SlideShare une entreprise Scribd logo
1  sur  44
Chapter 2 
Babette Protz 
University of 
South 
Carolina 
Lancaster 
THE SOCIAL 
UNDERPINNINGS OF 
TERRORISM
LEARNING OBJECTIVES: CHAPTER 2 
 Outline differing approaches for understanding 
social reality. 
 Define the elements of netwar. 
 Describe terrorism as a religious process. 
 Define practical criminology as used by security 
forces. 
 Describe the differences between terrorist and 
criminal behavior. 
2
LEARNING OBJECTIVES: CHAPTER 2 
 Explain the reason terrorists and counter terrorists 
need to justify violence. 
 Summarize studies of the ways terrorist violence is 
justified. 
 Describe three views in the profiling debate. 
 Outline differing points of view about radicalization 
and alienation. 
3
TERRORISM AS A SOCIAL PROCESS 
 The social process is influenced by individual 
psychological interpretations of group members. 
 Individuals take actions within associations 
 Applying an individualized understanding of reality 
 Reacting to environmental stimuli and motivators 
4
MEANING FRAMEWORK 
 Theories about terrorism in the meaning framework 
focus on: 
 The interpretation individuals and groups give to the 
actions of others 
 The circumstances in which the subjects define their roles 
5
MEANING FRAMEWORK 
 Violent religious movements and the organizational 
structures they create are rooted in the ways certain 
groups of people view reality 
6
STRUCTURAL FRAMEWORK 
 Another social science tradition seeks to avoid 
subjective meanings when examining events. 
 Human societies create organizations to accomplish 
certain required functions. 
 Approaches to understand terrorist behavior by 
looking at the way organizations function – 
structural framework. 
7
STRUCTURAL FRAMEWORK 
 Organizations develop according to the 
needs of a society or a group of people 
 Such organizations take predictable actions, 
and serve predictable functions 
8
STRUCTURAL FRAMEWORK 
 All groups, including terrorist organizations, take 
action because they belong to a structure that 
operates for a specific purpose – social geometry 
 Terrorism develops when a group with inferior power 
moves against a superior group- usually results in 
mass civilian casualties 
9
STRUCTURAL APPROACHES | NETWAR 
 There are other structural approaches to terrorism 
that believe terrorists are united through networks 
 Terrorist organizations are structured in the same 
manner as communication and transportation 
systems 
10
STRUCTURAL APPROACHES | NETWAR 
 The traffic pattern on the highway is like a network 
– the crucial intersections, merge ramps, and 
expanded traffic lanes are nodes. 
 If vehicles begin clogging at a node, traffic slows or comes 
to a standstill at many points in the network. 
 Disrupting terrorist networks has the same effect on terrorist 
operations. 
11
STRUCTURAL APPROACHES | NETWAR 
 Any point where information, weapons, or personnel 
are gathered or exchanged is called a node 
 The node is the critical target for counterterrorist 
operations 
 If the node is destroyed, the network is disrupted 
12
ANTHROPOLOGICAL AND 
SOCIOLOGICAL APPROACHES 
 Two primary factors account for the continued 
influence of religion: 
 First, religion has always been an important influence in 
the history of humanity. 
 Second, modernization tends to break down 
communities, families, and social orientation. 
13
RELIGIONS, POWER AND VIOLENCE 
 http://www.youtube.com/watch?v=XpKSTzziVTY 
Discussion: 
 What is your view regarding the connection between 
religion and terrorism? Support your view. 
 It was stated that the cause of violence is not religion 
itself, but manipulation of religion; others say violence is 
caused by religious teachings of intolerance. Which do 
you believe, or do you believe it to be a combination. 
Support your view. 
14
TERRORISM AS A RELIGIOUS PROCESS 
 Strong religious beliefs increase: 
 The likelihood of religious conflict. 
 The intensity of fighting. 
 Violence results when sacred traditions are 
threatened. 
15
TERRORISM AS A RELIGIOUS 
PROCESS 
 Eschatology plays a major role: 
 Messianic warriors in the end-time correct the heresies 
of the past and fight for the ideal divine order of a deity. 
 Empirical findings demonstrate that terrorism is 
partially a religious process. 
16
LONE WOLF 
 Religion helps to produce the “lone-wolf avenger” : 
 A person who has a particular ideology but isn’t part of a 
group 
 An individual lone-wolf avenger needs to find some 
type of justification for his or her actions, and 
religion provides the perfect path 
17
LONE WOLF 
 Lone-wolf avengers have a special, narcissistic 
relationship with their deities. 
 They create a god in their own image. 
 They become the ultimate loners – they are the most 
difficult type of terrorist to deter or detain. 
18
TERRORISM AS A RELIGIOUS PROCESS 
 Despite utilization of sacred stories and cosmic 
mythologies, there is a very limited official 
religious basis for terrorism 
 Religious terrorists are lethal – religious terrorist 
groups killed more people with fewer attacks than 
secular terrorists. 
 Religious terrorists are deadlier than their secular 
counterparts. 
19
TERRORISM AS A RELIGIOUS PROCESS 
 People use stories to explain deep truths beyond 
the immediate world 
 Terrorist groups build their own mythologies to justify 
their actions through a story. 
 Stories change the nature of terrorist 
organizations – they help to produce different 
group organizations and styles. 
20
IS ISLAM A RELIGION OF PEACE? 
 http://www.youtube.com/watch?v=rh34Xsq7D_A&feature=! 
Discussion: 
 This presentation is a debate on the Islamic religion. The 
motion of this debate is: Islam is a religion of peace. 
 As did the audience in the clip, you will vote pre- and post-debate. 
 Pre-debate: On a slip of paper write Yes if you agree; No if you do 
not agree; or Undecided. Hand in your votes. 
 Post-debate: Using the same method, vote again. 
 What is the overall consensus of the class? Was there a 
measurable change in views? 
21
CRIMINOLOGY 
 Criminology as applied to terrorism looks at 
prevention and apprehension 
 Terrorists commit crimes as they struggle for a 
cause; they sets them apart from ordinary street 
criminals 
 As first responders, law enforcement personnel 
must recognize the differences between typical 
criminal behavior and terrorist activity 
22
PRACTICAL BEHAVIORAL DIFFERENCES 
Terrorists 
1. Focus their actions toward a 
goal 
2. Are dedicated to a cause 
3. Rarely cooperate with officials 
because they do not wish to betray 
their cause 
4. Tend to attack 
5. Strike against targets after careful 
planning 
6. Prepare for and rehearse their 
operations 
Criminals 
1. Are unfocused 
2. Are not devoted to crime as a 
philosophy 
3. Will make deals to avoid 
punishment 
4. Usually run when confronted 
with force 
5. Strike when the opportunity to 
do so is present 
6. Rarely train for crime 
23
ORGANIZED CRIME VERSUS TERRORIST 
 http://www.youtube.com/watch?v=P7-klWyj7gA&feature=player_Discussion Questions: 
 What distinctions does the analyst make between organized 
crime and terrorism? Do you agree with her distinctions? 
Support your response. 
 Are there other distinctions she did not include? 
 The analyst states that the Mexican Cartel has not yet reached 
the level of what is considered terrorist activity. Do you agree 
or disagree with her statement? Support your position. 
24
JOINT TERRORISM TASK FORCES 
(JTTFS) 
 Allows the FBI to coordinate law enforcement 
resources in the face of domestic terrorism and to 
expand investigations. 
 Focus on ideology, group, and individual behaviors 
 Information sharing over broad geographical 
25
JUSTIFYING TERRORISM 
 Deadly force demands the greatest amount of 
justification 
 Terrorists have the same need for social approval, 
but they rarely obtain it because their actions are 
not sanctioned by the governments they attack 
 Terrorists must look outside normative social channels to 
gain approval for their acts 
26
JUSTIFYING TERRORISM 
 Borum: no standard rationale for justifying 
behavior. 
 Victoroff: multiplicity of factors used to justify 
violence. 
 Post: us against them mentality. 
 The rejection of external authority results in the 
acceptance of internal authority 
27
JUSTIFYING TERRORISM 
 In order for social acceptance to be gained, the 
terrorist group must be isolated from mainstream 
society. 
 Processes used by American criminal gangs and 
Arab suicide bombers are the same. 
28
PROFILING THE TERRORIST PERSONALITY 
 Staub and McCauley believe that certain types of 
people are drawn toward terrorist groups. 
 McCauley sees four types of personalities: 
 Revolutionaries drawn to a cause 
 People who wander among terrorist groups, 
 People who have a sudden conversion experience 
 People who are attracted by peers 
29
PROFILING THE TERRORIST PERSONALITY 
 Given the nature of the terrorist, profiling terrorists 
has sparked heated debate. 
 Researchers argue that the differences in 
backgrounds and ethnicities prohibit accurate 
profiles. 
 Can an accurate profile be made, in your opinion? 
30
PATH AND ROUTES 
 Horgan believes researchers should search for the 
“routes to terrorism.” 
 Horgan is concerned with: 
 The psychological processes that lead people to terrorist 
groups. 
 The issues that keep them in the group. 
 The support for people who want to leave. 
31
RADICALIZATION & ALIENATION 
 As with other areas of terrorism, the areas of 
radicalization and alienation are fraught with 
differing views and suggestions for research. 
 Researchers will obtain more fruitful results by 
examining militant ideology and finding the 
concepts that are shown to attract followers. 
32
HOMEGROWN RADICALIZATION 
 http://www.youtube.com/watch?v=XCOp7nTTW1U 
 Discussion: 
 It was presented that data analysis and social network 
analysis can be effective tools in the prevention of 
terrorism. Does this align with your thoughts on 
homegrown radicalization? Explain your view. 
33
RESEARCH IN GROUP PROCESSES 
 A number of researchers believe members of 
terrorist groups go through decision-making 
processes as they are being radicalized 
 The general knowledge of radicalization is incomplete 
34
SAGEMAN’S MODEL 
 Radicalization is a six-step framework. 
 Alienated young man 
 Meets other alienated young men and form bond 
 Groups gravitate toward religion 
 Religion interpreted in militant terms 
 Militant group meets terrorist contact 
 Militants join terrorists as a group decision 
35
GROUPS IN PRISON 
 Recent reports suggest that groups are being 
radicalized in prison. 
 A leader often targets selected prisoners or 
dominate new inmates using intimidation to force 
intimidating them until they join the group. 
 Mark Hamm maintains recruitment is similar to 
procedures used by street gangs. 
36
RADICALIZATION IN PRISON 
 http://www.youtube.com/watch?v=QVh5amMncD0 
 Discussion: 
 What is your view on the radicalization of prisoners to 
Islam? Support your view. 
 Is this an area that requires attention by the prison 
system, Homeland Security, or as a joint effort. 
37
INDIVIDUAL RADICALIZATION 
 Evidence suggests radicalization is not always a 
group process 
 At the least – it involves individual reflection whether a 
group plays a role or not. 
 Research indicates individual psychological and 
sociological factors create the framework for 
interpreting reality. 
38
CASES OF RADICALIZATION 
 Individual cases in the U.S.: 
 Umar Farouk Abdulmutallab 
 Destroy a Northwest airliner as it entered American airspace. 
 James W. von Brunn 
 Shooting in the U.S. Holocaust Memorial Museum in Washington, 
D.C. 
 Omar Hammami – Muslim father and Christian mother – 
identity conflict 
 His identity conflict ended when he embraced a violent, intolerant 
form of Islam to become a commander in Al Shabaab. 
39
COMMONALITIES IN RADICALIZATION 
 Using previous three individuals – several common 
forms of behavior. 
 First all three men all came from well-to-do, middle-class 
environments. 
 The New York Times reports that most international attacks against 
the U.S. in the 21st Century have come from well-educated terrorists 
from the middle class. 
 Second, all three men became deeply angered and filled with 
moral indignation. 
 Alienated from mainstream thought as they expressed anger, and 
they sought to address their situations by doing something 
meaningful. 
 Lastly, there was some type of event that triggered their final 
decision to take violent action. 
40
COMMONALITIES IN RADICALIZATION 
 Several common forms of behavior. (cont) 
 Second, all three men became deeply angered and filled 
with moral indignation. 
 Alienated from mainstream thought as they expressed anger, and 
they sought to address their situations by doing something 
meaningful. 
 Lastly, there was some type of event that triggered their 
final decision to take violent action. 
41
RESEARCH CRITICIZED 
 The idea that research in radicalization and 
alienation will produce valuable knowledge is 
debated. 
 No general consensus about the definition of 
radicalization. 
 Term is utilized in a variety of different contexts. 
 Suggested that more beneficial results would be 
gained through the examination of militant ideology 
and concepts that attract followers. 
42
CHAPTER TAKE-AWAYS 
 Terrorism is a social process that can be studied with the 
same methods used by social scientists. 
 One method is to search for meanings behind actions. 
 The second method used to analyze terrorism is to look for 
structures. 
 Social geometry shows movement within structures. 
 The netwar metaphor represents a practical application of this 
technique. 
 Researchers who believe that modern terrorism has been 
changed by religion look for meanings that drive actions. 
43
CHAPTER TAKE-AWAYS 
 Security forces search for practical behavior clues that 
can be used against terrorists. 
 Researchers search for the ways in which terrorist 
behavior differs from normal criminals. 
 They seek an understanding of the ways terrorists justify 
violence. 
 Some researchers have tried to model terrorism by 
profiling terrorists or looking for models of radicalization 
and alienation. 
44

Contenu connexe

Tendances

Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & ResponseShahid Hussain Raja
 
Terrorism Major problem of Pakistan
Terrorism  Major problem of PakistanTerrorism  Major problem of Pakistan
Terrorism Major problem of PakistanHassan Mansoor
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed docHassan Shahzad
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
40 short essay on terrorism in english the college study
40 short essay on terrorism in english   the college study40 short essay on terrorism in english   the college study
40 short essay on terrorism in english the college studyMary Smith
 
Handbook on security sector governance
Handbook on security sector governanceHandbook on security sector governance
Handbook on security sector governanceKayode Fayemi
 
Religious Extremism
Religious ExtremismReligious Extremism
Religious Extremismgtansill
 
Chapter 4 lecture 5, 6 social action / Interactiion
Chapter 4 lecture 5, 6 social action / Interactiion Chapter 4 lecture 5, 6 social action / Interactiion
Chapter 4 lecture 5, 6 social action / Interactiion Liaqat Jogi .
 
Crime and deviance
Crime and devianceCrime and deviance
Crime and devianceSUMMAH aswin
 
Religious fundamentalism
Religious fundamentalismReligious fundamentalism
Religious fundamentalismAli Haider
 
Fascism introduction
Fascism introductionFascism introduction
Fascism introductionlashkarali1
 
Risk society and covid 19
Risk society and covid 19Risk society and covid 19
Risk society and covid 19Daya Vaghani
 
Role of USA, Soviet Union and China in liberation 1971
Role of USA, Soviet Union and China in liberation 1971Role of USA, Soviet Union and China in liberation 1971
Role of USA, Soviet Union and China in liberation 1971Reyad Hossain
 

Tendances (20)

Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Terrorism Major problem of Pakistan
Terrorism  Major problem of PakistanTerrorism  Major problem of Pakistan
Terrorism Major problem of Pakistan
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
Social Action
Social ActionSocial Action
Social Action
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
CPH School of IR
CPH School of IRCPH School of IR
CPH School of IR
 
40 short essay on terrorism in english the college study
40 short essay on terrorism in english   the college study40 short essay on terrorism in english   the college study
40 short essay on terrorism in english the college study
 
Suicide
SuicideSuicide
Suicide
 
Conflict, Security and Development
Conflict, Security and DevelopmentConflict, Security and Development
Conflict, Security and Development
 
Extremism, Terrorism: Mad, Bad, or Both?
Extremism, Terrorism: Mad, Bad, or Both? Extremism, Terrorism: Mad, Bad, or Both?
Extremism, Terrorism: Mad, Bad, or Both?
 
Handbook on security sector governance
Handbook on security sector governanceHandbook on security sector governance
Handbook on security sector governance
 
Religious Extremism
Religious ExtremismReligious Extremism
Religious Extremism
 
Chapter 4 lecture 5, 6 social action / Interactiion
Chapter 4 lecture 5, 6 social action / Interactiion Chapter 4 lecture 5, 6 social action / Interactiion
Chapter 4 lecture 5, 6 social action / Interactiion
 
Crime and deviance
Crime and devianceCrime and deviance
Crime and deviance
 
Religious fundamentalism
Religious fundamentalismReligious fundamentalism
Religious fundamentalism
 
Fascism introduction
Fascism introductionFascism introduction
Fascism introduction
 
Terrorism
TerrorismTerrorism
Terrorism
 
Risk society and covid 19
Risk society and covid 19Risk society and covid 19
Risk society and covid 19
 
Terrorism
TerrorismTerrorism
Terrorism
 
Role of USA, Soviet Union and China in liberation 1971
Role of USA, Soviet Union and China in liberation 1971Role of USA, Soviet Union and China in liberation 1971
Role of USA, Soviet Union and China in liberation 1971
 

Similaire à C02.8 the social underpinnings

Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorismJaseme_Otoyo
 
White7e ppt ch02
White7e ppt ch02White7e ppt ch02
White7e ppt ch02difordham
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremismMark Levy
 
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docx
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docxManekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docx
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docxalfredacavx97
 
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for TerrorismThe Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorisminventionjournals
 
Goals and motivations of terrorism
Goals and motivations of terrorismGoals and motivations of terrorism
Goals and motivations of terrorismarpslides
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyPatrick Thomas Cannon
 
Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1adnanshaikh
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorismJames Feldkamp
 
19 Mar 2014, Ideology Radicalisation
19 Mar 2014, Ideology Radicalisation19 Mar 2014, Ideology Radicalisation
19 Mar 2014, Ideology RadicalisationYuliya Pismennaya
 
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...Belayneh Zelelew
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...PublicLeaks
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...PublicLeaker
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorMatthew Boutross
 

Similaire à C02.8 the social underpinnings (20)

Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorism
 
White7e ppt ch02
White7e ppt ch02White7e ppt ch02
White7e ppt ch02
 
Addressing extremism
Addressing extremismAddressing extremism
Addressing extremism
 
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docx
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docxManekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docx
Manekshaw PaPer no. 69, 2017KNOWLEDGE WORLDKW Publishe.docx
 
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for TerrorismThe Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorism
 
Goals and motivations of terrorism
Goals and motivations of terrorismGoals and motivations of terrorism
Goals and motivations of terrorism
 
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic InsurgencyTactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
 
Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Psychology_of_Terrorism
Psychology_of_TerrorismPsychology_of_Terrorism
Psychology_of_Terrorism
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
Lecture 9 counter terrorism
Lecture 9   counter terrorismLecture 9   counter terrorism
Lecture 9 counter terrorism
 
19 Mar 2014, Ideology Radicalisation
19 Mar 2014, Ideology Radicalisation19 Mar 2014, Ideology Radicalisation
19 Mar 2014, Ideology Radicalisation
 
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
COVID 19 lockdown! A breeding ground for online radicalization to violent ext...
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
 
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report  psychological and sociological concepts of r...Asymmetric warfare group report  psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Essay On Terrorism In India
Essay On Terrorism In IndiaEssay On Terrorism In India
Essay On Terrorism In India
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
 

Plus de Matthew Boutross

Plus de Matthew Boutross (9)

Crj310 chap5
Crj310 chap5Crj310 chap5
Crj310 chap5
 
Hess10 chap4
Hess10 chap4Hess10 chap4
Hess10 chap4
 
Hess10 chap3
Hess10 chap3Hess10 chap3
Hess10 chap3
 
Hess10 chap2
Hess10 chap2Hess10 chap2
Hess10 chap2
 
Hess10 chap1
Hess10 chap1Hess10 chap1
Hess10 chap1
 
C06.8 international terrorism national and ethnic movement
C06.8 international terrorism   national and ethnic movementC06.8 international terrorism   national and ethnic movement
C06.8 international terrorism national and ethnic movement
 
C03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorism
 
C01.8 terrorism
C01.8 terrorismC01.8 terrorism
C01.8 terrorism
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the media
 

Dernier

Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Dernier (20)

Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 

C02.8 the social underpinnings

  • 1. Chapter 2 Babette Protz University of South Carolina Lancaster THE SOCIAL UNDERPINNINGS OF TERRORISM
  • 2. LEARNING OBJECTIVES: CHAPTER 2  Outline differing approaches for understanding social reality.  Define the elements of netwar.  Describe terrorism as a religious process.  Define practical criminology as used by security forces.  Describe the differences between terrorist and criminal behavior. 2
  • 3. LEARNING OBJECTIVES: CHAPTER 2  Explain the reason terrorists and counter terrorists need to justify violence.  Summarize studies of the ways terrorist violence is justified.  Describe three views in the profiling debate.  Outline differing points of view about radicalization and alienation. 3
  • 4. TERRORISM AS A SOCIAL PROCESS  The social process is influenced by individual psychological interpretations of group members.  Individuals take actions within associations  Applying an individualized understanding of reality  Reacting to environmental stimuli and motivators 4
  • 5. MEANING FRAMEWORK  Theories about terrorism in the meaning framework focus on:  The interpretation individuals and groups give to the actions of others  The circumstances in which the subjects define their roles 5
  • 6. MEANING FRAMEWORK  Violent religious movements and the organizational structures they create are rooted in the ways certain groups of people view reality 6
  • 7. STRUCTURAL FRAMEWORK  Another social science tradition seeks to avoid subjective meanings when examining events.  Human societies create organizations to accomplish certain required functions.  Approaches to understand terrorist behavior by looking at the way organizations function – structural framework. 7
  • 8. STRUCTURAL FRAMEWORK  Organizations develop according to the needs of a society or a group of people  Such organizations take predictable actions, and serve predictable functions 8
  • 9. STRUCTURAL FRAMEWORK  All groups, including terrorist organizations, take action because they belong to a structure that operates for a specific purpose – social geometry  Terrorism develops when a group with inferior power moves against a superior group- usually results in mass civilian casualties 9
  • 10. STRUCTURAL APPROACHES | NETWAR  There are other structural approaches to terrorism that believe terrorists are united through networks  Terrorist organizations are structured in the same manner as communication and transportation systems 10
  • 11. STRUCTURAL APPROACHES | NETWAR  The traffic pattern on the highway is like a network – the crucial intersections, merge ramps, and expanded traffic lanes are nodes.  If vehicles begin clogging at a node, traffic slows or comes to a standstill at many points in the network.  Disrupting terrorist networks has the same effect on terrorist operations. 11
  • 12. STRUCTURAL APPROACHES | NETWAR  Any point where information, weapons, or personnel are gathered or exchanged is called a node  The node is the critical target for counterterrorist operations  If the node is destroyed, the network is disrupted 12
  • 13. ANTHROPOLOGICAL AND SOCIOLOGICAL APPROACHES  Two primary factors account for the continued influence of religion:  First, religion has always been an important influence in the history of humanity.  Second, modernization tends to break down communities, families, and social orientation. 13
  • 14. RELIGIONS, POWER AND VIOLENCE  http://www.youtube.com/watch?v=XpKSTzziVTY Discussion:  What is your view regarding the connection between religion and terrorism? Support your view.  It was stated that the cause of violence is not religion itself, but manipulation of religion; others say violence is caused by religious teachings of intolerance. Which do you believe, or do you believe it to be a combination. Support your view. 14
  • 15. TERRORISM AS A RELIGIOUS PROCESS  Strong religious beliefs increase:  The likelihood of religious conflict.  The intensity of fighting.  Violence results when sacred traditions are threatened. 15
  • 16. TERRORISM AS A RELIGIOUS PROCESS  Eschatology plays a major role:  Messianic warriors in the end-time correct the heresies of the past and fight for the ideal divine order of a deity.  Empirical findings demonstrate that terrorism is partially a religious process. 16
  • 17. LONE WOLF  Religion helps to produce the “lone-wolf avenger” :  A person who has a particular ideology but isn’t part of a group  An individual lone-wolf avenger needs to find some type of justification for his or her actions, and religion provides the perfect path 17
  • 18. LONE WOLF  Lone-wolf avengers have a special, narcissistic relationship with their deities.  They create a god in their own image.  They become the ultimate loners – they are the most difficult type of terrorist to deter or detain. 18
  • 19. TERRORISM AS A RELIGIOUS PROCESS  Despite utilization of sacred stories and cosmic mythologies, there is a very limited official religious basis for terrorism  Religious terrorists are lethal – religious terrorist groups killed more people with fewer attacks than secular terrorists.  Religious terrorists are deadlier than their secular counterparts. 19
  • 20. TERRORISM AS A RELIGIOUS PROCESS  People use stories to explain deep truths beyond the immediate world  Terrorist groups build their own mythologies to justify their actions through a story.  Stories change the nature of terrorist organizations – they help to produce different group organizations and styles. 20
  • 21. IS ISLAM A RELIGION OF PEACE?  http://www.youtube.com/watch?v=rh34Xsq7D_A&feature=! Discussion:  This presentation is a debate on the Islamic religion. The motion of this debate is: Islam is a religion of peace.  As did the audience in the clip, you will vote pre- and post-debate.  Pre-debate: On a slip of paper write Yes if you agree; No if you do not agree; or Undecided. Hand in your votes.  Post-debate: Using the same method, vote again.  What is the overall consensus of the class? Was there a measurable change in views? 21
  • 22. CRIMINOLOGY  Criminology as applied to terrorism looks at prevention and apprehension  Terrorists commit crimes as they struggle for a cause; they sets them apart from ordinary street criminals  As first responders, law enforcement personnel must recognize the differences between typical criminal behavior and terrorist activity 22
  • 23. PRACTICAL BEHAVIORAL DIFFERENCES Terrorists 1. Focus their actions toward a goal 2. Are dedicated to a cause 3. Rarely cooperate with officials because they do not wish to betray their cause 4. Tend to attack 5. Strike against targets after careful planning 6. Prepare for and rehearse their operations Criminals 1. Are unfocused 2. Are not devoted to crime as a philosophy 3. Will make deals to avoid punishment 4. Usually run when confronted with force 5. Strike when the opportunity to do so is present 6. Rarely train for crime 23
  • 24. ORGANIZED CRIME VERSUS TERRORIST  http://www.youtube.com/watch?v=P7-klWyj7gA&feature=player_Discussion Questions:  What distinctions does the analyst make between organized crime and terrorism? Do you agree with her distinctions? Support your response.  Are there other distinctions she did not include?  The analyst states that the Mexican Cartel has not yet reached the level of what is considered terrorist activity. Do you agree or disagree with her statement? Support your position. 24
  • 25. JOINT TERRORISM TASK FORCES (JTTFS)  Allows the FBI to coordinate law enforcement resources in the face of domestic terrorism and to expand investigations.  Focus on ideology, group, and individual behaviors  Information sharing over broad geographical 25
  • 26. JUSTIFYING TERRORISM  Deadly force demands the greatest amount of justification  Terrorists have the same need for social approval, but they rarely obtain it because their actions are not sanctioned by the governments they attack  Terrorists must look outside normative social channels to gain approval for their acts 26
  • 27. JUSTIFYING TERRORISM  Borum: no standard rationale for justifying behavior.  Victoroff: multiplicity of factors used to justify violence.  Post: us against them mentality.  The rejection of external authority results in the acceptance of internal authority 27
  • 28. JUSTIFYING TERRORISM  In order for social acceptance to be gained, the terrorist group must be isolated from mainstream society.  Processes used by American criminal gangs and Arab suicide bombers are the same. 28
  • 29. PROFILING THE TERRORIST PERSONALITY  Staub and McCauley believe that certain types of people are drawn toward terrorist groups.  McCauley sees four types of personalities:  Revolutionaries drawn to a cause  People who wander among terrorist groups,  People who have a sudden conversion experience  People who are attracted by peers 29
  • 30. PROFILING THE TERRORIST PERSONALITY  Given the nature of the terrorist, profiling terrorists has sparked heated debate.  Researchers argue that the differences in backgrounds and ethnicities prohibit accurate profiles.  Can an accurate profile be made, in your opinion? 30
  • 31. PATH AND ROUTES  Horgan believes researchers should search for the “routes to terrorism.”  Horgan is concerned with:  The psychological processes that lead people to terrorist groups.  The issues that keep them in the group.  The support for people who want to leave. 31
  • 32. RADICALIZATION & ALIENATION  As with other areas of terrorism, the areas of radicalization and alienation are fraught with differing views and suggestions for research.  Researchers will obtain more fruitful results by examining militant ideology and finding the concepts that are shown to attract followers. 32
  • 33. HOMEGROWN RADICALIZATION  http://www.youtube.com/watch?v=XCOp7nTTW1U  Discussion:  It was presented that data analysis and social network analysis can be effective tools in the prevention of terrorism. Does this align with your thoughts on homegrown radicalization? Explain your view. 33
  • 34. RESEARCH IN GROUP PROCESSES  A number of researchers believe members of terrorist groups go through decision-making processes as they are being radicalized  The general knowledge of radicalization is incomplete 34
  • 35. SAGEMAN’S MODEL  Radicalization is a six-step framework.  Alienated young man  Meets other alienated young men and form bond  Groups gravitate toward religion  Religion interpreted in militant terms  Militant group meets terrorist contact  Militants join terrorists as a group decision 35
  • 36. GROUPS IN PRISON  Recent reports suggest that groups are being radicalized in prison.  A leader often targets selected prisoners or dominate new inmates using intimidation to force intimidating them until they join the group.  Mark Hamm maintains recruitment is similar to procedures used by street gangs. 36
  • 37. RADICALIZATION IN PRISON  http://www.youtube.com/watch?v=QVh5amMncD0  Discussion:  What is your view on the radicalization of prisoners to Islam? Support your view.  Is this an area that requires attention by the prison system, Homeland Security, or as a joint effort. 37
  • 38. INDIVIDUAL RADICALIZATION  Evidence suggests radicalization is not always a group process  At the least – it involves individual reflection whether a group plays a role or not.  Research indicates individual psychological and sociological factors create the framework for interpreting reality. 38
  • 39. CASES OF RADICALIZATION  Individual cases in the U.S.:  Umar Farouk Abdulmutallab  Destroy a Northwest airliner as it entered American airspace.  James W. von Brunn  Shooting in the U.S. Holocaust Memorial Museum in Washington, D.C.  Omar Hammami – Muslim father and Christian mother – identity conflict  His identity conflict ended when he embraced a violent, intolerant form of Islam to become a commander in Al Shabaab. 39
  • 40. COMMONALITIES IN RADICALIZATION  Using previous three individuals – several common forms of behavior.  First all three men all came from well-to-do, middle-class environments.  The New York Times reports that most international attacks against the U.S. in the 21st Century have come from well-educated terrorists from the middle class.  Second, all three men became deeply angered and filled with moral indignation.  Alienated from mainstream thought as they expressed anger, and they sought to address their situations by doing something meaningful.  Lastly, there was some type of event that triggered their final decision to take violent action. 40
  • 41. COMMONALITIES IN RADICALIZATION  Several common forms of behavior. (cont)  Second, all three men became deeply angered and filled with moral indignation.  Alienated from mainstream thought as they expressed anger, and they sought to address their situations by doing something meaningful.  Lastly, there was some type of event that triggered their final decision to take violent action. 41
  • 42. RESEARCH CRITICIZED  The idea that research in radicalization and alienation will produce valuable knowledge is debated.  No general consensus about the definition of radicalization.  Term is utilized in a variety of different contexts.  Suggested that more beneficial results would be gained through the examination of militant ideology and concepts that attract followers. 42
  • 43. CHAPTER TAKE-AWAYS  Terrorism is a social process that can be studied with the same methods used by social scientists.  One method is to search for meanings behind actions.  The second method used to analyze terrorism is to look for structures.  Social geometry shows movement within structures.  The netwar metaphor represents a practical application of this technique.  Researchers who believe that modern terrorism has been changed by religion look for meanings that drive actions. 43
  • 44. CHAPTER TAKE-AWAYS  Security forces search for practical behavior clues that can be used against terrorists.  Researchers search for the ways in which terrorist behavior differs from normal criminals.  They seek an understanding of the ways terrorists justify violence.  Some researchers have tried to model terrorism by profiling terrorists or looking for models of radicalization and alienation. 44

Notes de l'éditeur

  1. The PPT slide associated with this topic is a little over an hour long in duration. The debate is well-worth the time as it gives students the opportunity to listen to a rational debate on the topic.