Modern Terrorism and Counter-Terrorism Strategies

Similar documents
Counter-Terrorism as Crime Prevention: A Holistic Approach

Terrorism in Africa: Challenges and perspectives

CONVENTIONAL WARS: EMERGING PERSPECTIVE

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II

Newsletter February - May 2018

The Embassy Closings

The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security.

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

Title of Presentation. Global Threat Brief President / CEO Global Guardian

Chapter 8: The Use of Force

Al Qaeda: Corporate hierarchy or biological entity?

Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel

CRS Report for Congress

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

KORET FOUNDATION-SPONSORED WORKSHOP ON KOREAN AFFAIRS

Severing the Web of Terrorist Financing

FYI: 70s/80s Test Wednesday April 11 Agenda: Reagan Guided Notes: Conservative Resurgence

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

Alex Mintz Dean Lauder School of Government IDC Presented at the Herzliya Conference, January How Rational is Ahmadinejad?

C I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL

Countering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies

Emmanuel Heymann, Luxembourg, Luxembourg

Foro de Seguridad XXV Foro Económico. Krynica (Polonia) 8-10 de septiembre de 2015

Intelligence Reform and Terrorism Prevention Act of 2004: Lone Wolf Amendment to the Foreign Intelligence Surveillance Act

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

National Consortium for Study of Terrorism and Responses to Terrorism

CAREERS ADVISERS AND TEACHERS DAY

THE ENABLING ACT FOR SUPPRESSION TERRORISM [1991]

The first affirmation of the Center s Guideline ( on

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

Stopping the banned groups

COUNTERINSURGENCY MEASURES B4S5499XQ STUDENT HANDOUT

Reflections on U.S. Military Policy

Role of Security Sector and Civil Society in Responding to and Preventing VE

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director

Analyzing Terrorist Networks - Theories & Techniques

Trends in Modern International Terrorism

Diplomacy in the 21 st Century - Syllabus

WikiLeaks Document Release

G8 Declaration on Counter Terrorism

Conflating Terrorism and Insurgency

U.S. Government Response

Boko Haram I. Background Boko Haram is an islamic terrorist group that is primarily ran out of Nigeria and is also

Next- Generation National Security and Public Safety in Europe

RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1

SACT s lecture at. FBI Joint Terrorism Task Force. New York City, 16 Apr 2018,

FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF

Montgomery County Community College CJS/EMP/POL/SOC 250 Terrorism & Counter-terrorism 3-3-0

Multi-domain Counter-terrorism Modeling

Deterring Mass-Casualty Terrorism. have become preoccupied with preventing

Montessori Model United Nations. Distr.: Upper Elementary Eleventh Session XX September Sixth Committee Legal

Laura Dugan, University of Maryland Erica Chenoweth, University of Denver September 18, 2014

Some Reasons Why International Terrorism Has Not Yet Become the Common Enemy of Mankind

Contents. Preface Acknowledgments

Geopolitics of the New Middle East - Syllabus

S/2003/487. Security Council. United Nations

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Violent Conflicts 2015 The violent decade?! Recent Domains of Violent Conflicts and Counteracting February 25-27, 2015

Addressing Emerging Terrorist Threats and the Role of UNODC

Christian Aid Ireland s submission on civil society space 31 March 2017

Freedom vs. Security: Guaranteeing Civil Liberties in a World of Terrorist Threats

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

Recommendation for a COUNCIL DECISION

After the Fall of Daesh in Syria and Iraq: Counter-Radicalisation

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Weapons of Mass Destruction and their Effect on Interstate Relationships

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

SHAPE POLICY TO STRATEGICALLY FIGHT GLOBAL TERRORISM

GOVT-GOVERNMENT (GOVT)

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

Council conclusions on counter-terrorism

Final Report. For the European Commission, Directorate General Justice, Freedom and Security

Global Risk Index 2018

Negotiating with Terrorists an Option Not to Be Forgone

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

The Sources of and Limits on Criminal Law 1

Debating privacy and ICT

SENATE STAFF ANALYSIS AND ECONOMIC IMPACT STATEMENT

AN ESSAY AND COMMENT ON OREN GROSS, THE NEW WAY OF WAR: IS THERE A DUTY TO USE DRONES? Winston P. Nagan * Megan E. Weeren **

Interview with Peter Wallensteen*

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

15413/16 EB/dk 1 DGD 1C

Conventional Deterrence: An Interview with John J. Mearsheimer

DRAFT REPORT. EN United in diversity EN. European Parliament 2018/2158(INI) on the state of EU-Russia political relations (2018/2158(INI))

Concept note. Open briefing of the Counter-Terrorism Committee on the nexus between international terrorism and transnational organized crime

Oklahoma CLEET Approved Courses

DO TERRORISTS HAVE NO RELIGION?

