Skip to content

Terrorism in the Twenty-First Century

Best in textbook rentals since 2012!

ISBN-10: 0205779719

ISBN-13: 9780205779710

Edition: 6th 2011

Authors: Cindy C. Combs

List price: $63.40
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Terrorism in the Twenty-First Centuryhelps readers understand terrorism, responses to it, and current trends that affect the future of this phenomenon. Putting terrorism into historical perspective and analyzing it as a form of political violence, this text presents the most essential concepts, the latest data, and numerous case studies to promote effective analysis of terrorist acts.Terrorism in the Twenty-First Centuryobjectively breaks down the who-what-why-how of terrorism, giving readers a way both to understand patterns of behavior and to more critically evaluate forthcoming patterns.
Customers also bought

Book details

List price: $63.40
Edition: 6th
Copyright year: 2011
Publisher: Prentice Hall PTR
Publication date: 1/28/2010
Binding: Paperback
Pages: 400
Size: 5.75" wide x 9.25" long x 0.75" tall
Weight: 1.364
Language: English

Preface
Terrorism in Perspective
An Idea Whose Time Has Come?
Key Concepts
Modern Definitions of an Old Concept
Crucial Components of Terrorism
Violence, Audience, and a Mood of Fear
Victims: The Right Place-But The Wrong Time
Redefining "Terrorism"
Political Quicksand
Typologies of Terrorism: Useful Tools
Using Tactics As Labels
Conclusions
Not a Modern Phenomenon
Key Concepts
Historic Roots
State Terrorism
Tyrannicide: "To Go Too Fast"
Guerrilla Warfare: Selective Violence
Cyclical Nature of Terror
Cycle of. Violence: From Germany to Israel to Palestine
Conclusions
Political Assassinations
Drugs, Religion, and Political Murders
Piracy
State-Sponsored Terrorism
Technological Changes
Weapons
Ideology and Terrorism: Rights From Wrongs?
Key Concepts
The Rationalization of Violence
Tupamaros (Uruguay Faction)
Rebellion and The Right of Self-Determination
The Palestinians
Terrorism In The Name of God
Causes of The Left, Right, and Center
Religious Fanaticism
Anarchism
Neo-Nazism/Neofascism
Separatism
Nationalism
Issue-Oriented Terror
Ideological Mercenaries
Pathological Terrorists
Counterterror Terrorists
Conclusions
Who are The Terrorists?
Criminals or Crusaders?
Key Concepts
Profile of a Terrorist
Terrorist Beliefs and Images
Can We Generalize About A "Typical" Terrorist?
Individual-Level Analysis: Why Does Someone Become A Terrorist Today?
Simplicity
Identification
Revenge
Terrorism Is Different Today
Aims or Goals
Group Dynamics
Religious Fanaticism
Demographic Trends in Group Membership
Age
Education
Economic Status
Gender
the Black Widows
Disturbing Patterns of Socialization
Socialization toward Violence
Alienation toward Western Systems
Osama Bin Laden
Conclusions
Terrorism by The State
Key Concepts
Internal Terrorism: The Beast That Lurks Within
Genocide In Nazi Germany
Other Examples of Genocide
Coerced Conversion and Genocide In Stalin's USSR
Genocide in Darfur
Argentina's "Dirty War": Overt State-Supported Terrorism
The Continuing Reality of State Terror
U.S. Prisoners in the "War on Terror"
External Terrorism: Waging War by Proxy
Reluctant Bedfellows: The Arms Bazaar
Weapons of Mass Destruction on The Arms Bazaar
Silent Partners: offering Arms and Safe Haven
Syria
Iran
Libya
Terrorist-Supported States
Afghanistan under The Taliban Leadership
Palestinian Liberation Authority
Conclusions
Terrorism, Inc.
Key Concepts
Networking
Shared Strategic Planning
Terrorism Is Big Business
Libyan Protector
Iran's Support Network
Al-Qaeda's Funding
The Internationalization of Terrorism
Al-Qaeda's Network
The "Lieutenants"
The Network and Netwar
Narco-Terrorism
Conclusions
How Do They Operate?
Terrorist Training
Key Concepts
The "How" Questions
Training Sites
Terrorist Camps in the United Kingdom and the United States
Traveling Training Camps
Training Topics: What Do They Learn At Camp?
Arson and Bombs
Assassination and Ambush Techniques
Extortion And Kidnapping for Ransom
Disguise Techniques, Clandestine Travel, Recruitment, And Communications
Intelligence Collection and Counterintelligence Methods
Weapons
September 11, 2001, Attacks on the United States
Sequence of Events
Insights into Those Responsible
Potential for Destruction: A Terrorist's Arsenal
Explosives
Improvised Explosive Devices (IEDs)
Assassinations and Ambushes
Small Arms
Automatic Weapons
Portable Rockets
Aerial Hijacking
Sabotage
Weapons of Mass Destruction (WMDs)
Chemical Or Biological Attacks
Al-Qaeda's Quest for A Biological Toxin
Radiological and Nuclear Attacks
Suicide Bombing: A "New" Weapon
Ideology, Not Psychology, of Suicide Bombing
Suicide Bombings in Iraq
Suicide Bomber Training Camp
Phases of A Terrorist Incident: Putting The Lessons Learned At Camp into Practice
