Reacting to the Terror Threat Analysing, Controlling and Adapting to Meet New Threats

ثبت نشده
چکیده

As a consequence of that terror threat it is now being discussed to prohibit liquids in cabin baggage. The underlying reason is illustrated in figure 1. The x-ray image of the bottle on the left contains a liquid explosive. The x-ray image in the middle depicts a bottle with a soft drink. The image on the right shows a bottle of mineral water. As you can see in the pictures it is not very easy to distinguish between the substances, at least for non-experts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Ecology of Terror Defense

We draw on an ecological metaphor to analyze terror defense by governments and individuals. Governments can combat terror in part by targeting what we call the “stock of terror capacity” accumulated by a terrorist organization. The optimal control of terror stocks relies on both periodic cleanup and ongoing abatement, a lesson derived from the optimal control of other stocks of public bads, suc...

متن کامل

The Crime–Terror Continuum: Tracing the Interplay between Transnational Organised Crime and Terrorism

Increasingly since the end of the Cold War and the subsequent decline of state sponsorship for terrorism, organised criminal activities have become a major revenue source for terrorist groups worldwide. Building on the precedent set by narco-terrorism, as it emerged in Latin America in the 1980s, the use of crime has become an important factor in the evolution of terrorism. As such, the 1990s c...

متن کامل

Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate

For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we define cyber-terror as an attack or series of attacks that is carried out by terrorists, that instills fear by effects that are destructive or disruptive, and that has a political, religious, or ideological motivation, then none of the disruptive cyber-inciden...

متن کامل

Geopolitical boundary narratives, the global war on terror and border fencing in India

This article investigates how expansive new security projects have gained both legitimacy and immediacy as part of the ‘global war on terror’ by analysing the process that led to the fencing and securitising of the border between India and Bangladesh. The framing of the ‘enemy other’ in the global war on terror relies on two crucial shifts from previous geopolitical boundary narratives. First, ...

متن کامل

Terror Queues

This article presents the first models developed specifically for understanding the infiltration and interdiction of ongoing terror plots by undercover intelligence agents, and does so via novel application of ideas from queueing theory and Markov population processes. The resulting “terror queue” models predict the number of undetected terror threats in an area from agent activity/utilization ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006