Obrana hranic proti infiltraci a guerillovým útokům: Případová studie Severního pohraničního bezpečnostního projektu Saudské Arábie

Warning

This publication doesn't include Faculty of Arts. It includes Faculty of Social Studies. Official publication website can be found on muni.cz.
Title in English Border Defense against Infiltration and Guerilla Attacks: Case Study of the Northern Border Security Project of Saudi Arabia
Authors

BÁTRLA Michael

Year of publication 2015
Type Article in Periodical
Magazine / Source Vojenské rozhledy
MU Faculty or unit

Faculty of Social Studies

Citation
web http://www.vojenskerozhledy.cz/kategorie/obrana-hranic-proti-inflaci-a-guerillovym-utokum
Doi http://dx.doi.org/10.3849/1210-3292,24.2015.03.102-118
Field Political sciences
Keywords Islamic State; study; risk evaluation; terrorism; scenarios; combat planning; asymetrical warfare; partisan warfare
Attached files
Description The text deals with the use of border defense as a means of protection against guerrilla attacks and infiltration, through a combination of principles of modern stationary fortifications and forward area defense. These are discussed on the case study of the Northern Border Security Project of Saudi Arabia. The role of attacker takes quasi-state formation the Islamic State (IS, ISIS, ISIL). The aim is to analyze whether the project would endure distinctive types of asymmetric attacks. Vulnerability prioritization for each component determines the most likely targets and their characteristics. This is a subjective semi quantitative method known as CARVER matrix. Subsequently, based on established premises, the text discusses three selected scenarios that use guerrilla tactics with elements of terrorism against selected targets. Attack scenarios show some of the possible ways of improvement for the project. In conclusion, the author makes recommendations for possible adjustments and assess the potential of using the project as a protection against asymmetric attacks. After reading the text, the reader is informed about the project, its components, as well as recommendations that can be applied in the further use of this type of defense.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.