On September 22-23, 2009, the National Research Council held a workshop on the field evaluation of behavioral and cognitive sciences-based methods and tools for use in the areas of intelligence and counterintelligence. Broadly speaking, the purpose of the workshop was to discuss the best ways to take methods and tools from behavioral science and apply them to work in intelligence operations. More specifically, the workshop focused on the issue of field evaluation-the testing of these methods and tools in the context in which they will be used in order to determine if they are effective in real-world settings. This book is a summary and synthesis of the two days of presentations and discussions that took place during the workshop. The workshop participants included invited speakers and experts from a number of areas related to the behavioral sciences and the intelligence community. The discussions covered such ground as the obstacles to field evaluation of behavioral science tools and methods, the importance of field evaluation, and various lessons learned from experience with field evaluation in other areas.
Despite the vital importance of the emerging area of biotechnology and its role in defense planning and policymaking, no definitive book has been written on the topic for the defense policymaker, the military student, and the private-sector bioscientist interested in the "emerging opportunities market" of national security. This edited volume is intended to help close this gap and provide the necessary backdrop for thinking strategically about biology in defense planning and policymaking. This volume is about applications of the biological sciences, here called "biologically inspired innovations," to the military. Rather than treating biology as a series of threats to be dealt with, such innovations generally approach the biological sciences as a set of opportunities for the military to gain strategic advantage over adversaries. These opportunities range from looking at everything from genes to brains, from enhancing human performance to creating renewable energy, from sensing the environment around us to harnessing its power.
The mission of Department of Homeland Security Bioterrorism Risk Assessment: A Call for Change, the book published in December 2008, is to independently and scientifically review the methodology that led to the 2006 Department of Homeland Security report, Bioterrorism Risk Assessment (BTRA) and provide a foundation for future updates. This book identifies a number of fundamental concerns with the BTRA of 2006, ranging from mathematical and statistical mistakes that have corrupted results, to unnecessarily complicated probability models and models with fidelity far exceeding existing data, to more basic questions about how terrorist behavior should be modeled. Rather than merely criticizing what was done in the BTRA of 2006, this new NRC book consults outside experts and collects a number of proposed alternatives that could improve DHS's ability to assess potential terrorist behavior as a key element of risk-informed decision making, and it explains these alternatives in the specific context of the BTRA and the bioterrorism threat.
The architecture of the Nation's digital infrastructure, based largely upon the Internet, is not secure or resilient." It's a horrifying wakeup call that bluntly opens this report on one of the most serious national security and economic threats the United States-and, indeed, the world-faces in the 21st century. And it sets the stage for the national dialogue on cybersecurity it hopes to launch. Prepared by the U.S. National Security Council-which was founded by President Harry S. Truman to advise the Oval Office on national security and foreign policy-this official government account explores: the vulnerabilities of the digital infrastructure of the United States what we can do to protect it against cybercrime and cyberterrorism how to protect civil liberties and personal privacy in cyberspace why a citizenry educated about and aware of cybersecurity risks is vital the shape of the public-private partnership all these efforts will require Just as the United States took the lead in creating the open, flexible structures of the early Internet, it must now take the initiative in ensuring that our digital networks are as secure as they can be, without stifling the unprecedented freedom of opportunity and access the information revolution has afforded us all. This report is the roadmap for making that happen, and it is required reading for anyone who works or plays in the 21st-century digital world: that is, all of us.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.