
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities.
It explores two main themes arising from the phenomenon of terrorist profiling: the lawfulness of terrorist profiling and the utility of profiling. These two themes are explored in three separate parts. Firstly, the book begins by drawing upon human rights concerns arising from the use of terrorist profiling by law enforcement officers. Secondly, an analytical framework capable of making determinations on the usefulness of terrorist profiling. This framework develops a profiling spectrum that ranges from formal and informal manifestations of terrorist profiling that forms the basis for evaluating its usefulness. Finally, the book presents an examination of various manifestations of terrorist profiling by separating the analysis of the 'construction' of profiles on the one hand, from their 'application, ' on the other, so as to be able to identify and examine profiling's usefulness as a technique to assist law enforcement officers make predictions about likely offender characteristics.
This book ultimately concludes that terrorist profiling should only be conducted by undertaking a systematic assessment of the construction of profiles separate from the application of profiles whilst simultaneously taking into account fundamental human rights concerns with the practice of terrorist profiling.
The work will be an essential resource for academics, law enforcement officers and lawyers in the disciplines of law, criminology, human rights, criminal justice and policing. As the book engages with terrorist profiling, it will also be of interest to those engaged in the psychology of terrorism.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1Introduction
1.1Introduction
1.2Terrorism and profiling a definitional problem
criminal acts intended or calculated to provoke a state of terror in a general public, a group of persons or particular persons for political purposes are in any circumstances unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them.13
[a]ny other act intended to cause death or serious bodily injury to a civilian, or to any other person not taking an active part in the hostilities in a situation of armed conflict, when the purpose of such act, by its nature or context, is to intimidate a population, or to compel a government or an international organization to do or to abstain from doing any act.14
- 1In this Act âterrorismâ means the use or threat of action whereâ
- athe action falls within subsection (2),
- bthe use or threat is designed to influence the government [or an international governmental organisation] or to intimidate the public or a section of the public, and
- bthe use or threat is made for the purpose of advancing a political, religious [racial] or ideological cause.
- 2Action falls within this subsection if itâ
- ainvolves serious violence against a person,
- binvolves serious damage to property,
- cendangers a personâs life, other than that of the person committing the action,
- dcreates a serious risk to the health or safety of the public or a section of the public, or
- eis designed seriously to interfere with or seriously to disrupt an electronic system.
- 3The use or threat of action falling within subsection (2) which involves the use of firearms or explosives is terrorism whether or not subsection (1)(b) is satisfied.15.
âŚan anxiety-inspiring method of repeated violent action, employed by a (semi-) clandestine individual, group or state actors, for idiosyncratic, criminal or political reasons, whereby â in contrast to assassination â the direct targets of violence are not the main targets.16
1.3Central analytical aim
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Table of Cases
- Table of Statutes
- Figures and Tables
- Acknowledgements
- Preface
- 1 Introduction
- 2 The compatibility of terrorist profiling with fundamental rights
- 3 Criminal profiling and its applicability to terrorist profiling
- 4 Formal terrorist profiling: The construction and application of terrorist profiles
- 5 Behavioural profiling: The construction and application of behavioural profiles in the context of terrorism
- 6 An examination of manifestations of informal terrorist profiling
- 7 Conclusion
- Bibliography
- Index