Terror tactic
   HOME

TheInfoList



OR:

The tactics of terrorism are diverse. As important as the actual attacks is the cultivation in the target population of the fear of such attacks, so that the threat of violence becomes as effective as actual violence. While advancements in technology, modernization, and
globalization Globalization, or globalisation (English in the Commonwealth of Nations, Commonwealth English; American and British English spelling differences#-ise, -ize (-isation, -ization), see spelling differences), is the process of foreign relation ...
have helped many states prosper over the course of history, they have also opened
terrorist groups A number of national governments and two international organizations have created lists of organizations that they designate as terrorist. The following list of designated terrorist groups lists groups designated as terrorist by current and fo ...
to new tactics and weaponry. The different tactics that terrorist groups utilize can be very simple to extremely complex. Terrorist tactics tend to favor attacks that avoid effective countermeasures and exploit vulnerabilities. As such, terrorist groups have the potential to utilize many different types of terrorism tactics depending on the circumstances and the perceived likelihood of success. Some tactics are more conventional and widely used in the operations of many terrorist groups. These tactics include shootings, hijackings, kidnappings, bombings, and
suicide attacks A suicide attack is any violent attack, usually entailing the attacker detonating an explosive, where the attacker has accepted their own death as a direct result of the attacking method used. Suicide attacks have occurred throughout histor ...
. Other tactics are seen more unconventional and have only been used in a few instances, if at all. However, these unconventional tactics are perceived by government officials and experts alike as serious potential threats. Some types of unconventional terrorism tactics commonly recognized by terrorism experts are
bioterrorism Bioterrorism is terrorism involving the intentional release or dissemination of biological agents. These agents are bacteria, viruses, insects, fungi, and/or toxins, and may be in a naturally occurring or a human-modified form, in much the same ...
, agroterrorism, nuclear terrorism, and
cyberterrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, la ...
.


Bombings

As a consequence of globalisation, the relative ease of access to the chemicals used to make explosives has made
improvised explosive device An improvised explosive device (IED) is a bomb constructed and deployed in ways other than in conventional military action. It may be constructed of conventional military explosives, such as an artillery shell, attached to a detonating mecha ...
s (IEDs) increasingly prominent. This has the dual effect of increasing the available firepower of terrorists who are generally far weaker than their targets as well as assuring the publicity necessary to attract sympathisers to their cause. These may be implanted in automobiles to make a car bomb, planted on the roadside to detonate near target vehicles, or even strapped to the bodies of individuals for
suicide attacks A suicide attack is any violent attack, usually entailing the attacker detonating an explosive, where the attacker has accepted their own death as a direct result of the attacking method used. Suicide attacks have occurred throughout histor ...
. From a tactical perspective, each of these methods have positives and drawback, for instance car bombs act as their own delivery mechanisms and can carry a relatively large amount of explosives with weights of up to and over 1000 pounds (450 kg), while a
suicide vest Suicide is the act of intentionally causing one's own death. Mental disorders (including depression, bipolar disorder, schizophrenia, personality disorders, anxiety disorders), physical disorders (such as chronic fatigue syndrome), and subs ...
has a much smaller payload but may allow the wearer access to spaces and individuals that vehicles cannot.


Suicide attacks

Suicide terrorism is the most aggressive form of terrorism, pursuing coercion even at the expense of losing support among terrorists' own community. What distinguishes a suicide terrorist is that the attacker does not expect to survive a mission and often employs a method of attack that requires the attacker's death in order to succeed (such as planting a car bomb, wearing a suicide vest, or ramming an airplane into a building). In essence, a suicide terrorist kills others at the same time that he kills himself. Usually these tactics are used for a demonstrative purposes or to targeted assassinations. In most cases though, they target to kill a large number of people. Thus, while coercion is an element in all terrorism, coercion is the paramount objective of suicide terrorism. The number of attacks using suicide tactics has grown from an average of fewer than five per year during the 1980s to 180 per year between 2000 and 2005, and from 81 suicide attacks in 2001 to 460 in 2005. These attacks have been aimed at diverse military and civilian targets, including in Sri Lanka, in
Israel Israel (; he, יִשְׂרָאֵל, ; ar, إِسْرَائِيل, ), officially the State of Israel ( he, מְדִינַת יִשְׂרָאֵל, label=none, translit=Medīnat Yīsrāʾēl; ), is a country in Western Asia. It is situated ...
since July 6, 1989, in
Iraq Iraq,; ku, عێراق, translit=Êraq officially the Republic of Iraq, '; ku, کۆماری عێراق, translit=Komarî Êraq is a country in Western Asia. It is bordered by Turkey to the north, Iran to the east, the Persian Gulf and K ...
since the US-led invasion of that country in 2003, and in Pakistan and Afghanistan since 2005. Between 1980 and 2000, the largest number of suicide attacks was carried out by separatist
Liberation Tigers of Tamil Eelam The Liberation Tigers of Tamil Eelam (LTTE; ta, தமிழீழ விடுதலைப் புலிகள், translit=Tamiḻīḻa viṭutalaip pulikaḷ, si, දෙමළ ඊළාම් විමුක්ති කොටි, t ...
of Sri Lanka. The number of attacks conducted by LTTE was almost double that of nine other major extremist organizations. In Israel, Gaza and the West Bank, suicide bombings are an anti-Israel strategy perpetrated generally by Islamist and occasionally by secular Palestinian groups including the
PFLP The Popular Front for the Liberation of Palestine ( ar, الجبهة الشعبية لتحرير فلسطين, translit=al-Jabhah al-Sha`biyyah li-Taḥrīr Filasṭīn, PFLP) is a secular Palestinian Marxist–Leninist and revolutionary so ...
.
India India, officially the Republic of India (Hindi: ), is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and the most populous democracy in the world. Bounded by the Indian Ocean on the so ...
has also been the victim of suicide attacks by groups based in
Pakistan Pakistan ( ur, ), officially the Islamic Republic of Pakistan ( ur, , label=none), is a country in South Asia. It is the world's fifth-most populous country, with a population of almost 243 million people, and has the world's second-lar ...
, a recent example taking place in February 2019. An attack by the Pakistan based
Jaish-e-Mohammed Jaish-e-Mohammed ( ur, , literally "The Army of Muhammad", abbreviated as JeM) is a Pakistan-based: "The JEM is a Pakistan-based, militant Islamic group founded by Maulana Masood Azhar in March 2000." Deobandi: "Deobandis like Masood Azha ...
group on Indian security forces
Pulwama district The Pulwama district is located to the south of Srinagar in Indian-administered Kashmir. Its district headquarters are situated in the city of Pulwama. It is located in the central part of the Kashmir Valley. Administration In 1979 Anantnag d ...
of Jammu and Kashmir, India, resulted in the loss of 40 security personnel of the
CRPF The Central Reserve Police Force (CRPF) is a federal police organisation in India under the authority of the Ministry of Home Affairs (India), Ministry of Home Affairs (MHA) of the Government of India. It is one among the Central Armed Police F ...
. This eventually resulted in the India–Pakistan border skirmishes of 2019.


Rocket and mortar attacks

The use of rocket and mortar attacks had been widely used from 1982–2012, in the example of the middle east rocket attacks against cities and settlements had been carried out by political entities such as Hizballa and
Hamas Hamas (, ; , ; an acronym of , "Islamic Resistance Movement") is a Palestinian Sunni-Islamic fundamentalist, militant, and nationalist organization. It has a social service wing, Dawah, and a military wing, the Izz ad-Din al-Qassam ...
(not counted as state terrorism) and to non political organization such as Islamic Jihad,
Islamic Jihad Movement in Palestine The Islamic Jihad Movement in Palestine ( ar, حركة الجهاد الإسلامي في فلسطين, ''Harakat al-Jihād al-Islāmi fi Filastīn''), known in the West simply as Palestinian Islamic Jihad (PIJ), is a Palestinian Islamist pa ...
, al-Qaeda and many others. Rocket-propelled grenades, especially
RPG-7 The RPG-7 (russian: link=no, РПГ-7, Ручной Противотанковый Гранатомёт, Ruchnoy Protivotankoviy Granatomyot) is a portable, reusable, unguided, shoulder-launched, anti-tank, rocket-propelled grenade launcher. Th ...
, and hand grenades, are in widespread use by terrorist groups. The number of attacks using explosive projectiles has grown as can be seen in
Palestinian rocket attacks on Israel Since 2001, Palestinian militants have launched thousands of rocket and Mortar (weapon), mortar attacks on Israel from the Gaza Strip as part of the continuing Arab–Israeli conflict. The attacks, widely condemned for targeting civilians, ...
, according to the reports somewhere between 800,000 people to million and a half are being in direct danger of mortar and missile range. In research published in 2011, 15,000 people had been treated or need treatment for
PTSD Post-traumatic stress disorder (PTSD) is a mental and behavioral disorder that can develop because of exposure to a traumatic event, such as sexual assault, warfare, traffic collisions, child abuse, domestic violence, or other threats on ...
and 1,000 people are being treated in psychometric facilities due to reasons directly to mortar (''qassam'') and rocket attacks ( Grad).


Vehicle-based attacks

In the 2000s, there have been a number of vehicle-based attacks in which terrorists used earthmovers or other motor vehicles to run over pedestrians or to attack vehicles. Some examples of such attacks include the 2008 Jerusalem bulldozer attack and the Omeed Aziz Popal SUV rampage. Compared to suicide-bomb attacks, using vehicles as weapons is easier to plan and carry out without detection. The tactic does not require acquiring explosives. The weapon, a standard street-legal vehicle, is readily available in the target country and can be used without raising suspicion. According to a report by Stratfor global intelligence, using a vehicle as a terrorist tactic is nearly as effective, yet not as destructive as a suicide bombing.Israel: Vehicle Attacks - A New Militant Tactic?. Stratfor Global Intelligence In 2016, two deadly terrorist vehicle-based attacks occurred in Europe: the July attack in Nice, France, that killed 86; and the December attack in Berlin, Germany, that killed 12. This was followed by five other similar attacks in 2017: one in Jerusalem in January that killed four, one in London in March that killed three, one in Stockholm in April that killed five, a second attack in London in June that killed three, and two in Barcelona and Cambrils in August that killed fourteen people. That same year, another similar attack occurred in the US, specifically
New York City New York, often called New York City or NYC, is the most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the most densely populated major city in the Un ...
, in October, killing eight. Other terrorist attacks of a similar M.O. have occurred intermittently in Western countries since 2014, though these produced no fatalities.


Aircraft attacks and hijackings

In the failed 2002 airliner attack, shoulder-launched surface-to-air missiles were fired at an airliner while taking off.
Aircraft hijacking Aircraft hijacking (also known as airplane hijacking, skyjacking, plane hijacking, plane jacking, air robbery, air piracy, or aircraft piracy, with the last term used within the special aircraft jurisdiction of the United States) is the unlawfu ...
is also employed as a terrorist tactic. On
September 11, 2001 The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerc ...
, 19 al-Qaeda terrorists hijacked
American Airlines Flight 11 American Airlines Flight 11 was a domestic passenger flight that was hijacked by five al-Qaeda terrorists on September 11, 2001 as part of the September 11 attacks. Lead hijacker Mohamed Atta deliberately crashed the plane into the North Towe ...
,
United Airlines Flight 175 United Airlines Flight 175 was a domestic passenger flight that was hijacked by five al-Qaeda terrorists on September 11, 2001, as part of the September 11 attacks. The flight's scheduled plan was from Logan International Airport, in Boston, ...
, American Airlines Flight 77, and
United Airlines Flight 93 United Airlines Flight 93 was a domestic scheduled passenger flight that was hijacked by four al-Qaeda attackers aboard the plane on the morning of September 11, 2001, as part of the September 11 attacks. The plane eventually crashed in S ...
and crashed them into the Twin Towers of the
World Trade Center World Trade Centers are sites recognized by the World Trade Centers Association. World Trade Center may refer to: Buildings * List of World Trade Centers * World Trade Center (2001–present), a building complex that includes five skyscrapers, a ...
, the southwestern side of the Pentagon building, and Stonycreek Township near
Shanksville, Pennsylvania Shanksville is a borough in Somerset County, Pennsylvania. It has a population of 197 as of the 2020 U.S. census. It is part of the Somerset, Pennsylvania Micropolitan Statistical Area and is located southeast of Pittsburgh and west of Philade ...
in a terrorist attack, killing 2,977 victims, most of them American citizens.


Chemical and biological weapons

Bioterrorism is the deliberate release of
virus A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Since Dmitri Ivanovsk ...
es, bacteria, or other germs (agents) used to cause illness or death in people, animals, or plants.J.V. Borelli, ''Bioterrorism: Prevention, Preparedness, and Protection'' (New York:
Nova Science Publishers, Inc. Nova Science Publishers is an academic publisher of books, encyclopedias, handbooks, e-books and journals, based in Hauppauge, New York. It was founded in 1985. A prolific publisher of books, Nova has received criticism from librarians for not ...
, 2007), vii.
Biological agents are typically found in nature, but it is possible that they can be changed to increase their ability to cause disease, make them resistant to current medicines, or to increase their ability to be spread into the environment. Biological agents in the hands of terrorists pose serious threats to states’ security because they can be easily spread through the air, through water, and through food. Biological agents can also be difficult to detect and often do not cause illness for several hours to several days. A prominent example of a bioterrorist attack on the United States is the September
2001 anthrax attacks The 2001 anthrax attacks, also known as Amerithrax (a portmanteau of "America" and "anthrax", from its FBI case name), occurred in the United States over the course of several weeks beginning on September 18, 2001, one week after the September 11 ...
. On September 18, 2001, several letters containing anthrax were sent to media outlets and the U.S. Congressional offices of Senator
Thomas Daschle Thomas Andrew Daschle ( ; born December 9, 1947) is an American politician and lobbyist who served as a United States senator from South Dakota from 1987 to 2005. A member of the Democratic Party, he became U.S. Senate Minority Leader in 1995 a ...
and Senator
Patrick Leahy Patrick Joseph Leahy (; born March 31, 1940) is an American politician and attorney who is the senior United States senator from Vermont and serves as the president pro tempore of the United States Senate. A member of the Democratic Party, ...
. Five Americans died from anthrax inhalation as a result of contact with the contaminated mail. While the 2001 anthrax attacks were relatively small-scale, the United States government has taken several steps since to 2001 to pass legislation and initiatives aimed at better protecting the United States against biological attacks, improving the United States’ public health system, and improving the United States ability to respond to biological attacks. The use of chemical weapons includes that by Aum Shinrikyo, a Japanese "new religious movement", which in 1995 carried out the
Sarin gas attack on the Tokyo subway The was an act of domestic terrorism perpetrated on 20 March 1995, in Tokyo, Japan, by members of the cult movement Aum Shinrikyo. In five coordinated attacks, the perpetrators released sarin on three lines of the Tokyo Metro (then ''Teito Rapid ...
. Ian Davison, a British
white supremacist White supremacy or white supremacism is the belief that white people are superior to those of other races and thus should dominate them. The belief favors the maintenance and defense of any power and privilege held by white people. White s ...
and neo-Nazi who was arrested in 2009 for planning terrorist attacks involving ricin poison. In 2011 the United States government discovered information that terrorist groups were attempting to obtain large amounts of
castor beans ''Ricinus communis'', the castor bean or castor oil plant, is a species of perennial flowering plant in the Euphorbia, spurge family, Euphorbiaceae. It is the sole species in the monotypic genus, ''Ricinus'', and subtribe, Ricininae. The evolu ...
for weaponized ricin use.


Agro-terrorism

A subset of bioterrorism, agroterrorism refers to the deliberate introduction of an animal or
plant disease Plant pathology (also phytopathology) is the scientific study of diseases in plants caused by pathogens (infectious organisms) and environmental conditions (physiological factors). Organisms that cause infectious disease include fungi, oomy ...
for the purposes of generating fear, causing economic losses, or undermining social stability.Jim Monke, Congressional Research Service Report for Congress, ''Agroterrorism: Threat and Preparedness'', August 25, 2006, https://digital.library.unt.edu/ark:/67531/metacrs9549/m1/1/high_res_d/RL32521_2006Aug25.pdf. The ultimate goal of agroterrorism in killing livestock and plants and contaminating food is to cause economic crises in the agricultural and food industries, social unrest, and loss of confidence in the government. Many experts believe that the United States’ agricultural sector and food supply are among the most vulnerable and least protected of all potential targets of attack, and they believe that terrorists have taken note of this.Dean Olson, “Agroterrorism: Threats to America's Economy and Food Supply,” ''FBI Law Enforcement Bulletin'', February 2012, http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/february-2012/agroterrorism. After American and allied forces overran some Al-Qaeda's refuges in caves in eastern Afghanistan in 2002, they found U.S. agricultural documents and Al-Qaeda training manuals on targeting agriculture among thousands of other documents. Analysts have identified a number of characteristics of the United States’ agricultural system that make it very vulnerable to agroterrorism. Given that agriculture generally demands large expanses of land, farms are geographically dispersed in environments that are difficult to secure. Also, livestock are usually concentrated in confined locations, which allows diseases to infect more animals quickly. Although many experts believe the United States is susceptible to agroterrorism, they have never suffered from a large scale agroterrorism related attack. Many political scientists have identified the 1984 salmonella attack in
The Dalles, Oregon The Dalles is the largest city of Wasco County, Oregon, United States. The population was 16,010 at the 2020 census, and it is the largest city on the Oregon side of the Columbia River between the Portland Metropolitan Area, and Hermisto ...
as a small-scale example of an agroterrorism attack in the United States. A religious cult intentionally contaminated ten restaurant salad bars with salmonella in an attempt to influence a local election, sickening more than 750 people. Even though the United States has not experienced a large-scale agroterrorism attack to date, similar to its anti-bioterrorism initiatives, the United States government has passed several pieces of legislation and started initiatives over the past few decades to better secure its agricultural system and prepare for potential attacks.


Nuclear weapons

Concerns have also been raised regarding attacks involving
nuclear weapon A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission (fission bomb) or a combination of fission and fusion reactions ( thermonuclear bomb), producing a nuclear explosion. Both bom ...
s. It is considered plausible that terrorists could acquire a nuclear weapon. In 2011, the British news agency, the ''Telegraph'', received leaked documents regarding the Guantanamo Bay interrogations of
Khalid Sheikh Mohammed Khalid Sheikh Mohammed (sometimes also spelled Shaikh; also known by at least 50 pseudonyms; born March 1, 1964 or April 14, 1965) is a Pakistani Islamist militant held by the United States at the Guantanamo Bay detention camp under terrorism-re ...
. The documents cited Khalid saying that, if Osama Bin Laden is captured or killed by the
Coalition of the Willing The term ''coalition of the willing'' refers to an international alliance focused on achieving a particular objective, usually of military or political nature. Usage *One early use was by President Bill Clinton in June 1994 in relation to possib ...
, an Al-Qaeda
sleeper cell A clandestine cell system is a method for organizing a group of people (such as resistance fighters, sleeper agents, mobsters, or terrorists) such that such people can more effectively resist penetration by an opposing organization (such as ...
will detonate a "weapon of mass destruction" in a "secret location" in Europe, and promised it would be "a nuclear hellstorm". While no terrorist group has ever successfully acquired and used a
nuclear weapon A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either fission (fission bomb) or a combination of fission and fusion reactions ( thermonuclear bomb), producing a nuclear explosion. Both bom ...
, many political scientists and prominent government officials consider nuclear terrorism to be one of the single greatest threats in global security. There is strong evidence that terrorist groups like Al-Qaeda are actively seeking to acquire nuclear weapons, and the
plutonium Plutonium is a radioactive chemical element with the symbol Pu and atomic number 94. It is an actinide metal of silvery-gray appearance that tarnishes when exposed to air, and forms a dull coating when oxidized. The element normally exhibi ...
or
highly enriched uranium Enriched uranium is a type of uranium in which the percent composition of uranium-235 (written 235U) has been increased through the process of isotope separation. Naturally occurring uranium is composed of three major isotopes: uranium-238 (238U ...
(HEU) needed to produce them.Matthew Bunn and E.P. Maslin, "All Stocks of Weapons-Usable Nuclear Materials Worldwide Must be Protected Against Global Terrorist Threats," ''Journal of Nuclear Materials Management'' 39 (Winter 2011): 21. Another serious concern is that weaknesses in many states’ nuclear security apparatuses have left them susceptible to theft or loss of HEU or plutonium. According to the International Atomic Energy Agency's (IAEA) Illicit Trafficking Database (ITDB), there have been 18 incidents of theft or loss of HEU and plutonium reported in ITDB's participating states. Given these serious concerns, the United States, its allies, and international organizations like the United Nations have established several international agreements and initiatives to ensure that all states’ nuclear security standards are adequate and effective, and to secure all vulnerable and unprotected nuclear stockpiles around the world over the next few years.


Cyberterrorism

In the developing age
Information Technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of Data (computing), data . and information. IT forms part of information and communications technology (ICT). An information te ...
, many political scientists and prominent government officials have become increasingly concerned about the ability of terrorist groups to execute cyber attacks and states’ vulnerabilities to these attacks.
Cyberterrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, la ...
could potentially become an increasingly desirable tactic for terrorist groups given that they can be executed thousands of miles away from the target and are difficult to trace back to the perpetrator. In an October 2012 speech,
United States Secretary of Defense The United States secretary of defense (SecDef) is the head of the United States Department of Defense, the executive department of the U.S. Armed Forces, and is a high ranking member of the federal cabinet. DoDD 5100.1: Enclosure 2: a The ...
Leon Panetta Leon Edward Panetta (born June 28, 1938) is an American Democratic Party politician who has served in several different public office positions, including Secretary of Defense, CIA Director, White House Chief of Staff, Director of the Office of ...
described the seriousness of a cyber attack on the United States: “A cyber attack perpetrated by nation states or violent extremists groups could be as destructive as the terrorist attack of 9/11. Such a destructive cyber terrorist attack could paralyze the nation.” The term “cyberterrorism” was first coined by Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, in the 1980s. The Center for Strategic and International Studies defines cyberterrorism as “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.”James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” ''Center for Strategic and International Studies'' (December 2002), http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf. Many experts believe that new vulnerabilities will be created as nations and their critical infrastructures become more dependent on computer networks for their operation. While concern is growing, cyberterrorism attacks still largely remain hypothetical, especially in the United States. In his report for the Center for Strategic and International Studies, James A Lewis writes that so far cyberterrorism has meant little more than propaganda and intelligence collection, and that no critical infrastructures have ever been shut down by cyber terrorist attacks. Lewis also describes how terrorist groups like Al-Qaeda have made significant use of the Internet, but only as a tool for intra-group relations, fundraising, and public relations. An Al-Qaeda training manual entitled “Military Studies in the Jihad Against the Tyrants” explicates that explosives are the preferred weapon of terrorists because “explosives strike the enemy with sheer terror and fright.” While explosions are dramatic, strike fear into the hearts of opponents, and do lasting damage, cyber attacks, like some other types of terrorism tactics, simply do not have the same dramatic and political effect that terrorists seek. Some political scientists, like Lewis, argue that terrorist organizations like Al-Qaeda might use cyber attacks to disrupt emergency services in order to reinforce and multiply the effect of a physical attack.


Conventional firearms

Despite the popular image of terrorism as bombings alone, and the large number of casualties and higher media impact associated with bombings, conventional firearms are as much if not more pervasive in their use. For example, in the second part of the
2011 Norway attacks The 2011 Norway attacks, referred to in Norway as 22 July ( no, 22. juli) or as 22/7, were two domestic terrorist attacks by neo-Nazi Anders Behring Breivik against the government, the civilian population, and a Workers' Youth League (AUF) ...
, 69 people were killed by
Anders Behring Breivik Fjotolf Hansen (born 13 February 1979), better known by his birth name Anders Behring Breivik () and by his pseudonym Andrew Berwick, is a Norwegian far-right domestic terrorist, known for committing the 2011 Norway attacks on 22 July 2011. On ...
, a man armed with two guns. The 2008 Mumbai terrorist attacks were done partly by guns and partly by bombs. Also, one
Transportation Security Administration The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within, and connecting to the United States. It was created ...
officer was killed and few others injured by a man with an assault rifle in the
2013 Los Angeles International Airport shooting On November 1, 2013, a terrorist attack occurred at around 9:20 a.m. PDT in Terminal 3 of the Los Angeles International Airport. Twenty-three-year old Paul Anthony Ciancia opened fire with a rifle, killing a Transportation Security Adminis ...
. In 2016,
Omar Mateen Omar Mir Seddique Mateen born Omar Mir Seddique; (November 16, 1986 – June 12, 2016) was an American mass murderer and domestic terrorist who murdered 49 people and wounded 53 others in a mass shooting at the Pulse nightclub in Orlando, Fl ...
killed 49 people with firearms during
Orlando nightclub shooting On , 2016, Omar Mateen, a 29-year-old man, killed 49 people and wounded 53 more in a mass shooting at Pulse, a gay nightclub in Orlando, Florida, United States. Orlando Police officers shot and killed him after a three-hour standoff. In a ...
. In 2004, the European Council recognized the "need to ensure terrorist organisations and groups are starved of the components of their trade," including “the need to ensure greater security of firearms, explosives, bomb-making equipment and technologies that contribute to the perpetration of terrorist outrages."


Stabbing

Stabbing attacks are inexpensive and easy to carry out, but very difficult for security services to prevent.


Secondary attacks

Terrorist groups may arrange for secondary devices to detonate at a slightly later time in order to kill emergency-response personnel attempting to attend to the dead and wounded. Repeated or suspected use of secondary devices can also delay emergency response out of concern that such devices may exist. Examples include a (failed) device that was meant to release cyanide-gas during the February 26, 1993
World Trade Center bombing The 1993 World Trade Center bombing was a terrorist attack on the World Trade Center in New York City, U.S., carried out on February 26, 1993, when a van bomb detonated below the North Tower of the complex. The urea nitrate–hydrogen gas en ...
; and a second car bomb that detonated 20 minutes after the December 1, 2001
Ben Yehuda Street Bombing A series of attacks were perpetrated or ordered by Palestinian Arabs, some of them acting as suicide bombers, on Jewish targets in Jerusalem's Ben Yehuda Street from February 1948 onwards. The attacks took place before the declaration of the St ...
by
Hamas Hamas (, ; , ; an acronym of , "Islamic Resistance Movement") is a Palestinian Sunni-Islamic fundamentalist, militant, and nationalist organization. It has a social service wing, Dawah, and a military wing, the Izz ad-Din al-Qassam ...
in
Jerusalem Jerusalem (; he, יְרוּשָׁלַיִם ; ar, القُدس ) (combining the Biblical and common usage Arabic names); grc, Ἱερουσαλήμ/Ἰεροσόλυμα, Hierousalḗm/Hierosóluma; hy, Երուսաղեմ, Erusałēm. i ...
.


Training

There are and have been training camps for terrorists. The range of training depends greatly on the level of support the terrorist organization receives from various organizations and states. In nearly every case the training incorporates the philosophy and agenda of the group's leadership as justification for the training as well as the potential acts of terrorism which may be committed. State sanctioned training is by far the most extensive and thorough, often employing professional soldiers and covert operatives of the supporting state.


Cover

Where terrorism occurs in the context of open warfare or insurgency, its perpetrators may shelter behind a section of the local population. Examples include the
intifada An intifada ( ar, انتفاضة ') is a rebellion or uprising, or a resistance movement. It is a key concept in contemporary Arabic usage referring to a legitimate uprising against oppression.Ute Meinel ''Die Intifada im Ölscheichtum Bahrain: ...
on Israeli-occupied territory, and insurgency in
Iraq Iraq,; ku, عێراق, translit=Êraq officially the Republic of Iraq, '; ku, کۆماری عێراق, translit=Komarî Êraq is a country in Western Asia. It is bordered by Turkey to the north, Iran to the east, the Persian Gulf and K ...
. This population, which may be ethnically distinct from the counter-terrorist forces, is either sympathetic to their cause, indifferent, or acts under duress.


Funding

Funding can be raised in both legal and illegal ways. Some of the most common ways to raise funds are through
front groups A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, terrorist organizations, secret societies, banned organizations, religious or political groups, advocacy gr ...
,
charitable organization A charitable organization or charity is an organization whose primary objectives are philanthropy and social well-being (e.g. educational, religious or other activities serving the public interest or common good). The legal definition of a ...
s, or
NGOs A non-governmental organization (NGO) or non-governmental organisation (see spelling differences) is an organization that generally is formed independent from government. They are typically nonprofit entities, and many of them are active in ...
with similar ideologies. In the absence of state funding, terrorists may rely on
organized crime Organized crime (or organised crime) is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals to engage in illegal activity, most commonly for profit. While organized crime is generally th ...
to fund their activities. This has included kidnapping, drug trafficking, or robbery. Terrorist financing generated through the use of underground smuggling tunnels and the probability that a specific smuggling tunnel or terrorist criminal social network will use the smuggling tunnel to launch a kidnapping operation or terrorist attack has been addressed in the literature.


Communications

Even though older communication methods like
radio Radio is the technology of signaling and communicating using radio waves. Radio waves are electromagnetic waves of frequency between 30 hertz (Hz) and 300 gigahertz (GHz). They are generated by an electronic device called a transmi ...
are still used, the revolution in communication technology over the past 10–15 years has dramatically changed how terrorist organizations communicate. E-mails, fax transmissions, websites, cell phones, and satellite telephones have made it possible for organizations to contemplate a global strategy. However, too great a reliance on this new technology leaves organizations vulnerable to sophisticated monitoring of communication and triangulation of its source. When Osama bin Laden found out that his satellite phone conversations were being intercepted, he ceased using this method to communicate.Sageman, Marc. 2004. ''Understanding Terror Networks''. Philadelphia: University of Pennsylvania Press. Ch. 5 pp. 158-161


Fear

The primary weapon of terrorism is fear, destruction and killing are not an end in and of itself, but a tool to create fear and terror in the minds of the enemy. In an asymmetric situation an enemy who cannot be defeated militarily may be defeated psychologically, that they may come to fear attack and its consequences so much they may become willing to forgo a superior military position in order to be free of the cause of that fear. If a terrorist group can carry out enough credible attacks then "coded warnings" or planted electronic chatter, designed to be intercepted, can cause as much disruption as a genuine attack or bomb. As long as the supposed attacks are plausible and they are supported by the occasional genuine attack, the authorities will be forced to expend resources to combat non-existent devices, dummy bombs and plain fictions, disrupting the lives of citizens, and feeding the public's fear.


References


External links

* {{DEFAULTSORT:Tactics Of Terrorism Terrorism by method vi:Chiến thuật của khủng bố