Using Behavioral Indicators to Help Detect Potential Violent Acts a Review of the Science Base

Total Page:16

File Type:pdf, Size:1020Kb

Using Behavioral Indicators to Help Detect Potential Violent Acts a Review of the Science Base CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Using Behavioral Indicators to Help Detect Potential Violent Acts A Review of the Science Base Paul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies C O R P O R A T I O N NATIONAL DEFENSE RESEARCH INSTITUTE Using Behavioral Indicators to Help Detect Potential Violent Acts A Review of the Science Base Paul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies Prepared for the United States Navy Approved for public release; distribution unlimited The research described in this report was prepared for the United States Navy. The research was conducted within the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community under Contract W74V8H-06-0002. Library of Congress Cataloging-in-Publication Data Davis, Paul K., 1952- Using behavioral indicators to help detect potential violent acts : a review of the science base / Paul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies. pages cm Includes bibliographical references. ISBN 978-0-8330-8092-9 (pbk. : alk. paper) Terrorism—Prevention. 2. Behavioral assessment. 3. Psychology—Methodology. I. Title. HV6431.D3268 2013 363.325'12--dc23 2013024014 The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND—make a tax-deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark Cover photo by Karl Baron via flickr © Copyright 2013 RAND Corporation This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND documents are protected under copyright law. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see the RAND permissions page (www.rand.org/pubs/permissions.html). RAND OFFICES SANTA MONICA, CA • WASHINGTON, DC PITTSBURGH, PA • NEW ORLEANS, LA • JACKSON, MS • BOSTON, MA DOHA, QA • CAMBRIDGE, UK • BRUSSELS, BE www.rand.org Preface This report reviews the scientific literature relating to observable behav- ioral indicators that might, along with other information, help detect potential attacks, such as those by suicide terrorists or the laying of improvised explosive devices (IEDs). The report is intended to be of interest to officials contemplating future investments amidst tightening budgets, and to researchers and analysts. It deals with individual-level indicators and does not extend to detecting society-level phenomena, such as social movements or insurgent groups. Our research built on prior RAND Corporation efforts, notably: • Walter L. Perry, Claude Berrebi, Ryan Andrew Brown, John Hollywood, Amber Jaycocks, Parisa Roshan, Thomas Sullivan, and Lisa Miyashiro, Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets, 2013. • Paul K. Davis and Kim Cragin, eds., Social Science for Counter­ terrorism: Putting the Pieces Together, 2009. • Thomas Sullivan and Walter L. Perry, “Identifying Indicators of Chemical, Biological, Radiological and Nuclear (CBRN) Weapons Development Activity in Sub-National Terrorist Groups,” Journal of Operational Research and Society, Vol. 55, No. 4, April 2004, pp. 361–374. Comments and questions are welcome and can be addressed to Paul Davis in Santa Monica ([email protected]), Ryan Brown in Santa Monica ([email protected]), or Walter Perry in Arlington, Virginia ([email protected]). iii iv Using Behavioral Indicators to Help Detect Potential Violent Acts This report was sponsored by Dr. Ivy Estabrooke, Thrust Man- ager for the Human, Social, Culture and Behavior Modeling program, and Mr. Lee Mastoianni, Thrust Manager for Force Protection, of the Office of Naval Research. The research was conducted within the Inter- national Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded research and develop- ment center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the RAND International Security and Defense Policy Center, see http://www.rand.org/nsrd/ndri/centers/ isdp.html or contact the director (contact information is provided on the web page). Contents Preface .............................................................................iii Figures .............................................................................ix Tables ..............................................................................xi Summary ........................................................................ xiii Acknowledgments .............................................................. xli Abbreviations .................................................................. xliii CHAPTER ONE Introduction ...................................................................... 1 Background ........................................................................ 1 Scope ................................................................................ 2 Types of Attack, Attacker, and Behaviors .................................... 2 Treatment of Privacy and Civil Liberty Issues ............................... 5 Structure of Approach ............................................................ 5 Recurring Themes ................................................................ 13 Chapter Structure ................................................................ 14 CHAPTER TWO Developing Intent .............................................................. 15 Motivational and Emotional Development ................................... 15 Cognitive and Emotional Underpinnings .................................. 15 Intellectual, Ideological, Religious, and Other Motivations .............. 22 Less Specific Motivations ..................................................... 24 Psychological Convergence ..................................................... 25 Recruitment or Joining .......................................................... 26 Summary Activities and Indicators ............................................ 27 v vi Using Behavioral Indicators to Help Detect Potential Violent Acts CHAPTER THREE Planning and Laying Groundwork .......................................... 29 Development of Strategic Priorities ............................................ 30 Target Identification, Intelligence, Surveillance, and Reconnaissance .... 30 Materiel Acquisition, Testing, and Development ............................ 31 Development of CONOPs ...................................................... 32 Training and Mission Rehearsal ................................................ 32 Long Lead-Time Preparations .................................................. 33 Illustrative Planning Behavioral Indicators ................................... 34 CHAPTER FOUR Immediate Pre-Execution ..................................................... 37 Psychological and Physiological Preparation for Operation ................. 38 Changing Patterns of Social Interaction ...................................... 41 Ritual Practices ..................................................................
Recommended publications
  • Intelligence Security Law Enforcement
    The Methods and Value of Behavioral Detection in Retail Michael Rozin, Doug Reynolds, Eric White MR The Threat is Real NY, USA Moscow, Russia Madrid, Spain London, UK Mumbai, India Terrorist Threat Adam Gadahn: 1. Simple Attacks. “ The fact is, the heroic Fort Hood operation opens up a host of new opportunities…“ 2. Act Individually “ We must look to further undermine the West's already-struggling economies with carefully timed-and-targeted attacks on symbols of capitalism which will again shake consumer confidence and stifle spending aspects of the Western Crusader culture….” 3. Don’t Travel Overseas “ And Brother Nidal didn't unnecessarily raise his security profile or waste money better spent on the operation itself by traveling abroad to acquire skills and instructions which could easily be acquired at home, or indeed, deduced by using one's own powers of logic and reasoning…. 4. Choose “Easy” Targets Terrorism Threat in USA • May 20, 2009 - Four Muslim converts were arrested in New York for plotting to bomb two Jewish synagogues and shoot down a military aircraft. The suspects were James Cromitie, David Williams, Onta Williams and Laguerre Payen. • June 1, 2009 – Carlos Bledsoe aka., “Abdul Muhammad” carried out a deadly shooting at a recruiting station in Little Rock, Arkansas. One soldier was killed and one was injured. • July 28, 2009 – The FBI arrested seven men in North Carolina as a part of a terrorist conspiracy to wage an Islamic holy war overseas. All seven had received paramilitary training within the US. • September 19, 2009 – Authorities arrested Najibullah Zazi on terrorism charges.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Download the List of History Films and Videos (PDF)
    Video List in Alphabetical Order Department of History # Title of Video Description Producer/Dir Year 532 1984 Who controls the past controls the future Istanb ul Int. 1984 Film 540 12 Years a Slave In 1841, Northup an accomplished, free citizen of New Dolby 2013 York, is kidnapped and sold into slavery. Stripped of his identity and deprived of dignity, Northup is ultimately purchased by ruthless plantation owner Edwin Epps and must find the strength to survive. Approx. 134 mins., color. 460 4 Months, 3 Weeks and Two college roommates have 24 hours to make the IFC Films 2 Days 235 500 Nations Story of America’s original inhabitants; filmed at actual TIG 2004 locations from jungles of Central American to the Productions Canadian Artic. Color; 372 mins. 166 Abraham Lincoln (2 This intimate portrait of Lincoln, using authentic stills of Simitar 1994 tapes) the time, will help in understanding the complexities of our Entertainment 16th President of the United States. (94 min.) 402 Abe Lincoln in Illinois “Handsome, dignified, human and moving. WB 2009 (DVD) 430 Afghan Star This timely and moving film follows the dramatic stories Zeitgest video 2009 of your young finalists—two men and two very brave women—as they hazard everything to become the nation’s favorite performer. By observing the Afghani people’s relationship to their pop culture. Afghan Star is the perfect window into a country’s tenuous, ongoing struggle for modernity. What Americans consider frivolous entertainment is downright revolutionary in this embattled part of the world. Approx. 88 min. Color with English subtitles 369 Africa 4 DVDs This epic series presents Africa through the eyes of its National 2001 Episode 1 Episode people, conveying the diversity and beauty of the land and Geographic 5 the compelling personal stories of the people who shape Episode 2 Episode its future.
    [Show full text]
  • SALAFI- JIHADISM in AFRICA BRIEF / 12 June 2021
    SALAFI- JIHADISM IN AFRICA BRIEF / 12 June 2021 A winning strategy by SERIES Giovanni Faleg* Senior Analyst, EUISS Katariina Mustasilta Postdoctoral Fellow, Finnish Institute of International Affairs Summary › Violent extremism has become a grow- ing threat throughout the African conti- INTRODUCTION nent: all sub-regions have experienced the emergence of groups active across state Violent extremism keeps spreading in Africa, showing boundaries. notable resilience despite years of counter-extremism › Today, armed actors engaging in violent and prevention efforts by governments and interna- extremism in the continent are mainly af- tional actors (1)*. In addition to killing thousands, it filiated with Islamist militant groups and costs the affected regions an estimated $97 billion in particularly Salafi-jihadist ideology. lost informal economic activity each year (2). › The spread of Salafi-jihadism in Africa is Today, armed actors engaging in violent extremism fuelled by a combination of localised griev- in the continent are mainly affiliated with Islamist ances and transnational ambitions, while militant groups and organisations and particularly tactical and strategic flexibility has in- Salafi-jihadist ideology (3). Recent data indicates a creased the resilience of insurgent groups. dangerous expansion of Salafi-jihadist armed groups › Once it has emerged as a potent force, de- — often simply labelled as violent extremist or ter- feating Salafi-jihadism on the battlefield rorist organisations (4) — beyond the traditional hot- proves very difficult as groups show enor- spots in the Sahel, Lake Chad Basin and the Horn of mous resilience, even when facing tacti- Africa to West Africa’s coastal states and Central and cal defeats. Southern Africa.
    [Show full text]
  • Media Tracking List Edition January 2021
    AN ISENTIA COMPANY Australia Media Tracking List Edition January 2021 The coverage listed in this document is correct at the time of printing. Slice Media reserves the right to change coverage monitored at any time without notification. National National AFR Weekend Australian Financial Review The Australian The Saturday Paper Weekend Australian SLICE MEDIA Media Tracking List January PAGE 2/89 2021 Capital City Daily ACT Canberra Times Sunday Canberra Times NSW Daily Telegraph Sun-Herald(Sydney) Sunday Telegraph (Sydney) Sydney Morning Herald NT Northern Territory News Sunday Territorian (Darwin) QLD Courier Mail Sunday Mail (Brisbane) SA Advertiser (Adelaide) Sunday Mail (Adel) 1st ed. TAS Mercury (Hobart) Sunday Tasmanian VIC Age Herald Sun (Melbourne) Sunday Age Sunday Herald Sun (Melbourne) The Saturday Age WA Sunday Times (Perth) The Weekend West West Australian SLICE MEDIA Media Tracking List January PAGE 3/89 2021 Suburban National Messenger ACT Canberra City News Northside Chronicle (Canberra) NSW Auburn Review Pictorial Bankstown - Canterbury Torch Blacktown Advocate Camden Advertiser Campbelltown-Macarthur Advertiser Canterbury-Bankstown Express CENTRAL Central Coast Express - Gosford City Hub District Reporter Camden Eastern Suburbs Spectator Emu & Leonay Gazette Fairfield Advance Fairfield City Champion Galston & District Community News Glenmore Gazette Hills District Independent Hills Shire Times Hills to Hawkesbury Hornsby Advocate Inner West Courier Inner West Independent Inner West Times Jordan Springs Gazette Liverpool
    [Show full text]
  • Ron Reagan Does Not Consider Himself an Activist
    Photoshop # White Escaping from my Top winners named ‘Nothing Fails father’s Westboro in People of Color Like Prayer’ contest Baptist Church student essay contest winners announced PAGES 10-11 PAGE 12-16 PAGE 18 Vol. 37 No. 9 Published by the Freedom From Religion Foundation, Inc. November 2020 Supreme Court now taken over by Christian Nationalists President Trump’s newly confirmed Supreme Court Justice Amy Coney Barrett is going to be a disaster for the constitutional prin- ciple of separation between state and church and will complete the Christian Nationalist takeover of the high court for more than a generation, the Freedom From Religion Foundation asserts. Barrett’s biography and writings reveal a startling, life-long allegiance to religion over the law. The 48-year-old Roman Catholic at- tended a Catholic high school and a Presby- terian-affiliated college and then graduated from Notre Dame Law School, where she Photo by David Ryder taught for 15 years. She clerked for archcon- Amy Coney Barrett Despite his many public statements on atheism, Ron Reagan does not consider himself an activist. servative Justice Antonin Scalia, and signifi- cantly, like the late justice, is considered an “originalist” or “textual- ist” who insists on applying what is claimed to be the “original intent” of the framers. She and her parents have belonged to a fringe con- servative Christian group, People of Praise, which teaches that hus- Ron Reagan — A leading bands are the heads of household. Barrett’s nomination hearing for a judgeship on the 7th U.S. Circuit Court of Appeals, where she has served for less than three years, documented her many controversial figure of nonbelievers and disturbing positions on religion vis-à-vis the law.
