Suicide Bombing Operations

Total Page:16

File Type:pdf, Size:1020Kb

Suicide Bombing Operations Issue No. 5 March 2007 Security & Terrorism Research Bulletin Suicide Bombing Operations During the last three years, the world has witnessed a notable upsurge in the number of suicide attacks, as well as in the geographical spread of this tactic. As the suicide bombers become more sophisticated and inventive in their tactics, the number of victims of suicide bombing attacks around the world has also increased significantly. Counter measures designed to combat suicide bombing have proven largely ineffective. This is now an acknow- ledged reality, and despite all national and international efforts, success in the field of preventive and preemptive measures has been limited. The research team at the Department of Security and Terrorism Studies at the GRC, which has produced this study, felt the need to analyze the suicide bombing phenomenon. As part of a Middle East-based think-tank, the researcher at the GRC is living and working within a regional environment that has become familiar with the terrible consequences of suicide operations. With this modest contribution, the researchers at the S&T department hope to add some knowledge that will help in understanding the suicide bombing phenomenon, and contribute to efforts of combating the same. Dr. Mustafa Alani Senior Advisor Director, Security and Terrorism Department Gulf Research Center w w w. g r c . a e TARGET THE GULF ������������������������������� �������������������������������������������������������������������������������������� �������������������������� ������������������������������������� � � ������������������������������� ������������������������������������ � � �������������������������������� ������������������������������� � � � ������������������������� ������������������������������������� ���������������������� �������������������� ���������������������� ������������������ ����������������������������� ������������������������������������������@������������������ Security & Terrorism Suicide Bombing Operations Research Bulletin Issue No. 5 March 2007 EDITORIAL CONTENTS Editor-in-Chief: Abdulaziz Sager Insights Editor: Nicole Stracke Assistant Editor: Radhika Menon n The Invention of Suicide Bombing as Senior Creative Designer: Susan Nteife “Strategic Instrument” Editorial Policy by Mustafa Alani ............................................................................ 4 The Security and Terrorism Research Bulletin n Iraq: is intended to contribute to a constructive Suicide Bombing as Tactical Means of Asymmetric Warfare discussion of critical security issues facing by Nicole Stracke ..........................................................................10 the Gulf Region. Articles, therefore, do not represent the opinion of the Gulf Research n Suicide Bombings: Center but that of the individual author. The The Case in Chechnya Security and Terrorism Research Bulletin is by Faryal Leghari .......................................................................... 21 published four times a year in both Arabic and English and can be read on the GRC website at n Suicide Bombings: www.grc.ae The Case of Sri Lanka by Sugeeswara Senadhira ........................................................... 32 © Gulf Research Center 2007 All rights reserved. No part of this n Suicide Terrorism: publication may be reproduced, stored in a The Case of Afghanistan retrieval system, or transmitted in any form or by by Hekmat Karzai ......................................................................... 35 any means, electronic, mechanical, photocopying, n A New Paradigm of Suicide Attacks: recording or otherwise, without the prior written The Palestinian Case permission of the Gulf Research Center. by Munther S. Dajani ................................................................... 40 Published by Gulf Research Center Recent Events P.O. Box 80758 187 Oud Metha Tower, 11th Floor n Annual Conference: 303 Sheikh Rashid Road Gulf Yearbook 2006-2007 ............................................................ 43 Dubai, United Arab Emirates Tel.: +971 4 324 7770 Fax: +971 4 324 7771 GRC Latest Publications ..................................................... 46 Insights The Invention of Suicide Bombing as “Strategic Instrument”* Mustafa Alani Never before in human history have a few committed ordinary terrorist campaigns, guerilla warfare, urban warfare, and in individuals, employing cheap and primitive techniques, and battlefield confrontations. Besides, suicide bombing is also willing to sacrify themselves, been able to change or disturb used as an instrument of attack on individuals or groups, and the balance of power, generate horror, and intimidate and is considered suitable for conducting effective attacks on threaten both governments and societies as suicide bombers soft or hard targets, civilian and military alike. Apart from its ability to inflict physical damage resulting in mass destruction “Die to kill” is an old concept, but suicide bombing and death, suicide bombing has even greater psychological is a fairly new invention – or a modern innovation impact as an effective instrument to create mass terror and – in the art of warfare mass disruption. are doing today. The threat of suicide bombing today has The modern concept of suicide bombing centers around the developed to become a rapidly growing global challenge. tactic of using non-military instruments (human body, civilian Suicide bombing tactics are employed today as a prime vehicles, civilian planes, boats and even animals) to serve technique by many insurgent groups, operating in different as “moving and thinking bombs” deliberately employed in a parts of the world, and fighting for entirely different reasons surprise attack, on usually pre-selected targets. and diverse objectives. Suicide bombing never was, nor is an Islamic phenomenon, or a tactic exclusively related to the The suicide attacks on the US mainland on September 11, Islamic concept of Jihad, as there are many insurgent groups 2001 were the most devastating attack on record. The 9/11 belonging to other religions, as well as to secular groups who destructive attack involved no explosives or bombs, and even have been using suicide bombing as part of their military the hijacking of the four planes was done without using any strategy. kind of weapon. It was a notable example of evil investment in human imagination, innovation and human adaptability. “Die to kill” is an old concept, but suicide bombing is a The damage inflicted on the targeted structures (World Trade fairly new invention – or a modern innovation – in the art of Center and the Pentagon) was achieved by a combination of warfare. Some researchers try to claim that suicide terrorism three factors: accuracy in hitting the target, impact generated is an ancient tactic, simply by listing historical examples from by the speed of the plane, the explosion and fire generated by Samson’s suicidal destruction of a Philistine temple, the the ignition of a big amount of aviation fuel. activities of the legendary ‘Assassins’ during the Crusades, to the act of the Japanese kamikaze pilots during World War II. Apart from the many thousands of innocent victims of 9/11, Many of these writers wrongly associate the act of battlefield further available evidence indicates the evilness of the suicide suicide or suicide mission with the modern concept of suicide bombing tactic. The Iraqi experience is before us as the most bombing. horrifying one. From the intensity and frequency of suicide attacks that have taken place in Iraq since mid 2003, we Indeed, in just two decades suicide bombing has developed can assume that nearly half of the 300,000 or more Iraqis into a major instrument of asymmetric warfare. Suicide who have lost their lives could have fallen victims to suicide bombing tactics are effectively employed in conducting bombing attacks. In April 2006, Dr Aymen al-Zawahiri, al- attacks on land, sea, and air, and they are used as part of Qaeda’s second-in-command declared that the Iraqi branch * This article is based on a forthcoming study. 4 Issue No.5 - March 2007 of his organization (al-Qaeda in the Mesopotamia) alone has n The attacker is transported by his “handler” or by a colleague carried out 800 suicide bombing operations inside Iraq. This to, or near the site of the planned attack. figure covers the period of 28 months only (October 2003-April n Vehicle-borne bomb travels to the target’s location either 2006), and represents the activities of one group operating in alone or is escorted by another car to provide protection, Iraq. No reliable statistics are available to indicate the number guidance, and encouragement to the attacker. of suicide attacks carried out by, at least, four other major Iraqi insurgent groups which heavily employ the suicide bombing 2. Thinking Bomb Scenarios The 9/11 destructive attack involved no In most cases, after the operational command of the terrorist explosives or bombs, and even the hijacking of group has decided on the target and manner of the attack, the the four planes was done without using any kind “attacker” is in charge of deciding on a number of important of weapon factors contributing to the effectiveness of the attack, including: tactic as part of their operational strategy in Iraq. At the same n The final selection of the target among a number of pre- time, an Iraqi Interior Ministry spokesman stated that 500 selected list of potential targets A, B, C. So the attacker will suicide bombing attacks occurred in Iraq, which is considered approach
Recommended publications
  • How Technology Impacts Doctrine in Asymmetric Warfare
    0 How Technology Impacts Doctrine in Asymmetric Warfare Jeremiah Rozman Northfield Vermont Bachelors of Arts, University of Vermont, 2014 A Thesis presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Master of Arts Department of Foreign Affairs University of Virginia May, 2016 1 Abstract How does technology impact military doctrine, and how does this in turn impact political support for offensive, preventative or preemptive military action?1 I study defensive weapons systems, specifically focusing on missile defense in the theoretical context of technology and defense-based strategies as a whole. Through the study of Israel’s use of Iron Dome, I aim to demonstrate that technology can be an exogenous factor affecting military doctrine. Through careful case study analysis, I demonstrate that operationally successful defensive technologies can lead to the adoption of a defensive military doctrine by decreasing the political cost of inaction to the extent that allowing attrition becomes politically less costly than launching an offensive. Introduction A comparison of Israel’s two recent wars in Gaza, Operation Cast Lead in 2008/9 and Operation Protective Edge in 2014, indicates that the tactical success of Iron Dome, as a defensive military technology, can effect a change in military doctrine. The goal of this study is to demonstrate the effect of an unexpectedly successful defensive military technology on military doctrine, an effect which leads to prioritizing defense, allowing attrition, and moving away from a long-standing offense-based doctrine, specifically when dealing with asymmetric conflict. This study focuses on Israel, specifically in the Gaza theater of conflict and not in the Northern theater of conflict where Israel’s adversary, Hezbollah is 1 Preemptive war is defined as actor A launching a first strike in order to gain advantage in a situation where an attack by actor B is anticipated to be imminent.
