Advanced search Help
Searching for terms: ALL (Suicide AND Bombers) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Uniform Approach to National Suicide Bomber Incident Response and Recovery
"First responders in the United States are not adequately prepared to respond to a suicide bomber attack. Police, fire, and EMS are using protocols that do not anticipate the unique needs of a suicide bomber response. There is an urgent need to develop and implement a consistent approach for responding to suicide bombers. This thesis developed a Suicide Bomber Response Framework using International Association of Chiefs of Police training documents as the primary source, along with Technical Support Working Group training materials and recommendations from relevant national training institutions. A Homeland Security Exercise and Evaluation Program (HSEEP) full-scale exercise was then conducted for this thesis based on the newly written Framework to identify gaps between current standard operating procedures and operating procedures recommended by the Suicide Bomber Response Framework. Exercise evaluators identified a significant gap between standard operating procedures of first responders and the recommended response procedures in the Suicide Bomber Response Framework. The thesis argues that a unified suicide bomber response approach should be instituted nation-wide. The Suicide Bomber Response Framework would serve as the tool for responding agencies to develop consistent response plans necessary for this critical public safety concern."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Day, Dwayne
2008-03
-
Assessing the Biological Threat Posed by Suicide Bombers
"The secondary threat of biological contamination with pathogenic organisms posed by suicide bombers is a significant knowledge gap. Studies of the 2005 London tube acts of terrorism highlighted the biological dimension to the threat, where the suicide bomber's bones acted as shrapnel and infected bystanders with hepatitis B. While it is unlikely the terrorist intended to spread this particular disease, we must now evaluate the possibility of intentional self-infection with highly contagious pathogens before a planned suicide bombing. Although infection by the implantation of bone fragments has been demonstrated in the past, the aerosolization of the remains of a bomber must be examined as well. Knowledge of the true contamination zone resulting from both aerosols and larger fragments from the bomber will aid first responders in preventing the risk of a potential epidemic by use of well directed decontamination and accurate determination of individuals exposed to potentially infectious agents. To address the problem of secondary, infectious after effects of a suicide bombing, we performed a series of outdoor tests to determine if aerosols were generated that could harbor living organisms. 'Our results demonstrate that aerosols generated can protect living organisms from the heat and pressure of an explosion and that those aerosols can be carried long distances, even upwind by the explosion.' To perform the tests, we used ballistic gelatin as test organisms were easily and uniformly distributed throughout each model used. Although more complex, and possibly more accurate, models of a suicide bomber were considered, budget and time constraints limited us to the ballistic gelatin blocks."
Edgewood Chemical Biological Center
Cabalo, Jerry Becker; Kesavan, Jana; Sickenberger, David . . .
2016-02
-
Exploding Stereotypes: The Unexpected Operational and Demographic Characteristics of Boko Haram's Suicide Bombers
From the executive summary: "Since 2009, the Islamist group known as Boko Haram (formally known as Jama'atu Ahlis Sunna Lid-da'awati wal-Jihad, or more recently, the Islamic State's West Africa Province [ISWAP]) has ushered in a wave of violence across the Lake Chad Basin region of West Africa, at the intersection of Nigeria, Niger, Chad, and Cameroon. Among other tactics that it has employed during its reign of terror, the group has been noted for its use of suicide bombers. While the prevalence of suicide bombings has been duly recognized, little remains known about the broader arc of their existence and efficacy: What strategic and operational trends underlie Boko Haram's use of suicide bombers, and how effective have they been at achieving their objectives? Just who are Boko Haram's suicide bombers? Where are they deployed, what do they target, and how do different bomber demographics differ in their actions? More broadly, what does Boko Haram's use of suicide bombers reveal about the past, present, and future of the terrorist group?"
Combating Terrorism Center (U.S.)
Warner, Jason; Matfess, Hilary
2017-08-09
-
Suicide Bombers in CONUS
"This monograph analyzes recent (post-1980) suicide bombings and determines the probability of such bombings occurring in the Continental United States (CONUS). The analysis includes a brief history of modern suicide bombing; an examination of the strategic, tactical, social, and individual logic of suicide bombing; a discussion of the probable characteristics of suicide bombings against the United States, both within CONUS and abroad; and recommendations about what can be done to mitigate future bombings. Suicide attackers have been a part of warfare for over two millennia, but the coupling of suicide attackers and explosives greatly increased the importance and effectiveness of this tactic in the 20th century. The modern phenomenon of suicide bombing had its genesis in the Iran-Iraq War from 1980-88. Concurrent with the Iran-Iraq War, Iran influenced the development of Hezbollah in Lebanon. Hezbollah tried suicide bombing against the United States and France, and then later against Israel. Other groups such as the Liberation Tigers of Tamil Eelam (LTTE), the Palestinians, and the People's Liberation Army of Kurdistan (PKK) started employing suicide bombers in the 1980s and 1990s. As suicide bombing spread geographically and ideologically, it also increased in sophistication. It advanced from being a simple bomb delivered by truck, to include suicide vests, boat bombs, and eventually airplanes. The vast majority of suicide bombings (98%) are part of an organized campaign. The only group that conducts suicide bombings against the United States outside of active war zones is Al-Qaida. Al-Qaida attacks have evolved to the point where there are two different strains: al-Qaida-sponsored and al-Qaida-inspired."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Kapusta, Philip E.
2007-05-07
-
Information Operations Approach to Counter Suicide Bomber Recruiting
"Information Operations (IO) is one of today's least understood, yet most common scapegoat for perceived Global War on Terrorism failures in Iraq. Despite the on-going efforts of strategists and commanders to leverage the media in an attempt to tell the 'good news' successes in Iraq, news coverage continually gravitates towards acts of violence, especially suicide bombings. With or without media support, recent polls indicate that the Coalition has already won many of the 'hearts and minds' of the Iraqi people. Yet, most of the success or failure of information operations is measured and stuck on telling only the 'hearts and minds' story. The analysis from this study suggests that IO correctly shoulders blame for all the wrong reasons. More appropriately, IO is underutilized in what can be deemed a 'kinetic-only' battle on the suicide bomber. This project proposes an information operations policy expansion in relatively unused supporting elements -- counterdeception and counterpropaganda. This will add a non-kinetic approach to the kinetic-centric fight on suicide bombers. The study will analyze how information operations, in the form of counterdeception and counterpropaganda, can target the recruiting base for suicide bombers. More specifically, the project explores the possible success that could be achieved when counterpropaganda and counterdeception address cognitive third order effects of those who are most influential to the potential suicide bomber's decision-making. This new approach targets the Sunni religious faction and the family. This departure from current information operations norms serves as a change to current strategy. The recommended strategy changes also are included in the study."
Army War College (U.S.)
Rabena, William S.
2006-03-15
-
Suicide Bombers-Some Were Merely Children
"The recent introduction of suicide bombers into the American military's battle space is not new, remember the Japanese Kamikazes during World War I1I? These modern day bombers, however, have been operating primarily in the confines of the Israeli- Palestinian land until recently. In the year 2004, families in the Gaza Strip became highly alarmed when children as young as 11 were identified as potential bombers. These youngsters' elation and willingness to die perplexed many. The use of children, actually, is not new. Some African nations typically use child soldiers to fight their wars, Liberia is an example. This most brutal violence delivered with the elements of surprise, lethality, precision, and deception is created by mostly young adults of Arab descent. There is no notable feature; they are hard to detect, thereby, making everyone a potential target. This low cost, disposable human weapon, by far, is the most effective weapon against the technologically advanced militaries. There has been no method of deterrence identified to date. This paper will attempt to explore the root reason(s) of this barbaric weaponry. The root cause must be understood to begin working towards permanent eradication of suicide bombers."
Army War College (U.S.). Strategic Studies Institute
O'Neal-James, Lillian A.
2005-03-18
-
Female Suicide Bombers
"The U.S. Army War College provides an excellent environment for selected military officers and government civilians to reflect and use their career experience to explore a wide range of strategic issues. To assure that the research developed by Army War College students is available to Army and Department of Defense leaders, the Strategic Studies Institute publishes selected papers in its Carlisle Papers in Security Strategy Series. Ms. Debra Zedalis, member of the Army War College Class of 2004, is the author of this paper. She reviews the history of female suicide bombers, focuses on their characteristics, analyzes recent changes in their use by various terrorist organizations, and provides implications of change within a strategic assessment of future female suicide bombings."
Army War College (U.S.). Strategic Studies Institute
Zedalis, Debra D.
2004-06
-
Chechen Female Suicide Bombers: The New Face of Terrorism in Moscow
This powerpoint presentation outlines the reasons why more females are becoming suicide bombers and its ramifications for Russia.
United States. Department of State. Overseas Security Advisory Council; United States. Department of State
-
Subject Bibliography: Suicide Bombers
This is an FBI (Federal Bureau of Investigation) Library subject bibliography on "Suicide Bombers." Additional information about each source can be found in the abstracts beneath the citations.
FBI Academy
Bunker, Robert J.
2007-05
-
Targeted Terror: The Suicide Bombers of al-Shabaab
"Since 2005, the most intractable terrorist threat in Sub-Saharan Africa has come from the Somalia-based Islamist terrorist group known as 'Harakat al-Shabaab,' or colloquially as 'al-Shabaab.' Translated into English as 'The Youth' or 'The Guys,' al-Shabaab has wreaked havoc throughout East Africa since the group's formation in 2005, attacking Somali government forces, civilians, and representatives of the international community in its bid to install a strict interpretation of sharia law in the country, oust the non-Somali outsider forces fighting it, and contribute to the broader global jihadi struggle. [...] In the course of its violent campaign, al-Shabaab has used a range of tactics. These include the use of gunmen, IEDs, drive-by shootings, targeted assassinations, ambushes, and raids, among others. In addition, the group is known to use stonings, amputations, and beheadings to punish and intimidate those in its area of control who do not abide by its interpretation of sharia. Yet perhaps the most pernicious--and little-understood--tactic in al-Shabaab's arsenal of violence is its use of suicide bombers."
Combating Terrorism Center (U.S.)
Warner, Jason; Chapin, Ellen
2018-02
-
D.I.M.E.F.I.L.: A Worldwide Campaign for Life
"Countering the trend of suicide bombings requires not only changing the mindset of the potential bomber, but ensuring terrorist organizations which use such methods will incur painful costs. In order to understand what could deter the suicide bomber it was necessary to conduct a study on the profile and the motivating factors of the bomber. What motivates the bomber to kill him or herself? The research conducted showed the motivating factors of a suicide bomber are the organization which recruits the bomber, religion, societal influences, politics and nationalism. The motivating factors for a female are very similar to the male, but most commonly women want to avenge an injustice such as the death or injury of a family member or friend or a rape or assault inflicted upon them. Whatever the motivating factor, women, more so than men, generate much more media coverage. Research indicates that some suicide bombers can be deterred through diplomacy, information, military, economic, financial, intelligence and law enforcement (D.I.M.E.F.I.L.) means, but these elements cannot stop suicide attacks. If these means of national power are not used as an ongoing method of deterrence, another 9/11 on U.S soil is a strong possibility."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Grice, Lisa
2007-05-17
-
Suicide Bombing in the COE
"This handbook is one in a series of supplements to TRADOC DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, which is a basic terrorism primer prepared under the direction of the U.S. Army Training and Doctrine Command, Assistant Deputy Chief of Staff for Intelligence-Threats. The terrorist threat confronting our military spans foreign and domestic threats of nation-states, rogue states with international or transnational agent demonstrations, and actors with specific strategies, tactics, and targets. A major tactic used by many terrorist groups is the use of suicide attacks. Although suicide terrorism is covered in the capstone terrorism handbook, this supplement provides more detail and insight. This informational document supplements the basic terrorism handbook and supports operational missions, institutional training, and professional military education for U.S. military forces in the Global War on Terrorism (GWOT). This document provides an introduction to suicide terrorism, and addresses the history of the phenomena, how terrorist organizations recruit potential suicide bombers, motivations for use of suicide, characteristics of suicide bombers, various weapons and TTPs used by suicide bombers, and finally, the specific threats to the military."
United States. Army Training and Doctrine Command
2005-08-15
-
Developing an Operational and Tactical Methodology for Incorporating Existing Technologies to Produce the Highest Probability of Detecting an Individual Wearing an IED
"Among the many weapons currently used by terrorist organizations against public welfare and coalition forces in Iraq and Afghanistan, human-born Improvised Explosive Devices (IEDs) present a significant threat. Commonly referred to as - suicide bombers, these individuals enter crowded public areas in order to detonate the IED, inflicting lethal damage to the surrounding individuals. Constructed of non-standard parts and hidden under layers of clothing, these human-born IEDs go undetected until detonated. Currently, there are no detection systems that can identify suicide bombers at adequate standoff distances. The purpose of this research is to develop a methodology that combines current technologies to increase the probability of identifying a suicide bomber at a checkpoint or marketplace with an adequate standoff distance. The proposed methodology will employ each sensor technology incorporating unique detection threshold values. We will analyze our proposed methodology utilizing a simulation model that provides both the probability of detecting a bomber and the probability of a false detection. These simulations will allow us to determine the threshold values for each sensor that result in the best probability of detection of a suicide bomber and allows for a small probability of false detections."
Naval Postgraduate School (U.S.)
Binstock, John
2010-06
-
Understanding Female Suicide Terrorism in Sri Lanka through a Constructivist Lens
"Most analysts agree that Tamil suicide attacks were used primarily as special weapons to infiltrate tightly controlled military targets. The utility of this tactic is not unique to the Tamil movement and has been utilized as a prime motive by nearly every organization choosing to implement women as suicide bombers. However, behind every tactic are larger social demands striving for recognition. These social movements are driven by norms, identity, and social structures that define sub-state actors in turmoil. This study of female suicide bombers will seek to address how agency and structure of Tamil society were systemic factors driving the organizational imperatives of the LTTE [Liberation Tigers of Tamil Eelam]. In the case of Sri Lanka, I argue three primary factors suggest a constructivist interpretation provides a more sufficient tool for understanding the use of female suicide bombers. First, a number of institutional programs promoted discrimination, suppression and violence against Tamil society; second the LTTE organization was able to harness discontent and mobilize women as protectors of the Tamil nation; and third, the above two factors were skillfully wrapped in a narrative of cultural liberation that outlined the necessity of female martyrdom. While realist notions of the utility of female suicide bombers as a military tactic provide a valuable explanation, the tactic's emergence is better explained by understanding a broader spectrum of components developed in this article."
Naval Postgraduate School (U.S.). Center for Contemporary Conflict
Dearing. Matthew P.
2010
-
Agency and Structure as Determinants of Female Suicide Terrorism: A Comparative Study of Three Conflict Regions
"This thesis addresses the question, why do some insurgent groups use female suicide bombers while others avoid this tactic? Afghanistan is an example of a conflict zone where the propensity for female suicide terrorism is lower than other conflict regions, such as Iraq and Sri Lanka. Strategic calculations and materialist gains play a unique role in influencing organizational behavior, but deeper structural considerations such as norms, institutional barriers, and the dynamics of conflict also influence the agency of actors. Realist approaches provide limited explanatory power in addressing the variation in the use of female suicide terrorism; constructivism provides a better model toward addressing individual, organizational and societal acceptance of this tactic, particularly as it relates to women. The case of the Taliban insurgency and its limited use of female suicide bombers suggest that factors other than materialist imperatives are at play. The comparative study of female suicide bombings has immediate policy and counterterrorism implications, but it can also shed light on the debate between materialist and constructivist approaches in international relations theory and in the formulation of military doctrine."
