<<

The Future of Terrorism by John T. Picarelli

Two experts debate the evolving nature of terrorism and its effect on law enforcement.

future terrorist threat could emerge experts — disagree about the nature of the in Minnesota, Mogadishu, or perhaps threat. Hoffman, a professor at Georgetown A both simultaneously. University and a former senior executive of the RAND Corp., says the primary threat lies In a recent case, the FBI investigated what with al-Qaida slowly reconstituting itself in had become of a group of young Somali- . Sageman, a scholar-in-residence American men who lived in the Minneapolis at the New York Police Department and a area and disappeared. Relatives said they former case officer with the CIA, contends had abruptly left the country to join a sus- that the threat has shifted to radicalized pected terrorist organization in Somalia. If individuals forming groups in the United that is true, the men might train with - States and Europe. ists and then join local operations in Somalia or return to the on their Although Hoffman and Sageman focus American passports. mainly on the threat from al-Qaida and , the issues they raise are This case demonstrates how a sharp debate not limited to these groups. Both men touch between two terrorism experts has signifi- on factors common to all terrorist groups, cant implications for , local and tribal such as recruitment and organization. law enforcement agencies in the United States. Bruce Hoffman and Marc Sageman The debate between Hoffman and Sageman — two of the nation’s preeminent terrorism presents law enforcement agencies with a

26 NIJ JourNal / Issue No. 264

challenge and an opportunity. The challenge is deciding which analysis of terrorism is occurs when recruits align their correct. At its core, the debate concerns terrorist recruitment and organization. existing worldview with the of a group Therefore, agencies will form their com­ and commit themselves to using to munity protection strategies based on the more accurate point of view. The difference achieve the group’s goals. between radicalization within a community and radicalization directed from abroad creates the difference between investing the community (often through the ). in counterterrorism programs that stress Sageman believes that al-Qaida’s ideology — community outreach and those that stress not its organization — binds these groups. intelligence sharing. “The threat from al-Qaida and its progeny has evolved over time,” Sageman said. The opportunity, however, is equally great. “The process of radicalization is still going Law enforcement agencies have a critical on but now proceeds in a hostile, post- role to play in contributing to the debate Sept. 11, wired environment, resulting because their observations of how terrorists in a social structure comprised of discon­ 3 recruit, radicalize, organize and train people nected groups.” are prime drivers of how counterterrorism efforts will unfold in the future. When and Where Does Radicalization Occur? The Nature of the Threat Radicalization occurs when recruits align Both Hoffman and Sageman are promi­ their existing worldview with the ideology nent, well-published researchers who often of a group and commit themselves to using consult with and law enforcement violence to achieve the group’s goals. To agencies on terrorism issues. Critics and col­ understand this alignment is to understand leagues alike agree that their books are influ­ what drives a person to commit terrorism. ential, and, in fact, they are among the most often cited in terrorism studies.1 Hoffman and Sageman agree that under­ standing radicalization is vital to understand­ Hoffman says the main threat from terror­ ing terrorism. However, they strongly differ ism lies with the core of al-Qaida, which on where radicalization takes place. For he believes is gradually rebuilding itself Hoffman, radicalization occurs in a central­ in Pakistan to attack targets in the United ized core of terrorist elites who oversee States and Europe. “Al-Qaida is much like recruitment and training programs housed in a shark, which must keep moving forward, clandestine facilities or in lawless regions of no matter how slow or incrementally, or the globe such as the -Pakistan die ... The group’s capacity to survive is also border. Sageman, on the other hand, argues a direct reflection of both its resilience and that radicalization is diffuse — or leaderless the continued resonance of its ideology,” — and occurs through groups of loosely he said.2 associated radicals found within American and European communities. Sageman sees the threat of terrorism originating not from a centralized core but If Hoffman’s theory is correct, law enforce­ from the “bottom up.” Although Sageman ment officials would expect to find radicals agrees that al-Qaida’s core group in Pakistan trained through organized programs, most remains a danger, he believes it is effectively often overseas. To identify and counter this contained. For Sageman, the future of terror­ threat, the best strategy would be to track ism is more diffuse, with the primary risk of foreign-born or domestic radicals through attack coming from smaller groups of radi­ intelligence fusion centers or other inter­ calized individuals who find one another in agency task forces.

27 NIJ JourNal / Issue No. 264

On the other hand, if Sageman’s theory Arab-American communities and heightened is valid — that terror groups form within levels of alienation within these communi­ local communities without the help of ties followed the Sept. 11 attacks, outreach organized training programs — law programs helped rebuild trust.6 Community enforcement officials would focus on iden­ policing served as a bulwark against radical­ tifying and countering sources of radicaliza­ ization. Relationships between community tion within their communities. For example, members and authorities helped dampen correctional facilities are one place where or remove the grievances that often lead to radicalization can occur. A 2007 National radicalization, such as perceptions of bias Institute of Justice study found that pris­ or hate . Such relationships and trust oner radicalization was indeed happening could also yield information on trained radi­ in prisons, mostly through personal inmate cals arriving in communities. relationships.4 The study found that radi­ calization often began with a prisoner’s The study further showed that these commu­ religious conversion and continued with nities responded more favorably to outreach extremist religious teachings, eventually efforts from state and local agencies than leading individuals to undertake political to those from the federal level. This affirms violence. Similar to what Sageman holds, the critical role of local law enforcement in the NIJ study found the threat arose from combating radicalization and terrorism. small groups of “true believers” who were motivated to commit terrorist acts.5 How Do Terrorists Organize?

Although Hoffman and Sageman disagree Another significant dispute between on where radicalization occurs, they believe Hoffman and Sageman concerns how ter­ outreach programs are important in com­ rorist groups organize. Hoffman’s analysis bating radicalization. Community policing suggests the most dangerous terrorist builds bridges of trust between community groups organize around a center-periphery members and police, providing an important model. In this model, the leadership and link to understanding when potential radicals best-trained cells remain in safe havens might be active within a community. such as Afghanistan, drawing information, money and practical assistance from support A 2006 NIJ study found that although an cells working in target countries. When it is increased prevalence of hate crimes against time to strike, the attack cells quickly enter,

fURTHER READING ON THE DEBATE

Bruce Hoffman’s review of Marc Sageman’s most recent book in the journal Foreign Affairs began the debate regarding the nature of the threat from terrorism. The debate continued in subsequent issues of Foreign Affairs. For more on the impact of this issue, see “A Not Very Private Feud Over Terrorism,” published in in 2008. See:

■ http://www.foreignaffairs.org/20080501fareviewessay87310/bruce-hoffman/ the-myth-of-grass-roots-terrorism.html.

■ http://www.foreignaffairs.org/20080701faresponse87415/marc-sageman­ bruce-hoffman/does-osama-still-call-the-shots.html.

■ http://www.nytimes.com/2008/06/08/weekinreview/08sciolino.html?sq=bruce% 20hoffman&st=cse&scp=4&pagewanted=all.

