Identity Crisis: Defining the Problem and Framing a Solution for Terrorism Incident Response

Authors
Landahl, Mark
Advisors
Second Readers
Subjects
Date of Issue
2007-09-00
Date
2007-09
Publisher
Monterey, CA; Naval Postgraduate School Center for Homeland Defense and Security
Language
Abstract
The analysis of domestic incidents of terrorism has revealed many gaps in our nation's capability to effectively manage the multi-jurisdictional response. Although many gaps have been addressed through implementation of measures based on lessons learned, the most pervasive unresolved issue remains the ability to properly identify first response personnel on incident scenes. The nature of incidents of terrorism requires force protection to be a priority because of the threat of a secondary attack. Identity must be established and authenticated to protect responders and prevent infiltration. This article defines the problem of identity management for terrorism incident response and examines two potential options for closing this glaring capability gap. The first option, a typed Identity Management Team response resource, is developed and defined through analysis of the response to previous domestic incidents of terrorism. The second option, a comprehensive nationwide identity solution for first responders, is examined in light of the federal government implementation of HSPD-12. The article recommends immediate development of typed identity management response resources and a thorough study of federal HSPD-12 implementation for its applicability to incident response deficiencies.
Type
Article
Description
This article appeared in Homeland Security Affairs (September 2007), v.3 no.3
Department
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Homeland Security Affairs (September 2007), v.3 no.3
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
The copyright of all articles published in Homeland Security Affairs rests with the author[s] of the articles. Any commercial use of Homeland Security Affairs or the articles published herein is expressly prohibited without the written consent of the copyright holder. Anyone can copy, distribute, or reuse these articles as long as the author and original source are properly cited.
Collections