10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INTRODUCTION • lxxvfor their own ends. Examples <strong>of</strong> this can be found in the penetration <strong>of</strong>the Salvadoran transitional government’s military and security forces inthe early 1980s by privately run death squads, or EOKA-Beta’s penetration<strong>of</strong> the Cypriot national guard and judiciary prior to the coup d’étatagainst Archbishop Makarios in 1974. The al Qa’eda group <strong>of</strong> Osamabin Laden to some degree co-opted the Taliban regime in Afghanistan,operating to some degree as a state within a state.Although these cases seem anomalous, the anarchistic leftists aresimply a variation <strong>of</strong> the revolutionary actor while the state co-optersare entrepreneurial or revolutionary actors that exploit opportunities tousurp control over a weakened state for achieving limited ends. Havingestablished a classification scheme broad enough to encompass eventhese subspecies, the reader can proceed to study who and what the variousterrorist groups are and the goals each group is seeking.NOTES1. H. H. A. Cooper, Evaluating the Terrorist Threat: Principles and AppliedRisk Assessment, Clandestine Tactics and Technology Series (Gaithersburg,Md.: International Association <strong>of</strong> Chiefs <strong>of</strong> Police, 1974), 4.2. Thomas P. Thornton, “Terror as a Weapon <strong>of</strong> Political Agitation,” inInternal War, ed. Harry Eckstein (New York: Free Press, 1964), 71–91.3. Michael T. McEwen, “Psychological Weapons against <strong>Terrorism</strong>: TheUnused Weapon,” Military Review 66, no. 1 (January 1986): 62.4. National Advisory Committee on Criminal Justice Standards and Goals,Report <strong>of</strong> the Task Force on Disorders and <strong>Terrorism</strong> (Washington, D.C.: U.S.Government Printing Office, 1976), 3.5. Taken from the title <strong>of</strong> Frederick J. Hacker’s Crusaders, Criminals orCrazies: Terror and <strong>Terrorism</strong> in Our Time (New York: Bantam, 1978).6. Grant Wardlaw, Political <strong>Terrorism</strong>: Theory, Tactics, and Counter-Measures (Cambridge: Cambridge University Press, 1982), 16.7. Thornton, “Terror as a Weapon,” 72.8. Richard Schultz, “Conceptualizing Political <strong>Terrorism</strong>: A Typology,” inInternational <strong>Terrorism</strong>: Current Research and Directions, ed. Alan D. Buckleyand Daniel D. Olson (Wayne, N.J.: Avery Publishing Group, 1980), 9–15.9. Stephen Sloan, The Anatomy <strong>of</strong> Non-Territorial <strong>Terrorism</strong>: An AnalyticalEssay, Clandestine Tactics and Technology Series (Gaithersburg, Md.:International Association <strong>of</strong> Chiefs <strong>of</strong> Police, 1978), 3.10. Brian Jenkins, International <strong>Terrorism</strong>: A New Mode <strong>of</strong> Conflict (LosAngeles: Crescent Publications, 1974).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!