Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 141, Hybrid Warfare and the Gray Zone Threat, considers the mutation of the international security environment brought on by decades of unrivaled U.S. conventional military power. The term "hybrid warfare" encompasses conventional warfare, irregular warfare, cyberwarfare, insurgency, criminality, economic blackmail, ethnic warfare, "lawfare", and the application of low-cost but effective technologies to thwart high-cost technologically advanced forces. This volume is divided into five sections covering different aspects of this topic, each of which is introduced by expert commentary written by series editor Douglas C. Lovelace, Jr. This volume contains thirteen useful documents exploring various facets of the shifting international security environment, including a detailed report on hybrid warfare issued by the Joint Special Operations University and a White Paper on special operations forces support to political warfare prepared by the U.S. Army Special Operations Command, as well as a GAO report and a CRS report covering similar topics. Specific coverage is also given to topics such as cybersecurity and cyberwarfare, the efficacy of sanctions in avoiding and deterring hybrid warfare threats, and the intersection of the military and domestic U.S. law enforcement.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 144, Autonomous and Semiautonomous Weapons Systems, examines the impact of robots and autonomous and semiautonomous weapons systems on the waging of modern warfare. It considers the likely effects of emerging technological innovations in this area from both a political and strategic standpoint, in addition to considering the implications of such technologies within the context of the law of armed conflict and international humanitarian law. This volume is divided into three sections: (1) U.S. policy and approaches to the use of autonomous and semiautonomous weapons systems; (2) U.S. armed forces use of such weapons systems; and (3) potential terrorist use of such weapons systems. Official policy documents from the DoD and the U.S. Army and Air Force are complemented by reports from the Strategic Studies Institute/Army War College Press and other U.S. military sources.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 148, Lone Wolf Terrorists, examines the phenomenon of the solitary domestic terrorist, analyzes the distinction between such terrorists and mass murderers who are not deemed to be terrorists, considers the motivations of violent extremists, and examines the dilemmas faced by law enforcement in preventing solitary political extremists with violent ideologies from translating their beliefs into actions. The volume is divided into three sections, providing an overview of the topic, an examination of strategies for prevention of such attacks, and a consideration of the Internet's role in contributing to radicalization. Documents included in this volume include a CRS report on domestic terrorism, a report examining violent radicalization from a criminal justice perspective, and a CRS report differentiating hate crimes from domestic terrorism, as well as other reports on the lone wolf terrorism phenomenon and strategies to prevent and/or counter it. The last document in the volume is a CRS report relating to the advocacy of terrorism on the Internet, especially including social media, and the ways in which law enforcement might be able to address the problem of dangerous online speech within the current U.S. legal structure.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 147, Assessing the 2017 U.S. National Security Strategy, evaluates the changes in U.S. national security policy indicated in the National Security Strategy published by the Trump administration in 2017, as well as the U.S. National Defense Strategy, a summary of which was made available to the public in 2018. The volume also takes a close look at the comparable strategy documents of the Russian Federation and the People's Republic of China (PRC), the two greatest competitors of the U.S. in the global power structure, in addition to considering the U.S. security posture in the broader international context. In addition to including the text of the 2017 U.S. National Security Strategy and the 2018 U.S. National Defense Strategy, this volume also includes the Russian Federation's Foreign Policy Concept, National Security Strategy, and Military Doctrine, and China's national defense, military strategy, and Asia-Pacific cooperation documents, as well as Chinese President Xi Jinping's October 2017 speech to the 19th National Congress of the Communist Party of China outlining the way forward for the PRC. Two 2017 CRS reports examining U.S. security strategy in the international context are also included: U.S. Role in the World: Background and Issues for Congress and A Shift in the International Security Environment: Potential Implications for Defense-Issues for Congress.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 142, Security Strategies of the Second Obama Administration: 2015 Developments, examines the major national security and military strategy documents released by the Obama administration during 2015: the National Security Strategy; the National Military Strategy; the National Intelligence Strategy; and the Department of Defense Cyber Strategy. This volume is intended as a sequel to Volume 137 of this series, which considered the de facto national security strategy of the Obama administration prior to the release of these documents. It is divided into four topical sections, each of which is introduced by a commentary written by series editor Douglas C. Lovelace, Jr. In addition to the documents listed above, this volume also contains recent reports analyzing those documents, as well as a legal update on the current status of the Authorization for the Use of Military Force (AUMF) and a consideration of the War Powers Resolution.
Volume 106 of Terrorism: Commentary on Security Documents, Terrorist Financing and Money Laundering, guides readers through the complex legal terrain of terrorist financing and money-laundering. Researchers will benefit from the diversity of this volume's selection: from U.S. agency reports on how to implement the recommendations of the 9/11 Commission to the efforts of the European Parliament in seizing assets to two perspectives on how well Saudi Arabia is combating terrorist financing within its borders: the U.S. perspective and the perspective of Saudi Arabia itself. Equally important for researchers is this volume's extensive treatment of U.N. measures on terrorist financing and money laundering. The volume concludes with the full text of the model rules for regulating terrorism-related financial transactions, as promulgated by a joint body of the U.N. and the International Monetary Fund.
Volume 112 of Terrorism: Commentary on Security Documents, Discerning President Obama's National Defense Strategy, makes available documents from the first fifteen months of the Obama administration that provide insights into its developing national defense strategy. Included are documents specifically relating to the U.S. Department of Defense and the nation's armed forces. Included is the February 2010 Quadrennial Defense Review Report of the Department of Defense, one of the most significant documents providing insight into the defense component of national security. General Editor Douglas Lovelace, an expert in U.S. military matters, elucidates the complexities of military spending and of counter-insurgency tactics. Also included are reports detailing the strategy and performance of government agencies involved in the security effort, such as the Department of Homeland Security. These reports shed light on internal department assessments as well as external evaluations. Finally, strategy documents produced by the U.S. armed forces describe the national security policy being implemented by the nation's senior military leaders. Researchers will benefit from the focused and comprehensive nature of these reports.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics in the worldwide effort to combat terrorism. Among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service (CRS) and the Government Accountability Office (GAO), United Nations Security Council resolutions, reports and investigations by the United Nations Secretary-General and other dedicated UN bodies, and case law from the U.S. and around the globe covering issues related to terrorism. Most volumes carry a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. Volume 126, The Intersection of Law and War, takes a fresh look at the ways in which law and war intersect in this modern age of multifaceted and multidimensional warfare. Professor Douglas Lovelace, Jr. has organized Congressional Research Service reports and United Nations studies to discuss how U.S. law and international law bear on contemporary national security issues such as: terrorism in the context of the war powers debate; the use of drones for targeted killings; maintaining and closing the U.S. detention facility at Guantanamo Bay; and illegal border crossing into the United States.
Volume 116 of Terrorism: Commentary on Security Documents, Assessing President Obama's National Security Strategy extends the previous volumes on the Administration's national security policy by highlighting its specific strategies. The volume begins with an assessment of the recently published Obama National Security Strategy. It also includes other strategy documents, official statements, and budget documents to allow readers to compare and contrast this Administration's approach to its predecessor.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on the worldwide counter-terrorism effort. Among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service (CRS) and the Government Accountability Office (GAO), and case law covering issues related to terrorism. Each volume carries a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. Volume 121, Nuclear Non-Proliferation Treaty, covers recent developments relating to the 2010 NPT Review Conference, primarily those pertaining to Iran and North Korea. After the 2005 Review Conference ended without a final consensus declaration due to disputes over Iran's nuclear activities, Israel's nuclear program, and implementation of the Middle East nuclear weapon-free zone, the lack of consensus in 2005 combined with continued concern over the nuclear programs of Iran and North Korea made the 2010 Review Conference a critical moment in the achievement of the NPT's goals. Kristen Boon provides introductory analysis of the key documents relating to the NPT generally and the 2010 NPT Review Conference in particular. The documents in this volume include the Final Declaration of the 2000 Conference, statements made by the key parties at the 2010 Conference, the Final Statement of the 2010 Conference, and related UN Security Council resolutions from 2009 and 2010. Professor Boon also includes renewed discussion of two critical past documents, the U.S. Nuclear Posture Review Report of April 6, 2010, and the U.S. National Security Strategy of May 27, 2010.
Terrorism: Documents of International and Local Control is a hardbound series that provides primary-source documents on the worldwide counter-terrorism effort. Chief among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service and the Government Accountability Office, and case law covering issues related to terrorism. Most volumes carry a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. Europe's Approach to Terrorism introduces Terrorism researchers to the realm of European Union security law. With an ever-expanding immigrant population and a rising Islamic presence within Europe, the EU's quickly developing security law demands the kind of topically organized document collection that Europe's Approach to Terrorism constitutes. A key feature of this volume is the section devoted to case law from the European Court of Justice, which has addressed the delicate legal issue of defining and categorizing philanthropic organizations as terrorist-supporting groups. This volume also features the text of European Parliament measures that regulate the flow of money to terrorist groups. Given the prominence of these questions in non-European countries as well, this volume will serve as a unique research tool for scholars and policymakers around the world.
Index V contains the cumulative index to the Terrorism: Commentary on Security Documents series from volume 121 to volume 140, and adds to earlier index volumes to ensure comprehensive searchability within the series. Five different index formats are included in this one comprehensive index volume, featuring indices by subject, title, name, and year.
Within the U.S. Army, this is a time of both excitement and challenge. As immense change takes place in the global security environment, American land power must be adapted to assure it can continue to protect and promote national interests into the 21st century. This requires the development and integration of a range of new technologies, concepts, and organizations. Among these, nonlethality --using armed force in a way that minimizes casualties-- shows promise for specialized applications. Nonlethal technology, concepts and doctrine may provide the Army a way to retain its political utility and military effectiveness in a security environment characterized by ambiguity and the glare of world public opinion. To explore this, the Army is undertaking programs and initiatives which may make it the driving force in nonlethality. This study by Steven Metz and Douglas C. Lovelace, Jr., is a contribution to this effort. In it, they place nonlethality within its larger strategic context and explain how it is related to the revolution in military affairs. They then assess the arguments for and against the integration of nonlethality into American doctrine and procedures. Finally, they offer operational concepts which could serve as the basis for doctrine and for tactics, techniques, and procedures. The Strategic Studies Institute is pleased to offer this report as a contribution to the ongoing process of refining American land power. Larry M. Wortzel Colonel, U.S. Army Director, Strategic Studies Institute
Terrorism: Documents of International and Local Control is a hardbound series that provides primary-source documents on the worldwide counter-terrorism effort. Chief among the documents collected are transcripts of Congressional testimony, reports by such federal government bodies as the Congressional Research Service and the Government Accountability Office, and case law covering issues related to terrorism. Most volumes carry a single theme, and inside each volume the documents appear within topic-based categories. The series also includes a subject index and other indices that guide the user through this complex area of the law. Volume 94 presents three viewpoints on the problem of securing U.S. borders: the U.S. government's self-assessment, the often critical judgment of independent agencies like the Government Accountability Office ("GAO") and the Congressional Research Service ("CRS"), and General Editor Douglas C. Lovelace's own critique both of the governmental pronouncements and of those GAO/CRS reports. By presenting both the text of border-related regulations and these three perspectives on those regulations' effectiveness, Lovelace provides researchers with a one-volume, comprehensive exposition of the topical issue of border security. Even more importantly, the documents and commentary in this volume will provoke policymakers and other government staff into thinking differently and creatively about the challenge of securing borders that extend for thousands of miles over often harsh terrain. For example, Lovelace and some of the included authors challenge the notion that physical barriers alone will impede the entry of terrorists. Similarly, Lovelace here encourages his readers to envision borders not just as a means to regulate crime but also as a vehicle for international cooperation between, in this case, the U.S., Mexico, and Canada. This volume is essential for any researcher seeking a current, tough-minded analysis of U.S. border security.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 143, The Evolution of the Islamic State, focuses on the U.S. response to the Islamic State (IS) both in Syria and Iraq from a foreign policy standpoint and a military strategy perspective, as well as considering the impact of the rise of IS on the broader global jihadist movement. Consideration is also given to the importance of information warfare in countering IS's worldwide recruiting efforts via the Internet. This volume also includes documents examining related issues of great importance, including a report considering IS's financing, a report on the legal issues arising in connection with U.S. military action against IS, the role of Shia warlords and militias in Iraq in opposing IS, and the lessons that can be learned from the support provided to IS by European fighters.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 144, Autonomous and Semiautonomous Weapons Systems, examines the impact of robots and autonomous and semiautonomous weapons systems on the waging of modern warfare. It considers the likely effects of emerging technological innovations in this area from both a political and strategic standpoint, in addition to considering the implications of such technologies within the context of the law of armed conflict and international humanitarian law. This volume is divided into three sections: (1) U.S. policy and approaches to the use of autonomous and semiautonomous weapons systems; (2) U.S. armed forces use of such weapons systems; and (3) potential terrorist use of such weapons systems. Official policy documents from the DoD and the U.S. Army and Air Force are complemented by reports from the Strategic Studies Institute/Army War College Press and other U.S. military sources.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 142, Security Strategies of the Second Obama Administration: 2015 Developments, examines the major national security and military strategy documents released by the Obama administration during 2015: the National Security Strategy; the National Military Strategy; the National Intelligence Strategy; and the Department of Defense Cyber Strategy. This volume is intended as a sequel to Volume 137 of this series, which considered the de facto national security strategy of the Obama administration prior to the release of these documents. It is divided into four topical sections, each of which is introduced by a commentary written by series editor Douglas C. Lovelace, Jr. In addition to the documents listed above, this volume also contains recent reports analyzing those documents, as well as a legal update on the current status of the Authorization for the Use of Military Force (AUMF) and a consideration of the War Powers Resolution.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 141, Hybrid Warfare and the Gray Zone Threat, considers the mutation of the international security environment brought on by decades of unrivaled U.S. conventional military power. The term "hybrid warfare" encompasses conventional warfare, irregular warfare, cyberwarfare, insurgency, criminality, economic blackmail, ethnic warfare, "lawfare", and the application of low-cost but effective technologies to thwart high-cost technologically advanced forces. This volume is divided into five sections covering different aspects of this topic, each of which is introduced by expert commentary written by series editor Douglas C. Lovelace, Jr. This volume contains thirteen useful documents exploring various facets of the shifting international security environment, including a detailed report on hybrid warfare issued by the Joint Special Operations University and a White Paper on special operations forces support to political warfare prepared by the U.S. Army Special Operations Command, as well as a GAO report and a CRS report covering similar topics. Specific coverage is also given to topics such as cybersecurity and cyberwarfare, the efficacy of sanctions in avoiding and deterring hybrid warfare threats, and the intersection of the military and domestic U.S. law enforcement.
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140, The Cyber Threat considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China. The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include: Legality in Cyberspace; An Adversary View and Distinguishing Acts of War in Cyberspace; and Assessment Criteria, Policy Considerations, and Response Implications.
Volume 108 of Terrorism: Commentary on Security Documents tackles the contentious issue that appears in the volume's title: "Extraordinary Rendition". Although many commentators and publications have focused on the U.S. policy of such troubling transfers, little focus has been devoted to the reaction to this policy by the rest of the world. In this volume, new General Co-Editor Aziz Huq both presents the key documents demonstrating that reaction and comments authoritatively on what those documents mean for the future of torture-based international transfers. For ease of research, Huq has divided the volume into two sections: the first deals with U.N. and E.U. responses to the U.S. policy, including a case before the U.N. Committee Against Torture, and the second section tours the reports and cases on rendition that have arisen from national jurisdictions, specifically Italy, Sweden, the U.K., ireland, and Canada.
Volume 105: Narco-Terrorism explores the legal aspects of combatting narco-terrrorism, domestically in the U.S. and through international endeavors in Colombia and Afghanistan. This book serves as a one-volume guide to the relationship between the drug trade and terrorism. The volume's sections on Afghanistan and Colombia demonstrate the challenges faced by the international legal community in thwarting that relationship.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.