Terrorism and Counterterrorism Strategies

Expert-defined terms from the Executive Certificate in Foreign Policy and National Security course at London School of Planning and Management. Free to read, free to share, paired with a globally recognised certification pathway.

Terrorism and Counterterrorism Strategies

Terrorism #

Terrorism

Terrorism is the use of violence or threats to intimidate or coerce a government… #

It is a tactic employed by non-state actors to create fear and achieve their goals. Terrorist attacks can target civilians, government officials, or military personnel and can range from bombings and shootings to cyberattacks and kidnappings.

Counterterrorism #

Counterterrorism

Counterterrorism refers to the efforts taken by governments, law enforcement age… #

This includes implementing security measures, conducting investigations, and disrupting terrorist networks. Counterterrorism strategies aim to protect citizens, infrastructure, and national security from terrorist attacks.

Al #

Qaeda

Al #

Qaeda is a global militant Islamist organization founded by Osama bin Laden in the late 1980s. It has been responsible for numerous terrorist attacks, including the September 11, 2001, attacks in the United States. Al-Qaeda aims to establish a worldwide Islamic caliphate and has affiliates and supporters in various countries.

Biological Terrorism #

Biological Terrorism

Biological terrorism involves the deliberate release of biological agents, such… #

Biological weapons can be used to target individuals, communities, or entire countries. Examples of biological agents that can be used in terrorism include anthrax, smallpox, and botulinum toxin.

Chemical Terrorism #

Chemical Terrorism

Chemical terrorism refers to the use of chemical agents, such as nerve agents, b… #

Chemical weapons can be dispersed through the air, water, or food supply and can result in serious injuries or fatalities. Examples of chemical weapons used in terrorism include sarin gas and mustard gas.

Cyberterrorism #

Cyberterrorism

Cyberterrorism involves the use of digital technology, such as computers, networ… #

Cyberterrorists can disrupt services, steal sensitive information, or spread misinformation to create chaos and panic. Examples of cyberterrorism tactics include hacking, malware, and denial-of-service attacks.

Domestic Terrorism #

Domestic Terrorism

Domestic terrorism refers to acts of terrorism that are carried out by individua… #

Domestic terrorists are motivated by political, social, or ideological beliefs and seek to influence government policies or public opinion. Domestic terrorism can target government buildings, religious institutions, or minority groups within a country.

Foreign Terrorist Organization (FTO) #

Foreign Terrorist Organization (FTO)

A Foreign Terrorist Organization (FTO) is a designation by the United States Dep… #

S. national security interests. FTOs are subject to sanctions, including asset freezes, travel bans, and criminal penalties. Examples of FTOs include ISIS, Hezbollah, and Boko Haram.

Global War on Terrorism #

Global War on Terrorism

The Global War on Terrorism is a military campaign launched by the United States… #

The goal of the campaign is to prevent terrorist organizations from carrying out attacks and to dismantle their networks worldwide. The Global War on Terrorism has involved military operations, intelligence sharing, and diplomatic efforts to combat terrorism.

Homeland Security #

Homeland Security

Homeland Security is a coordinated effort by the U #

S. government to protect the country from terrorist attacks, natural disasters, and other threats. The Department of Homeland Security (DHS) is responsible for safeguarding the nation's borders, transportation systems, and critical infrastructure. Homeland Security agencies work together to prevent, respond to, and recover from emergencies.

Improvised Explosive Device (IED) #

Improvised Explosive Device (IED)

An Improvised Explosive Device (IED) is a homemade bomb that is constructed and… #

IEDs can be hidden in vehicles, buildings, or on the roadside and can cause significant damage and casualties. Counterterrorism efforts focus on detecting and neutralizing IEDs to prevent attacks and protect civilians and security forces.

Jihad #

Jihad

Jihad is a concept in Islam that refers to the struggle or effort to uphold one'… #

In the context of terrorism, some extremist groups interpret jihad as holy war against non-believers or enemies of Islam. Jihadist terrorists believe they are fighting for a just cause and seek to establish Islamic rule through violence and coercion.

Kidnapping for Ransom #

Kidnapping for Ransom

Kidnapping for ransom is a tactic used by terrorist groups to generate funds, ga… #

Terrorists abduct individuals, often foreign nationals or government officials, and demand a ransom in exchange for their release. Kidnapping for ransom poses a significant threat to individuals working in conflict zones or high-risk areas.

Lone Wolf Terrorism #

Lone Wolf Terrorism

Lone wolf terrorism refers to attacks carried out by individuals acting alone, w… #

Lone wolves are self-radicalized and motivated by their own beliefs or grievances. Lone wolf terrorists can be difficult to detect and prevent, as they may not have a known affiliation or communication with extremist groups.

Militant Extremism #

Militant Extremism

Militant extremism is a radical ideology that advocates for the use of violence… #

Militant extremists reject peaceful means of change and resort to terrorism, insurgency, or armed conflict to advance their agenda. Militant extremist groups can pose a threat to stability, security, and human rights in affected regions.

Nuclear Terrorism #

Nuclear Terrorism

Nuclear terrorism involves the use of nuclear materials or weapons to cause mass… #

Terrorists may attempt to obtain nuclear materials, such as plutonium or enriched uranium, to build a crude nuclear device or dirty bomb. The threat of nuclear terrorism is a major concern for governments and international organizations.

Operation Enduring Freedom #

Operation Enduring Freedom

Operation Enduring Freedom was a military campaign launched by the United States… #

The operation aimed to dismantle terrorist networks, remove the Taliban regime in Afghanistan, and prevent the country from being used as a safe haven for terrorists. Operation Enduring Freedom involved coalition forces and lasted from 2001 to 2014.

Preventive Counterterrorism #

Preventive Counterterrorism

Preventive counterterrorism refers to measures taken to anticipate, detect, and… #

Preventive counterterrorism strategies focus on intelligence gathering, surveillance, and monitoring of individuals and groups with known or suspected ties to terrorism. By identifying and addressing threats early, preventive counterterrorism efforts aim to prevent attacks and protect communities.

Quarantine and Isolation #

Quarantine and Isolation

Quarantine and isolation are public health measures used to contain the spread o… #

Quarantine involves restricting the movement of individuals who have been exposed to a contagious disease but are not yet sick, while isolation separates individuals who are infected and contagious. During a bioterrorism event, quarantine and isolation can help prevent further transmission of the disease.

Radicalization #

Radicalization

Radicalization is the process by which individuals adopt extreme beliefs, ideolo… #

Radicalized individuals may become involved in terrorism, insurgency, or other forms of violent extremism. Radicalization can occur through social networks, online propaganda, or exposure to radical ideas and grievances. Preventing radicalization is a key aspect of counterterrorism efforts.

State Sponsor of Terrorism #

State Sponsor of Terrorism

A State Sponsor of Terrorism is a country that provides support, funding, or saf… #

State sponsors may offer training, weapons, intelligence, or diplomatic cover to terrorist groups that align with their interests. The U.S. government designates countries as State Sponsors of Terrorism based on their actions and policies related to terrorism. Examples of State Sponsors of Terrorism include Iran, North Korea, and Syria.

Terrorist Financing #

Terrorist Financing

Terrorist financing refers to the financial support provided to terrorist organi… #

Terrorist groups raise funds through illegal activities, such as drug trafficking, extortion, or fraud, as well as legitimate sources, including donations, charities, and front companies. Disrupting terrorist financing is a critical component of counterterrorism efforts.

Unmanned Aerial Vehicle (UAV) #

Unmanned Aerial Vehicle (UAV)

An Unmanned Aerial Vehicle (UAV), also known as a drone, is a remotely piloted a… #

UAVs are equipped with cameras, sensors, and weapons systems that allow operators to gather intelligence and conduct precision strikes without risking human lives. UAVs play a key role in counterterrorism operations in remote or high-risk areas.

Vulnerability Assessment #

Vulnerability Assessment

A Vulnerability Assessment is a systematic evaluation of potential weaknesses or… #

Vulnerability assessments identify critical assets, infrastructure, or personnel that are at risk of terrorist attacks and recommend measures to enhance their protection. By conducting vulnerability assessments, organizations can better prepare for and mitigate security threats.

Weapons of Mass Destruction (WMD) #

Weapons of Mass Destruction (WMD)

Weapons of Mass Destruction (WMD) are chemical, biological, radiological, or nuc… #

Terrorist groups may seek to acquire or use WMDs to maximize the impact of their attacks and instill fear in populations. Preventing the proliferation and use of WMDs is a top priority for national security and counterterrorism efforts.

Xenophobia #

Xenophobia

Xenophobia is a fear or hatred of foreigners, immigrants, or people from differe… #

Xenophobia can fuel extremist ideologies, discrimination, and violence against minority groups. Terrorist organizations may exploit xenophobic sentiments to recruit supporters, incite conflict, or justify their actions. Addressing xenophobia and promoting tolerance are important aspects of preventing radicalization and terrorism.

Yemeni Civil War #

Yemeni Civil War

The Yemeni Civil War is an ongoing conflict in Yemen between the internationally… #

The civil war has created a power vacuum, humanitarian crisis, and security threat in the region. Terrorist groups, such as Al-Qaeda in the Arabian Peninsula (AQAP), have exploited the instability in Yemen to expand their operations and threaten regional security.

Zarqawi Network #

Zarqawi Network

The Zarqawi Network was an extremist group led by Abu Musab al #

Zarqawi, a Jordanian militant who pledged allegiance to Al-Qaeda. The Zarqawi Network was responsible for numerous terrorist attacks in Iraq, including bombings, kidnappings, and beheadings. Zarqawi's group aimed to incite sectarian violence, undermine the Iraqi government, and establish an Islamic state. The Zarqawi Network was eventually targeted and dismantled by U.S. and coalition forces.

May 2026 cohort · 29 days left
from £99 GBP
Enrol