Narrow your search

Library

NATO Library (4)

UAntwerpen (2)

UCLouvain (2)

KU Leuven (1)

UGent (1)

VUB (1)


Resource type

book (4)


Language

English (4)


Year
From To Submit

2022 (4)

Listing 1 - 4 of 4
Sort by

Book
The Evolution of Counter-Terrorism since 9/11 : Understanding the Paradigm Shift in Liberal Democracies
Author:
ISBN: 9781032035741 9781003188018 9781032035772 1032035749 100318801X 1000450104 1000450171 100318801X 1032035773 Year: 2022 Publisher: Abingdon, UK : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines the evolution of counter-terrorism (CT) policies in liberal democracies since 2001, with a specific focus on the case of Belgium. What is counter-terrorism (CT) ? While the answer to this question may seem self-evident, it has become quite complicated to define the contours of a field that has expanded dramatically in the two decades since the 9/11 attacks. The development of 'softer' policies, dealing with the prevention of radicalisation, have blurred the limits of CT. Through the use of public policy theory and an in-depth case study on Belgium, the book identifies the key factors influencing CT policy-making, both domestically and internationally, and offers an explanation for the development of a more comprehensive CT agenda across Europe. It provides an innovative theoretical approach and is also based on extensive interviews with key counter-terrorism officials and analysis of key policy documents. The book concludes by identifying some key drivers of change and offers an embryonic theory of CT policy-making.


Book
The Practice and Problems of Transnational Counter-Terrorism
Author:
ISBN: 9781139137010 9781107022737 Year: 2022 Publisher: Cambridge University Press, 2022

Loading...
Export citation

Choose an application

Bookmark

Abstract

The world has a problem with counter-terrorism. Since 2001 a transnational counter-terrorism order has emerged of such scale, scope, reach, and significance that the Secretary General of the United Nations could describe it as "a comprehensive, multilateral counter-terrorism architecture at the global, regional and national levels". This architecture is now firmly established as a seemingly immovable part of the global governance landscape, characterized by an institutional and normative sprawl that embeds it across a remarkable range of transnational activities


Book
The US War Against ISIS : How America and Its Allies Defeated the Caliphate 
Author:
ISBN: 9780755634804 Year: 2022 Publisher: London : I. B. Tauris,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The war against ISIS is often explained through the group's own rise to power. The American side of the story has not yet been told. This book records how the United States and its allies chose to fight the group, what the consequences have been for transatlantic relations, and how these factors may shape future wars the West decides to pursue. The author shows what mistakes were made in the war against ISIS and what happens when a narrow policy focus on counter terrorism is pursued at the expense of almost all wider regional security and political concerns.


Book
Spies, lies, and algorithms : the history and future of American intelligence
Author:
ISBN: 9780691147130 9780691223087 0691147132 0691223084 Year: 2022 Publisher: Princeton: Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Spying has never been more ubiquitous--or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington's Revolutionary War spies to today's spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America's intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare. A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today. [Provided by publisher]

Keywords

INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America

Listing 1 - 4 of 4
Sort by