Leeds University Library

PIED5569M
Module Reading List 5569 Counterterrorism

Counterterrorism, 2017/18, Semester 1
Dr Lars Berger
l.berger@leeds.ac.uk
Tutor information is taken from the Module Catalogue

Reading List - Counterterrorism

General background:

- Art, R., and Richardson, L. eds. (2007), Democracy and counterterrorism : lessons from the past, Washington, D.C.: United States Institute of Peace Press.

- Bakker, Edwin (2015), Terrorism and counterterrorism studies : comparing theory and practice , Leiden University Press.

- Crelinsten, R. (2009), Counterterrorism, Cambridge: Polity.

- Davis, Paul K. and Kim Cragin (eds.) (2009), Social science for counterterrorism: putting the pieces together. Available online here: http://www.rand.org/pubs/monographs/MG849.html

- English, R. (2009), Terrorism : how to respond, Oxford: Oxford University Press.

- Ganor, Boaz (2005), The counter-terrorism puzzle : a guide for decision makers, New Brunswick, NJ: Transaction Publishers.

- Nacos, B. (2008), Terrorism and counterterrorism : understanding threats and responses in the post-9/11 world, 2nd ed., New York: Penguin Academics.

Top of page

Top of page

Week 1 – The context of counterterrorism I: How does the political system impact counterterrorism policies?

Required Readings:

- Abrams, Max (2007), Why Democracies Make Superior Counterterrorists, Security Studies, 2, 223-53.

- Chowdhury, Arjun (2013), Effective but Inefficient: Understanding the Costs of Counterterrorism, Critical studies on terrorism ISSN: 1753-9153, 6:3, 447-456.

Seminar Questions:

- Are democracies superior counter-terrorists?

- Are democracies particularly vulnerable to terrorist attacks?

- How do terrorist organisations challenge stable democracies?

- Does the promotion of democracy prevent terrorism?

Additional Readings:

- Chalk, P. (1998), The Response to Terrorism as a Threat to Liberal Democracy, The Australian journal of politics and history., 44:3, 373-388.

- Croft, Stuart, Moore Cerwyn (2010), The evolution of threat narratives in the age of terror: understanding terrorist threats in Britain, International affairs., 86:4, 821-835.

- Eyerman, Joe (1998), Terrorism and Democratic States: Soft Targets or Accessible Systems? , International Interactions, 24:2, 151-170.

- Hewitt, S. (2008), The British war on terror : terrorism and counter-terrorism on the home front since 9/11, London: Continuum.

- Heymann, P.B. (2003), Terrorism, freedom, and security : winning without war, Cambridge: MIT Press.

- Heymann, P.B. (2001/2), Dealing with Terrorism: An Overview, International security., 26:3, 24-38.

- Howorth, Jolyon (2008), European Security and Counter-Terrorism, in Chebel D'Appollonia, Ariane/Simon Reich (ed.), Immigration, integration, and security : America and Europe in comparative perspective, Pittsburgh: University of Pittsburgh Press, 95-110.

- Klausen, Jytte (2009), British Counterterrorism after 7/7: Adapting Community Policing to the Fight against Domestic Terrorism, Journal of ethnic and migration studies., 35:3, 403-420.

- Keefer, Philip/Loayza, Norman (2008), Terrorism, economic development, and political openness, Cambridge: Cambridge University Press.

- Koch, Michael T.; Cranmer, Skyler (2007), Testing the 'Dick Cheney' Hypothesis: Do Governments of the Left Attract More Terrorism than Governments of the Right? , Conflict management and peace science, 24:4, 311-326.

- LaFree, G., Dugan, L., and Korte, R. (2009), The Impact of British Counterterrorist Strategies on Political Violence in Northern Ireland: Comparing Deterrence and Backlash Models, Criminology., 47: 17-45.

- Lee, Chia-yi (2013), Democracy, Civil Liberties, and Hostage-Taking Terrorism, Journal of peace research., 50:2, 235-248.

- Li, Quan (2005), Does Democracy Promote or Reduce Transnational Terrorism, The journal of conflict resolution., 49:2, 278-297.

- Masferrer, Aniceto, and Clive Walker (eds.) (2013), Counter-terrorism, human rights and the rule of law : crossing legal boundaries in defence of the state , Edward Elgar Publishing. 

- Miller, Gregory (2007), Confronting Terrorisms: Group Motivation and Successful State Policies, Terrorism and political violence., 19:3, 331-350.

- Pantucci, R. (2010), A Contest to Democracy? How the UK has Responded to the Current Terrorist Threat, Democratization., 17:2, 251-271.

