The Ghosts of State Terror: Knowledge, Politics and Terrorism Studies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Al-QAEDA and the ARYAN NATIONS
Al-QAEDA AND THE ARYAN NATIONS A FOUCAULDIAN PERSPECTIVE by HUNTER ROSS DELL Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS IN CRIMINOLOGY AND CRIMINAL JUSTICE THE UNIVERSITY OF TEXAS AT ARLINGTON DECEMBER 2006 ACKNOWLEDGEMENTS For my parents, Charles and Virginia Dell, without whose patience and loving support, I would not be who or where I am today. November 10, 2006 ii ABSTRACT AL-QAEDA AND THE ARYAN NATIONS A FOUCALTIAN PERSPECTIVE Publication No. ______ Hunter Ross Dell, M.A. The University of Texas at Arlington, 2006 Supervising Professor: Alejandro del Carmen Using Foucauldian qualitative research methods, this study will compare al- Qaeda and the Aryan Nations for similarities while attempting to uncover new insights from preexisting information. Little or no research had been conducted comparing these two organizations. The underlying theory is that these two organizations share similar rhetoric, enemies and goals and that these similarities will have implications in the fields of politics, law enforcement, education, research and United States national security. iii TABLE OF CONTENTS ACKNOWLEDGEMENTS......................................................................................... ii ABSTRACT ................................................................................................................ iii Chapter 1. INTRODUCTION...................................................................................... -
Patterns of Terrorism in the United States, 1970-2013
Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS). -
Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R
American University International Law Review Volume 2 | Issue 1 Article 3 1987 Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R. P. Bowen Follow this and additional works at: http://digitalcommons.wcl.american.edu/auilr Part of the International Law Commons Recommended Citation Bowen, Elizabeth R. P. "Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens." American University International Law Review 2, no. 1 (1987): 153-202. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University International Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTES AND COMMENTS JURISDICTION OVER TERRORISTS WHO TAKE HOSTAGES: EFFORTS TO STOP TERROR-VIOLENCE AGAINST UNITED STATES CITIZENS Elizabeth R. P. Bowen* INTRODUCTION ............................... 154 I. INTERNATIONAL TERRORISM: A GLOBAL CON- C ER N .......................................... 157 A. Hostage Taking: A Terror Tactic ............... 157 B. Definitional Dilemma: Terrorists v. Freedom Fighters ................................... 158 II. UNDERLYING AGITATORS .................... 162 A. State-Sponsored Terrorism ..................... 162 B. The Nature of Terrorist Warfare: Invisible Block- ades ........................................ 164 C. Television: The Role of the Media in the Growth of International Terrorism ........................ 165 1. First Amendment Balance ................. 166 2. Law Enforcement and Media .............. 167 D. Extradition: The Key to Prosecution ............. 168 III. UNITED STATES RESPONSE TO TERRORISM .. 171 A. Domestic Legislation .......................... 172 B. International Efforts of the United States ....... -
The New Insurgents: a Select Review of Recent Literature on Terrorism and Insurgency
The New Insurgents: A Select Review of Recent Literature on Terrorism and Insurgency George Michael US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama THE NEW INSURGENTS: A Select Review of Recent Literature on Terrorism and Insurgency by George Michael USAF Counterproliferation Center 325 Chennault Circle Maxwell Air Force Base, Alabama 36112-6427 March 2014 Disclaimer The opinions, conclusions, and recommendations expressed or implied in this publication are those of the author and do not necessarily reflect the views of the Air University, Air Force, or Department of Defense. ii Contents Chapter Page Disclaimer .............................................................................................. ii About the Author..................................................................................... v Introduction ........................................................................................... vii 1 Domestic Extremism and Terrorism in the United States ....................... 1 J.M. Berger, Jihad Joe: Americans Who Go to War in the Name of Islam ................................................................................................ 3 Catherine Herridge, The Next Wave: On the Hunt for Al Qaeda’s American Recruits ........................................................................... 8 Martin Durham, White Rage: The Extreme Right and American Politics ........................................................................................... 11 2 Jihadist Insurgent Strategy .................................................................... -
A Theory of Categorical Terrorism
A Theory of Categorical Terrorism Jeff Goodwin, New York University Abstract When revolutionaries or insurgents, broadly defined, indiscriminately attack civilians, they generally attack “complicitous civilians,” i.e., those categories of noncombatants which the revolutionaries see as benefiting from, supporting and/or having a substantial capacity to influence the states that the revolutionaries are attempting to displace or overthrow. Such “categorical” terrorism will be most extensive when revolutionaries view these states (or complicitous civilians themselves) as perpetrators of extensive, indiscriminate violence against the revolutionaries and their constituents. However, if significant numbers of complicitous civilians are seen by rebel groups as potential supporters (or as capable of being influenced by nonviolent appeals or protests), then they will not be indiscriminately attacked. Whether specific categories of civilians will be perceived as potential allies by revolutionaries depends mainly on the prior history of political interaction and cooperation between these civilians and the revolutionaries. Categorical terrorism is most likely where there has been little such interaction or cooperation, resulting in weak political alliances between the revolutionaries and complicitous civilians – for example, where the revolutionaries and complicitous civilians speak different languages, practice different religions, claim the same land, and/or are territorially segregated. The terrorist attacks of Sept. 11, 2001, have spurred many social scientists to explore the dynamics of terrorism, most for the first time. Before 9/11, terrorism research was the exclusive preserve, with very few exceptions, of small networks of political scientists and non-academic “security experts,” relatively few of whom were interested in social-science theory. Descriptive case studies abound, replete with ad hoc, case-specific explanations of terrorism. -
Israel's Other Terrorism Challenge
The University of Notre Dame Australia ResearchOnline@ND Arts Book Chapters School of Arts 2010 Israel's other terrorism challenge Sandra M. Nasr University of Notre Dame Australia, [email protected] Follow this and additional works at: https://researchonline.nd.edu.au/arts_chapters Recommended Citation Nasr, S. (2010). Israel's other terrorism challenge. In R. Jackson, E. Murphy, E & S. Poynting (eds.). Contemporary state terrorism: Theory and practice. Abingdon, Oxon: Routledge. This Book Chapter is brought to you by the School of Arts at ResearchOnline@ND. It has been accepted for inclusion in Arts Book Chapters by an authorized administrator of ResearchOnline@ND. For more information, please contact [email protected]. (In Contemporary State Terrorism: Theory and Practice , Sep. 2009) ‘Israel’s other Terrorism Challenge’ By Sandra Nasr In the West, we hear a lot about terrorism in relation to Israel: Palestinian militants in Gaza using rockets to fire at Israeli towns over the ‘border’; and Palestinian suicide bombers strapping on explosives and detonating their payloads in Israeli cafes, bars, restaurants and buses. These attacks on civilian targets for the purpose of making a political statement are, indeed, examples of terrorism and Israeli civilians are right to demand that their government act decisively to prevent such acts. Yet Israel often responds to these terrorist tactics by adopting its own. When Israel sanctions and employs tactics which are designed to instil fear, humiliate, injure or otherwise cause harm to a civilian population for a political purpose, the state is guilty of state terrorism. Identifying those policies which constitute state terrorism requires an examination of both the intent and effect of actions (and inaction) by the state. -
Various Definitions of Terrorism
Various Definitions of Terrorism Controversy in Defining Terrorism The difficulty in defining “terrorism” is in agreeing on a basis for determining when the use of violence (directed at whom, by whom, for what ends) is legitimate; therefore, the modern definition of terrorism is inherently controversial. The use of violence for the achievement of political ends is common to state and non-state groups. The majority of definitions in use has been written by agencies directly associated with government, and is systematically biased to exclude governments from the definition. The contemporary label of "terrorist" is highly pejorative-- it denotes a lack of legitimacy and morality. As a practical matter, so-called acts of “terrorism” or terrorism are often a tactic committed by the actors as part of a larger military or geo-political agenda. United Nations The UN General Assembly Resolution 49/60 (adopted on December 9, 1994), titled "Measures to Eliminate International Terrorism," contains a provision describing terrorism: Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them. The UN Member States still have no agreed-upon definition of terrorism, and this fact has been a major obstacle to meaningful international countermeasures. Terminology consensus would be necessary for a single comprehensive convention on terrorism, which some countries favor in place of the present 12 piecemeal conventions and protocols. -
Counter-Terrorism Reference Curriculum
COUNTER-TERRORISM REFERENCE CURRICULUM CTRC Academic Project Leads & Editors Dr. Sajjan M. Gohel, International Security Director Asia Pacific Foundation Visiting Teacher, London School of Economics & Political Science [email protected] & [email protected] Dr. Peter Forster, Associate Professor Penn State University [email protected] PfPC Reference Curriculum Lead Editors: Dr. David C. Emelifeonwu Senior Staff Officer, Educational Engagements Canadian Defence Academy Associate Professor Royal Military College of Canada Department of National Defence [email protected] Dr. Gary Rauchfuss Director, Records Management Training Program National Archives and Records Administration [email protected] Layout Coordinator / Distribution: Gabriella Lurwig-Gendarme NATO International Staff [email protected] Graphics & Printing — ISBN XXXX 2010-19 NATO COUNTER-TERRORISM REFERENCE CURRICULUM Published May 2020 2 FOREWORD “With guns you can kill terrorists, with education you can kill terrorism.” — Malala Yousafzai, Pakistani activist for female education and Nobel Prize laureate NATO’s counter-terrorism efforts have been at the forefront of three consecutive NATO Summits, including the recent 2019 Leaders’ Meeting in London, with the clear political imperative for the Alliance to address a persistent global threat that knows no border, nationality or religion. NATO’s determination and solidarity in fighting the evolving challenge posed by terrorism has constantly increased since the Alliance invoked its collective defence clause for the first time in response to the terrorist attacks of 11 September 2001 on the United States of America. NATO has gained much experience in countering terrorism from its missions and operations. However, NATO cannot defeat terrorism on its own. Fortunately, we do not stand alone. -
Building a Global Terrorism Database
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Building a Global Terrorism Database Author(s): Gary LaFree ; Laura Dugan ; Heather V. Fogg ; Jeffrey Scott Document No.: 214260 Date Received: May 2006 Award Number: 2002-DT-CX-0001 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. BUILDING A GLOBAL TERRORISM DATABASE Dr. Gary LaFree Dr. Laura Dugan Heather V. Fogg Jeffrey Scott University of Maryland April 27, 2006 This project was supported by Grant No. 2002-DT-CX-0001 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Excutive Summary.................................................................................................. 1 Building a Global Terrorism Database ................................................................... 4 The Original PGIS Database.......................................................................... 6 Methods.................................................................................................................. -
Preventing Terrorism and Countering Violent Extremism And
Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Published by the Organization for Security and Co-operation in Europe Vienna, February 2014 © OSCE 2014 Designed in Warsaw by Homework Printed in Vienna by Stanzell Druck All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means — electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of the publishers. This restriction does not apply to making digital or hard copies of this publication for internal use within the OSCE, and for personal or educational use when for non-profit and non-commercial purposes, providing that copies be accompanied by an acknowledgment of the OSCE as the source. ISBN 978–92–9235–023–9 Transnational Threats Department Office for Democratic Institutions OSCE Secretariat and Human Rights Wallnerstrasse 6, A-1010 Vienna, Austria Ul. Miodowa 10, 00–251 Warsaw, Poland http://www.osce.org/atu http://www.osce.org/odihr The publication of this guidebook was made possible thanks to generous contributions from the Australian Government, through its Department of Foreign Affairs and Trade, the Swiss Confederation, through its Federal Department of Foreign Affairs, the United States of Amer- ica, through its Department of State, and the Principality of Liechtenstein, through its Ministry of Foreign Affairs. The content of this publication, including the views, opinions, findings, inter- pretations and conclusions expressed herein do not necessarily reflect those of these donors. -
Definition of Terrorism by Country in Oecd Countries
DEFINITION OF TERRORISM BY COUNTRY IN OECD COUNTRIES There have been some definitional differences in the use of the terms ‘terrorism’ and ‘act of terrorism’ between OECD countries. It is for this reason that a comparison is necessary to clarify the scope of the operation of the terrorism risk insurance programmes. The OECD International Platform on Terrorism Risk Insurance shares information and identifies good practices for the financial management of terrorism risk, to contribute to fast economic recovery in the event of attacks. This comparative table is regularly updated. It is the product of joint work between national terrorism insurance schemes, the OECD and the World Forum of Catastrophe Programmes. www.oecd.org/daf/fin/insurance/terrorism-risk-insurance.htm DEFINITION OF TERRORISM BY COUNTRY IN OECD COUNTRIES Status of definition of Intention of terrorist act Identification of those Means used Targets/effects terrorism behind the act Contained in s 5 Terrorism Insurance Action done or threat made, with the Not specified An act (or threat of an act), that is not advocacy, An action that causes serious harm to a Act 2003 intention of advancing a political, religious protest, dissent or industrial action, that causes person, serious damage to property, or ideological cause, with the intention of specified damage. causes death or endangers life or creates a Act of terrorism has to be certified by coercing or influencing by intimidation the serious health or safety risk, or seriously the Commonwealth Treasurer, after government of Australia or the Australian interferes with, or disrupts or destroys an consultation with the Commonwealth States or Territories, or a foreign country, or electronic system.