UNITED24 - Make a charitable donation in support of Ukraine!


Table of Contents


A pessimist could infer from the preceding case studies that governments are helpless against terrorist attack; and that the increasing sophistication of terrorist tactics and techniques has rendered all protective censures ineffective. Rather, a different set of conclusions can be drawn from the analyses:

  • Military technology and sophistication is its deployment are nO longer monopolized by governments or their agents;
  • Terrorists have demonstrated remarkable ingenuity, skill, flexibility, innovation, and intelligence is planning and staging their attacks;
  • Increased force levels used by terrorists have effectively neutralised standard protection models, and require similar ingenuity and innovation in the construction of realistic protective approaches to deterring and preventing terrorist attacks.

It is clear that governments have fallen behind terrorists in developing and refining unconventional warfare techniques. The arts of intelligence, analysis, team design, training, and the deployment and recovery of highly effective quick strike commando units have bees adopted and perfected by terrorists. While governments still maintain the edge in the control and deployment of resource is conventional warfare, terrorists have bees able to breach standard low-level protective models.

Conventional responses to terrorism have been unsuccessful. The state of the art in facility and personnel protection rely on outdated concepts and techniques. Protective models have not kept pace with developments is terrorist targeting tactics. The response to terrorism has resulted is changes in operational procedures by the governments concerned.

Germany, the primary government target is both of the case studies, has enacted several major laws supporting the investigation and prosecution of terrorist organisations and, for the first time to some years, is beginning to take control of its problems. It has taken a leadership role is the fight against terrorism.

Part 8. Bibliography

Join the GlobalSecurity.org mailing list