Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Business
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Journal of Strategic Security
Following the events of September 11, 2001, the U.S. Government began improving security in large population centers and near potential highvalue terrorist targets. Included in these efforts was the development of a more robust border security program, with an emphasis on reducing the threat of terrorist infiltration at America's borders. However, nearly a decade after 9/11, terrorism and organized crime continue to pose significant threats to the United States. As many of these threats emanate from other nations, improved border security helps mitigate these threats. This article summarizes known terrorist activity along the U.S. northern and southern borders, and highlights …
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
Journal of Strategic Security
No abstract provided.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
Journal of Strategic Security
No abstract provided.
Alternative Threat Methodology, Charles B. King Iii
Alternative Threat Methodology, Charles B. King Iii
Journal of Strategic Security
Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known). However, estimating the probability of an individual's or group's attacking a specific (or even a generic) target is an element of risk analysis in which art and intuition are applied far …