WorldCat Identities

Jenkins, Brian Michael

Works: 136 works in 623 publications in 1 language and 21,545 library holdings
Genres: Chronologies  Conference papers and proceedings  History  Case studies 
Roles: Author, Editor
Classifications: DS557.7, 363.3255
Publication Timeline
Most widely held works by Brian Michael Jenkins
Unconquerable nation : knowing our enemy, strengthening ourselves by Brian Michael Jenkins( )

15 editions published between 2002 and 2006 in English and held by 2,479 WorldCat member libraries worldwide

The author presents a clear-sighted and sobering analysis of where we are today in the struggle against terrorism. Jenkins, an internationally renowned authority on terrorism, distills the jihadistsÂ" operational code and outlines a pragmatic but principled approach to defeating the terrorist enterprise. We need to build upon our traditions of determination and self-reliance, he argues, and above all, preserve our commitment to American values
Countering al Qaeda : an appreciation of the situation and suggestions for strategy by Brian Michael Jenkins( )

18 editions published in 2002 in English and held by 2,401 WorldCat member libraries worldwide

This monograph reviews events since the terrorist attacks of September 11, 2001, and discusses the current state of al Qaeda and the kinds of actions that can be expected of it in the future. Al Qaeda constitutes the most serious immediate threat to the security of the United States, so the campaign against terrorism must remain focused. The monograph describes the central elements that must be emphasized in the next, more-complex phase of that campaign
Would-be warriors : incidents of jihadist terrorist radicalization in the United States since September 11, 2001 by Brian Michael Jenkins( )

10 editions published in 2010 in English and held by 2,042 WorldCat member libraries worldwide

Between September 11, 2001, and the end of 2009, 46 publicly reported cases of domestic radicalization and recruitment to jihadist terrorism occurred in the United States; 13 of those cases occurred in 2009. Most of the would-be jihadists were individuals who recruited themselves into the terrorist role. Some provided assistance to foreign terrorist organizations; some went abroad to join various jihad fronts; some plotted terrorist attacks in the United Sates, usually with little success because of intervention by the authorities. The threat of large-scale terrorist violence has pushed law enforcement toward prevention rather than criminal apprehension after an event -- or, as one senior police official put it, "staying to the left of the boom," which means stopping the explosions or attacks before they occur. This shift toward prevention requires both collecting domestic intelligence -- always a delicate mission in a democracy -- and maintaining community trust and cooperation
The long shadow of 9/11 : America's response to terrorism( )

3 editions published in 2011 in English and held by 1,932 WorldCat member libraries worldwide

The essays in this book assess the military, political, fiscal, social, cultural, psychological, and even moral implications of U.S. policymaking since 9/11
Aviation security : after four decades, it's time for a fundamental review by Brian Michael Jenkins( )

10 editions published between 2011 and 2013 in English and held by 1,394 WorldCat member libraries worldwide

"Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfortthat we are pretty close to getting it right."--"Overview", p. [1]
Al Qaeda in its third decade : irreversible decline or imminent victory? by Brian Michael Jenkins( )

9 editions published in 2012 in English and held by 1,373 WorldCat member libraries worldwide

During 2011, the author was asked to testify about the status of al Qaeda before Congress on several occasions and to brief members of Congress, NATO ambassadors and planners, federal judges, and senior intelligence and law enforcement officials. This paper summarizes those briefings. It focuses on the recurring questions of whether America has won the operational battle but lost the ideological contest; whether homegrown terrorism is a growing threat; whether maintaining American troops in Afghanistan is essential; whether the United States should declare on its own an end to the war on al Qaeda
Stray dogs and virtual armies : radicalization and recruitment to jihadist terrorism in the United States since 9/11 by Brian Michael Jenkins( )

8 editions published in 2011 in English and held by 1,286 WorldCat member libraries worldwide

Since September 11, 2001, so-called "homegrown terrorists," working alone or with others, have planned and in some cases implemented terrorist activities, contributed financial or other material support to others' terrorist activities, or become radicalized in the United States and then traveled to other countries to conduct terrorist activities directed against those countries or against the United States. This paper examines the cases of homegrown terrorism from 9/11 through 2010, highlights lessons learned from those cases that suggest actions for the future, and includes a chronology of numbers and case descriptions of terrorist events in the United States during that period. Most of the individuals involved are Muslim, but the numbers are small. A total of 176 Americans have been indicted, arrested, or otherwise identified as jihadist terrorists or supporters since 9/11. They were involved in 82 cases, a majority of which involve the actions of a single individual. Al Qaeda has increasingly used the Internet to build an army of followers. Many of the terrorists identified in this study began their journey online. However, al Qaeda has not yet managed to inspire its online followers to action. Few of the 32 locally hatched jihadist plots to carry out terrorist attacks in the United States since 9/11 got much beyond the discussion stage. Nevertheless, al Qaeda remains a threat. More terrorist attempts will occur. Traditional law enforcement, in which authorities attempt to identify and apprehend a perpetrator after a crime has been committed, is inadequate to deal with terrorists who are determined to cause many deaths and great destruction and who may not care whether they themselves survive. Public safety demands a preventive approach -- intervention before an attack occurs. In addition to law enforcement, intelligence collection, and community policing, public reaction is an essential component of such preventive defense
The fall of South Vietnam : statements by Vietnamese military and civilian leaders by Stephen T Hosmer( Book )

17 editions published between 1961 and 1980 in English and held by 747 WorldCat member libraries worldwide

The Fall of South Vietnam is a unique military history. It contains a wealth of original material gathered from former military and civilian officials. It is a fascinating picture of failure drawn by the participants themselves. The first part of the book is devoted to the setting before the 1975 enemy offensive, and includes discussion of the Paris Agreements of 1973. The second part deals with the course of the collapse, beginning with the loss of Phuoc Long in January 1975. --BOOK JACKET
Will terrorists go nuclear? by Brian Michael Jenkins( Book )

12 editions published between 1900 and 2008 in English and Undetermined and held by 658 WorldCat member libraries worldwide

Jenkins goes beyond what the experts know about terrorists' efforts to acquire nuclear weapons, nuclear black markets, "suitcase bombs," and mysterious substances like red mercury to examine how terrorists themselves think about such weapons. His informed and seasoned analysis will give all Americans a clear understanding of the real situation and teach us how not to yield to nuclear terror
Terrorism and personal protection( Book )

8 editions published between 1984 and 1985 in English and held by 379 WorldCat member libraries worldwide

International terrorism : a chronology, 1968-1974 : a report prepared for Department of State and Defense Advanced Research Projects Agency by Brian Michael Jenkins( Book )

18 editions published between 1970 and 1979 in English and held by 276 WorldCat member libraries worldwide

A chronology of incidents of international terrorism that took place between 1968 and 1974. Most of the material is based on press reports, although other sources were used. Only incidents that had clear international repercussions were included {u2014} incidents in which terrorists went abroad to strike their targets, selected victims or targets that had connections with a foreign state (e.g., diplomats, executives, or the offices of foreign corporations), or created international incidents by attacking airline passengers, personnel, and equipment. Incidents in which groups such as the Irish Republican Army or the Tupamaros of Uruguay directed activities against their own government or citizens in their own territory were excluded, but the international activities of such groups {u2014} an IRA bombing in London, for example, or the kidnapping of a foreign diplomat in Uruguay {u2014} were included. The thousands of reported acts of terrorism in Indochina and the numerous cross-border raids by Arab guerrillas and Israeli commandos were excluded, except for the major episodes
Embassies under siege : a review of 48 embassy takeovers, 1971-1980 by Brian Michael Jenkins( Book )

9 editions published between 1980 and 1981 in English and Undetermined and held by 182 WorldCat member libraries worldwide

A review of the 48 assaults made on embassies by terrorists and other militants between 1971 and 1980
Terrorism and beyond : an International Conference on Terrorism and Low-level Conflict by Rand Corporation( Book )

5 editions published between 1981 and 1982 in English and held by 175 WorldCat member libraries worldwide

The conference brought together 144 participants, both government officials and members of the research community, from 13 nations to discuss international terrorism. The conference had three objectives. (1) It provided an opportunity to examine recent events, identify any new trends in terrorism, and exchange information on countermeasures. (2) It gave participants a chance to review more generally what had been learned about the phenomenon of terrorism in the 1970s and to explore its possible future course in the 1980s. (3) It identified the means by which individual research efforts in various countries could be coordinated and the results of this research shared. The conference addressed four areas: the terrorist environment, the terrorist mindset, the government response, and the future course of terrorism. This report summarizes the discussion in these four areas. It also includes eleven contributed papers that were used as resource material for the discussion
International terrorism : the other world war by Brian Michael Jenkins( Book )

8 editions published in 1985 in English and held by 170 WorldCat member libraries worldwide

Addresses the definition, theory, tactics, targets, and effects of terrorism and the threat it poses to the U.S. Air Force. Past doctrines, training, and practices do not apply in the war of terrorism. Although terrorists can always inflict damage, they cannot "win" unless they throw their target into a state of hysteria. They do not have the capability to inflict crippling damage on the U.S. military, but the military must develop new capabilities and doctrines to meet the challenge
New modes of conflict by Brian Michael Jenkins( Book )

8 editions published in 1983 in English and held by 160 WorldCat member libraries worldwide

Building on past studies of terrorism and low-level conflict, this report attempts to describe how contemporary international terrorism, which the author regards as a new mode of conflict made possible by technological developments in the second half of the twentieth century, fits into the broader scheme of armed conflict in general. The report also offers some ideas about the relationships between conventional warfare, ordinary guerrilla warfare, and contemporary terrorism
A conceptual framework for analyzing terrorist groups by Bonnie Cordes( Book )

7 editions published in 1985 in English and held by 160 WorldCat member libraries worldwide

This report describes an analytical framework developed at RAND for studying the characteristics of terrorist groups and illustrates how that framework can be used to address broad questions about terrorists and their actions. This conceptual framework is based on data concerning 150 specific attributes of terrorist groups divided into ten categories: organization; leadership; demography; ideology, doctrine, and goals; psychology, mindset, and decisionmaking; funding and logistics; operations and modus operandi; communications; external relations; and environment and government response. Twenty-nine terrorist groups were studied to identify and categorize their attributes, and chronologies of incidents involving the groups were developed. As many of these data as possible were then codified into a computer-readable form which would lend itself to quantitative analysis. The study then addressed three broad questions about terrorism as exercises in applying the framework. It was determined that the principal advantage of the conceptual framework is its ability to absorb new information as it becomes available, providing the basis for new analyses, both quantitative and qualitative
The Nicaraguan resistance and U.S. policy : report on a May 1987 conference by David F Ronfeldt( Book )

5 editions published in 1989 in English and held by 140 WorldCat member libraries worldwide

This report presents the results of a 1987 RAND conference on the Nicaraguan Resistance and U.S. Policy Implications. The conference, part of RAND's Western Hemisphere Forum, included presentations on (1) background of the resistance and U.S. support for it, (2) the strategic poverty of the Reagan Administration's vision regarding Nicaragua, (3) the Nicaraguan resistance in transition, (4) Sandinista strategy, and (5) diplomatic-political options in Nicaragua. The conference participants had varied backgrounds in official diplomatic and military capacities and in political activism, policy analysis, or policy-oriented research
Intelligence constraints of the 1970s and domestic terrorism : executive summary by Brian Michael Jenkins( Book )

6 editions published between 1982 and 1985 in English and held by 137 WorldCat member libraries worldwide

This report summarizes the conclusions of a study of constraints on intelligence activities in the investigation of terrorist or terrorist-related crimes in the United States. The study addresses the question: To what extent did the post-Watergate intelligence "rules" affect law enforcement's ability to investigate and prosecute cases of domestic terrorism? Specifically, the study compares and contrasts the investigation of domestic terrorism and the prosecution of alleged terrorists during the period before 1975, when the regulations governing such intelligence activities were more flexible, and during the period from 1975 to 1980 when constraints were greatly increased. This study does not address the regulatory changes or cases prosecuted after 1980
A review of recent trends in international terrorism and nuclear incidents abroad by Gail V Bass( Book )

4 editions published in 1983 in English and held by 132 WorldCat member libraries worldwide

"Reviews trends in international terrorism and nuclear incidents abroad during 1980-1981. Incidents of international terrorism increased dramatically in this period, and the number of incidents with fatalities and multiple fatalities also increased. The tactics of terrorism remain the same, in general, and diplomatic facilities continue to be popular targets for terrorists. Diplomats are the most common targets, and this trend is increasing. Numerous incidents were directed against nuclear facilities abroad in 1980-1981, and attacks on individuals involved in nuclear programs became more common, as did violent actions aimed at halting nuclear proliferation. Chronologies of selected international terrorist incidents and nuclear incidents abroad during 1980-1981 are presented."--Rand abstracts
Intelligence constraints of the 1970s and domestic terrorism by Sorrel Wildhorn( Book )

4 editions published between 1982 and 1983 in English and held by 119 WorldCat member libraries worldwide

V.2. "This Note presents a selective survey of legal and administrative regulatory constraints on the collection, maintenance, use, and dissemination of information pertaining to domestic security during the 1970s. The author discusses five aspects of domestic security investigations: initiation, kinds of information gathered, techniques of information gathering, handling of information, and reporting and control of investigations. He then discusses constraints on the kinds of information gathered, including direct investigatory controls, first amendment protections, privacy protections, statutory law, and California case law. Subjects also looked at in depth include regulation of techniques of information gathering, constraints on the handling of intelligence information, and reporting and control of security investigations. The author concludes that regulatory constraints on intelligence derived from domestic security investigations grew steadily throughout the 1970s and there was a concomitant growth in uncertainty about the scope of these constraints."--Rand abstracts
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.16 (from 0.04 for Would-be w ... to 0.58 for The Nicara ...)

Countering al Qaeda : an appreciation of the situation and suggestions for strategy
Countering al Qaeda : an appreciation of the situation and suggestions for strategyWould-be warriors : incidents of jihadist terrorist radicalization in the United States since September 11, 2001The long shadow of 9/11 : America's response to terrorismWill terrorists go nuclear?
Alternative Names
Brian Michael Jenkins American writer

Brian Michael Jenkins écrivain américain

Brian Michael Jenkins escritor estadounidense

Jenkins, B.

Jenkins, B. (Brian)

Jenkins, Brian M.

Jenkins, Brian M. 1942-

Jenkins, Brian M. (Brian Michael)

ジェンキンズ, ブライアン・M


English (182)