The article presents selected techniques and motives used in terrorist activities. The escalation of terrorist threats increases the involvement of security services, and also contributes to the development of more and more effective solutions. The essence of the activities of terrorist organizations and the ways of exerting influence on state governments were presented. Moreover, an attempt was made to characterize the attack preparation process by referring to the techniques used by terrorists.
REFERENCES(16)
1.
Adamski J., Nowe technologie w służbie terrorystów, TRIO, Warszawa 2007.
Crenshaw M., Suicide terrorism in comparative perspective, [w:] Countering SuicideTerrorism. An International Conference, The International Policy Institute for CounterTerrorismat the Interdisciplinary Center, Herzliya 2001.
Liedel K., Piasecka P., Ochrona obywateli i instytucji publicznych przed atakami terroryzmui przemocy – Zarys wiedzy o terroryzmie, MSWiA, Warszawa 2007.
Stelmach J., Rola negocjacji w rozwiązywaniu sytuacji kryzysowych z udziałem sprawców,działających w zorganizowanych grupach i związkach przestępczych, „Zeszyty NaukoweWSOWL”, nr 4 (170) 2013, Wrocław 2013.
Sztucki J., Gąsior M., Zając G., Szczelina M., Zarządzanie bezpieczeństwem lotnictwacywilnego. Skrypt dydaktyczny, Dolnośląska Szkoła Wyższa, Wydawnictwo Naukowe,Wrocław 2011.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.