Countering the nuclear threat to the homeland. Pt. I and II : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, March 14 and March 21, 2007.
Countering the nuclear threat to the homeland. Pt. I and II: hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, March 14 and March 21, 2007.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
This report describes many ways in which science and engineering can contribute to making the nation safer against the threat of catastrophic terrorism. The report identifies key actions that can be undertaken now, based on knowledge and technologies in hand, and, equally important, describes key opportunities for reducing current and future risks through longer-term research and development activities.
For more than 30 years Jenkins has been advising the military, government, and prestigious think tanks on the dangers of nuclear proliferation. Now he goes beyond what the experts know to examine how terrorists themselves think about such weapons.
Nuclear and radiological terrorism is my greatest fear. It would represent an unprecedented catastrophic event, causing enormous death, destruction, as well as long-term economic disruption. So it is critical that we continue our vigilance and oversight efforts in order to address this continuing threat. Our subcommittee hearing today will examine the current nuclear detection strategy of the Department of Homeland Security and assess whether that strategy is both effective and efficient in countering this threat. Today we will examine how the Global Nuclear Detection Architecture will detect and prevent a catastrophic nuclear terrorism event. Reliable and effective detection technology is critical to that effort. Unfortunately, in hearings before this subcommittee, we have seen a recurring theme: DHS struggling to manage its technology acquisition processes. We are hopeful that this situation will be quickly corrected since it is a vital part of our global architecture strategy.
A Practical Introduction to Homeland Security and Emergency Management: From Home to Abroad offers a comprehensive overview of the homeland security field, examining topics such as counter-terrorism, border and infrastructure security, and emergency management. Authors Bruce Newsome and Jack Jarmon take a holistic look at the issues and risks, their solutions, controls, and countermeasures, and their political and policy implications. They also demonstrate through cases and vignettes how various authorities, policymakers and practitioners seek to improve homeland security. The authors evaluate the current practices and policies of homeland security and emergency management and provide readers with the analytical framework and skills necessary to improve these practices and policies.