Abstract
In the last two decades, democratic countries have had to contend with a growing and evolving terrorist threat. Many of the counter-terrorism policies that have been introduced during this period have been criticized for having been made hastily and without a solid evidentiary basis. Critics argue that as a result, many policies not only fail to guard human rights but impinge on them, all the while also proving ineffectual. By failing to safeguard human and civil rights and liberties, many see that such policies erode legitimacy and trust through discriminatory and alienating practices and thereby contribute to the radicalization that gives rise to the terrorism which they seek to prevent. Striking a balance between security needs and human rights concerns is certainly an important one. Selecting counter-terrorism strategies that limit human rights impingements may inherently address some of the tests of proportionality. The Israeli case, with its unique set of security challenges, provides an interesting laboratory to examine the relationship between counter-terrorism effectiveness and human rights maintenance. Taking a criminological approach to policing practices, in this chapter we highlight how key Israeli counter-terrorism policies combine situational prevention and focused deterrence approaches to achieve both proportionality and effectiveness.
Similar content being viewed by others
References
Argomaniz J (2015) European Union responses to terrorist use of the internet. Coop Confl 50(2):250–268
Barak A (2007) Proportional effect: the Israeli experience. Univ Tor Law J 57(2):369–382
Barberá P (2014) How social media reduces mass political polarization. Evidence from Germany, Spain, and the US. Job Market Paper, New York University, 46
Barnea A (2018) Challenging the “Lone Wolf” phenomenon in an era of information overload. Int J Intell Counterintell 31(2):217–234
Bhui K, Silva MJ, Topciu RA, Jones E (2016) Pathways to sympathies for violent protest and terrorism. Br J Psychiatry 209(6):483–490
Bitton R (2016) In law we trust: the Israeli case of overseeing intelligence. In: Goldman ZK, Rascof SJ (eds) Global intelligence oversight governing security in the twenty-first century. Oxford University Press, New York, pp 141–174
Boer MD (2015) Counter-terrorism, security and intelligence in the EU: governance challenges for collection, exchange and analysis. Intell Natl Secur 30(2–3):402–419
Braga AA (2012) Getting deterrence right? Evaluation evidence and complementary crime control mechanisms. Criminol Public Policy 11(2):201–210
Braga AA, Weisburd D (2010) Policing problem places: crime hot spots and effective prevention. Oxford University Press on Demand, New York
Braga AA, Weisburd DL (2012) The effects of focused deterrence strategies on crime: a systematic review and meta-analysis of the empirical evidence. J Res Crime Delinq 49(3):323–358
Braga AA, Weisburd DL (2015) Focused deterrence and the prevention of violent gun injuries: practice, theoretical principles, and scientific evidence. Annu Rev Public Health 36:55–68
Brandt PT, Sandler T (2010) What do transnational terrorists target? Has it changed? Are we safer? J Confl Resolut 54(2):214–236
Brown I, Korff D (2009) Terrorism and the proportionality of internet surveillance. Eur J Criminol 6(2):119–134
Brumnik R, Podbregar I, Ivanuša T (2011) The efficiency of biometric systems in fight against terrorism. TRANSCOM 9–14
Choudhury T, Fenwick H (2011) The impact of counter-terrorism measures on Muslim communities. Int Rev Law Comput Technol 25(3):151–181
Clare J, Morgan F (2009) Exploring parallels between situational prevention and non-criminological theories for reducing terrorist risk. Reducing Terrorism Situational Crime Prev 25:207–227
Clarke R, Newman G (2006) Outsmarting the terrorists. Praeger, London
Cohen H, Dudai R (2005) Human rights dilemmas in using informers to combat terrorism: the Israeli-Palestinian case. Terrorism Political Violence 17(1–2):229–243
Cohen A, Shany Y (2007) A development of modest proportions: the application of the principle of proportionality in the targeted killings case. J Int Crim Justice 5(2):310–321
Coolsaet R (2005) Radicalisation and Europe’s counter-terrorism strategy. La haye, royal institute for International Relations (Brussels) and Ghent University, The Transatlantic Dialogue on terrorism CSIS/Clingendael, The Hague
Coppock V, McGovern M (2014) ‘Dangerous minds’? Deconstructing counter-terrorism discourse, radicalisation and the ‘psychological vulnerability’of Muslim children and young people in Britain. Child Soc 28(3):242–256
Cornish DB, Clarke RV (2003) Opportunities, precipitators and criminal decisions: a reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies 16:41–96
Costi A (2012) Complementary approaches? A brief comparison of EU and United States counter terrorism strategies since 2001. Yearbook 18 New Zealand Association of Comparative Law, 167–195. Available at SSRN: https://ssrn.com/abstract=2732882
Crenshaw M (1983) Introduction: reflections on the effects of terrorism. In Crenshaw, M. (Ed.), Terrorism, legitimacy, and power: the consequences of political violence, Middletown, CT: Wesleyan University Press, pp. 1–37
Crenshaw M (2008) The logic of terrorism: terrorist behavior as a product of strategic choice. In: Mahan S, Griset PL (eds) Terrorism in perspective. Sage Publications, Thousand Oaks, pp 24–34
Davies WA (2018) Counterterrorism effectiveness to jihadists in Western Europe and the United States: we are losing the war on terror. Stud Confl Terrorism 41(4):281–296
Doosje B, van den Bos K, Loseman A, Feddes AR, Mann L (2012) “My in-group is superior!”: susceptibility for radical right-wing attitudes and behaviors in Dutch youth. Negot Confl Manag Res 5(3):253–268
Doosje B, Loseman A, Van Den Bos K (2013) Determinants of radicalization of Islamic youth in the Netherlands: personal uncertainty, perceived injustice, and perceived group threat. J Soc Issues 69(3):586–604
Dragu T (2011) Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention. Am Polit Sci Rev 105(1):64–78
Drewer D, Ellermann J (2016) May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Comput Law Secur Rev 32(2):195–204
Dugan L, Lafree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Criminology 43(4):1031–1065
Enders W, Sandler T (1993) The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. Am Polit Sci Rev 87(4):829–844
Enders W, Sandler T (2000) Is transnational terrorism becoming more threatening? A time-series investigation. J Confl Resolut 44(3):307–332
Enders W, Sandler T, Cauley J (1990) Assessing the impact of terrorist-thwarting policies: an intervention time series approach. Def Peace Econ 2(1):1–18
Enders W, Parise GF, Sandler T (1992) A time-series analysis of transnational terrorism: trends and cycles. Def Peace Econ 3(4):305–320
European Parliament Resolution 2025/2011
Faria JR (2003) Terror cycles. Stud Nonlinear Dyn Econ 7(1):1–11
Faria J (2006) Terrorist innovations and anti-terrorist policies. Terrorism Polit Violence 18(1):47–56
Fidler DP (2015) Countering Islamic State exploitation of the internet. Digital and Cyberspace Policy Program, June 2015
Fitzpatrick J (2003) Speaking law to power: the war against terrorism and human rights. Eur J Int Law 14(2):241–264
Freilich CD (2017) Israel’s counter-terrorism policy: how effective? Terrorism and Polit Violence 29(2):359–376
Gill P, Horgan J, Deckert P (2014) Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. J Forensic Sci 59(2):425–435
Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117
Golder B, Williams G (2006) Balancing national security and human rights: assessing the legal response of common law nations to the threat of terrorism. Journal of Comparative Policy Analysis 8(01):43–62
Granger MP, Irion K (2014) The court of justice and the data retention directive in digital rights Ireland: telling off the EU legislator and teaching a lesson in privacy and data protection. European Law Review 39(4):835–850
Hafez M, Mullins C (2015) The radicalization puzzle: a theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict & Terrorism 38(11):958–975
Harcourt BE (2007) Muslim profiles post-9/11: is racial profiling an effective counter-terrorist measure and does it violate the right to be free from discrimination? In: Goold B, Lazarus L (eds) Security and human rights. Hart Publishing, Portland
Hasisi B, Perry S (2017) Rational Choice Rewards and the Jihadist Suicide Bomber. In Joshua D. Freilich and Gary LaFree (ed.) Criminology Theory and Terrorism, Routledge. Milton Park, pp. 63–90
Hasisi B, Weisburd D (2011) Going beyond ascribed identities: the importance of procedural justice in airport security screening in I srael. Law Soc Rev 45(4):867–892
Hasisi B, Weisburd D (2014) Policing terrorism and police–community relations: views of the Arab minority in Israel. Police Pract Res 15(2):158–172
Hasisi B, Weitzer R (2007) Police relations with Arabs and Jews in Israel. The British Journal of Criminology 47(5):728–745
