Violent Systems

Violent Systems PDF Author: Troy S. Thomas
Publisher:
ISBN:
Category : Counterinsurgency
Languages : en
Pages : 120

Get Book

Book Description


Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries

Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries PDF Author:
Publisher: DIANE Publishing
ISBN: 1428960325
Category :
Languages : en
Pages : 112

Get Book

Book Description
This is the 52nd volume in the Occasional Paper series of the U.S. Air Force Institute for National Security Studies (INSS). This paper continues the work begun by Troy Thomas and Stephen Kiser in "Lords of the Silk Route: Violent Non-State Actors in Central Asia" (INSS Occasional Paper 43, May 2002). Inter-state war no longer dominates the landscape of modern conflict. Rather, collective violence and challenges to the international system come increasingly from violent non-state actors (VNSA). With few exceptions, VNSA play a prominent, often destabilizing role in nearly every humanitarian and political crisis faced by the international community. The broad spectrum of objectives and asymmetric methods of these contemporary Barbary Pirates fractures traditional conceptions of deterrence and warfighting. The authors contend that deterrence remains a viable strategy for meeting their challenge if adapted to an understanding of VNSA as dynamic biological systems. The prolonged utility of deterrence hinges on insight into VNSA life cycles and a broader conception of the psychology inherent in organizational decision making. Bundled as "broad biological deterrence" (BBD), they develop deterrent strategies that tackle the VNSA threat throughout its life cycle. However, the authors also realize that deterrence may not work in every case. This sets up a counter-VNSA (C-VNSA) strategy that goes beyond coercion to the defeat of the enemy. At its core, their C-VNSA strategy defeats a VNSA by the following: (1) denying the negative entropy, or stores of energy, required to survive attack; and (2) disrupting congruence, or fit, among sub-systems to achieve system failure. By also understanding the indicators of organizational change during its developmental life cycle, preemptory defeat before the VNSA reaches maturity becomes feasible. Their approach allows for measuring campaign progress by assessing changes in VNSA effectiveness.

Violent Systems

Violent Systems PDF Author: Troy S. Thomas
Publisher:
ISBN:
Category :
Languages : en
Pages : 102

Get Book

Book Description


Strategic Culture and Violent Non-state Actors

Strategic Culture and Violent Non-state Actors PDF Author: James M. Smith
Publisher:
ISBN:
Category : Political Science
Languages : en
Pages : 122

Get Book

Book Description
This paper combines three separate threads of analysis on culture and violent nonstate actors as a launching pad to spur further research into this critical arena of culture and security. Jim Smith lays out a series of templates for guiding analysis of culture and violent nonstate actors. Mark Long applies cultural analysis of radical Islam and alQaida in discussing the influences involved in the core al Qaida group's WMD decisions. Tom Johnson, in examining a tribal insurgent psychological campaign in Afghanistan, demonstrates that behavioral influences can be manipulated for significant effect in countering our efforts to gain stability and legitimacy for the Afghan government. James M. Smith, PhD, is the Director, USAF Institute for National Security Studies and Professor, Military Strategic Studies at the US Air Force Academy.Jerry Mark Long, PhD, is Associate Professor and Director, Middle East Studies, Honors College, Baylor University. Thomas H. Johnson is Research Professor at the Naval Postgraduate School.

Psychology of Terrorism

Psychology of Terrorism PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 222

Get Book

Book Description
In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.

Global Insurgency Strategy and the Salafi Jihad Movement

Global Insurgency Strategy and the Salafi Jihad Movement PDF Author: Richard H. Shultz
Publisher:
ISBN:
Category : Counterinsurgency
Languages : en
Pages : 156

Get Book

Book Description
In this paper, the author differentiates and characterizes terrorists and insurgents, and he conducts a detailed conceptual and historical analysis of insurgency and its current manifestation on a global scale by the Salafi Jihad movement. This work lays out the case that terrorism and insurgency differ, and that the current "long war" is actually being fought by the other side as an insurgency. As a result, the United States must amend and adapt its strategy to one of global counterinsurgency, beyond a global war on terrorism alone.

Violent Radical Movements in the Arab World

Violent Radical Movements in the Arab World PDF Author: Peter Sluglett
Publisher: Bloomsbury Publishing
ISBN: 1786726300
Category : History
Languages : en
Pages : 265

Get Book

Book Description
Violent non-state actors have become almost endemic to political movements in the Middle East and the Horn of Africa. This book examines why they play such a key role and the different ways in which they have developed. Placing them in the context of the region, separate chapters cover the organizations that are currently active, including: The Muslim Brotherhood, The Islamic State in Iraq and Syria, Jabhat al-Nusra, Hamas, Hizbullah, the PKK, al-Shabab and the Huthis. The book shows that while these groups are a new phenomenon, they also relate to other key factors including the 'unfinished business' of the colonial and postcolonial eras and tacit encouragement of the Wahhabi/Salafi/jihadi da'wa by some regional powers. Their diversity means violent non-state actors elude simple classification, ranging from 'national' and 'transnational' to religious and political movements. However, by examining their origins, their supporters and their motivations, this book helps explain their ubiquity in the region.

Beneath the Surface

Beneath the Surface PDF Author: Troy S. Thomas
Publisher: Joint Military Intelligence College
ISBN:
Category : History
Languages : en
Pages : 310

Get Book

Book Description
Presents the deep subject-matter understanding gained by a mid-career Air Force officer who as a Research Fellow engaged in a year-long quest for insight into asymmetric conflict analysis and synthesis. He acquired a first-hand appreciation of how intelligence can more systematically build and employ a capability to gain ground in this challenging environment. He presents his formulation in an accessible, systematic manner that makes it suitable as a handbook for practitioners at any level. Goes well beyond any existing guidance yet assembled in on e package.

Beneath the surface: Intelligence Preparation of the Battlespace for Counterterrorism

Beneath the surface: Intelligence Preparation of the Battlespace for Counterterrorism PDF Author:
Publisher: Government Printing Office
ISBN: 9780160869464
Category :
Languages : en
Pages : 310

Get Book

Book Description
This book presents the deep subject-matter understanding gained by a mid-career U.S. Air Force officer who as a Research Fellow engaged in a year-long quest for insight into asymmetric conflict analysis and synthesis. During the year, through innumerable exchanges with expert counterterrorism practitioners inside and outside of government, he acquired a first-hand appreciation of how intelligence can more systematically build and employ a capability to gain ground in this challenging environment. His formulation, presented here in an accessible, systematic manner that makes it suitable as a handbook for practitioners at any level, goes well beyond any existing guidance yet assembled in one package. This product has been reviewed by senior experts from academia and government, and has been approved for unrestricted distribution by the Office of Freedom of Information and Security Review, Washington Headquarters Services. It is available to the public through the National Technical Information Service (www.ntis.gov).

Terrorism Informatics

Terrorism Informatics PDF Author: Hsinchun Chen
Publisher: Springer Science & Business Media
ISBN: 0387716130
Category : Business & Economics
Languages : en
Pages : 590

Get Book

Book Description
This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.