28 NIJ JourNal / Issue No. 264

attack and exit the target country with the aid of the already-embedded support cells. Communities responded more favorably Organizational control remains centralized with the leadership cells, which give orders to outreach efforts from state and local agencies to the other groups. than to those from the federal level. This affirms Sageman, on the other hand, sees the the critical role of local law enforcement in most dangerous terrorist organizations centered in small groups that provide their combating radicalization and terrorism. own support. The groups do not travel over­ seas for specialized training; rather, they educate themselves using sources such as Web postings. Sageman’s groups are shared it with other agencies. This has led more autonomous than the cells that to a better understanding about how terror­ Hoffman describes in that they conduct ist groups organize in communities and how their preparations and attacks from within best to counter them. In addition, agencies the community, keeping their own organi­ are paying closer attention to online extrem­ zational control. ism, another important way to understand terrorist organization. Continued information NIJ’s research on organizational learning gathering and vigilance from counterterrorism and the role of the Internet has found merit agencies will inform the Sageman-Hoffman in both positions, suggesting a complex debate and will influence how the nation reality. A 2005 NIJ study examined terror develops counterterrorism measures. groups’ organization, especially how they get, interpret and disseminate information. A Two-Way Street The study identified evidence supporting both models of terrorist organization, con­ History will decide who won this debate. cluding that how these groups adapt to Now, however, the differing opinions offer changing conditions will influence which a superb example of how complex issues counterterrorism strategies are most effec­ evolve into policy choices. Whether radical­ tive. If, for example, terrorists responsible ization happens here or abroad is an impor­ for collecting and analyzing information are tant question, but for law enforcement in the community, law enforcement agen­ agencies, the academic debate translates cies would have to adopt a more active into how to provide the most effective and investigation plan than if community outreach in the effort to pre­ the terrorists were abroad. Agencies would vent terrorist attacks. also have to help identify safe havens that terrorist groups use, such as warehouses, Law enforcement agencies are not passive ranches or even houses in suburban areas.7 bystanders in the discussion — they are key contributors. Their efforts offer valuable Continuing NIJ studies on on insights into how terrorists recruit and the Internet may also help further clarify organize. This give-and-take between this discussion. For example, one study is research and practice will yield greater examining the content of extremist Web clarity and improved decision-making for sites to identify the location of people who counterterrorism efforts. contribute to the sites.8

Meanwhile, state and local law enforcement John T. Picarelli joined the International Center agencies are already bringing this discussion of the National Institute of Justice in 2008. into sharper focus. Many have collected infor­ mation about specific terrorist groups and NCJ 228387

29 NIJ JourNal / Issue No. 264

Notes (NCJ 220957), available at http://www.ncjrs. gov/pdffiles1/nij/grants/220957.pdf. 1. Hoffman , B. ,Inside Terrorism, New York: 5. See “Prisoner Radicalization: Assessing Columbia University Press, 1999 (revised the Threat in U.S. Correctional Institutions,” and enlarged in 2006); Sageman, M., NIJ Journal 261 (October 2008), available at Understanding Terror Networks, Philadelphia: http://www.ojp.usdoj.gov/nij/journals/261/ University of Press, 2004; prisoner-radicalization.htm. and Sageman, M., Leaderless : Terror Networks in the Twenty-First Century, 6. Henderson, N.J., C.W. Ortiz, N.F. Sugie, and J. Philadelphia: University of Pennsylvania Miller, Policing in Arab-American Communities Press, 2008. After September 11, Research for Practice, Washington, DC: National Institute of Justice, 2. Hoffman, B., “The Myth of Grass-Roots U.S. Department of Justice: July 2008 Terrorism: Why Still (NCJ 221706), available at: http://www.ncjrs. Matters,” Foreign Affairs 87 (2008): 133-138. gov/pdffiles1/nij/221706.pdf. 3. Sageman, M., and B. Hoffman, “Does Osama 7. Jackson , B.A. , J.C . Baker , K . Cragin et Still Call the Shots? Debating the al., Aptitude for Destruction, Volume I: of al Qaeda’s Leadership,” Foreign Affairs 87 Organizational Learning in Terrorist Groups (2008): 163-166. and Its Implications for Combating Terrorism, 4. Hamm, M.S., Terrorist Recruitment in Santa Monica, Calif.: RAND Corp., 2005, American Correctional Institutions: An available at http://www.rand.org/pubs/ Exploratory Study of Non-Traditional Faith monographs/2005/RAND_MG331.pdf. Groups, final report submitted to the National 8. Erez, E., Jihad, and the Internet, NIJ Institute of Justice, U.S. Department of Award 2006-IJ-CX-0038. Justice, Washington, DC: December 2007

30