Catalog Search Results
Author
Pub. Date
2003
Description
In Beyond Baghdad, America's most provocative writer on strategy recounts the liberation of Iraq and analyzes its implications for the future of U.S. military strategy and foreign policy. Author Ralph Peters describes future threats at home and abroad, offers startling insights into today's most pressing issues, and highlights global opportunities that lie, unrecognized, within our grasp. Written in his trademark style-powerful, lively, and accessible,...
63) Obama's wars
Author
Pub. Date
[2010]
Description
Woodward shows Obama making the critical decisions on the Afghanistan War, the secret war in Pakistan and the worldwide fight against terrorism.
Author
Pub. Date
2022.
Description
A legal analyst for NPR, NBC, and CNN, delves into the facts surrounding what has been called the "worst intelligence disaster in U.S. history" the case of Robert Hanssen--a Russian spy who was embedded in the FBI for two decades. As a federal prosecutor and the daughter of an FBI agent, Wiehl has an inside perspective. She brings her experience and the ingrained lessons of her upraising to bear on her remarkable exploration of the case, interviewing...
Author
Pub. Date
[2007]
Description
Naomi Wolf compels us to face the way our free America is under assault. She warns us--with the straight-to-fellow-citizens urgency of one of Thomas Paine's revolutionary pamphlets--that we have little time to lose if our children are to live in real freedom. Wolf shows that there are ten classic steps dictators or would-be dictators always take when they wish to close down an open society. Each of those ten steps is now underway in the United States...
Author
Pub. Date
[2016].
Description
NSA director Theodore Anders has a simple goal: collect every phone call, email, and keystroke tapped on the Internet. He knows unlimited surveillance is the only way to keep America safe. Evelyn Gallagher doesn't care much about any of that. She just wants to keep her head down and manage the NSA's camera network and facial recognition program so she can afford private school for her deaf son, Dash. But when Evelyn discovers the existence of a program...
68) Border security
Author
Series
Pub. Date
[2016]
Description
The United States has two of the longest unfortified borders in the world . . . and people arrive daily by air from outside the country, too. At those borders and airports are the border security officers who are on the front lines of making sure our nation is protected. They use their training, skill, and the latest technology to keep the bad guys out. Inside, learn how they keep our borders safe, every day, around the clock. Adventure, courage,...
Author
Pub. Date
2010
Description
"In May 1998, India and Pakistan put to rest years of speculation about whether they possessed nuclear technology and openly tested their weapons. Some believed nuclearization would stabilize South Asia; others prophesized disaster. Authors of two of the most comprehensive books on South Asia's new nuclear era, Sumit Ganguly and S. Paul Kapur, offer competing theories on the transformation of the region and what these patterns mean for the world's...
Author
Pub. Date
2015.
Description
Pulitzer Prize-winning journalist Charlie Savage's penetrating investigation of the Obama presidency and the national security state.
Barack Obama campaigned on changing George W. Bush's "global war on terror" but ended up entrenching extraordinary executive powers, from warrantless surveillance and indefinite detention to military commissions and targeted killings. Then Obama found himself bequeathing those authorities to Donald Trump. How did...
Author
Pub. Date
[2021]
Description
In 1982 three of the most powerful men in Asia met in Hong Kong. They would decide how Hong Kong would be handed over to the People's Republic of China and how Chinese business tycoons Henry Fok and Li Ka-Shing would help Deng Xiaoping realize the Chinese Communist Party's domestic and global ambitions. That meeting would not only change Vancouver but the world. Billions of dollars in Chinese investment would soon reach the shores of North America's...
Author
Pub. Date
2017.
Description
"A veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States....
75) See something, say nothing: a Homeland Security officer exposes the government's submission to jihad
Author
Pub. Date
[2016]
Description
One day after a prominent U.S. Muslim leader reacted to the November 2015 Paris attacks with a declaration that the Islamic State, also known as ISIS, has nothing to do with Islam, President Obama made the same assertion. Who exactly is the enemy we face, not only in the Middle East but also within our borders? Is it "murderers without a coherent creed"; or "nihilistic killers who want to tear things down," as some described ISIS after 130 people...
76) Project legion
Author
Series
Pub. Date
2011
Description
Ten years after a deep space transmission was broadcast from a futuristic citadel hidden in the Arctic ice, Jon Hudson finds himself in a position beyond comprehension.
77) Project Nemesis
Author
Series
Pub. Date
c2012
Description
"Jon Hudson, lead investigator for the Department of Homeland Security's Fusion Center-P, thinks his job is a joke. While other Fusion Centers focus on thwarting terrorist activity, Hudson's division is tasked with handling paranormal threats to national security, of which there have been zero during his years at the DHS. When yet another Sasquatch sighting leads to a research facility in the backwoods of Maine, disguised as an abandoned Nike missile...
Author
Pub. Date
[2008]
Description
Running spy networks overseas. Tracking down terrorists in the Middle East. Interrogating enemy prisoners. Analyzing data from spy satellites and intercepted phone calls. All of these are vital intelligence tasks that traditionally have been performed by government officials accountable to Congress and the American people. But that is no longer the case. Starting during the Clinton administration, when intelligence budgets were cut drastically and...
Author
Series
Ben Kincaid novels volume 16
Formats
Description
During a ten-year memorial for the Oklahoma City bombing, a terrorist attack kills the First Lady, prompting the president to call for contitutional reforms that will compromise civil liberties, and the suspicious wife of a renegade senator launches an investigation.