The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources

Total Page:16

File Type:pdf, Size:1020Kb

The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources Psychological Services Unit, Code 02D Prepared for the FBI’s National Joint Terrorism Task Force Michael G. Gelles, Psy.D. Randy Borum, Psy.D. Psychological Services Unit University of South Florida Naval Criminal Investigative Service Russell Palarea, Ph,D. Psychological Services Unit Naval Criminal Investigative Service NCIS CONTROLLED PRODUCT1 /FOR OFFICIAL USE ONLY NCIS CONTLAWROL LENFED OPRODUCT/RCEMENTFOR SENSITI OFFICVEIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE TABLE OF CONTENTS Introduction 3 Understanding Jihad: The Path to Commitment 4 Understanding Cultural Contexts and Mindset 5 Pawns of Fate 5 Collective Identity 6 Importance of Relationships 6 Good Impressions 6 Good Intentions 6 Shame, not Guilt 6 Associative Thinking 7 Emotional Information Processing 7 Understanding Recruitment Vulnerability 7 CT Sources: Spotting, Vetting, & Assessing 8 Spotting 8 Vetting 9 Islamic Extremist Assessment Model 10 Islamic Extremist Recruitment & Source Insertion 10 Common and Desirable Characteristics 11 Common Motivational Pathways 13 Common Spotting Grounds 13 Examples of Islamic Extremist Group Recruitment 14 Tablighi Jamat 14 Jemaah Islamiya 15 Conclusion 16 Acknowledgements 17 References 18 Appendix A: Source Assessment Questions 21 Appendix B: Recruitment Chapter from the Al-Qa’ida Training Manual 23 Appendix C: Case Studies in Islamic Extremist Recruitment 26 Iyman Faris 26 Hamid & Umer Hayat 27 Jose Padilla 28 The Lackawanna Six 29 2 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources Dr. Michael Gelles, Dr. Randy Borum, & Dr. Russell Palarea Introduction ollowing the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a F reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities. In either case, the goal of a source operation is to collect information related to the cell’s recruitment practices, capability, and plans for attack. Counterterrorism operations are difficult, complex, and aggressive but, when successful, they produce vital information. They reflect a proactive emphasis in strategic response to an ongoing and ambiguous threat. In the counterterrorism community, the Global Struggle Against Violent Extremism has led to a surge in threat warnings, investigations, arrests, and interrogations. As a result, the community has collected significant intelligence and gained greater insight into the Al-Qa’ida affiliated network and their known practices and methodologies. An opportunity exists to apply this knowledge in initiating proactive operations. Proactive operations that lead to strategic, preventive interventions are a far better use of resources than responding to threat alerts and conducting post-attack investigations. There is no substitute for the invaluable information derived by a source embedded in the daily activities of a targeted group. The source becomes the eyes and ears of the law enforcement and intelligence community. In this paper, we identify and describe several psychological considerations that may affect source development and management. While a host of factors will influence any operation, we focus here only on the psychological factors that we believe may be useful to Special Agents engaged in counterterrorism operations. This is but one portion of the larger operational structure. For a more expert view of the Islamic extremist adversary and the contexts in which they operate, we recommend seeking input from counterterrorism intelligence analysts. 3 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE Understanding Jihad: The Path to Commitment1 he concept of jihad is central to many Islamic extremist ideologies and justifications for violence (Euben, 2002). The meaning of that term, however, has been a matter of considerable debate (Gould, February, T2005). The term “jihad” has its roots in the Arabic verb “j-h-d,” whose meaning generally is interpreted as “to endeavor, strive, labor, take great pains.” The noun form generally refers to a struggle. According to some, it typically connotes a great effort in the struggle to maintain the straight path of Islam. However, Bernard Lewis (2003), eminent historian of Islam and the Middle East, notes that the concept of jihad in the great majority of the Arabic language and Islamic writings refers to a religious duty to take action against infidels or non-believers, for the sake of God Almighty (Allah). Other Islamic scholars also support Lewis’ contention that in orthodox –not even extremist – usage, jihad almost always refers to the duty to fight against “the enemies of Islam.” Modern day Islamic extremists such as Usama bin Ladin have been profoundly influenced by the notion that jihad is a “neglected duty” (i.e., jihad al-farida algha’iba); an idea inherited from earlier Egyptian Islamist philosophers of the 1950-60s, such as Sayyid Qutb and Muhammad Al-Farraj (Jansen, 1986). Qutb and Al-Farraj asserted that after faith in God (iman) and the belief in only one true God (tawhid), there is no more important duty for all Muslims than jihad against the unbelievers (Lewis, 2003). It is important to note here that this principle (i.e., that there is a duty mandated by God to kill or destroy all “unbelievers”), which is the centerpiece of Islamic extremist doctrine, is a relatively new development in Islamic history. While the faith of Islam has existed for more than 14 centuries, this violent strain of Islamist ideology has only held a sizable audience for less than a century. Jihadism is a modern phenomenon (Pipes, September 23, 2004). In the current international security environment, there is consensus among US counterterrorism experts and policymakers that Sunni extremism – driving a call to wage jihad – currently poses the greatest threat to Western interests (National Commission on Terrorist Attacks Upon the United States, 2004). The voice of these extremists is most aptly represented in the words and deeds of Al-Qa’ida and its affiliated network, and of men such as Usama bin Ladin, Ayman al-Zawahiri, and number of lesser known extremist shaykhs. These groups, and the men behind them, have a rigid, narrow view of Islam and lack any tolerance for those whose beliefs diverge from them. They oppose Jews, Christians, and even less strident Muslims (Borum & Gelles, 2005). Their exclusive rigidity and fundamentalism alone, however, are not sufficient to give rise to a security threat. Rather, the threat arises from the belief that they have a duty to wage holy war against, and violently exterminate, all persons who do not share their beliefs. The world of the Islamic extremist is starkly divided between “us” and “them.” The progenitors of this ideology, including Sayyid Qutb, Muhammad ‘Abd Al-Salam Al-Farraj, and ‘Abdallah Azzam, as well as their contemporary counterparts such as Usama bin Ladin, believe two competing forces seek to dominate the condition of the world. Since the time the Qur’an was revealed to the Prophet Muhammad, the states of Dar Al-Islam (the abode of Islam) and Dar Al-Harb (abode of war or conflict) have been in conflict, and will remain so until the end of time (Lewis, 2003). 1 Derived from Gelles, M., McFadden, R., Borum, R., & Vossekuil, B. (In Press). An approach to the interrogation of subjects of Al-Qa’ida- related investigations: A perspective for law enforcement personnel. In T. Williamson (Ed). Investigative Interviewing: Developments in Research, Rights and Regulation. Cullomtpon, Devon, England: Willan Publishing. 4 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE Islamic extremists believe that the world currently exists in the state of Dar Al-Harb. In this condition, true believers of Islam are ostensibly impelled to wage defensive jihad in order to reclaim lands once under the control of pious Muslims. These territories include parts of Spain and other areas of Europe “up to the gates of Rome,” and, of course, Israel. Once Muslims reclaim the land, then the struggle (jihad) moves to an offensive mode
Recommended publications
  • Download Thepdf
    Volume 59, Issue 5 Page 1395 Stanford Law Review KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker © 2007 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 59 STAN. L. REV. 1395 (2007). For information visit http://lawreview.stanford.edu. KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker* INTRODUCTION: THE DYNAMICS OF COUNTER-TERRORISM POLICIES AND LAWS................................................................................................ 1395 I. CONTROL ORDERS ..................................................................................... 1403 A. Background to the Enactment of Control Orders............................... 1403 B. The Replacement System..................................................................... 1408 1. Control orders—outline................................................................ 1408 2. Control orders—contents and issuance........................................ 1411 3. Non-derogating control orders..................................................... 1416 4. Derogating control orders............................................................ 1424 5. Criminal prosecution.................................................................... 1429 6. Ancillary issues............................................................................. 1433 7. Review by Parliament and the Executive...................................... 1443 C. Judicial Review..................................................................................
    [Show full text]
  • Homeland Security Implications of Radicalization
    THE HOMELAND SECURITY IMPLICATIONS OF RADICALIZATION HEARING BEFORE THE SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 20, 2006 Serial No. 109–104 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PRINTING OFFICE 35–626 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman DON YOUNG, Alaska BENNIE G. THOMPSON, Mississippi LAMAR S. SMITH, Texas LORETTA SANCHEZ, California CURT WELDON, Pennsylvania EDWARD J. MARKEY, Massachusetts CHRISTOPHER SHAYS, Connecticut NORMAN D. DICKS, Washington JOHN LINDER, Georgia JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DEFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of JIM GIBBONS, Nevada Columbia ROB SIMMONS, Connecticut ZOE LOFGREN, California MIKE ROGERS, Alabama SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BILL PASCRELL, JR., New Jersey KATHERINE HARRIS, Florida DONNA M. CHRISTENSEN, U.S. Virgin Islands BOBBY JINDAL, Louisiana BOB ETHERIDGE, North Carolina DAVE G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island MICHAEL MCCAUL, Texas KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania GINNY BROWN-WAITE, Florida SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California MARK E.
    [Show full text]
  • (U//FOUO) Terrorist Training and Recruitment of CONUS Subjects: Lackawanna, Portland, and Northern Virginia
    UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Terrorist Training and Recruitment of CONUS Subjects: Lackawanna, Portland, and Northern Virginia 30 October 2006 UNCLASSIFIED Prepared by FBI Counterterrorism Division UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Terrorist Training and Recruitment of CONUS Subjects: Lackawanna, Portland, and Northern Virginia (U//FOUO) Scope Note (U//FOUO) This assessment addresses the Terrorism (TERR) topic of the NIPF and the following FBI International Terrorism intelligence requirements: IT I.B.2-4; IT II.B.1. (U//FOUO) This assessment addresses the central role of terrorist training in three significant post-9/11 continental United States (CONUS) terrorism investigations: Lackawanna, Portland, and Northern Virginia. This assessment does not address other individuals who may have sought training independently, nor does it address groups of individuals who sought training in regions outside of South or Central Asia. (U//FOUO) This assessment is not a comprehensive account of terrorist training by CONUS subjects. It compares and contrasts these cases in order to illustrate the various ways CONUS subjects could be drawn into extremist circles and seek terrorist training in the United States and abroad. The information contained in this assessment is primarily derived from FBI case files and open source information and is current as of 25 October 2006. (U) This assessment was prepared by the FBI’s Threat Analysis Unit. Comments and queries may be addressed to the acting unit chief at 202-324-2292. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2 UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Key Judgments • (U//FOUO) Assessment of groups involved in the Lackawanna, Northern Virginia, and Portland cases suggests there is no single profile of groups that become involved in terrorist training.
    [Show full text]
  • Targeted Killings by Drones: a Domestic and International Legal Framework
    Journal of International and Comparative Law Volume 3 Issue 1 Volume 3, Fall 2012, Issue 1 Article 2 Targeted Killings By Drones: A Domestic and International Legal Framework Catherine Lotrionte Follow this and additional works at: https://scholarship.law.stjohns.edu/jicl Part of the Criminal Law Commons, and the International Law Commons This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in Journal of International and Comparative Law by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. TARGETED KILLINGS BY DRONES: A DOMESTIC AND INTERNATIONAL LEGAL FRAMEWORK Catherine Lotrionte* INTRODUCTION In the last couple of decades, the threat from transnational terrorist organizations has prompted many States to reevaluate how international and domestic laws can effectively operate to counter these threats. Although terrorists have conducted violent acts for centuries, it has only been since the early 1990s that terrorist groups such as Al Qaeda (“Al Qaeda”) have been effective in extending their span of operations globally and continuously. With the global reach of such groups, they have successfully threatened the fundamental security of States with a magnitude of violence never envisioned by the drafters of the legal instruments that guide State behavior in this area. Today, States struggle to reevaluate how these laws are applicable to this new category of enemy. This article examines the relevant domestic and international legal framework for countering the modern threats from terrorism, focusing on the U.S.
    [Show full text]
  • Preventing Terrorism by Prosecuting Material Support Brian P
    Notre Dame Law Review Volume 80 Issue 2 Competing and Complimentary Rule Systems: Article 9 Civil Procedure and ADR 1-1-2005 Preventing Terrorism by Prosecuting Material Support Brian P. Comerford Follow this and additional works at: http://scholarship.law.nd.edu/ndlr Recommended Citation Brian P. Comerford, Preventing Terrorism by Prosecuting Material Support, 80 Notre Dame L. Rev. 723 (2005). Available at: http://scholarship.law.nd.edu/ndlr/vol80/iss2/9 This Note is brought to you for free and open access by NDLScholarship. It has been accepted for inclusion in Notre Dame Law Review by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. NOTES PREVENTING TERRORISM BY PROSECUTING MATERIAL SUPPORT Brian P. Comerford* The most important aspect of the war on terror is the application of the rule of law to break the backs of terrorist organizations.' INTRODUCTION In the years since September 11, federal prosecutors have intensi- fied their efforts to bring criminal prosecutions as part of the war on terror. An essential tool in these efforts is the material support stat- ute, 18 U.S.C. § 2339B, which prohibits the provision of material sup- port to designated foreign terrorist organizations. Using the material support statute, the government has charged a number of defendants in the war on terror, including John Walker Lindh and the "Lackawanna Six" defendants. Although often de- scribed as a terrorist financing law, 2 recent cases illustrate the impor- tance of the material support statute not just to restrict terrorist fundraising, but to combat all types of support to terrorist organiza- tions.
    [Show full text]
  • The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015 Author(s): Jytte Klausen Document Number: 250416 Date Received: November 2016 Award Number: 2012-ZA-BX-0006 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. FINAL REPORT The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015. Principal Investigator: Jytte Klausen, Brandeis University. June 2016. This project was supported by Award No. 2012-ZA-BX-0006, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this report are those of the author and do not necessarily reflect those of the U.S. Department of Justice. This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice Contents EXECUTIVE SUMMARY ........................................................................................................... I 1. INTRODUCTION....................................................................................................................
    [Show full text]
  • The Nixon Center
    THE NIXON CENTER Bearers of Global Jihad? Immigration and National Security after 9/11 By Robert S. Leiken 1 About The Nixon Center The Nixon Center is a non-partisan public policy institution established by former President Richard Nixon shortly before his death in 1994. Committed to the analysis of policy challenges to the United States through the prism of the American national interest, the Center is a substantively and programmatically independent division of the Richard Nixon Library and Birthplace Foundation. Major programs of The Nixon Center include the Chinese Studies Program, Immigration and National Security Program, Regional Strategic Programs, Strategic Studies Program, and U.S.- Russian Relations Program. Topics addressed by Center programs range from U.S. relations with China and Russia to energy geopolitics in the Persian Gulf and Caspian Basin and European security issues. The Nixon Center also publishes the foreign affairs quarterly The National Interest in cooperation with Hollinger International. The Center is supported by foundation, corporate, and individual donors. Copyright 2004 The Nixon Center. All Rights Reserved. Bearers of Global Jihad? Immigration and National Security after 9/11 By Robert S. Leiken The Nixon Center 1615 L Street, N.W., Suite 1250 Washington, DC 20036 Phone: (202) 887-1000 Fax: (202) 887-5222 E-mail: [email protected] Website: www.nixoncenter.org Order from the Richard Nixon Library and Birthplace Foundation 1-800-USA-8865 Cover: Passport photo of Mohammed Atta, ringleader of the September 11th hijackers. Cover Design by Steven Brooke 2 Introductory Note This Nixon Center monograph, Bearers of Global Jihad: Immigration and National Security after 9/11, is a groundbreaking assessment of the relationship between immigration and terrorism.
    [Show full text]
  • The Surprising Lessons from Plea Bargaining in the Shadow of Terror
    Belmont University Belmont Digital Repository Law Faculty Scholarship College of Law 2011 The urS prising Lessons from Plea Bargaining in the Shadow of Terror Lucian E. Dervan Belmont University - College of Law Follow this and additional works at: https://repository.belmont.edu/lawfaculty Part of the Legal Writing and Research Commons Recommended Citation 27 Ga. St. U. L. Rev. 239 (2010) This Article is brought to you for free and open access by the College of Law at Belmont Digital Repository. It has been accepted for inclusion in Law Faculty Scholarship by an authorized administrator of Belmont Digital Repository. For more information, please contact [email protected]. THE SURPRISING LESSONS FROM PLEA BARGAINING IN THE SHADOW OF TERROR Lucian E. Dervan∗∇ ABSTRACT Since September 11, 2001, several hundred individuals have been convicted of terrorism related charges. Of these convictions, over 80% resulted from a plea of guilty. It is surprising and counterintuitive that such a large percentage of these cases are resolved in this manner, yet, even when prosecuting suspected terrorists caught attempting suicide attacks, the power of the plea bargaining machine exerts a striking influence. As a result, a close examination of these extraordinary cases offers important insights into the forces that drive the plea bargaining system. Utilizing these insights, this article critiques two divergent and dominant theories of plea bargaining present in the current literature—the administrative theory and the shadow-of-trial theory. The article then offers a new theory of plea bargaining that both expands on these existing theories and combines relevant aspects of each into one overarching model.
    [Show full text]
  • Us Targeted Killing Post 9/11: Just and Effective Warefare Joseph Decotiis
    Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 2019 Us Targeted Killing Post 9/11: Just and Effective Warefare Joseph Decotiis Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Part of the Law Commons Recommended Citation Decotiis, Joseph, "Us Targeted Killing Post 9/11: Just and Effective Warefare" (2019). Law School Student Scholarship. 970. https://scholarship.shu.edu/student_scholarship/970 I. Introduction On August 5th, 2009 a remotely controlled, unmanned plane, otherwise known as a Predator drone is able to capture images of the most wanted man in Pakistan; Baitullah Meshud.1 With the capability of the Predator drone, the Central Intelligence Agency, located in Langley, Virginia watches live footage of Meshud relaxing and receiving medical treatment at his father in-laws house located in Pakistan. 2 Accompanying Meshud were family members, body guards and bystanders.3 Pakistan Prime Interior Minister A. Rehman Malik explained that the images obtained by the CIA was a perfect picture of Meshud’s entire body not just the top of his head.4 The real time picture remained stable as the CIA remotely launched two Hellfire missiles from the Predator drone; after the dust had settled all that remained of the most wanted man in Pakistan was his detached torso.5 Eleven others perished as well; including his wife, father-in-law, his mother-in- law, a lieutenant, and seven bodyguards.6 To U.S. officials, the killing of Meshud was a crucial tactical victory in the fight against terrorist organizations such as the Taliban and al Qaeda.7 Meshud was the number one most wanted man in Pakistan because he was suspected in the assassination of Pakistan’s former Prime Minister, Benazir Bhutto, as well as the suicide truck bombing of the Marriot Hotel in Islamabad; resulting in 50 causalities.8 Meshud was also involved in helping the Afghan confederates attack American coalition troops.9 The successful airstrike in 1 Jane Mayer, The Predator War, New Yorker (Oct.
    [Show full text]
  • Assassination Or Targeted Killings After 9/11
    VOLUME 56 2011/12 JOHN YOO Assassination or Targeted Killings After 9/11 ABOUT THE AUTHOR: Professor of Law, University of California at Berkeley, School of Law; Visiting Scholar, American Enterprise Institute. The author thanks Meng Xi for excellent research assistance. This article has been adapted from JOHN Yoo, WAR BY OTHER MEANS: AN INSIDER'S AcCOUNT OF THE WAR ON TERROR (2006). 57 HeinOnline -- 56 N.Y. L. Sch. L. Rev. 57 2011-2012 ASSASSINATION OR TARGETED KILLINGS AFTER 9/11 1. INTRODUCTION On November 4, 2002, Abu Ali al-Harithi, al-Qaeda's top operative in Yemen and a planner of the 2000 bombing of the USS Cole, and five other suspected al-Qaeda members were driving in a car outside the Yemeni capital of Sana. An unmanned Predator drone, controlled remotely by a CIA pilot from a base in Djibouti and overseen by commanders in Saudi Arabia, located the car and fired a Hellfire missile.' The six men were killed. All that was left was the charred hulk of a bombed- out car sitting in the desert. Soon after, unnamed government sources boasted of the strike to the New York Times as an example of how high technology and actionable intelligence could produce victories in the war on terror.2 Among the dead was an American citizen, Kamal Derwish, who was said to be the leader of an al-Qaeda sleeper cell that had been discovered near Buffalo, New York.' Other members of the sleeper cell, known as the "Lackawanna 6," were arrested in 2003 for providing material support to terrorists.' They pled guilty soon after and are currently serving seven- to ten-year terms in prison.s Derwish, however, left the country and ended up in the car in Yemen with al-Harithi.
    [Show full text]
  • Exploring the Role of New Media in Terrorist Recruitment Within the United States
    VIRTUAL IMPETUS? EXPLORING THE ROLE OF NEW MEDIA IN TERRORIST RECRUITMENT WITHIN THE UNITED STATES. A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Sarah D. Hengemuhle, B.A. Washington, D.C. April 12, 2010 Copyright 2010 by Sarah D. Hengemuhle All Rights Reserved ii VIRTUAL IMPETUS? EXPLORING THE ROLE OF NEW MEDIA IN TERRORIST RECRUITMENT WITHIN THE UNITED STATES. S. D. Hengemuhle, B.A. Thesis Advisor: J. A. Rosenthal, Ph.D. ABSTRACT The influence of new media on terrorist recruitment, particularly within the United States, has been the subject of much discussion in recent years. New media has been considered a logical factor inducing U.S. citizens to Islamist terrorism. However, the assumption that new media is a significant factor in recruitment has been largely accepted as valid without systematic quantitative analysis. This study examines whether new media is a significant factor in recruitment by examining 63 individual cases of homegrown jihad from post-9/11 to December 2009. This analysis found new media was not a significant or contributing factor to recruitment in the majority of cases. This negative correlation suggests other dynamics are responsible for leading individuals to choose violent jihad. Pursuant to this, a number of other factors, including socioeconomic, religiosity, and social networks, were analyzed in each case. In the majority of cases, physical bonds of kinship or friendship were the predominant factor leading individuals to become Islamist terrorists. These findings could potentially dampen many of the fears that new media will result in an epidemic of homegrown jihadists and strengthens the position that anti- radicalization and counterterrorism efforts should be focused at the community and social network level.
    [Show full text]
  • In Pursuit of Justice: Prosecuting Terrorism Cases in the Federal Courts
    In Pursuit of Justice Prosecuting Terrorism Cases in the Federal Courts Richard B. Zabel James J. Benjamin, Jr. May 2008 gfhgfh In Pursuit of Justice Prosecuting Terrorism Cases in the Federal Courts A White Paper Richard B. Zabel James J. Benjamin, Jr. May 2008 About Us Human Rights First believes that building respect for human rights and the rule of law will help ensure the dignity to which every individual is entitled and will stem tyranny, extremism, intolerance, and violence. Human Rights First protects people at risk: refugees who flee persecution, victims of crimes against humanity or other mass human rights violations, victims of discrimination, those whose rights are eroded in the name of national security, and human rights advocates who are targeted for defending the rights of others. These groups are often the first victims of societal instability and breakdown; their treatment is a harbinger of wider-scale repression. Human Rights First works to prevent violations against these groups and to seek justice and accountability for violations against them. Human Rights First is practical and effective. We advocate for change at the highest levels of national and international policymaking. We seek justice through the courts. We raise awareness and understanding through the media. We build coalitions among those with divergent views. And we mobilize people to act. Human Rights First is a non-profit, nonpartisan international human rights organization based in New York and Washington D.C. To maintain our independence, we accept no government funding. This report is available for free online at www.humanrightsfirst.org © 2008 Human Rights First.
    [Show full text]