Roots of Counterterrorism: Contemporary Wisdom from Dutch Intelligence
Roots of Counterterrorism: Contemporary Wisdom from Dutch Intelligence
Cite
Abstract
It seems beyond doubt, since 9/11, that the main responsibility of intelligence and security services is to prevent ticking bombs from going off. The thing is, though, that the West has been confronted with international terrorism and domestic political violence throughout the 1970s as well. And although intelligence organizations countered terrorism, prevention did not become the name of the game. In a case study of the Netherlands, this book explores—based on unique primary sources and from a novel conceptual approach—how the threat of terrorism was looked upon and what kind of intelligence activities were carried out to contain or counter it. The book puts into focus how the rise of terrorism in the 1970s challenged the existing perceived core functions about intelligence. Based on the work of social geographer Ben Anderson, who investigates how interventions in the present are legitimated in the name of imagined (catastrophic) futures, it is analyzed how the Dutch domestic security service Binnenlandse Veiligheidsdienst (BVD) scrutinized traces of terrorism between 1968 and 1978. It confronts these insights with the post-9/11 counterterrorism efforts. By doing so, the book paints a fascinating picture of core functions of intelligence more generally.
-
Front Matter
-
Introduction
-
1
Historiography
-
2
Counterterrorism Intelligence: A New Conceptual Approach
- Vignette I Traces of Spanish Anarchists
-
3
The Language of Violence, 1968–1970
- Vignette II Traces of the Bombing of the Russian Trade Delegation (April 1971)
-
4
No Ordinary Crimes, 1971–1972
- Vignette III Traces of the Rode Jeugd, Rode Hulp, and Rood Verzetsfront
-
5
Munich and Two Years of Talking About Terrorism, 1972–1973
- Vignette IV Traces of the Rote Armee Fraktion
-
6
A Fragmentary Terrorist Net Spread over Europe, 1974–1975
-
Vignette V
Traces from BVD Agents Among South Moluccans
-
7
The Terrorist Future in the Present: South Moluccan Attacks, 1975–1978
-
8
Toward the Paradigm of Prevention, 1978–Present
-
Conclusion: Traces of Terrorism: A Concluding Analysis
-
End Matter
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 1 |
October 2024 | 2 |
October 2024 | 4 |
October 2024 | 3 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 2 |
October 2024 | 5 |
October 2024 | 3 |
October 2024 | 2 |
October 2024 | 2 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 1 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 5 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 3 |
November 2024 | 5 |
November 2024 | 4 |
November 2024 | 4 |
December 2024 | 1 |
January 2025 | 2 |
January 2025 | 1 |
January 2025 | 1 |
January 2025 | 2 |
February 2025 | 1 |
February 2025 | 3 |
March 2025 | 2 |
March 2025 | 2 |
March 2025 | 3 |
April 2025 | 5 |
April 2025 | 2 |
April 2025 | 3 |
April 2025 | 2 |
April 2025 | 4 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 3 |
April 2025 | 2 |
April 2025 | 1 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 3 |
April 2025 | 2 |
April 2025 | 2 |
April 2025 | 2 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.