Hasisi B, Alpert GP, Flynn D (2009) The impacts of policing terrorism on society: Lessons from Israel and the US. In To protect and to serve, pp 177–202. Springer, New York
Hasisi B, Margalioth Y, Orgad L (2012) Ethnic profiling in airport screening: lessons from Israel, 1968–2010. Am Law Econ Rev 14(2):517–560
Helmus TC, York E, Chalk P (2013) Promoting online voices for countering violent extremism. Rand Corporation, Santa Monica
Hirschauge O, Shezaf H (2017) How Israel jails Palestinians because they fit the “Terrorist profile”. Retrieved from: https://www.haaretz.com/israel- news/.premium.MAGAZINE-israel-jails-palestinians-who-fit-terrorist-profile-1.5477437
Hoffman B (1993) Terrorist targeting: tactics, trends, and potentialities. Terrorism and Political Violence 5(2):12–29
Hsu HY, Apel R (2015) A situational model of displacement and diffusion following the introduction of airport metal detectors. Terrorism and Political Violence 27(1):29–52
Hsu HY, McDowall D (2017) Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. J Res Crime Delinq 54(6):930–957
Jonathan T, Weisburd D (2010) How do majority communities view the potential costs of policing terrorism? Findings from a community survey in Israel. Policing: A journal of Policy and Practice 4(2):169–181
Jonathan-Zamir T, Hasisi B, Margalioth Y (2016a) Is it the what or the how? The roles of high-policing tactics and procedural justice in predicting perceptions of hostile treatment: the case of security checks at Ben-Gurion Airport, Israel. Law Soc Rev 50(3):608–636
Jonathan-Zamir T, Weisburd D, Hasisi B (2016b) Policing terrorism, crime control, and police-community relations. Springer, New York
Kardaş T, Özdemir ÖB (2018) The making of European foreign fighters: identity, social media and virtual radicalization. In Non-state armed actors in the Middle East. Palgrave Macmillan, Cham, pp 213–235
Kaunert C (2010) Europol and EU counterterrorism: international security actorness in the external dimension. Stud Confl Terrorism 33(7):652–671
Kaunert C, Léonard S (2011) EU counterterrorism and the European neighbourhood policy: an appraisal of the southern dimension. Terrorism Polit Violence 23(2):286–309
Kleinig J (2011) Liberty and security in an era of terrorism. In: Forst B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 357–382
Krueger AB, Malečková J (2003) Education, poverty and terrorism: is there a causal connection? J Econ Perspect 17(4):119–144
LaFree G, Ackerman G (2009) The empirical study of terrorism: social and legal research. Ann Rev Law Soc Sci 5:347–374
LaFree G, Dugan L, Korte R (2009) The impact of British counterterrorist strategies on political violence in Northern Ireland: comparing deterrence and backlash models. Criminology 47(1):17–45
Lakhani S (2012) Preventing violent extremism: perceptions of policy from grassroots and communities. Howard J Crim Just 51(2):190–206
Landes WM (1978) An economic study of US aircraft hijacking, 1961–1976. J Law Econ 21(1):1–31
Loideain NN (2014) Surveillance of communications data and Article 8 of the European Convention on Human Rights. In Reloading data protection. Springer, Dordrecht, pp 183–209
Lum C, Koper C (2011) Is crime prevention relevant to counterterrorism. In: Frost B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 129–150
Lum C, Kennedy LW, Sherley A (2006) The effectiveness of counter-terrorism strategies: a Campbell systematic review, crime and justice coordinating group. The Campbell Collaboration, Washington, DC
Madon NS, Murphy K, Cherney A (2016) Promoting community collaboration in counterterrorism: do social identities and perceptions of legitimacy mediate reactions to procedural justice policing? Br J Criminol 57(5):1144–1164
Masferrer A, Walker C (eds) (2013) Counter-terrorism, human rights and the rule of law: crossing legal boundaries in defence of the state. Edward Elgar Publishing, Cheltenham
Masters D, Hoen P (2012) State legitimacy and terrorism. Democr Secur 8(4):337–357
Michaelsen C (2006) Balancing civil liberties against national security-a critique of counterterrorism rhetoric. UNSWLJ 29:1
Michaelsen C (2008) The proportionality principle in the context of anti-terrorism laws: an inquiry into the boundaries between human rights law and public policy. In Miriam Gani and Penelope Mathew (ed.) Fresh perspectives on the ‘War on Terror', ANU E Press, Canberra ACT, pp. 109–124
Michaelsen C (2010) The proportionality principle, counter-terrorism laws and human rights: a German-Australian comparison. City UHKL Rev 2:19
Midlarsky MI, Crenshaw M, Yoshida F (1980) Why violence spreads: the contagion of international terrorism. Int Stud Q 24(2):262–298
Milaj J, Bonnici JPM (2014) Unwitting subjects of surveillance and the presumption of innocence. Comput Law Secur Rev 30(4):419–428
Munk TB (2017) 100,000 false positives for every real terrorist: why anti-terror algorithms don’t work. First Monday 22(9)
Murphy K, Cherney A, Teston M (2018) Promoting Muslims’ willingness to report terror threats to police: testing competing theories of procedural justice. Justice Q:1–26
Nacos BL (2009) Revisiting the contagion hypothesis: terrorism, news coverage, and copycat attacks. Perspect Terrorism 3(3):3–13
Neumann PR (2013) Options and strategies for countering online radicalization in the United States. Stud Confl Terrorism 36(6):431–459
Nivette A, Eisner M, Ribeaud D (2017) Developmental predictors of violent extremist attitudes: a test of general strain theory. J Res Crime Delinq 54(6):755–790
Office of the High Commission for Human Rights – OHCHR (2008) Human rights, terrorism and counterterrorism, fact sheets, No. 32: terrorism and counter-terrorism
Pape R (2005) Dying to win: the strategic logic of suicide bombing. Random House, New York
Pauwels LJ, Hardyns W (2018) Endorsement for extremism, exposure to extremism via social media and self-reported political/religious aggression. Int J Dev Sci (Preprint), 1–19
Pauwels L, Schils N (2016) Differential online exposure to extremist content and political violence: testing the relative strength of social learning and competing perspectives. Terrorism Polit Violence 28(1):1–29
Pedahzur A, Perliger A (2010) The consequences of counterterrorist policies in Israel. In Martha Crenshaw (ed.), The consequences of counterterrorism, Russell Sage Foundation, New York, pp 335–366
Pedersen W, Vestel V, Bakken A (2018) At risk for radicalization and jihadism? A population-based study of Norwegian adolescents. Coop Confl 53(1):61–83
Perliger A, Pedahzur A (2006) Coping with suicide attacks: lessons from Israel. Public Money Manag 26(5):281–286
Perry G, Hasisi B (2018) Closing the gap: promoting suspect communities’ cooperation with airport security. Terrorism Polit Violence:1–20
Perry S, Jonathan-Zamir T (2014) Lessons from empirical research on policing in Israel: policing terrorism and police–community relationships. Police Pract Res 15(2):173–187
Perry S, Weisburd D, Hasisi B (2016) The ten commandments for effective counterterrorism. In Gary LaFree and Joshua D. Freilich (ed.), The handbook of the criminology of terrorism, John Wiley & Sons, Chichester, pp 482–494
Perry S, Hasisi B, Perry G (2019) Lone terrorists: A study of run-over attacks in Israel. Eur J Criminol 16(1):102–123
Perry S, Apel R, Newman GR, Clarke RV (2017b) The situational prevention of terrorism: an evaluation of the Israeli West Bank barrier. J Quant Criminol 33(4):727–751
Perry S, Hasisi B, Perry G (2018) Who is the lone terrorist? A study of vehicle-borne attackers in Israel and the West Bank. Stud Confl Terrorism 41(11):899–913
Rasmussen MJ, Hafez MM (2010) Terrorist innovations in weapons of mass effect: preconditions, causes, and predictive indicators (No. ASCO-2010-019). Naval Postgraduate School, Monterey
Risse M, Zeckhauser R (2004) Racial profiling. 32 Phil Pub Aff 131:162
Roach K (2011) The 9/11 effect: comparative counter-terrorism. Cambridge University Press, Cambridge, UK
Robinson LA, Hammitt JK, Aldy JE, Krupnick A, Baxter J (2010) Valuing the risk of death from terrorist attacks. J Homel Secur Emerg Manag 7(1):1–25
Santos M (2018) Settler colonial surveillance and the criminalization of social media: contradictory implications for Palestinian resistance. In Lucas Melgaço and Jeffrey Monaghan (eds.) Protests in the information age. Routledge, pp 97–114
Schmid AP (2012) Terrorism prevention as situational crime prevention. International Centre for Counter-Terrorism (ICCT), The Hague
Schmid A (2013) Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review. Terrorism and Counter-Terrorism Studies
Seymour B (2005) Behavior pattern recognition and aviation security. J Secur Educ 1(2–3):69–79
Shefet D (2016) Policy options and regulatory mechanisms for managing radicalization on the Internet. Retrieved from www.en.unesco.org/sites/default/files/rapport_dan_shefet.pdf
Shortland ND (2016) “On the internet, nobody knows you’re a dog”: the online risk assessment of violent extremists. In Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, and Jeffery Chin, Combating violent extremism and radicalization in the digital era. IGI Global, Hershey, PA, pp 349–373
SIBAT (2015) Israel defense directory 2015–2016, The Israel Ministry of Defense (SIBAT), International Defense Cooperation. Retrieved from http://www.sibat.mod.gov.il/Industries/Directory/Documents/Defense%20Directory%202015_16.pdf
Silke A (2003) Becoming a terrorist. Terrorists Vict Soc Psychol Perspect Terrorism Consequences 29:53
Silke A (2010) Terrorists and extremists in prison: psychological issues in management and reform. In Andrew Silke (ed.) The psychology of counter-terrorism. Routledge, pp 137–148
Taylor M (1988) The terrorist. Brassey’s Defence Publishers
The Economist (2017) The stabbing intifada: how Israel spots lone-wolf attackers, The Economist. Retrieved from https://www.economist.com/international/2017/06/08/how-israel-spots-lone-wolf-attackers
Tillyer MS, Kennedy DM (2008) Locating focused deterrence approaches within a situational crime prevention framework. Crime Prev Community Saf 10(2):75–84
Tyler TR, Schulhofer S, Huq AZ (2010) Legitimacy and deterrence effects in counterterrorism policing: a study of Muslim Americans. Law Soc Rev 44(2):365–402
Tyler TR, Fagan J, Geller A (2014) Street stops and police legitimacy: teachable moments in young urban men’s legal socialization. J Empir Leg Stud 11(4):751–785
UNGA (2006) The United Nations global counter-terrorism strategy. Demogr Res 60:288
Vidino L, Brandon J (2012) Europe's experience in countering radicalisation: approaches and challenges. J Polic Intell Counter Terrorism 7(2):163–179
Walker C (2009) Neighbor terrorism and the all-risks policing of terrorism. J Nat’l Sec L Pol’y 3:121
Weimann G (2014) New terrorism and new media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC
Weimann G (2016) Going dark: Terrorism on the dark web. Stud Confl Terrorism 39(3):195–206
Weirman S, Alexander A (2018) Hyperlinked sympathizers: URLs and the Islamic State. Stud Confl Terrorism 1–19
Weisburd D (2016) Does hot spots policing inevitably lead to unfair and abusive police practices, or can we maximize both fairness and effectiveness in the new proactive policing. U Chi Legal F 2016:661
Weisburd D, Amram S (2014) The law of concentrations of crime at place: the case of Tel Aviv-Jaffa. Police Pract Res 15(2):101–114
Weisburd D, Eck JE (2004) What can police do to reduce crime, disorder, and fear? Ann Am Acad Pol Soc Sci 593(1):42–65
Weisburd D, Telep CW (2014) Hot spots policing: what we know and what we need to know. J Contemp Crim Justice 30(2):200–220
Weisburd D, Jonathan T, Perry S (2009a) The Israeli model for policing terrorism: goals, strategies, and open questions. Crim Justice Behav 36(12):1259–1278
Weisburd D, Hasisi B, Jonathan T, Aviv G (2009b) Terrorist threats and police performance: a study of Israeli communities. Br J Criminol 50(4):725–747
White R (1998) Curtailing youth: a critique of coercive crime prevention. Crime Prev Stud 9:117–137
Wilson RA (ed) (2005) Human rights in the ‘War on Terror’. Cambridge University Press, Cambridge, UK
Wojcieszak M (2009) “Carrying online participation offline” – mobilization by radical online groups and politically dissimilar offline ties. J Commun 59(3):564–586
Yang SM, Jen IC (2018) An evaluation of displacement and diffusion effects on eco-terrorist activities after police interventions. J Quant Criminol 34(4):1103–1123
Zedner L (2005) Securing liberty in the face of terror: reflections from criminal justice. J Law Soc 32(4):507–533
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this entry
Cite this entry
Hasisi, B., Perry, S., Wolfowicz, M. (2019). Counter-Terrorism Effectiveness and Human Rights in Israel. In: Shor, E., Hoadley, S. (eds) International Human Rights and Counter-Terrorism. International Human Rights. Springer, Singapore. https://doi.org/10.1007/978-981-10-3894-5_22-1
Download citation
DOI: https://doi.org/10.1007/978-981-10-3894-5_22-1
Received:
Accepted:
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3894-5
Online ISBN: 978-981-10-3894-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences
Publish with us
Chapter history
-
Latest
Counter-Terrorism Effectiveness and Human Rights in Israel- Published:
- 20 July 2019
DOI: https://doi.org/10.1007/978-981-10-3894-5_22-2
-
Original
Counter-Terrorism Effectiveness and Human Rights in Israel- Published:
- 08 May 2019
DOI: https://doi.org/10.1007/978-981-10-3894-5_22-1