Sie sind auf Seite 1von 33

SCHOOL OF SOCIAL SCIENCES AND SECURITY STUDIES

DEPARTMENT OF CRIMINOLOGY AND SOCIAL STUDIES

BJS3105: INTRODUCTION TO TERRORISM

copyright@2014-All rights reserved for MKU

BJS3105: INTRODUCTION TO TERRORISM

Contact hours: 42
Purpose:
To promote knowledge in understanding terrorism and threat analysis in world.
Expected Learning Outcomes of the Course:
By the end of this course, the learner should be able to;
i) Discuss various forms of terrorism and ways of detecting the terrorism threat.
ii) Identify and explain factors responsible for terrorism in the world
iii)Understand and describe the national policies and strategies of Terrorism control.

Course Content:
Historical overview, terrorism profile, forms of terrorism, causes of terrorism, terrorism and antiterrorism, counter terrorism, measure to reduce terrorism the probability of information, policy
and response to terrorism in Kenya, impact of terrorism attack on Kenya, Types of explosives,
nature of explosives, effects of explosives, identification of explosive materials, common
explosives, secondary explosives, impact of terrorism threats in Kenya and the world over,
pejorative use, types of motivation to terrorism practices, democracy and domestic terrorism,
perpetrators, funding of terrorism-state terrorism, group terrorism, tactics and responses, mass
media, databases on terrorism
Course Outline
WEEK 1
CHAPTER ONE: INTRODUCTION
Definition-terrorism, terrorist, law crime
States, non-state actors terrorism
History of terrorism
Origin of terrorism
Religion, fundamentalism terrorism
WEEK 2
CHAPTER TWO: HISTORICAL OVERVIEW
Old And New Terrorism
Waves Of Terrorism
Cause Of Terrorism
Targets
Attacks
WEEK 3
CHAPTER THREE: THE EVOLUTION OF TERRORISM
Introduction
Evolution Of Terrorism
Factors That Motivate Terrorism

Types Of Terrorism
Reasons Why Terrorism Exist
Impact Of Terrorism: Social Political And Economic
Forms Of Terrorism
WEEK 4
CHAPTER FOUR: A TERRORISTS PROFILE AND TERRORISM
Classification of Terrorists
Profile
Availability readiness and willingness
Terrorism and anti-terrorism
Counter terrorism
WEEK 5 & 6
CHAPTER FIVE: LAW AND TERRORISM
Introduction
Categories Of Terrorism
State-Sponsored Terrorism
Response To Terrorist Threats And Attacks
Religious Terrorism
Nationalist Terrorism
Left-Wing Terrorism
Right-Wing Terrorism
Anarchist Terrorism
Group Terrorism Narcoterrorism And The Weakening Of Democracies
Information: Availability Authenticity Probability
WEEK 7
CHAPTER SIX: THE FIGHT
Introduction
Measures to reduce terrorism
Weapons used
Nature of explosives
Sources of the explosives
Types of explosives
Effects/impact
WEEK 8 & 9
CHAPTER SEVEN: WEAPONS USED
Definition of explosives
Types of explosives
Classifications of explosives:
Identification
Methods used in the identification:
Sources
Nature

Availability
Characteristics

Categories and functions


Social economic and cultural environment
Identification
Organizational set-up
Availability and recruitment
Mass media
Databases on terrorism
Training plan
WEEK 10 & 11
CHAPTER EIGHT: IDENTIFICATION
Common explosives
Secondary explosives
Tactics and response
State-terrorism, group terrorism
WEEK 12
CHAPTER NINE: FUNDING OF TERRORISM ON THE NATION
Funding
The evil-Nexus
Costs
Financing terrorism
Financial Control
Categories
Moving the funds
WEEK 13
CHAPTER TEN: INVESTIGATION
Identification of explosive material
Policy and response to terrorism in Kenya
Impact of terrorism attacks on Kenya
Pejorative use
Motivation
Domestic Terrorism And Democracy
Perpetrators
Probability Of Information
Mass Media
Cost-Benefit And Cost-Effectiveness Analysis
Impact Evaluation
Course Assessment
Examination
Continuous Assessment Test (CATS)
Assignments
Total

- 70%
- 20%
- 10%
- 100%

Recommended Text Books:


3

Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and Consequences (New
York: Routledge)
Adrian Guelke, (2009), The New Age of Terrorism and the International Political System
(London and New York: I.B. Tauris)
Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)
Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues (Los
Angeles, CA: Sage, 616 pages, $80.00. [Paperback]
Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries,
Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training, and Root
Causes (Westport, CT: Praeger Security International, 1280 pages, $
Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and Global
Trends (New York: Routledge)
Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces
Together (Santa Monica, CA: RAND)
Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)
Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)
Text Books for further Reading:
Bockstette. Carsten (2008). "Jihadist Terrorist Use of Strategic Communication Management
Techniques" (PDF). George C. Marshall Center Occasional Paper Series (20). ISSN 18636039. Retrieved 2009-01-01.
Barak Mendelsohn (2005-01). "Sovereignty under attack: the international society meets the
Al Qaeda network (abstract)". Cambridge Journals. Retrieved 2010-01Sageman. Mark (2004). Understanding Terror Networks. Philadelphia. PA: U. of
Pennsylvania Press. pp. 16667. ISBN 978-0812238082.
Lind. Michael (2005-05-02). "The Legal Debate is Over: Terrorism is a War Crime | The
New America Foundation".

