33
i SCHOOL OF SOCIAL SCIENCES AND SECURITY STUDIES DEPARTMENT OF CRIMINOLOGY AND SOCIAL STUDIES BJS3105: INTRODUCTION TO TERRORISM copyright@2014-All rights reserved for MKU

Introduction, cause and effects of Terrorism

Embed Size (px)

DESCRIPTION

Terrorism is the deliberate creation and exploitation of fear through violence or the threat of violence in the pursuit of political change. All terrorist acts involve violence or the threat of violence. Terrorism is specifically designed to have far-reaching psychological effects beyond the immediate victim(s) or object of the terrorist attack. It is meant to instil fear within, and thereby intimidate, a wider `target audience' that might include a rival ethnic or religious group, an entire country, a national government or political party, or public opinion in general. Terrorism is designed to create power where there is none or to consolidate power where there is very little. Through the publicity generated by their violence, terrorists seek to obtain the leverage, influence and power they otherwise lack to effect political change on either a local or an international scale.The global concern over the threat of terrorism by physical destruction and losses, deaths, suffering to humanity, economic loss, insecurity, and the general challenge to social order and polity in the society cannot be underscored. As most countries in Sub-Saharan Africa are shaken in civil conflicts, Kenya has remained relatively peaceful for decades and played host to millions of refugees fleeing neighboring countries. However, since 1998, terrorism-related activities have been on the rise in the country posing a major threat to national security and development. The impact of terrorism cuts across social, cultural, economic and political lens of the society. The nature of terrorist activities in Kenya has been changing and escalating in magnitude, leaving many innocent citizens as victims, while in some incidences, the country held at ransom by the terror groups. With over 15years of experience on terror attacks, Kenya is becoming more vulnerable and easy target for terror groups. Despite efforts made by government and other agents to curb the menace, much is yet to be achieved. Inadequate capacity; lack of preparedness; poor co-ordination and strategy; and information faults are some of the major shortfalls that have been highlighted

Citation preview

  • i

    SCHOOL OF SOCIAL SCIENCES AND SECURITY STUDIES

    DEPARTMENT OF CRIMINOLOGY AND SOCIAL STUDIES

    BJS3105: INTRODUCTION TO TERRORISM

    copyright@2014-All rights reserved for MKU

  • 1

    BJS3105: INTRODUCTION TO TERRORISM

    Contact hours: 42

    Purpose: To promote knowledge in understanding terrorism and threat analysis in world.

    Expected Learning Outcomes of the Course: By the end of this course, the learner should be able to;

    i) Discuss various forms of terrorism and ways of detecting the terrorism threat.

    ii) Identify and explain factors responsible for terrorism in the world

    iii)Understand and describe the national policies and strategies of Terrorism control.

    Course Content: Historical overview, terrorism profile, forms of terrorism, causes of terrorism, terrorism and anti-

    terrorism, counter terrorism, measure to reduce terrorism the probability of information, policy

    and response to terrorism in Kenya, impact of terrorism attack on Kenya, Types of explosives,

    nature of explosives, effects of explosives, identification of explosive materials, common

    explosives, secondary explosives, impact of terrorism threats in Kenya and the world over,

    pejorative use, types of motivation to terrorism practices, democracy and domestic terrorism,

    perpetrators, funding of terrorism-state terrorism, group terrorism, tactics and responses, mass

    media, databases on terrorism

    Course Outline

    WEEK 1

    CHAPTER ONE: INTRODUCTION

    Definition-terrorism, terrorist, law crime

    States, non-state actors terrorism

    History of terrorism

    Origin of terrorism

    Religion, fundamentalism terrorism

    WEEK 2

    CHAPTER TWO: HISTORICAL OVERVIEW

    Old And New Terrorism

    Waves Of Terrorism

    Cause Of Terrorism

    Targets Attacks

    WEEK 3

    CHAPTER THREE: THE EVOLUTION OF TERRORISM

    Introduction

    Evolution Of Terrorism

    Factors That Motivate Terrorism

  • 2

    Types Of Terrorism

    Reasons Why Terrorism Exist

    Impact Of Terrorism: Social Political And Economic

    Forms Of Terrorism WEEK 4

    CHAPTER FOUR: A TERRORISTS PROFILE AND TERRORISM

    Classification of Terrorists

    Profile

    Availability readiness and willingness

    Terrorism and anti-terrorism

    Counter terrorism WEEK 5 & 6

    CHAPTER FIVE: LAW AND TERRORISM

    Introduction

    Categories Of Terrorism State-Sponsored Terrorism

    Response To Terrorist Threats And Attacks

    Religious Terrorism

    Nationalist Terrorism

    Left-Wing Terrorism

    Right-Wing Terrorism

    Anarchist Terrorism

    Group Terrorism Narcoterrorism And The Weakening Of Democracies

    Information: Availability Authenticity Probability WEEK 7

    CHAPTER SIX: THE FIGHT

    Introduction

    Measures to reduce terrorism

    Weapons used

    Nature of explosives

    Sources of the explosives

    Types of explosives

    Effects/impact WEEK 8 & 9

    CHAPTER SEVEN: WEAPONS USED

    Definition of explosives

    Types of explosives

    Classifications of explosives:

    Identification

    Methods used in the identification:

    Sources

    Nature

    Availability

    Characteristics

  • 3

    Categories and functions Social economic and cultural environment Identification Organizational set-up Availability and recruitment Mass media Databases on terrorism Training plan

    WEEK 10 & 11

    CHAPTER EIGHT: IDENTIFICATION

    Common explosives

    Secondary explosives

    Tactics and response

    State-terrorism, group terrorism WEEK 12

    CHAPTER NINE: FUNDING OF TERRORISM ON THE NATION

    Funding

    The evil-Nexus

    Costs

    Financing terrorism

    Financial Control

    Categories

    Moving the funds WEEK 13

    CHAPTER TEN: INVESTIGATION

    Identification of explosive material Policy and response to terrorism in Kenya Impact of terrorism attacks on Kenya Pejorative use Motivation Domestic Terrorism And Democracy Perpetrators Probability Of Information Mass Media Cost-Benefit And Cost-Effectiveness Analysis Impact Evaluation

