Cover: Technology Strategies for Homeland Security

Technology Strategies for Homeland Security

Adaptation and Coevolution of Offense and Defense

Published in: Homeland Security Affairs, Vol. 5, no. 1, Jan. 2009, p. 1-16

Posted on on January 01, 2009

by Brian A. Jackson

For homeland security organizations, responses to terrorist threats frequently rely on technology. In response, the terrorists adapt and change, threatening the defensive measures' protective value. Accepting this "back and forth" dynamic of the conflict, it is useful to think about the contest between terrorist groups and security forces as a coevolutionary process, where both seek to shape the other's behaviors. Terrorists' strategies are driven by the types and range of weapons and other technologies they acquire. Rather than falling into the trap of trying to create impenetrable defenses for every target, defensive technology strategies should recognize and — where possible — exploit these evolutionary dynamics through building flexibility into defensive approaches, attempt to actively shape adversary choices, and seek defensive approaches that are insensitive to terrorist adaptation and change.

This report is part of the RAND Corporation External publication series. Many RAND studies are published in peer-reviewed scholarly journals, as chapters in commercial books, or as documents published by other organizations.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.