Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463931196
Publisher: Progressive Management Publication: June 6, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463931196
Publisher: Progressive Management
Publication: June 6, 2018
Imprint: Smashwords Edition
Language: English

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This informative report has been professionally converted for accurate flowing-text e-book format reproduction.

Active shooter attacks appear to occur more in the United States than other countries and some data shows that their rate of occurrence has increased in the past several years. In response, institutions such as the Department of Defense (DoD), other federal agencies, police, and education systems have increased security and adapted response procedures. Despite ongoing efforts, active shooter attacks occurred in Fort Hood, Texas in 2009, the Washington Navy Yard in 2013, and Chattanooga, Tennessee in 2015. Regardless of the level of security, it appears that the proliferation of firearms in combination with radicalization through the Internet have facilitated more individuals to perpetrate active shooter attacks. These attacks also appear to have similar characteristics whether conducted on DoD installations or in other areas. This thesis studies a variety of available military documents, active shooter case studies, and other active shooter defeat strategies to determine if the military could benefit from increased numbers of armed personnel to augment military and civilian law enforcement personnel. The benefit to the DoD includes increased probability of prevention and deterrence of active shooter events, and a more efficient mitigation and defeat mechanism to reduce casualty rates and terminate the event.

CONTENTS * ABSTRACT * ACKNOWLEDGMENTS * TABLE OF CONTENTS * ACRONYMS * ILLUSTRATIONS * TABLES * CHAPTER 1 INTRODUCTION * Background * Problem Statement * Research Questions * Assumptions * Definitions * Limitations * Scope * Delimitations * Significance * Conclusion * CHAPTER 2 LITERATURE REVIEW * Introduction * Threat Documents * Military Case Studies * Collective Case Studies * Current Doctrine and Defeat Mechanisms * Conclusion * CHAPTER 3 RESEARCH METHODOLOGY * CHAPTER 4 ANALYSIS * Introduction * Scoping the Threat * Homegrown Violent Extremist * Insider Threat * Weapons versus Explosives * Overwhelming the Friendly Force * Threat Conclusion * Active Shooter Characteristics * Shooter Profile * Shooter Preparation * Location * Delay and Time Sensitive Nature * Victim Response * Casualties * Attack Termination * Complexity * Characteristics Conclusion * Military Case Studies * Fort Hood * Washington Navy Yard * Chattanooga * Active Shooter Defeat Methodology * Conclusion * CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS * Introduction * Research Findings * Recommendations * Doctrine * Organization * Training * Material * Leadership * Personnel * Facility * Policy * Risks * Conclusion * Recommend Areas for Further Research * Resourcing * Recruiting Personnel * Foiled Attacks * Augmented Security Number and Structure * BIBLIOGRAPHY

More books from Progressive Management

Cover of the book Planning for a Peaceful Korea: North Korea's Strategy, Last Worst Place on Earth, Human Rights in North Korea, China's Goals and Strategies for Korean Peninsula, Japan's Grand Strategy, Arms Control by Progressive Management
Cover of the book Pride, Progress, and Prospects: The Marine Corps' Efforts to Increase the Presence of African-American Officers (1970-1995) - NASA Astronaut Charles Bolden, President Truman by Progressive Management
Cover of the book Emergency Medical Technician: Basic Refresher Curriculum Instructor Course Guide - Airway, Circulation, Illness and Injury, Childbirth and Children, EMS Operations by Progressive Management
Cover of the book NSA Surveillance Controversy: Liberty and Security in a Changing World - Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies by Progressive Management
Cover of the book 2015 Complete Guide to Pollinator Health: Honey Bees, Monarch Butterflies, New Strategies for Colony Collapse Disorder (CCD), Varroa Mite, Pesticides, Domestic and Global, Federal Land Practices by Progressive Management
Cover of the book Air Power and the Ground War in Vietnam: Ideas and Actions - Counterinsurgency, Air Power Theories, Secret Bombing, Supporting Ground Combat Forces, Gunships, Interservice Differences by Progressive Management
Cover of the book U.S. Marines in the Global War on Terrorism: U.S. Marines in Iraq, 2003: Anthology and Annotated Bibliography - UAVs, Humint Exploitation Teams (HETs), Media Embeds by Progressive Management
Cover of the book 21st Century VA Independent Study Course: American Prisoners of War (POW) - Diseases, Service-Connected Disabilities, Psychiatric Problems, Internment Morbidity and Mortality, Camp Life by Progressive Management
Cover of the book The Air University Pantheon of Air, Space, and Cyberspace Power Thinkers: Wright Brothers, Billy Mitchell, Robert Goddard, Hap Arnold, Claire Chennault, Theodore von Karman, and Others by Progressive Management
Cover of the book NASA Space Technology Report: Pogo in Rockets and Launch Vehicles - Pogo Suppression, Experience with Gemini/Titan, Saturn V and Potential Catastrophic Structural Failure on Apollo 13 Mission by Progressive Management
Cover of the book 2012 Review of Military Unmanned Aerial Vehicle (UAV) and Unmanned Aerial Systems (UAS) Issues - Current and Future Plans for DOD Drones for Surveillance and Combat, Policy Options by Progressive Management
Cover of the book Complete Guide to Baluchistan: Baluchi Cultural Orientation, Balochistan, Southwestern Province of Pakistan, Strategic Importance, Nationalism and Separatist Struggle, Baruchi and Brahui, Gwadar by Progressive Management
Cover of the book Changes, Challenges, Champions: A History of the U.S. Army Corps of Engineers Fort Worth District 2000 - 2011 - Iraq War, War on Terror, Post-Katrina Civil Works, Fort Bliss MILCON, Post-9/11 by Progressive Management
Cover of the book Right Sizing the People's Liberation Army: Exploring the Contours of China's Military - Taiwan, Xinjiang, Uighurs, Tibet, Senkaku, Chinese Combat Aircraft, PLA Air Force, Naval Force, Nuclear by Progressive Management
Cover of the book 1995 Oklahoma City Bombing: Terrorist Tragedy at the Murrah Federal Building - Timothy McVeigh and Terry Nichols, Foreign Connections, Right-Wing Domestic Terrorists, OKBOMB Task Force by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy