SlideShare a Scribd company logo
1 of 10
Mapping the Mutations of Terrorism
Saron M. Obia
Pan African Institute for Development
West Africa
PAID-WA Buea, Cameroon
Outline
Why are crimes changing?
What is the system?
What is terrorism?
What is psychology of evil depression?
How do terrorists get into a country?
What are the tools used by terrorists?
What are they measures to be adapted to counter-terrorism?
What are the 4p to counter terrorism?
Why are crimes changing?
 system of hegemony control
 post-cold war
 changing theories
NB: International security remains a vital issue on the global
agenda. It involves more than states and military conflicts. The
concept has been widen with empirical analysis of
contemporary security issues such as terrorism, proliferation
and failed states. The interest of this presentation is to enable
counter-terrorism units to understand the changing trends of
terrorism.
What is the system?
Terrorism
International security focuses on the development of world
war 2 and through the cold war period as events in Latin
America, USA, Britain and other parts of Europe excluding
Greece and Spain. In the post cold war period the focus is on
the 9/11 2001 attacks on the twin tower in USA, London bus
bombing which proceeded the Spanish railway
attack,14January 2015 Paris bombing and the recent events in
Belgium . It should be noted that is was only after the 9/11 that
the counter-terrorism unit idea came to reality, after the notion
in the late 90s.
What is terrorism?
It has 109 definitions
Castro defined terrorism as use of violence to achieve a
political goal. Political terrorism is due to the fear of the
ballot box. Religious terrorism is the need to establish a
caliphate. Hezbollah say their freedom fighters. The three
patterns;
-violence
-psychological fear
-publicity
Types of terrorism
-economic -intellectual
-biological -poor people
David Altheide : Terrorism and the politics of fear
What is psychology of evil depression?
Categories of crimes as a result of failure in life
Due to materialistic ideas
Causes of these events
world order-hegemony
-survival
-national interest
-power politics
-global arms industry
ethno-religious and cultural conflicts
Ideological believe, for example Boko Haram considers
democracy as for anti Muslim
Peter Zeihan: “The Accident of Super Powers”
How do terrorists get into a country?
Anyone can be a terrorist
Terrorist enter countries as refugees
Asylum and even scholarships in certain universities. When
well established, they begin to expand the network of the
organization. For example the Paris attack 2015
The use of illegal documents (stolen documents) like
passport, credit cards and visa
Multiculturalism also aids, since it open doors for people (
future terrorism spots ). Counter-terrorism units must
monitor mostly refugee camps, boundaries and asylum
seekers.
The quest for intelligence and recruitment of security
officers, need adequate scrutiny. The 9/11 case can well
explain this.
What are the tools used by terrorists?
Knives and garrote
Explosive and bombs
Pistols and revolvers
Automatic assault rifles
Heavy and light machine guns
Antitank rockets and guns
Mortars
Man Portable Air
Malcolm W. Nance : Terrorist Recognition Handbook
What are they measures to be adapted to counter-terrorism?
Need for a coalition
censorship of social media. This is one of the main source of
recruitment by terrorist groups (ISIS and Al Queada)
Mapping of vulnerable and operational area
Monitoring of financial transactions within and out of the
country(hacking of bank accounts)
Updating the security database of all criminals, asylum
seekers and immigrants
Identify security, engineering, programming and IT students.
They are likely to be contacted by terrorist groups, like
Jihadi John
What are the 4p to counter terrorism?
Prevention
Persuit
Protection
preparation

More Related Content

What's hot

Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threatabhinav_cfa
 
Global terrorism
Global terrorism Global terrorism
Global terrorism namaniitian
 
Terrorism
TerrorismTerrorism
Terrorismu439
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issuerandima Dulanjani
 
Presentation on terrorism & its effect
Presentation on terrorism & its effectPresentation on terrorism & its effect
Presentation on terrorism & its effectAmanuzzaman Aman
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorismsaundriya
 
Genesis of terrorism
Genesis of terrorismGenesis of terrorism
Genesis of terrorismPranav Gupta
 
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIES
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIESTERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIES
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIESHasnaın Sheıkh
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed docHassan Shahzad
 
Terrorism in pakistan causes & remedies
Terrorism in pakistan causes & remediesTerrorism in pakistan causes & remedies
Terrorism in pakistan causes & remediesGulfam Hussain
 
Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview  Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview BANGLADESH POLICE
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsRuhull
 
Final_paper_revised
Final_paper_revisedFinal_paper_revised
Final_paper_revisedRicky Hemant
 
The threat of terrorism
The threat of terrorismThe threat of terrorism
The threat of terrorismCate Ramos
 
160407_Zarate_US-Japan_Counterterrorism_Cooperation
160407_Zarate_US-Japan_Counterterrorism_Cooperation160407_Zarate_US-Japan_Counterterrorism_Cooperation
160407_Zarate_US-Japan_Counterterrorism_CooperationClaire McGillem
 

What's hot (20)

Terrorism 2010
Terrorism 2010Terrorism 2010
Terrorism 2010
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threat
 
Global terrorism
Global terrorism Global terrorism
Global terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Presentation on terrorism & its effect
Presentation on terrorism & its effectPresentation on terrorism & its effect
Presentation on terrorism & its effect
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorism
 
Genesis of terrorism
Genesis of terrorismGenesis of terrorism
Genesis of terrorism
 
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIES
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIESTERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIES
TERRORISM IN PAKISTAN, ITS CAUESES, IMPACTS & REMEDIES
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism in pakistan causes & remedies
Terrorism in pakistan causes & remediesTerrorism in pakistan causes & remedies
Terrorism in pakistan causes & remedies
 
Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview  Terrorism in Bangladesh An Overview
Terrorism in Bangladesh An Overview
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politics
 
Final_paper_revised
Final_paper_revisedFinal_paper_revised
Final_paper_revised
 
The threat of terrorism
The threat of terrorismThe threat of terrorism
The threat of terrorism
 
160407_Zarate_US-Japan_Counterterrorism_Cooperation
160407_Zarate_US-Japan_Counterterrorism_Cooperation160407_Zarate_US-Japan_Counterterrorism_Cooperation
160407_Zarate_US-Japan_Counterterrorism_Cooperation
 

Viewers also liked

The mind of terrorist
The mind of terroristThe mind of terrorist
The mind of terroristsreejeethaa
 
Safout Secondary School for Girls Global Citizenship Project
Safout Secondary School for Girls Global Citizenship ProjectSafout Secondary School for Girls Global Citizenship Project
Safout Secondary School for Girls Global Citizenship ProjectGlobalNomadsGroup
 
Problems of the modern world by Team4
Problems of the modern world by Team4Problems of the modern world by Team4
Problems of the modern world by Team4Erasmus+
 
Freedom vs. Safety
Freedom vs. SafetyFreedom vs. Safety
Freedom vs. SafetyPablo Coto
 
Freedom vs security
Freedom vs securityFreedom vs security
Freedom vs securitySara Neira
 
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...AmbassadorZara Jane Juan PEACE INNOVATION
 
Muslim Extremism Historical Overview
Muslim Extremism Historical OverviewMuslim Extremism Historical Overview
Muslim Extremism Historical OverviewGarabet Moumdjian
 
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajExtremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajJasir T
 
Religious extremism
Religious extremismReligious extremism
Religious extremismOMAN1991
 
Karas ir tarpt. terorizmas
Karas ir tarpt. terorizmasKaras ir tarpt. terorizmas
Karas ir tarpt. terorizmasGeografija
 
Religious Extremism
Religious ExtremismReligious Extremism
Religious Extremismgueste45d41
 
Philosophy Lecture 01
Philosophy Lecture 01Philosophy Lecture 01
Philosophy Lecture 01Mr-Mike
 

Viewers also liked (20)

The mind of terrorist
The mind of terroristThe mind of terrorist
The mind of terrorist
 
Safout Secondary School for Girls Global Citizenship Project
Safout Secondary School for Girls Global Citizenship ProjectSafout Secondary School for Girls Global Citizenship Project
Safout Secondary School for Girls Global Citizenship Project
 
Man made
Man madeMan made
Man made
 
Warfare in the Qur’an
Warfare in the Qur’anWarfare in the Qur’an
Warfare in the Qur’an
 
Problems of the modern world by Team4
Problems of the modern world by Team4Problems of the modern world by Team4
Problems of the modern world by Team4
 
Gangs And The Military 5of7
Gangs And The Military 5of7Gangs And The Military 5of7
Gangs And The Military 5of7
 
Gangs And The Military 3of7
Gangs And The Military 3of7Gangs And The Military 3of7
Gangs And The Military 3of7
 
Freedom vs. Safety
Freedom vs. SafetyFreedom vs. Safety
Freedom vs. Safety
 
Freedom vs security
Freedom vs securityFreedom vs security
Freedom vs security
 
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...
The Mentor's Guide in Handling Teenage Leaders and Ways to Handle Bullying by...
 
Refugees crime against humanity
Refugees crime against humanityRefugees crime against humanity
Refugees crime against humanity
 
War and Terrorism
War and TerrorismWar and Terrorism
War and Terrorism
 
Presentation on refugee crisis
Presentation on refugee crisisPresentation on refugee crisis
Presentation on refugee crisis
 
Muslim Extremism Historical Overview
Muslim Extremism Historical OverviewMuslim Extremism Historical Overview
Muslim Extremism Historical Overview
 
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajExtremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
 
Religious extremism
Religious extremismReligious extremism
Religious extremism
 
Terorizmas
TerorizmasTerorizmas
Terorizmas
 
Karas ir tarpt. terorizmas
Karas ir tarpt. terorizmasKaras ir tarpt. terorizmas
Karas ir tarpt. terorizmas
 
Religious Extremism
Religious ExtremismReligious Extremism
Religious Extremism
 
Philosophy Lecture 01
Philosophy Lecture 01Philosophy Lecture 01
Philosophy Lecture 01
 

Similar to Mapping the mutations of terrorism

The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfMohammed Saaida
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxbissacr
 
MIRD Thesis Final Edit
MIRD Thesis Final EditMIRD Thesis Final Edit
MIRD Thesis Final EditPietro Moro
 

Similar to Mapping the mutations of terrorism (7)

How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdf
 
Essay On Terrisom
Essay On TerrisomEssay On Terrisom
Essay On Terrisom
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
 
MIRD Thesis Final Edit
MIRD Thesis Final EditMIRD Thesis Final Edit
MIRD Thesis Final Edit
 

More from SARON MESSEMBE OBIA (18)

Jihad and just war a religious game
Jihad and just war a religious gameJihad and just war a religious game
Jihad and just war a religious game
 
When time calls
When time callsWhen time calls
When time calls
 
The transfiguration of Africa
The transfiguration of AfricaThe transfiguration of Africa
The transfiguration of Africa
 
Why i hail my enemies
Why i hail my enemiesWhy i hail my enemies
Why i hail my enemies
 
Above poverty
Above povertyAbove poverty
Above poverty
 
The battle
The battleThe battle
The battle
 
Pick the coin
Pick the coinPick the coin
Pick the coin
 
Prostitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroonProstitution and cyber insecurity in cameroon
Prostitution and cyber insecurity in cameroon
 
The crusade
The crusadeThe crusade
The crusade
 
The saron messembe conflict theory
The saron messembe conflict theoryThe saron messembe conflict theory
The saron messembe conflict theory
 
Spy glass
Spy glassSpy glass
Spy glass
 
Divorce
DivorceDivorce
Divorce
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
The only pen
The only penThe only pen
The only pen
 
African union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaAfrican union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africa
 
Pan africanism why
Pan africanism whyPan africanism why
Pan africanism why
 
My chibok sister
My chibok sisterMy chibok sister
My chibok sister
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 

Recently uploaded

Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 

Recently uploaded (20)

Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 

Mapping the mutations of terrorism

  • 1. Mapping the Mutations of Terrorism Saron M. Obia Pan African Institute for Development West Africa PAID-WA Buea, Cameroon
  • 2. Outline Why are crimes changing? What is the system? What is terrorism? What is psychology of evil depression? How do terrorists get into a country? What are the tools used by terrorists? What are they measures to be adapted to counter-terrorism? What are the 4p to counter terrorism?
  • 3. Why are crimes changing?  system of hegemony control  post-cold war  changing theories NB: International security remains a vital issue on the global agenda. It involves more than states and military conflicts. The concept has been widen with empirical analysis of contemporary security issues such as terrorism, proliferation and failed states. The interest of this presentation is to enable counter-terrorism units to understand the changing trends of terrorism.
  • 4. What is the system? Terrorism International security focuses on the development of world war 2 and through the cold war period as events in Latin America, USA, Britain and other parts of Europe excluding Greece and Spain. In the post cold war period the focus is on the 9/11 2001 attacks on the twin tower in USA, London bus bombing which proceeded the Spanish railway attack,14January 2015 Paris bombing and the recent events in Belgium . It should be noted that is was only after the 9/11 that the counter-terrorism unit idea came to reality, after the notion in the late 90s.
  • 5. What is terrorism? It has 109 definitions Castro defined terrorism as use of violence to achieve a political goal. Political terrorism is due to the fear of the ballot box. Religious terrorism is the need to establish a caliphate. Hezbollah say their freedom fighters. The three patterns; -violence -psychological fear -publicity Types of terrorism -economic -intellectual -biological -poor people David Altheide : Terrorism and the politics of fear
  • 6. What is psychology of evil depression? Categories of crimes as a result of failure in life Due to materialistic ideas Causes of these events world order-hegemony -survival -national interest -power politics -global arms industry ethno-religious and cultural conflicts Ideological believe, for example Boko Haram considers democracy as for anti Muslim Peter Zeihan: “The Accident of Super Powers”
  • 7. How do terrorists get into a country? Anyone can be a terrorist Terrorist enter countries as refugees Asylum and even scholarships in certain universities. When well established, they begin to expand the network of the organization. For example the Paris attack 2015 The use of illegal documents (stolen documents) like passport, credit cards and visa Multiculturalism also aids, since it open doors for people ( future terrorism spots ). Counter-terrorism units must monitor mostly refugee camps, boundaries and asylum seekers. The quest for intelligence and recruitment of security officers, need adequate scrutiny. The 9/11 case can well explain this.
  • 8. What are the tools used by terrorists? Knives and garrote Explosive and bombs Pistols and revolvers Automatic assault rifles Heavy and light machine guns Antitank rockets and guns Mortars Man Portable Air Malcolm W. Nance : Terrorist Recognition Handbook
  • 9. What are they measures to be adapted to counter-terrorism? Need for a coalition censorship of social media. This is one of the main source of recruitment by terrorist groups (ISIS and Al Queada) Mapping of vulnerable and operational area Monitoring of financial transactions within and out of the country(hacking of bank accounts) Updating the security database of all criminals, asylum seekers and immigrants Identify security, engineering, programming and IT students. They are likely to be contacted by terrorist groups, like Jihadi John
  • 10. What are the 4p to counter terrorism? Prevention Persuit Protection preparation