Chapter 20 the Role of Intelligence in the Prevention of Terrorism (Early
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
“New” Vs. “Old” Terrorism*
The Debate over “New” vs. “Old” Terrorism* Prepared for presentation at the Annual Meeting of the American Political Science Association, Chicago, Illinois, August 30-September 2, 2007 Martha Crenshaw Center for International Security and Cooperation Stanford University Stanford, CA 94305-6165 [email protected] Since 9/11, many policy makers, journalists, consultants, and scholars have become convinced that the world confronts a “new” terrorism unlike the terrorism of the past.1 Thus the government and policy elites have been blamed for not recognizing the danger of the “new” terrorism in the 1990s and therefore failing to prevent the disaster of 9/11.2 Knowledge of the “old” or traditional terrorism is sometimes considered irrelevant at best, and obsolete and anachronistic, even harmful, at worst. Some of those who argue 1 Examples include Bruce Hoffman, Inside Terrorism (New York: Columbia University Press, 1998), although Hoffman is sometimes ambivalent; Daniel Benjamin and Steven Simon, The Age of Sacred Terror: Radical Islam’s War Against America (New York Random House, 2003); Walter Laqueur, The New Terrorism: Fanaticism and the Arms of Mass Destruction (New York: Oxford University Press, 1999); and Ian O. Lesser, et al., Countering the New Terrorism (Santa Monica: The Rand Corporation, 1999). Ambassador L. Paul Bremer contributed “A New Strategy for the New Face of Terrorism” to a special issue of The National Interest (Thanksgiving 2001), pp. 23-30. A recent post 9/11 overview is Matthew J. Morgan, “The Origins of the New Terrorism,” Parameters (the journal of the U.S. Army War College), 34, 1 (Spring 2004), pp. -
The 2002 National Security Strategy: the Foundation Of
Old Dominion University ODU Digital Commons Graduate Program in International Studies Theses & Graduate Program in International Studies Dissertations Summer 2013 The 2002 aN tional Security Strategy: The Foundation of a Doctrine of Preemption, Prevention, or Anticipatory Action Troy Lorenzo Ewing Old Dominion University Follow this and additional works at: https://digitalcommons.odu.edu/gpis_etds Part of the American Politics Commons, Defense and Security Studies Commons, International Law Commons, Terrorism Studies Commons, and the United States History Commons Recommended Citation Ewing, Troy L.. "The 2002 aN tional Security Strategy: The oundF ation of a Doctrine of Preemption, Prevention, or Anticipatory Action" (2013). Doctor of Philosophy (PhD), dissertation, International Studies, Old Dominion University, DOI: 10.25777/ 8f8q-9g35 https://digitalcommons.odu.edu/gpis_etds/46 This Dissertation is brought to you for free and open access by the Graduate Program in International Studies at ODU Digital Commons. It has been accepted for inclusion in Graduate Program in International Studies Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. THE 2002 NATIONAL SECURITY STRATEGY: THE FOUNDATION OF A DOCTRINE OF PREEMPTION, PREVENTION, OR ANTICIPATORY ACTION by Troy Lorenzo Ewing B.A. May 1992, Rutgers University M.B.A. May 2001, Webster University M.S.S.I. May 2007, National Intelligence University A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY INTERNATIONAL STUDIES OLD DOMINION UNIVERSITY August 2013 ABSTRACT THE 2002 NATIONAL SECURITY STRATEGY: THE FOUNDATION OF A DOCTRINE OF PREEMPTION, PREVENTION, OR ANTICIPATORY ACTION Troy Lorenzo Ewing Old Dominion University, 2013 Director: Dr. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
MHMP 2014 UPDATE PART 3 III Humanrelated
III. HUMAN-RELATED HAZARDS The following list summarizes the significant human-related hazards covered in this section: 1. Catastrophic Incidents (National Emergencies) 2. Civil Disturbances 3. Nuclear Attack 4. Public Health Emergencies 5. Terrorism and Similar Criminal Activities These hazards all tie in with each other in various ways, and by placing them all in the same section of this document, this updated 2014 edition of the Michigan Hazard Mitigation Plan intends to make it easier for planners and emergency management personnel to learn about and consider the many aspects of these threats, risks, activities, conditions, and incidents. The new hazard section, Catastrophic Incidents (National Emergencies), was primarily inspired by some of the states of alert and response activities that Michigan had to adopt in the past decade for incidents that primarily took place outside of its own borders. The main examples were the 9/11/2001 terrorist attacks (and subsequent anthrax incidents and threats), and the Gulf Coast disaster involving Hurricanes Katrina and Rita in 2005. It makes sense to consider, in advance, these types of incidents as well as other types of large-scale disasters that could occur in the future, which require a large-scale national response even though the actual incident itself may occur only within the borders of a few states outside of Michigan’s immediate environment. Preparedness, planning, exercising, and mutual aid arrangements are the main “mitigation” activities proposed for this hazard during its initial phase of consideration in this 2014 edition of the Michigan Hazard Mitigation Plan. Some catastrophic incidents may involve other types of human-related hazards. -
Terrorismterrorism
