G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RRA107-1
来源IDRR-A107-1
The End of Sanctuary: Protecting the Army's Installations from Emerging Threats
Elvira N. Loredo; Karlyn D. Stanley; Ryan Consaul; Jordan R. Reimer; Anita Szafran
发表日期2020-11-10
出版年2020
页码173
语种英语
结论

The innovative use of emerging and existing technologies by adversaries will continuously create threats to the wartime mission of Army installations

  • Such emerging technologies as unmanned aerial systems, fifth-generation (5G) communications technology, and the use of social media disinformation by adversaries all pose potential threats to installations that might not have been anticipated.

An installation's ability to perform its wartime mission in a contested environment is not adequately considered under current threat assessment methodologies

  • Multiple Army and U.S. Department of Defense organizations provide oversight and guidance about how to conduct installation threat assessments. The assessments have many commonalities but lack consistency and frequency of application. For example, some assessments are conducted every three years and cover only a subset of all installations, while others are conducted only at the request of the garrison commander.

Threat assessment methodologies do not include many emerging threats

  • The Army assessment processes for identifying current threats do not include manipulation of artificial intelligence, smart city technologies, biometrics, nanotechnology, information warfare, commercial satellites, social media, or industrial control system attacks.

Threat assessment approaches do not consider the combined effects of multiple threats

  • When these threats are part of a coordinated effort involving the installation and the surrounding community, they might overwhelm an installation's capabilities.

Army installations are protected using traditional physical security, antiterrorism, and emergency preparedness approaches

  • Current Army policies, doctrine, and assessments are focused "inside the wire" and fail to imagine the innovative use of existing or future threats on surrounding communities that will impede the flow of forces on road, rail, and at the ports of debarkation.
摘要

The United States has entered a new phase of global conflict in which adversaries might seek to delay or disrupt Army installations' ability to power project, mobilize forces, and conduct other wartime missions. As noted in the 2018 National Defense Strategy, "it is now undeniable that the homeland is no longer a sanctuary." Adversary actions might involve complex attacks that are conducted over an extended period of time and targeted at multiple continental United States (CONUS) installations, their surrounding communities, and critical communication nodes. To address this challenge, RAND researchers cataloged innovative and emerging threats to installations, identified deficiencies in the Army's current threat assessment methodologies, and developed a framework to assess potential solutions and the resources required to defend against these threats. The framework was presented to and discussed with a group of experts at an Army installation and at U.S. Army North.In practice, most of the threat and risk-assessment methodologies used by the Army focus on known threats. For example, emphasis is placed on terrorist attacks, active shooters, and cyberattacks. However, it is unlikely that future threats to power projection in a contested environment will mimic previous events. Although the assessments provide valuable information, they are not calibrated to measure how well Army installations would respond to a coordinated attack by a capable adversary employing a combination of effects. Significant changes need to take place to ensure that installations are adequately protected from a capable adversary's ability to disrupt CONUS installations' wartime missions.

目录
  • Chapter One

    Neglecting the Past and Failing to Imagine the Future

  • Chapter Two

    Innovative Threats and How They Affect the Army

  • Chapter Three

    Army Installations Employ Multiple Threat Assessment Instruments

  • Chapter Four

    Army Installations Employ Multiple Threat Assessment Practices

  • Chapter Five

    A Framework for Mitigating Innovative and Emerging Threats at Army Installations

  • Chapter Six

    Findings and Recommendations

  • Appendix A

    A Whole Flock of Pink Flamingos Scenarios Versus Actual Events

  • Appendix B

    National Defense Strategy Installation Threat Risk List

  • Appendix C

    Enumerated Hazards and Threats in Risk Assessment Tools

  • Appendix D

    Technology Forecasting

主题Critical Infrastructure Protection ; Defense Infrastructure ; Threat Assessment ; United States Army
URLhttps://www.rand.org/pubs/research_reports/RRA107-1.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524269
推荐引用方式
GB/T 7714
Elvira N. Loredo,Karlyn D. Stanley,Ryan Consaul,et al. The End of Sanctuary: Protecting the Army's Installations from Emerging Threats. 2020.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RRA107-1.pdf(1748KB)智库出版物 限制开放CC BY-NC-SA浏览
x1604424581998.jpg.p(1KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Elvira N. Loredo]的文章
[Karlyn D. Stanley]的文章
[Ryan Consaul]的文章
百度学术
百度学术中相似的文章
[Elvira N. Loredo]的文章
[Karlyn D. Stanley]的文章
[Ryan Consaul]的文章
必应学术
必应学术中相似的文章
[Elvira N. Loredo]的文章
[Karlyn D. Stanley]的文章
[Ryan Consaul]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RRA107-1.pdf
格式: Adobe PDF
文件名: x1604424581998.jpg.pagespeed.ic.TM5eyi7ePc.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。