Module 7: Transnational Terrorism

Overview

Terrorism has become a mainstay of western politics and media since September 11th, 2001. The events on that day reshaped western consciousness, moving terrorism from something that happens ‘over there’ to something that threatens to us ‘over here’.

9/11 precipitated the American/NATO invasion of Afghanistan, the American invasion of Iraq, the Global War on Terrorism, and the rise to prominence of global transnational terrorist organizations such as al Qaeda, ISIS, Boko Haram, and al-Shabaab. These groups have either planned or inspired terror attacks in the West, ranging from globally transformative events like the 9/11 attacks, to the smaller, but seemingly unpreventable, car attacks that have hit urban centers 12 times between 2006 and 2017. However, this is a very narrow and somewhat ‘orientalist’ view of terrorism. In a pure quantitative frame, the vast majority of those injured or killed by terrorist attacks live outside the West. According to the Global Terrorism Database (GTD) at the University of Maryland, terrorist acts in Iraq and Afghanistan, just two countries, by far account for more than half of all deaths and injuries in 2016. Yet this side of terrorism is not widely reported in the West and it runs counter to the orientalist narrative of the terrorist threat emerging from the barbarian ‘other’ against the civilized west. Part of the problem in understanding the concept of terrorism is defining it. There is neither an agreed academic/legal definition of what terrorism is nor what constitutes a terrorist. For example, the GTD defines terrorism as "the threatened or actual use of illegal force and violence by a non-state actor to attain a political, economic, religious, or social goal through fear, coercion, or intimidation." This is a useful definition, but it also excludes certain acts. For example, is the threatened or actual use of illegal force and violence by a state to attain a political, economic, religious, or social goal through fear, coercion, or intimidation, still terrorism? This is a relevant question when looking at the illegal use of violence by states against non-combatants outside their borders. Some argue that such state action is covered by the laws of war; others argue this simply legitimates such state behaviour. What is not contested is that terrorism, by whatever definition you employ, now lies at the heart of international politics. Importantly for this module is the word international politics. Early forms of terrorism were largely contained within particular states. Contemporary terrorism has become increasingly transnational. Terrorist groups have utilized the technologies of globalization to build global networks that reach out to global audiences, and carry out or inspire attacks globally. This module will take a brief look at the history of terrorism, its contemporary transnational character, and efforts to combat it.

Objectives

When you have finished this module, you should be able to do the following:

  1. Explain the shifting character of terrorism
  2. Define the contemporary transnational character of terrorism
  3. Evaluate contemporary efforts to combat transnational terrorism

Module Instructions

  1. Read McGlinchey, Chapter 14.
  2. Take the CS Monitor quiz https://www.csmonitor.com/World/Global-Issues/2012/0719/How-much-do-you-know-about-terrorism-Take-the-quiz/Question-1
  3. Complete Learning Activity #1
  4. Watch part one of the Aljazeera video “Head to Head – Terrorists or Freedom fighters?” https://youtu.be/PldJpINaTS0
  5. Complete Learning Activity #2
  6. Watch the Tedx Video ‘Inside the mind of a former radical jihadist | Manwar Ali’ https://youtu.be/zwpiI18TBdE
  7. Complete Learning Activity #3

Key Terms and Concepts

  • Al-Shabaab
  • al Qaeda
  • Anti-Americanism
  • Ayatollah Ruhollah Khomeini
  • Boko Haram
  • Coordination
  • Diasporas
  • Fifth wave terrorism
  • Fourth wave terrorism
  • First wave of terrorism
  • Global Terrorism Database (GTD)
  • Global War on Terrorism
  • Guerilla tactics
  • ISIS
  • League of Nations mandate system
  • ‘Lone wolf’ attacks
  • Messaging
  • Mobility
  • National liberation movements
  • Palestinian Liberation Organization (PLO)
  • Propaganda
  • Proxy wars
  • Reign of Terror
  • Second wave terrorism
  • Soft targets
  • Terrorism
  • Third wave terrorism
  • Viet Cong
  • YODO

Required Readings

  1. McGlinchey, Chapter fourteen, “Transnational Terrorism.” In International Relations, edited by Stephen McGlinchey, 152-162. Bristol: E-International Relations Publishing, 2017.


 

Learning Material

Introduction
What is terrorism? Who is a terrorist? What is transnational terrorism? These are questions that have no definitive answer. Yet terrorism is an everyday reality for many, with indiscriminate violence an ever-present danger. Due to the increasing transnational character of terrorism, it has become a psychological fear for many more who live in places considered relatively equitable and peaceful like Ottawa or Stockholm.

Figure 7-1: Source: http://www.cbc.ca/news/canada/british-columbia/michael-zehaf-bibeau-ottawa-gunman-asked-b-c-judge-to-send-him-to-jail-1.2810683 Permission: Courtesy of CBC Licensing.

Figure 7-2: “Stockholm” Source: https://commons.wikimedia.org/wiki/File%3AAttentatet_i_Stockholm_2017-8.jpg Permission: CC BY-SA 4.0 Courtesy of Frankie Fouganthin.

This transnational scope has made contemporary terrorism a core global issue. As a concept, terrorism was introduced into western discourse by the Reign of Terror during the French Revolution. The ruling government consciously chose to use terror as the means to achieve the ends of the revolution. Contemporary terrorism on the other hand is most often perceived as the use of violence by non-state actors to achieve ideological or political ends.

Figure 7-3: https://commons.wikimedia.org/wiki/File%3ALa_fourn%C3%A9e_des_Girondins_10-11-1793.jpg Permission: Public Domain.

The actors in these two examples are different but they both see the ends as justifying the means. Contemporary means are the use of violence, often indiscriminate and against non-combatants. Contemporary ends are often ideological or political. Examples of such ends include the ideological goals of white supremacy or the political goal of national liberation movements in Ireland or Algeria. Since the 1980s, and specifically the attacks against American military installations in the Middle East, religion has often been cited as a motivation for terrorism. However, this is contested by the question: does religion motivate terrorism or is it used to legitimate terrorism and recruit terrorists? On one side, there is the argument that groups like ISIS are seeking religious ends, such as hastening the apocalypse. On the other side, there is the argument that groups such as ISIS, as well as al Qaeda or the Taliban, are actually seeking political ends such as establishing a theocracy or opposing perceived Western imperialism. Regardless of whether the most recent acts of terror are motivated by or legitimated by religion, it has increasingly become transnational. Terrorist groups are no longer contained by state borders. Their support base is increasingly global as is their recruitment strategies. Terrorist attacks are increasingly carried out at the global level, for global audiences, and often with global goals. In order to make sense of contemporary transnational terrorism, we will first look at Rapoport’s waves of terrorism argument. This is a useful exercise as Rapoport breaks modern terrorism into its different forms. We will then look at contemporary terrorist activity, specifically focusing on its transnational character. Importantly, we will look at how the processes of globalization have facilitated this. Finally, we will look at the opportunities and challenges of combatting transnational terrorism.

Learning Activity 7.1

  1. Before moving on, let us assess your knowledge of terrorism. Take the “How much do you know about terrorism?” quiz found https://www.csmonitor.com/World/Global-Issues/2012/0719/How-much-do-you-know-about-terrorism-Take-the-quiz/Question-1
  2. Post your score on the Poll below. Your answer will rain anonymous.

[yop_poll id=”7″]

Evolution of Modern Terrorism
The events of 9/11 brought the reality of transnational terrorism to the forefront of the American consciousness. This has had significant consequences as seen in the wars in Afghanistan, Iraq, and subsequent instability that has led to the rise of groups like ISIS.

Figure 7-4: “Twin Towers 9/11” Source: https://commons.wikimedia.org/wiki/File%3ANorth_face_south_tower_after_plane_strike_9-11.jpg Permission:  CC BY-SA 2.0 Courtesy of Robert on Flickr.

Figure 7-5: “Afghanistan” Source: https://commons.wikimedia.org/wiki/File:US_10th_Mountain_Division_soldiers_in_Afghanistan.jpg PermissionL Public Domain.

Figure 7-6: “Iraq” Source: https://commons.wikimedia.org/wiki/File%3AMarines_in_Saddams_palace_DM-SD-04-12222.jpg Permission: Public Domain. Courtesy of  Courtesy of Lance Corporal Kevin C. Quihuis Jr. (USMC).

However, terrorism as a concept has a long and chequered history. Terrorism entered the discourse of Western politics with the Reign of Terror in revolutionary France circa 1793-1794. During this period, over 200,000 citizens were detained, many of whom perished awaiting trial, and approximately 17,000 death sentences were handed down.

Figure 7-7: “Robespierre” Source: https://commons.wikimedia.org/wiki/File:Robespierre_crop.jpg Permission: Public Domain.

Robespierre, a leading figure in both the Jacobin Club and the First Republic of France, argued:

If the basis of popular government in peacetime is virtue, the basis of popular government during a revolution is both virtue and terror; virtue, without which terror is baneful; terror, without which virtue is powerless. Terror is nothing more than speedy, severe and inflexible justice; it is thus an emanation of virtue; it is less a principle in itself, than a consequence of the general principle of democracy, applied to the most pressing needs of the patrie.

In other words, Robespierre was arguing Le Terreur was carried out by the state in order to defend the revolution from those who threatened it. This made it a necessity and, in attaining the goals of the revolution, a virtue. However, the contemporary concept of terrorism is usually identified as a form of asymmetrical conflict, where smaller non-state actors strike larger more capable state adversaries, often through soft targets. Soft targets are vulnerable and largely undefended sites, often where a large number of civilians congregate. Striking such targets promotes fear in the population: fear that it could be your subway car or bike path or shopping mall that could be the next target. The goal of such attacks is to generate such fear in the body politic and to put pressure on government to change policy.

Rapoport (2004) identifies four waves of terrorism. To this a fifth wave has been suggested by a variety of scholars. Looking at these waves is instructive, as it differentiates between the form and function of modern terrorism. Rapoport identifies two necessary conditions for each wave of terrorism. First, there needs to be extreme discontent with the current social order. Second, an event, or trigger, that provides inspiration by demonstrating the possibility of challenging the social order. The first wave of terrorism was pursued by the Anarchist movement circa the 1880s through the 1920s. Anarchists sought to abolish organized government and replace it with a cooperative social structure. It emerged from the discontent of the industrial working classes. The most extreme anarchists used bombings and political assassinations to pursue their goals, including: the 1893 bombing of the Liceu Opera House in Barcelona by anarchist Santiago Salvador; the 1894 assassination of French President Marie François Sadi Carnot by the Italian anarchist Sante Geronimo Caserio;  the 1894 bombing of the Greenwich Observatory by French anarchist Martial Bourdin; and the 1901 assassination of American President William McKinley by American anarchist and former steel worker Leon Czolgosz. However, the trigger for anarchist terrorism was events in Russia that began in 1878 with an attack on the Russian Police Commander by Vera Zasulich and culminated in the 1881 assassination of Tsar Alexander II by members of the ‘People’s Will’. This was not the first attempt on the Tsar who had been targeted due to the perception that he his reform agenda was too slow or inadequate. The Tsar had promised broad reform to Russian society, including the emancipation of Russian serfs, more socially equitable conscription laws, reform of the judicial system, and a degree of devolution to local governments.

Figure 7-8: “Vera Zasulich” Source: https://commons.wikimedia.org/wiki/File:Zasulich-vera.jpg Permissioon: Public Domain.

Figure 7-9: “Tsar Alexander II” Source: https://commons.wikimedia.org/wiki/File%3AAlexander_II_of_Russia_photo.jpg Permission: Public Domain. Courtesy of Неизвстен.

Figure 7-10: “The assassination of Alexander II of Russia 1881” Source: https://commons.wikimedia.org/wiki/File:Attentat_mortal_Alexander_II_(1881).jpg#/media/File:Attentat_mortal_Alexander_II_(1881).jpg Permission: Public Domain.

The Russian case acted as a trigger because it demonstrated the possibility of success in the immediate goal of assassination albeit it less successful in the long term goal of social change. An important facilitator of anarchist terrorism was the emergence of international telecommunication technology, which was used to spread the ideas and successes of Russian anarchists throughout Europe. A significant consequence of anarchist terrorism was the disproportionate response of world governments who saw an international conspiracy that did not really exist. This led to a debate on security versus civil freedoms liberties, tighter control of borders, and greater international cooperation on policing, including the creation of what today is called Interpol in 1914. Some of this might sound familiar if we contrast it with Bill C51 in Canada, the Patriot Act/Homeland Security Act in the US, or the Anti-terrorism, Crime, and Security Act in the UK.

Second wave terrorism was anti-colonial in nature and often took the form of national liberation movements. At the end of the First World War, many European colonies felt there was a window of opportunity for national independence as the empires of the central powers were dismantled. This triggered agitation against colonial powers. However, such hopes were for naught as control of the colonies was transferred through the League of Nations mandate system.

Figure 7-11: “World empires and colonies around World War I” By: Source: https://commons.wikimedia.org/wiki/File%3AWorld_empires_and_colonies_around_World_War_I.png Permission: CC-BY-SA-3.0 Courtesy of Ishvara7.

There was some agitation and violence in the interwar years, notably by the Irish Republican Army but the full onset of second wave terrorism wouldn’t occur until after the Second World War. These anti-colonial terrorists framed themselves as freedom fighters, using the means at their disposal to seek their independence in places like Ireland, Cyprus, and Algeria.

Figure 7-12: “Ireland” Source: https://commons.wikimedia.org/wiki/File:NIrelandDerryFreeJM.jpg Permission: CC BY-SA 3.0 Courtesy of Guinnog.

Figure 7-13: “French Soldiers in Algiers” https://commons.wikimedia.org/wiki/File%3A10e_Division_parachutiste_(Bataille_d’Alger-1957).jpg Permission: Public Domain. Courtesy of Saber68.

Important developments in this second wave included the importance of diasporas for raising money and awareness, the role of the Great Powers in providing support and enabling proxy wars, and the utilization of guerilla tactics which targeted institutions of colonial power. Importantly, the anti-colonial nature of these movements provided a degree of legitimacy to the concept of terrorism. By adopting the concept of freedom fighters, these organizations and movements tapped into the narrative of people seeking freedom from tyranny.

Third wave terrorism was composed of new left wing movements that rose in reaction to perceptions of American warmongering, especially in the Vietnam War. The Viet Cong’s ability to resist first the French and later the United States was an important trigger event.

Figure 7-14: “VC crossing a river in 1966” Source: https://commons.wikimedia.org/wiki/File%3AViet_Cong002.jpg Permission: Public Domain.

This spawned other groups like the American Weather Underground, the Italian Red Brigades, the Baader-Meinhof Group, and the Palestinian Liberation Organization (PLO). Of particular importance was the PLO and the ongoing conflict with Israel which was seen as being supported by the Americans.

Figure 7-15: “Popular Front for the Liberation of Palestine” Source: https://commons.wikimedia.org/wiki/File%3APFLP-group-1969.jpg Permission: Public Domain. Courtesy of Thomas R. Koeniges.

The Soviet Union played an important role in facilitating these movements and anti-Americanism more generally. These left wing movements consciously utilized communication technology, measuring important victories through television airtime. Airplane hijackings, kidnappings and hostage taking were common as they had strong multimedia appeal. A spectacular example of this was the kidnapping and subsequent conversion of the media heiress Patty Hearst by the Symbionese Liberation Army. These terrorist organizations also began to communicate with each other and at times offer support to each other, most notably the PLO which provided training facilities to other groups. Of particular importance in third wave terrorism was both the increased use of communications technology, the turn towards transnational association and the strong anti-Americanism as a motivational force.

Fourth wave terrorism was constituted by a turn to religion, with the trigger being the 1979 Iranian Revolution. Pre-revolutionary Iran had very close ties to the United States under the leadership of Mohammed Reza Shah and both he and the Iran he envisioned represented a model of westernization in the region. Ayatollah Ruhollah Khomeini, a Shia Muslim religious leader who had been exiled under the Shah, led the revolution and subsequently set Iran up as a theocracy.

Figure 7-16: “1978 Iranian revolution” Source: https://commons.wikimedia.org/wiki/File%3A1978_Iranian_revolution_-_row_of_men_holding_khomeini’s_photos.jpg Permission: Public Domain.

Much like the Viet Cong had done earlier, the Iranian Revolution demonstrated the ability to push back against foreign, and particularly American, regional intervention but this time in the name of religion. This anti-Americanism was made abundantly clear by the storming of the American Embassy in Tehran resulting in 52 Americans being held hostage for 444 days. It was reinforced in 1983 with the suspected attacks by the Iranian funded Hezbollah in Beirut: the American Embassy in Beirut on April 18th killing 63 people, including 17 Americans and the American Marine compound in Beirut Lebanon on October 23rd killing 241 Americans and 58 French peacekeepers.

Figure 7-17: “American Beirut Embassy Bombing” Source: https://commons.wikimedia.org/wiki/File%3ABeirutEmbassyBombing.jpgPermission: Public Domain.

Figure 7-18: “American Beirut Barrack Bombing” Source: https://commons.wikimedia.org/wiki/File%3AMarineBarracksBeirut_23October1983.jpg Permission: Public Domain. Courtesy of SSgt Randy Gaddo, USMC,

In the middle east, America had become the symbol of political repression and cultural impurity. While Rapoport focused almost exclusively on Islam, other scholars have noted the resurgence of religion as a driving force of discontent more broadly. Through the 1980s and 90s, religious terrorism would strike in Japan with Aum Shinrikyo’s nerve gas attack, the assassination of Israeli Prime Minister Yitzak Rabin, the Hebron Mosque massacre, the use of violence by the Tamil Tigers in Sri Lanka, the horrific actions of the Lord’s Resistance Army in Central Africa, Boko Haram in West Africa, and the rise of right wing extremism in the US. All of whom claim religious motivations and use religion to legitimate their terrorist acts.

There is some debate whether the rise of groups like al Qaeda and especially ISIS constitute fifth wave terrorism, defined as truly global terrorism.

Figure 7-19: “Al Qaeda” Source: https://commons.wikimedia.org/wiki/File%3AAl-Qaeda.jpg Permission: CC BY-SA 4.0 Courtesy of Noofa2401.

Figure 7-20: “ISIS” Source: https://commons.wikimedia.org/wiki/File%3AIsis-viceo_2941899c.jpg Permission: CC BY-SA 4.0 Courtesy of Alibaba2k16.

Others argue against this, considering these groups simply a progression of the fourth wave. However, there are some distinct features of contemporary global terrorism that set it apart. The most global form of contemporary terrorism is what has been dubbed ‘global jihad’ or global Islamic terrorism. It arose in reaction to the perceived oppression of Muslims around the world, especially the conflict between the Israelis and Palestinians, unifying the narrative into an ‘us’ versus ‘them’ conflict. This perception of oppression is facilitated by the very extension and intensification of globalization discussed in previous models. The growth of technological and economic interconnection. The spread of western political institutions. The dominant position and exportation of western cultural product. These different facets of globalization are perceived as an attack on the societal and spiritual purity of Islam. The governments of Islamic states are highly suspect to religious fundamentalists who see the adoption of western political practices and participation in western institutions as an affront to spiritual purity. These are seen as secular and western and must be opposed both in their own country and in the western states/institutions that support them via jihad. Jihad, as understood by most Islamic scholars, means struggle or resistance but primarily refers to the personal struggle for spiritual purity. However, it can also be used by extremists as a means to make a claim of ‘just war’ against non-believers. This ‘other’ that is defined as non-believer includes those Muslims who are followers of the opposite Shia/Shi’ite branch or even members of their own branch if declared takfir or excommunicated for not following their fundamentalist version of Islam. This sharp ‘us’ versus ‘them’ narrative combined with holy war enables recruitment of dedicated fighters as well as suicide bombers who are willing to sacrifice their lives in the name of jihad. Counter intuitively, this fight against the west has been facilitated by the western structures and processes of globalization, the topic of the next section.

Learning Activity 7.2

Watch part one of the Aljazeera video “Head to Head – Terrorists or Freedom fighters?”

* Part one runs to 23:27, the rest is worth watching but not required

Use the following questions to write an entry in your journal

  1. How does Martin McGuiness defend the acts of the IRA?
  2. How does the response by Dr. Azzam Tamimi implicate the US?
    • How does Charlie Wolf defend US actions?
  3. How does Dr. Tamimi justify Hamas’ acts?
    • Especially taking innocent lives?
  4. Are there similarities between the IRA and Hamas?
    • What are they and what do they justify?
  5. Why does Mr. Wolf argue this is about power?
    • How does Dr. Tamimi refute this?
  6. According to Professor Louise Richardson, why do people join organizations like the IRA or Hamas?

Globalization of Terrorism
One of the most distinguishing elements of contemporary Islamic terrorism is the degree to which it is connected to globalization.

Figure 7-21: “Terror attacks committed by ISIS as of 1 January 2017” Source: https://commons.wikimedia.org/wiki/File%3AAttacks_by_ISIS.png Permission: CC BY-SA 4.0 Courtesy of  Szabi237.

Figure 7-22: “World map about terrorist attacks of al-Qaeda” Source: https://commons.wikimedia.org/wiki/File%3ATerroristAttacksAlQaeda.png Permission: CC BY-SA 2.0 Courtesy of St.Krekeler.

This can be seen in three distinct areas: messaging, mobility, and coordination. In terms of messaging, traditionally the state has been able to exercise a strong degree of control over the flow of information to the public. They controlled the public broadcasters. They regulated the airways. They could exclude voices that they found objectionable. They were able to demonize the ‘other’ and make their case directly to the people. However, the explosion of communication technology has weakened this state control. More people in more places have more access to the internet which is largely unregulated. The internet provides everyone with the ability to communicate their ideas, to organize across the globe around these ideas, and to possibly act on them.

Figure 7-23: “Internet Connection Rates”  Source: https://commons.wikimedia.org/wiki/File%3AInternet_connection_rate_2000.png Permission: CC BY-SA 2.5 Courtesy of No machine-readable author provided. Yug assumed (based on copyright claims).

Terrorist organizations realize this as well, using new communication media to broadcast their messages, organize around them, and facilitate the use of violence to achieve their ends. Terrorist organizations do so in two primary ways. First, a digital presence allows terrorist organizations to delocalize, creating a digital existence that cannot be attacked with a predator drone or hunted down by a special forces team. This allows these organizations to maintain a sense of continuity even as the leadership might be forced to change or the group may be forced to relocate. They are able to morph and adapt as necessary. The second and perhaps a more transformational impact of new communication technology is the ability to expand the reach of their propaganda. Transnational terrorist organizations have websites with slick video productions and serious money invested in post production. These video messages and websites often go viral, reaching exponentially more people. The global media companies become complicit in the process by reporting on these stories once they go viral. While many people may be disgusted by an ISIS video of beheading in the name of their perverted vision of Islam, for some it will resonate with their sense of persecution. It may encourage some to contribute to the cause financially, to join the cause personally, or to act in the name of the cause where they live. No group has been better at this than ISIS. Two of their media campaigns are instructive. The first example connects joining ISIS to playing the video game ‘call of duty’ but only better because when they ‘die’ they ‘respawn’ in Jannah or the Islamic conception of paradise. The second plays off the term YOLO, ‘You Only Live Once’, by stating ‘YODO’ or ‘You Only Die Once’. The idea is that you only have one life to commit to the cause, so choose your martyrdom carefully. Such propaganda facilitates self-activating terrorists and ‘lone wolf’ attacks which are incredibly hard to detect in advance and are greatly feared by security agencies.

In terms of mobility, the expansion and intensification of global transport technology and networks have not only facilitated the ease of trade and commerce, it has also allowed terrorist organizations to move people, weapons, and illicit goods around the world. Consider the fact that 3.6 billion people flew in 2016, 1.11 billion of them internationally, and that there was more than 34.5 million tonnes of air freight.

Figure 7-24: “Global Airline Route Map” Source: https://commons.wikimedia.org/wiki/File%3AWorld-airline-routemap-2009.png Permission: CC BY-SA 3.0 Courtesy of Jpatokal.

While security has been considerably increased for passenger flights, airplane hijacking was the means by which the 9/11 attackers took down the twin towers in New York and tried to take out the pentagon. However, analysts are currently more focused on container shipping. Comparatively, the amount of goods shipped by container ships far outweighs that of air freight, and is much more difficult to control. In 2015, Shanghai alone processed nearly 36.5 million containers, Los Angeles over 8 million and Vancouver 3 million.

Figure 7-25: “Global commercial shipping routes” Source: https://commons.wikimedia.org/wiki/File%3AShipping_routes_red_black.png Permission: CC BY-SA 3.0 Courtsey of B.S. Halpern (T. Hengl; D. Groll)

This level of economic integration makes meaningful security checks extremely difficult, leaving cracks in the borders of the west that terrorist organizations are able to exploit. Moreover, as seen in module three and four, this economic globalization has been facilitated by political globalization which has made state borders more porous in order to expedite the flow of goods and capital around the world. The most extreme example of this is the European Union, where the border controls in the Schengen area have been removed entirely allowing the free movement of people, goods, and finance.

Figure 7-26: “Schengen states in Blue” Source: https://commons.wikimedia.org/wiki/File%3ASchengenzone.svg Permission: Public Domain. Courtesy of CrazyPlunk.

But is also has allowed the movement of terrorists, guns, and illicit funds. In particular, Western security analysts fear the potential for a terrorist organization like ISIS or al Qaeda to slip a weapon of mass destruction to Europe or the continental US through one of these cracks in state borders.

Figure 7-27: “Peer-to-peer network” Source: https://en.wikipedia.org/wiki/File:Unstructured_peer-to-peer_network_diagram.png Permission: CC0 1.0 Public Domain. Courtesy of  Mesoderm.

Connecting both messaging and mobility is how globalization facilitates coordination of terrorist groups and activities. Cheap and readily accessible cell phones, computers, internet access, and software encryption have been readily adopted by terrorist organizations. It enhances the security of networks, especially virtual networks where it is possible to create digital spaces that require permission to gain entry. In these private digital spaces, it is possible to share propaganda, resources, knowledge and tactics.

As policing of such networks has increased, these terrorist groups have adapted, combining high tech infrastructure with low tech techniques. One method is to use ‘dead letters’, the saving of draft messages in shared email accounts without actually sending anything. Such communication cannot be intercepted because it is never sent. More importantly, this technology has allowed terrorist organizations to coordinate more efficiently. Take for example the ability to coordinate simultaneous attacks against American embassies in Kenya and Tanzania in 1998 or the 2004 commuter train attack in Madrid, or the 2005 tube/bus attack in London.

Figure 7-28: “American Embassy Bombing in Kenya” Source: https://commons.wikimedia.org/wiki/File:Kenya_bombing_1.jpg Permission: Public Domain. Courtesy of FBI.

Figure 7-29: “American Embassy Bombing in Nairobi” Source: https://commons.wikimedia.org/wiki/File:Kenya_bombing_2.jpg Permission: Public Domain. Courtesy of US gov.

Figure 7-30: “London Bombing” Source: https://commons.wikimedia.org/wiki/File:Headlines_london_bombing_7_july_2005_Waterloo_station.JPG Permission: CC BY-SA 3.0 Courtesy of Ellywa.

The ability to communicate globally allows such mission coordination but it also allows a decentralised network to operate. This was demonstrated by the ability of al Qaeda to continue to operate after losing the protection of the Taliban in 2001. Instead of having a fixed physical location that is vulnerable to counter-terrorist operations, transnational terrorist organizations are increasingly decentralized. Important features of these decentralized networks are the formation of individual cells and the digital network they are plugged into. Individuals who are either self-activated or directed by the central hierarchy, recruit membership forming quasi independent cells with little meaningful intelligence on the central coordinating body. However, coordination between these cells are maintained via the digital network which can adapt or cut off membership if compromised without endangering the central body. This has necessitated the need for counter-terrorism to adapt accordingly.

Learning Activity 7.3

Watch the Tedx Video ‘Inside the mind of a former radical jihadist | Manwar Ali’

Use the following questions to write an entry in your journal

  1. How was Manwar Ali radicalized?
  2. What contested meanings of jihad does he introduce?
  3. What made him question violent jihadism?
  4. What does he see as the motivations behind Islamic jihadism?
  5. How does now define his jihad?
  6. How does the position of Mawar Ali compare to that of Martin McGuiness in Learning Activity 7.2?

Combatting Terrorism
On the face of it, counter terrorism is simple: prevent immediate threats, destroy terrorists abroad, prevent radicalization at home, and support stable democratic states abroad to deny them bases from which to organize. However, in practice this is not so simple. The prevention of immediate threats has been complicated by the decentralized cell structure and digital networks that are more difficult to penetrate. The use of draconian legislation that restricts civil liberties in the name of security tend to lose efficacy over time and may actually increase radicalization by individuals and groups who believe they are being unfairly targeted. The same logic applies to the overt surveillance or infiltration of suspect groups. These efforts may counter intuitively result in the self-activated terrorist or ‘lone wolf’ terrorist, the most difficult to identify and prevent from carrying out an attack. Destroying the terrorists abroad is also devilishly difficult and extremely expensive as the US can attest with its 2001-2014 war in Afghanistan which cost an estimated 4 to 6 trillion dollars. The fact that there is a 2 trillion-dollar estimate gap is in and of itself telling.

Figure 7-31: “RAF Reaper MQ-9 Remotely Piloted Air System” Source: https://www.flickr.com/photos/defenceimages/5755016315/ Permission: CC BY-NC 2.0 Courtesy of  Defence Images.

The use of remote technology such as predator or reaper drones is also problematic. While avoiding the risk to military personnel and achieving significant cost savings, the use of drones in Pakistan and Yemen has been likened to state terrorism. For those on the receiving end of a drone strike, the day is peaceful and then the air is full of bombs. Such faceless violence does little to win hearts and minds and may again increase terrorist recruitment.

This tit-for-tat is the basis for the Global War on Terrorism which cannot be won. How do you beat an idea? But it does give the state a powerful rationale for the curtailing of liberties and the extraordinary consolidation of powers. Preventing radicalization at home presents a new set of problems. There is blatant state hypocrisy when minority groups are targeted for surveillance/infiltration and then asked to cooperate with authorities to stop future terrorist attacks; there is an implied blame involved in this interaction. This wariness extends to the general population, who treat identified visible minorities as suspect, only increasing alienation and perceptions of persecution which are key motivators for radicalization. Supporting stable and democratic states abroad is notoriously difficult. Besides the full scale occupation of Germany and Japan at the end of the Second World War, there has been little success in nation building with Iraq being the most recent example of a troubled process and outcome. Moreover, it requires a significant financial and time commitment if there is going to be a self-sustaining stable state in place when the occupiers leave. Without full occupation, it is possible to support states in maintaining stability and order but this often entails supporting states with questionable legitimacy and at times outright authoritarian tendencies. Such authoritarian states are viewed by domestic opponents of being puppets of the West which in term breeds resentment against not only the local state in question but also against the west more broadly. In sum, combatting terrorism is difficult. However, not combating terrorism is potentially catastrophic as was seen with the al Qaeda attack on the twin towers. A tricky balance needs to be found between stopping terrorist attacks without creating more resentment and alienation that produce a receptive audience for the recruitment and radicalization of a new generation of terrorists at home and abroad.

Conclusion

Since 9/11 terrorism has become a core concern for Western states. That is not to say terrorism is new or that it has not been a concern in many other places for much longer. As we have seen the idea of terrorism as a means to achieve political and ideological ends entered western discourse with the French Revolution. But the current form of Islamic transnational terrorism is seemingly different than those that came before it. It is less localized and carries out attacks globally. While abhorring the ramifications of globalization on traditional society, it uses the process of globalization to organize itself. This is evident in the new digital spaces created, the recruitment of members both at home and abroad, the propaganda used to raise finances, and how the requisite people, material, and funds are moved around the world to carry out its attacks. Combatting this form of terrorism is difficult with too coercive a path leading to the new generations of terrorist organizations and too passive a path leading to larger and/or more frequent attacks. There is no clear path ahead but rather it is a process that requires critical thought and the ability to adjust the course when needed. Unfortunately, this has not been the traditional strength of the state.

Review Questions and Answers

1. What is fifth wave terrorism?
Fifth wave terrorism is argued to be the current wave of global terrorism, often with a radical quest of purity (whether tribal, racial, ecological, etc.), and a hybridization between terrorist groups and transnational organized crime groups. However, the dominant form of the fifth wave is transnational Islamic terrorism. It is differentiated from past forms of terrorism both by its use and co-option of the process of globalization and by the degree of its transnational nature

2. What is a ‘lone wolf’ attach and why is it significant?
‘Lone wolf’ attacks are perpetrated by actors who prepare and commit violent acts alone, outside of any command structure and without material assistance from any group. They are significant as they are an increasing part of fifth wave terrorist tactics. They are self-activated via the propaganda of groups like ISIS or al Qaeda, who then claim credit for their deeds once carried out. They are extremely hard to predict and to prevent.

3. How is the French Revolution relevant to the study of contemporary terrorism?
Terrorism entered the discourse of Western politics with the Reign of Terror in revolutionary France circa 1793-1794. During this period, over 200,000 citizens were detained, many of whom perished awaiting trial, and approximately 17,000 death sentences were handed down. Robespierre argued terrorism was carried out by the state in order to defend the revolution from those who threatened it. This made it a necessity and, in attaining the goals of the revolution, a virtue. It is connected to contemporary terrorism by its logic of the ends justifying the means.

What is YODO?
The acronym YODO stands for You Only Die Once. It is a play of the phrase YOLO, You Only Live Once. YOLO is meant to inspire people to make the most of life, enjoy it to the fullest. YODO is meant to glamourize martyrdom and make suicide bombing seem more meaningful. It is indicative of the slick marketing of fifth wave terrorist groups like ISIS who utilize new communication media to reach out for funding and new membership.

Why was the 1979 Iranian Revolution significant?
The 1979 Iranian Revolution triggered fourth wave terrorism constituted by a turn to religion. Pre-revolutionary Iran had very close ties to the United States under the leadership of Mohammed Reza Shah and both he and the Iran he envisioned represented a model of westernization in the region. Ayatollah Ruhollah Khomeini, a Shia Muslim religious leader who had been exiled under the Shah, led the revolution and subsequently set Iran up as a theocracy. Much like the Viet Cong had done earlier, the Iranian Revolution demonstrated the ability to push back against foreign, and particularly American, regional intervention but this time in the name of religion.

Glossary

Al-Shabaab: means “The Youth” in Arabic, al-Shabaab is a Somalia-based militant Islamist group aligned with al Qaeda that started with the goal of toppling Somalia's U.N.-backed Transitional Federal Government and imposing Islamic law

al Qaeda: a radical Sunni Muslim organization dedicated to the elimination of a Western presence in Arab countries and militantly opposed to Western foreign policy, founded by Osama bin Laden in 1988; means “the base” in Arabic

Anti-Americanism: opposition or hostility to the people or policies of the United States

Ayatollah Ruhollah Khomeini: 1900–89, Iranian Shiite Muslim religious and political leader. Following the overthrow of the shah of Iran (1979) he returned from exile and instituted an Islamic republic. His rule saw deteriorating relations with the West and war (1980–88) with Iraq

Boko Haram:  a branch of the Islamic State of Iraq and the Levant. It has been active in Northern Nigeria since 2009 and wants to impose Islamic law as the only law in Nigeria; means “Western education is a sin”

Coordination: the organization of the different elements of a complex body or activity so as to enable them to work together effectively; for terrorism the internet has allowed for increased coordination as a means of organizing people with similar view points from across the globe

Container shipping: shipping re-sealable transportation boxes for unitized freight handling, often by ground, air, or sea

‘Dead letters’: saving drafts of emails in shared third-party email accounts, without every sending the message which could be intercepted

Diasporas: the settling of scattered colonies outside their homeland, or the spreading of people from one original country to other countries

Drones: an unmanned aircraft or ship guided by remote control or onboard computers

Fifth wave terrorism: thought to be the current wave, global terrorism, often with a radical quest of purity (whether tribal, racial, ecological, etc.), and a hybridization between terrorist groups and transnational organized crime group

Fourth wave terrorism: also known as the “Religious Wave,” began out of the 1979 Iranian Revolution 

First wave of terrorism: known as the “Anarchist Wave,” this appeared in the 1880s out of doctrine and technology, and lasted until the Versailles Peace Treaty at the end of the First World War

Global Terrorism Database (GTD): an open-source database with information on terrorist events around the world from 1970 through 2016, includes data on domestic as well as transnational and international terrorist incidents that have occurred during this time period and now includes more than 170,000 cases. For each GTD incident, information is available on the date and location of the incident, the weapons used and nature of the target, the number of casualties, and--when identifiable--the group or individual responsible

Global War on Terrorism: the international military campaign launched by the US government following the September 11, 2001 terror attacks  

Guerilla tactics: irregular warfare that uses a small group of combatants, with tactics that include ambushes, sabotage, hit-and-run tactics, raids, and petty warfare

Hearts and minds: refers to emotional and intellectual support or commitment

ISIS: the Islamic State in Iraq and Syria, an extremist militant group that rules by Wahhabi/Salafi law; also known as Daesh in Arabic

Just war’: just war theory specifies conditions for whether it is just to go to war and the conditions for how a war should be fought

League of Nations mandate system: established by the treaties ending the First World War, the mandate system was a compromise where the victors were given responsibility for governing the former German and Turkish colonies

‘Lone wolf’ attacks: attacks from a lone actor, who prepares and commits violent acts alone, outside of any command structure and without material assistance from any group

Messaging: the system or process of sending communications in writing, in speech, by signals, or online; the point, moral, or meaning of a gesture, picture, or text.

Mobility: the increase global transportation and global technology has greatly increase the ability to move physically and digitally around the world

National liberation movements: movements that arise in developing nations to expel colonialist powers, often by means of guerrilla warfare

Palestinian Liberation Organization (PLO): a political and military organization formed in 1964 to unite various Palestinian Arab groups and ultimately to bring about an independent state of Palestine. It was led by Yasser Arafat from 1968 until 2004.

Propaganda: information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view

Proxy wars: a war instigated by a major power that does not itself become involved

Reign of Terror: a period of the French Revolution, from September 1793 to July 1794, that was marked by violence and killing, including a wave of executions

Second wave terrorism: followed the Anarchist wave, beginning with the First World War, characterized by anti-colonial, national liberation movements, characterized by the terrorist/freedom fighter analogy

Soft targets: a person that is relatively unprotected or vulnerable to attack

State terrorism: acts of terrorism conducted by a state against foreign targets or against its own people

Terrorism: the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims; the systematic use of terror especially as a means of coercion

Third wave terrorism: emerged in the mid-1960s as a response to the Vietnam War, characterized as An-Americanism, out of communications technology, opposition to war, “New Left” wave

Viet Cong: communist guerrilla movement in Vietnam that fought the South Vietnamese government forces 1954–75 with the support of the North Vietnamese army and opposed the South Vietnamese and US forces in the Vietnam War

Virtual networks: technology that facilitates the control of one or more remotely located computers or servers over the

YODO: “You only die once,” a phrase made popular by ISIS; a play on the phrase “you only live once” or YOLO

References

Caroline Joan S. Picart. "“Jihad Cool/Jihad Chic”: The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose (Jihad Jane)." Societies 5, no. 2 (2015): 354-83.

