ABSTRACT Title of Document: ROBOTICS and the FUTURE OF

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT Title of Document: ROBOTICS and the FUTURE OF ABSTRACT Title of Document: ROBOTICS AND THE FUTURE OF INTERNATIONAL ASYMMETRIC WARFARE Nicholas Grossman, Doctor of Philosophy, 2013 Directed By: Professor George Quester, Department of Government and Politics In the post-Cold War world, the world's most powerful states have cooperated or avoided conflict with each other, easily defeated smaller state governments, engaged in protracted conflicts against insurgencies and resistance networks, and lost civilians to terrorist attacks. This dissertation explores various explanations for this pattern, proposing that some non-state networks adapt to major international transitions more quickly than bureaucratic states. Networks have taken advantage of the information technology revolution to enhance their capabilities, but states have begun to adjust, producing robotic systems with the potential to grant them an advantage in asymmetric warfare. ROBOTICS AND THE FUTURE OF ASYMMETRIC WARFARE By Nicholas Grossman Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2013 Advisory Committee: Professor George Quester, Chair Professor Paul Huth Professor Shibley Telhami Professor Piotr Swistak Professor William Nolte Professor Keith Olson © Copyright by Nicholas Grossman 2013 Dedication To Marc and Tracy Grossman, who made this all possible, and to Alyssa Prorok, who made it all worth it. ii Acknowledgements Thank you to my dissertation committee for all the advice and support, Anne Marie Clark and Cissy Roberts for making everything run smoothly, Jacob Aronson and Rabih Helou for the comments and encouragement, Alyssa Prorok for invaluable help, and especially to George Quester for years of mentorship. iii Table of Contents Dedication ..................................................................................................................... ii Acknowledgements ...................................................................................................... iii Table of Contents ......................................................................................................... iv Introduction ................................................................................................................... 1 The Future of International Asymmetric Warfare .................................................... 7 Al Qaeda's Grand Strategy ...................................................................................... 10 Nature of the Actors ................................................................................................ 11 Information Technology and Networks’ Capabilities ............................................. 15 Robotics and States’ Capabilities............................................................................ 19 Chapter Outline ....................................................................................................... 22 Chapter 1: A General Theory of Asymmetric Warfare .............................................. 26 Weak Actor Strategies in Asymmetric Conflict: Guerrilla Warfare, Insurgency, and Terrorism................................................................................................................. 28 Overcoming Material Disparity .............................................................................. 31 Non-material Asymmetries ..................................................................................... 32 Conclusion .............................................................................................................. 44 Chapter 2: Testing and Applying the Theory ............................................................. 45 Big States vs. Small States and Big States vs. Networks: Hypotheses ................... 46 Data and Research Design ...................................................................................... 48 Results ..................................................................................................................... 57 Secondary Analysis: Situational and Strategic Variation ....................................... 66 Secondary Analysis II: Explaining the Increasing Frequency of Weak Actor Success .................................................................................................................... 79 Conclusion .............................................................................................................. 95 Chapter 3: The War on Terror, Al Qaeda the Organization and Al Qaeda the Idea ... 99 The War on Terrorism .......................................................................................... 101 Al Qaeda the Organization.................................................................................... 106 Al Qaeda the Idea.................................................................................................. 112 The Global Jihadist Network ................................................................................ 118 Conclusion ............................................................................................................ 123 Chapter 4: Asymmetric Warfare and the Robotics Revolution ................................ 125 Robots and the United States Military .................................................................. 127 Robots in Combat ................................................................................................. 129 iv Robots and Information ........................................................................................ 154 Conclusion ............................................................................................................ 173 Chapter 5: Robotics and Non-State Networks .......................................................... 174 Acquiring Military Robots .................................................................................... 175 Adapting Commercially Available Robots ........................................................... 184 Hacking Unmanned Systems ................................................................................ 199 Conclusion: Robots and the Precedent of Computers........................................... 202 Chapter 6: Robots and Strong Actor Strategy against Localized Insurgencies: Pursuing Information Dominance ............................................................................. 207 Network-Centric Warfare ..................................................................................... 209 Red Force Tracking............................................................................................... 212 Building the Smart SWARM ................................................................................ 216 Countering Weak Actor Robots ............................................................................ 223 The Smart SWARM, Robots, and Military Strategy (Keeping Humans in the Loop) ............................................................................................................................... 226 Conclusion ............................................................................................................ 230 Chapter 7: Robotics and Strong Actor Strategy in Irredentist Conflicts: Defending Israeli Civilians ......................................................................................................... 232 Hezbollah .............................................................................................................. 234 Hamas and other Palestinian Organizations ......................................................... 236 Using Robotics to Enhance Israel's Military Capabilities in Asymmetric Combat ............................................................................................................................... 247 Conclusion: Using Iron Dome to Emphasize Defense ......................................... 262 Conclusion ................................................................................................................ 267 War of Ideas .......................................................................................................... 268 The Future of Asymmetric Warfare ...................................................................... 273 Drone Attacks ....................................................................................................... 270 Appendix ................................................................................................................... 273 Bibliography ............................................................................................................. 277 v Introduction They said September 11th changed the world, but they didn't say for how long. When al Qaeda operatives flew passenger jets into the Twin Towers and the Pentagon, scholars and strategists proclaimed an era of asymmetric warfare, with security threatened by shadowy networks and rogue states, rather than symmetric Great Power armies. Walter Laqueur, of the Center for Strategic and International Studies, confidently predicted in 2003 that “terrorism is bound to remain high on the list of our priorities;”1 while Israeli scholar Martin van Creveld implored the “developed world” to “shake off its lethargy” and recognize “insurgency, guerrilla warfare, and terrorism, possibly, one day, armed with weapons of mass destruction” as its primary security concern.2 This followed a series of predictions from RAND scholars John
Recommended publications
  • Integration of Mobile Technology Into Museum Education: a Discussion of the State of the Art Mark P
    Seton Hall University eRepository @ Seton Hall Theses Spring 5-2011 Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art Mark P. Diemer Seton Hall University Follow this and additional works at: https://scholarship.shu.edu/theses Recommended Citation Diemer, Mark P., "Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art" (2011). Theses. 26. https://scholarship.shu.edu/theses/26 INTEGRATION OF MOBILE TECHNOLOGY Il INTO MUSEUM EDUCATION: A DISCUSSION 1 OF THE STATE OF THE ART i 1 I by I Mark P. Diemer I A thesis submitted in partial fulfillment of the requirements for the degree of I Master of Arts in Museum Professions j I I Seton Hall University May 2011 I I ! 1 i I I I Copy © Mark P. Diemer, 2011. All Rights Reserved. I No part of this document may be reproduced in any form without written permission of the author. Copyrights to images are owned by other copyright holders and should not be reproduced under any circumstances. TIlls document as shown is not for publication and was produced in satisfaction of thesis I requirements. I I I I ,! } ! l I; Seton Hall University Abstract Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art by Mark P. Diemer 'lnesi" Advisor: Dr. Petra Chu Museum Professions Program Approval: This thesis is an attempt to examine the current state of mobile technology use in museum education programs. Mobile technology is fast becoming the communications and learning medium of choice.
    [Show full text]
  • The Rise of the Islamic Movement in Sudan 1945-1989
    THE RISE OF THE ISLAMIC MOVEMENT IN SUDAN 1945-1989 Except where reference is made to the work of others, the work described in this dissertation is my own or was done in collaboration with my advisory committee. This dissertation does not include proprietary or classified information. ______________________________________ Mustafa A. Abdelwahid Certificate of Approval: ________________________________ ________________________________ James A. Nathan Jill Crystal, Chair Professor Professor Political Science Political Science _______________________________ _______________________________ Lee A. Farrow Linda Dennard Associate Professor Associate Professor History Political Science and Public Administration ______________________________________ Joe F. Pittman Interim Dean Graduate School THE RISE OF THE ISLAMIC MOVEMENT IN SUDAN 1945-1989 Mustafa A. Abdelwahid A Dissertation Submitted to the Graduate Faculty of Auburn University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Auburn, AL May 10, 2008 THE RISE OF THE ISLAMIC MOVEMENT IN SUDAN 1945-1989 Mustafa A. Abdelwahid Permission is granted to Auburn University to make copies of this dissertation at its discretion, upon request of individuals or institutions and at their expense. The author reserves all publication rights. ________________________________ Signature of Author ________________________________ Date of Graduation iii DISSERTATION ABSTRACT THE RISE OF THE ISLAMIC MOVEMNET IN SUDAN 1945-1989 Mustafa A. Abdelwahid Doctor of Philosophy, May 10, 2008 (M.L.I.S., University of Wisconsin at Milwaukee, 2003) (B.A., University of North Carolina at Greensboro, 2000) (L.L.M., Baku State University, 1993) 262 Typed Pages Directed by Jill Crystal Using a wider theoretical framework and recognizing the gaps that exist in studying political Islam, this study utilized Social Movement Theory (SMT) in examining the rise of the Islamic Movement in Sudan (1945-1989).
    [Show full text]
  • Growth of the Internet
    Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] Preliminary version, July 6, 2001 Abstract The Internet is the main cause of the recent explosion of activity in optical fiber telecommunica- tions. The high growth rates observed on the Internet, and the popular perception that growth rates were even higher, led to an upsurge in research, development, and investment in telecommunications. The telecom crash of 2000 occurred when investors realized that transmission capacity in place and under construction greatly exceeded actual traffic demand. This chapter discusses the growth of the Internet and compares it with that of other communication services. Internet traffic is growing, approximately doubling each year. There are reasonable arguments that it will continue to grow at this rate for the rest of this decade. If this happens, then in a few years, we may have a rough balance between supply and demand. Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] 1. Introduction Optical fiber communications was initially developed for the voice phone system. The feverish level of activity that we have experienced since the late 1990s, though, was caused primarily by the rapidly rising demand for Internet connectivity. The Internet has been growing at unprecedented rates. Moreover, because it is versatile and penetrates deeply into the economy, it is affecting all of society, and therefore has attracted inordinate amounts of public attention. The aim of this chapter is to summarize the current state of knowledge about the growth rates of the Internet, with special attention paid to the implications for fiber optic transmission.
    [Show full text]
  • 9-11 Commission Hrng 4 13 04 2
    PANEL ONE OF THE TENTH HEARING OF THE NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES RE: "LAW ENFORCEMENT AND THE INTELLIGENCE COMMUNITY" THOMAS H. KEAN, CHAIR; LEE H. HAMILTON, VICE CHAIR PHILIP D. ZELIKOW PRESENTS STAFF STATEMENT: "LAW ENFORCEMENT, COUNTERTERRORISM, AND INTELLIGENCE COLLECTION IN THE UNITED STATES PRIOR TO 9/11" WITNESS: LOUIS J. FREEH, FORMER DIRECTOR OF THE FBI 9:01 A.M. EDT, TUESDAY, APRIL 13, 2004 MR. KEAN: (Sounds gavel.) Good morning. As chair of the National Commission on Terrorist Attacks on the United States, I hereby convene this commission's 10th public hearing. The hearing will run all today and tomorrow. Our focus for the next two days will be "Law Enforcement and the Intelligence Community." As we did with our two prior sets of hearings this calendar year, we precede each series of witnesses with a statement from the Commission staff. These statements are informed by the work of the Commissioners, as well as the staff, and they represent the staff's best efforts to reconstruct the factual record of what happened. Judgments and recommendations are for commissioners and the Commission to make, and of course we'll do that in the course of our work, and most definitively and finally in our final report. Viewers, by the way, who are watching at home can obtain staff statements at www.9-11commission.gov. Before we begin, let me make just a brief request to members of the audience who have taken the time to be with us today. We're going to be hearing from a lot of witnesses in the course of the next two days.
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Policing Terrorism
    Policing Terrorism A Review of the Evidence Darren Thiel Policing Terrorism A Review of the Evidence Darren Thiel Policing Terrorism A Review of the Evidence Darren Thiel © 2009: The Police Foundation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, without the prior permission of The Police Foundation. Any opinions, findings and conclusions or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the Police Foundation. Enquires concerning reproduction should be sent to The Police Foundation at the address below. ISBN: 0 947692 49 5 The Police Foundation First Floor Park Place 12 Lawn Lane London SW8 1UD Tel: 020 7582 3744 www.police-foundation.org.uk Acknowledgements This Review is indebted to the Barrow Cadbury Trust which provided the grant enabling the work to be conducted. The author also wishes to thank the academics, researchers, critics, police officers, security service officials, and civil servants who helped formulate the initial direction and content of this Review, and the staff at the Police Foundation for their help and support throughout. Thanks also to Tahir Abbas, David Bayley, Robert Beckley, Craig Denholm, Martin Innes and Bob Lambert for their insightful, constructive and supportive comments on various drafts of the Review. Any mistakes or inaccuracies are, of course, the author’s own. Darren Thiel, February 2009 Contents PAGE Executive Summary 1 Introduction 5 Chapter
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • AMERICA's CHALLENGE: Domestic Security, Civil Liberties, and National Unity After September 11
    t I l AlLY r .... )k.fl ~FS A Ot:l ) lO~Ol R.. Muzaffar A. Chishti Doris Meissner Demetrios G. Papademetriou Jay Peterzell Michael J. Wishnie Stephen W. Yale-Loehr • M I GRAT i o~]~In AMERICA'S CHALLENGE: Domestic Security, Civil Liberties, and National Unity after September 11 .. AUTHORS Muzaffar A. Chishti Doris Meissner Demetrios G. Papademetriou Jay Peterzell Michael J. Wishnie Stephen W . Yale-Loehr MPI gratefully acknowledges the assistance of Cleary, Gottlieb, Steen & Hamilton in the preparation of this report. Copyright © 2003 Migration Policy Institute All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without prior permission in writing from the Migration Policy Institute. Migration Policy Institute Tel: 202-266-1940 1400 16th Street, NW, Suite 300 Fax:202-266-1900 Washington, DC 20036 USA www.migrationpolicy.org Printed in the United States of America Interior design by Creative Media Group at Corporate Press. Text set in Adobe Caslon Regular. "The very qualities that bring immigrants and refugees to this country in the thousands every day, made us vulnerable to the attack of September 11, but those are also the qualities that will make us victorious and unvanquished in the end." U.S. Solicitor General Theodore Olson Speech to the Federalist Society, Nov. 16, 2001. Mr. Olson's wife Barbara was one of the airplane passengers murdered on September 11. America's Challenge: Domestic Security, Civil Liberties, and National Unity After September 1 1 Table of Contents Foreword
    [Show full text]
  • Islamic Radicalization in the Uk: Index of Radicalization
    ISLAMIC RADICALIZATION IN THE UK: INDEX OF RADICALIZATION Anna Wojtowicz, (Research Assistant, ICT) Sumer 2012 ABSTRACT The purpose of this paper is to analyze the process of radicalization amongst British Muslims in the United Kingdom. It begins with a review of the Muslim population, demographics and community structure. Further presenting several internal and external indicators that influenced and led to radicalization of Muslim youth in Britain. The paper concludes that there is no one certainty for what causes radicalization amongst Muslims in United Kingdom. However, it is certain that Islamic radicalization and the emergence of a homegrown threat is a growing trend that jeopardizes the countries security, peace and stability. Radicalization in the United Kingdom is an existing concern that needs to be addressed and acted upon immediately. Misunderstanding or underestimating the threat may lead to further and long term consequences. * The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 I. Introduction 4 II. Background 5 History of the Muslim Community in the United Kingdom 5 Population 7 Geographical Concentration of Muslims 8 Ethnic Background 10 Age Estimate 11 Occupation and Socio-Economic Conditions 11 Religious and Cultural Aspects 13 Multiculturalism 17 Islamophobia 20 Converts 21 Case Studies –London, Birmingham, Bradford, Leeds, Leicester 22 III. Organizations 28 Organizations within the United Kingdom 28 Mosques, Koranic Schools and Islamic Centers 34 Student Groups 40 Islamic Websites and TV 43 IV. Radicalization in Britain 43 Theoretical Background and Causes of Radicalization 43 Recruitment and Radicalization: Overlook 47 Radicalization Process 49 Forms of Financing 51 Radical Groups and Movements in the UK 53 Influential Leaders in the UK 60 Inspiration and Influence from Abroad 67 Sunni 67 Shia 70 3 V.
    [Show full text]
  • The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges
    The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Editor Dr. Mohammed Abu Rumman The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Editor Dr. Mohammed Abu Rumman 1 The Hashemite Kingdom Of Jordan The Deposit Number at The National Library (2018/2/529) 277 AbuRumman, Mohammad Suliman The Prospects Of Political Islam In A Troubled Region / Moham- mad Suliman Abu Rumman; Translated by William Joseph Ward. – Am- man: Friedrich Ebert Stiftung, 2018 (178) p. Deposit No.: 2018/2/529 Descriptors: /Politics//Islam/ يتحمل المؤلف كامل المسؤولية القانونية عن محتوى مصنفه وﻻ ّيعبر هذا المصنف عن رأي دائرة المكتبة الوطنية أو أي جهة حكومية أخرى. Published in 2018 by Friedrich-Ebert-Stiftung Jordan & Iraq FES Jordan & Iraq P.O. Box 941876 Amman 11194 Jordan Email: [email protected] Website:www.fes-jordan.org Not for sale © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original author. They do not necessarily represent those of the Friedrich-Ebert-Stiftung or the editor. Translation: William Joseph Ward Cover and Lay-out: Mua’th Al Saied Printing: Economic Press ISBN: 978-9957-484-80-4 2 The Prospects of Political Islam in a Troubled Region Islamists and Post-Arab Spring Challenges Contributed Authors Dr. Mohammed Abu Rumman Dr. Khalil Anani Dr. Neven Bondokji Hassan Abu Hanieh Dr.
    [Show full text]
  • Intelligence Power and Prevention After 9/11: the Role of Intelligence in Facilitating and Legitimising Controlling Security Strategies O F the UK, US and UN
    Intelligence Power and Prevention after 9/11: The Role of Intelligence in Facilitating and Legitimising Controlling Security Strategies o f the UK, US and UN Chris Mackmurdo London School of Economics PhD in International Relations 2007 1 UMI Number: U501B72 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U501372 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 ^sses p- British itxary o* Politico' mg EcanoiPic, bs. I declare that the work presented in this thesis is my own. Word-count: 96,403 Chris M ackmurdo ................................................................... 2 To Mum, Dad and Erin & In loving memory of Mormor, Grandma, Bob and Corrie 3 ACKNOWLEDGEMENTS This thesis was funded by the Economic and Social Research Council. I am indebted to: Dr. Bruce Jones and Dr. Shep Forman at the Centre on International Co-operation at New York University; Mark Hoffman; Prof. Michael Cox; Prof. James Gow; Michael Herman; Andres Salazar; Axel Wennmann; Kristina Segulja; and, Teresa Whitfield; and all the members of the UK and US intelligence communities who were willing to talk to me.
    [Show full text]
  • Kuwait 29Jan10
    COUNTRY OF ORIGIN INFORMATION REPORT KUWAIT 29 JANUARY 2010 UK Border Agency COUNTRY OF ORIGIN INFORMATION SERVICE Contents Preface Latest News EVENTS IN KUWAIT , FROM 25 DECEMBER 2009 TO 29 JANUARY 2010 REPORTS ON KUWAIT PUBLISHED OR ACCESSED BETWEEN 25 DECEMBER 2009 AND 29 JANUARY 2010 Paragraphs Background Information 1. GEOGRAPHY ....................................................................................... 1.01 Map .............................................................................................. 1.04 2. ECONOMY ........................................................................................... 2.01 3. HISTORY ............................................................................................. 3.01 4. RECENT DEVELOPMENTS (M ARCH -DECEMBER 2009) ............................ 4.01 5. CONSTITUTION .................................................................................... 5.01 6. POLITICAL SYSTEM .............................................................................. 6.01 Human Rights 7. INTRODUCTION .................................................................................... 7.01 8. SECURITY SITUATION ........................................................................... 8.01 9. SECURITY FORCES ............................................................................... 9.01 Police........................................................................................... 9.02 Arbitrary arrest and detention................................................... 9.03 Torture
    [Show full text]