A Noted Irregular Warfare Expert Reveals the Terrorist Organization’S Way of War and the Strategy of Jihad

Total Page:16

File Type:pdf, Size:1020Kb

A Noted Irregular Warfare Expert Reveals the Terrorist Organization’S Way of War and the Strategy of Jihad SPECIAL FEATURE A NOTED IRREGULAR WARFARE EXPERT REVEALS THE TERRORIST ORGANIZATION’S WAY OF WAR AND THE STRATEGY OF JIHAD . BY S EBASTIAN G ORKA SEPTEMBER 2011 marked the 10th anniversary of America’s longest ever war, the war against al- S E G A M Qaeda and its affiliates. Four months earlier, on May 2 , 2011 , the founder and head of al-Qaeda, Osama bin I Y T T E G / E Laden , was killed in Pakistan by members of U.S. Seal Team VI. The war is far from over ; but given these two I R E U G I V E historical markers, we should pause to examine the way of war that brought us September 11 , 2001 (9/11), D E U Q I N O R E and the strategy behind the deadliest terrorist organization in the modern history of irregular warfare . V 44 * ARMCHAIR GENERAL * MAY 2012 December 22, 2009. A new recruit from Lashkar-e-Taiba Islamist militant group waits to shoot during a training exercise somewhere in Pakistan’s North-West Frontier Province. Members of Lashkar- e-Taiba are among the best trained and most hardened fighters battling against NATO forces in the region. MAY 2012 * ARMCHAIR GENERAL * 45 The CIA initiated its largest ever covert mission, providing TOP ROW, FAR LEFT: Abdullah Azzam, a Pales - tinian ideologue and mentor to Osama bin Laden, heavily recruited young Muslims from around the world to take up arms against the Soviet Union following its invasion of Afghanistan. LEFT: Osama bin Laden, re - cruited and mentored by Abdullah Azzam, used his wealth and influence to aid the Mu - jahedeen in their struggle against the Rus - sians during the Soviet War in Afghanistan. It was through this activity that he laid the groundwork for his al -Qaeda terrorist organi - zation. BOTTOM ROW, FAR LEFT: Ayman al -Zawahri, along with Abdullah Azzam and Osama bin Laden, was an influential figure during the Soviet War in Afghanistan. He later helped transform the MAK into al -Qaeda, and initially served as its deputy. Following the death of bin Laden in 2011 , Zawahri became the head of the terrorist organization. LEFT: Sayyid Qutb was a leading member of the Egyptian Muslim Brotherhood in the 1960s. His book Milestones has become the field manual for jihadists around the world. Cairo’s Al-Azhar, Azzam traveled the world convincing audiences of young Muslims that the war against the Russians was their war too. In fact, he wrote a 70 -page fatwa (a S E V religious opinion concerning Islamic law), I H C R endorsed by several leading clerics, which A L A R clearly stated that holy war in the name of E N E G R Allah was now a fard ayn – an individual I A H C obligation – for all Muslims, rich or poor, M R A , ORIGINS OF AL-QAEDA S Arab or non-Arab , and that the believer needed no one’s permission to E V I H C 979 was a momentous year geopolitically with great consequences self-mobilize and deploy as a warrior of God. To facilitate this inter - R A L A for relations between the democratic nations of the West and the national mobilization of jihadists, Azzam created the Maktab al-Khi - R E N E 1 G Arab and Muslim world. 1979 witnessed the establishment of a damat (MAK), the Afghan Services Bureau , in 1984. MAK would later R I A H theocratic dictatorship in Iran, as the writ of the mullahs replaced the become al-Qaeda. C M R A : sovereign monarchy of Shah Mohammad Reza Pahlavi. In Saudi Ara - The Afghan Services Bureau recruited Muslim fighters from around W R O M bia , a group of armed Muslim extremists set siege to the Grand the world, but especially the Middle East, including Egypt, Jordan, O T T O B Mosque in Mecca in an attempt to “cleanse” the holiest sites in Islam Yemen and Saudi Arabia. Once recruited , they would receive basic : S E G from the influence of what they saw as the apostate regime of the training in guerrilla warfare tactics and then be deployed into A M I Y T T House of Saud. Lastly, the USSR invaded Afghanistan in order to make Afghanistan against Soviet forces as the “Arab Mujahedeen. ” By the E G / N the Muslim nation a satrapy of the Kremlin. 1989 end of the war , unclassified U.S. Central Intelligence Agency N C , S E Moscow’s 1979 invasion of Afghanistan had consequences that rip - (CIA ) and Bundesnachrichtendienst (BND, Germany’s CIA ) reports G A M I Y pled well beyond the bipolar standoff between the Warsaw Pact and placed the number of MAK fighters at 50,000. T T E G / NATO. Since the USSR was a godless, Western nation using force One of Azzam’s main achievements was to place his call to arms S W E N against a Muslim country, the effect was to trigger an international call into a context that went beyond the religious war argument that at - Y R O T for jihad, or holy war, whereby Muslims from other nations would tracted his primary audience. Coming as the Soviet invasion did so S E R U T fight to protect their co-religionists in Afghanistan. close to the inauguration of a new , more hawkish American president, A E F / M Among the most successful responses to the invasion was the work Ronald Reagan, and at the height of the Cold War, Azzam understood A A I A of Abdullah Azzam, a Palestinian ideologue who became the mentor to the need to also portray his holy war as a war of freedom-loving guer - R L A : W a young Saudi named Osama bin Laden. Holding a PhD in Islamic ju - rillas against the forces of a despotic Kremlin , which also just happened O R P O risprudence from the most influential university in the Muslim world, to threaten the West. Additionally, he was canny enough to build a T 46 * ARMCHAIR GENERAL * MAY 2012 arms and assistance to the Mujahedeen . February 10, 1988. A Mujahedeen fighter leads a supply-laden mule to a remote rebel base in the Safed Koh Mountains in Afghanistan. coalition with Saudi actors who wanted to spread their version of Islam States to provide Stinger surface-to-air missile to the guerrillas. Most beyond the Arabian Peninsula. To do so, Azzam recruited Osama bin importantly, Islamabad managed to convince Washington that given its Laden, son of Saudi Arabia’s wealthiest building magnate, Mohammad comparative expertise in the region and the ISI’s sources in bin Laden, a close friend of the Saudi king. Afghanistan, Pakistan should be the middleman providing American Also essential to the eventual success of the coalition of anti-Soviet and Saudi assets to the Mujahedeen. This handing over of operational forces was the involvement of Pakistan’s military, especially its Inter - responsibilities would have its own geopolitical consequences after services Intelligence Agency (ISI). Having a very great interest in the re - 9/11. What is important to note is that Azzam and bin Laden were part gion, especially in making sure that India’s influence should not expand of the much smaller Arab Mujahedeen force and were never in direct into Central Asia, ISI would place itself in the middle of the evolving contact with U.S. government assets or part of the much larger covert geostrategic situation just as the United States saw an opportunity to operation. weaken the USSR and also became involved. The resulting confluence and its misunderstanding – often its willful distortion – have led to in - JIHAD: numerable conspiracy theories and products of disinformation. THE OFFICIAL STRATEGY S E G The fact is that the United States decided it was important to assist ow, in the 11 th year of what was formerly known as the Global A M I Y T the Afghans in their resistance to the Kremlin’s military aggression. War on Terror (GWOT), there is increasing misunderstanding T E G / N Saudi Arabia, for its own reasons, agreed, and a deal was cut whereby of the nature of the enemy we face and his way of war. This is a N O S I A I the CIA initiated its largest ever covert mission, providing arms and serious problem, for as Sun Tzu reminds us, in war one must not only L / G R E assistance to the Mujahedeen as the Saudis would match , dollar for know the enemy , but also know and attack his strategy . On our side of B S L E K dollar , all U.S. funding. Weapons were initially procured primarily from this conflict, the GWOT term was eventually replaced by the Long War, C I N T R China until the Soviet forces’ Hind Mi-24 helicopter fleet became the and under the current administration, by Overseas Contingency Op - E B O R center of gravity of USSR combat operations, prompting the United erations (OCO). For the enemy, there has also been a shift in empha - MAY 2012 * ARMCHAIR GENERAL * 47 The only remaining superpower is the United States – which, 48 * ARMCHAIR GENERAL * MAY 2012 too, must be destroyed. sis, but in a far more subtle and dangerous fashion. It has evolved from a mostly kinetic approach to irregular warfare – as typified by the 9/11 attacks – to a more indirect and nonkinetic approach, as evinced dur - ing the 2011 Middle East upheavals collectively termed the “Arab Spring.” Nevertheless, the overarching context remains that of Global Jihad, and as such we need to understand this alien concept.
Recommended publications
  • Staff Statement No
    Outline of the 9/11 Plot Staff Statement No. 16 Members of the Commission, your staff is prepared to report its preliminary findings regarding the conspiracy that produced the September 11 terrorist attacks against the United States. We remain ready to revise our understanding of this subject as our work continues. Dietrich Snell, Rajesh De, Hyon Kim, Michael Jacobson, John Tamm, Marco Cordero, John Roth, Douglas Greenburg, and Serena Wille did most of the investigative work reflected in this statement. We are fortunate to have had access to the fruits of a massive investigative effort by the Federal Bureau of Investigation and other law enforcement agencies, as well intelligence collection and analysis from the Central Intelligence Agency, the National Security Agency, the State Department, and the Department of Defense. Much of the account in this statement reflects assertions reportedly made by various 9/11 conspirators and captured al Qaeda members while under interrogation. We have sought to corroborate this material as much as possible. Some of this material has been inconsistent. We have had to make judgment calls based on the weight and credibility of the evidence. Our information on statements attributed to such individuals comes from written reporting; we have not had direct access to any of them. Plot Overview Origins of the 9/11 Attacks The idea for the September 11 attacks appears to have originated with a veteran jihadist named Khalid Sheikh Mohammed (KSM). A Kuwaiti from the Baluchistan region of Pakistan, KSM grew up in a religious family and claims to have joined the Muslim Brotherhood at the age of 16.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Honorable Kevin Thomas Duffy
    U N I T E D S T A T E S D I S T R I C T C O U R T S O U T H E R N DISTRICT OF NEW YORK Office of the District Court Executive COLLEEN MCMAHON EDWARD A. FRIEDLAND Chief Judge District Court Executive Hon. Kevin Thomas Duffy (1933 - 2020) The Court is saddened to note the passing of Honorable Kevin Thomas Duffy, our former colleague who served this Court for 44 years (1972-2016), making him the third longest serving judge in the Court’s 230 history. A young Kevin Duffy arrived at the federal courthouse at Foley Square 65 years ago as bailiff to Circuit Judge J. Edward Lumbard. He later served as an Assistant United States Attorney in this the SDNY and Regional Administrator for the SEC. He will be remembered for his acts of kindness and compassion towards others around him and for his smile and wry sense of humor. For his work on terrorism cases, Judge Duffy and his wife were under United States Marshal protection for 10 years. Judge Duffy presided over difficult and important trials, including the following: • Two trials of those involved in the 1993 bombing of the World Trade Center, a terrorist act that resulted in 6 deaths and more than a thousand injured. The first trial last six months and the second three months. All tried defendants were convicted and the principal defendants received sentences of 140 years each. • The three-month Bojinka Plot trial in which defendant Ramzi Yousef was tried and convicted of conspiring to hijack and fly 12 US-bound planes on a coordinated schedule into the Pacific Ocean.
    [Show full text]
  • Military Commissions: a Place Outside the Law’S Reach
    MILITARY COMMISSIONS: A PLACE OUTSIDE THE LAW’S REACH JANET COOPER ALEXANDER* “We have turned our backs on the law and created what we believed was a place outside the law’s reach.” Colonel Morris D. Davis, former chief prosecutor of the Guantánamo military commissions1 Ten years after 9/11, it is hard to remember that the decision to treat the attacks as the trigger for taking the country to a state of war was not inevitable. Previous acts of terrorism had been investigated and prosecuted as crimes, even when they were carried out or planned by al Qaeda.2 But on September 12, 2001, President Bush pronounced the attacks “acts of war,”3 and he repeatedly defined himself as a “war president.”4 The war * Frederick I. Richman Professor of Law, Stanford Law School. I would like to thank participants at the 2011 Childress Lecture at Saint Louis University School of Law and a Stanford Law School faculty workshop for their comments, and Nicolas Martinez for invaluable research assistance. 1 Ed Vulliamy, Ten Years On, Former Chief Prosecutor at Guantanamo Slams ‘Camp of Torture,’ OBSERVER, Oct. 30, 2011, at 29. 2 Previous al Qaeda attacks that were prosecuted as crimes include the 1993 bombing of the World Trade Center, the Manila Air (or Bojinka) plot to blow up a dozen jumbo jets, and the 1998 embassy bombings in East Africa. Mary Jo White, Prosecuting Terrorism in New York, MIDDLE E.Q., Spring 2001, at 11, 11–14; see also Christopher S. Wren, U.S. Jury Convicts 3 in a Conspiracy to Bomb Airliners, N.Y.
    [Show full text]
  • Aviation Security
    HOMELAND SECURITY AND DEFENSE CENTER CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security and Defense Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occa- sional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • Timeline and Attachments
    9/11 FAMILIES UNITED TO BANKRUPT TERRORISM POSITION PAPER 1: Foreseeability of the 9-11-01 Attacks on the U.S. Homeland Overview In its work to root out and bankrupt the logistical and funding sources of terrorism, Ness, Motley, on behalf of the 9/11 Families United To Bankrupt Terrorism, has compiled significant evidence and information that illustrates a requisite knowledge, years in advance of September 11, 2001, by industry, government, and financiers of terrorism of a likely plot whereby suicidal hijackers would use civilian aircraft as a weapon of mass destruction against high profile domestic landmarks. We believe the below analysis regarding pre-September 11th terrorist activities and the failure of government and industry to protect the public from these threats may be of value to the Commission as it attempts to identify the systemic deficiencies in government and industry leading up to the attacks. Specifically, the compilation of the referenced information illustrates: · A decades-long pattern of increased violence and lethality of terrorist attacks against commercial aircraft; · A number of earlier plots by Al-Qaeda and other terrorist groups to use airplanes as guided missiles against high-profile landmarks; · An inability by government and industry to prevent such an attack from taking place; · An understanding and acknowledgement of these terrorist activities by financial supporters of Saudi Arabian based charities. We hope the Commission will utilize this information in its broader effort to enhance our nation’s understanding of the events leading up to the 9/11 attacks. Historical Trends It is instructive to examine the history of terrorist acts against civilian aircraft in order to better understand the overarching trends of terrorism and challenges in aviation security.
    [Show full text]
  • Pair of Lone Wolves
    Case 6: Khan and the Parachas 1 Case 6: Khan and the Parachas John Mueller April 12, 2015 In his book, Mastermind: The Many Faces of the 9/11 Architect, Khalid Shaikh Mohammed, journalist Richard Miniter begins by listing his subject’s admitted (or claimed) involvement with terrorist efforts in addition to 9/11. These include the 1993 World Trade Center and 2002 Bali bombings; plots on Heathrow airport, Big Ben, and the Panama Canal; plans to assassinate Bill Clinton, the Pope, and several prime ministers of Pakistan; two efforts to infiltrate agents into the United States; and the plan for a “second wave” of attacks by hijacked airliners on major U.S. landmarks to include the U.S. Bank Tower in Los Angeles, the Sears Tower in Chicago, the Plaza Bank Building in Seattle.1 Actually, Miniter does not do full service to his subject’s bloviating. In addition, to the plots on Miniter’s list, KSM declared himself to be the power behind the shoe bomber operation of 2001; an October 2002 attack in Kuwait; plots to attack oil tankers and U.S. naval ships in the Straits of Hormuz, the Straits of Gibraltar and the port of Singapore; plans to assassinate Jimmy Carter; a plot to blow up suspension bridges in New York City; a plan to destroy the Sears Tower in Chicago with burning fuel trucks; plans to “destroy” Canary Wharf in London; a planned attack on “many” nightclubs in Thailand; Barot’s plot of 2004 targeting U.S. financial targets; a plan to destroy buildings in Eilat, Israel; plans to destroy U.S.
    [Show full text]
  • Transnational Jihadism & Civil Wars
    Transnational Jihadism & Civil Wars Martha Crenshaw Abstract: When rebels also employ terrorism, civil wars can become more intractable. Since the 1980s, jihadism, a form of violent transnational activism, has mobilized civil war rebels, outside entrepreneurs, foreign fighters, and organizers of transnational as well as domestic terrorism. These activities are inte- Downloaded from http://direct.mit.edu/daed/article-pdf/146/4/59/1831094/daed_a_00459.pdf by guest on 01 October 2021 gral to the jihadist trend, representing overlapping and conjoined strands of the same ideological current, which in turn reflects internal division and dissatisfaction within the Arab world and within Islam. Jihad- ism, however, is neither unitary nor monolithic. It contains competing power centers and divergent ideo- logical orthodoxies. Different jihadist actors emphasize different priorities and strategies. They disagree, for example, on whether the “near” or the “far” enemy should take precedence. The relationship between jihadist terrorism and civil war is far from uniform or constant. This essay traces the trajectory of this evo- lution, beginning in the 1980s in the context of the Soviet invasion of Afghanistan. Transnational violence in the name of jihadist ide- ology is intermingled with civil conflict in the Mid- dle East, Asia, and Africa. Jihadists are civil war ac- tors as well as transnational terrorists.1 According to James Fearon, in 1990, only 5 percent of civil conflicts featured jihadist rebels; by 2014, the proportion had increased to 40 percent.2 Since the 1980s, jihadism has incorporated a medley of civil war rebels, out- side entrepreneurs, trainers, funders, recruiters of foreign fighters, and organizers of transnational as well as domestic terrorism.
    [Show full text]
  • The 9/11 Commission Report
    Final 5-7.5pp 7/17/04 11:46 AM Page 145 5 AL QAEDA AIMS AT THE AMERICAN HOMELAND 5.1 TERRORIST ENTREPRENEURS By early 1999, al Qaeda was already a potent adversary of the United States. Bin Ladin and his chief of operations, Abu Hafs al Masri, also known as Mohammed Atef, occupied undisputed leadership positions atop al Qaeda’s organizational structure. Within this structure, al Qaeda’s worldwide terrorist operations relied heavily on the ideas and work of enterprising and strong- willed field commanders who enjoyed considerable autonomy.To understand how the organization actually worked and to introduce the origins of the 9/11 plot,we briefly examine three of these subordinate commanders:Khalid Sheikh Mohammed (KSM), Riduan Isamuddin (better known as Hambali), and Abd al Rahim al Nashiri. We will devote the most attention to Khalid Sheikh Mohammed, the chief manager of the “planes operation.” Khalid Sheikh Mohammed No one exemplifies the model of the terrorist entrepreneur more clearly than Khalid Sheikh Mohammed, the principal architect of the 9/11 attacks. KSM followed a rather tortuous path to his eventual membership in al Qaeda.1 Highly educated and equally comfortable in a government office or a terror- ist safehouse, KSM applied his imagination, technical aptitude, and managerial skills to hatching and planning an extraordinary array of terrorist schemes. These ideas included conventional car bombing, political assassination, aircraft bombing, hijacking, reservoir poisoning, and, ultimately, the use of aircraft as missiles guided by suicide operatives. Like his nephew Ramzi Yousef (three years KSM’s junior), KSM grew up in Kuwait but traces his ethnic lineage to the Baluchistan region straddling Iran and Pakistan.Raised in a religious family,KSM claims to have joined the Mus- lim Brotherhood at age 16 and to have become enamored of violent jihad at youth camps in the desert.
