Advertisement
jonstond2

Terrorism (Criminology)

Jan 23rd, 2017
419
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 62.57 KB | None | 0 0
  1. Introduction
  2.  
  3. The study of terrorism is one of the most topical yet controversial issues in the field of criminology and criminal justice today. There is no single agreed-upon definition of terrorism, or of what constitutes a terrorist. Terrorism can be domestic or international, based upon single issues or broad ideologies, with or without a religious foundation, and explained from a variety of psychological and sociological perspectives. The goals of this bibliography are to expose the reader to the debate surrounding the definition of terrorism; examine the major data sources available to empirically examine terrorism issues; review major theories of terrorism from psychological and sociological perspectives; explore the link between religion and terrorism; explore who becomes a terrorist and why, as well as why some groups or movements employ terrorist tactics while others do not; and discuss domestic terrorism, including left-wing and right-wing groups and issues.
  4.  
  5. General Overviews
  6.  
  7. Several texts provide an overview of issues related to terrorism. These survey texts can be used to establish a foundation of understanding about the topic, to be supplemented with additional resources that discuss specific issues. Brent Smith, one of the top researchers in the field of domestic terrorism, wrote a classic book on terrorists in the United States (Smith 1994). Sageman 2004 uses social network analysis to examine how individuals joined the international “jihad.” Through interviews of leaders and key members of a variety of “religious” terrorist groups, Juergensmeyer 2003 provides an excellent overview of the role religion, sacredness, humiliation, and the past play in these groups. Hamm 2007 looks at a wide variety of terrorist acts and groups, especially the types of crime that domestic and the international terrorists commit, in an effort to aid law-enforcement efforts to counter terrorism. Clarke and Newman 2006 focuses on preventing terrorism through the innovative application of situational crime-prevention techniques to the study of terrorism.
  8.  
  9. Clarke, Ronald V., and Graeme R. Newman. 2006. Outsmarting the terrorists. Westport, CT: Praeger Security International.
  10. Save Citation »Export Citation »E-mail Citation »
  11. Focusing on situational crime-prevention techniques, the authors discuss the importance of identifying opportunities for terrorists to attack and the need to block those opportunities in order to prevent terrorism.
  12. Clarke, Ronald V., and Graeme R. Newman. 2006. Outsmarting the terrorists. Westport, CT: Praeger Security International.
  13. Find this resource:
  14. Hamm, Mark S. 2007. Terrorism as crime: From Oklahoma City to Al-Qaeda and beyond. New York: New York Univ. Press.
  15. Save Citation »Export Citation »E-mail Citation »
  16. Uses case studies to analyze terrorism from a criminological perspective. Presents biographies of jihadists and right-wing terrorists and descriptions of their organizations, strategies, and terrorist plots.
  17. Hamm, Mark S. 2007. Terrorism as crime: From Oklahoma City to Al-Qaeda and beyond. New York: New York Univ. Press.
  18. Find this resource:
  19. Juergensmeyer, Mark. 2003. Terror in the mind of God: The global rise of religious violence. 3d ed. Berkeley: Univ. of California Press.
  20. Save Citation »Export Citation »E-mail Citation »
  21. Through the use of research literature, media accounts, and personal interviews, Juergensmeyer documents the global rise of religious terrorism.
  22. Juergensmeyer, Mark. 2003. Terror in the mind of God: The global rise of religious violence. 3d ed. Berkeley: Univ. of California Press.
  23. Find this resource:
  24. Sageman, Marc. 2004. Understanding terror networks. Philadelphia: Univ. of Pennsylvania Press.
  25. Save Citation »Export Citation »E-mail Citation »
  26. Based on his experience working with Islamic fundamentalists during the Afghan-Soviet war, and through the use of public documents, the author discusses the development, form, and function of terrorist networks. He dispels the myth that terrorist ties develop as a result of extreme poverty or religious devotion.
  27. Sageman, Marc. 2004. Understanding terror networks. Philadelphia: Univ. of Pennsylvania Press.
  28. Find this resource:
  29. Smith, Brent L. 1994. Terrorism in America: Pipe bombs and pipe dreams. Albany: State Univ. of New York Press.
  30. Save Citation »Export Citation »E-mail Citation »
  31. Analyzes the process of becoming a terrorist, focusing on the philosophical, ideological, and religious backgrounds of terrorists in the United States. Also reviews the governmental response to terrorism in the United States.
  32. Smith, Brent L. 1994. Terrorism in America: Pipe bombs and pipe dreams. Albany: State Univ. of New York Press.
  33. Find this resource:
  34. Data Sources
  35.  
  36. The study of terrorism in the field of criminology and criminal justice is relatively new, and there are obstacles to studying terrorism. Some of these obstacles are similar to those found in the study of criminal behavior generally. For instance, there are difficulties with how to define terrorism, how to measure it, how to access information, and how to collect and analyze data. Despite the obstacles to collecting methodologically sound data on terrorism, three groups of researchers have created terrorism databases that are of substantial benefit to the field. Gary LaFree and colleagues created the Global Terrorism Database (GTD), which is the premiere incident-based terrorism database in the world. Brent Smith and Kelly Damphousse created the American Terrorism Study (ATS), the aim of which is to collect data on American terrorism. Scott Atran created a relational social network–analysis database of jihadists, called the John Jay and ARTIS Transnational Terrorism Database (JJATT), which provides information on radical Islamists and their associates. Additionally, the Terrorism and Preparedness Data Resource Center (TPDRC) is a national and international terrorism database managed by a group of researchers.
  37.  
  38. American Terrorism Study.
  39. Save Citation »Export Citation »E-mail Citation »
  40. The ATS is an extensive database on domestic terrorism. The data are derived from the FBI and contain information about suspects, indictments, court cases, and groups.
  41. American Terrorism Study.
  42. Find this resource:
  43. Global Terrorism Database.
  44. Save Citation »Export Citation »E-mail Citation »
  45. The GTD is the most substantial incident-based terrorism database in the world, with open-source data on terrorist events around the world form 1970 through 2004.
  46. Global Terrorism Database.
  47. Find this resource:
  48. John Jay and ARTIS Transnational Terrorism Database.
  49. Save Citation »Export Citation »E-mail Citation »
  50. A database of radical Islamists and their associates who have directly contributed to the occurrence of a terrorist attack through participation in an active “core” network. The database contains over two thousand case studies of individuals from over twenty countries.
  51. John Jay and ARTIS Transnational Terrorism Database.
  52. Find this resource:
  53. Terrorism and Preparedness Data Resource Center.
  54. Save Citation »Export Citation »E-mail Citation »
  55. This is an archive of data about domestic and international terrorism collected by a variety of sources, including government agencies, nongovernmental organizations (NGOs), and researchers.
  56. Terrorism and Preparedness Data Resource Center.
  57. Find this resource:
  58. Measurement of Terrorism
  59.  
  60. LaFree and Dugan 2004 compares the study of terrorism to other types of criminal behavior. Freilich and Pridemore 2006 discusses some of the limitations of studying terrorism, particularly the types of data available for different extremist groups from watch-group organizations. Merari 1991, Silke 2001, and Silke 2004 focus on the need for academic and empirical research in this field. Chapters 2, 9, and 10 of Silke 2004 focus, respectively, on the need for better empirical knowledge about terrorism, trends in academic studies of terrorism, and the need to apply empirical findings on terrorism to policy.
  61.  
  62. Freilich, Joshua D., and William Alex Pridemore. 2006. Mismeasuring militias: Limitations of advocacy group data and of state-level studies of paramilitary groups. Justice Quarterly 23:147–162.
  63. DOI: 10.1080/07418820600552626Save Citation »Export Citation »E-mail Citation »
  64. The authors identify difficulties with the measurement of militia and patriot groups in the literature, and note that the inconsistent findings of the literature are likely due to measurement error. Thus, they question the validity of the conclusions drawn from these studies.
  65. Freilich, Joshua D., and William Alex Pridemore. 2006. Mismeasuring militias: Limitations of advocacy group data and of state-level studies of paramilitary groups. Justice Quarterly 23:147–162.
  66. Find this resource:
  67. LaFree, Gary, and Laura Dugan. 2004. How does studying terrorism compare to studying crime? In Sociology of crime, law, and deviance. Vol. 5, Terrorism and counter-terrorism: Criminological perspectives. Edited by Mathieu Deflem, 53–74. Amsterdam and London: Elsevier/JAI.
  68. Save Citation »Export Citation »E-mail Citation »
  69. The authors note the similarity between terrorist activity and criminal events; most importantly, they note the similar methodologies, in that both can be counted and both display nonrandom temporal and spatial patterns that are likely to be associated with endogenous and exogenous characteristics of offenders, targets, and situations.
  70. LaFree, Gary, and Laura Dugan. 2004. How does studying terrorism compare to studying crime? In Sociology of crime, law, and deviance. Vol. 5, Terrorism and counter-terrorism: Criminological perspectives. Edited by Mathieu Deflem, 53–74. Amsterdam and London: Elsevier/JAI.
  71. Find this resource:
  72. LaFree, Gary, and Laura Dugan. 2007. Introducing the Global Terrorism Database. Terrorism and Political Violence 19:181–204.
  73. DOI: 10.1080/09546550701246817Save Citation »Export Citation »E-mail Citation »
  74. The authors discuss the Global Terrorism Database (GTD), an open-source database with information on all domestic and international terrorist events from 1970 to 2004. It currently includes more than eighty thousand cases and contains information on the date and location of the incident, the weapons used and nature of the target, the number of casualties, and—when identifiable—the identity of the perpetrator. Available online.
  75. LaFree, Gary, and Laura Dugan. 2007. Introducing the Global Terrorism Database. Terrorism and Political Violence 19:181–204.
  76. Find this resource:
  77. Merari, Ariel. 1991. Academic research and government policy on terrorism. Terrorism and Political Violence 3:88–102.
  78. Save Citation »Export Citation »E-mail Citation »
  79. The author partially blames a rise in international terrorism on the inadequate contribution of academic knowledge to the topic. In particular, the author notes a need for government-supported research and the necessity to use that research to define policy.
  80. Merari, Ariel. 1991. Academic research and government policy on terrorism. Terrorism and Political Violence 3:88–102.
  81. Find this resource:
  82. Silke, Andrew, ed. 2004. Research on terrorism: Trends, achievements, and failures. London and Portland, OR: Frank Cass.
  83. Save Citation »Export Citation »E-mail Citation »
  84. Overview of a variety of issues related to terrorism and the study of it. In particular, see Chapter 2 (pp. 30–56), “The case for firsthand research” Chapter 9 (pp. 161–185), “Breaking the cycle: Empirical research and postgraduate studies on terrorism”; and Chapter 10 (pp. 186–213), “The road less traveled: Recent trends in terrorism research.”
  85. Silke, Andrew, ed. 2004. Research on terrorism: Trends, achievements, and failures. London and Portland, OR: Frank Cass.
  86. Find this resource:
  87. Silke, Andrew. 2001. The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence 13(4):1–14.
  88. Save Citation »Export Citation »E-mail Citation »
  89. The author reviews studies on terrorism published between 1995 and 2000 and discusses the methodological flaws of the data collection for these studies. Available online.
  90. Silke, Andrew. 2001. The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence 13(4):1–14.
  91. Find this resource:
  92. Defining and Conceptualizing Terrorism
  93.  
  94. There is no uniform definition of “terrorism” or “terrorist.” The FBI defines terrorism as “the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” However, other countries, organizations, agencies and groups define it differently. The general resources above all provide a discussion of the difficulty of conceptualizing and defining terrorism, but additional resources also focus on this issue. The first chapter of Hoffman 2006 provides an excellent historical overview of the term terrorism that demonstrates the dynamic nature of who is labeled a terrorist and what is labeled terrorism. Silke 1996 and Ruby 2002 provide an analysis of what constitutes terrorism and the factors that must be considered in the definitions. Schmid 2004 and Weinberg, et al. 2004 discuss the various frameworks for conceptualizing what terrorism is and why it is so difficult to define. Dedeoglu 2003 compares the varying definitions of terrorism and provides an analysis of the different political frameworks of those definitions.
  95.  
  96. Dedeoglu, Beril. 2003. Bermuda Triangle: Comparing official definitions of terrorist activity. Terrorism and Political Violence 15:81–110.
  97. DOI: 10.1080/09546550312331293147Save Citation »Export Citation »E-mail Citation »
  98. Analyzes the differing definitions of terrorism, noting that most definitions differ in how they define a terrorist. The differing definitions reflect how an “enemy” is perceived by each country or organization.
  99. Dedeoglu, Beril. 2003. Bermuda Triangle: Comparing official definitions of terrorist activity. Terrorism and Political Violence 15:81–110.
  100. Find this resource:
  101. Hoffman, Bruce. 2006. Inside terrorism. New York: Columbia Univ. Press.
  102. Save Citation »Export Citation »E-mail Citation »
  103. Presents a summary of historical trends in international terrorism, distinguishing between the political and religious motivations of terrorists. Author also discusses the development of religious terrorist motivations, which differ from the traditional terrorist goals of attracting media attention with an aim to initiate reform.
  104. Hoffman, Bruce. 2006. Inside terrorism. New York: Columbia Univ. Press.
  105. Find this resource:
  106. Ruby, Charles L. 2002. The definition of terrorism. Analyses of Social Issues and Public Policy 2:19–25.
  107. Save Citation »Export Citation »E-mail Citation »
  108. Tries to define terrorism after 9/11, and states that whether an act is considered terrorism depends on whether a legal, moral, or behavioral perspective is used to interpret the act. If so, the focus of the definition is on the actor rather than the act. Available online.
  109. Ruby, Charles L. 2002. The definition of terrorism. Analyses of Social Issues and Public Policy 2:19–25.
  110. Find this resource:
  111. Silke, Andrew. 1996. Terrorism and the blind men’s elephant. Terrorism and Political Violence 8:12–28.
  112. Save Citation »Export Citation »E-mail Citation »
  113. Discusses the differing perspectives of terrorism, most importantly between those who define terrorism as a form of warfare and those who do not. Author concludes that those who define terrorism as warfare have a more accurate perspective on the phenomenon as a whole.
  114. Silke, Andrew. 1996. Terrorism and the blind men’s elephant. Terrorism and Political Violence 8:12–28.
  115. Find this resource:
  116. Schmid, Alex P. 2004. Frameworks for conceptualising terrorism. Terrorism and Political Violence 16:197–221.
  117. DOI: 10.1080/09546550490483134Save Citation »Export Citation »E-mail Citation »
  118. Uses five conceptual frameworks to define terrorism: terrorism as a crime, terrorism as politics, terrorism as warfare, terrorism as communication, and terrorism as religious fundamentalism.
  119. Schmid, Alex P. 2004. Frameworks for conceptualising terrorism. Terrorism and Political Violence 16:197–221.
  120. Find this resource:
  121. Weinberg, Leonard, Ami Pedahzur, and Sivan Hirsch-Hoefler. 2004. The challenges of conceptualizing terrorism. Terrorism and Political Violence 16:777–794.
  122. DOI: 10.1080/095465590899768Save Citation »Export Citation »E-mail Citation »
  123. Discusses why it is so difficult to agree upon a common definition and conceptual framework for terrorism? In analyzing academic resources for common definitions, the authors identified twenty-two definitional elements of terrorism but found that few academics include a psychological element in the definition of terrorism.
  124. Weinberg, Leonard, Ami Pedahzur, and Sivan Hirsch-Hoefler. 2004. The challenges of conceptualizing terrorism. Terrorism and Political Violence 16:777–794.
  125. Find this resource:
  126. Psychology of Terrorism
  127.  
  128. One aim of studies on terrorism is to better understand why individuals become involved with terrorist groups or engage in terrorist activities. Many researchers have studied the motivations for becoming a terrorist from a psychological perspective, focusing on political, religious, behavioral, and psychological motivations in the individuals. Chapter 5 in Hudson 2002 provides a useful overview of the psychology of terrorism and why individuals may choose to participate in terrorist activities. More specifically, Kruglansky and Fishman 2006 evaluates two competing perspectives about the motivation to become a terrorist—the “syndrome” and “tool” perspectives. Taylor and Horgan 2001 and Post, et al. 2003 look at the effect of religion as a motivation to become involved in terrorist activity, and Post, et al. 2003 provides rich data to support the authors’ contentions based upon interviews with Middle Eastern terrorists. Many of the studies on the psychology of terrorism have substantial limitations, however, and Victoroff 2005 provides and excellent overview of the literature on psychology and terrorism and critiques many of the approaches that researchers have taken to date.
  129.  
  130. Hudson, Rex. 2002. Who becomes a terrorist and why: The 1999 government report on profiling terrorists. Guilford, CT: Lyons.
  131. Save Citation »Export Citation »E-mail Citation »
  132. Discusses why certain individuals are more likely to be prone to become terrorists. Chapter 5 focuses on the psychological factors that predispose certain individuals to this behavior. Original 1999 report available online.
  133. Hudson, Rex. 2002. Who becomes a terrorist and why: The 1999 government report on profiling terrorists. Guilford, CT: Lyons.
  134. Find this resource:
  135. Kruglanski, Arie W., and Shira Fishman. 2006. The psychology of terrorism: “Syndrome” versus “tool” perspectives. Terrorism and Political Violence 18:193–215.
  136. DOI: 10.1080/09546550600570119Save Citation »Export Citation »E-mail Citation »
  137. Describes two psychological perspectives on terrorism, and explains that research has found more support for the “tool” perspective (in which terrorism represents a strategic instrument that any party in a conflict may use) than the “syndrome” view (in which terrorism represents a psychologically meaningful construct with identifiable characteristics at individual and group levels of analysis).
  138. Kruglanski, Arie W., and Shira Fishman. 2006. The psychology of terrorism: “Syndrome” versus “tool” perspectives. Terrorism and Political Violence 18:193–215.
  139. Find this resource:
  140. Post, Jerrold M., Ehud Sprinzak, and Laurita M. Denny. 2003. The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists. Terrorism and Political Violence 15:171–184.
  141. DOI: 10.1080/09546550312331293007Save Citation »Export Citation »E-mail Citation »
  142. Insightful qualitative study using interviews of twenty-one Islamic terrorists and fourteen secular terrorists, with a goal of understanding the psychology of their behavior and decision-making processes.
  143. Post, Jerrold M., Ehud Sprinzak, and Laurita M. Denny. 2003. The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists. Terrorism and Political Violence 15:171–184.
  144. Find this resource:
  145. Taylor, M., and J. Horgan. 2001. The psychological and behavioural bases of Islamic fundamentalism. Terrorism and Political Violence 13:37–71.
  146. Save Citation »Export Citation »E-mail Citation »
  147. Authors study the link between Islamic fundamentalism and violence, with a focus on the nature of religious and ideological control over behavior.
  148. Taylor, M., and J. Horgan. 2001. The psychological and behavioural bases of Islamic fundamentalism. Terrorism and Political Violence 13:37–71.
  149. Find this resource:
  150. Victoroff, Jeff. 2005. The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution 49:3–42.
  151. DOI: 10.1177/0022002704272040Save Citation »Export Citation »E-mail Citation »
  152. Analyzes unclassified studies on the psychology of terrorist behavior. Despite noting that serious methodological problems with many terrorism studies, he notes that social and psychological factors contribute to the cause of terrorist behavior,
  153. Victoroff, Jeff. 2005. The mind of the terrorist: A review and critique of psychological approaches. Journal of Conflict Resolution 49:3–42.
  154. Find this resource:
  155. Sociology of Terrorism
  156.  
  157. While some researchers focus on the psychology of terrorism and the individual motivations to become involved in terrorist activity, other researchers focus on the role of friends, family, the economy, and society. Historically important works such as Gurr 1970 and Tilly 1978 about why men become involved in social movements that are rebellious or criminal in nature are applicable also to the study of terrorism. Turk 2004, Black 2004 and Freilich, et al. 1999 expand the notions presented in those works by specifically exploring the application of those social explanations to the study of terrorism. In a response to Black’s pure sociological perspective, Rosenfeld 2004 provides and excellent overview of the understanding of terrorism from a criminological perspective.
  158.  
  159. Black, Donald. 2004. The geometry of terrorism. Sociological Theory 22:14–25.
  160. DOI: 10.1111/j.1467-9558.2004.00201.xSave Citation »Export Citation »E-mail Citation »
  161. Presents an evaluation of terrorism from a purely sociological perspective, noting its social geometry—that terrorism arises intercollectively and upwardly across long distances in multidimensional space. Available online.
  162. Black, Donald. 2004. The geometry of terrorism. Sociological Theory 22:14–25.
  163. Find this resource:
  164. Freilich, Joshua D., Nelson A. Pichardo Almanzar, and Craig J. Rivera. 1999. How social movement organizations explicitly and implicitly promote deviant behavior: The case of the militia movement. Justice Quarterly 16:655–683.
  165. DOI: 10.1080/07418829900094301Save Citation »Export Citation »E-mail Citation »
  166. Through an analysis of the modern militia movement, the authors discuss the explicit and implicit paths of criminal behavior. They find that the movements promote deviance through their ideology and organizational structures.
  167. Freilich, Joshua D., Nelson A. Pichardo Almanzar, and Craig J. Rivera. 1999. How social movement organizations explicitly and implicitly promote deviant behavior: The case of the militia movement. Justice Quarterly 16:655–683.
  168. Find this resource:
  169. Gurr, Ted Robert. 1970. Why men rebel. Princeton, NJ: Princeton Univ. Press.
  170. Save Citation »Export Citation »E-mail Citation »
  171. Explains the initiation into political violence through a frustration-aggression theory, with a particular focus on relative deprivation (the discrepancy between what people think they deserve and what they actually think they can get). In particular, see pp. 7–58 for a discussion about relative deprivation.
  172. Gurr, Ted Robert. 1970. Why men rebel. Princeton, NJ: Princeton Univ. Press.
  173. Find this resource:
  174. Piazza, James A. 2006. Rooted in poverty? Terrorism, poor economic development, and social cleavages. Terrorism and Political Violence 18:159–177.
  175. DOI: 10.1080/095465590944578Save Citation »Export Citation »E-mail Citation »
  176. In a groundbreaking study in which he employed multiple regression analyses on terrorist incidents in ninety-six countries, Piazza evaluated the significance of poverty, malnutrition, inequality, unemployment, inflation, and poor economic growth as predictors of terrorism. He found no significant relationship between any of the measures of economic development and terrorism.
  177. Piazza, James A. 2006. Rooted in poverty? Terrorism, poor economic development, and social cleavages. Terrorism and Political Violence 18:159–177.
  178. Find this resource:
  179. Rosenfeld, Richard. 2004. Terrorism and criminology. In Sociology of crime, law, and deviance. Vol. 5, Terrorism and counter-terrorism: Criminological perspectives. Edited by Mathieu Deflem, 19–32. Amsterdam and London: Elsevier/JAI.
  180. Save Citation »Export Citation »E-mail Citation »
  181. Rosenfeld’s article is a reply to Black 2004’s sociological explanation of terrorism. Author contends that Black’s theory fails to consider the predatory nature of terrorist activity and the conditions under which terrorism emerges and is sustained.
  182. Rosenfeld, Richard. 2004. Terrorism and criminology. In Sociology of crime, law, and deviance. Vol. 5, Terrorism and counter-terrorism: Criminological perspectives. Edited by Mathieu Deflem, 19–32. Amsterdam and London: Elsevier/JAI.
  183. Find this resource:
  184. Tilly, C. 1978. From mobilization to revolution. New York: McGraw-Hill.
  185. Save Citation »Export Citation »E-mail Citation »
  186. In this historically important work, the author explains the initiation into revolutionary behavior through collective action theory. For the information most applicable to terrorism today, see pp. 52–97.
  187. Tilly, C. 1978. From mobilization to revolution. New York: McGraw-Hill.
  188. Find this resource:
  189. Turk, Austin T. 2004. Sociology of terrorism. Annual Review of Sociology 30:271–286.
  190. DOI: 10.1146/annurev.soc.30.012703.110510Save Citation »Export Citation »E-mail Citation »
  191. Provides a summary of the literature as it relates to the social construction of terrorism, terrorism as political violence, terrorism as communication, organizing terrorism, socializing terrorists, social control of terrorism, and theorizing terrorism.
  192. Turk, Austin T. 2004. Sociology of terrorism. Annual Review of Sociology 30:271–286.
  193. Find this resource:
  194. Terrorist Networks
  195.  
  196. Though some terrorists act on their own (a prominent example is Theodore Kaczynski, the “Unabomber”), most belong to terrorist networks. These networks differ in their levels of organization, accountability and leadership structure, size, goals, access to resources, types and levels of communication, security of information, and systems of recruitment and retention. These networks also adapt and change according to social circumstances, often making it difficult to detect them. The best sources for the nature of terrorist networks are Sageman 2004 and Sageman 2008, which explain the rise in terrorist networks, variation in types of networks, how they function, and the limitations of these networks. Pedahzur and Perliger 2006 and Arquilla and Ronfeldt 2004 discuss the changing nature of terrorist networks and the need for law enforcement to adapt to newly evolving forms of terrorist threats.
  197.  
  198. Arquilla, John, and David F. Ronfeldt. 2001. Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND.
  199. Save Citation »Export Citation »E-mail Citation »
  200. Describes the concept of netwars, which include conflicts waged by both terrorists and social activists that are defined by the networked organizational structure of their practitioners. In particular, see chapters 1 and 2. Viewable in multi-pdf format.
  201. Arquilla, John, and David F. Ronfeldt. 2001. Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND.
  202. Find this resource:
  203. Pedahzur, Ami, and Arie Perliger. 2006. The changing nature of suicide attacks: A social network perspective. Social Forces 84:1987–2008.
  204. DOI: 10.1353/sof.2006.0104Save Citation »Export Citation »E-mail Citation »
  205. Employs a social network analysis of Palestinian suicide networks and finds that their attacks are not the product of strategic decisions within an organizational framework, but rather are usually made by local activists. Also available online.
  206. Pedahzur, Ami, and Arie Perliger. 2006. The changing nature of suicide attacks: A social network perspective. Social Forces 84:1987–2008.
  207. Find this resource:
  208. Sageman, Marc. 2004. Understanding terror networks. Philadelphia: Univ. of Pennsylvania Press.
  209. Save Citation »Export Citation »E-mail Citation »
  210. Through his study of 172 jihadists, the author traces the global nature of terrorist activity through Egypt, Afghanistan, Sudan, Europe, and North America.
  211. Sageman, Marc. 2004. Understanding terror networks. Philadelphia: Univ. of Pennsylvania Press.
  212. Find this resource:
  213. Sageman, Marc. 2008. Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: Univ. of Pennsylvania Press.
  214. Save Citation »Export Citation »E-mail Citation »
  215. Discusses the process of radicalization Muslim youth, arguing that it consists of a combination of individual and social influences and group dynamics. Author discusses the demise of well-structured groups such as those led by Osama bin Laden, and notes how they have evolved into leaderless groups.
  216. Sageman, Marc. 2008. Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: Univ. of Pennsylvania Press.
  217. Find this resource:
  218. Religion and Terrorism
  219.  
  220. Many individuals will join terrorist networks because of religious ideologies, and many terrorist organizations are founded upon such a basis. Religious terrorists are those who claim that they commit terrorist acts because of scripture or a higher calling, and many of the religious-terrorism networks are led by or involve religious clerics. The most well-known religious terrorist groups today are Islamic Jihadists, though religious terrorist groups can also include Hamas and the Irish Republican Army. An excellent resource is Juergensmeyer 2003, which discusses the global rise in religious terrorism by groups involved in a “culture of violence.” Like Juergensmeyer 2003, Stern 2004 is based on interviews with key leaders of terrorist groups and provides a thorough overview of religious terrorism. Lewis 2002 explains the rise in global terrorism and the conflict between the East and West, while Emerson 2002 and Silber and Bhat 2007 are case studies examining how individuals in the United States who grew up in the West become radicalized and then join jihadist groups. Pape 2003 also analyzes the rise in terrorist activity, but looks specifically at the rise in suicide bombings.
  221.  
  222. Emerson, Steven. 2002. American jihad: The terrorists living among us. New York: Free Press.
  223. Save Citation »Export Citation »E-mail Citation »
  224. Discusses the vulnerability of Americans and provides accounts of terrorist groups that have proliferated in the United States, including Hamas, Islamic Jihad, and groups following Osama bin Laden.
  225. Emerson, Steven. 2002. American jihad: The terrorists living among us. New York: Free Press.
  226. Find this resource:
  227. Juergensmeyer, Mark. 2003. Terror in the mind of God: The global rise of religious violence. 3d ed. Berkeley: Univ. of California Press.
  228. Save Citation »Export Citation »E-mail Citation »
  229. Based on his interviews with terrorists, the author discusses the role of religious communities in terrorist activity. He focuses on cultures of violence within Christianity, Judaism, Islam, Hinduism, Sikhism, and Buddhism.
  230. Juergensmeyer, Mark. 2003. Terror in the mind of God: The global rise of religious violence. 3d ed. Berkeley: Univ. of California Press.
  231. Find this resource:
  232. Lewis, Bernard. 2002. What went wrong? Western impact and Middle Eastern response. Oxford and New York: Oxford Univ. Press.
  233. Save Citation »Export Citation »E-mail Citation »
  234. The author is a historian who puts the terrorist attacks of 9/11 into perspective through an analysis of Middle Eastern cultures and their clash with the west.
  235. Lewis, Bernard. 2002. What went wrong? Western impact and Middle Eastern response. Oxford and New York: Oxford Univ. Press.
  236. Find this resource:
  237. Pape, Robert A. 2003. The strategic logic of suicide terrorism. American Political Science Review 97:343–361.
  238. Save Citation »Export Citation »E-mail Citation »
  239. Through his systematic review of 187 suicide attacks from 1980 to 2001, the author explains that, contrary to popular belief, such attacks are not generally religiously motivated, but rather strategic decisions because they are the most effective form of violence. Also online.
  240. Pape, Robert A. 2003. The strategic logic of suicide terrorism. American Political Science Review 97:343–361.
  241. Find this resource:
  242. Silber, Mitchell D., and Arvin Bhatt. 2007. Radicalization in the West: The Homegrown Threat. New York City Police Department Intelligence Division.
  243. Save Citation »Export Citation »E-mail Citation »
  244. Discusses how most terrorist attacks that are planned against the American people are conceptualized and planned by “unremarkable” people who live in the United States. Authors discuss the radicalization process and how to establish effective counterterrorism policies against this group.
  245. Silber, Mitchell D., and Arvin Bhatt. 2007. Radicalization in the West: The Homegrown Threat. New York City Police Department Intelligence Division.
  246. Find this resource:
  247. Stern, Jessica. 2004. Terror in the name of God: Why religious militants kill. New York: HarperPerennial.
  248. Save Citation »Export Citation »E-mail Citation »
  249. Through her interviews with religious terrorists, the author explains how and why individuals are recruited into terrorist activity and conditioned to commit violent acts. She also discusses the need for nonviolent government responses to these attacks and other strategies for reducing religious terrorism.
  250. Stern, Jessica. 2004. Terror in the name of God: Why religious militants kill. New York: HarperPerennial.
  251. Find this resource:
  252. Islamic Extremism
  253.  
  254. After 9/11 the role of religion, particularly Islamic extremism, came to the forefront of terrorism research. Militant Islamic groups had been on the rise not only throughout the Middle East, but also in Southeast and Central Asia. Rashid 2002 is one of the few useful resources on Islamic extremism in Central Asia. Some of these groups, like Hezbollah, were founded on Shiite principles (see Jaber 1997 and Kramer 1998) There are many resources on jihad, holy wars, and militant Islam. The best general sources that discuss the rise, structure, and motivation of Sunni Islamic extremist groups like Al Qaeda are Crenshaw 1995, Esposito 2002, Kepel 2002, and Wright 2002.
  255.  
  256. Crenshaw, Martha, ed. 1995. Terrorism in context. University Park: Pennsylvania State Univ. Press.
  257. Save Citation »Export Citation »E-mail Citation »
  258. Provides an overview of terrorism from a social, political, and economic context. Chapters address terrorism as it relates to various religious groups, but of particular interest is Chapter 13 on terrorism in Iran.
  259. Crenshaw, Martha, ed. 1995. Terrorism in context. University Park: Pennsylvania State Univ. Press.
  260. Find this resource:
  261. Esposito, John L. 2002. Unholy war: Terror in the name of Islam. Oxford and New York: Oxford Univ. Press.
  262. Save Citation »Export Citation »E-mail Citation »
  263. Discusses the rise of militant Islam and key terrorist figures in the context of a broader discussion about Islam and religion generally.
  264. Esposito, John L. 2002. Unholy war: Terror in the name of Islam. Oxford and New York: Oxford Univ. Press.
  265. Find this resource:
  266. Jaber, Hala. 1997. Hezbollah: Born with a vengeance. New York: Columbia Univ. Press.
  267. Save Citation »Export Citation »E-mail Citation »
  268. Though her interviews with key figures in Hezbollah, the author discusses the history of the organization, its ideology and culture, and terrorist tactics. Of most interest are pages 47–74.
  269. Jaber, Hala. 1997. Hezbollah: Born with a vengeance. New York: Columbia Univ. Press.
  270. Find this resource:
  271. Kepel, Gilles. 2002. Jihad: The trail of political Islam. Translated by Anthony F. Roberts. Cambridge, MA: The Belknap Press of Harvard Univ. Press.
  272. Save Citation »Export Citation »E-mail Citation »
  273. This is an excellent historical overview of the Islamic political movement from the early 1970s to present. The author addresses the goals of the movement, its successes and failures, and how those failures led to global terrorist attacks.
  274. Kepel, Gilles. 2002. Jihad: The trail of political Islam. Translated by Anthony F. Roberts. Cambridge, MA: The Belknap Press of Harvard Univ. Press.
  275. Find this resource:
  276. Kramer, Martin. 1998. The moral logic of Hizballah. In Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Edited by Walter Reich, 131–157. Washington, DC: Woodrow Wilson Center Press; Baltimore and London: Distributed by the Johns Hopkins Univ. Press.
  277. Save Citation »Export Citation »E-mail Citation »
  278. Also online, this is a useful resource that provides an overview of the origins of Hezbollah in Lebanon, the framework and leadership structure of this group, what led to the suicide bombings in the 1980s, its movement towards hostage takings and hijackings, and the factions in Hezbollah that remain today.
  279. Kramer, Martin. 1998. The moral logic of Hizballah. In Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Edited by Walter Reich, 131–157. Washington, DC: Woodrow Wilson Center Press; Baltimore and London: Distributed by the Johns Hopkins Univ. Press.
  280. Find this resource:
  281. Rashid, Ahmed. 2002. Jihad: The rise of militant Islam in Central Asia. New Haven, CT: Yale Univ. Press.
  282. Save Citation »Export Citation »E-mail Citation »
  283. Focuses on the three Islamic movements in Central Asia that have formed since 1991: the Hizb ut-Tahrir, which is nonviolent and seeks to unite the Muslim world; the Islamic Renaissance Party, which is on the decline; and the Islamic Movement of Uzbekistan, which is the most dangerous of the three, as it is allied with al-Qaeda.
  284. Rashid, Ahmed. 2002. Jihad: The rise of militant Islam in Central Asia. New Haven, CT: Yale Univ. Press.
  285. Find this resource:
  286. Wright, Robin B. 2002. Sacred rage: The wrath of militant Islam. New York: Simon and Schuster.
  287. Save Citation »Export Citation »E-mail Citation »
  288. Explains the militant Islamic political movement and the escalating terror attacks against Americans that culminated in 9/11. The most useful part of the book is the discussion of al-Qaeda on pages 243–290.
  289. Wright, Robin B. 2002. Sacred rage: The wrath of militant Islam. New York: Simon and Schuster.
  290. Find this resource:
  291. Domestic Terrorism
  292.  
  293. Despite the focus on international terrorist activities, particularly after 9/11, there are substantially more incidents of domestic terrorism that occur on a regular basis. These can be the result of individuals (such as Theodore Kaczynski, the “Unabomber”), right-wing groups (such as militias), left-wing groups (such as violent environmental activists), or groups that focus on single issues (such as abortion). The American Terrorism Study is the largest database on domestic terrorism, covering ring-wing, left-wing, and single-issue terrorist groups and acts. There are also studies that evaluate each of these types of domestic terrorism separately.
  294.  
  295. American Terrorism Study (ATS)
  296.  
  297. The American Terrorism Study began in 1989, and since that time researchers have been compiling information on persons indicted as a result of investigation under the FBI’s Counterterrorism Division. The ATS database consists of five datasets: terrorist incidents, persons indicted in the states, persons federally indicted, terrorism cases that resulted from the terrorism investigations in the U.S., and groups tried in federal court for terrorism-related activity. Authors have produced numerous academic books, chapters, and articles based on this dataset. Key articles are: Smith and Damphousse 1996 and Smith and Damphousse 1998, which test the structural-contextual theory (that some criminal activity is viewed as so serious that it results in higher conviction rates and longer sentences) and evaluate the effects of political motives on sentences; Smith, et al. 2002, which provides an overview of federal terrorism cases over a twenty-year period; Cothren, et al. 2008, which maps out terrorist activity in the United States; and Damphousse and Shields 2007, which assesses the effects of terrorist activity on the likelihood of successful prosecution of terrorists.
  298.  
  299. Cothren, Jackson, Brent L. Smith, Paxton Roberts, and Kelly R. Damphousse. 2008. Geospatial and temporal patterns of preparatory conduct among American terrorists. International Journal of Comparative and Applied Criminal Justice 32:23–41.
  300. Save Citation »Export Citation »E-mail Citation »
  301. Analyzes spatial and temporal patterns of numerous domestic terrorism cases to explain where terrorists live in relation to their targets, where they plan and prepare for their acts, the types of preparatory activities the terrorists commit, and the length of time of the planning process.
  302. Cothren, Jackson, Brent L. Smith, Paxton Roberts, and Kelly R. Damphousse. 2008. Geospatial and temporal patterns of preparatory conduct among American terrorists. International Journal of Comparative and Applied Criminal Justice 32:23–41.
  303. Find this resource:
  304. Damphousse, Kelly R. and Chris Shields. 2007. The morning after: Assessing the effect of major terrorism events on prosecution strategies and outcomes. Journal of Contemporary Criminal Justice 23:174–194.
  305. DOI: 10.1177/1043986207301362Save Citation »Export Citation »E-mail Citation »
  306. Through an evaluation of the period before and after the 1995 Oklahoma City bombing and the 9/11 attacks, the authors show that major terrorism events result in the prosecution of cases that are generally less serious and less complicated, and those cases are treated much more like “traditional” crimes.
  307. Damphousse, Kelly R. and Chris Shields. 2007. The morning after: Assessing the effect of major terrorism events on prosecution strategies and outcomes. Journal of Contemporary Criminal Justice 23:174–194.
  308. Find this resource:
  309. Smith, Brent L., and Kelly R. Damphousse. 1996. Punishing political offenders: The effect of political motive on federal sentencing decisions. Criminology 34:289–322.
  310. DOI: 10.1111/j.1745-9125.1996.tb01209.xSave Citation »Export Citation »E-mail Citation »
  311. Assesses three theoretical models (consensus, conflict, and structural-contextual) to explain the differences in sentencing patterns for terrorists and nonterrorists convicted of the same crimes. Their results support both consensus and conflict hypotheses.
  312. Smith, Brent L., and Kelly R. Damphousse. 1996. Punishing political offenders: The effect of political motive on federal sentencing decisions. Criminology 34:289–322.
  313. Find this resource:
  314. Smith, Brent L., and Kelly R. Damphousse. 1998. Terrorism, politics, and punishment: A test of structural-contextual theory and the “liberation hypothesis.” Criminology 36:67–92.
  315. DOI: 10.1111/j.1745-9125.1998.tb01240.xSave Citation »Export Citation »E-mail Citation »
  316. The authors used OLS regression and structural-equation modeling to compare variance in sentencing between a sample of terrorists matched with nonterrorists convicted of the same federal offenses. They found support for both theories.
  317. Smith, Brent L., and Kelly R. Damphousse. 1998. Terrorism, politics, and punishment: A test of structural-contextual theory and the “liberation hypothesis.” Criminology 36:67–92.
  318. Find this resource:
  319. Smith, Brent L., Kelly R. Damphousse, Freedom Jackson, and Amy Sellers. 2002. The prosecution and punishment of international terrorists in federal courts: 1980–1998. Criminology and Public Policy 1:311–338.
  320. DOI: 10.1111/j.1745-9133.2002.tb00093.xSave Citation »Export Citation »E-mail Citation »
  321. Three key findings are that over a twenty-year period, federal prosecutors began to rely more on the politicization of the criminal acts by international terrorists; both international and domestic terrorists are not likely to plead guilty; and international terrorists are punished more severely than domestic terrorists.
  322. Smith, Brent L., Kelly R. Damphousse, Freedom Jackson, and Amy Sellers. 2002. The prosecution and punishment of international terrorists in federal courts: 1980–1998. Criminology and Public Policy 1:311–338.
  323. Find this resource:
  324. Right-Wing Terrorism
  325.  
  326. Far-right terrorists in the United States generally have a strong religious (Christian) ideology and are characterized by the belief that their race or group is superior. They are antigovernment and often target law-enforcement agencies or other religious groups in their attacks. Examples of such groups and movements include the Ku Klux Klan, the Christian Identity Movement, and Aryan Nations. Kaplan 1995 provides general typologies of right-wing movements in the United States, while other sources focus on particular groups or individuals. In particular, Whitsel 2001 focuses on neo-Nazis, Dobratz and Shanks-Meile 2000 on white separatists, and Michel and Herbeck 2001 on Timothy McVeigh.
  327.  
  328. Dobratz, Betty A. and Stephanie L. Shanks-Meile. 2000. “White power, white pride!”: The white separatist movement in the United States. Baltimore: John Hopkins Univ. Press.
  329. Save Citation »Export Citation »E-mail Citation »
  330. Examines the ideology, structure, strategy, and tactics of the white separatist movement in the United States. Of particular interest are pages 89–163.
  331. Dobratz, Betty A. and Stephanie L. Shanks-Meile. 2000. “White power, white pride!”: The white separatist movement in the United States. Baltimore: John Hopkins Univ. Press.
  332. Find this resource:
  333. Kaplan, Jeffrey. 1995. Right wing violence in North America. Terrorism and Political Violence 7:44–95.
  334. Save Citation »Export Citation »E-mail Citation »
  335. Discusses typologies of right wing groups in the United States and theories supporting both their interdependence with and their isolation from the cultural mainstream.
  336. Kaplan, Jeffrey. 1995. Right wing violence in North America. Terrorism and Political Violence 7:44–95.
  337. Find this resource:
  338. Michel, Lou, and Dan Herbeck. 2001. American terrorists: Timothy McVeigh and the Oklahoma City bombing. New York: Regan Books.
  339. Save Citation »Export Citation »E-mail Citation »
  340. A thorough evaluation of the life of Timothy McVeigh, an antigovernment activist, and what led him to become the mastermind of the Oklahoma City bombing.
  341. Michel, Lou, and Dan Herbeck. 2001. American terrorists: Timothy McVeigh and the Oklahoma City bombing. New York: Regan Books.
  342. Find this resource:
  343. Whitsel, Brad. 2001. Ideological mutation and millennial belief in the American neo-Nazi movement. Studies in Conflict and Terrorism 24:89–106.
  344. DOI: 10.1080/10576100117722Save Citation »Export Citation »E-mail Citation »
  345. Explains the development of the neo-Nazi movement in the United States including their psychological worldview, organizational structure and changes in that structure, and ideological mutations and transformations.
  346. Whitsel, Brad. 2001. Ideological mutation and millennial belief in the American neo-Nazi movement. Studies in Conflict and Terrorism 24:89–106.
  347. Find this resource:
  348. Left-Wing Terrorism
  349.  
  350. Though their characteristics vary widely, left-wing terrorists are generally characterized by egalitarianism and their opposition to capitalism, racism, and war. Sprinzak 1998 focuses on left-wing terrorists in the United States. Several resources focus on antiwar groups in other countries, such as the Red Army Faction (Horchem 1991) the Red Brigades (Jamieson 1990, Ruggiero 2005), and Action Directe (Dartnell 1990). These articles focus on the development of the organization, as well as changing recruitment strategies and ideologies.
  351.  
  352. Dartnell, Michael. 1990. France’s Action Directe: Terrorists in search of a revolution. Terrorism and Political Violence 2:457–488.
  353. Save Citation »Export Citation »E-mail Citation »
  354. Provides an overview of the ideological phases of the French terrorist group Action Directe, which was active from 1979 until 1987, and whose activity culminated in a series of assassination attempts against French business and military figures.
  355. Dartnell, Michael. 1990. France’s Action Directe: Terrorists in search of a revolution. Terrorism and Political Violence 2:457–488.
  356. Find this resource:
  357. Horchem, Hans Josef. 1991. The decline of the Red Army Faction. Terrorism and Political Violence 3:61–75.
  358. Save Citation »Export Citation »E-mail Citation »
  359. Provides an overview of the ideology and structure of the Red Army Faction in Germany, and how and why it has changed over time.
  360. Horchem, Hans Josef. 1991. The decline of the Red Army Faction. Terrorism and Political Violence 3:61–75.
  361. Find this resource:
  362. Jamieson, Alison. 1990. Entry, discipline, and exit in the Italian Red Brigades. Terrorism and Political Violence 2:1–20.
  363. Save Citation »Export Citation »E-mail Citation »
  364. Provides an overview of the recruitment process for the Red Brigades in the 1970s through the infiltration of far-left groups in the factories of Northern Italy.
  365. Jamieson, Alison. 1990. Entry, discipline, and exit in the Italian Red Brigades. Terrorism and Political Violence 2:1–20.
  366. Find this resource:
  367. Ruggiero, Vincenzo. 2005. Brigate Rosse: Political violence, criminology, and social movement theory. Crime, Law, and Social Change 43:289–307.
  368. DOI: 10.1007/s10611-005-2031-1Save Citation »Export Citation »E-mail Citation »
  369. Examines the origins, structure, ideologies, and membership of the Red Brigades in Italy through the lens of social movement theories.
  370. Ruggiero, Vincenzo. 2005. Brigate Rosse: Political violence, criminology, and social movement theory. Crime, Law, and Social Change 43:289–307.
  371. Find this resource:
  372. Sprinzak, Ehud. 1998. The psychopolitical formation of extreme left terrorism in a democracy: The case of the weathermen. In Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Edited by Walter Reich, 65–85. Washington, DC: Woodrow Wilson Center Press; Baltimore and London: Distributed by the Johns Hopkins Univ. Press.
  373. Save Citation »Export Citation »E-mail Citation »
  374. Overview of the development of a left-wing movement in the United States, with a particular focus on the aims and ideologies of the radical left organization the Weathermen.
  375. Sprinzak, Ehud. 1998. The psychopolitical formation of extreme left terrorism in a democracy: The case of the weathermen. In Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Edited by Walter Reich, 65–85. Washington, DC: Woodrow Wilson Center Press; Baltimore and London: Distributed by the Johns Hopkins Univ. Press.
  376. Find this resource:
  377. Single-Issue Terrorism
  378.  
  379. Many terrorist groups in the United States today focus on single issues, the most prominent of which are abortion, animal rights, and environmentalism. Monaghan 2000 provides an overview of single-issue terrorism generally and the importance of understanding the motivations of individuals involved with these issues. Freilich and Pridemore 2007 and Pridemore and Freilich 2007 focus on the terrorist attacks against abortion clinics and the law-enforcement responses to those attacks. Leader and Probst 2003 and Joosse 2007 assess the ideologies of the Earth Liberation Front.
  380.  
  381. Freilich, Joshua D., and William Alex Pridemore. 2007. Politics, culture, and political crime: Covariates of abortion clinic attacks in the United States. Journal of Criminal Justice 35:323–336.
  382. DOI: 10.1016/j.jcrimjus.2007.03.008Save Citation »Export Citation »E-mail Citation »
  383. Examines violent acts against abortion clinics and finds that they are more common in areas where female empowerment is weaker, female victimization is more tolerated, and where the antiabortion movement has failed to reduce abortions.
  384. Freilich, Joshua D., and William Alex Pridemore. 2007. Politics, culture, and political crime: Covariates of abortion clinic attacks in the United States. Journal of Criminal Justice 35:323–336.
  385. Find this resource:
  386. Joosse, Paul. 2007. Leaderless resistance and ideological inclusion: The case of the Earth Liberation Front. Terrorism and Political Violence 19:351–368.
  387. DOI: 10.1080/09546550701424042Save Citation »Export Citation »E-mail Citation »
  388. Examines the development of the leaderless resistance strategy by the radical environmentalist movement, particularly the Earth Liberation Front. This strategy helps them to avoid detection, infiltration, and prosecution by the state, as well as to mobilize a greater number of “direct actions” for halting the degradation of nature.
  389. Joosse, Paul. 2007. Leaderless resistance and ideological inclusion: The case of the Earth Liberation Front. Terrorism and Political Violence 19:351–368.
  390. Find this resource:
  391. Leader, Stefan H., and Peter Probst. 2003. The Earth Liberation Front and environmental terrorism. Terrorism and Political Violence 15:37–58.
  392. DOI: 10.1080/09546550390449872Save Citation »Export Citation »E-mail Citation »
  393. Describes the Earth Liberation Front as the most active and destructive environmental terrorist group in the United States, having committed more than six hundred criminal acts resulting in $43 million in damages over a six-year period. Available online.
  394. Leader, Stefan H., and Peter Probst. 2003. The Earth Liberation Front and environmental terrorism. Terrorism and Political Violence 15:37–58.
  395. Find this resource:
  396. Monaghan, Rachel. 2000. Single-issue terrorism: A neglected phenomenon? Studies in Conflict and Terrorism 23:255–265.
  397. DOI: 10.1080/10576100050174977Save Citation »Export Citation »E-mail Citation »
  398. The author notes the dearth of research on single-issue groups in the terrorism literature, and notes the importance of better understanding these groups, which are increasingly using violence in pursuit of their causes.
  399. Monaghan, Rachel. 2000. Single-issue terrorism: A neglected phenomenon? Studies in Conflict and Terrorism 23:255–265.
  400. Find this resource:
  401. Pridemore, William Alex, and Joshua D. Freilich. 2007. The impact of state laws protecting abortion clinics and reproductive rights on crimes against abortion providers: Deterrence, backlash, or neither? Law and Human Behavior 31:611–627.
  402. DOI: 10.1007/s10979-006-9078-0Save Citation »Export Citation »E-mail Citation »
  403. The authors test competing hypotheses of deterrence and backlash effects to explain the violence against abortion clinics, but they find no support for either hypothesis.
  404. Pridemore, William Alex, and Joshua D. Freilich. 2007. The impact of state laws protecting abortion clinics and reproductive rights on crimes against abortion providers: Deterrence, backlash, or neither? Law and Human Behavior 31:611–627.
  405. Find this resource:
  406. Situational Crime Prevention and Terrorism
  407.  
