Final Flashcards
(72 cards)
Old terrorism
- Propaganda of the dead
- Limited use of violence for political end
- Spectators, not casualties
New terrorism
- “kill a thousand, frighten a million”
- Causing damage and taking casualties is primary goal
- Lack of restraint
What are some of the factors that contribute to radicalization of individuals?
- Increased fervor
- Islam
- Unemployment in the middle east
What are the different categories of weapons of mass destruction and some examples?
- Chemical Weapons (nerve agents, blister agents, blood agents, choking agents)
- Biological Weapons
(pathogens, toxins) - Nuclear and Radiological Weapons (“dirty bombs,” purloined nuclear device, improvised nuclear device)
Prevention in counterterrorism
- Knowing where and when terroristic activity may happen
- Cut funding to things that would further terrorism
- Placing barriers
- Surveillance, interrogation, infiltration, and disruption
Preemption in counterterrorism
- Having knowledge of specific attacks and taking measures to stop it
- Military strikes
- Torture and rendition
- Intervention
What triggered the Arab Spring?
High rates of unemployment
What are the various elements to the theory of counter-insurgency advocated by thinkers like David Galula?
Everyone is a fighter. You must win the hearts and minds of all of the people in order to win.
What were some of the challenges with counter-insurgency with regards to the french experience in Algeria? (also in regards to torture)
- Counter-insurgency succeeded but cost was so high that they ceded independence to Algeria
- Torture undermines legitimacy
How did the US practice counter-insurgency in Iraq?
- “Clear, hold, build”
- Deployed overwhelming force
- Created stability and security
- Built institutions and infrastructure
Costs of counter-insurgency
- Locals need economic incentives
- Shower locals in money and benefits for certain behaviors
Seven key elements of counter-insurgency
- Appropriate force
- Partner with indigenous forces
- Promote public safety
- Infiltrate enemy operations
- Economic and social services
- Manage information
- Manage detainees
Problems with counter-insurgency
- Humans are more than “rational” characters
- Social ties, cultural taboos, and ethnic identities
- Tortue used when people don’t behave “rationally”
What is meant by the “revolution in military affairs?”
- New technological applications into traditional weapons
- New operational concepts, strategies, and tactics
- Those who innovate RMA usually triumph on battlefield
What are some of the different forms of cyber-weapons?
- Viruses and worms
- Trojan horses
- Zombies and botnets
What are the different types of cyber-war?
- Cyber-espionage: illegally accessing sensitive information stored on online databases
- Cyber-crime: using online tools to steal identities or defraud bank accounts
- Cyber-attacts: using viruses and other virtual weapons to damage or destroy real world capabilities
Which states have engaged in cyber-attacks?
- Russia, against Georgia in 2008 and against Estonia in 2009
- China
- Israel, against Iran in 2010
- US, thanks to Snowden
How much does a B-2 bomber cost?
2.5 billion per plane
How much does a F-35 cost?
100 million per plane
What are some examples of what an asymmetric fighter might use against air assets?
- Jamming (disruption of signals)
- Deception (fake targets)
- Mobility
- “Human shields” (fear of civilian casualties)
What is a UAV and how might it be used?
A drone, essentially. They can attack/surveil targets at low financial and human costs.
What are some examples of asymmetric fighters might use against more powerful navies?
- Shore-based fire
- Submarines
- Mines
- Fast inshore attack craft (FIAC)
- Piracy
What is an LCS?
Litoral Combat Ship
Small and fast ships armed with guns instead of missiles
What is the nature of piracy in the 21st century?
Pirates operate in littoral areas where substantial international shipping passes. Pirates are often poor fisherman and other laborers hat turn to piracy for financial gain.