ARTICLES - The Prospects of the Shia Insurgency Movement in Iraq
In: The journal of conflict studies: journal of the Centre for Conflict Studies, University of New Brunswick, Volume 20, Issue 2, p. 44-67
ISSN: 1198-8614
58 results
Sort by:
In: The journal of conflict studies: journal of the Centre for Conflict Studies, University of New Brunswick, Volume 20, Issue 2, p. 44-67
ISSN: 1198-8614
In: Comparative strategy, Volume 17, Issue 4, p. 363-380
ISSN: 1521-0448
In: Small wars & insurgencies, Volume 9, Issue 2, p. 114-133
ISSN: 1743-9558
In: Comparative strategy, Volume 17, Issue 4, p. 363-380
ISSN: 0149-5933
World Affairs Online
In: Comparative strategy, Volume 17, p. 363-380
ISSN: 0149-5933
Examines tactical and strategic elements in decision to end the 1991 Persian Gulf war; view that emphasis on multilateral operations in terms of military issues and political desires of the US and its coalition partners determined the outcome. Covers tactically based rationale, political aspects, strategic imperatives, and moral arguments.
In: Small wars & insurgencies, Volume 9, Issue 2, p. 114-133
ISSN: 0959-2318
In: The Routledge Handbook of Insurgency and Counterinsurgency
The author examines the role of pseudo operations in several foreign counterinsurgency campaigns. Pseudo operations are those in which government forces disguised as guerrillas, normally along with guerrilla defectors, operate as teams to infiltrate insurgent areas. This technique has been used by the security forces of several other countries in their operations, and typically it has been very successful. A number of factors must be taken into account before attempting pseudo operations, especially their role in the intelligence and operational systems. Although it is likely that most insurgent movements have become more sophisticated, many of the lessons learned from previous pseudo operations suggest their continued usefulness in counterinsurgency campaigns. ; https://press.armywarcollege.edu/monographs/1747/thumbnail.jpg
BASE
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue of how to identify and derail a host of violent groups remains of considerable interest. This comprehensive volume offers an examination of the effectiveness of contemporary counterinsurgency efforts, revealing which approaches offer the greatest chances of success internally, regionally, and internationally. Featuring perspectives from experts and analysts in the field of irregular warfare and international security, this is an unparalleled explora
In: Praeger Security International
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue of how to identify and derail a host of violent groups remains of considerable interest. This comprehensive volume offers an examination of the effectiveness of contemporary counterinsurgency efforts, revealing which approaches offer the greatest chances of success internally, regionally, and internationally. Featuring perspectives from experts and analysts in the field of irregular warfare and international security, this is an unparalleled explora.
World Affairs Online
"Pseudo operations are those in which government forces disguised as guerrillas, normally along with guerrilla defectors, operate as teams to infiltrate insurgent areas. This technique has been used by the security forces of several other countries in their operations, and typically it has been very successful. ; "June 2005." ; Includes bibliographical references (p. 27-31). ; The Huk insurrection -- Malaya -- Kenya and the Mau Mau -- The French experience -- Rhodesia and the Selous Scouts -- Other pseudo operations -- Issues raised by pseudo-guerrillas -- Lessons learned -- Conclusions. ; "Pseudo operations are those in which government forces disguised as guerrillas, normally along with guerrilla defectors, operate as teams to infiltrate insurgent areas. This technique has been used by the security forces of several other countries in their operations, and typically it has been very successful. ; Mode of access: Internet.
BASE
The larger context -- Tools for assessment: level 1 and level 2 -- The Democratic Republic of Congo case -- The Guinea-Bissau case -- The case of Guinea -- The case of Mali -- The Togo case -- The Nigeria case -- The Kenya case -- The case of Ethiopia -- The case of Chad -- The Tunisia case -- Synthesis
World Affairs Online