Skip to main content

Evaluating the ‘Success’ and ‘Failure’ of Counterterrorism Policy and Practice

  • Chapter
  • First Online:
The Palgrave Handbook of Global Counterterrorism Policy

Abstract

This chapter analyzes counterterrorist policies of the major state and supranational actors affected by terrorism. The emphasis is made on the nature of these policies, which are hypothesized to be exclusionary/protective, inclusionary/preventing, or both, depending on the nature of terrorist threats. These policies represent the independent variables, implementation of which reflects on the numbers and virulence of terrorist attacks over time, which is the dependent variable. The case-studies analyzed in the chapter include the European Union (with the special emphasis on Spain), Russian Federation, the United States, Sri Lanka, and Israel: those who have been known to have major concurrent incidents of terrorism. The difference in the nature of terrorist threat—domestic and homegrown vs. foreign and transnational or hybrid (both)—acts as the antecedent variable affecting the choice of the diverse counter-terrorism policies. The CT policies of the actors discussed in the chapter aim at either exclusion/protection (in case of the domestic terrorism), inclusion/prevention (in case of the transnational terrorism), or their combination (in case of the hybrid version of terrorism). The chapter determines the correlation between the independent (nature of CT policies) and dependent (instances of terrorism) variables and explains the causality leading to the most successful policy options.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abdulayev, N. (2006). Chechen criminal and terrorist groups: Points of convergence. In U. Gori & I. Paparela (Eds.), Invisible threats: Financial and information technology crimes and national security (pp. 126–140). Amsterdam: IOS Press/NATO Publications.

    Google Scholar 

  • Aghai, V. (2011). Terrorism, an unconventional crime: Do we have the wisdom and capability to defeat terrorism? Bloomington: Xlibris.

    Google Scholar 

  • Apel, D. (2012). War culture and the contest of images. New Brunswick: Rutgers University Press.

    Google Scholar 

  • Art, R. J., & Richardson, L. (2007). Democracy and counterterrorism: Lessons from the past. Washington, D.C.: US Institute of Peace.

    Google Scholar 

  • Atkins, S. E. (2011). The 9/11 encyclopedia (2nd ed.). Santa Barbara: ABC-CLIO.

    Google Scholar 

  • Attran, S. (2004). Trends in suicide terrorism: Sense and nonsense. Presented to World Federation of Scientists Permanent Monitoring Panel on terrorism, Erice, Sicily.

    Google Scholar 

  • Baas, D. (2013). Everyday ethnicity in Sri Lanka: Up-country Tamil identity politics. Milton Park: Routledge.

    Google Scholar 

  • Bach, E. (2015). ISIS, the heart of terror: The unexpected response bringing hope for peace [Kindle edition]. New Kensington: Whitaker House.

    Google Scholar 

  • Bakke, K. M. (2013). Copying and learning from outsiders? Assessing diffusion from transnational insurgents in the Chechen Wars. In J. T. Checkel (Ed.), Transnational dynamics of civil war. New York: Cambridge University Press.

    Google Scholar 

  • Banerjee, P., Chaudhury, S. B. R., & Das, S. K. (2005). Internal displacement in South Asia. New Delhi: Sage Publications.

    Google Scholar 

  • Berman, A. (1990). Nazism, the Jews, and American Zionism, 1933–1948. Detroit: Wayne State University Press.

    Google Scholar 

  • Berman, E., & Laitin, D. D. (2005). Hard targets: Theory and evidence on suicide attacks. NBER Working Paper, 11740, 1–39.

    Google Scholar 

  • Berman, E., & Laitin, D. D. (2008). Religion, terrorism and public goods: Testing the club model. Journal of Public Economics, 92(10): 1942–1967.

    Article  Google Scholar 

  • Birkland, T. (2011). An introduction to the policy process: Theories, concepts and models of public policy making. Milton Park: Routledge.

    Google Scholar 

  • Bodansky, Y. (2007). Chechen jihad: Al Qaeda’s training ground and the next wave of terror. New York: Harper Publishing.

    Google Scholar 

  • Boot, M. (2011). 9/11 lessons: Counterterrorism. Washington, D.C.: The Council on Foreign Relations. Retrieved from http://www.cfr.org/911-impact/911-lessons-counterterrorism/p25672.

    Google Scholar 

  • Burnett, B. (2003). The attack on the USS Cole in Yemen on October 12, 2000. New York: Rosen Publishing Group.

    Google Scholar 

  • Bush, G. W. (2001, September 11). Patterns of global terrorism. Address to a joint session of congress and the nation. Washington, D.C.: US Department of State.

    Google Scholar 

  • Bush, G. W. (2002). Message to the congress of the United States. In United States Department of Homeland Security handbook. Washington, D.C.: US Department of Homeland Security, International Business Publications.

    Google Scholar 

  • Cordesman, A. H., & Moravitz, J. (2005). The Israeli–Palestinian War: Escalating to nowhere. Wesport: Praeger.

    Google Scholar 

  • Council on Foreign Relations (2008). Palestinian Islamic Jihad. Retrieved from http://www.cfr.org/israel/palestinian-islamic-jihad/p15984#p7.

  • Dannreuther, R., & March, L. (2008). Chechnya: Has Moscow won? Survival, 50(4): 97–112.

    Article  Google Scholar 

  • De Kerchove, G. (2008). EU policy in the fight against terrorism—from formulation to implementation, World Summit on Counter-Terrorism: Terrorism’s global impact. Retrieved from https://www.consilium.europa.eu/uedocs/cmsUpload/SPEECH_FOR_HERZLIYA_CONFERENCE.pdf.

  • Deegale, M. (2006). Buddhism, conflict and violence in modern Sri Lanka. Milton Park: Routledge.

    Google Scholar 

  • DeVotta, N. (2015). From counter-terrorism to soft authoritarianism. In L. Jarvis & M. Lister (Eds.), Critical perspectives on counter-terrorism (pp. 210–230)). Milton Park: Routledge.

    Google Scholar 

  • Ensalaco, M. (2008). Middle Eastern terrorism: From Black September to September 11. Philadelphia: University of Pennsylvania Press.

    Book  Google Scholar 

  • Falk, A. (2004). Fratricide in the Holy Land: A psychoanalytic view of the Arab-Israeli Conflict. Madison: University of Wisconsin Press.

    Google Scholar 

  • Federal Education Agency. (2008, April 18). Federal Education Agency Order #345. On allocating the funding from the federal budget for 2008 for implementation of the action plan on training of the specialists with the focused knowledge of the history and culture of Islam in 2007–2010.

    Google Scholar 

  • Felkay, A. (2002). Yeltsin’s Russia and the West. Westport: Praeger.

    Google Scholar 

  • Ferguson, E. (2003). Backgrounds of early Christianity. Grand Rapids: Wm. B. Eerdmans Publishing Co.

    Google Scholar 

  • Gabriel, R. (1984). Operation peace for Galilee: The Israeli–PLO war in Lebanon. Toronto: Collins Publishers.

    Google Scholar 

  • Galeotti, M. (2014). Russia’s wars in Chechnya 1994–2009. Oxford: Osprey Publishing.

    Google Scholar 

  • Galtung, J. (1965). Institutionalized conflict resolution: A theoretical paradigm. Journal of Peace Research, 2: 348–397.

    Article  Google Scholar 

  • Gates, S., & Roy, K. (2014). Unconventional warfare in South Asia: Shadow warriors and counterinsurgency. Burlington: Ashgate Publishing Company.

    Google Scholar 

  • Gerwehr, S., & Daly, S. (2005). Al-Qaida: Terrorist selection and recruitment. In D. G. Kamien (Ed.), McGraw-Hill homeland security handbook (pp. 73–90). McGraw-Hill.

    Google Scholar 

  • Ghosh, B. (2009, May 20). How to defeat insurgencies: Sri Lanka’s bad example. Time. Retrieved from http://content.time.com/time/world/article/0,8599,1899762,00.html.

  • Ghosh, P. A. (1999). Ethnic conflict in Sri Lanka and role of Indian Peace Keeping Force (IPKF). New Delhi: A. P. H. Publishing Company.

    Google Scholar 

  • Global Terrorism Database, University of Michigan. (2013). Retrieved from https://www.start.umd.edu/gtd/.

  • Goud, R. S., & Mookherjee, M. (2013). India-Sri Lanka relations strengthening SAARC. Hyderabad: Allied Publishers Pvt. Ltd.

    Google Scholar 

  • Gunaratna, R. (2002). Inside Al Qaeda: Global network of terror. New York: Columbia University Press.

    Book  Google Scholar 

  • Hahn, G. M. (2011). Islam, Islamism and politics in Eurasia report (IIPER). Center for Strategic and International Studies, 46: 2–26.

    Google Scholar 

  • Höglund, K., & Svensson, I. (2009). Mediating between tigers and lions: Norwegian peace diplomacy in Sri Lanka’s civil war. Contemporary South Asia, 17(2): 175–191.

    Article  Google Scholar 

  • Jones, M., & Johnstone, P. (2012). History of criminal justice. Waltham: Anderson Publishing.

    Google Scholar 

  • Kabir, N. A. (2013). Young American Muslims: Dynamics of identity. Edinburgh: Edinburgh University Press.

    Google Scholar 

  • Katzman, K. (2009). Iraq: Post-Saddam governance and security. CRS Report RL31339. Washington, D.C.: Congressional Research Service.

    Google Scholar 

  • Kegley, C. W. (2002). The new global terrorism: Characteristics, causes, controls. In C. W. Kegley (Ed.), The new global terrorism: Characteristics, causes, controls. New Jersey: Prentice Hall.

    Google Scholar 

  • Keohane, R. (2002). Power and governance in a partially globalized world. Milton Park: Routledge.

    Book  Google Scholar 

  • Kissinger, H. A. (1969). The Vietnam negotiations. Foreign Affairs, 47(2): 48.

    Google Scholar 

  • Kotz, D. (2013, April 24). Injury toll from marathon bombs reduced to 264. Boston Globe. Retrieved from http://www.bostonglobe.com/lifestyle/health-wellness/2013/04/23/number-injured-marathon-bombing-revised-downward/NRpaz5mmvGquP7KMA6XsIK/story.html.

  • Kramer, M. (2004–2005). The perils of counterinsurgency: Russia’s war in Chechnya. International Security, 29(3): 5–63.

    Article  Google Scholar 

  • LaFree, G., & Yang, S.-M. (2011). Using Global Terrorism Data to model counterterrorism policies in Sri Lanka. http://www.start.umd.edu/research-projects/using-global-terrorism-data-model-counterterrorism-policies-sri-lanka.

  • Lelchuk, J. (2005). Terror in Russia: The blood of Nord-Ost and Beslan. Bloomington: AuthorHouse.

    Google Scholar 

  • Levitt, M. (2013). Hezbollah: The Global Footprint of Lebanon’s Party of God. London: C. Hurst & Co.

    Google Scholar 

  • Lijphart, A. (2004). Constitutional Design for Divided Societies. Journal of Democracy, 15(2): 96–109.

    Article  Google Scholar 

  • Lowe, D., Turk, A. T., & Das, D. K. (2014). Examining political violence: Studies of terrorism, counterterrorism, and internal war. Boca Raton: CRC Press.

    Google Scholar 

  • Mack, A. (1975). Why big nations lose small wars: The politics of asymmetric conflict. World Politics, 27: 175–200.

    Article  Google Scholar 

  • Mahadevan, P. (2012). The politics of counterterrorism in India: Strategic intelligence and national security in South Asia. New York: I. B. Taurus.

    Google Scholar 

  • Mampilly, Z. (2012). The nexus of militarization and corruption in post-conflict Sri Lanka. In D. Zaum & C. Cheng (Eds.), Corruption and post-conflict peacebuilding: Selling the peace? (pp. 180–198)). Milton Park: Routledge.

    Google Scholar 

  • Martin, G. (2015). Understanding terrorism: Challenges, perspectives, and issues. Thousand Oaks: SAGE Publications, Inc.

    Google Scholar 

  • Mashal, M. (2015). Taliban attack in Northern Afghanistan leaves at least 10 dead. New York Times, April 9, 2015. Retrieved from http://www.nytimes.com/2015/04/10/world/asia/mazar-i-sharif-balkh-afghanistan-taliban-attack.html.

  • McNeill, J. B., Carafano, J. J., & Zuckerman, J. (2011). 39 terror plots foiled since 9/11: Examining counterterrorism’s success stories. Backgrounder #2556, The Heritage Foundation. Retrieved from http://www.heritage.org/research/reports/2011/05/39-terror-plots-foiled-since-911-examining-counterterrorisms-success-stories.

  • McTigue, M. (2005). Transforming the Department of Homeland Security through mission-based budgeting. Statement at the hearing before the Subcommittee on Management, Integration and Oversight of the Committee of Homeland Security, House of Representatives. Washington, D.C.: US Government Printing Office.

    Google Scholar 

  • Ministry of Defense of Sri Lanka. (2011). Humanitarian operation. Factual analysis. July 2006–May 2009. Retrieved from http://www.defence.lk/news/20110801_Conf.pdf.

  • Ministry of Foreign Affairs of Israel. (2009). Operation cast lead—Humanitarian aspects. Retrieved from http://mfa.gov.il/MFA_graphics/MFA%20Gallery/documents/CastLeadHumanitarianReport.pdf.

  • Mitchell, P. (2012). Contagious metaphor. New York: Bloomsbury Academic.

    Google Scholar 

  • Mittelman, J. (2010). Hyperconflict: Globalization and insecurity. Stanford: Stanford University Press.

    Google Scholar 

  • Morris, B. (2001). Righteous victims: A history of the Zionist–Arab conflict, 1881–1998. New York: Vintage Books.

    Google Scholar 

  • Nalapat, M. D. (2011, March 11). Defeating terrorism—Why the Tamil Tigers lost Eelam…and how Sri Lanka won the war. JINSA Global Briefing. Retrieved from http://www.jinsa.org/publications/global-briefing/defeating-terrorism-why-tamil-tigers-lost-eelamand-how-sri-lanka-won-wa.

  • Nalbandov, R. (2013). Irrational rationality of terrorism. Journal of Strategic Security, 6: 92–102.

    Article  Google Scholar 

  • Nasrallah, R. (2013). The first and second Palestinian intifadas. In J. Peters & D. Newman (Eds.), The Routledge handbook on the Israeli–Palestinian conflict (pp. 56–68). Milton Park: Routledge.

    Google Scholar 

  • National Commission on Terrorist Attacks. (2004). The 9/11 commission report: Final report of the National Commission on Terrorist Attacks upon the United States. New York: W. W. Norton & Company

    Google Scholar 

  • National Counter-Terrorism Committee. (2009). Ob Itogax Deyatelnosti Nacionalnogo Anti-Terroristicheskogo Comiteta v 2009 Godu (On the result of the activities of the National Counter-Terrorism Committee in 2009). Retrieved from http://nak.fsb.ru/nac/activity.htm.

  • Nygren, B. (2008). The rebuilding of Greater Russia: Putin’s foreign policy towards the CIS countries. Milton Park: Routledge.

    Google Scholar 

  • O’Hern, S. (2012). Iran’s revolutionary guard: The threat that grows while America sleeps. Washington, D.C.: Potomac Books.

    Google Scholar 

  • Obama, B. (2010). National security strategy 2010. Washington, D.C.: US Government.

    Google Scholar 

  • Olsson, P. A. (2014). The making of a homegrown terrorist: Brainwashing rebels in search of a cause. Santa Barbara: ABC-CLIO, LLC.

    Google Scholar 

  • Palanithurai, G., & Mohanasundaram, K. (1993). Dynamics of Tamil Nadu politics in Sri Lankan ethnicity. New Delhi: Northern Book Centre.

    Google Scholar 

  • Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. New York: Random House.

    Google Scholar 

  • Pedahzur, A., & Perliger, A. (2011). Jewish terrorism in Israel. New York: Columbia University Press.

    Google Scholar 

  • Peleg, S., & Kempf, W. F. (2006). Fighting terrorism in the liberal state. Amsterdam: IOS Press/NATO Publications.

    Google Scholar 

  • Pokalova, E. (2015). Chechnya’s terrorist network: The evolution of terrorism in Russia’s North Caucasus. Santa Barbara: ABC-CLIO.

    Google Scholar 

  • Ponkin, I. V. (2008). O Soderjanii in Napravlennosti I Posledstviyax Realizacii Plana Meropriyatii po Obespecheniu Podgotovki Specialistov s Uglublennim Znaniem Istorii I Kulturi Islama v 2007–2010 Godax. (On the essence, direction and consequences of the action plan on training of the specialists with the focused knowledge of the history and culture of Islam in 2007–2010. An analytical note). Vera I Vremya. Retrieved from http://www.verav.ru/common/mpublic.php?num=193.

  • Prince, D. (2013). The key to the Middle East: Discovering the future of Israel in biblical prophecy. Minneapolis: Chosen Books.

    Google Scholar 

  • RAND Database of Worldwide Terrorism Incidents. (2009). Retrieved from http://smapp.rand.org/rwtid/search_form.php. RAND Corporation.

  • RIA Novosti. (2008). Okolo 400 Millionov Rublei Videleno na Podderjku Islamskogo Obrazovaniya v Rossii (About 400 million rubles were spent in support of Islamic education in Russia). Retrieved from http://volga.ria.ru/society/20080214/81636115.html.

  • Richardson, M. (2004). A time bomb for global trade: Maritime-related terrorism in an age of weapons of mass destruction. Singapore: Institute of Southeast Asian Studies.

    Google Scholar 

  • Roberson, W. G. (2014). Block by block: The challenges of urban operations. Fort Leavenworth, Kansas: US Army Command and General Staff College Press.

    Google Scholar 

  • Rogovin, V. Z. (2009). Stalin’s terror of 1937–1938: Political genocide in the USSR. Oak Park: Mehring Books.

    Google Scholar 

  • Rosen, D. M. (2005). Armies of the young: Child soldiers in war and terrorism. Piscataway: Rutgers University Press.

    Google Scholar 

  • Ross, J. I. (Ed.). (2011). Religion and violence: An encyclopedia of faith and conflict from antiquity to the present. Milton Park: Routledge.

    Google Scholar 

  • Rotberg, R. (1999). Creating peace in Sri Lanka: Civil war and reconciliation. Washington, D.C.: The World Peace Foundation.

    Google Scholar 

  • Rothrock, J. (2011). Live by the sword: Israel’s struggle for existence in the Holy Land. Bloomington: WestBow Press.

    Google Scholar 

  • Ryazancev, C. V. (2003). Demograficheskii I Migracionnii Portret Severnogo Kavkaza (Demographic and migration portrait of the South Caucasus). Stavropol: Servisshkola.

    Google Scholar 

  • Salem, W. (2008). Human security from below: Palestinian citizens protection strategies, 1988–2005. In M. Den Boer & J. De Wilde (Eds.), The viability of human security (pp. 179–201). Amsterdam: Amsterdam University Press.

    Google Scholar 

  • Savinkov, B. (2003). Vosponimaniya terrorista (Memoirs of a terrorist). Moscow: ACT Tranzitkniga.

    Google Scholar 

  • Schaefer, R. W. (2010). The insurgency in Chechnya and the North Caucasus: From gazavat to jihad. Santa Barbara: ABC-CLIO.

    Google Scholar 

  • Schmid, A. P., & Singh, R. (2009). Measuring success and failure in terrorism and counter-terrorism: US Government metrics of the Global War on Terror. In A. P. Schmid & G. F. Hindle (Eds.), After the war on terror. Regional and multilateral perspectives on counter-terrorism strategy (pp. 33–61). London: RUSI Books.

    Google Scholar 

  • Seely, R. (2001). Russo–Chechen conflict, 1800–2000: A deadly embrace. Milton Park: Frank Cass Publishers.

    Google Scholar 

  • Shai, S. (2004). The shahids: Islam and suicide attacks. New Jersey: Transaction Publishers.

    Google Scholar 

  • Sharika Thiranagama, S. (2011). In my mother’s house: Civil war in Sri Lanka. Philadelphia: University of Pennsylvania Press.

    Google Scholar 

  • Sheppard, B. (2009). The psychology of strategic terrorism: Public and government responses to attack. Milton Park: Routledge.

    Google Scholar 

  • Schmid, A., & Jongman, A.J. (1988). Political terrorism: A new guide to actors, authors, concepts, data bases, theories, and literature. Transaction Publishers.

    Google Scholar 

  • Shterin, M., & Yarlykapov, A. (2015). Caliphate in the minds and practices of young Muslims in Northern Caucasus. In M. Al-Rasheed, C. Kersten, & M. Shterin (Eds.), Demystifying the Caliphate: Historical memory and contemporary contexts (pp. 247–272). New York: Oxford University Press.

    Google Scholar 

  • Singh, H. (2010). South Asia defence and strategic year book, 2010. New Delhi: Pentagon Press.

    Google Scholar 

  • Smith, P. J. (2008). The terrorism ahead: Confronting transnational violence in the twenty-first century. New York: M.E. Sharpe.

    Google Scholar 

  • Søbø, G., Goodhand, J., Klem, B., Nissen, A.E., & Selbervik, H. (2011) Pawns of Peace: Evaluation of Norwegian Peace Efforts in Sri Lanka, 1997–2009. Oslo: Norad.

    Google Scholar 

  • Tambiah, S. J. (1986). Sri Lanka: Ethnic fratricide and the dismantling of democracy. London: I.B. Tauris and Co., Ltd.

    Google Scholar 

  • Tanter, R. (2006). Appeasing the Ayatollahs and suppressing democracy: U.S. policy and the Iranian opposition. Washington, DC.

    Google Scholar 

  • Tesla, A. (2010, July 8). Trans-Atlantic aircraft plot (2006). New York Times. Retrieved from http://topics.nytimes.com/top/reference/timestopics/subjects/t/terrorism/2006_transatlantic_aircraft_plot/index.html.

  • Trawick, M. (2007). Enemy lines: Warfare, childhood, and play in Batticaloa. Berkeley: University of California Press.

    Google Scholar 

  • US Department of State. (2008, April). Country reports on terrorism 2007. Retrieved from http://www.state.gov/documents/organization/105904.pdf.

  • Uschan, M. V. (2006). The Beslan School siege and separatist terrorism. Milwaukee: World Almanac.

    Google Scholar 

  • Uzel, K. (2001). Kadyrov Akhmad Abdulkhamidovish (Akhmad-Haji). Retrieved from http://www.kavkaz-uzel.ru/articles/13679/.

  • Vadlamudi, S. (2007). The US Embassy bombings in Kenya and Tanzania. In J. F. Forest (Ed.), Countering terrorism and insurgency in the 21st century: Lessons from the fight against terrorism (pp. 103–127)). Westport: Praeger.

    Google Scholar 

  • Vidino, L. (2005). How Chechnya became a breeding ground for terror, Middle East Quarterly, Summer 2005, 57–66. Retrieved from http://www.meforum.org/744/how-chechnya-became-a-breeding-ground-for-terror.

  • Wardlaw, G. (1998). Political terrorism: Theory, tactics and counter-measures. Melbourne: Cambridge University Press.

    Google Scholar 

  • Winger, G. (2012, November). The counterinsurgency constellation: Understanding the defeat of the Liberation Tigers of Tamil Eelam. Paper presented at the Annual meeting of the Northeastern Political Science Association, Boston, Massachusetts.

    Google Scholar 

  • Wolf, S. O., Schöttli, J., Frommherz, D., Fürstenberg, K., Gallenkamp, M., König, L., & Pauli, M. (Eds.). (2015). Politics in South Asia: Culture, rationality and conceptual flow. Cham: Springer.

    Google Scholar 

  • Woog, A. (2009). The Palestinian national authority (2nd ed.). New York: Chelsea House.

    Google Scholar 

  • Wright, L. (2006). The looming tower. Al Qaeda and the road to 9/11. New York: Alfred A. Knopf.

    Google Scholar 

  • Zanotti, J., Migdalovitz, C., Sharp, J. M., Addis, C. L., Blanchard, C. M., & Margesson, R. (2009). Israel and Hamas: Conflict in Gaza (2008–2009). CRS Report R40101. Washington, D.C.: Congressional Research Service.

    Google Scholar 

  • Zanotti, J. (2010). Hamas: Background and issues for congress. CRS Report R41514. Washington, D.C.: Congressional Research Service.

    Google Scholar 

  • Zelenyi, V. (2009). Evoluciya Podxodov K Resheniu Problemi Terrorizma Na Primere SShA I Rossii (Evolution of problem-solving approaches to terrorism in the example of USA and Russia). Power, 12: 76–79.

    Google Scholar 

  • Zhuravel, V. P. (2003). Russia in the fight against money laundering and terrorism financing. Law and Security, 3: 3–4.

    Google Scholar 

  • Zürcher, C. (2007). The post-Soviet wars: Rebellion, ethnic conflict, and nationhood in the Caucasus. New York: New York University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Nalbandov .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Nalbandov, R. (2017). Evaluating the ‘Success’ and ‘Failure’ of Counterterrorism Policy and Practice. In: Romaniuk, S., Grice, F., Irrera, D., Webb, S. (eds) The Palgrave Handbook of Global Counterterrorism Policy. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-55769-8_4

Download citation

Publish with us

Policies and ethics