| |
| |
Preface | |
| |
| |
| |
Terrorism in Perspective | |
| |
| |
| |
An Idea Whose Time Has Come? | |
| |
| |
Key Concepts | |
| |
| |
Modern Definitions of an Old Concept | |
| |
| |
Crucial Components of Terrorism | |
| |
| |
Violence, Audience, and a Mood of Fear | |
| |
| |
Victims: The Right Place-But The Wrong Time | |
| |
| |
| |
Redefining "Terrorism" | |
| |
| |
Political Quicksand | |
| |
| |
Typologies of Terrorism: Useful Tools | |
| |
| |
Using Tactics As Labels | |
| |
| |
Conclusions | |
| |
| |
| |
Not a Modern Phenomenon | |
| |
| |
Key Concepts | |
| |
| |
Historic Roots | |
| |
| |
State Terrorism | |
| |
| |
Tyrannicide: "To Go Too Fast" | |
| |
| |
Guerrilla Warfare: Selective Violence | |
| |
| |
Cyclical Nature of Terror | |
| |
| |
| |
Cycle of. Violence: From Germany to Israel to Palestine | |
| |
| |
Conclusions | |
| |
| |
Political Assassinations | |
| |
| |
Drugs, Religion, and Political Murders | |
| |
| |
Piracy | |
| |
| |
State-Sponsored Terrorism | |
| |
| |
Technological Changes | |
| |
| |
Weapons | |
| |
| |
| |
Ideology and Terrorism: Rights From Wrongs? | |
| |
| |
Key Concepts | |
| |
| |
The Rationalization of Violence | |
| |
| |
| |
Tupamaros (Uruguay Faction) | |
| |
| |
Rebellion and The Right of Self-Determination | |
| |
| |
| |
The Palestinians | |
| |
| |
Terrorism In The Name of God | |
| |
| |
Causes of The Left, Right, and Center | |
| |
| |
Religious Fanaticism | |
| |
| |
Anarchism | |
| |
| |
Neo-Nazism/Neofascism | |
| |
| |
Separatism | |
| |
| |
Nationalism | |
| |
| |
Issue-Oriented Terror | |
| |
| |
Ideological Mercenaries | |
| |
| |
Pathological Terrorists | |
| |
| |
Counterterror Terrorists | |
| |
| |
Conclusions | |
| |
| |
| |
Who are The Terrorists? | |
| |
| |
| |
Criminals or Crusaders? | |
| |
| |
Key Concepts | |
| |
| |
Profile of a Terrorist | |
| |
| |
Terrorist Beliefs and Images | |
| |
| |
Can We Generalize About A "Typical" Terrorist? | |
| |
| |
Individual-Level Analysis: Why Does Someone Become A Terrorist Today? | |
| |
| |
Simplicity | |
| |
| |
Identification | |
| |
| |
Revenge | |
| |
| |
Terrorism Is Different Today | |
| |
| |
Aims or Goals | |
| |
| |
Group Dynamics | |
| |
| |
Religious Fanaticism | |
| |
| |
Demographic Trends in Group Membership | |
| |
| |
Age | |
| |
| |
Education | |
| |
| |
Economic Status | |
| |
| |
Gender | |
| |
| |
| |
the Black Widows | |
| |
| |
Disturbing Patterns of Socialization | |
| |
| |
Socialization toward Violence | |
| |
| |
Alienation toward Western Systems | |
| |
| |
| |
Osama Bin Laden | |
| |
| |
Conclusions | |
| |
| |
| |
Terrorism by The State | |
| |
| |
Key Concepts | |
| |
| |
Internal Terrorism: The Beast That Lurks Within | |
| |
| |
Genocide In Nazi Germany | |
| |
| |
Other Examples of Genocide | |
| |
| |
Coerced Conversion and Genocide In Stalin's USSR | |
| |
| |
| |
Genocide in Darfur | |
| |
| |
| |
Argentina's "Dirty War": Overt State-Supported Terrorism | |
| |
| |
The Continuing Reality of State Terror | |
| |
| |
| |
U.S. Prisoners in the "War on Terror" | |
| |
| |
External Terrorism: Waging War by Proxy | |
| |
| |
Reluctant Bedfellows: The Arms Bazaar | |
| |
| |
Weapons of Mass Destruction on The Arms Bazaar | |
| |
| |
Silent Partners: offering Arms and Safe Haven | |
| |
| |
Syria | |
| |
| |
Iran | |
| |
| |
Libya | |
| |
| |
Terrorist-Supported States | |
| |
| |
| |
Afghanistan under The Taliban Leadership | |
| |
| |
| |
Palestinian Liberation Authority | |
| |
| |
Conclusions | |
| |
| |
| |
Terrorism, Inc. | |
| |
| |
Key Concepts | |
| |
| |
Networking | |
| |
| |
Shared Strategic Planning | |
| |
| |
Terrorism Is Big Business | |
| |
| |
| |
Libyan Protector | |
| |
| |
| |
Iran's Support Network | |
| |
| |
| |
Al-Qaeda's Funding | |
| |
| |
The Internationalization of Terrorism | |
| |
| |
| |
Al-Qaeda's Network | |
| |
| |
The "Lieutenants" | |
| |
| |
The Network and Netwar | |
| |
| |
Narco-Terrorism | |
| |
| |
Conclusions | |
| |
| |
| |
How Do They Operate? | |
| |
| |
| |
Terrorist Training | |
| |
| |
Key Concepts | |
| |
| |
The "How" Questions | |
| |
| |
Training Sites | |
| |
| |
| |
Terrorist Camps in the United Kingdom and the United States | |
| |
| |
Traveling Training Camps | |
| |
| |
Training Topics: What Do They Learn At Camp? | |
| |
| |
Arson and Bombs | |
| |
| |
Assassination and Ambush Techniques | |
| |
| |
Extortion And Kidnapping for Ransom | |
| |
| |
Disguise Techniques, Clandestine Travel, Recruitment, And Communications | |
| |
| |
Intelligence Collection and Counterintelligence Methods | |
| |
| |
Weapons | |
| |
| |
| |
September 11, 2001, Attacks on the United States | |
| |
| |
Sequence of Events | |
| |
| |
Insights into Those Responsible | |
| |
| |
Potential for Destruction: A Terrorist's Arsenal | |
| |
| |
Explosives | |
| |
| |
| |
Improvised Explosive Devices (IEDs) | |
| |
| |
Assassinations and Ambushes | |
| |
| |
Small Arms | |
| |
| |
Automatic Weapons | |
| |
| |
Portable Rockets | |
| |
| |
Aerial Hijacking | |
| |
| |
Sabotage | |
| |
| |
Weapons of Mass Destruction (WMDs) | |
| |
| |
Chemical Or Biological Attacks | |
| |
| |
| |
Al-Qaeda's Quest for A Biological Toxin | |
| |
| |
Radiological and Nuclear Attacks | |
| |
| |
Suicide Bombing: A "New" Weapon | |
| |
| |
Ideology, Not Psychology, of Suicide Bombing | |
| |
| |
Suicide Bombings in Iraq | |
| |
| |
| |
Suicide Bomber Training Camp | |
| |
| |
Phases of A Terrorist Incident: Putting The Lessons Learned At Camp into Practice | |
| |
| |
Conclusions | |
| |
| |
| |
The Media: A Weapon for Both Sides? | |
| |
| |
Key Concepts | |
| |
| |
Mass-Mediated Terrorism | |
| |
| |
Terrorist Goals Regarding The Media | |
| |
| |
Publicity | |
| |
| |
Favorable Understanding of Their Cause | |
| |
| |
Legitimacy and Identity | |
| |
| |
Destabilizing The Enemy | |
| |
| |
Government Goals Regarding Media | |
| |
| |
Publicity | |
| |
| |
Criminality of Act | |
| |
| |
Deny The Terrorist A Platform | |
| |
| |
Information and Cooperation | |
| |
| |
Media Goals In Terrorist Events | |
| |
| |
Getting A Scoop | |
| |
| |
Dramatic Presentation of News | |
| |
| |
Protection of Rights | |
| |
| |
Personal Security | |
| |
| |
Propaganda by The Deed | |
| |
| |
Media As A "Showcase" for Terrorism | |
| |
| |
Legal Issue of The Right of Access | |
| |
| |
Censorship: The Ugly Word | |
| |
| |
Complicity: A Very Serious Charge | |
| |
| |
| |
Bin Laden's Tapes | |
| |
| |
Conclusions | |
| |
| |
| |
Domestic Terrorism in The United States | |
| |
| |
Key Concepts | |
| |
| |
Historical Roots in The United States | |
| |
| |
Conceptualizing Domestic Terrorism in The United States | |
| |
| |
Left-Wing Terrorism | |
| |
| |
Left-Wing Extremism | |
| |
| |
Nationalist Groups | |
| |
| |
Single-Issue Groups | |
| |
| |
| |
Earth Liberation Front | |
| |
| |
Conclusion: Left-Wing Terrorism In The United States Today | |
| |
| |
Right-Wing Extremism: From Militia Groups to Religious Fanatics; | |
| |
| |
Militia Movements | |
| |
| |
| |
Aryan Nations | |
| |
| |
| |
Christian Identity Movement | |
| |
| |
| |
Montana Freemen and The Christian Patriots | |
| |
| |
| |
Field Manual of The Free Militia | |
| |
| |
Theological Training | |
| |
| |
Equipment for A "Prepared" Militia Member | |
| |
| |
Transnational Terrorism | |
| |
| |
The "Lone Wolf" Terrorists | |
| |
| |
| |
Oklahoma City Bombing | |
| |
| |
Conclusions | |
| |
| |
| |
Responses to Terrorism | |
| |
| |
| |
Legal Perspectives on Terrorism | |
| |
| |
Key Concepts | |
| |
| |
Terrorism Is A Crime | |
| |
| |
Laws of War | |
| |
| |
| |
Enemy Combatants | |
| |
| |
| |
Iraq: Differentiating Between Combatants and Noncombatants | |
| |
| |
Piracy of Air and Sea | |
| |
| |
Protection of Diplomatic Personnel and Heads of State | |
| |
| |
Regional Legal Efforts to Prevent or Punish Terrorism | |
| |
| |
International Efforts to Restrict Internal State Terrorism | |
| |
| |
| |
Arresting Sudan's President | |
| |
| |
Is Terrorism A Political Crime? | |
| |
| |
The United Nations and The War on Terrorism | |
| |
| |
Conclusions | |
| |
| |
| |
The Use of Force to Combat Terrorism | |
| |
| |
Key Concepts | |
| |
| |
Nations Without Defenses | |
| |
| |
Strike Forces: A First Line of Defense? | |
| |
| |
Israel's Sayaret Mat'kal | |
| |
| |
The British Special Air Services | |
| |
| |
Germany's GSG-9 | |
| |
| |
Too Many U.S. Options? | |
| |
| |
Special Forces, U.S. Army | |
| |
| |
1st Special Forces Operational Detachment-Delta (Delta Force), U.S. Army | |
| |
| |
Ranger, U.S. Army | |
| |
| |
Air Force Special Operations Command | |
| |
| |
Naval Special Warfare Command | |
| |
| |
New Units-and New Technologies | |
| |
| |
| |
Operation Chavin De Huantar | |
| |
| |
| |
Mogadishu | |
| |
| |
Conclusions | |
| |
| |
| |
The Use of Legislation and Intelligence Resources to Combat Terrorism | |
| |
| |
Key Concepts | |
| |
| |
Legal Initiatives to Counter Terrorism | |
| |
| |
Canada's Legal War With The FLQ | |
| |
| |
The "Temporary" British Problem In Northern Ireland | |
| |
| |
Italy and The "Penititi" | |
| |
| |
| |
The PATRIOT Act | |
| |
| |
Investigation: The Intelligence Initiative | |
| |
| |
Germany's Intelligence Gathering: Target Search Teams | |
| |
| |
U.S. Intelligence-Gathering: Multiple Tools | |
| |
| |
| |
Department of Homeland Security | |
| |
| |
Computers As Tools of Investigation | |
| |
| |
| |
Dark Web Project Tracking Terrorism | |
| |
| |
Government Use of Investigation and Intelligence | |
| |
| |
Conclusions | |
| |
| |
| |
Terrorism in Mumbai | |
| |
| |
| |
Security Measures: A Frail Defense | |
| |
| |
Key Concepts | |
| |
| |
Three Facets of Security | |
| |
| |
| |
NSA's Operation Eligible Receiver | |
| |
| |
Critical Infrastructure Protection | |
| |
| |
Airport Security in The United States | |
| |
| |
Weaknesses in The Security System | |
| |
| |
Ease of Access to The Cockpit | |
| |
| |
Inadequate Screening Processes | |
| |
| |
Impact of September 11 Attacks on Airport Security | |
| |
| |
| |
"Fake Bomb" Smuggling | |
| |
| |
Protecting Other Forms of Public Transportation | |
| |
| |
| |
London Transportation Attacks 2005 | |
| |
| |
Port Security | |
| |
| |
Preventive Security | |
| |
| |
The Costs of Security | |
| |
| |
Threat and Risk Assessment | |
| |
| |
Threat Assessment | |
| |
| |
Risk of Terrorist Attacks | |
| |
| |
| |
Allocating Resources Based on Threat and Risk Assessment | |
| |
| |
Conclusions | |
| |
| |
| |
Cyber Security and Cyberterror | |
| |
| |
| |
Current Trends and Future Prospects | |
| |
| |
| |
The New Terrorist Threat: Weapons of Mass Destruction | |
| |
| |
Key Concepts | |
| |
| |
Context of The Threat | |
| |
| |
Historical Use of Weapons of Mass Destruction | |
| |
| |
A Brief History of Biological Weapons | |
| |
| |
A Brief History of Chemical Weapons | |
| |
| |
A Brief History of Nuclear Weapons | |
| |
| |
Types of Weapons of Mass Destruction Available | |
| |
| |
Biological Agents | |
| |
| |
| |
Anthrax | |
| |
| |
| |
Viral Hemorrhagic Fevers | |
| |
| |
Bioterrorism Defense | |
| |
| |
Chemical Weapons | |
| |
| |
| |
Ricin | |
| |
| |
Radiological Weapons | |
| |
| |
Nuclear Weapons | |
| |
| |
Access to and Use of Weapons of Mass Destruction | |
| |
| |
Chemical Agents | |
| |
| |
| |
Aum Attack on the Tokyo Subway | |
| |
| |
Biological Agents | |
| |
| |
| |
Agroterrorism | |
| |
| |
Nuclear Devices | |
| |
| |
Radiological Devices | |
| |
| |
Risk Assessment: Comparative Effectiveness of WMD | |
| |
| |
Conclusions | |
| |
| |
| |
Future Trends | |
| |
| |
Key Concepts | |
| |
| |
Identifying Trends in Terrorism | |
| |
| |
A War on Terror | |
| |
| |
The Counterterrorism Learning Curve | |
| |
| |
Globalization, and Understanding the "Why" of Terror Attacks | |
| |
| |
Using The Internet | |
| |
| |
| |
Armed Efforts to Eliminate Terror: War in Iraq | |
| |
| |
Dealing With Weapons of Mass Destruction | |
| |
| |
Trends in Terrorist Incidents | |
| |
| |
Volume and Lethality of Incidents | |
| |
| |
Radicalization of Religion and Terrorism Today | |
| |
| |
Deterrence as a Tool against Suicide Bombing | |
| |
| |
Impact of The Generational Differences within Terrorist Groups | |
| |
| |
IED: Weapon of Choice | |
| |
| |
The Threat and Reality of Cyberterror | |
| |
| |
Nature of Groups as Limiting Factor | |
| |
| |
Goals of Groups as Limiting Factors | |
| |
| |
Conclusions | |
| |
| |
Index | |