Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463931196
Publisher: Progressive Management Publication: June 6, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463931196
Publisher: Progressive Management
Publication: June 6, 2018
Imprint: Smashwords Edition
Language: English

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

More books from Progressive Management

Cover of the book Vision to Victory: Space, Mahan, and Mitchell: The Role of the Visionary in Cross-Organizational Innovation, Space Militarization Analog to Mahanian Modern Navy and Mitchell's Independent Air Force by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Leadership for American Army Leaders - FMFRP 12-17 (Value-Added Professional Format Series) by Progressive Management
Cover of the book China's Role in Counter-Piracy Operations: Gulf of Aden (GOA), Southeast Asia, Cooperating with Other Navies, PLAN Modernization, ASEAN Economic Relationship, Somali Piracy, Mahanian Philosophy by Progressive Management
Cover of the book Libya: A Contemporary Conflict in a Failing State - From Italian Colonial Rule to Gaddafi's Coup, Emergence of Islamic State, ISIL, ISIS, Jamahiriya, Islamist Forces, Regional Militia, Arab Spring by Progressive Management
Cover of the book U.S. Air Force Aerospace Mishap Reports: Accident Investigation Boards for Incidents Involving the TARS Tethered Aerostat Radar System in 2011 and 2012 by Progressive Management
Cover of the book Joint by Design: The Western Desert Campaign – World War II Allied Victory in North Africa Against the Desert Fox Rommel, Battle at El Alamein, Role of the Army Air Force, Attacking Enemy as a System by Progressive Management
Cover of the book The Evolution of U.S. Strategic Command and Control and Warning, 1945-1972: Cold War Nuclear Issues, Soviet Threat, Ballistic Missiles, Custody of Atomic Bombs, Command Posts, DEW, BMEWS by Progressive Management
Cover of the book 21st Century Guide to Carbon Sequestration: Capture and Storage to Fight Global Warming and Control Greenhouse Gases, Carbon Dioxide, Coal Power, Technology Roadmap and Program Plan by Progressive Management
Cover of the book NASA Report: Independent Review Team Orbital Sciences ATK ISS Space Station Resupply Orb-3 Cygnus Antares Rocket Failure Accident Investigation Report, October 2014 Event, Wallops MARS Launch Site by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume III: The Joint Chiefs of Staff and National Policy 1951 - 1953, Korean War Part Two - Syngman Rhee, UN Command, Diplomatic Deadlock by Progressive Management
Cover of the book Whispers of Warriors: Essays on the New Joint Era - Essays on Military Leadership, Education, Combined Operations, Intelligence Support, Importance of History, Lessons from Desert One to the Balkans by Progressive Management
Cover of the book Nepal in Perspective: Orientation Guide and Nepal Cultural Orientation: Geography, History, Economy, Security, Mount Everest, Mahabharat Lekh, Kathmandu Valley, Siwalik, Madheshi, Tarai Castes, Tharu by Progressive Management
Cover of the book Are Muslim Diaspora in the U.S. Vulnerable to Islamic Extremism? Four Terrorist Case Studies, Boston Bombers Tsarnaev, Analysis of Role of Governance, Economics, Religion, U.S. Homeland Involvement by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Cancer and the Environment - Carcinogenic Chemicals, Other Causes, Controversial Suspects (Cell Phones, Meat Chemicals, Acrylamide, Artificial Sweeteners) by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Coping with Advanced Cancer - Metastatic Cancer, Caregiver Support, Palliative Care and Hospice, Advance Directives, End-of-Life Care, Pain Control, Grief by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy