White7e ppt ch03

D
Jonathan R. White


    www.cengage.com/cj/white



       Chapter 3:
 Not Random Violence:
Modeling, Structuring and
  Financing Terrorism

                Rosemary Arway
                Hodges University
Models of Terrorism
 Models of terrorism:
  o Rural:
     ▪   Guerilla warfare (Cuban Revolution, Che Guevara
         Revolution)
     ▪   Revolution starts with poor peasants that organize into
         isolated groups, which form guerilla columns, and finally
         organize into army
  o Urban
     ▪   Fanon: mental illness was a result imperialism, colonized
         nations practice terrorism against colonial masters
     ▪   Marighella: the basis of revolution is guerilla and unorganized
         violence → governmental repression → massive uprising in
         response to oppression → toppling of government
  o Insurrection
     ▪   Marighella
An American
    Understanding of Insurgency
 Re-evaluation of American strategy:
  o Viet Nam experience (averse to enter a war without
    clear objectives)
  o Insurgencies represent a new mix of operations
    and tactics that become possible with the advance
    of technology and globalization.
  o It is impossible to fight insurgencies with military
    tactics:
     ▪   Insurgences control information.
     ▪   Insurgences operate with global communication.
     ▪   Insurgences incorporate technological weapons.
     ▪   Insurgences require few personnel.
An American
        Understanding of Insurgency
 Counter-insurgency forces need to be massive
  because:
   o they must enforce laws
   o they also must form a partnership with a host of other
     agencies
   o they must develop networks of organizations
 Security forces must follow the model of community
  policing
 Insurgencies developed at the end of the Cold War
  as various tribal, national, ethnic and religious groups
 Insurgencies depend upon social and support
  networks
Changing Dynamics and Structures

 After WW II, terrorist groups tended to follow
  the IRA model of small units or cells.
  o   Cells are the basic units of traditional terrorist
      organizations.
  o   Each cell has its own mission and operates without
      knowledge of other cells in the area.
 Burton:
  o Two basic structure of terrorist subunits:
      ▪   Cells – specialized with 4 to 6 people; may be tactical
          or intelligence.
      ▪   Columns – created from groups of cells;
          semiautonomous conglomeration of cells with a
          variety of specialties with a single command structure.
Changing Dynamics and Structures
 Around the 1990s large terrorist groups
  developed more dynamic methods of
  organization.
  o Fraser and Fulton:
     ▪ Groups employ variations of command and control
       structures
     ▪ Typical organization is arranged in a pyramid
     ▪ Hierarchical structure of terrorists groups is divided
       into four levels:
        •   Top level is the smallest level and is responsible for
            command.
        •   Second level is the active cadre
        •   Third level, second largest and most important, is the
            active supporters.
        •   Fourth level, largest category is the organization’s
            passive supporters.
Umbrella Organizations
            and Modern Piracy
 Legitimate groups form umbrellas under which
  terrorist groups could operate.
  o Several small pyramids gather under a sheltering
    group that:
     ▪   manages supplies
     ▪   obtains resources
     ▪   creates support structures
     ▪   gathers intelligence
 Terrorist action on the High Seas
  o A seemingly legitimate business (sheltering
    organization) provides cover for pirates (the
    pyramid organization) while denying all
    connection with illegal activity.
Virtual, Chain, and Hub Organization
 RAND Corporation identifies several
  other types of new organizational styles.
  o Virtual organizations: created through
    computer and information networks
  o Chain organizations: small groups linked by
    some type of communications
  o Hub organization: centralized group with
    semiautonomous groups supported in other
    regions
Managing Terrorist Organization
 Terrorists need to organize like any
  other group:
  o Groups require management
  o Hierarchical groups use cell structure and
    top-down management
  o Small groups in networks are more
    autonomous
  o Management and other administrative
    functions are hampered by the need for
    secrecy
Managing Terrorist Organization
 Terrorist groups experience special
  organizational problems:
  o   Secrecy
  o   Decentralization
  o   Training
  o   Internal discipline
  o   Gaining immediate tactical support for
      operations
Group Size and Campaign Length
 Gurr:
  o Group size:
    ▪ Most terrorist actions involve only a few people.
    ▪ Large groups or networks are more effective than
      smaller ones.
    ▪ Majority of successful groups embrace doctrines such
      as nationalism.
  o Campaign Length:
    ▪ Terrorism is short-lived.
    ▪ Most terrorist campaigns end within 18 months of the
      initial outburst of violence.
Group Size and Campaign Length
  Implications of Gurr Analysis:
      o Most terrorist organization are small,
        short-lived operations which are law
        enforcement problems.
      o If terrorism is a result of popular social
        issue, sympathizers can enhance the
        power of the group.
      o Strong support for a group is more
        important than the actual number of
        operatives.
Group Size and Campaign Length
  Hewitt reflects Gurr’s position:
   o Small groups do not have resources to damage an
     opponent over an extended length of time.
   o Terrorist campaigns are more important than
     isolated acts of terrorism.
   o Terrorist campaigns demand expanded political
     responses.
   o Large terrorist organizations accounted for the
     majority of the terrorism.
   o Large terrorist organizations can bring change in
     government politics.
Group Size and Campaign Length

 Analyst Livingstone describes terrorism as
  “warfare on the cheap.”
  o State Sponsorship
    ▪ Nation could support a terrorist group (Hezbollah)
    ▪ State support automatically creates a large group
 Scheuer
  o If state sponsorship and failed state
    approaches are applied to Islamic militants, it
    will be impossible to understands both the
    organization’s characteristics and growth of al
    Qaida and related groups.
Financing Modern Terrorism
 It takes money to fund organizations, and
  resources to support operations.
 Adams:
  o The appropriate method of attacking terrorism will be
    stopping of the flow of money.
  o A terrorist operation does not cost a lot of money.
  o The overall budget for a terrorist operation is quite
    high.
 The financial investigative debate:
  o Major counterterrorism strategies should be aimed at
    waging “financial warfare” with financial weapons.
  o The National Strategy for Combating terrorism
    endorses this approach by targeting two areas:
     ▪   The source of financing
     ▪   Mechanism use to transfer money
Importance of Financing
 Effective counterterrorist policy involves
  strategic efforts to deny fiscal resources to
  terrorists.
 Arguments are made, favorable and
  unfavorable, concerning the use of finances as
  a weapon.
  o Financial strategy against terrorism will reduce
    violence.
  o Working in an underground economy, terrorists are
    immune from formal government sanctions.
Importance of Financing
 Critique:
  o Financial warfare will not be effective
    because terrorists do not respond to formal
    controls, but participate in undergrad
    economies.
  o It is relatively easy for terrorist groups to
    hide their assets.
  o However, targeting flow of money may lead
    to important discoveries about terrorist
    groups and plans.
Underground Networks and Organized Crime
  Three major categories:
    o The unlawful raising of funds
      ▪ Robbery, Fraud, Larceny, Smuggling, Dealing in
        contraband, Forgery, Counterfeiting, Identity theft,
        Extortion and protection rackets
    o The unlawful distribution of funds
    o The formal regulated economy
    o Economic targeting as force multiplier
  Terrorists raise funds through traditional
   criminal methods and exchange resources in
   underground networks.
    o The differentiating factor between terrorism and
      traditional crime is motivation.
Underground Networks and Organized Crime

   Terrorists around the world use a variety
    of criminal methods to raise funds.
     o Middle Eastern terrorists engage in smuggling
       and document fraud.
     o Central Asian terrorists trade illegal arms,
       launder money, and distribute drugs.
     o Latin American terrorism is tied to drug
       production and public corruption.
     o U.S. domestic terrorists engage in fraud
       schemes and robberies.
       ▪ International terrorists also engage in fraudulent
         activities in America.
Underground Networks and Organized Crime
     Underground networks exists not only in the dimension
      terrorists/criminals, but also terrorists/terrorists, and
      terrorists/criminals/terrorists.
     International linkages – the nexus of criminal
      syndicates – that exists between various terrorists
      group were best demonstrated in the case of the
      Japanese Red Army group in 1972:
      o   The unit (Rengo Segikun) composed of Japanese citizens…
      o   that have been trained in North Korea…
      o   picked up funds in West Germany…
      o   for further training in both Syria and Lebanon…
      o   picked up its arms and ammunition in Italy…
      o   and then attacked the Lod Airport in Israel on behalf of the
          Popular Front for the Liberation of Palestine.
Legal sources of Funding
 In addition to traditional crime, terrorists
  raise money through legal operations.
 Frequently employed legal activities
  include:
  o   Soliciting contributions
  o   Operating businesses
  o   Creating charities
  o   Running non-government organizations
  o   Using wire transfers
  o   Forming or using banks
  o   The Hawala system
Legal sources of Funding: Charities

