1 DSC4012 – Terrorism Gender Roles, Tactics, and Force Multipliers in Terrorism Chapter 5 Learning Objectives: Chapter 5 Summarize the tactics of modern terrorism. List and describe four force multipliers. Discuss historical and current roles of women in terrorism. Outline the tactical importance of female terrorists. Learning Objectives: Chapter 5 Define the types of threats posed by technological terrorism. Explain the effects of biological, chemical and radiological weapons. Characterize the possibility and possible outcomes of nuclear terrorism. Learning Objectives: Chapter 5 Discuss the role of the media as a force multiplier. Summarize transnational economic targeting in the tourist, energy, and transportation industries. Summarize theories of suicide bombing. Terrorism Tactics Bombing Hijacking Arson Assault Kidnapping Hostage taking Weapons of mass destruction Force Multipliers Transnational support Increases terrorist groups ability to move and hide Technology Allows a small group to launch a deadly attack Media coverage Makes minor group appear to be politically important Religion Transcends normative political and social boundaries The Bomb Philosophy of the bomb The only way to communicate with the social order was to destroy it Terrorists tend to increase their effectiveness in bombing by applying improved explosive technology to their weapons 2 Thermobaric bomb Spreads fuel in the air and then ignites it Women and Terrorism Female terrorists are not new to the history of terrorism: 18th century France 19th century Russia 20th century US Rebels in Ireland Western revolutionary groups Women are actively recruited by religious terrorists today Women and Terrorism Role of women in terrorist groups is more closely determined by the political orientation of an organization than its tactics Women are more attracted to domestic terrorist organizations than international groups Women also have opportunities for leadership in revolutionary (domestic) groups International terrorists try to defend a traditional culture that limits the role of women Women and Terrorism Revolutionary groups Ulricke Meinhof and Leila Khalid served as combatants, leaders and served as inspiration for supporters Secular and religious terrorist groups Women increasingly receive combat assignments because they are so numerous Impact of Terrorism on Women Women have a greater sense of vulnerability to crime, and these feelings seem to transfer to terrorism Israeli study Women seemed to be more scared of terrorism than men, because women experienced terrorism more vicariously Women were more likely to suffer from posttraumatic stress and seek assistance following terrorist attacks Women approached the fear of terrorism with problem-solving strategies Overlooking Female Terrorists Researchers do not tend to think of women as terrorists or criminals When they do look at females, researchers usually view women as victims Law enforcement officers do not tend to arrest females It is generally assumed that terrorism is a violent male occupation There are men and women terrorists—each gender can be deployed with certain tactical benefits. 3 Cyberterrorism Is the use of technology through the Internet a great enough threat to be considered terrorism? When the technological impact is great enough to turn a tactic into a strategy. Or does this application confuse the issue? Cyberterrorism The use of computers to attack technological targets or physical attacks on computer networks An attractive low-risk strategy Cyberterrorists seek to interrupt or confuse the flow of information which Western society has become dependent upon. Computers allow terrorist groups to remain connected, providing a means for covert discussions and anonymity Greatest fear of cyberterrorism concerns catastrophic or multiple system failures CASE STUDY: In October 2009, Douglas Duchak was terminated from his job as data analyst at the TSA’s Colorado Springs Operations Center (CSOC). Surveillance cameras captured images of Duchak entering the facility after hours loading a logic bomb onto a CSOC server that stored data from the U.S. Marshals. If activated, the unauthorized code would have disrupted TSA’s ability to vet names against its “no fly” list temporarily. In January 2011, Duchak was sentenced to two years prison, $60,587 in fines, and three years probation. At his sentencing, Duchak tearfully apologized as his lawyer noted that at the time of the incident, Duchak's wife was pregnant with their second child. The judge at the sentencing mentioned that this logic bomb planting "incident was an anomaly in an otherwise untarnished work history.” Other scenarios: Stealing corporate or government secrets Causing an economic crisis by infiltrating the banking or investment sectors, draining accounts Attacking a major switching station on the power grid of a large metropolis causing circuit overloading and shutting down power. Causing a meltdown and explosion at a nuclear power plant. WMD: Biological Agents Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and refined, or weaponized, to increase their ability to kill. Bacterial weapons are often effectively treated with antibiotics. 4 Nations with these programs have created strains of bacterial microbes that are resistant to such drugs. For viral weapons, antibiotics are usually not effective. WMD: Biological Agents The Center for Disease Control classifies the most threatening from the groups as: smallpox anthrax plague botulism tularemia, hemorrhagic fever US Biological Attacks after 1980 Bacteria Religious group in Oregon spread bacteria in area salad bars to sicken potential voters Hundreds of people suffered food poisoning Anthrax Cases were reported in Florida, Washington, DC, New York, New Jersey, and Connecticut Public health response was disorganized The case is still under investigation WMD: Chemical & Radiological There are four types of chemical agents: nerve agents, blood agents, choking agents, and blistering agents Radiological weapons are more head resistant and lasts longer than chemicals Exposure to radiation can produce short-term burns and long-term heath problems WMD: Chemical & Radiological Dirty Bombs Uses a conventional explosive to spread a radioactive agent around a large area. Radiation is not affected by the heat of the explosion. Highly Enriched Uranium (HEU) HEU is plentiful and easy to obtain HEU is so potent that it could be used in a dirty bomb or a nuclear device Terrorists could build a device with HEU without the assistance of a nuclear state Terrorists could attack a nuclear tower with a hijacked plane or strong explosive device. 5 Nuclear Terrorism The most fearful scenario with WMDs involves a nuclear explosion Tel Aviv University Scholars suggest that the probability of nuclear terrorism is low The nuclear threat is based on the crime causation model: victim, opportunity to commit a crime, and the criminals’ desire Nuclear Terrorism concepts 1. Security is never 100% effective. 2. The nuclear black market does not exist. 3. Building a nuclear bomb is a complex process. 4. Nuclear defense should be based on realistic, comprehensive scenarios. 5. We should create total intelligence pictures of terrorist groups beyond nuclear terrorism. 6. Total protection is not possible, but we can tip the scales in our favor. Media Force Multiplier Both governments and terrorists see the media as a force multiplier: Security forces (symbols of sanity in a world turned upside down) assume the role of heroes who are trying to restore order Constant reporting makes small terrorist groups seem important With repeated media coverage, the striking power of the terrorist group is magnified Media Force Multiplier Terrorists try to portray respectability. Neither side wants to be portrayed as the aggressor. Media is the primary tool for demonizing the enemy. The Internet is the primary force multiplier and is easily available to terrorists. The Internet has little impact on democratic countries, but strong impact on authoritarian regimes as they control it for their own purposes and are aware of its value as a weapon for opposition and revolution. Tourism Terrorism does not seem to have an impact on domestic travel. Terrorism most frequently affects international travelers. Terrorism against tourists has a negative economic impact. Energy Fossil fuels present tempting targets: They represent the power and strength of the industrialized world Strikes against oil refineries have an economic impact on the West 6 From June 2003-February 2006, there were 298 attacks against oil production facilities in Iraq. Targets include: Production facilities Transfer systems Pipelines Storage facilities Shipping Individual Workers, especially foreigners Energy Attacks Saudi Arabia bin Laden considered Saudi Arabia as nothing more than an American colony. 40% of the countries gross domestic product is oil production. Pakistan and Balochista The Bugtis resent and resist Pashtun incursion into their native land, which has led to sharp fighting and a guerrilla war. Transportation After the September 11 attacks, the federal government immediately budgeted $4.8 billion to protect the aviation industry Indonesia, Malaysia, and Singapore have joined to protest insurance premiums on ships traveling through the Strait of Malacca Critics of homeland-security policies argue that ports remain unsecured because of the costs associated with increased protection Theory of Suicide Terrorism Pape (2005) believes three factors must be in place before a suicide terror campaign occurs: Nationalistic or ethnic group must be resisting the occupation of a foreign power Foreign power must have democratic government whose voters will not routinely allow the slaughter and repression of the people in the occupied area Must be a difference in the religions of the occupying power and the people living under occupation Models of Suicide Attacks Gunaratna sees three things that all attacks have in common: secrecy, reconnaissance, and rehearsal The Hamas model involves a professional group that plans and executes the attack, and a support group to prepare the attacker For many years, researchers believed that this was the only model for suicide bombing Models of Suicide Attacks Cronin finds that different models emerged over time: The Liberation Tigers of Tamil Eelam (LTTE) trained suicide bombers 7 The Kurdistan Worker’s Party (PKK) leadership coerced victims The bombings in Chechnya represent a different combination of social and psychological factors Chapter Take Aways The tactics of terrorism are straightforward and simple, but they are employed in innovative ways. The study of terrorism is complex as a result of tactical innovation. Force multipliers – technology, transnational support, religion, and the media – enhance the power of terrorist groups. Chapter Take Aways It is important to understand the tactical impact of gender on terrorism, but research on the roles of women has been neglected. Technological attacks can be made more effective by using WMD, cyberattacks, or economic targeting. Suicide bombing has become a particularly terrorizing tactic, but there is no single explanation for either understanding or preventing it.
© Copyright 2024 Paperzz