Chapter 15: What Chapter 15: What Next?Next?
The Future of TerrorismThe Future of TerrorismMartin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Four Theoretical “Waves” of Terrorist ViolenceFour Theoretical “Waves” of Terrorist Violence
Anarchist: 1880s to the end of World War I.Anarchist: 1880s to the end of World War I. Anti-colonial: End of World War I until the late Anti-colonial: End of World War I until the late
1960s.1960s. New Left wave: 1960s to the near present.New Left wave: 1960s to the near present. Religious: About 1980 to the present.Religious: About 1980 to the present.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Terrorist Environments in the 21Terrorist Environments in the 21stst Century Century
State-sponsored terrorism.State-sponsored terrorism. Dissident terrorism.Dissident terrorism. Religious terrorism.Religious terrorism. Ideological terrorism.Ideological terrorism. Criminal dissident terrorism.Criminal dissident terrorism.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Terrorist Environments in the 21Terrorist Environments in the 21stst Century Century Future Sources of TerrorismFuture Sources of Terrorism
The Middle east.The Middle east. Palestine and Israel.Palestine and Israel. Latin America.Latin America. Europe.Europe. Africa.Africa. Asia.Asia.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
High-Tech TerrorismHigh-Tech Terrorism
Information technologies and Cyberterrorism.Information technologies and Cyberterrorism. Weapons of mass destruction.Weapons of mass destruction. Case: Exotic technologies.Case: Exotic technologies.
Soft Targets and Terrorist SymbolismSoft Targets and Terrorist Symbolism
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Government ResponsesGovernment Responses
Societal ResponsesSocietal Responses
Countering ExtremismCountering Extremism
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
New Fronts in a New WarNew Fronts in a New War
Covert shadow wars.Covert shadow wars. Domestic “Homeland” security measures.Domestic “Homeland” security measures. Counterterrorist financial operations.Counterterrorist financial operations. Global surveillance of communications Global surveillance of communications
technologies.technologies. Identifying and disrupting transnational Identifying and disrupting transnational
terrorist cells and support networks.terrorist cells and support networks.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Continued Utility of ForceContinued Utility of Force
Elimination of terrorist threats.Elimination of terrorist threats. General deterrence.General deterrence. Specific deterrence.Specific deterrence. Demonstrations of national will.Demonstrations of national will.
Countering Terrorist Financial OperationsCountering Terrorist Financial Operations
Finding hidden fortunes.Finding hidden fortunes. Case: Hawala.Case: Hawala.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
The Case for International CooperationThe Case for International Cooperation
Intelligence and law enforcement.Intelligence and law enforcement.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Top Related