Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jerrold M. Post is active.

Publication


Featured researches published by Jerrold M. Post.


Democracy and Security | 2005

Crimes of Obedience

Jerrold M. Post; Lara K. Panis

To say the Abu Ghraib prison abuse scandal damaged the US image in the Middle East is to underestimate its impact. While the commissions and trials thus far have not found fault with senior officials, and the Secretary of Defense identified the fault as lying with “a few bad apple MPs,” this paper suggests that the three conditions identified by Kelman and Hamilton in their study of the My Lai massacre as being requisite for sanctioned massacres—authorization, routinization, and dehumanization—were present. There is persuasive evidence that the actions by low level military personnel (MPs) were authorized and approved by higher authorities to produce positive interrogation results, even though not specifically ordered, that what they did was experienced by them as not out of the ordinary, and that there was a lack of empathy for their charges. Moreover, interrogation practices targeting the humiliation of Muslims demonstrated a cultural sophistication at senior levels. It is critical in conducting the war against terror that we not adapt the techniques of terror ourselves and in so doing weaken our democracy.


Terrorism and Political Violence | 2003

The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists∗∗This research was conducted with the support of the Smith Richardson Foundation.

Jerrold M. Post; Ehud Sprinzak; Laurita Denny

Using semi-structured interviews, 35 incarcerated Middle Eastern terrorists have been interviewed – 21 Islamic terrorists representing Hamas (and its armed wing Izz a-Din al Qassan), Islamic Jihad, and Hizballah, and 14 secular terrorists from Fatah and its military wing, PFLP and DFLP. The purpose of the research was to understand their psychology and decision-making in general, and with special reference to their propensity towards weapons of mass destruction.


Political Psychology | 1993

Current Concepts of the Narcissistic Personality: Implications for Political Psychology

Jerrold M. Post

In the past two decades, increasing attention has focused on the etiology and clinical manifestations of the narcissistic personality. This article reviews current concepts of the narcissistic personality, drawing special attention to the implications for political psychology. The decision-making of the narcissistic leader, especially crisis decision-making, is often impaired. The narcissistic leader has difficulty accepting criticism or new information, contributing to sycophantic advisory circles. Moreover, he may be overly optimistic concerning his possibility of success and underrate the adversary.


Studies in Conflict & Terrorism | 2002

The Radical Group in Context: 1. An Integrated Framework for the Analysis of Group Risk for Terrorism

Jerrold M. Post; Keven G. Ruby; Eric Shaw

On the basis of a systematic expert knowledge acquisition process, a framework has been developed that takes into account critical variables--internal and external, as well as interactions between them and the group under examination--that are understood to increase risk for escalation toward political violence. The indicators identified are grouped within four conceptual categories: (1) External factors, including historical, cultural, and contextual features; (2) Key actors affecting the group, including the regime and other opponents, as well as Constituents and Supporters; (3) The Group/Organization: Characteristics, Processes, and Structures, including an examination of such factors as leadership style and decision making, group experience with violence, and group ideology and goals; and (4) Characteristics of the Immediate Situation, including Triggering Events. A total of 32 variables were identified within the 4 categories to establish the overall integrated framework. This framework provides the basis for the rigorous analysis of a radical groups risk for terrorism.


Psychiatry MMC | 2009

The Psychology of Suicide Terrorism

Jerrold M. Post; Farhana Ali; Schuyler W. Henderson; Stephen B. Shanfield; Jeff Victoroff; Stevan Weine

This paper reviews current understandings of the psychology of suicide terrorism for psychiatrists and other mental health professionals to help them better understand this terrifying phenomenon. After discussing key concepts and definitions, the paper reviews both group and individual models for explaining the development of suicide terrorists, with an emphasis on “collective identity.” Stressing the importance of social psychology, it emphasizes the “normality” and absence of individual psychopathology of the suicide bombers. It will discuss the broad range of terrorisms, but will particularly emphasize terrorism associated with militant Islam. The article emphasizes that comprehending suicide terrorism requires a multidisciplinary approach that includes anthropological, economic, historical, and political factors as well as psychological ones. The paper concludes with a discussion of implications for research, policy, and prevention, reviewing the manner in which social psychiatric knowledge and understandings applied to this phenomenon in an interdisciplinary framework can assist in developing approaches to counter this deadly strategy.


International Journal of Group Psychotherapy | 1986

Hostilité, conformité, fraternité: the group dynamics of terrorist behavior.

Jerrold M. Post

ABSTRACTThere are two major categories of terrorist groups: the “anarchic-ideologues,” such as the Red Army Faction, committed to destroying the world of their fathers; and the “nationalist-separatists,” such as ETA of the Basques, who carry on the mission of their fathers.Despite the diversity of terrorist groups and causes, a comparative study indicates a remarkable uniformity of terrorist behavior. The groups draw their membership from marginal, isolated, and inadequate individuals from troubled families, so that for many, belonging to the terrorist group is the first time they have truly belonged to any group. Organized against society, the group is seen as all good and the outside society as all bad. This polarization is central to the groups ideology and is the rationale for committing violent, antiestablishment acts.


Terrorism and Political Violence | 2000

From car bombs to logic bombs: The growing threat from information terrorism

Jerrold M. Post; Keven G. Ruby; Eric Shaw

The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications.


Annals of the New York Academy of Sciences | 2010

When hatred is bred in the bone: the social psychology of terrorism

Jerrold M. Post

Terrorists are not crazed fanatics. Indeed, terrorist groups screen out emotionally unstable individuals—they would be a security risk. Rather it is group, organizational, and social psychology, with particular emphasis on collective identity that motivates terrorist behavior. There is a diverse spectrum of terrorist psychologies and motivations. In terms of generational provenance, nationalist–separatist terrorists are carrying on the mission of their parents—they are loyal to families who have been damaged by the regime. In contrast, social–revolutionary terrorists are disloyal to families who are loyal to the regime. Religious fundamentalist terrorists are “killing in the name of God.” Suicide, proscribed by the Koran, has been reframed as martyrdom, which is highly valued. The new media, especially the Internet, have played an increasingly prominent role in radicalizing individuals, creating a virtual community of hatred. Understanding terrorist psychology is crucial to formulating effective counter‐terrorist strategy. Key elements include inhibiting potential terrorists from joining the group, creating tension within the group, facilitating exit from the group, reducing support for the group, and delegitimating its leader.


Studies in Conflict & Terrorism | 2002

The Radical Group in Context: 2. Identification of Critical Elements in the Analysis of Risk for Terrorism by Radical Group Type

Jerrold M. Post; Keven G. Ruby; Eric Shaw

In this second of two linked articles describing an integrated framework for the analysis of risk for terrorism of a radical group, a subset of observable indicators for each of the 32 variables within the integrated framework is presented. On the basis of an expert knowledge acquisition process, five types of terrorist groups-- nationalist-separatist, religious fundamentalist, new religions (other religious extremists, including millenarian cults), social revolutionary, and right wing--are compared in order to identify which indicators are of greatest importance for each terrorist group type. Historical, cultural, and contextual features can be assessed effectively through the use of open sources and experts. Group characteristics, processes, and structures were consistently rated as highly important across all five group types. Ratings for new religions differed most consistently from those of other group types.


Journal of Nervous and Mental Disease | 2011

Psychiatry and terrorism

Frederick J. Stoddard; Joel Gold; Schuyler W. Henderson; Joseph P. Merlino; Ann E. Norwood; Jerrold M. Post; Stephen B. Shanfield; Stevan Weine; Craig L. Katz

Terrorism has dominated the domestic and international landscape since 9/11. Like other fields, psychiatry was not well prepared. With the 10th anniversary of the 9/11 attack approaching, it is timely to consider what can be done to prepare before the next event. Much has been learned to provide knowledge and resources. The roles of psychiatrists are challenged by what is known of the causes of, consequences of, and responses to terrorism. Reflecting on knowledge from before and since 9/11 introduces concepts, how individuals become terrorists, how to evaluate the psychiatric and behavioral effects of terrorism, and how to expand treatments, behavioral health interventions, public policy initiatives, and other responses for its victims. New research, clinical approaches, and policy perspectives inform strategies to reduce fear and cope with the aftermath. This article identifies the psychiatric training, skills and services, and ethical considerations necessary to prevent or reduce terrorism and its tragic consequences and to enhance resilience.

Collaboration


Dive into the Jerrold M. Post's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kristen Moody

George Washington University

View shared research outputs
Top Co-Authors

Avatar

Jeff Victoroff

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Eric Shaw

George Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stephen B. Shanfield

University of Texas Health Science Center at San Antonio

View shared research outputs
Top Co-Authors

Avatar

Stevan Weine

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anat Berko

George Washington University

View shared research outputs
Researchain Logo
Decentralizing Knowledge