TERRORISM & POLITICAL ISLAM ORIGINS, IDEOLOGIES, AND METHODS
A Counterterrorism Textbook 2nd Edition
EDITORS: ERICH IVIARQUARDT CHRISTOPHER HEFFELFINGER.
The views expressed in this book are solely those of the authors and not of the U.S. Military Academy the Department of the Army the Federal Bureau of Investigation or any other agency of the U.S. Government.
ACLURM000540
Table of Contents
Foreword iii FBI Counterterrorism Division
ix Preface b6 b7C
Copyright and Permissions Information xi
1. Modern Terror: The Four Waves 1 David Rapoport Understanding Islam 2. Understanding Islam and Islamism 29
3. Growth of the Muslim Brotherhood and its Offshoots 43 b6 b7C 4. Assessing unni Activism 71
5. From Ali to Khomeini: The Development of Shiite Islamism 75
6. When the Shiites Rise 95 Vali Nasr Cultural and Regional Studies 7. Arabic Familiarization: History and Background 107
`1WWWW/filT7IN rmation and Name Construction 112
8. Terrorism and Islamist Militancy in Southeast Asia 125 b6 b7C 9. uI ramivaramrn • • in South Asia: An Overview 147
10. n erstan in i audi Arabia 181
iii
ACLURM000541 11. Understandin North Africa 197 b6 12.The 217 b7C t 13. Europe's Angry Muslims 243 Robert Leiken 14. Jihadism in the US: Creatipg an Ideological Profile 255 b6 b7C Terror Groups 15. Eight Phases to Restoring the Caliphate: Al Qa'ida's Long-Term Strategy Against the West 271 b6 16. Unraveling Al Qa'ida's Target Selection Calculus 291 b7C
17. Hamas Social Welfare: In the Service of Terror 303 Matthew Levitt 18. Lebanon, Hizbollah, and the Patrons of Terrorism 323 Richard Wrona, Jr. 19. Jemaah Islamiyah 343 b6 b7C
Concepts in Terrorism and Counterterrorism 20. Counterterrorism Interview and Interrogation Strategies: Understanding and Responding to the Domestic Threat 369 Brig Barker / Molly Amman 21. The Radicalization Process 383 b6 b7C 22. Jihadist Use of the Internet and Implications for Counterterrorism Efforts 397
23. The Logic of Suicide Terrorism 417 Bruce Hoffman 24. Operation Smokescreen 429 I b6 b7C Glossary 437
Additional Resources accompanying CD
iv
ACLURM000542 Cl- (
Foreword
September 11, 2001, will be a defining moment in history for generations to come. It was on this Tuesday morning that four units of specially trained jihadists, members of al- Qaeda, attacked the United States. They struck simultaneously at the financial, military, and political centers of our country. As a direct result, nearly 3,000 productive human lives were extinguished. The airline industry was shut down. The financial markets were closed. The cities of New York and Washington, DC were temporarily evacuated. The borders to the United States were closed. The American public and its leadership braced for the next attack. No one understood the enemy, their plans, their intentions, or their capacity to carry out their strategic vision of a new world order. The men who carried out this mission executed one piece of a long-term strategy developed by al-Qaeda's leadership and designed to inflict massive suffering and significant economic pain on our country and our economy. As the 9/11 Commission pointed out in its final report (p. 4), "By September 11, 2001, al-Qaeda possessed:
• Leaders able to evaluate, approve, and supervise the planning and direction of a major operation; • A personnel system that could recruit candidates, indoctrinate them, vet them, and give them the necessary training; • Communications sufficient to enable planning and direction of operatives and those who would be helping them; • An intelligence effort to gather required information and form assessments of Ameri- ca's strengths and weaknesses; and • The ability to raise and move the money necessary to finance an attack."
