Provides a comprehensive empirical overview of the nature and evolution of both modern transnational and domestic terrorism Based on statistical data from the world's largest terrorism database Will be of much interest to students of terrorism and political violence, criminology, political science, and IR/Security Studies
This book offers a guide to interpreting available statistical data on terrorism attacks around the world. The Global Terrorism Database (GTD) now includes more than 113,000 terrorist attacks, starting in 1970. By analyzing these data, researchers demonstrate how a very small number of terrorist attacks have had an outsized effect on attitudes and policies toward terrorism. These attacks, referred to as ‘black swan’ events, are difficult to predict but have an enormous impact on human affairs for years to come. The book discusses terrorist attacks, such as 9/11, possibly the most high profile ‘black swan’ event in living memory, by putting them into context with thousands of less publicized attacks that have plagued the world since 1970. Historically, the study of terrorism has suffered from a general lack of empirical data and statistical analysis. This is largely due to the difficulty of obtaining valid data on a topic that poses significant collection challenges. However, this book makes use of the fact that the GTD is currently the most extensive unclassified database on terrorism ever collected. While there have been summaries of the research literature on terrorism and important analyses of international terrorism event data, this is the first book that provides a comprehensive empirical overview of the nature and evolution of both modern international and domestic terrorism. This book will be of interest to students of terrorism and political violence, criminology, international security, and political science in general.
This is a print on demand edition of a hard to find publication. Examines terrorists¿ involvement in a variety of crimes ranging from motor vehicle violations, immigration fraud, and mfg. illegal firearms to counterfeiting, armed bank robbery, and smuggling weapons of mass destruction. There are 3 parts: (1) Compares the criminality of internat. jihad groups with domestic right-wing groups. (2) Six case studies of crimes includes trial transcripts, official reports, previous scholarship, and interviews with law enforce. officials and former terrorists are used to explore skills that made crimes possible; or events and lack of skill that the prevented crimes. Includes brief bio. of the terrorists along with descriptions of their org., strategies, and plots. (3) Analysis of the themes in closing arguments of the transcripts in Part 2. Illus.
Can We Construct a Grand Strategy to Counter Terrorism? Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign. After years of wars, ever more intensive and pervasive surveillance, enhanced security measures at major transportation centers, and many attempts to explain who we are fighting and why and how to fight them, the threats continue to multiply. So, too, do our attempts to understand just what terrorism is and how to counter it. Two leaders in the field of terrorism studies, Martha Crenshaw and Gary LaFree, provide a critical look at how we have dealt with the terror threat over the years. They make clear why it is so difficult to create policy to counter terrorism. The foes are multiple and often amorphous, the study of the field dogged by disagreement on basic definitional and methodological issues, and the creation of policy hobbled by an exacting standard: the counterterrorist must succeed all the time; the terrorist only once. As Countering Terrorism shows, there are no simple solutions to this threat.
How does a group that operates terror cells and espouses violence become a ruling political party? How is the world to understand and respond to Hamas, the militant Islamist organization that Palestinian voters brought to power in the stunning election of January 2006? This important book provides the most fully researched assessment of Hamas ever written. Matthew Levitt, a counterterrorism expert with extensive field experience in Israel, the West Bank, and Gaza, draws aside the veil of legitimacy behind which Hamas hides. He presents concrete, detailed evidence from an extensive array of international intelligence materials, including recently declassified CIA, FBI, and Department of Homeland Security reports. Levitt demolishes the notion that Hamas’ military, political, and social wings are distinct from one another and catalogues the alarming extent to which the organization’s political and social welfare leaders support terror. He exposes Hamas as a unitary organization committed to a militant Islamist ideology, urges the international community to take heed, and offers well-considered ideas for countering the significant threat Hamas poses.
In 2014, the declaration of the Islamic State caliphate was hailed as a major victory by the global jihadist movement. But it was short-lived. Three years on, the caliphate was destroyed, leaving its surviving fighters – many of whom were foreign recruits – to retreat and scatter across the globe. So what happens now? Is this the beginning of the end of IS? Or can it adapt and regroup after the physical fall of the caliphate? In this timely analysis, terrorism expert Colin P. Clarke takes stock of IS – its roots, its evolution, and its monumental setbacks – to assess the road ahead. The caliphate, he argues, was an anomaly. The future of the global jihadist movement will look very much like its past – with peripatetic and divided groups of militants dispersing to new battlefields, from North Africa to Southeast Asia, where they will join existing civil wars, establish safe havens and sanctuaries, and seek ways of conducting spectacular attacks in the West that inspire new followers. In this fragmented and atomized form, Clarke cautions, IS could become even more dangerous and challenging for counterterrorism forces, as its splinter groups threaten renewed and heightened violence across the globe.
This book's major strengths are its content, which is excellent; its organization, which is logical; and the fact that it devotes considerable attention to counterterrorist strategies and operations.
The Handbook of the Criminology of Terrorism features a collection of essays that represent the most recent criminological research relating to the origins and evolution of, along with responses to, terrorism, from a criminological perspective. Offers an authoritative overview of the latest criminological research into the causes of and responses to terrorism in today’s world Covers broad themes that include terrorism’s origins, theories, methodologies, types, relationship to other forms of crime, terrorism and the criminal justice system, ways to counter terrorism, and more Features original contributions from a group of international experts in the field Provides unique insights into the field through an exclusive focus on criminological conceptual frameworks and empirical studies that engage terrorism and responses to it
In contrast to the widely held assumption that terrorists as crazed fanatics, Jerrold Post demonstrates they are psychologically "normal" and that "hatred has been bred in the bone". He reveals the powerful motivations that drive these ordinary people to such extraordinary evil by exploring the different types of terrorists, from national-separatists like the Irish Republican Army to social revolutionary terrorists like the Shining Path, as well as religious extremists like al-Qaeda and Aum Shinrikyo. In The Mind of the Terrorist, Post uses his expertise to explain how the terrorist mind works and how this information can help us to combat terrorism more effectively.