Time-Space Analysis of Terrorist Planning Cycles Michael Stephen Gerald Eastham University of Arkansas, Fayetteville

Total Page:16

File Type:pdf, Size:1020Kb

Time-Space Analysis of Terrorist Planning Cycles Michael Stephen Gerald Eastham University of Arkansas, Fayetteville University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 8-2014 Time-Space Analysis of Terrorist Planning Cycles Michael Stephen Gerald Eastham University of Arkansas, Fayetteville Follow this and additional works at: http://scholarworks.uark.edu/etd Part of the Criminology Commons, and the Human Geography Commons Recommended Citation Eastham, Michael Stephen Gerald, "Time-Space Analysis of Terrorist Planning Cycles" (2014). Theses and Dissertations. 2226. http://scholarworks.uark.edu/etd/2226 This Thesis is brought to you for free and open access by ScholarWorks@UARK. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected], [email protected]. Time-Space Analysis of Terrorist Planning Cycles Time-Space Analysis of Terrorist Planning Cycles A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in Geography by Michael Eastham James Madison University Bachelor of Science in Geographic Science, 2012 August 2014 University of Arkansas This thesis is approved for recommendation to the Graduate Council. ___________________________________ Dr. Fiona Davidson Thesis Director ___________________________________ ___________________________________ Dr. Brent Smith Dr. Jackson Cothren Committee Member Committee Member Abstract Terrorism is among the largest threats to national and international security in today’s global community. Acts of terrorism have resulted economic and societal impacts throughout the world. Improvements in technology have increased the capacity of terrorists to maximize the impact of their actions. The increasing influence and prevalence of terrorist activity has demanded research focused on the prevention of terrorist acts. A known method of terrorism prevention is uncovering a plot during its planning and preparation phase. Terrorist planning can be evaluated based on how actors move through space and time prior to the execution of their attack. General patterns and insights into terrorist planning activities can offer the intelligence, defense, and law enforcement communities with information on how where terrorists can be located in relationship to their target throughout their planning cycle. This movement within a planning cycle can be easily visualized and analyzed through the use of a Time-Space Signature. This research assesses the movements of actors involved in past terrorist activities in order to determine how terrorists move in space and time during their planning cycle. Acknowledgements This research including the analysis into terrorist planning cycles was made possible due to the efforts of my committee consisting of Dr. Fiona Davidson, Dr. Jackson Cothren, and Dr. Brent Smith. Thanks to Paxton Roberts at the Terrorism Research Center in Fulbright College for help with the “American Terrorism Study” data and his assistance and commitment to this research. Thanks to the Terrorism Research Center in Fulbright College for their diligent work in hosting the American Terrorism Study (ATS) database and conducting invaluable terrorism related research. Thanks to the University of Arkansas Department of Geosciences. Thanks to my family for their support and guidance throughout my academic career. Table of Contents I. Introduction ................................................................................................................................. 1 II. Literature Review ....................................................................................................................... 4 Terrorism Background ................................................................................................................ 4 Terrorism as a study of sociology ............................................................................................... 6 The Geography of Terrorism ...................................................................................................... 8 Spatial and Quantitative Analysis of Terrorism ........................................................................ 10 III. Methodology ........................................................................................................................... 17 Time Space Signature Development ......................................................................................... 17 Time Space Signature Analysis ................................................................................................ 21 Distribution of Spatial and Temporal Values Analysis ............................................................ 23 Database .................................................................................................................................... 25 Data Selection ........................................................................................................................... 27 IV. Discussion and Results ........................................................................................................... 30 All Terrorist Categories ............................................................................................................ 30 Environmental Extremist .......................................................................................................... 39 Far-Left ..................................................................................................................................... 56 Far-Right ................................................................................................................................... 73 Islamic Extremist ...................................................................................................................... 93 V. Conclusion ............................................................................................................................. 110 Future Research Direction ...................................................................................................... 114 VI. References ............................................................................................................................. 116 VII. Appendix ............................................................................................................................. 122 Appendix A. ............................................................................................................................ 122 Table of Figures Figure 1. Example of Time-Space Signature for ELF Family Incident ........................................ 19 Figure 2. R Scripting for the Production of a Time-Space Signature ........................................... 20 Figure 3. R Scripting for the Calculation of a Statistical Summary ............................................. 23 Figure 4. R Scripting for the Construction of Histograms ............................................................ 24 Figure 5. ATS Records and Selected ATS Records Included in the Analysis ............................. 28 Figure 6. Map Showing Terrorist Planning Incidents by State (1976-2010) ................................ 28 Figure 7. The Seven Stages of a Terrorist Attack ......................................................................... 31 Figure 8. Theorized Time-Space Signature for Terrorist Attacks (3 Target Visits) ..................... 34 Figure 9. Theorized Time-Space Signature for Terrorist Attacks (2 Target Visits) ..................... 35 Figure 10. Time-Space Signature for Terrorist Planning Cycles .................................................. 36 Figure 11. Time-Space Signature for All Incidents by Category ................................................. 37 Figure 12. Time-Space Signature for All Incidents by Category ................................................. 38 Figure 13. Time-Space Signature for Environmental Incidents ................................................... 41 Figure 14. Distribution of Environmental Time Values ............................................................... 42 Figure 15. Histogram for Distribution of Environmental Time Values ........................................ 43 Figure 16. Distribution of Environmental Distance Values .......................................................... 44 Figure 17. Histogram for Distribution of Environmental Distance Values .................................. 44 Figure 18. Distribution of Values for Initial Acts in Environmental Incidents ............................ 45 Figure 19. Time-Space Signatures for Environmental Incidents by Incident ID ......................... 46 Figure 20. Time-Space Signatures for Environmental Incidents by Incident ID ......................... 47 Figure 21. Time-Space Signatures for Environmental Incidents by Case Study .......................... 48 Figure 22. Time-Space Signatures for Environmental Incidents by Case Study .......................... 49 Figure 23. Time-Space Signatures for Environmental Incidents by Incident Subtype ................. 50 Figure 24. Time-Space Signatures for Environmental Incidents by Incident Subtype ................. 51 Figure 25. Time-Space Signatures for Environmental Incidents by Weapon Type ..................... 52 Figure 26. Time-Space Signatures for Environmental Incidents by Weapon Type ..................... 53 Figure 27. Time-Space Signatures for Environmental Incidents by Target Type ........................ 54 Figure 28. Time-Space Signatures for Environmental Incidents by Target Type
Recommended publications
  • The Eco-Terrorist Wave (1970-2016)
    THE ECO-TERRORIST WAVE (1970-2016) By João Raphael da Silva Submitted to Central European University Department of International Relations In partial fulfilment of the requirements for the degree of Master of Arts in International Relations Supervisor: Professor Matthijs Bogaards Word Count: Budapest, Hungary 2017 CEU eTD Collection 1 ABSTRACT The present research aims to shed light on the geographical and temporal spread of the ecological typology of terrorism – hereinafter referred as “Eco-Terrorism” – through the lens of the David C. Rapoport’s Wave and Tom Parker and Nick Sitter’s Strain Theories. This typology that has posed high levels of threats to the United States and the European Union member States remains uncovered by these two theoretical frameworks. My arguments are that, first, like many other typologies previously covered by the above-mentioned theories, Eco-Terrorism spread. Second, “Wave”, “Strain” or “Wavy Strain” should be able to explain the pattern followed by Eco-Terrorism. Making use of the “Contagion Effect” as an analytical tool, the present research found that, like in other typologies, as an indirect way of contagion, literary production has played a crucial role in the spread of Eco-Terrorism, with a slight difference on who was writing them. Eventually, they became leaders or members of an organization, but in most of the cases were philosophers and fiction authors. In addition, it was found that the system of organization of the ALF and the ELF contributes to the spread. As a direct way of contagion, aside from training like in other typologies, the spread occurs when members of a certain organization disaffiliate from an organization and found a new one, and sometimes when two organizations act in cooperation.
    [Show full text]
  • Greenpeace, Earth First! and the Earth Liberation Front: the Rp Ogression of the Radical Environmental Movement in America" (2008)
    University of Rhode Island DigitalCommons@URI Senior Honors Projects Honors Program at the University of Rhode Island 2008 Greenpeace, Earth First! and The aE rth Liberation Front: The rP ogression of the Radical Environmental Movement in America Christopher J. Covill University of Rhode Island, [email protected] Follow this and additional works at: http://digitalcommons.uri.edu/srhonorsprog Part of the Environmental Sciences Commons Recommended Citation Covill, Christopher J., "Greenpeace, Earth First! and The Earth Liberation Front: The rP ogression of the Radical Environmental Movement in America" (2008). Senior Honors Projects. Paper 93. http://digitalcommons.uri.edu/srhonorsprog/93http://digitalcommons.uri.edu/srhonorsprog/93 This Article is brought to you for free and open access by the Honors Program at the University of Rhode Island at DigitalCommons@URI. It has been accepted for inclusion in Senior Honors Projects by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. Greenpeace, Earth First! and The Earth Liberation Front: The Progression of the Radical Environmental Movement in America Christopher John Covill Faculty Sponsor: Professor Timothy Hennessey, Political Science Causes of worldwide environmental destruction created a form of activism, Ecotage with an incredible success rate. Ecotage uses direct action, or monkey wrenching, to prevent environmental destruction. Mainstream conservation efforts were viewed by many environmentalists as having failed from compromise inspiring the birth of radicalized groups. This eventually transformed conservationists into radicals. Green Peace inspired radical environmentalism by civil disobedience, media campaigns and direct action tactics, but remained mainstream. Earth First’s! philosophy is based on a no compromise approach.
    [Show full text]
  • Environmental Law Section Newsletter
    LAW SECTION Susan Richardson, Editor Kilpatrick Stockton LLP Spring 2002 Protecting Against Environmental Terrorism by Robert D. Schmitter Senior Scientist and Head of Environmental Management and Technology Branch In This Issue: Georgia Tech Research Institute1 Protecting Against Introduction Environmental Protection of the environment is a major concern of both the public and private sectors, but it is now seen in a new light since the September 11 attacks exposed the vulnerabil- Terrorism . pg. 1 ity of certain segments of the country’s infrastructure to terrorist acts. Most environ- mental protection efforts have been directed at operations with the potential to cause From the Chair’s environmental damage as a result of accidental spills or releases of toxic materials. Desk . pg. 2 Attention has now turned to addressing issues of environmental terrorism, which can include the intentional release of hazardous materials via terrorist activities at facilities The Enviromental or operations, with a resultant tremendous adverse impact on the environment and the Litigator’s Procedual public. Primer on the Office of State Administra- What is Environmental Terrorism? tive Hearings . .pg. 3 The FBI defines terrorism as “the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment An Overview of the thereof, in furtherance of political or social objectives.”2 Terrorism takes on many Small Business forms, including assassinations, homicide/suicide bombings, chemical or biological Liability Relief and attacks, and concerns about attacks on the environment and the associated impact on the public. Environmental terrorism has been defined as “the unlawful use of force Brownfields Revital- against in situ environmental resources as to deprive populations of their benefits and/ ization Act .
    [Show full text]
  • Assessing Security Threats to Canada's Energy Infrastructure
    Assessing Security Threats to Canada’s Energy Infrastructure: The Enbridge Northern Gateway Pipeline By Jenny Benoit B.A., University of Guelph, 2011 Research Project Submitted In Partial Fulfillment of the Requirements for the Degree of Master of Arts in the School of Criminology Faculty of Arts and Social Science Jenny Benoit 2014 SIMON FRASER UNIVERSITY Summer 2014 Approval Name: Jenny Benoit Degree: Master of Arts (Criminology) Title of Thesis: Assessing Security Threats to Canada’s Energy Infrastructure: The Enbridge Northern Gateway Pipeline Examining Committee: Chair: William Glackman Associate Professor J. Bryan Kinney Senior Supervisor Associate Professor Garth Davies Supervisor Associate Professor Andrea Curman External Examiner Research Analyst, Police Services Division, Road Safety Unit BC Government, Ministry of Justice Date Defended/Approved: July 29, 2014 ii Partial Copyright Licence iii Abstract Safe and secure critical infrastructure is essential for the functioning of Canada's society. A robust system of infrastructure allows Canada to be a leader on the world stage but also presents potential security risks. Using open source data, this paper identifies why energy infrastructure is the ideal target for malicious attack and includes a focus on the proposed Enbridge Northern Gateway pipeline. Using the Harmonized Threat and Risk Assessment Methodology, to perform a risk based analysis; the likelihood of an attack on the Northern Gateway was assessed. A risk rating of low to medium was found, with a variety of vulnerabilities and possible threat actors identified. Keywords: Energy infrastructure, risk assessment, Northern Gateway pipeline iv Dedication To R.A. – Thank you. v Acknowledgements I would like to thank Dr.
    [Show full text]
  • The Criminal Conduct of Radical Environmental and Animal Rights Groups: a Rational Choice Perspective
    ABSTRACT Title of Document: THE CRIMINAL CONDUCT OF RADICAL ENVIRONMENTAL AND ANIMAL RIGHTS GROUPS: A RATIONAL CHOICE PERSPECTIVE Jennifer Varriale Carson, Doctor of Philosophy, 2010 Directed By: Professor Gary LaFree, Department of Criminology and Criminal Justice In this dissertation, I examine whether members of radical environmental and animal rights groups are deterred by legal sanctions, morality, both, or neither. From a rational choice framework, I hypothesize that members of these groups weigh costs and benefits and act based on expected utility. I measure an increase in costs through three federal sentencing acts targeted at reducing the criminal behavior of these groups and hypothesize that this legislation decreased the total, serious, and ideologically-specific activity of extremists. I also contend that two terrorist events, the nearly fatal tree-spiking of George Alexander and the assassination of Hyram Kitchen, also increased the costs of criminal conduct for members of radical eco- groups. I evaluate interviews with twenty-five activists and analyze a database of 1056 incidents through both time-series and series hazard modeling. The interviews yield support for the rational choice perspective, particularly in regards to micro-level considerations of legal sanctions and morality. My quantitative findings indicate that the legislation was influential, albeit varying in direction by the method employed. Specifically, the time-series models yield significant increases in the frequency of criminal conduct after the legislation, while the series hazard analyses demonstrate a decrease in the hazard of an attack. I also find that the two major terrorist events did not significantly impact the criminal conduct of these groups.
    [Show full text]
  • Sentinel Species: the Criminalization of Animal Rights Activists As Terrorists, and What It Means for the Civil Liberties in Trump's America
    Denver Law Review Volume 95 Issue 4 Symposium: Animal Rights Article 5 November 2020 Sentinel Species: The Criminalization of Animal Rights Activists as Terrorists, and What It Means for the Civil Liberties in Trump's America Will Potter Follow this and additional works at: https://digitalcommons.du.edu/dlr Recommended Citation Will Potter, Sentinel Species: The Criminalization of Animal Rights Activists as Terrorists, and What It Means for the Civil Liberties in Trump's America, 95 Denv. L. Rev. 877 (2018). This Article is brought to you for free and open access by Digital Commons @ DU. It has been accepted for inclusion in Denver Law Review by an authorized editor of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. SENTINEL SPECIES: THE CRIMINALIZATION OF ANIMAL RIGHTS ACTIVISTS AS "TERRORISTS," AND WHAT IT MEANS FOR CIVIL LIBERTIES IN TRUMP'S AMERICA WILL POTTERt ABSTRACT The animal rights movement has pioneered new, diverse forms of so- cial activism that have rapidly redefined how we view animals. But those remarkable successes have been met with an increasingly aggressive back- lash, including new terrorism laws, widespread surveillance, experimental prisons, and legislation explicitly criminalizing journalists and whistle- blowers. This Article will explain how, if left unchecked, these attacks on animal advocacy will become a blueprint for the wider criminalization of dissent. TABLE OF CONTENTS INTRODUCTION................................................ 878 I. MEET THE WORLD'S NEWEST TERRORIST .......... ............ 879 II. NUMBER ONE DOMESTIC TERRORISM THREAT ... .............. 882 III. MOBILIZING LAW ENFORCEMENT ...................... ....... 883 IV. ANIMAL ENTERPRISE TERRORISM............. ............... 887 V. FROM THE MARGINS TO THE MAINSTREAM: "AG-GAG" LAWS .....
    [Show full text]
  • Geospatial Analysis of Terrorist Activities
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Geospatial Analysis of Terrorist Activities: The Identification of Spatial and Temporal Patterns of Preparatory Behavior of International and Environmental Terrorists Author: Brent L. Smith ; Jackson Cothren ; Paxton Roberts ; Kelly R. Damphousse Document No.: 222909 Date Received: May 2008 Award Number: 2005-IJ-CX-0200 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. University of Arkansas NIJ Grant 2005-IJ-CX-0200 Geospatial Analysis of Terrorist Activities: The Identification of Spatial and Temporal Patterns of Preparatory Behavior of International and Environmental Terrorists Brent L. Smith Terrorism Research Center in Fulbright College University of Arkansas Jackson Cothren Center for Advanced Spatial Technologies University of Arkansas Paxton Roberts Terrorism Research Center in Fulbright College University of Arkansas Kelly R. Damphousse KayTen Research and Development, Inc. February 2008 http://trc.uark.edu Terrorism Research Center in Fulbright College University of Arkansas TABLE OF CONTENTS Page Number Table of Contents...............................................................................................................
    [Show full text]
  • An Overview of Bombing and Arson Attacks by Environmental and Animal Rights Extremists in the United States, 1995-2010
    An Overview of Bombing and Arson Attacks by Environmental and Animal Rights Extremists in the United States, 1995-2010 Final Report to the Resilient Systems Division, Science and Technology Directorate, U.S. Department of Homeland Security May 2013 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20742 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The authors of this report are: Steven M. Chermak, Ph.D., National Consortium for the Study of Terrorism & Responses to Terrorism (START), and School of Criminal Justice, Michigan State University; Joshua D. Freilich, J.D; Ph.D., National Consortium for the Study of Terrorism & Responses to Terrorism (START), and Doctoral Program in Criminal Justice, The Graduate Center & John Jay College, CUNY; Celinet Duran, Michigan State University; and William S. Parkin, Ph.D., National Consortium for the Study of Terrorism & Responses to Terrorism (START), and Criminal Justice Department, Seattle University. Questions about this report should be directed to [email protected]. This research was supported by the Resilient Systems Division of the Science and Technology Directorate of the U.S. Department of Homeland Security through Award Number 2009ST108LR0003 made to the National Consortium for the Study of Terrorism and Responses to Terrorism (START). The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S.
    [Show full text]
  • The Domestic Terrorist Threat: Background and Issues for Congress
    The Domestic Terrorist Threat: Background and Issues for Congress Jerome P. Bjelopera Specialist in Organized Crime and Terrorism January 17, 2013 Congressional Research Service 7-5700 www.crs.gov R42536 CRS Report for Congress Prepared for Members and Committees of Congress The Domestic Terrorist Threat: Background and Issues for Congress Summary The emphasis of counterterrorism policy in the United States since Al Qaeda’s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists—people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements—have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This latter point is not meant to imply that domestic terrorists should be taken any less seriously than other terrorists. The Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) do not officially list domestic terrorist organizations, but they have openly delineated domestic terrorist “threats.” These include individuals who commit crimes in the name of ideologies supporting animal rights, environmental rights, anarchism, white supremacy, anti-government ideals, black separatism, and anti-abortion beliefs. The boundary between constitutionally protected legitimate protest and domestic terrorist activity has received public attention. This boundary is especially highlighted by a number of criminal cases involving supporters of animal rights—one area in which specific legislation related to domestic terrorism has been crafted. The Animal Enterprise Terrorism Act (P.L. 109-374) expands the federal government’s legal authority to combat animal rights extremists who engage in criminal activity.
    [Show full text]
  • Cyberterrorism Formatted.Doc 4/15/2010 4:21 Pm
    CYBERTERRORISM FORMATTED.DOC 4/15/2010 4:21 PM CYBERTERRORISM: ARE WE LEGALLY READY? Aviv Cohen∗ INTRODUCTION Human beings, by their very nature, have a tendency to find the destructive side of most innovations and advancements. Current technological developments present us with opportunities to enrich our lives by using simple, quick and high-quality devices. At the same time, these technological developments also hold the potential to be used as weapons in the hands of terrorists. When I first became acquainted with the idea of cyberterrorism, I was fascinated by the large amount of ink that had already been spilled on the gloom prospects that cyberterrorism is not a question of “if” but of “when.” However, there was no reference as to how the international community can react to such an attack after it had happened. This article is an attempt to take that next step, and try to analyze whether the international tool kit is well equipped to handle cyberterrorism. I have focused on the legal aspects, rather than discussing the technological options to combat cyberterrorism. While existing counter-terror conventions could, by way of legal interpretation, apply to cyberterrorism, there could be a better direct way of addressing this threat, via the creation of an explicit regime for the suppression of cyberterrorism consisting of conventional prohibitions, Security Council resolutions and international criminal laws. The article includes four parts. Part I sets the stage for the arguments presented above, and provides a brief introduction to the concept of terrorism and the international response to these terrorist threats. Part II defines what cyberterrorism is and what distinguishes it from other manifestations of terrorism.
    [Show full text]
  • Domestic Terrorism: an Overview
    Domestic Terrorism: An Overview Jerome P. Bjelopera Specialist in Organized Crime and Terrorism August 21, 2017 Congressional Research Service 7-5700 www.crs.gov R44921 Domestic Terrorism: An Overview Summary The emphasis of counterterrorism policy in the United States since Al Qaeda’s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists—people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements—have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under federal terrorism statutes, which does not imply that domestic terrorists are taken any less seriously than other terrorists. The Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) do not officially designate domestic terrorist organizations, but they have openly delineated domestic terrorist “threats.” These include individuals who commit crimes in the name of ideologies supporting animal rights, environmental rights, anarchism, white supremacy, anti-government ideals, black separatism, and beliefs about abortion. The boundary between constitutionally protected legitimate protest and domestic terrorist activity has received public attention. This boundary is highlighted by a number of criminal cases involving supporters of animal rights—one area in which specific legislation related to domestic terrorism has been crafted. The Animal Enterprise Terrorism Act (P.L. 109-374) expands the federal government’s legal authority to combat animal rights extremists who engage in criminal activity. Signed into law in November 2006, it amended the Animal Enterprise Protection Act of 1992 (P.L. 102-346).
    [Show full text]
  • Downloads/EJF Viral-Diseases- From-Wildife-In-China-2003-final.Pdf (Accessed on 1 July 2020)
    sustainability Article A Prognostic View on the Ideological Determinants of Violence in the Radical Ecological Movement El˙zbietaPosłuszna Faculty of Aviation Safety, Military University of Aviation, 08-521 D˛eblin,Poland; [email protected] Received: 2 July 2020; Accepted: 9 August 2020; Published: 13 August 2020 Abstract: Ecologically motivated violence that manifests itself in the animal-rights and environmental forms is not a declining phenomenon. The fluctuating increase of the number of ecologically motivated crimes during the last 50 years, the multiplicity of the methods used (arson, food poisoning in supermarkets, destruction of equipment, attacks with the use of incentivized devices) should make us look at eco-extremism as a dynamic and difficult to grasp phenomenon. The paper is of both explanatory and prognostic nature; its goal is to present the genesis and essence of ecological radicalism, as well as to formulate the predictions for the future. In these forecasts, I wish to depart from the frequent, albeit somewhat simplistic, argument that, since the environmental extremist groups have not yet resorted to direct violence (targeting humans), and the animal-rights groups have reached for it very rarely, this state of affairs will continue in the future. This claim does not necessarily have to be true. I argue that some aspects of ideology can induce, in certain circumstances (a growing ecological catastrophe, further departure from the anthropocentric perspective), a change of the potential of radicalism within the environmental and animal-rights movements. In the case of animal-rights groups, the principle of not causing harm to people may be openly rejected, and in the case of environmental groups, the actions aimed at the annihilation of the whole human species may be undertaken.
    [Show full text]