An unholy alliance: Case studies in narco-terrorism

An unholy alliance: Case studies in narco-terrorism

Date: August 2002
Creator: Cakir, Reha
Description: This study is designed both as a case study and a literature-based policy analysis to assist interested parties in gaining a better understanding of controversial “narco-terrorism” phenomenon. The objectives of this study are to show the existing connection between some terrorist organizations and drug trafficking to provide academic information about and explanations for terrorism and drug trafficking, to critically analyze the biases of many current narco-terrorism doctrines and to offer a comprehensive and neutral typology that elucidates all types of narco-terrorism. This thesis is presented in four parts. The first part includes an introduction to narco-terrorism and provides a historical background of drug dilemma and terrorism. A number of definitional and conceptual arguments constituting the backbone of the study are laid out in the second part of the study. Third part consists of case studies of three different insurgent groups. An analysis of the information uncovered and presented in previous chapters and a typology of narco-terrorism are provided in the last part. Thesis is concluded with recommendations in an attempt to inspire useful policies for individuals or institutions operating on the field.
Contributing Partner: UNT Libraries
The Federal Bureau of Investigation and Terrorism Investigations

The Federal Bureau of Investigation and Terrorism Investigations

Date: April 27, 2011
Creator: Bjelopera, Jerome P.
Description: This report provides background information on key elements of the FBI terrorism investigative process based on publicly available information. This report sets forth possible considerations for Congress as it executes its oversight role. These issues include the extent to which intelligence has been integrated into FBI operations to support its counterterrorism mission and the progress the Bureau has made on its intelligence reform initiatives.
Contributing Partner: UNT Libraries Government Documents Department
American Jihadist Terrorism: Combating a Complex Threat

American Jihadist Terrorism: Combating a Complex Threat

Date: November 15, 2011
Creator: Bjelopera, Jerome P.
Description: This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.
Contributing Partner: UNT Libraries Government Documents Department
New Reality Resembles Old: An Examination of the American Public's Social Construction of Reality Following September 11, 2001 Terrorist Attacks

New Reality Resembles Old: An Examination of the American Public's Social Construction of Reality Following September 11, 2001 Terrorist Attacks

Date: May 2004
Creator: Stoutmeyer, Stacie L.
Description: This thesis examines whether the September 11, 2001 terrorist attacks caused a significant, lasting change in the American public's social construction of reality. A framework of everyday reality was created which focused on beliefs, behaviors, and cultural institutions in the United States. Data regarding specific beliefs and behaviors was collected from numerous survey sources, and content analysis was performed on media literature from September 11, 2001 to September 11, 2003. Findings from this study show that beliefs examined did change, while behaviors on similar topics did not. These finding represents an interesting paradox to be evaluated in future studies. Cultural institutions, as related to the public's knowledge of and relationship with each, also appeared little changed. Therefore, while some aspects displayed adjustment, this study cannot conclusively state that American public's social construction of reality experienced a "new reality" paradigm shift as proclaimed by the media immediately following the attacks.
Contributing Partner: UNT Libraries
JAC: A Journal of Composition Theory, Volume 22, Number 1, Winter 2002

JAC: A Journal of Composition Theory, Volume 22, Number 1, Winter 2002

Date: 2002
Creator: Association of Teachers of Advanced Composition (U.S.)
Description: JAC: A Journal of Composition Theory contains a collection of papers regarding writing and rhetoric: "The JAC is a forum for theory, research and pedagogy regarding (1) those writing courses beyond the freshman courses, excluding technical and creative writing, (2) writing in courses which are not themselves writing courses, particularly in the liberal arts and sciences, and (3) work in theory, research or pedagogy which is advanced or progressive and will shed light on the field as a whole while at the same time providing insights for advanced composition" (volume 1, number 1).
Contributing Partner: UNT Libraries
Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism

Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism

Date: 2008
Creator: Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism
Description: The creation of the Commission, which was established by House Resolution 1, implements a key recommendation of the independent, bipartisan 9/11 Commission to address the grave threat that the proliferation of weapons of mass destruction poses to our country. The Commission assessed the nation's current activities, initiatives, and programs aimed at preventing the proliferation of weapons of mass destruction and terrorism and provided key recommendations.
Contributing Partner: UNT Libraries Government Documents Department
The North Texan, Volume 51, Number 4, Winter 2001

The North Texan, Volume 51, Number 4, Winter 2001

Date: Winter 2001
Creator: University of North Texas
Description: The North Texan magazine includes articles and notes about the University of North Texas students, faculty, and alumni activities.
Contributing Partner: University Relations, Communications & Marketing department for UNT
An Analysis of Established Terrorist Identity in Political and Military Wings of Turkish Hizbullah

An Analysis of Established Terrorist Identity in Political and Military Wings of Turkish Hizbullah

Date: August 2008
Creator: Cinoglu, Huseyin
Description: The influence of the role identity expectations of Turkish Hizbullah's leadership on actual members' terrorist identities was documented in this dissertation. This study explored the leadership's identity expectations from members through content analyses of four books written by major figures of Hizbullah. Those books were selected following comments of the literature and expert suggestions. Eleven identity features stood out. These content analyses also revealed that leadership had different expectations from political wing members and military wing members. The following six identity features were listed as expected more from military wing members: belief in jihad and resistance, desire for martyrdom, embracing the hierarchical structure, depersonalization, hatred against enemies of God, and aloneness. Whilst cemaat (religious congregation), being religiously educated, patience (gradualism), dedication to a Muslim brotherhood, and being politically active were listed as expected identity attributes of political wing members. Qualitative analyses investigated these identity features using the available literature and 144 handwritten reports of actual Hizbullah members. To confirm the findings of content and qualitative analyses, quantitative analyses were conducted on the relatively representative sample (144 reports). The results of cross-tabulation and logistic regression demonstrated that two (out of 6) military wing and two (out of 5) political wing identity ...
Contributing Partner: UNT Libraries
Terrorism as a social information entity: A model for early intervention.

Terrorism as a social information entity: A model for early intervention.

Access: Use of this item is restricted to the UNT Community.
Date: August 2005
Creator: Yayla, Ahmet
Description: This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the ...
Contributing Partner: UNT Libraries
Challenges encountered during law enforcement investigations of terrorist use of information technology.

Challenges encountered during law enforcement investigations of terrorist use of information technology.

Access: Use of this item is restricted to the UNT Community.
Date: May 2005
Creator: Morgan, Deanne
Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST