Search Results

1 - 10 of 58 items :

  • "insurgency" x
Clear All
The Counter Insurgency Operating Environment

. [6] Flasar, Z.; Kozůbek, J. Některé aspekty vedení boje v zastavěné oblasti (in Czech). In: Sborník z mezinárodní vojensko-odborné konference Taktika 2016. Brno : University of Defence in Brno, Czech Republic, 2016, ISBN 978-80-7231-398-3, pp. 26-33. [7] FM 3-24 Insurgencies and Countering Insurgencies. Washington, DC : Headquarters, Department of the Army, 2014. [8] Hrnčiar, M. Informačné aktivity v operáciách proti povstaniu (in Slovak). In : National and International Security 2016 : Proceedings of 7th International Scientific

Open access
Climate Variability and Consequences for Crime, Insurgency in North East Nigeria

. Mailafia, O, (2012). Conflict and insurgency in Nigeria. 247 Ureport. 247 Ureport.com Sept 20 Mayumi, N. (2011). Japan raises nuclear crisis seventy to highest Level. Reuters April, 12. Moritz, E.R, Blitz, C.M. & Steig, E.J. (2002). Dynamics of recent climate change in the Arctic. Science Vol. 297, August, 30. Newzealand Herald, (2011). Japan’s unfolding disasters bigger than Chernobyl” April, 2. Nigeria Population Commission, NPC (2006). National Population Census, Nigeria. Nigeria: Abuja

Open access
Strategies of Islamist Extremism in Europe

://www.geocurrents.info/geopolitics/self-declared-statesgeopolitics/islamic-states-aspirational-map > Mareš, Miroslav. “Strategies for Creating Insurgencies and Civil Wars in Europe: From Violent Extremism to Paramilitary Conflicts?“ Jindal Journal of International Affairs, 2. 1. (2012): 90-119 < http://www.jsia.edu.in/JJIA/PDF/Miroslav-StrategiesforCreating.pdf > Merari, Ariel. “Terrorism as a Strategy of Insurgency.” Terrrorism and Political Violence 5. 4. (1993): 213-251. Nesser, Petter. “Ideologies of Jihad in Europe.” Terrrorism and Political Violence. 23. 2. (2011): 213-251. O´Neill, Bard E. Insurgency & Terrorism

Open access
Counter-Insurgency Operations of the African Union and Mitigation of Humanitarian Crisis in Somalia

Abstract

The protracted armed conflict in Somalia has engendered an unprecedented humanitarian crisis; one that makes it a leading storehouse of the worst humanitarian conditions in the world. The intervention of the African Union (AU) through its third Peace Support Operation- the African Union Mission in Somalia (AMISOM)- was aimed at supporting the Transitional Federal Institutions in the stabilisation of the country, advancing dialogue and reconciliation as well as facilitating the provision of humanitarian support. The achievement of the humanitarian component of the mission’s mandate is largely contingent on the first two mandates. Essentially, this study interrogated the interface between the implementation of the humanitarian component of AMISOM mandate and the control of the worsening conditions of Somali internally displaced persons and refugees. Anchoring analysis within the classical approach to national security, the study found that the restoration of relative stability in the polity has not widened access to economic and humanitarian assistance in the terror-laden state of Somalia. Thus, greater commitment of major stakeholders, especially the United Nations (UN), the United States as well as the AU is required in the transmutation of AMISOM and Somalia National Armed Forces into a force that is entirely indigenous to the people of Somalia. This will serve as an elixir to the ever-constricting humanitarian corridor that has exacerbated the conditions of the victims of forced migration in Somalia.

Open access
Understanding Contemporary Asymmetric Threats

References Black, J., 2016. Insurgency and Counterinsurgency: A Global History . Rowman and Littlefield Publishing Group: Maryland. Brzica, N., 2017. Potential Adherents of Radical Islam in Europe: methods of Recruitment and the Age of Perpetrators in Acts of Terror. Politička misao: časopis za politologiju, 54(4), 161-184. CACI International, 2017., Global Snapshot, April 2017. Available on www.asymmetricthreat.net , Cunningham, W., 2001. Violent Conflict in Northern Ireland: Complex Life at the Edge of Chaos . George Mason

Open access
Physiognomy of the Operations Against Terrorism

Abstract

In current conflicts, the terrorist networks already represent a major player and the terrorist threats remain highly topical. In the physiognomy of the actions of the forces engaged in counter-terrorism operations offfensive actions must prevail, but there will be situations in which the military forces will have to undertake defensive actions aswell, because the neutralization of the terrorist entities does not necessarily mean removal of their infrastructure. The operations against terrorism require, for the military structures present in theaters, the review and reconsideration of their own tasks, forms and methods of action, profound transformation of the adopted strategies, a multi-dimensional vision on the effects to be achieved, a comprehensive approach to planning operations, that will help the management of the situations and achievement of the desired end state.

Open access
Keystones of Irregular Warfare

]: Volume 39, Number 5, 1996. [4] FM 3-24 Insurgencies and Countering Insurgencies. Washington, DC : Headquarters, Department of the Army. 2014. [5] AFDD 3-2 Irregular Warfare. Center for Doctrine Development and Education, 2013. [6] Hybrid warfare. 2010. Washington, DC : United States Government Accountability Office. 2010. [7] Spilý, P., Military Art Versus Contemporary Security Threats. In: Národná a medzinárodná bezpečnosť 2013 [elektronický zdroj] : zborník vedeckých a odborných prác, pp. 421 - 428

Open access
The Content of Professional Training of Masters in National Security at the UK Universities

. Retrieved from https://www.kcl.ac.uk/study/postgraduate/taught-courses/national-security-studies-ma . 10. QAA. (2015). Subject Benchmark Statement for Politics and International Relations. Retrieved from https://www.qaa.ac.uk/docs/qaa/subject-benchmark-statements/sbs-politics-15.pdf?sfvrsn=ee95f781_14 . 11. Terrorism Prevention and Investigation Measures Act. (2011). Retrieved from https://www.legislation.gov.uk/ukpga/2011/23/contents . 12. University of Leeds. (2018). Security, Terrorism and Insurgency MA. Retrieved from https

Open access
Selected Aspects of Vehicle Born Improvized Explosive Devices

Abstract

The paper focuses on the analysis of the current highly dangerous tools of destruction, used mostly by insurgents and terrorists, especially in asymmetric warfare. Vehicles usually loaded with explosives (mostly homemade explosive), driven by suicide bombers are a significant threat to troops and the civilian population, not only in high risk areas. Analysis of the available incidents of this type, and available response to an incident mentioned in this article, it becomes the basic portfolio data for the design of effective elimination or at least reduction of the destructive effect, especially on soft targets.

Open access
Risk Management Responses to Armed Non-State Actor Risk in Afghanistan

Abstract

The article considers responses by different categories of actor to the threat of armed non-state actors in the international intervention in Afghanistan 2001-2015. Concepts from the sociology of risk, in particular risk-management and the distinction between operational and reputational risk, are related to field research in Afghanistan during the intervention. The ‘risk society’ approach of Beck (2009) is critiqued as relatively inapplicable to a discussion of differences in risks to and responses by different categories of actor. The article identifies some convergences of practice across three categories of intervening actor, civil-developmental, counter-insurgent and counter-terrorist, in particular tendencies to risk-transfer and remote-management that draws together theorisation of civil practice by Duffield (2010) and military practice by Shaw (2002). This is problematised relative to difficulties in managing tensions between operational risks to intervening actors and reputational risks vis-à-vis local actors.

Open access