{"id":164587,"date":"2022-11-16T10:47:16","date_gmt":"2022-11-16T09:47:16","guid":{"rendered":"https:\/\/us.edu.pl\/?p=164587"},"modified":"2022-12-14T14:05:17","modified_gmt":"2022-12-14T13:05:17","slug":"no-limits-terroryzm-od-kuchni","status":"publish","type":"post","link":"https:\/\/us.edu.pl\/en\/no-limits-terroryzm-od-kuchni\/","title":{"rendered":"&#8217;No Limits&#8217; | Homemade Terrorism"},"content":{"rendered":"<p><\/p>\n<p>[vc_row][vc_column width=&#8221;1\/3&#8243;][vc_tta_tabs][vc_tta_section title=&#8221;What is the article about?&#8221; tab_id=&#8221;1602492149386-3fc32333-593b&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><span style=\"font-size: 12px;\">We often associate terrorist attacks with the Islamic State, which has shaken up the international community in the last decade. Today, terrorist attacks are most often associated with the Islamic State, which in the middle of the last decade shook the international community quite a bit. However, similar types of attacks can happen anywhere in the world and are not always done by large terrorist organisations. Why do people commit terrorist attacks? Is it possible to get into the mind of such a person and find a way to solve the problem?<\/span><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_tta_section][\/vc_tta_tabs]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><strong>Contact<\/strong><\/p>\n<p>Karolina Wojtasik, PhD from the Institute of Sociology of the University of Silesia \u2013 <a href=\"mailto:karolina.wojtasik@us.edu.pl\">karolina.wojtasik@us.edu.pl<\/a><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][vc_column width=&#8221;2\/3&#8243;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><span style=\"font-size: 12px;\">| Tomek Grz\u0105\u015blewicz |<\/span><\/p>\n<p><strong>The driver of a bus on route 145 could not get through to the switchboard. When the vehicle stopped at a traffic light, he checked the contents of the bag and removed the suspicious package at the nearest stop. A moment later, the bomb, constructed and planted by a 22-year-old Pole, a student at the Wroc\u0142aw University of Technology, exploded. Had it not been for the alertness of one of the passengers and the effective, though non-regulation, actions of the driver, many people could have been killed inside the bus in Wroc\u0142aw on 19 May 2016. The research on terrorism conducted by Karolina Wojtasik, PhD, shows that danger may be much closer to us than we think.<\/strong><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p>\u2018We often associate danger with something that comes from outside, in the form of a bearded man who speaks a language we don\u2019t understand\u2019, says Karolina Wojtasik, PhD. \u2018We forget that terrorism is a method of action, and that the radicalisation which may lead to violence is not necessarily linked to Islam or its ideology\u2019. And while Islamist terrorist organisations such as Al-Qa&#8217;ida or ISIS are responsible for most of the attacks we hear about in the media, the 2011 attacks in Norway were carried out by a right-wing extremist Anders Breivik, a blond-haired and blue-eyed man.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p><img class=\"size-full wp-image-164588\" src=\"https:\/\/us.edu.pl\/wp-content\/uploads\/obrazek-wyrozniajacy\/Fot.-Tescka1-\u2013-Freepik.com_.jpg\" alt=\"Dynamit z zapalnikiem trzymany przez osob\u0119, kt\u00f3rej tylko r\u0119ka jest widoczna na obrazie\" width=\"100%\" height=\"auto\" srcset=\"https:\/\/us.edu.pl\/wp-content\/uploads\/obrazek-wyrozniajacy\/Fot.-Tescka1-\u2013-Freepik.com_.jpg 1000w, https:\/\/us.edu.pl\/wp-content\/uploads\/obrazek-wyrozniajacy\/Fot.-Tescka1-\u2013-Freepik.com_-900x599.jpg 900w, https:\/\/us.edu.pl\/wp-content\/uploads\/obrazek-wyrozniajacy\/Fot.-Tescka1-\u2013-Freepik.com_-768x511.jpg 768w, https:\/\/us.edu.pl\/wp-content\/uploads\/obrazek-wyrozniajacy\/Fot.-Tescka1-\u2013-Freepik.com_-575x383.jpg 575w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p><span style=\"font-size: 12px;\">Photo: Tescka1 | Freepik<\/span><\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p>One of Karolina Wojtasik\u2019s main areas of research is the analysis of the motivations and behaviours of the perpetrators of terrorist attacks. \u2018Breivik chose the youth of the Norwegian Labour Party \u2014 the children of politicians and entrepreneurs who would be meeting in the hallways of major companies and ministries in a dozen years\u2019 time \u2014 as the main target of his attack in a very deliberate way. He shot not so much at the youth but at a symbol of Norway\u2019s future\u2019, the researcher believes.