ebook img

The CRC Press Terrorism Reader PDF

406 Pages·2013·5.012 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The CRC Press Terrorism Reader

Terrorism / Counterterrorism M The CRC Press a r The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author a experts to provide the ultimate comprehensive resource on terrorism. With information s drawn from premier titles in the CRC Press collection, the book begins by discussing the Terrorism Reader origins, definitions, and psychology of terrorism as well as terrorist motivations. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist T threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. h e Topics include: • Terrorist organizations and cells C • Phases of the terrorist cycle, including target selection, planning and preparation, R escape and evasion, and media exploitation C • Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) P • Methods for deterrence and intelligence-driven counterterrorism r • The terrorist threat from Latin America, Europe, the Middle East, and Asia e • The impact of the Arab Spring s s • Why suicide bombings are the ultimate terrorist tool • The crime-terror nexus and terrorist funding T • Technology in terrorism and counterterrorism e r Providing real-world insight and solutions to terrorist threats and acts at home and abroad, r the book goes beyond theory to deliver practitioner knowledge from the field straight into o the reader’s hands. r i s m R e a d e 6000 Broken Sound Parkway, NW K20378 r Marie-Helen Maras Suite 300, Boca Raton, FL 33487 ISBN: 978-1-4665-8832-5 711 Third Avenue New York, NY 10017 90000 an informa business 2 Park Square, Milton Park www.crcpress.com Abingdon, Oxon OX14 4RN, UK 9 781466 588325 w w w.c r c p r e s s .co m K20378 mech-rev.indd 1 10/9/13 8:12 AM The CRC Press Terrorism Reader The CRC Press Terrorism Reader Marie-Helen Maras CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130715 International Standard Book Number-13: 978-1-4665-8833-2 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid- ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti- lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy- ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To my beloved niece, Hera-Demetra Maras May you always follow your dreams Contents Introduction ...........................................................................................................................xvii Author .....................................................................................................................................xxv Part I Terrorism and Terrorism History Chapter 1 Definitions and Origins of Terrorism ................................................................3 What Is Terrorism? ...............................................................................................4 Definitions of Terrorism ......................................................................................5 The History of Terrorism .....................................................................................7 The First Wave ..................................................................................................9 The Second Wave .............................................................................................9 The Third Wave ..............................................................................................10 The Fourth Wave ............................................................................................11 Concluding Thoughts .........................................................................................12 Chapter 2 Motivations of Terrorists and the Psychology of Terrorism .........................13 Ideologies Terrorists Espouse ...........................................................................14 Political and Policy-Based Ideologies ..........................................................14 Religious Extremist Ideologies .....................................................................16 Terrorist Motivations and Goals ......................................................................18 Primary Motivations/Goals ..........................................................................18 Secondary Motivation/Goals .......................................................................18 Internal Psychology of Terrorist Acts ..............................................................19 Dynamics of Large-Group Identity .................................................................21 Terrorism as a Group Activity: Large-Group Identity .................................23 Large Groups and Totalistic Belief Systems ...................................................24 Concluding Thoughts ........................................................................................25 Chapter 3 International and Domestic Terrorism ...........................................................27 International Terrorism .....................................................................................27 Subcategories of International Terrorism ......................................................29 Domestic Terrorism ...........................................................................................31 Subcategories of Domestic Terrorism ..............................................................31 Left-Wing Terrorists ...........................................................................................31 Anarchists ............................................................................................................33 vii Contents Right-Wing Terrorists ........................................................................................33 Special-Interest Terrorists .................................................................................35 Animal Rights ................................................................................................35 Ecoterrorists ..................................................................................................36 Antiabortionist Terrorists ............................................................................36 Domestic and International Lone-Wolf and Homegrown Terrorism ........38 Leaderless Groups and Lone Wolves ..........................................................38 ALF Lone Wolf ...................................................................................................38 Islamic Lone Wolves ...........................................................................................39 Early Homegrown Terrorists ...........................................................................40 Non-Islamic Homegrown Contemporary Terrorists ...................................40 Contemporary Homegrown Islamic Terrorists..............................................41 Concluding Thoughts ........................................................................................42 Part II Terrorist Tactics, Terrorist Capabilities Chapter 4 Terrorist Organizations and Cells ....................................................................47 Types of Terrorist Cells ......................................................................................47 Operative Membership Pools ...........................................................................48 Terrorist Cell Size ..............................................................................................48 How Cells and Leadership Communicate .....................................................49 Terrorist Command and Control Cells ..........................................................50 Terrorist Intelligence Cells ...............................................................................50 Cell Leader .....................................................................................................50 Surveillance Team ..........................................................................................51 Photography Team .........................................................................................51 Penetration Team ...........................................................................................51 Security/Driver ...............................................................................................51 Terrorist Tactical Operations Cells ..................................................................52 Terrorist Logistics Cells .....................................................................................52 Terrorist Group Structures and Membership: Who Orders Terrorist Acts? ......................................................................................................................53 Terrorist Command and Control Structures ..................................................53 Organizational Models .....................................................................................54 Religious Terrorist Organization Structure ...................................................56 Political Terrorist Organization Structure ......................................................57 Combined Cell Organization Structure .........................................................58 Case Study: Ecoterrorism .................................................................................60 Concluding Thoughts .........................................................................................61 Chapter 5 Terrorist Planning, Surveillance, Targeting, and Operations .....................63 The Terrorist Attack Cycle ................................................................................64 Phase I: Target Selection ..............................................................................65 Phase II: Operational Planning and Preparation .....................................65 Terrorist Preparations: Tactics, Safe Houses, and Supplies .........................66 Tactic Selection ..............................................................................................66 Explosive Bombing Attack ......................................................................66 viii Contents Arson .........................................................................................................67 Assassination ............................................................................................67 Light Infantry Weapons Attack .............................................................68 Armed Raid ...............................................................................................69 Abduction (Kidnapping, Hostage Taking) ...........................................69 Barricade or Hostage Barricade ..............................................................70 Human-Guided (Suicide/Martyr) Weapon Attack ..............................70 Aviation Attacks ........................................................................................71 Maritime Attacks .....................................................................................72 Vehicle Commandeering (Hijacking) and Theft ..................................73 Industrial and Infrastructure Attack .....................................................73 Physical Intimidation or Maiming .........................................................73 Safe Houses .....................................................................................................73 Detection of Terrorist Supply Chains: Terrorist Supply Is an Indicator of Future Activity .....................................................................74 Terrorist Methods of Acquiring Supplies ...................................................75 Phase III: Plan Implementation ...................................................................75 Phase IV: Escape and Evasion ......................................................................78 Phase V: Media Exploitation .......................................................................79 Concluding Thoughts ........................................................................................79 Chapter 6 WMD and CBRN ...............................................................................................81 Introduction ........................................................................................................81 September 11 and Terrorists’ Designs ........................................................82 CBRN and Terrorists’ Capabilities .............................................................82 Nuclear Weapons ...............................................................................................83 Nuclear Material Acquisition and Weapon Production..........................83 The Prospect of Nuclear Attack ..................................................................84 Radiological Weapons .......................................................................................85 Biological Weapons ...........................................................................................87 Dissemination Challenges ...........................................................................88 Aum Shinrikyo and Bioterrorism ..............................................................90 2001 US Anthrax Attacks .............................................................................91 Chemical Weapons ............................................................................................92 Acquisition, Manufacture, and Use ...........................................................94 Aum Shinrikyo and Chemical Terrorism .................................................96 Concluding Thoughts ........................................................................................97 Chapter 7 Terrorist Funding .............................................................................................101 Classifying Terrorist Sources of Support ......................................................101 Earning, Moving, Storing ................................................................................102 Earning ..........................................................................................................102 Cultural or Ethnic Support Organizations .........................................102 Charities ...................................................................................................103 Zakat .........................................................................................................103 Illicit Activities .......................................................................................104 Other Fund-Raising Methods ..............................................................108 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.