Authors: Jonathan R. White
ISBN-13: 9780534624484, ISBN-10: 0534624480
Format: Hardcover
Publisher: Cengage Learning
Date Published: January 2008
Edition: 6th Edition
Jonathan R. Whitea national expert on the topic of terrorismis executive director of the Homeland Security Initiative. Immediately prior to that appointment, Dr. White served as dean of Social Sciences at Grand Valley State University. He has instructed on terrorism, militarism, criminology, police administration, philosophy, and justice in Western civilization. Since 1998, he has worked as an adjunct instructor with the State and Local Anti-Terrorism Training (SLATT) Program. A recognized expert on Middle Eastern extremism, Dr. White used his knowledge to develop and strengthen the SLATT program on international terrorism.
Written for criminal justice students, this textbook explains the origins and types of modern terrorism, outlines the structure and spread of Jihadist networks, and examines the role of law enforcement, intelligence, and bureaucracy in homeland security. Previously published as Terrorism: an introduction, the fifth edition reduces the material on outdated terrorist groups in favor of active ones. Annotation ©2005 Book News, Inc., Portland, OR
Preface | ||
Part 1 | The Criminology and Controversy of Terrorism | 1 |
Chapter 1 | Definitions, Tactics, and Behavior | 2 |
Why Definitions Are Important | 3 | |
Definitions of Terrorism | 4 | |
The Meaning of the War on Terrorism | 7 | |
The Tactics of Terrorism | 9 | |
How Terrorist Groups Justify Behavior | 10 | |
Warrior Dreams | 12 | |
Terrorist Profiles: Three Views | 12 | |
Summary of Main Points | 15 | |
Key Terms | 15 | |
Suggested Readings | 15 | |
Web Resources | 16 | |
Chapter 2 | The Origins of Modern Terrorism | 17 |
Modern Democracies and the Birth of Terrorism in the West | 18 | |
Terrorism and the Anarchists | 19 | |
Terrorism and the Russian Revolution | 22 | |
Nationalistic Revolutionaries | 23 | |
Irish History and the Growth of Modern Terrorism | 24 | |
The Influence of Past Experience | 26 | |
Summary of Main Points | 27 | |
Key Terms | 28 | |
Suggested Readings | 28 | |
Web Resources | 28 | |
Chapter 3 | Changing Group Structures and the Metamorphosis of Terrorism | 30 |
Trying to Walk the Walk | 31 | |
Group Size and Campaign Length | 32 | |
Group Size Is Important | 33 | |
Creating Terrorist Organizations | 35 | |
New Models for a New Day | 38 | |
The Problems of Managing Organizations | 40 | |
The Individual: The Ultimate Small Group | 43 | |
Summary of Main Points | 45 | |
Key Terms | 46 | |
Suggested Readings | 46 | |
Web Resources | 46 | |
Chapter 4 | The Advent of Religious Terrorism | 48 |
Analysis of Religious Terrorism | 49 | |
The Social Characteristics of Terrorists: Juergensmeyer's Terror in God's Mind | 51 | |
Religions That Kill: Stern's Terror in God's Mind | 52 | |
The Logic of Religious Terrorism | 54 | |
Huntington's Clash of Civilizations and Esposito's Response | 56 | |
Role of Eschatology | 59 | |
Two Views of Islam and Terrorism | 60 | |
Summary of Main Points | 62 | |
Key Terms | 63 | |
Suggested Readings | 63 | |
Web Resources | 64 | |
Chapter 5 | Financing Terrorism | 65 |
The Importance of Funding | 66 | |
Crime Pays | 68 | |
A Macroeconomic Theory of the New Terrorist Economy | 73 | |
The Narcoterrorism Debate | 76 | |
Narcoterrorism: Another View | 78 | |
Summary of Main Points | 79 | |
Key Terms | 80 | |
Suggested Readings | 80 | |
Web Resources | 80 | |
Chapter 6 | Types of Modern Terrorism | 82 |
Cyberterrorism | 83 | |
Suicide Terrorism | 86 | |
Weapons of Mass Destruction: Biological Agents | 90 | |
Weapons of Mass Destruction: Chemical and Radiological Agents | 94 | |
Summary of Main Points | 96 | |
Key Terms | 97 | |
Suggested Readings | 97 | |
Web Resources | 97 | |
Part 2 | International Terrorism | 99 |
Chapter 7 | The Evolution of Jihadist Networks | 100 |
Religion and Militant Religion | 101 | |
The Origins of the Jihadist Networks | 103 | |
Jihad Continues in Afghanistan | 107 | |
The Rise of Osama bin Laden | 108 | |
Declaring War on the United States | 111 | |
Summary of Main Points | 119 | |
Key Terms | 119 | |
Suggested Readings | 119 | |
Web Resources | 120 | |
Chapter 8 | The Umbrella Effect | 121 |
Jihad Moves to Central and Southeast Asia | 122 | |
Sunni Jihad from Africa to the West | 128 | |
The Metamorphosis of Hezbollah | 130 | |
The Current State of Hezbollah | 136 | |
A Sympathetic View of Hezbollah | 137 | |
A Critical View of Hezbollah | 139 | |
Summary of Main Points | 140 | |
Key Terms | 141 | |
Suggested Reading | 141 | |
Web Resources | 142 | |
Chapter 9 | The Question of Israel and Palestine | 143 |
The Origins of the Conflict | 144 | |
Palestinian Violence Expands | 151 | |
The PLO and the Changing Face of Middle Eastern Terrorism | 152 | |
Intifadas and Religious Revival | 154 | |
Summary of Main Points | 156 | |
Key Terms | 157 | |
Suggested Readings | 157 | |
Web Resources | 157 | |
Chapter 10 | Middle Eastern Terrorism in Metamorphosis | 159 |
The Palestinian Islamic Jihad | 160 | |
Hamas | 163 | |
The Al Aqsa Martyrs Brigades | 167 | |
Jewish Fundamentalist Groups in Israel and Palestine | 172 | |
Controversial Counterterrorist Policies | 174 | |
Summary of Main Points | 176 | |
Key Terms | 176 | |
Suggested Readings | 176 | |
Web Resources | 177 | |
Chapter 11 | Nationalistic and Ethnic Terrorism | 178 |
The Logic of Ethnic Terrorism | 179 | |
The Basque Nation and Liberty | 182 | |
The PPK and Its Alter Egos | 185 | |
The Liberation Tigers of Tamil Eelam | 189 | |
The Origins and Development of the Anglo-Irish Conflict | 193 | |
The Early History of the Irish Republican Army | 196 | |
The 1916 Easter Rebellion | 197 | |
Independence and Separation | 198 | |
Trends in the IRA: 1930-1985 | 200 | |
The Peace Accord and Peace Process in Ireland | 203 | |
Summary of Main Points | 204 | |
Key Terms | 205 | |
Suggested Readings | 205 | |
Web Resources | 205 | |
Chapter 12 | Ideological Terrorism | 207 |
The Status of Ideological Terrorism | 208 | |
Ideology and Marighella's Urban Model | 211 | |
The Demise of Left-Wing Ideology in Europe | 216 | |
Iraq Insurgency: Guerrillas or Terrorists, Ethnic or Ideological? | 219 | |
Summary of Main Points | 222 | |
Key Terms | 222 | |
Suggested Readings | 222 | |
Web Resources | 223 | |
Part 3 | Domestic Terrorism | 225 |
Chapter 13 | Conceptualizing Terrorism in America | 226 |
Early Studies of Domestic Terrorism | 227 | |
The Problem of Conceptualizing Terrorism in the United States | 229 | |
Classifying Terrorism in Criminal Justice | 231 | |
Smith's Analysis of Domestic Terrorism | 234 | |
Steven Emerson's View of Jihad and His Critics | 238 | |
Summary of Main Points | 242 | |
Key Terms | 242 | |
Suggested Readings | 242 | |
Web Resources | 243 | |
Chapter 14 | Terrorism in the United States | 244 |
Nationalistic Separatism: The Case of Puerto Rico | 245 | |
The Development of Right-Wing Violence | 246 | |
Contemporary Right-Wing Behavior, Beliefs, and Tactics | 249 | |
Conspiracies, Militias, and the Call to Arms | 252 | |
Pierce's Blueprint for Revolution | 255 | |
The Decline of the Left | 256 | |
Ecoterrorism, Animal Rights, and Genetic Engineering | 257 | |
Antiabortion Violence | 259 | |
Black Hebrew Israelism: An Apocalyptic Single Issue | 261 | |
Summary of Main Points | 263 | |
Key Terms | 263 | |
Suggested Readings | 264 | |
Web Resources | 264 | |
Part 4 | Issues in Homeland Security | 267 |
Chapter 15 | In Search of Homeland Security | 268 |
Defining Homeland Security | 269 | |
Clausewitz, Sun Tzu, and Views of War | 271 | |
Pearl Harbor and 9-11: Two Different Worlds | 274 | |
Redefining Conflict, Defense, and Intelligence | 275 | |
The Role of Symbols and Structures | 277 | |
Law Enforcement's Special Role | 278 | |
Building Intelligence Systems | 280 | |
Planning for Homeland Security | 284 | |
Creating a Culture of Information Sharing | 285 | |
Summary of Main Points | 288 | |
Key Terms | 289 | |
Suggested Readings | 289 | |
Web Resources | 289 | |
Chapter 16 | Protecting the Homeland and Protecting Civil Liberties | 291 |
Defense in Depth: Why Civil Liberties Interact with Civil Defense | 292 | |
The USA Patriot Act | 293 | |
Title II and the Debate about Intelligence Gathering | 296 | |
The Case for Increasing Executive Powers in the Face of Terrorism | 299 | |
The Case against Increasing Executive Powers in the Face of Terrorism | 302 | |
The Debate Concerning Intelligence Gathering | 303 | |
Militarization and Police Work | 306 | |
Summary of Main Points | 308 | |
Key Terms | 308 | |
Suggested Readings | 308 | |
Web Resources | 309 | |
Chapter 17 | The Bureaucracy of Homeland Security | 310 |
Bureaucracy: The Weberian Ideal | 311 | |
The Role of Law Enforcement and Intelligence | 313 | |
Protecting the Borders | 315 | |
Infrastructure Protection | 317 | |
DHS, Security, and Police Work | 319 | |
Possible Approaches for Homeland Security Bureaucracies | 321 | |
Bureaucratic Inhibitors | 322 | |
Stephen Flynn's Critique of the Ideal | 325 | |
Summary of Main Points | 327 | |
Key Terms | 327 | |
Suggested Readings | 327 | |
Web Resources | 328 | |
Chapter 18 | The Media: Affecting Terrorism and Homeland Security | 329 |
Television and Terrorism: A Cozy Relationship | 330 | |
The Media as a Force Multiplier | 334 | |
Security Forces vs. Reporters | 337 | |
Does Reporting Make Terrorism Contagious? | 341 | |
Censorship Debates | 343 | |
Summary of Main Points | 345 | |
Key Terms | 346 | |
Suggested Readings | 346 | |
Web Resources | 346 | |
Glossary | 349 | |
Bibliography | 364 | |
Index | 384 |