Resumen :
En la última década, el uso de drones ha experimentado un rápido crecimiento en varios ámbitos gracias a sus múltiples propósitos, desde aplicaciones civiles hasta militares. La casi omnipresencia de estos se debe a su capacidad para responder a las necesidades de las personas, brindando a los usua... Ver más
In the last decade, the use of drones has experienced rapid growth in various areas thanks to their multiple purposes, from civil to military applications. Their near-ubiquity is due to their ability to respond to people's needs, providing users with an aerial view that can be activated and used almost anywhere and at any time. However, there is also the use of drones for criminal and even terrorist purposes.
This work focuses on the analysis of the role of drones in contemporary terrorist strategies. The main objective is to examine the impact of drones on terrorist attacks, in order to understand the role they have actually played in this area and to better explain the emerging threat. We explore how these UAVs have altered the dynamics of terrorism, providing non-state actors with new operational and tactical capabilities, adopting armed UAVs into their repertoires.
Firstly, a review of current theories on the use of drones in armed conflicts, the origin of drones and their evolution is carried out. We analyze the current situation of commercial drones and their transformation into weapons of war, as well as their accessibility and use cases by terrorist groups and state actors in conflict.
Next, an analysis is carried out of the different uses that terrorist groups give to this technology and cases of attacks. In addition, an analysis of the time series of terrorist attacks with drones is carried out. We examine the available data and look for possible patterns and trends over time with the aim of establishing a relationship between armed conflicts and the use of terrorist drones. In addition, the security repercussions of terrorist drone attacks are analyzed. Risks, vulnerability of critical infrastructure, and possible prevention and response strategies are examined.
Finally, large-scale use cases by state actors are shown, demonstrating that they are the ones that make the greatest use of this technology and a small recapitulation of the findings found. Thus, this work contributes to the understanding of an emerging phenomenon that poses significant challenges for global security, providing information and findings that help improve the understanding of this threat, since the probability of these attacks is high and their impact can have devastating effects.
|