Return-Path: <sentto-279987-3407-1004027898-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 25 Oct 2001 09:39:08 -0700 (PDT) Received: (qmail 6621 invoked by uid 510); 25 Oct 2001 16:37:48 -0000 Received: from n28.groups.yahoo.com (216.115.96.78) by 204.181.12.215 with SMTP; 25 Oct 2001 16:37:48 -0000 X-eGroups-Return: sentto-279987-3407-1004027898-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n28.groups.yahoo.com with NNFMP; 25 Oct 2001 16:38:22 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 25 Oct 2001 16:38:16 -0000 Received: (qmail 32840 invoked from network); 25 Oct 2001 16:37:42 -0000 Received: from unknown (10.1.10.26) by 10.1.1.223 with QMQP; 25 Oct 2001 16:37:42 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 25 Oct 2001 16:37:41 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9PGbhd13776 for iwar@onelist.com; Thu, 25 Oct 2001 09:37:43 -0700 Message-Id: <200110251637.f9PGbhd13776@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 25 Oct 2001 09:37:43 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Think.Again:.Terrorism] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Think Again: Terrorism (This article was originally published in the Fall 1997 issue of Foreign Policy.) Terrorism, like the plague in the Middle Ages, frightens both leaders and citizens. It is a disease that is spreading, its cure is unknown. Controlling terrorism will require new mechanisms of cooperation-both nationally and internationally-between intelligence and law enforcement agencies. Effective action must be simultaneously defensive and offensive and inevitably requires some compromise of civil liberties. By John Deutch "In the last few years, there has been a dramatic surge in terrorist activity-much of it targeted against the United States." Yes and no. First, the good news. International terrorism has declined steadily since the late 1980s. Last year represented a 25-year low, with reported incidents down from a peak of 665 in 1987 to 296 in 1996. Although the United States' unique position as a political, economic, and military world leader will always make it a choice target for terrorists, statistics reveal that nations everywhere share this burden. In 1996, less than 25 percent of reported terrorist incidents targeted the United States or its citizens abroad. More than 30 other countries were victimized, with some of the worst attacks occurring in Great Britain, Israel, Peru, and Sri Lanka. While the latest State Department report on terrorism cites statistics going back a quarter of a century, terrorism has been around for much longer, whether in the Balkans, Tsarist Russia, or in Palestine during the British mandate. But today the changing methods that terrorists employ have added a "new" dimension to an old threat. First, terrorists are operating increasingly on an international level, not just in one region or country. The dawn of the modern age of terrorism could be dated at September 5, 1972, with the Palestinian terrorist attack on the Israeli Olympic team in Munich. This was followed by a period of commercial airline hijacking, which culminated with the destruction of Pan Am 103 over Lockerbie, Scotland. The second "new" aspect of terrorism is the growing possibility that terrorists will seek more bang for the buck and make use of weapons of mass destruction-nuclear, chemical, or biological. The intelligence community has received more than 100 reports alleging the diversion of nuclear components from the former Soviet Union over the last few years. Fortunately, to date most of this reporting has proved untrue. Nevertheless, the collapse of the Soviet Union and the opening of Russian society and its economic difficulties have subjected the nuclear security system of the former Soviet Union to stresses and risks that it was not designed to withstand. Thousands of individuals employed within the Russian nuclear complex-many of whom have knowledge and access to nuclear materials-receive salaries that are barely at subsistence level, raising the possibility that they might be susceptible to offers from anyone in the market to buy nuclear components. Moreover, governments have yet to consider seriously the threat of chemical weapons and biological toxins. Both of these types of weapons are easy to manufacture and can have horrifying consequences for civilian populations. The first concrete example was the introduction of sarin nerve gas into the Tokyo subway system by the Japanese cult, Aum Shinrikyo. For years, the conventional wisdom stated that weapons of mass destruction did not serve the goals of terrorists. Mass murder, it was argued, would only prompt a global backlash against the cause that the terrorists claimed to serve. It has been noted that "terrorists want a lot of people watching, not a lot of people dead." Regrettably, Aum Shinrikyo proved to be the exception to that rule. In fact, we see a disturbing new trend occurring across the globe. More and more terrorists are using powerful explosives to attack mass-civilian targets. So despite last year's decline in terrorist incidents, there was a drastic increase in casualties (311 people killed and 2,652 wounded). The third aspect is really new-cyberterror. It is all too easy technically to penetrate the telecommunications and computer systems of nations and private organizations and to introduce "foreign" computer codes that will cause systems to go haywire or to fall under the control of the intruder. Such cyberterrorists could not only divert funds electronically from banks but also could create havoc with a nation's air traffic or power plant control systems. Likewise, they could introduce "morphed" images and messages into a country's radio and television systems, spreading lies and inciting people to violence. So while terrorism is an age-old phenomenon, and historic techniques of assassination and conventional explosives remain the methods of choice, new elements of terrorism challenge the determination and patience of established states. "Terrorism is best defined as acts of violence committed against innocent persons or noncombatants that are intended to achieve political ends through fear and intimidation." Yes, but with some qualifiers. While quantifying terrorist incidents is simple, it is often difficult to characterize the terrorist threat. To help understand the true nature of terrorism today, I divide terrorist acts into several categories. The first, and most dangerous, category is state-sponsored terrorism. The United States has designated Cuba, Iran, Iraq, Libya, North Korea, Sudan, and Syria as countries that have sponsored terrorism. The relocation of the notorious Saudi-born extremist, Usama bin Ladin, to Afghanistan reinforces the likelihood that this country could be added to the list next. In the past, much, but not all, state-sponsored terrorism has been directed against the United States. External events, international pressure, economic sanctions, and the threat of U.S. military retaliation have curbed activity in recent years by Cuba, Iraq, Libya, and North Korea, although these countries harbor some known terrorists and have both the potential and ideological inclination to advance their objectives through terrorism. Although not formally on this list, other countries that may provide assistance and sanctuary to terrorist groups deserve close scrutiny. In my opinion, the most serious question regarding state-sponsored terrorism today is the degree to which Iran is sponsoring terrorism worldwide. Tehran's support for Hizballah training and subsequent military operations conducted in the Bekaa Valley of Lebanon stands out as a noteworthy example. Likewise, Iran has been implicated in the assassination of dissident Iranians throughout the world (at least eight during 1996). The April 1997 German court decision that found high-ranking members of the Iranian leadership responsible for the 1992 gangland-style murders of four Kurdish dissidents in a Berlin restaurant should help to move many governments to a stronger consensus on the consequences of Iranian conduct-a prerequisite for their greater political engagement in U.S. efforts to contain Iran. The second category is terrorism carried out by groups trying to overthrow their own governments or to achieve independence. Here we find the largest number of incidents. For example, the bloodiest act of 1996 occurred when the separatist Liberation Tigers of Tamil Eelam blew up an explosive-laden truck in Colombo, Sri Lanka, killing 90 people and wounding more than 1,400 others. The pkk, a Kurdish separatist group, continues to commit terrorist acts against Turkey, and the al-Gama'at al-Islamiyya seeks the overthrow of Egyptian president Hosni Mubarak through terrorism. There is also the ira in Northern Ireland, the Aum Shinrikyo and Japanese Red Army of Japan, the Armed Islamic Group in Algeria, as well as the Revolutionary Armed Forces of Colombia and the National Liberation Army in Colombia. The Tupac Amaru Revolutionary Movement (mrta) extremists held hostages in the Japanese ambassador's residence in Lima, Peru, for 125 days. The terrorism in this second category is not usually directed against the United States. Drawing the line between terrorism and insurgency can be difficult. In Mexico, for example, dissident groups such as the Popular Revolutionary Army in Guerrero and the Zapatista National Liberation Army in Chiapas seek to change the country's political and economic system. A third category is terrorism committed by Islamic groups, which for the most part operate in the Middle East. These groups pose the most dangerous threat to the United States, and many worry that their activities are on the rise. Some, notably Hamas and the Palestine Islamic Jihad (pij), are dedicated to the overthrow of Israel and the establishment of an Islamic Palestinian state. Hamas was responsible for an outbreak of terrorism in early 1996 that led to the March 1996 "Summit of Peacemakers" held in Sharm al-Sheik in the Sinai, where 29 world leaders gathered to pledge stronger efforts to fight international terrorism. Some terrorist groups share some common goals with Hamas and the pij, although not their ideology. The Popular Front for the Liberation of Palestine, for instance, also seeks the destruction of the state of Israel but is a secular, leftist organization. Yet another set of Middle Eastern terrorists has a broader extremist Islamic agenda, which includes direct action against American interests, as embodied by the 1993 World Trade Center bombing in New York. Many of these groups, although based in the Middle East, have nothing to do with the Arab-Israeli conflict but reflect activity that more properly belongs in the second "dissident" category. The terrorists suspected of blowing up the al-Khobar military barracks in Saudi Arabia, for example, want to topple the Saudi monarchy. American citizens frequently become a target for this category of terrorists simply because the United States is out front as a world leader, with a forward presence in the region, and is associated with established regimes such as those in Egypt and Saudi Arabia. Frequently, the rise of fundamentalist Islamic movements is equated with extremist Islamic terrorism. Indiscriminately linking the two oversimplifies and distorts the complex and diverse Islamic world and should certainly make one "think again." The largest religion in the world, Islam reaches from Indonesia to Central Asia and Turkey, and across the Middle East into much of Africa. Islam is far from monolithic. The recent resurgence of Islamic movements often stems from local economic and social conditions. These groups seek to portray themselves as viable alternatives to an established system that they view as corrupt and inefficient. "The United States government is effectively organized to address the terrorist threat." Ha, ha. There is probably no U.S. government activity that earns an uncritical response. But terrorism is a serious matter, and if we are going to mount an effective program to combat it, we must clarify the roles and missions of various government agencies. As it stands now, the responsibility for counterterrorist initiatives is divided among a host of government agencies, including the Department of Defense, the fbi, the cia, the State Department, and the Federal Aviation Administration. Making use of several government agencies is, in itself, not a bad idea. Consider the spectrum of terrorist threats with which we must contend: protection of the president and government leaders; protection of the nation's communications infrastructure; protection of our military forces deployed abroad at bases and embassies; protection of U.S. businesses and citizens abroad; and security for air travel and commerce. With regard to domestic acts of terrorism, the law enforcement community is clearly in charge. However, once terrorism crosses national borders-as in the case of Pan Am 103 and al-Khobar-it becomes a national security issue and should be entrusted to the national security apparatus. The question then becomes: Who should be in charge? Certainly not the fbi. Yet the United States responded to the al-Khobar bombing as if it were a domestic law enforcement matter. Louis Freeh, the highly capable head of the fbi, was designated the point man for an investigation involving U.S. military forces deployed overseas. This despite the fact that the fbi's mission is to collect evidence that can be introduced in a U.S. court. Moreover, we witnessed the faintly ridiculous spectacle of Freeh, an individual with impeccable law enforcement credentials, who has successfully battled crime in the United States, being stiffed repeatedly by the Saudis when he requested coequal status in their internal investigation, and expected treatment of suspects and evidence according to American standards. Fat chance-the Saudi royal family's conception of justice is quite different from our own. In any case, if the situation were reversed, it is highly unlikely that we would let foreign law enforcement officials play a significant role in a sensitive internal investigation of an incident that occurred on U.S. soil. If not the FBI, then what about the State Department? The State Department sponsors and participates in international conferences that discuss terrorism, but it has little capability to plan, fund, and execute any serious counterterrorist program. Diplomats cannot chat with terrorists at embassy receptions. How about the Department of Defense? The Pentagon must have a principal focus on protection of its troops and facilities abroad, but fighting terrorism is generally not a military matter. Modesty prevents me from recommending the director of central intelligence. In any event, the intelligence community should not play the role of policymaker. That being said, it is important to know that the intelligence community's Counter Terrorist Center (ctc), established in 1986, is a model of effective interagency cooperation. The ctc, which reports directly to the cia's director, was designed to bring all elements of the intelligence community together to collect and analyze information from all over the world about terrorist groups-how they train and operate, who supports them, and where they may find sanctuary. Today, the ctc has professional officers from 10 different agencies, including the cia, the National Security Agency, the Defense Intelligence Agency, the fbi, and the State Department. Recognizing that a foreign government sometimes may have better information about terrorist groups operating in its own neighborhood, the ctc attempts to access this information through liaison relationships. "Some loss of civil liberty inevitably accompanies measures to combat terrorism." Unfortunately, this is true. Protecting individuals and society from those who operate outside the rules frequently calls for compromise. The security measures now in place for air travel are an excellent example. We require people to identify themselves, submit baggage and person to search, and spend more time waiting in lines to provide partial protection and deterrence against terrorists who seek to hijack or destroy commercial airlines. Many countries that believe they are threatened by foreign terrorists anticipate situations where responsive action may be required. Some are establishing so-called "hostage rescue teams" (hrts) that are paramilitary special forces units trained for, and capable of, immediate response. The trouble with these types of units is that in less democratic countries political rulers may use them to suppress legitimate dissident groups. For example, during the Peruvian government's 15-year war against the Shining Path, security forces were implicated in a series of politically motivated killings. It is also not unknown for hrts to try to overthrow their own governments. But even long-established democracies face complex issues that go to the core of their identity, especially those nations that have traditionally maintained open borders and granted political asylum to foreign nationals. In countries around the world, Middle Eastern foreign resident communities are increasingly subject to surveillance by local authorities and often with justification. Many capitals around the world have foreign resident communities that support or harbor terrorists. For example, Canadian authorities recently arrested a Saudi Shia dissident living in Canada, who allegedly had a role in the al-Khobar bombing. This heightened monitoring of high-risk foreign resident communities has obvious civil liberty issues, as it contrasts with past tolerance, perhaps excessive, for dissident individuals who lived in or visited Western Europe. British law may have protected the notorious terrorist financier Usama bin Ladin on his occasional shopping trips to London. As the terrorist threat grows, countries need to recalibrate the balance between protection of individual liberties and their understandable interest in keeping track of what is happening within high-risk foreign resident communities. Communications surveillance is another area where democratic nations might see civil liberties put to the test. In the United States, communications surveillance-intercepts or wiretapping-can be done only with a court order, but that is not true in most countries of the world. There is no doubt that such surveillance is increasing worldwide, based on the justification that it combats the foreign terrorist threat. This is also true in the United States, where the fbi now has access to digital telecommunications (with a court order). The globalization of electronic communications has made it easier for exile groups to support terrorists. The response of authorities will raise civil liberties concerns, as with Germany's recent efforts to control Internet use by Angela Marquardt, a member of the successor party to the East German Communist Party who sought to maintain an electronic link to the Radikal, a newspaper considered to encourage terrorism. Some Internet users have even embarked upon their own form of freelance counterterrorism. The San Francisco-based Institute for Global Communications was forced to terminate its link with the Basque People's Journal after outraged Spaniards sabotaged the company's computer system by overloading it with a barrage of junk e-mail. But the big battle internationally is over the liberalization of rules for use of hard-to-penetrate codes or encryption in private and commercial communications. On the one hand, the increase in electronic commerce points to the need for secure international communications, most notably with regard to financial transfers. On the other hand, law enforcement and security services are reluctant to permit easy access to strong encryption because it will make it simpler for terrorist and criminal elements to ride on, and take advantage of, the information highway. Technology already permits any determined party to employ encryption as desired; the question is whether encryption will become so readily available that there is no practical prospect of listening to the conversations of criminals or terrorists. The U.S. government is leading the effort for a "key recovery" system that would permit law enforcement officials-as authorized by the judicial systems of individual countries-to have access to encrypted records or communications. I believe a key recovery system can be constructed in a fashion that serves the needs of both business managers and law enforcement officials to access encryption keys. But it is by no means clear that the key recovery initiative will be successful. "The world is effectively organized to address the terrorist threat." The fight against transnational terrorism cannot be conducted by countries on an individual basis. Yet, a coherent international effort is more appearance and sentiment than reality. Differences among nations over how to treat countries that sponsor terrorism frequently have been a source of friction. In 1986, Europeans protested in the streets following the U.S. bombing of Libya in retaliation for a terrorist attack that killed two American servicemen in Germany. During the recent terrorist standoff in Peru, Uruguay complicated negotiations with the mrta when it broke ranks and released mrta prisoners shortly before the release of its own ambassador from the Japanese compound. Today, the most important example is the difference in attitudes between Europe and the United States toward Iran. Future success requires greater exchange of information on threats, adoption of common policies on how to negotiate with terrorists and their supporters, and common action to find and dismantle terrorist organizations. Considerable differences also exist in policies and practices for dealing with terrorist incidents and groups. For example, many countries have a stated policy of "no negotiations with terrorists," yet clearly negotiations go on-between the British and the ira, Israel and the plo, and Peru and the mrta. Such ambiguity is essential in dealing with terrorists. The central principle during a crisis should be to minimize risks to hostages until the situation is resolved and control is established. From that point extraordinary efforts must be taken to destroy the terrorist group. No combination of imaginable or affordable measures will give complete protection from terrorist threats. Nor should this be expected; after all, large armies do not stop all war, and effective police departments do not detect all crimes before they are committed. But it is reasonable to ask what protection can be employed against the range of threats. Not so long ago, the world endured a seemingly unstoppable sequence of airplane hijackings. The international community sought common ground, improved airline security, and found it possible to deter and limit such terrorist incidents. A disciplined and sustained international effort by intelligence and law enforcement agencies worldwide is required to impede terrorist threats. Due to established channels of international cooperation, now we can be reasonably sure that any terrorist group can be identified and tracked (here the issue of sanctuary looms large). But in the longer run, efforts must include defensive measures, effective prosecution of perpetrators of terrorist acts, and offensive action against groups that are engaged in international terrorism until it is the terrorist who must "think again." John Deutch is an institute professor at the Massachusetts Institute of Technology, former director of central intelligence and deputy secretary of defense, and a member of the editorial board of Foreign Policy. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST