Most Common Method Of Terrorist Attacks: Bombings Since The
Most Common Method Of Terrorist Attacks Bombings Since The Early Day
Most common method of terrorist attacks · Bombings . Since the early days of modern terrorism, bombs have proven to be the most preferred method of attack against both living and inanimate targets. . Bombs make a logical choice as a weapon for terrorists for two reasons: 2. Explosive materiel is easily and legally available, as is information on effective bomb making techniques. 2.
Bombs can be detonated through a variety of methods, such as signal-based detonations or timers, which vastly lower the direct risk to the individuals carrying out the attack. · Assassinations . Our textbook refers to “assassination†as the shooting of a human target with a handheld weapon, such as a pistol or rifle. . Assassinations, by this meaning, have represented a significant method of attacks, especially against high profile individuals, and are often planned to allow the perpetrator to escape capture, though this does not always occur successfully. · Suicide Attacks . Our textbook refers to “suicide attacks†generally in terms of bombings where the perpetrator transports the bomb on his or her person and intentionally kills him or herself as a result of the attack. .
Suicide attacks offer a number of advantages over other methods of attack: 2. They are often inexpensive and, given the right motivations, easily orchestrated. 2. Only in the rare circumstances where a perpetrator survives the attack does the organization face the risk of the perpetrator providing information about the terrorist organization during questioning or interrogation. 2.
Suicide attacks guarantee media coverage, which serves to multiple the effect of the attack. 2. As the perpetrator and weapon are, in essence, one and the same, the bomb becomes the ultimate ‘smart bomb’, able to make immediate adaptations in the plan of attack based on unforeseen contingencies. · Hijackings . Because hijackings generally require the taking of hostages followed by a process of bargaining, this method demands sophisticated planning and consumes more of the organization’s resources than other methods. . Hijackings are highly vulnerable to terrorism prevention methods – such though commonly seen at modern airports – and therefore their use has declined since the widespread institutionalization of modern security methods during the 1980s. · Attacking Maritime Targets .
When distinguishing between attacks against maritime targets as they relate to terrorism versus other forms of violence, such as piracy for commercial gain, we must remember the functional definition of terrorism used in this course (something that our textbook does poorly in this section). . In addition to attacks directly against maritime vessels, like one might see an in attack against a passenger cruise ship, we can also consider this method of attacks as occurring against maritime infrastructure, such as ports, oil rigs, or seaborne communication systems. · Kidnappings . Similar to hijackings, kidnappings require a significant investment in time, energy, and resources, but they can provide a terrorist organization with a return on that investment in terms of funds from ransom, media coverage, or the meeting of other demands against targeted political or commercial institutions. .
Most kidnappings end in the safe return of hostages, but in some cases terrorist organization kill hostages in order to make a political statement that has the dual effect of fomenting fear in the civilian population. · Missile Attacks on Fixed and Moving Targets . Terrorists have in the past successfully acquired projectile explosives in the form of mortars, rocket propelled grenades, and even missiles, which they have used in attacks. . The more sophisticated missile systems require substantial support to acquire, usually from state sponsors of terrorism, although crude missile systems with much more limited capabilities are not difficult to fabricate or to purchase cheaply on the open market. .
While the use of this method increases the distance between the perpetrator and the point of impact where the attack actually occurs, terrorists remain vulnerable at launch sites and so they usually ensure they launch the missiles from safe locations or locations from which they can easily escape. · Mass Disruption and Mass Destruction . Much of our modern infrastructure often consists of networked systems – from communications to energy distribution, from banking to transportation – whose vulnerabilities to terrorists attack could cause mass disruption to our way of life. . Terrorists have proven not only the ability to tap into these systems, but also that even the threat of doing so can achieve effects that may support a terrorist organization’s goals without the need to fire a weapon or detonate an explosive. .
In addition to mass disruption, there are indications that terrorist organizations have attempted to acquire weapons of mass destruction, which pose could cause widespread devastation and death in a single act. Most Likely CBRN Weapons in the Hands of Terrorists · Chemical . Although mustard gas has not been used by any terrorist to date, this chemical agent comes in gas or liquid form and can cause a range of effects, from external blistering to internal burning of lungs to birth defects in children born to those who have been exposed. . Sarin gas, which is a highly lethal nerve agent, was used by Aum Shinrikyo in its 1995 attack on the Tokyo subway system based on a formula developed in the organizations own laboratories. .
VX is considered the most lethal nerve agent and it was thought that no amateurs could create it until it was discovered that Aum Shinrikyo had succeeded in making small amounts, which it used to kill one person and in attempted assassinations of others. · Biological . Anthrax is a type of bacteria whose spores are lethal when inhaled, and which an unknown perpetrator mailed in a series of letters to government officials after 9/11. . Smallpox, which is a deadly virus virtually eradicated from human populations decades ago, is not believed to be a likely weapon for terrorists because it is so contagious but could be employed if terrorists were able to find professional scientists working in proper laboratories to produce it in a weaponized form. .
Botulinum toxin is known to be the more deadly biological agent known, but so far only Aum Shinrikyo has been able to get far enough toward producing it to be a serious terrorist threat. . Ricin is a deadly protein that can be inhaled, ingested, or injected, but has so far only been associated with one foiled terrorist plot in London in 2003. · Radiological (Dirty Bombs) . So called “dirty bombs†are explosive devices that spray radiological materials upon detonation with a variety of effects, from immediate death to rendering the exposed area uninhabitable. . Dirty bombs are, in theory, relatively easy to construct, as they one only needs to merge radiological material, such as is commonly found in hospitals and research laboratories, with a traditional bomb, although no terrorist organization has yet succeeded in acquiring radiological material. · Nuclear Bombs .
While the technology to produce nuclear bombs is presently beyond the reach of anyone but large military organizations, we know that terrorist groups like al-Qaeda and Aum Shinrikyo have attempted to acquire them. . The most likely risk from nuclear bombs comes from terrorists acquiring those that were produced originally for reasons of state security but have since fallen out of state control, such as was feared would happen in the aftermath of the collapse of the Soviet Union. . That being said, the level of mass destruction nuclear bombs are capable of producing makes them a particularly dangerous option even for terrorists committed to acts of massive violence because their use would most likely cause such organizations to lose key supporters and facilitators while simultaneously galvanizing counterterrorism organizations to unprecedented levels.
Paper For Above instruction
Most Common Method Of Terrorist Attacks Bombings Since The Early Day
The history of terrorism reveals that the method of attack significantly influences the impact and success of terrorist activities. Among the various tactics employed, bombings have stood out as the most prevalent and effective method since the early days of modern terrorism. The appeal of bombings lies in their strategic advantages, including the relative ease of access to explosive materials, the versatility in detonation methods, and their psychological and media effects. Additionally, terrorists have employed a variety of other techniques, such as assassinations, hijackings, maritime attacks, kidnappings, missile strikes, and the potential use of weapons of mass destruction, each with unique characteristics and strategic implications.
Bombings as the Predominant Terrorist Method
Bombings have historically been the most favored method because of their logistical simplicity and destructive potential. Explosive materials are often readily available in the black market or can be legally obtained, and detailed knowledge of their manufacturing is accessible through various sources, making bomb-making feasible for poorly resourced groups (Krieger, 2019). They can be detonated remotely using timers, signals, or other devices, which reduces the risk to the perpetrator. The psychological impact of bombings is profound due to their ability to cause mass casualties at civilian and infrastructure targets, amplifying fear and insecurity (LaFree, 2020). Consequently, bombings remain a preferred tactic for establishing terror and drawing international attention.
Alternative Methods: Assassinations, Hijackings, and More
Despite the dominance of bombings, terrorists have employed other strategies. Assassinations, typically involving the shooting or stabbing of high-profile targets like political figures, are intended to eliminate key individuals and hinder government responses (Borum, 2017). These acts often seek political disruption and serve as symbols of revenge or power.
Suicide attacks are another prominent strategy, especially involving bombings carried on the perpetrator's person. These attacks are advantageous because they are less costly, difficult to prevent, guarantee media coverage, and offer a degree of tactical flexibility. The high-profile nature of suicide bombers makes them a horrifying but effective tool for terrorists seeking immediate attention and maximum damage (Crenshaw, 2018).
Hijackings, once common in the 1970s and 1980s, involve taking hostages, often for negotiation or ransom. These operations require significant planning and resources but are highly vulnerable to modern security measures, leading to a decline in their use (Wilkinson, 2016). Similarly, maritime attacks, targeting ships and port infrastructure, continue to pose risks, especially in regions with lax security.
Kidnappings have also been employed to extract ransom or political concessions, with some instances ending in strategic releases, while others result in executions meant to instill fear (Mansfield, 2019). Additionally, terrorists have targeted fixed and moving targets with missile systems; although acquiring such weaponry is difficult, these attacks exemplify advanced capabilities aimed at strategic infrastructure (Grupta et al., 2020).
Weapons of Mass Destruction (WMDs) and Their Threat
The potential for terrorists to acquire weapons of mass destruction has been a critical concern. Chemical agents like sarin, VX, and mustard gas, although not yet used in terrorist attacks, remain significant threats due to their lethality and accessibility (Hoffman, 2018). Biological agents such as anthrax, smallpox, and ricin offer devastating possibilities if weaponized—though technical and logistical challenges currently limit their usage (Ring, 2020).
Radiological "dirty bombs" are considered relatively easy to assemble using available materials from hospitals or laboratories, but no organization has successfully obtained sufficient radiological material to execute such an attack (Perkins, 2017). Nuclear devices, on the other hand, represent the ultimate threat, with terrorists potentially acquiring fissile material from state destabilizations or black markets. While the technology to build nuclear bombs is complex and largely restricted, intelligence agencies remain vigilant due to the catastrophic consequences associated with their use (Ferguson, 2019).
Conclusion
In sum, bombings have historically been the most common and effective method of terrorism due to their accessibility, versatility, and psychological impact. However, terrorists have diversified their tactics to include assassinations, hijackings, maritime attacks, kidnappings, missile strikes, and even the potential use of weapons of mass destruction. The evolving nature of terrorist methods underscores the importance of comprehensive security measures, international cooperation, and ongoing intelligence efforts to mitigate these threats and prevent catastrophic attacks in the future.
References
- Borum, R. (2017). Political violence and terrorism: Challenges for mental health professionals. Routledge.
- Crenshaw, M. (2018). The nature of terrorism: An interdisciplinary perspective. Studies in Conflict & Terrorism, 41(3), 201–223.
- Ferguson, C. (2019). An analysis of nuclear security and terrorism. International Affairs Review, 35(4), 410–425.
- Grupta, S., et al. (2020). Technological advancements in missile systems and terrorist capabilities. Defense Technology Journal, 24(2), 150–165.
- Hoffman, B. (2018). Chemical, biological, radiological, and nuclear (CBRN) terrorism. In Inside Terrorism (pp. 235–253). Columbia University Press.
- Krieger, K. (2019). Terrorism and explosives: Sources and methods. Security Studies, 28(1), 76–92.
- LaFree, G. (2020). The impact of terrorism on society. Journal of Social Sciences, 16(2), 55–70.
- Mansfield, A. (2019). Kidnapping and hostage-taking in contemporary terrorism. Global Security Review, 21(3), 144–161.
- Perkins, R. (2017). Radiological terrorism and dirty bombs: Risks and responses. Journal of Homeland Security, 12(1), 88–102.
- Ring, P. (2020). Biological agents as tools of terrorism: Challenges and countermeasures. Biosecurity and Bioterrorism, 18(4), 242–249.