Buradasınız

Terrorist profiling as a Counterinsurgency Strategy: Applying the Concept to Law Enforcement

Journal Name:

Publication Year:

Abstract (Original Language): 
The nature of terrorism is fundamentally psychological. Similarly, psychological profiling is widely accepted in detecting crimes in both law enforcement operations and the study of criminology. However, there is a need to transfer its appearance from old traditional criminal environment to the context of counterterrorism. This research argues that most prevalent method of interrogating suspects to achieve distinction between guilty and innocent is to establish a set of psychological attributes and factors. This paper proposes that terrorist’s profiling is value‐added intelligence that may add a new dimension in counterterrorism to identify the individual behind a terrorist act. It is important to constructs a terrorist profile before designing a paradigm that should determine the probability of terroristic trends within the individual as well as certain perceptible qualities with which an observed suspect can be likened to. This article proposes a personality‐guided model of interrogation with different categories to steer clear of oversimplified thinking about individual terrorist or groups. The objective is to adapt the style and content of questioning to obtain a clear overall picture of the suspect’s knowledge with appropriate interviewing and interrogation methods. This profiling will provide thorough understanding of the ideology that drives terrorism and more awareness of the likely means and likely targets used by terrorists. This paper is a shift in direction – focusing rather on the development of evidence‐based methods that could lead to an effective counterinsurgency strategy and the extraction of innocent’s involvement in the terrorism.
274
285

REFERENCES

References: 

[1] P. Norris, K. Montague, and J. Marion, Framing terrorism: The news media, the government and the public,
eds. Routledge, 2013.
[2] R. Borum, Psychology of terrorism, University of South Florida, 2004.
[3] P. Rumney, “Is Coercive Interrogation of Terrorist Suspects Effective‐A Response to Bagaric and Clarke,” USFL Rev. 40
479, 2005.
[4] V. Gerberth, “Psychological Profiling,” Law and Order 29: 46‐49, 1981.
[5] B. Turvey, “Criminal profiling: An introduction to behavioral evidence analysis,” Elsevier, 2011.
[6] N. D. Wilkins, and N. D. Brown, “Historical Overview and Perceptions of Racial and Terrorist Profiling in an Era of
Homeland Security A Research Note,” Criminal Justice Policy Review 20.3: 359‐374, 2009.
[7] B. Edwin, “Jihadi terrorists in Europe, their characteristics and the circumstances in which they joined the jihad: an
exploratory study,” 2006.
[8] G. Cynthia, Anticipating surprise: Analysis for strategic warning, University Press of America, 2004.
[9] K. Gilles, and J. P. Milelli, Al Qaeda in its own words, Harvard University Press, 2008.
[10] C. A. Kurth, “How al‐Qaida ends: The decline and demise of terrorist groups,” International Security 31.1: 7‐48, 2006.
[11] T. Tom, and J. C. Wakslak, “Profiling and Police Legitimacy: Procedural Justice, Attributions of Motive, And Acceptance
Of Police Authority,” Criminology 42.2: 253‐282, 2004.
[12] E. Stephen, “Racial profiling and terrorism,” NYL Sch. L. Rev. 46: 675, 2002.
[13] R. Jonathan, “Will it Ever be Possible to Profile the Terrorist?,” Journal of Terrorism Research 3.2, 2012.
[14] Y. Rachel, “Pathological responses to terrorism,” Neuro psychopharmacology 30.10: 1793‐1805, 2005.
[15] D. G. Pinar, Does terrorism have economic roots?, No. wp2009‐001, Boston University‐Department of Economics, 2009.
[16] L. J. Janczewski, and A. M. Colarik, Cyber warfare and cyber terrorism, eds. IGI Global, 2008.
[17] S. Alex, “Links Between Terrorism and Drug Trafficking: A Case of Narcoterrorism?,” International Summit on
Democracy, Terrorism and Security, January 27, 2005.
[18] J. James, Blood that cries out from the earth: The psychology of religious terrorism, Oxford University Press, 2008.
[19] M. J. Reid, and J. E. McEllistrem, “Bombing and psychopathy: an integrative review,” Journal of forensic sciences 43.3
(1998): 556.
[20] B. J. Arnold, Casebook of a crime psychiatrist, New York: Bernard Geis Associates, 1968.
[21] J. MCdonald, and C. Charles, “Bombers and firesetters,” 1977.
[22] D. P. Elliott, “Patterns in human violence,” American Psychiatric Association Annual Review 6: 465‐490, 1987.
[23] B. L. Smith, and K. D. Morgan, “Terrorists right and left: Empirical issues in profiling American terrorists,” Studies in
Conflict & Terrorism 17.1: 39‐57, 1994.
[24] D. John, “A Criminal Investigative Analysis of Jack The Ripper,” Kindle Edition, 2011.
[25] F. Franco, and F. Bruno, “A Psychiatric Comparative Analysis of Left and Right‐Wing Terrorism In Italy,” Psychiatry,
Springer US, 399‐405, 1985.
[26] S. Lilo, “Biographical Features of Terrorists,” Psychiatry, Springer US, 407‐408, 1985.
[27] O. Tuomas, "Terrorist profiling: human rights concerns,” Critical Studies on Terrorism 3.2: 295‐312, 2010.
[28] R. A. Hudson, and M. Majeska, The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?,
Washington, DC: Library of Congress, 1999.
[29] F. H. Sahito, “Interrogational Neuroimaging: The Missing Element in Counter‐Terrorism,” International Journal of
Innovation and Applied Studies, vol. 3, no. 3, pp. 592–607, 2013.
Farhan Hyder Sahito, Wolfgang Slany, Safdar Zaman, Irfan Hyder Sahito, and Rana Shahzad Qaiser
ISSN : 2028-9324 Vol. 4 No. 2, Oct. 2013 285
[30] F. H. Sahito, W. Slany, “Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with
State Security”, Human Security Perspectives 1 (European Training and Research Centre for Human Rights and
Democracy (ETC), Graz, Austria, 1: 38–66, 2012.
[31] F. H. Sahito, W. Slany, “Advanced Personnel Vetting Techniques in Critical Multi‐Tennant Hosted Computing
Environments,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.5, 2013.
[32] F. H. Sahito, A. Latif, and W. Slany, “Weaving twitter stream into linked data a proof of concept framework,” Emerging
Technologies (ICET), 2011 7th International Conference on. IEEE, 2011.
[33] F. H. Sahito, W. Slany, and S. K. Shahzad, “Search engines: The invader to our privacy—A survey,” Computer Sciences
and Convergence Information Technology (ICCIT), 2011 6th International Conference on. IEEE, 2011.

Thank you for copying data from http://www.arastirmax.com