U.S. FOREIGN POLICY AGENDA VOLUME 6 AN ELECTRONIC JOURNAL OF THE U.S. DEPARTMENT OF STATE NUMBER 3 TERRORISMTERRORISM Threat Assessment, Countermeasures and Policy November 2001 TERRORISM: THREAT ASSESSMENT, COUNTERMEASURES AND POLICY On September the 11th, enemies of freedom committed an act of war against our country. Americans have known wars — but for the past 136 years, they have been wars on foreign soil, except for one Sunday in 1941. Americans have known the casualties of war — but not at the center of a great city on a peaceful morning. Americans have known surprise attacks — but never before on thousands of civilians. All of this was brought upon us in a single day — and night fell on a different world, a world where freedom itself is under attack... This is not, however, just America’s fight. And what is at stake is not just America’s freedom. This is the world’s fight. This is civilization’s fight. This is the fight of all who believe in progress and pluralism, tolerance and freedom. We ask every nation to join us. We will ask, and we will need, the help of police forces, intelligence services, and banking systems around the world. The United States is grateful that many nations and many international organizations have already responded — with sympathy and with support. Nations from Latin America, to Asia, to Africa, to Europe, to the Islamic world. Perhaps the NATO Charter reflects best the attitude of the world: An attack on one is an attack on all. The civilized world is rallying to America’s side. -
EUROPEAN COMMISSION Brussels, 10.7.2020 COM(2020) 306 Final
EUROPEAN COMMISSION Brussels, 10.7.2020 COM(2020) 306 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN CENTRAL BANK, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS 2020 EU Justice Scoreboard EN EN 1. INTRODUCTION Effective justice systems are essential for implementing EU law and for upholding the rule of law and the values upon which the EU is founded. National courts act as EU courts when applying EU law. It is national courts in the first place that ensure that the rights and obligations provided under EU law are enforced effectively (Article 19 TEU). Effective justice systems are also essential for mutual trust, the investment climate and the sustainability of long-term growth. For this reason, improving the efficiency, quality and independence of national justice systems continues to feature among the priorities of the European Semester – the EU’s annual cycle of economic policy coordination. The 2020 annual sustainable growth strategy, which sets out the economic and employment policy strategy for the EU and places sustainability and social inclusion at the heart of the EU's economic policymaking, reiterates the link between effective justice systems and the business environment in Member States. Well-functioning and fully independent justice systems can have a positive impact on investment and therefore contribute to productivity and competitiveness. They are also important to ensure effective cross-border enforcement of contracts and administrative decisions and dispute resolution, which are essential for the functioning of the single market (1). Against this background, the EU Justice Scoreboard presents an annual overview of indicators focusing on the essential parameters of effective justice systems: efficiency, quality and independence. -
Read the Full PDF
Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Western Hemisphere Overview ______
Western Hemisphere Overview ___________________________________________________________________________ “We stand firm in the fight against terrorism and firm in our conviction that a sustained and permanent victory depends upon the success of each individual country in the struggle for social cohesion. In projecting our security policy to become an axiom of the State, we conceive it to be inexorably linked to the constant improvement of the social conditions of our people.” Álvaro Uribe Vélez, President of Colombia 60th Session of the United Nations General Assembly September 17, 2005 ___________________________________________________________________________ Terrorism in the Western Hemisphere was primarily perpetrated in by narcoterrorist organizations based in Colombia and by the remnants of radical leftist Andean groups. With the exception of the United States and Canada, there are no known operational cells of Islamic terrorists in the hemisphere, although scattered pockets of ideological supporters and facilitators in South America and the Caribbean lent financial, logistical, and moral support to terrorist groups in the Middle East. Cuba remained a state sponsor of terrorism, while Venezuela virtually ceased its cooperation in the global war on terror, tolerating terrorists in its territory and seeking closer relations with Cuba and Iran, both state sponsors of terrorism. The threat of terrorist attack remained low in for most countries. Overall, governments took modest steps to improve their counterterrorism (CT) capabilities and tighten border security, but corruption, weak government institutions, ineffective or lacking interagency cooperation, weak or non-existent legislation, and reluctance to allocate sufficient resources limited the progress of many. Some countries, like Panama, Trinidad and Tobago, Jamaica, Mexico, and El Salvador, made serious prevention and preparedness efforts. -
Mapping the Jihadist Threat: the War on Terror Since 9/11
Campbell • Darsie Mapping the Jihadist Threat A Report of the Aspen Strategy Group 06-016 imeless ideas and values,imeless ideas contemporary dialogue on and open-minded issues. t per understanding in a nonpartisanper understanding and non-ideological setting. f e o e he mission ofhe mission enlightened leadership, foster is to Institute Aspen the d n T io ciat e r p Through seminars, policy programs, initiatives, development and leadership conferences the Institute and its international partners seek to promote the pursuit of the pursuit partners and its international promote seek to the Institute and ground common the ap Mapping the Jihadist Threat: The War on Terror Since 9/11 A Report of the Aspen Strategy Group Kurt M. Campbell, Editor Willow Darsie, Editor u Co-Chairmen Joseph S. Nye, Jr. Brent Scowcroft To obtain additional copies of this report, please contact: The Aspen Institute Fulfillment Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5338 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Aspen Strategy Group Suite 700 One Dupont Circle, NW Washington, DC 20036 Phone: (202) 736-5800 Fax: (202) 467-0790 Copyright © 2006 The Aspen Institute Published in the United States of America 2006 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-456-4 Inv No.: 06-016 CONTENTS DISCUSSANTS AND GUEST EXPERTS . 1 AGENDA . 5 WORKSHOP SCENE SETTER AND DISCUSSION GUIDE Kurt M. Campbell Aspen Strategy Group Workshop August 5-10, 2005 .