Foreign Military Interventions and Suicide Attacks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated. -
Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
Lessons From Colombia For Curtailing The Boko Haram Insurgency In Nigeria BY AFEIKHENA JEROME igeria is a highly complex and ethnically diverse country, with over 400 ethnic groups. This diversity is played out in the way the country is bifurcated along the lines of reli- Ngion, language, culture, ethnicity and regional identity. The population of about 178.5 million people in 2014 is made up of Christians and Muslims in equal measures of about 50 percent each, but including many who embrace traditional religions as well. The country has continued to experience serious and violent ethno-communal conflicts since independence in 1960, including the bloody and deadly thirty month fratricidal Civil War (also known as the Nigerian-Biafran war, 1967-70) when the eastern region of Biafra declared its seces- sion and which claimed more than one million lives. The most prominent of these conflicts recently pitch Muslims against Christians in a dangerous convergence of religion, ethnicity and politics. The first and most dramatic eruption in a series of recent religious disturbances was the Maitatsine uprising in Kano in December 1980, in which about 4,177 died. While the exact number of conflicts in Nigeria is unknown, because of a lack of reliable sta- tistical data, it is estimated that about 40 percent of all conflicts have taken place since the coun- try’s return to civilian rule in 1999.1 The increasing wave of violent conflicts across Nigeria under the current democratic regime is no doubt partly a direct consequence of the activities of ethno- communal groups seeking self-determination in their “homelands,” and of their surrogate ethnic militias that have assumed prominence since the last quarter of 2000. -
Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1
ISSN 2334-3745 Volume XV, Issue 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Table of Content Welcome from the Editors...............................................................................................................................1 Articles Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I)............................................................................................................................................2 by Lorne L. Dawson Dying to Live: The “Love to Death” Narrative Driving the Taliban’s Suicide Bombings............................17 by Atal Ahmadzai The Use of Bay’ah by the Main Salafi-Jihadist Groups..................................................................................39 by Carlos Igualada and Javier Yagüe Counter-Terrorism in the Philippines: Review of Key Issues.......................................................................49 by Ronald U. Mendoza, Rommel Jude G. Ong and Dion Lorenz L. Romano Variations on a Theme? Comparing 4chan, 8kun, and other chans’ Far-right “/pol” Boards....................65 by Stephane J. Baele, Lewys Brace, and Travis G. Coan Research Notes Climate Change—Terrorism Nexus? A Preliminary Review/Analysis of the Literature...................................81 by Jeremiah O. Asaka Inventory of 200+ Institutions and Centres in the Field of Terrorism and Counter-Terrorism Research.....93 by Reinier Bergema and Olivia Kearney Resources Counterterrorism Bookshelf: Eight Books -
Kamikazes! When Japanese Planes Attacked the U.S. Submarine Devilfish
KAMIKAZES! When Japanese Planes Attacked the U.S. Submarine Devilfish by NATHANIEL PATCH he image of desperate Japanese pilots purposely flying their Tplanes into American warships in the closing months of World War II figures prominently in American popular culture. When most people hear the term kamikaze, they think Fortunately, the Devilfish was close to the surface when of swarms of planes flying through a torrent of antiaircraft the explosion occurred, and the submarine took only mi fire and plowing into the decks of aircraft carriers, battle nor damage that the crew could control. ships, cruisers, and destroyers, taking the lives of sailors and The officers and crew in the control room took quick ac damaging or sinking the ships in this desperate act. tion to prevent the submarine from sinking and to mitigate Out of the hundreds of these attacks, one was quite un the damage done by the incoming saltwater. They leveled usual: the only kamikaze attack on an American subma off the submarine at 80 feet, and the drain pumps were rine, the USS Devilfish (SS 292). barely keeping up with the incoming water. The bilges of Why was this submarine attacked, and why was there the conning tower filled rapidly, and water began pouring only one attacker? The story of the attack on the Devilfish into the control room. A constant spray of saltwater from seems to be a fragment of a larger story, separated by time the conning tower splashed onto the electrical panels and and distance, occurring on March 20, 1945. If kamikazes consoles in the control room. -
Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency
Order Code RL32737 CRS Report for Congress Received through the CRS Web Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency January 27, 2006 Christopher Bolkcom Specialist in National Defense Foreign Affairs, Defense, and Trade Division Kenneth Katzman Specialist in Middle East Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Military Aviation: Issues and Options for Combating Terrorism Summary By all accounts, the U.S. military dominates state-on-state conflict. In the past, non-state actors (terrorists, guerrillas, drug traffickers) appeared to be less threatening to U.S. national security than the well funded, well organized, and potent armed forces of an enemy nation-state. The terrorist attacks of September 11, 2001 illustrate, however, that small groups of non-state actors can exploit relatively inexpensive and commercially available technology to conduct very destructive attacks over great distances. Today’s U.S. armed forces were developed principally with state-on-state conflict in mind. Combating non-state actors, however, presents a number of distinct challenges in terms of operations, cost, and mindset. Non-state actors generally strive to hide within civilian populations. While U.S. policy makers typically seek quick and decisive victories, non-state actors seek protracted war. Non-state actors often employ cheap, commercially available weapons, that often result in expensive responses by the United States. Many of the weapons and methods employed today by U.S. armed forces can be used against non-state actors. Some, however, are more directly applicable than others. U.S. experience in conducting close air support (CAS), employing special operations forces (SOF) and advising friendly governments in using aviation to defend themselves from insurgents and terrorists may form a basis for building capabilities against non-state actors. -
Hard Targets: Theory and Evidence on Suicide Attacks*
Hard Targets: Theory and Evidence on Suicide Attacks* Eli Berman – Department of Economics, UCSD; NBER David D. Laitin – Department of Political Science, Stanford University For inclusion in Eva Meyersson Milgrom, ed. Suicide Bombing from an Interdisciplinary Perspective (to be submitted to Princeton University Press) *We thank Barak Bouks for research assistance. This version benefited from discussions with Larry Iannaccone, Gershon Shafir and Mahmoud Al-Gamal. James Fearon, Peter Katzenstein, Alan Krueger, Howard Rosenthal, and participants in a Stanford conference commented on earlier versions, compelling revisions. Berman acknowledges support of National Science Foundation grant 0214701 through the NBER. Mistakes are our own. Berman and Laitin, “Rational Martyrs” p. 2 Abstract: Why suicide attacks? Though rebels often kill coreligionists, they seldom use suicide attacks to do so. Though rebels typically target poor countries, suicide attacks are just as likely to target rich democracies. Though many groups have grievances, suicide attacks are favored by the radical religious. We model the choice of tactics by rebels. We first ask what a suicide attacker would have to believe to be deemed rational. We then embed the attacker and other operatives in a club good model which emphasizes the function of voluntary religious organizations as providers of local public goods. The sacrifices which these groups demand solve a free-rider problem in the cooperative production of public goods, as in Iannaccone (1992). These sacrifices make clubs well suited for organizing suicide attacks where defection by operatives (including the attacker) endanger the entire organization. Thus radical religious groups can be effective dispatchers of suicide bombers if they chose to do so. -
Hardening Soft Targets
New Visions for Public Affairs, Volume 11, Spring 2019 || 14 Policy in Action Piece Hardening Soft Targets Daniel Henne University of Delaware Terrorism was once a scattered, intermittent concern for the global community. It is now an everyday security problem that primarily affects large urban centers that have not been secured. Proper risk assessment, intelligence collection, public awareness, organizational collaboration, and improvements in technology are key areas and points that need to be emphasized in terrorism prevention. When it comes to implementing effective counterterrorism practices, places such as New York City have made strides. The city’s ability to prevent attacks can be contributed to their extensive use of surveillance systems, as well as their robust information- sharing and collaborative abilities. This paper assesses the major findings in counterterrorism literature and in practice, providing examples of advances that New York City has utilized in order to keep people safe from terrorist attacks. Policy Problem and Historical Context keep counterterrorism and soft target hardening Terrorist attacks and their effects on at the forefront of their public safety concerns. people throughout the world have been a In addition to this analysis, the following paper protracted concern for the past twenty years. will recommend improvements that can be Although the methods in which these types of made to bolster practices and procedures in attacks have varied, a vast majority of them developing better public safety standards and have occurred in places that can be defined as outcomes. soft targets (French, 2015). Soft targets are locations that are accessible to large numbers of Terrorism and Soft Targets people and that have limited security or There is no universally accepted definition protection methods in case of an emergency. -
Responding to Victims of Terrorism and Mass Violence Crimes Coordination and Collaboration Between American Red Cross Workers and Crime Victim Service Providers
U.S. Department of Justice Office of Justice Programs Responding to Victims of Terrorism and Mass Violence Crimes Coordination and Collaboration Between American Red Cross Workers and Crime Victim Service Providers “Putting Victims First” U.S. Department of Justice Office of Justice Programs 810 Seventh Street NW. Washington, DC 20531 Alberto R. Gonzales Attorney General Regina B. Schofield Assistant Attorney General John W. Gillis Director, Office for Victims of Crime Office of Justice Programs Partnerships for Safer Communities www.ojp.usdoj.gov Office for Victims of Crime www.ovc.gov NCJ 209681 This document was prepared by the Office for Victims of Crime and the American Red Cross under contract number OJP–2001–253–M, awarded by the Office for Victims of Crime, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions expressed in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. The Office for Victims of Crime is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, the Bureau of Justice Statistics, the National Institute of Justice, and the Office of Juvenile Justice and Delinquency Prevention. Contents Introduction and Overview . .1 OVC/American Red Cross Collaborative Timeline . .2 Natural Disasters, Acts of Terrorism, and Mass Violence Crimes: Similarities and Differences . .3 Office for Victims of Crime . .6 Crime Victim Assistance and Services . .8 Grants and Funding Available to Organizations Through OVC . .10 Basics of the Criminal Justice Process . .11 Conclusion . .13 References and Resources . -
Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics.