International Terrorism

International Terrorism

International Terrorism

Embracing mainstream international law, this section on international terrorism explores the context, history and effect of the area of the law covered here.

Resources

Further Reading

    • The entry “international terrorism” in the Parry and Grant Encyclopaedic Dictionary of International Law (currently, the Encyclopaedic Dictionary of International Law, 2009), Oxford University Press
    • Aid, M. M. (2012). Intel wars: The secret history of the fight against terror. New York: Bloomsbury Press.
    • Allen, M. (2013). Blinking red: Crisis and compromise in American intelligence after 9/11. Washington, DC: Potomac Books.
    • Apuzzo, M., & Goldman, A. (2013). Enemies within: Inside the NYPD secret spying unit and bin Laden’s final plot against America. New York: Touchstone.
    • Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
    • Badey, T. J. (2001). Nuclear terrorism: Actor-based threat assessment. Intelligence and National Security, 16(2), 39–54.
    • Ball, D. J. (2002). Desperately seeking bin Laden: The intelligence dimension of the war against terrorism. In K. Booth & T. Dunne (Eds.), Worlds in collision: Terror and the future of global order (pp. 60–73). Basingstoke, U.K.: Palgrave.
    • Barger, D. G. (2005). Toward a revolution in intelligence affairs. Santa Monica, CA: RAND.
    • Beres, L. R. (1997). Preventing the ultimate nightmare: Nuclear terrorism against the United States. International Journal of Intelligence & CounterIntelligence, 10(3), 333–342.
    • Berkowitz, B. D. (2002a). Deep cover. Hoover Digest, 4.
    • Berkowitz, B. D. (2004). Intelligence for the homeland. SAIS Review, 24(1), 1–6.
    • Best, R. A., Jr. (2003). Intelligence to counter terrorism: Issues for Congress. Washington, DC: Congressional Research Service.
    • Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 81(1), 43–59.
    • Betts, R. K. (2007). Enemies of intelligence: Knowledge and power in American national security. New York: Columbia University Press.
    • Bouza, A. V. (1976). Police intelligence: The operations of an investigative unit. New York: AMS Press.
    • Bruneau, T. (2008). Democracy and effectiveness: Adapting intelligence for the fight against terrorism. International Journal of Intelligence & CounterIntelligence, 21(3), 448–460.
    • Builta, J. A., & Heller, E. N. (2011). Reflections on 10 years of counterterrorism analysis. Studies in Intelligence, 55(3), unclassified extracts, 1–15.
    • Byman, D. (2014). The intelligence war on terrorism. Intelligence & National Security, 29(6), 837–863.
    • Campbell, K. M., & Flournoy, M. A. (2001). Intelligence: The long pole in the tent. In K. M. Campbell & M. A. Flournoy (Eds.), To prevail: An American strategy for the campaign against terrorism (pp. 77–89). Washington, DC: CSIS Press.
    • Charters, D. A. (1991). Counterterrorism intelligence: Sources, methods, process, and problems. In D. A. Charters (Ed.), Democratic responses to international terrorism (pp. 227–266). Ardsley-on-Hudson, NY: Transnational.
    • Cogan, C. (2004). Hunters not gatherers: Intelligence in the twenty-first century. Intelligence & National Security, 19(2), 304–321.
    • Copeland, T. E. (2001). Is the “new terrorism” really new? An analysis of the new paradigm of terrorism. Journal of Conflict Studies, 21(2), 91–105.
    • Cronin, B. (2005). Intelligence, terrorism, and national security. Annual Review of Information Science & Technology, 39, 395–432.
    • Dahl, E. J. (2005). Warning of terror: Explaining the failure of intelligence against terrorism. Journal of Strategic Studies, 28(1), 31–55.
    • Dahl, E. J. (2014a). Finding Bin Laden: Lessons for a new American way of intelligence. Political Science Quarterly, 129(2), 179–210.
    • Danis, A. A. (2007). Al Qaeda’s surveillance offensive against America, 2000–2003: Implications for U.S. homeland countersurveillance. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 502–524). Westport, CT: Praeger.
    • Den Boer, M. (2015). Counter-terrorism, security and intelligence in the EU: Governance challenges for collection, exchange and analysis. Intelligence & National Security, 30(2–3), 402–419.
    • Enemark, C. (2006). Biological attacks and the non-state actor: A threat assessment. Intelligence & National Security, 21(6), 911–930.
    • Gazit, S., & Handel, M. I. (1980). Insurgency, terrorism, and intelligence. In R. Godson (Ed.), Intelligence requirements for the 1980s: Counterintelligence (pp. 125–158). New Brunswick, NJ: Transaction.
    • Gerecht, R. M. (2004). Not worth a blue ribbon. Washington, DC: American Enterprise Institute policy paper.
    • Gosler, J. R. (2005). The digital dimension. In J. E. Sims & B. Gerber (Eds.), Transforming intelligence (pp. 96–114). Washington, DC: Georgetown University Press.
    • Hansen, J. (2004). U.S. Intelligence confronts the future. International Journal of Intelligence & CounterIntelligence, 17(4), 673–709.
    • Hastedt, G. P. (1988). Intelligence failure and terrorism: The attack on the Marines in Beirut. Conflict Quarterly, 8(2), 7–22.
    • Hayden, M. V. (2007 September 7). Prepared remarks at the Council on Foreign Relations. New York.
    • Herman, M. (2002). 11 September: Legitimizing intelligence? International Relations, 16(2), 227–241.
    • Herman, M. (2004). Ethics and intelligence after September 2001. Intelligence & National Security, 19(2), 342–358.
    • Hitz, F. P. (2005). The myths and current reality of espionage. International Journal of Intelligence & CounterIntelligence, 18(4), 730–733.
    • Hoffman, B. (1996). Intelligence and terrorism: Emerging threats and new security challenges in the post–Cold War era. Intelligence & National Security, 11(2), 207–223.
    • Hulnick, A. S. (2005). Indications and warning for homeland security: Seeking a new paradigm. International Journal of Intelligence & CounterIntelligence, 18(4), 593–608.
    • Jenkins, B. M. (2003 March 31). Statement to the National Commission on Terrorist Attacks upon the United States. Washington, DC.
    • Jenkins, B. M. (2006b). Lessons for intelligence in the campaign against al Qaeda. Vanguard (March 1).
    • Johnson, M., & Shelton, A. (2013). Thoughts on the state of intelligence studies: A survey report. Intelligence & National Security, 28(1), 109–120.
    • Jones, S. G. (2006). Terrorism and the battle for homeland security. In R. D. Howard, J. J. F. Forest, & J. C. Moore (Eds.), Homeland security and terrorism: Readings and interpretations (pp. 266–271). New York: McGraw-Hill.
    • Kahana, E. (2005). Analyzing Israel’s intelligence failures. International Journal of Intelligence & CounterIntelligence, 18(2), 262–279.
    • Kam, E. (2004). Surprise attack: The victim’s perspective, with a new preface. Cambridge, MA: Harvard University Press.
    • Kauppi, M. V. (2006). Counterterrorism analysis and homeland security. In D. G. Kamien (Ed.), The McGraw-Hill homeland security handbook (pp. 413–426). New York: McGraw-Hill.
    • Kerstetter, W. A. (1979). Terrorism and intelligence. Terrorism: An International Journal, 3(1–2), 109–115.
    • Kibbe, J. D. (2007). Covert action and the pentagon. Intelligence & National Security, 22(1), 57–74.
    • Lander, S. (2004). International intelligence cooperation: An inside perspective. Cambridge Review of International Affairs, 17(3), 481–493.
    • Leetaru, K. (2015 April 15). Why we can’t just read english newspapers to understand terrorism, and how big data can help. Foreignpolicy.com.
    • Le Gallo, A. (2005). Covert action: A vital option in U.S. national security policy. International Journal of Intelligence & CounterIntelligence, 18(2), 354–359.
    • Lewis, O. A., & Chenoweth, E. (2007). Facilitating interagency communication and open source intelligence for counterterrorism. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 487–501). Westport, CT: Praeger.
    • Logan, K. G. (Ed.). (2010). Homeland security and intelligence. Santa Barbara, CA: Praeger.
    • Marlo, F. H. (1999). WMD terrorism and U.S. intelligence collection. Terrorism & Political Violence, 11(3), 53–71.
    • Marrin, S. (2004). Preventing intelligence failures by learning from the past. International Journal of Intelligence & CounterIntelligence, 17(4), 655–672.
    • McConnell, J. M. (2007). Remarks and Q&A by the Director of National Intelligence. Project on National Security Reform Conference (July 26), Washington, DC.
    • Motley, J. B. (1986). International terrorism: A challenge for U.S. intelligence. International Journal of Intelligence & CounterIntelligence, 1(1), 83–96.
    • Mowatt-Larssen, R. (2009). Preventing nuclear terrorism: A global intelligence imperative. Washington Institute for Near East Policy, PolicyWatch 1511, April 30.
    • National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission Report: Final Report of the National Commission on terrorist attacks upon the United States, authorized ed. New York: W. W. Norton.
    • Nomikos, J. M. (2005). A European Union intelligence service for confronting terrorism. International Journal of Intelligence & CounterIntelligence, 18(2), 191–203.
    • Norell, M. (2007). Intelligence coordination and counterterrorism: A European perspective. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 440–464). Westport, CT: Praeger.
    • Olson, J. M. (2008). Intelligence and the war on terror: How dirty are we willing to get our hands? SAIS Review, 28(1), 37–45.
    • Parker, C. F., & Stern, E. K. (2005). Bolt from the blue or avoidable failure? Revisiting September 11 and the origins of strategic surprise. Foreign Policy Analysis, 1(3), 301–331.
    • Peterson, M. (2005). Intelligence-led policing: The new intelligence architecture. Washington, DC: U.S. Department of Justice, Bureau of Justice Assistance.
    • Pillar, P. R. (2007). Adapting intelligence to changing issues. In L. K. Johnson (Ed.), Handbook of intelligence studies (pp. 148–162). London: Routledge.
    • Pita, R. (2007). Assessing al-Qaeda’s chemical threat. International Journal of Intelligence & CounterIntelligence, 20(3), 480–511.
    • Prince, J. (1989). Is there a role for intelligence in combating terrorism? Conflict, 9(3), 301–318.
    • Renfer, M. A., & Haas, H. S. (2008). Systematic analysis in counterterrorism: Messages on an Islamist internet-forum. International Journal of Intelligence & CounterIntelligence, 21(2), 314–336.
    • Richards, J. (2012). Intelligence dilemma? Contemporary counter-terrorism in a liberal democracy. Intelligence and National Security, 27(5), 761–780.
    • Rimington, S. (2005 January 3). “Humint” begins at home. Wall Street Journal, A8.
    • Rosenbach, E. (2008). The incisive fight: Recommendations for improving counterterrorism intelligence. Annals of the American Academy of Political & Social Science, 618, 133–147.
    • Rudner, M. (2004). Hunters and gatherers: The intelligence coalition against Islamic terrorism. International Journal of Intelligence & CounterIntelligence, 17(2), 193–230.
    • Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence & Counterintelligence, 26(3), 453–481.
    • Russell, R. L. (2005). A weak pillar for American national security: The CIA’s dismal performance against WMD threats. Intelligence & National Security, 20(3), 466–485.
    • Russell, R. L. (2007b). The intelligence war against global terrorism. In L. K. Johnson (Ed.), Strategic intelligence. Counterintelligence and counterterrorism: Defending the nation against hostile forces (Vol. 4, pp. 127–138). Westport, CT: Praeger.
    • Segell, G. M. (2004). Intelligence agency relations between the European Union and the U.S. International Journal of Intelligence & CounterIntelligence, 17(1), 81–96.
    • Shultz, R. H., Jr., & Beitler, R. M. (2004). Tactical deception and strategic surprise in Al-Qaida operations. Middle East Review of International Affairs, 8(2), 56–79.
    • Sims, J. E. (2005). Transforming espionage: A contrarian’s approach. Georgetown Journal of International Affairs, 6(1), 53–59.
    • Sims, J. E. (2007a). Intelligence to counter terror: The importance of all-source fusion. Intelligence & National Security, 22(1), 38–56.
    • Sinai, J. (2007). Forecasting terrorist groups’ warfare: “Conventional” to CBRN. In J. J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: International perspectives. Strategic and tactical considerations (Vol. 1, pp. 525–536). Westport, CT: Praeger.
    • Sloan, S. (2006). The new terrorist threat environment: Continuity and change in counter-terrorism intelligence. In P. Katona, M. D. Intriligator, & J. P. Sullivan (Eds.), Countering terrorism and WMD: Creating a global counter-terrorism network (pp. 199–211). London: Routledge.
    • Steiner, J. E. (2015). Homeland security intelligence. Los Angeles: CQ Press.
    • Sulc, L. (1987). Terrorism and the importance of intelligence. Studies in Conflict & Terrorism, 10(2), 133–138.
    • Svendsen, A. D. M. (2008). The globalization of intelligence since 9/11: Frameworks and operational parameters. Cambridge Review of International Affairs, 21(1), 129–144.
    • Taylor, R. W. (1987). Terrorism and intelligence. Defense & Security Analysis, 3(2), 165–175.
    • Treverton, G. F. (2009). Intelligence for an age of terror. Cambridge, U.K.: Cambridge University Press.
    • Walsh, J. I. (2010). The international politics of intelligence sharing. New York: Columbia University Press.
    • Waxman, M. C. (2009). Police and national security: American local law enforcement and counterterrorism after 9/11. Journal of National Security Law & Policy, 3, 377–407.
    • Williams, P. (2005). Warning indicators, terrorist finances, and terrorist adaptation. Strategic Insights, 4(1).
    • Wirtz, J. J. (2002). Deja Vu? Comparing Pearl Harbor and September 11. Harvard International Review, 24(3), 73–77.
    • Wirtz, J. J. (2014). The cyber Pearl Harbor. In E. O. Goldman & J. Arquilla (Eds.), Cyber analogies (pp. 7–14). Monterey, CA: Naval Postgraduate School.
    • Wright, L. (2006). The looming tower: Al Qaeda and the road to 9/11. New York: Knopf.
    • Zegart, A. B. (2007a). Spying blind: The CIA, the FBI, and the origins of 9/11. Princeton, NJ: Princeton University Press.
    • Zegart, A. B. (2007c). 9/11 and the FBI: The organizational roots of failure. Intelligence & National Security, 22(2), 165–184.

Posted

in

,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *