Sunday, May 5, 2019

Terrorism Assignment Example | Topics and Well Written Essays - 1000 words - 3

Terrorism - Assignment ExampleThe arson attack was made with the support of a gallon of gasoline, but there was no major damage done to the Church. In the alike month, Ellison with some other(a) CSA member firebombed the Beth Shalom synagogue, which also did no major damage (Hamm, 2007, p. 102). On 2nd November, another failed attack was there by CSA members on the natural gas pipeline that crossed the Red River betwixt Mena and Texarkana, Arkansas (Hamm, 2007, p. 102). The CSA members used twenty-three sticks of dynamite to rupture it and expected a riot leading to their divine war, but the dynamites only dented the pipeline. Later on, facing the shortage of money, Ellison guided small groups of his followers to do shoplifting, stealing vehicles and doing other kind of robberies for funds generation. Snell and Thomas, two active members of CSA robbed a pawnshop in Texarkana and during their robbery, Snell kill a proprietor considering him a Jew, while he was not (Hamm, 2007). The CSA was recognized as a Christian ultra group using military training and weaponry to spread terror. The group kept an extremist religious ideology that claimed their superiority over other races. The whole group had racist ideologies due to which, their targeted other religious and social groups. Richard Snell, an active and racist CSA member brutally killed Louis Bryant, a Black and an Arkansas declare Trooper on June 30, 1984. After the incident, Snell escaped from the crime scene and upon finding himself circulated by police officers subsequent on, he opened fire on them, after which, he was shot and taken into custody. The investigative police squad of Oklahoma Bureau of Investigation found weapons, hatred literature from his vehicle and some other upcoming targeted peoples documents (Wong, 2011).The government paid utmost attention to the extremists group and the FBI and other law enforcement agencies reason CSA as a serious domestic threat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.