   Terrorists set up phony charities or skim
    proceeds from legitimate organizations.
   Charities are difficult to investigate
    o   Formed overseas
    o   State supported
    o   May hide true purpose
    o   Supported by legitimate business
    o   Difficult to infiltrate
          ▪   Benevolence International Fund
          ▪   Formed in U.S. & received tax-exempt status from IRS
Non-traceable Funding: Hawala System

  Hawala system is a legitimate means of
   transferring money without using money.
   o Originated in China
   o Based on long term trust relationships and
     knowledge that each dealer is reliable for all debts.
  Advantages of the Hawala system:
   o   Money moves with no record.
   o   Money crosses international borders with ease.
   o   Money can be easily bartered for contraband.
   o   Tax records do not exist.
The Political Economy of Terrorism
  Globalization:
   o Napoleoni states that globalization created
     pockets in the world where failed states are
     left to govern with little economic and political
     power.
      ▪ Terrorist groups grow in such places.
      ▪ Terrorist group acts like a government in such a
        places.
  Terrorist organizations are strong enough to
   resist the state and grow running their own
   underground economies.
Macroeconomic Theories
 Counterterrorism policies should be aimed at
  providing the world’s populace with economic
  stability, opportunity, and participation in the
  mainstream economy.
 Economic policies to counter terrorism:
  o Supporting states in threat of failure.
  o Providing opportunities for people to participate
    and benefit from economic systems.
  o Eliminating underground economic networks.
The Narco-terrorism Debate
 Idea of narco-terrorism is a controversial term
  linking drugs to terrorism in one of two ways:
  o   Drug profits are used to finance terrorism.
  o   Drug gangs use terrorism to control production and
      distribution networks.
 Proponents:
  o   Terrorists use drugs to finance operations.
 Opponents:
  o   Narco-terrorism is a convenient term for appealing to
      public emotions, which gives governments more power.
  o   Use of the word narco-terrorism is an attempt to take
      political advantage of the fear of terrorism.
1 sur 26

Recommandé

Lecture 8 state sponsor terrorism par
Lecture 8   state sponsor terrorismLecture 8   state sponsor terrorism
Lecture 8 state sponsor terrorismJames Feldkamp
104 vues28 diapositives
White7e ppt ch13revised par
White7e ppt ch13revisedWhite7e ppt ch13revised
White7e ppt ch13reviseddifordham
1.6K vues36 diapositives
White7e ppt ch14 par
White7e ppt ch14White7e ppt ch14
White7e ppt ch14difordham
1.4K vues29 diapositives
Migration crime leiden par
Migration crime leidenMigration crime leiden
Migration crime leidenJohan Westerholm
14K vues15 diapositives
Online assignment soumya.r par
Online assignment soumya.rOnline assignment soumya.r
Online assignment soumya.rAjith Vazhappally
366 vues15 diapositives
160407_Zarate_US-Japan_Counterterrorism_Cooperation par
160407_Zarate_US-Japan_Counterterrorism_Cooperation160407_Zarate_US-Japan_Counterterrorism_Cooperation
160407_Zarate_US-Japan_Counterterrorism_CooperationClaire McGillem
221 vues23 diapositives