  408. Situational crime prevention (SCP) techniques have been applied to various types of criminal activity to reduce the opportunities for offending behavior. This follows up on the theoretical foundation of routine activity theory, which states that in order for criminal behavior to occur, there must be a motivated offender, a suitable target, and a lack of a capable guardian. While the framework of routine activity theory has traditionally been applied to property crimes, it is now being applied to a variety of other types of criminal behavior including terrorism (see Canetti-Nisim, et al. 2006). Recognizing the role of opportunity in the activities that lead up to the terrorist acts, Clarke and Newman 2006 and Clarke and Newman 2007 discuss the application of SCP techniques such as target hardening and increasing risk to reduce the likelihood of committing terrorist activity.
  409.  
  410. Canetti-Nisim, Daphna, Gustavo Mesch, and Ami Pedahzur. 2006. Victimization from terrorist attacks: Randomness or routine activities? Terrorism and Political Violence 18:485–501.
  411. DOI: 10.1080/09546550600880237Save Citation »Export Citation »E-mail Citation »
  412. Explores the situations in which terrorist activities occur, testing randomness and the lifestyle-exposure theories. The authors find that risk of victimization from terrorism is not similar across all segments of society, and that victimization from terrorism is explainable by lifestyle-exposure theories.
  413. Canetti-Nisim, Daphna, Gustavo Mesch, and Ami Pedahzur. 2006. Victimization from terrorist attacks: Randomness or routine activities? Terrorism and Political Violence 18:485–501.
  414. Find this resource:
  415. Clarke, Ronald V., and Graeme R. Newman. 2006. Outsmarting the terrorists. Westport, CT: Praeger Security International.
  416. Save Citation »Export Citation »E-mail Citation »
  417. The first and most substantial book evaluating the application of situational crime-prevention techniques to the field of terrorism. The authors focus on what kinds of SCP techniques to employ to prevent terrorist incidents from happening, rather than the typical focus on what to do in response to terrorist attacks.
  418. Clarke, Ronald V., and Graeme R. Newman. 2006. Outsmarting the terrorists. Westport, CT: Praeger Security International.
  419. Find this resource:
  420. Clarke, Ronald V., and Graeme R. Newman. 2007. Police and the prevention of terrorism. Policing 1:9–20.
  421. DOI: 10.1093/police/pam003Save Citation »Export Citation »E-mail Citation »
  422. Relying on SCP principles, the authors focus on how the police can protect vulnerable targets and help prevent terrorist activities, while working in conjunction with public and private agencies that can act as capable guardians.
  423. Clarke, Ronald V., and Graeme R. Newman. 2007. Police and the prevention of terrorism. Policing 1:9–20.
  424. Find this resource:
  425. Terrorism and the Law
  426.  
  427. The responses to terrorism after 9/11 were vast, ranging from the creation of a Department of Homeland Security to the creation of detention facilities for suspected terrorists and two wars. The threats from weapons of mass destruction have led to extreme reactions, and studies such as Gurr and Cole 2002 and Heymann 2003 discuss these issues in detail. The constitutionality of many of the responses to terrorism are questionable, particularly because they lead to a reduction in civil liberties, often for select groups of people (see Cole and Dempsey 2006) Additionally, it is not clear how effective these policies are, and several authors discuss counterterrorism policies. Ganor 2005 and Hoffman 2002 evaluate the types of counterterrorism measures that have been implemented and what strategies are likely to be most effective in an age of global terror. An insightful article on combating terrorism, Atran and Axelrod 2008, states that the key to reducing terrorist activity is to utilize sacred values rather than material incentives in negotiations with those committing terror acts. Finally, Nacos 2007 explores the role of mass media in promulgating both terrorist and counterterrorism activities, with recommendations on how the media can be a useful resource.
  428.  
  429. Atran, Scott, and Robert Axelrod. 2008. Reframing sacred values. Negotiation Journal 24:221–246.
  430. DOI: 10.1111/j.1571-9979.2008.00182.xSave Citation »Export Citation »E-mail Citation »
  431. The authors discuss the need for policymakers to consider the sacred values rather than material or instrumental values of terrorists and potential terrorists, which they claim will prevent more and better opportunities for peace.
  432. Atran, Scott, and Robert Axelrod. 2008. Reframing sacred values. Negotiation Journal 24:221–246.
  433. Find this resource:
  434. Cole, David, and James X. Dempsey. 2006. Terrorism and the constitution: Sacrificing civil liberties in the name of national security. 3d ed. New York: The New Press.
  435. Save Citation »Export Citation »E-mail Citation »
  436. The authors note that the United States needs to protect civil rights when responding to the threat of terrorism, stating that several current policies (such as the 1996 Antiterrorism Act and the 2001 Patriot Act) erode such rights and are actually ineffective at protecting the country.
  437. Cole, David, and James X. Dempsey. 2006. Terrorism and the constitution: Sacrificing civil liberties in the name of national security. 3d ed. New York: The New Press.
  438. Find this resource:
  439. Gurr, Nadine, and Benjamin Cole. 2002. The new face of terrorism: Threats from weapons of mass destruction. 2d ed. London and New York: I. B. Tauris.
  440. Save Citation »Export Citation »E-mail Citation »
  441. Provides a comprehensive discussion about the dangers of weapons of mass destruction post-9/11, including the technological and political capabilities of Islamic extremist groups and other terrorist organizations.
  442. Gurr, Nadine, and Benjamin Cole. 2002. The new face of terrorism: Threats from weapons of mass destruction. 2d ed. London and New York: I. B. Tauris.
  443. Find this resource:
  444. Ganor, Boaz. 2005. The counter-terrorism puzzle: A guide for decision makers. New Brunswick, NJ: Transaction.
  445. Save Citation »Export Citation »E-mail Citation »
  446. The author discusses the need for balance between counterterrorism measures and civil liberties, with a particular focus on the ethical and legal dilemmas that security and law enforcement officials can face.
  447. Ganor, Boaz. 2005. The counter-terrorism puzzle: A guide for decision makers. New Brunswick, NJ: Transaction.
  448. Find this resource:
  449. Heymann, Philip B. 2003. Terrorism, freedom, and security: Winning without war. Cambridge, MA: MIT Press.
  450. Save Citation »Export Citation »E-mail Citation »
  451. This is a legal and political analysis of potential responses to terrorism other than war, focused particularly on a revitalization of intelligence services. The author denounces the Bush administration for the war in Iraq, which he believes will lead to long-term negative consequences for the United States in the international community.
  452. Heymann, Philip B. 2003. Terrorism, freedom, and security: Winning without war. Cambridge, MA: MIT Press.
  453. Find this resource:
  454. Hoffman, Bruce. 2002. Rethinking terrorism and counterterrorism since 9/11. Studies in Conflict and Terrorism 25:303–316.
  455. DOI: 10.1080/105761002901223Save Citation »Export Citation »E-mail Citation »
  456. Examines the nature of terrorism and counterterrorism measures post-9/11, and the level of safety of American citizens after the invasions of Afghanistan. Available online.
  457. Hoffman, Bruce. 2002. Rethinking terrorism and counterterrorism since 9/11. Studies in Conflict and Terrorism 25:303–316.
  458. Find this resource:
  459. Nacos, Brigitte L. 2007. Mass-mediated terrorism: The central role of the media in terrorism and counterterrorism. Lanham, MD: Rowman and Littlefield.
  460. Save Citation »Export Citation »E-mail Citation »
  461. Discusses the role and influence of the media in covering terrorist attacks, and outlines how the media can be effective yet still ethical in covering major terrorism incidents.
  462. Nacos, Brigitte L. 2007. Mass-mediated terrorism: The central role of the media in terrorism and counterterrorism. Lanham, MD: Rowman and Littlefield.
  463. Find this resource:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement