Limit search to available items
Record 5 of 13
Previous Record Next Record
Book Cover
E-book
Author Jackson, Brian A., 1972-

Title Emerging threats and security planning : how should we decide what hypothetical threats to worry about? / Brian A. Jackson, David R. Frelinger
Published Santa Monica, CA : RAND, 2009

Copies

Description 1 online resource (x, 19 pages)
Series RAND Corporation occasional paper series ; OP-256-RC
Occasional paper (Rand Corporation) ; OP-256-RC.
Contents Cover; Preface; Contents; Tables; Summary; Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?; The Variety of Emerging Threats Challenging Security Planning; Framing a Middle-Ground Approach to Addressing Emerging Threats; Identifying Niche Threats; Prioritizing Emerging Threat Scenarios; Conclusions: Security Planning for the Niche and the Novel; References
Summary "Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover
Bibliography Includes bibliographical references (pages 17-19)
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
English
Print version record
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject National security -- United States -- Planning
Terrorism -- United States -- Prevention
Strategic planning -- United States
Civil defense -- United States.
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism.
POLITICAL SCIENCE -- Terrorism.
Civil defense
Military readiness -- Planning
National security -- Planning
Strategic planning
Terrorism -- Prevention
Armies.
Military & Naval Science.
Law, Politics & Government.
SUBJECT United States -- Defenses -- Planning
Subject United States
Form Electronic book
Author Frelinger, Dave.
LC no. 2009018478
ISBN 9780833048646
0833048643
1282451162
9781282451162
9786612451164
6612451165