How Can Policy Research Help the Department of Homeland Security? Jack Riley November 18, 2004.

Slides:



Advertisements
Similar presentations
Department of Homeland Security Site Assistance Visit (SAV)
Advertisements

Program partners engage in a broad range of security cooperation activities to include homeland defense/security, disaster response/mitigation, consequence/crisis.
Lecture 6: Terrorism and Asymmetric Warfare  Rupal Mehta POL 12.
April 6, NPR in Context Third comprehensive review of U.S. nuclear policies and posture –Previous reviews in 1994 and 2001 Conducted by DoD.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Exploring American History Unit X – Modern America Chapter 31– America Looks to the Future Section 2 – George W. Bush in Office.
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
DHS, National Cyber Security Division Overview
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
The Role of System Sciences Research at U-Albany in Countering Terrorism David F. Andersen University at Albany September 11, 2002.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
Risk and Economic Analysis of Terrorism Events Detlof von Winterfeldt Professor of Public Policy and Management Director, Center for Risk and Economic.
Managerial Flexibility in the Department of Homeland Security R. Steven Daniels, CSUB & Carolyn L. Clark-Daniels, Bakersfield, CA.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
Risk Management Strategies in an Uncertain World April 12-13, 2002 Objectives of Roundtable Agenda for Roundtable.
Information on Agro/Bio terrorism Potential Occurrences and Emergency Management of Animal Diseases.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Maritime Security Risk Analysis Model
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
2. Intelligence Defining the Problem – Who are the threats? Sharing Information.
Advanced Systems and Concepts Office 20-Sep-15 What are National Security Threats? 2 nd Annual JTAC Workshop 4 April 2006 ASCO and DTRA Update and Welcome.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
Managing Risks, Countering Threats: Protecting Critical National Infrastructure Against Terrorism Martin Rudner Canadian Centre of Intelligence and Security.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Disaster Evacuation – Emergency Response I. Introduction The objective of this network is to ensure that operational transportation policies, protocols,
Old and New Terrorism- patterns of terrorist activity Definition: "the calculated use of unlawful violence or threat of unlawful violence to inculcate.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Week 4. Tonight’s seminar National Security Strategy National Security Strategy Local Response Local Response United Kingdom’s plan United Kingdom’s plan.
Created by: Ashley Spivey For Department of Homeland Security All information from:
THE TERRORIST CHALLENGE September 11. The terrible events of September 11, 2001, “changed everything.”
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
THE SECURITY SECTOR REVIEW PROCESS. ISSUES Understanding: -Scope: What are the elements of a SS Review? -Need: Why review the Security Sector? -Process:
Defense Policy Making You may not be interested in war, but war is interested in you.
Homeland Security and Emergency Management Discussion U.S. Department of Homeland Security  National Preparedness Directorate, FEMA Higher Education Conference.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Tuesday, November 17, 2015 Objective: Students will be able to analyze and evaluate national security policies of the United States. Short video over.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
9-11 Commission Report: Implications for Transportation Security in the NY/NJ Region Eva Lerner-Lam and David Gaier Transportation Security Committee Transportation.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Chapter 17: Foreign Policy and National Defense Section 2.
David Steingraber, Executive Director Wisconsin Office of Justice Assistance Homeland Security and Justice Information Sharing Where the Rubber Meets the.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Chapter 13: Police Strategies and Tactics Seminar 8.
Integrative Center for Homeland Security Texas A&M University Laura Spencer Information Management for Homeland.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
Securing the Fresh Produce Supply Chain. Introduction The Fresh Produce Association of the Americas was founded in 1944 FPAA works to ensure market access.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
Week 4 Tina Mainwaring. VERY IMPORTANT!!! NO SEMINAR NEXT WEEK!!! NO SEMINAR NEXT WEEK!!! NO DISCUSSION BOARDS NEXT WEEK!! NO DISCUSSION BOARDS NEXT WEEK!!
GOVT Module 16 Defense Policy.
Disaster and Emergency Management
International Security and Peace
[ 6.6 ] National Security.
COUNTERING VIOLENT EXTREMISM: IMPACT ON GLOBAL GOVERNANCE
Department of State Represents America in working with foreign governments and advises on foreign affairs. [This is for someone who makes friends.
The U.S. Department of Homeland Security
Prevention, Intelligence
Homeland Security Program School of Health, Science & Criminal Justice Fall 2015 Assessment Report
Presentation transcript:

How Can Policy Research Help the Department of Homeland Security? Jack Riley November 18, 2004

USC CREATE Meeting, Nov ember Homeland Security and Countering Terrorism Are Key Topics for RAND Research Hitting America’s Soft Underbelly The Potential Threat of Deliberate Biological Attacks Against the U.S. Agricultural and Food Industry PETER CHALK RAND Public Safety and Justice A Quick Guide Lynn E. Davis, Tom LaTourrette, David E. Mosher, Lois M. Davis, David R. Howell Chemical, Radiological, Nuclear, and Biological Terrorist Attacks RAND National Defense Research Institute A Component in the War on al Qaeda Paul K. Davis Brian Michael Jenkins RAND Project AIR FORCE Kim Cragin Sara A. Daly An Assessment of Group Motivations and Capabilities in a Changing World The Dynamic Terrorist Threat

USC CREATE Meeting, Nov ember Confronting Terrorism Requires a Role for Strategic Policy Planning Good analogy is the Cold War, where multiple different strategies (MAD, containment, etc) were tried Governments are generally bad at such planning –Even the creation of DHS does not fully concentrate responsibility Universities, think tanks and private sector were important to developing the Cold War strategy

USC CREATE Meeting, Nov ember Developing a Strategy Requires a Roadmap Political, Economic, Cultural Sources Strategy, Tactics, Capabilities Offensive/Foreign Military Strategy and Programs Intelligence Strategy and Programs Police and Justice International Development Political Actions Counter- and Non-Proliferation Defensive/Domestic Preventive Measures Response Measures Threat and Risk Analysis Threat Analysis Direct Action Support Denial Homeland Security

USC CREATE Meeting, Nov ember Homeland Security Each Component of the Roadmap Requires Research Political, Economic, Cultural Sources Strategy, Tactics, Capabilities Offensive/Foreign Military Strategy and Programs Intelligence Strategy and Programs Police and Justice International Development Political Actions Counter- and Non-Proliferation Defensive/Domestic Preventive Measures Response Measures Threat and Risk Analysis Threat Analysis Direct Action Support Denial

USC CREATE Meeting, Nov ember Homeland Security Each Component of the Roadmap Requires Research Political, Economic, Cultural Sources Strategy, Tactics, Capabilities Offensive/Foreign Military Strategy and Programs Intelligence Strategy and Programs Police and Justice International Development Political Actions Counter- and Non-Proliferation Defensive/Domestic Preventive Measures Response Measures Threat and Risk Analysis Why do they hate us? What makes them hate us more? Direct Action Support Denial

USC CREATE Meeting, Nov ember Each Component of the Roadmap Requires Research Political, Economic, Cultural Sources Strategy, Tactics, Capabilities Offensive/Foreign Military Strategy and Programs Intelligence Strategy and Programs Police and Justice International Development Political Actions Counter- and Non-Proliferation Defensive/Domestic Preventive Measures Response Measures Threat and Risk Analysis Why do they hate us? What makes them hate us more? Direct Action Support Denial How can we best allocate scare HS dollars? Does security deter?

USC CREATE Meeting, Nov ember Each Component of the Roadmap Requires Research Political, Economic, Cultural Sources Strategy, Tactics, Capabilities Offensive/Foreign Military Strategy and Programs Intelligence Strategy and Programs Police and Justice International Development Political Actions Counter- and Non-Proliferation Defensive/Domestic Preventive Measures Response Measures Threat and Risk Analysis Why do they hate us? What makes them hate us more? Direct Action Support Denial How can we best allocate scare HS dollars? Does security deter? How can we best reduce the supply of terrorists?

USC CREATE Meeting, Nov ember Is This Kind of Strategic Planning Occurring? The initial focus was on plugging the security gaps –Appears to be increasing focus on strategic planning issues The DHS Centers are an excellent start –The Centers do not completely address the issue of “high level policy architecture” –DHS and others should seek long-term, strategic partnerships with multiple organizations