Notes from the Editor Volume XIV

The December 2018 Issue of Homeland Security Affairs features a research article proposing a system for detecting terrorist-deployed nuclear weapons in American cities, an essay reviewing the literature on the causes of suicide terrorism, and an essay exploring the creation of performance metrics for deterring threats to critical infrastructure. In “Defending Cities against Nuclear Terrorism: Analysis

Defending Cities Against Nuclear Terrorism: Analysis of A Radiation Detector Network for Ground Based Traffic

By Edward Cazalas Abstract This article describes a specific, promising concept for a traffic-based radiation detector network concept deployed on roads/highways/stoplights/etc. The detector network concept is intended to help defend urban areas against nuclear attack by adversaries. The network has two potential functions: to detect and localize the covert transport of nuclear materials or weapons

Causes & Explanations of Suicide Terrorism: A Systematic Review

By Vanessa Harmon, Edin Mujkic, Catherine Kaukinen, & Henriikka Weir Abstract The frequency of suicide terrorist attacks has increased dramatically since the year 2000, creating a renewed interest in this area of study, as well as an increase in the importance of understanding individual and organizational motivations behind engagement in suicide terrorism. The following is

Risk-Based Performance Metrics for Critical Infrastructure Protection? A Framework for Research and Analysis

By Eric F. Taquechel & Marina Saitgalina   Abstract Measuring things that do not occur, such as “deterred” or “prevented” terrorist attacks, can be difficult. Efforts to establish meaningful risk-based performance metrics and performance evaluation frameworks based on such metrics, for government agencies with counterterrorism missions, are arguably in a nascent state. However, by studying

Learning From H.I.M. (Harvey, Irma, Maria): Preliminary Impressions for Supply Chain Resilience

By Phillip J. Palin [The observations and analysis offered reflect the author’s best judgment as of late 2017. The essay is intended to encourage more detailed research and deeper consideration.] Abstract The 2017 Atlantic hurricane season challenged critical infrastructure and key resources across a wide area. Harvey, Irma, and Maria each exposed different aspects of

Operator Driven Policy: Deriving Action From Data Using The Quadrant Enabled Delphi (QED) Method

By Lilian Alessa, Sean Moon, David Griffith & Andrew Kliskey   Abstract To close the gap in operator-driven policy for the homeland security enterprise, we argue for a bottom-up policy process that acknowledges operator knowledge and opinions. We propose a practical approach to enable policy-makers to incorporate operator knowledge and experience, or operator driven policy

SCADA Fusion With Commercial Fission

by Matthew Horner Abstract Nuclear power plants rely on digital components, like supervisory control and data acquisition (SCADA) devices, to perform daily operations. These devices can contain software vulnerabilities. To address SCADA and other cyber threats, the U.S. Nuclear Regulatory Commission (NRC) has issued directives for licensed operators to submit cybersecurity plans for their facilities.

Book Review: Illusions of Terrorism & Counter-Terrorism by Richard English

reviewed by Scott Romaniuk Suggested Citation Romaniuk, Scott. “Book Review: Illusions of Terrorism and Counter-Terrorism by Richard English (Ed.). (Oxford: Oxford University Press, 2015). 174pp., £40.00 (h/b), ISBN 9780197265901.” Homeland Security Affairs 14, Article 5 (April 2018). https://www.hsaj.org/articles/14313   Terrorism, counter-terrorism, and their intersection have produced painful experiences for peoples and communities in many societies.

Defected from ISIS or Simply Returned, and for How Long?– Challenges for the West in Dealing with Returning Foreign Fighters

by Anne Speckhard, PhD., Ardian Shajkovci, PhD., & Ahmet S. Yayla, PhD. Abstract Many of the 38,000 foreign fighters ISIS has managed to attract to Syria and Iraq will return home. As increasing numbers of ISIS cadres flee the battlefield, some as defectors and others as returnees still aligned with ISIS’ goals and ideology, the challenges

Improving Maritime Transportation Security in Response to Industry Consolidation

by Nick Monacelli   Abstract Containerized cargo is the single largest security vulnerability in maritime shipping. Recent consolidation in the maritime shipping industry, along with freefalling shipping rates and increased vessel sizes, combine to cause concern for the future of containerized shipping security. Maintaining security in the maritime shipping industry is critical. Programs including the