Defining the Problem and Reaching a Solution: A Reflection on How to Counter Violent Extremism

IMG 0630 - Defining the Problem and Reaching a Solution: A Reflection on How to Counter Violent Extremism

“Violent extremism knows no boundaries.” That was the message that Rise to Peace founder Ahmad Mohibi used to open “How to Counter Violent Extremism,” the latest Rise to Peace panel discussion, which took place this Tuesday at the Elliott School of International Affairs. With that in mind, the panelists – Leanne Erdberg, U.S. Institute of Peace; Jesse Morton, Parallel Networks; and Edward Burkhalter, U.S. Department of State – offered their perspectives on the best ways to counter violent extremism.

The panel’s first challenge was defining extremism and terrorism. Leanne Erdberg offered a legal definition: terrorism is limited to action, while extremism also includes violent thoughts. Jesse Morton focused on the definition’s practical implications. Terrorists, he poses, are cemented in their action, and thus countering terrorism is necessarily catching and punishing those who commit violent acts. An extremist is undergoing a cognitive radicalization process and can pulled away from extremist movements. Counterterrorism, he says, is the realm of law enforcement, but CVE is more complicated, and requires the engagement of more stakeholders.

Conversation then moved to how the problem of extremism has grown. Jesse Morton observed that mainstream media informs social media radicalization. For example, Islamophobic narratives in news media fuels polarization narratives used by radicalizers online. In a similar vein, Edward Burkhalter noted that A 24-hour news cycle can make problems seem more severe than they really are, and it is important to focus discussion on proven research.

Panelists then discussed the shortcomings of past efforts to curtail violent extremism. Jesse Morton provided historical background by discussing the roots of the “hearts and minds” in marketing campaigns and advertising.

Leanne Erdberg built on this theme by questioning the framing of programs and success in general. She argues that CVE that operates within an advertising scheme, which treats the communities they serve as an audience rather than giving them agency over the process. Programs that abandon that approach and instead emphasize people taking their future into their own hands are more empowering and more successful.

Ahmad Mohibi discussed CVE shortcomings in the context of Afghanistan. He said that CVE is impossible without trust, and in Afghanistan the trust between the Afghan and American government and the Afghan people is lacking. As long as people feel disconnected and distrustful of their leaders, extremism will continue. Edward Burkhalter provided a U.S. government perspective, acknowledging the futility of trying to improve a community without consulting its members. He elaborated, saying that the U.S. tries to follow a “do no harm” approach, and be sure that CVE or development efforts do not have unintended consequences. The only way to accomplish that is by relying on local partners.

A look at Saudi Arabia in light of recent events and moving forward

5ac69e33146e7126008b46b8 750 375 - A look at Saudi Arabia in light of recent events and moving forward

President Donald Trump shakes hands with Abu Dhabi’s Crown Prince Mohammed bin Zayed Al Nahyan during a meeting with leaders at the Gulf Cooperation Council Summit, at the King Abdulaziz Conference Center, Sunday, May 21, 2017, in Riyadh, Saudi Arabia. Trump will use the nation that is home to Islam’s holiest site as a backdrop to call for Muslim unity in the fight against terrorism Sunday, as he works to build relationships with Arab leaders.AP Photo/Evan Vucci

Last Monday I attended the Inaugural Annual Gulf International Conference in Washington D.C. where Saudi-American journalist Jamal Khashoggi was scheduled to speak on the importance of a free press.

However, over the weekend, Khashoggi disappeared while visiting the Saudi Embassy in Istanbul. On Monday while at the conference, the official word was that the Saudi government had no knowledge of the situation but would examine it closely.

At the conference, Khashoggi’s presence and spirit were palpable, but most participants believed Khashoggi was murdered for speaking out against the regime’s reign of terror in Yemen. Since the conference, the Saudi government’s position has shifted from denial to assertions that the journalist died in a fist-fight during interrogation.

It is no coincidence that the President of the United States took his inaugural international trip to Saudi Arabia, while predecessors chose neighboring countries like Canada or Mexico.

President Trump voiced his friendship with the Kingdom while still on the campaign trail, and continued his support from the beginning of his presidency, making it clear that he wanted a strong diplomatic and economic relationship with the Saudi government.

Although President Trump espoused the importance of a strategic partnership with the Saudis as a way to stabilize the region, many have questioned his motivation. In 2001, he sold the entire 45th floor of Trump World Tower to the Kingdom of Saudi Arabia for $4.5 million. It is this relationship that many believe has, at least partly, clouded his judgment. Trump spent the week supporting the Crown Prince and King, claiming they denied involvement and pledged to investigate and hold accountable those who killed
Jamal Khashoggi.

The U.S. has a complicated relationship with Saudi Arabia and the death of Jamal Khashoggi makes it even more complex.

The Saudis invest heavily in the U.S. economy and have traded in excess of $23 billion per year. However, the Saudi government is also said to have economic ties to terrorist organizations, not to mention an abysmal human rights record. The U.S. government has repeatedly overlooked both the terror funding and human rights violations.

The current administration is said to have even greater motivation to overlook human rights issues. The president’s son-in-law and Senior Policy Advisor to the Middle East, Jared Kushner has close relations with the Crown Prince. Additionally, the U.S. has secured a multi-million dollar arms deal, which the President touts as a boom for defense jobs (this remains to confirmed).

Complicating the relationship and U.S. response is the fact that Khashoggi was a U.S. resident who wrote for the Washington Post, but not a U.S. citizen, justifying a more hands-off approach from the President.

At the conference, congressmen, journalists, and retired ambassadors resoundingly supported punitive action by the U.S. against the Saudi regime. Many speakers shamed President Trump and called for the United States to cut diplomatic ties with the Saudis, enact sanctions, and put human rights ahead of arms deals. The consensus was that continuing to support the Saudi regime after such a blatant act of violence designed to silence a critic called into question not just the ethics of Saudi Arabia, but also the ethics and values of the U.S.

Would the U.S. put an arms deal ahead of human rights, knowing that the arms would be used in the Saudi’s campaign against the people of Yemen? One week after the conference, the truth regarding Khashoggi’s disappearance is beginning to emerge, and a clearer picture of the Saudi regime is coming into focus.

One week ago, the Saudi government denied any involvement in Khashoggi’s death, and today they reiterate their denial of their role in attacks on civilian targets in Yemen. There is undisputed evidence
that the Saudis were involved in Khashoggi’s death and that of many civilians in Yemen, yet the regime continues to stall, deflect, lie, and justify their actions, while the U.S. and international community look the other way.

It is time to shine the light clearly on the Saudi government’s actions and stop their terroristic activities and human right abuses.

It is time to hold them accountable for their military campaign in Yemen, the financial support of terror groups such as the Taliban and Hamas, and the death of Jamal Khashoggi. No doubt, a sustainable solution that puts human rights ahead of violence is going to be a difficult solution to implement. But if we put an arms deal first, worsening the humanitarian crisis in Yemen, disrespecting basic freedoms, then we are complicit.

The Threat of Drone-Based Terror

Drone - The Threat of Drone-Based Terror

On August 4, 2018, President Nicolás Maduro of Venezuela was attacked with explosive-laden drones during a political rally. Although the drones were not successful in assassinating the Venezuelan leader, they managed to injure seven national guardsmen who were at the rally.

A few weeks earlier in July, the Public Safety Secretary of Mexico’s Baja California was also targeted by an armed drone, although the attached IED did not detonate. Attacks such as these are indicative of the burgeoning threat that drone-related terror can play in today’s world.

No longer is drone technology limited to the militaries of countries like the United States, Nigeria, or Pakistan. Instead, groups such as Hezbollah, the Houthi rebels, and the Islamic State are getting in on the action. In fact, ISIS recently threatened Paris with a drone attack. As drones become easier to obtain and use, attacks using this technology will become more frequent, more sophisticated, and more deadly.

The barriers to carrying out a drone-based terror attack are lower than ever. Lightweight hobby drones are cheap, easy to purchase and allow terrorist groups to carry out attacks from a distance. While military drones are less accessible and harder to operate, they do provide a higher operational capacity and have a number of avenues by which terrorist groups can obtain them. In this way, drone-based terror is comparable to nuclear terror.

Hobby drones, like a dirty bomb, can easily be weaponized, but have a relatively small impact, while military drones, like a weapon of mass destruction, can be stolen, bought from a rogue state or corrupt official, and has a high potential impact. Additionally, improvements in battery and camera technology will only increase the negative impact of drone-based terror as groups learn to harness these ever-increasing capabilities. In recent testimony to the Senate Committee on Homeland Security and Government Affairs, FBI Director Christopher Wray stated that drones, “will be used to facilitate an attack in the United States against a vulnerable target, such as a mass gathering.”

The Security Challenges of Drone-Based Terror

Drone-based terror presents unique security threats and challenges. The particular tactical flexibility inherent to drones forces a rethinking of current security strategies. Traditional notions of perimeter defense and target hardening no longer apply when the threat is as maneuverable and flexible as a drone.

Small drones can be used in swarms to destroy commercial airliners, disrupt military operations through hyper-local targeting, or inflict asymmetric damage on civilian targets. Additionally, drones can and have been used in conjunction with more traditional methods of terror.

During the Islamic State’s defense of Mosul, drones were used to guide suicide bombers and improve the accuracy of rocket and mortar fire. The coalition’s anti-drone no-fly zone was quickly counteracted by a do-it-yourself solution implemented by fighters on the ground. Further, drones can conduct both intelligence and counterintelligence operations: terrorist groups could use drones to jam military communications, survey battlefields, and download sensitive data.

In addition to conventional attacks and military-based operations, drones could be engineered to disperse chemical weapons, biological agents such as viruses or Anthrax, or even radioactive material. A September 2018 National Terrorism Advisory System Bulletin warned that, “some terrorist groups overseas are [pursuing] new technologies and tactics, such as unmanned aerial systems and chemical agents,” while Hezbollah may have the ability to carry out biological warfare using drones.

Finally, aerial drones are not the only technology terrorist groups can exploit. In January 2017, Houthi rebels killed two Saudi soldiers with a sea-based drone. As aquatic drone technology continues to proliferate, terrorist capabilities may widen to include attacks on coastal cities. Aquatic drones maintain the security challenges of aerial drones but can dramatically widen the target range of drone-based terror. Land-based drones may pose a threat as well, since “fighters in Syria and Iraq have been […] experimenting with remotely controlled vehicles and small robots for nearly a decade.”

Countering Drone-Based Terror

US doctrine focuses on active and passive defense, as well as a proactive intelligence-based approach, to countering air threats. Because of the small size, speed, and maneuverability of drones, they may not be detectable to forms of active defense reliant on radar. However, communication jamming may be a particularly effective form of defense against drones, reducing targeting accuracy and thus the potential threat.

Additionally, acoustic and radio detection methods can make up for radar’s shortcomings in countering drone incursion. On the passive side of defense, simple behavioral changes like hosting high-profile events indoors, varying arrival and departure agendas of potential target personnel, and changing transport routes can make all types of terror, not just drone-based attacks, more difficult. Finally, greater control and oversight of the supply chain, through the monitoring of suspicious purchases and cooperation with manufacturers, would decrease the likelihood of terrorist groups acquiring drones in the first place.

Drone-Based Terror Takeaways

Drone-based terror can be seen as an emerging threat to the global security environment which demands immediate and creative solutions. Terrorist groups are already making use of drones in the air, at sea, and on land in a variety of situations and capacities. The barriers to acquiring, arming, and using drones are lower than ever, and drone-based attacks come with their own unique security challenges. As drone technology improves, becomes cheaper, and proliferates, militaries will have to reckon with new security paradigms to combat this rapidly-evolving threat.

What Afghanistan Needs to Move Forward: National Unity

General Abdul Raziq Kandahar small 1170x610 - What Afghanistan Needs to Move Forward: National Unity

Brigadier General Abdul Raziq, Kandahar Chief of Police, speaks to the assembled locals of Kajran in Daykundi Province during a shura on October 22. DoD photo by Cpl. Mark Doran, Australian Defence Force/Released.

Afghanistan’s hero, General Abdul Raziq, was killed just days before the parliamentary elections, leaving a wide power vacuum in the Taliban’s birthplace, Kandahar.

General Raziq was shot and killed as he was leaving a U.S.-Afghan meeting in Kandahar, where Gen. Austin S. Miller, the Commander of American forces in Afghanistan, the Kandahar provincial governor, and other leaders were present.

General Raziq had survived dozens of life-threatening attacks but continued to fight against terrorism in the southern provinces of Afghanistan. He was proactive and took a strong stand against Pakistan, accusing it of providing sanctuary to the Taliban. The Taliban feared him terribly and he was regarded as a rampart against insurgents in the area.

His death is a significant loss for Afghanistan and the southern provinces are likely to be significantly impacted. Not only did General Raziq keep Kandahar and the southern provinces safe, but he also worked hard to facilitate Afghan consensus despite longstanding, intense conflicts between ethnicities and tribes. He had hoped for a bright and peaceful Afghanistan.

He was effective in fighting extremism, in encouraging Afghan unity, and in coordinating with leaders in the U.S. coalition.

Gen. Raziq was an influential American ally in the south where he was loved by Afghans for his patriotism and passion for bringing peace through eliminating insurgency. He was known for hunting and killing Taliban insurgents. Gen. Raziq said repeatedly that the goal was to, “kill them, not capture;” he was keenly aware of their destructive potential.

Abdul Raziq 2829362b - What Afghanistan Needs to Move Forward: National Unity

Lt. Gen. Joseph Anderson, commander of International Security Assistance Force Joint Command, greets Maj. Gen. Abdul Raziq, police chief of Kandahar province

Gen. Raziq joined the Coalition for the Salvation of Afghanistan, led by Ata Mohammad Noor, Gen. Dostum, Mohammad Mohaqiq, and other reps from 34 political parties to vouchsafe a transparent election, and a legitimate government that fights extremism and serves the public.

An attack like the one that killed Gen. Raziq provokes doubt and despair. It spurs suspicions of governmental coordination behind such attacks and others like it: Gen. Daud Daud, Burhan-Uddin Rabbani, the former president of Afghanistan, the bombing of the Ministry of Defense, and others since 9/11. The Taliban leverages such paranoia for its purposes.

What’s next?

Over the past two weeks, America’s special envoy for Afghan Peace and Reconciliation, Zalmay Khalilzad, held talks with the Taliban’s political office in Qatar for a negotiated settlement of the Afghan conflict.

Next, Khalilzad met with senior officials in Saudi Arabi, Pakistan and Afghanistan to facilitate the Afghan peace process. All the while, the Taliban continues to execute deadly attacks, eliminating key figures, suggesting they do not want to negotiate, and undermining any hope for peace.

Going forward, Afghanistan stability relies on the following factors: 1) transparent parliamentary and presidential elections wherein a legitimate government is formed without foreign intervention, 2) a national peace process that includes all of the tribes in Afghanistan with meetings taking place only between Afghans, and 3) creation of a counter-insurgency policy that is three steps ahead of the enemy.

Help From Outside

The international community can foster change by supporting more education, helping with infrastructure redevelopment, and monitoring progress against corruption and social injustice. This would empower Afghans to build resilience against the terrorists who jeopardize national security.

Ultimately, the future of Afghanistan depends on its people. Good governance, transparent elections, economic development, education, and ethnic harmony all lie along the path to peace.

Afghans must realize that discrimination is ruining the nation, corruption is feeding terrorism, and division is eroding the values that ought to unify Afghans. When they recognize those challenges and commit to overcoming them, they can begin taking steps toward a lasting peace.

The Price of a Free Press: Jamal Khashoggi

E2BCDC6A A3F2 439F 9DC6 FF3C0FB74BDD w1023 r1 s - The Price of a Free Press: Jamal Khashoggi

People hold signs during a protest at the Embassy of Saudi Arabia in Washington about the disappearance of Saudi journalist Jamal Khashoggi, Oct. 10, 2018.

The last time anyone saw Saudi Journalist Jamal Khashoggi alive was Oct. 2nd when security cameras caught him entering the Saudi Consulate in Istanbul. Authorities presume he was murdered there. After openly criticizing the Saudi government, Khashoggi moved to Northern Virginia where he lived in self-imposed exile from Saudi Arabia.

Khashoggi, who wrote for the Washington Post, has been critical of the kingdom’s Crown Prince Mohammad bin Salman and King Salman for the past 10 years. He questioned the kingdom’s human rights positions, criticized the religious clerics, sided with Egypt during the Arab Spring, and more recently voiced opposition to the Saudi led intervention in Yemen.

Turkish authorities were quick to support Khashoggi’s fiancé in blaming the Saudi government.

The Saudis allegedly lured the journalist to the consulate in Istanbul where they presumably murdered him. His death has not been confirmed, but there is no security footage of him leaving the consulate. The official position of the Saudi government is they have no additional information.

The King of Saudi Arabia denied all knowledge of the situation to President Trump. However, a new theory and potential Saudi ploy is this was an interrogation gone wrong and an accidental death.

Turkish authorities were quick to support Khashoggi’s fiancé in blaming the Saudi government. Turkey suggested they had both video and voice evidence that the Saudis tortured and murdered Khashoggi in the consulate. There is speculation that Khashoggi might have recorded some of the incident via an Iwatch which sent data to a cloud storage, although this has not been released. The Turkish authorities have said the Saudi government is not cooperating with their investigation.

In an age when the press is already under attack by world leaders, for many, this is a red-line. Interestingly, although not uncharacteristically, U.S. President Trump has waffled in his response. He noted he would like to know what happened to the journalist. But he also noted he believes the Saudi King, and even suggested “rogue actors” could have done this without anyone’s authority. In other words, the American president is running interference for the Saudis. 

Jamal Khashoggi knew he endangered his life by speaking out and questioning his country’s leadership, but he did it anyway.

Trump was again dismissive as he noted, “This took place in Turkey, and to the best of our knowledge Khashoggi is not a U.S. citizen,” in a chilling devaluation of the Virginian’s life and profession. The President also said if there is definitive proof, he will act swiftly. But Trump is not going to jeopardize a multi-billion dollar arms deal. 

The President places more value thereupon than he does the ethics of journalism and murder. We shall see whether the Republican-controlled Congress falls into step with the President, or maintain their earlier call for sanctions.

