10/29/2003Strategic Intel page 1 Terrorism Definitions Many Ambiguous Matter of perception “One man’s terrorist is another man’s freedom fighter.”

Slides:



Advertisements
Similar presentations
Terrorism.
Advertisements

The State and the International System The International System What do we mean by “system”? Interactions by various political entities, but mostly states.
GISE April, 2014 Tran, Thi Thuy Vuong I35028.
CWI Agenda for Wednesday5/21/14 1.Do Now 1.What is Terrorism? 1.Research Paper Check In.
Terrorism A Brief Overview. The Beginning Terrorism: Key Terms Vision Power Strategy Tactic Duty Shame Freedom fighter Ideology Indoctrination Radicalization.
C OMBATING T ERRORISM C ENTER at West Point Dr. James Forest Director of Terrorism Studies SS474: TERRORISM & COUNTERTERRORISM Lesson 1: Introduction to.
A Word Study of Terrorism As it relates to U.S. History.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Computer Security Fundamentals
8 Types of Terrorism. Terrorism: Eight Major Types Nationalist Religious State-sponsored Left-wing Right-wing Anarchist Cyber Narco.
1 Military Globalization Military power central to globalization –Underwrites empires and territorial expansion –Military technologies shrink globe, permit.
Terrorism and Globalization. Defining Terrorism Globalization is not responsible for terrorism, but it allows terrorism to exist on a global level Debatable.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Today’s World Section 3 Preview Main Idea / Reading Focus The Threat of Terrorism Map: World Terrorism Incidents Other Threats to Security Threats to World.
Threats to World Security Chapter 33 Section 3.
CYBER CRIME AND SECURITY TRENDS
The terrorist attacks of Sept. 11 th, 2001 killed approximately 3000 people and immediately cost the US economy $150 billion. The terrorist attacks of.
What is War? How do we define war?. "War on Drugs” Uprising of Palestinians in Gaza and the West Bank The bombing of the Federal Building in Oklahoma.
Comparative Criminal Justice Systems CRIME, TRANSNATIONAL CRIME, AND JUSTICE CHAPTER TWO Reichel.
Terrorism.
Terrorism in Today’s World Definition, History, Root Causes and Strategy Dr. James Forest, Director of Terrorism Studies.
Middle East History Review European Partitioning in the Middle East Iraq Iran Afghanistan.
Submitted by: Abhashree Pradhan CA (1)
Unit 3. Ancient History  Some of the world’s oldest settlements have been found in the Middle East  The world’s oldest civilizations were in Mesopotamia.
 Intro to Terrorism.  Definitions  Many  Ambiguous  Are terrorists “freedom fighters”?  Matter of perception?  What is the relationship between.
Geopolitics of Terrorism
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1 Terrorism in the Modern World Vocabulary terms.
The Nature of Terrorism
WMD Operations Unit 5 slide 1 MODULE 2 UNIT 5 Chemical Agents.
Foreign and Defense Policymaking Chapter 20. American Foreign Policy: Instruments, Actors, and Policymakers  Instruments of Foreign Policy  Military.
 United Nations: International organization aimed at keeping peace in the world and providing assistance to nations in need General Assembly: - has.
Chapter 16 Conflict Around the World The Global Context: Conflict In A Changing World Sociological Theories Of Conflict And War Causes Of War.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism.
IR 203 Current issues in international relations (7) Bezen Balamir Coskun office: 417
CHEMICAL WARFARE KEN JORDAN ‘02. WHAT IS IT?? Chemical Warfare is the use of chemical compounds to kill or injure an enemy.
C OMBATING T ERRORISM C ENTER at West Point James JF Forest, Ph.D. Director of Terrorism Studies Root Causes, Facilitators and Underlying Conditions of.
Learning Standards : Post WWII - Cold War. American History.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
in the Contemporary Operational Environment (COE) Learning Activity 2
NATIONALISM. Definition “Nationalism is a shared sense of identity based on important social distinctions…” In other words, it is PRIDE IN YOUR NATION.
IAFS 1000 Terrorism.
What is it? Where does it come from? Why is it used? How can we prevent it? What do we fear about Terrorism?
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
The Peculiarities Of Russian Attitudes Towards Terrorism Muravyova Anna Saratov State University Sociological department.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
Terrorism!. Terrorism Introduction under-attack-cm-orig.cnn/video/playlists/paris- shootings/
September 11 th, Global Terrorism and War on Terrorism.
Weapons Of Mass Destruction Unit 3. W.M.D C hemical B iological R adiological N uclear.
Directions Complete the PowerPoint Guided Notes. When finished with the PowerPoint, read the article on page 4 and analyze the political cartoons on pages.
U NIT 1 Day 3: Threats of Globalism & Ethnic Cleansing.
Bioterrorism intentional use of harmful biological substances or germs to cause widespread illness and fear.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Terrorism!.
International Terrorism: Defined
WEEK 4 September 11th, Global Terrorism and War on Terrorism
Terrorism Overview.
Threats to World Security Chapter 33 Section 3.
DO NOW – Reading Quiz How does the U.S. State department define terrorism? Politically motivated violence directed at governments Religiously motivated.
Political Challenges in the Modern World
Chapter 13 Globalization and Terrorism: Our Small World
UNIT 8B – Global Conflicts, Post World War II
Terrorism What is it?.
PAPER #2: 2 ESSAYS/2 HRS. SL Students: 50% HL Students: 30%
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
Presentation transcript:

10/29/2003Strategic Intel page 1 Terrorism Definitions Many Ambiguous Matter of perception “One man’s terrorist is another man’s freedom fighter.”

10/29/2003Strategic Intel page 2 Certain aspects are fundamental Political act Desire for political change Terrorism is typically non-state in character (Note the separate but related topic of state terrorism – typically antithetical to the desire for political change.) States can terrorize, but they are not terrorists. Terrorists do not abide by norms They target innocents They seek psychological trauma

10/29/2003Strategic Intel page 3 Historical Examples Zealots – Sicarri 1 st century BCE Murdered Romans in Broad daylight in Jerusalem. Hindu Thugee Thugs originally religious sect that strangled & robbed victims in ritual sacrifice Muslim Assassins It is a myth that the word assassin comes from the Arabic word haschishin for hashish user. Assassin comes from Hassassin -- a follower of Hassan – Hassan was Persian not Arabic.

10/29/2003Strategic Intel page 4 More history of terrorism French revolution Use of revolutionary tribunals to prop up the French republic.

10/29/2003Strategic Intel page 5

10/29/2003Strategic Intel page 6 Modern Terrorism 4 Waves Breakup of empires Decolonization Leftist ant-Western sentiment Religious inspiration

10/29/2003Strategic Intel page 7 Decolonization Examples Algeria South Africa Vietnam Israel

10/29/2003Strategic Intel page 8 Ant-Western Wave Grew out of Vietnam Fostered by Soviets, Iran, Libya N Korea Has returned to Bite them Afghanistan Chechnya

10/29/2003Strategic Intel page 9 Religious Wave - Jihad Iran Afghanistan Not new

10/29/2003Strategic Intel page 10 Breakup of Empire Terrorists seek to provoke state to the point where the reaction leads to popular revolt. Seldom successful – but there are exceptions Tsarist Russia

10/29/2003Strategic Intel page 11 Domestic terrorism Militias Oklahoma Any separatists? Policy terrorists Abortion Environmental

10/29/2003Strategic Intel page 12 War on Terror Targets Policies Financial State directed International Agreement

10/29/2003Strategic Intel page 13 Types Left-wing Right Wing Ethnonationalist/separatists Religious

10/29/2003Strategic Intel page 14 Left wing terrorist Driven by liberal or idealist political concepts Prefer revolutionary anti-authoritarian anti-materialist agendas Typically target elites that symbolize authority

10/29/2003Strategic Intel page 15 Right wing terrorists Often target race and ethnicity

10/29/2003Strategic Intel page 16 Ethnonationalist/separatists Usually have clear territorial objectives Liberation/separation Popular support usually along ethnic/racial lines.

