共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
伊拉克局势从4月份以来发生了重大变化,美军遭到逊尼派和什叶派激进武装力量大规模的武装反抗,反抗美军占领的武装冲突从费卢杰和纳杰夫两地很快蔓延到伊拉克许多城市,仅仅4月份一个月就导致约140人美军死亡,成千上万伊拉克平民死伤. 相似文献
3.
4.
5.
6.
Erik J. Dahl 《冲突和恐怖主义研究》2013,36(8):621-648
While much of the focus of terrorism research is on successful terrorist attacks, the most significant lessons for terrorism prevention may come from examination of terrorist plots and attacks that do not succeed. This article analyzes 176 terrorist plots against American targets that have been thwarted or otherwise failed during the past 25 years. It considers what kinds of intelligence and security measures are most useful in counterterrorism, and argues that the conventional wisdom about why intelligence fails—because analysts and agencies are unable to “connect the dots”—is wrong. Most plots, especially domestic terrorist plots, are not foiled through imaginative analysis, but through conventional law enforcement efforts and aggressive domestic intelligence collection that reveal to authorities just what the plotters are up to. 相似文献
7.
8.
J.A. Emerson Vermaat 《冲突和恐怖主义研究》2013,36(4):329-335
Abstract The following remarks are excerpted from the 1987 Annual Conference on Domestic and International Terrorism sponsored by the Anti‐Defamation League of B'nai B'rith and the Leon and Marilyn Klinghoffer Foundation of the Anti‐Defamation League of B'nai B'rith, in cooperation with the Institute for Studies in International Terrorism at the State University of New York (SUNY) and the U.S. Global Strategy Council. The meeting was held on December 14, 1987 in Washington, D.C., and chaired by Professor Yonah Alexander of State University of New York and The George Washington University. 相似文献
9.
The conceptualization of terrorist groups as networks is increasingly common to terrorism studies, although methods of analysis vary widely. Contrary to common understandings, the integration of computational and qualitative methods is possible even with limited (small-n) data. The triangulation of different methods can produce insights overlooked by the use of any single method and validate findings across methods. This article demonstrates some of the possibilities for integrating qualitative and quantitative methods for network analysis using Raffaello Pantucci's recent article, “The Tottenham Ayatollah and The Hook-Handed Cleric: An Examination of All Their Jihadi Children.” 相似文献
10.
Hillel Frisch 《冲突和恐怖主义研究》2013,36(12):1049-1065
Existing literature is weak in explaining strategic change among terrorist movements, especially regarding the question of why these organizations often switch between contesting the external enemy, usually the government or the occupying power, and the internal arena in which they compete against fellow rebel groups. A rebel force facing diminishing returns from a formerly successful tactic with no equally effective tactical substitute in sight is likely to switch from conflict against a government to achieve dominance in the rebel camp. The terrorist movement will switch from the external to the internal arena even if such substitution compromises the overall goals of the rebel camp. The following article explores these dynamics in Hamas's strategy in the latest round of conflict between the movement and Israel. 相似文献
11.
12.
A methodology for converting terrorist networks from undirected graphs to simplified directed graphs (or digraphs), and mapping the flow of influence in them, is described. It is based on an “influence assumption”—that important persons with more links influence less important persons with fewer links. This methodology, which was previously used to analyze the structure of influence relationships in Communist-bloc countries and the international system, is illustrated by its application to two terrorist networks constructed after 9/11. In the second more complex network, the hierarchy sheds light on the leadership and likely terrorist cells embedded in the network. Refined data and alternative assumptions about influence could provide additional insights into the structure of terrorist networks. 相似文献
13.
Simon Haddad 《冲突和恐怖主义研究》2013,36(6):548-569
The objective of this study is to provide through an in-depth investigation of the Fatah Al-Islam organization, emergence, programs, and external links, and the inner operation of this underground Salafi-jihadi group. By divulging secret confession statements to the public, it has uncovered many of the mysteries that surrounded the evolution and goals of the group. On the other hand, and more important, it has examined the application of certain conventional approaches to the study of terrorist behavior. The findings, based on the biographies of FI terrorists, seem to negate much of the advanced explanation about political violence. Economic destitution, poverty, lack of education, young age, and marital disruption for instances do not determine adherence to the group. Members of the jihadi group of FI stem from a diversified occupational background, not lacking in education, mature, married, and influenced by various motivations, specifically religious dogma. 相似文献
14.
15.
16.
17.
LAWRENCE E. CLINE 《冲突和恐怖主义研究》2013,36(4):321-335
The most recent terrorist attacks in Turkey suggest a new phase in the country's war against terrorist groups. Although the PKK has largely been neutralized as a major threat to internal stability, the continued existence of other militant organizations--particularly Islamist groups who appear to be cooperating with elements of al Qaida--suggests continued security problems for the government.‐ 相似文献
18.
Oldrich Bures 《冲突和恐怖主义研究》2013,36(10):712-732
In several areas of the post-9/11 efforts to fight terrorism, private rather than public entities have shouldered the bulk of the burden. This has been especially the case in the fight against terrorist financing where private financial institution are legally obliged to monitor the billions of daily financial transactions and report the suspicious ones to public authorities for further investigation. Since private financial institutions are geared toward making profits and where the money has come from has traditionally not been of great interest to them, it is important to investigate how they have coped with these demanding requirements. 相似文献
19.
Lorenzo Vidino 《冲突和恐怖主义研究》2013,36(7):579-592
Between 2003 and 2006, members of the so-called Hofstad group planned various terrorist attacks inside the Netherlands, including the assassination of controversial filmmaker Theo van Gogh. Amateurish in its modus operandi and composed mostly of second-generation Muslim immigrants, Hofstad perfectly exemplifies the new terrorist networks that are growing in most European countries. Its perception of Europe as a battlefield of jihad, no less critical than Iraq or Afghanistan, signifies the break from the networks that operated in the continent in the 1990s. Its amorphous structure and lack of ties with international networks make Hofstad the quintessential example of the homegrown terrorism that is worrying European intelligence agencies. 相似文献