BSS Flashcards

1
Q

Definitions - why are they needed?

A

Legal - to consistently apply laws

Academic - to consistently apply research and corroborate findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the key points defining terrorism (academic) (3 and 2)

A
  1. Act of violence or the threat of force and or violence
  2. Non state actor
  3. through fear and/or intimidation

one of the following
1. aimed at attaining political, economic, religious or social goal; or
2. an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Expand on 1 act of violence or the threat of violence (*)

A

Usually easy to decide

Some definitions exclude property (most do not)

Threats on property are the most common but do not make the news

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Expand on 2 designed to cause fear in general population

A

About fear induced in wider populations

Public fear that they will be targeted?

Do assassinations fit this profile?

Fear is to pressure an authority to enact change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Expand on aim is to use fear to pressure an authority into change

A

Change can be political, religious or social NOT personal

How do we consolidate actions within a campaign? Eg ransom demand for solely money, but part of a wider political campaign?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are the terrorist victims described?

A

For terrorism to hold, victims need to be identified as civilian

Some terrorist groups consider off duty law enforcement/military as combatants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are the terrorist perpetrators described?

A

Some definitions, eg CIA, define terrorists as being sub national, therefore states can never carry out terrorism.

That said, international law would suggest that Nations carrying out acts of violence against specific groups could be considered to be carrying out genocide/war crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the global terrorist database?

A

Research tool trying to monitor and gather statistics on all terrorist related events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a terrorism label a value judgement?

A

No, it is a specific set of metrics that combine to label an event ‘terrorism’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do terrorists want publicity?

A

To generate fear that can be used as leverage to bring about change

Publicity about the acts creates the fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ‘new terrorism’?

A

Jenkins (1987) ‘terrorists want a lot of people watching not a lot of people dead’? Has it changed?

Is higher body count due to requiring more media attention ?

Multi national approaches, is there less concern about alienating a core population IRA vs ISIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reasons terrorism is a form of communication

A

Create fear in public

Develop a supporter base

Backlash from supporter base v important

Targets and methods important to deliver impression management - eg IRA bomb warnings

Can be a recurring tool after successful attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terrorism as a propaganda tool

A

Show of power

Message to those claimed to be represented by the group

Policies to only attack or not to attack certain groups - similar to rules of warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does Terrorism seek to deliver provocation of a government?

A

Terrorists regularly cite ill treatment by authorities (Hogan and Silke)

Terrorists can provoke authorities into heavy handed responses - eg Israeli policy on assassinations in early 2000’s.

Provocation also know as jujitsu politics (McCauley 2006)

Provocation can make things worse due to reprisals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is there a ‘cause’ of terrorism?

A

Misleading, rarely one cause, complex factors usually at play. Implies a directly causal relationship rather than ‘one policy too far’

Correlation does not equate causation in these cases

Individual factors rarely predict terrorist leanings but do help understand the wider views of the terrorist community being supported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is profiling useful?

A

Yes in that it frees up cognitive abilities of law enforcement and creates a simple checklist of indicators for them to look for.

BUT IF the terrorist does not follow the ‘standard’ archetype, ie gender, skin tone, accent etc then will lead to false sense of security

No, ends up demonising a community and potentially increase support for a terrorist group rather than breaking it.

Most research indicates that most terrorists are ‘normal’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Silke’s 2003 take on terrorism radicalisation factors?

A

Wrong circumstances create terrorists

Most people Support or consider joining a terrorist group when exposed to discrimination against yourself/loved ones

can make terrorism seem a justified response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2 terrorism myths

A

Not related to poverty or lack of education

Blackmail / coercion is rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cases where terrorism has not been related to education or wealth

A

2007 Glasgow airport bomb 5 of 8 questioned were doctors, one was a engineering PhD

2009 underwear bomber UCL trained Mech eng? But these are cases against western targets, would this hold true for Tamil Tigers etc?

Further research by Krueger Maleckowa 2003, Sageman 2004, Pape 2005 support this hypothesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are Borums 3 main causes of terrorism?

A

Perceived injustice

Identity

Need for belonging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Additional factors with Borums 3?

A

No way to change through legitimate political means

Feelings of revenge against those believed to perpetrate perceived injustice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Social factors leading to people becoming terrorists?

A

Need for social identity and belonging (IRA and ETA)

Excitement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Common correlates for terrorists in western countries? (X6)

A

Sociological discrimination

Feelings of alienation

Social exclusion or marginalisation

Political exclusion

Educational or occupational discrimination

Racism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

cases where it is really hard to decide on whether an act was or was not an act of terrorism and the reasons for that.

