11,339 research outputs found

    Disrupt, Deny, Dismantle: A Special Operations Forces (SOF) Model for Combatting New Terrorism

    Get PDF
    Terrorism in the new millennium has morphed drastically since the 1970s. The terrorist organizations of today are a hybrid between the insurgent group models of the 1960s and modern terrorist organizations such as Al Qaeda. This hybrid model has created what has become a transnational insurgency recruited, trained, and led by major terrorist networks such as the Islamic State of Iraq and the Levant (ISIL). Even smaller regional groups such as Boko Haram have surpassed merely conducting terrorist attacks. These smaller groups are also focused on controlling territory. Tan (2008) refers to this change as “New Terrorism”. To combat New Terrorism, a combination of counterinsurgency tactics and counterterrorism tactics must be employed. This study will examine the need to define roles and responsibilities for various organization and various echelons through the introduction of a new Special Operations Forces model; Disrupt, Deny, Dismantle. The acronym to be used for this model is D3. This model recommends different tactics, techniques, and procedures for forces not specifically assigned the counterterrorism mission. As new terrorism continues to change, only counterterrorism forces should be tasked with the Find Fix Finish, Exploit, Analyze, and Disseminate (F3EAD) model of targeting (Counterterrorism 2014). All other military and law enforcement elements should disrupt and deny the enemy in support of the counterterrorism effort. This study is based on extensive research and the author’s 23 years of experience serving in U.S. Army Special Forces. Throughout his career, the author interacted with people from various social, economic, and professional backgrounds throughout the Middle East, Africa, and the Balkans

    The Gaza Strip as Panopticon and Pansprectron: The Disciplining and Punishing of a Society\ud

    Get PDF
    This paper explores the different yet complementary aspects of the panopticon and the panspectron using the case study of the Israeli controlled Palestinian territory, the Gaza Strip. Beginning with a brief theoretical discussion of the concept of panopticon and panspectron expanding on the existing literature, the paper moves on to discuss the implementation of panoptical and panspectral technologies and practices in the Gaza Strip and situates these within a larger framework of control of the Palestinian population under Israeli occupation, and discusses seepage of these surveillance technologies into Israeli society proper and\ud beyond into the international arena.\u

    Girt by sea: understanding Australia’s maritime domains in a networked world

    Get PDF
    This study aims to provide the background, language and context necessary for an informed understanding of the challenges and dilemmas faced by those responsible for the efficacy of Australia’s maritime domain awareness system. Abstract Against a rapidly changing region dominated by the rise of China, India and, closer to home, Indonesia, Australia’s approaches to understanding its maritime domains will be influenced by strategic factors and diplomatic judgements as well as operational imperatives.  Australia’s alliance relationship with the United States and its relationships with regional neighbours may be expected to have a profound impact on the strength of the information sharing and interoperability regimes on which so much of Australia’s maritime domain awareness depends. The purpose of this paper is twofold.  First, it seeks to explain in plain English some of the principles, concepts and terms that maritime domain awareness practitioners grapple with on a daily basis.  Second, it points to a series of challenges that governments face in deciding how to spend scarce tax dollars to deliver a maritime domain awareness system that is necessary and sufficient for the protection and promotion of Australia’s national interests

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    The Global Expansion of the Al Qaeda Franchise

    Get PDF
    This thesis examines how the international terrorist group known as Al Qaeda has expanded its operations globally since 9/11. Case studies of Al Qaeda’s operations in the Arabian Peninsula, the United Kingdom, and the United States illustrate how the organization has exploited diverse environmental conditions to achieve either a limited or fully integrated local presence. This thesis argues that Al Qaeda has evolved into a highly diffuse and decentralized franchise that exercises little command and control over its organizational arms

    Application of Marketing Strategies in Nigerian Quantity Surveying Firms

    Get PDF
    Marketing has not been fully understood in the context of the construction industry. This inadequacy is worse for quantity surveying (QS) consultancy firms in developing countries like Nigeria due to the relative ignorance of the general public about the job of a quantity surveyor. Consequently, most QS firms in the country perform poorly while others struggle to survive. The goals of this paper were to identify strategies for marketing by QS firms in Nigeria, and to develop a framework for the adoption of marketing strategies by the firms.  The study made use of exploratory research design with secondary sources of data and focus group discussion as instruments for data collection. It found that stringent codes of ethics, insufficient marketing know-how, and difficulty in the measurement of marketing performance are among factors that could hinder the adoption of marketing by QS firms in Nigeria. A number of marketing strategies and criteria for selection of marketing strategies by QS firms were identified and categorised. A pictorial model for the implementation of marketing strategies in QS firms in the country was also derived. The study recommended a reorientation by QS firms to adopt marketing as a key management strategy. Keywords: Firms, Marketing Strategy, Professional Ethics, Nigeria, Quantity Surveying

    Information Warfare: Time for a redefinition

    Get PDF
    Information warfare has become an increasingly diverse field. The changes to its composition have been primarily driven by changes in technology and the resulting increased access to information. Further, it has been the progressively more diverse methods available for communication that has fuelled expanding applications for information warfare techniques into non-military environments. In order for younger generations of students to understand the place of information warfare in the larger security picture, there is a need to shift the emphasis from many of the military underpinnings to its relevance in modern society and the challenges in the commercial environment. This paper provides a platform for discussion of the sphere of information warfare and its relevance to contemporary society. Whilst the methods of information operations and the understanding of military origins have not changed, the manner in which the topics are presented and how these relate to today’s corporate environment and increasingly global society have become a new focus. The importance of this is to make information warfare relevant to today’s generation of students and to develop information strategists rather than information specialists who can function effectively on a global stage
    • …
    corecore