Marc Sageman

Marc Sageman
Independent Researcher

About

44
Publications
16,287
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,930
Citations

Publications

Publications (44)
Article
Dans les systèmes américain et français, les procès en matière de terrorisme présentent de fortes différences. Il existe de nombreuses juridictions différentes et bien que la partie civile ne soit pas impliquée dans un procès pénal, elle dispose d'un recours en réparation dans les affaires civiles. Les procédures pénales fédérales sont contradictoi...
Chapter
Social networks play a critical role in the formation of criminal and radical groups. However, understanding of these formations relies on difficult to collect data. We present an approach where narrative data from the trial of the 1995 Paris Metro and RER bombings was used to extract actors, places, groups and actions that led to the formation of...
Article
Despite over a decade of government funding and thousands of newcomers to the field of terrorist research, we are no closer to answering the simple question of “What leads a person to turn to political violence?” The state of stagnation with respect to this issue is partly due to the government strategy of funding research without sharing the neces...
Chapter
Full-text available
The chapter discusses vulnerabilities of al-qa’ida related to ideology, framing, strategic objectives and decision making, and resource mobilization efforts, all of which can be exploited.
Article
Social network visualization has drawn significant attention over recent years. It creates images of social networks that provide investigators with new insights about network structures and helps them to communicate those insights to others. Visualization facilitates the social network analysis. It supports the investigators to discover patterns o...
Article
Full-text available
If the United States were subject to a terrorist nuclear attack, its president would face overwhelming political pressure to respond decisively. A well-prepared response could help both to prevent additional attacks and to bring the perpetrators to justice. An instinctive response could be cataclysmically ineffective, inflicting enormous collateral...
Article
The U.S. strategy for combating international Islamist terrorists must be based on an understanding of the terrorists' behavior and the process of radicalization to violence. This process includes four dimensions: a sense of moral outrage, interpreted in a specific way, which resonates with one's personal experiences, and is channeled through group...
Article
I am compelled to respond to Bruce Hoffman's review essay, "The Myth of Grass-Roots Terrorism" (May/June 2008), in which he substantially misrepresents my new book, Leaderless Jihad, ignoring all of its main points while making up others that appear nowhere in it. Most serious, Hoffman blatantly misrepresents my position on the status of al Qaeda's...
Article
While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web”—the reverse side of the Web used by terrorists. Currently, the problems of information overload and difficulty to obtain a comprehensive picture of terrorist activities hinder effective and efficient analys...
Chapter
Despite its many problems, publication of the Diagnostic and Statistical Manual of Mental Disorders (DSM-III; American Psychiatric Association, 1980) set the fields of psychiatry and clinical psychology on a solid empirical footing and fostered great advances in epidemiology and in the evaluation of various theories and therapies. But this progress...
Article
Thanks to the internet and the “war on terror”, modern terrorist networks are nothing like the old, and a lot harder to detect, says Marc Sageman
Article
Full-text available
This article highlights initial findings from the authors’ Global Transnational Terrorism (GTT) Project, which began in August 2006. The case study draws on the database work for Southeast Asia and charts the rise of a militant minority within Jemaah Islamiyah, which was directly responsible for a series of attacks from 2000–2005. The important but...
Chapter
Terrorist and extremist groups and their sympathizers have found a costeffective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access to digitally archived Websites to mine their contents and pursue various types of an...
Book
In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on th...
Article
Full-text available
If the United States were subject to a terrorist nuclear attack, its president would face overwhelming political pressure to respond decisively. A well-prepared response could help both to prevent additional attacks and to bring the perpetrators to justice. An instinctive response could be cataclysmically ineffective, inflicting enormous collateral...
Article
Full-text available
A Scientific Approach The facts detailed in this briefing are the results of scientific exploration of terror networks and sacred values and their association to political violence. The research is sponsored by the Air Force Office of Scientific Research (AFSOR) and the National Science Foundation (NSF).
Article
Full-text available
Conference Paper
Full-text available
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective combating strategies against terrorism. Visualization of a network with the support of social network analysis techniques greatly facilitates the inspection of the network...
Conference Paper
It is very important for us to understand the functions and structures of terrorist networks to win the battle against terror. However, previous studies of terrorist network structure have generated little actionable results. This is mainly due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis met...
Conference Paper
Full-text available
The Internet which has enabled global businesses to flourish has be- come the very same channel for mushrooming 'terrorist news networks.' Ter- rorist organizations and their sympathizers have found a cost-effective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terroris...
Conference Paper
While the Web has evolved to be a global information platform for anyone to use, terrorists are also using the Web to their own advantages. Many terrorist organizations and their sympathizers are using Web sites and online bulletin boards for propaganda, recruitment and communication purposes. This alternative side of the Web, which we call the Dar...
Article
For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) target the West, but their operations mercilessly slaught...
Conference Paper
Full-text available
Ever since the 9-11 incident, the multidisciplinary field of terrorism has experienced tremendous growth. As the domain has benefited greatly from recent advances in information technologies, more complex and challeng- ing new issues have emerged from numerous counter-terrorism-related research communities as well as governments of all levels. In t...
Article
Unhampered by current ethical standards and human subject committees, H. Bernheim (1889) created a false memory of a horrific traumatic event. Bernheim also demonstrated his subject's willingness to discuss the implanted memory with a representative of the law. Bernheim's work represents the first documented case of an implanted false traumatic mem...
Article
This article examines three types of skills required for effective assessments in the forensic arena. Forensic psychology is the application of scientific psychology to the resolution of legal conflicts. The first skill is knowledge of the legal issues to be addressed. Examples of such issues are criminal responsibility, legal competencies, and lin...
Article
Full-text available
Background thinking for the Madrid terrorism summit has stemmed partly from the 9/11 Commission and Spain's Comisión 11-M. Their presentations fall short on pinpointing the sources of attacks that carry the most risk and how best to respond. Terrorist attacks over the last decades follow a power-law distribution, which anticipates future terrorist...
Article
Terrorists are making use of all possible means, including the vulnerabilities of our information, communication, and transportation systems, to launch fatal attacks. To address the terrorism threats, it is important to trace dynamic evolution, communication, and movement of terrorist groups across different jurisdictions. As suggested by a recent...

Network

Cited By