메뉴 건너뛰기




Volumn 19, Issue 1, 2010, Pages 66-98

Is this paper dangerous? Balancing secrecy and openness in counterterrorism

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77951635530     PISSN: 09636412     EISSN: 15561852     Source Type: Journal    
DOI: 10.1080/09636410903546483     Document Type: Article
Times cited : (28)

References (148)
  • 7
    • 77951651040 scopus 로고    scopus 로고
    • note
    • Only five report it has decreased.
  • 8
    • 77951651643 scopus 로고    scopus 로고
    • Information Sharing Environment Implementation Plan
    • accessed at, March 2007
    • The fixes embodied in the Information Sharing Environment (ISE) established under Executive Order 13388 focus on more effectively sharing information within government and pay short shrift to the value of sharing information with the public more generally. Thomas E. McNamara, "Information Sharing Environment Implementation Plan," Information Sharing Environment, accessed at http://www.ise.gov/docs/ise-impplan-200611.pdf, 24, 94, 8 March 2007.
    • Information Sharing Environment
    • McNamara, T.E.1
  • 10
    • 77951625015 scopus 로고    scopus 로고
    • FOIA Guide, 2004 Edition
    • accessed at, 7 April 2006
    • "FOIA Guide, 2004 Edition," Exemption One, accessed at http://www.usdoj.gov/oip/foiact.htm, 7 April 2006.
    • Exemption One
  • 11
    • 77951629806 scopus 로고    scopus 로고
    • In the 109th Congress, for example, bills designed to strengthen the FOIA and to reestablish the principle that agencies should err on the side of openness died in committee in both the House and Senate. See Restore Open Government Act of 2005, HR 2331, 109th Cong., 1st sess., available at
    • In the 109th Congress, for example, bills designed to strengthen the FOIA and to reestablish the principle that agencies should err on the side of openness died in committee in both the House and Senate. See Restore Open Government Act of 2005, HR 2331, 109th Cong., 1st sess., available at http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.02331.
  • 12
    • 77951647769 scopus 로고    scopus 로고
    • Open Government Act of 2005, S 394, 109th Cong., 1st sess., available at
    • Open Government Act of 2005, S 394, 109th Cong., 1st sess., available at http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.00394.
  • 14
    • 77951627591 scopus 로고    scopus 로고
    • Ensuring the Consent of the Governed: America's Commitment to Freedom of Information and Openness in Government
    • (Fall), note
    • and John Cornyn, "Ensuring the Consent of the Governed: America's Commitment to Freedom of Information and Openness in Government," LBJ Journal of Public Affairs (Fall 2004). Three bills designed to encourage openness passed the House in the 110th Congress in July 2008-Reducing Over-Classification Act of 2007, HR 4806.
    • (2004) LBJ Journal of Public Affairs
    • Cornyn, J.1
  • 15
    • 77951651196 scopus 로고    scopus 로고
    • note
    • Improving Public Access to Documents Act, HR 6193.
  • 16
    • 77951646184 scopus 로고    scopus 로고
    • note
    • and Reducing Information Control Designations Act, HR 6576-but were not passed into law.
  • 17
    • 84970370566 scopus 로고
    • Secrecy and International Relations
    • David N. Gibbs, "Secrecy and International Relations," Journal of Peace Research 32, no. 2 (1995): 213-2-8.
    • (1995) Journal of Peace Research , vol.32 , Issue.2 , pp. 213-218
    • Gibbs, D.N.1
  • 18
    • 85050840145 scopus 로고
    • Secrecy in American Bureaucracy
    • and Francis E. Rourke, "Secrecy in American Bureaucracy," Political Science Quarterly 72 (1957): 540-64.
    • (1957) Political Science Quarterly , vol.72 , pp. 540-564
    • Rourke, F.E.1
  • 20
    • 84976921726 scopus 로고
    • Freedom of Information and National Security
    • Morton H. Halperin, "Freedom of Information and National Security," Journal of Peace Research 20, no. 1 (1983): 1-4.
    • (1983) Journal of Peace Research , vol.20 , Issue.1 , pp. 1-4
    • Halperin, M.H.1
  • 21
    • 77951629674 scopus 로고
    • Accessibility of Government-Sponsored Research in International Studies
    • and Cyril E. Black, "Accessibility of Government-Sponsored Research in International Studies," International Studies Quarterly 14 (1970): 320-24.
    • (1970) International Studies Quarterly , vol.14 , pp. 320-324
    • Black, C.E.1
  • 22
    • 77951631799 scopus 로고    scopus 로고
    • note
    • Searching article abstracts and titles in the Social Sciences Citation Index for the words "government" and "secrecy" returns only seven articles in academic political science journals between 1973 and 2007, none of which analyze the practical trade-off between openness and secrecy. Index available at http://scientific.thomsonreuters.com/cgi-bin/jrnlst/jlresults.cgi?PC=J&SC=UU.
  • 23
    • 0040213333 scopus 로고    scopus 로고
    • Democratic Secrecy
    • Dennis F. Thompson, "Democratic Secrecy," Political Science Quarterly 114, no. 2 (Summer 1999): 181-93.
    • (1999) Political Science Quarterly , vol.114 , Issue.2 Summer , pp. 181-193
    • Thompson, D.F.1
  • 25
    • 77951647282 scopus 로고    scopus 로고
    • National Security vs. Public Disclosure: The War on Terrorism's Implications Upon Federal Emergency Planning and Right to Know Laws
    • The Federalist Society (December)
    • Evan M. Slavitt and Gregory D. Cote, "National Security vs. Public Disclosure: The War on Terrorism's Implications Upon Federal Emergency Planning and Right to Know Laws," National Security White Papers, The Federalist Society (December 2003).
    • (2003) National Security White Papers
    • Slavitt, E.M.1    Cote, G.D.2
  • 26
    • 33749575656 scopus 로고    scopus 로고
    • The Age of Missing Information
    • 27 March, accessed at, on 12 October 2009
    • Steven Aftergood, "The Age of Missing Information," Slate, 27 March 2005, accessed at http://www.slate.com/id/2114963/ on 12 October 2009.
    • (2005) Slate
    • Aftergood, S.1
  • 27
    • 77951637396 scopus 로고    scopus 로고
    • note
    • and Lisa Graves, Senior Counsel for Legislative Strategy, American Civil Liberties Union, Testimony on S 394, the "OPEN Government Act," before the Terrorism, Technology, and Homeland Security Subcommittee of the United States Senate Committee of the Judiciary, on 15 March 2005.
  • 38
    • 77951642480 scopus 로고    scopus 로고
    • note
    • This quote and subsequent quotes are from a survey of 186 U.S. federal, state, local, and industry homeland security officials. We identify sources by respondent number to maintain anonymity. The survey is described in the section "Secrecy and Openness in Practice." Respondent 725732258.
  • 40
    • 66049130744 scopus 로고    scopus 로고
    • Jacob N. Shapiro and Clinton Watts, ed., (West Point: Combating Terrorism Center)
    • Jacob N. Shapiro and Clinton Watts, ed., Al-Qa'ida's (Mis)Adventures in the Horn of Africa (West Point: Combating Terrorism Center, 2007).
    • (2007) Al-Qa'ida's (Mis)Adventures in the Horn of Africa
  • 48
    • 61149627926 scopus 로고    scopus 로고
    • For a citation-mapping of jihadi public intellectuals, see, (West Point, NY: Combatting Terrorism Center). The most well-known of these public intellectuals is Abu Musab al-Suri
    • For a citation-mapping of jihadi public intellectuals, see William McCants and Jarret Brachman, Militant Ideology Atlas (West Point, NY: Combatting Terrorism Center, 2006). The most well-known of these public intellectuals is Abu Musab al-Suri.
    • (2006) Militant Ideology Atlas
    • McCants, W.1    Brachman, J.2
  • 49
    • 33845658633 scopus 로고    scopus 로고
    • Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings
    • September/October, note
    • Brynjar Lia and Thomas Hegghammer "Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings," Studies in Conflict and Terrorism 27, no. 5 (September/October 2004): 355-75, analyze his 2003 policy paper which some believe inspired the Madrid bombing.
    • (2004) Studies in Conflict and Terrorism , vol.27 , Issue.5 , pp. 355-375
    • Lia, B.1    Hegghammer, T.2
  • 51
    • 0036477049 scopus 로고    scopus 로고
    • Trust and Vulnerability in Open Source Software
    • Analysts of encryption software have long argued that making the source code publicly available leads to more secure software because bugs are remedied which original developers may have missed. Scott A. Hissam, Daniel Plakosh, and Charles B. Weinstock, "Trust and Vulnerability in Open Source Software," IEE Proceedings-Software 149, no. 1 (2002): 47-51.
    • (2002) IEE Proceedings-Software , vol.149 , Issue.1 , pp. 47-51
    • Hissam, S.A.1    Plakosh, D.2    Weinstock, C.B.3
  • 52
  • 54
    • 77951630223 scopus 로고    scopus 로고
    • note
    • In an online appendix we provide a formal game-theoretic analysis of these interactions-available at http://myweb.fsu.edu/dsiegel/Research.
  • 55
    • 77951629502 scopus 로고    scopus 로고
    • note
    • We use target and vulnerability interchangeably in this paper. Strictly speaking, targets are physical entities while vulnerabilities are gaps in defense that permit a successful attack on such entities. We use the words interchangeably, as an entity not vulnerable to attack is not really a target.
  • 57
    • 34547479862 scopus 로고    scopus 로고
    • Defending Against Terrorist Attacks with Limited Resources
    • Robert Powell, "Defending Against Terrorist Attacks with Limited Resources," American Political Science Review 101, no. 3 (August 2007): 527-41.
    • (2007) American Political Science Review , vol.101 , Issue.3 August , pp. 527-541
    • Powell, R.1
  • 58
    • 77951649383 scopus 로고    scopus 로고
    • note
    • Formally, there is a range of parameter values over which releasing information is an equilibrium action.
  • 59
    • 77951650136 scopus 로고    scopus 로고
    • note
    • The appendix is available at http://myweb.fsu.edu/dsiegel/Research.
  • 60
    • 77951643792 scopus 로고    scopus 로고
    • note
    • Respondent 724229888.
  • 61
    • 77951627722 scopus 로고    scopus 로고
    • note
    • In February 2009, more than seven years into efforts to enhance information flow, local, state, and federal officials we surveyed continued to complain about inadequate sharing within the law enforcement and first-responder communities. Respondents 724215968, 724215641, 724214470, and 724212480.
  • 62
    • 0036319010 scopus 로고    scopus 로고
    • Financing Terrorism or Survival? Informal Finance and State Collapse in Somalia, and the U.S. War on Terrorism
    • Khalid M. Medani, "Financing Terrorism or Survival? Informal Finance and State Collapse in Somalia, and the U.S. War on Terrorism," Middle East Report 32, no. 2 (Summer 2002): 2-9.
    • (2002) Middle East Report , vol.32 , Issue.2 Summer , pp. 2-9
    • Medani, K.M.1
  • 63
    • 2442602908 scopus 로고    scopus 로고
    • Education, Poverty and Terrorism: Is There a Causal Connection?
    • note
    • Releasing information can help correct misunderstandings that hinder counterterrorism efforts. For example, the frequent refrain that terrorists are irrational and motivated by religious fervor hinders government response. Law enforcement officials believing this line are less likely to focus attention on the secular middle-class individuals who make up the majority of terrorist operatives in some groups. See Alan B. Kreuger and Jitka Malečkova, "Education, Poverty and Terrorism: Is There a Causal Connection?" The Journal of Economic Perspectives 17, no. 4 (Autumn 2003): 119-44.
    • (2003) The Journal of Economic Perspectives , vol.17 , Issue.4 Autumn , pp. 119-144
    • Kreuger, A.B.1    Malečkova, J.2
  • 64
    • 37849049635 scopus 로고    scopus 로고
    • Evidence About the Link Between Education, Poverty and Terrorism Among Palestinians
    • available at
    • Claude Berrebi, "Evidence About the Link Between Education, Poverty and Terrorism Among Palestinians," Peace Economics, Peace Science and Public Policy 13, no. 1 (2007), available at http://www.bepress.com/peps/vol13/iss1/2.
    • (2007) Peace Economics, Peace Science and Public Policy , vol.13 , Issue.1
    • Berrebi, C.1
  • 65
    • 84903667395 scopus 로고    scopus 로고
    • (Philadelphia: University of Pennsylvania Press)
    • Marc Sageman, Understanding Terror Networks (Philadelphia: University of Pennsylvania Press, 2004).
    • (2004) Understanding Terror Networks
    • Sageman, M.1
  • 66
    • 77951641296 scopus 로고    scopus 로고
    • Research Note: Who Supports Terrorism? Insights from Fourteen Muslim Countries
    • January/February
    • Christine Fair and Bryan Shepherd, "Research Note: Who Supports Terrorism? Insights from Fourteen Muslim Countries," Case Studies in Conflict and Terrorism 29, no. 2 (January/February 2006).
    • (2006) Case Studies in Conflict and Terrorism , vol.29 , Issue.2
    • Fair, C.1    Shepherd, B.2
  • 67
    • 38349115273 scopus 로고    scopus 로고
    • Militant Recruitment in Pakistan: A New Look at the Militancy-Madrasah Connection
    • and C. Christine Fair, "Militant Recruitment in Pakistan: A New Look at the Militancy-Madrasah Connection," Asia Policy 1, no. 4 (Summer 2007).
    • (2007) Asia Policy , vol.1 , Issue.4 Summer
    • Fair, C.C.1
  • 68
    • 3042609702 scopus 로고    scopus 로고
    • What's Wrong with the Electric Grid
    • accessed at, note, 7 April 2006
    • In August 2003 the failure of one power line south of Cleveland, Ohio, led to the cascading failure of the regional power infrastructure, affecting fifty million people and causing four to ten billion dollars in economic losses in the United States alone. Eric J. Lerner, "What's Wrong with the Electric Grid," American Institute of Physics, accessed at http://www.aip.org/tip/INPHFA/vol-9/iss-5/p8.html, 2003, 7 April 2006.
    • (2003) American Institute of Physics
    • Lerner, E.J.1
  • 69
    • 0003759607 scopus 로고    scopus 로고
    • Electric Information Agency, accessed at, 7 April 2006
    • and Electric Power Annual, 2003," Electric Information Agency, accessed at http://tonto.eia.doe.gov/FTPROOT/electricity/034803.pdf, 7 April 2006.
    • (2003) Electric Power Annual
  • 70
    • 22244493924 scopus 로고    scopus 로고
    • Analyzing a Bioterror Attack on the Food Supply: The Case of Botulinum Toxin in Milk
    • Lawrence M. Wein and Yifan Liu, "Analyzing a Bioterror Attack on the Food Supply: The Case of Botulinum Toxin in Milk," Proceedings of the National Academy of Sciences 102, no. 28 (July 2005): 9,985-89.
    • (2005) Proceedings of the National Academy of Sciences , vol.102 , Issue.28 July , pp. 9985-9989
    • Wein, L.M.1    Liu, Y.2
  • 71
    • 34247469657 scopus 로고    scopus 로고
    • Report Warns of Threat to Milk Supply: Release of Study Citing Vulnerability to Bioterrorism Attack Was Opposed by U.S. Officials
    • 29 June
    • Rick Weiss, "Report Warns of Threat to Milk Supply: Release of Study Citing Vulnerability to Bioterrorism Attack Was Opposed by U.S. Officials," Washington Post, 29 June 2005, A08.
    • (2005) Washington Post
    • Weiss, R.1
  • 72
    • 19644391137 scopus 로고    scopus 로고
    • Using Fingerprint Image Quality to Improve the Identification Performance of the U.S. Visitor and Immigrant Status Indicator Technology Program
    • Lawrence M. Wein and Manas Baveja, "Using Fingerprint Image Quality to Improve the Identification Performance of the U.S. Visitor and Immigrant Status Indicator Technology Program," Proceedings of the National Academy of Sciences 102, no. 21 (May 2005): 7,772-75.
    • (2005) Proceedings of the National Academy of Sciences , vol.102 , Issue.21 May , pp. 7772-7775
    • Wein, L.M.1    Baveja, M.2
  • 75
    • 77951646041 scopus 로고    scopus 로고
    • paper presented at the annual meeting of the International Studies Association, (San Diego, CA, March)
    • For information on how genetic information with tremendous therapeutic potential also contains the necessary information for crafting racially targeted biological weapons, see Tonya Putnam, "Racial Weapons: An Essay on the Law, Ethics, and Politics of Biological Warfare in the Age of the Genome," paper presented at the annual meeting of the International Studies Association (San Diego, CA, March 2006).
