Affiliation:
1. Department of Mathematics,United States Military Academy, West Point, NY, USA
2. United States Military Academy, West Point, NY, USA
Abstract
The United States armed forces could be considered the world’s most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors model the terrorism-counter-terrorism (T-CT) struggle with a detailed and complex mathematical model and analyze the model’s components of leadership, promotion, recruitment, resources, operational techniques, cooperation, logistics, security, intelligence, science, and psychology in the T-CT struggle, with the goal of informing today’s decision makers of the options available in counter-terrorism strategy.
Subject
Information Systems and Management,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems,Management Information Systems
Reference22 articles.
1. Allanach, J., Tu, H., Singh, S., Willett, P., & Pattipati, K. (2004). Detecting, tracking, and counteracting terrorist networks via hidden Markov models. In IEEE Aerospace Conference Proceedings, 5(1), 313-319.
2. Winning hearts and minds at home.;M.Cancian;US Naval Institute,2010
3. Counterinsurgency 3.0.;P. C.Choharis;Parameters,2010
4. Couch, J. C. (2010). Terrorism or insurgency: America’s flawed approach to the global war on terror. smallwarsjournal.com, August 3. Retrieved 20 September 2011 from http://smallwarsjournal.com/blog/journal/docs-temp/486-couch.pdf
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献