Wednesday, November 20, 2019

Terrorism Assignment Example | Topics and Well Written Essays - 1000 words - 3

Terrorism - Assignment Example The arson attack was made with the help of a gallon of gasoline, but there was no major damage done to the Church. In the same month, Ellison with another CSA member firebombed ‘the Beth Shalom synagogue’, which also did no major damage (Hamm, 2007, p. 102). On 2nd November, another failed attack was there by CSA members on the natural gas pipeline that ‘crossed the Red River between Mena and Texarkana, Arkansas’ (Hamm, 2007, p. 102). The CSA members used twenty-three sticks of dynamite to rupture it and expected a riot leading to their holy war, but the dynamites only dented the pipeline. Later on, facing the shortage of money, Ellison guided small groups of his followers to do shoplifting, stealing vehicles and doing other kind of robberies for funds generation. Snell and Thomas, two active members of CSA robbed a pawnshop in Texarkana and during their robbery, Snell murdered a proprietor considering him a Jew, while he was not (Hamm, 2007). The CSA was recognized as a Christian extremist group using military training and weaponry to spread terror. The group kept an extremist religious ideology that claimed their superiority over other races. The whole group had racist ideologies due to which, their targeted other religious and social groups. Richard Snell, an active and racist CSA member brutally killed Louis Bryant, a Black and an Arkansas State Trooper on June 30, 1984. After the incident, Snell escaped from the crime scene and upon finding himself circulated by police officers later on, he opened fire on them, after which, he was shot and taken into custody. The investigative team of Oklahoma Bureau of Investigation found weapons, hatred literature from his vehicle and some other future targeted people’s documents (Wong, 2011). The government paid utmost attention to the extremists group and the FBI and other law enforcement agencies categorized CSA as a serious domestic threat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.