1-18 of 18 Results

  • Keyword: counterterrorism x
Clear all

Chapter

Martin Innes and Helen Innes

This chapter looks into the work of counterterrorism agencies. It also lists the key roles and responsibilities of military, intelligence, and criminal justice agencies alongside the policy frameworks that shape and structure counterterrorism interventions. The demands of political actors are supplied by counterterrorism strategies. Large-scale, multi-faceted government counterterrorism policies strive to manage the risk, stop support for terrorist motivations, and protect citizens and economic interests. Mapping the changes in the organization of counter-terrorism highlighted how issues of transparency, oversight, and accountability have become increasingly significant. The chapter then examines the ethical and practical dilemmas of counterterrorism that have to be navigated and negotiated.

Chapter

Sondre Lindahl and Richard Jackson

This chapter explores non-violent responses to terrorism. It notes the main failures and limitations of violent or force-based counterterrorism, before examining alternative non-violent approaches used to reduce the incidence of terrorism and transform violent conflict into political conflict. The most common alternative approach in an effort of conflict resolution and promoting a political settlement is the use of dialogue and negotiations. The chapter also discusses the literature on suggestions and guidance for further developing approaches to non-violent counterterrorism such as non-violent resistance, unarmed peacekeeping, non-warring communities, and social defence. Sondre Lindahl's critical theory of counterterrorism is based on principles such as needing to treat terrorism as a political phenomenon and aiming for more than the elimination of terrorists.

Chapter

Christian Kaunert and Ori Wertman

This chapter outlines the role of international organizations in battling terrorism. Cross-border cooperation became vital when transnational and global terrorist threats increased. Additionally, the range of legal powers between different international organizations is substantial. The chapter then looks at the counterterrorism efforts, challenges, and success within the United Nations (UN), Association of Southeast Nations (ASEAN), European Union (EU), and the North-Atlantic Treaty Organisation (NATO). It then notes the modalities of counterterrorism cooperation amongst international organizations. The European Court of Justice has shown its willingness to prioritize European interests over global interests, the chapter argues. Meanwhile, NATO-EU counter-terrorism cooperation has mainly improved with respect to areas such as maritime security and cybersecurity.

Chapter

This chapter examines two types of irregular warfare: terrorism and insurgency. It first considers the problematic definitions given to irregular warfare, terrorism and insurgency before discussing the theory and practice of irregular warfare. In particular, it highlights the role of time, space, legitimacy, and/or support in insurgent and terrorist campaigns. It then analyses counterinsurgency and counterterrorism in theory and practice, focusing on three important elements of successful campaigns against insurgents and terrorists, namely, location, isolation, and eradication. It also explores contemporary and future irregular threats and how they are driven by a combination of culture, religious fanaticism, and technology. Finally, it comments on the role to be played by information technology in irregular wars of the future, which some observers expect to be fought in cyberspace.

Chapter

Roger Z. George

This chapter examines the role of intelligence in the development and execution of strategy. It begins with a discussion of what intelligence is all about and how its utility has been viewed by strategists. In particular, it considers the different components of the ‘intelligence cycle’, namely, intelligence collection, intelligence analysis, and special intelligence missions that rest on effective counterintelligence and counterespionage. It then charts the history of US intelligence, from its use to support cold war strategies of containment and deterrence to its more recent support to US strategies for counterterrorism and counterinsurgency. It also reviews the challenges and causes of ‘strategic surprise’, citing a number of historical cases such as the September 11 terrorist attacks. The chapter concludes with an assessment of how the US intelligence community has performed since reforms were made in response to 9/11 and its focus on new threats posed by cyberwar and cyber-attacks.

Chapter

This chapter examines two types of irregular warfare: terrorism and insurgency. It first considers the problematic definitions given to irregular warfare, terrorism, and insurgency before discussing the theory and practice of irregular warfare. In particular, it highlights the role of time, space, legitimacy, and/or support in insurgent and terrorist campaigns. It then analyses counterinsurgency and counterterrorism in theory and practice, focusing on three important elements of successful campaigns against insurgents and terrorists, namely, location, isolation, and eradication. It also explores contemporary and future irregular threats and how they are driven by a combination of culture, religious fanaticism, and technology. Finally, it comments on the role to be played by information technology in irregular wars of the future, which some observers expect to be fought in cyberspace.

Chapter

Roger Z. George

This chapter examines the role of intelligence in the development and execution of strategy. It begins with a discussion of what intelligence is all about and how its utility has been viewed by strategists. In particular, it considers the different components of the ‘intelligence cycle’, namely, intelligence collection, intelligence analysis, and special intelligence missions that rest on effective counterintelligence and counterespionage. It then charts the history of US intelligence, from its use to support cold war strategies of containment and deterrence to its more recent support to US strategies for counterterrorism and counterinsurgency. It also reviews the challenges and causes of ‘strategic surprise’, citing a number of historical cases such as the September 11 terrorist attacks. The chapter concludes with an assessment of how the US intelligence community has performed since reforms were made in response to 9/11 and its focus on new threats posed by cyberwar and cyberattacks.

Chapter

Mai’a K. Davis Cross

The rise of international terrorism has made domestic security a high-profile issue in Europe. This chapter first provides an overview of the European experience of terrorism, and discusses how European governments have responded to terrorist threats. The focus then shifts to the EU level, as increasingly this is where the most significant developments are taking place in the field of security and counter-terrorism. The chapter delves into the development of the EU’s counter-terrorism policy, within the context of an increasingly stronger European approach to security more generally. Particular attention is paid to the impact of the ISIS-inspired attacks that took place between 2015 and 2017, including the effect they had on national politics.

Chapter

This chapter looks into the rationality of terrorism. It starts off by looking into the paradox of terrorism. Political scientists typically view terrorists as rational political actors. However, empirical research on terrorism suggests that terrorism is in fact an ineffective political tactic. Evidence indicates that in instances where there has been terrorist attacks on civilians, governments rarely grant concessions. This might explain why terrorism is often selected as a tactic only if alternative options are no longer viable. The chapter uses Al-Qaeda and the Islamic State as case studies to examine broader patterns of terrorism. Knowing the priority of terrorists is vital for governments when considering counterterrorism actions. Having an understanding of the grievances of terrorists helps political actors predict which targets the terrorists will attack.

Chapter

This chapter cites how counterterrorism policies and operations have impacted human rights in liberal democracies. It highlights how detention without trial, torture, and extra-judicial killings impact negatively human rights. Human rights are defined as the fundamental moral rights of a person necessary for a life with human dignity. Additionally, counterterrorism, in the chapter, refers to policies formulated and actions taken to reduce, mitigate, or prevent terrorism. The chapter presents key factors and mechanisms at play through case studies of Northern Ireland in the 1970s and the United States ‘war’ against jihadist terrorism. It also looks at theories of international relations as they relate to how human rights impacts policies for counterterrorism.

Chapter

This chapter explains how foreign policies intersect and interact with terrorism and counterterrorism. It considers core instruments of foreign policy and methods for countering terrorism. Examples include diplomacy and culture, economic statecraft, and the military. There is some evidence suggesting the use of military pressure can be quite effective in achieving specific policy objectives. However, the chapter also emphasizes how an interrelationship and interdependence between foreign policies and counterterrorism could hinder the fight against terrorism. The sub-divisions of countering terrorism are anti-terrorism, counter-terrorism, and consequence management. States must include compromise elements in their foreign policy in their direct dealings with other governments when it comes to countering terrorism.

Chapter

This chapter presents an overview of how to prevent and counter violent extremism programmes (P/CVE). It highlights issues on evaluation and quality standards, staff training, gender-specific P/CVE, evidence-based methods, and solid theories of change. The chapter differentiates Eastern and Western P/CVE. It shows how ideological discourse was dominant in the West, while civil society partners and non-ideological components became the main area of consideration in the East. P/CVE became the cornerstone of numerous counterterrorism strategies, but it still needs to be flexible and adaptable to needs. The chapter also recognises how prisons can turn into hotbeds of violent radicalization, and targeted assassinations of terrorists can turn them into martyrs.

