Globalization and the Origin of New Terrorism: Perspectives and Challenges* Dr. Arvind Adityaraj Associate Professor P.G. Department of Political Science College of Commerce (a constituent unit of Magadh University, Bodh Gaya) Patna-800020, Bihar, India. *An Article for Presentation at the 23rd International Political Science Association’s Conference, scheduled to be held in Montreal, Canada from 20- 24 July 2014 in the Panel Violence and Politics, Session CS04, Comparative Politics and Institutions. Introduction: Terrorism is a dynamic phenomenon that develops over time, gradually changing its shape and activities. It is carried out by various organizations in the service of different ideologies. is the direct product of the glorification of violence and is one of the most serious problems faced by the world. It holds the democratic structures to ransom. Terrorists do not threaten just a nation or a people or an individual, they are literally at war with the rule of law, with the norms and ideals of civilization itself. Terrorism implies recourse to intimidation by the use of violence for pressurizing a government and society into accepting a radical political or social change. It is geographically widespread and ideologically assorted. It thrives on fear psychosis. Scores of countries today are bleeding from terrorism of one hue or another. Terrorists have their spiritual and intellectual role models in a galaxy of heroes featuring Sorel, Mao, Fanon, Marcuse, Malcolm X, Che Guevara, Guillen, Osama Bin Laden and several others. Terrorism implies those acts of violence which seek to implant terror in the minds of the people in general and the supporters and members of a governmental establishment in particular. The methods employed may be threats to murder, assassination, kidnapping for ransom, hijacking of passenger aircrafts, throwing bombs or resorting to indiscriminate firing in a crowded place, attacking passenger trains and buses and gagging the press etc. Celeb Carr in his book The Lessons of Terror points out that terrorists are in a state of perpetual mobilization, they have undergone military training and are fully organized, they possess effective intelligence service, the protection of a state, cell based operative system that are remarkably difficult to crack1. A terrorist is technologically sophisticated, global and his cause is transnational. He mobilizes opinions in his favourably tapping people living in different countries who have the same culture, religion and political aspirations. The New Terrorism: Terrorism has quantitatively and qualitatively changed from previous years. Globalization process widened the support for terrorism. As globalization created negative consequences and marginalization of some groups and global social and economic inequalities, terrorism gained more support from many marginalized people in different nations, and became more global. As stated by Kronin frustrated populations are against the US-led globalization. People at the lower end of the social and economic spectrum realized that they cannot have equal shares in the global world, their demands are not recognized by the strong nations and started to show reactions. 1 These reactions became threatening as they have started to give support to terrorism against globalization. According to Kronin, the ones left behind or threatened by the US-led globalization increasingly felt the need to assert their identity against the forces of homogeneity threatening by terrorism. The terrorists groups while fighting against globalization also benefit from its consequences. Using the technological advances in communication, these groups can easily contact and operate. Regardless of its agents being an individual- an individual terrorist or a terrorist group, today terrorism threatens the entire globalized world. Whether it is Gurr and Coleman‘s ―third wave of vulnerability‖ or Rapoport‘s ―fourth wave of terrorism,‖ contemporary terrorism is a significant departure from the phenomenon even as recently as during the Cold War. The US National Security Strategy has recognized terrorism, in the memorable phrase ―the crossroads of radicalism and technology,‖ as the predominant security threat in the post-Cold War world. The cataclysmic impact of 9/11 on both the American strategic consciousness and the international security environment can scarcely be overstated. Those attacks resulted from a combination of cultural, political, and technological factors and were a revelation to the world of the emergence of the new terrorism. The means of the ―new‖ terrorism are also assumed to be radically different from the past. The premise is that because the ends of the new terrorism are unlimited, so, too, are the means that groups espousing these goals are willing and able to use. The new terrorists are supposed to be dedicated to causing the largest possible number of casualties among their enemies. According to Walter Laqueur, ―The new terrorism is different in character from the old, aiming not at clearly defined political demands but at the destruction of society and the elimination of large sections of the population.‖2 According to Steven Simon, "Religiously motivated terrorism, as Bruce Hoffman of the Rand Corporation first noted in 1997, is inextricably linked to pursuit of mass casualties."3 Presumably for the ―new‖ terrorists the means have become an end in themselves. Thus the contemporary terrorists are also thought to be significantly more inclined than traditional secular groups to use WMD (Weapons of Mass Destruction). Jessica Stern, for example, argues that the risk of terrorist use of nuclear, chemical, or biological weapons against civilians is growing not only because of the increased availability of such weapons but because of changes in terrorist motivation: ―A new breed of terrorists – including ad hoc groups motivated by religious conviction or revenge, violent right-wing extremists, and apocalyptic and millenarian cults – appear more likely than the terrorists of the past to commit acts of extreme violence.‖4 The ―old‖ terrorism is considered to be much more restrained and specific in targeting. The traditional terrorist, according to Brian Jenkins‘ now famous aphorism, wanted people watching, not people dead. Hoffman describes the old terrorists as selective and discriminating.5 Benjamin and Simon are of the view that earlier terrorists used ―carefully calibrated violence‖ because they knew that excessive brutality would deny them the place they sought at the bargaining table. These terrorists imposed restraints on their actions because they aimed to change the attitudes of audiences who could help them achieve their goals. Their audiences and reference groups were tangible and present. They were limited by their dependence on constituencies and by their political interests. Their pursuit of legitimacy in effect, restrained their behavior. However, the ―old‖ terrorists were not always discriminating in their choice of targets. Levels of selectivity and restraint vary across groups and across time, but not necessarily according to a religious-secular or past-present divide. The French anarchists of 2 the 1880s bombed restaurants frequented by the bourgeoisie in order to show the working class who the true enemy was. ―No bourgeois is innocent‖ was their slogan. The history of anarchism in Spain was particularly violent. Nationalist groups have also caused mass casualties. In 1946, the bombing of the King David Hotel in Jerusalem by Zionist extremists killed 91 and injured 45 persons6. During the Algerian war, the FLN (Front de Libération Nationale) attacked Europeans indiscriminately, leaving bombs in cafes, on beaches, in soccer stadiums, and at bus stops in Algiers during the famous ―Battle of Algiers.‖ Their bombs often killed Algerians as well as Europeans. Globalization and Terrorism: The process of globalization, which involves the technological, political, economic and cultural diminution of boundaries between countries across the world, has insinuated a self-interested, inexorable, corrupting market culture into traditional communities. Many see these forces as threatening their way of life. At the same time that globalization has provided a motivation for terrorism, it has also facilitated methods for it such as computerization, digitization, satellite communication, optic fiber and internet. What world is witnessing today is global insurgency which is an organized movement of non-state actors aimed at the overthrow of values, cultures or societies on a global level with the ultimate goal of establishing a new world order. Global insurgency applies not to a single terrorist organization but collectively to many terrorist organizations throughout the world. These organizations have established a global, interconnected network of operations that often provides mutual aid and support in which it is difficult to isolate a particular group of faction without drawing linkages to other organizations that provide direct support, indirect assistance, or pursue similar goals. Terrorist organizations, ranging from those with global reach to local influence, support one another in an interconnected fashion. With modern communication technology and ability to move in open societies, theirs is a ―virtual nation‖, which possesses many of the instruments of power, including informational, military and economic means. Radical Islamic belief and a common abhorrence of Western culture tie these organizations together. Terrorists are now able and willing to develop network forms of organization for the same reason that businesses are. The information revolution, by lowering the cost of communication, allows the organizations to push functions outside a controlling hierarchical structure. Organizations can thus flatten out their pyramids of authority and control and approach a network form, a group of more or less autonomous, dispersed entities, linked by advanced communications and perhaps nothing more than a common purpose. Motivating or compelling the move from hierarchy to network is the advantages that an organization acquires as it transforms itself. It becomes more flexible, adaptive and resilient because each of its units senses and reacts on its own in loose coordination with the others. This multiplies the opportunities for the organization to learn, making it more flexible and adaptive. The organization becomes more resilient because if one or even several of its constituent entities are destroyed, the others carry on. A network, unlike a hierarchy, cannot be destroyed by decapitation. In the case of the terrorists, the loosely linked autonomous entities that make up a network might be individuals, such as Ramzi Yousef, who masterminded the 1993 World Trade Centre bombing and the Bojinka plot7 and is currently serving two life sentences, or cells such as those involved in the leaderless resistance of the Christian Patriot Movement in the United States. Leaderless resistance is a system of organization that is based upon the cell organization, but does not have any central control or direction or instruction, as would those who belong to a typical pyramid organization8.The entities making up terrorist networks might also be large, more formal, even 3 hierarchical organizations that work together without any common hierarchy or central commanding authority between them. Whatever the components of the network, what makes it a network is the absence of this central authority or control.9 It is this feature that gives networks their flexibility, adaptivenesss and resilience, allowing them advantages over any government. While globalization has helped remove many of the restraints that state sponsorship once imposed, terrorists can still enjoy the funding and protection that sponsorship provides. Another factor of globalization that benefits terrorism is targeting: ―In today‘s globalizing world, terrorists can reach their targets more easily; their targets are exposed in more places, and news and ideas that inflame people to resort to terrorism spread more widely and rapidly than in the past.‖10 Among the factors that contribute to this are the easing of border controls and the development of globe-circling infrastructures, which support recruitment, fundraising, movement of materiel, and other logistical functions. In addition to international political changes, developments in organizational practice have enhanced the lethality of terrorists. As corporations have evolved organizationally, so have terrorist organizations. Terrorist groups have evolved from hierarchical, vertical organizational structures, to more horizontal, less commanddriven groups. Terrorist leadership is derived from a ―set of principles that can set boundaries and provide guidelines for decisions and actions so that members do not have to resort to a hierarchy. They know what they have to do‖. The organizational designs may ―sometimes appear acephalous (headless), and at other times polycepalous (Hydra-headed).‖11 Paul Smith observed that the multi-cellular structure of Al Qaeda gave the organization agility and cover and has been one of its key strengths12.This flexibility has allowed al Qaeda to establish bases using indigenous personnel all over the world. It has infiltrated Islamic nongovernmental organizations in order to conceal operations13. Jessica Stern recently commented on Al Qaeda‘s ability to maintain operations in the face of an unprecedented onslaught: The answer lies in the organization‘s remarkably protean nature. Over its life span, Al Qaeda has constantly evolved and shown a surprising willingness to adapt its mission. This capacity for change has consistently made the group more appealing to recruits, attracted surprising new allies, and— most worrisome from a Western perspective—made it harder to detect and destroy14. With the onset of the twenty first century the concept of terrorism is subjected to a revision in relation to goals, capabilities and dimension of threats. This terrorism is distinguished from the old by a new structure, a new kind of personnel and a new attitude towards violence. The new structure, facilitated by information technology, is a network of amateurs. An established government‘s disadvantage when confronting amateur networked terrorists is the apparent increased willingness of ‗new terrorists‘ to inflict mass casualties. They often come together in transitory groupings with an increased willingness to cause mass casualties. The amateur participation suggests that ‗new terrorists‘ no longer need state sponsorship as much as their predecessors did15. This trend among terrorists to eschew direct connections with state sponsors has had several advantages for the enterprising extremists. They no longer have the fear of refraining from the use of extreme methods for the fear of alienating political support. Terrorist groups are more likely to maintain support from ―amorphous constituencies‖. They can now more easily appeal to an ethnic or religious Diaspora or to political sympathizers around the world. They can also more easily get their message to a world-wide audience or to the people of the country or countries they deem most important in their struggle. Through the world-wide web, they have access to important sources of information. The ‗new terrorism‘ idea gained further momentum with the 1995 Aum Shinrikyo‘s16 sarin gas attacks on the Tokyo subway and the bombing of the federal building in 4 Oklahoma City by Timothy McVeigh. Growing awareness of the extent of the Al Qaeda conspiracy caused more alarm, especially after Osama Bin Laden moved from the Sudan to Afghanistan and called for jihad against the United States in 199617. The 1998 bombings of American embassies in Kenya and Tanzania, the attack on the USS Cole in the port of Yemen in 2000, and the discovery of the millennium plots18 strengthened the perception of a new threat. Since 2003, the global spread of suicide bombings against civilian targets has contributed to the feeling that terrorism has changed fundamentally. There exists another set of scholars on terrorism who maintain that the departure from the past is not as pronounced as new terrorism proponents think. Today‘s terrorism is not a fundamentally or qualitatively ―new‖ phenomenon but grounded in an evolving historical context. Contemporary terrorism shares many of the characteristics of past terrorism. The networked structure of the new terrorism differs little from the structure of the old terrorism. The Palestine Liberation Organization (PLO), for example, was itself an umbrella group, like Hizballah19, whose dominant faction, Fatah, did not have a monopoly of power and whose constituent parts have had different relations with each other, splintering and adhering and developing different policies and strategies. One analyst of the PLO has spoken of it as a ‗network of relationships.20‘ Furthermore, the PLO was networked externally, by some reports, with up to 21 different organizations that the PLO had previously trained or supplied with weapons and other logistical support.21 Marxist or left-wing revolutionary groups also became network-like as ideological differentiation lead to structural complexity. Many of these groups, such as the Red Army Faction (RAF), were, despite the hierarchical connotation of the word ‗army‘, not very hierarchical at all. The RAF spawned second and third generations haphazardly and remained more a collection of terrorists sharing a common purpose than a hierarchical organization. However, the magnitude of violence and lethality, extensive use of information technology to disseminate ideology and indoctrinate and to mold the mind the youth in their fold and of course the business like network structure clearly point towards the significant departure of ―old terrorism‖ to ―new terrorism‖ Religious Terrorism: The growth of religious terrorism and its emergence in recent years as a driving force behind the increasing lethality of international terrorism shatters some of our most basic assumptions about terrorists and the violence they commit. It also raises serious questions about the continued relevance of much of the conventional wisdom on terrorism particularly as it pertains to potential future terrorist use of WMD22. There is growing recognition by scholars and the intelligence community that the current international terrorist threat does not come from organizations motivated by nationalist grievances or separatist goals (such as the IRA, ETA, Fatah, LTTE, PKK, and others). Instead, the main threat is that of radical Islamic terrorism primarily aimed at promoting a radical religious world view. Hoffman stresses that while religion was an inseparable component of many terrorist organizations in the past, the dominant motivation for their actions was political rather than religious. This is not the case with Al-Qaeda and other radical Islamic organizations today. For them, religion is the most important component defining their activities, ideology, characteristics, and recruitment methods. According to James Thomson, ―Religions are very effective at guiding in-group morality and out-group hatred. They minimize the fear of death by spreading the belief in an afterlife reward for those who are dying in a holy war etc23.‖ 5 Radical Islamic terrorism, part of the Global Jihad movement, includes acts perpetrated by many organizations, groups, and cells around the world. The brand name that Al Qaeda established and then managed to franchise after the 2001 attacks on the United States has been dramatically successful. The leaders of Al Qaeda, through a few spectacular attacks, field training, motivation and shrewd media manipulation, created out of a small organization a brand that has been embraced with enthusiasm by alienated Muslims in many parts of the world. Al Qaeda has become a ‗network of networks‘; it is a ‗movement‘ that embraces disparate, and often contradictory, objectives among groups that have little to do with each other, except that they now share a general sympathy for a new global caliphate, among their other objectives. Few of them are committed only to the creation of a new caliphate, but they believe they share common enemies. As an organization, after the elimination of its supreme leader Osama Bin Laden, Al Qaeda now hardly exists, and yet it is a rallying cry; it instigates very few terrorist attacks itself, and yet it inspires them and is the incarnate enemy to many in Western countries. The Al Qaeda Core organization continues to exist in the Afghan–Pakistan border region. But it is now almost certainly of marginal operational significance24. There are also terrorist organizations that combine religious grievances with nationalpolitical motivations, such as Hamas. On the one hand, Hamas derives its ideology from the same narrative and background as Al-Qaeda, based on the early religious global ideology of the Muslim Brotherhood. At the same time though, Hamas seeks to achieve the nationalistic goal of destroying Israel and creating a Palestinian state in its place. Al Qaeda, its allies in the Global Jihad movement, other radical Islamic terrorist organizations, and the radical Islamic networks and cells of the West, all believe in one divine mission, which calls upon them to spread their radical beliefs throughout the world25. In seeking to achieve this mission, they believe it is permissible and necessary to make use of violence and terrorism, and that they are fighting a ―defensive war‖. They are against every aspect of modernization, including democratic forms of government, liberal values, and even modern technology that threaten the way of life they strive for – a radical Islamic caliphate governed by Sharia law. It is also important to note that the threat of Global Jihad is not, as many tend to think, a war between Islam and other religions. Rather, it can be understood as a war of cultures – the culture of radical Islam against the outside world; or the culture of radical Islam against the culture of the ―infidels,‖ as Islamists call all those who do not share their world view26. Many in the radical Jihadi movement recognize that they will not be able to succeed in their worldwide campaign in the near future. Therefore they aim, as a first stage, to create localized radical Islamic revolutions, primarily in Arab and Islamic countries. In fact, the majority of Global Jihad attacks over the past several years occurred in countries of the Arab or Islamic world, such as Egypt, Jordan, Iraq, Turkey, Algeria, Morocco, Saudi Arabia, Yemen, and Indonesia. The goal of such attacks is to destabilize local regimes and create political unrest, establishing the conditions necessary for radical movements to take control of the country‘s government. A large percentage of these attacks target tourist destinations, serving a dual purpose – they cause Western causalities and damage a primary source of income for the targeted Muslim country. Such attacks seriously undermine a country‘s ability to provide critical services to its citizens, ultimately leading to criticism, unrest, and government instability27. Attacks against Western targets – such as in New York, Washington or even London, Madrid served the same purpose; they deter Western countries from being involved in an Islamic campaign or providing military assistance and economic support to non-fundamentalist Islamic governments. Consistent with the method of modern terrorism and Global Jihad strategy, fear of 6 terrorist attacks felt by Americans, British, and other western citizens is meant to translate into pressure on decision-makers to change their policies and adopt a policy of isolationism, consequently weakening non-radical Muslim governments that would otherwise be supported by western governments. A significant achievement of this strategy was the shift in the Spanish elections following the series of terrorist attacks on four commuter trains in Madrid in March 2004, in which 191 people were killed and over 1,500 injured. The attacks came three days before general elections, apparently leading to the defeat of the incumbent party that had been leading in opinion polls. The new government decided to pull out Spanish troops deployed in Iraq. Without western support, aid, and involvement, it is difficult for non-radical Arab and Muslim governments to stay in power, which ultimately promotes the strategic goals of the Global Jihad movement28. The dynamic nature of the terrorism phenomenon has also been represented by AlQaeda‘s changing methods of operation and organizational structure. Until the 11September 2001 attacks, Al-Qaeda operated as an organized hierarchy with a top leadership level, a midrank level, and a lower level of activists carrying out orders and directives from above. As such, the September 11 attacks were carried out as a result of an organized decision-making process and complex preparations over a long period of time. However, Al-Qaeda experienced a shift in organizational structure post 9/11, partly in response to the American military campaign that followed the attacks. The occupation of Afghanistan, the destruction of the organization‘s administrative and operational infrastructure, loss of support from the Taliban and a significant amount of manpower, and the demolition of training camps, recruitment offices and facilities, effectively forced Al-Qaeda to change its structure and method of operation. Without autonomous territory in Afghanistan from which to operate, or freedom of movement for the organization‘s leaders and activists, the hierarchical structure of the organization and the control level of the organization‘s leadership over its activists were severely damaged29. Apart from direct, organized, and hierarchical processes of carrying out attacks, following the campaign in Afghanistan, the majority of Global Jihad attacks were carried out by affiliate organizations belonging to bin Laden‘s network, part of the “International Islamic Front for Jihad against Jews and Crusaders.” Other attacks were carried out by independent Jihadist organizations that actively support Al Qaeda‘s world view. Such ―indirect attacks‖ are often initiated by Al Qaeda‘s leadership, and on certain occasions are even supported by Al-Qaeda on the operational level. Ultimately though, the attacks are perpetrated by organizations functioning as proxies of Al Qaeda30. In the past several years, Al Qaeda has undergone an additional developmental process. In addition to its reliance on proxy organizations to conduct terror attacks, Al Qaeda has focused on spreading its ideology through international media, mosques, and Islamic community centers, and – most significantly – through the world wide web. The organization seeks to inspire young Muslims around the world and especially in Western countries, to perpetrate attacks in their immediate environment. This phenomenon, known as ―homegrown terrorism,‖ is the current trend in radical Islamic terrorism. It works to influence the hearts and brainwash the minds of many young people around the world – first- and second-generation Muslim immigrants, converts to Islam, and others – creating a radicalization process within various Muslim communities. This method of operation is not a substitute for direct attacks in the 9/11 model or even for indirect attacks through proxies; rather it functions in addition to these methods. Homegrown terrorism constitutes a dangerous threat to western society because it is carried out by Western citizens in their own countries. These local activists have a clear 7 advantage over external actors: they are embedded within these societies, know the society‘s weak points better than others, can move about freely, know the local language, and operate alone or as part of small local networks that are often very difficult to infiltrate. Marc Sageman explains how such networks are assembled: ―A group of people can be viewed as a network, a collection of nodes connected through links. Some nodes are more popular and are attached to more links, connecting them to other more isolated nodes. These, more connected nodes, called hubs are important components of a terrorist network‖31. As earlier noted, the internet serves as a critical modern technology that in many cases connects various nodes of a terrorist network. Radical Islamic internet websites, blogs, forums, and chat rooms create virtual radical Islamic communities, facilitating the spread of materials of incitement, supporting the radicalization process and bridging geographic barriers. The internet allows such radical activists to circumvent censorship and prepare recruits to carry out attacks. Instead of the physical training facilities it lost in Afghanistan, Al-Qaeda has begun using ―cyber replacements‖ in order to recruit and train terrorists. The internet provides the organization direct access to a much larger pool of potential activists, all without the ability of government authorities to effectively monitor or thwart their activities32. Another source of concern stemming from the dynamic processes of modern terrorism is the possible use by Global Jihad organizations of nonconventional measures [Chemical, Biological, Radiological and Nuclear (CBRN)] in their attacks. Religiously motivated terrorists are thought more likely to conduct mass casualty attacks because, unlike politically motivated terrorists, they are not constrained by the fear that excessive violence will offend some constituency, since they care only about a small circle of the elect. Nor, for this reason, unlike politically motivated terrorists, is their intent to pressure or persuade their opponents. For religious terrorists, the world is divided into ‗us‘ and ‗them‘, and the latter are to be destroyed. Today, the world is essentially witnessing an extended process of transition from modern terrorism to postmodern terrorism. While studies indicate that past and current use of CBRN and WMD by terrorist groups is actually quite rare, many in the intelligence and academic community expect the trend will continue and even grow as radical Islamic terrorist organizations, who see themselves as fighting a total war to save Islam from the infidels – and do not hesitate to commit suicide in carrying out their attacks – will imitate these methods in an attempt to maximize the number of casualties in their attacks and heighten anxiety among the target population. Challenges and Recommendations: Global security has been affected by a transformation of the nature of war and the transition from old to new terrorism, which presents markedly different challenges than traditional terrorism. Effectively coping with the phenomenon of terrorism requires local and international action on two levels; addressing both terrorist‘s motivation and their operational capabilities. It is a state‘s responsibility and duty to protect its citizens, and so it must work to reduce terrorist organization‘s operational capabilities through preventative and offensive action (and sometimes also defensive action) based on intelligence resources. With the development of modern terrorism and its continuing international reach, the physical and moral damage incurred by terrorist acts has increased to such an extent that it arguably threatens the proper functioning of open society, the world economy, and the maintenance of humanitarian and liberal values and hence, making counter-terrorism efforts all the more crucial. 8 Measures to Effectively Counter the Threat of Terrorism and Global Jihad Networks: First and foremost it requires a well-coordinated and multidisciplinary campaign that takes advantage of all possible resources – intelligence, economic, security related, and diplomatic. It is important to recognize that it takes a network to defeat a network, which is only possible if the world community agrees together on the nature of the terrorist threat, prioritizing counter terrorism on their national agendas and coordinating in all their efforts. As a prerequisite, the international community must agree on one international objective and comprehensive definition of terrorism, which is not broad or vague, that refers to terrorism as an outlawed method of operation that no goal can justify. The implications of such efforts – which require the cooperation of the academic, security, and intelligence communities – lie in the perpetuation or termination of the threat; only when such coordination is established can the world community deal effectively with the operational capabilities of the Global Jihad movement and the modern terrorist threat. Establishing an alliance of countries that share the common goal of effectively countering global terrorism would be one step in creating a broad-based and international response to terrorism. Such an alliance could reflect the NATO model. A 3D strategy has to be designed to combat terrorism on three fronts. The first is to defeat existing terrorist organizations by using all instruments of power directed at destroying their ability to survive and operate. The second is to develop the international instruments and mechanism that will deter future acts of terrorism and preclude state and non- state actors from providing support, sponsorship and sanctuary to terrorist organizations. The third is to diminish the underlying causes of terrorism and to banish any expectations that terrorism will result in political, ideological or material gain. Global terrorists pose a unique threat because they view the entire world as their battlefield. With extensive support networks and financing, global terrorists are likely to obtain weapons of mass destruction. They might also use them, being free from the moral constraints that often restrict a nation-state‘s freedom of action. Global terrorists pose unique challenges as they expand their influence to numerous like-minded terrorist organizations. Their broad appeal to individuals, organizations, and states creates a virtual nation, spanning entire continents. Hence, sharing resources is critical in terms of global, regional, and state efforts to defeat terrorist organizations and to achieve the abolishment of terrorism as a method for political change. When responding to the threat of terrorism, the coalition partners should understand that the terrorists do not attack simply to inflict damage on specific targets but to solicit a response that will further their cause. The true battle is over the hearts and minds of the people whom the terrorists are trying to influence. Misapplied or misdirected retaliation may prove to be counter-productive. Therefore, short-term gains in the effort to defeat 9 terrorist organizations must be carefully weighed against the longer-term battle for the hearts and minds of the larger population. Anticipation, initiative, and pro-action are the keys to achieve success. Proactive engagement by the simultaneous use of diplomatic, informational, military, and economic resources to undermine terrorist groups and their support and sanctuary, while deterring their plans and attacking their assets, is critical. Diplomatic pressure ranging from negotiations, incentives, and international condemnation to loss of diplomatic status— should be employed to end support for terrorism. Five centers of gravity common to all terrorist organizations are: leadership, ideology, financial support, sanctuaries, and command and control capabilities. Destruction, elimination, or disruption of any of the five will severely impede the ability of terrorist organizations to function. Improve intelligence capabilities to identify sanctuaries and share that information to assist states in defeating terrorism on their soil. Develop technologies and capabilities that improve border control mechanisms and share them with states around the world, focusing on information and data systems that help prevent undesirables from crossing borders. Develop training and assistance programs to aid states and international organizations in their efforts to deny terrorist organizations sanctuaries and safe havens. Terrorist organizations rely on digital communications system. The Internet in particular poses serious challenges because of the anonymous nature of the network. User identification names can be changed as often as necessary and public locations such as Internet cafes and libraries provide capabilities with no return address. While this center of gravity may be difficult to influence, it represents an essential capability for terrorist organizations to operate in a global fashion. Remote and isolated terrorist cells must be directed from a centralized but distant location. Global communications systems enable this dispersed network of operations. Nevertheless difficult to affect, to disrupt terrorist command and control systems research and development of methods to detect, track, and confront terrorist organizations needs to be encouraged. Conclusion: The fight against terrorism has become a priority for all the nations. It is well established that there exists an interconnection between security and globalization in the context of terrorism in its new avatar . Security has become so complex and multi-dimensional that traditional national border-setting type of security perception is not capable of recognizing new threats that transcend the national borders.. Global terror as well as other risks in the twenty first century requires cooperation for security. Terrorism has undergone dramatic changes in recent years. The categorical fanaticism that is apparent in terrorist organizations across a spectrum of belief systems is a major part of this change. In the past, terrorists were more likely to be dominated by pragmatic considerations of political and social change, public opinion, and other such factors. Today, terrorists bent on death and destruction for its own sake, is more commonplace than ever. In addition, the statelessness of today‘s terrorists removes crucial restraints that once held the most extreme terrorists in check or prevented them from reaching the highest levels in their 10 organizations. Terrorists can still enjoy the funding and shelter that only a national economy can mobilize, but they are on their own to a greater degree in greater numbers than in the past. Organizationally, terrorists are using the non-hierarchical structures and systems that have emerged in recent years. Finally, the growing level of threat, its international scope, its lethality and the possible use of nonconventional terrorism necessitate future multidisciplinary research in the field and a more cohesive international response. Notes and References: 1. Swagato Ganguly, ―Terror Through the Ages‖ a book review article in the Literary Section of The Sunday Statesman (Kolkata), 2 June 2002. 2. ‗The Madarssa Scapegoat‘, The Washington Quarterly, 29, 2 (Spring 2006), p.122. 3. Simon, America and the New Terrorism: An Exchange, 2000. Simon and Benjamin state that ―A distinguishing characteristic of many religiously motivated terrorists….is their overriding interest in killing‖, p.171. 4. 48 Jessica Stern, The Ultimate Terrorists (Cambridge: Harvard University Press, 1999), p. 8. 5. Bruce Hoffman, Inside Terrorism, Columbia University Press, New York, 1998, p. 197. 6. J. Bowyer Bell, Terror out of Zion (New York: St. Martin‘s Press, 1977), p. 172. 7. The Bojinka plot was a planned large-scale three phase Islamist attack by Ramzi Yousef and Khalid Sheikh Mohammed. The attack would involve a plot to assassinate Pope John Paul II, an air bombing of 11 airliners flying from Asia to the United States and their approximately 4,000 passengers, and a proposal to crash a plane into the CIA's headquarters in Fairfax County, Virginia. Despite his careful planning and the skill of Ramzi Yousef, the Bojinka plot was disrupted after a chemical fire drew the Philippine National Police's (PNP) attention on January 6–7, 1995. Before the plot was disrupted, Yousef detonated test bombs in a mall and theater, injuring scores of people, as well as Philippine Airlines Flight 434, killing one person and nearly causing enough damage to result in the destruction of the aircraft. Endnote 7 of Chapter 5 of the 9/11 Commission Report states that Khalid Sheikh Mohammed "says bojinka is not Serbo-Croatian for 'big bang', as has been widely reported, but rather a nonsense word he adopted after hearing it on the front lines in Afghanistan." 8. Louis Beam, ‗Leaderless Resistance’, available on http://www.crusader.net/texts/bt/bt04.html, 9. On the differences between networks and other forms of organization, see Francis Fukuyama and Abram N. Shulsky, The Virtual Corporation and Army Organization (Santa Monica: RAND 1997) pp.4–24. 10. National Commission on Terrorism, Countering the Changing Threat of International Terrorism: Report of the National Commission on Terrorism (Washington: GPO, 2000). 11 11. John Arquilla, David Ronfeldt, and Michele Zanini, ―Networks, Netwar, and Information-Age Terrorism,‖ in Countering the New Terrorism, ed. Ian O. Lesser et al., MR-989-AF (Santa Monica, Calif.: RAND, 1999), p. 51. 12. Paul J. Smith, ―Transnational Terrorism and the al Qaeda Model: Confronting New Realities,‖ Parameters, 32 (Summer 2002), 37. 13. Ibid., p. 37 14. Jessica Stern, ―The Protean Enemy,‖ Foreign Affairs, 82 (July/August 2003). 15. David Tucker, ―What‘s New about the New Terrorism and how dangerous is it‖. Terrorism and Political Violence, 13 (Autumn, 2001) pp. 1-14. 16. Japan‘s sect of Aum Shrinrikyo (supreme truth) acquired worldwide notoriety after its members planted nerve gas in the Tokyo subway in 1995 killing twelve persons and harming several others, is a mysterious group of pseudo-religious fanatics who are pathologically obsessed with the idea of destruction. They hold the view, albeit imprecisely, that the present day world must be destroyed wholly to enable the new one to arise out of its ashes. 17. Martha Crenshaw, The debate over ―New‖ vs. ―Old‖ Terrorism‘, Article prepared for the Annual Meeting of the American Political Science Association, Chicago, Illinois, August 30 – September 2, 2007. 18. The Year 2000 attack plots, also known as the Millennium Plot, were a series of terrorist attacks that were planned to occur on or near January 1, 2000, with the bombing of four sites in Jordan, the bombing of Los Angeles International Airport (LAX), and the bombing of the USS The Sullivans (DDG-68).The first two plots were foiled by law enforcement agencies; the third was aborted after a mistake occurred. While the various attacks were planned to occur around the same date, there is no evidence that the three plots were coordinated in any way. 19. John Arquilla, David Ronfeldt and Michele Zanini, ‗Networks, Netwar, and Information Age Terrorism‘, in Zalmay M. Khalilzad and Jon P. White (eds.) The Changing Role of Information in Warfare (Santa Monica: RAND 1999) p.95. 20. Helena Cobban, The Palestine Liberation Organisation, People, Power and Politics (Cambridge: Cambridge University Press 1984) p.140. 21. Hoffman, Inside Terrorism (note 5) pp.84, 113. 22. Ibid. 23. J. A. Thomson, Killer Apes on American Airlines or How Religion was the Main Hijacker on September 11, In Violence or Dialogue; Psychoanalytic Insights on Terror and Terrorism, eds. S. Varvin and V.D. Volkan London: International Psychoanalytical Association. 24. Michael Clarke and Valentine Soria, Terrorism; The New Wave, Rusi Journal, August/September 2010. Vol. 155, No. 4, pp.24-31. 25. M. Sageman, Understanding Terror Networks, Philadelphia PA: University of Pennsylvania Press. 12 26. Boaz Ganor, Trends in Modern Terrorism, D. Weisburd et al. (eds.). To Protect and to Serve: Policing in an Age of Terrorism, Springer Science + Business Media, LLC 2009. Pp.11- 42. 27. Ibid. 28. Ibid. 29. Ibid. 30. Ibid. 31. M. Sageman, op. cit. (Ref. No. 22) 32. D.D. Jessee, Tactical Means, Strategic Ends: Al Qaeda‘s Use of Denail and Deception, Terrorism and Political Violence 18 (3): 367-388. Bibliography: Abadie, A. 2004. Poverty, Political Freedom, and the Roots of Terrorism. KGS Faculty Research Working Paper Series RWP04–043. Cambridge: Harvard University. Bandura, A. 1973 Aggression: A Social Learning Analysis. Englewood Cliffs, London: Prentice-Hall. Bandura, A. 1998. Mechanisms of Moral Disengagement. In Origins of Terrorism, ed. W. Reich, Washington, DC: Woodrow Wilson Center. Campbell, J. K. 2000. On not Understanding the Problem. In Hype or Reality? The “New Terrorism” and Mass Casualty Attacks, ed. B. Roberts, Alexandria, V.A. The Chemical and Biological Arms Institute. Cooper, H. H. A. (―Tony‖) 1978. Psychopath as terrorist: A psychological perspective. Legal Medical Quarterly 2: 253 – 262. Crenshaw, M. 1998. The logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice in Origins of Terrorism, ed. W. Reich , Washington, DC : Woodrow Wilson Center . Crenshaw, M. 2000. The psychology of terrorism: An agenda for the 21st century. Political Psychology 21 (2): 405 – 420. Friedland, N. 1992. Becoming a Terrorist: Social and Individual Antecedents. In Terrorism: Roots, Impact, Responses, ed. L. Howard. New York: Praeger. Gal-Or, N. 1991. Do Western Societies Tolerate Terrorism? In Tolerating Terrorism in the West: An International Survey, ed. N. Gal-Or, London: Routledge. Ganor, B. 2005. The Counter-Terrorism Puzzle: A Guide for Decision Makers. New Brunswick, NJ: Transaction Publishers. Gibbs, J. P. 1989. Conceptualization of Terrorism. American Sociological Review 54 (3): 329 – 340. Harmon, C. 2000. Terrorism Today. London: Frank Cass. Hasisi, B, and A. Pedahzur. 2000. State, Policy, and Political Violence: Arabs in the Jewish State. Civil Wars 3: 64 – 68. Hoffman, B. 1995. Holy terror: The Implications of Terrorism Motivated by a Religious Imperative. Studies in Conflict & Terrorism 18 (4): 271 – 284. Hoffman, B. 1998. Inside Terrorism. New York: Columbia University Press. 13 Hoffman, B. 2004. Defining Terrorism. In Terrorism and Counter Terrorism, eds. R. D. Howard and R. L. Sawyer, Dubuque: McGraw-Hill. Horgan, J. 2005. The Psychology of Terrorism. London: Routledge. Hubbard, D. C. 1971. The Skyjacker: His Flights of Fantasy. New York: Macmillan. Hudson, R. A. 2003. Terrorist and Organized Crime Groups in the Tri-Border Area (TBA) of South America Washington, DC: Federal Research Division, Library of Congress. Jessee, D. D. 2006. Tactical Means, Strategic Ends: Al Qaeda‘s Use of Denial and Deception, Terrorism and Political Violence 18 (3): 367 – 388. Krueger, A. B, and J. Maleckova . 2003. Education, Poverty and Terrorism: Is There a Causal Connection? Journal of Economic Perspectives 17 (4): 119 – 144. Laqueur, W. 1987. Terrorism and the Media. In The Age of Terrorism, ed. W. Laqueur London: Weidenfeld and Nicolson. Madani, B. 2002. Hezbollah‘s Global Finance Network: The Triple Frontier. The Middle East Intelligence Bulletin www.meib.org/articles/0201_l2.htm Melnick, R. and R. Eldor. 2004. Financial Markets and Terrorism. European Journal of Political Economy 20 (2): 367 – 386. Nacos, B. 1994. Terrorism and the Media: From the Iran Hostage Crisis to the World Trade Center Bombing. New York: Columbia University Press. Pearce, K. I . 1977. Police Negotiations – New Role for Community Psychiatrist. Canadian Psychiatric Association Journal 22 (4): 171 – 175. Rapoport, D. C. 1984. Fear and Trembling – Terrorism in 3 Religious Traditions. American Political Science Review 78 (3): 658 – 677. Roth, K. 2004. The Law of War in the War on Terror – Washington‘s Abuse of ―Enemy Combatants‖. Foreign Affairs 83 (1): 2. Sandler, T, J. T. Tschirhart, and J. Cauley. 1983. A Theoretical Analysis of Transnational Terrorism. American Political Science Review 77 (1): 36 – 54. Schmid, A. P. 1983. Political Terrorism: A Research Guide to the Concepts, Theories, Databases and Literature. Amsterdam: North Holland. Schmid, A. P. 1993. Terrorism and Democracy. In Western Responses to Terrorism, eds. A. P. Schmid and R. D. Crelinsten, London: Frank Cass. Vidino, L. and S. Emerson . 2006. Al Qaeda in Europe: The New Battleground of International Jihad. Amherst, NY: Prometheus Books. Webb, G. R. 2002. Sociology, Disasters, and Terrorism: Understanding Threats of the New Millennium. Sociological Focus 35 (1): 87 – 95. Wedgwood, R, and K. Roth. 2004. Combatants or Criminals? How Washington Should Handle Terrorists. Foreign Affairs 83 (3): 126. Wilson, M. A. 2000 .Towards a Model of Terrorist Behavior in Hostage-Taking Incidents. Journal of Conflict Resolution 44 (4): 403 – 424. ***************************************************** 14 15
© Copyright 2026 Paperzz