TerrorismandHomelandSecuritybyJonathanRWhitez-liborg.pdf

Want to turn C’s
into A’s? Obviously, right?
But the right way to go about it isn’t always so obvious. Go digital to
get the grades. MindTap’s customizable study tools and eTextbook
give you everything you need all in one place.

Engage with your course content, enjoy the flexibility of
studying anytime and anywhere, stay connected to assignment due
dates and instructor notifications with the MindTap Mobile app…

and most of all…EARN BETTER GRADES.

TO GET STARTED VISIT
WWW.CENGAGE.COM/STUDENTS/MINDTAP

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

N I N T H E D I T I O N

Jonathan R. White
Frederik Meijer Honors College
Grand Valley State University

Terrorism and
Homeland Security

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial
review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to

remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous
editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by

ISBN#, author, title, or keyword for materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version.

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Printed in the United States of America
Print Number: 01 Print Year: 2015

Terrorism and Homeland Security,
Ninth Edition,
Jonathan R. White

Product Director: Marta Lee-Perriard

Sr Product Manager: Carolyn Henderson Meier

Content Developer: Christy Frame

Product Assistant: Valerie Kraus

Sr Marketing Manager: Jennifer Levanduski

Art and Cover Direction, Production
Management, and Composition: Lumina
Datamatics, Inc.

Manufacturing Planner: Judy Inouye

Cover Image: Oleg Zabielin/Getty Images

© 2017, 2014, Cengage Learning

WCN: 02-200-203

ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced, transmitted, stored, or used in any form or
by any means graphic, electronic, or mechanical, including but not limited
to photocopying, recording, scanning, digitizing, taping, Web distribution,
information networks, or information storage and retrieval systems,
except as permitted under Section 107 or 108 of the 1976 United States
Copyright Act, without the prior written permission of the publisher.

Library of Congress Control Number: 2015951183

For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706.

For permission to use material from this text or product,
submit all requests online at www.cengage.com/permissions.

Further permissions questions can be e-mailed to
[email protected].

Student Edition:

ISBN: 978-1-305-63377-3

Loose-leaf Edition:

ISBN: 978-1-305-66020-5

Cengage Learning
20 Channel Center Street
Boston, MA 02210
USA

Cengage Learning is a leading provider of customized learning solutions
with employees residing in nearly 40 different countries and sales in more
than 125 countries around the world. Find your local representative at
www.cengage.com.

Cengage Learning products are represented in Canada by Nelson
Education, Ltd.

To learn more about Cengage Learning Solutions, visit
www.cengage.com.

Purchase any of our products at your local college store or at our
preferred online store www.cengagebrain.com.

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Dedicated to:

Gabe and Sam, my buddies for life,

Do not repay evil for evil or abuse for abuse; but, on the contrary,
repay with a blessing. It is for this that you were called—that you
might inherit a blessing. 1 Peter 3:9

With love,
Paw Paw

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

iv

ABOUT THE AUTHOR

JONATHAN WHITE is professor of Interdisciplinary Studies in the Frederik Meijer Hon-
ors College of Grand Valley State University, Allendale, Michigan. He also served
as an instructor in the Bureau of Justice Assistance, State and Local Anti-Terrorism
Training program for 15 years. He has lectured in the FBI Academy, in the Depart-
ment of State Anti-Terrorism Assistance program, in all branches of the U.S. Armed
Forces, and in law enforcement agencies throughout the world. The Founding Direc-
tor of GVSU’s School of Criminal Justice and former Dean of Social Science, he holds
a PhD in Criminal Justice and Criminology from Michigan State University and a
Master of Divinity from Western Theological Seminary.

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

v

PA R T 1 Terrorism in Historical and Social Contexts 1
1 The Shifting Definition of Terrorism 2

2 Practical Criminology, Radicalization, and
Types of Terrorism 25

3 Terrorist Financing and Money Laundering 52

4 Terrorism and the Media 78

5 Force Multipliers, Gender Roles, and Tactics 101

PA R T 2 International Terrorism: National and Ethnic
Movements 123

6 Long-Term Separatist Terrorism 124

7 Nationalistic and Endemic Terrorism 148

8 Background to the Middle East 173

9 Terrorism in Israel and Palestine 196

PA R T 3 International Terrorism: Ideological and
Religious Movements 223

10 Revolutionary and Counterrevolutionary
Terrorism 224

11 Jihadist Networks 250

PA R T 4 Domestic Terrorism and Homeland Security 279
12 Domestic Terrorism 280

13 An Introduction to Homeland Security 302

14 Organizing Homeland Security 328

15 Homeland Security and Constitutional Issues 353

16 Enforcement, Homeland Security,
and the Future 375

BRIEf CONTENTS

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

vii

CONTENTS

P R E FA C E x v i i

PA R T 1 Terrorism in Historical and Social
Contexts 1

1 The Shifting Definition of Terrorism 2
Difficulties with Definitions 3

Definitions Influenced by Social Context 3
The Importance of Defining Terrorism 4

Attempts to Define Terrorism 5
Definitions and Policy 5
An Insurmountable Problem? 6

Shifts of Meanings in History 7
The Origins of Terrorism in Western History 8
The French Revolution 9
Guerrillas and the Spanish Peninsula 9

1848 and the Radical Democrats 9
Socialists 11
Anarchists 12
Violent Anarchism 12
Anarchism and Nationalism 13

Terrorism and Revolution in Russia, 1881–1921 15
The People’s Will 15
Czar Nicholas and the Revolutions of 1905 and 1917 16
Lenin and Trotsky 17

Selective Terrorism and the Birth of the Irish Republic 17
The Early Irish Republican Army 19
The Easter Rising 20
The Black and Tan War, 1920–1921 21
Selective Terror 21

Emphasizing the Points 22
Summary of Chapter Objectives 22
Key Terms 24

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

viii ConTEnTs

2 Practical Criminology, Radicalization, and
Types of Terrorism 25
The Criminology of Terrorism 26

Differences Between Criminals and Terrorists 27

Radicalization 29
Practical Criminology and Radicalism 29
The Process of Radicalization 30
Testing Radicalization with Recent Case Studies 32
Other Cases of Radicalization 34
Commonalities in Radicalization 36
Individual Journeys 37

Two Views of Prison Radicalization 38
The Process of Radicalization in Prison 38
Questioning Prison Radicalization 39

Rejecting the Term 41
Types of Terrorism 42

Lone Wolves 43
Small Groups and Urban Terrorism 44
Guerrillas and Large Group Terrorism 47
Response to Differing Types of Terrorism 49

Emphasizing the Points 49
Summary of Chapter Objectives 50
Key Terms 51

3 Terrorist financing and Money
Laundering 52
Financial Flows 53

Money Laundering 53
Terrorist Financing 56
Comparing Money Laundering and Terrorist Financing 57
Toward a Theory of Terrorist Financing 58

Efforts to Control Terrorist Financing 59
Regulation and Enforcement 60
Efforts by the United Nations 61

Financial Information as an Investigative
and Intelligence Tool 63

Illegal Funding Methods 64
Legal Methods of Raising Funds 66

Underground Networks and Systems 66
The Hawala System 68
Hezbollah as an Example 69

The Political Economy of Terrorism 70
Narcoterrorism 72

The Link Between Drugs and Terrorism 73
Narcoterrorism Controversies 74

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

ConTEnTs ix

Emphasizing the Points 75
Summary of Chapter Objectives 75
Key Terms 77

4 Terrorism and the Media 78
The New Media Environment 79

Defining the New Media 79
Characteristics of the New Media 80
The New Media and the Internet 81
Other Aspects of the Internet 82

Trends in Research 85
A Set of Empirical Findings on Twitter 85
Televised Gender Stereotypes 86

The Media and Socially Constructed Reality 86
News Frames and Presentations 87
Types of Frames 87
Ambiguous Stories and News Frames 88
Neglecting the Domestic Front 88
Terrorism and Television 89
End of the Western Monopoly on the Old News Media 91

Issues in the Media 92
Biases in the Old Media 92
Creating Critical Reflection in the Audience 95

Censorship Debates 97
Emphasizing the Points 99
Summary of Chapter Objectives 99
Key Terms 100

5 force Multipliers, Gender Roles, and
Tactics 101
Tactics and Force Multipliers 102
Technology 103

Cyberterrorism 104
WMD: Biological Agents 105
WMD: Chemical and Radiological Weapons 106

Nuclear Terrorism 109
Economic Targeting and Transnational Attacks 111

Tourism 111
Energy 112
Transportation 113

Suicide Attacks: Conflicting Opinions 114
A Theory of Suicide Terrorism 114
Other Research on Suicide Bombing 116
Models for Suicide Bombing 117

Tactical Misunderstandings and Gender 117

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x ConTEnTs

Tactical Roles and Organization 118
Tactical Considerations 119
Overlooking Female Terrorists: A Tactical Mistake 119

Emphasizing the Points 121
Summary of Chapter Objectives 121
Key Terms 122

PA R T 2 International Terrorism: National and Ethnic
Movements 123

6 Long-Term Separatist Terrorism 124
Ethnic and Nationalist Separatist Movements 125

Characteristics of Ethnic and Nationalist Terrorism 125
Three Cases of Ethnic and Nationalist Separatism 126

Modern Terrorism in Northern Ireland 127
The IRA and the Modern “Troubles” 128
The Army and Overreaction 129
Unionist Terrorism 131

Negotiating a Peace Settlement in Ireland 132
Negotiating with Terrorists 132
Rational Political Goals and Negotiated Settlements 133

The Basque Nation and Liberty 133
Background 134
The Spanish Civil War 135
Twentieth-Century Basque Nationalism 135
The ETA Turns to Terrorism 136
ETA Tactics and Spanish Death Squads 137
Reframing the Conflict 138

The Liberation Tigers of Tamil Eelam 139
The Origins of Tamil Dissatisfaction 140
Sri Lanka and the Tamil Tigers 141
LTTE Tactics 141
Fighting Renewed 143
Government Repression after Victory 144

Emphasizing the Points 145
Summary of Chapter Objectives 145
Key Terms 147

7 Nationalistic and Endemic Terrorism 148
Nationalistic Terrorism 149

Cyprus, 1955–1959 149
The Battle for Algiers, 1954–1962 151
The Mau Mau in Kenya, 1950–1960 153

Turkey 155
Turkey’s Struggle with Terrorism 155

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

ConTEnTs xi

The Kurdistan Workers’ Party and Its Alter Egos 156

China’s Problems in Xinjiang 160
Sikh Separatism in India 162
Endemic Ethnic Terror in Sub-Saharan Africa 162
Conditions in Nigeria 163
Boko Haram and Ansaru 165

Al Shabab’s Regional Jihad 167

Emphasizing the Points 171
Summary of Chapter Objectives 171
Key Terms 172

8 Background to the Middle East 173
Defining the Middle East 174
A Brief Introduction to Islam 175

The Centrality of Mohammed’s Revelation 175
Creating the Muslim Community at Medina 176
The Shi’ite–Sunni Split 176
The Golden Age of Arabs 178

Synopsis of Traditional Middle Eastern Issues 180
Three Sources of Violence in the Middle East 181
The Early Zionist Movement in Palestine 182
World War I and Contradictory Promises 183
The Birth of Israel 184
Arab Power Struggles and Arab–Israeli Wars 185
The Return of Terrorism 188

Iran 189
Uniquely Persian 189
British Influence and Control 190
Prelude to the 1979 Revolution 190
The Revolution 191
The Call to Karbala 193

Emphasizing the Points 194
Summary of Chapter Objectives 194
Key Terms 195

9 Terrorism in Israel and Palestine 196
Messy Definition 197

Fatah and the Six-Day War 197
The 1982 Invasion of Lebanon 200

Factionalism in Palestinian Terrorism 200
Major Groups 201

Hezbollah: Local and International 204
The Origins of Hezbollah 204
Hezbollah’s Operational Capabilities 209

Hamas and the Rise of Sunni Religious Organizations 212

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

xii ConTEnTs

An Overview of Hamas 212
Struggles for Leadership 212
The al Aqsa Intifada 213
Seeking Election 213
Hamas Versus Fatah 214
Rockets and Operation Cast Lead 215
Unity? 215

Fatah Restructured: The al Aqsa Martyrs Brigades 216
Effective Tactics 216
Leadership of the Martyrs Brigades 217
Beginning a Network 217

Controversial Counterterrorist Policies 219
Bulldozing 219
Invading Lebanon 220
The Wall 220
Selective Assassination 220

Emphasizing the Points 221
Summary of Chapter Objectives 221
Key Terms 222

PA R T 3 International Terrorism: Ideological and
Religious Movements 223

10 Revolutionary and  Counterrevolutionary
Terrorism 224
Revolutionary Terrorism 225

Revolutionary and Counterrevolutionary Terrorism Defined 225
Modeling Revolutionary Terrorism: Uruguay’s Tupamaros 226
Urban Guerrillas 228
Counterrevolutionary Terrorism 229
Early Successes 229
Tupamaro Organization 230
Influencing Modern Terrorism 232

Examples of Modern Revolutionary Terrorism 233
FARC 233
The ELN 236
The MeK 238

Maoist Revolutionary Terrorism 239
Peru’s Shining Path 240
Naxalites of India 241
The New People’s Army 244

Death Squads and Counterrevolutionaries 245
Emphasizing the Points 248
Summary of Chapter Objectives 248
Key Terms 249

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

ConTEnTs xiii

11 Jihadist Networks 250
Jihadi Salafism 251
Militant Scholars and Strategists 252

Taqi al Din ibn Taymiyya 252
Mohammed ibn Abdul Wahhab 253
Sayyid Qutb 253
Abu Musab al Suri 254
Abu Bakr Naji 254
When Do Jihadi Salafists Become Devout? 255

Al Qaeda from Inception to 9/11 256
Osama bin Laden, Ayman al Zawahiri, and al Qaeda 256
Declaring War on Americans, Jews, and Crusaders 259

Al Qaeda: Degraded, Transformed, and Franchised 259
Major Franchises Swearing Fealty to al Qaeda Core 261
Conflict in the Franchise: Jabhat al Nusra and ISIS 265
The Islamic State of Iraq 266
ISI Reborn 267
Jabhat al Nusra 267
ISIS 268
ISIS and the Caliphate 268
Conflict within the Jihad 269
Foreign Fighters 269

A Survey of Other Groups 270
Lashkar-e-Taiba 270
The Pakistani Taliban 271
Thailand 273
Jihadi Salafism in Indonesia 274
Jihadi Salafism in the Philippines 275

Emphasizing the Points 276
Summary of Chapter Objectives 276
Key Terms 278

PA R T 4 Domestic Terrorism and Homeland
Security 279

12 Domestic Terrorism 280
The Meaning of Domestic Terrorism 281

Growing Clarity 281
Extremism Versus Terrorism 282
Categorizing Domestic Terrorism 282

Racism and Terrorism 284
Violent White Supremacy Movements 284
American’s Most Successful Terrorist Group 286

Violent Right-Wing Extremism 286
Antigovernment Extremism 287
Sovereign Citizens 287

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

xiv ConTEnTs

Contemporary Right-Wing Behavior, Beliefs, and Tactics 288
The Turner Diaries and Hunter: Blueprints for Revolution 289
Resurgent Violent Right-Wing Extremism 290

Shifting from Left-Wing Violence to Single Issues 291
The Demise of the Left 291
The Rise of Single Issues 292
Ecoterrorism, Animal Rights, and Genetic Engineering 292
Antiabortion Violence 294

Homegrown Jihadists 296
Emphasizing the Points 299
Summary of Chapter Objectives 300
Key Terms 301

13 An Introduction
to Homeland Security 302
Many Meanings of Homeland Security 303

Defining and Evaluating a Mission 303
Security Missions 304

Agencies Charged with Preventing
and Interdicting Terrorism 305

The Department of Homeland Security 305
The Department of Justice 307
The Department of Defense 307
The Intelligence Community 308
State and Local Enforcement 309

Building Intelligence Systems 309
The Intelligence Process 309
National Security and Criminal Intelligence 310
A Checkered Past 311
Domestic Intelligence Networks 313
Fusion Centers 314
Fusion Center Intelligence 315
U.S. Attorneys and JTTFs 316

Issues in Homeland Security 317
Enforcement’s Special Role 317
The Role of Symbols and Structures 318
Planning for Homeland Security 319
Creating a Culture of Information Sharing 320

Intelligence Reform 322
Moving in the Right Direction? 322
Redirecting the Focus of Reform 323
Target-Based Analysis 324
The Need for Reform Questioned 324

Emphasizing the Points 325
Summary of Chapter Objectives 325
Key Terms 327

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

ConTEnTs xv

14 Organizing Homeland Security 328
Bureaucratic Complexity 329

The Impact of Bureaucracy 329
The Numbers Problem 329
Reforming Bureaucracy 330

Bureaucratic Problems 331
Federal Rivalries 331
FBI Versus Locals 331
Local Control and Revenue Sources 332
Legal Bureaucracy 332

Bureaucratic Solutions 333
Preparing for Successful Enforcement Processes 334
New Approaches to the Enforcement Mission 335

Bureaucracies Against Terrorism 336
Intelligence and Bureaucracy 336
State and Local Enforcement Bureaucracies 338

Border Protection 340
Policy Disputes 341
The Immigration Debate 342
Border Security: Critique and Reform 344

Infrastructure Protection 346
Private Versus Governmental Partnerships 346
The Need for Private Partnerships 347
Government Partnerships 347
The Federal Mission 348
Expanding Local Roles 348
Thinking Internationally 349

Responding to Disasters 350
Emphasizing the Points 350
Summary of Chapter Objectives 351
Key Terms 352

15 Homeland Security and Constitutional
Issues 353
Security and Civil Liberties 354
Security and Civil Liberties Trade-Offs 355

Human Rights and Civil Liberties 356

Domestic Intelligence 357
The USA PATRIOT Acts of 2001, 2005, 2006, 2011,
and 2015 357
Debate and the 2006 358
Extending Provisions in 2011 359
Controversy Continued 359
Debate in 2015 360
The USA FREEDOM Act of 2015 361

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

xvi ConTEnTs

Terrorism and the Constitution 361
Separation of Powers 362
Terrorism and the Bill of Rights 362
Fear of Enforcement Power 363
Increased Executive Powers 364
Executive Power and the Courts 366

Civil Liberties and Police Work 367
Controversies in Enforcement 367
National Security and Crime 368
Intelligence, Networks, and Roles 369
Emerging Critiques in the Academic Community 371

Emphasizing the Points 372
Summary of Chapter Objectives 373
Key Terms 374

16 Enforcement, Homeland Security,
and the future 375
Homeland Security and Community Policing 376

Support for Homeland Security through Community
Policing 377
Shifting Police Roles 378
Community Partnerships and the Future 380
The Style of Future Policing 380

Militarization and Police Work 381
The Problem of Militarization 381
Obtaining Military Equipment 383
Militarization and the “War on Drugs” 384

Future Information Sharing 385
Multilevel Communication and Sharing 385
Overcoming Barriers to Sharing 386
The Private Industry Problem 387

Future Terrorist Tactics 390
Swarming and Multiple Attacks 390
Blending Criminal and Terrorist Networks 392
Other Tactical Trends 393

Emphasizing the Points 396
Summary of Chapter Objectives 396
Key Terms 398

GlossARy 399

WoRks CiTEd 419

indEx 455

Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

xvii

PREfACE

I began work on the first edition of this book 30 years ago and have reworked it
several times to describe constant changes in causes, groups, tactics, and issues. Ter-
rorists constantly employ new methods of murder and destruction as the face of ter-
rorism changes. Yet, no matter how terrorism mutates, one aspect remains constant.
Technology provides the means for a relatively small group of violent people to ter-
rorize nation-states, including superpowers.

Professors who have used previous editions of this book have asked for changes
and updates to this text. In addition, they have offered valuable critiques, suggestions
for new material, and corrections of factual errors. Many of them asked me to reduce
historical coverage and to increase discussions of trends and future directions. I hope
this new addition meets their expectations, although I do utilize historical discussions
to place contemporary events and probable future issues in context.

While this is a new edition, the purpose of the book remains the same. It is de-
signed to introduce criminal justice and other social science students to the field of
terrorism and homeland security. The book is also meant to provide a pragmatic
background for the law enforcement, intelligence, and military communities. It is a
basic, practical introduction for people who will or already do face the threat of
terrorism. Many theories, polemics, and models are summarized and compared, but
readers will find no grand theory. The purpose is to expose readers to a vast array of
issues, campaigns, theories, and opinions.

As stated in the previous editions, issues surrounding terrorism are emotionally
charged. Therefore, the information in this text is presented from a variety of posi-
tions. The purpose is to explain various points of view without taking sides. Students
are exposed to differing interpretations of issues that have spawned heated contro-
versies. Hopefully, the text presents enough information to allow students to make
informed decisions.

Overview
This text is designed to provide readers with basic information. The purpose is to
provide the background for understanding terrorist movements …

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH