用于评估美国国内威胁的国土安全模式

VIP文档

ID:53891

大小:0.08 MB

页数:12页

时间:2023-04-08

金币:10

上传者:战必胜
A Homeland Security Model for Assessing US Domestic Threats
Shawn Cupp and Michael G. Spight
Since 9/11, local, state, and federal governments in conjunction with corporate agencies have
conducted a wide variety of risk assessments. These include identifying and assigning the threat
and vulnerability to a number of infrastructures based on potential terrorist attacks. Many of these
assessments are conducted with international or foreign terrorists in mind. Unfortunately, there are
a number of domestic threats that may prove to be just as dangerous. This article proposes a
model to focus attention of viable potential domestic threats. By measuring the intent and
capabilities of domestic threats based on historical evidence of previous incidents, local, state,
federal government, and commercial organizations are able to apply constrained resources to
mitigate the viable potential domestic threats. Metrics are defined and the domestic threat groups
are depicted on a scatter graph. This is the first step in identifying domestic threats in order to
focus critical resources and fiscally constrained assets on mitigating the risk of these threats.
Disclaimer: The views and conclusions expressed in the context of this document are those of the
author developed in the freedom of expression, academic environment of the US Army Command
and General Staff College. They do not reflect the official position of the US Government,
Department of Defense, United States Department of the Army, or the US Army Command and
General Staff College.
Changes in Threat Since 9/11
Currently, many intergovernmental efforts are focused on threats from international terrorist
organizations such as Al Qaeda, Hamas, and Hezbollah. Over the past five years since 9/11, a number of
government institutions and processes changed to meet those threats. Some of the changes included
making the Office of Homeland Security, a cabinet level Department of Homeland Security. Another change
was the issuance of the Homeland Security Presidential Directive – 3 (HSPD-3), which describes the
Homeland Security Advisory system based on threat conditions. This document gave US citizens the now
familiar five threat conditions with corresponding colors. The threat conditions and color constantly change
based on the assessed threat. Originally this system was simple; however, it is not compounded by
assessing various sectors in the US with different levels of threat. For example, currently the US airline
travel is rated Orange for High threat based on the thwarted attacks aimed at UK to US overseas flights in
the summer of 2006. The rest of the US is rated at Yellow of Elevated threat. Those threats are real, but
what methods are used in assessing that threat and applying resources against those threats?
When encountering a problem, it is usually best to consult an expert for some advice or counsel.
Dr. Bruce Hoffman is one such expert in the field of terrorism. In a Risk Management Solutions, Inc.
document, Dr. Bruce Hoffman contends, “as military and government targets increase their protection levels,
softer targets such as economic and commercial targets become more attractive” (Hoffman, 2003).
Risk Assessment Models
Risk assessment models are used to assess the threat to critical infrastructure, military operations,
buildings, unexpected events for insurance purposes, and a number of other areas. The application of
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