The Dynamic Terrorist Threat


Book Description

As the war on terrorism wages on, our nation's policymakers will continue to face the challenge of assessing threats that various terrorist groups pose to the U.S. homeland and our interests abroad. As part of the RAND Corporation's yearlong "Thinking Strategically About Combating Terrorism" project, the authors of this report develop a way to assess and analyze the danger posed by various terrorist organizations around the world. The very nature of terrorism creates a difficulty in predicting new and emerging threats; however, by establishing these types of parameters, the report creates a fresh foundation of threat analysis on which future counterterrorism strategy may build.




Non-western Responses to Terrorism


Book Description

This title surveys how non-Western states have responded to the threats of domestic and international terrorism in ways consistent with and reflective of their broad historical, political, cultural and religious traditions.




The Dynamics of a Terrorist Targeting Process


Book Description

This book provides an in-depth analysis of probably the most horrific solo terrorist operation the world has ever seen. On 22 July 2011 Anders Behring Breivik killed 77 people when he bombed the Government District in Oslo, before he conducted a shooting attack against a political youth camp at Utøya. The main focus of the book is on the operational aspects of the events, particularly the target selection and decision-making process. Why did Breivik choose the targets he finally attacked, what influenced his decision-making and how did he do it? Using unique source material, providing details never published before, the authors accurately explain how even this ruthless terrorist acted under a number of constraints in a profoundly dynamic process. This momentous work is a must read for scholars, students and practitioners within law enforcement, intelligence, security and terrorism studies.




The Evolution of the Global Terrorist Threat


Book Description

Examining major terrorist acts and campaigns undertaken in the decade following September 11, 2001, internationally recognized scholars study the involvement of global terrorist leaders and organizations in these incidents and the planning, organization, execution, recruitment, and training that went into them. Their work captures the changing character of al-Qaeda and its affiliates since the invasions of Afghanistan and Iraq and the sophisticated elements that, despite the West's best counterterrorism efforts, continue to exert substantial direction over jihadist terrorist operations. Through case studies of terrorist acts and offensives occurring both in and outside the West, the volume's contributors investigate al-Qaeda and other related entities as they adapted to the strategies of Operation Enduring Freedom and subsequent U.S.-led global counterterrorism programs. They explore whether Osama bin Laden was indeed reduced to a mere figurehead before his death or continued to influence al-Qaeda's global activities. Did al-Qaeda become a loose collection of individuals and ideas following its expulsion from Afghanistan, or was it reborn as a transnational terrorist structure powered by a well-articulated ideology? What is the preeminent terrorist threat we face today, and what will it look like in the future? This anthology pinpoints the critical patterns and strategies that will inform counterterrorism in the coming decades.




West European Terrorism and Counter-Terrorism


Book Description

The book examines the dynamic of West European terrorism and counter-terrorism as it has evolved since the late 1960s. It assesses past, present and future terrorist trends and analyzes the internal security policies that have been initiated by the member states of the European Union (EU), both singularly and collectively, to combat terrorism in Western Europe. Throughout the book the theme of liberal democratic legitimacy and accountability is stressed, something that is brought particularly to bear on the latest EU internal security provision - the Maastricht Third Pillar.




Psychology of Terrorism


Book Description

In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.




Terrorism Risk Assessment Instruments


Book Description

The search for a distinct "terrorist profile" has been going on for many years, and while it is generally agreed that nobody is born a terrorist, there is plenty of disagreement about why a person might become one. Whereas personal and situational push and pull factors can be combined to determine how and why young people become involved in terrorism, preventing an individual from following a path that ends in violence without moral restraint poses an enormous challenge, especially in an open society. This book presents papers from the NATO Advanced Research Workshop titled "A Review of the Utility of Existing Terrorism Risk Assessment Instruments and Policies: Is there the Need for Possible New Approaches?", held in Berlin, Germany, on 29-30 November 2019. Researchers were asked to present papers for discussion sessions with invited participants and practitioners from a number of NATO member and partner countries. Various assessment instruments for identifying problematic individuals at an early stage were presented by experts. It was generally agreed that, due to cultural, religious and other differences, there is no simple way to identify the relatively few high-risk individuals among the larger population of politically radicalized but not necessarily violent individuals who pose no threat. Framed by an Introduction and Conclusion, the 16 chapters in the book are divided into three parts: Theory and Risk/Threat Assessment Instrument Policy Themes; Implementation of Politically Motivated Terrorism Protocols; and Personality Traits/Disorders, Anti-State Terrorism Profiles and the DSM-5 Personality Trait Instrument. This practice-oriented book will be of interest to all those tasked with protecting society from some of its most dangerous members.




Terrorism and Counter-terrorism in China


Book Description

China, hitherto barely affected by terrorism, now confronts a phenomenon all too familiar to other nations.




Illusions of Terrorism and Counter-terrorism


Book Description

"Some of the arguments published in this volume were first adumbrated at a joint British Academy/University of St Andrews Symposium ('9/11: Ten Years On') held in London on 2 September 2011."--Page ix.




Asymmetric Warfare


Book Description

In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.