The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources
Total Page:16
File Type:pdf, Size:1020Kb
NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources Psychological Services Unit, Code 02D Prepared for the FBI’s National Joint Terrorism Task Force Michael G. Gelles, Psy.D. Randy Borum, Psy.D. Psychological Services Unit University of South Florida Naval Criminal Investigative Service Russell Palarea, Ph,D. Psychological Services Unit Naval Criminal Investigative Service NCIS CONTROLLED PRODUCT1 /FOR OFFICIAL USE ONLY NCIS CONTLAWROL LENFED OPRODUCT/RCEMENTFOR SENSITI OFFICVEIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE TABLE OF CONTENTS Introduction 3 Understanding Jihad: The Path to Commitment 4 Understanding Cultural Contexts and Mindset 5 Pawns of Fate 5 Collective Identity 6 Importance of Relationships 6 Good Impressions 6 Good Intentions 6 Shame, not Guilt 6 Associative Thinking 7 Emotional Information Processing 7 Understanding Recruitment Vulnerability 7 CT Sources: Spotting, Vetting, & Assessing 8 Spotting 8 Vetting 9 Islamic Extremist Assessment Model 10 Islamic Extremist Recruitment & Source Insertion 10 Common and Desirable Characteristics 11 Common Motivational Pathways 13 Common Spotting Grounds 13 Examples of Islamic Extremist Group Recruitment 14 Tablighi Jamat 14 Jemaah Islamiya 15 Conclusion 16 Acknowledgements 17 References 18 Appendix A: Source Assessment Questions 21 Appendix B: Recruitment Chapter from the Al-Qa’ida Training Manual 23 Appendix C: Case Studies in Islamic Extremist Recruitment 26 Iyman Faris 26 Hamid & Umer Hayat 27 Jose Padilla 28 The Lackawanna Six 29 2 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE The Fundamentals of Islamic Extremism: Psychological Considerations for Developing & Managing Counterterrorism Sources Dr. Michael Gelles, Dr. Randy Borum, & Dr. Russell Palarea Introduction ollowing the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a F reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities. In either case, the goal of a source operation is to collect information related to the cell’s recruitment practices, capability, and plans for attack. Counterterrorism operations are difficult, complex, and aggressive but, when successful, they produce vital information. They reflect a proactive emphasis in strategic response to an ongoing and ambiguous threat. In the counterterrorism community, the Global Struggle Against Violent Extremism has led to a surge in threat warnings, investigations, arrests, and interrogations. As a result, the community has collected significant intelligence and gained greater insight into the Al-Qa’ida affiliated network and their known practices and methodologies. An opportunity exists to apply this knowledge in initiating proactive operations. Proactive operations that lead to strategic, preventive interventions are a far better use of resources than responding to threat alerts and conducting post-attack investigations. There is no substitute for the invaluable information derived by a source embedded in the daily activities of a targeted group. The source becomes the eyes and ears of the law enforcement and intelligence community. In this paper, we identify and describe several psychological considerations that may affect source development and management. While a host of factors will influence any operation, we focus here only on the psychological factors that we believe may be useful to Special Agents engaged in counterterrorism operations. This is but one portion of the larger operational structure. For a more expert view of the Islamic extremist adversary and the contexts in which they operate, we recommend seeking input from counterterrorism intelligence analysts. 3 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE Understanding Jihad: The Path to Commitment1 he concept of jihad is central to many Islamic extremist ideologies and justifications for violence (Euben, 2002). The meaning of that term, however, has been a matter of considerable debate (Gould, February, T2005). The term “jihad” has its roots in the Arabic verb “j-h-d,” whose meaning generally is interpreted as “to endeavor, strive, labor, take great pains.” The noun form generally refers to a struggle. According to some, it typically connotes a great effort in the struggle to maintain the straight path of Islam. However, Bernard Lewis (2003), eminent historian of Islam and the Middle East, notes that the concept of jihad in the great majority of the Arabic language and Islamic writings refers to a religious duty to take action against infidels or non-believers, for the sake of God Almighty (Allah). Other Islamic scholars also support Lewis’ contention that in orthodox –not even extremist – usage, jihad almost always refers to the duty to fight against “the enemies of Islam.” Modern day Islamic extremists such as Usama bin Ladin have been profoundly influenced by the notion that jihad is a “neglected duty” (i.e., jihad al-farida algha’iba); an idea inherited from earlier Egyptian Islamist philosophers of the 1950-60s, such as Sayyid Qutb and Muhammad Al-Farraj (Jansen, 1986). Qutb and Al-Farraj asserted that after faith in God (iman) and the belief in only one true God (tawhid), there is no more important duty for all Muslims than jihad against the unbelievers (Lewis, 2003). It is important to note here that this principle (i.e., that there is a duty mandated by God to kill or destroy all “unbelievers”), which is the centerpiece of Islamic extremist doctrine, is a relatively new development in Islamic history. While the faith of Islam has existed for more than 14 centuries, this violent strain of Islamist ideology has only held a sizable audience for less than a century. Jihadism is a modern phenomenon (Pipes, September 23, 2004). In the current international security environment, there is consensus among US counterterrorism experts and policymakers that Sunni extremism – driving a call to wage jihad – currently poses the greatest threat to Western interests (National Commission on Terrorist Attacks Upon the United States, 2004). The voice of these extremists is most aptly represented in the words and deeds of Al-Qa’ida and its affiliated network, and of men such as Usama bin Ladin, Ayman al-Zawahiri, and number of lesser known extremist shaykhs. These groups, and the men behind them, have a rigid, narrow view of Islam and lack any tolerance for those whose beliefs diverge from them. They oppose Jews, Christians, and even less strident Muslims (Borum & Gelles, 2005). Their exclusive rigidity and fundamentalism alone, however, are not sufficient to give rise to a security threat. Rather, the threat arises from the belief that they have a duty to wage holy war against, and violently exterminate, all persons who do not share their beliefs. The world of the Islamic extremist is starkly divided between “us” and “them.” The progenitors of this ideology, including Sayyid Qutb, Muhammad ‘Abd Al-Salam Al-Farraj, and ‘Abdallah Azzam, as well as their contemporary counterparts such as Usama bin Ladin, believe two competing forces seek to dominate the condition of the world. Since the time the Qur’an was revealed to the Prophet Muhammad, the states of Dar Al-Islam (the abode of Islam) and Dar Al-Harb (abode of war or conflict) have been in conflict, and will remain so until the end of time (Lewis, 2003). 1 Derived from Gelles, M., McFadden, R., Borum, R., & Vossekuil, B. (In Press). An approach to the interrogation of subjects of Al-Qa’ida- related investigations: A perspective for law enforcement personnel. In T. Williamson (Ed). Investigative Interviewing: Developments in Research, Rights and Regulation. Cullomtpon, Devon, England: Willan Publishing. 4 NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE NCIS CONTROLLED PRODUCT/FOR OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE Islamic extremists believe that the world currently exists in the state of Dar Al-Harb. In this condition, true believers of Islam are ostensibly impelled to wage defensive jihad in order to reclaim lands once under the control of pious Muslims. These territories include parts of Spain and other areas of Europe “up to the gates of Rome,” and, of course, Israel. Once Muslims reclaim the land, then the struggle (jihad) moves to an offensive mode