National Academies Press: OpenBook
« Previous: APPENDIX B: LIST OF COMMITTEE MEMBERS
Suggested Citation:"APPENDIX C: LIST OF WORKSHOP PARTICIPANTS." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 64
Suggested Citation:"APPENDIX C: LIST OF WORKSHOP PARTICIPANTS." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 65
Suggested Citation:"APPENDIX C: LIST OF WORKSHOP PARTICIPANTS." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 66
Suggested Citation:"APPENDIX C: LIST OF WORKSHOP PARTICIPANTS." National Research Council. 2008. Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/12437.
×
Page 67

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

APPENDIX C LIST OF WORKSHOP PARTICIPANTS WORKSHOP 1: FINDING THE WEAK LINKS (FEBRUARY 14-15, 2008) Speakers Jeffrey M. Bale (Monterey Institute of International Studies) Louise Richardson (Radcliffe Institute for Advanced Study) Thomas H. Johnson (Naval Postgraduate School) Michael C. Kenney (Pennsylvania State University) Brian G. Shellum (Joint Improvised Explosive Device Defeat Organization) Participants John L. Anderson (Illinois Institute of Technology) Nora Bensahel (RAND) Nina M. Berry (Joint Improvised Explosive Device Defeat Organization) Alfred Blumstein (Carnegie Mellon University) Christopher Brown (Office of Naval Research) Judee Burgoon (University of Arizona) Kathleen M. Carley (Carnegie Mellon University) Martha Crenshaw (Stanford University) Adam Dolnik (University Wollongong, Australia) Martha Feldman (University of California, Irvine) Robert E. Foster (Office of the Secretary of Defense) Michael Gabbay (Information Systems Laboratories, Inc) Marc Genest (Naval War College) Gregory Godfrey (Metron) Johanna Gooby (Office of Naval Research) Robert Higginson (Joint Improvised Explosive Device Defeat Organization) William Hurley (Institute for Defense Analyses) Kenneth Israel (Lockheed Martin Company) Neil F. Johnson (University of Miami) Edward H. Kaplan (Yale University) Bryan Kasper (Georgetown University) Robin Keesee (Joint Improvised Explosive Device Defeat Organization) Martin Kruger (Office of Naval Research) Colin Lewis (Consultant) Edward MacKerrow (Los Alamos National Laboratory) David Masters (Department of Homeland Security) 64

Lee Mastroianni (Office of Naval Research) Clark Richard McCauley (Bryn Mawr College) Charlene D. Miliken (Department of Homeland Security) Ray Nelson (Joint Improvised Explosive Device Defeat Organization) Jimmie C. Oxley (University of Rhode Island) Michael Pestorius (University of Texas) Linda Pierce (Army Research Office) Todd Sandler (University of Texas) Jacob Shapiro (Princeton University) Michael Shlesinger (Office of Naval Research) Allison Smith (Department of Homeland Security) Mark Stoffel (Office of Naval Research) Micheline Strand (Army Research Office) William C. Trogler (University of California, San Diego) John Waschl (Office of Naval Research) Ruth P. Willis (Office of Naval Research) Kevin Wood (Naval Postgraduate School) Jonathan Young (Pacific Northwest National Laboratory) NRC Staff Kathryn Hughes Kela L. Masters Jessica L. Pullen Federico M. San Martini Ronald D. Taylor WORKSHOP 2: PREDICTING IED ACTIVITIES (MARCH 17-18, 2008) Speakers Jonathan D. Farley (California Institute of Technology) Alfred O. Hero III (University of Michigan) Kathleen L. Kiernan (The Kiernan Group) Daryl Pregibon (Google, Inc.) Alexander Szalay (Johns Hopkins University) Pramod K. Varshney (Syracuse University) Participants Shabbir Ahmed (Georgia Institute of Technology) John L. Anderson (Illinois Institute of Technology) Robert G. Atkins (Massachusetts Institute of Technology, Lincoln Laboratory) Alan Berman (Consultant) Nina M. Berry (Joint Improvised Explosive Device Defeat Organization) Alfred Blumstein (Carnegie Mellon University) Charles A. Bouman (Purdue University) Gordon H. Bradley (Naval Postgraduate School) 65

David J. Brady (Duke University) Christopher Brown (Office of Naval Research) Richard Campbell (Bureau of Alcohol, Tobacco, Firearms and Explosives) Ivy Estabrook (Office of Naval Research) Anthony Fainberg (Institute for Defense Analyses) John W. Fisher (Massachusetts Institute of Technology) Nancy Forbes (Ideal Innovations, Inc.) Keith Frakes (Army Asymmetric Warfare Office) William T. Freeman (Massachusetts Institute of Technology) Mary Lou Fultz (Consultant) Greg Godfrey (Metron, Inc.) Maya Gupta (University of Washington) Robert Higginson (Joint Improvised Explosive Device Defeat Organization) William J. Hurley (Institute for Defense Analyses) Kenneth Israel (Lockheed Martin) Anil K. Jain (Michigan State University) David Jensen (University of Massachusetts) Joseph Kielman (Department of Homeland Security) Gary LaFree (University of Maryland) Carl Laird (Texas A&M University) Eva Lee (Georgia Institute of Technology) Jeffrey Lesho (The Johns Hopkins University, Applied Physics Laboratory) Colin Lewis (Consultant) Thomas Lynch (Tier-Tech International, Inc.) Steven McElroy (Department of Homeland Security) Charlene Milliken (Department of Homeland Security) Elan Moritz (US Navy) Vijay Nair (University of Michigan) Raymond Nelson (Joint Improvised Explosive Device Defeat Organization) Jeffrey Norwitz (Naval War College) Jimmie C. Oxley (University of Rhode Island) Sonya Proctor (Department of Homeland Security) Grace Riesling (Bureau of Alcohol, Tobacco, Firearms and Explosives) Dennis A. Roberson (Illinois Institute of Technology) Mike Robinson (Army Asymmetric Warfare Office) Mike F. Shlesinger (Office of Naval Research) Irma Sityar (Washington Consulting Government Services) George Solhan (Office of Naval Research) Marc Steinberg (Office of Naval Research) Mark Stoffel (Office of Naval Research) Micheline Strand (Army Research Office) V.S. Subrahmanian (University of Maryland) William C. Trogler (University of California, San Diego) John Waschl (Office of Naval Research) Larry E. Willis (Department of Homeland Security) Patrick J. Wolfe (Harvard University) 66

Jonathan Young (Pacific Northwest National Laboratory) Randy Zachery (Army Research Office) NRC Staff Kathryn Hughes Kela L. Masters Jessica L. Pullen Federico M. San Martini Ronald D. Taylor Dorothy Zolandz 67

Next: GLOSSARY »
Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report Get This Book
×
 Disrupting Improvised Explosive Device Terror Campaigns: Basic Research Opportunities: A Workshop Report
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!

Countering the threat of improvised explosive devices (IED)s is a challenging, multilayered problem. The IED itself is just the most publicly visible part of an underlying campaign of violence, the IED threat chain. Improving the technical ability to detect the device is a primary objective, but understanding of the goals of the adversary; its sources of materiel, personnel, and money; the sociopolitical environment in which it operates; and other factors, such as the cultural mores that it must observe or override for support, may also be critical for impeding or halting the effective use of IEDs.

Disrupting Improvised Explosive Device Terror Campaigns focuses on the human dimension of terror campaigns and also on improving the ability to predict these activities using collected and interpreted data from a variety of sources.

A follow-up to the 2007 book, Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities, this book summarizes two workshops held in 2008.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!