Chapter 13: Counterterrorism: The Options

Bentz, Blumenthal, and Potter discuss the data needed to enable emergency responders to effectively respond to CBRN incidents. Betz and Stevens “attempt to interrogate some of the predominant forms of analogical reasoning within current cyber-security discourse, with a view to clarifying their unstated premises, major strengths and, vitally, points of conceptual failure.” Michael Byers discusses the legal argument proposed by the U.S. for waging the war on terrorism. Kelly Damphousse evaluates what effect terrorism events have on subsequent prosecution strategies. Marieke De Goede examines European opposition to the doctrine of pre-emption in the war on terrorism. De Oliveira et al. examine how externalities and cooperation affect counterterrorist coalition formation. Enders and Jindapon compare the “Big 4” game (name, rank, serial number, date of birth) to a two-stage game the “Little Fish” game in which detainees are permitted to reveal lower level information to interrogators. Epifanio discusses an innovative dataset which evaluates legislative responses to international terrorism within the context of 20 countries. An examination is made of the Bush administration’s pre-emptive strike doctrine by Sanjay Gupta. Martin Innes evaluates the impact of terrorist attacks on counterterrorist strategies among UK police. Bonnie Jenkins presents the case for focusing on the ambitions of non-state actors in combating nuclear terrorism. The debates and evolution of legal responses to terrorism is discussed by Brian Levin. Kessler and Werner examine extrajudicial killing from the perspective of risk management. Lankford and Gillespie examine the explanations for terrorist indoctrination to discuss the effectiveness of Saudi Arabia's rehabilitation program. Grant Martin explores the future configuration and utility of U.S. special operations forces. The moral and ethical aspects of torture are discussed by Douglas McCready. McGarrell et. al. recommends an approach and application of the intelligence-led policing model for counterterrorism policies. McGuffin and Mitchell explore the military domain of cyberspace and its role in warfighting and planning. In his article, Rein Müllerson argues that a human rights perspective is needed when the world community responds to terrorist threats. Shields, Damphousse, and Smith present an assessment and analysis of guilty pleas among terrorists. Important U.S. Fifth Amendment constitutional perspectives on torture are discussed by Geoffrey Skoll. Brent Steel investigates how the treatment of terrorist suspects affects the American sense of honor and self-identity. James Stever argues that the new era of terrorism requires a reevaluation of previous models of intergovernmental management. Geir Ulfstein assesses new legal issues presented by the use of force against terrorists and terrorist governments. Wheeler’s article examines moral theories that are available for analyzing the deaths of innocents in the war against terrorism.

Journal Article 13.1: Bentz, Julie A., Daniel J. Blumenthal, and Bradley A. Potter. “It’s All About the Data: Responding to International Chemical, Biological, Radiological, and Nuclear Incidents.” Bulletin of the Atomic Scientists 70:4 (2014).

Journal Article 13.2: Betz, David J. and Tim Stevens. “Analogical Reasoning and Cyber Security.” Security Dialogue (April 2013).

Journal Article 13.3: Byers, Michael. “Terrorism, the Use of Force and International Law After 11 September.” International Relations 16:2 (2002).

Journal Article 13.4: Damphousse, Kelly R. “The Morning After: Assessing the Effect of Major Terrorism Events on Prosecution Strategies and Outcomes.” Journal of Contemporary Criminal Justice 23:2 (May 2007).

Journal Article 13.5: De Goede, Marieke. “The Politics of Preemption and the War on Terror in Europe.” European Journal of International Relations 14 (March 2008).

Journal Article 13.6: De Oliveira, Andre Rossi, Joao Ricardo Faria, and Emilson C. D. Silva. “Externalities and Coalition Formation.” Journal of Conflict Resolution 62:3 (2018).

Journal Article 13.7: Enders, Walter, and Paan Jindapon. “On the Economics of Interrogation: The Big 4 Versus the Little Fish Game.” Journal of Peace Research 48 (May 2011).

Journal Article 13.8: Epifanio, Mariaelisa. “Legislative Response to International Terrorism.” Journal of Peace Research 48 (May 2011).

Journal Article 13.9: Gupta, Sanjay. “The Doctrine of Pre-Emptive Strike: Application and Implications During the Administration of President George W. Bush.” International Political Science Review 29 (March 2008).

Journal Article 13.10: Innes, Martin. “Policing Uncertainty: Countering Terror Through Community Intelligence and Democratic Policing.” ANNALS of the American Academy of Political and Social Science 605 (May 2006).

Journal Article 13.11: Jenkins, Bonnie. “Combating Nuclear Terrorism: Addressing Nonstate Actor Motivations.” ANNALS of the American Academy of Political and Social Science 607 (September 2006).

Journal Article 13.12: Kessler, Oliver and Wouter Werner. “Extrajudicial Killing as Risk Management.” Security Dialogue 39 (April 2008).

Journal Article 13.13: Lankford, Adam, and Katherine Gillespie. “Rehabilitating Terrorists Through Counter-Indoctrination: Lessons Learned from the Saudi Arabian Program.” International Criminal Justice Review 21 (June 2011).

Journal Article 13.14: Levin, Brian. “Trials for Terrorists: The Shifting Legal Landscape of the Post-9/11 Era.” Journal of Contemporary Criminal Justice 23:2 (May 2007).

Journal Article 13.15: Martin, Grant. “Zero Dark Squared: Does the US Benefit from More Special Operations Forces?” Canada’s Journal of Global Policy Analysis 69:3 (2014).

Journal Article 13.16: McCready, Douglas. “When Is Torture Right?” Studies in Christian Ethics 20 (December 2007).

Journal Article 13.17: McGarrell, Edmund F., Joshua D. Freilich, and Steven Chermak. “Intelligence-Led Policing as a Framework for Responding to Terrorism.” Journal of Contemporary Criminal Justice 23:2 (May 2007).

Journal Article 13.18: McGuffin, Chris and Paul Mitchell. “On Domains: Cyber and the Practice of Warfare.” Canada’s Journal of Global Policy Analysis 69:3 (2014).

Journal Article 13.19: Müllerson, Rein. “Being Tough on Terrorism or Respecting Human Rights: A False Dilemma of Authoritarian and Liberal Responses.” American Behavioral Scientist 48:12 (August 2005).

Journal Article 13.20: Shields, Christopher A., Kelly R. Damphousse, and Brent L. Smith. “Their Day in Court: Assessing Guilty Plea Rates Among Terrorists.” Journal of Contemporary Criminal Justice 22:3 (August 2006).

Journal Article 13.21: Skoll, Geoffrey R. “Torture and the Fifth Amendment: Torture, the Global War on Terror, and Constitutional Values.” Criminal Justice Review 33 (March 2008).

Journal Article 13.22: Steele, Brent J. “‘Ideals That Were Really Never in Our Possession’: Torture, Honor and US Identity.” International Relations 22 (June 2008).

Journal Article 13.23: Stever, James A. “Adapting Intergovernmental Management to the New Age of Terrorism.” Administration & Society 37:4 (September 2005).

Journal Article 13.24: Ulfstein, Geir. “Terrorism and the Use of Force.” Security Dialogue 34:2 (June 2003).

Journal Article 13.25: Wheeler, Nicholas J. “Dying for ‘Enduring Freedom’: Accepting Responsibility for Civilian Casualties in the War Against Terrorism.” International Relations 16:2 (2002).