Counterterrorism and Open Source Intelligence
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
Putting Terrorism in Context: Lessons from the Global Terrorism Database
by Gary LaFree (Author), Laura Dugan (Author), Erin Miller (Author)
This book offers a guide to interpreting available statistical data on terrorism attacks around the world.
The Global Terrorism Database (GTD) now includes more than 113,000 terrorist attacks, starting in 1970. By analyzing these data, researchers demonstrate how a very small number of terrorist attacks have had an outsized effect on attitudes and policies toward terrorism. These attacks, referred to as ‘black swan’ events, are difficult to predict but have an enormous impact on human affairs for years to come. The book discusses terrorist attacks, such as 9/11, possibly the most high profile ‘black swan’ event in living memory, by putting them into context with thousands of less publicized attacks that have plagued the world since 1970.
Historically, the study of terrorism has suffered from a general lack of empirical data and statistical analysis. This is largely due to the difficulty of obtaining valid data on a topic that poses significant collection challenges. However, this book makes use of the fact that the GTD is currently the most extensive unclassified database on terrorism ever collected. While there have been summaries of the research literature on terrorism and important analyses of international terrorism event data, this is the first book that provides a comprehensive empirical overview of the nature and evolution of both modern international and domestic terrorism.
This book will be of interest to students of terrorism and political violence, criminology, international security, and political science in general.
Terrorism and Counterterrorism Studies: Comparing Theory and Practice
by Edwin Bakker
One of the defining issues of our age, terrorism frequently makes headlines as governments, private businesses, and ordinary citizens find themselves at risk or under attack. But what is the nature of this threat, and what can be done about it?
Terrorism and Counterterrorism Studies examines the essence of terrorism as an instrument to achieve certain goals and explores our difficulties in defining the very concept itself. The volume also provides an overview of current (counter)terrorism studies and discusses policy implications. The resulting recommendations will be valuable for limiting terrorism’s impact and reducing the threat to global peace, security, and stability.
The Routledge Handbook of Terrorism Research
by Alex Schmid (Editor)
This major new Handbook synthesises more than two decades of scholarly research, and provides a comprehensive overview of the field of terrorism studies.
The content of the Handbook is based on the responses to a questionnaire by nearly 100 experts from more than 20 countries as well as the specific expertise and experience of the volume editor and the various contributors. Together, they guide the reader through the voluminous literature on terrorism, and propose a new consensus definition of terrorism, based on an extensive review of existing conceptualisations. The work also features a large collection of typologies and surveys a wide range of theories of terrorism. Additional chapters survey terrorist databases and provide a guide to available resources on terrorism in libraries and on the Internet. It also includes the most comprehensive World Directory of Extremist, Terrorist and other Organizations associated with Guerrilla Warfare, Political Violence, Protest and Organized- and Cyber-Crime.
The Routledge Handbook of Terrorism Research will be an essential work of reference for students and researchers of terrorism and political violence, security studies, criminology, political science and international relations, and of great interest to policymakers and professionals in the field of counter-terrorism.
Terrorism in Cyberspace: The Next Generation
by Gabriel Weimann (Author), Bruce Hoffman (Foreword)
The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda’s leadership has been largely destroyed and its organization disrupted, terrorist attacks take 12,000 lives annually worldwide, and jihadist terrorist ideology continues to spread. How? Largely by going online and adopting a new method of organization. Terrorist structures, traditionally consisting of loose-net cells, divisions, and subgroups, are ideally suited for flourishing on the Internet through websites, e-mail, chat rooms, e-groups, forums, virtual message boards, YouTube, Google Earth, and other outlets. Terrorist websites, including social media platforms, now number close to 10,000.
This book addresses three major questions: why and how terrorism went online; what recent trends can be discerned―such as engaging children and women, promoting lone wolf attacks, and using social media; and what future threats can be expected, along with how they can be reduced or countered. To answer these questions, Terrorism in Cyberspace analyzes content from more than 9,800 terrorist websites, and Weimann, who has been studying terrorism online since 1998, selects the most important kinds of web activity, describes their background and history, and surveys their content in terms of kind and intensity, the groups and prominent individuals involved, and effects. He highlights cyberterrorism against financial, governmental, and engineering infrastructure; efforts to monitor, manipulate, and disrupt terrorists’ online efforts; and threats to civil liberties posed by ill-directed efforts to suppress terrorists’ online activities as future, worrisome trends.
Political Analysis Using R
by James E. Monogan III (Author)
This book provides a narrative of how R can be useful in the analysis of public administration, public policy, and political science data specifically, in addition to the social sciences more broadly. It can serve as a textbook and reference manual for students and independent researchers who wish to use R for the first time or broaden their skill set with the program. While the book uses data drawn from political science, public administration, and policy analyses, it is written so that students and researchers in other fields should find it accessible and useful as well. By the end of the first seven chapters, an entry-level user should be well acquainted with how to use R as a traditional econometric software program. The remaining four chapters will begin to introduce the user to advanced techniques that R offers but many other programs do not make available such as how to use contributed libraries or write programs in R. The book details how to perform nearly every task routinely associated with statistical modeling: descriptive statistics, basic inferences, estimating common models, and conducting regression diagnostics. For the intermediate or advanced reader, the book aims to open up the wide array of sophisticated methods options that R makes freely available. It illustrates how user-created libraries can be installed and used in real data analysis, focusing on a handful of libraries that have been particularly prominent in political science. The last two chapters illustrate how the user can conduct linear algebra in R and create simple programs. A key point in these chapters will be that such actions are substantially easier in R than in many other programs, so advanced techniques are more accessible in R, which will appeal to scholars and policy researchers who already conduct extensive data analysis. Additionally, the book should draw the attention of students and teachers of quantitative methods in the political disciplines.