-
7
-
-
77951651040
-
-
note
-
Only five report it has decreased.
-
-
-
-
8
-
-
77951651643
-
Information Sharing Environment Implementation Plan
-
accessed at, March 2007
-
The fixes embodied in the Information Sharing Environment (ISE) established under Executive Order 13388 focus on more effectively sharing information within government and pay short shrift to the value of sharing information with the public more generally. Thomas E. McNamara, "Information Sharing Environment Implementation Plan," Information Sharing Environment, accessed at http://www.ise.gov/docs/ise-impplan-200611.pdf, 24, 94, 8 March 2007.
-
Information Sharing Environment
-
-
McNamara, T.E.1
-
9
-
-
77951630526
-
-
(Washington, DC: Congressional Research Service. RL33494)
-
and Harold C. Relyea, Security Classified and Controlled Information: History, Status, and Emerging Management Issues (Washington, DC: Congressional Research Service. RL33494, 2006), 26-27.
-
(2006)
Security Classified and Controlled Information: History, Status, and Emerging Management Issues
, pp. 26-27
-
-
Relyea, H.C.1
-
10
-
-
77951625015
-
FOIA Guide, 2004 Edition
-
accessed at, 7 April 2006
-
"FOIA Guide, 2004 Edition," Exemption One, accessed at http://www.usdoj.gov/oip/foiact.htm, 7 April 2006.
-
Exemption One
-
-
-
11
-
-
77951629806
-
-
In the 109th Congress, for example, bills designed to strengthen the FOIA and to reestablish the principle that agencies should err on the side of openness died in committee in both the House and Senate. See Restore Open Government Act of 2005, HR 2331, 109th Cong., 1st sess., available at
-
In the 109th Congress, for example, bills designed to strengthen the FOIA and to reestablish the principle that agencies should err on the side of openness died in committee in both the House and Senate. See Restore Open Government Act of 2005, HR 2331, 109th Cong., 1st sess., available at http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.02331.
-
-
-
-
12
-
-
77951647769
-
-
Open Government Act of 2005, S 394, 109th Cong., 1st sess., available at
-
Open Government Act of 2005, S 394, 109th Cong., 1st sess., available at http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00394.
-
-
-
-
14
-
-
77951627591
-
Ensuring the Consent of the Governed: America's Commitment to Freedom of Information and Openness in Government
-
(Fall), note
-
and John Cornyn, "Ensuring the Consent of the Governed: America's Commitment to Freedom of Information and Openness in Government," LBJ Journal of Public Affairs (Fall 2004). Three bills designed to encourage openness passed the House in the 110th Congress in July 2008-Reducing Over-Classification Act of 2007, HR 4806.
-
(2004)
LBJ Journal of Public Affairs
-
-
Cornyn, J.1
-
15
-
-
77951651196
-
-
note
-
Improving Public Access to Documents Act, HR 6193.
-
-
-
-
16
-
-
77951646184
-
-
note
-
and Reducing Information Control Designations Act, HR 6576-but were not passed into law.
-
-
-
-
17
-
-
84970370566
-
Secrecy and International Relations
-
David N. Gibbs, "Secrecy and International Relations," Journal of Peace Research 32, no. 2 (1995): 213-2-8.
-
(1995)
Journal of Peace Research
, vol.32
, Issue.2
, pp. 213-218
-
-
Gibbs, D.N.1
-
18
-
-
85050840145
-
Secrecy in American Bureaucracy
-
and Francis E. Rourke, "Secrecy in American Bureaucracy," Political Science Quarterly 72 (1957): 540-64.
-
(1957)
Political Science Quarterly
, vol.72
, pp. 540-564
-
-
Rourke, F.E.1
-
20
-
-
84976921726
-
Freedom of Information and National Security
-
Morton H. Halperin, "Freedom of Information and National Security," Journal of Peace Research 20, no. 1 (1983): 1-4.
-
(1983)
Journal of Peace Research
, vol.20
, Issue.1
, pp. 1-4
-
-
Halperin, M.H.1
-
21
-
-
77951629674
-
Accessibility of Government-Sponsored Research in International Studies
-
and Cyril E. Black, "Accessibility of Government-Sponsored Research in International Studies," International Studies Quarterly 14 (1970): 320-24.
-
(1970)
International Studies Quarterly
, vol.14
, pp. 320-324
-
-
Black, C.E.1
-
22
-
-
77951631799
-
-
note
-
Searching article abstracts and titles in the Social Sciences Citation Index for the words "government" and "secrecy" returns only seven articles in academic political science journals between 1973 and 2007, none of which analyze the practical trade-off between openness and secrecy. Index available at http://scientific.thomsonreuters.com/cgi-bin/jrnlst/jlresults.cgi?PC=J&SC=UU.
-
-
-
-
23
-
-
0040213333
-
Democratic Secrecy
-
Dennis F. Thompson, "Democratic Secrecy," Political Science Quarterly 114, no. 2 (Summer 1999): 181-93.
-
(1999)
Political Science Quarterly
, vol.114
, Issue.2 Summer
, pp. 181-193
-
-
Thompson, D.F.1
-
25
-
-
77951647282
-
National Security vs. Public Disclosure: The War on Terrorism's Implications Upon Federal Emergency Planning and Right to Know Laws
-
The Federalist Society (December)
-
Evan M. Slavitt and Gregory D. Cote, "National Security vs. Public Disclosure: The War on Terrorism's Implications Upon Federal Emergency Planning and Right to Know Laws," National Security White Papers, The Federalist Society (December 2003).
-
(2003)
National Security White Papers
-
-
Slavitt, E.M.1
Cote, G.D.2
-
26
-
-
33749575656
-
The Age of Missing Information
-
27 March, accessed at, on 12 October 2009
-
Steven Aftergood, "The Age of Missing Information," Slate, 27 March 2005, accessed at http://www.slate.com/id/2114963/ on 12 October 2009.
-
(2005)
Slate
-
-
Aftergood, S.1
-
27
-
-
77951637396
-
-
note
-
and Lisa Graves, Senior Counsel for Legislative Strategy, American Civil Liberties Union, Testimony on S 394, the "OPEN Government Act," before the Terrorism, Technology, and Homeland Security Subcommittee of the United States Senate Committee of the Judiciary, on 15 March 2005.
-
-
-
-
35
-
-
77951651349
-
-
(Washington, DC: Congressional Research Service. RL32561)
-
John D. Moteff, Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences (Washington, DC: Congressional Research Service. RL32561, 2005).
-
(2005)
Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences
-
-
Moteff, J.D.1
-
38
-
-
77951642480
-
-
note
-
This quote and subsequent quotes are from a survey of 186 U.S. federal, state, local, and industry homeland security officials. We identify sources by respondent number to maintain anonymity. The survey is described in the section "Secrecy and Openness in Practice." Respondent 725732258.
-
-
-
-
40
-
-
66049130744
-
-
Jacob N. Shapiro and Clinton Watts, ed., (West Point: Combating Terrorism Center)
-
Jacob N. Shapiro and Clinton Watts, ed., Al-Qa'ida's (Mis)Adventures in the Horn of Africa (West Point: Combating Terrorism Center, 2007).
-
(2007)
Al-Qa'ida's (Mis)Adventures in the Horn of Africa
-
-
-
48
-
-
61149627926
-
-
For a citation-mapping of jihadi public intellectuals, see, (West Point, NY: Combatting Terrorism Center). The most well-known of these public intellectuals is Abu Musab al-Suri
-
For a citation-mapping of jihadi public intellectuals, see William McCants and Jarret Brachman, Militant Ideology Atlas (West Point, NY: Combatting Terrorism Center, 2006). The most well-known of these public intellectuals is Abu Musab al-Suri.
-
(2006)
Militant Ideology Atlas
-
-
McCants, W.1
Brachman, J.2
-
49
-
-
33845658633
-
Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings
-
September/October, note
-
Brynjar Lia and Thomas Hegghammer "Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings," Studies in Conflict and Terrorism 27, no. 5 (September/October 2004): 355-75, analyze his 2003 policy paper which some believe inspired the Madrid bombing.
