HSEP 301
Fall 2023
Review 2
It will consist of three parts:
Part 2 of the exam: Presentation Question: Remember that information from the class presentations will be on the exam. The PPT slides for all the class presentations will be linked to the syllabus, so these can be used as a reference. The review sheet does not contain any terms from the student presentations. For the exam you will be expected to be able to compare several of the terrorist groups discussed during the presentations in terms of the issue area that you had been assigned. In other words, if your research was on Strategy, you should be ready to discuss the strategies of at least two of the terrorist groups included in the presentations. If your research was on Support, you should be ready to discuss the strategies of two of the terrorist groups included in the presentations. A hint, to do this well, you should also pay attention to the Origins presentations for the groups you want to use as comparison even if your issue is not Origins.
·
If your
issue area was Non-Violent activities, compare your research to the Strategies
of the two groups.
Here's the actual question that will be on the exam.
Part Two: Presentation Question (20 points). This should be about a page long.
Compare the terrorist group you studied to two of
the terrorist groups discussed during the presentations in terms of the issue
area that you had been assigned. In other words, if your research was on
Strategy, compare your research to the strategy of two terrorist groups
included in the presentations (choose any two from the class
presentations). If your research was on Support, compare your research to
the support structure or recruitment strategies of two of the terrorist
groups included in the presentations. An easy way of thinking about this
is to consider how your group was similar to one other group and how it was
different from another.
·
If your issue area
was Non-Violent activities, compare your research to the Strategy of two other
groups.
List of Terms
Remember that you have the
PPT slides. They are a version of this review sheet.
Terms with (*) in front of
them may not have been included in the lectures, but were discussed, at length,
in the readings.
Suicide attacks
Attacks vs. Deaths
Reasons why suicide attacks are used (discussed in class)
*Rivalry between terrorist groups
*LTTE innovations
Worst-case
scenarios considered; Why?
Terrorist groups
interested in
Some groups want
mass casualties
Religious-based
terrorist groups
Groups must want
mass casualties (why some will and some won’t)
Acquiring materials
Weaponization
Delivery
Not getting caught
Chemical weapons
Aum and Sarin 1995
Biological Weapons
Types of biological
weapons
Key factors:
Legality and legitimacy of research
Transmission of disease
Recent Use
Aum Shinrikyo
Al-Qaeda
Anthrax 2001
Nuclear Weapons
Who has them; who
wants them
How terrorists
might get a bomb
Why nations would
or would not give WMD to a terrorist organization (Know the PPT slide on this)
Cyber terrorism
Definition
Vulnerability of
infrastructure
Cyberspace
Estonia 1997
Hypothetical cyber
attacks
Methods
DDOS
The range of
threats
Hacktivism
Cyber crime
Cyber espionage
Cyber War
Cyber terrorism
AQ’s program
Two Key questions
1. Can you do significant
damage with a cyber-attack?
Significant damage?
But example of 2010 Volcano on
Europe
2. What benefit would a terrorist
group get out of it?
Is a cyber-attack better than a
bomb?
Cyber-attacks as an
adjunct to conventional attacks
Terrorism in the US
Assassinations of presidents
Ethnonationalist Terrorism
Extreme Left 1960s-1970s
Weather
Underground
Eco-terrorism (also left)
ALF
and ELF
Extreme Right: KKK
Three
incarnations
Why FBI worries about the extreme
right today
*Oklahoma
City 1995
*Timothy
McVeigh
*Nichols
ties to Michigan Militia
Dylann
Roof
Robert
Bowers
Patrick
Crusias
Wolverine
Watchman
Four Ideologies of Modern Extreme
Right
*The
overlap
1. *White Supremacists
a. *Great Replacement
b. *Accelerationists
c. *White Power as a culture
d. *David Duke and NAAWP
2. *Anti-Government
a. *Militia movement
b. *Sovereign citizens
c. *ZOG
i.
*Its
relation to anti-communism (Belew)
3. *Christian Identity/Extremism
a. *End times are a race war
4. *Anti-Abortion
a. *Eric Rudolph
*Belew’s
thesis
*Extreme
right terrorism and the Vietnam War
*Difference
between these groups (challenging government power) and the KKK (reinforcing
government power)
*View
of women in these ideologies
Groups
*The
Order
Killing
of Alan Berg
*Robert
Matthews
David
Lane’s 14 Words
*Aryan
Nations
*1983
declaration of war on the US government
*Ruby Ridge
*Waco
*Relation to Oklahoma City 1995
*Turner Diaries: William Pierce
Common Themes in all four
ideologies
Relation to the “Alt-Right”?
The importance of the internet to
radicalization
Stormfront
4chan/8chan
*Leaderless Resistance
*Louis
Beam
DVEs vs. HVEs
Domestic Terrorism Charges
Counterterrorism Policies
US Government and Terrorism
Terrorism as a crime
Terrorism as low priority even in
1990s
Homeland security on the backburner
US Commission on National Security
(Hart-Rudman)
Gilmore Commission
Focus on worst case: terrorist use
of
Probability vs. consequence
US assumptions
Marxism
caused terrorism (USSR gone, so terrorism is gone)
States
are the threat
US
superiority will deter all challenges
What is Counterterrorism
8. Use of Force (This is number 8 on our list but we did it first because
of its applicability to the Israeli policy responding to Hamas’s terrorist attacks
of October 7, 2023.)
Challenges
Does force
solve your problem?
Quagmires?
“Growing
the enemy”
Escalation
Collective
Punishment
Proportionality
Geneva
Conventions and Protocols
Maintaining
domestic support
Maintaining
support of allies
Israel in Lebanon 1982 and growth of
Hezbollah
Sir Lanka and LTTE
US and Afghanistan
US and Iraq
US and Drone Strikes
1. Organization
CIA and FBI
Coordination
Priorities
US assumptions about terrorism as
Cold War ends
Hart-Rudman Commission
Gilmore Commission
Clinton Pre-9/11 Structure
National
Coordinator
Counterterrorism
Security Group
Bush Administration changes:
Homeland
Security Council
Office
of Homeland Security
Homeland
Security Adviser
Congress wants Dept. of Homeland
Security
Creation of Dept. of Homeland
Security
The
range of its responsibilities
2. Intelligence
Defining the problem
To know what to look for
Sharing information
Types of Intelligence Activities
OSINT
HUMINT
MASINT
SIGINT
IMINT
Coordination problems
Coordination
and Information sharing among all the intelligence agencies (Intelligence
Community)
Organizational
rivalries
Fixing the Problem
IRTPA 2004
Director
of National Intelligence
National
Counterterrorism Center
Intelligence Fusion Centers
3. War of Ideas
Root Causes?
Radical Ideologies
Ethno-nationalism
Non-democratic nations
Radicals vs. Moderates
Hamas vs. PLO/Fatah
De-radicalization?
Saudi programs
Narratives vs. Counter-narratives
Failed States
4. Diplomacy
UN-based Multilateralism
Importance of allies – intelligence,
legal environment, operations
US and
Pakistan in the fight against AQ
Afghanistan
and Pakistan as sanctuaries for AQAM
5. Economic Issues
Multilateralism: preventing
terrorism financing
US Office of Foreign Assets Control
6. Legal/Law Enforcement
Five Key Issues
A. What are terrorists?
Terrorists as criminals: 1996 ATEDP
Act
Gray Area: criminal or soldier?
Charges against foreign nationals
committing attacks against the US
Ramzi
Yousef
Sheikh
Omar Abdel Rahman
Homegrown Violent Extremist Charges
Dzhokhar
Tsarnaev
DVE Charges
McVeigh Charges
B. Sanctions/Prohibitions
State
Dept-led
Designation
as Foreign Terrorist Organization
State Sponsors of Terrorism
Terrorist Exclusion List
State/Treasury
Exec
Order 13224
FBI
Terrorist
Watch Lists
Terrorist
Screening Center
C. Surveillance
FISA 1978
Problem with FISA focus on agents of
a foreign government
Warrants and why they mattered
FISA Revisions: post 9/11
USA PATRIOT Act
Surveillance and civil liberties
issues
Terrorist Surveillance Program:
National Security Agency
Protect America Act 2007/FISA
Amendments Act 2008
Section
702
National Security Letters
Prism Program
Implications
D. Legal Status of Individuals
Detainees as a source of
intelligence (information)
Military Order of November 2001
unlawful
enemy combatant designation
questions
about the rights of detainees?
Guantanamo
Bay detention
How detainees eventually got rights
under the US constitution
Habeas Corpus and US Supreme Court
decisions
Military Commissions Act 2006/2009
The results of the detentions (data)
E. Treatment of Individuals
CIA vs. FBI methods
Memo legalizing “enhanced
interrogation”
The
ten accepted methods of interrogation
Controversy over interrogation
methods
Detainee Treatment Act
7. Operations
CIA Paramilitary
NEST
JTTF responsibilities
Range
of federal agencies
State
and local
Memorandum of Understanding
negotiations with state and local law enforcement
Dilemmas
9. Negotiations
Israel and PLO
Hamas
response
Good Friday Agreement
IRA splits
Cronin
*Premise: all terrorist groups will end
*Three key actors in terrorist triad: terrorist group, government, audience
*Six ways terrorist groups have ended
*Effectiveness of assassination vs. arrest
*Negotiation success and failure
*Northern Ireland
*Israeli-Palestinian
*Success: Achievement of goal?
*And ethno-nationalism
*Second and Third generation in terrorist movements
*AQ success in creating a next generation?
*Losing public support
*Does repression work?
*Moving to crime or insurgency
*FARC and LTTE examples
*Decapitating AQ?
*Negotiating with AQ?
*Losing popular support and AQ?
*AQ transnationalist goals vs. local goals.