10/29/2003Strategic Intel page 17 Religious terrorists Believe involved in a struggle of good vs evil Acting along desires of a diety – audience thus not necessarily human. Feel unconstrained by law – higher calling Complete alienation from existing socio/political order Support may be diffuse

10/29/2003Strategic Intel page 18 Basic trends in terrorism Fewer attacks More violent attacks (increasing lethality)

10/29/2003Strategic Intel page 19 Media Impacts Media exposure to violence influences Opinion Attitude Emotional State! Women react to anxiety more than men (Men behave instrumentally)

10/29/2003Strategic Intel page 20 Terrorism and WMD Biological Agents Chemical Agents Nuclear Materials/Weapons Cyberterrorism

10/29/2003Strategic Intel page 21 Biological Weapons - History Poisoning of wells since pre-history Use of dead to poison water during Greeks & Romans Poisoned arrows/spears/”pungi sticks” Catapulting of plague victims in 1300s by Mongols US Army gave blankets of smallpox victims to Native Americans US tested anthrax in 1941 on island – declares uninhabitable in 1988 Japanese tested bioweapons on Chinese prisoners, possessed anthrax weapons

10/29/2003Strategic Intel page 22 Biological Weapons Biotoxins Botulism clostridium botulinum Used to assassinate Reinhard Heydrich in Czechoslovakia in WWII Clostridium agents Tetanus Ricin From castor bean used to assassinate Georgi Markov (Hungarian defectors) Found in possession of group in London

10/29/2003Strategic Intel page 23

10/29/2003Strategic Intel page 24 Chemical Weapons - History WWI – Phosgene, Chlorine, Mustard Vietnam – Agent Orange Iraq-Iran – Aum Shinrikyo in Tokyo subway 1995

10/29/2003Strategic Intel page 25 Chemical Weapons Nerve Agents Sarin (Aum Shinrikyo) VX (Iraq) Cyanide (Jonestown) Vesicants (Blister Agents) Mustard Gas (WWI) Lewisite (Japan ??)

10/29/2003Strategic Intel page 26 Chemical Weapons (cont) Pulmonary Agents Phosgene (WWI) Chlorine (WWI) Riot Control Agents CS CN – Mace Pepper Spray

10/29/2003Strategic Intel page 27

10/29/2003Strategic Intel page 28 The Internet as a Vehicle for Political Conflict Dorothy Denning breaks down political conflict on the Internet as divided into: Activism Hactivism Cyberterrorism To which we can add: Cybernetic Warfare

10/29/2003Strategic Intel page 29 Activism There are several ways that the Internet facilitates political activism Data Collection Censorship difficult Publication Exceptionally cost effective Opportunity for Dialogue Coordination and Communication Lobbying

10/29/2003Strategic Intel page 30 Hactivism Hactivism catches the spirit of “non-violent protest” and Civil disobedience. In general, activism that crosses the boundary to uninvited intrusion or unwarranted interference The virtual sit-in or Blockade Denial of service attacks Mafia Boy Code Red bombs Web site defacement

10/29/2003Strategic Intel page 31 Computer Hacking There are several levels of Computer Network “crime” that have become commonplace Hacking Uninvited intrusion of another compute Often seen as benign Cracking Intentionally circumventing security measures with the express purpose of obtaining or disseminating information, services, software for the material gain of self or others. (i.e. providing or using software cracks to circumvent license protection)

10/29/2003Strategic Intel page 32 Cybernetic Crime Defacement Altering web site material for personal or political purposes Cyber-crime Theft or misappropriation of information for material gain (i.e. theft of credit card info)

10/29/2003Strategic Intel page 33 Cybernetic Warfare The New Global Threat Paradigm Information warfare actions taken to degrade or manipulate an adversary's information systems while defending one's own. Cybernetic warfare, a form of information warfare involving operations to disrupt, deny, corrupt, or destroy information resident in computers and computer networks.

10/29/2003Strategic Intel page 34 Cybernetic Warfare Transnational Infrastructure warfare, attacking a nation's key industries and utilities; telecommunications, energy and power, transportation, governmental operations and services, emergency services, financial, manufacturing, etc. Asymmetric warfare, attacking an adversary's weaknesses, avoiding his strengths, while preventing him from doing the same to you, using asymmetric means such as terrorism.

10/29/2003Strategic Intel page 35 Cybernetic Warfare Asynchronous warfare, a pre-selected or delayed attack on an adversary taking advantage of the passage of time to develop a strategic opportunity or exploit a future vulnerability. Future Warfare Trends "Any sufficiently advanced technology is virtually indistinguishable from magic." Arthur Clarke, The Impact of Technology -- Technowar

10/29/2003Strategic Intel page 36 Cybernetic Warfare The rapid pace of military technology in the areas of will continue. In particular precision weapons, Information, Communications Major technological breakthroughs in military capability are likely in the next two decades.

10/29/2003Strategic Intel page 37 Stegnography What is your quest? Tools