0% found this document useful (0 votes)
299 views

Terrorism Reading List

This course provides an advanced understanding of terrorism and counterterrorism through a multidisciplinary lens. It will cover the history, theories, and case studies of both terrorism and counterterrorism. Students will complete two essays and a final exam as part of their course assessment. The course is taught on Tuesdays from 0900-1100 in Strand Room S3.30 and led by Prof. Peter Neumann along with two other instructors. Key topics to be addressed include different approaches to studying terrorism, relevant concepts and issues, and case studies of terrorist groups and counterterrorism strategies.

Uploaded by

Victoria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
299 views

Terrorism Reading List

This course provides an advanced understanding of terrorism and counterterrorism through a multidisciplinary lens. It will cover the history, theories, and case studies of both terrorism and counterterrorism. Students will complete two essays and a final exam as part of their course assessment. The course is taught on Tuesdays from 0900-1100 in Strand Room S3.30 and led by Prof. Peter Neumann along with two other instructors. Key topics to be addressed include different approaches to studying terrorism, relevant concepts and issues, and case studies of terrorist groups and counterterrorism strategies.

Uploaded by

Victoria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

7SSWM022

Terrorism and Counterterrorism


Day and Time: Tuesdays 0900-1100
Room: Strand Room S3.30

Aims and Introduction

This course provides an advanced foundation and comprehensive understanding


of two of the most contested concepts in contemporary political discourse,
terrorism and counterterrorism, and their relationship with relevant and related
issues in the field of security studies. Based on the multi-dimensional and multi-
disciplinary nature of the phenomenon, the programme provides an overview of
the history of terrorism and counter-terrorism, the theories and paradigms
related to these concepts, and the means of assessing them critically. In
particular, the course will provide knowledge and understanding of the
following:

 An understanding of the various approaches to studying terrorism.


 Terrorism: that is, history, relevant concepts, case studies, and issues.
 Counter-terrorism: that is, history, relevant concepts, case studies, and
issues.

Course Team

 Prof Peter Neumann (course convenor), [email protected], Office:


K6.53; Office Hours: please book appointment: Katie Rothman:
[email protected]

 Dr Alexander Meleagrou Hitchens, [email protected], Office:


K6.53; Office Hours: please email to book appointment

 Dr Frank Foley – [email protected]

Assignments and Course Assessment

Your mark for this course will be based on two 1,500 word essays, due on 8
December (1st Essay) and 20 March (2nd Essay), as well as a three-hour exam to
be held in the third term. The mark from each of your essays will count 25%
towards your final mark for the course. The exam will count 50%.

Each essay will critically address one of the questions and issues provided in the
‘Essay Topics’ list provided by the course convenors. You are free to choose any
topic from the list.

1
Expectations and responsibilities

Achieving the aims of the course will depend on all working together to help
each other through some often quite difficult material. Each session will begin
with a formal lecture and most will be followed by a tutorial discussion, led by a
member of academic staff. To get the most out of both the lecture and the
tutorial discussion, it is important that you do the assigned reading beforehand.

Attendance is expected. As you will know from the programme handbook, you
are obliged to maintain academic standards, including fulfilling all programme
and module requirements to the satisfaction of relevant teaching staff,
including, inter alia, demonstrating due industry, such as completing
assignments and satisfactory attendance We will keep an attendance record and
we are required to report two consecutive missed classes. If you are struggling
to meet deadlines or with any aspect of the course, please contact your personal
tutor as soon as possible. We have procedures in place (e.g. mitigating
circumstances form) to help but you must follow the correct procedures.

2
Course Overview: Terrorism and Counter Terrorism (7SSWM022)
Wk Date Topic Taught
. by
Term 1
1 22/09 Introduction to Course PN/AMH
Research Methods Workshop /FF
PART 1: STUDYING TERRORISM
2 29/09 Definitions PN
3 6/10 “Critical Terrorism Studies” JG
4 13/10 Historical Approaches JB
5 20/10 Political Science, Sociology and International Relations PN
PART 2: TERRORISM
6 27/10 Understanding ISIS in Syria and Iraq *Madrid* SM
7 3/11 Terrorist Aims and Ideologies PN
8 10/11 Terrorist Strategy PN
Case Studies
9 17/11 Terrorist Groups and Organisation PN
10 24/11 Right-wing Terrorism AMH
11 1/12 Left-Wing Terrorism AMH
12 8/12 Terrorism in East Africa: The Al-Shabaab Network AMH
Term 2
13 5/01 Exams week: No Class
14 19/01 Intelligence and Terrorism FF
PART 3: COUNTERTERRORISM
15 26/01 Counterterrorism and the Liberal State PN
16 2/02 Foreign Policy and International CT Cooperation PN
Case Studies
17 9/02 Countering Violent Extremism in France and Britain FF
18 16/02 The United Kingdom and Contest DO
Issues
19 23/02 Foreign Policy and International CT Cooperation PN
20 1/03 Terrorism, Torture and Human Rights FF
21 8/03 CVE, Counter and Deradicalisation AMH
22 15/03 Gender, Masculinity, Extremism, Terrorism and Counter-Terrorism JC/EP
REVISION
23 22/03 Exam revision AMH/FF/
PN

PN = Prof Peter Neumann; AMH = Alexander Meleagrou-Hitchens; FF=Dr Frank


Foley; JB=Dr John Bew; SM = Dr. Shiraz Maher; DO = Sir David Omand; JG=Dr
Jeroen Gunning; JC = Joanna Cook; EP = Elizabeth Pearson

Key Texts

 John Bew, Martyn Frampton and Inigo Gurruchaga, Talking to Terrorists:


Making Peace in Northern Ireland and the Basque Country (London: Hurst
and Co, 2009)
 Eli Berman, Radical, Religious and Violent: The New Economics of Terrorism
(Cambridge, Massachusetts: The MIT Press, 2009)
 Tore Bjorgo (ed.), Root Causes of Terrorism (London: Routledge, 2005)

3
 Bruce Bognor, Lisa M. Brown, Larry E. Beutler, James. N. Breckenridge, Philip
G. Zimbardo (eds.), Psychology of Terrorism. (Oxford: Oxford University
Press, 2007)
 Ronald Crelinsten, Counterterrorism (Cambridge: Polity Press, 2008)
 Martha Crenshaw (ed.), Terrorism in Context (Pennsylvania State University
Press: Philadelphia, 2001)
 Audrey Cronin, How Terrorism Ends: Understanding the Decline and Demise
of Terrorist Campaigns (Princeton and Oxford: Princeton University Press,
2009)
 Audrey Cronin, James Ludes (eds.), Attacking Terrorism (Georgetown, 2004)
 Paul K. David and Kim Cragin (eds.), Social Science for Counterterrorism:
Putting the Pieces Together (Santa Monica, CA: RAND, 2009) (Download for
free at: http://www.rand.org/pubs/monographs/MG849/)
 Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University
Press, 2006)
 Peter Neumann, Old and New Terrorism (Cambridge: Polity Press, 2009)
 David Omand, Securing the State (London: Hurst and Co., 2010)
 Marc Sageman, Understanding Terrorist Networks (Philadelphia:
Pennsylvania University Press, 2004)
 Robert J. Ursano, Carol S. Fullerton and Ann E. Norwood (eds.), Terrorism
and Disaster: Individual and Community Mental Health Interventions.
(Cambridge: Cambridge University Press, 2003)
 Andrew Silke, The Psychology of Counter-Terrorism (Abingdon: Routledge,
2011)
 Frank Foley, Countering Terrorism in Britain and France: Institutions, Norms
and the Shadow of the Past (Cambridge University Press, 2013)
 Walter Laqueur, A History of Terrorism (Transaction, 2001)

Essential Journals

 Critical Studies on Terrorism


 Democracy and Terrorism
 Foreign Affairs
 International Affairs
 International Security
 Studies in Conflict and Terrorism
 Survival
 Terrorism and Political Violence

Accessing Readings

Whenever possible we have tried to assign readings available in digital form


from the list of electronic journals at KCL: http://metalib.kcl.ac.uk/V/?func=find-
ej-1

4
You may also find it useful to apply to the University of London’s Senate House
Library for borrowing privileges. As well as two million books, they have
excellent e-journal holdings: http://www.ull.ac.uk/

5
Reading Recommendations

1 Introduction to the Course and Research Methods Workshop

No reading required

2 Defining Terrorism

 Martha Crenshaw, ‘The Causes of Terrorism’, Comparative Politics, 13(4)


(1981), pp. 379-99
 Audrey Kurth Cronin, ‘How al-Qaida Ends: The Decline and Demise of
Terrorist Groups’, International Security, 31(1) (2006)
 Audrey Kurth Cronin, ‘Behind the Curve: Globalization and International
Terrorism’, International Security, 27(3) (2002), pp. 30-58
 Donatella Della Porta (ed.), Social Movements and Violence: Participation in
Underground Organizations (Greenwich: JAI Press, 1992)
 Alan Dershowitz, Why Terrorism Works: Understanding the Threat,
Responding to the Challenge (New Haven and London: Yale University Press,
2002)
 William L. Eubank and Leonard Weinberg, ’Does Democracy Encourage
Terrorism?’, Terrorism and Political Violence, 6(4) (1004), pp. 417-43
 *** Bruce Hoffmann, Inside Terrorism, 2nd ed. (New York: Columbia University
Press, 2006), Chapter 1 ‘Defining Terrorism’
 Walter Laqueur, ‘Postmodern Terrorism: New Rules for an Old Game’, Foreign
Affairs, 75(5) (1996), pp. 24-36
 Walter Laqueur, The New Terrorism: Fanaticism and the Arms of Mass
Destruction (Oxford: Oxford University Press, 1999)
 Tamar Meisels, ‘The Trouble with Terror: The Apologetics of Terrorism – a
Refutation’, Terrorism and Political Violence, 18(3) (2006), pp. 465-83
 John Mueller, ‘Six Rather Unusual Propositions about Terrorism’, Terrorism
and Political Violence, 17(4) (2005), pp. 487-505
 Louise Richardson, What Terrorists Want: Understanding the Terrorist
Threat (London: John Murray, 2006)
 Tom Rockmore, Joseph Margolis, and Armen Marsoobian, The Philosophical
Challenge of September 11 (Oxford: Blackwell, 2005)
 *** Alex Schmid, ’Terrorism – The Definitional Problem’, Case Western
Reserve Journal of International Law, 36(2-3) (2004), pp. 375-419
 Alex Schmid and Albert Jongman, Political Terrorism, 2nd ed. (New Brunswick:
Transaction Books, 1988)
 Grant Wardlaw, Political Terrorism: Theory, Tactics, and Counter-measures,
2nd ed. (Cambridge: Cambridge University Press, 1989)
 *** Leonard Weinberg and Ami Pedahzur and Sivan Hirsch-Hoefler, ’The
Challenges of Conceptualizing Terrorism’, Terrorism and Political Violence,
16(4) (2004), pp. 777-94
 Daivd J. Whittaker, The Terrorism Reader, 3rd ed. (London: Routledge, 2007)
 Paul Wilkinson, Terrorism and the Liberal State (London and Basingstoke,
Macmillan, 1977)

6
3 “Critical Terrorism Studies”

 Tore Bjorgo (ed.), Root Causes of Terrorism (London: Routledge, 2005)


 *** Jeroen Gunning, 'A Case for Critical Terrorism Studies?' , Government and
Opposition, 42(3) (2007), pp. 363-93
 Jeroen Gunning, ‘Babies and bathwaters: reflecting on the pitfalls of critical
terrorism studies’, European Political Science 6 (3) (2007), pp. 236-43
 Edward Herman and Gerry O’Sullivan, The Terrorism Industry: The Experts
and Institutions that Shape Our View of Terror (New York: Routledge, 1991)
 *** John Horgan and Michael Boyle, ‘A case against ‘critical terrorism
studies’, Critical Studies on Terrorism, 1(1) (2007), pp. 51-64
 *** Magnus Ranstorp, ‘Introduction: mapping terrorism research – challenges
and priorities’ in Magnus Ranstorp (ed.), Mapping Terrorism Research: State
of the Art, Gaps and Future Direction (London and New York: Routledge,
2007)
 Walter Reich (ed.), Origins of terrorism: Psychologies, ideologies, theologies,
states of mind (Baltimore, MD: Johns Hopkins University Press, 1998).
 Marc Sageman, Understanding Terror Networks (Philadelphia, PA:
Pennsylvania University Press, 2004)
 Joshua Sinai, ‘New trends in terrorism studies: strengths and weaknesses’ in
Magnus Ranstorp (ed.), Mapping Terrorism Research: State of the Art, Gaps
and Future Direction (London and New York: Routledge, 2007)

4 Historical Approaches

 Christopher Andrew, The Defence of the Realm: The Authorized History of


MI5 (London: Allen Lane, 2009)
 Clive Bloom, Terrorism and the Dream of a British Republic (Stroud: Sutton
Publishing, 2007)
 ***Michael Burleigh, Blood and Rage: A Cultural History of Terrorism
(London: Harper Press, 2008)
 Martha Crenshaw, ‘The Causes of Terrorism’, Comparative Politics, 13(4)
(1981), pp. 379-99
 Richard English, Terrorism: How to Respond (Oxford: Oxford University
Press, 2009)
 Richard English, Irish Freedom: The History of Nationalism in Ireland
(London: Macmillan, 2006)
 William L. Eubank and Leonard Weinberg, ’Does Democracy Encourage
Terrorism?’, Terrorism and Political Violence, 6(4) (1004), pp. 417-43
 Conor Gearty (ed.), Terrorism (Aldershot: Dartmouth, 1996)
 A. Geifman, Thou Shalt Not Kill: Revolutionary Terrorism in Russia, 1894-
1917 (Princeton, NJ: Princeton University Press, 1993)
 Peter Hart, The IRA and Its Enemies: Violence and Community in Cork, 1916-
1923 (Oxford: Oxford University Press, 1998)
 ***Walter Laquer, A History of Terrorism (New Brunswick, NJ., 2001)
 ***Arno J. Mayer, The Furies: Violence and Terror in the French and Russian
Revolutions (Princeton, New Jersey: Princeton University Press)
 ***Martin A. Miller, “The Intellectual Origins of Modern Terrorism in Europe”,

7
in M. Crenshaw (ed.), Terrorism in Context (Pennsylvania State University
Press: Philadelphia, 2001)
 Walter Reich, (ed.), Origins of Terrorism: Psychologies, Ideologies, Theologies,
States of Mind (Cambridge: Cambridge University Press, 1990)
 Ernest Renan, "What is a Nation?" in Geoff Eley and Ronald Grigor Suny ed.
Becoming National: A Reader (New York and Oxford: Oxford University Press,
1996), pp. 41-55.
 Louise Richardson, What Terrorists Want: Understanding the Terrorist
Threat (London: John Murray, 2006)
 Yezid Sayigh, Armed struggle and the search for state : the Palestinian
national movement, 1949-1993 (Oxford: Oxford University Press, 1997)
 K.R.M. Short, The Dynamite War: Irish-American Bombers in Victorian Britain
(Dublin, 1979)
 ***Charles Townshend, Terrorism: A Very Short Introduction (Oxford: Oxford
University Press, 2002)
 Bernard Wasserstein, Barbarism and Civilization: A History of Europe in Our
Time (Oxford: Oxford University Press, 2007)

5 Political Science, Sociology and International Relations

 Audrey Kurth Cronin, ‘Sources of Contemporary Terrorism’ in Audrey Cronin


and James Ludes (eds.), Attacking Terrorism: Elements of a Grand Strategy
(Washington, DC: Georgetown University Press, 2004), pp. 19-45
 *** Paul K. David and Kim Cragin (eds.), Social Science for Counterterrorism:
Putting the Pieces Together (Santa Monica, CA: Rand, 2009), various
chapters.
 Karen von Hippel, ‘The roots of terrorism: Probing the myths’, The Political
Quarterly, 73(1) (2002), pp. 25-39
 Berto Jongman, ‘Research Desiderata in the Field of Terrorism’ in Magnus
Ranstorp (ed.), Mapping Terrorism Research: State of the Art, Gaps and
Future Direction (London and New York: Routledge, 2007); also available at
http://www.st-andrews.ac.uk/~wwwir/research/cstpv/research/
desiderata.php
 Robert A. Pape, The Strategic Logic of Suicide Terrorism, American Political
Science Review, 97(3) (2003), pp. 343-361

6 Terrorist Groups and Organisation

 *** John Arquilla, David Ronfeldt and Michele Zanini, ‘Networks, Netwar, and
Information-Age Terrorism’ in Ian O. Lesser et al, Countering the New
Terrorism (Santa Monica, CA: RAND, 1999), pp. 39-84; available at
http://www.rand.org/pubs/monograph_reports/MR989/MR989.chap3.pdf
 Louis Beam, ‘Leaderless Resistance’, The Seditionist, Feb. 1992; available at
http://www.louisbeam.com/leaderless.htm
 Audrey Kurth Cronin, ‘How Al-Qaida Ends: The Decline and Demise of
Terrorist Groups’, International Security, 31(1) (2006), pp. 7-48
 John Horgan, The Psychology of Terrorism (London and New York:
Routledge, 2005)

8
 Paul Joosse, ‘Leaderless Resistance and Ideological Inclusion: The Case of the
Earth Liberation Front’, Terrorism and Political Violence, 19 (2007)
 Cindy D. Ness, Female Terrorism and Militancy: Agency, Utility, and
Organization (London: Routledge, 2008)
 Jerrold Post, ‘Terrorist psycho-logic: Terrorist behaviour as a product of
psychological forces’ in Walter Reich (ed.), Origins of Terrorism:
Psychologies, Ideologies, Theologies, States of Mind (Washington DC:
Woodrow Wilson Center Press, 1990)
 *** Marc Sageman, Understanding Terror Networks (Philadelphia, PA:
University of Pennsylvania Press, 2004)
 Marc Sagmena, Leaderless Jihad: Terror Networks in the Twenty-First
Century (Philadelphia, PA: University of Pennsylvania Press, 2008)
 Jerrold Post, ‘Group and Organisational Dynamics of Political Terrorism’ in
Paul Wilkinson and A. Stewart (eds.), Contemporary Research on Terrorism
(Aberdeen: Aberdeen University Press, 1987)
 Jerrold Post, ‘Psychological and Motivational Factors in Terrorist Decision-
Making: Implications for CBW Terrorism’ in Jonathan Tucker (ed.): Toxic
Terror: Assessing Terrorist Use of Chemical and Biological Weapons
(Cambridge, MA: MIT Press, 2000)
 Magnus Ranstorp, ‘Hizbollah’s Command Leadership: Its Structure, Decision-
Making and Relationship with Iranian Clergy and Institutions’, Terrorism and
Political Violence, 6(3) (1994), pp. 303-39
 David Rapoport (ed.), Inside Terrorist Organizations, 2nd ed. (London: Frank
Cass, 2001)
 Louise Richardson, ‘Global Rebels: Terrorist Organizations as Trans-National
Actors’, Harvard International Review, 20(4) (1998), pp. 51-6; available at
http://www.allbusiness.com/public-administration/national-security-
international/709499-1.html.
 Cyrus Ernesto Zirakzadeh, ‘From Revolutionary Dreams to Organizational
Fragmentation: Disputes over Violence Within ETA and Sendero Luminoso’,
Terrorism and Political Violence 14(4) (1994), pp. 66-92

7 Aims and Ideologies

 Michael Barkun, ‘Introduction: Understanding Millennialism’ in Michael


Barkun (ed.), Millennialism and Violence (London: Frank Cass, 1996)
 *** Jarret M. Brachman, Global Jihadism: Theory and Practice (London and
New York: Routledge, 2009), pp. 1-103
 Steve Bruce, ‘The problem of pro-state terrorism: Loyalist paramilitaries in
Northern Ireland’, Terrorism and Political Violence, 4(1) (1992)
 Peter Chalk, West European Terrorism and Counter-Terrorism: The Evolving
Dynamic (London: Macmillan, 1996)
 John Esposito, ‘Terrorism and the Rise of Political Islam’ in Louise Richardson
(ed.), The Roots of Terrorism (New York: Routledge, 2006), pp. 145-58
 Fawaz Gerges, The Far Enemy: Why Jihad Went Global (Cambridge:
Cambridge University Press, 2005)
 *** Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University
Press, 2006), Chapters 2 and 3

9
 Cynthia Irvin, Militant Nationalism: Between Movement and Party in Ireland
and the Basque Country (Minneapolis, MN: University of Minnesota Press,
1999)
 Mark Juergensmeyer, ‘The Logic of Religious Violence’ in David C. Rapoport
(ed.), Inside Terrorist Organizations (New York: Columbia University Press,
1988)
 Mark Juergensmeyer, Terror in the Mind of God: The Global Rise of Religious
Violence (Berkeley, CA: University of California Press, 2000)
 Matthew Levitt and Dennis Ross, Hamas: Politics, Charity and Terrorism in
the Name of Jihad (New Haven and London: Yale University Press, 2007)
 Shaul Mishal and Avraham Sela, A. (2000), The Palestinian Hamas (New York:
Columbia University Press)
 Brigitte Nacos, Terrorism and Counterterrorism: Understanding Threats and
Responses in the Post-9/11 World, 2nd ed. (London: Penguin, 2008), Chapters
2-5
 Magnus Ranstorp, ‘Terrorism in the Name of Religion’, Journal of
International Affairs, 50(1) (1996), pp. 41-62
 *** David Rapoport, ‘The Four Waves of Modern Terrorism’ in Audrey Kurth
Cronin and James M. Ludes (eds.), Attacking Terrorism: Elements of a Grand
Strategy (Washington, DC: Georgetown University Press, 2004), pp. 46-73
 Ignacio Sánchez-Cuenca, ‘The Dynamics of Nationalist Terrorism: IRA and
ETA’, Terrorism and Political Violence, 19(3) (2007), pp. 289-306
 G. Davidson Smith, ‘Single Issue Terrorism’, Commentary, 74(1998);
available at http://www.csis-scrs.gc.ca/pblctns/cmmntr/cm74-eng.asp.
 Jessica Stern, Terror in the Name of God: Why Religious Militants Kill (New
York: Ecco, 2003)
 Peter Waldmann, ‘Ethnic and Sociorevolutionary Terrorism: A Comparison of
Structure’ in Donatella Della Porta (ed.), Social Movements and Violence:
Participation in Underground Organizations (Greenwich: JAI Press, 1992), pp.
237-54
 Leonard Weinberg, ‘Turning to Terror: The conditions under which political
parties turn to terrorist activities’, Comparative Politics, 23(4) (1991)
 Leonard Weinberg and Ami Pedahzur, Political Parties and Terrorist Groups
(London and New York: Routledge, 2003)
 Quintan Wiktorowicz, ‘Anatomy of the Salafi Movement’, Studies in Conflict
and Terrorism, 29(3) (2006), pp. 207-239
 Paddy Woodworth, Dirty War, Clean Hands: ETA, the GAL and Spanish
Democracy (New Haven and London: Yale University Press, 2003)
 On various developments and issues related to religion, see Terrorism and
Political Violence, 17(3) (2005)

8 Terrorist Strategy

 Max Abrahms, ‘Why Terrorism Does Not Work’, International Security, 31(2)
(2006), pp. 42-78
 Max Abrahms, ‘What Terrorists Really Want: Terrorist Motives and
Counterterrorism Strategy’, International Security, 32(4) (2008), pp. 78-105

10
 N.O. Berry, ‘Theories on the Efficacy of Terrorism’ in Paul Wilkinson and A.
Stewart (eds.), Contemporary Research on Terrorism (Abderdeen: Aberdeen
University Press, 1987)
 Ronald Crelinsten, ‘Terrorism as Political Communication’ in Paul Wilkinson
and A. Stewart (eds.), Contemporary Research on Terrorism (Abderdeen:
Aberdeen University Press, 1987)
 Martha Crenshaw, ‘The Logic of Terrorism: Terrorist behavior as a product of
strategic choice’ in Walter Reich (ed.), Origins of Terrorism: Psychologies,
Ideologies, Theologies, States of Mind (Washington DC: Woodrow Wilson
Center Press, 1990)
 C.J.M. Drake, Terrorists’ Target Selection (Basingstoke: Palgrave, 1998)
 Isabelle Duyvesteyn, ‘How New is the New Terrorism?’, Studies in Conflict
and Terrorism, 27(5) (2004), pp. 439-54
 Lawrence Freedman, ‘Terrorism and Strategy’ in Lawrence Freedman et al
(eds.), Terrorism and International Order (London: Routledge, 1986).
 *** Lawrence Freedman, ‘Strategic Terror and Amateur Psychology’, The
Political Quarterly, 76(2) (2005), pp. 161-70
 Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University
Press, 2006), Chapter 8
 *** Andrew H. Kydd and Barbara Walter, ‘The Strategies of Terrorism’,
International Security, 31(1) (2006)
 Peter R. Neumann and M.L.R. Smith, ’Strategic Terrorism: The Framework
and Its Fallacies’, The Journal of Strategic Studies, 28(4) (2005), pp. 571-95
 *** Peter R. Neumann and M.L.R. Smith, The Strategy of Terrorism: How It
Works, and Why It Fails (London: Routledge, 2008)
 Robert Pape, Dying to Win: The Strategic Logic of Suicide Terrorism (New
York: Random House, 2005).
 Paul R. Pillar, Terrorism and U.S. Foreign Policy (Washington, DC: Brookings
Institution Press, 2004)
 William Rose, Rysia Murphy, Max Abrahms, ‘Does Terrorism Ever Work? The
2004 Madrid Train Bombings’, International Security, 32(1) (2007), pp. 185-
92
 Thomas Perry Thornton, ‘Terror as a Weapon of Political Agitation’ in Harry
Eckstein (ed.), Internal War: Problems and Approaches (New York: Free Press,
1964)
 Robert F. Trager and Dessislava Zagorcherva, ‘Deterring Terrorism: It Can Be
Done’, International Security, 30(3) (2005), pp. 87-123

9 Understanding ISIS

 Richard Barrett, The Islamic State, 2014, http://soufangroup.com/wp-


content/uploads/2014/10/TSG-The-Islamic-State-Nov14.pdf
 Zach Laub and Jonathan Masters, Islamic State of Iraq and Syria, 2014,
http://www.cfr.org/iraq/islamic-state-iraq-syria/p14811
 Islamic State: The Changing Face of Modern Jihadism, Quilliam Foundation,
2014, http://www.quilliamfoundation.org/wp/wp-
content/uploads/publications/free/islamic-state-the-changing-face-of-
modern-jihadism.pdf

11
 Aymenn Jawad al Tamimi, The Islamic State of Iraq and ash-Sham, 2014,
http://www.aymennjawad.org/14151/the-islamic-state-of-iraq-and-al-sham
 The Islamic State – Mapping Militant Organisations,
http://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/1
 Patrick Cockburn, The Rise of Islamic State: ISIS and the New Sunni
Revolution (Verso, 2015)
 Jessica Stern and J.M. Berger, ISIS: The State of Terror (Ecco, 2015)
 “Rigged Cars and Barrel Bombs: Aleppo and the State of the Syrian War”, ICG,
2014,
http://www.crisisgroup.org/~/media/Files/Middle%20East%20North%20Afric
a/Iraq%20Syria%20Lebanon/Syria/155-rigged-cars-and-barrel-bombs-aleppo-
and-the-state-of-the-syrian-war
 “Iraq: Fallujah’s Faustian Bargain”, ICG, 2014,
http://www.crisisgroup.org/~/media/Files/Middle%20East%20North%20Afric
a/Iraq%20Syria%20Lebanon/Iraq/150-iraq-falluja-s-faustian-bargain
 Shiraz Maher, “From Bin Laden to Isis: Why the roots of jihadi ideology run
deep in Britain”, New Statesman,
http://www.newstatesman.com/2014/08/bin-laden-s-final-triumph
 Shiraz Maher, “From Portsmouth to Kobane: the British jihadis fighting for
ISIS”, http://www.newstatesman.com/2014/10/portsmouth-kobane

10 Right-Wing Terrorism

 Tore Bjorgo, ‘Processes of disengagement from violent groups of the


extreme right’ in Tore Bjørgo and John Horgan (eds.), Leaving Terrorism
Behind (London and New York: Routledge 2009), pp. 30-48.
 Kerry Noble, Tabernacle of Hate: Seduction into Rightwing Extremism, 2nd ed.
(Syracuse: Syracuse University Press, 2010).
 Peter Merkl and Leonard Weinberg (eds.), The Revival of Right Wing
Extremism in the Nineties (London: Cass, 1997).
 Cynthia Miller-Idriss, Blood and Culture: Right-Wing Extremism and National
Belonging in Contemporary Germany (Durham, NC: Duke University Press,
2009)
 Pete Simi, American Swastika, (Roman Littlefield, 2010)
 Peter Davies and Derek Lynch (eds.), The Routledge Companion to Fascism
and the Far-Right (Routledge, 2002)
 Alexander Meleagrou-Hitchens, A Neo-Nationalist Network: The EDL and
Europe’s Counter-Jihad Movement, ICSR, 2013, http://icsr.info/wp-
content/uploads/2013/03/ICSR-ECJM-Report_Online.pdf

11 Leftwing Terrorism

 *** Stefan Aust, The Baader-Meinhof complex (London: Vintage, 2008)


 Dennis Bark, and David Gress, A History of West Germany: Democracy and
its Discontents, 1963-1988 (Oxford: Oxford University Press, 1989)

12
 Karin Bauer, Everybody talks about the weather . . . we don’t: The writings of
Ulrike Meinhof (New York: Seven Stories, 2009)
 Jillian Becker, Hitler’s Children: The Story of the Baader-Meinhof Terrorist
Gang (London: Lippincott, 1977)
 Raimondo Catanzaro (ed.), The Red Brigades and Left-Wing Terrorism in Italy
(London: Pinter, 1991)
 Michael Y. Dartnell, Action Directe: Ultra- Left Terrorism in France, 1977–
1987 (London: Frank Cass, 1995)
 ***Donatella Della Porta, Social movements, political violence and the state. A
comparative analysis of Italy and Germany (Cambridge: Cambridge
University Press, 1995)
 Donatella Della Porta, ‘Left wing terrorism in Italy’, in M. Crenshaw (ed.),
Terrorism in Context (Pennsylvania State University Press: Philadelphia, 2001)
 Richard Drake, The Revolutionary Mystique and Terrorism in Contemporary
Italy (Bloomington, Ind.: Indiana University Press 1988)
 Richard Drake, Apostles and Agitators: Italy’s Marxist Revolutionary
Tradition (Cambridge, Mass: Harvard University Press, 2003)
 Peter Fritzsche, ‘Terrorism in the Federal Republic of Germany and Italy:
Legacy of the 68 Movement or “Burden of Fascism”?’ Terrorism and Political
Violence 1, (1999), pp. 466–81
 Martin Gutmann, ‘Notable literature on Germany’s Red Army Faction within
the context of Die RAF und der linke Terrorismus’. Studies in Conflict and
Terrorism, 31 (2008), pp. 371–75
 ***Hans Josef Horchem, “The Decline of the Red Army Faction”, Terrorism
and Political Violence, 3 (1991)
 Alison Jamieson, The Heart Attacked: Terrorism and Conflict in the Italian
State (London: Marion Boyars, 1989)
 Peter Merkl, “West German Left-Wing Terrorism”, in M. Crenshaw (ed.),
Terrorism in Context (Pennsylvania State University Press: Philadelphia, 2001)
 Kay Schiller, ‘Political militancy and generation conflict in West Germany
during the red decade’. Debatte: Journal of Contemporary Central and
Eastern Europe 11 (2003), pp. 19-38
 *** Jeremy Varon, Bringing the war home: The Weather Underground, the
Red Army Faction and Revolutionary Violence in the Sixties and Seventies
(Berkeley, CA: University of California Press, 2003)
 Tom Vague, Anarchy in the UK: The Angry Brigade (London: AK, 1997)

12 Terrorism in East Africa: The al-Shabaab Network

 ‘Al-Shabaab Attack on Westgate Mall in Kenya’, START (2013),


http://www.start.umd.edu/sites/default/files/publications/local_attachments
/STARTBackgroundReport_alShabaabKenya_Sept2013.pdf
 ‘Al Shabaab Expands Operational Zone’, Terrorism Monitor, Vol. 3(28)
 Chris Anzalone, ‘Al-Shabaab Setbacks in Somalia’, CTC Sentinel, October,
Vol. 4 (10): 22-25
 Chris Anzalone, ‘Kenya’s Muslim Youth Centre and Al-Shabaab’s East African
Recruitment’, CTC Sentinel, June, Vol. 5(6):9-13
 Chris Anzalone, ‘The Nairobi attack and Al-Shabaab’s Media Strategy’, CTC
Sentinel, March, Vol 6(10): 1-6

13
 Matt Bryden, ‘The Reinvention of al-Shabaab’, CSIS
 Nelly Lahoud, ‘The merger of al-Shabaab and Qa’idat al-Jihad’, CTC Sentinel,
February, Vol.5(2): 1-5
 Alexander Meleagrou-Hitchens, ‘Behind al-Shabaab’s Latest Attack’, Foreign
Affairs, 26 September, 2013
 Alexander Meleagrou-Hitchens, ‘Jihad Comes to Kenya’, Foreign Affairs, 10
January 2014
 Stig Jarle Hansen, Al-Shabaab in Somalia (Hurst: 2013)

13 Exams Week: no class

Revise key texts

14 Intelligence and Terrorism

Required Reading

 E. Dahl, ‘The Plots that Failed: Intelligence Lessons Learned from


Unsuccessful Terrorist Attacks Against the United States,’ Studies in
Conflict & Terrorism, 34:8 (2011) 621-648.

Recommended Readings

 Christopher Andrew, The Defence of the Realm: The Authorized History of


MI5 (London: Penguin, 2010). See Section E: 3, 5, 8 and 10, and Section F:
2 & 3.
 Bradley Bamford. ‘The role and effectiveness of intelligence in Northern
Ireland’, Intelligence and National Security, 20:4 (2005), 581-607.
 Peter Bergen, Manhunt: From 9/11 to Abbottabad - the Ten-Year Search
for Osama bin Laden (Random House, 2012).
 Dan Byman, ‘The Intelligence War on Terrorism,’ Intelligence and
National Security 29:6 (2013), 837-63.
 CUNY School of Law et al, Mapping Muslims: NYPD Spying and Its Impact
on American Muslims (New York, 2013):
http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-
Muslims.pdf
 Erik Dahl, ‘Intelligence and Terrorism,’ in The International Studies
Encyclopedia, Denemark R. et al., eds. (Wiley-Blackwell: Oxford, 2010):
http://www.isacompendium.com.libproxy.kcl.ac.uk/subscriber/uid=4667
/tocnode?id=g9781444336597_yr2012_chunk_g978144433659711_ss1-
17 (or search library database).
 James Dingley, ‘Countering terrorism in Northern Ireland: the role of
intelligence,’ Small Wars & Insurgencies Volume 20, Issue 3-4, (2009).

 Frank Foley, and Max Abrahms, ‘Terrorism and Counterterrorism,’ in The


International Studies Encyclopedia, Denemark R. et al., eds. (Wiley-

14
Blackwell: Oxford, 2010):
http://www.isacompendium.com.libproxy.kcl.ac.uk/subscriber/uid=4667
/tocnode?id=g9781444336597_yr2012_chunk_g978144433659719_ss1-
17 (or search library database).
 Bruce Hoffman, ‘Intelligence and Terrorism: Emerging Threats and New
Security Challenges in the Post-Cold War Era’, Intelligence and National
Security, Vol. 11, No. 2 (1996).
 Gaetano Ilardi, ‘Irish Republican Army Counterintelligence,’ International
Journal of Intelligence and CounterIntelligence, Volume 23, Issue 1,
(2009).
 Gaetano Ilardi, ‘IRA operational intelligence: the heartbeat of the war,’
Small Wars & Insurgencies Volume 21, Issue 2, (2010).
 Martin Ingram, Stakeknife: Britain's Secret Agent Inside the IRA (Dublin,
2004)
 S. Marrin, ‘The 9/11 Terrorist Attacks: A Failure of Policy Not Strategic
Intelligence Analysis,’ Intelligence and National Security Vol. 26, No. 2-3
(2011).
 Jon Moran, and Mark Phythian (eds.), Intelligence, Security and Policing
Post 9-11: The UK’s Response to the ‘War on Terror’ (Basingstoke, 2008).
 Jon Moran, “Evaluating Special Branch and the Use of Informant
Intelligence in Northern Ireland,” Intelligence and National Security,
Volume 25, Issue 1, (2010).
 Peter Neumann, and MLR Smith, ‘Missing the Plot? Intelligence and
Discourse Failure’, Orbis, Vol. 50, No. 2 (2004).
 David Omand, Securing the State (London, 2010).
 Paul Pillar, ‘Intelligence,’ in Attacking Terrorism: Elements of a Grand
Strategy, Audrey Kurth Cronin, A, and J.M. Ludes, eds. (Georgetown
University Press: Washington DC, 2004), pp. 116-21.
 Paul Pillar, Intelligence and US Foreign Policy (New York: Columbia UP,
2011), Chapters 1, 9-12.
 Dana Priest, and Arkin, W. Top Secret America (New York, Little, Brown
and Company, 2011).
 J. Schindler, ‘Intelligence and Strategy in the War on Islamist Terrorism,’
in C. Andrew, R. J. Aldrich, W. K. Wark, eds., Secret Intelligence: A Reader
(London, 2008).
 G. Schmitt (ed.), Safety, Liberty, and Islamist Terrorism: American and
European Approaches to Domestic Counterterrorism (Washington D.C.:
AEI Press, 2010).
 G. Schroen, First In: How the CIA Spearheaded the War on Terror in
Afghanistan, (Presidio Press, 2007).
 M. Sheehan, Crush the Cell (New York: Three Rivers, 2008).
 G. Treverton, Intelligence for an Age of Terror (Cambridge University
Press: 2009)
 Zegart, Spying Blind: The CIA, the FBI and the Origins of 9/11. (New
Jersey: Princeton University Press, 2007)

15 CT and the Liberal State

15
 Yonah Alexander, Combating Terrorism: Strategies of Ten Countries (Ann
Arbor, MI: University of Michigan Press, 2002)
 Alex Bellamy, Fighting Terror: Ethical Dilemmas (London: Zed Books, 2008)
 *** Philip Bobbitt, Terror and Consent: Rethinking the Future on Fighting
Terror (London: Allen Lane, 2008)
 Alison Brysk and Gershon Shafir (eds.), National Insecurity and Human
Rights: Democracies Debate Counterterrorism (Berkeley, CA: University of
California Press, 2007)
 Lindsay Clutterbuck, ‘Law Enforcement’ in Audrey Cronin and James Ludes
(ed.), Attacking Terrorism: Elements of a Grand Strategy (Washington, DC:
Georgetown University Press, 2004), pp. 140-161
 *** Ronald Crelinsten, Counterterrorism (Cambridge: Polity Press, 2009)
 Martha Crenshaw, ‘Terrorism, Strategies, and Grand Strategies’ in Audrey
Cronin and James Ludes, Attacking Terrorism: Elements of a Grand Strategy
(Washington, DC: Georgetown University Press, 2004), pp. 74-93
 Audrey Kurth Cronin and James M. Ludes (eds.), Attacking Terrorism:
Elements of a Grand Strategy (Washington, DC: Georgetown University Press,
2004)
 Alan Dershowitz, Why Terrorism Works: Understanding the Threat,
Responding to the Challenge (New Haven and London: Yale University Press,
2002)
 Daniel Goure, ‘Homeland Security’ in Audrey Cronin and James Ludes (ed.),
Attacking Terrorism: Elements of a Grand Strategy (Washington, DC:
Georgetown University Press, 2004), pp. 261-84
 Karin J. Greenberg (ed.), The Torture Debate in America (Cambridge:
Cambridge University Press, 2005)
 *** Philip Heymann, ‘Dealing with Terrorism: An Overview’, International
Security, 26(3) (2001), pp. 24-38
 Philip Heymann, Terrorism, Freedom and Security: Winning without War
(Cambridge, MA, MIT Press, 2003)
 Tom Parker, ‘Fighting an Antean Enemy: How Democratis States
Unintentionally Sustain the Terrorist Movements They Oppose’, Terrorism
and Political Violence, 19(2) (2007), pp. 155-79
 Paul Wilkinson, Terrorism and the Liberal State (London and Basingstoke,
Macmillan, 1977)
 Paul Wilkinson, ‘The Role of the Military in Combating Terrorism in a
Democratic Society’, Terrorism and Political Violence, 18(3) (2006)
 Jessica Wolfendale, ‘Terrorism, Security, and the Threat of Counterterrorism’,
Studies in Conflict and Terrorism, 30(1) (2007), pp. 75-92
 Doron Zimmermann and Andreas Wenger, How States Fight Terrorism: Policy
Dynamics in the West (Boulder, CO: Lynne Rienner, 2007)
 On various issues and development related to terrorism and human rights,
see Terrorism and Political Violence, 17(1-2) (2005)

16 CT and the International System

16
 Eqbal Ahmad, Terrorism: Theirs and Ours (New York: Seven Stories Press,
2001)
 *** Christopher Ankersen (ed.), Understanding Global Terror (Cambridge:
Polity Press, 2007)
 Paul Berman, Terror and Liberalism (New York: W.W. Norton, 2003)
 Richard K. Betts, ‘The Soft Underbelly of American Primacy: Tactical
Advantages of Terror’, Political Science Quarterly, 117(1) (2002)
 Noam Chomsky, ‘International Terrorism: Image and Reality’ in Alexander
George (ed.), Western State Terrorism (Cambridge: Polity Press, 1991)
 Noam Chomsky, ‘Commentary: moral truisms, empirical evidence, and
foreign policy’, Review of International Studies, 29(4) (2003), pp. 605-20
 *** Ronald Crelinsten, Counterterrorism (Cambridge: Polity Press, 2009)
 *** Martha Crenshaw, ‘Terrorism, Strategies, and Grand Strategies’ in Audrey
Kurth Cronin and James M. Ludes (eds.), Attacking Terrorism: Elements of a
Grand Strategy (Washington, DC: Georgetown University Press, 2004), pp.
74-93
 David Frum and Richard Perle, An End to Evil: How to Win the War on Terror
(New York: Random House, 2003)
 Fred Halliday, Two Hours that Shook the World: September 11, 2001 –
Causes and Consequences (London: Saqi Books, 2001)
 Fred Halliday, Islam and the Myth of Confrontation (London: IB Tauris, 2003),
esp. Chapter 4 (‘Islam and the West’)
 Christopher Hitchens, ‘Of Sin, the Left and Islamic Fascism’, The Nation, 24
September 2001
 David Malet, ‘Faith in the System: Coneceptualizing Grand Strategy in the
post-9/11 World Order, Studies in Conflict and Terrorism, 31(8) (2008), pp.
723-35
 Sebastian Mallaby, ‘The Reluctant Imperialist: Terrorism, Failed States, and
the Case for American Empire’, Foreign Affairs, March/April 2002
 Paul R. Pillar, Terrorism and U.S. Foreign Policy (Washington D.C.: Brookings
Institution Press, 2001)
 Barry R. Posen, ‘The Struggle against Terrorism: Grand Strategy, Strategy and
Tactics’, International Security, 26(3) (2001), pp. 39-55
 Adam Roberts, ‘Counter-Terrorism, Armed Force and the Laws of War’,
Survival, 44(1) (2002), pp. 7-32
 Adam Roberts, ‘The Laws of War’ in Audrey Cronin and James Ludes (eds.),
Attacking Terrorism: Elements of a Grand Strategy (Washington DC:
Georgetown University Press, 2004), pp. 186-219
 Michael Scheuer, Imperial Hubris: Why the West is Losing the War on Terror
(Washington, DC: Potomac Books, 2004)
 Claire Sterling, The Terror Network (London: Weidenfeld & Nicolson, 1981).

17 The United Kingdom and CONTEST

 Bradley Bamford, ‘The United Kingdom’s “War against Terrorism”’, Terrorism


and Political Violence, 16(4) (2004), pp. 737-56
 *** Andrew Blick, Tufayl Choudhury and Stuart Weir, The Rules of the Game
Terrorism, Community and Human Rights (York: Joseph Rowntree Reform

17
Trust, 2007); available at http://www.democraticaudit.com/download/
breaking-news/Terrorism-Final.pdf
 Philip Bobbitt, Terror and Consent (London: Allen Lane, 2008)
 Ian Cram, ‘Regulating the Media: Some Neglected Freedom of Expression
Issues in the United Kingsom’s Counter-terrorism Strategy’, Terrorism and
Political Violence, 18(2) (2006), pp. 335-55
 Laura K. Donohue, Counter-terrorist Law and Emergency Powers in the
United Kingdom 1922-2000 (Dublin: Irish Academic Press, 2001)
 *** Her Majesty’s Government, ‘Countering International Terrorism: The
United Kingdom's Strategy’, July 2006, Cm 6888, available at
http://www.official-documents.gov.uk/document/cm68/6888/6888.pdf
 Her Majesty’s Government, ‘The UK National Security Strategy’, March 2008,
Cm 7291, available at http://www.cabinetoffice.gov.uk/reports/
national_security_strategy.aspx
 Home Office, Preventing Violent Extremism: A Strategy for Delivery (London:
Home Office, 2008); available at http://security.homeoffice.gov.uk/news-
publications/publication-search/prevent-strategy/
 Michael Howard, ‘Are we at war?’, Survival, 50(4) (2008)
 David Omand, ‘Countering International Terrorism: The use of strategy’,
Survival, 47(4) (2005)
 Tom Parker, ‘Appendix A: Counterterrorism Policies in the United Kingdom’
in Philipp B. Heymann and Juliette N. Kayyem (eds.), Protecting Liberty in an
Age of Terror (Cambridge, MA: MIT Press. 2005), pp. 119-48
 Clive Walker, ‘Clamping Down on Terrorism in the United Kingdom’, Journal
of International Criminal Justice, 4 (2006), pp. 1137-51
 Paul Wilkinson, Terrorism versus Democracy: The Liberal State Response, 2nd
ed. (London: Routledge, 2006)

18 Countering Violent Extremism in France and Britain

Required Reading

 Frank Foley, Countering Terrorism in Britain and France: Institutions,


Norms and the Shadow of the Past (Cambridge: Cambridge University
Press, 2013), Chapter 5.

Recommended Reading

 Christopher Andrew, The Defence of the Realm: The Authorized History of


MI5 (London: Penguin, 2010), pp. 816-839.
 Peter Clarke, ‘Learning from Experience – Counter Terrorism in the UK
since 9/11’, Speech to the Policy Exchange, 24 April 2007,
http://www.gees.org/documentos/Documen-02228.pdf

18
 Marieke de Goede, “Pre-emption contested: Suspect spaces and
preventability in the July 7 inquest, ” Political Geography 39 (March 2014),
48–57.
 Reuel Marc Gerecht and Gary Schmitt, “France: Europe’s Counterterrorist
Powerhouse,” American Enterprise Institute: European Outlook 3
(November 2007), https://www.aei.org/publication/france-europes-
counterterrorist-powerhouse.
 Lady Justice Hallett, Coroner’s Inquiry into the London Bombings of 7 July
2005, 6 May 2011: http://7julyinquests.independent.gov.uk.
 John Horgan, Walking Away from Terrorism: Accounts of Disengagement
from Radical and Extremist Movements (Routledge, London 2009),
especially Chapt. 8.
 Martin Innes, “Policing uncertainty: countering terror through community
intelligence and democratic policing”, Annals of the American Academy of
Political and Social Science 605 (2006), pp. 222-41.
 Michael Kenney et al, ‘Organisational adaptation in an activist network:
Social networks, leadership, and change in al-Muhajiroun,’ Applied
Ergonomics 44 (2013) 739-47.
 Robert Lambert, Countering al-Qaida in London: Police and Muslims in
Partnership (Hurst, London, 2011).
 Sean O’ Neill and Daniel McGrory, The Suicide Factory: Abu Hamza and
the Finsbury Park Mosque, (London: Harper Collins, 2006).
 Raffaello Pantucci, 'A contest to democracy? How the UK has responded
to the current terrorist threat', Democratization, 17: 2 (2010), 251-271.
 Gary J. Schmitt (ed.), Safety, Liberty, and Islamist Terrorism: American
and European Approaches to Domestic Counterterrorism (Washington
D.C.: AEI Press, 2010).
 Jeremy Shapiro, and Benedicte Suzan, “The French Experience of Counter-
terrorism,” Survival, Vol. 45, No. 1 (Spring 2003), pp. 76 – 93.
 Quintan Wiktorowicz, Radical Islam Rising: Muslim Extremism in the West
(Lanham, MD: Rowman and Littlefield, 2005).

19 Foreign Policy and International CT Cooperation

 Richard J. Aldrich, ‘US–European Intelligence Co-operation on Counter-


Terrorism: Low Politics and Compulsion’, British Journal of Politics and
International Relations, 11(1) (2009), pp. 122-39.

19
 Oldrich Bures, 'Europol's Fledgling Counterterrorism Role', Terrorism and
Political Violence, 20(4) (2008), pp. 498-517.

 Ronald Crelinsten, Counterterrorism (Cambridge: Polity Press, 2009)


(concluding chapter on counter-terrorism cooperation).

 Jeffrey Laurenti, 'The UN and Terrorism' in Leonard Weinberg (ed.),


Democratic Responses to Terrorism (New York: Routledge, 2007),
Chapter 6.

 Adrian Porter and Annegret Bendiek, ‘Counterterrorism cooperation in the


transatlantic security community’,European Security, 21(4) (2012), pp.
497-517.

 Adam Roberts, 'Counter-Terrorism, Armed Force and the Laws of War',


Survival, 44(1) (2002), pp. 7-32.

 Various publications on the website of the Global Center on Cooperative


Security:http://www.globalcenter.org/publications/.

20 Terrorism, Torture and Human Rights

Required Reading

 Alex Bellamy, ‘No pain, no gain? Torture and ethics in the war on terror,’
International Affairs 82: 1 (2006), 121-48.

Recommended Reading

 R.J. Aldrich, “‘A Skeleton in Our Cupboard’: British Interrogation


Procedures in Northern Ireland,” in Learning from the Secret Past: Cases
in British Intelligence History (Washington, D.C.: Georgetown University
Press, 2011) pp. 161-189.
 Ian. Cobain, Cruel Britannia: A Secret History of Torture (London,
Portobello, 2012).
 R.F. Coulam., “Skill versus Brutality in Interrogation: Lessons from Israel
for American Policy,” Intelligence and National Security 28, no. 4 (2013):
566-590.

20
 Courtenay R Conrad, Justin Conrad, James Piazza and James Igoe Walsh,
“Who Tortures the Terrorists? Transnational Terrorism and Military
Torture,” Foreign Policy Analysis, Online first: October 2014.
 Rosemary Foot, “Torture: The Struggle over a Peremptory Norm in a
Counter-Terrorist Era,” International Relations 20, 2 (2006): pp. 131 –
145.
 Karen Greenburg, The Torture Debate in America (Cambridge University
Press, 2006).
 P. Gronke, Darius Rejali, Dustin Drenguis, James Hicks, Peter Miller, and
Bryan Nakayama, “U.S. Public Opinion on Torture, 2001–2009,” PS:
Political Science and Politics , 43, 3 (July 2010), 437-44.
 C. Kennedy-Pipe and Andrew Mumford, “Torture, Rights, Rules and Wars:
Ireland to Iraq,” International Relations March 2007 vol. 21 no. 1 119-
126.
 Gary Kern, “Torture and Intelligence in the Global War on Terror,”
Intelligence and National Security 25, no. 6 (December 2010): 868-874
 L. Hajjar, Torture: A Sociology of Violence and Human Rights. Routledge,
2013.
 Samantha Newbery, Interrogation, Intelligence and Security: Controversial
British Techniques, Manchester University Press, 2015.
 Samantha Newbery, “Intelligence and Controversial British Interrogation
Techniques: the Northern Ireland Case, 1971-2.” Irish Studies in
International Affairs 20 (2009): 103-19.
 James Piazza, “Terrorist Suspect Religious Identity and Public Support for
Harsh Interrogation and Detention Practices,” Political Psychology, Article
first published online: 1 April 2014, DOI: 10.1111/pops.12190.
 Jason Ralph, America's War on Terror: The State of the 9/11 Exception
from Bush to Obama, (Oxford University Press, 2013); Chapter 5:
“Interrogating Terrorist Suspects After 9/11.”
 Kathryn Sikkink, “The United States and torture: does the spiral model
work?” in Risse, T, Ropp, SC, & Sikkink, K. The Persistent Power of Human
Rights: From Commitment to Compliance (New York: Cambridge
University Press, 2013).
 Ali Soufan, The Black Banners: The inside story of 9/11 and the war
against Al-Qaeda (WW Norton & Company, 2011), especially Chapters 20-
22.
 B. Sutton, and Kari Marie Norgaard. “Cultures of Denial: Avoiding
Knowledge of State Violations of Human Rights in Argentina and the
United States.” Sociological Forum 28, 3 (2013), 495-524.
 J.J. Wisnewski, Understanding Torture (Edinburgh: Edinburgh University
Press, 2010), especially Chapters 3, 5, 6 and 8

21 CVE Counter and Deradicalisation

21
 Peter R. Neumann, ‘Preventing Violent Radicalization in America’, Bipartisan
Policy Center, June 2011, Chapter 2; available at www.bipartisanpolicy.org.
 Rachel Briggs, Catherine Fieschi, and Hannah Lownsborough, Bringing it
Home: Community-based approaches to counter-terrorism (London: Demos,
2006), pp. 58-83 (Chapter 4; ‘Putting communities at the heart of counter-
terrorism’); available at
http://www.demos.co.uk/publications/bringingithome.
 J. Scott Carpenter and Matthew Levitt, Fighting the Ideological Battle: The
Missing Link in US Strategy to Counter Violent Extremism (Washington, DC:
Washington Institute, 2010); available at
http://www.washingtoninstitute.org/pubPDFs/StrategicReport04.pdf.
 Jamie Bartlett, Jonathan Birdwell and Michael King, The Edge of Violence: A
Radical Approach to Extremism (London: Demos, 2010); available at
http://www.demos.co.uk/publications/theedgeofviolence.
 Anja Dalgaard Nielsen, “Promoting Exit from Violent Extremism: Themes and
Approaches”, Studies in Conflict and Terrorism, 36 (2) (2013), pp. 99-115;
available at
http://counterideology2.files.wordpress.com/2013/01/promoting-exit-from-
violent-extremism.pdf
 Tore Bjørgo and John Horgan (eds.), Leaving Terrorism Behind (London and
New York: Routledge 2009)
 Peter Neumann, Prisons and Terrorism: Radicalisation and De-radicalisation
in 15 Countries (London: ICSR, 2010), pp. 39-58; available at
http://tinyurl.com/244chu7.
 Omar Ashour, The Deradicalization of Jihadists (London: Routledge, 2009).
 Angel Rabasa, Stacie Pettyjohn, and Jeremy J. Ghez, and Christopher Boucek,
Deradicalizing Islamist Extremists (Washington, DC: RAND, 2010); available
at http://www.rand.org/pubs/monographs/MG1053.html.
 Marisa Porges and Jessica Stern, ‘Getting Deradicalization Right’, Foreign
Affairs, May/June 2010.

22 Gender, Masculinity, Extremism, Terrorism and Counter-Terrorism

Required reading

 Simon Cottee and Keith Hayward, “Terrorist (E)motives: The Existential


Attractions of Terrorism”, Studies in Conflict and Terrorism, 2011, 34, 12,
963–86.
 Gentry, C. E. 2011. “The Neo-Orientalist Narratives of Women’s Involvement
in Al-Qaeda.” In L. Sjoberg, and C. E. Gentry, eds. Women, Gender, and
Terrorism, Athens: University of Georgia Press.

22
 Hutchings, K. 2007. “Making Sense of Masculinity and War.” Men and
Masculinities 10 (4): 389–404.
 Peresin, A., and A. Cervone. 2015. “The Western Muhajirat of ISIS.” Studies in
Conflict & Terrorism 0 (0): 1–15.
http://doi.org/10.1080/1057610X2015.1025611
 Jacques, K., & Taylor, P. J. (2009). “Female Terrorism: A Review.” Terrorism
and Political Violence, 21(3), 499-515. doi: 10.1080/09546550902984042

Recommended Reading

 Ali, F. 2013. “Rocking the Cradle to Rocking the World: The Role of Muslim
Female Fighters.” Journal of International Women’s Studies 8 (1): 21–35.
 Amar, P. 2011. “Middle East Masculinity Studies: Discourses of" Men in
Crisis," Industries of Gender in Revolution”, Journal of Middle East Women's
Studies, 2011 - muse.jhu.edu
 Aoláin, F. N. (2013). “Situating Women in Counterterrorism Discourses:
Undulating Masculinities and Luminal Femininities.” BUL Rev., 93, 1085.
 Bermingham, A., M. Conway, L. Mcinerney, N. O. Hare, and A. F. Smeaton.
2009. “Combining Social Network Analysis and Sentiment Analysis to Explore
the Potential for Online Radicalisation.” In IEEE International Conference on
Advances in Social Network Analysis and Mining (pp. 231–6). Athens, Greece.
 Blee, K. M. (2005). “Women and organized racial terrorism in the United
States.” Studies in Conflict & Terrorism, 28(5), 421-433.
 Bloom, M. 2011. Bombshell: The Many Faces of Women Terrorists. C Hurst &
Co Publishers Ltd.

 Brown, K. E. 2013. “Gender and Counter-Radicalization: Women and


Emerging Counter-terror Measures.” In J. Huckerby, and M. L. Satterthwaite,
eds. Gender, National Security and Counter-Terrorism, Abingdon, Oxon; New
York: Routledge.
 Butler, J. 1999, “Gender trouble: feminism and the subversion of identity”
Routledge.
 Center for Human Rights and Global Justice. (2011). “A Decade Lost: Locating
Gender
 in U.S. Counter-Terrorism.” New York: NYU School of Law Centre for Human
Rights and Global Justice.
 Choudhury, T. 2007. “The Role of Muslim Identity Politics in Radicalisation”
(a study in progress). Department for Communities and Local Government.
Retrieved from https://www.counterextremism.org/
resources/details/id/34/the-role-of-muslim-identity-politics-in-radicalisation
 Connell, R. W., and J. W. Messerschmidt. 2005. “Hegemonic Masculinity:
Rethinking the Concept.” Gender & Society 19 (6): 829–859.
http://doi.org/10.1177/0891243205278639

23
 Cunningham, K. J. (2007). “Countering female terrorism.” Studies in Conflict
& Terrorism, 30(2), 113-129.
 Ehrenreich, B. 2005. “A New Counterterrorism Strategy: Feminism.” AlterNet
Retrieved from http://
www.alternet.org/story/21973/a_new_counterterrorism_strategy%3A_feminis
m
 Eileen, M. (1991). “Shoot the Women First”. London, Fourth Estate.
 Fattah, K., and K. M. Fierke. 2009. “A Clash of Emotions: The Politics of
Humiliation and Political Violence in the Middle East.” European Journal of
International Relations 15 (1): 67–93.
http://doi.org/10.1177/1354066108100053
 Goldstein, J. S. 2003. “War and Gender: How Gender Shapes the War System
and Vice Versa” (New Ed). Cambridge: Cambridge University Press.
 Hansen, A. (2001). “Direct action: Memoirs of an urban guerrilla”: Between
the Lines.
 Lahoud, N. 2014. “The Neglected Sex: The Jihadis’ Exclusion of Women From
Jihad.” Terrorism and Political Violence 1–23.
http://doi.org/10.1080/09546553.2013.772511
 Pearson, E 2015 “The Case of Roshonara Choudhry: Implications for Theory
on Online Radicalization, ISIS women and the gendered Jihad”, Policy and
Internet, (Forthcoming)

 Poloni-Staudinger, L., & Ortbals, C. D. (2013). “Chapter 5: Terrorism and


female political elites” in Terrorism and violent conflict: women's agency,
leadership, and responses (Vol. 8): Springer.

 “Pretty Radical: Inside Poland's Far Right” - part one; “Pretty Radical: The Far
Right's Independence Day March” - part two. Guardian Docs

Part 1: https://www.youtube.com/watch?v=Ia5YkZfz-_4

Part 2:
https://www.youtube.com/watch?annotation_id=annotation_39027737&f
eature=iv&src_vid=Ia5YkZfz-_4&v=t0B8lsKEyiw

 Saltman, EM and Smith M. 2015. “Till Martyrdom Do Us Part’ Gender and the
ISIS Phenomenon.” Institute for Strategic Dialogue/International Centre for
the Study of Radicalisation and Political Violence. Available from:
http://icsr.info/2015/06/icsr-report-till-martyrdom-us-part-genderisis-
phenomenon/

24
23 Exam revision

25

You might also like