Putting the "Security" Back into "National Security"

Maitra, Susan
November 2006
Foreign Service Journal;Nov2006, Vol. 83 Issue 11, p11
The article presents the author's opinion on the measures carried out to safeguard the national borders of the countries such as the U.S. which are affected by terrorism. The Security Framework Project is said to be a step to strengthen the national security. The author believes that the National Security Network is the need of the hour, to reestablish the U.S. as the world leader.


Related Articles

  • International Travel and the Constitution. Kahn, Jeffrey D. // National Security Law Report;Nov2008, Vol. 30 Issue 4, p13 

    The article focuses on the controversy concerning the national security aspect of immigration and the appropriate policies associated with it in the U.S. It cites the story of a family who cannot board on a plane home because their name appears on a U.S. terrorism watchlist. It believes that the...

  • TRUST US: IT WILL WORK. Thompson, Mark // Time;6/2/2003, Vol. 161 Issue 22, p19 

    Reports that budget concerns may force a cutback in tests for a $100 billion shield to protect the U.S. against missile attacks from terrorists or rogue states. Call by the U.S. Pentagon for 20 tests by 2009 to prove that the interceptor rockets could find and destroy missiles fired toward the...

  • IMAGINING THE WORST. Whitelaw, Kevin // U.S. News & World Report;8/16/2004, Vol. 137 Issue 5, p22 

    Offers a look at terrorism risk in the United States as of August 2004. Reference to the California-based Risk Management Solutions (RMS) company which does catastrophe modeling for the insurance industry; Threats of attacks on financial centers in New York, New Jersey and Washington, DC;...

  • Homeland Security Requires Seamless Communications Systems. Ganley, Declan // Officer;Apr2006, Vol. 82 Issue 3, p41 

    The article presents the National Security Report of the Reserve Officers Association of the United States Inc emphasizing that homeland security requires perfectly consistent and coherent communication systems to combat national security threat. Proper identification, collation, and action on...

  • Two Years Later. Clark, Timothy B. // Government Executive;Sep2003, Vol. 35 Issue 14, p6 

    Two years after 19 terrorists turned four commercial jetliners into missiles, leveling the World Trade Center and severely damaging the Pentagon, federal agencies are still trying to figure out how best to secure the U.S. from future attacks. Reducing vulnerabilities in a democratic society,...

  • Security Advisories.  // World Almanac & Book of Facts;2004, p167 

    Discusses how the various security advisories established by the Homeland Security Advisory System are used to indicate the estimated threat level for a terrorist attack in the United States. Consideration of the security measures that should be taken to comply with low, guarded, elevated, and...

  • Unholy Terror.  // National Review;9/2/1996, Vol. 48 Issue 16, p21 

    The article comments on the reluctance of the administration of U.S. President Bill Clinton to enhance national security measures despite the terroristic activities that have been committed against U.S. interests as of 1995. It assesses the possible involvement of Iran and Iraq in the bombings...

  • Additional Steps Needed to Enhance Foreign Partners' Capacity to Prevent Terrorist Travel. Johnson Jr., Charles Michael // GAO Reports;7/12/2011, preceding p1 

    The article presents a study conducted by the U.S. Government Accountability Office (GAO) concerning terrorism. It states that GAO identified four main gaps in foreign countries' capacity to hinder terrorist travel such as addressing the use of fallacious travel documents and securing passport...

  • Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense. Jackson, Brian A. // Homeland Security Affairs;Jan2009, Vol. 5 Issue 1, p1 

    The article discusses the adaptation and coevolution of technology strategies for homeland security in the U.S. It highlights the need for the nation to understand and adapt the varied evolution of technologies for terrorists' interaction. It explores on the one-on-one interaction between weapon...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics