SlideShare a Scribd company logo
1 of 29
Jonathan R. White


      www.cengage.com/cj/white



         Chapter: 5
Practicing Terrorism: Gender
  Roles, Tactics and Force
          Multipliers
                   Rosemary Arway
                   Hodges University
Gender and Mission
 Gender and Mission
    o   Ideology draws certain types of recruits to a movement,
        and it influences the tactics terrorist groups employ.
        ▪ Gender impacts tactics and is often related to
           ideology.
    o   Women active through the evolution of terrorism
        ▪ Role of women has often been overlooked
        ▪ Women were active in terrorism:
           ▪   at the time of the French Revolution,
           ▪   in 19th century Russia,
           ▪   in racial terrorism in the United States,
           ▪   in revolutionary terrorism in Ireland and leftist movements
               after 1968.
   The role of women is more closely related to political
    orientation than tactics.
Gender and Mission
 Gonzalez-Perez:
  o Women are more drawn to domestic terrorist groups.
  o Women in domestic groups gravitate toward combat
    and leadership.
  o Women in international groups are more likely to be
    employed as supporters, sympathizers and spies.
 Ness:
  o Women relegated to support and service in religious
    terrorist groups.
     ▪   This will change as women become more involved.
  o Women developed combat and leadership positions in
    secular organizations.
Gender and Mission
 Blee:
  o The role of women in racial terrorism in the
    United States:
     ▪    In the post-Civil War era, they served as inspiration
          for male violence.
     ▪    In the 20th century women became actively involved
          in lynching.
     ▪    In the late twentieth century, White Supremacy
          groups recruited women in support roles.
Gender and Mission
   Overlooking Female terrorists
    o   Stack-O’Connor:
        ▪   Female terrorism is overlooked for the same reason that
            female criminality has been underplayed: researchers do
            not think of women as criminals, but rather, as victims.
    o   Ness:
        ▪   Popular culture does not accept the idea of female
            terrorists.
    o   von Knop:
        ▪   Women used as attackers or suicide bombers are
            following male model.
    o   Sjoberg:
        ▪   Studies of women in terrorism are generally ignored.
        ▪   Media presentations follow the same track.
Tactics of Terrorism and Multiplying Force

   Jenkins reports six tactics of terrorism:
     o   Bombing
     o   Hijacking
     o   Arson
     o   Assault
     o   Kidnapping
     o   Hostage taking
   Terrorism includes threats from weapons of mass
    destruction and virtual attacks through computer
    systems.
Tactics of Terrorism and Multiplying Force
   This tactics of terrorism can be enhanced by
    force multipliers.
   Force multipliers
     o increase striking power without increasing the
       strength of a unit
   Force multipliers giving terrorists more striking
    power include:
     o   Technology
     o   Media coverage
     o   Transnational support networks
     o   Religious fanaticism
Tactics of Terrorism and Multiplying Force

   Most common weapon of terrorism is the
    bomb.
   Anarchists in 1848 – philosophy of the bomb
     o Only way to communicate with the social order was
       to destroy it.
   Irish Republican Army found the bomb to be
    the most important weapon after 1969.
   Groups throughout the world found bombs
    could be delivered by suicide attackers
     o Suicide bombings and road side bombs are
       weapons of choice against U.S. military in Iraq.
Tactics of Terrorism and Multiplying Force
   Terrorists increase effectiveness by applying
    explosive technology to weapons.
   Middle Eastern type of military-style weapon
     o Thermobaric bomb
     o Mini-nuke
   Force multipliers enhance destructive power
    while innovation is used to achieve shock and
    surprise.
   Purpose of a terrorist attack – send a message
    of chaos and destruction to a larger audience.
     o Victims are not the target; they are killed to send a
       message.
Technology
 Terrorism is influenced by technology
 Cyberterrorism
  o Cyberterrorists threaten to interrupt or confuse the
    flow of information.
  o Cyberterrorism refers to use of computers to attack
    technological targets of physical attacks on computer
    networks.
  o Targets for cyberterrorism:
     ▪   Computers
     ▪   Computer networks
     ▪   Information storage and retrieval systems
  o There has been a sharp rise in such attacks, with the
    Internet providing the vehicle for launching most of
    the strikes.
WMD: Biological Agents
   Weapons of Mass Destruction – WMD – are biological
    arsenals containing bacterial and viral weapons.
    o   Microbes weaponized to increase their ability to kill
    o   Difficult to control but relatively easy to produce

