Growing Number of Terrorist Groups
The article focuses on terrorism by annotating some bibliographies on terrorism and the relevance of the annotated sources. The purpose of the research is to find different books, articles and journals that describe terrorism. The article evaluates terrorism from different nations, trends, threats and policies that have been put in place to combat terrorism. The documented bibliographies are useful in finding relevant information that will enhance understanding terrorism from different authors point of view. The general relevance of the evaluated research and facts found is mapping of global insecurities to detect, deter and prevent terrorism which are the main objective of national security and defense intelligence system.
Annotated Bibliography on Growing Number of Terrorist Groups
Barth, R. J., Li, T., McCarthy, D., Phumiwasana, T. and Glenn Yago, G. (2006). Economic Impacts of Global Terrorism From Munich to Bali Social Science Research Network. Review available at HYPERLINK httppapers.ssrn.comsol3papers.cfmabstract_id892033 httppapers.ssrn.comsol3papers.cfmabstract_id892033
The aim of the authors is to come up with reason of economic growth in relation to terrorism. It is evident that terrorism incidents have negative impact on financial growth and capital structure of the nation. Terrorism incidents often results to property destruction which has a significant effect on economy of the nation. The article is very important for the researcher who wants to analyze the effect of terrorism in a given state.
Bowman, S. (2002). Weapons of Mass Destruction The Terrorist Threat. Congress Research Service Report for Congress, the Library of Congress. Specialist in National Defense Foreign Affairs, Defense and Trade Division.
The use of nuclear and biological chemicals weapons in terrorism is on rise and the control over the issue is lost due to technology. The article asserts that there is need to combat terrorism by identifying the factors that influence and speed terrorism. The evaluation from the article gives the facts of why there is need for use of science and technology to counter terrorism. It is evident that most terrorism incidents are influenced by use technology and science invention and the most effective policy is science and technology.
Carus, S. W. (1997). The Threat of Bioterrorism National Defense University, Strategic Forum Institute for National Strategic Studies.
Carus explains the use of biology agents for terrorism, the threats and challenges of biological agents. The primary responsibility for responding to bioterrorism attacks will be based on civilian organizations includes local and state emergency response groups and federal agencies with disaster response missions. The article gives relevant strategies in dealing with bioterrorism threats by use of science techniques.
Corlett, A. J. (2003). Terrorism A Philosophical Analysis. Philosophical Studies Series 101. Kluwer Academic Publishers
Corlett book describe the research work on terrorism secession and its related perspectives such as obligation of abiding by law, pacifism, civil disobedience, non-violence direct actions, political violence, revolutions and assassinations of the past over 15 years. The book has rich information to enable researchers understand terrorism incidents. The book is very useful by providing the facts of terrorism and its concept by specifying the trend s of terrorism for the past 15 years.
Country Reports on Terrorism. Office of the Coordinator for Counterterrorism Chapter 6 -- Terrorist Organizations. The Office of Electronic Information, Bureau of Public Affairs. U.S. Department of State, Diplomacy in Action. Review available at HYPERLINK httpwww.state.govsctrlscrt2007103714.htm httpwww.state.govsctrlscrt2007103714.htm
The article focuses on terrorists organization, U. S Government designated Foreign Terrorists Organizations. This article discusses the origin of the terrorist organization, its activities, the strength and weakness of the organization, its area of operation and the external aid. From the evaluations in article, terrorism attacks occur if there is support and the nation involved lack the policies.
Cregory, K. (2010). Provisional Irish Republican Army (IRA) (aka, PIRA, the provos, glaigh na hireann) (U.K. separatists). Council on Foreign Relations. Review available at HYPERLINK httpwww.cfr.orgpublication9240provisional_irish_republican_army_ira_aka_pira_the_provos_glaigh_na_hireann_uk_separatists.html httpwww.cfr.orgpublication9240provisional_irish_republican_army_ira_aka_pira_the_provos_glaigh_na_hireann_uk_separatists.html
The provisional Irish Republican Army outgrowth old group known as the Irish Republican Army which fought and they successfully challenged British rule in the whole of Ireland. Warfare culminated in the creation of an independent Irish Free State, civil war was launched and force was won by pro-treaty Irish. The old IRA maintained a low level campaign of violence with aim of reuniting Ireland. However, IRA was perceived to be the most dangerous terrorist organizations in the world since the activities dwindled significantly.
Daugherty, M. (2003). The Real IRA. The British continue to claim sovereignty over part of our country and while that is the case armed struggle will always be justified. RIRA Televised Interview, February 2003. Review available at HYPERLINK httpirelandsown.netRIRA.html httpirelandsown.netRIRA.html
It is believed that Ireland should be ruled by the Irish and the only way that was available was to halt the oppression through armed struggle. The RIRA group was responsible for Omagh bombing which killed 29 people in 1998. RIRA further planted and detonated at least 12 bombs in the greater London and they succeeded in bombing BBC Television centre.
Fletcher, H. (2008). IRA Splinter Groups (U.K., separatists) (Continuity Irish Republican Army, Real IRA, Irish National Liberation Army) Council on Foreign Relations. Review available at HYPERLINK httpwww.cfr.orgpublication9239p2 httpwww.cfr.orgpublication9239p2
The conflict on Northern Irelands arose between the Protestant unionists who wanted to maintain their link with London and against Roman Catholic republicans who wanted to reunite Northern Ireland with the independent Republic of Ireland. The conflict lead to l Irish Republican Army, a terrorist group who engaged in conducted a violent struggle against British rule for three decades until peace treaty was signed. The Real IRA and Continuity Irish Republican Army were both active terrorist groups.
Frazer, R. J. (2003).Terrorists Groups are Aligning to Conduct Global Terrorism. Breyer, State University. Review available at HYPERLINK httpwww.dissertation.combook.phpmethodISBNbook1581122098 httpwww.dissertation.combook.phpmethodISBNbook1581122098
The article focuses on exploring details and developments of terrorists coalitions from previous single groups. The articles not only discuss chronology of terroristic events but it also explores the underlying reasons why terrorist events are evolving.
Technology innovations such as cell phones and internet for mass communication have played a major role in terrorism through global assaults. Terrorist activities, location and trends are analyzed to predict future occurrence of events.
Gannon, C. J. (2000). Global Challenges for the 21st Century Nonproliferation and Arms Control. National Intelligence Council to the Defense Threat Reduction Agency Norfolk, Virginia
John Gordon played a major role by being champion of National Intelligence Council to the Defense Threat Reduction Agency mission to prevent the use of weapons for mass destruction, to reduce the present threat and to be prepared for the future threat through wide collaboration experts inside and outside the US Government. Terrorism poses threats to American and Non-American citizens, soldiers, territories, allies and global interests.
The author describes terrorism in different perspectives. One is that there is missile threat, most cities face ballistic missiles threats globally due to direct foreign assistance and indigenous technology developments. Another perspective of terrorism is biological and weapon threats, the sophistication of use biology and weapons pose a threat on intelligence of experts on dealing with terrorism. Thirdly, there is a threat posed by nuclear proliferation which is used to destroy a large mass of population trough bombing.
Greenwald, L. A. (2010). Perspectives on Terrorism, Trends in Terrorist Activity and Dynamics in Diyala province, Iraq, during the Iraqi Governmental Transition, 2004-2006 Journal of the Terrorism Research Initiative. Vol. IV, Issue 1. Enhancing Security through Collaborative Research. Review available at HYPERLINK httpwww.terrorismanalysts.comptindex.phpoptioncom_rokzineviewarticleid105Itemid54 httpwww.terrorismanalysts.comptindex.phpoptioncom_rokzineviewarticleid105Itemid54
Greenwald book suggest that terrorist uses some range trends to carry out terrorism attacks. Iraqi terrorists used tactical trends by deploying use of fire arms and suicidal bombings. The other prevalent trend was victimization the victims who were targeted for attack were civilians, police and then the government. The form of terrorism was localized violence trend where violence was used to attack cities.
International Risk assessment Terrorism Trends in 2009. Terrorism Trends in Asia in 2009 Mixing Terrorism and India-Pakistan Tensions An Explosive Cocktail.
HYPERLINK httpwww.intl-risk.com www.intl-risk.com
From the authors point of view, it is evident that terrorism has a significant threat of peace and security in South Asia. Lack of effective response in India and Pakistan states to deal with terrorism has majorly contributed to environmental tensions and by any means could ignite military conflict between the states. Terrorism is deeply intertwined in complex political and national agendas of Pakistanis and Indians causing distrust between the states. Terrorism in South Asia is a principal tool for global conflict against terrorism and military activities. The book provides insights on how terrorism occurs in nations.
Kass, L. (2005). Syria after Lebanon The Growing Syrian Missile Threat. Middle East Forum, Middle East Quarterly Fall 2005, vol. XII, No.4 pp. 25-34. Review available at HYPERLINK httpwww.meforum.org755syria-after-lebanon-the-growing-syrian-missile httpwww.meforum.org755syria-after-lebanon-the-growing-syrian-missile
Kass describes four defense and intelligence concerns about Syrian regimes. Despite The success of international pressure on forcing Damascus to withdraw its troops from Lebanon, it is evident that Syrians are still in attempt of acquiring sophisticated surface-to-surface missiles. Secondly, U. S intelligence force suggests that Syrian state is a custodian of Iraqi biological and chemical weapons for mass destruction. The third issue is that, it is not clear if Damascus got the benefit from networking with Abdul Qadir Khan, a Pakistani nuclear scientist who sold nuclear weapons to a group of rogue regimes. Lastly, Bashar al-Assad continues to connect with agents of international terrorists, he shows no sign of declining which has lead U.S. government to designate Syria as a state of terrorism sponsors. From the article, one gets to understand terrorism in Syrian government, and the components of terrorist threats.
LaFree, G. (2010). Perspectives on Terrorism, the Global Terrorism Database Accomplishments and Challenges. Journal of the Terrorism Research Initiative. Vol. IV, Issue 1. Enhancing Security through Collaborative Research. Review available at HYPERLINK httpwww.terrorismanalysts.comptindex.phpoptioncom_rokzineviewarticleid105Itemid54 httpwww.terrorismanalysts.comptindex.phpoptioncom_rokzineviewarticleid105Itemid54
The article provides updated Global Terrorism Database which provides information on international terrorist attacks. Global terrorism perspectives are discussed.
Lutz, M. J. and Lutz, J. B. (2008). Global Terrorism. Terrorism in the World Today and Yesterday 2nd Edition. British Library Cataloguing in Publication Data.
The book discusses terrorism in the past and in present. Terrorism is classified into categories, causes and prevalence of terrorism in a given nation are evaluated by the authors. Insight details about the sponsor and supporters of terrorism are further discussed. The review of terrorism tactics, weapons, trends and targets are documented in the book. This book is very useful to researchers who are interested in knowing the history of terrorism since its inception to the current state.
Narasimha, R. (2007). Science and Technology to Counter Terrorism The proceeding of an INDO-U.S Workshop. National Academy of Sciences, The National Academies Press. National Strategic and Security Studies Programme, National Institute of Advanced Studies.
Narasimha wrote on the search of strategic solutions of combating terrorism by use of science and technology. This book focuses on terrorists threat in India and in Unite State of America. Author further suggested the information and communication technology security as a policy used to counter terrorists attack in both states. The book is very useful in finding the strategic measures of science and technology that can be used to combat terrorism threats.
Nelson, O. R. and Bodurian, B. (2010). A Growing Terrorist Threat Assessing Homegrown Extremism in the United States. A Report of the CSIS Homeland Security and Counterterrorism Program. Center for Strategic and International Studies.
The Center for Strategic and International Studies provided strategic insights and practical solutions by finding ways of America to survive and prosper as a nation. The article discusses five events during the fall of 2009 terrorist attacks perpetrated by U.S.A legal residents and citizens. The events are
Najibullah Zazi who is an Afghan citizen and U.S. legal resident, got arrested and charged for conspiracy to use deadly weapons for mass destruction in September 19.
In October 27, U.S. citizen David Coleman Headley was charged by federal authorities for planning to attack the Danish newspaper.
Major Nidal Malik Hasan an U.S. Army allegedly killed 13 and wounded 30 at Fort Hood Army Base, outside Killeen, Texas in November 5.
In November 23, federal officials opened accusation against eight people who were charged to have connection with alleged recruitment Somali Americans to fight with insurgent group in Somalia.
In December 9, five young men from Northern Virginia got arrested in Sargodha, Pakistan. U.S. and Pakistani authorities with claim that group had intention of fight alongside Taliban militants in Afghanistan.
Neumann, R. P. (2009). Old and New Terrorism Social Europe Journal Vol. 4 Issue 3 No. 2
Review available at HYPERLINK httpwww.social-europe.eu200908old-and-new-terrorism httpwww.social-europe.eu200908old-and-new-terrorism
The features of terrorism are revolutionized with change in technology, since there are new forms of terrorism. The journal explains the new invention of terrorism attacks which are more dangerous compared to past techniques.
Perl, F. R. (2007). International TerrorismThreat, Policy, and Response. Congress Research services Report for Congress. Specialist in International Affairs Foreign Affairs, Defense, and Trade Division
The Perls article consists of four major components namely war on terrorism, threat of terrorism, trend of terrorism and policy responses.
The war on terrorism is focused on priority of combating Al Qaeda by use of military force. Terrorism poses threat to domestic peace and security of nation. The modern trend of terrorism is displayed by organized group, self- financed and global network of terrorists. Religions are used in pretext of friendliness, military training, technology, funds and political power. The range of policy measures that have been established to combat terrorism include diplomacy, international cooperation, constructive engagement, protective security measures, economic sanctions, covert action and military force.
Schmid, P. A. and Jongman, J. A. (1987). Political Terrorism A New Guide to Actors, Authors, Concepts, Databases, Theories and Literature. Expanded and Updated Edition Prepared Under the Auspices of the Center for International Affairs, Harvard University.
Schmid and Jongman discuss terrorism and its concept with elaborate information on theories, databases and organizations of terrorism. It is evident that the book is a significant tool for political scientist they use the book to understand the nations political structure by analyzing political terrorist attacks. The authors work provides significant literature for researchers who are interested in terrorism research. Well defined and documented bibliographies are included in the book.
Shelley, L. (2006) Threat Convergence New Pathways to proliferation Expert Series Growing Together Ideological and Operational Linkages between Terrorist and Criminal Networks School of International Service, Terrorism, Transnational Crime and Corruption Center American University, Washington, D.C.
Shelley books suggest that terrorists and criminals operation are quite similar, criminals work hand in hand with terrorists. Criminals and terrorist interact through the new criminal networks.
Sturcke, J. (2009). Explainer Real IRA and Continuity IRA. Dissident republican groups that both split from the Provisional IRA. Review available at HYPERLINK httpwww.guardian.co.ukuk2009mar10real-ira-continuity httpwww.guardian.co.ukuk2009mar10real-ira-continuity
Both the Real IRA and Continuity IRA are descendants of republican groups that split from the Provisional IRA.
Terrorism Research Center (1996). Mirror Image Training to Combat Terrorism.
Review available at HYPERLINK httpwww.terrorism.com httpwww.terrorism.com
The agency is an independent institute which is dedicated on research of terrorism, information on warfare and security, critical infrastructure protection, homeland security and other issues concerned with political violence and defense.The agency provides reliable training and cutting edge solutions to real world problems of terrorism attacks. The Mirror Image Classes have been featured and deployed in Afghanistan where proportion of terrorism attacks is very high. The article is very useful for security officials who are interested in getting information about the terrorism. Training is relevant for defense and security systems in getting the skills required to combat terrorism.
Thornton, D. (2010). Real IRA assassinate drug informant Ciaran Doherty. Review available at HYPERLINK httpwww.irishcentral.comnewsReal-IRA-assassinate-drug-informant-Ciaran-Doherty-85471267.html httpwww.irishcentral.comnewsReal-IRA-assassinate-drug-informant-Ciaran-Doherty-85471267.html
RIRA claimed the responsibility of Doherty murder after suspecting that Doherty were responsible for giving police the information about the information Cannabis factory in Donegal County.
0 comments:
Post a Comment