Lecture 9 Flashcards
Terror, Terrorist, Terrorism:
Conceptual critique by Tilly (sociologist)
Political and normative connotations; no difference made
between terror, terrorist, terrorism
Many different groups (organized/unorganized; durable
campaigns/ ad-hoc)
Only very small number of groups focused on terrorist activities
Many different contexts (domestic/transnational)
Not useful to cover distinct phenomena under the category of
“terrorism”
Does not have “causal coherence”: Different explanations for different
types
Two alternative views - behavior specific
Terrorism as a tactic of political violence (behavior-specific)
Tactic in asymmetric warfare; carefully planned
Indiscriminate (vs. selective) violence, usually directed at noncombatants
Punishment of past behavior and deterrence of future behavior
(Kalyvas)
Victims and targets of violence are distinct
Sends signals to different audiences
Two alternative views - actors specific
Terrorism as a tactic of armed groups that operate
underground (actor-specific)
Groups that lack territorial control
How to deal with contested definitions?
Most definitions agree that the instrumental political killing of civilians
in peacetime is terrorism.
Beyond that, “terrorism” remains a contested terrain of diverse
political and moral opinion” (Saul 2019)
So, how to move forward?
Terrorism as modus operandi
Terrorism not inherently attached to a group
think about terrorist tactics, not terrorist groups
Working analytic definition
Communicative violence directed against non-combatants
undertaken by a politically oriented group
Does not include a goal
Includes an audience and a target
Terrorism may be carried out by a wide range of agents
Types of terrorism
-State terrorism (repression,
violence)
-Domestic terrorism
Leftist: 1970s Italy, Germany
Ethno-national: PIRA in Northern Ireland,
ETA in Basque region in Spain
-Transnational terrorism after
1998: religio-political
Bombings at US embassies in Kenya and
Tanzania; 9/11 in NYC and Washington D.C.
(Al-Qaeda)
ISIS-inspired/coordinated attacks in Europe
IS example
Islamist ideology
Terrorist activity internationally and in main
countries of operation
However…
Also held territorial control
Engaged in other forms of political violence (guerilla warfare; direct
battles with armed groups/armies; disciplining people living under their
control)
How should we analyze IS?
“Just another” revolutionary movement? (Kalyvas 2018)
Does terrorism work?
Abrahms (2012): ineffective in achieving “outcome goals” (compared
to, e.g., guerrilla attacks on military targets)
Does not work as a communication strategy with respect to
terrorists’ goals
Public focuses on civilian suffering
Terrorists come across as unable toagree on political compromise
Terrorism achieves….
But may achieve other (process)goals
Demonstrate illegitimacy of the state (repressiveresponse)
Achieve unity and commitment within theorganization
Violence leads to social polarization, greater support for the organization
Causes of terrorism
-Situational factors
Facilitating conditions
Specific triggers
-Strategic aims
Long-term
Short-term: Turn weakness into strength
-Individual motivations
High risk acceptance
In-group dynamics
Vengeance
mobilization and recruitment
Process of mobilization: “Gradual growth of commitment and
opposition” (Crenshaw 1981, 396)
Ideological indoctrination (common cause)
In-group dynamics (isolation)
Importance of political repression for mobilization (revenge)
Process of escalation in which context matters (not just individual
predispositions)
Counterterrorist measures
-Static defense
Protect sites, systems, borders
-Active defense (WM ch. calls this “offense”)
Limit groups‘ ability to perpetrate attacks
Intelligence (detect plans, disrupt organizations)
Finances (stop state sponsors)
Leaders (targeted killings/ decapitation)
-Diverse organizations involved: military, police, civilian
Origins counterterrorist technology
The Revolution in Military Affairs?
-Make use of information technologies for military effectiveness
Control through information
-Publics in US/Europe more risk averse (compared to?)
Constrain political leaders
Fewer recruits for militaries
-Use technology to transfer risk: minimize fatalities by transferring
the risk to enemy combatants
Predator drones
Precision-guided munitions
Stealth bombers
What are drones?
“Unmanned Aerial Vehicles (UAVs) are remotely pilotedor
self-piloted aircraft that can carry cameras, sensors,
communications equipment or other payloads”
(www.globalsecurity.org).
Used for intelligence gathering since 1950s
US first used weaponized drone in Afghanistan in 2001
Advantages of drones
Better and more timely intelligence (longer tracking of targets)
Precise targeting
Avoid capture or loss of manned vehicles and pilots
Drones “allow you to project power without projecting
vulnerability” (Gen. Deptula)