    [Show full text]
  • LUSEM Thesis Template
    Drinking from the Fountain of Youth? Brand rejuvenation in the case of heritage luxury fashion brands Insights from Millennial consumers by Katharina Netek & Feline Carbone June 2020 MSc in International Marketing & Brand Management Supervisor: Ekaterini Drosou Examiner: Jayne Jönsson Abstract Title Drinking from the Fountain of Youth? - Brand rejuvenation in the case of heritage luxury fashion brands Seminar date June 4, 2020 Course BUSN39: Degree Project in Global Marketing Authors Feline Carbone and Katharina Netek Supervisor Ekaterini Drosou, Supervisor at Lund University Keywords Heritage brands; Luxury fashion brands; Brand rejuvenation; Millennials; Brand identity Thesis The aim of this study was to examine whether German Millennials are in purpose favor of rejuvenation practices of heritage luxury fashion brands or if such actions instead lead to negative associations, as they tend to ignore the heritage aspect. Methodology Following a relativist ontology, this research is guided by a social constructionist position, which allows a deep understanding of Millennials’ opinions. To explore their viewpoints on rejuvenation practices of heritage luxury fashion brands, we chose a qualitative method with an abductive approach. To analyze the data, a thematic approach has been adopted. Theory We used the concepts of brand identity and brand image, as well as the Consumer-Company Identification framework, to understand Millennials’ opinions on rejuvenation practices and illuminate how such attempts impact the brand image hold by the consumers. Empirical 18 semi-structured in-depth interviews with German Millennial consumers data were conducted. Conclusion We found that Millennials are generally in favor of rejuvenation practices of heritage luxury fashion brands (e.g. collaborations with youth brands).
    [Show full text]
  • A Case Study on the Fuerzas Armadas De Liberación Nacional (FALN)
    Effects and effectiveness of law enforcement intelligence measures to counter homegrown terrorism: A case study on the Fuerzas Armadas de Liberación Nacional (FALN) Final Report to the Science & Technology Directorate, U.S. Department of Homeland Security August 2012 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 3300 Symons Hall • College Park, MD 20742 • 301.405.6600 • www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Roberta Belli of John Jay College of Criminal Justice, City University of New York. Questions about this report should be directed to Dr. Belli at [email protected]. This report is part of a series sponsored by the Human Factors/Behavioral Sciences Division, Science and Technology Directorate, U.S. Department of Homeland Security, in support of the Prevent/Deter program. The goal of this program is to sponsor research that will aid the intelligence and law enforcement communities in identifying potential terrorist threats and support policymakers in developing prevention efforts. This research was supported through Grant Award Number 2 009ST108LR0003 made to the START Consortium and the University of Maryland under principal investigator Gary LaFree. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START.
    [Show full text]
  • Framing 'Jihadjane'
    What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks.
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • Teachers Guide
    Teachers Guide Exhibit partially funded by: and 2006 Cartoon Network. All rights reserved. TEACHERS GUIDE TABLE OF CONTENTS PAGE HOW TO USE THIS GUIDE 3 EXHIBIT OVERVIEW 4 CORRELATION TO EDUCATIONAL STANDARDS 9 EDUCATIONAL STANDARDS CHARTS 11 EXHIBIT EDUCATIONAL OBJECTIVES 13 BACKGROUND INFORMATION FOR TEACHERS 15 FREQUENTLY ASKED QUESTIONS 23 CLASSROOM ACTIVITIES • BUILD YOUR OWN ZOETROPE 26 • PLAN OF ACTION 33 • SEEING SPOTS 36 • FOOLING THE BRAIN 43 ACTIVE LEARNING LOG • WITH ANSWERS 51 • WITHOUT ANSWERS 55 GLOSSARY 58 BIBLIOGRAPHY 59 This guide was developed at OMSI in conjunction with Animation, an OMSI exhibit. 2006 Oregon Museum of Science and Industry Animation was developed by the Oregon Museum of Science and Industry in collaboration with Cartoon Network and partially funded by The Paul G. Allen Family Foundation. and 2006 Cartoon Network. All rights reserved. Animation Teachers Guide 2 © OMSI 2006 HOW TO USE THIS TEACHER’S GUIDE The Teacher’s Guide to Animation has been written for teachers bringing students to see the Animation exhibit. These materials have been developed as a resource for the educator to use in the classroom before and after the museum visit, and to enhance the visit itself. There is background information, several classroom activities, and the Active Learning Log – an open-ended worksheet students can fill out while exploring the exhibit. Animation web site: The exhibit website, www.omsi.edu/visit/featured/animationsite/index.cfm, features the Animation Teacher’s Guide, online activities, and additional resources. Animation Teachers Guide 3 © OMSI 2006 EXHIBIT OVERVIEW Animation is a 6,000 square-foot, highly interactive traveling exhibition that brings together art, math, science and technology by exploring the exciting world of animation.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]