The Security–Business Nexus
Edited by Gabriele G.S. Suder
Chapter 13: A New Challenge for Security Policy
Kai Hirschmann INTRODUCTION International terrorism is a phenomenon in transition. It reﬂects continuity, but also signiﬁcant change. The terrorist’s motivations, methods and targets have notably changed. New types of adversaries have emerged in addition to the old, making use of the latest technical developments and operating with higher ﬁnancial resources. New forms of terrorism have enlarged the terrorist repertoire. So far, the face of terrorism has not remained the same. On the other hand, the vulnerability of modern societies has increased. Tendencies for certain groups or individuals to radicalize cannot be denied. A growing number of controversial issues within or between societies increase the likelihood of extremist behaviour. Terrorism prevention strategies have to develop concepts against this changed background. But concerning the predictive capabilities, the range of potential new terrorist weapons, types and associated scenarios for destruction will create major problems for those responsible for identifying this new generation of terrorist threats. Nevertheless, there are some who long for the ‘good old days’ when a ‘terror network’ guided by state sponsors could be blamed for bombings, hostage-taking, skyjacking and other forms of mayhem. Understanding September 11, 2001 as a key date in world history does not conclude that there was a sudden and irreversible change of any preexisting conditions. The terrorist attacks in the United States merely increased the visibility of previous processes that had already been unfolding out of sight for the public. In the new millennium, people have increasingly been experiencing terror in their own backyards...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.