1,745
Views
3
CrossRef citations to date
0
Altmetric
Articles

Terrorism, counterterrorism, and the Internet: The American cases

&

References

  • Andreas, P. (2013). Smuggler nation: How illicit trade made America. New York, NY: Oxford University Press.
  • Apuzzo, M., & Goldman, A. (2013). Enemies within: Inside the NYPD's secret spying and Bin Laden's final plot against America. New York, NY: Simon and Schuster.
  • Arkin, W. M. (2006, March 30). What the 9/11 plotter tells us. washingtonpost.com.
  • Benson, D. C. (2014). Why the Internet is not increasing terrorism. Security Studies, 23, 293–328.
  • Bergen, P. (2011, May 6). Five myths about Osama bin Laden. washingtonpost.com.
  • Bergen, P., Sterman, D., Schneider, E., & Cahall, B. (2014, January). Do NSA's bulk surveillance programs stop terrorists? Washington, DC: New America Foundation.
  • British spies help prevent attack. (2009, November 9). Telegraph.
  • Brooks, R. A. (2011). Muslim “homegrown” terrorism in the United States: How serious is the threat? International Security, 36(2), 7–47.
  • Byman, D., & Shapiro, J. (2014, October 9). We shouldn't stop terrorists from tweeting. washingtonpost.com.
  • Carnevale, M. L. (2008, May 28). Tracking use of Bin Laden's satellite phone. Washington Wire, blogs.wsj.com..
  • Chang, A. (2010, May 2). Bloomberg in Times Square: “We're not going to let them win”. WNYC News, wnyc.org..
  • Clarke, R. (2005). Ten years later. Atlantic (January/February), 61–77.
  • Clarke, R. A., & Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it. New York: Ecco.
  • Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the dangers of illicit networks. International Security, 33(2), 7–44.
  • Evans, J. A. (2008). Electronic publication and the narrowing of science and scholarship. Science, 321, 395–399.
  • Fallows, J. (2006). Blind into Baghdad: America's war in Iraq. New York, NY: Vintage.
  • Frieden, T. (2009, September 30). Top U.S. security officials share Afghan–Pakistan border concerns. cnn.com.
  • Greenwald, G., & Fishman, A. (2014, August 12). NPR is jaundering CIA talking points to make you scared of NSA reporting. firstlook.org/theintercept.
  • Graff, G. (2011). The threat matrix: The FBI in the age of terror. New York, NY: Little, Brown.
  • Horgan, J. (2012, September 28). Discussion point: The end of radicalization? College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism.
  • Hsu, S. S., & Wright, R. (2006, July 8). Plot to attack N.Y. foiled: Transit tunnels to N.J. called targets. Washington Post.
  • Ignatius, D. (2015, January 15). The Internet isn't to blame for radicalization. washingtonpost.com.
  • Jenkins, B. M. (2011). Stray dogs and virtual armies: Radicalization and recruitment to jihadist terrorism in the United States since 9/11. Santa Monica, CA: RAND Corporation.
  • Jacobson, G. C. (2006). A divider, not a uniter. New York, NY: Pearson.
  • Johnson, K. (2009, September 8). Weakened al-Qaeda is still a threat. USA Today.
  • Kenney, M. (2010). Beyond the Internet: Mētis, techne, and the limitations of online artifacts for Islamist terrorists. Terrorism and Political Violence, 22(2), 177–197.
  • Klarevas, L. (2011, December 1). The idiot Jihadist next door. foreignpolicy.com.
  • Lustick, I. S. (2006). Trapped in the war on terror. Philadelphia, PA: University of Pennsylvania Press.
  • Mearsheimer, J. J. (2011). Imperial by design. National Interest. (January/February), 16–34.
  • Moreno, I., & Banda, P. S. (2009, September 26). Prosecutor: Terror plot focus was 9/11 anniversary. Associated Press.
  • Mueller, J. (2006). Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them. New York, NY: Free Press.
  • Mueller, John (Ed.). (2015). Terrorism since 9/11: The American cases. Columbus, OH: Mershon Center, Ohio State University. Retrieved from http://www.politicalscience.osu.edu/faculty/jmueller/since.html..
  • Mueller, J., & Stewart, M. G. (2015). Chasing ghosts: The policing of terrorism. New York, NY: Oxford University Press.
  • Mudd, P. (2013). Takedown: Inside the hunt for Al Qaeda. Philadelphia: University of Pennsylvania Press.
  • Patel, F. (2011). Rethinking Radicalization. New York: Brennan Center for Justice at New York University School of Law.
  • Pape, R. A., & Feldman, J. K. (2010). Cutting the fuse: The explosion of global suicide terrorism and how to stop it. Chicago, IL: University of Chicago Press.
  • Pincus, W. (2013, July 29). NSA should be debated on the facts. washingtonpost.com.
  • Priest, D. (2013, July 21). NSA growth fueled by need to target terrorists. Washington Post.
  • Priest, D., & Arkin, W. M. (2011). Top secret America: The rise of the new American security state. New York, NY: Little, Brown.
  • Rashbaum, W. K. (2006, May 10). S.I. man describes shattered life, then a plot to bomb a subway station. New York Times.
  • Risen, J. (2014). Pay any price: Greed, power, and endless war. Boston, MA: Houghton, Mifflin, Harcourt.
  • Sageman, M. (2008). Leaderless Jihad. Philadelphia, PA: University of Pennsylvania Press.
  • Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580.
  • Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and Political Violence, 22(4), 479–494.
  • Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The homegrown threat. New York, NY: New York City Police Department.
  • Smith, B. (2013, June 7). Public documents contradict claim email spying foiled terror plot. buzzfeed.com.
  • Sofan, A. (2013, January 23). Enemies domestic. Wall Street Journal.
  • Stenersen, A. (2008). The Internet: A virtual training camp? Terrorism and Political Violence, 20(2), 215–233.
  • Stenersen, A. (2009). Al-Qaeda's thinking on CBRN: A case study. In M. Ranstorp & M. Normark (Eds.), Unconventional weapons and international terrorism: Challenges and new approaches (pp. 50–64). London: Routledge.
  • Temple-Raston, D. (2009, October 3). Terrorism case shows range of investigators' tools. NPR.
  • Walt, S. (2009, November 30). Why they hate us (II): How many Muslims has the U.S. killed in the past 30 years? foreignpolicy.com.
  • Weimann, G. (2006). Terror on the Internet: The new arena, the new challenges. Washington, DC: United States Institute of Peace.
  • Yoo, J. (2011). Conclusion. In D. Reuter & J. Yoo (Eds.), Confronting terror: 9/11 and the future of American national security (pp. 277–290). New York: Encounter.
  • Ziliak, S. T., & McCloskey, D. N. (2008). The cult of statistical significance: How the standard error costs us jobs, justice, and lives. Ann Arbor, MI: University of Michigan Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.