Credits |
|
xv | |
Preface |
|
xix | |
Acknowledgments |
|
xxiii | |
|
|
1 | (20) |
|
|
1 | (1) |
|
Definitions and Typologies of Terrorism |
|
|
2 | (10) |
|
|
3 | (5) |
|
|
8 | (4) |
|
Critical Distinctions: Terrorism, Aggression, Crime, and War |
|
|
12 | (8) |
|
|
14 | (2) |
|
|
16 | (4) |
|
Legal and Military Interventions |
|
|
20 | (1) |
|
|
20 | (1) |
|
Theories of Aggression and Terrorism |
|
|
21 | (22) |
|
|
21 | (1) |
|
|
22 | (3) |
|
Normlessness and Alienation |
|
|
25 | (1) |
|
Strain and Deprivation Theories |
|
|
26 | (3) |
|
Routine Activities Theory |
|
|
29 | (2) |
|
Gangs, Territory, and Honor |
|
|
31 | (4) |
|
Strategic and Psychological Motives |
|
|
35 | (5) |
|
Motives of Leaders and Followers |
|
|
35 | (1) |
|
|
36 | (2) |
|
Rationality, Passion, and Shame |
|
|
38 | (2) |
|
Rationality and Deterrence |
|
|
40 | (1) |
|
Other Theories of Aggression |
|
|
40 | (1) |
|
Do Explanations of Terrorism Lend Legitimacy to It? |
|
|
41 | (1) |
|
|
42 | (1) |
|
A Brief History of Terrorism |
|
|
43 | (30) |
|
Early Forms of Terrorism: Babylon and Rome, Asia, Europe, and America |
|
|
43 | (4) |
|
Ethnic and Religious Terrorism in the Twentieth Century |
|
|
47 | (6) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
English Protestants and Irish Catholics |
|
|
51 | (1) |
|
|
52 | (1) |
|
Emergence of the Suicide Bomber |
|
|
53 | (9) |
|
|
62 | (2) |
|
Post-9/11 Terrorism: Alienation Meets Advanced Technology |
|
|
64 | (7) |
|
|
71 | (2) |
|
Two Trajectories of Humankind: Globalization or Clash? |
|
|
73 | (28) |
|
From Alexander the Great to Twenty-First-Century Globalization |
|
|
73 | (14) |
|
A Short History of Globalization |
|
|
73 | (10) |
|
Critiques of Globalization and Counter-Critiques |
|
|
83 | (4) |
|
The Clash of Civilizations Theory |
|
|
87 | (10) |
|
|
87 | (1) |
|
|
88 | (3) |
|
Critiques of the Clash of Civilizations Theory |
|
|
91 | (6) |
|
Reconciling the Irresistible Force of Globalization with the Immovable Object of Tradition |
|
|
97 | (2) |
|
|
99 | (2) |
|
Religion, the State, and Terrorism |
|
|
101 | (36) |
|
The Major Religions: Origins, Scriptures, Followers, and Links to Violence |
|
|
101 | (21) |
|
|
104 | (1) |
|
|
105 | (10) |
|
|
115 | (2) |
|
|
117 | (2) |
|
|
119 | (1) |
|
|
120 | (2) |
|
Moderates, Fundamentalists, and Extremists |
|
|
122 | (3) |
|
|
125 | (4) |
|
Does Religion Cause Terrorism? |
|
|
129 | (6) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Nonreligious Extremism and Terrorism |
|
|
137 | (29) |
|
|
137 | (11) |
|
|
141 | (2) |
|
Racist and Ethnic Extremism and Hate Groups |
|
|
143 | (2) |
|
Other Extremist Ideologies |
|
|
145 | (3) |
|
Prominent Extremist Groups |
|
|
148 | (14) |
|
The German Red Army Faction |
|
|
148 | (1) |
|
|
149 | (2) |
|
|
151 | (1) |
|
Symbionese Liberation Army |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
155 | (1) |
|
Home-Grown Extremists: Citizen Militias, Small Team Operations, and Lone Wolves |
|
|
156 | (6) |
|
|
162 | (2) |
|
|
164 | (2) |
|
|
166 | (36) |
|
Technology as an Instrument of Terror |
|
|
166 | (25) |
|
Weapons of Mass Destruction: Chemical, Biological, Radiological, and Nuclear |
|
|
168 | (12) |
|
Attacks on Technology Infrastructures and Critical Systems |
|
|
180 | (1) |
|
|
181 | (8) |
|
The Internet as a ``Rage Enabler'' |
|
|
189 | (2) |
|
Technology as a Tool Against Terrorism |
|
|
191 | (8) |
|
Smart Identification Technologies |
|
|
194 | (2) |
|
Technology for Gathering Intelligence Data |
|
|
196 | (1) |
|
Technology for ``Connecting the Dots'' |
|
|
197 | (1) |
|
The Internet as Bridge Builder |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (2) |
|
Terrorism throughout the World |
|
|
202 | (48) |
|
Terrorism in the United States |
|
|
202 | (11) |
|
Terrorist Groups and Acts of Domestic Origin |
|
|
203 | (4) |
|
Terrorist Groups and Acts of International Origin |
|
|
207 | (6) |
|
From Mexico to South America: Narcoterrorism and Leftist Terrorism |
|
|
213 | (8) |
|
The Tijuana (Arellano Felix) Drug Cartel |
|
|
217 | (1) |
|
|
218 | (1) |
|
The Zapatista National Liberation Front |
|
|
219 | (1) |
|
The Sandinistas in Nicaragua |
|
|
220 | (1) |
|
Attacks in Europe and Russia |
|
|
221 | (4) |
|
March 2004 Madrid Commuter Train Attack |
|
|
221 | (1) |
|
September 2004 Beslan School Hostage Crisis |
|
|
222 | (2) |
|
July 2005 London Subway and Bus Attack |
|
|
224 | (1) |
|
|
225 | (4) |
|
|
225 | (2) |
|
|
227 | (1) |
|
Jemaah Islamiah and the Bali Bombings of 2002 and 2005 |
|
|
228 | (1) |
|
|
229 | (9) |
|
|
229 | (1) |
|
|
230 | (2) |
|
Palestinian Terrorist Groups |
|
|
232 | (3) |
|
|
235 | (3) |
|
Prominent Contemporary Terrorist Leaders |
|
|
238 | (10) |
|
Commonalities and Differences |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (49) |
|
Investigative, Diplomatic, and Military Responses |
|
|
250 | (13) |
|
|
251 | (1) |
|
|
252 | (11) |
|
Just War Theory and Terrorism |
|
|
263 | (5) |
|
Unilateral vs. Collective Responses |
|
|
268 | (2) |
|
|
270 | (11) |
|
|
270 | (1) |
|
Is Torture Ever Justifiable? |
|
|
271 | (6) |
|
|
277 | (4) |
|
Covert and Other Special Operations |
|
|
281 | (4) |
|
Dealing with Hostage-Taking |
|
|
285 | (2) |
|
|
287 | (1) |
|
International Collaboration in the Investigation and Prosecution of Terrorism |
|
|
288 | (2) |
|
|
290 | (3) |
|
The 9/11 Commission: Findings and Recommendations |
|
|
293 | (3) |
|
|
293 | (2) |
|
How Can Future Attacks Be Prevented? |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (2) |
|
|
299 | (40) |
|
Fear of Terrorism: Basics |
|
|
299 | (4) |
|
|
300 | (1) |
|
Short- and Long-Term Consequences of Excessive Fear |
|
|
301 | (1) |
|
Fear of Crime, Fear of International Violence |
|
|
302 | (1) |
|
Community-Oriented Interventions to Reduce Excessive Fear |
|
|
303 | (1) |
|
The Anatomy of Fear and Its Relationship to Risk |
|
|
303 | (7) |
|
The Nature and Sources of Fear |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Subjective vs. Objective Assessments of Risk |
|
|
307 | (3) |
|
|
310 | (13) |
|
Do the Media Exploit Our Sense of Powerlessness? |
|
|
312 | (5) |
|
Reliable Media Accounts, Invalid Risks |
|
|
317 | (1) |
|
|
318 | (5) |
|
Exploitation of Fear by Politicians |
|
|
323 | (6) |
|
|
329 | (5) |
|
|
329 | (4) |
|
|
333 | (1) |
|
An Agenda for Reducing the Social Costs of Fear |
|
|
334 | (3) |
|
|
337 | (2) |
|
Preventing Terrorism: Short-Term Approaches |
|
|
339 | (36) |
|
|
339 | (1) |
|
Dealing with a Thinking Adversary |
|
|
340 | (1) |
|
|
341 | (9) |
|
Integrating Intelligence Activities |
|
|
342 | (2) |
|
Collection, Processing and Analysis, and Dissemination of Intelligence |
|
|
344 | (6) |
|
Public Prevention: Homeland Security |
|
|
350 | (12) |
|
Department of Homeland Security |
|
|
350 | (3) |
|
Terrorism and Natural Disasters: Lessons from Hurricane Katrina |
|
|
353 | (9) |
|
|
362 | (4) |
|
The 9/11 Commission and the Intelligence Gap: Findings and Recommendations |
|
|
366 | (4) |
|
Intelligence Shortcomings and Goals |
|
|
366 | (1) |
|
|
367 | (1) |
|
Criticism of the 9/11 Commission Report |
|
|
368 | (2) |
|
State and Local Initiatives |
|
|
370 | (3) |
|
|
373 | (2) |
|
Preventing Terrorism: Long-Term Strategies |
|
|
375 | (39) |
|
|
375 | (1) |
|
From Clash of Civilizations to Dialogue |
|
|
376 | (16) |
|
|
376 | (1) |
|
|
377 | (1) |
|
Dialogue and Social Capital |
|
|
377 | (5) |
|
|
382 | (8) |
|
Understanding What Works in Dialogue: A Research Agenda |
|
|
390 | (2) |
|
Government Initiatives: Soft Power |
|
|
392 | (9) |
|
Ambassadors, Consulates, and Embassy Staffs |
|
|
392 | (2) |
|
|
394 | (1) |
|
|
395 | (5) |
|
Creative Public Initiatives |
|
|
400 | (1) |
|
|
401 | (2) |
|
Building Trust and Community |
|
|
403 | (8) |
|
The Importance of Culture |
|
|
404 | (1) |
|
|
404 | (3) |
|
Good Government and the Rule of Law |
|
|
407 | (3) |
|
Strengthening of Civil Associations |
|
|
410 | (1) |
|
Reducing Dependence on Foreign Oil |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (2) |
|
Balancing Security and Rights to Liberty and Privacy |
|
|
414 | (22) |
|
The Problem and Its Historical Precedents |
|
|
414 | (1) |
|
How Terrorism Alters the Balancing Act |
|
|
415 | (2) |
|
The Tradeoff: What Is Given Up? What Is Gained? |
|
|
417 | (6) |
|
|
423 | (7) |
|
|
430 | (4) |
|
Toward a More Informed Balance of Security and Liberty |
|
|
434 | (1) |
|
|
435 | (1) |
|
Toward a Safer and Saner Twenty-First Century |
|
|
436 | (5) |
|
|
440 | (1) |
Notes |
|
441 | (10) |
References |
|
451 | (28) |
Index |
|
479 | |