The Handbook of the Criminology of Terrorism (eBook)
632 Seiten
Wiley-Blackwell (Verlag)
978-1-118-92396-2 (ISBN)
The Handbook of the Criminology of Terrorism features a collection of essays that represent the most recent criminological research relating to the origins and evolution of, along with responses to, terrorism, from a criminological perspective.
- Offers an authoritative overview of the latest criminological research into the causes of and responses to terrorism in today's world
- Covers broad themes that include terrorism's origins, theories, methodologies, types, relationship to other forms of crime, terrorism and the criminal justice system, ways to counter terrorism, and more
- Features original contributions from a group of international experts in the field
- Provides unique insights into the field through an exclusive focus on criminological conceptual frameworks and empirical studies that engage terrorism and responses to it
Gary LaFree is Director of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and a Distinguished Scholar and Professor of Criminology and Criminal Justice at the University of Maryland. His most recent book (with Laura Dugan and Erin Miller) is Putting Terrorism in Context (2015).
Joshua D. Freilich is a member of the Criminal Justice Department and the Criminal Justice PhD Program at John Jay College. He is the Creator and co-Director of the United States Extremist Crime Database (ECDB), an open source relational database of violent and financial crimes committed by political extremists in the U.S.
Gary LaFree is Director of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and a Distinguished Scholar and Professor of Criminology and Criminal Justice at the University of Maryland. His most recent book (with Laura Dugan and Erin Miller) is Putting Terrorism in Context (2015). Joshua D. Freilich is a member of the Criminal Justice Department and the Criminal Justice PhD Program at John Jay College. He is the Creator and co-Director of the United States Extremist Crime Database (ECDB), an open source relational database of violent and financial crimes committed by political extremists in the U.S.
Title Page 5
Copyright Page 6
Contents 7
Notes on Contributors 10
Part I Introduction 19
Bringing Criminology into the Study of Terrorism 21
Bringing Criminology into the Study of Terrorism 21
The Criminology of Terrorism 22
Note 30
References 30
Part II Etiology 33
Chapter 1 The Etiology of Radicalization 35
What is Radicalization? 35
Contributions of Social Science Theories 37
Integrating Factors at Multiple Levels 40
How Radicalization Develops Parameters of the Radicalization Process 42
Conclusion 46
References 46
Chapter 2 Psychological Factors in Radicalization: A “3?N” Approach 51
Needs: Individual Motivation 52
Mechanisms Underlying Extremism 54
Narratives: The Role of Ideology 57
Networks: Group Dynamics 59
Conclusion 61
References 61
Chapter 3 What Makes Them Do It? Individual-Level Indicators of Extremist Outcomes 65
Introduction 65
Radicalization Outcomes and Processes 66
Empirical Analysis of Radicalization 68
Conclusions 75
Notes 76
References 77
Chapter 4 The Terrorists’ Planning Cycle: Patterns of Pre-incident Behavior 80
Notes 92
References 92
Chapter 5 Group-level Predictors of Political and Religiously Motivated Violence 95
Data Sources 96
Group-level Predictors of Violence 100
Conclusion 106
Notes 107
References 108
Chapter 6 Country-level Predictors of Terrorism 111
Defining and Measuring Terrorism 112
Open-source Data on Terrorism 112
Prior Literature: Correlates of Country-level Terrorism Attacks 114
Conclusions 130
Note 131
References 132
Part III Theories 137
Chapter 7 General Strain Theory and Terrorism 139
An Overview of GST 140
Strain in Current Explanations of Terrorism 142
GSTT 143
Summary 148
References 149
Chapter 8 Social Learning Theory and Becoming a Terrorist: New Challenges for a General Theory 151
Introduction 151
Defining Terrorists and Their Illegal Actions 152
Towards Understanding the Process of Becoming a Terrorist 153
From Sutherland to Akers: The Evolution of Learning Theory 153
Social Structure and Social Learning: Understanding Radicalization as a Social Learning Process 155
Role of Social Media in Radicalized Learning 159
Summary and Conclusions 161
Notes 163
References 163
Chapter 9 The Situational Approach to Terrorism 168
Introduction 168
The Line of Least Resistance 173
Displacement and Terrorism: the Critique of Situational Prevention Measures 173
Future Research 176
References 177
Chapter 10 Victimization Theories and Terrorism 180
Introduction 180
The Non-randomness of Terrorism Victimization 181
Victimization Theories and Criminology 182
Victimization Theories and Terrorism 185
Data Sources for Terrorism Victimization 186
The Future of Victimization Theories and Terrorism 188
References 190
Chapter 11 Analyzing Radicalization and Terrorism: A Situational Action Theory 193
Importance of Mechanism?based and Integrative Explanations 194
SAT 196
Coda: Outlining a Research Agenda and Its Implications for Prevention 200
Notes 201
References 202
Part IV Research Methods 205
Chapter 12 Measuring Terrorism 207
Introduction 207
Applying Crime Data Collection Strategies to Terrorism 208
Open-Source Data Collection 210
Conclusion 220
Notes 220
References 221
Chapter 13 Paradigmatic Case Studies and Prison Ethnography: Future Directions in Terrorism Research 224
The Case Study in Terrorism Research 225
The Paradigmatic Case Study 225
Ethnography in Terrorism Research 228
Prison Ethnography 229
Structuring the Prison Interview 233
Conclusions 235
Acknowledgments 236
Notes 236
References 236
Chapter 14 Social Network Analysis and Terrorism 239
Introduction 239
SNA 240
Influence of SNA in Characterizing Terrorist Group Structure 241
Resiliency and the Security/Efficiency Trade-off 242
Roles in Terrorist Organizations 244
Data Mining, SNA, and Terrorism 245
Dynamic SNA and Terrorism 246
Future Directions 247
References 248
Chapter 15 Spatial and Temporal Analysis of Terrorism and Insurgency 250
Introduction 250
Emergence of Space–Time Analysis of Violence across Multiple Fields 250
Evolution of Space–Time Analysis of Terrorism and Insurgency 253
Suggestions for Future Developments 257
Notes 258
References 258
Chapter 16 Applying Multilevel Models to Terrorism Research 262
A Brief Overview of Multilevel Models 263
Multilevel Models in Terrorism Research 267
Contextual Measures, Future Directions, and Additional Considerations 270
Notes 275
References 275
Chapter 17 Methodological Advances in the Study of Terrorism: Using Latent Class Growth Analysis to Estimate Terrorism Trends 278
Introduction 278
LCGA 279
LCGA Applied to Terrorism 280
Limitations and Methodological Issues with LCGA 286
Future Research 289
Conclusion 290
Notes 290
References 291
Chapter 18 Interrupted Time Series Analysis in the Study of Terrorism 294
Review of Some Applications of Interrupted Time Series Analysis in Terrorism Research 295
Statistical Background on Interrupted Time Series Analysis 296
Impact of Embassy Fortifications on US Diplomatic Attacks 300
Concluding Remarks 309
References 310
Part V Types of Terrorism 313
Chapter 19 Far Right Terrorism in the United States 315
Types of Right-Wing Extremists 316
Early Terror in America 316
Terror Cells in the 1980s 317
No Lack of Effort: Foiled Plots in the 1990s 319
Lone-Offender Terrorism 321
Conclusion 323
Notes 324
References 325
Chapter 20 Left-wing Terrorism: From Anarchists to the Radical Environmental Movement and Back 328
Traditional Left-wing Movement, 1960–1985 329
Radical Environmental and Animal Rights Movement, 1970–Today 335
Future of the Left Wing: An Overlap in Ideologies? 337
Conclusion 338
Notes 338
References 339
Chapter 21 Assessing Aerial Hijacking as a Terrorist Tactic 341
Introduction 341
A Brief History of Aerial Hijackings 342
Offender Decision-Making: Rational Choice Theory 344
The Crime Situation: Routine Activities Theory 347
Examining Terrorism as a Tactic 349
Conclusion 353
Notes 354
References 355
Chapter 22 Evolution of Suicide Attacks 357
Introduction 357
Conceptual Challenges 357
Methodological Challenges 360
Culture Wars? 361
Organizations or Networks? 362
Strategic and Political Logics of Suicide Attacks 363
Individual-level Debates 364
Conclusions 365
Notes 366
References 366
Chapter 23 Terrorist Assassinations: A Criminological Perspective 371
Introduction 371
History of Assassination 372
Review of the Assassination Literature 373
Criminology Theories and Terrorism: Implications for Assassinations 375
Assassination Data 379
Future Research 383
Conclusion 384
References 384
Part VI Terrorism and other Types of Crime 389
Chapter 24 Organized Crime and Terrorism 391
Current Approaches to Understanding Crime and Terrorism 392
An Alternative Formulation of Crime–Terror Interactions 398
References 400
Chapter 25 Similar from a Distance: A Comparison of Terrorism and Hate Crime 403
Introduction 403
Definitional Properties 404
Conceptual Properties 406
Correlates and Determinants 407
Pathways Connecting Terrorism and Hate Crime 412
Conclusion 414
Notes 415
References 416
Chapter 26 Studying Extremist Homicide in the United States 420
Introduction 420
Comparative Homicide Research 421
Comparative Research on Extremist Homicide 426
Future Directions for Extremist Homicide Research 429
Conclusion 431
Notes 431
References 432
Chapter 27 Financial Terror: Financial Crime Schemes Involving Extremists Linked to the American Far Right and al-Qaeda and Affiliated Movements 438
Introduction 438
Terrorism and Financial Crime 439
Conceptualizing Financial Crime Schemes 440
Data and Methods 440
Findings and Discussion 441
Conclusion 446
Notes 447
References 448
Chapter 28 An Empirical Analysis of Maritime Terrorism Using the Global Terrorism Database 451
Prior Research on Maritime Terrorism 451
Weapons Used in Maritime Terrorism 452
GBTA 455
Applying GBTA to the Maritime Terrorist Attacks of 44 Countries 457
Case Studies of the Eight Most Active Terrorist Organizations 461
Discussion and Conclusions 463
Notes 464
References 465
Part VII Countering Terrorism 467
Chapter 29 Empowering Communities to Prevent Violent Extremism: A Report on the August 2014 National Summit 469
Background on Countering Violent Extremism 469
Background on the National Summit 470
Reporting on the Summit 471
Summit Recommendations 473
Law Enforcement–focused 473
Other Government Agency-focused 476
Community-focused 480
The Year Following the Summit 483
Notes 484
References 484
Chapter 30 Terrorist Plots the United States: What We have Really Faced, and How We Might Best Defend Against It 486
Introduction 486
Methods and Plots Coding Scheme 488
Results 491
Discussion and Conclusions 497
References 498
Chapter 31 The Ten Commandments for Effective Counterterrorism 500
First Commandment—Reduce the Opportunities for Terrorists to Attack 501
Second Commandment—Reduce Opportunities Proactively and Responsively, Combining Offensive and Defensive Measures 501
Third Commandment—Execute Proactive Offense Based on Quality, Available and Timely Intelligence, and Operational Capabilities 503
Fourth Commandment—Implement “Target Hardening” Based on a Risk Analysis for Vulnerabilities 504
Fifth Commandment—Constantly Create a Hostile Operating Environment for Terrorists through Bottleneck Passages that Generate Intelligence Footprints 505
Sixth Commandment—Conducting Drills in Order to Train Security Forces in Effective Methods of Delaying Attacks That have Already been Launched 506
Seventh Commandment—Secure, Evacuate, Restore Order, and Collect Evidence and Intelligence at an Attack Scene—Effectively and Rapidly 506
Eighth Commandment—Deploy, Equip, and Train Fast Response Teams 507
Ninth Commandment—Clearly Define the Division of Authority and Responsibility, and Practice Crucial Procedures and Inter/intra-agency Cooperation and Partnerships 508
Tenth Commandment—Educate, Communicate, and Update the Public before, during, and after a Terrorist Event 509
Conclusion 510
References 511
Chapter 32 Prosecuting Terrorism post-9/11: Impact of Policy Changes on Case Outcomes 513
Introduction 513
Impact of Changes to the Attorney General’s Guidelines 514
Impact of the USA PATRIOT Act 517
Military Commissions 521
Summary 522
References 523
Chapter 33 Prisons: Their Role in Creating and Containing Terrorists 526
Do Prisons Create Terrorists? 526
Conversion, Radicalization, and Terrorism 527
Prison Characteristics and Terrorist Outcomes 530
Theoretical and Methodological Issues 531
Confinement Policies 532
References 534
Chapter 34 The Individual Risk Assessment of Terrorism: Recent Developments 538
Backdrop: The risk assessment of terrorism 538
Risk Factors for Terrorism 539
From “Promising” Risk Factors to “Validated” Risk Factors 546
Conclusion 547
Notes 548
References 548
Chapter 35 Legislative Efforts to Prevent Eco?terrorist Attacks 553
Introduction 553
Background and the Development of Eco-Terrorism 553
Direct Action and Green Anarchism 554
Environmental and Animal Rights Movement 554
Research on Eco-terrorism 556
Disentangling the Criminal Intention of Eco-Terrorism 557
Countermeasures against Eco-terrorism in the World 558
Countermeasures against Eco-terrorism in the United States 558
Eco-terrorism-related Legislation 559
Legal Analysis on Legislation 561
Legal Analysis of Cases in the United States 564
Conclusion 565
Notes 566
References 567
Chapter 36 On the Relevance of Cyber Criminological Research in the Design of Policies and Sophisticated Security Solutions against Cyberterrorism Events 571
Introduction 571
Known-Knowns: What do We Know about Cyberterrorism? 572
Known-Unknowns: What do We Still Need to Know About Cyberterrorism? 574
Key Criminological Theories for Guiding Cyberterrorism-related Research and Policies 575
Methods for Data Collection 578
Unknown-Unknowns: What We do not Know that We do not Know about Cyberterrorism 580
Future Research/Public Policy Recommendations 581
References 582
Index 586
EULA 630
| Erscheint lt. Verlag | 29.11.2016 |
|---|---|
| Reihe/Serie | Wiley Handbooks in Criminology |
| Wiley Handbooks in Criminology | Wiley Handbooks in Criminology and Criminal Justice |
| Sprache | englisch |
| Themenwelt | Recht / Steuern ► Strafrecht ► Kriminologie |
| Sozialwissenschaften ► Politik / Verwaltung | |
| Sozialwissenschaften ► Soziologie | |
| Schlagworte | 9/11 • criminological research • Criminology • Criminology of terrorism • domestic terrorism • Global Terrorism • International Terrorism • Kriminologie • Law • Political Revolution / Violence / Terrorism • Political Science • Political violence • Politikwissenschaft • Politische Revolution, Gewalt, Terrorismus • Rechtswissenschaft • Sociology • Sociology Special Topics • Soziologie • Spezialthemen Soziologie • terrorism • terrorism research • Terrorismus |
| ISBN-10 | 1-118-92396-0 / 1118923960 |
| ISBN-13 | 978-1-118-92396-2 / 9781118923962 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Digital Rights Management: ohne DRM
Dieses eBook enthält kein DRM oder Kopierschutz. Eine Weitergabe an Dritte ist jedoch rechtlich nicht zulässig, weil Sie beim Kauf nur die Rechte an der persönlichen Nutzung erwerben.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich