Terrorism As Crime : : From Oklahoma City to Al-Qaeda and Beyond / / Mark S. Hamm.
Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013 |
---|---|
VerfasserIn: | |
Place / Publishing House: | New York, NY : : New York University Press, , [2007] ©2007 |
Year of Publication: | 2007 |
Language: | English |
Series: | Alternative Criminology ;
7 |
Online Access: | |
Physical Description: | 1 online resource |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780814790878 |
---|---|
ctrlnum |
(DE-B1597)546969 (OCoLC)191936538 |
collection |
bib_alma |
record_format |
marc |
spelling |
Hamm, Mark S., author. aut http://id.loc.gov/vocabulary/relators/aut Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm. New York, NY : New York University Press, [2007] ©2007 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Alternative Criminology ; 7 Frontmatter -- Contents -- Acknowledgments -- Introduction: The Criminology of Terrorism -- Part I. Global Crime and Terrorism -- 1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- 2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- Part II. Domestic Crime and Terrorism -- 3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- 4. Charisma, Conflict, and Style: The Order -- Part III. The Current State and Future of the Terrorism-Crime Connection -- 5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- 6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- Notes -- Index -- About the Author restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed.This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022) Criminology. Radicalism United States. Radicalism. Terrorism United States. Terrorism. SOCIAL SCIENCE / Criminology. bisacsh Crime. acts. detected. domestic. explaining. exposed. framework. future. international. might. offers. original. significant. terrorism. well. Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013 9783110706444 print 9780814736951 https://doi.org/10.18574/nyu/9780814790878.001.0001 https://www.degruyter.com/isbn/9780814790878 Cover https://www.degruyter.com/document/cover/isbn/9780814790878/original |
language |
English |
format |
eBook |
author |
Hamm, Mark S., Hamm, Mark S., |
spellingShingle |
Hamm, Mark S., Hamm, Mark S., Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Alternative Criminology ; Frontmatter -- Contents -- Acknowledgments -- Introduction: The Criminology of Terrorism -- Part I. Global Crime and Terrorism -- 1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- 2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- Part II. Domestic Crime and Terrorism -- 3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- 4. Charisma, Conflict, and Style: The Order -- Part III. The Current State and Future of the Terrorism-Crime Connection -- 5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- 6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- Notes -- Index -- About the Author |
author_facet |
Hamm, Mark S., Hamm, Mark S., |
author_variant |
m s h ms msh m s h ms msh |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Hamm, Mark S., |
title |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / |
title_sub |
From Oklahoma City to Al-Qaeda and Beyond / |
title_full |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm. |
title_fullStr |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm. |
title_full_unstemmed |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / Mark S. Hamm. |
title_auth |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / |
title_alt |
Frontmatter -- Contents -- Acknowledgments -- Introduction: The Criminology of Terrorism -- Part I. Global Crime and Terrorism -- 1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- 2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- Part II. Domestic Crime and Terrorism -- 3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- 4. Charisma, Conflict, and Style: The Order -- Part III. The Current State and Future of the Terrorism-Crime Connection -- 5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- 6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- Notes -- Index -- About the Author |
title_new |
Terrorism As Crime : |
title_sort |
terrorism as crime : from oklahoma city to al-qaeda and beyond / |
series |
Alternative Criminology ; |
series2 |
Alternative Criminology ; |
publisher |
New York University Press, |
publishDate |
2007 |
physical |
1 online resource |
contents |
Frontmatter -- Contents -- Acknowledgments -- Introduction: The Criminology of Terrorism -- Part I. Global Crime and Terrorism -- 1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- 2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- Part II. Domestic Crime and Terrorism -- 3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- 4. Charisma, Conflict, and Style: The Order -- Part III. The Current State and Future of the Terrorism-Crime Connection -- 5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- 6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- Notes -- Index -- About the Author |
isbn |
9780814790878 9783110706444 9780814736951 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6431 |
callnumber-sort |
HV 46431 H364 42007EB |
geographic_facet |
United States. |
url |
https://doi.org/10.18574/nyu/9780814790878.001.0001 https://www.degruyter.com/isbn/9780814790878 https://www.degruyter.com/document/cover/isbn/9780814790878/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
364 - Criminology |
dewey-full |
364.1 |
dewey-sort |
3364.1 |
dewey-raw |
364.1 |
dewey-search |
364.1 |
doi_str_mv |
10.18574/nyu/9780814790878.001.0001 |
oclc_num |
191936538 |
work_keys_str_mv |
AT hammmarks terrorismascrimefromoklahomacitytoalqaedaandbeyond |
status_str |
n |
ids_txt_mv |
(DE-B1597)546969 (OCoLC)191936538 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013 |
is_hierarchy_title |
Terrorism As Crime : From Oklahoma City to Al-Qaeda and Beyond / |
container_title |
Title is part of eBook package: De Gruyter New York University Press Backlist eBook-Package 2000-2013 |
_version_ |
1770176513268776960 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04829nam a22009015i 4500</leader><controlfield tag="001">9780814790878</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220629043637.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220629t20072007nyu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814790878</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.18574/nyu/9780814790878.001.0001</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)546969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)191936538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.H364 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">364.1</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hamm, Mark S., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Terrorism As Crime :</subfield><subfield code="b">From Oklahoma City to Al-Qaeda and Beyond /</subfield><subfield code="c">Mark S. Hamm.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY : </subfield><subfield code="b">New York University Press, </subfield><subfield code="c">[2007]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Alternative Criminology ;</subfield><subfield code="v">7</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction: The Criminology of Terrorism -- </subfield><subfield code="t">Part I. Global Crime and Terrorism -- </subfield><subfield code="t">1. Criminal Stupidity and the Age of Sacred Terrorism: The First World Trade Center Bombing -- </subfield><subfield code="t">2. Vulnerabilities of the Jihad—Prelude to 9/11: The U.S. Embassy Bombings in Kenya and Tanzania -- </subfield><subfield code="t">Part II. Domestic Crime and Terrorism -- </subfield><subfield code="t">3. The Legacy of Lost Causes: The Covenant, the Sword, and the Arm of the Lord -- </subfield><subfield code="t">4. Charisma, Conflict, and Style: The Order -- </subfield><subfield code="t">Part III. The Current State and Future of the Terrorism-Crime Connection -- </subfield><subfield code="t">5. The Seduction of Terrorist Mythology: The Aryan Republican Army -- </subfield><subfield code="t">6. Al-Qaeda, the Radical Right, and Beyond: The Current Terrorist Threat -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Author</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Car bombing, suicide bombing, abduction, smuggling, homicide, and hijacking are all profoundly criminal acts. In Terrorism as Crime Mark S. Hamm presents an understanding of terrorism from a criminological point of view, arguing that the most successful way to understand, detect, prosecute and deter these acts is to use conventional criminal investigation methods. Whether in Oklahoma City or London, Terrorism as Crime demonstrates that criminal activity is the lifeblood of terrorist groups and that there are simple common denominators at work that can remove the mystery surrounding many of these terrorist groups. Once understood the vulnerabilities of these organizations can be exposed.This important volume focuses in on six case studies of crimes committed by jihad and domestic right wing groups, including biographies of more than two dozen terrorists along with descriptions of their organizations, strategies, and terrorist plots. Terrorism as Crime offers an original and significant framework for explaining international and domestic terrorism, as well as how future acts might be detected or exposed.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radicalism</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Radicalism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">acts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">detected.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">domestic.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">explaining.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">exposed.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">framework.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">future.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">international.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">might.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offers.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">original.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">significant.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">well.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">New York University Press Backlist eBook-Package 2000-2013</subfield><subfield code="z">9783110706444</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780814736951</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.18574/nyu/9780814790878.001.0001</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780814790878</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780814790878/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070644-4 New York University Press Backlist eBook-Package 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |