Methods used by Terrorists

The effectiveness of these units all over the world has been proved time and time again with CT teams resolving situations with the tactics they have learnt and know through and through, one of these more famous operations is Operation Nimrod which was undertaken by our own 22nd Special Air Service, on May 5th 1980 a troop of SAS troopers who specialised in Counter Terrorism and Close Quarter Battle stormed the Iranian embassy, this happened after a hostage was executed by the Terrorists and the order, direct from the PM Margaret Thatcher, for the SAS to move in was given, during the raid five of the six terrorists were killed and 19 of the 20 remaining hostages were rescued, this put the SAS in the limelight due to their skill, precision and ruthlessness in the dealing with of the situation and made clear how necessary it was to have highly skilled, highly motivated Counter Terrorism Units.

Referral Work Methods used by Terrorists Bombings Bombings are a very indiscriminate way of attacking and killing people and they cause high amounts of damage to anything or anyone unlucky enough to be in the blast zone and around any collapsible subjects. Bombs can be easily concealed as shown on the 7/7 attacks within a rucksack. They can also be planted on the side of roads concealed in bins or under any sort of camouflage which could be rubble or road kill. There is also the threat from Vehicle Born Improvised Explosives (VBIED) these can contain Artillery shells placed into the back of any Vehicle. Bombings can be carried out on any type of target and in the past buildings; ships and planes have been targeted.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

To combat these threats the Army use checkpoints on roads to check cars and their contents before letting them through. They would also train the soldiers to be more vigilant to spot anything that may look out of place on the roadsides or surrounding areas. Also intelligence services can monitor individual’s activities and who they interact with to gather clues. Hijackings A hijacked Vehicle such as a bus, train or aeroplanes, can be a very useful asset to a Terrorist organisation, they can ransom the hostages to gain either political recognition or the release of prisoners or any other demands they may choose to make.

These are very dangerous terrorist methods because if the plane heads off course there could only be one way to resolve the situation without the death of civilians on the ground and that would be to shoot the plane out of the sky. To stop potential Skyjackings the cockpit doors on planes have been reinforced and some companies have been placing flight stewards on to thwart any terrorist attempts at hijacking the plane. Baggage checks and restriction of certain items on flights has also been stepped up to prevent any terrorist hijackings. Assassinations These are attacks on a specific individual or group of individuals with the aim of killing them, the by any appropriate ways of means.

Recently a candidate for the Pakistan elections Benazir Bhutto was killed while on a parade surrounded by sympathisers and supporters. Before this the IRA attempted to kill Margaret Thatcher while she was in a Hotel in Brighton. Before the start of the Great War Archduke Franz Ferdinand of Austria was assassinated while travelling with his wife, this then later lead to the start of the First World War. To combat these types of attacks security forces are employed to protect officials and to watch over the area while they move through it.

Also surveillance is used to watch the movements of extremists who oppose the certain VIP. The best thing to do is put all involved on a heightened state of vigilance and alert. Suicide Attacks These attacks have been most common in the Middle East with Muslim extremists targeting other Muslim faiths or with VBIED’s at vehicle checkpoints. Al – Qaeda have used this type of Attack against the U.S on September the 11th 2001 and the UK on 7th July 2007. They have also attacked Spain, Egypt and Bali with these methods. The explosives can be contained within a rucksack like on the 7/7 attacks or on an explosive rig strapped to their chest.

To combat this type of attack is difficult as the perpetrators look like any other person but have explosives attached to them, they can strike any place anytime. The security organisations around the world have had to increase surveillance on terror suspects. They know have more stringent checks at security points at airports. The can monitor these individuals by monitoring their movements, phone calls, finances and interaction with certain groups, if an individual is suspected of terrorism then things like the freezing of finances can be put into place to prevent them taking action. They can also be arrested under the Terrorism Act 2000 and questioned on their activities.