    • (2006) Racial Weapons: An Essay on the Law, Ethics, and Politics of Biological Warfare in the Age of the Genome
    • Putnam, T.1
  • 76
    • 0012411346 scopus 로고    scopus 로고
    • Government Accountability Office, note
    • Whether it does so depends on the nature of the vulnerability identified. Making information on the chemicals used in industrial facilities readily available can clearly help first responders. Making public information about which electrical lines to attack to cripple the power grid may seem less helpful. Such information might not help local law enforcement much because there are many points of attack for any particular line, but could help terrorists a great deal. However, what sharing such information might do is spur power companies to self-interested action to protect the grid, perhaps by building redundant capacity. Government Accountability Office, Information Sharing: Practices That Can Benefit Critical Infrastructure Protection.
    • Information Sharing: Practices That Can Benefit Critical Infrastructure Protection
  • 77
    • 77951624563 scopus 로고    scopus 로고
    • note
    • Respondent 724229888.
  • 79
    • 37349023743 scopus 로고    scopus 로고
    • Congressional Budget Office (CBO), (Washington, DC: The Congress of the United States)
    • Congressional Budget Office (CBO), Homeland Security and the Private Sector (Washington, DC: The Congress of the United States, 2004), 2-4.
    • (2004) Homeland Security and the Private Sector , pp. 2-4
  • 80
    • 77951627442 scopus 로고    scopus 로고
    • Potholes and Detours in the Road to Critical Infrastructure Protection Policy
    • Rudy Darken and Ted G. Lewis, "Potholes and Detours in the Road to Critical Infrastructure Protection Policy," Homeland Security Affairs 1, no. 2 (Fall 2005).
    • (2005) Homeland Security Affairs , vol.1 , Issue.2 Fall
    • Darken, R.1    Lewis, T.G.2
  • 81
    • 77951634325 scopus 로고    scopus 로고
    • note
    • In addition to the previous examples, we can think of New York City's tragic dependence on airline passenger screeners in Boston.
  • 83
    • 77951639430 scopus 로고    scopus 로고
    • Power Grid Aims for Backup Supplies
    • 2 June
    • Leonard Anderson, "Power Grid Aims for Backup Supplies," Reuters, 2 June 2005.
    • (2005) Reuters
    • Anderson, L.1
  • 84
    • 77951646934 scopus 로고    scopus 로고
    • note
    • CBO, Homeland Security and the Private Sector.
  • 85
    • 27744564816 scopus 로고    scopus 로고
    • The Challenge of Protecting Critical Infrastructure
    • note, accessed at, 6 April 2006
    • Public knowledge or heightened attention sometimes leads to temporary protective measures that last until private interests reassert themselves once the issue becomes less politically salient. Following a January 2004 train crash in South Carolina that released toxic gases killing nine people, Washington D.C. enacted a ban on the transportation of deadly chemicals along rail corridors passing close to the national capital area. See Philip Auerswald et al., "The Challenge of Protecting Critical Infrastructure," Issues in Science and Technology 22, no. 1 (Fall 2005), accessed at http://www.issues.org/22.1/auerswald.html, 6 April 2006.
    • (2005) Issues in Science and Technology , vol.22 , Issue.1 Fall
    • Auerswald, P.1
  • 86
    • 77951647146 scopus 로고    scopus 로고
    • Judge Upholds Hazmat Rail Ban
    • 19 April
    • After several months of legal fights, the ban was overturned in court, although the city government continues to support a ban. See Carol D. Leonnig, "Judge Upholds Hazmat Rail Ban," Washington Post, 19 April 2005, B02.
    • (2005) Washington Post
    • Leonnig, C.D.1
  • 87
    • 33747064115 scopus 로고    scopus 로고
    • Judge Demands To View Rail Plan D.C. Hazmat Cargo Ban At Issue in CSX Lawsuit
    • 22 September
    • and Carol D. Leonnig, "Judge Demands To View Rail Plan D.C. Hazmat Cargo Ban At Issue in CSX Lawsuit," Washington Post, 22 September 2005, B01
    • (2005) Washington Post
    • Leonnig, C.D.1
  • 89
    • 84926956200 scopus 로고    scopus 로고
    • Blackout a Reminder of Grid's Vulnerability to Terror
    • 15 August
    • Antonio Regalado and Gary Fields, "Blackout a Reminder of Grid's Vulnerability to Terror," Wall Street Journal, 15 August 2003, A4.
    • (2003) Wall Street Journal
    • Regalado, A.1    Fields, G.2
  • 90
    • 77951630667 scopus 로고    scopus 로고
    • We Must Face a Connected World's 'Butterfly Effect'
    • 5 May
    • R. James Woolsey and Rachel Belton, "We Must Face a Connected World's "Butterfly Effect'," Los Angeles Times, 5 May 2004.
    • (2004) Los Angeles Times
    • Woolsey, R.J.1    Belton, R.2
  • 93
    • 77951646498 scopus 로고    scopus 로고
    • note, 10 April 2006
    • See for example the detailed process for identifying critical infrastructure dependencies outlined in Washington State, Homeland Security Region 6 Critical Infrastructure Protection Plan, 2005, accessed at http://www.metrokc.gov/prepare/docs/Region6CIP, 10 April 2006.
    • (2005) Homeland Security Region 6 Critical Infrastructure Protection Plan
  • 95
  • 97
    • 77951639429 scopus 로고    scopus 로고
    • Appendix available at
    • Appendix available at http://myweb.fsu.edu/dsiegel/Research.
  • 98
    • 77951649152 scopus 로고    scopus 로고
    • note
    • Releasing such information might also allow for more effective evacuation and management plans, reducing post-attack casualties and thereby counteracting backlash.
  • 99
    • 77951644524 scopus 로고    scopus 로고
    • note
    • The Census Bureau similarly makes confidential census data available to outside researchers through the Center for Economic Studies.
  • 100
    • 77951636792 scopus 로고    scopus 로고
    • Chief Statistician, Bureau of Economic Analysis, 1 February
    • Dennis Fixler, Chief Statistician, Bureau of Economic Analysis, phone interview with Jacob Shapiro, 1 February 2008
    • (2008) Phone Interview with Jacob Shapiro
    • Fixler, D.1
  • 101
    • 77951644837 scopus 로고    scopus 로고
    • note
    • The first draft of the White House report on Hurricane Katrina, for example, was written by a contractor.
  • 102
    • 77951634477 scopus 로고    scopus 로고
    • note
    • Neither condition was obtained, for example, in the case of the US-VISIT program whose managers had never considered that the system could be gamed in the ways Wein and Baveja identified and so never passed information on the system to outside analysts with the necessary expertise.
  • 103
    • 77951643082 scopus 로고    scopus 로고
    • note, (Washington, DC: Congressional Research Service, RL32631)
    • Debates over the utility of the National Asset Database reveal that uncertainties identified in John D. Moteff and Paul Parfomak, Critical Infrastructure and Key Assets: Definition and Identification (Washington, DC: Congressional Research Service, RL32631, 2004) about criticality have not been remedied as of 2006
    • (2004) Critical Infrastructure and Key Assets: Definition and Identification
    • Moteff, J.D.1    Parfomak, P.2
  • 105
  • 106
    • 77951627279 scopus 로고    scopus 로고
    • note
    • This argument is no different than that frequently applied to environmental degradation. Billions of dollars in cleanup and damages by Exxon after the Valdez spill may have led to increased safety measures in shipping, but these measures were not taken before the spill despite regulation, and twenty years later damage from the spill lingers.
  • 110
    • 77951650757 scopus 로고    scopus 로고
    • Group Says Test of Nuclear Plant's Security Was Too Easy
    • 16 September, note
    • and Matthew L. Wald, "Group Says Test of Nuclear Plant's Security Was Too Easy," New York Times, 16 September 2003, A7. These two sources could be used to infer the number of attackers commercial nuclear plants are prepared to defend against but played a role in motivating stronger action by the NRC.
    • (2003) New York Times
    • Wald, M.L.1
  • 111
  • 112
    • 77951635690 scopus 로고    scopus 로고
    • note
    • Executive Order no. 13356, Federal Register 69, no. 169, 1 September 2004.
  • 113
    • 77951649012 scopus 로고    scopus 로고
    • note
    • Executive Order no. 13388, Federal Register 70, no. 207, 27 October 2005.
  • 115
    • 77951644243 scopus 로고    scopus 로고
    • note, (Washington, DC: The George Washington University)
    • The friction introduced by SBU labels should hardly be surprising given that the majority of federal agencies using various SBU controls do so based on internally generated guidelines that are often ambiguous as to what kinds of information qualify for specific controls, who has authority to apply those controls, and the rules for passing that information to others within the government. National Security Archive, PSEUDO-SECRETS: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information (Washington, DC: The George Washington University, 2006).
    • (2006) PSEUDO-SECRETS: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information
  • 118
    • 77951628760 scopus 로고    scopus 로고
    • Homeland Security Information Network Criticized
    • note, 10 May
    • The great dissatisfaction with the Homeland Security Information Network (HSIN) provides another cautionary note on the difficulty of selective information sharing as per Lara Jakes Jordan, "Homeland Security Information Network Criticized," Washington Post, 10 May 2005, A06.
    • (2005) Washington Post
    • Jordan, L.J.1
  • 119
    • 77951638001 scopus 로고    scopus 로고
    • note
    • Respondent 724216542.
  • 120
    • 77951635966 scopus 로고    scopus 로고
    • note
    • Respondent 724339460.
  • 122
    • 77951650399 scopus 로고    scopus 로고
    • note
    • The general failure of terrorist cells to identify truly innovative modes of attack-a few highsalience examples aside-supports this assumption.
  • 123
    • 77951626271 scopus 로고    scopus 로고
    • note
    • We formally derive the optimal stopping points and outcomes for T and G under both rules in Propositions 1 and 2 in the appendix available at http://myweb.fsu.edu/dsiegel/Research.
  • 124
    • 67650096042 scopus 로고
    • Larry Grathwohl, (New Rochelle, NY: Arlington House), note
    • Larry Grathwohl in Larry Grathwohl and Frank Reagan, Bringing Down America (New Rochelle, NY: Arlington House, 1976), 143-44 describes a remarkably amateurish bomb design proposed by senior Weatherman William Ayers.
    • (1976) Bringing Down America , pp. 143-144
    • Grathwohl, L.1    Reagan, F.2
  • 125
    • 0002111057 scopus 로고
    • (Scarborough, ON: HarperCollins Publishers Canada), note
    • Shane O'Doherty, The Volunteer: A Former IRA Man's True Story (Scarborough, ON: HarperCollins Publishers Canada, 1993) for example, provides a vivid description of the development of the Provisional Irish Republican Army's (PIRA) gelignite bombs.
    • (1993) The Volunteer: A Former IRA Man's True Story
    • O'Doherty, S.1
  • 127
    • 36049023055 scopus 로고    scopus 로고
    • Allocating Defensive Resources with Private Information about Vulnerability
    • note
    • Robert Powell, "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review 101 (2007): 799-810 considers an aspect of information we do not, the fact that resource allocation itself can signal the level of vulnerability of a known site, but does not consider the more explicit forms of information that we do. In his model, informative signaling (in the form of a separating equilibrium) may sometimes be achieved if the more vulnerable sites are easier to defend on the margins.
    • (2007) American Political Science Review , vol.101 , pp. 799-810
    • Powell, R.1
  • 128
    • 38549098290 scopus 로고    scopus 로고
    • Balancing Terrorism and Natural Disasters-Defensive Strategy with Endogenous Attacker Effort
    • note
    • Though developed independently, our models also speak to some of the issues analyzed in Jun Zhuang and Vicki M. Bier, "Balancing Terrorism and Natural Disasters-Defensive Strategy with Endogenous Attacker Effort," Operations Research 55, no. 5 (September-October 2007): 976-91. Their main focus is on resource allocation decisions when terrorists choose a level of effort, rather than making a binary decision about whether or not to attack.
    • (2007) Operations Research , vol.55 , Issue.5 September-October , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 129
    • 77951651938 scopus 로고    scopus 로고
    • note
    • We can think of these as the sites that G found during the earlier search process.
  • 130
    • 77951630794 scopus 로고    scopus 로고
    • note
    • That is, for those sites that it found during its search process.
