Listing 1 - 10 of 36 | << page >> |
Sort by
|
Choose an application
History of Europe --- anno 1940-1949 --- World War, 1939-1945 --- Collaborationists. --- Fifth column --- Quislings --- Collaborationists --- Occupied territories --- Europe
Choose an application
The invocation of fifth columns in the political arena - whether contrived or based on real fears - has historically recurred periodically and is experiencing an upsurge in our era of democratic erosion and geopolitical uncertainty. Fifth-column accusations can have baleful effects on governance and trust, as they call into question the loyalty and belonging of the targeted populations. 'Enemies Within' systematically investigates the roots and implications of the politics of fifth columns. In this volume, a multidisciplinary group of leading scholars addresses several related questions: When are actors likely to employ fifth-column claims and against whom? What accounts for changes in fifth-column framing over time? How do the claims and rhetoric of governments differ from those of societal groups? How do accusations against ethnically or ideologically defined groups differ?
Subversive activities. --- Internal security. --- Insurgency --- Subversive activities --- Security, Internal --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency. --- Insurgent attacks --- Rebellions --- Civil war --- Revolutions --- Government, Resistance to
Choose an application
Tactics. --- Guerrilla warfare. --- Subversive activities. --- France --- Defenses. --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- War --- Irregular warfare --- Military tactics --- Military art and science
Choose an application
Internal security --- -National security --- -Political crimes and offenses --- -Subversive activities --- -Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Political crimes and offenses --- Offenses, Political --- Political offenses --- Crime --- Extradition --- Political violence --- Subversive activities --- National security --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Security, Internal --- Law and legislation --- -Government policy --- -Law and legislation --- -Internal security --- Fifth column --- Government policy
Choose an application
Internal security --- -Offenses against public safety --- -Subversive activities --- -#A9406A --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Political crimes and offenses --- Crimes against public safety --- Crime --- Public safety --- Security, Internal --- Subversive activities --- Offenses against public safety --- Sociale agogiek --- welzijnswerk en maatschappelijke dienstverlening --- welzijnswerk en maatschappelijke dienstverlening. --- #A9406A
Choose an application
The conflicts in Iraq and Afghanistan have generated intense interest in counterinsurgency within the U.S. armed forces, the intelligence community, the State Department, and the Department of Defense. However, subversion-a critical part of the repertoire of many insurgent groups-remains a neglected subject. This paper presents a set of case studies to explore the elements of subversion in-depth. It discusses preliminary ideas for combating subversive activities in the context of the "long war" against violent Islamist extremism and concludes with a discussion of how American support for count
Counterinsurgency. --- Insurgency. --- Subversive activities. --- Insurgency --- Subversive activities --- Counterinsurgency --- Political Science --- Military & Naval Science --- Law, Politics & Government --- Military Science - General --- Political Theory of the State --- Fifth column --- Security offenses --- Unconventional warfare --- Counterguerrilla warfare --- Insurgent attacks --- Rebellions --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- Guerrilla warfare --- Civil war --- Revolutions --- Government, Resistance to
Choose an application
This comprehensive study provides an integrated analysis of the global security environment and the consequent blossoming of ominous flows or ""deadly tranfers"". It includes the behaviour of rogue states, terrorist groups, transnational criminal organizations and deviant individuals.
National security - International cooperation. --- National security --- Security, International --- Subversive activities --- Crisis management --- Military & Naval Science --- Law, Politics & Government --- Armies --- International cooperation --- Security, International. --- Subversive activities. --- Crisis management. --- International cooperation. --- Crises --- Management of crises --- Fifth column --- Security offenses --- Unconventional warfare --- Collective security --- International security --- Management --- Problem solving --- Conflict management --- Insurgency --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- International relations --- Disarmament --- International organization --- Peace
Choose an application
Authoritarianism. --- Democracy. --- Liberalism. --- Subversive activities. --- Totalitarianism. --- 321.7:342.72/.73 --- Authoritarianism --- Democracy --- Liberalism --- Subversive activities --- Totalitarianism --- 342.72/.73 --- Totalitarian state --- Collectivism --- Despotism --- Dictatorship --- Fascism --- National socialism --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- Liberal egalitarianism --- Liberty --- Political science --- Social sciences --- Self-government --- Equality --- Representative government and representation --- Republics --- Authority
Choose an application
This book investigates one of the most controversial forms of secret statecraft in international politics: the use of covert action to overthrow foreign regimes. The central question it asks is why leaders sometimes turn to the so-called quiet option when conducting regime change rather than using overt means. Whereas existing works prioritize the desire to control escalation or avoid domestic-political constraints to explain this variation, this book highlights the surprising role that international law plays in these decisions. When states cannot locate a legal exemption from the nonintervention principle-the prohibition on unwanted violations of another state's sovereignty, codified in the United Nations Charter and elsewhere - they are more likely to opt for covert action.
Intervention (International law) --- Sovereignty, Violation of. --- Regime change. --- Espionage. --- Subversive activities. --- United States --- Foreign relations --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- Change, Regime --- Political violence --- Interim governments --- Legitimacy of governments --- Violation of sovereignty --- Military intervention --- Diplomacy --- International law --- Neutrality
Choose an application
With insight and originality, Michael Fellman argues that terrorism, in various forms, has been a constant and driving force in American history. In part, this is due to the nature of American republicanism and Protestant Christianity, which he believes contain a core of moral absolutism and self-righteousness that perpetrators of terrorism use to justify their actions. Fellman also argues that there is an intrinsic relationship between terrorist acts by non-state groups and responses on the part of the state; unlike many observers, he believes that both the action and the reaction constitute terrorism.Fellman's compelling narrative focuses on five key episodes: John Brown's raid on Harpers Ferry; terrorism during the American Civil War, especially race warfare and guerrilla warfare; the organized "White Line" paramilitary destruction of Reconstruction in Mississippi; the Haymarket Affair and its aftermath; and the Philippine-American war of 1899-1902. In an epilogue, he applies this history to illuminate the Bush-Cheney administration's use of terrorism in the so-called war on terror. In the Name of God and Country demonstrates the centrality of terrorism in shaping America even to this day.
Terrorism --- Subversive activities --- Fifth column --- Security offenses --- Unconventional warfare --- Insurgency --- Sovereignty, Violation of --- Internal security --- Political crimes and offenses --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Political violence --- Terror --- History.
Listing 1 - 10 of 36 | << page >> |
Sort by
|