terrorism, counter-terrorism

Sponsored by Project on Defense Alternatives            Editor: Carl Conetta.            17 September 2007

HOMELAND SECURITY - TECHNOLOGY & TECHNIQUES

TERRORISM & COUNTER-TERRORISM Terrorism, its nature and sources
Terrorist groups, incidents, targets
Financial Aspects
Bin Laden and Al Qaeda
Counter-terror strategy & programs
US War on Terror:
     Plans, Costs, Effects

Legal Issues & Human Rights
Terrorism & WMDs
Terrorism & Informational Warfare
Terrorism &
     regional security issues

Sept. 11 attack
Resource sites

HOMELAND SECURITY
Overviews
Organization & cost
Armed forces roles and issues
Intelligence and warning
General Transport
Aviation
Rail & Road
Port & Maritime
Border & Immigration
Critical infrastructure
Cyber security
First responders &
     local preparedness

Health system preparedness
Securing agriculture
Miscellaneous problems & Issues
Technology & techniques
Legislation & legal issues
WMDs and homeland security
Resource sites


PDA SPONSORED SITES

RMA

CMP

WAR REPORT

DEFENSE STRATEGY REVIEW

PDA

E-mail This Page  |   Tag This Page (del.icio.us)


The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues and Options for Congress
Todd Masse, Siobhan O'Neil and John Rollins. Congressional Research Service, 02 February 2007 (.pdf file).

Netting the Border
Michael Burnett. Military Information Technology, 20 December 2006.

Radio Interoperability: Addressing the Real Reasons We Don't Communicate Well During Emergencies
Ronald P. Timmons. Naval Postgraduate School, March 2006 (.pdf file).

Report to Congress on the Study to Assess Short-Term and Long-Term Needs for Allocations of Additional Portions of the Electromagnetic Spectrum for Federal, State and Local Emergency Response Providers
Kevin J. Martin. Federal Communication Commission, 19 December 2005 (.pdf file).

Biometrics in the War on Terror
John D. Woodward, Jr. United Press International, 18 December 2005. Posted on the RAND website.

Risk-Based Homeland Security Measure Shows Promise
James Jay Carafano. WebMemo #779. Heritage Foundation, 29 June 2005.

Using Fingerprint Image Quality to Improve the Identification Performance of the U.S. Visitor and Immigrant Status Indicator Technology Program
Lawrence M. Wein and Manas Baveja. PNAS, 24 May 2005 (.pdf file).

Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security
Wendy H. Schact and John R. Thomas. CRS Report for Congress, 06 May 2005 (.pdf file).

Detection of Explosives on Airline Passengers: Recommendation of the 9/11 Commission and Commission and Related Issues
Dana A. Shea and Daniel Morgan. CRS Report for Congress, 07 February 2005 (.pdf file).

Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues
Daniel Morgan and William Krouse. CRS Report for Congress, 07 February 2005 (.pdf file).

The Future of Anti-Terrorism Technologies
James Jay Carafano. Heritage Lectures, 06 June 2005 (.pdf file).

The Past Perfect Promise of Facial Recognition Technology
Kelly Gates. ACDIS Occasional, July 2004 (.pdf file).

National Technology Plan for Emergency Response to Catastrophic Terrorism
Hicks and Associates, Inc. Prepared for the National Memorial Institute for the Prevention of Terrorism and the U.S. Department of Homeland Security, April 2004 (.pdf file).

Fake fog could defend nuclear plants
New Scientist, 12 January 2004.

Analysis of Advanced Tech Weapons in Homeland Defense
Scott S. Hamilton. Air Force Office of Scientific Research, 30 December 2003. Hosted by STINET database (.pdf file).

Planned U.S. Sensor Network Targets Terror Threats
Rick Merritt. EE Times, 14 July 2003.

Research and Development in the Department of Homeland Security
Daniel Morgan. Congressional Research Service, 20 June 2003. Posted on the FAS web site.

Sensing Trouble:  Chemists approach homeland security in a variety of ways
Sarah Graham. Scientific American,, 28 April 2003.

PPPL Researchers Develop Anti-terrorism Device
Princeton Plasma Physics Laboratory Digest, April 2003.

High Ground over the Homeland:  Issues in the Use of Space Assets for Homeland Security
Lt Col S. Didi Kuo, PhD (USAF). Air & Space Power Journal, Spring 2003.

Accelerating the Research, Development, and Acquisition of Medical Countermeasures Against Biological Warfare Agents
National Academies Press, 2003.

National Academies Press, Tracking and Predicting the Atmospheric Dispersion of Hazardous Material Releases:  Implications for Homeland Security
Board on Atmospheric Sciences and Climate. National Academies Press, 2003.

Preparing for the Psychological Consequences of Terrorism
Board on Neuroscience and Behavioral Health and the Institute of Medicine. National Academies Press, 2003.

Review of EPA Homeland Security Efforts:  Safe Buildings Program Research Implementation Plan
National Academies Press, 2003.

Science and Technology for Army Homeland Security:  Report 1
Board on Army Science and Technology. National Academies Press, 2003.

Testing and Evaluation of Standoff Chemical Agent Detectors
Board on Chemical Sciences and Technology. National Academies Press, 2003.

"Seacurity":  Improving the Security of the Global Sea-Container Shipping System
Maarten van de Voort, et. al. RAND, 2003 (.pdf file).

Technology and Security (review article with full-text links)
Ivan Boothe and Sage Stossel. The Atlantic, 21 September 2002.

Homeland Security: Intelligence Support
CRS Report for Congress, 7 August 2002. Posted on the Federation of American Scientists website.

National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy
Randall A. Yim. Testimony before the Subcommittee on Technology and Procurement Policy, House Committee on Government Reform, 7 June 2002.

Your Face Is Not a Bar Code: Arguments Against Automatic Face Recognition in Public Places
Philip E. Agre. UCLA Department of Information Studies, 02 June 2002.

Survival in an Insecure World
W. Wayt Gibbs. Scientific American, 4 May 2002.

National Preparedness: Technologies to Secure Federal Buildings
Keith A. Rhodes. Testimony before the Subcommittee on Technology and Procurement Policy, House Committee on Government Reform, 25 April 2002.

Diffuse Security Threats: Technologies for Mail Sanitization Exist, but Challenges Remain
Report to Congressional Requesters, U.S. Government Accounting Office, April 2002.

I Seek You: Are New Security Technologies Worth the Intrusion and the Cost?
Wendy M. Grossman. Scientific American, 24 March 2002.

Using Technology to Detect and Prevent Terrorism
Shane Ham and Rovert D. Atkinson. Policy Brief. Progressive Policy Institute, January 2002.

The Int'l Critical Information Infrastructure Protection (CIIP) Handbook
Andreas Wenger, et. al. Center for Security Studies and Conflict Research, 2002. Posted on the International Relations and Security Network website.

Safer Skies: Baggage Screening and Beyond
Gary Kauvar, et. al. White Paper. RAND, 2002.

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism
Committee on Science and Technology for Countering Terrorism, National Research Council. National Academies Press, 2002.

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism
Committee on Science and Technology for Countering Terrorism, National Research Council, 2002. Posted on the National Academy Press website.

Homeland Security Technology
William B. Bonvillian and Kendra V. Sharp. Issues in Science and Technology, Winter 2001.

An Introduction to Biological Agent Detection Equipment for Emergency First Responders
Alim A. Fatah, et. al. NIJ Guide #101-00. National Institute of Justice, December 2001. Posted on the National Criminal Justice Reference Service website.

Reseizing the Controls: Remotely Piloted Hijack Rescues May Be a Bad Idea
Steven Ashley. Scientific American, 16 December 2001.

National Transportation Security Summit
Mineta Transportation Institute, 30 October 2001.

Armed Pilots Would Supplement Security
Tracy W. Price and Roger Waldman. Aviation Week and Space Technology, 22 October 2001.

Guide for the Selection of Chemical and Biological Decontamination Equipment for Emergency First Responders
Alim A. Fatah, et. al. NIJ Guide #103-00. National Institute of Justice, October 2001. Posted on the National Criminal Justice Reference Service website.

Superbowl Surveillance: Facing Up to Biometrics
John D. Woodward, Jr. RAND, May 2001.

Guide to the Technologies of Concealed Weapon and Contraband Imaging and Detecting
Nicholas G. Paulter. NIJ Guide #602-00. National Institute of Justice, February 2001. Posted on the National Criminal Justice Reference Service website.

User's Guide for Hand-Held and Walk-Through Metal Detectors
Nicholas G. Paulter. NIJ Guide 600-00. National Institute of Justice, January 2001. Posted on the National Criminal Justice Reference Service website.

Computer-Assisted Passenger Screening and Positive Passenger-Bag Matching
Assessment of Technologies Deployed to Improve Aviation Security: First Report. Panel on Assessment of Technologies Deployed to Improve Aviation Security, National Materials Advisory Board, National Research Council, 1999.

Technology Against Terrorism: Structuring Security
US Office of Technology Assessment, January 1992.

Technology Against Terrorism: The Federal Effort
US Office of Technology Assessment, July 1991.

Back to Top
E-mail This Page


Search

powered by FreeFind



PDA Publications:
US Defense Policy | Regional Security
Iraq & Afghanistan | Military & Strategic Studies
Terrorism | Alternative Security & Defense

Home | Buy Publications | What's New | About PDA
Links | Search This Site | In the News | E-mail PDA

War Report | RMA Debate Page
Defense Strategy Review Page | Chinese Military Power Page
Terrorism, Counter-Terrorism, Homeland Security | Occupation Distress

Become a PDA Sustainer

The Project on Defense Alternatives
The Commonwealth Institute
P.O.Box 398105
Inman Square Post Office
Cambridge, MA 02139, USA
Phone 617/547-4474
Fax 617/868-1267
Email: pda(at)comw.org

Site designed by
IRN Internet Services
Copyright © The Commonwealth Institute. All Rights Reserved.


Please send us your comments, any corrections,
and your suggestions for additional resources.