Evaluating Novel Threats to the Homeland

Unmanned Aerial Vehicles and Cruise Missiles

Nonfiction, Science & Nature, Technology, Military Science, Social & Cultural Studies, Political Science
Cover of the book Evaluating Novel Threats to the Homeland by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button, RAND Corporation
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button ISBN: 9780833044877
Publisher: RAND Corporation Publication: March 17, 2008
Imprint: RAND Corporation Language: English
Author: Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
ISBN: 9780833044877
Publisher: RAND Corporation
Publication: March 17, 2008
Imprint: RAND Corporation
Language: English

Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This approach can help defense planners understand how the capabilities that different attack modes provide address key adversary operational problems. Given the insights this analysis produced about when these systems would likely be preferred by an attacker, RAND explored defensive options to address the threat. UAVs and cruise missiles represent a ?niche threat? within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This approach can help defense planners understand how the capabilities that different attack modes provide address key adversary operational problems. Given the insights this analysis produced about when these systems would likely be preferred by an attacker, RAND explored defensive options to address the threat. UAVs and cruise missiles represent a ?niche threat? within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general.

More books from RAND Corporation

Cover of the book The Global Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Libya After Qaddafi by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Social Fitness and Resilience by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book The Rise of the Pasdaran by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Stretching and Exploiting Thresholds for High-Order War by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book China’s Expanding Role in Global Mergers and Acquisitions Markets by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book The Future of the U.S. Intercontinental Ballistic Missile Force by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Alternative Litigation Financing in the United States by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Evaluating the Impact of Prevention and Early Intervention Activities on the Mental Health of California’s Population by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Exploring the Association Between Military Base Neighborhood Characteristics and Soldiers' and Airmen's Outcomes by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Countering the New Terrorism by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Redirecting Innovation in U.S. Health Care by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Air Operations in Israel's War Against Hezbollah by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Sustaining Key Skills in the UK Military Aircraft Industry by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
Cover of the book Off to a Good Start by Brian A. Jackson, David R. Frelinger, Michael J. Lostumbo, Robert W. Button
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy