首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 25 毫秒
1.

This article argues that the breakdown of hierarchical structures in illicit organizations is creating new opportunities for criminals and terrorists to collaborate. The rise of networked organizations has given greater independence to criminals and terrorists who previously answered to a clear chain of command. These members are now willing to engage in operations that before had been off-limits because the leadership believed the activity would hurt the organization's broader mandate. The result is that a “leaderless nexus” is beginning to emerge between criminals and terrorists. The phenomenon has far-reaching and dangerous implications for U.S. security, and should be thoughtfully considered as lawmakers debate homeland security reform.  相似文献   

2.
Although the psychology of terrorism is far from a neglected subject, there is still much to learn. “Ordinary” criminals remain enigmatic but have proved a far more accessible population for research purposes. This article bridges the gap between the study of crime and contemporary terrorism by examining the parallels between the two. Significant similarities are shown to exist between terrorists and organized as well as low-level criminals, including activities performed and systems of social influence and organization. Processes of social identification are universally important to varying degrees; however, specific differences in identity may represent key distinguishing features between groups. Although further comparisons utilizing more restrictive samples are necessary, attention is drawn to the sometimes underutilized potential that criminological research holds to act as a point of reference for the investigation of terrorism.  相似文献   

3.
Abstract

Knowledge of certain dilemmas faced by terrorists may serve to narrow the options available to the opposing parties and aid in varying government response to terrorist acts. Such dilemmas are the identification with violence, the problem of attacking or seeking a negotiated incident, choice of level of terror, maintenance of one's objectivity within a group characterized by conformity, and retaining one's identity as a historic victim.  相似文献   

4.
Since the 1970s, many researchers have proposed typologies to sort the phenomenon of terror into different categories and to divide terror organizations into groups based on various characteristics of their activities. These typologies were designed to facilitate understanding of the phenomenon of terror and of terror organizations’ processes, structures and operative methods. They relied on a variety of diagnostic criteria such as: motives for using terror, targets of the attacks, terrorists’ demands, organizational structure; arenas of operation; and more. This article surveys major typologies of terror, notes the differences between them, presents a model to combine the different classifications of the typologies into a single typology, and proposes a new typology that sorts terror organizations by the variables that limit their activities. The proposed typology makes it possible to analyze terror organizations’ behavior and even to forecast their reactions to a situation in which they are attacked by the enemy state—the boomerang effect.  相似文献   

5.
An analysis of three years of suicide bombing data in Israel reveals an increase in such attacks through March 2002 followed by a steep decline through the end of 2003. The authors propose a terror-stock model that treats the suicide bombing attack rate as a function of the number of terrorists available to plan and execute suicide bombings. The intent of Israeli tactics such as targeted killings and preemptive arrests is to reduce the capacity of terror organizations to commit attacks. When fit to the data, this model suggests that the targeted killing of terror suspects sparks estimated recruitment to the terror stock that increases rather than decreases the rate of suicide bombings. Surprisingly, only the deaths of suspected terrorists, and not Palestinian civilians, are associated with such estimated recruitment. Although Israeli actions have reduced the rate of suicide bombings over time, it is preventive arrests rather than targeted killings that seem more responsible for this outcome.  相似文献   

6.
Female suicide terrorists do not differ significantly from their male counterparts in terms of individual motivations. Although societal oppression may play a minor role in their self-recruitment to terror organizations women do not bomb themselves primarily to drive a feminist cause. Instead they act out of motivations inside conflict zones of trauma, revenge, nationalism, expression of community outrage and in non-conflict zones feelings of alienation, marginalization, negative self-identity, and a desire to act on behalf of those inside conflict zones. Groups find it to their advantage to use female bombers as they receive more media attention, increased sympathy for the terrorist cause, are able to pass security measures more easily than men, and are more dispensable because they are rarely in leadership positions.  相似文献   

7.
A fundamental shift has occurred in the relationship between the state and the individual regarding financial privacy. The onus is now on citizens to show why governments should not have access to their personal financial information, rather than governments having to show why they should. This article argues that this shift has come about in large part because of the activities of autonomous and influential transnational networks of regulators. These regulatory networks have systematically favoured administrative efficiency and transparency at the expense of privacy in designing responses to financial crimes. Evidence is drawn from an examination of recent policy developments in countering tax evasion, money laundering, and the financing of terrorism. Currently, the principle of financial transparency suggests that financial privacy inhibits the fight against criminals and terrorists; by extension, asserting a right to privacy indicates some kind of roguery afoot.  相似文献   

8.
This commentary examines the issue of global jihadist recidivism and identifies it as a potential long-term international counterterrorism concern. Although there are no comprehensive and accurate statistics on global jihadist recidivism, there is sufficient anecdotal evidence that suggests that the tendency for released imprisoned global jihadist terrorists is to return to terrorist activity. It is important to understand that arresting, indicting, and sentencing a captured global jihadist terrorist is not the end of the counterterrorism skirmish. In fact, the next stages of incarceration and reformation are more crucial to the endgame. The problem of global jihadist recidivism is at the core a manpower issue. Prisons have always been an important front for all types of terrorist groups. Recidivism or the failure of prison rehabilitation programs is simply one component of this front. Terrorist groups do not want their imprisoned members to reform and resign from the organization. Further research needs to be conducted on the recidivism rate for terrorists and whether religious terrorists would have a higher rate than secular ones. The academic, think tank, and U.S. government communities need to examine this issue to determine if it is a long-term international counterterrorism problem. The author believes it will be.  相似文献   

9.
Abstract

The terrorists who have ravaged Italy over the past several years are not totally faceless. The names and backgrounds of many are well known, as are their habitual modes of operations and the ideologies by which they are moved. After a brief catalog of the terrorists’ actions, the article outlines the physiognomy of Italy's major terrorist groups. A substantial part of this consists of a list of each group's victims, since any assessment of the terrorist groups’ effects must begin with an awareness of which sectors of Italian society have been struck. The backgrounds of the terrorists, the political language they speak, and the list of their victims point unambiguously to the conclusion that terrorism in Italy is overwhelmingly a phenomenon of the Left and that it conceives of itself as a means of bringing about a Communist regime. The terrorists regard themselves as the competitors and reformers of the Italian Communist party. But at the same time they have made good their claim as the mortal enemies of the enemies of the Communist party. The question regarding the Italian terrorists’ international connections cannot be answered definitively. Such evidence as exists, however, suggests that today's self‐declared Communist terrorists may be acting in ways similar to their predecessors of the 1940s and early 1950s, who found safe haven in the Communist regimes of Eastern Europe.  相似文献   

10.
The study examines the effect of female suicide attacks on foreign media framing of conflicts. Examining the Palestinian–Israeli conflict, 2,731 articles were sampled that covered terrorist events (American, British, and Indian press); 625 appeared in the week following a female's suicide attack, 97 reported an attack by a female perpetrator. The findings suggest that foreign media discourse around female suicide bombers promotes more messages about the society within which the terrorists are embedded. Since the coverage of female terrorists tends to provide more detailed information about the perpetrator, it focuses more on the terror organizations’ side of the conflict's story.  相似文献   

11.
12.
Abstract

The Department of State's counterterrorism coordinator discusses current patterns in international terrorism and cites three areas of growing concern: radical Palestinian terrorist groups, Libyan supported terrorism, and narcoterrorism in the Andean nations. He explains U.S. Government counterterrorism policy and assesses its effectiveness. The recent trend toward treating terrorists as criminals and applying the rule of law against them is examined. He also emphasizes the importance of pressuring countries that sponsor terrorism and of refusing to make deals with terrorists.  相似文献   

13.
The recent collapse of some states, the proliferation of internal wars and of localized political authorities, so‐called ‘warlords’, challenges the homogeneity of the international system of states at its margins. These new fragmented authorities often rely upon commercial deals with outsiders to consolidate their power. This threatens officials in strong states who depend upon organized states everywhere to control their realms and control their citizens' transactions, including with terrorists and criminals. Widespread direct rule by western powers, as in Iraq, Afghanistan, Kosovo, and Bosnia, is too expensive and politically risky to apply to all disorderly parts of the globe. Instead, officials in powerful states use techniques of indirect control that utilize commercial networks to pacify disorderly areas. This strategy resembles techniques developed in 19th century European relations with stateless areas. Similar problems develop as well. This led in the 19th century to direct rule, while contemporary officials are forced to experiment with more intensive use of commercial relations to pacify unruly areas.  相似文献   

14.
Abstract

Attempting to lay bare the psychological roots of terrorism, the author alludes to the views of such rebels against the status quo as Marx, Engels, Bakunin, and Kropotkin and examines in greater detail the myths and beliefs current in ancient times, in the Middle Ages, and even in the modern period that were instrumental in instilling fear and terror into the minds of men. It is held, for instance, that such countercultures and aberrations as the drug culture, the Weathermen, the Manson Family, and the Symbionese Liberation Army seem to be clear manifestations of the excitement and fear that assault individuals in the name of political ideals. The author offers a “model of terroristic resonance,” based on the public perception of a terrorist as being uncaring, vengeance‐oriented, and single‐minded in his aggressivity; also perceived in terrorists is a sense of randomness and unpredictability, infusing in their victims an extreme anxiety and an awesome sense of the uncanny, the effect of which may be likened to an irresistible impulse from the id assaulting the personification of the social representative of the superego. Modern‐day terrorists, it is claimed, carry on an ancient messianic and prophetic tradition of horror that is being visited upon man because of his violation of absolutist values.  相似文献   

15.
Online threats by terrorist groups are viewed as a special type of discourse that sends menacing explicit messages, expressing not only an intention to cause a direct physical harm to the threatened, but also to show a commitment to destroy public property or cause a change of system or government. This study applies critical discourse analysis with some insights from pragmatics to analyze the discourse-pragmatic contents of terror threats by two terrorist groups in Nigeria—Boko Haram and Ansaru. Explicit and implied threats are examined from seven online publications by these groups written between 2009 and 2012. This study shows that terror threats by Nigerian terrorist groups are intertextually and ideologically related to threats associated with Al Qaeda and global jihad, which also goes further to establish their strong link and influence with other terror groups around the world. The findings also show that the structure of terror threats is significantly different from the conventional formula for verbal threats.  相似文献   

16.
Governments have many means to begin a dialogue with terrorist groups. The offer of talks may lead terrorists’ constituents to reduce their support for violence, and moderates within a group itself may also turn away from violence. Despite these potential benefits, even the consideration of entering discussions carries many risks. Talks with U.S. officials do indeed reward the use of terrorism, tangibly demonstrating that groups can kill innocents and yet become legitimate interlocutors—a reward that is costly both in terms of reducing the prevalence of this tactic worldwide and because it inevitably angers local allies fighting the groups. Moreover, talks often fail in a variety of ways, giving the terrorists a breathing space to rearm and organize and leaving the government looking foolish. Because talks often fail, policymakers should carefully explore whether the conditions are right for any hope of success before they begin a dialogue.  相似文献   

17.
This article responds to the following research question: what role have former Euskadi Ta Askatasuna (ETA) members played in counterterrorism and counterradicalization initiatives vis-à-vis the terror group in Spain? Our analysis of the role played by former ETA members so far demonstrates that only a minority of former ETA terrorists have disengaged from the terrorist organization and at the same time voiced some criticism of their past violent activities. Such a step, although a positive one, is part of a process that in most of the cases analyzed has to be deemed as incomplete due to deficits, some of them very significant, which considerably limit their effectiveness in countering terrorism and radicalization.  相似文献   

18.
This article reviews and synthesizes social science knowledge on the connections between popular support and terrorist/insurgent sustainment. After distinguishing between “sympathetic of” and “supporting,” the author identifies support requirements of terrorists and insurgents, the range of sources of support, and motives for support. A scheme of relationships between factors contributing to strength of support is essayed. As a caveat to population-centered approaches to counterterrorism and counterinsurgency, the article concludes that support is not “one size fits all,” and that certain factors, when present, are more amenable to policy influence than others. These conclusions suggest that it is imperative that practitioners of counterterrorism and counterinsurgency be mindful of the specifics of their case when seeking to undermine support.  相似文献   

19.
How does digitalisation lead to new kinds of global connections and disconnections in the Global South? And what are the pitfalls that accompany this development? Much of the policy literature on digitalisation and development has focused on the importance of connecting developing countries to digital networks. Good connection to digital networks may have a fundamental impact on societies, changing not only how individuals and businesses navigate, operate and seek opportunities, but also as regards relations between government and the citizenry. However, the rapid pace of this development implies that digital technologies are being put to use before good, functional regulatory mechanisms have been developed and installed. The resultant shortcomings – in state mechanisms, institutions, coordination mechanisms, private mechanisms, general awareness, public knowledge and skills – open the door to new kinds of vulnerabilities. Herein lie dangers, but also opportunities for donor/recipient country exchange. Instead of adding to the already substantial literature on the potential dividends, this article examines a less studied issue: the new societal vulnerabilities emerging from digitalisation in developing countries. While there is wide agreement about the need to bridge the gap between the connected and the disconnected, the pitfalls are many.  相似文献   

20.
Since 11 September 2001, terrorism has been a global security threat. One of the partners in the war on terrorism is Kenya. Considering Kenya"s recent experience with terrorist acts, their effects on its public psyche, and Kenya"s reactions to them in domestic and foreign policies, this study presents perceptions on terrorism from an exploratory survey in Kenya. Respondents feel most threatened not by terrorism but by AIDS and local criminals. Among terrorist acts, the most threatening include suicide terrorism, a plane crash, and stabbing attacks. Media reports on terrorism not only intensify feelings of anxiety and helplessness but also strengthen feelings for both peaceful and revengeful reactions. In order to prevent terrorist attacks, routine security checks, recognizing a Palestinian right to statehood, and intelligence collaboration with the CIA and Mosad are considered the most effective measures. Kenya"s commitment to the war on terrorism may be less a response to Kenyans" perceptions of terrorist threats than a policy to support the United States against terrorists in exchange for U.S. support against AIDS and for political stability, democracy, pluralism, and economic development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号