Illuminating the dark arts of war: terrorism, sabotage, and subversion in homeland security and the new conflict
Since 9/11, the dominant view is that we have entered an era of new conflict in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the poss...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
New York [u.a.]
Continuum
2012
|
Schlagwörter: | |
Zusammenfassung: | Since 9/11, the dominant view is that we have entered an era of new conflict in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this new conflict argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and |
Beschreibung: | Cover; Halftitle; Title; Copyright; Contents; Introduction -- 1 Some aspects of political violence in America; Notes -- 2 Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3 Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4 Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5 Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6 The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Conclusion; Notes -- Conclusion; Notes; Bibliography; Index |
Umfang: | 272 p. 23 cm |
ISBN: | 9781441129550 9781441170699 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040233449 | ||
003 | DE-604 | ||
005 | 20120927 | ||
007 | t| | ||
008 | 120604s2012 xx |||| 00||| eng d | ||
020 | |a 9781441129550 |9 978-1-4411-2955-0 | ||
020 | |a 9781441170699 |9 978-1-4411-7069-9 | ||
035 | |a (OCoLC)796264544 | ||
035 | |a (DE-599)BVBBV040233449 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
100 | 1 | |a Tucker, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Illuminating the dark arts of war |b terrorism, sabotage, and subversion in homeland security and the new conflict |c David Tucker |
264 | 1 | |a New York [u.a.] |b Continuum |c 2012 | |
300 | |a 272 p. |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Cover; Halftitle; Title; Copyright; Contents; Introduction -- 1 Some aspects of political violence in America; Notes -- 2 Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3 Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4 Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5 Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6 The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Conclusion; Notes -- Conclusion; Notes; Bibliography; Index | ||
520 | |a Since 9/11, the dominant view is that we have entered an era of new conflict in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this new conflict argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and | ||
648 | 7 | |a Geschichte |2 gnd |9 rswk-swf | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Terrorismus | |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Subversion |0 (DE-588)4213485-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sabotage |0 (DE-588)4051131-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | 3 | |a Sabotage |0 (DE-588)4051131-5 |D s |
689 | 0 | 4 | |a Subversion |0 (DE-588)4213485-7 |D s |
689 | 0 | 5 | |a Geschichte |A z |
689 | 0 | |5 DE-604 | |
942 | 1 | 1 | |c 355.009 |e 22/bsb |g 73 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025089813 |
Datensatz im Suchindex
_version_ | 1818976346625277953 |
---|---|
any_adam_object | |
author | Tucker, David |
author_facet | Tucker, David |
author_role | aut |
author_sort | Tucker, David |
author_variant | d t dt |
building | Verbundindex |
bvnumber | BV040233449 |
ctrlnum | (OCoLC)796264544 (DE-599)BVBBV040233449 |
era | Geschichte gnd |
era_facet | Geschichte |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03194nam a2200481 c 4500</leader><controlfield tag="001">BV040233449</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120927 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120604s2012 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441129550</subfield><subfield code="9">978-1-4411-2955-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441170699</subfield><subfield code="9">978-1-4411-7069-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796264544</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040233449</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tucker, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Illuminating the dark arts of war</subfield><subfield code="b">terrorism, sabotage, and subversion in homeland security and the new conflict</subfield><subfield code="c">David Tucker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Continuum</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">272 p.</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Halftitle; Title; Copyright; Contents; Introduction -- 1 Some aspects of political violence in America; Notes -- 2 Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3 Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4 Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5 Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6 The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Conclusion; Notes -- Conclusion; Notes; Bibliography; Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since 9/11, the dominant view is that we have entered an era of new conflict in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this new conflict argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Subversion</subfield><subfield code="0">(DE-588)4213485-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sabotage</subfield><subfield code="0">(DE-588)4051131-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sabotage</subfield><subfield code="0">(DE-588)4051131-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Subversion</subfield><subfield code="0">(DE-588)4213485-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Geschichte</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="g">73</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025089813</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV040233449 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T16:10:23Z |
institution | BVB |
isbn | 9781441129550 9781441170699 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025089813 |
oclc_num | 796264544 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 272 p. 23 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Continuum |
record_format | marc |
spelling | Tucker, David Verfasser aut Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict David Tucker New York [u.a.] Continuum 2012 272 p. 23 cm txt rdacontent n rdamedia nc rdacarrier Cover; Halftitle; Title; Copyright; Contents; Introduction -- 1 Some aspects of political violence in America; Notes -- 2 Terrorism; Entrepreneurs and group psychology; Group dynamics and the limits of counterterrorism strategies; The strategic competition; The homegrown threat; Conclusion; Notes -- 3 Technology; Information technology; Chemical, biological, radiological, and nuclear weapons technology; Willingness to use CBRN weapons; Ability to use CBRN weapons; Conclusion; Notes -- 4 Sabotage; The American experience of sabotage; Lessons from the American experience of sabotage.Information technology and sabotageConclusion; Notes -- 5 Subversion; The American experience of subversion; Some lessons from experience; Conclusion; Notes -- 6 The clandestine threat, networks, and strategy; Differences among organizations; Advantages and disadvantages of different organizations; Decentralized organizations and the clandestine threat; Strategy; Conclusion; Notes -- Conclusion; Notes; Bibliography; Index Since 9/11, the dominant view is that we have entered an era of new conflict in which technology has empowered non-state actors who now pose unprecedented and unmanageable threats to U.S. national security. This unique work studies a range of threats, from homegrown and foreign terrorism to the possibility of cyber- or Chinese sabotage and fears of religious subversion to challenge every aspects of this new conflict argument and expose its underlying exaggerations and misunderstandings. Examining such issues as political violence, the role of religion in terrorism, the impact of technology, and Geschichte gnd rswk-swf Terrorism Terrorismus Bekämpfung (DE-588)4112701-8 gnd rswk-swf Subversion (DE-588)4213485-7 gnd rswk-swf Sabotage (DE-588)4051131-5 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s Sabotage (DE-588)4051131-5 s Subversion (DE-588)4213485-7 s Geschichte z DE-604 |
spellingShingle | Tucker, David Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict Terrorism Terrorismus Bekämpfung (DE-588)4112701-8 gnd Subversion (DE-588)4213485-7 gnd Sabotage (DE-588)4051131-5 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4112701-8 (DE-588)4213485-7 (DE-588)4051131-5 (DE-588)4059534-1 (DE-588)4078704-7 |
title | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict |
title_auth | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict |
title_exact_search | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict |
title_full | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict David Tucker |
title_fullStr | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict David Tucker |
title_full_unstemmed | Illuminating the dark arts of war terrorism, sabotage, and subversion in homeland security and the new conflict David Tucker |
title_short | Illuminating the dark arts of war |
title_sort | illuminating the dark arts of war terrorism sabotage and subversion in homeland security and the new conflict |
title_sub | terrorism, sabotage, and subversion in homeland security and the new conflict |
topic | Terrorism Terrorismus Bekämpfung (DE-588)4112701-8 gnd Subversion (DE-588)4213485-7 gnd Sabotage (DE-588)4051131-5 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Terrorism Terrorismus Bekämpfung Subversion Sabotage USA |
work_keys_str_mv | AT tuckerdavid illuminatingthedarkartsofwarterrorismsabotageandsubversioninhomelandsecurityandthenewconflict |