rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780072837780

Terrorism and Counter-Terrorism : Understanding the New Security Environment, Readings and Interpretations

by ;
  • ISBN13:

    9780072837780

  • ISBN10:

    0072837780

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2002-09-04
  • Publisher: MCG
  • View Upgraded Edition
  • Purchase Benefits
List Price: $32.33

Summary

Colonel Russell Howard and Captain Reid Sawyer have collected and organized new and reprinted articles and essays by political scientists, government officials, and members of the nation's armed forces. The editors and several of the authors write from practical field experience in the nation's war on terrorism. Others have had significant responsibility for planning government policy and responses. The contributors include a majority of the significant names in the field including General Barry McCaffrey, Martha Crenshaw, Bruce Hoffman, Barry Posen, Jessica Stern, Ashton Carter. Part One of the book analyzes the philosophical, political, and religious roots of terrorist activities around the world and discusses the national, regional, and global effects of historical and recent acts of terrorism. In addition to material on the threats from suicide bombers, as well as chemical, biological, radiological, and nuclear weapons, there are also important contributions analyzing new and growing threats: narco-terrorism, cyber-terrorism, genomic terrorism, and agro-ter

Table of Contents

Foreword by Barry R. McCaffery
Preface by Russell D. Howard

Part One – Defining the Threat


Chapter 1.Terrorism Defined


1.1 Bruce Hoffman, from "Defining Terrorism," Inside Terrorism (Columbia University Press, 1998)
1.2 Paul R. Pillar, “The Dimensions of Terrorism and Counterterrorism,” Terrorism and US Foreign Policy (Brookings Institution Press, 2001)
1.3 Eqbal Ahmad and David Barsamian, fromTerrorism: Theirs and Ours(Seven Stories Press, 2001)

Chapter 2. Why Terrorism?


2.1 Martha Crenshaw, from “The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice," in Walter Reich, ed., Origins of Terrorism: Psychologies, ideologies, Theologies, States of Mind (Woodrow Wilson Center Press, 1998)
2.2 Louise Richardson, “Global Rebels" Harvard International Review, vol. 20, no. 4 (Fall 1998

Chapter 3. The New Terrorism Model


3.1 Bruce Hoffman, from “The Modern Terrorist Mindset: Tactics, Targets and Technologies," Columbia International Affairs Online Working Paper (October 1997)
3.2 John Arquilla, David Ronfeldt, and Michele Zanini, from “Networks, Netwar, and Information-Age Terrorism," in Ian O. Lesser, John Arquilla, Bruce Hoffman, David Ronfeldt, Michele Zanini and Brian Jenkins, Countering The New Terrorism (RAND Corporation, 1999)

Chapter 4. Religion


4.1 Magnus Ranstorp, from “Terrorism in the Name of Religion,” Journal of International Affairs (Summer 1996)
4.2 Mark Juergensmeyer, from "The Logic of Religious Violence," in David C. Rapoport, ed., Inside Terrorism Organizations (Columbia University Press, 1998)

Chapter 5. Weapons of Mass Destruction


5.1 Jessica Stern, from “Getting and Using the Weapons,” The Ultimate Terrorists (Harvard University Press, 1999)
5.2 Christopher F. Chyba, from "Toward Biological Security," Foreign Affairs (May/June 2002)
5.3 Michael L. Moodie, from "The Chemical Weapons Threat," in Sidney D. Drell, Abraham D. Sofaer, George D. Silson, Eds., The New Terror: Facing the Threat of Biological and Chemical Weapons (Hoover Institution Press, 1999)

Chapter 6. The Threat of Other Forms of Terrorism


6.1 Barry R. McCaffrey and John A. Basso, from "Narcotics, Terrorism and International Crime: The Convergence Phenomenon," An Original Essay Written for This Volume(July, 2002)
6.2 Gregory J. Rattray, from "The Cyberterrorism Threat," in James M. Smith and William C. Thomas, eds., The Terrorism Threat and U.S. Government Response: Operational and Organizational Factors (USAF Institute for National Security Studies, March 2001)
6.3 Jason Pate and Gavin Cameron, from “Covert Biological Weapons Attacks Against Agricultural Targets: Assessing the Impact Against U.S. Agriculture,” BCSIA Discussion Paper 2001-9, ESDP Discussion Paper ESDP-2001-05, John F. Kennedy School of Government, Harvard University (2001)
6.4 G. Davidson Smith, from “Single Issue Terrorism,” Commentary No. 74, a Canadian Security Intelligence Service Publication (Winter 1998)

Part II–Countering the Terrorist Threat

Chapter 7. The Challenges of Terrorism


7.1 Laura K. Donohue, adapted from “Fear Itself: Counterterrorism, Individual Rights, and U.S. Foreign Relations Post 9-11,” A Paper Presented at the International Studies Association Convention, New Orleans (March, 2002)
7.2 Bruce Hoffman, from “A Nasty Business,” The Atlantic Monthly (January 2002)
7.3 Anthony Clark Arend, from “Terrorism and Just War Doctrine,” in Elliott Abrams, ed., Close Calls: Intervention, Terrorism, Missile Defense, and ‘Just War’ Today (Ethics and Public Policy Center, 1998)
7.4 Brad Roberts, from “NBC-Armed Rogues: Is There a Moral Case for Preemption?” in Elliott Abrams, ed., Close Calls: Intervention, Terrorism, Missile Defense and ‘Just War’ Today (Ethics and Public Policy Center, 1998)

Chapter 8. Strategies and Approaches for Combating Terrorism


8.1 Richard K. Betts, from “The Soft Underbelly of American Primacy: Tactical Advantages of Terror,” Political Science Quarterly (2002)
8.2 James S. Robbins, from “Bin Laden’s War,” An Original Essay Written for This Volume (2002)
8.3 Richard H. Shultz and Andreas Vogt, from "The Real Intelligence Failure on 9/11: The Case for a Doctrine of Striking First," An Original Essay Written for This Volume (2002)
8.4 Barry R. Posen, from “The Struggle Against Terrorism: Grand Strategy, Strategy, and Tactics,” International Security (Winter 2001/02)
8.5 Michele L. Malvesti, from “Explaining the United States’ Decision to Strike Back at Terrorists,” Terrorism and Political Violence, vol. 13, no. 2 (Summer 2001)

Chapter 9. Organizing to Fight Terrorism


9.1 Ashton B. Carter, from “The Architecture of Government in the Face of Terrorism,” International Security (Winter 2001/02)
9.2 Russell D. Howard, from “The National Security Act of 1947 and Biological and Chemical Weapons: A Midcentury Mechanism For End-Of-Millennium Threats,” An Original Essay (2000)
9.3 Richard K. Betts, from “Fixing Intelligence,” Foreign Affairs (January/February 2002)
9.4 Martha Crenshaw, from “Counterterrorism Policy and the Political Process,” Studies in Conflict & Terrorism (2001)

Chapter 10. Instruments of Counterterrorism


10.1 Sam C. Sarkesian, from “The New Protracted Conflict: The U.S. Army Special Forces Then and Now,” Orbis (Spring 2002)
10.2 Rob de Wijk, from “The Limits of Military Power,” The Washington Quarterly (Winter 2002)
10.3 Daniel B. Pickard, from “Legalizing Assassination? Terrorism, the Central Intelligence Agency, and International Law,” The Georgia Journal of International and Comparative Law (2001)
10.4 David J. Rothkopf, from “Business Versus Terror,” Foreign Policy (May/June 2002)

Appendices


Appendix A Background Information on Designated Foreign Terrorist Organizations
Appendix B Significant Terrorist Incidents, 1961-2001
Appendix C Chemical and Biological Weapons: Possession and Programs Past and Present
Appendix D Statement by the President in His Address to the Nation, September 11, 2001
Appendix E Terrorism Incidents (1981 – 2001) on, September 11, 2001
Appendix E Terrorism Incidents (1981 – 2001)

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program