TABLE OF CONTENTS
COURSE OUTLINE
TABLE OF CONTENTS
CHAPTER ONE: INTRODUCTION
Definition
1.1 Terrorism
1.2 Terrorist
1.3 Law
1.3.2 International Law
1.3.3 Domestic Law
1.4 Crime
1.5 History of Terrorism
1.6 Origin of Terrorism
Review Questions
References for further reading
CHAPTER TWO: HISTORICAL OVERVIEW
2.2 Old and New Terrorism

Page
i
iv
1
1
1
1
1
1
1
1
2
3
3
3
4

2.3 Definition.

2.3.2Definition
2.4 Characteristics of terrorism
2.4.2 Characteristic of new terrorism
2.5 Evolution of terrorism
2.6 Cause of Terrorism:
2.7Motivations for terrorism
2.8 Psychological Perspective
2.8.2 Ideological Perspective
2.8.3 Strategic Perspective
Review Questions
References for further reading
CHAPTER THREE: THE EVOLUTION OF TERRORISM
3.1 Background
3.2Classical, Modern, and Postmodern Terrorism
3.3Factors that motivate terrorism
3.4 Reasons why terrorism exist
3.5 Types of terrorism
Review Questions
References for further reading
CHAPTER FOUR: A TERRORIST IDENTITY
4.1 States, Non-State Actors
4.2 Classification of Terrorists
4.3 Terrorist profile

4
4
4
4
4
4
4
4
5
6
6
5
7
7
7
7
8
9
9
10
10
10
10

4.4 Availability, readiness, willingness


4.5 Terrorism anti-terrorism Counter terrorism
4.6 Goals and objectives
Review Questions
References for further reading
CHAPTER FIVE: THE LAW AND TERRORISM
5.1 Introduction
5.2 Categories of Terrorism
5.2.2 State-Sponsored Terrorism
5.2.3 Response to Terrorist Threats and Attacks
5.2.4 Religious Terrorism
5.2.5 Nationalist Terrorism
5.2.6 Left-wing Terrorism
5.2.7 Right-wing Terrorism
5.2.8 Anarchist Terrorism
5.2.9 Group Terrorism Narcoterrorism and the Weakening of Democracies
5.3 Information: availability authenticity probability
Review Questions
References for further reading
CHAPTER SIX: RESPONSES TO TERRORISM
6.1 Introduction
6.1.2 Measures to reduce terrorism
6.2 Weapons
6.2.2 Definition of explosives
6.2.3 Nature of explosives
6.2.4Sources of the explosives
6.2.5 Types of explosives
Review Questions
References for further reading
CHAPTER SEVEN: WEAPONS USED
7.1 Definition of explosives
7.2 Types of explosives
7.3 Classifications of explosives
7.4 Identification
7.5 Methods used in the identification
7.6 Sources
7.7 Nature
7.8 Availability
7.9 Databases on terrorism
Review Questions
References for further reading
CHAPTER EIGHT: IDENTIFICATION
8.1 Explosives
8.1.2 Common Explosives
8.1.3 Secondary Explosives
8.2 Tactics

10
10
10
11
11
12
12
12
12
12
12
12
12
12
12
12
13
14
14
15
15
15
15
15
15
15
16
17
17
18
18
18
18
18
18
18
18
18
18
19
19
20
20
20
20
20

8.2.1 Response
8.3 State-Terrorism
8.3.1 Group Terrorism
Review Questions
References for Further Reading
CHAPTER NINE: FUNDING TERRORISM
9.1 Funding
9.2 The evil-nexus
9.3 Costing
9.4 Financing terrorism
9.5 Financial control
9.6 Categories
Review Questions
References for further reading
CHAPTER TEN: INVESTIGATION
10.1 Policy and response to terrorism in Kenya
10.2 Impact of terrorism attacks on Kenya
10.3 Identification of explosive materials
10.4 Counter-terrorism
10.5 Pejorative use
10.6 Motivation
10.7 Domestic terrorism and democracy
10.8 Perpetrators
10.9 Mass Media
Review Questions
References for further reading
Appendix 1: Project Classification Codes
Appendix 2: Sample Test Papers

20
20
20
21
21
22
22
22
22
22
23
23
24
24
25
25
25
25
25
25
25
25
25
26
27
27
28
30

CHAPTER ONE: INTRODUCTION

LEARNING OBJECTIVES
AT the end of the lesson the students should be able to
i) discuss the most universally accepted definition of terrorism, and competing
definitions of terrorism proposed by various scholars and institutions;
ii) Identify the different types of terrorism.
iii) Discuss the motivation behind terrorism and terrorist acts.

INTRODUCTION
Terrorism is an ancient practice that has existed for over 2,000 years.
1.1 Terrorism
There is neither academic nor international nor legal consensus regarding the definition of the
term terrorism. The difficulty in defining terrorism is in agreeing on a basis for determining
when the use of violence (directed at whom, by whom, for what ends) is legitimate;
Terrorism can be defined as : The use of violence for the achievement of political ends
which is common to state and non-state groups.
Different institutions have come up with working definitions.
1.2 Terrorist: a person who uses terrorism in the pursuit of political aims
1.3 International Terrorism: there is no accepted definition to the term terrorism
however this can be used as a guide "an act intended to cause death or serious bodily
injury to a civilian, or to any other person not taking an active part in the hostilities in a
situation of armed conflict, when the purpose of such act, by its nature or context, is to
intimidate a population, or to compel a government or an international organisation to do
or to abstain from doing any act.
1.4 International law on terrorism: different countries have come up with laws on terrorism
although all agree on one point that terrorism is a threat to everyone.
1.5 Domestic Law:
1.6 History of terrorism: Terrorism is an old tactic. Accounts of terrorism existed before the
word itself was invented. This was confirmed by specific artifacts located fifty miles south of
Mosul in Iraq. Assurnasirpal, the conqueror and king of Assyria (884860 BCE), enforced his
rule on conquered territories by erecting stone monuments
1.7 Origin of terrorism: The word terrorism, in and of itself, was coined during the French
Revolutions Reign of Terror (17931794).
At best, we have a most accepted definition of terrorism, is following:
8

Terrorism is the use of violence to create fear (i.e., terror, psychic fear) for (1) political, (2)
religious, or (3) ideological reasons (ideologies are systems of belief derived from worldviews
that frame human social and political conditions). The terror is intentionally aimed at
noncombatant targets (i.e., civilians or iconic symbols), and the objective is to achieve the
greatest attain-able publicity for a group, cause, or individual.

?
Review Questions
i) Does Kenya have a law on terrorism?
ii) How is terrorism different from warfare?
iii) Define the term criminal violence how does criminal violence differ from terrorism?
iv) In what ways do you think terrorism is different from politics?

References for further reading


i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and
Consequences (New York: Routledge)
ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political
System (London and New York: I.B. Tauris)
iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)
iv) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues
(Los Angeles)
v) Ely Karmon's (2005) Coalitions Between Terrorist Organizations: Revolutionaries,
Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
vi) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training,
and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $
vii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and
Global Trends (New York: Routledge)
viii)
Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the
Pieces Together (Santa Monica, CA: RAND)
ix) Stewart Bell, (2005) the Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)

HAPTER TWO: HISTORICAL OVERVIEW

Learning Objectives
Students will:

i) Should give be able to explain the characteristics of terrorism using their own
definition of the word terrorism
ii) Explain the history of terrorism and the different types of terrorism today,
compare old terrorism with new terrorism.
iii) Discuss the fifteen causes that explain why people resort to terrorism;

Introduction: The students should learn about the old and new terrorisms, their
characteristics and the evolution. The waves of terrorism evolution.
2.2 Old and New Terrorism
2.3 Definition: Old terrorism this is when the terrorist target is selective.
2.3.2Definition: New terrorism is terrorism that is indiscriminate; it causes as many casualties
as possible.
2.4 Characteristics of terrorism: the strict compliance with religion, predominantly radical
Islam, is one of its main characteristics
2.4.2 Characteristic of new terrorism: its ultra-flexible network and less hierarchical
organizational structure, enabled by state-of-the-art technologies.
2.5 Evolution of terrorism: terrorism has evolved overtime to very dangerous levels. It has
spread to every corner of the world. However it can be traced through four stages.
2.5.2The first stage was in the late 19th and early 20th centuries.
2.5.3 The Second stage was the colonial time, as the west colonized Africa terrorism
was evolving though confined within national geographical boundaries from 1921 until today.
2.5.4 The Third stage was the contemporary wave; it introduced international
terrorism, crossing national boundaries, which began in the 1960s.
2.5.5 The Fourth stage has witnessed the vicious levels of terrorism and religious
justification for killing, international scope, unparalleled gory tactics and weapons, and
dependence on technologies of modernity. The latter consists of communications, ease of
global travel (i.e., moving across borders), and accessibility to finances and WMDs (weapons
of mass destruction).
2.5.6 In the Fourth stage , terrorism has reached a global phase. The use of any
weapon is justifiable. The Other is now a legitimate target. No distinction among targets
should be taken into account. Terrorism has become (the war of all against all).
2.6 Cause of Terrorism: The Clash of Civilizations. The cultural and religious differences
between civilizations worldwide have become the primary source of terrorism today. This can
be easily observed in the concept of new terrorism. Terrorists want to produce a Clash of
Civilizations or cause radical changes in the U.S. presence in the Middle East. Generally,
religious terrorists compose their own community or population. They are not worried about
upsetting their supporters with their terrorist attacks. They view themselves as people

10

accountable only to God. New terrorists may not even deny responsibility for their acts of
destruction. They oppose any type of negotiation.
2.7: Motivations for terrorism
These can be categorized to include but not limited to psychological, ideological, and strategic
2.7.2 Psychological Perspective: Those who engage in terrorism may do so for purely
personal reasons, based on their own psychological state of mind. Their motivation may be
nothing more than hate or the desire for power.
2.7.3 Ideological Perspective: Ideology is defined as the beliefs, values, and/or
principles by which a group identifies its particular aims and goals. Ideology may encompass
religion or political philosophies and programs
2.7.4 Strategic Perspective: This is when a terrorist group arises seeking redress of
their grievances through government, but failure to win governments attention to their plight,
they may resort to violence.

?
REVIEW QUESTIONS
i) Discuss the characteristics of terrorism
ii) Explain some of the motivations for terrorism
iii) What is the difference between the old terrorism and the new terrorism
iv) With illustrations show how terrorism has evolved
References further reading
i) James Ciment, editor, (2011) World Terrorism: An Encyclopedia of Political
Violence from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk,
NY:
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism
Research (New York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition]
(New York: Columbia University Press

11

CHAPTER THREE: THE WORLD AND TERRORISM


LEARNING OBJECTIVES
Students will

i) Identify the role of ideology, psychology, and rationality in terrorism


ii) Be acquainted with the profile of the terrorist
iii) To assist students in gaining an understanding of terrorism and its role in domestic and
international politics
iv) To make students aware of various definitions of terrorism

3.1 Background: Terrorism is not a new phenomenon in human experience. Violence has
been used throughout human history by those who chose to oppose states, kings and
Princes. This sort of violence can be differentiated from what is termed as terrorism. Violence
in opposition to a government is often targeted against soldiers and those who govern.
Terrorism, however, is characterized by the use of violence against civilians, with the
expressed desire of causing terror or panic in the population. Terrorism is not unique to the
20th and 21st centuries. Terrorism existed in 18th century revolutionary France during the
reign of terror, as well as among the Zealots of Palestine in opposition to Roman rule some
2000 years ago.
3.2 Classical, Modern, and Postmodern Terrorism: Scholars argue that the comparison
between old and new terrorism can be categorized as classical, modern or postmodern
terrorism.
3.2.2: Classical terrorism: means that group warfare is direct; it is aimed at specific
targets with few casualties (e.g., assassinations) or wreaks havoc on non-significant
facilities. The damage is fairly low because the terrorist acts are perpetrated to achieve a
specific political objective.
3.2.3: Modern terrorism, Involves a more indirect approach with attacks that are
more indiscriminate and destruction much higher, inflicting hundreds of casualties. Although
conventional weapons are used in modern terrorism, they are used to create mass fatalities.
3.2.4: Postmodern terrorism has the objective of altering the reality of the conflict
(with its enemy) by the very act of terrorismsuch as using CBRN (chemical, biological,
radiological, and nuclear weapons; pronounced C-BURN) weapons or attacks against symbols
of the enemyto materially demolish as much of their adversary as possible. The objective
here is to eliminate the source of conflict itself.
3.3 Factors that motivate terrorism: The factors that motivate people to join and remain in
terrorist groups can be religious, economic, social, psychological, and retaliatory.
3.4 Reasons why terrorism exist:
There are very many reasons why terrorism exists and why it continues to evolve, such as
religious fanaticism, ideological zeal, oppression, portrayal of governments (and their actors)
as oppressive, historical grievances, Resentment and revenge, Poverty, discrimination, hatred

12

Financial gain, Racism, Guilt by association, Supporting sympathizers, Sensation-seeking and


failure of conventional channels of expression.
3.5 Types of terrorism: There are six different types of terrorism: nationalist, religious, statesponsored, left wing, right-wing, and anarchist

?
Review Questions
i. How many types of terrorism have been identified?
ii. What are some of the reasons why terrorism exists
iii. There are people who join terrorism groups for financial gain. Do you agree. Explain
your answer using examples
iv.
What are some of the factors that motivate terrorism?
v. How long has terrorism been in existence?
References for further Reading
i)
ii)
iii)
iv)

James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training,
and Root Causes (Westport, CT: Praeger Security International)
Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and
Global Trends (New York: Routledge)
Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the Pieces
Together (Santa Monica, CA: RAND)
Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown Terrorist
[Second Edition] (Toronto, Canada: John Wiley & Sons)

13

CHAPTER FOUR: A THE TERRORIST IDENTITY

Learning Objectives
Identify major themes within definitions of terrorism
Identify and understand different types of terrorism
Understand the different objectives of terrorism
Describe the various facets of the terrorists identity
Identify the role of ideology, psychology, and rationality in terrorism
Be acquainted with the profile of the terrorist
4.1 Types of terrorists: Most people became terrorists as a result of their own creation
of a new identity or out of a behavior that is sometimes rooted in the identity type they
create for themselves later in life.
4.2 Terrorist profile: six types of terrorists have been identified and can be group in
categories as follows:
4.2.2 The first category consists of deranged individuals;
4.2.3 The second, apocalyptic religious or religious nationalist groups who believe the
end is near for a sinful world;
4.2.4 The third covers fanatical nationalist groups consumed by hatred against another
national group in their midst or in a neighbouring country;
4.2.5 The fourth consists of terrorist groups engaged in a long struggle without evident
success and without much hope of it;
4.2.6 The fifth consists of terrorists acting on behalf of a state or even criminal
terrorist groups and who may calculate that the damage caused and the number of victims
would be devastating but still limited.
4.2.7 The final category includes small groups of individuals who suffer from one
delusion or another and have personal grievances rather than political ones.
4.3 Behavior of a terrorist may vary depending on ideological commitment, individual
intelligence and education, geographical setting, and organizational reach. The degrees of
intent and capability hold the key of how serious each threat actually is as an enemy.
4.4 Goals and objectives: Goals and objectives of terrorist organizations differ throughout
the world and range from regional single-issue terrorists to the aims of transnational
radicalism and terrorism

14

?
Review Questions
i.

Discuss four goals of a terrorist getting involved with terrorism

ii.

List six types of terrorists

iii.

Search for identity pushes some people into terrorist acts. Discuss using examples.

iv.

The intelligence of an individual plays a role in influencing him or her to join a


terrorist group. Discuss.

References for further Reading


i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence
from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY: Sharpe
Reference)
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New
York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York:
Columbia University Press

15

CHAPTER FIVE: THE LAW AND TERRORISM


Learning Objectives
i) To assist students in gaining an understanding of terrorism and its role in domestic and
international politics
ii) To make students aware of various definitions of terrorism and the law
iii) To acquaint students with different ways in which terrorism may be
iv) addressed

Introduction:
The
law
5.2 International law recognizes that it would be contrary to the purposes of the United
Nations Charter if a threatened nation were required to absorb an aggressors initial and
potentially crippling first strike before taking those military measures necessary to thwart an
imminent attack. Anticipatory self-defense involves the use of armed force where attack is
imminent and no reasonable choice of peaceful means is available. Anticipatory self-defense
provides the basis for using force in self-defense pursuant to the SROEs based on an
adversary exhibiting hostile intent.
5.2.2 State-Sponsored terrorism: State sponsored terrorism describes a situation
where a government gives active and often clandestine support, encouragement and assistance
to a terrorist group. Radical states sponsor terrorist groups as a deliberate foreign policy tool.
5.2.3 Religious Terrorism: Religious terrorists seek to use violence to further what
they see as divinely commanded purposes, often targeting broad categories of foes in an
attempt to bring about sweeping changes. Religious terrorists come from all major faiths, as
well as from small cults.
5.2.4 Nationalist Terrorism: Nationalist terrorists seek to form a separate state for
their own national group, often by drawing attention to a fight for national liberation that
they think the world has ignored.
5.2.5: Left-wing Terrorism: Left-wing terrorists are out to destroy capitalism and
replace it with a communist or socialist regime. Because they perceive most civilians as
suffering under capitalist exploitation, leftwing terrorists have sometimes limited their use of
violence to avoid hurting the victims they were out to save.
5.2.6 Right-wing Terrorism: Right-wing terrorism has often been characterized as
the least discriminating, most senseless
type of contemporary political violence. This is because of its seemingly mindless street
violence and unsophisticated attacks that target immigrants, refugees, guest workers and
other foreigners in many European countries, especially in eastern Germany and other former
communist-bloc states.
5.2.7: Anarchist Terrorism: From the 1870s until about 1920, anarchist terrorism
was a major global phenomenon. Revolutionaries seeking to overthrow established
governments launched a wave of bombings and assassinated a series of heads of state.
Anarchist terrorism in Europe today is to be found almost solely in Italy and to a lesser extent
in Spain.

