Jump to content

Tactics of terrorism

From Wikipedia, the free encyclopedia

Terrorist tactics tend to favor attacks that avoid effective countermeasures and exploit vulnerabilities.[1]

Suicide attacks

[edit]

Suicide terrorism is the most aggressive form of terrorism, pursuing coercion even at the expense of losing support among terrorists' own community. What distinguishes a suicide terrorist is that the attacker does not expect to survive a mission and often employs a method of attack that requires the attacker's death in order to succeed (such as planting a car bomb, wearing a suicide vest, or ramming an airplane into a building). In essence, a suicide terrorist kills others at the same time that he kills himself. Usually these tactics are used for a demonstrative purposes or to targeted assassinations. In most cases though, they target to kill a large number of people. Thus, while coercion is an element in all terrorism, coercion is the paramount objective of suicide terrorism.[2]

The number of attacks using suicide tactics has grown from an average of fewer than five per year during the 1980s to 180 per year between 2000 and 2005,[3] and from 81 suicide attacks in 2001 to 460 in 2005.[4] These attacks have been aimed at diverse military and civilian targets, including in Sri Lanka, in Israel since July 6, 1989,[5] in Iraq since the US-led invasion of that country in 2003, and in Pakistan and Afghanistan since 2005.

Between 1980 and 2000, the largest number of suicide attacks was carried out by separatist Liberation Tigers of Tamil Eelam of Sri Lanka. The number of attacks conducted by LTTE was almost double that of nine other major extremist organizations.[6]

In Israel, Gaza and the West Bank, suicide bombings are an anti-Israel strategy perpetrated generally by Islamist and occasionally by secular Palestinian groups including the PFLP.[7]

India has also been the victim of suicide attacks by groups based in Pakistan, a recent example taking place in February 2019.[8] An attack by the Pakistan-based Jaish-e-Mohammed group on Indian security forces Pulwama district of Jammu and Kashmir, India, resulted in the loss of 40 security personnel of the CRPF. This eventually resulted in the India–Pakistan border skirmishes of 2019.[9]

Nuclear weapons

[edit]

Concerns have also been raised regarding attacks involving nuclear weapons. It is considered plausible that terrorists could acquire a nuclear weapon.[10] In 2011, the British news agency, the Telegraph, received leaked documents regarding the Guantanamo Bay interrogations of Khalid Sheikh Mohammed. The documents cited Khalid saying that, if Osama bin Laden is captured or killed by the Coalition of the Willing, an Al-Qaeda sleeper cell will detonate a "weapon of mass destruction" in a "secret location" in Europe, and promised it would be "a nuclear hellstorm".[11][12][13][14]

While no terrorist group has ever successfully acquired and used a nuclear weapon, many political scientists and prominent government officials consider nuclear terrorism to be one of the single greatest threats in global security. There is strong evidence that terrorist groups like Al-Qaeda are actively seeking to acquire nuclear weapons, and the plutonium or highly enriched uranium (HEU) needed to produce them.[15] Weaknesses in many states’ nuclear security apparatuses have left them susceptible to theft or loss of HEU or plutonium. According to the International Atomic Energy Agency's (IAEA) Illicit Trafficking Database (ITDB), there have been 18 incidents of theft or loss of HEU and plutonium reported in ITDB's participating states.[15]

Conventional firearms

[edit]

Despite the popular image of terrorism as bombings alone, and the large number of casualties and higher media impact associated with bombings, conventional firearms are as much if not more pervasive in their use.[16]

In 2004, the European Council recognized the "need to ensure terrorist organisations and groups are starved of the components of their trade," including “the need to ensure greater security of firearms, explosives, bomb-making equipment and technologies that contribute to the perpetration of terrorist outrages."[17]

Stabbing

[edit]

Stabbing attacks are inexpensive and easy to carry out, but very difficult for security services to prevent.[18]

References

[edit]
  • Forest, J. J. F., & Howard, R. D. (2018). Vehicle Ramming Attacks: Threat Landscape, Indicators, and Countermeasures. The Journal of Conventional Weapons Destruction, 22(3), 14-22.
  • Lowther, A., & Bilgen-Reinart, N. (2018). Vehicle Ramming: A Contemporary Terrorist Tactic. Perspectives on Terrorism, 12(1), 5-17.
  • Rothstein, H. J., & Potekhin, V. (2019). From Car Bombs to Car Ramming: A New Form of Attack? Journal of Strategic Security, 12(4), 43-61.
  • Sorensen, J. (2020). Vehicle Ramming Attacks: A Scoping Review. Journal of Terrorism Research, 11(1), 1-19.
  • United Nations Office of Counter-Terrorism. (2018). Vehicle Ramming: Preventing Terrorist Use. United Nations.
  • Lance James. (2005). Phishing Exposed. Syngress.
  • DESOLDA, G., FERRO, L. S., MARRELLA, A., CATARCI, T., & COSTABILE, M. F. (2022). Human Factors in Phishing Attacks: A Systematic Literature Review. ACM Computing Surveys, 54(8), 1–35. doi:10.1145/3469886
  • Weimann, Gabriel. "Terrorism in cyberspace: The next generation." Comparative Politics, vol. 33, no. 2, 2001, pp. 171-191. JSTOR, www.jstor.org/stable/422429. Accessed 1 May 2023.
  • Raja, M. Ali, and Z. Hussain. "Cyberterrorism: A New Dimension of Terrorism." International Journal of Computer Science and Network Security, vol. 7, no. 11, 2007, pp. 274-279.
  • Denning, Dorothy E. "Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy." Proceedings of the 21st Century Threats: Challenges and Opportunities, 2000.
  • Sengupta, Krishnendu. "Cyberterrorism: An Exploration of the Threat from Nation-States and Nonstate Actors." Journal of National Security Law & Policy, vol. 7, no. 1, 2014, pp. 69-99.
  • Khairuddin, Irwandansyah, et al. "Cyber Terrorism: Threat Analysis and Mitigation Strategies." International Journal of Advanced Computer Science and Applications, vol. 8, no. 4, 2017, pp. 225-232.
  • Wall, David. "Cyber-Terrorism: Threat, Reality, and Response." Crime, Law and Social Change, vol. 43, no. 4-5, 2005, pp. 187-199.
  1. ^ FEMA, “Evolving Terrorist Threat: Long-term Trends and Drivers and Their Implications for Emergency Management,” September 2011, http://www.fema.gov/pdf/about/programs/oppa/evolving_terrorist_threat.pdf.
  2. ^ Pape, Robert A. (1 January 2003). "The Strategic Logic of Suicide Terrorism". The American Political Science Review. 97 (3): 343–361. doi:10.1017/S000305540300073X. hdl:1811/31746. JSTOR 3117613. S2CID 1019730.
  3. ^ The Moral Logic and Growth of Suicide Terrorism, Figure 1 (p. 128).
  4. ^ The Moral Logic and Growth of Suicide Terrorism, Figure 2 (p. 129).
  5. ^ גדות, יפעת (July 6, 2009). פיגוע אוטובוס 405 (in Hebrew). News1. Retrieved 2009-07-06.
  6. ^ Social psychological motivations of suicide terrorism: A community-level perspective by J. Sheehy-Skeffington.
  7. ^ Pedahzur, A., 'Suicide Terrorism' (Cambridge 2005), pp.66-69.
  8. ^ "Tracing the path that led to the Kashmir attack". 30 April 2019.
  9. ^ "Standoff in Kashmir: 'Our last hope is that a war will sort this once and for all' | Kashmir | the Guardian".
  10. ^ Nuclear Terrorism: Frequently Asked Questions, Belfer Center for Science and International Affairs, September 26, 2007
  11. ^ Hope, Christopher (April 25, 2011). "WikiLeaks: Guantanamo Bay terrorist secrets revealed". London: Telegraph.co.uk. Retrieved April 27, 2011.
  12. ^ "'Nuclear hellstorm' if bin Laden caught - 9/11 mastermind". News.com.au. April 25, 2011. Retrieved April 27, 2011.
  13. ^ "'Nuclear hellstorm' if bin Laden caught: 9/11 mastermind". News.Yahoo.com. 2011-04-25. Retrieved April 27, 2011.
  14. ^ "Al-Qaeda Hid Bomb in Europe – WikiLeaks Releases Secret Files | Newstabulous - Headlines". Archived from the original on 2011-05-07. Retrieved 2011-10-29.
  15. ^ a b Matthew Bunn and E.P. Maslin, "All Stocks of Weapons-Usable Nuclear Materials Worldwide Must be Protected Against Global Terrorist Threats," Journal of Nuclear Materials Management 39 (Winter 2011): 21.
  16. ^ United Nations Office on Drugs and Crime. "Conventional Terrorist Weapons". Archived from the original on 2007-06-12. Retrieved 2007-09-06.
  17. ^ "Justice policies at a glance - European Commission".
  18. ^ Bergen, Peter (2 October 2017). "London shows the challenge of preventing low-tech terror". CNN. Retrieved 4 April 2017.
[edit]