Atjaunināt sīkdatņu piekrišanu

E-grāmata: Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals

  • Formāts: 214 pages
  • Izdošanas datums: 19-Apr-2018
  • Izdevniecība: National Academies Press
  • Valoda: eng
  • ISBN-13: 9780309464086
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 3,93 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 214 pages
  • Izdošanas datums: 19-Apr-2018
  • Izdevniecība: National Academies Press
  • Valoda: eng
  • ISBN-13: 9780309464086
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Improvised explosive devices (IEDs) are a type of unconventional explosive weapon that can be deployed in a variety of ways, and can cause loss of life, injury, and property damage in both military and civilian environments. Terrorists, violent extremists, and criminals often choose IEDs because the ingredients, components, and instructions required to make IEDs are highly accessible. In many cases, precursor chemicals enable this criminal use of IEDs because they are used in the manufacture of homemade explosives (HMEs), which are often used as a component of IEDs.





Many precursor chemicals are frequently used in industrial manufacturing and may be available as commercial products for personal use. Guides for making HMEs and instructions for constructing IEDs are widely available and can be easily found on the internet. Other countries restrict access to precursor chemicals in an effort to reduce the opportunity for HMEs to be used in IEDs. Although IED attacks have been less frequent in the United States than in other countries, IEDs remain a persistent domestic threat. Restricting access to precursor chemicals might contribute to reducing the threat of IED attacks and in turn prevent potentially devastating bombings, save lives, and reduce financial impacts.





Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals prioritizes precursor chemicals that can be used to make HMEs and analyzes the movement of those chemicals through United States commercial supply chains and identifies potential vulnerabilities. This report examines current United States and international regulation of the chemicals, and compares the economic, security, and other tradeoffs among potential control strategies.

Table of Contents



Front Matter Summary 1 Introduction 2 Precursor Chemicals Used to Make Homemade Explosives 3 Domestic Chemical Supply Chain 4 International Regulations 5 Assessing Possible Control Strategies 6 Potential Approaches to Restricting Malicious Actors' Access to Precursor Chemicals: Conclusions and Recommendations References Appendix A: Acronyms Appendix B: Risk and Risk Management Appendix C: History of High-Profile Bombing Attacks Appendix D: Group A Chemical Supply Chains Appendix E: International Questions Appendix F: Training Materials Appendix G: Methods and Limitations of Regulatory Assessment Appendix H: Examples of Retail-Level Control Strategies and Other Measures or Activities Appendix I: Committee Member and Staff Biographies
SUMMARY
1(126)
1 Introduction
9(14)
Charge to the Committee and Interpretation of Scope
11(1)
Study Origins
12(5)
Analytical Approach
17(4)
Framework and Tools
19(1)
Data Gathering
20(1)
Definitions
20(1)
Organization of the Report
21(2)
2 Precursor Chemicals Used To Make Homemade Explosives
23(14)
Past and Recent Attacks Involving Explosives
23(6)
Case Study: The Evolving Tactics of a Terrorist Group
27(2)
Identifying and Prioritizing Precursor Chemicals Used in IED Attacks
29(5)
Charge Size Analysis
29(3)
Generating a Short List of Precursor Chemicals
32(1)
Criteria for Generating Groups A, B, and C
32(1)
Application of the Criteria to Precursor Chemicals
33(1)
Conclusion
34(3)
3 Domestic Chemical Supply Chain
37(36)
Supply Chain Overview
39(9)
Production and Input Nodes
42(1)
Transportation Modes
43(1)
Distribution and Retail Nodes
44(1)
End User Nodes
45(1)
Internet Commerce
46(2)
Domestic Policy Mechanisms
48(14)
Department of Justice
50(2)
Department of Homeland Security
52(2)
Environmental Protection Agency
54(1)
Department of Labor
54(1)
Department of Transportation
55(1)
Department of Commerce
56(1)
State and Local Regulations
57(1)
Private-Public Partnerships
58(1)
Trade Associations Programs
59(2)
Outreach
61(1)
Best Practices
62(1)
Supply Chain Vulnerabilities
62(3)
Types of Vulnerabilities
62(2)
Coverage of Controls and Other Policy Mechanisms
64(1)
Exploding Targets
65(4)
Chemical Characteristics
65(1)
Legal Considerations
66(3)
Conclusion
69(4)
4 International Regulations
73(16)
Australia
76(1)
Canada
77(1)
Singapore
78(1)
European Union
78(5)
The Standing Committee on Precursors
79(1)
Compliance Effectiveness
79(3)
Regulation Effectiveness
82(1)
Challenges and Initial Responses
83(1)
Global Shield
83(3)
Conclusion
86(3)
Market Level
86(1)
Responsible Entities
86(1)
Harmonization
87(2)
5 Assessing Possible Control Strategies
89(24)
Possible Control Strategies
91(5)
Retail-Level Controls
91(1)
Other Retail-Level Measures and Activities
92(1)
Building a Control Strategy from Controls, Measures, and Activities
93(3)
Assessing Tradeoffs Among Control Strategies
96(14)
Assessment of Benefits
97(4)
Assessment of Costs
101(3)
Consideration of Uncertainties
104(3)
Assessments of Other Measures and Activities
107(1)
Summary of Assessments and Tradeoffs
107(3)
Conclusion
110(3)
6 Potential Approaches To Restricting Malicious Actors'access To Precursor Chemicals: Conclusions And Recommendations
113(14)
Beyond Precursor Chemicals
114(1)
Recommendations
114(9)
Priority Precursor Chemicals
115(1)
Strategies at the Retail Level
116(4)
Analysis of Control Strategies
120(1)
Voluntary Measures, Activities, and Programs
121(2)
Priority Research Areas
123(2)
Data Collection from Incidents Involving Explosives
123(1)
Substitute Chemicals
124(1)
Standardized Thresholds
124(1)
Behavioral Responses
124(1)
Final Thoughts
125(2)
REFERENCES
127(14)
APPENDIXES
A Acronyms
141(4)
B Risk and Risk Management
145(8)
C History of High-Profile Bombing Attacks
153(2)
D Group A Chemical Supply Chains
155(18)
E International Questions
173(2)
F Training Materials
175(4)
G Methods and Limitations of Regulatory Assessment
179(4)
H Examples of Retail-Level Control Strategies and Other Measures or Activities
183(8)
I Committee Member and Staff Biographies
191