Roots of Terror
Authored by Corinna Johnson.
Other Studies by Keyword
Many of the traditional processes used to identify and prosecute terrorists operate at a pace too slow to keep up with terrorists’ ability to change and reorganize. Terrorists have adopted structurally independent modes of organization in diverse environments; counterterrorism policies must adopt methods to track terrorists within independent cells. More effort is needed in the area of border controls, such as shipping container security and identification of false documents. Terrorists now actively seek weapons of mass destruction; counterterrorism policies must safeguard nuclear materials. In short, counterterrorism policymakers must actively anticipate new threats.
You may also be interested in the following titles:
View other pubs in the following categories:
Download it Now!
- Download Format: PDF
- PDF File Size: 0.27MB
- Study is: Available via Download Only
- View Cart
- All hardcopies are free of charge, shipping inclusive.
- For out of stock or digital only publications, refer to the new GPO on-demand site. For a small fee, recieve many prior publications. Click here to visit.
- All materials on our website are available as a free download.