Preface | p. xii |
Terrorism in Perspective | |
An Idea Whose Time Has Come? | p. 1 |
Key Concepts | p. 1 |
Modern Definitions of an Old Concept | p. 2 |
Crucial Components of Terrorism | p. 5 |
Violence, Audience, and a Mood of Fear | p. 7 |
Victims: The Right Place-But The Wrong Time | p. 9 |
Redefining "Terrorism" | p. 11 |
Political Quicksand | p. 12 |
Typologies of Terrorism: Useful Tools | p. 14 |
Using Tactics As Labels | p. 15 |
Conclusions | |
Not a Modern Phenomenon | p. 18 |
Key Concepts | p. 18 |
Historic Roots | p. 18 |
State Terrorism | p. 20 |
Tyrannicide: "To Go Too Fast" | p. 22 |
Guerrilla Warfare: Selective Violence | p. 23 |
Cyclical Nature of Terror | p. 26 |
Cycle of. Violence: From Germany to Israel to Palestine | p. 28 |
Conclusions | p. 29 |
Political Assassinations | p. 29 |
Drugs, Religion, and Political Murders | p. 29 |
Piracy | p. 30 |
State-Sponsored Terrorism | p. 30 |
Technological Changes | p. 30 |
Weapons | p. 31 |
Ideology and Terrorism: Rights From Wrongs? | p. 34 |
Key Concepts | p. 34 |
The Rationalization of Violence | p. 35 |
Tupamaros (Uruguay Faction) | p. 37 |
Rebellion and The Right of Self-Determination | p. 38 |
The Palestinians | p. 41 |
Terrorism In The Name of God | p. 42 |
Causes of The Left, Right, and Center | p. 45 |
Religious Fanaticism | p. 46 |
Anarchism | p. 46 |
Neo-Nazism/Neofascism | p. 46 |
Separatism | p. 47 |
Nationalism | p. 47 |
Issue-Oriented Terror | p. 47 |
Ideological Mercenaries | p. 48 |
Pathological Terrorists | p. 49 |
Counterterror Terrorists | p. 49 |
Conclusions | p. 49 |
Who are The Terrorists? | |
Criminals or Crusaders? | p. 52 |
Key Concepts | p. 52 |
Profile of a Terrorist | p. 53 |
Terrorist Beliefs and Images | p. 56 |
Can We Generalize About A "Typical" Terrorist? | p. 59 |
Individual-Level Analysis: Why Does Someone Become A Terrorist Today? | p. 65 |
Simplicity | p. 65 |
Identification | p. 65 |
Revenge | p. 67 |
Terrorism Is Different Today | p. 68 |
Aims or Goals | p. 68 |
Group Dynamics | p. 69 |
Religious Fanaticism | p. 70 |
Demographic Trends in Group Membership | p. 71 |
Age | p. 71 |
Education | p. 73 |
Economic Status | p. 73 |
Gender | p. 74 |
the Black Widows | p. 75 |
Disturbing Patterns of Socialization | p. 75 |
Socialization toward Violence | p. 75 |
Alienation toward Western Systems | p. 76 |
Osama Bin Laden | p. 76 |
Conclusions | p. 78 |
Terrorism by The State | p. 82 |
Key Concepts | p. 82 |
Internal Terrorism: The Beast That Lurks Within | p. 83 |
Genocide In Nazi Germany | p. 84 |
Other Examples of Genocide | p. 85 |
Coerced Conversion and Genocide In Stalin's USSR | p. 86 |
Genocide in Darfur | p. 87 |
Argentina's "Dirty War": Overt State-Supported Terrorism | p. 88 |
The Continuing Reality of State Terror | p. 89 |
U.S. Prisoners in the "War on Terror" | p. 91 |
External Terrorism: Waging War by Proxy | p. 93 |
Reluctant Bedfellows: The Arms Bazaar | p. 96 |
Weapons of Mass Destruction on The Arms Bazaar | p. 98 |
Silent Partners: offering Arms and Safe Haven | p. 98 |
Syria | p. 98 |
Iran | p. 100 |
Libya | p. 102 |
Terrorist-Supported States | p. 103 |
Afghanistan under The Taliban Leadership | p. 103 |
Palestinian Liberation Authority | p. 104 |
Conclusions | p. 105 |
Terrorism, Inc. | p. 108 |
Key Concepts | p. 108 |
Networking | p. 108 |
Shared Strategic Planning | p. 110 |
Terrorism Is Big Business | p. 111 |
Libyan Protector | p. 113 |
Iran's Support Network | p. 114 |
Al-Qaeda's Funding | p. 116 |
The Internationalization of Terrorism | p. 118 |
Al-Qaeda's Network | p. 120 |
The "Lieutenants" | p. 120 |
The Network and Netwar | p. 121 |
Narco-Terrorism | p. 123 |
Conclusions | p. 124 |
How Do They Operate? | |
Terrorist Training | p. 129 |
Key Concepts | p. 129 |
The "How" Questions | p. 130 |
Training Sites | p. 130 |
Terrorist Camps in the United Kingdom and the United States | p. 133 |
Traveling Training Camps | p. 134 |
Training Topics: What Do They Learn At Camp? | p. 135 |
Arson and Bombs | p. 136 |
Assassination and Ambush Techniques | p. 136 |
Extortion And Kidnapping for Ransom | p. 137 |
Disguise Techniques, Clandestine Travel, Recruitment, And Communications | p. 137 |
Intelligence Collection and Counterintelligence Methods | p. 138 |
Weapons | p. 138 |
September 11, 2001, Attacks on the United States | p. 140 |
Sequence of Events | p. 140 |
Insights into Those Responsible | p. 142 |
Potential for Destruction: A Terrorist's Arsenal | p. 143 |
Explosives | p. 143 |
Improvised Explosive Devices (IEDs) | p. 144 |
Assassinations and Ambushes | p. 146 |
Small Arms | p. 146 |
Automatic Weapons | p. 147 |
Portable Rockets | p. 147 |
Aerial Hijacking | p. 148 |
Sabotage | p. 149 |
Weapons of Mass Destruction (WMDs) | p. 149 |
Chemical Or Biological Attacks | p. 149 |
Al-Qaeda's Quest for A Biological Toxin | p. 151 |
Radiological and Nuclear Attacks | p. 152 |
Suicide Bombing: A "New" Weapon | p. 155 |
Ideology, Not Psychology, of Suicide Bombing | p. 155 |
Suicide Bombings in Iraq | p. 155 |
Suicide Bomber Training Camp | p. 156 |
Phases of A Terrorist Incident: Putting The Lessons Learned At Camp into Practice | p. 157 |
Conclusions | p. 159 |
The Media: A Weapon for Both Sides? | p. 163 |
Key Concepts | p. 163 |
Mass-Mediated Terrorism | p. 163 |
Terrorist Goals Regarding The Media | p. 164 |
Publicity | p. 164 |
Favorable Understanding of Their Cause | p. 165 |
Legitimacy and Identity | p. 165 |
Destabilizing The Enemy | p. 166 |
Government Goals Regarding Media | p. 166 |
Publicity | p. 166 |
Criminality of Act | p. 167 |
Deny The Terrorist A Platform | p. 167 |
Information and Cooperation | p. 167 |
Media Goals In Terrorist Events | p. 168 |
Getting A Scoop | p. 168 |
Dramatic Presentation of News | p. 168 |
Protection of Rights | p. 169 |
Personal Security | p. 169 |
Propaganda by The Deed | p. 169 |
Media As A "Showcase" for Terrorism | p. 171 |
Legal Issue of The Right of Access | p. 173 |
Censorship: The Ugly Word | p. 175 |
Complicity: A Very Serious Charge | p. 178 |
Bin Laden's Tapes | p. 182 |
Conclusions | p. 183 |
Domestic Terrorism in The United States | p. 188 |
Key Concepts | p. 188 |
Historical Roots in The United States | p. 188 |
Conceptualizing Domestic Terrorism in The United States | p. 191 |
Left-Wing Terrorism | p. 192 |
Left-Wing Extremism | p. 192 |
Nationalist Groups | p. 193 |
Single-Issue Groups | p. 194 |
Earth Liberation Front | p. 194 |
Conclusion: Left-Wing Terrorism In The United States Today | p. 195 |
Right-Wing Extremism: From Militia Groups to Religious Fanatics; | p. 196 |
Militia Movements | p. 196 |
Aryan Nations | p. 198 |
Christian Identity Movement | p. 199 |
Montana Freemen and The Christian Patriots | p. 200 |
Field Manual of The Free Militia | p. 201 |
Theological Training | p. 202 |
Equipment for A "Prepared" Militia Member | p. 203 |
Transnational Terrorism | p. 204 |
The "Lone Wolf" Terrorists | p. 207 |
Oklahoma City Bombing | p. 208 |
Conclusions | p. 209 |
Responses to Terrorism | |
Legal Perspectives on Terrorism | p. 214 |
Key Concepts | p. 214 |
Terrorism Is A Crime | p. 214 |
Laws of War | p. 217 |
Enemy Combatants | p. 220 |
Iraq: Differentiating Between Combatants and Noncombatants | p. 222 |
Piracy of Air and Sea | p. 223 |
Protection of Diplomatic Personnel and Heads of State | p. 226 |
Regional Legal Efforts to Prevent or Punish Terrorism | p. 228 |
International Efforts to Restrict Internal State Terrorism | p. 230 |
Arresting Sudan's President | p. 233 |
Is Terrorism A Political Crime? | p. 234 |
The United Nations and The War on Terrorism | p. 235 |
Conclusions | p. 239 |
The Use of Force to Combat Terrorism | p. 244 |
Key Concepts | p. 244 |
Nations Without Defenses | p. 245 |
Strike Forces: A First Line of Defense? | p. 246 |
Israel's Sayaret Mat'kal | p. 246 |
The British Special Air Services | p. 249 |
Germany's GSG-9 | p. 252 |
Too Many U.S. Options? | p. 254 |
Special Forces, U.S. Army | p. 255 |
1st Special Forces Operational Detachment-Delta (Delta Force), U.S. Army | p. 256 |
Ranger, U.S. Army | p. 256 |
Air Force Special Operations Command | p. 256 |
Naval Special Warfare Command | p. 257 |
New Units-and New Technologies | p. 258 |
Operation Chavin De Huantar | p. 259 |
Mogadishu | p. 260 |
Conclusions | p. 262 |
The Use of Legislation and Intelligence Resources to Combat Terrorism | p. 265 |
Key Concepts | p. 265 |
Legal Initiatives to Counter Terrorism | p. 266 |
Canada's Legal War With The FLQ | p. 267 |
The "Temporary" British Problem In Northern Ireland | p. 268 |
Italy and The "Penititi" | p. 270 |
The PATRIOT Act | p. 271 |
Investigation: The Intelligence Initiative | p. 277 |
Germany's Intelligence Gathering: Target Search Teams | p. 278 |
U.S. Intelligence-Gathering: Multiple Tools | p. 280 |
Department of Homeland Security | p. 282 |
Computers As Tools of Investigation | p. 283 |
Dark Web Project Tracking Terrorism | p. 284 |
Government Use of Investigation and Intelligence | p. 284 |
Conclusions | p. 287 |
Terrorism in Mumbai | p. 287 |
Security Measures: A Frail Defense | p. 292 |
Key Concepts | p. 292 |
Three Facets of Security | p. 293 |
NSA's Operation Eligible Receiver | p. 295 |
Critical Infrastructure Protection | p. 297 |
Airport Security in The United States | p. 297 |
Weaknesses in The Security System | p. 297 |
Ease of Access to The Cockpit | p. 298 |
Inadequate Screening Processes | p. 299 |
Impact of September 11 Attacks on Airport Security | p. 299 |
"Fake Bomb" Smuggling | p. 301 |
Protecting Other Forms of Public Transportation | p. 303 |
London Transportation Attacks 2005 | p. 303 |
Port Security | p. 305 |
Preventive Security | p. 306 |
The Costs of Security | p. 307 |
Threat and Risk Assessment | p. 309 |
Threat Assessment | p. 309 |
Risk of Terrorist Attacks | p. 310 |
Allocating Resources Based on Threat and Risk Assessment | p. 312 |
Conclusions | p. 312 |
Cyber Security and Cyberterror | p. 313 |
Current Trends and Future Prospects | |
The New Terrorist Threat: Weapons of Mass Destruction | p. 318 |
Key Concepts | p. 318 |
Context of The Threat | p. 318 |
Historical Use of Weapons of Mass Destruction | p. 320 |
A Brief History of Biological Weapons | p. 320 |
A Brief History of Chemical Weapons | p. 321 |
A Brief History of Nuclear Weapons | p. 322 |
Types of Weapons of Mass Destruction Available | p. 323 |
Biological Agents | p. 323 |
Anthrax | p. 325 |
Viral Hemorrhagic Fevers | p. 327 |
Bioterrorism Defense | p. 328 |
Chemical Weapons | p. 331 |
Ricin | p. 332 |
Radiological Weapons | |
Nuclear Weapons | p. 333 |
Access to and Use of Weapons of Mass Destruction | p. 334 |
Chemical Agents | p. 335 |
Aum Attack on the Tokyo Subway | p. 336 |
Biological Agents | p. 337 |
Agroterrorism | p. 339 |
Nuclear Devices | p. 339 |
Radiological Devices | p. 341 |
Risk Assessment: Comparative Effectiveness of WMD | p. 341 |
Conclusions | p. 342 |
Future Trends | p. 347 |
Key Concepts | p. 347 |
Identifying Trends in Terrorism | p. 347 |
A War on Terror | p. 349 |
The Counterterrorism Learning Curve | p. 350 |
Globalization, and Understanding the "Why" of Terror Attacks | p. 350 |
Using The Internet | p. 351 |
Armed Efforts to Eliminate Terror: War in Iraq | p. 352 |
Dealing With Weapons of Mass Destruction | p. 353 |
Trends in Terrorist Incidents | p. 355 |
Volume and Lethality of Incidents | p. 355 |
Radicalization of Religion and Terrorism Today | p. 358 |
Deterrence as a Tool against Suicide Bombing | p. 361 |
Impact of The Generational Differences within Terrorist Groups | p. 362 |
IED: Weapon of Choice | p. 363 |
The Threat and Reality of Cyberterror | p. 363 |
Nature of Groups as Limiting Factor | p. 365 |
Goals of Groups as Limiting Factors | p. 366 |
Conclusions | p. 367 |
Index | p. 371 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.