Site Map - International Security

What Are Security's Lessons in Iraq?

- Private security had to get up to speed fast in Iraq. The experience has yielded important lessons.

Crisis negotiation

- In early September, four men in suburban Carácas disguised themselves as police officers and kidnapped the mother of Ugueth Urbina, a baseball pitcher from Venezuela who plays for the Detroit Tigers. The outcome of the incident was unknown at press time. That's just one example of how, in the globalizing marketplace, corporate executives and other high-profile personnel and their families are at constant risk of abduction.

Working in a War Zone

- With security in demand in war zones like Iraq, security professionals are facing growing challenges.

Shopping for Bombs: Nuclear Proliferation, Global Insecurity, and the Rise and Fall of the A. Q. Khan Network

- Meet A. Q. Khan, the world's most notorious nuclear proliferator.

U.S. Military Sees Drop in IEDs in Iraq

- Top U.S. official attributes the drop in the weapons' use to Iran.

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001

- Author Steve Coll's reporting is exemplary. Information comes from a range of respected and noted intelligence officers who served in Afghanistan during the Soviet occupation or the rise of the Taliban. Coll details such topics as command of the Northern Alliance and the plan to target Tarnak Farm, where Osama bin Laden stayed with his family. Coll also paints a thorough picture of CIA and State Department achievements and setbacks in the region.

Business Under Fire: How Israeli Companies Are Succeeding in the Face of Terror--and What We Can Learn From Them.

- Information from interviews is presented as Q&A, then discussed. The author interviews an Israeli CEO, for example, then discusses the main points. A summary follows. The book proceeds like this through three sectors: hotel/tourism, high technology, and transportation.

Nuclear proliferation

- Several U.S. departments are trying to help Russia secure its nuclear materials, but their efforts are not unified.

The German Enigma Cipher Machine: Beginnings, Success, and Ultimate Failure

- The German Enigma Cipher Machine is the story of one of the most notable pieces of security hardware ever made, an encoding device that looked like a small typewriter. The Germans used it, primarily during World War II, to send confidential communications. In their hubris, the Germans believed that the Enigma was utterly unbreakable and refused to believe otherwise even when their communiqués were being compromised. The Allied Powers were able to break the code after they acquired an Enigma machine and brought together a team of analysts from diverse countries to tease out its secrets.

Foreign Fighters Replenishing Taliban Forces in Afghanistan

- Foreign militants are more extreme and violent many say.

Intelligence Budget Released

- The intelligence community discloses one of its most tightly guarded secrets.

Dutch Proposal to Try Guantánamo Detainees

- An unconventional new idea to give terrorist suspects their day in court.

Hope Rises in Africa

- Sub-Saharan African countries are making slow progress on governance, corruption, and basic political rights, says the World Bank.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.