Query Result Set
Skip Navigation Links
   ActiveUsers:1437Hits:18364304Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
TERRORIST NETWORK (22) answer(s).
 
12Next
SrlItem
1
ID:   068196


Al-Qaeda online: understanding jihadist internet infrastructure / Lia, Brynjar   Journal Article
Lia, Brynjar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Key Words Terrorism  Jihad  Terrorist Network 
        Export Export
2
ID:   075679


Al-Qaeda's innovative improvisers: learning in adiffuse transnational network / Jones, Calvert   Journal Article
Jones, Calvert Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
3
ID:   062387


Al-Qa'ida-and expanded global network of terror / Ranstorp, Magnus Jun 2005  Journal Article
Ranstorp, Magnus Journal Article
0 Rating(s) & 0 Review(s)
Publication Jun 2005.
        Export Export
4
ID:   083701


Assessing the dangers of illicit networks: why al-Qaida may be less threatening than many think / Eilstrup-Sangiovanni, Mette; Jones, Calvert   Journal Article
Eilstrup-Sangiovanni, Mette Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Summary/Abstract Theoretical work on networked organization informs a large swathe of the current literature on international organized crime and terrorism in the field of international relations. Clandestine networks are portrayed as large, fluid, mobile, highly adaptable, and resilient. Many analysts have concluded that this makes them difficult for more stable, hierarchical states to combat. The prevailing mood of pessimism about the ability of states to combat illicit networks, however, may be premature. International relations scholars working in the area have often been too quick to draw parallels to the world of the firm, where networked organization has proven well adapted to the fast-moving global marketplace. They have consequently overlooked not only issues of community and trust but also problems of distance, coordination, and security, which may pose serious organizational difficulties for networks in general and for illicit networks in particular. Closer attention to a wider body of historical and contemporary research on dynamics of participation in underground movements, the life cycle of terrorism and insurgency, and vulnerabilities in organized crime reveals that clandestine networks are often not as adaptable or resilient as they are made out to be. An analysis of the al-Qaida network suggests that as al-Qaida adopts a more networked organization, it becomes exposed to a gamut of organizational dilemmas that threatens to reduce its unity, cohesion, and ability to act collectively.
        Export Export
5
ID:   080882


Connecting terrorist networks / Magouirk, Justin; Atran, Scott; Sageman, Marc   Journal Article
Atran, Scott Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Summary/Abstract This article highlights initial findings from the authors' Global Transnational Terrorism (GTT) Project, which began in August 2006. The case study draws on the database work for Southeast Asia and charts the rise of a militant minority within Jemaah Islamiyah, which was directly responsible for a series of attacks from 2000-2005. The important but restricted role of radical madrassahs and the importance of kinship emerge clearly from the study. On a more theoretical plane, the article shows how leadership "niches" opened up by unplanned events create contingent opportunities that lead to new developments.
        Export Export
6
ID:   133607


Cyber terrorism: electronic Jihad / Heickero, Roland   Journal Article
Heickero, Roland Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Cyber terrorism is a phenomenon that is gaining more and more attention. One reason for this is the concern that modern information and communications technology may be used in order to harm open societies. This concern also involves actual IT systems and the information generated being targets of advanced attacks. That way functions that are important to society could be affected. The term 'cyber terrorism' is complex. This article describes the difference between traditional and cyber terrorism. The main focus is on how the al-Qaeda terrorist network acts in cyberspace and how their change in concentration and activities has made them a clever player in an electronic Jihad.
        Export Export
7
ID:   133609


Cyberspace: the new strategic realm in US-China relations / Segal, Adam M   Journal Article
Segal, Adam M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security-in particular Chinese cyber espionage-was the defining issue of this unusual summit. For the US, the meeting between the two presidents was the culmination of a long campaign to pressure Beijing to reduce the scope and scale of Chinese cyber attacks on the United States.
        Export Export
8
ID:   137831


Deconstruccting Al Qaeda's terrorist network in India / Danish, Aersh   Article
Danish, Aersh Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Al Qaeda is characterised by a broad based ideology, a novel structure, a robust capacity for regeneration and a very diverse membership that cuts across ethnic, class and national boundaries. It is neither a single group nor a coalition of groups: it comprises a core base or bases in Afghanistan, satellite terrorist cells worldwide, a conglomerate of Islamist political parties, and other largely independent terrorist groups that it draws on for offensive actions and other responsibilities.
Key Words Terrorism  India  Al Qaeda  Terrorist Network  Terrorist Group  9/11 Attack 
        Export Export
9
ID:   021686


Do terrorist networks need a home? / Takeyh Ray March 2002  Article
Takeyh Ray Article
0 Rating(s) & 0 Review(s)
Publication March 2002.
Description 97-108
        Export Export
10
ID:   078960


end of war as we knew it? Insurgency, counterinsurgency and les / Arquilla, John   Journal Article
Arquilla, John Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Key Words Terrorism  Insurgency  Terrorist Network 
        Export Export
11
ID:   076943


Fighting networked terrorist groups: lessons from Israel / Jones, Seth G   Journal Article
Jones, Seth G Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract In Iraq and Afghanistan, the United States faced "networked" adversaries: insurgent groups that communicated and coordinated their political and military campaigns without a central command. The rise of networked groups is a direct result of the preponderance of U.S. military power. Consequently, this article asks: What strategies have been most effective in defeating networked groups? To answer this question, the article examines Israeli operations against Palestinian groups during Operation Defense Shield in 2002. It argues that the most effective strategy to defeat networked adversaries is to use networked strategies. In Israel, this meant establishing multiple units to penetrate Palestinian urban areas, swarm together from several directions, and kill or capture militants.
Key Words Israel  Terrorist Groups  United States  Terrorist Network 
        Export Export
12
ID:   076663


following the money trail: terrorist financing and government responese in Southeast Asia / Croissant, Aurel; Barlow, Daniel   Journal Article
Croissant, Aurel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
        Export Export
13
ID:   077786


Hofstad Group: the new face of terrorist networks in Europe / Vidino, Lorenzo   Journal Article
Vidino, Lorenzo Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract Between 2003 and 2006, members of the so-called Hofstad group planned various terrorist attacks inside the Netherlands, including the assassination of controversial filmmaker Theo van Gogh. Amateurish in its modus operandi and composed mostly of second-generation Muslim immigrants, Hofstad perfectly exemplifies the new terrorist networks that are growing in most European countries. Its perception of Europe as a battlefield of jihad, no less critical than Iraq or Afghanistan, signifies the break from the networks that operated in the continent in the 1990s. Its amorphous structure and lack of ties with international networks make Hofstad the quintessential example of the homegrown terrorism that is worrying European intelligence agencies.
Key Words Terrorism  Europe  Terrorist Network  Hofstad Group 
        Export Export
14
ID:   096429


Homeward bound: AQIM fails to strike western Europe / Marret, Jean - Luc   Journal Article
Marret, Jean - Luc Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words Al Qaeda  Terrorist Network  Europe Security  Islamic Maghreb  AQIM 
        Export Export
15
ID:   067057


Limits of terrorism: a network perspective / Matthew, Richard; Shambaugh, George 2005  Journal Article
Matthew, Richard Journal Article
0 Rating(s) & 0 Review(s)
Publication 2005.
        Export Export
16
ID:   056789


Looking for the pattern: Al Qaeda in Southeast Asia-The genealo / Jones, David Martin; Smith, Michael L R; Weeding, Mark   Journal Article
Jones, David Martin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2003.
        Export Export
17
ID:   133608


National perceptions of cyber threats / Lewis, James A   Journal Article
Lewis, James A Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The issue of cybersecurity as an issue for international security has captured the attention of policy makers around the world. A 2011 United Nations (UN) assessment found that only 68 of the 193 UN member states had cybersecurity programmes. By 2012, this had increased to 114 countries. Of the nations with cybersecurity programmes, roughly 40 have publicly identified cybersecurity as a military concern in national military strategies or defence white papers.
        Export Export
18
ID:   083300


Rain of terror on India / Sibal, Kanwal   Journal Article
Sibal, Kanwal Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Key Words Terrorism  India  Islamic Terrorism  Terrorist Network 
        Export Export
19
ID:   075626


Securing tri-border areas / Machain, Andrea; Greenwood, Gavin; Reeve, Richard   Journal Article
Reeve, Richard Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
20
ID:   060763


South Asian organized crime and terrorist networks / Lal, Rollie Spring 2005  Journal Article
Lal, Rollie Journal Article
0 Rating(s) & 0 Review(s)
Publication Spring 2005.
        Export Export
12Next