Skip to main content

Currently Skimming:

2 Systems Approaches to Countering Terrorism
Pages 23-40

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 23...
... national security in the decades ahead. Arguably, the most significant sentence in the final report of that commission, issued a little less than a year before 9/11, read as follows: "terrorists and other disaffected groups will acquire weapons of mass destruction and mass disruption, and some will use them.
From page 24...
... That, of course, is "systems thinking." Augustine continued his introductory remarks about systems thinking as it relates to the counterterrorism mission and set the stage for other, more specific examples, and case studies that followed throughout the workshop. He explained that the deterrence strategy of the Cold War is now rather bankrupt when one deals with terrorists.
From page 25...
... Terrorists who seek to exert the use of some weapons cannot maintain control over the people that they attack, but they can fairly well deny effective control over their population. Certainly, it makes no sense for terrorists to engage in conventional warfare with powerful nations like India or the United States.
From page 26...
... Augustine returned to the subject of defense in depth and not being confined to a purely defensive posture. It is important to understand the enemies'
From page 27...
... However, Augustine's own admittedly nonscientific surveys in the United States reveal that most citizens, even generally well-informed citizens, are not aware of what they can do to help protect themselves. For example, if one goes out on the street and asks people what they should do if there is a chemical attack, go to the attic or the basement, or if one asks, in the case of a nuclear attack, should one go to the basement or to the attic, most people do not know.
From page 28...
... He expressed the desire to contribute wherever he could, because this gathering could make a great difference. INDIAN RESPONSE REGARDING A SYSTEMS APPROACH TO COUNTERING TERRORISM Nehchal Sandhu said that the government of India recognizes the value of all of the propositions Augustine raised.
From page 29...
... There was a Kargil Review Committee, and then a group of ministers read the recommendations that flowed out of the four task forces that were established. One of the main recommendations was that India needed to have a MultiAgency Center, which meant that all of the agencies involved in security, in collecting intelligence, and in implementing preventative plans should be able to get together.
From page 30...
... The cameras will have very sophisticated regional and centralized analysis centers, which would then aid response forces dealing with these types of situations. Sandhu also noted that in India potential terrorist targets are protected by first identifying the people who might be attacked.
From page 31...
... Unfortunately, in the Indian legal environment and federal structure, law and order and crime investigations are handled by provincial police offices; therefore, the NIA does not investigate terrorist cases unless invited to do so. Normally, the state response mechanism, which could be the local antiterror squad, does the basic response work.
From page 32...
... There is little resistance to requesting central support, which would entail flying in forensic teams, bomb disposal experts, and even expert investigators. For the most part, provincial jurisdictions are quite happy to receive additional assistance from the central government.
From page 33...
... In Holmes's experience working at the Port of Los Angeles, this system was used many times when an incident occurred and the initial response was by a local law enforcement agency and then subsequently, local officials called in customs officials, the FBI, and many of the other agencies to work cooperatively. At the end of the day, the blueprint allows for joint handling of constituent groups and joint press releases.
From page 34...
... The incident described involved multiple countries; therefore, the Justice Department involved several other counterterrorist specialists to determine if the incident was one of terrorism or if it was a different type of attack from a particular country. More than seven departments worked together on this incident, and this is occurring more and more frequently, especially during cyberattacks.
From page 35...
... If a request is approved, every month thereafter a review committee meets, including the Cabinet Secretary, the top-most official of the government of India supported by the law secretary that looks after the legal affairs within the government of India, and the Department of Telecommunications secretary, who is not a part of the authorization process, but whose department facilitates the implementation of the authorization of the Home Secretary. They look at these orders and decide which ones can be allowed to remain in effect and which have to be withdrawn.
From page 36...
... Augustine added that he is a strong believer that a systems group as he has described needs to have not only a strong intelligence input but also a strong red-team that can pretend to be the other side, or to be the bad guys and try to think like the opponents think. That is not usually done.
From page 37...
... No matter how good the system is, it will not be effective unless people are efficient. With regard to the state police forces that need to have antiterrorism response capacity, first, the National Security Guard, which is the key response mechanism, now has four regional response hubs.
From page 38...
... Since the 2001 anthrax attacks, considerable focus globally has been given to the bioterrorist attacks and to biothreats emanating from national sources as well. However, there were relatively few casualties in the United States as a result of the anthrax attacks.
From page 39...
... Right after 9/11 and 10/04 (the anthrax letters) , an FBI individual was placed with CDC teams as they did their epidemiological studies of naturally occurring outbreaks.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.