| |
| |
Preface | |
| |
| |
About the Author | |
| |
| |
| |
Introduction: The Terrorist Threat | |
| |
| |
Terrorism Trends Over the Last Three Decades | |
| |
| |
| |
Terrorism | |
| |
| |
| |
The Perennial Debate: What Is Terrorism? | |
| |
| |
The Meaning of Terrorism Over Time | |
| |
| |
The Definitional Potpourri | |
| |
| |
Obama Administration: Downplaying the �T� Word | |
| |
| |
Is Terrorism Ever Justified? | |
| |
| |
State Terror(ism) and State-Sponsored Terrorism | |
| |
| |
State Sponsors of Terrorism | |
| |
| |
The Meaning of Terrorism in This Volume | |
| |
| |
| |
Terrorism in the Global Context | |
| |
| |
Different Types of Groups | |
| |
| |
The Roots of Modern Terrorism | |
| |
| |
The Post-World War II Wave | |
| |
| |
1968: The Advent of Modem-Day Terrorism | |
| |
| |
IRA and ETA: Groups That Transcend the Average Life Span of Terrorist Groups | |
| |
| |
The Decline of Left-Wing Terrorism | |
| |
| |
The Rise of Catastrophic Terrorism | |
| |
| |
Unrestrained Terrorism and Counterterrorism after the Cold War | |
| |
| |
The Old and New Terrorism in the Post-Cold War Era | |
| |
| |
Modernization, Globalization, and the Proliferation of Religious Violence | |
| |
| |
Technological Advances and Global Communication | |
| |
| |
| |
Terrorism in the American Context | |
| |
| |
Right-Wing Terrorism | |
| |
| |
The Ku Klux Klan | |
| |
| |
Christian Identity and Neo-Nazi Groups | |
| |
| |
The Patriot and Militia Movement | |
| |
| |
The Surge of the Black Supremacist Movement | |
| |
| |
Left-Wing Terrorism | |
| |
| |
The First Anarchists in the United States | |
| |
| |
The Weather Underground | |
| |
| |
The Black Panther Party | |
| |
| |
The Symbionese Liberation Army | |
| |
| |
Single-Issue Terrorism | |
| |
| |
Antiabortion Violence | |
| |
| |
The Animal and Earth Liberation Fronts | |
| |
| |
The Jewish Defense League | |
| |
| |
Puerto Rican Nationalist Groups | |
| |
| |
Ideological Waves | |
| |
| |
| |
Religious Terrorism: Political Violence in the Name of God | |
| |
| |
Defending the Faith in �Cosmic Wars� | |
| |
| |
The Proliferation of Religious Violence | |
| |
| |
Alienation, Humiliation, and Fear | |
| |
| |
The Jihadi Movement and Political Violence | |
| |
| |
Muslims | |
| |
| |
Islamists | |
| |
| |
Salafis and Wahhabis | |
| |
| |
Jihadis | |
| |
| |
Jihadi Ideology | |
| |
| |
Homegrown Jihadis in the West-Including the United States | |
| |
| |
| |
The Making of Terrorists: Causes, Conditions, Influences | |
| |
| |
Terrorism as a Result of Rational Choice | |
| |
| |
Terrorism as a Result of Personal Traits | |
| |
| |
Terrorism as a Result of Social Interaction | |
| |
| |
Gender and Terrorism | |
| |
| |
For the Sake of Love | |
| |
| |
Demonstration of Gender Equality | |
| |
| |
Can Real Women Become Terrorists? | |
| |
| |
Tactical Advantages of Female Terrorists | |
| |
| |
Children as Terrorists | |
| |
| |
The Lack of a Universal Terrorist Profile | |
| |
| |
The Stages Leading to Terrorism | |
| |
| |
The Roots of Terrorism: No Simple Answers | |
| |
| |
| |
From State Sponsors to Involuntary Hosts | |
| |
| |
Former and Current State Sponsors | |
| |
| |
Iraq | |
| |
| |
Libya | |
| |
| |
Sudan | |
| |
| |
Syria | |
| |
| |
The Case of Saudi Arabia | |
| |
| |
When Governments Reconsider Their Support for Terrorism | |
| |
| |
Failed and Failing States and �Brown Areas� | |
| |
| |
Involuntary Host Countries | |
| |
| |
| |
Common Thread: Goals, Targets, Tactics | |
| |
| |
Do Terrorists Achieve Their Goals? | |
| |
| |
The Selection of Targets | |
| |
| |
Terrorist Methods: From Primitive Bombs to WMD | |
| |
| |
Most Common Methods of Terrorist Attacks | |
| |
| |
Most Likely CBRN Weapons in the Hands of Terrorists | |
| |
| |
| |
Organizational Structures and the Financing of Terror | |
| |
| |
When Terrorist Groups Decline or End | |
| |
| |
Financing Terrorism | |
| |
| |
Narco-Terrorism or Narco-Funded Terrorism? | |
| |
| |
| |
Counterterrorism | |
| |
| |
| |
Terrorism and America's Post-9/11 National Security Strategy | |
| |
| |
President Bush's National Security Strategy | |
| |
| |
| |
Making the World Safer and Better | |
| |
| |
| |
Preemption Before Threats Become Imminent | |
| |
| |
| |
Unilateral Use of Force | |
| |
| |
President Obama's National Security Strategy | |
| |
| |
| |
The Utility of Hard and Soft Power in Counterterrorism | |
| |
| |
Military Hard Power | |
| |
| |
Military Retaliation/Reprisal | |
| |
| |
Military Preemption | |
| |
| |
Commando Raids | |
| |
| |
Assassinations | |
| |
| |
Hostage Rescue Missions | |
| |
| |
Nonmilitary Hard Power: Economic Sanctions | |
| |
| |
Drying Up Financial Resources | |
| |
| |
Soft Power and Counterterrorism | |
| |
| |
Deterrence | |
| |
| |
Diplomacy | |
| |
| |
Talking to Terrorist Groups | |
| |
| |
Public Diplomacy | |
| |
| |
Conciliation and Peace | |
| |
| |
| |
Balancing Security, Liberty, and Human Rights | |
| |
| |
The Rights of �Enemy Combatants� | |
| |
| |
Torture: Leaders and Followers | |
| |
| |
Obama on Torture and Rendition | |
| |
| |
Torture: The Public Debate | |
| |
| |
| |
Homeland Security: Preparedness and Prevention | |
| |
| |
Post-9/11 Reorganization of Homeland Security | |
| |
| |
General and Specific Homeland Security Strategies | |
| |
| |
It's the Intelligence, Stupid | |
| |
| |
Reorganization of the Intelligence Community | |
| |
| |
International Cooperation | |
| |
| |
Congress Resists Change | |
| |
| |
| |
The News Media and the Internet | |
| |
| |
| |
Terrorist Propaganda and the Media | |
| |
| |
Publicity: The Universal Terrorist Goal | |
| |
| |
An Alternative View: Contemporary Terrorists Do Not Need Publicity | |
| |
| |
Terrorism and the Triangle of Communication | |
| |
| |
Media-Related Goals | |
| |
| |
The Attention-Getting Goal | |
| |
| |
The Recognition Goal | |
| |
| |
The Respectability/Legitimacy Goal | |
| |
| |
Bedfellows in a Marriage of Convenience | |
| |
| |
Media and Terrorist Contagion | |
| |
| |
Defending the Media | |
| |
| |
Treason or Public Service? | |
| |
| |
| |
Terror and Hate in Cyberspace | |
| |
| |
Terrorists and the Newest Communication Technologies | |
| |
| |
Propaganda and Hero Worship | |
| |
| |
The Internet as a Tool to Plan and Carry Out Terrorist Operations | |
| |
| |
The Web and the Retrieval of Valuable Information | |
| |
| |
Online Recruitment | |
| |
| |
Fund-Raising via the Net | |
| |
| |
| |
Anti- and Counterterrorism in the News | |
| |
| |
The Media and Military Responses to Terrorism | |
| |
| |
The Bombing of Libya (1986) | |
| |
| |
Bombing of Iraq's Intelligence Headquarters (1993) | |
| |
| |
Missile Strikes in Afghanistan and Sudan (1998) | |
| |
| |
The Post-9/11 War Against Terrorism | |
| |
| |
Military Action Against Al Qaeda and the Taliban (2001) | |
| |
| |
The Invasion of Iraq (2003) | |
| |
| |
The Iraq War: Different News Coverage Abroad | |
| |
| |
| |
Conclusion: Living with Terrorist Threats | |
| |
| |
Appendix: Major Terrorist Incidents Since the Early 1970s | |
| |
| |
Bibliography | |
| |
| |
Index | |