Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Montclair State University (11)
- San Jose State University (6)
- College of Saint Benedict and Saint John's University (4)
- University of Arkansas, Fayetteville (4)
- Chapman University (3)
-
- Embry-Riddle Aeronautical University (3)
- Florida International University (2)
- Liberty University (2)
- Old Dominion University (2)
- Ateneo de Manila University (1)
- Brigham Young University (1)
- Columbia Law School (1)
- Edith Cowan University (1)
- Elizabethtown College (1)
- Linfield University (1)
- Pace University (1)
- Sacred Heart University (1)
- Southern Adventist University (1)
- Stephen F. Austin State University (1)
- University of Connecticut (1)
- University of Washington Tacoma (1)
- Publication Year
- Publication
-
- Department of Justice Studies Faculty Scholarship and Creative Works (9)
- Mineta Transportation Institute (6)
- Psychology Faculty Publications (4)
- Research Projects (4)
- Faculty Publications (3)
-
- FIU Electronic Theses and Dissertations (2)
- Publications (2)
- Senior Honors Theses (2)
- Ateneo School of Government Publications (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Department of Sociology Faculty Scholarship and Creative Works (1)
- English Faculty Publications (1)
- Faculty Scholarship (1)
- Honors Scholar Theses (1)
- PPPA Paper Prize (1)
- Political Science Student Papers and Posters (1)
- Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works (1)
- Research outputs pre 2011 (1)
- Sociology Faculty Articles and Research (1)
- Student Research (1)
- Student Scholar Symposium Abstracts and Posters (1)
- Student Works (1)
- Student and Faculty Research Days (1)
- VMASC Publications (1)
- WCBT Faculty Publications (1)
Articles 1 - 30 of 49
Full-Text Articles in Social and Behavioral Sciences
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
PPPA Paper Prize
The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …
The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors
The Levels And Discrepancies Of America’S Fear Of Terrorism, Kate Lindfors
Student Scholar Symposium Abstracts and Posters
Within the United States, individuals do not appear to possess an accurate understanding of terrorism and the threat it may pose to Americans. This not only creates inaccurate perceptions of the actual risk levels associated with terrorism in the U.S. but a misunderstanding of the potential sources of terrorist threats and the impact they could have on the country. In this paper, I will examine this misunderstanding of contemporary terrorism, particularly in relation to America’s inflated sense of fear and general misplacement of the threat. In order to examine this topic, I have used the Chapman University Survey on American …
Terror: The Ultimate Weapon Of Pirates, Aimee Hunt
Terror: The Ultimate Weapon Of Pirates, Aimee Hunt
Student Research
Attempting to explain the tactic of terror as 17th and 18th-century pirates' "weapon of choice," this paper covers the basics of terrorism and how Atlantic pirates used it. Through symbols such as flags, horror stories from survivors, or the savage abuse they inflicted on their captives, pirates fall easily under the description of terrorists.
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno
Counterterrorism In The Philippines: Review Of Key Issues, Ronald U. Mendoza, Rommel Jude G. Ong, Dion Lorenz L. Romano, Bernadette Chloe P. Torno
Ateneo School of Government Publications
Terrorism has taken root in almost all corners of the world with terrorist organizations thriving in both rich and poor countries. In the Philippines, the Human Security Act of 2007 came into force to address the threat of terrorism to the national security of the country. However, the law has never been fully utilized. To provide law enforcers with a stronger legal measure to address acts of terrorism in the country, President Duterte certified a new Anti-Terrorism Bill as urgent, with Congress adopting the Senate version and approving it in the shortest time possible. Despite opposition from various sectors and …
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi
FIU Electronic Theses and Dissertations
Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.
This …
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
The Culture Of Violent Talk: An Interpretive Approach, Peter Simi, Steven Windisch
The Culture Of Violent Talk: An Interpretive Approach, Peter Simi, Steven Windisch
Sociology Faculty Articles and Research
One of the defining characteristics of extremist movements is the adherence to an ideology highly antagonistic to the status quo and one that permits or explicitly promotes the use of violence to achieve stated goals and to address grievances. For members of extremist groups, talk is one of the most concrete manifestations of how adherents communicate their ideas to each other and the general public. These discussions, however, do not necessarily involve a direct correspondence between words and future behavior. To better understand the culture of violent talk, we investigate how white supremacist extremists use these discussions as a rhetorical …
How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin
How Can Presidents Properly Calibrate The Terror Threat?, Gabriel Rubin
Department of Justice Studies Faculty Scholarship and Creative Works
Presidential rhetoric has minimally changed from the narrative set by George W. Bush after the 9/11 attacks. Bush’s policies and agenda have also largely remained. This chapter provides proposals for change given the empirical and theoretical findings made in the book. The counterterrorist policy agenda needs to be narrowed and made more precise. The public needs to educate itself about the terror threat to understand that it is not a significant risk when weighed against others. Presidents need to be more careful with what words they use when describing America’s terrorist adversaries and with who they call terrorists. Recalibrating the …
Donald Trump, Twitter, And Islamophobia: The End Of Dignity In Presidential Rhetoric About Terrorism, Gabriel Rubin
Donald Trump, Twitter, And Islamophobia: The End Of Dignity In Presidential Rhetoric About Terrorism, Gabriel Rubin
Department of Justice Studies Faculty Scholarship and Creative Works
Donald Trump’s rhetoric is markedly different than that of just about every other American president. Trump’s speeches on terrorism and his related Islamophobia and anti-immigrant rhetoric are examined in this chapter. Trump’s use of Twitter and view of the presidency as a “permanent campaign” keep his followers in a state of near-permanent mobilization. Trump uses the rhetoric of fear to push his followers against Muslims and immigrants by linking terrorism to both groups. As Jeffrey Tulis opines, Trump is America’s first demagogue. This chapter highlights how Trump’s demagoguery and novel method for communicating with his followers has framed the terror …
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener
Senior Honors Theses
For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. …
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Mineta Transportation Institute
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
FIU Electronic Theses and Dissertations
This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …
“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth
“Smashing Into Crowds” -- An Analysis Of Vehicle Ramming Attacks, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute
Vehicle ramming attacks are not new. But since 2010 Jihadists have urged their use. Is this the wave of the future, or a terrorist fad? To answer this and other questions the authors expanded and updated the database used in their May 2018 MTI Security Perspective entitled An Analysis of Vehicle Ramming as a Terrorist Threat to include 184 attacks since January 1, 1970. They also reviewed literature and examined some cases in detail. This MTI Security perspective indicates that while not new, vehicle rammings are more frequent and lethal since 2014, although the number of attacks seems to be …
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Publications
This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …
Longevity Of American Terrorists: Factors Affecting Sustainability, [United States], 1980-2015 (Icpsr 37175), Brent L. Smith
Longevity Of American Terrorists: Factors Affecting Sustainability, [United States], 1980-2015 (Icpsr 37175), Brent L. Smith
Research Projects
These data are part of NACJD's Fast Track Release and are distributed as they were received from the data depositor. The files have been zipped by NACJD for release, but not checked or processed except for the removal of direct identifiers. Users should refer to the accompanying readme file for a brief description of the files available with this collection and consult the investigator if further information is needed. This study examined the longevity of individual terrorists using data from the American Terrorism Study (ATS). Using these data, researchers examined the longevity of individual terrorists in relationship to five major …
Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth
Does “See Something, Say Something” Work?, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute
Do “See Something, Say Something” programs work? The evidence strongly suggests that in the specific case of public surface transportation, the answer is “yes.” Transport staff and passengers play an important role in the prevention of terrorist attacks. By discovering and reporting suspicious objects, they have prevented more than 10 percent of all terrorist attacks on public surface transportation. Detection rates are even better in the economically advanced countries where more than 14 percent of the attempts are detected—and have been improving. This MTI Security Perspective analyzes detections since 1970 and suggests that “See Something, Say Something” campaigns are worthwhile.
The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah Minnick
The Logic Behind Suicide Terrorism And Its Connection To Islam, Sarah Minnick
Senior Honors Theses
The purpose of this thesis is to analyze suicide terrorism and to examine the logic behind it. The thesis will examine recent Islamic suicide terrorism and why it is so successful. This paper will also attempt to define suicide terrorism and explain how it functions.
The first half of this thesis reviews a short history of suicide terrorism to show the logic behind it. It will begin with the Old Testament and continue throughout history until the September 11, 2001 attacks on the World Trade Center in New York City. This thesis will discuss the motivation for terrorist organizations to …
Train Wrecks And Track Attacks: An Analysis Of Attempts By Terrorists And Other Extremists To Derail Trains Or Disrupt Rail Transportation, Brian Michael Jenkins, Bruce R. Butterworth
Train Wrecks And Track Attacks: An Analysis Of Attempts By Terrorists And Other Extremists To Derail Trains Or Disrupt Rail Transportation, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute
Attempts to sabotage rails and deliberately derail passenger trains have a long history in conventional and guerrilla warfare as well as during some particularly bitter labor disputes in the past. Since the 1970s, political fanatics have become a major adversary. Terrorists have sought to derail trains to achieve high-casualty events, while anarchists and issue oriented extremists have attacked rails to attract attention to their causes and impose economic damage. In this report, we examine the more than a thousand attempts to derail trains and to attack rail infrastructure to discern overall patterns and trends. We then look at four subsets …
An Analysis Of Vehicle Ramming As A Terrorist Threat, Brian Michael Jenkins, Bruce R. Butterworth
An Analysis Of Vehicle Ramming As A Terrorist Threat, Brian Michael Jenkins, Bruce R. Butterworth
Mineta Transportation Institute
Ramming attacks in which drivers deliberately plow their vehicles into public gatherings, pedestrians, or bicyclists, have become an increasingly common terrorist tactic. This MTI Security Perspective, by Brian Michael Jenkins and Bruce R. Butterworth analyzes 78 vehicular attacks between January 1973 and April 2018. According to their analysis, it is a growing trend, and a frightening one. The 78 attacks led to 281 deaths and around 1,200 injuries. Sixteen attacks took place between 1973 and 2007, while 62 took place between 2008 and April 2018. Thirty of these occurred in 2017 and the first four months of 2018 alone.
The Path To Terrorism: The Islamic State And Its Recruitment Strategies, Laura Turner
The Path To Terrorism: The Islamic State And Its Recruitment Strategies, Laura Turner
Honors Scholar Theses
The Islamic State, commonly known as ISIS, a terrorist organization that commits acts of such brutality that even Al Qaeda has denounced it, has recruited approximately 21,000 foreign fighters from countries all over the world. Why is this group so appealing? What has made it so effective at recruitment? What methods does it employ to recruit so many individuals? This paper seeks to answer these questions by examining the recruitment strategies of ISIS. Case studies of individual foreign fighters are analyzed to assess the strength of three explanations of ISIS’ recruitment methods that dominate the current literature: strategic targeting, online …
Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace
Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace
Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works
This paper examines the importance of the Iraqi city of Mosul to ISIL. Special attention is given to the conquering of Mosul, ISIL's governance, and the Battle of Mosul.
An Analysis Of The Changing Modus Operandi Of Terrorist Attacks In Europe, Hasan Arslan, Elizabeth Molloy
An Analysis Of The Changing Modus Operandi Of Terrorist Attacks In Europe, Hasan Arslan, Elizabeth Molloy
Student and Faculty Research Days
There is a sharp increase in both the number of incidents and the deaths caused by different types of attacks in Europe recently. The assailants claimed these attacks either on behalf of Islamic State in Iraq and Levant (ISIL) or as "lone wolves" with no direct affiliation to the ISIL. However, there has been some change in the way some of the attacks were carried out. Also, there was a shift in their target selection. Security experts and authorities have indicated significant factors contributing to this development. This paper examines the apparent alarming trend in the change of terrorist modus …
Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi
Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi
Political Science Student Papers and Posters
The threat of terrorism perceived by the American public has been shaped by a series of traumatic events over the past decade. In the years following the attacks of September 11, 2001, fear of terrorism has extended beyond the threat of terrorist groups. Much of the American public considers not only terrorist groups like al-Qaeda, but the entire religion of Islam to be a security threat. In much of this security discourse, ideas of hatred, violence, and terror have become associated with Islam. This study explores that association, and aims to identify what motivates existing stereotypes. Drawing on research from …
The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins
The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins
Mineta Transportation Institute
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness.
Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little …
Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn
Global Threats And Strategic Assessments: Al-Aqsa Martyrs' Brigade An Evolving Terrorism Force, Kaydee Penn
Student Works
The purpose of this report is to present a Foreign Terrorist Organization (FTO) designated by the Secretary of State that poses as a threat to U.S. national interests. This report contains an analysis of current research on the Al-Aqsa Martyrs' Brigade's past, present, and foreseeable status. An investigation into AAMB's past attacks is imminent to thwarting future attacks. This report will provide a method of analysis to identify gaps and trends in Al-Aqsa Martyrs' Brigade's past attacks. The findings from the analysis will pave the way for further research to benefit national security.
Sequencing Terrorists' Precursor Behaviors: A Crime Specific Analysis, Brent L. Smith, Jeff Gruenewald, Kelly R. Damphousse, Paxton Roberts, Katie Ratcliff, Brent R. Klein, Ian Brecht
Sequencing Terrorists' Precursor Behaviors: A Crime Specific Analysis, Brent L. Smith, Jeff Gruenewald, Kelly R. Damphousse, Paxton Roberts, Katie Ratcliff, Brent R. Klein, Ian Brecht
Research Projects
Recently completed research (Smith et al., 2016) suggests that radicalization toward violence is best viewed as a process – a journey that begins with a less-radical identity and moves toward a more radical identity and corresponding orientation. Efforts to test this theoretical assertion revealed that the process of identity construction involves a variety of behaviors that David Snow has referred to as “identify work” (Snow and Machalek, 1983; Snow and McAdam, 2000; Snow, 2004; Cross and Snow, 2011). One type of identity work –demonstration events – appeared to be particularly relevant to our ability to predict radicalization toward violence and …
Patterns Of Lone Actor Terrorism In The United States, Brent L. Smith, Paxton Roberts, Jeff Gruenewald, Brent R. Klein
Patterns Of Lone Actor Terrorism In The United States, Brent L. Smith, Paxton Roberts, Jeff Gruenewald, Brent R. Klein
Research Projects
This research explores the differences in geospatial and temporal patterns between lone actor and group-based terrorists in the United States. These include differences in demographics, precursor activities, proximity to the terrorism incidents, and longevity of conducting terrorist activities. Data for this analysis were derived from the American Terrorism Study (ATS). The ATS includes information on federal criminal cases resulting from FBI investigations for “terrorism or terrorism-related activities.” The analysis includes data from 264 prevented or completed terrorism incidents in the United States from 1980-present. These incidents involved 314 indictees charged with over 3,000 federal criminal counts. They were responsible for …