Query Result Set
Skip Navigation Links
   ActiveUsers:1563Hits:18401287Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SUBVERSION (16) answer(s).
 
SrlItem
1
ID:   158958


Bernard Fall and Vietnamese Revolutionary Warfare in Indochina / Moir, Nathaniel L   Journal Article
Moir, Nathaniel L Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article assesses Bernard Fall’s concept of Vietnamese Revolutionary Warfare in Indochina between 1953 and 1958. It also investigates differences in the conceptualization of Revolutionary Warfare between Fall and proponents of French military doctrine known as la guerre révolutionnaire. The last component of the article considers limits of Fall’s influence on counterinsurgency doctrine.
        Export Export
2
ID:   111149


Cyber war will not take place / Rid, Thomas   Journal Article
Rid, Thomas Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.
Key Words Espionage  Cyber Security  Information Operations  Subversion  Cyber War  Sabotage 
Stuxnet 
        Export Export
3
ID:   085156


destabilisation and subversion: new challenges / Singh, Darbara (ed) 1987  Book
Singh, Darbara Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Patriot Publishers, 1987.
Description 71 p.
Standard Number 8170500583
Key Words Subversion  Destabilisation 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
027918320.954/DAR;2 027918MainOn ShelfGeneral 
4
ID:   164186


If I only had a brain: Yip Harburg, J. Edgar Hoover, and the failures of FBI intelligence work / MacDonnell, Francis   Journal Article
MacDonnell, Francis Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract E. Y. Harburg, the lyricist behind The Wizard of Oz, remains one of the most important songwriters blacklisted during the Cold War. His removal from Hollywood features in the 1950s denied moviegoers a distinct American voice whose lyrics mixed humor and entertainment to champion liberal causes. From 1944–1972, Director J. Edgar Hoover and the Bureau’s major field offices investigated Harburg. His declassified FBI file shows institutionalized incompetence in the way the Bureau went about writing reports, evaluating evidence, making conclusions, and conducting counter-intelligence work. Harburg’s story illuminates the battle between the left and right to shape popular culture during the Cold War. Hoover and Harburg held opposing views on politics, religion, economics, and race. Yet both men shared a fervent faith in popular culture’s capacity to transform America. Together they vied to remake the nation according to their own distinct visions – Hoover’s fear of declension stood in contrast to Harburg’s hope for radical progress.
        Export Export
5
ID:   189279


Insurgency and subversion: an analysis of the modes of operation for understanding the attacks in Cabo Delgado, Mozambique / Njelezi, Mauro Tiago   Journal Article
Njelezi, Mauro Tiago Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Resulting from several social, political, economic and above all radical Islamic factors, the armed conflict in Cabo Delgado raised a variety of questions in the national and international system, among them the modus operandi of the group, now called Ahlu Sunnah Wa-Jammá. Thus, the present article analyses the way in which the modes of insurgency and subversion help to understand the modus operandi of the Ahlu Sunnah Wa-Jammá. For this purpose, a methodological study was established in which the semi-structured interview technique involved officers and documentary analysis for data collection. The results of the study show that the modus operandi of the Ahlu Sunnah Wa-Jammá is circumscribed to the organisation of numerous semi-autonomous cells which carry out guerrilla, terrorist and subversive actions. Furthermore, it was highlighted that the conflict was initiated by a minority of individuals subordinate to a radical religious ideology, and the objective of its operationalisation, until then, was carried out in three phases: preparatory, agitation and insurrection.
Key Words Insurgency  Subversion  Attack  Cabo Delgado  Operant Modes 
        Export Export
6
ID:   186905


Intertextuality and Subversion: Nezāmi in Modern Persian Literature / Werner, Christoph U   Journal Article
Werner, Christoph U Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This study proposes an innovative, triangular close reading of three Persian authors: Nezāmi, Golshiri, and Mandanipour. It argues that the two modern authors, Hushang Golshiri with his famous novella Shāh-e siyāhpushān, the “King of those clad in black,” and Shahriar Mandanipour in his Censoring an Iranian Love Story, are not only bound to each other in a close master-disciple relationship, but also consciously expound on the subversive potential of the twelfth-century poet Nezāmi. In the process, the divide between modern and classical narrative traditions in Persian literature is bound to disappear, allowing for novel interpretations and perspectives on Nezāmi and for his epics to be heard.
        Export Export
7
ID:   147713


Islamic State and the return of revolutionary warfare / Whiteside, Craig   Journal Article
Whiteside, Craig Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The rise of the Islamic State (ISIS/ISIL) is not well understood at this point. This paper starts by comparing the Islamic State to the Vietnamese communists in a revolutionary warfare framework and makes a causal argument that the Islamic State’s defeat of the Sahwa (Awakening) movement in Iraq was the key to its successful establishment of control of most Sunni areas and the mobilization of its population for support. Islamic State operational summaries and captured documents are used to quantitatively establish the impact of the subversion campaign against the Sahwa and Iraqi government and trace the efforts of operatives in tribal outreach and recruiting. This research provides a valuable insight into the return of a powerful method of insurgency as well as a glimpse into the vast clandestine network that provides the strength of the Islamic State movement.
        Export Export
8
ID:   111888


Maoist insurgency in India: between crime and revolution / Mahadevan, Prem   Journal Article
Mahadevan, Prem Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Since 2004, the Indian government has described the country's Maoist insurgency as a grave threat to domestic security. A study of the sustaining dynamics behind Maoist violence suggests that the rebels are growing operationally stronger due to profits derived from organized crime. Having built up a parasitic economy that operates within the boundaries of nominal state control, they are proceeding to undermine that same control. In effect, the Maoists have assumed characteristics of a Mafia group. With India's economic growth having surged in recent years, their ability to finance aggressive operations and consolidate their subversive infrastructure has increased correspondingly.
Key Words organized crime  Insurgency  Narcotics  Subversion  Corruption 
        Export Export
9
ID:   153735


Modeling an airspace trespasser at an important state facility protected by Russia's national guard troops / Arkhipov, V L ; Kurilov, A V; Chebotaryov, A N   Journal Article
V.L. ARKHIPOV, Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper outlines new possibilities of using drones (UAVs) illicitly with regard to major state facilities (MSF) protected by Russia's National Guard troops and formulates a system of views on likely categories of potential trespassers, which can serve a basis for research into modeling an MSF airspace intruder.
        Export Export
10
ID:   124325


National subversion of supranational goals: pork-barrel politics and EU regional aid / Bloom, Stephen; Petrova, Vladislava   Journal Article
Bloom, Stephen Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The structural funds were designed to give the European Commission supranational control over where regional aid was spent. In this article, we argue that domestic 'pork-barrel' politics determine which regions are awarded regional aid in the new member states of Eastern Europe. Support for our argument comes from a dataset that includes 1,688 European Regional Development Fund grants to Latvia's 118 regions and 1,533 pre-accession Phare awards to Bulgaria's 264 municipalities. In both Bulgaria and Latvia, we find that regional aid projects went to wealthier not poorer localities, and to those that supported coalition parties in the previous election.
        Export Export
11
ID:   190774


New and better quiet option? strategies of subversion and cyber conflict / Maschmeyer, Lennart   Journal Article
Maschmeyer, Lennart Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic thought has not kept pace. This article argues cyber conflict is subversive, builds on intelligence scholarship to identify strategies of subversion, and examines their applicability in cyber conflict. It distinguishes three subversive strategies: manipulation, erosion and overthrow. The analysis shows cyber operations can only implement one of these strategies (erosion), indicating they offer less strategic value than traditional counterparts. Accordingly, although cyber operations offer superior scale, I argue their scope of influence is more limited. Finally, the article discusses strategic implications and identifies possible counterstrategies.
Key Words Subversion  Cyber Conflict  Cybersecurity  Covert Operations  Strategy 
        Export Export
12
ID:   176023


Realism and great power subversion / Wohlforth, William C   Journal Article
Wohlforth, William C Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract I present a realist theory of subversion among great powers, an understudied phenomenon in the burgeoning literature on subversive statecraft. I show that a simple, rational cost-benefit calculus accounts for comparatively low-levels of subversion among non-belligerent great powers, much higher levels among belligerent great powers, and more frequent, violent and larger-scale subversion against weaker targets. Brief case studies of mid-twentieth century subversion featuring the Soviet Union and the United States illustrate the theory and provide preliminary support. Theory and evidence show that the conditions that are conducive to highly consequential subversion among great powers are quite limited and reversible. This gives rise to skepticism concerning claims that today’s strategic environment has fundamentally transformed the nature of great power rivalry so as to accord a newly central place to subversion.
        Export Export
13
ID:   169920


Striking Home: Ideal-Type of Terrorism / Aran, Gideon   Journal Article
Aran, Gideon Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This essay presents some preliminary notes in an anthropological perspective on terrorism. The following aims to be a questioning review of issues that haunt informed students of terrorism, and yet also an introductory text to the study of terrorism. It is revisionist but didactic. The essay is based on extended research of Palestinian and Israeli terrorism cases, and on critical integration of the literature on terrorism. It offers an alternative approach to the problem of the definition and distinct character of terrorism, expands on overlooked aspects of terrorism, like its relationship to the concept of “home,” emphasizes under-theorized subjects, like the randomness of the targets, and discusses hitherto untouched topics, like the “bad death” of terrorism’s victims. Terrorism is examined in terms of liminality and hybridity, and consequently as more subversive than coercive, threatening our ontological security no less than our physical security.
Key Words War  Terrorism  Subversion  Hybridity  Ideal-Type  Death 
Home  Sub-Culture 
        Export Export
14
ID:   160996


subversion of the Bulgarian defence system – the Russian way / Naydenov, Mihail   Journal Article
Naydenov, Mihail Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Russia has long been pursuing an intended and calculated policy of keeping enough influence in Bulgaria in order to have control over national decisions. Together with the economic, energy, political and information tools used by Russia in its hybrid war against Bulgaria and in its bid to achieve an enduring “state capture,” defence is also a distinct target of Russian subversion now. A list of noticeable subversive actions with tangible effects can be summarised, ranging from fuelling division and manipulating public opinion, preventing the strengthening of the NATO position in the Black Sea, sabotaging defence reform to various options of subverting the modernisation of the Bulgarian Armed Forces and seeking new ways to keep legacy Soviet military equipment in operation as long as possible. This issue must be urgently addressed both nationally and in NATO.
Key Words Armed Forces  Defence  Russia  Modernisation  Black Sea  Subversion 
Hybrid War  NAT  State Capture 
        Export Export
15
ID:   167295


Subversion, Statecraft and Liberal Democracy / Byrjalsen, Niels; Breitenbauch, Henrik   Journal Article
Breitenbauch, Henrik Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Even if liberal democracies generally disfavour subversion, some kinds of subversive efforts may be necessary.
Key Words Subversion  Liberal Democracy  Statecraft 
        Export Export
16
ID:   027256


World of secrets: uses and limits of intelligence / Laqueur, Walter 1985  Book
Laqueur, Walter Book
0 Rating(s) & 0 Review(s)
Publication London, WeidenFeld and Nicolson, 1985.
Description xii, 404p.
Standard Number 0297787454
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
027124327.12/LAQ 027124MainOn ShelfGeneral