   Biological agents include:
    o   Natural poisons or toxins
    o   Viruses
    o   Bacteria
    o   Plagues

   Most threatening according to CDC are:
    o   Smallpox
    o   Anthrax
    o   Plague
    o   Botulism
    o   Tularemia
    o   Hemorrhagic fever
WMD: Biological Agents
 Two biological attacks in America
  o 1984 religious group in Oregon
     ▪ Bacteria on a salad bar
     ▪ Elect religious followers to local office
  o Anthrax in the wake of 9-11
    ▪ Two tabloid writers infected thru the mail
    ▪ Followed by numerous anthrax attacks throughout
       the United States
  o The Commission on the Prevention of weapons of
    Mass Destruction Proliferation and Terrorism
    (2010) found that the United States still had no
    structure in place to respond to a biological attack.
WMD: Chemical and
          Radiological Weapons
 Forms of chemical alterations include:
  o Radiological poisoning and “dirty” radioactive
    devices
 Chemicals:
  o Generally easier to deliver than biological weapons
  o Faster acting
 Radiological devices:
  o Slower than most chemicals
  o Longer lasting
  o Can be spread like chemicals
WMD: Chemical and
         Radiological Weapons
 Four types of chemical agents:
  o Nerve agents
    ▪ Ingestion, respiration, or contact
  o Blood agents
    ▪ Absorbed through the respiratory system
  o Choking agents
    ▪ Absorbed through the respiratory system
  o Blistering agents
    ▪ Burn skin and internal tissue areas upon contact
WMD: Chemical and
               Radiological Weapons
 Chemicals are attractive to terrorists.
   o   Easy to control
   o   Users can avoid area they attack
 Chemical weapons are problematic.
   o   Delivery mechanism
   o   Need for large quantities of chemicals
   o   Chemicals can be neutralized by weather patterns, air, and
       water.
 Dirty bomb
   o   Explosive used to spread a chemical or radioactive agent
       around a large area
   o   Drawback of the dirty bomb
       ▪   The heat produced by the explosion may destroy the
           chemicals attached to the bomb
WMD: Nuclear Weapons

 Nuclear weapons
  o Available on the black market from sources in the
    former Soviet Union.
  o It is much easier for terrorists to use a conventional
    weapon or to spread chemicals than to build a
    nuclear weapon.
  o The U.S. Congress has designated a site in
    Nevada as the repository for all the radioactive
    waste used in America’s nuclear power plants, and
    all this material must be shipped across the
    country.
        This nuclear waste is a ready-made dirty bomb
WMD: Nuclear Weapons
 Nuclear terrorism:
    o   Two methods for obtaining a nuclear device:
        ▪   Highly Enriched Uranium (HEU)
        ▪   Plutonium
   Levi:
    o   The United States is not ready for an attack.
    o   Problems associated with terrorist’s attempts to obtain a weapon:
         Sophisticated security mechanisms
         National arsenals are secured
         Weapons are heavy and difficult to transport
    o   The United States should approach nuclear terrorism in two
        manners:
         debunking popular myths and focusing on a comprehensive
           approach to a terrorist group and all its activities;
         revamp defense systems.
WMD

 WMD …. an international problem
  o All countries should encourage their nuclear
    companies to control their trade.
    ▪ Prohibit sales of nuclear goods to those
      countries that sponsor or support terrorism.
    ▪ For example Uzbekistan, the biggest
      exporter of nuclear materials (uranium) and
      fuels (natural gas, petroleum), must regulate
      their nuclear industry.
The Media as A Force Multiplier
 Governments and terrorists benefit from
  media portrayal of terrorist activity.
 Everyone involved in terrorist conflict
  tries to manipulate images of terrorist
  activities.
  o Continuous reporting amplifies the aura of
    small groups
  o Striking power of the group is magnified
  o Wilkins: terrorists try to multiply force
    through communication
The Media as A Force Multiplier
 Nacos: Most terrorist groups have
  objectives beyond publicity
  o Groups want recognition
 Wolfsfeld: Media victories are crucial for
  terrorism
  o How battles are reported as important as
    battlefield combat
  o Neither side wants to be portrayed as
    aggressor
  o Media primary tool for demonizing the enemy
 Terrorist groups will attempt to portray
  respectability in all forms of media.
The Media as A Force Multiplier
 All forms of media can be used to multiply force.
  o Internet is gaining attention of security forces
         Online communication brings measure of freedom when
          media is heavily controlled
         Emerging as a major source of information
         Krasnoboka: The Internet does not have an overwhelming
          impact in democratic countries, but it is a powerful tool for
          opposition forces in authoritarian régimes.
   o Movies assist terrorism and distort issues
      •   Create popular images of propaganda
      •   Responsible for strong emotional projections
      •   Presents another venue for examination, for both assisting
          terrorism and distorting issues
Economic Targeting
      and Transnational Attacks
 Transnational support or operations can
  be used as a force multiplier.
  o Striking transnational or international
    economic targets increases the
    effectiveness of terrorist operations.
 Three types of transnational attacks:
  o Tourism
  o Energy
  o Shipping
Economic Targeting
        and Transnational Attacks
 Tourism
  o Attacks on tourism have a negative economic
    consequences (ETA).
 Energy
  o Interest in oil and gas production
  o Fossil fuels present tempting targets.
      Represent power and strengths of industrialized
       world.
      Strikes against oil refineries or transfer facilities
       have economic impact on the West.
      Examples: Iraq, Saudi Arabia, Pakistan
Economic Targeting
           and Transnational Attacks
 Endemic terrorism
   o   Form of violence occurring in Africa where arbitrary
       national boundaries have been drawn through ethnic
       and tribal divisions
 Niger Delta
   o Oil plays crucial role
          Used to fund endemic terrorism and corrupt governments
   o   Becomes target for those who cannot control production
          Oil companies investing in the area have greater incentive
           to focus on security than poverty engulfing the region.
 If poverty, endemic terrorism and criminalized
  policies are not addressed it will:
   o   Become base for emergence of new international
       terrorist groups
   o   Provide resources for training and eluding detection
Economic Targeting
      and Transnational Attacks
 Transportation
  o Provide tempting economic target as they
    produce mass casualties with minimal
    effort.
  o Protection of transportation is very
    expensive.
 Major feature of homeland security
  o Critics of homeland security policies argue
    that ports remain unsecured due to costs of
    increased protection.
 Attacks on aviation, shipping and
  transportation increase cost of security.
Suicide Attacks – Conflicting Opinions
 Gambetta’s three types of suicide attacks:
   o   Suicide in warfare
   o   Suicide for a principle without killing others
   o   Suicide terrorism
 Altruistic suicide: suicide terrorists frequently believe
  they are sacrificing their lives for a greater good.
 Pape:
   o   Attackers are so diverse, it may not be possible to find a single profile.
   o   Suicide terrorism should be considered as a strategic tool.
   o   Suicide terrorism gives a small group the power to coerce large
       governments.
   o   Suicide terrorists tend to be more lethal than other types of attacks.
       o They strike greater fear in the target audience.
       o Each attack hints at future horrific violence.
       o It is a strategy designed to multiply expectations of political victory.
Suicide Attacks – Conflicting Opinions
  Theory of suicide terrorism
  Pape:
   o Three factors must be in place prior to a
     suicide terror campaign:
      Nationalistic or ethnic group must be resisting the
       occupation of a foreign power.
      Foreign power must represent a democratic
       government whose voters will not allow
       indiscriminate slaughter and total repression of the
       people in occupied area.
      Difference in religions of the occupying power and
       the people living under occupation.
Suicide Attacks – Conflicting Opinions
  Suicide terrorism is not caused by a
   single religion; it is caused by differences
   between two religions.
  Pape’s evidence from case studies:
    o Israeli occupation of the Shi’ite areas of Lebanon
    o The Sinhalese (Buddhist) control of the Tamil
      (Hindu) region of Sri Lanka
    o The fighting between Sunni Kurds and Sunni Turks
      in Eastern Turkey
    o The Indian (Hindu) struggle with the occupied Sikhs
Models for Suicide Bombing
 Tosini :
  o   Suicide bombings are based on a strategic logic; a rational
      choice perspective.
  o   This neglects the study of the social structure and culture of
      the group engaged in suicide terrorism.

 Wade and Reiter:
  o   Suicide attacks are not used mainly against democracies.
  o   Muslim states suffer more suicide attacks than Western
      democracies.
 Gunaratna:
  o   All suicide bombing attacks have three things in common:
       Secrecy
       Reconnaissance
       Rehearsal

More Related Content

What's hot

White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14difordham
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.ravitaurus
 
10 terrorism
10 terrorism10 terrorism
10 terrorismfatima d
 
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff Hoffmann
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff HoffmannAUSISTest_NSDM Take Home (10 Jun 2011)_Jeff Hoffmann
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff HoffmannJeff Hoffmann
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
United states regime and support for terrorism
United states regime and support for terrorismUnited states regime and support for terrorism
United states regime and support for terrorismi321908
 
Homegrown violent extremism homegrown violent extremism
Homegrown violent extremism homegrown violent extremismHomegrown violent extremism homegrown violent extremism
Homegrown violent extremism homegrown violent extremismmodi11
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismElizabeth Hall
 
What is terrorism
What is terrorismWhat is terrorism
What is terrorismazamhicks
 
Triumph of conservatism 1969-1988
Triumph of conservatism 1969-1988Triumph of conservatism 1969-1988
Triumph of conservatism 1969-1988Heather Powell
 

What's hot (17)

White7e ppt ch14
White7e ppt ch14White7e ppt ch14
White7e ppt ch14
 
0647515
06475150647515
0647515
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
10 terrorism
10 terrorism10 terrorism
10 terrorism
 
4GW
4GW4GW
4GW
 
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff Hoffmann
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff HoffmannAUSISTest_NSDM Take Home (10 Jun 2011)_Jeff Hoffmann
AUSISTest_NSDM Take Home (10 Jun 2011)_Jeff Hoffmann
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Envision brief
Envision briefEnvision brief
Envision brief
 
United states regime and support for terrorism
United states regime and support for terrorismUnited states regime and support for terrorism
United states regime and support for terrorism
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
Glorifying%20terror%20offence%20htb
Glorifying%20terror%20offence%20htbGlorifying%20terror%20offence%20htb
Glorifying%20terror%20offence%20htb
 
4 g wfinal (2)
4 g wfinal (2)4 g wfinal (2)
4 g wfinal (2)
 
Criminology 2016
Criminology 2016Criminology 2016
Criminology 2016
 
Homegrown violent extremism homegrown violent extremism
Homegrown violent extremism homegrown violent extremismHomegrown violent extremism homegrown violent extremism
Homegrown violent extremism homegrown violent extremism
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And Terrorism
 
What is terrorism
What is terrorismWhat is terrorism
What is terrorism
 
Triumph of conservatism 1969-1988
Triumph of conservatism 1969-1988Triumph of conservatism 1969-1988
Triumph of conservatism 1969-1988
 

Similar to White7e ppt ch05

Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorismAbdulAzeez938159
 
White7e ppt ch01
White7e ppt ch01White7e ppt ch01
White7e ppt ch01difordham
 
White7e ppt ch03
White7e ppt ch03White7e ppt ch03
White7e ppt ch03difordham
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear ProlifeerationAbdelhamied El-Rafie
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationAbdelhamied El-Rafie
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorismsaundriya
 
International issues terrorism
International issues terrorismInternational issues terrorism
International issues terrorismRajeshKumawat42
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
 
The Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismThe Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismMahmudur Rahman Shojib
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsRuhull
 

Similar to White7e ppt ch05 (20)

Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorism
 
White7e ppt ch01
White7e ppt ch01White7e ppt ch01
White7e ppt ch01
 
White7e ppt ch03
White7e ppt ch03White7e ppt ch03
White7e ppt ch03
 
Terrorism 2010
Terrorism 2010Terrorism 2010
Terrorism 2010
 
Terrorism & Nuclear Prolifeeration
Terrorism &  Nuclear  ProlifeerationTerrorism &  Nuclear  Prolifeeration
Terrorism & Nuclear Prolifeeration
 
Terrorism & nuclear prolifeeration
Terrorism & nuclear prolifeerationTerrorism & nuclear prolifeeration
Terrorism & nuclear prolifeeration
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Defining terrorism..2
Defining terrorism..2Defining terrorism..2
Defining terrorism..2
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorism
 
International issues terrorism
International issues terrorismInternational issues terrorism
International issues terrorism
 
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
 
Terrorism
TerrorismTerrorism
Terrorism
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 
Terrorism
TerrorismTerrorism
Terrorism
 
The Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismThe Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent Terrorism
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politics
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 

More from difordham

Schm5e ppt ch17
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17difordham
 
Ppt chapter 14
Ppt chapter 14Ppt chapter 14
Ppt chapter 14difordham
 
Ppt chapter 7
Ppt chapter 7Ppt chapter 7
Ppt chapter 7difordham
 
Ppt chapter 16
Ppt chapter 16Ppt chapter 16
Ppt chapter 16difordham
 
Ppt chapter 15
Ppt chapter 15Ppt chapter 15
Ppt chapter 15difordham
 
Ppt chapter 13
Ppt chapter 13Ppt chapter 13
Ppt chapter 13difordham
 
Ppt chapter 12
Ppt chapter 12Ppt chapter 12
Ppt chapter 12difordham
 
Ppt chapter 11
Ppt chapter 11Ppt chapter 11
Ppt chapter 11difordham
 
Ppt chapter 10
Ppt chapter 10Ppt chapter 10
Ppt chapter 10difordham
 
Ppt chapter 9
Ppt chapter 9Ppt chapter 9
Ppt chapter 9difordham
 
Ppt chapter 8
Ppt chapter 8Ppt chapter 8
Ppt chapter 8difordham
 
Ppt chapter 6
Ppt chapter 6Ppt chapter 6
Ppt chapter 6difordham
 
Ppt chapter 5
Ppt chapter 5Ppt chapter 5
Ppt chapter 5difordham
 
Ppt chapter 4
Ppt chapter 4Ppt chapter 4
Ppt chapter 4difordham
 
Ppt chapter 3
Ppt chapter 3Ppt chapter 3
Ppt chapter 3difordham
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2difordham
 
Ppt chapter 1
Ppt chapter 1Ppt chapter 1
Ppt chapter 1difordham
 
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2edCh 12 separation agreements 2ed
Ch 12 separation agreements 2eddifordham
 
Ch 14 adoption 2ed
Ch 14 adoption 2edCh 14 adoption 2ed
Ch 14 adoption 2eddifordham
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violencedifordham
 

More from difordham (20)

Schm5e ppt ch17
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17
 
Ppt chapter 14
Ppt chapter 14Ppt chapter 14
Ppt chapter 14
 
Ppt chapter 7
Ppt chapter 7Ppt chapter 7
Ppt chapter 7
 
Ppt chapter 16
Ppt chapter 16Ppt chapter 16
Ppt chapter 16
 
Ppt chapter 15
Ppt chapter 15Ppt chapter 15
Ppt chapter 15
 
Ppt chapter 13
Ppt chapter 13Ppt chapter 13
Ppt chapter 13
 
Ppt chapter 12
Ppt chapter 12Ppt chapter 12
Ppt chapter 12
 
Ppt chapter 11
Ppt chapter 11Ppt chapter 11
Ppt chapter 11
 
Ppt chapter 10
Ppt chapter 10Ppt chapter 10
Ppt chapter 10
 
Ppt chapter 9
Ppt chapter 9Ppt chapter 9
Ppt chapter 9
 
Ppt chapter 8
Ppt chapter 8Ppt chapter 8
Ppt chapter 8
 
Ppt chapter 6
Ppt chapter 6Ppt chapter 6
Ppt chapter 6
 
Ppt chapter 5
Ppt chapter 5Ppt chapter 5
Ppt chapter 5
 
Ppt chapter 4
Ppt chapter 4Ppt chapter 4
Ppt chapter 4
 
Ppt chapter 3
Ppt chapter 3Ppt chapter 3
Ppt chapter 3
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
 
Ppt chapter 1
Ppt chapter 1Ppt chapter 1
Ppt chapter 1
 
Ch 12 separation agreements 2ed
Ch 12 separation agreements 2edCh 12 separation agreements 2ed
Ch 12 separation agreements 2ed
 
Ch 14 adoption 2ed
Ch 14 adoption 2edCh 14 adoption 2ed
Ch 14 adoption 2ed
 
Ch 13 family violence
Ch 13 family violenceCh 13 family violence
Ch 13 family violence
 

White7e ppt ch05

  • 1. Jonathan R. White www.cengage.com/cj/white Chapter: 5 Practicing Terrorism: Gender Roles, Tactics and Force Multipliers Rosemary Arway Hodges University
  • 2. Gender and Mission  Gender and Mission o Ideology draws certain types of recruits to a movement, and it influences the tactics terrorist groups employ. ▪ Gender impacts tactics and is often related to ideology. o Women active through the evolution of terrorism ▪ Role of women has often been overlooked ▪ Women were active in terrorism: ▪ at the time of the French Revolution, ▪ in 19th century Russia, ▪ in racial terrorism in the United States, ▪ in revolutionary terrorism in Ireland and leftist movements after 1968.  The role of women is more closely related to political orientation than tactics.
  • 3. Gender and Mission  Gonzalez-Perez: o Women are more drawn to domestic terrorist groups. o Women in domestic groups gravitate toward combat and leadership. o Women in international groups are more likely to be employed as supporters, sympathizers and spies.  Ness: o Women relegated to support and service in religious terrorist groups. ▪ This will change as women become more involved. o Women developed combat and leadership positions in secular organizations.
  • 4. Gender and Mission  Blee: o The role of women in racial terrorism in the United States: ▪ In the post-Civil War era, they served as inspiration for male violence. ▪ In the 20th century women became actively involved in lynching. ▪ In the late twentieth century, White Supremacy groups recruited women in support roles.
  • 5. Gender and Mission  Overlooking Female terrorists o Stack-O’Connor: ▪ Female terrorism is overlooked for the same reason that female criminality has been underplayed: researchers do not think of women as criminals, but rather, as victims. o Ness: ▪ Popular culture does not accept the idea of female terrorists. o von Knop: ▪ Women used as attackers or suicide bombers are following male model. o Sjoberg: ▪ Studies of women in terrorism are generally ignored. ▪ Media presentations follow the same track.
  • 6. Tactics of Terrorism and Multiplying Force  Jenkins reports six tactics of terrorism: o Bombing o Hijacking o Arson o Assault o Kidnapping o Hostage taking  Terrorism includes threats from weapons of mass destruction and virtual attacks through computer systems.
  • 7. Tactics of Terrorism and Multiplying Force  This tactics of terrorism can be enhanced by force multipliers.  Force multipliers o increase striking power without increasing the strength of a unit  Force multipliers giving terrorists more striking power include: o Technology o Media coverage o Transnational support networks o Religious fanaticism
  • 8. Tactics of Terrorism and Multiplying Force  Most common weapon of terrorism is the bomb.  Anarchists in 1848 – philosophy of the bomb o Only way to communicate with the social order was to destroy it.  Irish Republican Army found the bomb to be the most important weapon after 1969.  Groups throughout the world found bombs could be delivered by suicide attackers o Suicide bombings and road side bombs are weapons of choice against U.S. military in Iraq.
  • 9. Tactics of Terrorism and Multiplying Force  Terrorists increase effectiveness by applying explosive technology to weapons.  Middle Eastern type of military-style weapon o Thermobaric bomb o Mini-nuke  Force multipliers enhance destructive power while innovation is used to achieve shock and surprise.  Purpose of a terrorist attack – send a message of chaos and destruction to a larger audience. o Victims are not the target; they are killed to send a message.
  • 10. Technology  Terrorism is influenced by technology  Cyberterrorism o Cyberterrorists threaten to interrupt or confuse the flow of information. o Cyberterrorism refers to use of computers to attack technological targets of physical attacks on computer networks. o Targets for cyberterrorism: ▪ Computers ▪ Computer networks ▪ Information storage and retrieval systems o There has been a sharp rise in such attacks, with the Internet providing the vehicle for launching most of the strikes.
  • 11. WMD: Biological Agents  Weapons of Mass Destruction – WMD – are biological arsenals containing bacterial and viral weapons. o Microbes weaponized to increase their ability to kill o Difficult to control but relatively easy to produce  Biological agents include: o Natural poisons or toxins o Viruses o Bacteria o Plagues  Most threatening according to CDC are: o Smallpox o Anthrax o Plague o Botulism o Tularemia o Hemorrhagic fever
  • 12. WMD: Biological Agents  Two biological attacks in America o 1984 religious group in Oregon ▪ Bacteria on a salad bar ▪ Elect religious followers to local office o Anthrax in the wake of 9-11 ▪ Two tabloid writers infected thru the mail ▪ Followed by numerous anthrax attacks throughout the United States o The Commission on the Prevention of weapons of Mass Destruction Proliferation and Terrorism (2010) found that the United States still had no structure in place to respond to a biological attack.
  • 13. WMD: Chemical and Radiological Weapons  Forms of chemical alterations include: o Radiological poisoning and “dirty” radioactive devices  Chemicals: o Generally easier to deliver than biological weapons o Faster acting  Radiological devices: o Slower than most chemicals o Longer lasting o Can be spread like chemicals
  • 14. WMD: Chemical and Radiological Weapons  Four types of chemical agents: o Nerve agents ▪ Ingestion, respiration, or contact o Blood agents ▪ Absorbed through the respiratory system o Choking agents ▪ Absorbed through the respiratory system o Blistering agents ▪ Burn skin and internal tissue areas upon contact
  • 15. WMD: Chemical and Radiological Weapons  Chemicals are attractive to terrorists. o Easy to control o Users can avoid area they attack  Chemical weapons are problematic. o Delivery mechanism o Need for large quantities of chemicals o Chemicals can be neutralized by weather patterns, air, and water.  Dirty bomb o Explosive used to spread a chemical or radioactive agent around a large area o Drawback of the dirty bomb ▪ The heat produced by the explosion may destroy the chemicals attached to the bomb
  • 16. WMD: Nuclear Weapons  Nuclear weapons o Available on the black market from sources in the former Soviet Union. o It is much easier for terrorists to use a conventional weapon or to spread chemicals than to build a nuclear weapon. o The U.S. Congress has designated a site in Nevada as the repository for all the radioactive waste used in America’s nuclear power plants, and all this material must be shipped across the country.  This nuclear waste is a ready-made dirty bomb
  • 17. WMD: Nuclear Weapons  Nuclear terrorism: o Two methods for obtaining a nuclear device: ▪ Highly Enriched Uranium (HEU) ▪ Plutonium  Levi: o The United States is not ready for an attack. o Problems associated with terrorist’s attempts to obtain a weapon:  Sophisticated security mechanisms  National arsenals are secured  Weapons are heavy and difficult to transport o The United States should approach nuclear terrorism in two manners:  debunking popular myths and focusing on a comprehensive approach to a terrorist group and all its activities;  revamp defense systems.
  • 18. WMD  WMD …. an international problem o All countries should encourage their nuclear companies to control their trade. ▪ Prohibit sales of nuclear goods to those countries that sponsor or support terrorism. ▪ For example Uzbekistan, the biggest exporter of nuclear materials (uranium) and fuels (natural gas, petroleum), must regulate their nuclear industry.
  • 19. The Media as A Force Multiplier  Governments and terrorists benefit from media portrayal of terrorist activity.  Everyone involved in terrorist conflict tries to manipulate images of terrorist activities. o Continuous reporting amplifies the aura of small groups o Striking power of the group is magnified o Wilkins: terrorists try to multiply force through communication
  • 20. The Media as A Force Multiplier  Nacos: Most terrorist groups have objectives beyond publicity o Groups want recognition  Wolfsfeld: Media victories are crucial for terrorism o How battles are reported as important as battlefield combat o Neither side wants to be portrayed as aggressor o Media primary tool for demonizing the enemy  Terrorist groups will attempt to portray respectability in all forms of media.
  • 21. The Media as A Force Multiplier  All forms of media can be used to multiply force. o Internet is gaining attention of security forces  Online communication brings measure of freedom when media is heavily controlled  Emerging as a major source of information  Krasnoboka: The Internet does not have an overwhelming impact in democratic countries, but it is a powerful tool for opposition forces in authoritarian régimes. o Movies assist terrorism and distort issues • Create popular images of propaganda • Responsible for strong emotional projections • Presents another venue for examination, for both assisting terrorism and distorting issues
  • 22. Economic Targeting and Transnational Attacks  Transnational support or operations can be used as a force multiplier. o Striking transnational or international economic targets increases the effectiveness of terrorist operations.  Three types of transnational attacks: o Tourism o Energy o Shipping
  • 23. Economic Targeting and Transnational Attacks  Tourism o Attacks on tourism have a negative economic consequences (ETA).  Energy o Interest in oil and gas production o Fossil fuels present tempting targets.  Represent power and strengths of industrialized world.  Strikes against oil refineries or transfer facilities have economic impact on the West.  Examples: Iraq, Saudi Arabia, Pakistan
  • 24. Economic Targeting and Transnational Attacks  Endemic terrorism o Form of violence occurring in Africa where arbitrary national boundaries have been drawn through ethnic and tribal divisions  Niger Delta o Oil plays crucial role  Used to fund endemic terrorism and corrupt governments o Becomes target for those who cannot control production  Oil companies investing in the area have greater incentive to focus on security than poverty engulfing the region.  If poverty, endemic terrorism and criminalized policies are not addressed it will: o Become base for emergence of new international terrorist groups o Provide resources for training and eluding detection
  • 25. Economic Targeting and Transnational Attacks  Transportation o Provide tempting economic target as they produce mass casualties with minimal effort. o Protection of transportation is very expensive.  Major feature of homeland security o Critics of homeland security policies argue that ports remain unsecured due to costs of increased protection.  Attacks on aviation, shipping and transportation increase cost of security.
  • 26. Suicide Attacks – Conflicting Opinions  Gambetta’s three types of suicide attacks: o Suicide in warfare o Suicide for a principle without killing others o Suicide terrorism  Altruistic suicide: suicide terrorists frequently believe they are sacrificing their lives for a greater good.  Pape: o Attackers are so diverse, it may not be possible to find a single profile. o Suicide terrorism should be considered as a strategic tool. o Suicide terrorism gives a small group the power to coerce large governments. o Suicide terrorists tend to be more lethal than other types of attacks. o They strike greater fear in the target audience. o Each attack hints at future horrific violence. o It is a strategy designed to multiply expectations of political victory.
  • 27. Suicide Attacks – Conflicting Opinions  Theory of suicide terrorism  Pape: o Three factors must be in place prior to a suicide terror campaign:  Nationalistic or ethnic group must be resisting the occupation of a foreign power.  Foreign power must represent a democratic government whose voters will not allow indiscriminate slaughter and total repression of the people in occupied area.  Difference in religions of the occupying power and the people living under occupation.
  • 28. Suicide Attacks – Conflicting Opinions  Suicide terrorism is not caused by a single religion; it is caused by differences between two religions.  Pape’s evidence from case studies: o Israeli occupation of the Shi’ite areas of Lebanon o The Sinhalese (Buddhist) control of the Tamil (Hindu) region of Sri Lanka o The fighting between Sunni Kurds and Sunni Turks in Eastern Turkey o The Indian (Hindu) struggle with the occupied Sikhs
  • 29. Models for Suicide Bombing  Tosini : o Suicide bombings are based on a strategic logic; a rational choice perspective. o This neglects the study of the social structure and culture of the group engaged in suicide terrorism.  Wade and Reiter: o Suicide attacks are not used mainly against democracies. o Muslim states suffer more suicide attacks than Western democracies.  Gunaratna: o All suicide bombing attacks have three things in common:  Secrecy  Reconnaissance  Rehearsal