Conclusions
The Media: A Weapon for Both Sides?
Key Concepts
Mass-Mediated Terrorism
Terrorist Goals Regarding The Media
Publicity
Favorable Understanding of Their Cause
Legitimacy and Identity
Destabilizing The Enemy
Government Goals Regarding Media
Publicity
Criminality of Act
Deny The Terrorist A Platform
Information and Cooperation
Media Goals In Terrorist Events
Getting A Scoop
Dramatic Presentation of News
Protection of Rights
Personal Security
Propaganda by The Deed
Media As A "Showcase" for Terrorism
Legal Issue of The Right of Access
Censorship: The Ugly Word
Complicity: A Very Serious Charge
Bin Laden's Tapes
Conclusions
Domestic Terrorism in The United States
Key Concepts
Historical Roots in The United States
Conceptualizing Domestic Terrorism in The United States
Left-Wing Terrorism
Left-Wing Extremism
Nationalist Groups
Single-Issue Groups
Earth Liberation Front
Conclusion: Left-Wing Terrorism In The United States Today
Right-Wing Extremism: From Militia Groups to Religious Fanatics;
Militia Movements
Aryan Nations
Christian Identity Movement
Montana Freemen and The Christian Patriots
Field Manual of The Free Militia
Theological Training
Equipment for A "Prepared" Militia Member
Transnational Terrorism
The "Lone Wolf" Terrorists
Oklahoma City Bombing
Conclusions
Responses to Terrorism
Legal Perspectives on Terrorism
Key Concepts
Terrorism Is A Crime
Laws of War
Enemy Combatants
Iraq: Differentiating Between Combatants and Noncombatants
Piracy of Air and Sea
Protection of Diplomatic Personnel and Heads of State
Regional Legal Efforts to Prevent or Punish Terrorism
International Efforts to Restrict Internal State Terrorism
Arresting Sudan's President
Is Terrorism A Political Crime?
The United Nations and The War on Terrorism
Conclusions
The Use of Force to Combat Terrorism
Key Concepts
Nations Without Defenses
Strike Forces: A First Line of Defense?
Israel's Sayaret Mat'kal
The British Special Air Services
Germany's GSG-9
Too Many U.S. Options?
Special Forces, U.S. Army
1st Special Forces Operational Detachment-Delta (Delta Force), U.S. Army
Ranger, U.S. Army
Air Force Special Operations Command
Naval Special Warfare Command
New Units-and New Technologies
Operation Chavin De Huantar
Mogadishu
Conclusions
The Use of Legislation and Intelligence Resources to Combat Terrorism
Key Concepts
Legal Initiatives to Counter Terrorism
Canada's Legal War With The FLQ
The "Temporary" British Problem In Northern Ireland
Italy and The "Penititi"
The PATRIOT Act
Investigation: The Intelligence Initiative
Germany's Intelligence Gathering: Target Search Teams
U.S. Intelligence-Gathering: Multiple Tools
Department of Homeland Security
Computers As Tools of Investigation
Dark Web Project Tracking Terrorism
Government Use of Investigation and Intelligence
Conclusions
Terrorism in Mumbai
Security Measures: A Frail Defense
Key Concepts
Three Facets of Security
NSA's Operation Eligible Receiver
Critical Infrastructure Protection
Airport Security in The United States
Weaknesses in The Security System
Ease of Access to The Cockpit
Inadequate Screening Processes
Impact of September 11 Attacks on Airport Security
"Fake Bomb" Smuggling
Protecting Other Forms of Public Transportation
London Transportation Attacks 2005
Port Security
Preventive Security
The Costs of Security
Threat and Risk Assessment
Threat Assessment
Risk of Terrorist Attacks
Allocating Resources Based on Threat and Risk Assessment
Conclusions
Cyber Security and Cyberterror
Current Trends and Future Prospects
The New Terrorist Threat: Weapons of Mass Destruction
Key Concepts
Context of The Threat
Historical Use of Weapons of Mass Destruction
A Brief History of Biological Weapons
A Brief History of Chemical Weapons
A Brief History of Nuclear Weapons
Types of Weapons of Mass Destruction Available
Biological Agents
Anthrax
Viral Hemorrhagic Fevers
Bioterrorism Defense
Chemical Weapons
Ricin
Radiological Weapons
Nuclear Weapons
Access to and Use of Weapons of Mass Destruction
Chemical Agents
Aum Attack on the Tokyo Subway
Biological Agents
Agroterrorism
Nuclear Devices
Radiological Devices
Risk Assessment: Comparative Effectiveness of WMD
Conclusions
Future Trends
Key Concepts
Identifying Trends in Terrorism
A War on Terror
The Counterterrorism Learning Curve
Globalization, and Understanding the "Why" of Terror Attacks
Using The Internet
Armed Efforts to Eliminate Terror: War in Iraq
Dealing With Weapons of Mass Destruction
Trends in Terrorist Incidents
Volume and Lethality of Incidents
Radicalization of Religion and Terrorism Today
Deterrence as a Tool against Suicide Bombing
Impact of The Generational Differences within Terrorist Groups
IED: Weapon of Choice
The Threat and Reality of Cyberterror
Nature of Groups as Limiting Factor
Goals of Groups as Limiting Factors
Conclusions
Index