{"id":4,"date":"2010-05-25T21:22:47","date_gmt":"2010-05-26T01:22:47","guid":{"rendered":"http:\/\/www.jamesforest.com\/?page_id=4"},"modified":"2021-10-12T11:16:45","modified_gmt":"2021-10-12T15:16:45","slug":"books","status":"publish","type":"page","link":"https:\/\/www.jamesforest.com\/index.php\/books\/","title":{"rendered":"Publications"},"content":{"rendered":"<h3 style=\"text-align: center;\">Recent books published by Dr. Forest:<\/h3>\n<table border=\"0\" cellspacing=\"10\" align=\"center\">\n<tbody>\n<tr>\n<td valign=\"top\"><a href=\"https:\/\/www.jamesforest.com\/index.php\/books\/digital-influence-mercenaries\/\" target=\"_blank\" rel=\"http:\/\/www.nortiapress.com\/portfolio-item\/forest\/ noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-819 size-medium\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2021\/09\/DIMercs-Cover-200x300.jpg\" alt=\"\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2021\/09\/DIMercs-Cover-200x300.jpg 200w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2021\/09\/DIMercs-Cover-683x1024.jpg 683w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2021\/09\/DIMercs-Cover.jpg 750w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><\/td>\n<td valign=\"top\"><a href=\"https:\/\/www.jamesforest.com\/index.php\/books\/digital-influence-warfare\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-617 size-medium\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/06\/DIW-Cover-Final-199x300.jpg\" alt=\"\" width=\"199\" height=\"300\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/06\/DIW-Cover-Final-199x300.jpg 199w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/06\/DIW-Cover-Final-768x1160.jpg 768w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/06\/DIW-Cover-Final-678x1024.jpg 678w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/06\/DIW-Cover-Final.jpg 1838w\" sizes=\"auto, (max-width: 199px) 100vw, 199px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/www.jamesforest.com\/index.php\/books\/digital-influence-mercenaries\/\"><em>Digital Influence Mercenaries: Profits and Power Through Information Warfare<\/em><\/a><br \/><\/strong>(Naval Institute Press, 2022)<\/p>\n<p style=\"text-align: center;\">\u00c2\u00a0<\/p>\n<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.jamesforest.com\/index.php\/books\/digital-influence-warfare\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>Digital Influence Warfare in the Age of Social Media<br \/><\/strong><\/em><\/a>(Praeger\/ABC-CLIO, 2020)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"0\" cellspacing=\"10\" align=\"center\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"http:\/\/www.nortiapress.com\/portfolio-item\/forest\/\" target=\"_blank\" rel=\"http:\/\/www.nortiapress.com\/portfolio-item\/forest\/ noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-608 size-medium\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/05\/TL3-242x300.png\" alt=\"\" width=\"242\" height=\"300\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/05\/TL3-242x300.png 242w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/05\/TL3-768x952.png 768w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/05\/TL3.png 797w\" sizes=\"auto, (max-width: 242px) 100vw, 242px\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/Essentials-Counterterrorism-Praeger-Security-International\/dp\/1440834709?SubscriptionId=AKIAJGO2SFUKT4FK3MQQ&amp;tag=jjfforest2017-20&amp;linkCode=alb&amp;camp=2025&amp;creative=165953&amp;creativeASIN=1440834709\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-427 size-medium\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Essentials_Cover-199x300.jpg\" alt=\"\" width=\"199\" height=\"300\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Essentials_Cover-199x300.jpg 199w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Essentials_Cover.jpg 331w\" sizes=\"auto, (max-width: 199px) 100vw, 199px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><strong><a href=\"http:\/\/www.nortiapress.com\/portfolio-item\/forest\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The Terrorism Lectures, 3rd Edition<\/em><\/a><br \/><\/strong>(Nortia Press, 2019)\n<p>\u00c2\u00a0<\/p>\n<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"http:\/\/www.abc-clio.com\/ABC-CLIOCorporate\/product.aspx?pc=A4446C\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>Essentials of Counterterrorism<br \/><\/strong><\/em><\/a>(Praeger\/ABC-CLIO, 2015)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0078026296\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0078026296&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=e5fdcceda29957e4ef9ff49723f7b671\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-276\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2013\/02\/HST-2031.jpeg\" alt=\"HST-2031\" width=\"191\" height=\"237\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/1138945757\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1138945757&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=27d2c7998f3490801f37d0bf14b12b64\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-265 \" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/12\/2012_Crime-Terror-212x300.jpg\" alt=\"Crime and Terror Intersections\" width=\"184\" height=\"260\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/12\/2012_Crime-Terror-212x300.jpg 212w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/12\/2012_Crime-Terror.jpg 460w\" sizes=\"auto, (max-width: 184px) 100vw, 184px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><strong><a href=\"https:\/\/www.amazon.com\/gp\/product\/0078026296\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0078026296&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=e5fdcceda29957e4ef9ff49723f7b671\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Homeland Security and Terrorism<\/em><\/a><br \/><\/strong>(McGraw-Hill, 2013)<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/1138945757\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1138945757&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=27d2c7998f3490801f37d0bf14b12b64\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>Intersections of Crime and Terror<br \/><\/strong><\/em><\/a>(Routledge, 2013)\n<p>\u00c2\u00a0<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/jsou.libguides.com\/jsoupublications\/2014\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-654 \" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/07\/LRA-203x300.jpg\" alt=\"\" width=\"175\" height=\"259\" srcset=\"https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/07\/LRA-203x300.jpg 203w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/07\/LRA-768x1134.jpg 768w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/07\/LRA-693x1024.jpg 693w, https:\/\/www.jamesforest.com\/wp-content\/uploads\/2019\/07\/LRA.jpg 940w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0078026229\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0078026229&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=423c8736bb39715263bbe41ff0a92c4f\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"WMD2-thumb\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/01\/WMD2-thumb-143x150.jpg\" alt=\"WMD &amp; Terrorism book\" width=\"212\" height=\"222\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/jsou.libguides.com\/jsoupublications\/2014\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>JSOU Report on US Military Deployments to Africa <\/strong><\/a><br \/>(JSOU Press, 2014)<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><strong><a href=\"https:\/\/www.amazon.com\/gp\/product\/0078026229\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0078026229&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=423c8736bb39715263bbe41ff0a92c4f\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Weapons of Mass Destruction and Terrorism<br \/><\/em><\/a><\/strong>(2nd Edition, McGraw-Hill 2013)\n<p>\u00c2\u00a0<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/06\/Boko_Haram_JSOU-Report-2012.pdf\"><img loading=\"lazy\" decoding=\"async\" title=\"Boko_Haram_JSOU-Report\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/06\/Boko_Haram_JSOU-Report-211x300.jpg\" alt=\"\" width=\"171\" height=\"248\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/B01JXQ6MSA\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B01JXQ6MSA&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=566474cfa56aa79b53cd5f6798a448a5\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"IW-cover\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/IW-cover.jpg\" alt=\"\" width=\"163\" height=\"246\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><strong><a href=\"https:\/\/jsou.socom.mil\/Pages\/2012JSOUPublications.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">JSOU Report<\/a><\/strong> on Boko Haram <br \/>(JSOU Press, 2012)<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/B01JXQ6MSA\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B01JXQ6MSA&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=566474cfa56aa79b53cd5f6798a448a5\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Influence Warfare<\/em><\/a><br \/>(Praeger, 2009)\n<p>\u00c2\u00a0<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/1857434439\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1857434439&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=c63b217f902502a42255cdc2026f60ba\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"defense\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/defense-211x300.jpg\" alt=\"\" width=\"165\" height=\"247\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0275990346\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0275990346&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=bdb5635a1fc88f8268dd8c073af4e7d9\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"CTI21_Vol1_THUMB\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/CTI21_Vol1_THUMB.jpg\" alt=\"\" width=\"155\" height=\"233\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/1857434439\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1857434439&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=c63b217f902502a42255cdc2026f60ba\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Handbook of Defence Politics<\/em><\/a><br \/>(Routledge, 2008, with Ike Wilson)<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0275990346\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0275990346&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=bdb5635a1fc88f8268dd8c073af4e7d9\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Countering Terrorism and Insurgency in the 21<sup>st<\/sup> Century<\/em><\/a><br \/>(3 volumes: Praeger, 2007)\n<p>\u00c2\u00a0<\/p>\n<p><a href=\"http:\/\/books.google.com\/books?id=T5hrhNo9D84C&amp;lpg=PA178&amp;ots=-tEv0iER9S&amp;dq=%22The%20global%20Drug%20Trade%20and%20its%20Nexus%20to%20Terrorism%22&amp;pg=PP1#v=onepage&amp;q=%22The%20global%20Drug%20Trade%20and%20its%20Nexus%20to%20Terrorism%22&amp;f=false\" target=\"_blank\" rel=\"noopener noreferrer\">NEW: Click here to read this book for free via Google Books<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0742540782\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0742540782&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=d96abb9ca5f6533b62943d6a134f9604\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"TeachTerror\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/TeachTerror1-200x300.jpg\" alt=\"\" width=\"161\" height=\"240\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/027598768X\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=027598768X&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=77658b2f3b257602ce648a204030a5a8\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"HSPAT_v2\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/HSPAT_v2-197x300.jpg\" alt=\"\" width=\"159\" height=\"239\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><em><a href=\"https:\/\/www.amazon.com\/gp\/product\/0742540782\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0742540782&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=d96abb9ca5f6533b62943d6a134f9604\" target=\"_blank\" rel=\"noopener noreferrer\">Teaching Terror: Strategic and Tactical Learning in the Terrorist World<\/a><\/em><br \/>(Rowman &amp; Littlefield, 2006)<\/td>\n<td style=\"text-align: center;\" valign=\"top\"><em><a href=\"https:\/\/www.amazon.com\/gp\/product\/027598768X\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=027598768X&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=77658b2f3b257602ce648a204030a5a8\" target=\"_blank\" rel=\"noopener noreferrer\">Homeland Security: Protecting America\u00e2\u20ac\u2122s Targets<\/a><\/em><br \/>(3 volumes: Praeger, 2006)\n<p>\u00c2\u00a0<\/p>\n<p><a href=\"http:\/\/books.google.com\/books?id=oLISlVGPH-gC&amp;lpg=PP1&amp;dq=inauthor%3A%22James%20J.%20F.%20Forest%22&amp;pg=PP1#v=onepage&amp;q&amp;f=false\" target=\"_blank\" rel=\"noopener noreferrer\">New: Click here to read this book for free via Google Books<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0739109898\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0739109898&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=dbf09c3cae97c0700eee4783b1479038\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Gulf\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Gulf-225x300.jpg\" alt=\"\" width=\"157\" height=\"236\" \/><\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0275985431\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0275985431&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=ed29da15e5394ddf248da0104cea8836\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"MoT1\" src=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/MoT1-195x300.jpg\" alt=\"\" width=\"144\" height=\"217\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\"><a href=\"https:\/\/www.amazon.com\/gp\/product\/0739109898\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0739109898&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=dbf09c3cae97c0700eee4783b1479038\" target=\"_blank\" rel=\"noopener noreferrer\">Oil and Terrorism in the New Gulf<\/a><br \/>(2006, with Matt Sousa)<br \/>\u00c2\u00a0<a href=\"http:\/\/books.google.com\/books?id=8C3Wt6CFVWIC&amp;dq=Oil%2Band%2BTerrorism%2Bin%2Bthe%2BNew%2BGulf%2Bby%2BJames%2BJ.F.%2BForest%2Band%2BMatthew%2BV.%2BSousa.&amp;printsec=frontcover&amp;source=bn&amp;hl=en&amp;ei=nNPBSqyuMpOZlAew-bDcBA&amp;sa=X&amp;oi=book_result&amp;ct=result&amp;resnum=4#v=onepage&amp;q&amp;f=false\" target=\"_blank\" rel=\"noopener noreferrer\">Read this book online for free at Google Books<\/a><\/td>\n<td style=\"text-align: center;\" valign=\"top\"><em><a href=\"https:\/\/www.amazon.com\/gp\/product\/0275985431\/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0275985431&amp;linkCode=as2&amp;tag=jjfforest2019-20&amp;linkId=ed29da15e5394ddf248da0104cea8836\" target=\"_blank\" rel=\"noopener noreferrer\">The Making of a Terrorist: Recruitment, Training and Root Causes<\/a><br \/><\/em>(3 volumes: Praeger, 2005)<br \/><a href=\"http:\/\/www.teachingterror.com\/Making\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Click here<\/strong><\/a> for table of contents and free chapters<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\">\u00c2\u00a0<\/td>\n<td style=\"text-align: center;\" valign=\"top\">\u00c2\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" valign=\"top\">\u00c2\u00a0<\/td>\n<td style=\"text-align: center;\" valign=\"top\">\u00c2\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<p><strong>Here are some recent articles and essays authored or co-authored by James Forest:<\/strong><\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/scholarcommons.usf.edu\/jss\/vol5\/iss4\/9\/\" target=\"_blank\" rel=\"noreferrer noopener\">A Framework for Analyzing the Future Threat of WMD Terrorism<\/a>\u00e2\u20ac\u009d (article published in the Winter 2012 issue of the&nbsp;<em>Journal of Strategic Security<\/em>)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.tandfonline.com\/eprint\/btfYeiyeHpf37ICu4rS6\/full\" target=\"_blank\" rel=\"noreferrer noopener\">Global Trends in Kidnapping by Terrorist Groups<\/a>\u00e2\u20ac\u009d (article published in Fall 2012 issue of <em>Global Change, Peace and Security<\/em>)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.tandfonline.com\/eprint\/IPbdZnuckan5GzsKd3j7\/full\" target=\"_blank\" rel=\"noreferrer noopener\">Political Violence and the Illicit Economies of West Africa<\/a>\u00e2\u20ac\u009d (article co-authored with Vanda Felbab Brown, published in the November 2012 issue of <em>Terrorism &amp; Political Violence<\/em>)<\/p>\n\n\n\n<p><a href=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/06\/Boko_Haram_JSOU-Report-2012.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Confronting the Terrorism of Boko Haram in Nigeria<\/a> (Monograph published by Joint Special Operations University Press, May 2012)<\/p>\n\n\n\n<p>Speech on <a href=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2012\/06\/JForest-CrimeTerror_Dialogue_June2012.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Crime and Terror Pipelines<\/a> delivered at the June 2012 Summit sponsored by the US Dept. of State and UK Ministry of the Interior<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/forest-perception-challenges\/html\" target=\"_blank\" rel=\"noreferrer noopener\">Perception Challenges Faced by Al-Qaeda on the Battlefield of Influence Warfare<\/a>\u00e2\u20ac\u009d (Article published in April 2012 issue of <em>Perspectives on Terrorism<\/em>)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.atlcom.nl\/upload\/AP_2011_nr__6.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Ungoverned Territories: Engaging Local Nongovernmental Entities in U.S. Security Strategy<\/a>\u00e2\u20ac\u009d (Article published in July 2011 issue of the NATO journal <em>Atlantic Perspective<\/em>)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Forest-CATO-Essay-Jan-091.pdf\">Terrorism as Product of Choices and Perceptions<\/a>\u00e2\u20ac\u009d (Essay written for the 2009 CATO Institute conference on counterterrorism)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/152\/html\" target=\"_blank\" rel=\"noreferrer noopener\">Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain<\/a>\u00e2\u20ac\u009d (Article co-authored with Jenifer Giroux, published in August 2011 issue of <em>Perspectives on Terrorism<\/em>)<\/p>\n\n\n\n<p><a>\u00e2\u20ac\u0153Exploiting the Fears of Al Qaida\u00e2\u20ac\u2122s Leadership<\/a>\u00e2\u20ac\u0153, <a href=\"http:\/\/www.ctc.usma.edu\/sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>The Sentinel<\/em> Vol. 2, No. 2<\/a> (February, 2009)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/156\/html\" target=\"_blank\" rel=\"noreferrer noopener\">Al-Qaeda\u00e2\u20ac\u2122s Influence in Sub-Saharan Africa: Myths, Realities and Possibilities<\/a>\u00e2\u20ac\u009d (Article published in August 2011 issue of <em>Perspectives on Terrorism<\/em>)<\/p>\n\n\n\n<p>\u00e2\u20ac\u0153<a href=\"http:\/\/www.jamesforest.com\/wp-content\/uploads\/2010\/05\/Forest_Catastropic_Ideologies1.pdf\">Catastropic Ideologies<\/a>\u00e2\u20ac\u009d (Essay written for the Fund for Peace \u00e2\u20ac\u0153Threat Convergence Summit\u00e2\u20ac\u009d)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent books published by Dr. Forest: Digital Influence Mercenaries: Profits and Power Through Information Warfare(Naval Institute Press, 2022) \u00c2\u00a0 Digital Influence Warfare in the Age of Social Media(Praeger\/ABC-CLIO, 2020) The Terrorism Lectures, 3rd Edition(Nortia Press, 2019) \u00c2\u00a0 Essentials of Counterterrorism(Praeger\/ABC-CLIO, 2015) Homeland Security and Terrorism(McGraw-Hill, 2013) Intersections of Crime and <a href=\"https:\/\/www.jamesforest.com\/index.php\/books\/\" class=\"btn btn-link continue-link\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":0,"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.jamesforest.com\/index.php\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}