    [Show full text]
  • Political Violence in South Asia, 1995-2020
    6 POLITICAL VIOLENCE IN SOUTH ASIA, 1995-2020 Shyam Tekwani Years before Osama bin Laden and al-Qaeda became household names, South Asia had been in the grip of diverse forms of terrorism prevalent since the 1940s. With the assassinations of the former Prime Minister of India1 and the President of Sri Lanka2 in the first half of the 1990s, Sri Lanka’s Liberation Tigers of Tamil Eelam (LTTE),3 a group that represented the deprived Tamil minority, burst into the international limelight with their pioneering methods of suicide bombings, captivating a global audience. Three terrorist events in 1995, one with far-reaching consequences in the subregion, presaged the future of terrorism that continues to preoccupy counterterrorism practitioners across the globe today. The first was the To- kyo subway sarin attack4 by the religious cult Aum Shinrikyo in March 1995, which killed 12 and injured thousands, flagging the threat of chemical, bio- logical, radiological, and nuclear (CBRN) attacks. A month later, in the Unit- ed States, a U.S. Army veteran parked a rental truck packed full of explosives outside a federal office building in Oklahoma City, detonating his bomb just as the workday was starting.5 The attack, carried out by a homegrown ter- rorist motivated by extremist ideologies, killed 168 people and left hundreds more injured.6 Among the first messages of condolence after the bombing was one from the Tamil Tigers, offering “the American Government and the American people their sympathy and sense of distress over the senseless bombing incident
    [Show full text]
  • Notes on the Future of Terrorism
    D. Benjamin / Notes on the Future of Terrorism Notes on the Future of Terrorism By Daniel Benjamin * the countless prophecies, analyses and clichés spawned by the Of events of September 11, 2001, few have been spread as widely or accepted as uncritically as the expression, “Everything has changed.” In fact, a great deal did not change, including many of the fundamental patterns of behavior among nations. The one thing that did change dramatically, of course, was terrorism. This tactic, which involves the use of violence against non- combatants in order to advance a program that is typically political, has, depending on your perspective, either been around forever or perhaps since gunpowder became widely used or perhaps since the invention of dynamite. For roughly a century and a half, the practice of terror has shown remarkable continuities. Weaponry was virtually always the bullet or the bomb, and so assassinations, massacres, hostage-taking, hijackings, and bombings accounted for the overwhelming majority of attacks. Terrorists have historically been conservative about their trade: they did not want to try things that might not work, so they have stuck to the tried and true, sacrificing potential greater effects to reliability. That is not to say there have been no innovations: suicide bombings, which have been used to great effect first by such disparate actors as the Tamil Tigers of Sri Lanka and the Lebanese Shiites in the early 1980s have now been taken up by Sunni Muslims—the transmission appears to have occurred through the Palestinians, who were impressed by the accomplishments of Hezbollah. But by and large the tools had remained the same.
    [Show full text]
  • The Security of NATO Nuclear Weapons: Issues and Implications
    chapter THREE The Security of NATO Nuclear Weapons Issues and Implications maJoR geneRal RobeRtus c.n. Remkes (USAF, Ret.) t the Lisbon Summit in November 2010, NATO confirmed that as long as there are nuclear weapons in the world, NATO will remain a nuclear A Alliance, and that deterrence based on an appropriate mix of nuclear and conventional capabilities remains a core element of NATO’s overall strategy. NATO is now reviewing its nuclear posture as part of a broader Deterrence and Defense Posture Review (DDPR) tasked at Lisbon. A key question for that re- view should be: What are the security concerns and related risks associated with NATO’s existing nuclear posture? Of course, this begs the following question: How can these concerns and risks be reduced? curreNt u.s./NATO Nuclear Posture aNd receNt Nuclear securIty coNcerNs Estimates from various nongovernmental sources indicate that the United States currently deploys approximately 150–250 air-delivered nuclear weapons (B-61 gravity bombs) that are deliverable by NATO aircraft (F-15Es, F-16s, and Tornados) at a handful of storage sites in Europe.1 A combined force of U.S. and European NATO personnel assigned to the stor- age sites retains the custody and provides security of these nuclear weapons. The B-61 weapons are stored in underground hardened storage bunkers at undis- closed locations around each storage site. Custody, repair, and improvements to the weapons and the storage bunkers are the responsibility of the U.S. Air Force. 1. Malcolm Chalmers, Occasional Paper, March 2010: NATO’s Tactical Nuclear Dilemma, (Washing- ton, DC: Royal United Services Institute, March 2010), 1–2.
    [Show full text]