This literature review summarizes research on what motivates terrorist groups to pursue weapons of mass destruction (WMD). Several trends are identified that could increase the risk of a WMD attack, such as the rise of ad hoc religious groups and the spread of chemical and biological weapons technology. However, most groups still prefer conventional weapons. While some ideologically-motivated groups may feel justified in mass-casualty attacks, conventional weapons often allow groups to achieve their objectives with less risk. The potential for a WMD attack to cause widespread fear and disruption, even without large casualties, is also discussed.
This document provides background context for Project White Horse by outlining key issues, terminology, and target audiences. It discusses the nature of the ongoing writing project and relationship with readers. It then defines elements of the "long war" concept and notes the need to consider worst-case scenarios occurring within the US, including the response challenges faced by civilian first responders compared to the military. The target audience is identified as the military, civilian first responders, and "civil-military" teams, with a focus on the latter two groups.
This document discusses a potential future scenario in which a non-state adversary called "Black" develops new concepts and technologies to challenge the dominant U.S. military force ("BlueFor"). Black conceives of "five-dimensional (cyber) warfighting" that incorporates traditional land, sea, and air dimensions plus temporal and cyber dimensions. This approach would allow Black to redefine the battlefield and overcome BlueFor's advantages by exploiting emerging technologies like advanced non-lethal weapons, robotics, and networked systems operating beyond human senses in "cyberspace." The document argues this asymmetric strategy could enable Black to defeat BlueFor and establish a new post-modern civilization.
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
- The US Army War College published a paper in 1994 proposing a "revolution in military affairs" using new technologies like sensors, robotics, and non-lethal weapons for purposes beyond traditional warfare like counterinsurgency and peacekeeping.
- The paper suggested developing technologies for "psychological, biological, and defensive" purposes in conflicts "short of war" and using location monitoring devices and behavior modification for peace enforcement.
- Critics argue this revolution aims to change public attitudes to accept formerly unacceptable military technologies and operations through "psychological warfare" against American citizens. Investigations found evidence such experimentation on citizens was already occurring covertly using directed energy and neurotechnologies.
Detecting Suicide Bombers, Richard Garrity 2014Richard Garrity
This document provides information on detecting potential suicide bombers, including behaviors and physical characteristics to watch for. It discusses signs of religious preparation for death, pre-attack body motions like maintaining a strong grip on suspicious objects, and how improvised explosive devices can restrict mobility. The document stresses that facilities like transportation hubs, railways, airports, malls and office buildings are most at risk, and that officers should observe suspicious behavior in anyone without profiling based on appearance.
The Role Of Targeted Killing In The Campaign Against Terrorintelcenter
The document examines the legality, morality, and potential efficacy of the United States using targeted killing against transnational terrorists. It discusses how targeted killing is controversial but may be considered a legal and effective counterterrorism tactic if implemented carefully and in accordance with international law. Key points include:
1) Targeted killing is legally justified as self-defense under international law if the targets pose a continuing threat and the operations are conducted lawfully.
2) For a targeted killing to be legal, it must comply with international humanitarian law principles of distinction, proportionality, and prohibiting treachery.
3) Designating terrorist operatives as combatants allows them to be lawfully targeted, but there must be
Worst case re: Trump 2020, via UPenn criminologist, Mary Trump et al: Preside...Frank Ruscica
Worst case re: Trump 2020, via UPenn criminologist, Mary Trump, et al.: President’s one of ~77 million psychopaths imperiled (PsIMP) by advances in molecular genetics; he knows PsIMP; he’s part of Ps’ resistance, which: 1) he wants to ADVANCE by granting himself unprecedented emergency powers, 2) includes (many of) the many Ps in law enforcement (e.g., DHS-ers); Ps have been seeking/designing pretexts for said granting (e.g., seeking via Portland kidnappings, police riots; designing a variant of Operation Northwoods).
The document provides information on suicide/homicide bombings including identification of bombers, tactics, targets, and interdiction considerations. It notes bombers can be any age, gender, or appearance and use various disguises. Tactics discussed include secondary devices, the use of vehicles and bicycles, and targeting responders. Guidelines are presented for responding personnel including maintaining a safe perimeter and waiting for bomb squads to approach suspects.
Cyber war netwar and the future of cyberdefense David Sweigert
This document provides an updated definition of "Netwar" based on the original concept introduced in 1993 by Arquilla and Ronfeldt.
1. The document summarizes the original definitions of "Cyberwar" and "Netwar", noting that Cyberwar targets information systems while Netwar targets societal perceptions.
2. It then proposes a new working definition of modern Netwar as intentional activities to influence human perception through overt or hidden channels, with the goal of facilitating changes in another actor's perceptions for one's own benefit.
3. Netwar does not necessarily involve physical force, illegal data modification, or law violations, but can utilize legal speech, economic actions, and information manipulation to influence perceptions
This document provides background context for Project White Horse by outlining key issues, terminology, and target audiences. It discusses the nature of the ongoing writing project and relationship with readers. It then defines elements of the "long war" concept and notes the need to consider worst-case scenarios occurring within the US, including the response challenges faced by civilian first responders compared to the military. The target audience is identified as the military, civilian first responders, and "civil-military" teams, with a focus on the latter two groups.
This document discusses a potential future scenario in which a non-state adversary called "Black" develops new concepts and technologies to challenge the dominant U.S. military force ("BlueFor"). Black conceives of "five-dimensional (cyber) warfighting" that incorporates traditional land, sea, and air dimensions plus temporal and cyber dimensions. This approach would allow Black to redefine the battlefield and overcome BlueFor's advantages by exploiting emerging technologies like advanced non-lethal weapons, robotics, and networked systems operating beyond human senses in "cyberspace." The document argues this asymmetric strategy could enable Black to defeat BlueFor and establish a new post-modern civilization.
Big brother recipe for revolution By Glen Krawezyk...528Hz TRUTH
- The US Army War College published a paper in 1994 proposing a "revolution in military affairs" using new technologies like sensors, robotics, and non-lethal weapons for purposes beyond traditional warfare like counterinsurgency and peacekeeping.
- The paper suggested developing technologies for "psychological, biological, and defensive" purposes in conflicts "short of war" and using location monitoring devices and behavior modification for peace enforcement.
- Critics argue this revolution aims to change public attitudes to accept formerly unacceptable military technologies and operations through "psychological warfare" against American citizens. Investigations found evidence such experimentation on citizens was already occurring covertly using directed energy and neurotechnologies.
Detecting Suicide Bombers, Richard Garrity 2014Richard Garrity
This document provides information on detecting potential suicide bombers, including behaviors and physical characteristics to watch for. It discusses signs of religious preparation for death, pre-attack body motions like maintaining a strong grip on suspicious objects, and how improvised explosive devices can restrict mobility. The document stresses that facilities like transportation hubs, railways, airports, malls and office buildings are most at risk, and that officers should observe suspicious behavior in anyone without profiling based on appearance.
The Role Of Targeted Killing In The Campaign Against Terrorintelcenter
The document examines the legality, morality, and potential efficacy of the United States using targeted killing against transnational terrorists. It discusses how targeted killing is controversial but may be considered a legal and effective counterterrorism tactic if implemented carefully and in accordance with international law. Key points include:
1) Targeted killing is legally justified as self-defense under international law if the targets pose a continuing threat and the operations are conducted lawfully.
2) For a targeted killing to be legal, it must comply with international humanitarian law principles of distinction, proportionality, and prohibiting treachery.
3) Designating terrorist operatives as combatants allows them to be lawfully targeted, but there must be
Worst case re: Trump 2020, via UPenn criminologist, Mary Trump et al: Preside...Frank Ruscica
Worst case re: Trump 2020, via UPenn criminologist, Mary Trump, et al.: President’s one of ~77 million psychopaths imperiled (PsIMP) by advances in molecular genetics; he knows PsIMP; he’s part of Ps’ resistance, which: 1) he wants to ADVANCE by granting himself unprecedented emergency powers, 2) includes (many of) the many Ps in law enforcement (e.g., DHS-ers); Ps have been seeking/designing pretexts for said granting (e.g., seeking via Portland kidnappings, police riots; designing a variant of Operation Northwoods).
The document provides information on suicide/homicide bombings including identification of bombers, tactics, targets, and interdiction considerations. It notes bombers can be any age, gender, or appearance and use various disguises. Tactics discussed include secondary devices, the use of vehicles and bicycles, and targeting responders. Guidelines are presented for responding personnel including maintaining a safe perimeter and waiting for bomb squads to approach suspects.
Cyber war netwar and the future of cyberdefense David Sweigert
This document provides an updated definition of "Netwar" based on the original concept introduced in 1993 by Arquilla and Ronfeldt.
1. The document summarizes the original definitions of "Cyberwar" and "Netwar", noting that Cyberwar targets information systems while Netwar targets societal perceptions.
2. It then proposes a new working definition of modern Netwar as intentional activities to influence human perception through overt or hidden channels, with the goal of facilitating changes in another actor's perceptions for one's own benefit.
3. Netwar does not necessarily involve physical force, illegal data modification, or law violations, but can utilize legal speech, economic actions, and information manipulation to influence perceptions
Meryl streep took a stand against donald trumpSusana Gallardo
Meryl Streep was the 2017 Cecil B. DeMille Award recipient at the Golden Globes on Sunday and she used her speech to hold PEOTUS Trump accountable and call Hollywood to action.
The impact of language planning, terminology planning, and arabicization, on ...Alexander Decker
This document summarizes a research paper on the impact of language planning, terminology planning, and Arabicization on military terminology planning and translation. It discusses how modern Arab armies have struggled with a lack of accurate Arabic equivalents for new military terminology as they have modeled their structure and equipment after Western armies. The document then reviews different approaches to language planning, terminology planning, and Arabicization and analyzes how they have been applied to developing standardized Arabic military terminology in Jordan. It concludes that language planning has played an important role in adapting to developments in military science and technology by coining new terms or Arabicizing foreign terms to find accurate Arabic equivalents.
The Democratic National Convention's fourth day featured speeches from Barack Obama accepting the Democratic nomination for president, director Spike Lee, and singer Jennifer Hudson performing the national anthem. Musical performances also took place from will.i.am and John Legend, as well as comedian John Oliver from The Daily Show.
The document discusses the War on Terrorism following the September 11th terrorist attacks. It describes how terrorists attacked the United States and bombed the Twin Towers, leading the US to increase security measures. The US then declared war on Iraq, bringing problems to American society. The war has resulted in casualties worldwide and loss of soldiers. There is ongoing debate around when the war will end and how to address the continued threat of terrorism.
The document discusses various topics related to terrorism including definitions, famous terrorist attacks and perpetrators such as 9/11 and Osama bin Laden, reasons for terrorism including US foreign policy decisions, common terrorist targets such as important buildings, and the role of government in both causing terrorism through decisions and attempting to prevent it through careers like aerospace engineering.
The document provides an overview of rhetorical devices used in speech writing such as parallelism, antithesis, anaphora, and parenthesis. It analyzes speeches by Winston Churchill, Martin Luther King Jr., and Barack Obama, identifying their use of techniques like pronouns, modal verbs, repetition, and metaphor to make their arguments persuasive. Students are then asked to write a speech using rhetorical devices and comment on their own writing.
This document discusses terrorism, including defining it as the unlawful use of force against people or property to intimidate governments or populations for political goals. It outlines some terrorist groups like Al-Qaeda, causes of terrorism like religious extremism and poverty, and examples of terrorist attacks over the years such as in Mumbai, London, and Delhi. These attacks have social, political, and economic impacts. Prevention measures discussed include education, security, and unity. Government acts against terrorism are also mentioned.
This document provides information for A-level English Language teachers regarding the marking of coursework for Unit 4: Investigating Language. It includes the assessment criteria for both the language investigation and media text elements. It also discusses some key issues identified in student work from the June 2013 exam series, such as unproductive investigation methodologies, vague media text purposes/audiences, and over-lenient assessment. The document aims to provide guidance to help teachers deliver successful investigations that allow students to demonstrate independent work and critical understanding of language concepts.
The Fearsome Grip of Terrorism (Causes and Solutions)Karan Khanna
Here is a presentation to give an idea of the current scenario of terrorism, its causes and certain solutions to fight it.Hope that I can successfully express my views on the topic.
This document discusses document classification using graphs and Neo4j. It introduces hierarchical pattern recognition (HPR) for graph-based document classification. HPR learns deep feature representations in a hierarchy using finite state machines. The features are mapped to a vector space model for classification. The document demonstrates HPR by classifying US presidential speeches by political affiliation, achieving over 70% similarity for predicted vs actual labels. It encourages attendees to get involved in the Neo4j community.
Terrorists carried out coordinated attacks across multiple locations in an Indian metropolis, including hotels, Parliament, and a world trade center, using automatic weapons and grenades. Many people were killed and injured in the planned assaults. The conditions after the terror attacks involved hospitalizing victims and mounting a rescue operation amid the aftermath.
This document discusses the importance of reviewing related literature and studies when conducting research. It states that a review of existing materials provides the foundation for a proposed study by guiding the researcher and helping to identify a research problem or topic, understand the topic better, avoid duplicating other studies, locate additional sources of information, and design the research methodology. The document also outlines the characteristics, sources, and locations of related literature and studies that should be surveyed.
Terrorism is defined as the unlawful use of violence against people or property to intimidate or coerce a government for political or social goals. It is a tactic that has been used throughout history to make a point through instilling fear psychologically. There are different types of terrorist groups and motives, and terrorism can involve the use of explosives, firearms, or biological, chemical, and nuclear materials to carry out attacks. While terrorism poses risks, preventing it involves reducing root causes like cultural misunderstandings, promoting human rights, and establishing surveillance and protective systems.
Pakistan is located in South Asia with a population of 170 million people. It has four main provinces: Punjab, Sindh, Khyber Pakhtunkhwa, and Balochistan. Pakistan has over 132 universities and education includes both public and private systems. Cricket is the most popular sport. Pakistani cuisine varies regionally but is known for its rich, spicy flavors featuring ingredients like beef, lamb, rice and an emphasis on halal. Traditional weddings involve mehndi, barat processions and walima celebrations.
Terrorism causes, effects, and solutionsSrun Sakada
This document defines terrorism and discusses its causes and impacts. Terrorism is defined by the FBI and US Department of Defense as the unlawful use or threat of violence against people or property to intimidate for political goals. It discusses two types of terrorism: national (directed internally without foreign influence) and international (foreign-based or directed). Causes mentioned include social/political injustice, belief that violence achieves goals, religion, illiteracy, and injustice. Impacts involve economic losses from death/damage, societal fear and suspicion, and complicated international politics. Solutions proposed are education to understand cultural differences, eliminating root causes like funding sources, and addressing injustices that radicalize individuals.
This document discusses different types of terrorism and examples of terrorist attacks. It defines civil disorder, political terrorism, non-political terrorism, quasi terrorism, limited political terrorism, and official or state terrorism. It also discusses the 2008 Mumbai attacks where Islamist attackers received assistance and support from Pakistan's intelligence agency. The coordinated attacks lasted three days and killed 164 people across several locations in Mumbai, including the Chhatrapati Shivaji Terminus train station, Oberoi Trident hotel, Taj Mahal Palace hotel, Leopold Cafe, and Nariman House Jewish community center.
This document examines the relationship between globalization and transnational terrorism. It begins with distinguishing between "old" and "new" terrorism, noting how new terrorism since the 1990s has shifted to religious motivations and become more lethal. The author then reviews literature on defining terrorism and globalization. Several dimensions of globalization are discussed, including how economic globalization has increased terrorists' access to information, funding, and weapons through new technologies and financial systems. Regression analysis is used to analyze the impact of different aspects of globalization on transnational terrorist attacks and casualties.
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
MHS 5201, Weapons of Mass Destruction 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Evaluate the evolution of terrorism from the Cold War Era through today.
1.1 Identify the seminal events that shaped domestic terrorism legislation both before and after the
terrorist attacks of September 11, 2001.
1.2 Evaluate the key factors leading to the growing danger of chemical and biological terrorism.
2. Relate modern-day terrorism to complex terrorism and social networks.
2.1 Define terrorism and the concept of new terrorism.
6. Consider the political, philosophical, and religious perspectives of the various actors in the war on
terror.
6.1 Explain the opportunities and limitations for weapons of mass destruction (WMD) terrorism
globally.
Course/Unit
Learning Outcomes
Learning Activity
1.1 Chapter 1.1, Article Review
1.2 Chapter 1.2, Article Review
2.1 Article Review
6.1 Article Review
Reading Assignment
Unit I: Introduction, pp. 1-4
Chapter 1.1: Definitions, Trends, and the Concept of “New Terrorism”, pp. 5-37
Chapter 1.2: The Nature of the Post-09/11 WMD Terrorism Threat, pp. 38-70, 73-83
Unit Lesson
One of the most acute threats to the United States is a terrorist attack using weapons of mass destruction
(WMD). Nonstate facilitators have emerged as a growing WMD proliferation threat in recent years. There are
large quantities of these weapons spread throughout the world in Europe, Asia, Africa, South America, and
the Middle East. Since the disintegration of the Soviet Union in the 1980s, the increased risks of terrorism
have been brought to other nations due to the unknown whereabouts regarding chemical, biological, and
radiological weaponry. Terrorist groups throughout the world have been attempting to acquire WMD in an
effort to cause loss of life, chaos, and disrupt governments in the free world. Terrorist attacks have become
more frequent and are likely to continue due to the funding provided by other communist or terror-related
groups. The rise of new terrorism occurred with the death of Osama Bin Laden and the increase of smaller
cells with acquired weapons, monies, and travel ability. The new form of terrorism is transnational, has very
limited borders, and appears to be more violent than older forms of terrorism under Osama Bin Laden.
UNIT I STUDY GUIDE
Conceptual Frameworks
MHS 5201, Weapons of Mass Destruction 2
UNIT x STUDY GUIDE
Title
In 2003, the United States and its international partners succeeded in interdicting a shipment of WMD-
related material destined for Libya’s nuclear program. As facts emerged regarding this shipment and its origin,
the U.S. government gained insight into an emerging WMD terrorism risk. Pakistani Nuclear Scientist A. Q.
Khan developed a transnational nuclear proliferation network reaching from Southeast Asia to Europe and
making sensitive technology and WMD- ...
This research led us to conclude that American soil is under a real threat with Weapons of Mass Destruction (WMD). The historical momentum, the facts, and the evidence supporting them, which are described in a chronological context, are sufficient to persuading us about this premise, although some skeptical consider this is just another conspiracy theory.
This document discusses trends and future forms of terrorism. It covers:
1) Religious terrorism being the fourth wave of terrorism evolution. Religiously motivated groups growing six-fold from 1980-1992. Religious terrorists view violence as morally justified or necessary for their cause.
2) The Islamic State and Boko Haram representing a potential "fifth wave" of cult-like, millenarian terrorism resistant to rational explanations. Their pursuit of a new society leads to genocidal violence.
3) Future terrorism becoming more sophisticated through use of remote-controlled weapons and disruption of infrastructure. Biological weapons pose a growing threat if designed for mass destruction rather than small-scale attacks. Containing nonconventional
Meryl streep took a stand against donald trumpSusana Gallardo
Meryl Streep was the 2017 Cecil B. DeMille Award recipient at the Golden Globes on Sunday and she used her speech to hold PEOTUS Trump accountable and call Hollywood to action.
The impact of language planning, terminology planning, and arabicization, on ...Alexander Decker
This document summarizes a research paper on the impact of language planning, terminology planning, and Arabicization on military terminology planning and translation. It discusses how modern Arab armies have struggled with a lack of accurate Arabic equivalents for new military terminology as they have modeled their structure and equipment after Western armies. The document then reviews different approaches to language planning, terminology planning, and Arabicization and analyzes how they have been applied to developing standardized Arabic military terminology in Jordan. It concludes that language planning has played an important role in adapting to developments in military science and technology by coining new terms or Arabicizing foreign terms to find accurate Arabic equivalents.
The Democratic National Convention's fourth day featured speeches from Barack Obama accepting the Democratic nomination for president, director Spike Lee, and singer Jennifer Hudson performing the national anthem. Musical performances also took place from will.i.am and John Legend, as well as comedian John Oliver from The Daily Show.
The document discusses the War on Terrorism following the September 11th terrorist attacks. It describes how terrorists attacked the United States and bombed the Twin Towers, leading the US to increase security measures. The US then declared war on Iraq, bringing problems to American society. The war has resulted in casualties worldwide and loss of soldiers. There is ongoing debate around when the war will end and how to address the continued threat of terrorism.
The document discusses various topics related to terrorism including definitions, famous terrorist attacks and perpetrators such as 9/11 and Osama bin Laden, reasons for terrorism including US foreign policy decisions, common terrorist targets such as important buildings, and the role of government in both causing terrorism through decisions and attempting to prevent it through careers like aerospace engineering.
The document provides an overview of rhetorical devices used in speech writing such as parallelism, antithesis, anaphora, and parenthesis. It analyzes speeches by Winston Churchill, Martin Luther King Jr., and Barack Obama, identifying their use of techniques like pronouns, modal verbs, repetition, and metaphor to make their arguments persuasive. Students are then asked to write a speech using rhetorical devices and comment on their own writing.
This document discusses terrorism, including defining it as the unlawful use of force against people or property to intimidate governments or populations for political goals. It outlines some terrorist groups like Al-Qaeda, causes of terrorism like religious extremism and poverty, and examples of terrorist attacks over the years such as in Mumbai, London, and Delhi. These attacks have social, political, and economic impacts. Prevention measures discussed include education, security, and unity. Government acts against terrorism are also mentioned.
This document provides information for A-level English Language teachers regarding the marking of coursework for Unit 4: Investigating Language. It includes the assessment criteria for both the language investigation and media text elements. It also discusses some key issues identified in student work from the June 2013 exam series, such as unproductive investigation methodologies, vague media text purposes/audiences, and over-lenient assessment. The document aims to provide guidance to help teachers deliver successful investigations that allow students to demonstrate independent work and critical understanding of language concepts.
The Fearsome Grip of Terrorism (Causes and Solutions)Karan Khanna
Here is a presentation to give an idea of the current scenario of terrorism, its causes and certain solutions to fight it.Hope that I can successfully express my views on the topic.
This document discusses document classification using graphs and Neo4j. It introduces hierarchical pattern recognition (HPR) for graph-based document classification. HPR learns deep feature representations in a hierarchy using finite state machines. The features are mapped to a vector space model for classification. The document demonstrates HPR by classifying US presidential speeches by political affiliation, achieving over 70% similarity for predicted vs actual labels. It encourages attendees to get involved in the Neo4j community.
Terrorists carried out coordinated attacks across multiple locations in an Indian metropolis, including hotels, Parliament, and a world trade center, using automatic weapons and grenades. Many people were killed and injured in the planned assaults. The conditions after the terror attacks involved hospitalizing victims and mounting a rescue operation amid the aftermath.
This document discusses the importance of reviewing related literature and studies when conducting research. It states that a review of existing materials provides the foundation for a proposed study by guiding the researcher and helping to identify a research problem or topic, understand the topic better, avoid duplicating other studies, locate additional sources of information, and design the research methodology. The document also outlines the characteristics, sources, and locations of related literature and studies that should be surveyed.
Terrorism is defined as the unlawful use of violence against people or property to intimidate or coerce a government for political or social goals. It is a tactic that has been used throughout history to make a point through instilling fear psychologically. There are different types of terrorist groups and motives, and terrorism can involve the use of explosives, firearms, or biological, chemical, and nuclear materials to carry out attacks. While terrorism poses risks, preventing it involves reducing root causes like cultural misunderstandings, promoting human rights, and establishing surveillance and protective systems.
Pakistan is located in South Asia with a population of 170 million people. It has four main provinces: Punjab, Sindh, Khyber Pakhtunkhwa, and Balochistan. Pakistan has over 132 universities and education includes both public and private systems. Cricket is the most popular sport. Pakistani cuisine varies regionally but is known for its rich, spicy flavors featuring ingredients like beef, lamb, rice and an emphasis on halal. Traditional weddings involve mehndi, barat processions and walima celebrations.
Terrorism causes, effects, and solutionsSrun Sakada
This document defines terrorism and discusses its causes and impacts. Terrorism is defined by the FBI and US Department of Defense as the unlawful use or threat of violence against people or property to intimidate for political goals. It discusses two types of terrorism: national (directed internally without foreign influence) and international (foreign-based or directed). Causes mentioned include social/political injustice, belief that violence achieves goals, religion, illiteracy, and injustice. Impacts involve economic losses from death/damage, societal fear and suspicion, and complicated international politics. Solutions proposed are education to understand cultural differences, eliminating root causes like funding sources, and addressing injustices that radicalize individuals.
This document discusses different types of terrorism and examples of terrorist attacks. It defines civil disorder, political terrorism, non-political terrorism, quasi terrorism, limited political terrorism, and official or state terrorism. It also discusses the 2008 Mumbai attacks where Islamist attackers received assistance and support from Pakistan's intelligence agency. The coordinated attacks lasted three days and killed 164 people across several locations in Mumbai, including the Chhatrapati Shivaji Terminus train station, Oberoi Trident hotel, Taj Mahal Palace hotel, Leopold Cafe, and Nariman House Jewish community center.
This document examines the relationship between globalization and transnational terrorism. It begins with distinguishing between "old" and "new" terrorism, noting how new terrorism since the 1990s has shifted to religious motivations and become more lethal. The author then reviews literature on defining terrorism and globalization. Several dimensions of globalization are discussed, including how economic globalization has increased terrorists' access to information, funding, and weapons through new technologies and financial systems. Regression analysis is used to analyze the impact of different aspects of globalization on transnational terrorist attacks and casualties.
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
MHS 5201, Weapons of Mass Destruction 1
Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
1. Evaluate the evolution of terrorism from the Cold War Era through today.
1.1 Identify the seminal events that shaped domestic terrorism legislation both before and after the
terrorist attacks of September 11, 2001.
1.2 Evaluate the key factors leading to the growing danger of chemical and biological terrorism.
2. Relate modern-day terrorism to complex terrorism and social networks.
2.1 Define terrorism and the concept of new terrorism.
6. Consider the political, philosophical, and religious perspectives of the various actors in the war on
terror.
6.1 Explain the opportunities and limitations for weapons of mass destruction (WMD) terrorism
globally.
Course/Unit
Learning Outcomes
Learning Activity
1.1 Chapter 1.1, Article Review
1.2 Chapter 1.2, Article Review
2.1 Article Review
6.1 Article Review
Reading Assignment
Unit I: Introduction, pp. 1-4
Chapter 1.1: Definitions, Trends, and the Concept of “New Terrorism”, pp. 5-37
Chapter 1.2: The Nature of the Post-09/11 WMD Terrorism Threat, pp. 38-70, 73-83
Unit Lesson
One of the most acute threats to the United States is a terrorist attack using weapons of mass destruction
(WMD). Nonstate facilitators have emerged as a growing WMD proliferation threat in recent years. There are
large quantities of these weapons spread throughout the world in Europe, Asia, Africa, South America, and
the Middle East. Since the disintegration of the Soviet Union in the 1980s, the increased risks of terrorism
have been brought to other nations due to the unknown whereabouts regarding chemical, biological, and
radiological weaponry. Terrorist groups throughout the world have been attempting to acquire WMD in an
effort to cause loss of life, chaos, and disrupt governments in the free world. Terrorist attacks have become
more frequent and are likely to continue due to the funding provided by other communist or terror-related
groups. The rise of new terrorism occurred with the death of Osama Bin Laden and the increase of smaller
cells with acquired weapons, monies, and travel ability. The new form of terrorism is transnational, has very
limited borders, and appears to be more violent than older forms of terrorism under Osama Bin Laden.
UNIT I STUDY GUIDE
Conceptual Frameworks
MHS 5201, Weapons of Mass Destruction 2
UNIT x STUDY GUIDE
Title
In 2003, the United States and its international partners succeeded in interdicting a shipment of WMD-
related material destined for Libya’s nuclear program. As facts emerged regarding this shipment and its origin,
the U.S. government gained insight into an emerging WMD terrorism risk. Pakistani Nuclear Scientist A. Q.
Khan developed a transnational nuclear proliferation network reaching from Southeast Asia to Europe and
making sensitive technology and WMD- ...
This research led us to conclude that American soil is under a real threat with Weapons of Mass Destruction (WMD). The historical momentum, the facts, and the evidence supporting them, which are described in a chronological context, are sufficient to persuading us about this premise, although some skeptical consider this is just another conspiracy theory.
This document discusses trends and future forms of terrorism. It covers:
1) Religious terrorism being the fourth wave of terrorism evolution. Religiously motivated groups growing six-fold from 1980-1992. Religious terrorists view violence as morally justified or necessary for their cause.
2) The Islamic State and Boko Haram representing a potential "fifth wave" of cult-like, millenarian terrorism resistant to rational explanations. Their pursuit of a new society leads to genocidal violence.
3) Future terrorism becoming more sophisticated through use of remote-controlled weapons and disruption of infrastructure. Biological weapons pose a growing threat if designed for mass destruction rather than small-scale attacks. Containing nonconventional
The document discusses trends and future forms of terrorism. It analyzes religiously motivated terrorism as the 4th wave of terrorism and describes characteristics of 5th wave cult-like terrorist groups like ISIS and Boko Haram. It also examines the impact of ISIS mentoring jihadist groups in North Africa and discusses challenges of countering terrorism in democracies without compromising civil liberties or using torture.
This summary provides an overview of the document's discussion of defining terrorism:
1) The document examines four current approaches to defining terrorism and argues they are inadequate. The first defines terrorism as non-conventional tactics, but this does not capture the use of terror or fear as a means.
2) The document proposes terrorism be defined in a way that is purposely broad to encompass its diverse uses, distinguishes it from other forms of violence, and allows for state and non-state actors.
3) A typology of terrorism is presented that analyzes modes of instrumentality based on targets, force, agency, and geographic context, in order to facilitate meaningful moral evaluation of terrorist acts.
1 LONE WOLF TERRORISM AND OPEN SOURCE JIHAD AN E.docxjeremylockett77
1
LONE WOLF TERRORISM AND OPEN SOURCE JIHAD:
AN EXPLANATION AND ASSESSMENT
Claire Wiskind, (Research Assistant, ICT)
Summer 2016
* The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International
Institute for Counter-Terrorism (ICT).
ABSTRACT
Al Qaeda and Daesh publish English language magazines to appeal to Western
supporters and encourage them to join their cause as a fighter or as a lone wolf
terrorist. A key feature of Al Qaeda’s magazine, Inspire, is a section titled Open
Source Jihad, which provides aspiring jihadists with step-by-step instructions to carry
out lone terror attacks in the West. By examining ten attack types that have been
published over the past six years, this paper explains Open Source Jihad, presents
cases where these types of attacks have been carried out, and assesses the threat
presented by the easy access to Open Source Jihad.
2
Table of Contents
INTRODUCTION ................................................................................................ 3
Lone Wolf Terrorism ......................................................................................... 3
English Language Literature: Dabiq and Inspire .............................................. 7
Open Source Jihad .......................................................................................... 9
OPEN SOURCE JIHAD ATTACK INSTRUCTIONS ..................................... 12
Attacks carried out ........................................................................................... 12
Make a bomb in the kitchen of your Mom: The AQ Chef ........................... 12
Assassinations ............................................................................................... 15
The Hidden Airplane Bomb ......................................................................... 23
Car Bombs Inside America ........................................................................... 26
Pickup Truck Mowing Machine ................................................................... 29
Attacks not yet carried out ............................................................................... 32
Destroying Buildings .................................................................................... 32
Parcel Bomb .................................................................................................. 34
Magnetic Car Bomb ...................................................................................... 35
The Door Trap Bomb .................................................................................... 36
Causing Road Accidents ............................................................................... 37
DISCUSSION AND CONCLUSION ................................................................ 38
BIBLIOGRAPHY .................................................... ...
1
WMD PROLIFERATION: A NEW PHASE TO TERRORISM 2
WMD Proliferation: A New Phase to TerrorismMax Little
American Military University
HLSS498
Professor Stork
12, March, 2016
Research Question
The research question is: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? To develop this research question the first topic that was review was weapons of mass destruction (WMD) proliferation. In order to answer the question about WMD proliferation there has to be a basic understanding of what WMD proliferation is. This is developed by asking: What is WMD proliferation? Why does WMD proliferation happen? How does WMD proliferation happen?
Once the basic understanding of WMD proliferation is reached, there must be general knowledge basis that there is research developed on WMD proliferation. Once it is determined, that there is enough research to develop understanding of WMD proliferation, this can develop particular questions that research can be built upon. Some of these questions that can be built upon would be: How will WMD proliferation affect the security of the United States? Who are the main countries to be cautious about as WMD proliferators? What are the contributing factors that develop into WMD proliferation?
To develop the final attributes to the research question this is done by evaluating the questions that were previously stated. Some of these evaluations of the questions would be: Is this research question a common interest to other researchers and others that would examine the material? This is the understanding that answer this research question would be valuable to the field of WMD proliferation. The question is found to be valuable because WMD proliferation is a current problem that needs to be solved. This determines the question to be feasible with the methodologies of reading other published works on WMD proliferation. This crates the ability to reach the research question of: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? Creating a research question that is focused and not to narrow.
Purpose statement
The goal of this paper is to examine the effects of WMD proliferation in Pakistan and the areas around the region. That nature of this topic is to create a comparative and chronological analysis of how WMD proliferation adds to the extreme political agenda of terrorists. Constant political instability in Pakistan provides an example of how this could lead to nuclear material or technologies being obtained by terrorist organizations (Kerr, P. & Nikitin, 2012).
More extensive and expanding nuclear programs in Pakistan could lead to accidental WMD proliferation in and around South West Asia (Kerr, P. & Nikitin, 2012). This paper will examine weapons of mass destruction and proliferation. The focus will be on that WMD proliferation could develop into a new phas ...
This document provides an abstract for a thesis analyzing media coverage of Boko Haram in Nigeria. The thesis conducts a discourse analysis of four Nigerian newspapers' reporting on Boko Haram's violent campaign to test the "Symbiosis Theory" which asserts a mutually beneficial relationship exists between the media and terrorists. However, the thesis argues news stories result from framing by terrorists, the state, and political elites, so final reports are often a clumsy combination of these voices that can distort the "pure" terrorist message. The analysis will evaluate how media coverage either does or does not help Boko Haram achieve its objectives.
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
WMD Proliferation, Globalization, and International Security:
Whither the Nexus and National Security?
Strategic Insights, Volume V, Issue 6 (July 2006)
by James A. Russell
Strategic Insights is a bi-monthly electronic journal produced by the Center for Contemporary
Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are
those of the author(s) and do not necessarily represent the views of NPS, the Department of
Defense, or the U.S. Government.
For a PDF version of this article, click here.
Introduction
Throughout the 1990s, the United States national security establishment gradually espoused the
idea of a growing threat posed by the proliferation of a variety weapons and weapons
technologies that could cause mass casualties to combatants and noncombatants alike. Nuclear
weapons had long occupied the rhetorical space used by policy makers to describe weapons that
could kill on a mass scale, but gradually the result was that the term “weapons of mass
destruction” was reinvigorated and quickly became an accepted term in the lexicon of national
security policy. The term is believed to have surfaced in the media in the aftermath of the German
bombing of Guernica, the Basque seat of power, in April 1937. It reappeared periodically during
World War II in reference to the indiscriminate killing of civilians by aircraft.[1] Today, the term is
defined in U.S. Code Title 50 as “any weapon or device that is intended, or has the capability, to
cause death or serious bodily injury to a significant number of people through the release,
dissemination, or impact of toxic or poisonous chemicals or their precursors; a disease organism;
radiation or radioactivity."[2] For the purposes of this analysis, the term is defined as weapons
that can inflict mass casualties on combatants and noncombatants using nuclear and radiological
devices, long range missiles, and lethal chemical- and biological agents.[3]
Arguably, the kick-off to the more recent formal shift in emphasis in the U.S. national security
bureaucracy came in September 1993 when President Clinton told the United Nations General
Assembly:
One of our most urgent priorities must be attacking the proliferation of weapons of mass
destruction, whether they are nuclear, chemical or biological; and the ballistic missiles
that can rain them down on populations hundreds of miles away… If we do not stem the
proliferation of the world’s deadliest weapons, no democracy can feel secure.[4]
Following the speech, President Clinton signed Presidential Directive 18, which ordered the
Department of Defense to develop a new approach in addressing the proliferation of weapons of
mass destruction. At the time of the initiative, the United States was particularly concerned with
the prospect of thousands of unsecured nuclear warheads in the former Soviet republics—the
problem of “loose nukes.”
In late 1993, Secretary of Defense Les Aspi.
Terrorism and counter terrorism strategyabhnishat094
The document discusses various aspects of counter-terrorism strategies and policies of the UN, EU, and USA. It provides details on the UN's global counter-terrorism strategy which has 4 pillars and is reviewed every 2 years. The strategy focuses on conflict prevention, capacity building, ensuring human rights, and strengthening UN roles. It also compares the US strategy before and after 9/11, noting it placed more emphasis on using force after 9/11. Overall, the document analyzes and compares the different approaches taken by these organizations to counter terrorism.
This document provides an overview of Calum Robert Mewett's dissertation which explores the characteristics of the Islamic State through the framework of the debate around new and old terrorism. The dissertation will examine the origins and evolution of the Islamic State from Al Qaeda in Iraq to the prominent terrorist organization it is today. It will analyze the group's ideology, methods, and structure to determine which aspects constitute "new" terrorism as compared to old terrorist organizations. The purpose is to use the theory of new terrorism to understand key features of the Islamic State and test if it represents a new form of religiously motivated, modern terrorism.
This document summarizes a thesis that examines government sourcing, White House opinion dominance, and the "War on Terror" frame in national newspapers after 9/11. The thesis analyzed journalistic conventions of framing and sourcing in articles from four prominent publications between 9/12/2001 and 9/12/2002. It tested hypotheses that U.S. government sources would be more likely to appear first, exhibit overall dominance as sources, and utilize terminology consistent with the "War on Terror" frame both as individual sources and across articles. The results sections then discusses the findings for each hypothesis.
Between 1969 and 2009:
- There were over 38,000 terrorist incidents worldwide, of which approximately 3,000 (7.8%) were directed at the United States. Nearly 5,600 people lost their lives and over 16,300 were injured in attacks on the US.
- Terrorism against the US accounted for a small percentage (7.8%) of global terrorism, but a large percentage of attacks on US military (43%), diplomatic (28.4%), and business (24.2%) targets.
- From 2001 to 2009 there were 91 domestic terrorist attacks in the US compared to 380 international attacks. The most common targets were businesses (international 26.6%, domestic 42.9%) and diplomatic offices
11.challenges of global terrorism strategies, dimensions and response in sea...Alexander Decker
This document discusses the challenges of global terrorism, including its strategies, dimensions, and responses. It provides background on how globalization has contributed to terrorism becoming a global phenomenon. Key points made include:
- Terrorism has become more widespread, lethal, and indiscriminate, using tactics like suicide bombings.
- The number of terrorist groups and their capabilities have increased significantly since the 1990s.
- Major global terrorist groups today include al-Qaeda, Jemaah Islamiyah, and others based in various regions.
- Terrorists seek to polarize situations and sabotage peace negotiations through dramatic or lethal attacks.
- The threat of terrorists acquiring weapons of mass destruction like nuclear, chemical
Challenges of global terrorism strategies, dimensions and response in search...Alexander Decker
This document discusses the challenges of global terrorism, including its strategies, dimensions, and responses. It provides background on how globalization has contributed to terrorism becoming a global phenomenon. Key points made include:
- Terrorism has become more widespread, lethal, and indiscriminate, using tactics like suicide bombings.
- The number of terrorist groups and their capabilities have increased significantly since the 1990s.
- Major global terrorist groups today include al-Qaeda, Jemaah Islamiyah, and others based in various regions.
- Terrorists seek to polarize situations and sabotage peace negotiations through dramatic or lethal attacks.
- The threat of terrorists acquiring weapons of mass destruction like nuclear, chemical
This document summarizes research on the relationship between terrorist organizations and mass media. It discusses how terrorists have become "learning organizations" that strategically use media coverage to disseminate their messages and evaluate the effectiveness of their actions. While some argue terrorists and media have a symbiotic relationship where more coverage encourages more attacks, the document also notes that terrorism is ineffective in countries without free press. It examines techniques terrorists use to manipulate media coverage and how their understanding of audiences helps shape their tactics.
After thoroughly reading this week’s course material, choose one p.docxnettletondevon
After thoroughly reading this week’s course material, choose one potential weapon from one of the chemical, biological, radiological or nuclear (CBRN) categories (i.e. you could select Tularemia, which could be a potential biological weapon). Write in your own words your assessment of your selected potential weapon's characteristics, accessibility, consequences of terrorists using that weapon based in researched facts. Please provide any support information required.
Biological Weapons
Biological weapons are strategic. Agents used in biological weapons are “living organisms or infective material derived from them, which are intended to cause increase or decay in man, animals, and plans and which depend for their effects on their ability to multiply in the person, animal, or plan” (Stern 1999, 21). If used properly, biological weapons can kill a significant number of people, and “their effects are not limited to one area or small target” (Preston 1998, 56). In the new era of biological threats, a photo editor in Florida died of anthrax exposure shortly after the tragic 9/11 events and became the first United States fatality. Shortly after that, four others succumbed to anthrax after handling contaminated mail and at least 17 others became sick, but survived this post-9/11 biological event (Franceschina 2006). As noted during this time, biological events are problematic to manage. Any exposed individual requires being immediately isolated and quarantined to avert others from being exposed to the biological agent. Given the incubation period of biological agents and the current detection capability, it is difficult to determine who is or isn’t contaminated. This highlights the “diabolical genius” of potential biological weapons attack.
Chemical Weapons
“Agents used in chemical weapons are liquid, gaseous, or solid chemical materials that cause death in plants, animals, or humans and hinge on on direct toxicity for their consequence” (Stern 1999, 21). In 1990, in the new era of chemical threats, the Liberation Tiger of Tamil Eelam (LTTE) used chemical agents, which were canisters filled with chlorine, in a paramilitary campaign when they attacked a military camp of Sri Lankan Army soldiers (Hoffman 2012). More recently, members of the Aum Shinrikyo cult disseminated Sarin nerve agent in a suburban neighborhood in Japan that resulted in the death of seven people and injured 144 others (Kaplan 2000). The death and destruction didn’t stop there, in 1995, Aum Shinrikyo members used sharpened umbrella tips to penetrate plastic bags filled with sarin aboard various Tokyo subway cars and as a result, 12 people died and 1,039 people sustained injuries in what remains as the biggest non-conventional terrorist attack in history (Pangi 2012).
Radiological and Nuclear
In the 1890s, radioactivity was discovered, but the complete prospective capacity for danger was not acknowledged until considerably later. Exposure to low-level radioactive material for .
This document is a research paper that examines how changing media technologies have influenced modern Islamic terrorism, focusing on al-Qaeda and ISIS. It discusses how these groups have exploited new media to control their messaging and directly reach target audiences, circumventing traditional media. The paper charts the evolution of terrorist media strategies, from al-Qaeda's early use of televised interviews and attacks designed as "spectacles", to innovations like online propaganda by Zarqawi and Awlaki, and ISIS's heavy reliance on social media. It analyzes several major propaganda releases to show how terrorism has adapted to technological changes.
This policy brief discusses strategies to prevent youth from joining violent extremist groups through cultural production policies. It examines how social alienation and discrimination can increase youth's vulnerability to extremist identity appeals. It argues that current counterterrorism strategies overlook identity issues and proposes using cultural programs to provide alternative narratives to violent extremist propaganda. Such programs could promote creativity, critical thinking, nonviolence, and celebrate ordinary heroes to reduce the appeal of extremist identities and role models. The brief suggests cultural policies may be effective inoculation and diversion strategies to address youth radicalization.
Similar to terrorist_group_proclivity_toward_wmd (20)
This document discusses argumentation within the U.S. Department of State as it adopted a new policy of "transformational diplomacy". The author analyzes public statements by State Department officials to understand how this new policy influenced the standing of regional and functional bureaus.
Transformational diplomacy aimed to build democratic governments abroad. It reallocated resources from European to developing areas and created new leadership roles. The author argues it tightened the range of acceptable viewpoints for departmental debates.
The document also evaluates models for analyzing policy arguments. It says the "critical discussion model" fits because it allows for strategic maneuvering between parties, but fails to capture key aspects of departmental debates like multiple initial viewpoints and
This document provides a summary of a paper presented at the National Communication Association Annual Meeting titled "The Rhetorical Work of Soft Power: Consubstantiating the United States and India in Shared Ideological Commitments." The summary discusses how the paper analyzes discourses around the landmark U.S.-India 123 Agreement, which established civil nuclear cooperation between the two countries. It argues these discourses activated a shared worldview and commitment to democracy between the U.S. and India, creating moments of identification that transformed their relationship into a strategic partnership.
This document analyzes the discourse surrounding the Millennium Challenge Corporation (MCC) and its emphasis on economic growth as a framework for development assistance. It finds that MCC discourse, as seen in Ambassador Danilovich's statements, utilizes an economic growth terministic screen that shapes how development is discussed and understood. This screen presents economic growth as the primary goal and interprets poverty reduction and capacity building solely as means to that end. It also influences partner countries' behavior by incentivizing reforms focused on MCC's economic indicators over locally-prioritized needs. The document argues this screen limits alternative understandings of development and undermines the stated goals of poverty alleviation and self-sufficiency.
Co-Constructing Frames to Warrant Preservation of Iraq's Cultural HeritageM. Karen Walker, Ph.D.
This document analyzes the framing of arguments used to justify preserving Iraq's cultural heritage over a four-year period. The dominant frame presented Iraq's cultural heritage as belonging to all humanity. Related frames positioned Iraq as the progenitor of civilization, whose undiscovered archaeological sites could enhance knowledge if protected from looting. These humanity, civilization, and discovery frames formed a triadic warrant for immediate protective action and an obligation of stewardship over Iraq's cultural sites and artifacts for future generations. The analysis suggests these frames co-constructed over time through statements by Iraqi and U.S. officials and Iraqi cultural specialists, and helped promote preservation and community reconciliation efforts.
This document discusses the constitutive turn in diplomatic tradecraft, where rhetoric is used to build relationships and form communities through identification rather than just persuade. It analyzes diplomatic discourse between the US and India that transformed their relationship into a strategic partnership. Specifically, it examines two narrative strands during negotiations over their 123 Agreement: an exceptionalism narrative that reframed India's strategic autonomy, and a convergence narrative that constituted their strategic partnership by optimizing both countries' post-Cold War positions. The signing of the agreement affirmed the potential of using constitutive rhetoric in diplomacy to advance interests in a globalized world.
This document discusses how rhetoric and narratives were used to transform the bilateral relationship between the United States and India. It analyzes discourses around the negotiation of the U.S.-India 123 Agreement on civilian nuclear cooperation. Specifically, it examines how narratives of exceptionalism and kinship were co-constructed to overcome estrangement and establish a sense of shared identity and values between the two countries. Through the rhetorical acts of courtship and identification, the agreement helped move India from outside to inside the nuclear nonproliferation regime and solidify the countries' strategic partnership.
This dissertation examines the rhetorical work of soft power diplomacy through a critique of discourses generated during debate on the U.S.-India 123 Agreement, a watershed moment in bilateral relations. The author argues that soft power diplomacy played a constitutive role in transforming relations from estranged to engaged and moving India from outside to inside the nuclear nonproliferation regime. Through identifying narratives of exceptionalism, deliverance, and kinship, soft power facilitated attraction and courtship between the countries. Additional narratives of democracy, pluralism, creativity, and convergence further constituted the U.S. and India as bilateral partners. The analysis seeks to broaden understanding of soft power as constitutive rhetoric and its role in diplomatic
1. Terrorist Group Proclivity toward the Acquisition and Use
of Weapons of Mass Destruction:
A Review of the Terrorism Studies Literature
M. Karen Walker
Visiting Senior Research Fellow
The Fund for Peace
Contextualizing the Literature Review
This literature review provides a reference base for researchers contributing to the Threat
Convergence Project, an initiative led by the Fund for Peace. The Threat Convergence
Project aims to integrate ongoing work in the fields of counter terrorism, proliferation of
weapons of mass destruction (WMD) and weak and failing states. The evidence base
generated through the Project will strengthen the nation’s anticipatory and preventative
countermeasures to catastrophic acts of WMD terrorism.
Leading thinkers, gathered under the Fund’s auspices in an April 2006 mapping
workshop, adopted a supply-and-demand model of threat convergence. Workshop
participants encouraged a detailed examination of the sequence of events that might
permit a nuclear attack by a terrorist entity operating in the enabling environments of
weak and failing states. A conference convened by the Fund for Peace in November 2006
added depth to the supply-and-demand model; through panel presentations and scenario
development, experts identified knowledge gaps and questions for future research. The
panel presentations in particular addressed the following dimensions of the threat
convergence problem: 1) the risks of non-state actors’ procurement of nuclear materials;
2) the potential for collaboration between state and non-state actors as an avenue to
WMD proliferation; and 3) the potential range of motivations and internal rationales that
make nuclear terrorism attractive to terrorist groups.
This literature review addresses the third sub-topic, presenting current knowledge on the
factors impacting a group’s proclivity toward attacks using non-conventional weapons or
WMD. In a departure from the established scope of the Threat Convergence Project, the
literature review addresses attacks utilizing biological and chemical agents as well as
nuclear materials; as a general rule, the sources consulted for the literature review
addressed WMD collectively. The literature review provides a reference on the nuances
captured in previous scholarship, taking into account the characteristics and ideologies of
specific groups and their targeting strategies, lethality attributed to conventional and non-
conventional weapons, and the consequences of a WMD attack favorable to the
perpetrators.
Threat Convergence Research ProgramThreat Convergence Research Program
2. 2
Trends Identified in Literature Infer Increased Risk of WMD Attack
Within the last decade, the literature on terrorists’ resort to chemical, biological,
radiological or nuclear (CBRN) weapons has witnessed a renaissance. Scholarly and
deliberative attention to the potential of a catastrophic attack using WMD is driven in part
by specific incidents such as the 1995 Aum Shinrikyo sarin nerve gas attack1
, and
evidence of al Qaeda’s desire to develop nuclear capabilities and chemical and biological
weaponry2
along with a May 2003 fatwa justifying use of nuclear weapons against the
United States.3
Trends indicate increased risk
One can infer from a confluence of trends an increased risk of an attack involving WMD.
Four such trends summarized by Stern4
and repeated throughout the literature are that ad
hoc groups motivated by religious conviction or revenge have surpassed political and
separatist groups in frequency and lethality of attacks; the dissolution of the Soviet Union
has created a black market in weapons, components and know-how; chemical and
biological weapons are proliferating; and advances in technology reduce the difficulty of
carrying out a WMD attack. A related trend cited by Sopko is the involvement of
organized crime networks in nuclear smuggling and trafficking.5
Only one of these trends
addresses directly the question of motivation, which as Hoffman has observed remains
elusive in comparison to studies of requisite technical capabilities and countermeasures.6
Groups’ preference for conventional weapons does not negate need for sophisticated
threat assessment
In assessing the literature, two key questions, as articulated by Cameron,7
frame the
discussion of terrorist motivation: 1) would terrorists want to cause mass casualties; and,
if they did 2) would they use nonconventional weapons? In answering these questions,
the literature presents a nuanced approach. Rather than treating terrorist groups as a
monolithic force, authors qualify their conclusions against the characteristics of specific
groups and targets.
The overarching consensus is that most terrorist groups will prefer conventional weapons
to weapons of mass destruction; nonetheless, the catastrophic consequences of a WMD
attack require vigilance. Quoting Hoffman:
1
For a comprehensive discussion of Aum Shinrikyo, see Juergensmeyer’s “Armageddon in a Tokyo
Subway” and Parachini’s “The Making of Aum Shinrikyo’s Chemical Weapons Program.”
2
Hoffman, Inside Terrorism, 273-274.
3
Bloom, Dying to Kill, 173.
4
Stern, Ultimate Terrorists, 8-10.
5
Sopko, “The Changing Proliferation Threat,” 6.
6
Hoffman, An Analysis of Trends, 5.
7
Cameron, “WMD Terrorism in the United States,” 166.
3. 3
Competing motives, such as those raised by religious terrorism, coupled with
potential opportunity, e.g., ease of access to both the information and material
required to fabricate and employ CBRN weapons—could portend for a bloodier
and more destructive era of terrorism in the future. … A combination of
unforeseen developments and unexpected technological breakthroughs could
launch terrorism on a higher trajectory toward greater levels of lethality and
destruction, perhaps involving even CBRN weapons.8
Stern buttresses the call for concern, citing conclusions of a 2002 Institute for Science
and International Security study authored by David Albright, Kathryn Buehler and Holly
Higgins, and published in the Bulletin of the Atomic Scientists. Whereas neither bin
Laden nor al Qaeda possessed nuclear weapons or the fissile material necessary for
production, the authors believed, at the time of the study’s release, that al Qaeda had the
requisite capability to build a crude nuclear explosive if the organization were to obtain
sufficient nuclear-weapons-useable material.9
Acknowledging this possibility of CBRN
attacks, the articles reviewed encourage more sophisticated threat assessment.
The Question of Lethality Links Motivation and Weapons Preferences
The most quoted pronouncement on terrorists’ desire for mass casualties is Brian Jenkins’
view that “terrorists want a lot of people watching, and a lot of people listening, and not a
lot of people dead.”10
Even after the attacks on Khobar Towers and the Marine barracks
in Beirut, Jenkins remained steadfast that “simply killing a lot of people has seldom been
one terrorist objective. … Terrorists operate on the principle of the minimum force
necessary. They find it unnecessary to kill many, as long as killing a few suffices for their
purposes.”11
Rationale toward mass casualty attacks
In light of Jenkins’ position, why might a terrorist group desire to inflict mass casualties,
with either a conventional or nonconventional weapon? First, groups that seek to inflict
mass casualties may believe that they are in a weak position and have no bargaining
power.12
Cameron argues that a possible motivation for nuclear terrorism (emphasis
added) is the terrorist group’s belief that is has nothing to lose: “If the group felt that it
was fading, dissolving into factions, or being usurped for prominence by another group, it
might launch an act of nuclear terrorism to regain its stature.”13
8
Hoffman, Inside Terrorism, 277.
9
Stern, Terror in the Name of God, 258.
10
Jenkins, “International Terrorism,” 15.
11
Jenkins, Likelihood of Nuclear Terrorism, 6.
12
Mengel, “Terrorism and New Technologies,” 209.
13
Cameron, Nuclear Terrorism: A Threat Assessment, 135.
4. 4
Second, groups may mount high-lethality or mass casualty attacks to attract attention
from a public that has become inured or desensitized to violence,14
with the implication
that even spectacular attacks can reach a diminishing point of return. To attract attention,
the casualties would necessarily involve victims of interest to the media (such as the
children at the daycare center at the Alfred P. Murrah Federal Building), and achieve a
scale to merit coverage of the attack absent prior interest in the perpetrating group or its
purpose.15
Third, terrorist groups are slacking in their self-restraint. Hoffman16
and Cameron17
reference what Hoffman terms the increasing “amateurization” of terrorism, paired with
increased professionalization of its operatives. By amateurization, Hoffman means the
loosening, if not removal, of self-imposed constraints which heretofore dictated
conservative operations and lethality proportional to the group’s objectives.
Professionalization refers to the diffusion of veteran terrorist organizations’ tactical and
technological competence across the spectrum of violence.
As Hoffman explains, in the Cold War paradigm terrorist groups operated under direct
control or at the behest of a foreign government, or claimed ethnic or nationalist
aspirations. Such groups were conservative in their operations, and slow to innovate in
their escalation of lethality, targeting choices, or skill in defeating countermeasures to
conventional high-explosive attacks.18
For recently emergent and religiously-motivated groups in particular, many of the self-
imposed and technical constraints are beginning to erode.19
As Cameron has observed,
ideologically-motivated groups adopt a polarizing “us” versus “them” worldview,
offering a moral justification for mass-casualty attacks: “If an act, no matter how
heinous, furthers the group cause then it must be good by definition. The cause of
society’s ills is perceived to lie outside the group, often with the establishment. To
destroy the source of those ills is therefore the height of morality.”20
Why conventional weapons?
At this juncture, it is useful to remind oneself that correlation is not causality. Whereas
evidence exists that the lethality of terrorist attacks is increasing (in terms of frequency,
number of fatalities and casualties, and the places and victims targeted), the resort to
WMD does not necessarily follow. As Jenkins asserts:
14
Hoffman, An Analysis of Trends, 20.
15
Cameron, “WMD Terrorism in the United States,” 167.
16
Hoffman, An Analysis of Trends, 36.
17
Cameron, “WMD Terrorism in the United States,” 170.
18
Hoffman, “Some Preliminary Hypotheses,” 46.
19
Ibid., 45.
20
Cameron, Nuclear Terrorism: A Threat Assessment, 135.
5. 5
There is, however, no inexorable linear progression that takes one easily from the
currently identified spectrum of potential subnational nuclear terrorists to actual
subnational nuclear terrorists, or from the nuclear incidents that have occurred
thus far to nuclear actions of greater consequence.21
In Cameron’s words, groups have not achieved their “killing potential” using
conventional weaponry.22
Most terrorist groups will weigh choices based on rationality and cost-benefit calculus,
posing to themselves the following question: “What can transnational terrorists
accomplish through the use of mass destruction terror that they could not accomplish
with conventional military and guerilla methods at less risk and cost,” namely “the almost
certain increase in public abhorrence of such methods, and the potentially disastrous
political reactions arising therefrom.”23
A convincing claim downgrading the likelihood of a WMD attack is that previous,
documented attacks employing biological, chemical or radiological agents and isotopes
have not achieved mass destruction. The reasons for the inverse relationship between
potential and actual harm are many and varied. One explanation, previously discussed, is
that “terrorists are technologically conservative, preferring to use tried and true methods
to achieve their aims.”24
Organizational dynamics may serve to counterweigh bold
moves, which could lead to factionalization and defections.25
Applying rational choice theory, Jacobs cites three reasons why terrorists have not yet
employed nuclear or radiological weapons: the group can achieve its objectives through
conventional means; conventional means employ devices and materials that are easier to
obtain; and consequences and outcomes of a conventional attack are known and
predictable.26
A nuclear attack would violate R. L. Beckman’s minimum force principle,
and would generate such excessive fatalities, social disruption, and collateral damage that
public support or indifference would turn to outrage.27
Foxell concurs: “fear of
responsibility for a monumentally reprehensible act” would disintegrate any public
sympathy for the group.28
Other reasons to eschew WMD in favor of conventional weapons involve factors of
capability and feasibility. As outlined by Jacobs:
21
Jenkins, The Potential for Nuclear Terrorism, 4.
22
Cameron, Nuclear Terrorism: A Threat Assessment, 136.
23
Mengel, “Terrorism and New Technologies,” 207.
24
Cameron, Nuclear Terrorism: A Threat Assessment, 136.
25
Ibid.
26
Jacobs, “The Nuclear Threat,” 159.
27
Ibid., 158.
28
Foxell, “The Debate,” 94.
6. 6
Although a functional [nuclear] weapon requires only a small amount of
plutonium, obtaining the requisite amount of weapons-grade material, assembling
the technical personnel to create the device, equipping a laboratory-shop to build
the device, obtaining all the other materials needed, funding the operation and
keeping the entire enterprise secret appears to be a series of steps that have
effectively prevented any successful attempt.29
The lack of experience in carrying out a catastrophic WMD attack has thus far proven
prohibitive; however, the reverse is also true, that one successful attack could spawn
imitative attempts combined with one-upmanship. Bloom documents the current
functioning of a competitive model within the realm of conventional terrorism, namely
suicide attacks. Bloom does not address the potential escalation to WMD, though the
competitive dynamics could prove similar.
Conventional weapons scenario
Dolnik & Bhattacharjee present the most concrete case for a terrorist group’s favoring
conventional weapons over WMD. The authors apply a multi-goal analysis framework to
Hamas’s decision-making, incorporating audience factors and the group’s desired
perception among its key audiences, in this case the Palestinian people and Arab nation-
states. In terms of tactical goals, the authors list several major criteria: technological
feasibility, cost-effectiveness, a deterrent effect on Israeli policy, the perception of the
group among its key audiences, the group’s self-perception, controlling the risk of
adverse consequences, and the ability to defeat counter-measures.
The authors compare three options—suicide bombings, deployment of Qassam rockets,
and chemical warfare—against these tactical criteria. The authors’ analysis indicates that
the chemical warfare option offers only deterrent value, whereas suicide bombings
provide an overall net benefit. An acknowledged weakness of the methodology is that it
does not account for combined tactics.30
The authors note that a suicide attack in which a
chemical agent were dispersed, or a Qassam rocket carrying a chemical warhead, could
surpass suicide bombings alone in overall net benefit.31
The authors acknowledge that Hamas’ centralized organizational structure and
operational budget would stand in the group’s favor should decide to pursue a WMD
option.32
However, the likelihood of Hamas pursuing such a course is further reduced by
the group’s reliance on precedents set by Hizbollah; non-religious primary justifications;
and impatience with trial and error to gain proficiency with new technology.33
29
Jacobs, “The Nuclear Threat,” 152-153.
30
Dolnik and Bhattacharjee, “Hamas,” 122-123.
31
Ibid., 124.
32
Ibid., 125.
33
Ibid., 125-126.
7. 7
The decision model developed by Dolnik & Bhattacharjee is attractive because it utilizes
the group’s own strategic and tactical aims as the benchmark for evaluating options for
choice of weapons. The model may be accommodated to circumstances affecting the
group over time (such as Hamas’s parliamentary victory), and to assessment of other
known terrorist groups. The model may be less well suited, however, to evaluating
transnational groups that do not claim specific geo-political aims.
Why WMD?
Continuing the discussion of costs and benefits, resort to a CBRN weapon need not lead
to mass casualties. As Hoffman notes, such a weapon deliberately limited to a small-scale
immediate impact could have a disproportionate long-term consequence, for example by
generating fear and alarm at unprecedented levels. Cameron agrees, writing that a group
seeking widespread coverage absent widespread devastation or casualties might resort to
low-level nonconventional weapons.34
Palfy asserts that the use of nonconventional weapons depends largely on the desired
mission outcome.35
If the group’s objective is to create casualties, a highly lethal but still
conventional form of attack will be preferred. If, however, the group desires to intimidate
a state and disrupt its functioning, irrespective of loss of life, then chemical or biological
weapons would prove tempting.
In discussing the potentiality of a WMD attack, one cannot discount calculated use to
achieve far-reaching psychological effects in the targeted audience.36
Stern discusses the
potential for economic terrorism, for example a terrorist group’s use of WMD to destroy
crops and kill livestock, poison food, contaminate pharmaceuticals, or directly target
corporations or other perceived economic icons.37
The migration from a conventional to
nonconventional weapon would ensure the group or individuals widespread publicity for
themselves and their cause.38
Stern speaks to a terrorist group’s desire to recruit and solidify members and audiences of
supporters by impressing them with high technology.39
In this regard, nuclear terrorism
could prove more desirable than weaponizing chemical and biological agents:
The prestige associated with acquiring a nuclear capability is unmatched by
chemical or biological weapons. A nuclear device would set a terrorist
organization apart from any other group; would compel governments to take the
terrorists seriously; and would represent a “quantum leap” in terrorist attacks.40
34
Cameron, “WMD Terrorism in the United States,” 168.
35
Palfy, “Weapon System Selection,” 82.
36
Hoffman, An Analysis of Trends, 55.
37
Stern, Ultimate Terrorists, 73.
38
Cameron, “WMD Terrorism in the United States,” 167.
39
Stern, Ultimate Terrorists, 73.
40
Cameron, “Nuclear Terrorism Reconsidered,” 155.
8. 8
Poetically expressed by A. R. Norton, the nuclear terrorist “is a mountain climber who
will climb the plutonium precipice simply because it is there.”41
Jenkins also alludes to
the prestige factor, that in attaining a nuclear capability, the terrorist group imitates
governments whose arsenals place them among the world’s major powers, and renders
the terrorist group “legitimate” in the eyes of their goal-sharing constituencies.42
The terrorist group’s desire to unleash forces with long-term consequences would also
make a WMD device more attractive than conventional weapons. Bunker describes the
combination of destruction and disruption, with the former concerning things and the
latter concerning bonds and relationships. Bunker observes that “nuclear devices, with
their heat/blast, electromagnetic pulse generation, and terror effects can influence both of
these target sets,” adding that a small bioterror weapon combining lethal and nonlethal
pathogens could achieve the same type of response.43
Adopting a societal perspective, intergenerational bonds may also be vulnerable. A
bioterror or atomic radiation weapon could extend collateral losses from the current into
the next generation.44
Or alternatively, dispersal of radioactive material (e.g., plutonium
in a powered or crystalline state) could shorten life spans, creating a premature
intergenerational gap in families and social networks.45
The preceding section on conventional weapons presented the view that organizational
dynamics could prohibit a terrorist group’s resort to WMD. The converse can also occur.
Before discussing the characteristics of such groups, it bears noting that the decision to
pursue WMD arises mostly from group rather than individual psychology. Post presents
the paradox that works against the lone actor:
To be motivated to carry out an act of mass destruction suggests profound psychological
distortions usually found only in severely disturbed individuals, such as paranoid
psychotics. On the other hand, to implement an act of nuclear terrorism requires not only
organizational skills but also the ability to work cooperatively with a small team.46
Post
agrees with Jenkins that individuals most strongly motivated to commit acts of nuclear
terrorism would be the least able to carry them out.47
An exception, cited by Cameron, is
that the group dynamics factor is more applicable to secular groups than religious groups
or cults, where the influence of a charismatic leader can be decisive.48
41
Jacobs, “The Nuclear Threat,” 150.
42
Hoffman, An Analysis of Trends, 13.
43
Bunker, “Weapons of Mass Destruction,” 43.
44
Foxell, “The Debate,” 99.
45
Jacobs, “The Nuclear Threat,” 153.
46
Post, “Prospects for Nuclear Terrorism,” 92-93.
47
Ibid.
48
Cameron, Nuclear Terrorism: A Threat Assessment, 135.
9. 9
WMD scenarios considered
Presenting four hypothetical scenarios, Foxell offers the strongest affirmative case for a
terrorist group’s future use of WMD. As a basis for scenario development, Foxell cites
domestic and international law enforcement seizure of core materials, combined with
well-rehearsed concerns about lax security and safeguards and weapons or materials
smuggling. The scenarios incorporate pragmatic as opposed to apocalyptic motives for
the use of WMD. To generate the scenarios, Foxell relied on a proven forecasting
methodology developed by the RAND Corporation.
One scenario with several variations is government-sponsored terrorism, in which a
terrorist group obtains and deploys a WMD device through its sponsor.49
Foxell builds
his case by assessing the capabilities and intentions of state sponsors of terrorism, and has
argued that rogue states could wage proxy warfare by wielding nuclear, biological or
chemical weapons through the vehicle of terrorist surrogates.50
Countering this scenario,
Cameron reasons that fear of retribution from the attacked state and the international
community, the potential loss of control over the client group, and reluctance to reduce its
own arsenal mitigate against state sponsorship.51
Second, Foxell presents the religious warfare scenario,52
limiting his discussion to
extremist Islamic terrorist groups, and describing the differential impact of previous
attacks, had they incorporated nuclear devices or chemical or biological agents. Foxell
later expanded on this scenario, posing as a possibility Hezbollah’s use of weaponized
Stinger missiles, either delivering a radiological, chemical or biological payload, or
substituting the missile’s warhead with a bioweapon container of aerosolized anthrax or
botulinum toxin.53
The transfer of weaponized Stingers from Hezbollah to a Lebanese
Sunni religious group or non-Lebanese Islamic terrorist groups is another variation.54
In the third economic combat scenario,55
regional economic decline changes the
situational assessment and motivations of revolutionary terrorist groups, leading to
attacks on oil and water infrastructures. Foxell posits cascading consequences, for
example, the conflagration of Middle East regional tensions over water sharing and
collapse of the Middle East Peace Process. Civil wars compose the final scenario,56
encompassing use of WMD by domestic separatist groups in the United States (e.g.,
Black Muslims); attacks on U.S. soil waged by Latin American revolutionary groups
(e.g., FARC); and use of WMD by right-wing terror groups.
49
Foxell, “Previously Discounted Terrorism Scenarios,” 431.
50
Foxell, “The Debate,” 99.
51
Cameron, “Nuclear Terrorism Reconsidered,” 154.
52
Foxell, “Previously Discounted Terrorism Scenarios,” 436.
53
Foxell, “The Debate,” 101-102.
54
Ibid., 103.
55
Foxell, “Previously Discounted Scenarios,” 438.
56
Ibid., 442.
10. 10
Group Characteristics Associated with Proclivity Toward WMD Attacks
The most definitive set of characteristics describing terrorist groups with the proclivity
toward WMD can be found in Tucker’s Toxic Terror, which presented nine validated
case studies. Comparing the cases, Tucker identified attributes or exhibited characteristics
and patterns of behavior that contribute to the propensity to employ chemical or
biological agents for either discrete or indiscriminant attacks. In considering the
characteristics, propensity does not necessarily equate with, and may work against, the
group’s success. The list, derived from Toxic Terror, is recreated below57
:
• Tendency to employ ever-greater levels of violence over time.
• Innovation in designing weapons and carrying out attacks.
• Willingness to take risks by experimenting with unfamiliar and dangerous weapons.
• Psychological factors of paranoia and grandiosity (most significant with respect to
individual terrorists who act alone or with support of a few followers).
• A system of internal social controls that severely punishes deviation or defection, and
an organizational structure that resists penetration by police or intelligence agencies.
• Planning and operations involving either a small group of two to five people or a
militant subgroup within a larger organization who are technically skilled and
subscribe to the group’s goals and ideology.
• A vague, undefined constituency, which Tucker considers a decisive factor in judging
which terrorist groups are most likely to attempt the acquisition and use of chemical
and biological agents.
• Defensive aggression against outsiders seeking the group’s destruction, and an
apocalyptic ideology translated into myriad goals such as destroying a corrupt social
structure, fighting an oppressive government, and punishing evil-doers and
oppressors, in fulfillment of a divine command or prophecy from a charismatic
leader. [Juergensmeyer suggests that fear of marginality may also be a trigger for
defensive aggression.58
]
Literature points to extremist ideologies as a likelihood factor
These factors feed on themselves to legitimate mass murder. Tucker’s conclusion is that
the greatest threat of a terrorist attack using WMD will emanate from one of three
groups: 1) religious or millenarian sects for whom large scale violence is a fulfillment of
an apocalyptic prophecy; 2) brutalized ethnic minorities seeking revenge; and 3) small
terrorist cells driven by extremist ideologies or conspiracy theories.59
57
Tucker, Toxic Terror, 255-262 and “How Real a Threat?,” 149-150. Several of these factors were cited
also by RAND’s Jeffrey D. Simons in a hypothetical profile of a terrorist group most likely to resort to
biological weapons. See Terrorists and Potential Use of Biological Weapons, p. 17.
58
Juergensmeyer, Terror in the Mind of God, 195.
59
Tucker, “How Real a Threat?” 149.
11. 11
It is unclear from the literature whether Tucker reached this conclusion independently, or
in consideration of the same view expressed by Sprinzak, who identified the same three
types of groups60
: 1) millenarian cults (faith in salvation via Armageddon); 2) brutalized
groups motivated by revenge for genocide, facing imminent destruction without any hope
for collective recovery, aided by unrestrained anger and justified in their sense of total
powerlessness; and 3) small terrorist cells or socially deranged groups who despise
society, lack realistic political goals, and therefore may miscalculate the consequences of
their actions. Foxell would add ethnic-cleansing terror movements, “morality terrorists,”
and for-profit extortionists.61
For Foxell, the key underlying factors are expediency,
unilateral action, revenge-seeking, and the loss of moral constraints, leading to the desire
to annihilate opposing cultural and economic systems.62
Tucker’s and Sprinzak’s findings are consistent with Hoffman’s prescient and consistent
writings on “holy terror.” In his seminal report on the topic, Hoffman presented his view
that “what is particularly striking about ‘holy terror’ compared to purely ‘secular terror’
is the radically different value systems, mechanisms of legitimation and justification,
concepts of morality, and Manichean world view that the ‘holy terrorist’ embraces.”63
Religious terrorists see themselves as “outsiders” who seek vast changes in an existing
order.64
Moreover, religious terrorists execute attacks for no audience but themselves,
rendering irrelevant the restraints that a supportive and committed constituency imposes
on secular groups.65
Within this world view, violence is a sacramental act or divine duty;
terrorism achieves a transcendental state of being, and its terrorist acts are not only
morally justified, but necessarily expedient in meeting a theological demand or
imperative.66
Hoffman’s typology is captured in Gressang’s audience-centric analysis emphasizing the
factors constraining a terrorist group’s choice between conventional weapons and WMD.
Gressang’s analysis rests on three assumptions. First, terrorists are, by their own logic,
rational actors, with an ordered, specified and identifiable set of preferences which in turn
establish values in the group’s cost-benefit calculations.67
Second, terrorist groups
possess both motivation and expectations for a desirable outcome; a terrorist group
pursues a course of action to achieve a goal, which may be more or less realistically
attainable.68
Third, terrorist groups exercise and gain influence through a message,
expressed through propaganda of the word or deed, to an appropriate audience.69
The
message may be symbolic, and the group’s audience identification may be subtle.70
60
Sprinzak, “The Great Superterrorism Scare,” 115.
61
Foxell, “The Debate,” 97.
62
Ibid., 95.
63
Hoffman, Holy Terror, 2; see also “Some Preliminary Hypotheses,” 48.
64
Hoffman, Holy Terror, 3.
65
Ibid., 5.
66
Ibid., 2.
67
Gressang, “Audience and Message,” 89.
68
Ibid., 90.
69
Ibid.
70
Ibid., 92.
12. 12
Ideology alone is an insufficient indicator
Gressang asserts that ideology absent context remains an insufficient discriminator of
preference for WMD among terrorist groups, and offers a framework to further narrow
the subset. Gressang’s schemata allows analysts to place terrorist groups within a three-
dimensional cube, vectored by the type of audience, the message content, and the nature
of the group’s relationship with its audience.71
Groups that address an ethereal audience,
lack a reciprocal or symbiotic relationship, and deliver a message of destruction (absent
the attendant message of rebuilding) will be more likely to assign WMD a high-utility
value in achieving their aims. To be clear, in Gressang’s model, all three factors must be
present to raise a group above the threshold at which pursuit WMD becomes a risk.
Because the number of known terrorist groups that would meet all three criteria is
appreciably small, Gressang places himself among those experts who consider unlikely
the use of a WMD in a terrorist attack.
Conclusion
As previously stated, the literature equivocates over terrorists’ resort to WMD. The
authors giving higher credence to the threat of a WMD attack acknowledge the
difficulties a terrorist group would need to overcome in order to acquire, weaponize, and
successfully conduct an attack resulting in mass casualties. Nor do the authors
documenting terrorist groups’ preferences for conventional weapons discount entirely the
threat of a WMD attack.
A conclusion drawn from the literature is the imperative for improved threat assessment.
Mengel, for example, has argued that by combining three sets of concepts—source of
stimuli, rationality, and the nature of the terrorist act—one may isolate potentially real
threats.72
The take-away message is that “red light-green light” indicators rest on the
quality of data collected to analyze specific terrorist groups, their ideology and
motivations, their targets, their messages, their audiences, and their long-term goals as
well as tactical aims.
71
Ibid., 100.
72
Mengel, “New Technologies,” 206-207.
13. 13
References
Bloom, Mia. Dying to Kill: The Allure of Suicide Terrorism. New York: Columbia
University Press, 2005.
Bunker, Robert J. “Weapons of Mass Disruption and Terrorism.” Terrorism and
Political Violence 12, no. 1 (Spring 2000): 37-46.
Cameron, Gavin. Nuclear Terrorism: A Threat Assessment for the 21st
Century. New
York: Palgrave MacMillan, 1999
———. “WMD Terrorism in the United States: The Threat and Possible
Countermeasures.” The Nonproliferation Review (Spring 2000): 162- 179.
———. “Nuclear Terrorism Reconsidered.” Current History (April 2000): 154-157.
Carter, Ashton, John Deutch, and Philip Zelikow. “Catastrophic Terrorism: Tackling the
New Danger.” Foreign Affairs (November/December 1998): 80-94.
Dolnik, Adam and Anjali Bhattacharjee. “Hamas: Suicide Bombings, Rockets, or
WMD?” Terrorism and Political Violence 14, no. 3 (Autumn 2002): 109-128.
Foxell, Joseph W., Jr. “The Debate on the Potential for Mass-Casualty Terrorism: The
Challenges to US Security.” Terrorism and Political Violence 11, no. 1 (Spring
1999): 94-109
———. “Some Previously Discounted Terrorism Scenarios that Seem More Likely in
Light of the Attacks of September 11, 2001.” American Foreign Policy Interests
24 (2002): 427-450.
Gressang, Daniel S., IV. “Audience and Message: Assessing Terrorist WMD Potential.”
Terrorism and Political Violence 13, no. 3 (Autumn 2001): 83-106.
Hoffman, Bruce. “Holy Terror”: The Implications of Terrorism Motivated by a
Religious Imperative. Santa Monica, CA: RAND, 1993.
———. “Terrorism and WMD: Some Preliminary Hypotheses.” The Nonproliferation
Review (Spring/Summer 1997): 45-53.
———. Terrorism and Weapons of Mass Destruction: An Analysis of Trends and
Motivations. Santa Monica, CA: RAND, 1999.
———. Inside Terrorism, Revised and Expanded Edition. New York: Columbia
University Press, 2006.
14. 14
Jacobs, Stanley S. “The Nuclear Threat as a Terrorist Option.” Terrorism and Political
Violence 10, no. 4 (Winter 1998): 149-163.
Jenkins, Brian M. “International Terrorism: A New Mode of Conflict.” In International
Terrorism and World Security, edited by David Carlton and Carlo Schaerf.
London: Croom Helm, 1975.
———. The Potential for Nuclear Terrorism. Santa Monica, CA: RAND, May 1977.
———. The Likelihood of Nuclear Terrorism. Santa Monica, CA: RAND, July 1985.
Juergensmeyer, Mark. Terror in the Mind of God: The Global Rise of Religious
Violence. Berkeley: University of California Press, 2003.
Mengel, R. W. “Terrorism and New Technologies of Destruction: An Overview of the
Potential Risk.” In Studies in Nuclear Terrorism, edited by Augustus R. Norton
and Martin H. Greenberg, 189-245. Boston, MA: G.K. Hall & Co., 1979.
Palfy, Arpad. “Weapon System Selection and Mass-Casualty Outcomes.” Terrorism and
Political Violence 15, no. 2 (2003): 81-95.
Parachini, John V. “The Making of Aum Shinrikyo’s Chemical Weapons Program.” In
The Making of a Terrorist: Recruitment, Training, and Root Causes. Vol. 2,
Training, edited by James J. F. Forest, 277-295. Westport, CT: Praeger Security
International, 2006.
Post, Jerrold M. “Prospects for Nuclear Terrorism: Psychological Motivations and
Constraints.” In Preventing Nuclear Terrorism: The Report and Papers of the
International Task Force on Prevention of Nuclear Terrorism, edited by Paul
Leventhal and Yonah Alexander, 91-103. Lexington, MA; Lexington Books,
1987.
Simons, Jeffrey D. Terrorists and the Potential Use of Biological Weapons: A
Discussion of Possibilities. Santa Monica, CA: RAND, December 1989.
Sopko, John F. “The Changing Proliferation Threat.” Foreign Policy (Winter
1996/1997): 3-20.
Sprinzak, Ehud. “The Great Superterrorism Scare.” Foreign Affairs (Fall 1998): 110-
124.
Stern, Jessica. The Ultimate Terrorists. Cambridge, MA: Harvard University Press,
1999.
———. Terror in the Name of God: Why Religious Militants Kill. New York:
HarperCollins, 2003.
15. 15
Tucker, Jonathan B., ed. Toxic Terror: Assessing Terrorist Use of Chemical and
Biological Weapons. Cambridge, MA: MIT Press, 2001.
———. “Chemical and Biological Terrorism: How Real a Threat?” Current History
(April 2000): 147-153.
THE FUND FOR PEACE
1701 K Street, NW
Eleventh Floor
Washington, D.C. 20006
(202) 223-7940 (phone)
(202) 223-7947 (fax)
www.fundforpeace.org