Query Result Set
Skip Navigation Links
   ActiveUsers:561Hits:20066577Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CHERTOFF, MICHAEL (5) answer(s).
 
SrlItem
1
ID:   174637


Bytes not waves: information communication technologies, global jihadism and counterterrorism / Chertoff, Michael ; Richterova, Daniela ; Bury, Patrick   Journal Article
Chertoff, Michael Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Rapoport's conceptualization of the last, religious wave of four global waves remains highly influential. But it, and other typologies, have placed too little emphasis on the influence of information and communication technologies (ICTs) on the evolution of global jihadist activities. This article makes two new contributions by developing both a new ICT-based typology for understanding jihadist evolutions, and by focusing on successful attacks. Our central argument is that ICTs’ impact on global jihadism has facilitated dramatic transformations of its strategy, organization and tactics since the 1990s, and that these can be understood as four overlapping iterations. ‘Jihadism 1.0’ describes the hierarchical, top-down directed and overseas financed and trained terrorist organizations that conducted iconic attacks at the turn of the millennium. Jihadism has since evolved into ‘Jihadism 2.0’ and then ‘Jihadism 3.0’. Jihadism 2.0 recognizes that a number of smaller, coordinated attacks can have a global impact. Jihadism 3.0 is inspired terrorism that has no links to the central terror organization, utilizing individuals and crude tactics. Finally, jihadism is evolving toward ‘Jihadism 4.0’, or cyberterrorism. We argue this typology provides a useful basis for scholars and practitioners to conceptualize the ICT dynamics influencing global jihadism, and these may be applicable to other global terrorists. The conclusion analyses how counter-terrorism services can respond to these evolutions and charts areas for future research.
Key Words Counterterrorism  ICT  Global Jihadism 
        Export Export
2
ID:   087662


Managing identity: a global challenge / Chertoff, Michael   Journal Article
Chertoff, Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract One of the most formidable challenges of this new century concerns the realm of identity. Across the globe, personal identity remains our most valuable asset. Today, more than ever before, unscrupulous and dangerous individuals driven by a variety of motives are attempting to steal the identities of others, conceal their own identities and create new and fraudulent identities.
Key Words United States  Security Problem  Identity Fraud  Managing 
        Export Export
3
ID:   176260


New Intelligence Strategies for a New Decade / Bury, Patrick; Chertoff, Michael   Journal Article
Chertoff, Michael Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In this article, Patrick Bury and Michael Chertoff argue that the re-emergence of near-peer competition and the increasing complexity and pace of events in the next decade mean that Western services must improve their strategic intelligence collection, analysis and information exchange to focus on increasing strategic threats. Simultaneously, the continuing evolution of terrorism will require counterterrorism intelligence to also adapt.
        Export Export
4
ID:   086825


Preserving infrastructure: a 21st century challenge / Chertoff, Michael   Journal Article
Chertoff, Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract As the United States marked the seventh anniversary of the 9/11 attacks and fifth anniversary of the cration of the Department of Homeland Security (DHS), one of the most urgent tasks remained the continued proteciton of the nation's critical infrastructure. Since its principal function is to protect the antion, government has a vital role to play. But what kind of role shold this entail.
Key Words Security  United States  Homeland Security  Infrastructure 
        Export Export
5
ID:   085696


Responsibility to contain: protecting sovereignty under international law / Chertoff, Michael   Journal Article
Chertoff, Michael Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract International law must find a way to combat modern threats, but it cannot diminish U.S. sovereignty in doing so.
Key Words Sovereignty  United States  International Law 
        Export Export