Ebook: Terrorism and Counterintelligence: How Terrorist Groups Elude Detection
Author: Blake W. Mobley
- Tags: Reference Test Preparation Almanacs Yearbooks Atlases Maps Careers Catalogs Directories Consumer Guides Dictionaries Thesauruses Encyclopedias Subject English as a Second Language Etiquette Foreign Study Genealogy Quotations Survival Emergency Preparedness Words Grammar Writing Research Publishing International World Politics Arms Control Diplomacy Security Trades Tariffs Treaties African Asian Australian Oceanian Canadian Caribbean Latin American European Middle Eastern Russian Former Soviet Un
- Series: Columbia Studies in Terrorism and Irregular Warfare
- Year: 2012
- Publisher: Columbia University Press
- Language: English
- pdf
Protecting information, identifying undercover agents, and operating clandestinely--efforts known as counterintelligence--are the primary objectives of terrorist groups evading detection by intelligence and law enforcement officials. Some strategies work well, some fail, and those tasked with tracking these groups are deeply invested in the difference.
Discussing the challenges terrorist groups face as they multiply and plot international attacks, while at the same time providing a framework for decoding the strengths and weaknesses of their counterintelligence, Blake W. Mobley provides an indispensable text for the intelligence, military, homeland security, and law enforcement fields. He outlines concrete steps for improving the monitoring, disruption, and elimination of terrorist cells, primarily by exploiting their mistakes in counterintelligence.
A key component of Mobley's approach is to identify and keep close watch on areas that often exhibit weakness. While some counterintelligence pathologies occur more frequently among certain terrorist groups, destructive bureaucratic tendencies, such as mistrust and paranoia, pervade all organizations. Through detailed case studies, Mobley shows how to recognize and capitalize on these shortcomings within a group's organizational structure, popular support, and controlled territory, and he describes the tradeoffs terrorist leaders make to maintain cohesion and power. He ultimately shows that no group can achieve perfect secrecy while functioning effectively and that every adaptation or new advantage supposedly attained by these groups also produces new vulnerabilities.