Skip to main content

Currently Skimming:

Index
Pages 405-416

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 405...
... , 352 Air Force Research Laboratory (AFRL) , 352 Al Qaeda, 26, 28 American Medical Association, 103 American Red Cross, 94, 280 American Society for Microbiology, 68 American Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)
From page 406...
... See also Communications for first responders ad hoc interoperability, 159-160 communications during an emergency, 160163, 165-166 Commercial value for counterterrorism technologies and dual-use strategies, 23, 33, 132, 334, 360-362 in the bioterrorism area, 67-68, 97, 131 information technology, 149, 361 sensors, 117, 132, 361 transportation systems, 220-223, 232, 361 Commission on Aviation Safety and Security in the White House, 219n, 221n, 227n Committee on Science and Technology for Countering Terrorism, 3, 183n Communication with the public, 17, 62, 93-94, 162-163, 275-276 Communications for first responders, 2, 11, 137, 144, 146, 158-166, 172, 174, 230, 241, 243, 245, 258, 277 Complex and interdependent systems, 18-19, 31, 35, 287-312. See also Systems analysis and systems engineering counterterrorism threat modeling, 294-300 implications for education, 309-310 infrastructure modeling, 300-305 modeling challenges for counterterrorism, 305-309 systems approach to counterterrorism, 288290 systems management issues, 290-294 Computer code, improving, 154-155, 367 Computer Emergency Response Team, 145 Congress, 339-340, 342, 345-350, 354, 363 Congressional Budget Office (CBO)
From page 407...
... See Data mining; Information fusion; Standards for data integration and database interoperability of chemicalagents, 9-10, 115, 118-120, 130 of human and agricultural systems, 8, 78, 94-96 of IT systems, 153-154 of radiological material, 51, 58-59 robotics for, 120, 230, 326 of water supplies, 9, 125-126 Defense Advanced Research Projects Agency (DARPA) , 11, 116, 120, 168, 287, 309, 325-326, 338, 352-353, 355 Defense Modeling and Simulation Office in DOD, 287, 302 Defense Threat Reduction Agency (DTRA)
From page 408...
... , 138 Dual-use strategies. See Commercial value for counterterrorism technologies EEconomic aspects of recovery, 282-284 Electric power, 180-195 extra-high-voltage transformers, replacements for, 188-189 intelligent, adaptive power grid, 192-193, 366-367 implementation of existing technology for mitigating vulnerabilities, 183-188 interruptions in, 252 interdependence with other systems, 301302 recovery from outages, 185-186, 191-192 representative vulnerabilities, 180-183 research and development priorities and strategies, 188-195 Electric Power Research Institute (EPRI)
From page 409...
... See also Decontamination defining whether infectious agents and diseases are bioterrorist threats, 84-85 human resources needed, 80, 96-97 identification of biological agents in the environment, 71-73 Internet resources on bioterrorism, 104 involving the S&T and public health communities in intelligence and prevention, 69-71 microbial forensics and analysis of trace evidence, 82-84 personal protective equipment, 89-90. See also Protective equipment for individuals regulatory reform for drug development, 100-102 response and recovery, 79-80, 90-93 standards and standardization, 97-98.
From page 410...
... See also Commercial value for counterterrorism technologies and dual-use strategies government procurement and acquisition rules, 363-364 indemnification, 362 Infectious Diseases Society of America, 68 Influenza, 65, 76, 84, 94 Information fusion, 11-12, 136, 146-149, 166170, 173, 318, 366. See also Data mining; Standards for data integration and database interoperability Information technology (IT)
From page 411...
... , 242, 318 Natural gas systems, 196-201, 204-208 implementation of existing technologies for mitigating vulnerabilities, 204-205 5 liquefied natural gas, 200-201 physical vulnerabilities of the natural gas infrastructure, 197 pipelines, 198-200 research and development priorities and strategies, 205-208 Naval Research Laboratory (NRL) , 352 Nerve agents, 108-111, 115, 129, 131 Network security, 147-157, 172-173 authentication, detection, and identification 149-151 containment, 152-153 principles of defensive strategy, 150 recovery, 153-154 research issues, 154-157 Normalization and cultural memory, 284-286 North American Electric Reliability Council, 195 Nuclear and radiological threats, 4, 5-6, 31, 34, 39-64 homeland security challenges, 49-51 improvised nuclear devices (INDs)
From page 412...
... See also Decontamination economic aspects of, 282-284 from a catastrophic energy system shutdown, 186, 205 in network security, 153-154 political aspects of, 281-282 sensors and sensor networks in, 323 of transportation services, 230 Regional transmission operators (RTOs) , 185, 188, 195 Regulations and rules, possible adjustments to, 359-364 antitrust regulations, 102, 184, 204, 360, 362-363 for information technology products, 145, 173 pharmaceutical-related, 100-102, 124-125, 131, 362-363 for specific systems, 122, 186, 227 tightening of nuclear and radiological regulations, 52, 61 Response of people to terrorism, 17-18, 31, 35, 267-286 anticipation and preparedness, 271-272 goals of different types of terrorist attacks, 268 institutional, group, and political vulnerability, 268-270 long-term recovery processes, 281-286 occurrence of attack, 274-279
From page 413...
... See Trusted spokespersons Stadiums and other places for large public gatherings, 258-261 .` 413 Standards, 21, 22, 337, 339, 344, 348, 358, 359-360, 364 for biological detection and diagnosis, 7, 71-72, 76, 97-98 for buildings, 2, 16, 255-258 for communications for first responders, 2, 158-159, 245 for data integration and database interoperability, 19, 20, 303-305, 314, 320 for decontamination, 2, 10, 96 for emergency response protocols and equipment, 8, 22, 89, 120, 241, 244 for energy systems' control systems, 187, 204, 328 for filters, 2, 10, 89-90, 258 for sensors, 10, 325 for transportation systems and related equipment, 217, 232-233, 235 States and cities in partnership with government, 357-359. See also Cooperation between federal, state, and local governments Stolen nuclear weapons and improvised nuclear devices.
From page 414...
... in DOT, 14-15, 211, 231-235, 319, 35~351, 354 Transportation systems, 13-15, 31, 35, 210-237 aviation systems. See Aircraft as weapons; Aviation security common characteristics of, 212-214 considerations for security strategies for, 214-223 disruption of, 139, 196, 279, 315 human factors, 15, 224, 226, 229, 232, 234 industrial chemicals, transport of, 112, 121122 layered security systems, 214-220 managing research and development activities, 224, 233-235, 351, 354, 358 railcar and container contents, 263-265 research and technology needs, 223-231 shipping container threat scenario and security strategy, 216-218, 361 strategic research and planning advice for the TSA, 231-235 Trusted spokespersons, 2, 6, 17, 62, 276 Tunnels.
From page 415...
... , 1, 31, 63, 91, 93-94, 128, 321. See also Bioterrorism; Chemical agents; Nuclear and radiological threats; Catastrophic terrorism West Nile virus outbreak, 66 i 415 World Customs Organization, 233 World Health Organization (WHO)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.