THREAT GROUPS DEFINES (MAN-MADE) 

a. Political Threats. A political threat refers to the disadvantages that a business can have in a country. 

b. Criminals. People who have committed a crime. 

c. Mentally Deranged Individual. A person who is mentally sick, unable to think or act in a normal or logical way especially because of severe mental illness. 

d. Religious Extremists. A usually religious movement or point characterized by a return to fundamental principles, by rigid adherence to those principles.  

e. Economically Motivated Groups. A group of individuals who commits crimes that are motivated by their economic conditions. 

                                           DEFINE TERRORIST OPERATIONS 

a. Weapons. A weapon, arm, or armament is any implement or device that can be used with the intent to inflict damage or harm. Weapons are used to increase the efficacy and efficiency of activities such as hunting, crime, law enforcement, self-defense, and warfare. In a broader context, weapons may be construed to include anything used to gain tactical, strategic, material, or mental advantage over an adversary.  

b. Training. Acquisition of knowledge, skills, and competencies as a result of teaching. 

c. Sequence of terrorist actions:

Pre-incident phase. Pre-operational activities include reconnaissance
missions, lengthy periods of training, and rehearsals.

During the post-incident phase, the terrorist members regroup and critique or evaluate their operation. They learn from and share their success and failures.
This learning is often shared with other terrorist groups.


 

                                                   DIFFERENT TERRORIST TACTICS

a.Bombing- Delivery to target is done through:

1.Vehicle Bombs- This bomb refers to booby-trapped vehicles with attached devices and car bombs

(Source: www.middleeasteye.net)

2. Laid Charges- These refer to bombs that are placed or assembled by hand.

(Source: www.propstore.com.au)

3. Projected Bombs- These refer to bombs that are thrown by hand, launched from rifles, or projected by a mortar device.


(Source: defense-update.com) 

4. Postal/Mail Bombs- These refer to bombs that are sent through letters, parcels 

and other items sent by mail. 


(Source: www.northwestern.edu)

Activation means:  

1. Command Activation- Activation of explosive by any of the following means: radios, electric leads, pull wires, or mechanical; strikers. 

2. Action by the Subject/ Target- Activation of Bomb is through tripwires, pressure devices, light-sensitive devices, electric switches. 

3. Time Delay- 

The bomb is activated through the clock, burning fuse, chemical delay, or atmospheric pressure.

b.Arson- This is used to destroy or disrupt targets such as public utilities, 

political headquarters, economic and industrial facilities.


                                              (Source: criminalattorneyforthworth.com)

c. Hijacking- Hijacking and skyjacking are very popular means used by terrorists. Terrorists hijack vehicles with supply ammunition, fuel, cargoes. 

Hijacked legitimate vehicles provide the terrorist's easy access to approach or gain entry to a closed military installation. Skyjacking of commercial aircraft, on the other hand, guarantees publicity for the terrorists.


                                                      (Source: www.timesnoenews.com) 

d. Assassination/LiquidationThis is the oldest but still the most widely used terrorist tactic

Targets are often predictable, and invariably, the terrorists will claim responsibility for the assassination.


                                                          (www.historycollection.com)

e.AmbushThis is a well-planned, generally well-thought-out, properly and precisely executed operation. 

The terrorist has time on his side and will spend considerable time preparing for an operation. Terrorists have an advantage because they can choose their time and place of operation.


                                                              (Source: foxnews.com) 

f. Kidnapping- Kidnapping for ransom is the most common form of terrorists’ tactic. The victim is normally confined in a secret hideaway and the kidnapper makes demands.


                                                                  (Source: vocativ.com)

g. HostageTaking- The hostage-taker confronts the authorities and openly holds the victims for ransom. His demands are often more just material in nature. A political concession is frequently demanded in exchange for the hostage’s lives.


(Source: thatsmags.com)


h. Robbery/Extortion-Terrorist operations are expensive. To help finance their activities, terrorists rob armored vehicles and persons carrying large sums of cash. Bank robberies are also used as graduation exercises for terrorist training programs and are viewed as a tactical operation. 

They conduct reconnaissance, plan escape routes and operate with a high degree of efficiency. 

 

(source: mises.org) 




Sources of information published in this Blog:
Wikipedia; https://www.coursehero.com/file/p3scktbo/c-Sequence-of-terrorist-actions-are-1-Pre-Incident-Phase-Pre-operational/















Comments

Popular posts from this blog

The various dialects of Eastern Visayas

First Badjao teacher aims to produce more professionals from their tribe

"Labyu langga" one of the best songs ever written