Buch, Englisch, 318 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 664 g
Reihe: Perspectives on Development in the Middle East and North Africa (MENA) Region
Ideological Foundations and Operational Methods
Buch, Englisch, 318 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 664 g
Reihe: Perspectives on Development in the Middle East and North Africa (MENA) Region
ISBN: 978-3-031-24743-9
Verlag: Springer Nature Switzerland
This book analyzes the ideological roots, structures and operational methods of Jihadi intelligence and counterintelligence activities. Based on a substantive collection of data on terrorist attacks, communication channels, recruitment methods, manuals and statements released by various Jihadi groups, it examines and compares the nature, ideology and realities of Jihadi intelligence operations. The author, an expert on Jihadist ideology and paramilitary intelligence, compares the modus operandi of terrorist groups such as al-Qaeda and the IS with those of governmental intelligence agencies, and subsequently analyzes the role of historical and religious narratives that help Jihadist groups justify their actions and military management. Further topics covered include encryption, counterfeiting, covert operations and Jihadi intelligence activities in the digital realm. The insights shared here will allow readers to gain a comprehensive understanding of Jihadist groups and their intelligence operations, while helping practitioners and policymakers develop better counterterrorism activities and counternarratives.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Glossary of Terms.- Introduction.- Strategic Intelligence Background.- Collection Sources.- Intelligence Analysis and “Lessons Learned”.- The Three Levels of Jihadi Warfare – The Interrelation of Jihadi Operational Art and Jihadi Intelligence.- The “Urtext” of Jihadi Intelligence Culture.- The First Islamic State and its Intelligence Services.- Jihadi Intelligence and Epistemology.- Counterintelligence.- Encryption and Secret Communication Counterfeiting.- Safe Houses.- Covert Operations.- Economic Warfare and Destabilisation.- The Elimination of the Greyzone as a Jihadi Covert Operation.- Jihadi Intelligence Activities in the Digital Realm.- Conclusion.- Bibliography.