Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Terrorism And Counter-Terrorism In Latin America: A Comparative Study Of Peru And Colombia, Reagan Shane
Terrorism And Counter-Terrorism In Latin America: A Comparative Study Of Peru And Colombia, Reagan Shane
Global Tides
This paper investigates the counter-terrorism strategies employed against the Revolutionary Armed Forces of Colombia (FARC) in Colombia and the Shining Path (SL) in Peru and analyzes the effectiveness of those strategies. It begins by exploring the foundation of each organization and its respective goals, organization and tactics. Using this information, it then explores the counter-terrorism strategies employed by the government of each country in which the organizations were operating to determine the effectiveness of those strategies and how the structure of the terrorist organization might change that effectiveness. The paper concludes that military strategies have only been somewhat effective in …
Changes In Intelligence For An Age Of Terror (Gregory F. Treverton. Intelligence For An Age Of Terror. Cambridge: Cambridge University Press, 2009.), Scott Miller
Global Tides
Book review of Gregory F. Treverton's Intelligence for an Age of Terror (Cambridge: Cambridge University Press, 2009).
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …