Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Public Affairs, Public Policy and Public Administration (29)
- Political Science (20)
- International Relations (17)
- Public Policy (16)
- Defense and Security Studies (8)
-
- International and Area Studies (7)
- Sociology (7)
- American Politics (6)
- Criminology and Criminal Justice (5)
- Law (5)
- Legal Studies (5)
- Psychology (5)
- Terrorism Studies (5)
- Arts and Humanities (4)
- Criminology (4)
- Public Administration (4)
- African Studies (3)
- Military, War, and Peace (3)
- Social Psychology (3)
- African Languages and Societies (2)
- Anthropology (2)
- Communication (2)
- Comparative Politics (2)
- History (2)
- Near and Middle Eastern Studies (2)
- Other International and Area Studies (2)
- Other Political Science (2)
- Peace and Conflict Studies (2)
- Personality and Social Contexts (2)
- Institution
-
- Walden University (19)
- City University of New York (CUNY) (5)
- Claremont Colleges (4)
- Missouri State University (2)
- Nova Southeastern University (2)
-
- University of Arkansas, Fayetteville (2)
- Virginia Commonwealth University (2)
- Air Force Institute of Technology (1)
- Bard College (1)
- Dartmouth College (1)
- Dominican University of California (1)
- Fordham University (1)
- Georgia Southern University (1)
- Manipal Academy of Higher Education (1)
- Oberlin (1)
- Old Dominion University (1)
- St. John's University (1)
- Syracuse University (1)
- University at Albany, State University of New York (1)
- University of Central Florida (1)
- Utah State University (1)
- Wright State University (1)
- Publication Year
- Publication
-
- Walden Dissertations and Doctoral Studies (19)
- CMC Senior Theses (4)
- Dissertations, Theses, and Capstone Projects (4)
- Theses and Dissertations (4)
- Department of Conflict Resolution Studies Theses and Dissertations (2)
-
- MSU Graduate Theses (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Browse all Theses and Dissertations (1)
- Dartmouth College Undergraduate Theses (1)
- Dissertations and Theses (1)
- Electronic Theses and Dissertations (1)
- Graduate Program in International Studies Theses & Dissertations (1)
- Graduate Theses and Dissertations (1)
- Honors Capstone Projects - All (1)
- Honors Papers (1)
- Honors Undergraduate Theses (1)
- International and Global Studies Undergraduate Honors Theses (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- Political Science & International Studies | Senior Theses (1)
- Senior Projects Spring 2017 (1)
- Senior Theses (1)
- University Departments (1)
Articles 1 - 30 of 51
Full-Text Articles in Social and Behavioral Sciences
Broadcasting Bombs: Classifying Antecedent Behaviors And Strategizing Preventative Tactics In Lone-Actor Terrorists And Mass-Murderers, Julia Varvaro
Broadcasting Bombs: Classifying Antecedent Behaviors And Strategizing Preventative Tactics In Lone-Actor Terrorists And Mass-Murderers, Julia Varvaro
Theses and Dissertations
The modern notion of a socially isolated lone-wolf terrorist and public mass- murderer is challenged by analyzing those individuals’ pre-attack behaviors. Many of these behaviors can be explained with theories such as Social Identity, Social Network, and Social Movement Theory, which examine the changes in human behavior to understand motivations. Properly classifying certain behaviors in a radicalized individual could help identify potential risk factors indicating an impending attack, prompting better responses, and solutions to strategize tactics and policies in preventing terrorism. Using existing literature and theory as the basis, this dissertation will examine common broadcasting behaviors of individuals who have …
Watering The Grassroots: The Importance Of A Comprehensive Approach To Conflict In The Sahel, Chanelle A. Dortch
Watering The Grassroots: The Importance Of A Comprehensive Approach To Conflict In The Sahel, Chanelle A. Dortch
Senior Theses
The withdrawal of French troops from Mali in August 2021 has revealed massive structural problems with crisis intervention and conflict mitigation in Africa. The purpose of this research is to reveal how foreign intervention in the Sahel has failed to stabilize the region in the face of mounting political, socioeconomic, and environmental crises. This paper examines Mali and France, two countries that are centered in crisis in the Sahel, and how the politics of intervention have resulted in the current situation. While the crisis in the Sahel does not yet have a clear result, this project seeks to contextualize current …
