1 - 20
Next
Number of results to display per page
- Crenshaw, Martha, author.
- Washington, DC : United States Institute of Peace, 2020
- Description
- Book — 1 online resource (24 pages) : illustrations (chiefly color), one color map
2. Countering terrorism [2017]
- Crenshaw, Martha, author.
- Washington, D.C. : Brookings Institution Press, [2017]
- Description
- Book — 1 online resource.
- Summary
-
- Contents:
- Preface
- 1. Introduction: The Context for Analyzing Counterterrorism Difficulties—Current Threats and the State of Academic Research
- 2. Overresponding to Rare Events: The Problem of Uncommon Threats with Irreversible Consequences
- 3. The Tip of the Iceberg: Accounting for Failed and Foiled Terrorist Plots
- 4. Pinning Down an Elusive Adversary: What Is a Terrorist Organization?
- 5. Who Did It? The Attribution Dilemma
- 6. Counterterrorism Results: Can Effectiveness be Evaluated?
- 7. Moving Forward
- Notes
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
3. Countering terrorism [2017]
- Crenshaw, Martha, author.
- Washington, D.C. : Brookings Institution Press, [2017]
- Description
- Book — ix, 272 pages ; 23 cm
- Summary
-
- Contents:
- Preface
- 1. Introduction: The Context for Analyzing Counterterrorism Difficulties—Current Threats and the State of Academic Research
- 2. Overresponding to Rare Events: The Problem of Uncommon Threats with Irreversible Consequences
- 3. The Tip of the Iceberg: Accounting for Failed and Foiled Terrorist Plots
- 4. Pinning Down an Elusive Adversary: What Is a Terrorist Organization?
- 5. Who Did It? The Attribution Dilemma
- 6. Counterterrorism Results: Can Effectiveness be Evaluated?
- 7. Moving Forward
- Notes
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
4. Countering terrorism [2017]
- Crenshaw, Martha, author.
- Washington, D.C. : Brookings Institution Press, [2017]
- Description
- Book — 1 online resource (ix, 272 pages) : illustrations
- Summary
-
- Contents:
- Preface
- 1. Introduction: The Context for Analyzing Counterterrorism Difficulties—Current Threats and the State of Academic Research
- 2. Overresponding to Rare Events: The Problem of Uncommon Threats with Irreversible Consequences
- 3. The Tip of the Iceberg: Accounting for Failed and Foiled Terrorist Plots
- 4. Pinning Down an Elusive Adversary: What Is a Terrorist Organization?
- 5. Who Did It? The Attribution Dilemma
- 6. Counterterrorism Results: Can Effectiveness be Evaluated?
- 7. Moving Forward
- Notes
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Crenshaw, Martha.
- London ; New York : Routledge, 2011.
- Description
- Book — xii, 268 p. ; 24 cm.
- Summary
-
- Introduction: Definitions, Approaches, Trajectories, and Responses
- Part 1: What and Why? 1. The Concept of Terrorism 2. The Causes of Terrorism 3. "Old" vs. "New" Terrorism
- Part 2: Explaining Terrorism: Organizations, Strategies, and Psychology 4. The Organizational Approach 5. Subjective Realities 6. The Logic of Terrorism 7. Psychological Constraints on Instrumental Reasoning
- Part 3: Responding to Terrorism 8. Coercive Diplomacy 9. Strategies and Grand Strategies 10. Counterterrorism Policy and the Political Process
- Part 4: How Terrorism Ends 11. How Terrorism Declines 12. Why Terrorism is Rejected or Renounced.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
- Crenshaw, Martha
- Stanford, Ca. : Hoover Institution Press, 1978.
- Description
- Book — xvi, 178 p. : map ; 24 cm.
