Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Defense and Security Studies

Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter May 2022

Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter

Global CWD Repository

Download citation Copy link

Abstract

IEDD Operator Search procedures for use in non and semi-permissive environments. IEDD Operator Search is required to safely approach an IED target area and conduct RSPs so that the IEDD Operator maintains personal safety and reduces the possibility of being targeted by an observing terrorist. I have observed many different approaches to IEDD Operator Search by operators from various countries, and unfortunately found most to be lacking in safety considerations in one way or another. This article aims to familiarise mine action IEDD Operators operating in a VOIED-contaminated environment (permissive/semi-permissive/non-permissive), with the British technique of …


The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta Apr 2022

The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta

Political Science Department Faculty Publications

The persistent presence of armed groups in local communities is largely due to ineffective community security management, weak rule of law, and the constant shift in peace and security policy guidelines. Compounding the problem is the limited capacity of local government units and the lack of strong political will of officials to address security issues. Irregular forces offering private security services thrive in this environment. Armed groups gain legitimacy since they fill security service gaps in communities and because they assist government security forces in their counterinsurgency operations. Gray zone activities are activities by armed groups that happen in-between the …


The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman Apr 2022

The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

The AUKUS Nuclear Submarine Agreement seeks to enhance multinational deterrence against Chinese geopolitical assertiveness by giving Australia nuclear powered submarines.

▶ This agreement will pose considerable cost and technical challenges for the Australia, the United Kingdom, and the United States.

▶ Estimates of when Australia will be able to deploy nuclear submarines range from 2030-2040.

▶ The U.S. and its allies will have to make challenging decisions about where to build AUKUS in Australia.

▶ There is debate as to whether efforts to deter China in the Asia-Pacific should include non-Anglosphere countries in that region.

▶ Consideration should be given …


To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State Apr 2022

To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State

Global CWD Repository

The United States is committed to reducing these threats worldwide and is the leading financial supporter of CWD, providing more than $4.2 billion in assistance to more than 100 countries since 1993. This makes the United States the world’s single largest financial supporter of CWD. The Department of State, Department of Defense, and the U.S. Agency for International Development (USAID) work together with foreign governments, private companies, international organizations, and nongovernmental organizations (NGOs) to reduce excess SA/LW and conventional munitions stockpiles (including MANPADS), implement best practices for PSSM at conventional weapons storage sites, and carry out HMA programs.

In 2021, …


Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels Apr 2022

Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels

Student Publications

The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …


Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio Mar 2022

Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio

FIU Electronic Theses and Dissertations

Governments employ several approaches to combat Transnational Organized Crime groups. These groups include drug trafficking organizations and armed-insurgent groups. Tactics such as High-Value Target strikes, Peace Accords, and vigilantism have shown to successfully debilitate criminal networks while at the same time sparking unintended negative outcomes. For example, some of these tactics are associated with an increase in cartel-related violence, terrorist attacks, and the lethality of terrorist attacks. What remains unclear is the degree to which these approaches affect these associations and which of these tactics has the most favorable outcomes in combating Transnational Organized Crime groups. The analyses conducted in …


Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane Mar 2022

Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane

Articles & Editorials

No abstract provided.


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …