SlideShare uma empresa Scribd logo
1 de 17
Part IV: Final AnalysisPart IV: Final Analysis
Chapter 13: CounterterrorismChapter 13: Counterterrorism
The OptionsThe Options
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Use of ForceUse of Force
 Operations Other than War (OOTW)Operations Other than War (OOTW)
 Legalistic OptionsLegalistic Options
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Suppression CampaignsSuppression Campaigns
 Military suppression campaigns.Military suppression campaigns.
 Case: Operation Enduring Freedom.Case: Operation Enduring Freedom.
 Case: Operation Peace for Galilee.Case: Operation Peace for Galilee.
 Paramilitary suppression campaigns.Paramilitary suppression campaigns.
 Case: Algeria.Case: Algeria.
 Case: Colombia.Case: Colombia.
 Punitive and preemptive strikes.Punitive and preemptive strikes.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Coercive Covert OperationsCoercive Covert Operations
 ““War in the shadows.”War in the shadows.”
 Case: The Achille Lauro operation.Case: The Achille Lauro operation.
 Case: Assassinations.Case: Assassinations.
 Special Operations ForcesSpecial Operations Forces
 Elite military and police units specializing inElite military and police units specializing in
unconventional operations.unconventional operations.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Nonviolent Covert OperationsNonviolent Covert Operations
 Encompasses a number of options.Encompasses a number of options.
 Inherently secretive. Often creative.Inherently secretive. Often creative.
 Examples:Examples:
 Infiltration.Infiltration.
 Disinformation.Disinformation.
 CyberwarCyberwar
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 IntelligenceIntelligence
 SIGINT (Signal Intelligence)SIGINT (Signal Intelligence)
 HUMINT (Human Intelligence)HUMINT (Human Intelligence)
 Intelligence agencies.Intelligence agencies.
 Problems of intelligence coordination.Problems of intelligence coordination.
 Enhanced SecurityEnhanced Security
 Target hardening.Target hardening.
 Case: Morocco’s desert wall.Case: Morocco’s desert wall.
 Case: Israel’s walls on the border.Case: Israel’s walls on the border.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Economic SanctionsEconomic Sanctions
 Directed against governments.Directed against governments.
 Conditions for success.Conditions for success.
 Cooperation must remain firm.Cooperation must remain firm.
 Trade leaks must be controlled.Trade leaks must be controlled.
 SanctionedSanctioned regimeregime must be made to suffer.must be made to suffer.
 Problems.Problems.
 Sanctioned regimes rarely suffer—their people do.Sanctioned regimes rarely suffer—their people do.
 Coalitions do not always remain firm.Coalitions do not always remain firm.
 Leaks are difficult to control.Leaks are difficult to control.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Diplomatic OptionsDiplomatic Options
 Reasoned dialogue.Reasoned dialogue.
 Peace processes.Peace processes.
 Negotiations.Negotiations.
 Social ReformSocial Reform
 Responding to underlying grievances.Responding to underlying grievances.
 Case: Peru and Shining Path.Case: Peru and Shining Path.
 Case: Spain and ETA.Case: Spain and ETA.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Concessionary OptionsConcessionary Options
 Giving the terrorists what they want.Giving the terrorists what they want.
 Examples:Examples:
 Payment of ransoms.Payment of ransoms.
 Releases of imprisoned comrades.Releases of imprisoned comrades.
 Broadcast or publication of extremist propaganda.Broadcast or publication of extremist propaganda.
 Political amnesty.Political amnesty.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Law Enforcement and CounterterrorismLaw Enforcement and Counterterrorism
 Responding to terrorist environments.Responding to terrorist environments.
 Terrorism as inherently criminal behavior under law.Terrorism as inherently criminal behavior under law.
 Taking the lead in investigating terrorist incidents.Taking the lead in investigating terrorist incidents.
 Police repression.Police repression.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 Domestic Laws and CounterterrorismDomestic Laws and Counterterrorism
 Balancing the need for counterterrorist laws and theBalancing the need for counterterrorist laws and the
protection of constitutional rights.protection of constitutional rights.
 Cases:Cases:
 Counterterrorist courts in Algeria.Counterterrorist courts in Algeria.
 Amnesty in Italy.Amnesty in Italy.
 Outcome of the Achille Lauro incident.Outcome of the Achille Lauro incident.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
 International LawInternational Law
 Responses by the world community.Responses by the world community.
 International conventions on hijacking offenses.International conventions on hijacking offenses.
 Protecting diplomats.Protecting diplomats.
 Extradition treaties.Extradition treaties.
 International courts and tribunals.International courts and tribunals.
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016

