SlideShare ist ein Scribd-Unternehmen logo
1 von 28
 Crisis diplomacy

 International cooperation


 Asymmetrical conflict


 Utility of violence
 Negotiations between actors in the global
 political arena in response to a crises, most
 commonly concerning conflicts and natural
 disasters, but also economic and health
 crises.
 When global actors work together to achieve
 common goals. e.g. the EU, ECB and IMF
 lending funds to Greece in 2010 and 2012 to
 prevent it defaulting on its loans and
 triggering a financial crisis.
 Violence used as a means of achieving one’s
 political objectives, commonly witness in
 global politics through inter state war.
 Traditionally perceived as an instrument of
 state power, violence and threatened acts of
 violence are increasingly used by terrorists
 groups as a means of achieving their
 objectives.
 Most commonly used in regards to
 development policies, sustainability seeks to
 organise states and their economies so that
 currents needs are meet while not
 jeopardising meeting the needs of future
 generations.
 The causes
 Responses and proposed solutions by key
  global actors
 Challenges to effective solutions
 Effectiveness of asymmetrical conflict in
  achieving a group’s objectives
 Asymmetrical warfare is a violent struggle in
 which the two belligerents are mismatched in
 terms of their military capabilities e.g. the
 Taliban and the USA.

 In asymmetrical conflict the weaker power
 serves to exploit the weaknesses of the
 stronger power – often its civilians.
 Weak forces utilize surprise, technology,
  innovative tactics, or what some might
  consider violations of military etiquette to
  challenge the strong (usually by targeting
  civilian populations).
 Terrorism is a global crises – turn of the 20th
  century there were 8 deaths of military
  personal for every civilian death. Now that
  figure has been reversed.
 The war on terror has cost the United States
 some $1 trillion and al-Qeada remains a
 global threat.
 A critical component to the execution of the
 attacks on September 11 (and other Al Qaeda
 bombings) was the ability of Al Qaeda to find
 individuals willing to die for their cause.

 Bin Laden very clearly understood the military
 disadvantage of al Qaeda and his followers;
 for that reason, he turned to a very common
 tactic in terrorist ventures: suicide bombing.
 The 9/11 attacks cost al Qaeda between
  $400,000 and $500,000, “while America lost
 – according to the lowest estimate – more
  than $500 billion” ( a return rate of 400,000 to
  1.)
 In fact, there are various reasons why suicide
 missions are an appealing form of attack:

 Terrorists have become increasingly attracted to
 suicide attacks because of their unique tactical
 advantages compared to those of more
 conventional terrorist operations. Suicide tactics
 are devastatingly effective, lethally efficient, have a
 greater likelihood of success, and are relatively
 inexpensive and generally easier to execute than
 other attack modes. The terrorist decision to
 employ this tactic…is an entirely rational and
 calculated choice, consciously embraced as a
 deliberate instrument of warfare (Hoffman, 132).
 For al Qaeda, suicide terrorism became a tactic
  that allowed them to successfully create
  devastation against an enemy with far superior
  weaponry, military organization, and resources.

 By including western civilians in their victims, al
  Qaeda’s strategies also attacked the psychology of
  the western people. This unconventional version of
  warfare and unfamiliar ideal of suicide posed a
  direct threat to the everyday person, generating
  thoughts and feelings of fear and vulnerability
  among the democratic populations.
 The availability of suicide agents have
 expanded the strategies available to al Qaeda
 in terms of the types of attacks they can
 conduct as well as the targets they can hit.
 Although they are crucial to the cause, the
 suicide bombers do not need to be well
 trained to carry out their missions, and the
 fact that “suicide bombers don’t need to be
 sophisticated is precisely what makes them so
 dangerous”
 Qaeda’s suicide bombers allow them to use
  “aircraft as human missiles (as in the 9/11 attacks)
  or boats as human torpedoes (as in the 2000
  attack on the USS Cole), and other bombs
 or using pedestrians, connected to a manual or
  remote control).
 These capabilities allow al Qaeda to select their
  targets on a symbolic basis; as there is no need
  for an escape plan, they simply need to
  determine a means of successfully reaching a
  target in order to succeed in their attacks.
 Terrorism combines surprise and shock to
    amplify effect and demoralize the broader
    public. It is asymmetric as it it "attacks
    vulnerabilities not appreciated by the target.”

    The U.S. government remains ill-prepared to
    counter such surprise. Most U.S. strategic
    planning with regard to terrorism focuses on
    replication of past activities.
   This means when Al
    Qaeda develops a new
    technique, target or
    weapon – as in the new
    bombs which can pass
    through air security
    detectors designed to
    pick up metal, Al
    Qaeda has a significant
    advantage.
 While a few exercises
  had considered the
  possibility of hijacked
  aircraft used as
  weapons, these were
  exceptions.

 Indeed, the US
  Defense Department
  cancelled one drill
  simulating a hijacked
  plane crash into the
  Pentagon because
  the scenario seemed
  too far-fetched.
 The United States, despite increased security,
  remains vulnerable.
 In Russia, we have seen terrorist attacks at
  apartment buildings, schools, hospitals,
  subways, passenger trains, busy streets,
  shopping malls, a rock concert, a theater. In
  Israel, terrorists have carried out suicide
  bombings on buses, at restaurants, shopping
  malls, and hotels; in Madrid, on commuter
  trains. The reality is that these are vulnerable
  targets in the United States as well.
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda
Ppt 12 effectiveness of asymmetrical conflict al qaeda

Weitere ähnliche Inhalte

Was ist angesagt?

Terrorism and Hijackings
Terrorism and HijackingsTerrorism and Hijackings
Terrorism and Hijackings
Nathan DeRosa
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
runningman825
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
runningman825
 
C03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorism
Matthew Boutross
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
Matthew Boutross
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trend
Giuliano Tavaroli
 

Was ist angesagt? (20)

Terrorism
TerrorismTerrorism
Terrorism
 
RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019
 
Terrorism and Hijackings
Terrorism and HijackingsTerrorism and Hijackings
Terrorism and Hijackings
 
War on Terror by U.S Government
War on Terror by U.S GovernmentWar on Terror by U.S Government
War on Terror by U.S Government
 
War and Terrorism
War and TerrorismWar and Terrorism
War and Terrorism
 
POLITICAL SCIENCE
POLITICAL SCIENCEPOLITICAL SCIENCE
POLITICAL SCIENCE
 
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
The US Hegemonic Constraints and Global War on Terrorism: An Aftermath of Sep...
 
Terrorism
TerrorismTerrorism
Terrorism
 
The Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent TerrorismThe Importance of Student Counselling to Prevent Terrorism
The Importance of Student Counselling to Prevent Terrorism
 
159-200-2025
159-200-2025159-200-2025
159-200-2025
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...Lessons 3,8,9,10,12,13   Terrorism, Fp, Policy, Strategy, Stagesetter   Doher...
Lessons 3,8,9,10,12,13 Terrorism, Fp, Policy, Strategy, Stagesetter Doher...
 
C03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorism
 
C05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terrorC05.8 gender roles, tactics, and force multipliers in terror
C05.8 gender roles, tactics, and force multipliers in terror
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trend
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror
 
A critical analysis jihad or terrorism
A critical analysis  jihad or terrorismA critical analysis  jihad or terrorism
A critical analysis jihad or terrorism
 
TERRORISM
TERRORISMTERRORISM
TERRORISM
 
Terrorism
TerrorismTerrorism
Terrorism
 
Global war on terror
Global war on terrorGlobal war on terror
Global war on terror
 

Ähnlich wie Ppt 12 effectiveness of asymmetrical conflict al qaeda

Catholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docxCatholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docx
write12
 
Catholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docxCatholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docx
sdfghj21
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
bissacr
 

Ähnlich wie Ppt 12 effectiveness of asymmetrical conflict al qaeda (7)

Catholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docxCatholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docx
 
Catholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docxCatholic Distance University Principles of Terrorism Discussion.docx
Catholic Distance University Principles of Terrorism Discussion.docx
 
Lecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terrorLecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terror
 
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docxChapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
Chapter 5 Global TerrorismNONSTATE ADVERSARIES, FUNDAMENTALIST.docx
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
 
Essays Terrorism
Essays TerrorismEssays Terrorism
Essays Terrorism
 

Mehr von Kathleen Paris

Ppt 8 the revolt of the people - the great fear, august decrees
Ppt 8   the revolt of the people - the great fear, august decreesPpt 8   the revolt of the people - the great fear, august decrees
Ppt 8 the revolt of the people - the great fear, august decrees
Kathleen Paris
 
Ppt 5 Calonne Brienne conflict with parlements Assembly of the notables
Ppt 5   Calonne Brienne conflict with parlements Assembly of the notablesPpt 5   Calonne Brienne conflict with parlements Assembly of the notables
Ppt 5 Calonne Brienne conflict with parlements Assembly of the notables
Kathleen Paris
 
The Longest Memory Background
The Longest Memory BackgroundThe Longest Memory Background
The Longest Memory Background
Kathleen Paris
 

Mehr von Kathleen Paris (19)

Revolutionary imagery 2018
Revolutionary imagery 2018Revolutionary imagery 2018
Revolutionary imagery 2018
 
Ppt 4 the financial crisis
Ppt 4   the financial crisisPpt 4   the financial crisis
Ppt 4 the financial crisis
 
Ppt 9 crowd bastille october days
Ppt 9   crowd bastille october daysPpt 9   crowd bastille october days
Ppt 9 crowd bastille october days
 
Ppt 8 the revolt of the people - the great fear, august decrees
Ppt 8   the revolt of the people - the great fear, august decreesPpt 8   the revolt of the people - the great fear, august decrees
Ppt 8 the revolt of the people - the great fear, august decrees
 
Ppt 7 the national assembly tennis court oath fall of the bastille
Ppt 7   the national assembly tennis court oath fall of the bastillePpt 7   the national assembly tennis court oath fall of the bastille
Ppt 7 the national assembly tennis court oath fall of the bastille
 
Ppt 6 election of the estates general, the pamphlet
Ppt 6   election of the estates general, the pamphletPpt 6   election of the estates general, the pamphlet
Ppt 6 election of the estates general, the pamphlet
 
Ppt 5 Calonne Brienne conflict with parlements Assembly of the notables
Ppt 5   Calonne Brienne conflict with parlements Assembly of the notablesPpt 5   Calonne Brienne conflict with parlements Assembly of the notables
Ppt 5 Calonne Brienne conflict with parlements Assembly of the notables
 
Ppt 4 the financial crisis
Ppt 4   the financial crisisPpt 4   the financial crisis
Ppt 4 the financial crisis
 
Ppt 3 causes - short term
Ppt 3   causes - short termPpt 3   causes - short term
Ppt 3 causes - short term
 
Ppt 2 the enlightenment
Ppt 2   the enlightenmentPpt 2   the enlightenment
Ppt 2 the enlightenment
 
Ppt 10 al qaeda
Ppt 10 al qaedaPpt 10 al qaeda
Ppt 10 al qaeda
 
Year of wonders historical background
Year of wonders historical backgroundYear of wonders historical background
Year of wonders historical background
 
Exam Revision Part II
Exam Revision Part IIExam Revision Part II
Exam Revision Part II
 
Exam Revision Part I
Exam Revision Part IExam Revision Part I
Exam Revision Part I
 
Eleven
ElevenEleven
Eleven
 
Crashing
CrashingCrashing
Crashing
 
Look both ways
Look both waysLook both ways
Look both ways
 
Strange Fruit
Strange FruitStrange Fruit
Strange Fruit
 
The Longest Memory Background
The Longest Memory BackgroundThe Longest Memory Background
The Longest Memory Background
 

Ppt 12 effectiveness of asymmetrical conflict al qaeda

  • 1.
  • 2.  Crisis diplomacy  International cooperation  Asymmetrical conflict  Utility of violence
  • 3.  Negotiations between actors in the global political arena in response to a crises, most commonly concerning conflicts and natural disasters, but also economic and health crises.
  • 4.  When global actors work together to achieve common goals. e.g. the EU, ECB and IMF lending funds to Greece in 2010 and 2012 to prevent it defaulting on its loans and triggering a financial crisis.
  • 5.  Violence used as a means of achieving one’s political objectives, commonly witness in global politics through inter state war. Traditionally perceived as an instrument of state power, violence and threatened acts of violence are increasingly used by terrorists groups as a means of achieving their objectives.
  • 6.  Most commonly used in regards to development policies, sustainability seeks to organise states and their economies so that currents needs are meet while not jeopardising meeting the needs of future generations.
  • 7.  The causes  Responses and proposed solutions by key global actors  Challenges to effective solutions  Effectiveness of asymmetrical conflict in achieving a group’s objectives
  • 8.  Asymmetrical warfare is a violent struggle in which the two belligerents are mismatched in terms of their military capabilities e.g. the Taliban and the USA.  In asymmetrical conflict the weaker power serves to exploit the weaknesses of the stronger power – often its civilians.
  • 9.  Weak forces utilize surprise, technology, innovative tactics, or what some might consider violations of military etiquette to challenge the strong (usually by targeting civilian populations).  Terrorism is a global crises – turn of the 20th century there were 8 deaths of military personal for every civilian death. Now that figure has been reversed.
  • 10.  The war on terror has cost the United States some $1 trillion and al-Qeada remains a global threat.
  • 11.  A critical component to the execution of the attacks on September 11 (and other Al Qaeda bombings) was the ability of Al Qaeda to find individuals willing to die for their cause.  Bin Laden very clearly understood the military disadvantage of al Qaeda and his followers; for that reason, he turned to a very common tactic in terrorist ventures: suicide bombing.
  • 12.  The 9/11 attacks cost al Qaeda between $400,000 and $500,000, “while America lost  – according to the lowest estimate – more than $500 billion” ( a return rate of 400,000 to 1.)
  • 13.  In fact, there are various reasons why suicide missions are an appealing form of attack:  Terrorists have become increasingly attracted to suicide attacks because of their unique tactical advantages compared to those of more conventional terrorist operations. Suicide tactics are devastatingly effective, lethally efficient, have a greater likelihood of success, and are relatively inexpensive and generally easier to execute than other attack modes. The terrorist decision to employ this tactic…is an entirely rational and calculated choice, consciously embraced as a deliberate instrument of warfare (Hoffman, 132).
  • 14.  For al Qaeda, suicide terrorism became a tactic that allowed them to successfully create devastation against an enemy with far superior weaponry, military organization, and resources.  By including western civilians in their victims, al Qaeda’s strategies also attacked the psychology of the western people. This unconventional version of warfare and unfamiliar ideal of suicide posed a direct threat to the everyday person, generating thoughts and feelings of fear and vulnerability among the democratic populations.
  • 15.  The availability of suicide agents have expanded the strategies available to al Qaeda in terms of the types of attacks they can conduct as well as the targets they can hit. Although they are crucial to the cause, the suicide bombers do not need to be well trained to carry out their missions, and the fact that “suicide bombers don’t need to be sophisticated is precisely what makes them so dangerous”
  • 16.  Qaeda’s suicide bombers allow them to use “aircraft as human missiles (as in the 9/11 attacks) or boats as human torpedoes (as in the 2000 attack on the USS Cole), and other bombs  or using pedestrians, connected to a manual or remote control).  These capabilities allow al Qaeda to select their targets on a symbolic basis; as there is no need for an escape plan, they simply need to determine a means of successfully reaching a target in order to succeed in their attacks.
  • 17.  Terrorism combines surprise and shock to amplify effect and demoralize the broader public. It is asymmetric as it it "attacks vulnerabilities not appreciated by the target.”  The U.S. government remains ill-prepared to counter such surprise. Most U.S. strategic planning with regard to terrorism focuses on replication of past activities.
  • 18. This means when Al Qaeda develops a new technique, target or weapon – as in the new bombs which can pass through air security detectors designed to pick up metal, Al Qaeda has a significant advantage.
  • 19.  While a few exercises had considered the possibility of hijacked aircraft used as weapons, these were exceptions.  Indeed, the US Defense Department cancelled one drill simulating a hijacked plane crash into the Pentagon because the scenario seemed too far-fetched.
  • 20.  The United States, despite increased security, remains vulnerable.  In Russia, we have seen terrorist attacks at apartment buildings, schools, hospitals, subways, passenger trains, busy streets, shopping malls, a rock concert, a theater. In Israel, terrorists have carried out suicide bombings on buses, at restaurants, shopping malls, and hotels; in Madrid, on commuter trains. The reality is that these are vulnerable targets in the United States as well.