Think! Evidence

Multi-Layered Defense and Initiated Attack in Defending the Homeland

Show simple item record

dc.creator Uzi Eilam
dc.date 2012-09-01T00:00:00Z
dc.date.accessioned 2015-07-20T20:09:30Z
dc.date.available 2015-07-20T20:09:30Z
dc.identifier 2307-793X
dc.identifier 2307-8634
dc.identifier https://doaj.org/article/3a1497a0570b41a096cbe871a69a2a48
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/9050
dc.identifier.uri https://doaj.org/article/3a1497a0570b41a096cbe871a69a2a48
dc.description The end of the twentieth century witnessed a dramatic transformation of the battlefield, and classical warfare between armies and states became relatively rare. Warfare on the modern battlefield is usually asymmetrical, fought between a state and a non-state enemy, or between two nonstate entities. Armed groups target civilians in order to change a state’s modus operandi and policies. This type of warfare is commonly known as terrorism. The shock of the 9/11 attacks in the United States, and subsequent attacks in Europe, Iraq, and many other places around the world have thrust the world into a new reality. The threat of explosive devices and suicide attacks has been joined by the threat of rockets and missiles and the threat of cyberspace warfare. This new reality demands an improved response to the complex and dynamic threats of terrorism, specifically, a comprehensive approach and the investment of significant resources that can generate an effective response. If indeed the world is engaged in a global war on terrorism, what is the optimal way to defend against it? Should the response be focused on defensive aspects or should offensive ones augment defensive measures? Who are the enemies and where is the battle zone? This essay examines these questions from an historical perspective in order to draw conclusions and attempt to formulate some insights about the right strategy and most effective tactics involving technology as a critical component in the response to this type of warfare.
dc.language English
dc.publisher Institute for National Security Studies
dc.relation http://d26e8pvoto2x3r.cloudfront.net/uploadimages/systemfiles/masa4-2eng%204%20(2)_eilam.pdf
dc.relation https://doaj.org/toc/2307-793X
dc.relation https://doaj.org/toc/2307-8634
dc.rights CC BY
dc.source Military and Strategic Affairs, Vol 4, Iss 2, Pp 37-48 (2012)
dc.subject terrorism
dc.subject tactics
dc.subject warfare
dc.subject technology
dc.subject weapons
dc.subject defense
dc.subject offensive
dc.subject budget
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.title Multi-Layered Defense and Initiated Attack in Defending the Homeland
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account