Transnational Threats: Blending Law Enforcement and Military Strategies

Portada
DIANE Publishing, 2000 - 258 páginas
On February 2-3, 2000, the U.S. Army War College, the Triangle Institute for Security Studies, and the Duke University Center for Law, Ethics, and National Security co-sponsored a conference in Chapel Hill, North Carolina. The conference examined transnational threats, including terrorism involving weapons of mass destruction, cyber threats to the national infrastructure, and international organized crime. The goal was to evaluate the seriousness of such threats and discuss strategies for dealing with them. In particular, the conference sought to address the question of how military and law enforcement could blend their strategies to better counter transnational threats. A secondary purpose was to clarify the role of the military in meeting challenges that transcend national borders and threaten our national interests. This book highlights some of the main issues and themes that ran through the conference. After looking at the various threats and undertaking a risk assessment, the report considers the unique aspects of transnational threats, and then identifies the key challenges facing the United States, paying particular attention to the role of the military. The book concludes with discussions of some of the steps that should be taken to secure ourselves against transnational threats.
 

Páginas seleccionadas

Otras ediciones - Ver todas

Términos y frases comunes

Pasajes populares

Página 103 - Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction.
Página 226 - To complain of the age we live in, to murmur at the present possessors of power, to lament the past, to conceive extravagant hopes of the future, are the common dispositions of the greatest part of mankind ; indeed the necessary effects of the ignorance and levity of the vulgar.
Página 107 - Weapon of Mass Destruction (WMD) is too traditional and narrow. Title 50 USC Section 2032(1), in part defines a WMD as "any weapon or device that is intended, or has the capability, to cause death or serious bodily injury to a significant number of people through the release, dissemination, or impact of toxic or poisonous chemicals or their precursors; a disease organism; or radiation or radioactivity.
Página 156 - Opinions expressed in this paper are those of the author and should not be construed as representing the opinions or policy of any agency of the United States government.
Página 102 - ... terrorists have been apprehended, tried and given severe prison terms. Yet America's unrivaled military superiority means that potential enemies — whether nations or terrorist groups — that choose to attack us will be more likely to resort to terror instead of conventional military assault. Moreover, easier access to sophisticated technology means that the destructive power available to terrorists is greater than ever. Adversaries may thus be tempted to use unconventional tools, such as weapons...
Página 104 - Lebanon that killed 241; the 1985 inflight bombing of an Air India passenger jet that killed all 328 persons on board; the simultaneous explosions that rocked an ammunition dump in Islamabad, Pakistan in 1988; the bombing of Pan Am flight 103 in 1988 that killed 278 persons;, the 1989 inflight bombing of a French UTA flight that killed 171; and the inflight bombing, as in 1989, of a Colombian Avianea aircraft on which 107 persons perished.
Página 228 - Commission on the Roles and Capabilities of the US Intelligence Community, Preparing for the 21st Century: An Appraisal of US Intelligence...
Página 150 - Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Página 251 - DoD, and pursues research and technology where risk and payoff are both very high and where success may provide dramatic advances for traditional military roles and missions.
Página 250 - Program 3 will develop robust intelligence and law enforcement capabilities to protect critical information systems, consistent with the law. It will assist, transform, and strengthen US law enforcement and intelligence Agencies to be able to deal with a new kind of threat and a new kind of criminal - one that acts against computer networks. Program 4 calls for a more effective nationwide system to share attack warnings and information...

Información bibliográfica