The Threat of a Mumbai-Style Terrorist Attack in the United States 2013
Testimony submitted before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on June 12, 2013.
NSRD Publications by Year:
Latest |
2020 |
2019 |
2018 |
2017 |
2016 |
2015 |
2014 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002
Testimony submitted before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on June 12, 2013.
Testimony presented before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on June 12, 2013.
Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might, along with other information, help detect potential violent attacks.
This monograph reports results of a study to determine the level and causes of personnel turbulence among Army Reserve Component unit leadership and the effects this turbulence can have on training and preparation for future missions, as well as possible policy and practice options that could mitigate those effects.
The Army Medical Department uses the Professional Filler System (PROFIS) to manage the deployment of health care professionals and their assignment to military treatment facilities when not deployed. This report describes the functionality of PROFIS in the current operating environment of ongoing deployments and assesses potential modifications and improvements to the system.
Regional artists can play a positive role in shaping public debate and supporting democratic transition in the Middle East. This report explores the challenges artists have faced since the Arab uprisings, U.S. government programs to support arts in the region, and the wide array of nongovernmental activities to engage Arab artists, offering recommendations to improve support for these artists.
Testimony presented before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on May 22, 2013.
This study explores how a nuclear-armed Iran would behave and what this would entail for the United States and its main regional allies. It analyzes the Islamic Republic's ideology, motivations, and national security doctrine; examines a nuclear-armed Iran's potential policies toward Saudi Arabia and the GCC; discusses its potential behavior toward Israel; explores its relations with terrorist groups; and presents key findings.
Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks. Such "brandishing" is no panacea and could even backfire if misinterpreted. Its success also relies on the strength of other elements of the deterrence posture.
The passage of immigration enforcement laws, traditionally the purview of the federal government, by Arizona and other states raises the concern that state and local law enforcement agencies may engage in racial profiling when enforcing immigration laws. This paper describes several approaches for detecting racial profiling by police and calls for their use in monitoring the implementation of state and local immigration enforcement laws.
To reduce the costs of maintaining the Aegis system, and to take advantage of rapidly evolving commercial computing technology, the U.S. Navy is moving toward open-architecture software, a common source code library, and commercial, off-the-shelf processors. This report examines the potential benefits of this new model, the pace of upgrades, and the best way for the Navy to maximize the technological and financial benefits.
This report builds on earlier RAND research that used qualitative conceptual causal models called "factor trees" to identify the factors that contribute to aspects of terrorism or insurgency and how the factors relate to each other. This report goes beyond the qualitative by specifying a prototype computational social-science model of public support for terrorism and insurgency. The model illustrates designing for reusability and composition.
It is time that Syria's sizable émigré community used its considerable means and influence to help shape Syria's future.
Participating in insurgency is physically risky. Why do people do so?
War has always been a dangerous business, bringing injury, wounds, and death, and — until recently — often disease. What has changed over time, most dramatically in the last 150 or so years, is the care these casualties receive and who provides it. This book looks at the history of how humanity has cared for its war casualties and veterans, from ancient times through the aftermath of World War II.