Upload
erothmanjsu
View
136
Download
0
Embed Size (px)
Citation preview
Part IIThreats and VulnerabilitiesThreats and Vulnerabilities
Chapter 7
Sea ChangeSea ChangeThe New Terrorism and Homeland The New Terrorism and Homeland
SecuritySecurityMartin, Understanding Homeland Security
© 2015 SAGE Publications, Inc.
The Pre-September 11 Terrorist EnvironmentThe Pre-September 11 Terrorist Environment Proxy War: The Cold War and the “Old Proxy War: The Cold War and the “Old
Terrorism”Terrorism”
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
The Pre-September 11 Terrorist EnvironmentThe Pre-September 11 Terrorist Environment
The Left-Wing Terrorist EnvironmentThe Left-Wing Terrorist Environment The Ethnonationalist Terrorist EnvironmentThe Ethnonationalist Terrorist Environment Case in Point: The Palestinian Nationalist Terrorist Case in Point: The Palestinian Nationalist Terrorist
EnvironmentEnvironment The Religious Terrorist Environment and the Dawn The Religious Terrorist Environment and the Dawn
of the New Terrorismof the New Terrorism
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Proxy War: The Cold War and the “Old Proxy War: The Cold War and the “Old Terrorism”Terrorism”
Rivalry Between East and WestRivalry Between East and West Wars of National LiberationWars of National Liberation Nationalism and MarxismNationalism and Marxism
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Religion and Terrorism in the Modern EraReligion and Terrorism in the Modern Era Case in Point: The New Terrorism and Case in Point: The New Terrorism and
GlobalizationGlobalization
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Religion and Terrorism in the Modern EraReligion and Terrorism in the Modern Era
Common Principles of Religious ExtremistsCommon Principles of Religious Extremists A Central Feature of the New TerrorismA Central Feature of the New Terrorism Al Qaeda and Islamist AlliesAl Qaeda and Islamist Allies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Case in Point: The New Terrorism and Case in Point: The New Terrorism and GlobalizationGlobalization
Effect of Political and Economic IntegrationEffect of Political and Economic Integration Opportunities for Terrorist Maximum ImpactOpportunities for Terrorist Maximum Impact Effect of New Information TechnologiesEffect of New Information Technologies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Weapons of Mass Destruction and the Weapons of Mass Destruction and the Objectives of the New TerrorismObjectives of the New Terrorism
Netwar: A New Organizational TheoryNetwar: A New Organizational Theory Case in Point; Asymmetrical WarfareCase in Point; Asymmetrical Warfare
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Weapons of Mass Destruction and the Weapons of Mass Destruction and the Objectives of the New TerrorismObjectives of the New Terrorism
Attracting AttentionAttracting Attention Pleasing GodPleasing God Damaging EconomiesDamaging Economies Influencing EnemiesInfluencing Enemies
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Netwar: A New Organizational TheoryNetwar: A New Organizational Theory
Semiautonomous CellsSemiautonomous Cells Chain NetworksChain Networks Star, Hub, or Wheel NetworksStar, Hub, or Wheel Networks All-Channel NetworksAll-Channel Networks
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Case in Point: Asymmetrical WarfareCase in Point: Asymmetrical Warfare
Unconventional, Unexpected, and Unconventional, Unexpected, and UnpredictableUnpredictable
Redefine International Security EnvironmentRedefine International Security Environment Overcome Traditional ProtectionsOvercome Traditional Protections
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Countering ExtremismCountering Extremism Countering the New TerrorismCountering the New Terrorism
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Countering ExtremismCountering Extremism
Long-Term SolutionsLong-Term Solutions Operations Other than WarOperations Other than War Limitations of Coercion Limitations of Coercion
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.
Countering the New TerrorismCountering the New Terrorism
Homeland Security MeasuresHomeland Security Measures Covert “Shadow Wars”Covert “Shadow Wars” Counterterrorist Financial OperationsCounterterrorist Financial Operations Global Surveillance of Communications Global Surveillance of Communications
TechnologiesTechnologies Identifying and Disrupting Transnational Terrorist Identifying and Disrupting Transnational Terrorist
Cells and Support NetworksCells and Support Networks
Martin, Understanding Homeland Security © 2015 SAGE Publications, Inc.