Global Security
Module 1
Terrorism is the use of violence and threats to intimidate or coerce, especially for political purposes.
Terrorism involves the following components: Violence, Audience, Fear, Innocent Victims, and Political and Ideological Goals
Types of Terror: endemic, dynastic assassination, focused random terror, and tactical terror
Specail Operation Forces were put into place to fight terrorism, and provide counterterrorism tactics
Tyrannnicide is the assasination of a political leader
State Terrorism is acts of terrorism that the state committs against defenseless victims
Cycle of violence is an act of violence that results in another act that is equally violent
Module 2
2001 President Bush created the Office of HomeLand Security, the purpose was to protect the US from furthure more terroist attack
HomeLand Security created 5 levels of terrorism alerts
The government spends about $20 billiond dollars a year collecting intel on terrorist groups
There are 2 types of intel: Human Intel, and technical intel
Human intel is when a agents or operatives go into dangerous conditions to gather sensitive information
Technical Intel uses imgaes from satelites and aerail reconnaissance
Covert operations from the US has included subversion, propaganda, disinformation, and false documentation for foreign governments
Numerous treaties have been put into place locally and internationally to create a formalized structure to deter terrorismsuch as: The Bonn Agreement, The Nuclear Non-Proleferation Treaty, Biological Weapons Convention, and Chemical Weapons Convention.
Module 3
Prior to 9/11, security of the US was handled by a combination of government agencies, law enforcement agencies, and military
Insufficent traing for airport security, and failure to aquire new technology for bag screning is a main cause of 9/11
The Homeland Security Act was passed in 2002, thus creating the Department of Homeland Security, and their main goal is to seek out and prevent terrorist attacks in the US
Homeland security has created a list of long term goals in cluding awareness, protection, recovery, prevention, response, service, and organizational excellence
DHS broke itself into 4 divisions: Border and Transportaion Security, Emergency Preparedness Response, CBRN Countermeasures, and Information Analysis and Infrastructure Protection
Module 4
Domestic Terroism takes three main forms, insurgent terrorism, right-wing extremeism, transnational terrorism
Insurgent Terrorism includes nationalists, and anarchist groups that perpatrate issues with violence
Right-Wing Extremeism fight to protect the system as it is or return it to the way that it was. Groups included are white supremacists
Transnational Terrorismis networking or terrorist from national bounderies
The U.S. handles domestic terrorism acts as an ordinary criminal act
Domestic & International Terroris share the same tactics: kidnapping, hostage taking, hi-jacking,a dn bombings
Module 5
Suicide bombers are considered a new type of terrorist
Suicide bombing are the prefered method due to the fact that they are cost effective, accurate, and instills fear
Suicide bombing is a community activity
Chemical & Biologocal weapons are cheap put difficult to produce
It is a high probability that terrorist will continue to try and aquire Weapons of Mass Destruction
Chemical weapons include: Blistering, Blood, Choking, and Nevre Agents
Nuclear Weapons are the most powerful and destructive weapons. Nuclear weapons can cause widespread panic
Chemical weapons are abundantly available and easy to construct
Cyber Terrorist have many reasons to conduct cyber-terrorism: Curiosity, Excitement, Publicity, Personal gains, Revenge, Activism, Religious causes
Types of Cyber Attacks: Incursion, Destruction, Disinformation, Denial of Attack, and Defacement of Websites
Incursion is an Unauthorized access to a computer system or network
Destruction is the entry to a computer or network with intent to harm and damage
Diinformation is when information or rumors are spread
Denail of Attack is when an attack is designed to disalbe online operations
Defacement of Website is a form of vandilism targeted at a website
Module 6
Categories of Terrorists: Crazies, Criminals, Crusaders
Crazies are emotionally disturbed individuals that committ terrorism for reasons that dont make sense to others
Criminals perform terrorist acts for personnel gains
Crusaders committ terrorist acts to gain power and prestiege
Terrorist show dedications to a greater cause
Terrorist have a lack of pitty or remorse
Terroist are usually highly eduacated which help them carry out the most complex of plans
Terrorist show characteristic of motivation and religious fanticism
When recruiting new terrorist age, sex, education, economic status, socialization towards violence, alienation towards western values, religious fanaticism is looked at by the faction recruiting
Most terrorist attacks today do not have clear political goals
Module 7
Terrorism can be ethnic, ideological, religious, domestic, or international
Ethinic Terrorism isdeliberate violence by a sub national ethnic group to advance it causes
Goals of ethnic terrorists are to strenghten their ethnic identity and increase political control
Ethnic terrorist attack symbolic targets
Ideological terrorism are political terrorists that seek out targets for a symbol value to intemidate those that dont belong to their group
Political extremeist hardly ever resort to violence to help support their cause
Signle issue terrorism is seeking government change on a significant issue
Single issue terrorism are applied to controversial issuessuch as enviromental and animal right activists
Articles
Citation
Wilmot, R. & Ness, R. (2009), Domestic and International Terrorism. Pearson Custom Publishing,