Geneva International Centre For Humanitarian Demining 2009 Annual Report,
2010
GICHD
Geneva International Centre For Humanitarian Demining 2009 Annual Report, Geneva International Centre For Humanitarian Demining
Global CWD Repository
Annual narrative report on the work of the GICHD in 2009.
Book Reviews,
2010
Henley-Putnam University
Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein
Journal of Strategic Security
No abstract provided.
Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan,
2010
University of Central Lancashire,
UK
Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi
Journal of Strategic Security
Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA), particularly Waziristan. In order to survive the ongoing North Atlantic Treaty Organization (NATO) military …
Global Risk Of Nuclear Terrorism,
2010
Akribis Group and the Center for Terrorism
and Intelligence Studies
Global Risk Of Nuclear Terrorism, Emily Diez, Terrance Clark, Caroline Zaw-Mon
Journal of Strategic Security
The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD) as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim …
Intelligence And Its Role In Protecting Against Terrorism,
2010
HALO Corporation and U.S. Army
Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens
Journal of Strategic Security
The art and science of gathering critical operational intelligence has been defined in many ways and is beyond our needs for this writing. Throughout the course of history, many wars have been fought depending heavily on various forms of intelligence. During our most recent actions in the War on Terror, intelligence analysis has played a critical role in both offensive and defensive operations in Iraq and Afghanistan. With such varying fact-finding techniques available and utilized in the defense of our country, it has become an arduous task to collect, decipher, package, prioritize, disseminate, and act upon everything that comes down …
Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico,
2010
Virginia Military Institute
Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley
Journal of Strategic Security
The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11) is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border"). The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about …
Strategic Asymmetric Deception And Its Role In The Current Threat Environment,
2010
U.S. Army
Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby
Journal of Strategic Security
President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return to a security situation …
Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism,
2010
Green Mountain College and United States Marine Corps
Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter
Journal of Strategic Security
Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area …
Cover & Front Matter,
2010
University of South Florida
Ddasaccident593,
2010
AID
Ddasaccident593, Humanitarian Demining Accident And Incident Database
Global CWD Repository
According to the investigation report the de-miner was using the scraper direct on the top of the detected signal causing it to go off. It was then found that the exploded item was a MUV fuse. As a result of the explosion, [MUV fuze] sustained injuries on his eyes, right side ear, arm and head; the injuries indicate that the de-miner was not using his visor properly.
Ddasaccident678,
2010
AID
Ddasaccident678, Humanitarian Demining Accident And Incident Database
Global CWD Repository
The Deminer was trying to check signal using the heavy rake, the M14 mine was laid in a grassy solid ground full of grass root and stones, the deminer tried to drew the grass by the heavy rake, the roots of the grass push the pressure plate of the mine, that cause the mine to blast.
Ddasaccident666,
2010
AID
Ddasaccident666, Humanitarian Demining Accident And Incident Database
Global CWD Repository
The deminer was trying to clear the AP mine in a cluster, there was no signal due to the depth of the mines, she asked the team leader to help her in finding the signal, he tried and started to excavate until he found signal, he located and excavated over the signal until he reached 20 cm depth at that time he hit the M14 mine and caused the detonation
Ddasaccident653,
2010
AID
Ddasaccident653, Humanitarian Demining Accident And Incident Database
Global CWD Repository
The Deminer today was officiated as a team leader due to the absence of the team leader. He took one deminer tools and started to work himself in one of the remaining cluster in his section. While he was using the grass cutter to cut the grass in front of the base stick he hit the barely covered M14 mine by the grass cutter which caused the mine to initiate.
The Topper (February 2010),
2010
Western Kentucky University
The Topper (February 2010), Veterans Upward Bound Project, Western Kentucky University
Veterans Upward Bound Publications
No abstract provided.
Telemedicine And Advanced Technology Research Center: Quarterly Report, October 18, 2009 To January 17, 2010,
2010
University of Nevada, Las Vegas
Telemedicine And Advanced Technology Research Center: Quarterly Report, October 18, 2009 To January 17, 2010, Bea Babbitt
Telemedicine & Advanced Technology Research Center
Development of a P.O.I. and a Blended Learning Ecology for use in Combat Lifesaver Skills Training for the Army.
Linking Mine Action And Development | Guidelines For Mine/Erw Operators,
2010
GICHD
Linking Mine Action And Development | Guidelines For Mine/Erw Operators, Geneva International Center For Humanitarian Demining
Global CWD Repository
Mine action programmes often are not linked early and strongly enough with key development actors. Despite the availability of extensive research documenting the need for greater coordination between mine action and development organisations, concrete guidance for practitioners and policy-makers on how to link mine action with development has been lacking. In response, the Geneva International Centre for Humanitarian Development has published guidelines on how to ensure mine action promotes development in mine-affected countries. More specifically, the guidelines seek to:
- Increase awareness that landmines and other remnants of conflict block development in many affected countries
- Strengthen coordination between mine action and …
Campus Safety: Assessing And Managing Threats,
2010
University of Nebraska - Lincoln
Campus Safety: Assessing And Managing Threats, Mario Scalora, Andre Simons, Shawn Vanslyke
Mario Scalora Publications
Since the shootings at Virginia Tech, academic institutions and police departments have dedicated substantial resources to alleviating concerns regarding campus safety. The incident in Blacksburg and the similar tragedy at Northern Illinois University have brought renewed attention to the prevention of violence at colleges and universities.
Campus professionals must assess the risk posed by known individuals, as well as by anonymous writers of threatening communications. The authors offer threat assessment and management strategies to address the increased demands faced by campus law enforcement, mental health, and administration officials who assess and manage threats, perhaps several simultaneously.
Ddasaccident599,
2010
AID
Ddasaccident599, Humanitarian Demining Accident And Incident Database
Global CWD Repository
After I recovered the main mine (AT M19) and AP mine M14 (12 o’clock direction) I started to recover AP mine M14 (3 o’clock direction) and after a while, I heard a signal, then I applied the standard procedures to investigate the signal and during my approach to the centre of the signal by the heavy rake, AP mine blew up and I did not fell down on the ground and I did not feel any type of pain, then I saw the TL coming to my site and I was just waiting for him to come, after TL reached …
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination,
2010
National Defense University
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Sascha Vitzthum
Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …
“Post-Amnesty Niger Delta And The Promise Of Development: Issues, Prospects And Problems,
2010
Obafemi Awolowo University, Ile-Ife, Nigeria
“Post-Amnesty Niger Delta And The Promise Of Development: Issues, Prospects And Problems, Omololu Toluwanimi Omololu
Omololu Michael FAGBADEBO
The offer of amnesty to militants in the Niger Delta region of Nigeria was premised on the assumption that it would engender an enabling environment for meaningful development of the area. This paper seeks to project into the problems that may likely jeopardize this assumption. It identifies the windows of opportunity for a lasting peace in the region but expresses doubts about positive change in the character of the Nigerian State. As privatized state, political actors exploit the state to pursue personal and parochial interests rather than implementation of policies aimed at improving the development of the Niger Delta area.