Date post: | 18-Aug-2015 |
Category: |
Leadership & Management |
Upload: | erothmanjsu |
View: | 22 times |
Download: | 0 times |
Part IV: Final AnalysisPart IV: Final Analysis
Chapter 13: Chapter 13: CounterterrorismCounterterrorism
The OptionsThe OptionsMartin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Use of ForceUse of Force Operations Other than War (OOTW)Operations Other than War (OOTW) Legalistic OptionsLegalistic Options
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Suppression CampaignsSuppression Campaigns
Military suppression campaigns.Military suppression campaigns. Case: Operation Enduring Freedom.Case: Operation Enduring Freedom. Case: Operation Peace for Galilee.Case: Operation Peace for Galilee.
Paramilitary suppression campaigns.Paramilitary suppression campaigns. Case: Algeria.Case: Algeria. Case: Colombia.Case: Colombia.
Punitive and preemptive strikes.Punitive and preemptive strikes.Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Coercive Covert OperationsCoercive Covert Operations
““War in the shadows.”War in the shadows.” Case: The Achille Lauro operation.Case: The Achille Lauro operation. Case: Assassinations.Case: Assassinations.
Special Operations ForcesSpecial Operations Forces
Elite military and police units specializing in Elite military and police units specializing in unconventional operations.unconventional operations.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Nonviolent Covert OperationsNonviolent Covert Operations
Encompasses a number of options.Encompasses a number of options.
Inherently secretive. Often creative.Inherently secretive. Often creative.
Examples:Examples: Infiltration.Infiltration. Disinformation.Disinformation. CyberwarCyberwar
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
IntelligenceIntelligence
SIGINT (Signal Intelligence)SIGINT (Signal Intelligence) HUMINT (Human Intelligence)HUMINT (Human Intelligence) Intelligence agencies.Intelligence agencies. Problems of intelligence coordination.Problems of intelligence coordination.
Enhanced SecurityEnhanced Security
Target hardening.Target hardening. Case: Morocco’s desert wall.Case: Morocco’s desert wall. Case: Israel’s walls on the border.Case: Israel’s walls on the border.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Economic SanctionsEconomic Sanctions
Directed against governments.Directed against governments.
Conditions for success.Conditions for success. Cooperation must remain firm.Cooperation must remain firm. Trade leaks must be controlled.Trade leaks must be controlled. Sanctioned Sanctioned regimeregime must be made to suffer. must be made to suffer.
Problems.Problems. Sanctioned regimes rarely suffer—their people Sanctioned regimes rarely suffer—their people
do.do. Coalitions do not always remain firm.Coalitions do not always remain firm. Leaks are difficult to control.Leaks are difficult to control.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Diplomatic OptionsDiplomatic Options
Reasoned dialogue.Reasoned dialogue. Peace processes.Peace processes. Negotiations.Negotiations.
Social ReformSocial Reform
Responding to underlying grievances.Responding to underlying grievances. Case: Peru and Shining Path.Case: Peru and Shining Path. Case: Spain and ETA.Case: Spain and ETA.Martin, Understanding Terrorism Fifth
Edition. (c) SAGE Publications 2016
Concessionary OptionsConcessionary Options
Giving the terrorists what they want.Giving the terrorists what they want.
Examples:Examples:
Payment of ransoms.Payment of ransoms. Releases of imprisoned comrades.Releases of imprisoned comrades. Broadcast or publication of extremist Broadcast or publication of extremist
propaganda.propaganda. Political amnesty.Political amnesty.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Law Enforcement and CounterterrorismLaw Enforcement and Counterterrorism
Responding to terrorist environments.Responding to terrorist environments. Terrorism as inherently criminal behavior under Terrorism as inherently criminal behavior under
law.law. Taking the lead in investigating terrorist Taking the lead in investigating terrorist
incidents.incidents.
Police repression.Police repression.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
Domestic Laws and CounterterrorismDomestic Laws and Counterterrorism
Balancing the need for counterterrorist laws Balancing the need for counterterrorist laws and the protection of constitutional rights.and the protection of constitutional rights.
Cases: Cases: Counterterrorist courts in Algeria.Counterterrorist courts in Algeria. Amnesty in Italy.Amnesty in Italy. Outcome of the Achille Lauro incident.Outcome of the Achille Lauro incident.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016
International LawInternational Law
Responses by the world community.Responses by the world community. International conventions on hijacking International conventions on hijacking
offenses.offenses. Protecting diplomats.Protecting diplomats. Extradition treaties.Extradition treaties. International courts and tribunals.International courts and tribunals.
Martin, Understanding Terrorism Fifth Edition. (c) SAGE Publications 2016