Skip to main content

Domestic Terrorism

  • Living reference work entry
  • First Online:
Handbook of Security Science
  • 519 Accesses

Abstract

Terrorist incidents have increased tremendously in the last decade, with half of all terrorist attacks between 1970 and 2016 occurring since 2008, according to data from the Global Terrorism Database. While many may be focused on terrorist threats from international adversaries, terroristic violence from within a country may occur more commonly than most realize. Domestic terrorism occurs when citizens of a country engage or threaten to engage in ideologically driven violence in that country targeting other citizens of the same country to send a message to a larger audience. Domestic terrorism differs from international terrorism in that the latter crosses national borders; domestic terrorism differs from homegrown extremism in that citizenship does not matter in the latter.

This chapter begins with a conceptualization of domestic terrorism, comparing the term to other similar concepts. Trends in domestic terrorism worldwide locations and targets are explored, drawing data from the Global Terrorism Database where enough information was available to determine that an incident was a domestic attack. Then, plausible explanations for domestic terrorism are reviewed. The chapter concludes with a discussion of possible responses to domestic terrorism and ways to prevent such violence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • “The history of the Tamil Tigers” (2009). Al Jazeera, April 28. Accessed 8 Feb 2018 from http://www.aljazeera.com/focus/2008/11/2008112019115851343.html

  • Abrahms M (2007) Why democracies make superior counterterrorists. Secur Stud 16(2):223–253

    Article  Google Scholar 

  • Agbiboa DE (2013) Why Boko Haram exists: the relative deprivation perspective. Afr Confl Peacebuild Rev 3(1):144–157

    Article  Google Scholar 

  • Akers RL (1973) Deviant behavior: a social learning approach. Wadsworth, Belmont

    Google Scholar 

  • Akers RL, Silverman A (2004) Toward a social learning model of violence and terrorism. In: Zahn MA, Brownstein HH, Jackson SL (eds) Violence: from theory to research. LexisNexis-Anderson Publishing, Cincinnati, pp 19–35

    Google Scholar 

  • Albanese J (2011) Organized crime in our times, 6th edn. Anderson Publishing, Burlington

    Google Scholar 

  • Atran S (2003) Genesis of suicide terrorism. Science 299:1534–1539

    Article  ADS  Google Scholar 

  • Beetham D (1991) The legitimation of power. Macmillan, London

    Book  Google Scholar 

  • Bjelopera JP (2014) Domestic terrorism appears to be reemerging as a priority at the Department of Justice. Library of Congress, Congressional Research Service. Retrieved 29 Dec 2017 from https://fas.org/sgp/crs/terror/IN10137.pdf

  • Borum R (2014) Psychological vulnerabilities and propensities for involvement in violent extremism. Behav Sci Law 32:286–305

    Article  Google Scholar 

  • Brush SG (1996) Dynamics of theory change in the social sciences: relative deprivation and collective violence. J Confl Resolut 40(4):523–545

    Article  Google Scholar 

  • Chalk P (1998) The response to terrorism as a threat to liberal democracy. Aust J Polit Hist 44(3):373–388

    Article  Google Scholar 

  • Choi S-W, Piazza JA (2015) Foreign military interventions and suicide attacks. J Confl Resolut 61:271. https://doi.org/10.1177/0022002715576575

    Article  Google Scholar 

  • Clarke RV, Newman GR (2007) Police and the prevention of terrorism. Policing 1(1):9–20

    Article  Google Scholar 

  • Collard-Wexler S, Pischedda C, Smith M (2014) Do foreign occupations cause suicide attacks? J Confl Resolut 58(4):625–657

    Article  Google Scholar 

  • Conway M (2017) Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research. Stud Confl Terror 40(1):77–98

    Article  MathSciNet  Google Scholar 

  • Crenshaw M (1981) The causes of terrorism. Comp Polit 13(4):379–399

    Article  Google Scholar 

  • Cronin AK (2009) How terrorism ends: understanding the decline and demise of terrorist campaigns. Princeton University Press, Princeton

    Book  Google Scholar 

  • Dean C (2017) The role of identity in committing acts of violent extremism – and in desisting from them. Crim Behav Ment Health 27:281–285

    Article  Google Scholar 

  • Drakos K, Gofas A (2006) In search of the average transnational terrorist attack venue. Def Peace Eco 17(2):73–93

    Article  Google Scholar 

  • Dugan L, Young JK (2009) Allow extremist participation in the policy making process. In: Frost NA, Freilich JD, Clear TR (eds) Contemporary issues in criminal justice policy: policy proposals from the American Society of Criminology Conference. Cengage/Wadsworth, Belmont, pp 159–168