    Course Assessment

    Examination - 70%

    Continuous Assessment Test (CATS) - 20%

    Assignments - 10%

    Total - 100%

    Recommended Text Books:

  • 4

    Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New

    York: Routledge)

    Adrian Guelke, (2009), The New Age of Terrorism and the International Political System

    (London and New York: I.B. Tauris)

    Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)

    Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues (Los

    Angeles, CA: Sage, 616 pages, $80.00. [Paperback]

    Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries,

    Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)

    James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root

    Causes (Westport, CT: Praeger Security International, 1280 pages, $

    Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global

    Trends (New York: Routledge)

    Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces

    Together (Santa Monica, CA: RAND)

    Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist

    [Second Edition] (Toronto, Canada: John Wiley & Sons)

    Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist

    [Second Edition] (Toronto, Canada: John Wiley & Sons)

    Text Books for further Reading:

    Bockstette. Carsten (2008). "Jihadist Terrorist Use of Strategic Communication Management

    Techniques" (PDF). George C. Marshall Center Occasional Paper Series (20). ISSN 1863-

    6039. Retrieved 2009-01-01.

    Barak Mendelsohn (2005-01). "Sovereignty under attack: the international society meets the

    Al Qaeda network (abstract)". Cambridge Journals. Retrieved 2010-01-

    Sageman. Mark (2004). Understanding Terror Networks. Philadelphia. PA: U. of

    Pennsylvania Press. pp. 16667. ISBN 978-0812238082.

    Lind. Michael (2005-05-02). "The Legal Debate is Over: Terrorism is a War Crime | The

    New America Foundation".

  • 5

    TABLE OF CONTENTS Page

    COURSE OUTLINE i

    TABLE OF CONTENTS iv

    CHAPTER ONE: INTRODUCTION

    Definition 1

    1.1 Terrorism 1

    1.2 Terrorist 1

    1.3 Law 1

    1.3.2 International Law 1

    1.3.3 Domestic Law 1

    1.4 Crime 1

    1.5 History of Terrorism 1

    1.6 Origin of Terrorism 2

    Review Questions 3

    References for further reading 3

    CHAPTER TWO: HISTORICAL OVERVIEW 3

    2.2 Old and New Terrorism 4

    2.3 Definition. 4

    2.3.2Definition 4

    2.4 Characteristics of terrorism 4

    2.4.2 Characteristic of new terrorism 4

    2.5 Evolution of terrorism 4

    2.6 Cause of Terrorism: 4

    2.7Motivations for terrorism 4

    2.8 Psychological Perspective 4

    2.8.2 Ideological Perspective 4

    2.8.3 Strategic Perspective 5

    Review Questions 6

    References for further reading 6

    CHAPTER THREE: THE EVOLUTION OF TERRORISM 5

    3.1 Background 7

    3.2Classical, Modern, and Postmodern Terrorism 7

    3.3Factors that motivate terrorism 7

    3.4 Reasons why terrorism exist 7

    3.5 Types of terrorism 8

    Review Questions 9

    References for further reading 9

    CHAPTER FOUR: A TERRORIST IDENTITY 10

    4.1 States, Non-State Actors 10

    4.2 Classification of Terrorists 10

    4.3 Terrorist profile 10

  • 6

    4.4 Availability, readiness, willingness 10

    4.5 Terrorism anti-terrorism Counter terrorism 10

    4.6 Goals and objectives 10

    Review Questions 11

    References for further reading 11

    CHAPTER FIVE: THE LAW AND TERRORISM 12

    5.1 Introduction 12

    5.2 Categories of Terrorism 12

    5.2.2 State-Sponsored Terrorism 12

    5.2.3 Response to Terrorist Threats and Attacks 12

    5.2.4 Religious Terrorism 12

    5.2.5 Nationalist Terrorism 12

    5.2.6 Left-wing Terrorism 12

    5.2.7 Right-wing Terrorism 12

    5.2.8 Anarchist Terrorism 12

    5.2.9 Group Terrorism Narcoterrorism and the Weakening of Democracies 12

    5.3 Information: availability authenticity probability 13

    Review Questions 14

    References for further reading 14

    CHAPTER SIX: RESPONSES TO TERRORISM 15

    6.1 Introduction 15

    6.1.2 Measures to reduce terrorism 15

    6.2 Weapons 15

    6.2.2 Definition of explosives 15

    6.2.3 Nature of explosives 15

    6.2.4Sources of the explosives 15

    6.2.5 Types of explosives 16

    Review Questions 17

    References for further reading 17

    CHAPTER SEVEN: WEAPONS USED 18

    7.1 Definition of explosives 18 7.2 Types of explosives 18 7.3 Classifications of explosives 18 7.4 Identification 18 7.5 Methods used in the identification 18 7.6 Sources 18 7.7 Nature 18 7.8 Availability 18 7.9 Databases on terrorism 18 Review Questions 19

    References for further reading 19

    CHAPTER EIGHT: IDENTIFICATION 20

    8.1 Explosives 20

    8.1.2 Common Explosives 20

    8.1.3 Secondary Explosives 20

    8.2 Tactics 20

  • 7

    8.2.1 Response 20

    8.3 State-Terrorism 20

    8.3.1 Group Terrorism 20

    Review Questions 21

    References for Further Reading 21

    CHAPTER NINE: FUNDING TERRORISM 22

    9.1 Funding 22

    9.2 The evil-nexus 22

    9.3 Costing 22

    9.4 Financing terrorism 22

    9.5 Financial control 23

    9.6 Categories 23

    Review Questions 24

    References for further reading 24

    CHAPTER TEN: INVESTIGATION 25

    10.1 Policy and response to terrorism in Kenya 25

    10.2 Impact of terrorism attacks on Kenya 25

    10.3 Identification of explosive materials 25

    10.4 Counter-terrorism 25

    10.5 Pejorative use 25

    10.6 Motivation 25

    10.7 Domestic terrorism and democracy 25

    10.8 Perpetrators 25

    10.9 Mass Media 26

    Review Questions 27

    References for further reading 27

    Appendix 1: Project Classification Codes 28

    Appendix 2: Sample Test Papers 30

  • 8

    CHAPTER ONE: INTRODUCTION

    LEARNING OBJECTIVES

    AT the end of the lesson the students should be able to

    i) discuss the most universally accepted definition of terrorism, and competing definitions of terrorism proposed by various scholars and institutions;

    ii) Identify the different types of terrorism. iii) Discuss the motivation behind terrorism and terrorist acts.

    INTRODUCTION Terrorism is an ancient practice that has existed for over 2,000 years.

    1.1 Terrorism

    There is neither academic nor international nor legal consensus regarding the definition of the

    term terrorism. The difficulty in defining terrorism is in agreeing on a basis for determining

    when the use of violence (directed at whom, by whom, for what ends) is legitimate;

    Terrorism can be defined as : The use of violence for the achievement of political ends which is common to state and non-state groups. Different institutions have come up with working definitions.

    1.2 Terrorist: a person who uses terrorism in the pursuit of political aims

    1.3 International Terrorism: there is no accepted definition to the term terrorism

    however this can be used as a guide "an act intended to cause death or serious bodily

    injury to a civilian, or to any other person not taking an active part in the hostilities in a

    situation of armed conflict, when the purpose of such act, by its nature or context, is to

    intimidate a population, or to compel a government or an international organisation to do

    or to abstain from doing any act.

    1.4 International law on terrorism: different countries have come up with laws on terrorism

    although all agree on one point that terrorism is a threat to everyone.

    1.5 Domestic Law:

    1.6 History of terrorism: Terrorism is an old tactic. Accounts of terrorism existed before the

    word itself was invented. This was confirmed by specific artifacts located fifty miles south of

    Mosul in Iraq. Assurnasirpal, the conqueror and king of Assyria (884860 BCE), enforced his rule on conquered territories by erecting stone monuments

    1.7 Origin of terrorism: The word terrorism, in and of itself, was coined during the French

    Revolutions Reign of Terror (17931794). At best, we have a most accepted definition of terrorism, is following:

  • 9

    Terrorism is the use of violence to create fear (i.e., terror, psychic fear) for (1) political, (2)

    religious, or (3) ideological reasons (ideologies are systems of belief derived from worldviews

    that frame human social and political conditions). The terror is intentionally aimed at

    noncombatant targets (i.e., civilians or iconic symbols), and the objective is to achieve the

    greatest attain-able publicity for a group, cause, or individual.

    ?

    Review Questions

    i) Does Kenya have a law on terrorism?

    ii) How is terrorism different from warfare? iii) Define the term criminal violence how does criminal violence differ from terrorism? iv) In what ways do you think terrorism is different from politics?

    References for further reading

    i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)

    ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)

    iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iv) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues

    (Los Angeles)

    v) Ely Karmon's (2005) Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)

    vi) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $

    vii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)

    viii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)

    ix) Stewart Bell, (2005) the Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)

    HAPTER TWO: HISTORICAL OVERVIEW

  • 10

    Learning Objectives

    Students will:

    i) Should give be able to explain the characteristics of terrorism using their own definition of the word terrorism

    ii) Explain the history of terrorism and the different types of terrorism today, compare old terrorism with new terrorism.

    iii) Discuss the fifteen causes that explain why people resort to terrorism;

    Introduction: The students should learn about the old and new terrorisms, their

    characteristics and the evolution. The waves of terrorism evolution.

    2.2 Old and New Terrorism

    2.3 Definition: Old terrorism this is when the terrorist target is selective.

    2.3.2Definition: New terrorism is terrorism that is indiscriminate; it causes as many casualties

    as possible.

    2.4 Characteristics of terrorism: the strict compliance with religion, predominantly radical

    Islam, is one of its main characteristics

    2.4.2 Characteristic of new terrorism: its ultra-flexible network and less hierarchical

    organizational structure, enabled by state-of-the-art technologies.

    2.5 Evolution of terrorism: terrorism has evolved overtime to very dangerous levels. It has

    spread to every corner of the world. However it can be traced through four stages.

    2.5.2The first stage was in the late 19th and early 20th centuries.

    2.5.3 The Second stage was the colonial time, as the west colonized Africa terrorism

    was evolving though confined within national geographical boundaries from 1921 until today.

    2.5.4 The Third stage was the contemporary wave; it introduced international

    terrorism, crossing national boundaries, which began in the 1960s.

    2.5.5 The Fourth stage has witnessed the vicious levels of terrorism and religious

    justification for killing, international scope, unparalleled gory tactics and weapons, and

    dependence on technologies of modernity. The latter consists of communications, ease of

    global travel (i.e., moving across borders), and accessibility to finances and WMDs (weapons

    of mass destruction).

    2.5.6 In the Fourth stage , terrorism has reached a global phase. The use of any

    weapon is justifiable. The Other is now a legitimate target. No distinction among targets should be taken into account. Terrorism has become (the war of all against all).

    2.6 Cause of Terrorism: The Clash of Civilizations. The cultural and religious differences

    between civilizations worldwide have become the primary source of terrorism today. This can

    be easily observed in the concept of new terrorism. Terrorists want to produce a Clash of

    Civilizations or cause radical changes in the U.S. presence in the Middle East. Generally,

    religious terrorists compose their own community or population. They are not worried about

    upsetting their supporters with their terrorist attacks. They view themselves as people

  • 11

    accountable only to God. New terrorists may not even deny responsibility for their acts of

    destruction. They oppose any type of negotiation.

    2.7: Motivations for terrorism

    These can be categorized to include but not limited to psychological, ideological, and strategic

    2.7.2 Psychological Perspective: Those who engage in terrorism may do so for purely

    personal reasons, based on their own psychological state of mind. Their motivation may be

    nothing more than hate or the desire for power.

    2.7.3 Ideological Perspective: Ideology is defined as the beliefs, values, and/or

    principles by which a group identifies its particular aims and goals. Ideology may encompass

    religion or political philosophies and programs

    2.7.4 Strategic Perspective: This is when a terrorist group arises seeking redress of

    their grievances through government, but failure to win governments attention to their plight, they may resort to violence.

    ?

    REVIEW QUESTIONS

    i) Discuss the characteristics of terrorism

    ii) Explain some of the motivations for terrorism

    iii) What is the difference between the old terrorism and the new terrorism

    iv) With illustrations show how terrorism has evolved

    References further reading

    i) James Ciment, editor, (2011) World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk,

    NY:

    ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)

    iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press

  • 12

    CHAPTER THREE: THE WORLD AND TERRORISM

    LEARNING OBJECTIVES

    Students will

    i) Identify the role of ideology, psychology, and rationality in terrorism ii) Be acquainted with the profile of the terrorist iii) To assist students in gaining an understanding of terrorism and its role in domestic and

    international politics

    iv) To make students aware of various definitions of terrorism

    3.1 Background: Terrorism is not a new phenomenon in human experience. Violence has

    been used throughout human history by those who chose to oppose states, kings and

    Princes. This sort of violence can be differentiated from what is termed as terrorism. Violence

    in opposition to a government is often targeted against soldiers and those who govern.

    Terrorism, however, is characterized by the use of violence against civilians, with the

    expressed desire of causing terror or panic in the population. Terrorism is not unique to the

    20th and 21st centuries. Terrorism existed in 18th century revolutionary France during the

    reign of terror, as well as among the Zealots of Palestine in opposition to Roman rule some

    2000 years ago.

    3.2 Classical, Modern, and Postmodern Terrorism: Scholars argue that the comparison

    between old and new terrorism can be categorized as classical, modern or postmodern

    terrorism.

    3.2.2: Classical terrorism: means that group warfare is direct; it is aimed at specific

    targets with few casualties (e.g., assassinations) or wreaks havoc on non-significant facilities. The damage is fairly low because the terrorist acts are perpetrated to achieve a

    specific political objective.

    3.2.3: Modern terrorism, Involves a more indirect approach with attacks that are

    more indiscriminate and destruction much higher, inflicting hundreds of casualties. Although

    conventional weapons are used in modern terrorism, they are used to create mass fatalities.

    3.2.4: Postmodern terrorism has the objective of altering the reality of the conflict

    (with its enemy) by the very act of terrorismsuch as using CBRN (chemical, biological, radiological, and nuclear weapons; pronounced C-BURN) weapons or attacks against symbols

    of the enemyto materially demolish as much of their adversary as possible. The objective here is to eliminate the source of conflict itself.

    3.3 Factors that motivate terrorism: The factors that motivate people to join and remain in

    terrorist groups can be religious, economic, social, psychological, and retaliatory.

    3.4 Reasons why terrorism exist:

    There are very many reasons why terrorism exists and why it continues to evolve, such as

    religious fanaticism, ideological zeal, oppression, portrayal of governments (and their actors)

    as oppressive, historical grievances, Resentment and revenge, Poverty, discrimination, hatred

  • 13

    Financial gain, Racism, Guilt by association, Supporting sympathizers, Sensation-seeking and

    failure of conventional channels of expression.

    3.5 Types of terrorism: There are six different types of terrorism: nationalist, religious, state-

    sponsored, left wing, right-wing, and anarchist

    ? Review Questions

    i. How many types of terrorism have been identified? ii. What are some of the reasons why terrorism exists

    iii. There are people who join terrorism groups for financial gain. Do you agree. Explain your answer using examples

    iv. What are some of the factors that motivate terrorism? v. How long has terrorism been in existence?

    References for further Reading

    i) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International)

    ii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)

    iii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)

    iv) Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)

  • 14

    CHAPTER FOUR: A THE TERRORIST IDENTITY

    Learning Objectives

    Identify major themes within definitions of terrorism

    Identify and understand different types of terrorism

    Understand the different objectives of terrorism

    Describe the various facets of the terrorists identity

    Identify the role of ideology, psychology, and rationality in terrorism

    Be acquainted with the profile of the terrorist

    4.1 Types of terrorists: Most people became terrorists as a result of their own creation

    of a new identity or out of a behavior that is sometimes rooted in the identity type they

    create for themselves later in life.

    4.2 Terrorist profile: six types of terrorists have been identified and can be group in

    categories as follows:

    4.2.2 The first category consists of deranged individuals;

    4.2.3 The second, apocalyptic religious or religious nationalist groups who believe the

    end is near for a sinful world;

    4.2.4 The third covers fanatical nationalist groups consumed by hatred against another

    national group in their midst or in a neighbouring country;

    4.2.5 The fourth consists of terrorist groups engaged in a long struggle without evident

    success and without much hope of it;

    4.2.6 The fifth consists of terrorists acting on behalf of a state or even criminal

    terrorist groups and who may calculate that the damage caused and the number of victims

    would be devastating but still limited.

    4.2.7 The final category includes small groups of individuals who suffer from one

    delusion or another and have personal grievances rather than political ones.

    4.3 Behavior of a terrorist may vary depending on ideological commitment, individual

    intelligence and education, geographical setting, and organizational reach. The degrees of

    intent and capability hold the key of how serious each threat actually is as an enemy.

    4.4 Goals and objectives: Goals and objectives of terrorist organizations differ throughout

    the world and range from regional single-issue terrorists to the aims of transnational

    radicalism and terrorism

  • 15

    ?

    Review Questions

    i. Discuss four goals of a terrorist getting involved with terrorism

    ii. List six types of terrorists

    iii. Search for identity pushes some people into terrorist acts. Discuss using examples.

    iv. The intelligence of an individual plays a role in influencing him or her to join a

    terrorist group. Discuss.

    References for further Reading i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence

    from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY: Sharpe

    Reference)

    ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)

    iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press

  • 16

    CHAPTER FIVE: THE LAW AND TERRORISM

    Learning Objectives

    i) To assist students in gaining an understanding of terrorism and its role in domestic and international politics

    ii) To make students aware of various definitions of terrorism and the law iii) To acquaint students with different ways in which terrorism may be iv) addressed

    Introduction: The law

    5.2 International law recognizes that it would be contrary to the purposes of the United

    Nations Charter if a threatened nation were required to absorb an aggressors initial and potentially crippling first strike before taking those military measures necessary to thwart an

    imminent attack. Anticipatory self-defense involves the use of armed force where attack is

    imminent and no reasonable choice of peaceful means is available. Anticipatory self-defense

    provides the basis for using force in self-defense pursuant to the SROEs based on an adversary exhibiting hostile intent.

    5.2.2 State-Sponsored terrorism: State sponsored terrorism describes a situation

    where a government gives active and often clandestine support, encouragement and assistance

    to a terrorist group. Radical states sponsor terrorist groups as a deliberate foreign policy tool.

    5.2.3 Religious Terrorism: Religious terrorists seek to use violence to further what

    they see as divinely commanded purposes, often targeting broad categories of foes in an

    attempt to bring about sweeping changes. Religious terrorists come from all major faiths, as

    well as from small cults.

    5.2.4 Nationalist Terrorism: Nationalist terrorists seek to form a separate state for

    their own national group, often by drawing attention to a fight for national liberation that they think the world has ignored.

    5.2.5: Left-wing Terrorism: Left-wing terrorists are out to destroy capitalism and

    replace it with a communist or socialist regime. Because they perceive most civilians as

    suffering under capitalist exploitation, leftwing terrorists have sometimes limited their use of

    violence to avoid hurting the victims they were out to save.

    5.2.6 Right-wing Terrorism: Right-wing terrorism has often been characterized as

    the least discriminating, most senseless

    type of contemporary political violence. This is because of its seemingly mindless street violence and unsophisticated attacks that target immigrants, refugees, guest workers and

    other foreigners in many European countries, especially in eastern Germany and other former

    communist-bloc states.

    5.2.7: Anarchist Terrorism: From the 1870s until about 1920, anarchist terrorism

    was a major global phenomenon. Revolutionaries seeking to overthrow established

    governments launched a wave of bombings and assassinated a series of heads of state.

    Anarchist terrorism in Europe today is to be found almost solely in Italy and to a lesser extent

    in Spain.

  • 17

    5.2.8 Group terrorism: Narcoterrorism and the weakening of democracies: The existing

    evidence shows that Narco terrorism exists today and has been in there for the past five

    decades. Narco terrorism is defined as the use of illicit drugs to advance political purposes

    and to fund terrorist activities. Greed, corruption, hypocrisy, and willful blindness among

    bankers, financial institutions, and to some extent lawmakers and law enforcement officials

    all over the world have made drug money and other illicit funds easy to launder and hide.

    5.2.9 Information: availability authenticity probability: informers and intelligence when

    given information have failed to act leading to devastating outcome.

    ?

    Review Questions

    i) Discuss the role of ideology in terrorist attacks in Kenya.

    ii) After terrorist attacks it always comes out that the intelligence service had information

    of the pending attack. Discuss why the government never acts on the information

    accessed.

    iii) Group terrorism has been made more difficult to trace due to advanced technology in

    communication. Describe group terrorism.

    iv) Libya has been accused of sponsoring terrorists. Do such accusations portray Libya as

    a state that sponsors terrorist acts in your opinion?

    References for further Reading

    i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)

    ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)

    iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iv) Aziz Z. Huq, (2008): Imagining Counterterrorisms Future, World Policy Journal,

    Winter,

  • 18

    CHAPTER SIX: THE FIGHT: RESPONSES TO TERRORISM

    Learning Objectives

    At the end of the lesson the students should be able to:

    Discuss how terrorists organize.

    Identify ways to combat terrorism.

    Discuss what terrorism will be like in the future.

    Identify how core Values help in identifying and combating terrorism.

    6.1 Response: The lesson should help the students in learning about the various responses to

    terrorist attacks around the world. How do different states act to terrorist attacks either on

    their own soil as has been the case in Kenya, USA and Israel? How have other countries like

    Iraq, Sudan and Somalia that have been accused of aiding terrorist activities reacted and how

    have those countries that even though have not been attacked directly know that terror attacks

    can happen any time reacted?

    6.1.2 Introduction: One of the most important duties of any government is to protect

    its citizens. The prevention of terrorism is about protecting some of the most basic human

    rights. The question for any government is how best to provide that protection for every

    citizen there have been a number of responses to terrorism including but not limited to, the

    use of violence to oppose terrorists, the use of negotiation, and finally the use of international

    conventions to create international norms in opposing terrorist activities.

    6.2 Response to terrorist threats and attacks: There have been a number of responses to

    terrorism. They include but not limited to the use of violence to oppose terrorists, the use of

    negotiation, and finally the use of international conventions to create international norms in

    opposing terrorism

    6.2.2 The use of force and violence against terrorism: The use of force and violence

    against terrorism has been demonstrated periodically. U.S. military action against the Taliban

    in Afghanistan. The use of force is both a tit-for-tat strategy, as well as an attempt to hinder

    the terrorists ability to operate. 6.2.3 Negotiation: is another method for dealing with terrorism. Although nations

    may take a tough stand and declare publicly that they will not negotiate with terrorist groups,

    they may at the same time negotiate secretly. Great Britain negotiated with the Irish

    Republican Army and its political wing Sinn Fein and the African National Congress (ANC)

    and the apartheid government of South Africa. The ANC had been proscribed as a terrorist

    organization, and the government foreswore any negotiation with the ANC. Behind the scenes

    negotiations went on resulting in the end of apartheid in South Africa.

    6.2.4 International agreements: International organizations, such as the United

    Nations, pass resolutions and seek to foster greater political action among member states.

    There several such as the 1997 International Convention for the Suppression of Terrorist

    Bombings which requires the parties to the convention to make it a criminal act to unlawfully

    and intentionally use explosives or other deadly devices in public with the objective of

    causing death or injuring a person and the action by the international community UN Security

    Council anti-terrorism resolution 1373, Improving International Cooperation.

  • 19

    6.3 Non state actor terrorists: Where non-state actor terrorists merely use a states territory as a safe haven, and the host state is unable to prevent the terrorists from operating there

    ?

    REVIEW QUESTIONS

    i) Define a non-state actor in terrorism

    ii) Explain the various response used in the fight against terrorism

    iii) Discuss how international agreements have been used as counter terrorism measure.

    iv) Describe negotiation as a counter-terrorism approach

    References for further Reading

    i) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International)

    ii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)

    iii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND)

    iv) Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)

  • 20

    CHAPTER SEVEN: WEAPONS

    Learning Objectives:

    At the end of the lesson students should be able to

    i) To acquaint students with different ways in which terrorism may be addressed ii) The students should have better understanding of explosives

    iii) The students to have better information on explosives as the terrorists weapon of

    choice

    7.1 Introduction: Why do terrorist chose the type of weapons they use? How do they go

    about making the type of weapons to use? The lesson should guide the students through the

    weapons, the impact and the availability.

    7.1.2 Definition of explosives: It is a chemical compound or mixture ignited by

    heat, shock, impact, friction, or a combination of these conditions and upon ignition,

    decomposes rapidly in a detonation that causes a rapid release of heat and large quantities of

    high-pressure gases that expand rapidly with sufficient force to overcome confining forces.

    7.2 Types of explosives: there are three basic types of explosives 1) mechanical, 2) chemical,

    and 3) atomic.

    7.3 Classifications of explosives: there are three basic types of explosives 1) mechanical, 2)

    chemical, and 3) atomic.

    7.4 Identification: explosives are identified using these qualities: Effective energy, Velocity

    of detonation, Density, Detonation pressure, Sensitivity, Water resistance, Physical

    characteristics, Fume characteristics, Storage life.

    7.4. 2 Methods used in the identification: a number of methods are used in the

    identification of explosives including infrared, nuclear magnetic resonance and X-ray

    fluorescence spectroscopies, mass spectrometry, and high-pressure liquid chromatography

    and Raman spectroscopy.

    7.5 Sources

    7.6 Availability

    7.7 Characteristics: Dynamites, Water Gels, Emulsions, and Slurries, Dry Blasting Agents,

    Binary Explosives

    Review Questions

    i) How do you define an explosive?

    ii) Give two sources for explosives?

    iii) What are the methods used in the identification of explosives?

    iv) How are explosives classified?

    v) What are the qualities used in the identification of explosives?

  • 21

    References for further Reading

    i) Hustrulid W, (1999), Blasting Principles for Open Pit Mining, Vol. 1, Balkema, Rotterdam.

    ii) ICI Technical Services, 1995, ICI Explosives Blasting Guide, ICI Australia Operations.

    iii) ICI Technical Services, 1997, Safe and Efficient Blasting in Underground Metal Mines, ICI Australia.

    iv) Jimeno, C.L. and Jimeno, E.L., 1995, Drilling and Blasting of Rocks, A.A. Balkema, Rotterdam.

    v) Mather, W., (1997), Bulk Explosives, Mining Technology, vol. 79, no. 914, pp. 251-254.New York. http://miningandblasting.wordpress.com/

  • 22

    CHAPTER EIGHT: IDENTIFICATION

    Learning Objectives

    i) To acquaint students with different weapons available to terrorists ii) to help the students understand why explosives are the weapons of choice for the

    terrorists

    iii) The students should have better understanding of explosives

    iv) The students to have better information on explosives as the terrorists weapon of choice

    v) To learn about the tactics used vi) To acquire knowledge on how the weapons are used

    8.1 Introduction

    8.2 Explosives: these are the most commonly used weapons by the terrorists because their

    material and technology are more readily available. The terrorists can use either manufactured

    or improvised explosives in public places and against a wide variety of institutions, vessels

    and buildings. The devices are delivered by humans or transported in vehicles or mailed or

    sometimes shipped. They are detonated directly or remotely by timing, tampering or impact.

    8.2.1Common explosives: These are also known as the primary explosives: they

    are popular with terrorists because the materials needed to make them are readily available.

    8.2.2 There is the Triacetone-Triperoxide (TATP) which is an improvised primary

    explosive that is relatively easy to manufacture.

    8.2.3 The Hexamethlene Triperoxide Diamine (HMTD) an improvised primary explosive prepared from three basic precursors: hexamine, a weak acid, and hydrogen

    peroxide. The product is highly sensitive to friction, impact, and electrostatic discharge.

    8.3 Secondary explosives: Secondary explosives can be grouped into two categories

    8.3.1 ANFO is a secondary/tertiary explosive, and requires little specialized skills or

    machinery to mix. Ammonium Nitrate Fuel Oil (ANFO) is an explosive mixture of

    ammonium nitrate and an organic fuel. Because of its ready availability and cheap material

    cost, ANFO has been used extensively as the main charge in improvised weapons around the

    world and is the most common commercial explosive.

    8.3.2 Urea Nitrate: Nitrate is a high explosive produced by combining dissolved urea

    fertilizer with nitric acid. Urea nitrate is formed as odorless crystals that are colorless to off-

    white, although additives and or metal from the mixing container may alter the compounds appearance. Urea nitrate is used as a secondary explosive

    8.4 Tactics used: terrorists use every and any tactic to ensure they achieve their goal. Some

    of the tactics used are kidnapping tycoons; symbolically bombing monuments, use of

    independent young militants to seize hostages, aerial bombings, widespread and large-scale violence against almost an open-ended category of opponents (i.e., all peoples who are not

    members of the religious terrorists religion or cult).

  • 23

    ? Review Questions

    i) Write down four tactics used by terrorists ii) What are two common explosives used by terrorists iii) Give the other component that can be mixed with Urea Nitrate iv) Explain why terrorist opt to use explosives in their attacks v) Define the term explosives

    References for further Reading.

    i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY)

    ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New York: Routledge)

    iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York: Columbia University Press

    iv) Lewis, I.R.; Daniel, N.W., Jr.; Chaffin, N.C.; Griffiths, P.R.; Tungol, M.W. . (2000).

    Raman spectroscopic studies of explosive materials: towards a fieldable explosives

    detector, Spectrochimica Acta Part A, Vol. 51.

  • 24

    CHAPTER NINE: FUNDING TERRORISM

    Learning Objectives:

    i) Learn the sources of funding for terrorists ii) Identify the types of funding iii) The states that fund terrorism iv) The inter-relationship between the terrorists and Drugs

    INTRODUCTION

    The sources of the very large funds required by the terrorists come from Corruption that

    makes the illegal drug trade possible, facilitates and in turn feeds the umbilical cord that is the

    terrorist lifeline, i.e. money. Illegal drugs are cheap to make but they return enormous

    amounts of money since the demand is high and constant with an ever ready market.

    Terrorists use drug profits to fund their cells to commit acts of murder.

    9.1Funding: the sources of the very large funds required by the terrorists come from corruption that makes the illegal drug trade possible. The illegal trade is their most vital and

    greatest source of funds. No other commodity, legal or not, exists on the market today that is

    better than illegal drugs and that can generate such high and fast returns. The illicit drug trade is the most reliable source of income in the world, with a demand that is constant and continues to grow. Illegal drug money funds terrorist organizations and activities. Terrorists use drug profits to fund their cells to commit acts of murder.

    9.2 The Evil-Nexus: This consists of drug trafficking organizations, organized crime, money

    launderers, and terrorism. The Administration of the United States of America has identified

    most of the countries and terrorist organizations that make up the Evil Nexus. These are the

    countries that grow and produce the drugs and the organizations that sell them, profit from

    them, and use those profits to finance terrorism that destroys the economy of the state. These

    countries and organizations fund the Evil Axis of terrorism.

    9.3 Costing: besides the operational costs terrorist groups need funds for planning, recruitment, procurement, preparation, delivery of materials, communications, persuasion,

    propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of targets,

    and assault on targets.

    9.4 Financing Terrorism: this is defined broadly by the World Bank and International

    Monetary Fund (IMF) as the financial support, in any form, of terrorism or of those who encourage, plan or engage in it. the number and seriousness of acts of international terrorism depend on the financing that terrorists obtain.

    i

    9.5 Financial Control: financial controls are necessary and important for curtailing acts of terrorism. this is by perform preventive, deterrent, investigative, and analytical functions,

    9.6.1 Funding Techniques: Terrorism is funded from various sources and in many different

    ways. The methods and sources used vary from country to country or region to region as well

  • 25

    as terrorist group to terrorist group. State financing state and other entities that directly or

    indirectly are in such financing either by acts and omissions such as sheltering, facilitating,

    funding and failure to adopt suppressive measures.

    9.7 Categories: we have two categories depending on the origin: here we have two categories

    depending on the origin:

    9.8 Legitimate funding: Terrorists use a wide variety of methods to move money within and

    between organisations, including the financial sector, the physical movement of cash by

    couriers, and the movement of goods through the trade system. Charities and alternative

    remittance systems have also been used to disguise terrorist movement of funds.

    9.8.2 Illegal Funding: illegal funding: this source of financing comes from a great

    variety of criminal actions, such as smuggling, almost all kinds of fraud, theft, stolen cars,

    drug trafficking, kidnapping, robbery, extortion, petty crime, ID theft, money laundering, and

    smuggling of money.

    9.9 Moving the Funds: Terrorists use a wide variety of methods to move money within and

    between organisations, including the financial sector, the physical movement of cash by

    couriers, and the movement of goods through the trade system. Charities and alternative

    remittance systems have also been used to disguise terrorist movement of funds.

    ?

    Review Questions

    i) Name two sources of finance for the terrorists.

    ii) How is the money used for terrorism acts moved about?

    iii) Using examples discuss one legitimate source of funding for the terrorists

    iv) What are the other works, besides the operational costs terrorist groups need funds

    for?

    v) Discuss the evil-nexus in relation to funding terrorism and terror acts.

    References for further Reading

    i) www.un.org/terrorism/cttaskforce

    ii) Kaplan Eben (2006) Tracking Down Terrorist Financing, available on http://www.cfr.org/publication/10356/#1.

    iii) Kruse Anders (2003)Listing and of Natural Persons Challenges of Implementation on a State Level, Swiss EAPC/PfP Workshop on Combating Financing of Terrorism, Geneva. Levitt Matthew,( 2007) Blocking Terror

    Finances, http://www.washingtoninstitute.org/templateC06.php?

    (Zeidan, 2005:217).

  • 26

    CHAPTER TEN: INVESTIGATION: TERRORISTS RAISE, MOVE AND USE

    FUNDS

    LEARNING OBJECTIVES

    Students should have knowledge on how investigations are carried out.

    i) Who is investigated ii) Who is in charge of the investigations iii) How is the terrorist money raised iv) How is it spent. v) What is counter terrorism vi) How is the world handling terrorism

    10.1 Introduction: Since the terrorist attacks of 9/11 there have been several legislation

    policies drafted and designed to counter terrorism: these laws, policies and practices are

    critical, as counter-terrorism measures but if not applied accordingly may be

    counterproductive, especially if they fail to protect human rights, discriminate, increase

    repression, or stigmatise and alienate certain groups. This can undermine the trust and

    confidence needed for effective cooperation.

    10.1.2 Definition: the offensive measures taken to prevent, deter, preempt, and respond to

    terrorism.

    10.2 Counter-terrorism: Counter-terrorism measures can contribute to the feelings among

    certain groups, community or religions that they are being treated as a suspect community and targeted by authorities simply because of their religion color..

    10.2.2 Counter-Terrorist Financing Efforts: four areas which could be the focus of

    efforts to further strengthen counter-terrorist financing efforts: (1) action to address

    jurisdictional issues including safe havens and failed states, (2) outreach to the private sector

    to ensure the availability of information to detect terrorist financing, (3) building a better

    understanding across public and private sectors and (4) enhanced financial intelligence to

    exploit the value of financial investigation as a tool in fighting terrorism.

    10.3 Jurisdictional Financial Investigation as a Tool in Fighting Terrorism. 10.4 Democracy and Domestic Terrorism:

    10.5 Terror-Supporting Extremism;

    10.6 Pejorative Use: The use of a word in a judgmental or harsh manner. For the word

    terrorism it arises from the fact that the word terrorism has no widely accepted definition.

    This has seen it being used and applied to situations that may otherwise not have been

    considered as terrorist acts or forms of violence committed and considered terrorism. The

    failure to have a consensus on what terrorism is makes the use of the word to be mis-used or

    applied to situations that ought not to be considered terrorist situations. The lack of clear

    definition has real and serious consequences on international efforts to counter the terrorist

    threat, as states cannot adequately counteract a phenomenon that they absolutely agree must be eliminated as long as they fundamentally disagree on its very definition.

