The book examines the evolving nature of national and international security in the post-Cold War era, focusing on non-military threat potentials and how these may best countered. Six specific issues are discussed: terrorism, the heroin and cocaine trade, privacy, environmental degradation, the spread of disease, and uncontrolled migration. The book concludes that greater national coordination, inter-agency cooperation, and international collaboration is needed if these problems are going to be dealt with effectively.
The book examines the evolving nature of national and international security in the post-Cold War era, focusing on non-military threat potentials and ...
It is generally agreed within Hebrew Bible scholarship that Zechariah 9-14 is filled with allusions to other books within the Hebrew canon. Rex Mason's doctoral dissertation in the early 1970s contributed significantly to the foundation of this consensus. However, although Mason's thesis remains a seminal work for those studying Deutero-Zechariah, it has never been published. This volume contains a publication of that work together with reflections from leading biblical scholars who have published on Zechariah 9-14. The volume is rounded off with a response by Mason to these scholars and a...
It is generally agreed within Hebrew Bible scholarship that Zechariah 9-14 is filled with allusions to other books within the Hebrew canon. Rex Mason'...
Since the attacks of September 11, 2001, critics have charged that the FBI is not well enough equipped to adequately gather and assess information to prevent future attacks. This title reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the US, separate to the FBI, would be beneficial.
Since the attacks of September 11, 2001, critics have charged that the FBI is not well enough equipped to adequately gather and assess information to ...
Assesses the vulnerabilities of the agricultural sector and the food chain to a deliberate act of biological terrorism and explores the likely outcomes of a successful attack. Over the past decade, the United States has endeavoured to increase its ability to detect, prevent and respond to terrorist threats and incidents. The agriculture sector and the food industry in general, however, have received comparatively little attention with respect to protection against terrorist incidents. This study aims to expand the current debate on domestic homeland security by assessing the vulnerabilities...
Assesses the vulnerabilities of the agricultural sector and the food chain to a deliberate act of biological terrorism and explores the likely outcome...
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologies and knowledge in an effort to innovate (i.e., improve their operational capabilities). The analysis provides national security policymakers with insight into the innovation process and suggests ways that government policies can create barriers to terrorists1 adoption of new technologies.
Case studies of 11 terrorist groups in Mindanao, the West Bank and Gaza Strip, and southwest Colombia show how these groups have exchanged technologie...
Examines al-Qaeda's evolution and the emergence of the broader global jihadist movement--groups affiliated, associated, or inspired by al-Qaeda--and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the jihadist threat.
Examines al-Qaeda's evolution and the emergence of the broader global jihadist movement--groups affiliated, associated, or inspired by al-Qaeda--and t...
Though the historical occurrence of maritime terrorist attacks has been limited, maritime vessels and facilities may nevertheless be vulnerable to attack, with the potential for very significant consequences in the form of mass casualties, severe property damage, and disruption of commerce. This book explores maritime terrorism threats, vulnerabilities, and consequences, as well as the application of civil liability.
Though the historical occurrence of maritime terrorist attacks has been limited, maritime vessels and facilities may nevertheless be vulnerable to att...
The book examines the dynamic of West European terrorism and counter-terrorism as it has evolved since the late 1960s. It assesses past, present and future terrorist trends and analyzes the internal security policies that have been initiated by the member states of the European Union (EU), both singularly and collectively, to combat terrorism in Western Europe. Throughout the book the theme of liberal democratic legitimacy and accountability is stressed, something that is brought particularly to bear on the latest EU internal security provision - the Maastricht Third Pillar.
The book examines the dynamic of West European terrorism and counter-terrorism as it has evolved since the late 1960s. It assesses past, present and f...
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist violence. This study draws on relevant data from the history of a variety of terrorist conflicts to unders
Technology systems play a key role within a larger, integrated strategy to target groups' efforts and protect the public from the threat of terrorist ...
Current unrest in the Malay-Muslim provinces of southern Thailand has captured growing national, regional, and international attention due to the heightened tempo and scale of rebel attacks, the increasingly jihadist undertone that has come to characterize insurgent actions, and the central government's often brutal handling of the situation on the ground. This paper assesses the current situation and its probable direction.
Current unrest in the Malay-Muslim provinces of southern Thailand has captured growing national, regional, and international attention due to the heig...