StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terrorist Techniques - Essay Example

Cite this document
Summary
In the paper “Terrorist Techniques” the author focuses on the recurrent use or threatened use of politically-motivated and clandestinely organized violence to affect a psychological target to make them behave in a way that the terrorist desires…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Terrorist Techniques
Read Text Preview

Extract of sample "Terrorist Techniques"

Terrorist groups use attrition against a state in an attempt to destroy their resources, leaving the government weak and ineffective. Specifically, this motive is aimed at liberating territory from the control of the state or acquiring a particular position within the society either politically or geographically (Kydd & Walter, 2006). In particular, attrition is a war based on longevity, and the team with the most resources to assume the costs of attacks wins. The conflict between Sri Lanka and the terror group Liberation Tigers of Tamil Eelam (LTTE) utilized this strategy.

Specifically, throughout the year 2000, the LTTE employed the attrition war model to suppress and weaken the government with a series of attacks on the government, the public, and the military (Kydd & Walter, 2006). However, the application of this strategy by the Tamil Tigers was due to the financial disability that curtails them from direct involvement in the war with the government. In their attacks, the terrorists aim at persuading the enemy that it has the financial strength to inflict high-cost tests in order to achieve its desires.

As argued by Robert Pape, terrorists use bombing as an attrition strategy due to their financial constraints.Terrorist group's success lies in their ability to influence the behavior of their target group. Specifically, the success of their actions is embedded in threat elimination by attacking the government and any other relevant authority or individual whose influence will aid in the realization of their objectives (Kydd & Walter, 2006). Risk avoidance is a form of intimidation that suppresses the target group.

According to Drake (1998), the psychological fear or threat created by a terror group helps in the achievement of its political goals. Threat elimination uses violence and costly attacks to deter and prevent some undesirable behavior from the government (Kydd & Walter, 2006). Specifically, this acts as a signal that the terrorist group is willing and capable of eliminating any person or group that interferes with their operation. For example, the explosion outside the American Consulate in Karachi and the bombing of 202 Australian citizens are signals to warn the respective governments not to interfere with the terror group activities.

Therefore, the use of threat elimination as an objective under the intimidation strategy focuses on an established government (Kydd & Walter, 2006). Specifically, the terrorist group uses threats such as car bombing, suicide bombers in public places, and other cheap methods of attack to limit the government’s intervention.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Terrorist Techniques Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Terrorist Techniques Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/sociology/1680668-terrorist-techniques-strategy
(Terrorist Techniques Essay Example | Topics and Well Written Essays - 500 Words)
Terrorist Techniques Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/sociology/1680668-terrorist-techniques-strategy.
“Terrorist Techniques Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/sociology/1680668-terrorist-techniques-strategy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorist Techniques

Anti-terrorist Laws

Human rights obligations also have to be discussed and some of them were sometimes ignored in making anti terrorist laws. The question of practising a religion being precedence to the right to equality is a serious point for discussion.... In a democratic society how can one offer restrictions on others self on the name of religion and terrorist activities How can a conflict between 'human right' and 'terrorist combat' can be resolved.... So when he resort to terrorist activities affecting the freedom and lives of majority of people, do he deserve freedom Can we support the theory of curtailing freedom of few persons (terrorists or suspects) for the sake of freedom of rest of people The degree, to which the law should limit freedom, will be a matter of contention when the interests of equality and fair dealing were discussed....
5 Pages (1250 words) Essay

Cyber Terrorisum Past Present and Future

However, among all the definitions given, there is no universally accepted definition of cyber terrorism.... Cyber terrorism results from the act of violence when technology is used in order to generate fear among the civilians,… The political and social agenda is the main objective of cyber terrorists....
10 Pages (2500 words) Research Paper

Critical Evaluation of Our Times

May 2, 2011, Sunday, I woke up to the news that Osama bin Laden, a terrorist, who was on top of the list of the most wanted men in the world, had been killed.... In clear terms, the terrorist groups of the 20th century with a one united national goal started forming in...
6 Pages (1500 words) Essay

Problems with Tracking Terrorists Financing

Moreover, terrorists have adopted new techniques of helping them carry out their activities without getting suspected.... The world of terrorism has been gradually, yet steadily evolving and its intensity have been felt more tremendously in the current times.... Unlike during the past… re it was much easier to track and apprehend and if possible stop an act of terrorism, the change in times has completely left nations and people at a much greater threat of becoming victims of such acts....
10 Pages (2500 words) Research Paper

The Opium Poppy

ost of the countries that produce narcotics have political insurgents, who quite often use Terrorist Techniques and have become involved indirectly or directly with the production and trafficking of narcotics (Davids, 2002).... Such groups can include those groups, which finance their terrorist actions through profits they acquire from the narcotics trade; groups that actively engage themselves in narcotics trafficking and use terrorist activities to sustain or enhance their positions; and groups that the narcotics traffickers organize randomly to resort to terrorist activities and violence to enhance and protect their criminal enterprise....
9 Pages (2250 words) Term Paper

The Fight against Terrorism

It will also illustrate and examine the different alternative techniques by establishing the challenges each technique faces.... It will also give examples of real situations around the world how these techniques are being used.... For instance, in the United States of America, many people enlisted to join the United States of America armed forces as a result of the infamous September 11th attack on the United States of America by a terrorist in 2001....
8 Pages (2000 words) Term Paper

Islamic State: Threats, Essence, Counteraction

In this regard, the thing to struggle with is the threat of terrorist groups which, as the live shows, can develop in powerful enough structures and torture not only certain individuals but also countries and entire regions.... rdquo; There are debates regarding what to consider the date of the group origin, but there is evidence that the origins of the Islamic State trace back to the year 2002 when Abu Musab al-Zarqawi created a terrorist group Tawhid wa al-Jihad....
5 Pages (1250 words) Term Paper

Counter-Terrorism Propaganda on Social Media

Counter-terrorism is the military or political activities developed to thwart or prevent terrorist activities.... The aim of the terrorist is to pass the propaganda to the target population at the shortest time possible thus preference of the social media (Gates & Podder).... ISIS and Al-Qaeda are some of the terrorist group that extensively uses social media.... As a result, the terrorist group portrays as a captivating and powerful entity thus attracting some of the youths (Lia)....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us