National Academies Press: OpenBook

Science and Technology for Army Homeland Security: Report 1 (2003)

Chapter: 5. Attribution and Retaliation Technologies

« Previous: 4. Recovery and Consequence Management Technologies
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

5
Attribution and Retaliation Technologies

INTRODUCTION

In general, attribution is assigning a cause or source to an act or event. In the context of this report, it is the identification of individuals or organizations that are responsible for direct or indirect acts of terrorism and sabotage directed against the United States, its territories, and vital national interests, and those that support them. Attribution is dominated by operations that identify those responsible; their tactics, techniques, and procedures; their equipment, materiel, and logistics; and their operational locations.

Retaliation is action taken in return for an injury or offense and future deterrence. For this report, it is defined as those operations that are focused on capturing, killing, and eliminating those individuals, organizations, their supporters, and their operational ability to conduct acts of terrorism and sabotage directed against the United States, its territories, and vital national interests. Additionally, these operations aim to create effects and demonstrate consequences that will deter other groups that might plan such attacks and to bring any such perpetrators or their supporting agencies, organizations, or foreign governments to justice.

OPERATIONAL AREA AND THE ARMY ROLE

The Army’s role in homeland security (HLS), antiterrorism (AT), and counterterrorism (CT) is addressed specifically in Chapter 1. The tasks include the following:

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
  • Force protection of soldiers, families, and installations;

  • Operations in support of the lead federal agency or state in case of a large-scale conventional or weapons of mass destruction (WMD) attack; and

  • Operations in support of Joint Military Operations.

The Army’s particular role in attribution is very limited, both at home and in host nations. The intelligence community, whether the Federal Bureau of Investigation or the Central Intelligence Agency or any of the other less well known agencies, will make the attribution. The Army’s role is primarily that of support, either providing perimeter security and crime scene protection or providing analytical support from one of the Army’s premier technical labs.

In contrast, the Army’s role in retaliation runs the gamut from simple military/law enforcement coordination in the United States, when appropriate, to full-blown remote combat operations overseas, where the Army may be assigned primary responsibility for ground retaliation. Since this role is a primary one for the Army, the committee believes there are some enabling technologies that should receive very high priority and deserve S&T investment.

TECHNOLOGY FOCUS AREAS

Because the potential range of response is so broad, the committee feels it would be most useful to focus on three limited areas that present very difficult technical challenges and where S&T can act as a force multiplier:

  • Remote operations in an urban environment, with focus on mobility and survivability,

  • Situational awareness in urban environments, and

  • Terrorist surveillance in difficult environments, both urban and rugged1 terrain.

Remote Operations in an Urban Environment

As mentioned above, the committee believes that technology can be extremely useful to the Army in urban operations. In particular, technology can enhance mobility, survivability, and precision fire support.

  • Mobility. Moving quickly in a crowded city swarming with civilians and hiding some terrorist cells is an extremely complicated task. This

1  

By “rugged” the committee means dense foliage or hilly terrain where it is difficult to use overhead assets or organic platform sensors to find terrorist cells.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

problem was clearly demonstrated in Somalia. The Army must be able to move personnel quickly, through or over busy streets, on a safe, survivable platform. There is a need for small, armor-plated, light transport vehicles, ground and helicopter, to move forces as needed in this environment. Additionally, the capability is needed to clear obstacles in the streets and alleyways.

  • Survivability. There are several aspects to the survivability problem. One key aspect is signature reduction of our forces across the spectrum—radio frequency (RF), electro-optical, infrared, radar, acoustic, etc. Success here could have a major impact on survivability. Additionally, enhanced armor protection is a must. Investment in very light but immensely strong armor can make a big difference and ought to be funded accordingly. This is also of critical importance in the Objective Force Warrior program (U.S. Army, 2002).

  • Fire support. Fire support plays a critical role in all combat operations. Most current fire-support systems were not developed specifically for urban warfare, where precision and lethality (or nonlethality) are significant factors in the outcome of an operation. Even relatively small errors can be devastating in terms of collateral damage or innocent civilians killed. Continued development of precision munitions and adaptations of all fire-support weapons with both Global Positioning System (GPS) and GPS-type tracking is a must. Additionally, the issue of lethality must be addressed.

Often, traditional means of fire support can be used effectively in urban combat. However, even with more precision, fire support from systems such as AC 130 gunships, AH 64 attack helicopters, and artillery may not provide the immediate dedicated and more delicate support required by troops on the ground. In urban combat, the right tool may be a tack hammer, not a sledgehammer. The Army S&T program should explore concepts such as unmanned aerial vehicles (UAVs) or unmanned ground vehicles (or both) that can loiter one block away and be called forward by the ground commander when needed. They can provide not only lethal but also nonlethal support in the form of concussion grenades, incapacitating agents, or psychological operations products.