  • 27

    10.7 Types of Motivation to Terrorism Practices: Terrorism in general has many motivations depending on the special interests of the individual or cells. 10.8 Perpetrators: 10.9 Databases on Terrorism: This is a description and assessment of Internet-accessible

    databases relevant for social science research on terrorism. The data details those websites

    that provide actual data, e.g., names of terrorist organizations and incidents of terrorist

    activity. Alongside the databases is an extensive list of additional resources that provide

    commentary and analysis of terrorism events and trends. The databases will be used for

    Deterring terrorism, detecting terrorism and disrupting terrorism acts.

    10.10Mass media: the relationship between Media and terrorism is a complicated one. The

    media is the first to report terrorist acts and this is important for a terrorist group as they

    provide the publicity while spreading its message. If one sees terrorism as a communications

    strategy, then the media has unfortunately or without intending to often helped pass the

    terrorists message. At the same time, the media can also play an important part in countering

    terrorism

    10.10 Kenya and terrorism: Kenya is a key partner in the Global War on Terror (GWOT).

    Kenya has been a target of several attacks: Nairobi and Dar es Salaam (Tanzania) USA

    embassy attacks1998: In 2002, Kikambala Hotel attacks on Kenyas coast, while simultaneously shooting a surface to air missile at an Israeli commercial aircraft, which

    luckily they narrowly missed the target, the Westgate Shopping Mall in Nairobi attack 2013,

    which made international headlines and took the lives of 67 individuals from nearly a dozen

    countries around the world. These have earned Kenya the reputation as a hub for terrorism,

    violent extremism, and factionalism. There have been frequent small scale attacks randomly

    carried out in-discriminatively on civilians. These attacks have seen some western countries

    issuing security advisories for their nationals not to visit Kenya.

    10.10.2 Kenya as an attractive target. Kenya is unfortunately an attractive target for

    terrorist attacks. There are factors that have contributed to this attraction including, the

    geography, ethnic composition, political stability, unstable neighbors, poverty, Islamic

    fundamentalism, and lax law enforcement.

  • 28

    ? Review Question

    i) Why has Kenya been a target for the terrorists? ii) Has Kenya signed the anti-terrorism act? iii) The media works for the terrorists. Discuss iv) Define the term financial intelligence in relation to terrorism? v) What role can the citizens play in the fight against terrorism?

    References for further Reading

    i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New York: Routledge)

    i) Adrian Guelke, (2009), The New Age of Terrorism and the International Political System (London and New York: I.B. Tauris)

    ii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman) iii) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues

    (Los Angeles, CA: Sage, 616 pages, $80.00. [Paperback]

    iv) Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries, Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)

    v) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $

    vi) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global Trends (New York: Routledge)

    vii) Alexander T.J. Lennon, et al. (2009) Democracy in U.S. Security Strategy: From Promotion to Support, Center for Strategic and International Studies, March

    http://www.csis.org/media/csis/pubs/090319_lennon_democracy_web.pdf

  • 29

    Appendix 1: Project Classification Codes1

    Appendix 2: Sample Test Papers

    DEPARTMENT OF SECURITY AND SOCIAL STUDIES

    End of Semester Examinations

    BJS3105: INTRODUCTION TO TERRORISM

    Time: 2 Hrs

    Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.

    QUESTION 1

    i) Discuss the characteristics of terrorism(8mks)

    ii) Explain the meaning of the following terms

    a) Deterring terrorism. (5mks) b) Detecting terrorism. (5mks)

    c) Disrupting terrorism acts(5mks)

    d) Databases on Terrorism(3mks) What is the difference between the old terrorism and the new terrorism (4mks?)

    QUESTION 2 (10mks each)

    a) With illustrations show how terrorism has evolved over time(10mks) b) Terrorism in general has many motivations depending on the special interests of the

    individual or cells. Discuss (10mks)

    QUESTION 3 (10mks each)

    a) Define the term counter-terrorism(5mks) b) Discuss some of the motivations for terrorism (10mks)

    c) Using examples discuss one legitimate source of funding for the terrorists (5mks)

    QUESTION 4 (10mks each)

    Ideology plays a very big part in the motivation for terrorist attacks. Using examples discuss

    the statement. (10mks)

    a) Discuss the meaning of the term legitimate funding in relation to funding of terrorism(10mks)

    b) besides the operational costs terrorist groups need funds for planning, recruitment, procurement, preparation, delivery of materials, communications, persuasion,

    propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of

    targets, and assault on targets. Discuss. (10mks)

  • 30

    QUESTION 5

    a) Discuss three types of explosives. (10mks).

    b) Discuss the following types of terrorism (10mks)

    i) State-Sponsored terrorism ii) Religious Terrorism iii) Nationalist Terrorism

  • 31

    DEPARTMENT OF SECURITY AND SOCIAL STUDIES

    End of Semester Examinations

    BJS3105: INTRODUCTION TO TERRORISM

    Time: 2 Hrs

    Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.

    QUESTION 1 (3mks each)

    a) Explain the meaning of the following terms i) ideological zeal ii) Oppression: portrayal of governments (and their actors) as oppressive. iii) Historical grievances: iv) Resentment and revenge v) Violations of international law: vi) Discriminated vii) Hatred Vii) Racism:

    xi) Legal funding for terrorist acts

    QUESTION 2 (10mks each)

    a) Discuss why explosives are the most preferred weapons for terrorist attacks (10mks). b) Using examples describe four tactics used by terrorists (10mks)

    QUESTION 3(10mks) a) We have two categories of funding for terrorist acts. Discuss two sources of illegal

    funding (10mks)

    b) The use of violence, negotiation and international conventions to create international norms in are some of the methods used in opposing terrorism. Discuss(10mks)

    QUESTION 4 (10 mks each)

    a) Describe four of the six types of terrorists that have been identified (10mks)

    b) Some of the characteristics of new terrorism are the ultra-flexible network, less hierarchical

    organizational structure and the efficient state-of-the-art technologies. Discuss (10).

    QUESTION 5 a) Describe the four waves of the evolution of terrorism (8mks) b) Define the term criminal violence and show how it differs from terrorism (6mks) c) In what ways do you think terrorism is different from politics(6mks)

  • 32

    i Worldbank website