{"id":33110,"date":"2018-10-30T10:57:59","date_gmt":"2018-10-30T05:27:59","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=33110"},"modified":"2018-10-30T10:57:59","modified_gmt":"2018-10-30T05:27:59","slug":"seeing-through-a-glass-darkly-on-combating-terrorism","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/seeing-through-a-glass-darkly-on-combating-terrorism\/","title":{"rendered":"Seeing through a glass darkly: on combating terrorism"},"content":{"rendered":"<p><a href=\"http:\/\/www.thehindu.com\/opinion\/lead\/seeing-through-a-glass-darkly\/article21946959.ece\"><strong>Seeing through a glass darkly: on combating terrorism<\/strong><\/a><\/p>\n<p><strong>Context<\/strong><\/p>\n<p>Terrorism<\/p>\n<p><strong>Different type of attacks<\/strong><\/p>\n<p>Recent attacks in Europe and parts of Asia, from 2015 to 2017 \u2014<\/p>\n<ul>\n<li>beginning with the\u00a0attack on the Charlie Hebdo offices in Paris in January 2015<\/li>\n<li>The major incidents at Brussels and Istanbul Ataturk airports as well as the Bastille Day attack in Nice, France, all in 2016, to the string of attacks in London, Stockholm, Barcelona and New York, in 2017 \u2014 are very different in structure and the morphology from attacks of an earlier period<\/li>\n<\/ul>\n<p><strong>ISIS \u2013 A different type of terror<\/strong><\/p>\n<ul>\n<li>A large number of terror attacks in the past three years have been attributed to the handiwork of the Islamic State (IS), and reveal its leaning towards the \u201cnihilism\u201d of SayyidQutb<\/li>\n<li>It is this which distinguishes the IS from many of the other radical Islamist groups such as al-Qaeda and its affiliates. The IS\u2019s recruitment techniques, especially its ability to proselytise over the Internet, including \u201cdirect to home jihad\u201d as also its more sanguinary brand of violence, set it apart from earlier variants of radical Islamist terror<\/li>\n<\/ul>\n<p><strong>Other active terror outfits<\/strong><\/p>\n<p>Following terror groups have been equally active apart from ISIS<\/p>\n<ul>\n<li>For example, al-Qaeda and its affiliates. The Boko Haram in Africa has been responsible for more killings than most people would realise. Closer home, the Afghan Taliban and the Haqqani network have carried out several spectacular attacks inside Afghanistan. The Tehrik-e-Taliban Pakistan (TTP) and the Lashkar-e-Jhangvi have carried out several attacks inside Pakistan<\/li>\n<\/ul>\n<p>Most of these outfits continue to adopt earlier methodologies. The terror attack on a mosque in North Sinai, Egypt in November this year, which killed over 230 persons, is one such example<\/p>\n<p><strong>Problem with intelligence<\/strong><\/p>\n<p>One common fallacy is that intelligence agencies have remained static, are rooted in the past, and that their personnel are inadequately trained to handle current day intelligence task<\/p>\n<p><strong>Author\u2019s contention: <\/strong>Author states that while there is room for improvement, it is a mistake to presume that intelligence agencies have not made rapid progress and kept up with the times. Intelligence agencies today are well-versed in the latest techniques of intelligence gathering and analysis<\/p>\n<p><strong>Methodology of intelligence agencies<\/strong><\/p>\n<ul>\n<li><strong>Various types of intelligence<\/strong>: Agencies obtain vast amounts of information from both human and technical intelligence, not excluding signal intelligence and electronic intelligence, intelligence from satellites and photo reconnaissance, etc. This is apart from open source intelligence<\/li>\n<li><strong>Data mining<\/strong>: Agencies employ data mining techniques and are familiar with pattern recognition software. Today, noise and signals constitute valuable meta-data. Analysing meta-data has produced more precise information and intelligence than is possibly envisaged, and agencies well recognise the value and utility of this<\/li>\n<li><strong>Open source material<\/strong>: In addition, intelligence agencies have become highly adept in monitoring and exploiting open source material. Mapping and analysis of social networks is today a critical aspect of their work. This is especially useful when it comes to unearthing covert terror networks. Many intelligence agencies today have an extensive database of several thousands of terrorists and potential terrorists<\/li>\n<\/ul>\n<p><strong>Risk-prone agencies<\/strong><\/p>\n<p>Intelligence agencies, like many other organisations, are risk-prone. They do make mistakes. Intelligence analysts, like analysts in other fields, are particularly vulnerable. Problems also arise from inadequate sharing of intelligence across institutions and countries. All these, however, are a far cry from the charge of an inability or failure \u201cto connect the dots\u201d<\/p>\n<p><strong>What is the real problem?<\/strong><\/p>\n<ul>\n<li><strong>No two situations are identical<\/strong>: The real problem is that when dealing with terrorism and terror networks, no two situations in the actual world are identical. The nature of threats is such that they continue to evolve all the time\n<ul>\n<li>Both the\u00a02001 terror attack in New York\u00a0and the November\u00a02008 attack in Mumbai\u00a0were one of a kind with few parallels at the time<\/li>\n<\/ul>\n<\/li>\n<li><strong>Intelligence gap<\/strong>: Anticipating an attack of this nature remains in the area of an \u201cintelligence gap\u201d rather than an \u201cintelligence failure\u201d. Most experts explain an intelligence gap as one denoting an absence of intelligence output while an intelligence failure is one where, based on available evidence, no warning was issued<\/li>\n<\/ul>\n<p><strong>New challenges<\/strong><\/p>\n<p><strong>Qualitative understanding of newer threats<\/strong>: One of the major challenges that all intelligence agencies face is a qualitative understanding of the newer, and many post-modern threats<\/p>\n<ul>\n<li><strong>New technology not enough<\/strong>: Anticipating such threats and their nature requires intelligence agencies to be constantly ahead of the curve. Anticipating newer threats is only partly facilitated by today\u2019s technical advances such as new computing and communication technologies. However, these alone are not often enough to meet today\u2019s intelligence needs.<\/li>\n<\/ul>\n<p><strong>What should be done?<\/strong><\/p>\n<ul>\n<li>As problems become more complicated, and as terror networks become even more sophisticated, there has to be recognition that the situation demands better understanding of factors that are at work<\/li>\n<li>There is a case for far greater sharing of intelligence and information among intelligence agencies worldwide than it exists at present<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Seeing through a glass darkly: on combating terrorism Context Terrorism Different type of attacks Recent attacks in Europe and parts of Asia, from 2015 to 2017 \u2014 beginning with the\u00a0attack on the Charlie Hebdo offices in Paris in January 2015 The major incidents at Brussels and Istanbul Ataturk airports as well as the Bastille Day&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/seeing-through-a-glass-darkly-on-combating-terrorism\/\">Continue reading <span class=\"screen-reader-text\">Seeing through a glass darkly: on combating terrorism<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[555],"tags":[],"class_list":["post-33110","post","type-post","status-publish","format-standard","hentry","category-test-1","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1704698532},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/33110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=33110"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/33110\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=33110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=33110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=33110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}