z-logo
open-access-imgOpen Access
Border Defense against Infiltration and Guerilla Attacks
Author(s) -
Michael Bátrla
Publication year - 2015
Publication title -
vojenské rozhledy
Language(s) - English
Resource type - Journals
eISSN - 2336-2995
pISSN - 1210-3292
DOI - 10.3849/1210-3292.24.2015.03.102-118
Subject(s) - terrorism , citizen journalism , computer security , vulnerability (computing) , computer science , prioritization , vulnerability assessment , state (computer science) , political science , risk analysis (engineering) , business , law , process management , psychology , algorithm , psychological resilience , psychotherapist
The text deals with the use of border defense as a means of protection against guerrilla attacks and infiltration, through a combination of principles of modern stationary fortifications and forward area defense. These are discussed on the case study of the Northern Border Security Project of Saudi Arabia. The role of attacker takes quasi-state formation the Islamic State (IS, ISIS, ISIL). The aim is to analyze whether the project would endure distinctive types of asymmetric attacks. Vulnerability prioritization for each component determines the most likely targets and their characteristics. This is a subjective semi quantitative method known as CARVER matrix. Subsequently, based on established premises, the text discusses three selected scenarios that use guerrilla tactics with elements of terrorism against selected targets. Attack scenarios show some of the possible ways of improvement for the project. In conclusion, the author makes recommendations for possible adjustments and assess the potential of using the project as a protection against asymmetric attacks. After reading the text, the reader is informed about the project, its components, as well as recommendations that can be applied in the further use of this type of defense.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here