11/28/2007 - As hate and terror organizations become more complex, investigators must collect intelligence and properly analyze it to keep pace. This book offers excellent insight into the process that professionals could apply in all investigative areas.
11/28/2007 - Holy security lapse! When, in September, a protester dressed as Batman scaled the front wall of Buckingham Palace and stood on a ledge for five hours to demand more equitable child custody rights for divorced fathers, the public may have been amused, but security was not. The episode revealed how easily the security perimeter could be breached.
11/28/2007 - Like the first edition, this updated version explores various approaches to the study of terrorism and its impact on society. The authors make the point that terrorists have many faces--not just those of Osama bin Laden and his followers, but others such as the U.S. citizen who opens fire in an abortion clinic.
11/28/2007 - Terrorists need money--and lots of it--to carry out their operations and to sustain themselves. With its intriguing title and an author who is an economist and a journalist, this book promised to offer revealing information on terrorist financial networks. Alas, such is not the case.
11/27/2007 - Several new bills introduced by lawmakers focused on helping states respond to acts of terrorism. The bills would have established grant programs to help fund states' first responder activities; the bills also would have established grants for terrorism-related training and technical assistance for state officials.
11/16/2007 - The book reflects a systematic and pragmatic approach based on Sageman's personal experiences and research. Blending his training as a forensic psychiatrist, his experience as a diplomat dealing with Afghani mujaheddin, and his proficiency with various social science methodologies, Sageman has put together an excellent snapshot of the dangers posed by contemporary Islamic terrorists that is a blend of network theory, modeling, empirical analysis, and historical review.
11/16/2007 - Homeland Security Techniques and Technologies also describes methodologies useful for detecting crime associated with terrorism. Data mining is the key technology in the battle against terrorism, Mena states, in that such analysis can help predict specific human behavior.