Abstract
Counterterrorism programs worldwide have existed for decades and have evolved and adapted to most of the current-day threats and pressures that exist within the global threat community. The threats are very active and are consistently testing and, in some cases, gaining success across the globe. Al Qaeda, ISIS/Daesh, Abu Sayyaf Group, and Boko Haram are just a few of the terror groups that are still active, current, and on the march daily throughout the world. With such a present and oftentimes unclear danger, counterterrorism programs are designed to prevent, minimize, and disrupt terror activities and events as best as they possibly can. Although rooted within deterrence and prevention, counterterrorism operations extend far past prevention alone. This chapter introduces counterterrorism by examining counterterrorism operations within the United States from the perspective of the Federal Emergency Management Agency’s (FEMA) five core capabilities by mission areas of Prevention, Protection, Mitigation, Response, and Recovery.
Similar content being viewed by others
References
Andrew S (2018) Routledge Handbook of Terrorism And Counterterrorism (1st ed.). Routledge. https://doi.org/10.4324/9781315744636
Aronson E (1992) The return of the repressed: dissonance theory makes a comeback. Psychol Inq 3(4):303–311
Avraham E (2021) From 9/11 through Katrina to Covid-19: crisis recovery campaigns for American destinations. Curr Issue Tour 24(20):2875–2889. https://doi.org/10.1080/13683500.2020.1849052
Birkland TA (2009) Disasters, lessons learned, and fantasy documents. J Conting Crisis Manag 17(3):146–156. https://doi-org.library.capella.edu/10.1111/j.1468-5973.2009.00575.x
Bloom PB-N, Kimhi S, Fachter S, Shamai M, Canetti D (2020) Coping with Moral Threat: Moral Judgment amid War on Terror. J Confl Resolut 64(2–3):231–260. https://doi.org/10.1177/0022002719854209
Brady KR (2015) Secure management of American borders in the modern era: developing an evolving strategy. https://www.academia.edu/11928471/. Search in Google Scholar
Bush G (2008) Homeland security presidential directive 7: critical infrastructure identification, prioritization and protection, Washington, DC. www.dhs.gov/xabout/laws/gc_1214597989952.shtmS
Clarke CP (2018) Terrorism: the essential reference guide, edited by Colin P. Clarke, ABC-CLIO, LLC, 2018. ProQuest Ebook Central,
Connah L (2021) US intervention in Afghanistan: justifying the unjustifiable? South Asia Res 41(1):70–86. https://doi.org/10.1177/0262728020964609
Cyber Security & Infrastructure Security Agency (2021) National Infrastructure Protection Plan. https://www.cisa.gov/national-infrastructure-protection-plan
DHS (2015) National preparedness goal. [online] Fema.gov. Available at: <https://www.fema.gov/media-library-data/1443799615171-2aae90be55041740f97e8532fc680d40/National_Preparedness_Goal_2nd_Edition.pdf> (Accessed 24 Feb 2018)
DHS (2019) Strategic framework for countering terrorism and targeted violence. Retrieved from: https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf
Ejeta LT, Ardalan A, Paton D (2015) Application of behavioral theories to disaster and emergency health preparedness: a systematic review. PLoS Currents, 7, ecurrents.dis.31a8995ced321301466db400f1357829. https://doi.org/10.1371/currents.dis.31a8995ced321301466db400f1357829
Enders W, Sandler T (2012) The political economy of terrorism. Cambridge University Press, Cambridge
Farazmand A, Skillsoft Books. (2017). Crisis and emergency management: Theory and practice (Second;2; ed.). Boca Raton, FL: CRC Press. https://doi.org/10.4324/9781315095264
Gaibulloev K, Sandler T (2019) What we have learned about terrorism since 9/11. J Econ Lit 57(2):275–328
Givens A, Busch N (2013) Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. International Journal of Critical Infrastructure Protection. Iss 6. Pg. 39–50. https://doi.org/10.1016/j.ijcip.2013.02.002
Gotham KF, Cheek W (2017) Post-disaster recovery and rebuilding. The SAGE Handbook of the 21st Century City, London, pp 279–297
Hamm MS, Spaaij RFJ (2017) The age of lone wolf terrorism. Columbia University Press. https://doi.org/10.7312/hamm18174
Hemme K (2015) Critical infrastructure protection: maintenance is national security. J Strateg Secur 8(3):25–39
Jacobson M (2006) The West at War: U.S. and European counterterrorism efforts, Post-September 11. The Washington Institute for Near East Policy
Kean T, Hamilton L (2004) The 9/11 commission report: final report of the national commission on terrorist attacks upon the United States, vol 3. Government Printing Office
Lei Y (2012) Assessment of damage risks to residential buildings and cost-benefit of mitigation strategies considering hurricane and earthquake hazards. J Perform Constr Facil 26(1):7–16. https://doi.org/10.1061/(ASCE)CF.1943-5509.0000204
McEntire DA (2019) Introduction to homeland security: understanding terrorism prevention and emergency management 2 Wiley.
McEntire D (2005) The status of emergency management theory: issues, barriers, and recommendations for improved scholarship. J Emerg Manag 3. https://doi.org/10.5055/jem.2005.0031
Nacos BL (2019) Terrorism and counterterrorism, 6th edn. Routledge. https://doi.org/10.4324/9780429455100
National Commission On Terrorist Attacks Upon The United States (2004) The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States. [Washington, DC: National Commission on Terrorist Attacks upon the United States: For sale by the Supt. of Docs., U.S. G.P.O] [Web.] Retrieved from the Library of Congress, https://lccn.loc.gov/2004356401.
Phillips B (2015) What is a terrorist group? conceptual issues and empirical implications. Terrorism Polit Violence 27(2):225–242
Sandler T (2014) The analytical study of terrorism: taking stock. J Peace Res 51(2):257–271. Sage pub. https://doi.org/10.1177/0022343313491277
Sandler T (2015) Terrorism and counterterrorism: an overview. Oxf Econ Pap 67(1):–20. https://doi.org/10.1093/oep/gpu039
Schmid AP (2020) Terrorism prevention: conceptual issues (definitions, typologies and theories). International Centre for Counter-Terrorism (ICCT)
Schuurman B (2019) Topics in terrorism research: reviewing trends and gaps, 2007–2016. Criti Stud Terrorism 12(3):463–480. https://doi.org/10.1080/17539153.2019.1579777
Schuurman B et al (2017) Lone actor terrorist attack planning and preparation: a data-driven analysis. J Forensic Sci. https://doi.org/10.1111/1556-4029.13676
Silke, A. (2018). Routledge handbook of terrorism and counterterrorism (1). Routledge. https://doi.org/10.4324/9781315744636
UN General Assembly, “The United Nations Global Counter-Terrorism Strategy”, Doc. A/RES/60/288, 2006. http://www.un.org/en/terrorism/strategy-counterterrorism.shtml
U.S. Department of Homeland Security (2009) National Infrastructure Advisory Council, Critical Infrastructure Resilience: Final Report and Recommendations, Washington, DC. https://www.dhs.gov/xlibrary/assets/niac/niac_critical_infrastructure_resilience.pdfS. pp.1–54
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this entry
Cite this entry
Luko, T.M. (2022). Counterterrorism. In: Masys, A.J. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-51761-2_52-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-51761-2_52-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51761-2
Online ISBN: 978-3-319-51761-2
eBook Packages: Springer Reference Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics