Lone Wolf Terrorism - a Brief Bibliography
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Downloaded from Brill.Com09/29/2021 06:39:09AM Via Free Access
fascism 4 (2015) 209-212 brill.com/fasc Book Review ∵ Mats Deland, Michael Minkenberg and Christin Mays, ed. In the Tracks of Breivik: Far Right Networks in Northern and Eastern Europe (Berlin/ Vienna: lit Verlag, 2014). Four years have already passed since Anders Behring Breivik, apparently single-handedly, committed the most murderous and destructive terrorist atrocity by the far right in post-war Europe. In 2011–2012, particularly during his criminal trial in Oslo, there was a lively public debate in in the Scandinavian media as to whether Breivik was a fascist, or represented some other permuta- tion of the contemporary European far right – an Islamophobic ‘counter-jihad- ist’; a militant, conservative nationalist; or a Christian extremist.1 Somewhat counterintuitively, since then relatively little scholarly attention has been devoted within comparative fascist studies to the implications of Breivik’s deeds, ideology, and self-proclaimed pan-European revolutionary movement. The title of this anthology – In the Tracks of Breivik – would suggest that its primary purpose is to map the far right networks of northern and eastern Europe in relation to the terrorist acts of July 22, 2011. Even if we realize that this formulation is an unfortunate literal translation of the Swedish phrase ‘i spåren av [Breivik]’ – for which a more idiomatic English rendering would be ‘in the wake of [Breivik]’, the implication would still be that the findings of the book are located in some direct relation to Breivik and his crimes. Even the promotional blurb on the back cover, as well as the opening and closing words of the introduction, reinforce this expectation. -
“Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations. -
Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P. -
The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons -
HLS 225 Legal and Ethical Issues in Homeland Security
Christopher Wren Association Week 2 Terrorism, Cybersecurity, Disaster Response What We’ll Learn in Week 2 The Homeland Security Enterprise takes a broad “All Hazards” approach to threats—preventing and responding to both man-made and natural threats Terrorism, Cyber, other Man-Made, and Natural Threats are reviewed in Week 2 U.S. interagency responses to these threats have improved since 9/11—but are far from totally ready Fundamental and Powerful Concept: DHS “All Hazards” Threat State (define): all natural and man-made hazards that can threaten the US homeland. Elaborate: includes natural hazards and threats, e.g., weather, geologic, disease, etc., and man-made hazards and threats to include both accidents and deliberate attempts to harm people, infrastructure, or resources. Exemplify: a hurricane is a natural hazard, a bridge or dam collapse is a man-made accident (hazard), a terrorist attack is a man-made hazard. An attack by a foreign military on U.S. territory is not an all hazards attack for DHS action—but is a national security issue to be handled by DOD. Illustrate: as doctors must diagnose and treat a person for all manner of different diseases and other afflictions, the Homeland Security Enterprise is responsible for preparing and responding to U.S. “all hazard” threats Defining the Virginia “All Hazards” Threat Terrorism-Related: WMD Weather-Related: Floods, (Nuclear/Radiological (Dirty Tornadoes, Hurricanes, Tropical Bombs), Chemical, Biological), Storms, Thunderstorms, Winter Explosive Devices (IED, etc.), Cyber -
Brenton Tarrant: the Processes Which Brought Him to Engage in Political Violence
CSTPV Short Papers Brenton Tarrant: the processes which brought him to engage in political violence Beatrice Williamson 1 Contents Introduction .......................................................................................................................... 3 Brenton Tarrant .................................................................................................................... 3 Conceptualising Tarrant and his violence ............................................................................. 5 The Lone Actor Puzzle ........................................................................................................... 5 ‘A dark social web’: online ‘radicalisation’ ............................................................................ 7 Online communities: Social Network Ties and Framing .................................................... 7 Funnelling and Streams ..................................................................................................... 9 Conclusion ........................................................................................................................... 11 Bibliography ........................................................................................................................ 12 2 Introduction Individual radicalisation is a complex and bespoke process influenced by multiple factors and variables, meaning every individual follows their own path to terrorism and political violence. This paper will endeavour to demonstrate and explore some of the -
Terrorism and Responses Mr
Terrorism and Responses Mr. Yisrael Neeman Course Number: 702.2199 Office Hours: TBA Semester: Spring 2019 Location: TBA Class Time: Thursday 15:15-17:45 Phone: 04-824-2065 Class Location: TBA E-Mail: [email protected] Course Description: This course will examine the issue of terrorism as a growing form of political violence into the 21st Century. The last three decades of the 20th Century witnessed a phenomenal growth in terrorist activity around the world. Some groups rose and fell quite rapidly, but others have managed sustained campaigns and have achieved spectacular tactical success, among them the attacks on the United States on September 11, 2001. We will investigate the causes, methods and responses involved in the ongoing conflict between terrorist organizations and their adversaries. Topics covered will include: What is terrorism, as distinct from other forms of violence? What are the objectives of terrorists? What are the strategy and tactics of terrorists? Is suicide terrorism a distinct form of terrorism or another tactic among many? Why do terrorists use the tactics of terrorism? Is the use of terrorist tactics ever justified? What is the history of terrorism and terrorist organizations? What are some of the major terrorist groups active today? How do religious beliefs and ideological dogma aid terrorists? Does terrorism work? Does it achieve strategic goals? How do terrorist organizations transform? Can terrorism be deterred, defeated or prevented? Is there a military solution? Is the use of torture ever justified for extracting information from terrorists? Targeted assassination? Requirements, grades, and so on 1 This course has just a few simple requirements: read the assignments, attend class, participate in discussions, write the papers, and pass the tests. -
Perspectives on Terrorism, Volume 5, Issue
Volume V, Issues 3-4 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Special Double Issue on Terrorism and Political Violence in Africa Guest Editors: James J. F. Forest and Jennifer Giroux 2 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Table of Contents: Articles Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain ................................................................................................5 by James J.F. Forest and Jennifer Giroux Terrorism in Liberation Struggles: Interrogating the Engagement Tactics of the Movement for the Emancipation of the Niger Delta ........................18 by Ibaba Samuel Ibaba ‘Forcing the Horse to Drink or Making it Realise its Thirst’? Understanding the Enactment of Anti-Terrorism Legislation (ATL) in Nigeria .............................................................................................................33 by Isaac Terwase Sampson and Freedom C. Onuoha Opportunity Costs or Costly Opportunities? The Arab Spring, Osama Bin Laden, and Al-Qaeda's African Affiliates .............................................50 by Alex S. Wilner Al-Qaeda's Influence in Sub-Saharan Africa: Myths, Realities and Possibilities .....................................................................................................63 by James J.F. Forest From Theory to Practice: Exploring the Organised Crime-Terror Nexus in Sub-Saharan Africa ...................................................................................81 by Annette -
Ways in and Ways out Ways and in Ways Høigård Tajet Kirsti
Ways In and Ways Out Ways and In Ways Høigård Tajet Kirsti NTNU Norwegian University of Science and Technology Faculty of Social Sciences Master’s thesis and Technology Management Department of Political Science Trondheim, Spring2012 Trondheim, Science thesisinPolitical Master’s Extremism Islamist versus Right-WingExtremism Deradicalization: and ofRadicalization An Analysis Out InandWays Ways Høigård Tajet Kirsti To SL, with the hopes that you will someday deradicalize as well Acknowledgements I want to express my gratitude to my supervisor Tanja Ellingsen for good help, positive remarks and good assistance along the way. I also want to express my gratitude to my informants for letting me dig in their troublesome and often difficult past, I have learnt at least as much about human grief as I have about radicalization and deradicalization. Without the informants this thesis had not existed. I also want to thank Rashad Ali for meeting me at the British Museum where the atmosphere is great for deep conversations, and for all the assistance he provided me in the aftermath of the interview. I also want to express my gratitude to Hanif Qadir for welcoming me into the Active Change Foundation in London and for letting me interview him. I am also grateful to Pat Parry in the United Kingdom for assistance along the way. In addition I want to express my gratitude to all the people that I have been in contact with regarding finding the right informants, in particular all the local police stations that have helped me along the way, Åfjord Lensmannskontor, Manglerud Politistasjon, Brumunddal Lensmannskontor and Stange Lensmannskontor. -
Accelerationism Theory
CANADIAN ASSOCIATION FOR SECURITY AND INTELLIGENCE STUDIES VANCOUVER ACCELERATIONISM THEORY BRIEFING NOTE April 12, 2021 Disclaimer: This Briefing Note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. Title: Accelerationsim Theory Date: 12/04/2021 Disclaimer: This briefing note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. PURPOSE STATEMENT This briefing note examines accelerationism theory and its connection to several white nationalist groups that may be considered Violent Transnational Social Movements (VTSM), and the potential threats that accelerationism poses to national security and political stability. Since the mid-2010s, some members of the far-right and white nationalist movements have reportedly embraced and promoted accelerationism as a key component of their ideology using online forums (Anti-Defamation League, 2019; Beauchamp, 2019). This briefing note also examines the reported connections between accelerationism and acts of soft and kinetic violence committed against minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). THE SECURITY PROBLEM Several white nationalist groups that embrace accelerationism emerged in the late 2010s including Atomwaffen Division and The Base. Believers in accelerationism have recently been linked to several instances of soft and kinetic violence, which allegedly aim to de-stabilise existing social structures (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). The continued online promotion of accelerationism poses a serious potential threat to minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019). Accelerationists are often radicalised through easily accessible internet sources and encrypted chat rooms. -
The Boston Marathon Bombing in the New York Times and Le Figaro
University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2014 News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro Ioana Alexandra Coman University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Journalism Studies Commons, and the Mass Communication Commons Recommended Citation Coman, Ioana Alexandra, "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro. " PhD diss., University of Tennessee, 2014. https://trace.tennessee.edu/utk_graddiss/2812 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Ioana Alexandra Coman entitled "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Peter Gross, Major Professor We have read this dissertation and recommend its acceptance: Elizabeth Hendrickson, Suzie Allard, Michael Palenchar, Harry Dahms Accepted for the Council: Carolyn R. -
The Future of South Korea: Alternative Scenarios for 2030
THE FUTURE OF SOUTH KOREA: ALTERNATIVE SCENARIOS FOR 2030 A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN POLITICAL SCIENCE DECEMBER 2012 By Hyeonju Son Dissertation Committee: Jim Dator, Chairperson Manfred Henningsen Debora Halbert Hagen Koo Jang Hyun Kim Keywords: alternative futures scenarios, vision, preferred futures, Korea ACKNOWLEDGEMENTS This dissertation contains far more than the accumulation of years of working with futures studies. It has been a long journey, reflecting my own personal experience, vision, story, and family and social relationships. Indeed this dissertation would not have been possible without the help and support of the generous and inspiring people around me. I really appreciate their contribution to my development as a person and a scholar. My deepest gratitude goes to my advisor, Jim Dator, a talented teacher and passionate futurist, who guided me with his vast knowledge and expertise, and who promptly, answered my questions with comprehensive solutions. I am truly grateful to him for his patience, ongoing support, and wisdom. I would like to thank other committee members for their personal and intellectual support: Manfred Henningsen, Debora Halbert, Hagen Koo, and Jang Hyun Kim. I especially owe a huge debt of gratitude to Debora Halbert who put a lot of effort into the final stages of my writing. She not only edited my work, but also preserved my motivations with her encouragement. I also wish to extend a thank you to Sun-Ki Chai and Jungmin Seo, who were former committee members and inevitably left before the dissertation was completed.