Starting on September 11th, 2012, al-Qa'ida carried out a series of terrorist attacks on the U.S. Consulate and CIA Annex in Benghazi, Libya, killing four Americans, including U.S. Ambassador Christopher Stevens. With over 150 attackers at the Consulate alone, the attack was the largest terrorist attack on a U.S. diplomatic mission in history. And yet, the case remained unsolved. The terrorists were never brought to justice because they had not been identified until now.
Two former Central Intelligence Agency (CIA) Officers involved in the Libyan crisis before, during, and after the attacks decided they would not allow an al-Qa'ida terrorist attack to become a cold case. Inside these pages, you will find a first-hand account of the attacks showcasing the terrorists involved. For the first time, they open their files into a self-funded, open-source investigation into the perpetrators. Drawing on their extensive experience and knowledge of the region, to offer a unique and valuable perspective on the events.
This important and timely book provides crucial insights into a tragedy as the CIA Officers share their findings with the reader. The hope is to honor the memory of those killed by exposing and bringing justice to the real enemies of the United States.
2020 Facsimile of the 1999 Edition. Unrestricted Warfare is a book on military strategy written in 1999 by two colonels in the People's Liberation Army. Its primary concern is how a nation such as the People's Republic of China can defeat a technologically superior opponent (such as the United States) through a variety of strategies. Rather than focusing on direct military confrontation, this book instead examines a variety of other means. Such means include using International Law (see Lawfare) and a variety of economic means to place one's opponent in a weakened position and circumvent the need for direct military action.
Of the various strategies discussed perhaps the most relevant is that of attacking networks. Networks are increasingly important in not only data exchange but also transportation, financial institutions, and communication. Attacks that disable networks can easily hamstring large areas of life that are dependent on them for coordination. One example of network warfare would be shutting down a network that supplies power. If there is a significant failure in the power grid caused by the attack, massive power outages could result, crippling industry, defense, medicine, and all other areas of life.
The English translation of the book was made available by the Foreign Broadcast Information Service in 1999. Errors in translations are the sole responsibility of the Foreign Broadcast Information Service and not of Albatross Publishing.
2020 Hardcover Facsimile of the 1999 Edition. Unrestricted Warfare is a book on military strategy written in 1999 by two colonels in the People's Liberation Army. Its primary concern is how a nation such as the People's Republic of China can defeat a technologically superior opponent (such as the United States) through a variety of strategies. Rather than focusing on direct military confrontation, this book instead examines a variety of other means. Such means include using International Law (see Lawfare) and a variety of economic means to place one's opponent in a weakened position and circumvent the need for direct military action.
Of the various strategies discussed perhaps the most relevant is that of attacking networks. Networks are increasingly important in not only data exchange but also transportation, financial institutions, and communication. Attacks that disable networks can easily hamstring large areas of life that are dependent on them for coordination. One example of network warfare would be shutting down a network that supplies power. If there is a significant failure in the power grid caused by the attack, massive power outages could result, crippling industry, defense, medicine, and all other areas of life.
The English translation of the book was made available by the Foreign Broadcast Information Service in 1999. Errors in translations are the sole responsibility of the Foreign Broadcast Information Service and not of Albatross Publishing.
Shocking acts of terrorism have erupted from violent American far-right extremists in recent years, including the 2015 mass murder at a historic Black church in Charleston and the January 6, 2021, attack on the U.S. Capitol. These incidents, however, are neither novel nor unprecedented. They are the latest flashpoints in a process that has been unfolding for decades, in which vast conspiracy theories and radical ideologies such as white supremacism, racism, antisemitism, xenophobia, and hostility to government converge into a deadly threat to democracy.
God, Guns, and Sedition offers the definitive account of the rise of far-right terrorism in the United States--and how to counter it. Leading experts Bruce Hoffman and Jacob Ware trace the historical trajectory and assess the present-day dangers of this violent extremist movement, along with the harm it poses to U.S. national security. They combine authoritative, nuanced analysis with gripping storytelling and portraits of the leaders behind this violence and their followers. Hoffman and Ware highlight key terrorist tactics, such as the use of cutting-edge communications technology; the embrace of leaderless resistance or lone-wolf strategies; infiltration and recruitment in the military and law enforcement; and the movement's intricate relationship with mainstream politics. An unparalleled examination of one of today's great perils, God, Guns, and Sedition ends with an array of essential practical recommendations to halt the growth of violent far-right extremism and address this global terrorist threat.This book provides practitioners and analysts in the field with effective tools for conducting analysis of terrorist groups and other violent substate groups. Free from unnecessary jargon and presented in a user-friendly format, the book offers analytical perspectives and techniques that are practical as well as intellectually rigorous; accessible and instantly applicable, while also based on solid social science theory and methodology. Part handbook, part reference book, it identifies the major obstacles to effective analysis, examines the most commonly used interpretations of terrorism, and goes on to present a unified model for analysis. This model, based on insights from social psychology, is highly adaptive and can be applied by the analyst to violent substate groups across the ideological and geographical spectrum. The final chapter contains a number of such applications ways of doing analysis using real examples to which the reader can refer for clarification and guidance.
A Practitioner's Way Forward: Terrorism Analysis is essential reading for anyone seeking to understand and analyze terrorism. Authoritative and clear, the book is equally useful both as an instructional guide and reference work. Its commendably straightforward approach and authoritative imparting of information make it the single most reliable source for law enforcement personnel, first responders, and other professionals engaged in the investigation, research, and analysis of terrorism.
-- Professor Bruce Hoffman, Director, Center for Security Studies, Georgetown University
This book will make you stop and level set your thinking. It is remarkable particularly for those at the state and local level charged with countering terrorism, and even more so for those assigned to fusion centers who are required to think critically on this subject because it moves well beyond the traditional frames for assessing terrorists and terrorism this book provides a methodology for understanding terrorism by first recognizing and interpreting intergroup behavior.
-- Ray Guidetti, Law Enforcement veteran and former Vice President of the National Fusion Center Association
A Practitioner s Way Forward is a powerful tool for counterterrorism practitioners. It is eminently readable and impressively substantive, and provides a thoughtful way for practitioners to think about terrorism, conduct analysis, and utilize methodologically-sophisticated approaches. It is also widely accessible: user-friendly for the beginner, but rigorous enough for the advanced analyst.
-- Seth G. Jones, author of Hunting in the Shadows: The Pursuit of al Qa ida Since 9/11
This is one of the rare books on analytical tradecraft that has relevance to the challenges facing domestic law enforcement today the research provides the practitioner a guide to help construct, explain and potentially predict the intent and actions of our modern day adversary.
-- Michael McClary, Assistant Sheriff (Ret), Law Enforcement Investigations & Homeland Security, Las Vegas Metropolitan Police Department
Bruce Hoffman's Inside Terrorism has remained the seminal work for understanding the historical evolution of terrorism and the terrorist mind-set. In this revised third edition of his classic text, Hoffman analyzes the latest developments in global terrorism, offering insight into new adversaries, motivations, strategies, and tactics. He focuses on the rise of ISIS and the resilience of al-Qaeda; terrorist exploitation of the Internet and embrace of social media; radicalization of foreign fighters; and potential future trends, including the repercussions of a post-caliphate ISIS.
Hoffman examines the demographics of contemporary terrorist leaders and recruits; the continued use of suicide bombers; and the likelihood of a chemical, biological, radiological, or nuclear terrorist strike. He also considers the resurgence of violent antigovernment militants, including white supremacists and opponents of abortion. He argues that the war on terrorism did not end with Osama bin Laden's death and that ongoing instability and strife in Syria, Iraq, Afghanistan, Libya, and Yemen, among other places, will both sustain terrorist movements and have broad implications for domestic and international security around the globe.We recommend it to you, highly. This is an important book and it is one that I think that everyone should be reading.
--Lou Dobbs
Details the immediate danger America now faces...how the battle for the heart and soul of America is now being fought on American soil!
--U.S. Representative Ralph Norman
A nationally recognized security expert reveals the REAL Terrorist threat from the U.S. Southern Border and already INSIDE America. Terrorists on the Border and in Our Country reveals how radical, left-wing, liberal politicians and woke, progressive, defund-the-police, and stop-the-wall, nation-wrecking policies caused this crisis and the steps the country must take to combat crime, protect the homeland and its citizens and stop the growing existential challenge to Amercian freedoms and way of life.
Charles Marino outlines how and why Biden's open border policies will ultimately destroy America from the Rio Grande up.
Some of the catastrophic problems created, enabled, or increased by weak borders include:
Marino offers his expert recommendations--a step-by-step corrective and desperately needed policy roadmap--on how America can be saved. Before it's too late.
THE THREAT IS NOT JUST ON THE BORDER, IT IS ALREADY HERE.
You won't be able to stop reading once you pick up Dr. John Hall's terrifying account, A New Breed: Satellite Terrorism in America. Dr. Hall's narration is based on true-life events and what you'll find will open your eyes to a completely new form of terrorism. Dr. Hall has treated numerous patients who have complained about voices in their heads, eventually being driven to a form of serious psychosis. In his book, he describes his relationship with his significant other, Mallory, a young, attractive woman with a bright future. Upon beginning a new profession, Mallory was suddenly struck down by unexplainable happenings: mind control, surveillance, stalking, and rape. Hall and others sacrificed themselves and their careers to bring her nightmare to an end. What happened to Mallory and what is happening to countless others? Hall's supposition is that we are faced with a type of terrorism that is unseen but just as deadly. Our government satellite surveillance systems are a new way for criminals to gain possession not only of our financial lives, but our most precious resource: Our minds. What can we do and who are these individuals who are trying to control the way the think, feel, act and what we do?
Veiled Threats challenges the idea that women in violent terrorist groups lack agency. Too often, these women are assumed to be controlled by men: their fathers, their husbands, or some other male relative. Mia Bloom contests this narrow understanding. Although extremist groups often control different aspects of women's lives, including their religious obligations or dress, jihadi women have asserted themselves in myriad ways. Bloom interrogates the prevailing perceptions about women's involvement in violent extremism exclusively as victims: manipulated, drugged, or coerced. Following her pioneering work on women in Bombshell, Bloom lifts the veil of the secret world of women in jihadi groups to provide a nuanced and complex explanation of their motivations and challenge misperceptions about women's agency.
Veiled Threats explores the range of roles of the women involved in jihad--not only across secular and religious groups but within affiliated religious groups--and examines how these extremist groups have used rape as a weapon of war. Bloom explains how women are used and abused, deployed and destroyed, and the many ways in which their roles in terrorism have evolved over the past three decades.
After two decades and trillions of dollars, the United States' fight against terrorism has achieved mixed results. Despite the vast resources and attention expended since 9/11, terrorism has increased in many societies that have been caught up in the war on terror. Why have U.S. policies been unable to stem the tide of violence?
Harrison Akins reveals how the war on terror has had the unintended consequence of increasing domestic terrorism in U.S. partner states. He examines the results of U.S.-backed counterterrorism operations that targeted al-Qaeda in peripheral regions of partner states, over which their central governments held little control. These operations often provoked a violent backlash from local terrorist groups, leading to a spike in retaliatory attacks against partner states. Senior U.S. officials frequently failed to grasp the implications of the historical conflict between central governments and the targeted peripheries. Instead, they exerted greater pressure on partner states to expand their counterterrorism efforts. This exacerbated the underlying conditions that drove the escalating attacks, trapping these governments in a deadly cycle of tit-for-tat violence with local terrorist groups. This process, Akins demonstrates, accounts for the lion's share of the al Qaeda network's global terrorist activity since 2001. Drawing on extensive primary sources--including newly declassified documents, dozens of in-depth interviews with leading government officials in the United States and abroad, and statistical analysis--The Terrorism Trap is a groundbreaking analysis of why counterterrorism has backfired.This fascinating new study shows how the CIA and the British secret service, in collaboration with the military alliance NATO and European military secret services, set up a network of clandestine anti-communist armies in Western Europe after World War II.
These secret soldiers were trained on remote islands in the Mediterranean and in unorthodox warfare centres in England and in the United States by the Green Berets and SAS Special Forces. The network was armed with explosives, machine guns and high-tech communication equipment hidden in underground bunkers and secret arms caches in forests and mountain meadows. In some countries the secret army linked up with right-wing terrorist who in a secret war engaged in political manipulation, harrassement of left wing parties, massacres, coup d'états and torture.
Codenamed 'Gladio' ('the sword'), the Italian secret army was exposed in 1990 by Italian Prime Minister Giulio Andreotti to the Italian Senate, whereupon the press spoke of The best kept, and most damaging, political-military secret since World War II (Observer, 18. November 1990) and observed that The story seems straight from the pages of a political thriller. (The Times, November 19, 1990). Ever since, so-called 'stay-behind' armies of NATO have also been discovered in France, Spain, Portugal, Germany, Belgium, the Netherlands, Luxemburg, Denmark, Norway, Sweden, Finland, Switzerland, Austria, Greece and Turkey. They were internationally coordinated by the Pentagon and NATO and had their last known meeting in the NATO-linked Allied Clandestine Committee (ACC) in Brussels in October 1990.