0
Terrorism Understanding the Threat Course Text:   Martin, Gus (2006).  Understanding Terrorism .  Thousand Oaks, CA: Sage.
Options <ul><li>Use of Force </li></ul><ul><ul><li>Coercive covert operations </li></ul></ul><ul><ul><li>Suppressive campa...
Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Military </li></ul></ul><ul><ul><ul><li>Unite...
Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Military ( Continued ) </li></ul></ul><ul><ul...
Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Police </li></ul></ul><ul><ul><ul><li>France ...
Repressive Operations <ul><li>Covert Operations </li></ul><ul><ul><li>Infiltration </li></ul></ul><ul><ul><li>Disinformati...
Repressive Operations <ul><li>Enhanced Security </li></ul><ul><ul><li>Target Hardening (AT) </li></ul></ul><ul><li>Economi...
Conciliatory Options <ul><li>Diplomacy </li></ul><ul><ul><li>Peace Processes </li></ul></ul><ul><ul><li>Negotiations </li>...
Legalistic Response <ul><li>Law Enforcement and Counterterrorism </li></ul><ul><ul><li>INTERPOL </li></ul></ul><ul><ul><li...
Legalistic Response <ul><li>Domestic Laws and Counterterrorism </li></ul><ul><ul><li>Civil Liberties </li></ul></ul><ul><u...
Legalistic Response <ul><li>International Law – Treaties </li></ul><ul><ul><li>Tokyo Convention – 1963 </li></ul></ul><ul>...
Chapter #14 <ul><li>The Future of Terrorism </li></ul><ul><ul><li>Projections </li></ul></ul><ul><ul><li>New Threats </li>...
Projections <ul><li>New Terrorism </li></ul><ul><ul><li>Communications & Technology use </li></ul></ul><ul><ul><li>Cell-ba...
New Threats <ul><li>Sources not likely to change </li></ul><ul><li>Political violence will continue </li></ul><ul><li>Nati...
New Challenges <ul><li>Disrupting & preventing plans </li></ul><ul><li>Deterring transition from activism to violence </li...
Responses <ul><li>Government </li></ul><ul><ul><li>Operations other than war </li></ul></ul><ul><ul><ul><li>Peace process ...
Continued Use of Force <ul><li>Eliminate terrorist threats </li></ul><ul><li>General deterrence (risk outweigh benefits) <...
The United States <ul><li>Homeland  Security </li></ul>
END
Terrorism Understanding the Threat   Class #16   Final Examination
Upcoming SlideShare
Loading in...5
×

Crj3400 Terrorism Understanding The Threat13 14

444

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
444
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Crj3400 Terrorism Understanding The Threat13 14"

  1. 1. Terrorism Understanding the Threat Course Text: Martin, Gus (2006). Understanding Terrorism . Thousand Oaks, CA: Sage.
  2. 2. Options <ul><li>Use of Force </li></ul><ul><ul><li>Coercive covert operations </li></ul></ul><ul><ul><li>Suppressive campaigns </li></ul></ul><ul><ul><li>Punitive/Preemptive strikes </li></ul></ul><ul><li>Repressive </li></ul><ul><ul><li>Covert Operations </li></ul></ul><ul><ul><li>Intelligence </li></ul></ul><ul><ul><li>Enhanced Security </li></ul></ul><ul><ul><li>Economic Sanctions </li></ul></ul><ul><li>Conciliatory </li></ul><ul><ul><li>Diplomacy </li></ul></ul><ul><ul><li>Social Reform </li></ul></ul><ul><ul><li>Concessions </li></ul></ul><ul><li>Legalistic </li></ul><ul><ul><li>Law enforcement </li></ul></ul><ul><ul><li>Criminalized terrorist behavior </li></ul></ul><ul><ul><li>International agreements </li></ul></ul>
  3. 3. Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Military </li></ul></ul><ul><ul><ul><li>United Kingdom </li></ul></ul></ul><ul><ul><ul><ul><li>Special Air Service (SAS) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Special Boat Service (SBS) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Royal Marine Commandos </li></ul></ul></ul></ul><ul><ul><ul><li>France </li></ul></ul></ul><ul><ul><ul><ul><li>1 st Navy Parachute Infantry Regiment (1RPIMa) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>French Navy Special Assault units </li></ul></ul></ul></ul><ul><ul><ul><ul><li>11 th Parachute Division </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Foreign Legion </li></ul></ul></ul></ul>
  4. 4. Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Military ( Continued ) </li></ul></ul><ul><ul><ul><li>Israel </li></ul></ul></ul><ul><ul><ul><ul><li>Sayaret Makal </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Parachite Sayaret </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Golani Brigade </li></ul></ul></ul></ul><ul><ul><ul><li>United States </li></ul></ul></ul><ul><ul><ul><ul><li>1 st Special Forces Ops Det – Delta </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Special Forces Group </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Sea Air Land Forces </li></ul></ul></ul></ul><ul><ul><ul><ul><li>75 th Ranger Regiment </li></ul></ul></ul></ul>
  5. 5. Coercive Covert Opns <ul><li>Special Operations Forces </li></ul><ul><ul><li>Police </li></ul></ul><ul><ul><ul><li>France – GIGN </li></ul></ul></ul><ul><ul><ul><li>Germany – GSG-9 </li></ul></ul></ul><ul><ul><ul><li>Israel – YAMAS & YAMAM </li></ul></ul></ul><ul><ul><ul><li>Spain – GEO </li></ul></ul></ul><ul><ul><ul><li>United States – FBI’s HRT & Local SWAT </li></ul></ul></ul>
  6. 6. Repressive Operations <ul><li>Covert Operations </li></ul><ul><ul><li>Infiltration </li></ul></ul><ul><ul><li>Disinformation </li></ul></ul><ul><ul><li>Cyberwar </li></ul></ul><ul><li>Intelligence </li></ul><ul><ul><li>HUMINT </li></ul></ul><ul><ul><li>SIGINT </li></ul></ul><ul><ul><li>Agencies </li></ul></ul><ul><ul><ul><li>Great Britain – MI-5 & MI-6 </li></ul></ul></ul><ul><ul><ul><li>United States – FBI & CIA </li></ul></ul></ul><ul><ul><ul><li>Germany – Bureau for Protection of the Constitution Military Intelligence Service </li></ul></ul></ul>
  7. 7. Repressive Operations <ul><li>Enhanced Security </li></ul><ul><ul><li>Target Hardening (AT) </li></ul></ul><ul><li>Economic Sanctions </li></ul><ul><ul><li>Trade restrictions/controls imposed to pressure governments to moderate their behavior </li></ul></ul><ul><ul><li>For Success </li></ul></ul><ul><ul><ul><li>International cooperation must remain firm </li></ul></ul></ul><ul><ul><ul><li>Trade leaks in the sanctions must be controlled </li></ul></ul></ul><ul><ul><ul><li>The sanctioned regime must suffer </li></ul></ul></ul>
  8. 8. Conciliatory Options <ul><li>Diplomacy </li></ul><ul><ul><li>Peace Processes </li></ul></ul><ul><ul><li>Negotiations </li></ul></ul><ul><li>Social Reform </li></ul><ul><li>Concessionary Options </li></ul>
  9. 9. Legalistic Response <ul><li>Law Enforcement and Counterterrorism </li></ul><ul><ul><li>INTERPOL </li></ul></ul><ul><ul><li>Rewards for Justice </li></ul></ul><ul><ul><li>Sky Marshals </li></ul></ul><ul><ul><li>Profiling </li></ul></ul><ul><ul><ul><li>Terrorist </li></ul></ul></ul><ul><ul><ul><li>Criminal </li></ul></ul></ul><ul><ul><ul><li>Racial </li></ul></ul></ul>
  10. 10. Legalistic Response <ul><li>Domestic Laws and Counterterrorism </li></ul><ul><ul><li>Civil Liberties </li></ul></ul><ul><ul><li>Terrorism Courts </li></ul></ul><ul><ul><li>Qualified Amnesty </li></ul></ul><ul><ul><li>USAPATRIOT Act </li></ul></ul>
  11. 11. Legalistic Response <ul><li>International Law – Treaties </li></ul><ul><ul><li>Tokyo Convention – 1963 </li></ul></ul><ul><ul><li>Hague Convention – 1970 </li></ul></ul><ul><ul><li>Montreal Convention – 1971 </li></ul></ul><ul><ul><li>CPPATTFCAPRETAIS (page 376) </li></ul></ul><ul><li>International Courts </li></ul><ul><ul><li>Intl Court of Justice </li></ul></ul><ul><ul><li>Intl Criminal Court </li></ul></ul><ul><ul><li>Intl Criminal Tribunal – former Yugoslavia </li></ul></ul><ul><ul><li>Intl Criminal Tribunal – Rwanda </li></ul></ul>
  12. 12. Chapter #14 <ul><li>The Future of Terrorism </li></ul><ul><ul><li>Projections </li></ul></ul><ul><ul><li>New Threats </li></ul></ul><ul><ul><li>New Challenges </li></ul></ul><ul><ul><li>The United States </li></ul></ul>
  13. 13. Projections <ul><li>New Terrorism </li></ul><ul><ul><li>Communications & Technology use </li></ul></ul><ul><ul><li>Cell-based organizations </li></ul></ul><ul><ul><li>Low-tech tactics </li></ul></ul><ul><ul><li>High-tech weapons </li></ul></ul><ul><li>State Terrorism </li></ul><ul><li>Dissident terrorism </li></ul><ul><li>Proxies </li></ul>
  14. 14. New Threats <ul><li>Sources not likely to change </li></ul><ul><li>Political violence will continue </li></ul><ul><li>National identity, racial supremacy, religious dogma & ideological beliefs </li></ul>
  15. 15. New Challenges <ul><li>Disrupting & preventing plans </li></ul><ul><li>Deterring transition from activism to violence </li></ul><ul><li>Implementing treaties and task forces </li></ul><ul><li>Minimizing destruction and casualties </li></ul>
  16. 16. Responses <ul><li>Government </li></ul><ul><ul><li>Operations other than war </li></ul></ul><ul><ul><ul><li>Peace process </li></ul></ul></ul><ul><ul><ul><li>Negotiation </li></ul></ul></ul><ul><ul><ul><li>Social reform </li></ul></ul></ul><ul><li>Society </li></ul><ul><ul><li>Cultural and ideological shift </li></ul></ul><ul><ul><li>Efforts to promote inclusion </li></ul></ul><ul><li>Countering Extremism </li></ul>
  17. 17. Continued Use of Force <ul><li>Eliminate terrorist threats </li></ul><ul><li>General deterrence (risk outweigh benefits) </li></ul><ul><li>Specific deterrence (focused message) </li></ul><ul><li>Demonstrate national will </li></ul>
  18. 18. The United States <ul><li>Homeland Security </li></ul>
  19. 19. END
  20. 20. Terrorism Understanding the Threat Class #16 Final Examination
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×