SlideShare a Scribd company logo
1 of 41
John Lynn, ACDIS
Department of History
Thank you,
Jeremiah.
Raymond Aron, wrote:
“An action of violence is
labeled ‘terrorist’ when its
psychological effects are
out of proportion to its
purely physical results.”
Fundamental
Theses
Six Levels of Terrorism
More
Fundamental
Theses
Terrorists see themselves as
fighting a war to defend or promote
an essential and just cause.
Terrorists are “surprisingly
normal,” not clinically psychotic.
Terrorists are rational actors.
And, being rational actors at war,
they pursue strategies.
WAR AIMS, GOALS –
The purpose of the war
STRATEGIES –
How to conduct a war
TACTICS –
How to fight a battle
STRATAGEMS –
Tactics of deceiving or
outwitting the enemy
Four Strategies of Terrorism
STRONG WEAK
INTIMIDATION
Primary for Strong-Capacity Terrorists
EMPHASIS ON FEAR
Want acquiescence, obedience,
submission, end to resistance
No use for inciting reprisals by OUTRAGE
Useful for Weak-Capacity Terrorists
Fear among target community
Revolutionary discipline within the group
Compel radical rivals to give way or join
Four Strategies of Terrorism
INITIATION
For Radical Terrorists who want to act
as a precipitant or a catalyst.
Want to exploit the OUTRAGE of the
enemy oppressors so as to reveal the
WICKEDNESS AND WEAKNESS
of the oppressors.
Appeals to very weak groups with great
expectations but few resources,
explaining why most terrorists of the
first and second waves failed.
ATTRITION
For somewhat stronger radical terrorists,
who cannot overpower the enemy, but
have sufficient numbers and resources to
inflict losses on their enemy.
Want to get the enemy to invest
unsustainable psychological and physical
resources until worn down.
Second Wave PIRA began with a strategy
of Initiation, 1970-1972, but by 1976-77
adopted Attrition in the “Long War.”
EVOLUTION
A strategy of moving to higher levels of
strength, resources, and numbers.
Important question: need it be theory,
intention, or simply opportunism?
Theory of escalating stages goes back to
Mao.
Particularly prominent in Third Wave.
EXAMPLES OF EVOLUTION
FLN of Algeria(?)
PLO
FARC of Columbia
Tamil Tigers of Sri Lanka
Hezbollah of Lebanon
Hamas of Gaza
FROM ZARQAWI’s JTJ AND AQI TO
TO AL-BAGHDADI’S ISI AND ISIS,
THEN FINALLY TO HIS
ISLAMIC STATE
Four Strategies of Terrorism
MAO ZEDONG’S PROGRESSION
OF REVOLUTIONARY WARFARE
Guerrilla Warfare
Guerrilla Bands
Terrorism
Terrorist Cells
Guerrilla Warfare
Guerrilla Bands
Terrorism
Terrorist Cells
Abu Bakr Naji
c. 1961-2008
Abd al-Aziz
al-Muqrin
(1971-2004)
Abu Ubayd al-Qurashi
d. ca. 2006???
Mao
Zedong
Abu Bakr
al-Baghdadi
b. 1971
Carl von
Clausewitz
The Mastery
of Savagery
Terrorists Study Military Theory
and Practice
GLOBAL STRATEGIES
Global Participation Global Conflict
Abdullah Yusuf Azzam Osama bin Laden
Is this a terrorist “group”?
The Islamic State, Jan. 2015
WHAT IS A STATE?
TERRITORY
RESOURCES
FORCES
MONOPOLOLY OF VIOLENCE
“CIVILIZED” BEHAVIOR
Four Strategies of Terrorism
Four Strategies of Terrorism
Abu Mohammad al-Adnani
Evolution and De-evolution
Abu Mohammad al-Adnani’s final address in
May 2016 warned: “Or do you, O America,
consider defeat to be the loss of a city or the
loss of land? Certainly not! We would be
defeated and you victorious only if you were
able to remove the Qur’an from the Muslims’
hearts.” …..“We fight in obedience to Allah
and to become closer to Him. And victory is
that we live in the might of our religion or die
upon it. It is the same, whether Allah
blesses us with consolidation or we move
into the bare, open desert, displaced and
pursued.”
October 2018
FOR THERE WILL BE A NEXT.
TERRORISM IS TOO EASY,
AND IT IS ABSOLUTELY PART
OF THE MODERN
REPERTOIRE OF VIOLENT
POLITICAL RESISTANCE.
COMBATTING TERRORISM
BY CIVIC EDUCATION
Thank you,
Jeremiah.
1. The use of violence or the threat
of violence
2. directed against the persons or
property
3. of those unable or unprepared to
defend themselves,
4. primarily to create fear and/or
outrage
5. through the propagation of
public knowledge,
6. with the intention of affecting
public policy or community action.
Six Traits of Acts of Terror(ism)
Daniel Fromkin: Political Jujitsu
(Provocation and Outrage)
“[Terrorism’s] ingenuity l[ies] in
using an opponent’s own strength
against him. It [is] a sort of
jujitsu.”
Knowledge and understanding,
can keep you from allowing
outrage to make you the
terrorists’ unwitting ally.
To be Radical Terrorism, it
must be an “ism,” part of a
repertoire of violent political
resistance. (Charles Tilly)
Radical Terrorism is a form of
warfare: entry-level warfare.

More Related Content

Similar to Sullivan-Address-4_0 (1).pptx

Combatting Terrorism Within Moral And Ethical Constraints
Combatting Terrorism Within Moral And Ethical ConstraintsCombatting Terrorism Within Moral And Ethical Constraints
Combatting Terrorism Within Moral And Ethical ConstraintsBrian Rutherford
 
C02.8 the social underpinnings
C02.8 the social underpinningsC02.8 the social underpinnings
C02.8 the social underpinningsMatthew Boutross
 
Terrorism and counter terrorism strategy
Terrorism and counter terrorism strategyTerrorism and counter terrorism strategy
Terrorism and counter terrorism strategyabhnishat094
 
474 2015 terrorism political psychology
474 2015 terrorism political psychology474 2015 terrorism political psychology
474 2015 terrorism political psychologympeffl
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChandana Wickramasinghe
 
Presentation on terrorism & its effect
Presentation on terrorism & its effectPresentation on terrorism & its effect
Presentation on terrorism & its effectAmanuzzaman Aman
 
1. terrorism basic facts
1. terrorism   basic facts1. terrorism   basic facts
1. terrorism basic factsMarianZuber
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencySARON MESSEMBE OBIA
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremismRichard Ali
 
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for TerrorismThe Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorisminventionjournals
 
Lecture 4 religion & terrorism
Lecture 4   religion & terrorismLecture 4   religion & terrorism
Lecture 4 religion & terrorismJames Feldkamp
 
Lecture 4 religion & terrorism
Lecture 4   religion & terrorismLecture 4   religion & terrorism
Lecture 4 religion & terrorismJames Feldkamp
 
Terrorism 2010 - Honors
Terrorism 2010 - HonorsTerrorism 2010 - Honors
Terrorism 2010 - HonorsMelissa
 
Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]MoonKJun
 

Similar to Sullivan-Address-4_0 (1).pptx (20)

Combatting Terrorism Within Moral And Ethical Constraints
Combatting Terrorism Within Moral And Ethical ConstraintsCombatting Terrorism Within Moral And Ethical Constraints
Combatting Terrorism Within Moral And Ethical Constraints
 
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
 
C02.8 the social underpinnings
C02.8 the social underpinningsC02.8 the social underpinnings
C02.8 the social underpinnings
 
Terrorism and counter terrorism strategy
Terrorism and counter terrorism strategyTerrorism and counter terrorism strategy
Terrorism and counter terrorism strategy
 
Crj3400 Terrorism Understanding The Threat3
Crj3400 Terrorism Understanding The Threat3Crj3400 Terrorism Understanding The Threat3
Crj3400 Terrorism Understanding The Threat3
 
474 2015 terrorism political psychology
474 2015 terrorism political psychology474 2015 terrorism political psychology
474 2015 terrorism political psychology
 
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorismChanges on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Presentation on terrorism & its effect
Presentation on terrorism & its effectPresentation on terrorism & its effect
Presentation on terrorism & its effect
 
1. terrorism basic facts
1. terrorism   basic facts1. terrorism   basic facts
1. terrorism basic facts
 
Terrorism
TerrorismTerrorism
Terrorism
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
 
Terrorism
TerrorismTerrorism
Terrorism
 
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for TerrorismThe Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorism
 
Lecture 4 religion & terrorism
Lecture 4   religion & terrorismLecture 4   religion & terrorism
Lecture 4 religion & terrorism
 
Lecture 4 religion & terrorism
Lecture 4   religion & terrorismLecture 4   religion & terrorism
Lecture 4 religion & terrorism
 
Terrorism 2010 - Honors
Terrorism 2010 - HonorsTerrorism 2010 - Honors
Terrorism 2010 - Honors
 
Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]Strategies for the war on terrorism [compatibility mode]
Strategies for the war on terrorism [compatibility mode]
 
Terrorism
TerrorismTerrorism
Terrorism
 

More from karishmanair8

Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxkarishmanair8
 
2041-lecture-1 (1).ppt
2041-lecture-1 (1).ppt2041-lecture-1 (1).ppt
2041-lecture-1 (1).pptkarishmanair8
 
Defining-Democracy_2023-03-03-053135_vwyp.pptx
Defining-Democracy_2023-03-03-053135_vwyp.pptxDefining-Democracy_2023-03-03-053135_vwyp.pptx
Defining-Democracy_2023-03-03-053135_vwyp.pptxkarishmanair8
 
theoriesofdemocracy-130525000913-phpapp01.pptx
theoriesofdemocracy-130525000913-phpapp01.pptxtheoriesofdemocracy-130525000913-phpapp01.pptx
theoriesofdemocracy-130525000913-phpapp01.pptxkarishmanair8
 
Roots of our Democracy.ppt
Roots of our Democracy.pptRoots of our Democracy.ppt
Roots of our Democracy.pptkarishmanair8
 
ARMOUR_TTT_Powerpoint-Day-1.pptx
ARMOUR_TTT_Powerpoint-Day-1.pptxARMOUR_TTT_Powerpoint-Day-1.pptx
ARMOUR_TTT_Powerpoint-Day-1.pptxkarishmanair8
 
Mandaville_SFCG-WNCAC_Deradicalization.ppt
Mandaville_SFCG-WNCAC_Deradicalization.pptMandaville_SFCG-WNCAC_Deradicalization.ppt
Mandaville_SFCG-WNCAC_Deradicalization.pptkarishmanair8
 
UNTOC_Trafficking_in_cultural_property.ppt
UNTOC_Trafficking_in_cultural_property.pptUNTOC_Trafficking_in_cultural_property.ppt
UNTOC_Trafficking_in_cultural_property.pptkarishmanair8
 
Extremism-and-radicalisation-May-9th-2018.pptx
Extremism-and-radicalisation-May-9th-2018.pptxExtremism-and-radicalisation-May-9th-2018.pptx
Extremism-and-radicalisation-May-9th-2018.pptxkarishmanair8
 
Bramesfeld_Strategy Game.pptx
Bramesfeld_Strategy Game.pptxBramesfeld_Strategy Game.pptx
Bramesfeld_Strategy Game.pptxkarishmanair8
 
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptx
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptxCSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptx
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptxkarishmanair8
 
ComSec CVE and Women Presentation.pptx
ComSec CVE and Women Presentation.pptxComSec CVE and Women Presentation.pptx
ComSec CVE and Women Presentation.pptxkarishmanair8
 
The Psychology of Terrorism - Dr Kajumba Mayanja (2).ppt
The Psychology of Terrorism - Dr Kajumba Mayanja (2).pptThe Psychology of Terrorism - Dr Kajumba Mayanja (2).ppt
The Psychology of Terrorism - Dr Kajumba Mayanja (2).pptkarishmanair8
 
Lecture 13 terrorIHL07slides.ppt
Lecture 13 terrorIHL07slides.pptLecture 13 terrorIHL07slides.ppt
Lecture 13 terrorIHL07slides.pptkarishmanair8
 

More from karishmanair8 (17)

Democracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptxDemocracy_in_a_Network_Society.pptx
Democracy_in_a_Network_Society.pptx
 
2041-lecture-1 (1).ppt
2041-lecture-1 (1).ppt2041-lecture-1 (1).ppt
2041-lecture-1 (1).ppt
 
4886527.ppt
4886527.ppt4886527.ppt
4886527.ppt
 
Defining-Democracy_2023-03-03-053135_vwyp.pptx
Defining-Democracy_2023-03-03-053135_vwyp.pptxDefining-Democracy_2023-03-03-053135_vwyp.pptx
Defining-Democracy_2023-03-03-053135_vwyp.pptx
 
theoriesofdemocracy-130525000913-phpapp01.pptx
theoriesofdemocracy-130525000913-phpapp01.pptxtheoriesofdemocracy-130525000913-phpapp01.pptx
theoriesofdemocracy-130525000913-phpapp01.pptx
 
Roots of our Democracy.ppt
Roots of our Democracy.pptRoots of our Democracy.ppt
Roots of our Democracy.ppt
 
ARMOUR_TTT_Powerpoint-Day-1.pptx
ARMOUR_TTT_Powerpoint-Day-1.pptxARMOUR_TTT_Powerpoint-Day-1.pptx
ARMOUR_TTT_Powerpoint-Day-1.pptx
 
Mandaville_SFCG-WNCAC_Deradicalization.ppt
Mandaville_SFCG-WNCAC_Deradicalization.pptMandaville_SFCG-WNCAC_Deradicalization.ppt
Mandaville_SFCG-WNCAC_Deradicalization.ppt
 
UNTOC_Trafficking_in_cultural_property.ppt
UNTOC_Trafficking_in_cultural_property.pptUNTOC_Trafficking_in_cultural_property.ppt
UNTOC_Trafficking_in_cultural_property.ppt
 
Extremism-and-radicalisation-May-9th-2018.pptx
Extremism-and-radicalisation-May-9th-2018.pptxExtremism-and-radicalisation-May-9th-2018.pptx
Extremism-and-radicalisation-May-9th-2018.pptx
 
Bramesfeld_Strategy Game.pptx
Bramesfeld_Strategy Game.pptxBramesfeld_Strategy Game.pptx
Bramesfeld_Strategy Game.pptx
 
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptx
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptxCSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptx
CSWE-Virtual-Privilege-Walk-and-Power-of-One-Vazquez-and-Radis-Part-1 (1).pptx
 
TERRORISM_PPT.pptx
TERRORISM_PPT.pptxTERRORISM_PPT.pptx
TERRORISM_PPT.pptx
 
6651 (1).ppt
6651 (1).ppt6651 (1).ppt
6651 (1).ppt
 
ComSec CVE and Women Presentation.pptx
ComSec CVE and Women Presentation.pptxComSec CVE and Women Presentation.pptx
ComSec CVE and Women Presentation.pptx
 
The Psychology of Terrorism - Dr Kajumba Mayanja (2).ppt
The Psychology of Terrorism - Dr Kajumba Mayanja (2).pptThe Psychology of Terrorism - Dr Kajumba Mayanja (2).ppt
The Psychology of Terrorism - Dr Kajumba Mayanja (2).ppt
 
Lecture 13 terrorIHL07slides.ppt
Lecture 13 terrorIHL07slides.pptLecture 13 terrorIHL07slides.ppt
Lecture 13 terrorIHL07slides.ppt
 

Recently uploaded

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Sullivan-Address-4_0 (1).pptx

  • 3. Raymond Aron, wrote: “An action of violence is labeled ‘terrorist’ when its psychological effects are out of proportion to its purely physical results.”
  • 4.
  • 5.
  • 6.
  • 8. Six Levels of Terrorism
  • 10.
  • 11. Terrorists see themselves as fighting a war to defend or promote an essential and just cause. Terrorists are “surprisingly normal,” not clinically psychotic. Terrorists are rational actors. And, being rational actors at war, they pursue strategies.
  • 12. WAR AIMS, GOALS – The purpose of the war STRATEGIES – How to conduct a war TACTICS – How to fight a battle STRATAGEMS – Tactics of deceiving or outwitting the enemy
  • 13. Four Strategies of Terrorism STRONG WEAK
  • 14. INTIMIDATION Primary for Strong-Capacity Terrorists EMPHASIS ON FEAR Want acquiescence, obedience, submission, end to resistance No use for inciting reprisals by OUTRAGE Useful for Weak-Capacity Terrorists Fear among target community Revolutionary discipline within the group Compel radical rivals to give way or join
  • 15. Four Strategies of Terrorism
  • 16. INITIATION For Radical Terrorists who want to act as a precipitant or a catalyst. Want to exploit the OUTRAGE of the enemy oppressors so as to reveal the WICKEDNESS AND WEAKNESS of the oppressors. Appeals to very weak groups with great expectations but few resources, explaining why most terrorists of the first and second waves failed.
  • 17. ATTRITION For somewhat stronger radical terrorists, who cannot overpower the enemy, but have sufficient numbers and resources to inflict losses on their enemy. Want to get the enemy to invest unsustainable psychological and physical resources until worn down. Second Wave PIRA began with a strategy of Initiation, 1970-1972, but by 1976-77 adopted Attrition in the “Long War.”
  • 18. EVOLUTION A strategy of moving to higher levels of strength, resources, and numbers. Important question: need it be theory, intention, or simply opportunism? Theory of escalating stages goes back to Mao. Particularly prominent in Third Wave.
  • 19. EXAMPLES OF EVOLUTION FLN of Algeria(?) PLO FARC of Columbia Tamil Tigers of Sri Lanka Hezbollah of Lebanon Hamas of Gaza FROM ZARQAWI’s JTJ AND AQI TO TO AL-BAGHDADI’S ISI AND ISIS, THEN FINALLY TO HIS ISLAMIC STATE
  • 20. Four Strategies of Terrorism
  • 21. MAO ZEDONG’S PROGRESSION OF REVOLUTIONARY WARFARE Guerrilla Warfare Guerrilla Bands Terrorism Terrorist Cells
  • 23. Abu Bakr Naji c. 1961-2008 Abd al-Aziz al-Muqrin (1971-2004) Abu Ubayd al-Qurashi d. ca. 2006??? Mao Zedong Abu Bakr al-Baghdadi b. 1971 Carl von Clausewitz The Mastery of Savagery Terrorists Study Military Theory and Practice
  • 24. GLOBAL STRATEGIES Global Participation Global Conflict Abdullah Yusuf Azzam Osama bin Laden
  • 25. Is this a terrorist “group”? The Islamic State, Jan. 2015
  • 26. WHAT IS A STATE? TERRITORY RESOURCES FORCES MONOPOLOLY OF VIOLENCE “CIVILIZED” BEHAVIOR
  • 27. Four Strategies of Terrorism
  • 28. Four Strategies of Terrorism
  • 30. Evolution and De-evolution Abu Mohammad al-Adnani’s final address in May 2016 warned: “Or do you, O America, consider defeat to be the loss of a city or the loss of land? Certainly not! We would be defeated and you victorious only if you were able to remove the Qur’an from the Muslims’ hearts.” …..“We fight in obedience to Allah and to become closer to Him. And victory is that we live in the might of our religion or die upon it. It is the same, whether Allah blesses us with consolidation or we move into the bare, open desert, displaced and pursued.”
  • 32.
  • 33. FOR THERE WILL BE A NEXT. TERRORISM IS TOO EASY, AND IT IS ABSOLUTELY PART OF THE MODERN REPERTOIRE OF VIOLENT POLITICAL RESISTANCE.
  • 35.
  • 37.
  • 38.
  • 39. 1. The use of violence or the threat of violence 2. directed against the persons or property 3. of those unable or unprepared to defend themselves, 4. primarily to create fear and/or outrage 5. through the propagation of public knowledge, 6. with the intention of affecting public policy or community action. Six Traits of Acts of Terror(ism)
  • 40. Daniel Fromkin: Political Jujitsu (Provocation and Outrage) “[Terrorism’s] ingenuity l[ies] in using an opponent’s own strength against him. It [is] a sort of jujitsu.” Knowledge and understanding, can keep you from allowing outrage to make you the terrorists’ unwitting ally.
  • 41. To be Radical Terrorism, it must be an “ism,” part of a repertoire of violent political resistance. (Charles Tilly) Radical Terrorism is a form of warfare: entry-level warfare.