Skip to main content

Currently Skimming:

1. Introduction
Pages 25-38

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 25...
... First there is the interconnected, highly technological nature of modern civilization's basic systems. Market forces and a tradition of openness have combined to maximize the efficiency of many of our vital systems such as those that provide transportation, information technology, energy, and health care.
From page 26...
... According to the State Department's annual publication Patterns of Global Terrorism, "No one definition of terrorism has gained universal acceptance." The State Department uses the definition contained in Title 22 of the United States Code, Section 2656f(d) : "The term terrorism means premeditated, politically motivated violence perpetrated against
From page 27...
... Phases of Response In responding to the threat of terrorism, the United States needs a multifaceted approach. This includes the following capabilities, organized according to a time line that extends from before a hypothetical terrorist incident to its aftermath: · Intelligence and surveillance involve the observation of persons, groups, and motives a delicate matter as well as of potential means of destruction, such as nuclear materials, toxic chemicals, and biological agents.
From page 28...
... and is key to the choice of responses, such as retaliation or prosecution. In addition, all of these phases benefit from analysis and invention, which involve systematic learning from incidents that do occur, studying terrorist tactics and devising countermeasures through "red team/blue team" exercises,3 understanding motivations and factors that influence deterrence, and developing systematic plans for ongoing operations, future investments, and scientific and technological innovations.
From page 29...
... Diplomacy, international relations, military actions, intelligence gathering, and other instruments of national policy all have critical roles to play. In fact, advanced technologies have long been key to the preeminence of the United States in military affairs.
From page 30...
... The goal would be to create and deploy technical means to reduce the nation's vulnerability while minimizing the kinds of adverse social, political, or psychological responses that would make it a less desirable place in which to live, thereby handing terrorists the ultimate victory. Neither military actions abroad nor the most rigorous homeland defenses can reduce the threat of catastrophic terrorism to zero.
From page 31...
... Toxic chemicals and explosive materials; · Information technology, including communications, data management, and identification and authentication systems; · Energy systems, including electrical power systems and oil and natural gas systems; · Transportation systems; · Cities and f xed infrastructure, including buildings; · The response of people to terrorism, including how quality of life and morale of the population can be a target of terrorists and how people respond to terrorist attacks; . Complex and interdependent systems, including linked vulnerabilities, modeling, and simulation.
From page 32...
... . These chapters focus on solutions, on ways to harden society against terrorist attacks, to make critical systems more robust and resilient, and to enhance the ability to recover from such attacks.
From page 33...
... These technologies and programs are described in Chapter 11 and include the following: Systems analysis, modeling, and simulation; Integrated data management; Sensors and sensor networks; Autonomous mobile robotic technologies; Supervisory control and data acquisition (SCADA) systems; Controlling access to physical and information systems using technologies such as biometrics; and · Human and organizational factors.
From page 36...
... The second is the capacity to participate in imaginative research that will produce counterterrorism solutions based on future science and technology. Realizing the Potential of Science and Technology to Counter Catastrophic Terrorism This report describes a number of ways in which science and technology could be harnessed to prevent or contain terrorist attacks.
From page 37...
... Yet however well the federal government organizes its own effort in homeland security, the overall national effort cannot succeed without critical contributions from other institutions. Essential partners in utilizing science and technology for countering terrorism will include nonfederal governments (states, counties, and cities)
From page 38...
... In any case, it is important that these investments be made in a manner that fully realizes the potential of science and technology to provide solutions. Moreover, since much of the relevant technical expertise about these critical infrastructures resides in the private parties that operate them, it is essential that these parties participate directly in devising solutions to vulnerabilities.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.