On the day of this horrifying attack against our homeland, FBI Director Robert S. Mueller III established two priorities for the Federal Bureau of Investigation (FBI). The first centered on identifying those responsible for the attack and bringing them to justice. The second priority was to prevent an attack of this scale from occurring again. Fulfilling the Di- rector's second priority required an institutional reengineering of the FBI's counterterrorism
ACLURM000543 mission, strategy, and operational and intelligence processes. At the core of the FBI's coun- C terterrorism strategy is the investment of critical resources in the development of a workforce tI second to none. This development effort begins with the understanding that a well-educated workforce will be our greatest asset in the Global War on Terrorism. ai The value of a highly trained and experienced workforce has been identified and is be- SI ing carried out by Director Mueller, Deputy Director John Pistole, National Security Branch p Executive Assistant Director Arthur M. Cummings II, and Counterterrorism Division As- d sistant Director Michael J. Heimbach as a priority. This identification has served as a catalyst y in the FBI's effort to develop a competency-based education program. The FBI is committed tt to being a "learning organizations' which learns from successes as well as from mistakes. The 0 chapters in this book draw from publicly available information and provide the public's view d of these topics — an important perspective for any organization that requires the public's tl trust. Since September 11, 2001, the United States homeland, Iraq, and Afghanistan have ti been some of the most visible battlefields in the war on terror. However, America's presence- -and specifically the FBI's presence— in the Pacific Rim, the Horn of Africa, Europe, and ti the tri-border region of South America, are part of a coordinated strategy to deny terrorists tl the freedom of movement and sanctuary. This fight is global, and the FBI, in partnership r with our law enforcement and intelligence community partners, are leading the way to de- a tect, penetrate, and dismantle terrorist enterprises. In this joint endeavor, the FBI brings to bear its unique and specialized training, interview and investigative skills, and success at integrating intelligence and investigations. To succeed in preventing the next terror attack, F intelligence and enforcement elements at all levels of government must understand our en- emies, must be mobilized, and must demonstrate an unprecedented level of cooperation. t The FBI, along with all intelligence and law enforcement agencies, must work diligently as a e team to successfully integrate investigations and intelligence collection. Intelligence is a core competency of the FBI, and it has been intrinsic to the FBI's investigative mission throughout the Bureau's 100-year existence. Spurred on by the events of September 11, the FBI has moved from being a case driven organization to an intelligence driven organization in order to develop a greater awareness of the threats and vulnerabilities facing our nation. The FBI continues moving forward with efforts to develop our intelli- gence apparatus to meet the extensive mission requirements imposed by the American public and to gain further acceptance as an equal partner within the intelligence community. To achieve equal footing within the intelligence community—including in the areas of person- nel and financial resources—the FBI must demonstrate the value, timeliness, and impact of the intelligence products we provide to our partners and the nation as a whole. This book reflects the combined work of experts who are committed to understanding the threats we face from terrorism and the development of solutions to counter these threats. It represents the collective work of academics and counterterrorism practitioners and will serve as the cornerstone for key discussions by our Special Agents, Intelligence Analysts, Staff
vi Foreword h. ACLURM000544
Operations Specialists, and other professional Support personnel as they begin their formal training. 1 The essays are short, easy to read, and well organized. There is much to be learned, and it is our hope that this book will inform as well as develop an understanding of new per- spectives and stimulate new ideas on the study of terrorism and counterterrorism. The book provides a foundation on the origins of Islam and will provide the reader with a dear un- derstanding of the Sunni and Shi'a sects within Islam. The contributing authors will guide you through their thoughts on the radicalization process, the growth of suicide bombing as a terror tactic and methods of financing terrorism through criminal operations. The challenge of terrorism is global, and the reader will gain insights on various regions of the world, the diaspora communities of Europe and the United States, along with an understanding of the threat posed by several terrorist organizations abroad. This book was prepared as an investment in the FBI's Counterterrorism workforce. Our workforce remains the centerpiece of our counterterrorism system comprised of adap- tive, confident and competent counterterrorism personnel. This force has been infused with the FBI's values and a combined law enforcement and intelligence culture. We must expand that workforce to include new levels of professional development directed by National Secu- rity matters and FBI guidance. It must be strategically responsive, networked, and dominant across the range of law enforcement and intelligence operations. This vision, married with subject matter experts, represents the future of the global security environment. Within this culture, the FBI will be prepared to successfully execute the counterterrorism strategy and prevent terrorist acts before they occur. This counterterrorism textbook could not have been assembled without our collabora- tive relationship with the Combating Terrorism Center at the United States Military Acad- emy at West Point. Many thanks are due to the commitment of the dedicated staff of the Combating Terrorism Center, especially General John P. Abizaid and Lieutenant Colonel Joseph Fetter.
