How Patriotic is the Patriot Act?

How Patriotic is the Patriot Act? PDF Author: Amitai Etzioni
Publisher: Routledge
ISBN: 1135929963
Category : Political Science
Languages : en
Pages : 181

Get Book Here

Book Description
In this short book, Etzioni, the well-known and respected public intellectual and communitarian thinker, charts a middle course, or third way 'between those who are committed to shore up our liberties but blind to the needs of public security, as well as those who never met a right they are not willing to curtail to give authorities an even freer hand.' This book will prove a useful guide for citizens looking for a thought provoking, well-reasoned and sober analysis of one of the hot button issues of our time.

How Patriotic is the Patriot Act?

How Patriotic is the Patriot Act? PDF Author: Amitai Etzioni
Publisher: Routledge
ISBN: 1135929963
Category : Political Science
Languages : en
Pages : 181

Get Book Here

Book Description
In this short book, Etzioni, the well-known and respected public intellectual and communitarian thinker, charts a middle course, or third way 'between those who are committed to shore up our liberties but blind to the needs of public security, as well as those who never met a right they are not willing to curtail to give authorities an even freer hand.' This book will prove a useful guide for citizens looking for a thought provoking, well-reasoned and sober analysis of one of the hot button issues of our time.

Terrorism, Freedom, and Security

Terrorism, Freedom, and Security PDF Author: Philip B. Heymann
Publisher: MIT Press
ISBN: 9780262582551
Category : Political Science
Languages : en
Pages : 238

Get Book Here

Book Description
A former Deputy Attorney General of the United States argues that we must preserve our civil liberties and democratic values while fighting terrorism. On September 11, 2001, the United States began to consider the terrorist threat in a new light. Terrorism was no longer something that happened in other countries on other continents but became a pressing domestic concern for the US government and American citizens. The nation suddenly faced a protracted struggle. In Terrorism, Freedom, and Security, Philip Heymann continues the discussion of responses to terrorism that he began in his widely read Terrorism and America. He argues that diplomacy, intelligence, and international law should play a larger role than military action in our counterterrorism policy; instead of waging "war" against terrorism, the United States needs a broader range of policies. Heymann believes that many of the policies adopted since September 11--including trials before military tribunals, secret detentions, and the subcontracting of interrogation to countries where torture is routine--are at odds with American political and legal traditions and create disturbing precedents. Americans should not be expected to accept apparently indefinite infringements on civil liberties and the abandonment of such constitutional principles as separation of powers and the rule of law. Heymann believes that the United States can guard against the continuing threat of terrorism while keeping its traditional democratic values in place.

Biotechnology Research in an Age of Terrorism

Biotechnology Research in an Age of Terrorism PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309089778
Category : Technology & Engineering
Languages : en
Pages : 164

Get Book Here

Book Description
In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them into even more lethal forms. Policymakers and the scientific community at large must put forth a vigorous and immediate response to this challenge. This new book by the National Research Council recommends that the government expand existing regulations and rely on self-governance by scientists rather than adopt intrusive new policies. One key recommendation of the report is that the government should not attempt to regulate scientific publishing but should trust scientists and journals to screen their papers for security risks, a task some journals have already taken up. With biological information and tools widely distributed, regulating only U.S. researchers would have little effect. A new International Forum on Biosecurity should encourage the adoption of similar measures around the world. Seven types of risky studies would require approval by the Institutional Biosafety Committees that already oversee recombinant DNA research at some 400 U.S. institutions. These "experiments of concern" include making an infectious agent more lethal and rendering vaccines powerless.

Philippine Security in the Age of Terror

Philippine Security in the Age of Terror PDF Author: Rommel Banlaoi
Publisher: CRC Press
ISBN: 1439815518
Category : Business & Economics
Languages : en
Pages : 376

Get Book Here

Book Description
As the twelfth most populous nation, the Philippines diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmenta

Laws, Outlaws, and Terrorists

Laws, Outlaws, and Terrorists PDF Author: Gabriella Blum
Publisher: MIT Press
ISBN: 0262289091
Category : Political Science
Languages : en
Pages : 254

Get Book Here

Book Description
Guidance for maintaining national security without abandoning the rule of law and our democratic values. In an age of global terrorism, can the pursuit of security be reconciled with liberal democratic values and legal principles? During its “global war on terrorism,” the Bush administration argued that the United States was in a new kind of conflict, one in which peacetime domestic law was irrelevant and international law inapplicable. From 2001 to 2009, the United States thus waged war on terrorism in a “no-law zone.” In Laws, Outlaws, and Terrorists, Gabriella Blum and Philip Heymann reject the argument that traditional American values embodied in domestic and international law can be ignored in any sustainable effort to keep the United States safe from terrorism. They demonstrate that the costs are great and the benefits slight from separating security and the rule of law. They call for reasoned judgment instead of a wholesale abandonment of American values. They also argue that being open to negotiations and seeking to win the moral support of the communities from which the terrorists emerge are noncoercive strategies that must be included in any future efforts to reduce terrorism.

Overblown

Overblown PDF Author: John Mueller
Publisher: Simon and Schuster
ISBN: 1416574654
Category : Political Science
Languages : en
Pages : 306

Get Book Here

Book Description
Why have there been no terrorist attacks in the United States since 9/11? It is ridiculously easy for a single person with a bomb-filled backpack, or a single explosives-laden automobile, to launch an attack. So why hasn't it happened? The answer is surely not the Department of Homeland Security, which cannot stop terrorists from entering the country, legally or otherwise. It is surely not the Iraq war, which has stoked the hatred of Muslim extremists around the world and wasted many thousands of lives. Terrorist attacks have been regular events for many years -- usually killing handfuls of people, occasionally more than that. Is it possible that there is a simple explanation for the peaceful American homefront? Is it possible that there are no al-Qaeda terrorists here? Is it possible that the war on terror has been a radical overreaction to a rare event? Consider: 80,000 Arab and Muslim immigrants have been subjected to fingerprinting and registration, and more than 5,000 foreign nationals have been imprisoned -- yet there has not been a single conviction for a terrorist crime in America. A handful of plots -- some deadly, some intercepted -- have plagued Europe and elsewhere, and even so, the death toll has been modest. We have gone to war in two countries and killed tens of thousands of people. We have launched a massive domestic wiretapping program and created vast databases of information once considered private. Politicians and pundits have berated us about national security and patriotic duty, while encroaching our freedoms and sending thousands of young men off to die. It is time to consider the hypothesis that dare not speak its name: we have wildly overreacted. Terrorism has been used by murderous groups for many decades, yet even including 9/11, the odds of an American being killed by international terrorism are microscopic. In general, international terrorism doesn't do much damage when considered in almost any reasonable context. The capacity of al-Qaeda or of any similar group to do damage in the United States pales in comparison to the capacity other dedicated enemies, particularly international Communism, have possessed in the past. Lashing out at the terrorist threat is frequently an exercise in self-flagellation because it is usually more expensive than the terrorist attack itself and because it gives the terrorists exactly what they are looking for. Much, probably most, of the money and effort expended on counterterrorism since 2001 (and before, for that matter) has been wasted. The terrorism industry and its allies in the White House and Congress have preyed on our fears and caused enormous damage. It is time to rethink the entire enterprise and spend much smaller amounts on only those things that do matter: intelligence, law enforcement, and disruption of radical groups overseas. Above all, it is time to stop playing into the terrorists' hands, by fear-mongering and helping spread terror itself.

The Age of Lone Wolf Terrorism

The Age of Lone Wolf Terrorism PDF Author: Mark S. Hamm
Publisher: Columbia University Press
ISBN: 0231543778
Category : Political Science
Languages : en
Pages : 234

Get Book Here

Book Description
The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. In The Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination. Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers—whether jihadists, white supremacists, or other antigovernment extremists—and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens.

Airport and Aviation Security

Airport and Aviation Security PDF Author: Bartholomew Elias
Publisher: CRC Press
ISBN: 1420070304
Category : Law
Languages : en
Pages : 442

Get Book Here

Book Description
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a co

Preparing for the Psychological Consequences of Terrorism

Preparing for the Psychological Consequences of Terrorism PDF Author: Institute of Medicine
Publisher: National Academies Press
ISBN: 0309167922
Category : Political Science
Languages : en
Pages : 184

Get Book Here

Book Description
The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.

Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376

Get Book Here

Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.