[1]
College of Policing, ‘Disrupting Serious and Organised Criminals: Menu of Tactics’. College of Policing, London [Online]. Available: https://www.college.police.uk/research/menu-of-tactics
[2]
M. Levi and M. Maguire, ‘Reducing and preventing organised crime: An evidence-based critique’, Crime, Law and Social Change, vol. 41, no. 5, pp. 397–469, Jun. 2004, doi: 10.1023/B:CRIS.0000039600.88691.af.
[3]
C. Lum, L. W. Kennedy, and A. Sherley, ‘Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research’, Journal of Experimental Criminology, vol. 2, no. 4, pp. 489–516, Jan. 2007, doi: 10.1007/s11292-006-9020-y.
[4]
P. Van Der Laan, M. Smit, I. Busschers, and P. Aarten, ‘Cross-border trafficking in human beings: Prevention and intervention strategies for reducing sexual exploitation’. .
[5]
‘EVIL DONE Terrorism Vulnerability Assessment - YouTube’. [Online]. Available: https://www.youtube.com/watch?time_continue=1&v=Ml7qqRhNr5w
[6]
K. von Lampe, ‘The application of the framework of Situational Crime Prevention to “organized crime”’, Criminology and Criminal Justice, vol. 11, no. 2, pp. 145–163, Apr. 2011, doi: 10.1177/1748895811398459.
[7]
E. R. Kleemans, M. R. J. Soudijn, and A. W. Weenink, ‘Organized crime, situational crime prevention and routine activity theory’, Trends in Organized Crime, vol. 15, no. 2–3, pp. 87–92, Sep. 2012, doi: 10.1007/s12117-012-9173-1.
[8]
G. R. Newman, ‘Situational Approaches to Terrorism’, in Encyclopedia of Criminology and Criminal Justice, G. Bruinsma and D. Weisburd, Eds. New York, NY: Springer New York, 2014, pp. 4853–4864 [Online]. Available: http://link.springer.com/10.1007/978-1-4614-5690-2_95
[9]
S. Perry, R. Apel, G. R. Newman, and R. V. Clarke, ‘The Situational Prevention of Terrorism: An Evaluation of the Israeli West Bank Barrier’, Journal of Quantitative Criminology, vol. 33, no. 4, pp. 727–751, Dec. 2017, doi: 10.1007/s10940-016-9309-6.
[10]
Richard Wortley and Michael Townsley, ‘Environmental Criminology and Crime Analysis’, Routledge, 2016 [Online]. Available: https://ebookcentral.proquest.com/lib/ucl/reader.action?docID=4717777&ppg=22
[11]
E. Cockbain and G. Laycock, Crime Science, vol. 1. Oxford University Press, 2017 [Online]. Available: http://criminology.oxfordre.com/view/10.1093/acrefore/9780190264079.001.0001/acrefore-9780190264079-e-4
[12]
Ronald V. Clarke, ‘Situational Crime Prevention’, Routledge, 2016 [Online]. Available: https://ebookcentral.proquest.com/lib/ucl/reader.action?docID=4717777&ppg=307
[13]
K. Bullock, R. V. G. Clarke, and N. Tilley, Situational prevention of organised crimes. Cullompton, Devon: Willan, 2010.
[14]
G. R. Newman and R. V. Clarke, ‘Policing Terrorism: an Executive Guide’. Office of Community Oriented Policing Services, 2008 [Online]. Available: http://www.popcenter.org/library/reading/PDFs/PolicingTerrorism.pdf
[15]
D. Weisburd, T. Feucht, I. Hakimi, L. Mock, and S. Perry, ‘To Protect and To Serve. Policing in an Age of Terrorism’, 2009. [Online]. Available: https://link.springer.com/book/10.1007%2F978-0-387-73685-3
[16]
J. D. Freilich, J. Gruenewald, and M. Mandala, ‘Situational Crime Prevention and Terrorism: An Assessment of 10 Years of Research’, Criminal Justice Policy Review, Oct. 2018, doi: 10.1177/0887403418805142.
[17]
‘Great expectations but little evidence: policing money laundering’, doi: 10.1108/IJSSP-06-2016-007610.1108/IJSSP-06-2016-0076. [Online]. Available: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=3&tabs=detailsTab&ct=display&fn=search&doc=TN_emerald_s10.1108%2fIJSSP-06-2016-0076&indx=1&recIds=TN_emerald_s10.1108%2fIJSSP-06-2016-0076&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=3&query=any%2Ccontains%2CGreat+expectations+but+little+evidence%3A+policing+money+laundering&dscnt=0&search_scope=CSCOP_UCL&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&vid=UCL_VU1&onCampus=false&highlight=false&institution=UCL&bulkSize=10&tab=local&displayField=title&dym=true&vl(2235343UI0)=any&vl(freeText0)=Great%20expectations%20but%20little%20evidence%3A%20policing%20money%20laundering&dstmp=1517224342757
[18]
‘SHIELDING THE COMPASS: HOW TO FIGHT TERRORISM WITHOUT DEFEATING THE LAW’. [Online]. Available: https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2013/04/SHIELDING-THE-COMPASS1.pdf
[19]
Beekarry, N., ‘International Anti-Money Laundering and Combating the Financing of Terrorism Regulatory Strategy: A Critical Analysis of Compliance Determinants in International Law’, Northwestern Journal of International Law & Business, 2011 [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nwjilb31&id=139
[20]
C. King, ‘Anti-Money Laundering: An Overview’, in The Palgrave Handbook of Criminal and Terrorism Financing Law, C. King, C. Walker, and J. Gurulé, Eds. Cham: Springer International Publishing, 2018, pp. 15–31 [Online]. Available: http://link.springer.com/10.1007/978-3-319-64498-1_2
[21]
S. Bricknell, ‘Misuse of the non-profit sector for money laundering and terrorism financing’, Trends & issues in crime and criminal justice, no. 424, Sep. 2011 [Online]. Available: https://aic.gov.au/publications/tandi/tandi424
[22]
J. C. Sharman, The Despot’s Guide to Wealth Management. Cornell University Press, 2017 [Online]. Available: https://www.jstor.org/stable/10.7591/j.ctt1mtz7wd
[23]
J. Jordan, ‘When Heads Roll: Assessing the Effectiveness of Leadership Decapitation’, Security Studies, vol. 18, no. 4, pp. 719–755, Dec. 2009, doi: 10.1080/09636410903369068.
[24]
G. LAFREE, L. DUGAN, and R. KORTE, ‘THE IMPACT OF BRITISH COUNTERTERRORIST STRATEGIES ON POLITICAL VIOLENCE IN NORTHERN IRELAND: COMPARING DETERRENCE AND BACKLASH MODELS’, Criminology, vol. 47, no. 1, pp. 17–45, Feb. 2009, doi: 10.1111/j.1745-9125.2009.00138.x.
[25]
M. Smith and J. I. Walsh, ‘Do Drone Strikes Degrade Al Qaeda? Evidence From Propaganda Output’, Terrorism and Political Violence, vol. 25, no. 2, pp. 311–327, Apr. 2013, doi: 10.1080/09546553.2012.664011.
[26]
P. B. Johnston and A. K. Sarbahi, ‘The Impact of US Drone Strikes on Terrorism in Pakistan’, International Studies Quarterly, vol. 60, no. 2, pp. 203–219, Jun. 2016, doi: 10.1093/isq/sqv004.
[27]
Benmelech, Efraim1,2Berrebi, Claude3Klor, Esteban F.3,4, ‘Counter-Suicide-Terrorism: Evidence from House Demolitions.’, Journal of Politics, vol. 77, no. 1, pp. 27–43, 2015, doi: 10.1086/678765. [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&AuthType=ip,shib&db=bth&AN=100365748&site=ehost-live&scope=site
[28]
A. Braithwaite and S. D. Johnson, ‘Space–Time Modeling of Insurgency and Counterinsurgency in Iraq’, Journal of Quantitative Criminology, vol. 28, no. 1, pp. 31–48, Mar. 2012, doi: 10.1007/s10940-011-9152-8.
[29]
Laura Dugan and Erica Chenoweth, ‘Moving Beyond Deterrence: The Effectiveness of Raising the Expected Utility of Abstaining from Terrorism in Israel’, American Sociological Review, vol. 77, no. 4, pp. 597–624, 2012 [Online]. Available: http://www.jstor.org/stable/41723051?seq=1#page_scan_tab_contents
[30]
P. Gill, J. A. Piazza, and J. Horgan, ‘Counterterrorism Killings and Provisional IRA Bombings, 1970–1998’, Terrorism and Political Violence, vol. 28, no. 3, pp. 473–496, May 2016, doi: 10.1080/09546553.2016.1155932.
[31]
M. M. Hafez and J. M. Hatfield, ‘Do Targeted Assassinations Work? A Multivariate Analysis of Israel’s Controversial Tactic during Al-Aqsa Uprising’, Studies in Conflict & Terrorism, vol. 29, no. 4, pp. 359–382, Jul. 2006, doi: 10.1080/10576100600641972.
[32]
Mannes, Aaron, ‘Testing the Snake Head Strategy: Does Killing or Capturing Its Leaders Reduce a Terrorist Group’s Activity?’ [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2988670
[33]
Chris Woods, Sudden Justice: America’s Secret Drone Wars. C Hurst & Co Publishers Ltd, 16AD [Online]. Available: https://www.amazon.co.uk/Sudden-Justice-Americas-Secret-Drone/dp/1849044023
[34]
‘University of Oxford Podcasts - Targeted Killing: Exploring its Legality, Morality and Effectiveness’. [Online]. Available: https://podcasts.ox.ac.uk/targeted-killing-exploring-its-legality-morality-and-effectiveness
[35]
F. Godlee and R. Hurley, ‘The war on drugs has failed: doctors should lead calls for drug policy reform’, BMJ, Nov. 2016, doi: 10.1136/bmj.i6067.
[36]
D. Werb, G. Rowell, G. Guyatt, T. Kerr, J. Montaner, and E. Wood, ‘Effect of drug law enforcement on drug market violence: A systematic review’, International Journal of Drug Policy, vol. 22, no. 2, pp. 87–94, Mar. 2011, doi: 10.1016/j.drugpo.2011.02.002.
[37]
J. Collins, ‘Ending the Drug Wars: Report of the LSE Expert Group on the Economics of Drug Policy.’ [Online]. Available: http://www.lse.ac.uk/ideas/Assets/Documents/reports/LSE-IDEAS-Ending-the-Drug-Wars.pdf
[38]
S. Rolles, ‘An alternative to the war on drugs’, BMJ, vol. 341, no. jul13 1, pp. c3360–c3360, Jul. 2010, doi: 10.1136/bmj.c3360.
[39]
‘Count the costs: the alternative world drug report. Second edition’. [Online]. Available: https://transformdrugs.org/publications/the-alternative-world-drug-report-2nd-edition
[40]
C. E. Hughes and A. Stevens, ‘What Can We Learn From The Portuguese Decriminalization of Illicit Drugs?’, British Journal of Criminology, vol. 50, no. 6, pp. 999–1022, Nov. 2010, doi: 10.1093/bjc/azq038.
[41]
A. Thornton and N. Bouhana, ‘Preventing Radicalization in the UK: Expanding the Knowledge-Base on the Channel Programme’, Policing: A Journal of Policy and Practice, Jun. 2017, doi: 10.1093/police/pax036.
[42]
Channel guidance. Home Office, 2012 [Online]. Available: https://www.gov.uk/government/publications/channel-guidance
[43]
‘PREVENT Strategy Review 2011’. [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97976/prevent-strategy-review.pdf
[44]
‘Bringing it Home Community-based approaches to counter-terrorism’. [Online]. Available: http://www.demos.co.uk/files/Bringing%20it%20Home%20-%20web.pdf
[45]
N. A. Christakis and J. H. Fowler, ‘Social contagion theory: examining dynamic social networks and human behavior’, Statistics in Medicine, vol. 32, no. 4, pp. 556–577, Feb. 2013, doi: 10.1002/sim.5408.
[46]
A. A. BRAGA, D. M. KENNEDY, E. J. WARING, and A. M. PIEHL, ‘Problem-Oriented Policing, Deterrence, and Youth Violence: An Evaluation of Boston’s Operation Ceasefire’, Journal of Research in Crime and Delinquency, vol. 38, no. 3, pp. 195–225, Aug. 2001, doi: 10.1177/0022427801038003001.
[47]
A. A. Braga and D. L. Weisburd, ‘The Effects of Focused Deterrence Strategies on Crime’, Journal of Research in Crime and Delinquency, vol. 49, no. 3, pp. 323–358, Aug. 2012, doi: 10.1177/0022427811419368.
[48]
D. M. Kennedy, Deterrence and crime prevention: reconsidering the prospect of sanction, vol. 2. London: Routledge, 2009.
[49]
A. V. Papachristos and C. Wildeman, ‘Network Exposure and Homicide Victimization in an African American Community’, American Journal of Public Health, vol. 104, no. 1, pp. 143–150, Jan. 2014, doi: 10.2105/AJPH.2013.301441.
[50]
J. V. Horn et al., ‘Stop It Now! A Pilot Study Into the Limits and Benefits of a Free Helpline Preventing Child Sexual Abuse’, Journal of Child Sexual Abuse, vol. 24, no. 8, pp. 853–872, Nov. 2015, doi: 10.1080/10538712.2015.1088914.
[51]
E. Cockbain and J. Knutsson, Eds., Applied police research: challenges and opportunities, vol. 16. London: Routledge, 2015.
[52]
Nick Tilley, Handbook of Crime Prevention and Community Safety. [Online]. Available: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do;jsessionid=5B9503A3D5327174EC559A1B836AB9CC?tabs=detailsTab&ct=display&fn=search&doc=TN_dawson9781843926146&indx=1&recIds=TN_dawson9781843926146&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=&query=any%2Ccontains%2Cany%2Ccontains%2CHandbook+of+Crime+Prevention+and+Community+Safety&dscnt=0&search_scope=CSCOP_UCL&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&vid=UCL_VU1&onCampus=false&highlight=false&institution=UCL&bulkSize=10&tab=local&displayField=title&dym=true&vl(2235343UI0)=any&vl(freeText0)=any%2Ccontains%2CHandbook%20of%20Crime%20Prevention%20and%20Community%20Safety&dstmp=1522063223332
[53]
M. S. Tillyer and D. M. Kennedy, ‘Locating Focused Deterrence Approaches within a Situational Crime Prevention Framework’, Crime Prevention and Community Safety, vol. 10, no. 2, pp. 75–84, Apr. 2008, doi: 10.1057/cpcs.2008.5.
[54]
Carnochan, J. and McCluskey, K., ‘Violence, culture and policing in Scotland’, in Policing Scotland, D. Donnelly and K. Scott, Eds. Abington, Oxon: New York, 2010, pp. 399–424.
[55]
Abt, Thomas, ‘What Works in Reducing Community Violence:  A Meta-Review and Field Study for the Northern Triangle’, 2016 [Online]. Available: https://ncvc.dspacedirect.org/handle/20.500.11990/1043
[56]
‘Offender Focused Domestic Violence Initiative: The First Two Years’. High Point, North Carolina [Online]. Available: https://www.highpointnc.gov/DocumentCenter/View/1246/Offender-Focused-Domestic-Violence-Initiative---The-First-Two-Years-PDF?bidId=
[57]
Molly Smith, Juno Mac, Revolting Prostitutes: The Fight for Sex Workers’ Rights. [Online]. Available: https://books.google.co.uk/books?hl=en&lr=&id=HypyDwAAQBAJ&oi=fnd&pg=PA1&dq=Revolting+Prostitutes,+Molly+Smith+and+Juno+Mac&ots=dLoE9C_UQj&sig=sghQQU9QO0_qRUhzqJHblfGk6kA#v=onepage&q&f=false
[58]
J. Saunders, ‘Tackling cybercrime – the UK response’, Journal of Cyber Policy, vol. 2, no. 1, pp. 4–15, Jan. 2017, doi: 10.1080/23738871.2017.1293117.
