Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Terrorism Studies

Series

Terrorism

Institution
Publication Year
Publication

Articles 1 - 30 of 49

Full-Text Articles in Social and Behavioral Sciences

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown Apr 2023

A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown

Publications

The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …


Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell Mar 2023

Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell

PPPA Paper Prize

The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …


The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors Nov 2022

The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors

Student Scholar Symposium Abstracts and Posters

Within the United States, individuals do not appear to possess an accurate understanding of terrorism and the threat it may pose to Americans. This not only creates inaccurate perceptions of the actual risk levels associated with terrorism in the U.S. but a misunderstanding of the potential sources of terrorist threats and the impact they could have on the country. In this paper, I will examine this misunderstanding of contemporary terrorism, particularly in relation to America’s inflated sense of fear and general misplacement of the threat. In order to examine this topic, I have used the Chapman University Survey on American …


Terror: The Ultimate Weapon Of Pirates, Aimee Hunt Jan 2022

Terror: The Ultimate Weapon Of Pirates, Aimee Hunt

Student Research

Attempting to explain the tactic of terror as 17th and 18th-century pirates' "weapon of choice," this paper covers the basics of terrorism and how Atlantic pirates used it. Through symbols such as flags, horror stories from survivors, or the savage abuse they inflicted on their captives, pirates fall easily under the description of terrorists.


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno Feb 2021

Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno

Ateneo School of Government Publications

Terrorism has taken root in almost all corners of the world with terrorist organizations thriving in both rich and poor countries. In the Philippines, the Human Security Act of 2007 came into force to address the threat of terrorism to the national security of the country. However, the law has never been fully utilized. To provide law enforcers with a stronger legal measure to address acts of terrorism in the country, President Duterte certified a new Anti-Terrorism Bill as urgent, with Congress adopting the Senate version and approving it in the shortest time possible. Despite opposition from various sectors and …


The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi Jan 2021

The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi

FIU Electronic Theses and Dissertations

Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.

This …


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


The Culture Of Violent Talk: An Interpretive Approach, Peter Simi, Steven Windisch Jul 2020

The Culture Of Violent Talk: An Interpretive Approach, Peter Simi, Steven Windisch

Sociology Faculty Articles and Research

One of the defining characteristics of extremist movements is the adherence to an ideology highly antagonistic to the status quo and one that permits or explicitly promotes the use of violence to achieve stated goals and to address grievances. For members of extremist groups, talk is one of the most concrete manifestations of how adherents communicate their ideas to each other and the general public. These discussions, however, do not necessarily involve a direct correspondence between words and future behavior. To better understand the culture of violent talk, we investigate how white supremacist extremists use these discussions as a rhetorical …


How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin Mar 2020

How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin

Department of Justice Studies Faculty Scholarship and Creative Works

Presidential rhetoric has minimally changed from the narrative set by George W. Bush after the 9/11 attacks. Bush’s policies and agenda have also largely remained. This chapter provides proposals for change given the empirical and theoretical findings made in the book. The counterterrorist policy agenda needs to be narrowed and made more precise. The public needs to educate itself about the terror threat to understand that it is not a significant risk when weighed against others. Presidents need to be more careful with what words they use when describing America’s terrorist adversaries and with who they call terrorists. Recalibrating the …


Donald Trump, Twitter, And Islamophobia: The End Of Dignity In Presidential Rhetoric About Terrorism, Gabriel Rubin Mar 2020

Donald Trump, Twitter, And Islamophobia: The End Of Dignity In Presidential Rhetoric About Terrorism, Gabriel Rubin

Department of Justice Studies Faculty Scholarship and Creative Works

Donald Trump’s rhetoric is markedly different than that of just about every other American president. Trump’s speeches on terrorism and his related Islamophobia and anti-immigrant rhetoric are examined in this chapter. Trump’s use of Twitter and view of the presidency as a “permanent campaign” keep his followers in a state of near-permanent mobilization. Trump uses the rhetoric of fear to push his followers against Muslims and immigrants by linking terrorism to both groups. As Jeffrey Tulis opines, Trump is America’s first demagogue. This chapter highlights how Trump’s demagoguery and novel method for communicating with his followers has framed the terror …


A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener Jan 2020

A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener

Senior Honors Theses

For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. …


Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards Jan 2020

Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards

Mineta Transportation Institute

Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.

This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …


Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa Nov 2019

Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa

FIU Electronic Theses and Dissertations

This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …


“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth Nov 2019

“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth

Mineta Transportation Institute

Vehicle ramming attacks are not new. But since 2010 Jihadists have urged their use. Is this the wave of the future, or a terrorist fad? To answer this and other questions the authors expanded and updated the database used in their May 2018 MTI Security Perspective entitled An Analysis of Vehicle Ramming as a Terrorist Threat to include 184 attacks since January 1, 1970. They also reviewed literature and examined some cases in detail. This MTI Security perspective indicates that while not new, vehicle rammings are more frequent and lethal since 2014, although the number of attacks seems to be …


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Longevity Of American Terrorists: Factors Affecting Sustainability, [United States], 1980-2015 (Icpsr 37175), Brent L. Smith Aug 2019

Longevity Of American Terrorists: Factors Affecting Sustainability, [United States], 1980-2015 (Icpsr 37175), Brent L. Smith

Research Projects

These data are part of NACJD's Fast Track Release and are distributed as they were received from the data depositor. The files have been zipped by NACJD for release, but not checked or processed except for the removal of direct identifiers. Users should refer to the accompanying readme file for a brief description of the files available with this collection and consult the investigator if further information is needed. This study examined the longevity of individual terrorists using data from the American Terrorism Study (ATS). Using these data, researchers examined the longevity of individual terrorists in relationship to five major …


Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth Dec 2018

Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth

Mineta Transportation Institute

Do “See Something, Say Something” programs work? The evidence strongly suggests that in the specific case of public surface transportation, the answer is “yes.” Transport staff and passengers play an important role in the prevention of terrorist attacks. By discovering and reporting suspicious objects, they have prevented more than 10 percent of all terrorist attacks on public surface transportation. Detection rates are even better in the economically advanced countries where more than 14 percent of the attempts are detected—and have been improving. This MTI Security Perspective analyzes detections since 1970 and suggests that “See Something, Say Something” campaigns are worthwhile.


The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah Minnick Oct 2018

The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah Minnick

Senior Honors Theses

The purpose of this thesis is to analyze suicide terrorism and to examine the logic behind it. The thesis will examine recent Islamic suicide terrorism and why it is so successful. This paper will also attempt to define suicide terrorism and explain how it functions.

The first half of this thesis reviews a short history of suicide terrorism to show the logic behind it. It will begin with the Old Testament and continue throughout history until the September 11, 2001 attacks on the World Trade Center in New York City. This thesis will discuss the motivation for terrorist organizations to …


Train Wrecks And Track Attacks: An Analysis Of Attempts By Terrorists And Other Extremists To Derail Trains Or Disrupt Rail Transportation, Brian Michael Jenkins, Bruce R. Butterworth Jul 2018

Train Wrecks And Track Attacks: An Analysis Of Attempts By Terrorists And Other Extremists To Derail Trains Or Disrupt Rail Transportation, Brian Michael Jenkins, Bruce R. Butterworth

Mineta Transportation Institute

Attempts to sabotage rails and deliberately derail passenger trains have a long history in conventional and guerrilla warfare as well as during some particularly bitter labor disputes in the past. Since the 1970s, political fanatics have become a major adversary. Terrorists have sought to derail trains to achieve high-casualty events, while anarchists and issue oriented extremists have attacked rails to attract attention to their causes and impose economic damage. In this report, we examine the more than a thousand attempts to derail trains and to attack rail infrastructure to discern overall patterns and trends. We then look at four subsets …


An Analysis Of Vehicle Ramming As A Terrorist Threat, Brian Michael Jenkins, Bruce R. Butterworth May 2018

An Analysis Of Vehicle Ramming As A Terrorist Threat, Brian Michael Jenkins, Bruce R. Butterworth

Mineta Transportation Institute

Ramming attacks in which drivers deliberately plow their vehicles into public gatherings, pedestrians, or bicyclists, have become an increasingly common terrorist tactic. This MTI Security Perspective, by Brian Michael Jenkins and Bruce R. Butterworth analyzes 78 vehicular attacks between January 1973 and April 2018. According to their analysis, it is a growing trend, and a frightening one. The 78 attacks led to 281 deaths and around 1,200 injuries. Sixteen attacks took place between 1973 and 2007, while 62 took place between 2008 and April 2018. Thirty of these occurred in 2017 and the first four months of 2018 alone.


The Path To Terrorism: The Islamic State And Its Recruitment Strategies, Laura Turner May 2018

The Path To Terrorism: The Islamic State And Its Recruitment Strategies, Laura Turner

Honors Scholar Theses

The Islamic State, commonly known as ISIS, a terrorist organization that commits acts of such brutality that even Al Qaeda has denounced it, has recruited approximately 21,000 foreign fighters from countries all over the world. Why is this group so appealing? What has made it so effective at recruitment? What methods does it employ to recruit so many individuals? This paper seeks to answer these questions by examining the recruitment strategies of ISIS. Case studies of individual foreign fighters are analyzed to assess the strength of three explanations of ISIS’ recruitment methods that dominate the current literature: strategic targeting, online …


Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace Apr 2018

Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace

Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works

This paper examines the importance of the Iraqi city of Mosul to ISIL. Special attention is given to the conquering of Mosul, ISIL's governance, and the Battle of Mosul.


An Analysis Of The Changing Modus Operandi Of Terrorist Attacks In Europe, Hasan Arslan, Elizabeth Molloy Jan 2018

An Analysis Of The Changing Modus Operandi Of Terrorist Attacks In Europe, Hasan Arslan, Elizabeth Molloy

Student and Faculty Research Days

There is a sharp increase in both the number of incidents and the deaths caused by different types of attacks in Europe recently. The assailants claimed these attacks either on behalf of Islamic State in Iraq and Levant (ISIL) or as "lone wolves" with no direct affiliation to the ISIL. However, there has been some change in the way some of the attacks were carried out. Also, there was a shift in their target selection. Security experts and authorities have indicated significant factors contributing to this development. This paper examines the apparent alarming trend in the change of terrorist modus …


Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi May 2017

Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi

Political Science Student Papers and Posters

The threat of terrorism perceived by the American public has been shaped by a series of traumatic events over the past decade. In the years following the attacks of September 11, 2001, fear of terrorism has extended beyond the threat of terrorist groups. Much of the American public considers not only terrorist groups like al-Qaeda, but the entire religion of Islam to be a security threat. In much of this security discourse, ideas of hatred, violence, and terror have become associated with Islam. This study explores that association, and aims to identify what motivates existing stereotypes. Drawing on research from …


The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins Feb 2017

The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins

Mineta Transportation Institute

Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness.

Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little …


Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn Jun 2016

Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn

Student Works

The purpose of this report is to present a Foreign Terrorist Organization (FTO) designated by the Secretary of State that poses as a threat to U.S. national interests. This report contains an analysis of current research on the Al-Aqsa Martyrs' Brigade's past, present, and foreseeable status. An investigation into AAMB's past attacks is imminent to thwarting future attacks. This report will provide a method of analysis to identify gaps and trends in Al-Aqsa Martyrs' Brigade's past attacks. The findings from the analysis will pave the way for further research to benefit national security.


Sequencing Terrorists' Precursor Behaviors: A Crime Specific Analysis, Brent L. Smith, Jeff Gruenewald, Kelly R. Damphousse, Paxton Roberts, Katie Ratcliff, Brent R. Klein, Ian Brecht Jun 2016

Sequencing Terrorists' Precursor Behaviors: A Crime Specific Analysis, Brent L. Smith, Jeff Gruenewald, Kelly R. Damphousse, Paxton Roberts, Katie Ratcliff, Brent R. Klein, Ian Brecht

Research Projects

Recently completed research (Smith et al., 2016) suggests that radicalization toward violence is best viewed as a process – a journey that begins with a less-radical identity and moves toward a more radical identity and corresponding orientation. Efforts to test this theoretical assertion revealed that the process of identity construction involves a variety of behaviors that David Snow has referred to as “identify work” (Snow and Machalek, 1983; Snow and McAdam, 2000; Snow, 2004; Cross and Snow, 2011). One type of identity work –demonstration events – appeared to be particularly relevant to our ability to predict radicalization toward violence and …


Patterns Of Lone Actor Terrorism In The United States, Brent L. Smith, Paxton Roberts, Jeff Gruenewald, Brent R. Klein Jun 2015

Patterns Of Lone Actor Terrorism In The United States, Brent L. Smith, Paxton Roberts, Jeff Gruenewald, Brent R. Klein

Research Projects

This research explores the differences in geospatial and temporal patterns between lone actor and group-based terrorists in the United States. These include differences in demographics, precursor activities, proximity to the terrorism incidents, and longevity of conducting terrorist activities. Data for this analysis were derived from the American Terrorism Study (ATS). The ATS includes information on federal criminal cases resulting from FBI investigations for “terrorism or terrorism-related activities.” The analysis includes data from 264 prevented or completed terrorism incidents in the United States from 1980-present. These incidents involved 314 indictees charged with over 3,000 federal criminal counts. They were responsible for …