Evaluating Novel Threats to the Homeland Unmanned Aerial Vehicles and Cruise Missiles

Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be asses...

Full description

Saved in:
Bibliographic Details
Main Author: Jackson, Brian A. (auth)
Other Authors: Frelinger, David R. (auth), Lostumbo, Michael J. (auth), Button, Robert W. (auth)
Format: Electronic Book Chapter
Language:English
Published: RAND Corporation 2008
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_114722
005 20231005
003 oapen
006 m o d
007 cr|mn|---annan
008 20231005s2008 xx |||||o ||| 0|eng d
020 |a MG626DTRA 
020 |a 9780833044877 
020 |a 9780833041692 
040 |a oapen  |c oapen 
024 7 |a 10.7249/MG626DTRA  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a JPWL  |2 bicssc 
072 7 |a TB  |2 bicssc 
072 7 |a TTM  |2 bicssc 
100 1 |a Jackson, Brian A.  |4 auth 
700 1 |a Frelinger, David R.  |4 auth 
700 1 |a Lostumbo, Michael J.  |4 auth 
700 1 |a Button, Robert W.  |4 auth 
245 1 0 |a Evaluating Novel Threats to the Homeland  |b Unmanned Aerial Vehicles and Cruise Missiles 
260 |b RAND Corporation  |c 2008 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This approach can help defense planners understand how the capabilities that different attack modes provide address key adversary operational problems. Given the insights this analysis produced about when these systems would likely be preferred by an attacker, RAND explored defensive options to address the threat. UAVs and cruise missiles represent a ?niche threat? within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general. 
540 |a All rights reserved  |4 http://oapen.org/content/about-rights 
546 |a English 
650 7 |a Terrorism, armed struggle  |2 bicssc 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a Military engineering  |2 bicssc 
653 |a Technology 
653 |a Political Science 
856 4 0 |a www.oapen.org  |u https://www.jstor.org/stable/10.7249/MG626DTRA  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/114722  |7 0  |z DOAB: description of the publication