|
Showing 1 - 17 of
17 matches in All Departments
This book examines the major dynamics that drive changes in the
religio-political landscape of the Muslim world, the effects of
9/11, the global war on terrorism, and the war in Iraq, and their
implications for global security and U.S. and Western interests.
This book identifies the procedures and capabilities that the U.S.
Department of Defense, other agencies of the U.S. government, U.S.
allies and partners, and international organizations require in
order to support the transition from counterinsurgency, when the
military takes primary responsibility for security and economic
operations, to stability and reconstruction, when police and
civilian government agencies take the lead.
Multinational corporations can be significant actors in zones of
violent conflict. Corporate actions to shape their environment can
sometimes mitigate conflict, but as the authors show in their case
studies, corporate activities can help generate and sustain
violence.
Building on prior RAND research analyzing the motives, drivers, and
capabilities of the principal extremist groups operating in the
Philippines, southern Thailand, and Indonesia, this study examined
the historical roots of militancy in these countries, the
development and perpetuation of extremist ideological frameworks,
and national and international government response efforts.
Current unrest in the Malay-Muslim provinces of southern Thailand
has captured growing national, regional, and international
attention due to the heightened tempo and scale of rebel attacks,
the increasingly jihadist undertone that has come to characterize
insurgent actions, and the central government's often brutal
handling of the situation on the ground. This paper assesses the
current situation and its probable direction. This paper assesses
the current situation and its probable direction.
The vast size and highly unregulated nature of the world's
waterways have
made the maritime environment an increasingly attractive theater
for
perpetrators of transnational violence. Piracy and sea-borne
terrorism have
been on the rise since 2000. While the United States has
spearheaded several
important initiatives to improve maritime security, the author
urges
policymakers to consider four additional measures to safeguard the
world's
oceans.
The threat posed by a terrorist group is determined in large part
by its ability to build its organizational capabilities and bring
those capabilities to bear in violent action. Technology systems,
meanwhile, play a key role within a larger, integrated homeland
security strategy to target groups' efforts and protect the public
from terrorist violence. technology systems designed to protect the
public, actively seek ways to evade or counteract these systems.
This volume examines a variety of terrorist groups - including
Palestinian terrorist groups, Jemaah Islamiya and affiliated
groups, the Liberation Tigers of Tamil Eelam, and the Provisional
Irish Republican Army - to understand terrorists' countertechnology
efforts. Fully exploring adversaries' countertechnology behaviors
can expose vulnerabilities in U.S. defenses and help the nation
make the best choices to protect it from the threat of terrorism.
technologies as well as planning the technological components of
homeland security efforts.
Terrorist groups - both inside and outside the al Qaeda network -
sometimes form mutually beneficial partnerships to exchange "best
practices." Operation Enduring Freedom and the global war on
terrorism forced many members of al Qaeda to disperse, while
like-minded terrorist groups have formed regional alliances and
other terrorist groups that are not linked ideologically have
formed mutually beneficial partnerships. Understanding these
interactions is essential to ongoing and future efforts to counter
terrorist threats. This volume examines how eleven terrorist groups
in three distinct areas (Mindanao, the West Bank and Gaza Strip,
and southwest Colombia) have attempted to exchange technologies and
knowledge. The authors chose case studies in regions where
terrorist groups are highly capable, thus the technologies and
exchange processes are weighed toward success and should be of
significant concern to the U.S. national security community. The
authors examine a variety of technologies and exchange processes,
ranging from remote-detonation devises to converted field ordnance
to katyusha rockets. The authors' conclusions relate to improving
threat assessments, disrupting innovation processes, and affecting
terrorist groups' cost-benefit analyses. This volume should be of
interest to homeland security policymakers, the national security
community, as well as academics, students, and professionals in
counterterrorism, homeland security, and organizational learning.
Understanding how terrorist groups learn may aid in developing
strategies to combat terrorist activities Better ways are needed to
understand how terrorist groups become more effective and
dangerous. Learning is the link between what a group wants to do
and its ability to actually do it; therefore, a better
understanding of group learning might contribute to the design of
better measures for combating terrorism. This study analyzes
current understanding of group learning and the factors that
influence it and outlines a framework that should be useful in
present analytical efforts and for identifying areas requiring
further study.
Case studies of the organizational learning activities of five
major terrorist groups and a methodology for ascertaining what and
why they learned Better ways are needed to understand how terrorist
groups increase their effectiveness and become more dangerous.
Learning is the link between what a group wants to do and its
ability to actually do it; therefore, a better understanding of
group learning might contribute to the design of better measures
for combating terrorism. This study analyzes current understanding
of group learning and the factors that influence it. It presents
detailed case studies of learning in five terrorist organizations
and develops a methodology for ascertaining what and why groups
have learned, providing insights into their learning processes.
Reviews four countries' domestic intelligence services to assess
whether the creation of such an agency in the United States, apart
from the Federal Bureau of Investigation, would be beneficial.
(PW); Since the September 11, 2001, attacks, critics have charged
that the Federal Bureau of Investigation (FBI), while qualified to
investigate terrorist incidents after the fact, is not wel equipped
enough to adequately gather and a assess information to prevent
attacks. Given the bureau's law enforcement and prosecutorial
cultural, many believe that the burden of countering terrorism, the
FBI's main focus now, in addition to the load of taking on
"ordinary" crime, may be too much. To better inform debate,
researchers analyzed the domestic security structures of four
allied countries-the United Kingdom, France, Canada, and
Australia-weighing both their positive and negative aspects.
Momentous events since September 11, 2001 - the 9/11 terrorist
attacks, Operation Enduring Freedom, the global war on terrorism,
and the recent war in Iraq - have dramatically altered the
political environment of the Muslim world, its attitudes and
relations toward the West, and vice versa. Many dynamic forces
influencing this environment, however, are the products of trends
that have been at work for many decades. This new book examines the
major dynamics driving changes in the religio-political landscape
of the Muslim world - a vast and diverse region that stretches from
Western Africa through the Middle East to the Southern Philippines
and includes Muslim communities and diasporas throughout the world
- as well as the implications of these trends for global security
and Western interests. The world's Muslims encompass a broad
religious universe and differ in their political and social
orientation. This volume first presents a typology of ideological
tendencies in the different regions of the Muslim world, along a
spectrum of views toward democracy and violence. Second, it
identifies the factors that produce religious extremism and
violence. Third, it assesses key cleavages and f
Assesses the vulnerabilities of the agricultural sector and the
food chain to a deliberate act of biological terrorism and explores
the likely outcomes of a successful attack. Over the past decade,
the United States has endeavoured to increase its ability to
detect, prevent and respond to terrorist threats and incidents. The
agriculture sector and the food industry in general, however, have
received comparatively little attention with respect to protection
against terrorist incidents. This study aims to expand the current
debate on domestic homeland security by assessing the
vulnerabilities of the agricultural sector and the food chain to a
deliberate act of biological terrorism and exploring the likely
outcomes of a successful attack.
This title examines the social and economic development policies
enacted by Israel, the Philippines, and the United Kingdom to
inhibit a resurgence of terrorism within their jurisdictions, with
the aim of informing U.S. decision makers as they develop policy to
counter terrorism.
It is generally agreed within Hebrew Bible scholarship that
Zechariah 9-14 is filled with allusions to other books within the
Hebrew canon. Rex Mason's doctoral dissertation in the early 1970s
contributed significantly to the foundation of this consensus.
However, although Mason's thesis remains a seminal work for those
studying Deutero-Zechariah, it has never been published. This
volume contains a publication of that work together with
reflections from leading biblical scholars who have published on
Zechariah 9-14. The volume is rounded off with a response by Mason
to these scholars and a reflection on his own contribution. In some
ways this project is a replication of the social process that gave
rise to Zechariah 9-14, as the multiple authors bring out of this
treasure that which is new and that which is old.
U.S. policy toward Colombia has been driven to a large extent by
counter-narcotics considerations, but the evolving situation in
that South American country confronts the United States with as
much of a national security as a drug policy problem.
Outside supporters, including state and non-state sponsors, of
insurgent movements offer various forms of assistance to insurgents
based on a wide range of motivations. The most useful forms of
outside support for an insurgent movement include safe havens,
financial support, political backing, and direct military
assistance. Because states are able to provide all of these types
of assistance, their support has had a profound impact on the
effectiveness of many rebel movements since the end of the Cold
War. However, state support is no longer the only, or indeed
necessarily the most important, game in town. Diasporas have played
a particularly important role in sustaining several strong
insurgencies. More rarely, refugees, guerrilla groups, or other
types of non-state supporters play a significant role in creating
or sustaining an insurgency, offering fighters, training, or other
forms of assistance. This report assesses post-Cold War trends in
external support for insurgent movements. It describes the
frequency that states, diasporas, refugees, and other non-state
actors back guerrilla movements. It also assesses the motivations
of these actors and which types of support matter most. This book
concludes by assessing the implications for analysts of insurgent
movements.
|
|