Academic journal article African Research & Documentation

A Preliminary Terrorism Reading List for Sub-Saharan Africa

Academic journal article African Research & Documentation

A Preliminary Terrorism Reading List for Sub-Saharan Africa

Article excerpt

Terrorism in Sub-Saharan Africa is not a new phenomenon. In apartheid South Africa, the minority government and the African National Congress regularly accused one another of committing terrorist attacks. Some other dramatic incidents included the 31 December 1980 bombing by Palestinian terrorists of the Jewish-owned Norfolk hotel in Nairobi that resulted in 16 deaths and 67 injuries. On 2 March 1973, three members of the Black September organization executed two American diplomats assigned to the U. S. Embassy in Khartoum and a Belgian diplomat. On 27 June 1974, four terrorists from the BaaderMeinhof gang and the Popular Front for the Liberation of Palestine hijacked an Air France plane en route from Tel Aviv to Paris via Athens. The terrorists ordered the plane to Kampala; on 4 July 1974, Israel launched a secret mission called Operation Thunderbolt that freed more than 100 Israeli citizens. On 7 August 1998, Al-Qaida operatives bombed the American embassies in Kenya (212 killed and some 5,000 injured) and Dar-es-Salaam (10 killed and 85 injured). On 28 November 2002, terrorists who belonged to The Army of Palestine unsuccessfully fired a surface-to-air missile at an Israeli charter flight that had just taken off from Mombasa. The same group bombed Mombasa's Paradise hotel, killing 15 and injuring some 80 others.

Prior to the attacks on New York and Washington, the scope and amount of terrorism literature pertaining to Sub-Saharan Africa was relatively modest. In the years following theses incidents, there has been an increase in the number books and articles about terrorism in Sub-Saharan Africa. Useful items regularly appear in scholarly books and journals and an array of security-related periodicals. The following bibliography is designed to provide a selected sampling of some of the more pertinent literature.

ASR African security review

ARB Africa research bulletin

JCAS Journal of Contemporary African Studies

JIR Jane's intelligence review

OA Oxford analytica

ROAPE Review of African political economy

TM Terrorism monitor

GENERAL

"Africa: Islamist terrorism thrives on weak states." OA, (15 January 2004), pp. 1-3.

"Africa/US: Bush increases counter-terrorism aid." OA, (25 August 2004), pp. 1-4.

"Gangsters against gangsterism." Foreign report, No. 2520 (12 November 1998), pp. 1-2.

"Insight into United States' African policies: terrorism and state partnership addressed." African Armed Forces Journal, (July, 2002), pp. 10+

"US/Africa: new focus on African 'security'." OA, (21 May 2003), pp. 1-2.

"US steps up African campaign." Middle east, No. 359 (August/September, 2005), pp. 26-29.

Abrahamsen, Rita. "Blair's Africa: the politics of securitization and fear." Alternatives: global, local, political, Vol. 30, No. 1 (January /March, 2005), pp. 5580.

_____. "A breeding ground for terrorists? Africa and Britain's 'war on terrorism'." ROAPE, Vol. 31, No. 103 (December, 2004), pp. 677-684.

Adebajo, Adekeye. "Africa and America in an age of terror." Journal of Asian and African studies, Vol. 38, Nos. 2/3 (March, 2003), pp. 175-191. Also, in Rose Kadende-Kaiser and Paul J. Kaiser (eds.). Phases of conflict in Africa. (Willowdale, Ontario: de sitter publications, 2005), pp. 26-42.

Amuwo, Adekunle. "The political economy of terrorism." Africa development, Vol. 27, Nos. 1/2 (2002), pp. 205-231.

Bansikiza, C. "Contemporary challenges of terrorism and the role of the church in Africa." Studies in conflict and terrorism, Vol. 29, No. 6 (2006), pp. 577589.

Barnes, Sandra T. "Global flows: terror, oil, and social philanthropy." African studies review, Vol. 48, No. 1 (April, 2005), pp. 1-22.

_____. "Global flows: terror, oil and strategic philanthropy." ROAPE, Vol. 32, Nos. 104/105 (July/September, 2005), pp. 235-252.

Bongo, Omar and Assane Diop. "Terrorism: a new threat-interview. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.