Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

International and Area Studies

Pepperdine University

Terrorism

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Terrorism And Counter-Terrorism In Latin America: A Comparative Study Of Peru And Colombia, Reagan Shane Apr 2021

Terrorism And Counter-Terrorism In Latin America: A Comparative Study Of Peru And Colombia, Reagan Shane

Global Tides

This paper investigates the counter-terrorism strategies employed against the Revolutionary Armed Forces of Colombia (FARC) in Colombia and the Shining Path (SL) in Peru and analyzes the effectiveness of those strategies. It begins by exploring the foundation of each organization and its respective goals, organization and tactics. Using this information, it then explores the counter-terrorism strategies employed by the government of each country in which the organizations were operating to determine the effectiveness of those strategies and how the structure of the terrorist organization might change that effectiveness. The paper concludes that military strategies have only been somewhat effective in …


Changes In Intelligence For An Age Of Terror (Gregory F. Treverton. Intelligence For An Age Of Terror. Cambridge: Cambridge University Press, 2009.), Scott Miller Jan 2010

Changes In Intelligence For An Age Of Terror (Gregory F. Treverton. Intelligence For An Age Of Terror. Cambridge: Cambridge University Press, 2009.), Scott Miller

Global Tides

Book review of Gregory F. Treverton's Intelligence for an Age of Terror (Cambridge: Cambridge University Press, 2009).


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …