Counterterrorism

Last updated

GIGN operators in 2015. GIGN is the counterterrorist tactical unit of the National Gendarmerie of France. PI2G 2F.jpg
GIGN operators in 2015. GIGN is the counterterrorist tactical unit of the National Gendarmerie of France.
United States Coast Guard Maritime Security Response Team is an advanced interdiction force for higher risk law enforcement and counter-terrorism operations USCG MSRT.JPG
United States Coast Guard Maritime Security Response Team is an advanced interdiction force for higher risk law enforcement and counter-terrorism operations

Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to combat or eliminate terrorism. [1]

Contents

If an act of terrorism occurs as part of a broader insurgency, and insurgency is included in the definition of terrorism, then counterterrorism may additionally employ counterinsurgency measures. The United States Armed Forces uses the term "foreign internal defense" for programs that support other countries' attempts to suppress insurgency, lawlessness, or subversion, or to reduce the conditions under which threats to national security may develop. [2] [3] [4]

History

The first counterterrorism body formed was the Special Irish Branch of the Metropolitan Police, later renamed the Special Branch after it expanded its scope beyond its original focus on Fenian terrorism. Various law enforcement agencies established similar units in the United Kingdom and elsewhere. [5] The first tactical counterterrorist unit was GSG 9 of the German Federal Police, formed in response to the 1972 Munich massacre. [6]

Counterterrorist forces expanded with the perceived growing threat of terrorism in the late 20th century. After the September 11 attacks, Western governments made counterterrorism efforts a priority. This included more extensive collaboration with foreign governments, shifting tactics involving red teams, [7] and preventive measures. [8]

Although terrorist attacks affecting Western countries generally receive a large share of media attention, [9] most terrorism occurs in less developed countries. [10] Government responses to terrorism, in some cases, can lead to substantial unintended consequences, [11] [ vague ] such as what occurred in the above-mentioned Munich massacre.[ further explanation needed ]

Planning

Intelligence, surveillance, and reconnaissance

Yamam, one of Israel's counterterrorism units Magav-Facebook--Yamam-0009.jpg
Yamam, one of Israel's counterterrorism units

Most counterterrorism strategies involve an increase in policing and domestic intelligence gathering. Central techniques include intercepting communications and location tracking. New technology has expanded the range of military and law enforcement options for intelligence gathering. Many countries increasingly employ facial recognition systems in policing. [12] [13] [14]

Domestic intelligence gathering is sometimes directed at specific ethnic or religious groups, which is a source of political conversy. Mass surveillance of an entire population raises objections on civil liberties grounds. Domestic terrorists, especially lone wolves, are often harder to detect because of their citizenship or legal status and ability to stay under the radar. [15]

To select the effective action when terrorism appears to be more of an isolated event, the appropriate government organizations need to understand the source, motivation, methods of preparation, and tactics of terrorist groups. Good intelligence is at the heart of such preparation, as well as a political and social understanding of any grievances that might be solved. Ideally, one gets information from inside the group, a very difficult challenge for human intelligence operations because operational terrorist cells are often small, with all members known to one another, perhaps even related. [16]

Counterintelligence is a great challenge with the security of cell-based systems, since the ideal, but the nearly impossible, goal is to obtain a clandestine source within the cell. Financial tracking can play a role, as a communications intercept. However, both of these approaches need to be balanced against legitimate expectations of privacy. [17]

In response to the growing legislation.

Flag of the United Kingdom.svg  United Kingdom

Since 1978 the UK's terrorism laws have been regularly reviewed by a security-cleared Independent Reviewer of Terrorism Legislation, whose often influential reports are submitted to Parliament and published in full.

Flag of the United States (23px).png  United States
Flag of Australia (converted).svg  Australia
Flag of Israel.svg  Israel

Human rights

John Walker Lindh was captured as an enemy combatant during the United States' 2001 invasion of Afghanistan. John Walker Lindh Custody.jpg
John Walker Lindh was captured as an enemy combatant during the United States' 2001 invasion of Afghanistan.

One of the primary difficulties of implementing effective counterterrorist measures is the waning of civil liberties and individual privacy that such measures often entail, both for citizens of, and for those detained by states attempting to combat terror. [23] At times, measures designed to tighten security have been seen as abuses of power or even violations of human rights. [24]

Examples of these problems can include prolonged, incommunicado detention without judicial review or long periods of 'preventive detention'; [25] risk of subjecting to torture during the transfer, return and extradition of people between or within countries; and the adoption of security measures that restrain the rights or freedoms of citizens and breach principles of non-discrimination. [26] Examples include:

Many argue that such violations of rights could exacerbate rather than counter the terrorist threat. [26] Human rights activists argue for the crucial role of human rights protection as an intrinsic part to fight against terrorism. [27] [29] This suggests, as proponents of human security have long argued, that respecting human rights may indeed help us to incur security. Amnesty International included a section on confronting terrorism in the recommendations in the Madrid Agenda arising from the Madrid Summit on Democracy and Terrorism (Madrid March 8–11, 2005):

Democratic principles and values are essential tools in the fight against terrorism. Any successful strategy for dealing with terrorism requires terrorists to be isolated. Consequently, the preference must be to treat terrorism as criminal acts to be handled through existing systems of law enforcement and with full respect for human rights and the rule of law. We recommend: (1) taking effective measures to make impunity impossible either for acts of terrorism or for the abuse of human rights in counter-terrorism measures. (2) the incorporation of human rights laws in all anti-terrorism programs and policies of national governments as well as international bodies." [27]

While international efforts to combat terrorism have focused on the need to enhance cooperation between states, proponents of human rights (as well as human security) have suggested that more effort needs to be given to the effective inclusion of human rights protection as a crucial element in that cooperation. They argue that international human rights obligations do not stop at borders, and a failure to respect human rights in one state may undermine its effectiveness in the global effort to cooperate to combat terrorism. [26]

Preemptive neutralization

Some countries see preemptive attacks as a legitimate strategy. This includes capturing, killing, or disabling suspected terrorists before they can mount an attack. Israel, the United Kingdom, the United States, and Russia have taken this approach, while Western European states generally do not.[ citation needed ]

Another major method of preemptive neutralization is the interrogation of known or suspected terrorists to obtain information about specific plots, targets, the identity of other terrorists, whether or not the interrogation subjects himself is guilty of terrorist involvement. Sometimes more extreme methods are used to increase suggestibility, such as sleep deprivation or drugs.[ citation needed ] Such methods may lead captives to offer false information in an attempt to stop the treatment, or due to the confusion caused by it.[ citation needed ] In 1978 the European Court of Human Rights ruled in the Ireland v. United Kingdom case that such methods amounted to a practice of inhuman and degrading treatment, and that such practices were in breach of the European Convention on Human Rights Article 3 (art. 3).[ citation needed ]

Non-military

Transparent garbage bin installed at Central Station in Sydney. The bin is clear so police can easily examine its contents, preventing the potential placement of bombs or the disposal of weaponry by terrorists. Transparent garbage bins at Central station.jpg
Transparent garbage bin installed at Central Station in Sydney. The bin is clear so police can easily examine its contents, preventing the potential placement of bombs or the disposal of weaponry by terrorists.

The human security paradigm outlines a non-military approach that aims to address the enduring underlying inequalities which fuel terrorist activity. Causal factors need to be delineated and measures implemented which allow equal access to resources and sustainability for all people. Such activities empower citizens, providing "freedom from fear" and "freedom from want".[ citation needed ]

This can take many forms, including the provision of clean drinking water, education, vaccination programs, provision of food and shelter and protection from violence, military or otherwise. Successful human security campaigns have been characterized by the participation of a diverse group of actors, including governments, NGOs, and citizens.[ citation needed ]

Foreign internal defense programs provide outside expert assistance to a threatened government. FID can involve both non-military and military aspects of counterterrorism.[ citation needed ]

A 2017 study found that "governance and civil society aid is effective in dampening domestic terrorism, but this effect is only present if the recipient country is not experiencing a civil conflict." [30]

Military

U.S. Marines in Afghanistan U.S. Marine Corps Sgt. Ryan Burks, a squad leader with Fox Company, 2nd Battalion, 8th Marine Regiment, Regimental Combat Team 7, provides security during a mission rehearsal at Camp Bastion, Helmand province 130527-M-QZ858-089.jpg
U.S. Marines in Afghanistan

Terrorism has often been used to justify military intervention in countries where terrorists are said to be based. Similar justifications were used for the U.S. invasion of Afghanistan and the second Russian invasion of Chechnya.

Military intervention has not always been successful in stopping or preventing future terrorism, such as during the Malayan Emergency, the Mau Mau uprising, and most of the campaigns against the IRA during the Irish Civil War, the S-Plan, the Border Campaign, and the Troubles in Northern Ireland. Although military action can temporarily disrupt a terrorist group's operations temporarily, it sometimes does not end the threat completely. [31]

Repression by the military in itself usually leads to short term victories, but tend to be unsuccessful in the long run (e.g., the French doctrine used in colonial Indochina and Algeria [32] ), particularly if it is not accompanied by other measures. However, new methods such as those taken in Iraq have yet to be seen as beneficial or ineffectual. [33]

Preparation

Target hardening

Whatever the target of terrorists, there are multiple ways of hardening the targets to prevent the terrorists from hitting their mark, or reducing the damage of attacks. One method is to place hostile vehicle mitigation to enforce protective standoff distance outside tall or politically sensitive buildings to prevent car bombings. Another way to reduce the impact of attacks is to design buildings for rapid evacuation. [34]

Aircraft cockpits are kept locked during flights and have reinforced doors, which only the pilots in the cabin are capable of opening. UK railway stations removed their garbage bins in response to the Provisional IRA threat, as convenient locations for depositing bombs. Scottish stations removed theirs after the 7 July 2005 London Bombings as a precautionary measure. The Massachusetts Bay Transportation Authority purchased bomb-resistant barriers after the September 11 attacks.

Israeli Iron Dome active protection system, capable of intercepting airborne rockets and artillery shells Operation Guardian of the Walls, May 2021. XVIII.jpeg
Israeli Iron Dome active protection system, capable of intercepting airborne rockets and artillery shells

Due to frequent shelling of Israel's cities, towns, and settlements by artillery rockets from the Gaza Strip (mainly by Hamas, but also by other Palestinian factions) and Lebanon (mainly by Hezbollah), Israel has developed several defensive measures against artillery, rockets, and missiles. These include building a bomb shelter in every building and school, but also deploying active protection systems such as the Arrow ABM, Iron Dome and David's Sling, which intercept the incoming threat in the air. Iron Dome has successfully intercepted hundreds of Qassam rockets and Grad rockets fired by Palestinians from the Gaza Strip. [35] [36]

A more sophisticated target-hardening approach must consider industrial and other critical industrial infrastructure that could be attacked. Terrorists do not need to import chemical weapons if they can cause a major industrial accident such as the Bhopal disaster or the Halifax Explosion. Industrial chemicals in manufacturing, shipping, and storage thus require greater protection, and some efforts are in progress. [37] To put this risk into perspective, the first major lethal chemical attack of World War I used 160 tons of chlorine; industrial shipments of chlorine, widely used in water purification and the chemical industry, travel in 90- or 55-ton tank cars.[ original research? ]

To give one more example, the Northeast blackout of 2003 demonstrated the vulnerability of the North American electrical grid to natural disasters coupled with inadequate, possibly insecure, SCADA (supervisory control and data acquisition) networks. Part of the vulnerability is due to deregulation, leading to much more interconnection in a grid designed for only occasional power-selling between utilities. A small number of terrorists, attacking critical power facilities when one or more engineers have infiltrated the power control centers, could wreak havoc.[ original research? ]

Equipping likely targets with containers of pig lard has been used to discourage attacks by suicide bombers. The technique was apparently used on a limited scale by British authorities in the 1940s. The approach stems from the idea that Muslims perpetrating the attack would not want to be "soiled" by the lard in the moment before dying. [38] The idea has been suggested more recently as a deterrent to suicide bombings in Israel. [39] However, the actual effectiveness of this tactic is likely limited. A sympathetic Islamic scholar could issue a fatwa proclaiming that a suicide bomber would not be polluted by the swine products.

Command and control

For a threatened or completed terrorist attack, an Incident Command System (ICS) may be invoked to control the various services that may need to be involved in the response. ICS has varied levels of escalation, such as might be required for multiple incidents in a given area (e.g. 2005 London bombings or the 2004 Madrid train bombings), or all the way to a National Response Plan invocation if national-level resources are needed. For example, a national response might be required for a nuclear, biological, radiological, or significant chemical attack.

Damage mitigation

Fire departments, perhaps supplemented by public works agencies, utility providers, and heavy construction contractors, are most apt to deal with the physical consequences of an attack.

Local security

Again under an incident command model, local police can isolate the incident area, reducing confusion, and specialized police units can conduct tactical operations against terrorists, often using specialized counterterrorist tactical units. Bringing in such units will typically involve civil or military authority beyond the local level.

Medical services

Emergency medical services are capable of triaging, treating, and transporting the more severely affected individuals to hospitals, which typically have mass casualty and triage plans in place for terrorist attacks.

Public health agencies, from local to the national level, may be designated to deal with identification, and sometimes mitigation, of possible biological attacks, and sometimes chemical or radiologic contamination.

Tactical units

Royal Malaysia Police Pasukan Gerakan Khas officers breaching a door. UTK PGK broke the door.JPG
Royal Malaysia Police Pasukan Gerakan Khas officers breaching a door.

Many countries have dedicated counterterrorist units trained to handle terrorist threats. Besides various security agencies, there are police tactical units whose role is to directly engage terrorists and prevent terrorist attacks. Such units perform both in preventive actions, hostage rescue, and responding to ongoing attacks. Countries of all sizes can have highly trained counterterrorist teams. Tactics, techniques, and procedures for manhunting are under constant development.

These units are specially trained in military tactics and are equipped for close-quarters combat, with emphasis on stealth and performing the mission with minimal casualties. The units include assault teams, snipers, EOD experts, dog handlers, and intelligence officers. Most of these measures deal with terrorist attacks that affect an area or threaten to do so, or are lengthy situations such as shootouts and hostage takings that allow the counterterrorist units to assemble and respond; it is harder to deal with shorter incidents such as assassinations or reprisal attacks, due to the short warning time and the quick exfiltration of the assassins. [40]

The majority of counterterrorism operations at the tactical level are conducted by state, federal, and national law enforcement or intelligence agencies. In some countries, the military may be called in as a last resort. For countries whose military is legally permitted to conduct domestic law enforcement operations, this is not an issue, and such counterterrorism operations are conducted by their military.

Counterterrorist operations

GSG 9 troopers disembarking from a helicopter in 1978 Bundesarchiv B 145 Bild-F054217-0020, Bundesgrenzschutz, GSG 9.jpg
GSG 9 troopers disembarking from a helicopter in 1978

Some counterterrorist actions of the 20th and 21st centuries are listed below. See list of hostage crises for a more extended list, including hostage-takings that did not end violently.

Representative counterterrorist operations
IncidentMain localeHostage nationalityKidnappers
/hijackers
Counterterrorist forceResults
1972 Sabena Flight 571 Tel Aviv-Lod International Airport, IsraelMixed Black September Sayeret Matkal 2 hijackers killed, 1 passenger died from wounds during raid. 2 passengers and 1 commando injured. 2 kidnappers captured. All other 96 passengers rescued.
1972 Munich massacre Munich, West Germany Israeli Black September German Federal Border Guard All hostages murdered; 5 kidnappers and 1 West German police officer killed. 3 kidnappers captured and released. This fatal result was the reason for the foundation of the German special counterterrorism unit GSG9
1975 AIA building hostage crisis AIA building, Kuala Lumpur, MalaysiaMixed. American and Swedish Japanese Red Army Special Actions Unit All hostages released, all kidnappers flown to Libya.
1976 Operation Entebbe Entebbe airport, UgandaIsraelis and Jews. Non-Jewish hostages were released shortly after capture. PFLP Sayeret Matkal, Sayeret Tzanhanim, Sayeret GolaniAll 7 hijackers, 45 Ugandan troops, 3 hostages, and 1 Israeli soldier were killed. 100 hostages rescued
1977 Lufthansa Flight 181 Initially over the Mediterranean

Sea, south of the French coast;

subsequently Mogadishu International Airport, Somalia

Mixed PFLP GSG 9, Special Air Service consultants1 hostage killed before the raid; 3 hijackers killed and 1 captured. 90 hostages rescued.
1980Casa Circondariale di Trani Prison riot [ citation needed ] Trani, ItalyItalian Red Brigades Gruppo di intervento speciale (GIS)18 police officers rescued, all terrorists captured.
1980 Iranian Embassy siege London, UKMostly Iranian but some British Democratic Revolutionary Movement for the Liberation of Arabistan Special Air Service 5 kidnappers killed, 1 kidnapper captured. 1 hostage killed prior to raid, 1 hostage killed by kidnapper during raid; 24 hostages rescued. 1 SAS operative received minor burns.
1981 Garuda Indonesia Flight 206 Don Mueang Airport, Bangkok, ThailandMostly Indonesian, some Europeans/Americans Komando Jihad Kopassus assault group, RTAF securing perimeter5 hijackers killed (2 likely killed extrajudicially after raid),1 Kopassus operative killed, 1 pilot fatally wounded by terrorist, all hostages rescued.
1982Kidnapping of General James L. Dozier Padua, ItalyAmerican Red Brigades Nucleo Operativo Centrale di Sicurezza (NOCS)Hostage saved, capture of the entire terrorist cell.
1983 Turkish embassy attack Lisbon, PortugalTurkish Armenian Revolutionary Army GOE 5 hijackers, 1 hostage, and 1 police officer killed, 1 hostage and 1 police officer wounded.
1985 Achille Lauro hijacking MS Achille Lauro off the Egyptian coastMixed Palestine Liberation Organization U.S. military, turned over to Italian special forces (Gruppo di intervento speciale)1 hostage killed during hijacking, 4 hijackers convicted in Italy
1986 Pudu Prison siege Pudu Prison, Kuala Lumpur, MalaysiaTwo doctorsPrisoners Special Actions Unit 6 kidnappers captured, 2 hostages rescued
1988 Mothers Bus Hijacked between Beer Sheva and Dimona, Israel11 passengers Palestinian Liberation Organization YAMAM 3 hijacker killed, 3 hostages killed, 8 hostages rescued
1993 Indian Airlines Flight 427 Hijacked between Delhi and Srinagar, India141 passengersIslamic terrorist (Mohammed Yousuf Shah) National Security Guard 1 hijacker killed, all hostages rescued.
1994 Air France Flight 8969 Marseille, FranceMixed Armed Islamic Group of Algeria GIGN 4 hijackers killed. 3 hostages killed before the raid, 229 hostages rescued
1996 Japanese embassy hostage crisis Lima, PeruJapanese and guests (800+) Túpac Amaru Revolutionary Movement Peruvian military and police mixed forcesAll 14 kidnappers, 1 hostage, and 2 rescuers killed.
1996 Mapenduma hostage crisis Mapenduma, IndonesiaMixed (19 Indonesians, 4 British, 2 Dutch, & 1 German) Kelly Kwalik's Free Papua Movement (OPM) Group Kopassus's SAT-81 Gultor CT Group, Kostrad's Infantry Battalion, Penerbad (Army Aviation) Mixed Forces8 kidnappers killed, 2 kidnappers captured. 2 hostages killed by kidnappers, 24 Hostages rescued. 5 Army Operatives killed in helicopter accident.
2000 Sauk Siege Perak, MalaysiaMalaysian (2 police officers, 1 soldier and 1 civilian) Al-Ma'unah Grup Gerak Khas and 20 Pasukan Gerakan Khas, mixed forces2 hostages, 2 rescuers, and 1 kidnapper killed. Other 28 kidnappers captured.
2001–2005 Pankisi Gorge crisis Pankisi Gorge, Kakheti, GeorgiaMixed, Al-Qaeda and Chechen rebels led by Ibn al-Khattab 2,400 troops, 1,000 police officersTerrorism threats in the gorge were repressed.
2002 Moscow theater hostage crisis Moscow, RussiaMixed, mostly Russian (900+) Special Purpose Islamic Regiment Spetsnaz All 39 kidnappers and 129–204 hostages killed. 600–700 hostages freed.
2004 Beslan school siege Beslan, North Ossetia-Alania, RussiaRussian Riyad-us Saliheen MVD (including OMON), Russian army (including Spetsnaz), Russian police (Militsiya)334 hostages killed and hundreds wounded. 10–21 rescuers killed. 31 kidnappers killed, 1 captured.
2007 Siege of Lal Masjid Islamabad, PakistanStudents and Tehrik-i-Taliban Pakistan Pakistan Army and Rangers, Special Service Group 91 students/militants killed, 50 militants captured. 10 SSG and 1 Ranger killed; 33 SSG, 3 Rangers, 8 soldiers wounded. 204 civilians injured.
2007Kirkuk Hostage Rescue[ citation needed ]Kirkuk, IraqTurkman childIslamic State of Iraq Al Qaeda PUK's Kurdistan Regional Government's Counter Terrorism Group5 kidnappers arrested, 1 hostage rescued[ citation needed ]
2008 Operation Jaque ColombiaMixed Revolutionary Armed Forces of Colombia Columbian military 15 hostages rescued. 2 kidnappers captured
2008Operations DawnGulf of Aden, Somalia MixedSomali pirates and militants PASKAL and mixed international forcesNegotiation finished. 80 hostages released. RMN, including PASKAL navy commandos with mixed international forces patrolling the Gulf of Aden during this festive period. [41] [42] [43]
2008 2008 Mumbai attacks Multiple locations in Mumbai cityIndian Nationals, Foreign tourists Ajmal Qasab and other Pakistani nationals affiliated to Laskar-e-taiba National Security Guard, MARCOS, Mumbai Police, Rapid Action Force 141 Indian civilians, 30 foreigners, 15 police officers, and two NSG commandos were killed. 9 attackers killed, 1 attacker captured. 293 individuals injured
2009 2009 Lahore Attacks Multiple locations in Lahore cityPakistan Lashkar-e-Taiba Police Commandos, Army Rangers Battalion March 3, The Sri Lankan cricket team attack – 6 members of the Sri Lankan cricket team were injured, 6 Pakistani police officers and 2 civilians killed.

March 30, the Manawan Police Academy in Lahore attack – 8 gunmen, 8 police personnel and 2 civilians killed, 95 people injured, 4 gunmen captured.[ citation needed ]
Plaza Cinema Chowk attack – 16 police officers, an army officer and unknown number of civilians killed. As many as 251 people injured.[ citation needed ]

2011 Operation Dawn of Gulf of Aden Gulf of Aden, Somalia Koreans, Myanmar, IndonesianSomali pirates and militants Republic of Korea Navy Special Warfare Flotilla (UDT/SEAL)4+ kidnappers killed or missing (Jan 18). 8 kidnappers killed, 5 captured. All hostages rescued.
2012 Lopota Gorge hostage crisis Lopota Gorge, Georgia Georgians Ethnic Chechen, Russian, and Georgian militantsSpecial Operations Center, SOD, KUD, army special forces 2 KUD members and one special forces corpsman killed, 5 police officers wounded. 11 kidnappers killed, 5 wounded, and 1 captured. All hostages rescued.
2013 2013 Lahad Datu standoff Lahad Datu, Sabah, Malaysia Malaysians Royal Security Forces of the Sultanate of Sulu and North Borneo (Jamalul Kiram III's faction) Malaysian Armed Forces, Royal Malaysia Police, Malaysian Maritime Enforcement Agency and joint counterterrorist forces, Philippine Armed Forces 8 police officers (including 2 PGK commandos) and one soldier killed, 12 others wounded. 56 militants killed, 3 wounded, and 149 captured. All hostages rescued. 6 civilians killed and one wounded.
2017 2017 Isani flat siege Isani district, Tbilisi, Georgia Georgians Chechen militants State Security Service of Georgia, police special forces3 militants killed, including Akhmed Chatayev. One special forces officer killed during skirmishes.
2024 Operation Golden Hand Rafah, Gaza Strip Israeli Hamas YAMAM and Shin Bet with support from the Israel Defense Forces 8 militants killed, all hostages were rescued safely.

Designing counterterrorist systems

The scope for counterterrorism systems is very large in physical terms and in other dimensions, such as type and degree of terrorist threats, political and diplomatic ramifications, and legal concerns. Ideal counterterrorist systems use technology to enable persistent intelligence, surveillance and reconnaissance missions, and potential actions. Designing such a system-of-systems comprises a major technological project. [44]

A particular design problem for counterterrorist systems is the uncertainty of the future: the threat of terrorism may increase, decrease or remain the same, the type of terrorism and location are difficult to predict, and there are technological uncertainties. A potential solution is to incorporate engineering flexibility into system design, allowing for flexibility when new information arrives. Flexibility can be incorporated in the design of a counter-terrorism system in the form of options that can be exercised in the future when new information is available. [44]

Law enforcement

While some countries with longstanding terrorism problems have law enforcement agencies primarily designed to prevent and respond to terror attacks, [45] in other nations, counterterrorism is a relatively more recent objective of law enforcement agencies. [46] [47]

Though some civil libertarians and criminal justice scholars have criticized efforts of law enforcement agencies to combat terrorism as futile and expensive [48] or as threats to civil liberties, [48] other scholars have analyzed the most important dimensions of the policing of terrorism as an important dimension of counter-terrorism, especially in the post-9/11 era, and have discussed how police view terrorism as a matter of crime control. [46] Such analyses highlight the civilian police role in counterterrorism next to the military model of a war on terror. [49]

American law enforcement

FBI Hostage Rescue Team agents FBI Hostage Rescue Team Agents bei einer Ubung.jpg
FBI Hostage Rescue Team agents

Pursuant to passage of the Homeland Security Act of 2002, federal, state, and local law enforcement agencies began to systemically reorganize. [50] [51] Two primary federal agencies, the Department of Justice (DOJ) and the Department of Homeland Security (DHS), house most of the federal agencies that are prepared to combat domestic and international terrorist attacks. These include the Border Patrol, the Secret Service, the Coast Guard and the FBI.

Following suit from federal changes pursuant to 9/11, however, most state and local law enforcement agencies began to include a commitment to "fighting terrorism" in their mission statements. [52] [53] Local agencies began to establish more patterned lines of communication with federal agencies. Some scholars have doubted the ability of local police to help in the war on terror and suggest their limited manpower is still best utilized by engaging community and targeting street crimes. [48]

While counter-terror measures (most notably heightened airport security, immigrant profiling [54] and border patrol) have been adapted during the last decade, to enhance counter-terror in law enforcement, there have been remarkable limitations to assessing the actual utility/effectiveness of law enforcement practices that are ostensibly preventative. [55] Thus, while sweeping changes in counterterrorist rhetoric redefined most American post 9/11 law enforcement agencies in theory, it is hard to assess how well such hyperbole has translated into practice.

In intelligence-led policing (ILP) efforts, the most quantitatively amenable starting point for measuring the effectiveness of any policing strategy (i.e.: Neighborhood Watch, Gun Abatement, Foot Patrols, etc.) is usually to assess total financial costs against clearance rates or arrest rates. Since terrorism is such a rare event phenomena, [56] measuring arrests or clearance rates would be a non-generalizable and ineffective way to test enforcement policy effectiveness. Another methodological problem in assessing counterterrorism efforts in law enforcement hinges on finding operational measures for key concepts in the study of homeland security. Both terrorism and homeland security are relatively new concepts for criminologists, and academicians have yet to agree on the matter of how to properly define these ideas in a way that is accessible.

Counterterrorism agencies

SEK members of North Rhine-Westphalia (Germany) during an exercise SEK-Einsatz vom Schlauchboot (10584688934).jpg
SEK members of North Rhine-Westphalia (Germany) during an exercise

Military

Given the nature of operational counterterrorism tasks national military organizations do not generally have dedicated units whose sole responsibility is the prosecution of these tasks. Instead the counterterrorism function is an element of the role, allowing flexibility in their employment, with operations being undertaken in the domestic or international context.

In some cases the legal framework within which they operate prohibits military units conducting operations in the domestic arena; United States Department of Defense policy, based on the Posse Comitatus Act, forbids domestic counterterrorism operations by the U.S. military. Units allocated some operational counterterrorism tasks are frequently special forces or similar assets.

In cases where military organisations do operate in the domestic context some form of formal handover from the law enforcement community is regularly required, to ensure adherence to the legislative framework and limitations. such as the Iranian Embassy siege, the British police formally turned responsibility over to the Special Air Service when the situation went beyond police capabilities.

See also

Related Research Articles

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

<span class="mw-page-title-main">Joint Terrorism Task Force</span> Multi-agency law enforcement partnerships in the United States

Joint Terrorism Task Force (JTTF) is an American locally-based multi-agency partnership between various federal, state, and local law enforcement agencies tasked with investigating terrorism and terrorism-related crimes, led by the Federal Bureau of Investigation and U.S. Department of Justice. The first JTTFs were established before the September 11 attacks, with their numbers increasing dramatically in the years after.

Terrorism and mass attacks in Canada includes acts of terrorism, as well as mass shootings, vehicle-ramming attacks, mass stabbings, and other such acts committed in Canada that people may associate with terroristic tactics but have not been classified as terrorism by the Canadian legal system.

<span class="mw-page-title-main">National Counterterrorism Center</span> U.S. government organization responsible for national and international counterterrorism efforts

The National Counterterrorism Center (NCTC) is a United States government organization responsible for national and international counterterrorism efforts. It is based in Liberty Crossing, a modern complex near Tysons Corner in McLean, Virginia. NCTC advises the United States on terrorism.

The Australian Intelligence Community (AIC) and the National Intelligence Community (NIC) or National Security Community of the Australian Government are the collectives of statutory intelligence agencies, policy departments, and other government agencies concerned with protecting and advancing the national security and national interests of the Commonwealth of Australia. The intelligence and security agencies of the Australian Government have evolved since the Second World War and the Cold War and saw transformation and expansion during the Global War on Terrorism with military deployments in Afghanistan, Iraq and against ISIS in Syria. Key international and national security issues for the Australian Intelligence Community include terrorism and violent extremism, cybersecurity, transnational crime, the rise of China, and Pacific regional security.

Integrated National Security Enforcement Teams are Canadian counterterrorist, counter-foreign interference, and counter-espionage units operating under the auspices of Public Safety Canada. These federal investigative teams were formed in 2002 in response to the September 11 attacks.

The threat of terrorism in Kazakhstan plays an increasingly important role in relations with the United States which in 2006 were at an all-time high. Kazakhstan has taken Uzbekistan's place as the favored partner in Central Asia for both Russia and the United States. Kazakhstan's counter-terrorism efforts resulted in the country's 94th ranking among 130 countries in the 2016 Global Terrorism Index published by the Institute of Economics and Peace. The higher the position on the ranking is, the bigger the impact of terrorism in the country. Kazakhstan's 94th place puts it in a group of countries with the lowest impact of terrorism.

New Zealand has experienced few terrorist incidents in its short history and the threat is generally regarded as very low. However, the Security Intelligence Service (SIS) has warned against complacency. This article serves as a list and compilation of past acts of terrorism, attempts of terrorism, and other such items pertaining to terrorist activities within New Zealand. Significant acts of terrorism include the bombing of the Rainbow Warrior in 1985, an act of state-sponsored terrorism by France, and the Christchurch mosque shootings in 2019, a far-right attack which resulted in 51 deaths and 40 injuries.

<span class="mw-page-title-main">Human Security Act</span> Philippine law

The Human Security Act of 2007, officially designated as Republic Act No. 9372, was a Philippine law that took effect on July 20, 2007. The law, which was watered-down after opposition from some politicians and rights groups feared the legislation would endanger human rights, was aimed at tackling militants, particularly the Abu Sayyaf, in the southern Philippines.

The counter-terrorism page primarily deals with special police or military organizations that carry out arrest or direct combat with terrorists. This page deals with the other aspects of counter-terrorism:

<span class="mw-page-title-main">International counter-terrorism activities of the CIA</span>

After the Central Intelligence Agency lost its role as the coordinator of the entire United States Intelligence Community (IC), special coordinating structures were created by each president to fit his administrative style and the perceived level of threat from terrorists during his term.

Presidential Decision Directive 62 (PDD-62), titled Combating Terrorism, was a Presidential Decision Directive (PDD), signed on May 22, 1998 by President Bill Clinton. It identified the fight against terrorism a top national security priority.

<span class="mw-page-title-main">Federal Investigation Agency</span> Pakistani Federal Law Enforcement Agency

The Federal Investigation Agency is a border control, criminal investigation, counter-intelligence and security agency under the control of the Interior Secretary of Pakistan, tasked with investigative jurisdiction on undertaking operations against terrorism, espionage, federal crimes, smuggling as well as infringement and other specific crimes.

The following outline is provided as an overview of and topical guide to the past and present terrorism in the United States:

The National Counter Terrorism Centre (NCTC) was a proposed federal anti-terror agency to be created in India, modelled on the National Counterterrorism Center of the US. The proposal arose after the 2008 Mumbai attacks a.k.a. 26/11 attacks where several intelligence and operational failures revealed the need for a federal agency with real time intelligence inputs of actionable value specifically to counter terrorist acts against India. The proposal has however met with much criticism from the Chief Ministers of various states who saw it as a means of weakening India's federalism, So finally the proposal was discarded saying already exists coordinating mechanisms in the system and government denied the need of NCTC.

<span class="mw-page-title-main">Anti-Terrorist Center (Ukraine)</span>

Antiterrorist Center at the Security Service of Ukraine is a permanent body at the Security Service of Ukraine, which coordinates the activity of the counterterrorism actors in the prevention of terrorist acts against state officials, objects of critical infrastructure and objects of increased danger, as well as acts that threaten life and health of a significant number of people, and termination of such terrorist acts.

<span class="mw-page-title-main">National Counter Terrorism Agency</span> Indonesian Government Department

The National Counter Terrorism Agency is an Indonesian non-ministerial government department that works to prevent terrorism. BNPT is headed by a chief, who is responsible to the President. When it was first launched, the leader of BNPT held the ranking of a civil servant but the Presidential Regulation in 2012 elevated the post of BNPT Chief to the ministerial level.

<span class="mw-page-title-main">State Security Service of Georgia</span> State intelligence agency of Georgia

The State Security Service of Georgia (SSSG) is a state intelligence agency of Georgia, under the authority of the Government, which covers a broad spectrum of tasks to preserve national security in accordance to state legislature and relevant laws. Its missions are to protect the constitutional order, sovereignty, territorial integrity and military potential of Georgia from illegal acts of special services and individuals of foreign countries; to prevent violent and unconstitutional change of order and state authority. Further it is to ensure economic security and fight terrorism on national and international level, transnational organized crime and international crime as well as carry out measures towards prevention, detection and suppression of corruption.

The National Special Operations Force (NSOF) has been Malaysia's main security force which serves as the first responder to any terror threats on the country's sovereignty after October 2016. The force covers elements from the Malaysian Armed Forces, Royal Malaysia Police and the Malaysian Maritime Enforcement Agency.

The UN Counter-Terrorism Implementation Task Force (CTITF) was an instrument designed to roll out the UN Global Counter-Terrorism Strategy.

References

  1. Stigall, Dan E.; Miller, Chris; Donnatucci, Lauren (October 7, 2019). "The 2018 National Strategy for Counterterrorism: A Synoptic Overview". American University National Security Law Brief. SSRN   3466967.
  2. "Introduction to Foreign Internal Defense" (PDF). U.S. Air Force Doctrine. February 1, 2020.
  3. "Introduction to Foreign Internal Defense" (PDF). Curtis E. Lemay Center for Doctrine Development and Education. Archived from the original (PDF) on January 24, 2017. Retrieved July 10, 2019.
  4. "Differences Between Foreign Internal Defense (FID) and Counter Insurgency (COIN)". SOFREP.
  5. Tim Newburn, Peter Neyroud (2013). Dictionary of Policing. Routledge. p. 262. ISBN   9781134011551.
  6. "Conception for the Establishment and Employment of a Border-Guard for Special Police Action (GSG9)" (PDF). September 19, 1972. Archived (PDF) from the original on October 9, 2022. Retrieved September 9, 2017.
  7. Shaffer, Ryan (2015). "Counter-Terrorism Intelligence, Policy and Theory Since 9/11". Terrorism and Political Violence. 27 (2): 368–375. doi:10.1080/09546553.2015.1006097. S2CID   145270348.
  8. "Preventive Counter-Terrorism Measures and Non-Discrimination in the European Union: The Need for Systematic Evaluation". The International Centre for Counter-Terrorism – The Hague (ICCT). July 2, 2011. Retrieved September 6, 2016.
  9. "Which Countries' Terrorist Attacks Are Ignored By The U.S. Media?". FiveThirtyEight. 2016.
  10. "Trade and Terror: The Impact of Terrorism on Developing Countries". Federal Reserve Bank of St. Louis. 2017.
  11. Sexton, Renard; Wellhausen, Rachel L.; Findley, Michael G. (2019). "How Government Reactions to Violence Worsen Social Welfare: Evidence from Peru". American Journal of Political Science. 63 (2): 353–367. doi:10.1111/ajps.12415. ISSN   1540-5907. S2CID   159341592.
  12. Lin, Patrick K. (2021). "How to Save Face & the Fourth Amendment: Developing an Algorithmic Auditing and Accountability Industry for Facial Recognition Technology in Law Enforcement". SSRN Electronic Journal. doi:10.2139/ssrn.4095525. ISSN   1556-5068. S2CID   248582120.
  13. Garvie, Clare (May 26, 2022), "Face Recognition and the Right to Stay Anonymous", The Cambridge Handbook of Information Technology, Life Sciences and Human Rights, Cambridge University Press, pp. 139–152, doi:10.1017/9781108775038.014, ISBN   9781108775038 , retrieved August 16, 2023
  14. "Why facial recognition use is growing amid the Covid-19 pandemic". South China Morning Post. November 18, 2020. Retrieved August 16, 2023.
  15. "The Challenges of Effective Counterterrorism Intelligence in the 2020s". June 21, 2020.
  16. Feiler, Gil (September 2007). "The Globalization of Terror Funding" (PDF). Begin-Sadat Center for Strategic Studies, Bar-Ilan University: 29. Mideast Security and Policy Studies No. 74. Retrieved November 14, 2007.{{cite journal}}: Cite journal requires |journal= (help)
  17. "Counter-Terrorism Module 12 Key Issues: Surveillance & Interception".
  18. Gill, Paul; Piazza, James A.; Horgan, John (May 26, 2016). "Counterterrorism Killings and Provisional IRA Bombings, 1970–1998". Terrorism and Political Violence. 28 (3): 473–496. doi:10.1080/09546553.2016.1155932. S2CID   147673041.
  19. Exclusive: Trump to focus counter-extremism program solely on Islam – sources, Reuters 2017-02-02
  20. "Proposals to further strengthen Australia s counter-terrorism laws 2005".
  21. Summary of Israeli Supreme Court Ruling on Targeted Killings Archived February 23, 2013, at the Wayback Machine December 14, 2006
  22. "Terror bill passes into law". The Jerusalem Post . June 16, 2016. Retrieved June 16, 2016.
  23. "Accountability and Transparency in the United States' Counter-Terrorism Strategy". The International Centre for Counter-Terrorism – The Hague (ICCT). January 22, 2015. Archived from the original on October 18, 2017. Retrieved September 6, 2016.
  24. "Fighting Terrorism Without Violating Human Rights". HuffPost. March 21, 2016.
  25. de Londras, Detention in the War on Terrorism: Can Human Rights Fight Back? (2011)
  26. 1 2 3 4 5 6 Human Rights News (2004): "Human Rights and Counter-Terrorism", in the Briefing to the 60th Session of the UN Commission on Human Rights. online
  27. 1 2 3 4 5 6 7 8 Amnesty International (2005): "Counter-terrorism and criminal law in the EU. online
  28. "UN experts call for removal of rights defenders Ramy Shaath and Zyad El-Elaimy from 'terrorism entities' list". OHCHR. Retrieved February 11, 2021.
  29. "Preventive Counter-Terrorism Measures and Non-Discrimination in the European Union: The Need for Systematic Evaluation". The International Centre for Counter-Terrorism-The Hague (ICCT). July 2, 2011. Retrieved September 6, 2016.
  30. Savun, Burcu; Tirone, Daniel C. (2018). "Foreign Aid as a Counterterrorism Tool – Burcu Savun, Daniel C. Tirone". Journal of Conflict Resolution. 62 (8): 1607–1635. doi:10.1177/0022002717704952. S2CID   158017999.
  31. Pape, Robert A. (2005). Dying to Win: The Strategic Logic of Suicide Terrorism. Random House. pp. 237–250.
  32. Trinquier, Roger (1961). "Modern Warfare: A French View of Counterinsurgency". Archived from the original on January 12, 2008. 1964 English translation by Daniel Lee with an Introduction by Bernard B. Fall
  33. Nagl, John A.; Petraeus, David H.; Amos, James F.; Sewall, Sarah (December 2006). "Field Manual 3–24 Counterinsurgency" (PDF). US Department of the Army. Retrieved February 3, 2008. While military manuals rarely show individual authors, David Petraeus is widely described as establishing many of this volume's concepts.{{cite journal}}: Cite journal requires |journal= (help)
  34. Ronchi, E. (2015). "Disaster management: Design buildings for rapid evacuation". Nature. 528 (7582): 333. Bibcode:2015Natur.528..333R. doi: 10.1038/528333b . PMID   26672544.
  35. Robert Johnson (November 19, 2012). "How Israel Developed Such A Shockingly Effective Rocket Defense System". Business Insider. Retrieved November 20, 2012.
  36. "IDF's 'David's Sling' missile system used to shoot down rocket barrage". The Jerusalem Post | JPost.com. May 10, 2023. Retrieved May 10, 2023.
  37. Weiss, Eric M. (January 11, 2005). "D.C. Wants Rail Hazmats Banned: S.C. Wreck Renews Fears for Capital". The Washington Post. p. B01.
  38. "Suicide bombing 'pig fat threat". BBC News. February 13, 2004. Retrieved January 2, 2010.
  39. "Swine: Secret Weapon Against Islamic Terror?". ArutzSheva. December 9, 2007.
  40. Stathis N. Kalyvas (2004). "The Paradox of Terrorism in Civil Wars" (PDF). Journal of Ethics. 8 (1): 97–138. doi:10.1023/B:JOET.0000012254.69088.41. S2CID   144121872. Archived from the original (PDF) on October 11, 2006. Retrieved October 1, 2006.
  41. Crewmen tell of scary ordeal Archived October 8, 2008, at the Wayback Machine The Star Sunday October 5, 2008.
  42. No choice but to pay ransom Archived December 5, 2008, at the Wayback Machine The Star Monday September 29, 2008
  43. "Ops Fajar mission accomplished". The Star . October 10, 2008. Archived from the original on October 24, 2008. Retrieved November 7, 2008.
  44. 1 2 Buurman, J.; Zhang, S.; Babovic, V. (2009). "Reducing Risk Through Real Options in Systems Design: The Case of Architecting a Maritime Domain Protection System". Risk Analysis. 29 (3): 366–379. Bibcode:2009RiskA..29..366B. doi:10.1111/j.1539-6924.2008.01160.x. PMID   19076327. S2CID   36370133.
  45. Juergensmeyer, Mark (2000). Terror in the Mind of God: The Global Rise of Religious Violence. Berkeley, CA: University of California Press.
  46. 1 2 Deflem, Mathieu. 2010. The Policing of Terrorism: Organizational and Global Perspectives. New York: Routledge.
  47. Deflem, Mathieu and Samantha Hauptman. 2013. "Policing International Terrorism." Pp. 64–72 in Globalisation and the Challenge to Criminology, edited by Francis Pakes. London: Routledge.
  48. 1 2 3 Helms, Ronald; Costanza, S E; Johnson, Nicholas (February 1, 2012). "Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror". Security Journal. 25 (1): 57–75. doi:10.1057/sj.2011.6. ISSN   1743-4645. S2CID   154538050.
  49. Michael Bayer. 2010. The Blue Planet: Informal International Police Networks and National Intelligence. Washington, DC: National Intelligence Defense College.
  50. Costanza, S.E.; Kilburn, John C. Jr. (2005). "Symbolic Security, Moral Panic and Public Sentiment: Toward a sociology of Counterterrorism". Journal of Social and Ecological Boundaries. 1 (2): 106–124.
  51. Deflem, M (2004). "Social Control and the Policing of Terrorism Foundations for a sociology of Counterterrorism". American Sociologist. 35 (2): 75–92. doi:10.1007/bf02692398. S2CID   143868466.
  52. DeLone, Gregory J. 2007. "Law Enforcement Mission Statements Post September 11." Police Quarterly 10(2)
  53. Mathieu Deflem. 2010. The Policing of Terrorism: Organizational and Global Perspectives. New York: Routledge.
  54. Ramirez, D., J. Hoopes, and T.L. Quinlan. 2003 "Defining racial profiling in a post-September 11 world." American Criminal Law Review. 40(3): 1195–1233.
  55. Kilburn, John C. Jr.; Costanza, S.E.; Metchik, Eric; Borgeson, Kevin (2011). "Policing Terror Threats and False Positives: Employing a Signal Detection Model to Examine Changes in National and Local Policing Strategy between 2001–2007". Security Journal. 24: 19–36. doi:10.1057/sj.2009.7. S2CID   153825273.
  56. Kilburn, John C. Jr. and Costanza, S.E. 2009 "Immigration and Homeland Security" published in Battleground: Immigration (Ed: Judith Ann Warner); Greenwood Publishing, Ca.

Further reading