Book Search:  

 

 
Google full text of our books:

The Terrorist's Dilemma:
Managing Violent Covert Organizations
Jacob N. Shapiro

Book Description | Endorsements
Chapter 1 [in PDF format]

TABLE OF CONTENTS:

Acknowledgments vii
1 Introduction 1
1.1 The Challenge of Organizing Terror 3
1.2 The Terrorist's Dilemma 4
1.3 Why Understanding Hierarchy and Control Matters 10
1.4 What About 9/11? 13
1.5 Are Terrorist Organizations Really So Familiar? 15
1.6 Can We Treat Terrorist Organizations as Rational? 18
1.7 Plan of the Book 22
2 The Terrorist's Dilemma 26
2.1 Introduction 26
2.2 Why Preference Divergence? 34
2.3 How Groups Respond to Preference Divergence 49
2.4 The Difficult Challenge of Balancing Security with Efficiency and Control 56
2.5 Conclusion 61
3 The Insider's View on Terrorist Organizations 63
3.1 Organizing Terror 63
3.2 Data 65
3.3 Quantitative Analysis 68
3.4 Content Analysis: Some Good Stories 70
3.5 Conclusion 81
4 Organizing Al-Qa'ida in Iraq's Operations and Finances 82
4.1 Introduction 82
4.2 A Brief History of al-Qa'ida in Iraq 85
4.3 Managing AQI 89
4.4 Conclusion 98
5 The Tradeoffs 101
5.1 Introduction 101
5.2 Managing Terrorist Funds: The Security-Efficiency Tradeoff 103
5.3 Managing Terrorist Violence: The Security-Control Tradeoff 114
5.4 Discussion 127
6 Uncertainty and Control in Russia 131
6.1 Introduction 131
6.2 A Brief History of Pre-Revolutionary RussianTerrorism 132
6.3 A History of Pre-Revolutionary Terrorism 137
6.4 Uncertainty and Patterns of Control 151
6.5 Other Aspects of Russian Terrorism 160
6.6 Conclusion 167
7 Discrimination and Control in Ireland 169
7.1 Introduction 169
7.2 Discrimination and Patterns of Violence 171
7.3 Measuring Control 175
7.4 The Provisional IRA 176
7.5 The Loyalist Paramilitaries 191
7.6 Conclusion 202
8 Preference Divergence and Control in Palestine 205
8.1 Introduction 205
8.2 Fatah: The Challenges of Integration 209
8.3 Hamas 226
8.4 Control in Fatah and Hamas 239
8.5 Conclusion 247
9 Conclusion and Recommendations 249
9.1 Summary of the Argument 249
9.2 Exploiting Organizational Vulnerabilities 254
9.3 Conclusion 270
Appendix A Annotated Bibliography of Terrorist Autobiographies 272
A.1 Introduction 272
A.2 Terrorist Autobiographies 273
Appendix B Methodological Appendix 303
B.1 Case Selection 303
B.2 Sources 305
Bibliography 307
Index 323

Return to Book Description

File created: 10/23/2013

Questions and comments to: webmaster@press.princeton.edu
Princeton University Press

New Book E-mails
New In Print
PUP Blog
Videos/Audios
Princeton APPS
Sample Chapters
Subjects
Series
Catalogs
Textbooks
For Reviewers
Class Use
Rights
Permissions
Ordering
Recent Awards
Princeton Shorts
Freshman Reading
PUP Europe
About Us
Contact Us
Links
F.A.Q.
PUP Home


Bookmark and Share