Terrorism As Crime : : From Oklahoma City to Al-Qaeda and Beyond / / Mark S. Hamm.

Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013
VerfasserIn:
Place / Publishing House:New York, NY : : New York University Press, , [2007]
©2007
Year of Publication:2007
Language:English
Series:Alternative Criminology ; 7
Online Access:
Physical Description:1 online resource
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780814790878
ctrlnum (DE-B1597)546969
(OCoLC)191936538
collection bib_alma
record_format marc
spelling Hamm, Mark S., author. aut http://id.loc.gov/vocabulary/relators/aut
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm.
New York, NY : New York University Press, [2007]
©2007
1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Alternative Criminology ; 7
Frontmatter -- Contents -- Acknowledgments -- Introduction: The Criminology of Terrorism -- Part I. Global Crime and Terrorism -- 1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- 2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- Part II. Domestic Crime and Terrorism -- 3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- 4. Charisma, Conflict, and Style: The Order -- Part III. The Current State and Future of the Terrorism-Crime Connection -- 5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- 6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- Notes -- Index -- About the Author
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed.This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)
Criminology.
Radicalism United States.
Radicalism.
Terrorism United States.
Terrorism.
SOCIAL SCIENCE / Criminology. bisacsh
Crime.
acts.
detected.
domestic.
explaining.
exposed.
framework.
future.
international.
might.
offers.
original.
significant.
terrorism.
well.
Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013 9783110706444
print 9780814736951
https://doi.org/10.18574/nyu/9780814790878.001.0001
https://www.degruyter.com/isbn/9780814790878
Cover https://www.degruyter.com/document/cover/isbn/9780814790878/original
language English
format eBook
author Hamm, Mark S.,
Hamm, Mark S.,
spellingShingle Hamm, Mark S.,
Hamm, Mark S.,
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond /
Alternative Criminology ;
Frontmatter --
Contents --
Acknowledgments --
Introduction: The Criminology of Terrorism --
Part I. Global Crime and Terrorism --
1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing --
2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania --
Part II. Domestic Crime and Terrorism --
3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord --
4. Charisma, Conflict, and Style: The Order --
Part III. The Current State and Future of the Terrorism-Crime Connection --
5. The Seduction of Terrorist Mythology: The Aryan Republican Army --
6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat --
Notes --
Index --
About the Author
author_facet Hamm, Mark S.,
Hamm, Mark S.,
author_variant m s h ms msh
m s h ms msh
author_role VerfasserIn
VerfasserIn
author_sort Hamm, Mark S.,
title Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond /
title_sub From Oklahoma City to Al-Qaeda and Beyond /
title_full Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm.
title_fullStr Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm.
title_full_unstemmed Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm.
title_auth Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond /
title_alt Frontmatter --
Contents --
Acknowledgments --
Introduction: The Criminology of Terrorism --
Part I. Global Crime and Terrorism --
1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing --
2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania --
Part II. Domestic Crime and Terrorism --
3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord --
4. Charisma, Conflict, and Style: The Order --
Part III. The Current State and Future of the Terrorism-Crime Connection --
5. The Seduction of Terrorist Mythology: The Aryan Republican Army --
6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat --
Notes --
Index --
About the Author
title_new Terrorism As Crime :
title_sort terrorism as crime : from oklahoma city to al-qaeda and beyond /
series Alternative Criminology ;
series2 Alternative Criminology ;
publisher New York University Press,
publishDate 2007
physical 1 online resource
contents Frontmatter --
Contents --
Acknowledgments --
Introduction: The Criminology of Terrorism --
Part I. Global Crime and Terrorism --
1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing --
2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania --
Part II. Domestic Crime and Terrorism --
3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord --
4. Charisma, Conflict, and Style: The Order --
Part III. The Current State and Future of the Terrorism-Crime Connection --
5. The Seduction of Terrorist Mythology: The Aryan Republican Army --
6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat --
Notes --
Index --
About the Author
isbn 9780814790878
9783110706444
9780814736951
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6431
callnumber-sort HV 46431 H364 42007EB
geographic_facet United States.
url https://doi.org/10.18574/nyu/9780814790878.001.0001
https://www.degruyter.com/isbn/9780814790878
https://www.degruyter.com/document/cover/isbn/9780814790878/original
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 364 - Criminology
dewey-full 364.1
dewey-sort 3364.1
dewey-raw 364.1
dewey-search 364.1
doi_str_mv 10.18574/nyu/9780814790878.001.0001
oclc_num 191936538
work_keys_str_mv AT hammmarks terrorismascrimefromoklahomacitytoalqaedaandbeyond
status_str n
ids_txt_mv (DE-B1597)546969
(OCoLC)191936538
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013
is_hierarchy_title Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond /
container_title Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013
_version_ 1770176513268776960
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04829nam a22009015i 4500</leader><controlfield tag="001">9780814790878</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220629043637.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220629t20072007nyu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814790878</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.18574/nyu/9780814790878.001.0001</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)546969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)191936538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.H364 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">364.1</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hamm, Mark S., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism As Crime :</subfield><subfield code="b">From Oklahoma City to Al-Qaeda and Beyond /</subfield><subfield code="c">Mark S. Hamm.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY : </subfield><subfield code="b">New York University Press, </subfield><subfield code="c">[2007]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Alternative Criminology ;</subfield><subfield code="v">7</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction: The Criminology of Terrorism -- </subfield><subfield code="t">Part I. Global Crime and Terrorism -- </subfield><subfield code="t">1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- </subfield><subfield code="t">2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- </subfield><subfield code="t">Part II. Domestic Crime and Terrorism -- </subfield><subfield code="t">3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- </subfield><subfield code="t">4. Charisma, Conflict, and Style: The Order -- </subfield><subfield code="t">Part III. The Current State and Future of the Terrorism-Crime Connection -- </subfield><subfield code="t">5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- </subfield><subfield code="t">6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Author</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed.This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radicalism</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radicalism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">acts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">detected.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">domestic.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">explaining.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">exposed.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">framework.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">future.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">international.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">might.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offers.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">original.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">significant.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">well.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">New York University Press Backlist eBook-Package 2000-2013</subfield><subfield code="z">9783110706444</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780814736951</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.18574/nyu/9780814790878.001.0001</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780814790878</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780814790878/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070644-4 New York University Press Backlist eBook-Package 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>