Terrorism Tactics, Trends, and Technologies Dr
Total Page:16
File Type:pdf, Size:1020Kb
Selected Topics in International Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends, and Technologies Dr. Bhavani Thuraisingham The University of Texas at Dallas ABSTRACT This is the first in a series of reports we are writing on International Terrorism and the application of information technology to combat terrorism. We will first discuss the following topics: Hamas, Al-Qaeda, Hezbollah and Aviation Terrorism. In particular, we will discuss the facts and give an analysis. Then we will discuss the applications of information technology. The paper is concluded with future directions. Much of the information for the on terrorism tactics and trends is based on the essays I wrote to obtain the certificate in terrorism studies at St. Andrews University in Scotland between January and May 2010. DISCLAIMER: The Views and Conclusions contained in this report are those of the author (Dr. Bhavani Thuraisingham) and do not reflect the policies and procedures of the University of Texas at Dallas or the United States Government. 1. Introduction Terrorism can be traced back to the origins of mankind. Whenever people formed groups, one group competed against the other resulting in violence and terrorism. As stated in [1], Terrorism is the systematic use of terror especially as a means of coercion . It is also stated that at present, the International community has been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism . Common definitions of terrorism refer only to those violent acts which are intended to create fear (terror), are perpetrated for an ideological goal, and deliberately target or disregard the safety of non-combatants (civilians). There are different types of terrorism. One is single issue terrorism where anti-abortion groups or animal rights groups inflict fear and engage in violence. Another is terrorism due to political violence where one ethnic group fights against another. A third is right and left wing terrorism and the fourth is terrorism due to the differences in religious beliefs. In each type of terrorism, the terrorists create fear and cause harm to promote their beliefs and ideologies. Some of the terrorist groups are random groups, while some are organized and have a central structure while still some others are organizers and have a decentralized structure. Our goal is to apply information technologies to combat terrorism. However, one size does not fit all. In order to effectively apply technologies, we need to understand the way terrorists function, their structure, financial networks, beliefs ideologies and tactics. If the group is predictable, then we need certain types of technologies. If the group is unpredictable, then we need adaptable techniques to detect their activities. This report is the first in a series we are writing on terrorism studies and the role of information technologies. It studies three terrorist groups (Hamas, Al-Qaeda and Hezbollah) as well as aviation terrorism and then examines the role of information technology to combat terrorism. The discussion of the terrorist groups and the information on aviation security was obtained when the author was conducting research on the subject as part of her certificate course in terrorism studies at St. Andrews University in Scotland from January – May 2010. The work on applying information technologies is the author’s research on this topic since September 2001 [2]. We are also motivated by the research carried out at the University of Maryland on modeling the behavior of Hamas [3] and the research at the University of Arizona on the dark web [4]. The work reported in this report is also partially sponsored by the Air Force Office of Scientific Research under the Assured Information Sharing MURI project. Daniel Wolfe (formerly of the NSA) defined assured information sharing (AIS) as a framework that “provides the ability to dynamically and securely share information at multiple classification levels among U.S., allied and coalition forces.” The DoD’s vision for AIS is to “deliver the power of information to ensure mission success through an agile enterprise with freedom of maneuverability across the information environment”. The 9/11 commission’s report has stated that we need to move from a need to know to a need to share paradigm. Our objective is to help achieve this vision and implement DoD’s information sharing strategy [5] by defining an AIS lifecycle and developing a framework to realize it. However, in order to understand the information that is to be shared we need to understand the activities of the terrorists. This prompted us to study the terrorism tactics and modus operandai . This report is divided into two parts. Part 1 consists of three sections 2, 3 and 4. Section 2 describes selected terrorist groups, section 3 describes aviation terrorism, section 4 will discuss other aspects of terrorism. Part 2 consist of two sections 5 and 6. Section 5 provides an overview of applying information technology to combat terrorism and section 6 focuses on data mining, security and privacy. The report is concluded in section 7. Each section is self- contained and has all the references listed at the end of the section. References [1] http://en.wikipedia.org/wiki/Terrorism [2 Data Mining for Counter-terrorism http://www.computerworld.com/s/article/9064938/Univ._of_Md._launches_data_mining_port al_for_counter_terrorism_research [3] Aaron Mannes, Amy Silva, V.S. Subramanian, Jonathan Wilkenfeld, Stochastic Opponent Modeling Agents” A Case Study with Hamas, http://www.cs.umd.edu/~asliva/papers/SOMAHamas-icccd08.pdf [4] http://ai.arizona.edu/research/terror/ [5] http://cio- nii.defense.gov/docs/InfoSharingStrategy.pdf?PHPSESSID=32930f8f3338d326404ec8dbdab bf41e Part I: Terrorism Tactics and Trends 2. Discussion of the Ideologies of Selected Terrorist Groups 2.1 HAMAS A. Facts 1. The Group’s Origin After the fall of the Turkish Ottoman Empire, Britain and France took over the southern part of this empire around 1917. Britain named part of the empire British Palestine and this continued until 1929. Around 1929, there was tremendous pressure from the US and USSR to split Palestine for the Arabs and the Jews. Therefore, east of the Jordan River was separated and called Trans-Jordan which is mainly today’s Jordan. The remaining part remained Palestine. Then in 1947, partly due to some terrorist activities by a group called Irgun headed by Menachim Begin (who would eventually become the prime minister of Israel), Britain, US and USSR brought the matter up to the UN (United Nations) who then divided Palestine into two parts (one for Arabs and one for Jews) consisting of four regions: (i) Gaza was managed by Egypt, (ii) West Bank (west of the Jordan River) was managed by Jordan, (iii) Golan Heights managed by Syria and (iv) the remaining part which became Israel in 1948. There was continued antagonism and fighting between the Israelis and the Arabs as the Arabs felt that what had come to be known as Israel should be part of Palestine even though 75% of what used to be Palestine until 1929 was now Jordan. Subsequently in 1964, the Palestinian Liberation Organization (PLO) was formed as the global organization for the Palestinians (who were considered to be those from Gaza, West Bank and Golan Heights even though all of Jordan was at one time Palestine). It is stated that PLO urged Egypt, Jordan and Syria to wage a war with Israel which came to be known as the 1967 war. Israel won this war and Gaza, West Bank and Golan became occupied terrorists. In addition, Israel had also captured the Sinai area from Egypt. At that time the Arabs wanted to leave Israel completely, but Gen. Moshe Dian urged them to stay which many believe was the biggest mistake made by Israel. Subsequently in 1982, Israel gave the Sinai area back to Cairo which many believe was the second mistake made by Israel. During the next two decades, war continued with missile attacks from both sides (Arabs and Israelis). PLO’s dominant party was Fatah and they made their government in the West Bank. During such a period, in 1987, a terrorist group called Hamas was born in the Gaza Strip. While at that time PLO was still considered to be a terrorist group with several massacres such as the massacre at the Munich Olympics, in 1991 PLO was recognized by the USA as a legitimate organization. However, Hamas still remains a terrorist organization and has waged attacks and suicide bombings not only with Israel but also has fought with the Fatah party. In the 2006 elections, even though Hamas won the largest percentage of votes, Fatah is still in charge of the so called Palestinian state [1], [2]. 2. Aims and Ideology Hamas’ ideology is to establish an Islamic State in all of Palestine. As discussed in the paper on the “Pragmatic Ideology” of Hamas by Shari Gruber from the Fletcher School at Tufts University, the ideology of Hamas is to establish all of Palestine (aka West Bank, Gaza, Golan Heights and Israel) as an Islamic state. This ideology was born due to various sources as quoted by Hamas. For example, Hamas has quoted the following from Hasan Al-banna (founder of the Muslim brotherhood in Egypt): “Israel will be established and will stay established until Islam nullifies it as it nullified what was before it”. Hamas states that it will establish all of Palestine as an Islamic state by means of carrying out Jihad. Jihad is a holy war that Muslims are allowed to carry out in the name of Islam. It tolerates violence except against civilians. However, Hamas has justified Jihad against innocent civilians by quoting that the Israelis have attacked innocent Palestinian civilians. While the long-term goal of Hamas is to establish an Islamic state in all of Palestine, it (Hamas) has been pragmatic and somewhat flexible and focussed on smaller goals such as maintaining its control in Gaza.