You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In Counterterror Offensives for the Ghost War World: The Rudiments of Counterterrorism Policy, Richard J. Chasdi has written a groundbreaking quantitative analysis that provides new insight into which types of counterterror practices work best and which types perform poorly in particular operational environments and circumstances. For Chasdi, "effectiveness" is defined as the capacity of counterterror practices to work with "stealth"-namely, without eliciting high amounts of related follow-up terrorist assaults. He moves beyond individual country analyses to tackle an analysis of counterterror practice effectiveness based on the type of political system of the country carrying out counterterror offensives and the power level of that country within the international political system. Chasdi furthermore provides essential qualitative descriptions of national security institutions, stakeholders, and processes to frame his quantitative results in ways that tie those findings to historical and contemporary political developments.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field—includ...
In this book, Richard Chasdi brings an impressive degree of scientific rigor and statistical analysis to bear on the topic of terrorist violence in the contemporary Middle East. He has constructed an original and highly useful typology of terrorist groups which takes into consideration three main factors: ideology, goals, and recruitment patterns. With the assistance of this functional typology, Chasdi argues that future acts of terrorism -- including likely targets -- can be predicted, thereby allowing for preventive measures to be taken on both the local and international levels. Yet Serenade of Suffering is more than just a tool for anti-terrorist professionals. It is also an insightful and complex portrait of modern terrorism in general: its root causes, the key differences between state-sponsored and non-state terrorist organizations, and the questionable wisdom of trying to distinguish between "good" and "bad" types of terrorism. A "must-read" for area specialists, students of conflict studies, and international development professionals.
The only professional resource of its kind to offer in one volume original simulations, exercises, and games designed by academics and intelligence professionals from several countries. These interactive learning tools add immeasurable value to students’ understanding of the intelligence enterprise, and the various contributors provide an international perspective to the topics and approached. For use in undergraduate and graduate courses in intelligence, intel analysis, business intelligence, and various other national security policy courses offered in universities and government training facilities with the need for training in analytic principles and tradecraft.
Terrorist attacks perpetrated by lone actors have already occurred in several countries, and this phenomenon is emerging as a threat to the security of both NATO members and other countries worldwide. In this context, a lone actor, or 'lone wolf', is someone who individually prepares or commits violent acts in support of an ideology, group or movement, but who is acting outside of the command structure and without the assistance of any group. Up to now, these individual acts have been seen as almost impossible to forecast, but it is nevertheless important to develop a responsible security policy which takes them into account and incorporates planning for counteraction, prevention and respons...
This text aims to offer fresh insight into the complexities of state-sponsored and nonstate terrorism. It presents a detailed statistical and quantitative analysis of four Middle East terrorist organisations, in Algeria, Turkey, Egypt and Israel.
Terrorist attacks perpetrated by lone actors have already occurred in several countries, and this phenomenon is emerging as a threat to the security of both NATO members and other countries worldwide. In this context, a lone actor, or 'lone wolf’, is someone who individually prepares or commits violent acts in support of an ideology, group or movement, but who is acting outside of the command structure and without the assistance of any group. Up to now, these individual acts have been seen as almost impossible to forecast, but it is nevertheless important to develop a responsible security policy which takes them into account and incorporates planning for counteraction, prevention and respo...
An illuminating study tracing the evolution of drone technology and counterterrorism policy from the Reagan to the Obama administrations This eye-opening study uncovers the history of the most important instrument of U.S. counterterrorism today: the armed drone. It reveals that, contrary to popular belief, the CIA's covert drone program is not a product of 9/11. Rather, it is the result of U.S. counterterrorism practices extending back to an influential group of policy makers in the Reagan administration. Tracing the evolution of counterterrorism policy and drone technology from the fallout of Iran-Contra and the CIA's "Eagle Program" prototype in the mid-1980s to the emergence of al-Qaeda, Fuller shows how George W. Bush and Obama built upon or discarded strategies from the Reagan and Clinton eras as they responded to changes in the partisan environment, the perceived level of threat, and technological advances. Examining a range of counterterrorism strategies, he reveals why the CIA's drones became the United States' preferred tool for pursuing the decades-old goal of preemptively targeting anti-American terrorists around the world.