If we lack a free press that can question leadership, then we lose transparency and governmental accountability. Jamal Khashoggi knew he endangered his life by speaking out and questioning his country’s leadership, but he continued to do so. He fervently believed in the power and responsibility of a free press, and likely paid the ultimate price. 

As the journalist, Anna Politkovskaya wrote,  “How we react to the tragedy of one small person accurately reflects our attitude…” Politkovskaya, like Khashoggi, was murdered for her willingness to question, seek the truth, and advocate for a free press. The question remains for world leaders, how will we react?   

US Online Counterterrorism Strategy

2018 10 18 Holly Pic 300x169 - US Online Counterterrorism Strategy

Last week on October 4th the Trump administration released the new National Strategy for Counterterrorism. The White House strategy rightly prioritizes strong partnerships with allies and is refreshingly devoid of the president’s more controversial ideas. However, it curiously lacks any plan to combat the most serious evolution in terrorist threat since the last strategy was released in 2011. That is the towering success of social media as a tool for terrorists to radicalize, recruit and organize followers the world over.

ISIS’ cunning use of social media radicalized people the world over.

The US government must not only acknowledge this as the major threat that it is but develop new legislation that permits it to combat terrorist activity online. The internet continues to provide free space for terrorists to advance their causes and incite violence, all under the protection of the US constitution’s 1st Amendment. Our government must acknowledge this threat and develop a strategy to stop the dissemination of dangerous domestic terrorist propaganda on the internet. Importantly, it must do so without encroaching on US citizens’ rights to free speech.

Terrorism relies on publicity. ISIS’ capability to radicalize people the world over through its cunning use of social media was widely credited as one of the main reasons for its rapid growth, as well as its ability to create a global brand. Domestic terrorists have used the internet to accomplish the same thing. A 2016 study revealed that American white nationalist movement’s Twitter followers increased by 600% since 2012, surpassing ISIS in follower counts and tweets per day. Online forums and social media accounts provide safe spaces for violent rhetoric that extremists don’t feel comfortable using in public. For both radical Islamists and white supremacists, the internet has provided an effective means to broadcast their malicious,  hateful messages to the world.

Tech companies are not up to the threat; they are businesses with the prime motivator of profit generation, not national security.

The risks of terrorists exploiting the internet are uncontested. However, a broad interpretation of the 1st Amendment has wrapped the US government’s knuckles. Restraints on the government’s ability to censor content have left major national security decisions up to private companies, who lack the expertise to assess a threat to national security and public safety. And while tech giants like Facebook have recently stepped up their efforts to censor and report terror content, private companies should not own that burden alone.  

Tech companies have proven themselves to be inadequate to face this threat. They are businesses with the prime motivator of profit generation, not national security. In addition, they typically hold strict Libertarian views of the internet. Such companies see the internet as a common space for the free sharing of ideas. They tend to be extremely resistant to censorship of any kind. Too much government cooperation could sway public perception to their being in bed with Big Brother.

The United Nations Office on Drugs and Crime has clearly stated the significance of US leadership in passing new legislation: “It would be extremely helpful to other countries if the United States could find a solution to its limited ability to furnish judicial cooperation concerning foreign incitement offenses resulting from its jurisprudence concerning freedom of speech and expression.” 

The US cannot afford to continue without a strategy to combat digital terrorism. We must open the issue to new scrutiny. Such scrutiny starts with developing a clear and specific definition of what kinds of content can be censored. Laws that allow censorship already exist, such as the Child Online Protection Act (COPA) and recent Congressional prohibitions on sex traffickers. Why not censor content shown to be a precursor to terrorist attacks? Only content deemed to cause “imminent lawless action” would pass constitutional muster for restriction. What the US needs is a new federal bureau with combined expertise in national security, law, and technology.

In the event congressional action fails, what is a good interim solution?

With new legislation in place, tech companies will no longer decide what constitutes a threat to national security. They will also avoid the perception of denying free speech since they will simply be complying with the law. Some have suggested that a “Code of Ethics” be developed for social media companies which would create a more uniform approach to combatting terrorism. In the event congressional action fails to materialize this would be a good interim solution. If we can effectively fight terrorism in the virtual space, we can prevent the loss of lives in the real world.

Lone Wolf Bio-Terror: Are We Prepared?

2018 02 11 Maya Norman BioTerror 300x225 - Lone Wolf Bio-Terror: Are We Prepared?

It’s no secret that the lone-wolf threat to Europe is bad, and worsening. However, it’s not just an increasing number of lone wolves, but the variety of tactics they’ll employ in terror’s service that makes prevention a challenge. 

It’s no secret that the lone-wolf threat to Europe is bad, and worsening.

According to Britain’s Security Minister and top counter-terrorism officer, Ben Wallace, it is likely that a biological or chemical terror attack is on the horizon. At a security conference in London, last Tuesday Wallace warned, “The only limit to the ambition of our adversaries is their imagination.

Chemical and biological weapons are getting closer.

Chemical and biological weapons are getting closer. They have developed and worked on a better arsenal. We have to be prepared for the day when that comes to our streets.” Implicit in his remarks was the notion that counter-terror specialists, as well as governments, must be equally imaginative in their pro-activity.

One major challenge governments face in trying to thwart chemical and biological attacks is the scale. If one person releases tiny amounts of a chemical agent like Anthrax, it could have implications for hundreds, or, millions of people. Traffic flow disruptions, water supply tainting, exposure areas untouchable, these are just some of the possibilities. 

Governments and private contractors have little experience with bio-terrorism. If terrorists were to release biotoxins in civilian areas, the damage could be enormous.

A terrorist need only infect one person, who could then infect her (sic) social circles. Epidemic exposure rates could be a reality faster than you can say Cipro, bringing repercussions on a global scale. The terrorists would need to do very little. The disease would naturally spread at a velocity that grows exponentially.

The probability of these attacks is increasing, and it’s time that governments took note. Currently, there is no international system in place specifically to combat chemical and bio-terror.

If a terrorist infected someone with a biological agent in New York, and then that person flew to Germany infecting people in Berlin, German and American authorities would have no pre-existing framework within which they could cooperate, info-share about how to stop the disease’s transmission, and help those infected. 

The international community will have to work together with maximum efficiency. Unfortunately, it seems governments, unlike terrorists themselves, have a fixed view of terrorism.

It is critical that such a framework is in place before the scenario unfolds. In the event of a biological or chemical terror attack, time will be of the essence. The international community will have to work together with maximum efficiency. Unfortunately, it seems governments, unlike terrorists themselves, have a fixed view of terrorism.

Governments use major resources to plan for shooters, suicide bombers, and other common acts of terror. Diversifying those resources and intensifying the focus on biological and chemical terrorism could, in the future, save countless lives.

Nuclear Terrorism: Threat Profile and Potential Impact

2018 10 04 Liam Pic 300x169 - Nuclear Terrorism: Threat Profile and Potential Impact

The typical profile of a terrorist attack may include gunmen storming a government building or a suicide bomber detonating his explosive vest in a crowd of festival attendees. However, arms wonks, policy makers, and scientists have long been attuned to a more sinister threat: a radiological dispersal device, or dirty bomb. A dirty bomb is a conventional explosive outfitted with a radiological contaminant such as strontium or cesium, which kills not only through explosive force but radioactive contamination as well.

Terrorist groups can create dirty bombs without much scientific expertise–the difficulty is not in designing the weapon but acquiring the radioactive material. However, according to the Nuclear Threat Initiative, radiological sources are common in commercial or medical devices and are often poorly secured and vulnerable to theft. In fact, as early as 1998, nineteen tubes of radioactive cesium were stolen from a hospital in North Carolina and were never recovered. Poorly secured nuclear facilities in Russia and former Soviet states are also at threat for theft of nuclear materials, with facilities in a number of Russian provinces and Georgia reporting theft.

A Center for Nonproliferation Studies outlined four possible threats of nuclear terrorism. These include the theft and detonation of an intact nuclear weapon, the theft or purchase of radioactive material and subsequent construction of an improvised nuclear device, attack against nuclear power plants, and the construction and detonation of a dirty bomb. Some sources have stated that nuclear terrorism may already be a reality: documents found in Herat, Afghanistan have indicated Al-Qaeda has been in possession of a dirty bomb since 2003, and radioactive contaminants before then.

In 2017, Indonesian militants acquired low-grade radioactive Thorium-232, which they hoped to transform into more potent Uranium-233. This uranium would then be combined with a homemade explosive to produce a dirty bomb. When ISIS conquered Mosul in 2014, radioactive Cobalt-60 was housed on a university campus in the city, ripe for the taking.

While the terrorist group proclaimed they had seized radioactive material and took over laboratories at the same university, Iraqi government officials later discovered they had not touched the Cobalt-60. Terrorist groups have long been aware of the deadly capabilities of a nuclear attack and have sought to plunder, purchase, or create dirty bombs with which to carry out nuclear attacks. At the same time, governments and nuclear scientists are aware of the threat posed by terrorists to nuclear facilities and actively work to upgrade security systems to combat it.

