126 Search results

For the term "n-a".

Research Highlights the Pakistan-Afghanistan Border

This article from the spring, 2008 issue of International Security focuses on the most important geographic location in the struggle against terrorism – the Afghanistan/Pakistan Border. “No Sign until the Burst of Fire: Understanding the Pakistan-Afghanistan Frontier.” “The Pakistan- Afghanistan border region has experienced turbulence for centuries. Today a portion...

Russian-American Nuclear Security Advisory Council publishes compilation on WMD security

The Russian-American Nuclear Security Advisory Council (RANSAC) has posted a compilation of documents issued at the 2006 G8 Summit in Saint Petersburg, Russia addressing WMD security and elimination efforts, combating nuclear terrorism, global energy security, fighting infectious diseases, and other issues. This compilation, as well as the Summit’s consolidated annual...

National Defense University Spotlight Seminar: Maintaining Strategic Stability in a Changing Security Environment

When: July 21, 2016 @ 12:30 pm – 2:00 pm
Where: National Defense University (NDU) Lincoln Hall, Room 1107, Fort Lesley J. McNair, Washington, DC 20024, USA

The National Defense University’ s “Spotlight Seminar” is hosted by NDU’s Center for the Study of Weapons of Mass Destruction.  More information concerning this event is listed below. Today’s global security environment is growing more complicated than ever, including a greater number of influential state actors and the emergence of...

survellience

EO 12333, More Questions Than Answers

The Brennan Center for Justice has released a report, Overseas Surveillance in an Interconnected World, which discusses the many aspects of Executive Order (EO) 12333. This presidential directive from Ronald Reagan, deals with the National Security Agency’s (NSA) surveillance operations overseas. Though there has been constant debate about domestic surveillance, there has...

ISIL and al-Qaeda: “Protagonists in Today’s Deadliest Crises”

On March 14, 2016, the International Crisis Group (ICG) released a report regarding the roots and expansion of two deadliest extremist groups, ISIL [Islamic State of Iraq and the Levant] (also known as ISIS [Islamic State of Iraq and Syria] or IS [Islamic State]) and al-Qaeda. Groups like ISIL and al-Qaeda (like Boko Haram and...

Active Shooters: Preparation, Mitigation, and Response

Columbine, Virginia Tech, Fort Hood, Aurora, Newtown, Colorado Springs, San Bernardino. In an age of increasingly common active shooter incidents, this seemingly random list of locations is all too familiar to Americans. Aiming to increase preparedness for future events, the Interagency Security Committee released Planning and Response to an Active Shooter:...

Answering San Bernardino:Defining Terrorism and Home Grown Extremism

As details of the mass shooting in San Bernardino continue to emerge, America is once again confronted with difficult questions. In the immediate aftermath, many wondered: was this a terrorist attack or a personal grievance? What differentiates the events of San Bernardino from last week’s attack on Planned Parenthood in...

Paris Terrorist Attacks: HSDL Highlights Information Resources

With the recent terrorist attacks in Paris being broadcast globally via news outlets and social media, it is only natural for citizens and policy makers to begin asking questions and seek out information regarding the attacks.  Questions about who the attackers were, why they attacked Paris, and whether the United...

ICIT Chastises OPM’s Lack of Modern Cybersecurity in an Official Analysis

The Institute for Critical Infrastructure Technology (ICIT) describes itself as a “nonprofit (status pending), non-partisan group of the world’s most innovative experts and companies that provide technologies and solutions to support and protect our nation’s critical infrastructures.” ICIT serves as a go-between for the private sector, federal agencies, and the...

Screening Gaps for Foreign Shipments DamageUS Security and Economy, Study Says

Picture two packages.  They contain identical contents, were purchased from the same independent online retailer in Canada, and are shipped to the same US address. One distinguishing factor, however, is likely to determine whether or not they will be screened by US Customs and Border Protection. Copenhagen Economics recently unveiled...