David Versus Goliath: The Power Of Weakness In Asymmetric Warfare—Lessons From History, Nicholas K. Petaludis
David Versus Goliath: The Power Of Weakness In Asymmetric Warfare—Lessons From History, Nicholas K. Petaludis
Dissertations, Theses, and Capstone Projects
Under what conditions do violent nonstate actors (VNA) succeed against states? Why does David sometimes beat Goliath? Since at least the time of Thucydides and the Peloponnesian Wars, the realist narrative in international relations measures power primarily in relative, coercive, and deterrent terms. Strong states should accordingly face fewer constraints and enjoy more options while pursuing their national interests. Unconventional warfare, and its subsets of terrorism and insurgency, should—given these circumstances, end in VNA failure. Sometimes, however, VNAs find success. By comparing the literature on historical and current case studies, I propose that a set of preconditions and two mechanisms …
Understanding Law Enforcement Counterterrorism Information Sharing In Homegrown Violent Extremism Cases, Danielle Corry
Understanding Law Enforcement Counterterrorism Information Sharing In Homegrown Violent Extremism Cases, Danielle Corry
Walden Dissertations and Doctoral Studies
Local law enforcement agencies are charged with the responsibility to prevent terrorist events in the United States, including the emerging threat of homegrown violent extremism. Without the use of the terrorism prevention tool of information sharing, with other applicable state and federal law enforcement agencies, there continues to be a breakdown in the ability to prevent terrorist events, especially those associated with homegrown violent extremists, in the United States. This qualitative case study explores the information sharing process in law enforcement agencies by examining the recent Boston Marathon Bombing in Boston, Massachusetts that occurred in 2013. Five themes emerged from …
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk
Graduate Theses and Dissertations
Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …
Destabilizing Terrorist Networks, John Keane
Destabilizing Terrorist Networks, John Keane
Dartmouth College Undergraduate Theses
Terrorism is a threat to global security and instills fear in the lives of people across the world. Over the past decades, billions in \$USD have been invested in counter-terrorism efforts. One approach to counter-terrorism is to destabilize terrorist organizations such that they are less effective at carrying out attacks. Previous work has investigated how to best proceed in this direction, such as which terrorists to target. Terrorist organizations have also been modeled as networks, where nodes can represent factions and/or terrorists. Research has been done to understand the network dynamics and link the structure of such networks to their …
India's Multilateral Approach At The Un: Counter Terrorism And Climate Change As Cases In Point, Meenu Sharma
India's Multilateral Approach At The Un: Counter Terrorism And Climate Change As Cases In Point, Meenu Sharma
University Departments
No abstract provided.
Roundabout - How The United States Government Creates Cyclical Terrorism As It Responds To Domestic And Foreign Terrorism, Sarah Selch Andrews
Roundabout - How The United States Government Creates Cyclical Terrorism As It Responds To Domestic And Foreign Terrorism, Sarah Selch Andrews
Department of Conflict Resolution Studies Theses and Dissertations
Terrorism is frequently studied as a linear transaction between actors, usually a government and one or more extremists of some sort, be they individuals or groups. The focus in this thesis is on the United States government and international jihadist extremists, specifically Al-Qaeda, a conflict which often is covered in one of two ways: extremist action is the provocation and government policy (up to and including military engagement) is the reaction, or alternatively, foreign policy is the initiating action and what we call "terrorism" is merely a response.
This paper argues that neither approach is sufficient and proposes a model …
Stronger As One? Examining Us-Saudi Relations Since 9/11, Caroline Jenkins
Stronger As One? Examining Us-Saudi Relations Since 9/11, Caroline Jenkins
CMC Senior Theses
In the first several years following the attacks on September 11, 2001, many in both the American political elite and general public questioned the merits of the US’s strong alliance with the Kingdom of Saudi Arabia, as fifteen of the nineteen hijackers, as well as Osama bin Laden, were Saudi citizens. The Kingdom was known for its lax regulations surrounding terrorist financing, which played a role in al Qaeda’s ability to carry out the 9/11 attacks. Due to this, many called for the US to end its historic partnership with the Saudis.
However, under further examination, it becomes clear that …
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo
Political Science & International Studies | Senior Theses
Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …
Countering Violent Extremism: U.S. Foreign Policy And The Trans-Sahara Counterterrorism Partnership, Jason S. Alexander
Countering Violent Extremism: U.S. Foreign Policy And The Trans-Sahara Counterterrorism Partnership, Jason S. Alexander
Walden Dissertations and Doctoral Studies
For over two decades, preventing and countering violent extremism (P/CVE) has proven a daunting challenge for foreign assistance policy makers and implementers. The challenges are rooted in its rapid emergence, continuous and uneven development, and lingering skepticism about its future and effectiveness. The purpose of this study is to provide policy makers and practitioners with a deeper understanding of how certain factors have driven the development of P/CVE policy. The research questions focused on the nature of policy alignment at all policy levels and the identification and nature of the factors that have driven rapid P/CVE policy change. The theoretical …
Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku
Exploring Contemporary Counterterrorism And Perspectives Of Terrorism Experts To Combat Boko Haram, Enyinaya Njoku
Walden Dissertations and Doctoral Studies
Within the last decade, the terrorist attacks by Boko Haram have been the topic of considerable scholarly focus; yet, there remains a lack of knowledge and understanding about the causes of failure in counterterrorism measures by the Nigerian government in Borno State. Using Wilner’s contemporary deterrence theory as the foundation, the purpose of this case study of the Nigeria Police Force (NPF) was to bridge the gap in knowledge to understand the causes of failure in counterterrorism measures by the Nigerian government and to explore alternate approaches to the counterterrorism efforts in Borno State to deter Boko Haram. Data were …
Counterterrorism Investigator Perceptions: Homegrown Violent Extremists With Mental Illness, Jeffery Brandon Perez
Counterterrorism Investigator Perceptions: Homegrown Violent Extremists With Mental Illness, Jeffery Brandon Perez
Walden Dissertations and Doctoral Studies
Terrorism endures throughout the world. Some individuals who engage in it may suffer from a cognitive disorder. For those who investigate terrorism, preconceptions exist both toward extremists and toward people with mental illness (MI). A review of the literature has shown how counterterrorism (CT) investigators perceive terrorists’ motivations, and how law enforcement perceives people with MI. In filling a gap between the two, this study aimed to research whether based on their lived experiences, do the understandings, perceptions, and attitudes of CT agents inform their biases and influence their decision-making and ultimately investigations of homegrown violent extremists (HVEs) with MI. …
Counterterrorism: The G5 Response Efforts To Combat Terrorism In The Sahel Region, Ndeye Fatou Ndiaye
Counterterrorism: The G5 Response Efforts To Combat Terrorism In The Sahel Region, Ndeye Fatou Ndiaye
Dissertations and Theses
Abstract
Africa’s Sahel suffers from multidimensional challenges that require robust solutions to address the issues. The regional crisis is aggravated by multiple factors that include climate risks, poverty, unemployment, water shortages, weak governance, lack of rule of law, food security to cite a few. Thus, a combination of factors greatly contribute to the Sahel crisis, resulting in severe security threats. This study attempts to analyze the role of the G5 Sahel states and the international community in counter-terrorism efforts. However, the region has emerged as the new battleground for terrorism along with a growing threat of violent extremism and other …
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
Terrorism In The 2020s: Examining The Global Threat Landscape, Landon W. Swearngin
MSU Graduate Theses
This thesis uses quantitative and qualitative research methods to (1) explore the global trends and trajectories of terrorism, (2) identify emerging strategic challenges, and (3) outline an opportunity analysis for U.S. counterterrorism strategy. Collectively, this project provides a strategic forecast for terrorism in the 2020s, demonstrating that terrorism is becoming increasingly dangerous, dynamic, and difficult to defeat.
The Role Of Women In Terrorism, Zeynep Bayar
The Role Of Women In Terrorism, Zeynep Bayar
Dissertations, Theses, and Capstone Projects
The main purpose of this paper is to understand what motivate women to join terrorist groups and why these organizations prefer to work with female terrorists. Although each woman has different reasons to involve in terrorist groups, this research demonstrates 'religious, political and personal' reasons as the major motivating factors. This study also focuses on the question of why women are the targets of terror recruiters. In order to answer these, the research analysis examines 'psychological, gender, and media' factors as major recruitment reasons of terrorist organizations. This study also analyzes the similarities and differences between female terrorists' profiles of …
Social Media Effects On Millennials' Counterterrorism Type Of Behaviors, Laura C. Domasneanu-Miulescu
Social Media Effects On Millennials' Counterterrorism Type Of Behaviors, Laura C. Domasneanu-Miulescu
Walden Dissertations and Doctoral Studies
Social media is a critical and omnipresent component in Millennials' lives. Using social media can lead to significant social change for societies both online and offline. Social media can be used as a tool to combat domestic and foreign terrorism and to protect our society. Prosocial perceptions and behaviors exhibited on a social media platform can transcend online social culture and produce replicas of those behaviors in the real world. Research in social activism portrayed by Millennials via social media is limited, and research regarding social media use and counterterrorism behaviors of Millennials has not yet been attempted. The current …
Counter-Ideology As A Wider Strategy For Defeating The Boko Haram Terrorist Group, Kwesi Ayima
Counter-Ideology As A Wider Strategy For Defeating The Boko Haram Terrorist Group, Kwesi Ayima
Walden Dissertations and Doctoral Studies
There is a need to address current military strategies to defeat the resilience of the Boko Haram Terrorist (BHT) group. The purpose of this qualitative study was to provide a counter-ideology framework as an alternative strategy to defeat the group. The relational/vengeance and relative deprivation theories provided the theoretical foundation for the study, and the research question addressed the extent to which counter-ideology strategies can be instituted to defeat the BHT group. Data were collected through semi structured interviews from 20 participants who were Muslim clerics, community leaders, and military personnel, and data were analyzed using Nvivo software. The themes …
U.S. Policymakers' Perspectives Regarding The Causes Of Terrorism And The Impact On U.S. Counterterrorism Policy, Jeffrey David Mcmanus
U.S. Policymakers' Perspectives Regarding The Causes Of Terrorism And The Impact On U.S. Counterterrorism Policy, Jeffrey David Mcmanus
Walden Dissertations and Doctoral Studies
U.S. counterterrorism policy appears to be influenced by different perspectives, as evidenced by conflicting statements by U.S. presidents regarding the causes of terrorism. Academic theories are not always applied by U.S. government employees who develop, influence, and implement counterterrorism policy. The purpose of this qualitative phenomenological study was to understand U.S. government policymakers' perspectives on the causes of terrorism, the influences on these views, and the impact on U.S. counterterrorism policy. Six theories regarding the causes of terrorism provided the theoretical framework. Additional theories related to individual and organizational impact on decision-making provided a broader conceptual framework. Data were collected …
Counter-Ideology As A Wider Strategy For Defeating The Boko Haram Terrorist Group, Kwesi Ayima
Counter-Ideology As A Wider Strategy For Defeating The Boko Haram Terrorist Group, Kwesi Ayima
Walden Dissertations and Doctoral Studies
There is a need to address current military strategies to defeat the resilience of the Boko Haram Terrorist (BHT) group. The purpose of this qualitative study was to provide a counter-ideology framework as an alternative strategy to defeat the group. The relational/vengeance and relative deprivation theories provided the theoretical foundation for the study, and the research question addressed the extent to which counter-ideology strategies can be instituted to defeat the BHT group. Data were collected through semi structured interviews from 20 participants who were Muslim clerics, community leaders, and military personnel, and data were analyzed using Nvivo software. The themes …
Evaluating U.S. Counterterrorism Policy On Domestic Terrorism Using The Global Terrorism Database, Colleen Michelle Kennedy
Evaluating U.S. Counterterrorism Policy On Domestic Terrorism Using The Global Terrorism Database, Colleen Michelle Kennedy
Walden Dissertations and Doctoral Studies
The United States has a long history of domestic terrorism, yet U.S. counterterrorism policy has focused almost completely on the threat from international terrorism. The gap in the literature was the absence of an empirical evaluation of U.S. counterterrorism policy on domestic terrorism in general. The purpose of this quantitative study was to describe the impact of 21st century U.S. counterterrorism policy on incidence, lethality, and cost of domestic terrorism using data from the Global Terrorism Database. The multiple streams framework and the power elite theory were used. In this longitudinal trend study using secondary data analysis, domestic terrorism data …
Counterterrorism And Human Rights Committees’ Influence On Terrorism And Human Rights Atrocities, Janice Marie Gravely
Counterterrorism And Human Rights Committees’ Influence On Terrorism And Human Rights Atrocities, Janice Marie Gravely
Walden Dissertations and Doctoral Studies
The United Nations Counterterrorism and Human Rights Committees’ current collaborative practices have failed to reduce global terrorists’ activities and human rights abuses associated with counterterrorism activities. The purpose of this qualitative case study was to explore and compare collaborative processes between the committees in combatting terrorism and human rights violations associated with counterterrorism. The researched was centered around two key questions: The similarities and differences with information sharing processes and the impacts of the committees’ collaborative processes on terrorists’ activities and human rights violations. For this study, the pragmatic paradigm theoretical framework was used, focusing on the descriptive exploratory design. …
Evaluating The Effects Of Counterterrorism Strategies On Insurgency In Nigeria, Bowie Sonnie Bowei
Evaluating The Effects Of Counterterrorism Strategies On Insurgency In Nigeria, Bowie Sonnie Bowei
Walden Dissertations and Doctoral Studies
With the evolving problems of terrorism in Nigeria and the formation of numerous new terrorist groups, insurgency in Nigeria has escalated, making it one of the most terrorized countries in sub-Saharan Africa. This study looked critically at the effects of the strategies applied in the attempt to fight terrorism and how these strategies have affected insurgency in Nigeria. The background of the study gives an insight on the evolution of terrorist groups in Nigeria, their mode of operation, effects on citizens and the Nigerian economy, as well as the operations of counterterrorist agencies. The qualitative research method was used for …
The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton
The Convergence Of The War On Terror And The War On Drugs: A Counter-Narcoterrorism Approach As A Policy Response, Lindsay Burton
CMC Senior Theses
This thesis investigates how and why U.S. policies and agencies are ill-equipped to respond to narco-terrorism and offers some policy recommendations for remedying that. Narco-terrorism is the merging of terrorism and drug trafficking. Terrorist organizations and narcotics traffickers each have much to offer the other; there is potential for symbiosis in the form of cooperation and even hybridization. Examination of the dynamics between terrorist organizations and drug traffickers, combined with an evaluation of the US responses to narcoterrorism in Colombia and Afghanistan, makes it clear that current US policy responses fail to recognize narcoterrorism as a unique challenge, and instead …
The Use Of Force: Hard Offensive Counterterrorism, Daniel Thomas
The Use Of Force: Hard Offensive Counterterrorism, Daniel Thomas
Browse all Theses and Dissertations
In the following research, I investigate whether hard offensive counterterrorism results in the failure or success of a counterterrorism strategy. In the second chapter, the academic literature of counterterrorism strategies is examined. Next, a hypothesis is put forth that if a hard offensive counterterrorism strategy is utilized, indicators such as high troop levels, more civilian casualties, more negative public opinion, and an increased rate of terrorism, will point to a failed counterterrorism strategy. Then, I put forth a methodology to test the hypothesis while introducing troop level databases, various public opinion polling sources, and terrorist attack databases to investigate the …
Beyond Carrots And Sticks: An Analysis Of U.S. Approaches To Counterterrorism From 2000-2016, Margaret M. Seymour
Beyond Carrots And Sticks: An Analysis Of U.S. Approaches To Counterterrorism From 2000-2016, Margaret M. Seymour
Graduate Program in International Studies Theses & Dissertations
Soft power, a concept developed and presented by Joseph Nye in 1990, has quickly become a critical concept in U.S. foreign policy. Scholars and practitioners discuss the utility or futility of soft power. Theorists rank countries by their use of effective soft power against one another. Critically lacking in the discussion, however, is an analysis of how one country’s use of soft power changes, or remains the same, over time.
Counterterrorism policy has been a focus of U.S. foreign policy since 9/11, and while there is a robust discussion on effectiveness of various policies and strategies, scholars have routinely failed …
The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich
The Interplay Of Intelligence, Education, And The Media In Western Counterterrorism Strategies, Lincoln Gimnich
International and Global Studies Undergraduate Honors Theses
Terrorist activity has increased and evolved in Western societies in the twenty-first century as terrorist organizations have sought new methods to further their ideologies and goals. Counterterrorism thus requires a similar evolution that undoubtedly reverses the historic trend wherein counterterrorism has been merely reactive. Through interviews with experts, qualitative analysis of governmental publications and documents, and review of existing literature, this project explores the institutions of intelligence, education, and the media and their work within the larger counterterrorism and anti-radicalization framework of Western states. The project focuses specifically on domestic intelligence operations, intelligence sharing agreements, the United Kingdom’s Prevent strategy, …
The Terror Experts: Discourse, Discipline, And The Production Of Terrorist Subjects At A University Research Center, Liam Christopher Mclean
The Terror Experts: Discourse, Discipline, And The Production Of Terrorist Subjects At A University Research Center, Liam Christopher Mclean
Honors Papers
This thesis examines the production and circulation of discourses related to (counter)terrorism at a university-affiliated terrorism and security studies research center in eastern Massachusetts. Drawing on participant observation, documentary analysis, and interviews with faculty and students at the research center, I suggest that expert discourses of (counter)terrorism at the center traffic in an archetypal construction of the terrorist that I call the “depoliticized radical.” This construction locates the root of terrorism in individual morality and psychology, tending to abstract the terrorist from the political conditions in which they enact violence. I further propose that the depoliticized radical functions as a …
U.S. Interagency Coordination On Countering Violent Extremism Abroad, Jason Gush
U.S. Interagency Coordination On Countering Violent Extremism Abroad, Jason Gush
CMC Senior Theses
CVE is complex. It requires combatting the narratives and ideology of many extremist groups around the globe, constructing environments with appealing alternatives to extremism, and most importantly, sensitivity to the variety of circumstances in which CVE takes place to effectively battle the root causes of extremism. Constructing a complete CVE effort thus requires a great variety of skills, coordinated to efficient implementation. Despite notional commitment, U.S. CVE abroad lacks interagency coordination. JIATF-S offers a strong model of interagency coordination, from which lessons may be applied to the formation of an interagency CVE effort. Interagency coordination would bring extensive expertise and …
Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo
Unmanned Aerial Vehicles In Counterterrorism Efforts And Implications For International Humanitarian Law, Kunle Adebamiji Olulowo
Walden Dissertations and Doctoral Studies
The United States increasingly has resorted to the use of Unmanned Aerial Vehicles (UAVs) for targeted killings of terrorists as a counterterrorism strategy. More states and terrorist organizations also are acquiring UAVs and this development can lead to indiscriminate and unregulated use of UAVs. Previous researchers have indicated the surveillance ability and precise weapon delivery capacity of UAVs make them a weapon of choice for U.S. counterterrorism efforts. Although the U.S. government estimated the collateral damage involved in the use of UAVs at 3-5%, nongovernmental sources put it at 25-40%. A gap exists in the current literature regarding public perception …