恐怖主义和反情报:恐怖组织如何躲避侦查

Q3 Arts and Humanities Parameters Pub Date : 2013-09-22 DOI:10.5860/choice.50-4099
Ross W. Clark
{"title":"恐怖主义和反情报:恐怖组织如何躲避侦查","authors":"Ross W. Clark","doi":"10.5860/choice.50-4099","DOIUrl":null,"url":null,"abstract":"[ILLUSTRATION OMITTED] Terrorism and Counterintelligence: How Terrorist Groups Elude Detection By Blake W. Mobley Combating terrorism has been the focal point of US policy following that fateful day on 11 September 2001. Many in both the academic and professional worlds often fail to realize the most prominent terrorist groups in media headlines are not backwoods ad hoc organizations. They are not the groups of disturbed children or adults attempting to find their place in society as some analysts tend to portray. Many of these organizations are, in fact, quite sophisticated, well-organized groups that control their members via opportunities for improved living standards and an agenda in line with the population's values at the time. Sophisticated organizations, both past and present, such as al Qaeda, the Provisional Irish Republican Army (PIRA), Egyptian Islamic Group (IG), and Fatah all use a variety of techniques described throughout this book to evade their adversaries' most effective counterintelligence methods, and it is these four groups the case studies represent. Terrorism and Counterintelligence: How Terrorist Groups Elude Detection examines the intricate webs that make a terrorist group successful, and begins its review by defining the words \"terrorism\" and \"counterintelligence.\" Academics and other professionals often disagree on the basic definitions of these broad and manipulative terms, which in turn cause problems in the thorough analysis and interpretation of the reasoning behind a group's actions. In a society with a plethora of definitions of terrorism and counterintelligence, the author does an exceptional job of defining these terms in line with the key underlining message of this book, which is to scrutinize the structure of these organizations and attempt to understand how they function from the inside out. The counterintelligence techniques used throughout the case studies include basic denial, adaptive denial, and covert manipulation. Basic denial includes training members of the group in basic counterintelligence techniques such as limited information of the telephone and internet networks and maintaining a low profile. Adaptive denial is adjusting the group's counterintelligence techniques to combat an adversary's intelligence methods; lastly, covert manipulation, uses double agents and false defectors to provide false information to the adversary. All these tactics prove useful and both the adversary and the terrorist group must create new forms of intelligence and counterintelligence techniques to combat older tactics. This book does not discuss specific terrorist plots or provide the reader with dramatic stories; it is rather a book with an in-depth focus on the inner workings of how terrorist cells relay information and the degree to which they keep their most sensitive information secret. …","PeriodicalId":35242,"journal":{"name":"Parameters","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Terrorism and Counterintelligence: How Terrorist Groups Elude Detection\",\"authors\":\"Ross W. Clark\",\"doi\":\"10.5860/choice.50-4099\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"[ILLUSTRATION OMITTED] Terrorism and Counterintelligence: How Terrorist Groups Elude Detection By Blake W. Mobley Combating terrorism has been the focal point of US policy following that fateful day on 11 September 2001. Many in both the academic and professional worlds often fail to realize the most prominent terrorist groups in media headlines are not backwoods ad hoc organizations. They are not the groups of disturbed children or adults attempting to find their place in society as some analysts tend to portray. Many of these organizations are, in fact, quite sophisticated, well-organized groups that control their members via opportunities for improved living standards and an agenda in line with the population's values at the time. Sophisticated organizations, both past and present, such as al Qaeda, the Provisional Irish Republican Army (PIRA), Egyptian Islamic Group (IG), and Fatah all use a variety of techniques described throughout this book to evade their adversaries' most effective counterintelligence methods, and it is these four groups the case studies represent. Terrorism and Counterintelligence: How Terrorist Groups Elude Detection examines the intricate webs that make a terrorist group successful, and begins its review by defining the words \\\"terrorism\\\" and \\\"counterintelligence.\\\" Academics and other professionals often disagree on the basic definitions of these broad and manipulative terms, which in turn cause problems in the thorough analysis and interpretation of the reasoning behind a group's actions. In a society with a plethora of definitions of terrorism and counterintelligence, the author does an exceptional job of defining these terms in line with the key underlining message of this book, which is to scrutinize the structure of these organizations and attempt to understand how they function from the inside out. The counterintelligence techniques used throughout the case studies include basic denial, adaptive denial, and covert manipulation. Basic denial includes training members of the group in basic counterintelligence techniques such as limited information of the telephone and internet networks and maintaining a low profile. Adaptive denial is adjusting the group's counterintelligence techniques to combat an adversary's intelligence methods; lastly, covert manipulation, uses double agents and false defectors to provide false information to the adversary. All these tactics prove useful and both the adversary and the terrorist group must create new forms of intelligence and counterintelligence techniques to combat older tactics. This book does not discuss specific terrorist plots or provide the reader with dramatic stories; it is rather a book with an in-depth focus on the inner workings of how terrorist cells relay information and the degree to which they keep their most sensitive information secret. …\",\"PeriodicalId\":35242,\"journal\":{\"name\":\"Parameters\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Parameters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5860/choice.50-4099\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Arts and Humanities\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Parameters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5860/choice.50-4099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Arts and Humanities","Score":null,"Total":0}
引用次数: 13

摘要

《恐怖主义与反情报:恐怖组织如何躲避侦查》布莱克·w·莫布里2001年9月11日那灾难性的一天之后,打击恐怖主义一直是美国政策的焦点。学术界和专业领域的许多人往往没有意识到,媒体头条上最突出的恐怖组织并不是偏远地区的临时组织。他们并不是像一些分析人士所描述的那样,是一群试图在社会中找到自己位置的精神失常的儿童或成年人。事实上,这些组织中有许多是相当复杂的、组织良好的团体,它们通过提高生活水平的机会和符合当时人民价值观的议程来控制其成员。过去和现在的复杂组织,如基地组织、临时爱尔兰共和军(PIRA)、埃及伊斯兰组织(IG)和法塔赫,都使用了本书中描述的各种技术来逃避对手最有效的反情报方法,而案例研究所代表的正是这四个组织。恐怖主义和反情报:恐怖组织如何逃避侦查考察了使恐怖组织成功的错综复杂的网络,并从定义“恐怖主义”和“反情报”这两个词开始审查。学者和其他专业人士经常对这些宽泛的、操纵性的术语的基本定义持不同意见,这反过来又导致了对群体行为背后的原因进行彻底分析和解释的问题。在一个对恐怖主义和反间谍有过多定义的社会中,作者在定义这些术语方面做得非常出色,符合本书的关键强调信息,即仔细审查这些组织的结构,并试图了解它们是如何从内到外运作的。整个案例研究中使用的反情报技术包括基本否认、适应性否认和秘密操纵。基本拒绝包括对该组织成员进行基本反间谍技术的培训,例如限制电话和互联网网络的信息,并保持低调。适应性拒绝是调整该组织的反情报技术,以对抗对手的情报方法;最后,秘密操作,使用双重间谍和假叛逃者向对手提供虚假信息。所有这些战术都被证明是有用的,对手和恐怖组织都必须创造新的情报和反情报技术形式来对抗旧的战术。这本书没有讨论具体的恐怖阴谋,也没有为读者提供戏剧性的故事;相反,这本书深入探讨了恐怖组织传递信息的内部运作方式,以及他们对最敏感信息的保密程度。...
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
[ILLUSTRATION OMITTED] Terrorism and Counterintelligence: How Terrorist Groups Elude Detection By Blake W. Mobley Combating terrorism has been the focal point of US policy following that fateful day on 11 September 2001. Many in both the academic and professional worlds often fail to realize the most prominent terrorist groups in media headlines are not backwoods ad hoc organizations. They are not the groups of disturbed children or adults attempting to find their place in society as some analysts tend to portray. Many of these organizations are, in fact, quite sophisticated, well-organized groups that control their members via opportunities for improved living standards and an agenda in line with the population's values at the time. Sophisticated organizations, both past and present, such as al Qaeda, the Provisional Irish Republican Army (PIRA), Egyptian Islamic Group (IG), and Fatah all use a variety of techniques described throughout this book to evade their adversaries' most effective counterintelligence methods, and it is these four groups the case studies represent. Terrorism and Counterintelligence: How Terrorist Groups Elude Detection examines the intricate webs that make a terrorist group successful, and begins its review by defining the words "terrorism" and "counterintelligence." Academics and other professionals often disagree on the basic definitions of these broad and manipulative terms, which in turn cause problems in the thorough analysis and interpretation of the reasoning behind a group's actions. In a society with a plethora of definitions of terrorism and counterintelligence, the author does an exceptional job of defining these terms in line with the key underlining message of this book, which is to scrutinize the structure of these organizations and attempt to understand how they function from the inside out. The counterintelligence techniques used throughout the case studies include basic denial, adaptive denial, and covert manipulation. Basic denial includes training members of the group in basic counterintelligence techniques such as limited information of the telephone and internet networks and maintaining a low profile. Adaptive denial is adjusting the group's counterintelligence techniques to combat an adversary's intelligence methods; lastly, covert manipulation, uses double agents and false defectors to provide false information to the adversary. All these tactics prove useful and both the adversary and the terrorist group must create new forms of intelligence and counterintelligence techniques to combat older tactics. This book does not discuss specific terrorist plots or provide the reader with dramatic stories; it is rather a book with an in-depth focus on the inner workings of how terrorist cells relay information and the degree to which they keep their most sensitive information secret. …
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Parameters
Parameters Social Sciences-Social Sciences (miscellaneous)
CiteScore
0.60
自引率
0.00%
发文量
55
期刊最新文献
Was the Russian Invasion of Ukraine a Failure of Western Deterrence? Contributor's Guidelines From the Editor in Chief Ukraine’s Lessons for Future Combat: Unmanned Aerial Systems and Deep Strike Parameters 2023-24 Winter Demi-Issue
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1