Skip to main content

Counter-Terrorism Effectiveness and Human Rights in Israel

International Human Rights and Counter-Terrorism

Part of the book series: International Human Rights ((IHR))

  • 598 Accesses

Abstract

In the last two decades, democratic countries have had to contend with a growing and evolving terrorist threat. Many of the counter-terrorism policies that have been introduced during this period have been criticized for having been made hastily and without a solid evidentiary basis. Critics argue that as a result, many policies not only fail to guard human rights but impinge on them, all the while also proving ineffectual. By failing to safeguard human and civil rights and liberties, many see that such policies erode legitimacy and trust through discriminatory and alienating practices and thereby contribute to the radicalization that gives rise to the terrorism which they seek to prevent. Striking a balance between security needs and human rights concerns is certainly an important one. Selecting counter-terrorism strategies that limit human rights impingements may inherently address some of the tests of proportionality. The Israeli case, with its unique set of security challenges, provides an interesting laboratory to examine the relationship between counter-terrorism effectiveness and human rights maintenance. Taking a criminological approach to policing practices, in this chapter we highlight how key Israeli counter-terrorism policies combine situational prevention and focused deterrence approaches to achieve both proportionality and effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  • Argomaniz J (2015) European Union responses to terrorist use of the internet. Coop Confl 50(2):250–268

    Article  Google Scholar 

  • Barak A (2007) Proportional effect: the Israeli experience. Univ Tor Law J 57(2):369–382

    Article  Google Scholar 

  • Barberá P (2014) How social media reduces mass political polarization. Evidence from Germany, Spain, and the US. Job Market Paper, New York University, 46

    Google Scholar 

  • Barnea A (2018) Challenging the “Lone Wolf” phenomenon in an era of information overload. Int J Intell Counterintell 31(2):217–234

    Article  Google Scholar 

  • Bhui K, Silva MJ, Topciu RA, Jones E (2016) Pathways to sympathies for violent protest and terrorism. Br J Psychiatry 209(6):483–490

    Article  Google Scholar 

  • Bitton R (2016) In law we trust: the Israeli case of overseeing intelligence. In: Goldman ZK, Rascof SJ (eds) Global intelligence oversight governing security in the twenty-first century. Oxford University Press, New York, pp 141–174

    Chapter  Google Scholar 

  • Boer MD (2015) Counter-terrorism, security and intelligence in the EU: governance challenges for collection, exchange and analysis. Intell Natl Secur 30(2–3):402–419

    Article  Google Scholar 

  • Braga AA (2012) Getting deterrence right? Evaluation evidence and complementary crime control mechanisms. Criminol Public Policy 11(2):201–210

    Article  Google Scholar 

  • Braga AA, Weisburd D (2010) Policing problem places: crime hot spots and effective prevention. Oxford University Press on Demand, New York

    Book  Google Scholar 

  • Braga AA, Weisburd DL (2012) The effects of focused deterrence strategies on crime: a systematic review and meta-analysis of the empirical evidence. J Res Crime Delinq 49(3):323–358

    Article  Google Scholar 

  • Braga AA, Weisburd DL (2015) Focused deterrence and the prevention of violent gun injuries: practice, theoretical principles, and scientific evidence. Annu Rev Public Health 36:55–68

    Article  Google Scholar 

  • Brandt PT, Sandler T (2010) What do transnational terrorists target? Has it changed? Are we safer? J Confl Resolut 54(2):214–236

    Article  Google Scholar 

  • Brown I, Korff D (2009) Terrorism and the proportionality of internet surveillance. Eur J Criminol 6(2):119–134

    Article  Google Scholar 

  • Brumnik R, Podbregar I, Ivanuša T (2011) The efficiency of biometric systems in fight against terrorism. TRANSCOM 9–14

    Google Scholar 

  • Choudhury T, Fenwick H (2011) The impact of counter-terrorism measures on Muslim communities. Int Rev Law Comput Technol 25(3):151–181

    Article  Google Scholar 

  • Clare J, Morgan F (2009) Exploring parallels between situational prevention and non-criminological theories for reducing terrorist risk. Reducing Terrorism Situational Crime Prev 25:207–227

    Google Scholar 

  • Clarke R, Newman G (2006) Outsmarting the terrorists. Praeger, London

    Google Scholar 

  • Cohen H, Dudai R (2005) Human rights dilemmas in using informers to combat terrorism: the Israeli-Palestinian case. Terrorism Political Violence 17(1–2):229–243

    Article  Google Scholar 

  • Cohen A, Shany Y (2007) A development of modest proportions: the application of the principle of proportionality in the targeted killings case. J Int Crim Justice 5(2):310–321

    Article  Google Scholar 

  • Coolsaet R (2005) Radicalisation and Europe’s counter-terrorism strategy. La haye, royal institute for International Relations (Brussels) and Ghent University, The Transatlantic Dialogue on terrorism CSIS/Clingendael, The Hague

    Google Scholar 

  • Coppock V, McGovern M (2014) ‘Dangerous minds’? Deconstructing counter-terrorism discourse, radicalisation and the ‘psychological vulnerability’of Muslim children and young people in Britain. Child Soc 28(3):242–256

    Article  Google Scholar 

  • Cornish DB, Clarke RV (2003) Opportunities, precipitators and criminal decisions: a reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies 16:41–96

    Google Scholar 

  • Costi A (2012) Complementary approaches? A brief comparison of EU and United States counter terrorism strategies since 2001. Yearbook 18 New Zealand Association of Comparative Law, 167–195. Available at SSRN: https://ssrn.com/abstract=2732882

  • Crenshaw M (1983) Introduction: reflections on the effects of terrorism. In Crenshaw, M. (Ed.), Terrorism, legitimacy, and power: the consequences of political violence, Middletown, CT: Wesleyan University Press, pp. 1–37 

    Google Scholar 

  • Crenshaw M (2008) The logic of terrorism: terrorist behavior as a product of strategic choice. In: Mahan S, Griset PL (eds) Terrorism in perspective. Sage Publications, Thousand Oaks, pp 24–34

    Google Scholar 

  • Davies WA (2018) Counterterrorism effectiveness to jihadists in Western Europe and the United States: we are losing the war on terror. Stud Confl Terrorism 41(4):281–296

    Article  Google Scholar 

  • Doosje B, van den Bos K, Loseman A, Feddes AR, Mann L (2012) “My in-group is superior!”: susceptibility for radical right-wing attitudes and behaviors in Dutch youth. Negot Confl Manag Res 5(3):253–268

    Article  Google Scholar 

  • Doosje B, Loseman A, Van Den Bos K (2013) Determinants of radicalization of Islamic youth in the Netherlands: personal uncertainty, perceived injustice, and perceived group threat. J Soc Issues 69(3):586–604

    Article  Google Scholar 

  • Dragu T (2011) Is there a trade-off between security and liberty? Executive bias, privacy protections, and terrorism prevention. Am Polit Sci Rev 105(1):64–78

    Article  Google Scholar 

  • Drewer D, Ellermann J (2016) May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Comput Law Secur Rev 32(2):195–204

    Article  Google Scholar 

  • Dugan L, Lafree G, Piquero AR (2005) Testing a rational choice model of airline hijackings. Criminology 43(4):1031–1065

    Article  Google Scholar 

  • Enders W, Sandler T (1993) The effectiveness of antiterrorism policies: a vector-autoregression-intervention analysis. Am Polit Sci Rev 87(4):829–844

    Article  Google Scholar 

  • Enders W, Sandler T (2000) Is transnational terrorism becoming more threatening? A time-series investigation. J Confl Resolut 44(3):307–332

    Article  Google Scholar 

  • Enders W, Sandler T, Cauley J (1990) Assessing the impact of terrorist-thwarting policies: an intervention time series approach. Def Peace Econ 2(1):1–18

    Article  Google Scholar 

  • Enders W, Parise GF, Sandler T (1992) A time-series analysis of transnational terrorism: trends and cycles. Def Peace Econ 3(4):305–320

    Article  Google Scholar 

  • European Parliament Resolution 2025/2011

    Google Scholar 

  • Faria JR (2003) Terror cycles. Stud Nonlinear Dyn Econ 7(1):1–11

    Google Scholar 

  • Faria J (2006) Terrorist innovations and anti-terrorist policies. Terrorism Polit Violence 18(1):47–56

    Article  Google Scholar 

  • Fidler DP (2015) Countering Islamic State exploitation of the internet. Digital and Cyberspace Policy Program, June 2015

    Google Scholar 

  • Fitzpatrick J (2003) Speaking law to power: the war against terrorism and human rights. Eur J Int Law 14(2):241–264

    Article  Google Scholar 

  • Freilich CD (2017) Israel’s counter-terrorism policy: how effective? Terrorism and Polit Violence 29(2):359–376

    Article  Google Scholar 

  • Gill P, Horgan J, Deckert P (2014) Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. J Forensic Sci 59(2):425–435

    Article  Google Scholar 

  • Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117

    Article  Google Scholar 

  • Golder B, Williams G (2006) Balancing national security and human rights: assessing the legal response of common law nations to the threat of terrorism. Journal of Comparative Policy Analysis 8(01):43–62

    Article  Google Scholar 

  • Granger MP, Irion K (2014) The court of justice and the data retention directive in digital rights Ireland: telling off the EU legislator and teaching a lesson in privacy and data protection. European Law Review 39(4):835–850

    Google Scholar 

  • Hafez M, Mullins C (2015) The radicalization puzzle: a theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict & Terrorism 38(11):958–975

    Article  Google Scholar 

  • Harcourt BE (2007) Muslim profiles post-9/11: is racial profiling an effective counter-terrorist measure and does it violate the right to be free from discrimination? In: Goold B, Lazarus L (eds) Security and human rights. Hart Publishing, Portland

    Google Scholar 

  • Hasisi B, Perry S (2017) Rational Choice Rewards and the Jihadist Suicide Bomber. In Joshua D. Freilich and Gary LaFree (ed.) Criminology Theory and Terrorism, Routledge. Milton Park, pp. 63–90

    Google Scholar 

  • Hasisi B, Weisburd D (2011) Going beyond ascribed identities: the importance of procedural justice in airport security screening in I srael. Law Soc Rev 45(4):867–892

    Article  Google Scholar 

  • Hasisi B, Weisburd D (2014) Policing terrorism and police–community relations: views of the Arab minority in Israel. Police Pract Res 15(2):158–172

    Article  Google Scholar 

  • Hasisi B, Weitzer R (2007) Police relations with Arabs and Jews in Israel. The British Journal of Criminology 47(5):728–745

    Article  Google Scholar 

  • Hasisi B, Alpert GP, Flynn D (2009) The impacts of policing terrorism on society: Lessons from Israel and the US. In To protect and to serve, pp 177–202. Springer, New York

    Chapter  Google Scholar 

  • Hasisi B, Margalioth Y, Orgad L (2012) Ethnic profiling in airport screening: lessons from Israel, 1968–2010. Am Law Econ Rev 14(2):517–560

    Article  Google Scholar 

  • Helmus TC, York E, Chalk P (2013) Promoting online voices for countering violent extremism. Rand Corporation, Santa Monica

    Google Scholar 

  • Hirschauge O, Shezaf H (2017) How Israel jails Palestinians because they fit the “Terrorist profile”. Retrieved from: https://www.haaretz.com/israel- news/.premium.MAGAZINE-israel-jails-palestinians-who-fit-terrorist-profile-1.5477437

  • Hoffman B (1993) Terrorist targeting: tactics, trends, and potentialities. Terrorism and Political Violence 5(2):12–29

    Article  Google Scholar 

  • Hsu HY, Apel R (2015) A situational model of displacement and diffusion following the introduction of airport metal detectors. Terrorism and Political Violence 27(1):29–52

    Article  Google Scholar 

  • Hsu HY, McDowall D (2017) Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. J Res Crime Delinq 54(6):930–957

    Article  Google Scholar 

  • Jonathan T, Weisburd D (2010) How do majority communities view the potential costs of policing terrorism? Findings from a community survey in Israel. Policing: A journal of Policy and Practice 4(2):169–181

    Article  Google Scholar 

  • Jonathan-Zamir T, Hasisi B, Margalioth Y (2016a) Is it the what or the how? The roles of high-policing tactics and procedural justice in predicting perceptions of hostile treatment: the case of security checks at Ben-Gurion Airport, Israel. Law Soc Rev 50(3):608–636

    Article  Google Scholar 

  • Jonathan-Zamir T, Weisburd D, Hasisi B (2016b) Policing terrorism, crime control, and police-community relations. Springer, New York

    Google Scholar 

  • Kardaş T, Özdemir ÖB (2018) The making of European foreign fighters: identity, social media and virtual radicalization. In Non-state armed actors in the Middle East. Palgrave Macmillan, Cham, pp 213–235

    Google Scholar 

  • Kaunert C (2010) Europol and EU counterterrorism: international security actorness in the external dimension. Stud Confl Terrorism 33(7):652–671

    Article  Google Scholar 

  • Kaunert C, Léonard S (2011) EU counterterrorism and the European neighbourhood policy: an appraisal of the southern dimension. Terrorism Polit Violence 23(2):286–309

    Article  Google Scholar 

  • Kleinig J (2011) Liberty and security in an era of terrorism. In: Forst B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 357–382

    Chapter  Google Scholar 

  • Krueger AB, Malečková J (2003) Education, poverty and terrorism: is there a causal connection? J Econ Perspect 17(4):119–144

    Article  Google Scholar 

  • LaFree G, Ackerman G (2009) The empirical study of terrorism: social and legal research. Ann Rev Law Soc Sci 5:347–374

    Article  Google Scholar 

  • LaFree G, Dugan L, Korte R (2009) The impact of British counterterrorist strategies on political violence in Northern Ireland: comparing deterrence and backlash models. Criminology 47(1):17–45

    Article  Google Scholar 

  • Lakhani S (2012) Preventing violent extremism: perceptions of policy from grassroots and communities. Howard J Crim Just 51(2):190–206

    Article  Google Scholar 

  • Landes WM (1978) An economic study of US aircraft hijacking, 1961–1976. J Law Econ 21(1):1–31

    Article  Google Scholar 

  • Loideain NN (2014) Surveillance of communications data and Article 8 of the European Convention on Human Rights. In Reloading data protection. Springer, Dordrecht, pp 183–209

    Google Scholar 

  • Lum C, Koper C (2011) Is crime prevention relevant to counterterrorism. In: Frost B, Greene JR, Lynch JP (eds) Criminologists on terrorism and homeland security. Cambridge University Press, New York, pp 129–150

    Chapter  Google Scholar 

  • Lum C, Kennedy LW, Sherley A (2006) The effectiveness of counter-terrorism strategies: a Campbell systematic review, crime and justice coordinating group. The Campbell Collaboration, Washington, DC

    Book  Google Scholar 

  • Madon NS, Murphy K, Cherney A (2016) Promoting community collaboration in counterterrorism: do social identities and perceptions of legitimacy mediate reactions to procedural justice policing? Br J Criminol 57(5):1144–1164

    Google Scholar 

  • Masferrer A, Walker C (eds) (2013) Counter-terrorism, human rights and the rule of law: crossing legal boundaries in defence of the state. Edward Elgar Publishing, Cheltenham

    Google Scholar 

  • Masters D, Hoen P (2012) State legitimacy and terrorism. Democr Secur 8(4):337–357

    Article  Google Scholar 

  • Michaelsen C (2006) Balancing civil liberties against national security-a critique of counterterrorism rhetoric. UNSWLJ 29:1

    Google Scholar 

  • Michaelsen C (2008) The proportionality principle in the context of anti-terrorism laws: an inquiry into the boundaries between human rights law and public policy. In Miriam Gani and Penelope Mathew (ed.) Fresh perspectives on the ‘War on Terror', ANU E Press, Canberra ACT, pp. 109–124

    Google Scholar 

  • Michaelsen C (2010) The proportionality principle, counter-terrorism laws and human rights: a German-Australian comparison. City UHKL Rev 2:19

    Google Scholar 

  • Midlarsky MI, Crenshaw M, Yoshida F (1980) Why violence spreads: the contagion of international terrorism. Int Stud Q 24(2):262–298

    Article  Google Scholar 

  • Milaj J, Bonnici JPM (2014) Unwitting subjects of surveillance and the presumption of innocence. Comput Law Secur Rev 30(4):419–428

    Article  Google Scholar 

  • Munk TB (2017) 100,000 false positives for every real terrorist: why anti-terror algorithms don’t work. First Monday 22(9)

    Google Scholar 

  • Murphy K, Cherney A, Teston M (2018) Promoting Muslims’ willingness to report terror threats to police: testing competing theories of procedural justice. Justice Q:1–26

    Google Scholar 

  • Nacos BL (2009) Revisiting the contagion hypothesis: terrorism, news coverage, and copycat attacks. Perspect Terrorism 3(3):3–13

    Google Scholar 

  • Neumann PR (2013) Options and strategies for countering online radicalization in the United States. Stud Confl Terrorism 36(6):431–459

    Article  Google Scholar 

  • Nivette A, Eisner M, Ribeaud D (2017) Developmental predictors of violent extremist attitudes: a test of general strain theory. J Res Crime Delinq 54(6):755–790

    Article  Google Scholar 

  • Office of the High Commission for Human Rights – OHCHR (2008) Human rights, terrorism and counterterrorism, fact sheets, No. 32: terrorism and counter-terrorism

    Google Scholar 

  • Pape R (2005) Dying to win: the strategic logic of suicide bombing. Random House, New York

    Google Scholar 

  • Pauwels LJ, Hardyns W (2018) Endorsement for extremism, exposure to extremism via social media and self-reported political/religious aggression. Int J Dev Sci (Preprint), 1–19

    Google Scholar 

  • Pauwels L, Schils N (2016) Differential online exposure to extremist content and political violence: testing the relative strength of social learning and competing perspectives. Terrorism Polit Violence 28(1):1–29

    Article  Google Scholar 

  • Pedahzur A, Perliger A (2010) The consequences of counterterrorist policies in Israel. In Martha Crenshaw (ed.), The consequences of counterterrorism, Russell Sage Foundation, New York, pp 335–366

    Google Scholar 

  • Pedersen W, Vestel V, Bakken A (2018) At risk for radicalization and jihadism? A population-based study of Norwegian adolescents. Coop Confl 53(1):61–83

    Article  Google Scholar 

  • Perliger A, Pedahzur A (2006) Coping with suicide attacks: lessons from Israel. Public Money Manag 26(5):281–286

    Article  Google Scholar 

  • Perry G, Hasisi B (2018) Closing the gap: promoting suspect communities’ cooperation with airport security. Terrorism Polit Violence:1–20

    Google Scholar 

  • Perry S, Jonathan-Zamir T (2014) Lessons from empirical research on policing in Israel: policing terrorism and police–community relationships. Police Pract Res 15(2):173–187

    Article  Google Scholar 

  • Perry S, Weisburd D, Hasisi B (2016) The ten commandments for effective counterterrorism. In Gary LaFree and Joshua D. Freilich (ed.), The handbook of the criminology of terrorism, John Wiley & Sons, Chichester, pp 482–494

    Google Scholar 

  • Perry S, Hasisi B, Perry G (2019) Lone terrorists: A study of run-over attacks in Israel. Eur J Criminol 16(1):102–123

    Article  Google Scholar 

  • Perry S, Apel R, Newman GR, Clarke RV (2017b) The situational prevention of terrorism: an evaluation of the Israeli West Bank barrier. J Quant Criminol 33(4):727–751

    Article  Google Scholar 

  • Perry S, Hasisi B, Perry G (2018) Who is the lone terrorist? A study of vehicle-borne attackers in Israel and the West Bank. Stud Confl Terrorism 41(11):899–913

    Article  Google Scholar 

  • Rasmussen MJ, Hafez MM (2010) Terrorist innovations in weapons of mass effect: preconditions, causes, and predictive indicators (No. ASCO-2010-019). Naval Postgraduate School, Monterey

    Google Scholar 

  • Risse M, Zeckhauser R (2004) Racial profiling. 32 Phil Pub Aff 131:162

    Google Scholar 

  • Roach K (2011) The 9/11 effect: comparative counter-terrorism. Cambridge University Press, Cambridge, UK

    Book  Google Scholar 

  • Robinson LA, Hammitt JK, Aldy JE, Krupnick A, Baxter J (2010) Valuing the risk of death from terrorist attacks. J Homel Secur Emerg Manag 7(1):1–25

    Google Scholar 

  • Santos M (2018) Settler colonial surveillance and the criminalization of social media: contradictory implications for Palestinian resistance. In Lucas Melgaço and Jeffrey Monaghan (eds.) Protests in the information age. Routledge, pp 97–114

    Google Scholar 

  • Schmid AP (2012) Terrorism prevention as situational crime prevention. International Centre for Counter-Terrorism (ICCT), The Hague

    Google Scholar 

  • Schmid A (2013) Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review. Terrorism and Counter-Terrorism Studies

    Google Scholar 

  • Seymour B (2005) Behavior pattern recognition and aviation security. J Secur Educ 1(2–3):69–79

    Article  Google Scholar 

  • Shefet D (2016) Policy options and regulatory mechanisms for managing radicalization on the Internet. Retrieved from www.en.unesco.org/sites/default/files/rapport_dan_shefet.pdf

  • Shortland ND (2016) “On the internet, nobody knows you’re a dog”: the online risk assessment of violent extremists. In Majeed Khader, Loo Seng Neo,  Gabriel Ong,  Eunice Tan Mingyi, and Jeffery Chin, Combating violent extremism and radicalization in the digital era. IGI Global, Hershey, PA, pp 349–373

    Google Scholar 

  • SIBAT (2015) Israel defense directory 2015–2016, The Israel Ministry of Defense (SIBAT), International Defense Cooperation. Retrieved from http://www.sibat.mod.gov.il/Industries/Directory/Documents/Defense%20Directory%202015_16.pdf

  • Silke A (2003) Becoming a terrorist. Terrorists Vict Soc Psychol Perspect Terrorism Consequences 29:53

    Google Scholar 

  • Silke A (2010) Terrorists and extremists in prison: psychological issues in management and reform. In Andrew Silke (ed.) The psychology of counter-terrorism. Routledge, pp 137–148

    Google Scholar 

  • Taylor M (1988) The terrorist. Brassey’s Defence Publishers

    Google Scholar 

  • The Economist (2017) The stabbing intifada: how Israel spots lone-wolf attackers, The Economist. Retrieved from https://www.economist.com/international/2017/06/08/how-israel-spots-lone-wolf-attackers

  • Tillyer MS, Kennedy DM (2008) Locating focused deterrence approaches within a situational crime prevention framework. Crime Prev Community Saf 10(2):75–84

    Article  Google Scholar 

  • Tyler TR, Schulhofer S, Huq AZ (2010) Legitimacy and deterrence effects in counterterrorism policing: a study of Muslim Americans. Law Soc Rev 44(2):365–402

    Article  Google Scholar 

  • Tyler TR, Fagan J, Geller A (2014) Street stops and police legitimacy: teachable moments in young urban men’s legal socialization. J Empir Leg Stud 11(4):751–785

    Article  Google Scholar 

  • UNGA (2006) The United Nations global counter-terrorism strategy. Demogr Res 60:288

    Google Scholar 

  • Vidino L, Brandon J (2012) Europe's experience in countering radicalisation: approaches and challenges. J Polic Intell Counter Terrorism 7(2):163–179

    Article  Google Scholar 

  • Walker C (2009) Neighbor terrorism and the all-risks policing of terrorism. J Nat’l Sec L Pol’y 3:121

    Google Scholar 

  • Weimann G (2014) New terrorism and new media. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC

    Google Scholar 

  • Weimann G (2016) Going dark: Terrorism on the dark web. Stud Confl Terrorism 39(3):195–206

    Article  Google Scholar 

  • Weirman S, Alexander A (2018) Hyperlinked sympathizers: URLs and the Islamic State. Stud Confl Terrorism 1–19

    Google Scholar 

  • Weisburd D (2016) Does hot spots policing inevitably lead to unfair and abusive police practices, or can we maximize both fairness and effectiveness in the new proactive policing. U Chi Legal F 2016:661

    Google Scholar 

  • Weisburd D, Amram S (2014) The law of concentrations of crime at place: the case of Tel Aviv-Jaffa. Police Pract Res 15(2):101–114

    Article  Google Scholar 

  • Weisburd D, Eck JE (2004) What can police do to reduce crime, disorder, and fear? Ann Am Acad Pol Soc Sci 593(1):42–65

    Article  Google Scholar 

  • Weisburd D, Telep CW (2014) Hot spots policing: what we know and what we need to know. J Contemp Crim Justice 30(2):200–220

    Article  Google Scholar 

  • Weisburd D, Jonathan T, Perry S (2009a) The Israeli model for policing terrorism: goals, strategies, and open questions. Crim Justice Behav 36(12):1259–1278

    Article  Google Scholar 

  • Weisburd D, Hasisi B, Jonathan T, Aviv G (2009b) Terrorist threats and police performance: a study of Israeli communities. Br J Criminol 50(4):725–747

    Article  Google Scholar 

  • White R (1998) Curtailing youth: a critique of coercive crime prevention. Crime Prev Stud 9:117–137

    Google Scholar 

  • Wilson RA (ed) (2005) Human rights in the ‘War on Terror’. Cambridge University Press, Cambridge, UK

    Google Scholar 

  • Wojcieszak M (2009) “Carrying online participation offline” – mobilization by radical online groups and politically dissimilar offline ties. J Commun 59(3):564–586

    Article  Google Scholar 

  • Yang SM, Jen IC (2018) An evaluation of displacement and diffusion effects on eco-terrorist activities after police interventions. J Quant Criminol 34(4):1103–1123

    Article  Google Scholar 

  • Zedner L (2005) Securing liberty in the face of terror: reflections from criminal justice. J Law Soc 32(4):507–533

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Badi Hasisi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Hasisi, B., Perry, S., Wolfowicz, M. (2019). Counter-Terrorism Effectiveness and Human Rights in Israel. In: Shor, E., Hoadley, S. (eds) International Human Rights and Counter-Terrorism. International Human Rights. Springer, Singapore. https://doi.org/10.1007/978-981-10-3894-5_22-1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3894-5_22-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3894-5

  • Online ISBN: 978-981-10-3894-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Counter-Terrorism Effectiveness and Human Rights in Israel
    Published:
    20 July 2019

    DOI: https://doi.org/10.1007/978-981-10-3894-5_22-2

  2. Original

    Counter-Terrorism Effectiveness and Human Rights in Israel
    Published:
    08 May 2019

    DOI: https://doi.org/10.1007/978-981-10-3894-5_22-1