HSEP
301
Fall
2022
Review
2
This is a Take Home exam:
Basic
Requirements
And, important:
It will consist
of three parts:
·
Part 2:
Presentation Question: Remember that information from the class presentations
will be on the exam. The PPT slides for
all the class presentations will be linked to the syllabus, so these can be
used as a reference. The review sheet
does not contain any terms from the student presentations. For the exam you will be expected to be able
to compare several of the terrorist groups discussed during the presentations
in terms of the issue area that you had been assigned. In other words, if your research was on
Strategy, you should be ready to discuss the strategies of all the terrorist
groups included in the presentations. If
your research was on Support, you should be ready to discuss the strategies of
two of the terrorist groups included in the presentations. A hint, to do this well, you should also pay
attention to the Origins presentations for the groups you want to use as
comparison even if your issue is not Origins.
If your issue area was
Negotiations or Non-Violent activities (Aum, IRA, Hamas), compare your research
to the Negotiations or Non-Violent activities or even Support (for Hamas, or
Aum) of the other two groups.
Here's the Question:
Part Two: Presentation Question (20 points). This should be about a page to a page and a half.
Compare the
terrorist group you studied to two of the terrorist groups discussed
during the presentations in terms of the issue area that you had been
assigned. In other words, if your research was on Strategy, compare your
research to the strategy of two terrorist groups included in the
presentations (choose any two from the class presentations). If your
research was on Support, compare your research to the support structure or
recruitment strategies of two of the terrorist groups included in the
presentations. An easy way of thinking about this is to consider how your
group was similar to one other group and how it was different from another.
List of Terms
Remember
that you have the PPT slides. They are a version of this review sheet.
Terms
with (*) in front of them may not have been included in the lectures, but were
discussed, at length, in the readings.
Suicide attacks
Attacks vs. Deaths
Reasons why suicide attacks are used
(discussed in class)
*Rivalry between terrorist groups
*LTTE innovations
Worst-case scenarios
considered; Why?
Terrorist groups
interested in
Some groups want
mass casualties
Religious-based
terrorist groups
Groups must want
mass casualties (why some will and some won’t)
Acquiring materials
Weaponization
Delivery
Not getting caught
Chemical weapons
Aum and Sarin 1995
Biological Weapons
Types of biological
weapons
Key factors:
Legality and legitimacy of research
Transmission of disease
Recent Use
Aum Shinrikyo
Al-Qaeda
Anthrax 2001
Nuclear Weapons
Who has them; who
wants them
How terrorists
might get a bomb
Why nations would
or would not give WMD to a terrorist organization (Know the PPT slide on this)
Cyber terrorism
Definition
Vulnerability of
infrastructure
Cyberspace
Estonia 1997
Hypothetical cyber
attacks
Methods
DDOS
The range of
threats
Hacktivism
Cyber crime
Cyber espionage
Cyber War
Cyber terrorism
AQ’s program
Two Key questions
1. Can you do significant
damage with a cyber-attack?
Significant damage?
But example of 2010 Volcano on
Europe
2. What benefit would a terrorist
group get out of it?
Is a cyber-attack better than a
bomb?
Cyber-attacks as an
adjunct to conventional attacks
Terrorism in the US
Assassinations of presidents
Ethnonationalist Terrorism
Extreme Left 1960s-1970s
Weather
Underground
Eco-terrorism (also left)
ALF
and ELF
Extreme Right: KKK
Three
incarnations
Why FBI worries about the extreme
right today
*Oklahoma
City 1995
*Timothy
McVeigh
*Nichols
ties to Michigan Militia
Dylann
Roof
Robert
Bowers
Patrick
Crusias
Wolverine
Watchman
Four Ideologies of Modern Extreme
Right
*The
overlap
1. *White Supremacists
a. *Great Replacement
b. *Accelerationists
c. *White Power as a culture
d. *David Duke and NAAWP
2. *Anti-Government
a. *Militia movement
b. *Sovereign citizens
c. *ZOG
i.
*Its relation
to anti-communism (Belew)
3. *Christian Identity/Extremism
a. *End times are a race war
4. *Anti-Abortion
a. *Eric Rudolph
*Belew’s thesis
*Extreme right terrorism and the Vietnam War
*Difference between these groups
(challenging government power) and the KKK (reinforcing government power)
*View of women in these ideologies
Groups
*The
Order
Killing
of Alan Berg
*Robert
Matthews
David
Lane’s 14 Words
*Aryan
Nations
*1983
declaration of war on the US government
*Ruby Ridge
*Waco
*Relation to Oklahoma City 1995
*Turner Diaries: William Pierce
Common Themes in all four
ideologies
Relation to the “Alt-Right”?
The importance of the internet to
radicalization
Stormfront
4chan/8chan
*Leaderless Resistance
*Louis
Beam
DVEs vs. HVEs
Domestic Terrorism Charges
Counterterrorism Policies
US Government and Terrorism
Terrorism as a crime
Terrorism as low priority even in
1990s
Homeland security on the backburner
US Commission on National Security
(Hart-Rudman)
Gilmore Commission
Focus on worst case: terrorist use
of
Probability vs. consequence
US assumptions
Marxism
caused terrorism (USSR gone, so terrorism is gone)
States
are the threat
US
superiority will deter all challenges
What is Counterterrorism
1. Organization
CIA and FBI
Coordination
Priorities
US assumptions about terrorism as
Cold War ends
Hart-Rudman Commission
Gilmore Commission
Clinton Pre-9/11 Structure
National
Coordinator
Counterterrorism
Security Group
Bush Administration changes:
Homeland
Security Council
Office
of Homeland Security
Homeland
Security Adviser
Congress wants Dept. of Homeland
Security
Creation of Dept. of Homeland
Security
The
range of its responsibilities
2. Intelligence
Defining the problem
To know what to look for
Sharing information
Types of Intelligence Activities
OSINT
HUMINT
MASINT
SIGINT
IMINT
Coordination problems
Coordination
and Information sharing among all the intelligence agencies (Intelligence
Community)
Organizational
rivalries
Fixing the Problem
IRTPA 2004
Director
of National Intelligence
National
Counterterrorism Center
Intelligence Fusion Centers
3. War of Ideas
Root Causes?
Radical Ideologies
Ethno-nationalism
Non-democratic nations
Radicals vs. Moderates
Hamas vs. PLO/Fatah
De-radicalization?
Saudi programs
Narratives vs. Counter-narratives
Failed States
4. Diplomacy
UN-based Multilateralism
Importance of allies – intelligence,
legal environment, operations
US and
Pakistan in the fight against AQ
Afghanistan
and Pakistan as sanctuaries for AQAM
5. Economic Issues
Multilateralism: preventing
terrorism financing
US Office of Foreign Assets Control
6. Legal/Law Enforcement
Five Key Issues
A. What are terrorists?
Terrorists as criminals: 1996 ATEDP
Act
Gray Area: criminal or soldier?
Charges against foreign nationals
committing attacks against the US
Ramzi
Yousef
Sheikh
Omar Abdel Rahman
Homegrown Violent Extremist Charges
Dzhokhar
Tsarnaev
DVE Charges
McVeigh Charges
B. Sanctions/Prohibitions
State
Dept-led
Designation
as Foreign Terrorist Organization
State Sponsors of Terrorism
Terrorist Exclusion List
State/Treasury
Exec
Order 13224
FBI
Terrorist
Watch Lists
Terrorist
Screening Center
C. Surveillance
FISA 1978
Problem with FISA focus on agents of
a foreign government
Warrants and why they mattered
FISA Revisions: post 9/11
USA PATRIOT Act
Surveillance and civil liberties
issues
Terrorist Surveillance Program:
National Security Agency
Protect America Act 2007/FISA
Amendments Act 2008
Section
702
National Security Letters
Prism Program
Implications
D. Legal Status of Individuals
Detainees as a source of
intelligence (information)
Military Order of November 2001
unlawful
enemy combatant designation
questions
about the rights of detainees?
Guantanamo
Bay detention
How detainees eventually got rights
under the US constitution
Habeas Corpus and US Supreme Court
decisions
Military Commissions Act 2006/2009
The results of the detentions (data)
E. Treatment of Individuals
CIA vs. FBI methods
Memo legalizing “enhanced interrogation”
The
ten accepted methods of interrogation
Controversy over interrogation
methods
Detainee Treatment Act
7. Operations
CIA Paramilitary
NEST
JTTF responsibilities
Range
of federal agencies
State
and local
Memorandum of Understanding negotiations
with state and local law enforcement
Dilemmas
8. Use of Force
Israel in Lebanon
Sir Lanka and LTTE
US and Afghanistan
US and Iraq
US and Drone Strikes
Can you maintain allied support?
9. Negotiations
Israel and PLO
Hamas
response
Good Friday Agreement
IRA splits
Cronin
*Premise: all terrorist groups will end
*Three key actors in terrorist triad: terrorist group, government, audience
*Six ways terrorist groups have ended
*Effectiveness of assassination vs. arrest
*Negotiation success and failure
*Northern Ireland
*Israeli-Palestinian
*Success: Achievement of goal?
*And ethno-nationalism
*Second and Third generation in terrorist movements
*AQ success in creating a next generation?
*Losing public support
*Does repression work?
*Moving to crime or insurgency
*FARC and LTTE examples
*Decapitating AQ?
*Negotiating with AQ?
*Losing popular support and AQ?
*AQ transnationalist goals vs. local goals.