Science and Technology of Terrorism and Counterterrorism Second Edition

Science and Technology of Terrorism and Counterterrorism  Second Edition
Author: Mark A. Prelas,Dabir S. Viswanath,Sudarshan K. Loyalka
Publsiher: CRC Press
Total Pages: 604
Release: 2010-08-10
ISBN 10: 1420071823
ISBN 13: 9781420071825
Language: EN, FR, DE, ES & NL

Science and Technology of Terrorism and Counterterrorism Second Edition Book Review:

Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, the second edition of Science and Technology of Terrorism and Counterterrorism discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can deal with terrorist groups. This volume begins by introducing the shift in analysis of terrorist attacks after September 11, 2001 and summarizes selected case studies. It discusses the origin and nature of terrorism and the factors involved in diplomacy. Covering a broad range of topics, the book examines: Aerosol dispersion of toxic materials Bioterrorism and the manufacture, detection, and delivery of biological agents Agricultural terrorism Nuclear terrorism and nuclear weapons systems, threats, and safeguards Chemical terrorism, including manufacture, detection, delivery, and decontamination Cyber-terrorism Personal protective equipment The role of government at federal, state, and local levels The role of international agencies and their resources, capabilities, and responsibilities The National Infrastructure Protection Plan As terrorist activities increase globally, it is critical that those charged with protecting the public understand the myriad of ways in which terrorists operate. While we cannot predict where, when, and how terrorists will strike, our vigilance in staying abreast of the terrorist threat is the only way to have a fighting chance against those who seek to destroy our world.

Science and Technology to Counter Terrorism

Science and Technology to Counter Terrorism
Author: International Strategic and Security Studies Programme of the National Institute of Advanced Studies,National Academy of Sciences,Committee on International Security and Arms Control
Publsiher: National Academies Press
Total Pages: 180
Release: 2007-02-27
ISBN 10: 9780309179164
ISBN 13: 0309179165
Language: EN, FR, DE, ES & NL

Science and Technology to Counter Terrorism Book Review:

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.

Making the Nation Safer

Making the Nation Safer
Author: National Research Council,Division on Engineering and Physical Sciences,Committee on Science and Technology for Countering Terrorism
Publsiher: National Academies Press
Total Pages: 440
Release: 2002-09-05
ISBN 10: 9780309182720
ISBN 13: 0309182727
Language: EN, FR, DE, ES & NL

Making the Nation Safer Book Review:

Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures â€" transportation, information and telecommunications systems, health systems, the electric power grid, emergency response units, food and water supplies, and others â€" make them susceptible to terrorist attacks. Making the Nation Safer discusses technical approaches to mitigating these vulnerabilities. A broad range of topics are covered in this book, including: Nuclear and radiological threats, such as improvised nuclear devices and “dirty bombs;†Bioterrorism, medical research, agricultural systems and public health; Toxic chemicals and explosive materials; Information technology, such as communications systems, data management, cyber attacks, and identification and authentication systems; Energy systems, such as the electrical power grid and oil and natural gas systems; Transportation systems; Cities and fixed infrastructures, such as buildings, emergency operations centers, and tunnels; The response of people to terrorism, such as how quality of life and morale of the population can be a target of terrorists and how people respond to terrorist attacks; and Linked infrastructures, i.e. the vulnerabilities that result from the interdependencies of key systems; In each of these areas, there are recommendations on how to immediately apply existing knowledge and technology to make the nation safer and on starting research and development programs that could produce innovations that will strengthen key systems and protect us against future threats. The book also discusses issues affecting the government’s ability to carry out the necessary science and engineering programs and the important role of industry, universities, and states, counties, and cities in homeland security efforts. A long term commitment to homeland security is necessary to make the nation safer, and this book lays out a roadmap of how science and engineering can assist in countering terrorism.

Counter Terrorism Technologies

Counter Terrorism Technologies
Author: Peter Lehr
Publsiher: Springer
Total Pages: 217
Release: 2018-07-10
ISBN 10: 331990924X
ISBN 13: 9783319909240
Language: EN, FR, DE, ES & NL

Counter Terrorism Technologies Book Review:

This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies – weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a ‘silver bullet’ approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?

Information Technology for Counterterrorism

Information Technology for Counterterrorism
Author: National Research Council,Division on Engineering and Physical Sciences,Computer Science and Telecommunications Board,Committee on the Role of Information Technology in Responding to Terrorism
Publsiher: National Academies Press
Total Pages: 144
Release: 2003-04-07
ISBN 10: 0309087368
ISBN 13: 9780309087360
Language: EN, FR, DE, ES & NL

Information Technology for Counterterrorism Book Review:

Information technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Counterterrorism

Counterterrorism
Author: Davis Langdon
Publsiher: CRC Press
Total Pages: 241
Release: 2015-07-17
ISBN 10: 1482237164
ISBN 13: 9781482237160
Language: EN, FR, DE, ES & NL

Counterterrorism Book Review:

Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author BenoGomis r

Homegrown Violent Extremism

Homegrown Violent Extremism
Author: Erroll Southers
Publsiher: Routledge
Total Pages: 124
Release: 2014-09-25
ISBN 10: 1317522435
ISBN 13: 9781317522430
Language: EN, FR, DE, ES & NL

Homegrown Violent Extremism Book Review:

In the country’s changing threat environment, homegrown violent extremism (HVE) represents the next challenge in counterterrorism. Security and public policy expert Erroll Southers examines post-9/11 HVE – what it is, the conditions enabling its existence, and the community-based approaches that can reduce the risk of homegrown terrorism. Drawing on scholarly insight and more than three decades on the front lines of America’s security efforts, Southers challenges the misplaced counterterrorism focus on foreign individuals and communities. As Southers shows, there is no true profile of a terrorist. The book challenges how Americans think about terrorism, recruitment, and the homegrown threat. It contains essential information for communities, security practitioners, and policymakers on how violent extremists exploit vulnerabilities in their communities and offers approaches to put security theory into practice.

Dual Use Science and Technology Ethics and Weapons of Mass Destruction

Dual Use Science and Technology  Ethics and Weapons of Mass Destruction
Author: Seumas Miller
Publsiher: Springer
Total Pages: 122
Release: 2018-05-22
ISBN 10: 3319926063
ISBN 13: 9783319926063
Language: EN, FR, DE, ES & NL

Dual Use Science and Technology Ethics and Weapons of Mass Destruction Book Review:

This book deals with the problem of dual-use science research and technology. It first explains the concept of dual use and then offers analyses of collective knowledge and collective ignorance. It goes on to present a theory of collective responsibility, followed by four chapters focusing on a particular scientific field or industry of dual use concern: the chemical industry, the nuclear industry, cyber-technology and the biological sciences. The problem of dual-use science research and technology arises because such research and technology has the potential to be used for great evil as well as for great good. On the one hand, knowledge is a necessary condition, and perhaps a constitutive feature, of technologies that contribute greatly to individual and collective well-being. Consider, for example, nuclear technology that enables the generation of low cost electricity in populations without obvious alternative energy sources. So technological knowledge is a good thing and ignorance of it a bad thing. On the other hand, these same technologies can be extremely harmful to individuals and collectives, as with the atomic bombs dropped on Hiroshima and Nagasaki. So, at least with respect to some technologies evidently knowledge is a bad thing and ignorance a good thing. Accordingly, the question arises as to whether we ought to limit scientific research and/or the development of technology and, if so, which research or technology, in what manner and to what extent. This book examines the answer to that question.

Countering Bioterrorism

Countering Bioterrorism
Author: National Research Council,Institute of Medicine,Committee on Science and Technology for Countering Terrorism,Panel on Biological Issues
Publsiher: National Academies Press
Total Pages: 105
Release: 2003-01-03
ISBN 10: 0309086078
ISBN 13: 9780309086073
Language: EN, FR, DE, ES & NL

Countering Bioterrorism Book Review:

The attacks of September 11 and the release of anthrax spores revealed enormous vulnerabilities in the U.S. public-health infrastructure and suggested similar vulnerabilities in the agricultural infrastructure as well. The traditional public health response-surveillance (intelligence), prevention, detection, response, recovery, and attribution-is the paradigm for the national response not only to all forms of terrorism but also to emerging infectious diseases. Thus, investments in research on bioterrorism will have enormous potential for application in the detection, prevention, and treatment of emerging infectious diseases that also are unpredictable and against which we must be prepared. The deciphering of the human genome sequence and the complete elucidation of numerous pathogen genomes, our rapidly increasing understanding of the molecular mechanisms of pathogenesis and of immune responses, and new strategies for designing drugs and vaccines all offer unprecedented opportunities to use science to counter bioterrorist threats. But these same developments also allow science to be misused to create new agents of mass destruction. Hence the effort to confront bioterrorism must be a global one. Countering Bioterrorism makes the following recommendations: Recommendation 1: All agencies with responsibility for homeland security should work together to establish stronger and more meaningful working ties between the intelligence, S&T, and public health communities. Recommendation 2: Federal agencies should work cooperatively and in collaboration with industry to develop and evaluate rapid, sensitive, and specific early-detection technologies. Recommendation 3: Create a global network for detection and surveillance, making use of computerized methods for real-time reporting and analysis to rapidly detect new patterns of disease locally, nationally, and ultimately- internationally. The use of high-throughput methodologies that are being increasingly utilized in modern biological research should be an important component of this expanded and highly automated surveillance strategy. Recommendation 4: Use knowledge of complex biological patterns and high-throughput laboratory automation to classify and diagnose infections in patients in primary care settings. Recommendation 5: USDA should create an agency for control and prevention of plant disease. This agency should have the capabilities necessary to deal effectively with biothreats.

Counter Terrorism for Emergency Responders

Counter Terrorism for Emergency Responders
Author: Robert A. Burke
Publsiher: CRC Press
Total Pages: 1094
Release: 2017-10-31
ISBN 10: 1498752004
ISBN 13: 9781498752008
Language: EN, FR, DE, ES & NL

Counter Terrorism for Emergency Responders Book Review:

Using the authors many years of experience in emergency services and his skills as a hazardous materials consultant, prepares the first responder to handle everything from re-establishing control and on-scene triage to investigating the crime. Including information on pre-incident and avoidance tactics, the author also discusses monitoring and detection techniques, protective equipment and decontamination, and an extensive list of resource organizations and training opportunities. This up-to-date 3rd edition is written to provide concise information for emergency responders who might be called upon to confront explosive, chemical, nuclear, biological, or incendiary acts of terrorism.

India United States Cooperation on Science and Technology for Countering Terrorism

India United States Cooperation on Science and Technology for Countering Terrorism
Author: Committee on India-United States Cooperation on Science and Technology for Countering Terrorism,National Academy of Sciences,National Institute for Advanced Studies, Bangalore, India
Publsiher: National Academy Press
Total Pages: 184
Release: 2015-01-06
ISBN 10: 9780309312967
ISBN 13: 0309312965
Language: EN, FR, DE, ES & NL

India United States Cooperation on Science and Technology for Countering Terrorism Book Review:

India and the United States are the world's two largest democracies with distinguished scientific traditions and experts in a wide range of scientific-technical fields. Given these strengths and the ability to learn from one another, the U.S. National Academy of Sciences together with the National Institute for Advanced Studies in Bangalore, India, held a joint Indian-U.S. workshop to identify and examine potential areas for substantive scientific and technical cooperation that can support counterterrorism efforts through the Homeland Security Dialogue and through direct cooperation. "India-United States Cooperation on Science and Technology for Countering Terrorism" is the summary of that workshop. This report examines topics such as biological threats; protection of nuclear facilities; security (physical and cyber) for chemicals, chemical facilities and other critical infrastructure; and monitoring, surveillance, and emergency response. The report also identifies and examines promising areas for further Indian-U.S. cooperation.

Hostile Intent and Counter Terrorism

Hostile Intent and Counter Terrorism
Author: Dr Glyn Lawson,Dr Alex Stedmon
Publsiher: Ashgate Publishing, Ltd.
Total Pages: 390
Release: 2015-01-28
ISBN 10: 1472402103
ISBN 13: 9781472402103
Language: EN, FR, DE, ES & NL

Hostile Intent and Counter Terrorism Book Review:

This volume brings together research from around the world to explore a range of topics within the project of detecting terrorist activities. It is divided into six key themes: conceptualising terrorism, deception and decision making, social and cultural factors in terrorism, modelling hostile intent, strategies for counter-terrorism, and future directions. Twenty four chapters explore the spectrum of detecting terrorist activities, hostile intent, crowded public spaces and suspicious behaviour. A variety of disciplines are represented, including ergonomics/human factors, psychology, criminology, cognitive science, sociology, political theory, engineering and computer science.

Developments in Counter Terrorist Measures and Uses of Technology

Developments in Counter Terrorist Measures and Uses of Technology
Author: Helen Fenwick
Publsiher: Routledge
Total Pages: 112
Release: 2013-09-13
ISBN 10: 1135703833
ISBN 13: 9781135703837
Language: EN, FR, DE, ES & NL

Developments in Counter Terrorist Measures and Uses of Technology Book Review:

This book considers some of the most notable aspects of the legal response to the "war on terror" post- 9/11 and the use of technology to support them. It examines the shift from a criminal justice response to the creation of a parallel preventive system running in tandem with it. This system has tended to veer away from the commission of criminal offences or adherence to ordinary criminal justice safeguards. Such a preventive strategy relies on targeting terrorist suspects – those who it is thought may in future commit terrorist acts – and curbing their actions with the aim of preventing terrorist activity before it occurs. The book further considers the role that surveillance plays in the counter-terrorist efforts of state or non-state actors. It also evaluates the counter-productive effects that many of these measures have had. This book was originally published as a special issue of International Review of Law Computers & Technology.

The Science and Technology of Counterterrorism

The Science and Technology of Counterterrorism
Author: Carl Young
Publsiher: Butterworth-Heinemann
Total Pages: 512
Release: 2014-02-26
ISBN 10: 0124200613
ISBN 13: 9780124200616
Language: EN, FR, DE, ES & NL

The Science and Technology of Counterterrorism Book Review:

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics. The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book. Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threats Provides the essential scientific principles and tools required for this analysis Explores the increasingly important relationship between physical and electronic risk in meaningful technical detail Evaluates technical security systems to illustrate specific risks using concrete examples

The Geography of International Terrorism

The Geography of International Terrorism
Author: Richard M. Medina,George F. Hepner
Publsiher: CRC Press
Total Pages: 258
Release: 2013-04-04
ISBN 10: 1439886881
ISBN 13: 9781439886885
Language: EN, FR, DE, ES & NL

The Geography of International Terrorism Book Review:

While geography is not the only factor to shape human behavior, its influence on terrorists motivations, behaviors, options, and activities is a primary consideration in understanding terrorism. Taking a different approach than many other books on terrorism, The Geography of International Terrorism: An Introduction to Spaces and Places of Violent

Targeted Killings Law and Counter Terrorism Effectiveness

Targeted Killings  Law and Counter Terrorism Effectiveness
Author: Ophir Falk
Publsiher: Routledge
Total Pages: 144
Release: 2020-07-15
ISBN 10: 1000079848
ISBN 13: 9781000079845
Language: EN, FR, DE, ES & NL

Targeted Killings Law and Counter Terrorism Effectiveness Book Review:

This book examines the permissibility and effectiveness of targeted killing in campaigns against terror. Targeted killing has become a primary counterterrorism measure used by several countries in their confrontation with lethal threats. The practice has been extensively used by the US in Afghanistan, Iraq, Pakistan, Yemen and Somalia, and by Israel in the West Bank and Gaza. Several studies have already explored the difficult balance between achieving security while maintaining the liberties and rights of a country’s civilians. This book goes a step further by seeking to examine whether maintaining those liberties by complying with legal standards and minimizing unintended deaths can be more effective for national security. Using targeted killing applied by Israel, in particular, as well as the United States during the first decade of the twenty-first century as case studies, this book explores that question and ultimately assesses whether compliance with legal standards can strengthen a state in its campaign against terrorism and thus provide stronger security. The book focuses on civilian-related criteria, hypothesizing that minimizing civilian casualties will maximize effectiveness in an asymmetric war setting. The conclusions are not limited to a specific tactic or theater, and if adopted might have far-reaching implications for how asymmetric warfare is strategized. This book will be of much interest to students of counter-terrorism, law, Middle Eastern studies, and security studies.

Counterterrorist Detection Techniques of Explosives

Counterterrorist Detection Techniques of Explosives
Author: Jehuda Yinon
Publsiher: Elsevier
Total Pages: 454
Release: 2011-10-13
ISBN 10: 9780080545202
ISBN 13: 0080545203
Language: EN, FR, DE, ES & NL

Counterterrorist Detection Techniques of Explosives Book Review:

The detection of hidden explosives has become an issue of utmost importance in recent years. While terrorism is not new to the international community, recent terrorist attacks have raised the issue of detection of explosives and have generated a great demand for rapid, sensitive and reliable methods for detecting hidden explosives. Counterterrorist Detection Techniques of Explosives covers recent advances in this area of research including vapor and trace detection techniques (chemiluminescence, mass spectrometry, ion mobility spectrometry, electrochemical methods and micromechanical sensors, such as microcantilevers) and bulk detection techniques (neutron techniques, nuclear quadrupole resonance, x-ray diffraction imaging, millimeter-wave imaging, terahertz imaging and laser techniques). This book will be of interest to any scientists involved in the design and application of security screening technologies including new sensors and detecting devices which will prevent the smuggling of bombs and explosives. * Covers latest advances in vapor and trace detection techniques and bulk detection techniques * Reviews both current techniques and those in advanced stages of development * Techniques that are described in detail, including its principles of operation, as well as its applications in the detection of explosives

National Security Issues in Science Law and Technology

National Security Issues in Science  Law  and Technology
Author: Thomas A. Johnson
Publsiher: CRC Press
Total Pages: 680
Release: 2016-04-19
ISBN 10: 9781420019087
ISBN 13: 1420019082
Language: EN, FR, DE, ES & NL

National Security Issues in Science Law and Technology Book Review:

The tragedy of 9/11 placed homeland security and the prevention of further attacks into the central focus of our national consciousness. With so many avenues of terror open to our enemies in terms of mode, medium, and location, effective management and mitigation of threat must be grounded in objective risk assessment. The structure of national security decisions should be premised on decision theory and science with minimal political posturing or emotional reactivisim. National Security Issues in Science, Law, and Technology demonstrates a mature look at a frightening subject and presents sound, unbiased tools with which to approach any situation that may threaten human lives. By applying the best of scientific decision-making practices this book introduces the concept of risk management and its application in the structure of national security decisions. It examines the acquisition and utilization of all-source intelligence, including the ability to analyze data and forecast patterns, to enable policymakers to make better informed decisions. The text addresses reaction and prevention strategies applicable to chemical, biological, and nuclear weapons; agricultural terrorism; cyberterrorism; and other potential threats to our critical infrastructure. It discusses legal issues that inevitably arise when integrating new legislation with the threads of our Constitution and illustrates the dispassionate analysis of our intelligence, law enforcement, and military operations and actions. Finally, the book considers the redirection of our national research and laboratory system to investigate the very problems terrorists can induce through the use of weapons we have as yet to confront. Taking the guesswork out of hard choices, National Security Issues in Science, Law, and Technology provides anyone burdened with the mantle of responsibility for the protection of the American people with the tools to make sound, well-informed decisions.

Domestic Counter Terrorism in a Global World

Domestic Counter Terrorism in a Global World
Author: Daniel Alati
Publsiher: Routledge
Total Pages: 196
Release: 2017-07-14
ISBN 10: 1134850387
ISBN 13: 9781134850389
Language: EN, FR, DE, ES & NL

Domestic Counter Terrorism in a Global World Book Review:

Although both Canada and the United Kingdom had experienced terrorism prior to the attacks of 9/11 and already had in place extensive provisions to deal with terrorism, the events of that day led to the enactment of new and expansive counter-terrorism legislation being enacted in both jurisdictions. This book explores these changes to counter-terrorism laws and policies in the United Kingdom and Canada in order to demonstrate that despite the force of international legal instruments, including the heavily scrutinized UN Security Council Resolution 1373, the evolution of counter-terrorism policies in different jurisdictions is best analysed and understood as a product of local institutional structures and cultures. The book compares legal and political structures and cultures within Canada and the United Kingdom. It analyses variations in the evolution of post-9/11 counter-terrorism measures in the two jurisdictions and explores the domestic reasons for them. While focus is primarily geared towards security certificates and bail with recognizance/investigative hearings in Canada, and detention without trial, control orders and TPIMs in the United Kingdom , the use of secret evidence in the wider national security context (terrorist listing, civil litigation, criminal prosecutions, etc.) is also discussed. The book reveals how domestic structures and cultures, including the legal system, the relative stability of government, local human rights culture and geopolitical relationships all influence how counter-terrorism measures evolve. In this sense, the book utilizes a methodology that is both comparative and interdisciplinary by engaging in legal, political, historical and cultural analyses. This book will be particularly useful for target audiences in the fields of comparative law and criminal justice, counter-terrorism law, human rights law and international relations and politics.

Science and Technology to Counter Terrorism

Science and Technology to Counter Terrorism
Author: International Strategic and Security Studies Programme of the National Institute of Advanced Studies,National Academy of Sciences,Committee on International Security and Arms Control
Publsiher: National Academies Press
Total Pages: 180
Release: 2007-03-27
ISBN 10: 0309104998
ISBN 13: 9780309104999
Language: EN, FR, DE, ES & NL

Science and Technology to Counter Terrorism Book Review:

This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.