-
(2004)
Studies in Conflict and Terrorism
, vol.27
, Issue.5
, pp. 355-375
-
-
Lia, B.1
Hegghammer, T.2
-
51
-
-
0036477049
-
Trust and Vulnerability in Open Source Software
-
Analysts of encryption software have long argued that making the source code publicly available leads to more secure software because bugs are remedied which original developers may have missed. Scott A. Hissam, Daniel Plakosh, and Charles B. Weinstock, "Trust and Vulnerability in Open Source Software," IEE Proceedings-Software 149, no. 1 (2002): 47-51.
-
(2002)
IEE Proceedings-Software
, vol.149
, Issue.1
, pp. 47-51
-
-
Hissam, S.A.1
Plakosh, D.2
Weinstock, C.B.3
-
54
-
-
77951630223
-
-
note
-
In an online appendix we provide a formal game-theoretic analysis of these interactions-available at http://myweb.fsu.edu/dsiegel/Research.
-
-
-
-
55
-
-
77951629502
-
-
note
-
We use target and vulnerability interchangeably in this paper. Strictly speaking, targets are physical entities while vulnerabilities are gaps in defense that permit a successful attack on such entities. We use the words interchangeably, as an entity not vulnerable to attack is not really a target.
-
-
-
-
57
-
-
34547479862
-
Defending Against Terrorist Attacks with Limited Resources
-
Robert Powell, "Defending Against Terrorist Attacks with Limited Resources," American Political Science Review 101, no. 3 (August 2007): 527-41.
-
(2007)
American Political Science Review
, vol.101
, Issue.3 August
, pp. 527-541
-
-
Powell, R.1
-
58
-
-
77951649383
-
-
note
-
Formally, there is a range of parameter values over which releasing information is an equilibrium action.
-
-
-
-
59
-
-
77951650136
-
-
note
-
The appendix is available at http://myweb.fsu.edu/dsiegel/Research.
-
-
-
-
60
-
-
77951643792
-
-
note
-
Respondent 724229888.
-
-
-
-
61
-
-
77951627722
-
-
note
-
In February 2009, more than seven years into efforts to enhance information flow, local, state, and federal officials we surveyed continued to complain about inadequate sharing within the law enforcement and first-responder communities. Respondents 724215968, 724215641, 724214470, and 724212480.
-
-
-
-
62
-
-
0036319010
-
Financing Terrorism or Survival? Informal Finance and State Collapse in Somalia, and the U.S. War on Terrorism
-
Khalid M. Medani, "Financing Terrorism or Survival? Informal Finance and State Collapse in Somalia, and the U.S. War on Terrorism," Middle East Report 32, no. 2 (Summer 2002): 2-9.
-
(2002)
Middle East Report
, vol.32
, Issue.2 Summer
, pp. 2-9
-
-
Medani, K.M.1
-
63
-
-
2442602908
-
Education, Poverty and Terrorism: Is There a Causal Connection?
-
note
-
Releasing information can help correct misunderstandings that hinder counterterrorism efforts. For example, the frequent refrain that terrorists are irrational and motivated by religious fervor hinders government response. Law enforcement officials believing this line are less likely to focus attention on the secular middle-class individuals who make up the majority of terrorist operatives in some groups. See Alan B. Kreuger and Jitka Malečkova, "Education, Poverty and Terrorism: Is There a Causal Connection?" The Journal of Economic Perspectives 17, no. 4 (Autumn 2003): 119-44.
-
(2003)
The Journal of Economic Perspectives
, vol.17
, Issue.4 Autumn
, pp. 119-144
-
-
Kreuger, A.B.1
Malečkova, J.2
-
64
-
-
37849049635
-
Evidence About the Link Between Education, Poverty and Terrorism Among Palestinians
-
available at
-
Claude Berrebi, "Evidence About the Link Between Education, Poverty and Terrorism Among Palestinians," Peace Economics, Peace Science and Public Policy 13, no. 1 (2007), available at http://www.bepress.com/peps/vol13/iss1/2.