Naval Postgraduate School (U.S.)
Dearing. Matthew P.
2009-12
-
Serial No. 110-134: Counternarcotics Strategy and Police Training in Afghanistan, Hearing before the Subcommittee on the Middle East and South Asia of the Committee on Foreign Affairs, House of Representatives, One Hundred Tenth Congress, First Session, October 4, 2007
From the opening statement of Gary L. Ackerman. "Two days ago a suicide bomber killed 11 people in Kabul. Last Saturday a suicide bomber killed 28 Afghan soldiers also in Kabul. These two incidents are part of a larger narrative about United States' efforts in Afghanistan. Since we removed the Taliban from power in 2001 and tried to establish a legitimate, functioning democratic state in their place the issues that have tormented Afghanistan remain the same. There is no security in much of the country. The central government's writ does not extend much beyond the environs of Kabul. In the provinces there is no functioning local government and the United Nations Office on Drugs and Crime projects that 2007 will be another record year for opium production in Afghanistan. That is quite a list of accomplishments after almost 6 years of effort and an investment of $15 billion U.S. dollars. I have said before and I will say again, the President surged in the wrong country. The country where our money, and our diplomacy and our soldiers could have made the most difference is not Iraq, but Afghanistan. Osama bin Laden doesn't live in Baghdad. He is in the mountains between Afghanistan and Pakistan. The Taliban haven't been defeated. They have regrouped, joined forces with narcotics traffickers and imported suicide bombers to destroy the nation's institutions of state and terrorize the Afghan people. Afghanistan's borders are still uncontrolled. The Pashtun tribes, the Taliban and al-Qaeda have set up a new safe haven for training coordinating and conducting terrorist attacks in the northwest of Pakistan." Statements, letters, and materials submitted for the record include those of the following: Thomas Schweich, Mark Schneider, Gary L. Ackerman, and Dana Rohrabacher.
United States. Government Printing Office
2008
-
Women as Victims and Victimizers
This article discusses the recently migrated role of women involved in terrorist movement, from mostly supportive roles to more active, operational ones, including suicide bombers. "The leaders of terrorist movements make cost-benefit calculations to select tactics, targets, and perpetrators, and women suicide bombers are cheap weapons. Further, they garner significantly more media attention and may also shame men into becoming mobilized instead of letting women do their job."
United States. Department of State
2007-05
-
Defeating the Modern Asymmetric Threat
On February 24th, 2002 the Prime Minister of Sri Lanka entered into a Peace Agreement with the Liberation Tigers of Tamil Eelam (LTTE) ending a horrific 19 year-old low-intensity conflict. Over the course of nearly two decades, the LTTE came to exemplify the modern asymmetric threat as they battled the Sri Lankan Armed Forces (SLAF) and for a period an Indian Peace Keeping Force (IPKF). The anthropology in Chapter II, history in Chapter III, and explanation of the Tigers in Chapter IV, describes most of the intricacies of the struggle. In particular, Chapter IV offers four explanations for the prolific use of suicide bombers by the LTTE: one operational, one operational, one psychological and one religious. Chapter V conducts an analysis of the conflict to garner what lessons can be learned from the successes and failures of the SLAF and IPKF so that U.S. commanders can better prepare their troops for future battles against organizations employing similar tactics as the LTTE. Chapter V further tests my hypothesis that the four hypothesis of that the four principles of Internal Defense and Development (IDAD) as currently defined in U.S. Joint Doctrine (maximum intelligence, minimum violence, unity of effort, and responsive government) are the applicable variables in defeating the modern asymmetric threat, even those that employ suicide bombers.
Naval Postgraduate School (U.S.)
Connor, Robert J.
2002-06
-
Leading Healing in a Broken Unit
"What began as an orderly process to allow local civilians to pass through a crowded entry control point (ECP) ended when a lone man detonated explosives strapped to his body. The blast killed several marines and severely wounded nearly a dozen others. Military personnel had been processing civilians as usual that afternoon when the suicide bomber entered the checkpoint. Standing between the barriers, he raised his arms in preparation for a search when he triggered the explosive device. The blast radiated in front of him on the interior side of the ECP, causing harm to those in close range. Characteristic of his command style, the senior enlisted leader (SEL), Roger Selden, was working directly with his men at the ECP. Their mission was to secure a small but significant city in their area of operations (AO). At the checkpoint that day, he had noticed the nervous and agitated behavior of the apparent suicide bomber, and at the last moment he positioned himself in front of one of his men, shielding him from the blast. Selden's act preserved the lives of several of his men, but he was killed."
National Defense University. Center for Technology and National Security Policy. Center for Complex Operations
Taylor, Scott N.; Powley, Edward H.
2010
-
Attack on Bombs: U.S. Air Force Program Weaves Surveillance and Intelligence to Find Roots of IED Attacks in Iraq
The U.S. Air Force is reexamining the way airpower has been applied to the war against insurgents in Iraq, in particular the battle against hidden bombs and suicide bombers. Planners are abandoning the narrow search for single technology solutions to finding and disabling improvised explosive devices (IEDs) and have begun searching for a broader approach that will target enemy planners, organizers, suppliers and bomb makers in their homes and workshops, well before attacks can be put into play. In planning for more than a year, the Air Force last month launched an effort to fuse intelligence around the basic building block of ground moving-target indicator (GMTI) data gathered by aircraft. While some fighters, bombers and unmanned aircraft carry sensors with moving-target detection capability, the primary source of such data is USAF's E-8 Joint Stars long-range radar surveillance aircraft (AW&ST May 16, p. 64).
United States. Army. Army Intelligence & Security Command
Fulghum, David A.
2005-08-02
-
Case Study: The Mythology of Martyrdom in Iraq
Through online video clips and biographies of suicide bombers, the jihadists in Iraq play on themes of humiliation, collusion, and redemption to demonize their enemies and motivate their cadres to make 'heroic' sacrifices. These emotive elements are intended to galvanize support not just from a narrow circle of activists, but from the broader Muslim public as well. "Martyrdom mythologies are not sufficient to explain all the suicide bombings in Iraq. However, ideology, religious framing, and emotional narratives help explain how jihadists deactivate self-inhibiting norms against murder and mayhem and allow them to appear as moral agents even when they are acting in immoral ways."
United States. Department of State
Hafez, Mohammed M., 1970-
2007-05
-
New IO Strategy: Prevention and Disengagement
"Recent IED events in the Middle East and Iraq have witnessed the Baghdad Al-Aimma bridge incident, where several hundred children and women were trampled to death at the mere mention of a suicide bomber in the vicinity; a female involved in the Jordan bombings, allegedly because her brothers were killed by Coalition forces; soaring Iraqi casualty rates; increasing frequency of Iraqi children involved in emplacing roadside bombs, and teens now driving suicide bomb vehicles; and most recently, increasing export of terrorism outside Iraq's borders (Amman). More importantly, we are currently letting the terrorist and insurgents pick the time and place of their information operations in today's Iraq. We appear to be fighting the enemy's fight, and only addressing the symptoms and not the causes of the larger battle by cleverly copying enemy fliers, or mirroring their themes in our psychological operations efforts."
Naval Postgraduate School (U.S.). Center for Contemporary Conflict
Benard, Cheryl; O'Connell, Ed
2006-05
-
Detecting Concealed Weapons: Directions for the Future
"On July 24, 1998, a man entered the U.S. Capitol building in Washington, DC, with a .38-caliber handgun concealed under his clothing. A security check point with a portal weapons-detection system had been established at the entrance of the building. Knowing that his gun would be detected if he walked through the portal, the man stepped around it. Immediately, he was confronted by Jacob Chestnut, one of the Capitol Police officers operating the portal. The man drew his gun and killed Chestnut. He then shot and killed a second officer, John Gibson, before he was stopped.1 Seven years later, on December 5, 2005, a man with a bomb vest under his clothing approached a shopping mall in Netanya, Israel. His behavior alerted police and mall security. When he was confronted outside the mall, the suicide bomber detonated his bomb, killing 5 people and injuring 50.2 Although there has yet to be a suicide bombing in this country, such an attack could happen anywhere-on a bus, at a mall, at the Super Bowl, or at the Academy Awards. It is vital for law enforcement to be able to detect and respond to weapons at a sufficient distance to allow officers to make decisions and take actions that deal safely with the situation. For over a decade, the National Institute of Justice (NIJ) has been working to address this need."
United States. Office of Justice Programs
Tillery, Chris
2007-10
-
Strategic Logic of Suicide Terror
If not all military occupations breed terrorism, which ones do, and why?
This is the key question to be explored in this powerpoint presentation, focusing on the specific operational methods and procedure behind suicide terror, as well as investigating empirical data from past missions as a guide to predicting and countering future attacks. A realistic profile of the average suicide bomber is presented, with a view to solving the question of what draws these individuals to adopt this tactic. Also presented is group profiles of the most prominent terrorist organizations, as well as explaining growth trends behind this widening method of attack and a focused statistical summary of past campaigns.
United States. Department of the Air Force
Howard, Ernie
2004
-
Serial No. 114-56: Israel Imperiled: Threats to the Jewish State, Joint Hearing Before the Subcommittee on Terrorism, Nonproliferation, and Trade and the Subcommittee on the Middle East and North Africa of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, Second Session, April 19, 2015
This is the April 19, 2015 hearing on "Israel Imperiled: Threats to the Jewish State" held before the House Subcommittee on Terrorism, Nonproliferation, and Trade and the Subcommittee on the Middle East and North Africa. From the opening statement of Ted Poe: "The state of Israel has always been surrounded by threats since its existence--threats by nations and terror groups that hate Israel because it is a Jewish state. The goal of these haters has been to eliminate the state of Israel, an aggression started as soon as Israel became an established state. Arab armies amassed on its borders to destroy it. But yet, Israel has continued to exist in the face of suicide bombers and terrorist onslaughts like no country in history. Most recently, 16 people in a bus were wounded yesterday in a bus bombing in Jerusalem, reminiscent of the wave of Palestinian suicide bombings that claimed so many lives a decade ago. In recent years, the threats to Israel have increased and become even more dangerous. The volatile situation in Syria and its transformation into a full blown terrorist haven directly threatens Israel's security." Statements, letters, and materials submitted for the record include those of the following: Michael Rubin, Jonathan Schanzer, David Makovsky, and Tamara Cofman Wittes.
United States. Government Publishing Office
2016
-
Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?
"Why do some individuals decide to break with society and embark on a career in terrorism? Do terrorists share common traits or characteristics? Is there a terrorist personality or profile? Can a terrorist profile be developed that could reliably help security personnel to identify potential terrorists, whether they be would-be airplane hijackers, assassins, or suicide bombers? Do some terrorists have a psychotic (see Glossary) personality? Psychological factors relating to terrorism are of particular interest to psychologists, political scientists, and government officials, who would like to be able to predict and prevent the emergence of terrorist groups or to thwart the realization of terrorist actions. This study focuses on individual psychological and sociological characteristics of terrorists of different generations as well as their groups in an effort to determine how the terrorist profile may have changed in recent decades, or whether they share any common sociological attributes. This study is not about terrorism per se. Rather, it is concerned with the perpetrators of terrorism. Prepared from a social sciences perspective, it attempts to synthesize the results of psychological and sociological findings of studies on terrorists published in recent decades and provide a general assessment of what is presently known about the terrorist mind and mindset."
Library of Congress. Federal Research Division
Hudson, Rex A.
1999-09
-
Bomb Threats Stand-Off Chart
This chart offers information about how far to stand away from a Improvised Explosive Device (IED) threat. Threats include pipe bombs, suicide bombers, briefcase, car, semi-trailer, etc. "It is important to note that the given distances do not guarantee safety, they are estimates based on test data and the area near and around the evacuation distances are still potentially dangerous. Minimum evacuation distance is the range at which a life-threatening injury from blast or fragmentation hazards is unlikely. However, non-life-threatening injury or temporary hearing loss may occur."
United States. Department of Homeland Security
-
DOD / NGO Relations and Stability, Security, Transition and Reconstruction Operations in Sub-Saharan Africa
"Following the demise of the Soviet Union and the end of the Cold War, the context of today's warfare has changed dramatically. The US finds herself engaged in struggles against nebulous enemies with no concept of or desire to 'fight fair'. On September 11, 2001, Al Qaeda aptly demonstrated their lack of restraint in warfare by turning civilian planes full of innocent people into guided missiles directed at civilian institutions. On a smaller scale, they have regularly recruited and indiscriminately employed suicide bombers against local populations in Iraq and Afghanistan. Terror tactics are a weapon of the weak used to bring attention to a perceived injustice or cause. The attention generated aids in the recruiting of like-minded followers to that cause until its support gains enough parity with its opponent to meet force with force. For instance, terrorists like Al Qaeda are prepared to wage a long war against the West in an attempt to establish a new Muslim Caliphate in the Middle East. This type of asymmetric threat arguably represents the nature of warfare for Department of Defense (DOD) forces for the foreseeable future. DOD personnel must now equip, train, and organize to fight against a threat which does not respect state boundaries and shows no compunctions against indiscriminant use of violence (i.e. terrorism) to achieve their goals against a superior conventional power. In this long war, Al Qaeda and other terrorist organizations tend to recruit and draw support from disenfranchised youths throughout the Muslim world. DOD forces can significantly decrease the recruitment base of terrorist organizations through strategic public health partnerships with NGOs [Non-Governmental Organizations] in unstable or failing Muslim states."
U.S. Army Command and General Staff College
Newell, Neal, III
2010
-
Shooting the Messenger: Diplomats Crushed by Wave of New Terrorism
"The security of diplomats is a challenging endeavor that requires constant evaluation and increased resources. This thesis compares and contrasts the Cold War and Post-Cold War ems to determine trends in attacks against diplomatic targets and identifies a dangerous evolution in terrorist tactics that combines suicide bombers with armed assaulters in which none of the attackers intend to survive. The Global Terrorism Database shows the number of attacks against diplomatic targets during the last 22 years of the Cold War(1970-l99l) are roughly equal to the number in the first 23 years post-Cold War (1992-2015)."
Joint Advanced Warfighting Program (Institute for Defense Analyses)
Geinert,Justin M
2017-04-26
-
Joint Operating Environment 2010
"The Joint Operating Environment is intended to inform joint concept development and experimentation throughout the Department of Defense. It provides a perspective on future trends, shocks, contexts, and implications for future joint force commanders and other leaders and professionals in the national security field. This document is speculative in nature and does not suppose to predict what will happen in the next twenty-five years. Rather, it is intended to serve as a starting point for discussions about the future security environment at the operational level of war. The next quarter century will challenge U.S. joint forces with threats and opportunities ranging from regular and irregular wars in remote lands, to relief and reconstruction in crisis zones, to cooperative engagement in the global commons. Our enemy's capabilities will range from explosive vests worn by suicide bombers to long-range precision-guided cyber, space, and missile attacks. The threat of mass destruction-from nuclear, biological, and chemical weapons-will likely expand from stable nationstates to less stable states and even non-state networks. It is impossible to predict precisely how challenges will emerge and what form they might take. Nevertheless, it is absolutely vital to try to frame the strategic and operational contexts of the future, in order to glimpse the possible environments where political and military leaders will work and where they might employ joint forces. The value of such efforts lies not as much in the final product, but much more in the participation of senior leaders and decision-makers in the discussion."
United States. Joint Forces Command
2010-02-18