Suicide Bombing

The Logic of Suicide Bombing: A Terrorist’s Powerful Tactic

The first recorded suicide bombing occurred in Russia on March 13, 1881. Ignaty Grinevitsky, a member of the People’s Will left-wing terrorist group, rushed towards his target Tsar Alexander II and dropped a bomb at the Tsar’s feet, killing them both. But the explosive device was not strapped around his stomach, his legs, or hidden in any part of his body, not unlike the usual tactic that prominent terrorist groups use nowadays. The night before the attack, Grinevitsky had written, “I shall not live one day, one hour in the bright season of our triumphs, but I believe that with my death I shall do all that it is my duty to do.”

The first and largest suicide bombings, however, are thought to have occurred on October 23, 1983, when a vehicle carrying 2,000 pounds of explosives was driven into a U.S. Marine base in Lebanon. The bomber, along with 241 military personnel, died unexpectedly. Seconds later, another bomber targeted the headquarters building of French commandos, killing an additional 58 people.

It was later determined that the bombing was carried out by Iranian-backed Shia militant organizations, which later became Hezbollah, the infamous violent terrorist group. In the 1980s, Hezbollah was responsible for a series of roughly 20 suicide assaults against Israeli and Lebanese soldiers. Due to this series of attacks, it gradually inspired other terrorist groups to use this tactic as a result of successful propaganda, imposition of threat, and massive media coverage. Hezbollah played an important role in the tactics then used by other terrorist groups in today’s day and age.

The United States has made significant progress since then in countering such attacks. Anti-ram perimeter walls, passive and active vehicle barriers, parking standoffs for screening cars, and window coverings such as polycarbonate, durable film, and locking devices have all been deployed by the Department of State to protect U.S. facilities overseas.

Since 1983, insurgency groups from Sri Lanka to Chechnya to Afghanistan have used suicide bombing as a favorite strategy. One indicator of this expanding predilection is the number of attacks, which increased from one in 1981 to more than 500 in 2007. This has become a significant and more powerful technique, particularly for ISIS and Al-Qaeda. Nonetheless, since 2003, suicide bombings have just about exclusively been perpetrated by Islamic groups.

A Martyr and a Suicide Bomber

A religious martyr, according to the conventional definition, is someone who is executed for their religious views, such as Saint Euphemia, who was martyred in AD 303 for refusing to forsake Christianity and participating in Ares sacrifices. Each of these individuals voluntarily died as a result of their refusal to renounce their faith in the face of torture, torment, or the prospect of death. When viewed through the lens of choice theory (utility), the martyr chooses to hold on to their principles and beliefs, implying that their functional form must be such that the advantage of holding on to their convictions outweighs the value they place on their own life. So, how is martyrdom interpreted by Islamic groups and why do they use this term?

Both phrases are used interchangeably, especially among Islamic groups. Explicitly put, a suicide bomber thinks that if they follow their religious beliefs to the fullest, they will be granted infinite utility, a place in heaven, and a great degree of pride in their afterlife. A martyr, on the other hand, may expect a good life after death as a result of their devotion and determination to stand for their religious beliefs. Unlike Islamic groups, they do not seek to inflict or cause death on others. A martyr is willing to die while preserving their faith, whereas a suicide bomber accepts death while believing that the more harm they wreak, the more they will be honored by God in the afterlife.

The choice is the actual distinction between the two. The martyr is forced to choose between life and death, with the probable inclination to survive, whereas the suicide bomber chooses to willfully end their own life and murder as many others as possible from a position of relative safety. The final aspect of this decision is what distinguishes suicide bombers from others: the desire to cause the deaths of others as part of their very own end-of-life decision.

The phrase “Allahu Akbar” is shouted by a suicide bomber before he detonates himself. It is both disheartening and enraging that terrorists have tainted our sacred language in a way that leaves those who aren’t Muslim terrified of common, beautiful phrases like “Allahu Akbar,” which simply means “God is the greatest,” no different than the use of “praise God” by Christians,” Rabia Chaudry said, a Pakistani-American attorney. It is saddening that the term that was previously said during Muslim celebrations can now be associated with an evil act.

How Effective is Suicide Bombing?

To begin with, the findings strongly suggest that a suicide bomber does not require extensive training to carry out the crime. Second, a suicide bomber may easily blend in with the crowd, and third, an explosive device does not cost a terrorist cell a hundred dollars; in fact, they can construct their own bombs using materials found in their barracks. Furthermore, suicide bombings can result in large casualties with little to no effort on the part of the perpetrators.

Terrorists are deadly, adaptable, and resourceful. A bomb-wielding individual is significantly more dangerous and difficult to resist than a timed device set to detonate in a public place. This human weapons system may make last-minute adjustments based on the ease of approach, the number of individuals present, and the security systems in place.

Despite two years of declining civilian losses from suicide strikes, the number of civilians killed in suicide bombings in Afghanistan increased in 2021. Afghanistan remained the country most affected by suicide attacks, accounting for 65% of all civilian deaths caused by suicide attacks worldwide. According to AOAV data, there have been 13,652 recorded suicide bomb assaults throughout history: four in Tsarist Russia, seven in China prior to WWII, 7,465 by Japan throughout WWII, 5,430 between 1974 and 2016, and 746 in 2017 and 2021.

Conclusion: Countering Suicide Attacks

To counter and deter suicide bombing incidents, Western policies must recognize the diversity of Islam, Islamism, and Jihadism, and even the ensuing internal conflict in the Islamic world over whose narrative will prevail. In order to suppress the extreme challenge, the West must support the moderate portions of this varied group.

Also, increasing surveillance operations to study people who have a history of committing suicide attacks and understanding their networks, such as friends, families, and peers. It’s also a roadblock to developing policy recommendations for stores or shops where terrorists might readily purchase materials to make an improvised explosive device.

The underlying issues that give rise to terrorist attacks must be addressed concurrently in order to decrease the incentive for such acts throughout the long run. National inter-service and collaborative international partnerships are key components of a comprehensive plan to combat suicide terrorism that should be implemented simultaneously.

Intelligence plays a critical role in averting acts of suicide terrorism from occurring in the first place. When major events occur, security briefs and digital reports should be created, especially in nations with limited resources and security agencies. Remember that a suicide bomber’s goal is to cause the highest degree of destruction possible.

Also, security officials should consider advancing social media strategies and using it as a tool to promote safety, security, and peace. Considering that social media has been rampant and successful tool for terrorist groups in recruiting members, counterterrorism efforts should also capitalize on this resource. For example, government agencies, think-tanks, and counterterrorism-oriented organizations must also continue creating symposiums, webinars, and trainings for the public, to inspire and inform people on effective strategies to combat terrorism. Ultimately, to keep up with the advancements of terrorist strategies, authorities and social media platforms must modify their counter-terrorism measures to address these foreseen issues.

 

Kristian N. Rivera, Counter-Terrorism Research Fellow

#TalibanOurGuardians: Taliban Support Trends via Twitter During Afghanistan Repression

It is not a new agenda for Twitter to be the ‘go to’ space for encouraging violent extremist activities, though, since America made the decision to withdraw their military troops from Afghanistan, it has been pervaded with tweets related to Afghanistan’s latest events.

The Content

Twitter has been filled with widespread opinions on the actions taken against Afghan people by the Taliban since early June. For instance, some question how they make the shocking choice to become abductors in the first place, and consider these ‘symbolic acts of bravery’: “What does it say about the fundamentals they follow?” One user queries. It seems that it is not traditional Islam they aspire to and believe in, but instead their own remodelled version of its culture that forces militarization upon vulnerable people and is then rattled by their lack of appeal.

On the other hand, the majority of users were easily identified as supporters of the Taliban through tweets and pictures that expressed their appreciation towards the group and their violent acts. One supporter quotes, “All Muslims around the world support #Taliban” which touches upon a controversial topic, but suggests that Taliban supporters online are essentially brainwashed by the Taliban-led approach to Islam. Other supporters share simple but meaningful tweets and pictures that highlight gratitude towards the Taliban and their activities to date, as evidenced below. However, all tweets are collectively managed through one specific hashtag: #TalibanOurGuardians. There were approx. 70% of content that referenced the hashtag demonstrated support towards the Taliban, whilst the remaining 30% appeared non-supportive and against the Taliban government to reform policy and livelihoods in Central Asia.

(Photograph highlights recent tweets from Taliban supporters across Twitter since June 2021 – for research purposes).

How are the Taliban described?

Since early June, the vocabulary used by Taliban supporters on Twitter was for the most part positive or in favour of the group, their governing intentions, and pleaded that their actions whilst taking over Afghanistan were feasible. Some describe the Taliban using terms that compliment them, such as heroes, intelligent, brave, our protectors and honourable economy, and ‘not terrorists’. The online support for the Taliban suggests that there is a worrying increase of group interest since their uproar against the Afghan people and justification for using violence as a way to eliminate non-believers and gain control quicker. Nevertheless, these audiences trust that the Taliban are devoted soldiers that are simply taking back their country and offer protection from democracy that is destroying their legacy; despite the evidence that draws upon links with terrorist organizations such as Al-Qaeda that assisted attacks to be carried out.

In contrast, some users directly challenge this perspective and perceive the Taliban negatively with regards to their decisions to brutally murder innocent people to gain power. One non-supporter argues how Afghan people are a ‘threat’ to the Taliban, such as Afghan comedian Khasha who was beaten and killed by Taliban members which was video streamed online. Examples of terms used by non-supporters to describe the Taliban are the enemy, animals, diabolical and fanatic idiots, and terrorists. It seems that non-supporters of the Taliban question their legitimacy as followers of Islam and regard their captures of new areas more recently as downfalls, not victories, due to the negative impact and unfortunate consequences they have caused.

Who are the Taliban supporters on Twitter?

Amongst the small number of tweets that remain public, the majority of Taliban supporters were men in comparison to women and often spoke highly of having children or displayed pictures with/ of children that appear to be culturized into the group as young soldiers. For instance, one supporter argues that “Afghans are happy under Taliban control” occupied by pictures of children engaging with Taliban fighters. Does this highlight the truth in Afghanistan? Or a militant’s perspective of bringing up children (young boys) under the Taliban’s command? Similar to how research confirms that ISIL supporters online reflect behaviours of fighters offline in regards to bravery, pro-Taliban users speak of a stable environment for women and children in Afghanistan to soften its destroyed neighbourhoods, and appeal to vulnerable users. However, the reality is contradictory, which a hashtag-user outlines on Twitter:

Additionally, some content outlines the Taliban’s hatred towards journalists, judges, peace activists and women in power, which reporters describe as their targets in their new strategy. For instance, Saba Sahar documents through a Twitter video that “The Taliban can never accept that I am a policewoman” which resulted in her experiencing an assassination attempt by the Taliban. Non-believers took to Twitter to respond to her video with praise regarding bravery and the disgrace of the Taliban’s attitude towards women, despite their claims of gender equality and safety for women.

Going Forward

Looking to social media is undeniably credible for understanding the risk to Afghan people and the active beliefs of pro-Taliban users online. By using the internet as a data source to gather information on the impact and opinions of governmental decisions, we can source out areas for future development in Counter-Terrorism. This includes better disruption techniques of video content that particularly displays brutal and disturbing scenes, and of key terms or hashtags as red flags for advertising false information online that manipulates and assists radicalisation. Alongside this, we can distinguish the problems faced by Afghan communities from different areas around the globe and the perspectives on the positions of power and its consequences for governmental disputes in the future.

Rise to Peace Tik TOk

What Role Does TikTok Play in Radicalization?

TikTok is the fastest growing social media application currently available. It has surpassed two billion downloads globally and despite its typical lighthearted content, TikTok has not been immune from extremist content.

As an example, the Islamic State of Iraq and the Levant (ISIL) has actively used the application since 2019 as a recruitment tool as another element in its social media networking. This development requires analysis in regard to questions of national security.

Per the Social Contract Theory, states are responsible for the implementation of measures meant to protect its citizenry from conditions that threaten their human rights.

TikTok and social media in general present unique challenges to national security policies and legislation, such as managing the risk of radicalization across demographics. For example, according to Statista 32.5% of TikTok users range from ten to nineteen years old while 29.5% range from the ages nineteen and twenty. This data is significant once placed into the context of a recent study in which the authors concluded that users of the social media platform are more likely to be manipulated by the content they see.

Per Section 230 of the Communications Decency Act, internet companies are not legally responsible for the content they host if it was published by someone else. The act allows users to post about controversial political topics online.

With an increase of users on social media platforms, amendments need to be made that ensure social platforms such as Tik-Tok can be held responsible if there is evidence of negligence in the removal of terrorism-related content. Tik-Tok has addressed the use of its platform by terrorist organizations and will ban any accounts and associated devices as soon as they are identified.

It is important that social media companies implement policies and technologies that identify extremist accounts especially on fast-growing and extremely popular ones like TikTok.

Confronting terrorist organizations and stemming their propaganda will markedly impact their radicalization networks and in turn, limit the number of successful recruitments to the cause. Therefore, weakening these networks as part of a wider digital counter-extremism effort upheld by private and public sectors is vital.

The use of TikTok by terrorist organizations, such as ISIL, to spread propaganda is evident of two key issues. Firstly, they are not going anywhere anytime soon, and secondly, obtaining access to social media platforms is not an issue for them.

TikTok’s ‘no-tolerance’ response to terrorist organizations utilizing their social media platform as a recruitment and indoctrination tool provides a level of trust with TikTok’s creator ByteDance, despite other privacy concerns.

Combatting terrorism domestically and internationally is a lofty enough task for the United States government as well as for its allies.  The additional strain digital terrorism poses adds another level of concern.

Extremism on social media networks, and on the Dark Web for the matter, is even more complex as it is harder to confront unseen threats that cannot be contained. This is why it is so vital that the implementations of new policies and the amendments to old ones must include technological developments if they are to provide security for citizens of the state. It is, after all, the responsibility of the state to combat terrorism in all forms that threaten the well-being of citizens.

In conclusion, past policies that have been implemented prior to the increased variety and usage of social media platforms, such as the Communications Decency Act, should be re-examined. Amendments should be discussed, especially in the context of the fast-developing digital world.

–Clarissa Lopez

The Continued Impact of Technology on Terrorism

Technology has greatly evolved in the past decades to the point that it is fair to speak of a technological revolution. Mobile phones, personal computers, and the Internet are commonplace in everyday life. More specifically, the evolution of information and communication technology has radically changed not only the way people communicate, but also ways of thinking and understanding complex matters.

Notwithstanding the recognized benefits of new technologies, there are concerns regarding their dual use. Recent events demonstrate that technological developments have been misused by non-state actors, such as terrorist groups. In fact, many terrorist organizations have been quick to exploit rapid technological advances to aid in the manufacture of weapons, ammunition and explosives. The use of military technology by such groups is one of the most severe threats currently faced worldwide.

However, developments in the information and communications technology (ICT) sector are even more alarming. Indeed, the use of digital and Internet platforms and their possible misuse by terrorists requires significant attention in any discussion focused on the topic. Social media platforms, Internet forums and online messaging applications have undoubtedly become terrorist propaganda mechanisms.

The use of information and communication technologies as tools for radicalization and recruitment is now common. Many terrorist organizations have managed to build a vast, sophisticated network of supporters from all over the world. Moreover, such technologies provide a major source of inspiration for lone actor terrorists who either have attempted or successfully carried out attacks after watching live-streamed attacks or speeches by leading members of terrorist groups inciting people to commit violence.

Planning an attack is now much easier as there are websites that provide all the necessary information about means and methods. These sites are easily accessed by the public thus permitting would-be terrorists to download instructions, such as those related to bomb-making, from the Internet.

In addition, digital technology has influenced the media. Changes in media technology have enabled terrorists to easily disseminate their message to wider audiences. Violence may instill fear, but live images attract the attention needed to cause widespread reaction, influence public opinion and mobilize moderates around the world. For years now, terrorists avail themselves of the ability to broadcast live on television.

Real-time TV coverage of an attack helps terrorist organizations to achieve their objectives: promotion of their cause to the widest possible audience, incite fear in the intended target audience and recruitment of new members. In some cases, the over-coverage of such events may unwittingly exacerbate the problem, instead of simply providing information to the public. It is therefore important that journalists avoid the further incitement of already present public fear and the over-emphasis of the motives behind an attack while reporting on terrorism.

In their attempt to prevent terrorists from exploiting digital platforms, leading tech companies cooperate with law enforcement for counter-terrorism purposes. In this sense, working closely with counter terrorism officers and security experts, social media companies improved their ‘takedown’ policies, weeding out an enormous number of accounts with the aim to reduce or even eliminate terrorists’ presence on technology platforms.

Furthermore, law enforcement authorities have also intensified monitoring of the contents disseminated online in order to detect and remove terrorist propaganda. In fact, a new technology able to automatically detect terrorist content on any online platforms and stop it before it ever reaches the internet has recently been developed.

To sum up, while technology continues to evolve rapidly, technology and media companies should work together with the competent authorities to combat terrorism and to prevent terrorist groups from recruiting new members. Although the public has the right to be informed on matters of public concern, media professionals should be particularly vigilant when it comes to the coverage of terrorism issues. They should aim at keeping the public informed without offering terrorists the publicity they seek.

In addition, as long as terrorists exploit new technological developments and online technologies, counter-terrorism authorities must detect and delete any online material that promotes terrorism or encourages violence. It is therefore essential that everyone collaborate in order to address this global challenge.

Using Encrypted Messaging for Terror Propaganda

In March, ISIL lost its last physical stronghold in Baghouz, Syria when United States-backed Syrian Democratic Forces overtook the territory. Although ISIL had tangible territory, terrorism is not typically bound by such lines. An examination of how encrypted messaging services, such as Telegram, spread propaganda beyond borders and jurisdictions is required. It is important to comprehend how terror groups and related media sympathizers use such services to influence and recruit.

In a recent case, an ISIL sympathy group, Ash-Shaff, posted propaganda posters on Telegram encouraging attacks in San Francisco, New York City, and London. The posters show images of Big Ben and Parliament on fire, an ISIL fighter running through New York City with an ISIL flag, and a sucidide bomber with a bomb in his backpack. These posters directly target ISIL sympathizers and loan wolves to act. They exhibit messages in English that call for terrorist acts that typically result in a high number of casualties of those deemed kuffar, the expanse of the ISIL network, and targeted countries considered crusaders. Crusaders refers to ISIL adversaries France, Russia, United Kingdom and the United States. The term kuffar is similar to the term infidel.

Ash-Shaff is an ISIL sympathy group either based out of Indonesia or ran by Indonesian citizens. Ash-Shaff creates and shares media to instigate lone-wolf attacks and spread propaganda. They manufactured other pieces of propaganda in January 2019, May 2019, and in July 2019, which were also shared on platforms such as Telegram. All these posters have similar themes, calling out for violence against enemies and trying to incite sympathizers to carry them out. Ash-Shaff is particularly dangerous because sharing content on platforms such as Telegram provide individuals in these channels with the ability to share propaganda on major social media sites.

Ash-Shaff is one of many ISIL supporter media groups. Other major actors include Quraysh Media, Muntasir Media Foundation and Hamlat Fadh Al-Mukhabarat. The list of groups is extensive, but they all serve the same purpose, to share ISIL propaganda. They facilitate communication within ISIL chat rooms on Telegram channels and inspire actions. For instance, during the Sri Lanka bombings, all of the aforementioned groups shared similar propaganda posters and messages on their channels celebrating the attack. What stands out is that a supporter or sympathizer of terrorism does not need to be apart of all these groups to hear the message. Just one is suffice.

Telegram is the top choice to spread terrorist ideas. It is preferred because its messages are fully encrypted and can even self destruct. The company is aware of its appeal to terrorist groups. They have in fact banned ISIL channels from becoming public, but they can remain private. ISIL remains able to use Telegrams private message services to coordinate attacks, plan social media campaigns, and recruit.

One case is telling. In 2017, a woman was arrested in Bandung, Indonesia after she was radicalized in about four months after receiving instructions from over 60 chat rooms on Telegram. It is argued that a radicalized person is ready to perform a terrorist attack in less than a year. An individual who joins five chatrooms can receive up to 500 pieces of propaganda and instruction daily. Telegram chat rooms can host up to 5,000 users.

It is difficult to put a policy solution on encryption services. A solution that has been implemented by Russia and Iran was to ban Telegram altogether. This is not ideal for many countries, but it is effective.

Currently, there are few regulations when it comes to private messaging services. The encryption messaging industry needs to come together and discuss legal and safe parameters. Like the Christchurch Call to Action, main players in encryption services need to develop a platform to combat terrorism. The issue can not be solved by blocking a service, because there is always another one.

The only other solution is that chat rooms exceeding 1,000 users should be charged monetarily. At this level of communication messages are not used for intimate conversations or privacy. Information with such a reach is part of an agenda and meant to spread ideas and information to like minded individuals.

Telegram and other free encrypted messaging platforms are the basis of terrorist communications. They allow for groups to plan social media campaigns, provide instructions for attacks, receive donations and recruit. It is easy to suggest that groups spreading terrorist ideas should be banned from using these services, but it is what needs to be done.