-
(2007)
Peace Economics, Peace Science and Public Policy
, vol.13
, Issue.1
-
-
Berrebi, C.1
-
65
-
-
84903667395
-
-
(Philadelphia: University of Pennsylvania Press)
-
Marc Sageman, Understanding Terror Networks (Philadelphia: University of Pennsylvania Press, 2004).
-
(2004)
Understanding Terror Networks
-
-
Sageman, M.1
-
66
-
-
77951641296
-
Research Note: Who Supports Terrorism? Insights from Fourteen Muslim Countries
-
January/February
-
Christine Fair and Bryan Shepherd, "Research Note: Who Supports Terrorism? Insights from Fourteen Muslim Countries," Case Studies in Conflict and Terrorism 29, no. 2 (January/February 2006).
-
(2006)
Case Studies in Conflict and Terrorism
, vol.29
, Issue.2
-
-
Fair, C.1
Shepherd, B.2
-
67
-
-
38349115273
-
Militant Recruitment in Pakistan: A New Look at the Militancy-Madrasah Connection
-
and C. Christine Fair, "Militant Recruitment in Pakistan: A New Look at the Militancy-Madrasah Connection," Asia Policy 1, no. 4 (Summer 2007).
-
(2007)
Asia Policy
, vol.1
, Issue.4 Summer
-
-
Fair, C.C.1
-
68
-
-
3042609702
-
What's Wrong with the Electric Grid
-
accessed at, note, 7 April 2006
-
In August 2003 the failure of one power line south of Cleveland, Ohio, led to the cascading failure of the regional power infrastructure, affecting fifty million people and causing four to ten billion dollars in economic losses in the United States alone. Eric J. Lerner, "What's Wrong with the Electric Grid," American Institute of Physics, accessed at http://www.aip.org/tip/INPHFA/vol-9/iss-5/p8.html, 2003, 7 April 2006.
-
(2003)
American Institute of Physics
-
-
Lerner, E.J.1
-
69
-
-
0003759607
-
-
Electric Information Agency, accessed at, 7 April 2006
-
and Electric Power Annual, 2003," Electric Information Agency, accessed at http://tonto.eia.doe.gov/FTPROOT/electricity/034803.pdf, 7 April 2006.
-
(2003)
Electric Power Annual
-
-
-
70
-
-
22244493924
-
Analyzing a Bioterror Attack on the Food Supply: The Case of Botulinum Toxin in Milk
-
Lawrence M. Wein and Yifan Liu, "Analyzing a Bioterror Attack on the Food Supply: The Case of Botulinum Toxin in Milk," Proceedings of the National Academy of Sciences 102, no. 28 (July 2005): 9,985-89.
-
(2005)
Proceedings of the National Academy of Sciences
, vol.102
, Issue.28 July
, pp. 9985-9989
-
-
Wein, L.M.1
Liu, Y.2
-
71
-
-
34247469657
-
Report Warns of Threat to Milk Supply: Release of Study Citing Vulnerability to Bioterrorism Attack Was Opposed by U.S. Officials
-
29 June
-
Rick Weiss, "Report Warns of Threat to Milk Supply: Release of Study Citing Vulnerability to Bioterrorism Attack Was Opposed by U.S. Officials," Washington Post, 29 June 2005, A08.
-
(2005)
Washington Post
-
-
Weiss, R.1
-
72
-
-
19644391137
-
Using Fingerprint Image Quality to Improve the Identification Performance of the U.S. Visitor and Immigrant Status Indicator Technology Program
-
Lawrence M. Wein and Manas Baveja, "Using Fingerprint Image Quality to Improve the Identification Performance of the U.S. Visitor and Immigrant Status Indicator Technology Program," Proceedings of the National Academy of Sciences 102, no. 21 (May 2005): 7,772-75.
-
(2005)
Proceedings of the National Academy of Sciences
, vol.102
, Issue.21 May
, pp. 7772-7775
-
-
Wein, L.M.1
Baveja, M.2
-
75
-
-
77951646041
-
-
paper presented at the annual meeting of the International Studies Association, (San Diego, CA, March)
-
For information on how genetic information with tremendous therapeutic potential also contains the necessary information for crafting racially targeted biological weapons, see Tonya Putnam, "Racial Weapons: An Essay on the Law, Ethics, and Politics of Biological Warfare in the Age of the Genome," paper presented at the annual meeting of the International Studies Association (San Diego, CA, March 2006).
-
(2006)
Racial Weapons: An Essay on the Law, Ethics, and Politics of Biological Warfare in the Age of the Genome
-
-
Putnam, T.1
-
76
-
-
0012411346
-
-
Government Accountability Office, note
-
Whether it does so depends on the nature of the vulnerability identified. Making information on the chemicals used in industrial facilities readily available can clearly help first responders. Making public information about which electrical lines to attack to cripple the power grid may seem less helpful. Such information might not help local law enforcement much because there are many points of attack for any particular line, but could help terrorists a great deal. However, what sharing such information might do is spur power companies to self-interested action to protect the grid, perhaps by building redundant capacity. Government Accountability Office, Information Sharing: Practices That Can Benefit Critical Infrastructure Protection.
-
Information Sharing: Practices That Can Benefit Critical Infrastructure Protection
-
-
-
77
-
-
77951624563
-
-
note
-
Respondent 724229888.
-
-
-
-
79
-
-
37349023743
-
-
Congressional Budget Office (CBO), (Washington, DC: The Congress of the United States)
-
Congressional Budget Office (CBO), Homeland Security and the Private Sector (Washington, DC: The Congress of the United States, 2004), 2-4.
-
(2004)
Homeland Security and the Private Sector
, pp. 2-4
-
-
-
80
-
-
77951627442
-
Potholes and Detours in the Road to Critical Infrastructure Protection Policy
-
Rudy Darken and Ted G. Lewis, "Potholes and Detours in the Road to Critical Infrastructure Protection Policy," Homeland Security Affairs 1, no. 2 (Fall 2005).
-
(2005)
Homeland Security Affairs
, vol.1
, Issue.2 Fall
-
-
Darken, R.1
Lewis, T.G.2
-
81
-
-
77951634325
-
-
note
-
In addition to the previous examples, we can think of New York City's tragic dependence on airline passenger screeners in Boston.
-
-
-
-
83
-
-
77951639430
-
Power Grid Aims for Backup Supplies
-
2 June
-
Leonard Anderson, "Power Grid Aims for Backup Supplies," Reuters, 2 June 2005.
-
(2005)
Reuters
-
-
Anderson, L.1
-
84
-
-
77951646934
-
-
note
-
CBO, Homeland Security and the Private Sector.
-
-
-
-
85
-
-
27744564816
-
The Challenge of Protecting Critical Infrastructure
-
note, accessed at, 6 April 2006
-
Public knowledge or heightened attention sometimes leads to temporary protective measures that last until private interests reassert themselves once the issue becomes less politically salient. Following a January 2004 train crash in South Carolina that released toxic gases killing nine people, Washington D.C. enacted a ban on the transportation of deadly chemicals along rail corridors passing close to the national capital area. See Philip Auerswald et al., "The Challenge of Protecting Critical Infrastructure," Issues in Science and Technology 22, no. 1 (Fall 2005), accessed at http://www.issues.org/22.1/auerswald.html, 6 April 2006.
-
(2005)
Issues in Science and Technology
, vol.22
, Issue.1 Fall
-
-
Auerswald, P.1
-
86
-
-
77951647146
-
Judge Upholds Hazmat Rail Ban
-
19 April
-
After several months of legal fights, the ban was overturned in court, although the city government continues to support a ban. See Carol D. Leonnig, "Judge Upholds Hazmat Rail Ban," Washington Post, 19 April 2005, B02.
-
(2005)
Washington Post
-
-
Leonnig, C.D.1
-
87
-
-
33747064115
-
Judge Demands To View Rail Plan D.C. Hazmat Cargo Ban At Issue in CSX Lawsuit
-
22 September
-
and Carol D. Leonnig, "Judge Demands To View Rail Plan D.C. Hazmat Cargo Ban At Issue in CSX Lawsuit," Washington Post, 22 September 2005, B01
-
(2005)
Washington Post
-
-
Leonnig, C.D.1
-
89
-
-
84926956200
-
Blackout a Reminder of Grid's Vulnerability to Terror
-
15 August
-
Antonio Regalado and Gary Fields, "Blackout a Reminder of Grid's Vulnerability to Terror," Wall Street Journal, 15 August 2003, A4.
