SS474: TERRORISM - PowerPoint PPT Presentation

1 / 42
About This Presentation



SS474: TERRORISM & COUNTERTERRORISM Lesson 3: Understanding Contemporary Terrorism Admin: 1) Assignment #1 due 8 Sept (next week) 2) Wednesday, 30 August: Guest Lecture – PowerPoint PPT presentation

Number of Views:261
Avg rating:3.0/5.0
Slides: 43
Provided by: Class56


Transcript and Presenter's Notes


Understanding Contemporary Terrorism
  • Admin
  • 1) Assignment 1 due 8 Sept (next week)
  • 2) Wednesday, 30 August Guest Lecture BG(r)
    Russell Howard (E hour, Thayer 348)

History Review
  • What patterns and trends of historical terrorism
    inform our understanding of future threats?
  • C2
  • Strategic goals, objectives
  • Weapons, tactics
  • Targeting
  • Fundraising/Friendraising
  • Similar outcomes re group existence, changes in
    political environment
  • What else?
  • Future projections?
  • Who will likely turn to terrorism, and why?

History Review
  • Why do people resort to violence in pursuit of
    political or ideological ends?
  • Political contexts
  • Social contexts
  • Other options to achieve goals?
  • Implications for government policy?

History Review
  • What motivates terrorists?
  • Vision - shape the future
  • Power to achieve vision
  • Belief in higher cause
  • What else?
  • What role do economics, psychology, sociology or
    other grievances play in motivating terrorist

History Review
  • What can we learn from historical examples of
    state response to terrorist organizations?
  • What works?
  • What doesnt?
  • Why?

Discussion Questions
  • What is your understanding of the new model of
  • Compare and contrast the old and new terrorism
    for indicators relating to capabilities and
    future trends. Why did this shift occur?
  • What are the implications of the shift from old
    to new models of terrorism?
  • What is Al Qaeda? How and why did Al Qaeda evolve
    as it did?
  • How did Al Qaeda ascend to power? What are Al
    Qaeda's significant achievements?
  • How should we think of Al Qaeda today?
  • How do transnational terrorist organizations
  • What are the implications of this evolution for
  • Terrorist Network Analysis

Contemporary Terrorism
  • Website competitions

Elements of the New Terrorism
  • BG Howards model (updated) - 8 Ways Terrorism
    Has Changed
  • America is at risk
  • Terrorists are more violent different political
  • Terrorists have global reach and are
    transnational non-state actors implications for
    homeland security
  • Terrorists are better financed zakat, charity
    orgs., wealthy donors
  • Terrorists are better trained in tradecraft, AW,
  • Terrorist cells are more difficult to penetrate
    (esp. AQ)
  • Terrorists have access to more lethal weapons
    (Soviets, bio/nukes)
  • Success and/or failure are difficult to measure
    no clear outcome

Elements of the New Terrorism
  • Global in scope and strategic objectives
  • Generational in scope epic struggle, David vs.
    Goliath - Bin Laden as Robin Hood
  • The number of the brothers is large . . . I do
    not know everyone who is with us in this base or
    this organization. Bin Laden as Pied Piper.,
    with a constant call to jihad as the duty of
    every good Muslim
  • Educated members as martyrs in AQ longer
    planning cycles (9/11 hijackers arriving in U.S.
    as early as 1994)
  • Evolution into a political social movement, a
    global insurgency against Western-oriented
  • Afghanistan and Iraq offering new locations for
    Jihad, indoctrination, tactical training, network

Elements of the New Terrorism
  • Increasing number and lethality of attacks
  • Attacks are carried out not by AQ or some other
    centralized group, but by affiliates and
  • Use of children and female suicide bombers by
    terrorist organizations
  • Info Ops role of technology
  • From DVDs and web videos to Al Jazeera
  • Availability of info on government security, CT
  • EW another role of technology
  • Taking instruments from our daily lifethe
    backpack, the car, the shoe, the cell phoneand
    turning them into weapons. Goal damage the
    trust necessary for a successful open society
  • Shifting from small groups to motivated and
    resourceful individuals (Madrid, London)

A Protean Enemy
  • Al Qaeda is an increasingly decentralized
    organization, constantly evolving, and employs a
    "virtual network" concept learned from American
    right-wing extremists, which makes it harder to
    detect and destroy.
  • Willingness to adapt its mission enables it to
    forge broad alliances with other terrorist
    organizations and attract new recruits (including
  • Ability to secure coordination with other
    like-minded groups (like Hezbollah) and its links
    with organized crime (a crime boss in India gave
    100,000 to Mohammad Atta, the 9/11 hijack
    leader) underscore the advanced stages of
    organization (professionals sharing ideas,
    cross-training, resources, joint planning, etc.)
    that al Qaeda has achieved.

Stern, 2003
Netwar A Modern Form of Asymmetric Warfare
  • Netwar Information-related conflict at a grand
    level between nations or societies.
  • It means trying to disrupt or damage what a
    target population knows or thinks it knows about
    itself and the world around it.
  • A netwar may focus on public or elite opinion, or
  • It may involve diplomacy, propaganda and
    psychological campaigns, political and cultural
    subversion, deception of or interference with
    local media, infiltration of computer networks
    and databases, and efforts to promote dissident
    or opposition movements across computer
    networks. (John Arquilla and David Ronfeldt,
    1993 2001)

Networked Terrorism
  • Social interactions
  • Affiliation networksTies developed at events or
    activities, like sporting events, clubs, or
    religious meetings
  • Communities of identity
  • Communities of locality
  • District or geographic region in which people
    live, interact, or under which they are governed
  • Examples neighborhood, village, city, town or
  • Communities of interest
  • Communities formed around a common interest or
    shared experience
  • Examples prisoners or inmates, members of the
    military, scientists, sports enthusiasts, and
    hobbyists comprise communities of interest.

Networked Terrorism
  • Three important concepts in social network
    analysis (SNA) diversity, redundancy, and
  • Diversity of identity individuals often have
    multiple identities a familial identity, an
    employment identity, a religious identity, an
    academic identity, etc.
  • Redundancy individuals sharing multiple
    identities across networks (e.g., two individuals
    attending the same church, graduating from the
    same university, and working in the same office
  • Multiple shared identities (location, religion,
    education, and employment) means that some links
    between sets of individuals may be
    disproportionately strong.
  • Adaptability relationships change over time - a
    social network may evolve as a persons interests
    change, he moves to another community, or his
    position within that community shifts.

Terrorist Network Structures
Source Networks and Netwars The Future of
Terror, Crime, and Militancy, John Arquilla and
David Ronfeldt (eds.), November 2001
Terrorist Network Structures
Source On Distributed Communications
Introduction to Distributed Communications
Networks, Paul Baran, August 1964
Global Terrorism Networks
Interconnected terrorist groups, criminal
organizations, individuals, etc. around the
Global Terrorism Networks
Interconnected terrorist groups, criminal
organizations, individuals, etc. around the
Shared strategies Sharing tactics,
training Cross-fertilization, inter-organizationa
l learning Shared profits from trafficking in
drugs, arms, other contraband Increasingly
connected via technologies/Internet
Strategy and Training
  • Establish training camps developing the will to
    kill and the skill to kill
  • Operational space Geographic isolation
  • Teachers Experts in relevant knowledge, e.g.,
    military combat experience
  • Committed learners
  • Time, money, and basic necessities
  • Afghanistan
  • Algeria
  • Bosnia
  • Chechnya
  • Colombia
  • Egypt
  • Indonesia
  • Japan
  • Kashmir
  • Lebanon
  • Libya
  • Northern Ireland
  • Peru
  • The Philippines
  • Somalia
  • Spain
  • Sri Lanka
  • Sudan
  • Syria
  • Turkey
  • United States
  • Uzbekistan

Think back to your basic training or basic
officer courses...
Global Salafi Network
Interconnected by common ideology (Militant Islam
revivalist movement), with strong bonds formed
through fighting together, family, etc.
(No Transcript)
(No Transcript)
(No Transcript)
Terrorist Networks
  • Even though its a decentralized network, there
    are still critical functions that enable the
    network to operate
  • Critical functionary roles can become a hub of
    multiple networks
  • weapons procurement
  • financier (funder or banker) (particularly in
    Halawa system)
  • document forgerer
  • human traffickers
  • Support individuals (trusted contacts) can and
    sometimes do support multiple networks can
    provide supplies/facilitate trafficking of
    weapons funds to multiple networks
  • Example 60 of day spent moving legitimate
    charity money around 20 of day on Hamas
    transactions, other activity on side
  • Some may get profit for doing these
    support/function roles

Different members of the network play support and
action roles
Networked Terrorism
  • Implications
  • We tend to target operational (attack/combat)
    cells and overlook support cells that disseminate
    propaganda, recruit members, procure supplies,
    maintain transport, forge false and adapted
    identities, facilitate travel, and organize safe
  • For example, operating through front, cover, and
    sympathetic organizations, Al Qaeda and its
    associate groups established charities, human
    rights groups, humanitarian organizations,
    community centers, and religious associations to
    raise funds and recruit youth. (Gunaratna)

Networks to Map
Relationship/Network Data Sources
1. Trust Prior contacts in family, neighborhood, school, military, club or organization. Public and court records. Data may only be available in suspect's native country.
2. Task Logs and records of phone calls, electronic mail, chat rooms, instant messages, Web site visits. Travel records. Human intelligence observation of meetings and attendance at common events.
3. Money Resources Bank account and money transfer records. Pattern and location of credit card use. Prior court records. Human intelligence observation of visits to alternate banking resources such as Hawala.
4. Strategy Goals Web sites. Videos and encrypted disks delivered by courier. Travel records. Human intelligence observation of meetings and attendance at common events.
Table 3 Networks to Map

Krebs, 2002 - http//
Knowledge Transfer and Terrorist Networks
  • Learning Organizations committed to capturing
    knowledge, analyzing it, forming new doctrine and
    tactics which are informed by lessons from the
  • Learn from each other
  • Learn from trial and error (IRA example)
  • Media showcasing best practices to others
  • Managing public image (PR) (becoming more
  • Emerging professional networks in the terrorist

Knowledge Transfer and Terrorist Networks
  • The network challenge
  • As far back as 1968 the PLO . . . had welcomed
    terrorists from around the world to their
    guerilla camps in Jordan for training,
    indoctrination, and the general building of
    transnational revolutionary bridges. In this
    respect, the Palestinians pioneered the
    networking dimension of international terrorism
    still in evidence among many groups today.
  • Bruce Hoffman, 1997, p. 82

Knowledge Transfer and Terrorist Networks
  • The network challenge
  • Strategic partnerships between Al Qaeda and
    groups like Hezbollah, Jemaah Islamiya, HT, IMU,
    and MILF, as well as drug cartels in Latin
    America and other criminal organizations
  • For example, Hezbollah . . . trained Al Qaeda
    fighters in Sudan, Lebanon, Iran . . .
    (Gunaratna, 2002, p. 196)(why would Shiite
    Muslims work so closely with Sunni Muslims?)

Challenges of Terror Networks
  • Overall CT challenge How to fight a network of
  • Specific challenges include
  • Identifying network members, especially when
    membership is hidden until demonstrated by overt
  • Determining network structure, leadership/decision
    -making cells
  • Intelligence gathering/Infiltrating the network
  • Defending against an attack from unknown network

(No Transcript)
1. Joining the Jihad
  • 1.1 Decide on Jihad
  • 1.2 Joining the Jihad in Spirit
  • 1.3 Praying Honestly for Martyrdom

2. Financially Aiding the Jihad
  • 2.1 Jihad Through Money
  • 2.2 Tending to the Fighters Family
  • 2.3 Tending to Families of Martyrs
  • 2.4 Supporting the Families of Wounded and
    Imprisoned Fighters
  • 2.5 Collecting Donations
  • 2.6 Paying the Alms Tax for the Mujahidin

3. Other Support for Jihad
  • 3.1 Outfitting a Fighter
  • 3.2 Healing the Wounded
  • 3.3 Sheltering the Mujhadin and Providing them
    with Hospitality
  • 3.4 Freeing and/or Ransoming Prisoners

4. Public Education
  • 4.1 Praising the Mujahidin and Commemorating
    their Exploits
  • 4.2 Defending the Mujahidin
  • 4.3 Exposing the Hypocrites and Defeatists
  • 4.4 Urging People Toward Jihad
  • 4.5 Distributing books and Brochures
  • 4.6 Advising Muslims and the Mujahidin
  • 4.7 Distributing News of the Jihad
  • 4.8 Keeping Scholars Informed
  • 4.9 Spreading News of Prisoners

5. Aiding the Mujahideen Directly
  • 5.1 Encouraging the Mujahidin
  • 5.2 Guiding the Mujahidin
  • 5.3 Concealing the Mujahidins Secrets

6. Jihad Through Prayer
  • 6.1 Praying for the Mujahidin
  • 6.2 Qunut Prayers in time of calamity

7. Preparing for Active Jihad
  • 7.1 Physical Training
  • 7.2 Weapons Training and Marksmanship
  • 7.3 Swimming and Horsemanship
  • 7.4 First Aid

8. Intellectual Preparation
  • 8.1 Learning the Jurisprudence of Jihad
  • 8.2 Hostility and Hatred of the Infidels
  • 8.3 Electronic Jihad

9. Living as a Good Muslim
  • 9.1 Discouraging Friendship w/ Polytheists
  • 9.2 Abandoning Luxury
  • 9.3 Boycotting Goods
  • 9.4 Avoid Employing Hostile Labor
  • 9.5 Raising Children to Love Jihad

Write a Comment
User Comments (0)