Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 1 MB

Use Adobe Acrobat Reader version 7.0 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 7.0 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback110 pages $26.00 $20.80 20% Web Discount

Abstract

How much data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses is publicly available and how easily could it be found by individuals seeking to harm U.S. domestic interests? The authors developed a framework to guide assessments of the availability of such information for planning attacks on the U.S. air, rail, and sea transportation infrastructure, and applied the framework in an information-gathering exercise that used several attack scenarios. Overall, the framework was useful for assessing what kind of information would be easy or hard for potential attackers to find. For each of the attack scenarios, a team of “attackers” was unable to locate some of the information that a terrorist planner would need to gauge the likely success of a potential attack. The authors recommend that procedures for securing sensitive information be evaluated regularly and that information that can be obtained from easily accessible, off-site public information sources be included in vulnerability assessments.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    Defining Terrorists’ Information Requirements: The ModIPB Framework

  • Chapter Three

    Summary of Red-Team Findings and Validation

  • Chapter Four

    Conclusions and Recommendations

  • Appendix A

    What the Red Team Found

  • Appendix B

    Crosswalk of ModIPB and al Qaeda Manual

The research described in this report was conducted under the auspices of the Homeland Security Program within RAND Infrastructure, Safety, and Environment (ISE).

This report is part of the RAND Corporation technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.