-
(2003)
Wall Street Journal
-
-
Regalado, A.1
Fields, G.2
-
90
-
-
77951630667
-
We Must Face a Connected World's 'Butterfly Effect'
-
5 May
-
R. James Woolsey and Rachel Belton, "We Must Face a Connected World's "Butterfly Effect'," Los Angeles Times, 5 May 2004.
-
(2004)
Los Angeles Times
-
-
Woolsey, R.J.1
Belton, R.2
-
93
-
-
77951646498
-
-
note, 10 April 2006
-
See for example the detailed process for identifying critical infrastructure dependencies outlined in Washington State, Homeland Security Region 6 Critical Infrastructure Protection Plan, 2005, accessed at http://www.metrokc.gov/prepare/docs/Region6CIP, 10 April 2006.
-
(2005)
Homeland Security Region 6 Critical Infrastructure Protection Plan
-
-
-
97
-
-
77951639429
-
-
Appendix available at
-
Appendix available at http://myweb.fsu.edu/dsiegel/Research.
-
-
-
-
98
-
-
77951649152
-
-
note
-
Releasing such information might also allow for more effective evacuation and management plans, reducing post-attack casualties and thereby counteracting backlash.
-
-
-
-
99
-
-
77951644524
-
-
note
-
The Census Bureau similarly makes confidential census data available to outside researchers through the Center for Economic Studies.
-
-
-
-
100
-
-
77951636792
-
-
Chief Statistician, Bureau of Economic Analysis, 1 February
-
Dennis Fixler, Chief Statistician, Bureau of Economic Analysis, phone interview with Jacob Shapiro, 1 February 2008
-
(2008)
Phone Interview with Jacob Shapiro
-
-
Fixler, D.1
-
101
-
-
77951644837
-
-
note
-
The first draft of the White House report on Hurricane Katrina, for example, was written by a contractor.
-
-
-
-
102
-
-
77951634477
-
-
note
-
Neither condition was obtained, for example, in the case of the US-VISIT program whose managers had never considered that the system could be gamed in the ways Wein and Baveja identified and so never passed information on the system to outside analysts with the necessary expertise.
-
-
-
-
103
-
-
77951643082
-
-
note, (Washington, DC: Congressional Research Service, RL32631)
-
Debates over the utility of the National Asset Database reveal that uncertainties identified in John D. Moteff and Paul Parfomak, Critical Infrastructure and Key Assets: Definition and Identification (Washington, DC: Congressional Research Service, RL32631, 2004) about criticality have not been remedied as of 2006
-
(2004)
Critical Infrastructure and Key Assets: Definition and Identification
-
-
Moteff, J.D.1
Parfomak, P.2
-
106
-
-
77951627279
-
-
note
-
This argument is no different than that frequently applied to environmental degradation. Billions of dollars in cleanup and damages by Exxon after the Valdez spill may have led to increased safety measures in shipping, but these measures were not taken before the spill despite regulation, and twenty years later damage from the spill lingers.
-
-
-
-
110
-
-
77951650757
-
Group Says Test of Nuclear Plant's Security Was Too Easy
-
16 September, note
-
and Matthew L. Wald, "Group Says Test of Nuclear Plant's Security Was Too Easy," New York Times, 16 September 2003, A7. These two sources could be used to infer the number of attackers commercial nuclear plants are prepared to defend against but played a role in motivating stronger action by the NRC.
-
(2003)
New York Times
-
-
Wald, M.L.1
-
111
-
-
77951642222
-
-
Defense Science Board, (Washington, DC: Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics)
-
Defense Science Board, Report of the Defense Science Board Task Force on Critical Homeland Infrastructure Protection, (Washington, DC: Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics, 2007).
-
(2007)
Report of the Defense Science Board Task Force on Critical Homeland Infrastructure Protection
-
-
-
112
-
-
77951635690
-
-
note
-
Executive Order no. 13356, Federal Register 69, no. 169, 1 September 2004.
