View
13
Download
2
Category
Tags:
Preview:
DESCRIPTION
Terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the pursuit of political change. All terrorist acts involve violence or the threat of violence. Terrorism is specifically designed to have far-reaching psychological effects beyond the immediate victim(s) or object of the terrorist attack. It is meant to instil fear within, and thereby intimidate, a wider `target audience' that might include a rival ethnic or religious group, an entire country, a national government or political party, or public opinion in general. Terrorism is designed to create power where there is none or to consolidate power where there is very little. Through the publicity generated by their violence, terrorists seek to obtain the leverage, influence and power they otherwise lack to effect political change on either a local or an international scale.The global concern over the threat of terrorism by physical destruction and losses, deaths, suffering to humanity, economic loss, insecurity, and the general challenge to social order and polity in the society cannot be underscored. As most countries in Sub-Saharan Africa are shaken in civil conflicts, Kenya has remained relatively peaceful for decades and played host to millions of refugees fleeing neighboring countries. However, since 1998, terrorism-related activities have been on the rise in the country posing a major threat to national security and development. The impact of terrorism cuts across social, cultural, economic and political lens of the society. The nature of terrorist activities in Kenya has been changing and escalating in magnitude, leaving many innocent citizens as victims, while in some incidences, the country held at ransom by the terror groups. With over 15years of experience on terror attacks, Kenya is becoming more vulnerable and easy target for terror groups. Despite efforts made by government and other agents to curb the menace, much is yet to be achieved. Inadequate capacity; lack of preparedness; poor co-ordination and strategy; and information faults are some of the major shortfalls that have been highlighted
Citation preview
i
SCHOOL OF SOCIAL SCIENCES AND SECURITY STUDIES
DEPARTMENT OF CRIMINOLOGY AND SOCIAL STUDIES
BJS3105: INTRODUCTION TO TERRORISM
copyright@2014-All rights reserved for MKU
1
BJS3105: INTRODUCTION TO TERRORISM
Contact hours: 42
Purpose: To promote knowledge in understanding terrorism and threat analysis in world.
Expected Learning Outcomes of the Course: By the end of this course, the learner should be able to;
i) Discuss various forms of terrorism and ways of detecting the terrorism threat.
ii) Identify and explain factors responsible for terrorism in the world
iii)Understand and describe the national policies and strategies of Terrorism control.
Course Content: Historical overview, terrorism profile, forms of terrorism, causes of terrorism, terrorism and anti-
terrorism, counter terrorism, measure to reduce terrorism the probability of information, policy
and response to terrorism in Kenya, impact of terrorism attack on Kenya, Types of explosives,
nature of explosives, effects of explosives, identification of explosive materials, common
explosives, secondary explosives, impact of terrorism threats in Kenya and the world over,
pejorative use, types of motivation to terrorism practices, democracy and domestic terrorism,
perpetrators, funding of terrorism-state terrorism, group terrorism, tactics and responses, mass
media, databases on terrorism
Course Outline
WEEK 1
CHAPTER ONE: INTRODUCTION
Definition-terrorism, terrorist, law crime
States, non-state actors terrorism
History of terrorism
Origin of terrorism
Religion, fundamentalism terrorism
WEEK 2
CHAPTER TWO: HISTORICAL OVERVIEW
Old And New Terrorism
Waves Of Terrorism
Cause Of Terrorism
Targets Attacks
WEEK 3
CHAPTER THREE: THE EVOLUTION OF TERRORISM
Introduction
Evolution Of Terrorism
Factors That Motivate Terrorism
2
Types Of Terrorism
Reasons Why Terrorism Exist
Impact Of Terrorism: Social Political And Economic
Forms Of Terrorism WEEK 4
CHAPTER FOUR: A TERRORISTS PROFILE AND TERRORISM
Classification of Terrorists
Profile
Availability readiness and willingness
Terrorism and anti-terrorism
Counter terrorism WEEK 5 & 6
CHAPTER FIVE: LAW AND TERRORISM
Introduction
Categories Of Terrorism State-Sponsored Terrorism
Response To Terrorist Threats And Attacks
Religious Terrorism
Nationalist Terrorism
Left-Wing Terrorism
Right-Wing Terrorism
Anarchist Terrorism
Group Terrorism Narcoterrorism And The Weakening Of Democracies
Information: Availability Authenticity Probability WEEK 7
CHAPTER SIX: THE FIGHT
Introduction
Measures to reduce terrorism
Weapons used
Nature of explosives
Sources of the explosives
Types of explosives
Effects/impact WEEK 8 & 9
CHAPTER SEVEN: WEAPONS USED
Definition of explosives
Types of explosives
Classifications of explosives:
Identification
Methods used in the identification:
Sources
Nature
Availability
Characteristics
3
Categories and functions Social economic and cultural environment Identification Organizational set-up Availability and recruitment Mass media Databases on terrorism Training plan
WEEK 10 & 11
CHAPTER EIGHT: IDENTIFICATION
Common explosives
Secondary explosives
Tactics and response
State-terrorism, group terrorism WEEK 12
CHAPTER NINE: FUNDING OF TERRORISM ON THE NATION
Funding
The evil-Nexus
Costs
Financing terrorism
Financial Control
Categories
Moving the funds WEEK 13
CHAPTER TEN: INVESTIGATION
Identification of explosive material Policy and response to terrorism in Kenya Impact of terrorism attacks on Kenya Pejorative use Motivation Domestic Terrorism And Democracy Perpetrators Probability Of Information Mass Media Cost-Benefit And Cost-Effectiveness Analysis Impact Evaluation
Course Assessment
Examination - 70%
Continuous Assessment Test (CATS) - 20%
Assignments - 10%
Total - 100%
Recommended Text Books:
4
Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New
York: Routledge)
Adrian Guelke, (2009), The New Age of Terrorism and the International Political System
(London and New York: I.B. Tauris)
Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)
Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues (Los
Angeles, CA: Sage, 616 pages, $80.00. [Paperback]
Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries,
Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root
Causes (Westport, CT: Praeger Security International, 1280 pages, $
Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global
Trends (New York: Routledge)
Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces
Together (Santa Monica, CA: RAND)
Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)
Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)
Text Books for further Reading:
Bockstette. Carsten (2008). "Jihadist Terrorist Use of Strategic Communication Management
Techniques" (PDF). George C. Marshall Center Occasional Paper Series (20). ISSN 1863-
6039. Retrieved 2009-01-01.
Barak Mendelsohn (2005-01). "Sovereignty under attack: the international society meets the
Al Qaeda network (abstract)". Cambridge Journals. Retrieved 2010-01-
Sageman. Mark (2004). Understanding Terror Networks. Philadelphia. PA: U. of
Pennsylvania Press. pp. 16667. ISBN 978-0812238082.
Lind. Michael (2005-05-02). "The Legal Debate is Over: Terrorism is a War Crime | The
New America Foundation".
5
TABLE OF CONTENTS Page
COURSE OUTLINE i
TABLE OF CONTENTS iv
CHAPTER ONE: INTRODUCTION
Definition 1
1.1 Terrorism 1
1.2 Terrorist 1
1.3 Law 1
1.3.2 International Law 1
1.3.3 Domestic Law 1
1.4 Crime 1
1.5 History of Terrorism 1
1.6 Origin of Terrorism 2
Review Questions 3
References for further reading 3
CHAPTER TWO: HISTORICAL OVERVIEW 3
2.2 Old and New Terrorism 4
2.3 Definition. 4
2.3.2Definition 4
2.4 Characteristics of terrorism 4
2.4.2 Characteristic of new terrorism 4
2.5 Evolution of terrorism 4
2.6 Cause of Terrorism: 4
2.7Motivations for terrorism 4
2.8 Psychological Perspective 4
2.8.2 Ideological Perspective 4
2.8.3 Strategic Perspective 5
Review Questions 6
References for further reading 6
CHAPTER THREE: THE EVOLUTION OF TERRORISM 5
3.1 Background 7
3.2Classical, Modern, and Postmodern Terrorism 7
3.3Factors that motivate terrorism 7
3.4 Reasons why terrorism exist 7
3.5 Types of terrorism 8
Review Questions 9
References for further reading 9
CHAPTER FOUR: A TERRORIST IDENTITY 10
4.1 States, Non-State Actors 10
4.2 Classification of Terrorists 10
4.3 Terrorist profile 10
6
4.4 Availability, readiness, willingness 10
4.5 Terrorism anti-terrorism Counter terrorism 10
4.6 Goals and objectives 10
Review Questions 11
References for further reading 11
CHAPTER FIVE: THE LAW AND TERRORISM 12
5.1 Introduction 12
5.2 Categories of Terrorism 12
5.2.2 State-Sponsored Terrorism 12
5.2.3 Response to Terrorist Threats and Attacks 12
5.2.4 Religious Terrorism 12
5.2.5 Nationalist Terrorism 12
5.2.6 Left-wing Terrorism 12
5.2.7 Right-wing Terrorism 12
5.2.8 Anarchist Terrorism 12
5.2.9 Group Terrorism Narcoterrorism and the Weakening of Democracies 12
5.3 Information: availability authenticity probability 13
Review Questions 14
References for further reading 14
CHAPTER SIX: RESPONSES TO TERRORISM 15
6.1 Introduction 15
6.1.2 Measures to reduce terrorism 15
6.2 Weapons 15
6.2.2 Definition of explosives 15
6.2.3 Nature of explosives 15
6.2.4Sources of the explosives 15
6.2.5 Types of explosives 16
Review Questions 17
References for further reading 17
CHAPTER SEVEN: WEAPONS USED 18
7.1 Definition of explosives 18 7.2 Types of explosives 18 7.3 Classifications of explosives 18 7.4 Identification 18 7.5 Methods used in the identification 18 7.6 Sources 18 7.7 Nature 18 7.8 Availability 18 7.9 Databases on terrorism 18 Review Questions 19
References for further reading 19
CHAPTER EIGHT: IDENTIFICATION 20
8.1 Explosives 20
8.1.2 Common Explosives 20
8.1.3 Secondary Explosives 20
8.2 Tactics 20
7
8.2.1 Response 20
8.3 State-Terrorism 20
8.3.1 Group Terrorism 20
Review Questions 21
References for Further Reading 21
CHAPTER NINE: FUNDING TERRORISM 22
9.1 Funding 22
9.2 The evil-nexus 22
9.3 Costing 22
9.4 Financing terrorism 22
9.5 Financial control 23
9.6 Categories 23
Review Questions 24
References for further reading 24
CHAPTER TEN: INVESTIGATION 25
10.1 Policy and response to terrorism in Kenya 25
10.2 Impact of terrorism attacks on Kenya 25
10.3 Identification of explosive materials 25
10.4 Counter-terrorism 25
10.5 Pejorative use 25
10.6 Motivation 25
10.7 Domestic terrorism and democracy 25
10.8 Perpetrators 25
10.9 Mass Media 26
Review Questions 27
References for further reading 27
Appendix 1: Project Classification Codes 28
Appendix 2: Sample Test Papers 30
8
CHAPTER ONE: INTRODUCTION
LEARNING OBJECTIVES
AT the end of the lesson the students should be able to
i) discuss the most universally accepted definition of terrorism, and competing definitions of terrorism proposed by various scholars and institutions;
ii) Identify the different types of terrorism. iii) Discuss the motivation behind terrorism and terrorist acts.
INTRODUCTION Terrorism is an ancient practice that has existed for over 2,000 years.
1.1 Terrorism
There is neither academic nor international nor legal consensus regarding the definition of the
term terrorism. The difficulty in defining terrorism is in agreeing on a basis for determining
when the use of violence (directed at whom, by whom, for what ends) is legitimate;
Terrorism can be defined as : The use of violence for the achievement of political ends which is common to state and non-state groups. Different institutions have come up with working definitions.
1.2 Terrorist: a person who uses terrorism in the pursuit of political aims
1.3 International Terrorism: there is no accepted definition to the term terrorism
however this can be used as a guide "an act intended to cause death or serious bodily
injury to a civilian, or to any other person not taking an active part in the hostilities in a
situation of armed conflict, when the purpose of such act, by its nature or context, is to
intimidate a population, or to compel a government or an international organisation to do
or to abstain from doing any act.
1.4 International law on terrorism: different countries have come up with laws on terrorism
although all agree on one point that terrorism is a threat to everyone.
1.5 Domestic Law:
1.6 History of terrorism: Terrorism is an old tactic. Accounts of terrorism existed before the
word itself was invented. This was confirmed by specific artifacts located fifty miles south of
Mosul in Iraq. Assurnasirpal, the conqueror and king of Assyria (884860 BCE), enforced his rule on conquered territories by erecting stone monuments
1.7 Origin of terrorism: The word terrorism, in and of itself, was coined during the French
Revolutions Reign of Terror (17931794). At best, we have a most accepted definition of terrorism, is following:
9
Terrorism is the use of violence to create fear (i.e., terror, psychic fear) for (1) political, (2)
religious, or (3) ideological reasons (ideologies are systems of belief derived from worldviews
that frame human social and political conditions). The terror is intentionally aimed at
noncombatant targets (i.e., civilians or iconic symbols), and the objective is to achieve the
greatest attain-able publicity for a group, cause, or individual.
?
Review Questions
i) Does Kenya have a law on terrorism?
ii) How is terrorism different from warfare? iii) Define the term criminal violence how does criminal violence differ from terrorism? iv) In what ways do you think terrorism is different from politics?
References for further reading
i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)
ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)
iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iv) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues
(Los Angeles)
v) Ely Karmon's (2005) Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
vi) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $
vii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)
viii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)
ix) Stewart Bell, (2005) the Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)
HAPTER TWO: HISTORICAL OVERVIEW
10
Learning Objectives
Students will:
i) Should give be able to explain the characteristics of terrorism using their own definition of the word terrorism
ii) Explain the history of terrorism and the different types of terrorism today, compare old terrorism with new terrorism.
iii) Discuss the fifteen causes that explain why people resort to terrorism;
Introduction: The students should learn about the old and new terrorisms, their
characteristics and the evolution. The waves of terrorism evolution.
2.2 Old and New Terrorism
2.3 Definition: Old terrorism this is when the terrorist target is selective.
2.3.2Definition: New terrorism is terrorism that is indiscriminate; it causes as many casualties
as possible.
2.4 Characteristics of terrorism: the strict compliance with religion, predominantly radical
Islam, is one of its main characteristics
2.4.2 Characteristic of new terrorism: its ultra-flexible network and less hierarchical
organizational structure, enabled by state-of-the-art technologies.
2.5 Evolution of terrorism: terrorism has evolved overtime to very dangerous levels. It has
spread to every corner of the world. However it can be traced through four stages.
2.5.2The first stage was in the late 19th and early 20th centuries.
2.5.3 The Second stage was the colonial time, as the west colonized Africa terrorism
was evolving though confined within national geographical boundaries from 1921 until today.
2.5.4 The Third stage was the contemporary wave; it introduced international
terrorism, crossing national boundaries, which began in the 1960s.
2.5.5 The Fourth stage has witnessed the vicious levels of terrorism and religious
justification for killing, international scope, unparalleled gory tactics and weapons, and
dependence on technologies of modernity. The latter consists of communications, ease of
global travel (i.e., moving across borders), and accessibility to finances and WMDs (weapons
of mass destruction).
2.5.6 In the Fourth stage , terrorism has reached a global phase. The use of any
weapon is justifiable. The Other is now a legitimate target. No distinction among targets should be taken into account. Terrorism has become (the war of all against all).
2.6 Cause of Terrorism: The Clash of Civilizations. The cultural and religious differences
between civilizations worldwide have become the primary source of terrorism today. This can
be easily observed in the concept of new terrorism. Terrorists want to produce a Clash of
Civilizations or cause radical changes in the U.S. presence in the Middle East. Generally,
religious terrorists compose their own community or population. They are not worried about
upsetting their supporters with their terrorist attacks. They view themselves as people
11
accountable only to God. New terrorists may not even deny responsibility for their acts of
destruction. They oppose any type of negotiation.
2.7: Motivations for terrorism
These can be categorized to include but not limited to psychological, ideological, and strategic
2.7.2 Psychological Perspective: Those who engage in terrorism may do so for purely
personal reasons, based on their own psychological state of mind. Their motivation may be
nothing more than hate or the desire for power.
2.7.3 Ideological Perspective: Ideology is defined as the beliefs, values, and/or
principles by which a group identifies its particular aims and goals. Ideology may encompass
religion or political philosophies and programs
2.7.4 Strategic Perspective: This is when a terrorist group arises seeking redress of
their grievances through government, but failure to win governments attention to their plight, they may resort to violence.
?
REVIEW QUESTIONS
i) Discuss the characteristics of terrorism
ii) Explain some of the motivations for terrorism
iii) What is the difference between the old terrorism and the new terrorism
iv) With illustrations show how terrorism has evolved
References further reading
i) James Ciment, editor, (2011) World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk,
NY:
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press
12
CHAPTER THREE: THE WORLD AND TERRORISM
LEARNING OBJECTIVES
Students will
i) Identify the role of ideology, psychology, and rationality in terrorism ii) Be acquainted with the profile of the terrorist iii) To assist students in gaining an understanding of terrorism and its role in domestic and
international politics
iv) To make students aware of various definitions of terrorism
3.1 Background: Terrorism is not a new phenomenon in human experience. Violence has
been used throughout human history by those who chose to oppose states, kings and
Princes. This sort of violence can be differentiated from what is termed as terrorism. Violence
in opposition to a government is often targeted against soldiers and those who govern.
Terrorism, however, is characterized by the use of violence against civilians, with the
expressed desire of causing terror or panic in the population. Terrorism is not unique to the
20th and 21st centuries. Terrorism existed in 18th century revolutionary France during the
reign of terror, as well as among the Zealots of Palestine in opposition to Roman rule some
2000 years ago.
3.2 Classical, Modern, and Postmodern Terrorism: Scholars argue that the comparison
between old and new terrorism can be categorized as classical, modern or postmodern
terrorism.
3.2.2: Classical terrorism: means that group warfare is direct; it is aimed at specific
targets with few casualties (e.g., assassinations) or wreaks havoc on non-significant facilities. The damage is fairly low because the terrorist acts are perpetrated to achieve a
specific political objective.
3.2.3: Modern terrorism, Involves a more indirect approach with attacks that are
more indiscriminate and destruction much higher, inflicting hundreds of casualties. Although
conventional weapons are used in modern terrorism, they are used to create mass fatalities.
3.2.4: Postmodern terrorism has the objective of altering the reality of the conflict
(with its enemy) by the very act of terrorismsuch as using CBRN (chemical, biological, radiological, and nuclear weapons; pronounced C-BURN) weapons or attacks against symbols
of the enemyto materially demolish as much of their adversary as possible. The objective here is to eliminate the source of conflict itself.
3.3 Factors that motivate terrorism: The factors that motivate people to join and remain in
terrorist groups can be religious, economic, social, psychological, and retaliatory.
3.4 Reasons why terrorism exist:
There are very many reasons why terrorism exists and why it continues to evolve, such as
religious fanaticism, ideological zeal, oppression, portrayal of governments (and their actors)
as oppressive, historical grievances, Resentment and revenge, Poverty, discrimination, hatred
13
Financial gain, Racism, Guilt by association, Supporting sympathizers, Sensation-seeking and
failure of conventional channels of expression.
3.5 Types of terrorism: There are six different types of terrorism: nationalist, religious, state-
sponsored, left wing, right-wing, and anarchist
? Review Questions
i. How many types of terrorism have been identified? ii. What are some of the reasons why terrorism exists
iii. There are people who join terrorism groups for financial gain. Do you agree. Explain your answer using examples
iv. What are some of the factors that motivate terrorism? v. How long has terrorism been in existence?
References for further Reading
i) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International)
ii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)
iii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)
iv) Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)
14
CHAPTER FOUR: A THE TERRORIST IDENTITY
Learning Objectives
Identify major themes within definitions of terrorism
Identify and understand different types of terrorism
Understand the different objectives of terrorism
Describe the various facets of the terrorists identity
Identify the role of ideology, psychology, and rationality in terrorism
Be acquainted with the profile of the terrorist
4.1 Types of terrorists: Most people became terrorists as a result of their own creation
of a new identity or out of a behavior that is sometimes rooted in the identity type they
create for themselves later in life.
4.2 Terrorist profile: six types of terrorists have been identified and can be group in
categories as follows:
4.2.2 The first category consists of deranged individuals;
4.2.3 The second, apocalyptic religious or religious nationalist groups who believe the
end is near for a sinful world;
4.2.4 The third covers fanatical nationalist groups consumed by hatred against another
national group in their midst or in a neighbouring country;
4.2.5 The fourth consists of terrorist groups engaged in a long struggle without evident
success and without much hope of it;
4.2.6 The fifth consists of terrorists acting on behalf of a state or even criminal
terrorist groups and who may calculate that the damage caused and the number of victims
would be devastating but still limited.
4.2.7 The final category includes small groups of individuals who suffer from one
delusion or another and have personal grievances rather than political ones.
4.3 Behavior of a terrorist may vary depending on ideological commitment, individual
intelligence and education, geographical setting, and organizational reach. The degrees of
intent and capability hold the key of how serious each threat actually is as an enemy.
4.4 Goals and objectives: Goals and objectives of terrorist organizations differ throughout
the world and range from regional single-issue terrorists to the aims of transnational
radicalism and terrorism
15
?
Review Questions
i. Discuss four goals of a terrorist getting involved with terrorism
ii. List six types of terrorists
iii. Search for identity pushes some people into terrorist acts. Discuss using examples.
iv. The intelligence of an individual plays a role in influencing him or her to join a
terrorist group. Discuss.
References for further Reading i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence
from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY: Sharpe
Reference)
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press
16
CHAPTER FIVE: THE LAW AND TERRORISM
Learning Objectives
i) To assist students in gaining an understanding of terrorism and its role in domestic and international politics
ii) To make students aware of various definitions of terrorism and the law iii) To acquaint students with different ways in which terrorism may be iv) addressed
Introduction: The law
5.2 International law recognizes that it would be contrary to the purposes of the United
Nations Charter if a threatened nation were required to absorb an aggressors initial and potentially crippling first strike before taking those military measures necessary to thwart an
imminent attack. Anticipatory self-defense involves the use of armed force where attack is
imminent and no reasonable choice of peaceful means is available. Anticipatory self-defense
provides the basis for using force in self-defense pursuant to the SROEs based on an adversary exhibiting hostile intent.
5.2.2 State-Sponsored terrorism: State sponsored terrorism describes a situation
where a government gives active and often clandestine support, encouragement and assistance
to a terrorist group. Radical states sponsor terrorist groups as a deliberate foreign policy tool.
5.2.3 Religious Terrorism: Religious terrorists seek to use violence to further what
they see as divinely commanded purposes, often targeting broad categories of foes in an
attempt to bring about sweeping changes. Religious terrorists come from all major faiths, as
well as from small cults.
5.2.4 Nationalist Terrorism: Nationalist terrorists seek to form a separate state for
their own national group, often by drawing attention to a fight for national liberation that they think the world has ignored.
5.2.5: Left-wing Terrorism: Left-wing terrorists are out to destroy capitalism and
replace it with a communist or socialist regime. Because they perceive most civilians as
suffering under capitalist exploitation, leftwing terrorists have sometimes limited their use of
violence to avoid hurting the victims they were out to save.
5.2.6 Right-wing Terrorism: Right-wing terrorism has often been characterized as
the least discriminating, most senseless
type of contemporary political violence. This is because of its seemingly mindless street violence and unsophisticated attacks that target immigrants, refugees, guest workers and
other foreigners in many European countries, especially in eastern Germany and other former
communist-bloc states.
5.2.7: Anarchist Terrorism: From the 1870s until about 1920, anarchist terrorism
was a major global phenomenon. Revolutionaries seeking to overthrow established
governments launched a wave of bombings and assassinated a series of heads of state.
Anarchist terrorism in Europe today is to be found almost solely in Italy and to a lesser extent
in Spain.
17
5.2.8 Group terrorism: Narcoterrorism and the weakening of democracies: The existing
evidence shows that Narco terrorism exists today and has been in there for the past five
decades. Narco terrorism is defined as the use of illicit drugs to advance political purposes
and to fund terrorist activities. Greed, corruption, hypocrisy, and willful blindness among
bankers, financial institutions, and to some extent lawmakers and law enforcement officials
all over the world have made drug money and other illicit funds easy to launder and hide.
5.2.9 Information: availability authenticity probability: informers and intelligence when
given information have failed to act leading to devastating outcome.
?
Review Questions
i) Discuss the role of ideology in terrorist attacks in Kenya.
ii) After terrorist attacks it always comes out that the intelligence service had information
of the pending attack. Discuss why the government never acts on the information
accessed.
iii) Group terrorism has been made more difficult to trace due to advanced technology in
communication. Describe group terrorism.
iv) Libya has been accused of sponsoring terrorists. Do such accusations portray Libya as
a state that sponsors terrorist acts in your opinion?
References for further Reading
i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)
ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)
iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iv) Aziz Z. Huq, (2008): Imagining Counterterrorisms Future, World Policy Journal,
Winter,
18
CHAPTER SIX: THE FIGHT: RESPONSES TO TERRORISM
Learning Objectives
At the end of the lesson the students should be able to:
Discuss how terrorists organize.
Identify ways to combat terrorism.
Discuss what terrorism will be like in the future.
Identify how core Values help in identifying and combating terrorism.
6.1 Response: The lesson should help the students in learning about the various responses to
terrorist attacks around the world. How do different states act to terrorist attacks either on
their own soil as has been the case in Kenya, USA and Israel? How have other countries like
Iraq, Sudan and Somalia that have been accused of aiding terrorist activities reacted and how
have those countries that even though have not been attacked directly know that terror attacks
can happen any time reacted?
6.1.2 Introduction: One of the most important duties of any government is to protect
its citizens. The prevention of terrorism is about protecting some of the most basic human
rights. The question for any government is how best to provide that protection for every
citizen there have been a number of responses to terrorism including but not limited to, the
use of violence to oppose terrorists, the use of negotiation, and finally the use of international
conventions to create international norms in opposing terrorist activities.
6.2 Response to terrorist threats and attacks: There have been a number of responses to
terrorism. They include but not limited to the use of violence to oppose terrorists, the use of
negotiation, and finally the use of international conventions to create international norms in
opposing terrorism
6.2.2 The use of force and violence against terrorism: The use of force and violence
against terrorism has been demonstrated periodically. U.S. military action against the Taliban
in Afghanistan. The use of force is both a tit-for-tat strategy, as well as an attempt to hinder
the terrorists ability to operate. 6.2.3 Negotiation: is another method for dealing with terrorism. Although nations
may take a tough stand and declare publicly that they will not negotiate with terrorist groups,
they may at the same time negotiate secretly. Great Britain negotiated with the Irish
Republican Army and its political wing Sinn Fein and the African National Congress (ANC)
and the apartheid government of South Africa. The ANC had been proscribed as a terrorist
organization, and the government foreswore any negotiation with the ANC. Behind the scenes
negotiations went on resulting in the end of apartheid in South Africa.
6.2.4 International agreements: International organizations, such as the United
Nations, pass resolutions and seek to foster greater political action among member states.
There several such as the 1997 International Convention for the Suppression of Terrorist
Bombings which requires the parties to the convention to make it a criminal act to unlawfully
and intentionally use explosives or other deadly devices in public with the objective of
causing death or injuring a person and the action by the international community UN Security
Council anti-terrorism resolution 1373, Improving International Cooperation.
19
6.3 Non state actor terrorists: Where non-state actor terrorists merely use a states territory as a safe haven, and the host state is unable to prevent the terrorists from operating there
?
REVIEW QUESTIONS
i) Define a non-state actor in terrorism
ii) Explain the various response used in the fight against terrorism
iii) Discuss how international agreements have been used as counter terrorism measure.
iv) Describe negotiation as a counter-terrorism approach
References for further Reading
i) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International)
ii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)
iii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)
iv) Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)
20
CHAPTER SEVEN: WEAPONS
Learning Objectives:
At the end of the lesson students should be able to
i) To acquaint students with different ways in which terrorism may be addressed ii) The students should have better understanding of explosives
iii) The students to have better information on explosives as the terrorists weapon of
choice
7.1 Introduction: Why do terrorist chose the type of weapons they use? How do they go
about making the type of weapons to use? The lesson should guide the students through the
weapons, the impact and the availability.
7.1.2 Definition of explosives: It is a chemical compound or mixture ignited by
heat, shock, impact, friction, or a combination of these conditions and upon ignition,
decomposes rapidly in a detonation that causes a rapid release of heat and large quantities of
high-pressure gases that expand rapidly with sufficient force to overcome confining forces.
7.2 Types of explosives: there are three basic types of explosives 1) mechanical, 2) chemical,
and 3) atomic.
7.3 Classifications of explosives: there are three basic types of explosives 1) mechanical, 2)
chemical, and 3) atomic.
7.4 Identification: explosives are identified using these qualities: Effective energy, Velocity
of detonation, Density, Detonation pressure, Sensitivity, Water resistance, Physical
characteristics, Fume characteristics, Storage life.
7.4. 2 Methods used in the identification: a number of methods are used in the
identification of explosives including infrared, nuclear magnetic resonance and X-ray
fluorescence spectroscopies, mass spectrometry, and high-pressure liquid chromatography
and Raman spectroscopy.
7.5 Sources
7.6 Availability
7.7 Characteristics: Dynamites, Water Gels, Emulsions, and Slurries, Dry Blasting Agents,
Binary Explosives
Review Questions
i) How do you define an explosive?
ii) Give two sources for explosives?
iii) What are the methods used in the identification of explosives?
iv) How are explosives classified?
v) What are the qualities used in the identification of explosives?
21
References for further Reading
i) Hustrulid W, (1999), Blasting Principles for Open Pit Mining, Vol. 1, Balkema, Rotterdam.
ii) ICI Technical Services, 1995, ICI Explosives Blasting Guide, ICI Australia Operations.
iii) ICI Technical Services, 1997, Safe and Efficient Blasting in Underground Metal Mines, ICI Australia.
iv) Jimeno, C.L. and Jimeno, E.L., 1995, Drilling and Blasting of Rocks, A.A. Balkema, Rotterdam.
v) Mather, W., (1997), Bulk Explosives, Mining Technology, vol. 79, no. 914, pp. 251-254.New York. http://miningandblasting.wordpress.com/
22
CHAPTER EIGHT: IDENTIFICATION
Learning Objectives
i) To acquaint students with different weapons available to terrorists ii) to help the students understand why explosives are the weapons of choice for the
terrorists
iii) The students should have better understanding of explosives
iv) The students to have better information on explosives as the terrorists weapon of choice
v) To learn about the tactics used vi) To acquire knowledge on how the weapons are used
8.1 Introduction
8.2 Explosives: these are the most commonly used weapons by the terrorists because their
material and technology are more readily available. The terrorists can use either manufactured
or improvised explosives in public places and against a wide variety of institutions, vessels
and buildings. The devices are delivered by humans or transported in vehicles or mailed or
sometimes shipped. They are detonated directly or remotely by timing, tampering or impact.
8.2.1Common explosives: These are also known as the primary explosives: they
are popular with terrorists because the materials needed to make them are readily available.
8.2.2 There is the Triacetone-Triperoxide (TATP) which is an improvised primary
explosive that is relatively easy to manufacture.
8.2.3 The Hexamethlene Triperoxide Diamine (HMTD) an improvised primary explosive prepared from three basic precursors: hexamine, a weak acid, and hydrogen
peroxide. The product is highly sensitive to friction, impact, and electrostatic discharge.
8.3 Secondary explosives: Secondary explosives can be grouped into two categories
8.3.1 ANFO is a secondary/tertiary explosive, and requires little specialized skills or
machinery to mix. Ammonium Nitrate Fuel Oil (ANFO) is an explosive mixture of
ammonium nitrate and an organic fuel. Because of its ready availability and cheap material
cost, ANFO has been used extensively as the main charge in improvised weapons around the
world and is the most common commercial explosive.
8.3.2 Urea Nitrate: Nitrate is a high explosive produced by combining dissolved urea
fertilizer with nitric acid. Urea nitrate is formed as odorless crystals that are colorless to off-
white, although additives and or metal from the mixing container may alter the compounds appearance. Urea nitrate is used as a secondary explosive
8.4 Tactics used: terrorists use every and any tactic to ensure they achieve their goal. Some
of the tactics used are kidnapping tycoons; symbolically bombing monuments, use of
independent young militants to seize hostages, aerial bombings, widespread and large-scale violence against almost an open-ended category of opponents (i.e., all peoples who are not
members of the religious terrorists religion or cult).
23
? Review Questions
i) Write down four tactics used by terrorists ii) What are two common explosives used by terrorists iii) Give the other component that can be mixed with Urea Nitrate iv) Explain why terrorist opt to use explosives in their attacks v) Define the term explosives
References for further Reading.
i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY)
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press
iv) Lewis, I.R.; Daniel, N.W., Jr.; Chaffin, N.C.; Griffiths, P.R.; Tungol, M.W. . (2000).
Raman spectroscopic studies of explosive materials: towards a fieldable explosives
detector, Spectrochimica Acta Part A, Vol. 51.
24
CHAPTER NINE: FUNDING TERRORISM
Learning Objectives:
i) Learn the sources of funding for terrorists ii) Identify the types of funding iii) The states that fund terrorism iv) The inter-relationship between the terrorists and Drugs
INTRODUCTION
The sources of the very large funds required by the terrorists come from Corruption that
makes the illegal drug trade possible, facilitates and in turn feeds the umbilical cord that is the
terrorist lifeline, i.e. money. Illegal drugs are cheap to make but they return enormous
amounts of money since the demand is high and constant with an ever ready market.
Terrorists use drug profits to fund their cells to commit acts of murder.
9.1Funding: the sources of the very large funds required by the terrorists come from corruption that makes the illegal drug trade possible. The illegal trade is their most vital and
greatest source of funds. No other commodity, legal or not, exists on the market today that is
better than illegal drugs and that can generate such high and fast returns. The illicit drug trade is the most reliable source of income in the world, with a demand that is constant and continues to grow. Illegal drug money funds terrorist organizations and activities. Terrorists use drug profits to fund their cells to commit acts of murder.
9.2 The Evil-Nexus: This consists of drug trafficking organizations, organized crime, money
launderers, and terrorism. The Administration of the United States of America has identified
most of the countries and terrorist organizations that make up the Evil Nexus. These are the
countries that grow and produce the drugs and the organizations that sell them, profit from
them, and use those profits to finance terrorism that destroys the economy of the state. These
countries and organizations fund the Evil Axis of terrorism.
9.3 Costing: besides the operational costs terrorist groups need funds for planning, recruitment, procurement, preparation, delivery of materials, communications, persuasion,
propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of targets,
and assault on targets.
9.4 Financing Terrorism: this is defined broadly by the World Bank and International
Monetary Fund (IMF) as the financial support, in any form, of terrorism or of those who encourage, plan or engage in it. the number and seriousness of acts of international terrorism depend on the financing that terrorists obtain.
i
9.5 Financial Control: financial controls are necessary and important for curtailing acts of terrorism. this is by perform preventive, deterrent, investigative, and analytical functions,
9.6.1 Funding Techniques: Terrorism is funded from various sources and in many different
ways. The methods and sources used vary from country to country or region to region as well
25
as terrorist group to terrorist group. State financing state and other entities that directly or
indirectly are in such financing either by acts and omissions such as sheltering, facilitating,
funding and failure to adopt suppressive measures.
9.7 Categories: we have two categories depending on the origin: here we have two categories
depending on the origin:
9.8 Legitimate funding: Terrorists use a wide variety of methods to move money within and
between organisations, including the financial sector, the physical movement of cash by
couriers, and the movement of goods through the trade system. Charities and alternative
remittance systems have also been used to disguise terrorist movement of funds.
9.8.2 Illegal Funding: illegal funding: this source of financing comes from a great
variety of criminal actions, such as smuggling, almost all kinds of fraud, theft, stolen cars,
drug trafficking, kidnapping, robbery, extortion, petty crime, ID theft, money laundering, and
smuggling of money.
9.9 Moving the Funds: Terrorists use a wide variety of methods to move money within and
between organisations, including the financial sector, the physical movement of cash by
couriers, and the movement of goods through the trade system. Charities and alternative
remittance systems have also been used to disguise terrorist movement of funds.
?
Review Questions
i) Name two sources of finance for the terrorists.
ii) How is the money used for terrorism acts moved about?
iii) Using examples discuss one legitimate source of funding for the terrorists
iv) What are the other works, besides the operational costs terrorist groups need funds
for?
v) Discuss the evil-nexus in relation to funding terrorism and terror acts.
References for further Reading
i) www.un.org/terrorism/cttaskforce
ii) Kaplan Eben (2006) Tracking Down Terrorist Financing, available on http://www.cfr.org/publication/10356/#1.
iii) Kruse Anders (2003)Listing and of Natural Persons Challenges of Implementation on a State Level, Swiss EAPC/PfP Workshop on Combating Financing of Terrorism, Geneva. Levitt Matthew,( 2007) Blocking Terror
Finances, http://www.washingtoninstitute.org/templateC06.php?
(Zeidan, 2005:217).
26
CHAPTER TEN: INVESTIGATION: TERRORISTS RAISE, MOVE AND USE
FUNDS
LEARNING OBJECTIVES
Students should have knowledge on how investigations are carried out.
i) Who is investigated ii) Who is in charge of the investigations iii) How is the terrorist money raised iv) How is it spent. v) What is counter terrorism vi) How is the world handling terrorism
10.1 Introduction: Since the terrorist attacks of 9/11 there have been several legislation
policies drafted and designed to counter terrorism: these laws, policies and practices are
critical, as counter-terrorism measures but if not applied accordingly may be
counterproductive, especially if they fail to protect human rights, discriminate, increase
repression, or stigmatise and alienate certain groups. This can undermine the trust and
confidence needed for effective cooperation.
10.1.2 Definition: the offensive measures taken to prevent, deter, preempt, and respond to
terrorism.
10.2 Counter-terrorism: Counter-terrorism measures can contribute to the feelings among
certain groups, community or religions that they are being treated as a suspect community and targeted by authorities simply because of their religion color..
10.2.2 Counter-Terrorist Financing Efforts: four areas which could be the focus of
efforts to further strengthen counter-terrorist financing efforts: (1) action to address
jurisdictional issues including safe havens and failed states, (2) outreach to the private sector
to ensure the availability of information to detect terrorist financing, (3) building a better
understanding across public and private sectors and (4) enhanced financial intelligence to
exploit the value of financial investigation as a tool in fighting terrorism.
10.3 Jurisdictional Financial Investigation as a Tool in Fighting Terrorism. 10.4 Democracy and Domestic Terrorism:
10.5 Terror-Supporting Extremism;
10.6 Pejorative Use: The use of a word in a judgmental or harsh manner. For the word
terrorism it arises from the fact that the word terrorism has no widely accepted definition.
This has seen it being used and applied to situations that may otherwise not have been
considered as terrorist acts or forms of violence committed and considered terrorism. The
failure to have a consensus on what terrorism is makes the use of the word to be mis-used or
applied to situations that ought not to be considered terrorist situations. The lack of clear
definition has real and serious consequences on international efforts to counter the terrorist
threat, as states cannot adequately counteract a phenomenon that they absolutely agree must be eliminated as long as they fundamentally disagree on its very definition.
27
10.7 Types of Motivation to Terrorism Practices: Terrorism in general has many motivations depending on the special interests of the individual or cells. 10.8 Perpetrators: 10.9 Databases on Terrorism: This is a description and assessment of Internet-accessible
databases relevant for social science research on terrorism. The data details those websites
that provide actual data, e.g., names of terrorist organizations and incidents of terrorist
activity. Alongside the databases is an extensive list of additional resources that provide
commentary and analysis of terrorism events and trends. The databases will be used for
Deterring terrorism, detecting terrorism and disrupting terrorism acts.
10.10Mass media: the relationship between Media and terrorism is a complicated one. The
media is the first to report terrorist acts and this is important for a terrorist group as they
provide the publicity while spreading its message. If one sees terrorism as a communications
strategy, then the media has unfortunately or without intending to often helped pass the
terrorists message. At the same time, the media can also play an important part in countering
terrorism
10.10 Kenya and terrorism: Kenya is a key partner in the Global War on Terror (GWOT).
Kenya has been a target of several attacks: Nairobi and Dar es Salaam (Tanzania) USA
embassy attacks1998: In 2002, Kikambala Hotel attacks on Kenyas coast, while simultaneously shooting a surface to air missile at an Israeli commercial aircraft, which
luckily they narrowly missed the target, the Westgate Shopping Mall in Nairobi attack 2013,
which made international headlines and took the lives of 67 individuals from nearly a dozen
countries around the world. These have earned Kenya the reputation as a hub for terrorism,
violent extremism, and factionalism. There have been frequent small scale attacks randomly
carried out in-discriminatively on civilians. These attacks have seen some western countries
issuing security advisories for their nationals not to visit Kenya.
10.10.2 Kenya as an attractive target. Kenya is unfortunately an attractive target for
terrorist attacks. There are factors that have contributed to this attraction including, the
geography, ethnic composition, political stability, unstable neighbors, poverty, Islamic
fundamentalism, and lax law enforcement.
28
? Review Question
i) Why has Kenya been a target for the terrorists? ii) Has Kenya signed the anti-terrorism act? iii) The media works for the terrorists. Discuss iv) Define the term financial intelligence in relation to terrorism? v) What role can the citizens play in the fight against terrorism?
References for further Reading
i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)
i) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)
ii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iii) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues
(Los Angeles, CA: Sage, 616 pages, $80.00. [Paperback]
iv) Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
v) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $
vi) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)
vii) Alexander T.J. Lennon, et al. (2009) Democracy in U.S. Security Strategy: From Promotion to Support, Center for Strategic and International Studies, March
http://www.csis.org/media/csis/pubs/090319_lennon_democracy_web.pdf
29
Appendix 1: Project Classification Codes1
Appendix 2: Sample Test Papers
DEPARTMENT OF SECURITY AND SOCIAL STUDIES
End of Semester Examinations
BJS3105: INTRODUCTION TO TERRORISM
Time: 2 Hrs
Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.
QUESTION 1
i) Discuss the characteristics of terrorism(8mks)
ii) Explain the meaning of the following terms
a) Deterring terrorism. (5mks) b) Detecting terrorism. (5mks)
c) Disrupting terrorism acts(5mks)
d) Databases on Terrorism(3mks) What is the difference between the old terrorism and the new terrorism (4mks?)
QUESTION 2 (10mks each)
a) With illustrations show how terrorism has evolved over time(10mks) b) Terrorism in general has many motivations depending on the special interests of the
individual or cells. Discuss (10mks)
QUESTION 3 (10mks each)
a) Define the term counter-terrorism(5mks) b) Discuss some of the motivations for terrorism (10mks)
c) Using examples discuss one legitimate source of funding for the terrorists (5mks)
QUESTION 4 (10mks each)
Ideology plays a very big part in the motivation for terrorist attacks. Using examples discuss
the statement. (10mks)
a) Discuss the meaning of the term legitimate funding in relation to funding of terrorism(10mks)
b) besides the operational costs terrorist groups need funds for planning, recruitment, procurement, preparation, delivery of materials, communications, persuasion,
propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of
targets, and assault on targets. Discuss. (10mks)
30
QUESTION 5
a) Discuss three types of explosives. (10mks).
b) Discuss the following types of terrorism (10mks)
i) State-Sponsored terrorism ii) Religious Terrorism iii) Nationalist Terrorism
31
DEPARTMENT OF SECURITY AND SOCIAL STUDIES
End of Semester Examinations
BJS3105: INTRODUCTION TO TERRORISM
Time: 2 Hrs
Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.
QUESTION 1 (3mks each)
a) Explain the meaning of the following terms i) ideological zeal ii) Oppression: portrayal of governments (and their actors) as oppressive. iii) Historical grievances: iv) Resentment and revenge v) Violations of international law: vi) Discriminated vii) Hatred Vii) Racism:
xi) Legal funding for terrorist acts
QUESTION 2 (10mks each)
a) Discuss why explosives are the most preferred weapons for terrorist attacks (10mks). b) Using examples describe four tactics used by terrorists (10mks)
QUESTION 3(10mks) a) We have two categories of funding for terrorist acts. Discuss two sources of illegal
funding (10mks)
b) The use of violence, negotiation and international conventions to create international norms in are some of the methods used in opposing terrorism. Discuss(10mks)
QUESTION 4 (10 mks each)
a) Describe four of the six types of terrorists that have been identified (10mks)
b) Some of the characteristics of new terrorism are the ultra-flexible network, less hierarchical
organizational structure and the efficient state-of-the-art technologies. Discuss (10).
QUESTION 5 a) Describe the four waves of the evolution of terrorism (8mks) b) Define the term criminal violence and show how it differs from terrorism (6mks) c) In what ways do you think terrorism is different from politics(6mks)
32
i Worldbank website
Recommended