The War on Drugs

The War on Drugs

Author: Ron Chepesiuk

Publisher: Bloomsbury Publishing USA

Published: 1999-12-17

Total Pages: 351

ISBN-13: 1576074501

DOWNLOAD EBOOK

Here is the whole story of the world of drugs—from the infamous Opium Wars to the legal availability of narcotics in the United States during the past century; from the unexpected boost given to illicit drugs by Prohibition to the great success of the French Connection. The global drug trade is one of the most prominent examples of the law of supply and demand. Despite such countermeasures as the execution of narcotics dealers in China and the United States's much-ballyhooed "War on Drugs," drug traffickers have always managed to meet the demand and satisfy an ever-growing customer base. In addition to offering a wealth of little-known facts, The War on Drugs also covers major dealers, cartels, organizations, smuggling and anti-smuggling strategies, major miscalculations and disasters, drug epidemics, legal restraints, famous incidents, and more.


Scientific and Technical Aerospace Reports

Scientific and Technical Aerospace Reports

Author:

Publisher:

Published: 1995

Total Pages: 456

ISBN-13:

DOWNLOAD EBOOK

Lists citations with abstracts for aerospace related reports obtained from world wide sources and announces documents that have recently been entered into the NASA Scientific and Technical Information Database.


Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists

Author: National Research Council

Publisher: National Academies Press

Published: 2008-09-26

Total Pages: 376

ISBN-13: 0309134447

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.