Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Terrorism

Discipline
Institution
Publication
Publication Type

Articles 1 - 10 of 10

Full-Text Articles in Criminology

The Nonexceptionalism Thesis: How Post-9/11 Criminal Justice Measures Fit In Broader Criminal Justice, Francesca Laguardia Oct 2016

The Nonexceptionalism Thesis: How Post-9/11 Criminal Justice Measures Fit In Broader Criminal Justice, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Contrary to the assumption that ‘‘9/11 changed everything,’’ post-2001 criminal justice practices in the area of terrorism show a surprising consistency with pre-2001 criminal justice practices. This article relies on an analysis of over 300 terrorism prosecutions between 2001 and 2010, as well as twenty full trial transcripts, content-coding, and traditional legal analysis, to show the continuity of criminal justice over this time in regard to some of the most controversial supposed developments. This continuity belies the common assumption that current extreme policies and limitations on the due process are a panicked response to the terror attacks of 2001. On …


The Nonexceptionalism Thesis: How Post-9/11 Criminal Justice Measures Fit In Broader Criminal Justice, Francesca Laguardia Oct 2016

The Nonexceptionalism Thesis: How Post-9/11 Criminal Justice Measures Fit In Broader Criminal Justice, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Contrary to the assumption that ‘‘9/11 changed everything,’’ post-2001 criminal justice practices in the area of terrorism show a surprising consistency with pre-2001 criminal justice practices. This article relies on an analysis of over 300 terrorism prosecutions between 2001 and 2010, as well as twenty full trial transcripts, content coding, and traditional legal analysis, to show the continuity of criminal justice over this time in regard to some of the most controversial supposed developments. This continuity belies the common assumption that current extreme policies and limitations on due process are a panicked response to the terror attacks of 2001. To …


"Support For Sisters Please": Comparing The Online Roles Of Al-Qaeda Women And Their Islamic State Counterparts, Hillary Peladeau Aug 2016

"Support For Sisters Please": Comparing The Online Roles Of Al-Qaeda Women And Their Islamic State Counterparts, Hillary Peladeau

Electronic Thesis and Dissertation Repository

This study evaluates female roles in pro-jihadist terrorism by examining online content. Data was collected from 36 Twitter accounts of women associated with al-Qaeda (AQ) affiliated groups for a period of six months. The purpose for collecting this data was to: 1) compare how traditional female roles, as constructed within a jihadi-Salafist ideology, are reproduced and challenged on social media; 2) and determine the extent that AQ-affiliated women conform to roles outlined in Huey’s classification of females in pro-Islamic State (IS) Twitter networks. The results of this study reveal that women’s traditional roles in pro-jihadist activities are reproduced on Twitter. …


An Analysis Of The Sovereign Citizen Movement: Demographics And Trial Behaviors, Stephen Garrett Smith May 2016

An Analysis Of The Sovereign Citizen Movement: Demographics And Trial Behaviors, Stephen Garrett Smith

Graduate Theses and Dissertations

To date little to no empirical research has been conducted on the Sovereign Citizen Movement (SCM) and how it fits into the broader far-right domestic terrorist movement. The main focus of this study is to determine if there is a significant difference between the SCM and the far-right in their demographic composition, trial strategies, and trial behaviors and whether the SCM should be grouped together with the broader far-right during analysis. Using the American Terrorism Study (ATS), I coded 97 federal court cases involving sovereign citizen defendants (N=150) and ran basic frequencies on demographic and trial behavior variables on the …


Applying Situational Crime Prevention To Terrorism Against Airports And Aircrafts., Molly Mae Block May 2016

Applying Situational Crime Prevention To Terrorism Against Airports And Aircrafts., Molly Mae Block

Electronic Theses and Dissertations

This dissertation identifies the characteristics of terrorism against airports and aircrafts and the appropriate measures to prevent or reduce the damage of this crime. The situational crime prevention framework, incorporating routine activity theory, rational choice theory, and crime pattern theory, is used to identify techniques to reduce the opportunity for terrorism targeting airports and aircrafts. This study is a first attempt to determine which situational characteristics may be relevant in attacks specifically targeting airports or aircrafts. Data for this dissertation comes from the Global Terrorism Database and covers terrorist attacks targeting airports or aircrafts from 2002 to 2014. The sample …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman Apr 2016

Disrupt, Deny, Dismantle: A Special Operations Forces (Sof) Model For Combatting New Terrorism, Will Gunzelman

Faculty Publications and Presentations

Terrorism in the new millennium has morphed drastically since the 1970s. The terrorist organizations of today are a hybrid between the insurgent group models of the 1960s and modern terrorist organizations such as Al Qaeda. This hybrid model has created what has become a transnational insurgency recruited, trained, and led by major terrorist networks such as the Islamic State of Iraq and the Levant (ISIL). Even smaller regional groups such as Boko Haram have surpassed merely conducting terrorist attacks. These smaller groups are also focused on controlling territory. Tan (2008) refers to this change as “New Terrorism”. To combat New …


Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens Mar 2016

Terrorism Preparedness: A Law Enforcement Perspective, Cayla Comens

Theses and Dissertations

Since September 11, 2001, the environments in which law enforcement agencies operate have been changing. Contingency theory hypothesizes that an organization adapts to their environment through organizational structure and contingencies in order to accomplish a state of fit or higher performance. Utilizing the contingency theory framework, the study looked to answer two research questions: (1) Do municipal and county police agencies believe they have the necessary resources and training to prevent and or respond to the next terrorist attack? (2) How does agency size, structure, funding, and perceived risk influence terrorism preparedness? A sample of 902 county and municipal law …


The Question Of Homeland Security In Rural America, Manuel Gonzalez Jan 2016

The Question Of Homeland Security In Rural America, Manuel Gonzalez

Walden Dissertations and Doctoral Studies

Following the issuance of the National Preparedness Guidelines in 2009 by the Department of Homeland Security, it remains unknown whether homeland security programs have been consistently implemented in the nation's rural areas. Research findings have been inconsistent and inconclusive on the degree of implementation. Two problems may result from inadequate implementation of these programs: weakened national security from the failure to protect critical infrastructure in remote areas and a threat to public safety in rural towns. The purpose of this qualitative case study was to explore and describe the reasons for possible noncompliance through purposeful interviews with 10 law enforcement …


Terrorist Ideology And Behavior : An Examination Of The Behavior Of Known And Unknown Perpetrators, Rose Bellandi Jan 2016

Terrorist Ideology And Behavior : An Examination Of The Behavior Of Known And Unknown Perpetrators, Rose Bellandi

Legacy Theses & Dissertations (2009 - 2024)

The terrorist decision-making process is the key component of understanding the types of attacks terrorists execute, and the group’s ideology is the goal-orientation portion of that rational decision-making process. Terrorist group ideology determines a number of aspects of the decision-making process that expand or limit the targets groups will attack and the tactics they will use to achieve their larger ideological goals. These aspects include: a group’s long-term goals, short-term objectives, an attack’s purpose, the audience, the group’s constituency, its enemies, and its message. Terrorism is a tactic of asymmetrical warfare and a unique form of violent crime. Acts of …