Subversion as a Facet of Terrorism and Insurgency The Case for a Twenty-First Century Approach; Strategic Insights: v.8, issue 3 (August 2009)
MetadataShow full item record
For most analysts (to the extent they consider the subject at all), subversion as a threat essentially evaporated with the close of the Cold War. A notable exception is David Kilcullen, a leading counterinsurgency strategist, who recently outlined what he terms the 'five classes of threat that currently confront Europe,' namely, terrorist cells, subversive networks, extremist political movements, insurgent sympathiser networks, and crime overlapping with terrorism. In order to understand the dynamics of this complex and shifting threat, he offers a new definition of subversion, as 'the conscious, clandestine manipulation of grievances, short of armed conflict, in order to weaken states, communities and organisations.'
This article appeared in Strategic Insights (August 2009), v.8 no.3
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Marryott, Ronald F. (American University, 1965-01);International Communism has adopted the policy to subversion as the most effective and inexpensive means of winning peoples and territories. In the Western Hemisphere, Fidel Castro's Cuba is the regional center for ...
Rogers, David T. (Monterey, California. Naval Postgraduate School, 2003-06);The subversion technique of attacking an operating system is often overlooked in information security. Operating Systems are vulnerable throughout their lifecycle in that small artifices can be inserted into an operating ...
Anderson, Emory A.; Irvine, Cynthia E.; Schell, Roger R. (Monterey, California. Naval Postgraduate School, 2004-06-00);As adversaries develop Information Warfare capabilities, the threat of information system subversion presents a significant risk. System subversion will be defined and characterized as a warfare tool. Through recent security ...