[59]
‘National Cyber Security Strategy 2016 to 2021 - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
[60]
‘Understanding the costs of cyber crime - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/understanding-the-costs-of-cyber-crime
[61]
‘Attacks in London and Manchester between March and June 2017 - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/attacks-in-london-and-manchester-between-march-and-june-2017
[62]
‘Operation of police powers under the Terrorism Act 2000 statistics - GOV.UK’. [Online]. Available: https://www.gov.uk/government/collections/operation-of-police-powers-under-the-terrorism-act-2000
[63]
Noel Dempsey, ‘Terrorism in Great Britain: the statistics’ [Online]. Available: http://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-7613
[64]
‘National Security Strategy and Strategic Defence and Security Review 2015 - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015
[65]
‘Counter-Terrorism and Security Act 2015’ [Online]. Available: http://www.legislation.gov.uk/ukpga/2015/6/contents/enacted
[66]
‘Counter-terrorism strategy (CONTEST) - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/counter-terrorism-strategy-contest
[67]
‘Independent Reviewer of Terrorism Legislation «’. [Online]. Available: https://terrorismlegislationreviewer.independent.gov.uk/
[68]
‘New power to target hostile state activity - GOV.UK’. [Online]. Available: https://www.gov.uk/government/news/new-power-to-target-hostile-state-activity
[69]
‘Organized Crime and its Role in Contemporary Conflict – an Analysis of UN Security Council Resolutions’. The Global Initiative Against Transnational Organized Crime [Online]. Available: https://globalinitiative.net/wp-content/uploads/2018/09/TGIATOC-UNSC-Policy-Note-1962-web.pdf
[70]
‘Global Initiative Briefing to the UN Security Council’. The Global Initiative Against Transnational Organized Crime [Online]. Available: https://globalinitiative.net/global-initiative-briefing-to-the-un-security-council/
[71]
T. Reitano and M. Shaw, ‘Atlantic Currents and their Illicit Undertow: Fragile States andTransnational Security Implications’. The German Marshall Fund of the United States [Online]. Available: https://globalinitiative.net/wp-content/uploads/2015/10/reitano-and-shaw-atlantic-currents-and-their-illicit-undertow-october-2015.pdf
[72]
M. Hunter, ‘Curbing Illicit Mercury and Gold Flows in West Africa’. [Online]. Available: https://globalinitiative.net/gold_mercury_ecowas/
[73]
S. Haysom, ‘Where crime compounds conflict: Understanding northern Mozambique’s vulnerabilities’. The Global Initiative Against Transnational Organized Crime [Online]. Available: https://globalinitiative.net/northern_mozambique_violence/
[74]
‘The nexus of conflict and illicit drug trafficking – Syria and the wider region’. [Online]. Available: https://globalinitiative.net/the-nexus-of-conflict-and-drug-trafficking-in-syria/
[75]
H. Matfess, ‘Power, elitism and history: Analyzing trends in targeted killings in Nigeria, 2000-2017’. The Global Initiative Against Transnational Organized Crime [Online]. Available: https://globalinitiative.net/analyzing-trends-in-targeted-killings-in-nigeria/
[76]
M. Shaw, C. Nellemann, and J. Stock, ‘World Atlas of Illicit Flows: Organized crime underpins major conflicts and terrorism’. The Global Initiative Against Transnational Organized Crime [Online]. Available: https://globalinitiative.net/world-atlas-of-illicit-flows/
[77]
S. Ellis and M. Shaw, ‘Does organized crime exist in Africa?’, African Affairs, vol. 114, no. 457, pp. 505–528, Oct. 2015, doi: 10.1093/afraf/adv035.
[78]
L. Mogelson, ‘Bad Guys vs. Worse Guys in Afghanistan’ [Online]. Available: https://www.nytimes.com/2011/10/23/magazine/bad-guys-vs-worse-guys-in-afghanistan.html
[79]
Jones, Derek, ‘Understanding the Form, Function, and Logic of Clandestine Cellular Networks: The First Step in Effective Counternetwork Operations’, 2009 [Online]. Available: https://apps.dtic.mil/docs/citations/ADA505161
[80]
R. J. Heuer, Psychology of Intelligence Analysis. Central Intelligence Agency [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/index.html
[81]
‘A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis’. US Government [Online]. Available: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf
[82]
M. Levi and M. Maguire, ‘Reducing and preventing organised crime: An evidence-based critique’, Crime, Law and Social Change, vol. 41, no. 5, pp. 397–469, Jun. 2004, doi: 10.1023/B:CRIS.0000039600.88691.af.
[83]
C. Lum, L. W. Kennedy, and A. Sherley, ‘Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research’, Journal of Experimental Criminology, vol. 2, no. 4, pp. 489–516, Jan. 2007, doi: 10.1007/s11292-006-9020-y.
[84]
‘GTReC Public Seminar - Tore Bjørgo on Strategies for Preventing Terrorism’. 30AD [Online]. Available: https://www.youtube.com/watch?v=fRfIcUPZILw
[85]
R. V. G. Clarke, Graeme R. Newman, Outsmarting the Terrorists. [Online]. Available: https://books.google.co.uk/books?hl=en&lr=&id=nkP9aU1dMFQC&oi=fnd&pg=PP5&dq=terrorism+situational+crime+prevention&ots=3XgC5eMZ4h&sig=rxvLNRpgBHUgnHSHu-DMggamIrs&redir_esc=y#v=onepage&q=terrorism%20situational%20crime%20prevention&f=false
[86]
J. Freilich, ‘The Intersections of Criminology and Terrorism Studies with Joshua Freilich’. [Online]. Available: http://www.tandfonline.com/sda/4890/audioclip-ftpv3.mp3
[87]
E. R. Kleemans, M. R. J. Soudijn, and A. W. Weenink, ‘Organized crime, situational crime prevention and routine activity theory’, Trends in Organized Crime, vol. 15, no. 2–3, pp. 87–92, Sep. 2012, doi: 10.1007/s12117-012-9173-1.
[88]
Y.-N. Chiu, B. Leclerc, and M. Townsley, ‘Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories: Implications for Prevention’, British Journal of Criminology, vol. 51, no. 2, pp. 355–374, Mar. 2011, doi: 10.1093/bjc/azr005.
[89]
K. von Lampe, ‘The application of the framework of Situational Crime Prevention to “organized crime”’, Criminology and Criminal Justice, vol. 11, no. 2, pp. 145–163, Apr. 2011, doi: 10.1177/1748895811398459.
[90]
Extending our reach: a comprehensive approach to tackling serious organised crime. Home Office, 2009 [Online]. Available: https://www.gov.uk/government/publications/extending-our-reach-a-comprehensive-approach-to-tackling-serious-organised-crime
[91]
A. Braithwaite and S. D. Johnson, ‘Space–Time Modeling of Insurgency and Counterinsurgency in Iraq’, Journal of Quantitative Criminology, vol. 28, no. 1, pp. 31–48, Mar. 2012, doi: 10.1007/s10940-011-9152-8.
[92]
E. Cockbain and G. Laycock, Crime Science, vol. 1. Oxford University Press, 2017 [Online]. Available: http://criminology.oxfordre.com/view/10.1093/acrefore/9780190264079.001.0001/acrefore-9780190264079-e-4
[93]
‘EVIL DONE Terrorism Vulnerability Assessment’. 29AD [Online]. Available: https://www.youtube.com/watch?v=Ml7qqRhNr5w
[94]
‘Professor Kate Bowers on Situational Crime Prevention, 27 February 2013, Sydney’. 14AD [Online]. Available: https://www.youtube.com/watch?v=t2Jw-YTiulg
[95]
‘Crime Prevention Through Environmental Design’. 16AD [Online]. Available: https://www.youtube.com/watch?v=TSRCWxGK7tI
[96]
‘Criminal Assets Bureau’. 29AD [Online]. Available: https://www.youtube.com/watch?v=R6a3s6BuWr0
[97]
M. Borgers and J. Moors, ‘Targeting the Proceeds of Crime: Bottlenecks in International Cooperation’, European Journal of Crime, Criminal Law and Criminal Justice, vol. 15, no. 1, pp. 1–22, Mar. 2007, doi: 10.1163/092895607X193515.
[98]
M. Levi and W. Gilmore, ‘Terrorist Finance, Money Laundering and the Rise and Rise of Mutual Evaluation: A New Paradigm for Crime Control?’, in Financing Terrorism, M. Pieth, Ed. Dordrecht: Kluwer Academic Publishers, 2003, pp. 87–114 [Online]. Available: http://link.springer.com/10.1007/0-306-48044-1_6
[99]
M. Levi, ‘Taking the Profit Out of Crime: The UK Experience’, European Journal of Crime, Criminal Law and Criminal Justice, vol. 5, no. 3, pp. 228–239, Jan. 1997, doi: 10.1163/157181797X00347.
[100]
Levi, Michael ; Michael Levi, ‘COMBATING THE FINANCING OF TERRORISM: A History and Assessment of the Control of “Threat Finance”’ [Online]. Available: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=11&tabs=detailsTab&ct=display&fn=search&doc=TN_jstor_archive_1243610773&indx=1&recIds=TN_jstor_archive_1243610773&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=11&frbg=&&dscnt=0&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&tb=t&mode=Basic&vid=UCL_VU1&srt=rank&tab=local&dum=true&vl(freeText0)=COMBATING%20THE%20FINANCING%20OF%20TERRORISM%20A%20History%20and%20Assessment%20of%20the%20Control%20of%20%E2%80%98Threat%20Finance%E2%80%99&dstmp=1472744563464
[101]
P. A. Sproat, ‘An evaluation of the UK’s anti-money laundering and asset recovery regime’, Crime, Law and Social Change, vol. 47, no. 3, pp. 169–184, Oct. 2007, doi: 10.1007/s10611-007-9076-2.
[102]
J. Jordan, ‘When Heads Roll: Assessing the Effectiveness of Leadership Decapitation’, Security Studies, vol. 18, no. 4, pp. 719–755, Dec. 2009, doi: 10.1080/09636410903369068.
[103]
J. Jordan, ‘When Heads Roll: Assessing the Effectiveness of Leadership Decapitation’, Security Studies, vol. 18, no. 4, pp. 719–755, Dec. 2009, doi: 10.1080/09636410903369068.
[104]
C. Walker, ‘Clamping Down on Terrorism in the United Kingdom’, Journal of International Criminal Justice, vol. 4, no. 5, pp. 1137–1151, Nov. 2006, doi: 10.1093/jicj/mql056.
[105]
K. Braddock and J. Horgan, ‘Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism’, Studies in Conflict & Terrorism, vol. 39, no. 5, pp. 381–404, May 2016, doi: 10.1080/1057610X.2015.1116277.
[106]
‘Ending Gang and Youth Violence - Mick McNally’. [Online]. Available: http://www.policyreview.tv/video/832/6018
[107]
M. Baines, ‘Winning Hearts and Minds: Managing Community Tensions’ [Online]. Available: http://policing.oxfordjournals.org/content/1/3/316.full.pdf
[108]
Bloom, Mia ; Horgan, John ; Mia Bloom ; John Horgan, ‘Missing Their Mark: The IRA’s Proxy Bomb Campaign’ [Online]. Available: http://ucl-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?frbrVersion=9&tabs=detailsTab&ct=display&fn=search&doc=TN_jstor_archive_1040972076&indx=1&recIds=TN_jstor_archive_1040972076&recIdxs=0&elementId=0&renderMode=poppedOut&displayMode=full&frbrVersion=9&frbg=&&dscnt=0&scp.scps=scope%3A%28UCL%29%2Cprimo_central_multiple_fe&tb=t&mode=Basic&vid=UCL_VU1&srt=rank&tab=local&dum=true&vl(freeText0)=Missing%20Their%20Mark%3A%20The%20IRA%27s%20Proxy%20Bomb%20Campaign&dstmp=1472746537719
[109]
K. Bullock and N. Tilley, ‘Understanding and Tackling Gang Violence’, Crime Prevention & Community Safety, vol. 10, no. 1, pp. 36–47, Feb. 2008, doi: 10.1057/palgrave.cpcs.8150057.
[110]
S. Thornton and L. Mason, ‘Community Cohesion in High Wycombe: a Case Study of Operation Overt’, Policing, vol. 1, no. 1, pp. 57–60, Jan. 2007, doi: 10.1093/police/pam012.
[111]
S. Vertigans, ‘Routes into “Islamic” Terrorism: Dead Ends and Spaghetti Junctions’, Policing, vol. 1, no. 4, pp. 447–459, Nov. 2007, doi: 10.1093/police/pam054.