Quick viewing(Text Mode)

Delegate Research Information

Delegate Research Information

nd MSC ​62 Student Conference on National Affairs ​ “Against All Enemies, Foreign and Domestic: Securing the Homeland”

Texas A&M University

Delegate Research Information

Round Table #16

“Capitalizing Security: Mitigating Economic Warfare”

Facilitator: Lt. Col. Marshall Straus Scantlin

------

This delegate research information is not intended to be a comprehensive assessment of your assigned round table topic but rather a starting point to help launch your own personal investigations into the various associated issues. It is encouraged, if not expected, that your policy proposals will be inclusive of aspects pertaining to your round table topic that are not covered in this research compilation. You, your facilitator, your round table host, and your fellow roundtable delegates are all responsible for crafting a policy proposal that takes this into consideration. Example Policy Proposal - SCONA 61 Winner ------

To: The Honorable Susan Rice Office Held: National Security Advisor From: Spencer Allen, Christopher Beveridge, John Breland, Karch Calkins, Johnny Childers, Rachel Clink, Zachariah Fares, Brian Fuentes, Adel Hussain, Sebastian King, Isaac Lee, Emily Otto, Joni Taylor Facilitator: COL Chris Albus Subject: Counteracting the Allure of Jihad Date: 20 February 2016

Introduction The allure of Jihad is a growing national security problem. There is an increased ability of terrorist groups to inspire those living within the U.S. to commit acts of domestic . This complex problem requires the development of a counter-narrative policy, based on American values, to limit the allure of Jihad. This is done by partnering with the Muslim community and interest groups and initiating a proactive, timely, and relevant informational campaign.

Background Combating Jihad within the United States is a key tenet of the 2015 National Security Strategy (NSS). Key NSS components for combating the allure of Jihad include: ● “… collective action with responsible partners, and increased efforts to prevent the growth of violent extremism and radicalization that drives increased threats.” ● “... address the underlying conditions that can help foster violent extremism …” 1 ● “... supporting alternatives to extremist messaging.”

Together, these points offer a foundation to build a feasible, acceptable, and suitable strategy based on partnerships and a comprehensive informational campaign. A 2007 New York Police Department investigation identified a four step process describing how 2 a person progresses from an average citizen to a Jihadist (Figure 1). ​ The progression moves through pre-radicalization, self-identification, indoctrination, and finally into jihadization. Pre-radicalization occurs before the individual is exposed to radical Islam. In self-identification, the individual begins to relate more with the radical Islamic ideology than with an ideology of moderation and peace. Indoctrination occurs when the individual believes their anti-Western violent radical Islamic ideology is justified. Finally, jihadization occurs when the individual

1 "National Security Strategy." (2015): 9. The White House. Feb. 2015. Web. 19 Feb. 2016. ​ ​ 2 Precht, Tomas. Home Grown Terrorism and Islamist Radicalisation in Europe. Publication. Danish Ministry of ​ ​ Justice, 2007. Web. 19 Feb. 2016. 3 begins to act on those beliefs.

4 ​ Figure 1: Four-step process of Radicalization. Salafism is a form of radical Islam ​ Supporting Argument Analysis The allure of Islamic inspired homegrown terrorism stems from an exploitation of the human 5 need for personal significance and cognitive closure .​ Individuals seeking a sense of certainty and the desire to gain a “larger-than-life” significance are susceptible to an extremist ideology that provides a black and white view of the world. Extremist ideology purports the notion that it holds all the answers. The proponents of such an ideology advertise themselves as heroes and martyrs. Dr. Kruglanski, a professor from the University of Maryland and a social psychologist, has conducted intensive research regarding the psychology behind terrorist recruitment. He concluded that combating terrorism requires replacing the glamour of Jihad with an alternative glamour. This involves enacting a policy that focuses on turning the psychological tables on 6 Islamic-inspired extremism. ​ This research indicates a psychological vulnerability that can be exploited. As such, this policy targets that vulnerability which is located in between the steps of pre-radicalization and self-identification. Through counter-narrative initiatives the U.S. can supplant Jihadist narratives.

Recommendations The first step of providing a counter-narrative involves partnerships with Muslim community leaders and interest groups. Political leaders will engage in open dialogue with the Muslim community and build strong working relationships, creating a unified front addressing the issues. Muslim leaders will be invited to address governing bodies and have a role in the

3 ibid. ​ 4 England. Youth Justice Board. Preventing Religious Radicalisation and Violent Extremism. By Kris Christmann. ​ ​ ​ 2012. Web. 19 Feb. 2016. 5 Kruglanski, Arie W. “Psychology Not Theology: Overcoming ISIS’ Secret Appeal.” E-International Relations. 28 ​ ​ Oct. 2014. Web. 19 Feb. 2016. 6 Sagl, Lauren. "Dr. Arie Kruglanski Discusses Psychology Behind Terrorist Recruitment." National Consortium of ​ ​ the Study of Terrorism and the Response to Terrorism. 29 Oct. 2014. Web. 19 Feb. 2016. ​ implementation of counter-narratives strategies. In reaching out to Muslim community leaders, the United States will develop a counter-narrative that builds a stronger position for Muslims in the fabric of the American Story. This will lessen the possibility of those who would feel disenfranchised with society, making them more susceptible to the Jihadist message. Similarly, a partnership with American interest groups for educational outreach should be created to promote public education of the tenets of Islam to the rest of the American public. Doing so mitigates stereotypes and creates a more educated and accepting public that effectively integrates Muslims into American society. The second step of this policy involves implementing a widespread and timely informational campaign to counter the Jihadist message of an inevitable clash between Islam and the West. Using cutting edge social media and other informational vehicles, the U.S. administers an informational campaign which disrupts the Jihadist decision-making process. By getting in front of the news media cycle or “beating them to the punch”, the U.S. will counter the extremist claim that a cultural and religious is justified between Islam and the West. In order to defeat the inflammatory rhetoric of extremist ideology, public leaders need to unite and develop a common stance. Socio-cultural differences can be distorted to feed extremist propaganda. This united stance must be communicated early and often at all levels, from federal to local. Furthermore, the United States should exert its influence in the proactive messaging of the American narrative. Extremists use the media to incite fear and project their message. The United States needs to counter these messages by communicating events that highlight success, rather than those that focus on purely negative subjects. Leaders must also reach out to media outlets and project these messages to the public at every possible occasion. In conjunction with news media influence, the United States needs to implement a more prominent presence on social media. Such objectives are achieved through adapting counter-narratives to the specific messages from extremist accounts. By monitoring the public activity of the extremists, the United States ensures the Jihadists do not have an uncontested platform. Lastly, humor is a very powerful tool utilized to present extremist messages and ideology as ridiculous. This helps delegitimize their messages and undermines their ability to influence. There is a degree of risk associated with these options. Table 1 presents several of these risks, prioritized from high to low. These should be taken into consideration by decision makers before implementation.

Table 1: Risk Assessment

Risk Context Risk Level

Ineffective An ethnocentric anti-jihad campaign may High anti-Jihad become counterproductive and lead to an campaign attraction towards Jihad.

Mixing Church Developing programs that deal with educating Medium and State the public or developing relations within a specific sect of Islam may be infringing on the separation of church and state.

Negative An information campaign could be Medium connotation of misconstrued as negative propaganda which propaganda may lower public opinion of those who are distrustful of government influence.

Reduction of Liberal Muslim leaders cooperating with US Medium legitimacy of strategy may be seen as being Muslim Leaders overly-influenced or controlled by government

Public Backlash An emphasis of pro-Muslim programs may Low-Medium create an upset by some Americans which may lead to public unrest.

Inadequate Sponsoring an improper Muslim community Low screening for leader may create a platform for him/her to leadership exploit for personal gain.

Conclusion With this strategy, the United States Government can begin to counteract the allure of Jihad, a rising issue in Western society. This policy is feasible because the required informational and relational platforms are already in place, acceptable due to the potential benefits outweighing the risks determined in Table 1, and suitable due to the interconnectedness of the target audience via social networks, community ties, and other mediums. Partnering with Muslim communities and interest groups, as well as initiating an information campaign, will build an effective counter-narrative policy based on American values to limit the allure of Jihad.

Actors, Terms, Concepts ------

Terms

● Critical Infrastructure: “systems and assets, whether physical or virtual, so vital to the ​ United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” ○ Commentary/Definition (pg. 130-132): https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf ● PATRIOT Act: An act passed 45 days after the attacks on September 11, 2001. Designed ​ to expand the scope and power of the federal government when it comes to surveilling and thwarting potential terrorist attacks on American soil. ○ Commentary: http://people.howstuffworks.com/patriot-act.htm ● Embargo: An official ban on trade or other commercial activity with a particular country. ​ ○ Definition: https://en.oxforddictionaries.com/definition/embargo ○ Commentary: http://blogs.wsj.com/washwire/2014/06/09/the-pros-and-cons-of-economic-sancti ons/ ● Sanction: Measures taken by a state to coerce another to conform to an international ​ agreement or norms of conduct, typically in the form of restrictions on trade or official sporting participation. Often described as a “partial embargo”. ○ Definition: https://en.oxforddictionaries.com/definition/sanction ○ Commentary: http://www.exportcompliancematters.com/2014/07/22/prohibited-country-sanctio ns-and-embargoes-make-sure-you-know-the-difference-when-drafting-contract-la nguage-and-evaluating-export-markets/ ● Specifically Designated Nationals List: As part of its enforcement efforts, OFAC ​ publishes a list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. ○ Commentary: https://www.law.cornell.edu/wex/specially_designated_nationals_and_blocked_p ersons_list ○ https://www.treasury.gov/resource-center/sanctions/SDN-List/Pages/default.aspx ○ https://sanctionssearch.ofac.treas.gov/Default.aspx

Actors

● Secretary of State: The Secretary of State, appointed by the President with the advice and ​ consent of the Senate, is the President's chief foreign affairs adviser. The Secretary carries out the President's foreign policies through the State Department, which includes the Foreign Service, Civil Service, and U.S. Agency for International Development. ○ Definition: https://www.state.gov/secretary/ ● United States Department of Defense: An executive branch department of the federal ​ government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces. ○ Commentary: https://www.thebalance.com/department-of-defense-what-it-does-and-its-impact- 3305982 ○ https://www.defense.gov/About-DoD ● United States Department of Energy: The Department of Energy manages the United ​ States' nuclear infrastructure and administers the country's energy policy. The Department of Energy also funds scientific research in the field. ○ Commentary: http://www.globalresearch.ca/energy-new-front-in-economic-warfare/5306958 ● United States Department of Homeland Security: Formed in 2002 from the combination ​ of 22 departments and agencies, the Department of Homeland Security works to improve the security of the United States. The Department's work includes customs, border, and immigration enforcement; emergency response to natural and manmade disasters; antiterrorism work; and cybersecurity. ○ Commentary: https://www.gpo.gov/fdsys/pkg/GAOREPORTS-GAO-08-80/html/GAOREPOR TS-GAO-08-80.htm ● United States Department of the Treasury: The Treasury Department is the executive ​ agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainable economic growth, and fostering improved governance in financial institutions. ○ Commentary: https://www.treasury.gov/about/role-of-treasury/Pages/default.aspx ● Office of Foreign Assets Control: Administers and enforces economic and trade sanctions ​ based on US foreign policy and national security goals against targeted foreign countries and regimes, terrorists, international narcotics traffickers, those engaged in activities related to the proliferation of of mass destruction, and other threats to the national security, foreign policy or economy of the United States. ​ ○ Commentary: https://www.treasury.gov/resource-center/sanctions/Pages/default.aspx ● Office of Terrorism and Financial Intelligence: Marshals the department's intelligence ​ and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction (WMD) proliferators, money launderers, drug kingpins, and other national security threats. ○ Commentary: https://www.treasury.gov/resource-center/terrorist-illicit-finance/Pages/default.as px

Concepts

● Homeland Security: “the protection of US sovereignty, territory, domestic population, ​ and critical infrastructure against external threats and aggression, or other threats as directed by the President” (1). “The national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive to the national effort to prevent terrorist attacks within the United States, reduce the vulnerability of the U.S. to terrorism, and minimize the damage from attacks that do occur” (2). ○ Definition 1 (pg. 16): http://www.dtic.mil/doctrine/new_pubs/jp3_27.pdf ○ Definition 2 (pg. 11): https://fas.org/sgp/crs/homesec/R42462.pdf ○ Commentary: https://www.wired.com/2013/01/homeland-security-definition/ ● State Sponsors of Terrorism: Countries determined by the Secretary of State to have ​ repeatedly provided support for acts of international terrorism. The four main categories of sanctions resulting from designation under these authorities include restrictions on U.S. foreign assistance; a ban on defense exports and sales; certain controls over exports of dual use items; and miscellaneous financial and other restrictions. ○ Definition: https://www.state.gov/j/ct/list/c14151.htm ○ Commentary: http://www.npr.org/sections/thetwo-way/2015/04/15/399809412/whos-on-the-list- of-state-sponsors-of-terrorism-and-why ● Economic Warfare: State sponsored action taken against another state’s economy to ​ coerce its government into a certain activity. ○ Commentary: http://tinyurl.com/goqn6og ​ ○ http://securityobserver.org/the-missing-doctrine-of-economic-warfare/ ● Financial Terrorism: “Behind the scenes” manipulation of a nation’s economy by state or ​ non-state actors. ○ Commentary: http://www.washingtontimes.com/news/2011/feb/28/financial-terrorism-suspected -in-08-economic-crash/ ○ https://www.scribd.com/document/49755779/Economic-Warfare-Risks-and-Resp onses-by-Kevin-D-Freeman ● Cyber Warfare: Include[s] cybercrime (such as cyber fraud against banking and payment ​ platforms), cyber espionage (such as trade secret and intellectual property theft), cyber sabotage (such as the malware attack on the Saudi Aramco oil company in 2012), and cyberterrorism (attacks involving the convergence of cyberspace and terrorism that cause violence against persons or property and generate fear—so far mostly theoretical, although the recent North Korean sponsored cyberattack on Sony Pictures Entertainment began to cross that line with the threats that followed the attack). ○ Commentary: https://www.chathamhouse.org/sites/files/chathamhouse/0611wp_cornish.pdf

Academic Articles, Journals ------

- The Vulnerability of Developed States to Cyber Economic Warfare https://www.chathamhouse.org/sites/files/chathamhouse/0611wp_cornish.pdf

- Economic Warfare: Sanctions and Trade https://issuu.com/voxjournal/docs/economicwarfare6

- Financial Warfare http://www.fpri.org/article/2007/09/financial-warfare/

Mixed Media ------

- Economic Warfare Institute Super Panel https://www.youtube.com/watch?v=SFHM0rd9cX8

- History of America’s Cuba Embargo https://www.youtube.com/watch?v=MUus0Rinpb

- Reality Check: Can Kill Too https://www.youtube.com/watch?v=h30WemRQOa8

- Countries Sanctioned by the United States https://en.wikipedia.org/wiki/United_States_embargoes#/media/File:US_Sanctions_2.pn g

Current Events, Newsmedia Articles

------

- China Is Crushing the US In Economic Warfare http://money.cnn.com/2016/06/30/news/economy/china-us-war-by-other-means/

- Arms Embargo on South Sudan Fails Vote http://www.npr.org/sections/thetwo-way/2016/12/23/506740713/arms-embargo-on-south -sudan-fails-u-n-vote

- Obama Administration Prepares Sanctions, Retaliation for Russian Election Hacking http://www.cnn.com/2016/12/28/politics/russian-election-meddling-sanctions-hacking/