Understanding Terrorism Innovation and Learning


Book Description

This book examines the role of terrorist innovation and learning in theory and practice, and in the context of three specific EU case-studies. It is often said that terrorist groups are relatively conservative in character operating in a technological vacuum - relying almost exclusively on bombs and bullets. This observation masks increasing complexity and creativity and innovation within terrorist groups and one of the most distinguishing features of al-Qaeda's terrorist operations is its propensity for remarkable innovation. This book examines how and why terrorist groups innovate more generally and al-Qaeda-related terrorist plots in Europe more specifically. The starting point for this book was twofold. Firstly to examine the issue of innovation and learning more generically both in theory, within specific themes and within the context of al-Qaeda's influence on this process. Secondly, this book examines the evolution of specific al-Qaeda-related plots in three specific northern EU states - the United Kingdom, Denmark and Germany - where there has been a significant volume of planned, failed and executed terrorist plots. In particular, these case studies explore signs of innovation and learning. This book will be of much interest to students of terrorism and counter-terrorism, political violence, security studies and IR in general.




Understanding Terrorism Innovation and Learning


Book Description

This book examines the role of terrorist innovation and learning in theory and practice, and in the context of three specific EU case-studies. It is often said that terrorist groups are relatively conservative in character operating in a technological vacuum – relying almost exclusively on bombs and bullets. This observation masks increasing complexity and creativity and innovation within terrorist groups and one of the most distinguishing features of al-Qaeda’s terrorist operations is its propensity for remarkable innovation. This book examines how and why terrorist groups innovate more generally and al-Qaeda-related terrorist plots in Europe more specifically. The starting point for this book was twofold. Firstly to examine the issue of innovation and learning more generically both in theory, within specific themes and within the context of al-Qaeda’s influence on this process. Secondly, this book examines the evolution of specific al-Qaeda-related plots in three specific northern EU states – the United Kingdom, Denmark and Germany - where there has been a significant volume of planned, failed and executed terrorist plots. In particular, these case studies explore signs of innovation and learning. This book will be of much interest to students of terrorism and counter-terrorism, political violence, security studies and IR in general.




Understanding Terrorist Innovation


Book Description

This book explores the innovations and advances in terrorist tactics and technologies to help fill the gap in the contemporary terrorism literature by developing an empirical theory of terrorist innovation. The key question concerns the global historical trends in terrorist innovation, as well as the critical factors responsible for the differences in practices among terrorist organizations. The first part of the book provides an overview of the tactics and technology used by terrorists in the last century and identifies the key trends for the future. The second part compares four differing terrorist organizations with the aim of identifying key factors in producing innovative tactics and weaponry. The volume provides a historical explanation of the trends in terrorist innovation and also has policy relevance, as the ability to identify signature characteristics of innovation-prone terrorist organizations is a critical element in predictive threat assessment. Understanding Terrorist Innovation will be of great interest to students of terrorism studies, security studies and political science in general.




Power to the People


Book Description

Essential reading on how technology empowers rogue actors and how society can adapt. Never have so many possessed the means to be so lethal. A dramatic shift from 20th century "closed" military innovation to "open" innovation driven by commercial processes is underway. The diffusion of modern technology--robotics, cyber weapons, 3-D printing, synthetic biology, autonomous systems, and artificial intelligence--to ordinary people has given them access to weapons of mass violence previously monopolized by the state. As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is the continuation of an age-old trend. Over the centuries, from the invention of dynamite to the release of the AK-47, many of the most surprising developments in warfare have occurred because of technological advances combined with changes in who can use them. That shifting social context illuminates our current situation, in which new "open" technologies are reshaping the future of war. Cronin explains why certain lethal technologies spread, which ones to focus on, and how individuals and private groups will adapt lethal off-the-shelf technologies for malevolent ends. Now in paperback with a foreword by Lawrence Freedman and a new epilogue, Power to the People focuses on how to both preserve the promise of emerging technologies and reduce risks. Power is flowing to the people, but the same digital technologies that empower can imperil global security--unless we act strategically.




Psychology of Terrorism


Book Description

In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.




The Oxford Handbook of Terrorism


Book Description

The Oxford Handbook of Terrorism systematically integrates the substantial body of scholarship on terrorism and counterterrorism before and after 9/11. In doing so, it introduces scholars and practitioners to state of the art approaches, methods, and issues in studying and teaching these vital phenomena. This Handbook goes further than most existing collections by giving structure and direction to the fast-growing but somewhat disjointed field of terrorism studies. The volume locates terrorism within the wider spectrum of political violence instead of engaging in the widespread tendency towards treating terrorism as an exceptional act. Moreover, the volume makes a case for studying terrorism within its socio-historical context. Finally, the volume addresses the critique that the study of terrorism suffers from lack of theory by reviewing and extending the theoretical insights contributed by several fields - including political science, political economy, history, sociology, anthropology, criminology, law, geography, and psychology. In doing so, the volume showcases the analytical advancements and reflects on the challenges that remain since the emergence of the field in the early 1970s.




Conducting Terrorism Field Research


Book Description

This book offers a detailed and practically oriented guide to the challenges of conducting terrorist fieldwork. The past decade has seen an explosion of research into terrorism. However, field research on terrorism has traditionally been surrounded by many myths, and has been called anything from "necessary" and "crucial" to "dangerous", "unethical" and "impossible". While there is an increasing interest among terrorism specialists in conducting such research, there is no single volume providing prospective field researchers with a guideline to such work. Conducting Terrorism Field Research aims to fill this gap and offers a collection of articles from experienced authors representing different risk groups, disciplines, methodological approaches, regional specializations, and other context-specific aspects. Each contributor provides a road-map to their own research, describing planning and preparation phases, the formalities involved in getting into conflict zones and gaining access to sources. The end product is a 'how to' guide to field research on terrorism, which will be of much value to terrorism experts and novices alike. This book will be of much interest to students and researchers of terrorism studies, war and conflict studies, criminology, IR and security studies.




Countering Terrorism


Book Description

Can We Construct a Grand Strategy to Counter Terrorism? Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign. After years of wars, ever more intensive and pervasive surveillance, enhanced security measures at major transportation centers, and many attempts to explain who we are fighting and why and how to fight them, the threats continue to multiply. So, too, do our attempts to understand just what terrorism is and how to counter it. Two leaders in the field of terrorism studies, Martha Crenshaw and Gary LaFree, provide a critical look at how we have dealt with the terror threat over the years. They make clear why it is so difficult to create policy to counter terrorism. The foes are multiple and often amorphous, the study of the field dogged by disagreement on basic definitional and methodological issues, and the creation of policy hobbled by an exacting standard: the counterterrorist must succeed all the time; the terrorist only once. As Countering Terrorism shows, there are no simple solutions to this threat.




Enemies Near and Far


Book Description

Although the United States has prioritized its fight against militant groups for two decades, the transnational jihadist movement has proved surprisingly resilient and adaptable. Many analysts and practitioners have underestimated these militant organizations, viewing them as unsophisticated or unchanging despite the ongoing evolution of their tactics and strategies. In Enemies Near and Far, two internationally recognized experts use newly available documents from al-Qaeda and ISIS to explain how jihadist groups think, grow, and adapt. Daveed Gartenstein-Ross and Thomas Joscelyn recast militant groups as learning organizations, detailing their embrace of strategic, tactical, and technological innovation. Drawing on theories of organizational learning, they provide a sweeping account of these groups’ experimentation over time. Gartenstein-Ross and Joscelyn shed light on militant groups’ most effective strategic and tactical moves, including attacks targeting aircraft and the use of the internet to inspire and direct lone attackers, and they examine jihadists’ ability to shift their strategy based on political context. While militant groups’ initial efforts to upgrade their capabilities often fail, these attempts should generally be understood not as failures but as experiments in service of a learning process—a process that continues until these groups achieve a breakthrough. Providing unprecedented historical and strategic perspective on how jihadist groups learn and evolve, Enemies Near and Far also explores how to anticipate future threats, analyzing how militants are likely to deploy a range of emerging technologies.




The Nuclear Terrorism Threat


Book Description

This book examines the threat of a terrorist organisation constructing and detonating a nuclear bomb. It explores the role and impact of the organisational design of a terrorist organisation in implementing a nuclear terrorism plot. In order to do so, the work builds on the organisational analogy between an assumed nuclear terrorism scenario and four case studies as follows: the construction of the first atomic bombs at Los Alamos; South Africa’s Peaceful Nuclear Explosives (PNE) program; Aum Shinrikyo’s chemical-biological armament activities; and Al Qaeda’s implementation of the 9/11 attacks. Extrapolating insights from these case studies, this book introduces the idea of an effectiveness-efficiency trade-off. On the one hand, it will be argued that a more organic organisational design is likely to benefit the effective implementation of a nuclear terrorism project. On the other hand, this type of organic organisational design is also likely to simultaneously constitute an inefficient way for a terrorist organisation to guarantee its operational and organisational security. It follows, then, that the implementation of a nuclear terrorism plot via an organic organisational design is also likely to be an inefficient strategy for a terrorist organisation to achieve its strategic and political goals. This idea of an effectiveness-efficiency trade-off provides us with a tool to strengthen the comprehensive nature of future nuclear terrorism threat assessments and sheds new light on the ongoing debates within the nuclear terrorism literature. This book will be of particular interest to students of nuclear proliferation, terrorism studies, international organisations, and security studies in general.