By James Bonomo, Giacomo Bergamo, Dave Frelinger, John Gordon, Brian A. Jackson

Examines how terrorists make know-how offerings and the way the us can discourage terrorists' use of complicated traditional guns. Concludes that the U.S. should still urgently begin discussions with key manufacturer international locations and likewise choose an structure had to impose technical controls on new mortar platforms that are meant to input improvement quickly.

Show description

Read Online or Download Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons PDF

Similar intelligence & espionage books

US Elite Forces – Vietnam

Книга US Elite Forces - Vietnam US Elite Forces - Vietnam Книги Вооружение Автор: Leroy Thompson Год издания: 1985 Формат: pdf Издат. :SquadronSignal courses, inc. Страниц: fifty one Размер: eighty Язык: Английский0 (голосов: zero) Оценка:Книга описываетвнешний вид, униформу, образцы оружия, которым пользовались подразделения специального назначения США во Вьетнаме.

Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation (Scarecrow Professional Intelligence Education)

Partially Cloudy: Ethics in struggle, Espionage, Covert activities, and Interrogation explores a couple of wrenching moral concerns and demanding situations confronted by means of our army and intelligence group of workers. David L. Perry presents a strong and functional method of examining moral concerns in struggle and intelligence operations and applies cautious reasoning to problems with very important significance this present day, resembling the query of torture in interrogating detainees, making use of espionage to penetrate adverse regimes and terrorist cells, mounting covert motion to undermine their strength, utilizing discrimination and proportionality in army operations, heading off atrocities in wrestle and counterinsurgency, and cultivating ethical knowledge.

Sniper Rifles: From the 19th to the 21st Century (Osprey Weapon)

A technical define of the historical past of the sniper rifle, from its advent in struggle in the course of the Napoleonic wars, in the course of the US Civil warfare to its present apogee because the most often used strive against rifle in Iraq and Afghanistan. This booklet information the advance of ammunition, diversified guns kinds together with unmarried shot, journal loading and semi-automatic, in addition to the advent and use of optical attractions.

United States of Jihad: Investigating America’s Homegrown Terrorists

A riveting, panoramic examine “homegrown” Islamist terrorism from Sept. 11 to the current   in view that September 11, greater than 300 Americans—born and raised in Minnesota, Alabama, New Jersey, and elsewhere—have been indicted or convicted of terrorism fees. a few have taken the struggle out of the country: an American used to be between those that deliberate the assaults in Mumbai, and greater than 80 U.

Extra resources for Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

Example text

In use for almost 100 years, today’s limpet mines include sophisticated antitamper devices to hinder their removal. • Advanced land mines. Whereas in the past, land mines were “dumb” systems that were buried in the ground, today’s advanced mines—usually emplaced above ground—have sensors and can attack targets from several tens of meters distance. • Night-vision devices. Although not a weapon per se, modern nightvision devices provide significant tactical advantages to small units operating in darkness.

The analysis considers both procedural controls, such as those established internationally under the Wassenaar Arrangement,5 and technical controls that might limit the functionality of a weapon that had been diverted from legitimate sources. Technical controls would exploit the growing use of electronics in most new weapons. Such limitations seem most plausible when the weapon system inherently relies upon a satellite navigation system —most commonly, the Global Positioning System (GPS),6 but potentially the similar Russian or European systems.

This assessment, which is presented in Chapter Three, included two elements: 1. The assessment first investigated potential terrorist attack scenarios and the value of new weapons in those scenarios to explore the benefits of particular weapons to terrorists. Some of these attacks can be described briefly, since they are simple variations on current terrorist capabilities—for example, assassinating a political figure by using an improved sniper rifle. Others are unfamiliar and therefore require a longer description.

Download PDF sample

Rated 4.56 of 5 – based on 31 votes