Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Bombings As a consequence of globalisation, the relative ease of access to the chemicals used to make explosives has made improvised

explosive devices increasingly prominent. This has the dual effect of increasing the available firepower of terrorists who are generally far weaker than their targets as well as assuring the publicity necessary to attract sympathisers to their cause. These may be implanted in automobiles to make a car bomb, planted on the roadside to detonate near target vehicles, or even strapped to the bodies of individuals for suicide attacks. From a tactical perspective, each of these methods have positives and drawback, for instance car bombs act as their own delivery mechanisms and can carry a relatively large amount of explosives with weights of up to 1000 pounds (450 kg),[3] while a suicide vest has a much smaller payload but may allow the wearer access to spaces and individuals that vehicles cannot. Suicide attacks The number of attacks using suicide tactics has grown from an average of fewer than five per year during the 1980s to 180 per year between 2000 and 2005, [4] and from 81 suicide attacks in 2001 to 460 in 2005. [5] These attacks have been aimed at diverse military and civilian targets, including in Sri Lanka, in Israel since July 6, 1989,[6] in Iraq since the US-led invasion of that country in 2003, and in Pakistan and Afghanistan since 2005. Rocket and Mortar attacks The use of rocket and morter attacks had been widely used from 19822012, in the example of the middle east rocket attacks against cities and settlements had been carried out by political entities such as Hizballa and Hamas (not counted as state terroism) and to non political organization such as Islamic Jihad, Islamic Jihad Movement in Palestine, al-Qaeda and many others. the attacks very from lunching mortar (qassam) shells and rockets up to using a ballistic missiles by Hezbollah. The number of attacks using explosive projectiles has grown after decrease in suicide attacks as can be seen in Palestinian rocket attacks on Israel,[9] according to the reports somewhere between 800000 people [10] to million and a half [11] are being in direct danger of mortar and missile range. In a research published in 2011 15,000 people had been treated or need treatment for PTSD [12] and 1,000 people are beaning treated in psychometric facilities due to reasons directly to morter (qassam) and rocket attacks (Grad).[13][14][15] Vehicle based attacks In the 2000s, there have been a number of vehicle based attacks in which terrorists used earthmovers or other motor vehicles to run over pedestrians or to attack vehicles.[16] Some examples of such attacks include the 2006 Jerusalem bulldozer attack and the Omeed Aziz Popal SUV rampage. Compared to suicide-bomb attacks, using vehicles as weapons is easier to plan and carry out without detection. The tactic does not require acquiring explosives. The weapon, a standard street-legal vehicle, is readily available in the target country and can be used without raising suspicion. According to a report by Stratfor global intelligence, using a vehicle as a terrorist tactic is nearly as effective, yet not as destructive as a suicide bombing.[16] Aircraft attacks and hijackings In the failed 2002 airliner attack, shoulder-launched surface-to-air missiles were fired at an airliner while taking off. Aircraft hijacking is also employed as a terrorist tactic. On September 11, 2001, 19 al-Qaeda terrorists hijacked American Airlines Flight 11, United Airlines Flight 175, American Airlines Flight 77, and United Airlines Flight 93 and crashed them into the Twin Towers of the World Trade Center, the southwestern side of the Pentagon building, and Stonycreek Township near Shanksville, Pennsylvania in a terrorist attack.

Chemical and biological weaponsAum Shinrikyo, a Japanese "new religious movement" in 1995 carried out the Sarin gas attack on the Tokyo subway. Ian Davison, a British white supremacist, and neo-Nazi who was arrested in 2009 for planning terrorist attacks involving ricin poison. In 2011 the United States government discovered information that terrorist groups were attempting to obtain large amounts of castor beans for weaponized ricin use.[17] Nuclear weaponsConcerns have also been raised regarding attacks involving nuclear weapons. It is considered plausible that terrorists could acquire a nuclear weapon.[18] In 2011, the British news agency, the Telegraph, received leaked documents regarding the Guantanamo Bay interrogations of Khalid Sheikh Mohammed. The documents cited Khalid saying that, if Osama Bin Laden is captured or killed by the Coalition of the Willing, an Al-Qaeda sleeper cell will detonate a "weapon of mass destruction" in a "secret location" in Europe, and promised it would be "a nuclear hellstorm".[19][20] [21][22][23] Conventional firearmsDespite the popular image of terrorism as bombings alone, and the large number of casualties and higher media impact associated with bombings, conventional firearms are as much if not more pervasive in their use.[24] For example, in the second part of the 2011 Norway attacks 68 people were killed by a man with two guns. Also, the 2008 Mumbai terrorist attacks were partly by guns and partly by bombs.In 2004, the European Council recognized the "need to ensure terrorist organisations and groups are starved of the components of their trade," including the need to ensure greater security of firearms, explosives, bomb-making equipment and technologies that contribute to the perpetration of terrorist outrages." [25] Secondary attacksTerrorist groups may arrange for secondary devices to detonate at a slightly later time in order to kill emergency-response personnel attempting to attend to the dead and wounded. Repeated or suspected use of secondary devices can also delay emergency response out of concern that such devices may exist. Examples include a (failed) device that was meant to release cyanide-gas during the February 26, 1993 World Trade Center bombing; and a second car bomb that detonated 20 minutes after the December 1, 2001 Ben Yehuda Street Bombing by Hamas in Jerusalem. TrainingThere are and have been training camps for terrorists. The range of training depends greatly on the level of support the terrorist organization receives from various organizations and states. In nearly every case the training incorporates the philosophy and agenda of the groups leadership as justification for the training as well as the potential acts of terrorism which may be committed. State sanctioned training is by far the most extensive and thorough, often employing professional soldiers and covert operatives of the supporting state.[citation needed] CoverWhere terrorism occurs in the context of open warfare or insurgency, its perpetrators may shelter behind a section of the local population. Examples include the intifada on Israeli-occupied territory, and insurgency in Iraq. This population, which may be ethnically distinct from the counter-terrorist forces, is either sympathetic to their cause, indifferent, or acts under duress. FundingFunding can be raised in both legal and illegal ways. Some of the most common ways to raise funds are through front groups, charitable organizations, or NGOs with similar ideologies. In the absence of state funding, terrorists may rely on organized crime to fund their activities. This has included kidnapping, drug trafficking, or robbery. CommunicationEven though older communication methods like radio are still used, the revolution in communication technology over the past 1015 years has dramatically changed how terrorist organizations communicate. E-mails, fax transmissions, websites, cell phones, and satellite telephones have made it possible for organizations to contemplate a global strategy. However, too great a reliance on this new technology leaves organizations vulnerable to sophisticated monitoring of communication and triangulation of its source. When Osama bin Laden found out that his satellite phone conversations were being intercepted, he ceased using this method to communicate.[26]

You might also like