PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Attacks on passenger aircrafts with the use of chemical warfare agents. Typology of the perpetrators

Autorzy
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The following article builds on two interconnected objectives. The first is to develop a more detailed description of the perpetrators of the attacks on passenger aircrafts with the use of chemical warfare agents as well as analyze the psychological and social conditions conducive to such use. The analysis itself has been carried out based on the cases of non-military use of chemical warfare agents by individuals and non-state agencies recorded in the past. The second objective is to attempt to create an ideological and psychological model of a typical perpetrator of an attack, based on the analysis of their motivation and ideology, which is investigated as a psychological aspect by referring it to the Nietzschean concept of ressentiment.
Rocznik
Tom
XVI
Strony
1--15
Opis fizyczny
Bibliogr. 28 poz.
Twórcy
  • Wyższa Szkoła Oficerska Sił Powietrznych; Wydział Bezpieczeństwa Narodowego i Logistyki
Bibliografia
  • 1. Binder, M. K., Ackerman, G. A., Pick your POICN: Introducing the profiles of incidents involving CBRN and non-state actors (POICN) database, Studies in Conflict & Terrorism, 2019, 1–24.
  • 2. Brannan, D., Left- and Right-wing Political Terrorism, [w:], Politics of Terrorism: A Survey, Andrew T.H., Routledge, 2010.
  • 3. Burton, F., Stewart, S., The ‘lone wolf’ disconnect, STRATFOR Global Intelligence, 2008, http://www.stratfor.com/weekly/lone_wolf_disconnect, 20.02.2022.
  • 4. Clark, T. A., Guarrieri, T. R., Modeling Terrorist Attack Cycles as a Stochastic Process: Analyzing Chemical, Biological, Radiological, and Nuclear (CBRN) Incidents, Journal of Applied Security Research, 2020, 1–2.
  • 5. Donaldson’s Aerospace & Defense, Understanding Carbon-Based Chemical Filtration Systems For Aircraft Cabins, 2019, https://www.donaldson.com/content/dam/donaldson/aerospace-defense/literature/north-america/f112271/Air-Purification-System-APS-White-Paper.pdf, 07.01.2022.
  • 6. Dyson, W., The Emergence of Special-Interest/Single-Issue Terrorism, IIR Institute for Intergovernmental Research, Tallahassee, Florida 2001.
  • 7. Ganor, B., Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Practice and Research, 2002, 3(4).
  • 8. Gas bomb defused, The Russia Journal, July 1, 2000.
  • 9. Ginges, J., Deterring the Terrorist: A Psychological Evaluation of Different Strategies for Deterring Terrorism, Terrorism and Political Violence, 1997, tom 9, nr1.
  • 10. Global Terrorism Database, University of Maryland, 2019.
  • 11. Hone, T., Terrorism. CIA, and South America. Crescat Scientia, Utah Valley University, Journal of History and Political Science, 2017, s. 57.
  • 12. Johnston, R., Summary of historical attacks using chemical or biological weapons, 2017, http://www.johnstonsarchive.net/terrorism/chembio attacks.html, 15.01.2022.
  • 13. Kaplan, D. E., The Cult at the End of the World: The Terrifying Story of the Aum Doomsday Cult, from the Subways of Tokyo to the Nuclear Arsenals of Russia, Crown, New York 1996.
  • 14. Koehler D., Right-Wing Extremism and Terrorism in Europe Current Developments and Issues for the Future, PRISM, 2016, vol. 6.
  • 15. Koehler, D., Popella, P., Mapping Farright Chemical, Biological, Radiological, and Nuclear (CBRN) Terrorism Efforts in the West: Characteristics of Plots and Perpetrators for Future Threat Assessment, Terrorism and Political Violence, 2018.
  • 16. Marchment, Z., Bouhana, N., Gill, P., Lone Actor Terrorists: A Residence-to-Crime Approach, Terrorism and Political Violence, 2018, 1–26.
  • 17. Masters, D., The Origin of Terrorist Threats: Religious, Separatist, or Something Else?, Terrorism and Political Violence, 2008.
  • 18. Mohtadi H., Murshid A., A Global Chronology of Incidents of Chemical, Bio-logical, Radioactive and Nuclear Attacks: 1950-2005, Grant number N-00014-04-1-0659 supported by the U.S. Department of Homeland Security, 2006.
  • 19. Nietzsche, F., Z genealogii moralności. Wydawnictwo Vis-a-Vis Etiuda, Kraków2017.
  • 20. Płachta, M., Terroryzm i przestępczość zorganizowana: wzajemne relacje i ich implikacje dla bezpieczeństwa wewnętrznego, Edukacja dla bezpieczeństwa, RokX, numer 3/2017 (36).
  • 21. Posłuszna, E., Ekstremizm ekologiczny, Wydawnictwo Naukowe Scholar, Warszawa 2012
  • 22. Posłuszna, E., Lone Wolf Terrorism – A Socio-Psychological Approach, Safety & Defense, 2020, s. 109-111.
  • 23. Posłuszna, E., & Mares, M., Environmental-extremist and Animal Rights Single Issue Perpetrators, [w], Understanding Lone Wolf Terrorism. Past Experience, Fredholm, M., Future Outlook, and Response Strategies, 2016, s. 87-106.
  • 24. Rakopoulos, T., The shared boundary: Sicilian mafia and antimafia land, Journal of Modern Italian Studies, 2020, 1–17.
  • 25. Simon, J. D., Lone Wolf Terrorism. Understanding the Growing Threats, Prometheus Books: Amherst, New York 2013, s. 43-45.
  • 26. Smith, P. J., Terrorism in the year 2020: Examining the ideational, functional and geopolitical trends that will shape terrorism in the twenty-first century. Dynamics of Asymmetric Conflict, 2008, Vol. 1, No. 1, s. 48–65.
  • 27. Terrorism in the United States, U.S. Department of Justice, Federal Bureau of Investigation, Washington 1999.
  • 28. The Act of June 6, 1997 Polish Penal Code (Dz. U. 1997 Nr 88, poz. 553).
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-50c76af4-2e3c-44d5-9e22-514e47e7a622
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.