- Pedahzur, Ami & Magnus Ranstorp (2001), A tertiary model for countering terrorism in liberal democracies: the case of Israel, Terrorism & Political Violence, 13:2

- Perliger, Arie (2012), How Democracies Respond to Terrorism, Security Studies ISSN: 0963-6412; 1556-1852, 21:3, 490-528.

- Rees, Wyn (2006), Transatlantic counter-terrorism cooperation : the new imperative, London: Routledge.

- Rees, W., and Aldrich, R. (2005), Contending Cultures of Counterterrorism: Transatlantic Divergence or Convergence, International affairs., 81:5, 905-923.

- Savun, Burcu; Phillips, Brian J. (2009), Democracy, Foreign Policy, and Terrorism, The journal of conflict resolution., 53:6, 878-904.

- Shapiro, Jeremy/Byman, Daniel (2006), Bridging the Transatlantic Counterterrorism Gap, The Washington quarterly., 29:4, 33-50.

- Stanislawski, Bartosz Hieronim (2010), Negotiating Being as Visible as Goliath, Yet as Smart as David: Democratic Constraints and the Fight Against Terrorism, International studies review., 12:1, 115-122.

- Thomas, Paul (2010), Failed and Friendless: The UK's 'Preventing Violent Extremism' Programme, British journal of politics & international relations. , 12:3.

- Weinberg, L.B. and Eubank, W.L. (1998), Terrorism and Democracy: What Recent Events Disclose, Terrorism and Political Violence, 10:1, 108-118.

- Wilkinson, Paul (2007), Homeland security in the UK : future preparedness for terrorist attack since 9/11, London: Routledge.

- Wilkinson, Paul (2006), Terrorism versus Democracy: The Liberal State Response, 2nd ed., London: Routledge.

Top of page

Top of page

Week 2 – The context of counterterrorism II: What contribution can the intelligence community and policing make?

Required Readings:

- Richards, Julian (2012), Intelligence Dilemma? Contemporary Counterterrorism in a Liberal Democracy, Intelligence and national security. ISSN: 0268-4527, 27:5, 761-780.

- Stohl, Michael (2008), Networks, Terrorists, and Criminals: The Implications for Community Policing, Crime, law and social change. ISSN: 0925-4994, 50: 59-72.

Seminar Questions:

- Do policy-makers and the media overplay the importance of intelligence gathering in fighting terrorism?

- What challenges to liberal democracy does the prominent role of intelligence agencies in fighting terrorism bring about?

- What is the contribution which (community) policing can make to counterterrorism?

Additional Readings:

- Acre, Daniel G., and Todd Sandler (2010), Terrorist Spectaculars: Backlash Attacks and the Focus of Intelligence, The journal of conflict resolution. ISSN: 0022-0027, 54:2, 354-373.

- Acre, Daniel G., and Todd Sandler (2007), Terrorist Signalling and the Value of Intelligence, British journal of political science. ISSN: 0007-1234, 37: 573-586.

- Byman, Daniel (2014), The Intelligence War on Terrorism, Intelligence and national security. ISSN: 0268-4527, 29:6, 837-863.

- Dragu, Tiberiu (2011), Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention, The American political science review. ISSN: 0003-0554, 105:1, 64-78.

- Feinstein, Jonathan S., and Edward H. Kaplan (2011), Counterterror intelligence operations and terror attacks, Public choice. ISSN: 0048-5829, 149: 281-295.

- Fisher, Stefanie (2016), The Fight Against Terrorism—the need for local police units in the United States’ intelligence community, Journal of Military and Strategic Studies ISSN: 1488-559X, 17:1, 189-208.

- Foley, Frank (2009), The expansion of intelligence agency mandates: British counter-terrorism in comparative perspective, Review of international studies. ISSN: 0260-2105, 35: 983-995.

- Martin, Kate (2004), Domestic Intelligence and Civil Liberties, SAIS Review of International Affairs, 24:1, 7-21. - Available online: https://muse.jhu.edu/article/53262

- Svendsen, Adam D.M. (2012), The Federal Bureau of Investigation and Change: Addressing US Domestic Counter-terrorism Intelligence, Intelligence and national security. ISSN: 0268-4527, 27:3, 371-397.

Top of page

Week 3 – The context of counterterrorism III: What are the costs and benefits of counterterrorism collaboration at the international level?

Required Readings:

- Aldrich, Richard J. (2009), US–European Intelligence Co-operation on Counter-Terrorism: Low Politics and Compulsion, British journal of politics & international relations. ISSN: 1369-1481, 11: 122-139.

- Svendsen, Adam D.M. (2009), Connecting Intelligence and Theory: Intelligence Liaison and International Relations, Intelligence and national security. ISSN: 0268-4527, 24:5, 700-729.

Seminar Questions:

- Why has the international community been so slow in developing a joint approach to fighting terrorism?

