Search results
Jump to navigation
Jump to search
- {{Distinguish|Global Terrorism Database}} ...researchgate.net/publication/235042082_Terrorism_Knowledge_Base_TKB |title=TERRORISM KNOWLEDGE BASE (TKB) Final Technical Report |author1=Douglas B. Lenat |auth ...5 KB (662 words) - 23:02, 15 December 2024
- ...es]] for use in [[offender profiling|profiling]] different categories of [[terrorism|terrorist]] [[List of terrorist incidents|attacks]] to determine the compon [[Category:Terrorism databases]] ...3 KB (364 words) - 14:28, 22 September 2024
- '''Operation TIPS''', where the last part is an [[acronym]] for the ''Terrorism Information and Prevention System'', was a domestic intelligence-gathering ...Operation TIPS, he maintained that the information would still be kept in databases by various [[law enforcement agency|law enforcement agencies]].<ref>{{cite ...8 KB (1,130 words) - 05:59, 22 October 2025
- The '''Multistate Anti-Terrorism Information Exchange Program''', also known by the acronym '''MATRIX''', wa The system was reported to analyze government and commercial databases to find associations between suspects or to discover locations of or comple ...9 KB (1,275 words) - 00:01, 8 November 2024
- ...n">{{cite news|title=Security Council unanimously adopts wide-ranging anti-terrorism resolution; calls for suppressing financing, improving international cooper ...so that they can ratify all of the existing [[international conventions on terrorism]]. It stated that all States "should also ensure that terrorist acts are es ...10 KB (1,360 words) - 21:12, 22 January 2025
- ...nguish|Combating Terrorism Center|Counterterrorism Center|National Counter Terrorism Centre}} ...orld, growing beyond control}}</ref> The NCTC advises the United States on terrorism. ...14 KB (1,680 words) - 18:28, 16 June 2025
- {{Short description|US counter-terrorism system}} ...individuals known to pose, or suspected of posing, a risk of air piracy or terrorism or a threat to airline or passenger safety." The list is used to pre-emptiv ...16 KB (2,257 words) - 03:27, 25 May 2025
- ...7/lps68317/www.state.gov/j/ct/rls/crt/index-3.htm|title=Country Reports on Terrorism|website=permanent.access.gpo.gov|access-date=2019-02-26}}</ref> The [[Unite *each foreign country in which acts of international [[terrorism]] occurred; ...14 KB (1,942 words) - 03:02, 24 January 2025
- ...ess|T.I.A.]] created out of fear of terrorism) to analyze G.I.C.'s massive databases. Also, people's phones are, in the name of preventing terrorist communicati ...5 KB (793 words) - 21:11, 29 March 2025
- ...e CIA has to offer". They also have "computers linked to the CIA's central databases, and access to highly classified intercepts." ...to jointly "make daily decisions on when and how to apprehend suspects [of terrorism], whether to [[Extraordinary rendition|whisk them off]] to other countries ...6 KB (819 words) - 04:42, 27 May 2024
- ...lance|surveillance]] and security technologies; [[Counterterrorism|counter-terrorism]]; [[Right of asylum|asylum]] and [[immigration]]; [[criminal law]]; [[raci ...tewatch {{!}} Statewatch Library & Archive |url=https://www.statewatch.org/databases/statewatch-library-archive/ |access-date=2024-09-13 |website=www.statewatch ...32 KB (4,231 words) - 03:20, 26 May 2025
- ...ic flights by 2005.<ref>{{Cite web |title=S.2845 - Intelligence Reform and Terrorism Prevention Act of 2004 |url=https://www.congress.gov/bill/108th-congress/se In 2013, the program was further expanded to search private databases for information like past travel with the intention of identifying low risk ...11 KB (1,568 words) - 03:29, 14 June 2025
- ...cial Operations Forces]] (SOF), in support of anti-terrorism and [[counter-terrorism]] missions in war zones and beyond. The SSB has been dissolved with many of ...spy networks and the technology for direct access to national intelligence databases to USSOCOM's special operations units, specifically the special missions un ...8 KB (1,085 words) - 04:07, 9 April 2025
- ...lity to instantly check the person seeking entry against several "lookout" databases using the [[Interagency Border Inspection System]]. In 2009, DHS announced *The databases resulted in 25,552 hits for consular officers overseas adjudicating visa ap ...9 KB (1,230 words) - 18:58, 26 June 2025
- ;[[Kosovo]]: FY 2009, NADR Terrorism Interdiction Program funding will sustain existing program operations and p ;[[Republic of Macedonia|Macedonia]]: FY 2007, NADR Terrorism Interdiction Program funding will sustain existing program operations and p ...19 KB (2,602 words) - 19:39, 4 January 2025
- ...n the use of genetic engineering, leading to the [[Biological Weapons Anti-Terrorism Act of 1989]].<ref name="US Bioweapons Break Laws">{{cite web | title = Bro ...h as [[racialized]] medicine, race in science, and racial profiling in DNA databases ...9 KB (1,243 words) - 18:34, 21 March 2025
- ...rmation processing system must be permanently connected to member nations' databases and must be updated in [[real-time computing|real-time]]. ...The SIS automatically directs data to queries arriving via large national databases. Each member nation has an office responsible for SIS communications. SIS a ...20 KB (2,760 words) - 16:54, 6 May 2025
- ...ot include a work stoppage or other employee-related action not related to terrorism and resulting from an employer-employee dispute.</ref> improper transportat ...st|terrorist watchlist]]s, National Crime Information Center (NCIC), other databases, and may search to see if other extensive foreign or domestic criminal conv ...16 KB (2,264 words) - 02:57, 18 March 2025
- ...umerous sections. '''Title IV: Protecting the Border''' aims to prevent [[terrorism]] in the USA through [[immigration]] regulations. The provisions of the ti ...les/2001/back1501.html "The USA PATRIOT Act of 2001, A Summary of the Anti-Terrorism Law's Immigration-Related Provisions"], ''[[Center for Immigration Studies] ...24 KB (3,784 words) - 10:29, 27 May 2025
- ...ast=Funk |first=McKenzie |date=2023-09-22 |title=The Man Who Trapped Us in Databases |language=en-US |work=The New York Times |url=https://www.nytimes.com/2023/ ...sint, Hank Asher played a leading role in developing the [[Multistate Anti-Terrorism Information Exchange]] (MATRIX) [[datamining]] system for the [[Florida Dep ...16 KB (2,180 words) - 10:51, 1 January 2025