Edited by David Martin Jones, Ann Lane and Paul Schulte
Chapter 2: Terrorist Networks: Strengths and Weaknesses
Peter Wilson The best thing ever written on terrorism wasn’t by Conrad or Bobbitt but popped up on Not the Nine O’Clock News. The team played earnest young radicals poring over a copy of Das Kapital. One of them looked up and began reading out a particularly tedious passage. He paused, turned to his comrades and uttered words to the effect of: ‘Sod this, let’s just go and bomb something . . .’ (Michael Gove, The Times, 9 June 2008) In many ways we had more problems with the INLA [Irish National Liberation Army] than PIRA [Provisional Irish Republican Army]. PIRA had plans, strategies, logistic networks and structures to clear operations. We could infiltrate all that. INLA had a few blokes who’d just go to the pub, get drunk and say let’s go and kill a copper’. It was difficult to do much about that.1 This quote from a former Northern Irish police officer illustrates many of the strengths and weaknesses of using an informal network to commit terrorism. The Irish National Liberation Army (INLA)’s loose structure and lack of top-down direction or discipline made it hard for the security forces to counter. An attack could be conceived and implemented in the space of a few hours, by a small cell with no need to entrust their plans to insecure communications methods or unreliable colleagues.2 But of course in the end it was the Provisional Irish Republican Army (PIRA) and its political wing Sinn Fein that achieved some of its aims...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.