Crimes Committed by Terrorist Groups


Book Description

This is a print on demand edition of a hard to find publication. Examines terrorists¿ involvement in a variety of crimes ranging from motor vehicle violations, immigration fraud, and mfg. illegal firearms to counterfeiting, armed bank robbery, and smuggling weapons of mass destruction. There are 3 parts: (1) Compares the criminality of internat. jihad groups with domestic right-wing groups. (2) Six case studies of crimes includes trial transcripts, official reports, previous scholarship, and interviews with law enforce. officials and former terrorists are used to explore skills that made crimes possible; or events and lack of skill that the prevented crimes. Includes brief bio. of the terrorists along with descriptions of their org., strategies, and plots. (3) Analysis of the themes in closing arguments of the transcripts in Part 2. Illus.




Trust and Terror


Book Description

Why do some individuals choose to protest political grievances via non-violent means, while others take up arms? What role does whom we trust play in how we collectively act? This book explores these questions by delving into the relationship between interpersonal trust and the nature of the political movements that individuals choose to join. Utilizing the examples of the Arab Spring uprisings in Egypt, Libya and Syria, a novel theoretical model that links the literature on social capital and interpersonal trust to violent collective action is developed and extended. Beyond simply bringing together two lines of literature, this theoretical model can serve as a prism from which the decision to join terrorist organizations or violent movements may be analyzed. The implications of the theory are then examined more closely through an in-depth look at the behavior of members of political movements at the outset of the Arab Spring, as well as statistical tests of the relationship between interpersonal trust and terrorism in the Middle East and globally. Trust and Terror will be of interest to scholars of Comparative Politics and International Relations. The Open Access version of this book, available at https: //doi.org/10.4324/9781315505817, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.




Capital Flight from Africa


Book Description

A comprehensive thematic analysis of capital flight from Africa, it covers the role of safe havens, offshore financial centres, and banking secrecy in facilitating illicit financial flows and provides rich insights to policy makers interested in designing strategies to address the problems of capital flight and illicit financial flows.




Imperial Hubris


Book Description

Though U.S. leaders try to convince the world of their success in fighting al Qaeda, one anonymous member of the U.S. intelligence community would like to inform the public that we are, in fact, losing the war on terror. Further, until U.S. leaders recognize the errant path they have irresponsibly chosen, he says, our enemies will only grow stronger. According to the author, the greatest danger for Americans confronting the Islamist threat is to believe-at the urging of U.S. leaders-that Muslims attack us for what we are and what we think rather than for what we do. Blustering political rhetor.




Tonight We Bombed the U.S. Capitol


Book Description

In a shocking, never-before-told story from the vaults of American history, Tonight We Bombed the US Capitol takes a close look at the explosive hidden history of M19—the first and only domestic terrorist group founded and led by women—and their violent fight against racism, sexism, and what they viewed as Ronald Reagan’s imperialistic vision for America. In 1981, President Ronald Reagan announced that it was “morning in America.” He declared that the American dream wasn’t over, but the United States needed to lower taxes, shrink government control, and flex its military muscles abroad to herald what some called “the Reagan Revolution.” At the same time, a tiny band of American-born, well-educated extremists were working for a very different kind of revolution. By the end of the 1970s, many radicals had called it quits, but six veteran women extremists came together to finish the fight. These women had spent their entire adult lives embroiled in political struggles: protesting the Vietnam War, fighting for black and Native American liberation, and confronting US imperialism. They created a new organization to wage their war: The May 19th Communist Organization, or “M19,” a name derived from the birthday shared by Malcolm X and Ho Chi Minh, two of their revolutionary idols. Together, these six women carried out some of the most daring operations in the history of domestic terrorism—from prison breakouts and murderous armed robberies, to a bombing campaign that wreaked havoc on the nation’s capital. Three decades later, M19’s actions and shocking tactics still reverberate for many reasons, but one truly sets them apart: unlike any other American terrorist group before or since, M19 was created and led by women. Tonight We Bombed the US Capitol tells the full story of M19 for the first time, alongside original photos and declassified FBI documents. Through the group’s history, intelligence and counterterrorism expert William Rosenau helps us understand how homegrown extremism—a threat that still looms over us today—is born.




Understanding Terrorism


Book Description

Understanding Terrorism: Challenges, Perspectives, and Issues offers a comprehensive, interdisciplinary exploration of domestic and international terrorism that helps students develop the knowledge and skills needed to critically assess the underlying causes of modern terrorist violence. The Seventh Edition includes new or expanded discussions of critical topics in terrorism, such as the evolution of right-wing extremism in Western countries, as well as analysis of recent events and updated terrorist tactics, weapons, and methods. Included with this title: The password-protected Instructor Resource Site (formally known as SAGE Edge) offers access to all text-specific resources, including a test bank and editable, chapter-specific PowerPoint® slides.




Terrorism


Book Description

In counterterrorism circles, the standard response to questions about the possibility of future attacks is the terse one-liner: “Not if, but when.” This mantra supposedly conveys a realistic approach to the problem, but, as Joseba Zulaika argues in Terrorism, it functions as a self-fulfilling prophecy. By distorting reality to fit their own worldview, the architects of the War on Terror prompt the behavior they seek to prevent—a twisted logic that has already played out horrifically in Iraq. In short, Zulaika contends, counterterrorism has become pivotal in promoting terrorism. Exploring the blind spots of counterterrorist doctrine, Zulaika takes readers on a remarkable intellectual journey. He contrasts the psychological insight of Truman Capote’s In Cold Blood with The 9/11 Commission Report, plumbs the mindset of terrorists in works by Orianna Fallaci and Jean Genet, maps the continuities between the cold war and the fight against terrorism, and analyzes the case of a Basque terrorist who tried to return to civilian life. Zulaika’s argument is powerful, inventive, and rich with insights and ideas that provide a new and sophisticated perspective on the War on Terror.




Business Confronts Terrorism


Book Description

Central banks and stock exchanges are bombed. Suicide bombers ravage cinemas, nightclubs, and theaters. Planes crash into skyscrapers and government buildings. Multiple bombs explode on commuter trains. Thousands of people are killed and injured while millions are terrorized by these attacks. These scenarios could be part of a future Hollywood movie. Sadly, they are representative of previous terror attacks against industry and government interests worldwide. Moreover, they are harbingers of global terror threats. Industry constitutes a prime target of contemporary terrorism. This timely book analyzes the threats companies face due to terrorism, industry responses to these dangers, and terrorism’s effects on conducting business in the post-9/11 environment. Dean C. Alexander details the conventional and unconventional terror capabilities facing industry. He describes the activities of terrorists in the economic system and the ways they finance their operations. Alexander discusses how companies can reduce terrorist threats and that corporate security can minimize political violence. He outlines the dynamics of the public-private partnership against terrorism: government aiding industry, business supporting government, and tensions between the two. He also delineates terrorism’s effects—financial, physical, and emotional—on workers and employers. He highlights the negative financial and economic consequences of terrorism. He discusses the impact of terrorism on traditional business practices and concludes with an assessment of future trends.




Terrorism as Crime


Book Description

Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed. This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.