In this Book

summary
As the fifth full year of AmericaÆs global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaedaûaffiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.

In Thinking Like a Terrorist, former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terroristsùnamely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldnÆt be surprised at the results. TodayÆs terrorists have a real planùa blueprint that has brought them victory in the pastùthat they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terroristsÆ plan is understood, we can develop and implement more effective counterterrorism strategies.

A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terroristÆs point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, Thinking Like a Terrorist provides unique insights into why terrorism is such a persistent and difficult problem and why the U.S. approach to counterterrorism isnÆt working.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Related Titles, Copyright Page
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. vii-xii
  3. restricted access
    • Download PDF Download
  1. 1. Prologue: An Unusual Education in Terrorism
  2. pp. 1-26
  3. restricted access
    • Download PDF Download
  1. Part I: The Trouble With Terrorism
  1. 2. The Difficult Definition
  2. pp. 29-36
  3. restricted access
    • Download PDF Download
  1. 3. Getting Beyond Good and Evil
  2. pp. 37-54
  3. restricted access
    • Download PDF Download
  1. 4. Compounding Confusion
  2. pp. 55-72
  3. restricted access
    • Download PDF Download
  1. Part II: Mind-set and Methods
  1. 5. Understanding Political Violence
  2. pp. 75-82
  3. restricted access
    • Download PDF Download
  1. 6. Grading the Government
  2. pp. 83-94
  3. restricted access
    • Download PDF Download
  1. 7. Methods and Motives
  2. pp. 95-110
  3. restricted access
    • Download PDF Download
  1. 8. Case Study #1: A Successful Terror Campaign
  2. pp. 111-122
  3. restricted access
    • Download PDF Download
  1. 9. Ranking the Resistance
  2. pp. 123-132
  3. restricted access
    • Download PDF Download
  1. 10. Terrorism Types
  2. pp. 133-136
  3. restricted access
    • Download PDF Download
  1. Part III: How to Win
  1. 11. Case Study #2: The Ku Klux Klan
  2. pp. 139-148
  3. restricted access
    • Download PDF Download
  1. 12. A Winning Strategy Against Extremist Terrorists
  2. pp. 149-158
  3. restricted access
    • Download PDF Download
  1. 13. Case Study #3: Lessons of the IRA
  2. pp. 159-172
  3. restricted access
    • Download PDF Download
  1. 14. A Winning Strategy Against Legitimately Motivated Terrorists
  2. pp. 173-178
  3. restricted access
    • Download PDF Download
  1. 15. Analysis of the Global War on Terrorism
  2. pp. 179-190
  3. restricted access
    • Download PDF Download
  1. 16. Our Constitutional Shield Against Terrorism
  2. pp. 191-200
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 201-218
  3. restricted access
    • Download PDF Download
  1. Bibliography
  2. pp. 219-230
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 231-238
  3. restricted access
    • Download PDF Download
  1. About the Author
  2. p. 239
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.