- What makes international counterterrorism cooperation more likely to occur?

- What are the main obstacles to intelligence collaboration in counterterrorism?

- What are the specific challenges involved in democracies cooperating with non-democracies in fighting terrorism?

Additional Readings:

- Button, Andrew (2016), Of terrorism and revenue: Why foreign aid exacerbates terrorism in personalist regimes, Conflict management and peace science ISSN: 0738-8942, Online First.

- Den Boer, Monica (2015), Counter-Terrorism, Security and Intelligence in the EU: Governance Challenges for Collection, Exchange and Analysis, Intelligence and national security. ISSN: 0268-4527, 30:2-3, 402-419.

- Fägersten, Björn (2010), Bureaucratic Resistance to International Intelligence Cooperation – The Case of Europol, Intelligence and national security. ISSN: 0268-4527, 25:4, 500-520.

- Hafner-Burton, Emilie M., and Jacob N. Shapiro (2010), Tortured Relations: Human Rights Abuses and Counterterrorism Cooperation, PS : political science and politics. ISSN: 1049-0965, 415-419.

- Jensen, Thomas (2016), National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision, The journal of conflict resolution. ISSN: 0022-0027, 60:3, 530-554.

- Keohane, Daniel (2008), The Absent Friend: EU Foreign Policy and Counter-Terrorism, Journal of Common Market Studies. ISSN: 0021-9886, 46:1, 125-146.

- Neumayer, Eric, Thomas Plümper, and Mariaelisa Epifanio (2014), The “Peer-Effect” in Counterterrorist Policies, International organization. ISSN: 0020-8183, 68: 211-234.

Top of page

Week 4 – Strategies of Counterterrorism I: The 'US War in Terror'

Required Readings:

- Brands, Hal; and Peter Feaver (2017), Trump and Terrorism: U.S. Strategy After ISIS, Foreign affairs. ISSN: 0015-7120, 96:2, 28-36.

- Byman, Daniel Byman, and Will McCants (2017) Fight or Flight: How to Avoid a Forever War against Jihadists, The Washington quarterly. ISSN: 0163-660X; 1530-9177, 40:2, 67-77.

- Mearsheimer, John J; and Stephen M. Walt (2016), The Case for Offshore Balancing: A Superior U.S. Grand Strategy, Foreign affairs. ISSN: 0015-7120, 95:4, 70-83.

Seminar Questions:

- How would you measure effectiveness in counterterrorism?

- Has the 'war on terror' been an effective response to terrorism?

- What role does military force play in reducing terrorism?

- Can terrorism be deterred?

- Does democratization help reduce terrorism?

- Would geopolitical retrenchment make the US more secure from terrorist attacks?

Additional Readings:

- Asal, Victor, Joseph K. Young (2012) Battling Abroad: Why Some Organizations are Likely Targets of Foreign Counterterrorism, Civil wars. ISSN: 1369-8249; 1743-968x, 14:2, 272-287.

- Ball, D. (2002), Desperately Seeking Bin Laden: The Intelligence Dimension of the War against Terrorism, in Booth, Ken/Dunne, Timothy, Worlds in collision : terror and the future of global order, Basingstoke: Palgrave Macmillan, 60-73.

- Benjamin, Daniel (2008), Using Hard Power in the Fight against Terrorism, The International Centre for the Study of Radicalisation and Political Violence (eds.), Perspectives on Radicalisation and Political Violence: Papers from the First International Conference on Radicalisation and Political Violence,London: ICSR.available at: http://icsr.info/wp-content/uploads/2012/10/1234516938ICSRPerspectivesonRadicalisation.pdf

- Betts, R.K. (2002), The Soft Underbelly of American Primacy: Tactical Advantages of Terror, Political science quarterly., 117:1, 19 – 36.

- Brophy-Baermann, B. and J.A.C.Conybaere (1994), Retaliating against terrorism: Rational expectations and the optimality of rules versus discretion, American journal of political science., 38: 196-210.

- Chowdhury, Arjun/Krebs, Ronald R (2010), Talking about terror: Counterterrorist campaigns and the logic of representation, European journal of international relations., 16:1, 125-150.

- Clarke, Richard A. (2004), Against all enemies : inside America's war on terror Simon & Schuster.

- Crenshaw, Martha (2002), Counterterrorism Policy and the Political Process, Studies in conflict and terrorism., 24:5: 329-337.

- Cronin, Audrey (2010), The Evolution of Counterterrorism: Will Tactics Trump Strategy? , International affairs., 86:4, 837-856.

- Cronin, Audrey (2009), How terrorism ends : understanding the decline and demise of terrorist campaigns, Princeton: Princeton University Press.

- Cronin, Audrey (2006), How al-Qaeda Ends: The Decline and Demise of Terrorist Groups, International security., 31:1, 7-48.

- Davis, Paul K/Jenkins, Brian Michael (2002), Deterrence & influence in counterterrorism : a component in the war on al Qaeda, Santa Monica, CA: Rand.

- Duyvesteyn, I. (2008), Great Expectations: The Use of Armed Force to Combat Terrorism, Small wars and insurgencies., 19:3, 328-351.

- Ganor, Boaz (2008), Terrorist Organization Typologies and the Probability of a Boomerang Effect, Studies in Conflict & Terrorism, 31 (4), 269-283.

- Henne, Peter S. (2017), Islamic politics, Muslim states, and counterterrorism tensions, Cambridge University Press.

- Hoffman, Bruce (2009), A Counterterrorism Strategy for the Obama Administration, Terrorism and political violence., 21:3, 359-377.

- Ikenberry, John (2001), American Grand Strategy in the Age of Terror, Survival., 43:4, 19-34.

- Kurtulus, Ersun N. Kurtulus (2012) The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel, Studies in conflict and terrorism. ISSN: 1057-610X; 1521-0731, 35:1, 37-58

- Lum, C., Kennedy, L., and Sherley, A. (2006), Are Counter-Terrorism Strategies Effective? The Results of the Campbell Systematic Review on Counter-terrorism Evaluation Research, Journal of Experimental Criminology , 2:4, 489-516.

- Lustick, Ian (2008), Our Own Strength Against US: The War on Terror as a Self-Inflicted Disaster, 4 April, Washington, D.C.: Independent Institute. Available online here: http://www.independent.org/pdf/policy_reports/2008-04-04-lustick.pdf

- McCauley, Clark/Moskalenko, Sophia (2010), Recent U.S. Thinking About Terrorism and Counterterrorism: Baby Steps towards a Dynamic View of Asymmetric Conflict, Terrorism and Political Violence, 22:4, 641-657.

- Mickolus, Edward F. (2002), How Do We Know We're Winning the War against Terrorists? Issues in Measurement, Studies in Conflict and Terrorism, 25:3, 151-160.

- Pillar, Paul (2004), Counterterrorism after al-Qaeda, Washington quarterly., 27:3, 101-113.

- Silke, A. (2005), Fire of Iolus: The Role of State Countermeasures in Causing Terrorism and What Needs to be done, in Bjorgo, T., Root causes of terrorism : myths, reality, and ways forward, London: Routledge.

- Simon, Steven/Jeff Martini (2005), Terrorism: Denying Al Qaeda its popular support, Washington quarterly., 28:1, 131-145.

- Weinberg, Leonard (2006), Terrorism and Democracy: Illness and Cure? , Global dialogue , 8:3-4.

Top of page

Top of page

Week 5 –Strategies of Counterterrorism II: Targeted Killings

Required Readings:

- Byman, Daniel (2013), Why Drones Work: The Case for Washington's Weapon of Choice, Foreign affairs., 92:4, 32-43.

- Cronin, Audrey Kurth (2013), Why Drones Fail: When Tactics Drive Strategy, Foreign Affairs, 92:4, 44-54.

Seminar Questions:

- Why do states engage in targeted killings?

- Are targeted killings moral, legal, or effective?

Additional Readings:

- Brunstetter, Daniel/Braun, Megan (2011), The Implications of Drones on the Just War Tradition, Ethics and international affairs, 25:3, 337-358.

- Byman, Daniel (2006), Do Targeted Killings Work? , Foreign Affairs, 85 (2), 95-111.

- Craig, Alan (2013), International legitimacy and the politics of security : the strategic deployment of lawyers in the Israeli military, Chapter 6: The Second Intifada and the Killing of Salah Shehadeh, Lexington Books.

- David, S. (2003), Israel’s Policy of Targeted Killing, Ethics and International Affairs, 17:1, 111-126.

- David, S. (2003), If Not Combatants, Certainly Not Civilians, Ethics and International Affairs, 17:1, 138-140.

- Gross, M. (2003), Fighting by Other Means in the Middle East: A Critical Analysis of Israel’s Assassination Policy, Political studies., 51: 350-368.

- Hafez, M., and Hatfield, J. (2006), Do Targeted Assassinations Work? A Multivariate Analysis of Israel’s Controversial Tactic during Al-Aqsa Uprising, Studies in Conflict and Terrorism, 29:4, 359-382.

- Jordan, Jenna (2009), When Heads Roll: Assessing the Effectiveness of Leadership Decapitation, Security Studies ISSN: 0963-6412; 1556-1852, 18: 719-755.

- Lotrionte, Catherine (2003), When to Target Leaders, The Washington quarterly., 26:3, 73-86.

- Mannes, A. (2008), Testing the Snake Head Strategy: Does Killing or Capturing its Leaders Reduce a Terrorist Group’s Activity? , Journal of international policy solutions , 9: 40-49.

- Melzer, N. (2008), Targeted killing in international law, Oxford: Oxford University Press.

- Patterson, E. & Casale, T. (2005), Targeting Terror: The Ethical and Practical Implications of Targeted Killing, International journal of intelligence and counter intelligence., 18:4, 638-652.

- Reinold, Theresa (2011), The Sovereignty Dodge and the Responsibility to Control: Should the US Do What Pakistan Won't Do? , Journal of intervention and statebuilding , 5:4, 395-417.

- Smith, Megan/Walsh, James Igoe (2013), Do Drone Strikes Degrade Al Qaeda? Evidence from Propaganda Output, Terrorism and political violence., 25:2, 311-327.

- Williams, Brian Glyn (2010), The CIA's Covert Predator Drone War in Pakistan, 2004-2010: The History of an Assassination Campaign, Studies in Conflict & Terrorism, 33:10, 871-892.

 

Top of page

Top of page

Week 6 –Strategies of Counterterrorism III: De-Radicalization

Required Readings:

- Bovenkerk, Frank (2011), On leaving criminal organizations, Crime, law and social change. ISSN: 0925-4994, 55: 261-276.

- Horgan, John & Kurt Braddock (2010) Rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of De-radicalization Programs, Terrorism and political violence. ISSN: 0954-6553, 22:2, 267-291.

Seminar Questions:

- Is de-radicalization possible?

- How do we whether de-radicalization initiatives are successful?

- Should de-radicalization or dis-engagement take priority in counterterrorism efforts? Why?

Additional Readings:

- Altier, Mary Beth, Emma Leonard Boyle, Neil D. Shortland & John G. Horgan (2017) Why They Leave: An Analysis of Terrorist Disengagement Events from Eighty-seven Autobiographical Accounts, Security Studies ISSN: 0963-6412; 1556-1852, 26:2, 305-332.

- Ashour, Omar (2011) Post-Jihadism: Libya and the Global Transformations of Armed Islamist Movements, Terrorism and political violence. ISSN: 0954-6553, 23:3, 377-397.

- Ashour, Omar (2007), Lions Tamed? An Inquiry into the Causes of De-Radicalization of Armed Islamist Movements: The Case of the Egyptian Islamic Group, The Middle East journal. ISSN: 0026-3141, 61:4, 596-625.

- Barelle, Kate (2015) Pro-integration: disengagement from and life after extremism, Behavioral Sciences of Terrorism and Political Aggression, 7:2, 129-142. - Available online: http://www.tandfonline.com/doi/abs/10.1080/19434472.2014.988165

- Braddock, Kurt & John Horgan (2016), Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism, Studies in conflict and terrorism. ISSN: 1057-610X; 1521-0731, 39:5, 381-404.

- Della Porta, Donatella, and Gary LaFree (2012), Processes of Radicalization and De-Radicalization, International journal of conflict and violence ISSN: 1864-1385, 6:1, 4-10.

- Drevon, Jérôme (2015), Assessing Islamist Armed Groups’ De-Radicalization in Egypt, Peace Review ISSN: 1040-2659, 27:3, 296-303.

- Horgan, John, Mary Beth Altier, Neil Shortland & Max Taylor (2017) Walking away: the disengagement and de-radicalization of a violent right-wing extremist, Behavioral Sciences of Terrorism and Political Aggression, 9:2, 63-77. - Available online: http://www.tandfonline.com/doi/abs/10.1080/19434472.2016.1156722

- Horgan, John (2008), From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism, Annals of the American Academy of Political and Social Science. ISSN: 0002-7162, 618, 80-94.

- Innes, Martin, Colin Robert, and Trudy Lowe (2017), A Disruptive Influence? “Prevent-ing” Problems and Countering Violent Extremism Policy in Practice, Law & society review. ISSN: 0023-9216, 51:2, 252-281.

- Karpantschof, René (2015), Violence that matters! Radicalization and deradicalization of leftist, urban movements – Denmark 1981–2011, Behavioral Sciences of Terrorism and Political Aggression, 7:1, 35-52. - Available online: http://www.tandfonline.com/doi/abs/10.1080/19434472.2014.977330?journalCode=rirt20

- Korn, Judy (2016), European CVE Strategies from a Practitioner’s Perspective, Annals of the American Academy of Political and Social Science. ISSN: 0002-7162, 668, 180-197.

- Liht, Jose, and Sarah Savage (2013), Preventing violent extremism through value complexity: Being Muslim being British, Journal of Strategic Security, 6(4): 44–66. - Available online: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1253&context=jss

- Mallonee, Laura (2017), Step Inside a Saudi Rehab Prison for Jihadists, Wired, https://www.wired.com/2017/03/david-degner-jihad-rehab/

- Romaniuk, Peter (2015), Does CVE Work? Lessons Learned from the Global Effort to Counter Violent Extremism, Global Center on Cooperative Security, http://www.globalcenter.org/wp-content/uploads/2015/09/Does-CVE-Work_2015.pdf

- Schmid, Alex P., and Eric Price (2011), Selected literature on radicalization and de-radicalization of terrorists: Monographs, Edited Volumes, Grey Literature and Prime Articles published since the 1960s, Crime, law and social change. ISSN: 0925-4994, 55, 337–348.

- Selim, George (2016), Approaches to Countering Violent Extremism at Home or Abroad, Annals of the American Academy of Political and Social Science. ISSN: 0002-7162, 668, 94-101.

Top of page

Week 7 – Topics of Counterterrorism I: Countering state sponsored terrorism

Required Readings:

- Byman, Daniel; Kreps, Sarah E. (2010), Agents of Destruction? Applying Principal-Agent Analysis to State-Sponsored Terrorism, International studies perspectives., 11:1, 1-18.

Seminar Questions:

- How does the state sponsored terrorism threat compare to the terrorism threat posed by non-state actors?

- (How) Can state sponsors of terrorism be deterred?

- (How) Can state sponsors of terrorism be engaged?

- (Under what circumstances) should governments be held accountable for terrorists operating from their territory?

Additional Readings:

- Byman, Daniel (2008), Iran, Terrorism, and Weapons of Mass Destruction, in: Studies in conflict and terrorism., 31:3, pp. 169-181.

- Byman, Daniel (2007), Deadly connections : states that sponsor terrorism, Cambridge: Cambridge University Press.

- Byman, Daniel (2005), Confronting Syrian-Backed Terrorism, in: The Washington quarterly., 28:3, 99-113.

- Clarke, Ryan (2010), Lashkar-i-Taiba: Roots, Logistics, Partnerships, and the Fallacy of Subservient Proxies, Terrorism and political violence., 22:3, 395-418.

- Collins, Stephen D. (2004), Dissuading State Support of Terrorism: Strikes or Sanctions? , Studies in Conflict & Terrorism, 27, 1–18.

- Conrad, Justin (2011), Interstate Rivalry and Terrorism: An Unprobed Link, The journal of conflict resolution., 55:4, 529-555.

- Fair, Christine C. (2014), Fighting to the end : the Pakistan Army's way of war, Oxford University Press.

- Fuller, Graham E. (2004), The Hezbollah-Iran Connection: Model for Sunni Resistance, Washington Quarterly, 30:1, 139-150.

- Geltzer, Joshua Alexander (2011), Taking Hand-Outs or Going It Alone: Nationalization versus Privatization in the Funding of Islamist Terrorist Groups, Studies in Conflict & Terrorism, 34:2, 144-170.

- Honig, Or Arthur (2013), Coercing Weak Regimes to Stop Supporting Terrorism: How and When It Can Be Done, Comparative strategy., 32:3, 245-260.

- Karmon, Ely (2008), Iran–Syria–Hizballah–Hamas A Coalition against Nature Why Does it Work?, The Proteus Monograph Series available at: https://www.ict.org.il/UserFiles/karmon-iran-syria-hizbollah.pdf

- Pienaar, Lyle (2008), State and State-Sponsored Terrorism In Africa: The Case Of Libya And Sudan, Strategic Review for Southern Africa, 30:1, 49-70. - Available online: https://repository.up.ac.za/handle/2263/6268

- Ranstorp, Magnus (1997), Hizb'allah in Lebanon : the politics of the Western hostage crisis, New York: Palgrave MacMillan, 'Western Responses to the Hostage-Crisis and Crisis-Management', pp. 134-177.

- Sick, Gary (2003), Iran: Confronting Terrorism, in: Washington Quarterly, 26: 4, pp. 83-98. http://0-www.tandfonline.com.wam.leeds.ac.uk/doi/abs/10.1162/016366003322387127

- Siqueira, Kevin/Sandler, Todd (2006), Terrorists versus the Government: Strategic Interaction, Support, and Sponsorship, The journal of conflict resolution., 50:6, 878-898.

- Turner, Robert F. (2003), State Responsibility and the War on Terror: The Legacy of Thomas Jefferson and the Barbary Pirates, Chicago Journal of International Law, 4:1, 121-140.

- Wardlaw, Grant (2001) Terror as an instrument of foreign policy, David C. Rapoport (ed.), Inside terrorist organizations, 2nd ed., London, 237-259.

