Download - Understanding hs ch 07

Transcript
Page 1: Understanding hs ch 07

Part IIThreats and VulnerabilitiesThreats and Vulnerabilities

Chapter 7

Sea ChangeSea ChangeThe New Terrorism and Homeland The New Terrorism and Homeland

SecuritySecurityMartin, Understanding Homeland Security

© 2015 SAGE Publications, Inc.

Page 2: Understanding hs ch 07

The Pre-September 11 Terrorist EnvironmentThe Pre-September 11 Terrorist Environment Proxy War: The Cold War and the “Old Proxy War: The Cold War and the “Old

Terrorism”Terrorism”

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 3: Understanding hs ch 07

The Pre-September 11 Terrorist EnvironmentThe Pre-September 11 Terrorist Environment

The Left-Wing Terrorist EnvironmentThe Left-Wing Terrorist Environment The Ethnonationalist Terrorist EnvironmentThe Ethnonationalist Terrorist Environment Case in Point: The Palestinian Nationalist Terrorist Case in Point: The Palestinian Nationalist Terrorist

EnvironmentEnvironment The Religious Terrorist Environment and the Dawn The Religious Terrorist Environment and the Dawn

of the New Terrorismof the New Terrorism

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 4: Understanding hs ch 07

Proxy War: The Cold War and the “Old Proxy War: The Cold War and the “Old Terrorism”Terrorism”

Rivalry Between East and WestRivalry Between East and West Wars of National LiberationWars of National Liberation Nationalism and MarxismNationalism and Marxism

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 5: Understanding hs ch 07

Religion and Terrorism in the Modern EraReligion and Terrorism in the Modern Era Case in Point: The New Terrorism and Case in Point: The New Terrorism and

GlobalizationGlobalization

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 6: Understanding hs ch 07

Religion and Terrorism in the Modern EraReligion and Terrorism in the Modern Era

Common Principles of Religious ExtremistsCommon Principles of Religious Extremists A Central Feature of the New TerrorismA Central Feature of the New Terrorism Al Qaeda and Islamist AlliesAl Qaeda and Islamist Allies

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 7: Understanding hs ch 07

Case in Point: The New Terrorism and Case in Point: The New Terrorism and GlobalizationGlobalization

Effect of Political and Economic IntegrationEffect of Political and Economic Integration Opportunities for Terrorist Maximum ImpactOpportunities for Terrorist Maximum Impact Effect of New Information TechnologiesEffect of New Information Technologies

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 8: Understanding hs ch 07

Weapons of Mass Destruction and the Weapons of Mass Destruction and the Objectives of the New TerrorismObjectives of the New Terrorism

Netwar: A New Organizational TheoryNetwar: A New Organizational Theory Case in Point; Asymmetrical WarfareCase in Point; Asymmetrical Warfare

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 9: Understanding hs ch 07

Weapons of Mass Destruction and the Weapons of Mass Destruction and the Objectives of the New TerrorismObjectives of the New Terrorism

Attracting AttentionAttracting Attention Pleasing GodPleasing God Damaging EconomiesDamaging Economies Influencing EnemiesInfluencing Enemies

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 10: Understanding hs ch 07

Netwar: A New Organizational TheoryNetwar: A New Organizational Theory

Semiautonomous CellsSemiautonomous Cells Chain NetworksChain Networks Star, Hub, or Wheel NetworksStar, Hub, or Wheel Networks All-Channel NetworksAll-Channel Networks

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 11: Understanding hs ch 07

Case in Point: Asymmetrical WarfareCase in Point: Asymmetrical Warfare

Unconventional, Unexpected, and Unconventional, Unexpected, and UnpredictableUnpredictable

Redefine International Security EnvironmentRedefine International Security Environment Overcome Traditional ProtectionsOvercome Traditional Protections

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 12: Understanding hs ch 07

Countering ExtremismCountering Extremism Countering the New TerrorismCountering the New Terrorism

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 13: Understanding hs ch 07

Countering ExtremismCountering Extremism

Long-Term SolutionsLong-Term Solutions Operations Other than WarOperations Other than War Limitations of Coercion Limitations of Coercion

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.

Page 14: Understanding hs ch 07

Countering the New TerrorismCountering the New Terrorism

Homeland Security MeasuresHomeland Security Measures Covert “Shadow Wars”Covert “Shadow Wars” Counterterrorist Financial OperationsCounterterrorist Financial Operations Global Surveillance of Communications Global Surveillance of Communications

TechnologiesTechnologies Identifying and Disrupting Transnational Terrorist Identifying and Disrupting Transnational Terrorist

Cells and Support NetworksCells and Support Networks

Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.