vii
ACLURM000545 Preface
The Combating Terrorism Center is pleased to present the 2nd Edition of the FBI-CTC Education Collaborative text book. This edition is intended to provide an overview of the field, similar to the 1st edition, while mirroring more closely the CTC instruction provided at the vari- ous FBI training venues. CTC lectures, and this text book, are centered on the origins, ideologies and methods that define the current manifestation of the terrorist threat. The second edition will allow New Agents at the FBI Academy and Special Agents at- tending Stage II or Regional JTTF Training to prepare for upcoming lectures by reading the associated text book chapters. Our goal is to foster more interactive discussions by providing read-ahead material prior to the lecture. The text book will also serve as a useful reinforcement tool for individuals attending a CTC event. Organization of the book The first chapter of the book is intended to put the most significant contemporary mani- festation of the terrorist threat, Islamic terrorism, in its historical context. The reader should come away with the understanding that terrorism is a human phenomenon, not an Islamic phe- nomenon, and that the contemporary terrorist threat is not too foreign for the law enforcement community to combat effectively. Contemporary terrorists borrow heavily from previous waves of terrorism which have been addressed effectively by security practitioners. Chapters 2-6 provide a baseline understanding of Islam and Islamism. To engage effec- tively with Muslim communities, our greatest allies in the fight against terrorism, it is essential that the counterterrorism community gain an understanding of Islamic religion and culture. It is equally essential that practitioners understand the way in which militant ideologues and actors have used their divergent interpretation of political Islam to justify and inspire violent action in both the local and global contexts. Muslims, and the individuals that wage violence in the name of Islam, are not part of a monolithic ,culture. Geography, culture, history and politics have impacted the Muslim world, induding those that use terrorism as a tactic, in innumerable ways. Chapters 7-14 take the reader to several regions of the globe, providing insight into various cultures and the terrorist organiza- tions originating from or operating within those cultures. Chapters 15-19 provide a closer look at four of the most prominent terror organizations in the world today. Chapters 20-24 introduce various topics in terrorism and counterterrorism of interest to the counterterrorism community. A note on terminology: Articles commissioned by the CTC use a standardized academic transliteration of Arabic into English. However, several of the articles in this volume were origi- nally written for other texts, resulting in some variation from article to article. b6 b7C
United States Military Academy West Point, New York ix
ACLURM000546
Copyright and Permissions Information
Chapter 1 David C. Rapoport, "The Four Waves of Rebel Terror and September 11." Anthropoetics 8, no. 1 (Spring/Summer 2002) Chapter 2 !Understanding Islam and Islamism." Written for 1" Edition of this textbook.
' Growth of the Muslim Brotherhood and its Offshoots." Written for b6 b7C Chanter 4 `Assessing Sunni Activism." Written for this volume.
From All to Khomeini: The Development of Shiite Islam." Written for t is vo ume. Chapter 6 Vali Nasr, "When the Shiites Rise." Reprinted by permission of Foreign Affairs, July/ August 2006. Copyright 2008 by the Council of Foreign Relations, Inc. Online at: http://www foreignaffai rs. o rg/20060701faessay85405/vali-nasr/when-the-shi ices- rise. html
`Arabic Familiarization: History and Background/Arabic Word Formation an Name Construction." Written for this volume. rs-han'll, Terrorism and Islamist Militancy in Southeast Asia." Written for this b6 volume. b7C Chapter 9 "Islamist Terrorism in South Asia: An Overview." Written for this volume. Chapter 10 "Understanding Saudi Arabia." Written for this volume. Chapter 11 Understanding North Africa." Written for this volume. b6 r b7C Chapter 12 "The Horn of Africa." Written for this volume.
xi
ACLURM000547 Chapter 13 Robert S. Leiken, "Europe's Angry Muslims?' Reprinted by permission of Foreign Affairs, July/August 2005. Copyright 2008 by the Council of Foreign Relations, Inc. Chapter 14 "Jihadism in the US: Creating an Ideological Profile." Written for this volume. Chapter 15 [Eight Phases to Restoring the Caliphate: AI-b6 Qa'ida's Long Term Strategy Against the West." Written for this volume. b7C Chapter 16 [Unraveling Al-Qa'ida's Target Selection Calculus." Written for 1" Edition of this textbook. cast tans Chapter 17 terr Matthew Levitt, "Hamas Social Welfare: In the Service of Terror." In The Making of a (Vol. 1), edited by James Forest. Terrorist: Recruitment, Training and Root Causes uni Westport, CT: Praeger, 2005. in Chapter 18 ten Richard Wrona, Jr., "Lebanon, Hizbollah, and the Patrons of Terrorism." In Countering Terrorism and Insurgency in the 21.6' Century (Vol. 3), edited by James Forest. cul Westport, CT: Praeger, 2007. tor Chapter 19 b6 ing b7C emaah Islamiyah." Written for this volume. To Chapter 20 Ye' Brig Barker and Molly Amman, "Counterterrorism Interview and Interrogation grc Strategies: Understanding and Responding to the Domestic Threat." "Counterterrorism Strategies: Understanding the Threat in the Local Jurisdiction". 17 National Academy Associate (2007): 10. Chapter 21 Et [`The Radicalization Process." Written for this volume. b6 att Chapter 22 b7C Thadist Use of the Internet and Implications for Counterterrorism th orts. ritten for this volume. Chapter 23 P' Bruce Hoffman, "The Logic of Suicide Terrorism." In Homeland Security and Terrorism, bi edited by Russ Howard, James Forest and Joanne Moore. New York: McGraw-Hill, n4 2005.
Chanter 24 b6 h. "Operation Smokescreen." Written for this volume. b7C
xii Copyright and Permissions Information
ACLURM000548