科技报告详细信息
The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure
Ackerman, G ; Blair, C ; Bale, J ; Hahn, G ; DiLorenzo, E ; Vadlamudi, S ; Lunsford, C
Lawrence Livermore National Laboratory
关键词: Lawrence Livermore National Laboratory;    99 General And Miscellaneous//Mathematics, Computing, And Information Science;    Recommendations;    Personnel;    Orientation;   
DOI  :  10.2172/897999
RP-ID  :  UCRL-SR-224072
RP-ID  :  W-7405-ENG-48
RP-ID  :  897999
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.

【 预 览 】
附件列表
Files Size Format View
897999.pdf 3167KB PDF download
  文献评价指标  
  下载次数:29次 浏览次数:21次