STATISTICAL CHALLENGES IN PEACE AND NATIONAL SECURITY STUDIES IN THE PHILIPPINES
|
|
|
- Myron Cain
- 9 years ago
- Views:
Transcription
1 12 th National Convention on Statistics (NCS) EDSA Shangri-La Hotel, Mandaluyong City October 1-2, 2013 STATISTICAL CHALLENGES IN PEACE AND NATIONAL SECURITY STUDIES IN THE PHILIPPINES by Rommel C. Banlaoi For additional information, please contact: Author s name : Prof. Rommel C. Banlaoi Designation : Chairman of the Board and Executive Director Affiliation : Philippine Institute for Peace Violence and Terrorism Research Address : NICA Compund, 5 V Luna Road, cor. East Avenue, Diliman, Quezon City Tel. no. : [email protected]
2 STATISTICAL CHALLENGES IN PEACE RESEARCH AND NATIONAL SECURITY STUDIES IN THE PHILIPPINES by Rommel C. Banlaoi* ABSTRACT Statisticians working in the area of peace, armed conflict, defense, security, and counter-terrorism are faced with the formidable challenge of generating accurate and reliable statistical data that are essential for public policy making. There are exemplary practices abroad on how to overcome this challenge. In the United States, for example, the American Statistical Association has established a Section on Statistics in Defense and National Security to assist statisticians in the advancement of knowledge in defense and national security by fostering wider and more effective use of statistical techniques, promoting the statistical profession and statistical best practices within the defense and national security governmental and affiliated organizations, encouraging professional review of statistical methods and statistical activities carried out in support of national security. This paper aims to present these exemplary practices to provide lessons for Filipino statisticians on how to overcome some challenges in generating policy relevant statistics in peace and national security in the Philippines. INTRODUCTION Providing accurate and reliable statistical information on peace and national security related issues in the Philippines is a gigantic task not only to scholars and analysts who provide such information. It also a gargantuan challenge to public officials and policy makers who use the said information for peace building, conflict management and national security strategy formulation. The information gathering process requires not only skills in statistical methods. It also demands a nuanced comprehensive understanding of the multifaceted contexts and multiple players that enormously affect peace, conflict and national security situation in the country. The use of statistics is indeed essential for policymaking and implementation as it presents complex data in numerical, tabular, graphic and diagrammatic forms that are seemingly easy and simple to comprehend by decision-makers and the public at large. But in the study of society confronted by complex peace issues, armed challenges and security threats, simplified numbers provided by statistics do not always count. Quantitative data offered by statistics have to be complimented by qualitative data generated through critical reflection, political discourse and social interpretation. Robert Cox, a Canadian political scientist and international relations thinker, once said, A theory is always for someone and for some purpose. 1 It can also be said that *The author is the Chairman of the Board and Executive Director of the Philippine Institute for Peace, Violence and Terrorism Research (PIPVTR) and Head of its Center for Intelligence and National Security Studies (CINSS). A former professor of Political Science and International Relations at the National Defense College of the Philippines (NDCP) from , he currently teaches at the Department of International Studies, Miriam College. 1 Robert Cox, Production, Power and World Order: Social Forces in the Making of History (New York: Columbia University Press, 1987). Page 1 of 18
3 statistics are always for someone and for some purpose. Who benefits from statistical information and who generates them is a serious query in a society distressed by internal armed conflicts, peace-building challenges and national security problems. This paper identifies some statistical challenges in peace research and national security studies in the Philippines. The paper also presents some statistical approaches on how to overcome these challenges by learning available lessons from exemplary practices abroad. The paper concludes with the assertion that numbers presented in statistics do not always count. Statistical information, to be socially responsible, must be complimented by critical reflection, political discourse and social intepretation. THE STATE OF STATISTICS ON PEACE RESEARCH AND NATIONAL SECURITY STUDIES IN THE PHILIPPINES In the area of peace research and national security studies, statistical data are often generated by government sources. One official source that provides authoritative statistical information on the subject matter is the Internal Peace and Security Plan (IPSP) of the Armed Forces of the Philippines (AFP). Otherwise known as The Oplan Bayanihan publicly released in 2010, the document offers important official statistical information on internal peace and security threats confronting the Philippines, particularly on Ideology-Based Armed Threat Groups (IBATGs), Terrorist Groups (TGs), and Auxiliary Threat Groups (ATGs). The IPSP regards the New People s Army (NPA), the Moro Islamic Liberation Front (MILF), and the rogue elements of the Moro National Liberation Front (MNLF) as IBATGs. As of 2010, the IPSP states that that the NPA has 5,000 fighters and firearms influencing around 2.4% of the total barangays nationwide. 2 The MILF, on the other hand, has 10,500 members covering 18% of the total 9,962 barangays in Mindanao. Finally, rouge MNLF has 650 members affecting 23 barangays in Zamboanga, Basilan and Sulu provinces. Based on these statistical information, the total number of IBATGs can be 16,150 armed individuals all over the country. From other official statistical sources, the Communist Party of the Philippines (CPP)/National Democratic Front (NDF)/NPA, collectively known in the military as CNN, has a strength of 4,179 members in Through its current counter-insurgency efforts, the military aims to decrease the membership of CNN to 3,739 in 2016 as shown in Figure 1. 2 General Headquarters of the AFP, Internal Peace and Security Plan, Bayanihan (Quezon City: Armed Forces of the Philippines Headquarters, 2010), pp Page 2 of 18
4 Figure % CNN Manpower AFP IPSP Tgt goal Source: Armed Forces of the Philippines, March During the first semester of 2013, the Philippine Army estimated the armed strength of the NPA to be less than 4,000. But the Joint Foreign Chambers and Commerce in the Philippines has estimated the total armed strength of NPA to be at least 10,000 during the same year. 3 The Philippine Institute for Peace, Violence and Terrorism Research (PIPVTR) has estimated the armed strength of NPA to be 18,000 as of May 2013 based on a 12% annual increase in their membership since Apparently, official statistical data are not consistent with non-government data on the strength of the NPA. These conflicting statistical reports have tremendous bearing on peace-building and conflict management. Based on government statistics, half of the total NPA strength is believed to be deployed in Mindanao, particularly in the Eastern side covering the provinces of Agusan del Sur, Agusan del Norte, Bukidon, Davao del Sur, Campostela Valley, Davao del Norte, Surigao del Sur, Surigao del Norte, and North Cotabato. The huge deployment of police and military troops to conflict-affected areas of Mindanao is based on this statistical information. As shown in Figure 2, the 10 th Infantry Division of the Philippine Army said the Southern Mindanao has become the epicenter of NPA activities in the entire island of Mindanao with 14 out of 25 reported NPA guerrilla fronts located in three Davao provinces and Compostela Valley. 5 3 Joint Foreign Chambers and Commerce. Security. Arangkada Philippines 2010: A Business Perspective (Makati City: Joint Foreign Chambers and Commerce, December 2010), pp Rodolfo B. Mendoza, Jr., Current Situation and Latest Assessment of the Philippine Armed Communist Movement (Presented during the public symposium entitled, "The Current State of Armed Communist Movement in the Philippines: Prospects for Peace and Implications for Tourism" held at the Asian Institute of Tourism on May 9, 2013). 5 Southern Mindanao is NPA s New Epicenter, Philippine Daily Inquirer (9 October 2011). Page 3 of 18
5 Figure 2 Source: The Philippine Army, June 2013 Past official statistical data from 1977 to 2008 indicated that the communist movement had its peak in 1986 with a membership of 25,000. Its membership started to decline in 1987 with a lowest membership recorded in 1995 with 6,020 followers. It rose to 11,930 members in In 2012, the CNN membership started to decline again until it reached a membership of 5,761 in 2008 (Figure 3). Page 4 of 18
6 Figure 3 Strength of the Communist Terrorist Movement ,000 25,000 20,000 MANPOWER 22,500 25,200 23,060 18,640 15,000 14,360 14,800 11,930 10,000 5,000 5,600 7,750 10,620 8,350 9,260 6,800 6,020 7,467 7,160 5, , Source: Office of the Deputy Chief of Staff for Intelligence, On the MILF, past statistical data indicated that out of 11,600 members in 2010, 30% were considered lawless elements of the MILF (Figure 4). These lawless elements are not believed to be associated with the Bangsamoro Islamic Freedom Fighters (BIFF) of Commander Ameril Umbra Kato who used to be the Commander of the 105 th Base Command of the MILF. However, based on the MILF source, their armed strength can reach at least 100,000 combatants, not to mention their affected and influenced communities that are also armed. Those armed communities also provide moral and material support to the BIFF. Unfortunately, there has been no reliable data than provide an accurate picture of the number of armed communities in Mindanao. But the estimate on loose firearms in the Philippines gives an idea of the armed situation in the area. The PNP says that as of May 2013, the loose firearms in the country were around 400,000. But other sources find this estimate conservative arguing that loose firearms in the country can reach at least 1,000, The number of firearms displayed by the BIFF during their launching ceremony in 2010 provides an idea on the seriously of the problem of loose firearms in Mindanao. 6 See Jennifer Santiago Oreta, etl. al., Gun Proliferation and Violence: Complicating Conflict Dynamics and Peace Building (Quezon City: Ateneo De Manila University, Department of Political Science, 2012). Page 5 of 18
7 Figure 4 Source: Office of the Deputy Chief of Staff for Intelligence, The IPSP failed to cover the BIFF as the group was only founded in December 2010 when Kato officially left the MILF. On 26 February 2011, Kato renamed the BIFF as BIFM during its First General Assembly owing to its increasing mass base. 7 Philippine law enforcement authorities have suspected the BIFF to be responsible for the recent series of bombings in Mindanao. According to Abu Misrry Mama, a former MILF commander and now the BIFM Spokesperson, the movement has almost 10,000 mass membership based largely in Central Mindanao. The armed-wing of BIFM is the BIFF with 4,815 assorted arms in its local arsenal. But Mama admitted that the only armed individuals of the BIFM were only 1,500 distributed among the four military divisions of the BIFF. Each military division has around 2,000 followers but only individuals are actually armed. Mama claims that almost all members of the families of BIFM followers have their personal arms, so the armed potential of the BIFM should not be underestimated. 8 On TGs, the IPSP identifies the Abu Sayyaf Group (ASG) and the Jemaah Islamiyah (JI)/Foreign Terrorist Organizations (FTOs) under this category. The IPSP says that the ASG has 400 members and 300 firearms as of Statistical data 7 Author s interview with BIFM Spokesman Abu Missry Mama on 15 December Ibid. Page 6 of 18
8 obtained from 2000 to 2008 indicated that the ASG membership experienced a sharp decline from 1,270 followers in 2000 to 460 followers in Since then, ASG membership fluctuated until reached a membership of 400 in 2008 (Figure 5). Figure 5 Source: Office of the Deputy Chief of Staff for Intelligence, During the first semester of 2013, the Philippine government says that the ASG membership has declined to around 300 armed followers. Thus, the ASG is only a very miniscule armed group. But the small number of the ASG members does not really count. The ASG threat looms large because it wields tremendous strength from its superb ability to network with countless armed groups in Mindanao engaged in various criminal, terrorist, insurgent and even partisan political activities. These armed groups serve as force multipliers of the ASG. Strictly speaking therefore, the armed strength of the ASG can be more than 300 armed followers. ASG s connection with JI also contributes to its current strength and resilience. According to IPSP, JI has 28 fighters while FTOs have 50 followers who have connections with Al-Qaeda. In October 2012, the PNP reported that almost 30 foreign terrorist personalities are associated with JI. Armed groups associated with the ASG, MILF and even MNLF are reportedly coddling them. But strictly speaking, it is very difficult to provide statistical information on JI elements operating in the Philippines as foreign terrorist personalities operating in the Page 7 of 18
9 country already refuse to be identified with JI. In fact, the use of the term JI in the Philippines has become a generic label to foreign nationals involved in various acts of terrorism in Mindanao. Most of these foreign nationals come from Indonesia, particularly from the province of Sulawesi. An Indonesian based jihadist facilitating terrorist activities in Indonesia, Malaysia and the Southern Philippines is leading this so-called Sulawesi Extremist Group (SEG). The SEG currently serves as the main hub of what was previously known as the JI activities in Mindanao. SEG members and operatives are also associated with Jamaah Ansharut Tauhid (JAT), a new extremist group in Poso, Central Sulawesi. 9 Philippine law enforcement authorities believe that through the SEG, the JAT can operate in Mindanao using its existing networks with the ASG, the MILF, the MNLF and other foreign Jihadists. JI is operating in the Philippines through a new shadowy group called Khilafa Islamiya, which is currently being suspected for its involvement in the series of bombings in Mindanao recently. The Philippine military argues that JI operatives in the Philippines have limited capabilities to launch terrorist attack. But the threat they pose to internal peace and security is their transfer of terrorist knowledge (i.e. assembly and use of improvised explosive devices) to local groups. 10 On ATGs, the IPSP identifies the Pentagon Group (PG), the Al Khobar Group (AKG), and the Partisan Armed Groups (PAGs) under this category. Curiously, the IPSP fails to provide statistical data on the strength of these ATGs. Sources from the Philippine National Police (PNP) state that the PG has 200 members as of At present, PG has been decimated and contained. 11 The AKG has only 30 followers who have been engaged in extortion and bombing activities in Central Mindanao, particularly in cities of Tacurong, Kidapawan and General Santos. PNP estimates as of April 2013 say that PAGS nationwide are 86 (Figure 6) International Crisis Group, Indonesia: The Dark Side of Jama ah Ansharut Tauhid (JAT), Asia Briefing, No, 107 (6 July 2010). 10 General Headquarters of the AFP, Internal Peace and Security Plan, Bayanihan, p Soliman Santos, et, al. Primed and Purposeful: Armed Groups and Human Security Efforts in the Philippines (Geneva: Small Arms Survey, 2010), p Philippine National Police, Statistics on Partisan Armed Groups (31 April 2013). Page 8 of 18
10 Figure 6 Source: Philippine National Police, 31 April What do all these statistical information tell us? STATISTICAL CHALLENGES FOR PEACE RESEARCH AND NATIONAL SECURITY STUDIES Based on official estimates, these statistical information tell us that the strength and firearms of threat groups in the Philippines are continuously declining. The significant decline is attributed to the tireless counter-measures implemented by government authorities. These information also give a sense of accomplishment for law enforcements for reducing the strengths and firearms of these threat groups through years of combined police and military efforts. While the government was able to reduce the strength of threat groups in the country, these groups, however, have not yet disappeared. In fact, threat groups have become very resilient and are able to establish tactical alliances with each other. For example, government statistics do not tell that the NPAs in Mindanao have tactical alliance with Muslim rebels through the formation of a shadowy group called Moro Army Page 9 of 18
11 Committee (MAC). 13 In fact, the NDF has a new front organization in Mindanao coming from a Muslim group called the Moro Resistance and Liberation Organization (MRLO) based in Maguindanao province. The MRLO is considered to be the 16 th allied organization of the NDF operating in Mindanao. 14 In other words, NPA shares its violent extremist activities with Muslim rebels in the Southern Philippines. Thus, in terms of their membership, threat groups may have declined. But they have not disappeared because they have the ability to establish network with one another as force multiplier. Even among Muslim rebels, the ASG, JI, BIFF have existing networks that they use for joint or coordinated operations. The recent series of bombings in Mindanao are considered to be the result of joint and coordinated activities of these groups. The participation of a new shadowy group called Khilafa Islamiya in these series of bombings complicates the already complex situation in Mindanao. Existing government statistics have not provided adequate data to describe this complexity. In other words, official statistical data on threat groups do not explain the situation that can give us a better understanding of the wide array of threats in the Philippines. These data are, strictly speaking, mere inventories of numbers that do not really offer explanatory sense of the overall threat environment in the country. These data do not also tell whether the reduction of strengths of these threat groups result in the reduction of threats in the conflict-affected areas. Based the official record of violent incidents perpetuated by threat groups in Mindanao in 2011, the reduction of strengths of these threat groups during that year did not entail the reduction of violent incidents in their areas of operations (Figure 7). Correlating threat reduction with the reduction of strengths of threats groups is a major statistical challenge. 13 The existence of a Moro Army Committee (MAC) was classified secret by the Philippine National Police. But the existence of MAC was first discussed in the public domain in January 2011 in the context of the Makati bus bombing on 25 January See Alcuin Papa, Bus Attack: A Failure of Intelligence, Philippine Daily Inquirer (30 January 2011). 14 Ryan Rosauro, Reds Forming Group to Recruit Moros, Philippine Daily Inquirer (16 July 2005). Page 10 of 18
12 Figure 7 Violent Incident in Mindanao, Feb-Dec 2011 Source: Philippine National Police, On peace and security, the National Statistical Coordination Board (NSCB) published in its website relevant statistical information on how Philippine government authorities are able to promote and sustain internal stability and to uphold the sovereignty and territorial integrity of the state (Figure 7). Statistics contain baseline data and targets necessary for accomplishing the Philippine Development Plan (PDP) Chapter 9 of the PDP provides the goals, objectives and specific strategies of the Philippine government on how to promote peace and security in the country. This particular chapter upholds the view that Peace and security shall be achieved in support to national development. But Figure 8 maybe viewed as just plain numbers that do not adequately describe peace and security situation in the country. While Figure 8 describes the number of crime incidents, crime solution efficiency, number of private armed groups and other threat groups, resolution rate of immigration fraud cases and resolution rate of deportation cases, numbers presented do not really tell whether the Philippines has become more peaceful and secure through various counter-measures of the government. Providing the necessary indicators to measure peace and security in the country is another statistical challenge. Page 11 of 18
13 Figure 8 Statistical Indicators on Peace and Security Source: National Statistical Coordination Board, In fact, many official statistical information on peace and security do not present statistical data on the collateral damages of government s counter-insurgency and counter-terrorism measures. Government statistics also fail to present the unintended negative consequences of these counter-measures on the ordinary lives of affected communities in conflict-affected areas, particularly in Muslim Mindanao. In fact, one study lamented that statistical information on peace and security issues in Mindanao failed to take into explicit account the damages to the personal welfare of residents human losses, destruction of their surroundings, pain and suffering, increased uncertainty, etc. 15 If some statistical information are available, they are not adequate to really measure the cost of conflict in Mindanao. 16 Thus far, the most authoritative source that provides statistical data that approximate the cost of conflict in Mindanao is the Philippine Human Development Report This Report states that in terms of Human Development Index (HDI), the Muslim-dominated and conflict-affected provinces of Maguindanao, Sulu, Lanao del Sur, Basilan and Tawi-Tawi have the least access to education, health, electricity, 15 Salvatore Schiavo-Campo and Mary Judd, The Mindanao Conflict in the Philippines: Roots, Costs, and Potential Peace Dividend, Social Development Papers: Conflict Prevention & Reconstruction, Paper No. 24 (February 2005), p Ibid. Page 12 of 18
14 transportation, and water and sanitation services. 17 These provinces also have the highest number of armed encounters between the government and rebel forces. These conflict-affected provinces of Mindanao are also considered to be the poorest among the 77 Philippine provinces and are found to have the highest levels of dissatisfaction with government services. 18 The Philippine Human Development Report 2012/2013 lists once again most of the conflict-affected areas of Mindanao in the bottom provinces in terms of HDI (See Figure 9). These provinces are the operational areas of threat groups. These provinces are also where police and military deployments are known to be heavy. One very useful statistical information on peace and security is the Global Peace Index (GPI) published by the Institute for Economics and Peace. In 2012, the GPI regards the Philippines as among the Top 5 Most Improved Countries for the current government s efforts to promote a negotiated political settlement with the MILF. In 2012, the Philippine government recorded no incident of armed skirmish with the MILF. In the survey conducted by the Pulse Asia between March and May 2012, 50% of Filipinos Approve the Aquino Administration s work in the area of promoting peace. The Office of the Presidential Adviser on the Peace Process (OPAPP) even published an Infographic to depict the peace and security accomplishments of the Aquino government (Figure 10). 17 Philippine Human Development Report 2005: Peace, Human Security and Human Development in the Philippines (Manila: Human Development Network, 2005). 18 The World Bank, Social Assessment of Conflict-Affected Areas in Mindanao (Manila: The World Bank Philippines Post Conflict Series Number 1, 2003), pp Page 13 of 18
15 Figure 9 HDI Top and Botton Provinces (2009) Source: Philippine Human Development Report 2012/2013. But based on Global Peace Index 2013, the Philippines has been placed on the list of least peaceful countries in Asia. The Global Peace Index 2013 ranked the Philippines in the 129th position out of 162 countries in terms of peacefulness. Though the Philippines was among the Top 5 Most Improved Countries in terms of peacefulness in 2012, the country remained one of the least peaceful countries in Asia based on 2013 Global Peace Index report. Explaining this issue needs no number. It needs qualitative reflection, political analysis and social interpretation. Page 14 of 18
16 Figure 10 Source: Office of the Presidential Adviser on the Peace Process, OVERCOMING CHALLENGES: LESSONS LEARNED FROM EXEMPLARY PRACTICES From the foregoing discussions, the use of peace and security statistics in the Philippines maybe considered to be problematic and contested because of the lack of commonly acceptable indicators to measure peace and security in the country. Though the NSCB has published statistics on peace, security, public order, safety and justice, those statistics failed to really describe if the Philippines became safer, more peaceful or more secure. To provide a forum for statisticians working in the areas of defense, military research, national security, homeland security, and counterterrorism, the American Statistical Association (ASA) established a Section on Statistics on Defense and National Security. 19 This Section aims to assist its members:.in the advancement of knowledge in defense and national security by fostering wider and more effective use of statistical techniques, promoting the statistical profession and statistical best practices within the defense and national security governmental and affiliated organizations, 19 American Statistical Association, Section on Statistics on Defense and National Security, <accessed on 15 August 2013>. Page 15 of 18
17 encouraging professional review of statistical methods and statistical activities carried out in support of national security, particularly statistical research that is not available for public review, and disseminating information and providing training opportunities for individuals involved in the production and use of defense and national security data and statistics. 20 The Philippines can learn important lessons from the exemplary practice of ASA. Though American statisticians have different statistical needs and objectives compared to Filipino statisticians, how American statisticians cooperate and exchange knowledge on statistical research in peace and security can provide useful ideas for Filipino statisticians working in these areas. The NSCB or the Philippine Statistical Association (PSA) can establish contact with ASA to learn lessons from them on the use of statistics in defense and security. Aside from ASA, the National Institute of Statistical Sciences (NISS) based in North Carolina has also developed the Quantitative Methods in Defense and National Security (QMDNS). 21 One important quantitative method that has tremendous bearing on the Philippine security situation is the use of Social Network Analysis (SNS) for National Security. The SNA is particularly developed for counter-insurgency (COIN) operations, to wit: COIN operations require assessing the political and social architecture of the operational environment, from both friendly and enemy perspectives. SNA can help commanders understand how an insurgent organization operates. Insurgent networks often do not behave like normal social networks. However, SNA can help commanders determine what kind of social network an insurgent organization is. That knowledge helps commanders understand what the network looks like, how it is connected, and how to best defeat it. 22 The SNA is applicable in the examination of social networks of threat groups in the Philippines like the NPA, ASG, BIFF, JI, lawless MILF and rouge MNLF. The SNA can help provide quantitative and qualitative information on the types of connections of threat groups with their social, political and cultural communities in which they find themselves. In her book, 10 Days, Ten Years: From Bin Laden to Facebook, Maria Ressa demonstrated the value of SNA in examining Al-Qaeda networks in the Philippines using complex network metrics and sociograms. 23 Filipino statisticians may find the use of SNA in developing a socially-relevant peace and security statistics. Figure 11 is an example of the use of SNA to describe the network of personalities responsible for the bombing of twin-towers on September 11, Ibid. 21 National Institute of Statistical Sciences (NISS), Quantitative Methods in Defense and National Security (QMDNS), <accessed on 15 August 2013>. 22 Michael Last, Social Network Analysis for National Security, <accessed on 12 August 2013>. 23 Maria Ressa, 10 Days, Ten Years: From Bin Laden to Facebook (Mandaluyong City: Anvil Publishing, Inc., 2012), pp Page 16 of 18
18 Figure 11 Social Network Analysis of 9/11 Bombers Source: Inventor Spot at s.png Another exemplary practice on the use of statistics in defense and security is the work of Scott Evans, Ken Kleinman, and Marcello Pagano of Harvard University. They used statistical methods to examine the threat of bioterrorism in the United States. 24 The authors use time-series analysis in biosurveillance. They argue that biological attacks in recent years have motivated an increase in bioterrorism-related research, and this evolving research area is creating new challenges, responsibilities, and opportunities for statisticians. 25 While there is no doubt that the use of statistics is essential for public policy because of the empirical evidences that statistics can present, there is a need to emphasize that statistics should be complimented by critical social and political interpretation that is normally done qualitatively rather than quantitatively. In fact, what we know in the empirical world is just an interpretation or a mirror of what we think we see. Thus, statistical information need critical reflections and comprehensive interpretations to understand the context of the problem and the players involved in the situation because numbers do not always count. As one scholar underscores, Although numbers are important in the treatment of qualitative data, qualitative researchers should 24 Scott Evans, Ken Kleinman, and Marcello Pagano, Statistics in Defense and National Security: Bioterrorism and Biosurveillance, <accessed on 12 August 2013>. 25 Ibid. Page 17 of 18
19 avoid the counting pitfalls of verbal counting, overcounting, misleading counting, and acontextual counting. 26 Numbers can count if contextualized and humanized. Reflection and interpretation can contextualize and humanize the numbers presented in statistics SUMMARY AND CONCLUSION Statistical data in peace and security in the Philippines is problematic and contested because they often present numbers that do not adequately measure the state of peacefulness and security in the country. Numbers available pertain largely on the strengths of threat groups and the number of firearms that these groups possess. The method on how authorities get these numbers can even be challenged. Even data on index and non-index crimes are open for constructive criticisms. Though the NSCB publishes statistical data on peace and security, they are inadequate to really describe, if not explain, the state of peacefulness and security in the country. Though the NSCB has human development index and good governance index to measure government performance on these areas, there is no peace and security index that can measure government performance in these fields. In the United States, there is a serious attempt to incorporate statistics in defense and national security. The Philippines can learn lessons from the exemplary practices in the US to overcome the statistical challenges in peace research and national security studies in the Philippines. But there is a need to emphasize that numbers presented in statistics do not always count. Statistics should be complimented by critical social and political interpretation to contextualize and humanize the numbers. Statisticians involved in peace research and national security studies must also be informed by the need to pursue critical reflection, discourse and interpretation in order to formulate a socially responsible policy for peace-building, conflict resolution, and national security management. 26 M. Sandelowski, Real Qualitative Researchers Do Not Count: The Use of Mumbers in Qualitative Research, Res Nurs Health Jun;24(3): Page 18 of 18
TRANSFORMING PHILIPPINE DEFENSE AND MILITARY EDUCATION TO COPE WITH FUTURE CHALLENGES
11 th ASEAN Regional Forum Heads of Defense Universities/Colleges/Institutions Meeting 9-11 October 2007 Canberra, Australia TRANSFORMING PHILIPPINE DEFENSE AND MILITARY EDUCATION TO COPE WITH FUTURE CHALLENGES
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
SEQUENCE OF PRESENTATION
SEQUENCE OF PRESENTATION I. PHILIPPINE INTEGRATED TRANSFORMATION PROGRAM II. PNP PERFORMANCE GOVERNANCE SYSTEM (PNP Transformation Roadmap 2030) a. Roadmap b. Measures / Scorecard INTEGRATED TRANSFORMATION
Sultan of Sulu s Sabah Claim: Reminiscence of a Long-Lost Sovereignty
Journal of Social Science for Policy Implications March 2014, Vol. 2, No. 1, pp. 185-189 ISSN: 2334-2900 (Print), 2334-2919 (Online) Copyright The Author(s). 2014. All Rights Reserved. Published by American
Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington
Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington Chair s Summary Overview Community-Oriented Policing (COP)
Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 5-11 5 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
INTERNATIONAL CONFERENCE SUSTAINABLE DISARMAMENT FOR SUSTAINABLE DEVELOPMENT THE BRUSSELS CALL FOR ACTION. 13 October 1998, Brussels, Belgium
INTERNATIONAL CONFERENCE SUSTAINABLE DISARMAMENT FOR SUSTAINABLE DEVELOPMENT THE BRUSSELS CALL FOR ACTION 13 October 1998, Brussels, Belgium The international Conference on Sustainable Disarmament for
Assessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015
Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina
Terrorist or freedom fighter or..?
Learning outcomes Students will practice arguing and understanding views which are not necessarily their own Students will gain an understanding of how history can judge events in a different way from
Policy Instruments & (Side)-Effects
Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
INTELLIGENCE AND ANALYSIS
OFFICE OF INTELLIGENCE AND ANALYSIS U.S. DEPARTMENT OF THE TREASURY WORKING AT OIA OIA S MISSION POSITION DESCRIPTIONS BENEFITS & CONTACT INFORMATION working at oia OIA officers support the formulation
m a s t e r o f s c i e n c e i n
m a s t e r o f s c i e n c e i n Global affairs The M.S. in Global Affairs is the flagship graduate program of the Center for Global Affairs (CGA), ranked by the Foreign Policy Association in 2010 and
Examples of International terrorist attacks since 9/11
PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the
Homeland Security and Terrorism COURSE SYLLABUS
Homeland Security and COURSE SYLLABUS Course: CRJU 491T Section: 001 Semester: Spring 2015 UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE Instructor: Leslie G. Wiser, Jr. Office:
Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational
REMARKS BY AMBASSADOR SCOTT DELISI Africa Center for Strategic Studies Sheraton Hotel Rwenzori Ballroom January 28, 2013, 11:30 a.m. [Protocol list of invitees] All protocols observed. Good morning. It
STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Wm. R. Snodgrass TN Tower, 25 th Floor Nashville, TN 37243 (615) 532-7825 [email protected] Page 1 TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY Current as of June 1, 2013 LAW ENFORCEMENT
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Assessment of the terror threat to Denmark
28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks
CITIZEN ADVOCACY CENTER
CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical
The Defence Strategy of the Slovak Republic
The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security
Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)
Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on
TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members
Training Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
How To Get A Security Degree In Australia
Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.
Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University
Ph. D. Program in Education Specialization: Educational Leadership School of Education College of Human Sciences Iowa State University The purpose of the doctoral program in Educational Leadership is to
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Umar Patek: The Test of a Prison System
Umar Patek: The Test of a Prison System An Analysis By: Chris Rottenberg Research Associate with the Osgood Center There have been many heated debates on whether or not a terrorist should, or even could,
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
Fighting Terrorism at its Source
The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION
Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range
Tactical Range Facility Criminal Sgt. Major James Massey Range 11 Classes Offered Officer Safety & Field Tactics Officer Safety & Field Tactics in a Terrorism Environment Officer Safety & Field Tactics
https://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/...
Unit 6 - Homeland Security, Homeland Defense, and Defense Support of Civil Authorities Page 1 of 5 The defense of the homeland is a significant contemporary security issue. Defending the homeland is a
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01
22 ND ANNUAL MEETING OF THE ASIA-PACIFIC PARLIAMENTARY FORUM RESOLUTION APPF22/RES 01 POLITICAL AND SECURITY MATTERS IN ASIA PACIFIC (Sponsored by Australia, Indonesia, the Republic of Korea and the Russian
National Security Agency
National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the
TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
Lesson Plan: Islamophobia in the Shadow of 9/11
Lesson Plan: Islamophobia in the Shadow of 9/11 Grades 10-12 Purpose In this lesson, students will critically analyze various media for manifestations of Islamophobia. They will also learn to recognize
Impact of Transition on Health Care Delivery
Agency Coordinating Body for Afghan Relief & Development Impact of Transition on Health Care Delivery The security transition in Afghanistan is entering its final phase in 2014, with partial withdrawal
FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE?
FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE? By Steven M. Kosiak The tragic events of September 11, 2001 have had a significant impact on federal
STATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM
THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL
GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
U.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
Ohio Families First:
OHIO HEART AND SOUL www.tedstrickland.com Ohio Families First: Defeating Terrorism & Keeping Americans Safe On 9/11, our country was attacked on our home soil, and none of us who lived through that day
BIOTERRORISM RISK ASSESSMENT GROUP (BRAG) FEDERAL BUREAU OF INVESTIGATION CRIMINAL JUSTICE INFORMATION SERVICES DIVISION CLARKSBURG, WEST VIRGINIA
BIOTERRORISM RISK ASSESSMENT GROUP (BRAG) FEDERAL BUREAU OF INVESTIGATION CRIMINAL JUSTICE INFORMATION SERVICES DIVISION CLARKSBURG, WEST VIRGINIA MISSION To enhance national security and public safety
COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft
COJUMA s Legal Considerations for Defense Support to Civil Authorities U.S. Southern Command 28 Miami, Florida Miami, Florida Draft Table of Contents Legal Considerations for Defense Support to Civil Authorities.....10
The Price of Counterterrorism Information Gathering: Intelligence Informers in the Israeli Courts
The Price of Counterterrorism Information Gathering: Intelligence Informers in the Israeli Courts Research Proposal, April 18, 2013 Prof. Menachem Hofnung The Hebrew University of Jerusalem Submitted to
The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM): Bringing together regional and international expertise
Arab Journal of Forensic Sciences and Forensic Medicine 2014; Volume 1 Issue (0), 17-21 17 Naif Arab University for Security Sciences Arab Journal of Forensic Sciences and Forensic Medicine www.nauss.edu.sa
Active Engagement, Modern Defence
Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,
Drone Warfare: effective or counter-productive?
Drone Warfare: effective or counter-productive? Stefan Wolff, University of Birmingham While there can be no doubt that the national and international legal regulation of the deployment of Unmanned Aerial
CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure
CSCAP MEMORANDUM NO. 24 Safety and Security of Vital Undersea Communications Infrastructure A Memorandum from the Council for Security Cooperation in the Asia Pacific (CSCAP) May 2014 Council for Security
Homeland Security Intelligence Guide for Fire Chiefs Table of Contents
Homeland Security Intelligence Guide for Fire Chiefs Table of Contents Introduction 3 Chapter 1 4 Fire Service Intelligence Enterprise (FSIE) 6 Chapter 2 7 Partnerships 7 Fusion Centers 7 Joint Terrorism
SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes
SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS Taught Masters programmes What s special about studying in the Department of International Relations at Sussex? With a history that spans
Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999
Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999 The Security Council, Bearing in mind the purposes and principles of the Charter of the United Nations, and
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
NC General Statutes - Chapter 160A Article 13 1
Article 13. Law Enforcement. 160A-281. Policemen appointed. A city is authorized to appoint a chief of police and to employ other police officers who may reside outside the corporate limits of the city
WILDLIFE LAW ENFORCEMENT AND GOVERNANCE IN THE PHILIPPINES
WILDLIFE LAW ENFORCEMENT AND GOVERNANCE IN THE PHILIPPINES By Antonio C. Manila Protected Areas & Wildlife Bureau DENR, Diliman, Quezon City, Philippines TOPICS FOR DISCUSSIONS: 1. Updates on Philippine
Purpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
Crime Prevention and Criminal Justice Issues: the UN System and UNODC Mechanisms
Crime Prevention and Criminal Justice Issues: the UN System and UNODC Mechanisms -Ajit Joy Expert, Crime Prevention UNODC Jakarta The mandate of the United Nations Office on Drugs and Crime, the organization
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
Research Project RM 01-01-08. Assumed role of India in the international community in the short and medium
Assumed role of India in the international community in the short and medium Daniel Novotný Alice Rezková SUMMARY AND CONCLUSION: RECOMMENDATIONS FOR FUTURE STRATEGIC APPROACH OF THE EU TOWARDS INDIA Assessment
BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS
ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
PEOPLE'S REPUBLIC OF CHINA. (New York, May 4, 2010) Please Check Against Delivery MISSION TO THE UNITED NATIONS
PEOPLE'S REPUBLIC OF CHINA MISSION TO THE UNITED NATIONS 350 EAST 35TH STREET, NEW YORK, NY 10016 Please Check Against Delivery Statement by H.E. Ambassador Li Baodong Head of the Chinese Delegation at
COUNTERINSURGENCY IN THE SOUTH OF THAILAND
Alumni Perspectives ENGAGEMENT OF MALAYSIA AND INDONESIA ON COUNTERINSURGENCY IN THE SOUTH OF THAILAND Wassana Nanuam Wassana Nanuam is a graduate of APCSS Advanced Security Cooperation course (ASC 15-1).
UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities
Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
know school PubliC affairs
know school PubliC affairs = our mission at the school PubliC affairs is to prepare leaders to analyze issues and tackle complex challenges in public service. We aspire not only to transmit knowledge to
Planning & Response Considerations for Mass Shooting Incidents
Planning & Response Considerations for Mass Shooting Incidents This PDF is a variety of slides from my 4-hour Multi-Agency Mass Shootings Planning & Response Course May 2008 version. I developed this PDF
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) Criminal No. 01-455-A ) ZACARIAS MOUSSAOUI, ) Defendant ) Statement of Facts
U.C. Riverside Police Department Policy Manual Use of Force
300.1 PURPOSE AND SCOPE This policy provides guidelines on the reasonable use of force. While there is no way to specify the exact amount or type of reasonable force to be applied in any situation, every
CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours
Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by INTEL DISCLAIMER: The views presented
CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO.: AAC 13-05 COMMITTEE DATE: October 9, 2012 BOARD DATE: October 16, 2012 APPLICATION OF UNIVERSITY OF MASSACHUSETTS
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
