Your Search Results

      • GAPSK Language Promotion Council Limited

        GAPSK and YLPSK are the standardized test of Chinese language for children from 3 to 15. From the world- renowned Peking University, GAPSK and YLPSK are certified and approved by the Chinese Ministry of Education as language proficiency measuring tool for children . GAPSK, YLPSK could be conducted on site or completely online. Come join over 100,000 students who taken the tests, contact us at  info@gapsk.org.  Find out more at www.ylpsk.org

        View Rights Portal
      • Trusted Partner

        ASSASSIN

        The Ultimate Thriller

        by Hugo N. Gerstl

        The ultimate thriller—with a twist. Forty-five years ago, a set of twins was separated at birth when their parents were caught in the crossfire between police and robbers. Flash forward to the present. Five billionaires plot to assassinate Iran’s Supreme Leader, the Ayatollah Khamenei, by hiring the most expensive killer in the world. Iran learns of the plot through a web of sex, lies, and betrayal, but they know they are hopelessly outclassed in counterterrorism. Only one service in the world has the wherewithal to bring down the assassin—Israel, a country Iran refuses to recognize. Nevertheless, Iran finally manages to hire Israel’s best counterterrorist. Unknown to one another, the assassin is one twin and the Israeli counterterrorist is the other. Let the chase begin!If you like a great thriller, such as The Da Vinci Code or The Day of the Jackal, you will certainly love ASSASSIN. It stands apart from other thrillers because it is truly original and goes outside the box to run circles around other books in this genre.Hugo N. Gerstl, famed American trial lawyer and bestselling author of eleven novels that have been translated worldwide, and fifteen works of nonfiction, has been involved in the American entertainment industry for years. Besides his legal career, the author has lived several lives as a musician, pilot, actor, director, and a world-traveler, and has employed them all to write this work. He resides on the Monterey Peninsula with his wife Lorraine. Published By Pangæa Publishing Group, 2019. 560 pages – 23 cm x 15 cm

      • Trusted Partner
      • Trusted Partner
        Humanities & Social Sciences
        September 2020

        Bordering intimacy

        Postcolonial governance and the policing of family

        by Joe Turner

        Bordering intimacy explores the interconnected role of borders and dominant forms of family intimacy in the governance of postcolonial states. Combining a historical investigation with postcolonial, decolonial and black feminist theory, the book reveals how the border policies of the British and other European empires have been reinvented for the twenty-first century through appeals to protect and sustain 'family life' - appeals that serve to justify and obfuscate the continued organisation of racialised violence. The book examines the continuity of colonial rule in numerous areas of contemporary government, including family visa regimes, the policing of 'sham marriages', counterterror strategies, deprivation of citizenship, policing tactics and integration policy.

      • Trusted Partner
        Humanities & Social Sciences
        July 2015

        The state and ‘terrorists’ in Nepal and Northern Ireland

        The social construction of state terrorism

        by Priya Dixit

        This book compares the use of 'terrorism' by states in the Global North (Britain in Northern Ireland) and South (Nepal), examining particular events over time. As such, it questions conventional understandings that states cannot be 'terrorists' and that post '9/11' terrorism is new. It does so by outlining how states have used the label of 'terrorism' to establish a specific 'counterterrorist' identity for themselves and by indicating how similar strategies of representation were used by the British and Nepali states while labeling others as 'terrorist'. Because it draws on rhetorical analysis, discursive psychology and critical security studies to analyze the politics of labelling, it is expected this book will be useful to a wide range of readers from political science, international relations, terrorism studies and also media, cultural and area studies. ;

      • Trusted Partner
      • Trusted Partner

        ChildFinders

        by Hugo N. Gerstl

        “Melissa, silly little goat, Melissa sta—” Charles Flanders Cunningham III — a name that will rank with Hannibal Lecter as the ultimate evil genius. Charles Flanders Cunningham III — the wealthiest, most influential lawyer in the United States, perhaps the world, trusted counselor to presidents, prime ministers, and world leaders. But Cunningham has a dark side, a very dark side known only to himself and his five accomplices. Cunningham arranges to kidnap children from all over the world, none more than six years old, for a period of two weeks, after which they are returned by a wonderful, charitable organization, ChildFinders, to their despairing parents, safe, secure, and outwardly none the worse for wear … but changed. Changed by chemicals, computer implants, and mind alteration. And they do not know it — until they hear one of a thousand catchphrases. Then they turn into programmed automatons, who will do whatever the next command tells them to do. Afterward, the chip erases all memory of what they have done. By means of this undetectable “army,” Cunningham aims to control the world. Can a team led by Israeli counterterrorist Ezra Caen (Assassin, The Wrecking Crew) stop him before it is too late? In the tradition of The Manchurian Candidate and Telefon, you’d best hold on to your nerves and plan on staying up very, very late to finish this riveting thriller. And be frightened. Be very, very frightened. You never can tell if you will be the next victim … or the next killer. https://www.youtube.com/watch?v=APyyH0hZ488 Published by Pangæa Publishing Group,2020. 300 pages – 23 cm x 15 cm

      • Weapons & equipment
        November 2009

        Experimentation and Rapid Prototyping in Support of Counterterrorism

        by Committee on Experimentation and Rapid Prototyping in Support of Counterterrorism; National Research Council

        The U.S. military forces currently face a nontraditional threat from insurgents and terrorists who primarily employ improvised explosive devices, and have shown a cycle of adaptation of less than 12 months to responses by U.S. forces to counter these attacks. This constantly evolving threat requires U.S. military forces to adapt and respond more rapidly with modified tactics, technologies, and/or equipment. In response to this need for new technologies, the Rapid Reaction Technology Office (RRTO) was established in 2006 to develop technologies that can mature in 6 to 18 months for purposes of counterterrorism. Although RRTO appears to be successfully fulfilling its mission, the agency seeks to understand and address barriers to and opportunities for meeting future counterterrorism needs--including the need to accelerate the transition of technologies for counterterrorism with an eye to countering emerging and anticipated threats. This book reviews RRTO approaches and provides a set of recommendations for potential improvements to help meet these needs for rapid technology development.

      • Computer security
        March 2003

        Information Technology for Counterterrorism

        Immediate Actions and Future Possibilities

        by John L. Hennessy, David A. Patterson, and Herbert S. Lin, Editors, Committee on the Role of Information Technology in Responding to Terrorism, National Research Council

        Information technology (IT) is essential to virtually all of the nation’s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation’s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

      • Defence strategy, planning & research
        October 2006

        Countering Urban Terrorism in Russia and the United States

        Proceedings of a Workshop

        by Glenn E. Schweitzer and A. Chelsea Sharber, Editors, Committee on Counterterrorism, Challenges for Russia and the United States, Office for Central Europe and Eurasia, National Research Council, in cooperation with the Russian Academy of Sciences

        In January-February 2005, the National Academies Committee on Counterterrorism Challenges for Russia and the United States and the Russian Academy of Sciences Standing Committee on Counterterrorism held a workshop on urban terrorism in Washington, D.C. Prior to the workshop, three working groups convened to focus on the topics of energy systems vulnerabilities, transportation systems vulnerabilities, and cyberterrorism issues. The working groups met with local experts and first responders, prepared reports, and presented their findings at the workshop. Other workshop papers focused on various organizations’ integrated response to acts of urban terrorism, recent acts of terrorism, radiological terrorism, biological terrorism, cyberterrorism, and the roots of terrorism.

      • Computer security
        October 2008

        Protecting Individual Privacy in the Struggle Against Terrorists

        A Framework for Program Assessment

        by Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, National Research Council

        All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

      • Peace studies & conflict resolution
        September 2013

        Countering Violent Extremism

        A Peacebuilding Perspective

        by Georgia Holmer

        This report explores the nexus of counter violent extremism (CVE) and peacebuilding and is written for counterterrorism and CVE experts and peacebuilders. Underpinning this report is the assumption that a stronger bridge between practitioners from both worlds would contribute to a broader understanding and more effective practice of countering violent extremism. The U.S. Institute of Peace (USIP) supports CVE objectives by developing and implementing training and capacity building programs for civil society and police and security services in conflict and postconflict areas.

      • Peace studies & conflict resolution
        September 2015

        Ten Years in Afghanistan's Pech Valley

        by Wesley Morgan

        The al-Qaeda presence in the Pech valley is greater now than when U.S. forces arrived in 2002, and counterterrorism efforts in the region continue. This report looks at U.S. military involvement in the Pech valley and the lessons it offers both the Afghan National Security Forces and the U.S. military. It is derived from interviews with some three hundred Americans and Afghans, including general officers, unit commanders, members of parliament, district and provincial governors, Afghan interpreters, and U.S. and Afghan combat veterans.

      • Peace studies & conflict resolution
        February 2011

        Reforming Pakistan's Police and Law Enforcement Infrastructure

        Is It Too Flawed to Fix?

        by Hassan Abbas

        An effective police force is critical to countering insurgency. In Pakistan, an understaffed and underequipped police force is increasingly called on to manage rising insecurity and militant violence. This report evaluates the obstacles to upgrading the existing police system and recommends traditional and innovative reform options, including major restructuring of the total civilian law enforcement infrastructure, without which the police force cannot be effectively improved. Because Pakistan’s police capacity has direct implications for the country’s ability to tackle terrorism, the United States and its allies would realize counterterrorism dividends by helping law enforcement efforts through modern training and technical assistance.

      • Peace studies & conflict resolution
        May 2015

        Charting Pakistan's Internal Security Policy

        by Raza Rumi

        Traditionally ruled by military or quasi-military regimes, Pakistan is struggling to strengthen its democratic governance but the military remains in charge of country’s security policy. This period of incremental democratization corresponds to the unprecedented rise in terrorism and domestic insurgencies that have challenged state capacity and taken a toll on both the morale of the country and the economy. This report reviews Pakistan’s progress in devising and implementing counterterrorism policy frameworks in recent years. In highlighting key related strategic and operational issues, it offers Pakistani policymakers ways forward on how best to ensure internal stability and security, reminding us that a balance in civilian and military institutions is vital for effective policy outcomes.

      • Defence strategy, planning & research
        June 2004

        Terrorism: Reducing Vulnerabilities and Improving Responses

        U.S - Russian Workshop Proceedings

        by Committee on Counterterrorism Challenges for Russia and the United States, Office for Central Europe and Eurasia Development, Security, and Cooperation, National Research Council

        This book is devoted primarily to papers prepared by American and Russian specialists on cyber terrorism and urban terrorism. It also includes papers on biological and radiological terrorism from the American and Russian perspectives. Of particular interest are the discussions of the hostage situation at Dubrovko in Moscow, the damge inflicted in New York during the attacks on 9/11, and Russian priorities in addressing cyber terrorism.

      • Defence strategy, planning & research
        December 2014

        India-United States Cooperation on Science and Technology for Countering Terrorism

        Summary of a Workshop

        by Rita Guenther, Micah Lowenthal, and Lalitha Sunderesan, Rapporteurs; Committee on India-United States Cooperation on Science and Technology for Countering Terrorism; National Academy of Sciences; in cooperation with the National Institute for Advanced Studies, Bangalore, India

        India and the United States are the world's two largest democracies with distinguished scientific traditions and experts in a wide range of scientific-technical fields. Given these strengths and the ability to learn from one another, the U.S. National Academy of Sciences together with the National Institute for Advanced Studies in Bangalore, India, held a joint Indian-U.S. workshop to identify and examine potential areas for substantive scientific and technical cooperation that can support counterterrorism efforts through the Homeland Security Dialogue and through direct cooperation. India-United States Cooperation on Science and Technology for Countering Terrorism is the summary of that workshop. This report examines topics such as biological threats; protection of nuclear facilities; security (physical and cyber) for chemicals, chemical facilities and other critical infrastructure; and monitoring, surveillance, and emergency response. The report also identifies and examines promising areas for further Indian-U.S. cooperation.

      • Defence strategy, planning & research
        March 2009

        Countering Terrorism

        Biological Agents, Transportation Networks, and Energy Systems: Summary of a U.S.-Russian Workshop

        by Glenn E. Schweitzer, Rapporteur; Committee on Counterterrorism Challenges for Russia and the United States; Office for Central Europe and Eurasia; Development, Security, and Cooperation; Policy and Global Affairs; National Academy of Sciences; Russian Academy of Sciences

        This book presents the proceedings of the fourth U.S.-Russian interacademy workshop on the general theme of countering terrorism, which was held in Moscow in March 2007. The fourth in a series, this volume continues to explore topics related to urban terrorism, but with a new emphasis on potential attacks involving biological agents, transportation networks, and energy systems. The other books in the series include: High Impact Terrorism: Proceedings of a Russian-American Workshop (2002) Terrorism: Reducing Vulnerabilities and Improving Responses: U.S.-Russian Workshop Proceedings (2004) Countering Urban Terrorism in Russia and the United States: Proceedings of a Workshop (2006)

      • Peace studies & conflict resolution
        January 2002

        The Diplomacy of Counterterrorism

        Lessons Learned, Ignored, and Disputed

        by Audrey Kurth Cronin

        This report is based upon a me e t i ng of the Int e rna t io nal Research Group on Po l i t ical Vio l e nc e (IRGPV) held at the United States Institute of Peace to discuss na t io nal and int e r na t io nal me t hods of count e r i ng terrorism. Although the orig i na l report was drafted befo re the September 11 a t t a c k s, it has been revised to reflect tho s e attacks and mo re re c e nt event s. To p ics discussed i nc l uded specific lessons learned from past ex p e r ie nc e, the challenges of building int e r na t io na l c o a l i t io ns, the effectiveness of criminal law a p p ro a c hes in cont rast to military re s p o ns e s, the role of rhe t o r ic and public diploma c y, the effect i v e ness of curre nt polic ie s, and the “new terro rism” and weapons of mass de s t r uc t ion. T he IRGPV is co-spons o red by the U.S. Institute of Peace and the Airey Neave Trust of Great Britain. This report was written by Audrey Kurth Cronin, v i s i t i ng associate professor in the Security Stud ie s P ro g ram at Georgetown University and a p a r t ic i p a nt in the me e t i ng .

      Subscribe to our

      newsletter