- Online
Hoover Library, SAL1&2 (on-campus shelving)
Hoover Library | Status |
---|---|
Reference | |
See full record for details |
SAL1&2 (on-campus shelving) | Status |
---|---|
Temporary shelving | Request (opens in new tab) |
DT295 .H88 | Unknown |
Online 7. From Zero to Sixty: Explaining the Proliferation of Shi'a Militias in Iraq After 2003 [2016]
- NEWBY, LAUREN (Author)
- June 2016 - May 2017
- Description
- Book
- Summary
-
At the time of the U.S. invasion of Iraq in 2003, there were two main Shi’a militias operating in the country. When the U.S. withdrew eight years later, there were five such groups. By late 2016 there were well over 40 Shi’a militias active in Iraq. This thesis asks what has driven the proliferation of these groups; specifically, why has there been such a dramatic increase in the number of Iraqi Shi’a militias, not just in the number of men joining these groups. Studying almost 30 of the most prominent Shi’a militias that have emerged in Iraq since 2003, this thesis examines the factors that precipitated this proliferation. It finds that in contrast to the assumptions made by the existing literature on civil wars, militant group fragmentation only accounts for a small portion of the proliferation of the Shi’a militias in Iraq. In fact, most of the new militias that have emerged since 2003 were founded as entirely new, independent organizations, not as splinter groups. Furthermore, a large proportion of these new organizations were founded by political parties, suggesting a link between Iraqi electoral politics and militia proliferation. The data also implies that what splintering has occurred among the Shi’a militias in Iraq is likely not due to direct Iranian influence, as many observers have suggested. Instead, the causes of fragmentation among these groups appear to be relatively diverse, although the evidence suggests that the war in neighboring Syria has played an important role in the proliferation process.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
Online 8. In Data We Trust?: The Big Data Capabilities of the National Counterterrorism Center [2016]
- Mittelberger, Benjamin (Author)
- May 2016
- Description
- Book
- Summary
-
The National Counterterrorism Center (NCTC) sits as the central nexus for counterterror intelligence analysis and strategy for the entire American intelligence community (IC). It exists to offset the fragmentation issues that came to light in the aftermath of the 9/11 attacks. Its role is to integrate all types of intelligence information using traditional and computational Big Data techniques. Unfortunately, the NCTC is not in a position to take full advantage of contemporary Big Data analytics, severely reducing its analytical capabilities in the current information environment. These weaknesses stem from its organizational structure, not its technological capabilities. The NCTC’s deficiencies manifest themselves both its internal structure as well as its position within the community as a whole. Internally, the NCTC does not have the information-sharing environment that it should and provides poor incentives for collaboration and innovation. Externally, it has a poorly defined role within the community and lacks the power that is required in order to truly centralize big data analytics. The private sector is leaps and bounds ahead of the government when it comes to the implementation of Big Data analytics. Internet giants such as Google and Facebook may serve as models for future improvements to the NCTC. With full understanding that certain limitations apply to government agencies, this thesis provides recommendations on how the NCTC may improve its ability to take advantage of large-scale data analytics and provide a better service to the rest of the Intelligence Community.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
- Andaya, Alexa (Author)
- May 20, 2016
- Description
- Book
- Summary
-
Counterterrorism policies often incorporate leadership decapitation, which refers to the removal of a militant organization’s leaders through capture or targeted killing. Previous studies of leadership decapitation measure its effects on a limited set of quantifiable variables, especially a terrorist group’s lifespan and attack frequency. Despite the resources and attention devoted to using and studying the tactic, its effects are not well understood. This thesis explores leadership decapitation of jihadi terrorist groups in relation to strategic trajectory, the combination of a group’s goals and the methods employed in pursuit of those goals. After a jihadi terrorist group’s founding leader is killed by a government, what happens to the group’s strategic trajectory? This thesis finds that jihadi terrorist groups demonstrate one of three strategic trajectory trends after losing their founders: resilient continuity, relational shifts, or major change. The strategic trajectories of resilient groups are generally unchanged after leadership decapitation, while relational-shift groups change the ways in which they interact with target audiences and other militant organizations. Major-change groups shift their goals or strategic emphasis. This thesis concludes that killing the founders of jihadi terrorist groups does not produce a single type of strategic trajectory change across organizations. Further, the thesis does not find strong trends or shared characteristics across groups within the same category of strategic trajectory change, meaning that the outcome of leadership decapitation is unpredictable. The thesis asserts that further study and debate must define what constitutes success in the context of strategic trajectory change in terrorist groups.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
- Sheils, Audrey Hope (Author)
- May 2016
- Description
- Book
- Summary
-
This thesis describes the multi-faceted political modernization of the Middle Eastern Region and the transformation of the Ottoman Empire into a system of modern states. To that end, this thesis examines two cases: the treaties of Sèvres (1920) and Lausanne (1923) to understand why some groups garnered statehood rather than others in the succession of treaties both during and after the First World War. It ultimately finds that the groups that were most nationalized were able to claim the most territory in each of these treaties, despite other geopolitical pressures. In this liminal period, national movements could actively argue a state into being.
- Collection
- Stanford University, Program in International Relations, Honors Theses
Online 11. Phrasing the Enemy: The Evolution of Counterterrorism Language and Policy Across the Transatlantic Alliance After 9/11 [2015]
- Dayton, Kelsey (Author)
- May 22, 2015
- Description
- Book
- Summary
-
In the aftermath of the September 11, 2001 terrorist attacks, George W. Bush launched both a metaphorical and real war on terror. As Bush’s war had global implications, one key objective in his rhetoric throughout his presidency was to convince the international community — and, specific to this thesis, his European allies— to join his cause. Success in this regard would mean that his allies join his efforts in the Middle East and also create counterterrorism policies at home that align with Bush’s conception of the war on terror. As reflected in Bush’s language, Bush’s policy decisions are guided by a key unifying theme: that the fight against terrorism is a higher calling, an effort sanctioned by God, goodness, and abstract values of liberty and freedom. To Bush, this fight against terrorism answers to a higher order and thus transcends the traditional rules and relationships that govern domestic and international society. These rules are simply roadblocks to his pursuit of a higher form of justice. Europe does not understand terrorism this way, and Bush ultimately fails to convince them. European conceptions of terrorism are firmly rooted in a respect for traditional rules and norms of international society, and Bush’s stylistic attempts at multilateralism cannot alter this foundation. However, a profound tension emerges within the European policies implemented after 9/11, as European policies converge around that intensive American spirit, taking on the more unbounded, self-justifying character of American counterterrorism while still being formally restricted within the auspices of established legal frameworks.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
Online 12. Regional Profits: The Rise of Hybrid Terrorism in West Africa Post 9/11 [2013]
- Afokpa, Vaeme Jensine (Author)
- May 31, 2013
- Description
- Book
- Summary
-
All organizations – terrorist ones included – seek financial resources in order to support their members and fund their activities. However, in West Africa, the intersection between criminal activity and terrorism goes beyond a simple marriage of convenience to ensure funds. Focusing on the region, case studies of the financial activities of AQIM, Boko Haram, and Hezbollah demonstrate a criminal involvement that is deeply entrenched in their nature and behavior in West Africa. The qualitative data presented was collected through the analysis of NGO and governmental unclassified reports, testimonies, and interviews. Findings indicate that, contrary to the traditional belief that criminal and terrorist groups belong at the opposite extremes of a spectrum, these groups gravitate around the center. They are both criminal and political – they represent a hybrid type of organization, one that is a product of regional factors conducive to illicit lucrative businesses. Determining a hybrid class of terrorist groups, one that is also a product of its theater of operation, possesses many policy implications since the U.S. cannot develop an effective response without understanding the nature of the threat. AFRICOM, established in 2008, was designed to defend American national interests on the continent. However, its focus on training local militaries or implementing health projects does not address the key factors that have enabled Boko Haram, Hezbollah, and AQIM to expand their operations in the region: weak state capacity and poor governance. Instead, the U.S. should focus on strengthening law enforcement training and partnerships within a comprehensive interagency counterterrorism framework.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
Online 13. India’s Red Stain: Explaining the Indian Government’s Ineffective Response to the Maoist-Naxalite Insurgency Since 1967 [2011]
- Banerjee, Devin (Author)
- May 13, 2011
- Description
- Book
- Summary
-
Since 1967, the Maoist-Naxalite movement has grown from a local peasant rebellion to a violent insurgency that operates in more than 10 of India’s 28 states and is widely considered to be the single biggest threat to India’s internal security. For more than four decades, as Naxalite violence has killed an estimated 15,000 Indians, the government has failed to address the driving motivation of the insurgency, allowing the movement to spread geographically and increase its violent threat. Most of what has been written about the Naxalites offers only partial or murky explanations of India’s failure to effectively address the violence. This thesis examines the nature of the Naxalite movement since its inception and analyzes the response of the government over time to answer the question: What accounts for India’s failure to effectively address Naxalite violence from 1967 to the present? It concludes that India consistently adopted the wrong strategy at the wrong time toward the insurgency, and that it did so due to a combination of three factors: the shifting nature of the movement; inherent inefficiencies in center-state relations; and the presence of other security challenges on the nation’s agenda. India is increasingly the focus of global attention, as its economy today grows at a rate second only to that of China. Yet, its advancement is still constrained by the same socio-economic grievances that inspired the Naxalites in 1967. The study concludes with the implications relevant for current and future Indian policymakers to consider in adopting a strategy against the threat posed by the Maoist-Naxalite insurgency.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
14. The consequences of counterterrorism [2010]
- New York : Russell Sage Foundation, ©2010.
- Description
- Book — 1 online resource (viii, 421 pages) : illustrations
- Summary
-
- Counterterrorism regimes and the rule of law : the effects of emergency legislation on separation of powers, civil liberties, and other fundamental constitutional norms / John E. Finn
- The uses and abuses of terrorist designation lists / Chantal de Jonge Oudraat and Jean-Luc Marret
- Immigration policy as counterterrorism : the effects of security on migration and border control in the European Union / Gallya Lahav
- The social contract and the three types of terrorism : democratic society in the United Kingdom after 9/11 and 7/7 / Dirk Haubrich
- Confronting terrorism in Northern Ireland and the Basque country : challenges for democracy and legitimacy / Rogelio Alonso
- French responses to terrorism from the Algerian war to the present / Jeremy Shapiro
- Germany's response to 9/11 : the importance of checks and balances / Giovanni Capoccia
- The consequences of counterterrorist policies in Israel / Ami Pedahzur and Arie Perliger
- Terrorism as conventional security for democracies : America, Japan, and military action in the Asia-Pacific / David Leheny.
Online 15. The Relationship Between Social Service Provision, Militancy, and Violence: Egypt in the 1990s [2010]
- Wells, Georgia (Author)
- May 13, 2010
- Description
- Book
- Summary
-
This study explored the relationship between social service provision and a community’s involvement in terrorism. I used Egypt as a case study to statistically examine whether communities with a greater proportion of fully vaccinated children produced per capita fewer terrorists. Using The Global Terrorism Database to examine violence between 1990 and 1997 and The Demographic and Health Survey conducted in 1995, I found that, in general, communities with a greater proportion of fully vaccinated children produced fewer terrorists per capita than communities with lower vaccination rates. While demonstrating the correlation between vaccination level and attack rate, I also discovered that terrorists generally preferred to attack close to home, with over fifty percent of attacks occurring within fifty miles of a perpetrator’s hometown. I examined four Egyptian provinces that represented different combinations of social service provision, and observed the level of violence in each province. While I discovered interesting correlations in three of the provinces, anomalies in the fourth suggested, in this limited sample size at least, that although social services can reduce levels of violence, it would be foolish for any government to believe that simply servicing a region could be preventive against terrorist attacks, since violence can arise from a number of factors.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
16. Terrorism in context [1995]
- University Park, Pa. : Pennsylvania State University Press, c1995.
- Description
- Book — xvi, 633 p. : ill., maps ; 24 cm.
- Summary
-
- Thoughts on Relating Terrorism to Historical Contexts, Martha Crenshaw
- The Intellectual Origins of Modern Terrorism in Europe, Martin A. Miller
- Russian Revolutionary Terrorism, Philip Pomper
- Left-Wing Terrorism in Italy, Donatella della Porta
- West German Left-Wing Terrorism, Peter H. Merkl
- Political Violence in Argentina - Guerillas, Terrorists and Carapintadas, Richard Gillespie
- The Revolutionary Terrorism of Peru's Shining Path, David Scott Palmer
- The Culture of Paramilitarism in Ireland, Charles Townshend
- Political Violence and Terrorism in India - the Crisis of Identity, Paul Wallace
- Political Violence in a Democratic State - Basque Terrorism in Spain, Goldie Shabad and Francisco Jose Llera Ramo
- The Effectiveness of Terrorism in the Algerian War, Martha Crenshaw
- Terrorism in the Arab-Israeli Conflict - Targets and Audiences, Ian S. Lustick
- Terrorism and Politics in Iran, Jerrold D. Green
- Terrorism in the Context of Academic Research, Michel Wieviorka.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
An interdisciplinary investigation of the phenomenon of terrorism in its political, social, and economic context as it has occurred throughout the world from the nineteenth century to the present. Acts of violence committed by terrorists have become a staple of news reports in modern times, from hijackings to bombings, kidnappings to assassinations. How are we to understand both the causes and the consequences of these disturbing events? The key, this volume of original essays shows, lies in linking terrorism to the different contexts-historical, political, social, and economic-in which it occurs. The fourteen contributors to this volume-historians, political scientists, and sociologists-provide the expertise to explain the continuities and discontinuities in the development of this form of violent political action in a variety of contexts. They link terrorism to the pattern of relations between state and society and between government and oppositions. Their studies range from the early manifestations of terrorism in revolutionary Russia and the anarchist movements of Western Europe and the United States in the late nineteenth century up to the terrorism still ongoing in Latin America and the Middle East. A section on left-wing terrorism covers the activities of the Italian Red Brigades and German Red Army Faction in the 1960s and 1970s, the urban guerrilla warfare in Argentina in the 1970s, and the rise of Sendero Luminoso in Peru during the 1980s and 1990s. Another section deals with terrorism arising from conflicts in divided societies-by Basques in Spain, the IRA in Northern Ireland, and Sihks in India. The last major section considers terrorism as it has been linked to the establishment of nation-states in Algeria, the Israeli-Palestinian conflict, and the effort of Iran to export its Islamic revolution throughout the Middle East. The Introduction sets the stage for the individual case studies by outlining an approach to analyzing terrorism in different historical contexts, and the Conclusion by French sociologist Michel Wieviorka highlights some of the common themes that emerge from the case studies and addresses their implications for further research.
