U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign,
2010
University of South Florida
U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo
Journal of Strategic Security
This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …
North Korea And Support To Terrorism: An Evolving History,
2010
U.S.
Marine Corps Command and Staff College
North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.
Journal of Strategic Security
The DPRK's (Democratic People's Republic of Korea or North Korea) support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.
Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?,
2010
University of South Florida
Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?, Brian M. Harrell, Konrad Crockford, Pierre Boisrond, Sarah Tharp-Hernandez, Suzanne Parker
Journal of Strategic Security
This article describes a fictional deadly attack by a lone-wolf terrorist during a high school football event in a small town, here in the United States. The authors begin by describing an attack and then focus on the response from the medical community, city, county, state, and federal government officials. Next, the authors make several recommendations on what actions are needed to develop an effective plan to combat terrorist activities during a small- to mid-size sports event. Among the actions needed, the authors focus on the following: response planning, emergency action plan, incident command, policies and procedures, and security staff …
The Weakest Link: The Risks Associated With Social Networking Websites,
2010
New York Police Department
The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman
Journal of Strategic Security
The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa.com, as of December 2009, Facebook had 350 million registered users, MySpace just under 475 million, and Twitter 44.5 million. Many people think very little of posting prodigious amounts of personal information on social networking sites, not realizing that this information puts them at risk. Specifically, those in the law enforcement and military communities may not realize that information posted on these sites can compromise operational security and …
The Politics Of Immigration: A Representation Of The Unconscious Mind,
2010
Embry-Riddle Aeronautical University
The Politics Of Immigration: A Representation Of The Unconscious Mind, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the concept of an illegal immigrant from different psychological perspectives.
Terrorism And The Law: Show Trials And Why The Show Must Go On,
2010
Embry-Riddle Aeronautical University
Terrorism And The Law: Show Trials And Why The Show Must Go On, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the nature and meaning of terrorism trials during the United States’ war on terror.
Ddasaccident589,
2010
AID
Ddasaccident589, Humanitarian Demining Accident And Incident Database
Global CWD Repository
The team leader [the Victim] was doing a QA check on one of the Foot Track already cleared by the deminer. Out of five mines laid only one M14 AP mine has been recovered from this FT. The team leader was trying to recheck the cleared area again with the metal detector trying to find the missing mine, during his QA check he stepped on one deep buried M14 AP mine in the area which has been already checked by the deminer and Team Leader.
Cia And The Cold War Era,
2010
Liberty University
Cia And The Cold War Era, Mary E. Byers
Senior Honors Theses
The purpose of this thesis is to explore the creation of the Central Intelligence Agency and its role in the Cold War. Great detail highlights the timeliness of the CIA’s creation and dynamic role over the years that followed its founding. For half a century, attempts to understand the Union of Soviet Socialist Republics dominated the CIA’s agenda. Thus, careful study of this era is important to understanding the progression of intelligence within the United States. The avenue of research for this thesis was a collaboration of published books, online journals, credible websites, and personal interviews. The development of the …
Aviation & Maritime Homeland Security: A Comparative Case Study,
2010
Morehead State University
Aviation & Maritime Homeland Security: A Comparative Case Study, Staphanie Aileen Webb
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Business and Public Affairs at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Public Administration by Stephanie Aileen Webb on April 14, 2010.
To Think Nuclear, To Go Nuclear,
2010
Embry-Riddle Aeronautical University
To Think Nuclear, To Go Nuclear, Ibpp Editor
International Bulletin of Political Psychology
The article discusses three of the many psychological problematics about nuclear weapons, weapons employment, and war underlying the language of policies, programs, plans, treaties, and one’s support or rejection of them.
Ddasaccident595,
2010
AID
Ddasaccident595, Humanitarian Demining Accident And Incident Database
Global CWD Repository
On 9th April 2010 at 10:27 while [the Victim] was working in his clearance lane, busy in excavation drill, the accident happened and caused severe injuries to his right hand (traumatic amputation) and some minor injuries to his neck and nose. His visor was broken down and separated from headband. As per the investigation report, the deminer has breached the SOPs as dug directly down on top of the mine. It is also possible that he tried to work in a bit hurry to increase the progress. As he was fully dressed with PPE, therefore, remained save from other severe …
Ddasaccident625,
2010
AID
Ddasaccident625, Humanitarian Demining Accident And Incident Database
Global CWD Repository
We took the safety brief before we start working from the team leader then we entered the field, through the 1st period of work I cleared 3 AP mines from the mixed cluster (AP, AT) in Jaber 1 area, on the 2nd period at 9:11 am I cleared a 3 o’clock mine then moved to 9 o’clock mine, while searching I heard a signal and marked it then looked for it using the light rake but because it’s a hard stony area I used the heavy rake then, while progressing 15 cm from the right side I pulled the rake …
The Psychology Of Female Suicide Terrorism: Context And A Partial, Annotated Bibliography,
2010
Embry-Riddle Aeronautical University
The Psychology Of Female Suicide Terrorism: Context And A Partial, Annotated Bibliography, Ibpp Editor
International Bulletin of Political Psychology
The author examines the phenomena of female suicide in the context of terrorism, and the reasons women suicide, examining selected sources on the topic.
Global Logistics And Warfighter Focus,
2010
Cedarville University
Global Logistics And Warfighter Focus, Loren M. Reno
Business Administration Faculty Publications
No abstract provided.
National Mine Action Plan For The Period 2010-2023 For Vietnam,
2010
James Madison University
National Mine Action Plan For The Period 2010-2023 For Vietnam, The Socialist Republic Of Vietnam
Global CWD Repository
The outline of the National Mine Action Plan Period 2010-2025 in Vietnam. Translated in English and includes original Vietnamese text.
Demining Programme Office In The Falkland Islands - Technical Support 2010,
2010
C King Associates, Ltd.
Demining Programme Office In The Falkland Islands - Technical Support 2010, Colin King, Fenix -. Insight
Global CWD Repository
A series of three reports were published by the Demining Programme Office in the Falkland Islands (Malvinas).
This report outlines the technical support provided to the demining programme during the Austral summer of 2009/2010. The majority of the technical support provided fell into two categories:
- Detection: activities intended to enable the contractor to establish their detection capabilities against the minimum-metal mines.
- Exploitation: examination of recovered mines in order to observe the effects of aging and assess their implications.
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem,
2010
Old Dominion University
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil
Graduate Program in International Studies Theses & Dissertations
One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.
The analytical approach diverges from past utilitarian-based assessments to …
The Illogic Of The Biological Weapons Taboo.,
2010
University of Louisville
The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne
Faculty Scholarship
No abstract provided.
Falkland Islands Malvinas Exploitation Report 2010,
2010
James Madison University
Falkland Islands Malvinas Exploitation Report 2010, C. King Associates Ltd.
Global CWD Repository
A series of three reports were published by the Demining Programme Office in the Falkland Islands (Malvinas).
This report outlines the technical support provided to the demining programme during the Austral summer of 2009/2010. The majority of the technical support provided fell into two categories:
- Detection: activities intended to enable the contractor to establish their detection capabilities against the minimum-metal mines.
- Exploitation: examination of recovered mines in order to observe the effects of aging and assess their implications.
The Final Fight: The 2008 Battle Of Sadr City,
2010
Bryant University
The Final Fight: The 2008 Battle Of Sadr City, Geoffrey Ensby
Honors Projects in History and Social Sciences
Iraq following the US invasion in March of 2003 was a dangerous place, and one in which the national government struggled to maintain control while unsanctioned and unauthorized strongmen and their militias controlled wide swaths of territory. This analysis will thus look at the 2008 Battle of Sadr City between the militia of radical Shi’ite cleric Moqtada al-Sadr and the military forces of Iraq and the US conducting the operation in concert. Utilizing a number of newspaper accounts and editorials, journal articles, recent books, and freelance journalists’ writings, several key aspects will be considered regarding how Iraq was changed for …