← Defence

Defence → Espionage, Subversion

Organizations relating to Espionage, Subversion

Commonwealth of Independent States Anti-Terrorism Center / Moscow, Russia
United Nations Global Programme Against Money Laundering, Proceeds of Crime and the Financing of Terrorism / Vienna, Austria / Est. 1997
Inter-American Committee Against Terrorism / Washington DC, USA / Est. 1999
Counter-Terrorism Committee / New York NY, USA / Est. 2001
Jemaah Islamiya / Est. 1993
Aum Supreme Truth / Est. 1987
Le Cercle
Hezbollah Internationale / Est. 1982
Abu Hafs al-Masri Brigade / Est. 2001
Mujahedin-e Khalq Organization
Five Eyes
Wisconsin Institute for Peace and Conflict Studies / Stevens-Point WI, USA / Est. 1985
Combating Terrorism Center / West Point NY, USA / Est. 2003
International Antiterrorism Unity / Kiev, Ukraine
International Institute for Counter-Terrorism / Herzliyya, Israel / Est. 1996
Maghreb Front
Peter C Alderman Foundation / Bedford NY, USA
International Counter-Terrorism Officers Association / Est. 2001
Convention Respecting Sabotage / Est. 1911
Arab Convention on the Suppression of Terrorism / Est. 1998
Convention for the Prevention of Terrorism and Punishment of Terrorism / Est. 1937
SAARC Regional Convention on Suppression of Terrorism / Est. 1987
Agreement Concerning the Application of the European Convention on the Suppression of Terrorism among the Member States of the European Communities / Est. 1979
Inter-American Convention Against Terrorism / Washington DC, USA / Est. 2002
Convention to Prevent and Punish the Acts of Terrorism Taking the Form of Crimes Against Persons and Related Extortion That Are of International Significance / Washington DC, USA / Est. 1971
Convention of the Organization of the Islamic Conference on Combating International Terrorism / Est. 1999
Black Sea Convention on Combating Organized Crime and Terrorism / Est. 1998
International Convention for the Suppression of Terrorist Bombings / Est. 1997
Treaty on Cooperation among States Members of the Commonwealth of Independent States in Combating Terrorism / Est. 1999
Quantico Group
International Association to Combat Terrorism / Est. 1977
International Commission on the Cold War History / Est. 2000
Consortium of Citizens Against Terrorism / Est. 1985
Bern Club / Est. 1971
International Campaign Against Terrorism / Est. 1998
Western Goals Institute / Est. 1985
Committee of Intelligence and Security Service of Africa / Addis Ababa, Ethiopia / Est. 2004
African Center for the Study and Research on Terrorism / Algiers, Algeria / Est. 2004
Fourth Freedom Forum / Est. 1982
Council of Europe Convention on the Prevention of Terrorism / Est. 2005
Global Initiative to Combat Nuclear Terrorism / Washington DC, USA / Est. 2006
Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism / Strasbourg, France / Est. 2005
Protocol Amending the European Convention on the Suppression of Terrorism / Strasbourg, France / Est. 2003
European Convention on the Suppression of Terrorism / Strasbourg, France / Est. 1977
European Police Office / The Hague, Netherlands / Est. 1994
European Counter Terrorism Centre / The Hague, Netherlands / Est. 2016
Grupo de Acción Financiera de Latinoamérica / Buenos Aires, Argentina / Est. 2000
Anti-Money Laundering Europe / Brussels, Belgium / Est. 2004
Global Coalition against Daesh / Est. 2014
Global Counterterrorism Forum

View all profiles (103 total) in the Yearbook of International Organizations

World Problems relating to Espionage, Subversion

From the Encyclopedia of World Problems and Human Potential

Undemocratic policy-making
Denial of transcendent truth
Social structure of sin
Espionage
Suicide terrorists
Misuse of electronic surveillance by governments
Conspiracy theories
Computer viruses
Zionism
Telephone bugging
Counter-espionage
Informers
Unethical practices by employees
Illegal exports of nuclear materials
Violence by fanatical environmentalists
Subversion of international agreements
Government inducement to crime
Unauthorized access to computer information systems
Information warfare
Closeted homosexuality
Criminal espionage
Political assassination
Archaeological and anthropological looting
Hunt sabotage
Contamination of public water supplies by sabotage

Action Strategies relating to Espionage, Subversion

From the Encyclopedia of World Problems and Human Potential

Sabotaging
Cold war
Using neighbourhood guerrilla tactics
Promulgating conspiracy theories
Defining post-Cold War Era in terms of sustainability
Forgiving regimes that support international terrorism
Tightening control over spy agencies
Terrorist
Traitor
Using terrorism
Forming secret societies
Spying
Guerrilla warfare
Sabotaging problem resolution
Sabotaging software
Maintaining secret sabotage
Countering sabotage of problem resolution
Providing terrorist havens
Supporting terrorism
Using religious terrorism
Uncovering treachery
Exposing government treachery
Prosecuting for treason
Condemning treachery
Condemning government support for undemocratic regimes

You are viewing a subject profile from the UIA's Global Civil Society Database.
← return to your search page to find additional profiles.
Terms of Use

UIA allows users to access and make use of the information contained in its Databases for the user’s internal use and evaluation purposes only. A user may not re-package, compile, re-distribute or re-use any or all of the UIA Databases or the data* contained therein without prior permission from the UIA.

Data from database resources may not be extracted or downloaded in bulk using automated scripts or other external software tools not provided within the database resources themselves. If your research project or use of a database resource will involve the extraction of large amounts of text or data from a database resource, please contact us for a customized solution.

UIA reserves the right to block access for abusive use of the Database.

* Data shall mean any data and information available in the Database including but not limited to: raw data, numbers, images, names and contact information, logos, text, keywords, and links.