- Tactics of terrorism
Terrorist groups use varioustactics to maximize fear and publicity. Terrorist organizations usually methodically plan attacks in advance, and may train participants, plant "undercover" agents, and raise money from supporters or throughorganized crime . Communication may occur through moderntelecommunications , or through old-fashioned methods such ascourier s.Methods of attack
While terrorists act according to different motivations and goals, all such groups have one tactic in common: intimidation or coercion of the public or the government in order to affect social or political change. [http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=browse_usc&docid=Cite:+18USC2331] Terrorism uses violence, or threat of violence, against one portion of a society to compel the greater body of that society or their leaders to make a change out of fear. Terrorism often exploits
propaganda techniques to ensure the public receives the intended message. The term Propaganda of the Deed, coined by Malatesta, Cafiero, and Covelli, states that the message is most strongly conveyed through violence. [ Garrison, Arthur. 2004. "Defining Terrorism". Criminal Justice Studies. Vol 17. pp. 259-279]In the media, terrorist violence is most commonly portrayed as being carried out via an
improvised explosive device , although chemical weapons have been used on occasion. Vehicles from pick-up trucks to planes, like in theSeptember 11, 2001 attacks , have been used as guidedincendiary device . In the failed 2002 airliner attack shoulder-launchedsurface-to-air missiles were fired at anairliner while taking off. Concerns have also been raised regarding attacks involvingnuclear weapon s orbiological weapon s. However, despite the popular image of terrorism as bombings alone, and the large number of casualties and higher media impact associated with bombings, conventionalfirearm s are as much if not more pervasive in their use. [cite web |author=United Nations Office on Drugs and Crime |title=Conventional Terrorist Weapons |url=http://www.unodc.org/unodc/terrorism_weapons_conventional.html |accessdate=2007-09-06 ] In 2004, theEuropean Council recognized the "need to ensure terrorist organisations and groups are starved of the components of their trade," including “the need to ensure greater security of firearms, explosives, bomb-making equipment and technologies that contribute to the perpetration of terrorist outrages." [http://ec.europa.eu/justice_home/fsj/terrorism/prevention/fsj_terrorism_prevention_explosives_en.htm]Terrorist groups may arrange for secondary devices to detonate at a slightly later time in order to kill emergency-response personnel attempting to attend to the dead and wounded. Repeated or suspected use of secondary devices can also delay emergency response out of concern that such devices may exist. Examples include a (failed) device that was meant to release cyanide-gas during the
February 26 ,1993 World Trade Center bombing ; and a secondcar bomb that detonated 20 minutes after theDecember 1 ,2001 Ben Yehuda Street Bombing byHamas inJerusalem .Training
There are and have been training camps for terrorists. The range of training depends greatly on the level of support the terrorist organization receives from various organizations and states. In nearly every case the training incorporates the philosophy and agenda of the groups leadership as justification for the training as well as the potential acts of terrorism which may be committed. State sanctioned training is by far the most extensive and thorough, often employing professional soldiers and covert operatives of the supporting state. The quality of training is inconsistent, as evidenced by the following photo. Technique showed in use of these firearms is archaic and outdated. Fact|date=June 2008
Preparation
Preparation of a major attack such as the
September 11, 2001 attacks may take years, whereas a simpler attack, depending on the availability of arms, may be almost spontaneous.Fact|date=April 2007Cover
Where terrorism occurs in the context of open warfare or insurgency, its perpetrators may shelter behind a section of the local population. Examples include the
Intifada on Israeli-occupied territory, and insurgency inIraq . This population, which may be ethnically distinct from the counter-terrorist forces, is either sympathetic to their cause, indifferent, or acts under duress.Terrorists preparing for the
September 11, 2001 attacks changed their appearance to avoid looking radical.Funding
Funding can be raised in both legal and illegal ways. Some of the most common ways to raise funds are through front groups,
charitable organization s, or NGOs with similar ideologies. In the absence of state funding, terrorists may rely onorganized crime to fund their activities. This has includedkidnapping ,drug trafficking , orrobbery . Some terrorist cells have relied onidentity theft andfraud to raise funds. In one method, the cell members tape record phone conversations with a potiential victim. Then they cut and edit the tape for use in calls to the victim's friends, family, and associates. This way, they can give orders to an ever expanding net of victims who think they are following requests from a trusted source. Additionally, terrorists have also found many more sources of revenue.Communication
Even though old-school communication methods like radio are still used, the revolution in communication technology over the past 10-15 years has dramatically changed how terrorist organizations communicate. E-mails, fax transmissions, websites, cell phones, and satellite telephones have made it possible for organizations to contemplate a global strategy. However, too great a reliance on this new technology leaves organizations vulnerable to sophisticated monitoring of communication and triangulation of its source. When Osama bin Laden found out that his satellite phone conversations were being intercepted, he ceased using this method to communicate. [Sageman, Marc. 2004. "Understanding Terror Networks". Philadelphia: University of Pennsylvania Press. Ch. 5 pp. 158-161 ]
References
Wikimedia Foundation. 2010.