首页> 美国政府科技报告 >Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations
【24h】

Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations

机译:利用恐怖主义漏洞:打击恐怖组织的执法方法

获取原文

摘要

This monograph explores some of the vulnerabilities that are present within terrorist organizations that the United States can exploit to deter, dismantle, dissuade, and defeat them. The monograph also examines the ways in which terrorist organizations have been defeated in the past so that the United States can incorporate these lessons learned in its counterterrorism strategies. The first section of the monograph provides an overview of Arab culture, the main tenets of Islam, and Jihad history. This section demonstrates that to uncover vulnerabilities within an Islamic terrorist organization, one must understand the belief system upon which the organization was founded. The strategy should not rely solely on conventional military might, but should be based on comprehension, reasoning, and decision making for the 21st century. The next section explores the ways in which other terrorist organizations have been defeated. Three cases studies are presented to demonstrate that conventional military force is not always the correct response to terrorism. A full spectrum of national and international resources, to include law enforcement agencies, intelligence agencies, legislatures, humanitarian agencies, and other 'soft' powers, in cooperation with limited military engagements, is a better approach to defeating terrorist groups. The monograph closes with three recommendations that the United States should consider to improve its effectiveness in fighting terrorism.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号