Chapter

Audrey Kurth Cronin

This chapter examines the end of terrorist campaigns. Thinking about how terrorism ends is the best way to use a group's weaknesses against it. Based on studies of hundreds of cases, it has been shown that terrorist campaigns end following six classic patterns. These are capturing or killing the leader, negotiations, achievement of the objective, failure, state repression, and reorientation to another type of violence. Without long-term thinking, counterterrorism gets caught in the action–reaction dynamic of terrorist campaigns. After all, reactive, tactical counterterrorism prolongs the struggle and extends terrorist campaigns, sweeping up outraged policymakers and public members. The chapter also references Al-Qaeda and ISIS as case studies.

Chapter

This chapter assesses the question of ‘security for what purpose?’ in asymmetric conflicts where rival political-military organizations, typically a government and a clandestine group, compete to institute and enforce a socio-political order. Terrorism and the asymmetric use of violence are often understood to pose specific kinds of security challenges that distinguish them from other forms of political violence like war. The chapter highlights why parties to these conflicts often come to threaten individuals—be it through indiscriminate repression or clandestine political violence. It also shows that the protagonists of such conflicts generally seek to define security in terms of the stability of their own socio-political order, thus potentially increasing levels of violence. It is in the context of such conflicts that the chapter discusses the concepts of terrorism and counterterrorism.

Chapter

Brenda Lutz and James Lutz

This chapter examines the global threat posed by terrorism. Efforts to deal with terrorism can be considered within the framework of terrorism as warfare, terrorism as crime, and terrorism as disease. Which of these views is adopted often plays a role in determining what kinds of measures to use to counter terrorism. Terrorism is a technique of action available to many different groups; security measures that work with one group may not be effective with others. As a consequence, dealing with terrorism in today’s world can be a very complex process. The chapter first discusses concepts and definitions relating to terrorism before describing various types and causes of terrorism. It also analyses counterterrorism measures within the scope of prevention, response to attacks, international collaboration, and the effects of security. Three case studies involving the Palestinian Liberation Organization, the Ku Klux Klan, and the Irish Republican Army are presented.

Chapter

This chapter examines the external dimension of the European Union's internal security, with particular emphasis on the Justice and Home Affairs that has evolved from a side product of European economic integration to a complex and dynamic policy area. It begins with a discussion of the internal process of constructing both the EU's Area of Freedom, Security, and Justice (AFSJ) and its external dimension, along with the normative, national, institutional, policy, and legal challenges that have emerged from this process. It then considers the policy dynamism and institutional developments that have taken place since the Treaty of Lisbon before proceeding with an assessment of how the EU copes with the global security challenges of counterterrorism, migration, refugees, and cybercriminality. It also explores how the EU pursues its security policy within the international arena and the effect it has at the global level.

Chapter

Brenda Lutz and James Lutz

This chapter examines the global threat posed by terrorism. Efforts to deal with terrorism can be considered within the framework of terrorism as warfare, terrorism as crime, and terrorism as disease. Which of these views is adopted often plays a role in determining what kinds of measures to use to counter terrorism. Terrorism is a technique of action available to many different groups; security measures that work with one group may not be effective with others. As a consequence, dealing with terrorism in today’s world can be a very complex process. The chapter first discusses concepts and definitions relating to terrorism before describing various types and causes of terrorism. It also analyses counterterrorism measures within the scope of prevention, response to attacks, international collaboration, and the effects of security. Three case studies involving the Palestinian Liberation Organization, the Ku Klux Klan, and the Irish Republican Army are presented.

Book

Edited by Diego Muro and Tim Wilson

Contemporary Terrorism Studies is made up of three parts. Part One looks at the state of terrorism studies. Chapters here ask first, what are terrorism studies? These chapters also look at critical terrorism studies and conceptualizations of terrorism. The second part is about issues and debates in terrorism studies. This part starts off with an overview of the history of terrorism. It asks what the root causes of terrorism are and whether terrorism can ever be rational. Chapters here also look into old and new terrorism and social media and terrorism. To conclude this part, the last chapter here asks whether terrorism is effective. The third part of the book covers countering terrorism. Here, counterterrorism agencies are examined. Issues such as human rights, foreign policy, and international terrorism are covered. The chapters in this part also seek ways to prevent and counter violent extremism. They also consider victims of terrorism. The book concludes with an analysis of the end of terrorist campaigns.