Despite efforts by a number of terrorist groups to obtain radioactive material and build a nuclear bomb, some experts believe the threat of nuclear terrorism is overblown. A number of explanations for terrorist nuclear abstinence have been proposed. These include the difficulty of carrying out such an attack, the disruptive impact of counter-terrorism efforts, and the potential for a nuclear attack to undermine the terrorist cause rather than advance it. Since the overwhelming majority of terrorist attacks to date have been simplistic strikes such as those utilizing knives, conventional explosives, or vehicles, a RAND Corporation analysis concluded, “Governments would be better off focusing their efforts on combating the spread and use of conventional weapons,” as opposed to countering nuclear terrorism.

Even assuming a terrorist group was able to carry out a dirty bomb attack, its impact may be limited. While the public may imagine dirty bombs as capable of killing hundreds or thousands of people, the death toll would more likely be limited to fewer than 100 people. If impacted civilians leave the area quickly, remove contaminated clothing, and shower to wash off radioactive debris, a dirty bomb does not pose much of a threat. However, the economic, psychological, and social costs of a dirty bomb would be much larger. As such, governments must be prepared for the long-term impact of a nuclear terrorist threat more than an initial attack. Costly, long-lasting decontamination efforts may be necessary depending on the level of radioactive contamination, and the public may be afraid of returning to the attack location, causing economic and social disruption.

Nuclear terrorism is a threat that has been underappreciated by the general public, but it has been recognized by counter-terrorism experts, governments, and scientists for some time. While the likelihood of a nuclear terror attack may be slim and the initial deadly effects small, the long-term threat of a dirty bomb attack means governments must upgrade nuclear security efforts at hospitals, power plants, and other facilities containing nuclear materials. Although prior thefts of radioactive material have not yet resulted in nuclear terrorism, it is only a matter of time before a dirty bomb or other nuclear threat becomes a reality.

An Invisible Problem in Plain Sight

900A7EBE D7A6 4D4B 8156 62877C0D2F5A w1023 r1 s - An Invisible Problem in Plain Sight

Riot police patrol Zhanaozen in December.

Within the realm of counter-terror, governments focus on preventing attacks at the source as well as at the target. Often, western governments define the target as their own backyard.

Likewise, they define the source as some far-off region at war. That point of view is not illegitimate. However, experts recognize extremist ideology is on the march across north and west Africa, southeast Asia, and Eurasia. And attacks tend to be on government or religious targets within the attacker’s own region.

Before an ISIS-linked cell in Tajikistan killed four cyclists from Switzerland, the Netherlands and the United States there was scant information about the rise of extremism there.

Are we noticing? Well, western media has vested interests in Nigeria and Mali thanks to French and British influence. Similarly, western media have vested interests in the Philippines thanks to former US dependency. But what about Eurasia? Despite emerging from under the Soviet shroud it remains poorly understood. Before an ISIS-linked cell in Tajikistan killed four cyclists from Switzerland, the Netherlands and the United States there was scant information about the rise of extremism there. And yet, when it comes to extremism, Central Asia is now firmly caught between Europe and Asia.

States like Kazakhstan, for example, are experiencing a problem. But not one not for which they can scapegoat immigrants — one from their own backyard. Autocratic Kazakh President Nursultan Nazarbayev has kept his state isolated from everything except foreign investment in technology and oil. He has turned Kazakhstan into a regional powerhouse, one in which other Central Asian countries see hope. But Kazakhstan may be on the verge of self-implosion given the rise in extremist ideology and a lackluster response to it. Recent attacks on national guard bases, police stations, and public transportation in oil-rich cities such as Aktobe in the northwest or the cosmopolitan Almaty have revealed socioeconomic and religious fissures that should have been addressed years ago.

We are where we are because the government turned its back on Kazakhstan’s youth.

Central Asia, particularly Kazakhstan, is in the midst of a religious revival. After years of Soviet suppression, 70% of Kazakhs identify as Muslim now and there has been a steep rise in ultra-conservative extremist ideology coming from Syria and Iraq. Central Asians feature prominently in infamous attacks in Stockholm, Saint Petersburg, Istanbul, and Boston. They target public events and public transport with methods akin to Al-Qaeda and ISIS. It would be disastrous if small cells like the former connect online with large groups like the latter.

Extremists have hit Kazakhstan’s Central Asian neighbor Uzbekistan the hardest. But Uzbekistan’s security services have been able to repel them outward to Afghanistan and Pakistan. Kazakhstan has proven itself capable of no such strategy.

We are where we are, however, because the government turned its back on Kazakhstan’s youth. Watching their leaders inveigle foreign investment has left young Kazakhs feeling disaffected. Extremism always brings government corruption and poverty and Kazakhstan is no exception.