    [Show full text]
  • Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
    Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Hospital Ships in the War on Terror Richard J
    Naval War College Review Volume 58 Article 6 Number 1 Winter 2005 Hospital Ships in the War on Terror Richard J. Grunawalt Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Grunawalt, Richard J. (2005) "Hospital Ships in the War on Terror," Naval War College Review: Vol. 58 : No. 1 , Article 6. Available at: https://digital-commons.usnwc.edu/nwc-review/vol58/iss1/6 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Grunawalt: Hospital Ships in the War on Terror Professor Grunawalt, professor emeritus of the Naval War College, is the former director of the Oceans Law and Policy Department of the Center for Naval Warfare Studies. His publications include (with John E. King and Ronald S. McClain) Protection of the Environ- ment during Armed Conflict (1996) and Targeting Enemy Merchant Shipping (1993)—volumes 69 and 65 of the Naval War College International Law Studies Series. Naval War College Review, Winter 2005, Vol. 58, No. 1 Published by U.S. Naval War College Digital Commons, 2005 1 Naval War College Review, Vol. 58 [2005], No. 1, Art. 6 HOSPITAL SHIPS IN THE WAR ON TERROR Sanctuaries or Targets? Richard J. Grunawalt mployment of military hospital ships in support of the war on terror is mili- Etarily, politically, and morally appropriate.
    [Show full text]
  • The Special Studies Series Foreign Nations
    This item is a finding aid to a ProQuest Research Collection in Microform. To learn more visit: www.proquest.com or call (800) 521-0600 This product is no longer affiliated or otherwise associated with any LexisNexis® company. Please contact ProQuest® with any questions or comments related to this product. About ProQuest: ProQuest connects people with vetted, reliable information. Key to serious research, the company has forged a 70-year reputation as a gateway to the world’s knowledge – from dissertations to governmental and cultural archives to news, in all its forms. Its role is essential to libraries and other organizations whose missions depend on the delivery of complete, trustworthy information. 789 E. Eisenhower Parkway ■ P.O Box 1346 ■ Ann Arbor, MI 48106-1346 ■ USA ■ Tel: 734.461.4700 ■ Toll-free 800-521-0600 ■ www.proquest.com A Guide to the Microfilm Edition of THE SPECIAL STUDIES SERIES FOREIGN NATIONS The Middle East War in Iraq 2003–2006 A UPA Collection from Cover: Neighborhood children follow U.S. army personnel conducting a patrol in Tikrit, Iraq, on December 27, 2006. Photo courtesy of U.S. Department of Defense Visual Information Center (http://www.dodmedia.osd.mil/). The Special Studies Series Foreign Nations The Middle East War in Iraq 2003–2006 Guide by Jeffrey T. Coster A UPA Collection from 7500 Old Georgetown Road Bethesda, MD 20814-6126 Library of Congress Cataloging-in-Publication Data The Middle East war in Iraq, 2003–2006 [microform] / project editors, Christian James and Daniel Lewis. microfilm reels ; 35 mm. – (Special studies series, foreign nations) Summary: Reproduces reports issued by U.S.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Meserole Brookings CV 2021
    CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation
    [Show full text]
  • The Crusader Monthll,J Nelijsletter
    THE CRUSADER MONTHLL,J NELIJSLETTER ROBERT F. WILLIAMS, EDITOR -IN EXILE- VoL . ~ - No. 9 MAY 1968 Afro-Americans & Slick John Kennedy Government of the United States is no government T~E of the Afro-Americans at all. The slick John Ken- nedy gang is operating one of the greatest sham govern- ment in the entire world. Afro-Americans and fair minded Od > ~- O THE wN«< /l~USL . lF Yov~Re EyER IN NE60, CALL ME AT whites must be gullible indeed to believe that the racist, KKK dominated so-called U.S. Government is concerned with the welfare and human rights of colored people. The colored people of the USA must bring themselves to realize that taken integration is a slick manuever to check the restlessness of an oppressed people fast becoming infect ed with the germ of total resistance policy developing among all of the oppressed peoples of the world. Token integration means nothing to the masses. Even an idiot should be able to see that so-called Token integration is no more than window dressing designed to lull the poor downtrodden Afro-American to sleep and to make the out side world think that the racist, savage USA is a fountainhead of social justice and democracy. The Afro-American in the USA is facing his greatest crisis since chattel slavery. All forms of violence and underhanded methods o.f extermination are being stepped up against our people. Contrary to what the "big daddies" and their "good nigras" would have us believe about all of the phoney progress they claim the race is making, the True status of the Afro-Ameri- can is s#eadily on the down turn.
    [Show full text]
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Asymmetric Warfare - the Siege of Fallujah
    ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH Csér Orsolya Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used to force our will upon the enemy. The non-traditional, inexpensive actions involving material damage and human casualties (such as terrorism, deployment of weapons of mass destruction, threat of using them, information warfare); guerrilla- and partisan-type raids implemented with simple tools and techniques are considered its basic advantages. All these are usually the weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions against logistics, command posts, attacks against officers, command staff, destruction of supply routes and transportation routes). The detection of these weapons and the psychological preparation of the soldiers is very difficult, because the offenders do not comply with the conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as one of the most infamous and serious insurgencies and in which the media and propaganda played a major role, is regarded as an example of asymmetric warfare. Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda, military gain 1. Introduction Asymmetry doesn't mean anything other than the lack of symmetry between the belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of precisely outlined political aims, often based on ideological, religious, ethnic community of several organizations, implementing military and non-military operations, tactics and techniques building upon direct and indirect effects and intensifying each other's effects, endangering different dimensions of security, mainly tactical procedures, with whose effect altogether we may force our will upon the enemy." All of this is such an activity that can be connected to asymmetric challenges, when the executors - in most cases not even sparing their own lives - execute military actions, and is usually done against a belligerent on a higher technological level.
    [Show full text]
  • Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (Avbieds): Insurgent Use and Terrorism Potentials
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 2-2-2016 Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, R. J. (2016, February 02). Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Retrieved February 02, 2016, from TRENDS Research & Advisory, http://trendsinstitution.org/daeshis- armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent-use-and-terrorism-potentials/ This Blog is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Robert J. Bunker Non-Resident Fellow, Counter-Terrorism © January 2016 http://trendsinstitution.org/daeshis-armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent- use-and-terrorism-potentials/ Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials This essay in the TRENDS terrorism futures series focuses on advanced threats related to vehicle borne improvised explosive devices (VBIEDs). It provides a threat typology of these devices with their evolution into the armored (AVBIED) variant that has now been fielded by Daesh/IS in both Iraq and Syria. A short overview of such insurgent use will be provided as well as a brief discussion of the terrorism potentials of such use if directed against the UAE, Europe, or the United States. VBIED Threat Typology Vehicle borne improvised explosive devices (VBIEDs), or simply vehicle bombs, have existed since the September 1920 deployment of ‘Buda’s Wagon’—an actual horse drawn wagon filled with explosives and scrap metal—at Wall and Broad streets in downtown Manhattan by the anarchist Mario Buda.
    [Show full text]
  • The Counterinsurgency Campaign of the Nigerian Army: the Fight
    The Counterinsurgency Campaign of the Nigerian Army: The Fight against the Boko-Haram Insurgency in North-East Nigeria, 1999-2017 Gilbert La’ankwap Yalmi Department of Politics and Contemporary History School of Arts and Media, University of Salford, Manchester, UK Supervisors Dr Samantha Newbery Professor Searle Alaric Submitted in Partial Fulfilment of the Requirements of the Degree of Doctor of Philosophy September 2020 TABLE OF CONTENTS TABLE OF CONTENTS ....................................................................................... i List of Figures ...................................................................................................... iv Acknowledgements.............................................................................................. v Dedication ........................................................................................................... vi Abbreviations ....................................................................................................vii Abstract ................................................................................................................ x INTRODUCTION ................................................................................................ 1 Gaps in the Literature and Opportunities for New Research ............................ 2 Statement of the Problem ................................................................................... 7 Objective and Significance ...............................................................................
    [Show full text]