429 Terrorism
429 Terrorism
429 Terrorism
TYPOLOGIES
"One man willing to throw his life away is enough to terrorize thousands." (Wu Ch'i)
The academic field of what Ross (2006) calls terrorism studies has grown substantially
in recent years. Two scholarly journals focus almost exclusively on the subject --
Terrorism and Political Violence and Studies in Conflict and Terrorism. More and better
empirical studies have been conducted, and in some ways, despite setbacks such as the
U.N. failure to define terrorism (no internationally accepted definition of terrorism
exists), better definitions of terrorism have been established. Certain areas of interest
are of growing importance, such as the role of the media in terrorism (need for more
research on this), and whether 9/11 produced a paradigm shift or whether terrorism is
nothing new, among other issues. There is a need to be cautious in tossing the terrorist
label around, as most experts (e.g., Hoffman & Claridge 1998) suggest it is better to
define terrorism by the nature of the act rather than by the identity or socio-
demographics of the perpetrators. Nevertheless, reproduced below (noting there is no
"one, best" definition) is the field's so-called "consensus" definition, devised in the early
1980s and probably adhered to by (it can be estimated) about 75% of experts in the
field, despite reservations about its failure to distinguish supporters of terrorism as well
as terrorism-like criminal behaviors such as drug trafficking:
One cannot avoid long-standing debates, going back as far as Aristotle, over when it is
politically and morally acceptable to use unconventional tactics such as violence and fear
to bring about political and social change. History is replete with the ideas of great
thinkers who believed that, under the right circumstances, unconventional tactics were
not only smart, but a moral or civic duty. Religious leaders over the centuries have
contributed thoughts about when unjust warfare is just, when "holy terror" is justified,
and military thinkers have advocated less-than-honorable tactics. Most terrorism
throughout history has been directed against governments (what is called political or
revolutionary terrorism), but terrorism can also be global or take the forms of state
terrorism or state-sponsored terrorism. These latter types occur when governments
turn on their own citizens, or try to stir up trouble among the citizenry of another
nation. In fact, it was state terrorism that put modern use of the term "terrorism" in
the English vocabulary.
The word "terrorism" took on a slightly different meaning after German philosopher,
Immanuel Kant wrote about it in 1798 to describe a pessimistic view of the destiny of
mankind. This idea of terror as the abandonment of all hope for a collective solution to
life's problems, and the scary, yet liberating experience of only being able to count on
yourself became the genesis of two mid-1800 ideas known as anarchism and
communism. Anarchism was invented in 1840 by Pierre-Joseph Proudhon, and
expanded upon by Mikhail Bakunin in 1848 and Karl Heinzen in 1849. Anarchism
supported terrorism with statements such as "if you have to blow up half a continent to
destroy the enemy, do so with no scruples or conscience." Communism was invented in
1844 by Karl Marx contemplating the theses of Feuerbach, which were essentially
Kantian ideas about the liberating potential of self-reliance and mass movements. Lenin
expanded on communist theory by condemning individual acts of terrorism, yet
supporting mass acts of terrorism. It was Lenin in 1908 who invented modern state-
sponsored terrorism (or stirring up trouble among the citizenry of other nations) when he
said "We cannot reject terror, as it is the one form of military action which may be
perfectly suitable or even essential at a definite juncture in battle." The battle that
Lenin and Stalin fought for many years was the Cold War (1922-1993), which sought to
defeat capitalism and establish a world-wide communist regime. This Cold War
contained many proxy "Dirty Wars" between the United States and Russia (proxy
meaning fought on soil other than American or Russian), and helped establish the
international meaning and nature of terrorism. Meanwhile, Lenin and Trotsky started
up a Red Terror inside Russia from 1918-1923 with a vast gulag of concentration camps,
which was carried on by Stalin's purges in the mid-1930s with the Great Terror. The
United States, for its part, engaged in a "Red Scare" roundup of suspected anarchists
and communists. Terrorism sponsored abroad and at home went hand in hand during
the Cold War.
The next phase in the history of terrorism involved nationalism and the desire to rid a
country of colonial rule. The Macedonian insurgency (1893-1903) against the Turkish
Ottoman Empire became the first anti-colonial group in modern history to
systematically wage guerilla warfare, avoid conventional battle, occupy towns and
villages, engage in propaganda, and use terrorism to gain control. Nationalist terrorism
provided the notion that "there are no innocent non-combatants" since it was typical
with this type of terrorism for many more non-combatants to be killed than
combatants. Perhaps the most well-known figure in the history of nationalist terrorism
is Colonel T.E. Lawrence ("of Arabia"), who organized the 1916-1918 insurgency by
Arab irregulars against Ottoman Turks. Undoubtedly, another major figure was Mao
Zedong, whose peasant army brought down what was left of imperial Manchu China in
1949 at the start of the Cultural Revolution. Mao's victory and guerrilla warfare tactics
inspired revolutionaries and terrorists throughout the Third World, as did Fidel Castro
and Che Guevara during the Cuban Revolution of 1959. In fact, it was in Latin America
where terrorism became most closely tied to anti-colonialism. Carlos Marighella (1930-
1971) wrote the Latin American handbook on terrorism (The Minimanual of Urban
Guerrilla Warfare), claiming it required adherence to a "higher morality", that one
man's terrorist is another man's liberator. (The phrase "one person's terrorist is
another person's freedom fighter" has unknown origins.) In other parts of the world,
different anti-colonial patterns emerged, such as those associated with the non-terrorist
and non-violent tactics of Mahatma Gandhi. However, in Africa, terrorist tactics were
successfully used to achieve the independence of states such as Kenya and Algeria. It
was nationalist terrorism which popularized the phrase "freedom fighter."
Another period of time that brought a different meaning to terrorism was the World
War II period with Fascist Italy and Nazi Germany. Here, the word "terrorism"
became to be associated with totalitarian regimes and police states. For example, when
Hitler's minister of the Interior, Hermann Goering said in 1933 that "I will not be
crippled by judicial thinking. I don't have to worry about justice. I shall use the power
of the police to the utmost," this is pretty much an announcement of a police state that
engages in terrorism against its own citizens. Words used to describe this kind of
terrorism include state terrorism, state-imposed terrorism, or state-directed terrorism.
It became typical of dictatorships in many places without Fascist or Nazi influence,
places like Argentina, Chile, Greece, El Salvador, Guatemala, Colombia, and Peru,
because "death squads" or "terror squads" (usually off-duty policemen) roamed about
the countryside intimidating and killing political opponents, human rights workers,
student and labor leaders, journalists, and others.
The year 1968 marked a radical shift in Middle East politics when Palestinian groups
accomplished a streak of notable skyjackings. It could easily be argued that terrorism
in the Middle East had earlier benchmarks, and indeed certain religious aspects of it do,
but 1968 was a turning point. In the words of the PLO representative to the United
Nations that year, "The first several hijackings accomplished more for our cause than
twenty years of pleading" which illustrates this turning point that made all the world a
stage for international terrorism. Dershowitz (2002) documents other twists and turns in
Palestinian tactics, but another important date is 1974 when PLO Chairman Yassir
Araft eloquently argued before the U.N. that his people were "freedom fighters" not
terrorists (although see Ahmad 2001 for an account of the year 1944 being significant
when sympathy for the Holocaust caused people to start referring to Jewish terrorist
groups like Irgun, the Stern Gang, and Hagannah as "freedom fighters"). The 1960s
and 1970s also saw the emergence of a new type of nationalism called separatism. This
describes indigenous ethnic groups who have long lived in a province, but want to
separate from their host nation and start their own country. Examples include Quebec,
the Basque Homeland, and portions of Indonesia. Like their anti-colonial predecessors,
separatists sought to use terrorism to attract international sympathy and a perception of
them as freedom fighters.
In the 1980s, the War on Drugs was launched by the United States, and the word
"narco-terrorism" came into the vocabulary (Ehrenfeld 1990). The word meant that
drug trafficking was being used to propagate the objectives of certain governments and
terrorist organizations. Narco-terrorism was seen as a Communist plot at first.
Eventually, it became seen as an economic threat. However, the War on Drugs forced
the United States into building a military-police apparatus for intervening in the
domestic affairs of foreign countries. The U.S. also started paying attention to how
elections were held in foreign countries. As we entered the 1990s, America and the
Western powers also became aware of exactly how many "hot spots" (also called
"trouble spots", low intensity conflicts, or the gray area phenomenon) there were in the
world. Places like the Balkans, Kashmir, Somalia, and the Congo had been sitting as
powder kegs for years. Places like Syria, Iran, and Iraq were secretly sponsoring global
terrorism. Places like China, North Korea, and Pakistan were developing weapons of
mass destruction. And, then there was the problem of all the broken-up former Soviet
states.
A declared War on Terrorism, sometimes abbreviated WOT (or GWOT, for Global)
is probably not the best way to put it, although it doesn't matter if the armed forces
engaged in such a struggle like the acronym GWOT, and it wins the war and/or gets it
over with. From an intellectual standpoint, however, and to be conceptually rigorous,
one would NOT normally declare war on a tactic (i.e., terrorism), but would instead
declare war on the root causes (e.g., extremism, fanaticism) of a problem. Definitional
problems remain, since goals are still nebulous (e.g., like a war on injustice). Wars are
usually fought against nationalities (e.g., war with the Germans), and to be brutally
honest, against religions, or at least radical elements of it (e.g., war with radical Islam).
War is the top gun in the specrum of conflict any power can launch against another
power, and GWOT calls for full-spectrum conflict. Spectrum of conflict is the term used
to describe a graduation of conflicts on continuums of intensity and scope. Full
spectrum wars can be fought absolutely or pragmatically. War itself is a word with
forensic dimensions and legal implications.
In contrast to other countries, the United States has no legal definition of terrorism.
There is no organized body of legislation one might call the law of terrorism, and there
is no inherent crime of terrorism (terrorists are charged with other offenses). There is a
long-standing legal code called Title 18, Part I, Chapter 113B, Section 2331 which is
entitled "Terrorism" and attempts to define it, but it is essentially all about
international terrorism and represents America's version of outlawing internecine
conflict on its soil. Internecine conflict is when someone else's battle spills over on your
land, which might not seem important, but terrorists often disregard any respected
areas of combat or demarcated battlefields. Constitutionally (at least for now), it is not
illegal to claim you are a terrorist, belong to a terrorist group, or be suspected of being a
terrorist. Ninety percent of the time, suspected terrorists do nothing wrong until they
commit an indictable act. Indicted terrorists are charged with other crimes -- planning
for violence, raising funds illegally, and carrying out a violent act. The most common
criminal charges against terrorists include bombing, arson, hijacking, assault, kidnapping,
murder, theft, and sabotage. For terrorists who are captured before completing an act, the
most common charges are illegal possession of explosives and weapons, illegal raising of
funds, and conspiracy. International law only recognizes the criminal corollaries of
terrorism, such as conspiracy, kidnapping, murder, and arson. State criminal laws do
recognize certain specific intent crimes, such as telephone harassment for terrorist
purposes, along with other stalking and domestic violence offenses, but these are not
really referring to terrorism but forms of personal intimidation. In short, there are an
assortment of terrorism-related laws, none of which alone or in combination, make any
sense in terms of understanding terrorism or getting a legal perspective on it. With few
exceptions (Henderson 2001; Combs 2003), authors don't even attempt a chapter on law
in their terrorism books.
Let's try to cover terrorism law, relying upon resources such as a website the U.S.
State Department calls current anti-terrorism laws, and one at the University of
Pittsburgh that does a good job of tracking recent and pending anti-terrorism laws.
Basically, the following alphabetical list of items make up what might be called the
codified law of terrorism:
Codified laws, like the above, have stood the test of time, and in addition have
received the approval of various jurist associations. There is little chance of
misunderstanding a codified law. Next in order of importance, are the court cases which
have established precedent as binding and guiding forces of law. The following selected
cases make up what might be called the case law of terrorism:
• Dennis v. United States, 341 U.S. 494 (1951) - The constitutional right to free
speech only applies to discussion or explanation of doctrines or ideologies that
urge the overthrow of the government. Speech that advocates such overthrow or
interferes with vital matters of national security is not protected.
• Yates v. United States, 354 U.S. 298 (1957) - To qualify as an indictable enemy of
the U.S., a person must take some concrete steps toward harmful action, and not
simply be expressing their opinions.
• Scales v. United States, 367 U.S. 203 (1961) - Persons who belong to enemy groups
with only a supportive, passive, or inactive role are just as indictable as those who
play more active roles.
• Brandenburg v. Ohio, 395 U.S. 44 (1969) - Puts the burden of proof on
prosecutors to show political speech is inherently violent, and removes the
burden on defendants to show it was vague.
• U.S. v. Wang Kun Lue & Chen De Yian, U.S. 2D Circ., 96-1314 (1996) - Allows
states to pass anti-terrorism laws which are extensions of international treaties.
• Reno v. American-Arab Anti-Discrimination Committee, 97-1252 (1999) -
Immigrants can be deported for engaging in terrorist or political activities where
evidence supporting such claims is presented in secret.
• Kiareldeen v. Reno, 71 F. Supp. 2D 402, 419 (D.N.J. 1999) - Immigrants on
student visas can be deported on the basis of secret evidence that supports claims
they are terrorists or dangerous.
In addition to codes and cases, there is what is called "public law" which consist of
legislation signed into law. Often, these have not yet passed constitutional muster, but
they represent what the legislative branch of government thinks ought to be done
quickly. The following acts are a select list of what makes up the public law of
terrorism:
• Title 22, Chapter 38, Sec. 2656f Annual Country Reports on Terrorism
-- Since 1988, the Dept. of State has been required to submit to Congress a
detailed report on major, "significant" terrorist events.
• Antiterrorism and Effective Death Penalty Act of 1996 -- Bans terrorist
fundraising in the United States, sets up an expedited alien terrorist removal
system, modifies the procedures for requesting political asylum, curtails the
appeal process, increases the penalties for conspiracies involving explosives and
other terrorist crimes, applies the money laundering statute to terrorism, and
clarifies federal and state police jurisdiction over investigating terrorism.
• Suppression of the Financing of Terrorism Convention Implementation
Act of 2001 -- Enhances penalties for knowingly concealing or disguising the
nature, location, source, ownership, or control of material support or resources
to terrorists.
• Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT)
Act of 2001 -- Enhances roving surveillance authority and streamlines wiretap
authorizations, sets up anti-terrorism asset forfeiture procedures, approves
detention of suspected terrorists, removes obstacles to investigating terrorism,
increases the penalties for terrorist crimes, removes any statute of limitations,
encourages federal involvement in domestic preparedness exercises, and
supporting creation of a new agency called the office of Homeland Security.
• Aviation and Transportation Security Act of 2001 -- creates a new federal
agency called the Transportation Security Administration as well as a federal Air
Marshals program.
• Enhanced Border Security and Visa Entry Reform Act of 2002 -- Sets up
joint military, police, and intelligence community tracking systems for facial
recognition, voice intercept, and other technologies useful in improving border
security.
Then, following codes, cases, and legislation, there are pronouncements made by the
executive branch of government, called Executive Orders, Decisions, Declarations, or
Directives. The most well-known of these is probably the Presidential Decision
Directive, or PDD, which has a long history of use going back to creation of the NSA and
the launching of various secret missions during the Vietnam War. Many documents in
this category are classified, but others are easily found on the White House web site.
They are considered binding "administratively" upon government employees who work
for an executive branch agency. The most common type of administrative law is made
up of regulations passed by the heads of various agencies, but with terrorism, many
executive decisions are made, so the following documents would make up the
administrative law of terrorism:
DEFINITIONS OF TERRORISM
The Christian Science Monitor's special report, Exactly What is Terrorism? draws
the user into a quiz over what they think qualifies as terrorism, and what does not. Here
are some excerpts (think about how strongly you feel that each case is terrorism or not,
and the answers will be hidden in the following paragraph).
Don't worry if you're confused on the whole good/bad, motive/act thing. Philosophers
have debated it for years, and there are experts in criminal justice who say the act, not
the motivation, should define terrorism (Jenkins 1985), and then there are experts who
say the motivation, not the act, should define terrorism (Hoffman 1999). Those who
write encyclopedias of terrorism state that an adequate working definition ought to have
three parts: method, target, and purpose (Kushner 2003). You'll also note that three
different branches of the U.S. government use three different definitions, as follows:
Simonsen and Spinlove (2000) do a good job of comparing and contrasting the
different constructs, and note that the State approach emphasizes motives, the DOD
approach emphasizes goals, and the FBI approach emphasizes methods. Combining the
three would produce some overly complex definition like "Terrorism is the clandestine,
criminal resort to violence or threat of violence on the part of a group toward innocent
bystanders which seeks to accomplish some purpose against some recognized authority.
The purpose is usually political and the target is usually civilian." Alex Schmid (1988)
has attempted to analyze the frequency of different emphases in at least 109 definitions
of terrorism, and finds that, in rank order, most definitions emphasize goals (political),
purposes (fear), targets (victim reactions), and methods (combat strategy or tactic).
Only a small number of definitions emphasize the publicity aspect, covert nature, or
criminal character of terrorism. It is undoubtedly that case that political motivation
ranks as the leading element in most definitions of terrorism. In fact, some years ago,
the National Advisory Commission on Criminal Justice Standards and Goals (1976)
recommended calling any crime that is politically motivated an act of terrorism.
However, the problem with making something political into criminal goes beyond
motivation (endless debates can be had over the presence or absence of instrumental or
expressive motives in terrorism) as well as methods (Historical note: assassination was
common in the 19th Century; bombing in the 20th; and techno-exotic forms such as
cyber-, narco-, and eco- in the 21st). The idea of terrorism as crime rests upon having
an adequate legal framework (which doesn't exist) as well as an understanding of the
costs or impact of terrorism. Yet, that doesn't stop agencies from trying.
The FBI has primary responsibility for the criminal investigation of terrorism. The
Anti-Terrorism and Effective Death Penalty Act of 1996 authorizes them to (1) oversee
detention and deportation of aliens suspected of terrorist activities; and (2) search and
seize any fund-raising activities by foreign groups suspected of engaging in terrorist
activity. Other countries have stronger criminal laws. In France and Great Britain, for
example, suspected terrorists can be held for indefinite amounts of time. U.S. police are
severely restricted in how they can interrogate and use electronic surveillance, and in
addition, the U.S. Bill of Rights, to a certain degree, protects extremism (strongly held
political beliefs) and fanaticism (strongly held religious beliefs) -- two underlying
causes of terrorism.
The U.S.A. Patriot Act (October 26, 2001) allows for longer detention of suspects,
expanded surveillance and intelligence gathering powers by federal authorities.
Congress passed additional anti-terrorism laws in the wake of September 11, and at
least three states (Michigan, New Jersey, and New York) have passed their own anti-
terrorism statutes.
The CIA has primary responsibility to preempt, disrupt, and defeat terrorism.
Presidential Directives signed in 1995 and 1998 authorize them to treat terrorism as a
crime, use all-source information, apprehend offenders, and bring them to justice
wherever they can worldwide. The head of the CIA (DCI) coordinates the Intelligence
Community (IC), and the National Security Council coordinates the nation's
counterterrorism efforts. The CIA maintains a War on Terrorism website.
The Department of State has primary responsibility to use its diplomatic efforts with
foreign governments to thwart terrorism. It also helps to develop, coordinate, and
implement counterterrorism policy. On the State Department's website, one can find
the Top Ten List of Most Wanted Terrorists as well as other lists, data, and resources,
such as the List of Entities which constitute terrorist groups.
Distinctions are easier to make than definitions. Jonathan White's (2002) approach
in placing terrorism on a continuum of conflict is keenly illustrative. It sees terrorism as
between rioting and guerilla warfare, and his model is adapted/modified below:
Another approach might be to distinguish terrorists from others of their kind or how
they perceive themselves. No group has openly admitted they were terrorists since the
1940s, and the most commonly preferred self-terminology includes guerrilla, fighter, or
warrior. What follows is an alphabetical listing of the many terms terrorists use to call
themselves (with the proviso that any errors or mistakes in definition are my own):
• Avengers -- those who evoke the image of righteous vengeance (on behalf of
others)
• Crusaders -- those who engage in extremes to set the pace for others
• Defenders -- those who think of themselves as vigilantes (defenders of self and
others)
• Dissidents -- those who want to defeat or overthrow an existing government
• Extremists -- those with strongly held political beliefs out of the ordinary
• Fanatics -- those with strongly held religious beliefs out of the ordinary
• Fighters -- those who usually claim the other side are terrorists
• Guerrillas -- those who fight a stronger opponent with hit-and-run tactics
• Insurgents -- those who use propaganda, guerrilla tactics, and irregular fighting
forces
• Insurrectionists -- those who are in armed opposition to the laws of a government
• Liberators -- those who consider themselves on the vanguard of freedom fighting
• Lunatics -- those on the extreme fringes of left or right ideologies
• Nationalists -- those fighting for the whole of their homeland
• Radicals -- those with left-wing opinions (right-wingers are called reactionaries)
• Rebels -- those who champion a cause not always their own, but the people's
cause
• Revolutionaries -- those who are committed to a certain ideology to bring about
change
• Separatists -- those fighting for a separate division of their homeland
• Soldiers -- those who say they belong to an army or other military organization
There are, of course, many other terms that one would encounter in studying
terrorism. What is left out from the list would be terms such as: Liberationists; Pirates;
Resisters; Propagandists; and Mercenaries. These may be terms that have some special
meaning, but the process quickly gets redundant after awhile. Redundancy is evident in
the phrase Freedom Fighter, because no side to every clash fights for anything but
freedom. As an aside, it's often argued that parts of the American Revolution, like the
Boston Tea Party, involved terrorist acts, and that this illustrates "one person's terrorist
is another person's freedom fighter." However, this argument misses the fact that the
groundwork for the American Revolution was already underway in a variety of
directions, and "legitimate" freedom fighting always contains advance warning, follows a
warrior code, obeys the rules of war, prohibits certain kinds of weapons, does not use
outlaw tactics, and takes steps to select targets that harm the least number of innocents.
Critiques of definitions are also easier than making them. An illustrative example
here is William Dyson's (2001) approach to dissecting terrorism. He starts by criticizing
dictionary definitions of "terror," and most certainly, some of the worst definitions of
terrorism confuse it with fear, fright, alarm, being shocked, or scared. It is also easily
distinguishable from acts of civil disobedience, marches, demonstrations, leafleting,
picketing, protesting, and rioting. It is less distinguishable from guerilla warfare or
revolutionary wars (which can be restricted or unrestricted, as Martin calls it). In fact,
terrorism often escalates into war, a phenomenon that experts call the Sarajevo Effect
(Lacquer 1999) in which the 1914 assassination led to World War I. Dyson (2001) adds
that terrorism can evolve into insurrection (which is the same as civil war), and he
speculates that a terrorist situation becomes revolutionary whenever 25% of the
population is engaged in the violence.
The most widely used definitions in criminal justice are simple ones created by Brian
Jenkins (1985), Bruce Hoffman (1999), and Walter Laqueur (1999), all resting upon the
idea of illegitimate force to achieve political ends by targeting innocent people. These
simple definitions suffice for understanding complex social factors, but it should also be
realized that we may never be able to define terrorism. It is important to note that the
means used by terrorists are always illegitimate, even though their ends may be
sometimes legitimate. Most of the terms similar to terrorism like freedom fighter and
revolutionary often make use of the argument that the End Justifies the Means. To a
terrorist, there's no such thing as innocent bystanders.
One of the main objectives of terrorism is usually to gain publicity for some cause,
and public fear, roused thru the media, may contain a key to understanding the
psychology of terrorism. It may also be important in producing a criminological
definition of terrorism. The threat of harm to innocent bystanders is what makes
terrorism powerful. In this sense, it is the same as what makes military operations
powerful - striking terror in the hearts of the enemy. Terrorists are particularly
concerned with invoking fear in those who identify with the victims of their action. In
this fashion, terrorism is always symbolic, and "media-motivated", so targets likely to
be reported on by prominent media organizations are especially vulnerable.
Terrorism should also be distinguished from crime, at least in the sense that a war on
terrorism is different from a war on crime or war on drugs. There are at least five good
reasons for this, but the obvious one is that no law enforcement or criminal justice
system needs to be nudged in the direction of becoming more like the military. There is
also a long-standing tradition in the field of legal studies which only considers certain
criminological aspects of terrorism (e.g., those aspects of terrorism which hold that the
phenomenon is a sociological manifestation of societal structures and processes and not
some "essentialist" phenomenon of "real" terrorism beyond the definitional powers of
authorities). On the crime-terrorism distinction, Geraghty (2002) is a good guide, as
is Deflem (2005). Fuller (2006) outlines the primary differences between a war on
terrorism versus a war on crime or other social problems:
• a war on terrorism has (or should have) a clear and identifiable enemy (social
problems are more diffuse)
• a war on terrorism is political (rather than social, or solved by tinkering with
social service delivery systems)
• a war on terrorism uses military weapons (police have little need for military
weapons and equipment)
• a terrorist enemy does not enjoy U.S. legal protections (at least fewer
constitutional protections)
• a terrorist firmly believes their cause is just (most criminals admit they're
deviant)
Deflem (2005) makes some good points about the current status of criminology on
terrorism. He says that criminologists should not be embarrassed to learn from other
research disciplines, but they must also seek to provide a distinctive contribution to the
scholarship. Some issues, such as terrorism and the media and terrorism and foreign
policy have already been well-explored by social scientists other than criminologists. But
the relations between terrorism and counterterrorism in connection with criminal
activity as well as with crime control remain at present underexplored and form a field
rich with potential for criminological research and theory. It is the specific province of
criminology to study the patterns and dynamics of crime and social control from a
social-scientific viewpoint in relation to their conditions and implications at a societal
level. Terrorism is often connected with political, legal and military issues, often with
deep-seated moral resonance. Counterterrorism is likewise a complex constellation
much broader than police activities alone. However, issues of crime and social control
are always and inevitably present in the reality and discourse on terrorism. The fact that
the connection between terrorism and crime, on the one hand, and counterterrorism and
social control, on the other, is not always neatly drawn nor evident does not mean that
criminologists have no legitimate stake in their study. On the contrary, by bridging
criminological scholarship with the existing literature on terrorism and counter-
terrorism, a criminology of terrorism-related phenomena can be meaningfully
connected to what is known from other social sciences and, at the same time, reveal the
merits of its unique scientific focus and orientation.
TYPOLOGIES OF TERRORISM
Just as there is no one good definition of terrorism, typologies do not account for all
forms of terrorism. Prof. Eskridge's Terrorism Page, from his course on terrorism out
in Nebraska has some graphic examples of typologies, but it should be noted that
typologies of terrorism are usually NEITHER motive-based NOR behavior-based, like
they are in other areas of criminological study, such as the areas of profiling and street
crime (the exception being Hacker's typology of terrorists by traits, included below).
This is evident from the following examples commonly found in textbooks and/or in the
strangely confused way the media reports what is going on in times of terrorist-related
crisis or war (Hess & Kalb 2003). In the following typologies, notice in the headings how
the types are classified in different ways.
Terrorism Classified by Place
1. Domestic -- by residents of a country within that country
2. International -- by representatives of a country against
another country
3. Non-state -- extremism and revolution for its own sake
4. State-sponsored -- by a government against its own people or
in support of international terrorism against another
government
5. Internecine -- conflict that spills over into another country or
fought on foreign soil
Terrorism Classified by Personality Trait
1. Crazies -- strong survival attitude, but not based in reality; self-
centered; goals clear only to perpetrator; irrational and
unpredictable; strikes at random
2. Crusaders -- sacrificial, death attitude; blends politics and
religion; seldom willing to negotiate; task-oriented and indifferent
to risk; seeks publicity and largest group possible
3. Criminals -- strong self-preservation attitude; selfish; seeks gain
and is task-oriented; avoids high risk; predictably targets small
groups (Hacker 1976)
Terrorism Classified by Purpose
1. Political -- for ideological and political purposes
2. Nonpolitical -- for private purposes or gain
3. Quasi-terrorism -- skyjacking and hostage taking
4. Limited political -- ideological but not revolutionary
5. Official or state -- used by nation against nation or people
Terrorism Classified by Target
1. Mass terror -- targets general population
2. Dynastic terror -- selective targeting of individuals or groups
3. Random terror -- targets anybody in wrong place at wrong time
4. Focused random terror -- targets specific public places frequented by
opposition
5. Tactical terror -- attacks government or politically attractive targets (Combs
2003)
Terrorism Classified by Issue
1. Revolutionary -- aims to replace the existing government by drawing out repressive
responses which can be exposed as inhumane (Red Army Faction, PLO, Hizballah)
2. Political -- heavily armed groups tending to be focused around supremacy,
government intrusion, or religious revisionism (Aryan Nation, Posse Comitatus,
Freemen)
3. Nationalist -- promotes the interests of a minority or religious group that has been
persecuted under majority rule (Sikh radicals, Muslim fundamentalism)
4. Cause-Based -- groups devoted to a social or religious cause using violence to address
their grievances (Islamic Holy War, Abortion clinic bombings)
5. Environmental -- groups dedicated to slowing down development they believe is
harming animals (Animal Liberation Front, Earth 1st)
6. State-sponsored -- when a repressive regime forces its citizens into total obedience
(Brazil, Colombia, Guatemala, Honduras, Peru, Iraq, Sudan, Haiti)
7. Nuclear -- outlaw states possessing nuclear threats (Libya, North Korea)
8. Genocide -- when a government seeks to wipe out a minority group in its territory
(Cambodia, Rwanda, Bosnia, Iraq, Turkey)
What most typologies are attempting to get at are tactics unique to the modes of
attack. There are five (5) tactics that terrorist use and four (4) modes of attack, or
types of weapons used. The tactics can be either basic or advanced, depending upon
how well-trained the terrorists are at guerilla warfare. The basic tactics are: (1) rolling,
in which the terrorists drive a vehicle by in what amounts to a hit-and-run maneuver;
(2) ambush, which is a standard platoon-level military maneuver drawing the enemy
into a line of fire; (3) standoff, which is a back-against-the-wall maneuver, usually with
an escape plan; and the advanced tactics are (4) boutique, which usually involve a
combination of modes of attack, but are intended primarily to have a large impact; and
(5) revenge, which also usually has a large impact, at least symbolically.
The modes of attack, or weapon systems, are (1) traditional -- when makeshift or
ordinary weapons are used; (2) technological -- when weapons of mass destruction, such
as nuclear, chemical, or biological, are used; (3) cyber -- when viruses, computer attacks,
or destruction of information infrastructure occur; and (4) narco -- when flooding a
market with drugs is used.
In addition, certain other factors are known as "force multipliers" which allow
small groups to operate on a higher level. The four (4) force multipliers are: (1)
technology; (2) transnational support; (3) media; and (4) religion. Furthermore, terrorists
often rely upon crime instead of military force, as the six most common terrorism-related
crimes are: (1) bombing; (2) hijacking; (3) arson; (4) assault; (5) kidnapping; and (6)
hostage taking. While there may be certain connections between the force multipliers
and types of crimes chosen (for example, bombing might be related to media coverage),
typology development, in itself, seems to represent the cutting edge of criminology and
criminal justice scholarship, perhaps for the ease of teaching.
"Terrorism is the intentional use of, or threat to use violence against civilians or
against civilian targets, in order to attain political aims. This definition is based on
three important elements:
1. The essence of the activity—the use of, or threat to use, violence. According to
this definition, an activity that does not involve violence or a threat of violence will
not be defined as terrorism (including non-violent protest—strikes, peaceful
demonstrations, tax revolts, etc.).
2. The aim of the activity is always political—namely, the goal is to attain political
objectives; changing the regime, changing the people in power, changing social or
economic policies, etc. In the absence of a political aim, the activity in question will
not be defined as terrorism. A violent activity against civilians that has no political
aim is, at most, an act of criminal delinquency, a felony, or simply an act of insanity
unrelated to terrorism. Some scholars tend to add ideological or religious aims to the
list of political aims. The advantage of this definition, however, is that it is as short
and exhaustive as possible. The concept of “political aim” is sufficiently broad to
include these goals as well. The motivation—whether ideological, religious, or
something else—behind the political objective is irrelevant for the purpose of
defining terrorism. In this context, the following statement by Duvall and Stohl
deserves mention:
Motives are entirely irrelevant to the concept of political terrorism. Most analysts fail
to recognize this and, hence, tend to discuss certain motives as logical or necessary
aspects of terrorism. But they are not. At best, they are empirical regularities
associated with terrorism. More often they simply confuse analysis.
3. The targets of terrorism are civilians. Terrorism is thus distinguished from other
types of political violence (guerrilla warfare, civil insurrection, etc.). Terrorism
exploits the relative vulnerability of the civilian “underbelly”—the tremendous
anxiety, and the intense media reaction evoked by attacks against civilian targets. The
proposed definition emphasizes that terrorism is not the result of an accidental injury
inflicted on a civilian or a group of civilians who stumbled into an area of violent
political activity, but stresses that this is an act purposely directed against civilians.
Hence, the term “terrorism” should not be ascribed to collateral damage to civilians
used as human shields or to cover military activity or installations, if such damage is
incurred in an attack originally aimed against a military target. In this case, the
responsibility for civilian casualties is incumbent upon whoever used them as
shields." If you wear a uniform, you can expect to come under attack, but if you are
a civilian, you should not expect to come under attack. The problem with terrorism
is that it usually attacks the civilian, not the soldier. However, regardless of who the
terrorist attacks, it is a criminal act.
INTERNET RESOURCES
Air War College's Terrorism Page
Communist Party Line on What Lenin Actually said about Terrorism
ERRI Terrorism Archive
Exactly What is Terrorism?
FBI's CounterTerrorism Authority and FBI's online terrorism Library
IACSP Association
International Policy Center on Terrorism
Is There a Definition of Terrorism?
Legal Aspects of The Posse Comitatus Act
LII's Backgrounder on National Security and Terrorism Laws
Presidential Directive 39 Secret/Unclassified (Redacted) Document
RAND Corp. 2000 Report of Domestic Preparedness to Terrorism
Section by Section Analysis of the USA Patriot Act
Terrorism Research Center
The Historical Development of Terrorism and Insurgency
U.S. State Dept. Office of Counterterrorism
Who Becomes a Terrorist and Why (pdf)
Yale Law School's Avalon Project on the Laws of War
Yahoo Full Coverage on Terrorism
PRINTED RESOURCES
Ahmad, E. (2001). Terrorism: Theirs & Ours. NY: Seven Stories Press.
Alexander, Y. & Swetnam, M. (2001). Osama Bin Laden's Al-Qaida: Profile of a Terrorist
Network. NY: Transnational Publishers.
Cohen-Almagor, R. (1991). "Foundations of Violence, Terror and War in the Writings
of Marx, Engels, and
Lenin," Terrorism and Political Violence (3)2: 1-24.
Combs, C. (2003). Terrorism in the Twenty-First Century, 3e. Upper Saddle River, NJ:
Prentice Hall.
Deflem, M. (2005). "Reading Terrorism and Terrorists: Review essay." Theoretical
Criminology 9(2):231-236. [online]
Dershowitz, A. (2002). Why Terrorism Works. New Haven: Yale University Press.
Dudley, W. (ed.) (2002). The Attack on America September 11, 2001: At Issue. San Diego:
Greenhaven Press.
Combs, C. (1997). Terrorism in the 21st Century. NJ: Prentice Hall.
Dyson, W. (2001). Terrorism: An Investigator's Handbook. Cincinnati: Anderson.
Ehrenfeld, R. (1990). Narco Terrorism. NY: Basic Books.
FBI. (1999). Terrorism in the U.S. http://www.fbi.gov/publications/terror/terroris.htm
Fuller, J. (2006). Criminal Justice: Mainstream and Crosscurrents. Upper Saddle River,
NJ: Prentice Hall.
Geraghty, T. (2002). "The Criminal-Enemy Distinction: Prosecuting a Limited War
against Terrorism Following the September 11, 2001 Terrorist Attacks." McGeorge Law
Review 33: 551-91.
Gibbs, J. (1989). "Conceptualization of terrorism." American Sociological Review 54:
329-40.
Hacker, F. (1976). Crusaders, Criminals, Crazies: Terror and Terrorists in Our Time. NY:
Norton.
Henderson, H. (2001). Global Terrorism: The Complete Reference Guide. NY:
Checkmark Books.
Hess, S. & Kalb, M. (Eds.) (2003). The Media and the War on Terrorism. Washington
DC: Brookings.
Hoffman, B. & Claridge, D. (1998). The RAND-St. Andrews Chronology of
International Terrorism and Noteworthy Domestic Incidents. Terrorism and Political
Violence 10(2): 135-80.
Hoffman, Bruce. (1999). Inside Terrorism. NY: Columbia Univ. Press. (see sample
chapter)
Jenkins, Brian. (1985). Terrorism and Beyond. Santa Monica: RAND Corp.
Kushner, Harvey. (2003). Encyclopedia of Terrorism. Thousand Oaks, CA: Sage.
Laqueur, W. (1999). The New Terrorism. NY: Oxford Univ. Press.
Long, D. (1990). The Anatomy of Terrorism. NY: Free Press.
Martin, Gus (2003). Understanding Terrorism. Thousand Oaks, CA: Sage.
Martin, J. & Romano, A. (1992). Multinational Crime. Newbury Park: Sage.
Nathanson, S. (2004). "Prerequisites for Morally Credible Condemnations of
Terrorism." Pp. 3-34 in W. Crotty (ed.) The Politics of Terror. Boston: Northeastern
Univ. Press.
Netanyahu, B & B. (1997). Fighting Terrorism. Jerusalem: Noonday Press.
Norwitz, J. (2002). "Combating Terrorism: With a Helmet or Badge" Journal of
Homeland Security, Nov. 6, Anser Institute.
Nyatepe-Coo, A. & Zeisler-Vralsted, D. (Eds.) (2004). Understanding Terrorism: Threats
in an Uncertain World. Upper Saddle River, NJ: Prentice Hall.
O’Kane. R. (Ed.) (2005). Terrorism, Vol I-II. Northhampton, MA: Edward Elgar.
Reich, W. (1998). Origins of Terrorism: Psychologies, Ideologies, Theologies, States of
Mind. NY: Woodrow Wilson Center Press.
Ross, J. (2006). Political Terrorism: An Interdisciplinary Approach. NY: Peter Lang.
Schmid, A. (1983). Political Terrorism: A Research Guide to Concepts, Theories, Data
Bases and Literature. New Brunswick: Transaction.
Schmid, A. (1997). "The Problems of Defining Terrorism." Pp. 12-22 in M. Crenshaw &
J. Pimlott (eds.) Encyclopedia of World Terrorism, Vol. 1. Armonk, NY: M.E. Sharpe.
Schmid, A. & Jongman, A. (eds.) (1988). Political Terrorism: A New Guide to Actors,
Authors, Concepts, Data Bases, Theories, and Literature. New Brunswick: Transaction.
Simonsen, C. & Spindlove, J. (2007). Terrorism Today: The Past, The Players, The
Future, 3e. NJ: Prentice Hall.
Snowden, L. & Whitsel, B. (Eds.) (2005). Terrorism: Research, Readings, and Realities.
NJ: Prentice Hall.
White, Jonathan. (2006). Terrorism and Homeland Security. Belmont, CA: Wadsworth.
Most of the major theories of terrorism are derived from theories of collective
violence in the field of political science, and indeed, prior to the emergence of criminal
justice as a separate discipline in the early 1970s, it can be safely said that political
science pretty much had a monopoly over theories of terrorism, followed perhaps by the
disciplines of religion and economics. Sociological, psychological, and criminological
theories have also certainly had a role to play with some relevance. We will begin, first,
with the theories of political violence, and it is customary to say at this point that none of
the following ideologies, or any ideology for that matter, are being advocated. The
purpose is to provide an objective overview of theories, concepts, causal factors, and
models. The underlying concern should be to answer the questions "Why Does
Terrorism Occur?" or "What Causes It?" rather than pass judgment or assess any of
the theories at this point. With the political theories, we shall see that it is often the form
of governance which is the main cause of terrorism, and with the other theories, we will
find a number of subcultural and personality factors at work. With other theories, such
as sociology, we will see how things like the interplay between social movements and
societal response can explain terrorism.
It should be noted that theory is more than the study of motive. In criminology,
theories tend to take on more than the explanation of offender mindsets and behavior.
They often tackle issues such as victimology and criminal justice system response.
Motive itself is frequently ignored in the prosecution of terrorists (Smith 1994; Smith,
Damphousse, Jackson & Karlson 2002). Sentencing variation exists in bringing
terrorists to justice mostly due to "structural-contextual" effects (when components of
criminal justice work more interdependently and not at odds with one another), and also
to "liberation" effects (when judges and juries do not feel free to follow their own
sentiments because the terrorist event was of high severity). Research is another area
where theory tries to be useful. Terrorism databases, such as the one at the MIPT
Knowledge Base, are often analyzed in various ways which afford an opportunity to test
theories, tease out the relevant variables or factors, and do comparative theory testing,
etc., all of which point to the larger purposes of theory, such as to guide research and
policy.
Terrorism is most definitely not a form of governance, but anarchism is. Most
anarchists reject terrorism in its vanguard varieties (for nationalist or religious
purposes), but in a theoretical sense, anarchism justifies terrorism as a form of criminal
action that attacks the values of an organized, complacent society. Anarchism is a
theory of governance that rejects any form of central or external authority, preferring
instead to replace it with alternative forms of organization such as shaming rituals for
deviants, mutual assistance pacts between citizens, syndicalism (any non-authoritarian
organizational structure that gives the greatest freedom to workers), iconoclasm (the
destruction of cherished beliefs), libertarianism (a belief in absolute liberty), and plain
old rugged individualism. Anarchism is often referred to as the nineteenth century roots
of terrorism, the term first being introduced in 1840 by Pierre-Joseph Proudhon.
Anarchism defined is the rejection of the state, of any form of coercive government, of
any form of domination and exploitation. It is the notion of free and equal access to all
the world's resources to enable positive freedom (freedom to) in place of negative
freedom (freedom from, or the basis of most constitutional rights).
As a theory, anarchism holds a unique place in history because it was the first
revolutionary movement to come up with systematic ideas about the purpose of
agitation. You'll recognize some of these ideas as terrorist tactics, but it's important
first to understand them in the context of anarchism. Proudhon contributed the idea of
finding the "moment" as in when the moment is ripe for revolutionary action. Another
anarchist, Mikhail Bakunin, popularized the idea of "propaganda by deed" or letting
your actions speak for themselves, which was a theory originally developed by Carlo
Pisacane, an Italian revolutionary who argued that ideas spring from deeds and not the
other way around. Over the years, this notion has evolved into a fairly competent
philosophy of the bomb as part of a propaganda campaign to stimulate awareness and
sympathy with the cause, and in this respect has been noted as a defining feature of
terrorism (Georges-Abeyie & Hass 1982). Bakunin's ideas strongly influenced
anarchism because his concept of propaganda by deed also included a prohibition
against large scale group action (it being better, he thought, for anarchist action to be
individualized or done in small groups). Most anarchists operate on the principle of
leaderless resistance, or acting on your own, with little knowledge or support of the
groups they may belong to. Major anarchist figures, like Karl Heinzen and Johann
Most, contributed the idea that murder, especially murder-suicide, constituted the
highest form of revolutionary struggle. Both advocated the use of weapons of mass
destruction. Other anarchists contributed different ideas, such as Peter Kropotkin's
notion of "propaganda by word" or radicalizing the public by use of subversive
publications. Anarchism (like fascism) has also had some influential female figures, and
Emma Goldman (1869-1940) comes to mind as a early founder of free speech (the
ACLU) and sexual freedom movements. Minor figures in the history of anarchism, like
Charles Gallo, Auguste Vaillante, Emile Henry, and Claudius Konigstein advocated the
idea that to have the most effect, the targets must be innocents (in places such as
crowded dance halls or shopping centers) or symbols of economic success (like banks
and stock exchanges). It may be worth noting, in passing, that the famous Italian
criminologist, Cesare Lombroso, developed his notion of the "born criminal" in part by
being called in to examine the physical features of some minor anarchists who were
really nothing more than criminals justifying their behavior with anarchist talk.
Between 1875 and 1912, anarchists alone or in small groups managed to assassinate or
attempt to assassinate the leaders of nine (9) different countries, including the U.S. (with
President William McKinley in 1901). These crimes were just the most well-known acts
of anarchism, as anarchists were involved in numerous ordinary crimes such as theft,
robbery, murder, kidnapping, assault, and bombing. The most famous incident was the
Haymarket riot in Chicago during 1886. During these peak years for classic anarchism,
May Day celebrations became famous as all-out crime-rampant days. Police
departments around the world became convinced there was an international conspiracy,
and suspicious foreigners were locked up by the hundreds in many countries.
Perfunctory trials were held, and many defendants were hanged or deported. The most
famous of these trials was the 1920 case of Sacco and Vanzetti who were more antiwar
and labor activists than anarchists. Anarchism in the classical sense was largely erased
from the face of the earth by 1917 via a number of factors: the rise of communism and
fascism (both of which are opposed to anarchism), strong xenophobic deportation (Red
Scare) laws in democratic countries, and the fact that classic anarchism never became
an organized movement. Twentieth-century terrorist groups which came later and
claimed an ancestry with anarchism include: the Japanese Red Army, the British Angry
Brigade, the German Baader-Meinhof Gang, the Weatherman in the United States, and
the Mexican Zapatista movement (Kushner 2003). During the Spanish revolution of
1936, something called anarcho-syndicalism developed, which is a loose confederation
of various protest groups (see the Workers Solidarity Alliance website). Those who call
themselves anarchists today (see Purkis & Bowen 1997) are more likely to be
environmentalists or part of the anti-globalization movement who target for attack such
institutions as the World Bank, International Monetary Fund, or World Trade
Organization.
For purpose of balance, it is important to point out that anarchism today does not
support terrorism. It has historically supported terrorism and even today might
support assassination, but there are only weak theoretical links between the two, most
strongly with the propaganda by deed concept. Anarchists hold to a doctrine that
anarchy must be created in the act of self-liberation from oppressive and coercive
relationships. You don't blow up the relationship as terrorists do; instead, you convince
others that grounds for the existing relationship must be blown up. Anarchism is not
about mad bombing or chaos. Terrorists target people; anarchists target things such as
institutions and structures. Bakunin did not want the death of people but the
destruction of things and positions of authority. Only a small minority of terrorists have
ever been anarchists, and only a small minority of anarchists have ever been terrorists.
Fascism is the one form of government with the most disagreement about a definition
for it, which Passmore (2002) attempts to consolidate as an ultranationalist ideology that
is unabashedly racist. The word comes from the Latin "fasces" which means to use
power to scare or impress people. It generally refers to the consolidation of all economic
and political power into some form of super-patriotism that is devoted to genocide or
endless war with one's enemies. Benito Mussolini, who practically invented the term in
1922, said it is the merger of state and corporate power. Adolf Hitler said that it is the
clever and constant application of propaganda so that people can be made to see
paradise as hell, and the other way around. So-called Islamo-Fascism can also be
traced to the same time period as the birth of the Nazi ("national socialist") fascism in
1928 when the Muslim Brotherhood (Al Ikhwan Al Muslimun), parent organization of
numerous terrorist groups, was formed in reaction to the 1924 abolition of the caliphate
by the Turks.
Fascism supports terrorism at home and abroad. Charismatic leaders are usually
given supreme powers to crack down on dissidents, peacemakers, and anyone who
doesn't abide by the "cult of the individual" which worships a He-man mentality and
the party line. With the frequent wars and militaristic ventures that come with fascism,
an effort is made to demonize the enemy as sub-humans who deserve extinction. These
enemies are also made into scapegoats for all the past problems a country has had.
Fascism appeals to the frustrations and resentments of a race of people who think they
ought to have a bigger place at the global table. When combined with an anti-western
slant (the United States as Great Satan), fascism becomes a means of social identity
(Pan-Africanism, Pan-Arabism, Islamo-Fascism) as well as a facilitator of terrorism
against all western interests.
Frustrated fascists who fail to gain control in their own countries have historically
turned to terrorism. They are most likely to turn to domestic terrorism since fascists do
not believe that citizen rights are bestowed merely because someone inhabits a country.
Nor do they believe that all human beings are possessed of equal rights. "Foreign"
families and businesses (as they define them) are usually targeted for extermination by
fascists. The enemies who are seen as the greatest threat are those who fascists see as
corrupting or poisoning family and property relations.
Fascism is full of ironies and contradictions. On the one hand, it is anti-modern in its
glorification of the land, a return to country life, and its fascination with peasant dress
or costume. On the other hand, it is pro-modern in its worship of military technology,
favoritism of big business, mass mobilization of people, promotion of commercialized
sport, and its surprisingly liberal attitude toward the involvement of women in the
movement. Science and scholarship also take on interesting twists under fascism.
"Hard" sciences like biology and chemistry usually advance significantly, especially in
areas such as genetic research. "Soft" sciences like sociology and psychology usually
become usurped into mumbo-jumbo pseudoscientific ideas about a glorified folk culture
and reasons for hating the enemy.
Just as anarchists have their May Day (May 1st) celebrations, fascists also tend to
celebrate anniversaries. Many terrorists, of course, have been known to time their
attacks to coincide with the date for an historical event or the birthday of someone
special to them. For example, with ecoterrorism, that day is October 16, which coincides
the the United Nation's World Food Day, and is usually when McDonald's restaurants
are targeted for vandalism. However, the most important date in the study of terrorism is
April 19. A number of significant events have happened on that date. Right-wing
domestic terrorist groups call it "Militia Day" because it was when the siege at Waco
ended, it was when surveillance began at the Ruby Ridge compound in Idaho, and it
marks the anniversary of the Oklahoma City bombing of the federal building. Neo-Nazi
fascist groups celebrate April 19 because it was the day German Nazis started wiping
out Jewish ghettos across Europe, as well as the following day being Adolf Hitler's
birthday. Internationally, terrorist groups who regard themselves as "freedom
fighters" and trace at least part of this justification to the American Revolution, take
heart in the fact that the American Revolution started on April 19, 1775 at the Battle of
Lexington. It remains to be seen if September 11 will replace April 19 as the most
popular date for terrorism.
