Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    edocfu_9959202087802883
    Format: 1 online resource (281 p.)
    ISBN: 1-5013-0101-2 , 1-280-57948-X , 9786613609267 , 1-4411-5686-0
    Content: "Since 9/11, the dominant view is that we have entered an era of 'new conflict' in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this 'new conflict' argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and the political aspects of homeland security, this unique survey demonstrates how such activities as terrorism are limited by their clandestine nature. It also addresses why we need to switch our strategic focus and increase the role citizens have in dealing with such threats. This historically informed and critical analysis fills a void in the debates on the threats and conflicts that the U.S. confronts at home and abroad and will appeal to anyone interested in national security and terrorism."--Bloomsbury Publishing.
    Note: Description based upon print version of record. , Indtroduction -- 1. Some aspects of political violence in America; Notes -- 2. Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3. Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4. Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5. Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6. The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Concl usion; Notes -- Conclusion; Notes; Bibliography; Index. , Also issued in print. , English
    Additional Edition: ISBN 1-4411-2955-3
    Additional Edition: ISBN 1-4411-7069-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages