Download - Understanding terror 5e ch 15

Transcript

Chapter 15: What Chapter 15: What Next?Next?

The Future of TerrorismThe Future of TerrorismMartin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Four Theoretical “Waves” of Terrorist ViolenceFour Theoretical “Waves” of Terrorist Violence

Anarchist: 1880s to the end of World War I.Anarchist: 1880s to the end of World War I. Anti-colonial: End of World War I until the late Anti-colonial: End of World War I until the late

1960s.1960s. New Left wave: 1960s to the near present.New Left wave: 1960s to the near present. Religious: About 1980 to the present.Religious: About 1980 to the present.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Terrorist Environments in the 21Terrorist Environments in the 21stst Century Century

State-sponsored terrorism.State-sponsored terrorism. Dissident terrorism.Dissident terrorism. Religious terrorism.Religious terrorism. Ideological terrorism.Ideological terrorism. Criminal dissident terrorism.Criminal dissident terrorism.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Terrorist Environments in the 21Terrorist Environments in the 21stst Century Century Future Sources of TerrorismFuture Sources of Terrorism

The Middle east.The Middle east. Palestine and Israel.Palestine and Israel. Latin America.Latin America. Europe.Europe. Africa.Africa. Asia.Asia.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

High-Tech TerrorismHigh-Tech Terrorism

Information technologies and Cyberterrorism.Information technologies and Cyberterrorism. Weapons of mass destruction.Weapons of mass destruction. Case: Exotic technologies.Case: Exotic technologies.

Soft Targets and Terrorist SymbolismSoft Targets and Terrorist Symbolism

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Government ResponsesGovernment Responses

Societal ResponsesSocietal Responses

Countering ExtremismCountering Extremism

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

New Fronts in a New WarNew Fronts in a New War

Covert shadow wars.Covert shadow wars. Domestic “Homeland” security measures.Domestic “Homeland” security measures. Counterterrorist financial operations.Counterterrorist financial operations. Global surveillance of communications Global surveillance of communications

technologies.technologies. Identifying and disrupting transnational Identifying and disrupting transnational

terrorist cells and support networks.terrorist cells and support networks.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

Continued Utility of ForceContinued Utility of Force

Elimination of terrorist threats.Elimination of terrorist threats. General deterrence.General deterrence. Specific deterrence.Specific deterrence. Demonstrations of national will.Demonstrations of national will.

Countering Terrorist Financial OperationsCountering Terrorist Financial Operations

Finding hidden fortunes.Finding hidden fortunes. Case: Hawala.Case: Hawala.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

The Case for International CooperationThe Case for International Cooperation

Intelligence and law enforcement.Intelligence and law enforcement.

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016

The Future of International TerrorismThe Future of International Terrorism

The Future of the Violent LeftThe Future of the Violent Left

The Future of the Violent RightThe Future of the Violent Right

Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016