Search

Your search keyword '"Dahl, Erik J."' showing total 379 results

Search Constraints

Start Over You searched for: Author "Dahl, Erik J." Remove constraint Author: "Dahl, Erik J."
379 results on '"Dahl, Erik J."'

Search Results

4. The mirror is cracked, not broken

10. Should Homeland Security Studies Survive?

11. IMPACT OF THE CHINA COAST GUARD AND THE PEOPLE’S ARMED FORCES MARITIME MILITIA ON THE (IN)STABILITY OF THE SOUTH CHINA SEA

12. LEARNING TO COMPETE WHEN THE GAME CHANGES: COVERT ACTION IN AMERICAN COLD WAR GRAND STRATEGY 1947-1960

13. VULNERABILITY ANALYSIS OF GUAM’S DEFENSE POSTURE

14. BUILDING CAPACITY AGAINST EXTREMIST THREATS: A FRAMEWORK FOR IMPROVED CORRECTIONAL INTELLIGENCE

15. INSIDER THREAT: A CONSTANT PROBLEM WITH A CONTINUOUS APPROACH

16. FRAMING THREATS TO HOMELAND SECURITY

17. PANDEMICS: A THREAT AGAINST U.S. MILITARY FORCES

18. CRYPTOCURRENCY: CHANGING THE GAME FOR STATE AND LOCAL LAW ENFORCEMENT

19. THE PEN, THE SHIELD, OR THE SWORD? HOW THE UNITED STATES WINS THE HYPERSONIC ARMS RACE

20. THE ROLE OF INTELLIGENCE FUSION CENTERS IN FIGHTING DOMESTIC VIOLENT EXTREMISM

21. AUTONOMOUS WEAPON SYSTEMS: HOW THE HUMAN OPERATOR STAYS INVOLVED

22. CHINA COAST GUARD REFORMS FROM 2013 TO PRESENT

23. IOT IN CRISIS MANAGEMENT

27. MISSING AN OPPORTUNITY: NON-TRADITIONAL RESPONDERS AND ACTIVE SHOOTER RESPONSE

28. READY FOR THE HOME GAME? THE SURFACE NAVY AND HOMELAND DEFENSE

29. UNITED STATES NATIONAL SECURITY POLICY TOWARDS THE PANAMA CANAL IN AN ERA OF GREAT POWER CONFLICT

30. REEXAMINING THE LENGTH OF LAW ENFORCEMENT CAREERS

31. CONNECTING THE DOTS OF AN OPAQUE CRIME: ANALYZING THE INFORMATION-SHARING FRAMEWORK AND PRACTICES OF CALIFORNIA’S HUMAN-TRAFFICKING TASK FORCES

32. THE BOMBER WILL ALWAYS GET THROUGH: THE ORIGIN OF THE B-21 STEALTH BOMBER

33. OPENING THE APERTURE: HOLISTIC MITIGATION OPTIONS IN RESPONSE TO UAS THREATS

34. 2035 AND U.S. NAVY INTELLIGENCE: COMMUNITY MANNING FOR SUCCESS IN THE INDO-PACIFIC

35. U.S. HOSTAGE POLICY: THE EFFECTIVENESS OF RANSOM PAYMENTS ON THE DURATION IN CAPTIVITY FOR AMERICAN HOSTAGES

36. SAFEGUARDING THE SCHOOL COMMUNITY: A STANDARDIZED APPROACH TO STATEWIDE BEHAVIORAL THREAT ASSESSMENT PROGRAMS

37. THE ELECTROMAGNETIC THREAT TO THE UNITED STATES: RECOMMENDATIONS FOR CONSEQUENCE MANAGEMENT

38. FINDING SAFETY IN NUMBERS: EXPLORING THE POSSIBILITIES OF TERRORISM CONSEQUENCE MODELS AS PUBLIC SAFETY PLANNING TOOLS

39. TO DETAIN OR NOT TO DETAIN: THE LEGAL, FINANCIAL, AND HUMANITARIAN RAMIFICATIONS OF DETAINING ALL MIGRANTS WITHOUT A LAWFUL STATUS

40. VULNERABILITY ANALYSIS OF GUAM’S DEFENSE POSTURE

41. CHINA COAST GUARD REFORMS FROM 2013 TO PRESENT

42. SECURING AMERICA’S HUMANITARIAN MISSION: HOW MOBILE TECHNOLOGY CAN ENHANCE REFUGEE VETTING

44. Divine Jigsaw Puzzle: Tony Insall:Secret Alliances: Special Operations and Intelligence in Norway 1940–1945—The British Perspective Biteback Publishing, London, 2019, 422 p., £25 (hardcover).

46. FOREIGN-BORN HUMAN TRAFFICKING—A DARK SPECTER HAUNTING AMERICA: AN EXAMINATION OF THE SEX AND LABOR TRAFFICKING LANDSCAPE

47. “DANGER CLOSE”: THE NEED FOR A NATIONWIDE DECONFLICTION AND NOTIFICATION SYSTEM FOR ALL LAW ENFORCEMENT AGENCIES

48. SECURING THE NHL GLOBAL SERIES: HOW INTERNATIONAL TERRORISM CAN THREATEN HOCKEY

49. I’VE GOT MY AI ON YOU: ARTIFICIAL INTELLIGENCE IN THE LAW ENFORCEMENT DOMAIN

50. SECURITY COOPERATION WITH CUBA: THE IMPACT OF NORMALIZATION ON THE COAST GUARD’S RELATIONSHIP WITH THE CUBAN BORDER GUARD

Catalog

Books, media, physical & digital resources