CNN Library. “Beirut Marine Barracks Bombing Fast Facts.” 18 October 2017. Accessed November 6, 2017 http://www.cnn.com/2013/06/13/world/meast/beirut-marine-barracks-bombing-fast-facts/index.html

CNN Library. “Terrorist Attacks by Vehicle Fast Facts.” 6 November 2017. Accessed November 6, 2017  http://www.cnn.com/2017/05/03/world/terrorist-attacks-by-vehicle-fast-facts/index.html

Dodd, Vikram. “’Lone Wolf’ Terror Attacks Hard to Stop, Says Security Expert.” The Guardian.  6 December 2015. Accessed November 6, 2017 https://www.theguardian.com/uk-news/2015/dec/06/lone-wolf-terror-attacks-impossible-to-stop-says-security-expert

Gol, Ayla. “The War on Terror and the Rise of Neo-Orientalism in the 21st Century.” 18 March 2010. Accessed November 5, 2017 http://www.e-ir.info/2010/03/18/the-war-on-terror-and-the-rise-of-neo-orientalism-in-the-21st-century/

Gregg, Heather S. “Defining and Distinguishing Secular and Religious Terrorism.” Perspectives on Terrorism 8 (no.2), 2014. Accessed November 5, 2017 www.terrorismanalysts.com/pt/index.php/pot/article/view/336/html

Elmenshawy, Mohamed. “Jihadists vs. Extremists ... When Language Matters.” Huffington Post. 21 December 2015. Accessed November 8, 2017 https://www.huffingtonpost.com/mohamed-elmenshawy/jihadists-vs-extremists-w_b_8851224.html

Fukuyama, Francis. “Nation-Building 101.” The Atlantic. January/February 2004. Accessed November 8, 2017 https://www.theatlantic.com/magazine/archive/2004/01/nation-building-101/302862/

Hassan, Ammar Ali. “Orientalism and Terrorism.” Al-Ahram Weekly 1230 (22-28 January 2015). Accessed November 5, 2017 http://weekly.ahram.org.eg/News/10241.aspx

Jasanoff, Maya. “The First Global Terrorists Were Anarchists in the 1890s.” New York Times. 29 April 2016. Accessed November 6, 2017 https://www.nytimes.com/2016/04/30/opinion/the-first-global-terrorists-were-anarchists-in-the-1890s.html

Kaplan, Jeffrey. “Waves of Political Terrorism.” November 2016. Accessed November 6, 2017 http://politics.oxfordre.com/view/10.1093/acrefore/9780190228637.001.0001/acrefore-9780190228637-e-24

Kingsley, Patrick. “Who is Behind ISIS’s Terrifying Online Propaganda Operation?” The Guardian.  23 June 2014. Accessed November 6, 2017 https://www.theguardian.com/world/2014/jun/23/who-behind-isis-propaganda-operation-iraq

Linton, Marisa. “Robespierre and the Terror.” History Today 56 (no.8) August 2006. Accessed November 5, 2017 http://www.historytoday.com/marisa-linton/robespierre-and-terror

Matuson, Dana. “President Trump Responds Differently to NY, Las Vegas Attacks: What They’re Saying.” Syracus.com. 4 November 2017. Accessed November 5, 2017 http://www.syracuse.com/opinion/index.ssf/2017/11/trump_responds_differently_to_new_york_las_vegas_attacks_what_theyre_saying.html

McCoy, Terrence. “The Islamic State’s ‘Call of Duty’ Allure.” Washington Post. 28 October 2014. Accessed November 6, 2017 https://www.washingtonpost.com/news/morning-mix/wp/2014/10/28/the-islamic-states-call-of-duty-allure/?utm_term=.02ac9ec4b0a1

Miller, Erin. “Ideological Motivations of Terrorism in the United States, 1970-2016.” National Consortium for the Study of Terrorism and Responses to Terrorism (START). University of Maryland, November 2017. Accessed November 5, 2017 https://www.start.umd.edu/pubs/START_IdeologicalMotivationsOfTerrorismInUS_Nov2017.pdf

NPR. “The Hidden Cost of the Drone Program.” NPR. 5 May 2013. Accessed November 8, 2017 https://www.npr.org/2013/05/05/181403067/the-hidden-cost-of-the-drone-program

Thompson, Mark. “The True Cost of the Afghanistan War May Surprise You.” Time. 1 January, 2015. Accessed November 8, 2017 http://time.com/3651697/afghanistan-war-cost/

United Nations. “UN Global Counter-Terrorism Strategy.” Counter-Terrorism Implementation Task Force. Accessed November 8, 2017 https://www.un.org/counterterrorism/ctitf/en/un-global-counter-terrorism-strategy

Zalman, Amy. “History of Terrorism: Anarchism and Anarchist Terrorism.” ThoughtCo. Accessed November 5, 2017 https://www.thoughtco.com/anarchism-and-anarchist-terrorism-3209262

Supplementary Resources

  1. Cronin, Audrey Kurth, Ludes, James M. Attacking Terrorism : Elements of a Grand Strategy. Washington, D.C.: Georgetown University Press, 2004.
  2. Springer, Devin R., Regens, James L, and Edger, David N. Islamic Radicalism and Global Jihad. Washington, D.C.: Georgetown University Press, 2009.
  3. Salazar, Philippe-Joseph, and Khazeni, Dorna, Translator. Words Are Weapons: Inside ISIS's Rhetoric of Terror. 2017.