In this Book

summary
Can We Construct a Grand Strategy to Counter Terrorism? Fifteen years after September 11, the United States still faces terror threats—both domestic and foreign. After years of wars, ever more intensive and pervasive surveillance, enhanced security measures at major transportation centers and many attempts to explain who we are fighting and why and how to fight them, the threats continue to multiply. So, too, do our attempts to understand just what terrorism is and how to counter it. Two leaders in the field of terrorism studies, Martha Crenshaw and Gary LaFree, provide a critical look at how we have dealt with the terror threat over the years. They make clear why it is so difficult to create policy to counter terrorism. The foes are multiple and often amorphous, the study of the field dogged by disagreement on basic definitional and methodological issues, and the creation of policy hobbled by an exacting standard: the counterterrorist must succeed all the time, the terrorist only once. As Countering Terrorism shows, there are no simple solutions to this threat.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Half Title, Title Page, Copyright
  2. restricted access
    • Download PDF Download
  1. Table of Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. vii-x
  3. restricted access
    • Download PDF Download
  1. 1. Introduction: The Context for Analyzing Counterterrorism Difficulties—Current Threats and the State of Academic Research
  2. pp. 1-32
  3. restricted access
    • Download PDF Download
  1. 2. Overresponding to Rare Events: The Problem of Uncommon Threats with Irreversible Consequences
  2. pp. 33-68
  3. restricted access
    • Download PDF Download
  1. 3. The Tip of the Iceberg: Accounting for Failed and Foiled Terrorist Plots
  2. pp. 69-98
  3. restricted access
    • Download PDF Download
  1. 4. Pinning Down an Elusive Adversary: What Is a Terrorist Organization?
  2. pp. 99-130
  3. restricted access
    • Download PDF Download
  1. 5. Who Did It? The Attribution Dilemma
  2. pp. 131-164
  3. restricted access
    • Download PDF Download
  1. 6. Counterterrorism Results: Can Effectiveness be Evaluated?
  2. pp. 165-194
  3. restricted access
    • Download PDF Download
  1. 7. Moving Forward
  2. pp. 195-220
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 221-248
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 249-272
  3. restricted access
    • Download PDF Download
  1. Back Cover
  2. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.