Research: Hostage-Taking Incident At Discovery Communications Meets Criteria Of Terrorist Act

A new report by terrorism researchers at the University of Maryland concludes that the deadly hostage-taking incident at the Discovery Communications headquarters in suburban Washington, D.C. meets the criteria of a terrorist act -- a rare one for media organizations and the nation's capital region. Hostage-taking, though, is a familiar pattern in capital-region terror, the researchers add.

The report from the University of Maryland's START Center -- the federally funded National Consortium for the Study of Terrorism and Responses to Terrorism -- also finds that there has never been any environmentally inspired suicide eco-terrorism in the United States, and probably the world, but draws no conclusions about whether that's what occurred in this case.

START maintains the world's most comprehensive unclassified database of terrorism incidents, and is designed to make it useful to scientists and policy-makers seeking to understand the behavior of terrorists and terror organizations. The report is based on an analysis of this data.

"The use of violence by radical environmentalists is extremely rare, and usually the target is property not people," said Gary LaFree, who directs the University of Maryland START Consortium and its Global Terrorism Database. "We'll count this incident as terrorism -- the perpetrator has a history of politically inspired activism and his tactics were violent."

START researchers analyzed the following information in the Global Terrorism Database, which includes more than 85,000 incidents worldwide since 1970.
 
The full report is available online at http://www.start.umd.edu/start/announcements/Background_Report_Discovery_building.pdf.

Featured

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.