首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.

This article examines the evolution of a key U.S. Government annual publication on terrorism. From its inception in 1977 to the present, the U.S. Government's annual terrorism report has been the primary statistical compiler of international terrorist incidents. Given the magnitude of this task and the inherent difficulty in defining the term “terrorism,” this report has been controversial and criticized. Love it or hate it, for many decades, this report was the sole source of statistics on international terrorism. The author argues that despite its flaws, this unclassified annual report does provide value and usually paints a fairly accurate picture of the international terrorism landscape. Over the last two years however, there have been claims that this report has become politicized and tailored to fit the views of the administration on the terrorist threat. The author rejects this charge and claims that this publication has been objective and that it has evolved over time into a more credible and useful report.  相似文献   

2.
This article examines the strategic utility of suicide terrorism. Suicide terrorism, we suggest, can be thought of as a form of strategic "signaling." We define terrorism as a signaling game in which terrorist attacks are used to communicate a group's character and objectives to a set of target audiences. This is followed by an examination of the utility of suicide attacks as a signaling tactic. The relative effectiveness of suicide operations is evaluated in relation to other tactical options that are traditionally available to terrorist organizations. We go on to examine the institutional and social context of suicide terrorism, concluding with an examination of the evolutionary use of suicide attacks by Palestinian terrorist organizations and the Liberation Tigers of Tamil Eelam.‐  相似文献   

3.
Since 11 September 2001, terrorism has been a global security threat. One of the partners in the war on terrorism is Kenya. Considering Kenya"s recent experience with terrorist acts, their effects on its public psyche, and Kenya"s reactions to them in domestic and foreign policies, this study presents perceptions on terrorism from an exploratory survey in Kenya. Respondents feel most threatened not by terrorism but by AIDS and local criminals. Among terrorist acts, the most threatening include suicide terrorism, a plane crash, and stabbing attacks. Media reports on terrorism not only intensify feelings of anxiety and helplessness but also strengthen feelings for both peaceful and revengeful reactions. In order to prevent terrorist attacks, routine security checks, recognizing a Palestinian right to statehood, and intelligence collaboration with the CIA and Mosad are considered the most effective measures. Kenya"s commitment to the war on terrorism may be less a response to Kenyans" perceptions of terrorist threats than a policy to support the United States against terrorists in exchange for U.S. support against AIDS and for political stability, democracy, pluralism, and economic development.  相似文献   

4.
Conventional wisdom holds that terrorism is committed for strategic reasons as a form of costly signaling to an audience. However, since over half of terrorist attacks are not credibly claimed, conventional wisdom does not explain many acts of terrorism. This article suggests that there are four lies about terrorism that can be incorporated in a rationalist framework: false claiming, false flag, the hot-potato problem, and the lie of omission. Each of these lies about terrorism can be strategically employed to help a group achieve its desired goal(s) without necessitating that an attack be truthfully claimed.  相似文献   

5.
The threat of terrorism, particularly terrorism involving a weapon of mass destruction (WMD), has received enormous attention in the last decade. Since the mid1990s, the federal government has embarked on a concerted national effort to prepare the country for acts of WMD terrorism. A key component of the counterterrorism agenda is the domestic preparedness program, a series of initiatives aimed at reducing America's vulnerability to a WMD terrorist attack. However, there is a heated debate over whether or not the United States needs a domestic preparedness program at all. This article argues that much of the debate originates in disparate approaches to analyzing terrorism. Terrorism studies specialists use an internal model that analyzes the root causes, motives, and historical patterns of terrorism and concludes that the threat of WMD terrorism against the United States is not sufficient to warrant the domestic preparedness budget. Policy makers and national security experts, however, rely on an external risk assessment model that considers terrorism within the context of the many risks to American security. This assessment model evaluates WMD terrorism on the basis of risk and consequences, and reaches a logical conclusion that the potential for mass destruction not only merits, but also requires a level of domestic preparedness.  相似文献   

6.

The purpose of this paper is to review the international terrorist activities of the last half century of this millennium and to make a case for needed changes in U.S. efforts to curb the growth of terrorism. Unless we can muster a unified front against global terrorism and organized crime, we are in danger of carrying these burdens with us into the new millennium. Whereas most discussions are focused on how to respond during or after a terrorist event, this paper explores measures for averting international terrorism disasters before they occur. With the growing availability of weapons of mass destruction and computer technology to terrorist and organized crime groups, there is a growing potential for disasters of proportions never before experienced. Consequently the risks are becoming too great to continue with a reactive approach to terrorism. The paper begins with a discussion of how the basis for international terrorism has changed since its modern form began in the 1960s. It then extrapolates the evolutionary trends of terrorism to make projections for what we can expect in the future. Finally, it presents a number of practical ideas for preventing terrorist actions before they occur, beginning with an argument for redefining terrorism in terms that enable us to organize more effectively against it.  相似文献   

7.
The consequences of states’ reactions to terrorist attacks can far outweigh the effects of the attacks themselves. Yet risk analysis, widely accepted as the proper analytical basis for assessing terrorist threats, largely ignores the consequences from potential reactions to attacks. It also generally fails to consider how the anticipation of these reactions may influence terrorists’ attack preferences. Policymakers should therefore be wary of the limitations of risk analysis as currently practiced. Further, states should strive to avoid reactions to attacks that unwittingly further their adversaries’ agendas, a goal that may be aided by strengthening public resilience to terrorism.  相似文献   

8.
The 11 September 2001 terrorist attacks on the World Trade Center and the Pentagon marked the advent of an unprecedented preoccupation with terrorism. Although Australia's actual terrorist risk profile remains marginal in comparison with other mortality risks, in times of crisis, the reasoned negotiation of risk is marginalised. Drawing on the findings of qualitative research, this article offers an analysis of how Australians are responding to the threat of terrorism embodied in a developing discourse of the war on terror and how they construct their perceptions of terrorist risk. The findings implicate community fear as a factor that should be considered in the development of counter terrorism strategies that emphasize community engagement as a mechanism for challenging radicalisation in democratic states.  相似文献   

9.
This research is geared toward theory building by alleviating some of the lacunae in three areas of study. First, it redefines what terrorism is by refocusing the definition away from politics and the mens rea of terror to its criminal actus reus. In this endeavor, it proposes a unifying definition that is viable for global assessment and under standing, while being conducive to international military and law enforcement cooperation. The definition is proposed to accommodate the international laws of reciprocity, community, and political framework, without compromising terrorism's criminal liabilities. Second, it defines what a religious terrorist is by using a convergence of psychometric measures from 356 suicide-bombers, taped self-immolations of 15 terrorists and 918 zealots, and triangulated anthologies. Among the outcomes of this mixed-method design is an empowering 32-trait profile of a religious terrorist that is ethno-religious specific and user friendly. Third, it introduces the concept of International Islamization Terrorism (IIT) and calls on future research to assess the propensity of IIT to global calamity, and the viability of a universal religious terrorist profile.  相似文献   

10.
Abstract

There have been few spectacular acts of maritime terrorism. About ninety‐five percent of all incidents of what would be classified as transnational maritime terrorism involved bombings, hijackings, and “other” attacks. Nearly all of these took place when ships were in port, and the victims were predominantly merchant ships. Only a small number of terrorist attacks have been reported against men‐of‐war–none against U.S. Navy ships. Bombing, including various forms of mining, comprises the major threat to merchant ships, while the dangers of U.S. Navy ships would be aggravated by the presence of nuclear weapons or nuclear propulsion plants.

Counter terrorism as carried out by the U.S. Navy involves actions to deter or defeat direct terrorist activity (against the ship itself) and indirect activity (against other U.S. interests). U.S Navy ships are especially well organized, constructed, and equipped to deal with the former, but they would be virtually powerless to assist U.S. merchant ships against the most probable threats (bombing, hijacking, and attacks) in the most probable location (overseas ports).  相似文献   

11.
The misuse of passports is intrinsically connected with international terrorism. Terrorist groups and their operatives demonstrate a propensity to travel in order to meet, organize, train, plan, reconnoiter targets, and deploy for attacks. To travel surreptitiously, terrorist activists and operatives typically make use of improperly obtained, altered, or counterfeit passports and visas. The present study addresses three key issues relating to the terrorist misuse of passports: (a) the role of passport misuse in the operational activities of international terrorist networks; (b) the ways in which terrorist elements acquire seemingly genuine passports; and (c) the various international covenants, agreements, and related action plans intended to constrain terrorists’ ability to move surreptitiously across borders. The analysis describes a terrorism cycle, a complex array of key activities that together serve as enablers for international terrorism. The role of passports and surreptitious travel is examined for each stage of this terrorism cycle.  相似文献   

12.
This study characterizes trends in the frequency and characteristics of terrorist attacks in child-serving educational institutions around the world, examining the specific vulnerabilies of children and schools with regard to terrorist violence, as well as the various impacts that violence has on children, communities, and societies. Following the analysis of available data on terrorist attacks against educational institutions, vulnerabilities, and impacts, the study concludes with a discussion of what still needs to be understood in the intersection of child vulnerability and terrorism, and provides recommendations for improving resilience to terrorist attacks against child-serving educational institutions.  相似文献   

13.
This article analyzes a novel comprehensive database of attacks by Palestinian women between 1965 and 1995. During this period, women's participation in terrorism evolved and their participation can be divided into two distinct eras, before and after 1986. The article argues that the entrance of religious terrorist organizations into politics and the First Intifada changed Palestinian terrorism. While more attacks by women occurred after 1986, they were mostly low intensity attacks, aimed at military targets, with low success rates. Despite women's participation, the patriarchal structure of society is also reflected in Palestinian terrorist organizations. However, as women's roles in society expanded, so too did their roles within terrorist organizations.  相似文献   

14.
The aim of this article is to identify characteristics of communities where persons indicted under terrorism charges lived, planned, and prepared prior to carrying out a terrorist act. Guided by a model of community deterioration and using data from the Terrorism and Extremist Violence in the United States database, findings indicate: (1) half of all census tracts where terrorists planned and prepared for attacks were located in the western United States; nearly one fourth were in the Northeast; (2) nationally, terrorist pre-incident activity is more likely to occur in census tracts with lower percentages of high school graduates for Al Qaeda and associated movements (AQAM) terrorism but not for far-right terrorism, higher percentages of households living below the poverty level, more urban places, and more unemployed; and (3) communities with terrorist pre-incident activity are different types of places compared to those where there was no pre-incident activity, generally between different regions of the country, and specifically in terms of differences across far-right and AQAM terrorist movements.  相似文献   

15.
This article is the first to explore the Israel Defense Forces's official statistical data on Palestinian terrorism toward Israeli targets during the al-Aqsa intifada 2000–2004. Focusing the analysis on the logic of terrorist target choice, the article identifies two separate results: First, an unambiguous difference in the form of the attacks contingent on whether they are carried out in the state of Israel or in the Occupied Territories. Second, based on the same distinction, the analysis points out how the attacks are targeted toward distinctively different categories of the Israeli populace. Causes of the results are discussed.  相似文献   

16.
This study empirically evaluates the question of whether or not the promotion of democracy in the Middle East will reduce terrorism, both in terms of terrorist attacks sustained by Middle Eastern countries and in terms of attacks perpetrated by terrorist groups based in Middle Eastern countries. Using a series of pooled, time-series negative binomial statistical regression models on 19 countries from 1972 to 2003 the analysis demonstrates that the more politically liberal Middle Eastern states—measured both in terms of democratic processes and in terms of civil liberties protections—are actually more prone to terrorist activity than are Middle Eastern dictatorships. The study demonstrates, furthermore, that an even more significant predictor of Middle Eastern terrorist attacks is the intensity of state failures, or episodes of severe political instability that limit central government projection of domestic authority, suffered by states in the region. States that are unable to respond to fundamental challenges to political stability posed by internal political strife, ethnic conflict or the phenomenon of “stateless areas,” geographic or political spaces within states that eschew central government authority, are significantly more likely to host or sustain attacks from terrorist groups. The findings have implications for current United States antiterrorism policy toward the Middle East and provide a statistical/empirical foundation to previous studies on the relationship between terrorism and state failure.  相似文献   

17.
Plagued by systematic state failure, sub-Saharan Africa's failed states have helped facilitate internationally sponsored terrorist networks and operations. However, until recently, this type of activity was primarily relegated to North Africa and the Horn. But that has begun to change. Now, what was once a seemingly benign terrorist presence in sub-Saharan Africa is starting to transform into a movement, with states such as Nigeria, Sierra Leone, Liberia, and the Democratic Republic of the Congo (DRC) now lending arms, financial support, and radical militants to the extremist jihadist movement of internationally sponsored terrorist organizations such as Al Qaeda. Further, with the recent bombings in Kenya and Somalia, and the failed bombing attempt on a U.S. airliner by a Nigerian national, it is becoming increasingly evident that internationally sponsored terrorist networks have found a permanent home in sub-Saharan Africa and within the hearts and minds of its people, which poses significant challenges for the international community, given the region's patchwork of failed states, where terrorists can easily hide and thrive. Consequently, this study discusses how the conditions of state failure have fostered support for internationally sponsored terrorism in sub-Saharan Africa. Terrorist groups are now actively recruiting more militants from within the region and popular support for extremist acts is on the rise in sub-Saharan Africa. Thus, the article argues sub-Saharan Africa will soon become the site for the next generation of terrorists, and the next wave of terrorist activity.  相似文献   

18.
This article examines the causes of terrorism at a global level. It also reexamines the chronology of terrorism since the nineteenth century. It argues that local causes cannot explain global waves, and that while ideology is a necessary ingredient in causing terrorism, it does not explain it. The article proposes that the most important cause of global waves of terror is the inspiring example for radicals everywhere of what are, or appear to be, successful uses of terrorist strategies. This hypothesis is tested in the context of a reevaluation of David Rapoport's chronology of global waves of terrorism. The article argues for different periodization, and for labeling the waves as Italian, German, Chinese, and Afghan.  相似文献   

19.
Terrorism is frequently argued to be the product of poverty and poor levels of economic development in countries. Examining the distribution of terrorist attacks and casualties due to terrorism across the states of India, this article demonstrates that the phenomenon of terrorism is not a clear product of poor economic development but rather exacerbated by unresolved and poorly managed political conflict. Poorer states in India are not necessarily more prone to terrorism, but states that have outstanding and poorly addressed political disputes do experience a disproportionately high level of terrorist activity. This study examines six sources of political conflict that contribute to terrorism in India—separatist movements, ethnic conflict, communal conflict, the presence of scheduled castes and tribes, high population growth, and the phenomenon of stateless areas—and makes several observations on the successes and failures of Indian counterterrorism policy.  相似文献   

20.
The collapse of Greece's premier terrorist organization, the 17 November (17N) group, back in the summer of 2002 was a truly dramatic event, considering 17N's 27-year career, but it was not such a watershed event in the country's history as it was presented at the time by the mainstream political and media establishments. 17N's dismantling and imprisonment, far from demoralizing and emasculating the armed struggle movement, led to the emergence of new urban guerrilla groups and the increase and intensification of revolutionary violence. This article reassesses Greece's persistent terrorism problem by focusing on the nature, threat, and operational evolution of a new generation of political militancy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号