Professional Documents
Culture Documents
Terrorism and Counter-Terrorism: January 2021
Terrorism and Counter-Terrorism: January 2021
net/publication/348115640
CITATIONS READS
0 881
1 author:
Antoine Andary
The International Association for Political Science Students
6 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Antoine Andary on 20 January 2021.
Month of January
Vol 1 | Year 2021
This document is under embargo, must not be reproduced or published by any means,
or even sent to third parties without the permission of the author and the responsible entity.
Antoine Andary (MR.)
Political Communication and International Affairs
Counter-Terrorism Research Fellow and Intelligence Analyst
The world we know today is facing many challenges, one of them is crime and
majorly organized crime. As part of the fight against national and transnational
organized crime, a global phenomenon took place, and it is called ''Terrorism''.
The society became aware of terrorism, when we saw the deadliest terrorist
strikes in history, the September 11 attacks, often referred to as 9/11. Nations
and specifically the United States response to it, shaped our world today. But
terrorism is nothing new, and as you go forward in time, in the late 19th
century anarchist terrorists killed presidents and prime ministers. In 1914,
state-sponsored terrorists killed the Archduke of Austria-Este Frans Ferdinand.
Moreover, after World War II, we saw terrorism as part of revolutionary
struggles. And if you look around the world today, from Northern Ireland, to the
Middle-East, landing down in Indonesia ''Terrorism remain a constant concern''.
When we think of terrorism, we imagine armed guys in the middle of the desert,
or which shoots all the way shouting ‘’Allahu Akbar’’. Except that terrorism is
not a new case, it responds to a much more complex logic that they would like to
make us believe today. But, as long as there has been terrorism, there have been
people trying to stop it. Thereupon, we are going to examine the counter
terrorism machine and how with the help of its finest tools the intelligence
services and military forces, try to determine who is a terrorist and what they
do with the information on how is being used to fight and prevent terrorism.
The main fundamental problem of the Jihadi terrorism today for example, is that
we can imagine it as a patchwork, millions of ideas, individuals and
organizations, all lost in the galaxy. But somehow, they can connect together
and create the apocalypse under an umbrella called transnational organized crime
or terrorism. This patchwork consists more of the ideological and heritage part
of it, in transmitting solid ideologies and convictions from generation to
another.
Antoine Andary (MR.)
Political Communication and International Affairs
Counter-Terrorism Research Fellow and Intelligence Analyst
The main difficulty of our democracies today, is how far the response to the
threat can go despite the urgent need, then we must not forget that fighting
international terrorism with military means makes many collateral victims and it
feeds the cause that we are fighting against. The results are disastrous, if we
take Afghanistan and Iraq, remember that the chaos generated by the war who
allowed the Taliban in Afghanistan, to reign control of all parts of the
country. That thrive there a few years later in Iraq and Syria, ISIS to grow.
Definitely, these last twenty years, the international counterterrorism struggle
killed three times more than the terrorism itself.
Whatever the target of terrorists, there are multiple ways of hardening the
targets to prevent the terrorists from hitting their mark or reducing the damage
of attacks. One method is to place Hostile vehicle mitigation to enforce
protective standoff distance outside tall or politically sensitive buildings to
prevent car and truck bombing. Another way to reduce the impact of attacks is to
design buildings for rapid evacuation.
Together with, police, fire and emergency medical response organizations have
prominent roles. Local firefighters and emergency medical personnel have plans
for mitigating the effects of terrorist attacks. Fire departments, perhaps
supplemented by public works agencies, utility providers, for example gas,
water, electricity and heavy construction contractors, are most apt to deal with
the physical consequences of an attack. Again, under an incident command model,
local police can isolate the incident area, reducing confusion, and specialized
police units can conduct tactical operations against terrorists, often using
specialized counter-terrorist tactical units. Bringing in such units will
typically involve civil or military authority beyond the local level.
Antoine Andary (MR.)
Political Communication and International Affairs
Counter-Terrorism Research Fellow and Intelligence Analyst
Identically, emergency medical services will triage, treat, and transport the
more severely affected victims to hospitals, which will need mass casualty and
triage plans in place. Also, public health agencies, from local to the national
level, maybe designated to deal with identification, and sometimes mitigation,
of possible biological attacks, and sometimes chemical or radiologic
contamination.
Besides various security agencies, there are elite tactical units, also known as
special mission units, whose role is to directly engage terrorists and prevent
terrorist attacks. Such units perform both in preventive actions, hostage
rescue, and responding to on-going attacks. Countries of all sizes can have
highly trained counter-terrorist teams, tactics, techniques and procedures for
manhunting are under constant development.
The scope for anti-terrorism systems is very large in physical terms, often we
speak about long borders, vast areas, high traffic volumes in busy cities, etc.
As well as in other dimensions, such as type and degree of terrorism threat,
political and diplomatic ramifications, and legal issues. In this environment,
the development of a persistent anti-terrorism protection system is a daunting
task. Such a system should bring together diverse state-of-the-art technologies
to enable persistent intelligence, surveillance and reconnaissance missions, and
enable potential actions. Designing such a system-of-systems comprises a major
technological project. Within military operational approaches Counter-terrorism
falls into the category of Irregular Warfare. Given the nature of operational
counter-terrorism tasks, national military organizations do not generally have
dedicated units whose sole responsibility is the prosecution of these tasks.
Instead, the counter-terrorism function is an element of the role, allowing
flexibility in their employment, with operations being undertaken in the
domestic or international context.
The North Atlantic Treaty Organization – NATO has also developed many tools in
order to combat terrorism. NATO’s work on counter-terrorism focuses on improving
awareness of the threat, developing capabilities to prepare and respond, and
enhancing engagement with partner countries and other international actors.
NATO invoked its collective defence clause (Article 5) for the first and only
time in response to the terrorist attacks of 11 September 2001 on the United
States.
NATO’s Counter-Terrorism Policy Guidelines focus Alliance efforts on three
main areas: awareness, capabilities and engagement.
A comprehensive Action Plan is being implemented to enhance NATO’s role in
the international community’s fight against terrorism.
NATO has a Terrorism Intelligence Cell at NATO Headquarters and a Coordinator
oversees NATO’s efforts in the fight against terrorism.
A regional Hub for the South, based at NATO’s Joint Force Command in Naples
helps the Alliance anticipate and respond to crises arising in its southern
neighborhood.
NATO is a member of the Global Coalition to Defeat ISIS and supports it
through AWACS intelligence flights.
NATO develops new capabilities and technologies to tackle the terrorist
threat and to manage the consequences of a terrorist attack.
NATO cooperates with partners and international organizations to leverage the
full potential of each stakeholder engaged in the global counter-terrorism
effort.
To discern, whatever the price is, fighting against terrorism must always be
done while respecting human rights, and cannot infringe international
humanitarian law. It is not by violating these rights and freedoms or the
principles of the rule of law that we will effectively fight terrorism. On the
contrary, mot states must condemn the use of torture in the fight against
terrorism for any reason whatsoever and supports the mandate of the United
Nations Special Rapporteur on the promotion and protection of human rights and
fundamental freedoms in tackling terrorism.
Terrorism will continue for a long time to come. It is, on the one hand, the
weapon of ideological extremists who prey on the ungodly mob. Moreover, an
asymmetric warfare or the conflict from the weak to the strong constitutes the
weapon of those who do not have the means to fight an equal combat. We can fight
it by judicial and police means, and the example, in 30 to 40 years, Ireland has
managed to get him into a political process. Which brings us to the second
solution, that of negotiation. In a conflict in which the parties claim
territory, there is a place for negotiation, this is, however, impossible with
extremist groups who refuse to enter into such a process.
