Tic-tac-terror


Book Description

The two young detectives solve a mystery involving a top secret government agency and a world-famous spy who wishes to defect to America.




Three-ring Terror


Book Description

The Hardy boys intercept a coded message that points to plenty of big trouble under the big top.




Terrorism


Book Description




Terror and Wonder


Book Description

Collects the best of Kamin's writings for the Chicago Tribune from the past decade.







What Makes a Terrorist


Book Description

"Krueger proves...that terrorists are not desperately poor killers but well-educated politicians using violence to draw attention to their 'market'--violent change."--Hernando de Soto, author of The Mystery of Capital. Features a new Introduction by the author.he author.




Understanding, Assessing, and Responding to Terrorism


Book Description

A comprehensive guide to understanding, assessing, and responding to terrorism in this modern age This book provides readers with a thorough understanding of the types of attacks that may be perpetrated, and how to identify potential targets, conduct a meaningful vulnerability analysis, and apply protective measures to secure personnel and facilities. The new edition of Understanding, Assessing, and Responding to Terrorism updates existing material and includes several new topics that have emerged, including information on new international terrorist groups as well as a new chapter on Regulations and Standards. A vulnerability analysis methodology, consisting of several steps—which include the techniques necessary to conduct a vulnerability analysis—is introduced and applied through several sample scenarios. By using easily customized templates for the screening process, valuation of a critical asset as a target, vulnerability analysis, security procedures, emergency response procedures, and training programs, the book offers a practical step-by-step process to help reduce risk. Each different type of terrorism is briefly discussed—however, the book focuses on those potential attacks that may involve weapons of mass destruction. There is a discussion of what physical and administrative enhancements can be implemented to improve a facility's ability to devalue, detect, deter, deny, delay, defend, respond, and recover to a real or threatened terrorist attack—whether it be at a facility, or in the community. Techniques on how personnel safety and security can be improved through the implementation of counter-terrorism programs are also outlined. An overview of the major counter-terrorism regulations and standards are presented, along with the significant governmental efforts that have been implemented to help prevent terrorist attacks and foster preparedness at both private and public sector facilities and for personnel. Understanding, Assessing, and Responding to Terrorism, Second Edition: Updates existing material, plus includes several new topics that have emerged including information on new international terrorist groups, new terrorist tactics, cyber terrorism, and Regulations and Standards Outlines techniques for improving facility and personnel safety and security through the implementation of counter-terrorism programs Unites the emergency response/public sector community with the private sector over infrastructure protection, thus allowing for easier communication between them Includes questions/exercises at the end of each chapter and a solutions manual to facilitate its use as a textbook Understanding, Assessing, and Responding to Terrorism, Second Edition is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel from all types of hazards (accidental, intentional, and natural).




Crown the King


Book Description

In their desperation to leave San Diego, the kids from Samuel S. Fornland Boardinghouse will follow James, Abe, Elise, and Charlotte to the ends of the earth. When the group hijacks what they think is an abandoned cruise ship, the captain of the ship confronts them. With San Diego behind them, will the truth of what the world has become help them, or hurt them? And how many lives are they willing to give up in order to save themselves? Crown the King is Book #2 from Deep Freeze, an EPIC Press series. Some titles may contain explicit content and/or language.




The Terrorist-Criminal Nexus


Book Description

Postmodern global terrorist groups engage sovereign nations asymmetrically with prolonged, sustained campaigns driven by ideology. Increasingly, transnational criminal organizations operate with sophistication previously only found in multinational corporations. Unfortunately, both of these entities can now effectively hide and morph, keeping law enforcement and intelligence agencies in the dark and on the run. Perhaps more disturbing is the fact that al Qaeda, Hezbollah, FARC, drug cartels, and increasingly violent gangs—as well as domestic groups such as the Sovereign Citizens—are now joining forces. Despite differing ideologies, they are threatening us in new and provocative ways. The Terrorist-Criminal Nexus: An Alliance of International Drug Cartels, Organized Crime, and Terror Groups frames this complex issue using current research and real-world examples of how these entities are sharing knowledge, training, tactics, and—in increasing frequency—joining forces. Providing policy makers, security strategists, law enforcement and intelligence agents, and students with new evidence of this growing threat, this volume: Examines current and future threats from international and domestic criminal and terror groups Identifies specific instances in which these groups are working together or in parallel to achieve their goals Discusses the "lifeblood" of modern organizations—the money trail Describes how nefarious groups leverage both traditional funding methods and e-commerce to raise, store, move, and launder money Explores the social networking phenomenon and reveals how it is the perfect clandestine platform for spying, communicating, recruiting, and spreading propaganda Investigates emergent tactics such as the use of human shields, and the targeting of first responders, schools, hospitals, and churches This text reveals the often disregarded, misunderstood, or downplayed nexus threat to the United States. Proving definitively that such liaisons exist despite differing ideologies, the book provides a thought-provoking new look at the complexity and phenomena of the terrorist-criminal nexus. This book was excerpted in the February/March 2013 issue of The Counter Terrorist.




Chronologies of Modern Terrorism


Book Description

Concise yet comprehensive, this one-volume reference examines the history of terrorism in the modern world, including its origins and development, and terrorist acts by groups and individuals from the French Revolution to today. Organized thematically and regionally, it outlines major developments in conflicts that involved terrorism, the history of terrorist groups, key aspects of counterterrorist policy, and specific terrorist incidents.Initial chapters explore terrorism as a social force, and analyze the use of terrorism as a political tool, both historically and in the contemporary world. Subsequent chapters focus on different parts of the world and consider terrorism as a part of larger disputes. Each chapter begins with a historical introduction and analysis of the topic or region, followed by one or more chronologies that trace events within political and social contexts. A glossary, selected bibliography, and detailed index are also included.




Recent Books