(source: Nielsen Book Data)
- Online
17. Terrorism in Africa [1994]
- New York : G.K. Hall ; Toronto : Maxwell Macmillan Canada ; New York : Maxwell Macmillan International, c1994.
- Description
- Book — xvii, 535 p. : ill., maps ; 25 cm.
- Online
Hoover Library
Hoover Library | Status |
---|---|
Stacks | |
See full record for details |
- 1st ed. - Middletown, Conn. : Wesleyan University Press ; Scranton, Pa. : Distributed by Harper & Row, c1983.
- Description
- Book — x, 162 p. ; 23 cm.
- Online
- Kim, Irene (Author)
- May 2019
- Description
- Book
- Summary
-
In March 2019, the European Union adopted a framework for screening foreign direct investments entering the EU. However, the framework fails to grant the European Commission the power to block investments that threaten security or public order, rendering the legislation essentially toothless. Why did the EU decide to pass a toothless regulation on investment screening? This thesis seeks to understand the EU’s motivations for adopting an impotent screening regulation. Using evidence from periodicals, public statements, and interviews with European bureaucrats, this thesis argues that the unparalleled risks associated with Chinese FDI compelled some Member States to push for screening at a European level. With an increasing amount of Chinese investment, particularly in strategic sectors like critical technology and infrastructure, countries like Germany began to comprehend the economic and security threats posed by Chinese FDI. Meanwhile, other states that benefitted from Chinese investment sought to keep Chinese capital flowing and therefore opposed investment screening. Some states also disapproved of screening because they thought this measure was protectionist and antithetical to the EU principle of open markets. To balance these differing stances on Chinese investment, the EU created an empty legislation that would meet the least amount of resistance in a vote. Furthermore, as a volatile turn in transatlantic relations took hold, the EU sought to assert its autonomy from both the rising power of China and its traditional ally the United States. The passage of the screening framework, despite its weaknesses, served as a signal of independence to the international community.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
- Fidler, Mailyn (Author)
- May 2014
- Description
- Book
- Summary
-
The global trade in zero-day vulnerabilities – software flaws unknown to the maker and the public – constitutes a serious cybersecurity problem. Governments use zero days for military, intelligence, and law enforcement cyber operations, and criminal organizations use them to steal information and disrupt systems. The zero-day trade is global and lucrative, with the U.S. and other governments participating as buyers. Cybersecurity experts worry this trade enables governments, non-state actors, and criminals to gain damaging capabilities. The U.S. government’s participation raises concerns because keeping purchased zero days secret to preserve military, intelligence, or law enforcement utility undermines U.S. and global cybersecurity. These problems are generating a nascent, but growing, policy debate about the need to regulate the zero-day trade. This thesis contributes to this debate by analyzing domestic and international options for controlling the zero-day trade. Domestically, it investigates criminalization, unilateral export controls, and increased oversight of U.S. executive branch actions. It concludes that increased executive branch oversight is the best national strategy to address the problems of existing U.S. policy. Internationally, this thesis analyzes international legal approaches, voluntary collective action through export controls, and cooperation through collective defense organizations. It concludes that voluntary collective action to harmonize export controls on zero days through the Wassenaar Arrangement is the most feasible international option. This thesis demonstrates how difficult regulation of the global zero-day trade will be, signaling the pervasiveness of realpolitik in cyberspace. It argues that, without U.S. action and international action, the pull of anarchy over regulation will prevail.
- Collection
- Stanford University, Center for International Security and Cooperation, Interschool Honors Program in International Security Studies, Theses
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.