Query Result Set
Skip Navigation Links
   ActiveUsers:815Hits:19990407Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
TERRORISM AND POLITICAL VIOLENCE VOL: 28 NO 4 (10) answer(s).
 
SrlItem
1
ID:   148928


Apocalypse now? a review essay of battling to the end: conversations with benoît chantre / Taylor, Max   Journal Article
Taylor, Max Journal Article
0 Rating(s) & 0 Review(s)
Key Words Apocalypse 
        Export Export
2
ID:   148922


Coerce, consent, and coax: a review of U.S. congressional efforts to improve federal counterterrorism information sharing / Peled, Alon   Journal Article
Peled, Alon Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Government Accountability Office reports and secondary sources reveal that the U.S. Congress has employed three distinct legislative approaches to address the federal counterterrorism information-sharing impasse: coerce, consent, and coax. One main example illustrates each approach: the Homeland Security Information Network project exemplifies the coerce approach; Intellipedia illustrates the consent approach; the office of the Program Manager of the Information Sharing Environment exemplifies the coax approach. Secondary examples are utilized including those of regional Fusion Centers, the Office of the Director of National Intelligence, and the National Counterterrorism Center. The merits and challenges of the three approaches are discussed and compared. The conclusion proposes ideas for using the approach most appropriate to specific counterterrorism challenges.
        Export Export
3
ID:   148925


Hidden face of jihadist internet forum management: the case of Ansar Al Mujahideen / Torres-Soriano, Manuel R   Journal Article
Torres-Soriano, Manuel R Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
Key Words Internet  Al Qaeda  Propaganda  Radicalisation  Cyber Attacks 
        Export Export
4
ID:   148930


Jihadist failure, resilience, and never-ending warfare / Celso, Anthony N   Journal Article
Celso, Anthony N Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
5
ID:   148929


Of Jihads, Jihadists, and Jihadisms / Kamolnick, Paul   Journal Article
Kamolnick, Paul Journal Article
0 Rating(s) & 0 Review(s)
Key Words Jihadists  Jihads  Jihadisms 
        Export Export
6
ID:   148924


Politics of targeted and untargeted counterterrorist regulations / Epifanio, Mariaelisa   Journal Article
Epifanio, Mariaelisa Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Civil liberties came under pressure after Al Qaeda’s attacks in the U.S. and Europe. Governments in many Organisation for Economic Co-operation and Development countries started questioning the effectiveness of counterterrorist policies and regulations. Incumbents responded to terrorism not only by introducing ex novo (or re-adapting) laws and regulations affecting a large set of civil rights; they also responded to international terrorism by choosing between an untargeted and a targeted legislative response. Some governments reduced the liberties of foreign foes more than the freedoms of citizens, while others preferred burdening all individuals within their borders, immigrants and citizens alike. This article analyzes the determinants of targeted and untargeted antiterrorist responses to Al Qaeda terrorism in a sample of 20 Western democracies from 2000 to 2008. The findings suggest that patterns of targeted legislation were more pronounced in countries governed by right-wing incumbents and those where the decisional power in the cabinet is divided among a few number of political parties. In addition, a larger share of Muslims and the degree of ethnic fractionalization played a relevant role in determining governments’ choices of prime targets.
        Export Export
7
ID:   148926


Social movement theory typology of militant organisations: contextualising terrorism / Marsden, Sarah V   Journal Article
Marsden, Sarah V Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Typologies are ubiquitous in terrorism studies, illustrating their continued appeal as a tool to further our understanding of this form of political violence. Despite this, to date, the promise of an empirically derived typology has largely been neglected. In addressing this gap, this article sets out a typology developed from Social Movement Theory. Using a novel statistical technique to derive a three-dimensional framework for categorising militant groups, the typology incorporates both organisational characteristics and the wider political context. The result is a typology defined by three conceptual constructs: political capacity, war-making capacity, and network capacity. Alongside these organisational features, imposing measures of the wider political opportunity structure reveals eight types of militant organisation. To explore the utility of the framework, a preliminary analysis interprets the typology in light of the presence of wider conflict. That a robust relationship is found between the various types and whether groups were operating in peacetime, civil war, or low-intensity conflict, goes some way to demonstrating its utility as an analytical tool. Conclusions draw attention to the importance of contextualising militant groups in their socio-political setting, and the benefits of combining theory alongside empirical analysis to develop robust characterisations of violent organisations.
        Export Export
8
ID:   148921


Surveillance and international terrorism intelligence exchange: balancing the interests of national security and individual liberty / Lowe, David   Journal Article
Lowe, David Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Using the revelations Edward Snowden passed over to the press regarding the actions of the U.S.’s National Security Agency and the UK’s Government Communications Headquarters and their use of the Prism project, this article examines the law surrounding intelligence gathering in the U.S. and UK. Underpinning the analysis is the legal principle of proportionality as applied to balancing the interests of national security and individual liberties. After examining intelligence exchange procedures, which for the UK is through negotiated agreements between national security agencies and through the European Union’s policing agency, Europol, the main part of the article discusses legal challenges that have been made regarding surveillance and the use of anti-terror laws on citizens and the rationale behind the judicial decisions made in both the U.S. and UK jurisdictions. The argument forwarded is that there is a requirement for wide preventative powers being granted to counter-terrorism agencies and that the interests of national security and individual liberty are inclusive and, as shown by the cases covered in this article, we should rely on the judiciary to perform their function in applying proportionality to each case on its own merits.
Key Words National Security  Surveillance  NSA  GCHQ  Individual Liberty 
        Export Export
9
ID:   148927


Terrorism and external audiences: influencing foreign intervention into civil wars / Butcher, Charity   Journal Article
Butcher, Charity Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article evaluates the effects of terrorism on interventions into civil wars. Considering civil wars from 1970–1999, this study analyzes how the use of terrorism as a tactic affects external interventions on behalf of opposition groups, interventions on behalf of governments, and diplomatic interventions. While some authors would suggest that groups might utilize terrorism as a tactic to gain external support, this study finds little evidence that groups are actually successful in gaining such support. In fact, terrorism that targets civilians appears to actually decrease the likelihood of military interventions on behalf of opposition groups. Furthermore, in civil wars with high numbers of terrorist attacks there is a greater likelihood of economic intervention on behalf of governments, further weakening the potential benefit for groups in utilizing terrorism as a tactic. While this is certainly a welcome finding, a consideration of five case studies of suicide terrorism (Lebanon, Sri Lanka, Iraq, India, and Turkey) provides evidence that the use of suicide terrorism within civil wars may have decreased the likelihood of external interventions on behalf of the government and of diplomatic interventions. These results are more troubling and suggest potentially grave consequences for mediating many of these conflicts.
Key Words Terrorism  Intervention  Mediation  Intrastate Conflict  Civil War 
        Export Export
10
ID:   148923


Visible counterterrorism measures in Urban spaces—fear-inducing or not? / Wandorf, Charlotte; Laisen, Jesper ; Dalgaard-Nielson, Anja   Journal Article
Wandorf, Charlotte Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Many scholars working within the tradition of critical studies are sceptical of the presence of visible security measures in urban spaces, arguing that they cause fear and facilitate the political control of citizens. A study carried out in Denmark in 2011 sought to capture, describe, and rank factors impacting positively or negatively on the feelings of safety of Danish citizens, when being in a crowded place. Surprisingly, the response to security measures like fences, cameras, and uniformed guards was positive. More visible security apparently reinforced feelings of safety. This article discusses the findings and points to, amongst others, a high level of societal trust as one possible explanation.
Key Words Counterterrorism  Fear  Trust  Citizens’ Attitudes  Visible Security 
        Export Export