Listing 1 - 10 of 57 | << page >> |
Sort by
|
Choose an application
"his book presents nine up-to-date chapters on key aspects of terrorist groups by leading contributors in the study of terrorism. The chapters focus on the study of terrorist groups, their interface with targeted governments as well as ways to counter politically motivated terrorist attacks. To augment the efficacy of counterterrorism, governments must understand how terrorist groups form, recruit members, gain support, and choose targets. Additionally, governments must be aware of interactions within and among terrorist groups to allow governments to hone the practice of counterterrorism. This book addresses many of these topics. In particular, the volume casts light on group formation during 1860-1969 and 1970-2016, respectively. From different vantages, terrorist recruitment and group support are investigated. Other topics include the role of terrorist groups' ideologies and goals, determinants of home-base attacks, groups' response to government countermeasures, intergroup interactions as well as conflicts. On Terrorist Groups will be of interest to students and researchers of Terrorism, Political Violence, Security and Intelligence, Conflict Studies, and Political Science in general. This book was originally published as a special issue of Defence and Peace Economics.
Choose an application
This report analyzes terrorist groups' use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists' use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network technologies might be used to support the activities that terrorists must perform to conduct successful operations, understand terrorists' decisions about when and under what conditions particular technologies will be used and determine the implications of these insights for efforts to combat terrorism. The information presented in this report should be of interest to homeland security policymakers because it can be used to guide research, development, testing, and evaluation of techniques for collecting counterterrorist intelligence and developing measures to combat terrorism. The results of this analysis may also help inform technology and regulatory policy regarding the development, use, and management of systems that terrorists could use.
Terrorism --- Terrorist organizations --- Technological innovations.
Choose an application
Terrorist organizations --- Irregular warfare --- IS (Organization)
Choose an application
Atrocities --- Negotiation. --- Peace-building. --- Terrorist organizations. --- Prevention.
Choose an application
Terrorist organizations. --- Terror organizations --- Terrorist groups --- Associations, institutions, etc.
Choose an application
Insurgency --- Terrorism --- Terrorist organizations --- Religious aspects --- Islam --- Boko Haram.
Choose an application
Terrorist organizations --- Terrorism --- Prevention. --- Tehrik-i-Taliban Pakistan (Organization)
Choose an application
Terrorism --- Terrorist organizations --- National security --- Finance --- Prevention. --- Finance
Choose an application
RAND researchers hosted a subject matter expert workshop, supplemented by an in-depth literature review, to determine proposed courses of action to reduce security threats from and meet international standards for prisons holding presumed former Islamic State of Iraq and Syria (ISIS) fighters. The prisons are insecure and require physical reinforcements, otherwise they will continue to present a danger to the region and world given their potential for fueling an ISIS resurgence. Prisoners, including youth, remain in legal limbo with no internationally agreed-on justice procedures or specific legal charges, potentially leading to indefinite detention in poor living conditions. RAND's research and discussions revealed that the situation of the ISIS prisoners carries four problems and risks that can be mitigated through both short-term courses of action and medium-term policy directions.
Terrorist organizations --- Prisoners --- Legal status, laws, etc. --- IS (Organization)
Choose an application
Terrorist organizations. --- Terrorist organizations --- Terrorism --- National security --- Prevention. --- Qaida (Organization) --- IS (Organization) --- Afghanistan --- United States --- Foreign relations --- Foreign relations
Listing 1 - 10 of 57 | << page >> |
Sort by
|