Terrorism and counter-intelligence : how terrorist groups elude detection
Author(s)
Bibliographic Information
Terrorism and counter-intelligence : how terrorist groups elude detection
(Columbia studies in terrorism and irregular warfare / Bruce Hoffman, series editor)
Columbia University Press, c2012
- cloth
- ebook
Available at / 3 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references and index
Contents of Works
- Introduction
- The Provisional Irish Republican Army
- Fatah and Black September
- Al Qa'ida
- The Egyptian Islamic Group
- Failure in embryonic terrorist groups
- Terrorism and counterintelligence
Description and Table of Contents
Description
Protecting information, identifying undercover agents, and operating clandestinely; efforts known as counterintelligence; are the primary objectives of terrorist groups who hope to evade detection by intelligence and law enforcement officials. Some strategies work well, some fail, and professionals tasked with tracking these groups are deeply invested in grasping the difference.Discussing the challenges terrorist groups face as they multiply and plot international attacks, while at the same time providing a framework for decoding the strengths and weaknesses of their counterintelligence, Blake W. Mobley offers an indispensable text for the intelligence, military, homeland security, and law enforcement fields. He outlines concrete steps for improving the monitoring, disruption, and elimination of terrorist cells, primarily by exploiting their mistakes in counterintelligence. A key component of his approach is to identify and keep close watch on areas that often exhibit weakness. While some counterintelligence pathologies occur more frequently among certain terrorist groups, destructive bureaucratic tendencies, such as mistrust and paranoia, pervade all organizations. Through detailed case studies, Mobley shows how to recognize and capitalize on these shortcomings within a group's organizational structure, popular support, and controlled territory, and he describes the tradeoffs terrorist leaders make to maintain cohesion and power. He ultimately shows that no group can achieve perfect secrecy while functioning effectively and that every adaptation or new advantage also produces new vulnerabilities.
by "Nielsen BookData"