{"id":15681,"date":"2019-06-04T14:00:58","date_gmt":"2019-06-04T17:00:58","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/?p=15681"},"modified":"2019-06-04T10:32:25","modified_gmt":"2019-06-04T13:32:25","slug":"terrorism-tactics-and-transformation","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/livros\/terrorism-tactics-and-transformation\/","title":{"rendered":"Terrorism, Tactics, and Transformation"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15682\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-content\/uploads\/2019\/06\/terrorism-tactics-and-transformation.jpg\" alt=\"Terrorism, Tactics, and Transformation\" width=\"145\" height=\"187\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-content\/uploads\/2019\/06\/terrorism-tactics-and-transformation.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-content\/uploads\/2019\/06\/terrorism-tactics-and-transformation-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Katherine Zimmerman<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor American Enterprise Institute<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> America&#8217;s counterterrorism strategy risks becom- ing irrelevant to the new reality. It misconcep-tualizes the enemy as a set of discrete groups and individuals to defeat and kill. It wrongly emphasizes a kinetic approach to addressing the threats these groups pose to American interests and the homeland. It underestimates the importance of the Salafi-jihadimovement that persists beyond the defeat of specific threat groups. It does not account for the global move-ment\u2019s reprioritization of its efforts since the outbreak of conflict in the post\u2013Arab Spring environment and its reorganization on the ground.<\/p>\n<p><a href=\"http:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2019\/06\/terrorism-tactics-and-transformation.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11252 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-content\/uploads\/2014\/08\/descargar.gif\" alt=\"Descargar\" width=\"93\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Katherine Zimmerman Editor American Enterprise Institute Descripci\u00f3n: America&#8217;s counterterrorism strategy risks becom- ing irrelevant to the new reality. It misconcep-tualizes the enemy as a set of discrete groups and individuals to defeat and kill. It wrongly emphasizes a kinetic approach to addressing the threats these groups pose to American interests and the homeland. It underestimates the importance of the Salafi-jihadimovement that persists beyond the defeat of specific threat groups. It&hellip; <\/p>\n","protected":false},"author":3,"featured_media":15682,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[112,51,6,25],"tags":[],"class_list":["post-15681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-download","category-english","category-livros","category-seguranca-publica-e-defesa"],"views":253,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/posts\/15681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/comments?post=15681"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/posts\/15681\/revisions"}],"predecessor-version":[{"id":15683,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/posts\/15681\/revisions\/15683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/media\/15682"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/media?parent=15681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/categories?post=15681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/es\/wp-json\/wp\/v2\/tags?post=15681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}