- Whiteneck, Daniel (2005), Deterring Terrorists: Thoughts on a Framework, The Washington Quarterly, 28:3, 187-199.

Top of page

Top of page

Week 8 – Topics of Counterterrorism II: Countering Terrorism in Fragile States

Required Readings:

- Simons, Anna/Tucker, David (2007), The misleading problem of failed states: a 'socio-geography' of terrorism in the post-9/11 era, Third world quarterly., 28:2, 387-401.

- Takeyh, Ray (2004), Do Terrorist Networks Need a Home? , Washington Quarterly, 25:3, 97-108.

Seminar Questions:

- What role do ‘failed states’ play in facilitating transnational terrorism?

- Is the political and academic focus on ‘failed states’ misplaced?

- Does development lead to a reduction in terrorism?

Additional Readings:

- Abou Zahab, Mariam/Roy, Olivier/King, John (2004 ), Islamist networks : the Afghan-Pakistan connection, New York: Columbia University Press.

- Angstrom, Jan (2008), Inviting the Leviathan: External Forces, War, and State-Building in Afghanistan, Small wars and insurgencies., 19:3, 374-396.

- Bergen, Peter; Tiedemann, Katherine (2011), Washington's Phantom War: The Effects of the U.S. Drone Program in Pakistan, Foreign affairs, 90:4, 12-18.

- Bulley, Dan (2008), 'Foreign' Terror? London Bombings, Resistance and the Failing State, British journal of politics & international relations., 10: 3, 379-394.

- Byman, Daniel (2007), Deadly connections : states that sponsor terrorism, New York: Cambridge University Press.

- Cline, L. (2007), Counter-Terrorism Strategy in the Sahel, Studies in conflict and terrorism., 30:10, 889-899.

- Dorff, Robert H. (2005), Failed States After 9/11: What Did We Know and What Have We Learned? , International studies perspectives., 6:1, 20-34.

- International Crisis Group (2005), Counter-terrorism in Somalia: Losing Hearts and Minds?, Africa Report, no. 95, 11 July. Available online here: http://www.somali-jna.org/downloads/ICG%20Report%2095%20Counter_terrorism_in_somalia.pdf

- Jones, Seth G. (2009), In the graveyard of empires : America's war in Afghanistan, W. W. Norton & Company.

- Jones, Seth G. (2008), The Rise of Afghanistan's Insurgency, International security., 7-40.

- Le Sage, Andre (ed.) (2007), African counterterrorism cooperation : assessing regional and subregional initiatives, Washington, D.C.: African Center for Strategic Studies and National Defense University.

- Marchal, Roland (2007), Warlordism and terrorism: how to obscure an already confusing crisis? The case of Somalia, International affairs., 83:6, 1091-1106.

- Menkhaus, Ken (2006), Somalia: state collapse and the threat of terrorism, Abingdon: Routledge.

- Newman, Edward (2007), Weak States, State Failure, and Terrorism, Terrorism and political violence., 19:4, 463-488.

- Piazza, James A. (2008), Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism? , International studies quarterly., 52, 469-488.

- Rotberg, R. (2002), Failed States in a World of Terror, Foreign affairs., July/August.

- Vinci, Anthony (2008), Anarchy, Failed States, and Armed Groups: Reconsidering Conventional Analysis, International Studies Quarterly, 52, 295 -314.

- Williams, Brian Glyn (2008), Talibanistan: History of a Transnational Terrorist Sanctuary, Civil wars., 10:1, 40-59.

Top of page

Week 9 - Reading Week - No Lectures or Seminars this week!

Top of page

Week 10 - Topics of Counterterrorism III: Dealing with WMD

Required Readings:

 - Speckhard, Anne (2006), The New Global Jihad, 9-11 and the Use of Weapons of Mass Destruction: Changes in Mindset and Modus Operandi, Democracy and security ISSN: 1741-9166, 2:2, 287-298.

- Van der Velde, J. R. (2010), The Impossible Challenge of Deterring 'Nuclear Terrorism' by Al Qaeda, Studies in conflict and terrorism. ISSN: 1057-610X; 1521-0731, 33:8, 682-699.

Seminar Questions:

- Are fears of terrorists using WMDs justified?

- What explains the attention policy makers pay to WMD terrorism?

- Why have terrorists used WMDs less frequently than conventional weapons?

- Why would terrorists choose to use WMDs?

Additional Readings:

- Gary A. Ackerman & Lauren E. Pinson (2014) An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells, Terrorism and political violence. ISSN: 0954-6553, 26:1, 226-245.