Religious terrorism can be quite extreme in its tactics. Not only does it strive to
avenge a long history of persecution and injustice, but it frequently carries out
preemptive attacks. This is because a high level of paranoia is usually maintained about
the actual degree of threat that the enemy trend poses. Rarely are religious terrorists
swayed by secular sources of information about the degree of actual threat, but instead
are driven by doctrinal differences of opinion over interpretation of holy scriptures.
This results in two things: (1) a rather non-selective targeting pattern, lashing out
blindly, often harming innocents; and (2) the creation of numerous offshoot, spin-off, or
fringe groups who believe they are commanded to follow a different mission imperative.
Add to this the fact that most adherents have already long felt like alienated and
marginal members of society, and you've got a recipe for perhaps the most dangerous or
prolific kind of terrorism in the world today.
Most religious terrorist groups can trace their origin to key historical events.
Institutional memory is long, as the example of Irish terrorism points out, and it is not
uncommon for the group to conduct rituals designed to "never forget" some long-ago
grievance. In one sense, this is why religious terrorism is popular, because political
terrorism, like politics, has a much shorter memory. Another variety of religious
terrorism has its roots in millenarianism, where the key event is some doomsday or
apocalyptic date where something was supposed to happen. We know from studies of
UFO cults that such groups are often more dangerous after an event fails to happen
because of cognitive dissonance, which forces a rearrangement of attitudes and beliefs
that are frequently more rigid and fantastic. However, political events also serve as the
catalyst for religious terrorism, and these are usually tied into whatever messianic
traditions the religion has. For example, the rise of al-Ikhwan Muslim militancy can be
traced to a date in 1979 (during the Islamic year 1400) when the return of the prophet
Madhi was anticipated at the Grand Mosque in Mecca. Adherents of the belief stormed
the mosque by force, which happened to coincide with a time for pilgrimage and the
height of the tourist season. The government reacted by forcing the militants out,
cementing forever a date of infamy in which the group became certain that the
homeland needed rescuing from secularization. Religious terrorists also typically have
"mourning periods" or dates such as "anniversary of the martyrs" because these
activities are important ways the group recruits true believers from those who have been
standing on the sidelines. Recruitment generally is followed by a reeducation program
that changes the way a person thinks about good and evil. Anything foreign, secular, or
modern without question becomes evil; and anything supporting an all-out,
uncompromising struggle with the enemy, including the killing of innocents, becomes
good. The only exceptions are when the group has freed up some nonviolent avenues of
experimentation.
In all fairness, it should be said that most militant religious groups only adopt
terrorism as a tactic of last resort. We have not discussed Just War Doctrine here, but
ethics and/or fair play are integral parts of most religions, and there are usually
unwritten rules for when the cosmic struggle (as Juergensmeyer 2001 calls it) spills over
into political struggle. Religious terrorists demonstrate marvelous ingenuity in means,
methods, and timing, but their targeting is flawed, and one can only wonder how
strategically effective is their "symbolic" success from "striking at the heart of the
infidels." Perhaps the whole reason for it is to bolster their reputation among other
religious communities. This would be supported by the fact that some terrorist acts are
scheduled on dates specifically designed to desecrate a competitor's religious holidays
and sacred moments.
The discipline of economics has many concepts that are relevant to an understanding
of terrorism -- supply and demand -- costs and benefits, etc. Fully-developed economic
or econometric models of terrorism are quite rare, however, and often involve such
things as "psychic" costs and benefits (Nyatepe-Coo 2004). More down-to-earth
economic theories can be found in the literature on deterrence. Rational choice theory,
in particular, has found a place in criminology, and holds that people will engage in
crime after weighing the costs and benefits of their actions to arrive at a rational choice
about motivation after perceiving that the chances of gain outweigh any possible
punishment or loss. Criminals must come to believe their actions will be beneficial -- to
themselves, their community, or society -- AND they must come to see that crime pays,
or is at least a risk-free way to better their situation. Perhaps the most well-known
version of this idea in criminology is routine activities theory (Cohen and Felson 1979),
which postulates that three conditions must be present in order for a crime to occur: (1)
suitable targets or victims who put themselves at risk; (2) the absence of capable
guardians or police presence; and (3) motivated offenders or a pool of the unemployed
and alienated. Other rational choice theories exist which delve further into models of
decision making. In the few models of collective violence that have found their way into
criminology, the Olson hypothesis (source unknown) suggests that participants in
revolutionary violence predicate their behavior on a rational cost-benefit calculus to
pursue the best course of action given the social circumstances.
Rational choice theory, in political science, follows a similar line, and holds that
people can be collectively rational, even when making what appears to be irrational
decisions for them as individuals, after perceiving that their participation is important
and their personal contribution to the public good outweighs any concerns they may
have for the "free rider" problem (Muller and Opp 1986). For those unfamiliar with it,
the "free rider" problem is a classic paradox in social science and economics which
asks why anybody should do something for the public good when most likely someone
else will get credit for it and most everybody else will benefit merely by sitting idly and
doing nothing. Perhaps the most eloquent spokesperson for rational choice ideas in the
field of terrorism is Wesleyan professor Martha Crenshaw (1998), whose writings
inform my remarks below.
Let's take, for example, a typical terrorist event that involves hostage-taking and all-
too-frequent hostage-killing. From an individualist rational point of view, the best
choice would be to keep at least some of the hostages alive in order to bargain with the
government for leniency. Yet, often a collectivist rational mentality sets in, and the
group choice (or groupthink) is to kill all the hostages. Is this killing senseless, the
product of deranged minds, or an example of mob behavior? The answer is NO on all
points from a rational choice point of view. It may be a reasonable and calculated
response to circumstances. It may involve a collective judgment about the most efficient
course of action that has the most lasting impact on observers (for social learning
purposes). And most importantly, the senselessness of it all may be just what the group
needs to make their ideological point that they are terrorists, not just ordinary
criminals.
Factors that influence the rational choice of terrorism include place, size, time, and
the climate of international opinion. A terrorist plot in a democratic society is less likely
to involve senseless violence than a scheme hatched under an authoritarian regime
because under the latter, terrorists realize they have nothing to lose with the expected
repercussions. Size is important because a small elite group is more likely to resort to
terrorism when the population is passive. This means that more senseless acts of
violence may occur in a stable society rather than one on the verge of collapse. Time
constraints are important because the terrorist group may be competing with other
groups or attempting to manage a tit-for-tat strategy with counterterrorism. The
climate of international opinion, if low for the problems of the host country, may force
the terrorists to take action that risks a repressive counterterrorist reaction, in hopes
that their suffering will capture public attention. In short, terrorism is an excellent tool
for managing the political agenda on a world stage.
Nassar (2004) has probably written the most interesting piece on globalization theory
as it relates to terrorism, and the ideas are fairly robust precisely because globalization
can be a complex subject at times. Globalization contributes to dreams, fantasies, and
rising expectations, but at the same time, it leads to dashed hopes, broken dreams, and
unfulfilled achievements. Terrorism breeds in the gap between expectations and
achievements. The thinking is very similar to strain theory in criminology or the rising
expectations theory of prison riots, and about the only thing unique about globalization
theory is that it adds a rich-poor dichotomy. Rich people (or nations) are seen as
wanting power and wealth, and poor people (or nations) are seen as wanting justice.
From this perspective, then, rich people are part of the causal factor or root cause of
terrorism, since they contribute to the conditions which give rise to it. Perpetrators of
"terrorism" (always treated as an ill-defined concept in globalization theory) are never
seen as born or raised with any specific predispositions toward it. In brief, globalization
theory holds that if the oppressed and disgruntled poor people of the world were simply
given the chance to find peaceful means for achieving justice, terrorism would not
thrive.
Globalization theory is further tied into ideas about colonialism, imperialism, and
neocolonialism. The first two words are often used interchangeably to describe a set of
conditions (technically, extensions of sovereignty) where the mores, values, and beliefs of
the colonizers are considered superior to those of the colonized. However, when the
assumption is made that (imperial) power is a necessary thing to maintain cultural
superiority, this is the usual meaning of imperialism. Neocolonialism is a concept
developed by Marxists and holders of certain conspiracy theories to refer to allegations
about First World nations, international organizations, and/or multinational
corporations employing economic, financial and trade policies to dominate less powerful
countries. Onwudiwe (2001) is typical of the criminological approach taken when
globalization ideas are incorporated into theories about terrorism, and it is probably
safe to say that the approach remains relatively underdeveloped.
Let's get down to the causal models of sociology rather than worry about
perspectives. Regardless of the name for the theoretical viewpoint, one is likely to
encounter the following, or some variation of them, as causal factors in almost all
etiological, sociology-related thinking (FIVE SOCIOLOGICAL THEORIES OF
TERRORISM):
The relative deprivation hypothesis is the idea that as a person goes about
choosing their values and interests, they compare what they have and don't have, as well
as what they want or don't want, with real or imaginary others. The person then usually
perceives a discrepancy between what is possible for them and what is possible for
others, and reacts to it with anger or an inflamed sense of injustice. Students should be
advised that debates exist within criminology regarding relative deprivation and
terrorism, on the one hand, with the anomie or strain tradition which finds causal
influence in such objectivist factors as Gross Domestic Product, and on the other hand,
with the left realist tradition which finds causal influence in subjective experiences of
deprivation or discomfort.
The negative identity hypothesis is the idea that, for whatever reason, a person
develops a vindictive and covert rejection of the roles and statuses laid out for them by
their family, community, or society. For example, a child raised in a well-to-do family
may secretly sabotage every effort made to hand them the good life on a "silver platter,"
deliberately screwing up in school, at work, and everyplace else until the day comes,
with some apparent life-altering experience (like engaging in terrorism), that the long-
nurtured negative identity comes out, and the subject can then make it feel more like a
total identity transformation. Students should be advised that there are many varieties
of this idea that exist in a number of theories across many fields of study.
The narcissistic rage hypothesis is an umbrella idea for all the numerous things
that can go wrong in child-rearing, such as too much smothering, too little smothering,
ineffective discipline, overly stringent discipline, psychological trauma, coming from a
broken home, etc., that all leads to the same effect of a "What about Me?" reaction in
the child. It is actually a two-way process with the child contributing as much as the
parents and other role models which results in a damaged self-concept, a tendency to
blame others for one's inadequacies, and the well-known "splitting" of self into a "good
me" and "bad me" which often forms the basis for personality disorders involving a
lack of empathy for the suffering of others. Students should be advised that there is not
all that much consensus on the primal importance of narcissism, and that the literature
on child-rearing is full of mixed empirical results.
The moral disengagement hypothesis is the idea that encompasses all the ways a
person neutralizes or removes any inhibitions they have about committing acts of
horrific violence. Some common patterns include imagining one's self as a hero,
portraying one's self as a functionary, minimizing the harm done, dehumanizing the
victim, or insulating one's self in routine activities. Organized crime figures, for
example, usually hide behind family activities with their wives and children. Students
should be advised that in the study of terrorism, there are numerous other ways that
violence is rationalized which go far beyond denigrating one's enemies and beefing one's
self up as a crusader (see Hacker 1996). Terrorist rationalizations usually involve a
complete shift in the way government and civil society is perceived.
Psychological perspectives, with few exceptions (Ross 1996; 1999), are decidedly
clinical in what is often a futile attempt to find something pathological in the terrorist
personality. Merari (1990) provides a good overview of psychological approaches,
but one of the major names in this area is David Long, former assistant director of the
State Department's Office of Counter Terrorism, who has gone on record saying there's
no such thing as a terrorist personality, but then has said they typically suffer from low
self-esteem, are attracted to groups with charismatic leaders, and enjoy risk-taking
(Long 1990). A sampling of psychological factors that have been investigated include:
ineffective parenting or rebellion against one's parents, a pathological need for
absolutism, and a variety of other "syndromes" and hypotheses (see Margolin 1977), but
study after study for the past thirty years has yielded very little valid and reliable
information about the psychology of terrorists other than the following generalizations:
Although what we don't know about the psychology of terrorism is more than what
we do know, there have been several promising attempts to merge or combine
psychology with sociology (and criminal justice) into what might be called terrorist
profiling (Russell and Miller 1977; Bell 1982; Galvin 1983; Strentz 1988; Hudson
1999). This line of inquiry actually has a long history, and includes what rare studies
exist of female terrorists. The earliest study (Russell and Miller 1977) found that the
following people tend to join terrorist organizations:
These data, as well as other known characteristics and attributes about terrorists,
have found their way into databases, some public, some private. One of the most well-
known databases used by researchers is the RAND-St. Andrews University Chronology
of International Terrorism. When suicide bombing became popular, Merari (1990)
conducted rare interviews with terrorists, and found that most suicide terrorists are
between the ages of 16 and 28. Most are male, but 15% are female and that proportion
is rising. Many come from poor backgrounds and have limited education, but some
have university degrees and come from wealthy families.
We'll return again from time to time to this group of theories, and new developments,
because criminology is quite heavily informed by sociology and psychology. What
sociological and psychological approaches basically tell us now is that individuals join
terrorist organizations in order to commit acts of terrorism, and that this process is the
same as when individuals join criminal subcultures in order to commit acts of crime.
There appears to be no unique terrorist personality. Instead, there appear to be unique
subcultural phenomena which develop, support, and enhance a penchant for cold-
blooded, calculated violence which, if not satisfied within a terrorist organization might
be fulfilled elsewhere. Terrorism is a social activity. Individuals join a terrorist group
usually after they have tried other forms of political involvement. The emotional links
between individuals and the strength of commitment to their ideology appear to become
stronger by the group living in the underground and facing adversity in the form of
counterterrorism. Socialization in the underground is quite intense, and Ferracuti
(1982), a criminologist, has documented the "fantasy wars" that go on in the terrorist
underground. An individual's identity may become tied to the group's identity, but it is
just as likely that emotional relationships become as important (if not more) than the
group's purpose. This means that the distribution of beliefs among members in a
terrorist group may be uneven. There may be major differences between individual and
group ideology. Ideology may not necessarily be the main component of motivation.
From profiling terrorists for many years, we know that most of them are action-hungry
practitioners, not theoreticians. This knowledge may provide new counterterrorism
strategies which attempt to change individual beliefs and weaken group cohesion.
Walter Laqueur (1999) offers yet another distinction, between terrorists who are
"fanatics" and those who are "extremists." The standard meaning of these terms is that
fanatics are religious zealots and extremists are political zealots, but Laqueur (1999)
strips away any religious connotation, and says that most terrorists are fanatics. The
concept of fanaticism carries some implications of mental illness, but is not in itself a
diagnostic category. Laqueur (1999) claims that fanaticism is characterized by excessive
cruelty and sadism, but others (Taylor 1994) have pointed out that fanaticism is
characterized by the following:
To this, we might add the concept of Machiavellianism (Oots & Wiegele 1985),
which refers to an extreme form of the psychological trait of manipulativeness.
Terrorists are disposed to not only manipulate their victims, but the audience as well.
Both the timing of a future event and the aftermath of a completed event are
manipulated by terrorists. For example, the counterterrorism reaction by authorities is
manipulated. The press and public are manipulated, with terrorists doing everything
they can to work the media and obtain liberal press coverage. The fact that terrorism is
aimed more at the audience than victim has provided numerous points of conjecture for
researchers. It has been the source of most theoretical models of terrorist contagion,
whereby different terrorist groups compete with one another for media attention, most
theoretical models of copycat behavior, whereby different terrorist groups try to outdo a
previous group with the harm inflicted, and more importantly, the contributions of
biological and physiological researchers.
David Hubbard (1983) was one of the first biological researchers of terrorism, and his
line of work is similar to the familiar cycle of violence hypothesis in criminal justice. In
this view, people who commit repetitive and cyclical acts of violence (which would
include wife beaters, rapists, and serial killers) are driven by hormonal or
neurochemical fluctuations in their body or brain chemistry. Three compounds, in
particular, have been singled out as having abnormal levels among terrorists:
norepinephrine, acetylcholine, and endorphins. Of these, norepinephrine is suspected
as being the most influential, as it is associated with the so-called flight or fight
mechanism in human biology. The theory of "fight or flight" was developed by W. B.
Cannon back in 1929, and refers to a state of arousal under stress in which the heart,
lungs, and muscle operate more efficiently. As it applies to terrorism (and crime), the
behavioral requirements of such activities (fighting exhilaration before an event, and
fleeing manipulation of audience after an event) produce a syndrome of physiological
need for arousal at fairly regular intervals. Motives for terrorism appear to be quite
stable when the biological viewpoint is taken, and it is possible to link a variety of
aspects in the typical terrorist profile with biological factors. For example, xenophobia
may be biological induced since the fear of strangers tends to be discernible even at
infantile stages of development. Other explanations might involve insights from
sociobiology (Wilson 1975) or kin selection theory in evolutionary psychology (Daly &
Wilson 1994). For more information on biological factors as the cause of criminal
behavior, see my lecture on Psychobiology and Crime. For an example of research using
a biological framework to analyze suicidal terrorism, see A Sociobiological View of
Palestinian Suicide Bombers (pdf).
INTERNET RESOURCES
Anarchy Archives Research Center on History and Theory of Anarchism
Anarchy-movement.org
Anarchosyndicalism by Rudolf Rocker
Are Terrorists Psychotic or Psychopathic?
Islamism, Fascism, and Terrorism
Peter Kropotkin's 1910 Encyclopedia Article
Psychological Qualities of Machiavellianism
Religion as Opposition: A Gramscian Model
Review of Latest Books on Terrorism
Talking to Your Kids about Fascism
Terrorism as Fascism's Most Loyal Helpmate in Ending Democracy
Terrorism and Political Violence: A Bibliography
The Anarchist FAQ Webpage
The Emma Goldman Papers
The New Evil of Islamo-Fascism
The Psychology of Terrorism: Mind of a Terrorist
The Sociology and Psychology of Terrorism [HTML Exec. Summary]
Understanding Evil: The Psychology of Terrorism
Who Becomes a Terrorist and Why (pdf)
PRINTED RESOURCES
Arendt, Hannah. (1951). The Origins of Totalitarianism. NY: Harcourt, Brace & Co.
Bell, Bowyer. (1982). "Psychology of Leaders of Terrorist Groups." International
Journal of Group Tensions, 12: 84-104.
Bocock, R. (1986). Hegemony. London: Tavistock.
Borradori, G. (2003). Philosophy in a Time of Terror: Dialogues with Habermas and
Derrida. Chicago: Univ. of Chicago Press.
Burton, Anthony. (1978). Revolutionary Violence: The Theories. NY: Crane, Russak.
Cohan, A.S. (1975). Theories of Revolution. NY: Wiley.
Cohen, Lawrence & Marcus Felson. (1979). "Social Change and Crime Rate Trends: A
Routine Activities Approach." American Sociological Review 44: 588-608.
Crenshaw, Martha. (1981). "The Causes of Terrorism." Comparative Politics 13: 379-99.
Crenshaw, Martha, (ed.) (1995). Terrorism in Context. University Park: Pennsylvania St.
Univ. Press. [sample excerpts]
Crenshaw, Martha. (1998). "The Logic of Terrorism: Terrorist Behavior as a Product of
Strategic Choice," in Walter Reich (ed.) Origins of Terrorism: Psychologies, Ideologies,
Theologies, States of Mind. NY: Woodrow Wilson Center Press.
Daly, M. & Wilson, M. (1994). "The Evolutionary Psychology of Male Violence." Pp.
253-288 in J. Archer (ed.), Male violence. London: Routledge Kegan Paul.
Ferracuti, Franco. (1982). "A Sociopsychiatric Interpretation of Terrorism." P. 129-41
in Annals of American Academy of Political & Social Science, 463: 129-41.
Ferrell, Jeff. (1997). "Against the Law: Anarchist Criminology," In Brian D. MacLean
and Dragan Milovanovic (eds.) Thinking Critically About Crime. Richmond, British
Columbia: Collective Press. [full text]
Ferrell, Jeff. (1999). "Anarchist Criminology and Social Justice," Pp. 91-108 in Bruce
Arrigo (ed.) Social Justice/Criminal Justice. Belmont, CA: Wadsworth.
Frey, B. (2004). Dealing with Terrorism: Stick or Carrot? Northhampton, MA: Edward
Elgar.
Galvin, Deborah. (1983). "The Female Terrorist: A Socio-Psychological Perspective."
Behavioral Science & Law 1: 19-32.
Georges-Abeyie, D. & Hass, L. (1982). "Propaganda By Deed: Defining Terrorism." The
Justice Reporter 2: 1-7.
Gibbs, Jack (1989). "Conceptualizations of Terrorism." American Sociological Review
53(4): 329-40.
Gurr, Ted. (1970). Why Men Rebel. Princeton: Princeton University Press.
Hacker, Frederick. (1996). Crusaders, Criminals, Crazies: Terror and Terrorists in Our
Time. NY: Norton.
Hoffman, Bruce. (1993). Holy Terror. Santa Monica: RAND.
Hubbard, David. (1983). "The Psychodynamics of Terrorism," Pp. 45-53 in Y.
Alexander et. al. (eds.) International Violence. NY: Praeger.
Hudson, Rex. (1999). Who Becomes a Terrorist and Why: The 1999 Government Report
on Profiling Terrorists. Guilford, Ct: Lyons Press.
Juergensmeyer, M. (2001) Terror in the Mind of God: The Global Rise of Religious
Violence. Berkeley: Univ. of California Press. [sample pages]
Kaplan, A. (1981). "The Psychodynamics of Terrorism." Pp. 35-50 in Y. Alexander & J.
Gleason (eds.) Behavioral and Quantitative Perspectives on Terrorism. NY: Pergamon.
Kraemer, E. (2004). "A Philosopher Looks at Terrorism." Pp. 113-131 in Nyatepe-Coo,
A. & Zeisler-Vralsted, D. (eds.) Understanding Terrorism: Threats in an Uncertain World.
Upper Saddle River, NJ: Prentice Hall.
Kushner, Harvey. (2003). Encyclopedia of Terrorism. Thousand Oaks, CA: Sage
Publications.
Laqueur, Walter. (1999) The New Terrorism. NY: Oxford Univ. Press.
Leeman, Richard. (1991). The Rhetoric of Terrorism. NY: Greenwood Press.
Long, David. (1990). The Anatomy of Terrorism. NY: Free Press.
Margolin, J. (1977). "Psychological Perspectives in Terrorism." In Y. Alexander and S.
M. Finger (eds.), Terrorism: Interdisciplinary Perspectives. New York: John Jay Press.
Martic, Milos. (1975). Insurrection: Five Schools of Revolutionary Thought. NY:
Dunellen Publishing.
Marty, Martin & & R. Scott Appleby, eds. (1993). Fundamentalism and the State.
Chicago: Univ. of Chicago Press.
Merari, A. (1990). "The Readiness to Kill and Die: Suicidal Terrorism in the Middle
East." In W. Reich (Ed.), Origins of Terrorism: Psychologies, Ideologies, Theologies and
States of Mind. Cambridge: Cambridge University Press.
Muller, Edward & Karl-Dieter Opp. (1986). "Rational Choice and Rebellious Collective
Action," American Political Science Review 80: 471-87.
Nassar, J. (2004). Globalization and Terrorism. Lanham, MD: Rowman & Littlefield.
Nyatepe-Coo, A. (2004). "Economic Implications of Terrorism," Pp. 77-89 in Nyatepe-
Coo, A. & Zeisler-Vralsted, D. (eds.) Understanding Terrorism: Threats in an Uncertain
World. Upper Saddle River, NJ: Prentice Hall.
O'Connor, T. (1994) "A Neofunctional Model of Crime and Crime Control" Pp. 143-58
in G. Barak (ed.) Varieties of Criminology. Westport, CT: Greenwood Press.
O’Kane. R. (Ed.) (2005). Terrorism, Vol I-II. Northhampton, MA: Edward Elgar.
Oots, K. & Wiegele, T. (1985). "Terrorist and Victim: Psychiatric and Physiological
Approaches," Terrorism: An International Journal 8(1): 1-32.
O'Sullivan, N. (1986) Terrorism, Ideology, and Revolution: The Origins of Modern
Political Violence. Boulder, CO: Westview.
Passmore, K. (2002). Fascism: A Very Short Introduction. NY: Oxford University Press.
Post, J. (1984). "Notes on a Psychodynamic Theory of Terrorist Behavior." Terrorism
7:241-56.
Post, J. (1990). "Terrorist Psycho-Logic: Terrorist Behavior as a Product of
Psychological Forces," Pp. 25-40 in W. Reich (ed.) Origins of Terrorism: Psychologies,
Ideologies, Theologies, States of Mind. Cambridge: Cambridge Univ. Press.
Purkis, J. & Bowen, J. eds. (1997) Twenty-First Century Anarchism. London: Cassell.
Ranstorp, Magnus. (1996). "Terrorism in the Name of Religion," Pp. 121-36 in Russell
Howard & Reid Sawyer (eds.) Terrorism and Counterterrorism. Guilford, CT: McGraw-
Hill.
Rapoport, David & Yonah Alexander, eds. (1982). The Morality of Terrorism: Religious
and Secular Justifications. NY: Pergamon Press.
Rapoport, David. (1984). "Fear and Trembling: Terrorism in Three Religious
Traditions." American Political Science Review 78(3): 668-72.
Ross, Jeffrey Ian. (1996). "A Model of the Psychological Causes of Oppositional Political
Terrorism" Peace and Conflict: Journal of Peace Psychology 2-11.
Ross, Jeffrey Ian. (1999). "Beyond the Conceptualization of Terrorism: A Psychological-
Structural Model" in C. Summers & E. Mardusen (eds.) Collective Violence. NY: Rowen
& Littlefield.
Onwudiwe, I. (2001). The Globalization of Terrorism. Andershort: Ashgate Press.
Ruby, Charles. (2002). "Are Terrorists Mentally Deranged?" Analyses of Social Issues
and Public Policy 2(1): 15-26.
Russell, Charles & Bowman Miller. (1977). "Profile of a Terrorist." Terrorism: An
International Journal 1(1): 17-34.
Simonsen, C. & Spindlove, J. (2007). Terrorism Today: The Past, The Players, The
Future, 3e. NJ: Prentice Hall.
Smith, B. (1994). Pipe Bombs and Pipe Dreams: Terrorism in America. Albany: SUNY
Press.
Smith, B. & Damphousse, K. (1998). “Terrorism, Politics, and Punishment: A Test of
Structural Contextual Theory and the Liberation Hypothesis.” Criminology 36(1):67-92.
Smith, B., Damphousse, K., Jackson, F. & Karlson, A. (2002). “The Prosecution and
Punishment of International Terrorists in Federal Court: 1980-1999.” Criminology and
Public Policy 1(3):311-338.
Snowden, L. & Whitsel, B. (Eds.) (2005). Terrorism: Research, Readings, and Realities.
NJ: Prentice Hall.
Stitt, B. Grant. (2003). "The Understanding of Evil: A Joint Quest for Criminology and
Theology." Pp. 203-218 in R. Chairs & B. Chilton (eds.) Star Trek Visions of Law &
Justice. Dallas: Adios Press.
Stern, Jessica. (1999). The Ultimate Terrorists. Cambridge: Harvard University Press.
Strentz, Thomas. (1988). "A Terrorist Psychological Profile," Law Enforcement Bulletin
57: 11-18.
Taylor, Maxwell. (1988). The Terrorist. London: Brassey's.
Tifft, Larry. (1979). "The Coming Redefinition of Crime: An Anarchist Perspective."
Social Problems 26: 392-402.
Wardlaw, Grant. (1989). Political Terrorism: Theory, Tactics, and Counter-Measures.
Cambridge Univ. Press.
White, Jonathan. (2006). Terrorism and Homeland Security. Belmont, CA: Wadsworth.
Wilson, E. (1975). Sociobiology: The New Synthesis. Cambridge: Harvard Univ. Press.
Young, Jock. (1999). The Exclusive Society. Thousand Oaks, CA: Sage. [sample articles
by author]
DIPLOMACY AS COUNTERTERRORISM
Diplomacy is the most frequently used and most successfully used form of
counterterrorism. Numerous misconceptions exist about it. What diplomacy is NOT
may be easier to describe, and things such as foreign policy and international law are
definitely things involving other continuums. These areas might be called the
"legislative" branch of diplomacy (Nicolson 1964), but policy and law are things best left
to a President, his or her Cabinet, a Legislature, and a Judicial Branch. Instead,
diplomacy is mostly "executive" in the sense that a seasoned team of professionals
(called the Foreign Service or Diplomatic Service) are used who are dedicated to the
practice of diplomacy and nothing else. Diplomacy is also NOT about negotiation, guile,
or trickery, which might be expressed in such commonplace definitions as "the art of
persuading others to do things that serve mutual interests." This is a bad definition of
diplomacy, and in fact, the practice of diplomacy is often all about fixing the problems
that nations get into by trying to deceive one another. A true and correct definition of
diplomacy requires an understanding of its history, a topic to which we now turn.
Historically, diplomacy began in prehistoric times. When the first tribe of cavemen
realized that it might be better to listen to what the messenger from another tribe had to
say before killing and eating them, diplomacy was born. The concepts of messenger,
emissary, ambassador, envoy, herald, and to some extent, angel, are all concepts similar
in meaning to diplomat. The idea that there is a time and place for persons who are
"off-limits" or under a "white flag" from harm is the idea of diplomacy. You might
begin to see the potential of diplomacy for counterterrorism at this point. The social
taboo against killing well-meaning foreigners on state business is one of the world's
oldest taboos. The ancient Greeks called such visitors "heralds" and throughout the
centuries, the profession of herald (like one's heraldry or coat of arms) ran in families.
The Romans are generally credited with creating "archivists" (specialists in diplomatic
precedents and procedures) and so-called "secret" diplomacy, but the Italian states
during the fifteenth century created public positions known as "ambassadors". The
word diplomat comes from the Greek word "diploun" meaning "to fold" which refers
to the stamped metal plates early diplomats used to carry. These metal plates consisted
of passes to come and go across international borders, and were called "diplomas"
which eventually became associated with documents of academic achievement. As the
years went on, the Vatican and England helped spread the practice of housing
permanent missions (embassies or consulates) overseas. By 1815 at the Congress of
Vienna, every nation officially approved and sanctioned a global diplomacy system, with
diplomats recognized as a true profession, distinct from the job of statesman or
politician. Diplomacy is today thought of as a regularized system of establishing channels
of communication and avenues of cooperation between inter-state actors. The standard
definition is "the application of intelligence and tact to the conduct of official relations
between governments and independent actors" (Satow 1905).
Diplomatic language contains certain phrases, which over the course of centuries,
have become part of a common international vocabulary. For example, if a diplomat
says his or her country "cannot remain indifferent," that almost certainly means that
his or her country will be intervening soon in the affairs of another country. When a
diplomat says that matters are of "grave concern," that almost always means a hard line
is being taken. When a diplomat says that something will be interpreted as an
"unfriendly act," that almost certainly implies a threat of war. When diplomats are
dispatched to settle a conflict or controversy, it is not the same as sending negotiators.
The role of a negotiator is to distract the enemy while you are doing other things, like
preparing to attack them. With negotiation, there is usually compromise; someone wins,
someone loses, or at least both parties never get all they want. The role of a diplomat is
to resolve a situation to the ultimate triumph for all; everyone usually wins, and the
region is ideally transformed by peace. Diplomats carry letters of credentials and full
powers signed by a President or Secretary of State to act on behalf of a sovereignty.
Let's take a look at some of the tools of diplomacy:
• Accession -- this is a clause in existing treaties by which parties who did not sign
off on it can do so later
• Accord -- this is a document signed by both parties which is not of sufficient
importance to justify calling it a treaty.
• Ad referendum -- this is when a diplomat agrees to something but requires his or
her government to approve it later
• Agreement -- this is a document signed by both parties to formalize what they
have sounded out with one another prior to a meeting
• Compact -- this is a short-term agreement to continue talking and outlines the
course of procedure to follow
• Conference -- this is the name for a meeting of diplomats between all interested
parties and is called a congress or convention when heads of state are present
• Declaration -- this is doctrinal statement of rights or policies to be shared
between nations before the diplomats arrive
• Memoire -- a memorandum or note passed by diplomats to one another which
are expected to get back to their sovereigns secretly
• Note -- the ordinary means of communication by diplomats expressing their
thoughts on matters
• Protocol -- a record of the less formal means of procedure by which agreement
may be reached
• Treaty -- a bilateral or multilateral document that concludes diplomatic action
between parties
• Voeux -- these are wishes or recommendations for future good conduct that have
no binding force on signatories
The most common uses of diplomacy in counterterrorism include: developing
bilateral or multilateral anti-terrorist policies; arranging for the sharing of intelligence;
arranging permission for law enforcement authorities from one country to come in and
arrest (or interrogate) a suspected terrorist in another country; and establishment of
appropriate sanctions on sponsors of terrorism. In some cases, diplomatic overtures are
made to the terrorists and their groups themselves, even though they are sub-national
actors. Some famous cases where diplomacy worked in the terrorist context include:
ending the OPEC hostage crisis at Vienna in 1975; arranging a prisoner exchange with
Lebanese hijackers in 1985; catching Carlos the Jackal in 1994; getting the IRA to agree
to a laying down of arms in 1998; and numerous cease-fire agreements between Israelis
and Palestinians from 2001-2003. Diplomacy also played a part in social reform
movements when Spain changed how it was dealing with the Basque rebellion during
the 1980s, and when Peru changed how it was dealing with the Shining Path in the
1990s. Diplomacy has positive results, indeed, when it can do things like get terrorists
to apologize and change their ways, and also get governments which have fought
terrorism repressively become better democracies that respect civil liberties.
NEGOTIATION AS COUNTERTERRORISM
Diplomacy can also have horribly negative results. Conventional wisdom holds that
it is never good to negotiate with terrorists or to concede to their demands, at least while
they are still engaging in violence. In fact, the U.S. and many of its allies are formally
committed to a policy of "no negotiation" with terrorists. However, it is often the case
that this policy is not followed. It exists as hard-line rhetoric more than reality. The
truth is that history shows democracies are more willing to negotiate and compromise
with terrorism than not. When such efforts go wrong, they encourage the terrorists to
repeat their acts and become more violent later on. They also embarrass a nation and
result in lost credibility for many years. When such efforts go partially right, and that is
all they can be - partially effective, the best that can happen is the incident goes away,
and there is some closure, for awhile, on the world stage regarding the attention given.
INTELLIGENCE AS COUNTERTERRORISM
Good intelligence is the best weapon against terrorism, but it should be all-source
intelligence, and the kind, which is good for almost all kinds of intelligence -- the value-
added kind which separates out the signals from the noise, such as what is sometimes
called Indications & Warnings (I&W) in the intelligence community. Indicators will be
discussed in a moment, but "all source" requires some clarification at this point. This
means that all the different platforms (technical and human) of intelligence collection
should be used, along with open source platforms like the Internet. It is best when all
the collection assets converge or cover at least one of the indicators an analyst is trying
to assess (another meaning of "all source"). From the human asset (espionage) aspect,
this involves sometimes dealing with "bad apples," and from the open-source
perspective, this involves mining the Internet for what it's worth. For analysis, while
reactive (after the fact) investigation may prove useful for some purposes, it's generally
considered that with crimes like terrorism, a proactive (before the fact) strategy is best,
and a proactive one which accounts for all sorts of strange and unusual contingencies.
For example, sometimes sensitivity training may be needed along with proactive efforts,
especially when the intelligence resource being used is a community within the U.S.
where a significant number of immigrants live. Such communities can be an invaluable
resource, but there should be friendly and open relationships between law enforcement
and such areas. For example, an organization called PfP (the Partnering for Prevention
and Community Safety Initiative) has piloted some techniques for getting the Arab,
Muslim, and Sikh communities in Southeastern Michigan, Southern California, and
Greater Boston to work cooperatively with local law enforcement. Such "networking"
as it would be called in the language of community policing should be fine-tuned to an
effective level.
A proactive mode of inquiry will also take advantage of the fact that many terrorists
have quite predictable social and psychological motivations. Their "profiling" is
somewhat easy to do. In many ways, terrorists behave like common criminals, but they
just take politics or religion very seriously. Also, because nonstate or modern terrorists
usually have no legitimate sovereignty structure, like a nation-state or official
organization, the role of group support and reference groups in the system become
extremely important. Strategic thinking toward elimination of terrorism as a "tactic"
not an enemy is still evolving (Pena 2006), but traditional techniques have some value
too. Indicator collection and efforts toward "profiling" should strive toward including
all the following in intelligence gathering and interpretation:
"Indicators" refer to those collectable things which would have to happen and those
that would likely happen as a scenario unfolds (Khalsa 2004). Indicators are usually
thought of as factors of risk. The three (3) primary factors of risk regarding terrorism
are: adversary capability, adversary intentions, and target vulnerability. There is some
debate within intelligence circles as to whether the third one is necessary, and some
people define "terrorism threat assessment" (as opposed to terrorism risk assessment)
as only involving the first two. The third is controversial precisely because it sometimes
involves collecting vulnerability information on an ally or friendly force. The following
table lists some of these indicators, but it must be borne in mind that the analyst must
strive toward including others that are also important in intelligence interpretation:
Terrorism Indicators
Capability Indicators:
Lethal Agents: Delivery Methods:
1. Biological 1. Ground based
2. Nuclear or radiological 2. Water vessel/scuba
3. Chemical 3. Aircraft
4. Conventional bombing/explosion 4. Missile
5. Hijacking 5. Suicide/Human host
6. Hostage taking/kidnapping 6. Mail/Postal service
7. Assassination 7. Food/Beverage/Water supply
8. Firearms 8. Gaseous
10. Knives/blades
11. Computers
Intention Indicators:
1. Weapons/material movement Vulnerability Indicators:
2. Terrorist travel 1. Current security posture
3. Terrorist training 2. Number of people in target area
4. Anti-indicators 3. Significance of target
5. Significant events and dates 4. Specific facility vulnerabilities
6. Propaganda levels 5. Ability to deter or disrupt
7. Surveillance of targets 6. Level of cooperation with U.S.
8. Tests of security 7. Significant events and dates
9. Other
3. Personnel Data -- List of leaders (and changes in leadership), list of members (and
former members), any personnel connections between its members and other groups of
similar ideology, and the skills of all group members (weapons expertise, electronics
expertise, etc.) (Knowing the skills of the group is an important part of threat assessment)
If the philosophy revolves around one leader, it's important to know what will occur if
something happens to that leader. Often, the analysis of family background is useful to
determine how radically a leader or member was raised. Group structure, particularly
if the organization pattern is cellular, determines who knows whom.
Some would say that moral superiority is how to win the war on terrorism
(Netanyahu 1986), and indeed, Prof. Chris Harmon (in How al-Qaeda May End)
suggests this also. Most terrorist groups do come to an end, and even a doctrine can be
defeated. Winning a war on terrorism requires that there be a moral conviction in the
justice of the fight. A terror war must give expression to the morality involved, and
fight as if it were a war of ideas. Terrorism, in may ways, is an attack on national will.
Terrorists often count on the fact that their targets are "soft and weak" and will not be
able to sustain a coordinated grand strategy. Terrorists know that their targets will
critique themselves, and debate among themselves. They know their targets will argue
among themselves about the morality of counterterrorism, and in fact, they are often
counting on this kind of moral skepticism to develop before they attack again.
So-called "sponsors" of terrorism distance themselves from the operations they have
supported, but are usually recognizable by a patterned similarity in how they engage in
acts of violence both within their own countries as well as internationally. Usually the
sponsor or patron is a duly elected government official or a Cabinet appointee, and in
other cases, it is a military or business leader. Sometimes, the terrorist group is a
"puppet" organization for those officials, promoting that nation's interests or ideology
overseas. At other times, the sponsor has little to no control over the terrorists, having
become a supporter through double-cross or blackmail. Sponsorship generally involves
political support, financial support, weapons, training, sanctuary, and safe havens. In
many cases, the terrorists have access to diplomatic facilities and the intelligence
services of their host country. State sponsors often launch "proxy" wars using terrorism
or insurgency.
IRAN -- The Iranian government regularly carries out assassination against its main
opposition party, the Kurdish Democrats, and exiles abroad. They regularly set off
bombs around the Middle East and Asia (Turkey is a prime target). The groups that
they sponsor, and who take the credit for the attacks, are numerous, but mostly involve
Lebanese Hizballah, Hamas, or the PIJ. Iran does not try to conceal its ties with
Palestinian organizations, and pretty much provides safe haven to any group that
refuses to recognize Israel's right to existence.
CUBA -- Castro's regime in the past has provided funding, military training, arms, and
guidance to revolutionary groups around the world. Today, with the exception of
support to such Latin American groups like the FARC and ELN, Cuba mostly provides
safe haven and retirement packages to ex-terrorists.
IRAQ -- The Iraqi government (prior to U.S. invasion) plotted assassination attempts
against U.S. leaders, but their more successful operations involved bombing or rocket
attacks on U.N. installations or offices. In the past, Iraq has provided bases, weapons,
and protection to various Arab terrorist groups, especially those, like al-Qaeda, who
support dreams of Islamo-fascism.
LIBYA -- The government in Libya refuses to abide by U.N. resolutions and has been
implicated in numerous bombings around the world, involving aircraft, restaurants, and
discotheques. Several Arab terrorist groups, like the Abu Nidal Organization,
maintained their headquarters in Libya and proudly hanged their signs above the
doorway.
NORTH KOREA -- The North Korea government regularly sponsors raids on offices
and installations in South Korea. Assassination attempts against South Korean
government officials are common. The groups they sponsor are from all over the world,
Lebanon, Uganda, and Myanmar. Although VIP assassination training appears to be
their main method of support, North Korea has also been involved in aircraft and office
bombing. Their economy is in the gutter, and the only "cash crop" they have is nuclear
missile technology.
SUDAN -- The government in Sudan refuses to abide by U.N. resolutions and harbors
some of the world's most violent terrorist groups, mostly radical Islamic groups. The
country serves as a prime base camp for Egyptian terrorists, and has some geostrategic
value to Islamic fundamentalists who see Sudan as a bridgehead for the penetration of
religious ideology into Africa.
CONTROVERSIES IN COUNTERTERRORISM
POINT #2: The other thing about terrorism (or at least quasi-terrorism and the more
lunatic fanatics) is that they are imitators, not innovators. That is, their crimes are
copycat or cyclical. The skyjacking phenomenon of the 70s was an excellent example of
this, where terrorists always waited until some other group made the first move, and
then they "jumped on the bandwagon." Most of the them do this because they are
sorely trying to imitate military strategy; others do it because of standardized
paramilitary training or textbook lessons in guerilla tactics; and still others do it to
throw off suspicion from themselves. Anyway, the cyclic pattern is quite predictable,
and in general, conforms to a Wave-Crest-Plateau pattern.
POINT #3: Although it's inevitable that the first few hostages may die, a thing called
the Stockholm Syndrome works in the favor of anti-terrorist forces. The longer the
hostages stay alive, the less likelihood harm will come to the hostages. With this
syndrome, the hostages come to think of their captors as protecting them from the police
and soon start to identify with their captors. The captors themselves start to develop a
parent/child relationship with their hostages. Other syndromes include the Penelope
Syndrome, where women find violent criminals sexually attractive. Hostage negotiation
and rescue are perhaps the most complicated type of anti-terrorist operation.
POINT #4: In assessing the threat of terrorism (in lieu of information on group skills
and capabilities), it's important to concentrate on counting the number of incidents. Do
not count the number of victims, nor the value of harm. It's hard to do this especially after
some extraordinary incident in which many people have died, but the only true
comparison is the number of attacks since terrorists often have no idea themselves about
how many victims will be killed by their actions. Nationalist groups tend to seek a high
number of fatalities while revolutionary groups tend to seek fewer deaths and more
wounds or injuries. Splinter or spin-off groups seem more interested in death counts
and fatalities. The point is that no matter how many victims are targeted, the group is
only a threat via its number of attacks as a percent of total activity.
POINT #5: Do count the number of victims saved by any preventive action. If you
manage through some leverage to get the terrorist leader to stop things with a cease-fire
agreement, regardless of whether further negotiation follows or not, it will significantly
help your agency and your career if you have calculated how many lives you've saved,
and can report this information to policymakers. Everyone in a leadership position wins
by a cease-fire. The terrorist leader looks good; your leaders look good; and if the
experts that say terrorist leaders have low self-esteem are right, it should be an easy job
to feed their egos and get leverage on them through negotiation. After the cease-fire, it's
important to also measure the resumed level of violence and compare it to pre-cease-fire
levels. Does the violence resume at a higher or lower level? It may be that your short-
term (e.g., 30-day) truce resulted in a 16% short-term reduction in violence (e.g., 6
months), but in the long-run, you've instigated a more heinous pattern of violence.
POINT #6: Giving into terrorist demands for political change only changes the pattern
of violence, not the violence itself. Economic and political reforms aimed at helping the
group's ethnic or religious group and resolving its grievances will win over some
supporters among the general population, but in the long-run, will create new problems
and a new set of grievances over the precise implementation of policy and the degree of
power sharing. A much better strategy is to initiate economic and political reforms for
all the people of a nation. Economic development solutions have worked in Ireland,
Uruguay, and Italy.
POINT #7: The thing that works best is reduction of recruits, supplies, and support.
You've got to reduce the number of active trainee members of the terrorist
organization. Capture and imprisonment works (it's helped to keep Spain fairly
terrorism-free), as well as preemptive strikes against training camps. The number of
terrorists captured or killed should be counted, and this can be put as the denominator
in a fraction with the number of government security forces killed in the numerator.
You've also got to keep weapons, ammo, and supplies out of the hands of terrorists.
Destruction of their "stash" houses is the best preemptive strategy. Unfortunately, many
religious terrorist groups operate under the cover of religion and it doesn't look good to
blow up religious buildings. Whenever a dragnet or raid takes place, the number of
weapons found should be counted. Finally, cutting off support should be done with
precision and not indiscriminately. Too often, governments are willing to engage in
"collective punishments" against all (suspected) aliens, all unfriendly foreign powers,
and even its own citizens, in what are all only symbolic efforts with no discernable short-
term or long-term effect. A more precise focus would go beyond identifying support
countries by name, and identify support by type, amount, seasonality, and
displacement. The latter two mean that cutting off support at certain times of the year
will have more effect than a random cutoff, and that cutting off two or more sources of
support will be effective since groups may simple displace or find new sources of support
once old ones dry up.
POINT #8: Things that don't work, or have questionable value, include the notion that
swift and harsh retaliation is the best policy. This is a popular notion, but the degree of
moral certainty and justification empowering terrorism does not respond to displays of
overwhelming force or "lines drawn in the sand." The standard doctrines of deterrence
as punishment (that punishment be swift, certain, and severe) don't apply to terrorism.
Justice has a longer timeline in this context. If you're going to play the retaliation game
right, wait until things have cooled off and hit them when they least expect it.
POINT #9: Terrorism doesn't respond to coalition-based sanctions which are intended
to express the international community's disregard for them. Terrorists are people who
have long ago felt rejected by mainstream society. In fact, their desire is often to be
further rejected. If they are broken up from receiving any psychological rewards or
sympathy from their social support groups, this strategy might work. Terrorists long
ago crossed the line of ethical and moral restraint. Rebuilding this in all the diverse
places of the world is going to take some time.
COUNTERTERRORISM ANALYSIS
Let's look at five (5) terrorist groups and how we would analyze them:
RED
EOKA TUPAMAROS IRA ETA
BRIGAGE
(Cyprus) (Uruguay) (Ireland) (Basque)
(Italy)
Type Nationalist Revolutionary Nationalist Revolutionary
Nationalist
& Greek/Turkey Urban student 2nd class Economic
Unique language
History separation radicalism treatment change
Union with Socialist United Societal
Aim Own Nation
Greece economy Ireland betterment
Courier Students 1st tried Shadow
Pyramidal
Organ- system, organized sugar military government,
paired cells
ization led by Greek workers into battalions, central
called brigades
Army colonel cells then cells committee
Strength 5 per group, 2 per cell, 5 per cell, 700 members 800 actives,
275 members 3000 members 2000 8000
members underground
Bombing, Protests, Kidnapping,
Sabotage, Demonstrations,
Attacks Riots, Clashes, Robbery,
Demonstrations Assassinations
Executions Executions Extortion
Avg. age 27,
Avg. age
Avg. age 23, Students and Avg. age 25, Radicalized
Social 21, married
working class sympathizers middle class students,
with kids
criminals
1/3 Mass Many
Mass support, Relatives
Ideological neo- support, some sympathizers,
Support Church and and friends
Marxist support ideological Ideological
Greek support abroad
Marxist support Maoist support
France,
Russia, Cuba, Czech
External U.S., Russia, Republic,
Greece Cuba
Aid PLO, Libya, links to Sicilian
others links to IRA, Mafia
PLO
BRIEF ANALYSIS: First of all, the groups with a cell structure are most likely to
thwart human intelligence since the purpose of the cell structure is prevent any one
member from knowing who his or her immediate leaders are. Such groups would be
difficult to infiltrate or penetrate. This may or may not be true with the IRA which
mixes family with business (married with children), depending upon the levels of
fidelity. ELINT (Electronic Intelligence) may therefore be the best approach for such
groups.
The groups with military, paramilitary, and shadow government organization might
be easier to infiltrate or penetrate with HUMINT (Human Intelligence). Size is a major
consideration. Undercover law enforcement operations tend to work well with smaller
terrorist groups. Larger groups that are capable of launching a sustained terrorist
campaign will require more than a law enforcement operation.
ECONOMIC-BASED COUNTERTERRORISM
Under Executive Order 13224, the U.S. Treasury Dept. periodically identifies certain
entities as terrorism financing organizations (financiers), and under U.N. Security
Council Resolution 1390, all member states must block the assets of such organizations.
Terrorist financiers often look like humanitarian aid organizations, an example being
Benevolence International Foundation (BIF), an al-Qa'ida front operating out of Illinois
since 1992. Attacking terrorism on economic fronts, whether via blocking or freezing of
assets, requires extensive knowledge of organizational structure. Certain organizational
principles are endemic to all terrorist groups. Organizations employ varieties of
command and control structures, but they are frequently organized along the same
pattern no matter what causes they endorse.
According to Fraser & Fulton (1984), the hierarchical structure of terrorist groups is
divided into four levels. The smallest group is at the top and is responsible for command.
As in military circles, leadership makes policy and plans while providing general
direction. Other researchers have often pointed out that the command structure is not as
effective as in legitimate organizations because of the demand for secrecy. The command
structure in a terrorist organization is not free to communicate openly with its
membership; therefore, it cannot exercise day-to-day operational control.
The second level in Fraser’s hierarchy contains the active cadre. The active cadre is
responsible for carrying out the mission of the terrorist organization. Depending on the
organization’s size, each terrorist in the cadre may have one or more specialties. Other
terrorists support each specialty, but the active cadre is the striking arm of the terrorist
group. After the command structure, the cadre of active terrorists is the smallest
organization in most terrorist structures.
Under the active cadre is the second largest and the most important level of a terrorist
organization. Active supporters are critical to terrorist campaigns. Any group can carry
out a bombing or kidnapping, but to maintain a campaign of bombings and kidnappings
takes support. Active supporters keep the terrorists in the field. They maintain
communication channels, provide safe houses, gather intelligence, and ensure all other
logistical needs are met. This is the largest internal group in the organization.
The last and largest category is the organization’s passive supporters. This group is
extremely difficult to identify and characterize because supporters do not readily join
terrorist groups. Many times they are used without their knowledge; they simply
represent a favorable element of the political climate. When a terrorist group can
muster political support, it will have a relatively large number of passive supporters.
When its cause alienates the mainstream, passive support dwindles. Passive support
complements active support.
Most terrorist groups number fewer than 50 people and are incapable of mounting a
long-term campaign. Under the command of only a few people, the group is divided
according to specific tasks. Intelligence sections are responsible for assessing targets and
planning operations. Support sections provide the means necessary to carry out the
assault, and the tactical units are responsible for the actual terrorist action.
Terrorist organizations have two primary types of subunits: the cell and the column.
The cell is the most basic type. Composed of four to six people, the cell usually has a
specialty; it may be a tactical unit or an intelligence section. In some organizations, the
duties of tactical cells vary with the assignment. Other cells are designed to support the
operations.
MILITARY-BASED COUNTERTERRORISM
Military special operations are generally used when little is known about the precise
details of a terrorist organization. It must be remembered that intelligence gathering
and counterterrorism is normally a police responsibility. The reason for this is that even
though police agencies share information with spy agencies, it is the police who must
testify at trial, not spies. Collaboration between police and spy agencies is essential in
military-based counterterrorism.
While the most effective counterterrorist activities involve preemptive strikes at their
bases of support, the most commonly used methods involve retaliation and/or hostage
rescue. Many nations maintain specialized counterterrorism units, and these units have
a long history, going back as far as the Roman Empire with Jewish extremists. Israel
has, in fact, been at the forefront of counterterrorism policy. Israel's Golda Meier
formed the first modern counterterrorist agency (the Sayeret Mat'Kal) to hunt down
and kill terrorists, abiding by what became the world's rules on retaliation:
Probably the most effective counterterrorist agency in the world is the British SAS
(Special Air Service). They developed the stun grenade and various other noise-flash
devices commonly found today. They also developed night vision goggles and special
ladders for assaults. Members of this elite unit are anonymous. They have been used
against the IRA and throughout Europe. Many countries around the world receive SAS
support or training in forming their own counterterrorist agencies. Spain also operates
a little-known anti-terrorist group, the GEO (Grupo Especial de Operaciones), which
specializes in "shoot to kill" and hostage rescue operations like the SAS. The Sultan of
Oman maintains a special force (SSF - Sultan of Oman Special Forces) that is constantly
on fifteen-minute standby in case of terrorist activity against Omani interests in the
Persian Gulf. France operates a special police unit (GIGN - Groupment d'intervention
de la Gendarmerie Nationale) trained in counterpropaganda and psychological
warfare. The Netherlands and Norway have special marine corps units which protect
those nations' economic interests at home and overseas. Germany's GSG9
(Grenzschutzgruppe 9) is an elite force of well-equipped volunteers capable of infinite
stealth and overwhelming firepower.
The United States has a system of FBI special units who work with local police SWAT
teams and the CIA providing intelligence. Delta Force is perhaps the most well known
U.S. counterterrorist unit. However, Seal Team Six is the Navy's equivalent. ATF also
maintains a special unit. First responder units throughout the U.S. are trained in
terrorist scenarios. Local police departments are trained in close quarter combat
situations. America's newest agency is the FAST (First Fleet Antiterrorist Special
Team).
GLOBAL RESPONSE TO TERRORISM
Since terrorism is not restricted to any one jurisdiction, it mandates a global response.
Repercussions are felt everywhere, and at some point, counterterrorism must require
more than the ability of one state to combat terrorism. Extradition and deportation
schemes have been the traditional global counterterrorism tools. Extradition is the
surrender by one state to another of an individual accused or convicted of an offense
outside its own territory and within the territorial jurisdiction of the other, which, being
competent to try and punish him, demands the surrender. Political offenses, however,
are normally exempt from extradition, and death penalty concerns are an additional
complication. Deportation procedures, likewise, rely upon cooperation, and usually
create problems for whatever country the terrorist is deported to. Deportation is often
used in the United States whenever a defendant is not allowed to view classified material
against them. Aliens convicted of serious crimes are regularly deported.
The G-8 countries (which include Canada, the United States, Britain, Germany,
France, Italy, Japan, and Russia) have long made counterterrorism an agenda item at
their summits (see G-8 Centre). Most of their proposals rest on using Interpol as a
formal association of police agencies everywhere, or more recently Europol, the
embryonic Europe-wide police agency. Other recommendations involve military
installations, municipal operations, defense contractors, and the private sector. Most
well-known, however, is the call for a permanent International Criminal Court (ICC),
an idea spawned in 1993 by a U.N. committee and ratified by the Rome Statute in 1998
and taking effect in 2002 (see ICC website). As an entity created by the U.N. treaty
process, the ICC's jurisdiction would be any international crime like war crime,
genocide, unprovoked aggression, crimes against humanity, and (theoretically)
terrorism. States consent to participate on a case-by-case basis. The forum is supposed
to be neutral and 18 judges are elected for nine-year terms. The court may sentence
convicted offenders to incarceration for terms of up to 30 years or, in cases of extreme
gravity, life imprisonment The following is an in-depth look at the ICC and terrorism:
INTERNET RESOURCES
American Diplomacy
Counter-Terrorism Resources for Law Enforcement
DiploFoundation (www.diplomacy.edu)
ERRI Terrorism Archive
How al-Qaeda May End
IACSP Association
International Policy Center on Terrorism
A Global Phenomena Mandating a Unified International Response
Legal Considerations on Terrorists as Combatants and POWs
Terrorism Research Center
U.S. State Dept. Office of Counterterrorism
Yahoo Full Coverage on Terrorism
PRINTED RESOURCES:
Alexander, Y. & M. Swetnam (2001) Osama Bin Laden's Al-Qaida: Profile of a Terrorist
Network. NY: Transnational Publishers.
Alexander, Y. (Ed.) (2006). Counterterrorism Strategies. Dulles, VA: Potomac Books.
Barash, David. (1991). Introduction to Peace Studies, 1e. Belmont, CA: Wadsworth.
Berridge, G. (2002). Diplomacy: Theory and Practice, 2e. NY: Macmillan. [sample pages]
Bolz, F., Dudonis, K. & Schulz, D. (2005). The Counterterrorism Handbook, 3e. Boca
Raton: CRC Press.
Brophy-Baermann, B. & J. Conybeare (1994) Retaliating against Terrorism, American
Journal of Political Science 38:196-210
Combs, C. (1997) Terrorism in the 21st Century. NJ: Prentice Hall.
Crelinsten, R. et al. (1978) Terrorism and Criminal Justice. Lexington: Lexington Books.
Day, E. & Reilly, T. (2005). "The International Criminal Court." Journal of CJ
Education 16(2): 359-378.
Dyson, W. (2001) Terrorism: An Investigator's Handbook. Cincinnati: Anderson.
Elliott, J. & L. Gibson (Eds.) (1978) Contemporary Terrorism: Selected Readings.
Gaithersburg: IACP.
Eppright, C. (1997) Counterterrorism’ and Conventional Military Force: The
Relationship between Political Effect and Utility, Studies in Conflict and Terrorism
20(4):333-344.
Fraser, J. & I. Fulton (1984), Terrorism Counteraction, FC–100–37 (Fort Leavenworth,
KS: U.S. Army Command).
Frey, B. (2004). Dealing with Terrorism: Stick or Carrot? Northhampton, MA: Edward
Elgar.
George, A. & W. Simons (Eds.) (1994) The Limits of Coercive Diplomacy. Oxford:
Westview Press.
Hoffman, B. (1999) Inside Terrorism. NY: Columbia Univ. Press. (see sample chapter)
Hudson, R. (2002) Who Becomes a Terrorist and Why: The 1999 Government Report on
Profiling Terrorists. Guilford, CT: Lyons Press.
Jenkins, B. (1985) Terrorism and Beyond. Santa Monica: RAND Corp.
Khalsa, S. (2004). Forecasting Terrorism: Indicators and Proven Analytic Techniques.
Lanham, MD: Scarecrow Press.
Kiesling, J. (2006). Diplomacy Lessons: Realism for an Unloved Superpower. Dulles, VA:
Potomac Books.
Kushner, Harvey. (2003). Encyclopedia of Terrorism. Thousand Oaks, CA: Sage.
Laqueur, W. (1999) The New Terrorism. NY: Oxford Univ. Press.
Long, D. (1990) The Anatomy of Terrorism. NY: Free Press.
Martin, Gus (2003). Understanding Terrorism. Thousand Oaks, CA: Sage.
Martin, J. & A. Romano (1992) Multinational Crime. Newbury Park: Sage.
Netanyahu, B & B. (1997) Fighting Terrorism. Jerusalem: Noonday Press.
Netanyahu, B. (Ed.) (1986). Terrorism: How the West Can Win. NY: Farrar Straus
Giroux.
Nicolson, Harold. (1964). Diplomacy, 3e. NY: Oxford University Press.
O'Connor, T. (1994) "A Neofunctional Model of Crime and Crime Control" Pp. 143-58
in G. Barak (ed.) Varieties of Criminology. Westport, CT: Greenwood.
O'Sullivan, M. (2003). Shrewd Sanctions: Statecraft and State Sponsors of Terrorism.
Washington DC: Brookings.
Pena, C. (2006). Winning the Un-War: A New Strategy for the War on Terrorism. Dulles,
VA: Potomac Books.
Reich, W. (1998) Origins of Terrorism: Psychologies, Ideologies, Theologies, States of
Mind. NY: Woodrow Wilson Center Press.
Ross, J. (2000) Controlling State Crime. NJ: Transaction Press.
Satow, Ernest. (1905). Satow's Guide to Diplomatic Practice, 1e. NY: Longman.
Simonsen, C. and J. Spindlove (2000) Terrorism Today: The Past, The Players, The
Future. NJ: Prentice Hall.
Taspinar, O. (2005). Fighting Radicalism with Human Development. Washington DC:
Brookings.
Turk, A. (1982) Political Criminality. Beverly Hills: Sage.
White, J. (2002) Terrorism: An Introduction (3e). Stamford: Thomson Learning.
In the beginning, there were city-states which began to see themselves as some sort of
union or federation, which became nation-states, and then the wars of survival in the
name of liberty began. The first, the Peloponnesian war, brought an end to any hope for
a free Greek nation-state, and then there was the Roman Empire, that great experiment
in centralized government. Provinces in the Roman Empire were allowed to practice
self-government within the limitations established by Rome. The famous "Pax
Romana" of this empire meant subjugation without assimilation, and more importantly,
stood as a symbol of law and order for over thousand years. When Rome fell, Pope Leo
III appointed Charlemagne as emperor of the Holy Roman Empire, and the Roman
system of colonial administration was replaced by the feudal system. Under feudalism,
the notion of "sovereignty" developed, with a vassal owing unquestioning allegiance to
their overlord in "fiefdoms" (as far as the lord thought his power extended; his
dominion as master of all that he surveys). However, the Pope started removing feudal
bonds in cases of misconduct by the lord, and the notions of "jurisdiction" and
"legitimacy" replaced sovereignty. The territorial jurisdiction system replaced
sovereignty, and in the quest for territorial expansion of jurisdiction, the Crusades were
launched into the middle east. Part of that quest was the urge to create a new world
order. It failed, and Europe drifted into a state of anarchy with rule by dukes and
duchesses with limited legitimate authority.
The Peace of Westphalia in 1648 ended rule by dukes, re-created the nation-state
system, and brought with it the notion of "balance of power," the world's first strategy of
international relations. From 1648 to 1919, the theory of balance of power shaped the
world into much of how it looks today.
BALANCE OF POWER: The idea of an interlocking, equilibrium-based system of
international order in which each nation kept an eye on each other nation, and when
one nation showed signs of starting a war or expanding its colonies, the other nations
would shift their alliances, the weak against the strong, to restore the status quo
distribution of power.
It had always been the case throughout history that alliances and treaties were formed
on the basis that one's ally is who they fear less against the power they fear more (raison
d'etat, or the law of survival), but it had never been the case, until the balance of power,
that the enemy of today would become the ally of tomorrow. This led to strange
bedfellows, as the 5 or 6 European nations in this game of power politics carved up the
world to their liking, comfortable in the thought that they were maintaining the best
that could be accomplished for international peace. The principalities of Italy, for
example, Venice, Florence, Naples, and Milan, constantly checked and balanced one
another with international trade. The English and Dutch, for example, constantly
shifted sides in the long conflict over colonial expansion between France and the
Habsburg dynasties. Most importantly, the balance could be maintained by options
other than war. All the world had to do in response to an aggressor among them was to
form new alliances, often by arranged marriages between princesses, often by
diplomacy, and often by forcing the aggressor to partition their newly conquered lands
fairly among members of the new, more powerful alliance. During the colonial era of
expansion, war as we know it changed. To be sure, there were preemptive wars, if new
alliances could be adjusted in time to check an aggressor. Also, there were limited wars,
to force aggressors afterwards to the bargaining table. The acquisition of new territory
by one power did not mean that others had to make a similar expansion. The balance
could be maintained by redistributing economic wealth, commercial channels,
monopolies on technology, or other resources. Balance of power was a wonderfully
peaceful system for preventing global domination by any one power, but it all fell apart
with World War I, but then was resurrected after World War II in that version of it
known as detente, with only two superpowers, Russia and the U.S., left to maintain the
equilibrium.
Moving now to 1945, with the end of World War II and the birth of the United
Nations, we see another type of strategy developing - the doctrine of detente or
deterrence - which was a game with many names played by the world's superpowers,
Russia and the U.S., with all the world as their stage. 1945 was also the birth of the
atomic warfare age, and the type of deterrence involved was nuclear deterrence. For
four years after bombing Hiroshima and Nagasaki, the U.S. enjoyed the privilege of
being the world's sole atomic superpower, but that all changed in 1949 when Russia
detonated its first atomic bomb in a trial experiment.
The doctrine of detente or deterrence which took the form of an Arms Race and Cold
War between Russia and the U.S. was not codified by the U.N., but that international
body quickly became a forum for conflict between the world's two superpowers. The
U.N. was helpless, and other nations were helpless. The U.N. could take no action
because both Russia and the U.S. exercised veto power whenever it looked like the U.N.
needed to step in. Nations organized into "West" and "East" blocs as the two
superpowers played out "proxy" wars in Third World countries. The idea of
sovereignty as in "sovereign nation" lost meaning, since all the U.N. offered was
equality. International peace was achieved via nuclear deterrence as a result of
containment and the threat of massive retaliation. Early in the Cold War, official U.S.
policy called for massive retaliation, but then, after the Korean War, the official policy
became flexible response. Behind both policies was the idea that any nuclear war would
involve Mutual Assured Destruction (MAD) for the principals, and possibly for the
world as well.
By the 1960s, the Arms Race produced more nuclear weapons than were militarily
useful, that is to say, there were more warheads than targets to drop them on. This
became known as overkill, and it is what led to limitation and disarmament talks. The
first SALT (Strategic Arms Limitation Talks) agreement got started in 1969, followed
by the ABM (Anti-Ballistic Missile) treaty in 1974. Recent events include SALT II in
1989 and SORT (Strategic Offense Reduction Treaty) in 2002. The U.S. withdrew from
the ABM treaty in 2001 in order to create a space-based (star wars) missile defense
system.
PREEMPTIVE PREVENTION: The idea that the best defense is a good offense,
or under international law, the doctrine of anticipatory self-defense or a preemptive
war that arises when one side decides there is a very great risk its adversary will
attack within days or hours, and that the attack will cripple its ability to defend itself
or retaliate.
There have been 20 preventive wars launched by the great powers over the last three
centuries. Pearl Harbor, for example, was a preemptive strike by the Japanese against
the U.S. Preemptive strikes sometimes backfire. Democracies tend to avoid them.
Democratic societies are usually restrained by fear of cost and doubts over the serious of
a threat warranting preemptive action. Politicians also are concerned that voters will
toss them out of office if they over-reach. Democracies typically prefer to create an
alliance or coalition, relying on strategies of destabilization and containment, or
preemptive covert operations in hopes of starting a coup. However, there is some
precedent for preemption. Military advisors suggested preemption during the Cuban
Missile Crisis, and Israel definitely used it when they perceived they were under
imminent threat of Arab attack in 1967. Preemptive wars are rare because of the
immense costs at home and internationally, and there are almost always doubts about
the threat's gravity and immediacy.
First strikes can occasionally be justified before the moment of imminent attack, if the
point of "sufficient threat" has been reached. This concept has three dimensions: "a
manifest intent to injure, a degree of active preparation that makes that intent a positive
danger, and a general situation in which waiting greatly magnifies the risk." The notion
of "threat" is also closely related to the term "vital interests," which refers to any threat
against the life of the nation, such as destruction of major cities or any step that could
ruin the economy. The following are the standard vital interests of any country,
particularly the United States:
MILITARY COUNTERMEASURES
The military option is what most people think of when they think of counterterrorism,
however, special counterterrorist operations, like special counterdrug operations,
usually are only carried out under special, highly restrictive, circumstances. The basic
problems are that the military doesn't work well with criminal justice procedures
(which are often part of the mix when capture, rather than assassination, is the goal).
The military's purpose is also to blow things up, and terrorists rarely provide a "target-
rich" environment. The military is also trained to carry out defensive as well as
offensive action, but in many cases, usually involving occupation of a country
afterwards, the need for defensive maneuvers interfere with successful completion of
tracking down terrorists. Offensive action may be necessary to destroy regimes that
align themselves with terrorism, and these often have to be U.S.-led efforts, in order to
create an incentive for allies to send police forces afterwards. Offensive action is
synonymous with higher morale at home.
All branches of the U.S. military contain special operations forces that are well
suited for counterterrorist missions. It is well known that these special forces are more
effective and produce less collateral damage than conventional forces. They are also the
kinds of forces that commit to the most risk of death, and this is the reason why
policymakers are reluctant to use them. Some special forces contain police units, but
most of them are trained for reconnaissance, surveillance, "surgical" raids, hostage
rescue, abductions, and liaisons with allied counterterrorist forces. U.S. special
operations forces are organized under the U.S. Special Operations Command, and
mostly consist of Green Berets organized into units called A Teams. The traditional
purpose of an A Team is force multiplication, or getting on the ground and multiplying
their operational strength. Delta Force (also known as 1st Special Forces Operational
Detachment) is a more secretive group that also operates in small teams. When large
elite units are needed, America relies upon such units as the Army's 75th Ranger
Regiment or the U.S. Marine Corps. The U.S. Navy also has special assault units called
the Sea Air Land Forces (SEALs). The most common objective of a special forces unit
in counterterrorism is to punish and destroy the terrorists, and secondarily, to destroy
their military and paramilitary assets.
There are times, however, when you need to go further, and destroy the terrorist's
non-military sources of support. This is when covert operations are called for. They
are usually arranged by an agency of the intelligence community, but frequently involve
U.S. military forces. Some intelligence agencies have their own paramilitary force,
however. There is a long history of covert ops, or "shadow wars," and probably the
most controversial aspect of it is assassination. This is generally reserved for the
elimination of key supporters of terrorism. There is little research on the effectiveness
of assassination when it comes to terrorism, and martyrdom effects are likely. Needless
to say, such missions are secret, and government "deniability" is incorporated into such
operations. Some history: after the Vietnam War, the U.S. officially declared that it
would no longer use assassination. A presidential executive order signed in 1981
(Executive Order 12333) expressly forbids employees of the U.S. from assassinating
adversaries. This was reinforced later by Executive Order 11905 which prohibited
hiring anyone to commit assassination. These prohibitions were reconsidered in the
wake of terrorist attacks on the U.S. homeland during September 11, 2001.
ECONOMIC COUNTERMEASURES
Terrorists use a variety of means for financing. Besides money laundering, they may
use drug trafficking, smuggling of bulk cash, trade-based money laundering, charities
for fundraising, and informal money remittance systems such as hawala. Hawala (also
known as hundi) is an informal money transfer system used primarily in the Middle
East, Africa and Asia. It originated in South Asia. In the hawala system, money is
transferred via a network of hawala brokers, or hawaladars. The transparency of
hawala networks (no records are kept) may very well represent the greatest challenge in
fighting terrorism on the economic front. Besides hawala, the world also has a rather
large black market peso system (usually involved with drug money) and a Fei chien
(Asian variety of hawala meaning "flying money") system. A challenge is that terror
funds may be raised legitimately or be perfectly "clean" at the beginning, but then, the
transfer method may be illegitimate (involving money laundering, smuggling, invoice
manipulations, or trade diversions). Some transfer systems are legitimate, however.
For example, commodities trading may take place with gold, precious gems, tobacco, or
oil. The regular security transfer and brokerage process may be used, and additionally,
funds may be transmitted via gift cards, debit and credit cards, Internet digital currency
systems, and stored value cards, like prepaid phone cards and "chits."
Besides Treasury Dept. initiatives, also established under the USA Patriot Act was
the Financial Crimes Enforcement Network (FinCEN) intelligence unit which is tasked
with being the primary U.S. intelligence source for domestic financial information. It is
responsible for maintaining and analyzing Suspicious Action Reports and Currency
Transaction Reports filed by financial institutions in accordance with the Bank Secrecy
Act. It also works with law enforcement, the CIA, and regulatory agencies to assist with
intelligence of financial crimes committed within the United States. In addition, there is
the Egmont Group—an international organization of 69 Financial Intelligence Units
formed six years before 11 September 2001 to share intelligence of suspicious financial
activities. Other multilateral groups, such as the World Bank and the International
Monetary Fund assist with legal harmonization, which is a term meaning that
technical assistance treaties and extradition treaties all have to be modified to support
more sophisticated tracking of terrorist financing at the same time being sensitive to the
different definitions of terrorism and legal systems of foreign countries.
Although terrorists engage in illegal activity to obtain funds and then launder the
currency as conventional money launderers do, some terrorist organizations are much
more likely to raise their funds legitimately and then use those funds to kill and attack.
For example, terrorist groups in Europe, East Asia, and Latin America rely on common
criminal activities including extortion, kidnapping, narcotics trafficking, counterfeiting,
and fraud. Other groups, such as those in the Middle East, rely on commercial
enterprises, donations, and funds skimmed from charitable organizations to not only
fund their activities but also to move materiel and personnel. Still other groups rely on
state sponsors for funding.
It's only appropriate to "harden" your targets when you suspect they will come under
terrorist attack. There are many ways to classify these targets, for example, as vital,
critical, political, economic, or symbolic, etc. Some targets are most likely already
hardened, like military targets, and the list of vulnerable military targets is quite small,
and would only include places like NASA facilities, U.S. Dept. of Energy facilities, the
Pentagon, and certain bases, camps, or forts. However, other targets are most likely
"soft" targets - either because they are vital, but have no security or bodyguards in
place - or as is often the case, they are symbolic targets that are only "symbolic" to the
terrorists, and you would never think they needed protection. What follows is a
typology or classification of the many targets of terrorist attack.
When selecting a target, terrorists usually seek out the one that is: (a) most high up in
vital importance; (b) softest in terms of being unprotected; and (c) most significant or
symbolic to their cause. A series of attacks on the nation's landmarks, for example,
would NOT be the typical pattern of a relatively small, emerging terrorist group. That
kind of totally symbolic strategy would most likely be followed by a terrorist group that
has already attacked other targets, and is using the landmarks as a way to "finish up"
their work. A group with an ecological target would also be typically one that has
already attacked in another way, the purpose here being to demoralize or weaken their
enemy, but like groups with an educational target (like an all-white school that rich kids
attend), there might be some unusual race-based or nation-based hatred involved.
Therefore, the main targets are going to be POLITICAL and ECONOMIC, especially as
the two of these (and others) might overlap. For example, the terrorists can be expected
to do their homework, and they will find out which companies, corporations, causes, and
schools that the political leaders worked for, are involved in, or attended. These kind of
calculations will ultimately determine targeting.
Tourist Targets
1. Museums 10. Expensive Restaurants
2. Theme Parks 11. Expensive Hotels
3. Shopping Centers 12. New Years Eve Events
4. Railway Stations 13. Cruise Ships
5. Subway Stations 14. Ski Resorts
6. Airports 15. Golf Resorts
7. Ferries 16. Casinos
8. Opera Theatres 17. Athletic Events
9. Musical Events 18. Hollywood Events
With this last group of targets, there is the distinct possibility that a terrorist attack
will not be recognized as an attack when it comes, and by that, is meant that some kind
of "silent" weapon of mass destruction might be used, for example, a germ warfare
agent or a slow radiological leak of some kind. While there is no substitute for the value
of news coverage that will be obtained by bombing a tourist target, such "flashy" tactics
by the terrorists will make for little difference whether the target is big or small. In
other words, a small shopping center in the heartland makes for as good a tourist
bombing target as a large shopping center in a major city. What the major tourist
targets need are monitoring devices for a WMD attack, not the usual extra bomb-
sniffing patrols.
INTERNET RESOURCES
Center for Defense Information
Contributions by the Department of the Treasury to the Financial War on Terrorism
(pdf)
Dealing With a Potential Nuclear Hitler
Gyre.org's Nuclear Proliferation and Deterrence Topics
Hiroshima: Was it Necessary?
Historical Roots of the U.S. War on Terrorism
International Law Homepage of the U.N.
Map of Imperialism and the Balance of Power by 1919
National Money Laundering Strategy (pdf)
Nuclear Deterrence Strategy and Doctrine
RAND's Terrorism Resources
Stratwise Strategic Intelligence
The Terrorism Research Center
The Transformation of Strategy from Deterrence to Preemptive Retaliation
U.S. Military Counterterrorism Operations
Weapons of Mass Destruction Intelligence Threat Assessments
PRINTED RESOURCES
Alexander, Y. (Ed.) (2006). Counterterrorism Strategies. Dulles, VA: Potomac Books.
Boyle, Francis. (2003). The Criminality of Nuclear Deterrence: Could the U.S. War on
Terrorism Go Nuclear? Gardenia, CA: Clarity Press.
Bolz, F., Dudonis, K. & Schulz, D. (2005). The Counterterrorism Handbook, 3e. Boca
Raton: CRC Press.
Brown, S. (2003). The Illusion of Control: Force and Foreign Policy in the 21st Century.
Washington DC: Brookings.
Cassara, J. (2006). Hide and Seek: Intelligence, Law Enforcement, and the Stalled War on
Terrorist Finance. Dulles, VA: Potomac Books.
Cateau, Jeff & Michael Levin. (2003). The Complete Idiot's Guide to The Pentagon.
Indianapolis: Alpha Books.
Ehrenfeld, B. (2005). Funding Evil: How Terrorism is Financed and How to Stop It. NY:
Bonus Books.
Fenwick, Charles. (1965). International Law, 4e. NY: Appleton Crofts.
Freedman, M. (2005). "The Invisible Bankers: How Terrorists, Drug Dealers, and
Smugglers are Using a Global System as Old as the Silk Road to Finance their
Operations, and There's Not Much We can do About It." Forbes (Oct 17): 95-104.
Frey, B. (2004). Dealing with Terrorism: Stick or Carrot? Northhampton, MA: Edward
Elgar.
Gaddis, John. (1982). Strategies of Containment: Postwar Nuclear Security. NY: Oxford
University Press.
Haass, R. (1999). Intervention: The Use of American Military Force in the Post-Cold War
Period. Washington DC: Brookings.
Hammes, T. (2004). The Sling and The Stone: On War in the 21st Century. St. Paul:
Zenith Press.
Jervis, R., Lebow, R. & Stein, J. (1989). Psychology and Deterrence. Baltimore: John
Hopkins Univ. Press.
Kauppi, Mark. (2002). "Counterterrorism Analysis 101." Defense Intelligence Journal
11(1): 39-53.
Kissinger, Henry. (1957). Nuclear Weapons and Foreign Policy. NY: Simon & Schuster.
Kissinger, Henry. (2001). Does America Need a Foreign Policy? NY: Simon & Schuster.
Korb, L. (2003). A New National Security Strategy in an Age of Terrorists, Tyrants, and
Weapons of Mass Destruction. Washington DC: Brookings.
Lesser, Ian, Bruce Hoffman, John Arquilla, David Ronfeldt & Michele Zanini. (1999).
Countering the New Terrorism. Santa Monica: RAND.
Martin, Gus (2003). Understanding Terrorism. Thousand Oaks, CA: Sage.
Moran, Daniel. (2002). "Strategic Theory and the History of War," in John Baylis,
James Wirtz, Eliot Cohen and Colin S. Gray (eds.) Strategy in the Contemporary World.
NY: Oxford University Press.
Napoleoni, L. (2005). Terror Incorporated: Tracing the Dollars Behind the Terror
Networks. NY: Seven Stories Press.
Passas, N. (2004). "Terrorist Finance and the Nexus with Transnational Organized
Crime," Northeastern University College of Criminal Justice Newsletter (Summer): 8-9.
Posen, Barry. (2003). "The Struggle Against Terrorism: Grand Strategy, Strategy, and
Tactics," pp. 391-403 in Russell Howard & Reid Sawyer (eds.) Terrorism and
Counterterrorism. Guilford, CT: McGraw Hill.
Primakov, Y. (2004). A World Challenged: Fighting Terrorism in the 21st Century.
Washington DC: Brookings.
Roberts, Brad. (2003). "NBC-Armed Rogues: Is There a Moral Case for Preemption?"
pp. 317-335 in Russell Howard & Reid Sawyer (eds.) Terrorism and Counterterrorism.
Guilford, CT: McGraw Hill.
Steinbruner, John. (2000). Principles of Global Security. Washington D.C.: Brookings
Institution Press.
Walker, George. (1998). "Anticipatory Collective Self-Defense," pp. 365-425 in Michael
Schmitt (ed.) The Law of Military Operations. Newport, RI: Naval War College Press.
Some of the new RULES that terrorists play by include the following. (1)
Indiscriminate, arbitrary, and unpredictable killing of noncombatants. The idea that
there are no innocent bystanders is not new to the theory of terrorism. What's new is
the desire to kill or maim as many of the general public as possible. (2) Lone wolves or
beserkers. These are individuals who constitute a terrorist cell unto themselves.
Terrorists have moved beyond the principle of leaderless resistance (not knowing who's
in charge) to an organizational model that makes room for "covert" or "sleeper" cells.
These individuals go off unpredictably and at times and places of their own choosing.
(3) Faith in victory. Suicidal terrorism never gives up, it never surrenders or quits,
and it never compromises anything in vain. This is what makes it different from
religious terrorism which wants to lose, achieve martyrdom and go to heaven, and this is
what distinguishes it from nationalistic terrorism, which seeks government concessions
regarding a homeland. (4) Cherished symbols as targets. What gives a target
symbolic value is if large numbers of a population group regard it affectionately.
Suicidal terrorists never attack anything citizens regarded as a monstrosity. (5)
Internecine conflict. Not only do the new terrorists seek mutually assured destruction,
they often want the conflict to spill over onto as many foreign shores as possible. (6)
Technology. Classic terrorism had strong ties to anarchism and the shunning of
technology. The new terrorism embraces technology, and manifests a desire to be as
advanced and exotic as possible. They are not technocrats, but they have a proclivity
toward modern consumerism. (7) Weapons of mass destruction. Suicidal terrorists
admire chemical, biological, and nuclear weapons, and want to get their hands on them.
Laqueur (1999) makes an interesting point that as the intelligence level of a terrorist
goes down, the desire to obtain weapons of mass destruction goes up.
Most of what Daniel Bell (1960) predicted in his book, The End of Ideology, came true.
We are living in un-heroic times of free-floating aggression, angst, and self-delusion.
Less than one half of one percent of the population would commit to an ideology, yet all
of us want some sort of adventure or passion out of life. IDEOLOGY is defined as a
form of social or political philosophy in which practical elements are as prominent as
theoretical ones. It is a system of ideas that aspires both to explain the world and to change
it (Encyclopedia Brittanica 2002). With the fall of the Berlin Wall, more than the Cold
War ended. So did our desire to do any hard thinking about the global economy, culture
clashes, mass immigration, ethnic hatred, how to end human suffering, and how to
guard against government bureaucratization. Today, everyone is a populist (populism is
the cause that champions the plight of the average, ordinary person). Further, it's an
anti-intellectual climate, both for the terrorists and counter-terrorists. Most of the
current War on Terrorism can be seen as a cleansing or mopping-up operation for the
remaining few "pockets" of intellectual revolutionary terrorism. Let's analyze this
connection more fully.
Leftist (radical, Marxist, revolutionary) terrorism has always been the domain of
intellectuals who consider themselves a vanguard elite. The notion of a vanguard
strategy has been around since Lenin and the Bolsheviks (a word meaning
majoritarianism) who believed that hard-core Communist Party followers should
consider themselves the "vanguard of the proletariat" (the working class). The
Trotskyites (followers of Leon Trotsky) rejected the idea of a worker's state in one
country (Russia), and believed in a worldwide vanguard which would enable a
permanent, global Socialist revolution. Castroism is a variety of Trotskyism, and
Maoism is closer to Leninism (although the peasant class is championed under
Maoism). Che Guevara toyed with the idea of "consciousness raising" in the Americas,
but rejected it in favor of the Maoist idea that happiness is a warm gun.
Now, within Frazier's hierarchy, you'll recall, is an organizational level called the
active cadre. This is the vanguard of a terrorist group. They have been indoctrinated
or led to believe that terrorist violence is absolutely necessary on their part as righteous
champions of whatever poor and downtrodden group they are fighting for. Cooper's
(1977) doctrine of necessity is applicable. It says that a person becomes a terrorist not
because they enjoy violence, but because they are forced toward it. They come to believe
that continuance of the status quo is worse than the violence caused by terrorism. They
may come from backgrounds where they were raised to detest violence, but their utter
hatred of the status quo helps them overcome any feelings of guilt about killing innocent
people. Notice it's not the cause or ideology that drives the terrorist. Instead, it's an
internalization of other people's problems and the desire to be heroic. If anything, it's an
ideology of violence. It would be immoral not to be violent.
The idea that there should be no scruples of conscience when it comes to blowing
things up can be traced to the 1848/1849 German activist Karl Heinzen. The
Communists, especially Engels, tried to shut him up, but Heinzen proclaimed the first
terrorist philosophy of mass destruction. Heinzen's beliefs are known as the doctrine of
unjustified means.
Suicidal terrorists frequently want little by way of practical or political gain. In the
words of a Hizbollah leader, "We are not fighting so that the enemy recognizes us and
offers us something. We are fighting to wipe out the enemy." New terrorism appears to
be motivated by little more than a desire to bomb the hell out of one's evil enemies, or as
one contemporary philosopher of terrorism, Ken Wilber calls it, "first-tier, blue
thinking."
• The upper right quadrant - atoms, molecules, cells, organs, neural systems and
brains
• The upper left quadrant - intent, consciousness, maturity, the mind, sensations,
perception, impulse, concepts, and aesthetic taste
• The lower right quadrant - groups, families, tribes, villages, and nations
• The lower left quadrant - the cultural, world views, cultural perspectives, values,
and morals
The Levels are more extensive, color-coded, and reference a worldview or state of
consciousness, and their essential characteristic is that each one thinks of itself as the
only way to see things:
Wilber's AQAL theory of terrorism is that far too little social resources have been
directed toward the Left Quadrants, and that far too many societies have looked for
natural hierarchies in the Right Quadrants, when the only natural hierarchies are
atomic and in the Upper Right. Also, far too much Blue, first-tier, thinking is
encouraged. Fear, loathing, and disrespect must give way to Orange thinking (which
may imply the need for a World Police Corps). In short, terrorism should be conceived
of as a form of self-doubt, breed from fear, and caused by the absence of genuine
opportunities for respect, dignity, and self-development in the world today.
CRIMINAL TERRORISM
Postmodern terrorists have given up on revolution and liberation, and instead pursue
what can only be described as organized criminal activity where it's "just business as
usual." Narco-terrorism is one such variety, but many terrorist groups raise money
through criminal activity, and to be sure, a few terrorists started out as street thugs or
had a proclivity for such things as vehicle theft. The so-called "true criminal" terrorist
is rare, however. For one thing, the mentality is different between a criminal and a
terrorist. Mental disorders abound among the criminal population -- antisocial
personality disorder, psychopathy, sociopathy, etc. The worst that can be said about
terrorists is that they suffer from delusions of grandeur and a strong paranoid streak
(Laqueur 1999). This is just the opposite of what most people think. They think that
terrorists have to be crazy to kill so many innocent people, but they're "crazy like a
fox." Criminals, on the other hand, are the crazies, suffering from anxieties,
depressions, psychoses, neuroses, and personality disorders. Terrorists sleep very well at
night, thank you.
The question then becomes to what extent terrorism, or terrorist ideology, is a cover-
up for criminality, or psychopathology? The literature on the forensic psychology of
terrorism is enormous (Taylor 1991; Reich 1998; Robins, R. & J. Post 1997; Taylor &
Horgan 2000), and there is no one, neat answer to the question. Some experts argue that
the psychological mechanism that allows terrorists to do what they do is a process of
moral disengagement. Others say it's a coping strategy for stress. Some would argue
that terrorist motives are driven by such things as boredom and the need for a sense of
adventure. A few claim it's the case of a massive inferiority complex, brought on by a
strong sense of humiliation (Lindner 2001). Nobody argues that terrorism is
psychopathy. It's apparent that most suicidal terrorists are well-read, educated,
intelligent, thoughtful, reflective, rational people with common sense. They also just
happen to be people you can't reason with, because they fervently hold fanatical or
extremist beliefs deep in their heart and soul. They have what Voltaire called an
incurable disease of the spirit, a fixation, if you will, with seeing no harm, no foul play,
no bad intent, and no negative impact in what they do. They possess a dehumanized,
emotionless attitude toward others, regarding most people as "the walking dead" (see
The Revolutionary Catechism for a terrorist guide to interpersonal relations).
The motivations for becoming a terrorism are diverse, and they depend not just upon
applied political psychology (Robins & Post 1997) but the socio-historical context of the
time and place (Crenshaw 2001). There are regions of the world where long-standing
grievances are part of the local culture. There are times when the apocalyptic visions of
fundamentalist religions take hold. There are places of higher learning which steer
intellectual thought in the direction of justifying terrorism. One thing is clear -- to
become a terrorist, you need to be exposed to like-minded others. It's easy to
sympathize with terrorists, but another thing to excuse their actions.
The profiling of terrorists is no easy task, and profiling the new, modern terrorists
tends to baffle experts. CIA profiling tends to be more clinical and psychodynamic than
FBI profiling. Criminal profiling uses a combination of psychology, observation,
deduction and forensics. Terrorist profiling uses a combination of political psychology,
sociology, psychoanalysis, and psychiatry. The closest thing to a composite of a
"perfect" terrorist is a person with extreme hatred in their soul and an extreme sense of
self-righteousness. They feel they have been left with no choice in a world which moves
in the diametrically opposite direction of their convictions. They see their enemies in the
world as evil -- and evil must be destroyed, root and branch. In drawing up profiles, it's
important not to make too much of national origin. That would be pretty much the same
as racial profiling. It is helpful to consider social class background. Most suicidal
terrorists tend to come from the elite, educated, upper social classes. Revolutionary
terrorists are drawn from two extremes: the most upper and most lower classes.
Nationalist and separatist movements produce terrorists from the lower classes.
Religious terrorists come from all social classes. In the Muslim world, terrorists come
from the ranks of the unemployed, and in the United States, from the middle class.
Social psychological models are also helpful, as in Jeffrey Ian Ross' (1999) attempt to tie
together structural factors about socio-cultural conditions with psychological facilitating
traits. Here's a paraphrasing of those facilitating factors:
It's true that some terrorist behavior is less than rational. Suicide, for example, is not
normally the act of a rational person. Many experts (Ganor 2000; Schweitzer 2000)
have commented on the tendency for modern terrorists to use suicide attacks. In fact,
the Islamic Jihad (there are several Islamic Jihads started in the 1980s, all stemming
from inside the Muslim Brotherhood movement started in the 1920s) have specialized in
the use of suicide bombers, which involve a person wearing explosives or detonating a
driven vehicle packed with explosives. Other groups have also embraced suicide
terrorism. The Tamil Tigers of Sri Lanka proudly wear cyanide necklaces as a sign of
commitment to their cause, saying "We are married to our cyanide; it makes us clear-
headed and purposeful." IRA terrorists have starved themselves to death; Russian
revolutionaries have blown themselves up; and fascist movements have a distinct
tendency toward a mystique of death. The Japanese kamikaze tradition best exemplifies
this warrior mentality or mystique, which is characterized as a honor to be permitted to
die. The Islamic tradition adds an element of "deluxe martyrdom" (Laqueur 1999), in
which surviving family members are well taken care of.
While some suicidal terrorism is probably done out of fatalism, the terrorist thinking
they are going to die living under present conditions, or die if captured (the death
penalty not being a deterrent here), deluxe martyrdom is a radically new
phenomenon. For Muslims, suicide is not a mortal sin, as it is in Catholicism. The
Koran does not permit suicide in principle, but religious leaders say it is allowed under
special circumstances. The Koran does preach that it is a religious duty to fight and die
for Allah and Islam. Martyrdom in the name of Allah carries the following benefits:
In the recruitment process, it's important to remove any sense of the recruit's self-
identity. There is no room for individuality in a terrorist organization. Success or failure
(pride or shame) regarding the terrorist organization becomes an individual matter, and
terrorist groups often compete with other terrorist groups over who has the most
dramatic and violent operations. It's also important for recruits to renounce any sense
of hesitation, guilt, or remorse they may have. There's no room for moral considerations
within a terrorist organization. This objective is normally accomplished by demonizing
the enemy; e.g. "anything which helps defeat the enemy" or "the more dead, the
better." Nothing is illegitimate (although the Koran speaks of not poisoning the well) in
the cause of defeating an enemy. No distinctions are made between the enemy's soldiers,
civilians, women, or children.
After recruitment, there is a need to provide a mechanism for granting social status to
the new recruit. They must receive respect from their acquaintances and be a source of
awe and inspiration to the young. By intent, the whole process of recruitment is
designed to make it look like it is a natural step to join a terrorist organization, much
like the armed forces of a country would like it to look like it's a natural step to serve
your nation.
The Zapatistas started out without any computer technology, but they soon realized
that transnational organizations and non-governmental organizations (NGOs) had
computers and websites, so they started a propaganda campaign on the Internet by
tailoring their terrorist attacks to what was newsworthy for the NGOs. Their Internet
proficiencies progressed to the point of web hacks and cyber-crime. In the late 1990s,
they were the world's first information guerrilla movement. When the Zapatistas
launch a web attack, their "network" of supporters, sympathizers, and loosely-affiliated
movements all launch web attacks too. The effect of this, as it is for suicidal and
amateurish terrorism, is often more overwhelming than traditional terrorism.
The humiliation paradigm is most associated with the work of Straub (1990) on
bystander intervention and Lindner (2001) on gendercide. Evelin Lindner is a
psychological counselor with extensive private practice experience in the Middle East.
She has developed a paradigm that draws heavily upon the psychological notion of
empathy, and the viewpoint that all human beings yearn for recognition and respect,
and that the withdrawal or denial of recognition and respect, experienced as
humiliation, is the strongest force that creates rifts between people and breaks down
relationships. Humiliation is defined as a personal feeling where respect and
recognition are lacking, and it is not due to ethnic, religious, or cultural differences
(which create rifts by themselves or are used as fronts for the deeper humiliation rift).
Nor is humiliation the same as feeling like a victim (which generally results in either
depression or lashing out in rage). Instead, humiliation is the feeling of being helpless,
pinned down, held down, or kept passive (and unable to control world events).
Criminologically, humiliation is quite different from deprivation, the standard concept
in criminology to explain these kinds of things.
Lindner's (2001) research involved years of trying to understand things like why some
Palestinian mothers would want to have more babies so their children could grow up to
become suicide bombers, or why successful businessmen (like Osami bin Laden) would
abandon wealth and promising careers to become terrorists. The answer, it seems, is a
sense of felt humiliation and helplessness about being unable to contribute effectively to
the "global village" or one's notion of global responsibilities. Two points can be made
about this explanation -- one, that suicidal terrorists are deeply sincere and selfless
about their motives for terrorism-- and two, that the world's movement toward
globalization or a "global village" has negative side effects that create terrorism (even
humanitarian aid can be humiliating).
Apparently, the postmodern terrorist cannot sit passively by and watch world events
run their course without some personal commitment. Terrorism is then, like an eating
disorder or alcoholism, where the person tries to "drown" their sorrow or humiliation,
and further, will "manufacture" a series of humiliations (when there is none in their
lives) by over-empathizing (sincerely and deeply) with the problem of others'
suffering. Likewise, there will be those who are perceived (or misperceived) as the
"humiliators" in all this, and above all, those most likely to be perceived as the
humiliators are those who point out the inequalities and deprivations in the world
(human rights violations) that were once taken for granted or just accepted. Perhaps
this paradigm has some validity. It may very well be that some people turn to terrorism
precisely because they feel deeply humiliated by the arrogant, self-congratulating style
in which the leading nations of the world are constantly pressuring for greater human
rights. It remains to be seen, however, if empirical research validates the hypothesis
that empathy for suffering is a cause of terrorism. It may very well be that this line of
explanation simply involves some twisted sense of heroism or bystander intervention
gone horribly wrong.
INTERNET RESOURCES
Criminal versus Terrorist Profiling
Excerpts from Martha Crenshaw's Terrorism in Context
Herbert Marcuse Internet Archive
Infantry Tactics in Military Operations in Urban Terrain
Profiling a Terrorist
Profiling Islamic Suicide Terrorists (pdf)
Profiling Osama bin Laden
The 1848 German Revolutionaries
The ICT Institute at Herzliya
The "New" Terrorism: Does It Exist?
The Revolutionary Catechism
PRINTED RESOURCES
Arquilla, J. and D. Ronfeldt. (2001). Networks and Netwars: The Future of Terror, Crime,
and Militancy. Santa Monica: RAND Corp.
Bell, D. (1960). The End of Ideology. Cambridge: Harvard Univ. Press. [sample chapter]
Bloom, M. (2005). Dying to Kill: The Allure of Suicide Terror. NY: Columbia Univ. Press.
Cooper, H. (1977). What is a Terrorist? A Psychological Perspective. Legal Medical
Quarterly 1: 8-18.
Crenshaw, M. (Ed.) (2001). Terrorism in Context. University Park: Penn State Univ.
Press.
Crenshaw, M. (2002). "Suicide Terrorism in Comparative Perspective," in Countering
Suicide Terrorism, T.I.P.I.f. Counter-Terrorism. Herzliya: Anti-Defamation League.
Freire, P. (2000). Ideology Matters. Lanham, MD: Rowman & Littlefield.
Ganor, B. (2000). Suicide Terrorism: An Overview. ICT: The Institute [web site]
Hobsbawm, E. (1965) Primitive Rebels: Studies in Archaic Forms of Social Movement.
NY: Norton.
Hoffman, A. (1968). Revolution for the Hell of It. NY: Dial Press.
Hoffman, B. (1999). Inside Terrorism. NY: Columbia Univ. Press.
Hoffman, B. (2003). "The Logic of Suicide Terrorism." Atlantic Monthly 291(5).
[available online]
Kushner, H. (1996). "Suicide Bombers: Business as Usual." Studies in Conflict and
Terrorism 19(4): 329-37.
Laqueur, W. (1996). "Postmodern Terrorism: New Rules for an Old Game." Foreign
Affairs 75(5): 24-36. [Internet Preview]
Laqueur, W. (1999). The New Terrorism: Fanaticism and the Arms of Mass Destruction.
NY: Oxford Univ. Press.
Laqueur, W. (2003). No End to War: Terrorism in the Twenty-First Century. NY:
Continuum Inter. Pub. Group.
Lesser, I. et. al. (1999). Countering the New Terrorism. Santa Monica: RAND.
Lindner, E. (2001). "Humiliation as the Source of Terrorism: A New Paradigm." Peace
Research 33(2): 59-68. [Author's Internet article]
Marcuse, H. (1964). One-Dimensional Man. Boston: Beacon Press.
O'Connor, T. (1994). "A Neofunctional Model of Crime and Crime Control" Pp. 143-58
in G. Barak (ed.) Varieties of Criminology. Westport, CT: Greenwood.
Post, J. (Ed.) (2003). The Psychological Assessment of Political Leaders. Ann Arbor, MI:
Univ. Michigan Press.
Post, J. (2004). Leaders and Their Followers in a Dangerous World. NY: Cornell Univ.
Press.
Reich, Walter (Ed.) (1998). Origins of Terrorism: Psychologies, Ideologies, Theologies,
States of Mind. Washington D.C.: Woodrow Wilson Center Press.
Robins, R. & J. Post. (1997). Political Paranoia: The Psychopolitics of Hatred. New
Haven: Yale Univ. Press.
Ross, J. (1999). Beyond the Conceptualization of Terrorism: A Psychological-Structural
Model, in C. Summers & E. Mardusen (eds.) Collective Violence. NY: Rowen &
Littlefield.
Schweitzer, Y. (2000). Suicide Terrorism: Development & Characteristics. ICT: The
Institute [web site]
Straub, E. (1990). "Moral Exclusion, Personal Goal Theory, and Extreme
Destructiveness." Journal of Social Issues 46: 47-64.
Taylor, Maxwell. (1991). The Fanatics: A Behavioral Approach to Political Violence.
McLean, VA: Brassey's.
Taylor, M. & J. Horgan. (2000). The Future of Terrorism. London: Frank Cass & Co.
White, Jonathan. (2002). Terrorism: An Introduction. Belmont, CA: Wadsworth.
Nationalism is the driving force behind a love of country so strong that one is willing
to die trying to change or overthrow a government seen as corrupt and/or oppressive.
It's an Enlightenment notion associated with the thought of Locke, Voltaire, Rousseau,
and Montesquieu that the best form of democratic government is based on the natural
desire of people to govern themselves as a distinct nation-state. It has been the
underlying justification for the American Revolution, the French Revolution, the
Mexican Revolution, and the Cuban Revolution. The patriotic feeling of loyalty to one's
national ties can take different forms depending upon the economic and cultural
context. Most people are familiar with jingoistic nationalism where a common
external enemy unites people in a war mentality. Others, especially Westerners, might
be familiar with self-interest nationalism in which a presumed economic superiority
permits the export of a civilization in the name of prosperity. Militaristic nationalism
tends to involve fascist or socialist movements that glorify the institutions, icons, and
achievements of a state. And finally, there is ethnic nationalism which is rooted in
ethnic identity as the basis for a cause. This last form has become a dominant model of
terrorism in the 21st Century, and is called ethno-nationalist terrorism, or more
simply, ethnoterrorism.
Nationalism, or more precisely, the concept of nation-state, was used by the great
European powers to create and administer their colonies. It's easier to govern when the
"people" think they're all part of a nation-state with borders. Unfortunately, it turns out
in this post-colonial era that there were a diverse number of different ethnic groups
within those borders. That's why scholars such as Horowitz (1985) say ethnic conflict is
nationalist conflict. Control of the state, a state, any state becomes the goal of ethnic
conflict. That's why nationalist terrorist groups are referred to as subnational
organizations, para-states, states within a state, liberationists, separatists, or unifiers.
One should never underestimate the power of such groups. They are not political parties
fighting for their slice of a pie, nor are they simply elites with a grudge going back to
some historical accident (they fantasize about some imagined loss instead, or in the case
of the IRA, an exaggerated actual loss). As Connor (1994) points out, such terrorists are
emotional personalities with an "us-them syndrome" who are capable of the worst
atrocities, up to and including genocide, because ethno-nationalism is a passion or drive
that goes straight to the core of an identity need to "find one's self." Ethnonationalist
terrorism is less rational and comprehensible than plain, old nationalist terrorism.
Despite the fact that most ethnoterrorism is confined to one country or theatres of
operation, there have been many groups who developed an international presence.
More often than not, these are Left-Wing groups, or splintered factions of Left-Wing
groups, that take up the calling of oppressed people everywhere. In such cases, support
is usually obtained from a sponsoring nation, but it would be a mistake to call it state-
sponsored terrorism since they mostly rely upon popular support and the strength of a
solid message. It's also interesting to note that the leaders of many international
terrorism groups were women. This is different from say, religious terrorism where
women are more commonly used as cannon fodder, or terrorism in general, which is a
male-dominated profession. How and why women achieve terrorist leadership roles are
matters of speculation. Laqueur (1999:38) argues that they are more fanatical and have
a greater capacity for suffering, but the field of criminology largely rejects this notion.
STATE-SPONSORED TERRORISM
ANTONIO GRAMSCI: Early 20th Century Italian diehard communist who resisted
Mussolini and wrote on hegemony (heg e' mon ee) as the true cause of an open,
humanist Marxism, being a struggle for the hearts, minds, and common sense of
followers. Hegemony is the way nations try to project their way of seeing things and
social arrangements as common sense, and is involved in perceptions of global
superpower status. Hegemony is also Phase One of a terrorist movement, according to
Gramsci, which involves the destruction of beloved symbols and ideals. Gramsci's
writings are complex and the stuff of dissertation research.
State sponsorship can make, break, and modify a terrorist group. During the World
War I era, for example, the Armenians terrorized the Turkish Ottoman Empire, but
received no outside support, and were quickly wiped out. The Macedonians, by contrast,
received the help and protection of Bulgaria, and were able to launch a more sustained
campaign. Unfortunately, Bulgarian assistance came at a price, as the Macedonian
terrorists were used against Bulgaria's enemies, domestic and foreign. The Russian
Communists also became involved in sponsoring terrorism during this time period,
using Romanian groups as their main proxy, and later, the PLO and Cuba.
Shortly after World War II, Third World terrorism emerged practically everywhere
in bids for independence from the colonial powers. It was most violent in Northern
Africa and the Middle East, with anti-Israeli terrorism becoming state-sponsored by
early 1960. Of all the colonial powers, the French faced the most organized resistance, in
Algeria and Indochina (Vietnam), sponsored by neighboring countries. The 1960s
brought all the "big players" (China, Russia, the United States) into sponsorship of
terrorism, as well as a number of "little players" (Cuba, North Korea, East Germany).
Left-Wing and Ultra Left-Wing terrorism spread rapidly throughout the world,
including North America (with the Weathermen and Black Panthers), the Left operating
out of the universities. Right-Wing terrorism also spread globally, in places like Turkey,
Israel, and Latin America, the Right operating mainly out of religious institutions. It's
not too much of an exaggeration to say that most of the world's nation-states
experienced some kind of martial law between 1968 and 1974.
After the end of the Cold War, the amount of money traditional supporters gave to
their proxy groups decreased, but other supporters moved in to pick up the slack (such
as Libya, Iran, Iraq, and Syria). Today, support can come from nation-states, diasporas
(immigrant communities in other countries, or nations without states), refugee camps,
wealthy individuals, or charitable organizations (Byman et. al. 2001). It is almost
certain that state-sponsored terrorism will continue, if only as a "nuisance." The
purpose of nuisance terrorism is to intimidate, compel the enemy to waste resources,
and thereby weaken him. Below are profiles of two state-sponsored groups, selected to
illustrate the longevity of such terrorism.
STATE TERRORISM
State terrorism, or terrorism "from above", is more than repression, suppression, and
human rights violations. It involves sponsored or unsponsored Black Operations
combined with Psychological Warfare where reactionary governments, their
militaries, militias, intelligence services, or police forces engage in acts ranging from
political and mass murder to torture and crimes against humanity. The most horrific
acts of terrorism have always been committed in the name of counterterrorism. The United
States has been the worst offender in this regard, supporting at least 30 intolerable
regimes since WWII engaged in state terrorism against populist movements (Blum
2000). Operation Phoenix, for example, officially lasted from 1968-1971 where CIA
teams went into Vietnamese villages and murdered civilian chiefs because of their
politics. The French did much the same thing earlier, and the Vietnam conflict
produced what many Third World leaders (in Latin America and elsewhere) took as the
French-American model of counterterror (torture, murder, and disappearance).
State terrorism is often carried out under the guise of economic self-interest when in
reality, it's usually the product of a "sick mind" (dictator or strong man) gone made
with power, and sponsors of such powers often underestimate this. Control of the mass
media and suppression of dissent are common trademarks, and it would be a mistake to
neglect corruption, or the desire to line one's pockets. State terrorists usually subscribe
to an ideology of plutocracy - a system of rule by and for the rich. When state
terrorism is uncovered, the spin or media story is often that of a lone gunman or some
conspiracy theory, which feeds additional conspiracy theories trying to uncover the real
story. The most common method of media manipulation, however, is suppression by
omission (which involves downplaying the incident or providing the media with a
distracter story).
MICHAEL PARENTI: Late 20th Century political scientist (with his own website),
author of over 10 books, and premiere American radical thinker on American
involvement with state terrorism (Noam Chomsky being American's second leading
radical). He distinguishes "wholesale" terrorism from "retail" terrorism that gets
reported in the news. He estimates that U.S.-backed surrogate forces have killed at
least 8 million innocent people since Vietnam, and claims U.S. national security
agencies and corporate America are the world's leading sponsors of terrorism today.
ARGENTINA's DIRTY WAR: Beginning in 1976 with the rise of two terrorist
groups, the Montoneros (Liberal Peronists) and the ERP (student radicals), both
perfecting the Tupamaros model, and Gen. Jorge Rafael Videla's (the Pink Panther's)
wiping them out after a military coup, the "Dirty War" was a counterinsurgency
campaign to eradicate anyone and anything regarded as politically subversive. Some
of the atrocities included rape, baby harvesting, mass murder, cross-border
assassinations (Operation Condor, involving Brazil, Uruguay, and Bolivia), and
refined torture techniques involving electric shock, asphyxiation and sexual
perversion. It lasted until 1982 when the Argentine military went too far and annexed
the Falkland Islands, bringing down the wrath of the British and loss of U.S. support.
Since 1998, Argentina has been trying to come to grips with this horrible past, and
documentation of U.S. involvement has been recently declassified.
EAST TIMOR'S INDEPENDENCE: An island country with a number of issues
that fought its way to U.N. protection in 1999 after 24 years of Indonesian state
terrorism, despite 85% of its territory being burned to the ground and 33% of the
population being killed by Indonesian-trained militias and armed forces. The U.S.
now has severed all military and training assistance to Indonesia, but for many years,
was the principal supporter. Indonesia is the world's largest Muslim country, and has
long received U.S. military and economic aid, propping up the 32-year dictatorship of
General Suharto, and protecting economic (oil & mining) interests in the Aceh
province. The East Timorese are trying to seek justice for war crimes, genocide, and
human rights violations such as arbitrary arrests, extrajudicial killings, torture, as well
as restrictions on freedoms of speech, press, assembly, and association.
CORRUPT NATION-STATES
There are a number of places around the world where bribery, or the misuse of public
office for private gain, rules the day, and when an entire nation is run like this, it is more
than a breeding ground for terrorism -- it's a safe haven for all kinds of terrorists.
Almost every year, the U.S. AID, through a coalition called Transparency International,
releases a report called the CPI (Corruption Perceptions Index) which lists the worst
offenders -- nations where public officials and their cronies don't miss any chance to
take bribes or kickbacks at every opportunity. The leaders of such nations plunder
their environment in unsustainable ways, engage in blood diamond commerce (blood or
"conflict" diamonds have been financing civil war in Africa for years), put a lot of ghost
workers on the bureaucratic payroll, and line their pockets at the expense of their
people. The CPI is a poll of polls, drawing upon the collective expertise of several
economic intelligence agencies, and here are the worst offenders:
In these kinds of places, the bribe to get a telephone installed is usually more than the
cost of using the telephone for a whole year, and things like that are just the normal way
of doing business. Examples of corruption range from fraud, embezzlement, nepotism,
bribery, and extortion to influence-peddling. Systematic corruption is prevalent. A
customs official usually gets their job through a political favor or bribe, and is expected
to share whatever bribes they get with superiors. A judge in a corrupt nation usually
has their judicial decision influenced by bribes. Tax, health, fire, and police officials
regularly demand bribes. A corrupt government that is neither representative nor
effective is not legitimate. There is no rule of law and low accountability for public
officials. A patronage system, or one based on personal loyalties, such as to one's family,
ethnic, or religious group, has replaced the rule of law. One-party dominance of the
political system also creates an underground, black market economy.
There are critical links between corruption, crime, and terrorism. First comes the
corruption, which establishes a multiplicity of crimes, including the criminal trafficking
networks and black markets that enable gun and drug smuggling, for example. Many of
the citizens in such drug transit zones become addicts, but many of them also come to
hate what they regard as exacerbating factors -- such as foreign investors allowed to
profit through bribes -- and they come to blame not only their own government, but the
governments of these foreign investors for the vast poverty and injustice in their land.
The irony is that these foreign investors are not even sending the money they make back
home, as many of them are engaged in money laundering, or safe off-shore investment
banking. Money laundering is also the most common way terrorist groups are
financed. Here's a 2003 list that the FATF (Financial Action Task Force) put out that
they call Non-Cooperative Countries and Territories, or places where banking
regulations are not very strict and tougher regulations have been resisted:
CAPITALIST TERRORISM
The financial incentive to make money from terrorism is not new. Worldwide violence
has always been driven by the arms market. The international trade in weapons doesn't
leave the clearest paper trail, but it's commonly known that you can buy anything from
anybody in this business. Bolivia is a major conduit and transshipment center in arms
trading. The remains of the Soviet Union's arsenal is for sale to anyone with hard
currency. The French have historically demonstrated a willingness to sell to anybody,
and so have the Belgians, at least in small arms, a specialty of theirs. Two economic
forces in the arms market are hybridization and customization. Both involve combining
parts of weapons systems from one manufacturer or national entity with parts from
another manufacturer or entity. French computers combined with Russian radar are a
hot hybrid item, and MiG fighters, of course, are customizable. Increasingly
sophisticated weaponry is finding its way into the hands of terrorists and subnational
organizations. Here's a table of the biggest exporters and importers on the arms market:
Exporters: Importers:
Other terrorists have been mercenaries, or soldiers of fortune. They are guns for hire,
as long as they think the cause is just and the money is right. They may or may not have
ideological convictions, and a desire to see "action" may be the primary motivating
force. The classic cases of this are Carlos the Jackal and Abu Nidal, although many
experts warn about blowback from surviving members of the Afghani majhadeen.
NARCOTERRORISM
Narcoterrorism is a term that has instigated debate among experts, ever since Rachel
Ehrenfeld (1990) first coined the term in 1990, or so they say on the back of her book
Funding Evil (2003). Actually, the term goes back at least 7 years earlier, in 1983, when
it was used by the President of Peru. It could also be found much earlier in the
literature of the 1950s about China's influence on the drug trade, if one would look for
it. Some believe it's a useless term that confuses the drug war with the war on
terrorism. Drohan (2005) says that we should start by defining "narco-mercantilism"
before calling some country "narcocracies." Others believe using the word
narcoterrorism is a way of degrading true revolutionaries. Technically, it refers to the
financing of terrorist activities by participation in the drug trade, and some (Napoleoni
2003) have even gone so far as to say narcoterrorism is a component of all terrorism
today as a direct outgrowth of the modern global economy's complicity in arms
smuggling, narcotics trafficking, and a number of other shadowy criminal activities that
take place by proxy on the world stage. Theoretically, narcoterrorism is both a mode of
attack (saturating the enemy population with dangerous narcotics) and a tactic (raising
so much money you don't have to fight, just buy friend and foe alike). It's closely
associated with the practice of money laundering, in which drug dealers convert illegally
gained profits to "clean" cash using foreign businesses and banks. The DEA defines it
as any terrorist act carried out by groups that are directly or indirectly involved in
cultivating, manufacturing, transporting, or distributing illicit drugs. The term is
generally applied to groups that use the drug trade to fund terrorism (the most drug-
funded terrorist groups being Colombian groups, the Shining Path, the Tamil Tigers,
Hezbollah, PKK, ETA, the Real IRA, and Al-Qaeda). Osama bin Laden has reportedly
advocated using narcotics trafficking to weaken Western societies by supplying them
with addictive drugs. (In 2000, Americans spent almost $63 billion on illegal narcotics.)
In 1998, the U.S. spent almost $3 billion dollars on interdiction efforts. Most of these
funds go to foreign aid at what are called "source-zone" countries, to help them improve
their law enforcement capabilities and develop alternative sources of revenue for their
economy. The U.S. also uses a certification system to pressure foreign governments to
strengthen their legal systems. Decertification results in U.S. opposition to loans from
the World Bank and other multinational organizations. The U.S. also works feverishly
at increasing its extradition treaties with nations, meaning that they will surrender
targeted drug offenders for trial on American soil. Terrorist groups thrive in "source-
zone" countries by charging unofficial taxes on the growers. Here's the source countries:
PETROTERRORISM
Not only has petro-security become highly important in the post-9/11 world, but there
has long been a feeling (at least in some quarters of American public opinion since the
Arab Oil Embargo of 1973-74) that certain petro-states are, in effect, holding the U.S.
"hostage" over its oil dependency...
INTERNET RESOURCES
A Case Study of the PKK in Turkey
American State Terrorism
Amnesty International's Pinochet Page
Anti-Corruption Gateway for Europe and Eurasia
Argentina's Dapper-State Terrorism
BBC Special on ETA's Bloody Record
Brigate Rosse: Politics of Protracted War in the Imperialist Metropolis
CNN Special on Basque Conflict in Spain
CNN Special on the Ocalan Trial (PKK)
East Timor Action Network
ICT Profile of the Red Brigades
NarcoTerror.org
Spanish Government Intelligence Report on ETA
The Nationalism Project
Turkish Government Intelligence Report on PKK
U.S. Weapons Sales & Military Training in Indonesia
Wikipedia Entry on Nationalism
PRINTED RESOURCES
Ahmad, A. (2002). Lineages of the Present: Ideology and Politics in Contempory South
Asia. NY: Verso Press.
Armony, A. (1997). Argentina, the United States, and the Anti-Communist Crusade in
Central America, 1977-1984. Athens: Ohio University Center for International Studies.
Blum, W. (2000). Rogue State: A Guide to the World's Only Superpower. Monroe, ME:
Common Courage Press. [sample chapters]
Byman, D. (1998). "The Logic of Ethnic Terrorism." Studies in Conflict and Terrorism
21: 149-69.
Byman, D., P. Chalk, B. Hoffman, W. Rosenau & D. Brannan. (2001). Trends in Outside
Support for Insurgent Movements. Santa Monica: RAND.
Chirot, D. & M. Seligman (eds.) (2001). Ethnopolitical Warfare: Causes, Consequences,
and Possible Solutions. Washington D.C.: American Psychological Association. [sample
pages]
Chomsky, N. (1992). What Uncle Sam Really Wants. Berkeley: Odonian Press.
Connor, W. (1994). Ethnonationalism: The Quest for Understanding. Princeton,
Princeton University Press.
Dartnell, M. (2001). Action Directe: Ultra Left Wing Terrorism in France 1979-1987.
London: Frank Cass & Co.
Drohan, W. (2005). "Narco-mercantilism and the War on Drugs: Is Victory an Option."
Pp. 319-328 in D. Clift, Learning with Professionals: Selected Works from the JMIC.
Washington DC: JMIC.
Ehrenfeld, R. (1990). Narco Terrorism. NY: Basic Books.
Ehrenfeld, R. (2003). Funding Evil: How Terrorism is Financed and How to Stop It.
Chicago: Bonus Books.
Giraldo, J. (1996). Colombia: The Genocidal Democracy. Monroe, ME: Common Cause
Press.
Gramsci, A. (1971). Selections From the Prison Notebooks. London: Lawrence &
Wishart.
Hoffman, B. (1999). Inside Terrorism. NY: Columbia Univ. Press. [sample chapter]
Horowitz, D. (1985). Ethnic Groups in Conflict. Berkeley: University of California Press.
Irvin, C. (1999). Militant Nationalism: Between Movement & Party in Ireland & the
Basque Country. Minneapolis: Univ. of Minnesota Press.
Kegley, C. (ed.) (1990). International Terrorism: Characteristics, Causes, Controls. NY:
St. Martin's.
Laqueur, Walter. (1999). The New Terrorism: Fanaticism and the Arms of Mass
Destruction. NY: Oxford Univ. Press.
McGarry, J. & B. O'Leary. (1993). The Politics of Ethnic Conflict Regulation: Case
Studies of Protracted Ethnic Conflicts. London: Routledge.
Napoleoni, L. (2003). Modern Jihad: Tracing the Dollars Behind the Terror Networks.
London: Pluto Press.
Parenti, M. (2001). (7e) Democracy for the Few. NY: St. Martin's Press. [sample chapter
of Against Empire]
Parenti, M. (2002). The Terrorism Trap. San Francisco: City Lights Books.
Smith, A. (1987). The Ethnic Origins of Nations. Oxford: Blackwell.
Webb, G. (1999). The CIA, the Contras, and the Crack Cocaine Explosion. NY: Seven
Stories Press.
Tragically, all major religions can justify violence, and religion has long been
associated with terrorism. Ever since there was good and evil, religious people have
pondered whether using evil to fight evil is good in the name of justice or self-defense.
There may be some kind of connection between attachment to the idea of God and a
proclivity toward violence. The most common resort to violence occurs when a religious
group feels threatened and thinks of itself as a chosen people. Less common is the
compulsion to slaughter others in the name of a deity, and even less common (although
not insignificant) is the role of sexuality in the mindset of religious fundamentalists who
kill. Religions also spawn sects, cults, and alternative religions, and religious terrorism
(terrorism in the name of religion) likewise tends to spawn offshoots and factions. A
sect is an offshoot of an established religion (Mormons, for example), and most either
die off or expand into a major denomination like the Mormons did. A sect-based
religious group is more likely to play the role of the victim, not the aggressor. A cult, on
the other hand, is a more dangerous, spiritually innovative group (the Branch
Davidians, for example) headed by a charismatic leader who usually has other aims than
to become a major denomination. Many cults are harmless, but others are into mind
control and some are into mass suicide. Still other cults have a doomsday orientation,
and these tend to be ones which engage in religious terrorism (such as Aum Shinri
Kyo). Any sect or cult can become involved in religious terrorism or it can just worship
terrorism (a terrorism cult). The motives can be wide-ranging, from engaging in
psychic warfare to expressive behaviors that are homicidal, suicidal, or both. Cults are
usually more dangerous than sects (see the Watchman Fellowship's List of Cults for a
near-complete list or Perlmutter's summary of occult religions).
There are four warning signs of a dangerous religious group: (1) apocalyptic thinking,
or eschatology, that the world is coming to an end, and true believers will enjoy unique
rewards at endtime; (2) charismatic leadership where the leader dominates the followers
spiritually, emotionally, and sexually; (3) paranoia and demonization of outsiders,
accompanied by intentional isolation within a cloistered community; and (4)
preparations of a defensive nature, usually indicated by a buildup of guns, poisons,
and/or weapons of mass destruction. Many terrorist experts (Lewy 1974; White 2002)
regard apocalyptic thinking as the first and most important danger sign. Let's briefly
examine some of the major world religions:
CHRISTIANITY: The most popular religion in the world (33%) and the one with the
most historical record of violence, much of it in-fighting. A person becomes Christian
by being born again (Conservatives), baptized (Protestants and Catholics), reciting the
Apostles' creed (Catholics), or having a personal relationship with Jesus (Liberals).
Eastern Orthodoxy rejects the Apostles' creed. The strongest bond involves
interpretation of the New Testament, although Fundamentalists (Extreme
Conservatives) believe the Bible is inerrant and not subject to modern interpretation.
ISLAM: The world's second largest (20%) and fastest growing religion. The word
Islam is derived from the word "salam", meaning peace or submission. Allah is a
word meaning one true God. Muslim is a word meaning a person who submits to the
will of God. A person becomes Muslim by becoming a follower of Islam, attending a
mosque (all are non-denominational), reading the Qur'an, holding six beliefs
(involving God, angels, messengers, Satan, Day of Judgment, and Jesus was no son of
God), and practicing five pillars (reciting a creed, praying 5 times a day, charity,
fasting, and pilgrimage). Sikhism is a cross between Islam and Hinduism that rejects
elitism and cherishes ceremonial weapons.
HINDUISM: The world's third largest (13%) religion and the oldest organized one.
The word Hindu comes from the Persian, from the Indian name for the river Indus -
Sindhu. The Persians commonly replaced the S sounds with H sounds, and Hindus to
them were people who inhabited the areas bounded by the Sindhu river. It is a religion
without a founder, and a person becomes Hindu by reading the sacred texts,
recognizing the holy trinity (Brahma the Creator, Vishnu the Preserver, and Shiva the
Destroyer), and practicing various hymns, incantations, and Yoga to commune your
soul with the unity of all reality. Most Hindus (80%) regard Vishnu as the ultimate
deity, although there are many sects. Hindus believe in transmigration of the soul, or
reincarnation, in judgment for good and bad acts.
BUDDHISM: The world's fourth largest (6%) religion, founded by Buddha in 535
BC. Buddha is a term meaning one who is enlightened or has awakened. In
Buddhism, there is no God, savior, heaven or hell, only a state of Nirvana achieved by
meditation and avoiding extremes of mortification and hedonism. Southeast Asia
practices Southern Buddhism which emphasizes karma. China, Japan and Korea
practice Eastern Buddhism, which celebrates festivals and is mostly a ruling class
religion. Tibet, Mongolia, and Russia practice Northern Buddhism (the Dalai Lama
being the ruler) which emphasizes pilgrimages to sites in Sri Lanka and India. There
are a variety of traditions mixed with local culture. Most Japanese (85%), for
example, also follow Shinto, an ancient nature worship religion, and Shintoists almost
always follow Confucianism (love of family) or Taoism (the force that flows thru
life).
JUDAISM: Not one of the world's largest (0.2%) religions, but one of the most
influential. The history of the Jews is chronicled in the Old Testament, which
corresponds to their sacred texts, the Torah being only five chapters of it. Jews
believe in an incorporeal God who is all-powerful (i.e., monitoring everything on
earth, but also merciful and just. There is no savior in Judaism, and the Jews are the
chosen people not because they think of themselves are superior but because they
believe, theologically, they have received more difficult responsibilities and will
receive more punishments if they fail. Synagogues are governed by the congregation,
the Rabbi being someone well educated. The main forms are Orthodox, Reform, and
Conservative (an intermediate position between Orthodox and Reform).
Professor Huntington (1996) in his book Clash of Civilizations makes the argument
that religion determines culture and that at least eight separate culture clashes are
occurring in the world today. The Middle East, of course, goes without saying, and he
points to the Balkan (Yugoslavian) region as a place where clashes between Christianity,
Orthodox Christianity and Islam often erupt into violence. Japan is another area ripe
for conflict, as is the Indian subcontinent and Hindu region. Latin America and Africa
will have emerging clashes, mostly Christian in-fighting, or in the case of Africa (which
is 40% Christian and 40% Muslim), an ultimate battle clash.
Religion often provides a mantle or cloak of respectability for terrorism. The JUST
WAR DOCTRINE is a religious precept, and as old as war itself (see Lecture on Laws of
War and Just War Theory for a detailed exposition on this). Parts of the Bible hint at it,
and St. Thomas Aquinas synthesized it in Summa Theologicae. While some argue that
nuclear weapons have made the doctrine outmoded, it might be illustrative to review the
basic principles here:
• A just war is only a last resort; all non-violent options must have been exhausted
• A just war is carried out by an authority with legitimacy; some society must
sanction it
• The only permissible reason for a just war is to redress an injury or wrong
suffered
• A just war should only be fought if there is a reasonable chance of success
• The ultimate goal of a just war is to re-establish peace
• Violence in a just war must be proportional to the violence of the injury suffered
• The weapons of a just war must discriminate between combatants and non-
combatants
Half of the world's thirty most dangerous terrorist groups claim religion as their
motivation. This motivation involves believing that their religion mandates acts of terror
as sacred duty in an endless, cosmic struggle for the best way to please God. Religious
terrorism has no military objective. A holy war, or jihad, is endless because it has a
spiritual objective. No one ever knows when God is pleased enough, and when the
situation in heaven matches the situation on earth. Nobody cares who or how many get
killed in spiritual warfare. It for this reason that experts say religious terrorism might
not be the world's most dangerous type, but it certainly is the most dedicated and
unpredictable (Juergensmeyer 2001). While some are, most religious terrorists are
NOT part of a sect or cult. Instead, most religious terrorists are are devout,
fundamentalist, "true" believers in their mainstream religion. The divine mandate for
destruction is regarded as the "neglected duty" within the mainstream religion, and
implied, directly or indirectly, in the sacred texts, or at least their interpretation of those
sacred texts. Religious terrorists also do NOT consider themselves terrorists, since they
say they do not enjoy violence for the sake of violence. They regard themselves as
religious activists or militants. Religious terrorists always seem to be spiritually
"prepared" for violence, and they have long past the point of having second thoughts or
doubts about it.
Religious terrorism is not countered by the same factors that counter other forms of
terrorism. Neither military nor diplomatic solutions seem to work. Cease fires and
negotiations also don't work, for example, with organizations containing no "secular"
wing. Only a few religious organizations (like the IRA) maintain a secular, or political
front. Hoffman (1999) argues that even groups with secular wings will act
unconstrained because they are playing to God and no one else. It's also plausible to
argue that religious terrorists don't want to win, since religion is at base an underdog
philosophy which needs an overpowering demonized enemy, or Great Satan. In many
ways, religious terrorism wants to fail because it adheres to some martyrdom notion of
being the world's "loser." This kind of losing ideology is called fatalistic suicide, and is
more common that egoistic and altruistic suicide. The greatest fear that most analysts
have is if weapons of mass destruction get in the hands of religious terrorists -- they have
no fear of destroying themselves and everybody else in the process.
IRISH TERRORISM
The model known as Irish terrorism is also a model for nationalistic terrorism, but
here, we will only consider the religious elements of it, and patterns that have emerged
between the Catholics (GREENS) and Protestants (ORANGE). Historically, most
Catholics were republicans living in the South, and Protestants were unionists (also
landlords and industrialists) living in the North. Each side had been arguing and
arming themselves since the 19th century. The first major conflict erupted on Easter in
1916 when the unionists called in British help, and the town of Dublin was demolished
by British artillery. The Irish Republican Army (IRA) was formed that day, and led
by Michael Collins, a student of Russian anarchism and terrorism. Murder and
mayhem followed until a brief peace came after creation of independent Southern
Ireland (the Republic of Ireland) in 1921. The struggle then shifted to Northern Ireland,
where the British tightened their hold by creating the Royal Ulster Constabulary (RUC),
a sort of semi-military police force, which became the favorite target of the Provisional
IRA (a Northern Ireland spin-off group affiliated with the Sinn Fein party -- another
spin-off group being the Irish Continuity Army, dedicated to international terrorism,
not just within Ireland). The Provisional IRA committed sporadic acts of terrorism
until 1994 when peace talks began, and a cease-fire was agreed to. During the cease-fire
(which some see as surrender), another spin-off group emerged - the Real IRA, which
is the group officially recognized as the present foreign terrorist organization although
there are still active elements of the Continuity IRA.
There are many theories of the Irish conflict, but any understanding must admit that
religion, politics, and economics are inseparably mixed. The three main denominations
in Ireland are Catholic, Church of England, and Presbyterian - all religions of
providence that emphasize the need for God's approval of secular affairs. Competition
for political influence runs high, and people vote along religious lines. Economic
discrimination (for jobs) also tends to revolve around religion. Everyone wants to
control the state for reasons of deeply felt religious and economic deprivations, and this
desire permeates all aspects of everyday life. Religion may not be the root cause of Irish
conflict, but it is definitely the fuel that flames the passions. Most Irish terrorism is in
the name of retaliation or retribution, and this kind of retaliation is driven by spiritual
conceptions of vengeance. The GREENS believe they are protecting their homeland
from human rights abuses at the hands of an illegitimate British government which is
unaccountable under any rule of law (Bloody Sunday being a reminder of this). The
ORANGE believe they are being betrayed by a peace-seeking British government and
must retaliate for more lethal, indiscriminate, and evil terrorism (the Omagh bombing
being a reminder of this).
Very often, religious terrorism is mixed with ethnic conflict. That is the situation on
the Indian subcontinent and throughout much of South Asia where one identifies as
______-speaking, ______-believing. Sri Lanka, a poor island south of India formerly
known as Ceylon, is a good example. There, about 75% of the people are Sinhalese-
speaking, Buddhist-believing, 12% of the people are Tamil-speaking, Hindu-believing,
and 8% of the people are Arab-speaking, Muslim-believing. The Tamils have long
hated the Sinhalese practice of infusing Buddhist philosophy into politics, but there are
moderate factions within the Tamils who believe that the Sinhalese can be bargained
with.
TAMIL TIGERS, or Liberation Tigers of Tamil Eelam
(LTTE), are a uniformed terrorist group with its own web
page who fight the Sri Lankan and Indian governments, as
well as any moderate Tamils who oppose their cause, which is
ostensibly a Tamil homeland, but in reality involves ethnic
and Hindu fanaticism (spiritualism, sexual asceticism, and cult
of suicide). Since 1975, they have killed thousands of people
and assassinated an Indian Prime Minister. Their fighting force is estimated at 10,000
(including women and children), and they are notorious for their suicide attacks. Their
international headquarters are in London and Paris, some have received training in
Lebanon, and they are known for their on-again, off-again truces of peace. Recognized as
one of the most effective guerrilla units in the world (on the Chinese-Cuban pattern), they
have for years virtually ruled the Jaffna peninsula. They have modern high-tech weapons,
including computers, SAM missiles, and their own small navy. They operate numerous
corporate business fronts which smuggle arms, drugs, and other commodities.
South Asia (which includes India, Pakistan, Afghanistan, Bangladesh and Nepal) has
the highest population densities in the world (Bombay = 127,000 people per sq mi. -
NYC only 24,000/sq mi), there are dozens of languages, low life expectancies, and not
enough food to go around (people believing more children means better chance of
growing food). After Mohandas Gandhi led a non-violent war of independence in 1947,
North India (which was primarily Islamic) became partitioned off from South India
(which was primarily Hindu), and Pakistan was born out of a mass migration. In 1971,
a ethnic conflict centered in Pakistan led to another mass migration, this time forming
Bangladesh. Since 1975, the Sikhs have controlled the "emergency zone" Punjab
region. India has experienced domestic terrorism at the hands of groups like Assam
(United Liberation Front of Assam) in the Bengali region. The result is a region with
scattered ethno-religious groups, all trying to exercise political clout or self-
determination in one way or another. The Kashmir conflict is a good example of this
kind of struggle or conflict.
Adherents of different religions often claim they cannot live with one other in the
same area. Buddhism tends to be practiced by people living in highland areas, Hindu by
lowland people, and Islam by city folk. In Buddhism, everything and everyone is equal.
In Hinduism (as well as Confucianism), everything is born unequal - some people are
born noble, others are not. Islam and Christianity tend to fuel the mix by adding
elements of fundamentalism, most notably in the notion of martydom, which is highly
attractive to the Asian region because it has the highest suicides rates of anywhere in the
world. Ethno-religious terrorism in the region baffles most experts. It is difficult to
distinguish religious and nonreligious motivation, and South Asian terrorism tends to be
heavily mixed with a criminal element, both organized and unorganized. Ahmad (2002)
is most likely right: the world probably has more to fear from a "Hindu bomb" than the
"Muslim" bomb one so frequently hears about.
The Yugoslavia region and the neighboring Balkans (Albania, Bosnia, Bulgaria,
Croatia, Hungary, Macedonia, and Romania) [see larger map of region] have long been
a region of ethnic and religious conflict. There are over 10 million Balkan Muslims
(Kosovo, Bosnia, and Bulgaria have over 2 million each), and anti-Muslim hatred runs
high as does anti-Christian hatred (the Serbs are Christian). Balkan Muslims are not
your average Muslims. They drink, smoke, celebrate Easter and Christmas, and are the
descendants of Christians who converted to Islam in the 15-16th century to avoid
persecution by the Ottoman Empire. Their sworn enemies are those of Serbian and
Slavic descent who happen to be decended from Orthodox Christianity who see their job
as protecting Europe from Muslim invasion. In the words of the Serb leader, Slobodan
Milosevic, they're "dirty rotten Turks who breed like rabbits, run drugs, flood Slav
lands with their alien offspring, and deserve to be sent back to Mecca where they
belong."
The Balkans
War was fought
from 1991 to
1999, with
America and
NATO involved
in the middle of
it, first with
Croatia (1991-
1995) where we
backed the
Muslims, then
with Bosnia
(1992-1995)
which is still
under U.N.
occupation, and
then with
Kosovo (1999)
where we
bombed
Belgrade and
other Yugoslav
cities,
accidentally
hitting a Chinese
embassy in the
process. The
Balkan war is
regarded by
most U.S. experts as a tragic mistake. There are an abundance of books on the subject, along
the lines of "NATO's Blunder" (Carpenter 2000). It was the first time American bombers
struck European cities since World War II, and it was the first first netwar of propaganda, as
charges of "real" terrorism and genocide bounced across the Internet. In retrospect, all sides to
the conflict committed atrocities. Croatia had a large Serbian population in the middle of the
country, and they fought hand-to-hand until NATO helped march the Serbs out at gunpoint. In
Bosnia, the town of Sarajevo was devastated, and U.N. peacekeepers observed such things as
"ethnic cleansing" where Serbian soldiers tried to impregnate non-Serbian women. In the late
1990s, over 5000 Kosovar people (a term coined by NATO - Kosovars consider themselves
Albanians or Kosovo Albanians), were killed by Serbian police and military, and another 1.5
million became refugees in nearby Albania, Macedonia, and Montenegro. The Kosovo
Liberation Army (KLA) were regarded as terrorists by Serbians, and the world is judging
Milosevic and the Serb leadership as terrorists. The Arab world tends to see U.S. and NATO
involvement in the conflict as an example of Christianity trying to wipe out Islam in one last,
great crusade. Today (2004), Kosovo is still officially a province of Serbia and Montenegro,
although it is governed by a UN regime (UNMIK) and patrolled by NATO forces (K-FOR
troups, consisting mostly of German soldiers). Violence is an almost everyday event, most of
the time involving Muslim Albanians killing Christian Serbs or burning down Christian
churches.
RELIGIOUS TERRORISM IN THE EURASIAN CONTEXT
The former Russia (Russian Federation) and its Caucasus region have long
experienced terrorism which escalated in 1999 with the start of Russia's war on
terrorism in Chechnya. The Chechens are a Muslim people (again not your average
Muslims) who hate the Russians, declared their independence in 1991, and beat the
Russians in a ground war from 1994-1996. Their cause has become the cause of Muslims
everywhere. In fact, the idea of an international mujahidin can be traced to the
Chechnya conflict. There is evidence of a Chechen connection to an al-Qaeda terrorist
network, and Chechen militants fought alongside al-Qaeda forces in Afghanistan and
Iraq. Chechen terrorism has spread throughout the region into Georgia, Azerbaijan,
Kyrgyzstan, Uzbekistan, and Moscow itself. One of the groups involved in spillover
violence is the Islamic Movement of Uzbekistan (IMU), but Chechnya produces plenty
of its own militant groups. The region is used as a base for financial and logistic
assistance to terrorist groups worldwide. The Islamic charity organization known as the
Global Relief Foundation had a headquarters in Chechnya, and is a known front for
financing terrorist groups. Russian organized crime is also heavily active in the region
and involved in arms smuggling. The Arab news network al-Jazeera frequently
broadcasts pictures of Chechen civilians killed in the Russian war on terrorism.
Numerous pro-Chechnya websites can be found on the Internet.
The Chechen terrorists are financed by the Chechen mafia as well as with Saudi
money (for building mosques) and Arab relief fronts. There are some 150 Chechen
mafia groups operating in or near Moscow, and they seem to prefer London, rather than
Switzerland, as their money laundering center. They are constantly engaged in gang
warfare with other Russian gangs, most notably the Solntsevskaya, and of course, in
making whatever profit they can from criminal activity. Chechen terrorism is largely
successful because the Chechen mafia obtain and pass on intelligence obtained from
bribing Russian military personnel. Both Chechen and Russian mafia groups have been
involved in the nuclear black market, smuggling depleted plutonium, cesium, and other
radioactive material that makes "dirty" bombs. An in-depth analysis of Chechen
terrorism is called for.
• "Today, war proceeds in a haphazard manner. Mujahideen (holy warriors) know what
to do, and nether I nor other leaders are required to tell them much. Everyone has
grown as a soldier, knows how to make a mine from practically any substance, learnt to
war, and the tactics we have employed -are the tactics of bees, when incessant little
stings overwhelm the enemy by number."
• "The world is slipping - exactly slipping - into World War III. It seems to have already
started, waiting for the moment to burst out, for the current injustice and current chaos
created by the top tyrants - the USA and Russia - will inevitably ignite a major conflict,
and by the mercy of Allah, we prepare for it."
• "With regard to peaceful enemies, you'd better refrain from illusions; the war will come
to every house of yours, for the entire of Russia and the world is engaged in war. Do
not assume that we consider you as peaceful population. We consider you as unarmed
military men, because those who by majority approve the genocide of the Chechen
people cannot be peaceful population. According to the law of Shariate, mere verbal
approval of war ranks peaceful citizens among the enemy."
• "Believe me, multiple new military groups arise in Chechnya today, of which neither I
nor Maskhadov nor anyone else is in control. The groups act autonomously today,
doing whatever they think appropriate."
RELIGIOUS TERRORISM IN THE NORTH AFRICAN CONTEXT
Sudan is the largest country in Africa (roughly the size of Europe), and located south
of Egypt. It has been a war zone since it's independence from Britain in 1954. Years of
dictatorships and military coups have been the norm, with the situation escalating in the
1990s to genocide. Northern Sudan (the safer region) consists of 8 million Arabic-
speaking Muslims, and an indigenous black Nuba population which the current
government has been trying to exterminate. Southern Sudan consists of 6 million black
Africans who are Christians or animists (animism is a primitive religion that every
object, even a rock, has a soul). The current government's goal is to become Africa's
first all-Islamic nation, so Islamic Law and Jihad are used to persecute and execute any
non-believers. Christians, in particular are regularly murdered, raped, maimed, or
forced into slavery. The National Islamic Front regime which holds the capital city of
Khartoum regards Christian missionary activity as Western invasion. Osama bin Laden
hid for many years in Sudan. Next to Iran, Sudan is one of the world's largest sponsors of
terrorism, but it is trying to change that, and began cooperating with America's war on
terror in 2002, but American intelligence and diplomatic officials are quite suspicious of
Sudan's sincerity in this regard.
The United States has spent about $30 million in covert aid to the rebel forces in
Sudan while at the same time sending $100 million in humanitarian aid. U.S. officials
deny that the covert aid was military, describing it as 'non-lethal' - radios, uniforms,
boots, tents, etc. The rebel groups are split and factionalized, the strongest one being the
Sudan People's Liberation Army (SPLA). Other include the Sudan People's Liberation
Movement (SPLM), and its armed wing, the SPLM/A (A for Army), the Sudanese Allied
Forces (SAF), and the United Democratic Salvation Front (UDSF). In the opinion of
most military experts, none of these rebel groups ever has a chance of winning against
the stronger, government NIF/GoS forces.
Many religious cults tend to form in Africa, and much of it involves distorted forms of
Christian fundamentalism which mix witchcraft with what might be called
Pentecostalism. This is prevalent in Ghana, Malawi, Zambia, Zimbabwe, and Nigeria,
but we'll focus on Uganda, a country located directly below Sudan. Like many
Africans, Ugandans believe in witch-doctors, who not only attempt to heal the sick
(usually by cutting off a body part), but provide financial and marital advice. Christian
missionaries in the region usually report having a hard time explaining things like
witches and devils. Africans, however, are intensely interested in anything to do with
salvation and putting troubles behind you to start a new life. At least one terrorist cult
group, the LRA, has exploited these desires. The LRA, in existance since 1989, has an
agreement with the National Islamic Front/Government of Sudan (NIF/GoS) that they
would support the NIF/GoS in their jihad against the Southern Sudanese, if the
NIF/GoS would support the LRA.
At last count, there were 57 separate nations with Islam as the official religion or a
substantial part of the population consisting of Muslims. These nations belong to a
group called the Organization of the Islamic Conference (OIC) which has gone on
record saying there's no such thing as separation of church and state. There is even no
such thing as a secular religion, like the official Church of England religion in Great
Britain. There appears to be three schools of Muslim thought on the subject. The
majority group believes that it is the sacred mission of Islam to rule the world by use of
the sword if necessary. Another group accepts cohabitation with other religions as long
as Islam is the world's pre-eminent religion. A third group, the moderates, advocates
co-existence primarily because of the economic benefits it brings. Bearing the scars of
life and an inability to develop constitutional democracies, Middle Eastern countries
take particular umbrage at the existence of Israel, the history of which follows.
The area known as Palestine is an ancient land which has always been populated by
Arab Muslims, Arab Christians, and Arab Jews. In 1917, the British promised to help
create a Jewish "national home" in Palestine. Arab protests began in 1920. In 1919
there were 568,000 Muslims, 74,000 Christians, and 58,000 Jews in Palestine. Fifteen
thousand Jews a year immigrated during Hitler's rise to power, and some 100,000 death
camp survivors came later. Today, there are 1,091,000 Muslims, 614,000 Jews, and
146,000 Christians in Palestine. Wars have been fought in 1948–49, 1956, 1967 (The Six
Day War), 1973–74 (The Yom Kippur War), and 1982 between Israel and the Arab
states.
The current conflict centers on two Israeli-controlled territories. The West Bank [see
map] has the largest percentage of Arab Muslims, and the conflict there revolves around
the status of Jerusalem (the center of three great religions). The Gaza Strip [see map] is
another Muslim area where the intifadah (grassroots uprising) began, and refugee camp
conditions are worse than in the West Bank. The religious backdrop to the situation is
heavily mixed with anti-U.S. sentiment, where the U.S. is seen as supporting Israel
only because of American oil interests. Further, the U.S. is seen as being responsible for
militarizing the region (the Middle East is the most militarized region in the world) and
propping up corrupt Arab governments. In addition, American culture is seen as
hopelessly racist, or at least stereotypical, in the way it portrays Arabs - as the bad guys
in movies, cartoons, war films, and popular conception, up to and including the latest
way Americans easily roll the words "Islamic terrorism" off their tongues.
It's hard to walk the line between cultural sensitivity and stereotype. Suffice it to say
that opinions vary, but some believe Islam doesn't mean peace, but submission - to the
will of Allah to "fight and slay the unbelievers wherever you find them, and seize them,
beleaguer them, and lie in wait for them in every stratagem of war" (The Koran, Surah
IX:5). If these viewpoints are true, then there really is such a thing as Islamic
terrorism [see Lecture on Islamist Extremism]. There are, indeed, organizations
dedicated to Islamic domination of the world, just as the great "breakout" of Islam
during the 7th Century that resulted in the Arab "golden age." At the forefront of this
idea are Muslim clerics most likely kept quiet by their governments, and in some ways is
an adequate description of Osami bin Laden's goals for al-Qaeda. In the Philippines and
Malaysia, there's the Abu Sayyaf group. In Algeria there's the Armed Islamic group. In
Egypt there's Al-Gam'a al-Islamiyya and Al-Jihad. Other Islamic groups simply hate
Israel and want to destroy it. Hamas, Hezbollah, the Popular Front for the Liberation
of Palestine, and the Palestinian Liberation Front are such groups. We'll deal first with
the terrorist origins of the PLO.
The Palestine Liberation Organization (PLO) is
the coordinating council for all Palestinian
organizations, founded in 1964 at the first Arab
summit meeting. The dominant group is Al Fatah,
headed by Yasir Arafat [see psychological profile]
who formed a group of warriors known as fedayeen,
and became chairman of the PLO in 1968. Other
groups include Syrian-backed As Saiqa and the
Marxist-oriented Popular Front for the Liberation of
Palestine (PFLP). Since its founding, the PLO has
been committed to the destruction of Israel, and over the years involved in acts of
terrorism. It toned down its rhetoric and acts of terrorism in 1974 when it received
UN recognition as a government in exile. Israel invaded Lebanon in 1982 and
dispersed many PLO terrorists, and in 2002 again launched a campaign in the West
Bank. At one time, Abu Nidal was part of the PLO, but a rift with Arafat developed,
and the two became mortal enemies. Arafat has also been unable to control HAMAS,
founded in the Gaza Strip during 1987 as the main Palestinian rival to the PLO.
Hizbollah [see their website] is primarily an Iranian-sponsored Lebanese movement
that behaves more like a militia than a terrorist group.
Other Middle Eastern groups are more closely linked to Muslim fundamentalism than
the Palestine issue, and fundamentalism in this context bridges both Sunnis and Shiites,
and can be seen as anti-Americanism - an outright hatred of American values and
culture couched in the language of religion. A few leaders of these groups have openly
called for the deaths of Americans on a global scale. The foremost character in this
regard is Osama bin Laden and his group, al-Qaeda, which are perhaps marginal
players compared to the global Islamist threat or perhaps the strongest, most dangerous
of such a threat. Expert opinion varies over this; see the 2005 CRS Report entitled Al
Qaeda: Profile and Threat Assessment (pdf).
Al Qaeda ideology, to which Osama Bin Laden and others like him represent, is an
admixture of various Koranic misinterpretations and a hatred of the U.S. and/or all
westernized things. The following is an excerpt of the entire Introduction to the Al-
Qaeda Training Manual (UK/BM Translation, captured by the Manchester England
Metropolitan Police during a search of a home, found in a computer file described as the
"military series" related to the "Declaration of Jihad; the manual was translated into
English and was introduced at the embassy bombing trial in New York).
Martyrs were killed, women were widowed, children were orphaned, men were
handcuffed, chast women’s heads were shaved, harlots’ heads were crowned, atrocities
were inflicted on the innocent, gifts were given to the wicked, virgins were raped on the
prostitution alter.
After the fall of our orthodox caliphates on Marcy 3, 1924 and after expelling the
colonialists, our Islamic nation was afflicted with apostate rulers who took over in the
Moslem nation. These rulers turned out to be more infidel and criminal than the
colonialists themselves. Moslems have endured all kinds of harm, oppression, and torture
at their hands.
Those apostate rulers threw thousands of the haraka Al-Islamyia (Islamic
Movement) youth in gloomy jails and detention centers that were equipped with the most
modern torture devices and (manned with) experts in the oppression and torture. Those
youth had refused to move in the rulers’ orbit, obscure matters to the youth, and oppose
the idea of rebelling against the rulers. But they (the rulers) did not stop there; they started
to fragment the essence of the Islamic nation by trying to eradicate its Moslem identity.
Thus, they started spreading godless and atheistic views among the youth. We found some
that claimed that socialism was from Islam, democracy was the (religious) council, and
the prophet – God bless and keep him – propagandized communism.
Colonialism and its followers, the apostate rulers, then started to openly erect
crusader centers, societies, and organizations like Masonic Lodges, Lions and Rotary
clubs, and foreign schools. They aimed at producing a wasted generation that pursued
everything that is western and produced rulers, ministers, leaders, physicians, engineers,
businessmen, politicians, journalists, and information specialists. [Koranic verse: as
Allah’s enemies plotted and planned, and Allah too planned, and the best of planners is
Allah]
They (the rulers) tried, using every means and (kind of) seduction, to produce a
generation of young men that did not know (anything) except what they (the rulers) want,
did not say except what they (the rulers) think about, did not live except according to their
(the rulers) way, and did not dress except in their deception back on them, as a large
group of those young men who were raised by them (the rulers) woke up from their sleep
and returned to Allah, regretting and repenting.
The young men returning to Allah realized that Islam is not just performing rituals
but a complete system: Religion and government, worship and Jihad (holy war), ethics
and dealing with people, and the Koran and sword. The bitter situation that the nation has
reached is a result of its divergence from Allah’s course and his righteous law for all
places and times. That (bitter situation) came about as a result of its children’s love for
the world, their loathing of death, and their abandonment of Jihad (holy war).
Unbelief is still the same. It pushed Abou Jahl – may Allah curse him – and
Kureish’s valiant infidels to battle the prophet – God bless and keep him – and to torture
his companions – may Allah’s grace be on them. It is the same unbelief that drove Sadat,
Hosni Muberak, Gadhafi, Hafez Assad, Saleh, Fahed – Allah’s curse be upon the non-
believing leaders – and all the apostate Arab rulers to torture, kill, imprison, and torment
Moslems.
These young men realized that an Islamic government would never be established
except by the bomb and rifle. Islam does not coincide nor make a truce with unbelief, but
rather confronts it.
The confrontation that Islam calls for with these godless and apostate regimes,
does not know Socratic debates, Platonic ideals nor Aristotelian diplomacy.
But it knows the dialogue of bullets, the ideals of assassination, bombing, and destruction,
and the diplomacy of the cannon and machine-gun.
The young came to prepare themselves for Jihad (holy war), commanded by the
majestic Allah’s order in the holy Koran. [Koranic verse: Against them make ready your
strength to the utmost of your power, including steeds of war, to strike terror into (the
hearts of) the enemies of Allah and your enemies, and others besides whom ye may not
know, but whom Allah doth know.]
I present this humble effort to these young Moslem men who are pure, believing,
and fighting for the cause of Allah. It is my contribution toward paving the road that leads
to majestic Allah and establishes a caliphate according to the prophecy.
When speaking of al-Qaeda, one should strive to be clear if they are speaking of: (a)
traditional al-Qaeda, the group which attacked the US on 9/11; (b) ideological or
doctrinal al-Qaeda, the leaderless followers who simply believe in the same ends; or (c)
the new al-Qaeda, which is part of the insurgency in Iraq targeting other Muslims. The
second type is likely to be rather unpredictable, and the third type is likely to be far
more dangerous, as newer, younger members may see the old, core members as
something of an anachronism, and may try to carry the torch further. One of the
lessons regarding religious terrorism is that it almost always involves change in the form
of "transmutation" or what White (2002) awkwardly calls "transmogrification." It is
therefore difficult to characterize such a threat in absolute terms.
INTERNET RESOURCES
Is The Conflict in Northern Ireland Really Religious?
Christian Fundamentalism in Africa
CNN Special Report on the Status of Jerusalem
Council of Foreign Relations Q&A on Chechnya
Council of Foreign Relations Q&A on Sudan
Field Manual of the Christian Militia
History Guy's Links on Conflict in Northern Ireland
LTTE Terrorist Attacks and Related News
Overview of the Kashmir Conflict
PsyBC Psychology of Religious Fundamentalism
Religious Populations of the World
ReligiousTolerance.org
Ritualistic and Occult Crime
TamilNet.com
Terrorism on the Indian Subcontinent
The Arab-Israeli Wars
The Jewish Post of New York
The Northern Ireland Conflict (1968-present)
The Spiritual Meaning of Jihad in the Muslim Religion
WebQuest of Balkan Conflicts
Wikipedia Talk: List of Organizations in Religious Terrorism
Yahoo Coverage of Hague War Crimes Tribunal
Yahoo's List of Buddhism Links
Yahoo's List of Hindu Links
Zipple: The Jewish SuperSite
PRINTED RESOURCES
Ahmad, A. (2002). Lineages of the Present: Ideology and Politics in Contempory South
Asia. NY: Verso Press.
Barnett, R. (2003). Asymmetrical Warfare. Washington DC: Brasseys.
Benjamin, D. & S. Simon. (2002). The Age of Sacred Terror. NY: Random House.
Carpenter, T. (2000). NATO's Empty Victory: A Postmortem on the Balkan War.
Washington: CATO Institute.
Coogan, T. (1994). The IRA: A History. Niwot, CO: Roberts Rinehart.
Cooper, B. (2004). New Political Religions, or An Analysis of Modern Terrorism.
Columbia: Univ. of Missouri Press.
Gifford, P. (1998). African Christianity. London: Hurst.
Ellis, M. (1997). Unholy Alliance: Religion and Atrocities in Our Time. Minneapolis:
Fortress Press.
Esposito, J. (1999). (3e) The Islamic Threat: Myth or Reality? NY: Oxford Univ. Press.
[sample chapter]
Hoffman, B. (1999). Inside Terrorism. NY: Columbia Univ. Press.
Huntington, S. (1996). The Clash of Civilizations and the Remaking of World Order. NY:
Simon & Schuster.
Juergensmeyer, M. (2001). Terror in the Mind of God: The Global Rise of Religious
Violence. Berkeley: Univ. of California Press. [sample pages]
Laqueur, Walter (1999). The New Terrorism. NY: Oxford Univ. Press.
Lewis, B. (1985). The Assassins: A Radical Sect in Islam. London: Al Saqi Books.
Lewis, B. (2003). The Crisis of Islam: Holy War and Unholy Terror. NY: Modern
Library.
Lewy, G. (1974). Religion and Revolution. NY: Oxford Univ. Press.
Neusner, J. (2003). World Religions in America. NY: Westminster John Knox Press.
O'Dowd, L. (1980). Northern Ireland: Michael Collins, Between Civil Rights and Civil
War. London: CSE Books.
Perlmutter, D. (2004). Investigating Religious Terrorism and Ritualistic Crimes. Boca
Raton, FL: CRC Press
Poole, J. (2004). Tactics of the Crescent Moon: Militant Muslim Combat Methods.
Emerald Isle, NC: Posterity.
Reich, Walter (Ed.) (1998). Origins of Terrorism: Psychologies, Ideologies, Theologies,
States of Mind. Washington D.C.: Woodrow Wilson Center Press.
Shay, S. (2001). The Endless Jihad. Herzliya, Israel: ICT.
Stern, J. (2003). Terror in the Name of God: Why Religious Militants Kill. NY: Harper
Collins.
Venzke, B. & Ibrahim, A. (2003). The al-Qaeda Threat. Alexandria, VA: Tempest.
White, J. (2002). Terrorism: An Introduction. Belmont, CA: Wadsworth.
Whittaker, D. (2002). Terrorism: Understanding the Global Threat. London: Longman.
For example, the term "jihad" simply does NOT have negative connotations for most
Muslims, even when used in the context of describing terrorist purpose or action.
Although it is true Muslims have debated the meaning of the term for centuries, any
Westerner who uses the term to describe a jihadist (or mujahidin) in a negative way
makes himself the enemy of all Muslims. Similarly, anyone who says that Muslims
worship the same God (emphasizing the God of Abraham as the common heritage of
Judaism, Christianity and Islam) simply does NOT understand that Muslims regard
their God as different, with Abraham as the first Muslim, with Moses and Jesus having
it wrong, and with Mohammad bringing it down perfectly (see Is Allah God?).
However, some basic distinctions can be made. First of all, anyone labeled an
"extremist" generally resorts to (or thinks in terms of) a militant solution first and finds
justification for it in faith or the literal meaning of text (e.g., "when texts have spoken,
reason must be silent"). It is this silencing of reason which characterizes an extremist.
A moderate is inclined to supplement their faith with reason, the power of mind, and
freedom of thought, before considering a militant solution. The whole "faith then
reason" versus "reason then faith" juxtaposition is, of course, quite familiar as a
Western dichotomy derived from the Augustine/Aquinas debates (see Lecture on
Scholastic Medievalism), but it should be noted many intellectual forms of Islam go far
back before then, to philosophical differences with the ancient greeks and/or the
reception of Aristotle (Bertolacci 2006). Militancy is also a word we should define. A
militant solution usually means an irregular fighting force is put together of some kind,
which is a common denominator with insurgency, insurrection, armed resistance, and
(quite often) terrorism. An inclination to use force or at least to count on it during
protest and demonstration characterizes a militant. It is probably the case that
extremists and militants outnumber moderates in the Muslim world, but differences of
opinion (among world leaders) lead to consideration of at least "some" militancy and
extremism as not always breeding terrorism. Many Muslim countries (Pakistan, for
example) tolerate some forms of militancy and extremism because they don't see it as
always breeding terrorism. The analysis contained herein only examines a limited
number of extremist and moderate types (a Part II of Islamist Extremism is in the
works). Calling upon academic free inquiry, one can also urgently demand that an
examination of what seems to be recurrent problems with Islam be conducted, and
toward that end, two hypotheses about the religion are usually considered good starting
points -- (1) that Islam is inherently violent - and (2) that Islam is susceptible to
hijacking or distortion which promotes violence. These hypothesis seem to organize the
literature fairly well, and their examination is followed by some in-depth analysis of
many specific issues. Westerners, especially Americans, are curious. What is it about
those militant strands of Islam that seem to spawn so much bloodshed in the world?
Much of what is to be discussed here will seem foreign and incomprehensible from a
Western viewpoint. Therefore, some practical conceptual framework might be useful at
the outset, especially when discussing terrorism which is apparently driven by deep
religious conviction. The Lecture on Religious Terrorism only touched on this -- and it
is the rare secular mind that can comprehend the depth of religious passion within
Islamist extremism (perhaps fanaticism is a better term). Readers might find useful the
framework provided by Cooper (2004) which draws upon the concepts of "political
religion" (from the philosopher Eric Voegelin) and "pneumopathology" (from the
philosopher Friedrich Schelling). In the fields of political science and sociology, the
term "political religion" usually refers to an ideology where the goal is to create a form
of politics with the same power as religion. Totalitarianism and theocracy are terms
often associated with this, but are not absolutely necessary conditions, as even
democracies can develop things like "civil religions" around events like SuperBowl
Sunday (the favorite example of sociologists who study such things). There is some
debate among scholars about the exact role of the cult of personality in political
religions, and Cooper (2004) is illustrative of modern debates over whether such
phenomena are really forward-looking (modernist) or backward-looking
(fundamentalist). The term "pneumopathology" refers to a disease of the spirit, an
imaginative second reality (being deranged by one's own beliefs) which explains the
world in different terms than what common sense would provide. In short, it refers to a
religious conviction so strong and intoxicating that it blinds a person to common sense
and makes it impossible for anyone to reason with them. As Cooper (2004:40) puts it:
"there is an inherent friction between commonsense reality and the occult reality within
which the terrorist lives imaginatively, an imaginary reality where killing the innocent
to impress others is understood to be heroic, altruistic, and self-sacrificing." As a leader
of Hezbollah put it: "we are not fighting so that the enemy recognizes us and offers us
something. We are fighting to wipe out and annihilate the enemy."
Armed with frameworks and terminologies, it can be seen that the war on terrorism
(as war on Islamist extremism) is, in some sense, a contest of souls (a spiritual war and
more than an ideological or conceptual war, if you will) where the order of battle
involves who has the strongest belief system regarding the best system of
interrelationships between worlds (i.e., the spiritual, secular, religious, commercial
worlds, etc). Within the predominantly spiritual universe that is Islamist extremism,
terrorists guided by it genuinely believe they are heroic, more heroic and successful than
any soldier or businessman could ever be. The hero fantasy consumes their
imagination. Extremists are, after all, defending their god, and coming closer to their
god. The acts of destruction that they engage in (any destruction being a victory) bring
value to the cause and are a vivid proof of faith. The act of terrorism might be publicly
condemned but secretly admired by most Muslims, even moderates. Any terrorist
acting in the name of Allah (particularly within the Wahhabi view that the world ought
to be Muslim) is to be revered and admired. Such terrorists are the Middle East's
longed-for superhero, and seek to be the next best thing to the Mahdi or the Twelfth
Imam. They are not deterred by weapons, for they know that weapons will not destroy
their cause. The terrorist longing for union with god thru carnage is inseparable from
the impulse toward annihilation. Their goals and ambitions soar above logic, and they
have created a fantasy world (a second reality) in their minds about an angry god who
wants to pat them on the back for slaughtering apostates or nonbelievers (shunning the
usual religious response to apostasy as not being good enough). America is hated
precisely because its power and the Western viewpoint threatens much that is central in
the promises of their faith.
At the outset, it must be noted, as Khan (2006) does, that this particular hypothesis --
that puritan Islam is inherently violent and Muslim militants are addicted to carnage --
has had a counterproductive effect in promulgating an ontology where significant
negative changes are taking place in international law, such as expansion of preemptive
war doctrine and other reactionary practices are ascendant (e.g., declining civil liberties,
prescribed extra-judicial killings, torture, renditions, indefinite detentions, and
numerous other human rights violations). There are as many evil necessities in
counterterrorism as there are in terrorism. There are also many ways Islam easily
serves as a mantle or cover for terrorism, although I wouldn't go so far as to say Islam
always and inevitably leads to terrorism, as some have said who advocate this hypothesis
(Wright 2001; Lewis 2003), and do so on the basis that the only sense in which Islam is a
religion of peace is when all nonbelievers are converted and there is no occasion for war;
i.e., the final command of Mohammed in the Quran is carried out -- to conquer the
world in the name of Islam (9:29). Islam is not a pacifist religion which values passive
witnessing, but in all fairness, other religions have promoted violence or been quite
pushy about how they go about witnessing their faith (see Gabriel 2002 for a comparison
with Christianity). Islam, however, seems to have particularly assembled all the right
ingredients for being violent-prone or at least non-democratic in its method of conflict
resolution. From most interpretations, warfare of some kind is always mandated
against nonbelievers. Twenty-six (26) chapters of the Quran deal with jihad, a fight
able-bodied believers are obligated to join (Surah 2:216), and the text orders Muslims to
"instill terror into the hearts of the unbeliever" and to "smite above their necks" (8:12).
Further, the "test" of loyalty to Allah is not good acts or faith (as is common in
Christian religion), but martyrdom which results from fighting unbelievers to the death
(47:4), fighting the good fight being the only assurance of salvation in Islam (4:74;
9:111). Much of this is, of course, subject to scholarly debate (the most frequent
grounds for such debate being that passages are takenout of context, but that is
something all religious doctrines are subject to). Yet, just by looking at certain passages,
one can easily find support for the "violent Islam" hypothesis -- passages such as the
following: the sins of any Muslim who becomes a martyr are forgiven by the very act of
being slain while slaying unbelievers (4:96), and those who are unable to do jihad, such
as women or the elderly, are required to give "asylum and aid" to those who do fight
unbelievers in the cause of Allah (8:74). Then, of course, there is the so-called X-rated
vision of Paradise, to wit: martyrs are rewarded with virgins, among other carnal
delights, in Paradise (38:51, 55:56; 55:76; 56:22). Regarding asylum privileges, it is
unknown why the Muslim practice of asylum never developed along the forty-day rule
of medieval Western common law, yet seems to have evolved into some sort of lenient,
international law approach to political asylum.
Fifty-seven (57) nations in the world support Islam as part of their dictatorship or
theocracy, and it is the world's second-largest (20%) and fastest-growing religion among
the oppressed and disenfranchised. There are no formal denominations to speak of
(other than Shiite and Sunni, but all mosques are ostensibly non-denominational), and it
is perhaps more accurate to talk about schools of thought, sects, or cults. Even then,
those terms don't fully capture the richness and depth of Islamic variation since there
are "religious" schools of thought (Sunni and Shiite), "political" schools of thought
(chronological and geographical Renaissance periods), "legal" schools of thought
(Islamic jurisprudence about Qur'anic interpretation), and the traditional distinctions
between sect (offshoots such as Salifism) and cult (breakaways such as Qutbism) don't
apply all that well. There are strange offshoots of Islam, some of which seem to
"insulate" societies from terrorism, or at least produce a different variety. Such is the
case, for example, with the peculiar religion of the Omanis, who are followers of
Abdallah ibn Ibadah al-Maqdisi's branch of Islam, a breakaway from the Khariji
("quietist") movement in Basra in 650 AD. Some experts suggest that the movement is
an offshoot of a dissident Shiite sect hailing originally from Ibadh in Saudi Arabia,
which was introduced to Oman in the eighth century. Experts also believe Oman (a
25% Sunni society that is fairly open to Israel) has been relatively free from terrorism
precisely because of its religion, with Janardhan (2006) explaining this as follows:
Oman is the only Ibadhi country in the world, with its tenets closely linked to the Maliki
Sunni school, and Ibadhism rejects primogeniture succession and asserts that the
leadership of Islam should be designated by an imam who is capable and elected by the
people, where both political and religious leadership are vested in an imam. What little
terrorism exists in Oman is usually seeded from the ideology of imama ("rule of the
imam") and its values, and most dissidents typically argue that their intention is not to
overthrow the regime, but to spread the Madhab ("Islamic jurisprudence") of Ibadhi.
Jails and pardons are the typical punishments. Many Muslims consider the Ibadhi
orientation unorthodox, but it has conditioned the society in such a fashion that it is
extremely conscious of sectarian affiliations and avoids things along divisive lines.
In one respect, it seems that the ascetic monotheism in Islam insists that the religion
be defined more by opposition than affirmation. As such, Islam and Islamic extremism
are undeniable social movements to be reckoned with, as believers think their prophet
being the last to appear in the Holy Days makes Him the real messenger of God, and
that anyone believing otherwise is an "infidel" or apostate deserving of less-than-human
dignity and worth. There is a strong anti-secular thrust in Islam along with a belligerent
superiority that make it dangerous, but perhaps no more than certain puritanical or
reconstructionist strains in other religions. What Islam needs is a Reformation period
like the Protestant Reformation that occurred in Christianity (An-Na'-Im 1996), but it
has only had a Renaissance period with Ba'athism -- that fascist, pan-Arabic, secular
movement which started in Syria during the 1950's - Ba'ath meaning "renaissance" or
"rebirth" in Arabic. However, far more important in Muslim history was the Mongol
destruction of Baghdad in 1258 and killing of the last Caliph. Muslims believe this
historical event brought down God's scourge upon them, and the appropriate response
is to recover the purity of the early companions [Salafs] of the Prophet, called Salafism
after the term for "venerable forefathers" or "early companions." A central component
of this response is the notion of jihad, but far more important for Westerners to try to
understand is the fairly-complicated concept of "caliph" which is, again, a term
Muslims would prefer non-Muslims try not to meddle with.
With respect to political correctness over issues and terms like Islamofascism, it may
or may not be useful to sort out which things Muslims find insulting and which things
they just need to get over about. Cartoons are but one example, but nonetheless, it is
important to be sensitive to genuine socio-cultural differences. There are twenty-one
(21) nations where some form of Arabic is the national language, and although not all
Arabs are Muslims, the notion of an "Arab world" or "Muslim world" has great appeal
to believers. This is because they see themselves as belonging to a super-nationality that
goes beyond traditional nation-state boundaries (it's called the Muslim umma or
Ummah, the community of believers). It's not that they aren't patriotic to their native
country; it's that their allegiance to this super-nationality is greater. Collectivity
arguments aside, much of this is because they desperately want a counterpart to the
Jewish notion of Zionism. It's almost impossible to understand the Arab or Muslim
mindset without reference to an intense hatred of most Jews and all of Zionism. Even if
the Jews were to leave the Middle East, Muslims would still feel threatened by Zionist
conspiracies because many Arabs see Jews as subhuman criminals who hide behind
democracy and work in the shadows. Christians are seen as a more insidious threat - an
irredeemable, immoral, corrupt, greedy, selfish, sinful, crusading people who hide
behind the name of capitalism (See answering-christianity.com). America is seen as the
second Israel, because it supports the Zionist entity. In the Muslim mindset, concepts
like tolerance, democracy, pluralism, and freedom are meaningless when spoken by a
Westerner because Arab trust, as among many in the Third World, has been broken by
years of colonialism, imperialism, capitalism, and globalism. Most Muslims see the
noble intentions of the West as mere slogans that disguise the true goals of political
domination, religious conversion, and economic exploitation.
Interviewing and negotiating with terrorists (ideally, ex-terrorists) are probably the
only ways to prove at least some of the many forms of this hypothesis -- that radical
extremists have "brainwashed" the Muslim population in some way. It is also true that
increased American understanding is vital for any improved understanding of the
religious underpinnings of Islamic extremism of most relevance or interest, and for
that, a delineation of the scope of concerns is needed. As anyone on the receiving end of
terrorism has the right to be, victims are deservingly concerned with understanding at
least the following: (1) how easy it seems for some Islamic extremists to justify the
senseless slaughter of innocents in the name of religion; (2) how blowing yourself up
with as many other people around you can possibly be seen as religious obligation or
martyrdom; and (3) like El Fadl (2002) asks, how can a morality be so blindly convinced
it's the only way of life that it tramples all over the rights of others.
The following extremist movements are all currently active in the Muslim world, and
it is the thesis of writers like Esposito (1999) and others that these movements have all
engaged in hijacking mainstream Islam, much as Elijah Muhammad hijacked it to
claim whites were a race created by an ancient evil scientist (see Nation of Islam
homepage or Wikipedia article), although America has less to fear from the Black
Muslim movement than from more dangerous splinter groups like the five percenters
(an ideology popular with hip hop and rap musicians) or Jamaat al-Fuqra (a Pakistani-
American terrorist cult). Discussion of any extremism, of course, begs the question
"extreme to what?" and one would be hard pressed to define "mainstream" Islam in
any case. Sunni Islam and Salafism (explained below) are the most likely "mainstream"
contenders, but Islam is essentially an open religion that sees itself as a complete code of
life. All it takes to become a Muslim is to believe in the Six Beliefs, practice the Five
Pillars, and take an oath. How mainstream or orthodox a believer is depends upon how
fervently they practice their religion, and it is the translation of belief into practice that
has produced the most opportunities for extremists to hijack mainstream Islam (see
Wikipedia article on Islam).
While the Shiite branch of Islam experienced a revival as early as 1979, the Sunni
branch of Islam started experiencing it's own revival of fundamentalism around 2001,
and an interest developed in ideas that had been around a long time, like Wahhabism,
which in many respects is the official ideology of university professors in much of the
Middle East. Recently, Sunni extremism has increased while Shiite extremism has
declined. Usama bin-Laden was raised a Sunni, and even though the Taliban rode the
coattails of the Shiite revolution, the Taliban also executed many Shiite citizens and
diplomats on soccer fields. To reconcile the tendency for Shiite extremism to result in so
many dead Shiites, people like Usama bin Laden embraced another ideology, Qutbism,
which allowed for a complimentary Sunni extremism which justifies a lot of dead
Sunnis. Egypt and Saudi Arabia are the most well-known Sunni nations, and Sunnis in
general are sometimes considered more "reasonable" and moderate than the fanatical
Shiites. Fascination with martyrdom defines Shiites. Their central holiday remembers
the martyrdom of Hussein, one of Muhammad's descendents, and Shiites commemorate
by flagellating themselves with whips, a ceremony that some experts say spawns suicide
bombers (at least according to Jewish sources). Egyptian- and Saudi-style Sunni
fundamentalism is quite different, more rational, and more homicidal than suicidal.
To be sure, it, too, celebrates the idea of martyrdom, but Sunni fundamentalism is more
like a warrior religion that glorifies violence, brute force, or what Muslims call the
"greater jihad" -- a purification of self by fighting a battle for what is right.
Jihad is also part of the name in at least two terrorist groups that make up the
shadowy umbrella group called Islamic Jihad, which has millions of supporters
throughout the Islamic world because these supporters agree with militaristic
interpretations of jihad. The two main groups are the Egyptian Islamic Jihad and the
Palestinian Islamic Jihad, both formed in the mid-1970s with origins going back to the
1928 Muslim Brotherhood.
Qutbism is named for the Egyptian radical Sayyid Qutb (pronounced SIGH-yid KUH
–taab) (1906-1966) who himself was a protégé of the Pakistani journalist Abul Ala
Maudoodi, and their collective ideas are sometimes called Maudoodi-Qutbism. It is
difficult to categorize their ideas collectively, as some scholars regard them as romantic
idealists longing for a return to a "purer" form of Islam, and others regard them as the
architects of all militant fundamentalism in Islam (Ruthven 2002). To be sure, both men
at first experimented with ways to incorporate Western thought into Muslim
philosophy, but ended up creating the Muslim equivalent of a Christian holy war
crusade. Qutb was radicalized sometime around 1949 after visiting the United States
where all he found was crass materialism, greed, and unbridled sexuality (see Qutb's
speech denouncing America). Upon his return to Egypt, Qutb joined the Muslim
Brotherhood and wrote radical books denouncing all things materialistic, modern, and
Western. His ideas would become the theoretical basis for many radical Islamic groups
of today -- including al Qaeda.
Qutb feared that decadent American influences, like jazz and dance, would invade
Egypt and all the Arab world unless something was done to stop it. It didn't help that
America was starting to support Israel around 1951. From a Qutbist viewpoint, the U.S.
replaces colonial Europe as the embodiment of evil, and the U.S. is the source of all the
ills and misfortunes in the Arab world. This radically changed the Muslim
Brotherhood, which was originally set up to hate communism, but gradually came to
hate America. To get some idea of how mainstream these ideas are, ask any Arab or
Muslim if the U.S. somehow tipped the balance of power in the Middle East to favor
Israel at the expense of Arab well-being, and you'll get a resounding "Yes" that this is
exactly the case, and that idea is Qutbism. Ask any Arab or Muslim if they think
American fads and fashions in music and dress are corrupting the morals of Muslim
youth, and you'll also get a "Yes" and that idea is Qutbism.
America is not only seen as decadent according to Qutbism, but as a pagan state.
American religious denominations are regarded as nothing more than providing
entertainment ceremonies. According to most mainstream Muslims, America is not a
religious society that takes God seriously. Americans commercialize religion and
worship material things like prosperity instead of God. Perhaps worst of all, America
has no sense of justice. A popular Muslim story goes like this: a couple once approached
Mohammed to ask for forgiveness in the eyes of Allah. Mohammed asked them
"forgiveness for what," and the couple said adultery. Mohammed asked if they were
drunk at the time, and the couple said no. So, Mohammed order them stoned to death.
The moral of the story is that Mohammed at least inquired about drunkenness as a
possible excuse for the crime, but even though the couple were surprised by the stoning,
they went to their death knowing that they carried no sins with them as they met
Allah.
Qutb is also famous for being an outspoken critic of secular Islamic governments
(empty shells with an Islamic flag, he called them). Arrested for treason in 1954, Qutb
was tortured and imprisoned for the rest of his life until executed by Egyptian President
Nasser in the Sixties. He felt that most Muslim societies including Egypt were lost in an
Age of Ignorance, and the solution was for the faithful to emigrate away from this
ignorance and form a new Islamic society. He also predicted a great battle would ensue
between the Muslim nations. Qutb did not go so far as to declare his fellow Egyptians
apostates (a word describing those who have denounced their faith), but he did call them
sinners. It can be seen, then, how important and pivotal a figure he was in getting
Muslims to call other Muslims the equivalent of infidels (apostates). He did this by
creating a whole new revolutionary ideology of takfir (excommunication).
Qutbism is the primary ideology of Dr. Ayman Zawahiri, Bin Laden's "number
two", and widely regarded as the mastermind behind the September 11, 2001 attacks on
the United States, and the connections are quite complicated. While in Egypt before
meeting Bin Laden, Dr. Zawahiri founded the At-Takfir w'al-Hijra movement which
declared that most Muslims are apostates because of their sins. By the late 1970s, Dr.
Zawahiri founded another group called Al-Jihad, also based on Qutbism, which reached
out to Palestinians, such as Abdullah Azzam, who served as Bin Laden's teacher and
mentor. By this time, the ideology had evolved into a conception of all Muslim
governments as illegitimate and needing to be replaced by terrorism to restore the
essential nature of Islam. Qutbism is also the primary ideology of Omar Abdel-
Rahman, leader of an Egyptian terrorist group who assisted Bin Laden in Afghanistan.
al-Qaeda: "A conflict between the Muslim nation and the United States is
unavoidable. Israel is only the American spearhead in the war against Islam.
The forthcoming terrorist Jihad will not be limited to strikes against Israel.
With Allah's help, we know the United States well, and we also know its
weaknesses. The most vulnerable spot of the United States is to send them
the bodies of their sons. Therefore, we should throw in their faces the flesh of
their sons, minced and grilled. The United States must pay the price, and it
must pay dearly." (Ayman al-Zawahiri)
Note: The al-Qaeda organization is "base" for a number of Sunni extremist groups who
are the direct beneficiaries of Osama Bin Laden's resources and leadership. The most
well-known member groups of al-Qaeda are: the al-Zarqawi network and Ansar al-Islam
movement in Iraq (the link between Saddam Hussein and al-Qaeda); the Libyan Islamic
Fighting Group, Jemaah Islamiyad in Asia, and the Islamic Movement of Uzbekistan.
al-Zarqawi network (aka al-Tawhid): With bin Laden and his deputy, al-Zawahiri, on the
run, a new group has emerged, which operates separately but in the name of al-Qaeda.
Led by a one-legged Jordanian named Abu Musab Zarqawi (real name Ahmed Fadil
Nazzal al-Khalayleh), the al-Zarqawi network has bombed synagogues throughout
Europe, plotted to use biological weapons in Britain, and beheaded an American in Iraq.
Zarqawi is sometimes called the "second bin Laden," and is committed to the demise of
the West. While fighting in Afghanistan, Zarqawi lost a leg, and was treated for it in
Iraq, where he resumed operations by merging with the Kurdish Islamic terror group,
Ansar al-Islam, in Northern Iraq. He has clearly been an active terrorist second-in-
command.
Wahhabists do not like being called by that name, as they prefer to think of
themselves as a Sunni or Salifi sect and be called "servers of the divine unity" or
unitarians. The Wahhabi-Saudi movement is a simplified and conservative form of
Sunni Islam that aims to cut down on luxurious living habits. Accordingly, Wahhabi-
oriented mosques are simple and without minarets. Adherents dress plainly and do not
smoke tobacco or use drugs. Television and photography are also looked down upon as
artificial two-dimensional representations of human beings (Algar 2002). It should be
noted that the so-called "Wahhabi lobby" is quite powerful and wealthy. Wahhabi
activists in Washington D.C. pose as workers for lobby groups such as the American
Muslim Council and American Muslim Foundation and contribute thousands of dollars
every year to the campaigns of American politicians in hopes of getting American
counterterrorism laws, like the Patriot Act, reversed. As examples of this powerful
influence, the Bush administration regularly orders the redaction (classification) of
intelligence reports linking Saudi wealth to the financing of terror, and the FBI has
faced numerous setbacks in the war on terror because the Wahhabi lobby persuaded
Congress to force FBI agents through sensitivity training (read news story).
The Muslim world or religious universe is in serious need of self-restraint and internal
reform. The voices of moderate Muslims, who wish to live modern lives, unencumbered
by burqas, fatwas, and jihad, need to be heard, but they are on the defensive.
Moderates cannot compete with the roar of militant Islam's determination, money, and
violence. As a result, Islamic extremism, with its hatred of the West and goal of world
domination will probably continue to appear to many as the only kind of Islam. Islamic
extremism justifies terrorism, in the form of extermination of civilians (infidels) and
suicide bombing (in pursuit of martyrdom). Such extremists drape their language in the
context of enemies - enemies of God or enemies of Islam - and have no problem
recruiting large numbers of mujahideen (holy warriors).
So, what do the extremists want? If it were possible to list the "demands" of Muslim
extremists, and from a hostage negotiation point of view, it should always be possible to
list some rational demands, then this would be the list:
• A complete pull-out of all American and Western (infidel) soldiers from the
sacred territories of Islam (this would mean most of the Middle East, not just
Saudi Arabia)
• An end to any and all American and Western support for Israel (so that Israel
can wither away and die; or better yet, just disappear off the face of the earth)
• A change in the way international political and economic organizations, like the
U.N., treat the Muslim world (instead of tying financial aid to socio-political
reform, just send money with no strings attached)
• A pan-Islamic super-state consisting of many nations and territories (large
enough to encompass all of the Middle East, parts of Africa, and most of Eurasia)
• A purging of all Western-style influence and a hands-off policy by the rest of the
world (to be accompanied by a mutual respect for cultural differences in regard
to freedom, rights, democracy, education, medicine, social services, clothing, and
thought)
Among the list of things
that most of the Western
world finds unacceptable is
the implied superiority and
effectiveness of Islamic
justice. It is difficult to
overstate how harsh and
backward most
conceptions of Islamic
justice look in practice.
Death is pretty much
proscribed as a penalty for
all sorts of offenses,
including "thought
crimes," manner of dress,
and careless speech;
definitely not things
associated with progressive
regimes, but certainly
"effective" in the extreme
sense of a totalitarian-style
deterrence.
It is also true that in jurisprudence, Islam makes no distinction between civil society
and the state, that the individual is considered a limb of the collectivity, that Muslims
have duties vis-a-vis the community (umma), and that no individual rights exist in the
sense of entitlements. Many scholars have criticized Islam in terms of over-emphasizing
duties, not rights, which takes the form of a certain anti-individualism which runs
contrary to the idea of human rights.
INTERNET RESOURCES
A Field Guide to Islamic Activists
About.com Guide to Islamic Extremist Groups
Al Qaeda Training Manual
Answers to 7 Questions about Islam for Non-Muslims
Ariel Center for Policy Research
Bat Yeor's Website on Dhimmitude
BBC Article on the Roots of Jihad
BBC Special on Islam and the West
Dr. Godlas' Islamic Studies Website
Elijah Muhammad and the Black Muslims
Islam's Medieval Outposts: What's Taught in Muslim Madrasas
Muslim Public Affairs Council Review of Counterterrorism Policy (pdf)
Muslim Women's League
Muslims Against Extremism and Fundamentalism
PBS Special on Muhammad, Violence, and Jihad
Ridicule as a Weapon of War
Ridiculing Terrorists as a Weapon of War
The Arab Gateway: News of the Arab World
The Counterrevolution in Military Affairs as Fashionable Thinking
The Doctrine of Heaven (Paradise) Behind the Veil of Islam
The Roots of Anti-Americanism in the Arab World
The Saudi-Al Qaeda Connection
The Wahhabi Movement: History and Beliefs
The Wahhabi Myth: Is Osami bin Laden a Salifi or Wahabi?
Virgins? What Virgins?
Who Was Sayed Qutb?
Wikipedia: The War on Terrorism as a War on Islam
Wikipedia: Wahhabism and Islamist Movements
PRINTED RESOURCES
Ahmed, A. (2002). Discovering Islam. London: Routledge.
Ahmed, L. (1993). Women and Gender in Islam. New Haven: Yale Univ. Press.
Algar, H. (2002). Wahhabism: A Critical Essay. NY: Islamic Publications International.
An-Na'-Im, A. (1996). Toward an Islamic Reformation. Syracuse, NY: Syracuse Univ.
Press. [sample pages]
Bertolacci, A. (2006). The Reception of Aristotle's Metaphysics in Avicenna's Kitāb al-
Šifā'. Leiden, the Netherlands: Brill.
Catherwood, C. (2003). Christians, Muslims, and Islamic Rage: What Is Going on and
Why It Happened. NY: Zondervan.
Cooper, B. (2004). New Political Religions, or An Analysis of Modern Terrorism.
Columbia: Univ. of Missouri Press.
Davis, C. (2003). The Middle East for Dummies. NY: Wiley.
Dien, M. (2004). Islamic Law: From Historical Foundations to Contemporary Practice.
Notre Dame: Univ. of Notre Dame Press.
El Fadl, K. (2001). Speaking in God's Name. NY: Oneworld Publications. [sample pages]
El Fadl, K. (2002). The Place of Tolerance in Islam. NY: Beacon Press. [sample pages]
Ernst, C. (1997). The Shambhala Guide to Sufism. Boston: Shambhala Publications.
Esposito, J. (1999). The Islamic Threat: Myth or Reality, 3e. NY: Oxford Univ. Press.
[sample pages]
Esposito, J. (Ed.) (2001). The Iranian Revolution: It's Global Impact. Miami: Florida
International University Press. [sample pages]
Esposito, J. (2002). What Everyone Needs to Know About Islam. NY: Oxford Univ. Press.
Esposito, J. & Burgat, F. (Eds.) (2003). Modernizing Islam. Newark: Rutgers Univ.
Press.
Esposito, J. (2003). Unholy War: Terror in the Name of Islam. NY: Oxford Univ. Press.
Esposito, J. (2004). Islam: The Straight Path. NY: Oxford Univ. Press.
Esposito, J. (2006). Islam in Transition: Muslim Perspectives. NY: Oxford Univ. Press.
Gabriel, M. (2002). Islam and Terrorism: What the Quran Really Teaches About
Christianity, Violence and the Goals of the Islamic Jihad. NY: Charisma House. [sample
pages]
Gregorian, V. (2005). Islam: A Mosaic, Not a Monolith. Washington DC: Brookings.
Habeck, M. (2006). Knowing the Enemy: Jihadist Ideology and the War on Terror. New
Haven: Yale Univ. Press.
Haddad, Y. and J. Esposito (Eds.) (1997). Islam, Gender, and Social Change. NY: Oxford
Univ. Press.
Hashmi, S. (2006). "Interpreting the Islamic Ethics of War and Peace." Pp. 64-69 in W.
Evan (Ed.) War and Peace in an Age of Terrorism: A Reader. Boston: Allyn & Bacon.
Huntington, S. (1996). The Clash of Civilizations and the Remaking of World Order. NY:
Simon & Schuster.
Janardhan, N. (2006) "Islamists Stay Clear of Oman." Jamestown Terrorism Monitor
4(5) [article online].
Jansen, J. (1997). The Dual Nature of Islamic Fundamentalism. NY: Cornell Univ. Press.
Khadduri, M. (1984). The Islamic Conception of Justice. Baltimore: John Hopkins Univ.
Press.
Khan, L. (2006). A Theory of International Terrorism: Understanding Islamic Militancy.
Leiden, the Netherlands: Brill.
Kibble, D. (1996). "The Threat of Militant Islam: A Fundamental Reappraisal." Studies
in Conflict and Terrorism 19(4): 353-64.
Lambert, S. (2005). The Sources of Islamic Revolutionary Conduct. Washington DC:
JMIC.
Lang, P. (2003). "Wahhabism and Jihad." America 188(8): 10-13.
Levitt, M. (2002). Targeting Terror: U.S. Policy toward Middle Eastern State Sponsors and
Terrorist Organizations. Washington DC: Brookings.
Lincoln, B. (2002). Holy Terrors. Chicago: Univ. of Chicago Press.
Lewis, B. (2003). The Crisis of Islam: Holy War and Unholy Terror. NY: Modern
Library.
Malcolm X. (1987). The Autobiography of Malcolm X. NY: African American Images.
Marshall, P. (Ed.) (2005). Radical Islam's Rules: The Worldwide Spread of Extreme
Shari'ah Law. Lanham, MD: Rowman & Littlefield.
Palmer, M. & Palmer, P. (2004). At the Heart of Terror. Lanham, MD: Rowman &
Littlefield.
Paz, R. (2004). Tangled Web: International Networking of the Islamist Struggle.
Washington DC: Brookings.
Pipes, D. & K. Elst. (2003). The Rushdie Affair: The Novel, the Ayatollah, and the West.
NJ: Transaction Books. [author's website]
Poole, J. (2004). Tactics of the Crescent Moon: Militant Muslim Combat Methods.
Emerald Isle, NC: Posterity Press.
Ruthven, M. (2002). A Fury for God: The Islamist Attack on America. NY: Granta Books.
Satloff, R. (Ed.) (2002). War on Terror: The Middle East Dimension. Washington DC:
Brookings.
Schanzer, J. (2004). Al-Qaeda's Armies: Middle East Affiliate Groups and the Next
Generation of Terror. Washington DC: Brookings.
Shay, S. (2001). The Endless Jihad. Herzliya, Israel: ICT.
Sivan, E. (1990). Radical Islam. New Haven: Yale Univ. Press.
Spencer, R. (2002). Islam Unveiled: Disturbing Questions About the World's Fastest
Growing Faith. NY: Encounter.
Stern, J. (2003). Terror in the Name of God: Why Religious Militants Kill. NY: Harper
Collins.
Streusand, D. & Tunnell, H. (2006). "Choosing Words Carefully: Language to Help
Fight Islamic Terrorism." Washington DC: National Defense University, Center for
Strategic Communications Working Draft.
Tibi, B. (1998). The Challenge of Fundamentalism: Political Islam and the New World
Disorder. Berkeley: Univ. of CA Press.
Trifkovic, S. & S. (2002). Sword of the Prophet: A Politically Incorrect Guide to Islam.
NY: BHB International.
Voegelin, E. (1938). The Political Religions. Lewiston, NY: E. Mellen Press.
Wiktorowicz, Q. (2005). Radical Islam Rising: Muslim Extremism in the West. Lanham,
MD: Rowman & Littlefield.
Wright, R. (2001). Sacred Rage: The Wrath of Militant Islam. NY: Touchstone Books.
Computers are the hottest crime tool today. People that know how to use them can
unlock doors few of us even know exist. By its very nature, the Internet is analogous to
the Wild West (Biegel 2003) where the law is mostly unwritten and power falls into the
hands of those with the best technology. Traditional concepts of privacy are now being
transformed before out eyes, and if you haven't already, I strongly suggest you read the
above highlighted lecture on Privacy and Cyberspace Law. You won't understand
cybercrime without understanding cyberspace law, and maybe privacy law behind that.
Cybercrime has many definitions (see Wall 2001 for a typical, academic essay over
definitional issues), but most experts believe it is the wave of the future, and it's here to
stay, not just a passing fad. With over one trillion dollars moved electronically every
week, the Internet is where the money is. The rates of cybercrime are skyrocketing.
The annual "take" by theft-oriented cybercriminals is estimated as high as $100 billion,
and 97% of offenses go undetected (Bennett & Hess 2001). Then, there are those who
just abuse the Internet and computer systems -- hackers or hooligans, whatever you
want to call them -- but cybercriminals nonetheless (at least in 48 states). Their
shenanigans are often detected, resulting in an average cost of $104,000 per incident in
damage, labor, and lost productivity (Brown et al. 2001). In addition, there's corporate
espionage (pdf), which some experts say is the real problem, with annual losses of
proprietary information in the $60 million range. Toss in organized crime, terrorism,
infowar, embezzlement, extortion, and a variety of other ways to offend or harm with
computers, and it's anybody's guess what the real cost is.
In this lecture, I'm going to try classifying all the possible methods of evil-doing with
computers. As a criminologist, I realize I'm on dangerous ground. Theory is weak, and
there are only many typologies. I also don't want to add to any legislative frenzy
because there are things here that are criminally wrong, deliberately wrong,
accidentally wrong, wrong for all the right reasons, and just plain annoying. Legal
systems everywhere are busy studying ways of passing new laws dealing with Internet
misbehavior, so the arena has become a sort of "test-bed" or "mini-society" where all
sorts of symbolic interactions and moral panics play out. My interest is less with the
criminals and more with the Internet, or what I call cyberspace (explained in a
moment), so I'm not all that concerned about whether mobsters, for example, keep
records of their finances on computers. I am concerned about this ethereal realm called
CYBERSPACE because I find it personally intriguing and full of potential. Barney
(2000) also finds it full of hope for democracy.
While I'm at it, I might as well chime in about "Internet Addiction" (sometimes called
being an "onlineaholic" or having the non-insurable diagnosis of "Internet addiction
disorder"). In a world of news feeds, instant messaging, emails, and games, it sometimes
seems like Blackberry devices might be called "Crackberry" devices because of their
addictive potential (like cell phones). I personally feel that Internet addiction can indeed
be a disorder as destructive as any obsessive disorder, although I would be hard-pressed
to describe the forensic or clinical outlines of this. Specialists estimate that 6 percent to
10 percent of Internet users develop a dependency, at least according to some experts
(e.g., Dr. Hilarie Cash, head of Seattle-based Internet/Computer Addiction Services; Dr.
Kimberly S. Young, head of the Center for Online Addiction in Bradford, Pa.; & Dr.
Maressa Hecht Orzack, the director of the Computer Addiction Study Center at
McLean Hospital in Belmont, Mass., and an assistant professor at Harvard Medical
School; but in contrast, Sara Kiesler, professor of computer science and human-
computer interaction at Carnegie Mellon University calls it a "fad illness"). However, I
think the following can be modestly stated -- Internet addiction exacts a toll on health
and family life; it aggravates pre-existing disorders; it can lead to further addictions
such as gambling or pornography; and it can lead to cybercrime. The "hook" involves
the ever-present hope of escape that the Internet offers to people who are longing for
something.
First of all, anytime you use the prefix cyber-, you're talking about something
somebody is doing online. In other words, there has to be a modem or networking
involved somehow. Motion is always involved. Anything related to the Internet falls
under the cyber category when online. Besides being a prefix, it's also a verb, not a
noun. So plugging in some 3D game and donning your goggles to go "cyber" doesn't
count. There's always action, motivation, movement, and interaction when you cyber.
It's impossible to just be cyber. There's no steady state of being cyber. To cyber means
that you are constantly exchanging information, lots of information, and you are
constantly using technology to the max. You are doing both at the same time --
exchange of information technology is to cyber. It's an activity unique to the
Information or Knowledge Age we are entering, and by its very nature, it involves
sharing or giving away things.
Cyber activity is very different from the use of computers for traditional activities
where the purpose is to "stash" or "store" something and keep it from prying eyes.
Many criminologists don't grasp this distinction, and would argue that theft is theft
regardless of the medium used. However, I would argue that cyber theft is substantially
different, and cyberterrorism is substantially different from terrorism. Cybercrime is
also substantially different from computer crime. It's like the difference between people
who use computers for all they can be versus people who use computers as a tool like a
typewriter. In each case, the motivation might be the same, but the action or movement
is different. One could even argue that the motivation is different. Our criminal law
simply hasn't got enough concepts to grasp the element of mens rea when it comes to
cybercrime. For example, there are different kinds of glee, elation, and glory involved in
cyberspace that don't exist in the real world. There is an excess of information, not a
deficit or "coverup" of information. Nor are the concepts of white-collar crime of any
use, because you're dealing with something more revolutionary than just trying to make
money -- you're dealing with cyberspace and technoculture, two concepts that are
essential to any definition of cyber.
Cyberspace is a bioelectronic ecosystem that exists anywhere there are phones, coaxial
cables, fiber optic lines, or electomagnetic waves (Dyson 1994). Nobody's really sure how
big the Internet is (see CAIDA's map of Internet) for a map), but 135 countries have
access, 54 world cities are the major hosts, and 72 million people logon every day. You
should get the idea that cyberspace is pretty big, in fact, bigger than anything that's ever
happened before in human history, and it's constantly growing, tripling in size every
year. There are 13 main servers -- known as "root" servers -- which control all traffic
on the Internet, and they are controlled by the U.S. Government (specifically the U.S.
Commerce Department). Notice I didn't say "owned" by the government. Those 13
computers are in private hands, but they contain government-approved, master lists of
the 260 or so Internet suffixes, such as ".com" and ".org." The master lists serve as the
Internet’s master directories and tell Web browsers and e-mail programs how to direct
traffic. Internet users around the world interact with them every day, likely without
knowing it. If the U.S. government wanted to, it could render a policy decision that in
one stroke could make all Web sites ending in a specific suffix essentially unreachable.
The history is that in 1998, the Commerce Department selected a private organization
with international board members (ICANN, or Internet Corporation for Assigned
Names and Numbers) to decide what goes on those lists. Commerce kept veto power,
and indicated it would let go of control eventually, and maybe turn control over to an
international organization like the U.N. International Telecommunication Union, but in
2005, the U.S. reversed itself and said it would never cede control of the 13 main
servers. The U.S. Commerce department does, however, endorse having foreign
governments manage their own country-code suffixes, such as “.fr” for France.
Although humans created cyberspace, and are continually expanding it, the real
inhabitants are data, information, ideas, and knowledge. This is what is meant by the
Information or Knowledge Age. The real estate, or property, is intellectual and public.
No one "owns" it, or operates it with any central authority. Politically, it makes
governments obsolete. Economically, it can be replicated at zero cost, and unlike an
industrial economy where you can only consume so many widgets, the average person in
an information economy taps into all the world's knowledge and consumes information
as fast as they can. Humans can only benefit from this new medium if they exercise
their freedom.
The other challenging legal question is when does Internet activity involve actus
reus. In cyberspace, as in virtual reality, it's the impression that what one is
experiencing is real. It doesn't require tactile sensation to be virtually raped in a chat
room, but the consequences or trauma can be just as real. People can get married in
cyberspace, obtain college degrees, and do other things that have real consequences.
Plagiarism and copyright infringement is rampant on the web, and companies regularly
install cookies and engage in data mining. A lot of Internet content is inappropriate for
children. Just how many crimes are possible to commit in cyberspace is difficult to
determine, and to prove some harmful action took place. Computer impressions,
symbols, and persona do not make for anything more than conspiracy and inchoate
offense charges. When AI (Artificial Intelligence) systems come online, it will prove
difficult who had the thought first -- the person or the machine.
Then, there's the whole problem of jurisdiction. Where exactly does cyberspace
begin and end? In general, a government's jurisdiction extends to those individuals who
reside within its borders or to transactions or events which occur within those borders.
The Internet, like space, doesn't have any borders. A few states have been daring,
claiming that the flow of commerce, or financial stream, across their Internet nodes
gives them jurisdiction. However, it's unlikely that any state authority would issue a
warrant for an overseas offender who has less than minimal physical contact with U.S.
soil. The minimal contact requirement usually governs transborder technology-related
commerce (International Shoe Co. v. Washington 1945). International law enforcement
compacts also require dual criminality, which means that investigative cooperation only
exists if the offense has similar meaning in both nations. Sometimes, it's better to
prosecute overseas, sometimes locally, sometimes federally, and this leads to a lot of
disparities and inequities in the justice system.
What and when to seize are also baffling issues. Reactive response to hard drives
have become a pattern in law enforcement because they conveniently record voyages in
cyberspace. However, it might be easier, and more proactive, to monitor bulletin
boards, websites, posts, emails, finger and Usenet. The computer's role should
determine if the machine itself is to be seized or simply searched onsite. If the computer
was used to commit a crime, the entire system should be seized. If the computer was
used to store information about a crime, the hard drive, printer, and printout should be
seized. Other situations might call for a quick copy of the hard drive and all floppies.
The independent component doctrine requires that probable cause elements be present
before any peripheral devices are seized. Getting ISPs to turn over their log files in a
timely fashion, and getting upstream carriers to cooperate, are additional problems.
It must be remembered that this is an area, along with drugs, that helped develop the
practice of no-knock warrants. Judges apparently felt that hackers could install time-
delay devices or hot keys to permit quick disposal of evidence. A time-delay device
destroys evidence if the keyboard is not accessed for awhile, and a hot key program
erases data when a certain keystroke combination is depressed. Courts have also dealt
with the time element for when a computer search warrant keeps from going stale,
which is 3-6 months, the latter being the time when an unread message becomes a stored
message, for legal purposes (Becker 2000).
Computer Fraud and Misuse Act (last amended 1999): "Whoever knowingly
accesses a computer without permission...to obtain information...defined as
harmful to national defense, foreign relations..., or injury to the United States,
intentionally accesses the financial record of a financial institution, any computer
of any department or agency of the U.S., any protected computer involved in
interstate or foreign communication, any nonpublic computer that conducts
affairs for the government...with intent to defraud, extort, or cause
damage...shall be punished by fine and imprisonment for five to twenty years."
Economic Espionage Act of 1996: "Whoever intentionally or knowingly steals,
copies, receives, or conspires to benefit any foreign instrumentality by converting
any trade secret related to interstate or foreign commerce shall be subject to
criminal and civil forfeiture of all property used or derived from the offense as
well a fine from $500,000 to $5,000,000 and imprisonment from ten to fifteen
years."
State laws tend to be written as theft or fraud statutes, the evils being stealing and
undermining confidence. You might want to review the common law elements of theft,
fraud, and consumer fraud if you're unfamiliar with these offenses. CardCops, a
company that tracks and stings fraudulent (stolen) credit card use over the Internet,
estimates online fraud at ten times the rate of real world fraud. EscrowFraud.com
estimates that 99% of web sites a seller of something on the Internet tries to "steer" you
toward is "fake." Virtual returns of merchandise are almost as costly as virtual
purchases, and so-called carders regularly post sniffed credit card numbers in chat
rooms and on web sites. In the long run, it's the perception of dangerousness that hurts
e-commerce, but in the short run, it's the speed of offenders and the slowness of law
enforcement that is of concern. The typical state-level cybercrime statute is long, often
longer than federal code, and the wording is extremely general, but a short example
might be as follows:
Typical State Cybercrime Statute (circa 2000): "A person commits computer theft
or fraud when they knowingly and without authorization access or cause to be
accessed any computer or network for obtaining goods, services or information
with the intent to permanently deprive the owner of possession or use."
Computer as Target: This kind of activity is the wrongful taking of information or the
causing of damage to information. Targeting a computer just to obtain unauthorized
access is the hallmark of hacking, and the most serious criminal offense here is theft of
information, followed by maliciousness, mischief, and wayward adventuring.
Bypassing a password protected website to avoid payment would be theft of services,
and foreign intelligence break-ins would be espionage. These are all familiar types of
crimes, but hacking is typically done in furtherance of a larger scheme since the hacker
wants to exploit all computational and encryption capabilities of a hacked system in
order to weave through related computer systems. The activity can range from large-
scale disruption to elegant hacking. DNS rerouting and denial of service attacks are the
most disruptive. Subtle changes to a web page are elegant. Hackers also generally
collect password lists, credit card info, proprietary corporate info, and warez (pirated
commercial software). A list of specific offenses in this category might include:
• Internet fraud (false advertising, credit card fraud, wire fraud, money
laundering)
• Online child pornography; child luring (sexual exploitation; transportation for
sexual activity)
• Internet sale of prescription drugs & controlled substances (smuggling; drug
control laws)
• Internet sale of firearms (firearms control laws)
• Internet gambling (interstate wagering laws; lottery laws; illegal gambling
businesses)
• Internet sale of alcohol (liquor trafficking)
• Online securities fraud (securities act violations)
• Software piracy & Intellectual Property theft (copyright infringement; trade
secrets)
• Counterfeiting (use of computer to make duplicates or phonies)
Insider Threats: The disgruntled insider is the principle source of computer crime. As
much as 75% of computer crimes are done by employees. This makes cybercrime
against business the number one type of cybercrime, and it's growing, with the
estimated loss to business running about $500 million per year, in the form of crimes like
theft of proprietary information, theft of customer databases, and theft of product
databases. Their average age of an insider offender is 29, and they generally hold
managerial or professional positions (USDOJ CCIPS data of 2003 puts the age profile
like this -- 34% are between 20-29, 36% between 30-35, and 27% over 35). Older
offenders generally do more damage. The FBI regards disgruntled employees as
motivated by a perception of unfair treatment by management or snubs by co-workers.
Another fraction of incidents are caused by blunders, errors, or omissions. The FBI
regards the insiders here as incompetent, inquisitive, or unintentional. The difference
appears to be in the intent to disrupt. Crimes involving the computer only incidentally
are treated as traditional crimes -- theft, for example, if an employee tampers with the
payroll system (called "data-diddling"). However, even the FBI is continually
surprised, when under the plain view doctrine, they investigate an insider threat and
find examples of child pornography, organized crime connections, and even
recreational hacking. Employees often waste a lot of company time using their
network access to surf, shop, or engage in other instances of lost productivity. It
makes sense to profile the typical computer abuser. Every organization has them, and
here are some of the signs:
Insider profiling (Nykodym et al. 2005) aims to help organizations understand the
types of people that are likely to commit net abuse and/or cybercrime. Some common
characteristics of such people include: not showing fear from having managers around;
inclination to break the rules; and perhaps a keen sports fan (in the case of net abuse by
online gambling at work). Such persons are usually fairly secretive, hard to
communicate with, and quiet at work. Workplace cybercrime committed by managers
at work tends to adhere to the same profile, yet the amount of money "take" at work is
higher. Mid-or low-level employees, who commit the majority of cybercrimes at work,
tend to have more restricted access and subsequently a lower "take." However,
alliances between a manager and employee at work can be a difficult case to investigate
(detect and stop) because they are working on different levels of a hierarchy and have
more ways to hide the crime.
Insider cybercrime is generally divided into four (4) main categories (Nykodym et al.
2005): (1) espionage; (2) theft; (3) sabotage; and (4) personal abuse of the organizational
network. The espionage-oriented offender is similar to the outsider cybercriminal
(discussed below), and generally is after confidential or sensitive information, and
usually is part of the management team, sometimes the higher management (very
senior) team. Depending upon the race structure of the organization, the cybercriminal
would be white or black, but they are usually secretive individuals who do not want to
look different, and always try to blend in among others. Theft-oriented cybercriminals
are motivated by their own gain (despite what they might say about hate or revenge)
with their only goal the selling or using of valuable information for money. Such
criminals are usually very comfortable with their position in the organization, and they
tend to be young (either male or female) and still, relatively low in the organization's
hierarchy. The sabotage-oriented cybercriminal is like the espionage-oriented type (in
being influenced by a competitor), but sabateurs are not necessarily employed by the
organization, but consist usually of subcontractors, part-timers, and the like, who also
usually have one things in common -- they have personal motives, like revenge for some
mistreatment they perceive, like a layoff or missed promotional opportunity. Age, race,
and sex variation is quite diverse with this type.
Outsider Threats: Hackers are the most common group in this category. Their typical
age is between 14 and 19, and they are generally part of the cyberpunk subculture.
Hacking for illicit financial gain has been increasing, and less-skilled "script kiddies"
(using point-and-click software instead of programming) are increasing in
number. Distributed Denial of Service Attacks are also increasing, which plant a tool
such as Trinoo, Tribal Flood Net (TFN), TFN2K, or Stacheldraht (German for barbed
wire) on a number of unwitting victim systems. Then when the hacker sends the
command, the victim systems in turn begin sending messages against the real target
system. 2001 was also the Year of the Virus, and several large-scale hacks were
accompanied by viruses released in the wild, which led authorities to suspect that
hackers and virus writers were uniting. The FBI uses the following typology to classify
outsider threats:
Industrial espionage is a very high-stakes game which the U.S. plays along with
everyone else. There is a 1996 Anti-Economic Espionage law that defines "trade secret"
quite broadly, but arrests usually involve sting operations conducted against foreign
nationals attempting to bribe somebody (see Hacking and Industrial Espionage for
updates on the latest arrests). It's the perfect example of an exception to the insider-
outsider typology because sometimes, the crime originates with an employee who is in a
position to sell trade secrets, and other times, the employee is tempted by an outsider.
Terrorists are known to use information technology to formulate plans, raise funds,
spread propaganda, and to communicate securely. For example, Ramzi Yousef,
mastermind of the first World Trade Center attack, stored detailed plans to destroy
United States airliners on encrypted files in his laptop computer. Osami bin Laden was
known to use steganography for his network's communications. A website that was
known as the Muslim Hacker's Club listed tips for things such as hacking the Pentagon.
A hacker known as DoctorNuker has been defacing websites for the last five years with
anti-American, anti-Israeli, and pro-Bin Laden propaganda. Other than by using
computers to communicate and coordinate, few examples exist of cyberterrorism, or
politically motivated attacks on computer systems. In fact, it is advantageous to a
terrorist group to keep the Internet working, as a means of communication and outlet
for propaganda. The main tools of terrorism remain guns and bombs, not computers.
There are a few instances of cyberterrorism, however, such as the 1998 attack on Sri
Lankan servers by the Internet Black Tigers, or the Mexican Zapatista movement of the
same year, which eventually teamed up with protesters of the World Trade
Organization. We have yet to see a significant instance of "cyber terrorism" with
respect to widespread disruption of critical infrastructures. However, the FBI and
many others, are concerned about the growth of something called hactivism, which is a
word that combines hacking and activism. These are politically motivated attacks, but
they may also be a form of electronic civil disobedience. Such attacks are usually
elegant. For example, the Zapatistas target the URLs of companies they think don't
support human rights. The attack is nothing more than adding the phrase
"/human_rights" to the end of the URL. The page returns a display that says "human
rights not found on this server", which is also found in the server logs. They don't
actually flood the server, just enough times to make sure it's noticed in the server logs.
Foreign intelligence services have adapted to using cyber tools as part of their
information gathering and espionage tradecraft. In a case dubbed "the Cuckoo's Egg,"
between 1986 and 1989 a ring of West German hackers penetrated numerous military,
scientific, and industry computers in the United States, Western Europe, and Japan,
stealing passwords, programs, and other information which they sold to the Soviet KGB.
Significantly, this was over a decade ago -- ancient history in Internet years.
Infowarfare usually involves foreign military forces against another foreign military
force. We know that several nations are already developing information warfare
doctrine, programs, and capabilities for use against each other and the United States.
China and Taiwan have been at infowar for years. Foreign nations develop such
programs because they feel they cannot defeat the United States in a head-to-head
military encounter and believe that information technology is our Achilles Heel.
CYBEREXTORTION
This crime is a good example of a transnational crime. While it can occur within the
boundaries of a single nation (Japanese businesses, for example, tend to be
cyberextorted by Japanese criminals), it is more commonly found in the form of Russian
or Eastern European hackers, hired or coerced by some organized crime group into
finding American and European companies to break into. Banking organizations are a
particular target. The Bank victim is threatened with having all or most of their
customer's PIN numbers placed on the Internet somewhere, and a suprising number of
victims "pay up" rather than report the problem to law enforcement. Cyberextortion,
in its organized crime variety, also represents an interesting division of labor among
criminals since the hackers do specialized, technical work and their "handlers" do
specialized, nontechnical work.
A TYPOLOGY OF HACKERS
At the heart of cybercrime are the hackers. These people are the ones with the skills
to commit the crimes, and an interesting way to look at them is to focus upon the
lifestyles and personalities of hackers. Take it for what it's worth. None of these
personality characteristics have been validated by any empirical tests. The first
typology comes from Maxfield (1985):
There have been no attempts (that I know of) to apply these typologies to real-life case
studies, although allow me to give you some cases, and let you see if you can apply
anything yourselves:
HACKERS AS TERRORISTS
Regardless of whether cyberterrorism will become the future's most prevalent form of
terrorism (a debatable issue in many circles, and dependent mainly upon whether the
field of terrorism studies ever figures out whether the "status" or demographics of the
perpetrator is as equally important as the "nature" of the act), it can be safely said that
hackers, like terrorists, tend to work in asymmetric, non-hierarchical formation, which
means that they do not have organizations like gangs and so forth. The concept of
netwar (Arquilla & Ronfeldt 2001) might or might not be useful at explaining these new
kinds of formations. Although the concept of netwar is at odds with traditional forms of
organization, criminal networks tend to have the following types of members, which can
be compared to the components of a terrorist cell:
Netwar is the most likely way cyberterrorists would operate. They have an interest in
getting their message and/or demands across, so therefore would use the Internet to
disseminate information or misinformation. A number of terrorist groups already have
websites, and more can be expected. Hackers also seem to be evolving more in the
direction of hactivism. It is unlikely that terrorists will ever give up their traditional
weapons. The most likely scenario is a traditional attack that is simultaneously
accompanied by a PsyOp-like netwar. The definition of netwar is as follows:
CYBERTERRORISM
Cybercrime and cyberterrorism are not coterminous. Cyberspace attacks must have a
'terrorist' component in order to be labelled cyberterrorism. The likelihood of a
cyberterror attack increases every day, as every day the Internet and countless other
computer systems are under increasing attack and/or used by terrorists in various
ways. "Use" by itself does not normally comprise cyberterrorism, just "use" which
borders on "offensive use" or "misuse" at least according to Kent Anderson's article on
Politically Motivated Computer Crime, pdf, however, thought on the offensiveness of
"supporter websites" is still evolving (Weimann 2006), and the Jamestown Foundation
probably has a good set of experts who analyze the websites of terrorist organizations
and supporters. In 1999, Time magazine reported that 12 of the 30 terrorist groups
deemed Foreign Terrorist Organisations (FTOs) by the United States Department of
State had their own Web sites, and by 2005, a majority of the groups on the same list
have an online presence, some of which are hosted by American site hosting companies.
A determined attacker (or attackers) will soon learn what works and what doesn’t,
where the vulnerabilities are, how responses are patterned, and what methods are used
for detection, apprehension, and prosecution. Cyberterrorism is not a matter of if, but
when. Some definitions are given below:
INTERNET RESOURCES
JUS 410 Lecture on CyberSpace Law
Center for Strategic & International Studies (CSIS)
Cybercrime, Justice, Law and Society
Cybercrimes.net
Cyberpunk Top 100 Sites
Cyberspace and the American Dream
Cyberterrorism: How Real is the Threat?
DHS National Infrastructure Protection Center
Federal Guidelines for Searching & Seizing Computers (1994)
Federal Guidelines for Searching & Seizing Computers (2001)
Hacking and Industrial Espionage
InfoSec and InfoWar Portal
Institute for Advanced Study of Information Warfare
MSNBC's Hacker Diaries
National Cybercrime Training Partnership
National Strategy to Secure Cyberspace
Navy Postgraduate School White Paper on Cyberterror (pdf
Prof. Rob Kling's Social Informatics web page
Reality Bites: Cyberterrorism and Terrorist Use of the Internet
SocioSite: Power, Conflict, War, CyberWar, Cyberterrorism
The Modus Operandi of Hacking
The Zapatista Social Netwar in Mexico
U.S. Dept. of Justice Cybercrime Section
What is CyberTerrorism?
White House National Strategy to Secure Cyberspace
PRINTED RESOURCES
Arquilla, J. & D. Ronfeldt. (2001). Networks and Netwars. Santa Monica: RAND.
Ballard, J., Hornik, J, & McKenzie, D. (2002). Technological Facilitation of Terrorism:
Definitional, Legal, and Policy Issues. American Behavioral Scientist 45(6):989-1016.
Barney, D. (2000). Prometheus Wired: The Hope for Democracy in the Age of Network
Technology. Chicago: Univ. of Chicago Press.
Becker, R. (2000). Criminal Investigation. Gaithersburg, MA: Aspen.
Bennett, W. & K. Hess. (2001). Criminal Investigation. Belmont, CA: Wadsworth.
Biegel. S. (2003). Beyond our Control: Confronting the Limits of our Legal System in the
Age of Cyberspace. Cambridge, MA: MIT Press.
Brown, S., F. Esbensen & G. Geis. (2001). Criminology. Cincinnati: Anderson.
Clifford, R. (2001). Cybercrime: The Investigation, Prosecution and Defense of a
Computer-Related Crime. Durham: Carolina Academic Press.
Collin, B. (1996). "The Future of Cyberterrorism," paper presented at the 11th Annual
International Symposium on Criminal Justice Issues, University of Illinois at Chicago, at
http://afgen.com/terrorism1.html.
Coutourie, L. (1989). "The Computer Criminal" FBI Law Enforcement Journal 58: 18-
22.
Denning, Dorothy. (2000). "Activism, Hacktivism, and Cyberterrorism: The Internet as
a Tool for Influencing Policy." Georgetown Univ. Workshop paper.
Denning, D. (2000). "Cyber Terrorism: Testimony before the Special Oversight Panel on
Terrorism," U.S. House of Representatives, Committee on Armed Services (23 May), at
http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.
Denning, D. (2000). "Cyberterrorism," Global Dialogue (Autumn), at
http://www.cs.georgetown.edu/~denning/infosec/cyberterror-GD.doc.
Denning, D. (2001). "Is Cyber Terror Next?" New York: U.S. Social Science Research
Council, at http://www.ssrc.org/sept11/essays/denning.htm.
Deutch, J. (1996). "Statement Before the U.S. Senate Governmental Affairs Committee,
Permanent Subcommittee on Investigations" (25 June), at
http://www.nswc.navy.mil/ISSEC/Docs/Ref/InTheNews/fullciatext.html.
Dyson, Esther et al. (1994). Cyberspace and the American Dream. EFF [article website]
Embar-Seddon, A. (2002). Cyberterrorism: Are We Under Seige? American Behavioral
Scientist 45(6):1033-43.
Garfinkel, S. (2004). "The FBI's Cyber-Crime Crackdown," Pp. 21-25 in J. Victor & J.
Naughton (eds.) Annual Editions: Criminal Justice 04/05. Dubuque, IA: Dushkin.
Johnson, T. (Ed.) (2005). Forensic Computer Crime Investigation. Boca Raton, FL: CRC
Press.
Kalathil, S. & Boas, T. (2003). Open Networks, Closed Regimes: The Impact of the
Internet on Authoritarian Rule. Washington DC: Brookings.
Kopelev, S. (2000). "Cracking Computer Codes" Law Enforcement Technology 27(1):
60-67.
Lessig, L. (1999). Code and Other Laws of Cyberspace. NY: Basic Books. [author's
website]
Lipschultz, J. (1999). Free Expression in the Age of the Internet. Boulder, CO: Perseus
Books.
Loader, B. & D. Thomas. (2000). Cybercrime, Law Enforcement, Security and
surveillance in the Information Age. London: Routledge.
Maxfield, J. (1985). "Computer Bulletin Boards and the Hacker Problem" the Electric
Data Processing Audit, Control and Security Newsletter. Arlington: Automation Training
Center, October.
Mena, J. (2004). Homeland Security Techniques and Technologies. Hingham, MA:
Charles River Media.
Meyer, J. & C. Short. (1998). "Investigating Computer Crime" Police Chief 65(5): 28-
35.
Moore, R. (2005). Cybercrime: Investigating High-Technology Computer Crime.
Cincinnati: LexisNexis Anderson.
Nykodym, N., Taylor, R. & Vilela, J. (2005). "Criminal Profiling and Insider Cyber
Crime." Digital Investigation 2(4): 261-267.
Parker, T., Sachs, M., Shaw, E., Stroz, E. & Devost, M. (2004). Cyber Adversary
Characterization: Auditing the Hacker Mind. NY: Syngress.
Piper, T. (2002) "An Uneven Playing Field: The Advantages of the Cybercriminals vs.
Law Enforcement." SANS Reading Room, http://www.sans.org/rr/legal/uneven.php.
Pollitt, M. (n.d.) "Cyberterrorism: Fact or Fancy?"
http://www.cs.georgetown.edu/~denning/infosec/pollitt.html.
Power, R. (2000). Tangled Web: Tales of Digital Crime from the Shadows of CyberSpace.
Indianapolis: Que.
Riem, A. (2001). "Cybercrimes of the 21st Century." Computer Fraud & Security 4: 12-
15.
Rose, L. (1995). Net law: Your rights in an online world. NY: McGraw Hill.
Speer, D. (2000). "Redefining Borders: The Challenges of Cybercrime." Crime, Law &
Social Change 34:259-73.
Sullivan, S. (1999). "Policing the Internet" FBI Law Enforcement Bulletin 68(6): 18-21.
Taylor, R. (1991). "Computer Crime" in C. Swanson, N. Chamelin & L. Teritto,
Criminal Investigation. NY: Random House.
Wall, David. (Ed.) (2001). Crime and the Internet. NY: Routledge.
Weimann, G. (2004). How Modern Terrorism Uses the Internet, from
http://www.usip.org/pubs/specialreports/sr116.html.
Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Dulles,
VA: Potomac Books.
What are Al Qaeda’s Cyberterrorism Capabilities? (n.d.), from
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/vulnerable/alqaeda.html.
Whine, M. (1999). Cyberspace -- A New Medium for Communication, Command, and
Control by Extremists" Studies in Conflict and Terrorism 22:231-245.
The ecology movement began quite early in history, and in its modern conceptions,
can be traced back to Lamarckism in 1801 and the ideas of Ernst Haeckel in 1866, both
of which rejected Darwin's principle of natural selection. The American
environmentalism movement likewise originated in the 19th Century, primarily in the
ethics of three New England writers: Ralph Waldo Emerson, Henry David Thoreau and
George Perkins Marsh. Ecology became part of student activism on college campuses
during the 1960s, and it was also about this time that big foundations were formed
which used the ecological bandwagon to seek political power. Ecoterrorism, or the eco-
terrorist movement, first appeared in England during the 1970s and spread to the
United States in the 1980s. The FBI was slow in recognizing this single- or special-
interest terrorism, but starting around 2001, the FBI now treats this type of domestic
terrorism as a high priority threat.
ECOFEMINISM
Let's begin with an overview of ecofeminism, which for the sake of brevity is a cross
between radical and postmodern feminism. The term was coined by Francoise
d'Eaubonne in 1974. Radical feminism involves a cosmology of Mother Earth (men as
hunters-despoilers and womyn as nurturing gatherers). Postmodern feminism involves
conversation and discourse about New Age ways of living (such as vegetarian lesbianism
and raising earth-conscious children). True believers worship the Goddess (Brigid,
Tana, or Cerridwen) and adore a Golden Age (Eden) that existed during the Pleisocene
Age. Wicca, or witchcraft, is probably the most popular expression of those beliefs,
although there are many flavors of Wicca. Celtic mythology plays a part, and the
movement is decidedly pagan or neo-pagan. Organized religions, like Christianity, are
rejected because they teach dominion over nature. Men are seen as war-mongers who
like to blow things up, destroy nature (Mother Earth), and exterminate all life on the
planet. Fanaticism within the ecofeminist movement holds that extermination of the
exterminators is a moral commandment, so the appropriate targets (for vandalism) are
military weapons production centers, corporate and small business polluters,
manufacturers of pesticides or herbicides, and anything having to do with nuclear
energy, or weapons of mass destruction.
ECOANARCHISM
There are many varieties of ecoanarchism, but a common theme tends to be loss of
dignity at the hands of technology and how it is destroying our way of life.
Ecoanarchists can trace their heritage back to the 1811-1816 Luddite movement in
England where textile workers broke into the factories to destroy the machines. The
Luddites are considered a precursor of modern labor unions, but they practiced guerilla
warfare, reporting to a fictional general out in the woods called General Ludd. The
variation known as ecosocialism traces its roots to Peter Kropotkin, and post-Marxist
ideologies tend to be either ecocommunalists or social ecologists. Kropoktin's
encyclopedia article on anarchism stands as a classic read.
The movement known as social ecology holds that ecofeminists and deep ecologists
do not go far enough. Social ecologists see all the world's social problems as being
environmental problems, homelessness, for example, being the product of rainforest
devastation. They argue that racism, sexism, and third world exploitation are all
environmental problems. They criticize ecofeminists and deep ecologists for engaging in
nature mysticism, but they agree with deep ecologists that governments must go, and the
Earth needs to be divided up into biospheres.
Most, if not all, ecoanarchists idolize the Unabomber, Ted Kaczinski, who from 1978
to 1996 waged a one-man war against industrialization and technology (see Case Study
below). His targets were scientists, businessmen, and quite often, innocent people, the
latter a matter of no great concern to him. Bombing is, of course, the favorite tool of an
anarchist, but ecoanarchists advocate monkeywrenching, a term taken from Edward
Abbey's 1975 book called The Monkey Wrench Gang. The book describes how to engage
in economic sabotage, such as pouring sugar in the crackcases of bulldozers, driving
metal stakes through the trunks of trees scheduled for logging, and pulling up survey
stakes to stall land use development. Ecosabotage is the preferred means of action for
Earth First! (exclamation mark mandatory), a leaderless group originally founded by
Dave Foreman that spun off from Sierra Club and Friends of the Earth in 1980, which
allows anybody to use their name. It's not surprising that ecoanarchists target dams,
bridges, highways, power lines, ski lodges, and anything symbolic of industrial society.
Millions of dollars worth of machinery is smashed every year, and numerous
construction projects are interfered with to the point that developers give up.
Probably the most exotic form of ecoterrorism involves animal rights extremism, but
it's probably not so exotic since Peter Singer legitimized it in his book Animal Liberation
in the mid-1970s. There are many people who believe that anything with a face has a
soul and should be returned to its natural environment. There are also Ghandian
conceptions of justice that question our belief that if a thing is not alive, can it feel no
pain? Sometimes, people are guided by the concept of biocentrism, a belief that
humans are no more important, and probably less important, than other animals.
Humans should therefore be degraded in a kind of role reversal straight from the movie,
Planet of the Apes. Groups include the Animal Liberation Front (ALF), the Animal
Rights Militia, the Band of Mercy, the Paint Panthers, and an organization with a strong
web presence called Stop Huntingdon Animal Cruelty, or SHAC (Huntingdon Life
Sciences being a firm that contracts with other companies to do pharmaceutical testing
on animals). Activists and law enforcement agents tend to call these groups
"movements." ALF is the oldest group, was originally formed in England during the
1970s, and the FBI regards it much more as a terrorist group than a "movement." ALF
advocates monkeywrenching and violence, as does the ELF. Highly visible and
publicity-seeking, they show no hesitation in bombing or bomb-hoaxing people on their
doorsteps -- people such as furriers, butchers, restaurant owners, veterinarians,
zookeepers, and above all, doctors who do medical research on animals. Sometimes,
they even target homeowners who abuse or neglect their pets. Threats and acts of arson
and firebombing are commonplace at colleges and universities where animals are used
in research or education - just ask any Biology professor who does animal vivisection in
the classroom. Among animal liberationists and other ecoterrorists, there was a belief
that AIDS was nature's way of telling mankind that she (Mother Earth) was unhappy
and did not want humans to pass the year 2000 and for her followers to monkeywrench
the millennium. There's a strange tendency for ecoterrorists to worship anniversary
dates, and to spraypaint, deface, or disrupt McDonalds restaurants quite frequently.
ALF is made up of autonomous underground “cells” and has at least two publications
devoted to their activities: Underground and No Compromise.
Other animal liberationist groups, such as SHAC, use Internet websites for
questionable activities: to report on the activities ("direct actions") of its supporters;
and to list maps, along with addresses and phone numbers, of where a supporter might
find corporations, along with a list of current employees, who engage in animal testing
or research. People who have had their names, addresses, and phone numbers posted
on one of these Internet sites have had their property vandalized, received harassing
calls, or faced demonstrations outside their home and workplace. In some cases, people
have been physically attacked for having their name on a SHAC website. These activist
websites seem to just barely skirt the law, and are considered by the FBI to be
protected on First Amendment grounds. The websites are reminicent of an anti-
abortion (self-described anti-choice) activist who, back in 1998, posted the names and
addresses of abortion doctors where three such doctors got killed [The anti-abortion
"Nuremberg Files" now exist at a website out of the Netherlands]. In that case, a U.S.
District Judge ruled in 1999 that such websites constituted a threat to kill. However,
modern websites get around that legal precedent by posting a "disclaimer" which reads
something like the following:
ECOTERRORISM tends to occur more in the Western United States (in places like
Colorado and Oregon), although it has reached as far East as North Carolina and the
New England states. Most of the nation's animal research labs are located in the
Midwest, however, in places like Michigan State and University of Iowa. Ecoterrorist
acts include vandalism, sabotage, bombing, arson, liberation of animals, destruction of
research data, theft, assault, murder, and infliction of economic loss. Law enforcement
tends to classify many incidents as vandalism, but in any given year, approximately ten
(10) major acts of ecoterrorism are committed in the United States, and they are well-
planned attacks, the economic damage of each one costing about $1 million. No group,
individual, or organization involved in altering the natural environment is immune from
these attacks, and there appear to be no qualms about targeting innocent civilians.
Towards the end of the year 2000, a new form of ecoterrorism emerged among
mischievous middle-aged Americans who grew tired of gas-guzzling SUVs (Sports
Utility Vehicles) and decided to place homemade stickers on them as a form of protest.
These mad taggers are mad about the impact of SUVs on the environment, and a short
collection of their stickers is as follows:
Apparently, the movement can be traced to a 1996 Sierra Club report on how
wasteful the thirteen miles per gallon fuel efficiency of SUVs are. SUVs and other light
trucks are also permitted to emit 29% to 47% more carbon monoxide (CO) and 75% to
175% more nitrogen oxides (NOx) than passenger cars. The tagging of SUVs (and
sometimes gas pumps) is a form of civil disobedience or protest that is more often
humorous than harmful, but the strong glue used for such stickers is irritating and hard
to remove. In addition, the practice makes many SUV owners mad enough to call the
police and pursue prosecutorial action. In most cities, the crime is only one of
unlawfully posting an advertisement and carries a fine of about $250.
Sometimes, the mad taggers go too far. In 2001, an arson attack destroyed 30 SUVs at
a dealership in Eugene, Oregon, and since then, there have been nearly a dozen similar
attacks at SUV dealerships nationwide. One such attack at a dealership in Girard,
Pennsylvania had the shadowy Earth Liberation Front (ELF) claim responsibility. In
November of 2002, a group of self-described ELF activists also slashed tires and
splashed chemicals on some 30 SUVs parked on streets in Richmond, Virginia. This
kind of destruction is more wanton and malicious. Most experts believe the Anti-SUV
movement represents the latest evolution of targeting by ELF, who at one time, prior to
1998, confined their activities to logging and mining companies. Two examples should
suffice to illustrate the contrast:
Although debatable, ELF, or the Earth Liberation Front, will be considered here as
the most active, most dangerous, and largest domestic terrorist group in America (at
least the FBI seems to think so). ELF first surfaced in 1996 when they set fire to a U.S.
Forest Service truck in Oregon, which caused little damage, but have since escalated
into major damage events in populated areas. ELF is a militant offshoot of the group
Earth First! and before that, have roots in such 1970s groups as the Environmental Task
Force, which went around the country blowing up crop dusters because they were
spreading harmful pesticides. They believe in saving the planet from the damage being
done to it by pollution, logging, mining, and real estate development. Their strategy is
that by destroying property and inflicting financial damage, they can convince people to
stop environmentally harmful practices. Like ALF, ELF operates without leadership
and structure, and it may even be inappropriate to call ELF a "group." Activists "join"
ELF by carrying out "direct action," leaving behind some slogans or initials at the crime
scene, and then posting their accomplishment on one of the group's web sites.
According to the ELF website, 75 "direct actions" occurred in 2003, of which half were
claimed in the name of ELF (or ALF), and rest were either anonymous or in the name of
what were called "revolutionary cells" such as the Animal Liberation Brigade, Direct
Action Front, the Frogs, or the Vegan Dumpster Militia.
In 2004, the FBI has been actively tracking and arresting suspected "ringleaders" of
ELF, such as the 23-year old responsible for a 2003 firebombing of a Hummer
dealership. He was caught after sending emails to a major newspaper claiming
responsibility for the crimes. Another shadowy 38-year old "ringleader" was caught in
2004 using fake IDs and attempting to shoplift some boltcutters from a Canadian store.
The FBI's strategy has been to make high profile arrests and attempt to demonstrate the
group's vulnerability. Meanwhile, the property damage keeps adding up.
PYROTERRORISM
Ecoterrorism may very well be the only kind of terrorism which has spawned its own
"backlash" terrorism -- pyroterrorism. The only other kind of terrorism that has
produced a backlash is cyberterrorism, and that has been in the form of vigilante
activity. With ecoterrorism, however, and I should note that there is little evidence to
prove it, suspicion has it that the rash of forest fires in recent years may have been
caused by ANTI-ENVIRONMENTALISTS who are "fed up" with all the pro-
environmental, tree-hugging nonsense (as they see it). The official story that most
governments usually give out is that forest fires are caused by lack of rain, lightning, or
careless campers, but it may very well be that disgruntled anti-environmentalists (who
are sympathetic to the concerns of timber companies) deliberately set the fires.
Pyroterrorism is suspected to be the case more in Australia and Latin America than in
the United States.
INTERNET RESOURCES
Anarcha-Feminism
Animal Liberation Front (ALF)
Center for the Defense of Free Enterprise
CrimethInc
Earth Liberation Front (ELF)
Earth First! Solidarity Links
EarthShare.org
EcoFem.org
Ecofeminism Webring
Eve Online
InContext Journal
Infoshop Anarchy Hub
Stop Eco-Violence
Transition Strategies to a Green Society
Unabomber Manifesto
PRINTED RESOURCES
Abbey, E. (1972). The Monkeywrench Gang. NY: J.B. Lippincott.
Arnold, R. (1997). Ecoterror: The Violent Agenda to Save Nature. NY: Free Enterprise
Press. [Sample excerpt]
Coleman, Daniel A. (1994). Ecopolitics: Building a Green Society. New Brunswick, NJ:
Rutgers University Press.
Denson, B. (2004). "Summer of Fire," Pp. 140-49 in Maxim Magazine, March (75th)
issue.
Eckersley, Robyn. (1992). Environmentalism and Political Theory: Toward an Ecocentric
Approach. Albany: SUNY Press.
Laqueur, Walter. (1999). The New Terrorism. NY: Oxford Univ. Press.
Long, D. (2004). Ecoterrorism. NY: Facts on File.
Nilson, Chad & Tod Burke. (2002). Environmental Extremists and the Eco-Terrorism
Movement. Pp. 1-6 ACJS Today Volume 24 Issue 5 (January/February).
Smith, B. (1994). Terrorism in America. Albany, NY: SUNY Press.
Taylor, B. (Ed.) (1995). Ecological Resistance Movements. Albany, NY: SUNY Press.
Taylor, B. (1998). "Religion, Violence, and Radical Environmentalism: from Earth
First! to the Unabomber to the Earth Liberation Front,” Journal of Terrorism and
Political Violence, 10(4): 1-42. [author's website]
White, Jonathan. (2002). Terrorism: An Introduction. Belmont, CA: Wadsworth.
Last updated: 06/14/04
Syllabus for JUS 429
MegaLinks in Criminal Justice
INSURGENCIES, PEACEKEEPING, AND NATION RE-BUILDING
"The belief in the possibility of a short decisive war is one of the most ancient and dangerous
illusions" (Robert Lynd)
Fighting an insurgency is not the same as fighting a regular war. It requires a special
military strategy where psychological offensives are normally more important that
armed combat (Collins 2002). Further, strategy will often be complicated by ethical or
moral factors, basically because asymmetric warfare is likely to be involved (the enemy
won't fight fair). Also, because insurgencies rely so much on "force multipliers"
themselves, they are best fought with force multiplying forces, such as joint special
operations forces (SOF), and a large part of this should involve peacetime contingency
operations, peacekeeping (PK) operations, and stability operations, although sometimes
a rescue operation can be launched. While some insurgencies will use the tactics of
terrorism, an insurgency differs from terrorism in that insurgency violence is usually
contained within a specific geographical area, and in this respect, is somewhat like
domestic terrorism if like a subtype of terrorism at all. An insurgency also differs from
terrorism in that it is driven more by diffuse anger than a specific cause, and it may be
impossible to identify the leader or spokesperson for an insurgency movement. One
thing that terrorism and insurgencies have in common, however, is the contest for the
"hearts and minds" of the populace, making it a kind of psychological warfare.
Revolutionary ideology is often involved (but not required) whereby both sides to an
insurgency usually claim they are the only ones who can legitimately meet the needs and
expectations of the people. Insurgencies are probably best defined as an extreme form
of political and civil unrest. Criminal justice and law enforcement are urgently needed
during an insurgency, but standard doctrine indicates that such civilian forces should be
commanded and controlled by a military command for effective interagency cooperation
that integrates military counterguerrilla action with the complex of separate and joint
civil and military operations. Some decisiveness (but not necesarily destructiveness) is
called for. Certain attrition-based strategies can be used successfully, but so can
destructiveness strategies. The history of counterinsurgency is filled with many lessons
(and mistakes) to learn from.
Fighting an insurgency is not the same as fighting a war on crime. At some point, the
insurgents are quite likely to use proxies or criminals to do their work, but what mostly
happens is that ordinary criminals and/or disgruntled segments of the population will
jump in on the action. This later tendency is what academics call "primitive rebellion"
or criminal banditry, and it has been noted ever since Hobsbawm (1965), but see the
more recent U.S. Army War College (2005) document entitled "Street Gangs: The New
Urban Insurgency" which compares mutated forms of terrorist-insurgents to criminal
street gangs, or Louise Shelley's Nexus of Organized Crime and Terrorism (pdf) which
explores more high-level connections between criminals and terrorists such as the
commingling of funds from money laundering. It should be noted that few
criminologists have ever thoroughly modeled the explanations for how criminal and
political motivations mix and morph during an insurgency, not because it can't be done,
just because it hasn't been done or is difficult to carry out research on. Thomas, Kiser
& Casebeer (2005) is a good start in directions that are needed.
Since the way a society conducts warfare tells a lot about its social structure and the
beliefs it holds dear, it helps to have some kind of theoretical perspective on warfare to
begin with, and a Darwinian perspective (war evolves) is as good as any, which in fact is
the approach taken by Hammes (2004) who outlines the following four stages in the
history of warfare:
PEACEKEEPING OPERATIONS
Where insurgencies arise, the typical situation involves an emerging democracy which
is trying to come to power in a Third World area which often happens to not be a
sustainable area for life and the people have relatively high expectations of the emerging
government. Another situation where insurgencies are frequently found is with existing
governments that are on the verge of collapse and have been using bullies or thugs to
keep order on the streets, or in some cases, engaging in atrocities against their own
citizens. In such cases, insurgent groups rise up in revolt toward what is just short of a
civil war, and that's what makes insurgency different and similar to terrorism - if it was
a civil war, the fighting would follow some rules. Like terrorists, insurgents don't
usually care if innocent noncombatants get hurt. A typical insurgency contains numerous
acts of sporadic mass violence that closely resemble terrorism, and in some cases, exceed
the problems of terrorism. Another situation in which you'll find an insurgency is when
there's regime change. For example, when the U.S., U.N., or multi-national coalition
invades a country to throw out some dictator or terrorist supporter, there's going to be
resistance to the occupation of that country afterwards, usually by loyalists to the
previous regime, and among other identity-based groups in the population. Insurgency
in this case typically involves ethnic, tribal, gang, or mob violence, and is rarely
organized, but you will still find organized cells of insurgent resistance that carry out
organized terrorist-style acts. Insurgency situations also arise in the presence of
peacekeepers, diplomats, tourists, and charitable organizations that visit foreign lands.
Many insurgencies have started over well-intended religious missionary work, and
others have started because a segment of the population thinks that the visitors are there
to ravish their women.
There are at least approximately five (5) types of insurgent groups. Let's discuss them
as the possible kinds of resistance movements seen in a nation rebuilding effort, and
hold off, for a moment, on the conceptual problem of trying to define a "resistance
movement."
TYPE #1: Regime Loyalists -- These are people who consist of the old military and
security forces of the previous regime, and would include all the volunteer, civilian
militia groups, as well as all the intelligence assets (domestic spies and snitches) for the
previous regime's officials. They are not criminals, and many are, in fact, quite well-
educated, wealthy, and speak English. Their employment records and histories are
likely to have been kept secret, so there's no use in trying to work off some central
directory of government employees. This makes their exact number unknown. Their
modus operandi, however, is quite predictable. They operate on the basis of inspiration,
not taking orders directly from anybody, but dispensing attacks whenever they think the
moment is right, almost as if they could read the minds of their leaders. When they
attack, they do so with reach, skill, strength, and sophistication, and the attacks are
coordinated in military fashion to include distractions and account for counterattacks.
TYPE #2: Disaffected Citizens -- These are untrained, leaderless, delinquents and
criminals for the most part, who will do anything for money, anything in hopes of
making an illegal profit, and may or may not be genuinely angry about the occupation of
their country. Their weapons are frequently homemade weapons or what they can find,
and their attacks are quite unpredictable and on an ad hoc (occasional) basis. The
problems they present are much like the problems of gang behavior on the homefront,
and their actions are sometimes predicable from reading the graffitti they seemingly put
on everything. Their modus operandi is not too smart, however, as they always seem to
exposing themselves in crowds where they try to whip up a protest into mob violence,
and then they get killed. The smarter ones, like citizens in general, keep their role down
to serving as spotters for other insurgent groups.
TYPE #3: Terrorists -- These are terrorists who may have been operating in the
country beforehand, or terrorists who have come into the country after the occupation.
Either way, they represent the same kind of threat, which is that they are usually well-
armed, well-trained, and have an interest in weapons of mass destruction. Standard
terrorist ideology calls for a "scorched Earth" policy after a safe haven has been
occupied, so it isn't past them to use some biological, chemical, or nuclear weapon to
destroy the whole area, civilians and all, to get at the occupiers. Actually, it seems the
continued influx of terrorists to the region works against their interests, as they spend a
lot of time or organizational matters such as "Who's in charge" and so forth.
TYPE #4: Foreign Fighters -- These are people from neighboring countries who either
sympathize with the cause of one or more other insurgent groups, or hate the occupiers
so much, for their own reasons, that they jump at the chance to immigrate and fight the
enemy, "infidels" who have invaded the Muslim world, for example. Generally, they
have little or no military training, and their connection to a cause is usually quite
religious, but the locals often don't want them around. Most come on their own, or at
the prompting of some religious leader back home, and only a few of them have any
resources or money to operate successfully, but they represent a wild card.
TYPE #5: Criminals -- These are most likely narcotraffickers, narco-guerrillas, or
other aspiring drug- or crime kingpins and their henchmen. They will do almost
anything for money or power, although some have ruthless loyalty to a cartel, cabal, or
other transnational criminal organization. Local gangs also present a problem. The
criminal element is the most vicious, attacking and preying upon ordinary civilians.
They almost never have any stated goals or political philosophy. Their objective is to
create havoc for the "hell" of it.
Although resistance movements are known primarily for uniting people across ethnic,
age, and gender lines (i.e., women and children are recruited into the resistance), the
ultimate goal of a resistance movement is to break down the ties of people with their
duly constituted government, and to do so by a strategy of attrition (lassitude or
weariness). Such movements are not very selective about what it takes to accomplish
this, and the intensity of attacks will vary (sometimes being quite focused). They will
seize upon any source of discontent among the people to rally support for the
"movement" -- a hatred of anything. In other words, resistance movements are not
politically well-organized, at least at first, in their so-called "passive" stage.
Insurgencies benefit from chaos, mob violence, societal breakdown, and psychological
turmoil. The (usually) charismatic leadership of an insurgency doesn't really provide
vision or guidance, other than to excite the people into action - militant action where
somebody gets killed or property gets destroyed. Leaders gain prestige by how quickly
they can mobilize people into action, and most groups use multiple leaders since the
movement would be doomed if a single leader were assassinated. Note that this is not
leaderless resistance (as found in some forms of terrorism); instead, it is the concept of
collective leadership.
At some point, the resistance movement selects an ideology that has great appeal to
the most number of people. Often, this ideology is copied in whole or part from the
literature on anti-colonialism or anti-imperialism (e.g., Lenin, Mao, Guevarra,
liberation theology, etc.). Ideological conflicts will inevitably arise within the movement
because the group must be vague enough for broad appeal and specific enough to
address important issues. Additionally, insurgents will have to be ambiguous about how
they plan to accommodate differences among the various groups within society once
they do come to power and get the chance to institute reforms. It is extremely difficult
to sort through the ideological machinations of an insurgent movement; and it is also
extremely important to distinguish the true ideals that fuel the movement from
propaganda. In the secondary stages of an insurgency, armed conflict becomes less
important than the practice of psychological warfare.
PSYCHOLOGICAL WARFARE
The use of propaganda is a prominent feature of psychological warfare, and the CIA,
among others, often classify propaganda as one of three kinds. So-called "black"
propaganda consists of planted material that makes it look like the enemy insurgents are
bad people. Doctored sound- or video-recordings of them saying they don't really care
about their own people or that they are cross-dressing perverts are some examples.
Then, there's "white" propaganda, which is usually easy to obtain and verifiable, that
can truthfully point out how bad the other side is. The population would be informed,
for example, that an insurgent leader has six illegitimate kids with women from the
other side. Finally, there's "grey" propaganda, of the half-truth, half-falsity variety,
otherwise known as misinformation or blowback. Grey PsyOps involve cover and
deception, and are sometimes extremely complex and intricate affairs.
Radio and television broadcasts for the "hearts and minds" of people, in terms of
propaganda and counter-propaganda, have reached new level of sophistication in recent
years. Most viewers are familiar with Radio Free Europe, for example, but Clandestine
Radio Watch tracks the surging development of this phenomena worldwide. In 2004,
the United States launched a Virginia-based, satellite TV station known as Al Hurra (the
Free One) which is intended to be a fair and balanced answer to outlets like Al Jazeera,
the Qatar-based satellite network that fans so much anti-Americanism in the Middle
East. The U.S.-funded Al Hurra channel cost $60 million in seed money plus $40 million
added by Congress to get started, but it reaches 80% of Iraq's population with over-air
transmitters. The former Iraqi regime's (Saddam Hussein's) state-owned television
station was taken over by a U.S. venture group, out of San Diego (SAIC, or Science
Applications International Corp.) that now calls itself Al Iraqiya and resembles Al
Jazeera in many ways. Both Al Jazeera and Al Iraqiya are broadcast 24/7 in Arabic. Al
Jazeera is considered by many in the Arab world as the "voice of truth" because, despite
repeated requests by the U.S. to the Emir of Qatar (who subsidizes Al Jazeera to the
tune of $30 million a year), the Emir keeps repeating he believes in freedom of the press
and Al Jazeera enjoys total freedom. From time to time, Al Jazeera receives videotapes
from Osama bin Laden and/or Ayman Al-Zawahiri, which they edit before airing. U.S.
requests for the original, uncut, raw tapes go unanswered.
To be successful at winning over the "hearts and minds" of a populace, the best
strategy is to utilize many different, interagency efforts and initiatives. These joint and
independent efforts all need to be effectively coordinated, and in this regard, see the
GAO Report on Interagency Coordination relative to countering Arab anti-
Americanism. Propaganda can have a "thermostat effect" which heats up or cools
down a crisis, and propaganda can also have a "wildfire effect" when it gets out of
control and produces long-term, unpredictable effects. Some of these long-term,
undesirable effects include the creation of zealots who, years after a crisis, are still
carrying out hate crime against a demonized enemy of years ago. Other extremists may
construct conspiracy-type distortions based on "outdated" ideas from earlier
propaganda. Certain beliefs and attitudes, emotions and feelings, can rather easily lead
to political extremism and fanaticism. Many of the crazies and fanatics in the world
today exist because some government, somewhere, engaged in propaganda. It's a
dangerous, dirty business, and no self-respecting government ought to engage in it
because it borders on being state criminality (Johns & Borreo 1991).
In any country with an insurgency problem, there's usually one or two main rebel
groups, which themselves may have a variety of spin-off groups, called factions (a
dissenting group within a dissent group), splinter groups (who have broken away
completely from a main group), cliques (small exclusive groups), or juntas (a political
or military faction). Spin-off groups tend to also, like terrorists, create cadres (small
cells of people organized for rapid expansion) and cabals (small cells of people,
sometimes related, organized for secrecy). Militias are the most problematic of spin-off
groups, as they, like some of the other groups, can be right wing or left wing; that is,
pro-regime or anti-regime; supporting the collapsing government or opposing the
collapsing government. These people generally police the streets in the name of their
cause, and if they are right wing (supporting the existing government) and hunt down
other groups, they are engaged in a form of vigilante counter-insurgency. However,
their atrocities may be worse than those of the former regime itself, hence the need for
reigning in vigilantism.
It's important to make at least some distinctions between nation rebuilding and
standard warfare or other war-like actions which are bound by the dictum that "if you
blow things up, you have to rebuild it." Since at least the 1945 War with Japan, the
standard expectation has been that, after an invasion or occupation, annexation of
territory may take place and/or the establishment of a friendly government will occur.
This has been the traditional American approach as a "liberator" instead of an
"occupier" [for occupation law and its relation to nation rebuilding, see Lecture on
OPLAW]. Although the U.S. has some experience, since MacArthur in Japan and
rebuilding Germany after WWII, at provisional or interim "constitutional-like"
methods, these successes have relied primarily upon roundtables or revolving doors
where at least some previous regime legality is left in place, in accordance with
international law mandating preservation of the status quo. The U.S. is not yet skillfully
experienced with what might be called "total nation rebuilding" where the breakdown
has involved the loss of both legitimacy and legality. Nation rebuilding in such climates
usually result from an OOTW (Operation Other Than War) or Low-Intensity Conflict,
and can involve some extreme tactical resistance (Gallagher 1992; Poole 2004) which
takes a long time to deal with.
Nation rebuilding has the defining feature of mixing military and civilian forces,
particularly in areas involving justice, negotiation, or dispute resolution. Military forces
should never be deployed alone to engage in nation building. One of the most basic of all
rules in international law is that you don't wage war on civilians, but in the sense of an
occupier's "war on chaos" or "war on crime," that's exactly what certain occupations
do. The insurgents are going to try and kidnap or kill as many innocent civilians as they
can, and the counter-insurgents are going to be unable to distinguish criminals from
combatants. It's true what Max Weber (1914/1978) said about legitimacy -- neither pure
imposition nor pure agreement will achieve it. If you use strong-arm military tactics,
you run the risk of uniting all the different factions, and then you've got a guerilla war
on your hands. If you act too slowly or softly, a chain reaction takes place, and you've
got countless acts of mob violence on your hands. To do nation rebuilding effectively,
you need to have power and legitimacy. For power, there has to be an overwhelming
police (mixed with military) presence. The RAND corporation estimates that twenty
(20) security personnel for every thousand (1000) inhabitants is sufficient to establish
such a presence, and produces no question about "who's in control" especially when
combined with a massive gun control effort. Other experts say you only need ten (10)
security personnel for every thousand (1000) inhabitants, especially if those personnel
are specialists and coming from an all-volunteer military. Whatever the size of your
force, your next step is to establish legitimacy, and conventional wisdom has it that, at
least according to Elster's (1994) notion, you've got to establish electoral freedom and an
interim constitution (called "midstream legitimacy") that eventually leads to adherence
for the principles of plurality, publicity, and legality (called "upstream legitimacy"). The
following are some other selected ideas on the topic -- presented as option A and option
B.
Option A (Selective Intervention): You can let the civil violence run its course, or at
least let selected acts of insurrection go unpunished. There's actually a school of thought
that supports this idea of just letting things run its course. International law, despite
whatever other values it may contain, requires a certain amount of tolerance. The
principles of national sovereignty and noninterference mean that one nation doesn't
normally interfere in the internal affairs of another nation, and the trick is to tolerate
those parts of an insurrection that have the most to do with internal affairs (such as
family or real estate issues). This strategy, of course, rewards the insurgency, and it will
probably escalate to horrible dimensions. It will be terrible to see all those dead bodies
and faces of starving children on the television screen every night (the CNN effect), but
sometimes it's prudent to let the civil unrest reach its natural conclusion, and let the
indigenous people of that country handle it themselves, much like a natural disaster --
such as a flood, earthquake, or volcanic disruption -- with the rebuilding effort focused
on recovery of things that matter (such as health services, critical resources, and
humanitarian relief). Playing out this strategy runs the risk of being labeled a
colonialist exploiter (which is what you'd definitely be accused of if you partitioned the
country into separate zones or provinces), but being called bad names is something
you're going to be accused of anyway, even in humanitarian situations (needy nations
sometimes resent receiving charity). It may be better to preserve your economic vital
interests than save your political face or try to achieve political solutions in an
insurgency situation. The U.S. democratic system doesn't travel well, and democracy
cannot be exported wholesale to some other place. It must be a product of
internal domestic development in a society. There are actually degrees of "letting
things run its course" and most nations, do not, of course, ever follow the fully extreme,
non-interventionist route. Far more likely to happen is that, with a relatively ignored
insurgency, there will be more directed and targeted violence at expatriates, foreigners,
and other targets of opportunity, and there is the risk that violence will spill over into
internecine conflict on other lands.
Option B (Fiscal Law approach): You can engage in both humanitarian and political
rebuilding in the form of leaving behind better roads, schools, food, hospitals, etc., and
civilized nations adhering to the principle of civility have always thought that these
"pre-political" acts of kindness and love will have important consequences for human
dignity. The problem, however, is that during active upheavals of social upheaval, most
humanitarian aid will be intercepted and monopolized by one or more of the insurgency
groups. It can be almost guaranteed that the food, first aid, and supplies will never get in
the hands of those starving children you saw on television. Insurgency groups have even
been known to kidnap and execute Red Cross or Christian groups trying to get
humanitarian aid into the country. Protection of humanitarian aid efforts and/or the
notion that a threat to human rights anywhere is a threat to human rights everywhere
are the only two good reasons for mounting an enforced humanitarian aid operation. In
fact, it may be precisely at this point in the endgame -- when humanitarian efforts fail --
when it is time for the occupying power to "dump" the rebuilt nation on the world's lap
-- or perform the handoff in some politically feasible manner. It's important to
emphasize exactly how politically correct the handoff must appear because dumping
must not appear to have occurred. However, it will always appear to be done abruptly,
and it is never perfect. No transition plan in the world is likely to be satisfactory to all
parties. If you leave an interim government in power assisted by your advisors, it will
quickly be seen as having no legitimacy (a puppet government). Your hardest choice
may involve a complete pull-out or withdrawal, leaving what precious few democratic
institutions you've built in place and subject to fate. Your worst fate may involve a
seemingly unsolvable refugee problem, and refugees flock not only out of safety but in
order to obtain any handouts. Over 7 million refugees have been restricted or
segregated in camps or settlements for a decade or longer (e.g., 300,000 Angolans in
Zambia, Congo-Kinshasa, and Namibia; 2 million Afghans in Iran and Pakistan;
100,000 Bhutanese in Nepal; and 500,000 refugees from Sudan).
Although far from a blueprint for nation-rebuilding (if anything like a perfect
"blueprint" existed), the example of Iraq's Coalition Provisional Authority is
illustrative of the magnitude involved in re-establishing a nation from scratch. Iraq's
CPA is based on the idea of restoring the ministerial form of government in transitional
form. Ministries are the same as executive cabinet agencies, and they should have the
power to propose laws that are approved by a temporary civilian administrator. As
long as we are discussing the concept of what since 2002 has been called the idea of
"Provincial (Provisional) Reconstruction Teams (PRTs), it might also be important to
point out that, as Schnaubelt (2005-06), that tensions are inherent whenever "civilian"
and "military" responsibilities intersect when attempting to implement frameworks or
models. The organization chart which follows should be illustrative:
Let's take a look at exactly what's involved in a country after an insurgency problem.
Some of these are similar to crime problems, but they go way beyond that to describe
the total breakdown of a country. There's usually a lot of the following going on:
The regular police will have all disbanded, fled into the hills, or been absorbed into
some militia group, divided up along ethnic lines, or worse yet, become an even more
reactionary, counter-counter insurgency group. It should be obvious that one of the
main purposes of counter-insurgency is to restore legal order, to act as some sort of
international police force. However, no military service in the world is designed for this
purpose. The military is trained to take and hold territory, not demonstrate how proper
search and seizure techniques ought to work. By the time you get any kind of ground
force in place, it's too late to conduct any crime prevention or community oriented
policing. A military occupation force is definitely needed to provide stabilization and
restore order.
The CIA did a study in 1994, called the State Failure Task Force Report, the findings
of which coincide with the findings of Kaplan (1994) and Rotberg (2003), which helped
to determine what the primary factors were that lead to total social breakdown. They
determined three primary factors:
• international trade -- most of the countries that fell into chaos were drowning
in debt and had depleted all their natural resources. They had nothing to export
that other countries wanted, and they had to borrow money from IMF to import
even the most basic things that would give their citizens a decent standard of
living.
• infant mortality -- overpopulation, urbanization, overcrowding, stillborn
deaths, crib deaths, and fatal childhood diseases characterized most child-raising.
No food, water, product, or environmental safety was in place. Disease was
rampant. Medical professionals, like anyone with advanced degrees, had long left
the country in a brain drain.
• undemocratic elections -- the government and people just couldn't seem to
implement the idea of honest and fair elections. Whole ethnic groups were
excluded, elections were rigged, and ballots were either undercounted or
overcounted. Tribalism and vigilante responses to crime and disorder were
prevalent.
Seventy percent (70%) of all insurgency problems can be predicted with just the first
three factors, two years in advance. When a country breaks down, it becomes prime
breeding ground for criminal organizations, terrorist training camps, and an economy
of smuggling. It's not a pretty site when a country breaks down, but the interesting
sociological question is whether social order breaks down. Chances are that some
customs, folkways, and norms will remain, and the temptation of theocracy is that mores
will cohere these remaining social building blocks into some sense of theodicy or
predictability. In a post-insurgency situation, the people will flock to the religious
institutions even more than before. A diversity of religious institutions is therefore
important to have in place, or at least some other social institutions that provide
countervaling values. The more secular and this-worldly an occupying power leaves a
re-built nation, the better.
During the Cold War between Communism and Capitalism, both the Soviets and the
U.S. played an enormous number of games, or proxy battles, by stirring up trouble,
supporting insurgent groups, and generally meddling in the internal affairs of other
nations. Neither side in the Cold War really had to look hard for places to stir up
trouble, as the whole world is full of numerous places where ethnic unrest, territorial
disputes, and communal conflicts have existed for centuries. Such places throughout the
world can be called cultural cleavages, and many of them go back as far as the
Ottoman Empire or any other major war where territories were broken up in treaties.
The U.N. Charter specifies that all societies have some stake in each other. It speaks of
human rights and self-determination. Chapter 7 of the U.N. Charter specifically
authorizes the use of an international military presence for the formation of an
international civil administration. This is called the establishment of a provisional
government until an indigenous government can be reestablished. The U.N. declares
peacekeeping operations by passing various Resolutions. At any given time, the U.N. has
about a dozen such active Resolutions, which means there are 12 peacekeeping
operations going on someone in the world.
Another item that triggers action, sometimes unilateral action, is the CNN effect, or
when people get sick and tired of seeing starving children and needless bloodshed on
television. It's unknown exactly how the news networks like CNN decide upon which
stories to cover, but sometimes special coverage of some troubled area of the world
produces the political will for some civilized nation to act. Other times, civil unrest can
go on for decades (such as the Sudan or Afghanistan) or be especially current (such as
Chechnya), and the public will not be moved by any amount of media coverage.
CONGO -- In 1994, an aircraft was about to land in Rwanda carrying the Presidents
of Rwanda and Burundi. The plane was attacked upon landing by political extremists,
killing both Presidents. The population of Rwanda at the time was 90% Hutu and 10%
Tutsi. The distinction between Hutu and Titsi is no apparent from culture, language,
appearance, or name. The Tutsi were warriors and cattle herders, favored by the
German and Belgian colonial administration who gave them special identity cards. The
Hutu were farmers who came to power in 1962 when the colonists left. After the plane
attack, extremist Hutu groups formed to assault the more moderate Hutu and try to
wipe out the Tutsi. As the crisis played out, the Tutsi received military support from
Uganda and seized control of Rwanda, but not before 800,000 Tutsi had been killed.
Millions of Hutu were killed or drove out into Zaire. Zaire changed its name to Congo
after accommodating so many of the refugees from the Rwanda massacre, or genocide.
In 2001, the President of the Congo was assassinated. This is a good example of total
breakdown and an area still ravaged by the legacy of unmet justice.
INDONESIA -- In 1997, the entire Asian financial market collapsed. All Asian
countries from South Korea downward to Malaysia were involved in a central Asian
bank that managed exchange rates, loans, and a stock exchange. The collapse was due to
a tradition of loose regulation and political favoritism that resulted in many bad loans.
Most Asian currency was floating high against the dollar prior to 1997, so foreign
investment flowing in from the West was converted to local currency with high interest
rates of return. This had the effect of inflating the stock and national assets of Asian
countries. When investors and the IMF came to believe that the high values of Asian
stock were artificially inflated, speculative pressures rapidly eroded value to a point well
below any international rate of exchange, so that even in American money, debts could
not be paid off nor could any return on investments be given. The IMF cut off loans to
Indonesia, Malaysia, Thailand, and South Korea. Indonesia was the first to see
insurgency violence on account of this. In 1998, native Indonesians started attacking
Chinese immigrants, seeing them as a scapegoat. In 1999, militia groups, assisted by
rogue army units, terrorized the civilian population of East Timor, in the wake of an
election on independence. This is an example of an emerging democracy attempting to
emerge.
SOMALIA -- This country was originally a Soviet satellite which switched to the
American side after the Soviets backed their enemy, Ethiopia, in a 1977-78 war.
Ethiopia, with Russian and Cuban backing, won that war, and seriously undermined the
legitimacy of the Somalian government. Somalia borrowed some $3 billion to fund
agriculture exports to Saudi Arabia, but ended up depleting their soil during the 1980s,
and started having trouble paying back the debt. In 1991, the leader of Somalia, Siad
Barre, abandoned rule and fled the country. Various militia groups and clan warlords
took over the country, executing at least 350,000 civilians. Italy tried to step in, as did
Djibouti and Egypt, with some success as keeping things relatively quiet, but pictures of
mass starvation in 1992 led the U.N. to invoke Chapter 7 and send a military force of
500 Pakistani soldiers in. All 500 of them were quickly captured, held prisoner, and
many were executed. Algeria stepped in, but ended up siding with warlords against the
U.N. With the start of 1993, the U.S., with U.N. approval, sent in a Marine
Expeditionary Force of 28,000 troops, but American television viewers were soon
treated to the sight of a dead marine being dragged behind a truck speeding through the
town of Mogadishu. Diplomatic and humanitarian efforts failed, with all aid going into
the hands of two warlords, Ali Mahdi Mohamed and Mohamed Farah Aideed. All in all,
18 American Marines were killed in 1993, so the U.S. withdrew. The U.N. has sent in
numerous peacekeeping forces since then, and the U.S. Rangers conducted an
unsuccessful secret manhunt mission for the worst of the warlords, but the country has
remained without a government since 1991. This is an example of a country that has
descended into chaos.
YUGOSLAVIA -- This country has always had a communist orientation and been a
friend of the Soviets, but toward the end of the Cold War, around 1990, it started
warming up to capitalism, and the IMF let them borrow $20 billion, which they
promptly wasted away. They also did nothing to manage their ethnic diversity.
Yugoslavia is a nation of Serbs, but the Serbs exist in other countries also. The first sign
of trouble appeared in BOSNIA during 1991 between the Serbs there (French-speaking
Serbs) and the Croatians (a Muslim group that was given their land by the Germans).
Factions broke out between Serbs, Croatians, and Muslims, starting in Croatia,
spreading to Slovenia, and then to Bosnia. The Serbs were the minority group in all
three countries, and with Yugoslavian backing, starting artillery assaults on the cities of
the majority groups. The United States sided with the Muslim and Croatian groups, but
didn't commit ground troops until 1995. By that time, millions of Croatians and
Slovenians had been killed or displaced. In Bosnia, Serb troops also kidnapped and
highjacked humanitarian aid supplies. In 1999, the problem area shifted to KOSOVO
where the factions were between ethnic Serbs and the majority Albanians. The
Yugoslavian leader, Slobodan Milosevic, whipped up Serbian nationalism, and all the
police and political institutions in Kosovo became Serbian. Albania and Macedonia
promised to stay out of it while the U.S. sent diplomats. Again, humanitarian relief
workers were kidnapped or killed. The U.N. had granted discretionary power to the
Secretary-General, but the U.N. Security Council was deadlocked, so NATO undertook
an air strike operation against Milosevic, assuming U.N. authority. It was the first
offensive operation NATO, a defensive organization, ever undertook. The operation
almost brought Russia into the fray, but they had their own insurgency problem in
Chechnya and elsewhere. This is an example of the difficulties in rebuilding.
IRAQ -- When the coalition forces liberated Iraq from its regime in 2003, there was a
period of civil unrest, including looting, which was allowed to run its course for a short
while. Then, the counter-insurgency effort shifted to the priority of capturing the
fugitive war criminals. To assist in this effort, the Defense Department printed up a
small number of playing cards with the faces of these war criminals on them. The use of
such playing cards was an old military tradition that the DIA wanted to re-implement.
The cards were called Personality Identification Playing cards, and for the Iraqi Top 55,
they looked like the following:
There is perhaps nothing more important on the world stage than the outcomes of
constitutional institutions and processes in states which have been rebuilt. Also
important are the long-range implementions of sovereignty, sustainment, and freedom.
If Iraq manages to succeed in this process, it will have become a shining beacon of
freedom in the Middle East, and if not that, at least a testimonial to those soldiers who
gave their lives. The following are some basic elements needed for a Constitution-based
freedom tailored for a Middle Eastern country. Exactly how these basic elements are
spelled out in the actual wording of a Constitutional process is not important; what's
important is that the values are codified.
A democratic government based on a federalist model - Swiss, German, or
American, it doesn't matter which one - where all the separate states and provinces
are unified and drawn upon geographical lines rather than ethnic lines; where
minority rights are guaranteed - such as the Kurdistan model of allotting a specific
number of parliamentary seats to key minority groups; where there is also a
guarantee of equality for all people, including women and built-in rights for women
in regards to things such as polygamy and honor killings; where rational economic
planning and fair distributions of oil profits are considered; and the government
operates in ways that are consistent with Islamic values without being subservient to
theocratic law.
Numerous resources need brought to bear on any such project, particularly social
science and analytical expertise. On the former, North Carolina's Research Triangle
Institute (RTI) got the $167 million contract for rebuilding the local governance
infrastructure in Iraq, and they effectively use their survey data-gathering skills to
develop some consensus on what the people there want and/or need. They also conduct
training sessions for Iraqi officials on how to build democratic (meaning transparent
and accountable) institutions important to the political economy. RTI's approach is
known as "democratic decentralization" which is a type of institution building based on
analytical identification of diverse interest groups and selection of leaders for those
groups. No self-nominations or interviews are conducted to select leaders as the whole
idea is to create a system of checks and balances by having many relatively powerless
leaders rather than having a few popular warlords gain power. Warlordism was a
problem with the reconstruction of Afghanistan, and militias and cadres of this type
need to be analyzed or looked at from both exogenous and endogenous viewpoints
(Thomas, Kiser & Casebeer 2005). Warlordism (as thuggish units) usually don't have
the attitude, structure, or effectiveness of professional military units, or insurgents, but
they are nonetheless masters of the more "criminal" realms of a society. The whole trick
with a nation the size of Iraq, like Afghanistan, is to develop some type of federalism
model, in which you have decentralized authority in provinces and towns, but
centralized authority in the nation's capital. Rebuilding efforts depend heavily upon
what engineers from companies like Halliburton and five other companies can do to get
the infrastructure for basic services, like transportation, electricity, water and sewage,
agriculture, health, and education up and running again. Lots of other contractors are
involved in both construction projects, small business development, and the tasks of
management consulting; companies like Aegis Defense Services, DynCorp, Erinys
International, and Vinnell Corp.
It's not well-known, but a rather large industry has evolved from the old days of guns-
for-hire mercenaries, and these Private Military Firms (PMFs) play a key role on the
global stage in doing jobs that, in many cases, involve insurgencies and tasks too
dangerous for regular soldiers to do. Singer (2003) was the first to document the rise of
this industry which he called the "coalition of the billing." Private soldiers may be
especially useful when a low-profile force is needed to solve an awkward, potentially
embarrassing situation that develops on the fringes of policy. It is also the case that the
death of private soldiers don't carry the same political baggage as the death of American
G.I.s. As of 2005, there are as many as 60 different security firms doing private military
work for the U.S. government. A significant presence exists in places like Latin America
(to fight the drug war), and PMFs account for at least 30% of the work being done in
Iraq. Firms like MPRI and Blackwater USA can provide not only tactical and strategic
services, but "boots on the ground" as armed security escorts for peacekeeping
operations. Some PMFs, like Kellogg, Brown and Root (KBR), provide military support
services, such as delivering military equipment, preparing meals for soldiers, delivering
mail, and putting out oil-field fires, as well as handle inprocessing and outprocessing of
personnel in and out of the region. Some, like CACI, have assisted with interrogations
of prisoners, although not without some scandal. Others, like DynCorp (who have
removed their web presence) have also been involved in scandal, but continue to play a
rather large role overseas and at home (administering the Justice Department's asset
forfeiture program, for example). Still others, like the now-defunct Executive
Outcomes, engage in actual combat using former soldiers. During the first Gulf War,
one of every 100 Americans in that region worked for a PMF. Today in Iraq, one of
every 10 Americans works for a private military contractor. Since there are only a
limited number of military reservists that can be called up for active duty (a politically
unpopular option), PMFs provide the outsourcing often needed to conduct effective
nation re-building. For the most part, these firms operate very professionally, and only
a small number of "bad apples" have been involved in scandals.
The Reserves consist of seven groups and even include retirees: the Army National
Guard; the Army Reserve; the Naval Reserve; the Marine Corps Reserve; the Air
National Guard; the Air Force Reserve; and the Coast Guard Reserve. Reservists work
for the federal government while the National Guard works for state government, and
neither group has any choice under Title 10 of the U.S. Code to activate if called, but
they can volunteer if they like. The Secretary of Transportation can also (under Title
14) call up the Coast Guard Reserve, but they can only be used domestically, and for 30
days. The following table lists the three most common ways in which Reservists are
called up: PRC standing for Presidential Reserve Call-up, which means for mission
purposes the President has deemed required; Partial Mobilization meaning a war or
national emergency exists; and Full Mobilization meaning Congress has declared war,
and every able-bodied man (or woman) between the ages of 17 and 45 (the unorganized
militia) is eligible to be called-up.
Civilians find many ways and places to contribute to post-conflict situations (but
they can also meddle and do otherwise). One of the lessons learned with post-conflict
Iraq is that civilians should NOT generally be used to train security forces, at least
initially. This is a job best left to the military. However, if "capacity building" is
important (as it always is in any framework of post-conflict reconstruction), there is a
need for civilian involvement, at least in the less law enforcement-related aspects of
criminal justice. As many books (e.g., Schnabel & Ehrhart 2005) and the CSIS
Framework for Post-Conflict Reconstruction (pdf) make clear, security is only one of
four pillars of reconstruction principles, all four as follows:
INTERNET RESOURCES
Africa Watch
Clandestine Radio Watch
CNN Special on Algeria's Insurgency Problem
CNN Special Report on Bosnia, Kosovo, and Yugoslavia
Center for Strategic & International Studies (CSIS)
Crisis States Programme
CSIS PostConflict Reconstruction Project
East Timor: Another Somalia in the Making
Freedom Fighters, Dissidents, and Insurgents
George Mason's Institute for Conflict Analysis & Resolution
Global Policy Forum's Guide to Peacekeeping Operations
Insurgency: The Unsolved Mystery
Jane's IntelWeb List of Insurgency Groups
Lyco's Infoplease on Indonesia
Palgrave Macmillan's Online Resource Center
Project on Insurgency, Terrorism, and Security
Psychological Operations and Psychological Warfare
Shock and Awe on the Air (Radio Broadcasts in Iraq)
Theoretical Aspects of Insurgency in the Contemporary World
Tom Barnett's Website (Pentagon's New Map)
U.N. Peacekeeping Website
Univ. New Brunswick's Guide to Peacekeeping Operations
US Army Center for Lessons Learned (secure website)
US Army Peacekeeping Institute at Ft. Carlisle
US CounterInsurgency Operations in Colombia
US Committee for Refugees and Immigrants
PRINTED RESOURCES
Arendt, H. (1963). On Revolution. London: Faber and Faber.
Bell, J. Bowyer. (1999). Dragonwars. New Brunswick, NJ: Transaction Publishers.
Boward, J. (2003). Terrorism and Tyranny. London: Palgrave Macmillan.
Byman, D. et. al. (2001). Trends in Outside Support for Insurgent Movements. Santa
Monica: RAND.
Central Intelligence Agency. (n.d.) Guide to the Analysis of Insurgency. Washington
D.C.: CIA.
Chaplin, A. (2003). Terror: Mao's Legacy and Selected Cases of Terrorism in the 20th and
21st Centuries. Lanham, MD: Univ. Press of America.
Chesterman, S. (2005). "Occupation as Liberation: International Humanitarian Law
and Regime Change." Ethics and International Affairs 18(3): 51-64. [journal contents
online]
Clawson, P. (Ed.) (2002). How to Build a New Iraq After Saddam. Washington DC:
Brookings.
Cohen, J. (1989). "Deliberation and Democratic Legitimacy." In A. Hamlin & P. Pettit
(eds.) The Good Polity. Oxford: Basil Blackwell.
Collins, J. (2002). Military Strategy: Principles, Practices & Historical Perspectives.
Washington DC: Brassey's.
David, S. (1991). Choosing Sides: Alignment and Realignment in the 3rd World.
Baltimore: Johns Hopkins Univ. Press.
Dobbins, J., McGinn, J., Crane, K., Jones, S., Lal, R., Rathmell, A., Swanger, R. &
Timilsina, A. (2003). America's Role in Nation-Building: From Germany to Iraq. Santa
Monica: RAND. [sample chapters]
Eckstein, H. (ed.) (1964). Internal War. NY: Free Press.
Elster, J. (1994). "Constitutional Bootstrapping in Philadelphia and Paris." In M.
Rosenfeld (ed.) Constitutionalism, Identity, Difference and Legitimacy. Durham, NC:
Duke Univ. Press.
Elster, J. (1998). Deliberative Democracy. NY: Cambridge Univ. Press.
Feil, S. (1998). How the Early Use of Force Might Have Succeeded in Preventing Genocide
in Rwanda. Washington DC: Carnegie Foundation.
Fox, G. (2005). "The Occupation of Iraq." Georgetown Journal of International Law
36(2). [FindArticles excerpt]
Frum, D. & R. Perle. (2003). An End to Evil: How to Win the War on Terror. NY:
Random.
Gallagher, J. (1992). Low-Intensity Conflict. Mechanicsburg, PA: Stackpole Books.
Glenny, M. (1999). The Balkans: Nationalism, War and the Great Powers, 1804-1999. NY:
Viking.
Grennan, S. et al. (2000). Gangs: An International Approach. NJ: Prentice Hall.
Hammes, T. (2004). The Sling and the Stone: On War in the 21st Century. St. Paul, MN:
Zenith Press.
Harff, B. (1989). "Victims of the State: Genocide, Politicides, and Group Repression
since 1945" International Review of Victimology 1:23-41.
Heidenrich, J. (2001). How to Prevent Genocide. Westport, CT: Praeger.
Hobsbawm, E. (1965) Primitive Rebels: Studies in Archaic Forms of Social Movement.
NY: Norton.
Holzgrefe, J. & Keohane, R. (Eds.) (2003). Humanitarian Intervention. NY: Cambridge
Univ. Press.
Jeong, Ho-Won. (Ed.) (2002). Approaches to Peacebuilding. London: Palgrave
Macmillan.
Johns, C. & Borreo, J. (1991). "The War on Drugs: Nothing Succeeds Like Failure" in
G. Barak (ed.) Crimes by the Capitalist State: An Introduction to State Criminality.
Albany, NY: SUNY Press.
Jones, S., Wilson, J., Rathmell, A. & Riley, J. (2005). Establishing Law and Order After
Conflict. Santa Monica: RAND.
Kagan, R. & W. Kristol. (Eds.) (2000). Present Dangers: Crisis and Opportunity in
American Foreign and Defense Policy. San Francisco: Encounter Books.
Kaplan, R. (1994). "The Coming Anarchy." Atlantic Monthly (Feb) 273(2): 44-76. [online
copy of article]
Kaplan, R. (1997). The Ends of the Earth: From Togo to Turkmenistan, from Iran to
Cambodia, a Journey to the Frontiers of Anarchy. NY: Vintage.
Lacquement, R. (2005). "Building Peace in the Wake of War: Appropriate Roles for
Armed Forces and Civilians." Pp. 282-294 P. Bolt, D. Coletta & C. Shackelford (eds.)
American Defense Policy, 8e. Baltimore: John Hopkins Univ. Press.
Laqueur, W. (1998). Guerrilla Warfare. New Brunswick, NJ: Transaction Publishers.
O'Neill, B. (1990). Insurgency & Terrorism: Inside Modern Revolutionary Warfare.
Dulles, VA: Brassey's.
Palmer, M. (2003). Breaking the Real Axis of Evil: How to Oust the World's Last Dicators
by 2025. Lanham, MD: Rowman & Littlefield.
Peters, R. (2002). Beyond Terror: Strategy in a Changing World. Mechanicsburg, PA:
Stackpole Books.
Peters, R. (2003). Beyond Baghdad: Postmodern War and Peace. Mechanicsburg, PA:
Stackpole Books.
Peterson, P. (2002). "Public diplomacy and the war on terrorism." Foreign Affairs,
Sept/Oct, 8(3), 74-94.
Poole, J. (2004). Tactics of the Crescent Moon: Militant Muslim Combat Methods.
Emerald Isle, NC: Posterity Press.
Pugh, M. (Ed.) (2000). Regeneration of War-Torn Societies. NY: Palgrave Macmillan.
Rice, E. (1988). Wars of the Third Kind. Berkeley, CA: Univ. of CA Press.
Rotberg, R. (Ed.) (2003). State Failure and State Weakness in a Time of Terror.
Washington DC: Brookings.
Schnabel, A. & Ehrhart, H. (Eds.) (2005). Security Sector Reform and Post-Conflict
Peacebuilding. NY: United Nations Univ. Press.
Schnaubelt, C. (2005-06). "After the Fight: Interagency Operations." Parameters 35(4):
47-61.
Singer, P. (2003). Corporate Warriors: The Rise of the Privatized Military Industry. NY:
Cornell Univ. Press.
Steinbruner, J. (2000). Principles of Global Security. Washington DC: Brookings.
Thomas, T., Kiser, S. & Casebeer, W. (2005). Warlords Rising. Lanham, MD: Rowman
& Littlefield.
Weber, M. (1914/1978). Economy and Society. Berkeley: Univ. of CA Press.
Zangeneh, H. (1994). Islam, Iran, and World Stability. London: Palgrave Macmillan.
[author's website]
ABC (Atomic, Biological, Chemical warfare - a slightly outdated WWII term) is also
known as NBC (Nuclear, Biological, Chemical), CBRN (Chemical-Biological-
Radiological-Nuclear), WMD (weapons of mass destruction), superterrorism (Sprinzak
1998), or ultimate terrorism (Stern 2000). It involves weapons which have the capability
to extinguish life on the planet, or in other words, serve as doomsday devices, although
such weapons can also be used in a limited manner, as with so-called "biocrimes," for
example, as when a letter containing some agent is mailed to a victim, or as with so-
called "dirty bombs" which are only intended to produce radioactive contamination.
"Super" or "ultimate" terrorism, however, is as bad as terrorism can get. It's real
"Wrath of God" type stuff, involving huge climatic or pandemic events. To evil rogue
states who see no other way out, to lunatic terrorist groups worldwide and domestic, and
to religious fanatics bent on seeing the apocalypse, these are their weapons of choice if
they have crossed the line of moral repugnance about using them. Such weapons are
indiscriminate in who they kill and they get the job done. Biological agents, in
particular, are not only cheap and portable, but weapons with no return address that can
be somewhat easily used in a limited context. As real as the threat is from such
weapons, some experts say there's no need for panic because most terrorists use VPD
(visually pleasing destruction) or cyberterrorism (weapons of mass disruption) instead of
WMD (weapons of mass destruction) because the former produce the best twenty-minute
news story (if the terrorists are of the type concerned about media coverage; e.g.,
crusaders or the like). If history is any guide, producing and/or obtaining such weapons
has been a formidable task for terrorists and for many nations over the twentieth
century (Parachini 2001).
To be sure, many states have crossed the line and used WMD. There have also been
military factions within a sovereign state that took it upon themselves to release WMD,
or use a clandestine, non-state group to do its dirty work. It is the proliferation of such
weapons into the hands of these non-state, sub-national actors that draws the concern
of most experts (Hoffman 1997). The mindset of some terrorists is such that they are
drawn to explosions like arsonists are drawn to fire, so nuclear weapons are their
preferred choice. Other terrorists may have a preference for chemical weapons because
of their long-term incapacitating effect since lots of survivors tend to develop nerve and
brain damage over time. Still other terrorists may have a preference for biological
weapons because of their stealthiness and delayed impact since they mimic the effect of
natural disease outbreaks. There is a need for more scholarly research on this topic as
no one really knows who will use what, when, and where (despite Tom Clancy novels
which usually involve a convention or sports venue).
Chemical (gas) weapons have a long history. The most well-known incident involved
the Japanese cult group, Aum Shin Rikyo (Supreme Truth) who released fatal sarin gas
on the Tokyo subway system in 1995. Toxic gases were also detected by Czech and
Coalition troops during the First Gulf War. At least 25 nations possess complete CBR
capability, and 44 nations are suspected of being in the process of obtaining such
capability. The first chemical weapon used in battle was chlorine gas, which burns and
destroys lung tissue, is easily made from common table salt, and is desirable to use on
the battlefield because the big gas cloud usually wipes out an overpowering enemy.
Modern chemical weapons greater killing power (such as VX nerve toxin), and a lot less
of it is needed to kill vast numbers of people. Despite improvements in protective gear,
there really is no good way to protect people from a large-scale chemical attack.
Biological (germ) weapons were used in 1984 by a religious cult group in Oregon
known as the Rajneeshees, who tried to win a local election by sickening local
townspeople with a strain of salmonella sprayed on the salad bars in local restaurants.
The Bulgarian and South African governments have been known to use biological
materials to kill political opponents, and the 2004 Ukrainian election involved
allegations of poisoning. Biological warfare agents were banned by the U.S. in 1969, but
resurrected in 1990 under Project Clear Vision. The oldest germs are the cheapest and
most lethal -- anthrax, botulism, and the plague. Bacillis anthracis (anthrax) has a 95%
mortality rate, and can attack three ways -- cutaneous, intestinal, and respiratory. The
most well-known incident involving anthrax was the October 2001 case in which
somebody mailed letters containing inhalation spores of anthrax to three news reporters
and two U.S. Senators. The germ, ebola, by contrast, only has a 70% mortality rate and
smallpox 30%. Anthrax spreads easily, although the secrets for powderizing it to
military grade are classified at Ft. Detrick, the nation's biowarfare center. It is believed
that a freeze drying process is used to turn the spores into a powder, and then silica is
added to remove any electrostatic charge, making it more dispersible. One and a half to
three microns in size is the most dangerous. Designer powders are possible, which
includes heavier powders that can be left on the ground to become airborne after
awhile. There is evidence that the Soviets were working on designer germs, which are
created by mixing different kinds of viruses to mutate new organisms. By far, however,
the cheapest and easiest germ to produce is ricin, a toxic, incurable substance produced
as a by-product from the processing of castor beans, which is an easily-found recipe on
the Internet. The mortality rate of ricin varies with the method of delivery. The highest
mortality results from injection of ricin under the skin, and Cold War-espionage stories
abound with tales of spies who used assassination umbrellas that injected a pellet of ricin
from their tips. In 1993, Canadian authorities captured a neo-Nazi from Arkansas with
a carload of ricin trying to cross the border. In 1995, two Minnesota men associated
with a tax-protest group called the Patriots Council were convicted of possessing ricin
with intent to use. In October 2003, someone hand-delivered a package containing Ricin
to a mail-sorting center at a South Carolina airport, with a note complaining about
federal rules mandating 10 hours of rest in every 24 for long-haul truckers. The same
person or group sent traces of Ricin to Senators in 2004. Unlike anthrax, ricin is tough
to aerosolize and inhale, the easiest way to deliver a fatal dose being injection or
ingestion, and you need a lot for the latter.
With nuclear weapons, most concern centers on the former Soviet Union (despite
Nunn-Lugar legislation designed to help enhance Russian security) where so-called
loose nukes or weapons-grade plutonium might slip out. Russia is estimated to have
some 20,000 warheads still assembled, and about 170 tons of plutonium and 900 tons of
HEU (highly enriched uranium). Treaties, such as the 1995 non-proliferation treaty
which 182 nations signed, are regularly violated, and few countries contribute to post
Cold War nuclear security cleanups. CBR warfare does requires intensive intelligence
work on development, deployment, and delivery capabilities, but there is the less-
technical problem and concern regarding dirty bombs, formally called radiological
dispersion devices, which use conventional explosives to fling radioactive isotopes in a
plume of dust which can contaminate at least a 60-square block area. The al Qaeda
terrorist group is known to have made substantial efforts to buy black market isotopes.
Plutonium and weapons-grade uranium are well secured, but that is not true of many
lower-grade nuclear materials required for a dirty bomb. Cesium-137 in the form of
powdered cesium chloride is the most likely substance for a dirty bomb, and it is
commonly found in hospitals and industrial facilities. Other radioactive isotopes are
commonly found. Hospitals and research universities have cesium, strontium, cobalt,
and americium, and traces of americium are also in smoke detectors. Food processing
plants, oil monitoring facilities, and other industries also have devices that use cobalt. In
addition, the U.S. is one of the world's worst offenders regarding nuclear waste. There
are currently about 45,000 tons of nuclear waste stored in 131 sites across the country,
and by 2035, that amount is expected to grow to more than 115,000 tons. Nuclear waste
is usually in the form of spent fuel rods, and is highly radioactive and dangerous, and
will be for tens of thousands of years. Most expects advocate storing all of it under the
Yucca Mountain in Nevada, but first shipments aren't scheduled to arrive there until
2010. Launching nuclear waste into the sun isn't an option, not because it would hurt
the sun, but because using Earth's biggest rocket, the Delta 4, would require about 3,000
trips, and the risk of rocket explosion in Earth's atmosphere would be too great. The
best way to "destroy" HEU is to blend it with proliferation-resistant low-enriched
uranium (LEU).
Outside of Russia, there are additional places where nuclear security isn't up to
standard. Most countries consider US Energy Department security criteria too
demanding. India, for example, hasn't been cooperative, and China has secured only
one civilian reactor. In all, there are 43 countries with more than 100 research reactors
or related facilities that store enough highly enriched uranium nuclear materials to
make several bombs, and only about 20% of these sites are properly secured. Rather
than try to go after fairly better-protected Russian material, a superterrorist is far more
likely to go to India, China, Switzerland, or Italy (or somewhere else with relatively
looser security) and knock off the night watchman, lower the chain-link fence, and drive
off with sufficient materials for a nuclear device. After that comes the easy part of
assembling the nuclear weapon -- the recipe is on the Internet and keeps showing up on
the Internet despite best efforts to "police" the Internet for this kind of thing, and then,
terrorist groups like al-Qaeda are known to have CD-ROMs burned with downloads of
such Internet pages.
Efforts have been made to reduce the overkill capabilities of the U.S. and Soviet
Union. The START treaties, for example, curtailed the use of multiple warheads, a
prime contributor to overkill. When the Soviet Union broke up, the remaining central
state only retained control over about 20% of the former nation's nuclear capacity. This
meant that efforts had to be made to disarm or disable the remaining 80% of the former
Soviet Union's capacity throughout all the various emerging states and former satellites.
This has been accomplished mostly by disabling than by disarming. For example, the
batteries have been removed from missile guidance systems or the explosive bolt charges
have been removed from the covers of missile silos. Some 70% of the former Soviet
Union's land-based nuclear capability has been disabled or is not being regularly
maintained. We are currently in a START III phase which is aimed at curtailing nuclear
submarine forces by 2010 (although China has upped the submarine arms race in recent
years). Some key principles of the nonproliferation movement are that: Deterrence is
not the same as preventing war; and dismantling is not the same as eliminating war. For
more information on the subject of strategic arms control, see Lecture on International
Arms Restraint.
CHEMICAL WEAPONS
Chemical weapons are the most common type of CBR warfare. It's estimated that as
much as a third of the world's arsenal consists of chemical weapons, so there's a lot of it
stockpiled. Chemical warfare was first used by the British against the Kurds after the
end of World War I (which was also a gas war). During the 1960's, a chemical war took
place between Egypt and Yemen; during the 1970s, between Vietnam and Laos; during
the 1980s, between Russian and Afghanistan; and in the 1990s, between Iraq and the
U.S. Many chemical wars have gone unnoticed or unreported.
Chemical weapons are classified by their effects: lethal, choking, hallucinogenic, etc.
They are dispersed by different weapon systems. An exploding weapon system sprays
the area with droplets, intended to contaminate clothing, implements, and terrain. A
dispersion weapons system disperses into the air so finely, the chemical evaporates and
is carried by the air to attack the respiratory system. Doctors and nurses are working
on procedures to handle chemical warfare casualties. The problem is acute since the
agents get on clothing as well as flesh and is easily picked up by those treating the
victims. To date, the most effective treatment for most forms of nerve gas is to get the
soldier to inject him or herself with Atropine (by jabbing a syringe into a major muscle
group, like the leg) soon after exposure. Atropine doesn't work with all agents, and you
become quite sick if you inject it and haven't been exposed. Chemical weapons are
better than biological ones because they're easier to calibrate and far less likely to
spread out and harm friendly personnel.
BIOLOGICAL WEAPONS
Biological warfare utilizes toxins, viruses, and bacterial agents. Toxin agents generally
are broken down into two major groups: cytotoxins and neurotoxins (the only major
military neurotoxins being the botulinum series). Toxins work in one of two ways:
postsynaptic and presynaptic. Postsynaptic toxins work by disrupting the nerve signals
at synaptic junctions were nerve endings meet muscle. Presynaptic toxins work by
accelerating the neural activity at synaptic junctions, and then stopping it completely.
Despite minor differences in the agony of death, the effect is the same, complete
muscular paralysis. Victims often drown in their own saliva. Some toxins can be
engineered to effect only a certain part of the body, and these are called necrotic toxins.
So-called "designer" toxins can make your limbs fall off, and others can affect only
certain body organs.
Virus agents infect the human body and work by multiplying or mutating, disrupting
cellular activity and eventually killing the target by massive convulsions or
hemorrhaging. Viruses used in warfare are militarily, bioengineered versions of
naturally occurring strains. Viruses, as opposed to most bacteria, are immune from
antibiotics. Bacterial agents, however, can be grown to resist antibiotics. Bacterial
agents make up more than half the military biological agents (e.g., anthrax, salmonella,
brucella, q-fever, cholera, and plague).
Several nations have engaged in biological warfare even though prohibited by a pact
signed in 1972. As a nation develops its biowarfare capability, there's usually a
recognition that its use is counterproductive. There have been several "near misses" and
accidents in nations' laboratories. The principle response to a biological attack is
nuclear (a kind of spite from the grave strategy), and there's a lot of research into finding
a more defensive way to survive. Biological warfare is too easy to start and too hard to
stop. Terrorists who use it can expect severe retaliation. In 1979, a "meat packing"
accident in Russia released an anthrax epidemic that killed over 1000 people. "Near
misses" have also occurred in American facilities.
Viruses are normally incubated from batches of existing strains found in preserved
tissues of infected bodies, but others are synthesized from published accounts of a
genome. In 2002, for example, New Scientist magazine revealed that scientists created
the first synthetic (man-made) polio virus, and the same technique could be used to
create ebola or the 1918 flu strain. These particular viruses have short DNA key pair
chains, and present technology allows short stretches of DNA to be custom-made. One
can also add key genes of a close relative. Ebola and smallpox replication, however,
requires key viral proteins as well as the genome, but the ebola virus is only slightly
larger than the polio virus. Smallpox has a rather lengthy chain, but its smaller cousins
do not, such as mousepox or camelpox. Anthrax, if it is synthesized, usually is a designer
variant in the small DNA chain variety.
NUCLEAR WEAPONS
There are two main type of nuclear weapons: fission (A-bombs) and fusion (H-
bombs). Fission bombs were used on Japan in WWII. In fission bombs, a core of
fissionable material is needed, usually plutonium-239 or uranium-235, both isotopes of
regular plutonium and uranium. It is expensive and time-consuming to make these
isotopes, which are found in about 1% of all regular plutonium and uranium. It takes a
concentration of 20% of these isotopes to be classified as weapons-grade. Anything less
can only be used for nuclear power reactors. HEU, or U-235 can be dissipated by mixing
it with regular uranium, but there's no way to dissipate, dissolve, or dispose of weapons-
grade plutonium. Enriched plutonium isotope is about 90% pure, and if you inject it
into a nuclear reactor, it generates more plutonium.
In standard warfare, nuclear weapons are usually NOT detonated at ground zero
(ground level) because this produces fallout (a rain of dust and ash particles). Fallout is
unpredictable, and depending on weather condition, can travel thousands of square
miles. Nuclear weapons are also NOT usually detonated in space because the
electromagnetic pulse or surge would knock out most of the world's electronic
equipment. A pulse unleashed high enough would only be limited by the earth's
curvature. Conventional nuclear warfare involves getting your bombs to go off just
about a half-mile or so above the surface. This way, you get the best shock wave effect,
both sideways and downward. The sideways pattern takes out the urban area, and the
downward pattern takes out any underground command center. The resultant shock
wave consists of a rather drastic increase in air pressure, hurricane-force wind, and the
strength of an earthquake. Anything within that shock wave zone will be vaporized and
disappear completely. Further out is a thermal pulse, a blinding flash of light that far
surpasses the sun in intensity. The thermal pulse also contains a fireball that ignites
anything combustible and has the ability to melt human flesh right off the bones.
Estimates put the number of nuclear weapons in the world at about 55,000, with
about 30,000 (7,000 deployed) belonging to the US and 25,000 (6,000 deployed)
belonging to Russia. Deployed means the weapon is already mounted as a missile
warhead and ready to launch. Britain and France have about 600 each. China has about
400 and the Israelis have at least 200. India and Pakistan are believed to have about 100
each, which is probably the same amount for overlooked South Africa. North Korea
probably has less than 100, and various Middle Eastern nations, most notably Iran and
Iraq, probably have a smaller number in various stages of development. There's enough
nuclear weapons possessed by nations other than the US to shower every 100 square
miles of the US with a nuclear blast. Recent agreements would limit the United States
and Russia to 1,700 to 2,200 nuclear warheads each by 2012, compared with about 6,000
the United States now has (in 2002) and about 5,500 held by Russia.
Besides nuclear weapons, there are nuclear power plants to worry about. The Nuclear
Regulatory Commission admits that plants are vulnerable to terrorist attack, and the
FBI receives many threats a year against such plants. Each plant has plans for a 50-mile
"accident" zone, and each main reactor area is hardened with a containment dome.
Unfortunately, it's the waste cooling pools which are most vulnerable. These pools are
stacked with thousands of pounds of waste fuel, and any loss of water would trigger an
inextinguishable waste fire accompanied by a hydrogen explosion. Waste pools are
quickly becoming replaced by military-grade earth and gravel mounds.
Few states admit they possess weapons of mass destruction. The United States has
taken the lead in destroying many of its weapons, but still maintains a stockpile of about
30,000 tons of chemicals. Russia has declared 40,000 tons. India admits to only having
them for "defensive" purposes. Dealing in chemical weapons has always been a back-
alley business that nations have conducted in secret. Typically, U.S. officials will point
their finger at a list of "rogue nations." Third World nations feel free to stockpile
chemical weapons "without fear of repercussions from the international community."
The Middle East: The Middle East and North Africa are enmeshed in a destabilizing
arms race. In this part of the world, the belief that one state possesses a weapon of mass
destruction prompts another to establish its own program, which leads to another state
acquiring a weapons system, which leads to another state, and so on. The race has gone
on in earnest since the 1960s. Egypt was the first country in the Middle East to obtain
and use chemical weapons, and became motivated to do so by Israel's construction of the
Dimona reactor in 1958. Egypt also employed phosgene and mustard agent against
Yemeni forces in the mid-1960s, and some reports claim an organophosphate nerve
agent was also used. Egypt has also been suspected of continuing to conduct and
sponsor research on WMD. Israel has an extensive CBR weapons program which has
been in operation since 1974. Newspaper reports occasionally leak the locations of secret
Israeli facilities, such as those in the Negev desert. Syria began indigenous production in
the 1980s, and currently not only has a large stockpile of weapons, but the means of
delivery in the form of 500-kilogram aerial bombs and warheads for Scud missiles.
There are three main storage depots, two at Khan Abu Shamat and Furqlus, and
another at the Centre D'Etude et Recherche Scientifique near Damascus. Newspaper
articles typically leak the building of new facilities, such as the one near the city of
Aleppo. Iran's program first intensified during the Iran-Iraq War, and relied primarily
on mustard and phosgene, although Iran (like some other nations in this regions) has a
tendency to load regular artillery shells and casings with alternative agents. Their
missile guidance systems are courtesy of nations like China and North Korea, and their
nuclear aspirations, which the CIA first warned about in 1996, have been helped
considerably by the smuggling of Russian plutonium and HEU out of the Ulba facility in
Kazakhstan as well as blackmarket expertise provided by Pakistan. Most recently, Iran
has pursued nuclear capability quite earnestly. Iraq has been the site where tons of
precursor chemicals can be found, and weapons are everywhere. Iraq is believed to
have a number of secret depots or storage sites. Iraqi terrorist groups are of great
concern. Libya first used WMD against Chad in 1987 with blister and nerve agents. A
suspected secret underground facility exists at Tarhunah. Libya has expressed interest
in obtaining nuclear weapons, but in 2004, reversed course, and agreed to shut down its
weapons of mass destruction program and allow inspectors in. Saudi Arabia is believed
to have limited CBR capability in part because of getting "ripped off" by sellers in the
market. When it comes to weapons of mass destruction, most of the information on
Saudi Arabia (prepared for the Select Committees in Congress) is heavily deleted or
strictly classified.
Asia: China, India, Pakistan, North Korea, and Taiwan all have extensive chemical
weapons, and Burma for domestic use. Vietnam captured large stocks of U.S. munitions
at the end of the Vietnam War. Terrorist groups in this region have always been
interested in nuclear weapons. North Korea's stockpile of WMD is the largest in the
Asian region. North Korea has had chemical weapons since the 1960s, and sits on vast
quantities of blister, blood, and nerve agents. The North Koreans have excellent delivery
and dispersal systems, they constantly conduct WMD training exercises, and their
civilian population is extensively trained in defensive measures. Nobody knows their
nuclear capability for sure. The South Koreans have the chemical industry
infrastructure and technical know-how to produce sophisticated agents and designer
weapons. Newspaper leaks have always cited a more extensive program, but much of
this is paranoia and no cause for concern. South Korean details are classified because
the U.S. also stockpiles some of its own weapons in South Korea. India has an extensive
industrial infrastructure and the technical know-how to produce WMD. They are
regular producers of the precursor chemicals needed for chemical weapons, and they
are a nuclear power, possessing from 50-100 nuclear warheads with tons of backup
plutonium. For over two decades, they have been involved in an arms race with the
Pakistani program. Several Indian companies have been implicated in highly suspicious
chemicals shipments and are involved in the construction of chemical plants in states
that are developing chemical weapons. The United States has sanctioned some Indian
companies for these activities. Pakistan is a nuclear power with some 30-50 nuclear
warheads, a large stockpile of HEU, and a major producer (like India) of plutonium.
Rogue scientists from Pakistan have helped out other Muslim nations. It also has
excellent delivery systems for chemical and biological agents as well as a wide range of
other weapons. China is a world class superpower with over 400 nuclear weapons
(US=30,000; Russia=20,000; Britain=200; Israel=140; India=100). China also possesses
advanced delivery systems, including intercontinental ballistic missiles. A number of
Chinese companies and individuals have been sanctioned by the U.S. government for
their proliferation activities, and US-China relations have broke off because of nuclear
espionage. Taiwan has an aggressive high-priority program to develop both offensive
and defensive capabilities- the offensive capabilities which scare China and are the stuff
of numerous leaks and rumors. U.S. intelligence officials are careful not to say exactly
what Taiwan has or does not have. Burma's (Myanmar's) WMD program started in the
1983-1992 period and focused on chemical weapons and artillery for delivering chemical
agents. There have been many reports that Burma used chemical agents against
insurgents. Vietnam, for many years now, has been suspected of pursuing WMD.
Europe: During the Cold War it was generally assumed that all NATO and Warsaw
Pact states had access to the superpowers' chemical weapons, and it was an accepted
idea that chemical warfare would be likely in the event of a war between the two
alliances. Since the dissolution of the Soviet Union and the Warsaw Pact, it is unclear
what the European policy is over chemical weapons. The only states that developed
indigenous production capabilities were Yugoslavia, Romania, the Czech Republic, and
France. (Britain produced large quantities of chemical weapons in the World War II-
era, but it disposed of them in the 1950s, dumping some in the sea and incinerating the
rest.) Some other states, including Bulgaria, may still retain munitions left behind by
Russian forces. The former Yugoslavia had extensive WMD capability as far back as
1995. The Human Rights Watch group concluded that the Yugoslav National Army
weaponized sarin, sulfur mustard, BZ (a psychochemical incapacitant), and irritants CS
and CN. When Yugoslavia broke apart, much of the program was inherited by Serbia,
but the program apparently is now inactive. Bosnia also was suspected of beginning an
alternative weapons program. Any declassified reports on Romania are heavily edited,
but U.S. intelligence has identified research and production facilities as well as stockpile
and storage facilities. Romania reportedly has developed a cheaper method for
synthesizing sarin (as did the former Czechoslovakia). France is known for using
diplomatic efforts to cover up its military operations, and probably does have an active
WMD program (not officially declared until 1987), although it's anyone's guess. Leaks
are common about France experimenting with new weapons and advanced dispersal
techniques, but France is also a leader in the nonproliferation movement. Bulgaria may
have some stockpile, but details of the stockpile are unknown. Bulgaria is a known
heavy producer of the biological agent, ricin, but almost any country involved in
production of products ranging from laxatives to brake fluid to nylon generates ricin as
a by-product.
Africa: South Africa is the country of most concern as the premiere weapons state in
the region, and they have an extensive WMD program. U.S. intelligence reports are
almost totally classified. Public evidence abounds, however, that their programs are
well-funded and have been underway since 1980. South Africa's weapons program
operates with procurement of equipment and materials handled through a sophisticated
network of front companies. Some South African officials have claimed all WMD
capability has been destroyed or dismantled, but this claim has never been verified by
outside inspectors.
The first intensive dumping efforts began after World War II. The British dumped
tons of German gas weapons off the coast of Norway, and the United States, up to 1967,
dumped deadlier nerve gas off the coast of New Jersey, precisely 200 miles east of
Atlantic City, to be exact. These are just two of more than 100 sea dumpings that took
place from 1945 to 1970 in every ocean except the Arctic. Some environmentalists
consider these scattered sites to be a potentially deadly situation. After WWII, the Allies
also found Nazi arsenals containing mines, grenades, aerial bombs, and artillery shells
filled with yperite, phosgene, arsenic (levisite), and organophosphorous compounds
(tabun), so the Allies launched Operation Davey Jones Locker, and from June 1946 to
August 1948, dumped tons of chemical weapons off the Scandinavian coast. The Baltic
Sea has long been a main dump site. It is shallow water, but there are very deep valleys
on the sea floor. Similar trenches exist off the coast of Ireland, in the middle of the
Atlantic, and off the coasts of New York, Florida, California, and North and South
Carolina. The United States government stopped sea dumping in 1970. A number of
scientists and some respected international organizations believe it is best to leave the
underwater sites alone, especially if they are in deep water. Other experts disagree with
that conclusion. During the past four decades there have been several incidents
involving leakage of sea dumped weapons. For example, some material has shown up on
beaches and fishing nets. There is too many uncertainty to draw any firm conclusions.
Nerve Agents
Lethal substances that disable enzymes responsible for the transmission of nerve impulses.
Name/Symbol Means of Lethal Dosage Rate of Action Effects Antidotes/ Methods of Treatmen
Exposure
abun (GA) Skin Via inhalation: Very rapid Effects seen in eyes (contraction of pupils, pain, 4 steps to management of exposur
contact 400 LCt Incapacitating dim or blurred vision), nose (runny nose), and to nerve agents:
and/or effects occur within airways (chest tightness)
inhalation Via skin 1 to 10 minutes; • decontamination
exposure: lethal effects occur Nausea and vomiting also possible • ventilation
1,000 LD within 10 to 15
• antidotes
minutes Twitching/convulsions result when skeletal • supportive therapy
arin (GB) Skin Via inhalation: Very rapid muscle reached
contact 100 LCt. Via Incapacitating Therapeutic drug options:
and/or skin exposure: effects occur within Fluctuations in heart rate
inhalation 1,700 LD 1 to 10 minutes;
• Atropine and Pralidoxime
lethal effects occur Loss of consciousness and seizure activity can Chloride (autoinjectors
within 2 to 15 occur within one minute of exposue in cases of packaged together in kits
minutes exposure to high concentration of agent provided to military
oman (GD) Skin Via inhalation: Very rapid personnel)
contact 70 LCt. Via Incapacitating
and/or skin exposure: effects occur within
inhalation 50 LD 1 to 10 minutes; Eventual paralysis, death
lethal effects occur
within 1 to 15
• Diazepam (anticonvulsan
minutes
drug)
VX Skin Via inhalation: Rapid
contact 50 LCt. Via Incapacitating Pretreatment option:
and/or skin exposure: effects occur within
inhalation 10 LD 1 to 10 minutes;
• Pyridostigmine (can
lethal effects occur
increase the lethal dose
within 4 to 42 hours
threshold significantly if
ingested prior to exposure
and if paired with
traditional therapeutic
options)
Novichok Novichok 5 Very rapid Assumed to be similar to the effects of other Assumed to be similar to treatmen
gents estimated to nerve agents listed above methods for other nerve agents
exceed listed above
effectiveness of
VX by 5 to 8
times.
Novichok 7
estimated at 10
times better.
Choking Agents
Substances that damage respiratory tract, causing extensive fluid build-up in the lungs.
Name/Symbol Means of Lethal Dosage Rate of Action Effects Antidotes/ Methods of Treatmen
Exposure
Chlorine Inhalation 3,000 Rapid Lethal effects No antidote once exposed
LCt manifest 30 minutes
after exposure Individuals should don gas masks
hosgene Inhalation 3,200 LCt Delayed, and other protective gear to preven
Shortness of breath, irritation of mucous inhalation
CG) Asymptomatic membranes; coughing; tightness of chest
period can last up to
24 hours Medical responses include:
Culminates in fluid build-up in lungs leading to
Diphosgene Inhalation 3,200 LCt Delayed, fatal choking
• Relocation to
DP) Incapacitating and
decontaminated
lethal effects felt
environment
after 3 or more
hours • Enforced rest
• Management of secretion
Chloropicrin Inhalation 20,000 Variable, Produces Vomiting, fluid build-up in lungs in airways
PS) LCt tears in seconds; • Oxygen therapy
lethal effects felt
after 10 minutes
• Prevention/treatment of
pulmonary edema
Blood Agents
Agents that interfere with the absorption of oxygen into the bloodstream.
Name/Symbol Means of Lethal Dosage Rate of Action Effects Antidotes/ Methods of Treatmen
Exposure
Hydrogen Inhalation 2,000 to 5,000 Rapid effect, Agents inhibit cell respiration; heart and central
Cyanide (AC) LCt Exposure to low nervous system are susceptible
concentrations
causes symptoms in Cyanogen Chloride also greatly irritates eyes Agents are highly volatile; flush
1 or more hours. and lungs eyes with water; remove
Exposure to high contaminated clothing; rinse
concentrations In moderate cases: exposed skin with water
causes sudden
unconsciousness Antidotes: intravenous
• vomiting
Cyanogen Inhalation 11,000 Rapid effect, Lethal • dizziness administration of sodium nitrite
Chloride (CK) LCt concentration and sodium thiosulfate for
• deeper, more rapid breathing
produces effects detoxification purposes (i.e., to
within 15 seconds assist body's ability to excrete
of exposure; death In severe cases: cyanide from system)
following within 6
to 8 minutes • convulsions Pretreatment under development in
• respiratory failure the United Kingdom
sychedelic Inhalation N/A Rapid, Effects felt Induces altered states of consciousness,
Effects generally dissipate within
Agent 3 (BZ) within 30 minutes including hallucinations, stupor, forgetfulness,
15 to 30 minutes of departure from
confusion
contaminated area
INTERNET RESOURCES
A Plague on Your City: Observations from TOPOFF (pdf)
Biological Weapons Usage in the Twentieth Century
Center for Infectious Disease Research & Policy
Center for Nonproliferation Studies
Chem/Bio/Nuclear Anti-Terrorism site
Chemical/Biological Arms Control Institute
CIA 2003 Report on Who has Weapons of Mass Destruction
Controlling Nuclear Warhead and Materials
Dept. of Peace Studies (Bradford) Biological Warfare Against Crops
DHS Center for Domestic Preparedness
Disinfopedia Article on WMD
Federation of American Scientists
GAO Report on the Threat of Chemical/Biological Terrorism (pdf)
High Energy Nuclear Weapons Archive
How Biological and Chemical Warfare Works
Jane's Chem-Bio Web
MSNBC's Anthrax & Bioterror List of Resources
National Resources Defense Council
National Strategy to Combat Weapons of Mass Destruction (pdf)
Peter Chalk's Presentation on BioTerrorism Threats
Stimson Center for a Nuclear-Free World
Weapons of Mass Destruction News
Who Becomes a Terrorist and Why (pdf)
PRINTED RESOURCES
Adams, J. & Marquette, S. (2001). First Responder's Guide to Weapons of Mass
Destruction. Alexandria, VA: ASIS.
Allison, G. (1996). Avoiding Nuclear Anarchy: The Threat of Loose Nuclear Weapons and
Fissile Material. Boston: MIT Press.
Bee, R. (2005). Seven Minutes to Midnight: Nuclear Weapons after 9/11. NY: Foreign
Policy Association.
Brower, J. & Chalk, P. (2003). The Global Threat of New and Reemerging Infectious
Diseases. Santa Monica: RAND.
Bullock, J., Haddow, G., Coppola, D., Ergin, E., Westerman, L. & Yeletaysi, S. (2005).
Introduction to Homeland Security. Boston: Elsevier.
Cameron, G. (1998). "The Liklihood of Nuclear Terrorism," Journal of Conflict Studies
(Fall): 5-28.
Cirincione, J., Wolfsthal, J. & Rajkumar, M. (2005). Deadly Arsenals: Nuclear,
Biological and Chemical Threats. Washington DC: Brookings.
Cole, L. (1998). The Eleventh Plague: The Politics of Biological and Chemical Warfare.
Newark: Rutgers Univ. Press.
Dahl, R. (1985). Controlling Nuclear Weapons. NY: Syracuse Univ. Press.
Falkenrath, R. et al. (1998). America's Achilles' Heel: Nuclear, Biological, and Chemical
Terrorism and Covert Attack. Cambridge: MIT Press.
Fraderick, R. et. al. (2002). Jane's Chem-Bio Handbook. Alexandria, VA: Jane's
Information Group.
Freedberg, S. (2005). "Surviving a Nuclear Attack on Washington D.C." Intelligencer
15(1):29-34; reprinted from National Journal, June 24, 2005.
Freedman, L. (1990). The Evolution of Nuclear Strategy. NY: St. Martin's Press.
Gander, T.J. (1986). Nuclear, Biological and Chemical Warfare. London: Ian Allen Ltd.
Garwin, R. & Charpak, G. (2002). Megawatts and Megatons. Chicago: Univ. of Chicago
Press.
Hall, H. (Ed.) (2003). Terrorism: Strategies for Intervention. Binghamton, NY: Haworth.
Hoffman, B. (1997). "Terrorism and WMD: Some Preliminary Hypotheses," The
Nonproliferation Review (Spring/Summer): 45-53 [available online]
Miller, J., Broad, W. & Engelberg, S. (2002). Germs: Biological Weapons and America's
Secret War. NY: Simon & Schuster.
Nolan, J., Finel, B. & Finlay, B. (Eds.) (2003). Ultimate Security: Combating Weapons of
Mass Destruction. Washington DC: Brookings.
Null, G. & Feast, J. (2003). Germs, Biological Warfare, and Vaccinations. NY: Seven
Stories Press.
Parachini, J. (2001). "Assessing the Threat of Biological Terrorism." [RAND pdf
document]
Rapoport, D. (1999). "Terrorism and Weapons of the Apocalypse," National Security
Studies Quarterly (Summer): 49-67.
Rasco, B. & Bledsoe, G. (2005). Bioterrorism and Food Safety. Boca Raton, FL: CRC
Press.
Reeve, S. (1999). The New Jackals: Ramzi Yousef, Osama bin Laden and the Future of
Terrorism. Boston: Northeastern Univ. Press.
Robert, B. (Ed.) (1997). Terrorism with Chemical and Biological Weapons: Calibrating
Risks and Responses. Washington, D.C.: CBACI.
Sprinzak, E. (1998). "The Great Superterrorism Scare," Foreign Policy (Fall): 110-24.
Steinbruner, J. (2000). Principles of Global Security. Washington DC: Brookings Inst.
Stern, J. (2000). The Ultimate Terrorists. Cambridge: Harvard Univ. Press.
Tucker, J. (ed.) (2002). Toxic Terror: Assessing Terrorist Use of Chemical and Biological
Weapons. Cambridge: MIT Press. [online content page]
Walsh, D., Christian, H., Maniscalco, P., Callsen, C., NREMT-P & Cilluffo, F. (2005).
National Incident Management System: Principles and Practices. Sudbury, MA: Jones &
Bartlett.
Wood, S. (Ed.) (2002). Bioterrorism and Political Violence: Web Resources. Binghamton,
NY: Haworth.
Democratic, free, open societies like the United States are soft targets for terrorism.
They are also the kind of societies most at risk of infringing on civil liberties with
counterterrorism. Security at the expense of liberty is no security at all. It leads to
oppression, minority disenfranchisement, corruption, bribery, voter fraud, organized
crime, militarization, and a diminished quality of life for everyone. We've seen this
pattern time and time again with what used to be some of the world's most shining
places -- Ceylon, Lebanon, Uruguay, e.g. -- turned completely into war zones where
regimes retain law and order at any cost. Converting democracies into dictatorships is,
in fact, one of the goals of (Marighella-style) terrorism -- getting governments to show
their repressive, true colors. "History teaches that grave threats to liberty often come in
times of urgency... when the scourge is manifest... and the need for action is great"
(Thurgood Marshall)
Democracies are not perfect. They are fragile entities and experiments in progress.
Democracy involves a game of numbers in which everyone is assured equal footing at
the starting line (with fundamental freedoms), and then interest groups of like-minded
people fight peacefully for their privileges to become rights. These fought-for rights are
called liberties. They are always acquired, not bestowed, easily lost, and there are at
least five types:
The United States is not perfect. In fact, it's not even a true democracy. It's a
constitutional republic (which means the constitution is used to manage the always-
imperfect balance between civil rights and due process versus security and citizen
safety). People don't have a direct vote on each and every issue. They elect political
representatives who make the hard decisions, and the battle for newfound freedoms and
liberties has always been a battle for access and opportunity involving the "hearts and
minds" of politicians. Unfortunately, this pluralistic and sometimes amorphous
situation lends itself to partisanship, paranoia, conspiracy, and the vested interests of a
few who inflate every national security crisis into the need for some overly repressive
response. During a terrorism crisis, a "do anything, do something" knee-jerk response
is understandable, but there may be no need for haste in expanding new laws, new
agencies, or new government powers. By all accounts, American national security was
largely successful at regularly preventing more than half of all terrorist attacks,
including international terrorist attacks, resulting in a 25-year low during the 1990s
(CDT figures). In any hasty counterterrorism reaction, there's a tendency for the
principal weapons to be those which restrict civil liberties, expand surveillance, seize
and interrogate anyone, and act aggressively against threats and symbols.
While the U.S. has been relatively free from terrorism, other nations in the world
have not, and other nations in the world have carried out a wider variety of
counterterrorism programs. In the quest for maintaining law and order, some nations
have trampled upon the established rights and liberties of their citizens. A list of these
excessive countermeasures would include at least the following:
• Assassination - Israel, the U.S., and other countries have sanctioned this
• Culpability of facilitators - say, if a person created a website promoting terrorism
• Indefinite detention - Canada, France, Great Britain, and the U.S. all regularly
practice this
• Infringement on rights to assemble, worship, and speak - Germany and Great
Britain offer no religious exemption
• Internment - detaining nonnaturalized immigrants (see Malkin 2004 for a
defense)
• National ID cards - required in France, Belgium, Greece, Luxembourg, Portugal,
and Spain
• Racial profiling - Israel allows it without limitation; in the U.S., it's one among
many factors involved
• Rendition - or extraordinary rendition, to torture somebody in a country with
loose rules on torture
• Surveillance - closed circuit TV surveillance, with facial recognition, is common
in Great Britain (see Marx 2002 and Crank & Gregor 2005 for comparisons of
old, 20th century surveillance and new, post 9-11 surveillance)
• Suspicionless searches - Israel, for example, has no constitutional standards for a
stop and frisk
• Torture - Spain, Israel, and the U.S. have been known to tolerate this, or extradite
for this
While at the same time infringing upon civil liberties, democracies always seem to
fight terrorism with one hand tied behind their backs. That's because they must engage
in adversarial review, and justify their actions to the legislature, the courts, and public
opinion. The ultimate purpose of all this openness is to prevent two things from
happening -- (1) the betrayal of democratic principles (not staying the course and
remaining a democracy); and (2) the recruitment of fresh recruits for terrorism that
comes from the misguided rounding up and punishing of innocent civilians. Yet,
democracies must fight terrorism as a desirable, if not necessary duty. Too many failed
states, civil war zones, and safe havens or sactuaries for nihilism exist, and each of them
(or all of them) represent a threat to popular forms of government. Sometimes, fighting
terrorism involves using extreme means that are foreign to the principles of democracy
(e.g., assassination), but are seen as the lesser evil. "Liberal states cannot be protected by
herbivores" (Ignatieff 2004). What's important is that democracies who engage in
extreme measures ultimately stay the course, and remain democracies, true to their
founding principles. Nowhere is this friction point better found than in the way
democracies deal with their own "homegrown" problem -- the problem of domestic
terrorism.
While debate rages over whether the U.S. ought to use an FBI model or a MI-5 model
to counter domestic terrorism, the FBI model seems to be the one that the nation relies
upon. The FBI conducts about 10,000 terrorism investigations a year, and of that
number, only about 200-400 cases are prosecuted a year. Prosecutions for international
terrorism (kidnapping, hostage taking) have run steady at about 50 a year, although
they jumped to about 200 a year since 9/11. Prosecutions for domestic terrorism
(explosives or weapons, threatening the President) fluctuate but seem to have been
increasing in recent years, from 147 in 1997, 166 in 1998, 187 in 1999, 194 in 2000 and
259 in 2001 (TRAC figures). Convictions rates are more certain for domestic terrorism
than international terrorism. Only one in ten domestic terrorists escape an average
seven-year prison sentence. The Justice Department’s Executive Office for United
States Attorneys (EOUSA) defines domestic terrorism as groups or individuals who
seek to further their political goals wholly or in part through activities that involve force
or the threat of force. There is no foreign direction or foreign involvement.
Whereas in other parts of the world, species of domestic terrorists tend to be systemic,
in the U.S., they're cyclic. Domestic terrorism can involve right-wing, left-wing, anti-
government, pro-government, anti-tax, paramilitary, anti-abortion, anti-religious, anti-
ethnic, and militia groups. America has it all, but for the most part, much of domestic
counterterrorism in the U.S. is militia-watching. In dealing with right-wing domestic
terrorism, often a good counterstrategy is simply to watch, and let them know you're
watching (Laqueur 1999). This keeps them underground, and deprives them of
publicity and a wider audience. It's often said that journalists are terrorists' best
friends. Depriving terrorists of publicity acts as a deterrent. In most cases, the best
counterterrorism strategy involves advanced computer technology and informants.
However, domestic terrorists usually have an inordinate interest in cyberterrorism and
weapons of mass destruction, so more active countermeasures are sometimes called for.
American domestic terrorism was at one time a left-wing phenomenon with groups
such as the Weathermen and Black Panthers active in the 1960s and 70s. Before that, it
was anti-Catholic during the 19th century, and then became anti-black and anti-Semitic
in the 20th century. It has now evolved into diverse and divided right-wing
extremism consisting of White Supremacists, Tax Rebels, Militia Patriots, Christian
Patriots, Christian Reconstructionists, Anti-Abortionists, and Neo-Nazis. Such
extremism has not been confined to the United States -- it exists worldwide in places like
Germany and Italy. Israel even has right-wing terrorism. It embraces all the exotic
forms of terror -- cyber (groups operate over 200 websites at last count), eco- (they hate
the "tree huggers" but share a common vision), and WOMD (groups that have been
caught preparing biological, chemical, or radiological weapons). The extreme right does
not have a well-delineated party line, and is best seen as a breeding ground for terrorism
since there is no command-and-control structure. They take leaderless resistance to new
levels with self-made "phantom" cells which ensure the movement's survival even if
everyone else in the group is eliminated or compromised. The one thing they have in
common is HATE, although it is best to keep in mind that there are differences between
hate groups and domestic terrorism groups. Domestic terrorists usually hate liberals,
Democrats, lesbians, homosexuals, police, politicians, tax collectors, bankers, the media,
anyone from Washington D.C., New York City or Los Angeles, anyone not like them,
and anyone disagreeing with them. Some domestic terrorists hate war, but others can
be best described as being "pissed-off" rather than filled with hate. This was plainly the
case with the Weather Underground (most active from 1970-1974) which thought of
itself as idealistic and inspired over such matters as social justice, drugs, and sex (Ayers
et al. 2006).
It is important not to confuse survivalists (those with a self-reliant bent who choose to
prepare on their own or in a small group rather than rely on the government to help
them survive) with terrorists. For far too long, the term "survivalist" has called to mind
paranoid separatists or white supremacists who give up the conveniences of modern
society, drop out of the government's databases and live in one-room, woodsy cabins like
the Unabomber. There are many law-abiding paramilitary and survivalist individuals
in America, and they are not domestic terrorists. A more useful, and yet controversial
distinction to make between far right groups and individuals is in terms of their
religious beliefs; i.e., religion or religious beliefs (controversial because religion cannot
or should not be used in profiling, however much it is the best separator). The most
extreme and non-religious element in this regard (which includes most neo-Nazis) is the
direction of either atheist or pagan believes, which have their closest affinity with
Nordic mythology. The names may change, but the story usually goes like this. Odin,
chief of the Norse gods, is said to have called all warriors to racial purification from
Valhalla, Viking heaven. Thor, god of thunder, is said to have reinforced Odin's call by
slamming his hammer. Pure Odinism has no direct nor remote connection to
Christianity, but many varieties of hybrids exist which are variants of Nordic
Christianity, which adds the element of serving Christ by purifying and protecting the
white race. Fascist groups which worship brute force tend to share some of the
symbolism in Nordic mythology and its varieties.
Another typical extreme and non-religious belief is Creatorism, a hate religion that
usually distinguishes skinheads from neo-Nazis. Creatorists believe the Creator left
humanity on its own, with each race fending for itself, and that the idea of an always-
loving God is a lie. They must therefore fight a racial holy war because that is what is
expected from their god. Race is religion to a Creatorist. The White Man's Bible
contains their mythology, which is based on a strange mixture of racism and herbal
medicine. Some survivalists patterns might be similar, but are not generally dangerous
unless some race-related holy war, or jihad, is involved. Certain forms of Islamic jihad
mimic this form of Christian jihad, but is directed more specifically against non-
believers and infidels who insult the religion.
Christian identity theology, popular among Aryan Nations and some Patriot and
militia groups, claims that white people are the true Israelites. It is a variation of what
was once called Anglo-Israelitism, and is perhaps the world's largest hate religion (with
the possible exception of Black Hebrew Israelism which holds that African Americans
are the true Jews and white people are descended from the devil). Christian identity
holds that Jews originated from an illicit union between the devil and Eve, and
nonwhites from animals or mud. It also posits that the pilgrims who came over in the
Mayflower were descendants of the original Caucasian Israelites.
Klan theology is an American nativist belief in the natural inferiority of black people,
based on the latter's descent from the curse of Noah's son Ham, which resulted in the
black race. Shem is the founder of the Asiatic peoples and is inferior to Japheth, the
father of white people. The Klan seeks to prevent the government from falling into the
hands of blacks. They believe that racism, homophobia, anti-Semitism, and hatred of
immigrants is both a religious and patriotic duty. Klan group activity is known
primarily for its cross-burning signature characteristic.
The role of heavy metal music: Oi music has its origins in a genre of racist, neo-Nazi
skinhead music called Black Metal. There are other genres of heavy metal music that
stoke terrorist sentiments, but Black Metal, especially when influenced by pagan themes
(such as in the Norwegian band Mayhem, whose leader formed a group called Black
Circle), is especially dangerous. Black Circle believes that Christianity should be
violently expelled and replaced by a hybrid mixture of Satanism and paganism, and
Black Circle has been blamed for many church burnings worldwide. Many European
countries have banned post-1994 National Socialist Black Metal (NSBM as it's called)
for its extremely racist, anti-Semitic, and violent content. The result of such music bans
has done nothing except create a multi-million dollar underground, criminal music
industry.
Controversies over profiling are abundant. There is no "right" way to use profiling
effectively as a weapon in the war against terror. It may be counter-effective, who
knows? Research on whether profiling "works" is incomplete, and serious thought
ought to be carried out before contemplating the development of police-profiler-counter-
terror experts. Too often in domestic terrorism, particularly, the most readily available
profiling criterion is race or religion, and even though those might be the most salient
factors, false impressions would reverberate throughout society that persons of certain
religions or race were more criminal somehow. There's also quite a bit of controversy
over what distinguishes right-wing extremism from its "fringe" elements. Some say it's
the level of violence they're willing to engage in -- baby killing or nuclear devastation,
for example. The more orthodox approach considers conspiratorial delusions and
irrational spin-offs to be fringe, and by definition, you can't (or shouldn't) predict or
profile anything that delusional and irrational. There's an abundance of literature on
conspiracy theory by those who've tried, however (Robins & Post 1997; Knight 2001).
There's also some literature on what kinds of attacks and weapons domestic terrorists
would use (Laqueur 1999). It turns out that the most destructive kinds of weapons are
NOT the ones that domestic terrorists would seek to use. Most groups (via most
leadership) exercise some restraint by avoiding nuclear weapons that could kill
hundreds of thousands, and most groups also generally avoid localized, biological
weapons that could only kill hundreds. Body counts seem to be important to domestic
terrorists, so there may exist a preferred range in the number of victims -- chemical
agents that kill thousands, or possibly radiological "dirty bomb" weapons.
Cyberterrorism is also a "natural" habitat for domestic terrorism since viruses and
logic bombs can be set to detonate at certain times, perhaps a significant anniversary
date for the group.
One common trait of the less extreme right is rugged individualism, of the kind that
characterizes small-town Americans and farmers. Montana and Michigan are
strongholds of this feeling. The tax rebellion movement, for example, is especially strong
in the Midwest. Individualists see the U.S. government as an enemy for wasting money
on welfare for people who should not be in America in the first place. They also believe
any police official above the rank of local sheriff is under the control of a centralized
government intent on taking away their freedoms and liberties. They may or may not
advocate armed struggle, but they will most likely favor the idea of a militia, which is in
the spirit of the Founding Fathers and the Constitution. They read and interpret the
Constitution quite frequently, almost as frequently as the Bible. Their ranks include
people from all social classes.
Far right extremists, on the other hand, have a strong streak of anti-
intellectualism. Other than Nazism, it's been said the source of this is a reaction to the
increasing bureaucraticization of American life. They blame minority overpopulation
and loose immigration laws for creating a society of registration, permits, stickers, tests,
queues, and answering machines. Rather than think how to work the system, they seek
to destroy it, and simplify things by engaging in sporadic acts of offensive violence
against minorities, foreigners, homosexuals, government, and big business. They
genuinely believe the government is preparing concentration camps for them, with the
guards most likely recruited from the ranks of L.A. gangsters. Their ranks are drawn
from the working or lower middle class.
The most dangerous aspect of apocalyptic vision is not that it makes a perfect
terrorist indoctrination device, but that it promotes the use of Weapons of Mass
Destruction. Every domestic terrorist captured by the FBI for dabbling in WOMD has
said they were attempting to stockpile such weapons for the upcoming apocalypse. In
1994, there was an Ohio militia group captured with sizable quantities of bubonic plague
cultures, and in 1995, a Minnesota Patriot group was preparing Ricin for use against
law enforcement officials. If there is anything that can be called a Bible for the lunatic
right fringe, it's a book called The Turner Diaries.
THE TURNER DIARIES: a 1978 millenarian novel by William Pierce, leader of the
neo-nazi National Alliance, under the pseudonym Andrew Macdonald, and regarded
as the world's most controversial book. It is a fictional account of the activities of a
racist, anti-Semitic underground group which comes to control the world through a
series of terrorist acts. The book is a thinly-disguised how-to manual for blowing up
FBI headquarters in Washington along with other national monuments and how to
disrupt or destroy America's infrastructure. It describes how to forge money, engage
in bioterrorism, and use atomic bombs on several East Coast cities, European cities,
and all of Asia and Africa. Tim McVeigh's Oklahoma bombing, the Order's execution
of a Jewish talk show host, and numerous other incidents, including the dragging
death of a black man in Jasper were all linked to this book. In fact, the perpetrators
said the book inspired them. A less widely read sequel is the book Hunter, by the
same author, which describes the need to kill interracial couples and all law
enforcement officers.
There are two main impacts, beyond the toll of death and devastation: economic and
psychological. Nations are sorely tempted to spend more fighting homeland terror than
international terror. Doing both exceeds the capacities of most deficit spending wartime
budgets. Following 9/11, the U.S. Congress allocated $60 billion, roughly five times the
counterterrorism budget for previous years. Homeland security is expected to average
$150 billion a year over the next decade, approximately half of the military's $345
million budget. The money will be spent on things like protecting nuclear power plants
to building up federal vaccine stockpiles. The nation is most concerned about protecting
its critical infrastructure from disruption and destruction. The eight critical
infrastructures of the U.S. include the electric power system, gas and oil (storage and
transportation), telecommunications, banking and finance, transportation, water supply
systems, emergency services (including medical, police, fire and rescue) and continuity
of government services. Threats to these infrastructures fall into two categories: physical
threats to tangible property ("physical threats"), and threats of electronic, radio-
frequency, or computer-based attacks on the information or communications
components that control critical infrastructures ("cyber threats").
By far, however, the greatest threat of a war on terrorism is perhaps the loss of civil
liberties. Wartime powers often erode them to the point where they cannot be
regained. Protection against intrusive surveillance measures are difficult to win back
because technology is put into place. Loosening of the rules of evidence is difficult to
overcome because the legal system operates slowly by precedent. Now is the time to
carefully scrutinize anything in the name of anti-terrorism. America, has, in the past,
been able to reconcile the requirements of security with the demands of liberty, and it is
important to have faith, but it is also important to have a healthy dose of skepticism.
Many public opinion polls are unreliable and unnecessary, but in the case of
identifying tradeoffs between security and liberty, some are useful, and quite interesting,
as are the opinions of Americans on international issues (see PIPA and/or its Americans
and the World website for the recording and analysis of attitudes in this regard). Below
are the results of some recent polls taken since 9/11 which focus on how fear can lead
Americans to abandon, sacrifice, or tamper with civil liberties.
In November 2002, the top-secret Foreign Intelligence Surveillance Court handed the
government broad new authority to wiretap phone calls, intercept mail and spy on the
Internet use of ordinary Americans. FISA (the Foreign Intelligence Surveillance Act),
as amended by the Patriot Act, now supports cooperation between intelligence and law
enforcement agencies in establishing probable cause for the issuance of wiretaps against
any American citizen suspected of aiding, abetting, or conspiring with others in
international terrorism. In the past, restrictions had prevented criminal investigators
and intelligence agents from sharing information.
It is much easier now for authorities to justify secret wiretaps and surveillance since
probable cause under FISA represents a lower threshold of evidence based on a record
of automatic approval for most warrant applications. Agents in the FBI's National
Security Law Unit can also now use an electronic system to draft surveillance
applications instantly. Citizens may never know who might be accessing their personal
and business e-mails, their Internet usage, their medical and financial records, or their
cordless and cellular telephone conversations.
INTERNET RESOURCES
ABC Domestic U.S. News
ADL's Poisoning the Web: Hate Groups Online
Apocalyptic Islam and Bin Laden
Captain Dave's Survival Center
CIA World Factbook on U.S.
Closeup Foundation Timeline of Domestic Terrorism
Information Resilience and Homeland Security
Lecture on the Philosophic Concept of Liberty
Lecture on Hate Groups
Militia Watchdog Links Page
Native American Groups
Preventing a Reign of Terror: Why Cracking Down on Militias is a Bad Idea
Southern Poverty Law Center's Hate Group List
Surveillance and Society Journal Homepage
PRINTED RESOURCES
Abanes, R. (1996). American Militias: Rebellion, Racism, & Religion. Downers Grove, IL,
InterVarsity.
Ayers, B., Dohrn, B. & Jones, J. (2006). Sing a Battle Song: The Revolutionary Poetry,
Statements, and Communiques of the Weather Underground. NY: Seven Stories Press.
Barkun, M. (1997). Religion and the Racist Right. Chapel Hill: Univ. of NC Press.
Cole, D. & Dempsey, J. (1999). Terrorism & the Constitution: Sacrificing Civil Liberties in
the Name of National Security. Tallahassee: First Amendment Foundation.
Crank, J. & Gregor, P. (2005). Counterterrorism After 9/11: Justice, Security, and Ethics
Reconsidered. Cincinatti: LexisNexis Anderson.
Dees, M. (1996). Gathering Storm: America's Militia Threat. New York, HarperCollins.
Deflem, M. (Ed.) (2004). Terrorism and Counter-Terrorism: Criminological Perspectives.
San Diego: Elsevier.
Dershowitz, A. (2002). Why Terrorism Works. New Haven: Yale Univ. Press.
Emerson, S. (1998). Terrorism in America: The Middle Eastern Connection Journal of
Counterterrorism & Security International 5:13-15.
Freilich, J. (2003). American Militias: State-Level Variations in Militia Activities. NY:
LFB Press.
George, J. & Wilcox, L. (1996). American Extremists: Militias, Supremacists, Klansmen,
Communists, & Others. Amherst, NY, Prometheus.
Glick, B. (1989). War at Home: Covert Action Against U.S. Activists. Cambridge, MA:
South End Press.
Heymann, P. (1998). Terrorism and America. Cambridge: MIT Press.
Ignatieff, M. (2004). The Lesser Evil: Political Ethics in an Age of Terror. Toronto:
Penguin Canada.
Knight, P. (2001). Conspiracy Culture: From Kennedy to the X-Files. NY: Routledge.
Kushner, H. (1998). Terrorism in America: A Structured Approach Springfield: Charles
Thomas.
Laqueur, W. (1999). The New Terrorism. NY: Oxford Univ. Press.
Leighton, P. (2004). "The Challenge of Terrorism to Free Societies in the Global
Village." Pp. 199-217 in M. Deflem (ed.) Terrorism and Counter-Terrorism:
Criminological Perspectives. San Diego: Elsevier.
Levitas, D. (2002). The Terrorist Next Door. NY: Thomas Dunne Books.
Malkin, M. (2004). In Defense of Internment: The Case for 'Racial Profiling' in World
War II and the War on Terror. Washington DC: Regnery.
Marx, G. (2002). "What's New About the New Surveillance? Classifying for Change and
Continuity." Surveillance and Society 1(1): 19-29.
McGuckin, F. (1997). Terrorism in the United States. New York: H. W. Wilson.
Mullins, W. (1997). A Sourcebook on Domestic and International Terrorism. Springfield:
Charles Thomas.
Perlmutter, D. (2004). Investigating Religious Terrorism and Ritualistic Crimes. Boca
Raton, FL: CRC Press.
Robins, R. & Post, J. (1997). Political Paranoia: The Psychopolitics of Hatred. New
Haven: Yale Univ. Press.
Ronczkowski, M. (2004). Terrorism and Organized Hate Crime: Intelligence Gathering,
Analysis, and Investigations. Boca Raton, FL: CRC Press.
Smith, B. & Morgan, K. (1994). "Terrorists Right and Left: Empirical Issues in
Profiling American Terrorists." Studies in Conflict and Terrorism 17:39-57.
Snow, R. (1999). The Militia Threat: Terrorists Among Us. New York: Plenum.
White, J. (2002). Terrorism: An Introduction (3e). Stamford: Thomson Learning.
Wills, G. (1999). A Necessary Evil: A History of American Distrust of Government. New
York: Simon & Schuster.
The free press is not free. It runs on money. What Americans are told and what
Americans are not told may depend upon this factor, as well as other factors which are
discussed here. It is first of all, important to become familiar with the global media
establishment and understand the conglomeratation which is taking place. In the
United States, there are approximately 1,600 daily newspapers in America, but only
about 50 cities exist with more than one daily newspaper. There is a discernable trend
away from the founding father's ideal of multiple newspapers in every city (the original
idea of free press) toward an over-reliance upon just one source or an increasingly
limited number of sources. For an overview of various theories about the meaning
and/or purpose of the free press, see Lecture on Freedom of Press. Change is rapidly
taking place. Today, the three (3) most powerful newspapers in the United States are
the: New York Times, Wall Street Journal, and Washington Post. All three, particularly
the New York Times, are extremely influential and, to some degree, set our national
standards about what is fashionable and what is trendy to think about. The Wall Street
Journal is America's largest business daily, with a circulation of over two million, and is
published along with Barron's and a number of publications by Dow Jones & Company
to guide business decisions at a number of levels. The Washington Post is influential
precisely because it influences government. Political leaders look to the Washington Post
for what issue has been given publicity and what issue has not, and then make decisions
on the basis of that. The Post has numerous holdings, including Newsweek.
Besides the above newspapers, one would be remiss not to mention USA Today, the
newspaper designed for the business traveler which is left under many hotel doors free
every morning (although the cost is picked up by consumers via hidden fees on the hotel
bill). USA Today is known for its bold and colorful graphics as well as its surveys of
public opinion. The paper has the widest circulation of any newspaper in the United
States (averaging over 2.25 million copies every day), and within the English-language
world, comes second behind The Times of India. Its circulation figures are a matter of
some dispute, as is its journalistic integrity (relative to the careful editing procedures at
other newspapers). More than a few political leaders and/or intellectuals regard USA
Today, in some opinions, as not suitable for good, quality information, but opinions
vary. USA Today is at least "interesting" in many respects as something in-between
"tabloid" and "serious" journalism.
The three (3) most-read magazines (in terms of news) are Time, Newsweek, and U.S.
News and World Report. The largest and most widely-circulated of this group is Time,
reaching at least four million, but Newsweek is close behind, with a circulation of over
three million. U.S. News and World Report also owns Atlantic Monthly and the New York
Daily News. Magazine reporting is all about advertising, as anyone who looks through a
magazine can tell from the 70% or more pages devoted to it, along with all the little
cards, inserts, and flyers that fall out.
The three (3) largest book publishers in America are: Random House, Simon &
Schuster, and Time Warner. Each of these has numerous subsidiaries, especially
Random House, which owns Crown Publishing Group, for example. Simon & Schuster
itself is a subsidiary of Viacom, Inc., a major player in television markets and with
children's books. Time Warner is also a player in television markets and includes
Warner Books, Little Brown, Book of the Month clubs, and music markets. Books have
at least the advantage of being peer-reviewed, which means that outside, disinterested
reviewers generally read over and correct things at steps along the way.
The three (3) major TV (television) networks are: ABC, CBS, and NBC. They
produce the most entertainment broadcasts in America, and hence, for most Americans,
they are also the primary source of news. Massive teams of technicians as well as
journalists are involved with this type of media. Television, like radio, is designed to be
portable, which means "twenty-second" clips in the form of video bites or sound bites.
Much of it goes stale very quickly, despite efforts by this type of media to recycle as
much as it can.
Due to recent waves of corporate mergers and acquisitions that have produced multi-
billion-dollar media conglomerates, there are three (3) well-known multi-media
conglomerates: Walt Disney Company, Time Warner, and Viacom. The hallmark of a
media conglomerate is that it not only owns production companies (to make its own
movies), but controls cable and/or other broadcast outlets for its productions (e.g.,
Disney owns Touchstone TV and Buena Vista TV), but Disney is unique in that it also
owns entertainment parks like Disneyland. In 1995, Disney acquired Capital
Cities/ABC Inc. which owns the ABC television network, its cable subsidiary, ESPN,
A&E, numerous radio stations, and numerous newspapers.
Time Warner is the second largest conglomerate, owning HBO, Warner Brothers
studio, and a large record company, known simply as Warner Music which makes a lot
of money off of rap and hip hop music. Time Warner also has several profitable
magazine ventures, such as Time, Sports Illustrated, People Magazine, and Fortune.
Viacom is the third largest conglomerate, and makes its money by producing TV
programs for the major networks and producing Hollywood feature films through
Paramount Pictures. Its publishing division includes Prentice Hall, Simon & Schuster,
and Pocket Books. In addition, it owns most Blockbuster Video stores, and is
extensively involved in satellite broadcasting, theme parks, and video games. Viacom
also owns Showtime, MTV, Nickelodeon, and other networks.
Number four and five are Rupert Murdoch's News Corporation, which owns Fox and
20th Century Fox Films. Number Five is Sony Corporation which owns Sony Music and
Sony Pictures. Sixth in power and influence might be Ted Turner and his TBS/CNN
empire, which has a near-controlling interest or stake in CBS. Finally, Seagram (the
liquor giant) can be mentioned as a seventh powerhouse, since it controls MCA and
Universal Pictures.
Sometime around 2003, the U.S. government got the idea that it would be best to both
"counter" enemy propaganda as well as keep an "eye" on reporters by requiring them
to be "embedded" with soldiers in war zones. There was initially some resistance by
reporters who thought it was nothing more than a way to "co-opt" their journalistic
integrity, but by-and-large, most reporters went along with the plan (Geraldo Rivera
being the exception, because he was expelled from the program for revealing future
military plans). By the end of 2005, the embeddedness program was in full swing, and
over 600 reporters were involved in the Iraqi theatre of war. Katovsky & Carlson
(2003), as well as others, have written on this topic, and most analysis finds an increase
in reporter respect for soldiers via such programs. There are many virtues and vices
about this way of providing battle coverage. For the most part, it is exciting, live, and
while dramatic, not unnecessarily graphic. On the other hand, it can be incredibly dull,
and there is the additional worry about providing too much information that could help
the enemy. Clearly, war reporting has undergone certain changes in recent years.
It used to be that media influence on public opinion was more "subliminal" (for lack
of a better word), but then, sometime around 1980, the media caught onto the idea of
"polling" (as unscientific as media polling is). Since 9/11, with the war on terrorism,
some say the media has gotten in the habit of constantly telling Americans what they
believe: You are dissatisfied ... You are getting more dissatisfied ... You are slowly
becoming utterly dissatisfied ... Your dissatisfaction is now reaching a fever pitch! In one
sense, this kind of sensationalism is driven by the short little attention spans of most
Americans, but in another sense, it is the inevitable byproduct of a market-driven world
of media as big business. The media itself views what they do in this regard as part of
their "watchdog" function; i.e., to have a loud "bark" but little "bite." They are, in
fact, engaged in overt political bias of the first degree because their purpose is not
simply to "inform" but to "express" and "evaluate." Gone are the days when the news
media simply informs.
As Gans (1979) noted, the media industry does not seem to attract ideologues. Most
journalists keep their values to themselves. They did not become journalists to advocate
values or to reform society. However, there are times when the media will consciously
or unconsciously take up "advocacy" or activism. They are limited in their flexibility
and power with this since few people are willing to associate reason, legitimacy, and
enforceability with the news media. This is to say that few people run out and take
immediate social action in the wake of something they've read, seen, or heard on the
news media. In general, the news media promotes passivity, not action, but there are
exceptions.
INTERNET RESOURCES
Center for Media and Public Affairs
Coalition Against Terrorist Media
Current.org
Mediachannel.org
Mediamatters.org
PRINTED RESOURCES
Alexander, J. (1990). "The Mass News Media in Systemic, Historical, and Comparative
Perspective." Pp. 323-366 in J. Alexander & P. Colomy (eds.) Differentiation Theory and
Social Change. NY: Columbia Univ. Press.
Altheide, D. (2006). Terrorism and the Politics of Fear. Lanham, MD: Rowman &
Littlefield.
Gans, H. (1979). Deciding What's News: A Study of CBS, NBC, Newsweek & Time. NY:
Pantheon.
Katovsky, B. & Carlson, T. (2003). Embedded: The Media at War in Iraq. NY: Lyons
Press.
Kavoori, A. & Fraley, T. (Eds.) (2006). Media, Terrorism, and Theory: A Reader.
Lanham, MD: Rowman & Littlefield.
Nacos, B. (2002). Mass-Mediated Terrorism: The Central Role of the Media in Terrorism
and Counterterrorism. Lanham, MD: Rowman & Littlefield.
Schechter, D. (2003). Media Wars: News at a Time of Terror. Lanham, MD: Rowman &
Littlefield.
Last updated: 04/13/06
Syllabus for JUS 429 (Terrorism)
MegaLinks in Criminal Justice