Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/779065
Title: | Asymmetric warfare and special operations used in political violence |
Authors: | Adam Leong Kok Wey |
Conference Name: | International Conference On Social Sciences And Humanities - ICOSH |
Keywords: | Militant Asymmetric warfare |
Conference Date: | 2009-12-02 |
Conference Location: | Universiti Kebangsaan Malaysia, Bangi, Selangor |
Abstract: | The recent Mubai attacks (November 2008) in India by highly trained gunmen purportedly linked with Lashkar-e-Taiba (LeT), has revealed that militant and terrorist groups are willing to audaciously use asymmetric warfare to achieve their political motives. The Mumbai attacks had demonstrated the value of asymmetric warfare used by small and underequipped groups combine with special operations strategy, would yield profound strategic impact. A small unit of 10 militants had launched a covert surprise attack that left dozens of civilians, police and military personnel dead. It took concerted and exhaustive efforts by some of India's crack commandoes to finally dislodge the attackers and destroy them. This paper looks into how asymmetric warfare is used is by these groups as a strategy to sow terror and how special operations is utilized as a tool to carry out this attacks. It is timely for such an academic study to be done on the employment of asymmetric warfare and special operations strategy by non-state/ sub-state actors that had strongly embraced these tools as a new means to an end. This new method of attack may be repeated by other groups at different countries with more terrible consequences. Therefore it is imperative that an in-depth analysis of this new method of terror attack be conducted. |
Pages: | 35 |
Call Number: | H53.M4I555 2009 n.1 sem |
URI: | https://ptsldigital.ukm.my/jspui/handle/123456789/779065 |
Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.