1 / 14

SRA 211

SRA 211. “Threat of Terrorism & Crime” “as Approved” Constraints/Opportunities SRA 211 Development Progress & Plans. SRA 211 Development Team. John Bagby (chair) Gouray Cai (Crisis mgt. GIS) Galen Grimes (McKeesport, security & intrusion detection) David Hall (research dean & ARL)

Download Presentation

SRA 211

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SRA 211 “Threat of Terrorism & Crime” “as Approved” Constraints/Opportunities SRA 211 Development Progress & Plans

  2. SRA 211 Development Team • John Bagby (chair) • Gouray Cai (Crisis mgt. GIS) • Galen Grimes (McKeesport, security & intrusion detection) • David Hall (research dean & ARL) • Lisa Lenze (discipline & resource in pedagogy & learning objectives) • Andrea Tapia (sociologist & criminologist of ICTs) • John Yen (ex officio)

  3. SRA 211 Function in Curriculum • 2nd among 4 courses in SRA Core: • SRA 111 – Introduction to Security & Risk Analysis • SRA 211 – Threat of Terrorism and Crime • SRA 221 – Fundamentals of Information Security • SRA 231 – Decision Theory and Analysis • SRA 211 vision • "overview of [the] nature, scope, and seriousness of threats to security as a result of terrorism and crime."

  4. SRA 211 Course Objectives-in brief • Awareness of security threats from terrorism & crime • Understand nature of security threats in various contexts • Understand methods to study terrorist & criminal activities • Understand counter-measure strategies

  5. Course Outline • Terrorism and Security. (4 weeks) • Terrorism in its historical context. • Varieties of terrorist groups, organizations and actions. • Crime and Security. (6 weeks) • Threats to critical infrastructures. • Security-related crimes • Economic Security • Methods of Studying Terrorism and Crime. (3 weeks) • Social Networking Emphasis • Spatial Reasoning and Geo-Political Toolset • Critical Shortfalls in our Understanding of Terrorism and Crime. (2 weeks) • Unreliable data. • Biased estimates. • Lack of understanding of motives and objectives. • Major Critical Infrasture Vulnerabilities

  6. Sample Course Assignments • Problem-Based Learning (PBL) pedagogy • Capstone project: Municipal Security & Risk Analysis • Discussion-Based pedagogy • Discussion papers • Lab pedagogy • Spatial Reasoning and GIS lab assignment • Group Activity pedagogy • Daily activities

  7. Sample Capstone Problem: Municipal Security & Risk Analysis The Mayor of a medium sized fictional American city has asked you, her advisory team, to produce a recommendations document that identifies the (1) greatest threats to the city, (2) detection strategies for these threats, and (3) prevention measures for these threats. The team would be provided with a detailed description of the city including demographics, resources, liabilities and major industries/institutions. Each member of the team would take on the role of representing a role in the city’s administration such as (1) public safety and fire, (2) public utilities, (3) public information (records, taxes, and IT), (4) waste management, (5) public works and transportation, and (6) family and community services. • Deliverables: Final product: Report to the Mayor: Threat Analysis (physical and information) and risk prevention for the city. • Week one: Threat Analysis due • Week two: Threat Detection due • Week three: Threat Prevention due • FINALS WEEK: Final Report with Solution due

  8. Sample Discussion Paper “History is written by the victors.” Capt. Jean-Luc Picard. If members of the Baader-Meinhof, Japanese Red Army, Al-Qaeda, or Hezbollah boarded American ships in a foreign port and destroyed their cargoes, we would undoubtedly label these actions as terrorist. And in 1773 when the Sons of Liberty boarded ships owned by the British East India Tea Company and destroyed 45 tons of tea (i.e., “the Boston Tea Party”) the British government likewise labeled these terrorist acts. Select a well-documented historical act of so-called political terrorism and discuss this event from both sides. How can one side claim to be freedom fighters while being labeled terrorists by the other side? How can an examination of both perspectives in a political struggle help to develop a better understanding of the methods employed by terrorists and their motivations?

  9. Sample Lab Assignment This hands-on lab exercise consists of three major components: mapping crimes, visualizing risk factors, and vulnerability analysis (hotspots). You will be using data from census and other sources to generate a detailed analysis of crime patterns, and their correlation with cultural, social, economic, and political factors. The purposes of this lab are two-fold: (1) to understand a variety of data sources available for crime analysis and (2) to develop an understanding of the causes of crimes using real data on a real community. Deliverables: • Choose a community of your preference, and describe the characteristics of that community. (1 page) • Generate maps showing crime patterns and causal factors for your chosen community. Describe the procedures you used to accomplish these tasks. (3 pages) • Develop and report on your risk analysis, with reference to major theoretical constructs you have learned in this course. (3 pages)

  10. Sample Daily Activities • Day 1 (before instruction): Using the internet and the best of your team’s knowledge, estimate the cost of 9/11. • Day 2 (after instruction): Given what you know now, estimate the cost of 9/11 again. • Day 3 (discussion): What was the impact of the 9/11 attack on NYC infrastructure components? What are the continuing impacts?

  11. SRA 211 Angel Website • Potential syllabus • Sample course outline • Specified learning objectives • Potential in-class activities • Suggested assignments

  12. Major Themes & Thrusts • Problem-Based Learning (PBL) Pedagogy • Multiple-Domain Research Methods • Security Related Crimes • Security-Related Terrorism & Threat Analysis • Social Networking Emphasis • Spatial Reasoning & Geo-Political Toolset • Institutional Structure • Economic Security • Vulnerabilities of the Major Critical Infrastructure

  13. Critical Infrastructure Vulnerability to Crime & Terrorism • ISACs: Info. Sharing & Analysis Centers • Sectoral, private consortia, rely on self-evaluation privilege, patterned on CDC • EO#13010 (7.15.96); PDD-63 (5.22.98) • Finance & banking • Electric power • Transportation • Public safety services • Computer networks • Telecommunications systems • Emergency Response • Defense

  14. Questions & Solicitation Thanks!

More Related