READING ASSIGNMENT #2 (CHAPTER 4: Terrorism and the Media); Chapter 5 Force Multipliers, Gender Roles, and Tactics & Chapter 6 Long-Term Separatist Terrorism Assignmen
READING ASSIGNMENT #2 (CHAPTER 4: Terrorism and the Media); Chapter 5 • Force Multipliers, Gender Roles, and Tactics & Chapter 6 • Long-Term Separatist Terrorism
Assignment Type: Canvas
Due Date: July 10, 2022
Possible Points: 100
Duration: 4-6 Hours
Deliverable Length: 5 pages
TEXTBOOK REFERENCES REQUIRED.
ANSWER THE FOLLOWING QUESTIONS BELOW:
1. Explain how the Internet has impacted terrorism.
2. Define the new media environment and describe the characteristics of the new media.
3. Define force multipliers and list and describe four force multipliers.
4. Define the types of threats posed by technological terrorism.
5. Summarize theories of suicide bombing.
6. Describe the emergence of the modern IRA and terrorism in Northern Ireland.
7. Summarize the birth, evolution, and rise of the ETA, the GAL, and the LTTE.
Assignment #2
Brandi Ingram
Dr. Signh
International Terrorism
Grambling State University
07/04/2022
How The Internet Impacted Terrorism
The internet allows terrorist groups to present messages and images would not appear in mainstream media. The internet is also helpful to terrorist with recruitment and training. It can also be used in target selection and reconnaissance, maps, satellite imagery, and diagrams provide ready-made intelligence sources and steganography, embedding hidden information in a picture, message, or another piece of information), is one of the internet’s greatest vulnerabilities.
Define The New Media & Describe The Characteristics of The New Media
New Media refers to and virtual network where communication takes place. It includes blogs, multiple internet postings, and any social networks; Newspapers, radio, and television could be defined as mass communication; terrorists are quick to understand power of the new media; twitter legitimizes messages because it brings the perception of authenticity, and it is socially accepted.
Define Force Multipliers & List and describe Four Force Multipliers
Force multipliers is a factor or a combination of factors that gives personnel or weapons the ability to accomplish greater feats than without it. Examples are: transitional support- which increases terrorist groups ability to move and hide; Technology- allows a small group to launch a deadly attack; media coverage- makes minor groups appear to be politically important; reigion- transcends normative political and social boundaries.
Define Types of Threats Posed by Technological Terrorism
Summarize Theories of Suicide Bombing
Suicide bombing has become a particularly terrorizing tactic, but there is no single explanation for either understanding or preventing it.
Describe the Emergence of the Modern IRA and Terrorism in Northern Ireland
Summarize the Birth, Evolution, and Rise of the ETA, the GAL, and the LTTE
,
Terrorism and Homeland Security, 9e
CHAPTER 4 Jonathan R. White
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 1
Define the new media environment.
Describe the characteristics of the new media.
Explain how the Internet has impacted terrorism.
Describe the way narrative can be presented in a hybrid frame.
Summarize research trends with respect to terrorism and the media.
2
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 2
Discuss the role of the media in constructing social reality.
Explain the tension between security forces and the media.
Describe how the media can be viewed as a weapon.
Explain how news frames are used to present a story.
Describe the special relationship between terrorism and television.
3
Copyright © 2017 Cengage Learning. All Rights Reserved.
The New Media Environment, Part 1
Defining the New Media
The mass media of newspapers, radio, and television could be defined as mass communication. The new methods of interaction also involve communication, but it allows selective connections among communities.
New media refers to any virtual network where communication takes place. It includes blogs, multiple Internet postings, and any social network.
4
Copyright © 2017 Cengage Learning. All Rights Reserved.
The New Media Environment, Part 2
Terrorists quick to understand power of the new media
Other factors influenced the growth and impact of the new media:
The price of network devices dropped.
Improved digital technology increased the quality and quantity of communications.
Devices became smaller and more powerful.
Increased bandwidth increased the ability of servers to process traffic.
Communications revolution created a host of virtual communities.
Twitter is particularly powerful. Legitimizes messages because it brings the perception of authenticity, and it is socially accepted.
5
Copyright © 2017 Cengage Learning. All Rights Reserved.
Characteristics of the New Media
The old media is controlled by small groups of elite stakeholders who distribute selective information to targeted audiences. It transmits one version of a story to many people, and while elites may interact with the sources of a narrative, the audience can only consume the information.
Consumers cannot collaborate or participate in developing a story.
None of the characteristics of the new media apply to the old.
6
Copyright © 2017 Cengage Learning. All Rights Reserved.
Other Aspects of the Internet
Steganography (embedding hidden information in a picture, message, or another piece of information) is one of the Internet’s greatest vulnerabilities.
Internet allows terrorist groups to present messages and images would not appear in mainstream media.
The Internet can also be used for recruitment and training.
The Internet is also used in target selection and reconnaissance.
Maps, satellite imagery, and diagrams provide ready-made intelligence sources.
7
Copyright © 2017 Cengage Learning. All Rights Reserved.
Trends in Research
Meanings are socially created, and Ross demonstrates that reporting is part of the social construction of terrorism.
Terrorists are aware of the power of the media and seek to manipulate their message through it.
While the media enhances the power of terrorism, it does not cause it.
Terrorists will increasingly use the Internet to communicate as the relationship between the media and terrorism grows stronger in the future.
8
Copyright © 2017 Cengage Learning. All Rights Reserved.
Empirical Findings on Twitter
The main purpose of terror media is to generate propaganda.
Frequency distributions of types of tweets revealed common categories from Syrian jihadists.
Klausen found that tweets centered around religious indoctrination, battle reports, interpersonal communication, everyday life, and delivering threats to the West.
Religion dominated written communication with four out of five tweets focusing on religious dogma.
9
Copyright © 2017 Cengage Learning. All Rights Reserved.
Gender Stereotypes
Television tends to portray women as minor figures in the male-dominated occupation.
Nacos presents several images created by television news frames:
Physical appearance frame
Family connection frame
Terrorist for the sake of love
Women's lib frame
Women as bored, frustrated housewives
10
Copyright © 2017 Cengage Learning. All Rights Reserved.
News Frames, Part 1
Reporting patterns are packaged in segments called news frames.
Purpose is to assemble words and pictures to create a pattern surrounding an event.
Creates a narrative for a deadly drama
Characters are introduced, heroes and villains are defined, and victims become the suffering innocents.
11
Copyright © 2017 Cengage Learning. All Rights Reserved.
News Frames, Part 2
News frames help “mediatize” the presentation of terrorism.
Media shapes the way an event is communicated.
News frames are one of the least understood aspects of broadcast journalism because their complexity goes unnoticed.
12
Copyright © 2017 Cengage Learning. All Rights Reserved.
Types of Frames
Reporting frame
Dominant frame
Conflict frame
Contention frame
Investigative frame
Mythic frame
Campaigning frame
Reportage frame
Community service frame
Collective interest frame
Cultural recognition frames
Mythic tales frames
13
Copyright © 2017 Cengage Learning. All Rights Reserved.
Ambiguous Stories and News Frames
News frames give the story a structured meaning, but sometimes a story defies structure.
The news frame works when a report is based on sources with definitive explanations of an event.
Ambiguity destroys the ability to create a sustainable news frame.
Terrorism is reported in well-defined news frames, the media and consumer assumes a political beginning, a violent process, and a logical end.
If there is ambiguity, there is no logical conclusion.
14
Copyright © 2017 Cengage Learning. All Rights Reserved.
Beating the Wrong Drum
Focus is improperly centered on military and law enforcement action overseas.
Media has virtually ignored domestic security issues.
Nacos’s study
American news media did not believe there was a need to focus on domestic security.
Televisions’ preference for sensational events
15
Copyright © 2017 Cengage Learning. All Rights Reserved.
Infotainment Telesector
Barber calls the twenty-four-hour news networks the infotainment telesector.
Media flourishes on one overriding factor: entertainment.
The infotainment telesector is not geared for depth; it is designed to create revenue.
Negative effect on homeland security
16
Copyright © 2017 Cengage Learning. All Rights Reserved.
Television Drama
Control of the drama pattern was held in a Western monopoly until recently.
Al Manar television presented a sympathetic view of the al Asqa uprising.
Television makes the viewing audience participants in a terrorist attack.
Television seeks drama, and terrorism provides an unfolding dramatic event.
17
Copyright © 2017 Cengage Learning. All Rights Reserved.
As Sahaab versus al Hurra
Al Qaeda’s underground video network, known as As Sahaab, wages an effective propaganda campaign using the Internet.
In response, the U.S. launched al Hurra, an Arabic-language 24 hour satellite station.
Results have been disappointing.
United States has yet to capitalize on the Internet for spreading propaganda.
18
Copyright © 2017 Cengage Learning. All Rights Reserved.
Media Bias?
Most mainstream media claim objectivity when presenting information about terrorism.
All news comes with a slant, and reporters are expected to create news frames reflecting their outlet’s orientation.
At one end of the spectrum critics claim the media have a liberal bias.
Others claim that the media have been taken over by conservatives.
19
Copyright © 2017 Cengage Learning. All Rights Reserved.
Media as a Business
A news organization, a profit-making entity, has the incentive to attract the largest possible audience.
Journalism is a profession.
As news organizations expand, there will be pressures for bias to develop special audiences among liberals and conservatives.
News organizations are increasingly led by boards and groups of owners driven by the desire to make money.
20
Copyright © 2017 Cengage Learning. All Rights Reserved.
Censorship
Paul Wilkinson (1997) believes that governments face three choices when it comes to maintaining freedom of the press and combating terrorism:
Laissez-faire attitude
Censorship
Media self-regulation
21
Copyright © 2017 Cengage Learning. All Rights Reserved.
Censorship Debate
Democracy is threatened when the government openly censors information.
Censorship could do more to damage freedom than the terrorist attacks themselves.
Others believe that in times of emergency, information must be controlled to ensure the survival of the state.
America was fighting a new type of war and some form of censorship was required.
22
Copyright © 2017 Cengage Learning. All Rights Reserved.
Chapter Take Aways, Part 1
The new media environment refers to instantaneous communication through a variety of platforms. It includes social networks, web pages, e-zines, chat rooms, blogs, and similar forms of communication.
The new media allow for vicarious participation in an event, opportunities for reframing narratives, and the ability for mass communication.
An exponential expansion of the Internet has been the basis of the new media environment. Its power is multiplied because devices are available, powerful, and costs have been reduced.
23
Copyright © 2017 Cengage Learning. All Rights Reserved.
Chapter Take Aways, Part 2
This means that there is extensive competition for presenting a point of view and a news frame, and it leads to charges of biases from all sides.
This is especially true in television because terrorism is a made-for-television drama.
Some scholars have called for limited censorship because the media is so powerful.
24
Copyright © 2017 Cengage Learning. All Rights Reserved.
24
,
Terrorism and Homeland Security, 9e
CHAPTER 5 Jonathan R. White
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 1
Summarize the tactics of modern terrorism.
Define force multipliers.
List and describe four force multipliers.
Outline the tactical importance of female terrorists.
Explain the reasons researcher and the public have ignored women in terrorism.
Define the types of threats posed by technological terrorism.
Explain the effects of biological, chemical, and radiological weapons.
2
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 2
Characterize the possibility and possible outcomes of nuclear terrorism.
Summarize transnational economic targeting in the tourist, energy, and transportation industries.
Summarize theories of suicide bombing.
Describe the roles women play in nationalistic, ideological, and religious groups.
3
Copyright © 2017 Cengage Learning. All Rights Reserved.
Terrorism Tactics
Bombing
Hijacking
Arson
Assault
Kidnapping
Hostage taking
Weapons of mass destruction
4
Copyright © 2017 Cengage Learning. All Rights Reserved.
Force Multipliers
Transnational support
Increases terrorist groups ability to move and hide
Technology
Allows a small group to launch a deadly attack
Media coverage
Makes minor group appear to be politically important
Religion
Transcends normative political and social boundaries
5
Copyright © 2017 Cengage Learning. All Rights Reserved.
The Bomb
Philosophy of the bomb
The only way to communicate with the social order was to destroy it.
Terrorists tend to increase their effectiveness in bombing by applying improved explosive technology to their weapons.
Thermobaric bomb
Spreads fuel in the air and then ignites it
6
Copyright © 2017 Cengage Learning. All Rights Reserved.
Cyberterrorism
The use of computers to attack technological targets or physical attacks on computer networks
An attractive low-risk strategy
Computers allow terrorist groups to remain connected, providing a means for covert discussions and anonymity.
Greatest fear of cyberterrorism concerns catastrophic or multiple system failures
7
Copyright © 2017 Cengage Learning. All Rights Reserved.
WMD: Biological Agents
Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and refined, or weaponized, to increase their ability to kill.
The Center for Disease Control classifies the most threatening from the groups as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.
8
Copyright © 2017 Cengage Learning. All Rights Reserved.
U.S. Biological Attacks after 1980
Bacteria
Religious group in Oregon spread bacteria in area salad bars to sicken potential voters.
Hundreds of people suffered food poisoning.
Anthrax
Cases were reported in Florida, Washington, DC, New York, New Jersey, and Connecticut.
Public health response was disorganized.
The case is still under investigation.
9
Copyright © 2017 Cengage Learning. All Rights Reserved.
WMD: Chemical & Radiological
There are four types of chemical agents: nerve agents, blood agents, choking agents, and blistering agents.
Radiological weapons are more heat resistant and last longer than chemicals.
Exposure to radiation can produce short-term burns and long-term heath problems.
10
Copyright © 2017 Cengage Learning. All Rights Reserved.
Highly Enriched Uranium (HEU)
HEU is plentiful and easy to obtain.
HEU is so potent that it could be used in a dirty bomb or a nuclear device.
Terrorists could build a device with HEU without the assistance of a nuclear state.
11
Copyright © 2017 Cengage Learning. All Rights Reserved.
Nuclear Terrorism
The most fearful scenario with WMDs involves a nuclear explosion.
Tel Aviv University Scholars suggest that the probability of nuclear terrorism is low.
The nuclear threat is based on the crime causation model: victim, opportunity to commit a crime, and the criminals’ desire.
12
Copyright © 2017 Cengage Learning. All Rights Reserved.
Nuclear Terrorism Misconceptions
Security is never 100% effective.
The nuclear black market does not exist.
Building a nuclear bomb is a complex process.
Nuclear defense should be based on realistic, comprehensive scenarios.
We should create total intelligence pictures of terrorist groups beyond nuclear terrorism.
Total protection is not possible, but we can tip the scales in our favor.
13
Copyright © 2017 Cengage Learning. All Rights Reserved.
Tourism
Terrorism does not seem to have an impact on domestic travel.
Terrorism most frequently affects international travelers.
Terrorism against tourists has a negative economic impact.
14
Copyright © 2017 Cengage Learning. All Rights Reserved.
Energy
Fossil fuels present tempting targets:
They represent the power and strength of the industrialized world.
Strikes against oil refineries have an economic impact on the West.
15
Copyright © 2017 Cengage Learning. All Rights Reserved.
Energy Attacks
Saudi Arabia
Al Qaeda sought to destroy production facilities; destroy transfer systems; and target individual oil workers, especially foreigners.
Pakistan and Balochista
The Bugtis resent and resist Pashtun incursion into their native land, which has led to sharp fighting and a guerrilla war.
16
Copyright © 2017 Cengage Learning. All Rights Reserved.
Transportation
After the September 11 attacks, the federal government immediately budgeted $4.8 billion to protect the aviation industry.
Indonesia, Malaysia, and Singapore have joined to protest insurance premiums on ships traveling through the Strait of Malacca.
Critics of homeland-security policies argue that ports remain unsecured because of the costs associated with increased protection.
17
Copyright © 2017 Cengage Learning. All Rights Reserved.
Theory of Suicide Terrorism
Pape (2005) believes three factors must be in place before a suicide terror campaign occurs:
Nationalistic or ethnic group must be resisting the occupation of a foreign power.
Foreign power must have democratic government whose voters will not routinely allow the slaughter and repression of the people in the occupied area.
There must be a difference in the religions of the occupying power and the people living under occupation.
18
Copyright © 2017 Cengage Learning. All Rights Reserved.
Models of Suicide Attacks, Part 1
Gunaratna sees three things that all attacks have in common: secrecy, reconnaissance, and rehearsal.
The Hamas model involves a professional group that plans and executes the attack, and a support group to prepare the attacker.
For many years, researchers believed that this was the only model for suicide bombing.
19
Copyright © 2017 Cengage Learning. All Rights Reserved.
Models of Suicide Attacks, Part 2
Cronin finds that different models emerged over time:
The LTTE trained suicide bombers
The PKK leadership coerced victims
The bombings in Chechnya represent a different combination of social and psychological factors.
20
Copyright © 2017 Cengage Learning. All Rights Reserved.
Women and Terrorism, Part 1
Female terrorists are not new to the history of terrorism:
18th century France
19th century Russia
20th century U.S.
Rebels in Ireland
Western revolutionary groups
Women are actively recruited by religious terrorists today.
21
Copyright © 2017 Cengage Learning. All Rights Reserved.
Women and Terrorism, Part 2
The role of women in terrorist groups is more closely determined by the political orientation of an organization than its tactics.
Women are more attracted to domestic terrorist organizations than international groups.
Women also have opportunities for leadership in revolutionary (domestics) groups.
International terrorists try to defend a traditional culture that limits the role of women.
22
Copyright © 2017 Cengage Learning. All Rights Reserved.
Women and Terrorism, Part 3
Revolutionary groups
Ulricke Meinhof and Leila Khalid served as combatants, leaders, and served as inspiration for supporters.
Secular and religious terrorist groups
Women increasingly receive combat assignments because they are so numerous.
23
Copyright © 2017 Cengage Learning. All Rights Reserved.
Overlooking Female Terrorists
Researchers do not tend to think of women as terrorists or criminals.
When they do look at females, researchers usually view women as victims.
Law enforcement officers do not tend to arrest females.
It is generally assumed that terrorism is a violent male occupation.
24
Copyright © 2017 Cengage Learning. All Rights Reserved.
http://www.apa.org/pubs/journals/releases/lhb-ofp-jacques.pdf
Myths and Realities of Female Perpetrated Terrorism
Discussion Question: Prior to reading this article, what were your beliefs on women as terrorists? How did the article change your beliefs concerning women involved in terrorism?
24
Impact of Terrorism on Women
Women have a greater sense of vulnerability to crime, and these feelings seem to transfer to terrorism.
Israeli study:
Women seemed to be more afraid of terrorism than men, because women experienced terrorism more vicariously.
Women were more likely to suffer from posttraumatic stress and seek assistance following terrorist attacks.
Women approached the fear of terrorism with problem-solving strategies.
25
Copyright © 2017 Cengage Learning. All Rights Reserved.
Chapter Take Aways, Part 1
The tactics of terrorism are straightforward and simple, but they are employed in innovative ways.
The study of terrorism is complex as a result of tactical innovation.
Force multipliers—technology, transnational support, religion, and the media—enhance the power of terrorist groups.
26
Copyright © 2017 Cengage Learning. All Rights Reserved.
Chapter Take Aways, Part 2
It is important to understand the tactical impact of gender on terrorism, but research on the roles of women has been neglected.
Technological attacks can be made more effective by using WMD, cyber-attacks, or economic targeting.
Suicide bombing has become a particularly terrorizing tactic, but there is no single explanation for either understanding or preventing it.
27
Copyright © 2017 Cengage Learning. All Rights Reserved.
,
Terrorism and Homeland Security, 9e
CHAPTER 6 Jonathan R. White
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 1
Explain the nature and characteristics of nationalistic and ethnic separatist terrorism.
Describe the emergence of the modern IRA and terrorism in Northern Ireland.
Outline the basis for negotiating peace in Northern Ireland.
2
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 2
Summarize the nature of Basque culture and its separateness from Spain.
Explain the impact of the Spanish Civil War on the Basque region.
Summarize the birth and evolution of the ETA.
Explain the rise of the GAL.
3
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives, Part 3
Outline the Spanish government’s approach to Basque separatism.
Describe the rise of the LTTE and the role of the Tamil Diaspora.
Summarize the unique aspect of LTTE suicide bombings.
Describe the end of the LTTE and the danger of possible reconstitution.
4
Copyright © 2017 Cengage Learning. All Rights Reserved.
Ethnic and Nationalist Terrorism
Ethnic terrorists are usually more nationalistic than religious terrorists.
Ethnic terrorists try to forge national identity; they appeal to the nationalistic background of a particular ethnic group.
Peaceful negotiated settlements have proved to be the most effective method for ending ethnic and nationalistic terrorism.
5
Copyright © 2017 Cengage Learning. All Rights Reserved.
Ethnic and Nationalist Separatism
Ireland
Incorporated terrorist techniques into their revolt against British rule
Basque region of Spain
The Euskadi Ta Askatasuna (ETA) is Europe’s longest surviving ethnic conflict
Island of Sri Lanka
Tensions between the Sinhalese and Tamils
6
Copyright © 2017 Cengage Learning. All Rights Reserved.
IRA and the Modern “Troubles”
The movement was aimed at achieving adequate housing and education among Ulster’s Catholic population in an attempt to improve economic growth.
The IRA had not been dormant throughout the civil rights movement, but it had failed to play a major role.
Turmoil in Belfast and Londonderry was halted by the British army acting as peacekeepers.
7
Copyright © 2017 Cengage Learning. All Rights Reserved.
The Army and Overreaction
Early policies of the British army played an important role in the rebirth of the IRA.
The British army had little or no appreciation of the historical circumstances behind the conflict.
The British army mistakenly allied itself with one of the extremist positions.
The policies of the British army had done much to set hostile forces in motion.
8
Copyright © 2017 Cengage Learning. All Rights Reserved.
Unionist Terrorism
Unionist organizations have a long history of terrorism; they represent the Unionist and Loyalist side of terrorism.
Historically, it has appeared in three forms:
Repression
Vengeance
Revolutionary violence for political change
9
Copyright © 2017 Cengage Learning. All Rights Reserved.
Negotiating with Terrorists
Belfast Agreement
Independent human rights investigations, compensation for the victims of violence, and decommissioning of paramilitary groups
Independent Monitoring Commission
Police Service of Northern Ireland
10
Copyright © 2017 Cengage Learning. All Rights Reserved.
Rational Political Goals and Negotiated Settlements
Terrorism in Northern Ireland no longer grabs attention as it did in the past.
The major campaigns are over and the groups have disbanded.
The situation remains volatile.
Unionist and Republican activists carried out 124 attacks against each other in 2009.
Two British soldiers were killed.
11
Copyright © 2017 Cengage Learning. All Rights Reserved.
Articles:
Seven people face terrorism charges
http://www.guardian.co.uk/uk/2012/may/19/colin -duffy-relative-court-terrorism
http://www.guardian.co.uk/uk/2012/may/18/northern-ireland -republican-terror-charges
The curse of the conflict junkies
http://www.economist.com/node/17631051
Discussion Questions:
Do you think the IRA would cease to exist if its goal was achieved? Or has it become so much of a “natio
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018