Advertisement

Counter-Terrorism Effectiveness and Human Rights in Israel

  • Badi HasisiEmail author
  • Simon Perry
  • Michael Wolfowicz
Reference work entry
Part of the International Human Rights book series (IHR)

Abstract

In the last two decades, democratic countries have had to contend with a growing and evolving terrorist threat. Many of the counter-terrorism policies that have been introduced during this period have been criticized for having been made hastily and without a solid evidentiary basis. Critics argue that as a result, many policies not only fail to guard human rights but impinge on them, all the while also proving ineffectual. By failing to safeguard human and civil rights and liberties, many see that such policies erode legitimacy and trust through discriminatory and alienating practices and thereby contribute to the radicalization that gives rise to the terrorism which they seek to prevent. Striking a balance between security needs and human rights concerns is certainly an important one. Selecting counter-terrorism strategies that limit human rights impingements may inherently address some of the tests of proportionality. The Israeli case, with its unique set of security challenges, provides an interesting laboratory to examine the relationship between counter-terrorism effectiveness and human rights maintenance. Taking a criminological approach to policing practices, in this chapter we highlight how key Israeli counter-terrorism policies combine situational prevention and focused deterrence approaches to achieve both proportionality and effectiveness.

Keywords

Counter-terrorism Human rights Effectiveness Balance Israel 

References

  1. Argomaniz J (2015) European Union responses to terrorist use of the internet. Coop Confl 50(2):250–268CrossRefGoogle Scholar
  2. Barak A (2007) Proportional effect: the Israeli experience. Univ Tor Law J 57(2):369–382CrossRefGoogle Scholar
  3. Barberá P (2014) How social media reduces mass political polarization. Evidence from Germany, Spain, and the US. Job Market Paper, New York University, 46Google Scholar
  4. Barnea A (2018) Challenging the “Lone Wolf” phenomenon in an era of information overload. Int J Intell Counterintell 31(2):217–234CrossRefGoogle Scholar
  5. Bhui K, Silva MJ, Topciu RA, Jones E (2016) Pathways to sympathies for violent protest and terrorism. Br J Psychiatry 209(6):483–490CrossRefGoogle Scholar
  6. Bitton R (2016) In law we trust: the Israeli case of overseeing intelligence. In: Goldman ZK, Rascof SJ (eds) Global intelligence oversight governing security in the twenty-first century. Oxford University Press, New York, pp 141–174CrossRefGoogle Scholar
  7. Boer MD (2015) Counter-terrorism, security and intelligence in the EU: governance challenges for collection, exchange and analysis. Intell Natl Secur 30(2–3):402–419CrossRefGoogle Scholar
  8. Braga AA (2012) Getting deterrence right? Evaluation evidence and complementary crime control mechanisms. Criminol Public Policy 11(2):201–210CrossRefGoogle Scholar
  9. Braga AA, Weisburd D (2010) Policing problem places: crime hot spots and effective prevention. Oxford University Press on Demand, New YorkCrossRefGoogle Scholar
  10. Braga AA, Weisburd DL (2012) The effects of focused deterrence strategies on crime: a systematic review and meta-analysis of the empirical evidence. J Res Crime Delinq 49(3):323–358CrossRefGoogle Scholar
  11. Braga AA, Weisburd DL (2015) Focused deterrence and the prevention of violent gun injuries: practice, theoretical principles, and scientific evidence. Annu Rev Public Health 36:55–68CrossRefGoogle Scholar
  12. Brandt PT, Sandler T (2010) What do transnational terrorists target? Has it changed? Are we safer? J Confl Resolut 54(2):214–236CrossRefGoogle Scholar
  13. Brown I, Korff D (2009) Terrorism and the proportionality of internet surveillance. Eur J Criminol 6(2):119–134CrossRefGoogle Scholar
  14. Brumnik R, Podbregar I, Ivanuša T (2011) The efficiency of biometric systems in fight against terrorism. TRANSCOM 9–14Google Scholar
  15. Choudhury T, Fenwick H (2011) The impact of counter-terrorism measures on Muslim communities. Int Rev Law Comput Technol 25(3):151–181CrossRefGoogle Scholar
  16. Clare J, Morgan F (2009) Exploring parallels between situational prevention and non-criminological theories for reducing terrorist risk. Reducing Terrorism Situational Crime Prev 25:207–227Google Scholar
  17. Clarke R, Newman G (2006) Outsmarting the terrorists. Praeger, LondonGoogle Scholar
  18. Cohen H, Dudai R (2005) Human rights dilemmas in using informers to combat terrorism: the Israeli-Palestinian case. Terrorism Polit Violence 17(1–2):229–243CrossRefGoogle Scholar
  19. Cohen A, Shany Y (2007) A development of modest proportions: the application of the principle of proportionality in the targeted killings case. J Int Crim Justice 5(2):310–321CrossRefGoogle Scholar
  20. Coolsaet R (2005) Radicalisation and Europe’s counter-terrorism strategy. La Haye, Royal Institute for International Relations (Brussels) and Ghent University, The Transatlantic Dialogue on terrorism CSIS/Clingendael, The HagueGoogle Scholar
  21. Coppock V, McGovern M (2014) ‘Dangerous minds’? Deconstructing counter-terrorism discourse, radicalisation and the ‘psychological vulnerability’of Muslim children and young people in Britain. Child Soc 28(3):242–256CrossRefGoogle Scholar
  22. Cornish DB, Clarke RV (2003) Opportunities, precipitators and criminal decisions: a reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies 16:41–96Google Scholar
  23. Costi A (2012) Complementary approaches? A brief comparison of EU and United States counter terrorism strategies since 2001. Yearbook 18 New Zealand Association of Comparative Law, 167–195. Available at SSRN: https://ssrn.com/abstract=2732882
  24. Crenshaw M (1983) Introduction: reflections on the effects of terrorism. In Crenshaw M (ed) Terrorism, legitimacy, and power: the consequences of political violence. Wesleyan University Press, Middletown, pp 1–37Google Scholar
  25. Crenshaw M (2008) The logic of terrorism: terrorist behavior as a product of strategic choice. In: Mahan S, Griset PL (eds) Terrorism in perspective. Sage, Thousand Oaks, pp 24–34Google Scholar
  26. Davies WA (2018) Counterterrorism effectiveness to jihadists in Western Europe and the United States: we are losing the war on terror. Stud Confl Terrorism 41(4):281–296CrossRefGoogle Scholar
  27. Doosje B, van den Bos K, Loseman A, Feddes AR, Mann L (2012) “My in-group is superior!”: susceptibility for radical right-wing attitudes and behaviors in Dutch youth. Negot Confl Manag Res 5(3):253–268CrossRefGoogle Scholar
  28. Doosje B, Loseman A, Van Den Bos K (2013) Determinants of radicalization of Islamic youth in the Netherlands: personal uncertainty, perceived injustice, and perceived group threat. J Soc Issues 69(3):586–604CrossRefGoogle Scholar
  29. Dragu T (2011) Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention. Am Polit Sci Rev 105(1):64–78CrossRefGoogle Scholar
  30. Drewer D, Ellermann J (2016) May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Comput Law Secur Rev 32(2):195–204CrossRefGoogle Scholar
  31. Dugan L, Lafree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Criminology 43(4):1031–1065CrossRefGoogle Scholar
  32. Enders W, Sandler T (1993) The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. Am Polit Sci Rev 87(4):829–844CrossRefGoogle Scholar
  33. Enders W, Sandler T (2000) Is transnational terrorism becoming more threatening? A time-series investigation. J Confl Resolut 44(3):307–332CrossRefGoogle Scholar
  34. Enders W, Sandler T, Cauley J (1990) Assessing the impact of terrorist-thwarting policies: an intervention time series approach. Def Peace Econ 2(1):1–18CrossRefGoogle Scholar
  35. Enders W, Parise GF, Sandler T (1992) A time-series analysis of transnational terrorism: trends and cycles. Def Peace Econ 3(4):305–320CrossRefGoogle Scholar
  36. European Parliament Resolution 2025/2011Google Scholar
  37. Faria JR (2003) Terror cycles. Stud Nonlinear Dyn Econ 7(1):1–11Google Scholar
  38. Faria J (2006) Terrorist innovations and anti-terrorist policies. Terrorism Polit Violence 18(1):47–56CrossRefGoogle Scholar
  39. Fidler DP (2015) Countering Islamic State exploitation of the internet. Digital and Cyberspace Policy Program, June 2015Google Scholar
  40. Fitzpatrick J (2003) Speaking law to power: the war against terrorism and human rights. Eur J Int Law 14(2):241–264CrossRefGoogle Scholar
  41. Freilich CD (2017) Israel’s counter-terrorism policy: how effective? Terrorism and Polit Violence 29(2):359–376CrossRefGoogle Scholar
  42. Gill P, Horgan J, Deckert P (2014) Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. J Forensic Sci 59(2):425–435CrossRefGoogle Scholar
  43. Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117CrossRefGoogle Scholar
  44. Golder B, Williams G (2006) Balancing national security and human rights: assessing the legal response of common law nations to the threat of terrorism. J Comp Policy Anal 8(01):43–62Google Scholar
  45. Granger MP, Irion K (2014) The court of justice and the data retention directive in digital rights Ireland: telling off the EU legislator and teaching a lesson in privacy and data protection. Eur Law Rev 39(4):835–850Google Scholar
  46. Hafez M, Mullins C (2015) The radicalization puzzle: a theoretical synthesis of empirical approaches to homegrown extremism. Stud Confl Terrorism 38(11):958–975CrossRefGoogle Scholar
  47. Harcourt BE (2007) Muslim profiles post-9/11: is racial profiling an effective counter-terrorist measure and does it violate the right to be free from discrimination? In: Goold B, Lazarus L (eds) Security and human rights. Hart Publishing, PortlandGoogle Scholar
  48. Hasisi B, Perry S (2017) Rational choice rewards and the Jihadist suicide bomber. In: Freilich JD, LaFree G (ed) Criminology theory and terrorism. Routledge, Milton Park, pp 63–90Google Scholar
  49. Hasisi B, Weisburd D (2011) Going beyond ascribed identities: the importance of procedural justice in airport security screening in Israel. Law Soc Rev 45(4):867–892CrossRefGoogle Scholar
  50. Hasisi B, Weisburd D (2014) Policing terrorism and police–community relations: views of the Arab minority in Israel. Police Pract Res 15(2):158–172CrossRefGoogle Scholar
  51. Hasisi B, Weitzer R (2007) Police relations with Arabs and Jews in Israel. The British Journal of Criminology 47(5):728–745CrossRefGoogle Scholar
  52. Hasisi B, Alpert GP, Flynn D (2009) The impacts of policing terrorism on society: lessons from Israel and the US. In: To protect and to serve. Springer, New York, pp 177–202CrossRefGoogle Scholar
  53. Hasisi B, Margalioth Y, Orgad L (2012) Ethnic profiling in airport screening: lessons from Israel, 1968–2010. Am Law Econ Rev 14(2):517–560CrossRefGoogle Scholar
  54. Helmus TC, York E, Chalk P (2013) Promoting online voices for countering violent extremism. Rand Corporation, Santa MonicaGoogle Scholar
  55. Hirschauge O, Shezaf H (2017) How Israel jails Palestinians because they fit the “Terrorist profile”. Retrieved from: https://www.haaretz.com/israel-news/.premium.MAGAZINE-israel-jails-palestinians-who-fit-terrorist-profile-1.5477437
  56. Hoffman B (1993) Terrorist targeting: tactics, trends, and potentialities. Terrorism Polit Violence 5(2):12–29CrossRefGoogle Scholar
  57. Hsu HY, Apel R (2015) A situational model of displacement and diffusion following the introduction of airport metal detectors. Terrorism Polit Violence 27(1):29–52CrossRefGoogle Scholar
  58. Hsu HY, McDowall D (2017) Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. J Res Crime Delinq 54(6):930–957CrossRefGoogle Scholar
  59. Jonathan T, Weisburd D (2010) How do majority communities view the potential costs of policing terrorism? Findings from a community survey in Israel. Policing: J Policy Pract 4(2):169–181CrossRefGoogle Scholar
  60. Jonathan-Zamir T, Hasisi B, Margalioth Y (2016a) Is it the what or the how? The roles of high-policing tactics and procedural justice in predicting perceptions of hostile treatment: the case of security checks at Ben-Gurion Airport, Israel. Law Soc Rev 50(3):608–636CrossRefGoogle Scholar
  61. Jonathan-Zamir T, Weisburd D, Hasisi B (2016b) Policing terrorism, crime control, and police-community relations. Springer, New YorkGoogle Scholar
  62. Kardaş T, Özdemir ÖB (2018) The making of European foreign fighters: identity, social media and virtual radicalization. In Non-state armed actors in the Middle East. Palgrave Macmillan, Cham, pp 213–235Google Scholar
  63. Kaunert C (2010) Europol and EU counterterrorism: international security actorness in the external dimension. Stud Confl Terrorism 33(7):652–671CrossRefGoogle Scholar
  64. Kaunert C, Léonard S (2011) EU counterterrorism and the European neighbourhood policy: an appraisal of the southern dimension. Terrorism Polit Violence 23(2):286–309CrossRefGoogle Scholar
  65. Kleinig J (2011) Liberty and security in an era of terrorism. In: Forst B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 357–382CrossRefGoogle Scholar
  66. Krueger AB, Malečková J (2003) Education, poverty and terrorism: is there a causal connection? J Econ Perspect 17(4):119–144CrossRefGoogle Scholar
  67. LaFree G, Ackerman G (2009) The empirical study of terrorism: social and legal research. Ann Rev Law Soc Sci 5:347–374CrossRefGoogle Scholar
  68. LaFree G, Dugan L, Korte R (2009) The impact of British counterterrorist strategies on political violence in Northern Ireland: comparing deterrence and backlash models. Criminology 47(1):17–45CrossRefGoogle Scholar
  69. Lakhani S (2012) Preventing violent extremism: perceptions of policy from grassroots and communities. Howard J Crim Just 51(2):190–206CrossRefGoogle Scholar
  70. Landes WM (1978) An economic study of US aircraft hijacking, 1961–1976. J Law Econ 21(1):1–31CrossRefGoogle Scholar
  71. Loideain NN (2014) Surveillance of communications data and Article 8 of the European Convention on Human Rights. In Reloading data protection. Springer, Dordrecht, pp 183–209Google Scholar
  72. Lum C, Koper C (2011) Is crime prevention relevant to counterterrorism. In: Frost B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 129–150CrossRefGoogle Scholar
  73. Lum C, Kennedy LW, Sherley A (2006) The effectiveness of counter-terrorism strategies: a Campbell systematic review, crime and justice coordinating group. The Campbell Collaboration, Washington, DCGoogle Scholar
  74. Madon NS, Murphy K, Cherney A (2016) Promoting community collaboration in counterterrorism: do social identities and perceptions of legitimacy mediate reactions to procedural justice policing? Br J Criminol 57(5):1144–1164Google Scholar
  75. Masferrer A, Walker C (eds) (2013) Counter-terrorism, human rights and the rule of law: crossing legal boundaries in defence of the state. Edward Elgar Publishing, CheltenhamGoogle Scholar
  76. Masters D, Hoen P (2012) State legitimacy and terrorism. Democr Secur 8(4):337–357CrossRefGoogle Scholar
  77. Michaelsen C (2006) Balancing civil liberties against national security? A critique of counterterrorism rhetoric. UNSWLJ 29:1Google Scholar
  78. Michaelsen C (2008) The proportionality principle in the context of anti-terrorism laws: an inquiry into the boundaries between human rights law and public policy. In Gani M, Mathew P (eds) Fresh perspectives on the ‘War on Terror’, ANU E Press, Canberra, pp 109–124Google Scholar
  79. Michaelsen C (2010) The proportionality principle, counter-terrorism laws and human rights: a German-Australian comparison. City UHKL Rev 2:19Google Scholar
  80. Midlarsky MI, Crenshaw M, Yoshida F (1980) Why violence spreads: the contagion of international terrorism. Int Stud Q 24(2):262–298CrossRefGoogle Scholar
  81. Milaj J, Bonnici JPM (2014) Unwitting subjects of surveillance and the presumption of innocence. Comput Law Secur Rev 30(4):419–428CrossRefGoogle Scholar
  82. Munk TB (2017) 100,000 false positives for every real terrorist: why anti-terror algorithms don’t work. First Monday 22(9)Google Scholar
  83. Murphy K, Cherney A, Teston M (2018) Promoting Muslims’ willingness to report terror threats to police: testing competing theories of procedural justice. Justice Q:1–26Google Scholar
  84. Nacos BL (2009) Revisiting the contagion hypothesis: terrorism, news coverage, and copycat attacks. Perspect Terrorism 3(3):3–13Google Scholar
  85. Neumann PR (2013) Options and strategies for countering online radicalization in the United States. Stud Confl Terrorism 36(6):431–459CrossRefGoogle Scholar
  86. Nivette A, Eisner M, Ribeaud D (2017) Developmental predictors of violent extremist attitudes: a test of general strain theory. J Res Crime Delinq 54(6):755–790CrossRefGoogle Scholar
  87. Office of the High Commission for Human Rights – OHCHR (2008) Human rights, terrorism and counterterrorism, fact sheets, No. 32: terrorism and counter-terrorismGoogle Scholar
  88. Pape R (2005) Dying to win: the strategic logic of suicide bombing. Random House, New YorkGoogle Scholar
  89. Pauwels LJ, Hardyns W (2018) Endorsement for extremism, exposure to extremism via social media and self-reported political/religious aggression. Int J Dev Sci (Preprint), 1–19Google Scholar
  90. Pauwels L, Schils N (2016) Differential online exposure to extremist content and political violence: testing the relative strength of social learning and competing perspectives. Terrorism Polit Violence 28(1):1–29CrossRefGoogle Scholar
  91. Pedahzur A, Perliger A (2010) The consequences of counterterrorist policies in Israel. In: Martha Crenshaw (ed) The consequences of counterterrorism. Russell Sage Foundation, New York, pp 335–366Google Scholar
  92. Pedersen W, Vestel V, Bakken A (2018) At risk for radicalization and jihadism? A population-based study of Norwegian adolescents. Coop Confl 53(1):61–83CrossRefGoogle Scholar
  93. Perliger A, Pedahzur A (2006) Coping with suicide attacks: lessons from Israel. Public Money Manag 26(5):281–286CrossRefGoogle Scholar
  94. Perry G, Hasisi B (2018) Closing the gap: promoting suspect communities’ cooperation with airport security. Terrorism Polit Violence:1–20Google Scholar
  95. Perry S, Jonathan-Zamir T (2014) Lessons from empirical research on policing in Israel: policing terrorism and police–community relationships. Police Pract Res 15(2):173–187CrossRefGoogle Scholar
  96. Perry S, Weisburd D, Hasisi B (2016) The ten commandments for effective counterterrorism. In: LaFree G, Freilich JD (eds) The handbook of the criminology of terrorism. Wiley, Chichester, pp 482–494CrossRefGoogle Scholar
  97. Perry S, Hasisi B, Perry G (2019) Lone terrorists: a study of run-over attacks in Israel. Eur J Criminol 16(1):102–123CrossRefGoogle Scholar
  98. Perry S, Apel R, Newman GR, Clarke RV (2017b) The situational prevention of terrorism: an evaluation of the Israeli West Bank barrier. J Quant Criminol 33(4):727–751CrossRefGoogle Scholar
  99. Perry S, Hasisi B, Perry G (2018) Who is the lone terrorist? A study of vehicle-borne attackers in Israel and the West Bank. Stud Confl Terrorism 41(11):899–913CrossRefGoogle Scholar
  100. Rasmussen MJ, Hafez MM (2010) Terrorist innovations in weapons of mass effect: preconditions, causes, and predictive indicators (No. ASCO-2010-019). Naval Postgraduate School, MontereyGoogle Scholar
  101. Risse M, Zeckhauser R (2004) Racial profiling. 32 Phil Pub Aff 131:162Google Scholar
  102. Roach K (2011) The 9/11 effect: comparative counter-terrorism. Cambridge University Press, Cambridge, UKCrossRefGoogle Scholar
  103. Robinson LA, Hammitt JK, Aldy JE, Krupnick A, Baxter J (2010) Valuing the risk of death from terrorist attacks. J Homel Secur Emerg Manag 7(1):1–25Google Scholar
  104. Santos M (2018) Settler colonial surveillance and the criminalization of social media: contradictory implications for Palestinian resistance. In: Melgaço L, Monaghan J (eds) Protests in the information age. Routledge, pp 97–114Google Scholar
  105. Schmid AP (2012) Terrorism prevention as situational crime prevention. International Centre for Counter-Terrorism (ICCT), The HagueGoogle Scholar
  106. Schmid A (2013) Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. Terrorism and Counter-Terrorism StudiesGoogle Scholar
  107. Seymour B (2005) Behavior pattern recognition and aviation security. J Secur Educ 1(2–3):69–79CrossRefGoogle Scholar
  108. Shefet D (2016) Policy options and regulatory mechanisms for managing radicalization on the Internet. Retrieved from www.en.unesco.org/sites/default/files/rapport_dan_shefet.pdf
  109. Shortland ND (2016) “On the internet, nobody knows you’re a dog”: the online risk assessment of violent extremists. In: Khader M, Neo LS, Ong G, Mingyi ET, Chin J (eds) Combating violent extremism and radicalization in the digital era. IGI Global, Hershey, pp 349–373Google Scholar
  110. SIBAT (2015) Israel defense directory 2015–2016, The Israel Ministry of Defense (SIBAT), International Defense Cooperation. Retrieved from http://www.sibat.mod.gov.il/Industries/Directory/Documents/Defense%20Directory%202015_16.pdf
  111. Silke A (2003) Becoming a terrorist. Terrorists Vict Soc Psychol Perspect Terrorism Consequences 29:53Google Scholar
  112. Silke A (2010) Terrorists and extremists in prison: psychological issues in management and reform. In: Silke A (ed) The psychology of counter-terrorism. Routledge, pp 137–148Google Scholar
  113. Taylor M (1988) The terrorist. Brassey’s Defence PublishersGoogle Scholar
  114. The Economist (2017) The stabbing intifada: how Israel spots lone-wolf attackers. The Economist. Retrieved from https://www.economist.com/international/2017/06/08/how-israel-spots-lone-wolf-attackers
  115. Tillyer MS, Kennedy DM (2008) Locating focused deterrence approaches within a situational crime prevention framework. Crime Prev Community Saf 10(2):75–84CrossRefGoogle Scholar
  116. Tyler TR, Schulhofer S, Huq AZ (2010) Legitimacy and deterrence effects in counterterrorism policing: a study of Muslim Americans. Law Soc Rev 44(2):365–402CrossRefGoogle Scholar
  117. Tyler TR, Fagan J, Geller A (2014) Street stops and police legitimacy: teachable moments in young urban men’s legal socialization. J Empir Leg Stud 11(4):751–785CrossRefGoogle Scholar
  118. UNGA (2006) The United Nations global counter-terrorism strategy. Demogr Res 60:288Google Scholar
  119. Vidino L, Brandon J (2012) Europe's experience in countering radicalisation: approaches and challenges. J Polic Intell Counter Terrorism 7(2):163–179CrossRefGoogle Scholar
  120. Walker C (2009) Neighbor terrorism and the all-risks policing of terrorism. J Nat’l Sec L Pol’y 3:121Google Scholar
  121. Weimann G (2014) New terrorism and new media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DCGoogle Scholar
  122. Weimann G (2016) Going dark: terrorism on the dark web. Stud Confl Terrorism 39(3):195–206CrossRefGoogle Scholar
  123. Weirman S, Alexander A (2018) Hyperlinked sympathizers: URLs and the Islamic State. Stud Confl Terrorism 1–19Google Scholar
  124. Weisburd D (2016) Does hot spots policing inevitably lead to unfair and abusive police practices, or can we maximize both fairness and effectiveness in the new proactive policing. U Chi Legal F 2016:661Google Scholar
  125. Weisburd D, Amram S (2014) The law of concentrations of crime at place: the case of Tel Aviv-Jaffa. Police Pract Res 15(2):101–114CrossRefGoogle Scholar
  126. Weisburd D, Eck JE (2004) What can police do to reduce crime, disorder, and fear? Ann Am Acad Pol Soc Sci 593(1):42–65CrossRefGoogle Scholar
  127. Weisburd D, Telep CW (2014) Hot spots policing: what we know and what we need to know. J Contemp Crim Justice 30(2):200–220CrossRefGoogle Scholar
  128. Weisburd D, Jonathan T, Perry S (2009a) The Israeli model for policing terrorism: goals, strategies, and open questions. Crim Justice Behav 36(12):1259–1278CrossRefGoogle Scholar
  129. Weisburd D, Hasisi B, Jonathan T, Aviv G (2009b) Terrorist threats and police performance: a study of Israeli communities. Br J Criminol 50(4):725–747CrossRefGoogle Scholar
  130. White R (1998) Curtailing youth: a critique of coercive crime prevention. Crime Prev Stud 9:117–137Google Scholar
  131. Wilson RA (ed) (2005) Human rights in the ‘War on Terror’. Cambridge University Press, Cambridge, UKGoogle Scholar
  132. Wojcieszak M (2009) “Carrying online participation offline” – mobilization by radical online groups and politically dissimilar offline ties. J Commun 59(3):564–586CrossRefGoogle Scholar
  133. Yang SM, Jen IC (2018) An evaluation of displacement and diffusion effects on eco-terrorist activities after police interventions. J Quant Criminol 34(4):1103–1123CrossRefGoogle Scholar
  134. Zedner L (2005) Securing liberty in the face of terror: reflections from criminal justice. J Law Soc 32(4):507–533CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.The Institute of Criminology, Faculty of LawHebrew University of JerusalemMount ScopusIsrael

Personalised recommendations