International Terrorism
International Terrorism
Embracing mainstream international law, this section on international terrorism explores the context, history and effect of the area of the law covered here.
Resources
Further Reading
-
- The entry “international terrorism” in the Parry and Grant Encyclopaedic Dictionary of International Law (currently, the Encyclopaedic Dictionary of International Law, 2009), Oxford University Press
- Aid, M. M. (2012). Intel wars: The secret history of the fight against terror. New York: Bloomsbury Press.
- Allen, M. (2013). Blinking red: Crisis and compromise in American intelligence after 9/11. Washington, DC: Potomac Books.
- Apuzzo, M., & Goldman, A. (2013). Enemies within: Inside the NYPD secret spying unit and bin Laden’s final plot against America. New York: Touchstone.
- Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
- Badey, T. J. (2001). Nuclear terrorism: Actor-based threat assessment. Intelligence and National Security, 16(2), 39–54.
- Ball, D. J. (2002). Desperately seeking bin Laden: The intelligence dimension of the war against terrorism. In K. Booth & T. Dunne (Eds.), Worlds in collision: Terror and the future of global order (pp. 60–73). Basingstoke, U.K.: Palgrave.
- Barger, D. G. (2005). Toward a revolution in intelligence affairs. Santa Monica, CA: RAND.
- Beres, L. R. (1997). Preventing the ultimate nightmare: Nuclear terrorism against the United States. International Journal of Intelligence & CounterIntelligence, 10(3), 333–342.
- Berkowitz, B. D. (2002a). Deep cover. Hoover Digest, 4.
- Berkowitz, B. D. (2004). Intelligence for the homeland. SAIS Review, 24(1), 1–6.
- Best, R. A., Jr. (2003). Intelligence to counter terrorism: Issues for Congress. Washington, DC: Congressional Research Service.
- Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 81(1), 43–59.
- Betts, R. K. (2007). Enemies of intelligence: Knowledge and power in American national security. New York: Columbia University Press.
- Bouza, A. V. (1976). Police intelligence: The operations of an investigative unit. New York: AMS Press.
- Bruneau, T. (2008). Democracy and effectiveness: Adapting intelligence for the fight against terrorism. International Journal of Intelligence & CounterIntelligence, 21(3), 448–460.
- Builta, J. A., & Heller, E. N. (2011). Reflections on 10 years of counterterrorism analysis. Studies in Intelligence, 55(3), unclassified extracts, 1–15.
- Byman, D. (2014). The intelligence war on terrorism. Intelligence & National Security, 29(6), 837–863.
- Campbell, K. M., & Flournoy, M. A. (2001). Intelligence: The long pole in the tent. In K. M. Campbell & M. A. Flournoy (Eds.), To prevail: An American strategy for the campaign against terrorism (pp. 77–89). Washington, DC: CSIS Press.
- Charters, D. A. (1991). Counterterrorism intelligence: Sources, methods, process, and problems. In D. A. Charters (Ed.), Democratic responses to international terrorism (pp. 227–266). Ardsley-on-Hudson, NY: Transnational.
- Cogan, C. (2004). Hunters not gatherers: Intelligence in the twenty-first century. Intelligence & National Security, 19(2), 304–321.
- Copeland, T. E. (2001). Is the “new terrorism” really new? An analysis of the new paradigm of terrorism. Journal of Conflict Studies, 21(2), 91–105.
- Cronin, B. (2005). Intelligence, terrorism, and national security. Annual Review of Information Science & Technology, 39, 395–432.
- Dahl, E. J. (2005). Warning of terror: Explaining the failure of intelligence against terrorism. Journal of Strategic Studies, 28(1), 31–55.
- Dahl, E. J. (2014a). Finding Bin Laden: Lessons for a new American way of intelligence. Political Science Quarterly, 129(2), 179–210.
- Danis, A. A. (2007). Al Qaeda’s surveillance offensive against America, 2000–2003: Implications for U.S. homeland countersurveillance. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 502–524). Westport, CT: Praeger.
- Den Boer, M. (2015). Counter-terrorism, security and intelligence in the EU: Governance challenges for collection, exchange and analysis. Intelligence & National Security, 30(2–3), 402–419.
- Enemark, C. (2006). Biological attacks and the non-state actor: A threat assessment. Intelligence & National Security, 21(6), 911–930.
- Gazit, S., & Handel, M. I. (1980). Insurgency, terrorism, and intelligence. In R. Godson (Ed.), Intelligence requirements for the 1980s: Counterintelligence (pp. 125–158). New Brunswick, NJ: Transaction.
- Gerecht, R. M. (2004). Not worth a blue ribbon. Washington, DC: American Enterprise Institute policy paper.
- Gosler, J. R. (2005). The digital dimension. In J. E. Sims & B. Gerber (Eds.), Transforming intelligence (pp. 96–114). Washington, DC: Georgetown University Press.
- Hansen, J. (2004). U.S. Intelligence confronts the future. International Journal of Intelligence & CounterIntelligence, 17(4), 673–709.
- Hastedt, G. P. (1988). Intelligence failure and terrorism: The attack on the Marines in Beirut. Conflict Quarterly, 8(2), 7–22.
- Hayden, M. V. (2007 September 7). Prepared remarks at the Council on Foreign Relations. New York.
- Herman, M. (2002). 11 September: Legitimizing intelligence? International Relations, 16(2), 227–241.
- Herman, M. (2004). Ethics and intelligence after September 2001. Intelligence & National Security, 19(2), 342–358.
- Hitz, F. P. (2005). The myths and current reality of espionage. International Journal of Intelligence & CounterIntelligence, 18(4), 730–733.
- Hoffman, B. (1996). Intelligence and terrorism: Emerging threats and new security challenges in the post–Cold War era. Intelligence & National Security, 11(2), 207–223.
- Hulnick, A. S. (2005). Indications and warning for homeland security: Seeking a new paradigm. International Journal of Intelligence & CounterIntelligence, 18(4), 593–608.
- Jenkins, B. M. (2003 March 31). Statement to the National Commission on Terrorist Attacks upon the United States. Washington, DC.
- Jenkins, B. M. (2006b). Lessons for intelligence in the campaign against al Qaeda. Vanguard (March 1).
- Johnson, M., & Shelton, A. (2013). Thoughts on the state of intelligence studies: A survey report. Intelligence & National Security, 28(1), 109–120.
- Jones, S. G. (2006). Terrorism and the battle for homeland security. In R. D. Howard, J. J. F. Forest, & J. C. Moore (Eds.), Homeland security and terrorism: Readings and interpretations (pp. 266–271). New York: McGraw-Hill.
- Kahana, E. (2005). Analyzing Israel’s intelligence failures. International Journal of Intelligence & CounterIntelligence, 18(2), 262–279.
- Kam, E. (2004). Surprise attack: The victim’s perspective, with a new preface. Cambridge, MA: Harvard University Press.
- Kauppi, M. V. (2006). Counterterrorism analysis and homeland security. In D. G. Kamien (Ed.), The McGraw-Hill homeland security handbook (pp. 413–426). New York: McGraw-Hill.
- Kerstetter, W. A. (1979). Terrorism and intelligence. Terrorism: An International Journal, 3(1–2), 109–115.
- Kibbe, J. D. (2007). Covert action and the pentagon. Intelligence & National Security, 22(1), 57–74.
- Lander, S. (2004). International intelligence cooperation: An inside perspective. Cambridge Review of International Affairs, 17(3), 481–493.
- Leetaru, K. (2015 April 15). Why we can’t just read english newspapers to understand terrorism, and how big data can help. Foreignpolicy.com.
- Le Gallo, A. (2005). Covert action: A vital option in U.S. national security policy. International Journal of Intelligence & CounterIntelligence, 18(2), 354–359.
- Lewis, O. A., & Chenoweth, E. (2007). Facilitating interagency communication and open source intelligence for counterterrorism. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 487–501). Westport, CT: Praeger.
- Logan, K. G. (Ed.). (2010). Homeland security and intelligence. Santa Barbara, CA: Praeger.
- Marlo, F. H. (1999). WMD terrorism and U.S. intelligence collection. Terrorism & Political Violence, 11(3), 53–71.
- Marrin, S. (2004). Preventing intelligence failures by learning from the past. International Journal of Intelligence & CounterIntelligence, 17(4), 655–672.
- McConnell, J. M. (2007). Remarks and Q&A by the Director of National Intelligence. Project on National Security Reform Conference (July 26), Washington, DC.
- Motley, J. B. (1986). International terrorism: A challenge for U.S. intelligence. International Journal of Intelligence & CounterIntelligence, 1(1), 83–96.
- Mowatt-Larssen, R. (2009). Preventing nuclear terrorism: A global intelligence imperative. Washington Institute for Near East Policy, PolicyWatch 1511, April 30.
- National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final Report of the National Commission on terrorist attacks upon the United States, authorized ed. New York: W. W. Norton.
- Nomikos, J. M. (2005). A European Union intelligence service for confronting terrorism. International Journal of Intelligence & CounterIntelligence, 18(2), 191–203.
- Norell, M. (2007). Intelligence coordination and counterterrorism: A European perspective. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 440–464). Westport, CT: Praeger.
- Olson, J. M. (2008). Intelligence and the war on terror: How dirty are we willing to get our hands? SAIS Review, 28(1), 37–45.
- Parker, C. F., & Stern, E. K. (2005). Bolt from the blue or avoidable failure? Revisiting September 11 and the origins of strategic surprise. Foreign Policy Analysis, 1(3), 301–331.
- Peterson, M. (2005). Intelligence-led policing: The new intelligence architecture. Washington, DC: U.S. Department of Justice, Bureau of Justice Assistance.
- Pillar, P. R. (2007). Adapting intelligence to changing issues. In L. K. Johnson (Ed.), Handbook of intelligence studies (pp. 148–162). London: Routledge.
- Pita, R. (2007). Assessing al-Qaeda’s chemical threat. International Journal of Intelligence & CounterIntelligence, 20(3), 480–511.
- Prince, J. (1989). Is there a role for intelligence in combating terrorism? Conflict, 9(3), 301–318.
- Renfer, M. A., & Haas, H. S. (2008). Systematic analysis in counterterrorism: Messages on an Islamist internet-forum. International Journal of Intelligence & CounterIntelligence, 21(2), 314–336.
- Richards, J. (2012). Intelligence dilemma? Contemporary counter-terrorism in a liberal democracy. Intelligence and National Security, 27(5), 761–780.
- Rimington, S. (2005 January 3). “Humint” begins at home. Wall Street Journal, A8.
- Rosenbach, E. (2008). The incisive fight: Recommendations for improving counterterrorism intelligence. Annals of the American Academy of Political & Social Science, 618, 133–147.
- Rudner, M. (2004). Hunters and gatherers: The intelligence coalition against Islamic terrorism. International Journal of Intelligence & CounterIntelligence, 17(2), 193–230.
- Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence & Counterintelligence, 26(3), 453–481.
- Russell, R. L. (2005). A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence & National Security, 20(3), 466–485.
- Russell, R. L. (2007b). The intelligence war against global terrorism. In L. K. Johnson (Ed.), Strategic intelligence. Counterintelligence and counterterrorism: Defending the nation against hostile forces (Vol. 4, pp. 127–138). Westport, CT: Praeger.
- Segell, G. M. (2004). Intelligence agency relations between the European Union and the U.S. International Journal of Intelligence & CounterIntelligence, 17(1), 81–96.
- Shultz, R. H., Jr., & Beitler, R. M. (2004). Tactical deception and strategic surprise in Al-Qaida operations. Middle East Review of International Affairs, 8(2), 56–79.
- Sims, J. E. (2005). Transforming espionage: A contrarian’s approach. Georgetown Journal of International Affairs, 6(1), 53–59.
- Sims, J. E. (2007a). Intelligence to counter terror: The importance of all-source fusion. Intelligence & National Security, 22(1), 38–56.
- Sinai, J. (2007). Forecasting terrorist groups’ warfare: “Conventional” to CBRN. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 525–536). Westport, CT: Praeger.
- Sloan, S. (2006). The new terrorist threat environment: Continuity and change in counter-terrorism intelligence. In P. Katona, M. D. Intriligator, & J. P. Sullivan (Eds.), Countering terrorism and WMD: Creating a global counter-terrorism network (pp. 199–211). London: Routledge.
- Steiner, J. E. (2015). Homeland security intelligence. Los Angeles: CQ Press.
- Sulc, L. (1987). Terrorism and the importance of intelligence. Studies in Conflict & Terrorism, 10(2), 133–138.
- Svendsen, A. D. M. (2008). The globalization of intelligence since 9/11: Frameworks and operational parameters. Cambridge Review of International Affairs, 21(1), 129–144.
- Taylor, R. W. (1987). Terrorism and intelligence. Defense & Security Analysis, 3(2), 165–175.
- Treverton, G. F. (2009). Intelligence for an age of terror. Cambridge, U.K.: Cambridge University Press.
- Walsh, J. I. (2010). The international politics of intelligence sharing. New York: Columbia University Press.
- Waxman, M. C. (2009). Police and national security: American local law enforcement and counterterrorism after 9/11. Journal of National Security Law & Policy, 3, 377–407.
- Williams, P. (2005). Warning indicators, terrorist finances, and terrorist adaptation. Strategic Insights, 4(1).
- Wirtz, J. J. (2002). Deja Vu? Comparing Pearl Harbor and September 11. Harvard International Review, 24(3), 73–77.
- Wirtz, J. J. (2014). The cyber Pearl Harbor. In E. O. Goldman & J. Arquilla (Eds.), Cyber analogies (pp. 7–14). Monterey, CA: Naval Postgraduate School.
- Wright, L. (2006). The looming tower: Al Qaeda and the road to 9/11. New York: Knopf.
- Zegart, A. B. (2007a). Spying blind: The CIA, the FBI, and the origins of 9/11. Princeton, NJ: Princeton University Press.
- Zegart, A. B. (2007c). 9/11 and the FBI: The organizational roots of failure. Intelligence & National Security, 22(2), 165–184.
Leave a Reply