Seeing through a glass darkly: on combating terrorism
Red Book
Red Book

Pre-cum-Mains GS Foundation Program for UPSC 2026 | Starting from 14th Nov. 2024 Click Here for more information

Seeing through a glass darkly: on combating terrorism

Context

Terrorism

Different type of attacks

Recent attacks in Europe and parts of Asia, from 2015 to 2017 —

  • beginning with the attack on the Charlie Hebdo offices in Paris in January 2015
  • The major incidents at Brussels and Istanbul Ataturk airports as well as the Bastille Day attack in Nice, France, all in 2016, to the string of attacks in London, Stockholm, Barcelona and New York, in 2017 — are very different in structure and the morphology from attacks of an earlier period

ISIS – A different type of terror

  • A large number of terror attacks in the past three years have been attributed to the handiwork of the Islamic State (IS), and reveal its leaning towards the “nihilism” of SayyidQutb
  • It is this which distinguishes the IS from many of the other radical Islamist groups such as al-Qaeda and its affiliates. The IS’s recruitment techniques, especially its ability to proselytise over the Internet, including “direct to home jihad” as also its more sanguinary brand of violence, set it apart from earlier variants of radical Islamist terror

Other active terror outfits

Following terror groups have been equally active apart from ISIS

  • For example, al-Qaeda and its affiliates. The Boko Haram in Africa has been responsible for more killings than most people would realise. Closer home, the Afghan Taliban and the Haqqani network have carried out several spectacular attacks inside Afghanistan. The Tehrik-e-Taliban Pakistan (TTP) and the Lashkar-e-Jhangvi have carried out several attacks inside Pakistan

Most of these outfits continue to adopt earlier methodologies. The terror attack on a mosque in North Sinai, Egypt in November this year, which killed over 230 persons, is one such example

Problem with intelligence

One common fallacy is that intelligence agencies have remained static, are rooted in the past, and that their personnel are inadequately trained to handle current day intelligence task

Author’s contention: Author states that while there is room for improvement, it is a mistake to presume that intelligence agencies have not made rapid progress and kept up with the times. Intelligence agencies today are well-versed in the latest techniques of intelligence gathering and analysis

Methodology of intelligence agencies

  • Various types of intelligence: Agencies obtain vast amounts of information from both human and technical intelligence, not excluding signal intelligence and electronic intelligence, intelligence from satellites and photo reconnaissance, etc. This is apart from open source intelligence
  • Data mining: Agencies employ data mining techniques and are familiar with pattern recognition software. Today, noise and signals constitute valuable meta-data. Analysing meta-data has produced more precise information and intelligence than is possibly envisaged, and agencies well recognise the value and utility of this
  • Open source material: In addition, intelligence agencies have become highly adept in monitoring and exploiting open source material. Mapping and analysis of social networks is today a critical aspect of their work. This is especially useful when it comes to unearthing covert terror networks. Many intelligence agencies today have an extensive database of several thousands of terrorists and potential terrorists

Risk-prone agencies

Intelligence agencies, like many other organisations, are risk-prone. They do make mistakes. Intelligence analysts, like analysts in other fields, are particularly vulnerable. Problems also arise from inadequate sharing of intelligence across institutions and countries. All these, however, are a far cry from the charge of an inability or failure “to connect the dots”

What is the real problem?

  • No two situations are identical: The real problem is that when dealing with terrorism and terror networks, no two situations in the actual world are identical. The nature of threats is such that they continue to evolve all the time
    • Both the 2001 terror attack in New York and the November 2008 attack in Mumbai were one of a kind with few parallels at the time
  • Intelligence gap: Anticipating an attack of this nature remains in the area of an “intelligence gap” rather than an “intelligence failure”. Most experts explain an intelligence gap as one denoting an absence of intelligence output while an intelligence failure is one where, based on available evidence, no warning was issued

New challenges

Qualitative understanding of newer threats: One of the major challenges that all intelligence agencies face is a qualitative understanding of the newer, and many post-modern threats

  • New technology not enough: Anticipating such threats and their nature requires intelligence agencies to be constantly ahead of the curve. Anticipating newer threats is only partly facilitated by today’s technical advances such as new computing and communication technologies. However, these alone are not often enough to meet today’s intelligence needs.

What should be done?

  • As problems become more complicated, and as terror networks become even more sophisticated, there has to be recognition that the situation demands better understanding of factors that are at work
  • There is a case for far greater sharing of intelligence and information among intelligence agencies worldwide than it exists at present
Print Friendly and PDF
Blog
Academy
Community