Conclusion 5-1. Lack of mobility in an urban environment is a critical disadvantage that can result in survivability challenges.

Recommendation 5-1. The Army should continue and enhance current research and development to focus on mobility operations in the urban environment, to include exploration of small, mobile armored carriers for use in urban environments and mini-breachers to clear streets and alleyways.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
"http://www.w3.org/TR/2000/REC-xhtml1-20000126/DTD/xhtml1-transitional.dtd">

Conclusion 5-2. Precision and lethality of weapons are critical issues the Army should address to improve fire support for operations in urban environments.

Recommendation 5-2. The Army should modify current systems or develop new systems, along with appropriate munitions, that are specifically designed for extremely precise fire support in urban environments.

Situational Awareness in Urban Environments

The current system for gaining situational awareness in an urban environment is inadequate. This is due to the extremely complex RF propagation environment in such a setting, coupled with the high-resolution accuracy needed to track a soldier in a specific room or building. A comprehensive situational awareness system is needed. Building on the current Land Warrior system (U.S. Army, 2002), such a system would link the individual soldier to on-the-body, local, and remote sensor systems and information databases.

Conclusion 5-3. Several capabilities and technologies being developed by the Army would be extremely useful for the civilian first responder, for example the situational awareness Blue Force Tracking and health monitoring system.

Recommendation 5-3. The Army should make technologies such as the situational awareness Blue Force Tracking program and the health monitoring system available to the Department of Homeland Security, which will consider whether or not they can be adapted for civilian use.

Elements of such a situational awareness system need to include:

  • High-resolution blue force (friendly) tracking.2 Current systems have inadequate resolution and are unable to exactly locate the individual soldier inside a building or a room due to the complex RF environment and lack of resolution of the GPS system. What is needed is a more complex system relying on GPS, a local RF system, and an accurate dead-reckoning system.

  • Surveillance sensors.3,4.5 There is no sufficiently lightweight, robust, multi-sensor, low-power, low-bandwidth sensor system. Such a system should provide information (and video imagery) to soldiers both as trig-

2  

For instance, the U.S. Army Communications-Electronics Command’s (CECOM’s) Counter Terrorism Blue Force Situation Awareness Protection Suite, briefed to the committee by Raymond Filler, CECOM Research and Development Engineering Center, May 16, 2002.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

gered by enemy activity and as requested by the soldier. It should include several sensor phenomenologies, to wit: infrared, low-light-level visible, acoustic, seismic, chemical, and biological. Additionally, it should include advanced sensor fusion algorithms that provide composite automatic target recognition and identification systems, and, to reduce the workload on an operator, it should include alternatives to current video systems that rely on pan-tilt-zoom capability (such as panoramic systems). Lastly, it should include sensors that can monitor tunnels and locate booby-traps.

  • Information databases. Systems should provide access to archival information about the urban environment, including: (1) building structures, (2) street maps, (3) the transportation network, (4) weather data, and (5) blueprints for individual major buildings.

  • Red force (enemy) information processing and fusion. The intelligence officer can be and will be quickly overloaded with an abundance of red force spot reports. The system needs tracking/deconfliction algorithms, which would allow for the detection of intruders, tracking, recognition (uniform and face recognition techniques), and time/space correlation of intrusion events to determine size and activity.

  • Red force location/tracking.6 The current capability is very limited. Such advances as cellular phone intercept and tracking and through-wall sensing (RF and acoustic) would help significantly if they can be made small, lightweight, inexpensive, and effective.

  • Health monitoring system. There is a need to monitor the key parameters of individual soldiers’ health, such as body core temperature, hydration level, heart rate, biological and chemical exposure levels, and wound location and severity, utilizing a system like the one being developed by the Army Institute of Environmental Medicine (U.S. Army, undated). Additionally, predictive models of human stress failure points as a function of measured parameters would be useful for the commander.

3  

For example, the U.S. Army Night Vision and Electronic Sensors Directorate’s technology programs for counterterrorism (CT Echelon Surveillance and Reconnaissance, Multi-Function Remote Unattended Ground Sensors (CECOM I2WD), Remote Observation and Confirming Sensor, Cave/Urban Assault Kit, Advanced Search and Rescue Technologies, Cave/Urban Assault ACTD), briefed to the committee by A. Fenner Milton, Night Vision and Electronic Sensors Directorate, May 15, 2002.

4  

For example, the U.S. Army Research Laboratory’s LIBS Sensor for Field Detection of All Hazardous Materials, briefed to the committee by Roy Walters, Director of R&D, U.S. Army Research Laboratory, May 16, 2002.

5  

For example, see Networked Sensors for the Objective Force ATD in U.S. Army, 2002.

6  

For example, the U.S. Army CECOM sense-through-the-wall technology, briefed to the committee by Robert Foresta, Branch Chief for SIGINT Payload and Integration Division, Intelligence Collection Branch, CECOM, May 15, 2002.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

Conclusion 5-4. A very sophisticated situational awareness system, with highly accurate Blue Force Tracking in an urban environment, although difficult to construct due to complex radio frequency characteristics and the degree of accuracy required, will provide the soldier and civilian emergency responders a very powerful tool in the war against terrorism.

Recommendation 5-4. The Army should continue to develop a robust soldier situational awareness system begun in Land Warrior that provides a real-time, fused information system.

Terrorist Surveillance and Tracking (Rugged Terrain)

Locating and tracking small terrorist cells in a rural environment is a very difficult task, particularly when the terrorists attempt to blend into the environment. This is the detection issue addressed in Chapter 2: technically speaking, a very small signal against a large background. Several advanced technologies may help the war fighter locate terrorists in this environment:

  • Advanced unattended ground sensors (UGS).7 Remotely replaceable, power efficient, multisensor unattended ground systems will allow the war fighter to gather data and monitor critical locations, such as a cross-road, transportation junctions, critical building and gathering sites, etc. These systems must be covert, remotely enplaceable (perhaps robotically), preferably redeployable, and able to run in low-power mode until keyed by some event. They should have the ability to be integrated into, and cued by, a higher echelon information system that uses airborne and spaceborne assets, one element of the emerging network-centric warfare system.

  • Multipayload, multisensor UAV surveillance system.8 A (preferably) covert UAV system can be rapidly deployed for surveillance in areas of interest. The payload should be multiple sensors able to detect covered and concealed targets. Power, size, and weight issues are paramount. Sensor fusion algorithms are necessary. They should include foliage penetration (FOLPEN) systems. Such a system will be fairly challenging technically, given the weight, power, and size needed to provide effective

7  

For example, the U.S. Army Night Vision and Electronic Sensors Directorate’s technology programs for counterterrorism (CT Echelon Surveillance and Reconnaissance, Multi-Function Remote Unattended Ground Sensors (CECOM I2WD), Remote Observation and Confirming Sensor, Cave/Urban Assault Kit, Advanced Search and Rescue Technologies, Cave/Urban Assault ACTD), briefed to the committee by A. Fenner Milton, Night Vision and Electronic Sensors Directorate, May 15, 2002.

8  

For example, see Networked Sensors for the Objective Force ATD in U.S. Army, 2002.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

coverage over a large area. False-alarm reduction will be a significant challenge.

However, as discussed in Chapter 2, there may well be a physical limitation to detector capability. The committee suggests the following approach in this case: First, look at increasing sensor sensitivity. Where that does not provide sufficient gain, look at networking lower cost, distributed sensors to cover a broad area. Where that is not sufficient, look at fusing disparate sensors such as ground sensors and airborne sensors to increase sensitivity. Where that doesn’t work, look at information fusion, i.e., combine results from different sources such as human intelligence reports, abnormal activity (heavy traffic or unfamiliar vehicles), overhead assets, and local sensors.

Conclusion 5-5. Terrorist cell tracking and surveillance in the urban environment and in rugged terrain are extremely difficult as they rely on a very small signal against a large background.

Recommendation 5-5. The Army should adopt a tiered approach to the problem of terrorist cell tracking and surveillance in the urban environment and in rugged terrain, first increasing sensor sensitivity, then networking and fusing sensors, and, finally, fusing information from disparate sources.

GENERAL FUNCTIONALITY, TECHNOLOGY, AND PRIORITY

In this section, the committee summarizes the general functionalities associated with the Army’s role in attribution and retaliation and lists the technologies that could support their accomplishments seen by the committee (see Tables 5-1 and 5-2). The list is not meant to be all-inclusive. Moreover, the priorities are somewhat subjective, reflecting, as they do, the opinions of the committee. They reflect the committee’s assessment of the importance of the specific task of accomplishing the Army’s mission and the importance of the technology to accomplishing the task. Consequently, where the Army role is secondary, as it is in almost all aspects of attribution, the priorities are at best medium. Where the Army has primacy, as it does in many aspects of retaliation, and where the technologies may provide a leap-ahead capability in accomplishing the tasks, the priorities are high. As discussed in Chapter 1, chemical and biological investments are managed at the Office of the Secretary of Defense level. Similarly, some-far term technologies that are high risk but high payoff are nominally the province of the Defense Advanced Research Projects Agency. Where the technology would primarily support first responders, the committee believes the Department of Homeland Security should be the lead agency.

The tables provide a collection of technologies that could be used during the attribution and retaliation phases. The availability column reflects the general

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

TABLE 5-1 Technologies for Attribution

Functionality

Task

Technology

Availabilitya (R, N, F)

Priority for Army S&Tb

Multiusec (H, O, C)

Incident analysis

Biological analysis support

Enhanced biological analysis tools

F

Low (OSD)

H, C

Chemical analysis support

Enhanced chemical analysis tools

N

Low (OSD)

H, C

Explosive analysis support

Enhanced explosive analysis tools

N

Low (DHS)

H, C

Cyber analysis support

Enhanced software analysis tools

N

Low (DHS)

H, O, C

Military/ law enforcement coordination

Database interoperability (domestic and host nation)

Software interface tools

N

Low (DHS)

H, O, C

Communications interoperability

Hardware/software development

N

Low (DHS)

H, O, C

Protect crime scene

Improved intrusion detection system

N

Low (DHS)

H, C

NOTE: OSD, Office of the Secretary of Defense; DHS, Department of Homeland Security; TRL, technology readiness level.

aAvailability: R, ready (TRL 8-9); N, near-term (TRL 4-7); F, far-term (TRL 1-3).

bPriority for Army S&T (investment): low, someone else has mission or technology is ready and available; medium, useful but of limited impact and some investment needed; high, very important, no one else working on it, considerable investment needed.

cMultiuse: H, Army homeland security; O, Objective Force; C, civilian (first responders and others).

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

TABLE 5-2 Technologies for Retaliation

Functionality

Task

Technology

Availabilitya (R, N, F)

Priority for Army S&Tb

Multiusec (H, O, C)

Surveillance and tracking

Detect traffic/activity abnormality in urban and rural locations

Multisensor fusion

N

High

H, O

Data mining techniques

N

High

H, O

Inference algorithms

N

High

H, O

Redeployable UGS

F

High

H, O

Locate terror cells in areas of heavy foliage

3-D ultrasensitive lidar

N

High

O

FOLPEN radar on UAV

F

Low (DARPA)

O

Redeployable UGS

F

High

O

Hyperspectral effluent detection

N

Medium

O

Cell phone tracking

N

Low (NSA)

O

Defeat covered and concealed targets in rural environment

3-D ultrasensitive lidar

N

High

O

Multisensor fusion techniques

N

High

O

Locate terror cells and personnel in buildings

Through-wall radar

F

Medium (DARPA)

H, O, C

Ultrasensitive acoustics location systems

F

Medium (DARPA)

H, O, C

Cell phone tracking

N

Low (NSA)

H, O, C

Locate gunshots in urban environment

Ultrasensitive acoustics triangulation system

F

High

H, O, C

Enhanced red force (enemy) location in urban environment

RF tags

N

Low (DARPA)

O

Track deconfliction algorithms

F

High

O

Personnel automatic target recognition algorithms

N

Medium (DARPA)

O

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

Situational awareness

Enhanced blue force (friendly) personnel location in urban environment

Fused GPS, RF, and dead-reckoning hardware and algorithms

N

High

H, O, C

Military/law enforcement coordination

Nonlethal apprehension tools

Incapacitating gas

N

Low

O, C

Improved rubber bullets

N

Low

O, C

Sticky foam

N

Low

O, C

Identification

Rapid DNA analysis

N

Low

O, C

Interpol/interagency database access

F

Low

O, C

Rapid fingerprinting analysis

F

Low

O, C

Face recognition algorithms

F

Low

O, C

Interrogation support

Universal translator

F

Low (DARPA)

O, C

Advanced lie-detection techniques

F

Low (DARPA/ DHS)

O, C

Remote operations

Mobility in urban environment

Exoskeleton for soldier platform

F

High

O, C

Lightweight, highly survivable ground platform

F

Low (DARPA)

O, C

Light, highly survivable, signature-suppressed troop-carrying helicopter

F

High

O, C

Mobile, small-scale robotic breachers for clearing alleys, etc. in urban environment

