SRA 211 - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

SRA 211

Description:

SRA 211 Threat of Terrorism & Crime as Approved Constraints/Opportunities SRA 211 Development Progress & Plans SRA 211 Development Team John Bagby (chair ... – PowerPoint PPT presentation

Number of Views:382
Avg rating:3.0/5.0
Slides: 15
Provided by: jba3
Category:
Tags: sra | fighters | fire

less

Transcript and Presenter's Notes

Title: SRA 211


1
SRA 211
  • Threat of Terrorism Crime
  • as Approved Constraints/Opportunities
  • SRA 211 Development Progress Plans

2
SRA 211 Development Team
  • John Bagby (chair)
  • Gouray Cai (Crisis mgt. GIS)
  • Galen Grimes (McKeesport, security intrusion
    detection)
  • David Hall (research dean ARL)
  • Lisa Lenze (discipline resource in pedagogy
    learning objectives)
  • Andrea Tapia (sociologist criminologist of
    ICTs)
  • John Yen (ex officio)

3
SRA 211 Function in Curriculum
  • 2nd among 4 courses in SRA Core
  • SRA 111 Introduction to Security Risk
    Analysis
  • SRA 211 Threat of Terrorism and Crime
  • SRA 221 Fundamentals of Information Security
  • SRA 231 Decision Theory and Analysis
  • SRA 211 vision
  • "overview of the nature, scope, and seriousness
    of threats to security as a result of terrorism
    and crime."

4
SRA 211 Course Objectives-in brief
  • Awareness of security threats from terrorism
    crime
  • Understand nature of security threats in various
    contexts
  • Understand methods to study terrorist criminal
    activities
  • Understand counter-measure strategies

5
Course Outline
  • Terrorism and Security. (4 weeks)
  • Terrorism in its historical context.
  • Varieties of terrorist groups, organizations and
    actions.
  • Crime and Security. (6 weeks)
  • Threats to critical infrastructures.
  • Security-related crimes
  • Economic Security
  • Methods of Studying Terrorism and Crime. (3
    weeks)
  • Social Networking Emphasis
  • Spatial Reasoning and Geo-Political Toolset
  • Critical Shortfalls in our Understanding of
    Terrorism and Crime. (2 weeks)
  • Unreliable data.
  • Biased estimates.
  • Lack of understanding of motives and objectives.
  • Major Critical Infrasture Vulnerabilities

6
Sample Course Assignments
  • Problem-Based Learning (PBL) pedagogy
  • Capstone project Municipal Security Risk
    Analysis
  • Discussion-Based pedagogy
  • Discussion papers
  • Lab pedagogy
  • Spatial Reasoning and GIS lab assignment
  • Group Activity pedagogy
  • Daily activities

7
Sample Capstone Problem Municipal Security
Risk Analysis
  • The Mayor of a medium sized fictional American
    city has asked you, her advisory team, to produce
    a recommendations document that identifies the
    (1) greatest threats to the city, (2) detection
    strategies for these threats, and (3) prevention
    measures for these threats. The team would be
    provided with a detailed description of the city
    including demographics, resources, liabilities
    and major industries/institutions. Each member of
    the team would take on the role of representing a
    role in the citys administration such as (1)
    public safety and fire, (2) public utilities, (3)
    public information (records, taxes, and IT), (4)
    waste management, (5) public works and
    transportation, and (6) family and community
    services.
  • Deliverables Final product Report to the
    Mayor Threat Analysis (physical and information)
    and risk prevention for the city.
  • Week one Threat Analysis due
  • Week two Threat Detection due
  • Week three Threat Prevention due
  • FINALS WEEK Final Report with Solution due

8
Sample Discussion Paper
  • History is written by the victors. Capt.
    Jean-Luc Picard.
  • If members of the Baader-Meinhof, Japanese Red
    Army, Al-Qaeda, or Hezbollah boarded American
    ships in a foreign port and destroyed their
    cargoes, we would undoubtedly label these actions
    as terrorist. And in 1773 when the Sons of
    Liberty boarded ships owned by the British East
    India Tea Company and destroyed 45 tons of tea
    (i.e., the Boston Tea Party) the British
    government likewise labeled these terrorist acts.
    Select a well-documented historical act of
    so-called political terrorism and discuss this
    event from both sides. How can one side claim to
    be freedom fighters while being labeled
    terrorists by the other side? How can an
    examination of both perspectives in a political
    struggle help to develop a better understanding
    of the methods employed by terrorists and their
    motivations?

9
Sample Lab Assignment
  • This hands-on lab exercise consists of three
    major components mapping crimes, visualizing
    risk factors, and vulnerability analysis
    (hotspots). You will be using data from census
    and other sources to generate a detailed analysis
    of crime patterns, and their correlation with
    cultural, social, economic, and political
    factors. The purposes of this lab are two-fold
    (1) to understand a variety of data sources
    available for crime analysis and (2) to develop
    an understanding of the causes of crimes using
    real data on a real community.
  • Deliverables
  • Choose a community of your preference, and
    describe the characteristics of that community.
    (1 page)
  • Generate maps showing crime patterns and causal
    factors for your chosen community. Describe the
    procedures you used to accomplish these tasks. (3
    pages)
  • Develop and report on your risk analysis, with
    reference to major theoretical constructs you
    have learned in this course. (3 pages)

10
Sample Daily Activities
  • Day 1 (before instruction) Using the internet
    and the best of your teams knowledge, estimate
    the cost of 9/11.
  • Day 2 (after instruction) Given what you know
    now, estimate the cost of 9/11 again.
  • Day 3 (discussion) What was the impact of the
    9/11 attack on NYC infrastructure components?
    What are the continuing impacts?

11
SRA 211 Angel Website
  • Potential syllabus
  • Sample course outline
  • Specified learning objectives
  • Potential in-class activities
  • Suggested assignments

12
Major Themes Thrusts
  • Problem-Based Learning (PBL) Pedagogy
  • Multiple-Domain Research Methods
  • Security Related Crimes
  • Security-Related Terrorism Threat Analysis
  • Social Networking Emphasis
  • Spatial Reasoning Geo-Political Toolset
  • Institutional Structure
  • Economic Security
  • Vulnerabilities of the Major Critical
    Infrastructure

13
Critical Infrastructure Vulnerability to Crime
Terrorism
  • ISACs Info. Sharing Analysis Centers
  • Sectoral, private consortia, rely on
    self-evaluation privilege, patterned on CDC
  • EO13010 (7.15.96) PDD-63 (5.22.98)
  • Finance banking
  • Electric power
  • Transportation
  • Public safety services
  • Computer networks
  • Telecommunications systems
  • Emergency Response
  • Defense

14
Questions Solicitation
  • Thanks!
Write a Comment
User Comments (0)
About PowerShow.com