What is a force multiplier? List and explain force multiplier and how they are used
What will be an ideal response?
• Force multipliers are a method of increasing striking power without increasing the number of combat troops in a military unit.
• Terrorists have four force multipliers: (1) technology to enhance weapons or attacks on technological facilities which allows a small group to launch a deadly attack, (2) transnational support which increases the ability of terrorist groups to move and hide, (3) media coverage, which can make a minor group appear to be politically important, and (4) religious fanaticism which transcends normative political and social boundaries, increasing violence and decreasing opportunities for negotiation.
• Cyber-terrorism and potential WMD attacks are examples of technological force multipliers.
• Media coverage and interpretation of terrorist events often serve as force multipliers – one incident can be converted into a "campaign" as electronic media scrambles to break the latest news.
• The triborder region in South America demonstrates that transnational support networks multiply the striking power of terrorists.
• A new force multiplier has been the introduction of religious fanaticism in terrorist activities.
• The introduction of religion has introduced suicide attacks into the arsenals of terrorism.
• Other examples are provided throughout the chapter.
You might also like to view...
When is a confession NOT considered to be coerced?
a. when police promise leniency c. when threats are made to arrest members of a suspect's family b. when the police use deception d. when physical pressures unduly influence the accused to make a statement
For the first time in decades, the United States has seen a drop in the use of incarceration.
Answer the following statement true (T) or false (F)
A 15-year-old girl is reported missing to the police by her parents, and the following is learned by the responding officer:
A) The child has run away from home and the officer should check with school officials for reasons why. B) The child has been abducted from her room by a stranger and the officer should enter her information into NCIC. C) The child has been abducted by a stranger on the way home from school and the officer should initiate an Amber Alert, as 74 percent of children are murdered within the first few hours of the event. D) The child has been lured by an Internet predator and the child's computer should be checked for information and clues as to the perpetrator's identity and/or location.
Behaviors that are not criminal if committed by adults, such as cigarette smoking or truancy, are called _____ in the juvenile justice context
a. juvenile offenses b. status mistakes c. juvenile delinquencies d. status offenses