Srl | Item |
1 |
ID:
060402
|
|
|
Publication |
Mar-Apr 2005.
|
Summary/Abstract |
In its first term, the Bush administration all but ignored a powerful diplomatic tool that had served Washington well in the past: the special envoy. With the State Department now under new management, it should start dispatching emissaries again
|
|
|
|
|
|
|
|
|
|
2 |
ID:
060371
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
062043
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
062598
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
061899
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
060659
|
|
|
Publication |
Mar-Apr 2005.
|
Summary/Abstract |
The terrorist attacks that took place on 16 May 2003 in Casablanca were a result of internal factors. These factors include the terrorists" view of their faith, poverty, and under-education. The links between the terrorists in Morocco and the Al Qaeda network, despite their ideological similarities, are not of a “command and control” nature. The relationship can be described as a franchise operation. The attacks resulted in the alienation of the population from movements attempting to use Islam in politics. Consequently, the attacks backfired on the Moroccan Islamist movement.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
060797
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
8 |
ID:
062440
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
060795
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
10 |
ID:
060374
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
11 |
ID:
060660
|
|
|
Publication |
Mar-Apr 2005.
|
Summary/Abstract |
Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predict imminent catastrophe. Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization segues well with the distrust and outright fear of computer technology. Many of these fears, the report contends, are exaggerated: not a single case of cyberterrorism has yet been recorded, hackers are regularly mistaken for terrorists, and cyberdefenses are more robust than is commonly supposed. Even so, the potential threat is undeniable and seems likely to increase, making it all the more important to address the danger without inflating or manipulating it.
|
|
|
|
|
|
|
|
|
|
12 |
ID:
060373
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
13 |
ID:
060460
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
14 |
ID:
060457
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
15 |
ID:
060407
|
|
|
Publication |
Mar-Apr 2005.
|
Summary/Abstract |
As a matter of policy, Washington is committed to supporting development in impoverished countries, and most Americans believe that it is following through. In fact, U.S. assistance for the world's poorest countries is utterly inadequate. Only a new international development strategy can rectify the situation. Continued failure will be too expensive, for the United States and the world.
|
|
|
|
|
|
|
|
|
|
16 |
ID:
062597
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
17 |
ID:
062594
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
18 |
ID:
060458
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|
19 |
ID:
060657
|
|
|
Publication |
Mar-Apr 2005.
|
Summary/Abstract |
A genealogy of the radical ideas that underline al-Qaeda"s justification for violence shows that the development of jihadi thought over the past several decades is characterized by the erosion of critical constraints used to limit warfare and violence in classical Islam. This erosion is illustrated by the evolution of jihadi arguments related to apostasy and waging jihad at home, global jihad, civilian targeting, and suicide bombings.
|
|
|
|
|
|
|
|
|
|
20 |
ID:
060455
|
|
|
Publication |
Mar-Apr 2005.
|
|
|
|
|
|
|
|
|
|