What Next? The Future of Terrorism Four Theoretical “Waves” of Terrorist Violence Anarchist:...
-
Upload
jodie-maxwell -
Category
Documents
-
view
215 -
download
0
Transcript of What Next? The Future of Terrorism Four Theoretical “Waves” of Terrorist Violence Anarchist:...
What Next?What Next?The Future of TerrorismThe Future of Terrorism
Four Theoretical “Waves” of Terrorist ViolenceFour Theoretical “Waves” of Terrorist Violence
Anarchist: 1880s to the end of World War I.Anarchist: 1880s to the end of World War I. Anti-colonial: End of World War I until the late Anti-colonial: End of World War I until the late
1960s.1960s. New Left wave: 1960s to the near present.New Left wave: 1960s to the near present. Religious: About 1980 to the present.Religious: About 1980 to the present.
2121stst Century Terrorist Environments Century Terrorist Environments
State-sponsored terrorism.State-sponsored terrorism. Dissident terrorism.Dissident terrorism. Religious terrorism.Religious terrorism. Ideological terrorism.Ideological terrorism. Criminal dissident terrorism.Criminal dissident terrorism.
Future Sources of TerrorismFuture Sources of Terrorism
The Middle east.The Middle east. Palestine and Israel.Palestine and Israel. Latin America.Latin America. Europe.Europe. Africa.Africa. Asia.Asia.
High-Tech TerrorismHigh-Tech Terrorism
Information technologies and Cyberterrorism.Information technologies and Cyberterrorism. Weapons of mass destruction.Weapons of mass destruction. Case: Exotic technologies.Case: Exotic technologies.
Soft Targets and Terrorist SymbolismSoft Targets and Terrorist Symbolism
Government ResponsesGovernment Responses
Societal ResponsesSocietal Responses
Countering ExtremismCountering Extremism
New Fronts in a New WarNew Fronts in a New War
Covert shadow wars.Covert shadow wars. Domestic “Homeland” security measures.Domestic “Homeland” security measures. Counterterrorist financial operations.Counterterrorist financial operations. Global surveillance of communications Global surveillance of communications
technologies.technologies. Identifying and disrupting transnational Identifying and disrupting transnational
terrorist cells and support networks.terrorist cells and support networks.
Continued Utility of ForceContinued Utility of Force
Elimination of terrorist threats.Elimination of terrorist threats. General deterrence.General deterrence. Specific deterrence.Specific deterrence. Demonstrations of national will.Demonstrations of national will.
Countering Terrorist Financial OperationsCountering Terrorist Financial Operations
Finding hidden fortunes.Finding hidden fortunes. Case: Hawala.Case: Hawala.
Counterterrorist Surveillance Counterterrorist Surveillance TechnologiesTechnologies
Case: Carnivore (DCS-1000).Case: Carnivore (DCS-1000). Case: EchelonCase: Echelon
The Case for International CooperationThe Case for International Cooperation
Intelligence and law enforcement.Intelligence and law enforcement.
The Future of International TerrorismThe Future of International Terrorism
The Future of the Violent LeftThe Future of the Violent Left
The Future of the Violent RightThe Future of the Violent Right