Srl | Item |
1 |
ID:
174637
|
|
|
Summary/Abstract |
Rapoport's conceptualization of the last, religious wave of four global waves remains highly influential. But it, and other typologies, have placed too little emphasis on the influence of information and communication technologies (ICTs) on the evolution of global jihadist activities. This article makes two new contributions by developing both a new ICT-based typology for understanding jihadist evolutions, and by focusing on successful attacks. Our central argument is that ICTs’ impact on global jihadism has facilitated dramatic transformations of its strategy, organization and tactics since the 1990s, and that these can be understood as four overlapping iterations. ‘Jihadism 1.0’ describes the hierarchical, top-down directed and overseas financed and trained terrorist organizations that conducted iconic attacks at the turn of the millennium. Jihadism has since evolved into ‘Jihadism 2.0’ and then ‘Jihadism 3.0’. Jihadism 2.0 recognizes that a number of smaller, coordinated attacks can have a global impact. Jihadism 3.0 is inspired terrorism that has no links to the central terror organization, utilizing individuals and crude tactics. Finally, jihadism is evolving toward ‘Jihadism 4.0’, or cyberterrorism. We argue this typology provides a useful basis for scholars and practitioners to conceptualize the ICT dynamics influencing global jihadism, and these may be applicable to other global terrorists. The conclusion analyses how counter-terrorism services can respond to these evolutions and charts areas for future research.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
087662
|
|
|
Publication |
2009.
|
Summary/Abstract |
One of the most formidable challenges of this new century concerns the realm of identity. Across the globe, personal identity remains our most valuable asset. Today, more than ever before, unscrupulous and dangerous individuals driven by a variety of motives are attempting to steal the identities of others, conceal their own identities and create new and fraudulent identities.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
176260
|
|
|
Summary/Abstract |
In this article, Patrick Bury and Michael Chertoff argue that the re-emergence of near-peer competition and the increasing complexity and pace of events in the next decade mean that Western services must improve their strategic intelligence collection, analysis and information exchange to focus on increasing strategic threats. Simultaneously, the continuing evolution of terrorism will require counterterrorism intelligence to also adapt.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
086825
|
|
|
Publication |
2009.
|
Summary/Abstract |
As the United States marked the seventh anniversary of the 9/11 attacks and fifth anniversary of the cration of the Department of Homeland Security (DHS), one of the most urgent tasks remained the continued proteciton of the nation's critical infrastructure. Since its principal function is to protect the antion, government has a vital role to play. But what kind of role shold this entail.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
085696
|
|
|
Summary/Abstract |
International law must find a way to combat modern threats, but it cannot diminish U.S. sovereignty in doing so.
|
|
|
|
|
|
|
|
|
|