N, F

High

O, C

Signature reduction; lower all signatures

Low-signature RF, acoustic, EO, IR, radar

F

Low (DARPA)

H, O, C

Reduced usage of signature-producing technologies

N

High

H, O

Robots; improved CBRN detection and protection

Individual biological agent monitor and reporting system

F

Low (OSD)

H, O, C

Lightweight armor protection

Advanced composites

F

High

H, O, C

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

Functionality

Task

Technology

Availabilitya (R, N, F)

Priority for Army S&Tb

Multiusec (H, O, C)

 

Enhanced vehicle mine protection

Advanced composites

F

High

H, O, C

Advanced health and wound monitoring system

Integrated blood pressure, heart rate, body temperature, skin penetration sensors

N, F

High

H, O, C

Rapid, automatic resupply

Automatic logistic resupply algorithm

N

Medium

O

Robotic resupply system

F

Low (DARPA)

 

Munitions and delivery systems designed for urban combat

Nonlethal munitions to include acoustic systems

N, F

High

H, O, C

PSYOP products

N

High

O

UAVs and UGVs designed for urban fire support

N

High

H, O, C

Precision insertion and targeting

Improved warheads

Advanced propellants

N, F

High

O

Improved warhead design

N, F

High

O

Improved precision

GPS, RF, and remote laser designation systems

N

Medium

O

NOTE: UGS, unattended ground sensors; 3-D, three-dimensional; lidar, light detection and ranging; FOLPEN, foliage penetration; UAV, unmanned air vehicle; DARPA, Defense Advanced Research Projects Agency; NSA, National Security Agency; RF, radio frequency; GPS, Global Positioning S ystem; EO, electrooptical; IR, infrared; CBRN, chemical, biological, radiological, and nuclear; PSYOP, psychological operations; UGV, unmanned gr ound vehicle; TRL, technology readiness level; DHS, Department of Homeland Security.

aAvailability: R, ready (TRL 8-9); N, near-term (TRL 4-7); F, far-term (TRL 1-3).

bPriority for Army S&T (investment): low, someone else has mission or technology is ready and available; medium, useful but of limited impact and some investment needed; high, very important, no one else working on it, considerable investment needed.

cMultiuse: H, Army homeland security; O, Objective Force; C, civilian (first responders and others).

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×

opinion of the committee, which is not meant to be a detailed evaluation. A more precise evaluation, including a risk assessment of the technology, would be the province of a follow-on study.

REFERENCES

U.S. Army. Undated. Warfighter Physiological Status Monitoring. Available online at <http://www.usariem.army.mil/wpsm/index.html>. Accessed January 13, 2003.

U.S. Army. 2002. United States Army Weapon Systems 2002. Washington, D.C: Government Printing Office.

Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 112
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 113
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 114
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 115
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 116
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 117
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 118
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 119
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 120
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 121
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 122
Suggested Citation:"5. Attribution and Retaliation Technologies." National Research Council. 2003. Science and Technology for Army Homeland Security: Report 1. Washington, DC: The National Academies Press. doi: 10.17226/10655.
×
Page 123
Next: 6. Committee Observations »
Science and Technology for Army Homeland Security: Report 1 Get This Book
×
 Science and Technology for Army Homeland Security: Report 1
Buy Paperback | $57.00 Buy Ebook | $45.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The confluence of the September 11, 2001 terrorist attack and the U.S. Army's historic role to support civil authorities has resulted in substantial new challenges for the Army. To help meet these challenges, the Assistant Secretary of the Army for Research and Technology requested the National Research Council (NRC) carry out a series of studies on how science and technology could assist the Army prepare for its role in homeland security (HLS). The NRC's Board on Army Science and Technology formed the Committee on Army Science and Technology for Homeland Security to accomplish that assignment. The Committee was asked to review relevant literature and activities, determine areas of emphasis for Army S&T in support of counter terrorism and anti-terrorism, and recommend high-payoff technologies to help the Army fulfill its mission.

The Department of Defense Counter-Terrorism Technology Task Force identified four operational areas in reviewing technical proposals for HLS operations: indications and warning; denial and survivability; recovery and consequence management; and attribution and retaliation. The study sponsor asked the Committee to use these four areas as the basis for its assessment of the science and technology (S&T) that will be important for the Army's HLS role.

Overall, the Committee found that:

  • There is potential for substantial synergy between S&T work carried out by the Army for its HLS responsibilities and the development of the next generation Army, the Objective Force.
  • The Army National Guard (ARNG) is critical to the success of the Army's HLS efforts.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!