Free and Discounted Ebooks
Join 150,000 readers! Get our ebook deals straight to your inbox.

National Strategy for Combating Terrorism

February 2003

Cover image for


Published: 2003
Language: English
Wordcount: 11,545 / 46 pg
Flesch-Kincaid Reading Ease: 28.2
LoC Category: HV
Downloads: 2,607
Added to site: 2009.06.22 24508

groups. In this environment, terrorists work together in funding, sharing intelligence, training, logistics, planning, and executing attacks. Terrorist groups with objectives in one country or region can draw strength and support from groups in other countries or regions. For example, in 2001, three members of the Irish Republican Army were arrested in Colombia, suspected of training the FARC in how to conduct an urban bombing campaign. The connections between al-Qaida and terrorist groups throughout Southeast Asia further highlight this reality. The terrorist threat today is both resilient and diffuse because of this mutually reinforcing, dynamic network structure.

Figure 2 is representative of how terrorists and terrorist organizations operate on three levels. At the first level are those terrorist organizations that operate primarily within a single country. Their reach is limited, but in this global environment their actions can have international consequences. Such state-level groups may



Join 150,000+ fellow readers! Get Free eBooks and book bargains from ManyBooks in your inbox. 

We respect your email privacy

login | register

User ID


reset password

Author of the Day

Andrew Updegrove
When Andrew Updegrove isn't writing or predicting the next cyber-disaster, he's likely to be roaming the back country of the American southwest in his Jeep, scouting out settings for his next book. More than thirty years of experience as an attorney representing technology companies also serves as a great source of inspiration. As our Author of the Day, Updegrove chats about his journey as an author, reveals how some of the scenarios described in his books actually came true and talks about cybersecurity and how vulnerable we are.
Read full interview...