391-420 Social Media articles displayed
for the Security Topic
|
Building the Global Counterterrorism Network |
The spread of the terrorist threat across the globe is identified by Michael Vickers (ASD/SOLIC&IC) as the long-term strategic challenge in the GWOT. He asserts it is primarily an intelligence war an...
Read More...
|
|
|
Obama inheriting broad covert ops policies |
Some predict that in order to maintain flexibility and not hamper the ability of intelligence and military to combat terrorists, President-elect Obama is unlikely to rescind Bush’s directive allowing ...
Read More...
|
|
|
A seven-year journey in Afghanistan |
We began a journey in Afghanistan seven years ago with the war that ousted the Taliban from power, writes Afghan President Hamid Karzai. (The Daily Star, 11/14/2008)
Read More...
|
|
|
The Money Trail: Finding, Following, and Freezing Terrorist Finance |
A report by two former Treasury Department intelligence officials includes an analysis of the evolution of terrorist financing since 2001. They contend that a viable counterterrorism strategy must al...
Read More...
|
|
|
Should the United States Establish a Dedicated Domestic Intelligence Agency for Counterterrorism? |
A RAND study requested by DHS, Office of Intelligence & Analysis provides a framework for debate on the pros and cons of creating a domestic intelligence agency. Many policy choices must be considere...
Read More...
|
|
|
Government urged to improve information sharing before crises |
A Stimson Center report discusses the need for improved intelligence sharing in a threat environment that includes pandemics, natural disaster, and terrorism with much relevant information outside tra...
Read More...
|
|
|
U.S. Study Is Said to Warn of Crisis in Afghanistan |
A forthcoming National Intelligence Estimate to be issued after the November elections cautions a decline for Afghanistan’s central authority. Among the factors cited are continued cross-border attac...
Read More...
|
|
|
Kashmir's New Generation |
The shift from armed struggle to peaceful protest opens a new vista in Indian-controlled Kashmir – and may create a precedent for Muslim movements elsewhere, says Muzamil Jaleel. (Open Democracy, 10/1...
Read More...
|
|
|
Senate Approves Bill to Broaden Wiretap Powers |
After two and a half years of heated debate over the balance between security and civil liberties, the U.S. Senate approves the largest overhaul of surveillance law in three decades. It facilitates e...
Read More...
|
|
|
Pakistan's new spy chief |
Pakistan chooses former head of Military Operations as Director General of its intelligence agency, ISI. This and more than a dozen other appointments come amidst US concerns over ISI loyalties and p...
Read More...
|
|
|
The counterterrorism paradox |
The author asserts that the military actions-side of the War on Terror has done little to diminish the terrorist threat to the U.S. He advocates a more ‘subtle’ global strategy, one that develops all...
Read More...
|
|
|
Study of Data Mining for Terrorists Is Urged |
The National Research Council contends that there are fundamental problems with applying commercial data mining tools to the tracking of terrorists. Among the legal, technological and logistical prob...
Read More...
|
|
|
Tackling terror: India takes lessons from US |
India national security advisor is briefed on the operations of the DHS by Under Secretary for Intelligence and Analysis of the Department of Homeland Security to learn how better to coordinate the co...
Read More...
|
|
|
Security, Surveillance and Satellites |
Congress has authorized funds to begin implementation of the DHS National Applications Office (NAO) program to utilize geospatial intelligence capabilities for domestic purposes. It will enhance port...
Read More...
|
|
|
The Fragility of the Global Nuclear Order |
In today's fragile international political climate the structures in place to deal with nuclear non-proliferation have become complacent. An event of the magnitude of the 1968 Non-proliferation Treaty...
Read More...
|
|
|
C.I.A. Outlines Pakistan Links With Militants |
Addressing continuing concerns about ISI loyalties, the CIA confronts Pakistan with evidence of ties between its intelligence service and militant groups operating in the country’s tribal areas. By M...
Read More...
|
|
|
Homeland Security lacking 'open source' intelligence |
A report by the House Committee on Homeland Security criticizes the DHS for being behind the rest of the intelligence community in its OSINT efforts. The Committee says not enough has been done to p...
Read More...
|
|
|
A Real Network of Terror? |
Claims by Al-Qaeda that they have a functioning and effective terrorist network in the Maghreb region of North Africa and examined. Although a number of recent terror attacks seem to support the claim...
Read More...
|
|
|
Zawahiri Tries to Clear Name, Explain Strategy |
“The Exoneration” and other written expositions by Al Qaida’s number 2 may be a signal that the organization is trying to salvage its diminishing public support by tying its operations and activities ...
Read More...
|
|
|
Pakistan on the Brink |
Mismanaged “war on terror” has stirred extremism, threatening to rip Pakistan apart, writes Ahmed Rashid. (Yale Global, 09/19/2008)
Read More...
|
|
|
IA-Forum Interview: Haider Mullick |
IA-Forum speaks with Haider Mullick, senior fellow at the Joint Special Operations University, about the security situation in Pakistan. By Jason Miks (09/16/2008)
Read More...
|
|
|
How to Leave a Stable Iraq |
The situation in Iraq is improving. With the right strategy the United States will eventually be able to draw down troops without sacrificing stability. By Biddle, O'Hanlon & Pollack (Foreign Affairs,...
Read More...
|
|
|
The Bomb in the Basement |
The author argues that should Iran come close to becoming a nuclear power, Isreal will need to adopt its stance on its own nuclear arsenal from one of ambiguos non-disclosure to one of defensive but t...
Read More...
|
|
|
Walling Off Iraq: Israel's Imprint on U.S. Counterinsurgency Doctrine |
Details the similarities between American counter-insurgency techniques used in Iraq with those practiced by Isreal against Palestinian populations, particularly the use of barriers to separate differ...
Read More...
|
|
|
Al Qaeda in the Tribal Areas of Pakistan and Beyond |
An examination of the post-September movements of Al-Qaeda as they recovered from the US-led invasion of Afghanistan and moved their base of operations to the remote tribal areas of Pakistan. (Studies...
Read More...
|
|
|
Asia-Pacific moves to boost cyber security |
Cooperation key to Asian countries' efforts to bolster cyber security. By Jason Miks (This article was originally published by World Politics Review on 08/18/2008)
Read More...
|
|
|
Fissile Material, Stockpiles, and the Nuclear Menace |
Author discusses nuclear nonproliferation efforts to halt the production of weapons-grade fissile material and to fortify stockpiles. By Brandon M. Boylan. (08/03/2008)
Read More...
|
|
|
The Colombian Miracle: Gaining Belated Notice |
Author argues that following the daring rescue of Ingrid Betancourt and some other hostages, its time for rest of the world to acknowledge Colombia's imperfect, but no less miraculous turnaround. By F...
Read More...
|
|
|
SIPRI Yearbook 2008 Summery |
Report analyses current status of international security, peace and arms control. It also includes important statistics such as world military expenditure, major armed conflicts, arms production and t...
Read More...
|
|
|
Stop Looking for 'Moderate' Shiites and Address Interests. |
Author argues for more pragmatic, comprehensive approach from Western powers to deal with Shiite majority Middle Eastern countries and their rising influence. By Parag Khanna. (World Politics Review, ...
Read More...
|
|
1-30 | 31-60 | 61-90 | 91-120 | 121-150 | 151-180 | 181-210 | 211-240 | 241-270 | 271-300 | 301-330 | 331-360 | 361-390 | 391-420 | 421-450 | 451-480 | 481-510 | 511-540 | 541-570 | 571-600 | 601-630 | 631-660 | 661-690 | 691-720 | 721-750 | 751-780 | 781-810 | 811-840 | 841-870 | 871-900 | 901-930 | 931-960 | 961-990 | 991-1020 | 1021-1036
|
|
|