How Software Developers Destroy Business Value.pptx
Understanding terror 5e ch 13
1. Part IV: Final AnalysisPart IV: Final Analysis
Chapter 13: CounterterrorismChapter 13: Counterterrorism
The OptionsThe Options
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
2. Use of ForceUse of Force
Operations Other than War (OOTW)Operations Other than War (OOTW)
Legalistic OptionsLegalistic Options
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
5. Coercive Covert OperationsCoercive Covert Operations
““War in the shadows.”War in the shadows.”
Case: The Achille Lauro operation.Case: The Achille Lauro operation.
Case: Assassinations.Case: Assassinations.
Special Operations ForcesSpecial Operations Forces
Elite military and police units specializing inElite military and police units specializing in
unconventional operations.unconventional operations.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
9. Economic SanctionsEconomic Sanctions
Directed against governments.Directed against governments.
Conditions for success.Conditions for success.
Cooperation must remain firm.Cooperation must remain firm.
Trade leaks must be controlled.Trade leaks must be controlled.
SanctionedSanctioned regimeregime must be made to suffer.must be made to suffer.
Problems.Problems.
Sanctioned regimes rarely suffer—their people do.Sanctioned regimes rarely suffer—their people do.
Coalitions do not always remain firm.Coalitions do not always remain firm.
Leaks are difficult to control.Leaks are difficult to control.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
11. Diplomatic OptionsDiplomatic Options
Reasoned dialogue.Reasoned dialogue.
Peace processes.Peace processes.
Negotiations.Negotiations.
Social ReformSocial Reform
Responding to underlying grievances.Responding to underlying grievances.
Case: Peru and Shining Path.Case: Peru and Shining Path.
Case: Spain and ETA.Case: Spain and ETA.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
12. Concessionary OptionsConcessionary Options
Giving the terrorists what they want.Giving the terrorists what they want.
Examples:Examples:
Payment of ransoms.Payment of ransoms.
Releases of imprisoned comrades.Releases of imprisoned comrades.
Broadcast or publication of extremist propaganda.Broadcast or publication of extremist propaganda.
Political amnesty.Political amnesty.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
14. Law Enforcement and CounterterrorismLaw Enforcement and Counterterrorism
Responding to terrorist environments.Responding to terrorist environments.
Terrorism as inherently criminal behavior under law.Terrorism as inherently criminal behavior under law.
Taking the lead in investigating terrorist incidents.Taking the lead in investigating terrorist incidents.
Police repression.Police repression.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
15. Domestic Laws and CounterterrorismDomestic Laws and Counterterrorism
Balancing the need for counterterrorist laws and theBalancing the need for counterterrorist laws and the
protection of constitutional rights.protection of constitutional rights.
Cases:Cases:
Counterterrorist courts in Algeria.Counterterrorist courts in Algeria.
Amnesty in Italy.Amnesty in Italy.
Outcome of the Achille Lauro incident.Outcome of the Achille Lauro incident.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
16. International LawInternational Law
Responses by the world community.Responses by the world community.
International conventions on hijacking offenses.International conventions on hijacking offenses.
Protecting diplomats.Protecting diplomats.
Extradition treaties.Extradition treaties.
International courts and tribunals.International courts and tribunals.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016