Contenu connexe

Tendances

Third Generation Terrorism And Crisis Management par
Third Generation Terrorism And Crisis ManagementThird Generation Terrorism And Crisis Management
Third Generation Terrorism And Crisis Managementjschnei2
578 vues32 diapositives
Muslim Ideology: Terrorism And Insurgency par
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencySARON MESSEMBE OBIA
1.8K vues11 diapositives
Terrorismo 12 par
Terrorismo 12Terrorismo 12
Terrorismo 12Jorge Andrade
216 vues35 diapositives
Mapping the mutations of terrorism par
Mapping the mutations of terrorismMapping the mutations of terrorism
Mapping the mutations of terrorismSARON MESSEMBE OBIA
693 vues10 diapositives
White7e ppt ch02 par
White7e ppt ch02White7e ppt ch02
White7e ppt ch02difordham
895 vues26 diapositives
Terrorism A Global Threat par
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
7.3K vues18 diapositives

Tendances(20)

Third Generation Terrorism And Crisis Management par jschnei2
Third Generation Terrorism And Crisis ManagementThird Generation Terrorism And Crisis Management
Third Generation Terrorism And Crisis Management
jschnei2578 vues
White7e ppt ch02 par difordham
White7e ppt ch02White7e ppt ch02
White7e ppt ch02
difordham895 vues
Terrorism on the African continent: The case of Cameroon par SARON MESSEMBE OBIA
Terrorism on the African continent: The case of CameroonTerrorism on the African continent: The case of Cameroon
Terrorism on the African continent: The case of Cameroon
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-... par GiulianoBo45
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
GiulianoBo4574 vues
Instruments counter terrorism par Petko
Instruments counter terrorismInstruments counter terrorism
Instruments counter terrorism
Petko185 vues
Terrorism par u439
TerrorismTerrorism
Terrorism
u43943.5K vues
What is terrorism par azamhicks
What is terrorismWhat is terrorism
What is terrorism
azamhicks4.2K vues
The face of terrorism 2013 par Martin Brown
The face of terrorism   2013The face of terrorism   2013
The face of terrorism 2013
Martin Brown2.1K vues

En vedette

White7e ppt ch07 par
White7e ppt ch07White7e ppt ch07
White7e ppt ch07difordham
996 vues31 diapositives
Terrorism..what breeds it par
Terrorism..what breeds itTerrorism..what breeds it
Terrorism..what breeds itSaba Saif
4.4K vues16 diapositives
Terrorism... what actually it is par
Terrorism... what actually it is Terrorism... what actually it is
Terrorism... what actually it is Muhammad Rehan Asghar
652 vues17 diapositives
White7e ppt ch12 par
White7e ppt ch12White7e ppt ch12
White7e ppt ch12difordham
1.9K vues26 diapositives
Presentatie hawala banking english version par
Presentatie hawala banking english versionPresentatie hawala banking english version
Presentatie hawala banking english versionGeert DELRUE
2.2K vues33 diapositives
Presentatie hawala banking english version par
Presentatie hawala banking english versionPresentatie hawala banking english version
Presentatie hawala banking english versionGeert DELRUE
1.7K vues33 diapositives

En vedette(16)

White7e ppt ch07 par difordham
White7e ppt ch07White7e ppt ch07
White7e ppt ch07
difordham996 vues
Terrorism..what breeds it par Saba Saif
Terrorism..what breeds itTerrorism..what breeds it
Terrorism..what breeds it
Saba Saif4.4K vues
White7e ppt ch12 par difordham
White7e ppt ch12White7e ppt ch12
White7e ppt ch12
difordham1.9K vues
Presentatie hawala banking english version par Geert DELRUE
Presentatie hawala banking english versionPresentatie hawala banking english version
Presentatie hawala banking english version
Geert DELRUE2.2K vues
Presentatie hawala banking english version par Geert DELRUE
Presentatie hawala banking english versionPresentatie hawala banking english version
Presentatie hawala banking english version
Geert DELRUE1.7K vues
hawala-scam par yashspatel
hawala-scamhawala-scam
hawala-scam
yashspatel17.3K vues
Indian Money at Swiss Banks par Taru Bakshi
Indian Money at Swiss Banks Indian Money at Swiss Banks
Indian Money at Swiss Banks
Taru Bakshi8.3K vues
Presentation OnTerrorism par tariqmehsud
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
tariqmehsud68.2K vues
Corruption ppt copy par Anjiyaa
Corruption ppt   copyCorruption ppt   copy
Corruption ppt copy
Anjiyaa51.8K vues
Globalization powerpoint par shelbbb527
Globalization powerpointGlobalization powerpoint
Globalization powerpoint
shelbbb527206.4K vues
Globalizationppt par Edz Gapuz
GlobalizationpptGlobalizationppt
Globalizationppt
Edz Gapuz127.3K vues
Terrorism causes, effects, and solutions par Srun Sakada
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
Srun Sakada287.4K vues

Similaire à White7e ppt ch03

Terrorism, Human Rights and Diplomacy.pdf par
Terrorism, Human Rights and Diplomacy.pdfTerrorism, Human Rights and Diplomacy.pdf
Terrorism, Human Rights and Diplomacy.pdfInternational Islamic University Islamabad
29 vues21 diapositives
C03.8 organization & financing of terrorism par
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorismMatthew Boutross
1.3K vues35 diapositives
Systematic Use Of Terrorism par
Systematic Use Of TerrorismSystematic Use Of Terrorism
Systematic Use Of TerrorismBeth Salazar
2 vues77 diapositives
Systematic Use Of Terrorism par
Systematic Use Of TerrorismSystematic Use Of Terrorism
Systematic Use Of TerrorismDotha Keller
2 vues77 diapositives
Irregular Warfare Essay par
Irregular Warfare EssayIrregular Warfare Essay
Irregular Warfare EssayKimberly Williams
1 vue77 diapositives
Global Terrorism Challenges & Response par
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & ResponseShahid Hussain Raja
2.3K vues40 diapositives

Similaire à White7e ppt ch03(20)

C03.8 organization & financing of terrorism par Matthew Boutross
C03.8 organization & financing of terrorismC03.8 organization & financing of terrorism
C03.8 organization & financing of terrorism
Matthew Boutross1.3K vues
Overview of preventing and countering violent extremism par Richard Ali
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
Richard Ali535 vues
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx par SaptarshiBasu23
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptxTERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL  (1).pptx
TERRORISM AND TRANSNATIONAL ORGANIZED CRIME IN BENGAL (1).pptx
SaptarshiBasu2314 vues
Week 8 - Counterterrorism and Counterinsurgency.pdf par AmalSayed18
Week 8 - Counterterrorism and Counterinsurgency.pdfWeek 8 - Counterterrorism and Counterinsurgency.pdf
Week 8 - Counterterrorism and Counterinsurgency.pdf
AmalSayed187 vues
2.3.2. Instruments of Counterterrorism.pptx par helpsec
2.3.2. Instruments of Counterterrorism.pptx2.3.2. Instruments of Counterterrorism.pptx
2.3.2. Instruments of Counterterrorism.pptx
helpsec30 vues
Essay About How Terrorist Organization Exploit Media Coverage par Tina Marie
Essay About How Terrorist Organization Exploit Media CoverageEssay About How Terrorist Organization Exploit Media Coverage
Essay About How Terrorist Organization Exploit Media Coverage
Tina Marie2 vues
White7e ppt ch05 par difordham
White7e ppt ch05White7e ppt ch05
White7e ppt ch05
difordham1.3K vues

Plus de difordham

Schm5e ppt ch17 par
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17difordham
1.9K vues18 diapositives
Ppt chapter 14 par
Ppt chapter 14Ppt chapter 14
Ppt chapter 14difordham
3.9K vues22 diapositives
Ppt chapter 7 par
Ppt chapter 7Ppt chapter 7
Ppt chapter 7difordham
6.8K vues43 diapositives
Ppt chapter 16 par
Ppt chapter 16Ppt chapter 16
Ppt chapter 16difordham
3.6K vues21 diapositives
Ppt chapter 15 par
Ppt chapter 15Ppt chapter 15
Ppt chapter 15difordham
3.4K vues29 diapositives
Ppt chapter 13 par
Ppt chapter 13Ppt chapter 13
Ppt chapter 13difordham
19.5K vues33 diapositives

Plus de difordham(20)

Schm5e ppt ch17 par difordham
Schm5e ppt ch17Schm5e ppt ch17
Schm5e ppt ch17
difordham1.9K vues
Ppt chapter 14 par difordham
Ppt chapter 14Ppt chapter 14
Ppt chapter 14
difordham3.9K vues
Ppt chapter 7 par difordham
Ppt chapter 7Ppt chapter 7
Ppt chapter 7
difordham6.8K vues
Ppt chapter 16 par difordham
Ppt chapter 16Ppt chapter 16
Ppt chapter 16
difordham3.6K vues
Ppt chapter 15 par difordham
Ppt chapter 15Ppt chapter 15
Ppt chapter 15
difordham3.4K vues
Ppt chapter 13 par difordham
Ppt chapter 13Ppt chapter 13
Ppt chapter 13
difordham19.5K vues
Ppt chapter 12 par difordham
Ppt chapter 12Ppt chapter 12
Ppt chapter 12
difordham5.2K vues
Ppt chapter 11 par difordham
Ppt chapter 11Ppt chapter 11
Ppt chapter 11
difordham4.7K vues
Ppt chapter 10 par difordham
Ppt chapter 10Ppt chapter 10
Ppt chapter 10
difordham5.3K vues
Ppt chapter 9 par difordham
Ppt chapter 9Ppt chapter 9
Ppt chapter 9
difordham3.4K vues
Ppt chapter 8 par difordham
Ppt chapter 8Ppt chapter 8
Ppt chapter 8
difordham6.5K vues
Ppt chapter 6 par difordham
Ppt chapter 6Ppt chapter 6
Ppt chapter 6
difordham2.3K vues
Ppt chapter 5 par difordham
Ppt chapter 5Ppt chapter 5
Ppt chapter 5
difordham3.1K vues
Ppt chapter 4 par difordham
Ppt chapter 4Ppt chapter 4
Ppt chapter 4
difordham2.1K vues
Ppt chapter 3 par difordham
Ppt chapter 3Ppt chapter 3
Ppt chapter 3
difordham2.7K vues
Ppt chapter 2 par difordham
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
difordham4.4K vues
Ppt chapter 1 par difordham
Ppt chapter 1Ppt chapter 1
Ppt chapter 1
difordham8.4K vues
Ch 12 separation agreements 2ed par difordham
Ch 12 separation agreements 2edCh 12 separation agreements 2ed
Ch 12 separation agreements 2ed
difordham2.1K vues
Ch 14 adoption 2ed par difordham
Ch 14 adoption 2edCh 14 adoption 2ed
Ch 14 adoption 2ed
difordham522 vues
Ch 13 family violence par difordham
Ch 13 family violenceCh 13 family violence
Ch 13 family violence
difordham3.2K vues

White7e ppt ch03

  • 1. Jonathan R. White www.cengage.com/cj/white Chapter 3: Not Random Violence: Modeling, Structuring and Financing Terrorism Rosemary Arway Hodges University
  • 2. Models of Terrorism  Models of terrorism: o Rural: ▪ Guerilla warfare (Cuban Revolution, Che Guevara Revolution) ▪ Revolution starts with poor peasants that organize into isolated groups, which form guerilla columns, and finally organize into army o Urban ▪ Fanon: mental illness was a result imperialism, colonized nations practice terrorism against colonial masters ▪ Marighella: the basis of revolution is guerilla and unorganized violence → governmental repression → massive uprising in response to oppression → toppling of government o Insurrection ▪ Marighella
  • 3. An American Understanding of Insurgency  Re-evaluation of American strategy: o Viet Nam experience (averse to enter a war without clear objectives) o Insurgencies represent a new mix of operations and tactics that become possible with the advance of technology and globalization. o It is impossible to fight insurgencies with military tactics: ▪ Insurgences control information. ▪ Insurgences operate with global communication. ▪ Insurgences incorporate technological weapons. ▪ Insurgences require few personnel.
  • 4. An American Understanding of Insurgency  Counter-insurgency forces need to be massive because: o they must enforce laws o they also must form a partnership with a host of other agencies o they must develop networks of organizations  Security forces must follow the model of community policing  Insurgencies developed at the end of the Cold War as various tribal, national, ethnic and religious groups  Insurgencies depend upon social and support networks
  • 5. Changing Dynamics and Structures  After WW II, terrorist groups tended to follow the IRA model of small units or cells. o Cells are the basic units of traditional terrorist organizations. o Each cell has its own mission and operates without knowledge of other cells in the area.  Burton: o Two basic structure of terrorist subunits: ▪ Cells – specialized with 4 to 6 people; may be tactical or intelligence. ▪ Columns – created from groups of cells; semiautonomous conglomeration of cells with a variety of specialties with a single command structure.
  • 6. Changing Dynamics and Structures  Around the 1990s large terrorist groups developed more dynamic methods of organization. o Fraser and Fulton: ▪ Groups employ variations of command and control structures ▪ Typical organization is arranged in a pyramid ▪ Hierarchical structure of terrorists groups is divided into four levels: • Top level is the smallest level and is responsible for command. • Second level is the active cadre • Third level, second largest and most important, is the active supporters. • Fourth level, largest category is the organization’s passive supporters.
  • 7. Umbrella Organizations and Modern Piracy  Legitimate groups form umbrellas under which terrorist groups could operate. o Several small pyramids gather under a sheltering group that: ▪ manages supplies ▪ obtains resources ▪ creates support structures ▪ gathers intelligence  Terrorist action on the High Seas o A seemingly legitimate business (sheltering organization) provides cover for pirates (the pyramid organization) while denying all connection with illegal activity.
  • 8. Virtual, Chain, and Hub Organization  RAND Corporation identifies several other types of new organizational styles. o Virtual organizations: created through computer and information networks o Chain organizations: small groups linked by some type of communications o Hub organization: centralized group with semiautonomous groups supported in other regions
  • 9. Managing Terrorist Organization  Terrorists need to organize like any other group: o Groups require management o Hierarchical groups use cell structure and top-down management o Small groups in networks are more autonomous o Management and other administrative functions are hampered by the need for secrecy
  • 10. Managing Terrorist Organization  Terrorist groups experience special organizational problems: o Secrecy o Decentralization o Training o Internal discipline o Gaining immediate tactical support for operations
  • 11. Group Size and Campaign Length  Gurr: o Group size: ▪ Most terrorist actions involve only a few people. ▪ Large groups or networks are more effective than smaller ones. ▪ Majority of successful groups embrace doctrines such as nationalism. o Campaign Length: ▪ Terrorism is short-lived. ▪ Most terrorist campaigns end within 18 months of the initial outburst of violence.
  • 12. Group Size and Campaign Length  Implications of Gurr Analysis: o Most terrorist organization are small, short-lived operations which are law enforcement problems. o If terrorism is a result of popular social issue, sympathizers can enhance the power of the group. o Strong support for a group is more important than the actual number of operatives.
  • 13. Group Size and Campaign Length  Hewitt reflects Gurr’s position: o Small groups do not have resources to damage an opponent over an extended length of time. o Terrorist campaigns are more important than isolated acts of terrorism. o Terrorist campaigns demand expanded political responses. o Large terrorist organizations accounted for the majority of the terrorism. o Large terrorist organizations can bring change in government politics.
  • 14. Group Size and Campaign Length  Analyst Livingstone describes terrorism as “warfare on the cheap.” o State Sponsorship ▪ Nation could support a terrorist group (Hezbollah) ▪ State support automatically creates a large group  Scheuer o If state sponsorship and failed state approaches are applied to Islamic militants, it will be impossible to understands both the organization’s characteristics and growth of al Qaida and related groups.
  • 15. Financing Modern Terrorism  It takes money to fund organizations, and resources to support operations.  Adams: o The appropriate method of attacking terrorism will be stopping of the flow of money. o A terrorist operation does not cost a lot of money. o The overall budget for a terrorist operation is quite high.  The financial investigative debate: o Major counterterrorism strategies should be aimed at waging “financial warfare” with financial weapons. o The National Strategy for Combating terrorism endorses this approach by targeting two areas: ▪ The source of financing ▪ Mechanism use to transfer money
  • 16. Importance of Financing  Effective counterterrorist policy involves strategic efforts to deny fiscal resources to terrorists.  Arguments are made, favorable and unfavorable, concerning the use of finances as a weapon. o Financial strategy against terrorism will reduce violence. o Working in an underground economy, terrorists are immune from formal government sanctions.
  • 17. Importance of Financing  Critique: o Financial warfare will not be effective because terrorists do not respond to formal controls, but participate in undergrad economies. o It is relatively easy for terrorist groups to hide their assets. o However, targeting flow of money may lead to important discoveries about terrorist groups and plans.
  • 18. Underground Networks and Organized Crime  Three major categories: o The unlawful raising of funds ▪ Robbery, Fraud, Larceny, Smuggling, Dealing in contraband, Forgery, Counterfeiting, Identity theft, Extortion and protection rackets o The unlawful distribution of funds o The formal regulated economy o Economic targeting as force multiplier  Terrorists raise funds through traditional criminal methods and exchange resources in underground networks. o The differentiating factor between terrorism and traditional crime is motivation.
  • 19. Underground Networks and Organized Crime  Terrorists around the world use a variety of criminal methods to raise funds. o Middle Eastern terrorists engage in smuggling and document fraud. o Central Asian terrorists trade illegal arms, launder money, and distribute drugs. o Latin American terrorism is tied to drug production and public corruption. o U.S. domestic terrorists engage in fraud schemes and robberies. ▪ International terrorists also engage in fraudulent activities in America.
  • 20. Underground Networks and Organized Crime  Underground networks exists not only in the dimension terrorists/criminals, but also terrorists/terrorists, and terrorists/criminals/terrorists.  International linkages – the nexus of criminal syndicates – that exists between various terrorists group were best demonstrated in the case of the Japanese Red Army group in 1972: o The unit (Rengo Segikun) composed of Japanese citizens… o that have been trained in North Korea… o picked up funds in West Germany… o for further training in both Syria and Lebanon… o picked up its arms and ammunition in Italy… o and then attacked the Lod Airport in Israel on behalf of the Popular Front for the Liberation of Palestine.
  • 21. Legal sources of Funding  In addition to traditional crime, terrorists raise money through legal operations.  Frequently employed legal activities include: o Soliciting contributions o Operating businesses o Creating charities o Running non-government organizations o Using wire transfers o Forming or using banks o The Hawala system
  • 22. Legal sources of Funding: Charities  Terrorists set up phony charities or skim proceeds from legitimate organizations.  Charities are difficult to investigate o Formed overseas o State supported o May hide true purpose o Supported by legitimate business o Difficult to infiltrate ▪ Benevolence International Fund ▪ Formed in U.S. & received tax-exempt status from IRS
  • 23. Non-traceable Funding: Hawala System  Hawala system is a legitimate means of transferring money without using money. o Originated in China o Based on long term trust relationships and knowledge that each dealer is reliable for all debts.  Advantages of the Hawala system: o Money moves with no record. o Money crosses international borders with ease. o Money can be easily bartered for contraband. o Tax records do not exist.
  • 24. The Political Economy of Terrorism  Globalization: o Napoleoni states that globalization created pockets in the world where failed states are left to govern with little economic and political power. ▪ Terrorist groups grow in such places. ▪ Terrorist group acts like a government in such a places.  Terrorist organizations are strong enough to resist the state and grow running their own underground economies.
  • 25. Macroeconomic Theories  Counterterrorism policies should be aimed at providing the world’s populace with economic stability, opportunity, and participation in the mainstream economy.  Economic policies to counter terrorism: o Supporting states in threat of failure. o Providing opportunities for people to participate and benefit from economic systems. o Eliminating underground economic networks.
  • 26. The Narco-terrorism Debate  Idea of narco-terrorism is a controversial term linking drugs to terrorism in one of two ways: o Drug profits are used to finance terrorism. o Drug gangs use terrorism to control production and distribution networks.  Proponents: o Terrorists use drugs to finance operations.  Opponents: o Narco-terrorism is a convenient term for appealing to public emotions, which gives governments more power. o Use of the word narco-terrorism is an attempt to take political advantage of the fear of terrorism.