Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Montclair State University (8)
- University of Nebraska - Lincoln (7)
- San Jose State University (6)
- Claremont Colleges (5)
- College of Saint Benedict and Saint John's University (4)
-
- Embry-Riddle Aeronautical University (4)
- Florida International University (4)
- SIT Graduate Institute/SIT Study Abroad (3)
- Chapman University (2)
- Kennesaw State University (2)
- Children's Mercy Kansas City (1)
- College of the Holy Cross (1)
- Georgia State University (1)
- Liberty University (1)
- Old Dominion University (1)
- Purdue University (1)
- US Army War College (1)
- University of Arkansas, Fayetteville (1)
- University of Washington Tacoma (1)
- Keyword
-
- Terrorism (21)
- 9/11 terrorist attack (4)
- Al-Qaida leadership (4)
- Military (4)
- Personality in politics (4)
-
- Personality profiling (4)
- Political psychology (4)
- Security (4)
- Terrorists (4)
- 9/11 (3)
- MIDC (3)
- Millon Inventory of Diagnostic Criteria (3)
- Personality assessment (3)
- Psychological assessment (3)
- Theodore Millon (3)
- United States (3)
- Al Qaeda (2)
- Ayman al-Zawahiri (2)
- Counterterrorism (2)
- Decision making (2)
- Defense (2)
- Global war on terror (2)
- International Relations (2)
- Mohamed Atta (2)
- Osama bin Laden (2)
- Policy (2)
- Presidential rhetoric (2)
- Safety and security (2)
- Terror threat (2)
- Usama bin Mohammed bin Awad bin Laden (2)
- Publication Year
- Publication
-
- Department of Justice Studies Faculty Scholarship and Creative Works (8)
- University of Nebraska's National Strategic Research Institute: Publications (7)
- Mineta Transportation Institute Publications (6)
- CGU Faculty Publications and Research (5)
- FIU Electronic Theses and Dissertations (4)
-
- Psychology Faculty Publications (4)
- Independent Study Project (ISP) Collection (3)
- Publications (3)
- Faculty and Research Publications (2)
- Articles & Editorials (1)
- EBCS Presentations (1)
- Libraries Faculty and Staff Presentations (1)
- Manuscripts, Articles, Book Chapters and Other Papers (1)
- PPPA Paper Prize (1)
- Political Science Student Papers and Posters (1)
- Political Science Student Scholarship (1)
- Research Projects (1)
- Senior Honors Theses (1)
- Student Scholar Symposium Abstracts and Posters (1)
- Student Works (1)
- VMASC Publications (1)
- File Type
Articles 1 - 30 of 54
Full-Text Articles in Defense and Security Studies
Evolving Patterns Of Violence In Developing Countries, Brian Michael Jenkins, Bruce R. Butterworth, Sachi Yagu
Evolving Patterns Of Violence In Developing Countries, Brian Michael Jenkins, Bruce R. Butterworth, Sachi Yagu
Mineta Transportation Institute Publications
In August 2022, MTI issued a report entitled Changing Patterns of Violence Pose New Challenges to Public Surface Transportation in the United States. That report analyzed the frequency and lethality of attacks on public surface transport in economically advanced countries. But what has been going on in non-economically advanced countries – the vast majority of countries in the world? Using the MTI database of Terrorist and Serious Criminal Attacks Against Public Surface Transportation, the authors analyzed attacks against passenger trains and train stations, buses and bus stations and stops, and all rail infrastructure and operating and security personnel in both …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
PPPA Paper Prize
The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …
Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio
Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio
FIU Electronic Theses and Dissertations
Governments employ several approaches to combat Transnational Organized Crime groups. These groups include drug trafficking organizations and armed-insurgent groups. Tactics such as High-Value Target strikes, Peace Accords, and vigilantism have shown to successfully debilitate criminal networks while at the same time sparking unintended negative outcomes. For example, some of these tactics are associated with an increase in cartel-related violence, terrorist attacks, and the lethality of terrorist attacks. What remains unclear is the degree to which these approaches affect these associations and which of these tactics has the most favorable outcomes in combating Transnational Organized Crime groups. The analyses conducted in …
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Research Projects
In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.
To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Covid 19 & Qanon: Enter The World Of Conspiracies, Gianluca Allesina
Covid 19 & Qanon: Enter The World Of Conspiracies, Gianluca Allesina
Student Scholar Symposium Abstracts and Posters
From Covid-19 to Qanon to a global warming hoax, we live in a world drowning in misinformation spread on the internet. Q-anonymous, a purposed government “leaker” is an alleged high-level government informant, according to Qanon followers, who posted cryptic messages about a satanic government on the now-defunct forum website, 8chan. This project will examine the possible relationship between a belief in various conspiracy theories associated with Qanon and how the Coronavirus affected rates of belief, utilizing the Chapman Survey of American Fears, a national study using a representative sample of U.S. adults. I expect to find that partisanship will play …
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
FIU Electronic Theses and Dissertations
Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.
This …
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
Shedding Of Marburg Virus In Naturally Infected Egyptian Rousette Bats, South Africa, 2017, Janusz T. Pawęska, Nadia Storm, Wanda Markotter, Nicholas Di Paola, Michael R. Wiley, Gustavo Palacios, Petrus Jansen Van Vuren
Shedding Of Marburg Virus In Naturally Infected Egyptian Rousette Bats, South Africa, 2017, Janusz T. Pawęska, Nadia Storm, Wanda Markotter, Nicholas Di Paola, Michael R. Wiley, Gustavo Palacios, Petrus Jansen Van Vuren
University of Nebraska's National Strategic Research Institute: Publications
We detected Marburg virus RNA in rectal swab samples from Egyptian rousette bats in South Africa in 2017. This finding signifies that fecal contamination of natural bat habitats is a potential source of infection for humans. Identified genetic sequences are closely related to Ravn virus, implying wider distribution of Marburg virus in Africa.
The genus Marburgvirus, family Filoviridae, comprises 1 species, Marburg marburgvirus, which comprises 2 marburgviruses, Marburg virus (MARV) and Ravn virus (RAVV) (1). Marburgviruses cause sporadic but often fatal MARV disease in humans and nonhuman primates (2). The Egyptian rousette bat (Rousettus aegyptiacus) …
Urban Warfare: Emerging Geopolitical Conundrum, Bert Chapman
Urban Warfare: Emerging Geopolitical Conundrum, Bert Chapman
Libraries Faculty and Staff Presentations
Urban warfare is as old as human history. It is becoming increasingly important in international political and military planning due to increasing global urbanization and the presence of megacities (urban areas with populations exceeding 10 million) in many global regions and being in areas of recent and potential military conflict. 2018 World Bank data notes that approximately 56% of the world's population lives in urban areas which is up from 34% in 1960. Many of these megacities, including New York City, Los Angeles, Sao Paulo, Mumbai, Shanghai, and Manila are adjacent to oceanic waters and vulnerable to trade and supply …
Casablanca Bombings, Preventing Violent Extremism, Imam Training Program, Commander Of The Faithful, Religious Pluralism, Rachel Macnow
Casablanca Bombings, Preventing Violent Extremism, Imam Training Program, Commander Of The Faithful, Religious Pluralism, Rachel Macnow
Independent Study Project (ISP) Collection
Following the 2003 Casablanca Bombings in Morocco there was an increased concern in protecting the physical and spiritual security of the nation. The state immediately responded by issuing a large crackdown on Salafists where many were arrested, imprisoned, and deprived of their rights. Due to the rise of extremist rhetoric in the mosques, particularly in rural and impoverished areas, the state also responded by closing any mosques they deemed to not be promoting moderate Islam and removed their imams. Out of this, a Preventing Violent Extremism Program was created that was composed of security and religious-based policies. The security policies …
George W. Bush, Policy Selling And Agenda-Setting After 9/11, Gabriel Rubin
George W. Bush, Policy Selling And Agenda-Setting After 9/11, Gabriel Rubin
Department of Justice Studies Faculty Scholarship and Creative Works
George W. Bush successfully set the agenda for an expansive, global war against terrorists after the 9/11 attacks. This agenda was not inevitable, it arose from an interpretation of events and of America’s adversaries that leaned on global conflict, cultural differences, and the presumption of evil intent. Bush’s speech-making successfully led to the conflicts in Iraq and Afghanistan, civil liberty-reducing legislation, and a large institutional edifice dedicated to counterterrorism. The themes Bush’s speeches evoked and the agendas and policies that these speeches set are covered in this chapter.
How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin
How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin
Department of Justice Studies Faculty Scholarship and Creative Works
Presidential rhetoric has minimally changed from the narrative set by George W. Bush after the 9/11 attacks. Bush’s policies and agenda have also largely remained. This chapter provides proposals for change given the empirical and theoretical findings made in the book. The counterterrorist policy agenda needs to be narrowed and made more precise. The public needs to educate itself about the terror threat to understand that it is not a significant risk when weighed against others. Presidents need to be more careful with what words they use when describing America’s terrorist adversaries and with who they call terrorists. Recalibrating the …
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
EBCS Presentations
A worm is a malicious agent that propagates across networks of devices creating negative impacts on the devices it is able to reach and infect. Currently, there is very limited information in cybersecurity research regarding worm behavior across real networks of devices, particularly in large scale networks (e.g. campus networks, office networks, IoT etc.). This paper positions an experimental testbed that can be used for studying worm behaviors in large scale networks. In particular, this research aims to setup an infrastructure to empirically study worm generation, propagation, attacks, policies and antidote (intervention) mechanisms through a unified experimental testbed. As a …
National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul
National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul
Faculty and Research Publications
We explore why human rights violations take place in the midst of a rebellion. Authoritarian governments may not care for human rights but surprisingly several democratic governments have also condoned such violations. We show that the primary cause of such violations is faulty intelligence. There are two type of defective intelligence that can occur viz., missed alarm and false alarm. We consider each of these cases and determine the optimal human rights standard of the government. We then examine the effect of a decrease in the human rights standard on the probability of quelling the rebellion. In our theoretical model, …
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Mineta Transportation Institute Publications
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
Senior Honors Theses
For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. …
Lassa Virus Circulating In Liberia: A Retrospective Genomic Characterisation, Michael R. Wiley, Lawrence S. Fakoli, Andrew G. Letizia, Stephen R. Welch, Jason T. Ladner, Karla Prieto, Daniel Reyes, Nicole Espy, Joseph A. Chitty, Catherine B. Pratt, Nicholas Di Paola, Fahn Taweh, Desmond Williams, Jon Saindon, William G. Davis, Ketan Patel, Mitchell Holland, Daniel Negrón, Ute Ströher, Stuart T. Nichol, Shanmuga Sozhamannan, Pierre E. Rollin, John Dogba, Tolbert Nyenswah, Fatorma Bolay, César G. Albariño, Mosoka Fallah, Gustavo Palacios
Lassa Virus Circulating In Liberia: A Retrospective Genomic Characterisation, Michael R. Wiley, Lawrence S. Fakoli, Andrew G. Letizia, Stephen R. Welch, Jason T. Ladner, Karla Prieto, Daniel Reyes, Nicole Espy, Joseph A. Chitty, Catherine B. Pratt, Nicholas Di Paola, Fahn Taweh, Desmond Williams, Jon Saindon, William G. Davis, Ketan Patel, Mitchell Holland, Daniel Negrón, Ute Ströher, Stuart T. Nichol, Shanmuga Sozhamannan, Pierre E. Rollin, John Dogba, Tolbert Nyenswah, Fatorma Bolay, César G. Albariño, Mosoka Fallah, Gustavo Palacios
University of Nebraska's National Strategic Research Institute: Publications
Background An alarming rise in reported Lassa fever cases continues in west Africa. Liberia has the largest reported per capita incidence of Lassa fever cases in the region, but genomic information on the circulating strains is scarce. The aim of this study was to substantially increase the available pool of data to help foster the generation of targeted diagnostics and therapeutics.
Methods Clinical serum samples collected from 17 positive Lassa fever cases originating from Liberia (16 cases) and Guinea (one case) within the past decade were processed at the Liberian Institute for Biomedical Research using a targeted-enrichment sequencing approach, producing …
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
FIU Electronic Theses and Dissertations
This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …
“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth
“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute Publications
Vehicle ramming attacks are not new. But since 2010 Jihadists have urged their use. Is this the wave of the future, or a terrorist fad? To answer this and other questions the authors expanded and updated the database used in their May 2018 MTI Security Perspective entitled An Analysis of Vehicle Ramming as a Terrorist Threat to include 184 attacks since January 1, 1970. They also reviewed literature and examined some cases in detail. This MTI Security perspective indicates that while not new, vehicle rammings are more frequent and lethal since 2014, although the number of attacks seems to be …
Water And War: The Potential For Perpetuation Of Conflict Due To Climate Change, Kaufman Butler