- Ackerman, G. (2009), The Future of Jihadists and WMD, in Ackerman, G., and Tamsett, J. (eds.), Jihadists and weapons of mass destruction, Boca Raton: CRC Press. | PDF available in Online Course Readings folder in VLE module room |

- Allison, G. (2004), Nuclear terrorism : the ultimate preventable catastrophe, New York: Times Books.

- Badey, Thomas (2001), Nuclear Terrorism: Actor-Based Threat Assessment, Intelligence and national security., 16:2, 39-54.

- Bergen, Peter (2010), Re-evaluating Al-Qaida’s Weapons of Mass Destruction Capabilities, CTC Sentinel, September 1-4.

- Dolnik, Adam, “Die and Let Die: Exploring the Link between Suicide Terrorism and Terrorist Use of Chemical, Biological, Radiological, and Nuclear Weapons,” Studies in Conflict and Terrorism, 26:1, 17-35.

- Howard, D. and Forest, J. (2008), Weapons of mass destruction and terrorism, New York: McGraw Hill.

- Jenkins, Brian (2008), Will terrorists go nuclear?, Amherst, NY: Prometheus.

- Levi, M. (2007), On nuclear terrorism, Cambridge: Harvard University Press.

- Mueller, J. (2010), Atomic obsession : nuclear alarmism from Hiroshima to al Qaeda, New York: Oxford University Press.

- O’Neil, A. (2003), Terrorist Use of Weapons of Mass Destruction: How Serious is the Threat? , Australian Journal of International Affairs, 57:1, 99-112. | PDF available in Online Course Readings folder in VLE module room | 

- Parachini, John (2003), Putting WMD terrrorism into perspective, The Washington quarterly., 26:4, 37-50.

- Parachini, J. (2001), Comparing Motives and Outcomes of Mass Casualty Terrorism Involving Conventional and Unconventional Weapons, Studies in conflict and terrorism., 24: 389-406.

- Paz, Reuven (2005), Global Jihad and WMD: Between martyrdom and mass destruction, Current Trends in Islamist Ideology, 2, 74-86. Available online at: http://www.hudson.org/research/9798-global-jihad-and-wmd-between-martyrdom-and-mass-destruction

- Post, Jerrold M. (2002), Differentiating the Threat of Chemical and Biological Terrorism: Motivations and Constraints, Peace and conflict: journal of peace psychology, 8:3, 187-200. | PDF available in Online Course Readings folder in VLE module room |

- Rapoport, D. (1999), Terrorists and the Weapons of the Apocalypse, National Security Studies Quarterly, 5:1, 49-67. - Available online: https://www.researchgate.net/publication/242769630_Terrorism_and_Weapons_of_the_Apocalypse

- Stern, Jessica (2001), The ultimate terrorists, Harvard University Press.

Top of page

Week 11 - Topics of Counterterrorism IV: Countering Terrorism in the Age of Migration

Required Readings:

- Bigo, Didier (2002), Security and Immigration: Toward a Critique of the Governmentality of Unease, Alternatives : global, local, political. ISSN: 0304-3754, 27: 63-92.
 

Seminar Questions:

- Has migration increased the threat of terrorism in Western Europe/North America?

- Is curbing migration an effective strategy in tackling terrorism?

- Why do politicians and the media emphasize the possible link between migration and terrorism?
 

Additional Readings:

- Alexseev, M. A. (2005). Immigration phobia and the security dilemma : Russia, Europe, and the United States ISBN: 0521849888 (hardback); 9780521849883. New York: Cambridge University Press.

- Fetzer, J. (2000). Public attitudes toward immigration in the United States, France, and Germany ISBN: 0521786797; 0521781493 (hb). Cambridge, MA: Cambridge University Press.

- Huysmans, J. (2006). The politics of insecurity : fear, migration, and asylum in the EU ISBN: 0415361257 (pbk. : alk. paper); 0415361249 (hardback : alk. paper). London: Routledge.

- Kerwin, Donald (2016), How Robust Refugee Protection Policies Can Strengthen Human and National Security, Journal on migration and human security ISSN: 2330-2488, 4(3): 83-140.

- Lahav, G. (2009). The effects of threat and counterterrorism on migration control. In M. Crenshaw (Ed.), The consequences of counterterrorism. New York: Russell Sage Foundation.

- Moreno, Karen, and Byron Eugene Price (2017), The social and political impact of the new (private) National Security: private actors in the securitization of immigration in the U.S. post 9/11, Crime, law and social change. ISSN: 0925-4994, 67: 353-376.

- Rudolph, C. (2006). National security and immigration : policy development in the United States and Western Europe since 1945 ISBN: 9780804753777 (cloth : alk. paper); 0804753776 (cloth : alk. paper). Stanford, CA: Stanford University Press.

This list was last updated on 11/09/2017