A

Murder of Jo Cox and David Amess If no political rhetoric is put forward, if the attack does not inspire fear in general population, is it against citizens or just infrastructure?. Ie does it meet the 3 criteria for a terrorist act?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the difference between terrorism and hate crime?

A

Hate crime focus on minority groups whereas terrorism is against society as a whole.

Hate crime can cover speech, whereas terrorism needs to be a physical act, incitement to commit an act or plan to commit a violent act

Hate crimes are generally single ideology - anti gay, trans, Jew, Muslim, etc that would stray from the societal norm of creating an inclusive society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

There are three common components of definitions of terrorism

A

Use of force

Create climate of fear

Get a government to change its policies on a topic

Some specifically exclude nation states from being terrorist organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the PURPOSEs of terrorism?

A

Not just about killing, some acts and organisations try their best to avoid this, some groups eg Greenpeace in France, do not target people

Long term goals - not just a prisoner release

Publicity

Communication

Recruitment

Provocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Purpose of terrorism - Publicity definition

A

is needed in order to create the fear that will pressure for change.

  • The ‘symbiotic’ relationship between terrorism and the media.
  • Is there such a thing as new terrorism?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is ‘new terrorism’?

A

Juergensmeyer calls new terrorism the “anti-order of the new world order of the 21st century”, stating that “[new terrorism] appears pointless since it does not lead directly to any strategic goal, and it seems exotic since it is frequently couched in the visionary rhetoric of religion.

”New terrorism can be broadly defined by three main characteristics:

  1. Ethno-nationalist and separatist based
  2. Inspired by the rise of extremist fundamentalist religious factionalism
  3. Emergence and prevalence of ‘Ad hoc’ terrorism

Generally:Amorphous in structure

Us against the West rhetoric Fundamental religious tie

Seen as ‘performance violence’ but this could be due to the need for more sensationalist attacks for media to report, particularly if the attack is outside a Western nation. Also organisations may not have same need to protect core demographics as the IRA or ETA did for their support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Purpose of terrorism - Communication definition

A

Highlight strength of organisation with own constituency and therefore potentially also propaganda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Purpose of terrorism - Provocation definition

A

They are deliberately trying to provoke us (government/society) into responding…why?generate fear

create a disproportionate response so government looks bad* “Jujitsu Politics” - McCauley (2006).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Jujitsu Politics?

A

McCauley (2006)A terrorist act designed to provoke a massive over reaction by the victim nation. Arguably the most effective example was US response to the 9/11 attacks. Huge economic drain on the US as they put in place measures to counter potential violent extremism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What factors increase someone’s likelihood of becoming a terrorist?

A

Mental health

Personality

Significant life event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What factors are not indicative of being a terrorist?

A

Poverty

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Target hardening and Situational Crime Prevention

A

Target hardening - increase of security on building/installation/city area to mitigate/lessen the impact of an attack

Situational crime prevention Situational crime prevention aims to increase risk and/or minimise reward, thus making either the commission of a criminal act too difficult, or the reward for committing the act too low to risk being caught.

Uses rational choice theory and routine activities theory to create the following effects on someone trying to committee a crime:
increasing the effort
increasing the risk
reducing the rewards
reducing provocations
removing excuses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the difference between prevention and deterrence

A

Prevention is an upstream approach, it is about wanting to stop people wanting to commit a crime

Deterrence is about making an attacker choose a different target because your target is too difficult or boring to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How can we measure the success of counter terrorism measures?

A

Great question, observe how other countries with similar threat profiles to yours fair over the same time period.

Whether database such as GTD demonstrate a downward trend in activity against your nation, and Indra hopefully overall!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what are Substitution or Transference in terrorism terms?

A

this is when terrorists decide that a target is too difficult for attack so transfer to one of the following approaches:

Time - come back when a target is less well protected - murder of Lee Rigby

Space - attack the same type of target but in a different location - IRA murder of Horse guards in Hyde park

Target - change target type - eg embassy hostages for hotel hostages. 7/7 from tube to bus

Mode - switch to a different form of action eg transfer of action from bombing, to marauder shooter to driven vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Routine Activity Theory ? (3 components)

A

in order for a crime to occur, there must the presence of three linked elements:
motivated offenders,
suitable targets and
the absence of capable guardians. Capable guardians can include people such as security guards or the police, as well as environmental factors, such as locks or other security devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Rational Choice Theory?

A

Minimise risk, maximise reward

potential offenders rationally choose to commit crime, and also the methods used in order to do so. This choice is influenced by the offender’s need to maximise reward while minimising risk.

Note this has its detractors as to accurately measure on this model you need to account for cognitive biases, at the moment there are approx 200 which could be indicative of the mode needing to be reassessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define protective security

A

The means to:

Mitigate risk that arise directly from the potentially harmful actions of people such as criminals, terrorists, hostile states, and malicious insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Security risks arise from?

A

Purposeful adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is security? (X2)

A

First duty of government and basic human need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Security builds (x2)

A

Trust and confidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Is security a common good?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is risk?

A

Risk = threat x vulnerability x impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Are security risks static monoliths?

A

No they are dynamic and adaptive - a system created by a human can be defeated by a human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Risk funnel top tier - what combine to make the threat?

A

threat actors intentions

threat actors capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Risk funnel middle tier - what combine to make the likelihood?

A

Threat and victims vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Risk funnel bottom tier - what combine to make the risk?

A

Likelihood of attack

Impact of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the main threat actors? (x7)

A

Terrorists (Islamist, NIRT, XRW)

Hostile foreign state actors

Criminals

Insiders

Hacktivists, script kiddies and other hackers

Political extremists and violence-prone protestors

Fixated individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Three stages in risk management cycle?

A

Understand the risks

Decide on how much risk to take

Act to reduce risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Characteristics of good security? (x8)

A
  • Risk based (and intelligence-led)
  • Proportionate
  • Well governed
  • Holistic
  • Regularly tested
  • Well measured
  • Layered
  • Dynamic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is an insider?

A

A person who exploits, or intends to exploit, their legitimate access for unauthorised purposes

Someone who betrays the trust of others by causing harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Types of insider?

A
  • Insiders may be third parties (e.g. contractors, suppliers)
  • Insiders may be malicious or unwitting
  • Insiders may be self-starters or cultivated by external threat actors (e.g. criminal or terrorist groups, hostile foreign states)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is Personnel security?

A

The defensive measures by which an organization protects itself against insider risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Difference between Personnel and Personal security

A

first is a risk to an organisation, the latter to an individual inside the organisation.

eg the MOD holds a risk from personnel, but provides personal security to senior leaders and Ministers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

2 methods of creating personnel security

A

verifying identity

assurance of trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

4 ways we can misperceive risk?

A

Noting Wikipedia has a list of approx 200 cognitive biases, these 4 are seen as a common group that affect personnel security

  • Availability bias
  • Optimism bias
  • Present bias
  • Inattentional blindness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

5 biases for mishandling risk

A
  • Confirmation bias
  • Groupthink
  • Sunk-cost bias
  • Hindsight bias
  • Outcome bias
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is trust? (*)

A

a psychological state that reflects a person’s “willingness to rely on another in a risky situation based upon positive expectations of the other’s intentions or behaviors

“Omanda state of mind that gives confidence that the risks ahead are being managed to a point where everyday life and investments for the future can continue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How can we measure trust?

A

Tactical
Are people in org honest? vetting, criminal background checks etc
Risk registers
policies and procedures

Strategic
SROs
Assurance - trust but verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How do we deter /prevent individuals from becoming a malicious insider?

A

Good management

Regular check ups 1-2 times a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What experiential and personality factors predispose individuals towards insider action?

A

Personal grievances with organisations

Perception of being held back etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Is money an important motivator for insiders?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

How can we avoid recruiting malicious insiders?

A

Vetting

Russians tried to infiltrate US security with sleeper agents, does not appear to have worked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

How can we avoid creating malicious insiders?

A

Good management!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are the early lead indicators of potential insider action and how can we detect them?

A

Change in lifestyle

Negative Change in performance

Working unusual hours when compared to their baseline of normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

How can we improve people’s ability to assess risk?

A

Experience

Training - classroom and live exercises

Exposure

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How can we help people to understand complex adaptive systems?

A

use of examples - covid and the 2nd, 3rd…nth order effects. War in Ukraine affecting gas and food prices globally

push the need for resilience in systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

How can we counter optimism bias and other cognitive biases?

A

Red teams

Premortums

Lessons learned

72
Q

How can we help decision-makers to make better decisions, especially under pressure?

A

highlight how resilience can benefit organisations

training - exposure to real time issues

73
Q

How can we help organisations to learn from experience and become more resilient?

A

Culture of openness

lessons learned

Premortem exercises

74
Q

Difference between deliberate and malicious?

A

Malicious acts are always deliberate but deliberate acts are not always malicious.

Deliberate act - thalidomide - honest intentions with poor outcomes; or a product that’s recipe is changed but the harmless additive causes issues

75
Q

Why study malicious contamination?

A

potential for large scale issues

research can help prevention or aid investigation

motivations translate well to other criminal behaviour

76
Q

Define malicious contamination

A

Two forms:

poisoning of an individual product

tampering
Covers a range of crimes with different fundamental motives

77
Q

What are the 3 facets for malicious contamination? (*)

A

Kilbane and Wilson 2019

Specificity

Motive

Form of action

78
Q

what is a typology?

A

a general classification type - eg personality types

79
Q

Kilbane and Wilson 2019 - define specificity

A

this is who was targeted

number of potential victims

need to compare intention vs actual outcome ie - only one person targeted in a workplace, but multiple people were affected

High specifyicity is about targeting a single person, low could be just random victims, its a scale more than a dichotomy as groups of increasing size could be targeted ie persons, couple, family, workplace, consumer of a product…

80
Q

Kilbane and Wilson 2019 define motive

A

range from personal to political but difficult to distinguish as politically motivated might have an element of personal motivation ie revenge for a policy - harming the politicians family etc.

81
Q

Kilbane and Wilson 2019 define form of action

A

expressive vs instrumental

expressive more emotionally driven

instrumental about achieving a goal

82
Q

Kilbane and Wilson 2019 what are the facet combinations?

A

A ( specificity ) = 1 ℎ𝑖𝑔ℎ 𝑠𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 2 𝑙𝑜𝑤 𝑠𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦

B ( cause ) = 1 𝑝𝑒𝑟𝑠𝑜𝑛𝑎𝑙 2 𝑝𝑜𝑙𝑖𝑡𝑖𝑐𝑎𝑙

C ( violence ) = 1 (𝑖𝑛𝑠𝑡𝑟𝑢𝑚𝑒𝑛𝑡𝑎𝑙) 2 (𝑒𝑥𝑝𝑟𝑒𝑠𝑠𝑖𝑣𝑒)

83
Q

Kilbane and Wilson 2019 Facet outcomes?

A

8 groups

84
Q

What is a script?

A

A sequence of expected behaviors for a given situation

Abelson (1981) Abelson’s theory shows us is that we tend to understand certain situations in terms of their overall “script”, and behave in a way that is reasonably agreeable with the script

Donald - I know more about how people will behave by their location than who they are

Follows social and locational rules

85
Q

What is a schema?

A

A heuristic technique

a pattern of thought or behavior that organizes categories of information and the relationships among them

What people wear when going to work vs to a gig

86
Q

what is a schemata?

A

A group of schemas

87
Q

What do scripts, schema and schemata lead to?

A

a) For public to have expectations about what will happen in certain situations.And therefore,

b) How they should behave. These scripts help guide people’s interactions with others and with the physical environment.

88
Q

Why might people not behave appropriately in an emergency?

A
  • Social learning – it’s only a false alarm.
  • Poor knowledge of fire spread/misreading the situation.
  • Embarrassment, social influence.
  • “Faulty Scripts” and “Script Breakdown”
89
Q

Define social learning

A

A process where new behaviors can be acquired through observing and imitating others

Eg cannabis being a ‘gateway’ drug is primarily due to the social groups who use it might have a more accepting view of other drugs

90
Q

Define faulty script

A

Where a script leads to adverse consequences,
eg helicopter crash in water people are use to car seat belts to their scripting takes them to the side of a seat rather than their front where the release is

91
Q

Define script breakdown

A

where an individuals script for an event fails (through mental, drug induced reasons, can be outside bounds of expected interactions) and the individual exhibits behaviour not perceived as ‘normal’ by reverting to everyday behaviour (shopping in a warzone etc)

92
Q

Where do faulty scripts come from?

A

They can come from group behaviour, deliberate grooming/radicalisation - social media algorithms are optimaised for increasing attention, therefore prime tools for encouraging extreme behaviours

93
Q

Do people panic in an emergency?

A

No

Drury, Novelli and Scott (2013) those crowds with whom we do not identify that we find uncomfortable, whereas we actively seek central and even dense locations in those crowds which we categorize as ‘us’

94
Q

How does belief in disaster myths have the potential to adversely affect the preparation for and management of victims in an emergency?

A

people plan for the wrong outcomes

eg looking for signs of panic, but only choose signs taken from Hollywood, not real world examples, therefore underestimate cues to look for.

Experience in battlefield triage may work for explosive incidents, but may not be appropriate methodologies in other contexts

95
Q

What are the two approaches for explaining scripts?

A

Social roles - your role within the setting

Environment - place you are

96
Q

3 types of hostage taking?

A

Kidnap

Barricade Siege

Hijack

97
Q

How do the 3 types of hostage taking differ?

A

Hijacking – Hostages are held under duress but the main goal of the terrorists is something other than killing the hostages, e.g. the al-Qaeda-inspired 9/11 attacks, where planes were hijacked and flown into iconic buildings.

Barricade-siege – Terrorists invade a building to kill or hold people hostage. This type of incident inevitably provokes a quicker response from the authorities and results in a stand-off, e.g. the Bataclan theatre siege where Islamic State of Iraq and the Levant (ISIL) inspired terrorists murdered 90 people and injured many more.

Kidnapping – Different to the first two categories in that it is normally a predetermined activity involving the instigation of demands or concessions by the hostage-takers.

98
Q

What are the implications for the authorities of the 3 types of hostage taking?

A

Media attention - though Kidnapping might prefer to not have the coverage, particularly if it is not terrorist motivated. Double edged sword for Governments, can help the governments cause for new policy/legalisation, but can also make them look weak and lacking control

Policy of not responding to ransom demands - but may deliver support through other channels so as not to be seen as being influenced by violent acts

99
Q

What might look like hostage taking but isn’t classified as hostage taking?

A

Kidnap
when the intention is to kill not release the people taken

people who are hiding from attackers

100
Q

What is hostage identification syndrome?

A

Also known as Stockholm syndrome, a bond between hostage taker and hostage. untestable hypothesis, well untestable in a post Stanford prison experiment world.

101
Q

Why is HIS important?

A

Increases the likelihood of a hostage situation ending without deaths, BUT may cause increased sympathy for the organisations causes

102
Q

Pros of HIS for each party?

A

hostage: increased chance of survival
Authorities - increased chance of hostage survival

Hostage takers - good publicity, hostages easier to control

103
Q

Cons of HIS for each party?

A

hostage:?

Authorities
hostages provide good publicity for the cause, hostages cannot be relied on in escape planning

Hostage takers
difficult to harm the hostage if necessary

104
Q

7 factors related to whether HIS occurs in hostage taking

A

Turner (1985) 7 factors
Face to face contact

Language

Sophistication of individuals

Cultural value structure

Timing of Violence

Time

Pre-existing Stereotypes

Manipulation

105
Q

What might the true cause of HIS be?

A

social roles and rules, faulty scripts and script breakdown

106
Q

Define kidnap

A

*A person is taken away and held at adifferent location against their will.

*Sometimes called an “abduction”.

*The location is usually unknown (at first). Balance of power…abandon the plan.

*More than one person can be kidnapped.E.g. a group of tourists, a team of journalists.

*Large groups of people are quite rare because it is hard for the hostage takers to maintain control…

*Overpowered, escape.

107
Q

What looks like a kidnap but isn’t?

A

Are they hostages instead?

  • A person abducted in order to be killed which sometimes happens in political assassinations.
  • Was there ever any intention to bargain over their release?
  • This can be very hard to judge.
  • An abduction and murder may be an assassination or a kidnap gone wrong.
  • Where a person, usually a woman or girl, is abducted and kept captive. E.g. Ariel Castro case discovered in Cleveland 2013.
  • Three young women abducted and held captive for years.
108
Q

Define barricade siege

A
  • A known location is taken over and the people there are held against their will.
  • E.g. a private dwelling, an office, hotel, shopping mall.
  • Authorities have the advantage because location is known.
  • Hostage takers will now have to negotiate their way out, surrender or escape.
  • Few hostage takers intend a suicide mission, although it might be back up plan.
  • By definition there is bargaining to be done.
  • The most frequent forms are non terrorist, e.g. domestic, criminal and prison hostage taking.
  • Sometimes occurs when a different crime goes wrong, e.g. a robbery.
109
Q

What looks like a barricade siege but isn’t?

A

Hostages

  • People present during bank raids and other robberies when the raiders take the money and leave.
  • People hiding in hotel rooms during an armed assault.
110
Q

Define hijack

A
  • The taking of a form of transport with the passengers on board.
  • You hear about planes; skyjacking is an old term.
  • Still happen but most often not are terrorism.
  • Other transport is also taken…
  • Shipping (see also piracy and maritime terrorism.
  • Piracy is not terrorism by definition and vice versa.
  • Maritime terrorism involves more than taking boats.
  • Busses, cars, even trains have been hijacked.
111
Q

What looks like a hijack but isn’t?

A
  • No hostages or coercion
  • Not re routed
  • Not used for a different purpose
  • The men on board were stowaways
  • Possibly asylum seekers
  • Also happens with planes
112
Q

Plane hijacking indicators

A
  • Can be of private aircraft.
  • Most often commercial flights.
  • Hijackers most often board the plane as passengers and don’t announce until after take off.
  • Have similarities with kidnap at first…
  • Because they are mobile and cannot be surrounded.
  • Destination is limited by fuel (and permission to land).
  • But once landed become barricade siege.
  • Unless they can refuel and take off again.
113
Q

What is a non hostage hijack?

A
  • Confusingly, we also call the theft of a manned vehicle a hijack, even if the people are not taken.
  • For example, drug smugglers who steal a private yacht.
  • Whether they killed or ejected the occupants they did not take them along they only took the vehicle.
  • Or a vehicle “hijacked” to use in crime or terrorism act e.g. the truck used in the Berlin Christmas market attack in 2016.
  • The Polish driver was shot and the truck taken.
  • Vehicle is used for transport, another purpose, or even held for ransom.
  • If there are no people it is not a hostage taking incident
  • However, sometimes even when there are people taken it is still not a hostage taking incident…9/11 - the people on board were never intended to be hostages - hostages are barganing chips, the intention was that they would all die in the attacks
114
Q

Define a hostage

A

someone who is taken and used by a group as bargaining power to get something they want - money, transport, prisoner release etc

115
Q

Hostages that are not hostages?

A

Human shields

Suicide by cop

on transport that is going to be intentionally destroyed with people on board

116
Q

Can kidnap, barricade siege or hijacking overlap?

A

yes and frequently do - hijack turns into barricade siege etc

117
Q

Turner (1985) 7 factors explain Face to face contact

A

more interaction bet H and HT more likely HIS will occur

Sophisticated group will try to avoid this through:Gags/hooding

Rotation of guards - no conversation

Difficult for captor to maintain dehumanising strategies

118
Q

Turner (1985) 7 factors explain Language

A

H and HT must share the same language

can be interesting division of H in hijacking where some H share the same language of the HT but others do not

119
Q

Turner (1985) 7 factors explain Sophistication of individual

A

A H understanding of psychology of hostage taking can help the development of HIS.

HEAT training is used to develop this within groups like reporters about to go to areas of increased concern like warzones or politically unstable regions

120
Q

Turner (1985) 7 factors explain Direction of identification / Cultural value structure

A

guards of H generally followers of groups, therefore can be swayed by strong personalities. H tend to be people like diplomats who have these strong personalities that can sway the HT to their view.

121
Q

Turner (1985) 7 factors explain Violence

A

Specifically the timing of violence

violence in initial hostage taking or against a H that has provoked the HT is seen as acceptable by the other H and can accelerate HIS

Random violence, taunting H inhibits the development of HIS

122
Q

Turner (1985) 7 factors explain Time

A

As time progresses, the close proximity breaks down pre existing stereotypes as subculture behaviour take over.

Time + positive factors = increased HIS likelihood

Time + negative factors = decreased likelihood on the part of HT frustration can be a negitive factor.

123
Q

Turner (1985) 7 factors explain pre existing stereotypes

A

If there are pre held racism etc, then this can be a barrier for HIS to occur

124
Q

Does Hostage Identification Syndrome exist?

A

APA definition of syndrome - indicate a particular physical or mental disease or disorder

APA disorder - abnormal behaviours or physiological conditions, persistent or intense distress, or a disruption of physiological functioning.

So, is this abnormal, or just a group of people developing social interactions in a normal way in an abnormal environment.

125
Q

How do we define suspicious behaviour?

A
  • Suspicious behaviour may be verbal or nonverbal.
  • But is usually referring to actions or demeanour rather than words.
  • There are many things that could be taken to be suspicious.
  • And they may be indicators of a range of things: concealment of intent, aggression, nervousness, etc.
  • Or they may not…
  • How can we define what is actually suspicious behaviour?
  • Often it is a subjective judgement based on
    A) appearances and
    B) the judge’s preconceptions/knowledge
126
Q

How can we define base rates of ‘normal’ behaviour?

A

Make statements on what is expected behaviour - ie sitting while a plane is taxing, sterile zones etc

Observational trials to understand how poeple move in crowds, what they pack to go on holiday etc. then identify ways of seeing when these ‘norms’ are being breached

127
Q

How do we decide what is unusual for a setting? (*)

A

Punk gig vs classical recital

128
Q

Is unusual necessarily suspicious or is there more to it?

A

no, could be a indicator of someone with mental health issues - autism, ADD, or faulty scripting reverting them to a different course of action

129
Q

What is the biggest issue with detecting anomalous behaviour?

A

has a big problem with false positives.

130
Q

What is the relationship between suspicious, deceptive and nervous behaviour?

A

they overlap, in some situations and circumstances, quite significantly

131
Q

How are terrorist attacks foiled?

A

Surveillance and significant proportion form public tip offs

132
Q

Why are suspicious things not necessarily reported

A

Not seen as suspicious

Not wanting to cause undue disruption to self or others

Seen as wasting police time

Not wanting to talk to other passengers to clarify whether a bag is abandoned (parsons green bombing)

133
Q

How can we get more reporting on suspicious events?

A

Education - adverts on public transport highlighting some things that might need reporting eg abandoned bags

Easy reporting mechanism - crimestoppers, 101 etc

134
Q

Downsides for increased awareness? (*)

A

encourage fear? some political parties may see this as a feature not a bug, allows more authoritarian polices/legislation, playing down terrorism and attack occurs - they are naieve, play up threat and nothing happens, their polices are working

135
Q

What is the bystander effect?

A

the hypothesis that the more people present, the less likely anyone will help.

136
Q

Is the bystander effect important?

A

If it exists yes, but there is significant critical literature building that it does not exist, particularly in the way it was originally hypothesised as being people reluctant to help someone being murdered.

Most experiments require confederates who are instructed to ignore emergency situations (eg smoke), so you are testing whether someone is going to ignore danger indicators when all around are doing the same.

This is potentially not a real world test of peoples behaviours.

137
Q

How can the bystander effect be overcome?

A

increasing social responsibility

reminding people of the social norms
eg nudge theory and tax returns

138
Q

3 Types of ‘anomalous’ behaviour

A

suspicious

nervous

deceptive

139
Q

How can you generate rules for behaviour? (*)

A

use expert knowledge
- Tsung-Yuan et al 2009
- boat navigation to identify behaviours of suspicion

Experimental - but can only test simple conditions, cannot replicate emergencies etc

observation - good for real world data, but difficult to get information about what was happening with suspicious behaviour if any is observed

140
Q

how are terrorist plots foiled?

A

usually by a sequence of events, not a one and done interaction

usually by initial surveillance (sometimes tip off required to kick start the surveillance), then followed up by infiltration of informant or police raid

141
Q

two main causes of terrorist plot disruption

A

Surveillance and informant

these cover 2/3rds of cases reviewed by Crenshaw et al 2017

142
Q

types of tip off that help foil plots?

A

store owners concerned about purchases

Relatives concerned about radicalisation

social media posts reported

143
Q

cons about looking for public tip offs (x2)

A

increases the state of fear

false positives

144
Q

How did see something say something work?

A

provided scenarios, behaviour types or simple observations people might come across and highlight that it could be normal, but let law enforcement decide

145
Q

How did UK see it say it sorted work?

A

provides vignettes eg someone photographing cameras, abandoned bag etc and provides a contact for the information to go to that is not the emergency 999 number

146
Q

What ways are used to detect deception?

A

Psychological

verbal

nonverbal

behavioural

147
Q

Does the polygraph test work?

A

Nope, it does not detect lies and can be easily defeated by someone tensing parts of their body when answering each questions

They detect nervousness, so someone innocent and very nervous, or a pathological liar will generate false results when asked if they are lying.

It can act as a way to facilitate honest answers from someone close to revealing information by giving them an excuse of having their agency being removed by the device

148
Q

Is the polygraph test ethical?

A

well…..ethics are a luxury of the leading groups in an area.

149
Q

What is ‘non verbal behaviour’?

A

a technical term that means the movements of a person’s body or face. It does not mean any behaviour that is not verbal, e.g. physiological reactions.

150
Q

Define ‘body language’

A

facial micro expressions

Gestures

limb movement

151
Q

Body language Cause, effect and explanation. What is the mechanism?

A

these is none - Wiseman et al 2012 concluded there is no scientific suipport for NLP eye movements

152
Q

What are the 3 theoretical predictions on how non verbal behaviour might reveal someone who is lying

A
  • Theories based on Emotion
  • Cognitive Theories
  • Attempted Control Theories
153
Q

Define Theories based on Emotion

A

Non verbal behaviour mechanism: Emotion theories are based on the idea that liars are more nervous and concerned about the interview. Emotional response arising from guilt/fear will produce features such as increased movement (agitation).

154
Q

Define Cognitive Theories

A

Cognitive theories are based on the fact that it is harder to make up a lie than tell the truth. Concentrating on the lie will result in decreased movement.

155
Q

Define Attempted Control Theories

A

These theories hold that the liar will deliberately try to avoid giving themselves away resulting in less movement.

156
Q

What experimental designs are there for studying deception?

A

Aldert Vrij et al (2010).

157
Q

What is ‘active deception detection’?

A

Vrji et all 2010

requires a cognitive interview where the cognitive load on the interviewee is increased with a view that liars cannot keep up consistently with the questions being asked.

eg ask for elements to recalled in reverse order
number of people
order people were sat
who was wearing what etc

158
Q

Define Statement Validity Analysis

A

looks at the choice of words being used, statements such as ‘I am not guilty’ mean you do not have guilt about the crime and that its impossible for a guilty person to say things like ‘I didn’t do it’

159
Q

Ways people try to detect lies

A

polygraph

MRI

‘Reading’ body language

Analysis of non-verbal behaviour

TSA SPOT checklist

160
Q

define single issue terrorism

A

Focus on things like environment, nuclear, abortion, animal rights etc

161
Q

define lone wolf terrorism

A

the perpetrator acts alone without direction from an outside group.

In some cases such as the Columbine High School massacre, two students shot and killed 12 students and one teacher. This still meets the academic definition of lone actor shooting, because the perpetrators carried out the killings without direction from anyone else

the killings occurred in a public situation.

Mass murders such as familicides where one member of a family kills all other members in the family home are not considered as lone actor shootings.

the murders were not committed as part of some other criminal act such as a robbery or as part of gang conflict in which multiple individuals are shot.

162
Q

Are all definitions the same?

A

no

163
Q

What can ‘Lone’ mean?

A

Lone as in not conected to an organisation; or Lone as in only one attacker

164
Q

What factors might mobilise a person to take part in terrorist activity?

A

Significant life event

Mental health

165
Q

What is radicalisation?

A

a process through which an individual, group, or community become more extreme in their attitude OR behaviour

166
Q

McCauley and Moskalenko mechanisms for radicalisation?

A

Individual

Group

Mass

167
Q

What is the two pyramid model?

A

McCauley and Moskalenko 2017

Opinion and Action are two separate pyramids with increasing radicalised behaviour as you go up. It demonstrates that there is no conveyor belt to terrorism as someone can have low radicalisation of opinion yet display radicalisation of actions

168
Q

2 pyramid model, what are the layers in the action side?

A

Inert

Activists

Radicals

Terrorists

169
Q

2 pyramid model, what are the layers in the opinion side?

A

Neutral

Sympathisers

Justifiers

Personal Moral obligation

170
Q

What is the difference between radicalisation of opinion and radicalisation of behaviour?

A

Opinion is your views on a topic

Behaviour is potential to act based on a topic

Both are mutually exclusive which indicates there is no conveyor belt to terrorism

171
Q

What is deradicalisation?

A

a cognitive change, usually the result of a reorientation in belief or ideology

172
Q

What is disengagement?

A

a behavioral change, usually the result of breaking off participation in terrorism

173
Q

what are the differences between deradicalization and disengagement?

A

Deradicalisation is the stepping back from opinions,

disengagement is the stepping back from activities,

as they are mutually exclusive then someone can be a threat even if they are deradicalised

174
Q

Decision factors present in those who voluntarily give up terrorist activity? X2

A

Disillusionment

Positive social relationships (ISIS approach to create communities to avoid this?)

175
Q

Individual reasons for radicalisation (x4)

A

Personal victimisation

Personal grievance

Join radical group slippery slope

Join radical group love

176
Q

Group reasons for radicalisation (x5)

A

Extreme shift in like minded groups

Extreme cohesion under isolation and threat

Competition for same base of support

Competition for state power (condensation)

Within group competition (fissioning)

177
Q

Mass reasons for radicalisation (x3)

A

Jujitsu politics

Hate

Martyrdom