Advertisement

Responses

  • Ramón SpaaijEmail author
Chapter
  • 2.3k Downloads
Part of the SpringerBriefs in Criminology book series (BRIEFSCRIMINOL)

Abstract

When people are targeted by a terrorist attack, among the first questions that typically follow—apart from “why?” or “why us?”—are whether the attack could have been prevented, and what should be done in response. It is therefore no surprise that the output of counterterrorism literature has dramatically accelerated, especially since 9/11. This literature shows that a wide range of counterterrorist policies and programs have been tried over the years with mixed success, and that there are substantial dissimilarities between the counterterrorism approaches of different countries depending, among other factors, on historical factors, a country’s experiences with terrorism, and its political system and culture. As will be seen, responses to lone wolf terrorism are equally context-specific, reflecting a variety of counterterrorism and police cultures and legal traditions.

Keywords

Terrorist Attack Civil Liberty Conciliatory Response Criminal Psychologist Improvise Explosive Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Schmid AP, Crelinsten RD (eds) (1993) Western responses to terrorism. Frank Cass, LondonGoogle Scholar
  2. 2.
    Alexander Y (ed) (2002) Combating terrorism: Strategies of ten countries. University of Michigan Press, Ann ArborGoogle Scholar
  3. 3.
    van Leeuwen M (ed) (2003) Confronting terrorism: European experiences threat perceptions and policies. Kluwer, The HagueGoogle Scholar
  4. 4.
    von Hippel K (ed) (2005) Europe confronts terrorism. Palgrave, LondonGoogle Scholar
  5. 5.
    TTSRL (2008) Radicalisation, recruitment and the EU counter-radicalisation strategy. European Commission Sixth Framework program Transnational Terrorism, Security and the Rule of Law, BrusselsGoogle Scholar
  6. 6.
    TTSRL (2008) Mapping counterterrorism. European Commission Sixth Framework program Transnational Terrorism, Security and the Rule of Law, BrusselsGoogle Scholar
  7. 7.
    Sederberg PC (1989) Terrorist myths: illusion, rhetoric, and reality. Prentice-Hall, Englewood CliffsGoogle Scholar
  8. 8.
    Sederberg PC (2003) Global terrorism: problems of challenge and response. In: Kegley CW Jr (ed) The new global terrorism: characteristics, causes, controls. Prentice Hall, Upper Saddle River, pp 267–284Google Scholar
  9. 9.
    Wilkinson P (2006) Terrorism versus democracy: the liberal state response, 2nd edn. Routledge, LondonGoogle Scholar
  10. 10.
    Brysk A, Shafir G (eds) (2007) National insecurity and human rights: Democracies debate counterterrorism. University of California Press, BerkeleyGoogle Scholar
  11. 11.
    Bianchi A, Keller A (eds) (2008) Counterterrorism: democracy’s challenge. Hart Publishing, PortlandGoogle Scholar
  12. 12.
    Crelinsten RD (2009) Counterterrorism. Polity, CambridgeGoogle Scholar
  13. 13.
    Martin G (2003) Understanding terrorism: challenges, perspectives, and issues. Sage, Thousands OaksGoogle Scholar
  14. 14.
    Bazan EB (2004) Intelligence reform and terrorism prevention act of 2004: ‘lone wolf’amendment to the foreign intelligence surveillance act. CRS report for Congress. Congressional Research Service, WashingtonGoogle Scholar
  15. 15.
    Al Jazeera (2011) Obama signs patriot act extension. Al Jazeera, 27 May. http://english.aljazeera.net/news/americas/2011/05/201152715850301322.html. Accessed 9 July 2011
  16. 16.
    Scahill T (2006) The domestic security enhancement act of 2003: a glimpse into a post-patriot act approach to combating domestic terrorism. CR: New Centennial Rev 6(1):69–94CrossRefGoogle Scholar
  17. 17.
    Bellia PL (2005) The ‘lone wolf’ amendment and the future of foreign intelligence surveillance law. Villanova Law Rev 50:425–455Google Scholar
  18. 18.
    Greenwald G (2011) An un-American response to the Oslo attack. Salon.com, 28 July. http://www.salon.com/news/opinion/glenn_greenwald/2011/07/28/norway. Accessed 29 July 2011
  19. 19.
    American Civil Liberties Union (2011) House passes extension of overbroad patriot act provisions. http://www.aclu.org/national-security/house-passes-extension-overbroad-patriot-act-provisions. Accessed 20 Aug 2011
  20. 20.
    American Civil Liberties Union 2011b Patriot Act: Eight years later. http://www.reformthepatriotact.org/. Accessed 20 August 2011
  21. 21.
    American Civil Liberties Union (2009) Reclaiming patriotism: a call to reconsider the patriot act. ACLU, New YorkGoogle Scholar
  22. 22.
    Crelinsten RD, Schmid AP (1993) Western responses to terrorism: a twenty-five year balance sheet. In: Schmid AP, Crelinsten RD (eds) Western responses to terrorism. Frank Cass, London, pp 307–340Google Scholar
  23. 23.
    Crelinsten RD (1998) The discourse and practice of counter-terrorism in liberal democracies. Aust J Politics Hist 44(1):389–413CrossRefGoogle Scholar
  24. 24.
    Pedahzur A, Ranstorp M (2001) A tertiary model for countering terrorism in liberal democracies: the case of Israel. Terrorism Political Violence 13(2):1–26CrossRefGoogle Scholar
  25. 25.
    Karpin M, Friedman I (1998) Murder in the name of God: the plot to kill Yitzhak Rabin. Henry Holt and Co, New YorkGoogle Scholar
  26. 26.
    Sprinzak E (1999) Brother against brother: violence and extremism in Israeli politics from Altalena to the Rabin assassination. The Free Press, New YorkGoogle Scholar
  27. 27.
    Rodgers W (1995) Anti-Rabin sentiment had turned ugly: confessed assassin had been seen before. CNN World News, 5 November. http://www.cnn.com/WORLD/9511/rabin/why_now/index.html. Accessed 9 June 2007
  28. 28.
    Commissie Van den Haak (2002) De veiligheid en beveiliging van Pim Fortuyn: Feiten en verantwoordelijkheden. SDU Uitgevers, The HagueGoogle Scholar
  29. 29.
    Brandt P, Sandler T (2010) What do transnational terrorists target? Has it changed? Are we safer? J Conflict Resolut 54(2):214–236CrossRefGoogle Scholar
  30. 30.
    Harpviken KB (2011) Norway after the terror. Plato’s Cave Blog, 1 August. http://platoscaveblog.wordpress.com/2011/08/01/norway-after-the-terror/. Accessed 5 Aug 2011
  31. 31.
    Europol (2011) TE-SAT 2011: EU terrorism situation and trend report. Europol, The HagueGoogle Scholar
  32. 32.
    Shone A (2010) Countering lone wolf terrorism: sustaining the CONTEST vision. http://www.henryjacksonsociety.org/stories.asp?id=1582. Accessed 12 Aug 2011
  33. 33.
    Stewart S (2011) Norway: lessons from a successful lone wolf attacker. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20110727-norway-lessons-successful-lone-wolf-attacker. Accessed 30 July 2011
  34. 34.
    Stewart S (2011) Al Qaeda’s new video: a message of defeat. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20110608-AlQaedas-new-video-message-defeat. Accessed 30 July 2011
  35. 35.
    Brock P (1999) The profiling method(s): interview mit Thomas Müller. Berliner Zeitung, 29 DecemberGoogle Scholar
  36. 36.
    Stewart S, Burton F (2008) Lone wolf lessons. STRATFOR Global Intelligence. http://www.stratfor.com/weekly/20090603_lone_wolf_lessons. Accessed 4 Nov 2010
  37. 37.
    Williams C (2011) Deadly, cruel lesson from Norway. The Australian, 26 July 11Google Scholar
  38. 38.
    Temple-Raston D (2010) Lone-wolf plots alter anti-terrorism strategy in US. National Public Radio, 30 December. http://www.npr.org/2010/12/30/132447190/lone-wolf-plotsalter-u-s-anti-terrorism-strategy. Accessed 6 Aug 2011
  39. 39.
    Cruickshank P, Lister T (2011) The ‘lone wolf’—the unknowable terror. CNN Security Clearance Blog, 7 September. http://security.blogs.cnn.com/2011/09/07/the-lone-wolf-the-unknowable-face-of-terror/. Accessed 9 Sept 2011
  40. 40.
    Clough S (2000) Copeland took nail bomb to a park to pass the time. The Daily Telegraph, 9 JuneGoogle Scholar
  41. 41.
    Metropolitan Police Service (2000) Copeland case special edition. The Job, 30 JuneGoogle Scholar
  42. 42.
    Hopkins N, Hall S (2000) David copeland: a quiet introvert, obsessed with Hitler and bombs. The Guardian, 30 June. http://www.guardian.co.uk/uk/2000/jun/30/uksecurity.sarahhall
  43. 43.
    Müller T (2006) Beestmensen: vermomming leugens en strategie van seriemoordenaars. Mets & Schilt, AmsterdamGoogle Scholar
  44. 44.
    von Goos H (2005) Der Großwildjäger. Der Spiegel, 3 JanuaryGoogle Scholar
  45. 45.
    Grassl-Kosa M, Steiner H (1996) Der Briefbomber ist unter uns. GKS, WienGoogle Scholar
  46. 46.
    Pühringer M (2003) Briefbomben: universalgenie franz fuchs? http://www.wienweb.at/content.aspx?id=59329&channel=2&cat=32. Accessed 17 June 2007
  47. 47.
    TTSRL (2007) The evolving threat of terrorism in policymaking and media discourse. European Commission Sixth Framework program Rransnational Terrorism, Security and the Rule of Law, BrusselsGoogle Scholar
  48. 48.
    Heinz W (2007) Germany: State responses to terrorist challenges and human rights. In: Brysk A, Shafir G (eds) National insecurity and human rights: democracies debate counterterrorism. University of California Press, Berkeley, pp 157–176Google Scholar
  49. 49.
    Friedrichsen G (1999) Nur irgendein Kasperl? Der Spiegel. 22 February, pp 184–186Google Scholar
  50. 50.
    Mappes-Niediek N (1997) Zufall führte zum österreichischen ‘Bombenhirn’. Berliner Zeitung, 4 OctoberGoogle Scholar
  51. 51.
    Thomson JA (2007) Beating the odds: In the war on terrorism, it takes both skill and chance. RAND Rev 31(3):30Google Scholar
  52. 52.
    Johnson SC (1998) Psychological evaluation of theodore John Kaczynski. Federal Correctional Institution Butner, North CarolinaGoogle Scholar
  53. 53.
    Kurtz H (1995) Unabomber manifesto is published: public safety reasons cited in joint decision by Post, NY Times. The Washington Post, 19 Sept, A01Google Scholar
  54. 54.
    Hoffman B (1998) Inside terrorism. Columbia University Press, New YorkGoogle Scholar
  55. 55.
    Laqueur W (1993) The uses and limits of intelligence. Transaction Publishers, Brunswick, NJGoogle Scholar
  56. 56.
    Weimann G (2006) Terror on the internet. United States Institute of Peace Press, Washington, DCGoogle Scholar
  57. 57.
    Schwirtz M (2011) Norway’s premier vows to keep an open society. The New York Times, 27 JulyGoogle Scholar
  58. 58.
    MacDougall I Ritter K (2011) Norway PM: attacks response to be ‘more democracy’, The Washington Times, 27 JulyGoogle Scholar
  59. 59.
    MacDougall I Ritter K (2011) Norway suspect also considered other targets. Denver Post, 31 JulyGoogle Scholar
  60. 60.
    Pogatchnik S (2011) Oslo bombing: Norway police’s response to massacre criticized. Huffington Post, 6 SeptGoogle Scholar
  61. 61.
    Wildavsky A (1988) Searching for safety. Transaction Publishers, New BrunswickGoogle Scholar
  62. 62.
    Coaffee J (2006) From counterterrorism to resilience. The Eur Legacy 11(4):389–403CrossRefGoogle Scholar
  63. 63.
    Furedi F (2007) Invitation to terror: the expanding empire of the unknown. Continuum, LondonGoogle Scholar
  64. 64.
    Bakker E, de Graaf B (2010) Lone wolves: how to prevent this phenomenon?. International Centre for Counter-Terrorism, The HagueGoogle Scholar
  65. 65.
    Schuster H, Stone C (2005) Hunting eric rudolph. Berkley Books, New YorkGoogle Scholar
  66. 66.
    Buncombe A (2000) ‘Inspiration’ came from Atlanta Olympics bomb. The Independent, 30 JuneGoogle Scholar
  67. 67.
    Clough S (2000) Bombings ‘inspired by Atlanta attack’. The Daily Telegraph, 6 JuneGoogle Scholar
  68. 68.
    Demant F, Slootman M, Buijs F, Tillie J (2008) Decline and disengagement: an analysis of processes of deradicalisation. IMES, Universiteit van Amsterdam, AmsterdamGoogle Scholar
  69. 69.
    Wieviorka M (2003) The making of terrorism, 2nd edn. University of Chicago Press, ChicagoGoogle Scholar
  70. 70.
    Brysk A (2007) Human rights and national insecurity. In: Brysk A, Shafir G (eds) National insecurity and human rights: democracies debate counterterrorism. University of California Press, Berkeley, pp 1–13Google Scholar
  71. 71.
    Geller A, Macdougall I (2011) Norway massacre forces new look at security in Europe. Denver Post, 5 August. http://www.denverpost.com/nationworld/ci_18620993. Accessed 7 Aug 2011
  72. 72.
    Christensen C (2004) Political victims and media focus: the killings of Laurent Kabila, Zoran Djindjic, Anna Lindh and Pim Fortuyn. J Crime Conflict Media 1(2):23–40Google Scholar

Copyright information

© The Author(s) 2012

Authors and Affiliations

  1. 1.School of Social SciencesLa Trobe UniversityMelbourneAustralia

Personalised recommendations