Tactics of terrorism

Tactics of terrorism

Terrorist groups use various tactics to maximize fear and publicity. Terrorist organizations usually methodically plan attacks in advance, and may train participants, plant "undercover" agents, and raise money from supporters or through organized crime. Communication may occur through modern telecommunications, or through old-fashioned methods such as couriers.

Methods of attack

While terrorists act according to different motivations and goals, all such groups have one tactic in common: intimidation or coercion of the public or the government in order to affect social or political change. [http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=browse_usc&docid=Cite:+18USC2331] Terrorism uses violence, or threat of violence, against one portion of a society to compel the greater body of that society or their leaders to make a change out of fear. Terrorism often exploits propaganda techniques to ensure the public receives the intended message. The term Propaganda of the Deed, coined by Malatesta, Cafiero, and Covelli, states that the message is most strongly conveyed through violence. [ Garrison, Arthur. 2004. "Defining Terrorism". Criminal Justice Studies. Vol 17. pp. 259-279]

In the media, terrorist violence is most commonly portrayed as being carried out via an improvised explosive device, although chemical weapons have been used on occasion. Vehicles from pick-up trucks to planes, like in the September 11, 2001 attacks, have been used as guided incendiary device. In the failed 2002 airliner attack shoulder-launched surface-to-air missiles were fired at an airliner while taking off. Concerns have also been raised regarding attacks involving nuclear weapons or biological weapons. However, despite the popular image of terrorism as bombings alone, and the large number of casualties and higher media impact associated with bombings, conventional firearms are as much if not more pervasive in their use. [cite web |author=United Nations Office on Drugs and Crime |title=Conventional Terrorist Weapons |url=http://www.unodc.org/unodc/terrorism_weapons_conventional.html |accessdate=2007-09-06 ] In 2004, the European Council recognized the "need to ensure terrorist organisations and groups are starved of the components of their trade," including “the need to ensure greater security of firearms, explosives, bomb-making equipment and technologies that contribute to the perpetration of terrorist outrages." [http://ec.europa.eu/justice_home/fsj/terrorism/prevention/fsj_terrorism_prevention_explosives_en.htm]

Terrorist groups may arrange for secondary devices to detonate at a slightly later time in order to kill emergency-response personnel attempting to attend to the dead and wounded. Repeated or suspected use of secondary devices can also delay emergency response out of concern that such devices may exist. Examples include a (failed) device that was meant to release cyanide-gas during the February 26, 1993 World Trade Center bombing; and a second car bomb that detonated 20 minutes after the December 1, 2001 Ben Yehuda Street Bombing by Hamas in Jerusalem.

Training

There are and have been training camps for terrorists. The range of training depends greatly on the level of support the terrorist organization receives from various organizations and states. In nearly every case the training incorporates the philosophy and agenda of the groups leadership as justification for the training as well as the potential acts of terrorism which may be committed. State sanctioned training is by far the most extensive and thorough, often employing professional soldiers and covert operatives of the supporting state. The quality of training is inconsistent, as evidenced by the following photo. Technique showed in use of these firearms is archaic and outdated. Fact|date=June 2008

Preparation

Preparation of a major attack such as the September 11, 2001 attacks may take years, whereas a simpler attack, depending on the availability of arms, may be almost spontaneous.Fact|date=April 2007

Cover

Where terrorism occurs in the context of open warfare or insurgency, its perpetrators may shelter behind a section of the local population. Examples include the Intifada on Israeli-occupied territory, and insurgency in Iraq. This population, which may be ethnically distinct from the counter-terrorist forces, is either sympathetic to their cause, indifferent, or acts under duress.

Terrorists preparing for the September 11, 2001 attacks changed their appearance to avoid looking radical.

Funding

Funding can be raised in both legal and illegal ways. Some of the most common ways to raise funds are through front groups, charitable organizations, or NGOs with similar ideologies. In the absence of state funding, terrorists may rely on organized crime to fund their activities. This has included kidnapping, drug trafficking, or robbery. Some terrorist cells have relied on identity theft and fraud to raise funds. In one method, the cell members tape record phone conversations with a potiential victim. Then they cut and edit the tape for use in calls to the victim's friends, family, and associates. This way, they can give orders to an ever expanding net of victims who think they are following requests from a trusted source. Additionally, terrorists have also found many more sources of revenue.

Communication

Even though old-school communication methods like radio are still used, the revolution in communication technology over the past 10-15 years has dramatically changed how terrorist organizations communicate. E-mails, fax transmissions, websites, cell phones, and satellite telephones have made it possible for organizations to contemplate a global strategy. However, too great a reliance on this new technology leaves organizations vulnerable to sophisticated monitoring of communication and triangulation of its source. When Osama bin Laden found out that his satellite phone conversations were being intercepted, he ceased using this method to communicate. [Sageman, Marc. 2004. "Understanding Terror Networks". Philadelphia: University of Pennsylvania Press. Ch. 5 pp. 158-161 ]

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Terrorism — Terrorist redirects here. For other uses, see Terrorist (disambiguation) …   Wikipedia

  • Terrorism and counter-terrorism in Kazakhstan — The threat of terrorism in Kazakhstan plays an increasingly important role in Kazakhstan s relations with the United States which in 2006 were at an all time high.[1] Kazakhstan has taken Uzbekistan s place as the favored partner in Central Asia… …   Wikipedia

  • Terrorism in India — Terrorism …   Wikipedia

  • Terrorism in Russia — has a long history starting from the times of Russian Empire. Terrorism, in the modern sense, [See the Etymology section] means violence against civilians to achieve political or ideological objectives by creating fear. [cite… …   Wikipedia

  • Counter-terrorism — Terrorism Definitions · Counter terrorism International conventions Anti terrorism legislation Terrorism insurance …   Wikipedia

  • Islamic terrorism — Terrorism Definitions · Counter terrorism International conventions Anti terrorism legislation Terrorism insurance …   Wikipedia

  • History of terrorism — Terrorism Definitions · Counter terrorism International conventions Anti terrorism legislation Terrorism insurance …   Wikipedia

  • Communist terrorism — Terrorism Definitions · Counter terrorism International conventions Anti terrorism legislation Terrorism insurance …   Wikipedia

  • terrorism — /ter euh riz euhm/, n. 1. the use of violence and threats to intimidate or coerce, esp. for political purposes. 2. the state of fear and submission produced by terrorism or terrorization. 3. a terroristic method of governing or of resisting a… …   Universalium

  • tactics — /tak tiks/, n. 1. (usually used with a sing. v.) the art or science of disposing military or naval forces for battle and maneuvering them in battle. 2. (used with a pl. v.) the maneuvers themselves. 3. (used with a sing. v.) any mode of procedure …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”