References:
1. Daniel Byman, Professor, Edmund A. Walsh School of Foreign Service, Georgetown University,
retrieved from https://www.edx.org/course/terrorism-and-counterterrorism.
2. "UN Reform". United Nations. March 21, 2005. Archived from the original on April 27, 2007.
Retrieved July 11, 2008.
3. "Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and
Literature Review". The International Centre for Counter-Terrorism – The Hague (ICCT). March
27, 2013. Retrieved September 6, 2016.
4. Palmer, R.R. (2014). "The French Directory Between Extremes". The Age of the Democratic
Revolution: A Political History of Europe and America, 1760–1800. The Age of the Democratic
Revolution. Princeton University Press. pp. 544–567. ISBN 9780691161280. JSTOR j.ctt5hhrg5.29.
5. Ken Duncan (2011). "A Blast from the Past Lessons from a Largely Forgotten Incident of State-
Sponsored Terrorism". Perspectives on Terrorism. 5 (1): 3–21. JSTOR 26298499.
6. Dale L. Watson, Executive Assistant Director, Counterterrorism, Counterintelligence Division,
Federal Bureau of Investigation, Before the Senate Select Committee on Intelligence,
Washington, DC, February 06 2002, Testimony, Retrieved from
https://archives.fbi.gov/archives/news/testimony/the-terrorist-threat-confronting-the-united-
states.
7. Feiler, Gil (September 2007). "The Globalization of Terror Funding" (PDF). Begin-Sadat Center
for Strategic Studies, Bar-Ilan University: 29. Mideast Security and Policy Studies No. 74.
Retrieved November 14, 2007.
8. Ronchi, E. (2015). "Disaster management: Design buildings for rapid evacuation". Nature. 528
(7582): 333. Bibcode:2015Natur.528..333R. doi:10.1038/528333b. PMID 26672544.
9. Kitzen M. (2020) Operations in Irregular Warfare. In: Sookermany A. (eds) Handbook of Military
Sciences. p. 1-21. Springer, Cham doi:10.1007/978-3-030-02866-4_81-1.
10.UN Global Counter-Terrorism Strategy, United Nations Office of Counter-Terrorism, Retrieved
from https://www.un.org/counterterrorism/un-global-counter-terrorism-strategy.
11.The International Criminal Police Organization - Interpol, Retrieved from
https://www.interpol.int/Crimes/Terrorism.
12.The North Atlantic Treaty Organization – NATO, Retrieved from
https://www.nato.int/cps/en/natohq/topics_77646.htm.
View publication stats
The IAPSS Research Committees (SRCs) are a framework for research activities provided by
IAPSS to reach out to professional researchers, analysts and academics who wants to
conduct research in an established surrounding with many possibilities to publish. The
SRCs have preferred access to publishing articles in our Journals (POLITIKON and
Encuentro Latinoamericano) and Blogs, and are also presenting their work at IAPSS
conferences. Once established SRCs work and conduct their research based on the
structure provided by IAPSS.
If you want to do professional research project in collaboration with the SRCs which
will be published on the SRC page you can just check out the possibilities below on this
page. For establishing a new Research Committee, if you cannot find any already
established SRC which covers your research interests, you need three IAPSS members.
For inquiries please feel free to contact the Research Committee Team: rc@iapss.org
The Conflict, Security and Crime Research Committee was established by IPASS to bring
professional researchers, analysts and academics together with a common interest in
conflict, security and crime research.
The Research Committee is composed of several undergraduate, graduate and postgraduate
experts, researchers and analysts from all over the world who conduct research and
analysis together in their respective field.
Research is published at the IAPSS journals POLITIKON, ELA and a Different View – ADV,
or presented at IAPSS’s conferences and events.
Month of January
Vol 1 | Year 2021
This document is under embargo, must not be reproduced or published by any means,
or even sent to third parties without the permission of the author and the responsible entity.