Wednesday, September 11, 2019
Module 4 - SLP THREAT ANALYSIS Essay Example | Topics and Well Written Essays - 500 words
Module 4 - SLP THREAT ANALYSIS - Essay Example This follows the fact that terrorism activities are often targeted at specific places and sites, and not general areas. This development has led to curiosity and the need for research on what exactly champions the terroristsââ¬â¢ thinking and planning of their activities. With reference to choice of targets, it is evident that terrorists do not make random choices like those witnessed with freedom fighters or liberation movements. Rislien & Rislien (2010) have observed that, ââ¬Å"â⬠¦one may add the indispensability of ideology, not only because it provides the initial dynamic for the terroristsââ¬â¢ actions, but because it sets out the moral framework within which they operate.â⬠(P. 134). There seems to have been some drastic changes in the terroristsââ¬â¢ targeting policies; traditionally, those terrorists that had political ambitions would target major installation to attract media attention and general loss of life. For this reason, commercial centres were least spared. Currently, various considerations are put into perspective by terrorists; (Dugdale (2005), points out that, ââ¬Å"First, they do a risk analysisâ⬠(p. 1). Terroriats make careful considerations of the potential benefits they stand to get from the target; this is often in contrast to the amount of resources and potential for success. In the same way, Rislien & Rislien (2010), explain that, ââ¬Å"Academia thus claims that terrorism is rational and has a clear singleness of purposeâ⬠(p. 134), something that underpins the need for an understanding about their target choices and decision. It is this analysis that leads to ear marking of places as ââ¬Å"softâ⬠and ââ¬Å"hardâ⬠targets by the particular terrorist groups. In this analysis, a ââ¬Å"hardâ⬠target is that which has considerable security and may make the terrorists be easily intercepted in the course of their actions. On the other hand, a ââ¬Å"softâ⬠target is that which has few security considerations
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.