Understanding Why Terrorist Operations Succeed or Fail
暂无分享,去创建一个
[1] Brian A. Jackson,et al. Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies , 2006 .
[2] Sara A. Daly,et al. The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World , 2004 .
[3] C. Dwork,et al. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment , 2008 .
[4] T. P. Coogan. The Ira: A History , 1993 .
[5] R. Pape,et al. The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.
[6] Brian A. Jackson. Groups, Networks, or Movements: A Command-and-Control-Driven Approach to Classifying Terrorist Organizations and Its Application to Al Qaeda , 2006 .
[7] Chris Quillen,et al. A Historical Analysis of Mass Casualty Bombers , 2002 .
[8] Peter J. Phillips. THE ‘PRICE’ OF TERRORISM , 1989, Science.
[9] Brian A. Jackson,et al. The Lessons of Mumbai , 2009 .
[10] Gordon H. McCormick. Terrorist Decision Making , 2003 .
[11] Brian Michael Jenkins,et al. Selective Screening of Rail Passengers , 2007 .
[12] David Ronfeldt,et al. Numbered Lives: Some Statistical Observations From 77 International Hostage Episodes , 1977 .
[13] Kent Layne Oots. A Political Organization Approach to Transnational Terrorism , 1986 .
[14] Brian A. Jackson,et al. Aptitude for Destruction. Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups , 2005 .
[15] Mary Derosa,et al. Data mining and data analysis for counterterrorism , 2004 .
[16] Bruce Hoffman,et al. Commando Raids: 1946-1983. , 1985 .
[17] Jim Harper,et al. Effective Counterterrorism and the Limited Role of Predictive Data Mining , 2006 .
[18] Barbara F. Walter,et al. The Strategies of Terrorism , 2006, International Security.
[19] Brian A. Jackson,et al. Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism , 2005 .
[20] Scott D. Sagan,et al. The Problem of Redundancy Problem: Why More Nuclear Security Forces May Produce Less Nuclear Security † , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Edward R. McCleskey,et al. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies , 2007 .
[22] Moshe Kress,et al. Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[23] A. Moghadam,et al. Suicide Terrorism, Occupation, and the Globalization of Martyrdom: A Critique of Dying to Win , 2006 .
[24] William F. McCants,et al. Stealing Al Qaeda's Playbook , 2006 .
[25] Max Abrahms,et al. Why Terrorism Does Not Work , 2006, International Security.
[26] C. J. Drake,et al. Terrorists' Target Selection , 1998 .
[27] Bruce Hoffman,et al. Force-on-force attacks, their implications for the defense of U.S. nuclear facilities , 1993 .
[28] Walter Enders,et al. Rational Terrorists and Optimal Network Structure , 2007 .
[29] J. Bowyer Bell. Assassin: Theory and Practice of Political Violence , 2005 .
[30] Alan Vivk,et al. Snakes in the Eagle's Nest: A History of Ground Attacks on Air Bases , 1995 .
[31] Gaetano Joe Ilardi,et al. Al-Qaeda's Counterintelligence Doctrine: The Pursuit of Operational Certainty and Control , 2009 .
[32] Fazal Ahmed. Terrorism as a rational tactic: An international study , 1998 .
[33] R A Fein,et al. Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers. , 1999, Journal of forensic sciences.
[34] Tim Bascom. The Things He Carried , 1994 .
[35] Lindsay Clutterbuck,et al. THE PROGENITORS OF TERRORISM:RUSSIAN REVOLUTIONARIES OR EXTREME IRISH REPUBLICANS? , 2004 .
[36] Brian M Jenkins,et al. Embassies Under Siege: A Review of 48 Embassy Takeovers, 1971-1980 , 1981 .
[37] Calvert W. Jones,et al. Al-Qaeda's Innovative Improvisers: Learning in a Diffuse Transnational Network , 2006 .
[38] Andrew Silke,et al. Beyond Horror: Terrorist Atrocity and the Search for Understanding-- The Case of the Shankill Bombing , 2003 .
[39] David E Hogan,et al. Nuclear terrorism. , 2002, The American journal of the medical sciences.
[40] S. Atran. The moral logic and growth of suicide terrorism , 2006 .
[41] Robert Jay Lifton,et al. Aum Shinrikyo , 2004, The SAGE Encyclopedia of the Sociology of Religion.
[42] David R. Frelinger,et al. Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles , 2008 .
[43] Brian A. Jackson,et al. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations , 2007 .
[44] Adam Dolnik,et al. Understanding Terrorist Innovation: Technology, Tactics and Global Trends , 2007 .
[45] Todd Sandler,et al. Terrorist Success in Hostage-Taking Incidents , 1987 .
[46] Lawrence M Wein,et al. Analyzing a bioterror attack on the food supply: the case of botulinum toxin in milk. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[47] Brian A. Jackson,et al. The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency , 2009 .
[48] J. Bowyer Bell,et al. Conditions making for success and failure of denial and deception: Nonstate and illicit actors , 2000 .
[49] David R. Frelinger,et al. Rifling Through the Terrorists’ Arsenal: Exploring Groups’ Weapon Choices and Technology Strategies , 2008 .
[50] David R. Frelinger,et al. Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About? , 2009 .
[51] Aidan Kirby,et al. The London Bombers as “Self-Starters”: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques , 2007 .
[52] Martin McGartland,et al. Fifty Dead Men Walking , 1997 .
[53] Ami Pedahzur,et al. altruism and fatalism: the characteristics of palestinian suicide terrorists , 2003 .