Railway Security Policy and Administration in the United States: Reacting to the Terrorist Threat after September 11, 2001

2018 ◽  
pp. 617-630
Author(s):  
Jeremy F. Plant ◽  
Gary A. Gordon ◽  
Richard R. Young
Author(s):  
Zachary R. Lewis ◽  
Kathryn L. Schwaeble ◽  
Thomas A. Birkland

The September 11 terrorist attacks on the United States were a focusing event that greatly increased attention to particularly large acts of terrorism as a threat to the United States and to particular interests. One of these interests is the aviation industry. The September 11 attacks exploited features of the aviation industry that made it prone to attack and that made an attack on this industry particularly vivid and attention-grabbing. The September 11 attacks led to policy changes in the United States and around the world with respect to aviation security, but those changes were not made in a vacuum. The changes that followed the September 11 attacks were made possible by efforts to learn from the range of aviation security incidents and challenges that have faced commercial aviation throughout its history. While the September 11 attacks were shocking and seemed novel, prior experience with aviation security crises provided those working in the aviation security policy realm with potential responses. The responses were drawn from a set of politically feasible responses that addressed the lapses in security demonstrated by terrorist attacks. The history of policy changes related to terrorism in aviation parallel the changes to policies that were made across the board in response to the elevation of terrorism on the agenda.


2021 ◽  
Vol 4 (2) ◽  
Author(s):  
Farhana Kosar

It is necessary to explore Pakistan-China relations in terms of their longterm bilateral contacts, including the history and evolution of their longterm bilateral ties, as well as the factors and environment that led to the consolidation of their strategic dependence. The two nations established diplomatic connections to begin their bilateral relations, which have since developed into close allies. Afterwards, they deepened their engagement with one another and strengthened their strategic reliance, which they nicknamed the "Iron Brothers" partnership. Throughout the course of this study, the foundations of comprehensive cooperation in Pakistan-China relations at various phases of their evolution are examined, as well as the imperatives of interdependence between the two countries. Particular attention is paid to the relevance of China in the increasing dynamics of South Asia, including India's ambitions to gain regional dominance and its connections with other nations, notably the United States, and the significance of China in the rising dynamics of South Asia. According to the conclusion of the talk, the imperatives of regional security, notably the growing Indo-US collaboration, have given rise to new dimensions in Pakistan's relationship with China in the years after September 11, 2001.


2017 ◽  
Vol 25 (3) ◽  
pp. 371-392 ◽  
Author(s):  
Amy Baker Benjamin

At the heart of contemporary international law lies a paradox: the attacks on the United States of September 11, 2001 have justified 16 years of international war, yet the official international community, embodied principally in the United Nations, has failed to question or even scrutinise the US government's account of those attacks. Despite the emergence of an impressive and serious body of literature that impugns the official account and even suggests that 9/11 may have been a classic (if unprecedentedly monstrous) false-flag attack, international statesmen, following the lead of scholars, have been reluctant to wade into what appears to be a very real controversy. African nations are no strangers to the concept of the false flag tactic, and to its use historically in the pursuit of illegitimate geopolitical aims and interests. This article draws on recent African history in this regard, as well as on deeper twentieth-century European and American history, to lay a foundation for entertaining the possibility of 9/11-as-false-flag. This article then argues that the United Nations should seek to fulfil its core and incontrovertible ‘jury’ function of determining the existence of inter-state aggression in order to exercise a long-overdue oversight of the official 9/11 narrative.


2019 ◽  
Author(s):  
Brandon C. Halaychik

The Russian Federations drive to reestablish itself as a global power has severe security implications for the United States, its Arctic neighbors, and the North Atlantic Treaty Organization as a whole. The former Commander of United States Naval Forces Europe Admiral Mark Ferguson noted that the re-militarization of Russian security policy in the Arctic is one of the most significant developments in the twenty-first century adding that Russia is creating an “Arc of steel from the Arctic to the Mediterranean” (Herbst 2016, 166). Although the Russian Federation postulates its expansion into the Arctic is for purely economic means, the reality of the military hardware being placed in the region by the Russians tells otherwise. Implementation of military hardware such as anti-air defenses is contrary to the stipulated purposes of the Russian Government in the region. Therefore is the Russian Federation building strategic military bases in the Arctic to challenge the United States hegemony due to the mistreatment against the Russians by the United States and NATO after the collapse of the Soviet Union.


Author(s):  
Stephen R. Burant

Both Ukrainian and Polish policymakers have come to use the term strategic partnership to characterize the relationship between their two countries. Teodozii Starak, an adviser to the Ukrainian Embassy in Poland, has stated that strategic partnership "means that both [Ukraine and Poland] demonstrate coordinated stances and support each other in the most important political areas. " However, Ukrainian President Leonid Kuchma also regularly uses the term to characterize his country's relations with Russia. In addition, Ukrainian officials have labeled China, the United States, Germany, and Bulgaria as Ukraine's strategic partners. The use of the term with reference to Russia-with which Ukraine throughout the 1990s has had serious political differences-or Bulgaria or China, which are not priorities for Ukrainian foreign and security policy, appears to strip it of any significance; the term implies, at best, a goal, or, at worst, a public relations effort.


2018 ◽  
Vol 5 (1) ◽  
pp. 1-10
Author(s):  
Ida Susilowati ◽  
Nur Rohim Yunus ◽  
Muhammad Sholeh

Abstract: Terrorism is a crime committed by a group of people to frighten, terrorize, intimidate a country's government. In the case of the September 11, 2001 terror that occurred at the World Trade Center and the Pentagon, the United States accused the al-Qaeda group of being behind the attack. Furthermore, the United States attacked Afghanistan and Iraq. America considers the attacks carried out are legitimate because they are carried out to reduce world terrorism crimes. Whereas behind that there is another motive for controlling the oil in the country that it attacked.Keywords: Terrorism, Intervention, United States. Abstrak:Terorisme merupakan kejahatan yang dilakukan oleh sekelompok orang guna menakuti, meneror, mengintimidasi pemerintahan suatu negara. Dalam kasus teror 11 September 2001 yang terjadi pada World Trade Center dan Pentagon, Amerika Serikat menuduh kelompok al-qaidah di balik serangan tersebut. Selanjutnya Amerika Serikat melakukan penyerangan terhadap Afghanistan dan Iraq. Amerika menganggap serangan yang dilakukan adalah sah karena dilakukan untuk meredam kejahatan terorisme dunia. Padahal di balik itu ada motif lain untuk menguasai minyak yang ada di negara yang diserangnya.Kata Kunci: Terrorisme, Intervensi, Amerika Serikat


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


mBio ◽  
2011 ◽  
Vol 2 (6) ◽  
Author(s):  
Michael J. Imperiale ◽  
Arturo Casadevall

ABSTRACT In the fall of 2001, Bacillus anthracis spores were spread through letters mailed in the United States. Twenty-two people are known to have been infected, and five of these individuals died. Together with the  September 11 attacks, this resulted in a reevaluation of the risks and benefits of life science research with the potential for misuse. In this editorial, we review some of the results of these discussions and their implications for the future.


Sign in / Sign up

Export Citation Format

Share Document