Water And War: The Potential For Perpetuation Of Conflict Due To Climate Change, Kaufman Butler
Independent Study Project (ISP) Collection
Climate change has had a dramatic impact on the world’s weather for years, scientists can only make predictions about how global climate will continue to change going forward; but in all scenarios the circumstances are quite dire. The Middle East and North Africa (MENA) will see some of the most severe effects of climate change, which will permanently alter the lives of millions of people in the region. In the MENA region, climate change is projected to result in extreme drought and temperatures which will lead to increased water scarcity, in what is already the most water poor region in …
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Publications
This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …
Approaching Contemporary Terrorism, Jonathan Marcus
Approaching Contemporary Terrorism, Jonathan Marcus
Independent Study Project (ISP) Collection
This paper aims to analyze how governments of the modern era can better engage with contemporary terrorist organizations. It argues that nations and governments must alter their strategy on terrorism in light of its increasing prevalence and lethality in the modern era. Proclamations of non-negotiation, made with false perceptions that terrorists are simply irrational radical actors, are no longer viable if governments truly seek to reduce terrorist violence. In fact, it’s the ambiguity of terrorism and the major differentiation in the practices of various organizations which necessitate a more flexible strategy. Simply, the one-size-fits all solution of unequivocal no-negotiation is …
An Exploration Of Transportation Terrorist Stabbing Attacks, Brian Michael Jenkins, Bruce R. Butterworth, Jean-François Clair, Joseph R. Trella Iii
An Exploration Of Transportation Terrorist Stabbing Attacks, Brian Michael Jenkins, Bruce R. Butterworth, Jean-François Clair, Joseph R. Trella Iii
Mineta Transportation Institute Publications
In his August 22, 2018 message to supporters of the Islamic State of Iraq and [greater] Syria (ISIS), Abu Bakr al-Baghdadi implored ISIS fighters in Syria and Iraq as well as those on various jihadist fronts in Africa, the Middle East, and Asia not to be dismayed by military setbacks suffered by the Islamic State, but to continue fighting, confident that Allah would ultimately reward those who remained steadfast with victory. In the same message, he exhorted homegrown jihadists abroad— “the fierce lions in the lands of the Cross—Canada, Europe, and elsewhere” to carry out simple attacks within their limited …
H-Diplo Article Review 831- Field Jr. On D’Haeseleer. “American Civic Action: The National Campaign Plan And The Failure To Win ‘Hearts And Minds’ In El Salvador.”, Thomas Field
Publications
The author - Dr. Thomas Field - reviews Brian D’Haeseleer's article “American Civic Action: The National Campaign Plan and the Failure to Win ‘Hearts and Minds’ in El Salvador.” This article appeared in Diplomacy and Statecraft, issue 26:3 (2015), on pages 494-513. DOI: https://doi.org/10.1080/09592296.2015.1067527.
Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth
Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute Publications
Do “See Something, Say Something” programs work? The evidence strongly suggests that in the specific case of public surface transportation, the answer is “yes.” Transport staff and passengers play an important role in the prevention of terrorist attacks. By discovering and reporting suspicious objects, they have prevented more than 10 percent of all terrorist attacks on public surface transportation. Detection rates are even better in the economically advanced countries where more than 14 percent of the attempts are detected—and have been improving. This MTI Security Perspective analyzes detections since 1970 and suggests that “See Something, Say Something” campaigns are worthwhile.
Qualitative Profiling Of The Humoral Immune Response Elicited By Rvsv-Δg-Ebov-Gp Using A Systems Serology Assay, Domain Programmable Arrays, Mariano Sanchez-Lockhart, Daniel S. Reyes, Jeanette C. Gonzalez, Karla Y. Garcia, Erika C. Villa, Bradley P. Pfeffer, John C. Trefry, Jeffrey R. Kugelman, Margaret L. Pitt, Gustavo Palacios
Qualitative Profiling Of The Humoral Immune Response Elicited By Rvsv-Δg-Ebov-Gp Using A Systems Serology Assay, Domain Programmable Arrays, Mariano Sanchez-Lockhart, Daniel S. Reyes, Jeanette C. Gonzalez, Karla Y. Garcia, Erika C. Villa, Bradley P. Pfeffer, John C. Trefry, Jeffrey R. Kugelman, Margaret L. Pitt, Gustavo Palacios
University of Nebraska's National Strategic Research Institute: Publications
Development of an effective vaccine became a worldwide priority after the devastating 2013–2016 Ebola disease outbreak. To qualitatively profile the humoral response against advanced filovirus vaccine candidates, we developed Domain Programmable Arrays (DPA), a systems serology platform to identify epitopes targeted after vaccination or filovirus infection. We optimized the assay using a panel of well-characterized monoclonal antibodies. After optimization, we utilized the system to longitudinally characterize the immunoglobulin (Ig) isotype-specific responses in non-human primates vaccinated with rVSV-ΔG-EBOV-glycoprotein (GP). Strikingly, we observed that, although the IgM response was directed against epitopes over the whole GP, the IgG and IgA responses were …