Mais conteúdo relacionado

Mais procurados (7)

Understanding terror 5e ch 07
Understanding terror 5e ch 07Understanding terror 5e ch 07
Understanding terror 5e ch 07
 
Understanding terror 5e ch 02
Understanding terror 5e ch 02Understanding terror 5e ch 02
Understanding terror 5e ch 02
 
Understanding terror 5e ch 05
Understanding terror 5e ch 05Understanding terror 5e ch 05
Understanding terror 5e ch 05
 
Understanding terror 5e ch 03
Understanding terror 5e ch 03Understanding terror 5e ch 03
Understanding terror 5e ch 03
 
Understanding terror 5e ch 04
Understanding terror 5e ch 04Understanding terror 5e ch 04
Understanding terror 5e ch 04
 
Understanding terror 5e ch 06
Understanding terror 5e ch 06Understanding terror 5e ch 06
Understanding terror 5e ch 06
 
Third Generation Terrorism And Crisis Management
Third Generation Terrorism And Crisis ManagementThird Generation Terrorism And Crisis Management
Third Generation Terrorism And Crisis Management
 

Semelhante a Understanding terror 5e ch 13 (8)

Understanding hs ch 04
Understanding hs ch 04Understanding hs ch 04
Understanding hs ch 04
 
Understanding hs ch 13
Understanding hs ch 13Understanding hs ch 13
Understanding hs ch 13
 
Understanding hs ch 07
Understanding hs ch 07Understanding hs ch 07
Understanding hs ch 07
 
"A Visceral Response to GUN CONTROL is not the Answer" by Frank Ricci, Gary C...
"A Visceral Response to GUN CONTROL is not the Answer" by Frank Ricci, Gary C..."A Visceral Response to GUN CONTROL is not the Answer" by Frank Ricci, Gary C...
"A Visceral Response to GUN CONTROL is not the Answer" by Frank Ricci, Gary C...
 
Understanding hs ch 08
Understanding hs ch 08Understanding hs ch 08
Understanding hs ch 08
 
Understanding hs ch 03
Understanding hs ch 03Understanding hs ch 03
Understanding hs ch 03
 
DECAF (report)
DECAF (report)DECAF (report)
DECAF (report)
 
Suicidal attacks
Suicidal attacksSuicidal attacks
Suicidal attacks
 

Mais de erothmanjsu (8)

Understanding hs ch 12
Understanding hs ch 12Understanding hs ch 12
Understanding hs ch 12
 
Understanding hs ch 11
Understanding hs ch 11Understanding hs ch 11
Understanding hs ch 11
 
Understanding hs ch 10
Understanding hs ch 10Understanding hs ch 10
Understanding hs ch 10
 
Understanding hs ch 09
Understanding hs ch 09Understanding hs ch 09
Understanding hs ch 09
 
Understanding hs ch 06
Understanding hs ch 06Understanding hs ch 06
Understanding hs ch 06
 
Understanding hs ch 05
Understanding hs ch 05Understanding hs ch 05
Understanding hs ch 05
 
Understanding hs ch 02
Understanding hs ch 02Understanding hs ch 02
Understanding hs ch 02
 
Understanding hs ch 01
Understanding hs ch 01Understanding hs ch 01
Understanding hs ch 01
 

Último

Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
alinstan901
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
SandaliGurusinghe2
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
AllTops
 

Último (17)

Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysis
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in DelhiIndependent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 

Understanding terror 5e ch 13

  • 1. Part IV: Final AnalysisPart IV: Final Analysis Chapter 13: CounterterrorismChapter 13: Counterterrorism The OptionsThe Options Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 2.  Use of ForceUse of Force  Operations Other than War (OOTW)Operations Other than War (OOTW)  Legalistic OptionsLegalistic Options Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 3. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 4.  Suppression CampaignsSuppression Campaigns  Military suppression campaigns.Military suppression campaigns.  Case: Operation Enduring Freedom.Case: Operation Enduring Freedom.  Case: Operation Peace for Galilee.Case: Operation Peace for Galilee.  Paramilitary suppression campaigns.Paramilitary suppression campaigns.  Case: Algeria.Case: Algeria.  Case: Colombia.Case: Colombia.  Punitive and preemptive strikes.Punitive and preemptive strikes. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 5.  Coercive Covert OperationsCoercive Covert Operations  ““War in the shadows.”War in the shadows.”  Case: The Achille Lauro operation.Case: The Achille Lauro operation.  Case: Assassinations.Case: Assassinations.  Special Operations ForcesSpecial Operations Forces  Elite military and police units specializing inElite military and police units specializing in unconventional operations.unconventional operations.Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 6. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 7.  Nonviolent Covert OperationsNonviolent Covert Operations  Encompasses a number of options.Encompasses a number of options.  Inherently secretive. Often creative.Inherently secretive. Often creative.  Examples:Examples:  Infiltration.Infiltration.  Disinformation.Disinformation.  CyberwarCyberwar Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 8.  IntelligenceIntelligence  SIGINT (Signal Intelligence)SIGINT (Signal Intelligence)  HUMINT (Human Intelligence)HUMINT (Human Intelligence)  Intelligence agencies.Intelligence agencies.  Problems of intelligence coordination.Problems of intelligence coordination.  Enhanced SecurityEnhanced Security  Target hardening.Target hardening.  Case: Morocco’s desert wall.Case: Morocco’s desert wall.  Case: Israel’s walls on the border.Case: Israel’s walls on the border. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 9.  Economic SanctionsEconomic Sanctions  Directed against governments.Directed against governments.  Conditions for success.Conditions for success.  Cooperation must remain firm.Cooperation must remain firm.  Trade leaks must be controlled.Trade leaks must be controlled.  SanctionedSanctioned regimeregime must be made to suffer.must be made to suffer.  Problems.Problems.  Sanctioned regimes rarely suffer—their people do.Sanctioned regimes rarely suffer—their people do.  Coalitions do not always remain firm.Coalitions do not always remain firm.  Leaks are difficult to control.Leaks are difficult to control.Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 10. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 11.  Diplomatic OptionsDiplomatic Options  Reasoned dialogue.Reasoned dialogue.  Peace processes.Peace processes.  Negotiations.Negotiations.  Social ReformSocial Reform  Responding to underlying grievances.Responding to underlying grievances.  Case: Peru and Shining Path.Case: Peru and Shining Path.  Case: Spain and ETA.Case: Spain and ETA.Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 12.  Concessionary OptionsConcessionary Options  Giving the terrorists what they want.Giving the terrorists what they want.  Examples:Examples:  Payment of ransoms.Payment of ransoms.  Releases of imprisoned comrades.Releases of imprisoned comrades.  Broadcast or publication of extremist propaganda.Broadcast or publication of extremist propaganda.  Political amnesty.Political amnesty. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 13. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 14.  Law Enforcement and CounterterrorismLaw Enforcement and Counterterrorism  Responding to terrorist environments.Responding to terrorist environments.  Terrorism as inherently criminal behavior under law.Terrorism as inherently criminal behavior under law.  Taking the lead in investigating terrorist incidents.Taking the lead in investigating terrorist incidents.  Police repression.Police repression. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 15.  Domestic Laws and CounterterrorismDomestic Laws and Counterterrorism  Balancing the need for counterterrorist laws and theBalancing the need for counterterrorist laws and the protection of constitutional rights.protection of constitutional rights.  Cases:Cases:  Counterterrorist courts in Algeria.Counterterrorist courts in Algeria.  Amnesty in Italy.Amnesty in Italy.  Outcome of the Achille Lauro incident.Outcome of the Achille Lauro incident. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 16.  International LawInternational Law  Responses by the world community.Responses by the world community.  International conventions on hijacking offenses.International conventions on hijacking offenses.  Protecting diplomats.Protecting diplomats.  Extradition treaties.Extradition treaties.  International courts and tribunals.International courts and tribunals. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
  • 17. Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016