national security

Type: 
Topical Term
Subfield: 
a
Alias: 
national security

Homeland Security

A look at the methods used by the Department of Homeland Security to protect Americans.
Cover image of Homeland Security

Cyber technology

using computers to fight terrorism
2017
This book details how criminals, terrorists, and enemy governments attempt to use technology against the United States, and how we can counter this threat.

The FBI

Describes the life of an FBI officer, including their work capturing terrorists, enforcing federal laws, and investigating crimes.

Playing to the edge

American intelligence in the age of terror
For General Michael Hayden, playing to the edge is playing so close to the line that you get chalk dust in your cleats. Otherwise, by holding back, you may protect yourself, but you'll be less successful in reaching your goals. This was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran the CIA. This book is an insider's look told from the perspective of the people who faced awesome responsibilities head-on, in the moment, which is to say in the wake of 9/11, a major war, and sweeping technological change.

Twilight warriors

the soldiers, spies, and special agents who are revolutionizing the American way of war
When U.S. troops withdrew from Afghanistan at the end of 2014, it signaled the end of the longest conflict in the nation's history. Yet we are still at war--no longer with other states, but with a host of new enemies, from nihilistic terrorists and narco-traffickers to transnational criminal cartels, lone wolf assassins, and modern-day pirates. Standing against these foes is a tight-knit fraternity of soldiers, cops, lawyers, and spies. Together, these men have broken down the cultural and institutional boundaries among their respective agencies to engineer a new, network-centric way of fighting: one that uses a seamless web of intelligence analysts, high-tech information networks, and Special Forces units to take the fight to America's enemies as never before.

Rogue justice

the making of the security state
Presents the argument that America's war on terror, begun by the Bush administration after 9/11 and continued under Obama, has had the effect of weakening the rule of law at home, the courts, and the constitution in the name of national security. Discusses the history of NSA spying on U.S. citizens, the Patriot Act, the ACLU's activism, WikiLeaks, and Edward Snowden's revealed documents.

Homeland security

Describes the governmental body called the Department of Homeland Security including its formation, purpose, and operations. Also examines the question of the right to privacy and the controversial PATRIOT Act.

How the US Security Agencies work

2015
Discusses security agencies, including their history, members, responsibilities, and role in the U.S. government.

Playing to the edge

American intelligence in the age of terror
"An unprecedented high-level master narrative of America's intelligence wars, from the only person ever to helm both the CIA and the NSA, at a time of heinous new threats and momentous change For General Michael Hayden, playing to the edge means playing so close to the line that you get chalk dust on your cleats. Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran the CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort. It is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war, and the most sweeping technological revolution in the last five hundred years? What was the NSA before 9/11 and how did it change in its aftermath? Why did the NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? "--.

Operation Shakespeare

the true story of an elite international sting
The true story of an elaborate sting operation launched by an elite Homeland Security Team that was created to stop Iran, Russia, China, and North Korea from stealing U.S. military technology. What they found was that arms brokers, U.S. contractors, and bankers were willing to put profit over national security.

Pages

Subscribe to RSS - national security