By: Sherif Abu Fadl
The current fluidity situation of terrorist organizations has led to a greater challenge for the national security apparatus of the national state in general and, at the heart of it, the intelligence apparatus. The traditional methods of the state, in terms of their use of coercive tools of power (army, police and judiciary), are no longer sufficient to track terrorist groups, eliminate them and prevent them from continuing in the future.
The post-globalization world in which we now live is characterized by clear fluidity in all aspects of life. The political, social, cultural and scientific changes surrounding us have also resonated with those extremist organizations, which have utilized them the best and developed their work and movement in order to prevent falling prey to the security apparatus waiting for them. In return, the agencies have followed these developments to track down terrorist groups and to prevent them from carrying out new terrorist operations.
Terrorist organizations have adopted the decentralized network method and recruited elements everywhere without the need for public disclosure in order to carry out terrorist operations within the framework of the idea of “international fighting” launched by the sheikh of al-Qaeda and its supreme symbol, Osama bin Laden. These organizations and individuals have moved from one place to another using the means of transportation and communication between countries. They have used the most modern technological capabilities in the world to recruit and communicate with each other, while the processes of separation and integration within terrorist organizations has also increased for various ideological reasons.
All this has forced the intelligence agencies to be more challenging and burdensome to keep pace with those changes. They do not deal with a clear enemy in a clear place, but with quicksilver entities that have the capacity to adapt and camouflage as necessary to survive in their destructive approach.
The phenomenon of terrorist fluidity will be presented as an intelligence challenge through two main components: the concept of a fluid jihadist and the development of intelligence work in the face of terrorist fluidity.
The concept of fluid jihadism:
The concept of “fluid jihadism” has recently been used by researchers and specialists. It means that people are not required to be those devoted to organizations who have embraced jihadist ideology, but they are attracted the jihadist situation in general.
They have spread more under the context of circumstantial conditions, such as the Soviet invasion of Afghanistan in 1979 and the American invasion and occupation of Iraq in 2003, as groups emerged during that period adopting the idea of resistance, carrying out jihadist operations against the Soviets in the first case and the Americans in the second case.
Based on this conceptual definition of fluid jihadism, it is possible to understand the nature of the fluid state of terrorist organizations, which means that these organizations have the flexibility to adopt different methods, not necessarily one or the same, but necessarily in accordance with the fundamentalist and jurisprudential reference, despite the differences among some branches and the methods of application.
The fluidity situation of the terrorist organizations, along with non-organizational individuals joining them ideologically (love wolves), has led to splits among factions and branches of the terrorist organizations themselves. The period following the emergence of the terrorist ISIS organization in Iraq and Syria has seen some splits, particularly from al-Qaeda, while the harsh blows delivered to the Muslim Brotherhood in Egypt led to the escape of some its elements and other Islamic groups, who then joined ISIS.
The fluid state of terrorist organizations can be addressed through the following axes:
Axis I: Decentralized Networks
The manifestations of globalization have led to the adoption of more modern and sophisticated intellectual and motorist paths by terrorist groups because nation states have been able to learn many of the traditional methods of such groups, which have led the latter to take measures to prevent them from falling prey to the state organizations that prey on them.
One of the most prominent of these is the decentralized network, which relies on developing the decentralized conception of organization, in terms of building ideological perceptions and practicing terrorist acts through local organizations that have absolute loyalty to the mother group, such as terrorist groups operating in Egypt’s Sinai, Syria, Somalia or Morocco, each of which has its own local activity and allegiance to al-Qaeda or ISIS.
The phenomenon of lone wolves is the optimal model of the decentralized network style adopted by terrorist organizations. This phenomenon is defined as a series of individual acts of aggression by individuals motivated by personal or ideological motives, with the aim of causing serious damage to the state or society, embracing a radical idea that turns into reality once they have the opportunity.
Although the idea of using lone wolves was not from Islamic organizations, they have recently started to use it strongly, with the most prominent manifestations in the era of technical development and the targeting of state organizations by all means, including security, scientific and intellectual.
The terrorist organizations, headed by al-Qaeda, have used this phenomenon well. In the past two years, many operations have been carried out in Europe, through which terrorist organizations have managed to implement their strategy of enemy aggression. It means winning against the enemy at the lowest possible cost, as a result of the exposure of ISIS in Iraq and Syria or al-Qaeda in Yemen and elsewhere.
According to the strategy, operations have unusual forms, including booby-traps and the use of knives to stab as many as possible so that a fighter can escape before being killed, or running people over, as was the case with the incidents in Berlin, Germany and Nice, France.
The use of decentralized terrorist networks has increased following the severe strikes in Syria and Iraq to ensure the continuity of the terrorist organization and carrying out terrorist attacks.
The internet is the lifeblood of terrorist organizations in the present era, through which it can facilitate its activities. It has been credited with the universality of many local terrorist organizations, which have used it to promote and propagate their ideologies and operations throughout the world, as well as attracting new fighters and funds, and communicating between fighters within a single organization and with other terrorist groups, to the extent that it has become the primary source for the promotion of terrorist organizations and their operations and objectives. It has become a means of launching electronic wars, tampering with the internal security of states, and targeting the vital and military installations of the state, which is becoming a concern for international security interests.
Axis II: Transnational Terrorism
Terrorist groups aspire to regional and global causes for many reasons. In this context, the terrorist system becomes transboundary through elements of a terrorist organization that can be transferred from one region to another or through operations carried out against targets in different countries. Of course, these organizations have a variety of funding enabling them to operate.
Transnational terrorism is based on a set of intellectual and contextual bases. This form of terrorism relies on the idea of international allegiance and fighting. The first transnational rhetoric can be found in al-Qaeda, when the former leader of the organization, Osama bin Laden, made his famous call in 1990s for Muslims to join the fight of international jihad.
Bin Laden stimulated the transnational terrorist system and gave it the required ideology. Local conflicts became part of a global struggle against “apostasy and infidelity” and an extended war between Islam and the West.
Similarly, these organizations have also called for the idea of “bayah”, or allegiance, which was originally intended to make Muslims swear allegiance to their rulers in the first centuries of Islam. ISIS strongly expressed the concept of an Islamic caliphate and giving allegiance the self-proclaimed “caliph” Abu Bakr al-Baghdadi.
Contextual factors have also contributed to the promotion of transnational terrorism, including the weakness of the nation state and the fragility of its grip on its entire territory, which has led to the emergence of soft areas outside its sovereignty that become hotbeds of transnational extremist groups (i.e. the border area between Pakistan and Afghanistan, Morocco, etc.), as well as the possibility of using such countries as safe passages for terrorist groups, as in Libya, along with other factors related to religious identities, such as Iran and Hezbollah with their defense of Shiites in Iraq, Syria and Yemen, or the different areas of conflict, as is the case in Syria, Yemen, Iraq, Somalia, Libya and elsewhere.
Axis III: Processes of Terrorist Organizations’ Dissolution and Integration
The processes of terrorist organizations’ dissolution and integration are the most prominent manifestation of the phenomenon of terrorist fluidity. This means dealing with the processes of dissolution and integration of terrorist organizations at the level of groups. This pattern has recently increased and Syria has been a fertile environment for it. The smaller groups usually merge into larger groups, the command and control structure unifies, and the larger group’s ideas predominate.
One example is the model of Abu Omar al-Shishani’s organization Jaish al-Muhajireen wal-Ansar (Army of Emigrants and Supporters), which emerged from the Muhajireen Battalion that began fighting Aleppo, Syria in September 2012 and other similar terrorist groups.
Between late 2013 and early 2014, Shishani merged his group into ISIS after giving allegiance to Baghdadi, while a splinter group of the organization announced that it would join al-Nasra Front.
The terrorist groups also depend on the phenomenon of dissolving the mother group for a number of reasons, which may be intellectual, due to the level of implementation and means of the main organization, the desire for a wider area of movement that is not allowed by the mother group, or the emergence of currents with more or less extreme ideas and visions.
Examples of this include the announcement by al-Nasra Front (now Tahrir al-Sham) of its secession from al-Qaeda and Ansar al-Din’s many divisions in 2012-2013, along with other such cases.
The development of intelligence work in the face of terrorist fluidity:
There is no doubt that the development of the work of terrorist organizations significantly imposes a great challenge on countries’ national security organizations to develop their work and performance more effectively. The fluidity situation of the terrorist organizations poses a great challenge for the intelligence services to track these groups. There should be no satisfaction in the traditional methods of eliminating terrorism; counter-terrorism does not only require reliance on military force but also sufficient reliance on an intelligence force that seeks to dismantle terrorist groups and prevent attacks. States fighting terrorism pursue small groups often linked to each other, in addition to following a number of individuals who conceal their identities and appear to the surface only for a short period at the time they carry out their terrorist attacks.
Military capabilities, while important, are not enough to prevent other terrorist incidents. A comprehensive confrontation with terrorism requires a secret confrontation, an authentic work of the intelligence services, which can also monitor the movement of terrorists at the local level, monitor their movements and travels in and out of the country.
The decentralized network of terrorist organizations is a new tactic that leads to the need for cooperation between the intelligence services of the region and the world in order to monitor the movements of terrorist individuals and groups. The intelligence services also need to be vigilant in tracking and identifying inert terrorist elements within the state, who are often immersed in their social environment, which requires the special capacities of these bodies to address this phenomenon.
The aspect of intelligence cooperation between states’ organizations is important in terms of the comprehensive confrontation of terrorism, because terrorist organizations are no longer static in a certain area but are characterized by fluidity in their geographical and organizational movement and transition, making it difficult to estimate their location and size. Indeed, intelligence cooperation succeeds in making significant progress in the war on ISIS and reducing the activity of al-Qaeda, having neutralized a large number of prominent ISIS leaders as a result of this endeavor.
For example, the Iraqi judiciary, in September 2018, sentenced Baghdadi’s deputy, Ismail al-Ithawi, to death by hanging. Ithawi had held a number of prominent positions in ISIS, such as an official of the advisory committee that is entrusted with the development of curricula for the organization. He was arrested in Turkey in February 2018 in a joint operation between the Iraqi, Turkish and American intelligence services. Also, Libya’s security services, in coordination with the Egyptian intelligence services, managed to arrest the terrorist Hisham Ashmawi.
The technological developments have led to terrorist groups adopting modern technology to implement their schemes, through recruitment, communication, and material and moral support. This requires intelligence agencies to monitor and follow up on the techniques used by these groups for their subversive purposes. In this context, the United Nations was called upon to formulate an international charter that would regulate social media so that terrorists could not use it as a forum for the dissemination of their ideas.
The intelligence services seek to prevent any contact between extremist groups or the recruitment of new elements by means of advertising and promoting on the internet, in addition to preventing these organizations from using modern means of funding through transfers using Bitcoin, a digital currency based on the anonymity of transactions and decentralized control.
The integration and separation of terrorist organizations requires the need to trace such groups and branches, compile comprehensive databases of all known organizations and branches, and adapt to the constant modifications as required, which would make it easy to know the terrorist map of each country on the one hand, and regional and international groups on the other, in what could be called “the global counterterrorism intelligence unit”.
The terrorist organization in general is an intelligence military system with intellectual reference, moving and carrying out its operations according to these axes. Therefore, the military, intelligence and intellectual dimensions must be taken into account in order to make the confrontation more comprehensive and more effective.
admin in: How the Muslim Brotherhood betrayed Saudi Arabia?
Great article with insight ...
https://www.viagrapascherfr.com/achat-sildenafil-pfizer-tarif/ in: Cross-region cooperation between anti-terrorism agencies needed
Hello there, just became aware of your blog through Google, and found ...