Browsing Category

Features

The Necessity of Partnerships

UNIPATH STAFF On the 20th anniversary of the 9/11 attacks on the United States, dozens of security experts, including several current and former commanders at U.S. Central Command (CENTCOM), attended a two-day conference contemplating…

Securing Syrian Refugee Camps

JORDANIAN PUBLIC SECURITY DIRECTORATE Daesh’s invasion caused a significant displacement of civilians who fled from conflict areas in search of a safe haven. The Hashemite Kingdom of Jordan enjoys security and stability under the…

Reintegrating Returnees

COL. UMED AHMEDOV, former SENIOR NATIONAL REPRESENTATIVE OF THE MINISTRY OF DEFENSE OF THE REPUBLIC OF UZBEKISTAN AT U.S. CENTRAL COMMAND Between 2017 and 2021, the government of Uzbekistan, with participation of international…

A Partner in the Northern Arabian Gulf

UNIPATH STAFF  |  photos by Iraqi Navy Despite contested territorial waters and terrorist attempts by organized crime gangs, the Iraqi Navy has proved it can protect maritime navigation in the northern Arabian Gulf as well as play an…

Six Types of Terrorist Recruits

ISLAMIC MILITARY COUNTER TERRORISM COALITION Terrorist organizations go to great lengths to attract young people into the arena of terrorist operations, frequently using online cells. These cells are responsible for 70% of youth…

Mission over Central Africa

MAJ. KHURRAM SHAHZAD, Pakistan Armed Forces For several decades, United Nations peacekeeping has grown increasing complex. The spectrum of United Nations peacekeeping operations include restoring state authority, protecting civilians,…

Foreign Aid Bolsters Lebanese Armed Forces

UNIPATH STAFF The Lebanese Armed Forces will receive an additional $67 million from the United States to aid in stabilizing the country. U.S. Undersecretary of State Victoria Nuland announced the new funding during her first visit to…

Exposing the Enemy

UNIPATH STAFF The Iraqi Directorate of Military Intelligence specializes in collecting information on adversaries, analyzing that information, and identifying risks and threats, in addition to monitoring information security and personal…