No Dark Corners: A Different Answer to Insider Threats

Nick Catrantzos ABSTRACT: An adversary making a frontal attack can be anticipated or repulsed. An adversary attacking from within, however, cannot be so readily countered. This article presents findings of research that used a Delphi method to uncover flaws in traditional defenses against hostile insiders and point the way to new, counterintuitive defenses. The findings

Letter to the Editor: Federal Nuclear Preparedness and Response Measures Reflect New Modeling Paradigms

Rocco Casagrande, John MacKinney, Judith Bader, C. Norman Coleman, Korey Jackson, and Ann Knebel ABSTRACT: A response to Robert Harney’s article, “Inaccurate Prediction of Nuclear Weapons Effects and Possible Adverse Influences on Nuclear Terrorism Preparedness,” published in Homeland Security Affairs V, no.3 (September 2009). SUGGESTED CITATION: Casagrande, Rocco et al. “Letter to the Editor: Federal

Book Review: Same Priorities, Different Perspectives: Tom Ridge and Michael Chertoff on Homeland Security

Stephanie Blum ABSTRACT: Former Secretaries of the Department of Homeland Security Tom Ridge and Michael Chertoff have each published historical retrospectives on homeland security and their experiences leading the government’s newest department. In this review, Ms. Blum discusses the highlights of each book and provides a comparative analysis. While Ridge focuses on the politics of

Factors Affecting the Amplification or Attenuation of Public Worry and Dread about Bioterrorist Attacks

Lulu Rodriguez and Suman Lee ABSTRACT: This study examined what variables – technical/rational or normative/value – predict public worry and dread about bioterrorist attacks. Data from a national sample indicate that the technical variable of media attention and the normative variable of perceived readiness of the government to counter threats predicted level of worry. The

Cause-and-Effect or Fooled by Randomness?

Ted G. Lewis ABSTRACT: This article develops an unconventional theory of infrastructure criticality based on decade-old ideas from a variety of disciplines. First, the concept of self-organized criticality (SOC) is explained using three simple simulations proposed by Per Bak, Newman, and Amaral-Meyers. Each simulation illustrates an aspect of SOC: self-organization, randomness as an underlying engine

Information Sharing: Exploring the Intersection of Policing with National and Military Intelligence

Gary Cordner and Kathryn Scarborough ABSTRACT: Policing and police intelligence rarely overlapped or intersected with national and military intelligence before September 11, 2001. Since then, a great amount of emphasis has been placed on improving intelligence and information sharing. This article explores the details of information sharing between (1) police and (2) national and military

Optimization Approaches to Decision Making on Long-Term Cleanup and Site Restoration Following a Nuclear or Radiological Terrorism Incident

S. Y. Chen and Thomas Tenforde ABSTRACT: Emergency planning activities have historically focused on the early phase of an event, especially issues associated with triaging in the initial response such as rescuing survivors. The most difficult task following an event may be the eventual recovery of society’s most affected areas; the government must spend a

Jihad Dramatically Transformed? Sageman on Jihad and the Internet

David Tucker ABSTRACT: In his book Leaderless Jihad, Marc Sageman claims, as the title indicates, that Jihad in the modern world is changing from a centrally organized and structured activity into a more dispersed, decentralized movement in which small groups self-organize to carry out attacks. In making this argument, Sageman claims that the internet “has

Resilience: The Grand Strategy

Philip Palin ABSTRACT: Homeland Security does not have a grand strategy. Resiliency has been suggested as an over-arching goal, but what does it really mean? In this essay, Philip Palin draws from his Long Blog, modeled on George Keenan’s Long Telegram (which defined containment as the United States’ Cold War strategy) to formulate resilience as