Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463931196
Publisher: Progressive Management Publication: June 6, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463931196
Publisher: Progressive Management
Publication: June 6, 2018
Imprint: Smashwords Edition
Language: English

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

More books from Progressive Management

Cover of the book Selected Works of General John Vessey, Joint Chiefs of Staff Chairman, Soviet Union, Reagan Era, Cold War, Lebanon Bombing, Nuclear Modernization, Grenada, SDI, Peacekeeper Missile by Progressive Management
Cover of the book 2017 Justice Department Civil Rights Investigation of the Chicago Police Department: Complete Report of Findings, Pattern of Unconstitutional Use of Force, Deficient Accountability Systems, Reform by Progressive Management
Cover of the book Key Considerations for Irregular Security Forces in Counterinsurgency: Dhofar, Operation Iraqi Freedom Case Study, Oman, Sultan Qaboos, General Franks, Rumsfeld, Petraeus by Progressive Management
Cover of the book Social Media: New Spaces for Contention in Authoritarian Systems - Case Study of Bahrain, Arab Spring, Islamic Sectarian Violence, Protest Movements, Twitter, Facebook, YouTube, Blogging by Progressive Management
Cover of the book NASA Space Technology Report: Goddard's Astrophysics Science Division - Annual Report 2011, Research Highlights, Fermi Gamma-Ray Space Telescope, Rossi, HST, Swift, GALEX, HEASARC, WMAP by Progressive Management
Cover of the book Eritrea in Perspective: Orientation Guide and Tigrinya Cultural Orientation: Geography, History, Economy, Abyssinia, al-Shabaab, Land of Punt, Asmara, Nakfa, Ethiopia, Mengistu, Derg, Jabarti, Assab by Progressive Management
Cover of the book Complete Guide to World War II's Forgotten War: The Aleutian Campaign in Alaska and North Pacific Against Japan - Kiska, Attu, Komandorski Islands, Operation Landcrab, Cold Weather Fighting, Navy by Progressive Management
Cover of the book Shortchanging the Joint Fight? An Airman's Assessment of FM 3-24 and the Case for Developing Truly Joint COIN Doctrine: Counterinsurgency, Airpower Myths, Army and Marine Tactical Doctrine, Iraq War by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Finding the Balance: U.S. Military and Future Operations, Quadrennial Review, Petraeus, Dempsey, Mattis by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Camouflage, Concealment, and Decoys - FM 20-3 - Coverage of Techniques, Materials, Special Environments (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force C-32B Special Airlift Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Mao Tse-tung on Guerrilla Warfare (Yu Chi Chan) U.S. Marine Corps Reference Publication FMFRP 12-18 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Inside the Cold War: A Cold Warrior's Reflections - Bombers, Tankers, Reconnaissance, ICBMs, Submarines, SAC Alert Forces, Russian Cold Warriors, Curtis LeMay, Hyman Rickover by Progressive Management
Cover of the book German Foreign Fighters in Syria and Iraq: Islamist Jihadist Mobilization, Muslim Radicalization, ISIS, Syrian Civil War, Terrorist Online Recruiting, Salafism, Migrant Integration, Millatu Ibrahim by Progressive Management
Cover of the book 2014 American Arctic Strategy: Russia and China, Minerals and Resources, Recoverable Oil in the Arctic Circle, Arctic Militarization, Freedom of Navigation, Sea Lines of Communication by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy