Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Criminology and Criminal Justice

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


24 And The Efficacy Of Torture, Matthew D. Semel Jan 2008

24 And The Efficacy Of Torture, Matthew D. Semel

Criminal Justice Faculty Publications

In the Fox Television Network program 24 a fictional counterterrorism agent named Jack Bauer uses extreme measures, including torture, to save the United States from catastrophic terrorist attacks. Bauer uses torture even though its efficacy is in question and it is illegal. Political leaders, including President George Bush, have endorsed the use of torture and Bauer's fictional success has reinforced that the idea these methods are both necessary and effective in obtaining actionable intelligence. This paper examines existing literature on military interrogations in the context of 24 and reviews empirical and descriptive evidence about existing practices. While researchers cannot ethically …


“Bin Laden’S Brain”: The Abrasively Negativistic Personality Of Dr. Ayman Al-Zawahiri, Aubrey Immelman, Kathryn Kuhlmann Jul 2003

“Bin Laden’S Brain”: The Abrasively Negativistic Personality Of Dr. Ayman Al-Zawahiri, Aubrey Immelman, Kathryn Kuhlmann

Psychology Faculty Publications

This paper presents the results of an indirect assessment of the personality of Ayman al-Zawahiri, deputy leader of the al-Qaida terrorist network at the time of the September 11, 2001 terrorist attack on the United States and allegedly chief strategist for al-Qaida operations and personal physician to Osama bin Laden.

Al-Zawahiri’s primary personality patterns were found to be Contentious/oppositional and Dominant/controlling, with secondary features of the Dauntless/dissenting and Ambitious/self-serving patterns.

The amalgam of Contentious (negativistic, or passive-aggressive) and Dominant (aggressive, or sadistic) patterns in al-Zawahiri’s profile suggests the presence of the “abrasive negativist” syndrome. For these personalities, minor frictions easily …


The Personality Profile Of September 11 Hijack Ringleader Mohamed Atta, Aubrey Immelman Jul 2002

The Personality Profile Of September 11 Hijack Ringleader Mohamed Atta, Aubrey Immelman

Psychology Faculty Publications

This paper presents the results of a posthumous, indirect assessment of the personality of Mohamed Atta, apparent ringleader in the September 11, 2001 terror attack on the World Trade Center and the Pentagon, from the conceptual perspective of Theodore Millon.

Information concerning Mohamed Atta was collected from media reports in the one-month period following the attack and synthesized into a personality profile using the second edition of the Millon Inventory of Diagnostic Criteria (MIDC), which yields 34 normal and maladaptive personality classifications congruent with Axis II of DSM-IV.

The personality profile yielded by the MIDC was analyzed on the …


The Personality Profile Of Al-Qaida Leader Osama Bin Laden, Aubrey Immelman Jul 2002

The Personality Profile Of Al-Qaida Leader Osama Bin Laden, Aubrey Immelman

Psychology Faculty Publications

This paper presents the results of an indirect assessment of the personality of Osama bin Laden, founder and leader of the al-Qaida terrorist network responsible for the September 11, 2001 terrorist attack on the United States.

Bin Laden’s primary personality patterns were found to be Ambitious/exploitative and Dauntless/dissenting, with a secondary Distrusting/suspicious orientation, and subsidiary Dominant/controlling and Conscientious/dutiful features.

Ambitious individuals are bold, competitive, and self-assured; they easily assume leadership roles, expect others to recognize their special qualities, and often act as though entitled. Dauntless individuals are bold, courageous, and tough; minimally constrained by the norms of society; routinely engage …