Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Counterterrorism
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Further reading == * Arreguín-Toft, Ivan. "Tunnel at the End of the Light: A Critique of U.S. Counter-terrorist Grand Strategy," ''Cambridge Review of International Affairs'', Vol. 15, No. 3 (2002), pp. 549–563. * Ivan Arreguín-Toft, "How to Lose a War on Terror: A Comparative Analysis of a Counterinsurgency Success and Failure," in Jan Ångström and Isabelle Duyvesteyn, Eds., ''Understanding Victory and Defeat in Contemporary War'' (London: Frank Cass, 2007). * Bakker, Edwin, and Tinka Veldhuis. [http://www.icct.nl/news/a-fear-management-approach-to-counter-terrorism ''A Fear Management Approach to Counter-Terrorism'' (International Centre for Counter-Terrorism – The Hague, 2012)] {{Webarchive|url=https://web.archive.org/web/20150402040414/http://www.icct.nl/news/a-fear-management-approach-to-counter-terrorism |date=April 2, 2015 }} * Barton, Mary S. ''Counterterrorism between the Wars: An International History, 1919-1937'' (Oxford University Press, 2020) [http://www.h-net.org/reviews/showrev.php?id=57070 online book review] * Berger, J.M. [http://icct.nl/wp-content/uploads/2016/05/J.-M.-Berger-Making-CVE-Work-A-Focused-Approach-Based-on-Process-Disruption-.pdf ''Making CVE Work: A Focused Approach Based on Process Disruption''] {{Webarchive|url=https://web.archive.org/web/20200728223729/http://icct.nl/wp-content/uploads/2016/05/J.-M.-Berger-Making-CVE-Work-A-Focused-Approach-Based-on-Process-Disruption-.pdf |date=July 28, 2020 }}, (International Centre for Counter-Terrorism – The Hague, May 2016 * Besenyo, Janos. [https://www.ceeol.com/search/article-detail?id=531307 Low-cost attacks, unnoticeable plots?] Overview on the economical character of current terrorism, Strategic Impact (ROMANIA) (ISSN: 1841–5784) (eISSN: 1824–9904) 62/2017: (Issue No. 1) pp. 83–100. * Deflem, Mathieu. 2020. [https://deflem.blogspot.com/2020/01/responses-to-terror-policing-countering.html "Responses to Terror: Policing and Countering Terrorism in the Modern Age."] In The Handbook of Collective Violence: Current Developments and Understanding, eds. C.A. Ireland, et al. Abingdon, UK: Routledge. * Deflem, Mathieu, and Stephen Chicoine. 2019. [https://deflem.blogspot.com/2019/01/terrorismpolicing.html "Policing Terrorism."] In The Handbook of Social Control, edited by Mathieu Deflem. Hoboken, NJ: Wiley-Blackwell. * Deflem, Mathieu and Shannon McDonough. 2015. [https://deflem.blogspot.com/2015/01/fearofcounterterrorism.html "The Fear of Counterterrorism: Surveillance and Civil Liberties Since 9/11."] Society 52(1):70–79. * Gagliano Giuseppe, ''Agitazione sovversiva, guerra psicologica e terrorismo'' (2010) {{ISBN|978-88-6178-600-4}}, Uniservice Books. * Ishmael Jones, ''The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture'' (2008, revised 2010) {{ISBN|978-1-59403-382-7}}, Encounter Books. * James Mitchell, "Identifying Potential Terrorist Targets" a study in the use of convergence. G2 Whitepaper on terrorism, copyright 2006, G2. Counterterrorism Conference, June 2006, Washington D.C. * [[James F. Pastor]], "Terrorism and Public Safety Policing:Implications for the Obama Presidency" (2009, {{ISBN|978-1-4398-1580-9}}, Taylor & Francis). * Jessica Dorsey, Christophe Paulussen, [http://www.icct.nl/download/file/ICCT-Dorsey-Paulussen-Boundaries-of-the-Battlefield-Report-April-2013_docx.pdf ''Boundaries of the Battlefield: A Critical Look at the Legal Paradigms and Rules in Countering Terrorism'' (International Centre for Counter-Terrorism – The Hague, 2013)] {{Webarchive|url=https://web.archive.org/web/20201022040650/http://www.icct.nl/download/file/ICCT-Dorsey-Paulussen-Boundaries-of-the-Battlefield-Report-April-2013_docx.pdf |date=October 22, 2020 }} * Judy Kuriansky (Editor), "Terror in the Holy Land: Inside the Anguish of the Israeli-Palestinian Conflict" (2006, {{ISBN|0-275-99041-9}}, Praeger Publishers). * Lynn Zusman (Editor), "[http://apps.americanbar.org/abastore/index.cfm?pid=5010069§ion=main&fm=Product.AddToCart The Law of Counterterrorism]" (2012, {{ISBN|978-1-61438-037-5}}, American Bar Association).* Marc Sageman, ''Understanding Terror Networks'' (Philadelphia, PA: University of Pennsylvania Press, 2004), {{ISBN|0-8122-3808-7}}. * [[Newton Lee]], ''Counterterrorism and Cybersecurity: Total Information Awareness (Second Edition)'' (Switzerland: [[Springer Science+Business Media|Springer International Publishing]], 2015), {{ISBN|978-3-319-17243-9}}. * Merari, Ariel. "Terrorism as a Strategy in Insurgency," ''Terrorism and Political Violence'', Vol. 5, No. 4 (Winter 1993), pp. 213–251. * Sinkkonen, Teemu.''Political Responses to Terrorism'' (Acta Universitatis Tamperensis, 2009), {{ISBN|978-9514478710}}. * Vandana, Asthana., "[https://web.archive.org/web/20100704154956/http://acdis.illinois.edu/publications/207/publication-cross-border-terrorism-in-india-counterterrorism-strategies-and-challenges.html Cross-Border Terrorism in India: Counterterrorism Strategies and Challenges]," ''ACDIS Occasional Paper'' (June 2010), Program in Arms Control, Disarmament, and International Security (ACDIS), University of Illinois
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)