Combating Transnational Terrorism
Combating Transnational Terrorism
Combating Transnational Terrorism
Terrorism
Edited by
James K. Wither and Sam Mullins
COMBATING TRANSNATIONAL
TERRORISM
Edited by
James K. Wither and Sam Mullins
2016
James K. Wither and Sam Mullins, eds., Combating Transna-
tional Terrorism (Sofia: Procon, 2016).
doi: 10.11610/ctt.book
The opinions expressed in this book are those of the authors and do not
necessarily reflect the official policy or position of the George C. Marshall
European Center for Security Studies, the United States of America, the Federal
Republic of Germany, or any other government or institution.
v
FOREWORD
Terrorism is a global security challenge and an existential threat to a grow-
ing number of states. As such, it is a high priority in national security strate-
gies around the world. It is hardly surprising that the subject has already at-
tracted an immense and growing body of literature. Combating Transna-
tional Terrorism adds to this body of work. Uniquely, this book is based
upon and primarily designed for the George C. Marshall European Center
for Security Studies’ (GCMC) long running and highly successful Program on
Terrorism and Security Studies (PTSS). Unlike the majority of books on the
subject, it is principally intended for security service professionals and prac-
titioners of counter-terrorism (CT), although we are also confident that stu-
dents of terrorism studies and interested general readers will find much of
value within its pages. All of the authors have taught on the PTSS, in some
cases many times, and bring both scholarly and practical insights to their
chapters. Each of them understands the needs of the CT community given
their years of experience and interaction with professional security force
personnel and government officials from all over the world.
As the title suggests, Combating Transnational Terrorism seeks to high-
light the global nature of the threat and emphasize the need for cooperative,
international responses. Fittingly, there are typically 40 to 50 different
countries represented on any given iteration of the PTSS. The book is
therefore aimed at a truly global audience, including readers for whom
English is often a second or third language. As a result, the writing style
seeks to present complex topics in a way that is accessible for non-native
English speakers. In line with the PTSS, the focus of the book is strategic, ra-
ther than operational or tactical. It is intended to assist CT professionals to
think broadly and strategically about the phenomenon of terrorism and our
responses to it. It recognizes that CT practitioners have to deal on a daily
basis with a highly complex problem that embraces political, economic, in-
formational, judicial, intelligence, military, law enforcement and many other
factors, both domestic and international. However, each chapter also uti-
lizes real world case studies and relevant examples to emphasize the practi-
cal and policy issues involved. Like the course on which it is based, Com-
bating Transnational Terrorism promotes both a comprehensive under-
standing of the nature of the threat and the full range of measures required
to deal with it.
Part 1 of the book is devoted to an understanding of the terrorist threat.
In the first chapter, renowned terrorism expert Alex Schmid addresses the
vexed issue of definitions. Defining terrorism is a logical start to our analy-
sis and the chapter clearly illustrates why security institutions and the in-
ternational community have such difficulties arriving at a consensus on the
vii
viii James K. Wither and Sam Mullins
xi
xii James K. Wither and Sam Mullins
years, he led the investigation into all acts of terrorism in the UK and against
British interests overseas, including the London bombings of 2005, the trans-
atlantic airliners liquid bomb plot in 2006, and attacks against British interests
in Bali, Saudi Arabia, Turkey and Qatar. Since he retired from the police service
in 2008, he has worked as a highly sought-after independent security consult-
ant. Mr. Clarke has an Honorary Doctorate in Law from Bristol University; he
has been a Fellow of the Center on Law and Security at New York University
and is a Patron of the International Centre for the Study of Radicalisation at
King’s College, London.
Adam Dolnik serves as a consultant on Addressing and Preventing Kidnapping
for Ransom at the United Nations Counter-Terrorism Implementation Task
Force. He is also a Counterterrorism Negotiations Advisor to the FBI’s Crisis
Negotiation Unit. Dr. Dolnik’s previous appointments include Professor of Ter-
rorism Studies at the University of Wollongong, Australia, Professor of Coun-
terterrorism at the GCMC in Garmisch, Germany and Chief Trainer at the Inter-
national Centre for Political Violence and Terrorism Research in Singapore. Dr.
Dolnik is the author of six books and over 50 reports and articles on terrorism
related issues.
Dean Dwigans is a retired U.S. Navy Captain (Judge Advocate) and former
Professor of International Law at the GCMC. Mr. Dwigans has had multiple as-
signments in Europe and Asia as a career navy prosecutor and legal advisor,
and commanded the navy’s largest overseas prosecution office in the Pacific.
His assignments have included senior navy attorney at the National Security
Agency, Office of General Counsel, and at the Naval Criminal Investigative Ser-
vice where he was responsible for advising over 1,500 Special Agents world-
wide. Mr. Dwigans has a Juris Doctor from Creighton University and a LLM in
international law from Georgetown University.
James Howcroft is currently the Director of the PTSS at the GCMC. Mr.
Howcroft retired from active duty as a Colonel after 30 years of service as an
Intelligence Officer in the United States Marine Corps. He has taught intelli-
gence collection and analysis to thousands of US, European and African part-
ners engaged in counter-terrorist, counterinsurgency and peace support opera-
tions around the world. Mr. Howcroft has written numerous articles on intelli-
gence and operational cultural issues and is a frequent contributor to Small
Wars Journal.
Joseph B. King is the Director of Plans and Strategy at the GCMC. He is a Colo-
nel in the US Army, serving as a Eurasian foreign area officer with a back-
ground in infantry and special operations. Colonel King served as the director
of the PTSS in 2014 and continues to provide occasional lectures on terrorism
and irregular warfare in various resident and outreach programs.
Steven R. Monaco is a GCMC professor and the director of the Program on
Countering Transnational Organized Crime. Mr. Monaco joined the GCMC in
December 2013 after serving as a career Special Agent with the U.S. Drug En-
About the Authors xiii
4. Terrorist Innovation....................................................................................................49
Adam Dolnik
xv
xvi James K. Wither and Sam Mullins
xvii
xviii Combating Transnational Terrorism
Case Study 15.1. The Anders Breivik Terrorist Attacks in Oslo and Utøya,
July 2011 .............................................................................................................................. 237
Case Study 15.2. Najibullah Zazi’s New York Subway Plot ...................................... 242
Case Study 16.1. Examples of CT Strategy Ends and Ways ...................................... 256
Case Study 16.2. “Bayanihan”: The Armed Forces of the Philippines
Internal Peace and Security Plan (AFP-IPSP) ....................................................... 261
Chapter 1
Defining Terrorism
Alex P. Schmid
Introduction
If you Google “definition of terrorism,” in less than half a second you get 48
million hits. The search for a definition of terrorism has been equated to the
search for the Holy Grail.1 It has also been called the “Bermuda triangle of ter-
rorism research.”2 Indeed, “terrorism” is a controversial and essentially con-
tested concept, politically loaded and emotionally charged, since it involves
moral judgment and matters of life and death. It is contested in politics as well
as in the academic community. The following brief list of contested elements 3
is illustrative of this challenge:
1. Some observers stretch the concept of terrorism to include attacks on
the military, while at the same time excluding certain activities by the
military.
2. Some people include attacks on the military outside zones of combat
and outside wartime as terrorism, while others do not.
3. Some are prepared to label the destruction of property as terrorism.
4. Some are also prepared to label certain harmful acts like computer
hacking as terrorism, even when there is neither direct violence, nor
fear involved (as has been the case so far with so-called ‘cyber-terror-
ism’).
5. Some authorities tend to label all forms of violence by militant groups
as terrorism, once a group has been designated a terrorist organization.
6. Some people exclude from their understanding of terrorism acts car-
ried out by, or on behalf of, states or governments.
7. Some exclude certain intimidating violent activities committed by orga-
nized crime groups from being labeled terrorism.
8. Many people exclude ‘freedom fighters’ (either those who are strug-
gling for national liberation or who are trying to rid a territory of for-
eign occupation). Often, this is without regard for how popular, or un-
1 Geoffrey Levitt, “Is Terrorism Worth Defining?” Ohio Northern University Law Review
13 (1986): 97.
2 Brian M. Jenkins, The Study of Terrorism: Definitional Problems (Santa Monica, CA:
RAND, 1980), 10.
3 Alex P. Schmid, ed., The Routledge Handbook of Terrorism Research (London:
Routledge, 2011), 84-85.
1 DOI: 10.11610/ctt.ch01
2 Alex P. Schmid
popular, their actions may be, and is despite the fact that there is no
definition of “nation” or “people” in international law.
9. Some include assassinations in the concept of terrorism, while others
do not.
10. Some argue that terrorism has nothing to do with religion, while others
see a link between terrorism and faiths which claim to be in possession
of absolute truth (as Karl Marx once stated, terrorists are “dangerous
dreamers of the absolute”).
In the face of such complexity, some have called for a ‘common sense’ ap-
proach. As Jeremy Greenstock, British Ambassador to the United Nations, ar-
gued in 2001 “Let us be wise and focused about this: terrorism is terrorism ...
What looks, smells, and kills like terrorism is terrorism.” 4 This may seem an al-
luring argument, however, as President Emile Lahoud of Lebanon proclaimed
in 2004 “It is not enough to declare war on what one deems terrorism without
giving a precise and exact definition.”5 Similarly, Ben Saul pointed out that “In
the absence of a definition of terrorism, the struggle over the representation of
a violent act is a struggle over its legitimacy.”6 Finally—and contrary to what
many believe—Boaz has argued that “an objective definition of terrorism is not
only possible; it is also indispensable to any serious attempt to combat
terrorism.”7
4 John Collins, “Terrorism,” in Collateral Language: A User’s Guide to America’s New War,
ed. John Collins and Ross Glover (New York: New York University Press, 2002), 167-
68.
5 “Beirut Wants ‘Terrorism’ Defined,” AlJazeera, January 13, 2004, accessed September
6, 2015, http://www.aljazeera.com/archive/2004/01/200841010738460226.html.
6 Ben Saul, Defining Terrorism in International Law (Oxford: Oxford University Press,
2006).
7 Boaz Ganor, “Terrorism: No Prohibition Without Definition,” October 7, 2001, as
quoted by Jeffrey S. Helmreich, “Beyond Political Terrorism: The New Challenge of
Transcendent Terror,” Heshvan, November 15, 2001, accessed September 6, 2015,
http://www.jcpa.org/jl/vp466.htm.
8 Cited in Alex P. Schmid, ed., The Routledge Handbook of Terrorism Research, 107. The
UK definition has been revised in 2007 and can be found in Part I, section 1,
Terrorism Act 2000, as amended:
“1 Terrorism: interpretation
(1) In this Act “terrorism” means the use or threat of action where—
(a) the action falls within subsection (2),
(b) the use or threat is designed to influence the government or an international
governmental organisation or to intimidate the public or a section of the public, and
Defining Terrorism 3
(c) the use or threat is made for the purpose of advancing a political, religious or
ideological cause.”
See Terrorism Act 2000, accessed September 5, 2015, www.legislation.gov.uk/
ukpga/2000/11/section/1.
9 For a discussion, see Alex P. Schmid, ed., The Routledge Handbook of Terrorism Re-
search, 5-7.
4 Alex P. Schmid
While this might be true from a legal perspective, many states have never-
theless adopted specialized legislation. Certainly, in trying to study and analyze
terrorism we cannot do without a definition. And yet we have collectively failed
to produce a universally accepted definition, either in the field of international
law or in the field of social sciences. There are many national definitions11 and
some regional ones in criminal law, but none that has the legitimacy that comes
from endorsement by the General Assembly of the United Nations.
There are at least two debates: one about a social science definition and one
about a legal definition. There is also a political debate and a media debate, and
these overlap with each other to some extent.
hence anxiety to manipulate actual and prospective victims and those who
have reason to identify with them. Depending on the setting, prospective vic-
tims can be shocked by numbing fear (as in a hostage situation when the dead-
line for an ultimatum approaches) or they can panic and flee, having witnessed
one atrocity and being anxious to avoid becoming a victim of the next.19
the definitional debate, with the exception of the issue of hijacking, only began
in earnest in 1972 after 28 people (mostly Puerto Rican nuns) were killed by
Japanese terrorists at Lod airport in May, which was followed by the attack on
the Munich Olympic Games in September. In response, the General Assembly
established an Ad Hoc Committee on International Terrorism.24 This was done
alongside a failed initiative of the United States, which had presented a draft
“Convention for the Prevention and Punishment of Certain Acts of International
Terrorism” to the General Assembly in September 1972.25
Tasked with coming up with a legal definition of international terrorism, the
Ad Hoc Committee, which included legal experts from 35 member states, de-
bated the issue for seven years, with contested issues of self-determination and
national liberation struggles heavily influencing discussions. When the Com-
mittee failed to reach a consensus in 1979, it did not ask for a renewal of its
mandate. It was only re-established by the General Assembly in 1996 and re-
sumed the definitional debate in 1999. This second round of definitional de-
bates has now been going on for fifteen years, without a final result. 26 The defi-
nition contained in article 2 of the draft Comprehensive Convention against In-
ternational Terrorism goes as follows:
Any person commits an offense within the meaning of this [the present] Con-
vention if that person, by any means, unlawfully and intentionally, causes:
(a) Death or serious injury to any person; or
(b) Serious damage to public or private property, including a place of public
use, a State or government facility, a public transportation system, an
infrastructure facility or to the environment; or
(c) Damage to property, places, facilities or systems referred to in para-
graph 1 (b) of this [the present] article, resulting or likely to result in
major economic loss; when the purpose of the conduct, by its nature or
context, is to intimidate a population, or to compel a Government or an in-
ternational organization to do or abstain from doing any act. 27
assassination-to-save-jerusalem-for-jews-but-will-his-obits-tell-you-that, accessed
September 13, 2014.
24 Eva Herschinger, “A Battlefield of Meanings: The Struggle for Identity in the UN
Debates on a Definition of International Terrorism,” Terrorism and Political Violence
25, no. 2 (2013): 183-4. On December 8, 1972, the first Ad Hoc Committee on
Terrorism was established (A/Res.3034 (XXVII) by the UN General Assembly); a
second Ad Hoc Committee on the issue was established on 17 December 1996 (GA
Res. 51/210). See Ghislaine Doucet, “Terrorism: Search for a Definition or Liberticidal
Drifting,” in Terrorism, Victims, and International Criminal Responsibility, ed. Ghislaine
Doucet (Paris, SOS Attentats, 2003), p. 280n.
25 Saul, “Attempts to Define ‘Terrorism’ in International Law,” 12.
26 Herschinger, “A Battlefield of Meanings,” 189.
27 Annex II. Informal text of articles 2 and 2bis of the draft Comprehensive Convention,
prepared by the Coordinator. Article 2, reproduced from document A/C./6/56/L.9,
annex 1.B. This text represents the stage of consideration reached by the Working
Group of the Sixth Committee. Cited in United Nations, Report of the Ad Hoc
8 Alex P. Schmid
To the author’s knowledge, this broad and vague definition has not been
significantly changed or improved in the last twelve years as the Ad Hoc Com-
mittee has mainly debated the Convention’s Preamble and article 18 in recent
years. Eva Herschinger has explained the inability of the United Nations to
reach a legal definition in four different ways:
1. States “have been reluctant to identify certain behavior as terrorist,
largely as a result of national self-interest.”
2. Because the concept of what counts as a terrorist offence is highly de-
pendent on national interests, a universally accepted definition is thus
considered to delimit sovereign power, since it entails giving up the
right to define terrorism according to one’s own rationale.
3. The institutional context of the UN and its treatment of politically moti-
vated violence are not conducive to fostering an agreement.
4. Each nation has its own national legislative traditions and states are
generally unwilling to accept guidance from international law.28
To put it succinctly, we will not have an international definition of terrorism
as long as the “political value of the term… prevails over its legal one.”29
terrorism is a tactic and one does not exclude the other. While this distinction
is logical, many have nevertheless followed the illogic of Yasser Arafat who, in
1974, declared at the United Nations:
The difference between the revolutionary and the terrorist lies in the reason
for which each fights. For whoever stands by a just cause and fights for the
freedom and liberation of his land from the invaders, the settlers and the colo-
nialists cannot possibly be called terrorist, otherwise the American people in
their struggle for liberation from the British colonialists would have been ter-
rorists, the European resistance against the Nazis would be terrorism, the
struggles of the Asian, African and Latin American peoples would also be ter-
rorism, and many of you who are in this Assembly hall were considered ter-
rorists. This is actually a just and proper struggle consecrated by the United
Nations Charter and by the Universal Declaration of Human Rights. As to those
who fight against the just causes, those who wage war to occupy, colonize and
oppress other people, those are the terrorists. Those are the people whose ac-
tions should be condemned, who should be called war criminals: for the justice
of the cause determines the right to struggle.32
At face value, such emotive speeches can sound compelling. However, to de-
liberately confuse goals (ends) and tactics (ways) is an attempt to excuse acts of
terrorism based on the perceived justness or nobility of the cause. A group may
have suffered the worst of injustices and may be fighting for the most worthy of
causes and, yet, if they employ the tactics of terrorism, they are still terrorists.
Of course, in reality labeling problems are rife. For instance, on 28 June 1914
Gavrilo Princip assassinated Archduke Franz Ferdinand and his wife in Sara-
jevo. One hundred years later people in Sarajevo—Bosniak Muslims, Orthodox
Serbs and Catholic Croats—still cannot agree on whether what Princip did was
‘terrorism’ or ‘heroism.’33
Moreover, labels matter (see Case Study 1.1). Recently Petro Poroshenko,
President of Ukraine, asked the West to do him a favor by calling the Russian-
supported separatists ‘terrorists.’34 In another practical example, the US anti-
terrorism watch-list has grown exponentially and, according to former FBI spe-
cial agent David Gomez, is “revving out of control.” Indeed, as Gomez remarked,
“If everything is terrorism, then nothing is terrorism.” 35
32 Yasser Arafat, Chairman, Exec. Comm. Palestinian Liberation Assembly Org. Speech
before the General Assembly of the United Nations. U.N. GAOR, 29th Sess., 2282nd plen.
Mtg. at 861, 48, U.N. Doc. A/PV. 2282 and Corr. 1 (November 13, 1974).
33 Dan Damon, “Bosnia and WW1: The Living Legacy of Gavrilo Princip,” BBC, June 25,
2014, accessed September 6, 2015, www.bbc.com/news/magazine-28016999.
34 Polly Mosendz, “Poroshenko: There Are No Separatists, Only Terrorists,” The Wire,
July 21, 2014, accessed September 6, 2015, www.thewire.com/global/2014/07/
poroshenko-there-are-no-separatists-only-terrorists/374772/.
35 Jeremy Scahill and Ryan Devereaux, “Watch Commander: Barack Obama's Secret Ter-
rorist-Tracking System, by the Numbers,” The Intercept, August 5, 2014, accessed
September 6, 2015, https://firstlook.org/theintercept/2014/08/05/watch-
commander.
10 Alex P. Schmid
terrorism.41 Here we will consider just a few. For instance, Paul Wilkinson
made several attempts at defining terrorism, beginning in 1974:
Our main concern is with political terror: that is to say with the use of coercive
intimidation by revolutionary movements, regimes or individuals. ... We have
thus identified some of the key characteristics common to all forms of political
terror: indiscriminateness, unpredictability, arbitrariness, ruthless destruc-
tiveness and the implicitly amoral and antinomian nature of a terrorist’s chal-
lenge. ... Political terrorism, properly speaking, is a sustained policy involving
the waging of organized terror either on the part of the state, a movement or
faction, or by a small group of individuals. Systematic terrorism invariably en-
tails some organizational structure, however rudimentary, and some kind of
theory or ideology of terror.42
This definition is quite broad and appears to incorporate most of the more
recent insights into terrorism. However, his categorization of terrorism as a
‘subspecies of warfare’ can be challenged. Indeed, there is more to terrorism
than this. Muhammad Fayyezhas identified no less than eight different narra-
tive frameworks for terrorism:
1. As an expression of religious constructions
2. As a protest and rallying symbol (ideological)
3. As an instrument of policy (political)
4. As violent criminal behavior (organized crime)
5. As an instrument of warfare
6. As a propaganda tool (visual warfare through media)
7. As vengeance (a social norm)
8. As vigilantism (state functionalism).47
48 Alex P. Schmid, ed., Political Terrorism. A Research Guide to Concepts, Theories, Data
Bases and Literature (Amsterdam: North-Holland, 1984), 111.
49 Alex P. Schmid and Albert J. Jongman. Political Terrorism. A New Guide to Actors,
Authors, Concepts, Data Bases, Theories and Literature (Amsterdam: North Holland,
1988), 28.
14 Alex P. Schmid
7. The direct victims are not the ultimate target (as in a classical assassina-
tion where victim and target coincide) but serve as message generators, more
or less unwittingly helped by the news values of the mass media, to reach vari-
ous audiences and conflict parties that identify either with the victims’ plight or
the terrorists’ professed cause.
8. Sources of terrorist violence can be individual perpetrators, small
groups, diffuse transnational networks, as well as state actors or state-spon-
sored clandestine agents (such as death squads and hit teams).
9. While showing similarities with methods employed by organized crime,
as well as those found in war crimes, terrorist violence is predominantly politi-
cal – usually in its motivation but nearly always in its societal repercussions.
10. The immediate intent of acts of terrorism is to terrorize, intimidate, an-
tagonize, disorientate, destabilize, coerce, compel, demoralize or provoke a
target population or conflict party in the hope of achieving from the resulting
insecurity a favorable power outcome, e.g. obtaining publicity, extorting ran-
som money, submission to terrorist demands and/or mobilizing or immobiliz-
ing sectors of the public.
11. The motivations to engage in terrorism cover a broad range, including
redress for alleged grievances, personal or vicarious revenge, collective punish-
ment, revolution, national liberation and the promotion of diverse ideological,
political, social, national or religious causes and objectives.
12. Acts of terrorism rarely stand alone but form part of a campaign of vio-
lence which can, due to the serial character of acts of violence and threats of
more to come, create a pervasive climate of fear that enables the terrorists to
manipulate the political process.50
To go beyond the current stage of knowledge incorporated in the Academic
Consensus Definition is quite a challenge. It is perhaps better to focus further
definitional construction efforts on a legal definition that is acceptable to the
General Assembly of the United Nations. The current draft version of the UN’s
Ad Hoc Committee on Terrorism, presented earlier, is certainly in dire need of
improvement.
Conclusion
Far from being a purely academic debate, the failure to agree on definitions of
terrorism has important practical implications. Indeed, the way that we define
terrorism fundamentally shapes the way that we confront it. Despite the work
of the Ad Hoc Committee, 14 UN conventions on counter-terrorism and a uni-
versally agreed upon UN Counter-Terrorism Strategy, the lack of a UN defini-
tion raises serious doubts about our ability to cooperate internationally in the
fight against terrorism, given that we cannot agree on what it is. Both scholars
of terrorism and counter-terrorism professionals alike must strive for an objec-
tive definition that facilitates not only common understanding, but also com-
mon action.
Bibliography
Begin, Menachem. The Revolt. London: W.H. Allen, 1951.
Bessner, Daniel, and Michael Stauch. “Karl Heinzen and the Intellectual Origins
of Modern Terror.” Terrorism and Political Violence 22, no. 2 (2010): 143-
176.
Collins, John. “Terrorism.” In Collateral Language: A User’s Guide to America’s
New War, edited by John Collins and Ross Glover, 155-74. New York: New
York University Press, 2002.
Damon, Dan. “Bosnia and WW1: The Living Legacy of Gavrilo Princip.” BBC,
June 25, 2014. Accessed September 6, 2015. http://www.bbc.com/news/
magazine-28016999.
De Vans, David. Research Design in Social Research. London: Sage, 2001.
Doucet, Ghislaine. “Terrorism: Search for a Definition or Liberticidal Drifting.”
In Terrorism, Victims, and International Criminal Responsibility, edited by
Ghislaine Doucet, 277 ff. Paris: SOS Attentats, 2003.
Easson, Joseph J., Alex P. Schmid. “Appendix 2.1: 250-plus Academic, Gov-
ernmental and Intergovernmental Definitions of Terrorism.” in The Rout-
ledge Handbook of Terrorism Research, edited by Alex P. Schmid. 99–157.
London: Routledge, 2011.
English, Richard. Terrorism: How to Respond. Oxford: Oxford University Press,
2009.
Feyyaz, Muhammad. “Conceptualizing Terrorism Trend Patterns in Pakistan –
an Empirical Perspective.” Perspectives on Terrorism 7, no. 1 (2013): 73-
102.
Ganor, Boaz. “Defining Terrorism – Is One Man’s Terrorist Another Man’s Free-
dom Fighter?” Herzliya: International Institute for Counter-Terrorism,
2010, accessed September 6, 2015, www.ict.org.il/Article/1123/Defining-
Terrorism-Is-One-Mans-Terrorist-Another-Mans-Freedom-Fighter.
Gross, Feliks. Violence in Politics. Terror and Assassination in Eastern Europe and
Russia. The Hague: Mouton, 1972.
Helmreich, Jeffrey S. “Beyond Political Terrorism: The New Challenge of
Transcendent Terror.” Heshvan, November 15, 2001, accessed September
6, 2015, http://www.jcpa.org/jl/vp466.htm.
Herschinger, Eva. “A Battlefield of Meanings: The Struggle for Identity in the UN
Debates on a Definition of International Terrorism.” Terrorism and Political
Violence 25, no. 2 (2013): 183-201.
Hoffman, Bruce. Inside Terrorism, Revised and expanded edition. New York:
Columbia University Press, 2006.
16 Alex P. Schmid
Jackson, Richard, Marie Been Smyth, and Jeroen Gunning, eds., Critical Terror-
ism Studies: A New Research Agenda. London: Routledge, 2009.
Jenkins, Brian M. The Study of Terrorism: Definitional Problems. St. Monica, CA:
RAND, 1980.
Levitt, Geoffrey. “Is Terrorism Worth Defining?” Ohio Northern University Law
Review 13 (1986): 97-116.
Mosendz, Polly. “Poroshenko: There Are No Separatists, Only Terrorists.” The
Wire, July 21, 2014. Accessed September 6, 2015. www.thewire.com/
global/2014/07/poroshenko-there-are-no-separatists-only-terrorists/374
772.
Rubin, Barry, and Judith Colb Rubin. Chronologies of Modern Terrorism. Ar-
monk, N.Y.: M.E. Sharpe, 2008.
Saul, Ben. “Attempts to Define ‘Terrorism’ in International Law.” Sydney Law
School Research Paper No. 08/115. The University of Sydney, October 2008.
Saul, Ben. Defining Terrorism in International Law. Oxford: Oxford University
Press, 2006.
Scahill, Jeremy, and Ryan Devereaux. “Watch Commander: Barack Obama's
Secret Terrorist-Tracking System, by the Numbers.” The Intercept, August
5, 2014. Accessed September 6, 2015. https://firstlook.org/theintercept/
2014/08/05/watch-commander.
Schmid, Alex P. The Routledge Handbook of Terrorism Research. London: Rout-
ledge, 2011.
Schmid, Alex P., and Albert J. Jongman. Political Terrorism. A New Guide to Ac-
tors, Authors, Concepts, Data Bases, Theories and Literature. Amsterdam:
North Holland, 1988.
Schmid, Alex P., ed., Political Terrorism. A Research Guide to Concepts, Theories,
Data Bases and Literature. Amsterdam: North-Holland, 1984.
Senechal de la Roche, Roberta. “Toward a Scientific Theory of Terrorism.” Soci-
ological Theory 22, no. 1 (March 2004): 1-4.
Teichmann, Jenny. “How to Define Terrorism.” Philosophy 64 (October 1989):
505-17.
Wilkinson, Paul. “Pathways out of Terrorism for Democratic Societies.” In Con-
temporary Research on Terrorism, edited by Paul Wilkinson and Alasdair M.
Stewart, 453-465. Aberdeen: Aberdeen University Press, 1987.
Wilkinson, Paul. Political Terrorism. London: Macmillan, 1974.
Wurth, Paul. La repression international du terrorisme. Lausanne: Imprimerie la
Concorde, 1941.
Zeidan, Sami. “Desperately Seeking Definition: The International Community’s
Quest for Identifying the Specter of Terrorism.” Cornell International Law
Journal 36, no. 3 (2004): 491-96.
Chapter 2
Terrorist Motivations
Dina Al Raffie
Introduction
Despite the prevailing lack of consensus in the international community on a
definition of terrorism, it is now widely agreed that terrorists are neither hope-
lessly irrational nor ‘insane.’ In fact, as Louise Richardson observes, the “prima-
ry shared characteristic [of terrorists] is their normalcy.” 1 Unfortunately, how-
ever, this is where the similarity ends, as no single profile is exemplary of all
terrorists. Rather, most studies find that the path to terrorism is paved with
both individual and environmental factors that combine in different ways for
different individuals. Similarly, whereas such combinations of factors may have
a radicalizing effect, ideological radicalization alone does not necessitate a
transition to violence, although it may increase the probability.
This chapter summarizes the various motivations of terrorists, based on
several decades’ worth of scholarly research. It begins by presenting a number
of myths, and what terrorists are not, before proceeding with an overview of
motivations that can broadly be categorized as either ‘individual’ or ‘environ-
mental.’ In particular, the chapter emphasizes that terrorism is an over-
whelmingly sane phenomenon, which is driven by a number of both individ-
ual/dispositional and environmental factors that are consciously mobilized by
actors and/or organizations for the pursuit of political ends. Most importantly,
radicalization relies heavily on socialization processes that not only build on
existing predisposing risk-factors, but also create further motivations for en-
gaging in terrorism. There is no one pathway to terrorism, no one profile of a
terrorist, and no one magic formula to counter terrorism. However, a keen un-
derstanding of the potential predisposing risk-factors and motivations can bet-
ter position governments to develop comprehensive responses to radicaliza-
tion and terrorism in their respective states.
1 Louise Richardson, What Terrorists Want: Understanding the Enemy, Containing the
Threat (New York: Random House, 2006), 14.
17 DOI: 10.11610/ctt.ch02
18 Dina Al Raffie
The second myth is that poverty, poor education, and lack of employment
opportunities are at the root of all terrorism. Profiles of terrorists spanning
various ideologies call this into question. For example, a biographical study of
approximately 400 Salafi jihadists, drawn from different countries, by psychia-
trist Marc Sageman found that a significant majority (around two-thirds) were
from upper/middle class families and were well-educated, based on a high per-
centage of college attendance figures.7 Similarly, studies on both Chechen and
Palestinian female suicide bombers found that most were from middle-income
families and attained the level of education pursuant to national standards and
their age groups.8
There are some cases where poverty or material factors do play a role. For
example, it has been documented that men living in the Syrian stronghold of IS,
Ar-Raqqa, have joined the insurgency in exchange for reduced taxes and im-
proved standing in society.9 A similar motivation is noted for women marrying
IS commanders and other fighters in the area. The total control of Ar-Raqqa’s
economy by IS is part of a calculated strategy to ensure obedience from the lo-
cal population and to attract supporters using economic incentives and other
benefits. It would, however, be inaccurate to label forced participation as a le-
gitimate motivation for terrorism, since joining the group is essentially beyond
the control of the individual. Others will accept money from terrorist organiza-
tions in return for services that facilitate the groups’ activities. 10 However, such
motivations generally do not fall under most definitions of terrorism, as a fun-
damental element is the political nature of the goals pursued. Overall, poverty
in general does not seem to correlate strongly with a tendency towards politi-
cal violence. As Khalil Shikaki rightly notes, the constant misery of poor living
conditions is hardly “... a crucial factor; if it were half the Somali population
would have already blown itself up.”11 The same argument can be made for mil-
lions of people living in similar conditions who have not opted for violence.
Finally, although a correlation between the degree of state failure and inci-
dents of terrorism has been found,12 such findings are not consistent across dif-
ferent studies.13 Current conflicts also suggest that state failure is not a direct
cause of terrorism, but rather may provide terrorist groups with opportunities
to establish safe havens due to the collapse of central government.
12 See Dipak Gupta, Understanding Terrorism and Political Violence: The Life Cycle of
Birth, Growth, Transformation, and Demise (London: Routledge, 2008): 69–71.
13 See, for example, The Global Terrorism Index 2014: Measuring and Understanding the
Impact of Terrorism (New York: Institute for Economics and Peace, 2015), accessed
May 22, 2015, http://economicsandpeace.org/wp-content/uploads/2011/09/
Terrorism-Index-Report.pdf.
14 David C. Rapoport, “The Four Waves of Terrorism,” in Attacking Terrorism: Elements
of a Grand Strategy, eds. Audrey Kurth Cronin et al. (Washington, D.C: Georgetown
University Press, 2004), 46–73.
15 Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 1998), 37.
Terrorist Motivations 21
because they believe they are actually doing good on behalf of a larger social
identity to which they belong.
Belief in a cause is often linked to the existence of grievances, injustice and
discrimination. Whether real or perceived, they can motivate an individual for
action (and here the word ‘action,’ rather than ‘terrorism,’ is used intentionally
because there are several ways people respond to such conditions). Indeed,
most successful terrorist campaigns will capitalize on grievances faced by
those they claim to fight for. If these grievances do not exist, they will create
them. For example, by framing otherwise normal daily challenges of Muslim
youth in the diaspora as a deliberate strategy of discrimination against the
religion, ideologues create grievances and support for their narrative that the
West is in a ‘war against Islam’ – a cornerstone of the Salafi jihadist rhetoric.
Youths may thus be incentivized to join as a means of addressing these
grievances, or because they feel that governments are unable or unwilling to do
so.
Traumatic experiences in an individual’s life can also be a strong motivator.
Returning to the previous example of female suicide bombers, many of them
had suffered the loss of someone close to them (often killed by the security
forces of the state), which left them with a strong desire to avenge their loved
ones.16 The desire for revenge is particularly strong in situations where a mi-
nority population, ethnicity or religion, is being oppressed by a state and/or
the majority. A similar motivation also plays a role in many Muslim-majority
countries, where there is a strong dislike of certain Western foreign policies.
This creates a sense of victimization among civilian populations and conse-
quently broadens the potential pool of recruits for terrorist organizations.
A good example of an unpopular policy is the use of drones in CT operations.
This has alienated many people in affected countries and has facilitated radi-
calization and granted credibility to the jihadist narrative of a “war on Islam.”17
Individuals are thus sometimes motivated to join terrorist organizations that
provide them with resources and an avenue to take revenge on their oppres-
sors. They may join terrorist organizations because of a strong commitment to
the group’s ideology, but perhaps even more often as a means to address other
needs.
A more strategic reason why terrorists adopt the tactics that they do is to
draw attention to their cause. As one jihadist propaganda poster aptly put it,
“As soon as we picked up the gun they started to listen.” For many, opting for
violence is not just a way to vent frustrations, but also to air grievances and
make them known. Another motivation linked to grievances is known as ‘rela-
tive deprivation.’ Notably, this involves a combination of both individual and
discussion of the history of public protest, activism, and political violence is be-
yond the scope of this chapter. However, several observations are necessary.
To begin with, it has been suggested that there may be a link between ter-
rorism and certain forms of repressive governance, such as military autocra-
cies.20 Authoritarian regimes monopolize political power and deny opportuni-
ties for political participation. This fuels grievances which may then manifest
themselves in rebellion and/or political violence.21 Whilst such an explanation
appears logical, authoritarian regimes also exercise tight control over their re-
spective populations, giving them little opportunity to organize an armed re-
sistance.
In fact, the opportunities for terrorism may be even greater in democratic
societies. A cursory glance at the recent history of Europe and the US shows
that, prior to the rise of contemporary violent Islamism, both continents had
suffered from violent left-wing extremism for many years, despite democratic
systems of governance. For instance, during the 1970s, the US experienced a
wave of bombings, largely attributable to groups such as the Weather Under-
ground.22 Similarly, the current exodus of ‘foreign fighters’ to Syria and Iraq has
involved thousands of volunteers from Western countries, many of whom are
not clearly disadvantaged or oppressed. Whereas some terrorist organizations
will emerge in response to forms of real and/or perceived state oppression
(e.g. terrorism in the Israel-Palestine conflict), the reality is that state practices
alone are not sufficient as drivers of terrorism. Indeed, there is little evidence
to support a causal connection between governance type and terrorism.
A more necessary ingredient for mobilization in all cases of terrorism is the
existence of an ideology. Ideologies play an important role in terrorism, pri-
marily because of their ability to manipulate how people see the world and to
provide convincing arguments for why and how individuals should act, i.e. they
frame the cause on behalf of which individuals should fight. Robert Benford
and David Snow identify three primary frames that ideologues use, of which
the first two are of particular significance.23 The first is the “diagnostic” frame,
which provides explanations for why individuals face the problems they do. In-
dividual motivating factors such as grievances, traumas, and injustices that are
faced by potential recruits are explained as being symptomatic of a larger injus-
20 For a detailed discussion see Matthew C. Wilson and James A. Piazza, “Autocracies
and Terrorism: Conditioning Effects of Authoritarian Regime Type on Terrorist At-
tacks,” American Journal of Political Science 57, no. 4 (2013): 941–55.
21 For more on political drivers of violent extremism, see Guilain Denoeux and Lynn
Carter, Guide to the Drivers of Violent Extremism (Washington, D.C.: United States
Agency for International Development, 2009), 27–38, accessed May 22, 2015,
http://pdf.usaid.gov/pdf_docs/pnadt978.pdf.
22 Caron E. Gentry and Laura Sjoberg, “The Gendering of Women’s Terrorism,” in
Women, Gender and Terrorism, ed. Laura Sjoberg et al. (Athens, GA: University of
Georgia Press, 2011), 66.
23 Robert D. Benford and David A. Snow, “Framing Processes and Social Movements: An
Overview and Assessment,” Annual Review of Sociology 26 (2000): 611–39.
24 Dina Al Raffie
24 Doug McAdam, Political Process and the Development of Black Insurgency, 1930-1970
(Chicago: University of Chicago Press, 1999), 51.
25 Seth J. Schwartz, Curtis S. Dunkel, and Alan S. Waterman, “Terrorism: An Identity
Theory Perspective,” Studies in Conflict and Terrorism 32, no. 6 (2009): 540–42.
Terrorist Motivations 25
cepted at last.”26 Responsibility and agency no longer rest with the individual,
but with the group, which collectively decides on the actions to be taken and
continues to ideologically justify them. Related ‘groupthink’ eclipses inde-
pendent decision-making and fosters compliance, regardless of how irrational
or extreme the proposed action may seem.27
As one study of a member of the Irish Republican Army (IRA) noted, “O’Grady
[IRA member] observed that he did not grow up hating Protestants but had
adopted the hatreds of his chosen group. He said: “They [Protestants] are the
enemy of my people. The IRA targeted these people, and I was their instrument
of death. I carry the hatred of my own group”.”28 The psychosocial impact of the
group on the individual’s willingness to join and stay should not be underesti-
mated.
Similarly, the role of leaders cannot be overlooked when discussing terrorist
motivations. Organized action requires organizers, and terrorist leadership of
some description is often crucial for mobilization. Leaders are responsible for
articulating and spreading the group’s vision, and act as role models or proto-
types for those that join. Charismatic leaders that demonstrate commitment to
a group’s cause are viewed as key to the success of an organization and its ide-
ology.29 For instance, despite the many luxuries that his wealth could have af-
forded him, Osama bin Laden always made an effort to demonstrate his com-
mitment to the cause by living a Spartan lifestyle. It is perhaps easy to under-
stand the appeal that such leaders may have on individuals who suffer from
identity crises, are seeking direction, or else are moved by traumatic experi-
ences that create a need for certainty and assurance. Just as Hollywood celebri-
ties command deep admiration and loyalty from fans, so too can charismatic
terrorist leaders and ideologues (see Case study 2.1).
Nevertheless, governments should take caution not to base their counter-
terrorism (CT) efforts purely on ‘decapitating’ the top leadership of terrorist
groups. Although there are a number of cases where the capture or killing of
leaders has had a significant effect on a group’s operations, e.g. the Kurdistan
Workers’ Party (PKK), others suggest that decapitation can have a negative ef-
fect. Indeed, the killing of a leader can create a ‘martyr’ and breathe new life
into an organization’s momentum.30
Another social unit that can influence terrorist recruitment and motivation
is the family. In a study of the Southeast Asian Jemaah Islamiyah (JI), research-
ers found strong normative support amongst families for terrorist actions car-
ried out by their kin.33 Terrorist organizations may intentionally adopt a policy
of intra-organizational marriage to create loyalty and ensure the radicalization
of future generations. Some studies of Western home-grown terrorists have
found similar effects. In a case study of an AQ-affiliated Tunisian network
based in Milan, Lorenzo Vidino demonstrated how the radicalization of one
brother eventually led two of his siblings to follow suit.34 In addition to imme-
diate family and kinship ties, there are other facilitators of radicalization,
among them the Internet and social media, which are discussed in Chapter 6.
Besides ‘virtual’ facilitators, likeminded, non-violent groups that share ideo-
logical affinities with terrorist organizations can also play a role in the overall
radicalization process.
In a groundbreaking study on Islamist activism, Quintan Wiktorowicz high-
lights the role of ostensibly non-violent Islamist organizations in promoting
many of the narratives that their more violent counterparts also subscribe to. 35
These groups often present themselves as legitimate religious institutions act-
ing on behalf of minorities, primarily in the West. Examples of groups that have
since been banned in many countries due to their strong potential for radical-
izing youth include Hizb-ut-Tahrir (HT), the UK-based al-Muhajiroun and the
Sharia4 organizations that have branches in several countries.
33 Michael King, Haula Noor, and Donald M. Taylor, “Normative Support for Terrorism:
The Attitudes and Beliefs of Immediate Relatives of Jema'ah Islamiyah Members,”
Studies in Conflict and Terrorism 34, no. 5 (2011): 402–17.
34 Lorenzo Vidino, “The Buccinasco Pentiti: A Unique Case Study of Radicalization,” Ter-
rorism and Political Violence 23, no. 3 (2011): 398–418.
35 Quintan Wiktorowicz, Islamic Activism: A Social Movement Theory Approach (Bloom-
ington, IN: Indiana University Press, 2004).
28 Dina Al Raffie
Certain radical Salafi preachers, both political and apolitical, have also fea-
tured as contributors to the growth of Islamist extremism. Although not neces-
sarily inciting violence, the puritanical religious interpretations taught by such
preachers often serve a similar purpose to terrorist narratives in that they are
divisive and highly critical of anyone who does not share their interpretation of
the faith. Increasingly, extremist preachers will also combine strong anti-West-
ern, anti-democratic rhetoric based on comparable critiques of Western do-
mestic and foreign policies, and similarly call for a reformation of societies
based on select readings of the Islamic sharia. It is thus easy to see how these
facilitators, with their many ideological parallels to violent Islamist organiza-
tions, can help to ideologically prime their followers into potentially accepting
more radical, violent ideas.36 Nevertheless, it is also important to realize that
mainstream Salafism is by no means an inevitable conveyor belt towards vio-
lent extremism and some believe that it may in fact help prevent people from
turning to terrorism.37 As Vidino has noted, “it can be argued that in some cases
non-violent Islamist groups act as firewalls while in others as conveyor belts.”38
A final point of interest regarding the environment and radicalization re-
lates to research on prisons as incubators of violent extremism. Prisons facili-
tate radicalization and recruitment to terrorism when imprisoned radicals are
kept together or else left to mingle with ‘ordinary’ convicts. Essentially the
same social dynamics that bring together individuals in support of extremist
ideology on the outside can also play out in prisons. For example, Mark Hamm
has researched a number of cases where individuals were radicalized behind
bars, including shoe bomber Richard Reid and several of the 2004 Madrid train
bombers.39 More recent reports have suggested that Camp Bucca, an American
military prison in Iraq, played a significant role in the development of the cur-
rent leadership of IS.40 It provided the insurgents with an opportunity to as-
semble, analyze each other’s strengths and weaknesses, and establish a hierar-
chy that was eventually to form the backbone of the insurgent group as we
know it today. Indeed, prisons play a dual role. They not only protect society
from dangerous individuals, but also protect dangerous individuals from being
hunted on the outside. In the case of the Iraqi insurgency, being in prison
meant that prominent AQ members were kept alive and could continue their
efforts to radicalize and recruit.
Conclusion
This chapter aimed to provide an overview of widely documented motivating
factors for terrorism. It is a phenomenon that is driven by a complex array of
elements that emerge from an individual’s predispositions, experiences and
environment. Motivations to commit acts of terror are thus multilayered.
Therefore, in order to successfully counter terrorism we first need to distin-
guish between the different layers and sources of terrorist motivation. It is ob-
vious that no single approach will suffice in challenging terrorist motivations.
This is because there are various drivers at both the individual and environ-
mental levels which, when taken together, may present multiple pathways into
radicalization and violence. Not all of the factors need to be present in each in-
dividual’s radicalization ‘formula.’ Likewise, different ideologies present dif-
fering narratives which emphasize certain factors over others. Even more
confusing is the unanticipated effects that the same factors can have on differ-
ent individuals, as the majority of aggrieved, disenfranchised youngsters who
face identity crises will not turn to terrorism.
However, the fact remains that the risk-factors identified above will have a
negative impact on a number of individuals and, for some, will provide suffi-
cient motivation to commit acts of terrorism. Despite the complexity of the
subject, the knowledge that we have gained on the ‘why’ of terrorism is enough
to enable development of empirically informed policies to counter violent
extremism. Although in all likelihood we will never be able to put an end to
terrorism, we may be able to lessen its appeal over time.
Bibliography
Al Raffie, Dina. “Social Identity Theory for Investigating Islamic Extremism in
the Diaspora.” Journal of Strategic Security 6, no. 4 (2013): 67-91.
Benford, Robert D., and David A. Snow. “Framing Processes and Social Move-
ments: An Overview and Assessment.” Annual Review of Sociology 26
(2000): 611–39.
Berko, Anat, and Edna Erez. “Martyrs or Murderers? Victims or Victimizers?
The Voices of Would-Be Palestinian Female Suicide Bombers.” In Female
Terrorism and Militancy: Agency, Utility, and Organization, edited by Cindy
Ness, 146–66. Abingdon, Oxon: Routledge, 2008.
Cronin, Audrey Kurth. “How al-Qaida Ends: The Decline and Demise of Terror-
ist Groups.” International Security 31, no. 1 (2006): 7–48.
30 Dina Al Raffie
Denoeux, Guilain, and Lynn Carter. Guide to the Drivers of Violent Extremism.
Washington, D.C.: United States Agency for International Development,
2009.
Gentry, Caron E., and Laura Sjoberg. “The Gendering of Women’s Terrorism.” In
Women, Gender and Terrorism, edited by Laura Sjoberg et al. Athens, GA:
University of Georgia Press, 2011.
Gupta, Dipak. Understanding Terrorism and Political Violence: The Life Cycle of
Birth, Growth, Transformation, and Demise. London: Routledge, 2008.
Hamm, Mark. The Spectacular Few: Prisoner Radicalization and the Evolving
Terrorist Threat. New York: New York University Press, 2013.
Hewitt, Christopher. Understanding Terrorism in America: From the Klan to Al
Qaeda. New York: Routledge, 2003.
Hoffman, Bruce. Inside Terrorism. New York: Columbia University Press, 1998.
Ingram, Haroro J. The Charismatic Leadership Phenomenon in Radical and Mili-
tant Islamism. Farnham, England: Ashgate, 2014.
Johnson, Phillip W., and Theodore B. Feldmann. “Personality types and terror-
ism: Self-psychology perspectives.” Forensic Reports 5, no. 4 (1992): 293-
303.
King, Michael, and Donald M. Taylor. “The Radicalization of Homegrown Ji-
hadists: A Review of Theoretical Models and Social Psychological Evi-
dence.” Terrorism and Political Violence 23, no. 4 (2011): 602-22.
King, Michael, Haula Noor, and Donald M. Taylor. “Normative Support for Ter-
rorism: The Attitudes and Beliefs of Immediate Relatives of Jema'ah Is-
lamiyah Members.” Studies in Conflict and Terrorism 34, no. 5 (2011): 402–
17.
Malthaner, Stefan. “Contextualizing Radicalization: The Emergence of the “Sau-
erland-Group” from Radical Networks and the Salafist Movement.” Studies
in Conflict and Terrorism 37, no. 8 (2014): 638–653.
McAdam, Doug. Political Process and the Development of Black Insurgency, 1930-
1970. Chicago: University of Chicago Press, 1999.
Meleagrou-Hitchens, Alexander. As American as Apple Pie: How Anwar al-Awlaki
Became the Face of Western Jihad. London: International Centre for the
Study of Radicalization, 2011, http://icsr.info/2011/09/as-american-as-
apple-pie-how-anwar-al-awlaki-became-the-face-of-western-jihad/.
Post, Jerrold M. “Notes on a Psychodynamic Theory of Terrorist Behavior.” Ter-
rorism: An International Journal 7, no. 2 (1984): 241-56.
Post, Jerrold M. “Terrorist Psycho-logic: Terrorist Behavior as a Product of Psy-
chological Forces.” In Origins of Terrorism: Psychologies, Ideologies, Theolo-
gies, States of Mind, edited by Walter Reich. Cambridge, England: Cam-
bridge University Press, 1990.
Terrorist Motivations 31
Worchel, Stephen. Written in Blood: Ethnic Identity and the Struggle for Human
Harmony. New York: Worth, 1999.
Zenn, Jacob. “Boko Haram: Recruitment, Financing, and Arms Trafficking in the
Lake Chad Region.” CTC Sentinel 7, no. 10 (2014): 5-10.
Chapter 3
The Strategy and Tactics
of Terrorism
James Howcroft
Introduction
Terrorists exist for political reasons. Groups that practice terrorism do so in
order to bring about political change of some type. Usually, these groups are
small and often lack broad public support. Therefore, they are unable to
achieve their desired goals through a peaceful political process. Instead, they
use acts of violence, inflicted upon deliberately chosen noncombatant targets,
in order to bully and intimidate governments into changing policy or granting
concessions.
Despite the prominence of terrorism as a global security threat, the majority
of terrorist groups do not survive long. Seventy per cent of terrorist groups
perish within a year after their first attack.1 There are a number of possible ex-
planations that may clarify why some groups survive and thrive and others do
not. However, one of the determining factors is the degree to which the group’s
leadership has effectively planned their campaign, exploited the group’s re-
sources and selected appropriate methods and tools to achieve their objectives,
i.e. their strategy and tactics.
The core characteristics of strategy remain the same for both states and
non-state actors. Hundreds of books by great thinkers such as Sun Tzu, Machi-
avelli, Clausewitz, Liddell Hart and Lawrence Freedman have addressed the
enduring features of strategy and its intricacies and nuances. For our purposes,
however, we will employ a practical approach focused upon ends, ways and
means. Ends are the goals and objectives of the terrorist group. Simply put,
what they say about why they are carrying out their actions. Ways are the
methods of influence and persuasion used by terrorist groups to achieve their
stated goals. Means are the resources and tactics employed on the ground. The
means reflect the broad methodologies (ways) which support the accomplish-
ment of the goals (ends) of the group.
Terrorists can be quite open in laying out their strategy. It is useful for coun-
ter-terrorism (CT) professionals to examine and analyze these strategies
whenever possible. They communicate their grievances, identify whom they
1 Joseph K. Young and Laura Dugan, “Survival of the Fittest: Why Terrorist Groups En-
dure,” Perspectives on Terrorism 8, no. 2 (2014): 2-23, accessed May 22, 2015,
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/334/html.
33 DOI: 10.11610/ctt.ch03
34 James Howcroft
hold responsible, and tell their followers what they should do about it. Terror-
ist strategies also provide insights into the group’s goals, likely targets, tactics
and the audience they are trying to recruit. Gaining an understanding of these
elements helps to illuminate the points at which governments must apply the
instruments of national power to defeat, degrade or destroy these groups.
Terrorists’ Goals
Terrorists must communicate their goals to three primary audiences that they
wish to influence. The first audience consists of the leadership and decision-
makers of the state whose policies they are trying to change. A second audience
is the public, the noncombatants, who are the medium against whom violence
will be used. Lastly, terrorist groups need to advertise their cause to potential
supporters, so that the organization can grow in power and influence. Groups
often produce slick-looking propaganda which outlines aspects of their strat-
egy in order to inform and recruit new followers. The ‘Islamic State’ (IS) journal
Dabiq and al-Qaeda in the Arabian Peninsula’s (AQAP) Inspire magazine openly
provide detailed insights into each group’s intent and activities.
The ends or goals of terrorist groups are different depending on their griev-
ances and can be categorized in a number of ways. One method is to place
groups into one of five categories that have proven their relevance over time:
1) regime change, 2) territorial change, 3) policy change, 4) social control, and
5) maintenance of the status quo.2 Regime change is the replacement of a
government either by the terrorist group or a regime more acceptable to them.
Left wing terrorist groups of the 1970s and ’80s, such as the Shining Path in
Peru, would fit this model. Separatist movements, aiming at territorial change,
were the biggest drivers of terrorism in the second half of the 20 th century.
These groups fought for freedom from an occupying power or colonial regime,
or for certain ‘rights’ or protection for an ethnic minority (e.g. the ETA in Spain
or the Tamil Tigers (LTTE) in Sri Lanka). While some of these factors remain
significant, there has been little change in the number or severity of attacks by
separatists over the past decade.
An example of policy change would be al-Qaeda’s (AQ’s) demand that the
United States withdraw its forces from the Middle East and end support for
“corrupt” Arab regimes. An example of terrorism aimed at social control would
be violence against ethnic or racial minorities, such as committed by certain
neo-Nazi groups. Other forms of right wing terrorist violence are aimed at pre-
serving a political status quo against groups fighting for change. Examples
would include Colombian paramilitaries or violent Protestant groups in North-
ern Ireland. Often the goals of terrorist groups are interrelated and comple-
mentary, e.g. AQ’s desire for US withdrawal from the Middle East (political
change) supports the goal of overthrowing the Saudi Kingdom (regime change).
The establishment of a caliphate by IS in the territory formerly controlled by
3 Muhammed al-‘Ubaydi, Nelly Lahoud, Daniel Milton and Bryan Price, The Group That
Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State
(West Point, NY: The Combating Terrorism Center, 2014), 87, accessed May 19, 2015,
https://www.ctc.usma.edu/posts/the-group-that-calls-itself-a-state-understanding-
the-evolution-and-challenges-of-the-islamic-state.
36 James Howcroft
civilian targets is obviously less dangerous and risky to the terrorists and tends
to have a stronger resonance within the wider society. Attacks on school chil-
dren in particular have an impact far beyond those directly affected. The 2004
Beslan siege in Russia, Tehreek-e-Taliban’s attack in Peshawar in 2014, Boko
Haram’s kidnapping of school girls in Chibok in April 2014 and the al-Shabaab
attack in Garissa, Kenya in 2015 are recent examples.
Affecting the security and well-being of the population can be powerful
methods of achieving leverage for a terrorist group. In a Gallup Poll in 2013, 40
percent of the American public still professed worry that they or a family
member might become a victim of terrorism, despite the fact of very few suc-
cessful attacks in the US since 9/11.6 From a terrorist’s perspective, fear is in-
tended to make citizens pressure their governments to agree to terrorists’ de-
mands or moderate policies in exchange for refraining from violence. Al-Sha-
baab’s attacks in Kenya on the Westgate shopping mall in 2013 and on the stu-
dents of Garissa in 2015 were meant to pressure the Kenyan government into
curtailing their military operations against the group in Somalia.7 The July 2010
bombing in Uganda, which targeted civilians watching a World Cup football
match, was likewise intended to impose a cost on Ugandan society for their
government’s contribution of forces to AMISOM, the African Union military
mission in Somalia. Similarly, AQ’s leadership directly linked the attacks on
public transport in Madrid in 2004 and London in 2005 to continuing coalition
military operations in Iraq.8
Terrorist groups depend on the publicity generated by the media to amplify
their actions and influence a larger audience beyond the immediate reach of
their violence. As British Prime Minister Margaret Thatcher famously stated in
1985, terrorists depend upon “the oxygen of publicity” and violent, destructive
actions inevitably draw widespread media attention. Terrorism analyst Brian
Jenkins famously commented during the 1970s that terrorists wanted a lot of
people watching rather than a lot of people dead, but sadly only the former part
of this statement still holds true. Terrorists are increasingly willing to indulge
in mass casualty attacks in order to gain the attention that they crave.
In the past, the Palestine Liberation Organization (PLO) was masterful at
exploiting and manipulating the media. The 1972 Munich Olympics was the
first live, globally televised sporting event, with an unprecedented audience of
up to a billion viewers. As a result, targeting the Games was incredibly effective
in drawing world attention to the Palestinian cause. During the same era, the
Italian Red Brigades timed their actions and communications to newspapers to
meet the news cycle of the higher circulation Thursday and Sunday editions in
order to reach the largest audience.9 Similarly, American right wing terrorist
Timothy McVeigh chose to target the Murrah Federal Building in Oklahoma
City because it had plenty of open space around it to allow the best possible
media coverage.10 In a letter intercepted by the authorities in 2005, Ayman al-
Zawahiri (then second in command for AQ) admonished Abu Musab al-Zarqawi
for his brutal tactics, explaining that “We are in a battle, and more than half of
this battle is taking place in the battlefield of the media, we are in a media
battle in a race for the hearts and minds of our people.”11
7 See, for example, Jamal Osman, “Why Did al-Shabaab Strike at the Heart of Kenya’s
Capital?” Channel 4 News, April 23, 2013, accessed May 22, 2025,
http://www.channel4.com/news/kenya-somali-islamist-group-al-shabaab-nairobi-
westgat-mall.
8 See, for example, “US Rejects bin Laden’s Tape’s Truce Offer,” CNN, January 20, 2006,
accessed May 20, 2015, http://edition.cnn.com/2006/US/01/19/binladen.tape/
index.html.
9 Harvey W. Kushner, Encyclopedia of Terrorism (Thousand Oaks, CA: Sage, 2003), 227.
10 Michel Lou and Dan Herbeck, American Terrorist: Timothy McVeigh and the Oklahoma
Bombing (New York: HarperCollins, 2001): 168-169.
11 “Letter from al-Zawahiri to al-Zarqawi,” GlobalSecurity.org, July 9, 2005, accessed
May 22, 2015, www.globalsecurity.org/security/library/report/2005/zawahiri-
zarqawi-letter_9jul2005.htm.
38 James Howcroft
12 Rukmini Callimachi and Jim Yardley, “From Scared Amateur to Paris Slaughterer,”
New York Times, January 18, 2015.
13 Alexander Harriet, “Tweeting Terrorism: How al Shabaab Live Blogged the Nairobi
Attacks,” The Daily Telegraph, September 22, 2013, accessed May 22, 2015,
www.telegraph.co.uk/news/worldnews/africaandindianocean/kenya/10326863/T
weeting-Terrorism-How-al-Shabaab-live-blogged-the-Nairobi-attacks.html.
14 Christina Schori Liang, “Cyber-Jihad: Understanding and Countering Islamic State
Propaganda,” Policy Paper 2015/2 (Geneva: Geneva Center for Security Policy,
February 2015), 1.
The Strategy and Tactics of Terrorism 39
matically boosted support for the Provisional Irish Republican Army (PIRA).15
The French government’s deployment of 10,000 troops onto the streets of Paris
following the Charlie Hebdo attack was meant to reassure the public, but also
succeeded in amplifying the impact of what was (by global standards) a com-
paratively small-scale incident. Repeated military operations against Hamas in
Gaza have increased support for the ‘resistance’ and led to widespread inter-
national criticism of Israel.
Violent overreaction weakens a government’s legitimacy and erodes public
support, while increasing sympathy for terrorists. In particular, persecuted mi-
norities whom the terrorists claim to represent are often pushed into siding
with the militants, who readily offer them protection. Indeed, government op-
pression risks alienating the ethnic or religious group that the terrorists are
trying to attract, and reinforces their narrative of injustice. This dynamic was
evident when members of the Sunni minority in Iraq gave support to IS in 2014
in response to Shia Prime Minister Nouri al-Maliki’s oppressive and divisive
sectarian policies. Significant government overreaction may inadvertently as-
sist terrorist groups in achieving their core objectives. The attack on America in
2001 was a provocation that threatened the very survival of AQ as it brought
down the full weight of the world’s only superpower on the organization. But
post 9/11, US military action in Afghanistan and Iraq reinforced AQ’s narrative
that the West was at war with Muslims. From a longer-term perspective, it
could be argued that Western overreaction to the events of 9/11 helped AQ
gain additional worldwide support and at least partially advanced its goal of
“bleeding the enemy,” while making it appear a greater threat than it could ever
be in reality.16
The US Patriot Act and similar legislation in Europe have weakened civil lib-
erties. The use of the military base at Guantanamo to detain prisoners without
trial has done great damage around the world to the American image as an ad-
vocate for human rights and the rule of law. As noted above, AQ was certainly
effective at portraying the US invasion of Iraq and Afghanistan as a war against
Islam. These wars cost trillions of dollars and caused the deaths of thousands
of soldiers and hundreds of thousands of civilians. In the US alone, expenditure
on homeland security grew by more than $1 trillion in the decade after 9/11.17
The psychological, human and financial toll of combating AQ and its affiliates
since 2001 has undoubtedly made the US and its European allies question the
utility of deploying military forces to the Middle East, as evidenced most re-
cently by unwillingness to commit troops on the ground in Libya or against IS
in Iraq and Syria.
15 Eamonn McCann, The Bloody Sunday Enquiry – The Families Speak Out (London: Pluto
Press, 2006), 4-6.
16 John Mueller and Mark Stewart, “The Terrorism Delusion: America’s Overwrought
Response to September 11,” International Security 37, no. 1 (2012): 103.
17 “Is America Spending Too Much on Homeland Security?” The Economist, April 30,
2011.
40 James Howcroft
18 The Global Terrorism Index (New York: Institute for Economics and Peace, 2015), 29,
accessed May 2, 2015, http://www.visionofhumanity.org/sites/default/files/Global
%20Terrorism%20Index%20Report%202014.pdf.
19 Evan Perez, Devlin Barrett and Andrew Grossman, “Boston Bomb Clues Surface,” The
Wall Street Journal, April 16, 2013.
20 The Global Terrorism Index, 30.
The Strategy and Tactics of Terrorism 41
tack in Paris are examples of relatively unsophisticated, low cost, difficult to de-
tect assaults which generated tremendous publicity.25
Group assaults on infrastructure such as the January 2013 attack on the In
Aminas gas plant in Algeria can also be an effective tactic for terrorists. While
24 See, for example, Adam Dolnik, “Fighting to the Death: Mumbai and the Future Fi-
dayeen Threat,” RUSI Journal 155, no. 2 (2010): 60–68.
25 Note that this is despite the fact that both Mehdi Nemmouche (the alleged shooter in
Brussels) and the Kouachi brothers (who attacked Charlie Hebdo) had all trained
with terrorists overseas.
The Strategy and Tactics of Terrorism 43
assaults like this need to be well planned and coordinated, the majority of the
operational team would not need to possess sophisticated skills beyond how to
handle an automatic weapon. The large work force and employee turnover in
such facilities also provide opportunities for infiltration and acquisition of in-
telligence on vulnerabilities in security systems and potential hostages. Once
an attack is underway, the size of these facilities makes them difficult to defend
and secure. The resultant chaos is likely to gain significant media coverage.
Attacks on tourist infrastructure, especially in countries which are depend-
ent on revenues generated by international visitors, can have an especially
acute debilitating impact on both the short- and long-term economic health of a
country. This was certainly the case following the attacks at Luxor in Egypt in
1997. Western travel warnings concerning Kenya in 2014 also had a cata-
strophic effect on an economy heavily reliant on the tourism industry, which in
turn appears to have undermined efforts to address marginalization and job-
lessness and complicated measures to counter violent extremism. 26 The March
2015 attack on tourists visiting the Bardo National Museum in Tunis caused
major cruise lines to indefinitely cancel visits to Tunisia, resulting in the loss of
badly needed income for the struggling economy. The resultant increase in
visible and intrusive security measures meant to reassure tourists can also
magnify the impact of the initial attack, months or years after it takes place.
Assassination
Terrorists have used assassinations throughout history. The Sicarii killed fel-
low Jews who supported the Roman occupation in the first century AD. The as-
sassination of Archduke Ferdinand by a Serbian terrorist in Sarajevo on June
28, 1914 was the trigger that led to the First World War. Assassination is often
used against symbolic targets or the leadership of a state. The PIRA assassina-
tion of Lord Mountbatten in 1979 and the subsequent attempt on the life of
Prime Minister Margaret Thatcher in Brighton in 1984 are illustrative exam-
ples, as is the assassination of Indian Prime Minister Indira Gandhi in 1989 and
former Pakistani Prime Minister Benazir Bhutto in 2007. The targeted killing of
senior leaders such as these not only attracts intense interest from interna-
tional media, but also demonstrates the power and ability of the group to strike
successfully even against the most senior and well-protected members of a
government.
Hostage-Taking
Hostage-taking represents yet another opportunity to gain media attention and
influence public opinion. The seizure of Israeli athletes by Palestinian terrorists
at the 1972 Olympic Games was not just a defining moment in modern terror-
ism. It also brought the political agenda of the PLO to the forefront of the
world’s attention. Hostage dramas can play out over days, weeks or even
months, adding to their political impact. Such incidents present a significant
26 Jeffrey Gentleman, “A Catch-22 in Kenya: Western Terrorism Alerts May Fuel Terror-
ism,” New York Times, February 24, 2015, A1.
44 James Howcroft
Conclusion
Groups such as the Taliban and AQ have proved remarkably resilient in the face
of sustained efforts by the world’s most powerful countries to eliminate them.
It is not clear whether their survival is down to effective strategy or, as is often
the case in warfare, the mistakes and inadequacies of their opponents. Cer-
tainly, contemporary terrorist organizations have proved more adept than
governments at exploiting the opportunities presented by globalization and
technology to publicize their cause, broadcast their narratives and influence
potential supporters and recruits. Armed propaganda, which remains the es-
sence of terrorist strategy, has never been easier.
Bombings and shootings remain the tactics of choice as they have been for
over a century, although the lethality of individual terrorists has increased ex-
ponentially over time. The ruthlessness of today’s religiously motivated ter-
rorists all but guarantees the continuation of spectacular, mass casualty at-
tacks. Another 9/11 would be hard to achieve, but another ‘Mumbai’ is entirely
feasible. Major recent incidents suggest a trend towards attacks on critical in-
frastructure combined with barricade hostage incidents involving citizens of
Western states. These incidents attract media attention, humiliate govern-
ments and exploit the inherent opportunities and vulnerabilities of modern ur-
ban landscapes. The sheer viciousness of contemporary groups like IS and
Boko Haram is also an important part of their recruitment strategy. Yet at the
same time, this limits the number of their supporters to a tiny minority of co-
religionists. Excessive violence and a fixation on tactical successes at the ex-
pense of strategy are ultimately self-defeating.
Bibliography
“Is America Spending Too Much on Homeland Security?” The Economist. April
30, 2011. Accessed May 2, 2015. www.economist.com/blogs/gulliver/
2011/04/deterring_terrorism.
“Letter from al-Zawahiri to al-Zarqawi.” GlobalSecurity.org, July 9, 2005. Ac-
cessed May 22, 2015. www.globalsecurity.org/security/library/
report/2005/zawahiri-zarqawi-letter_9jul2005.htm.
“Terrorism in the United States.” Gallup.com. Accessed May22, 2015.
http://www.gallup.com/poll/4909/Terrorism-United-States.aspx.
“US Rejects bin Laden’s Tape’s Truce Offer.” CNN, January 20, 2006. Accessed
May 20, 2015. http://edition.cnn.com/2006/US/01/19/binladen.tape/
index.html.
al-‘Ubaydi, Muhammed, Nelly Lahoud, Daniel Milton and Bryan Price. The
Group That Calls Itself a State: Understanding the Evolution and Challenges
of the Islamic State. West Point, NY: Combating Terrorism Center, 2014. Ac-
cessed May 19, 2015. https://www.ctc.usma.edu/posts/the-group-that-
calls-itself-a-state-understanding-the-evolution-and-challenges-of-the-
islamic-state.
Callimachi, Rukmini, and Jim Yardley. “From Scared Amateur to Paris Slaugh-
terer.” New York Times. January 18, 2015.
Callimachi, Rukmini. “Paying Ransoms, Europe Bankrolls Qaeda Terror.” New
York Times. July 30, 2014, A1.
Dolnik, Adam. “Fighting to the Death: Mumbai and the Future Fidayeen Threat.”
RUSI Journal 155, no. 2 (2010): 60–68.
Dolnik, Adam. “Four Myths About Ransoms.” Foreign Affairs, January 13, 2015.
Accessed February 3, 2015. www.foreignaffairs.com/articles/142773/
adam-dolnik/four-myths-about-ransoms.
Erlanger, Steven. “Europe Focuses on Emerging Threats From Smaller Crews of
Terrorists.” New York Times. January 13, 2015. Accessed May 19, 2015.
http://www.nytimes.com/2015/01/14/world/europe/europe-focuses-
on-emerging-threats-from-smaller-crews-of-terrorists.html.
The Strategy and Tactics of Terrorism 47
Perez, Evan, Devlin Barrett and Andrew Grossman. “Boston Bomb Clues Sur-
face.” The Wall Street Journal. April 16, 2013.
Small Arms Survey 2012. Geneva: Graduate Institute of International and Devel-
opment Studies, 2012. accessed May 22, 2015. www.smallarmssurvey.org/
weapons-and-markets/stockpiles/civilian-inventories.html.
Smith-Spark, Laura, and Deborah Feyerich. “How ISIS’ New Hostage Strategy is
Shifting the Goalposts.” CNN, January 30, 2015. Accessed February 4, 2015.
http://edition.cnn.com/2015/01/30/middleeast/isis-hostage-strategy/.
The Global Terrorism Index. New York: Institute for Economics and Peace, 2015.
Accessed May 2, 2015. www.visionofhumanity.org/sites/default/files/
Global%20Terrorism%20Index%20Report%202014.pdf.
Young, Joseph K., and Laura Dugan. “Survival of the Fittest: Why Terrorist
Groups Endure.” Perspectives on Terrorism 8, no. 2 (2014): 2-23. Accessed
May 22, 2015. www.terrorismanalysts.com/pt/index.php/pot/article/
view/334/html.
Chapter 4
Terrorist Innovation
Adam Dolnik
Introduction 1
Innovation is defined here as “the introduction of a new method or technology,
or the improvement of an already existing capability.” Generally speaking, ter-
rorist innovation falls into the realm of emulation and adaptation, since the
technologies used by terrorists are never completely new. Terrorists have ef-
fectively engaged in ‘evolutionary innovation’ (i.e. incremental) as opposed to
‘revolutionary’ (i.e. radical) innovation.2
This chapter begins with some observations about the general trends in tac-
tical and technological innovation in terrorist campaigns, followed by a discus-
sion of the reasons why different terrorist organizations display varying levels
of innovation. In particular, four key scenarios which may act as triggers for
terrorist innovation are identified, and these are then considered using the
‘Islamic State’ (IS) as a case study.
1 This chapter has been adapted from Adam Dolnik, “The Dynamics of Terrorist
Innovation,” in Understanding Terrorism Innovation and Learning: Al-Qaeda and
Beyond, ed. Magnus Ranstorp and Magnus Normark (Oxon and New York: Routledge,
2015), 76–95. Content reprinted with permission.
2 Barry Buzan, Strategic Studies: Military Technology & International Relations (New
York: St. Martin’s Press, 1987), 18; Williamson Murray, “Innovation: Past and Future,”
in Military Innovation in the Interwar Period, ed. Williamson R. Murray and Allan R.
Millet (London: Cambridge University Press, 1998), 306.
3 Bruce Hoffman, “Terrorist Targeting: Tactics, Trends, and Potentialities,” Terrorism
and Political Violence 5, no. 2 (1993): 13.
49 DOI: 10.11610/ctt.ch04
50 Adam Dolnik
4 Stephen P. Rosen, Winning the Next War: Innovation and the Modern Military
(London: Cornell University Press, 1991), 52.
5 Adam Dolnik, “Fighting to the Death,” RUSI Journal 155, no.2 (2010): 60-68.
6 Hoffman, Terrorist Targeting, 14.
7 Adam Dolnik, Understanding Terrorist Innovation: Technology, Tactics and Global
Trends (London: Routledge, 2007). The credit for generating the initial list of
variables that were further refined and operationalized in the book goes to Brian
Jackson, “Technology Acquisition by Terrorist Groups: Threat Assessment Informed
Terrorist Innovation 51
8 Stephen Sloan and Sean Anderson, Historical Dictionary of Terrorism, 2nd ed. (London:
The Scarecrow Press, 2002), 45.
9 National Commission on Terrorist Attacks upon the United States, The 9/11 Commis-
sion Report (New York: W.W. Norton & Company, 2004), 232.
Terrorist Innovation 53
overall combat exposure not only translates into more experience with han-
dling weaponry, but also provides ample opportunity to battle-test the new in-
novations in the field. Thus, greater frequency of attacks is likely to affect both
the desire as well as the capability of terrorists to innovate.
Overall, it seems that terrorist organizations are likely to be both more
willing and more capable of innovation when they display guerilla characteris-
tics such as frequent clashes with enemy forces and control of territory. By
comparison, urban terror groups that are confined to municipal settings are
less likely to innovate. However, while some aspects of the “dynamics of the
struggle” were apparently relevant, this variable alone fails to provide a viable
explanation why Aum Shinrikyo, PFLP-GC and RAS’s innovation practices were
so radically different from other groups that have operated in very similar
working conditions.
Looking at other examples, some innovative groups that operated in safe
havens like AQ, LTTE, or the Revolutionary Armed Forces of Colombia (FARC)
show a high level of relevance of this variable. On the other hand, why did ur-
ban groups such as the Provisional Irish Republican Army (PIRA) or Red Army
Faction (RAF) engage in technologically more innovative practices than groups
with guerilla characteristics such as the Armed Islamic Group (GIA) or the
Sendero Luminoso (SL)? The answer apparently lies elsewhere, and therefore
it seems that while favorable “dynamics of the struggle” can provide a group
with the working conditions that can generally increase the chances for suc-
cessful innovation, the decision to engage in innovative practices in the first
place is driven by other considerations.
Countermeasures
Target hardening efforts that render the tactics previously used by terrorists
ineffective may provide the critical push for a group’s decision to innovate. This
dynamic was evident in three of the four examined case studies and there are
many more historical examples. It is not universally true that organizations
whose methods are countered display higher levels of innovation than other
groups. Still, most groups that have demonstrated innovative tendencies in the
past have done so partly because of countermeasures. Indeed, the majority of
groups have responded to the introduction of security obstructions by switch-
ing to ‘softer’ objectives as opposed to choosing to innovate in order to defeat
hardened targets.
What sets the innovative groups aside is a specific desire to overcome the
enemy countermeasures as a symbolic gesture. Alternatively, new devices have
sometimes been the product of a lack of access to modern weapons, as opposed
to a forward-looking innovation. This suggests that, although unconventional
weapons are typically associated with escalation, in reality they can also be
employed out of desperation or a simple lack of conventional options. Such
causes of technological innovation, however, are unlikely to progress to a mass
destruction capability.
Terrorist Innovation 55
While in many cases terrorist innovation has indeed been the product of an
“arms race” between the terrorists and their enemies, terrorist groups are not
necessarily limited to reactive strategies, and there are clearly other drivers of
innovation.
Targeting Logic
It is believed that groups which embrace a very narrow and discriminate
choice of targets will depend on a modus operandi that will allow such target-
ing. Alternatively, organizations which are indiscriminate in their targeting are
more likely to innovate in order to obtain sufficiently destructive means of at-
tack. In addition, organizations that take a highly rigid approach to targeting
throughout the period of their existence are thought to be less likely to demon-
strate technologically innovative tendencies than organizations whose target-
ing logic is flexible in terms of frequency and types of target. Both of these
tendencies were confirmed by this research. Organizations that were more in-
discriminate, more lethal and more flexible in their choice of targets were also
more likely to innovate.
However, it is also important to note that indiscriminate and highly lethal
targeting is not always achieved through innovative means. For instance, some
of the historically most lethal terrorist groups such as GIA or the Lord’s Re-
sistance Army (LRA) are among the least operationally innovative. Meanwhile,
comparatively discriminate groups such as the PIRA have engaged in much
greater levels of innovation. In fact, highly discriminate operations are likely to
require more skill, as in the example of targeted assassinations of well pro-
tected persons.10 For instance, the RAF’s six assassinations of heavily guarded
Germans all involved sophisticated weaponry, including state of the art remote
controlled bombs triggered by a light beam and high-powered rifles.11 Simi-
larly, the assassination of Louis Blanco by ETA involved more than 12 months
of surveillance, the digging of a 20 foot tunnel from a basement under the road,
and the placing of three large devices timed to detonate at intervals of one-
tenth of a second to match the speed of the Admiral’s car.12 Both of these
groups were certainly more sophisticated in their approach than the GIA dur-
ing its village massacres in the 1990s. As a result, it seems that even highly dis-
criminate and very rigid organizations can sometimes be driven to innovate in
order to conduct ‘surgical strikes’ against their desired targets, even after these
have been hardened. This makes it clear that lethality cannot automatically be
equated with innovation, just as innovation is frequently not associated with
indiscriminate targeting.
To sum up, organizations that embrace a highly lethal and indiscriminate
targeting logic are more likely to pursue radical innovation, such as CBRN at-
10 J. Bowyer Bell, The Dynamics of the Armed Struggle (London: Frank Cass, 1990), 88.
11 Hoffman, Terrorist Targeting, 16.
12 Christopher Dobson and Ronald Payne, The Terrorists, Their Weapons, Leaders and
Tactics (New York: Facts on File, 1982), 134.
56 Adam Dolnik
who is killed in this way cannot be saved spiritually because their soul is
unable to escape through their mouth.17 As we can see from these examples,
the attachment to a particular tactic or weapon is one of the key determinants
of the terrorist modus operandi.
Of all of the variables examined in this research the attachment to a partic-
ular weaponry or tactic seems to have the strongest predictive value with re-
gards to providing an indicator of a group’s attraction to using innovative
means. While conservative groups often embrace a similar attachment, they ei-
ther do not require significant deviations from their present capability, or the
emphasis is on values other than innovation. Of course, other factors such as
‘ideology and strategy’ or ‘countermeasures’ can also have a profound impact
on the way in which a group operates, but whether or not this process is ac-
companied by innovation will be determined directly by its attachment to par-
ticular weaponry.
Group Dynamics
The background, value system, and authority of terrorist leaders may be key
determinants of the motivation of these individuals to instigate radical innova-
tion, as well as their ability to successfully impose such decisions on the rest of
the group. Group structure is also extremely important. This shapes the deci-
sion-making dynamics, determining whether major operational decisions are
based purely on top-down leadership, or whether there is also room for egali-
tarian input. Finally, ideological, operational, or power disputes within a group
can also sometimes trigger escalation or innovation as a way of overcoming
differences.
What seems to be the most important implication here is that radical inno-
vation is likely to be driven by a group’s leadership, whose decisions are likely
to be influenced by the presence of other critical variables, namely the attach-
ment to a particular weapon, tactic, or the process of innovation itself. In con-
trast, incremental innovation and the operational evolution of groups over time
has most frequently been a bottom-up process.
Relationship with other Organizations
Throughout history, various organizations have modified their operational
preferences as a result of both cooperation and competition with other terror-
ist groups. Cooperation has allowed groups to gain access to others’ opera-
tional and technological know-how, while competition can drive a group’s deci-
sion to innovate in order to achieve prominence over competitors. Interest-
ingly, these dynamics are not necessarily driven by ideology. In fact, organiza-
tions with similar ideologies are more likely to engage in competition, rather
than cooperation. The reason for this is simple: the closer the ideologies and
aims of groups within the same operational theater, the more they will be com-
peting for the same pool of potential supporters. As a result, there is a greater
17 Tom Marks, “Making Revolution with Shining Path,” in Shining Path of Peru, ed. David
Scott Palmer (New York: St Martin’s Press, 1994), 214.
58 Adam Dolnik
need for these groups to differentiate themselves from one another in order to
gain a monopoly on the goal that they all claim to strive for. Competition is es-
pecially likely in contexts where terrorism is generally seen as an initial step
towards taking over governance and therefore control over the population.
Resources
Larger organizations with hefty budgets, outside sponsors, and highly qualified
membership are more likely to demonstrate both motivation and capability for
innovation. Notably, however, state sponsorship (or lack thereof) does not ap-
pear to be a predictor of innovation. Contemporary terrorist organizations
have learned to adapt to the reality of self-financing, in some cases so well that
their budgets even exceed those of many state sponsored entities. Fur-
thermore, group size by itself does not necessarily increase the likelihood of
innovation – rather, it is the qualitative attributes of the cadres. Indeed, the
availability of quality human resources is absolutely key to a group’s motiva-
tion and ability to innovate. Importantly, a group’s decision to innovate can
thus take place quite suddenly if, for instance, it finds itself in the possession of
a key human resource with the idea or the skill to introduce a new method.
Luck and coincidence can therefore play a considerable role in determining
terrorists’ modus operandi. Whether a group will be able to take advantage of
such a surprise acquisition will to a great extent depend on the following varia-
ble – openness to new ideas.
Openness to New Ideas
In highly autocratic organizations, where members are closely watched and
controlled and where dissent is not tolerated, the likelihood of innovative pro-
posals coming from individual group members seems lower than in the case of
groups with a more democratic approach to decision-making. It would appear
that, in order to facilitate innovation, a group’s leadership would have to be
open to suggestions from below. However, open communication links have not
proven to be a critical variable for providing the push for a decision to inno-
vate.
A second element here is the technological awareness of a group. Intuitively,
organizations whose members are in everyday contact with modern technolo-
gies such as cell phones, computers or laboratory equipment would seem more
likely to incorporate these into their operations than groups whose members
are secluded from the rest of the world. However, this has not universally been
true in the case studies examined.
A third potentially important component of ‘openness to new ideas’ is a
positive attitude toward risk taking (regarding both the risk of failure and
physical risks associated with conducting experiments with unfamiliar wea-
ponry). Virtually any terrorist is willing to die for his or her cause. However,
while some organizations have shown a great keenness to sacrifice the lives of
some of their members during suicide operations, others have gone out of their
way to avoid physical dangers, even sacrificing the effectiveness of their opera-
Terrorist Innovation 59
tions in order to see their operatives fight another day. It was thus thought that
innovative groups would be likely to demonstrate higher tolerance for opera-
tional failure and a greater willingness to sacrifice their members. However,
this was not always found to be the case. Further, it should be emphasized that
a group’s attitude toward danger constantly fluctuates. Based on the principle
of ‘risky shift’ associated with the psychological processes of group decision-
making, known as ‘groupthink,’ terrorist groups can be expected to take greater
risks over time.18
Ultimately, democratic decision-making, contact with modern technology
and a high tolerance for risk are of limited utility for threat assessment pur-
poses. On the one hand, a high tolerance towards the risks of failure and physi-
cal risks can be highly important as a precondition to radical technological in-
novation such as the adoption of CBRN weapons. On the other hand, low toler-
ance towards physical risks can drive groups to innovate incrementally, pre-
cisely in order to improve the safety of their members during operations. Fur-
thermore, social or physical isolation does not necessarily mean that a group is
informationally secluded, and when an organization’s leadership is in favor of
innovation, open communication and democratic decision-making are not re-
quired for innovation to occur.
Durability
Logically, it would seem that organizations that exist longer have more time to
progress in terms of their motivation and capability to innovate. Yet all four of
the organizations studied for this research (Aum Shinrikyo, the PFLP-GC, RAS
and 17N) reached their peak of capability relatively quickly from the outset of
their campaigns. Certainly, many organizations have improved over time as
they have gathered experience and learned from past mistakes. For example,
the RAF’s study of past court cases led to innovations including a special oint-
ment designed to prevent fingerprints.19 Nevertheless, we cannot assert that
the length of time a terrorist group has been in existence will correlate with its
demonstrated level of radical innovation. Indeed, the emergence of an innova-
tive group can be rather sudden, meaning that a mass-casualty attack could po-
tentially come out of nowhere, rather than necessarily being preceded by a
string of lower-level attacks using conventional weapons.
Nature of the Technology
Once the decision to innovate has been made, additional factors that will de-
termine the success of the innovation process will also come into play. These
variables include some of the above stated factors such as the level of outside
support, availability of financial and material resources, expertise, time, quality
of membership, intensity of the struggle, and the security environment in
which the group operates. The one obvious variable that is likely to have the
18 Richard Nel Lebow, Between Peace and War (Baltimore: Johns Hopkins University
Press, 1981), 101-119.
19 Hoffman, Terrorist Targeting, 25.
60 Adam Dolnik
20 Another aspect that must be pointed out is that some factors such as “targeting logic”
or “openness to new ideas” have proven to be a double-edged sword, having the
capacity to contribute to both directions of the innovation scale. But since we are
particularly concerned with the prospect of radical innovation possibly leading to
mass destruction, such variables will mainly be considered in terms of their potential
to lead to escalation.
Terrorist Innovation 61
here is that there is no obvious obsession with some form of innovative mass-scale at-
tack and (notwithstanding the attacks in Paris in November 2015) they have not so
far pursued spectacular operations to the same extent as AQ, preferring to focus on
insurgent operations and mass executions within their own territory. However,
another possibility is that as IS continues to draw pledges of allegiance from splinter
groups in a variety of locations around the world, these ‘satellite’ groups will engage
in innovative practices in order to out-do local rivals.
Countermeasures
Compared to AQ, which continues to obsessively target aviation, countermeasures are
of less relevance in driving IS towards innovation. Certainly, the group has had to ad-
just its tactics in response to airstrikes and increasing confrontations with ground
forces, but this has had mixed results 25 and has not moved it in the direction of esca-
lation of terrorist attacks within its own territory. However, the group clearly feels
threatened, issuing a steady stream of threats against the West in the lead up to the
aforementioned attacks in Paris. If indeed IS directed these attacks, this represents a
shift in targeting preference but not, by any means, radical innovation. Of course this
does not rule out gradual escalation of tactics, and there is an added element of un-
predictability given that the group has also encouraged its sympathizers to conduct
acts of freelance terrorism on its behalf, using any means available. While untrained
sympathizers have historically proven limited in terms of operational capabilities, the
widespread call to arms coupled with a lack of command and control allows for bot-
tom-up creativity, which is constrained only by the skills and opportunities available
to those who heed the call.
Acquisition of Human/Material Resources
Historically, acquisition of human resources has certainly played a role in IS’s innova-
tive use of the Internet. For example, a young Moroccan living in London named
Younis Tsouli was instrumental in facilitating the online distribution of beheading
videos during the group’s earlier incarnation as al-Qaeda in Iraq.26 Furthermore, IS
has attracted significant numbers of educated and skilled professionals, some with a
demonstrated interest in CBRN weaponry 27 and this may yet prove to be critical in
driving innovation towards spectacular, mass casualty attacks. Of equal concern,
however, is the possible ‘chance’ acquisition of chemical weapons or other CBRN ma-
terials in Syria or Iraq. The previous takeover by the group of the al-Muthanna chemi-
cal weapons compound did not bear fruit as the weapons had not been maintained,
and uranium stolen from Mosul University was not weapons-grade material. Never-
theless, it is quite possible that similar opportunities will open up in the future, thus
allowing for radical, mass-casualty innovation. There have already been documented
cases where IS added chlorine to improvised explosive devices, and although this has
had relatively little effect, it is indicative of a willingness to deploy unconventional
25 Alexandre Mello and Michael Knights, “The Cult of the Offensive: The Islamic State on
Defense,” CTC Sentinel 8, no. 4 (2015): 1–6.
26 Gordon Corera, “The World’s Most Wanted Cyber-Jihadist,” BBC News, January 16,
2008, accessed May 15, 2015, http://news.bbc.co.uk/2/hi/7191248.stm.
27 Harald Doornbos and Jenan Moussa, “Found: The Islamic State’s Terror Laptop of
Doom,” Foreign Policy, August 28, 2014, accessed August 29, 2014,
http://foreignpolicy.com/2014/08/28/found-the-islamic-states-terror-laptop-of-
doom/.
64 Adam Dolnik
weapons, given the opportunity. Ultimately, when all four scenarios are considered
together, there is a significant risk that IS will move towards radical innovation in the
future. The one ‘saving grace’ at this time is the lack of an obvious obsession with in-
novation in and of itself.
Conclusion
Although the above-described situations are likely to be encountered by most
terrorist groups throughout their life span, only some can be expected to inno-
vate. This will depend on a combination of factors, most importantly on the
presence of an expressed fascination with a sophisticated weapon or technol-
ogy, or the process of innovation itself. This non-rational component (espe-
cially when combined with overly-high operational ambitions) serves as the
strongest and most universal pre-indicator of the propensity of a terrorist
group to innovate. Without the presence of this component, groups that are
forced to change their strategy, adapt to countermeasures, or prevail in compe-
tition with similar organizations can be expected to react by modifying their
modus operandi, broadening their target categories, or intensifying their at-
tacks, but not necessarily by engaging in radical innovation.
Bibliography
Al-Mawardi, Abu al-Hasan, Al-Ahkam as-Sultaniyyah: The Laws of Islamic Gov-
ernance. London: Ta-Ha Publishers, 1996.
Bell, J. Bowyer. The Dynamics of the Armed Struggle (London: Frank Cass,
1990).
Buzan, Barry. Strategic Studies: Military Technology & International Relations.
New York: St. Martin’s Press, 1987.
Corera, Gordon. “The World’s Most Wanted Cyber-Jihadist.” BBC News, January
16, 2008. Accessed May 15, 2015. http://news.bbc.co.uk/2/hi/71912
48.stm.
Dobson, Christopher, and Ronald Payne. The Terrorists, Their Weapons, Leaders
and Tactics. New York: Facts on File, 1982.
Dolnik, Adam. “Fighting to the Death.” RUSI Journal 155, no. 2 (2010): 60-68.
Dolnik, Adam. “The Dynamics of Terrorist Innovation.” In Understanding Ter-
rorism Innovation and Learning: Al-Qaeda and Beyond, edited by Magnus
Ranstorp and Magnus Normark, 76-95. Oxon and New York: Routledge,
2015.
Dolnik, Adam. Understanding Terrorist Innovation: Technology, Tactics and
Global Trends. London: Routledge, 2007.
Doornbos, Harald, and Jenan Moussa. “Found: The Islamic State’s Terror Lap-
top of Doom.” Foreign Policy, August 28, 2014. Accessed August 29, 2014.
http://foreignpolicy.com/2014/08/28/found-the-islamic-states-terror-
laptop-of-doom/.
Terrorist Innovation 65
Introduction
Most discussions of the so-called crime-terror nexus revolve around a very
simple observation: terrorists and insurgents frequently engage in criminal ac-
tivity as a source of revenue. There is no question that crime has been and con-
tinues to be a lucrative source of funding for all kinds of terrorists. However,
there is still ongoing disagreement about the extent of overlap between the
worlds of terrorism and organized crime (OC). Often there is a tendency to
over-generalize from specific cases, to speculate or, at times, to overlook the
available evidence. Confusion over the nature of the threat in turn acts as a bar-
rier to developing more effective countermeasures. Based on a combination of
the authors’ engagement with academic literature on the subject and opera-
tional experience, this chapter begins by examining the similarities and differ-
ences between terrorists and criminals including profiles, methods, systems of
organization, and motives. In other words, the who, what, how and why of ter-
rorism and OC. This is followed by a discussion of the crime-terror nexus and
the concept of “convergence,” i.e. the relationships between terrorism and
crime. The chapter then concludes with a brief discussion of implications for
counter-terrorism (CT) and law enforcement (LE).
1 Andrew Silke, “Holy Warriors: Exploring the Psychological Processes of Jihadi Radi-
calization,” European Journal of Criminology 5, no.1 (2008): 99–123.
67 DOI: 10.11610/ctt.ch05
68 Sam Mullins, James K. Wither, and Steven R. Monaco
Methods
To appreciate the extent of overlap in terms of terrorist and criminal method-
ology, it is useful to begin by breaking down the different types of crime that
terrorists engage in, in order to achieve different objectives:
1. Inherent/ Violent
Acts of terrorism inherently involve a variety of different criminal offences re-
lating to the use of violence, often including (but not limited to) murder, as-
sault, threatening behavior, property damage, kidnap and weapons/explosives
offences. In fact, because the majority of terrorist behaviors are already pro-
scribed in law, some feel that specialized CT legislation is unnecessary. While
this is open to debate, there is no doubt that organized criminals commit all of
these same offences. However, criminal use of violence, generally speaking, is
more discriminate 2 and more deliberately covert, whereas terrorists strive for
publicity. In connection with this (as discussed below) the motivation or pur-
pose is also different.
2. Preparation/ Facilitation
Terrorists must frequently break the law in order to prepare or facilitate at-
tacks. Offences here can include arms trafficking, forgery, immigration viola-
tions, smuggling, and bribery. When it comes to these, and other ostensibly
non-violent crimes aimed at making attacks possible, terrorists are much more
similar to criminals in the sense that they want to remain ‘under the radar.’
3. Funding
As previously noted, much of the discussion of terrorism involvement in crime
tends to focus on crimes committed for financial gain. Although drug-traffick-
ing is the most lucrative and widely documented criminal endeavor that ter-
rorists are involved in, other profitable offences include kidnap-for-ransom
(KFR), smuggling, robbery, extortion, fraud, counterfeiting, theft, trading in il-
licit goods, illegal mining and money laundering. Indeed, since the apparent de-
cline of state sponsorship, terrorists have become increasingly self-reliant and
engage in just about every criminal act imaginable in order to fund their opera-
tions. The only real difference compared to organized criminals is how the
money is spent.
2 Louise I. Shelley and John T. Picarelli, “Methods Not Motives: Implications of the
Convergence of International Organized Crime and Terrorism,” Police Practice and
Research: An International Journal 3, no. 4 (2002): 305–18.
Terrorism and Crime 69
5 “Six Admit Planning to Bomb English Defence League Rally,” BBC News, April 30,
2013, accessed May 17, 2015, http://www.bbc.com/news/uk-22344054.
6 See, for example, Sam Mullins, ‘Home-Grown’ Jihad: Understanding Islamist Terrorism
in the US and UK (London: Imperial College Press, 2016).
7 We should not assume, however, that these organizations have been equally success-
ful in implementing military systems of organization, or that they have remained
stable over time. See, for example, Vera Eccarius-Kelly, “Surreptitious Lifelines: A
Structural Analysis of the FARC and the PKK,” Terrorism and Political Violence 24,
no. 2 (2012): 235–58.
8 Jana S. Benson and Scott H. Becker, “The Organizational Structure of International
Drug Smuggling,” Journal of Criminal Justice 38, no. 2 (2010): 130–38.
Terrorism and Crime 71
omy among lower and mid-level operatives.9 This evolution is at least partially
a reaction to successful CT and LE efforts 10 and has also been facilitated by ad-
vances in travel and communications technology. Perhaps most importantly in
the context of this discussion, networked systems of organization are not only
more resistant to offensive operations, but also increase the potential for col-
laboration among terrorist and criminal actors as a result of increased auton-
omy.11
Motives
As with offender characteristics and systems of organization, there is consider-
able overlap in terrorist and criminal motivations. To begin with, both are pri-
marily group-based activities and, as such, there are important social motives
for both joining and staying involved in terrorism and crime, including friend-
ship, solidarity, belonging and status.12 Perhaps the number one risk-factor for
becoming involved in either type of activity is having terrorist/criminal family
members or friends. In the short-term, terrorists and criminals also commit
many of the same crimes for the same reasons – at least as far as fundraising
goes. Whether it be drug-trafficking, bank robbery or any other form of crime
that provides profit, they both want to make money.
The difference, of course, lies in the long-term. Terrorists want to commit
high-profile attacks aimed at gaining publicity and eventually bringing about
some form of social and political change. At the same time, they often believe
that they are acting on behalf of a particular social group whom they wish to
protect or liberate and therefore frequently express altruistic intentions. By
comparison, criminals seem to be concerned almost exclusively with selfish
gains and have no apparent interest in either publicity or politics, unless it can
benefit them financially. Mexican cartels frequently behead their rivals, leave
the dismembered corpses in public places, distribute videos of the execution
taking place and make overt claims of responsibility. However, there is no clear
political motivation and the violence is instrumental, aimed at intimidating
their opponents and protecting their “turf.”13 Similarly, although organized
crime groups do occasionally assassinate politicians or other prominent offi-
cials, it is invariably meant to protect themselves and their illicit enterprises
from being shut down. It is thus the political/ideological end-goals of terrorists
that represent the critical difference between them and criminals.
9 John Picarelli, “Osama bin Corleone? Vito the Jackal? Framing Threat Convergence
through an Examination of Transnational Organized Crime and International Terror-
ism,” Terrorism and Political Violence 24, no. 2 (2012): 180-98.
10 Michael Kenney, “From Pablo to Osama: Counter-Terrorism Lessons from the War on
Drugs,” Survival 45, no. 3 (2003): 187–206.
11 Picarelli, “Osama bin Corleone?”.
12 Sam Mullins, “Parallels Between Crime and Terrorism: A Social-Psychological Per-
spective,” Studies in Conflict and Terrorism 32, no. 9 (2009): 811–30.
13 For a detailed discussion, see Phil Williams, “The Terrorism Debate over Mexican
Drug Trafficking Violence,” Terrorism and Political Violence 24, no. 2 (2012): 259–78.
72 Sam Mullins, James K. Wither, and Steven R. Monaco
Interaction
There are numerous anecdotal examples of interaction between terrorists and
criminals. A recent study of 2,700 illicit actors spread across 122 countries
found that 46 percent of terrorists’ connections were to people involved in
other illegal activities.15 Similarly, according to the Drug Enforcement Admin-
istration (DEA), close to half of US-designated Foreign Terrorist Organizations
have ties to drug traffickers.16 Although the focus tends to be on cooperation,
interactions vary significantly. They may be cooperative, exploitative or com-
petitive; short or long-term; small or large-scale; voluntary or involuntary; di-
rect or indirect; deliberate or unknowing. During the early 1980s, at a time
when both groups were under pressure, the Italian Red Brigades (BR) sought
the help of the Naples Camorra and the two groups reportedly assisted one an-
other in the kidnapping of a senior politician and several assassinations. 17 In
14 This classification draws upon Glenn Curtis and Tara Karacan, The Nexus Among
Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime
Networks in Western Europe (Washington, DC: Federal Research Division, Library of
Congress, 2002); and Phil Williams, “Organized Crime and Terrorism,” Latin
American and Caribbean Center (2014), accessed May 23, 2015, https://lacc.fiu.edu/
research/publications/working-paper-2-williams.pdf.
15 Scot Helfstein with John Solomon, Risky Business: The Global Threat Network and the
Politics of Contraband (West Point, NY: Combating Terrorism Center, 2014), accessed
May 25, 2015, https://www.ctc.usma.edu/wp-content/uploads/2014/05/Risky
Business_final.pdf.
16 Douglas Farah, “Fixers, Super Fixers and Shadow Facilitators: How Networks Con-
nect,” International Assessment and Strategy Center (2012), 2, accessed May 25,
2015, www.strategycenter.net/docLib/20120423_Farah_FixersSuperFixersShadow.pdf.
17 Chris Dishman, “Terrorism, Crime and Transformation,” Studies in Conflict and
Terrorism, 24, no. 1 (2001): 53–54.
Terrorism and Crime 73
the case of Northern Ireland, there was clear conflict between paramilitaries
and criminals. At the same time, there were allegations that the PIRA used its
vigilante activities as a pretext to control the drug market, providing ‘licenses’
to selected dealers whom they allowed to continue operating, whilst simulta-
neously wiping out their competitors.18 Along similar lines, the Paraguayan
People’s Army (EPP) is believed to tax the cultivation of drugs within its terri-
tory, whilst also providing protection to drug traffickers in exchange for arms.19
Meanwhile, the oft-cited nexus between terrorism and crime in West Africa is
generally viewed as evidence of cooperation between Latin American drug
traffickers and al-Qaeda in the Islamic Maghreb (AQIM). In reality, however, it
seems that the latter may simply be taxing the former.20
While the relationships may not be entirely harmonious, terrorists are often
reliant on criminal actors for goods or services. The illicit networks which
make the trafficking of drugs, arms or other contraband possible are highly
complex and adaptable. Within these networks, ‘fixers’ and ‘facilitators’ with
specialized knowledge, connections and capabilities often play particularly im-
portant roles in connecting all types of terrorists and criminals to international
markets.21 Arms dealers, smugglers, money launderers, purveyors of false
documents and corrupt/sympathetic officials are some of the key contacts that
terrorists are likely to rely upon. For instance, the FARC was able to acquire
weapons from Australian arms dealers by way of an individual named José Luis
Merino – a former commander of the El Salvadorian Communist Party with ties
to El Salvador’s political leadership.22 More recently, IS is known to rely upon
various human traffickers, smugglers and corrupt border guards in order to
help facilitate the entry of foreign fighters,23 as well as the external flow of oil 24
and looted artifacts 25 to regional and international markets.
As this brief discussion illustrates, the interactions between terrorists and
criminals are varied, complicated, dynamic and difficult to accurately discern.
Nevertheless, it appears that interactions are more often tactical, born of ne-
18 John Horgan and Max Taylor, “Playing the ‘Green Card’ – Financing the Provisional
IRA: Part 1,” Terrorism and Political Violence 11, no. 2 (1999): 30–31.
19 Marguerite Cawley, “Narcos Exchanging Arms for Protection from Paraguay's EPP:
Officials” InSightCrime, August 27, 2013, accessed August 28, 2013,
http://www.insightcrime.org/news-briefs/narcos-exchanging-arms-for-protection-
with-paraguays-epp-officials.
20 Williams, “Organized Crime and Terrorism,” 4.
21 Farah, “Fixers, Super Fixers and Shadow Facilitators.”
22 Farah, “Fixers, Super Fixers and Shadow Facilitators.”
23 Hannah Lucinda Smith, “The Jihadi Transporter,” Vice, January 31, 2014, accessed
January 31, 2014, http://www.vice.com/read/meeting-the-jihadi-transporter.
24 Fazel Hawramy, Shalaw Mohammed, and Luke Harding, “Inside Islamic State’s Oil
Empire: How Captured Oilfields Fuel Isis Insurgency,” The Guardian, November 19,
2014, accessed November 19, 2014, www.theguardian.com/world/2014/nov/19/-
sp-islamic-state-oil-empire-iraq-isis.
25 Simon Cox, “The Men Who Smuggle the Loot That Funds IS,” BBC News, February 17,
2015, accessed February 17, 2015, http://www.bbc.com/news/magazine-31485439.
74 Sam Mullins, James K. Wither, and Steven R. Monaco
improvised explosive devices (IEDs) in a similar way. For example, the Colom-
bian Medellin and Cali cartels frequently used car bombings during their 1988–
1993 internecine war, while contemporary Mexican cartels were responsible
for at least 21 car bombings from 2010-2012, mostly targeting police.32 How-
ever, while criminals sometimes exhibit the same behavior as terrorists, they
rarely share the same motives. It is far more common for terrorists to appro-
priate criminal methodologies (ranging from ad-hoc, individual crimes to en-
during, organized conspiracies), rather than the other way around.
Assimilation
Several terrorist organizations have become so successful in their criminal ac-
tivities that they are often accused of being just as, if not more, concerned with
making money than achieving their ideological goals. In the case of the Afghan
Taliban, “[s]ome observers argue that that the line between ‘the definition of
Taliban member and drug smuggler is blurring’ as Taliban commanders be-
come more directly involved in the trade —running their own heroin laborato-
ries, for example—and are more motivated by profits and power than ideologi-
cal considerations. In this way, the definitional boundaries between ‘insurgent’
and ‘organised criminal group’ begin to collapse.” 33 Similar claims have been
made about the FARC, which reportedly makes somewhere in the region of
$2.4-$3.5 billion a year from the cocaine trade,34 and the Abu Sayyaf Group
(ASG) in the Philippines, which appears to have fluctuated between terrorism
and banditry over time.35 Although clearly a deeply ideological group, it could
also be argued that IS qualifies as a hybrid organization, given the millions of
dollars it makes on a daily basis from oil smuggling, as well as extortion and
trading in illegal antiquities. From the other end of the spectrum, the closest
example of a criminal-terror group is Dawood Ibrahim’s D-Company, which
was responsible for perhaps the most dramatic instance of criminal use of
terrorism in history – the Bombay bombings of 1993 (see Case Study 5.1).
D-Company, like other hybrid organizations, has not lost its original identity,
nor indeed, have the Taliban, FARC, Abu Sayyaf or IS. The degree to which any
hybrid is a terrorist or criminal organization is always open to some debate.
Nevertheless, recognizing the extent of terrorist involvement in crime helps to
highlight the fact that these groups should be of more or less equal concern to
both LE and CT.
32 Robert J. Bunker and John P. Sullivan, “Cartel Car Bombings in Mexico,” Letort Papers
(Carlisle, PA: Strategic Studies Institute and US Army War College Press, 2013).
33 David Bewley-Taylor, “Drug Trafficking and Organised Crime in Afghanistan,” RUSI
Journal 158, no. 6 (2013): 9.
34 John Otis, “The FARC and Colombia’s Illegal Drug Trade,” Wilson Center Latin Ameri-
can Program, November 2014, 9, accessed May 24, 2015, www.wilsoncenter.org/
sites/default/files/Otis_FARCDrugTrade2014.pdf.
35 McKenzie O’Brien, “Fluctuations Between Crime and Terror: The Case of Abu Sayyaf’s
Kidnapping Activities,” Terrorism and Political Violence 24, no. 2 (2012): 320–36.
76 Sam Mullins, James K. Wither, and Steven R. Monaco
Transformation
The fourth possible type of relationship between terrorism and crime is the
least clearly documented and most open to interpretation. It is sometimes sug-
gested that the FARC and AS fall into this category; however, this overlooks the
fact that they still clearly retain their respective political/religious identities
and continue to pursue an ideological agenda. The FARC is still engaged in on-
going peace talks with the Colombian government and AS has reportedly
pledged allegiance to IS. Another possible candidate for “transformation” is the
group behind the 2004 Madrid train bombings. This operation succeeded
thanks to the radicalization and recruitment of a former drug-dealer named
Jamal Ahmidan who used his criminal connections to secure funding as well as
the stolen dynamite used in the attacks.40 However, there is a difference be-
tween transformation at the individual level (i.e. radicalization of individual
36 Ryan Clarke and Stuart Lee, “The PIRA, D-Company, and the Crime-Terror Nexus,”
Terrorism and Political Violence 20, no. 3 (2008): 385.
37 Clarke and Lee, “The PIRA, D-Company, and the Crime-Terror Nexus,” 385, 390.
38 Ryan Clarke, “Lashkar-i-Taiba: The Fallacy of Subservient Proxies and the Future of
Islamist Terrorism in India,” Letort Papers (Carlile, PA: Strategic Studies Institute and
US Army War College Press, 2010), accessed May 24, 2015,
www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=973.
39 See, for example, Thomas Burghardt, “Organized Crime, Intelligence and Terror: The
D-Company’s Role in the Mumbai Attacks,” Centre for Research on Globalization,
December 13, 2008, accessed June 14, 2015, http://www.globalresearch.ca/
organized-crime-intelligence-and-terror-the-d-company-s-role-in-the-mumbai-
attacks/11385.
40 Williams, “Organized Crime and Terrorism,” 8–9.
Terrorism and Crime 77
cal, more pragmatic individuals – as appears to have been the case with Abu
Sayaaf in the Philippines.44
Despite such developments, we must bear in mind that there are also poten-
tial barriers to increased convergence of terrorism and crime. Although it is
clearly not a universal deterrent, the risk of getting caught increases substan-
tially both when terrorists commit crime by themselves and when they cooper-
ate with criminals who do not share their ideology. As PIRA clearly recognized,
getting caught not only jeopardizes an organization’s operations, but also risks
undermining its legitimacy and popular support. Under the same circum-
stances, criminals open themselves up to greater scrutiny and heftier punish-
ments. Perhaps more importantly, terrorists and criminals will only continue to
cooperate as long as they both continue to gain somehow, and as long as they
are able to trust one another. As an Italian policeman once commented on the
alliance between the BR and Camorra, “We don’t think any such alliance will
work because, while they have a common enemy in the police and the estab-
lishment, their aims and ideological beliefs are so vastly different… their alli-
ance at best would be superficial and short-lived because neither of them
would want to compromise the group’s secrets.”45
Taking all of these different factors into account, it is clear that terrorist ap-
propriation of criminal skills is now the norm. But although certain OCGs do
show similarities to terrorists, there is little to suggest that criminal use of ter-
rorist tactics is increasing. Furthermore, although examples of interaction be-
tween terrorists and criminals are not hard to come by, in general, it is far from
clear that these interactions are becoming deeper, longer-lasting or more prev-
alent. In other words, it is not apparent that terrorist and criminal organiza-
tions are merging with one another on a global scale to create new ‘super
threats.’ Similarly, when it comes to assimilation and especially transformation
(described above), there is a very short list of potential candidates that fall into
these categories and little to indicate that these are the new norm.
In the final analysis, it is essential that we do not over-generalize. Terrorist
involvement in crime (and vice versa) varies tremendously from group to
group and over time and is largely dictated by geographic opportunities,
changing political landscapes and interpersonal connections. Rather than think
in terms of a global convergence of terrorism and crime, it is enough to simply
be aware of the fact that all terrorism relies on criminal activity to some extent
and—whether or not this involves collaboration with otherwise independent
criminal actors—this presents us both with challenges and opportunities for
LE and CT.
ated problem of corruption.52 The TFI maintains links with international agen-
cies such as Interpol, Europol and the Financial Action Task Force (FATF).
At the international level, a range of different agencies are working to ad-
dress the threat of crime-terror linkages. The United Nations Office on Drugs
48 Malcolm Beith, “A Single Act of Justice: How the Age of Terror Transformed the War
on Drugs,” Foreign Affairs, September 8, 2013, accessed June 14, 2015,
https://www.foreignaffairs.com/articles/americas/2013-09-08/single-act-justice.
49 Johnny Dwyer, “The DEA’s Terrorist Hunters: Overreaching Their Authority,” Time,
August 8, 2011, accessed June 15, 2015, http://content.time.com/time/
world/article/0,8599,2087220,00.html; Farah, Fixers, Super Fixers and Shadow Facili-
tators.
50 Statement of James L. Capra, Chief of Operations DEA Before the House Committee on
Foreign Affairs Subcommittee on the Middle East and North Africa, “Future US
Counternarcotics Efforts in Afghanistan,” February 5, 2014, 1, accessed June 15,
2015, http://docs.house.gov/meetings/FA/FA13/20140205/101709/HHRG-113-
FA13-Wstate-CapraJ-20140205.pdf.
51 Statement of James L. Capra, 3–5.
52 “Terrorism and Financial Intelligence,” US Department of the Treasury, June 28, 2013,
accessed June 8, 2015, http://www.treasury.gov/about/organizational-structure/
offices/Pages/Office-of-Terrorism-and-Financial-Intelligence.aspx.
Terrorism and Crime 81
and Crime (UNODC) is a major player and offers a broad range of assistance
that includes practical support for CT legislation, counter illicit trafficking
measures and anti-money laundering and corruption initiatives. In 2002, In-
terpol created a Fusion Task Force to address the linkages between crime and
terrorism and provide data that could assist LE agencies to disrupt and dis-
mantle criminal entities that support terrorism. However, Interpol, like the UN,
depends on contributions from member states and its budget remains con-
strained.
International cooperation and coordination to address the crime-terror
nexus remains a work in progress. However, initiatives cannot be limited to
operational matters such as border security and improvements in intelligence
sharing and policing. The international community broadly recognizes that
more comprehensive strategies are needed to tackle governance, economic and
social issues that make so many states vulnerable to criminal and terrorist ac-
tivity.
Conclusion
Much of the discussion of the crime-terror nexus tends to focus upon terrorist
fundraising and cooperation with OCGs. However, it is important to bear in
mind that terrorists engage in a wide range of criminal activity for a variety of
reasons and their involvement in crime is not limited to cooperation with sep-
arate criminal entities. Indeed, of the four different types of relationship iden-
tified, appropriation appears to be just as, if not more common than interaction.
Above all, however, it is vital to realize that the nexus between crime and ter-
rorism is not uniform across the globe but varies from country to country and
over time. When it comes to addressing this problem, although there have been
some encouraging developments, there are still many ongoing challenges, not
least of them being bureaucratic boundaries between different organizations.
Looking for more effective ways of disrupting the crime-terror nexus and using
it to our advantage should be a priority in CT.
Bibliography
“Six Admit Planning to Bomb English Defence League Rally.” BBC News, April
30, 2013. Accessed May 17, 2015. www.bbc.com/news/uk-22344054.
“Terrorism and Financial Intelligence.” US Department of the Treasury, June 28,
2013. Accessed June 8, 2015. www.treasury.gov/about/organizational-
structure/offices/Pages/Office-of-Terrorism-and-Financial-
Intelligence.aspx.
“Transcript of Attorney General John Ashcroft Regarding Guilty Plea by Enaam
Arnaout.” US Department of Justice, February 10, 2003. Accessed June 12,
2013, www.justice.gov/archive/ag/speeches/2003/021003agenaamaran
outtranscripthtm.htm.
82 Sam Mullins, James K. Wither, and Steven R. Monaco
1 Speech to the American Bar Association, Margaret Thatcher Foundation, July 15, 1985,
accessed January 7, 2015, http://www.margaretthatcher.org/document/106096.
2 As quoted in Fawaz A. Gerges, The Far Enemy: Why Jihad Went Global (Cambridge:
Cambridge University Press, 2005), 193.
3 Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 2006), 174.
4 Brigitte Nacos, Terrorism and the Media (New York: Columbia University Press,
1994), 8.
85 DOI: 10.11610/ctt.ch06
86 Eric Young
opments. Particular attention is paid to the emergence of new media and how it
is transforming the terrorist-media relationship. In this context, two case stud-
ies are included in order to illustrate how contemporary terrorist groups are
making use of emerging media technologies – these focus upon al-Shabaab in
Somalia and the self-proclaimed ‘Islamic State’ (IS). The concluding section
then highlights some of the challenges involved from a combating terrorism
perspective.
A Complex Relationship
The following brief review of the academic literature provides a starting point
for understanding the relationship between terrorism and the media, although
it is by no means an exhaustive assessment of the topic. Before we proceed, it is
first necessary to provide some definitions. In this chapter, terrorism is defined
as the use of violence, or the threat thereof, by non-state actors against non-
combatants for political gain (see Chapter 1 for an-depth discussion of defini-
tions of terrorism). In essence, terrorism is a strategy for communicating objec-
tives and thus the media is a vital aspect. “Media” is defined as the channels of
communication of information and entertainment in a society such as publish-
ing (newspapers, magazines, books), radio, television, and the Internet. The
former three types of media are often considered to be ‘traditional’ or ‘classic’
media, while the Internet is often described as ‘new’ media. This is a distinction
that will be used throughout the chapter.
A caveat is also necessary. Although the focus of discussion is primarily on
democratic societies where freedom of speech is the norm, in states where the
media is not open and free, terrorists will inevitably find using the media for
their own ends considerably more difficult. In general, where the state has con-
trolled the media, terrorists have struggled to flourish, and while authoritarian
governments unconcerned about democratic freedoms can, of course, also im-
pose restrictive counter-terrorism (CT) measures, arguably part of the failure
of terrorism in repressive regimes is their lack of access to media outlets. How-
ever, this appears to be changing as access to the Internet is becoming increas-
ingly widespread and difficult to control. The discussion of ‘new’ media in par-
ticular is therefore relevant despite cultural, political and legislative differences
around the world.
Regardless of the political context, a clear link between terrorism and the
media is difficult to establish. Although terrorists strive to achieve political
change by inflicting fear upon their target audience, it is not at all clear that
greater media coverage results in greater ‘success,’ whether that be heightened
levels of fear, desired changes in behavior or in the political landscape. 5 Along
similar lines, Crenshaw points out that “the causal link between media cover-
age and the diffusion of terrorism has rarely been investigated, much less es-
dramatize events to retain readers and viewers. Although it has not been con-
clusively proven, such coverage is widely believed to contribute to dispropor-
tionate levels of public fear and anxiety about terrorism.12 The dynamics of this
seemingly symbiotic relationship may have been altered to some extent with
the rise of new media and the even greater proliferation of freely-accessible
news sources. Nevertheless, although terrorists and the media may be some-
what less dependent on one another than in the past, they still clearly share an
intense, mutual interest based upon the perceived potential for self-interested
gains.
Although many journalists pride themselves on professional integrity, the
media is not politically neutral and often deliberately frames stories about ter-
rorism in a particular way. “Framing” describes how a particular news story or
subject is presented and how this influences the way that it is understood and
interpreted by the audience.13 For example, many major newspapers avoid us-
ing the word “terrorist” or “terrorism” altogether, preferring to use “guerilla,”
“insurgent” or “violent extremist” instead. Indeed, news outlets often grapple
with terminology in the wake of a major attack and have either implicit or ex-
plicit internal policies on the use of “terrorist” and “terrorism.”14 Of course, the
language used by government officials also influences the media and vice versa.
“Agenda setting” refers to decisions made by media outlets regarding the
amount of coverage to give certain phenomena, which in turn may lead the
public to attribute more or less importance to a given issue over others. Ulti-
mately, terrorism is still widely covered by the national and international me-
dia, making it a prominent issue despite efforts to be objective. Terrorist at-
tacks in Western countries in particular gain widespread international public-
ity even though they tend to injure or kill a very small number of people com-
pared to other man-made or natural disasters, especially in comparison to non-
Western countries. For instance, there was a massive amount of media atten-
tion given to the January 2015 attack on the satirical magazine Charlie Hebdo in
Paris, which initially left twelve people dead (plus another five in connected in-
cidents). This can be compared to the attacks on Baga and several nearby vil-
lages in northern Nigeria during the same month, which reportedly killed as
many as 2,000 people and yet received very little international media atten-
tion.15
12 James Igoe Walsh, “Media Attention to Terrorist Attacks: Causes and Consequences,”
Institute for Homeland Security Solutions (2010), accessed January 7, 2015,
http://sites.duke.edu/ihss/files/2011/12/IHSS_Research-Brief_Walsh.pdf.
13 Pippa Norris, Marion Just, and Montague Kern, eds., Framing Terrorism. The News
Media, the Government and the Public (London: Routledge, 2003).
14 Philip Seib and Dana Janbek, Global Terrorism and New Media: The Post-Al Qaeda
Generation (London: Routledge, 2011), 6–10.
15 Maeve Shearlaw, “Why Did the World Ignore Boko Haram's Baga Attacks?” The
Guardian, January 12, 2015, accessed January 13, 2015, www.theguardian.com/
world/2015/jan/12/-sp-boko-haram-attacks-nigeria-baga-ignored-media.
Terrorism, Media, and the Rise of the Internet 89
www.islamdaily.org/en/saudi-arabia/5298.sawt-al-jihad-signs-of-a-saudi-al-qaeda-
resurgence.htm.
21 Marc Sageman, Leaderless Jihad (Philadelphia: University of Pennsylvania Press,
2008), 111.
22 Sageman, Leaderless Jihad.
Terrorism, Media, and the Rise of the Internet 93
23 HSMPress, “Twitter / @MajorEChirchir Your boys are a ...,” Twitter, December 16,
2011, accessed December 24, 2011, as quoted by Wikipedia, http://en.wikipedia.org/
wiki/Al-Shabaab_(militant_group)#Twitter_account, accessed March 25, 2015.
24 Christopher Anzalone, “The Nairobi Attack and Al-Shabab’s Media Strategy,” CTC
Sentinel 6, no. 10 (2013): 2.
25 Anzalone, “The Nairobi Attack and Al-Shabab’s Media Strategy,” 5.
94 Eric Young
Case Study 6.2. IS and New Frontiers in Terrorist Use of the Internet.
As quickly as IS took over large swaths of Iraq and Syria, likewise they were able to
conquer the online battle space between Salafi-jihadist terrorist organizations. Fluent
in YouTube, Twitter, Facebook, Instagram and Tumblr, as well as newer platforms
such as AskFM and Kik, IS has proven itself to be a powerful media machine. It has
several official or semi-official media production wings including the Al Hayat Media
Center, al-Furqan Media, Fursan al-Balagh media, and Asawirti Media, among others.
They are able to utilize the language skills of numerous international actors in Iraq
and Syria, but also abroad. The content is not only in Arabic and English, but also in
French, German, Indonesian, Russian and Turkish.27 This content is frequently trans-
lated again into dozens of other languages. Thus far, Al Hayat and associated groups
and individuals have proven to be relatively sophisticated and highly efficient at pro-
ducing a variety of slick-looking online videos on a regular basis. This combination of
quality and quantity represents a new level of development in terrorist use of the In-
ternet and may provide a glimpse into the future of terrorism and the media.
IS’s media operations have two key strategic aims: to recruit individuals from out-
side of Iraq and Syria and to provoke the United States and its allies into a military re-
sponse. IS does this using several platforms: it has an online English-language maga-
zine (Dabiq) and produces in-depth reports (Insight into the Islamic State), both of
which bear some similarity to AQAP’s Inspire. However, IS movies, such as the Clang-
ing of the Swords, are often filmed in high definition (HD) video and contain quality
graphics and logos. This also includes their much talked about and highly stylized
videos of beheadings and other grizzly executions. IS has also been extremely active
on Twitter and other micro-blogging platforms, reportedly producing some 90,000
tweets and other social media outputs every day. These include ‘Mujatweets,’ a high-
definition video series with sophisticated graphics that appears to be designed to ap-
peal specifically to Western audiences.
IS is also adept at using techniques such as hashtag campaigns, to give the impres-
sion of a larger social-media presence and online network than it actually has. 28 They
have also created various applications, such as “Fajr al-Bashaer” (Dawn of Good Tid-
ings, @Fajr991) to target specific audiences and spread their message. In addition,
there are hundreds of amateur videos and other independent pieces of propaganda
that are uploaded onto YouTube and other platforms which are not officially pro-
duced by IS, but rather by individual members and supporters acting on their own.
Although the quality of IS’s official propaganda is much better than what has been
produced by terrorist groups in the past, in reality it is still relatively basic, shot using
readily-available commercial high-definition and digital single-lens reflex (DSLR)
cameras and edited using equally available, user-friendly software and mobile Apps.
Nevertheless, these productions have proven to be popular and highly effective re-
cruitment tools. These developments, however, should not be surprising. As men-
tioned above, terrorist groups simply adapt to the media technology of the time and IS
is doing just that. What is more interesting is IS’s particular media style and the inter-
national reaction to it. As The Guardian succinctly described it:
Pinning down Isis’s visual style is harder. The martial triumphalism has inevitably
drawn comparisons with Triumph Of The Will but the connection is tenuous – not least
because Leni Riefenstahl had the funds, hardware and ranked personnel of the Third
Reich at her disposal. Others have likened Isis’s fast-cutting stylistic overkill to Oliver
Stone’s Natural Born Killers, or even horror movies like Saw. At times, the fetishised,
HD, slo-mo combat brings to mind The Hurt Locker, Kathryn Bigelow’s Oscar-winning
Iraq war drama; at others, the cheap production values and portentous narration re-
semble a bad History Channel documentary. None of these quite capture it. What no-
body wants to admit is that Isis could have fashioned a visual aesthetic of its own.29
Much of IS’s media is likely for its own, internal consumption, to motivate its fol-
lowers and fighters. But it also clearly targets the international media, creating con-
tent which is designed to capture the attention of a global audience. With such strong
competition within the international media, along with easy online access to its in-
tended audiences, IS has been highly successful in having its story told and re-told
again. However, it is important to realize that this is largely thanks to the style of their
online productions, rather than simply content. The question is whether IS will be
able to sustain people’s interest over the long term. Will it have the capability, tech-
nical competence, and savvy to continue to produce content which seems both rele-
vant and compelling to an international audience which is already sensitized to their
brand?
28 Kathy Gilsinan, “Is ISIS’s Social-Media Power Exaggerated?” The Atlantic, February
23, 2015, accessed February 24, 2015, www.theatlantic.com/international/archive/
2015/02/is-isiss-social-media-power-exaggerated/385726/.
29 Steve Rose, “The Isis Propaganda War: A Hi-Tech Media Jihad,” The Guardian, October
7, 2014, accessed March 24, 2015, www.theguardian.com/world/2014/oct/07/isis-
media-machine-propaganda-war.
96 Eric Young
fluence existing and new audiences alike. They have become skilled producers
and distributors of interactive content and have thus been able to successfully
brand their product and ‘sell’ it. In that respect, terrorists are similar to inter-
national corporations and businesses in their use of new media platforms. As
well as making use of off-the-shelf technologies, they will continue to develop
their own applications and tools, and will continually adapt as technology ad-
vances in order to exploit the ever-changing media landscape to their ad-
vantage.
30 For a good discussion on these three approaches, see COT Institute for Safety,
Security and Crisis Management, “Terrorism and the Media,” July 23, 2008, accessed
March 15, 2015, https://docs.google.com/document/preview?hgd=1&id=1X6a-
7OLuTZZN4S6Q8vBqSzNJ6DSkxf9P4be8raiW4gA&pli=1.
31 For more on this point, see Nacos, Terrorism and the Media, 122–148.
Terrorism, Media, and the Rise of the Internet 97
ism on this new battlefield will thus take a comprehensive, inter-agency, inter-
national and whole-of-society approach. However, given the relatively sluggish
ability of bureaucracies to adapt, this will be extremely difficult to achieve, es-
pecially given the rapid pace of change in the digital environment. Terrorists
have proved far more agile and adaptable than their government opponents
and they have readily embraced new media to the extent that it is now an inte-
gral part of their strategy and tactics.
Conclusion
Terrorist use of the media is nothing new. Terrorist groups over the last one
and a half centuries have used emerging technologies to spread their message
beyond the immediate impact zone of their attacks. Although gaining an appre-
ciation of this does not necessarily make it any easier to combat terrorist use of
the media, it certainly puts it in perspective. The fundamental challenge of try-
ing to counter terrorist exploitation of communications technology is an ongo-
ing problem. However, terrorist use of the Internet and the multitude of plat-
forms now available online have exacerbated the situation. The terrorists’ abil-
ity to produce and distribute content globally, combined with greatly enhanced
opportunities for two-way interaction are significant developments that pose
important challenges for counter-terrorism. If publicity is the “oxygen of ter-
rorism,” terrorists are now able to breathe more freely and deeply.
Bibliography
Ajbaili, Mustapha. “How ISIS Conquered Social Media.” Al Arabiya News, June
24, 2014. Accessed March 26, 2015. http://english.alarabiya.net/en/
media/digital/2014/06/24/How-has-ISIS-conquered-social-media-.html.
Alexander, Yonah. “Terrorism and the Media: Some Considerations.” In Terror-
ism: Theory and Practice, edited by Yonas Alexander, David Carlton, and
Paul Wilkinson, 159-174. Boulder: Westview Press, 1979.
Anzalone, Christopher. “The Nairobi Attack and Al-Shabab’s Media Strategy.”
CTC Sentinel 6, no. 10 (2013): 1–6.
Burton, Fred. “Sawt al Jihad: Signs of Saudi al Jihad Resurgence.” Islam Daily
Observing Media, February 2, 2007. Accessed January 8, 2015.
www.islamdaily.org/en/saudi-arabia/5298.sawt-al-jihad-signs-of-a-saudi-
al-qaeda-resurgence.htm.
COT Institute for Safety, Security and Crisis Management. “Terrorism and the
Media.” July 23, 2008. Accessed March 15, 2015. https://docs.google.com/
document/preview?hgd=1&id=1X6a-7OLuTZZN4S6Q8vBqSzNJ6DSkxf9P4
be8raiW4gA&pli=1.
Crenshaw, Martha. Explaining Terrorism: Causes, Processes and Consequences.
London: Routledge, 2011.
Gerges, Fawaz A. The Far Enemy: Why Jihad Went Global. Cambridge: Cambridge
University Press, 2005.
98 Eric Young
1 The phrase has been attributed to the speaker of the Iranian Parliament, Hashemi
Rafsajani in 1988. See Lord Lyell, “Chemical and Biological Weapons: The Poor Man’s
Bomb,” Committees of the North Atlantic Assembly, October 4, 1996, accessed May
22, 2015, http://fas.org/irp/threat/an253stc.htm.
99 DOI: 10.11610/ctt.ch07
100 Robert B. Brannon
2 Michelle Nichols, “Syria Accuses Rebels of Planning Gas Attack Near Damascus,”
Reuters, April 2, 2014, accessed September 15, 2015, http://in.reuters.com/
article/2014/04/02/syria-crisis-chemicalweapons-un-idINL1N0MU12820140402.
3 “Al Muthanna Chemical Weapons Complex,” Central Intelligence Agency, April 23,
2007, accessed May 22, 2015, https://www.cia.gov/library/reports/general-reports-
1/iraq_wmd_2004/chap5_annxB.html.
4 Stephen Hummel, “The ISIL’s Theft of WMD Components in Iraq,” CTC Sentinel 7, no. 7
(July 2014): 2-3.
Terrorism and Weapons of Mass Destruction 101
has been the case when IS has added chlorine to conventional improvised ex-
plosive devices (IEDs) – mass effect perhaps, but not mass destruction.
Biological Weapons
Biological weapons (BWs) represent the use of living organisms to infect in-
tended victims with disease. These infectious diseases are generally rare in na-
ture. Biological agents can be divided into several categories, including bacteria
(anthrax), viruses (smallpox), rickettsiae (Q fever), and toxins (ricin).
Because these biological agents are alive, they spontaneously replicate. This
factor potentially increases the lethality if used as a weapon – an attractive op-
tion for a terrorist intent on perpetrating widespread harm in a specific popu-
lation. This makes BWs second only to nuclear from the perspective of num-
bers of people potentially killed or injured. Simple infrastructure associated
with agriculture, cooking, food storage, hospitals or pharmacies would be suffi-
cient to develop and maintain an arsenal of these weapons. Like CWs, BWs are
thus theoretically inexpensive and relatively easy to obtain, but also like CWs
they are very difficult to employ with any reasonable expectation of achieving
specific, desired results (see Case Study 7.2).
The fact that biological agents are alive is perhaps the principal reason they
are so hard to use as weapons. For example, the heat resulting from an explo-
sion in dispersal would likely result in killing the organisms before they could
cause significant harm. Weather could have equally debilitating consequences
because either wind or rain might cause physical changes to the basic elements
of composition. Using biological agents as weapons is therefore much more
complicated than most people realize.
Terrorist attempts to use biological agents have mostly fallen short of suc-
cess. Almost all threats to use BWs have proven to be false alarms. In one fa-
mous example, Aum Shinrikyo tried to produce and weaponize botulinum toxin
8 Kristin Crowe, “Salad Bar Salmonella,” Forensic Examiner 16, no. 2 (2007): 24.
Terrorism and Weapons of Mass Destruction 103
Radiological Weapons
Radiological weapons (RWs), or so-called ‘dirty bombs,’ are not nearly as de-
structive as nuclear weapons, and yet pose a serious danger, particularly as a
terrorist threat. Dirty bombs are weapons that use conventional explosives to
disseminate radioactive materials. It would be relatively simple to build and
easy to use a common explosive such as dynamite or C4, with some form of ra-
dioactive material attached, perhaps in the physical form of a powder or even
gas. However, the scale of destructive impact would be directly related more to
the explosion than to the radioactivity.
Dirty bombs are just one form of radiological dispersal device (RDD). Dis-
persion is also possible by depositing radioactive material in soil, food or wa-
ter, or using some form of airborne distribution system such as a crop-duster.9
In January 2014, the US Attorney’s office indicted Glendon Crawford and Eric
Feight for planning to develop a lethal radiation emitting device. According to
the FBI, the essence of the scheme was the creation of a mobile, remotely oper-
ated device capable of silently killing targeted individuals with lethal doses of
X-ray radiation.10 Despite these intentions, radiation scientists concluded that
the plan was not possible, describing it as “the stuff of comic books.” 11 Nev-
ertheless, the case demonstrates terrorists’ creativity and serves as an im-
portant reminder that all dual-use technologies must be safeguarded.
As with chemical and biological agents, the invisible and uncertain danger
from RWs would probably cause widespread fear and panic. A terrorist act in-
volving the dispersal of radioactive materials could contaminate a wide area,
making the treatment of casualties more difficult. Commercial and economic
losses might be sizable and long lasting, with recovery depending upon expen-
sive removal and cleansing operations.
RWs may be attractive options for terrorists owing to the relative ease of
their acquisition and use, as well as for their mass disruption potential. In
2007, a sting operation in the Republic of Georgia led to the arrest of a man
who was trying to sell a small amount (reportedly only 3.5 ounces, or about
100 grams) of highly enriched uranium.12 Although not enough material to
make a weapon, had it been strapped to a stick of dynamite and detonated, it
would have resulted in considerable panic. This incident represents one of the
most serious cases of smuggling of nuclear/radioactive material in recent
years, although there have been many other such incidents (see Case Study
7.3).
Despite the potential danger, it is important to remember that a dirty bomb
is not a nuclear device. The impact would be significant, but not truly mass de-
struction. In fact, there is evidence to suggest that internal consumption of ra-
diological material would be more harmful than the side-effects of a so-called
dirty bomb.13 Radiological threats can also rise from nuclear-related accidents
or sabotage. If someone flew an airplane into a nuclear power plant, conceiva-
bly it could cause an accident on the scale of the Chernobyl disaster in 1986,
which resulted in long-lasting radiological fallout. However, such an effect
could not be guaranteed and the event would not cause a nuclear reaction.
Nuclear Weapons
Of the four types of WMD, terrorist use of nuclear weapons arguably has the
lowest probability. Because of this, it is often all-too-easily dismissed. Yet nu-
clear weapons also have by far the greatest destructive capabilities – they are
the only true weapons of mass destruction. Few states have them, and as far as
we know, no terrorist organization has yet obtained them. We often speak of
these special weapons in terms of zero tolerance. What that means is simply
that there is no room for error. When the first nuclear weapons were devel-
oped, the process was so difficult and so expensive that it was thought that the
potential for proliferation was extremely limited. However, it is also true that
the gap between peaceful, or commercial, use of a nuclear program and poten-
tially harmful, or offensive, capability has narrowed. It is indeed possible that a
terrorist group could possess, and perhaps even use, a nuclear weapon in the
future.
12 Desmond Butler, “Georgian Sting Seizes Bomb Grade Uranium,” Washington Post,
January 24, 2007, accessed May 20, 2015, http://www.washingtonpost.com/wp-
dyn/content/article/2007/01/24/AR2007012401673_pf.html.
13 For example, Alexander Litvenenko died as a result of ingesting polonium 210 that
allegedly had been slipped into his tea at a London hotel in 2006 (see Luke Harding
and Ian Sample, “Polonium-210: The Hard-to-Detect Poison that Killed Alexander
Litvinenko,” The Guardian, November 6, 2013, accessed May 22, 2015,
www.theguardian.com/world/2013/nov/06/polonium-210-poison-alexander-
litvinenko.
Terrorism and Weapons of Mass Destruction 105
The purpose of this section is not to explain in detail every aspect of the sci-
ence involved in building and maintaining a nuclear weapon. Yet, it is helpful to
explain the essentials of that process in order to understand its risks and limi-
tations. Understanding these requirements enables us to grasp the scope of the
problem, and perhaps to know how best to deal with it. Nuclear explosions re-
lease energy by way of fission or fusion. Damage results from extremely high
temperatures as well as shock waves and enduring residual radiation. The
14 James Martin Center for Nonproliferation Studies, CNS Global Incidents and Traffick-
ing Database 2014 Annual Report (Nuclear Threat Initiative, 2015), 6, accessed May
22, 2015, http://www.nti.org/media/pdfs/global_incidents_and_trafficking2015_
2.pdf?_=1430242792.
15 See, for example, Jeffrey Bale, “The Chechen Resistance and Radiological Terrorism,”
The Nuclear Threat Initiative, April 1, 2004, accessed April 6, 2015, www.nti.org/
analysis/articles/chechen-resistance-radiological-terror/.
16 Gabriella Martinez and Joshua Partlow, “Stolen Cobalt-60 Found in Mexico,” Washing-
ton Post, December 5, 2013, accessed June 9, 2015, www.washingtonpost.com/
world/stolen-cobalt-60-found-in-mexico-curious-thieves-likely-doomed/2013/12/
05/262ef990-5d66-11e3-8d24-31c016b976b2_story.html.
106 Robert B. Brannon
these essential ingredients have been the exclusive property of states. Today,
only nine nations (including the recent addition of North Korea) are known to
have nuclear weapons. Iran is known to have a nuclear program but its ambi-
tions to become a nuclear-armed state are still uncertain. However, there is no
guarantee that nuclear weapons will be the exclusive purview of states in the
future.
Despite the scientific and technological challenges, it only takes approxi-
mately fifteen pounds (about 8 kilograms) of plutonium, or about 25 kilograms
for HEU, to build the smallest and ‘simplest’ nuclear weapon. This material
could be placed in a lead shielded cylinder measuring roughly 12 by 6 centime-
ters. With sufficient lead shielding, the material could potentially evade detec-
tion by screening machines in airports or at border crossings that use simple
radiation detection devices. Consequently, the possibility that terrorists might
obtain the requisite materials to build a bomb is very real (see Case Study 7.4).
In the context of this discussion, nuclear proliferation may be the greatest
threat to international security as the knowledge required to build nuclear
weapons is now far more widespread. Proliferation risks essentially fall into
four categories: 1) the knowledge and technological capability to make the
weapons; 2) materials that can be weaponized; 3) the weapons themselves,
and 4) the means to deliver them. Despite the fact that knowledge is readily
available, and technology can be bought or coerced, terrorist organizations al-
most certainly do not have the capability to build and maintain a nuclear arse-
nal of their own. Attention is perhaps better directed at how proliferation could
connect a terrorist organization with an existing weapon or nuclear materials
held by a state.
Paradoxically, future expectations are raised both for reducing nuclear
weapons arsenals and for the possibility of the first hostile atomic explosion
since 1945. The 1968 Treaty on the Non-Proliferation of Nuclear Weapons
(NPT) remains the pillar of international nuclear security. The treaty
recognizes only five nuclear weapon states (the United States, Russia, China,
France, and the United Kingdom) that enjoy special rights and privileges under
international law. The NPT regime remained remarkably stable until after the
Cold War. However, since then the development of nuclear weapons by India,
Pakistan and North Korea, as well as suspicions concerning Iran’s nuclear pro-
gram, have shaken confidence in the NPT regime to control nuclear prolifera-
tion. Therefore, the risk that terrorists could purchase or steal nuclear materi-
als from a ‘rogue state’ is arguably greater than ever before.
One such state is North Korea, which was included on the State Depart-
ment’s list of state sponsors of terrorism until 2008. North Korea boasts of an
active nuclear weapons program and has conducted tests with cruise missiles
as well as medium and intermediate-range ballistic missiles. In addition, the
country has a large stockpile of chemical and possibly biological weapons. A
decade of international efforts to quell North Korea’s nuclear ambitions has so
far been unsuccessful.
108 Robert B. Brannon
Although not a “rogue state,” Pakistan (like North Korea), is not a member of
the NPT. Concerns about Pakistan’s role in proliferation were highlighted by
the case of Dr. Abdul Quadeer (AQ) Khan. A respected and highly regarded sci-
entist and citizen of Pakistan, AQ Khan sold blueprints, technical design data,
specifications, components, machinery, enrichment equipment, and gas cen-
trifuges in a kind of nuclear shopping mall enterprise that ran unchecked for
years. He used middle-men and transit points in Dubai, Germany, Malaysia,
South Africa, Turkey, Switzerland, and the United Kingdom, to name some of
the more than 30 countries that were involved.19
Iran remains within the NPT, but its nuclear development program has
raised international concerns and is currently the subject of intense negotia-
tions. A recent IAEA report expresses guarded optimism. Iran has broadly co-
operated with monitoring and verification arrangements, but significant areas
of disagreement remain.20 If negotiations break down, Iran could pursue a nu-
clear weapons program legally by withdrawing from the NPT. If that should
happen, other states in the region might initiate or revive their nuclear weap-
ons programs in response, and of course Israel might find it impossible to re-
sist the urge to act preemptively in its own self-defense.
Add to this already volatile cocktail of instability the presence of a terrorist
group such as IS and we have a recipe for risk that may prove intolerable for
the entire global community. Some alarmist and unsubstantiated reports in the
media quoted ‘IS sources’ claiming that the group already has WMDs, including
a ‘nuclear’ weapon.21 There is evidence that AQ, especially prior to 9/11,
showed an active interest in acquiring nuclear weapons and even concocted
the religious arguments justifying their use.22 It is therefore unlikely that IS
would have ideological qualms about employing such weapons, should they ac-
tually acquire them. However, it is by no means clear that the group’s leader-
ship has any real intent, let alone the capability or opportunity to pursue the
development and weaponization of a nuclear device.
Although such an attack remains improbable, the international community
recognizes the particular hazard that nuclear terrorism represents. For exam-
ple, the Global Initiative to Combat Nuclear Terrorism (GICNT), co-founded by
the US and Russia, includes 86 member states. The GICNT’s mission is to
“strengthen global capacity to prevent, detect, and respond to nuclear terror-
ism by conducting multilateral activities that strengthen the plans, policies,
procedures, and interoperability of partner nations.”23 UN resolution 1540 was
enacted in the aftermath of the discovery of the AQ Khan network. The resolu-
tion calls upon states to “refrain from providing any form of support to non-
19 For a detailed description of the AQ Khan case see William Langewiesche, “The Wrath
of Khan,” The Atlantic, November 2005, accessed May 22, 2015,
www.theatlantic.com/magazine/archive/2005/11/the-wrath-of-khan/304333/.
20 IAEA, Implementation of the NPT Safeguards Agreement and Relevant Provisions of
Security Council Resolutions in the Islamic Republic of Iran, March 4, 2015, accessed
May 22, 2015, https://www.iaea.org/sites/default/files/gov2015-15.pdf.
21 See, for example, Reissa Su, “ISIS Threatens Use of Nuclear Bomb in London,”
International Business Times, December 2, 2014, accessed May 22, 2015,
http://au.ibtimes.com/isis-threatens-use-nuclear-bomb-london-un-ambassador-
warns-weapons-mass-destruction-1393880.
22 Rolf Mowatt-Larssen, Islam and the Bomb: Religious Justification For and Against
Nuclear Weapons (Cambridge, MA: Harvard Kennedy School, January 2011).
23 “The Global Initiative to Combat Nuclear Terrorism,” US Department of State,
undated, accessed May 22, 2015, http://www.state.gov/t/isn/c18406.htm.
110 Robert B. Brannon
Conclusion
Despite the currently threatening landscape of proliferation, there is an estab-
lished international norm that countries should not possess or use either bio-
logical or chemical weapons. Most of the world’s known stockpiles of BWs have
been destroyed and the bulk of the global CW arsenals will hopefully be elimi-
nated in the next ten years. Global expectations are that the existing stockpiles
of nuclear weapons will also be reduced, even if their elimination remains a
distant prospect. However, these optimistic forecasts apply only to states and
are not valid for violent non-state actors. Few, if any, terrorist groups currently
24 UN Security Council, Resolution 1540 (2004), April 28, 2004, accessed May 22, 2015,
http://www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/1540%20(2004).
25 Naeem Salik, “Nuclear Terrorism: Assessing the Danger,” Strategic Analysis 38, no. 2
(2014): 180.
26 Sam Nunn, “Remarks to the American Nuclear Society,” November 11, 2013, accessed
June 9, 2015, http://www.nti.org/analysis/speeches/remarks-senator-sam-nunn-
american-nuclear-society/.
27 “Remarks by President Barrack Obama,” The White House, Office of the Press
Secretary, April 5, 2009, accessed May 22, 2015, https://www.whitehouse.gov/
the_press_office/Remarks-By-President-Barack-Obama-In-Prague-As-Delivered/.
Terrorism and Weapons of Mass Destruction 111
Bibliography
“Broken Arrows: Nuclear Weapons Accidents.” Atomic Archive.com, undated.
Accessed May 22, 2015. http://www.atomicarchive.com/Almanac/
Brokenarrows_static.shtml.
“Radiological Dispersal Devices (RDDs).” Radiation Emergency Medical
Management, November 21, 2014. Accessed May 22, 2015.
http://www.remm.nlm.gov/rdd.htm.
“Remarks by President Barrack Obama.” The White House, Office of the Press
Secretary, April 5, 2009. Accessed May 22, 2015. www.whitehouse.gov/
the_press_office/Remarks-By-President-Barack-Obama-In-Prague-As-
Delivered/.
Bale, Jeffrey. “The Chechen Resistance and Radiological Terrorism.”The Nu-
clear Threat Initiative, April 1, 2004. Accessed April 6, 2015.
www.nti.org/analysis/articles/chechen-resistance-radiological-terror/.
Bhatt, Devika. “I’ll Do Jail, Says Nun, 84, Who Broke into Nuclear Warhead Site.”
The Times, February 17, 2014, 34.
112 Robert B. Brannon
http://in.reuters.com/article/2014/04/02/syria-crisis-chemicalweapons-
un-idINL1N0MU12820140402.
Nunn, Sam. “Remarks to the American Nuclear Society,” November 11, 2013.
Accessed June 9, 2015. http://www.nti.org/analysis/speeches/remarks-
senator-sam-nunn-american-nuclear-society/.
Office of Technology Assessment. Proliferation of Weapons of Mass Destruction:
Assessing the Risks, OTA-ISC-559. Washington, DC: U.S. Government Print-
ing Office, August 1993.
Salik, Naeem. “Nuclear Terrorism: Assessing the Danger.” Strategic Analysis 38,
no. 2 (2014): 173-84.
Shea, Dana A. Chemical Weapons: A Summary Report on Characteristics and Ef-
fects. Washington, DC: Congressional Research Service, 2013. Accessed
May 22, 2015. http://digital.library.unt.edu/ark:/67531/metadc227842/
m1/1/high_res_d/R42862_2013Sep13.pdf.
Su, Reissa. “ISIS Threatens Use of Nuclear Bomb in London.” International Busi-
ness Times, December 2, 2014. Accessed May 22, 2015. http://au.ibtimes.com/
isis-threatens-use-nuclear-bomb-london-un-ambassador-warns-weapons-
mass-destruction-1393880.
Testimony of Lieutenant General Ronald L. Burgess, Jr., Director, Defense Intel-
ligence Agency, before the Senate Armed Services Committee on 16 Febru-
ary 2012, NSA Archive. Accessed May 22, 2015. http://nsarchive.gwu.edu/
NSAEBB/NSAEBB439/docs/Underground-BurgessThreat.pdf.
UN Security Council. Resolution 1540 (2004), April 28, 2004. Accessed May 22,
2015. www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/1540%20
(2004).
US Department of State. “The Global Initiative to Combat Nuclear Terrorism,”
undated. Accessed May 22, 2015. http://www.state.gov/t/isn/c18406.htm.
Virtanen, Michael. “X-Ray Plot: Judge Says Glendon Scott Crawford, Eric J.
Feight Should Stay Jailed.” Huffington Post, June 20, 2013. Accessed May 22,
2015. www.huffingtonpost.com/2013/06/20/x-ray-plot_n_3474109.html.
Chapter 8
Jihadist Foreign Fighters
and ‘Lone Wolf’ Terrorism
Sam Mullins
Introduction
By April 2015, it was estimated that more than 25,000 ‘foreign fighters’ from
perhaps as many as 100 different countries around the world had flocked to
Syria and Iraq.1 Most are believed to have joined the so-called ‘Islamic State’
(IS) or al-Qaeda’s (AQ) official representative in the region, Jabhat al-Nusra
(JN). Not only does this contribute to continued instability in the Middle East,
but it also raises the risk of terrorist attacks committed by foreign fighters if
and when they return home. Indeed, this has already begun to happen with
successful attacks in Egypt in September 2013,2 Belgium in May 2014 3 and
Paris in November 2015. This is not to mention many historical cases as well as
continued terrorism threats emanating from Afghanistan, Somalia and Yemen
among other places. At the same time, there are increasing reports of ‘lone
wolf’/ lone-actor terrorism where people inspired by IS or AQ, who have not
received terrorist training overseas, carry out attacks on their behalf. As a
result, we have seen unprecedented levels of mobilization to violent jihad and
an increased threat of terrorism worldwide.
This chapter begins by clarifying what is meant by ‘foreign fighters’ and
‘lone wolf’ terrorism and then describes how these related challenges to global
security have developed and escalated over time. It then examines who is get-
ting involved, how and why they are becoming radicalized and what they are
doing in pursuit of violent jihad. The chapter concludes with a discussion of key
concerns for counter-terrorism (CT).
1 “UN says 25,000 foreigners have joined IS group, al Qaeda,” France 24, April 2, 2015,
accessed April 2, 2015, http://www.france24.com/en/20150402-un-report-25000-
foreign-fighters-joined-islamic-state-qaeda.
2 “Cairo Suicide Bomber Identified as a Former Army Officer,” The National, October
27, 2013, accessed April 21, 2014, www.thenational.ae/world/middle-east/cairo-
suicide-bomber-identified-as-a-former-army-officer.
3 “Brussels Jewish Museum Killings: Suspect ‘Admitted Attack’,” BBC News, June 1,
2014, accessed June 1, 2014, http://www.bbc.com/news/world-europe-27654505.
Terminology
Foreign fighters are defined here as anyone who leaves their country of resi-
dence, receives paramilitary-style training with a foreign terrorist organization
(FTO) and/or participates in related combat. Autonomous groups and individ-
uals operating independently of a FTO—without having been trained—will be
referred to collectively as freelance terrorists, while the term lone wolf, or lone
actor terrorist will be reserved specifically for those individuals who have
planned and/or conducted terrorist attacks entirely by themselves (lone actor
terrorism is thus a specific type or sub-set of freelance terrorism). In all cases
the focus will be upon violent jihadists who are ideologically aligned with
groups like AQ and IS and share the fundamental belief that violence against
the perceived ‘enemies of Islam’ is both justified and necessary.
4 Bryan Glyn Williams, “On the Trail of the ‘Lions of Islam’: Foreign Fighters in
Afghanistan and Pakistan, 1980–2010,” Orbis 55, no. 2 (2011): 216–39.
5 For further details see Thomas Hegghammer, “The Rise of Muslim Foreign Fighters:
Islam and the Globalization of Jihad,” International Security 5, no. 3 (2010): 53–94.
6 Gretchen Lacharite, “Kasi Gets Death in CIA Killings,” Washington Times, January 24,
1998, accessed July 4, 2012, http://www.highbeam.com/doc/1G1-58330821.html.
7 Peter Lance, 1000 Years for Revenge: International Terrorism and the FBI - The Untold
Story (New York: ReganBooks, 2003).
Jihadist Foreign Fighters and ‘Lone Wolf’ Terrorism 117
attempted bombing in France in 1996.8 None of these early operations were di-
rected by AQ. However, bin Laden declared war against America in August of
1996, which was followed by the formation of the “World Islamic Front against
Jews and Crusaders” and the bombing of the US embassies in Kenya and Tan-
zania in 1998. If there was any remaining doubt that AQ meant business, this
was erased by the subsequent bombing of the USS Cole in 2000 and the attacks
on the World Trade Center and the Pentagon on September 11, 2001.
In the fifteen years since then, events have combined to facilitate the contin-
ued rise of jihadist foreign fighters as well as incidents of freelance and lone ac-
tor terrorism. The destruction of AQ’s base of operations in Afghanistan and
the continuous capture and killing of key operatives around the world forced
the terrorists to re-organize in order to survive. In doing so, they have been
able to capitalize on conflict and instability in Africa, the Middle East and Asia,
establishing no less than six official branches of AQ over the years and attract-
ing thousands of international supporters. Prior to the conflict in Syria, hun-
dreds of foreign jihadist volunteers made their way to train and fight in Af-
ghanistan and Northwest Pakistan after 2001.9 As many as 5,000 foreigners—
mostly from the Middle East and North Africa—fought in Iraq between 2003
and 2008.10 Several hundred travelled to Somalia to join with al-Shabaab begin-
ning around 2006,11 while significant—but unknown—numbers also joined
with al-Qaeda in the Arabian Peninsula (AQAP) in Yemen and al-Qaeda in the
Islamic Maghreb (AQIM) in West Africa, as well as a variety of other organiza-
tions.
AQ was thus able to transform during this period from a relatively finite or-
ganization into a sprawling, transnational franchise. As a result, they were able
to inspire, train and sometimes directly utilize foreign volunteers for a variety
of terrorist attacks, including bombings in Casablanca and Istanbul in 2003,
Madrid in 2004 and London in 2005. In spite of these successes, however, AQ’s
ability to strike against priority targets in the West diminished and its most
ambitious plans were disrupted, including the 2006 liquid bomb plot, the 2009
attempt to bring down an airplane over Detroit, and the 2010 attempted
bombing of two cargo planes also bound for the US.
No doubt frustrated by these continued failures, AQ officials have increas-
ingly sought to encourage acts of freelance and lone actor terrorism as a means
of attacking the West. There is no greater example of this than Abu Musab al-
Suri’s ‘Global Islamic Resistance Call’ which was published online in 2005. In it,
8 Stewart Bell, “Terrorist Returns: Tory Urges Ottawa to Consider Revoking Citizen-
ship,” National Post, February 26, 2005, accessed April 4, 2015, http://army.ca/
forums/index.php?topic=27388.0.
9 Williams, “On the Trail of the ‘Lions of Islam’.”
10 Aaron Y. Zelin, “The Return of Sunni Foreign Fighters in Iraq,” The Washington Insti-
tute, June 12, 2014, accessed June 13, 2014, www.washingtoninstitute.org/policy-
analysis/view/the-return-of-sunni-foreign-fighters-in-iraq.
11 Christopher Anzalone, “Kenya’s Muslim Youth Center and Al-Shabab’s East African
Recruitment,” CTC Sentinel 5, no. 10 (2012): 9–13.
118 Sam Mullins
liever” using any means available.16 Numerous acts of freelance terrorism per-
petrated since then appear to have been at least partially inspired by IS,
although the reality is sometimes complicated (see Case Study 8.1). What is
abundantly clear, however, is the fact that both foreign fighters and freelance/
lone-actor terrorists present significant challenges to global security and will
continue to do so for the foreseeable future.
Profiles
Research has consistently shown that there is no single demographic profile of
a terrorist. Young males of course make up the majority of foreign fighters and
freelance terrorists, but increasing numbers of females are also getting in-
16 Abdul Hameed Bakier, “The Islamic State Issues a Statement in an Effort to End the
Inter-Jihadist Rivalry,” Terrorism Monitor 12, no.19 (October 2014), accessed April 5,
2015, http://www.jamestown.org/programs/tm/single/?tx_ttnews%5btt_news%
5d=42941.
17 Greg Botelho and Ray Sanchez, “France: Raids Kills 3 Suspects, Including 2 Wanted in
Charlie Hebdo Attack,” CNN, January 21, 2015, accessed April 6, 2015,
http://edition.cnn.com/2015/01/09/europe/charlie-hebdo-paris-shooting/.
120 Sam Mullins
volved and there is a great deal of diversity. People who are socially, politically,
and economically marginalized may be particularly susceptible to radicaliza-
tion and recruitment. However, there are many well-educated people with rela-
tively good prospects in life who are also drawn to terrorism. For instance,
Walid Badr, who trained in Syria and blew himself up in Cairo in September
2013, had previously risen to the rank of major in the Egyptian army.18 In Au-
gust 2014, it was reported that a Tunisian chemistry and physics student was
the owner of a laptop found in Syria which contained instructions for chemical
and biological weapons.19 In March 2015, it was reported that a group of nine
British medical students had gone to join IS.20 There are many more examples
like this from recent history, which demonstrate that it is not simply poor and
uneducated people who are involved in jihadist terrorism. Similarly, although
the majority of foreign fighters who have gone to Syria and Iraq are believed to
come from the Middle East and North Africa, up to 20 percent have come from
Western Europe, with significant numbers coming from elsewhere around the
globe – thus demonstrating that it is an incredibly diverse phenomenon.21
Given that there is no uniform profile of a foreign fighter and reliable data
are generally lacking, it is unclear to what extent lone actor jihadists are differ-
ent. In contrast to foreign fighters, it appears that most appear to come from
the West. However, there have also been cases in the United Arab Emirates, for
example, and as far afield as Indonesia. A growing number of non-Western
countries are therefore becoming affected. Perhaps most significantly, research
suggests that lone actors are more likely to be suffering from some form of psy-
chopathology and are more likely to be described as socially isolated at the
time of conducting an attack.22 Nevertheless, and despite the relatively small
numbers involved, there is still a wide variety of people who are willing to re-
sort to acts of terrorism by themselves, just as there is among those who
choose to join with FTOs.
Motivations
The motives which drive jihadist foreign fighters and freelance terrorists are as
varied as their demographic profiles.23 Among foreign fighters, there is fre-
quently an altruistic desire to help and defend their fellow Muslims and to af-
fect political change. In addition, there are motives of revenge, sectarian rival-
ries, desires for meaning and adventure, a macho fascination with violence, and
the idealistic wish to live in a ‘true’ Islamic society as they see it. Some are also
motivated by a desire for redemption from a life of crime, or simply by eco-
nomic reasons for those who are living in poverty and are promised a salary to
fight for an organization like IS. For many, social motives, such as loyalty,
friendship and peer-pressure also come into play. Even lone actors see them-
selves as part of the broader social movement despite their physical isolation. 24
They are also clearly influenced by jihadist propaganda and ideology, and yet at
the same time personal motivations relating to social or psychological difficul-
ties often contribute as well.25 Ultimately, the precise mix of motivations and
goals will vary from person to person and may change over time, depending
upon circumstances (see Case Study 8.2). Realizing this complexity, jihadist or-
ganizations deliberately try to appeal to a range of different motivations in
their propaganda in order to attract as many people as possible.
23 Frank Ciluffo, Magnus Ranstorp, and Jeffrey Cozzens, Foreign Fighters: Trends,
Trajectories and Conflict Zones (Washington, DC: George Washington University
Homeland Security Policy Institute, 2010); Hegghammer, “The Rise of Muslim
Foreign Fighters”; Orla Hennessy, “The Phenomenon of Foreign Fighters in Europe,”
International Centre for Counter-Terrorism (2012), accessed April 14 2014,
www.icct.nl/download/file/ICCT-Hennessy-Phenomenon-of-Foreign-Fighters-
Europe-July-2012.pdf; Spaaij, “The Enigma of Lone Wolf Terrorism”; Williams, “On
the Trail of the ‘Lions of Islam’.”
24 Lars Erik Berntzen and Sveinung Sandberg, “The Collective Nature of Lone-Wolf
Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement,” Terrorism
and Political Violence 26, no. 5 (2014): 759–79.
25 Spaaij, “The Enigma of Lone Wolf Terrorism.”
26 Marc Sageman, Understanding Terror Networks (Philadelphia, PA: University of Penn-
sylvania Press, 2004).
122 Sam Mullins
Operational Activities
Prior to departing their home country, foreign fighters often prepare by en-
gaging in domestic training exercises in order to improve their physical fitness.
They may also spend time raising funds (which sometimes involves criminal
activity) and conducting online research concerning details of travel and their
intended destination. Following advice issued by FTOs, they will often try to
avoid attracting attention to themselves or revealing the nature of their trip, for
example by purchasing return tickets, trying to look like tourists, taking an in-
27 Clinton Watts, “Foreign Fighters: How Are They Being Recruited? Two Imperfect
Recruitment Models,” Small Wars Journal, June 22, 2008, accessed April 14, 2014,
http://smallwarsjournal.com/jrnl/art/foreign-fighters-how-are-they-being-
recruited.
28 Sageman, Understanding Terror Networks.
29 Kiran Moodley, “Brusthom Ziamani’s Girlfriend: ‘He’d Mimic the Speech of Lee
Rigby’s Killer’,” The Independent, February 20, 2015, accessed February 20, 2015,
http://www.independent.co.uk/news/uk/brusthom-ziamanis-girlfriend-hed-mimic-
the-speech-of-lee-rigbys-killer-10059609.html.
30 For example, see Sam Jones, “Jihad by Social Media: How Thousands of Young Mus-
lims are Being Radicalised Through Social Networks and Propelled Towards Violence
in Syria,” FT Magazine, March 28, 2014, accessed March 28, 2014, www.ft.com/cms/
s/2/907fd41c-b53c-11e3-af92-00144feabdc0.html.
Jihadist Foreign Fighters and ‘Lone Wolf’ Terrorism 123
direct route to the conflict zone, creating a cover story and avoiding carrying
incriminating materials.32
Once they arrive at their final destination they must undergo basic training,
which typically involves several weeks of physical exercise, instruction in fire-
arms and ideological indoctrination. More advanced courses, such as training
in explosives, are also sometimes available. However, the exact nature and
length of training varies from group to group and depending on circumstances,
as do subsequent opportunities. Some will receive nothing more than a short
course on making improvised explosive devices (IEDs) before being sent home
to conduct an attack. Others may volunteer to become suicide bombers or be
given the opportunity to participate in combat roles against opposition forces.
Occasionally, foreign fighters (such as Omar al-Shishani from Chechnya, or Abu
Sulayman al-Muhajir from Australia) obtain leadership positions. However,
such cases are relatively rare and foreign fighters often find themselves at the
bottom of the organizational hierarchy.33 Indeed, because they are generally in-
experienced, they are not particularly effective fighters and are therefore used
as cannon-fodder, or else given mundane tasks to do such as guard duty. Alter-
31 Mark Gollom and Tracey Lindeman, “Who is Martin Couture-Rouleau?” CBC News,
October 22, 2014, accessed October 23, 2014, www.cbc.ca/news/canada/who-is-
martin-couture-rouleau-1.2807285.
32 For example, see Meir Amit Intelligence and Terrorism Information Center, “ISIS
Updates Security Tips to Operatives Traveling to Syria,” American Center for
Democracy, March 25, 2015, accessed April 13, 2015, http://acdemocracy.org/isis-
updates-security-tips-to-operatives-traveling-to-syria/.
33 Hannah Lucinda Smith, “Death Row Prisoner Tells of Escape from ISIS Jail,” The
Times, April 10, 2015, accessed April 13, 2015, www.thetimes.co.uk/tto/news/
world/middleeast/article4406569.ece.
124 Sam Mullins
tell other people about their plans, but are simply not taken seriously at the
time.38 What’s more, due to their inexperience and lack of training, they tend to
have three particular points of vulnerability:39 1) during the acquisition or
manufacture of weapons or improvised explosives; 2) whilst conducting sur-
veillance of targets; and 3) when actually deploying to conduct an attack. Naser
Jason Abdo, who was planning a jihadist-inspired attack on a restaurant near
Fort Hood in Texas, is an illustrative example. In July 2011 he visited a local
gun-store to buy ammunition and smokeless gunpowder needed to make ex-
plosives. However, he raised the suspicion of the clerk at the store because he
arrived in a taxi, asked what the powder he was buying was actually for and
paid in cash.40 The clerk promptly reported him to police, after which he was
arrested at a motel in possession of a variety of incriminating materials.
Slightly unusual behavior and attention to details on the part of ordinary mem-
bers of the public can sometimes make the difference between life and death.
The problem with threat indicators, however, is that the information may seem
unreliable, they tend to provide only a very limited window of opportunity for
intervention, and it is not always possible to follow them up, given limited re-
sources. In addition, similar to the challenges of dealing with foreign fighters, it
is not always possible to detain or prosecute freelance terrorists based on in-
telligence alone.
That said, intelligence of course is vital for dealing with all manner of ter-
rorism threats, and there are three areas in particular where there is always
room for improvement:41 1) international cooperation and sharing of infor-
mation between relevant government agencies; 2) cooperation with the private
sector (especially online companies such as Facebook and Twitter); and
3) positive engagement with communities and families of people affected by
extremism, for example by way of public information campaigns, community
policing, dedicated family liaison officers or work with NGOs. Enhanced
cooperation with partners, including members of the public can stimulate the
flow of information and help to identify potential foreign fighters or freelance
terrorists before they have a chance to act.
However, the question remains of what to do with suspects once they have
been identified. Ultimately, repressive measures can only hope to treat the
symptoms of the problem rather than the underlying causes, and they have
failed to prevent the growth of both foreign fighters and freelance terrorism. In
recognition of this, more and more countries are investing in so-called soft in-
terventions which are collectively referred to as countering violent extremism
(CVE – see Chapter 13). Indeed, the UN has formally noted that CVE measures
are a vital component for dealing with the problem of foreign fighters 42 and
they may also have a role to play in combating the threat of freelance terrorism.
In particular, targeted ‘de-radicalization’ programs may be used to directly en-
gage both with suspected and convicted terrorists in an attempt to reduce the
threat of violence. In other words, they may be used to prevent a person from
further radicalization, or to rehabilitate them if they are already involved in
terrorist activity, whether at home or abroad.
Such programs are by no means perfect and they are certainly no guarantee
of success. However, they add another set of tools to the CT toolbox, expand the
resources available for dealing with the problem and go some way towards
achieving a more comprehensive, ‘whole-of-society’ approach. Softer interven-
tions can also help to fill some of the gaps in ‘traditional’ CT – in particular,
what to do with: 1) people like Martin Couture-Rouleau, who have been pre-
vented from travelling abroad but who cannot be prosecuted (and therefore
present a terrorism risk at home); 2) known, radicalized freelance extremists
who have not yet broken the law; 3) people currently overseas fighting for
FTOs; 4) terrorists who are currently in prison; 5) those who have recently
been released from prison; and 6) returned foreign fighters. Even if such inter-
ventions fail to steer a person away from violence, they nevertheless raise the
level of visibility of that person and enable ongoing risk assessment.
Conclusion
Jihadist foreign fighters and freelance terrorists are often thought of as being
distinct from one another, and they do indeed represent quite different chal-
lenges to security, especially regarding visibility and capability. In addition,
genuine lone actors tend to exhibit higher rates of psychological disorder and
follow comparatively individualized pathways of radicalization. Nevertheless,
the development of both has been tied at least in part to the evolution of AQ
and the “global Salafi jihad.” Furthermore, experienced foreign fighters often
recruit and cooperate with untrained violent extremists. Sometimes people
only turn to freelance terrorism because they are unable to become a foreign
fighter, and there are overlaps on practically every dimension, from motives to
modus operandi. It is also evident that both types of terrorism have become
more common in recent years.
From the perspective of CT, it is vital to understand the similarities, connec-
tions and differences between foreign fighters and freelance terrorists and to
look for ways to prevent, manage and mitigate the threat that they pose. In do-
42 United Nations Security Council, Resolution 2178, September 24, 2014, accessed
September 16, 2015, www.un.org/en/ga/search/view_doc.asp?symbol=S/RES/2178
(2014).
128 Sam Mullins
ing so, it is important to recognize that repressive measures alone are not
enough to solve what is a highly complex and long-term problem. In particular,
there is a need to counter the appeal of extremist ideology and to address un-
derlying political and social grievances, which cannot be achieved using law
enforcement or military operations.
Bibliography
“Brussels Jewish Museum Killings: Suspect ‘Admitted Attack’.” BBC News, June
1, 2014. Accessed June 1, 2014. http://www.bbc.com/news/world-europe-
27654505.
“Cairo Suicide Bomber Identified as a Former Army Officer.” The National, Oc-
tober 27, 2013. Accessed April 21, 2014. www.thenational.ae/world/
middle-east/cairo-suicide-bomber-identified-as-a-former-army-officer.
“First Expert Meeting of the GCTF “Foreign Terrorist Fighters” Initiative: Police
and Border Law Enforcement, Judiciary, and Information Sharing.” Global
Counterterrorism Forum, May 15, 2014. Accessed September 10, 2014.
www.thegctf.org/documents/95472/109184/14May27_Summary_First+E
xpert+Meeting+of+FTF+Initiative_14-15+May+2014+Marrakech.pdf.
“Nine British Medics Feared to Have Crossed into Syria.” BBC News, March 27,
2015. Accessed March 27, 2015. www.bbc.com/news/uk-32006445.
“UN says 25,000 foreigners have joined IS group, al Qaeda.” France 24, April 2,
2015. Accessed April 2, 2015. http://www.france24.com/en/20150402-
un-report-25000-foreign-fighters-joined-islamic-state-qaeda.
Anzalone, Christopher. “Kenya’s Muslim Youth Center and Al-Shabab’s East Af-
rican Recruitment.” CTC Sentinel 5, no. 10 (2012): 9–13.
Bakier, Abdul Hameed. “The Islamic State Issues a Statement in an Effort to End
the Inter-Jihadist Rivalry.” Terrorism Monitor 12, no. 19 (October 2014).
Accessed April 5, 2015. http://www.jamestown.org/programs/tm/single/
?tx_ttnews%5btt_news%5d=42941.
Bell, Stewart. “Terrorist Returns: Tory Urges Ottawa to Consider Revoking Citi-
zenship.” National Post, February 26, 2005. Accessed April 4, 2015.
http://army.ca/forums/index.php?topic=27388.0.
Berntzen, Lars Erik, and Sveinung Sandberg. “The Collective Nature of Lone-
Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Move-
ment.” Terrorism and Political Violence 26, no. 5 (2014): 759–79.
Black, Andrew. “Al-Suri’s Adaptation of Fourth Generation Warfare Doctrine.”
Terrorism Monitor 4, no. 18 (2006). Accessed April 4, 2015.
www.jamestown.org/programs/tm/single/?tx_ttnews[tt_news]=908.
Botelho, Greg, and Ray Sanchez. “France: Raids Kills 3 Suspects, Including 2
Wanted in Charlie Hebdo Attack.” CNN, January 21, 2015. Accessed April 6,
2015. http://edition.cnn.com/2015/01/09/europe/charlie-hebdo-paris-
shooting/.
Jihadist Foreign Fighters and ‘Lone Wolf’ Terrorism 129
Ciluffo, Frank, Magnus Ranstorp, and Jeffrey Cozzens. Foreign Fighters: Trends,
Trajectories and Conflict Zones. Washington, DC: George Washington Uni-
versity Homeland Security Policy Institute, 2010.
Doornbos, Harald, and Jenan Moussa. “Found: The Islamic State’s Terror Lap-
top of Doom.” Foreign Policy, August 28, 2014. Accessed August 29, 2014.
http://foreignpolicy.com/2014/08/28/found-the-islamic-states-terror-
laptop-of-doom/.
Gill, Paul, John Horgan and Paige Deckert. “Bombing Alone: Tracing the Motiva-
tions and Antecedent Behaviors of Lone-Actor Terrorists.” Journal of Fo-
rensic Sciences 59, no. 2 (2014): 425–35.
Gollom, Mark, and Tracey Lindeman. “Who is Martin Couture-Rouleau?” CBC
News, October 22, 2014. Accessed October 23, 2014. www.cbc.ca/news/
canada/who-is-martin-couture-rouleau-1.2807285.
Hegghammer, Thomas. “Should I Stay or Should I Go? Explaining Variation in
Western Jihadists’ Choice between Domestic and Foreign Fighting.” Ameri-
can Political Science Review 107, no. 1 (2013): 1–15.
Hegghammer, Thomas. “The Rise of Muslim Foreign Fighters: Islam and the
Globalization of Jihad.” International Security 5, no. 3 (2010): 53–94.
Hennessy, Orla. “The Phenomenon of Foreign Fighters in Europe.” International
Centre for Counter-Terrorism (July 2012). Accessed April 14 2014.
www.icct.nl/download/file/ICCT-Hennessy-Phenomenon-of-Foreign-
Fighters-Europe-July-2012.pdf.
Jones, Sam. “Jihad by Social Media: How Thousands of Young Muslims are Being
Radicalised Through Social Networks and Propelled Towards Violence in
Syria.” FT Magazine, March 28, 2014. Accessed March 28, 2014.
www.ft.com/cms/s/2/907fd41c-b53c-11e3-af92-00144feabdc0.html.
Lacharite, Gretchen. “Kasi Gets Death in CIA Killings.” Washington Times, Janu-
ary 24, 1998. Accessed July 4, 2012. www.highbeam.com/doc/1G1-
58330821.html.
Lance, Peter. 1000 Years for Revenge: International Terrorism and the FBI - The
Untold Story. New York: ReganBooks, 2003.
Meir Amit Intelligence and Terrorism Information Center. “ISIS Updates Secu-
rity Tips to Operatives Traveling to Syria.” American Center for Democracy,
March 25, 2015. Accessed April 13, 2015. http://acdemocracy.org/isis-
updates-security-tips-to-operatives-traveling-to-syria/.
Mendelsohn, Barak. “Foreign Fighters – Recent Trends.” Orbis 55, no. 2 (2011):
189–202.
Moodley, Kiran. “Brusthom Ziamani’s Girlfriend: ‘He’d Mimic the Speech of Lee
Rigby’s Killer.’” The Independent, February 20, 2015. Accessed February 20,
2015. www.independent.co.uk/news/uk/brusthom-ziamanis-girlfriend-
hed-mimic-the-speech-of-lee-rigbys-killer-10059609.html.
130 Sam Mullins
1 See, for example, Jeffrey Record, Bounding the Global War on Terrorism (Carlisle, PA:
Strategic Studies Institute, December 2003); Tarak Barkawi, “On the Pedagogy of
Small Wars,” International Affairs 80, no. 1 (2004): 19–37; and Adam Roberts, “The
War on Terror in Historical Perspective,” Survival 47, no. 2 (2005): 101–30.
2 A useful summary of this approach is provided in Max Boot, Invisible Armies (New
York: Liveright, 2013), 535 – 46.
The Role of the Security Forces in Combating Terrorism 133
3 Mark Urban, Task Force Black: the Explosive Story of the SAS and the Secret War in
Iraq (London: Abacus, 2011), 270–71.
4 National Security Strategy, The White House, February 2015, 9-10, accessed May 21,
2015, http://www.whitehouse.gov/sites/default/files/docs/2015_national_security_
strategy_2.pdf.
5 Michael D. Lumpkin, Assistant Secretary of Defense, Special Operations and Low
Intensity Conflict, Statement to the Senate Armed Forces Committee, March 11, 2014,
accessed May 21, 2015, www.armed-services.senate.gov/imo/media/doc/Lumpkin_
03-11-14.pdf; and Eric Schmidt, “US Strategy to Fight Terrorism Increasingly Uses
Proxies,” New York Times, May 29, 2014.
6 Human Rights Watch, World Report 2014: Nigeria, undated, accessed May 21, 2015,
http://www.hrw.org/world-report/2014/country-chapters/nigeria.
134 James K. Wither
governance and institutional reforms have often ended in failure.7 Despite the
billions of dollars lavished on the Iraqi army prior to the US withdrawal in
2011, many units collapsed without a fight when confronted by IS fighters. In
Mali in 2012, a coup by army officers trained by the US deposed a democrati-
cally elected president. Potentially more successful is the Trans Sahara Counter
Terrorism Partnership (TSCTP). This covers ten countries in the Sahel and Ma-
ghreb and attempts to embed CT military capacity building in a broader context
of security sector reform, civilian government capacity building and regional
cooperation programs.8
Unmanned Aerial Vehicles (UAV), popularly known as drones, have proved
to be a highly effective means of applying discrete military force. Predator and
Reaper drones can linger for long periods over a target, collect real time intelli-
gence and use precision-guided munitions that can engage individuals, vehicles
or even hit specific rooms in buildings. Obtaining accurate statistics for the
number of militants killed in drone strikes in Pakistan, Yemen and Somalia is
difficult. For example, The Bureau of Investigative Journalism figures for the pe-
riod 2004–2015 suggest a minimum of 3200 and a maximum of 5133 persons
killed.9 The Bureau estimates that up to 1121 of these deaths may have been
non-combatants. However, it is likely that precision-guided attacks by un-
manned aircraft cause far less collateral damage than traditional air strikes
with standard ‘dumb’ bombs. Air raids have become the tactic of choice for
states seeking revenge for terrorist attacks against their citizens or territory. It
is not known how many civilians have been killed in recent air raids against IS
and other Salafi-jihadist groups by the air forces of states such as Jordan, Egypt
and Pakistan, not to mention the ‘barrel bombs’ employed by President Assad’s
forces in Syria.
SOF raids and drone strikes have proved tactically successful, killing much
of AQ’s leadership since 2001. However, although ‘decapitation’ strikes can
weaken a terrorist organization temporarily, well-established groups with
strong communal support appear to be resilient enough to survive the loss of
their leadership.10 The use of drones and hunter-killer raids has also had a
wider strategic impact that has proved potentially damaging to the overall CT
7 See, for example, Gordon Adams, “Ties that Bind,” The Foreign Policy Group, October
1, 2014, accessed May 21, 20015, http://foreignpolicy.com/2014/10/01/ties-that-
bind-2/.
8 Lesley Anne Warner, “The Trans Sahara Counter Terrorism Partnership: Building
Partner Capacity to Counter Terrorism and Violent Extremism,” The Center for
Complex Operations, March 2014. See also Eliza Griswold, “Can General Linder’s
Special Operations Forces Stop the Next Terrorist Threat?” New York Times Magazine,
June 13, 2014.
9 The Bureau of Investigative Journalism website was accessed in March 2015. It
includes details of the Bureau’s data collection methodology. Available at
www.thebureauinvestigates.com/category/projects/drones/drones-graphs/.
10 Jenna Jordan, “Attacking the Leader, Missing the Mark: Why Terrorist Groups Survive
Decapitation Strikes,” International Security 38, no. 4 (2014): 7–38.
The Role of the Security Forces in Combating Terrorism 135
Case Study 9.1. Find, Fix, Finish, Exploit, Analyze and Disseminate
(F3EAD).
US Special Operations Command (SOCOM) has exploited the micro-electronic innova-
tions of the so-called Revolution in Military Affairs (RMA) of the 1990s to create an in-
telligence and operations fusion which has been summarized as “find, fix, finish, ex-
ploit, analyze and disseminate (F3EAD).”11
F3EAD is a continuous process that allows SOF to use imagery and signals intelli-
gence (IMINT/SIGINT) as well as human intelligence (HUMINT) to anticipate enemy
operations, to identify, locate, and target their forces, and to exploit and analyze intel-
ligence gathered from captured enemy personnel and materials. For example, the US
Navy SEALS’ raid in Pakistan in May 2011 that killed AQ figurehead Osama bin Laden
unearthed a treasure trove of documents that provided the intelligence community
with significant insights into the current state of AQ and its membership. However,
operations generally seek to capture rather than kill terrorist suspects, as the interro-
gation of detainees can lead to vital information on additional terrorist operatives and
a group’s strategy and tactics. The fusion of operations and intelligence functions is
critical to produce the actionable intelligence (namely information that is accurate,
timely and detailed), that drives counter-terrorism at the tactical level. Former
Director of the Defense Intelligence Agency, Lieutenant General Michael T. Flynn has
described information and intelligence as “the fire and maneuver of the 21st Cen-
tury.”12
effort. SOF night raids angered Afghan civilians in affected areas. Although
most operations did not involve firefights, villagers complained that their
homes had been forcefully entered and the privacy of their families violated. As
a result, former President, Hamid Karzai placed a total ban on night raids in
2013.13
Most UAVs are used for reconnaissance and intelligence purposes, and close
air support to soldiers in combat. Their use in these roles in recognized conflict
zones has not generated controversy. However, the unilateral use of drones by
the US in foreign, sovereign countries has provoked criticism on moral, legal
and political grounds. Although estimates of the number of non-combatants
killed in drone strikes vary considerably, the perception that significant num-
bers of civilians have been killed has helped to fuel anti-American feelings in
Pakistan and Yemen. Both the Bush and Obama administrations have justified
targeted killings by invoking the right to self-defense under Article 51 of the UN
Charter given that the US is at war with AQ and affiliated groups. But lawyers
on both sides of the Atlantic have questioned the legality and morality of tar-
geted killings, not least because executed militants have been denied judicial
process.14 As a result of growing controversy, President Obama introduced
tighter controls on the use of drone strikes in 2013. The decision was taken to
curtail strikes in areas that were not recognized war zones and to shift respon-
sibility for drone operations in Yemen from the CIA to the military in order to
provide greater accountability.15 Nevertheless, drones remain an attractive op-
tion for targeting individuals that represent the greatest threat to the US and its
allies, since their use avoids placing military personnel at risk. Former CIA Di-
rector, Leon Panetta described drones as “the only game in town in terms of
confronting or trying to disrupt the al-Qaeda leadership.”16
14 Jonathan Masters, “Targeted Killings,” Council on Foreign Relations, May 23, 2013,
accessed May 21, 2015, http://www.cfr.org/intelligence/tergetd-killings/p9627.
15 “Text of President Obama’s May 23 speech on national security,” Washington Post,
May 23, 2013, accessed May 21, 2015, www.washingtonpost.com/politics/
president-obamas-may-23-speech-on-national-security-as-prepared-for-delivery/
2013/05/23/02c35e30-c3b8-11e2-9fe2-6ee52d0eb7c1_print.html. In practice, CIA
operations have not substantially changed.
16 Leon Panetta, “AFPAK Drone Strikes are the Only Game in Town,” New Perspectives
Quarterly 26, no. 3 (2009): 33–9.
17 Jean-Dominique Merchet, “Contre-terrorisme: le GIGN est en avance dans la guerre
du temps,” L’Opinion, July 2, 2013, accessed May 21, 2015, http://www.lopinion.fr/1-
juillet-2013/contre-terrorisme-gign-est-en-avance-dans-guerre-temps-1606.
The Role of the Security Forces in Combating Terrorism 137
ping and hostage-taking incidents. HRT agents train with elite military units
and many have taken a direct part in SOF raids outside of the US. One of the
oldest and most famous elite CT units is Germany’s Grenzshutzgruppe 9 (GSG-
9). The GSG-9 was formed within the Federal Border Police Force in 1973 as a
direct result of the German police’s tragic handling of the Black September ter-
rorist attack during the 1972 Munich Olympics. To date, GSG-9’s most distin-
guished public CT operation was the hostage rescue at Mogadishu in 1977,
when an assault team successfully saved all of the passengers from a hijacked
Lufthansa aircraft. Most GSG-9 activities remain classified, but they were em-
ployed at the conclusion of Operation Alberich in 2007, when a team arrested
three terrorists plotting major bomb attacks against American bases in Ger-
many (see Case Study 9.2).
Although kinetic operations grab the headlines, intelligence gathering is the
most common task for police and military CT units. In Northern Ireland, under-
cover operatives of the British Army’s 14 Intelligence Company and the Royal
Ulster Constabulary’s (RUC) Special Branch E4A unit were an effective means
of gathering intelligence on both Republican and Loyalist terrorist groups. Con-
currently, the UK’s Security Service, known colloquially as MI5, RUC Special
Branch and the Army’s Force Research Unit (FRU) were employed to recruit,
turn and run informers with links to terrorist organizations. By the 1990s, the
British security services were in a position to disrupt most terrorist plots in
Northern Ireland. However the security forces’ activities provoked controversy
as plain-clothes units were accused, with some justification, of operating out-
side of the rule of law. The Provisional Irish Republican Army’s (PIRA) political
wing, Sinn Fein, gained support from claims that covert police and military
units colluded with Loyalist terrorist organizations and had adopted a “shoot-
to-kill” policy against suspected PIRA members.18 Similar accusations were
made against the German government when Red Army Faction member, Wolf-
gang Grams, was shot during an attempted arrest by a plain-clothes GSG-9 unit
in 1993.
Sometimes government officials have deliberately created or backed para-
military forces that have operated illegally. The Grupos Antiterroristas de Liber-
ación (GAL) was established by rogue elements within the Spanish government
during the 1980s to conduct a ‘dirty war’ against members of ETA and Basque
nationalist sympathizers. Investigations into GAL’s activities caused significant
embarrassment to Felipe González’s Socialist government and some police of-
ficers and the Minister of Internal Affairs, Jose Barrionnuevo, were jailed. 19 Un-
leashing so called ‘death squads’ or ‘pseudo gangs’ can bring short term tactical
benefits, but their methods invariably undermine government legitimacy and
the rule of law. In democracies, their use supports the terrorists’ ultimate stra-
tegic objective of destroying the integrity of the state.
Historically, most democratic states have dealt with terrorism as a domestic
law enforcement issue rather than an existential threat that required a military
response. Consequently, the police, backed by the intelligence services, have
taken the lead in CT and terrorist perpetrators have been dealt with under the
criminal justice system. Until recently, the police emphasis was normally on
crime scene investigation, the collection of evidence, and the prosecution of ar-
rested terrorists. However, since the early 2000s, police services have had to
adapt to the changing character of terrorism. Against informal, networked ter-
rorist groups that aim to carry out indiscriminate, mass casualty attacks
against civilians, the law enforcement emphasis has had to shift to an intelli-
gence-led approach that seeks to disrupt plots and arrest suspects at the earli-
est opportunity.20 This requires police forces to work ever more closely with
domestic and, increasingly, foreign intelligence services and usually involves
additional legal sanctions to conduct intrusive surveillance such as access to
property and the interception of personal communications. Close cooperation
between MI5 and the Metropolitan Police, for example, was essential for the
successful conclusion of Operation Crevice in 2004, which prevented a major
vehicle-based bombing campaign in London. At the time, Crevice was the larg-
est CT operation ever mounted by the British police and MI5. During the height
of the operation in February-March 2004 alone, the investigation absorbed
34,000 man-hours of police and intelligence activity.21
Despite major terrorist atrocities such as the bombings in Madrid (2004)
and London (2005), intelligence-led policing has proved to be effective and has
thwarted numerous AQ affiliated terrorist plots in North America and Europe
before the general public was placed in danger. As with most CT initiatives,
preemptive elements of intelligence-led policing have provoked criticism from
civil rights groups and community leaders. The New York Police Department’s
Intelligence Division is just one police agency that has been accused of unwar-
ranted, covert surveillance of local Muslim communities in recent years.22 Un-
fortunately, such setbacks can threaten the good working relationships be-
tween the police and community leaders that often help to provide early
warning of suspicious activity and generate a hostile local environment for
would-be terrorists. The so called “war on terror” has also been a factor in
what is often referred to as the “militarization of the police.” This has been es-
23 See, for example, Arthur Rizer and Joseph Hartman, “How the War on Terror has
Militarized the Police,” The Atlantic, November 7, 2011, accessed May 21, 2015,
http://www.theatlantic.com/national/archive/2011/11/how-the-war-on-terror-
has-militarized-the-police/248047/; and “Cops or Soldiers?” The Economist, March
22, 2014, accessed September 18, 2015, http://www.economist.com/news/united-
states/21599349-americas-police-have-become-too-militarised-cops-or-soldiers.
24 For a detailed analysis of these issues see John B. Alexander, Convergence: Special
Operations Forces and Civilian Law Enforcement (MacDill, Fl: The JSOU Press, 2010).
25 Adam Goldman and Julie Tate, “Inside the FBI’s Secret Relationship with the Mili-
tary’s Special Operations,” Washington Post, April 11, 2014.
26 Robert J. Art and Louise Richardson, Democracy and Counterterrorism (Washington
DC: USIP, 2007) 565.
140 James K. Wither
27 The White House, Office of the Press Secretary, Remarks by the President on Review of
Signals Intelligence, January 17, 2014, accessed May 21, 2015, www.whitehouse.gov/
the-press-office/2014/01/17/remarks-president-review-signals-intelligence.
28 Intelligence and Security Committee of Parliament, Privacy and Security: A Modern
and Transparent Legal Framework, HC 1075, March 12, 2015, 112, accessed May 21,
2015, http://isc.independent.gov.uk/files/20150312_ISC_P+S+Rpt(web).pdf.
29 Daniel Byman, “The Intelligence War on Terrorism,” Intelligence and National Security
29, no. 6 (2013): 847.
The Role of the Security Forces in Combating Terrorism 141
30 The intelligence cycle is normally summarized as: requirements, planning and direc-
tion, collection, processing and exploitation, analysis and production, dissemination.
31 Remarks by James R. Clapper to the AFCEA/INSA National Security and Intelligence
Summit, September 18, 2014, accessed May 21, 2015, www.dni.gov/index.php/
newsroom/speeches-and-interviews/202-speeches-interviews-2014/1115-
remarks-as-delivered-by-the-honorable-james-r-clapper-director-of-national-
intelligence-afcea-insa-national-security-and-intelligence-summit.
142 James K. Wither
can result in crucial information not being passed on. In March 2015, an other-
wise complimentary, Congress-directed report on the FBI’s role in CT was criti-
cal of the Bureau’s response to recent high-profile terrorist plots and attacks in
the US. It identified failings in the FBI’s confidential human source program, in-
telligence analysis, and communication, coordination and collaboration both
within the Bureau and with external partners.38 One of the cases highlighted by
the report was the Boston Marathon bombing in April 2013, when the FBI were
unable to prevent the attack despite indicators pointing to the main plotter
Tamerlan Tsarnaev’s growing extremism.39
Conclusion
Unprecedented inter-agency cooperation and information sharing, combined
with the exploitation of information technology, has given security forces a tac-
tical edge over their terrorist opponents. Nevertheless, there are no grounds
for complacency. As this chapter illustrates, agencies involved in CT continue to
face a range of operational, technical, legal, and moral challenges. Salafi-jihadist
terrorists remain ingenious, persistent, adaptive, and ruthless. Transnational
networks, returning foreign fighters, the exploitation of social media, cyber
hackers and the possible use of chemical, biological, radiological and nuclear
weapons are among a range of new and emerging CT challenges. Balancing
public expectations on human rights and individual freedoms with collective
security demands remains problematic. Europe and North America in particu-
lar face an increase in attacks by so called lone actors. Unlike conspiracies by
established terrorist groups, these are more likely to escape the attention of in-
telligence and law enforcement agencies prior to an assault. Recent armed at-
tacks and barricade-hostage incidents in Africa and South Asia have revealed
continuing inadequacies in security force readiness, training and equipment in
those states most affected by terrorism. Building partner states’ CT capacity is
an enormous challenge as training and advisory programs will provide at best
only short term benefits without concurrent large scale developmental efforts
to address the failings in governance that ultimately fuel terrorist grievances.
Bibliography
“Cops or Soldiers?” The Economist, March 22, 2014. Accessed September 18,
2015. http://www.economist.com/news/united-states/21599349-americas-
police-have-become-too-militarised-cops-or-soldiers.
“Text of President Obama’s May 23 speech on national security.” Washington
Post, May 23, 2013. Accessed May 21, 2015. www.washingtonpost.com/
politics/president-obamas-may-23-speech-on-national-security-as-
38 The FBI: Protecting the Homeland in the 21 st Century, 9/11 Review Commission,
March 2015, 38, accessed May 21, 2015, www.fbi.gov/stats-services/publications/
protecting-the-homeland-in-the-21st-century.
39 The FBI: Protecting the Homeland in the 21 st Century, 43–47.
The Role of the Security Forces in Combating Terrorism 145
prepared-for-delivery/2013/05/23/02c35e30-c3b8-11e2-9fe2-
6ee52d0eb7c1_print.html.
“Waiting for al-Qaeda’s Next Bomb.” The Economist, May 3, 2007. Accessed Sep-
tember 18, 2015. http://www.economist.com/node/9111542.
9/11 Review Commission. The FBI: Protecting the Homeland in the 21st Century,
March 2015. Accessed May 21, 2015. http://www.fbi.gov/stats-
services/publications/protecting-the-homeland-in-the-21st-century.
Adams, Gordon. “Ties that Bind.” The Foreign Policy Group, October 1, 2014.
Accessed May 21, 20015. http://foreignpolicy.com/2014/10/01/ties-that-
bind-2/.
Alexander, John B. Convergence: Special Operations Forces and Civilian Law
Enforcement. MacDill, Fl: The JSOU Press, 2010.
Art, Robert J., and Louise Richardson. Democracy and Counterterrorism. Wash-
ington DC: USIP, 2007.
Babwin, Don. “NYPD Surveillance Jeopardizes Access to Muslim Communities,
Say Mayors and Cops Across Country.” Huffington Post, March 11, 2012.
Accessed May 21, 2015. www.huffingtonpost.com/2012/03/11/nypd-
surveillance-jeopardizes-access-to-muslim-communities-say-mayors-and-
cops-across-country_n_1337609.html.
Barkawi, Tarak. “On the Pedagogy of Small Wars,” International Affairs 80, no. 1
(2004): 19–37.
Boot, Max. Invisible Armies. New York: Liveright, 2013.
Byman, Daniel. “The Intelligence War on Terrorism.” Intelligence and National
Security 29, no. 6 (2013): 837-63.
Clapper, James R. Remarks to the AFCEA/INSA National Security and Intelli-
gence Summit, September, 18, 2014. Accessed May 21, 2015.
www.dni.gov/index.php/newsroom/speeches-and-interviews/202-
speeches-interviews-2014/1115-remarks-as-delivered-by-the-honorable-
james-r-clapper-director-of-national-intelligence-afcea-insa-national-
security-and-intelligence-summit.
Flynn, Michael T. “Sandals and Robes to Business Suits and Gulf Streams.” Small
Wars Journal, April 20, 2011. Accessed May 21, 2015.
http://smallwarsjournal.com/blog/journal/docs-temp/739-flynn.pdf.
Goldman, Adam, and Julie Tate. “Inside the FBI’s secret relationship with the
military’s special operations.” Washington Post, April 11, 2014.
Griswold, Eliza. “Can General Linder’s Special Operations Forces Stop the Next
Terrorist Threat?” New York Times Magazine, June 13, 2014.
Hughes, Geraint. “The Use of Undercover Military Units in Counter-Terrorist
Operations: A Historical Analysis with Reference to Contemporary Anti-
terrorism.” Small Wars and Insurgencies 21, no. 4 (2010): 561-90.
146 James K. Wither
Human Rights Watch. World Report 2014: Nigeria, undated. Accessed May 21,
2015. http://www.hrw.org/world-report/2014/country-chapters/nigeria.
Intelligence and Security Committee of Parliament. Privacy and Security: A Mod-
ern and Transparent Legal Framework, HC 1075, March 12, 2015. Accessed
May 21, 2015. http://isc.independent.gov.uk/files/20150312_ISC_P+S+
Rpt(web).pdf.
Jordan, Jenna. “Attacking the Leader, Missing the Mark: Why Terrorist Groups
Survive Decapitation Strikes.” International Security 38, no. 4 (2014): 7–38.
Kaiser, Simone, Marcel Rosenbach, and Holger Stark. “Operation Alberich: How
the CIA Helped Germany Foil Terror Plot.” Spiegel Online, October 9, 2007.
Accessed May 21, 2015. http://www.spiegel.de/international/germany/
operation-alberich-how-the-cia-helped-germany-foil-terror-plot-a-
504837-druck.html.
Kirk-Smith, Michael, and James Dingley. “Countering Terrorism in Northern
Ireland: The Role of Intelligence.” Small Wars and Insurgencies 20, no. 3-4
(2009): 551-73.
Lindsay, Jon R. “Reinventing the Revolution: Technological Visions, Counterin-
surgent Criticism, and the Rise of Special Operations.” Journal of Strategic
Studies 36, no. 3 (2013): 422-53.
Lumpkin, Michael D. Statement to the Senate Armed Forces Committee, March
11, 2014. Accessed May 21, 2015. www.armed-services.senate.gov/imo/
media/doc/Lumpkin_03-11-14.pdf.
Masters, Jonathan. “Targeted Killings.” Council on Foreign Relations, May 23,
2013. Accessed May 21, 2015. http://www.cfr.org/intelligence/tergetd-
killings/p9627.
Merchet, Jean-Dominique. “Contre-terrorisme: le GIGN est en avance dans la
guerre du temps.” L’Opinion, July 2, 2013. Accessed May 21, 2015.
http://www.lopinion.fr/1-juillet-2013/contre-terrorisme-gign-est-en-
avance-dans-guerre-temps-1606.
Merrill, Jamie, James Hanning, Mark Leftly, and Nick Clark. “Revealed: How Tor-
ture Was Used to Foil Al-Qaeda’s 2010 Plot to Bomb Two Airliners 17
Minutes Before Explosion.” The Independent, March 1, 2015. Accessed May
21, 2015. http://www.independent.co.uk/news/uk/home-news/revealed-
how-torture-was-used-to-foil-alqaeda-plot-to-bomb-two-airliners-17-
minutes-before-explosion-10077722.html.
National Security Strategy, The White House, February 2015. Accessed May 21,
2015. www.whitehouse.gov/sites/default/files/docs/2015_national_
security_strategy_2.pdf.
Panetta, Leon. “AFPAK Drone Strikes are the Only Game in Town.” New Perspec-
tives Quarterly 26, no. 3 (2009): 33–9.
Record, Jeffrey. Bounding the Global War on Terrorism. Carlisle, PA: Strategic
Studies Institute, December 2003.
The Role of the Security Forces in Combating Terrorism 147
Rizer, Arthur, and Joseph Hartman. “How the War on Terror has Militarized the
Police.” The Atlantic, November 7, 2011. Accessed May 21, 2015.
http://www.theatlantic.com/national/archive/2011/11/how-the-war-on-
terror-has-militarized-the-police/248047/.
Roberts, Adam. “The War on Terror in Historical Perspective.” Survival 47, no. 2
(2005): 101–30.
Schmidt, Eric. “US Strategy to Fight Terrorism Increasingly Uses Proxies,” New
York Times, May 29, 2014.
Servenay, David. “Terroisme: pourquoi Alliance Base a fermé ȧ Paris.” Rue 89,
L’Obs, May 24, 2010. Accessed May 21, 2015. http://rue89.nouvelobs.com/
2010/05/24/terrorisme-fermeture-dalliance-base-a-paris-152349.
Sherewell, Philip, and William Lowther. “American Spy Chiefs Alarmed by Bin-
yam Mohamed Ruling.” Daily Telegraph, February 14, 2010.
The White House, Office of the Press Secretary. Remarks by the President on Re-
view of Signals Intelligence, January 17, 2014. Accessed May 21, 2015.
https://www.whitehouse.gov/the-press-office/2014/01/17/remarks-
president-review-signals-intelligence.
Urban, Mark. Task Force Black: the Explosive Story of the SAS and the Secret War
in Iraq. London: Abacus, 2011.
US Senate, Permanent Subcommittee on Investigations. Federal Support and In-
volvement in State and Local Fusion Centers, Executive Summary, October 3,
2012. Accessed May 21, 2015. https://info.publicintelligence.net/HSGAC-
FusionCenters.pdf.
Warner, Lesley Anne. “The Trans Sahara Counter Terrorism Partnership:
Building Partner Capacity to Counter Terrorism and Violent Extremism.”
The Center for Complex Operations, March 2014.
Woodworth, Paddy. Dirty War, Clean Hands: ETA, The GAL and Spanish Democ-
racy. New Haven, CT: Yale University Press, 2003.
Chapter 10
Intelligence-led Policing in
Counter-Terrorism: A Perspective
from the United Kingdom
Peter Clarke
Introduction
In the years since 9/11 the approach to counter-terrorism (CT) in the United
Kingdom (UK) has been re-calibrated to take account of the nature of the threat
and the context in which that threat impacts upon the safety of the British pub-
lic. The transition from a domestic, politically-inspired Irish terrorist campaign
to a global, ideologically driven movement, which aspires to mass murder with
no apparent political endgame, has become the catalyst for fundamental change.
The pre-emption of terrorist attacks through taking early action in response to
accurate intelligence is now seen as vital to securing public safety. At the same
time, there is a need to conduct those operations in such a way as to undermine
the violent extremist narrative of grievance and discrimination.
A key means of achieving this was through the rigor and transparency of the
criminal justice system, but to do this required new ways of working and un-
precedented co-operation between the police and intelligence agencies. This
approach has been proven to be effective, but an essential pre-requisite is an
operating environment that is sufficiently permissive for police investigations
and judicial process to take place. If there is insurgency and violence to the
point that evidence gathering and police work is impossible, military opera-
tions will be required to degrade terrorist networks to the point where they
become susceptible to policing. Along that path, the police and military roles
may at times overlap and be complementary. This commentary is largely
drawn from the author’s experience of CT policing in the UK over the past 15
years, but it is suggested that the underpinning principles will be relevant in
many jurisdictions.
could have predicted the scale and pace of those changes. To an extent, those
changes were driven by events. As the volume and seriousness of those events
grew, we saw not only that the nature of the terrorist threat was changing, but
that our operational response and underpinning concept of operations had to
change too. For over 30 years we had experienced an unrelenting and vicious
terrorist campaign conducted by Irish terrorists who were intent on removing
British rule from Northern Ireland. The campaign had been long and bloody,
the terrorists had become ever more sophisticated, and the CT machinery had
developed both in capability and in its ability to deliver effective operational
outcomes. Despite our significant experience and capability, we were entering
a new era.
Although there had been a growing realization in the UK during the 1990s
that there were a number of people within the country (many originating from
the Middle East or the Maghreb) who were engaged in radical Islamist activity,
the prevailing attitude among police and intelligence agencies was that they did
not pose an imminent threat to the safety of the British public. It was known
that they were propagandizing and fundraising on behalf of organizations in
their countries of origin, but there was no real sense until at least 2000 that any
of them posed a threat to the safety of the British public. In any event, the focus
of the British CT machinery was firmly on the Irish terrorist groups that had
inflicted enormous physical, human and financial damage in the UK.
However, the focus began to shift following the Good Friday Agreement in
1998, which helped to reduce (although far from eliminate) the threat from
Irish terrorism. Around the time of the new millennium there were a number of
attacks planned or delivered by Islamist terrorists in Europe, Jordan, the US,
and Indonesia. These events, the discovery of the first Islamist bomb factory in
the UK in 2000, and in particular the 9/11 attacks triggered a reassessment of
the terrorist threat facing the UK. The reality was that the intelligence picture
of Islamist groups was not as complete as it might have been and a period of in-
tensive police and intelligence activity throughout 2002 and early 2003 taught
us a great deal about what we were facing. In particular, there was an investi-
gation into a loose-knit group of militants, mainly Algerians, which came to be
known by the police as Operation Springbourne (see Case Study 10.1).
We learned much from the Springbourne investigation. First, that there was
indeed a threat to the British public from Islamist extremists. Second, that the
police and intelligence agencies would need to find new ways of working to-
gether if the threat posed by 21st century terrorists was to be countered effec-
tively. Third, that the footprint of terrorism in the UK was no longer confined to
the major cities, nor indeed confined to the UK. The defense of the country
would in future have to be global, in response to what we were quickly learning
was a global threat. It also became apparent that the conduct of CT operations
would in the future be subject to more intense scrutiny than ever before. In-
deed, the police and intelligence agencies would be held closely to account by
interest and community groups who would be vigilant to ensure that there was
no hint of discrimination or insensitivity toward those from minority commu-
Intelligence-led Policing in Counter Terrorism: UK Perspective 151
lamist terrorism threat was almost a mirror opposite of that from Irish ter-
rorists.
Geographic Parameters
The campaign by Irish terrorists was essentially fought within the UK, pre-
dominantly within Northern Ireland but also with a large number of high pro-
file attacks on the British mainland. There were a few attacks on UK interests
overseas, notably against the British military in Germany and an attempted at-
tack in Gibraltar in 1988. The Provisional Irish Republican Army (PIRA) were
at one point found to be training terrorists in Colombia, and there was also
concern about funding from sympathizers in the US and the supply of terrorist
materiel from overseas, in particular Libya. However, for the most part it was a
domestic campaign that drew a domestic response. The Islamist terrorist
threat on the other hand proved to be global in origins, reach and ambition.
Those committing terrorist acts were often drawn from groups that had their
origins in national conflicts across the globe. Their communications were
global, as was their travel. In order to investigate the Springbourne case, CT
police had to travel to well over 20 countries, something that would have been
inconceivable in any investigation into Irish terrorism.
Tightly Structured Networks
Irish terrorist groups operated in tightly structured networks that gave them a
degree of internal security, but also meant that once they had been infiltrated
by the authorities or had an informer within their midst, an entire cell could be
compromised. The Islamist groups that were encountered in the UK in the
years following 9/11 were much more loosely structured. It was difficult to de-
fine their shape. Key members came and went. It was not easy to decide where
to probe or infiltrate. As networks were disrupted, either through arrests or
other action, so they would re-form. They have been compared to a multi-
headed beast which, as soon as it suffers a decapitation, simply grows another
head.
Determination to Avoid Capture
A determination to avoid capture and incarceration was a recurrent theme
throughout the Irish campaign. The terrorists became adept at operational se-
curity, counter surveillance, identifying and punishing informants, and avoid-
ing leaving forensic evidence which could yield irrefutable evidence of guilt.
Indeed, the release of prisoners became a key part of the negotiations that
eventually led to the Good Friday Agreement in 1998. Islamist terrorists on the
other hand often appear not to care whether they escape or survive their at-
tacks. To date, they have not been consistently forensically aware, and the use
of suicide as an attack methodology is clearly the complete antithesis to the
concept of avoiding capture so as to be able to continue the fight. The use of
suicide bombers and attackers has had a profound impact on the operational
tactics and considerations when countering Islamist terrorism.
Intelligence-led Policing in Counter Terrorism: UK Perspective 153
than a new concept of operations. It used to be the case that law enforcement,
in the shape of the detective looking for evidence to support a criminal prose-
cution, was to an extent divorced from the work of the intelligence agencies or
police Special Branches. In the UK, the Special Branches were the part of the
police that handled CT intelligence, leaving other officers to handle the eviden-
tial aspects of a case and act as the link into the prosecutorial and judicial au-
thorities. The disciplines of intelligence gathering, collation and assessment
tended to operate separately from the evidential investigator. This usually
worked well enough, despite some difficulties. There were occasions when of-
ficers who were trying to construct an evidential case struggled to understand
the background to the investigation. They were frequently left in the dark in re-
spect of the role of intelligence sources in investigations or other important as-
pects of the enquiry, of which in reality it was vital that they should have been
aware.
In an effort to co-ordinate CT activity, since the early 1990s every major ter-
rorist investigation on the mainland of the UK has been managed through an
Executive Liaison Group (ELG). This group is chaired by a senior police officer
called the National Coordinator of Terrorist Investigations, and comprises sen-
ior representatives from the Security Service (known as MI5), the Special
Branch of the police and the affected territorial police forces. And yet for many
years the senior evidential detective was excluded. He or she was not entitled
to attend, nor be part of the process of setting the strategy for the investigation.
This was usually explained as being in his or her best interests, so that they did
not find themselves in difficulty when giving evidence at Court – such as being
put under pressure to divulge the sources of intelligence. The thinking was that
if they did not know the answer to the question, they could not inadvertently
give away sensitive details of intelligence gathering. It was a conscious act of
policy to separate the intelligence and evidential strands of investigation. This
had to change.
Traditionally, the objective of the evidential investigator was to intercept
the terrorist as near as possible to the point of attack, i.e. to capture him with
the bomb or gun, and thereby have the strongest possible evidence to put him
before a court. A good example of this in the days of the Irish terrorist threat
was the arrest of Rab Friars, a PIRA terrorist, as he made his way into central
London in 1993. He was followed to London from Scotland, carrying a bomb all
the way. He was allowed to reach the outskirts of London, and was still in pos-
session of the bomb when he was arrested while waiting to board a bus into
central London. I cannot imagine a similar operation being considered as either
desirable or permissible today. It is inconceivable in the age of the suicide
bomber that a suspect would be allowed to travel into a city, carrying his bomb,
before being challenged by police. We have seen the near impossible challenges
that operational commanders face when trying to find a safe and appropriate
way of interdicting potential suicide bombers. The mistaken shooting of Jean
Charles de Menezes in London following the bombings in July 2005 is a graphic
example of this. These examples on their own (and there are many more across
Intelligence-led Policing in Counter Terrorism: UK Perspective 155
the world) show the changed approach to managing risk that has to be mas-
tered by the modern CT investigator.
The obvious conclusion is that evidential opportunities have to be sought at
every stage of an investigation. The police need to have as wide a range as pos-
sible of intervention opportunities available to them so that they can make the
decision as to which tactic will best meet the absolute objective of preserving
public safety against catastrophic attack. This has to be balanced against the
other vital objective of securing sufficient evidence to prosecute terrorists in
the criminal courts. This is because the transparency of the criminal trial pro-
cess is a vital part of securing community trust and confidence in CT opera-
tions, which in turn is likely to release vital intelligence from communities.
However, in reality, given the now common terrorist objective of causing mass
casualties in suicide attacks, or where the terrorist does not care if he survives,
public safety is always the dominant factor in decision making.
Another key change in the operational environment in the UK has been the
extent to which the conduct of an operation sits within the sole control of the
police officer in charge. In the vast majority of criminal investigations, the sen-
ior investigator has a great deal of freedom, within law and policy, to set the
operational strategy and choose the tactics to deliver the operation. This way of
working has been supported by the fact that police in the UK are operationally
independent from the executive and the judiciary. This is different in an intelli-
gence-led CT investigation. The complex and frequently international web of
stakeholders in a modern CT operation has to be taken into account. The scale
of the threat and the potential impact if an attack is successfully mounted are
so great that the traditional operational independence of the police has to be
attuned to the wider environment. The operational commander, while bearing
risks on behalf of his or her own operation, often has to be sensitive to events,
fears, influences and legal considerations in multiple jurisdictions. Many of
those jurisdictions have very different law enforcement traditions where po-
litical influence or direction may have an acknowledged and entirely proper
impact upon the conduct of an investigation.
The changed nature of the risk and sheer scale of threat from Islamist ter-
rorism has also led to a fundamental change in the nature of the relationship
between MI5 and the police. No longer can the evidential investigators be reli-
ant upon whatever information the intelligence world chooses to share with
them as an investigation reaches the critical phase. Nowadays, the police and
MI5 have to be true working partners from a much earlier stage in an investiga-
tion than ever used to be the case. Because of the increased scale of risk to the
public, there now needs to be a collective ability to have the full range of inter-
vention options open at every stage of a terrorist conspiracy. So instead of fo-
cusing on the attack itself, we now look to be able to disrupt terrorist planning,
either through arrest and prosecution or by other means, at every stage of the
process. This in turn means that, as far as possible, every aspect of the investi-
gation, from the very beginning, needs to be carried out to evidential standards.
This does not mean that there are no longer any secrets, or that the intelligence
156 Peter Clarke
agencies are not able to protect from public scrutiny those things that should
properly remain secret. What it does mean is that when an investigation is
started, all parties will work to a rebuttable presumption that information will
be gathered in a way that will allow it to be admitted as evidence in a criminal
court.
Figure 10.1 shows how the strands of intelligence and evidence now run in
parallel from the very early stages of terrorist planning, and will often be coor-
dinated by the Executive Liaison Group. As can be seen, the various stages at
terrorist planning and preparation are accompanied by generic operations that
are designed to gather evidence and intelligence of those activities from an
early stage. For example, in the case of Operation Lightning shown below, the
objective was to collate all the available information from all sources that could
give indications of hostile reconnaissance. This enabled not only vertical analy-
sis within a defined plot to take place, but also horizontal analysis across dis-
parate locations and target sets.
In the past, it was quite likely that the first the police might know of a spe-
cific terrorist network’s activities might be at the right hand end of the scale in
Figure 10.1, towards the point of execution of the attack. Now, the police and
the intelligence agencies work together from a much earlier stage, looking for
opportunities to gather evidence. This means that if the risk to the public in a
particular investigation becomes too great or unmanageable, or if intelligence
gaps appear, effective action can be taken to disrupt the plot at earlier stages
than might have been the case in the past (see Case Study 10.2).
The importance of effective evidence-based pre-emption lies not only in the
ability to protect the public from harm. It can also reassure them that what is
being done in their name against terrorists is being done with integrity and
within the rule of law. There is every chance that this will be demonstrated
publicly through the transparency of the criminal trial process. The experience
in the UK is that this has been of great importance. For instance, the allegation
has been made by some critics that the terrorist threat has been exaggerated by
the police acting as agents of the government in order to justify the UK’s foreign
policy. The suggestion was that Muslim communities were being unfairly tar-
geted. This was a very damaging allegation to make in terms of the police’s re-
lationships with the communities they serve. Intelligence from communities
can be crucial, and any suggestion that it will be used unfairly, illegally or inap-
propriately has the potential to inhibit effective CT operations. In the UK, from
2005 onwards there have been a large number of terrorist trials, conducted in
the ordinary criminal courts, that have demonstrated very clearly how the use
of recognized judicial process is a powerful tool against radicalizers and ter-
rorist apologists. However, the challenge still remains, as there is a continuing
need for police to show impartiality and integrity in the way in which they use
and communicate information relating to young Muslims wishing to travel to
Syria, for example, for purposes of terrorism.
Clearly, the ability of intelligence agencies and the police to work closely to-
gether will vary from one jurisdiction to another. In some cases, there may be a
lack of mutual confidence. In others, there may be constitutional or legal hur-
dles to overcome. However, it is more than likely that an honest assessment of
what is actually possible might yield some surprising and beneficial results. At
the heart of developing a close working relationship are strong personal con-
tacts and trust, supported by an administrative and legal framework that
should aim to be as open as possible, while protecting vital intelligence equi-
ties.
Given the global nature of the modern terrorist threat, international cooper-
ation between CT agencies and governments has had to move to a more ad-
vanced level, demanding high levels of mutual trust and confidence. Time and
again, this has proved to be vital in intercepting terrorist plots, and securing
the transfer of evidence from one jurisdiction to another. However, it would be
wrong to suggest that in every case there has been seamless mutual under-
standing of different jurisdictions’ approaches to managing the risk presented
by modern terrorists. As explained above, the key and determining factor
should always be the safety of the public. But a shared understanding, even be-
tween the closest of allies, has sometimes been difficult to achieve. For in-
stance, the case of Operation Overt in 2006 provides a stark example of how
sometimes different perceptions of acceptable risk can have a major impact on
the delivery of CT operations (see Case Study 10.3).
exercise its functions are under threat, then clearly the situation will need to be
brought under control by a military or paramilitary force. For instance, it is
rarely feasible for forensic evidence to be gathered in conflict zones or during
combat operations, although much has been achieved in this regard. Experi-
ence, not least in Northern Ireland, shows that there are overlapping and com-
plementary roles for the police and the military that will alter as circumstances
change and as it becomes more feasible for civil police to carry out their duties.
The model depicted in Figure 10.2 shows how, as the environment becomes
more permissive, the role of the military can diminish and that of the police in-
creases. In essence, when the environment is not permissive, terrorism will be
categorized as insurgency and must be combated with military operations.
When terrorist capability has been degraded, the environment will become
more permissive and the civil police will be able to treat terrorism as criminal
activity. Clearly, there will be variations on this model from one country to an-
other and the roles of police and military may well overlap or be separated ac-
cording to circumstances.
What is clear though is that in the long term there will be a need for police
and military to have a clear understanding of their respective roles, both at the
strategic and the tactical level. For instance, in a war zone, to what extent is it
Figure 10.2: The transition from insurgency to crime and the declining role
of the military as the police role increases.
(Copyright, Peter Clarke Associates. Reprinted with permission)
Intelligence-led Policing in Counter Terrorism: UK Perspective 161
Conclusion
The concept of preemption through intelligence-led policing in CT is driven by
the need to protect the public from mass casualty attacks, delivered without
notice and with the intention of killing as many people as possible. However,
the risk of preemption is that an early intervention, even if successful in pre-
venting an attack, may mean that there is insufficient admissible evidence to
mount a successful prosecution. This can fuel the terrorist narrative of griev-
ance and discrimination, i.e. that communities are being unfairly targeted by CT
authorities on the basis of faith, ethnicity or nationality. The use of recognized
and trusted judicial process is one means of countering this, but in order to do
so, there must be a very clear CT strategy and concept of operations.
The intelligence agencies, police, and in some situations the military must be
aligned in a cooperative coalition against terrorist activity. In some cases, this
will require the intelligence agencies to put more of their material at the dis-
posal of the courts than has traditionally been the case. In support of this the
military should, where possible, take account of the desirability of gathering
evidence as part of their mission. All of this needs to receive legal, judicial, po-
litical, media and community support. When all of these elements are in place,
it is possible to realize the full potential of truly collaborative, intelligence-led
CT. Military and law enforcement activity is essential, but it will not defeat the
ideology that drives terrorism by itself. However, the influence of radicalizers
and ideologues can be undermined by demonstrable integrity on the part of
law enforcement and the judicial process.
Chapter 11
Legal Issues in Combating
Terrorism
Dean L. Dwigans
Introduction
The legal response to transnational terrorism is constantly evolving. For exam-
ple, after the unprecedented destruction caused by the 9/11 attacks, there was
a shift towards the use of military force as the primary tool in transnational
counter-terrorism (CT), rather than an approach based on a law enforcement
paradigm. However, CT is not simply a choice between either military or law
enforcement options. Both approaches remain vital and have become more re-
fined over time, facilitated by an increased level of international cooperation
guided by the rule of law. However, much work remains to be done.
This chapter begins with a brief discussion of strategic considerations of
military versus law enforcement approaches to CT, with particular focus on the
issues of legitimacy, liberty and security. The military legal regime is then ex-
plored in greater depth, with a focus on key challenges currently faced by CT
professionals in this area. This is followed by a discussion of the law enforce-
ment regime with an emphasis on international cooperation and the continued
development of law enforcement tools needed to investigate and bring terror-
ists to justice.
There are two exceptions to the prohibition on the use of force against an-
other state. The first is a mandate of the UN Security Council under Chapter VII
of the UN Charter. If under Article 39 of Chapter VII the Security Council de-
termines that a particular situation amounts to a “threat to the peace, breach of
the peace, or act of aggression,”5 it may mandate nonforceful actions under
Article 41 or the use of force under Article 42. The ultimate goal of Chapter VII
is to maintain international peace and security rather than to punish or facili-
tate retribution.
Under Article 39, the UN Security Council has repeatedly identified interna-
tional terrorism as a serious threat to the peace, but it has never authorized the
use of force against terrorists under Article 42. Instead, it has encouraged in-
ternational cooperation and left the decision to use force to the individual
states acting in self-defense or in the defense of another state under Article 51
of the Charter.9 Self-defense is the second exception to the prohibition on the
use of force. Though authorized in Article 51, the right of self-defense is a long-
standing and inherent right of states and is grounded in customary interna-
tional law.
Under Article 51, a state may act in self-defense in the event of an armed at-
tack. Up until 2001 an armed attack was generally understood to be an act per-
petrated by a state rather than a non-state actor – the implicit assumption be-
ing that the latter would be dealt with by law enforcement. This shifted in re-
sponse to the 9/11 attacks, after which the UN Security Council affirmed the
inherent right to individual or collective self-defense in the context of attacks
by non-state actors.10
Any decision to use military force must comply with the international law
principles of necessity, proportionality and immediacy. Necessity requires that
a) reasonable alternatives must be exhausted prior to the use of force and b) a
threatening state—or non-state actor—has both the intention and capability to
attack. Proportionality means the amount of force used must be limited to that
required to defeat or deter an armed attack (though this does not necessarily
mean it must be of the same scale as employed by the enemy). The last require-
ment is immediacy. Defensive action must not occur too soon in anticipation of
an attack since non-forceful measures should be attempted and given time to
yield results first. Alternatively, it must not come too late as it could be viewed
as an act of retaliation rather than one of defense.
Applying these requirements to cases of international terrorism can be
challenging. It may be difficult to determine necessity and immediacy given the
unpredictability of terrorist networks, the varying scale of attacks and the diffi-
culty in assessing the impact of non-violent countermeasures. The requirement
of proportionality can be more easily resolved in response to individual at-
tacks, but is much more difficult when acts of terrorism form part of an ex-
tended campaign and are not necessarily tied to one specific organization.
In the US, the use of military force against AQ has been authorized by law. 11
Such an authorization to use military force is subject to review and should be
repealed once the threat has been eliminated. Even with the increased interna-
tional acceptance of the use of military force to combat terrorism, the US may
eventually reach a ‘tipping point’12 when efforts to disrupt, dismantle, and de-
feat AQ and its affiliates have succeeded to such an extent that the campaign
can no longer be classified as an armed conflict. Instead, law enforcement, in-
telligence, foreign assistance and diplomacy would be the primary US methods
to counter any remaining AQ related threat.
The body of international law governing the right of states to use military
force is called jus ad bellum. It is aimed at deterring the use of armed force by
states against each other. A parallel body of international law called jus in bello
dictates the rules which apply to the use of force once a conflict has begun. Jus
in bello is also referred to as international humanitarian law (IHL) or the law of
armed conflict. The goal is to limit the suffering of combatants, noncombatants
and civilians to what is necessary to achieve the legitimate political goals of the
conflict. Under IHL, any military force used must adhere to the principles of dis-
tinction and proportionality. Distinction requires that force be restricted to
military targets and that civilians are protected. However, it is also recognized
that civilian casualties will sometimes be unavoidable in the course of striking
legitimate military targets. The principle of proportionality is designed to limit
such “collateral damage” by forbidding civilian casualties disproportionate to
any military advantage to be achieved by the use of force. In other words, the
expected loss of civilian life must be weighed against the military value of the
intended target. Conduct during war is further restrained by the Geneva and
Hague Conventions which also fall under the jus in bello body of international
law. The Geneva Conventions apply to the treatment of detainees and actions of
an occupying force while the Hague Conventions apply to targeting and uses of
certain types of weapons.
Importantly, the Geneva Conventions apply almost exclusively to interna-
tional armed conflicts between states and not to non-international armed con-
flicts, as between states and non-state actors such as AQ and IS. The exception
to this is Common Article 3, so named because it is common to all four of the
Geneva Conventions.13 It applies to non-international armed conflicts by estab-
lishing fundamental rules of humane treatment for all individuals in enemy
hands, including, for example, the unlawful combatants being held by the US in
Guantanamo Bay. It is considered a mini convention within the Geneva Conven-
tions from which no exceptions are permitted.
The jus in bello is a complex body of law and is discussed only briefly in this
chapter as it relates to targeting of force and detaining battlefield belligerents.
However, in addition to the issues highlighted above, it is important to be
aware of the difference between IHL and international human rights law (HRL).
Theoretically, IHL applies during armed conflicts and HRL applies during
peacetime. The US view is that during armed conflicts, HRL yields to IHL,
meaning that certain actions are permissible during wartime that would not
otherwise be allowed. This view is not necessarily shared by other states, par-
ticularly in Europe, which results in different legal interpretations regarding
the use of force.
14 Authorization for Use of Military Force, Pub. L. No. 107-40, 115 Stat. 224 (2001).
Legal Issues in Combating Terrorism 169
batant due to their failure to comply with the laws of war. As of mid-2015, 663
of these detainees had been released, transferred or died in captivity and a fur-
ther 51 had been cleared for release to other states willing to accept them. The
remaining detainees are subject to prosecution for terrorist offenses or contin-
ued detention for the duration of the “war on terror” based on a determination
that they still represent a threat to the US.
The detention camp at Guantanamo Bay has been fraught with controversy
since it opened. In 2009, a Presidential order decreed that the facility should
close.15 Military commission proceedings set up to try detainees were also
halted pending a comprehensive review. The commissions resumed in late
2009 upon passage of the Military Commissions Act by the US Congress, 16 but
to date Congress has blocked any attempt to close the facility because it does
not want detainees transferred to the US. Although President Obama remains
determined to close the detention camp, the question of what to do with cur-
rent and any future unlawful combatant detainees in cases where there is in-
sufficient evidence to prosecute, but continued detention is warranted, remains
unresolved.17
2. Rendition
Rendition refers to the taking or surrender of a suspected terrorist from one
state to another. Rendition for law enforcement reasons is almost always pur-
suant to an agreement or treaty, such as an extradition treaty, and usually for
the purpose of a criminal prosecution or to serve out a sentence after a convic-
tion. This type of rendition is a legal and formal process normally conducted
through diplomatic channels.
Extraordinary rendition was used during the 1990s when terrorists were
captured and then subsequently transferred to another state for the purposes
of serving out a conviction obtained in absentia. It became more frequent after
9/11, when suspects were transferred to other states for the purposes of inter-
rogation. The term “extraordinary” is used because the process is beyond the
law and so is not pursuant to a treaty, formal agreement or judicial process in
the state where the capture is made. Extraordinary rendition is thus illegal and
exposes any government agents involved to legal action. For instance, in 2003
agents of the US Central Intelligence Agency (CIA) and the Italian Military In-
telligence and Security Service (SISMI) captured a terrorism suspect named
Abu Omar in Milan and transferred him to Egypt for interrogation. When the
15 Exec. Order. No. 13492, 74 Fed. Reg. 4897 (Jan 27, 2009), accessed August 14, 2015,
http://www.archives.gov/federal-register/executive-orders/2009-obama.html.
16 Military Commissions Act of 2009 (MCA 2009), Title XVIII of the National Defense
Authorization Act for Fiscal Year 2010 (Pub.L. 111–84, H.R. 2647, 123 Stat. 2190,
enacted October 28, 2009).
17 Tim Mak and Nancy A. Youssef, “The Pentagon is Keeping Half of Gitmo Locked Up
Against the White House’s Wishes,” The Daily Beast, August 9, 2015, accessed August
11, 2015, http://www.thedailybeast.com/articles/2015/08/09/he-s-keeping-half-
of-gitmo-locked-up-against-the-white-house-s-wishes.html.
170 Dean L. Dwigans
incident became public in 2005, twenty-six CIA and nine SISMI operatives were
indicted by Italian prosecutors. Although the Italian government did not re-
quest the extradition of the CIA agents, twenty two European arrest warrants
were issued. Many convictions (mostly in absentia) were obtained and sen-
tences imposed, with several Italian agents imprisoned and fined.
3. Interrogations
There has also been significant controversy concerning the transfer of terror-
ism suspects to countries with poor human rights records and allegations of
torture have later been made against the US and other states related to some
transfers.
Torture is prohibited under US and international law and is universally de-
nounced. However, in the US the application of the law with regard to the con-
duct of interrogations has been subject to varying interpretation. Confusion
persisted despite multiple attempts at clarification, including the 1994 US rati-
fication of the UN Convention on Torture; the 1994 US Torture Act; the De-
tainee Treatment Act of 2005, plus various US Department of Justice Memo-
randums, Executive Orders and legal interpretations concerning the applica-
bility of Common Article 3 of the Geneva Conventions. In a further attempt to
provide legal clarity, Executive Order 13,491 “Ensuring Lawful Interrogations”
was signed in 2009. This order cancelled previous directives, established
Common Article 3 as the baseline for all interrogations, closed CIA detention
facilities and provided the International Red Cross access to detainees. It also
restricted interrogation methods to those authorized in the US Army Field
Manual, thereby clarifying more precisely what is permissible. Nevertheless,
the issue of conduct during interrogations remains a hotly debated issue, as
seen in the controversy which arose following the publication of the so-called
‘torture report’ in 2014.18
18 CIA Response on the Senate Select Committee on Intelligence Study on the Former De-
tention and Interrogation Program, www.cia.gov/library/reports/CIAs_June2013_
Response_to_the_SSCI_Study_on_the_Former_Detention_and_Interrogation_Program.pdf,
June 27, 2013, accessed September 1, 2015; Senate Select Committee on Intelligence,
Committee Study of the Central Intelligence Agency’s Detention and Interrogation
Program, Executive Summary, December 3, 2014, accessed August 11, 2015,
https://web.archive.org/web/20141209165504/http://www.intelligence.senate.go
v/study2014/sscistudy1.pdf; Senate Select Committee on Intelligence, Committee
Study of the Central Intelligence Agency’s Detention and Interrogation Program,
Minority Views, June 20, 2014, accessed September 1, 2015, https://web.archive.org/
web/20141209225230/http://www.intelligence.senate.gov/study2014/sscistudy3.pdf;
George J. Tenet, Porter J. Goss, Michael V. Hayden, John E. McLaughlin, Albert M. Cal-
land, and Stephen R. Kappes, “Ex-CIA Directors: Interrogations Saved Lives,” Wall
Street Journal, December 10, 2014, accessed September 1, 2015, www.wsj.com/
articles/cia-interrogations-saved-lives-1418142644.
Legal Issues in Combating Terrorism 171
4. Targeted Killings
In policing, force is used in self-defense, the defense of others and to effect a
lawful arrest according to domestic law. It is based on HRL. Lethal force can
only be used if there is no other choice, for example, in a hostage situation,
bank robbery or terrorism incident where it is the only option to eliminate a
threat to the public. In such cases, the use of force is subject to administrative
and judicial review and must conform to the principles of necessity and pro-
portionality.
As noted above, the US view is that IHL applies in operations against inter-
national terrorists rather than HRL. After 9/11, the US adopted targeted killing
as a crucial means of crippling AQ’s leadership. The intention was to apply le-
thal force against those already determined to be combatants. Under IHL, an
analysis is conducted to determine the appropriateness of force against a target
using the principles of distinction and proportionality. Once the subject is de-
termined to be a legitimate battlefield target—an individual who is taking a di-
rect part in the hostilities—the analysis turns to the protection of civilians (dis-
tinction) and weighs potential casualties against the military advantage it is
hoped to achieve by the use of force (proportionality). This analysis ultimately
dictates whether a particular individual will be targeted at a specific time and
place. However, targeted killings outside of recognized conflict zones remain
legally contentious. Proponents argue that only IHL applies to the use of lethal
force against military targets engaged in armed conflict no matter where they
are targeted.
Opponents of these operations argue that as lethal strikes have been con-
ducted outside of conflict zones they should be governed by HRL and associ-
ated law enforcement norms.19 So-called ‘signature strikes,’ where individuals
in the vicinity of a specific leadership target have also been attacked in sepa-
rate follow-up strikes, are particularly controversial.20
The use of unmanned aerial vehicles or drones to carry out targeted killings
has become increasingly common and, although tactically effective, is also con-
troversial, in particular when state sovereignty is violated and civilians are
killed. This has increased resentment of the US in affected areas and led to
heightened support for extremists in Pakistan, Somalia and Yemen.21 However,
the legal/military analysis is no different just because the weapon is an un-
manned drone. The procedure is the same as when using any battlefield weap-
on against a legitimate target. Furthermore, the use of drones reduces the ex-
posure of military personnel to danger and allows for more precise targeting,
which helps to minimize civilian casualties in comparison to conventional air
strikes.
who ran a website called Azzam Publications in support of the Taliban.22 The
UK was unable to prosecute him, but he was re-arrested in 2004 (and later
pleaded guilty to terrorism charges) on the strength of a US extradition request
which claimed jurisdiction based on Ahmad having used an Internet Service
Provider in the US.
2. International Cooperation
Since 1963, sixteen multinational conventions and protocols23 have been devel-
oped under the auspices of the UN to enhance domestic legal responses to ter-
rorism by committing parties to strengthen their domestic laws, remove barri-
ers to investigations crossing international borders and enhance prosecutions.
These agreements define specific terrorist acts, require domestic criminaliza-
tion of these activities, establish criminal jurisdiction over the defined offenses
(including extraterritorial jurisdiction), mandate state assistance in investiga-
tions and demand that states either prosecute or extradite for the defined of-
fenses in order to deny safe havens to terrorists.
Member states are currently negotiating a Comprehensive Convention on
International Terrorism intended to criminalize all forms of international ter-
rorism and deny terrorists and their supporters access to money, arms and
safe havens. Unfortunately, negotiations are currently deadlocked, not least be-
cause of the perennial difficulty of agreeing on a universal definition of terror-
ism.24
A Convention would reinforce UN Security Council Resolutions (SCRs) from
2001 and 2004 25 which established terrorism as one of the most serious
threats to international peace and security, reaffirmed the right of self defense
for all nations under Chapter VII of the UN Charter and mandated all member
states to combat terrorism. Unlike treaties where individual states must con-
sent to the terms, UN SCRs are binding on all member states. SCR 1373, in par-
ticular, is comprehensive and requires states to prevent and prosecute acts of
terrorism, including action against planning, support, recruitment, and financ-
ing, as well as movement of terrorists. However, the effective implementation
of these measures remains an ongoing challenge.
22 Philip Sherwell, “Babar Ahmad sentenced to 12.5 years for supporting Islamic
terrorists,” The Telegraph, July 16, 2014, accessed August 7, 2015,
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10971189/Babar
-Ahmad-sentenced-to-12.5-years-for-supporting-Islamic-terrorists.html.
23 “United Nations Actions to Counter Terrorism: International Legal Instruments,”
United Nations, undated, accessed August 14, 2015, www.un.org/en/terrorism/
instruments.shtml.
24 “Speakers Urge That Differences Be Resolved in Draft Comprehensive Convention on
International Terrorism, as Sixth Committee Begins Session,” UN Press Release,
October 7, 2014, accessed August 11, 2015, www.un.org/press/en/2014/gal34
75.doc.htm.
25 S.C. Res. 1373, U.N. Doc. S/RES/1373 (Sep. 28, 2001); S.C. Res. 1566, U.N. Doc.
S/RES/1566 (Oct. 18, 2004).
174 Dean L. Dwigans
3. Obtaining Custody
Despite improvements in international cooperation, it remains difficult to in-
vestigate, convict and punish terrorists who operate across national bounda-
ries. Legal assistance to facilitate investigations and prosecutions is vital, but is
often time consuming due to the formal process needed to coordinate actions
through diplomatic or judicial channels. To streamline this process, many
states have entered into Mutual Legal Assistance Treaties (MLATs). These
agreements are typically bilateral treaties which define the obligation and
scope of legal assistance and the process for making requests. 26 These treaties
vastly improve the effectiveness of judicial assistance between nations and
usually include the power to summon witnesses, compel the production of
documents and other evidence, issue search warrants, serve judicial process
and assist with the seizure and forfeiture of assets. In addition, there are vari-
ous international organizations which facilitate informal cross border police
and judicial cooperation, to include Interpol, Europol and Eurojust.
Detention of suspected terrorists for law enforcement purposes is primarily
dictated by domestic law. In the US, constitutional protections exist to prevent
unreasonable search and seizure 27 and ensure due process.28 Police must have
probable cause to suspect that a person has committed an offense before
making an arrest. Once detained, due process prevents indefinite detention
without charge. If a person is charged, their case must be processed swiftly. Af-
ter 9/11, many suspected terrorists were arrested for immigration violations
or document fraud under domestic laws. Notably these were ‘ordinary’ crimi-
nal violations and were largely dealt with in accordance with long-established
due process requirements. Detainees also have rights under international law.
The Vienna Convention on Consular Relations 29 provides the right for a for-
eigner to have their government notified upon arrest, and the International
Covenant on Civil and Political Rights 30 prohibits arbitrary arrest or detention
without court review.
International cooperation is required if a suspected terrorist is located out-
side a state’s borders. Obtaining custody of a suspect in another state is known
as extradition. This process is usually detailed in a bilateral agreement or
treaty. Formal extradition requires that certain detailed conditions be met such
as an arrest warrant, a description of the facts and an explanation of the
charges. A judicial review may be required and inevitably political factors in-
fluence proceedings. Within the European Union, however, the European Ar-
rest Warrant has replaced traditional extradition since 2004. The process fol-
lows procedures outside political channels and has reduced some restrictions
and prohibitions, such as the ability of a state to refuse to extradite its own na-
tionals.
Every treaty or agreement has limitations that can present a bar to extradi-
tion. A request can be denied in terrorist cases, for example, because of con-
cerns about human rights violations. Several European states have struggled to
deport terrorism suspects to African or Middle Eastern countries where they
are at risk of torture. European human rights law prohibits the extradition of
suspects without certain assurances regarding conditions of imprisonment and
potential use of the death penalty. As a result, it has also sometimes proven
difficult to extradite terrorism suspects from Europe to the US. The High Court
of Ireland recently refused to extradite a terrorism suspect named Ali Damache
because he would likely be held in a federal ‘supermax’ prison, which it ruled
amounted to “cruel and unusual punishment.” 31 The British Government’s dis-
putes with the European Court of Human Rights over the extradition of Abu
Hamza and Abu Qatada to the US and Jordan respectively further illustrate the
extent of these problems.32
However, even without an extradition agreement, a state may simply hand
over suspects or use its immigration laws to expel or deport a suspect. Unilat-
eral and nonconsensual methods have also been used, such as luring a terrorist
suspect into another jurisdiction or into international waters. For example, in
2002, intelligence reports linked German citizen, Christian Ganczarski, to the El
Ghariba synagogue bombing in Tunisia. Although German authorities lacked
sufficient evidence for a prosecution, he was instead lured to Paris where he
was arrested and tried by the French.33
4. Prosecutions
The ultimate goal of the law enforcement approach to CT is to ensure that ter-
rorist offenders are tried and convicted. In principle, this is no different than
dealing with any other criminal offense and requires sufficient evidence to
prove guilt beyond a reasonable doubt. However, the prosecution of terrorists
involves a number of distinct challenges. Prior to 9/11 many states did not have
specific CT legislation and even those that did have had to update their laws.
New CT legislation has been required because of offenses unique to terrorism,
34 Frank Foley, Countering Terrorism in Britain and France: Institutions, Norms and the
Shadow of the Past (Cambridge: Cambridge University Press, 2013), Kindle Edition,
chapter 4.
35 See, for example, “British Spies Don Wigs and Makeup to Testify at US Trial of Al-
Qaida Suspect,” The Guardian, February 24, 2015, accessed August 13, 2015,
http://www.theguardian.com/us-news/2015/feb/24/british-spies-wigs-makeup-
testify-al-qaida-suspect.
36 Known as Terrorism Prevention and Investigation Measures, security certificates and
control orders respectively.
37 David Anderson, Control Orders in 2011: Final Report of The Independent Reviewer on
The Prevention of Terrorism Act 2005 (London: The Stationery Office, 2012).
38 See, for example, David Barrett, “Q&A: Terror Controls Explained,” The Telegraph,
August 22, 2014, accessed August 13, 2015, www.telegraph.co.uk/news/uknews/
terrorism-in-the-uk/11051120/QandA-Terror-controls-explained.html.
Legal Issues in Combating Terrorism 177
Conclusion
International and domestic legislation lies at the heart of all CT. It dictates and
constrains our actions, whether military or law enforcement, domestic or in-
ternational. Adhering to the rule of law is important and can have significant
implications if not developed and applied appropriately. For instance, law en-
forcement has clearly become more effective at preventing, investigating and
prosecuting terrorist acts, in large part due to more robust domestic legal sys-
tems and greater international cooperation. However, these successes have
sometimes been at the expense of civil liberties.40 It is incumbent on all states
to find the appropriate balance between the rights of individuals and the rights
39 Matthew John Robert Clarke, Report of the Inquiry into the Case of Dr Mohamed
Haneef, Volume 1 (Canberra: Commonwealth of Australia, 2008), accessed February
2, 2015, http://trove.nla.gov.au/work/35146207.
40 Such as more expansive domestic legislation, i.e. post 9/11 in the US (Patriot Act) and
UK, after the Paris attacks in France and more recently in Egypt.
178 Dean L. Dwigans
Bibliography
“British Spies Don Wigs and Makeup to Testify at US Trial of Al-Qaida Suspect.”
The Guardian, February 24, 2015. Accessed August 13, 2015.
http://www.theguardian.com/us-news/2015/feb/24/british-spies-wigs-
makeup-testify-al-qaida-suspect.
“On the Warpath.” The Economist, March 6, 2008.
“Speakers Urge That Differences Be Resolved in Draft Comprehensive Conven-
tion on International Terrorism, as Sixth Committee Begins Session.” UN
Press Release, October 7, 2014. Accessed August 11, 2015.
http://www.un.org/press/en/2014/gal3475.doc.htm.
“United Nations Actions to Counter Terrorism: International Legal Instru-
ments.” United Nations, undated. Accessed August 14, 2015.
http://www.un.org/en/terrorism/instruments.shtml.
Abbas, Hassan. “How Drones Create More Terrorists.” The Atlantic, August 23,
2013. Accessed August 11, 2015. www.theatlantic.com/international/
archive/2013/08/how-drones-create-more-terrorists/278743/.
Anderson, David. Control Orders in 2011: Final Report of The Independent Re-
viewer on The Prevention of Terrorism Act 2005. London: The Stationery
Office, 2012.
Bachmann, Jeffery Scott. “The Lawfulness of US Targeted Killing Operations
Outside Afghanistan.” Studies in Conflict and Terrorism 38, no. 11 (2015):
1–20.
Barrett, David. “Q&A: Terror Controls Explained.” The Telegraph, August 22,
2014. Accessed August 13, 2015. www.telegraph.co.uk/news/uknews/
terrorism-in-the-uk/11051120/QandA-Terror-controls-explained.html.
Clarke, Matthew John Robert. Report of the Inquiry into the Case of Dr Mohamed
Haneef, Volume 1. Canberra: Commonwealth of Australia, 2008. Accessed
February 2, 2015. http://trove.nla.gov.au/work/35146207.
Crumley, Bruce. “French Terror Conviction: Lesson for the US?” Time, February
6, 2009. Accessed August 12, 2015. http://content.time.com/time/world/
article/0,8599,1877570,00.html.
Legal Issues in Combating Terrorism 179
1 “Extracts from Bush’s Speech,” BBC News, April 4, 2002, accessed May 22, 2015,
http://news.bbc.co.uk/2/hi/middle_east/1911665.stm.
2 Cited in Alan Travis and Owen Bowcott, “Papers Released under the 30 Year Rule
Reveal the Full Force of Thatcher’s Fury,” The Guardian, December 30, 2009, accessed
May 22, 2015, www.theguardian.com/uk/2009/dec/30/30-year-rule-thatcher-
papers-released.
3 Seth G. Jones and Martin C. Libicki, How Terrorist Groups End: Lessons for Countering
al Qa’ida (Santa Monica: RAND Corporation, 2008), 18–19, accessed May 22, 2015,
www.rand.org/content/dam/rand/pubs/monographs/2008/RAND_MG741-1.pdf.
Note that the figures in the study and its methodology can be disputed, but the
transition to a political process still emerges as an essential element in ending many
terrorist campaigns.
4 Roger Mac Ginty, “Look Who’s Talking, Dialogue and Conflict Transformation,” Criti-
cal Studies on Terrorism 6, no. 1 (2013): 219.
5 For an analysis of terrorist hostage crises see Adam Dolnik and Keith M. Fitzgerald,
Negotiating Hostage Crises with the New Terrorists (Westport CT: Praeger Security
International, 2008).
6 Robert Clark, Negotiating with ETA: Obstacles to Peace in the Basque Country 1975 -
1988 (Reno: University of Nevada Press, 1990), 3.
7 Audrey Kurth Cronin, “Negotiating with Groups that Use Terrorism: Lessons for Pol-
icy-Makers,” Background Papers (Centre for Humanitarian Dialogue, 2008), 6,
Talking to Terrorists 183
A framework for dealing with conflicts involving terrorism has been de-
scribed by Vicenç Fisas of the Norwegian Peacebuilding Resource Centre. He
suggests that the sequence of contacts between parties to a conflict leading to
formal negotiations is as follows:8
1) Informal indirect contact
2) Formal indirect contact
3) Informal direct contact
4) Formal direct contact
5) Informal explorations
6) Formal explorations
7) Informal dialogue
8) Formal dialogue
9) Formal negotiations.
Although Fisas does not make the differences between the individual stages
clear, this framework does capture the convoluted nature of the preliminary
talks required before real negotiations to end a conflict can begin.
mas government, moderates in the movement appear to have lost power to the
hardliners.
Engagement can save lives. For example, during the extended negotiations
to end the terrorist campaigns in Northern Ireland between 1998 and 2007, the
overall level of violence dropped dramatically as all sides involved in the peace
process exercised restraint.10 More recently, reported civilian deaths fell by
73 percent during the Revolutionary Armed Forces of Colombia’s (FARC) uni-
lateral ceasefire to facilitate peace talks with the Colombian government.11
Talks do not have to be part of a peace process to have value. Sometimes they
can change the situation on the ground through influence and persuasion even
while kinetic operations continue. In 2006, coalition forces in Iraq established a
Force Strategic Engagement Cell (FSEC) to woo Sunni insurgent leaders regard-
ed as “reconcilables” and enlist their help against the “irreconcilables” of al-
Qaeda in Iraq (AQI). The FSEC achieved a notable success when Abu Wail, the
religious emir of the Ansar al-Sunnah group, declared his opposition to AQI.12
Eventually, engagement with the Iraqi resistance led to a Sunni political net-
work that was willing to work with the US in order to fight a common enemy.
Talks can also help divide the leadership of terrorist organizations. Sri
Lanka offers a notable example. Although the peace talks between the Libera-
tion Tigers of Tamil Eelam (LTTE) and the Sri Lankan government initiated in
2002 were unsuccessful, the process led to the defection of Colonel Karuna, an
LTTE commander in the east of the country, along with thousands of his fight-
ers. This left the LTTE gravely weakened when fighting restarted in 2006 – a
significant factor in their eventual defeat in 2009.13
The old adage “know your enemy” is also relevant in this context. Dialogue
with a terrorist group’s leadership and/or individual members can provide
valuable intelligence insights that can help security officials assess a group’s
priorities, capabilities and leadership characteristics. Analyst Louise Richard-
son claims that years of covert discussions between government officials and
Republican terrorists in Northern Ireland provided critical intelligence insights
that facilitated the Good Friday Agreement in 1998. 14 Measures that encourage
individual members of a terrorist group to seek contact with the authorities
10 “Deaths from Conflict in Northern Ireland by Year and Status,” Conflict Archive on the
Internet (CAIN), University of Ulster, accessed September 22, 2015,
https://docs.google.com/spreadsheet/ccc?key=0AonYZs4MzlZbcGhOdG0zTG1EWkV
NMkpwa3A1ZTBsZFE#gid=0.
11 “Bullet Proof: Colombia’s Peace Process,” The Economist, May 30, 2015, accessed May
30, 2015, www.economist.com/news/americas/21652332-despite-escalation-
violence-talks-continue-bullet-proof.
12 Stanley McChrystal, My Share of the Task: a Memoir (New York: Penguin, 2013), 247–
248, 262–264.
13 Jonathan Powell, Talking to Terrorists: How to End Armed Conflicts (London: The
Bodley Head, 2014), 270.
14 Louise Richardson, “Britain and the IRA,” in Democracy and Counterterrorism, ed.
Robert J. Art and Louise Richardson (Washington, DC: USIP, 2007), 95–96.
Talking to Terrorists 185
can also prove productive. The aforementioned FSEC, for example, gathered
valuable intelligence about the workings of AQI from disaffected supporters. In
1980, the Italian government introduced tough new CT legislation and en-
hanced police powers in its battle against the Marxist-Leninist Red Brigades.
Notably, these measures were combined with a highly successful initiative to
encourage defections. Terrorists who “repented” and provided information
about the Red Brigades’ membership and activities received reduced sentences
for their crimes and were offered the prospect of a return to normal life. 15 By
1983, the group had been defeated.
evident from electronic correspondence, captured during the raid that killed
Osama bin Laden in Abbottabad, Pakistan in 2011, that he supported negotia-
tions with the Pakistan government. However, the same documents make it
clear that any such talks were to be exploited to provide a temporary ceasefire
“in the interest of the mujahidin at this time” rather than to make peace with a
government that AQ continued to regard as an enemy.18
Governments can also anger allies if they talk to terrorist groups that they
oppose. Israel has repeatedly protested any suggestions by the US or British
governments that they might engage with Hamas or Hezbollah. For similar rea-
sons, personal relations between British Prime Minister John Major and Presi-
dent Clinton were irreparably damaged when the US government granted Sinn
Fein leader Gerry Adams a visa to visit the White House in 1994.19
Who to Talk To
In an article in Foreign Affairs in 2007, analyst Peter Neumann stated that “The
first and most obvious question for any government considering negotiations is
whether the terrorists it faces can make good negotiating partners.” 20 It cer-
tainly helps if terrorists have negotiable aims. Those with territorial goals tend
to be more amenable to talks than groups which espouse extreme ideological
or religious causes. Most so-called Islamist terrorist organizations broadly
share a religious agenda, have a common antipathy to Israel and America, and
oppose Muslim governments they perceive to be corrupt. But the majority of
these groups, including Hamas, Hezbollah, the Moro Islamic Liberation Front
(MILF) and the Afghan Taliban, have little ambition to create a caliphate or
wage global jihad against non-believers.21 As with Marxist-Leninist terrorist
groups of the Cold War era, their rhetoric and propaganda may obscure the fact
that local political objectives trump ideological purity. The government of the
Philippines, for example, has been able to secure an agreement with the
avowedly Islamist MILF on the basis of regional autonomy.
A terrorist group’s leadership and level of internal cohesion are also im-
portant factors to consider when considering who to talk to. Jonathan Powell,
who was the British government’s chief negotiator in the Northern Ireland
peace process, stresses the importance of strong and consistent leadership, not
just of the terrorists, but of all parties involved in negotiations.22 Terrorist lead-
18 “Al-Qaeda and Pakistan: The Evidence of the Abbottabad Documents (Part Three),”
Jihadica.com, accessed May 24, 2015, www.jihadica.com/wp-content/uploads/
2015/03/422-10-CR-109-S-4-RJD-Translation.pdf.
19 See, for example, Daniel Byman, “The Decision to Begin Talks with Terrorists: Les-
sons for Policy Makers,” Studies in Conflict and Terrorism 29, no. 5 (2006): 408.
20 Peter R. Neumann, “Negotiating with Terrorists,” Foreign Affairs 86, no. 1 (2007):
129.
21 James K. Wither, “Selective Engagement with Islamist Terrorists: Exploring the Pro-
spects,” Studies in Conflict & Terrorism 32, no. 1 (2009): 25–26.
22 Jonathan Powell, Great Hatred, Little Room: Making Peace in Northern Ireland
(London: Bodley Head, 2008), 309–12.
Talking to Terrorists 187
ers need to have credibility with the rank and file of their organization. Credi-
bility and control are essential to minimize the threat from ‘spoilers’ who op-
pose talks and may seek to take over the leadership of the movement. Leaders
on all sides require cool heads to deal with the inevitable crises that accom-
pany negotiations. It is good practice to agree procedures for dealing with
these crises in advance of formal talks. A recent kidnapping case in Colombia,
which temporarily suspended talks with FARC, illustrates the importance of
robust crisis-management arrangements during peace negotiations.23
Those seeking dialogue with a terrorist organization need to make sure that
their interlocutors actually represent the leadership of the group in question.
In 2005, the German Foreign Intelligence Service (BND) held talks with the
Taliban in neutral Switzerland. The talks were broken off when the BND real-
ized that the Taliban ‘representatives’ did not speak for the movement’s leader,
Mullah Omar.24 Given the networked and fragmented character of contempo-
rary terrorist organizations, this is a growing problem for would-be negotiators
and mediators alike.
Most long-standing terrorist organizations have political representatives or
a political wing. This can facilitate talks as government officials can claim that
these individuals are not directly involved in terrorist violence. In 2009, for ex-
ample, the British government reopened dialogue with senior officials from
Hezbollah who were members of Lebanon’s parliament and Unity Government,
while talks with the military wing of the movement remained proscribed.25 The
US government was highly critical of the British initiative because the State De-
partment does not accept that a distinction can be made between the military
and political wings of terrorist organizations. As a radical Shia movement, Hez-
bollah is sponsored by Iran. In such cases, where a terrorist group acts a proxy
force, talks may be better aimed at the organization’s state sponsors. As of mid-
2015, the US Department of State lists three countries as state sponsors of ter-
rorism: Iran, Sudan and Syria.26 However, most states, including the US, have
employed proxy ‘terrorists’ as an instrument of foreign policy at some point in
their history.
When dialogue suggests that there might be prospects for a viable peace
process, it is important to include all parties to the conflict. Although the main
negotiating partners in the Northern Ireland peace talks were the British gov-
ernment and Sinn Fein, representatives from the Irish Republic and Northern
23 “Colombia’s War: Picking Up Where They Left Off,” The Economist, December 6, 2014,
accessed May 25, 2015, http://www.economist.com/news/americas/21635481-
release-kidnapped-general-allows-peace-talks-resume-picking-up-where-they-left.
24 Sonia Phalnikar, “Report Says German Secret Service Held Talks With Taliban,”
Deutsche Welle, August 20, 2007, accessed June 19, 2015, http://www.dw.de/report-
says-german-secret-service-held-talks-with-taliban/a-2745686.
25 “UK Envoy in first Hezbollah Talk,” BBC News, June 18, 2009, accessed June 18, 2015,
http://news.bbc.co.uk/2/hi/middle_east/8107837.stm.
26 “State Sponsors of Terrorism,” US Department of State, undated, accessed June 19,
2015, http://www.state.gov/j/ct/list/c14151.htm.
188 James K. Wither
When to Talk
The question of timing can be critical. Seek to open dialogue too soon and a ter-
rorist group might be encouraged to think that its violent methods are proving
successful; leave talks too late and an opportunity to end a terrorist campaign
might be lost. A recent study of attempts to negotiate with the Taliban high-
lights the US’s missed opportunities to engage the group when it was weak af-
ter its defeat in Afghanistan in 2001. By the time the US fully accepted peace
talks in 2011, the Taliban had once again become a formidable military and po-
litical force.28 Some commentators talk of a “strategic juncture,” when a terror-
ist group begins to question the utility of violence. 29 Such a situation can occur
after major changes in the international environment. After the Cold War, for
example, negotiated settlements ended a number of terrorist campaigns in
Central and South America and sub-Saharan Africa. A “strategic juncture” for a
terrorist group can also occur due to pressure from the security services. From
2003, the Colombian government, with US assistance, put FARC under sus-
tained military pressure. By 2013 the group’s combatants had dropped from
around 20,000 in 2002 to approximately 8,000.30 It is hardly surprising that the
FARC declared a unilateral ceasefire in December 2013 and is currently en-
gaged in peace talks with the Colombian government that have a good chance
of finally ending their decades-long campaign. This is just one example that
demonstrates that negotiations alone are unlikely to end a terrorist campaign
in the absence of parallel, robust measures by the security forces.
Sometimes it is the government side that is most anxious to talk because the
political and economic damage inflicted by terrorist violence has driven them
to the negotiating table.31 Governments have sometimes entered into prema-
27 James Dobbins and Carter Malkasian, “Time to Negotiate in Afghanistan: How to Talk
to the Taliban,” Foreign Affairs 94, no. 4 (2015): 55.
28 Dobbins and Malkasian, “Time to Negotiate in Afghanistan,” 54–56.
29 Neumann, “Negotiating with Terrorists,” 130.
30 Matt Ince, “Filling the FARC-Shaped Void,” RUSI Journal 158, no. 5 (2013): 27.
31 For an example in the case of Boko Haram and the Nigerian government see Jakana
Thomas, “Actually, Sometimes Terrorism Does Work,” Washington Post, April 22,
Talking to Terrorists 189
ture and costly agreements with terrorist groups as a result. An earlier “peace
process” with the FARC illustrates this point. In 1998, the Colombian govern-
ment relinquished control of a demilitarized zone the size of Switzerland
where the group could operate without interference from the security forces.
Instead of encouraging peace talks as the government intended, FARC used the
opportunity to rearm, recruit and go on the offensive.32 However, military and
political stalemates can offer an appropriate juncture for talks. Analysts fre-
quently refer to this situation as a “mutually hurting stalemate” (see Case Study
12.1).
How to Talk
A willingness to talk has to be communicated to the other party, which can be
problematic in the absence of formal contacts. Fisas states that it is common for
one of the parties to send out “smoke signals” to indicate a readiness to engage
in preliminary dialogue.33 These signals may take the form of speeches by lead-
ers, media interviews or messages sent through trusted intermediaries. 34 Be-
cause of the need for secrecy, it is often intelligence agencies that start contacts
on the government side. Contacts can also be made through trusted, discrete
neutral parties, like the Catholic priest Alex Reid, who acted as a longstanding
go-between in Northern Ireland.35 Initial dialogue between representatives of
both sides is also likely to remain covert. This process is unlikely to address
fundamental issues but instead can allow the representatives of each side to
become acquainted. In the case of initial meetings between the African National
Congress (ANC) and the ruling National Party in South Africa in 1990, Robert
Mnookin states that the talks had a “powerful psychological impact” and were
the first step in “reversing their mutual demonization.”36
Third-party mediation often plays an important role in facilitating talks be-
tween terrorists and the governments they oppose, since there is likely to be
significant mistrust between the protagonists. Although governments are natu-
rally suspicious of outside interference in their internal affairs, experience sug-
gests that the involvement of trusted third parties can make it easier both to
reach and implement an agreement.37 International institutions, friendly or
neutral governments and skilled, individual interlocutors have all played a sig-
nificant role in attempts to end terrorist campaigns. Recently, non-governmen-
tal organizations (NGOs) have taken an increased role in mediation.
38 I. William Zartman, “The Timing of Peace Initiatives: Hurting Stalemates and Ripe
Moments,” Global Review of Ethnopolitics 1, no. 1 (2001): 8–12.
39 For two recent examples see “Civil Wars: How to Stop the Fighting, Sometimes,” The
Economist, November 9, 2013, accessed June 12 2015, www.economist.com/news/
briefing/21589431-bringing-end-conflicts-within-states-vexatious-history-provides-
guide; Caroline A. Hartzell, “A Comparative Perspective on an Afghan Peace Process:
Why, When, Who and What?” Afghanistan: Opportunity in Crisis Series no. 7 (London:
RIIA, December 2014), 3, accessed June12, 2015 , www.chathamhouse.org/sites/
files/chathamhouse/field/field_document/20141204AfghanPeaceProcessHartzell.pdf.
40 United States Institute of Peace, “Mutually Hurting Stalemate,” USIP Glossary of Terms
for Conflict Management and Peacebuilding, 2011, accessed June 11, 2015,
http://glossary.usip.org/resource/mutually-hurting-stalemate.
41 Powell, Great Hatred, Little Room, 309–10.
42 Robert L. Rothstein, “The Timing of Negotiations: Dueling Metaphors,” Civil Wars 9,
no. 3 (2007): 263–66. See also Powell, Talking to Terrorists, 175–77.
Talking to Terrorists 191
The Geneva-based Centre for Humanitarian Dialogue, for example, has suc-
cessfully facilitated dialogue and negotiations between the Free Aceh Move-
ment (GAM) and the Indonesian government and between the Nepalese gov-
ernment and the Maoist, Free People’s Army.43 NGOs tend to be more flexible
than government officials and lack the political baggage that diplomats bring to
talks. State officials are normally prohibited from direct contact with groups
that have been formally designated as terrorists by their respective govern-
ments.44
The decision to transition from secret to formal, direct talks is always con-
text dependent. However, the USIP offers four generic criteria to help guide
government negotiators:45
1) The terrorist group has demonstrated that it is committed to negotia-
tions and does not regard them as an opportunity to rearm and re-
group.
2) A degree of mutual trust and confidence has been established on the ba-
sis of both sides honoring commitments.
3) Public and political opposition to negotiations has been shown to be
manageable.
4) The terrorist group has shown itself to be internally cohesive and able
to exercise control over its supporters so that it can implement an
agreement in due course.
The issue of pre-conditions often thwarts dialogue. The Middle East Quartet
(the UN, US, Russia, and the EU) sets three preconditions for talks with Hamas.
These include an insistence that Hamas recognizes the state of Israel as a pre-
condition, rather than as a goal of talks. This stance has received widespread
international criticism.46 Powell advises that “[i]t is always an error to set a
precondition to a negotiation,” arguing instead that issues should be resolved
43 See, for example, “Privatising Peace,” The Economist, July 2, 2011, accessed June 15,
215, http://www.economist.com/node/18895458.
44 This can act as a significant barrier to talks. See, for example, Robert Fisk, “Talking to
ISIS Could Lead to Peace, Yet for Some Reason We’re Not Allowed to Do It,” The Inde-
pendent, February 20, 2015, accessed June 26, 2015, www.independent.co.uk/
voices/comment/talking-offers-hope-of-a-peaceful-solution-but-were-not-allowed-
to-do-it-10047640.html.
45 Nigel Quinney and A. Heather Coyne, eds., Talking to Groups That Use Terror (Wash-
ington, D.C.: USIP, 2011), 51–52.
46 See, for example, Carolin Goerzig, “Engaging Hamas: Rethinking the Quartet Princi-
ples,” European Institute for Security Studies, March 2010, accessed June 22, 2015,
www.iss.europa.eu/publications/detail/article/engaging-hamas-rethinking-the-
quartet-principles/; “Open Letter on Middle East Policy: Lasting Peace Only Possible
with Hamas on Board,” Spiegel Online International, June 10, 2011, accessed June 22,
2015, http://www.spiegel.de/international/world/open-letter-on-middle-east-
policy-lasting-peace-only-possible-with-hamas-on-board-a-767819.html.
192 James K. Wither
during negotiations rather than made into a prior test.47 A frequent demand is
that a terrorist group disarms before formal talks. Terrorist leaders will usually
declare their intention to end violence before formal negotiations begin, but
undefeated terrorists will not give up their arms at this stage. John Major’s gov-
ernment’s insistence on prior disarmament delayed negotiations with PIRA for
several years during the 1990s. Tony Blair’s government after 1997 adopted a
more flexible approach. It dropped disarmament pre-conditions, accepted
“progressive decommissioning” and introduced independent verification. De-
spite these measures, the issue of PIRA disarmament remained a difficult
problem until the final peace agreement in May 2007. 48 In the case of the MILF,
complete disarmament is not scheduled to take place until the Philippine Con-
gress passes legislation to finalize the peace agreement. Instead, symbolic dis-
armament gestures have taken place to demonstrate the MILF’s commitment to
non-violence and reassure the public.49
Like permanent disarmament, the legal status of terrorist combatants and
members of the security services, who may have committed atrocities, is best
left to the end of peace talks when the process already has plenty of momen-
tum and support. The release of “comrades” from jail is usually a core terrorist
negotiation demand, but allowing individuals accused or convicted of murder
to go free can be difficult for ordinary citizens to accept. Nevertheless, amnes-
ties are normal following a peace deal and may be essential to discourage dis-
sidents from continuing violence. The creation of the International Criminal
Court (ICC) has, however, made general amnesties much more difficult. Put
crudely, the balance has swung in favor of retributive justice rather than peace
at all costs. This trend creates additional difficulties for governments engaged
in negotiations with terrorists groups. For example, the ICC indictment of
Lord’s Resistance Army leader Joseph Kony made a peace agreement with the
group impossible.50
violence against unbelievers was considered a sacred act. 51 The accepted wis-
dom is that religious zealots make unlikely negotiating partners. US Special
Operations Commander, Admiral Bill McRaven, expressed a typical view during
his remarks to Congress in 2014. McRaven warned that terrorist leaders in
Somalia, Yemen, Syria and North Africa were ‘irreconcilable’ and that “…no
amount of negotiations, no amount of placation, is going to put them in a posi-
tion where they are prepared to support universal values as we know them”. 52
Zartman describes the most extreme terrorists as “total absolutes,” whose ob-
jectives and methods allow no room for compromise and who might regard any
attempt at dialogue as encouragement to intensify their violence. 53 Most com-
mentators place AQ in this category, but there are a surprising number of dis-
senters (see Case Study 12.2).
Contemporary terrorists such as AQ tend to be organized into loose net-
works, rather than the more hierarchical structures of 20th century groups.
These networks blur the boundaries between groups fighting for local auton-
omy, terrorists engaged in global jihad and transnational criminal gangs seek-
ing profit. This makes the prospects of finding reliable negotiating partners, as
discussed above, more difficult. Nevertheless, regional affiliates of AQ and even
IS may ultimately be more motivated by local political and social issues than
global jihad. In the case of ‘lone actors’ or returning foreign fighters that oper-
ate in small autonomous cells (see Chapter 8), it is hard to envisage any “talk-
ing to terrorists” in the accepted sense.
should be distinguished from its religious rhetoric and controversially advocated en-
gagement by the US to address the group’s grievances.55 Sociologist Michael Mann
also described bin Laden as a “rational man,” who attacked the US in response to
American imperialism in the Middle East. Although bin Laden’s message was explic-
itly Islamist, Mann identified his grievances as political and therefore not inherently
non-negotiable.56
Perhaps more surprising is the willingness of CT practitioners to contemplate
talks with AQ. Baroness Manningham-Buller, former head of the British Security Ser-
vice (MI5) has publically endorsed the possibility of talks with AQ on tangible issues
such as Western policy in the Middle East, although she acknowledges that formal ne-
gotiations are a long way off.57 In an interview in 2008, Sir Hugh Orde, then head of
the Police Service of Northern Ireland, claimed that his experience fighting terrorism
in Northern Ireland had convinced him that talking to AQ was not “unthinkable” but
rather a matter of “timing.”58
Powell argues that almost all terrorist groups have been branded at some point as
“total absolutes” by their opponents, but have eventually been engaged in talks. 59
Arguably, the rise of IS has made the chances of dialogue with AQ more likely. Since
the formal split between IS and AQ in 2013, al-Zawahari has tried to distance his
movement from the brutal methods and sectarian extremism of its former ally. AQ’s
Syrian affiliate, Jabhat al-Nusra (JN), appears to be following this strategic guidance.
The group avoids sectarian killings and has taken steps to protect non-combatants,
including non-Muslims.60 This apparently pragmatic approach to jihad in contrast to
IS’ uncompromising extremism has led a number of commentators to suggest that it
might be appropriate for the US to cooperate with JN.61 Maybe the timing is finally
right for talks with AQ.
Conclusion
It is not always a good idea to talk to terrorists, and dialogue and negotiations
alone will not bring a terrorist campaign to an end. Nevertheless, talks should
never be ruled out in principle. As part of a comprehensive CT strategy, it is not
unusual for fighting and talking to take place at the same time. Dialogue can
offer the more moderate elements in a terrorist group a political alternative to
violence and marginalize irreconcilables. If a terrorist group’s ideological
stance rules out the prospect of any formal negotiations, then at least contact
and dialogue can help provide a better understanding of the movement’s objec-
tives, thinking and leadership. It is only through such engagement over an ex-
tended period of time that enemies will be able to identify common interests,
explore potential compromises and build the trust necessary for formal negoti-
ations.
Talking has the potential to transform perceptions and influence thinking
even if there are few concrete outcomes. As Dolnik and Fitzgerald advise: “Do
not negotiate with the terrorist, negotiate with the rational human being who,
for some set of reasons, has chosen—or felt forced into—an extreme, violent
course of action.”62 As successful case studies demonstrate, although talks can
be tortuous, prolonged and frustrating, they can potentially deliver peaceful
outcomes to long-standing violent conflicts.
Bibliography
“Al-Qaeda and Pakistan: The Evidence of the Abbottabad Documents (Part
Three).” Jihadica.com. Accessed May 24, 2015. www.jihadica.com/wp-
content/uploads/2015/03/422-10-CR-109-S-4-RJD-Translation.pdf.
“Bullet Proof: Colombia’s Peace Process.” The Economist, May 30, 2015. Ac-
cessed May 30, 2015, www.economist.com/news/americas/21652332-
despite-escalation-violence-talks-continue-bullet-proof.
“Civil Wars: How to Stop the Fighting, Sometimes.” The Economist, November 9,
2013. Accessed June 12 2015. www.economist.com/news/briefing/
21589431-bringing-end-conflicts-within-states-vexatious-history-
provides-guide.
“Colombia’s War: Picking Up Where They Left Off.” The Economist, December 6,
2014. Accessed May 25, 2015. www.economist.com/news/americas/
21635481-release-kidnapped-general-allows-peace-talks-resume-picking-
up-where-they-left.
“Deaths from Conflict in Northern Ireland by Year and Status.” Conflict Archive
on the Internet (CAIN), University of Ulster. accessed May 22, 2015,
https://docs.google.com/spreadsheet/ccc?key=0AonYZs4MzlZbcGhOdG0z
TG1EWkVNMkpwa3A1ZTBsZFE#gid=0.
“Extracts from Bush’s Speech.” BBC News, April 4, 2002. Accessed May 22,
2015. http://news.bbc.co.uk/2/hi/middle_east/1911665.stm.
62 Dolnik and Fitzgerald, Negotiating Hostage Crises with the New Terrorists, 162.
196 James K. Wither
“Open Letter on Middle East Policy: Lasting Peace Only Possible with Hamas on
Board.” Spiegel Online International, June 10, 2011. Accessed June 22, 2015.
www.spiegel.de/international/world/open-letter-on-middle-east-policy-
lasting-peace-only-possible-with-hamas-on-board-a-767819.html.
“Privatising Peace.” The Economist, July 2, 2011. Accessed June 15, 2015.
http://www.economist.com/node/18895458.
“State Sponsors of Terrorism.” US Department of State, undated. Accessed June
19, 2015. http://www.state.gov/j/ct/list/c14151.htm.
“UK Envoy in first Hezbollah Talk.” BBC News, June 18, 2009. Accessed June 18,
2015. http://news.bbc.co.uk/2/hi/middle_east/8107837.stm.
“Zapatero’s Dilemma: the Issue of Terrorism Returns to the Heart of Spanish
Politics.” The Economist, March 15, 2007. Accessed May 23, 2015.
http://www.economist.com/node/8864534.
Byman, Daniel. “The Decision to Begin Talks with Terrorists: Lessons for Policy
Makers.” Studies in Conflict and Terrorism 29, no. 5 (2006): 403–414.
Clark, Robert. Negotiating with ETA: Obstacles to Peace in the Basque Country
1975 – 1988. Reno: University of Nevada Press, 1990.
Cronin, Audrey Kurth. “Negotiating with Groups that Use Terrorism: Lessons
for Policy-Makers.” Background Papers. Centre for Humanitarian Dialogue,
2008. Accessed May 22, 2015. www.hdcentre.org/uploads/tx_news/
91AudreyKurth-CroninNegotiatingwithgroupsthatuseterrorism.pdf.
Dobbins, James, and Carter Malkasian. “Time to Negotiate in Afghanistan: How
to Talk to the Taliban.” Foreign Affairs 94, no. 4 (2015): 53–64.
Dodd, Vikram. “Time to Talk to al Qaeda, Senior Police Chief Urges.” The
Guardian, May 30, 2008. Accessed June 23, 2015. www.theguardian.com/
world/2008/may/30/alqaida.terrorism.
Dolnik, Adam, and Keith M. Fitzgerald. Negotiating Hostage Crises with the New
Terrorists. Westport CT: Praeger Security International, 2008.
Fisas, Vinceç. The Design and Architecture of Peace Processes: Lessons Learned in
the Wake of Crises. Oslo: Norwegian Peacebuilding Resource Centre, 2015.
Accessed May 22, 2015. http://escolapau.uab.cat/img/programas/
procesos/NOREFin.pdf.
Fisk, Robert. “Talking to ISIS Could Lead to Peace, Yet for Some Reason We’re
Not Allowed to Do It.” The Independent, February 20, 2015. Accessed June
26, 2015. www.independent.co.uk/voices/comment/talking-offers-hope-
of-a-peaceful-solution-but-were-not-allowed-to-do-it-10047640.html.
Ginty, Roger Mac. “Look Who’s Talking, Dialogue and Conflict Transformation.”
Critical Studies on Terrorism 6, no. 1 (2013): 216–23.
Goerzig, Carolin. “Engaging Hamas: Rethinking the Quartet Principles.” Euro-
pean Institute for Security Studies, March 2010. Accessed June 22, 2015.
http://www.iss.europa.eu/publications/detail/article/engaging-hamas-
rethinking-the-quartet-principles/.
Talking to Terrorists 197
Quinney, Nigel, and A. Heather Coyne, eds. Talking to Groups That Use Terror.
Washington, D.C.: USIP, 2011.
Richardson, Louise. “Britain and the IRA.” In Democracy and Counterterrorism,
edited by Robert J. Art and Louise Richardson, 63-104. Washington, DC:
USIP, 2007.
Ricks, Thomas E. The Gamble: General Petraeus and the Untold Story of the
American Surge in Iraq 2006-2008. London: Allen Lane, 2009.
Rothstein, Robert L. “The Timing of Negotiations: Dueling Metaphors.” Civil
Wars 9, no. 3 (2007): 262–81.
Scham, Paul, and Osama Abu-Irshaid. Hamas: Ideological Rigidity and Political
Flexibility. Washington DC: USIP, June 2009. Accessed June 12, 2015.
www.usip.org/publications/hamas-ideological-rigidity-and-political-
flexibility.
Seib, Gerald F., and Bill Wall. “Strange Bedfellows: Brutal Rise of Islamic State
Turns Old Enemies into New Friends.” Wall Street Journal, August 30, 2014.
Thomas, Jakana. “Actually, Sometimes Terrorism Does Work.” Washington Post,
April 22, 2014. Accessed June 1, 2015. www.washingtonpost.com/
blogs/monkey-cage/wp/2014/04/22/actually-sometimes-terrorism-
does-work/.
Travis, Alan, and Owen Bowcott. “Papers Released under the 30 Year Rule Re-
veal the Full Force of Thatcher’s Fury.” The Guardian, December 30, 2009.
Accessed May 22, 2015. www.theguardian.com/uk/2009/dec/30/30-year-
rule-thatcher-papers-released.
United States Institute of Peace. “Mutually Hurting Stalemate.” USIP Glossary of
Terms for Conflict Management and Peacebuilding, 2011. Accessed June 11,
2015. http://glossary.usip.org/resource/mutually-hurting-stalemate.
Weinberg, Leonard. “The Red Brigades.” In Democracy and Counterterrorism,
edited by Robert J. Art and Louise Richardson, 25-62. Washington DC:
USIP, 2007.
Whaley, Floyd. “Philippine Rebels Give Up Dozens of Weapons in Step Toward
Peace Deal.” International New York Times, June 16, 2015.
Wither, James K. “Selective Engagement with Islamist Terrorists: Exploring the
Prospects.” Studies in Conflict & Terrorism 32, no. 1 (2009): 18–35.
Wright, Lawrence. The Looming Tower: Al Qaeda and the Road to 9/11. New
York: Alfred A Knopf, 2007.
Zartman, I. William. “Negotiating with Terrorists.” International Negotiation 8,
no. 3 (2003): 443–50.
Zartman, I. William. “The Timing of Peace Initiatives: Hurting Stalemates and
Ripe Moments.” Global Review of Ethnopolitics 1, no. 1 (2001): 8–18.
Chapter 13
Countering Violent Extremism
Sam Mullins
Introduction
The term “countering violent extremism” (CVE) has become like a buzzword in
recent years – frequently used and yet rarely defined. Although there is no sin-
gle definition of CVE, it refers primarily to ‘soft’ approaches to undermining the
appeal of violent extremism and terrorism. This includes a wide variety of
different measures, some of which are preventive, while others aim at rehabili-
tation. They may be narrow or broad in scope; state-run or non-governmental;
in-person or online; large or small-scale. Perhaps most importantly, efforts to
counter violent extremism are often culturally unique and so we cannot as-
sume that what works in one country will work in the next. While clearly di-
verse, all CVE programs nevertheless share the same fundamental goal: to re-
duce the risk of engagement or re-engagement in extremist-related violence.1
Importantly, there is growing consensus that CVE can play a significant role
as part of a comprehensive counter-terrorism (CT) strategy and an increasing
number of countries around the world are establishing CVE programs. Never-
theless, it is vital to appreciate that although CVE draws upon lessons learned
from other areas, it is still relatively new, both in terms of concept and practice.
In addition, there are considerable challenges involved in trying to measure the
efficacy of CVE and, because of this, it is difficult to establish with certainty just
how effective (or sometimes ineffective or even harmful) these types of inter-
vention are. As a result, there are also many CVE skeptics. The aim of this chap-
ter is not to persuade the reader either way, but to offer an objective assess-
ment. The reality is that an increasing number of CT professionals will come
into contact with CVE programs, and in some cases may be directly involved in
them. It is therefore essential to develop an informed understanding of what
these different projects entail and what they have to offer.
This chapter begins by explaining key concepts and exploring the different
reasons why people sometimes disengage (or fail to engage in the first place)
with violent extremism. It then outlines the range of different tools that can be
applied in CVE before describing case studies of targeted interventions aimed
at rehabilitation of captured/convicted terrorists in Saudi Arabia and preven-
tion of potential violent extremism in the UK. Principles of best practice which
1 John Horgan and Kurt Braddock, “Rehabilitating the Terrorists?: Challenges in As-
sessing the Effectiveness of De-radicalization Programs,” Terrorism and Political Vio-
lence 22, no. 2 (2010): 267–91.
2 Note, however, that radicalization does not inevitably lead to violent behavior.
3 Tore Bjørgo and John Horgan, “Introduction,” in Leaving Terrorism Behind: Individual
and Collective Disengagement, ed. Tore Bjørgo and John Horgan (Oxon and New York:
Routledge, 2009), 1–14.
4 Bjørgo and Horgan, “Introduction.”
5 The following discussion of factors which influence disengagement draws upon: Tore
Bjørgo, “Processes of Disengagement from Violent Groups of the Extreme Right,” in
Leaving Terrorism Behind, ed. Bjørgo and Horgan, 30–48; Froukje Demant et al., De-
cline and Disengagement: An Analysis of Processes of Deradicalisation (Amsterdam: In-
stitute for Migration and Ethnic Studies, 2008); John Horgan, “Individual Disengage-
ment: A Psychological Analysis,” in Leaving Terrorism Behind, ed. Bjørgo and Horgan,
17–29; John Horgan, Walking Away from Terrorism: Accounts of Disengagement from
Radical and Extremist Movements (Oxon and New York: Routledge, 2009).
Countering Violent Extremism 201
cinctly put it, “War is really hard. Plus, the commanders keep all the money.” 6
At the same time, there are pull factors which can draw people towards a le-
gitimate lifestyle.7 These can include wanting to spend more time with family
(especially new-born babies), the desire for a wife, material possessions, edu-
cation, a career or simply a ‘normal’ life free from the stress and pressure as-
sociated with being part of a clandestine organization. However, there are often
significant barriers or inhibitors to leaving such groups – most obviously the
risk of physical harm, imprisonment or death, either from one’s own comrades,
security forces or rivals. There are also important psychological barriers in-
cluding friendship, loyalty and fear or uncertainty about whether an alternative
life is possible. Similarly, there may be a feeling of “sunk cost,” i.e. reluctance to
walk away from something for which sacrifices have been made and a great
deal of time and effort has been invested. On the other hand, there may also be
facilitators of disengagement that can trigger a “cognitive opening” 8 or else
support the transition process. For example, a defector from the Provisional
Irish Republican Army (PIRA), who later became an informant, first began to
question his involvement after one of his commanders, having just learned that
they had killed a female police officer in a bombing attack, declared “I hope she
was pregnant, and we got two for the price of one.”9 Significant others (friends
or family) can also sometimes influence a person to question their involvement
in terrorism and/or support the process of disengagement.
With all this in mind, the challenge for CVE is to cultivate a sense of disillu-
sionment with extremist/terrorist organizations and/or their ideology; to
make an alternative, legitimate lifestyle both attractive and attainable; and—if
a person is already involved—to overcome any inhibitors to leaving extremism
behind, and to ultimately facilitate the transition away from violence towards
becoming a productive member of society.
10 For a more thorough discussion see Rachel Briggs and Sebastien Feve, Review of
Programs to Counter Narratives of Violent Extremism: What Works and What are the
Implications for Government? (Institute for Strategic Dialogue, 2013) accessed May
29, 2015, http://www.strategicdialogue.org/CounterNarrativesFN2011.pdf.
11 David Sim, “Iraqi TV Show Mocks Isis: Dawlat al-Khurafa (Mythical State) Turns Jihad
Into Satire,” International Business Times, October 15, 2014, accessed May 29, 2015,
http://www.ibtimes.co.uk/iraqi-tv-show-mocks-isis-dawlat-al-khurafa-mythical-
state-turns-jihad-into-satire-1470082.
12 Alison Smale, “Germany Adds Lessons in Islam to Better Blend Its Melting Pot,” New
York Times, January 6, 2014, accessed January 7, 2014, www.nytimes.com/2014/
01/07/world/europe/germany-adds-lessons-in-islam-to-better-blend-its-melting-
pot.html.
Countering Violent Extremism 203
13 These include the education sector, health care, the criminal justice system, charities,
faith institutions and the Internet. See HM Government, Prevent Strategy (London:
The Stationery Office, 2011), 8, accessed May 30, 2015, www.homeoffice.gov.uk/
publications/counter-terrorism/prevent/prevent-strategy/prevent-strategy-review.
14 HM Government, Prevent Strategy, 57–58.
204 Sam Mullins
a ‘normal’ life. Interventions of this kind try to address the “pull factors” de-
scribed above and to facilitate the transition away from violence without nec-
essarily targeting a person’s beliefs. Practical approaches to disengagement
thus have much in common with disarmament, demobilization and reintegra-
tion (DDR) programs, which have existed for at least 25 years.15
Other approaches which are sometimes incorporated within targeted inter-
ventions include social and psychological counselling; offers of amnesty or re-
duced sentencing; promotion of non-violent political activity; one-to-one men-
toring; group-based discussions; and restorative justice. Government institu-
tions are sometimes directly involved in running targeted interventions for
CVE. For example, in Pakistan the military (assisted by civilians) is responsible
for operating at least six disengagement/de-radicalization programs for former
militants, including one for minors.16 The program in Saudi Arabia is also state-
run (see Case Study 13.1). In many other countries, however, the government’s
role is primarily limited to funding and facilitation, while most of the ‘hands
on,’ specialized counter-/de-radicalization and disengagement work is done by
non-governmental organizations (NGOs). Nevertheless, it is worth highlighting
that several European countries also incorporate existing, mainstream social
services into their CVE strategies, and in the UK the police play the lead role in
coordinating service delivery (see Case Study 13.2).
Other Options
In addition to the methods listed above, it is possible to support CVE in a num-
ber of other ways. For instance, aid and development projects, either at home
or abroad, can potentially help to counter extremist narratives by actively
demonstrating state benevolence, whilst at the same time addressing social,
economic or political grievances that terrorists seek to exploit. Another course
of action that lies within the more ‘traditional’ realm of CT is to try and stop the
extremists’ messages from getting out in the first place. Specific measures here
may include censorship, banning of extremist organizations and targeting
terrorist ideologues and recruiters for arrest or other forms of punitive inter-
vention. Such actions can certainly be useful; however, it is important to realize
that they have their limitations and experience has shown that repression
alone is rarely, if ever, an effective solution.
15 For example, see DDR in Peace Operations: A Retrospective (New York: United
Nations, 2010), accessed May 30, 2015, www.un.org/en/peacekeeping/documents/
DDR_retrospective.pdf.
16 Shehzad H. Qazi, “A War Without Bombs: Civil Society Initiatives Against
Radicalization in Pakistan,” Institute for Social Policy and Understanding, 2013,
accessed June 9, 2013, www.ispu.org/pdfs/ISPU_Brief_CounterDeradicalization_2_
14.pdf.
Countering Violent Extremism 205
17 This case study is based mainly upon Christopher Boucek, “Saudi Arabia’s ‘Soft’
Counter-Terrorism Strategy: Prevention, Rehabilitation, and Aftercare,” Carnegie
Papers 97 (September 2008), accessed June 1, 2015, http://carnegieendowment.org/
files/cp97_boucek_saudi_final.pdf.
206 Sam Mullins
18 Peter Beaumont, “‘Living Suicide Bomb’ Rejoins Al-Qaida After Saudi Depro-
gramming,” The Guardian, January 18, 2014, accessed June 1, 2015,
http://www.theguardian.com/world/2014/jan/18/suicide-bomb-al-qaida-saudi-
ahmed-al-shayea.
19 Taylor Luck, “Returning Jihadis: At Luxurious Rehab Center, A Saudi Cure for
Extremism,” Christian Science Monitor, May 17, 2015, accessed June 1, 2015,
http://www.csmonitor.com/World/Middle-East/2015/0517/Returning-jihadis-At-
luxurious-rehab-center-a-Saudi-cure-for-extremism.
20 For a comparison of rehabilitation programs for terrorists and criminals see Sam
Mullins, “Rehabilitation of Islamist terrorists: Lessons from Criminology,” Dynamics
of Asymmetric Conflict 3, no. 3 (2010): 162–93.
Countering Violent Extremism 207
21 This case study draws primarily upon: HM Government, Channel Duty Guidance
(London: The Stationery Office, 2015), accessed May 31, 2015, https://www.gov.uk/
government/uploads/system/uploads/attachment_data/file/425189/Channel_Duty
_Guidance_April_2015.pdf.
22 Channel also receives referrals from the prison service and thus supports rehabilita-
tion as well as prevention, although the primary emphasis is on the latter.
23 Shiraz Maher and Martyn Frampton, Choosing Our Friends Wisely: Criteria for Engage-
ment with Muslim Groups (London: Policy Exchange, 2009), accessed May 21, 2012,
208 Sam Mullins
As a result of these problems, Prevent and the Channel Project have undergone
significant reforms since 2011 and are now more clearly aimed at addressing all
forms of extremism, rather than singling out Islamists alone. However, there is still a
negative stigma attached to these efforts and, in light of the vast increase in
radicalization in response to events in Syria and Iraq, some commentators have
concluded that CVE in the UK has failed.25 In spite of this, the British government has
clearly reaffirmed its commitment to Prevent more generally and the Channel Project
http://www.policyexchange.org.uk/images/publications/pdfs/Choosing_Our_Friend
s_Wisely.pdf.
24 See “Channel: Supporting Individuals Vulnerable to Violent Extremists: A Guide for
Local Partnerships,” HM Government, accessed May 31, 2015, https://www.counter
extremism.org/resources/details/goto_url/95/3835.
25 James Brandon, “The UK’s Counter-Radicalization Strategy Just Failed; What Now?”
War on the Rocks, September 18, 2014, accessed September 21, 2014,
http://warontherocks.com/2014/09/uk-attempts-to-create-moderate-islam-just-
failed-what-now/.
Countering Violent Extremism 209
in particular. Between 2012 and 2015, over 2,000 people were referred to Channel
and hundreds received support.26 In addition to this, increasing numbers of
community groups throughout the country are mobilizing against violent extremism,
with or without the support of government.
Ongoing Challenges
The practice of CVE faces significant ongoing challenges, including risk assess-
ment, program evaluation, potential backlash and concerns regarding civil lib-
erties.
Risk Assessment
Although significant progress is being made in this area, 30 structured risk as-
sessment for potential/convicted violent extremists and terrorists is still very
much in the early days of development. Without scientifically validated risk as-
sessment tools (in particular ones that are able to measure changes over time),
there is greater likelihood of error, meaning that it is extremely difficult to
make reliable judgments about the level of risk that any given individual pre-
sents. This in turn means it is difficult to decide what level and type of ‘treat-
ment’ should be given to different individuals, which then also means it is hard
to tell whether resources are being used efficiently.
Defining and Measuring ‘Success’
Program evaluation is crucial, yet impossible without a clear definition of suc-
cess and the ability to measure it.31 Committing an extremist-related offence is
28 Although, notably, the British government has indicated that de-radicalization will be
mandatory for jihadist foreign fighters returning from Syria/Iraq.
29 Note that this does not preclude the use of sarcasm and mockery in more broadly tar-
geted strategic communications, although it is unlikely that these techniques would
work in targeted interventions.
30 Most notably, the Violent Extremism Risk Assessment tool (VERA-2). See D. Elaine
Pressman and John Flockton, “Calibrating Risk for Violent Political Extremists and
Terrorists: The VERA 2 Structured Assessment,” British Journal of Forensic Practice
14, no. 4 (2012): 237–51.
31 For a practical guide to monitoring and evaluation in CVE see Laura Dawson, Charlie
Edwards, and Calum Jeffray, Learning and Adapting: The Use of Monitoring and
Countering Violent Extremism 211
the most obvious indicator of failure but is also problematic. In a preventive in-
tervention, the people being targeted have not yet committed an offence. If they
still have not committed an offence following participation in a CVE program of
some kind, it is difficult to say what has been achieved without some other
measurements taking place, since there is no guarantee that they would have
broken the law in the absence of intervention. Similarly, to be able to evaluate
the efficacy of a rehabilitation program in terms of recidivism, it is necessary to
know the average base-rate of re-offending. However, because terrorism is a
relatively low-probability activity and there is a general lack of systematic data
collection, this information is largely unavailable. An 88 percent ‘success rate’
might seem impressive, but if only 12 percent of terrorists re-offend anyway,
the impact would appear to have been negligible. It is therefore necessary to
develop and measure multiple indicators of success (including such things as
changes in individual attitudes, beliefs and behavior) that will enable a more
refined assessment.
Backlash, Infiltration and Abuse
As noted above, CVE in the UK was met with considerable backlash within
Muslim communities by those who felt it was excuse to spy on them. Extremist
organizations also actively encouraged these sentiments, whilst some effec-
tively infiltrated the program to the extent that they were given funding by the
government.32 This latter point illustrates the related challenge of choosing
non-governmental partners to work with. Indeed, without clear criteria and a
working knowledge of the issues at hand, as well as specific groups, it can be
difficult to tell who is able to effectively assist and who might have ulterior mo-
tives. In connection with this, unfair or uneven distribution of government
support can foster tensions within communities.33 At the same time, support
from government institutions which do not view CT or CVE as their business
(notably the education sector), is far from guaranteed. Therefore, achieving a
true “whole-of-government,” let alone a “whole-of-society” approach to CVE is
a monumental task.
Furthermore, it is important to note that these issues are not restricted to
Western society, although they may manifest themselves differently in other
environments. Terrorists have spoken out against de-radicalization efforts in
Egypt, Saudi Arabia and elsewhere and have also directly targeted rehabilita-
tion centers and reformed terrorists. For instance, the head of education at the
Sabaoon center in the Swat valley in Pakistan was assassinated by the Pakistani
NGOs with the aim of professionalizing program design and delivery. One
example of this type of initiative is the European Commission’s Radicalisation
Awareness Network (RAN), which was established in 2011 with the aim of
helping “first-line local practitioners [involved in CVE] and… facilitat[ing] the
exchange of experiences and best practices between them.”39
Perhaps most importantly of all, there is a continuing, acute need for re-
search and evaluation of CVE in order to refine both understanding and prac-
tice. Here too, there have been many positive developments. The establishment
of the Hedayah Center in Abu Dhabi in 2012 is a notable example. Also known
as the Center of Excellence for Countering Violent Extremism, it aims “to serve
as the premier international institution for training, dialogue, collaboration,
and research to counter violent extremism in all of its forms and manifesta-
tions, in support of long-term, global efforts to prevent and counter terror-
ism.”40 In time, these sorts of efforts may provide more definitive answers to
the key questions that remain about CVE – in particular, how effective are these
different programs, and which specific approaches have the greatest impact?
Conclusion
Soft approaches to CT, now collectively referred to as CVE, are extremely di-
verse and are becoming ever more popular. While there is a considerable body
of anecdotal and empirical evidence to suggest that at least some CVE pro-
grams can be effective, many questions still remain and there are still numer-
ous challenges that must be overcome. In spite of this continuing uncertainty,
CVE is growing in practice and has been repeatedly highlighted by the UN as a
necessary component of a comprehensive CT strategy.41 However, it is im-
portant to note that CVE is not intended to replace more traditional CT
measures, nor is it seen as a magical solution to all violent extremism. Rather, it
may serve to complement ‘harder’ approaches to CT by filling certain gaps and
militating against some of the negative repercussions that sometimes result
from these measures. CVE—like all CT—is imperfect, yet it appears to be here
to stay. As a result, it is important that CT practitioners gain an understanding
of this field, including both the positives and the negatives.
Bibliography
“Afghanistan Peace and Reintegration Program.” ISAF, undated. Accessed Sep-
tember 9, 2013. http://www.isaf.nato.int/article/focus/afghanistan-peace-
and-reintegration-program.html.
“Channel: Supporting Individuals Vulnerable to Violent Extremists: A Guide for
Local Partnerships.” HM Government. Accessed May 31, 2015.
https://www.counterextremism.org/resources/details/goto_url/95/3835.
“Radicalisation Awareness Network.” European Commission, April 24, 2015.
Accessed June 2, 2015. http://ec.europa.eu/dgs/home-affairs/what-we-
do/networks/radicalisation_awareness_network/index_en.htm.
Ahmed, Azam. “Afghan Amnesty Program Falls Short, Leaving Ex-Insurgents
Regretful and Angry.” New York Times, January 9, 2013. Accessed June 2,
2015. http://www.nytimes.com/2013/01/10/world/asia/many-afghan-
ex-insurgents-regret-laying-down-arms.html.
Altier, Mary Beth, Christian Thoroughgood, and John Horgan. “Turning Away
From Terrorism: Lessons from Psychology, Sociology, and Criminology.”
Journal of Peace Research 51, no. 5 (2014): 647–61.
Barrelle, Kate. “Pro-Integration: Disengagement from and Life after Extrem-
ism.” Behavioral Sciences of Terrorism and Political Aggression 7, no. 2
(2015): 129–42.
Beaumont, Peter. “‘Living Suicide Bomb’ Rejoins Al-Qaida After Saudi Depro-
gramming.” The Guardian, January 18, 2014. Accessed June 1, 2015.
http://www.theguardian.com/world/2014/jan/18/suicide-bomb-al-
qaida-saudi-ahmed-al-shayea.
Bjørgo, Tore, and John Horgan. “Introduction.” In Leaving Terrorism Behind: In-
dividual and Collective Disengagement, edited by Tore Bjørgo and John Hor-
gan, 1–14. Oxon and New York: Routledge, 2009.
Bjørgo, Tore. “Processes of Disengagement from Violent Groups of the Extreme
Right.” In Leaving Terrorism Behind: Individual and Collective Disengage-
ment, edited by Tore Bjørgo and John Horgan, 30–48. Oxon and New York:
Routledge, 2009.
Boucek, Christopher. “Saudi Arabia’s ‘Soft’ Counter-Terrorism Strategy: Pre-
vention, Rehabilitation, and Aftercare.” Carnegie Papers 97 (September
2008). Accessed June 1, 2015. http://carnegieendowment.org/files/cp97_
boucek_saudi_final.pdf.
Brandon, James. “The UK’s Counter-Radicalization Strategy Just Failed; What
Now?” War on the Rocks, September 18, 2014. accessed September 21,
2014. http://warontherocks.com/2014/09/uk-attempts-to-create-moderate-
islam-just-failed-what-now/.
Briggs, Rachel, and Sebastien Feve. Review of Programs to Counter Narratives of
Violent Extremism: What Works and What are the Implications for Govern-
Countering Violent Extremism 215
ment?. Institute for Strategic Dialogue, 2013. Accessed May 29, 2015.
http://www.strategicdialogue.org/CounterNarrativesFN2011.pdf.
Dawson, Laura, Charlie Edwards, and Calum Jeffray. Learning and Adapting: The
Use of Monitoring and Evaluation in Countering Violent Extremism. London:
RUSI, 2014. Accessed June 2, 2015. www.rusi.org/publications/rusibooks/
ref:O53D0E70CA1731/.
DDR in Peace Operations: A Retrospective. New York: United Nations, 2010. Ac-
cessed May 30, 2015. www.un.org/en/peacekeeping/documents/DDR_
retrospective.pdf.
Demant, Froukje, et al. Decline and Disengagement: An Analysis of Processes of
Deradicalisation. Amsterdam: Institute for Migration and Ethnic Studies,
2008.
Gartrell, Adam, Natalie O’Brien, and Michael Bachelard. “Secret Grants for Coun-
tering Violent Extremism Programs Split Communities.” Sydney Morning
Herald, May 31, 2015. Accessed June 1, 2015. http://www.smh.com.au/
nsw/secret-grants-for-countering-violent-extremism-programs-split-
communities-20150530-ghcojw.
HM Government, Channel Duty Guidance. London: The Stationery Office, 2015.
Accessed May 31, 2015. https://www.gov.uk/government/uploads/
system/uploads/attachment_data/file/425189/Channel_Duty_Guidance_A
pril_2015.pdf.
HM Government, CONTEST: The United Kingdom’s Strategy for Countering Ter-
rorism: Annual Report for 2014. London: The Stationery Office, 2015. Ac-
cessed May 31, 2015. www.gov.uk/government/uploads/system/uploads/
attachment_data/file/415711/contest_annual_report_for_2014_print.pdf.
HM Government. Prevent Strategy. London: The Stationery Office, 2011. Ac-
cessed May 30, 2015. www.homeoffice.gov.uk/publications/counter-
terrorism/prevent/prevent-strategy/prevent-strategy-review.
Horgan, John, and Kurt Braddock. “Rehabilitating the Terrorists?: Challenges in
Assessing the Effectiveness of De-radicalization Programs.” Terrorism and
Political Violence 22, no. 2 (2010): 267–91.
Horgan, John. “Individual Disengagement: A Psychological Analysis.” In Leaving
Terrorism Behind: Individual and Collective Disengagement, edited by Tore
Bjørgo and John Horgan, 17–29. Oxon and New York: Routledge, 2009.
Horgan, John. The Psychology of Terrorism. Oxon: Routledge, 2005.
Horgan, John. Walking Away from Terrorism: Accounts of Disengagement from
Radical and Extremist Movements. Oxon and New York: Routledge, 2009.
Luck, Taylor. “Returning Jihadis: At Luxurious Rehab Center, A Saudi Cure for
Extremism.” Christian Science Monitor, May 17, 2015. Accessed June 1,
2015. www.csmonitor.com/World/Middle-East/2015/0517/Returning-
jihadis-At-luxurious-rehab-center-a-Saudi-cure-for-extremism.
216 Sam Mullins
Maher, Shiraz, and Martyn Frampton. Choosing Our Friends Wisely: Criteria for
Engagement with Muslim Groups. London: Policy Exchange, 2009. Accessed
May 21, 2012. www.policyexchange.org.uk/images/publications/pdfs/
Choosing_Our_Friends_Wisely.pdf.
Montalbano, William D. “Defector Takes on the IRA.” Los Angeles Times, Febru-
ary 28, 1997. Accessed May 29, 2015. http://articles.latimes.com/print/
1997-02-28/news/mn-33434_1_ira-leader.
Mullins, Sam. “Rehabilitation of Islamist terrorists: Lessons from Criminology.”
Dynamics of Asymmetric Conflict 3, no. 3 (2010): 162–93.
Pressman, D. Elaine, and John Flockton. “Calibrating Risk for Violent Political
Extremists and Terrorists: The VERA 2 Structured Assessment.” British
Journal of Forensic Practice 14, no. 4 (2012): 237–51.
Qazi, Shehzad H. “A War Without Bombs: Civil Society Initiatives Against Radi-
calization in Pakistan.” Institute for Social Policy and Understanding, 2013.
Accessed June 9, 2013. http://www.ispu.org/pdfs/ISPU_Brief_Counter
Deradicalization_2_14.pdf.
Sim, David. “Iraqi TV Show Mocks Isis: Dawlat al-Khurafa (Mythical State)
Turns Jihad Into Satire,” International Business Times, October 15, 2014.
Accessed May 29, 2015. http://www.ibtimes.co.uk/iraqi-tv-show-mocks-
isis-dawlat-al-khurafa-mythical-state-turns-jihad-into-satire-1470082.
Smale, Alison. “Germany Adds Lessons in Islam to Better Blend Its Melting Pot.”
New York Times, January 6, 2014. Accessed January 7, 2014.
www.nytimes.com/2014/01/07/world/europe/germany-adds-lessons-in-
islam-to-better-blend-its-melting-pot.html.
Theidon, Kimberley. “Transitional Subjects: The Disarmament, Demobilization
and Reintegration of Former Combatants in Colombia.” International Jour-
nal of Transitional Justice 1, no. 1 (2007): 66–90.
UN Security Council. “Analysis and Recommendations with Regard to the
Global Threat from Foreign Terrorist Fighters,” May 19, 2015. Accessed
June 10, 2015. http://www.un.org/en/ga/search/view_doc.asp?symbol=S/
2015/358.
Wictorowicz, Quintan. Radical Islam Rising: Muslim Extremism in the West. Lan-
ham: Rowman and Littlefield, 2005.
Chapter 14
Counter-Terrorist Financing
John Sawicki
Introduction
Napoleon’s famous proclamation that “an army marches on its stomach” might
be applied to the operations of terrorist organizations. Shadowy and fearsome
they might be, but they still must eat, drink, clothe and equip themselves, and
be able to pay for their logistical and other needs. If counter-terrorism (CT) ef-
forts can break terrorist financing, this can break the organization. This chapter
explores the value of counter-terrorist financing (CFT), outlining its im-
portance and then identifying four typologies, based on revenue origin, which
help us to understand terrorist funding. It will look at two illustrative case
studies (one on the operations of al-Qaeda in Iraq and the other on the use of
gemstones in terrorist financing) and concludes by surveying money launder-
ing operations and emerging trends in terrorist financing in the digital age.
1 Estimates for large organizations run into millions, even billions of dollars. See Peter
Romaniuk, “The State of the Art on the Financing of Terrorism,” RUSI Journal 159,
no. 2 (April/May 2014): 9.
Finally, countries without violent terrorism may still be important to the logis-
tical and financial functions of those organizations. It is not unusual for coun-
tries to maintain that since they have no incidence of violent political acts—
particularly those one might call terrorist—they have no problem with terror-
ism. Terror groups rely upon financial networks all around the world to trans-
fer their funds, raise additional sources of revenue and provide safe havens to
train, equip and, in general, to act as a logistical base. The absence of terrorist
violence in a country does not necessarily mean that terrorists are not present.
For instance, al-Shabaab is not known to carry out attacks in Sierra Leone or
Senegal, yet is active in the illegal trafficking of wildlife products such as rhino
horn and elephant ivory.3 Colombia’s FARC does not engage in overt violence in
West Africa but uses several of these countries as conduits to ship cocaine to
Europe.4
3 Catrina Stewart, “Illegal Ivory Trade Funds al-Shabaab’s Terrorist Attacks,” The Inde-
pendent, October 6, 2013, accessed July 10, 2015, www.independent.co.uk/news/
world/africa/illegal-ivory-trade-funds-alshabaabs-terrorist-attacks-88613 15.html.
4 See, for example, UNODC, Cocaine Trafficking in West Africa: The Threat to Stability
and Development (with special reference to Guinea-Bissau), United Nations Office on
Drugs and Crime, December 2007, 21, accessed July 10, 2015, www.unodc.org/
documents/data-and-analysis/west_africa_cocaine_report_2007-12_en.pdf.
5 Michael Freeman and Moyara Ruehsen, “Terrorism Financing Methods: An
Overview,” Perspectives on Terrorism 4, no. 7 (2013): 5–26, accessed July 10, 2015,
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/279.
220 John Sawicki
come. In some cases the terrorists themselves may be personally very wealthy,
as was the case with Osama bin Laden before AQ was proscribed and his assets
were frozen.6 AQ also benefited from outside donations from a number of Saudi
and Gulf State millionaires, collectively known as Osama’s “Golden Chain.”7
As the power of a group grows, it may also find that it can generate revenue
from the territory it controls through popular taxation, extortion or racketeer-
ing, e.g. the National Movement for the Liberation of Azawad (MNLA) in Mali
and Hezbollah in Lebanon. Of course, a variety of voluntary and involuntary
contributions are frequently combined. For instance, the Peruvian terror or-
ganization Sendero Luminoso (Shining Path) received cash and weapons from
Cuba and Communist East Bloc nations during the Cold War. Marginal cash in-
come was generated from a limited involvement in cocaine production while
‘revolutionary levies’ and ‘voluntary contributions’ were solicited from peas-
ants in the areas which they controlled.8
Group-Specific Sources of Funding
We may speak of group-specific sources of funding to the extent that they are
only made possible by the specific ethnic or religious identity of the group in
question and are therefore either difficult to replicate outside of that organiza-
tion, or are genuinely unique to it. This includes a group’s ability to call upon
dedicated religious or cultural charities, which they may control, specific dias-
pora communities, or seemingly legitimate businesses. The operations of the
Liberation Tigers of Tamil Eelam (LTTE) are illustrative of this aspect of finan-
cial support. The Tamil Tigers made extensive use of heroin trafficking, human
trafficking and popular taxation. But their main support came from donations
and exploitation of the Tamil diaspora throughout the world, especially in Can-
ada and India. It would be difficult even for another Tamil group, much less a
non-Tamil one, to exploit this source of funding, and support for the LTTE re-
mains strong despite their military defeat.9
Criminal Enterprise
Criminal enterprises of varying sorts are the most common source of terrorist
funding today. Generally, if a criminal organization engages in a particular be-
6 Lawrence Wright, The Looming Tower: Al-Qaeda and the Road to 9/11 (New York:
Alfred A. Knopf, 2007), 103–4.
7 Steven Emerson with Jonathan Levin, “Terrorism Financing: Origination, Organiza-
tion, and Prevention: Saudi Arabia, Terrorist Financing and the War on Terror,”
Testimony to the US Senate Committee on Government Affairs, 31 July 2003, 24–25,
accessed September 25, 2015, http://www.hsgac.senate.gov/download/emerson-
testimony.
8 Rensselaer W. Lee III, The White Labyrinth: Cocaine and Political Power (New Bruns-
wick, NJ: Transaction, 1998), 13.
9 International Crisis Group, The Sri Lankan Diaspora after the LTTE, Asia Report
no.°186, February 23, 2010, accessed July 10, 2015, www.crisisgroup.org/
en/regions/asia/south-asia/sri-lanka/186-the-sri-lankan-tamil-diaspora-after-the-
ltte.aspx.
Counter-Terrorist Financing 221
10 Jayesh D’Souza, Terrorist Financing, Money Laundering, and Tax Evasion: Examining
the Performance of Financial Intelligence Units (London: CRC Press, 2011), 53–87.
11 See, for example, Celestine Bohlen, “4 Foreigners Are Found Beheaded in Chechnya,”
New York Times, December 9, 1998, accessed July 8, 2015, www.nytimes.com/
1998/12/09/world/4-foreigners-are-found-beheaded-in-chechnya.html; “Russian/
Kidnapping,” GlobalSecurity.org, October 15, 1999, accessed July 8, 2015,
www.globalsecurity.org/military/library/news/1999/10/991015-chechen30.htm.
12 “The Wars Don’t Work: As One War on Drugs Ends, Another is Starting. It Will Be a
Failure, too,” The Economist, May 2, 2015, accessed July 8, 2015,
http://www.economist.com/news/leaders/21650112-one-war-drugs-ends-another-
starting-it-will-be-failure-too-wars-dont-work.
222 John Sawicki
13 Benjamin Bahney, Howard J. Shatz, Carroll Ganier, Renny McPherson and Barbara
Sude, An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq (Santa Monica,
CA: RAND, 2010), 23–44, accessed July 8, 2015, http://www.rand.org/pubs/
monographs/MG1026.html.
14 Bahney et al., An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq, 45–56.
15 Bahney et al., An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq, 57–72.
16 “Under Secretary for Terrorism and Financial Intelligence Stuart Levey Testimony,”
US Department of the Treasury, April 1, 2008, accessed July 9, 2015,
http://www.treasury.gov/press-center/press-releases/Pages/hp898.aspx.
17 Bahney et al., An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq, 76–77.
Counter-Terrorist Financing 223
criminal enterprises. In such cases, the terrorist finance structure has both na-
tional and international layers and legitimate, as well as illegitimate compo-
nents. For example, terrorists, including AQ and the Taliban, are believed to
have tapped into Viktor Bout’s global weapons trafficking network which sold
arms from Ukraine and utilized Lebanese middlemen and Israeli organized
crime figures.18
In a separate case in 2013, a Colombian national named Perez Guberek
Ravinovicz and several of his family members and associates were named by
the US Treasury as Specially Designated Narcotics Traffickers for their alleged
involvement in a global money laundering scheme. It was alleged that Ravi-
novicz (who operated out of Colombia and ran legitimate textile firms in Israel,
Colombia and Asia) had assisted a major narcotics trafficker named Ayman
Saied Joumaa, whose operations in South America and Africa had benefited a
number of terrorist organizations, including Hezbollah. In addition to Ravi-
novicz, another 31 individuals and 21 separate companies around the world
were indicted, although there were no charges in relation to terrorism.19 The
highly complex, transnational nature of some funding schemes thus presents
significant challenges for CT. Even though the illicit nexus may expose terror-
ists to a wider array of law enforcement agencies, it certainly gives them access
to many potentially lucrative financial and material resources. Regardless of
the particular source or method of funding, terrorists also frequently engage in
money laundering in order to conceal their sources and to be able to move and
spend their funds more freely.
Money Laundering
CFT is properly understood as the active search for financial support of terror-
ist organizations. However, there can be little doubt that international coopera-
tion in CFT has largely centered around anti-money laundering (AML). This can
partly be understood by the universal importance that states attach to
controlling the movement of money and possible taxable income by entities
that are trying to elude scrutiny. These include everyone from tax dodgers to
huge corporations, smugglers and organized criminals. Terrorists are just
another category within this list of potential targets. Nevertheless, because
terrorists must launder money to profit from criminal enterprises or to move
their assets around the world in support of their activities, this potentially
exposes the fiscal jugular of these groups to observation and interdiction.
Generally speaking, funds can be described as either ‘clean’ (legitimate and
reported to the government’s banking and tax authorities) or ‘dirty’ (originat-
18 Noah Rosenberg, “Guilty Verdict for Russian in Arms Trial,” New York Times, Novem-
ber 2, 2011, accessed July 9, 2015, www.nytimes.com/2011/11/03/nyregion/
viktor-bout-guilty-in-arms-trafficking-case.html.
19 “Treasury Targets Major Money Laundering Network Operating Out of Colombia,” US
Department of the Treasury, July 9, 2013, accessed September 325, 2015,
http://www.treasury.gov/press-center/press-releases/Pages/jl2002.aspx.
224 John Sawicki
ing from illegal sources or being used for illegal purposes). The goal of crimi-
nals generally, and terrorist financiers specifically, is to ensure that their
money is untraceable so that their illegal enterprises cannot be discovered.
Ideally, this is accomplished through money laundering – a process where ille-
gal, dirty funds become legitimate, clean money. Loosely speaking, this also de-
scribes moving money around the world to evade detection. For example, AQ
was able to send finances to the 9/11 hijackers in the US via wire transfers
from locations in the Middle East despite UN financial sanctions against the
group in place at the time.20
Ultimately, money laundering (ML) seeks to move funds into legitimate
banking institutions, especially those in a country known for its rigorous scru-
tiny of banking activity. Money is typically moved from locations around the
world, where no questions are asked about its origins, through many layers of
accounts in several banks in multiple countries. The end goal is to get the cash
deposited in a reputable bank in a secure country, where the money may be
used by front companies or charities, which then disburse the funds for their
intended purposes.
A large number of banks are required by the supervising financial institu-
tions of their country, usually called Financial Intelligence Units (FIU), to report
cash transactions above a certain limit. This is often referred to as a Cash
Transaction Report (CTR). Even if a cash transaction is below the designated
amount, a bank may always alert the FIU, if it suspects financial irregularity, by
filing a Suspicious Activity Report (SAR).21 The act of making small cash
transactions below the CTR level without triggering a SAR is sometimes re-
ferred to as ‘smurfing.’ The money is successfully laundered if it arrives in a
respected bank and is presumed to belong to a legally acceptable entity which
can now spend those funds as it pleases. These structured deposits and with-
drawals may be made with enough skill to avert a CTR or SAR.
Money laundering employs a bewildering array of mechanisms. These might
include legitimate charities and companies which use a system of false billing
or donations to simulate real activity, but in fact are the ‘beard’ used to conceal
the appearance or expense of laundered cash. Criminal organizations, such as
drug cartels and several terrorist organizations, still largely employ some form
of cash smuggling to repatriate their cash or to launder it. Cash couriers or
whole cash cargoes may still be the most common ways to physically move
money, although cleaning it is always an intricate process. Terrorists, often in
some form of cooperation with criminals, are constantly looking for new ways
to move and launder money. The use of diamonds and other precious stones,
20 National Commission on Terrorist Attacks Upon the United States, The 9/11
Commission Report (Washington, D.C.: 2004), 172, accessed July 10, 2015,
http://www.9-11commission.gov/report/911Report.pdf.
21 Shima D. Keene, Operationalizing Counter Threat Finance Strategies (Carlisle, PA:
Strategic Studies Institute, December 2014), 16–18.
Counter-Terrorist Financing 225
22 David C. Firth, “The Hawala System,” Global Security Studies 2, no. 1 (2011): 26.
23 Charles Lister, Dynamic Stalemate: Surveying Syria’s Military Landscape (Doha, Qatar:
Brookings Doha Center, May 2014), 18, accessed July 10, 2015, www.brookings.edu/
~/media/research/files/papers/2014/05/19-syria-military-landscape-lister/syria-
military-landscape-english.pdf.
226 John Sawicki
24 See, for example, Amelia Hill, “Bin Laden’s $20m African Blood Diamond Deals,” The
Guardian, October 20, 2002, accessed July 10, 2015, www.theguardian.com/
world/2002/oct/20/alqaida.terrorism.
25 See FATF, Money Laundering and Terrorist Financing through Trade in Diamonds
(Paris: FATF, October 2013), accessed July 10, 2015, http://www.fatf-gafi.org/
media/fatf/documents/reports/ML-TF-through-trade-in-diamonds.pdf.
26 FATF, Money Laundering and Terrorist Financing through Trade in Diamonds, 2.
27 FATF, Money Laundering and Terrorist Financing through Trade in Diamonds, 126.
Counter-Terrorist Financing 227
28 Michael Chertoff and Tobby Simon, “The Impact of the Dark Web on Internet Govern-
ance and Cyber Security,” GCIG Paper Series no. 6 (Global Commission on Internet
Governance and Chatham House, February 2015), 3, accessed July 10, 2015,
https://www.cigionline.org/publications/impact-of-dark-web-internet-governance-
and-cyber-security.
29 TOR was originally developed by the US Navy. It is an acronym which stands for “The
Onion Router” and operates by passing Web browsing through a global series of
computers (routers) repeatedly so that detection is almost impossible. It has other
features which can add encryption and make online Web surfing almost invisible. Its
software bundle, currently called Vidalia, combines powerful features which can
permit remarkable anonymity. The software is freely available online.
228 John Sawicki
30 Chertoff and Simon, “The Impact of the Dark Web on Internet Governance and Cyber
Security,” 4–5.
31 Barbara Starr and Jamie Crawford, “Pentagon Hunts for ISIS on the Secret Internet,”
CNN Politics, May 12, 2015, accessed July 10, 2015, http://edition.cnn.com/2015/05/
12/politics/pentagon-isis-dark-web-google-internet/.
32 Aaron Brantly, “Financing Terror Bit by Bit,” CTC Sentinel 7, no. 10 (2014): 1–5,
accessed July 10, 2015, https://www.ctc.usma.edu/posts/financing-terror-bit-by-bit.
Counter-Terrorist Financing 229
that terrorists are indeed utilizing these instruments to their advantage and
encouraging their use more widely.33 The notorious jihadist forum Shumukh al-
Islam, for instance, has posted instructions on how to use the Dark Web on
YouTube, which is clearly aimed at educating as many potential supporters as
possible.34
33 Frank Gardner, “How the Dark Web Spurs a Spying ‘Arms Race’,” BBC News, March
19, 2015, accessed April 30, 2015, www.bbc.com/news/technology-31948818.
34 Gardner, “How the Dark Web Spurs a Spying ‘Arms Race’,” 4.
35 Jody Myers, “Blow, Bling and Bucks: IMF Work Against Money Laundering and
Terrorist Financing,” IMFDirect, June 27, 2011, accessed July 10, 2015, http://blog-
imfdirect.imf.org/2011/06/27/blow-bling-and-bucks-imf-work-against-money-
laundering-and-terrorist-financing/.
230 John Sawicki
Action Task Force (FATF) was formed by the G7 in 1989 to address the grow-
ing problem of money laundering – mainly as a result of the growth of the Co-
lombian drug cartels. Today it encompasses 34 member states and two re-
gional organizations (namely the European Commission and the Gulf Co-Opera-
tion Council). The real value of FATF lies in its recommendations for best prac-
tices to maximize AML efforts by the global community, including such actions
against terror groups’ finances. To facilitate this, in 1990 FATF issued the well-
known “FATF 40” recommendations for financial standards. After 9/11, FATF
adopted nine “Special Recommendations” on terrorist financing. In 2012, these
recommendations were integrated into the 40 original FATF recommendations
to address the key areas of money laundering, terrorist financing and prolifera-
tion financing.36
Furthermore, to encourage financial intelligence sharing and to provide mu-
tual assistance in national capacity building for healthy AML, the FIU of a great
number of the world’s nations have formed the Egmont Group. This coopera-
tive association was established initially in 1995 at the Egmont Ahrenberg Cha-
teau in Brussels, but its secretariat is now based in Toronto. It has 139 mem-
bers and its five working groups 37 provide a robust array of technical and in-
formation programs to strengthen FIUs. If CFT is to become more effective, it is
important that the central banks of all states should follow the FATF Recom-
mendations and be members of the Egmont Group.
Conclusion
It is important that states engage in CFT/AML activities as they expose the op-
erations of terrorist organizations even when violent acts are not being com-
mitted within their territory. They may also be undertaken by any state using
the financial architecture which is already in existence. Because it is non-vio-
lent, CFT/AML avoids many of the ethical and human rights objections which
have been raised by kinetic CT responses. More to the point, these efforts do
not create martyrs or heroes, but expose criminals and fraudsters. Global intel-
ligence sharing and cooperation in dynamic groups such as FATF and the Eg-
mont Group magnify a state’s CT capacity exponentially. Finally, if the RAND
analysis of AQI is accurate, there may be a direct correlation between an in-
crease in terror financing and the tempo of violent attacks. Attrition of terrorist
finances may therefore reduce the intensity of their operations. The more ro-
bust the national technical means in CFT/AML becomes, the more effective the
pressure on terrorist organizations. It is an area where almost any country may
be in the CT fight without fielding large military or police forces.
Bibliography
“Russian/Kidnapping.” GlobalSecurity.org, October 15, 1999. Accessed July 8,
2015. www.globalsecurity.org/military/library/news/1999/10/991015-
chechen30.htm.
“The Wars Don’t Work: As One War on Drugs Ends, Another Is Starting. It Will
Be a Failure, too.” The Economist, May 2, 2015. Accessed July 8, 2015.
http://www.economist.com/news/leaders/21650112-one-war-drugs-
ends-another-starting-it-will-be-failure-too-wars-dont-work.
“Treasury Targets Major Money Laundering Network Operating Out of Colom-
bia.” US Department of the Treasury, July 9, 2013. Accessed September
325, 2015. http://www.treasury.gov/press-center/press-releases/Pages/
jl2002.aspx.
“Under Secretary for Terrorism and Financial Intelligence Stuart Levey Testi-
mony.” US Department of the Treasury, April 1, 2008. Accessed July 9,
2015. www.treasury.gov/press-center/press-releases/Pages/hp898.aspx.
Bahney, Benjamin, Howard J. Shatz, Carroll Ganier, Renny McPherson and Bar-
bara Sude. An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq.
Santa Monica, CA: RAND, 2010. Accessed July 8, 2015. www.rand.org/
pubs/monographs/MG1026.
Bohlen, Celestine. “4 Foreigners Are Found Beheaded in Chechnya.” New York
Times, December 9, 1998. Accessed July 8, 2015. www.nytimes.com/1998/
12/09/world/4-foreigners-are-found-beheaded-in-chechnya.html.
Brantly, Aaron. “Financing Terror Bit by Bit.” CTC Sentinel 7, no. 10 (2014): 1–5.
Accessed July 10, 2015. https://www.ctc.usma.edu/posts/financing-
terror-bit-by-bit.
Chertoff, Michael, and Tobby Simon. “The Impact of the Dark Web on Internet
Governance and Cyber Security.” GCIG Paper Series no. 6. London: Global
Commission on Internet Governance and Chatham House, February 2015.
Accessed July 10, 2015. https://www.cigionline.org/publications/impact-
of-dark-web-internet-governance-and-cyber-security.
D’Souza, Jayesh. Terrorist Financing, Money Laundering, and Tax Evasion: Ex-
amining the Performance of Financial Intelligence Units. London: CRC Press,
2011.
Emerson, Steven, with Jonathan Levin. “Terrorism Financing: Origination, Or-
ganization, and Prevention: Saudi Arabia, Terrorist Financing and the War
on Terror.” Testimony to the US Senate Committee on Government Affairs,
31 July 2003. Accessed September 25, 2015. www.hsgac.senate.gov/
download/emerson-testimony.
FATF, International Standards on Combatting Money Laundering and the Fi-
nancing of Terrorism & Proliferation: The FATF Recommendations. Paris:
FATF, 2012. Accessed July 10, 2015. www.fatf-gafi.org/media/fatf/
documents/recommendations/pdfs/FATF_Recommendations.pdf.
232 John Sawicki
Stewart, Catrina. “Illegal Ivory Trade Funds al-Shabaab’s Terrorist Attacks.” The
Independent, October 6, 2013. Accessed July 10, 2015.
http://www.independent.co.uk/news/world/africa/illegal-ivory-trade-
funds-alshabaabs-terrorist-attacks-8861315.html.
UNODC, Cocaine Trafficking in West Africa: The Threat to Stability and Develop-
ment (with special reference to Guinea-Bissau). United Nations Office on
Drugs and Crime, December 2007. Accessed July 10, 2015.
http://www.unodc.org/documents/data-and-analysis/west_africa_cocaine_
report_2007-12_en.pdf.
Weiss, Martin A. “Terrorist Financing: The 9/11 Commission Recommenda-
tion.” CRS Report for Congress RS21902. Washington, D.C.: Congressional
Research Service, 2005. Accessed July 10, 2015. https://www.fas.org/sgp/
crs/terror/RS21902.pdf.
Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11. New
York: Alfred A. Knopf, 2007.
Chapter 15
Interagency Cooperation in
Counter-Terrorism
Iztok Prezelj and Joe Airey
Introduction
The need for more effective interagency cooperation in counter-terrorism (CT)
was highlighted in the aftermath of 9/11, when it became clear that the reluc-
tance to coordinate and share information between security agencies could no
longer be tolerated if terrorist attacks were to be prevented in the future. The
9/11 Commission made it clear that the threat of modern global terrorism re-
quired a “quick, imaginative, and agile response,” and that it would be neces-
sary to coordinate a wide array of resources in order to achieve an effective
“unity of effort.”1 It has been argued that, without such cooperation, “institu-
tional gaps, duplication of effort, and overlapping responsibilities are inevita-
ble,” and that such weaknesses can be “exploited by terrorists.”2
After 2001, many governments worldwide have undertaken comprehensive
reforms of their national security systems. In particular, they have taken steps
to improve and expand horizontal interagency cooperation in the fight against
terrorism. New CT strategies have thus tried to incorporate the lessons from
9/11 and have created a variety of new structures aimed at achieving this, such
as intelligence fusion cells, national CT centers, governmental working groups,
joint task forces, etc. It is widely believed that these actions have contributed to
improvements in the efficiency of national and international CT efforts. Indeed,
it is self-evident that to effectively detect, deter, and defeat contemporary ter-
rorism a coordinated approach by all national security agencies is required. It
is also clear that no single agency can deal with this problem alone because ter-
rorism cuts across multiple jurisdictions. Uncoordinated actions by one agency
can produce only limited results in the fight against such a complex threat. In
recognition of this, government organizations engage in a variety of different
forms of interagency cooperation to include: sharing information, the exchange
of staff (liaison officers), participation in joint threat assessments, cooperative
1 National Commission on Terrorist Attacks Upon the United States, 9/11 Commission
Report (Washington D.C., 2004): 399–428.
2 Lindsay Clutterbuck, “Law Enforcement,” in Attacking Terrorism: Elements of a Grand
Strategy, eds. Audrey Cronin and James Ludes (Washington D.C.: Georgetown Univer-
sity Press, 2004), 143.
Case Study 15.1. The Anders Breivik Terrorist Attacks in Oslo and
Utøya, July 2011.
On 22 July 2011, Norway suffered its deadliest attack since World War II. The perpe-
trator was a young right wing extremist named Anders Behring Breivik. The first at-
tack was a car bomb in Oslo’s government district that killed eight and injured over
200. Approximately an hour-and-a-half later, Breivik mounted an assault on a Work-
ers’ Youth League Summer Camp on Utøya Island. He shot dead 69 young people on
the island and injured over a hundred.
After these attacks, the Norwegian Parliament commissioned an investigation to
find out whether the bombing in Oslo could have been prevented and why there had
not been a more rapid response to Breivik’s shooting spree. The result was the Gjorv
Report, presented to the Prime Minister in August 2012.7 It concluded that the attack
on the government office complex could have been prevented and that the police had
failed in their duty to protect people on the island of Utøya. In addition to leadership,
staffing and equipment deficiencies, the report highlighted failings that were due to
poor communication and coordination both within and between security agencies. It
was thus concluded that “the ability to coordinate and work together has been defi-
cient.”8 Police information sharing, for example, was described as “subject to formida-
ble weaknesses.”9 During the attack, available information was not shared, the armed
forces were not immediately informed and there was a serious failure of the “nation-
wide message” service. Prior to the attack, there had also been inter-department bu-
reaucratic failings that had left government buildings in the center of Oslo vulnerable.
Furthermore, Norway’s internal intelligence service had failed to act on a tip from a
customs official concerning Breivik’s purchase of suspicious chemicals from Poland.
One of the recommendations of the report stated that “The Police Security Service
must take more initiatives and show more willingness to cooperate and share infor-
mation with other agencies, including the ordinary police and the Intelligence Ser-
vice.”10
Following Breivik’s attack and the recommendations of the Gjorv Report, the Nor-
wegian government and security services have enacted a number of measures to im-
prove CT preparedness. These measures include the creation of a new security de-
partment, improved information and communications technology, and enhanced co-
operation between the police and the armed forces.
provide for their overall strategic cooperation if and when necessary. Addi-
tional competencies may also be required in order to enable the imaginative
and agile CT capability espoused by the 9/11 Commission. Therefore, an effec-
tive CT strategy needs to facilitate intensive interagency cooperation by creat-
7 The 22nd July Commission Report: Preliminary English Version of Selected Chapters
(Oslo: Norwegian Government, 2012), 13–24, accessed May 8, 2015, www.sintef.no/
globalassets/project/nexus/01--report-22-july-gjorv-commision-summary_english_
version.pdf.
8 The 22nd July Commission Report,15.
9 The 22nd July Commission Report, 17.
10 The 22nd July Commission Report, 26.
238 Iztok Prezelj and Joe Airey
Community Organizations
Civil Protection Agencies
Intelligence Services
Diplomacy
Military
Counter-Terrorism Strategy
12 John LeBeau, “Intelligence and Counter Terrorism: Examining the Critical Tools of Se-
crecy and Cooperation,” in Toward a Grand Strategy Against Terrorism, eds. Christo-
pher C. Harmon, Andrew N. Pratt, and Sebastian Gorka (New York: McGraw-Hill,
2011), 195; Paul Pillar, “Intelligence,” in Attacking Terrorism: Elements of a Grand
Strategy, eds. Audrey Kurth Cronin and James M. Ludes (Washington D.C.:
Georgetown University Press, 2004), 116–121.
13 Pillar, “Intelligence,” 130–135; Jonathan R. White, Terrorism and Homeland Security
(Wadsworth: Cengage Press, 2012), 471-505; James Q. Roberts, “Building a National
Counter Terrorism Capacity,” in Toward a Grand Strategy Against Terrorism, eds.
Christopher C. Harmon, Andrew N. Pratt and Sebastian Gorka (New York: McGraw-
Hill, 2011), 134.
14 Larry K. Gaines and Victor E. Kappeler, Homeland Security (New Jersey: Prentice Hall,
2012), 327–351; White, Terrorism and Homeland Security, 515–519.
15 Brian Michael Jenkins, When Jihadis Come Marching Home (Santa Monica, CA: RAND,
2014), accessed February 22, 2015, www.rand.org/pubs/perspectives/PE130-
1.html.
240 Iztok Prezelj and Joe Airey
ligence as they may be first to reach the scene and come into contact with ter-
rorist suspects.18 Interagency coordination in this field includes cooperation
between fire services, medical services, police, occasionally military, and large
numbers of highly specialized professional associations.
Related to these are agencies involved in the protection of critical infrastruc-
ture (CI), i.e. those “assets, systems, and networks, whether physical or virtual,
so vital that their incapacitation or destruction would have a debilitating effect
on security, national economic security, national public health or safety, or any
combination thereof.”19 A large number of organizations are responsible for the
management and protection of these structures, including both public and pri-
vate entities. Coordination between central government and organizations re-
sponsible for CI can support the flow of information and intelligence, as well as
enable infrastructure to more effectively protect itself through the sharing of
potential threat information. As Jonathan White points out, connections should
be established between local law enforcement and infrastructure security func-
tions in order to share intelligence and develop plans for both the prevention
of, and response to, acts of terrorism.20 Ideally, a successfully integrated, cross-
sectoral policy needs to focus on the following: joint threats and risk-assess-
ment, identification of entities with similar functions across sectors, and infra-
structure clusters that would have an instant and severe impact on society if
disrupted or shut down.21
Finally, an interagency approach must address community organizations and
institutions, not least because local community leaders may be best placed to
identify suspicious activity early on. Developing trusted partnerships with
community organizations, including schools in areas where extremists are
known to operate, can help to identify radicalization, recruitment and travel
indicative of a terrorist threat.22 It is also beneficial for law enforcement or-
ganizations to form partnerships with a diverse range of local business enter-
prises.23 Local businesses, for example, may come into contact with individuals
who purchase goods or services in preparation for a terrorist attack. This was
18 Michael F. Cahill et al., “New York State’s Counterterrorism Zone Z4: A Model of Inter-
agency Cooperation to Fight Terrorism,” The Police Chief (February 2010), accessed
September 7, 2015, www.policechiefmagazine.org/magazine/index.cfm?fuseaction=
display_arch&article_id=2012&issue_id=22010.
19 “What Is Critical Infrastructure?” Department of Homeland Security, last modified,
August 26, 2015, http://www.dhs.gov/what-critical-infrastructure.
20 White, Terrorism and Homeland Security, 519–521.
21 See Iztok Prezelj, Erik Kopač, Uroš Svete, and Aleš Žiberna, “Cross-sectoral Scanning
of Critical Infrastructures: From Functional Differences to Policy-relevant Similari-
ties,” Journal of Homeland Security and Emergency Management 9, no. 1 (2012): 1-5,
accessed September 7, 2015, http://dx.doi.org/10.1515/1547-7355.1901.
22 Dan Silk, “Community Policing to Prevent Violent Extremism,” FBI Law Enforcement
Bulletin (October 2012), accessed September 7, 2015, https://leb.fbi.gov/2012/
october/community-policing-to-prevent-violent-extremism.
23 White, Terrorism and Homeland Security, 519–521.
242 Iztok Prezelj and Joe Airey
certainly the case with Najibullah Zazi, who bought precursor chemicals from
local retailers in preparation for a planned suicide attack on the New York
subway in 2009 (see Case Study 15.2).24 Terrorists also sometimes store mate-
rials at commercial facilities, purchase firearms, and buy fertilizers from agri-
cultural suppliers in order to make explosives.
24 “New York Terror Case,” Federal Bureau of Investigation, September 24, 2009, ac-
cessed April 27, 2015, www.fbi.gov/news/stories/2009/september/zazi_092409.
25 “Charges Unsealed Against Five Alleged Members of Al-Qaeda Plot to Attack the
United States and United Kingdom,” US Department of Justice, July 7, 2010, accessed
May 4, 2015, http://www.justice.gov/opa/pr/charges-unsealed-against-five-alleged-
members-al-qaeda-plot-attack-united-states-and-united.
26 Ed Pilkington and Nicholas Watt, “NSA Surveillance Played Little Role in Foiling
Terror Plots, Experts Say,” The Guardian, July 12, 2013, accessed May 4, 2015,
www.theguardian.com/world/2013/jun/12/nsa-surveillance-data-terror-attack.
27 Pilkington and Watt, “NSA Surveillance Played Little Role.”
Interagency Cooperation in Counter-Terrorism 243
basic and advanced training. Some agencies will have greater budgets to pro-
vide such resources than others. However, it is important to interagency coop-
eration that all participants have access to what they need to do their job. For
the JTTF, the FBI provides office space, computers, communications equip-
ment, and vehicles to ensure consistency of access and operations. Specialized
training in such areas as terrorist tactics, surveillance, intelligence gathering,
evidence collection, weapons of mass destruction, etc. is provided to partici-
pating members. The FBI typically coordinates specialized CT training for JTTF
members through partner intelligence and law enforcement agencies. Training
is the key to making JTTF participants CT specialists – skills which are then
taken back to their home agencies at the completion of their assignment.
Arrest Powers and Prosecution
In the US, arrest powers and prosecution vary among local, state, and federal
police agencies and prosecutor offices. Within the JTTF, all participants are
deputized as federal agents to ensure uniform arrest powers for those investi-
gations involving violations of federal law. However, the strength of the JTTF is
that it is not limited to federal law, but can also use local and state powers of
arrest and prosecution as needed to disrupt potential or actual terrorists. The
most important aspect of this category is uniformity of authority. It is opera-
tionally complex, and a potential liability, to have participants in a task force
environment with limited jurisdictional authorities.
Memorandums of Understanding
Interagency cooperation can be informal and ad hoc, or else formal and bound
by a signed document, often known as a Memorandum of Understanding
(MOU). The MOU may be a contract used to set forth the basic principles and
guidelines under which the parties will work together to accomplish their
goals.37 JTTFs utilize a nationally prepared but locally executed MOU outlining
issues such as management, manpower, information sharing and clearances,
resources, jurisdictional authorities, and participant expectations. The MOU
clearly establishes responsibilities and sets rules and expectations for partici-
pation and performance.
Motivation
Experience has shown that motivation is not typically an issue within the JTTF.
Participants are hand-selected by their agencies and often compete for the one
or two available slots. They view membership in the JTTF as important to coun-
tering acts of terrorism within their region and see the accompanying training
and operational experience as having a positive impact on their careers. Man-
agers of the JTTF need to take the issue of motivation seriously, as it will be
imperative to long-term success. If the mission is deemed important, and the
38 Eric Rosenbach and Aki J. Peritz, “State and Local Fusion Centers,” Belfer Center for
Science and International Affairs and Harvard Kennedy School, July 2009, accessed
January 15, 2015, http://belfercenter.ksg.harvard.edu/files/state-local-fusion.pdf.
39 “Fusion Center Guidelines - Developing and Sharing Information and Intelligence in a
New Era,” United States Department of Homeland Security and Department of Justice,
2006, accessed January 15, 2015, https://it.ojp.gov/documents/fusion_center_
guidelines_law_enforcement.pdf.
40 “National Preparedness Report 2014,” United States Department of Homeland
Security, March 2014, accessed January 15, 2015, www.fema.gov/media-library-
data/1409688068371-d71247cabc52a55de78305a4462d0e1a/2014%20NPR_
FINAL_082914_508v11.pdf.
41 Michael T. McCaulin and Peter T. King, “Majority Staff Report on the National
Network of Fusion Centers,” United States House of Representatives Committee on
Homeland Security, July 2013, accessed April 27, 2015, http://homeland.house.gov/
sites/homeland.house.gov/files/documents/CHS SLFC Report 2013 FINAL.pdf.
248 Iztok Prezelj and Joe Airey
42 Mike Sena, “The National Preparedness Report: Assessing the State of Preparedness,”
Statement to the Homeland Security Committee, June 6, 2012, accessed January 15,
2015, http://homeland.house.gov/files/Testimony-Sena.pdf.
43 Jason Barnosky, “Fusion Centers: What's Working and What Isn’t,” Brookings, March
17, 2015, accessed April 29, 2015, www.brookings.edu/blogs/fixgov/posts/2015/
03/17-fusion-centers-barnosky.
44 McCaulin and King, Report on National Network of Fusion Centers.
45 “Fusion Centers and Joint Terrorism Task Forces,” Department of Homeland Security,
accessed January 15, 2015, www.dhs.gov/fusion-centers-and-joint-terrorism-task-
forces.
Interagency Cooperation in Counter-Terrorism 249
not sufficient to simply create new, bureaucratic structures and assume that
they will solve the problem. If we are to truly achieve our potential in counter-
ing terrorism—both nationally and internationally—we must recognize that
effective cooperation remains a work in progress and needs long-term commit-
ment.
Bibliography
Barnosky, Jason. “Fusion Centers: What's Working and What Isn’t.” Brookings,
March 17, 2015. Accessed April 29, 2015. www.brookings.edu/blogs/
fixgov/posts/2015/03/17-fusion-centers-barnosky.
Cahill, Michael F., James Kralik, Robert Van Cura, and Todd Hazard. “New York
State’s Counterterrorism Zone Z4: A Model of Interagency Cooperation to
Fight Terrorism.” The Police Chief, February 2010. Accessed September 17,
2015. http://www.policechiefmagazine.org/magazine/index.cfm?fuseacti
on=display_arch&article_id=2012&issue_id=22010.
Clutterbuck, Lindsay. “Law Enforcement.” In Attacking Terrorism: Elements of a
Grand Strategy, edited by Audrey Cronin and James Ludes, 140-161.
Washington D.C.: Georgetown University Press, 2004.
Department of Homeland Security, Department of Justice. “Fusion Center
Guidelines - Developing and Sharing Information and Intelligence in a New
Era,” 2006. Accessed January 15, 2015. https://it.ojp.gov/documents/
fusion_center_guidelines_law_enforcement.pdf.
Dyson, William. Terrorism: An Investigator’s Handbook. New York: Elsevier,
2012.
Gaines, Larry K., and Victor E. Kappeler. Homeland Security. New Jersey: Pren-
tice Hall, 2012.
Hoyt, Timothy. “Military Force.” in Attacking Terrorism: Elements of a Grand
Strategy, eds. Audrey Kurth Cronin and James M. Ludes, 162–185. Wash-
ington D.C.: Georgetown University Press, 2004.
Jenkins, Brian Michael. When Jihadis Come Marching Home. Santa Monica, CA:
RAND, 2014.
LeBeau, John. “Intelligence and Counter Terrorism: Examining the Critical
Tools of Secrecy and Cooperation.” In Toward a Grand Strategy Against
Terrorism, edited by Christopher C. Harmon, Andrew N. Pratt, and Sebas-
tian Gorka, 193-209. New York: McGraw-Hill, 2011.
Martin, Robert. “The Joint Terrorism Task Force: A Concept that Works.” FBI
Law Enforcement Bulletin, March 1999. Accessed May 27, 2015.
http://archive.adl.org/learn/jttf/.
National Commission on Terrorist Attacks Upon the United States. 9/11
Commission Report. Washington D.C., 2004.
Norwegian Government. The 22nd July Commission Report: Preliminary English
Version of Selected Chapters. Oslo, 2012. Accessed May 8, 2015.
Interagency Cooperation in Counter-Terrorism 251
http://www.sintef.no/globalassets/project/nexus/01--report-22-july-
gjorv-commision-summary_english_ version.pdf.
Pilkington, Ed, and Nicholas Watt. “NSA Surveillance Played Little Role in Foil-
ing Terror Plots, Experts Say.” The Guardian, July 12, 2013. Accessed May 4,
2015. www.theguardian.com/world/2013/jun/12/nsa-surveillance-data-
terror-attack.
Pillar, Paul. “Intelligence.” In Attacking Terrorism: Elements of a Grand Strategy,
edited by Audrey Kurth Cronin and James M. Ludes, 115–139. Washington
D.C.: Georgetown University Press, 2004.
Prezelj, Iztok, Erik Kopač, Uroš Svete, and Aleš Žiberna. “Cross-sectoral Scan-
ning of Critical Infrastructures: From Functional Differences to Policy-rele-
vant Similarities.” Journal of Homeland Security and Emergency Manage-
ment 9, no. 1 (2012): 1-5. Accessed September 7, 2015. http://dx.doi.org/
10.1515/1547-7355.1901.
Prezelj, Iztok. “Improving Inter-organizational Cooperation in Counterterror-
ism: Based on a Quantitative SWOT Assessment.” Public Management Re-
view 17, no. 1-2 (2015): 209–35.
Prezelj, Iztok. “Inter-Organizational Cooperation and Coordination in the Fight
against Terrorism: From Undisputable Necessity to Paradoxical Chal-
lenges.” Comparative Strategy 33, no. 4 (2014): 321–41.
Roberts, James Q. “Building a National Counter Terrorism Capacity.” In Toward
a Grand Strategy Against Terrorism, edited by Christopher C. Harmon, An-
drew N. Pratt and Sebastian Gorka, 127-137. New York: McGraw-Hill, 2011.
Rosenbach, Eric, and Aki J. Peritz. “State and Local Fusion Centers.” Belfer Cen-
ter for Science and International Affairs and Harvard Kennedy School, July
2009. Accessed January 15, 2015. http://belfercenter.ksg.harvard.edu/
files/state-local-fusion.pdf.
Schmella, Paul. “Building Effective Counterterrorism Institutions.” In Fighting
Back: What Governments Can Do About Terrorism, edited by Paul Schmella,
148-161. Stanford, CA: Stanford University Press, 2011.
Sena, Mike. “The National Preparedness Report: Assessing the State of
Preparedness.” Statement to the Homeland Security Committee, June 6,
2012. Accessed January 15, 2015. http://homeland.house.gov/files/
Testimony-Sena.pdf.
Silk, Dan. “Community Policing to Prevent Violent Extremism.” FBI Law En-
forcement Bulletin (October (2012), accessed September 7, 2015,
https://leb.fbi.gov/2012/october/community-policing-to-prevent-violent-
extremism.
Strom, Kevin, and Joe Eyerman. “Interagency Coordination: A Case Study of the
2005 London Train Bombings.” National Institute of Justice Journal 260
(2008): 8-11.
252 Iztok Prezelj and Joe Airey
1 James J.F. Forrest, The Terrorism Lectures: A Comprehensive Collection for. Students of
Terrorism, Counterterrorism, and National Security (Santa Anna, CA: Nortia Press,
2012), 26.
2 Mark A.R. Kleiman, Peter Reuter, and Jonathan P. Caulkins, “The ‘War on Terror’ and
the ‘War on Drugs’: A Comparison,” Federation of American Scientists Public Interest
Report 55, no. 2 (2002): 3-5, accessed April 5, 2015, http://fas.org/faspir/2002/
v55n2/waron.htm.
Elements of Strategy
CT strategy shares three essential elements with all other forms of strategy:
ends, ways, and means. The ends are the essential aims of the strategy; what
does it seek to achieve? The ways are the tools and methods employed; how will
the end be achieved? The means are the resources required to employ the ways;
what personnel, materiel, and funds are required to achieve the ends? Good strat-
egy should always start by defining the end, but that end must be tempered by
the ways and means at the disposal of the state. In this manner, strategy-
building is an iterative process; a dynamic equation developed by the constant
interplay of ends, ways, and means. Like other forms of strategy, CT strategy
must at once have a long view as well situational adaptability, i.e. interacting
elements of continuity and agility.
3 Richard A. Posner, Countering Terrorism: Blurred Focus, Halting Steps (Plymouth, UK:
Rowman and Littlefield, 2007), 205.
A Comprehensive Strategy for Combating Terrorism 255
Table 16.1. The CT Strategy ‘Ways’ of the UK, Australia, Canada and Sweden.
somewhere in the middle. This timeline will delineate three key phases for CT
interdiction: before, during, and after the attack. This visualization is sometimes
called “left and right of boom.” The timeline only depicts a single, discrete
attack although it illuminates the full spectrum of activities that must be con-
sidered in an effective CT strategy.
The ‘before’ phase is the most crucial and must include all of those measures
to prevent attacks and to prepare defenses against attacks if they happen.
Prevention is of course preferable to response. However, the ‘before’ phase
is complicated. It is the realm of so-called “root causes” and addresses topics
Brian Jenkins famously noted that “terrorism is theater.”12 This analogy high-
lights that terrorism consists not only of an actor, an act, and a victim, but also
of a message, an audience, and an environment. All of these elements are inter-
connected and can serve as potential lines of effort for the CT strategist.
Regarding the actor – the state should focus resources on stopping known
terrorists, either by capturing or killing them. Additional effort should be spent
to identify and track suspected terrorists. Moreover, CT strategies should in-
clude measures to examine the message or grievances of terrorists to address
the environment that may engender radicalization. Careful study of the in-
tended audiences of terrorist acts may reveal ways to counter and discredit the
distorted narratives of extremist groups. Potential victims or targets of terror-
ist violence should be prioritized and protected. Finally, examination of the
particulars of the act itself, or the various tactics of terrorism, may suggest
ways to isolate terrorists from the means used to conduct their attacks.
Some have used Clausewitz’s concept of enemy ‘centers of gravity’ to or-
ganize ways for CT strategy. Paul Shemella suggests that more points of inter-
diction may be uncovered by examining the terrorists’ legitimacy, funding,
training, weapons, mobility, communications, leadership, unit cohesion, sanctu-
ary, and ideology.13
12 Brian Jenkins, “International Terrorism: A New Kind of Warfare,” The RAND Paper
Series P-5261 (Santa Monica, CA: RAND, 1974), 6.
13 Paul Shemella, “Tools and Strategies for Combating Terrorism,” in Fighting Back:
What Governments Can Do About Terrorism, ed. Paul Shemella (Stanford: Stanford
University Press, 2011), 137-9.
14 Shemella, “Building Effective Counterterrorism Institutions,” 155-7.
A Comprehensive Strategy for Combating Terrorism 259
level, diplomats may develop CT extradition treaties between states. Under the
right circumstances, diplomats may coordinate negotiations to disarm and de-
mobilize former extremist groups.
Information
This includes terrorist propaganda, state provided public information, and the
media. With the advent of the Internet and 24 hour news coverage, information
is ubiquitous although not always accurate or complete. Both terrorists and
states compete in this domain to dominate narratives and counter-narratives.
As Margaret Thatcher famously noted, “publicity is the oxygen of terrorism,”
but information can also be a powerful CT tool.
Military
The armed forces of states have a very visible and essential role in CT from
high-end special operations to support for the police. Deployment of the mili-
tary in these roles demonstrates state commitment, although over-reliance on
the military can feed into terrorist narratives of occupation and oppression.
When using armed forces in CT roles, precision is more important than mass,
and thoughtful employment is more important than deployment.
Economy
The economy can be a tool for CT just as it can be a target for terrorists. Ter-
rorists also require resources and funding and, as a result, tracking their finan-
cial transactions has proven to be an effective way to uncover and thwart their
activities. Economic sanctions have a mixed record of influencing the behavior
of state sponsors of terrorism, but they remain a viable CT tool when used in
conjunction with other instruments.
Intelligence
Good intelligence is a must for targeted CT operations and for preventing ter-
rorism before it manifests itself in violence. Many terrorist organizations are
small and rely on clandestine operations to avoid detection. Intelligence must
be collected and analyzed in a timely manner if it is to be useful. More im-
portantly, actionable intelligence must be disseminated to security forces and
declassified at some level to protect and inform the public.
Legislature
States hold the moral high ground in the CT fight so long as they operate within
the law. Therefore, it is incumbent upon parliaments to pass laws that crimi-
nalize terrorist behavior and authorize effective CT measures. At the same
time, a balance must be struck between security and civil liberties. The legal
framework is an essential part of legitimizing the CT effort. Additionally, legis-
latures typically hold the purse strings of the state, so they are responsible for
resourcing the CT strategy.
260 Joseph B. King
Judiciary
Also profoundly important to state legitimacy, an independent judiciary is es-
sential to try terrorists and apply appropriate penalties to those convicted.
Terrorism cases often involve classified intelligence that increasingly must be
used as evidence. For this reason, some states have adopted special courts for
terrorism cases that involve closed hearings and security-cleared judges and
attorneys. This can be an effective compromise, however all courts must main-
tain some degree of transparency to maintain due process and requisite legiti-
macy.
Law Enforcement
Police forces are typically the most visible and locally connected organs of state
security. As such they must earn and maintain the trust and confidence of the
people they serve and are often the first line of defense in cases of domestic
terrorism. Police officials must enforce the CT laws enacted by the legislature
and cooperate with the judiciary to investigate and aid the prosecution of sus-
pected terrorists. Law enforcement officials are among the first responders
during and immediately after a terrorist attack.
Civil Society
This consists of non-governmental organizations, academic and research insti-
tutions, religious groups, and the private sector. Civil society is a loosely de-
fined and diverse grouping of social activity beyond the control of the state.
Civil society organizations work in the social space where people live. This
gives them great insight and credibility in dealing with the social ills that may
create the preconditions for extremism. States can multiply their reach and ef-
fect by cooperating with civil society in CT.
Importantly, each of the above elements of national power frequently inter-
act and overlap with one another, and are most effective when they are com-
bined together within the framework of a comprehensive and coordinated
strategy (see Case Study 16.2 for an example of different CT tools combined).
CT strategies will compete for finite material resources against other na-
tional priorities, which may have stronger public support. In this regard, all na-
15 The AFP Internal Peace and Security Plan, accessed November 23, 2015,
http://www.army.mil.ph/ATR_Website/pdf_files/IPSP/IPSP%20Bayanihan.pdf; and
Internal Peace & Security Plan – “Bayanihan,” briefing by General (Ret.) Emmanuel T.
Bautista, Chief of Staff AFP at the George C. Marshall European Center for Security
Studies, July 2015.
262 Joseph B. King
Risk Assessment
Prioritization is essential when dealing with finite resources. This can be diffi-
cult for CT strategists because of the wide array of potential terrorist threats.
The task is further complicated by the emotionally evocative nature of terror-
ism. There is a tendency—and one that terrorists count on—to exaggerate the
threat; to be alarmist rather than rational. To avoid this pitfall and to commit
resources to the most dangerous and the most likely threats first, governments
must develop a logical process of risk assessment.
Risk assessment is not an exact science, but neither is it black magic. The in-
surance industry does it routinely, developing actuary tables that predict the
probability and consequence of various catastrophes, including terrorism. CT
strategists and policy makers must also consider the less quantifiable psycho-
logical impacts of terrorism as part of risk. Pundits are quick to note that more
Americans die from car accidents than from terrorist attacks, although this is
hardly reassuring to a public reeling from the shock of a mass casualty terrorist
incident.
The most basic form of risk assessment involves the correlation of likelihood
and impact. The risk-assessment table depicted in Figure 16.1 is an example of
a relatively straightforward way to approach this, using numerical values to
denote priorities (with 1 being the highest).
IMPACT
Very likely 4 3 2 1 1
Likely 5 4 3 2 1
LIKELIHOOD
Unlikely 6 5 4 3 2
Very
unlikely 7 6 5 4 3
Figure 16.1: A Basic Risk-Assessment Matrix.
In simple terms, likelihood is the chance that a specific type of terrorist inci-
dent will occur. Impact is the damage (physical, psychological, and economic)
that the terrorist incident will create. There are some threats that are less
probable (for example the terrorist use of a nuclear weapon) but would be cat-
astrophic in their effects. Other threats are far more likely, such as terrorist use
of vehicle-borne improvised explosive devices, but are likely to be far less con-
sequential in terms of casualties. The goal of this process is to identify those
threats that are most likely and most consequential and prioritize resources
against them. The sad fact is that states cannot afford to counter every possible
terrorist threat; therefore risk assessment becomes a crucial step in CT strat-
egy development.
Interagency Collaboration
A CT strategy that employs all of the tools of national power requires a mecha-
nism for collaboration between various governmental agencies. One of the
most tragic, yet frequent, discoveries after a terrorist attack is that the incident
could have been prevented if different ministries had shared information and
sorted out their roles in advance. This sad and all-too-common phenomenon is
the result of what is known as ‘stove piping’ whereby each agency has a sepa-
rate and protected lane of responsibility.17 Many times the reasons for stove
piping are well-intentioned. For example, firewalls are established between the
military and police, the intelligence agencies and the courts, or domestic and
foreign security services to protect civil liberties and safeguard classified in-
formation.18 These admirable goals can be obstacles to the types of collabora-
tion essential for effective CT operations unless they are carefully managed.
ters.19 These cells are limited, however, in that they are sometimes separate
from the operational agencies that might act on their information.
There are various combinations of the two broadly described interagency
collaboration models. Practice has shown that formal agreements work better
than ad hoc arrangements. Effective collaboration usually requires a legal
framework and political leadership emphasis. The bedrock of all good inter-
agency collaboration is trust, shared work, shared credit, and shared accounta-
bility.
International Cooperation
Transnational terrorism may be thought of as a form of deviant globalization.
The ease of transcontinental air travel, the spread of global telecommunica-
tions and information technology, and the interconnectedness of international
markets have allowed terrorists to move more freely and achieve greater reach
and influence. For these reasons, interagency CT collaboration at the national
level is not enough. Regional cooperation is a start, especially when states
share borders, but a global effort is required to counter a truly transnational
threat.20
All of the challenges at the national level related to interagency collabora-
tion also apply in the international arena. In many ways these difficulties are
magnified at the interstate level. In spite of the advance of globalization, state
sovereignty is still the prominent feature of the international system. 21 To
cooperate internationally requires states to yield portions of their sovereignty.
Nonetheless, where national interests converge, some states have found the
benefit to be worth the cost. Examples of international collaboration in CT in-
clude information sharing (although countries are very selective in what they
share and with whom they share it), border coordination, and even combined
military efforts. Good CT strategy acknowledges the need for partners in the CT
effort, particularly for overseas operations, and recognizes the complementary
effects of a multinational approach in coordinating the ‘home game’ with the
‘away game.’
‘normal’ looks like in his or her community and may be the first to notice an
anomaly that may indicate terrorist activity.22 Close relationships between
communities and police, particularly at the local level, can greatly enhance the
situational awareness necessary to detect and prevent terrorism. Second, each
citizen plays a role in establishing societal norms that may discourage radicali-
zation. Parents, teachers, coaches, and clergy all play a key role in this dimen-
sion. Third, each citizen, at least in a democracy, has the power to influence po-
litical change through their elected leaders. This final aspect of public support
can generate the political will needed to enact the state-controlled portions of a
comprehensive CT strategy.
22 See, for example, Al Baker and William K. Rashbaum, “Police Find Car Bomb in Times
Square,” New York Times, 1 May, 2010, accessed 5 April 2015, www.nytimes.com/
2010/05/02/nyregion/02timessquare.html.
23 Ally Jamah, “Heavy-handed Counter-Terrorism Tactics Added Pepper to Injury This
Year,” Standard Digital News, December 29, 2014, accessed 5 April 2015,
www.standardmedia.co.ke/article/2000146165/heavy-handed-counter-terrorism-
tactics-added-pepper-to-injury-this-year.
24 Carroll Doherty, “Balancing Act: National Security and Civil Liberties in Post-9/11
Era,” Pew Research Center Fact Tank, June 7, 2013, accessed 5 April 2015,
www.pewresearch.org/fact-tank/2013/06/07/balancing-act-national-security-and-
civil-liberties-in-post-911-era/.
25 Shemella, Fighting Back, 145.
A Comprehensive Strategy for Combating Terrorism 267
26 David Mc. A. Baker, “The Effects of Terrorism on the Travel and Tourism Industry,”
International Journal of Religious Tourism and Pilgrimage 2, no. 1 (2014): 64-65,
accessed 5 April 2015, http://arrow.dit.ie/ijrtp/vol2/iss1/9.
27 Sam Dagher, “Fresh Paint and Flowers at Iraqi House of Horrors,” New York Times,
February 21, 2009, accessed April 5, 2015, www.nytimes.com/2009/02/22/world/
middleeast/22iraq.html.
28 Clarke, Managing Counter Terrorism Crises, 305.
268 Joseph B. King
Bibliography
Australian Government. Counter-Terrorism White Paper: Securing Australia –
Protecting Our Community. 2010. Accessed April 5, 2015.
www.dsto.defence.gov.au/sites/default/files/basic_pages/documents/cou
nter-terrorism-white-paper.pdf.
Baker, Al, and William K. Rashbaum. “Police Find Car Bomb in Times Square.”
New York Times, 1 May, 2010. Accessed 5 April 2015. www.nytimes.com/
2010/05/02/nyregion/02timessquare.html.
Baker, David Mc. A. “The Effects of Terrorism on the Travel and Tourism Indus-
try.” International Journal of Religious Tourism and Pilgrimage 2, no. 1
(2014): 58-67. Accessed 5 April 2015. http://arrow.dit.ie/ijrtp/vol2/iss1/9.
Clarke, John L. “Managing Counterterrorism Crises.” In Toward a Grand Strat-
egy Against Terrorism, edited by Christopher C. Harmon, Andrew N. Pratt,
and Sebastian Gorka, 296-312. New York: McGraw Hill, 2011.
Cline, Lawrence E. “Interagency Decision Making.” In Fighting Back: What Gov-
ernments Can Do About Terrorism, edited by Paul Shemella, 162-77. Stan-
ford: Stanford University Press, 2011.
Dagher, Sam. “Fresh Paint and Flowers at Iraqi House of Horrors.” New York
Times, February 21, 2009. Accessed April 5, 2015. www.nytimes.com/
2009/02/22/world/middleeast/22iraq.html.
Doherty, Carroll. “Balancing Act: National Security and Civil Liberties in Post-
9/11 Era.” Pew Research Center Fact Tank, June 7, 2013. Accessed 5 April
29 The National Consortium for the Study of Terrorism and Responses to Terrorism
(START), hosted by the University of Maryland, maintains an excellent Global
Terrorism Database at http://www.start.umd.edu/gtd/.
A Comprehensive Strategy for Combating Terrorism 269
2015. http://www.pewresearch.org/fact-tank/2013/06/07/balancing-
act-national-security-and-civil-liberties-in-post-911-era/.
Donnelly, Jack. “State Sovereignty and International Human Rights.” Ethics and
International Affairs 28, no. 2 (2014): 225-38.
Forrest, James J. F. The Terrorism Lectures: A Comprehensive Collection for. Stu-
dents of Terrorism, Counterterrorism, and National Security. Santa Anna, CA:
Nortia Press, 2012.
Government of Canada. Building Resilience Against Terrorism: Canada’s Counter-
Terrorism Strategy. 2013. Accessed April 5, 2015. www.publicsafety.gc.ca/
cnt/rsrcs/pblctns/rslnc-gnst-trrrsm/rslnc-gnst-trrrsm-eng.pdf.
Government Offices of Sweden. Government Communication: Sweden’s National
Counter-Terrorism Strategy, Government Communication 2011/12:73.
Stockholm: Ministry of Justice, 2011. Accessed September 25, 2015.
http://www.government.se/legal-documents/2012/06/skr.-20111273/.
HM Government. Contest: The United Kingdom’s Strategy for Countering Terror-
ism. 2011. Accessed April 5, 2015. www.gov.uk/government/
uploads/system/uploads/attachment_data/file/97994/contest-summary.pdf.
Jamah, Ally. “Heavy-handed Counter-Terrorism Tactics Added Pepper to Injury
This Year.” Standard Digital News, December 29, 2014. Accessed 5 April
2015. www.standardmedia.co.ke/article/2000146165/heavy-handed-
counter-terrorism-tactics-added-pepper-to-injury-this-year.
Jenkins, Brian. “International Terrorism: A New Kind of Warfare,” The RAND
Paper Series P-5261. Santa Monica, CA: RAND, 1974.
Kleiman, Mark A.R., Peter Reuter, and Jonathan P. Caulkins. “The ‘War on Ter-
ror’ and the ‘War on Drugs’: A Comparison.” Federation of American Scien-
tists Public Interest Report 55, no. 2 (2002): 3-5. Accessed April 5, 2015.
http://fas.org/faspir/2002/v55n2/waron.htm.
Peritz, Aki, and Eric Rosenbach. Find, Fix, Finish. New York: Public Affairs, 2012.
Posner, Richard A. Countering Terrorism: Blurred Focus, Halting Steps. Plym-
outh, UK: Rowman and Littlefield, 2007.
Raffenne, Jean-Paul, and Jean-Francois Clair. “The French Counterterrorism
System,” In Toward a Grand Strategy Against Terrorism, edited by Christo-
pher C. Harmon, Andrew N. Pratt, and Sebastian Gorka, 341-61. New York:
McGraw Hill, 2011.
Shemella, Paul. “Tools and Strategies for Combating Terrorism.” In Fighting
Back: What Governments Can Do About Terrorism, edited by Paul Shemella,
131-47. Stanford: Stanford University Press, 2011.
White, Jonathan R. Terrorism and Homeland Security. Belmont, CA: Wadsworth,
2014.
Williams, Phil. “Terrorist Financing.” In Fighting Back: What Governments Can
Do About Terrorism, edited by Paul Shemella, 44-63. Stanford: Stanford
University Press, 2011.
Acknowledgements and Credits
We wish to thank the Marshall Center leadership, in particular LTG (Ret.) Day-
ton, Dr. Bob Brannon and Mr. Rick Steinke. Of course, we are extremely grateful
to each of the authors for making the time to write for us, despite their busy
schedules, and to everyone at Procon, especially Todor and Petya. We will also
be forever in debt to the late COL (Ret) Nick Pratt, without whose vision and
dedication the Program on Terrorism and Security Studies might not exist, and
to all the course participants who make this program so special. Last, but by no
means least, a very special thank you to Ms. Jeanie Callaghan for her guidance
on contracting and publishing issues.
Disclaimer
The opinions expressed in this book are those of the authors and do not neces-
sarily reflect the official policy or position of the George C. Marshall European
Center for Security Studies, the United States of America, the Federal Republic
of Germany, or any other government or institution.
Credits
Cover photo courtesy of Karlheinz Wedhorn.
Chapter 4 has been adapted from Adam Dolnik, “The Dynamics of Terrorist
Innovation,” in Understanding Terrorism Innovation and Learning: Al-Qaeda and
Beyond, ed. Magnus Ranstorp and Magnus Normark (Oxon and New York:
Routledge, 2015), 76–95. Content reprinted with permission.
Figure 10.2 is reprinted with permission. Copyright, Peter Clarke Associates.
271
Index
Q fever, 102
A ricin, 102, 151, 153
rickettsiae, 102
Abu Sayyaf Group, 75 smallpox, 102
Afghanistan, 26, 39, 74, 80, 90, 116, 117, toxins, 102
131, 132, 140, 164, 188, 212, 221 Black September, 90, 137
al-Muhajiroun, 27 Boko Haram, 36, 46, 133, 253
al-Qaeda, 34, 50, 74, 85, 131, 136, 164, 193, Bourgass, Kamel, 151
202, 242
Breivik, Anders, 236, 237
al-Qaeda in Iraq (AQI), 56, 62, 184, 217,
221 Broken Arrows, 108
al-Qaeda in the Arabian Peninsula
(AQAP), 26, 34, 92, 117 C
al-Qaeda in the Islamic Maghreb (AQIM), Camorra, 72, 78
73, 117
Carabinieri, 136
al-Shabaab, 36, 86, 92, 93, 96, 117, 133,
219 CBRN. See Weapons of Mass Destruction;
Jabhat al-Nusra (JN), 115, 193 chemical weapons; biological weapons;
radiological weapons
alternative remittance system, 221, 225,
227 chemical weapons
chlorine, 62, 99
al-Zawahiri, Ayman, 37, 56, 193
mustard agents, 100
anarchists, 6, 36, 56, 89 nerve agents, 100
anthrax, 102, 103 phosgene, 99
AQ Khan, 108, 109 sarin, 100, 101
armed forces, 1, 10, 28, 37, 39, 131, 132, VX, 100
133, 136, 140, 149, 160, 164, 166, 168, collaboration, 141, 254, 264, 265
236, 237, 240, 258, 259 interagency, 144, 248, 264, 265
Armed Islamic Group (GIA), 54, 55 international, 80, 141, 142, 213, 242, 265
Aum Shinrikyo, 45, 50, 52, 54, 59, 90, 101, Colombia, 34, 75, 76, 77, 132, 133, 152,
102 165, 181, 184, 187, 188, 189, 200, 212,
219, 223, 230
B cooperation
interagency, ix, 79, 131, 235, 236, 237,
Barot, Dhiren, 153, 157 239, 240, 242, 243, 244, 245, 248,
Basayev, Shamil, 105 249, 264
Battle of Algiers, 132 international, 79, 126, 142, 158, 163,
Bin Laden, Osama, 25, 85, 91, 116, 117, 172, 173, 174, 223, 229, 240, 242, 258
118, 135, 143, 161, 186, 193, 220 coordination
biological weapons interagency, 131, 238, 239, 240, 241,
anthrax, 102, 103 244, 248, 249, 254, 263
bacteria, 102 international, 81, 97, 100, 157, 242
273
274 Combating Transnational Terrorism
sharing, 81, 126, 141, 142, 157, 164, 229, Counter Terrorism and Security Bill, 44
230, 235, 239, 240, 241, 244, 245, human rights, 9, 39, 132, 143, 144, 168,
247, 249, 264 170, 175, 218, 230, 267
signal (SIGINT), 135, 140, 142 international humanitarian law, 167, 168
intelligence organizations law of armed conflict, 167
Bundesamt für Verfassungsshutz (BfV), Mutual Legal Assistance Treaty, 174, 229
142 Patriot Act, 39, 140, 164
Bundesnachrichtendienst (BND), 187 rendition, 140, 168, 169
Central Intelligence Agency (CIA), 100, targeted killing, 135, 168, 171
169 torture, 13, 132, 133, 143, 170, 175, 267
Force Research Unit (FRU), 137 Liberation Tigers of Tamil Eelam (LTTE).
Government Communications See Tamil Tigers
Headquarters (GCHQ), 140 Liquid Bomb Plot. See terrorist plots and
Interservices Intelligence Agency (ISI), attacks
143 lone actor, 18, 115, 116, 117, 120, 122, 123,
National Security Agency (NSA), 80, 140 124, 125, 127, 193
Secret Intelligence Service (MI6), 143
lone wolf. See lone actor
Security Service (MI5), 137, 138, 141,
154, 155, 157, 193, 242 Lord’s Resistance Army (LRA), 55, 70, 192
Servizio per la Informazioni e la
Sicurezza Militare (SISMI), 169 M
intelligence-led policing, 79, 138, 153, 159 McVeigh, Timothy, 37, 56
Internal Revenue Service (IRS), 80 money laundering, 68, 74, 81, 217, 218,
International Criminal Court (ICC), 192 223, 224, 228, 229, 230, 240
interrogation, 35, 135, 139, 168, 169, 218 Moro Islamic Liberation Front (MILF), 186,
Irish Republican Army. See Provisional Irish 192, 261
Republican Army (PIRA) motivation for violent extremism and
Islamic State, 18, 28, 34, 38, 41, 44, 49, 52, terrorism
62, 69, 73, 75, 76, 86, 94, 100, 109, 115, deprivation, 22
118, 119, 123, 132, 133, 141, 192, 193, environmental factors, 17, 22, 26, 29
202, 221, 225, 228, 253 family, 24, 27, 36
identity, 21, 22, 24, 26, 52, 72, 90, 218
J ideology, 21, 23, 24, 28, 52, 57, 60, 62,
94, 111, 121, 128, 158, 200, 202, 207
Joint Terrorism Task Force (JTTF), 236, individual factors, 17, 19, 20, 21, 22, 23,
239, 243, 244, 246, 248 25, 26, 29, 57, 76
injustice, 9, 20, 21, 23, 39
K leadership, 18, 25
prison, 26, 28, 29, 70, 119, 127, 205
Kurdistan Workers’ Party (PKK), 25
victimization, 13, 21, 24
L mutually hurting stalemate, 189, 190
National Movement for the Liberation of highly enriched uranium, 104, 105, 106,
Azawad (MNLA), 220 108, 111
NATO Intelligence Fusion Center, 142 plutonium, 105, 106, 111
negotiations, 152, 181, 182, 183, 185, 186, radiological isotopes, 105, 106
187, 188, 191, 192, 193, 259 Red Army Faction (RAF), 54, 55, 59
nerve gas. See chemical weapons Red Brigades, 37, 72, 185
networks rendition. See law
organization, 73, 152, 193, 238, 249 resilience, 202, 212, 256, 257
social, 121 Revolutionary Armed Forces of Colombia
transnational, 14, 144 (FARC), 54, 70, 73, 75, 76, 165, 184, 185,
Nigeria, 88, 133 187, 189, 219, 221
Norway, 236, 237 ricin. See biological weapons
November 17th, 50, 59 Royal Ulster Constabulary (RUC), 137, 141
O S
organized crime, 1, 14, 67, 69, 71, 74, 77, salmonella. See biological weapons
223 sarin gas. See chemical weapons
Sendero Luminoso, 34, 54, 220
P Sensitive Investigative Unit (SIU), 80
Pakistan, 42, 43, 56, 107, 108, 116, 134, Sharia4, 27
135, 142, 143, 159, 171, 186, 188, 204, Shining. See Sendero Luminoso
211 Sicarii, 43, 253
Palestine Liberation Organization, 37, 43, special operations
90 Special Air Service (SAS), 136
Paraguayan People’s Army (EPP), 73 Special Operations Command (SOCOM),
People’s Will, 5, 56 135
Popular Front for the Liberation of Special Operations Forces (SOF), 133,
Palestine – General Command (PFLP- 135, 137, 139
GC), 50, 54, 59 special police units
Popular Front for the Liberation of Grenzshutzgruppe 9 (GSG-9), 137, 142
Palestine (PFLP), 20 Groupe d’Intervention de la
Provisional Irish Republican Army (PIRA), Gendarmerie Nationale (GIGN), 136
25, 39, 43, 54, 55, 70, 73, 74, 78, 137, Special Weapons and Tactics (SWAT),
152, 154, 190, 192, 201 136, 139
Yamam (Israel), 136
R state terrorism, 12, 13, 14, 58, 68, 77, 107,
187, 219, 259
radicalization, 17, 21, 24, 26, 28, 60, 70, 76, strategy, 14, 33
94, 120, 121, 207, 241, 262, 266 CT strategy, 131, 155, 161, 182, 195,
radiological dispersal device. See 199, 203, 205, 207, 213, 237, 254,
radiological weapons 255, 256, 257, 259, 261, 263, 266, 268
radiological weapons terrorist strategy, 19, 21, 33, 36, 46, 51,
cesium 137, 105, 106 64, 86, 93, 132, 153
dirty bomb, 103, 104, 105
Index 277
279
280 Combating Transnational Terrorism
This publication is circulated subject to the condition that it shall not by way of
trade or otherwise, be lent, sold, hired out or otherwise circulated without the
publisher’s prior consent in any form of binding or cover other than in which it
is published and without a similar condition including this condition being im-
posed on the subsequent publisher.
Procon Ltd.
< http://procon.bg >
office@procon.bg
3, Razluka Str., ap. 20
Sofia 1111, Bulgaria