Professional Documents
Culture Documents
Dispute Resolution and Crisis Managt Poopsheet New Curr
Dispute Resolution and Crisis Managt Poopsheet New Curr
Neutral Evaluation
DISPUTE RESOLUTION SYSTEM AND AMICABLE • A process in which the parties or their counsel present
SETTLEMENT their cases to a neutral third party who renders a non-
binding reasoned evaluation on the merit of the case.
DISPUTE (conflict) – an irritable and persistent argument; • A third party is usually an experienced and respected
either criminal or civil in nature lawyer with expertise in the substantive area of the
dispute.
The Concept of Conflict
A conflict is a struggle between people. The Conciliation – a conciliator meets with the parties both
struggle may be physical, or between conflicting ideas. The separately and together in an attempt to resolve their
word comes from Latin "conflingere" means to come differences. Conciliator usually has no authority to seek
together for a battle. Conflicts can either be within one evidence or call witnesses, usually writes no decision,
person, or they can involve several people or groups. and makes no award.
Conflict is a natural disagreement arising between
two or more people. It exists when they have incompatible Concept of Conflict Resolution
goals and one or more believe that the behavior of the Conflict resolution is conceptualized as the
other prevents them from their own goal achievement. methods and processes involved in facilitating the peaceful
ending of conflict and retribution. The term conflict
COMMON PROCESSES OF ALTERNATIVE DISPUTE resolution may also be used interchangeably with dispute
RESOLUTION resolution, where arbitration and litigation processes are
critically involved. The concept of conflict resolution can be
Arbitration thought to encompass the use of nonviolent resistance
• a neutral person called an "arbitrator" hears arguments measures by conflicted parties in an attempt to promote
and evidence from each side and then decides the effective resolution.
outcome. Committed group members attempt to resolve
• parties agree to accept the arbitrator’s decision as final group conflicts by actively communicating information
(binding arbitration), or – about their conflicting motives or ideologies to the rest of
• parties may request a trial if they do not accept the group (e.g., intentions; reasons for holding certain beliefs)
arbitrator’s decision (non-binding). and by engaging in collective negotiation. Dimensions of
resolution typically parallel the dimensions of conflict in the
Mediation way the conflict is processed.
• A neutral person called a "mediator" helps the parties Cognitive resolution is the way disputants
try to reach a mutually acceptable resolution of the understand and view the conflict, with beliefs, perspectives,
dispute. understandings and attitudes. Emotional resolution is in the
• The mediator does not decide the case, but helps the way disputants feel about a conflict, the emotional energy.
parties communicate so they can try to settle the Behavioral resolution is reflective of how the disputants act
dispute themselves. their behavior. Ultimately a wide range of methods and
procedures for addressing conflict exist, including
Court-Annexed Mediation – means any mediation negotiation, mediation, mediation-arbitration, diplomacy,
process conducted under the auspices of the court, after and creative peacebuilding.
such court has acquired jurisdiction of the dispute; Kenneth Thomas and Ralph Kilmann developed
five conflict resolution strategies that people use to handle
Court-Referred Mediation – means mediation ordered by conflict, including avoiding, defeating, compromising,
a court to be conducted in accordance with the Agreement accommodating, and collaborating.
of the Parties when as action is prematurely commenced in This assumes that people choose how cooperative
violation of such agreement and how assertive to be in a conflict. It suggests that
everyone has preferred ways of responding to conflict, but
most of us use all methods under various circumstances.
1
B. COMPARE AND DIFFERENTIATE RESTORATIVE JUSTICE FROM RETRIBUTIVE JUSTICE.
(METHODS, TECHNIQUES, AND STRATEGIES OF NEGOTIATION, ARBITRATION,
MEDIATION, AND CONCILIATION).
2
that everyone can support. A great way to The concept is that everyone gives up a little bit of
collaborate and overcome conflict is to reach out what they want, and no one gets everything they
and touch them. want. The perception of the best outcome when
working by compromise is that which "splits the
Conflict Resolution Strategy #5: Compromising difference."
Another strategy is compromising, where Compromise is perceived as being fair, even if no
participants are partially assertive and cooperative. one is particularly happy with the final outcome.
3
PART II. CRISIS MANAGEMENT
4
common objectives and strategies to prevent conflict • Comprehensive resource management - systems
or duplication of effort. in place to describe, maintain, identify, request, and
• Manageable span of control - response track resources.
organization is structured so that each supervisory • Pre-designated incident facilities - assignment of
level oversees an appropriate number of assets locations where expected critical incident-related
(varies based on size and complexity of the event) so functions will occur.
it can maintain effective supervision.
• Consolidated action plans - a single, formal
documentation of incident goals, objectives, and
strategies defined by unified incident command.
5
Lerbinger categorized seven types of crises E. Crises of organizational misdeeds
1. Natural disaster Crises occur when management takes actions it
2. Technological crises knows will harm or place stakeholders at risk for harm
3. Confrontation without adequate precautions.
4. Malevolence
5. Crisis of skewed management value F. Workplace violence
6. Crisis of deception
Crises occur when an employee or former
7. Crisis of management misconduct
employee commits violence against other employees
on organizational grounds.
A. Natural crises
Natural crises, typically natural disasters G. Rumors
considered as 'acts of God,' are such environmental
False information about an organization or its
phenomena as earthquakes, volcanic eruptions,
products creates crises hurting the organization’s
tornadoes and hurricanes, floods, landslides,
reputation. Sample is linking the organization to
tsunamis, storms, and droughts that threaten life,
radical groups or stories that their products are
property, and the environment itself.
contaminated.
Example: 2011 Japan Tsunami, Sendong
Flood, Oklahoma tornadoes Definition of Crisis Management
B. Technological crises Crisis Management is the expert handling of a
crisis or emergency to reduce or eliminate danger or
Technological crises are caused by human damage, or the like, especially on the part of
application of science and technology. Technological government. It is the act or manner of handling
accidents inevitably occur when technology becomes decisively matters that are crucial in nature. It
complex and coupled and something goes wrong in involves considerably the prevention of loss of life
the system as a whole (Technological breakdowns). and injury, loss or damage to property from hazards
Some technological crises occur when human error which cannot be normally foreseen or prevented.
causes disruptions (Human breakdowns. People tend
to assign blame for a technological disaster because DEALING WITH PARTICULAR CRISES INVOLVING
technology is subject to human manipulation whereas KIDNAPPING, HOSTAGE TAKING, AND
they do not hold anyone responsible for natural TERRORISM (Crisis of Malevolence)
disaster. When an accident creates significant
environmental damage, the crisis is categorized as OBJECTIVES OF CRISIS MANAGEMENT
megadamage. Samples include software failures,
industrial accidents, and oil spills. 1. resolve without further incident
Examples: Chernobyl disaster, Exxon 2. safety of all participants
Valdez oil spill 3. apprehension of all perpetrators
C. Confrontation crises
4. accomplishment of the task within the
Confrontation crises occur when discontented framework of current community standards
individuals and/or groups fight businesses, H.
government, and various interest groups to win I. PRINCIPLES OF CRISIS MANAGEMENT
acceptance of their demands and expectations. The
common type of confrontation crises is boycotts, and 1. Contain and Negotiate – the response force
other types are picketing, sit-ins, ultimatums to those should, as much as possible resolve a crisis
in authority, blockade or occupation of buildings, and without violence or bloodshed, and with the
resisting or disobeying police. perpetrator getting arrested
Example: Rainbow/PUSH’s (People United to 2. Protection of the Innocent from Harm – innocent
Serve Humanity) boycott of Nike victims of crises must be spared from harm and
be freed as soon as possible
D. Crises of malevolence 3. Longer Time means Better Resolution – the
An organization faces a crisis of malevolence response force must allow passage of time so
when opponents or miscreant individuals use criminal that perpetrators can be reasoned through
means or other extreme tactics for the purpose of thorough negotiation; passage of time can also
expressing hostility or anger toward, or seeking gain afford the response force to:
from, a company, country, or economic system, a. evaluate the situation
perhaps with the aim of destabilizing or destroying it. b. gather information
Sample crises include product tampering, kidnapping, c. explore alternatives; and
malicious rumors, terrorism, and espionage. d. formulate a plan of action
6
J. MUSTS IN CRISIS MANAGEMENT • The assailant has not been apprehended and has
threatened to return.
1. Rely on continuous flow of information from all
sources. Any of these may make the victim feel unsafe
2. Press perpetrators to abandon their position. even if there are law enforcement officers present. In
3. Receive, analyze and disseminate all the aftermath of the Edmond, Oklahoma, post office
information. mass murders in 1986, one of the survivors of the
4. Mount controlled probes on the perpetrators’ attack said that he would not feel safe until the
position. assailant, Patrick Sherrill, who finally killed himself,
5. Prepare for possible rapid escalation of events. was physically in his grave.
K. PHASES OF CRISIS MANAGEMENT 3. A priority for some victims and survivors is the
safety of others as well. If a couple has been robbed
1. Locate in a street crime, each may be more worried for the
2. Isolate other person than himself or herself. Parents are
3. Evaluate often more concerned about the safety of their
4. Evacuate children than themselves.
5. Eliminate
4. Survivors or victims of homicide may not focus on
CRISIS INTERVENTION PROTOCOLS (National safety but rather seek a sense of security through the
Organization for Victim Assistance) provision of privacy and nurturing. Their anguish and
The following covers the basic techniques of crisis grief can be made more painful if there are unfamiliar
intervention and some hints for helping victims and and unwanted witnesses to their sorrow. They, too,
survivors in the aftermath of trauma. It should be will suffer feelings of helplessness and
noted that training and experience with traumatized powerlessness.
victims is a prerequisite to understanding the The shock of the arbitrary death of a loved one is
following protocols. usually not assimilated immediately and survivors
may not understand questions or directives given to
Under no circumstances should the following them. For example, one mother did not realize that
information be implemented without training and she had said yes when she was asked if she wanted
oversight. to identify the body of her son. When she was taken
to the morgue, she became hysterical and distraught
because she was not properly prepared.
PROTOCOLS
5. All victims and survivors need to know that their
A. “Safety and Security” reactions, their comments, and their pain will be
1. The first concern of any crisis intervener should be considered private. If in a group setting, it should be
for the physical safety of the victim. Until it is clear noted that while privacy cannot be guaranteed, it
that the victim is not physically in danger or in need of should be an expressed value that is acknowledged
emergency medical aid, other issues should be put by everyone present. If confidentiality is limited by law
aside. This is not always immediately obvious. or policy, those limits should be clearly explained.
Victims who are in physical shock may be unaware of
the injuries they have already sustained or the 6. Security is also promoted when victims and
dangers they still face. survivors are given opportunities to regain control of
events. They cannot undo the crime or the death of
For the crisis intervener who is responding to a loved ones, but there may be opportunities for them
telephone crisis call, the question should be posed to take charge of things that happen in the immediate
immediately, “Are you safe now?” Interveners who aftermath.
are doing on-scene or face-to-face intervention
should ask victims if they are physically harmed. That 7. Hints for Helping.
question alone may cause the victim to become
aware of a previously undiscovered injury. a. Make sure the victims/survivors feel safe or secure
at this point in time.
2. A parallel concern should be whether the victim
feels safe. The victim may not feel safe in the • Sit down to talk.
following circumstances: • Ask the victims/survivors where they would feel
• The victim can see and hear the assailant being safest when talking to them, and move to that
interviewed by law enforcement officers. location.
• The victim is being interviewed in the same area • If it is true, reassure them with the words, “You
where an attack took place. are safe now.”
• The victim is not given time to replace torn clothes. • Identify yourself and your agency or position
clearly, and explain your standards of privacy.
• The victim is cold and uncomfortable.
7
You might say, “Our program’s standards require dependent. The “rescuer” who ends up months later
me to keep all information that you tell me private making decisions for the victim has subverted the
unless you give your permission to me to release it.” primary goal of crisis intervention; that is, to help the
If you can’t keep all information confidential because victim restore control over his or her life. The
you are with a police or prosecutorial agency, then be following tips suggest appropriate ways in which the
honest about the limits of confidentiality. intervener can step in on a temporary basis.
You might say, “Our program requires me to • It is useful to take care of practical things that
report anything you tell me that might help a need to be done but are beyond the victim’s ability
defendant in this case, but I am not required to report to accomplish. For example, a victim of a sexual
anything else, and I will not do so unless you give assault may appreciate it if you arrange for a
permission.” friend to bring a new set of clothes; after—as with
every courtesy—getting permission to do so. In
• If possible, keep media away from
making such offers, don’t assume anything. For
victims/survivors or help them in responding to
example, the last person a sexual assault victim
media questions. If the case involves a
may wish to see immediately after a rape is a
sensational crime and there are media
spouse or partner.
representatives approaching the survivors, try to
ensure that the victims/survivors understand that • Offer to provide childcare, help with
they do not have to answer questions unless they transportation, make telephone calls, and so forth.
want to and under circumstances of their own Be specific in making such offers so that the
choosing. victim can simply respond with a “yes” or a “no”.
• If they have loved ones about whom they are
concerned, try to find out as much information as c. Help survivors to re-establish a sense of control
possible about the safety of the loved ones. For over the small things, then the larger ones, in their
instance, a mother who has been a victim on the lives.
way home from work might not be as worried
• While it is important to assist survivors with
about the victimization but the safety of a child
practical activities, it is
who is home alone awaiting her arrival. (See if a
colleague can be dispatched to the home to also important to allow them to make decisions for
provide care for the child until the mother is able themselves and to take an active role in planning
to return. Or, see if she can identify a relative or their future.
neighbor who might assume the caretaking role in • The crisis intervener initially can offer survivors a
her absence.) sense of control by asking them simple questions
• If victims are to be interviewed by law involving choices that are easily made. For
enforcement officers or others, try to ensure that instance, “What name would you like me to use in
they understand questions by asking them to talking with you?”; “Where would you like to sit
repeat the question back to the interviewer. while we talk?”; “Would you like a glass of water?”
• Provide victims with information to assure them • Often the recovery of a physical object that is
of their safety. For instance, if they have been important to the survivor helps to reestablish a
survivors of a massacre, it may help if they are sense of control. For instance, after the arson of
assured that the gunman is dead or has been one family’s home, the entire family found hope
apprehended. when a law enforcement officer found their cat in
the bushes nearby. The family had thought the cat
• If they are not safe, keep them informed about
had died in the fire.
the extent of additional threat. For instance, if the
gunman is still at large, try to get information
about their whereabouts. If possible, find them an Motives in Hostage-taking
alternative location at which to stay for a few 1. In political terrorism, reasons include showing
hours or a few days. In the aftermath of the serial the public that the government is unable to
killings of five co-eds in Gainesville, Florida, the protect its own citizens.
victim/witness program and the community
arranged for students to sleep together in 2. Hostage-taking guarantees immediate media
dormitory-like conditions in a large auditorium coverage for the purpose of expressing
surrounded by guards; all to restore a sense of sentiments and getting their demands met.
safety. 3. Warring nations seek peace after exchange of
• Give victims permission to express any reactions hostages as a guarantee of reciprocity.
and respond non-judgmentally. Say, “You have a 4. In urban guerilla warfare, hostages are taken
right to be upset over this tragedy, so don’t be with little regard for law and order. Holdups
afraid to tell me what you are thinking.” sometimes involve hostages and certain
guidelines of behavior must be laid down if the
b. Respond to the need for nurturing — but be wary police is to effectively deal with a hostage
of becoming a “rescuer” on whom the victim becomes situation.
8
5. Law enforcement officers will most likely 2. Psychotics – mentally-ill people who take
encounter hostage incidents that involve either hostages during a period f psychiatric
criminals or the mentally disturbed. disturbance.
6. A husband or wife may take a child hostage in 3. Common Criminals – people who take
custody battles. hostages for personal, rather than ideological
reasons
7. A mentally disturbed person may take people as
hostages. 4. Prisoners/Escapees – people who take
hostages because of dissatisfaction and
Reasons of taking Hostages in a Criminal discontent regarding their living conditions in
Situation prison.
1. when the criminal is unable to complete the 5. Political Terrorists – are ideologically-inspired
crime and escapes before the police responds, individuals or groups of people who take
thus, making hostage-taking a spontaneous hostages because of political and ideological
event beliefs.
2. criminals take hostages to ensure their own
Generic Categories of Hostage-takers
safety
3. the demands are invariably for safe passage 1. The Common Criminal
and as a means of escape in return of the
a. He generally concedes to police negotiations
hostages’ lives.
if there is no way out and hostages will
4. hostage-taking, particularly of children due to generally be unharmed.
domestic custody battle
b. This type is classified as a rational creative
thinker; he is able to reason and can
HOSTAGE TAKER discriminate on how much force is to be used
The International Convention against the Taking against him.
of Hostages, Adopted by the General Assembly of the 2. The Psycho
United Nations on 17 December 1979, defines a
hostage taker as: a. This person is unpredictable and may resort to
violence depending on his mood.
i. any person who seizes or detains and threatens
to kill, to injure or to continue to detain another b. The enforcement officer should try to gain as
person in order to compel a third party, namely, a much information as possible concerning
State, an international intergovernmental motives, past history, medical and arrest
organization, a natural or juridical person, or a records, etc.
group of persons, to do or abstain from doing any c. This type of person is generally described as
act as an explicit or implicit condition for the one who is full of inner conflict and frustrations
release of the hostage, commits the offence of which are transferred to his immediate reality,
taking of hostages (“hostage-taking”) within the distorted to suit his own illusions.
meaning of this Convention. (Art. 1) any person
who: a) attempts to commit an act of 3. The Fanatic
hostage-taking, or b) participates as an a. This category includes the one who falls on
accomplice of anyone who commits or attempts to the extreme side of violence.
commit an act of hostage-taking
b. The most dangerous because he tends to
think that the law has no basis.
There are three choice of actions for the hostage c. The law enforcement officer may have to
taker: resort to ego-flattering if he can approach
a. choose martyrdom, kill the hostages and close enough.
commit suicide
b. lessen the demands to a more achievable Guidelines in Dealing with Hostage-takers
proportion and continue negotiations 1. Law enforcers will have to discover the hostage-
c. surrender to police. takers intentions.
(source: FBI Hostage Negotiation Study Guide 2010, 2. The demands and needs of the hostage-taker
USA) must be determined.
3. “Negotiation” means to talk. Stalling and talking
Categories of Hostage-Takers
may actually help.
1. Persons in Crisis - people who take hostages 4. In most cases time has been found to be an ally
during a period of prolonged frustration, of the negotiators.
despair and problems
5. Never say NO to a hostage-taker.
9
3. Leading
a. making decisions – arriving at conclusions
and judgments about results
Common Reasons why Criminals take Hostages b. communicating – creating understanding
1. escape 3. c. motivating – inspiring, encouraging and
Transportation impelling people to take required actions
2. money d. selecting people – choosing people with the
appropriate skills
Common Reasons why Prisoners take Hostages
e. developing people – improving the
1. better bargaining power and a significant
knowledge, attitudes and skills of people
amount of media coverage
4. Controlling
2. to seek address on complaints concerning
prison conditions and demands for improvement a. developing performance standards –
establishing criteria in order to differentiate
Common Reasons why Terrorists take Hostages
between acceptable and unacceptable
1. to get as much publicity as possible for airing performance
their “cause”
b. measuring performance – recording and
2. taking people as hostages is one of the more reporting work
effective ways of striking fear into their hearts
c. evaluating performance – appraising work
and results
MANAGING HOSTAGE SITUATIONS
d. correcting performance – regulating and
Experience has repeatedly demonstrated that the improving methods and results
most effective way to resolve a hostage situation is
through the efficient management of conditions and
police activities related to the situation.
Basic Plan of Action for Hostage Situations
1. Identify the Physical Objective
Four (4) Major Activities in Managing Hostage
The physical objective is the exact location
Situations
of the event. It may be a structure, a vehicle or
a position with no structure or vehicle
1. Planning
involved.
a. forecasting – anticipating conditions,
2. Establish an Inner Perimeter – the purpose is
problems and opportunities that maybe
to control ingress and egress
confronted during and after the incident
3. Establish an Outer Perimeter – the purpose is
b. establishing objectives – determining
to restrict vehicular and pedestrian traffic that
desired results
could conflict with police activity
c. establishing priorities – creating a sequence
4. Organize a Fire and Observation Team – this
of steps to be followed in reaching the
team will help provide cover for the assault
objective
team, and to obtain information useful in
d. scheduling – establishing action devising a plan of action; it will also make an
commitments estimate of the situation through direct
e. allocating resources – identifying manpower observation of the objective
and equipment required to reach objectives 5. Activate the Negotiating Team – the
and to effectively utilize available resources objectives of the negotiating team is the
f. establishing procedures – providing answers release of the hostage/s, the representation of
to important questions and problems which the authorities in negotiation and conveying
are anticipated and which provide for actions government stand and policy in dealing with
that are of the interest of the police the crisis
10
After the basic plan has been implemented, the • All of these will be relevant in either a post-
leader must make a detailed analysis of the situation incident investigation or inquiry.
that should include the following:
1. Mission – the basis for all actions that are to be Composition of the Crisis Management Team
undertaken (CMT)
11
3. brief media e. attempt a compromise without saying no to
4. collect evidence the hostage-taker
5. assemble involved personnel
5. Follow-up
6. retrieve equipment
7. assess property damage Even if you have defused the crisis situation,
8. identify critique data and handle debriefing you have probably not yet solved any problem.
Make follow-up reports as soon as you can and
arrange for professionals in psychology, family
NEGOTIATION APPROACHES AND counseling, spiritual guidance, or whatever other
OPERATIONAL PROCEDURES needs there appears to be.
12
6. this person will test the limits of his environment 2. The use of force shall be applied only as a last
and redoubles his efforts in the face of perceive resort, when all other peaceful means have
weakness on the side of authorities been exhausted.
7. whenever possible, match the negotiator and 3. only necessary and reasonable force to subdue
hostage-taker as to ethnic origin, religion, or or overcome a clear and present danger shall
education. be applied.
8. do not attempt to play the role of therapist. 4. in cases of shootouts, panic firing should be
avoided. it is done by opening fire with everyone
following suit. the officer-in-charge should order
Common Criminal his men to fire only when necessary.
1. he is the type of person who doesn’t plan very 5. extreme caution should be observed when firing
well a weapon in congested areas. The practical rule
2. he is often self-indulgent and impulsive of shooting only to save a life could well be
applied.
3. he often lacks conscience or concern for others
6. after a shootout, the police officer should check
4. at first, relations with hostages will be whether the suspects still pose danger or has
uncomfortable because he is worrying what they been disabled already. He shall then be brought
might do and how to manage them. After some to the nearest hospital for treatment and
time, he ay begin to relate to them as human adequate security.
beings.
7. police sirens and megaphones shall be used to
5. an important step is to determine whether he is influence or warn offenders or suspects to stop
a mentally-disturbed person or not and to peacefully give up.
6. after ruling out mental disturbance, you can be 8. human rights shall be strictly observed and
fairly sure that you are dealing with a person respected at all times.
who has frequent brushes with the law, knows
what to expect from the police, and knows what
he may need to do to get out of the situation Operational Procedures during Hostage
alive. Situations
13
much cursory information as possible. Assess the
First Responder’s Guidelines threat(s) and estimate the location(s) of the
command post(s), and the number and proposed
Whenever you encounter a person who appears
positions of backup officers needed to establish a
to exhibit a mental or emotional problem more deep-
temporary inner perimeter.
seated than the immediate circumstance warrants,
the following guidelines may assist you: d. Report the number and identities of hostage
takers and hostages and their clothing
1. Approach the subject with extreme caution.
descriptions, precipitating events, size and
Maintain a calm and casual manner.
locations of the dangerous zones, inform
2. Speak to the subject by name, if you know it. Your responding officers of recommended entry routes,
voice should be soothing, but firm and business- types of weapons involved and directions or line
like. of fire. (FBI Hostage Negotiation Study Guide
3. Say or do nothing that might threaten or 2010, USA)
intimidate.
4. Avoid arguing or scolding the subject, and don’t Contemporary Terrorism
allow anyone else to do so.
Definition of Terrorism
5. Make use of friends or relatives who know how to
talk to, or deal with the subject, unless there is Terrorism is … “violence for effect . . . not
friction between them. The subject might have primarily, and sometimes not at all for the physical
more trust and confidence in you if you appear to effect of the actual target, but rather for its dramatic
be getting along with friends and relatives. impact on an audience.”
6. Try to stall whenever possible until you have a Terrorism is . . . “the calculated use of violence of
follow-up officer on the scene. the threat of violence to attain goals, often political or
ideological in nature, through fear, intimidation or
7. If the situation warrants, and you take the subject coercion. It usually involves a criminal act often
into custody, do so carefully. Avoid painful grips symbolic in nature and intended to influence an
and keep your firearms out of the suspect’s reach. audience beyond the immediate victim.”
8. When you transfer custody to psychiatric Terrorism is . . . “violent criminal behavior
personnel, give them as much information about designed to generate fear in the community, or a
the subject’s symptoms and behavior. substantial segment of it, for political purposes.”
A definition proposed by Carsten Bockstette at
The First Responder’s Actions the George C. Marshall Center for European Security
1. maintain radio contact at all times Studies, underlines the psychological and tactical
2. verify complaint aspects of terrorism:
3. determine perpetrator’s locations “Terrorism is defined as political
4. determine perpetrator’s weapons violence in an asymmetrical conflict that is
5. communicate findings designed to induce terror and
6. establish inner perimeter psychic fear (sometimes indiscriminate)
7. request necessary support through the violent victimization and
8. communicate safe entry and exit routes destruction
9. evacuate the trapped and the injured, if of noncombatant targets (sometimes
possible iconic symbols). Such acts are meant to
10. maintain command and control send a message from an illicit clandestine
11. establish outer perimeter organization. The purpose of terrorism is
12. fill out the first responder’s report form to exploit the media in order to achieve
maximum attainable publicity as an
Upon arrival, the investigating patrol officer(s) amplifying force multiplier in order to
employs the ICER concept to the call: influence the targeted audience(s) in
a. Isolate physical and psychological activities on order to reach short- and
the scene and keep onlookers beyond the police midterm political goals and/or desired
safety line. long-term end states."
b. Contain the hostage taker mobility to the smallest In November 2004, a United Nations Secretary
location in the building or exterior area and deny General report described terrorism as any act
the opportunity to observe the police presence "intended to cause death or serious bodily harm to
activities. This begins the confines of the inner civilians or non-combatants with the purpose of
perimeter and also allows time for crisis intimidating a population or compelling a government
stabilization or an international organization to do or abstain from
doing any act".
c. Evaluate because the original report may or may
not be what the situation actually is. Gather as
14
ETYMOLOGY (ORIGIN) OF THE TERM
"Terror" comes from a Latin terrere meaning "to Terrorist Motivations and Group Classification
frighten". The terror cimbricus was a state of panic The Institute of the Study of Conflict, when
and emergency in Rome in response to the approach discussing terrorism in Europe, classified the groups
of warriors of the Cimbri tribe in 105 BC. as follows:
The Jacobins cited this precedent when imposing a
Reign of Terror during the French Revolution. After 1. Minority Nationalistic Groups – groups fighting the
the Jacobins lost power, the word "terrorist" became a majority of the community where the support base
term of abuse. Although the Reign of Terror was will depend on ethnic, religious, or linguistic
imposed by a government, in modern times minorities at odds with the majority community
"terrorism" usually refers to the killing of innocent 2. Marxist Revolutionary Group – characterized by
people by a private group in such a way as to create its possession of a coherent Marxist ideology, or
a media spectacle. This meaning can be traced back any persuasion, and of a long-term strategy
to Sergey Nechayev, who described himself as a bringing about a Socialist revolution
"terrorist". Nechayev founded the Russian terrorist
group "People's Retribution" in 1869. 3. Anarchist Group – true anarchists are difficult to
(http://en.wikipedia.org/wiki/Terrorism#cite_note- find since true anarchy brings lawlessness and
Bockstette2008-24) disorder, which is a natural state in which humans
exist; these are people who terrorize for the sole
Contemporary Terrorism purpose of inflicting terror only.
Some commentators agree that the roots of 4. Pathological Groups – motivations normally have
contemporary terrorism lie in the swell of student more to do with personal inadequacy, hatred of
unrest during the 1960’s when there was a global family or specifically identified persons or things,
trend towards dissatisfaction with the establishment. than with acquired ideology
The campus riots at the time enabled the disaffected
minorities to operate with a degree of impunity. The 5. Neo-Fascist and Extreme Right-wing Groups –
use of violence to make a point became increasingly these are groups that appear to counter the
popular. It became an “accepted” form of expressing activities of the Left, or the Communists, and may
dissatisfaction with the status quo. pose a more serious threat to security forces than
the more traditional terrorist groups
Factors that Affected Terrorism 6. Ideological Mercenaries – a new form of terrorism
1. Media from people who, for the sake of shared ideology
and a common faith in worldwide revolution are
No matter what the terrorist’s cause may be, one ready to cross frontiers to pursue their causes
of their main objective is to publicize their cause to
the widest audience possible. The existence of a Common Terrorist Tactics
highly-efficient media network, therefore, is a factor in
any terrorist scenario that must not be 1. bombing – the increase in bombing activity and
underestimated. Today’s technology gives terrorists the sophistication of devices used have caused
the opportunity to gain worldwide attention on the NATO EOD Standardization Committee to
primetime television on the same day as the event. classify all terrorist bombs as Improvised
This gives them banner headlines in the world press Explosive Devices (IED)
immediately. There is seldom a day when some type 2. hoaxes – IED’s (improvised explosive devices)
of terrorist event does not appear in the media around are often used to establish terrorist’s credibility.
the world. And this is what they like. Once their credibility is established, they continue
2. Communications to disrupt, though not to destroy, by using well-
made hoax bombs
Technological advances in communications have
enhanced terrorist capabilities by leaps and bounds. 3. arson – although not a popular tactic but has been
This helped them operate in many parts of the world used to destroy or disrupt targets like public
with quickness, efficiency, and relative ease. This utilities, political headquarters, and commonly,
single factor has contributed to the growth of economic and industrial targets
transnational and international terrorism in the last 4. hijacking – the commandeering of a plain or
decade and has removed the terrorists from the realm aircraft by the terrorists ; hijacked “legitimate “
of parochial “freedom fighters”. vehicles give terrorists a better means to
3. Military capability for super-violence approach government facilities
5. ambush – it is often forgotten that the terrorists
The abilities of terrorists are now greatly has time on their side and will spend weeks, if not
enhanced with the advent of military combat months, preparing for an operation
technologies such as missiles, laser devices, and
chemical, biological, and nuclear weapons. In the 6. kidnapping – this tactic is acted out with extreme
wrong hands, these could prove to be devastating. precision and with definite goals in mind by two
15
separate, dedicated terrorist groups, the Abu pursuit of political objectives, often as part of their
Sayyaf and the MILF. foreign policy.
7. assassination – perhaps the oldest tactics in the Several sources have further defined the typology of
book and is still widely used. Targets are often terrorism:
predictable and assassinations are claimed later
1. Political terrorism - the unlawful use of force or
by the terrorists themselves
violence against persons or property in order to
8. hostage taking – normally carried out in order to coerce or intimidate a government or the civilian
demand political concessions population in furtherance of political or social
objectives.
Types of Terrorism
2. Criminal terrorism – technically there is no
In early 1975, the Law Enforcement Assistant definition for criminal terrorism, except that
Administration in the United States formed the terrorism itself is an international crime.
National Advisory Committee on Criminal Justice
3. Pathological terrorism - describes the use of
Standards and Goals. One of the five volumes that
terrorism by individuals who utilize such strategies
the committee wrote was entitled Disorders and
for the sheer joy of terrorizing others. Pathological
Terrorism, produced by the Task Force on Disorders
terrorists often operate alone rather in groups like
and Terrorism under the direction of H.H.A. Cooper,
the others on this list and often are not true
Director of the Task Force staff. The Task Force
‘terrorists’ as they lack any well-defined political
classified terrorism into six categories.
motive.
▪ Civil disorder – A form of collective violence
interfering with the peace, security, and normal
functioning of the community. COUNTER TERRORISM
▪ Political terrorism – Violent criminal behavior Counter – terrorism is the practices, tactics,
designed primarily to generate fear in the techniques, and strategies that
community, or substantial segment of it, for governments, militaries, police departments and
political purposes. corporations adopt to prevent or in response to
terrorist threats and/or acts, both real and imputed.
▪ Non-Political terrorism – Terrorism that is not
aimed at political purposes but which exhibits If the terrorism is part of a broader insurgency,
“conscious design to create and maintain a high counter-terrorism may also form a part of a counter-
degree of fear for coercive purposes, but the end insurgency doctrine, but political, economic, and other
is individual or collective gain rather than the measures may focus more on the insurgency than the
achievement of a political objective.” specific acts of terror. Counter-terrorism includes both
the detection of potential acts and the response to
▪ Quasi-terrorism – The activities incidental to the
related events.
commission of crimes of violence that are similar
in form and method to genuine terrorism but The US military definition, compatible with the
which nevertheless lack its essential ingredient. It definitions used by NATO and many other militaries,
is not the main purpose of the quasi-terrorists to is "operations that include the offensive measures
induce terror in the immediate victim as in the taken to prevent, deter, preempt, and respond to
case of genuine terrorism, but the quasi-terrorist terrorism." In other words, counter-terrorism is a set
uses the modalities and techniques of the genuine of techniques for denying an opponent the use of
terrorist and produces similar consequences and terrorism-based tactics.
reaction.[71] For example, the fleeing felon who
takes hostages is a quasi-terrorist, whose Foreign Internal Defense (FID) – is a term used by
methods are similar to those of the genuine several countries for programs either to suppress
terrorist but whose purposes are quite different. insurgency, or reduce the conditions under which
insurgency could develop.
▪ Limited political terrorism – Genuine political
terrorism is characterized by
Anti-terrorism v. Counter Terrorism
a revolutionary approach; limited political
terrorism refers to “acts of terrorism which are The concept of anti-terrorism emerges from a
committed for ideological or political motives but thorough examining of the concept of terrorism as
which are not part of a concerted campaign to well as an attempt to understand and articulate what
capture control of the state. constitutes terrorism in Western terms. In military
contexts, terrorism is a tactic, not an ideology.
▪ Official or State terrorism –"referring to nations
Terrorism may be a tactic in a war between nation-
whose rule is based
states, in a civil war, or in an insurgency.
upon fear and oppression that reach similar to
terrorism or such proportions.” It may also be Counter-terrorism refers to offensive strategies
referred to as Structural Terrorism defined broadly intended to prevent a belligerent individual or group
as terrorist acts carried out by governments in from successfully using the tactic of terrorism.
16
Anti-terrorism is defensive, intended to reduce the
chance of an attack using terrorist tactics at specific
points, or to reduce the vulnerability of possible
targets to such tactics. "Defensive measures used to
reduce the vulnerability of individuals and property to
terrorist acts, to include limited response and
containment by local military and civilian forces."
17