Literatura científica selecionada sobre o tema "United States. Federal Bureau of Investigation. Counterterrorism Section"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "United States. Federal Bureau of Investigation. Counterterrorism Section".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "United States. Federal Bureau of Investigation. Counterterrorism Section"

1

Brody, Rachel, e Joshua Nadas. "Andrew DiRosa, MPA ‘02, Section Chief (Acting) of the Executive Intelligence Section of the Federal Bureau of Investigation". Policy Perspectives 19 (1 de maio de 2012): 148. http://dx.doi.org/10.4079/pp.v19i0.10435.

Texto completo da fonte
Resumo:
Mr. DiRosa obtained a Master’s in Public Administration (MPA), with a focus on managing federal agencies, from The George Washington University in 2002. While at GWU, Andy served as editor of Policy Perspectives, and was awarded the Leadership Award and was inducted into the Pi Alpha Alpha public administration honor society. Andy obtained a BA from Old Dominion University (Norfolk, VA) in English and Political Science in 1987. While at ODU he was elected to two terms on the student senate.Presently, Andy is the assistant section chief of the Executive Intelligence Section in the FBI’s Directorate of Intelligence at FBI Headquarters. In this capacity he helps oversee daily operation of 24-hour units that prepare the daily intelligence briefing materials for the FBI Director, US Attorney General, and other senior executives. Andy has also worked in the FBI’s Counterterrorism Division, as an intelligence analyst and supervisor, and in the FBI’s training division and office of public affairs, as managing editor of the FBI Law Enforcement Bulletin, a widely read criminal justice journal. He authored book reviews and journal articles, including features on street gangs and the impact of the Second World War on US law enforcement. While in the Counterterrorism Division Andy served in an international intelligence cell at NATO headquarters in Brussels. Mr. DiRosa has also represented the FBI at bilateral intelligence exchanges with Canada and the United Kingdom. (Views expressed are those of Mr. DiRosa and do not necessarily reflect the views of the FBI.)
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Klehr, Harvey. "REFLECTIONS ON ESPIONAGE". Social Philosophy and Policy 21, n.º 1 (janeiro de 2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.

Texto completo da fonte
Resumo:
In 1995 the United States National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI) made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending and receiving coded cables overseas, such as Western Union, to turn over copies to the U.S. government. Hundreds of thousands of cables were sent or received by Soviet government bodies. Beginning in 1943, spurred by rumors and concerns that Stalin might conclude a separate peace with Hitler, the U.S. Army's cryptographic section began work trying to read these Russian cables. It had very limited success until 1946, by which time the Cold War was already underway. Some twenty-nine hundred cables dealing with Russian intelligence activities from 1942 to 1946 eventually were decrypted successfully in whole or in part as a result of Soviet technical errors in constructing and using “one-time pads” that American code-breakers were able to exploit. These cables implicated more than three hundred Americans as having been involved with Soviet intelligence services during World War II, a time when the United States and the USSR were allies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Gearhart, Robert. "Marine Archaeology Assessment in Support of the Bluewater SPM Project, Nueces and Aransas Counties, Texas and Adjoining Federal Waters". Index of Texas Archaeology Open Access Grey Literature from the Lone Star State, 2019. http://dx.doi.org/10.21112/ita.2019.1.21.

Texto completo da fonte
Resumo:
BOB Hydrographics, LLC conducted a marine archaeological assessment for portions of the Bluewater SPM Project proposed in Nueces and Aransas counties and adjoining federal waters. These archaeological investigations were sponsored by Lloyd Engineering, Inc. on behalf of Bluewater Texas Terminal, LLC. The marine portion of this project comprises two segments: Offshore and Inshore. The Inshore project corridor parallels the Aransas Ship Channel from the community of Aransas Pass to Harbor Island, crossing portions of State Mineral Lease Tracts 309, 310, 313, 314 in Corpus Christi Bay, and then crosses beneath the Lydia Ann Channel to San Jose Island, including a portion of Tract 306 in Aransas Bay. The Offshore project corridor crosses portions of State Mineral Lease Tracts 693, 694, 695 (same as MI-695), 721, 836, 837, 838, 839, 844, 845, 846, 847, 848, 849, 850, and 851 on the Gulf side of San Jose Island, and then crosses portions of Federal Lease Blocks MI-695, MI-696, MI-697, MI-698, and MI-699. The marine Area of Potential Effect (APE) is a 2,000-foot-wide corridor, offshore of San Jose Island, and a 1,000-foot-wide corridor, inshore of San Jose Island. Both Inshore and Offshore APEs are centered on the construction right-of-way and include the proposed lay barge anchorage. The APE totals 7,174 acres, including 3,079 acres in federal waters and 4,095 acres in state waters. The APE in state waters totals 288 acres Inshore and 3,807 acres Offshore in the Gulf of Mexico. Water depth ranges from 2-30 feet (ft) Inshore and from 0-92 ft Offshore. The Project proposes construction of a Deepwater Port (DWP) with two single point mooring (SPM) buoys and associated pipelines. The DWP would be located 17.3 miles offshore of San Jose Island in approximately 89.5 ft of water. The DWP would allow simultaneous loading of two Very Large Crude Carrier tankers with domestic crude oil via two 30-inch sub-marine pipelines. Pipes will be directionally drilled beneath all shorelines and Inshore waterways. Offshore pipes will be buried by a jetting sled to a depth of 6-7 ft below the seafloor with 36 inches of cover. The sled will discharge sediment back into the trench to facilitate backfilling. Subsea pipes will be separated by 10-15 ft, horizontally, within a proposed 75-ft-wide construction right-of-way. Offshore pipes will be installed from a conventional pipelay barge with an 8-point anchor system (using 4 at a time). Inshore pipes will be directionally drilled beneath all bay waters. The purpose of this study was to assess the potential for submerged archaeological sites in the APE; however, no artifacts were collected during the survey. Submerged archaeological sites, in this context, might be historic sites, such as sunken or abandoned watercraft; or drowned terrestrial prehistoric sites dating to the late Pleistocene or Early Holocene when the APE was last above sea level. A review of the cultural background determined that 11 marine archaeological investigations have been conducted within 3 miles of this project. At least, 95 wrecks have been reported within 3 miles of the APE. Geophysical survey was completed by Naismith Marine Services, Inc. from January 4 through April 19, 2019 under Texas Antiquities Permit 8672. A variety of equipment was used to conduct the marine survey, depending on water depths, including multi- and single-beam echo sounders, a sub-bottom profiler, sidescan sonar, and a magnetometer. Archaeologists monitored the acquisition of all data in state waters. Analysis of geophysical survey results from this investigation discovered three significant targets, including one in federal waters (Anomaly 1), and two in state waters (anomalies 2 and 3). All three targets are potentially eligible for the National Register of Historic Places and are recommended for avoidance. The two targets in state waters also may be eligible as State Antiquities Landmarks. Anomaly 2, is confirmed as a shipwreck by sonar imagery and is designated as an archaeological site, 41AS119. No potential historic sites were discovered by the Inshore survey. There is low potential for the presence of intact prehistoric sites in the Offshore APE. The top of the Beaumont Formation is exposed at the seafloor between the 31- ft and 46-ft isobaths and is buried by Holocene sediments to varying depths beneath the remainder of the survey corridor. This former land surface had little protection from wave energy during sea-level rise and is still actively eroding along portions of the APE where exposed. The Texas Historical Commission did not require sub-bottom data in the bay, so areas of high potential for submerged prehistoric sites were not mapped there. This study was completed in compliance with Section 106 of the National Historic Preservation Act (Public Law 89-665; 16 U.S.C. 470) and the Antiquities Code of Texas (Texas Natural Resource Code, Title 9, Chapter 191). The minimum reporting and survey requirements for marine archaeological studies conducted under a Texas Antiquities Permit are mandated by The Texas Administrative Code, Title 13, Part 2, Chapters 26 and 28, respectively. The petroleum industry is regulated in federal waters, beyond 9 nautical miles offshore, by the Bureau of Ocean Energy Management (BOEM), an agency of the United States Department of the Interior. This study also complies with archaeological requirements published by BOEM in their Notice to Lessees 2005-G07. Archaeological project records are curated at the Center for Archeological Study at Texas State University in San Marcos.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Stalcup, Meg. "What If? Re-imagined Scenarios and the Re-Virtualisation of History". M/C Journal 18, n.º 6 (7 de março de 2016). http://dx.doi.org/10.5204/mcj.1029.

Texto completo da fonte
Resumo:
Image 1: “Oklahoma State Highway Re-imagined.” CC BY-SA 4.0 2015 by author, using Wikimedia image by Ks0stm (CC BY-SA 3 2013). Introduction This article is divided in three major parts. First a scenario, second its context, and third, an analysis. The text draws on ethnographic research on security practices in the United States among police and parts of the intelligence community from 2006 through to the beginning of 2014. Real names are used when the material is drawn from archival sources, while individuals who were interviewed during fieldwork are referred to by their position rank or title. For matters of fact not otherwise referenced, see the sources compiled on “The Complete 911 Timeline” at History Commons. First, a scenario. Oklahoma, 2001 It is 1 April 2001, in far western Oklahoma, warm beneath the late afternoon sun. Highway Patrol Trooper C.L. Parkins is about 80 kilometres from the border of Texas, watching trucks and cars speed along Interstate 40. The speed limit is around 110 kilometres per hour, and just then, his radar clocks a blue Toyota Corolla going 135 kph. The driver is not wearing a seatbelt. Trooper Parkins swung in behind the vehicle, and after a while signalled that the car should pull over. The driver was dark-haired and short; in Parkins’s memory, he spoke English without any problem. He asked the man to come sit in the patrol car while he did a series of routine checks—to see if the vehicle was stolen, if there were warrants out for his arrest, if his license was valid. Parkins said, “I visited with him a little bit but I just barely remember even having him in my car. You stop so many people that if […] you don't arrest them or anything […] you don't remember too much after a couple months” (Clay and Ellis). Nawaf Al Hazmi had a valid California driver’s license, with an address in San Diego, and the car’s registration had been legally transferred to him by his former roommate. Parkins’s inquiries to the National Crime Information Center returned no warnings, nor did anything seem odd in their interaction. So the officer wrote Al Hazmi two tickets totalling $138, one for speeding and one for failure to use a seat belt, and told him to be on his way. Al Hazmi, for his part, was crossing the country to a new apartment in a Virginia suburb of Washington, DC, and upon arrival he mailed the payment for his tickets to the county court clerk in Oklahoma. Over the next five months, he lived several places on the East Coast: going to the gym, making routine purchases, and taking a few trips that included Las Vegas and Florida. He had a couple more encounters with local law enforcement and these too were unremarkable. On 1 May 2001 he was mugged, and promptly notified the police, who documented the incident with his name and local address (Federal Bureau of Investigation, 139). At the end of June, having moved to New Jersey, he was involved in a minor traffic accident on the George Washington Bridge, and officers again recorded his real name and details of the incident. In July, Khalid Al Mihdhar, the previous owner of the car, returned from abroad, and joined Al Hazmi in New Jersey. The two were boyhood friends, and they went together to a library several times to look up travel information, and then, with Al Hazmi’s younger brother Selem, to book their final flight. On 11 September, the three boarded American Airlines flight 77 as part of the Al Qaeda team that flew the mid-sized jet into the west façade of the Pentagon. They died along with the piloting hijacker, all the passengers, and 125 people on the ground. Theirs was one of four airplanes hijacked that day, one of which was crashed by passengers, the others into significant sites of American power, by men who had been living for varying lengths of time all but unnoticed in the United States. No one thought that Trooper Parkins, or the other officers with whom the 9/11 hijackers crossed paths, should have acted differently. The Commissioner of the Oklahoma Department of Public Safety himself commented that the trooper “did the right thing” at that April traffic stop. And yet, interviewed by a local newspaper in January of 2002, Parkins mused to the reporter “it's difficult sometimes to think back and go: 'What if you had known something else?'" (Clay and Ellis). Missed Opportunities Image 2: “Hijackers Timeline (Redacted).” CC BY-SA 4.0 2015 by author, using the Federal Bureau of Investigation (FBI)’s “Working Draft Chronology of Events for Hijackers and Associates”. In fact, several of the men who would become the 9/11 hijackers were stopped for minor traffic violations. Mohamed Atta, usually pointed to as the ringleader, was given a citation in Florida that spring of 2001 for driving without a license. When he missed his court date, a bench warrant was issued (Wall Street Journal). Perhaps the warrant was not flagged properly, however, since nothing happened when he was pulled over again, for speeding. In the government inquiries that followed attack, and in the press, these brushes with the law were “missed opportunities” to thwart the 9/11 plot (Kean and Hamilton, Report 353). Among a certain set of career law enforcement personnel, particularly those active in management and police associations, these missed opportunities were fraught with a sense of personal failure. Yet, in short order, they were to become a source of professional revelation. The scenarios—Trooper Parkins and Al Hazmi, other encounters in other states, the general fact that there had been chance meetings between police officers and the hijackers—were re-imagined in the aftermath of 9/11. Those moments were returned to and reversed, so that multiple potentialities could be seen, beyond or in addition to what had taken place. The deputy director of an intelligence fusion centre told me in an interview, “it is always a local cop who saw something” and he replayed how the incidents of contact had unfolded with the men. These scenarios offered a way to recapture the past. In the uncertainty of every encounter, whether a traffic stop or questioning someone taking photos of a landmark (and potential terrorist target), was also potential. Through a process of re-imagining, police encounters with the public became part of the government’s “national intelligence” strategy. Previously a division had been marked between foreign and domestic intelligence. While the phrase “national intelligence” had long been used, notably in National Intelligence Estimates, after 9/11 it became more significant. The overall director of the US intelligence community became the Director National Intelligence, for instance, and the cohesive term marked the way that increasingly diverse institutional components, types of data and forms of action were evolving to address the collection of data and intelligence production (McConnell). In a series of working groups mobilised by members of major police professional organisations, and funded by the US Department of Justice, career officers and representatives from federal agencies produced detailed recommendations and plans for involving police in the new Information Sharing Environment. Among the plans drawn up during this period was what would eventually come to be the Nationwide Suspicious Activity Reporting Initiative, built principally around the idea of encounters such as the one between Parkins and Al Hazmi. Map 1: Map of pilot sites in the Nationwide Suspicious Activity Reporting Evaluation Environment in 2010 (courtesy of the author; no longer available online). Map 2: Map of participating sites in the Nationwide Suspicious Activity Reporting Initiative, as of 2014. In an interview, a fusion centre director who participated in this planning as well as its implementation, told me that his thought had been, “if we train state and local cops to understand pre-terrorism indicators, if we train them to be more curious, and to question more what they see,” this could feed into “a system where they could actually get that information to somebody where it matters.” In devising the reporting initiative, the working groups counter-actualised the scenarios of those encounters, and the kinds of larger plots to which they were understood to belong, in order to extract a set of concepts: categories of suspicious “activities” or “patterns of behaviour” corresponding to the phases of a terrorism event in the process of becoming (Deleuze, Negotiations). This conceptualisation of terrorism was standardised, so that it could be taught, and applied, in discerning and documenting the incidents comprising an event’s phases. In police officer training, the various suspicious behaviours were called “terrorism precursor activities” and were divided between criminal and non-criminal. “Functional Standards,” developed by the Los Angeles Police Department and then tested by the Department of Homeland Security (DHS), served to code the observed behaviours for sharing (via compatible communication protocols) up the federal hierarchy and also horizontally between states and regions. In the popular parlance of videos made for the public by local police departments and DHS, which would come to populate the internet within a few years, these categories were “signs of terrorism,” more specifically: surveillance, eliciting information, testing security, and so on. Image 3: “The Seven Signs of Terrorism (sometimes eight).” CC BY-SA 4.0 2015 by author, using materials in the public domain. If the problem of 9/11 had been that the men who would become hijackers had gone unnoticed, the basic idea of the Suspicious Activity Reporting Initiative was to create a mechanism through which the eyes and ears of everyone could contribute to their detection. In this vein, “If You See Something, Say Something™” was a campaign that originated with the New York City Metropolitan Transportation Authority, and was then licensed for use to DHS. The tips and leads such campaigns generated, together with the reports from officers on suspicious incidents that might have to do with terrorism, were coordinated in the Information Sharing Environment. Drawing on reports thus generated, the Federal Government would, in theory, communicate timely information on security threats to law enforcement so that they would be better able to discern the incidents to be reported. The cycle aimed to catch events in emergence, in a distinctively anticipatory strategy of counterterrorism (Stalcup). Re-imagination A curious fact emerges from this history, and it is key to understanding how this initiative developed. That is, there was nothing suspicious in the encounters. The soon-to-be terrorists’ licenses were up-to-date, the cars were legal, they were not nervous. Even Mohamed Atta’s warrant would have resulted in nothing more than a fine. It is not self-evident, given these facts, how a governmental technology came to be designed from these scenarios. How––if nothing seemed of immediate concern, if there had been nothing suspicious to discern––did an intelligence strategy come to be assembled around such encounters? Evidently, strident demands were made after the events of 9/11 to know, “what went wrong?” Policies were crafted and implemented according to the answers given: it was too easy to obtain identification, or to enter and stay in the country, or to buy airplane tickets and fly. But the trooper’s question, the reader will recall, was somewhat different. He had said, “It’s difficult sometimes to think back and go: ‘What if you had known something else?’” To ask “what if you had known something else?” is also to ask what else might have been. Janet Roitman shows that identifying a crisis tends to implicate precisely the question of what went wrong. Crisis, and its critique, take up history as a series of right and wrong turns, bad choices made between existing dichotomies (90): liberty-security, security-privacy, ordinary-suspicious. It is to say, what were the possibilities and how could we have selected the correct one? Such questions seek to retrospectively uncover latencies—systemic or structural, human error or a moral lapse (71)—but they ask of those latencies what false understanding of the enemy, of threat, of priorities, allowed a terrible thing to happen. “What if…?” instead turns to the virtuality hidden in history, through which missed opportunities can be re-imagined. Image 4: “The Cholmondeley Sisters and Their Swaddled Babies.” Anonymous, c. 1600-1610 (British School, 17th century); Deleuze and Parnet (150). CC BY-SA 4.0 2015 by author, using materials in the public domain. Gilles Deleuze, speaking with Claire Parnet, says, “memory is not an actual image which forms after the object has been perceived, but a virtual image coexisting with the actual perception of the object” (150). Re-imagined scenarios take up the potential of memory, so that as the trooper’s traffic stop was revisited, it also became a way of imagining what else might have been. As Immanuel Kant, among others, points out, “the productive power of imagination is […] not exactly creative, for it is not capable of producing a sense representation that was never given to our faculty of sense; one can always furnish evidence of the material of its ideas” (61). The “memory” of these encounters provided the material for re-imagining them, and thereby re-virtualising history. This was different than other governmental responses, such as examining past events in order to assess the probable risk of their repetition, or drawing on past events to imagine future scenarios, for use in exercises that identify vulnerabilities and remedy deficiencies (Anderson). Re-imagining scenarios of police-hijacker encounters through the question of “what if?” evoked what Erin Manning calls “a certain array of recognizable elastic points” (39), through which options for other movements were invented. The Suspicious Activity Reporting Initiative’s architects instrumentalised such moments as they designed new governmental entities and programs to anticipate terrorism. For each element of the encounter, an aspect of the initiative was developed: training, functional standards, a way to (hypothetically) get real-time information about threats. Suspicion was identified as a key affect, one which, if cultivated, could offer a way to effectively deal not with binary right or wrong possibilities, but with the potential which lies nestled in uncertainty. The “signs of terrorism” (that is, categories of “terrorism precursor activities”) served to maximise receptivity to encounters. Indeed, it can apparently create an oversensitivity, manifested, for example, in police surveillance of innocent people exercising their right to assemble (Madigan), or the confiscation of photographers’s equipment (Simon). “What went wrong?” and “what if?” were different interrogations of the same pre-9/11 incidents. The questions are of course intimately related. Moments where something went wrong are when one is likely to ask, what else might have been known? Moreover, what else might have been? The answers to each question informed and shaped the other, as re-imagined scenarios became the means of extracting categories of suspicious activities and patterns of behaviour that comprise the phases of an event in becoming. Conclusion The 9/11 Commission, after two years of investigation into the causes of the disastrous day, reported that “the most important failure was one of imagination” (Kean and Hamilton, Summary). The iconic images of 9/11––such as airplanes being flown into symbols of American power––already existed, in guises ranging from fictive thrillers to the infamous FBI field memo sent to headquarters on Arab men learning to fly, but not land. In 1974 there had already been an actual (failed) attempt to steal a plane and kill the president by crashing it into the White House (Kean and Hamilton, Report Ch11 n21). The threats had been imagined, as Pat O’Malley and Philip Bougen put it, but not how to govern them, and because the ways to address those threats had been not imagined, they were discounted as matters for intervention (29). O’Malley and Bougen argue that one effect of 9/11, and the general rise of incalculable insecurities, was to make it necessary for the “merely imaginable” to become governable. Images of threats from the mundane to the extreme had to be conjured, and then imagination applied again, to devise ways to render them amenable to calculation, minimisation or elimination. In the words of the 9/11 Commission, the Government must bureaucratise imagination. There is a sense in which this led to more of the same. Re-imagining the early encounters reinforced expectations for officers to do what they already do, that is, to be on the lookout for suspicious behaviours. Yet, the images of threat brought forth, in their mixing of memory and an elastic “almost,” generated their own momentum and distinctive demands. Existing capacities, such as suspicion, were re-shaped and elaborated into specific forms of security governance. The question of “what if?” and the scenarios of police-hijacker encounter were particularly potent equipment for this re-imagining of history and its re-virtualisation. References Anderson, Ben. “Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies.” Progress in Human Geography 34.6 (2010): 777-98. Clay, Nolan, and Randy Ellis. “Terrorist Ticketed Last Year on I-40.” NewsOK, 20 Jan. 2002. 25 Nov. 2014 ‹http://newsok.com/article/2779124›. Deleuze, Gilles. Negotiations. New York: Columbia UP, 1995. Deleuze, Gilles, and Claire Parnet. Dialogues II. New York: Columbia UP 2007 [1977]. Federal Bureau of Investigation. “Hijackers Timeline (Redacted) Part 01 of 02.” Working Draft Chronology of Events for Hijackers and Associates. 2003. 18 Apr. 2014 ‹https://vault.fbi.gov/9-11%20Commission%20Report/9-11-chronology-part-01-of-02›. Kant, Immanuel. Anthropology from a Pragmatic Point of View. Trans. Robert B. Louden. Cambridge: Cambridge UP, 2006. Kean, Thomas H., and Lee Hamilton. Executive Summary of the 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. 25 Oct. 2015 ‹http://www.9-11commission.gov/report/911Report_Exec.htm›. Kean, Thomas H., and Lee Hamilton. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York: W.W. Norton, 2004. McConnell, Mike. “Overhauling Intelligence.” Foreign Affairs, July/Aug. 2007. Madigan, Nick. “Spying Uncovered.” Baltimore Sun 18 Jul. 2008. 25 Oct. 2015 ‹http://www.baltimoresun.com/news/maryland/bal-te.md.spy18jul18-story.html›. Manning, Erin. Relationscapes: Movement, Art, Philosophy. Cambridge, MA: MIT P, 2009. O’Malley, P., and P. Bougen. “Imaginable Insecurities: Imagination, Routinisation and the Government of Uncertainty post 9/11.” Imaginary Penalities. Ed. Pat Carlen. Cullompton, UK: Willan, 2008.Roitman, Janet. Anti-Crisis. Durham, NC: Duke UP, 2013. Simon, Stephanie. “Suspicious Encounters: Ordinary Preemption and the Securitization of Photography.” Security Dialogue 43.2 (2012): 157-73. Stalcup, Meg. “Policing Uncertainty: On Suspicious Activity Reporting.” Modes of Uncertainty: Anthropological Cases. Eds. Limor Saminian-Darash and Paul Rabinow. Chicago: U of Chicago P, 2015. 69-87. Wall Street Journal. “A Careful Sequence of Mundane Dealings Sows a Day of Bloody Terror for Hijackers.” 16 Oct. 2001.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "United States. Federal Bureau of Investigation. Counterterrorism Section"

1

Dār al-Kitāb al-ʻArabī Lajnat al-Tarjamah wa-al-Iʻdād. Shahādat Ṣaddām Ḥusayn lil-tārīkh: Wifqan lil-wathāʼiq al-sirrīyah al-Amrīkīyah lil-If Bī Āy, FBI, wa-maḥāḍir al-muḥākamāt. Dimashq: Dār al-Kitāb al-ʻArabī, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

(Firm), BBC Learning, British Broadcasting Corporation e Films for the Humanities (Firm), eds. The Third World War, Al Qaeda: The hunt for America's sleeper cells. Princeton, NJ: Films for the Humanities, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Salim, Boukhari, BBC Learning (Firm), British Broadcasting Corporation e Films for the Humanities (Firm), eds. The Third World War, Al Qaeda: The hidden enemy. Princeton, NJ: Films for the Humanities, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

United States. Congress. Senate. Committee on the Judiciary. Oversight hearing on counterterrorism: Hearing before the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, second session, June 6, 2002. Washington: U.S. G.P.O., 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

United States. Government Accountability Office. FBI transformation: Data inconclusive on effects of shift to counterterrorism-related priorities on traditional crime enforcement : report to the chairman, Subcommittee on Commerce, Justice, State, and the Judiciary, and Related Agencies, Committee on Appropriations, House of Representatives. Washington, D.C: U.S Government Accountability Office, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights. CISPES and FBI counterterrorism investigations: Hearings before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, One Hundredth Congress, second session, June 13 and September 16, 1988. Washington: U.S. G.P.O., 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Threats to the homeland: Hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, November 14, 2013. Washington: U.S. Government Printing Office, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Homeland threats and agency responses: Hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, September 19, 2012. Washington: U.S. G.P.O., 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

FBI counterterrorism: Vacancies have declined, but FBI has not assessed the long-term sustainability of its strategy for addressing vacancies : report to congressional requesters. Washington, D.C.]: U.S. Govt. Accountability Office, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia