Contents: (1) The Rise of Islamist Militancy in Southeast Asia: Overview; The Rise of Al Qaeda in Southeast Asia; (2) The Jemaah Islamiya (JI) Network: History of JI; JI¿s Relationship to Al Qaeda; JI¿s Size and Structure; (3) Indonesia: Recent Events; The Bali Bombings and Other JI attacks in Indonesia; The Trial and Release of Baasyir; (4) The Philippines: Abu Sayyaf; The MILF; The Philippine Communist Party; (5) Thailand: Southern Insurgency; Current Government¿s Approach; Little Evidence of Transnational Elements; (6) Malaysia: Recent Events; A Muslim Voice of Moderation; Maritime Concerns; Terrorism and Counter-Terrorism in Malaysia; Terrorist Groups in Malaysia; Malaysia¿s Counter-Terrorism Efforts; (7) Singapore: U.S.-Singapore Coop.
This is a print on demand edition of a hard to find publication. Examines terrorists¿ involvement in a variety of crimes ranging from motor vehicle violations, immigration fraud, and mfg. illegal firearms to counterfeiting, armed bank robbery, and smuggling weapons of mass destruction. There are 3 parts: (1) Compares the criminality of internat. jihad groups with domestic right-wing groups. (2) Six case studies of crimes includes trial transcripts, official reports, previous scholarship, and interviews with law enforce. officials and former terrorists are used to explore skills that made crimes possible; or events and lack of skill that the prevented crimes. Includes brief bio. of the terrorists along with descriptions of their org., strategies, and plots. (3) Analysis of the themes in closing arguments of the transcripts in Part 2. Illus.
In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.
In contrast to the widely held assumption that terrorists as crazed fanatics, Jerrold Post demonstrates they are psychologically "normal" and that "hatred has been bred in the bone". He reveals the powerful motivations that drive these ordinary people to such extraordinary evil by exploring the different types of terrorists, from national-separatists like the Irish Republican Army to social revolutionary terrorists like the Shining Path, as well as religious extremists like al-Qaeda and Aum Shinrikyo. In The Mind of the Terrorist, Post uses his expertise to explain how the terrorist mind works and how this information can help us to combat terrorism more effectively.
This book is devoted primarily to papers prepared by American and Russian specialists on cyber terrorism and urban terrorism. It also includes papers on biological and radiological terrorism from the American and Russian perspectives. Of particular interest are the discussions of the hostage situation at Dubrovko in Moscow, the damge inflicted in New York during the attacks on 9/11, and Russian priorities in addressing cyber terrorism.
Examining major terrorist acts and campaigns undertaken in the decade following September 11, 2001, internationally recognized scholars study the involvement of global terrorist leaders and organizations in these incidents and the planning, organization, execution, recruitment, and training that went into them. Their work captures the changing character of al-Qaeda and its affiliates since the invasions of Afghanistan and Iraq and the sophisticated elements that, despite the West's best counterterrorism efforts, continue to exert substantial direction over jihadist terrorist operations. Through case studies of terrorist acts and offensives occurring both in and outside the West, the volume's contributors investigate al-Qaeda and other related entities as they adapted to the strategies of Operation Enduring Freedom and subsequent U.S.-led global counterterrorism programs. They explore whether Osama bin Laden was indeed reduced to a mere figurehead before his death or continued to influence al-Qaeda's global activities. Did al-Qaeda become a loose collection of individuals and ideas following its expulsion from Afghanistan, or was it reborn as a transnational terrorist structure powered by a well-articulated ideology? What is the preeminent terrorist threat we face today, and what will it look like in the future? This anthology pinpoints the critical patterns and strategies that will inform counterterrorism in the coming decades.
This book examines the attempts by the international community and the United Nations to define and criminalise terrorism. In doing so, it explores the difficult legal, ethical and philosophical questions involved in deciding when political violence is, or is not, permissible.
For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) target the West, but their operations mercilessly slaughter thousands of people of all races and religions throughout the world. Marc Sageman challenges conventional wisdom about terrorism, observing that the key to mounting an effective defense against future attacks is a thorough understanding of the networks that allow these new terrorists to proliferate. Based on intensive study of biographical data on 172 participants in the jihad, Understanding Terror Networks gives us the first social explanation of the global wave of activity. Sageman traces its roots in Egypt, gestation in Afghanistan during the Soviet-Afghan war, exile in the Sudan, and growth of branches worldwide, including detailed accounts of life within the Hamburg and Montreal cells that planned attacks on the United States. U.S. government strategies to combat the jihad are based on the traditional reasons an individual was thought to turn to terrorism: poverty, trauma, madness, and ignorance. Sageman refutes all these notions, showing that, for the vast majority of the mujahedin, social bonds predated ideological commitment, and it was these social networks that inspired alienated young Muslims to join the jihad. These men, isolated from the rest of society, were transformed into fanatics yearning for martyrdom and eager to kill. The tight bonds of family and friendship, paradoxically enhanced by the tenuous links between the cell groups (making it difficult for authorities to trace connections), contributed to the jihad movement's flexibility and longevity. And although Sageman's systematic analysis highlights the crucial role the networks played in the terrorists' success, he states unequivocally that the level of commitment and choice to embrace violence were entirely their own. Understanding Terror Networks combines Sageman's scrutiny of sources, personal acquaintance with Islamic fundamentalists, deep appreciation of history, and effective application of network theory, modeling, and forensic psychology. Sageman's unique research allows him to go beyond available academic studies, which are light on facts, and journalistic narratives, which are devoid of theory. The result is a profound contribution to our understanding of the perpetrators of 9/11 that has practical implications for the war on terror.
In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them into even more lethal forms. Policymakers and the scientific community at large must put forth a vigorous and immediate response to this challenge. This new book by the National Research Council recommends that the government expand existing regulations and rely on self-governance by scientists rather than adopt intrusive new policies. One key recommendation of the report is that the government should not attempt to regulate scientific publishing but should trust scientists and journals to screen their papers for security risks, a task some journals have already taken up. With biological information and tools widely distributed, regulating only U.S. researchers would have little effect. A new International Forum on Biosecurity should encourage the adoption of similar measures around the world. Seven types of risky studies would require approval by the Institutional Biosafety Committees that already oversee recombinant DNA research at some 400 U.S. institutions. These "experiments of concern" include making an infectious agent more lethal and rendering vaccines powerless.