Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Pre-Tipping Point Operations As A Strategy For Maritime Security In The Global War On Terror, John W. Snedeker Jr. Dec 2006

Pre-Tipping Point Operations As A Strategy For Maritime Security In The Global War On Terror, John W. Snedeker Jr.

Graduate Program in International Studies Theses & Dissertations

This thesis proposes US maritime forces adopt a new strategy of pre-tipping point operations that involve proactive measures to enhance maritime security. At its core is the premise that since the attacks of September 11, 2001, the propensity of efforts in GWOT have focused on defeating terrorist organizations and denying sanctuaries on land, leaving the maritime operating environment open to the next wave of terror attacks.1 With the preponderance of commercial goods shipped through the maritime commons, this critical nexus remains valuable and vulnerable. Fragile states and ungoverned regions have become safe havens for a host of criminal elements including …


Sarah Bania-Dobyns On New Terror, New Wars By Paul Gilbert. Washington, Dc: Georgetown University Press, 2003. 176pp., Sarah Bania-Dobyns Nov 2006

Sarah Bania-Dobyns On New Terror, New Wars By Paul Gilbert. Washington, Dc: Georgetown University Press, 2003. 176pp., Sarah Bania-Dobyns

Human Rights & Human Welfare

A review of:

New Terror, New Wars by Paul Gilbert. Washington, DC: Georgetown University Press, 2003. 176pp.


Analysis Of Layered Social Networks, Jonathan T. Hamill Oct 2006

Analysis Of Layered Social Networks, Jonathan T. Hamill

Theses and Dissertations

Prevention of near-term terrorist attacks requires an understanding of current terrorist organizations to include their composition, the actors involved, and how they operate to achieve their objectives. To aid this understanding, operations research, sociological, and behavioral theory relevant to the study of social networks are applied, thereby providing theoretical foundations for new methodologies to analyze non-cooperative organizations, defined as those trying to hide their structure or are unwilling to provide information regarding their operations. Techniques applying information regarding multiple dimensions of interpersonal relationships, inferring from them the strengths of interpersonal ties, are explored. A layered network construct is offered that …


Key Leadership Roles In The 9/11 Terrorist Attack, Aubrey Immelman Sep 2006

Key Leadership Roles In The 9/11 Terrorist Attack, Aubrey Immelman

Psychology Faculty Publications

Personality assessment of three al-Qaida leaders in the September 11, 2001 terrorist attack on the United States – Osama bin Laden, Ayman al-Zawahiri, and Mohamed Atta – provides evidence for a rudimentary model of the leadership roles required for a global-reach terrorist operation: (1) a narcissistic, charismatic leader devoid of core values beyond personal self-interest, adept at exploiting others in pursuit of his grandiose ambitions (e.g., bin Laden); (2) a strategic-thinking “true believer” without constraints of conscience regarding the level of violence he is willing to employ in his single-minded pursuit of mission (e.g., al-Zawahiri); and (3) unobtrusive, disciplined operatives …


Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton Jun 2006

Fixing Fisa For Long War: Regulating Warrantless Surveillance In The Age Of Terrorism, Adam Burton

The University of New Hampshire Law Review

[Excerpt] “The English poet W.H. Auden once claimed that “Peeping Toms are never praised, like novelists or bird watchers, for the keenness of their observations.” Perhaps Auden would have modified his maxim had he lived in the age of terrorism. A certain degree of government surveillance of even intimate communications is expected, encouraged, and indeed praised when the government’s efforts lead to the prevention of catastrophe. However, it is also expected that the government will minimize these intrusions, will conduct surveillance only on legitimate targets, and will follow the procedural safeguards that the representatives of the people have enacted in …


Comparative Analysis Of Biosurveillance Methodologies, David M. Kempisty Mar 2006

Comparative Analysis Of Biosurveillance Methodologies, David M. Kempisty

Theses and Dissertations

The purpose of this research is to compare two different biosurveillance methodologies: BioWatch and "A Hot Idea". BioWatch is fielded and operating in major US cities today. Air samples are collected on filter paper and analyzed for the presence of harmful biological agents. "A Hot Idea" is an evolving methodology using the human body's immune response to identify the onset of infection from a harmful pathogen. Detecting a temperature increase, using infrared thermographers, in a statistically significant portion of population would allow earlier identification of a biological release, accelerating initiation of response actions. A selected population including policemen, firemen, and …


An Epidemiological Approach To Terrorism, Kjirstin A. Bentson Mar 2006

An Epidemiological Approach To Terrorism, Kjirstin A. Bentson

Theses and Dissertations

There are many types of models for counterterrorism, explaining different problems that the military faces in the fight against terrorism. This thesis proposes that one of the fundamental assumptions underlying existing models of counterterrorism is that the struggle with terrorists can be understood as a war in the traditional sense of the term. We propose to rethink the struggle against terrorism as a fight against an infection. The epidemic of terrorist ideology within part of the world is a result, from this perspective, of the infectiousness of that ideology. Using the insights of the field of the epidemiology of ideas, …


Gauging The Commitment Of Clandestine Group Members, Doneda D. Downs Mar 2006

Gauging The Commitment Of Clandestine Group Members, Doneda D. Downs

Theses and Dissertations

Since the attacks of September 11th, 2001, there has been a great deal of attention given to understanding the inner workings of terrorist organizations in order for the United States to be successful in the Global War on Terrorism. Group dynamics has been one area of interest pursued to gain more insight into a terrorist's cognitive battlespace. Until a few years ago, most research on individual commitment and organizational cohesion has been based primarily on questionnaires and open observations on groups that desire to be understood. However, terrorist organizations are clandestine; they constantly employ operations security (OPSEC) to ensure protection …


Christina M. Cerna On The Torture Papers: The Road To Abu Ghraib. Edited By Karen J. Greenberg And Joshua L. Dratel. Cambridge, Ma: Cambridge University Press, 2005. 1249 Pp., Christina M. Cerna Feb 2006

Christina M. Cerna On The Torture Papers: The Road To Abu Ghraib. Edited By Karen J. Greenberg And Joshua L. Dratel. Cambridge, Ma: Cambridge University Press, 2005. 1249 Pp., Christina M. Cerna

Human Rights & Human Welfare

A review of:

The Torture Papers: The Road to Abu Ghraib. Edited by Karen J. Greenberg and Joshua L. Dratel. Cambridge, MA: Cambridge University Press, 2005. 1249 pp.


Beyond Power Politics: International Law And Human Rights Discourse In The Post-9/11 World, J. Peter Pham Jan 2006

Beyond Power Politics: International Law And Human Rights Discourse In The Post-9/11 World, J. Peter Pham

Human Rights & Human Welfare

A review of:

Imperialism, Sovereignty and the Making of International Law by Antony Anghie. Cambridge, UK: Cambridge University Press, 2005. 356 pp.