A Cabinet Member Of The Interior Department

Homeland Security and Terrorism COURSE SYLLABUS

U.S. Fire Administration. The Critical Infrastructure Protection Process Job Aid

The Physical Protection of Critical Infrastructures and Key Assets

MASTER OF PROFESSIONAL STUDIES

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Transcription:

The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program for International and Homeland Security The Ohio State University

Discussion Points Ohio State University s Program for International and Homeland Security Conceptual Frameworks for Analyzing Terrorism: Its Motivations, Mechanisms and Consequences The National Academic Consortium for Homeland Security (NACHS)

Discussion Points Ohio State University s Program for International and Homeland Security Conceptual Frameworks for Analyzing Terrorism: Its Motivations, Mechanisms and Consequences The National Academic Consortium for Homeland Security (NACHS)

Program Description University-wide program established in April 2002 to support those government agencies and non-government organizations responsible for U.S. international and homeland security, by promoting and supporting related: Academic Research Technology development and transition - commercialization Education Training Outreach and service

Program Objectives Increase our understanding of national security issues, especially the growth of extremism by nation states and transnational groups, the strategic and tactical use of terrorism, and the proliferation of technologies which have the potential for use as weapons of mass destruction; Promote better-informed public policy, strategy, plans and programs, regarding national security issues;

Program Objectives Develop new technologies and transitioning those technologies into effective, practical and affordable solutions to (current and future) international and homeland security problems; and Prepare people to better understand and deal more effectively with the international and homeland challenges we face today and will face in the future.

Strategy Establish the program as a university-wide (multi-functional, multi-disciplinary) program: Do not establish a separate center/institute for homeland security (within a particular college or staff office) -- the university (as a whole) IS the center

Strategy A balanced, integrated, multi-functional program: RESEARCH AND DEVELOPMENT EDUCATION AND TRAINING SERVICE AND OUTREACH

Focus Groups To facilitate interdisciplinary research and study in this area, a number of focus groups have been established. These groups currently include: Agri-terrorism Bio-terrorism/Defense Border Security Business and Economic Issues Critical Infrastructure Protection Cyber-terrorism/Security Domestic Counter-terrorism Education and Training Emergency Preparedness and Response Government & Political Issues Homeland Security General Information Sharing and Systems Intelligence and Warning International Issues Legal Issues Medical Care Delivery Public Health Science and Technology Sensors and Detection Social and Cultural issues Terrorism General Transportation Security Weapons of Mass Destruction

Discussion Points Ohio State University s Program for International and Homeland Security Conceptual Frameworks for Analyzing Terrorism: Its Motivations, Mechanisms and Consequences The National Academic Consortium for Homeland Security (NACHS)

Conceptual Frameworks Taxonomy of Terrorism Strategic Model The Risk of Terrorism: Policy Modeling

Taxonomy of Terrorism What is terrorism? No common definition or consistent usage Terrorism versus (e.g.) unconventional warfare, asymmetric warfare, guerilla warfare, special operations, etc. My working definition: Threats or acts of violence, generally intended to change the attitudes and behaviors of some individual or group, through fear.

Taxonomy of Terrorism Why do individuals or groups employ terrorism as a strategy or tactic to achieve their goals? Often perceived to be the only feasible alternative It s affordable more affordable than other feasible alternatives It works

Taxonomy of Terrorism Many different terrorism scenarios and variables: terrorism and terrorists are not homogeneous they are multi-dimensional A general taxonomy can be helpful in dealing with the inherent complexity and diversity Some key descriptive characteristics: Types of terrorists Motivations for terrorism Targets of terrorism Modes of attack

Taxonomy of Terrorism Types of terrorists (e.g.): Individuals, acting independently Individuals, supported by a group or nation state Non-state groups, acting independently Intra-state groups Trans-state groups Non-state groups, supported by nation states Nation states

Taxonomy of Terrorism Motivations for terrorism (e.g.): Political Religious Ethnic and racial Social and cultural Economic Many others, e.g.,: personal power, revenge, greed, etc.

Taxonomy of Terrorism Targets of terrorism (e.g.): Specific (non-symbolic) people or institutions Symbolic people, institutions, monuments, etc. Concentrations of people Critical infrastructure Agriculture Food Water Public Health Emergency Services Government Defense Industrial Base Information and Telecommunications Energy Transportation Banking and Finance Chemical Industry Postal and Shipping

Taxonomy of Terrorism Modes of attack: Technologies and weapons (e.g.): Conventional weapons Weapons of Mass Destruction or WMD (Chemical, Biological, Radiological, Nuclear and High-yield Explosives CBRNE ) Cyber Methods of employment (e.g.): Suicide attacks Non-suicide attacks

Terrorist Type: Trans-state Groups Other Critical Infrastructure Population concentrations Non-symbolic Symbolic Taxonomy of Terrorism Political Religious Ethnic and racial Social and cultural Economic Greed Revenge Other Suicide Non-suicide

Conceptual Frameworks Taxonomy of Terrorism Strategic Model The Risk of Terrorism: Policy Modeling

Strategic Model Deterrence Response Prediction Attribution Recovery and Reconstitution Terrorist Threats to the United States Prevention Detection Crisis Management Mitigation

Strategic Model Deterrence Response Attribution Recovery and Reconstitution Attack Method: Chemical Biological Radiological Nuclear Explosives Cyber Prediction Prevention Detection Crisis Management Mitigation

Strategic Model Deterrence Response Prediction Attribution Recovery and Reconstitution Target (e.g.): Citizens Infrastructure Economic Sector Symbolic Prevention Detection Crisis Management Mitigation

Strategic Model Deterrence Response Prediction Attribution Recovery and Reconstitution Biological Attack Against the Citizens of Ann Arbor Prevention Detection Crisis Management Mitigation

Strategic Model Deterrence Response Prediction Attribution Recovery and Reconstitution Terrorist Threats to the United States Prevention Detection Crisis Management Mitigation Currently, many more questions than answers: Need for related research and study

Strategic Model For each element of the process Who is responsible? What is the policy and strategy? What capabilities are required to execute the policy and strategy? What capabilities exist today? What initiatives, authorities and resources are required to provide the required capabilities (if they don t currently exist)?

Strategic Model Considering all of the elements in the process and all of the associated capability requirements, and assuming constrained resources, how should we invest our available resources to achieve the greatest overall improvement in our security or reduction in risk? What should be our priorities? Which threats? Which targets and vulnerabilities? Which additional capabilities? Deterrence Intelligence & Warning Prevention Detection Mitigation Crisis Management Recovery & Reconstitution Attribution

Conceptual Frameworks Taxonomy of Terrorism Strategic Model The Risk of Terrorism: Policy Modeling

Risk Modeling: Policy Modeling Dealing with terrorism is fundamentally an issue of risk management Zero risk is generally neither feasible nor affordable Risk Cost

Risk Modeling: Policy Modeling Risk is relative Keeping the risk of terrorism in perspective: 9/11/01: ~ 3,000 fatalities (80 countries) 2001 earthquake fatalities in India: ~ 20,000 Annual U.S. motor vehicle fatalities: ~ 42,000 Annual U.S. homicides: ~ 15,000 Annual U.S. deaths from obesity: ~ 400,000 On the average, beer and Twinkies are a much great risk than terrorists

Risk Modeling: Policy Modeling Great Difficulty Low Probability Nuclear Biological Difficulty Probability Agro-Terrorism Low Difficulty High Probability Individual Suicide Bombing Impact Cyber Expected Impact = Probability x Impact

Risk Modeling: Policy Modeling A few critical (policy) questions: What is the current risk? To what? With what? By whom? How much risk is acceptable? How much risk reduction can we afford? Who pays? What is the most cost-effective strategy to reduce risk to an acceptable level?

Risk Modeling: Policy Modeling A risk-analysis model of a terrorist incident can be useful in helping to: Understand the inherent complexities, dynamics and uncertainties Inform public-policies, strategies, programs, plans, resource-allocation priorities, etc. Direct and focus future research

Risk Modeling: Policy Modeling One useful and familiar general modeling technique is called influence diagramming: Dependent Variable Direct - Inverse Independent Variable A Independent Variable B

Risk Modeling: Policy Modeling Influence diagram describing the relationships: Direct or inverse Correlational or precedential/temporal (causal) Discrete or continuous (linear, non-linear) Domain and range of the relationships Incremental costs

Risk Modeling: Policy Modeling The model assumes: Rational decision making Behavior is a function of the perceived value to the decision maker (individual or group) of the expected outcomes, relative to other alternatives

Risk Modeling: Policy Modeling Risk to Target X Of an attack by Group Y By Attack Mode Z RISK VULNERABILITY THREAT ADVERSE CONSEQUENCES

Risk Modeling: Policy Modeling RISK CAPABILITIES THREAT INTENT TO ATTACK ACCESS TO WEAPONS FUNDING & SUPPORT PEOPLE C3I EFFECTIVENESS Leadership, planning, communication, etc.

Risk Modeling: Policy Modeling CAPABILITIES THREAT INTENT TO ATTACK ACCESS TO WEAPONS FUNDING & SUPPORT PEOPLE C3I EFFECTIVENESS PERCEIVED VALUE OF GROUP MEMBERSHIP TO INDIVIDUALS

Risk Modeling: Policy Modeling CAPABILITIES THREAT INTENT TO ATTACK - GROUP S PERCEIVED VALUE OF A SUCCESSFUL ATTACK, RELATIVE TO ALTERNATIVES GROUP S PERCEIVED PROBABILITY OF A SUCCESSFUL ATTACK GROUP S PERCEIVED ADVERSE CONSEQUENCES TO THE GROUP OF AN ATTACK

Risk Modeling: Policy Modeling VULNERABILITY CAPABILITIES THREAT ADVERSE CONSEQUENCES INTENT TO ATTACK - GROUP S PERCEIVED VALUE OF A SUCCESSFUL ATTACK, RELATIVE TO ALTERNATIVES GROUP S PERCEIVED PROBABILITY OF A SUCCESSFUL ATTACK GROUP S PERCEIVED ADVERSE CONSEQUENCES TO THE GROUP OF AN ATTACK

Risk Modeling: Policy Modeling Risk to Target X Of an attack by Group Y By Attack Mode Z RISK VULNERABILITY - Target Protection Measures THREAT - Capability to Prevent an Attack ADVERSE CONSEQUENCES - Consequence Mitigation Measures

Strategic Model Response Attribution Recovery and Reconstitution Deterrence Risk Reduction Alternatives Prediction: Intelligence & Warning Prevention Detection Crisis Management Mitigation

Risk Modeling: Policy Modeling THREAT - Capability to Prevent an Attack Information Sharing & Fusion Technologies & Authorities Intelligence & Warning Effectiveness Adverse Impacts On Personal Privacy and Civil Liberties

Risk Modeling: Policy Modeling RISK OF ATTACK TOTAL COST Cost of Risk-Reduction - - Risk-Reduction Measures Economic Consequences of an Attack Threat reduction Target vulnerability Consequence mitigation

Risk Modeling: Policy Modeling What should be our national policy? Maximize risk reduction within available resources Meet established risk standards at the lowest cost Bottom Line: How much should we invest in terrorism risk-reduction (and how should we invest), versus investments in other national priorities?

Discussion Points Ohio State University s Program for International and Homeland Security Conceptual Frameworks for Analyzing Terrorism: Its Motivations, Mechanisms and Consequences The National Academic Consortium for Homeland Security (NACHS)

National Academic Consortium - NACHS National association of universities and colleges involved with homeland security (broadly defined) in some fashion Established in March of 2003 Open to all academic institutions (membership is institutional, vice individual) Public and private Universities, colleges, community colleges, specialized institutes

National Academic Consortium - NACHS Objectives: Promote awareness, communication and collaboration among academic institutions Establish and maintain a public, on-line, searchable data base of information describing the member institutions homeland securityrelated programs, activities and resources: http://www.osu.edu/homelandsecurity/nachs

National Academic Consortium - NACHS Objectives (continued): Serve as a sounding board and advisory body, to assist both government agencies and non-government organizations responsible for homeland Security, at home and around the world. The goal is for the NACHS to become the primary academic strategic partner to the Department of Homeland Security and other agencies responsible for national security

National Academic Consortium - NACHS Current NACHS membership includes 121 institutions, representing 39 states and the D.C. No cost to join; only obligations: Identify a point of contact for the institution Enter into the NACHS data base (on the web site) information describing the institution s homeland security-related programs, activities and resources, e.g., centers/institutes, research initiatives, educational programs and courses, outreach/service projects, etc.

National Academic Consortium - NACHS The way ahead: Expand membership to include appropriate academic societies Enhanced newsletter National conference Interest Groups Committee Structure Refereed Journal

Discussion Points - Summary Ohio State University s Program for International and Homeland Security Conceptual Frameworks for Analyzing Terrorism: Its Motivations, Mechanisms and Consequences The National Academic Consortium for Homeland Security (NACHS)

Questions - Discussion