SlideShare a Scribd company logo
1 of 5
Chapter 9
Emerging Terrorist Environments
Gender-Selective Political Violence and Criminal Dissident
Terrorism
Gender-Selective Victims of Terrorist Violence
· Gender-selective political violence is the discriminate use of
force purposely directed against males or females of a particular
group.
· It is the product of communal discord.
· The degree of violence varies.
Gender-Selective Victims of Terrorist Violence
· Gender-Selective Terrorism Against Men
· During conflict and unrest.
· Elimination of potential fighters.
· Cases:
· Armenian genocide.
· German war against the Soviets.
· Anfal campaign.
· Rwandan genocide.
· ISIS offensive.
· Bosnia-Herzegovina
· Cultural Repression and Violence
· Women as second-class citizens.
· Case: Status of women in Saudi Arabia
· Case: Repression under the Taliban regime in Afghanistan.
· Violent cultural repression of women.
· Case: Honor killings.
· Case: Female infanticide.
· Case: Female genital mutilation (FGM).
· Case: “Cleansing” sexual relations.
· Terrorism Against Women
· State terrorism against women.
· Campaigns of conquest during wartime.
· Perceived threat from an indigenous ethnic group.
· Case: Rape of Nanking and “comfort women.”
· Case: The Bangladesh Liberation War
· Dissident terrorism against women.
· By insurgents or paramilitaries.
· Case: Ethnic cleansing in Bosnia-Herzegovina.
· Case: Sierra Leone during the 1990s.
· Case: The Janjaweed in Sudan
· Gender-Selective Victims of Terrorist Violence
(continued)
· Responding to Gender-Selective Terrorism
· No collective response until late 20th century.
· 1998 decision by the International Criminal Tribunal for
Rwanda.
· 2001 “Foca” decision by the International Criminal Tribunal
for the Former Yugoslavia.
Criminal Dissident Terrorism
· The Criminal and Political Terrorism Nexus
· Transnational organized crime and criminal cartels.
· Common characteristics:
· Secretive.
· Antisocial.
· Underground.
· Smuggling and “special-order” goods.
· Selling to the highest bidder.
· Threat scenario: Weapons of mass destruction.
· Traditional Criminal Enterprises
· Motivated by sheer profit.
· Politically passive when left alone.
· Politically violent when challenged by governments.
· Cases:
· Chinese Triads.
· Japanese Yakuza.
· American La Cosa Nostra.
· Columbian and Mexican drug cartels.
· Russian Mafia.
· Italian Mafia.
· Southeast Asian drug lords.
· The Logic of Narco-Terrorism
· “The use of drug trafficking to advance the objectives of
certain governments and terrorist organizations.”
· Drug-related violence.
· Latin American narcotrafficantes.
Regional Cases of Criminal Terrorism
· Latin America
· Arrellano-Felix Group
· Los Zetas
· Columbia, FARC, and AUC
· Peru’s Shining Path
· Regional Cases of Criminal Terrorism
· Asia
· Golden Crescent
· Golden Triangle
Cases:
· Afghanistan
· ISIS
· Tamil Tigers
· The Phillipines
· Europe
· Italian and Russian organized crime.
· The “Balkan Route.”
Chapter 8
Terrorist Spillovers
International Terrorism
Defining International Terrorism
· The Spillover Effect
· The struggle “spills over” into the international domain.
· Domestic attacks against victims with an international profile.
· Operations in a foreign country.
· Unambiguous International Implications
· International consequences must be clear.
· Case: Attacks on embassies.
· Case: Ship and aircraft hijackings
· Terrorist Environments and International Terrorism
· International state terrorism.
· International dissident terrorism.
· International religious terrorism.
· International left-wing terrorism.
· International right-wing terrorism.
· International criminal terrorism.
Reasons for International Terrorism
· Modern “isms” and International Revolutionary Solidarity
· Imperialism.
· Neocolonialism.
· Zionism.
· Perceived Efficiency
· Potential for maximum publicity.
· Potential for inflicting maximum psychological anxiety.
· Pragmatism.
· Adaptations of Revolutionary Theory
· Fish swimming in the sea of the people.
· Enraging the beast.
· Liberating violence.
· Historical Reasons
· Why terrorism is unacceptable:
· Western governments have adopted an ideology of democratic
justice as a norm.
· West was often a target.
· West recognizes accepted methods of warfarE
· Why terrorism is acceptable:
· Many anticolonial extremists became national leaders
· Terrorism was used as a matter of practical choice during
insurgencies
· Cffective fusion of ideology and warfare
International Terrorist Networks
· Cold War Terrorist-Networking Theory
· Western theory that Soviet proxies were the source of
international terrorism.
· Uncomplicated and simplistic scenario.
· International Terrorist Environments
· Monolithic.
· Strong multipolar.
· Weak multipolar.
· Cell-based.
International Dimension of the New Terrorism
· Movement Case: The Afghan Arabs at War
· Mujahideen in Bosnia
· Organization Case: Al Qa’ida and International Terrorism
· International cells
· Air France Flight 8969
· Singapore Plot
· Northwest Airlines Flight 253
Postscript: The “Stateless Revolutionaries
· Movements that have no particular home country that they
seek to liberate and no homeland to use as a base,
· The Japanese Red Army
· Al-Qa’ida
· Palestinian Nationalism

More Related Content

Similar to Chapter 9Emerging Terrorist EnvironmentsGender-Selective Polit.docx

Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2
Jayesh Meena
 
Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2
Jayesh Meena
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
todd521
 
Nazism and islam comparison
Nazism and islam comparisonNazism and islam comparison
Nazism and islam comparison
meinhaj
 
State crimes and green crimes
State crimes and green crimesState crimes and green crimes
State crimes and green crimes
smccormac7
 
White7e ppt ch01
White7e ppt ch01White7e ppt ch01
White7e ppt ch01
difordham
 

Similar to Chapter 9Emerging Terrorist EnvironmentsGender-Selective Polit.docx (20)

Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2
 
Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2Ccp mmw lecture_-_war_violence_and_modernity_2
Ccp mmw lecture_-_war_violence_and_modernity_2
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Terrorists and Freedom Fighters
Terrorists and Freedom FightersTerrorists and Freedom Fighters
Terrorists and Freedom Fighters
 
India Legal 23 July 2018
India Legal 23 July 2018 India Legal 23 July 2018
India Legal 23 July 2018
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 
Islamophobia
IslamophobiaIslamophobia
Islamophobia
 
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
 
Lecture 6 international terrorism
Lecture 6  international terrorismLecture 6  international terrorism
Lecture 6 international terrorism
 
Lecture 6 international terrorism
Lecture 6  international terrorismLecture 6  international terrorism
Lecture 6 international terrorism
 
Defining terrorism..2
Defining terrorism..2Defining terrorism..2
Defining terrorism..2
 
Nazism and islam comparison
Nazism and islam comparisonNazism and islam comparison
Nazism and islam comparison
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorism
 
Islamophobia Sohaib Arshad- with causes and effects
Islamophobia  Sohaib Arshad- with causes and effectsIslamophobia  Sohaib Arshad- with causes and effects
Islamophobia Sohaib Arshad- with causes and effects
 
State crimes and green crimes
State crimes and green crimesState crimes and green crimes
State crimes and green crimes
 
White7e ppt ch01
White7e ppt ch01White7e ppt ch01
White7e ppt ch01
 
Understanding terror 5e ch 09
Understanding terror 5e ch 09Understanding terror 5e ch 09
Understanding terror 5e ch 09
 

More from mccormicknadine86

Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
mccormicknadine86
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
mccormicknadine86
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
mccormicknadine86
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
mccormicknadine86
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
mccormicknadine86
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
mccormicknadine86
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
mccormicknadine86
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
mccormicknadine86
 

More from mccormicknadine86 (20)

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Chapter 9Emerging Terrorist EnvironmentsGender-Selective Polit.docx

  • 1. Chapter 9 Emerging Terrorist Environments Gender-Selective Political Violence and Criminal Dissident Terrorism Gender-Selective Victims of Terrorist Violence · Gender-selective political violence is the discriminate use of force purposely directed against males or females of a particular group. · It is the product of communal discord. · The degree of violence varies. Gender-Selective Victims of Terrorist Violence · Gender-Selective Terrorism Against Men · During conflict and unrest. · Elimination of potential fighters. · Cases: · Armenian genocide. · German war against the Soviets. · Anfal campaign. · Rwandan genocide. · ISIS offensive. · Bosnia-Herzegovina · Cultural Repression and Violence · Women as second-class citizens. · Case: Status of women in Saudi Arabia · Case: Repression under the Taliban regime in Afghanistan. · Violent cultural repression of women. · Case: Honor killings. · Case: Female infanticide. · Case: Female genital mutilation (FGM). · Case: “Cleansing” sexual relations. · Terrorism Against Women · State terrorism against women. · Campaigns of conquest during wartime.
  • 2. · Perceived threat from an indigenous ethnic group. · Case: Rape of Nanking and “comfort women.” · Case: The Bangladesh Liberation War · Dissident terrorism against women. · By insurgents or paramilitaries. · Case: Ethnic cleansing in Bosnia-Herzegovina. · Case: Sierra Leone during the 1990s. · Case: The Janjaweed in Sudan · Gender-Selective Victims of Terrorist Violence (continued) · Responding to Gender-Selective Terrorism · No collective response until late 20th century. · 1998 decision by the International Criminal Tribunal for Rwanda. · 2001 “Foca” decision by the International Criminal Tribunal for the Former Yugoslavia. Criminal Dissident Terrorism · The Criminal and Political Terrorism Nexus · Transnational organized crime and criminal cartels. · Common characteristics: · Secretive. · Antisocial. · Underground. · Smuggling and “special-order” goods. · Selling to the highest bidder. · Threat scenario: Weapons of mass destruction. · Traditional Criminal Enterprises · Motivated by sheer profit. · Politically passive when left alone. · Politically violent when challenged by governments. · Cases: · Chinese Triads. · Japanese Yakuza. · American La Cosa Nostra. · Columbian and Mexican drug cartels. · Russian Mafia.
  • 3. · Italian Mafia. · Southeast Asian drug lords. · The Logic of Narco-Terrorism · “The use of drug trafficking to advance the objectives of certain governments and terrorist organizations.” · Drug-related violence. · Latin American narcotrafficantes. Regional Cases of Criminal Terrorism · Latin America · Arrellano-Felix Group · Los Zetas · Columbia, FARC, and AUC · Peru’s Shining Path · Regional Cases of Criminal Terrorism · Asia · Golden Crescent · Golden Triangle Cases: · Afghanistan · ISIS · Tamil Tigers · The Phillipines · Europe · Italian and Russian organized crime. · The “Balkan Route.” Chapter 8 Terrorist Spillovers International Terrorism Defining International Terrorism · The Spillover Effect · The struggle “spills over” into the international domain. · Domestic attacks against victims with an international profile. · Operations in a foreign country.
  • 4. · Unambiguous International Implications · International consequences must be clear. · Case: Attacks on embassies. · Case: Ship and aircraft hijackings · Terrorist Environments and International Terrorism · International state terrorism. · International dissident terrorism. · International religious terrorism. · International left-wing terrorism. · International right-wing terrorism. · International criminal terrorism. Reasons for International Terrorism · Modern “isms” and International Revolutionary Solidarity · Imperialism. · Neocolonialism. · Zionism. · Perceived Efficiency · Potential for maximum publicity. · Potential for inflicting maximum psychological anxiety. · Pragmatism. · Adaptations of Revolutionary Theory · Fish swimming in the sea of the people. · Enraging the beast. · Liberating violence. · Historical Reasons · Why terrorism is unacceptable: · Western governments have adopted an ideology of democratic justice as a norm. · West was often a target. · West recognizes accepted methods of warfarE · Why terrorism is acceptable: · Many anticolonial extremists became national leaders · Terrorism was used as a matter of practical choice during insurgencies · Cffective fusion of ideology and warfare International Terrorist Networks
  • 5. · Cold War Terrorist-Networking Theory · Western theory that Soviet proxies were the source of international terrorism. · Uncomplicated and simplistic scenario. · International Terrorist Environments · Monolithic. · Strong multipolar. · Weak multipolar. · Cell-based. International Dimension of the New Terrorism · Movement Case: The Afghan Arabs at War · Mujahideen in Bosnia · Organization Case: Al Qa’ida and International Terrorism · International cells · Air France Flight 8969 · Singapore Plot · Northwest Airlines Flight 253 Postscript: The “Stateless Revolutionaries · Movements that have no particular home country that they seek to liberate and no homeland to use as a base, · The Japanese Red Army · Al-Qa’ida · Palestinian Nationalism