
Terrorism and Counterterrorism
by Nacos; Brigitte L.Rent Textbook
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Preface | p. ix |
About the Author | p. xiv |
Introduction: The Terrorist Threat | p. 1 |
Terrorism Trends Over the Last Three Decades | p. 5 |
Terrorism | p. 15 |
The Perennial Debate: What Is Terrorism? | p. 17 |
The Meaning of Terrorism Over Time | p. 19 |
The Definitional Potpourri | p. 20 |
Obama Administration: Downplaying the ôTö Word | p. 28 |
Is Terrorism Ever Justified? | p. 28 |
State Terror(ism) and State-Sponsored Terrorism | p. 30 |
State Sponsors of Terrorism | p. 31 |
The Meaning of Terrorism in This Volume | p. 32 |
Terrorism in the Global Context | p. 35 |
Different Types of Groups | p. 36 |
The Roots of Modern Terrorism | p. 37 |
The Post-World War II Wave | p. 39 |
1968: The Advent of Modem-Day Terrorism | p. 41 |
IRA and ETA: Groups That Transcend the Average Life Span of Terrorist Groups | p. 42 |
The Decline of Left-Wing Terrorism | p. 44 |
The Rise of Catastrophic Terrorism | p. 45 |
Unrestrained Terrorism and Counterterrorism after the Cold War | p. 46 |
The Old and New Terrorism in the Post-Cold War Era | p. 47 |
Modernization, Globalization, and the Proliferation of Religious Violence | p. 48 |
Technological Advances and Global Communication | p. 52 |
Terrorism in the American Context | p. 55 |
Right-Wing Terrorism | p. 55 |
The Ku Klux Klan | p. 56 |
Christian Identity and Neo-Nazi Groups | p. 59 |
The Patriot and Militia Movement | p. 62 |
The Surge of the Black Supremacist Movement | p. 65 |
Left-Wing Terrorism | p. 65 |
The First Anarchists in the United States | p. 65 |
The Weather Underground | p. 67 |
The Black Panther Party | p. 68 |
The Symbionese Liberation Army | p. 69 |
Single-Issue Terrorism | p. 70 |
Antiabortion Violence | p. 70 |
The Animal and Earth Liberation Fronts | p. 71 |
The Jewish Defense League | p. 73 |
Puerto Rican Nationalist Groups | p. 73 |
Ideological Waves | p. 74 |
Religious Terrorism: Political Violence in the Name of God | p. 79 |
Defending the Faith in ôCosmic Warsö | p. 83 |
The Proliferation of Religious Violence | p. 85 |
Alienation, Humiliation, and Fear | p. 86 |
The Jihadi Movement and Political Violence | p. 88 |
Muslims | p. 89 |
Islamists | p. 89 |
Salafis and Wahhabis | p. 90 |
Jihadis | p. 90 |
Jihadi Ideology | p. 92 |
Homegrown Jihadis in the West-Including the United States | p. 95 |
The Making of Terrorists: Causes, Conditions, Influences | p. 102 |
Terrorism as a Result of Rational Choice | p. 105 |
Terrorism as a Result of Personal Traits | p. 107 |
Terrorism as a Result of Social Interaction | p. 108 |
Gender and Terrorism | p. 109 |
For the Sake of Love | p. 111 |
Demonstration of Gender Equality | p. 111 |
Can Real Women Become Terrorists? | p. 113 |
Tactical Advantages of Female Terrorists | p. 113 |
Children as Terrorists | p. 115 |
The Lack of a Universal Terrorist Profile | p. 116 |
The Stages Leading to Terrorism | p. 116 |
The Roots of Terrorism: No Simple Answers | p. 119 |
From State Sponsors to Involuntary Hosts | p. 123 |
Former and Current State Sponsors | p. 128 |
Iraq | p. 128 |
Libya | p. 129 |
Sudan | p. 129 |
Syria | p. 130 |
The Case of Saudi Arabia | p. 131 |
When Governments Reconsider Their Support for Terrorism | p. 132 |
Failed and Failing States and ôBrown Areasö | p. 133 |
Involuntary Host Countries | p. 134 |
Common Thread: Goals, Targets, Tactics | p. 136 |
Do Terrorists Achieve Their Goals? | p. 137 |
The Selection of Targets | p. 138 |
Terrorist Methods: From Primitive Bombs to WMD | p. 140 |
Most Common Methods of Terrorist Attacks | p. 141 |
Most Likely CBRN Weapons in the Hands of Terrorists | p. 154 |
Organizational Structures and the Financing of Terror | p. 160 |
When Terrorist Groups Decline or End | p. 167 |
Financing Terrorism | p. 168 |
Narco-Terrorism or Narco-Funded Terrorism? | p. 170 |
Counterterrorism | p. 173 |
Terrorism and America's Post-9/11 National Security Strategy | p. 175 |
President Bush's National Security Strategy | p. 179 |
Making the World Safer and Better | p. 180 |
Preemption Before Threats Become Imminent | p. 180 |
Unilateral Use of Force | p. 181 |
President Obama's National Security Strategy | p. 182 |
The Utility of Hard and Soft Power in Counterterrorism | p. 188 |
Military Hard Power | p. 191 |
Military Retaliation/Reprisal | p. 191 |
Military Preemption | p. 193 |
Commando Raids | p. 195 |
Assassinations | p. 196 |
Hostage Rescue Missions | p. 197 |
Nonmilitary Hard Power: Economic Sanctions | p. 199 |
Drying Up Financial Resources | p. 200 |
Soft Power and Counterterrorism | p. 200 |
Deterrence | p. 200 |
Diplomacy | p. 201 |
Talking to Terrorist Groups | p. 203 |
Public Diplomacy | p. 205 |
Conciliation and Peace | p. 207 |
Balancing Security, Liberty, and Human Rights | p. 211 |
The Rights of ôEnemy Combatantsö | p. 219 |
Torture: Leaders and Followers | p. 222 |
Obama on Torture and Rendition | p. 229 |
Torture: The Public Debate | p. 230 |
Homeland Security: Preparedness and Prevention | p. 235 |
Post-9/11 Reorganization of Homeland Security | p. 238 |
General and Specific Homeland Security Strategies | p. 243 |
It's the Intelligence, Stupid | p. 244 |
Reorganization of the Intelligence Community | p. 248 |
International Cooperation | p. 251 |
Congress Resists Change | p. 253 |
The News Media and the Internet | p. 257 |
Terrorist Propaganda and the Media | p. 259 |
Publicity: The Universal Terrorist Goal | p. 262 |
An Alternative View: Contemporary Terrorists Do Not Need Publicity | p. 263 |
Terrorism and the Triangle of Communication | p. 264 |
Media-Related Goals | p. 265 |
The Attention-Getting Goal | p. 265 |
The Recognition Goal | p. 266 |
The Respectability/Legitimacy Goal | p. 269 |
Bedfellows in a Marriage of Convenience | p. 270 |
Media and Terrorist Contagion | p. 271 |
Defending the Media | p. 272 |
Treason or Public Service? | p. 273 |
Terror and Hate in Cyberspace | p. 276 |
Terrorists and the Newest Communication Technologies | p. 279 |
Propaganda and Hero Worship | p. 281 |
The Internet as a Tool to Plan and Carry Out Terrorist Operations | p. 286 |
The Web and the Retrieval of Valuable Information | p. 289 |
Online Recruitment | p. 289 |
Fund-Raising via the Net | p. 290 |
Anti- and Counterterrorism in the News | p. 293 |
The Media and Military Responses to Terrorism | p. 296 |
The Bombing of Libya (1986) | p. 296 |
Bombing of Iraq's Intelligence Headquarters (1993) | p. 297 |
Missile Strikes in Afghanistan and Sudan (1998) | p. 297 |
The Post-9/11 War Against Terrorism | p. 298 |
Military Action Against Al Qaeda and the Taliban (2001) | p. 300 |
The Invasion of Iraq (2003) | p. 301 |
The Iraq War: Different News Coverage Abroad | p. 304 |
Conclusion: Living with Terrorist Threats | p. 307 |
Appendix: Major Terrorist Incidents Since the Early 1970s | p. 313 |
Bibliography | p. 323 |
Index | p. 331 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.