The Western world has been the target of terrorist attacks for years. Terrorist groups such as Al-Qaeda have had some success in their efforts to infiltrate Western countries and carry out attacks. While these attacks have had devastating impacts, they have provided Western nations with valuable lessons for enhancing security. The terrorist groups are encountering hurdles in their efforts to launch attacks. This has forced them to rethink their strategy and techniques. The groups are now setting their sights on Western nationals whom they recruit, train and instruct to return to their countries to carry out attacks (Gilluffo, Cozzens & Ranstorp, 2010). This new strategy is presents a new challenge for security forces in the Western world and more must be done to counter it.
Methods and techniques used by terrorist groups
In an effort to swell their numbers and improve their chances of successfully attacking Western targets, the terrorist groups employ a number of methods and techniques. Social media is among these methods (Gates & Podder, 2015). Such groups as the Islamic State are reported to appeal to potential recruits through social media platforms like Twitter and WhatsApp. The anonymity that social media offers makes this method particularly effective. Furthermore, thanks to social media, the terrorist groups are able to tailor their messages to the profile of individual targets. Social media has proved useful in the targeting, selection and introduction of recruits to the world of terrorism.
Delegate your assignment to our experts and they will do the rest.
While social media is an important tool, it is not the only one that the terrorist groups rely on for recruitment. Traditional methods are also used. These methods include using clerics and religious facilities. In such countries as the UK, Muslim clerics have been accused of radicalizing young Muslims and encouraging them to take up arms against their own countries (Malik & Laville, 2014). In their recruitment messages, the terrorist groups highlight the ‘injustices’ that the Western countries have perpetrated against Muslim communities. This message is effective in encouraging vulnerable and disillusioned young minds to join the efforts of these groups (Gilluffo, Cozzens & Ranstorp, 2010). Terrorist groups are also known to use handlers and contacts in the Western world. These individuals are charged with the mandate of identifying and recruiting Westerners to join their cause.
Vulnerability of the US and the West
The US and the wider Western world have established robust measures aimed at tackling terrorism. However, despite these measures, Western countries remain exposed to the threat of home-grown terrorism. What makes the West vulnerable is the difficulty in monitoring online activity. As already noted, terrorist groups have embraced social media as part of their recruitment efforts. It is nearly impossible for intelligence and law enforcement agencies in the West to inspect all activities that occur in the digital world (“The Guardian View”, 2017). Furthermore, such social media platforms as WhatsApp have implemented encryption technologies that make it impossible for the agencies to read messages.
Another issue that makes the US and the West vulnerable to home-grown terrorism are the religious freedom principles on which these countries are based. The West has championed for religious freedom staunchly. This means that all people in the Western world are permitted to practice their religion without any restrictions. The strong belief in religious freedom makes it difficult for law enforcement and intelligence services to monitor or raid mosques. It is therefore difficult to ensure that clerics do not radicalize their congregations. When campaigning to become US President, Donald Trump vowed to monitor mosques. This announcement was met with strong criticism. The backlash suggests that Western ideals and values expose the West to the threat of home-grown terrorism.
Value analysis and vulnerability assessment in target selection
When selecting the targets to attack, terrorist groups conduct value analysis and vulnerability assessment. Value analysis involves evaluating targets to determine what the impact of an attack will be. Terrorist groups often target facilities that promise high casualty figures (MI5, n.d). These facilities include public buildings and transport networks. However, even as they target facilities that promise maximum impact, the groups must ensure that they do not go overboard. For example, targeting children and other vulnerable groups may see the group lose the support of their core base. Value analysis is also used to make a political statement. The groups may target government buildings to remind the government that the groups possess the capacity to cause damage to facilities that are well guarded.
Vulnerability assessment is another component of the target selection process. Basically, vulnerability assessment involves examining if there are any security loopholes in the target (Apostolakis & Lemon, 2005). The terrorist groups use vulnerability assessment to determine the level of resistance that they may expect. For example, public buildings are usually well guarded. This makes them poor targets. The groups may focus their efforts on less guarded facilities such as public transport systems. Vulnerability assessment is also used to determine the effectiveness of the methods that the terrorist group intends to employ. For instance, it would be unwise to use guns in an area with low numbers of potential victims. Gun would be more appropriate and effective in targets that host large numbers of people.
Boyd loop
While it is difficult to intercept terrorist attackers before they launch an attack, various methods for identifying them are available. The Boyd loop is among the approaches that law enforcement and intelligence services may use to identify and intercept attackers. Essentially, the Boyd loop outlines how individuals respond to stimuli. The first part of the response process involves observing an event. Orienting oneself to the event is the second part. After orientation, an individual then makes a decision. The last step of the process is taking action. The Boyd loop can be integrated into counter-terrorism efforts. It has been suggested that law enforcement agencies can use it as part of simulation exercises (Tajwer & Shamsi, 2012). Agents can be involved in simulation exercises where terrorist groups are planning an attack. These exercises equip the agents with the skills and attitudes that they need to intercept the attack before it occurs.
In conclusion, terrorism remains a serious challenge for the United States and the larger Western world. Terrorist groups are refining their techniques and coming up with new ones. They have recognized that traditional approaches are no longer effective and cannot be relied on. They have been forced to focus their efforts on recruiting Westerners. Hundreds of Westerners have abandoned the comfort of their home countries and moved to conflict zones. The Westerners pose a grave threat to the Western world. Intelligence and law enforcement agencies must revamp their efforts to keep their countries safe.
References
Apostolakis, G. E. & Lemon, D. M. (2005). A Screening Methodology for the Identification and
Ranking of Infrastructure Vulnerabilities due to Terrorism. Risk Analysis, 25 (2), 361-376.
Gates, S. & Podder, S. (2015). Social Media, Recruitment, Allegiance and the Islamic State.
Perspectives on Terrorism, 9 (4), 107-115.
Gilluffo, F. J., Cozzens, J. B. & Ranstorp, M. (2010).Foreign Fighters. Trends, Trajectories &
Conflict Zones. Retrieved 17 th July 2017 from
https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/HSPI_Report_16.pdf
Malik, S. & Laville, S. (2014). Islamic Recruitment moves from Online Networks to British
Mosques. Retrieved 17 th July 2017 from https://www.theguardian.com/world/2014/sep/05/isis-recruitment-moves-to-radical-network-and-mosques
MI5. (n.d). Terrorist Targets. Retrieved 17 th July 2017 from
https://www.mi5.gov.uk/terrorist-targets
Tajwer, K. & Shamsi, J. (2012). Counter-terrorism Simulation Framework. System
Engineering and Technology (ICSET) 2012 International Conference, 1-7.
The Guardian View on Counter-Terrorism: Strong Encryption makes us all Safer. (2017).
Retrieved 17 th July 2017 from https://www.theguardian.com/commentisfree/2017/mar/27/the-guardian-view-on-counter-terrorism-strong-encryption-makes-us-all-safer