10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INTRODUCTION • lxvOsama bin Laden network illustrates how dangerous entrepreneurialterrorists can use private resources for political purposes in a worldwhere the power <strong>of</strong> independent wealth and the Internet come to rivalthe more traditional interactions among states. The impact <strong>of</strong> suchindividuals will be multiplied when they are able to recruit or hire likemindedindividuals who are also highly versed in computer technologyand therefore able to engage in technological terrorism in the form <strong>of</strong>information operations, in which the gun or bomb is replaced by thepersonal computer. NGOs can use this power for both good and evil.The Seattle riots against the World Trade Organization (WTO) illustratehow disparate groups can use the Internet to coordinate themselves inseeking to achieve what may be either laudable or evil goals. Moreover,within such netwar social and political movements there have alwaysbeen entrepreneurs who will use violence created by such protests toachieve both political and personal goals.The development <strong>of</strong> such groups has serious implications for thosegovernments that are seeking to combat terrorism. Just as there has beena vast increase in internal defense budgets, there will also be a massivegrowth <strong>of</strong> private security firms, which will compete not only with eachother but also with national governments in providing security for theircitizens. We are witnessing what has elsewhere been labeled the “privatization<strong>of</strong> public violence,” 18 a trend that will challenge the state’sclassic monopoly over the use <strong>of</strong> force. National governments seekingto combat terror will increasingly face a difficult choice: by seeking tocooperate with private security firms, the nation-state increases its abilityto fight the terrorists but then may become co-opted by these sameprivate agencies, creating public-private conflicts <strong>of</strong> interest. Or else thenation-state can seek to maintain its own monopoly over counterterrorismthrough government oversight and regulation <strong>of</strong> private securityfirms, but at the potential cost <strong>of</strong> depriving itself and society <strong>of</strong> thepotential counterterrorism contribution by the private sector.FUTURE TRENDSThe trends noted in the first and second editions will likely not only continuebut intensify. The breakdown <strong>of</strong> the Soviet Union, unleashed bythe forces <strong>of</strong> nationalism so long repressed and hidden under Communistrule, manifested a pr<strong>of</strong>ound and fundamental change in the international

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!