Extremists have hit Kazakhstan’s Central Asian neighbor Uzbekistan the hardest. But Uzbekistan’s security services have been able to repel them outward to Afghanistan and Pakistan. Kazakhstan has proven itself capable of no such strategy. Experts are questioning its counterterror preparedness and methods. The government’s mission to engage the religious community with proper Islamic literacy may help. But President Nazarbayev’s vast surveillance and his calls to ban the wearing of all black will likely be seen for what they are. They are an encroachment on religion and it could alienate more of the populace. Kazakhstan’s comparably superior quality of life and moderate lifestyle have not immunized it against terror attacks. It is the reaction of its own disaffected people, not someone from a far-off, war-torn land, that reverberates ominously now.

Lone Wolf Terror

Europe, the US, and the Middle East exist in a moment of unprecedented global tension. In the face of collapsing, budding, and rapidly changing alliances, they share one common enemy: lone-wolf terrorists.

Lone-wolf terrorists are those who operate on their own, without the constraints imposed by an organisation with a structured hierarchy and chain of command. They are “self-radicalized individuals who commit violent acts to promote a cause or support a belief system… they appear to be isolated and avoid many of the traditional organizational characteristics used to identify and track traditional terrorist groups”. They pose an increasing threat to the United States and much of Europe, where most terrorist groups lack a structured presence but still possess the ability to radicalise individual members of society through media and the Internet. Though they may not be “official” members of any terrorist organisations, they often draw their inspiration from such groups, mimicking their tactics and claiming them as inspiration for the attacks.

Because they are isolated individuals, lone-wolf terrorists often lack access to the weapons, funding, and infrastructure possessed by larger terrorist groups. Instead, they use whatever they can find- knives, guns, homemade bombs- to orchestrate small-scale attacks which incite large-scale panic. As explained by Rodger Bates of Clayton State University, “the power of the lone wolf terrorist is not necessarily the actual level of harm potentially experienced, but the level of intimidation that the threat of such random acts of violence can exert on a community”- and that’s exactly what their intention is. Lone-wolf tactics are so effective that ISIS and others have directly encouraged followers worldwide to “pick up a knife, gun or any weapon and become personal warriors for the cause,” shrouding potential victims worldwide in a blanket of constant worry.

A critical factor in creating the large-scale panic these terrorists desire is the media. By focusing in extreme detail on attacks which only affect a small number of people, reporters unwittingly magnify the threat and introduce widespread panic into the public psyche. Knowing that civilians in the Western world are living in constant, subconscious worry of an attack is exactly what radical groups desire, and thus intense media coverage plays right into their hands.

Perhaps even more dangerously, extensive coverage of lone-wolf attacks may encourage more individuals to propagate attacks in the future. Individuals disenfranchised from society, particularly isolated young men, witness how much fame and notoriety lone-wolf attackers receive in the wake of the attack. This encourages them to follow the lead of those who have gone before them, creating a knock-on effect which exponentially increases the threat of terrorism in the long run.

In their quest to prevent these attacks from happening, the challenge to law enforcement lies in their apparent randomness. Because lone-wolf terrorists have few concrete ties to extremist organisations, it is very difficult to preemptively track them down and predict when the attacks will occur. Instead of placing their main focus on individuals who may be radicalised, it may therefore be more productive for law enforcement to target the factor which is most rapidly radicalising them: the media.

In this case, “the media” encompasses a variety of sources. It is important to note that, because lone wolves have little direct access to members of terrorist organisations, most of their radicalisation occurs digitally. This happens through message boards, radicalising videos, and even traditional forms of social media such as Twitter. Policing these more heavily will efficiently cut off a major terrorist recruitment tool, decreasing their reach, exposure, and membership in the long run. Most private social media companies, such as Facebook and Twitter, have stringent rules of use which ban any content encouraging terrorism or violence, but they rely upon a relatively small team of moderators to enforce this, who mainly respond to reports they receive from members and rely upon self-policing among the social media community. Perhaps establishing federal legislation requiring that each social media outlet establishes a team of moderators proportionate to the size of their user body would solve some of this problem, and ensure that posts by radicalising users are more quickly taken down.

But social media is not the only issue, and traditional media exposure is a huge issue as well. As I outlined earlier, extensive media coverage and the 24-hour news cycle can embolden those who view it to join the terrorist organisations being reported on, so networks would be wise to reduce the extensive profiles they often do of lone-wolf terrorists and perhaps even avoid mentioning them by name. As individuals, we can refrain from sharing or clicking on articles about such people, reducing their reach and the chances that their actions could inspire other disillusioned individuals to radicalise in the future.

2018 09 22 Kate Kleinle Pic 300x228 - Lone Wolf Terror

http://editorialcartoonists.com/cartoon/display.cfm/136866/

Rise to Peace