  • 131
    • 77951644998 scopus 로고    scopus 로고
    • note, (Washington, DC: Brookings Institution)
    • This does not, of course, preclude T from repeatedly attacking a well-known vulnerability, such as airliners, if it views this as a particularly high-value target or if G is unable to defend this vulnerability sufficiently well despite its being common knowledge as per Jeremy Shapiro, Managing Homeland Security: Develop a Threat Based Strategy (Washington, DC: Brookings Institution, 2008). The important comparison for T is the expected utility derived from an attack on each target, which depends on both the target's value and its probability of being attacked successfully.
    • (2008) Managing Homeland Security: Develop a Threat Based Strategy
    • Shapiro, J.1
  • 132
    • 77951646788 scopus 로고    scopus 로고
    • note
    • Emergency Planning & Community Right-to-Know Act, P.L. 99-499, 42 USC 11001-11050.
  • 136
    • 39749178959 scopus 로고    scopus 로고
    • Detection of Neutron Sources in Cargo Containers
    • note
    • See, for example, J. I. Katz, "Detection of Neutron Sources in Cargo Containers" Science and Global Security 14, nos. 2 and 3 (December 2006): 145-49, which suggests an alternative screening technique that remedies challenges previously identified by physicists working for the U.S. government.
    • (2006) Science and Global Security , vol.14 , Issue.2-3 December , pp. 145-149
    • Katz, J.I.1
  • 137
    • 77951651487 scopus 로고    scopus 로고
    • Appendix available at
    • Appendix available at http://myweb.fsu.edu/dsiegel/Research.
  • 140
    • 77951649847 scopus 로고    scopus 로고
    • note
    • We thank the editors for suggesting this possibility and pushing us to address it.
  • 141
    • 68749092256 scopus 로고    scopus 로고
    • note, College of William and Mary, Williamsburg, VA, available at, received a 42 percent response rate from potential U.S. respondents
    • For example, the IR Scholar Survey detailed in Richard Jordan et al., "One Discipline or Many? TRIP Survey of International Relations Faculty in Ten Countries," 2009, College of William and Mary, Williamsburg, VA, available at http://irtheoryandpractice.wm.edu/projects/trip/Final Trip Report 2009.pdf, received a 42 percent response rate from potential U.S. respondents.
    • (2009) One Discipline or Many? TRIP Survey of International Relations Faculty in Ten Countries
  • 142
    • 77951624398 scopus 로고    scopus 로고
    • note
    • Respondent 723214546.
  • 143
    • 77951646646 scopus 로고    scopus 로고
    • note
    • Respondent 724627525.
  • 144
    • 77951638445 scopus 로고    scopus 로고
    • note
    • Respondent 724716301.
  • 145
    • 77951627443 scopus 로고    scopus 로고
    • Waxman to stir debate with transparency subcommittee
    • note, 4 January
    • Recognizing the increased complexity of information policy, the 110th Congress created a subcommittee explicitly charged with examining how America guards and shares information. See Alexander Bolton, "Waxman to stir debate with transparency subcommittee," The Hill, 4 January 2007.
    • (2007) The Hill
    • Bolton, A.1
  • 146
    • 0041771284 scopus 로고    scopus 로고
    • What Do We Know about the Substitution Effect in Transnational Terrorism
    • note, In Andrew Silke and G. Ilardi ed., (Ilford, UK: Frank Cass)
    • As discussed in the section "Strategic Information Release," this does not imply that terrorists will never rationally target well-defended targets, such as airliners, if they are also of particularly high value. Walter Enders and Todd Sandler, "What Do We Know about the Substitution Effect in Transnational Terrorism." In Andrew Silke and G. Ilardi ed., Researching Terrorism: Trends, Achievements, Failures (Ilford, UK: Frank Cass, 2004).
    • (2004) Researching Terrorism: Trends, Achievements, Failures
    • Enders, W.1    Sandler, T.2
  • 147
    • 77951644244 scopus 로고    scopus 로고
    • note
    • Our findings thus match and deepen the intuition embedded in CBO, Homeland Security and the Private Sector and Flynn and Prieto, Neglected Defense that encouraging openness increases the chances that private companies will undertake the appropriate level of counterterrorism protection.
  • 148
    • 77951640430 scopus 로고    scopus 로고
    • note
    • Respondent 724452379.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.