THIRD EDITION A 391096 Terrorism^ % in the Tw<$$fy-First Century ' Cindy C. Combs University of North Carolina Charlotte Prentice Hall Upper Saddle River, New Jersey 07458
Preface xi Introduction 1 PART I TERRORISM IN PERSPECTIVE 1 An Idea Whose Time Has Come? 4 Modern Definitions of an Old Concept 8 Crucial Components of Terrorism 10 Typologies of Terrorism: Useful Tools 14 Tactics and Labels 16 Conclusion 17 Evaluation 17 Suggested Readings 18 Notes 18 2 Not a Modern Phenomenon 20 Tyrannicide: "To Go Too Fast" 22 State Terrorism: France's Reign of Terror 23 Guerrilla Warfare: Selective Violence 24 Cyclical Nature of Terror 26 Contemporary Events, Historical Roots 29 Evaluation 31 Suggested Readings 32 Notes 32
vi Contents 3 Ideolosy and Terrorism: Rights from Wrongs? 34 The Rationalization of Violence 35 Rebellion and the Right of Self-Determination 3 8 Terrorist Beliefs and Images 42 Causes of the Left and Right 44 Conclusion 47 Evaluation 47 Suggested Readings 48 Notes 49 PART II W H O ARE THE TERRORISTS? 4 Criminals or Crusaders? 50 Profile of a Terrorist 50 Can We Generalize about a "Typical" Terrorist? 54 Terrorism Is Different Today 60 Trends in Terrorist Recruitment and Membership 62 Today's Terrorist 67 Case Study: Osama bin Laden 67 Evaluation 69 Suggested Readings 70 Notes 70 5 Terrorism by the State 71 Internal Terrorism: The Beast That Lurks Within 72 Case Study: Argentina's Military Dictatorship 77 How Real Is State Terrorism? 79 Terrorism as an Instrument of Foreign Policy 81 Waging War by Proxy: Surrogate Terrorism 82 Reluctant Bedfellows: The Arms Bazaar 84 Silent Partners: Syria, Iran, Libya, and Sudan Wage Subtle War 85 Case Study: Afghanistan, under Taliban Leadership 91 Case Study: Palestine 92 Conclusion 92 Evaluation 93 Suggested Readings 94 ( Notes 94 6 Terrorism, Inc. 96 Networking 96 Shared Strategic Planning 97
vii Terrorism Is Big Business 99 Case Study: Bin Laden's al-qaeda Network 99 Case Study: Libyan Protector 102 Case Study: Iranian Fedayeen 104 Training and Equipping the Terrorists 105 The Internationalization of Terrorism in Europe 107 Narcoterrorism 108 Conclusion 110 Evaluation 112 Suggested Readings 113 Notes 113 PART III How Do THEY OPERATE? 7 Terrorist Training 115 Training Sites 116 Training Topics: What Do They Learn at Camp? 118 Potential for Destruction: The Terrorist's Arsenal 122 Terrorist Tactics 129 Evaluation 135 Suggested Readings 136 Notes 136 8 The Media: A Weapon for Both Sides? 137 Legal Issue of the Right of Access 139 l Censorship: The Ugly Word 141 Complicity: A Very Serious Charge 145 Terrorist Goals regarding Media 149 Government Goals regarding Media 150 Media Goals in Terrorist Events 15 2 Case Study: Bin Laden's Tapes 153 Conclusion 154 Evaluation 155 Suggested Readings 156 Notes 157 9 Domestic Terrorism in the United States 159 Historical Roots in the United States 159 Conceptualizing Domestic Terrorism 162 Case Study: Earth Liberation Front 164 Case Study: Animal Liberation Front 165 Case Study: Aryan Nations 169
viii Contents Case Study: Christian Identity Movement 169 Case Study: Montana Freemen 171 Case Study: 1993 World Trade Center Bombing 173 Conclusion 176 Evaluation 177 Case Study: Waco, Texas, Incident 178 Case Study: Attack on America: September 11, 2001 179 Suggested Readings 183 Notes 183 PART IV RESPONSES TO TERRORISM 10 Legal Perspectives on Terrorism 185 Laws of War 188 Piracy of Air and Sea 192 Protection of Diplomatic Personnel and Heads of State 196 Summary: Protection of the Innocent against Specific Crimes 197 t Terrorism: A Political Crime? 198 United Nations Resolutions and Conventions 200 Evaluation 202 Suggested Readings 203 Notes 205 1 1 Counterterrorism: The Use of Special Forces 207 Nations without Defenses 208 Strike Forces: A First Line of Defense? 208 Too Many U. S. Options? 215 Conclusion 220 Evaluation 220 Suggested Readings 221 Notes 221 1 2 Terrorism, Intelligence, and the Law 222 Legal Initiatives to Counter Terrorism 222 Investigation: The Intelligence Initiative 228 Government Use of Intelligence/Investigation 232 Case Study: Peru: A Rescue Mission "by the Book" 232 Case Study: U.S. Strikes in Afghanistan and Sudan: On the Edge of the Law 234 Intelligence Gathering and Counterintelligence by Terrorists 235
ix Conclusion 236 Evaluation 237 Suggested Readings 238 Notes 239 13 Security Measures: A Frail Defense 240 Three Facets of Security 241 Airport Security in the United States 243 The Costs of Security 247 Protecting Public Transportation 249 Preventive Security 250 Case Study: Who Arms Iran? 251 Threat Assessment: How Do You Know When You Are at Risk? 252 Conclusion 253 Evaluation 254 Suggested Readings 255 Notes 256 PART V FUTURE TRENDS 14 The New Terrorist Threat: Weapons of Mass Destruction 257 Context of the Threat 257 Historical Use of Weapons of Mass Destruction 259 Types of Weapons of Mass Destruction 261 Case Study: Anthrax as a Biological Weapon 263 Access to and Use of Weapons of Mass Destruction 268 Conclusion 271 Evaluation 2 72 Case Study: Aum Attack on the Tokyo Subway 2 72 Suggested Readings 2 73 Notes 274 1 5 Future Trends 275 A "War" on Terrorism 275 Positive Outcomes of the September 11 Attacks 277 Dealing with Weapons of Mass Destruction 278 Trends in Terrorism 280
Impact of the Generational Difference 281 Graphic Evidence 281 Conclusion 285 Evaluation 286 Suggested Readings 286 Notes 287 Index 289