16

5.2.8 Group terrorism: Narcoterrorism and the weakening of democracies: The existing
evidence shows that Narco terrorism exists today and has been in there for the past five
decades. Narco terrorism is defined as the use of illicit drugs to advance political purposes
and to fund terrorist activities. Greed, corruption, hypocrisy, and willful blindness among
bankers, financial institutions, and to some extent lawmakers and law enforcement officials
all over the world have made drug money and other illicit funds easy to launder and hide.
5.2.9 Information: availability authenticity probability: informers and intelligence when
given information have failed to act leading to devastating outcome.

?
Review Questions
i) Discuss the role of ideology in terrorist attacks in Kenya.
ii) After terrorist attacks it always comes out that the intelligence service had information
of the pending attack. Discuss why the government never acts on the information
accessed.
iii) Group terrorism has been made more difficult to trace due to advanced technology in
communication. Describe group terrorism.
iv) Libya has been accused of sponsoring terrorists. Do such accusations portray Libya as
a state that sponsors terrorist acts in your opinion?
References for further Reading
i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and
Consequences (New York: Routledge)
ii) Adrian Guelke, (2009), The New Age of Terrorism and the International Political
System (London and New York: I.B. Tauris)
iii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)
iv) Aziz Z. Huq, (2008): Imagining Counterterrorisms Future, World Policy Journal,
Winter,

17

CHAPTER SIX: THE FIGHT: RESPONSES TO TERRORISM


Learning Objectives
At the end of the lesson the students should be able to:
Discuss how terrorists organize.
Identify ways to combat terrorism.
Discuss what terrorism will be like in the future.
Identify how core Values help in identifying and combating terrorism.
6.1 Response: The lesson should help the students in learning about the various responses to
terrorist attacks around the world. How do different states act to terrorist attacks either on
their own soil as has been the case in Kenya, USA and Israel? How have other countries like
Iraq, Sudan and Somalia that have been accused of aiding terrorist activities reacted and how
have those countries that even though have not been attacked directly know that terror attacks
can happen any time reacted?
6.1.2 Introduction: One of the most important duties of any government is to protect
its citizens. The prevention of terrorism is about protecting some of the most basic human
rights. The question for any government is how best to provide that protection for every
citizen there have been a number of responses to terrorism including but not limited to, the
use of violence to oppose terrorists, the use of negotiation, and finally the use of international
conventions to create international norms in opposing terrorist activities.
6.2 Response to terrorist threats and attacks: There have been a number of responses to
terrorism. They include but not limited to the use of violence to oppose terrorists, the use of
negotiation, and finally the use of international conventions to create international norms in
opposing terrorism
6.2.2 The use of force and violence against terrorism: The use of force and violence
against terrorism has been demonstrated periodically. U.S. military action against the Taliban
in Afghanistan. The use of force is both a tit-for-tat strategy, as well as an attempt to hinder
the terrorists ability to operate.
6.2.3 Negotiation: is another method for dealing with terrorism. Although nations
may take a tough stand and declare publicly that they will not negotiate with terrorist groups,
they may at the same time negotiate secretly. Great Britain negotiated with the Irish
Republican Army and its political wing Sinn Fein and the African National Congress (ANC)
and the apartheid government of South Africa. The ANC had been proscribed as a terrorist
organization, and the government foreswore any negotiation with the ANC. Behind the scenes
negotiations went on resulting in the end of apartheid in South Africa.
6.2.4 International agreements: International organizations, such as the United
Nations, pass resolutions and seek to foster greater political action among member states.
There several such as the 1997 International Convention for the Suppression of Terrorist
Bombings which requires the parties to the convention to make it a criminal act to unlawfully
and intentionally use explosives or other deadly devices in public with the objective of
causing death or injuring a person and the action by the international community UN Security
Council anti-terrorism resolution 1373, Improving International Cooperation.

18

6.3 Non state actor terrorists: Where non-state actor terrorists merely use a states territory
as a safe haven, and the host state is unable to prevent the terrorists from operating there

?
REVIEW QUESTIONS
i)

Define a non-state actor in terrorism

ii)

Explain the various response used in the fight against terrorism

iii)

Discuss how international agreements have been used as counter terrorism measure.

iv)

Describe negotiation as a counter-terrorism approach

References for further Reading


i) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment,
Training, and Root Causes (Westport, CT: Praeger Security International)
ii) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology,
Tactics and Global Trends (New York: Routledge)
iii) Paul K. Davis, et al, (2009), Social Science for Counterterrorism: Putting the
Pieces Together (Santa Monica, CA: RAND)
iv) Stewart Bell, (2005)The Martyr's Oath: The Apprenticeship of a Homegrown
Terrorist [Second Edition] (Toronto, Canada: John Wiley & Sons)

19

CHAPTER SEVEN: WEAPONS


Learning Objectives:
At the end of the lesson students should be able to
i) To acquaint students with different ways in which terrorism may be addressed
ii)
The students should have better understanding of explosives
iii)

The students to have better information on explosives as the terrorists weapon of


choice

7.1 Introduction: Why do terrorist chose the type of weapons they use? How do they go
about making the type of weapons to use? The lesson should guide the students through the
weapons, the impact and the availability.
7.1.2 Definition of explosives: It is a chemical compound or mixture ignited by
heat, shock, impact, friction, or a combination of these conditions and upon ignition,
decomposes rapidly in a detonation that causes a rapid release of heat and large quantities of
high-pressure gases that expand rapidly with sufficient force to overcome confining forces.
7.2 Types of explosives: there are three basic types of explosives 1) mechanical, 2) chemical,
and 3) atomic.
7.3 Classifications of explosives: there are three basic types of explosives 1) mechanical, 2)
chemical, and 3) atomic.
7.4 Identification: explosives are identified using these qualities: Effective energy, Velocity
of detonation, Density, Detonation pressure, Sensitivity, Water resistance, Physical
characteristics, Fume characteristics, Storage life.
7.4. 2 Methods used in the identification: a number of methods are used in the
identification of explosives including infrared, nuclear magnetic resonance and X-ray
fluorescence spectroscopies, mass spectrometry, and high-pressure liquid chromatography
and Raman spectroscopy.
7.5 Sources
7.6 Availability
7.7 Characteristics: Dynamites, Water Gels, Emulsions, and Slurries, Dry Blasting Agents,
Binary Explosives
Review Questions
i)

How do you define an explosive?

ii)

Give two sources for explosives?

iii)

What are the methods used in the identification of explosives?

iv)

How are explosives classified?

v)

What are the qualities used in the identification of explosives?

20

References for further Reading


i) Hustrulid W, (1999), Blasting Principles for Open Pit Mining, Vol. 1, Balkema,
Rotterdam.
ii) ICI Technical Services, 1995, ICI Explosives Blasting Guide, ICI Australia
Operations.
iii) ICI Technical Services, 1997, Safe and Efficient Blasting in Underground Metal
Mines, ICI Australia.
iv) Jimeno, C.L. and Jimeno, E.L., 1995, Drilling and Blasting of Rocks, A.A. Balkema,
Rotterdam.
v) Mather, W., (1997), Bulk Explosives, Mining Technology, vol. 79, no. 914, pp. 251254.New York. http://miningandblasting.wordpress.com/

21

CHAPTER EIGHT: IDENTIFICATION

Learning Objectives
i) To acquaint students with different weapons available to terrorists
ii) to help the students understand why explosives are the weapons of choice for the
terrorists
iii)
The students should have better understanding of explosives
iv) The students to have better information on explosives as the terrorists weapon of
choice
v) To learn about the tactics used
vi) To acquire knowledge on how the weapons are used
8.1 Introduction
8.2 Explosives: these are the most commonly used weapons by the terrorists because their
material and technology are more readily available. The terrorists can use either manufactured
or improvised explosives in public places and against a wide variety of institutions, vessels
and buildings. The devices are delivered by humans or transported in vehicles or mailed or
sometimes shipped. They are detonated directly or remotely by timing, tampering or impact.
8.2.1Common explosives: These are also known as the primary explosives: they
are popular with terrorists because the materials needed to make them are readily available.
8.2.2 There is the Triacetone-Triperoxide (TATP) which is an improvised primary
explosive that is relatively easy to manufacture.
8.2.3 The Hexamethlene Triperoxide Diamine (HMTD) an improvised primary
explosive prepared from three basic precursors: hexamine, a weak acid, and hydrogen
peroxide. The product is highly sensitive to friction, impact, and electrostatic discharge.
8.3 Secondary explosives: Secondary explosives can be grouped into two categories
8.3.1 ANFO is a secondary/tertiary explosive, and requires little specialized skills or
machinery to mix. Ammonium Nitrate Fuel Oil (ANFO) is an explosive mixture of
ammonium nitrate and an organic fuel. Because of its ready availability and cheap material
cost, ANFO has been used extensively as the main charge in improvised weapons around the
world and is the most common commercial explosive.
8.3.2 Urea Nitrate: Nitrate is a high explosive produced by combining dissolved urea
fertilizer with nitric acid. Urea nitrate is formed as odorless crystals that are colorless to offwhite, although additives and or metal from the mixing container may alter the compounds
appearance. Urea nitrate is used as a secondary explosive
8.4 Tactics used: terrorists use every and any tactic to ensure they achieve their goal. Some
of the tactics used are kidnapping tycoons; symbolically bombing monuments, use of
independent young militants to seize hostages, aerial bombings, widespread and large-scale
violence against almost an open-ended category of opponents (i.e., all peoples who are not
members of the religious terrorists religion or cult).

22

?
Review Questions
i) Write down four tactics used by terrorists
ii) What are two common explosives used by terrorists
iii) Give the other component that can be mixed with Urea Nitrate
iv) Explain why terrorist opt to use explosives in their attacks
v) Define the term explosives
References for further Reading.
i) James Ciment, editor, (2011)World Terrorism: An Encyclopedia of Political Violence
from Ancient Times to the Post-9/11 Era [Second Edition] (Armonk, NY)
ii) Alex P. Schmid, editor (2011), The Routledge Handbook of Terrorism Research (New
York: Routledge)
iii) Bruce Hoffman, (2006), Inside Terrorism [Second and Expanded Edition] (New York:
Columbia University Press
iv) Lewis, I.R.; Daniel, N.W., Jr.; Chaffin, N.C.; Griffiths, P.R.; Tungol, M.W. . (2000).
Raman spectroscopic studies of explosive materials: towards a fieldable explosives
detector, Spectrochimica Acta Part A, Vol. 51.

23

CHAPTER NINE: FUNDING TERRORISM

Learning Objectives:
i)
ii)
iii)
iv)

Learn the sources of funding for terrorists


Identify the types of funding
The states that fund terrorism
The inter-relationship between the terrorists and Drugs

INTRODUCTION
The sources of the very large funds required by the terrorists come from Corruption that
makes the illegal drug trade possible, facilitates and in turn feeds the umbilical cord that is the
terrorist lifeline, i.e. money. Illegal drugs are cheap to make but they return enormous
amounts of money since the demand is high and constant with an ever ready market.
Terrorists use drug profits to fund their cells to commit acts of murder.
9.1Funding: the sources of the very large funds required by the terrorists come from
corruption that makes the illegal drug trade possible. The illegal trade is their most vital and
greatest source of funds. No other commodity, legal or not, exists on the market today that is
better than illegal drugs and that can generate such high and fast returns. The illicit drug trade
is the most reliable source of income in the world, with a demand that is constant and
continues to grow. Illegal drug money funds terrorist organizations and activities.
Terrorists use drug profits to fund their cells to commit acts of murder.
9.2 The Evil-Nexus: This consists of drug trafficking organizations, organized crime, money
launderers, and terrorism. The Administration of the United States of America has identified
most of the countries and terrorist organizations that make up the Evil Nexus. These are the
countries that grow and produce the drugs and the organizations that sell them, profit from
them, and use those profits to finance terrorism that destroys the economy of the state. These
countries and organizations fund the Evil Axis of terrorism.
9.3 Costing: besides the operational costs terrorist groups need funds for planning,
recruitment, procurement, preparation, delivery of materials, communications, persuasion,
propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of targets,
and assault on targets.
9.4 Financing Terrorism: this is defined broadly by the World Bank and International
Monetary Fund (IMF) as the financial support, in any form, of terrorism or of those who
encourage, plan or engage in it. the number and seriousness of acts of international terrorism
depend on the financing that terrorists obtain.i
9.5 Financial Control: financial controls are necessary and important for curtailing acts of
terrorism. this is by perform preventive, deterrent, investigative, and analytical functions,

9.6.1 Funding Techniques: Terrorism is funded from various sources and in many different
ways. The methods and sources used vary from country to country or region to region as well

24

as terrorist group to terrorist group. State financing state and other entities that directly or
indirectly are in such financing either by acts and omissions such as sheltering, facilitating,
funding and failure to adopt suppressive measures.
9.7 Categories: we have two categories depending on the origin: here we have two categories
depending on the origin:
9.8 Legitimate funding: Terrorists use a wide variety of methods to move money within and
between organisations, including the financial sector, the physical movement of cash by
couriers, and the movement of goods through the trade system. Charities and alternative
remittance systems have also been used to disguise terrorist movement of funds.
9.8.2 Illegal Funding: illegal funding: this source of financing comes from a great
variety of criminal actions, such as smuggling, almost all kinds of fraud, theft, stolen cars,
drug trafficking, kidnapping, robbery, extortion, petty crime, ID theft, money laundering, and
smuggling of money.
9.9 Moving the Funds: Terrorists use a wide variety of methods to move money within and
between organisations, including the financial sector, the physical movement of cash by
couriers, and the movement of goods through the trade system. Charities and alternative
remittance systems have also been used to disguise terrorist movement of funds.

?
Review Questions
i) Name two sources of finance for the terrorists.
ii) How is the money used for terrorism acts moved about?
iii) Using examples discuss one legitimate source of funding for the terrorists
iv) What are the other works, besides the operational costs terrorist groups need funds
for?
v) Discuss the evil-nexus in relation to funding terrorism and terror acts.

References for further Reading


i) www.un.org/terrorism/cttaskforce
ii) Kaplan Eben (2006) Tracking Down Terrorist Financing, available on
http://www.cfr.org/publication/10356/#1.
iii) Kruse Anders (2003)Listing and of Natural Persons Challenges of
Implementation on a State Level, Swiss EAPC/PfP Workshop on Combating
Financing of Terrorism, Geneva. Levitt Matthew,( 2007) Blocking Terror
Finances, http://www.washingtoninstitute.org/templateC06.php?
(Zeidan, 2005:217).

25

CHAPTER TEN: INVESTIGATION: TERRORISTS RAISE, MOVE AND USE


FUNDS

LEARNING OBJECTIVES
Students should have knowledge on how investigations are carried out.
i) Who is investigated
ii) Who is in charge of the investigations
iii) How is the terrorist money raised
iv) How is it spent.
v) What is counter terrorism
vi) How is the world handling terrorism
10.1 Introduction: Since the terrorist attacks of 9/11 there have been several legislation
policies drafted and designed to counter terrorism: these laws, policies and practices are
critical, as counter-terrorism measures but if not applied accordingly
may be
counterproductive, especially if they fail to protect human rights, discriminate, increase
repression, or stigmatise and alienate certain groups. This can undermine the trust and
confidence needed for effective cooperation.
10.1.2 Definition: the offensive measures taken to prevent, deter, preempt, and respond to
terrorism.
10.2 Counter-terrorism: Counter-terrorism measures can contribute to the feelings among
certain groups, community or religions that they are being treated as a suspect community
and targeted by authorities simply because of their religion color..
10.2.2 Counter-Terrorist Financing Efforts: four areas which could be the focus of
efforts to further strengthen counter-terrorist financing efforts: (1) action to address
jurisdictional issues including safe havens and failed states, (2) outreach to the private sector
to ensure the availability of information to detect terrorist financing, (3) building a better
understanding across public and private sectors and (4) enhanced financial intelligence to
exploit the value of financial investigation as a tool in fighting terrorism.
10.3 Jurisdictional Financial Investigation as a Tool in Fighting Terrorism.
10.4 Democracy and Domestic Terrorism:
10.5 Terror-Supporting Extremism;
10.6 Pejorative Use: The use of a word in a judgmental or harsh manner. For the word
terrorism it arises from the fact that the word terrorism has no widely accepted definition.
This has seen it being used and applied to situations that may otherwise not have been
considered as terrorist acts or forms of violence committed and considered terrorism. The
failure to have a consensus on what terrorism is makes the use of the word to be mis-used or
applied to situations that ought not to be considered terrorist situations. The lack of clear
definition has real and serious consequences on international efforts to counter the terrorist
threat, as states cannot adequately counteract a phenomenon that they absolutely agree must
be eliminated as long as they fundamentally disagree on its very definition.

26

10.7 Types of Motivation to Terrorism Practices:


motivations depending on the special interests

Terrorism
of

the

in general has many


individual or cells.

10.8 Perpetrators:
10.9 Databases on Terrorism: This is a description and assessment of Internet-accessible
databases relevant for social science research on terrorism. The data details those websites
that provide actual data, e.g., names of terrorist organizations and incidents of terrorist
activity. Alongside the databases is an extensive list of additional resources that provide
commentary and analysis of terrorism events and trends. The databases will be used for
Deterring terrorism, detecting terrorism and disrupting terrorism acts.
10.10Mass media: the relationship between Media and terrorism is a complicated one. The
media is the first to report terrorist acts and this is important for a terrorist group as they
provide the publicity while spreading its message. If one sees terrorism as a communications
strategy, then the media has unfortunately or without intending to often helped pass the
terrorists message. At the same time, the media can also play an important part in countering
terrorism
10.10 Kenya and terrorism: Kenya is a key partner in the Global War on Terror (GWOT).
Kenya has been a target of several attacks: Nairobi and Dar es Salaam (Tanzania) USA
embassy attacks1998: In 2002, Kikambala Hotel attacks on Kenyas coast, while
simultaneously shooting a surface to air missile at an Israeli commercial aircraft, which
luckily they narrowly missed the target, the Westgate Shopping Mall in Nairobi attack 2013,
which made international headlines and took the lives of 67 individuals from nearly a dozen
countries around the world. These have earned Kenya the reputation as a hub for terrorism,
violent extremism, and factionalism. There have been frequent small scale attacks randomly
carried out in-discriminatively on civilians. These attacks have seen some western countries
issuing security advisories for their nationals not to visit Kenya.
10.10.2 Kenya as an attractive target. Kenya is unfortunately an attractive target for
terrorist attacks. There are factors that have contributed to this attraction including, the
geography, ethnic composition, political stability, unstable neighbors, poverty, Islamic
fundamentalism, and lax law enforcement.

27

?
Review Question
i) Why has Kenya been a target for the terrorists?
ii) Has Kenya signed the anti-terrorism act?
iii) The media works for the terrorists. Discuss
iv) Define the term financial intelligence in relation to terrorism?
v) What role can the citizens play in the fight against terrorism?

References for further Reading


i) Martha Crenshaw (2011), Explaining Terrorism: Causes, Processes and
Consequences (New York: Routledge)
i) Adrian Guelke, (2009), The New Age of Terrorism and the International Political
System (London and New York: I.B. Tauris)
ii) Brigitte L. Nacos, (2011) Terrorism and Counterterrorism (Boston, MA: Longman)
iii) Gus Martin, (2012), Understanding Terrorism: Challenges, Perspectives, and Issues
(Los Angeles, CA: Sage, 616 pages, $80.00. [Paperback]
iv) Ely Karmon's(2005) Coalitions Between Terrorist Organizations: Revolutionaries,
Nationalists, and Islamists (Leiden: Martinus Nijhoff Publishers)
v) James J.F. Forest, editor, (2006), The Making of a Terrorist: Recruitment, Training,
and Root Causes (Westport, CT: Praeger Security International, 1280 pages, $
vi) Adam Dolnik, (2007), Understanding Terrorist Innovation: Technology, Tactics and
Global Trends (New York: Routledge)
vii) Alexander T.J. Lennon, et al. (2009) Democracy in U.S. Security Strategy: From
Promotion to Support, Center for Strategic and International Studies, March
http://www.csis.org/media/csis/pubs/090319_lennon_democracy_web.pdf

28

Appendix 1: Project Classification Codes1


Appendix 2: Sample Test Papers

DEPARTMENT OF SECURITY AND SOCIAL STUDIES


End of Semester Examinations
BJS3105: INTRODUCTION TO TERRORISM
Time: 2 Hrs
Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.
QUESTION 1
i) Discuss the characteristics of terrorism(8mks)
ii) Explain the meaning of the following terms
a) Deterring terrorism. (5mks)
b) Detecting terrorism. (5mks)
c) Disrupting terrorism acts(5mks)

d) Databases on Terrorism(3mks)
What is the difference between the old terrorism and the new terrorism (4mks?)
QUESTION 2 (10mks each)
a) With illustrations show how terrorism has evolved over time(10mks)
b) Terrorism in general has many motivations depending on the special interests of the
individual or cells. Discuss (10mks)
QUESTION 3 (10mks each)
a) Define the term counter-terrorism(5mks)
b) Discuss some of the motivations for terrorism (10mks)
c) Using examples discuss one legitimate source of funding for the terrorists (5mks)
QUESTION 4 (10mks each)
Ideology plays a very big part in the motivation for terrorist attacks. Using examples discuss
the statement. (10mks)
a) Discuss the meaning of the term legitimate funding in relation to funding of
terrorism(10mks)
b) besides the operational costs terrorist groups need funds for planning, recruitment,
procurement, preparation, delivery of materials, communications, persuasion,
propaganda, incitement, infrastructure of safe houses/sleeper cells, reconnaissance of
targets, and assault on targets. Discuss. (10mks)

29

QUESTION 5
a) Discuss three types of explosives. (10mks).
b) Discuss the following types of terrorism (10mks)
i) State-Sponsored terrorism
ii) Religious Terrorism
iii) Nationalist Terrorism

30

DEPARTMENT OF SECURITY AND SOCIAL STUDIES


End of Semester Examinations
BJS3105: INTRODUCTION TO TERRORISM

Time: 2 Hrs
Instructions to Candidates: Answer question 1 (Compulsory) and any other TWO questions.
QUESTION 1 (3mks each)
a) Explain the meaning of the following terms
i) ideological zeal
ii) Oppression: portrayal of governments (and their actors) as oppressive.
iii) Historical grievances:
iv) Resentment and revenge
v) Violations of international law:
vi) Discriminated
vii) Hatred
Vii) Racism:
xi) Legal funding for terrorist acts

QUESTION 2 (10mks each)


a) Discuss why explosives are the most preferred weapons for terrorist attacks (10mks).
b) Using examples describe four tactics used by terrorists (10mks)
QUESTION 3(10mks)
a) We have two categories of funding for terrorist acts. Discuss two sources of illegal
funding (10mks)
b) The use of violence, negotiation and international conventions to create international
norms in are some of the methods used in opposing terrorism. Discuss(10mks)
QUESTION 4 (10 mks each)
a) Describe four of the six types of terrorists that have been identified (10mks)
b) Some of the characteristics of new terrorism are the ultra-flexible network, less hierarchical
organizational structure and the efficient state-of-the-art technologies. Discuss (10).
QUESTION 5
a) Describe the four waves of the evolution of terrorism (8mks)
b) Define the term criminal violence and show how it differs from terrorism (6mks)
c) In what ways do you think terrorism is different from politics(6mks)

31

Worldbank website

32

Das könnte Ihnen auch gefallen