Understanding Terror Networks / / Marc Sageman.

For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) ta...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection
VerfasserIn:
Place / Publishing House:Philadelphia : : University of Pennsylvania Press, , [2011]
©2004
Year of Publication:2011
Language:English
Online Access:
Physical Description:1 online resource (232 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780812206791
ctrlnum (DE-B1597)449303
(OCoLC)794702289
collection bib_alma
record_format marc
spelling Sageman, Marc, author. aut http://id.loc.gov/vocabulary/relators/aut
Understanding Terror Networks / Marc Sageman.
Philadelphia : University of Pennsylvania Press, [2011]
©2004
1 online resource (232 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- ONE. The Origins of the Jihad -- TWO. The Evolution of the Jihad -- THREE. The Mujahedin -- FOUR. Joining the Jihad -- FIVE. Social Networks and the Jihad -- Conclusion -- Appendix: Names of Terrorists -- Glossary of Foreign Terms -- Bibliography -- Index -- Acknowledgments
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) target the West, but their operations mercilessly slaughter thousands of people of all races and religions throughout the world. Marc Sageman challenges conventional wisdom about terrorism, observing that the key to mounting an effective defense against future attacks is a thorough understanding of the networks that allow these new terrorists to proliferate.Based on intensive study of biographical data on 172 participants in the jihad, Understanding Terror Networks gives us the first social explanation of the global wave of activity. Sageman traces its roots in Egypt, gestation in Afghanistan during the Soviet-Afghan war, exile in the Sudan, and growth of branches worldwide, including detailed accounts of life within the Hamburg and Montreal cells that planned attacks on the United States.U.S. government strategies to combat the jihad are based on the traditional reasons an individual was thought to turn to terrorism: poverty, trauma, madness, and ignorance. Sageman refutes all these notions, showing that, for the vast majority of the mujahedin, social bonds predated ideological commitment, and it was these social networks that inspired alienated young Muslims to join the jihad. These men, isolated from the rest of society, were transformed into fanatics yearning for martyrdom and eager to kill. The tight bonds of family and friendship, paradoxically enhanced by the tenuous links between the cell groups (making it difficult for authorities to trace connections), contributed to the jihad movement's flexibility and longevity. And although Sageman's systematic analysis highlights the crucial role the networks played in the terrorists' success, he states unequivocally that the level of commitment and choice to embrace violence were entirely their own.Understanding Terror Networks combines Sageman's scrutiny of sources, personal acquaintance with Islamic fundamentalists, deep appreciation of history, and effective application of network theory, modeling, and forensic psychology. Sageman's unique research allows him to go beyond available academic studies, which are light on facts, and journalistic narratives, which are devoid of theory. The result is a profound contribution to our understanding of the perpetrators of 9/11 that has practical implications for the war on terror.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)
Middle Eastern.
POLITICAL SCIENCE / Security (National & International). bisacsh
African Studies.
Anthropology.
Asian Studies.
Folklore.
Linguistics.
Middle Eastern Studies.
Political Science.
Psychology.
Public Policy.
Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection 9783110413458
Title is part of eBook package: De Gruyter Penn Press eBook Package Law & Political Science 9783110413526
Title is part of eBook package: De Gruyter University of Pennsylvania Backlist eBook-Package 2000-2013 9783110459548
print 9780812238082
https://doi.org/10.9783/9780812206791
https://www.degruyter.com/isbn/9780812206791
Cover https://www.degruyter.com/document/cover/isbn/9780812206791/original
language English
format eBook
author Sageman, Marc,
Sageman, Marc,
spellingShingle Sageman, Marc,
Sageman, Marc,
Understanding Terror Networks /
Frontmatter --
Contents --
Preface --
ONE. The Origins of the Jihad --
TWO. The Evolution of the Jihad --
THREE. The Mujahedin --
FOUR. Joining the Jihad --
FIVE. Social Networks and the Jihad --
Conclusion --
Appendix: Names of Terrorists --
Glossary of Foreign Terms --
Bibliography --
Index --
Acknowledgments
author_facet Sageman, Marc,
Sageman, Marc,
author_variant m s ms
m s ms
author_role VerfasserIn
VerfasserIn
author_sort Sageman, Marc,
title Understanding Terror Networks /
title_full Understanding Terror Networks / Marc Sageman.
title_fullStr Understanding Terror Networks / Marc Sageman.
title_full_unstemmed Understanding Terror Networks / Marc Sageman.
title_auth Understanding Terror Networks /
title_alt Frontmatter --
Contents --
Preface --
ONE. The Origins of the Jihad --
TWO. The Evolution of the Jihad --
THREE. The Mujahedin --
FOUR. Joining the Jihad --
FIVE. Social Networks and the Jihad --
Conclusion --
Appendix: Names of Terrorists --
Glossary of Foreign Terms --
Bibliography --
Index --
Acknowledgments
title_new Understanding Terror Networks /
title_sort understanding terror networks /
publisher University of Pennsylvania Press,
publishDate 2011
physical 1 online resource (232 p.)
Issued also in print.
contents Frontmatter --
Contents --
Preface --
ONE. The Origins of the Jihad --
TWO. The Evolution of the Jihad --
THREE. The Mujahedin --
FOUR. Joining the Jihad --
FIVE. Social Networks and the Jihad --
Conclusion --
Appendix: Names of Terrorists --
Glossary of Foreign Terms --
Bibliography --
Index --
Acknowledgments
isbn 9780812206791
9783110413458
9783110413526
9783110459548
9780812238082
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6431 ǂB S23 2004EB
callnumber-sort HV 46431 _B S23 42004EB
url https://doi.org/10.9783/9780812206791
https://www.degruyter.com/isbn/9780812206791
https://www.degruyter.com/document/cover/isbn/9780812206791/original
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 300 - Social sciences, sociology & anthropology
dewey-ones 303 - Social processes
dewey-full 303.625
dewey-sort 3303.625
dewey-raw 303.625
dewey-search 303.625
doi_str_mv 10.9783/9780812206791
oclc_num 794702289
work_keys_str_mv AT sagemanmarc understandingterrornetworks
status_str n
ids_txt_mv (DE-B1597)449303
(OCoLC)794702289
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection
Title is part of eBook package: De Gruyter Penn Press eBook Package Law & Political Science
Title is part of eBook package: De Gruyter University of Pennsylvania Backlist eBook-Package 2000-2013
is_hierarchy_title Understanding Terror Networks /
container_title Title is part of eBook package: De Gruyter Penn Press eBook Package Complete Collection
_version_ 1806143363087335424
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06104nam a22008655i 4500</leader><controlfield tag="001">9780812206791</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220424125308.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220424t20112004pau fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979576885</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780812206791</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.9783/9780812206791</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)449303</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794702289</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">pau</subfield><subfield code="c">US-PA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431 ǂb S23 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">303.625</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sageman, Marc, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding Terror Networks /</subfield><subfield code="c">Marc Sageman.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Philadelphia : </subfield><subfield code="b">University of Pennsylvania Press, </subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (232 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">ONE. The Origins of the Jihad -- </subfield><subfield code="t">TWO. The Evolution of the Jihad -- </subfield><subfield code="t">THREE. The Mujahedin -- </subfield><subfield code="t">FOUR. Joining the Jihad -- </subfield><subfield code="t">FIVE. Social Networks and the Jihad -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Appendix: Names of Terrorists -- </subfield><subfield code="t">Glossary of Foreign Terms -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">Acknowledgments</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) target the West, but their operations mercilessly slaughter thousands of people of all races and religions throughout the world. Marc Sageman challenges conventional wisdom about terrorism, observing that the key to mounting an effective defense against future attacks is a thorough understanding of the networks that allow these new terrorists to proliferate.Based on intensive study of biographical data on 172 participants in the jihad, Understanding Terror Networks gives us the first social explanation of the global wave of activity. Sageman traces its roots in Egypt, gestation in Afghanistan during the Soviet-Afghan war, exile in the Sudan, and growth of branches worldwide, including detailed accounts of life within the Hamburg and Montreal cells that planned attacks on the United States.U.S. government strategies to combat the jihad are based on the traditional reasons an individual was thought to turn to terrorism: poverty, trauma, madness, and ignorance. Sageman refutes all these notions, showing that, for the vast majority of the mujahedin, social bonds predated ideological commitment, and it was these social networks that inspired alienated young Muslims to join the jihad. These men, isolated from the rest of society, were transformed into fanatics yearning for martyrdom and eager to kill. The tight bonds of family and friendship, paradoxically enhanced by the tenuous links between the cell groups (making it difficult for authorities to trace connections), contributed to the jihad movement's flexibility and longevity. And although Sageman's systematic analysis highlights the crucial role the networks played in the terrorists' success, he states unequivocally that the level of commitment and choice to embrace violence were entirely their own.Understanding Terror Networks combines Sageman's scrutiny of sources, personal acquaintance with Islamic fundamentalists, deep appreciation of history, and effective application of network theory, modeling, and forensic psychology. Sageman's unique research allows him to go beyond available academic studies, which are light on facts, and journalistic narratives, which are devoid of theory. The result is a profound contribution to our understanding of the perpetrators of 9/11 that has practical implications for the war on terror.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 24. Apr 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Middle Eastern.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National &amp; International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">African Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Anthropology.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Asian Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Folklore.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linguistics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Middle Eastern Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political Science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Psychology.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Public Policy.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Penn Press eBook Package Complete Collection</subfield><subfield code="z">9783110413458</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Penn Press eBook Package Law &amp; Political Science</subfield><subfield code="z">9783110413526</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">University of Pennsylvania Backlist eBook-Package 2000-2013</subfield><subfield code="z">9783110459548</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780812238082</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.9783/9780812206791</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780812206791</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780812206791/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041345-8 Penn Press eBook Package Complete Collection</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041352-6 Penn Press eBook Package Law &amp; Political Science</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-045954-8 University of Pennsylvania Backlist eBook-Package 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>