10.08.2013 Views

combating terrorism and its implications for the security sector - DCAF

combating terrorism and its implications for the security sector - DCAF

combating terrorism and its implications for the security sector - DCAF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Distributed <strong>for</strong>ces <strong>and</strong> an interlocking network: This is military network-centricity<br />

taken to <strong>the</strong> smallest node. It will give <strong>the</strong> twentyfirst<br />

century l<strong>and</strong> warrior continual situational underst<strong>and</strong>ing while<br />

being a member of a widely distributed, noncontiguous <strong>for</strong>ce. Effective<br />

combat operations against terrorists <strong>and</strong> <strong>the</strong>ir allies require<br />

widely distributed armed <strong>for</strong>ces. Enabling technologies such as advanced<br />

minicomputers <strong>and</strong> communication networks will turn <strong>the</strong>se<br />

<strong>for</strong>ces into distributed sensors as well as combatants, <strong>and</strong> allow <strong>the</strong>m<br />

to provide in<strong>for</strong>mation back to comm<strong>and</strong> headquarters. The <strong>for</strong>ces<br />

are operated like a distributed in<strong>for</strong>mation system with real-time<br />

awareness of <strong>the</strong> battlefield, giving comm<strong>and</strong>ers better data <strong>for</strong> decision<br />

making. Such technologies also will identify friend from foe in<br />

combat environments.<br />

• Encouraging public awareness <strong>and</strong> self-identification of terrorists:<br />

The coming years will see innovative applications of behavioral science<br />

to combat terrorist activity. In some ways, terrorists operate like<br />

criminals, trying to behave secretively <strong>and</strong> inconspicuously <strong>and</strong> in <strong>the</strong><br />

process, sometimes calling attention to <strong>the</strong>mselves. To find criminals,<br />

law en<strong>for</strong>cement relies on a watchful public to provide tips. The<br />

worldwide in<strong>for</strong>mation-saturated culture that we live in will exp<strong>and</strong><br />

fur<strong>the</strong>r, creating new opportunities to engage <strong>the</strong> public to ferret out<br />

terrorists. A global “Amber Alert” system could be used to distribute<br />

multilingual in<strong>for</strong>mation on known terrorists. A “Most Wanted” list<br />

could be tailored to help find terrorists hiding in plain sight. In addition,<br />

innovative methods will be deployed to coax terrorists into<br />

identifying <strong>the</strong>mselves. For example, warning signs might be placed<br />

along a controlled access announcing that a <strong>security</strong>-screening checkpoint<br />

is coming up, just be<strong>for</strong>e a convenient opt-out or exit point.<br />

Anyone avoiding <strong>the</strong> checkpoint can be watched <strong>for</strong> fur<strong>the</strong>r examples<br />

of self-incriminating behavior.<br />

Establishing Metrics <strong>for</strong> Measuring Progress<br />

Metrics will be needed <strong>for</strong> measuring progress in <strong>the</strong> counterterrorist ef<strong>for</strong>t,<br />

both on <strong>the</strong> results <strong>and</strong> <strong>the</strong> actions taken by intelligence. They<br />

should include measures of improved connectivity within <strong>the</strong> intelligence<br />

community, measures of <strong>the</strong> multidisciplinary approach of analysis<br />

<strong>and</strong> <strong>the</strong> structures that connect <strong>the</strong> community to <strong>the</strong> best <strong>and</strong><br />

brightest outside <strong>the</strong> world of intelligence, <strong>and</strong> indicators of true analytic<br />

innovation <strong>and</strong> deepened expertise in outwitting <strong>the</strong> adversary.<br />

Any metric employed to gauge progress needs to make room <strong>for</strong> intelligent<br />

risk taking <strong>and</strong> failure tolerance. Intelligent risk taking <strong>and</strong> <strong>the</strong><br />

165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!