Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO07069 | Car Bombs.Com Internet-Enabled Terrorism and Homegrown Jihadist
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO07069 | Car Bombs.Com Internet-Enabled Terrorism and Homegrown Jihadist
    Rebecca Givner-Forbes

    04 July 2007

    download pdf

    Commentary

    THE TWO car bombs discovered in London and the third used to attack an airport terminal in Glasgow on 29 and 30 June serve as a reminder that even amateur terrorists can potentially cause death and disruption. Descriptions of these bombs focus on their potential deadliness as well as their amateurish construction. Such descriptions illustrate why so many terrorist organizations have been able to use car bombs: they can be both technologically uncomplicated and effective at the same time.

    The age of Internet-enabled terror has seen car bombs become even more widely accessible. Instructions and assistance in building simple explosive devices are available not just to establish terrorist organizations, but to self-starting individuals and small groups spurred to act in the name of Jihad. Such “entrepreneurial terrorists” are served by a vibrant and dynamic web presence where extremists can meet in virtual space to discuss hypothetical attacks. Arabic-language, password- protected forums are the primary web mediums for the exchange of information – gained either through Internet research or real world experience – in constructing and deploying the tools of terrorism. The result is the increasing decentralization and the widening distribution of terrorists’ technical and tactical know-how.

    Car Bombs.Com

    In the past, such information has been confined to the institutional knowledge of established terrorist organizations and the personal expertise of key individuals. But the availability of new online resources and the transformation of Jihadism into a global movement means that future terrorist attacks will increasingly come from amateurs and entrepreneurs who are animated by Jihadist ideology but who lack membership in pre-existing terrorist organizations.

    It is yet unknown what role online manuals and instruction may have played in the UK plots. The amateurish nature of the car bombs suggests that the participants did not have access to the expertise and professionalism of established terrorist organizations. Also, those behind the London bombs appear to have had a presence in Jihadist forums, allegedly posting a message heralding an attack in London the day before the bombs were discovered.

    Car bombs have featured prominently on Jihadist websites. Instructional materials detailing the preparation and positioning of car bombs are widely popular and in frequent circulation. For example, the Encyclopaedia of Afghan Jihad, available online, includes formulas for calculating the amount of explosives a vehicle must deliver to destroy different types of buildings. Another document available on Jihadist forums, a guide to positioning car bombs, instructs would-be terrorists to park outside cinemas or sport stadiums in order to detonate among throngs departing the venue. A third document, a PowerPoint presentation, contains basic designs of car bombs and other improvised explosive devices allegedly used in Iraq.

    One of the most recent and detailed manuals on car bombs was published on Jihadist forums this April. The manual includes a number of insights and considerations pertinent to the planning and executing of a car bomb or truck bomb attack. It contains “lessons learned” from previous vehicle- borne bomb attacks, focusing on the 1995 Oklahoma City bombing and the 1996 bombing of US military barracks in al-Khobar, Saudi Arabia. It discusses the use of different homemade explosives in car bombs. It highlights the value of attacking buildings with lots of glass to create deadly shrapnel out of the flying shards during an explosion.

    The manual also focuses on the damage wrought at various distances and blast forces. “Certain death comes with a blast of 100 to 120 pounds per square inch,” it reads. Charts are included to illustrate the positioning and types of bombs needed to ensure the deadliness of the bomb.

    Live Help Available Online

    Car bombs also figure in the discussion of members of Jihadist forums. In April, ICPVTR observed a lengthy discussion in which several participants of a password-protected Arabic-language forum met online to pool their knowledge on car bombs and discuss the relative merits of various explosives and detonators. According to one member, their goal was to compile a set of car bombing instructions “from A to Z, from the steering wheel to the gas tank”.

    During the car bomb discussion, several members of the forum readily offered their insights and experiences. They swapped knowledge on detonators and mechanisms of detonation. They discussed making explosives using homemade substances, including mixtures of acetylene or butane gases and oxygen, as well as ammonium nitrate mixtures like ANFO and ammonal. One participant recommended stocking a car with large gas canisters, just like those used in both the London and Glasgow car bombs.

    The discussion demonstrated one of the most important features of the online Jihadist presence: its interactive component, facilitated by the use of web mediums – primarily forums – which allow any member to post materials and participate in discussions. Not only can amateurs download instructions, they can access other members of virtual Jihadist community to obtain additional knowledge and advice.

    The Process of Entrepreneurial Terrorism

    Online manuals and tactical discussion forums do not exist for the benefit of established terrorist organizations like al Qaeda. Rather, they are designed to incite and inform entrepreneurial terrorists interested in taking up the cause of Jihad on their own initiative.

    For many of these aspiring terrorists, the online Jihadist presence provides the sole portal into the world of radical ideology. Traditional contact points have become less accessible due to post 9-11 security efforts, which have put travel to terrorist training camps and access to terrorist organizations out of the reach of many. In such an environment, the Internet has emerged as the primary mechanism of the Jihad movement’s expansion.

    The Jihadist virtual community helps cement ideological commitment among terrorist sympathizers who come to the Internet in search of radical ideas. Its members are fed interpretations of religion and politics designed to create myths of victimization and oppression, which are then used to justify violence. When the process of indoctrination is complete, individuals are encouraged to recruit, train, and equip a small terrorist cell, relying in part on Jihadist forums for instructions and assistance.

    It is a process in development. To date, there have been few instances of entrepreneurial terrorism, in spite of the volume of materials on Jihadist forums and the many fervent calls for violence among their membership. This could be due to a number of factors, including inconsistency in the accuracy and sophistication of available manuals. However, they are slowly improving, and incitement to attack remains constant.

    The post-attack investigation of the UK car bombs has not yet revealed whether the terrorists made use of this shadowy virtual resource in planning their botched attacks. However, these incidents show us what an Internet-enabled entrepreneurial terrorist attack would probably look like: amateurish and simple, but nevertheless disruptive and potentially dangerous.

    About the Author

    Rebecca Givner-Forbes is a Research Analyst with the International Centre for Political Violence & Terrorism Research (ICPVTR) at the S. Rajaratnam School of International Studies, NTU. 

    Categories: RSIS Commentary Series / Terrorism Studies

    Commentary

    THE TWO car bombs discovered in London and the third used to attack an airport terminal in Glasgow on 29 and 30 June serve as a reminder that even amateur terrorists can potentially cause death and disruption. Descriptions of these bombs focus on their potential deadliness as well as their amateurish construction. Such descriptions illustrate why so many terrorist organizations have been able to use car bombs: they can be both technologically uncomplicated and effective at the same time.

    The age of Internet-enabled terror has seen car bombs become even more widely accessible. Instructions and assistance in building simple explosive devices are available not just to establish terrorist organizations, but to self-starting individuals and small groups spurred to act in the name of Jihad. Such “entrepreneurial terrorists” are served by a vibrant and dynamic web presence where extremists can meet in virtual space to discuss hypothetical attacks. Arabic-language, password- protected forums are the primary web mediums for the exchange of information – gained either through Internet research or real world experience – in constructing and deploying the tools of terrorism. The result is the increasing decentralization and the widening distribution of terrorists’ technical and tactical know-how.

    Car Bombs.Com

    In the past, such information has been confined to the institutional knowledge of established terrorist organizations and the personal expertise of key individuals. But the availability of new online resources and the transformation of Jihadism into a global movement means that future terrorist attacks will increasingly come from amateurs and entrepreneurs who are animated by Jihadist ideology but who lack membership in pre-existing terrorist organizations.

    It is yet unknown what role online manuals and instruction may have played in the UK plots. The amateurish nature of the car bombs suggests that the participants did not have access to the expertise and professionalism of established terrorist organizations. Also, those behind the London bombs appear to have had a presence in Jihadist forums, allegedly posting a message heralding an attack in London the day before the bombs were discovered.

    Car bombs have featured prominently on Jihadist websites. Instructional materials detailing the preparation and positioning of car bombs are widely popular and in frequent circulation. For example, the Encyclopaedia of Afghan Jihad, available online, includes formulas for calculating the amount of explosives a vehicle must deliver to destroy different types of buildings. Another document available on Jihadist forums, a guide to positioning car bombs, instructs would-be terrorists to park outside cinemas or sport stadiums in order to detonate among throngs departing the venue. A third document, a PowerPoint presentation, contains basic designs of car bombs and other improvised explosive devices allegedly used in Iraq.

    One of the most recent and detailed manuals on car bombs was published on Jihadist forums this April. The manual includes a number of insights and considerations pertinent to the planning and executing of a car bomb or truck bomb attack. It contains “lessons learned” from previous vehicle- borne bomb attacks, focusing on the 1995 Oklahoma City bombing and the 1996 bombing of US military barracks in al-Khobar, Saudi Arabia. It discusses the use of different homemade explosives in car bombs. It highlights the value of attacking buildings with lots of glass to create deadly shrapnel out of the flying shards during an explosion.

    The manual also focuses on the damage wrought at various distances and blast forces. “Certain death comes with a blast of 100 to 120 pounds per square inch,” it reads. Charts are included to illustrate the positioning and types of bombs needed to ensure the deadliness of the bomb.

    Live Help Available Online

    Car bombs also figure in the discussion of members of Jihadist forums. In April, ICPVTR observed a lengthy discussion in which several participants of a password-protected Arabic-language forum met online to pool their knowledge on car bombs and discuss the relative merits of various explosives and detonators. According to one member, their goal was to compile a set of car bombing instructions “from A to Z, from the steering wheel to the gas tank”.

    During the car bomb discussion, several members of the forum readily offered their insights and experiences. They swapped knowledge on detonators and mechanisms of detonation. They discussed making explosives using homemade substances, including mixtures of acetylene or butane gases and oxygen, as well as ammonium nitrate mixtures like ANFO and ammonal. One participant recommended stocking a car with large gas canisters, just like those used in both the London and Glasgow car bombs.

    The discussion demonstrated one of the most important features of the online Jihadist presence: its interactive component, facilitated by the use of web mediums – primarily forums – which allow any member to post materials and participate in discussions. Not only can amateurs download instructions, they can access other members of virtual Jihadist community to obtain additional knowledge and advice.

    The Process of Entrepreneurial Terrorism

    Online manuals and tactical discussion forums do not exist for the benefit of established terrorist organizations like al Qaeda. Rather, they are designed to incite and inform entrepreneurial terrorists interested in taking up the cause of Jihad on their own initiative.

    For many of these aspiring terrorists, the online Jihadist presence provides the sole portal into the world of radical ideology. Traditional contact points have become less accessible due to post 9-11 security efforts, which have put travel to terrorist training camps and access to terrorist organizations out of the reach of many. In such an environment, the Internet has emerged as the primary mechanism of the Jihad movement’s expansion.

    The Jihadist virtual community helps cement ideological commitment among terrorist sympathizers who come to the Internet in search of radical ideas. Its members are fed interpretations of religion and politics designed to create myths of victimization and oppression, which are then used to justify violence. When the process of indoctrination is complete, individuals are encouraged to recruit, train, and equip a small terrorist cell, relying in part on Jihadist forums for instructions and assistance.

    It is a process in development. To date, there have been few instances of entrepreneurial terrorism, in spite of the volume of materials on Jihadist forums and the many fervent calls for violence among their membership. This could be due to a number of factors, including inconsistency in the accuracy and sophistication of available manuals. However, they are slowly improving, and incitement to attack remains constant.

    The post-attack investigation of the UK car bombs has not yet revealed whether the terrorists made use of this shadowy virtual resource in planning their botched attacks. However, these incidents show us what an Internet-enabled entrepreneurial terrorist attack would probably look like: amateurish and simple, but nevertheless disruptive and potentially dangerous.

    About the Author

    Rebecca Givner-Forbes is a Research Analyst with the International Centre for Political Violence & Terrorism Research (ICPVTR) at the S. Rajaratnam School of International Studies, NTU. 

    Categories: RSIS Commentary Series / Terrorism Studies

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info