THE ARMS TRADE TREATY AND

2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM

Civil War erupts in Vietnam Communist North vs. non Communist South Organized by Ho Chi Minh

THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE

THE POLITICS OF PREVENTING AND COUNTERING VIOLENT EXTREMISM

Terrorism and New Security Challenges Implications for European-Japanese Security Cooperation

Delegations will find attached the declassified version of the above document.

Worldwide Caution: Annotated

Cyber Prevention: - Not Just Terrorism

Transcription:

Modern Terrorism and Counter-Terrorism Strategies Dr. Boaz Ganor Ronald Lauder Chair for Counter Terrorism, Founder & Executive Director, ICT The International Policy Institute for Counter-Terrorism, Deputy Dean, Lauder School of Government, Herzliya, Israel, The Interdisciplinary Center, Herzliya, Israel Email: ganor@idc.ac.il, Web: www.ict.org.il

Explanatory Disciplines To Terrorism Agro-terrorism Psychology Terrorism as a psychological warfare Terrorism radicalization process Public resilience to terrorism Terrorism and the IHL Terrorism as a crime Democratic Dilemmas Cyber Terrorism Law Media & Economics The economic implication of terrorism Terrorism fundraising Terrorism Media and public Communication opinion. Terrorism and the new media Terrorist criminal activity Political Punishment policy Science Terrorism as a warfare Modern terrorism strategy Counter terrorism strategies Democratic Dilemmas in CT

Who are the Perpetrators?

State Involvement Terror Attack Perpetrators Conduct Initiation Support Proxy Terrorist Organization Organized Attacks Personal Initiative Attacks Direct Attacks Indirect Attacks Initiation Support Proxy External Cell Group Local Sleeper Cell Local Network Group Individual Lone Wolf

Terrorist Cells as Social Networks Node Matrix Hub - Clique Hub Chain Local Network Group

Classification of Terrorist Organizations and Cells Terrorism Military Hierarchical Terrorist Organization Decentralized Terrorist Organization Hybrid Terrorist Organization Clique Hub Terrorist Organizations Alliance Local Network / Sleeper Cell Lone Wolfe

Different types of attacks

Lone Wolf Local Network Local Sleeper Cell External Cell Type of Terrorist Attacks Threats Cold Weapon Shooting Assaults Ambush, Killing- Journey Bombing Attacks Time, Remote, Suicide Extortion Hostage Kidnappings CBRN Food Water Cyber

Terrorism Decision Making

Decision making intersections within a terrorist organization Leaders Activists Establishing Terror Organization Managing the Organization Initiating Attacks Termination Of Terrorism Supporting Passive Active Joining Terrorism As the sole or Main Activity Non-violent Political Activity Terrorism Combined with Social- Political Activity Violent Political Activity Finance Structure Hierarchal Organizations Terrorism Social Network Non-conventional CBRN Guerilla Warfare Cyber Protest Perpetrating Terrorism Administrative Activity Level of Involvement Conventional Attack Boycott Suicide Attack State Sponsorship Criminal Activity Terrorist Extortion Commercial Activity Donations Level of risk

Counter Terrorism

Counter Terrorism Dilemmas: What is effective counter terrorism? The terrorism equation and the Boomerang effect

Terrorism = Motivation X operational capability Deterrence Effective Military Offensive Activity Non-Effective Military Offensive Activity Counter Motivation Measures: Propaganda Education Welfare A C A C D B Effective Military Offensive Activity + Counter Motivation Measures. Terror level Motivation Operational capability Short Term Influence Influence at the long term

Boomerang Effect L I M I T I N G F A C T O R Motivation Operational Capability (? ) ( - ) Decrease ( + ) ( - )

Counter Terrorism Decision Making

CT Decision Making- American leader s world View Framing External Factors Economic Situation Magnitude & Characteristics of Terrorism Intelligence information Public Opinion Media Political Party Friends & Family Defense DHS International Processes & Events Security Situation Foreign Affairs Government Decision Maker Offices World View Decision Decision Maker Maker Ideology Friends Education (head of State) Advisors (head of of State) Beliefs & Values Pentagon Static Factors CIA FBI Political Situation NSA MI

World View + _ Defining the enemy Policy Eradication of Terrorism Damage Control Prevention of escalation Operational Prism Effectiveness Cost / Benefits (in case of success and failure) Counter Terrorism Decision Making Adopting a strategy Policy Setting Goals Choosing Tools Offensive measures Punitive measures Defensive measures Intelligence measures Legal measures Legal Prism _ IHL State s Legislation Values +