Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5,548 Full-Text Articles 3,486 Authors 2,418,366 Downloads 146 Institutions

All Articles in Defense and Security Studies

Faceted Search

5,548 full-text articles. Page 180 of 183.

The Final Fight: The 2008 Battle Of Sadr City, Geoffrey Ensby 2010 Bryant University

The Final Fight: The 2008 Battle Of Sadr City, Geoffrey Ensby

Honors Projects in History and Social Sciences

Iraq following the US invasion in March of 2003 was a dangerous place, and one in which the national government struggled to maintain control while unsanctioned and unauthorized strongmen and their militias controlled wide swaths of territory. This analysis will thus look at the 2008 Battle of Sadr City between the militia of radical Shi’ite cleric Moqtada al-Sadr and the military forces of Iraq and the US conducting the operation in concert. Utilizing a number of newspaper accounts and editorials, journal articles, recent books, and freelance journalists’ writings, several key aspects will be considered regarding how Iraq was changed for …


Border Conflict And Tibet: The Asian Giants And Their History Of Power Struggle, Evan Towt 2010 SIT Study Abroad

Border Conflict And Tibet: The Asian Giants And Their History Of Power Struggle, Evan Towt

Independent Study Project (ISP) Collection

The South Asian world is dominated by India and China, their combined populations equaling almost a full half of humankind. In 1962, the two countries clashed over their border. The main reason for the war was the contest over large areas of territory claimed by both countries. The border still has not been adequately defined. This essay examines the border dispute from its roots in history, through the 20th century and into the present. It was the goal of this work to give an unbiased account of the dispute, though the weight of evidence in favor of the Indian claim …


Eu Defence Integration And Nuclear Weapons: A Common Deterrent For Europe?, Ursula Jasper, Clara PORTELA 2010 University of St Gallen

Eu Defence Integration And Nuclear Weapons: A Common Deterrent For Europe?, Ursula Jasper, Clara Portela

Research Collection School of Social Sciences

Nuclear weapons remain the unquestioned core of the defence postures of both France and the United Kingdom. At the same time, the European Union is progressively enhancing its Common Foreign and Security Policy (CFSP), notably through the establishment of a European Security and Defence Policy (ESDP). Yet, despite evident progress in the CFSP, whose ultimate purpose is to lead to a ‘common defence policy’, EU member-states still deal with nuclear issues on a predominantly national basis. What is the alleged purpose of European nuclear forces? How is the raison d’être of the French and British nuclear deterrents conceptualized against the …


Annals Of Psychological Warfare: How To Induce Panic, IBPP Editor 2010 Embry-Riddle Aeronautical University

Annals Of Psychological Warfare: How To Induce Panic, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the phenomenon of panic in a wartime setting because of psychological warfare, as well as in other settings.


The Birds And The Bees: Sex And Personnel Security, IBPP Editor 2010 Embry-Riddle Aeronautical University

The Birds And The Bees: Sex And Personnel Security, Ibpp Editor

International Bulletin of Political Psychology

The author discusses gender identity and sexual activity as they relate to security personnel in the context of espionage.


El Choque De Ignorancias- Samuel Huntington, Hasan Turk 2010 Universidad de Antioquia

El Choque De Ignorancias- Samuel Huntington, Hasan Turk

Hasan Turk Mg.

No abstract provided.


Ddasaccident827, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident827, Humanitarian Demining Accident And Incident Database

Global CWD Repository

On the 16th March 2010 at [International demining organisation] task CBU 478, an uncontrolled detonation of a US M series M77 sub-munition occurred while [International demining organisation] searcher [the Victim] was conducting sub-surface instrument search.

[The Victim] sustained fragmentation injuries to his right leg in the thigh and lower leg. When he stood on an unstable rock in his clearance lane, this caused a sub-munition underneath the rock to detonate.

Based on all available evidence, the BOI team concludes that the accident occurred due to the failure of [the Victim] to carry out a sufficient check of the rocks and …


Why Terrorism? Whose Terror?, IBPP Editor 2010 Embry-Riddle Aeronautical University

Why Terrorism? Whose Terror?, Ibpp Editor

International Bulletin of Political Psychology

The author considers terrorism as a competitor for the legally constituted authority and power of governments.


Ddasaccident733, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident733, Humanitarian Demining Accident And Incident Database

Global CWD Repository

On 15 March 2010 at 08:55 hrs while [the Victim] was busy in excavation of a detected signal, suddenly the accident happened. As a result the deminer got severe injuries on his face, eyes and his right hand.


Ddasaccident645, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident645, Humanitarian Demining Accident And Incident Database

Global CWD Repository

When we arrived to the site the team leader gave us the morning safety brief and he warned us to be very alert about as we work on mine clusters, at 07:30 am I entered my site and the team leader came to direct me to make more space in the clearing area of missing mines, he told me to move to lane one later after finishing my work at the missing mine, lane one is a mixed mine area( has both types of mines M15 and M14 ) and asked me to clear M14 mines because the anti tank …


Geneva International Centre For Humanitarian Demining 2009 Annual Report, Geneva International Centre for Humanitarian Demining 2010 GICHD

Geneva International Centre For Humanitarian Demining 2009 Annual Report, Geneva International Centre For Humanitarian Demining

Global CWD Repository

Annual narrative report on the work of the GICHD in 2009.


Gender Guidelines For Mine Action Programmes, United Nations Mine Action Service 2010 UNMAS

Gender Guidelines For Mine Action Programmes, United Nations Mine Action Service

Global CWD Repository

In 2004–05, the Inter-Agency Coordination Group for Mine Action (IACG-MA) endorsed the first UN Gender Guidelines for Mine Action Programmes to enhance the integration of gender considerations into UN mine action programmes. The guidelines were developed with the assistance of the International Women’s Development Agency (IWDA). This effort followed the launch by DPKO in 2004 of the Gender Resource Package for Peacekeeping Operations, which identified key gender issues and provided an overview of how they could be addressed most effectively. The package, designed on the strong foundation of the UN Security Council Resolution 1325 (2000), recommended elaborating detailed guidelines within …


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby 2010 U.S. Army

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return to a security situation …


Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens 2010 HALO Corporation and U.S. Army

Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens

Journal of Strategic Security

The art and science of gathering critical operational intelligence has been defined in many ways and is beyond our needs for this writing. Throughout the course of history, many wars have been fought depending heavily on various forms of intelligence. During our most recent actions in the War on Terror, intelligence analysis has played a critical role in both offensive and defensive operations in Iraq and Afghanistan. With such varying fact-finding techniques available and utilized in the defense of our country, it has become an arduous task to collect, decipher, package, prioritize, disseminate, and act upon everything that comes down …


Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley 2010 Virginia Military Institute

Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley

Journal of Strategic Security

The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11) is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border"). The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about …


Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter 2010 Green Mountain College and United States Marine Corps

Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter

Journal of Strategic Security

Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area …


Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi 2010 University of Central Lancashire, UK

Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA), particularly Waziristan. In order to survive the ongoing North Atlantic Treaty Organization (NATO) military …


Global Risk Of Nuclear Terrorism, Emily Diez, Terrance Clark, Caroline Zaw-Mon 2010 Akribis Group and the Center for Terrorism and Intelligence Studies

Global Risk Of Nuclear Terrorism, Emily Diez, Terrance Clark, Caroline Zaw-Mon

Journal of Strategic Security

The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD) as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim …


Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein 2010 Henley-Putnam University

Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein

Journal of Strategic Security

No abstract provided.


Cover & Front Matter, 2010 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Digital Commons powered by bepress