← Defence

Defence → Espionage, Subversion

Organizations relating to Espionage, Subversion

Commonwealth of Independent States Anti-Terrorism Center / Moscow, Russia
United Nations Global Programme Against Money Laundering, Proceeds of Crime and the Financing of Terrorism / Vienna, Austria / Est. 1997
Committee of Experts on the Evaluation of Anti-Money Laundering Measures and the Financing of Terrorism / Strasbourg, France / Est. 1997
Inter-American Committee Against Terrorism / Washington DC, USA / Est. 1999
Counter-Terrorism Committee / New York NY, USA / Est. 2001
Jemaah Islamiya / Est. 1993
Aum Supreme Truth / Est. 1987
Le Cercle
Hezbollah Internationale / Est. 1982
Abu Hafs al-Masri Brigade / Est. 2001
Mujahedin-e Khalq Organization
Five Eyes
Wisconsin Institute for Peace and Conflict Studies / Stevens-Point WI, USA / Est. 1985
Combating Terrorism Center / West Point NY, USA / Est. 2003
International Antiterrorism Unity / Kiev, Ukraine
International Institute for Counter-Terrorism / Herzliyya, Israel / Est. 1996
Maghreb Front
SITE Institute / Washington DC, USA / Est. 2002
Peter C Alderman Foundation / Bedford NY, USA
International Counter-Terrorism Officers Association / Est. 2001
Convention Respecting Sabotage / Est. 1911
Arab Convention on the Suppression of Terrorism / Est. 1998
Convention for the Prevention of Terrorism and Punishment of Terrorism / Est. 1937
SAARC Regional Convention on Suppression of Terrorism / Est. 1987
Agreement Concerning the Application of the European Convention on the Suppression of Terrorism among the Member States of the European Communities / Est. 1979
Inter-American Convention Against Terrorism / Washington DC, USA / Est. 2002
Convention to Prevent and Punish the Acts of Terrorism Taking the Form of Crimes Against Persons and Related Extortion That Are of International Significance / Washington DC, USA / Est. 1971
Convention of the Organization of the Islamic Conference on Combating International Terrorism / Est. 1999
Black Sea Convention on Combating Organized Crime and Terrorism / Est. 1998
International Convention for the Suppression of the Financing of Terrorism / Est. 1999
OAU Convention on the Prevention and Combating of Terrorism / Est. 1999
International Convention for the Suppression of Terrorist Bombings / Est. 1997
Treaty on Cooperation among States Members of the Commonwealth of Independent States in Combating Terrorism / Est. 1999
Quantico Group
International Association to Combat Terrorism / Est. 1977
International Commission on the Cold War History / Est. 2000
Consortium of Citizens Against Terrorism / Est. 1985
Bern Club / Est. 1971
International Campaign Against Terrorism / Est. 1998
Western Goals Institute / Est. 1985
Committee of Intelligence and Security Service of Africa / Addis Ababa, Ethiopia / Est. 2004
African Center for the Study and Research on Terrorism / Algiers, Algeria / Est. 2004
Protocol to the OAU Convention on the Prevention and Combating of Terrorism / Est. 2004
Nordic Counter Terrorism Network / Klaukkala, Finland
Fourth Freedom Forum / Est. 1982
Council of Europe Convention on the Prevention of Terrorism / Est. 2005
Global Initiative to Combat Nuclear Terrorism / Washington DC, USA / Est. 2006
Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism / Strasbourg, France / Est. 2005
Protocol Amending the European Convention on the Suppression of Terrorism / Strasbourg, France / Est. 2003
European Convention on the Suppression of Terrorism / Strasbourg, France / Est. 1977

View all profiles (101 total) in the Yearbook of International Organizations

World Problems relating to Espionage, Subversion

From the Encyclopedia of World Problems and Human Potential

Misuse of electronic surveillance by governments
Computer viruses
Espionage
Covert intelligence agency operations
Contamination of public water supplies by sabotage
Uncontrolled immigration
Industrial espionage
Terrorism
Subversive activities
Guerrilla warfare
State-supported international terrorism
International political espionage
Military espionage
Unethical practices by employees
Government inducement to crime
Sabotage
Secret armies
Espionage in domestic politics
Telephone bugging
Subversion of international agreements
Counter-espionage
Religious terrorism
Psychological warfare
Conspiracy
Informers

Action Strategies relating to Espionage, Subversion

From the Encyclopedia of World Problems and Human Potential

Preventing terrorism
Sabotaging
Using religious terrorism
Improving international cooperation in reducing terrorism
Sanctioning state-supported terrorism
Maintaining secret sabotage
Spying
Forming secret societies
Using terrorism
Guerrilla warfare
Providing terrorist havens
Terrorist
Uncovering treachery
Exposing government treachery
Engaging in counter-espionage
Sabotaging problem resolution
Entering into conspiracies
Promulgating conspiracy theories
Condemning treachery
Using neighbourhood guerrilla tactics
Sabotaging software
Traitor
Prosecuting for treason
Holding cabals
Engaging in political espionage

You are viewing a subject profile from the UIA's Global Civil Society Database.
← return to your search page to find additional profiles.
Terms of Use

UIA allows users to access and make use of the information contained in its Databases for the user’s internal use and evaluation purposes only. A user may not re-package, compile, re-distribute or re-use any or all of the UIA Databases or the data* contained therein without prior permission from the UIA.

Data from database resources may not be extracted or downloaded in bulk using automated scripts or other external software tools not provided within the database resources themselves. If your research project or use of a database resource will involve the extraction of large amounts of text or data from a database resource, please contact us for a customized solution.

UIA reserves the right to block access for abusive use of the Database.

* Data shall mean any data and information available in the Database including but not limited to: raw data, numbers, images, names and contact information, logos, text, keywords, and links.