    Google Scholar 

  • Ellis R, Fantz A, Karimi F, McLaughlin EC (2016). Orlando shooting: 49 killed, shooter pledged ISIS allegiance. Cnn.com, June 13. Retrieved 29 Dec 2017 from http://www.cnn.com/2016/06/12/us/orlando-nightclub-shooting/index.html

  • Federal Bureau of Investigation (2013a) Definitions of terrorism in the U.S. Code. Retrieved 20 Apr 2015, from http://www.fbi.gov/about-us/investigate/terrorism/terrorism-definition

  • Federal Bureau of Investigation (2013b) Homegrown violent extremism. Retrieved 28 Dec 2017, from https://www.fbi.gov/audio-repository/news-podcasts-thisweek-homegrown-violent-extremism.mp3/view

  • Federal Bureau of Investigation (n.d.) What we investigate. Retrieved 31 July 2015, from https://www.fbi.gov/albuquerque/about-us/what-we-investigate

  • Getlen L (2015). Inside the reclusive Amish world – where beard cutting is a hate crime. New York Post, March 29. Retrieved 29 Dec 2017 at https://nypost.com/2015/03/29/inside-the-reclusive-amish-world-where-beard-cutting-is-a-hate-crime/

  • Gibbs JC (2011) The relationship between legitimacy, terrorist attacks and police. Doctoral dissertation, University of Maryland, College Park

    Google Scholar 

  • Gibbs JC (2015) State legitimacy and terrorism: implications for counterterrorism policy. In: Deflem M (ed) Terrorism and counterterrorism today. Sociology of crime, law, and deviance, vol 20. Emerald, Bingley

    Google Scholar 

  • Gibbs JC (2017) Terrorist attacks targeting the police: the connection to foreign military presence. Police Pract Res 19:222. https://doi.org/10.1080/15614263.2017.1295245

    Article  Google Scholar 

  • Gibbs JC, Kutcher S (2017) Terrorism. In: Rycroft RS (ed) The American middle class: an economic encyclopedia of progress and poverty, vol 2. Greenwood, Santa Barbara, pp 835–383

    Google Scholar 

  • Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the Internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117

    Article  Google Scholar 

  • Gilley B (2006) The meaning and measure of state legitimacy: results for 72 countries. Eur J Polit Res 45:499–525

    Article  Google Scholar 

  • Gilley B (2009) The right to rule: how states win and lose legitimacy. Columbia University Press, New York

    Google Scholar 

  • Green DP, McFalls LH, Smith JK (2001) Hate crime: an emergent research agenda. Annu Rev Sociol 27:479–504

    Article  Google Scholar 

  • Gumbel A (2015). Oklahoma City bombing: 20 years later, key questions remain unanswered. The Guardian, April 13. Accessed 25 Jan 2018 from https://www.theguardian.com/us-news/2015/apr/13/oklahoma-city-bombing-20-years-later-key-questions-remain-unanswered

  • Gurr TR (1970) Why men rebel. Princeton University Press, Princeton

    Google Scholar 

  • Henry VE (2014) The need for a coordinated and strategic local police approach to terrorism: a practitioner’s perspective. In: Lowe D, Turk A, Das DK (eds) Examining political violence: studies of terrorism, counterterrorism, and internal war. Taylor & Francis/International Police Executive Symposium, Boca Raton, pp 103–126

    Google Scholar 

  • History.com (2014) Boston Marathon bombing. Accessed 29 Dec 2017 from http://www.history.com/topics/boston-marathon-bombings

  • Holmes RM, Holmes ST (1992) Understanding mass murder: a starting point. Fed Probat 56(1):53–62

    Google Scholar 

  • International Association of Chiefs of Police (2014) Homegrown violent extremism. Awareness brief. Office of Community Oriented Policing Services, Washington, DC

    Google Scholar 

  • Jenkins JP (2017) Oklahoma City bombing. Encyclopedia Britannica, December 11. Accessed 25 Jan 2018 from https://www.britannica.com/event/Oklahoma-City-bombing

  • King M, Taylor DM (2011) The radicalization of homegrown jihadists: a review of theoretical models and social psychological evidence. Terror Polit Violence 23:602–622

    Article  Google Scholar 

  • Klein MW (1971) Street gangs and street workers. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  • Kruglanski AW, Chen X, Dechesne M, Fishman S, Orehek E (2009) Fully committed: suicide bombers’ motivation and the quest for personal significance. Polit Psychol 30(3):331–357

    Article  Google Scholar 

  • LaFree G (1998) Losing legitimacy: Street crime and the decline of social institutions in America. Westview Press, Boulder, CO

    Google Scholar 

  • LaFree G (2017) Terrorism and the Internet. Criminol Public Policy 16(1):93–98

    Article  Google Scholar 

  • LaFree G, Ackerman G (2009) The empirical study of terrorism: social and legal research. Annu Rev Law Soc Sci 5:347–374

    Article  Google Scholar 

  • Lai B (2007) “Draining the swamp”: an empirical examination of the production of international terrorism, 1968–1998. Confl Manag Peace Sci 24:297–310

    Article  ADS  Google Scholar 

  • Loza W (2007) The psychology of extremism and terrorism: a Middle-Eastern perspective. Aggress Violent Behav 12:141–155

    Article  Google Scholar 

  • Lum C, Kennedy LW, Sherley A (2006) Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. J Exp Criminol 2:489–516

    Article  Google Scholar 

  • Martin J, Scully M, Levitt B (1990) Injustice and the legitimation of revolution: damning the past, excusing the present, and neglecting the future. J Pers Soc Psychol 59(2):281–290

    Article  Google Scholar 

  • Miller WB (1980) Gangs, groups, and serious youth crime. In: Shichor D, Kelly DH (eds) Critical issues in juvenile delinquency. Heath, Lexington, pp 115–138

    Google Scholar 

  • Mullins CW, Young JK (2012) Cultures of violence and acts of terror: applying a legitimation-habituation model to terrorism. Crime Delinq 58(1):28–56

    Article  Google Scholar 

  • National Consortium for the Study of Terrorism and Responses to Terrorism (2017) Global terrorism database [data file]. Retrieved 1 Aug 2017, from http://www.start.umd.edu/data/gtd

  • Pape RA (2003) The strategic logic of suicide terrorism. Am Polit Sci Rev 97(3):343–361

    Article  Google Scholar 

  • Pape RA (2005) Dying to win: the strategic logic of suicide terrorism. Random House Trade Paperbacks, New York

    Google Scholar 

  • Pape RA, Feldman JK (2010) Cutting the fuse: the explosion of global suicide terrorism and how to stop it. University of Chicago Press, Chicago

    Book  Google Scholar 

  • Piazza JA (2006) Rooted in poverty? Terrorism, poor economic development, and social cleavages. Terror Polit Violence 18:159–177

    Article  Google Scholar 

  • Piazza JA (2008) A supply-side view of suicide terrorism: a cross-national study. J Polit 70(1):28–39

    Article  Google Scholar 

  • Piazza JA (2011) Poverty, minority economic discrimination, and domestic terrorism. J Peace Res 48(3):339–353

    Article  Google Scholar 

  • Post JM, Sprinzak E, Denny LM (2003) The terrorists in their own words: interviews with thirty-five incarcerated Middle Eastern terrorists. Terror Polit Violence 15:171–184

    Article  Google Scholar 

  • Pratt TC, Cullen FT, Sellers CS, Winfree T Jr, Madensen TD, Daigle LE, Fearn NE, Gau JM (2010) The empirical status of social learning theory: a meta-analysis. Justice Q 27(6):765–802

    Article  Google Scholar 

  • Sayre EA (2010) Relative deprivation and Palestinian suicide bombings. Asian J Soc Sci 38:442–461

    Article  Google Scholar 

  • Schwartz SJ, Dunkel CS, Waterman AS (2009) Terrorism: an identity theory perspective. Stud Confl Terror 32:537–559

    Article  Google Scholar 

  • Shelley LI (2014) Dirty entanglements: corruption, crime, and terrorism. Cambridge University Press, New York

    Google Scholar 

  • Sloan S (2014) Meeting the terrorist threat: the localization of counterterrorism intelligence. In: Lowe D, Turk A, Das DK (eds) Examining political violence: studies of terrorism, counterterrorism, and internal war. Taylor & Francis/International Police Executive Symposium, Boca Raton, pp 311–327

    Google Scholar 

  • Stanford University (n.d.) Mapping militant organizations: liberation Tigers of Tamil Elam. Retrieved 9 Feb 2018 from http://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/225

  • Sykes GM, Matza D (1957) Techniques of neutralization: a theory of delinquency. Am Sociol Rev 22(6):664–670

    Article  Google Scholar 

  • Transparency International (2013) Business principles for countering bribery: a multi-stakeholder initiative led by Transparency International, 3rd edn. Transparency International, Berlin. Retrieved from http://issuu.com/transparencyinternational/docs/business_principles_web_final/16?e=2496456/6040471

    Google Scholar 

  • Victoroff J (2005) The mind of a terrorist: a review and critique of psychological approaches. J Confl Resolut 49(1):3–42

    Article  Google Scholar 

  • Wade SJ, Reiter D (2007) Does democracy matter? Regime type and suicide terrorism. J Confl Resolut 51(2):329–348

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jennifer C. Gibbs .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Gibbs, J.C. (2019). Domestic Terrorism. In: Masys, A. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-51761-2_6-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51761-2_6-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51761-2

  • Online ISBN: 978-3-319-51761-2

  • eBook Packages: Springer Reference Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics

Publish with us

Policies and ethics