Thompson, Mark
June 2003
Time;6/2/2003, Vol. 161 Issue 22, p19
Reports that budget concerns may force a cutback in tests for a $100 billion shield to protect the U.S. against missile attacks from terrorists or rogue states. Call by the U.S. Pentagon for 20 tests by 2009 to prove that the interceptor rockets could find and destroy missiles fired toward the U.S.; Plans to cutback testing to nine tests; Expectation that the program will be ready by 2004.


Related Articles

  • Putting the "Security" Back into "National Security". Maitra, Susan // Foreign Service Journal;Nov2006, Vol. 83 Issue 11, p11 

    The article presents the author's opinion on the measures carried out to safeguard the national borders of the countries such as the U.S. which are affected by terrorism. The Security Framework Project is said to be a step to strengthen the national security. The author believes that the...

  • Two Years Later. Clark, Timothy B. // Government Executive;Sep2003, Vol. 35 Issue 14, p6 

    Two years after 19 terrorists turned four commercial jetliners into missiles, leveling the World Trade Center and severely damaging the Pentagon, federal agencies are still trying to figure out how best to secure the U.S. from future attacks. Reducing vulnerabilities in a democratic society,...

  • Security Advisories.  // World Almanac & Book of Facts;2004, p167 

    Discusses how the various security advisories established by the Homeland Security Advisory System are used to indicate the estimated threat level for a terrorist attack in the United States. Consideration of the security measures that should be taken to comply with low, guarded, elevated, and...

  • Additional Steps Needed to Enhance Foreign Partners' Capacity to Prevent Terrorist Travel. Johnson Jr., Charles Michael // GAO Reports;7/12/2011, preceding p1 

    The article presents a study conducted by the U.S. Government Accountability Office (GAO) concerning terrorism. It states that GAO identified four main gaps in foreign countries' capacity to hinder terrorist travel such as addressing the use of fallacious travel documents and securing passport...

  • States Face Homeland Sec. Challenges.  // PA Times;Feb2008, Vol. 31 Issue 2, p1 

    The article reports on the issue from National Governors Association Center for Best Practices noting that the U.S. states are working more closely and more effectively with federal agencies to share information that could prevent terrorist attacks. It examines the challenges facing state...

  • Checkpoint Security Gaps, Poor Procurement Policies and Solutions. Haber, Grant // Sheriff;Mar/Apr2007, Vol. 59 Issue 2, p30 

    The article discusses the proper way of handling security measures in the U.S. Before implementing corrective measures, it is important to first understand how security gaps at the nation's checkpoints are created, why they continue to exist, and what steps must be taken to ensure they are not...

  • Singapore's Approach to Homeland Security. Tan, Andrew T. H. // Southeast Asian Affairs;2005, p349 

    Examines the initiatives taken by the Singaporean government to strengthen homeland security. Impact of the September 11, 2001 terrorist attacks in the U.S. on the country; Foundation of Singapore's national security structure; Determinants of the exposure of the country to international terrorism.

  • STRETCHED THIN. Peters, Katherine Mcintire // Government Executive;Sep2003, Vol. 35 Issue 14, p48 

    This article presents information related to the fact that Homeland security requirements and military commitments abroad are forcing the Department of Defense of the U.S. to rethink its mix of active and reserve forces. Since September 11, 2001, about 300,000 National Guard members and...

  • Homeland Security: Challenges and Strategies in Addressing Short- and Long-Term National Needs: GAO-02-160T.  // GAO Reports;11/7/2001, p1 

    The United States now confronts a range of diffuse threats that put increased destructive power into the hands of small states, groups, and individuals. These threats include terrorist attacks on critical infrastructure and computer systems, the potential use of weapons of mass destruction, and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics