Listing 1 - 6 of 6 |
Sort by
|
Choose an application
"his book presents nine up-to-date chapters on key aspects of terrorist groups by leading contributors in the study of terrorism. The chapters focus on the study of terrorist groups, their interface with targeted governments as well as ways to counter politically motivated terrorist attacks. To augment the efficacy of counterterrorism, governments must understand how terrorist groups form, recruit members, gain support, and choose targets. Additionally, governments must be aware of interactions within and among terrorist groups to allow governments to hone the practice of counterterrorism. This book addresses many of these topics. In particular, the volume casts light on group formation during 1860-1969 and 1970-2016, respectively. From different vantages, terrorist recruitment and group support are investigated. Other topics include the role of terrorist groups' ideologies and goals, determinants of home-base attacks, groups' response to government countermeasures, intergroup interactions as well as conflicts. On Terrorist Groups will be of interest to students and researchers of Terrorism, Political Violence, Security and Intelligence, Conflict Studies, and Political Science in general. This book was originally published as a special issue of Defence and Peace Economics.
Choose an application
"A detailed chronicle of the foundation of Boko Haram, its internal dynamics, and its evolution as a global Jihadist movement"--
Jihad --- Islamic fundamentalism --- Terrorist organizations --- Violence --- Geopolitics --- Islam and state --- Religious aspects --- Islam --- Boko Haram --- Islamic State in West Africa Province --- Ansaru --- History --- BOKO HARAM --- JIHAD --- ISLAMIC FUNDAMENTALISM--NIGERIA --- TERRORISM--RELIGIOUS ASPECTS--ISLAM--NIGERIA --- Polemology --- Nigeria
Choose an application
"Boko Haram au Nigeria, les chebab en Somalie, AQMI au Mali… Plus de vingt ans après les attentats organisés en 1998 par Al-Qaïda contre les ambassades des États-Unis au Kenya et en Tanzanie, la progression des mouvements islamistes radicaux en Afrique subsaharienne, notamment au Sahel, inquiète les populations locales et les observateurs internationaux.Ce livre solidement argumenté dresse un panorama éclairant des mouvements dits « djihadistes » en rappelant leurs origines, historiques et sociales. Loin d’être les tentacules d’une monstrueuse « Internationale Terroriste », ces mouvements puisent d’abord leurs racines dans des dynamiques locales.Plutôt que d’envisager le « djihadisme africain » comme une nébuleuse homogène et insaisissable, Marc-Antoine Pérouse de Montclos propose une analyse innovante de ces groupes insurrectionnels en s’appuyant non seulement sur des considérations religieuses mais aussi sur des données économiques, sociologiques et politiques trop rarement mobilisées. Nourri d’entretiens avec des leaders musulmans, des combattants et des responsables des services de sécurité, ce livre souligne les effets contre-productifs des réponses militaires apportées à la « menace terroriste » au Sahel."
Djihadistes --- Terrorisme islamiste --- JIHAD --- TERRORISM--RELIGIOUS ASPECTS--ISLAM --- TERRORISM--AFRICA, SUB-SAHARAN --- Terrorist organizations --- Terrorism --- Jihad. --- Organisations terroristes --- Terrorisme --- Religious aspects --- Islam. --- Aspect religieux --- Insurgency --- Jihad --- Violence --- Civil war --- Islam --- Terrorism - Africa --- Violence - Africa - Religious aspects --- Violence - Religious aspects - Islam --- Civil war - Africa - Religious aspects --- Civil war - Religious aspects - Islam --- Terrorist organizations - Africa, Sub-Saharan --- Insurgency - Africa --- Terrorism - Religious aspects - Islam --- Terrorism - Africa, Sub-Saharan
Choose an application
"Drawing on sources in Arabic and Hausa, rare documents, propaganda videos, press reports, and interviews with experts in Nigeria, Cameroon, and Niger, Alexander Thurston sheds new light on Boko Haram's development. He shows that the group, far from being a simple or static terrorist organization, has evolved in its worldview and ideology in reaction to events. Chief among these has been Boko Haram's escalating war with the Nigerian state and civilian vigilantes. The book closely examines both the behavior and beliefs that are the keys to understanding Boko Haram. Putting the group's violence in the context of the complex religious and political environment of Nigeria and the Lake Chad region, the book examines how Boko Haram relates to states, politicians, Salafis, Sufis, Muslim civilians, and Christians. It also probes Boko Haram's international connections, including its loose former ties to al-Qaida and its 2015 pledge of allegiance to ISIS"--Publisher's description
Terrorist organizations --- Terrorism --- Islamic fundamentalism --- Jihad --- Islam and politics --- Religious aspects --- Islam --- Boko Haram --- BOKO HARAM --- TERRORISM--RELIGIOUS ASPECTS--ISLAM--NIGERIA --- ISLAMIC FUNDAMENTALISM--NIGERIA --- JIHAD --- ISLAM AND POLITICS--NIGERIA --- Religious aspects&delete& --- Boko Haram. --- BH (Boko Haram) --- Boko Harram --- Jamāʻat Ahl al-Sunnah li-Daʻwah wa-l-Jihād --- Jamāʻat Ahl al-Sunnah lil-Daʻwatihi wa-al-Jihād --- Jamaʼatu Ahlis Sunna Liddaʼawati Wal-Jihad --- Jama'atu Ahlisunnah Lida'awati Wal-Jihad --- Jamaʼatul Alhul Sunnah Liddaʼwati wal jihad --- JAS (Jama'atu Ahlisunnah Lida'awati Wal-Jihad) --- Nigerian Taliban --- People Committed to the Propagation of the Prophet's Teachings and Jihad --- جماعة اهل السنة للدعوة والجهاد --- Holy war (Islam) --- Islamic holy war --- Jahad --- Jehad --- Muslim holy war --- War (Islamic law) --- Fundamentalism, Islamic --- Islamism --- Religious fundamentalism --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Terror organizations --- Terrorist groups --- Associations, institutions, etc. --- Politics and Islam --- Political science --- Political aspects --- #SBIB:39A10 --- #SBIB:39A73 --- #SBIB:316.331H333 --- Antropologie: religie, riten, magie, hekserij --- Etnografie: Afrika --- Godsdienst, oorlog en vrede --- Jamāʻat Ahl as-Sunnah lid-Daʻwah wa-l-Jihād --- Jamaat Ahlussunah lid-Dawa wal-Jihad --- Jama'atu Ahlisunnah Lida'awati wal-Jihad --- Jamatu Ahlis Sunna Lidawatti wal Jihad --- JAS (Jama'atu Ahlisunnah Lida'awati wal-Jihad) --- Yusufiya --- Islamic State in West Africa Province --- Ansaru --- Terrorist organizations - Nigeria --- Terrorism - Nigeria - Religious aspects - Islam --- Islamic fundamentalism - Nigeria --- Islam and politics - Nigeria
Choose an application
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? This title examines the great variation in how terrorist groups are structured.
TERRORISM --- TERRORISTS --- Polemology --- Organization theory --- Terrorists. --- Terrorism. --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Criminals --- Violent crimes --- Organized crime --- Organizational behavior. --- History. --- Behavior in organizations --- Management --- Organization --- Psychology, Industrial --- Social psychology --- Crime syndicates --- Organised crime --- Crime --- Fatah. --- Hamas. --- Islamist groups. --- Islamist terrorism. --- Middle East. --- Northern Ireland. --- Palestinian terrorist groups. --- Provisional IRA. --- Russian terrorist groups. --- Tsarist secret police. --- Ulster Defense Association. --- Ulster Volunteer Force. --- agency problems. --- agency theory. --- al-Qa'ida in Iraq. --- al-Qa'ida. --- bureaucracy. --- control. --- counterterror policies. --- counterterrorism policies. --- discrimination. --- group-specific vulnerabilities. --- hierarchy. --- internal dynamics. --- internal politics. --- managerial challenges. --- managerial problems. --- negotiated settlement. --- operational management. --- organizational analysis. --- organizational challenges. --- organizational dynamics. --- organizational resources. --- political goals. --- preference divergence. --- secrecy. --- secular nationalist groups. --- security reducing. --- security risks. --- security-control tradeoff. --- strategic interactions. --- terrorism. --- terrorist activity. --- terrorist group structure. --- terrorist groups. --- terrorist leaders. --- terrorist operatives. --- terrorist organizations. --- terrorists. --- uncertainty. --- violence.
Choose an application
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Listing 1 - 6 of 6 |
Sort by
|