<\/p>\n<p>Similar thoughts were shared by the perpetrators of the 9\/11 attacks, who chose as their targets the symbols of US financial, political, and military power. This was an event that not only changed the course of modern history, but it was also a turning point for the history of terrorism. Passenger aircraft and hostages were used as tools in the attack, and the scale and number of casualties were shocking.<\/p>\n<p>Terrorists most often strike in crowded places. Explosives at the finish line of the Boston Marathon (2013), a series of explosions and shootings in Paris (2015), coordinated bombings in Brussels (2016), and pedestrians rammed by a truck in Nice (2016) are just a few examples. The last case shows that the attackers\u2019 methods are subject to trends. \u2018Terrorist organisations encouraged the use of large, heavy vehicles in attacks on civilians from around 2010. It was only a matter of time before such a tool would be used in Europe. The Nice attack was soon followed by similar incidents in Berlin and Barcelona\u2019, the researcher points out.<\/p>\n<p>It is easy to notice that most of the above-mentioned attacks happened in the mid-2010s, when ISIS entered the international arena. The organisation is well aware of the importance of propaganda spread using new technologies and social media.<\/p>\n<p>\u2018Between 2014 and 2015, the internet was quite literally flooded with their creations, including music, videos, films, and jihadist press\u2019, lists Karolina Wojtasik, PhD, who researches Islamist publications. \u2018Until around 2018, they could be found online in gigantic quantities; nowadays, they tend to be rather in the areas of the internet which an ordinary person would not normally visit. Accessing these materials is more difficult now, as they are subject to censorship, and ISIS has far fewer resources to produce them than it once did\u2019.<\/p>\n<p>In jihadist newspapers, a militant can find tips on how to organise attacks.<\/p>\n<p>\u2018A few years ago, a newspaper for terrorists advertised its instructions for making improvised explosive devices under the following title: <em>Make a bomb in your mother\u2019s kitchen<\/em>\u2019, says Wojtasik, PhD. According to ISIS guidelines, a jihadist should hold the hostages until the television crew arrives and shows what is happening to the entire world.<\/p>\n<p>They are also expected to be visible: write a manifesto and send it to the media. If they ram people with a car, then it would be good to have an ISIS flag on it. <em>We\u2019ll admit to it, we\u2019ll offer you the franchise, we\u2019ll spread the word, there won\u2019t be a slightest doubt about who did it<\/em> \u2014 this is the Islamic State\u2019s mindset. The approach to dealing with hostages has also changed, with the terrorists once treating them as an exchange currency and presenting their list of demands. Nowadays, they often pretend to negotiate, stalling for time until the media arrives. The attackers did engage in negotiations at the Bataclan theatre and at the club in Orlando, but their demands, such as stopping coalition airstrikes on ISIS positions in Syria, were impossible to meet. Their only goal was to extend the duration of the attack and increase its reach.<\/p>\n<p>ISIS thoroughly analyses attacks carried out by its members or on its behalf. After the 2016 attack in Orlando, in which the attacker killed 50 and injured 53 people during a Latino night at a gay club, they concluded that the target chosen by the attacker was not great, because he could be accused of carrying out the attack due to his hatred of the LGBT and Latino communities instead of jihad.<\/p>\n<p>What is the security situation in Poland? Following Russia\u2019s attack on Ukraine, in February 2022, the second- level BRAVO alert was introduced due to the increased threat of a terrorist- type incident and an even higher, third-level CHARLIE-CRP alert, addressing the high probability of a terrorist attack in cyberspace. What should we do?<\/p>\n<p>\u2018Live as usual, only pay more attention to what is happening around us, especially in public spaces\u2019, advises Karolina Wojtasik, PhD. She also emphasises that too little attention in discussions on terrorism is paid to critical infrastructure.<\/p>\n<p>We rarely associate security with the fact that we have electricity, water, and gas. Meanwhile, all it takes is a successful attack on a local power station, sewage treatment plant, or waterworks. Just imagine the chaos that would ensue in Krak\u00f3w or Warsaw if a hacker broke into the systems in water treatment plants and prevented them from operating properly\u2019, says the researcher, who is trying to raise public awareness of terrorist threats, among others, through her YouTube channel called <em>Anatomia zamachu<\/em> [Anatomy of a terrorist attack].<\/p>\n<p>In fact, it isn\u2019t even necessary to pollute or poison the water at all \u2014 a rumour is all it takes. Skilful disinformation on social media that the water in our taps is toxic posted by a thousand trolls on local media forums will momentarily cause panic: shops stormed and looted, people trampled. Those with somatic illnesses, nervous system disorders, cardiac diseases would be affected immediately. Ambulances, hospitals, and clinics wouldn\u2019t keep up. Confidence in the authorities would drop. Telephone lines would be jammed. The direct and indirect consequences of such an action could be severe.<\/p>\n<p>Fortunately, not all incidents go as the attackers intended. The researcher analyses the mistakes and unforeseen issues capable of thwarting the most precisely planned attacks. In Brussels, five assailants were supposed to carry out the attacks at the same time, but the taxi company made a mistake and provided a vehicle that was too small, with enough room for only three of them. This mistake most likely saved many lives. Anders Breivik, after nine years of preparation, simply overslept. In addition, he had problems with his internet connection, whereas part of his plan was to post a 1,000-plus page manifesto on the internet and send it to several people. The attack took place on a Friday: when Breivik arrived outside the government buildings to detonate the bomb placed in a truck, many people had already finished their week\u2019s work, thanks to which there were fewer casualties.<\/p>\n<p>\u2018Sometimes one event or another is decided by chance, but our security is not just a matter of blind chance\u2019, emphasises the researcher. \u2018Most bombings that occurred in Europe and the US involved someone leaving a package with an improvised explosive device in public space. When such an item was spotted in time and the relevant services were notified, the attack was usually prevented.<\/p>\n<p>In the Wroc\u0142aw incident described at the beginning, the key factor was the intervention of a passenger who noticed that the bag might contain something dangerous. So if you see a piece of abandoned luggage in public space, call 112. Although in 99% of cases it will probably be nothing serious, in some situations you might just save someone\u2019s life.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[vc_separator]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p>The article entitled &#8216;Homemade Terrorism&#8217; was published in &#8216;<a href=\"https:\/\/us.edu.pl\/en\/nauka-i-badania\/popularyzacja-nauki\/no-limits\/\">No Limits<\/a>&#8216; No. 2(6)\/2022, the popular science journal of the University of Silesia.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][\/vc_row]<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/3&#8243;][vc_tta_tabs][vc_tta_section title=&#8221;What is the article about?&#8221; tab_id=&#8221;1602492149386-3fc32333-593b&#8221;][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_separator][\/vc_column][\/vc_row] [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/us.edu.pl\/en\/no-limits-terroryzm-od-kuchni\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":3279,"featured_media":164588,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"categories":[82,51],"tags":[2150,606],"acf":[],"_links":{"self":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/164587"}],"collection":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/users\/3279"}],"replies":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/comments?post=164587"}],"version-history":[{"count":5,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/164587\/revisions"}],"predecessor-version":[{"id":165664,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/posts\/164587\/revisions\/165664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media\/164588"}],"wp:attachment":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media?parent=164587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/categories?post=164587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/tags?post=164587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}