Chapter 5: Force Multipliers, Gender Roles, and Tactics
Chapter 5: Force Multipliers, Gender Roles, and Tactics
Chapter Introduction
- Learning Objectives: After reading this chapter, you should be able to:
- Summarize the tactics of modern terrorism.
- Describe the types of threats posed by technological terrorism.
- Summarize transnational economic targeting in the tourist, energy, and transportation industries.
- Summarize theories of suicide bombing.
- Describe the roles women play in terrorism.
5-1 Tactics and Force Multipliers
Learning Objective 1: Summarize the tactics of modern terrorism.
Definition of Terrorism:
- Terrorism is a way of fighting, characterized as guerrilla warfare dominating historical warfare, with conventional war not being the normative method of fighting.
Tactics of Terrorism (per Brian Jenkins):
- Bombing
- Hijacking
- Arson
- Assault
- Kidnapping
- Hostage-taking
Technological Threats:
- Recent advancements have allowed for virtual attacks via computer systems, thereby modifying traditional tactics with enhanced strike capability.
Force Multipliers Defined:
- A method to increase striking power without increasing combat troops. Four primary force multipliers in terrorism include:
- Technology to enhance attacks.
- Transnational support.
- Media coverage.
- Religious fanaticism.
Examples of Force Multipliers:
- Cyberterrorism: Involves attacks on technological infrastructures, potentially leading to significant collateral damage.
- Media Coverage: Distorted media narratives can enhance the perceived power of terrorist groups.
- Religious Fanaticism: Used to justify suicide attacks, enhancing the arsenal of terrorist methods.
Historical Context of Bombing:
- The use of bombs as the primary tool of terror was emphasized as early as 1848 by anarchists, marking a philosophical shift in communications with social orders through violence.
5-2 Technology
Learning Objective 2: Describe the types of threats posed by technological terrorism.
- Influence of Technology:
- Technology can transform weapon use into strategy.
5-2a Cyberterrorism
- Definition of Cyberterrorism:
- The use of computers for attacks against networks or the physical world.
- Threat Potential:
- Catastrophic economic failures through digital attacks.
- Definitions include:
- National Conference of State Legislatures: Use of IT by terrorists for political agendas.
- Barry Collin: Convergence of the physical with the virtual through technology.
- Council on Foreign Relations: Utilization of information networks by terrorists.
- Cyberterrorism Characteristics:
- Political/motivated actions aimed at instilling fear.
- Covert communications facilitated by computers.
- Low-risk, high-impact strategy contested by modern networks.
5-2b WMD: Biological Agents
- Biological Weapons:
- Include two forms:
- Bacterial weapons.
- Viral weapons.
- Types of biological agents:
- Natural poisons.
- Viruses.
- Bacteria.
- Plagues.
- Significant Case Studies:
- Historical instances of biological terrorism (e.g., 1984 Oregon incident with salad bars, and anthrax attacks post-9/11).
5-2c WMD: Chemical and Radiological Weapons
- Chemical Weapons:
- Types:
- Nerve agents.
- Blood agents.
- Choking agents.
- Blistering agents.
- Radiological Devices:
- Potential for long-term contamination, vulnerabilities in transport channels.
5-3 Economic Targeting and Transnational Attacks
Learning Objective 3: Summarize transnational economic targeting.
- Target Sectors: Tourism, Energy, and Transportation
- Tourism:
- Example: 2002 Bali bombings to disrupt tourism.
- Energy:
- Economic attacks via oil production targeting (notably in Iraq).
- Transportation:
- High-profile threats with significant economic implications.
5-4 Suicide Attacks: Conflicting Opinions
Learning Objective 4: Summarize theories of suicide bombing.
- Types of Suicide Attacks:
- Historical perspective tracks three major types.
- Suicide bombers generally believe they are serving a higher cause.
- Statistics:
- Noteworthy decline in global suicide attacks post-2015, attributed to counterterrorism efforts.
5-5 Tactical Misunderstandings and Gender
Learning Objective 5: Describe the roles women play in terrorism.
- Cultural Stereotypes:
- Perception that women are non-combatants in terrorism.
- Gendered Participation:
- Tactical roles differ based across organizational ideology.
- Women have taken significant roles in revolutionary movements.
5-5a Tactical Roles and Organization
- Influence of Ideology on Women’s Roles:
- Women more frequently gain combat roles in domestic terrorist organizations.
5-6 Tactical Considerations
- How Mission Affects Recruitment:
- Groups targeting different ends (e.g., revolutionary vs. religious) employ varying tactics.
- Tactical Effectiveness of Gender:
- The strategic use of women as suicide bombers underscores tactical oversights in national security.
Chapter Review
Emphasizing the Points
- Terrorism employs straightforward tactics but in innovative applications, leading to complex implications on national security.
- Key Takeaways:
- The impact of technology, media, and religion on terrorism leads to force multipliers, enhancing the danger posed by terrorists.
- Understanding the dynamics of gender roles is crucial to an effective counterterror strategy.