Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    UID:
    gbv_1679152661
    Format: Online-Ressource
    ISBN: 9781501301018
    Content: "Since 9/11, the dominant view is that we have entered an era of 'new conflict' in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this 'new conflict' argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and the political aspects of homeland security, this unique survey demonstrates how such activities as terrorism are limited by their clandestine nature. It also addresses why we need to switch our strategic focus and increase the role citizens have in dealing with such threats. This historically informed and critical analysis fills a void in the debates on the threats and conflicts that the U.S. confronts at home and abroad and will appeal to anyone interested in national security and terrorism."--Bloomsbury Publishing
    Content: Indtroduction -- 1. Some aspects of political violence in America; Notes -- 2. Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3. Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4. Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5. Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6. The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Conclusion; Notes -- Conclusion; Notes; Bibliography; Index.
    Note: Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily
    Additional Edition: ISBN 9781441129550
    Additional Edition: ISBN 9781441170699
    Additional Edition: ISBN 1501301012
    Additional Edition: ISBN 1441129553
    Additional Edition: Available in another form
    Language: English
    Keywords: USA ; Terrorismus ; Gewalt ; Politik ; Methode ; Bekämpfung ; Sicherheitspolitik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    edocfu_9959202087802883
    Format: 1 online resource (281 p.)
    ISBN: 1-5013-0101-2 , 1-280-57948-X , 9786613609267 , 1-4411-5686-0
    Content: "Since 9/11, the dominant view is that we have entered an era of 'new conflict' in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this 'new conflict' argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and the political aspects of homeland security, this unique survey demonstrates how such activities as terrorism are limited by their clandestine nature. It also addresses why we need to switch our strategic focus and increase the role citizens have in dealing with such threats. This historically informed and critical analysis fills a void in the debates on the threats and conflicts that the U.S. confronts at home and abroad and will appeal to anyone interested in national security and terrorism."--Bloomsbury Publishing.
    Note: Description based upon print version of record. , Indtroduction -- 1. Some aspects of political violence in America; Notes -- 2. Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3. Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4. Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5. Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6. The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Concl usion; Notes -- Conclusion; Notes; Bibliography; Index. , Also issued in print. , English
    Additional Edition: ISBN 1-4411-2955-3
    Additional Edition: ISBN 1-4411-7069-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781501301049?
Did you mean 9781501301001?
Did you mean 9781501301032?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages