Typology of unconventional terrorism tactics

From Infogalactic: the planetary knowledge core
Jump to: navigation, search


Lua error in package.lua at line 80: module 'strict' not found.

While advancements in technology, modernization, and globalization have helped many states prosper over the course of history, they have also opened terrorist groups to new tactics and weaponry. The different tactics that terrorist groups utilize can be very simple to extremely complex. In his book, Why Terrorism Works: Understanding the Threat, Responding to the Challenge, Harvard Law Professor Alan M. Dershowitz states that before the dawn of dynamite and automatic weapons, killings conducted by terrorists had to be done on a one-on-one basis.[1] Dershowitz also describes how the introduction of new weapons and technology has enabled terrorists to kill more efficiently and in greater amounts:

"The weapons of choice for earlier terrorists were the dagger, the noose, the sword, and the poison elixir. The introduction of the hand-thrown bomb and the pistol, and more recently the machine gun and plastic explosives, enabled terrorists to kill much more efficiently. Now weapons of mass, or ‘wholesale,’ destruction allow terrorists to ‘leverage’ their personnel, as proved by the events of September 11, 2001, in which a relatively small number of highly trained individuals armed with primitive box cutters and prepared to give up their own lives were able to use passenger jets as weapons of mass murder."[2]

Terrorist tactics tend to favor attacks that avoid effective countermeasures and exploit vulnerabilities.[3] As such, terrorist groups have the potential to utilize many different types of terrorism tactics depending on the circumstances and the perceived likelihood of success. Some tactics are more conventional and widely used in the operations of many terrorist groups. These tactics include shootings, hijackings, kidnappings, bombings, and suicide attacks. Other tactics are seen more unconventional and have only been used in a few instances, if at all. However, these unconventional tactics are perceived by government officials and experts alike as serious potential threats. Some types of unconventional terrorism tactics commonly recognized by terrorism experts are bioterrorism, agroterrorism, nuclear terrorism, and cyberterrorism.

Bioterrorism

Bioterrorism is the deliberate release of viruses, bacteria, or other germs (agents) used to cause illness or death in people, animals, or plants.[4] Biological agents are typically found in nature, but it is possible that they can be changed to increase their ability to cause disease, make them resident to current medicines, or to increase their ability to be spread into the environment.[4] Biological agents in the hands of terrorists pose serious threats to states’ security because they can be easily spread through the air, through water, and through food.[4] Biological agents can also be difficult to detect and often do not cause illness for several hours to several days.[4] A prominent example of a bioterrorist attack on the United States is the September 2001 anthrax attacks. On September 18, 2001, several letters containing anthrax were sent to media outlets and the U.S. Congressional offices of Senator Thomas Daschle and Senator Patrick Leahy. Five Americans died from anthrax inhalation as a result of contact with the contaminated mail.[5] While the 2001 anthrax attacks were relatively small-scale, the United States government has taken several steps since to 2001 to pass legislation and initiatives aimed at better protecting the United States against biological attacks, improving the United States’ public health system, and improving the United States ability to respond to biological attacks.

Agroterrorism

A subset of bioterrorism, agroterrorism refers to the deliberate introduction of an animal or plant disease for the purposes of generating fear, causing economic losses, or undermining social stability.[6] The ultimate goal of agroterrorism in killing livestock and plants and contaminating food is to cause economic crises in the agricultural and food industries, social unrest, and loss of confidence in the government.[6] Many experts believe that the United States’ agricultural sector and food supply are among the most vulnerable and least protected of all potential targets of attack, and they believe that terrorists have taken note of this.[7] After American and allied forces overran some Al-Qaeda’s refuges in caves in eastern Afghanistan in 2002, they found U.S. agricultural documents and Al-Qaeda training manuals on targeting agriculture among thousands of other documents.[7]

Analysts have identified a number of characteristics of the United States’ agricultural system that make it very vulnerable to agroterrorism. Given that agriculture generally demands large expanses of land, farms are geographically dispersed in environments that are difficult to secure.[6] Also, livestock are usually concentrated in confined locations, which allows diseases to infect more animals quickly.[6] Although many experts believe the United States is susceptible to agroterrorism, they have never suffered from a large scale agroterrorism related attack. Many political scientists have identified the 1984 salmonella attack in The Dalles, Oregon as a small-scale example of an agroterrorism attack in the United States. A religious cult intentionally contaminated ten restaurant salad bars with salmonella in an attempt to influence a local election, sickening more than 750 people.[7] Even though the United States has not experienced a large-scale agroterrorism attack to date, similar to its anti-bioterrorism initiatives, the United States government has passed several pieces of legislation and started initiatives over the past few decades to better secure its agricultural system and prepare for potential attacks.

Nuclear terrorism

While no terrorist group has ever successfully acquired and used a nuclear weapon, many political scientists and prominent government officials consider nuclear terrorism to be one of the single greatest threats in global security. There is strong evidence that terrorist groups like Al-Qaeda are actively seeking to acquire nuclear weapons, and the plutonium or highly enriched uranium (HEU) needed to produce them.[8] Another serious concern is that weaknesses in many states’ nuclear security apparatuses have left them susceptible to theft or loss of HEU or plutonium. According to the International Atomic Energy Agency’s (IAEA) Illicit Trafficking Database (ITDB), there have been 18 incidents of theft or loss of HEU and plutonium reported in ITDB’s participating states.[8] Given these serious concerns, the United States, its allies, and international organizations like the United Nations have established several international agreements and initiatives to ensure that all states’ nuclear security standards are adequate and effective, and to secure all vulnerable and unprotected nuclear stockpiles around the world over the next few years.

Cyberterrorism

In the developing age Information Technology, many political scientists and prominent government officials have become increasingly concerned about the ability of terrorist groups to execute cyber attacks and states’ vulnerabilities to these attacks. Cyberterrorism could potentially become an increasingly desirable tactic for terrorist groups given that they can be executed thousands of miles away from the target and are difficult to trace back to the perpetrator. In an October 2012 speech, United States Secretary of Defense Leon Panetta described the seriousness of a cyber attack on the United States: “A cyber attack perpetrated by nation states or violent extremists groups could be as destructive as the terrorist attack of 9/11. Such a destructive cyber terrorist attack could paralyze the nation.”[9] The term “cyberterrorism” was first coined by Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, in the 1980s.[10] The Center for Strategic and International Studies defines cyberterrorism as “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.”[11] Many experts believe that new vulnerabilities will be created as nations and their critical infrastructures become more dependent on computer networks for their operation.[11]

While concern is growing, cyberterrorism attacks still largely remain hypothetical, especially in the United States. In his report for the Center for Strategic and International Studies, James A Lewis writes that so far cyberterrorism has meant little more than propaganda and intelligence collection, and that no critical infrastructures have ever been shut down by cyber terrorist attacks.[11] Lewis also describes how terrorist groups like Al-Qaeda have made significant use of the Internet, but only as a tool for intra-group relations, fundraising, and public relations.[11] An Al-Qaeda training manual entitled “Military Studies in the Jihad Against the Tyrants” explicates that explosives are the preferred weapon of terrorists because “explosives strike the enemy with sheer terror and fright.”[11] While explosions are dramatic, strike fear into the hearts of opponents, and do lasting damage, cyber attacks, like some other types of terrorism tactics, simply do not have the same dramatic and political effect that terrorists seek. Some political scientists, like Lewis, argue that terrorist organizations like Al-Qaeda might use cyber attacks to disrupt emergency services in order to reinforce and multiply the effect of a physical attack.[11]

References

  1. Alan M. Dershowitz, Why Terrorism Works: Understanding the Threat, Responding to the Challenge(New Haven: Yale University Press, 2002), pg.6.
  2. Alan M. Dershowitz, Why Terrorism Works: Understanding the Threat, Responding to the Challenge(New Haven: Yale University Press, 2002), pg.7.
  3. FEMA, “Evolving Terrorist Threat: Long-term Trends and Drivers and Their Implications for Emergency Management,” September 2011, http://www.fema.gov/pdf/about/programs/oppa/evolving_terrorist_threat.pdf.
  4. 4.0 4.1 4.2 4.3 J.V. Borelli, Bioterrorism: Prevention, Preparedness, and Protection (New York: Nova Science Publishers, Inc., 2007), vii.
  5. J.V. Borelli, Bioterrorism: Prevention, Preparedness, and Protection (New York: Nova Science Publishers, Inc., 2007), 45.
  6. 6.0 6.1 6.2 6.3 Jim Monke, Congressional Research Service Report for Congress, Agroterrorism: Threat and Preparedness, August 25, 2006, http://digital.library.unt.edu/ark:/67531/metacrs9549/m1/1/high_res_d/RL32521_2006Aug25.pdf.
  7. 7.0 7.1 7.2 Dean Olson, “Agroterrorism: Threats to America’s Economy and Food Supply,” FBI Law Enforcement Bulletin, February 2012, http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/february-2012/agroterrorism.
  8. 8.0 8.1 Matthew Bunn and E.P. Maslin, "All Stocks of Weapons-Usable Nuclear Materials Worldwide Must be Protected Against Global Terrorist Threats," Journal of Nuclear Materials Management 39 (Winter 2011): 21.
  9. Jim Garamone, “Panetta Spells Out DOD Roles in Cyberdefense,” U.S. Department of Defense News, October 11, 2012, http://www.defense.gov/news/newsarticle.aspx?id=118187.
  10. Maura Conway, “What is Cyberterrorism?,” Current History (December 2002): 436.
  11. 11.0 11.1 11.2 11.3 11.4 11.5 James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” Center for Strategic and International Studies (December 2002), http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf.