- Table View
- List View
Examines al-Qaeda??s evolution and the emergence of the broader global jihadist movement-groups affiliated, associated, or inspired by al-Qaeda-and the threat that they pose to the United States and U.S. allies and interests. The authors conclude by setting out a four-pronged strategy to counter the jihadist threat.
Examines violent terrorist groups that, while not formally allied with al-Qaeda, could pose a threat to Americans now or in the future and to the security of our friends and allies. The authors show how terrorists use criminal organizations and connections to finance their activities, and they identify distinct strategies to neutralize or mitigate these threats.
Radical and dogmatic interpretations of Islam have gained ground in recent years in many Muslim societies via extensive Islamist networks spanning the Muslim world and the Muslim diaspora communities of North America and Europe. Although a majority throughout the Muslim world, moderates have not developed similar networks to amplify their message and to provide protection from violence and intimidation. With considerable experience fostering networks of people committed to free and democratic ideas during the Cold War, the United States has a critical role to play in leveling the playing field for Muslim moderates. The authors derive lessons from the U.S. and allied Cold War network-building experience, determine their applicability to the current situation in the Muslim world, assess the effectiveness of U.S. government programs of engagement with the Muslim world, and develop a "road map" to foster the construction of moderate Muslim networks.
Daunting challenges lie ahead for Arab countries where revolutions have upended longstanding authoritarian regimes. This monograph aims to help policymakers understand the challenges ahead, form well-founded expectations, shape diplomatic approaches, and take practical steps to foster positive change.
Measures to prevent vulnerable individuals from radicalizing and to rehabilitate those who have already embraced Islamist extremism have been implemented in several Middle Eastern, Southeast Asian, and European countries. This monograph describes and assesses the strengths and weaknesses of these programs and proposes steps that can be taken to promote and accelerate deradicalization processes.
Throughout history, factors of radicalization have involved social and economic conditions and issues of identity. Patterns of Islamist radicalization in Europe reflect the historical experience of European Muslim communities, particularly their links to their home countries, the prevalence of militant groups there, and the extent to which factors of radicalization in Muslim countries transfer to European Muslim diasporas. Eurojihad examines the sources of radicalization in Muslim communities in Europe and the responses of European governments and societies. In an effort to understand the scope and dynamics of Islamist extremism and terrorism in Europe, this book takes into account recent developments, in particular the emergence of Syria as a major destination of European jihadists. Angel Rabasa and Cheryl Benard describe the history, methods and evolution of jihadist networks in Europe with particular nuance, providing a useful primer for the layperson and a sophisticated analysis for the expert.
This book identifies the procedures and capabilities that the U.S. Department of Defense, other agencies of the U.S. government, U.S. allies and partners, and international organizations require in order to support the transition from counterinsurgency, when the military takes primary responsibility for security and economic operations, to stability and reconstruction, when police and civilian government agencies take the lead.
This book examines six case studies of insurgencies from around the world to determine the key factors necessary for a successful transition from counterinsurgency to a more stable situation. The authors review the causes of each insurgency and the key players involved, and examine what the government did right--or wrong--to bring the insurgency to an end and to transition to greater stability.
Indonesia, the world's fourth most populous country, is undergoing a profound transformation that could lead to a variety of outcomes, from the consolidation of democracy to return to authoritarianism or military rule, to radical Islamic rule, or to violent disintegration. The stakes are high, for Indonesia is the key to Southeast Asian security. The authors examine the trends and dynamics that are driving Indonesia's transformation, outline possible strategic futures and their implications for regional stability, and identify options the United States might pursue in the critical challenge of influencing Indonesia's future course. Steps the United States might take now include support for Indonesia's stability and territorial integrity, reestablishment of Indonesian-U.S. military cooperation and interaction, aid in rebuilding a constructive Indonesian role in regional security, and support for development of a regional crisis reaction force. A continued strong U.S. presence in the Asia-Pacific region will reinforce the U.S. role as regional balancer.
This study of the Mumbai, India, terrorist attack of November 2008 identifies the operational and tactical capabilities displayed by the terrorists and evaluates the response of the Indian security forces, with the goal of helping counterterrorism authorities in India and elsewhere to prepare for or counter future terrorist attacks on urban centers.
The military is one of the few institutions that cut across the divides of Indonesian society. As it continues to play a critical part in determining Indonesia's future, the military itself is undergoing profound change. The authors of this book examine the role of the military in politics and society since the fall of President Suharto in 1998. They present several strategic scenarios for Indonesia, which have important implications for U.S.-Indonesian relations, and propose goals for Indonesian military reform and elements of a U.S. engagement policy.
Six historic counterinsurgency (COIN) operations are examined to determine which tactics, techniques, and procedures led to success and which to failure. The Philippines, Algeria, Vietnam, El Salvador, Jammu and Kashmir, and Colombia were chosen for their varied characteristics relating to geography, historical era, outcome, type of insurgency faced, and level of U.S. involvement. Future U.S. COIN operations can learn from these past lessons.
Momentous events since September 11, 2001-Operation Enduring Freedom, the global war on terrorism, and the war in Iraq-have dramatically altered the political environment of the Muslim world. Many of the forces influencing this environment, however, are the products of trends that have been at work for many decades. This book examines the major dynamics that drive changes in the religio-political landscape of the Muslim world-a vast and diverse region that stretches from Western Africa through the Middle East to the Southern Philippines and includes Muslim communities and diasporas throughout the world-and draws the implications of these trends for global security and U.S. and Western interests. It presents a typology of ideological tendencies in the different regions of the Muslim world and identifies the factors that produce religious extremism and violence. It assesses key cleavages along sectarian, ethnic, regional, and national lines and examines how those cleavages generate challenges and opportunities for the United States. Finally, the authors identify possible strategies and political and military options for the United States to pursue in response to changing conditions in this critical and volatile part of the world.
American geopolitical interests and the potential threats to those interests are both on the rise in East Africa. The author places the spread of militant Islamism and the development of radical Islamist networks in East Africa in the broader context of the social, economic, and political factors that have shaped the region's security environment.
Turkey, a Muslim-majority country, is pivotal to Western security interests in the Middle East. Its ruling party, the AKP, has Islamic roots but operates within a framework of strict secular democracy, which has generated controversy over the boundaries between secularism and religion. This monograph describes the politico-religious landscape in Turkey and evaluates how the balance between secular and religious forces has changed over the past decade.
Using a two-tiered framework areas applied to eight case studies from around the globe, the authors of this ground-breaking work seek to understand the conditions that give rise to ungoverned territories and make them conducive to a terrorist or insurgent presence. They also develop strategies to improve the U.S. ability to mitigate their effects on U.S. security interests.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.