|
Showing 1 - 6 of
6 matches in All Departments
Origins of Terrorism: The Rise of the World's Most Formidable
Terrorist Groups examines the roots of Islamic terrorism, it's
history, and some of the foundational figures in prominent
terrorist organizations. Throughout, the book also addresses the
use of terrorism, the "hows" and "whys" of terrorists' goals, and
their modus operandi. Historically, insurgency operations have
formed the basis of a number of terrorist groups-resistance to
western powers, particularly the United States, and what is viewed
as their unwanted interference in regional affairs. Sections are
devoted to individual terror organizations, including some of the
most well-known and resilient global movements-Al Qaeda, ISIS, the
Taliban, and Boko Haram, among others. Coverage details where and
how they originated, who the principal organizers were, how these
individuals worked-or didn't work-together. In this, the authors
look at the circumstances that allowed for these leaders, and their
groups', development and success. In this, the authors expose
interesting, little-known stories and facts about the specific
upbringing, family life, and personal narrative around these
organizations' founders, as well as ties to other terrorist
founders and organizations. For example, the relationship between
individuals such as Osama bin Laden and Musab al Zarkawi (aka Ahmad
al-Khalayleh)-the founder of 'Al Qaeda in Iraq' (AQI), which became
ISIS-is examined in detail, providing readers with some of the
"stories behind the stories" to understand the prominent figures
and underpinnings of major terrorist organizations' philosophies,
formation, and elements that have led to their staying power.
Origins of Terrorism will be a valuable resource for security and
intelligence professionals, terrorism researchers, and students,
providing a unique perspective to understand terrorism and terror
movements in considering counterterror efforts.
Origins of Terrorism: The Rise of the World's Most Formidable
Terrorist Groups examines the roots of Islamic terrorism, it's
history, and some of the foundational figures in prominent
terrorist organizations. Throughout, the book also addresses the
use of terrorism, the "hows" and "whys" of terrorists' goals, and
their modus operandi. Historically, insurgency operations have
formed the basis of a number of terrorist groups-resistance to
western powers, particularly the United States, and what is viewed
as their unwanted interference in regional affairs. Sections are
devoted to individual terror organizations, including some of the
most well-known and resilient global movements-Al Qaeda, ISIS, the
Taliban, and Boko Haram, among others. Coverage details where and
how they originated, who the principal organizers were, how these
individuals worked-or didn't work-together. In this, the authors
look at the circumstances that allowed for these leaders, and their
groups', development and success. In this, the authors expose
interesting, little-known stories and facts about the specific
upbringing, family life, and personal narrative around these
organizations' founders, as well as ties to other terrorist
founders and organizations. For example, the relationship between
individuals such as Osama bin Laden and Musab al Zarkawi (aka Ahmad
al-Khalayleh)-the founder of 'Al Qaeda in Iraq' (AQI), which became
ISIS-is examined in detail, providing readers with some of the
"stories behind the stories" to understand the prominent figures
and underpinnings of major terrorist organizations' philosophies,
formation, and elements that have led to their staying power.
Origins of Terrorism will be a valuable resource for security and
intelligence professionals, terrorism researchers, and students,
providing a unique perspective to understand terrorism and terror
movements in considering counterterror efforts.
There are a limited number of intelligence analysis books available
on the market. Intelligence Analysis Fundamentals is an
introductory, accessible text for college level undergraduate and
graduate level courses. While the principles outlined in the book
largely follow military intelligence terminology and practice,
concepts are presented to correlate with intelligence gathering and
analysis performed in law enforcement, homeland security, and
corporate and business security roles. Most of the existing texts
on intelligence gathering and analysis focus on specific types of
intelligence such as 'target centric' intelligence, and many of
these, detail information from a position of prior knowledge. In
other words, they are most valuable to the consumer who has a
working-level knowledge of the subject. The book is general enough
in nature that a lay student-interested in pursuing a career in
intelligence, Homeland Security, or other related areas of law
enforcement-will benefit from it. No prior knowledge of
intelligence analysis, functions, or operations is assumed.
Chapters illustrate methods and techniques that, over the years,
have consistently demonstrate results, superior to those achieved
with other means. Chapters describe such analytical methods that
are most widely used in the intelligence community and serve as
recognized standards and benchmarks in the practice of intelligence
analysis. All techniques have been selected for inclusion for their
specific application to homeland security, criminal investigations,
and intelligence operations. Uses numerous hands-on activities-that
can easily be modified by instructors to be more or less
challenging depending on the course level-to reinforce concepts As
current and active members of the intelligence community, the
authors draw on their decades of experience in intelligence to
offer real-world examples to illustrate concepts All methodologies
reflect the latest trends in the intelligence communities
assessment, analysis, and reporting processes with all presented
being open source, non-classified information As such, the
non-sensitive information presented is appropriate-and methods
applicable-for use for education and training overseas and
internationally Military-style collection and analysis methods are
the primary ones presented, but all are directly correlated
intelligence to current concepts, functions and practices within
Homeland Security and the law communities Covers the
counterterrorism environment where joint operations and
investigative efforts combine military, private sector, and law
enforcement action and information sharing The book will be a
welcome addition to the body of literature available and a widely
used reference for professionals and students alike.
There are a limited number of intelligence analysis books available
on the market. Intelligence Analysis Fundamentals is an
introductory, accessible text for college level undergraduate and
graduate level courses. While the principles outlined in the book
largely follow military intelligence terminology and practice,
concepts are presented to correlate with intelligence gathering and
analysis performed in law enforcement, homeland security, and
corporate and business security roles. Most of the existing texts
on intelligence gathering and analysis focus on specific types of
intelligence such as 'target centric' intelligence, and many of
these, detail information from a position of prior knowledge. In
other words, they are most valuable to the consumer who has a
working-level knowledge of the subject. The book is general enough
in nature that a lay student-interested in pursuing a career in
intelligence, Homeland Security, or other related areas of law
enforcement-will benefit from it. No prior knowledge of
intelligence analysis, functions, or operations is assumed.
Chapters illustrate methods and techniques that, over the years,
have consistently demonstrate results, superior to those achieved
with other means. Chapters describe such analytical methods that
are most widely used in the intelligence community and serve as
recognized standards and benchmarks in the practice of intelligence
analysis. All techniques have been selected for inclusion for their
specific application to homeland security, criminal investigations,
and intelligence operations. Uses numerous hands-on activities-that
can easily be modified by instructors to be more or less
challenging depending on the course level-to reinforce concepts As
current and active members of the intelligence community, the
authors draw on their decades of experience in intelligence to
offer real-world examples to illustrate concepts All methodologies
reflect the latest trends in the intelligence communities
assessment, analysis, and reporting processes with all presented
being open source, non-classified information As such, the
non-sensitive information presented is appropriate-and methods
applicable-for use for education and training overseas and
internationally Military-style collection and analysis methods are
the primary ones presented, but all are directly correlated
intelligence to current concepts, functions and practices within
Homeland Security and the law communities Covers the
counterterrorism environment where joint operations and
investigative efforts combine military, private sector, and law
enforcement action and information sharing The book will be a
welcome addition to the body of literature available and a widely
used reference for professionals and students alike.
Following the Text Offensive, a shift in U.S. naval strategy in
1967-1968 saw young men fresh out of high school policing the
canals and tributaries of South Vietnam aboard PBRs (patrol boat,
riverine)--unarmored yet heavily armed and highly maneuverable
vessels designed to operate in shallow, weedy waterways. This
memoir recounts the experiences of the author and his shipmates as
they cruised the Viet Cong-occupied backwaters of the Mekong Delta,
and their emotional metamorphosis as wartime events shaped the men
they would be for the remainder of their lives.
|
|