-
-
-
-
113
-
-
77951649012
-
-
note
-
Executive Order no. 13388, Federal Register 70, no. 207, 27 October 2005.
-
-
-
-
115
-
-
77951644243
-
-
note, (Washington, DC: The George Washington University)
-
The friction introduced by SBU labels should hardly be surprising given that the majority of federal agencies using various SBU controls do so based on internally generated guidelines that are often ambiguous as to what kinds of information qualify for specific controls, who has authority to apply those controls, and the rules for passing that information to others within the government. National Security Archive, PSEUDO-SECRETS: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information (Washington, DC: The George Washington University, 2006).
-
(2006)
PSEUDO-SECRETS: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information
-
-
-
118
-
-
77951628760
-
Homeland Security Information Network Criticized
-
note, 10 May
-
The great dissatisfaction with the Homeland Security Information Network (HSIN) provides another cautionary note on the difficulty of selective information sharing as per Lara Jakes Jordan, "Homeland Security Information Network Criticized," Washington Post, 10 May 2005, A06.
-
(2005)
Washington Post
-
-
Jordan, L.J.1
-
119
-
-
77951638001
-
-
note
-
Respondent 724216542.
-
-
-
-
120
-
-
77951635966
-
-
note
-
Respondent 724339460.
-
-
-
-
122
-
-
77951650399
-
-
note
-
The general failure of terrorist cells to identify truly innovative modes of attack-a few highsalience examples aside-supports this assumption.
-
-
-
-
123
-
-
77951626271
-
-
note
-
We formally derive the optimal stopping points and outcomes for T and G under both rules in Propositions 1 and 2 in the appendix available at http://myweb.fsu.edu/dsiegel/Research.
-
-
-
-
124
-
-
67650096042
-
-
Larry Grathwohl, (New Rochelle, NY: Arlington House), note
-
Larry Grathwohl in Larry Grathwohl and Frank Reagan, Bringing Down America (New Rochelle, NY: Arlington House, 1976), 143-44 describes a remarkably amateurish bomb design proposed by senior Weatherman William Ayers.
-
(1976)
Bringing Down America
, pp. 143-144
-
-
Grathwohl, L.1
Reagan, F.2
-
125
-
-
0002111057
-
-
(Scarborough, ON: HarperCollins Publishers Canada), note
-
Shane O'Doherty, The Volunteer: A Former IRA Man's True Story (Scarborough, ON: HarperCollins Publishers Canada, 1993) for example, provides a vivid description of the development of the Provisional Irish Republican Army's (PIRA) gelignite bombs.
-
(1993)
The Volunteer: A Former IRA Man's True Story
-
-
O'Doherty, S.1
-
127
-
-
36049023055
-
Allocating Defensive Resources with Private Information about Vulnerability
-
note
-
Robert Powell, "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review 101 (2007): 799-810 considers an aspect of information we do not, the fact that resource allocation itself can signal the level of vulnerability of a known site, but does not consider the more explicit forms of information that we do. In his model, informative signaling (in the form of a separating equilibrium) may sometimes be achieved if the more vulnerable sites are easier to defend on the margins.
-
(2007)
American Political Science Review
, vol.101
, pp. 799-810
-
-
Powell, R.1
-
128
-
-
38549098290
-
Balancing Terrorism and Natural Disasters-Defensive Strategy with Endogenous Attacker Effort
-
note
-
Though developed independently, our models also speak to some of the issues analyzed in Jun Zhuang and Vicki M. Bier, "Balancing Terrorism and Natural Disasters-Defensive Strategy with Endogenous Attacker Effort," Operations Research 55, no. 5 (September-October 2007): 976-91. Their main focus is on resource allocation decisions when terrorists choose a level of effort, rather than making a binary decision about whether or not to attack.
-
(2007)
Operations Research
, vol.55
, Issue.5 September-October
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
129
-
-
77951651938
-
-
note
-
We can think of these as the sites that G found during the earlier search process.
-
-
-
-
130
-
-
77951630794
-
-
note
-
That is, for those sites that it found during its search process.
-
-
-
-
131
-
-
77951644998
-
-
note, (Washington, DC: Brookings Institution)
-
This does not, of course, preclude T from repeatedly attacking a well-known vulnerability, such as airliners, if it views this as a particularly high-value target or if G is unable to defend this vulnerability sufficiently well despite its being common knowledge as per Jeremy Shapiro, Managing Homeland Security: Develop a Threat Based Strategy (Washington, DC: Brookings Institution, 2008). The important comparison for T is the expected utility derived from an attack on each target, which depends on both the target's value and its probability of being attacked successfully.
-
(2008)
Managing Homeland Security: Develop a Threat Based Strategy
-
-
Shapiro, J.1
-
132
-
-
77951646788
-
-
note
-
Emergency Planning & Community Right-to-Know Act, P.L. 99-499, 42 USC 11001-11050.
-
-
-
-
136
-
-
39749178959
-
Detection of Neutron Sources in Cargo Containers
-
note
-
See, for example, J. I. Katz, "Detection of Neutron Sources in Cargo Containers" Science and Global Security 14, nos. 2 and 3 (December 2006): 145-49, which suggests an alternative screening technique that remedies challenges previously identified by physicists working for the U.S. government.
-
(2006)
Science and Global Security
, vol.14
, Issue.2-3 December
, pp. 145-149
-
-
Katz, J.I.1
-
137
-
-
77951651487
-
-
Appendix available at
-
Appendix available at http://myweb.fsu.edu/dsiegel/Research.
-
-
-
-
140
-
-
77951649847
-
-
note
-
We thank the editors for suggesting this possibility and pushing us to address it.
-
-
-
-
141
-
-
68749092256
-
-
note, College of William and Mary, Williamsburg, VA, available at, received a 42 percent response rate from potential U.S. respondents
-
For example, the IR Scholar Survey detailed in Richard Jordan et al., "One Discipline or Many? TRIP Survey of International Relations Faculty in Ten Countries," 2009, College of William and Mary, Williamsburg, VA, available at http://irtheoryandpractice.wm.edu/projects/trip/Final Trip Report 2009.pdf, received a 42 percent response rate from potential U.S. respondents.
-
(2009)
One Discipline or Many? TRIP Survey of International Relations Faculty in Ten Countries
-
-
-
142
-
-
77951624398
-
-
note
-
Respondent 723214546.
-
-
-
-
143
-
-
77951646646
-
-
note
-
Respondent 724627525.
-
-
-
-
144
-
-
77951638445
-
-
note
-
Respondent 724716301.
-
-
-
-
145
-
-
77951627443
-
Waxman to stir debate with transparency subcommittee
-
note, 4 January
-
Recognizing the increased complexity of information policy, the 110th Congress created a subcommittee explicitly charged with examining how America guards and shares information. See Alexander Bolton, "Waxman to stir debate with transparency subcommittee," The Hill, 4 January 2007.
-
(2007)
The Hill
-
-
Bolton, A.1
-
146
-
-
0041771284
-
What Do We Know about the Substitution Effect in Transnational Terrorism
-
note, In Andrew Silke and G. Ilardi ed., (Ilford, UK: Frank Cass)
-
As discussed in the section "Strategic Information Release," this does not imply that terrorists will never rationally target well-defended targets, such as airliners, if they are also of particularly high value. Walter Enders and Todd Sandler, "What Do We Know about the Substitution Effect in Transnational Terrorism." In Andrew Silke and G. Ilardi ed., Researching Terrorism: Trends, Achievements, Failures (Ilford, UK: Frank Cass, 2004).
-
(2004)
Researching Terrorism: Trends, Achievements, Failures
-
-
Enders, W.1
Sandler, T.2
-
147
-
-
77951644244
-
-
note
-
Our findings thus match and deepen the intuition embedded in CBO, Homeland Security and the Private Sector and Flynn and Prieto, Neglected Defense that encouraging openness increases the chances that private companies will undertake the appropriate level of counterterrorism protection.
-
-
-
-
148
-
-
77951640430
-
-
note
-
Respondent 724452379.
-
-
-
|