Archive | International Relations RSS feed for this section

The Challenge of Looking Beyond The Islamic State: Trump’s Foreign Policy Inheritance

21 Dec

jihadists

Is the Islamic State Worth Destroying?  From a moral standpoint, one can’t help but answer the question in the affirmative.  How can one sit idly by, as the world did when Fascism spread throughout Europe and Southeast Asia?  Then again, none of the major powers really became heavily involved until either a surprise attack befell them, and/or their treaty obligations with another major power required them to act.  Even then, the British merely sent an Expeditionary Force and the U.S. steered clear of major combat operations in Europe, until the enemy’s weaknesses could be favorably exploited.  Nonetheless, acting against modern-day fascists is a worthy cause.  And fascism is precisely the term to describe the so-called Islamic State and their ilk.

Continue reading

Russian Hacking Accusations Sours Russia-US Relations

20 Oct

Russian Hacking Accusations Sours Russia-US Relations

In the age of cloud computing for everything from picture storage to banking, cyber security is one of the most important security issues on the international stage. The recent hacking allegations against Russia, not to mention the internet being used as a recruitment tool for ISIS terrorist cells, points to a new kind of war.
Continue reading

Potentially Misleading Statistics on Global Terrorism

30 Jun

Potentially Misleading Statistics on Global Terrorism

Recently, the 2015 statistics were released by the Global Terrorism Database (GTD), hosted at the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START).  Prior to making the data publicly available, of course, scholars associated with START took the liberty of publishing their own articles while access was monopolized.  The State Department also got a head-start on putting out its 2015 report on terrorism, based largely on START’s work.  This is somewhat fitting, as START’s funding comes exclusively from federal dollars.  Aside from a little monopolization of publicly funded databases, there are some important misleading conclusions that the layperson might be inclined to draw.  I will explain how and why this is the case.

In considering the recent GTD data release, Andrew Flowers (of FiveThirtyEight) did interpret something correctly when he observed that “Terrorism Declined Last Year- but Not in the West.”  In his brief article, he correctly cited START’s GTD statistics that support the claim that terrorism was reduced abroad from the previous year (2014). However, in his search to understand why, he interviewed the GTD’s program manager, Erin Miller, who stated that “it’s possible that ‘2014 was just a really bad year and 2015 was still violent but somewhat less so by comparison.'”  This is somewhat incomplete, because it doesn’t take into account the shifting sands, so to speak, in the battle against the Islamic State (IS) transnational terrorist army.  For instance, the introduction of Russian Airstrikes would have had some impact on the Islamic State’s ability to act effectively in carrying out terrorist attacks in the region.  Additionally, the combined efforts of the Iraqi/Iranian governments and U.S. (and allied) air support had to have hindered some of the key logistical elements that IS would have needed to attack locally.

Another area in which START’s GTD is less than helpful is in their methodology.  The GTD claims, and Ms. Miller is cited by Flowers as stating that, the classification for terrorism includes “threatened or actual use of illegal force and violence by a nonstate actor…”[Emphasis added.]  The problem is that the database doesn’t include failed or foiled attacks; many of which were Islamist-inspired.  In 2015 alone there were at least 56 arrests on ISIL-related charges in the U.S. (note that the figure might be higher, as the report only covered the period ending November 12, 2015).  This statistic is not captured in GTD’s database, while many of the alleged “terrorism” events didn’t meet their own criteria to be so labled (6 out of 38, or 16%).  Yet, Flowers cites Miller’s example of church arsons in what appears to be an effort to claim racially motivated (read: right-wing) violence.  The implication one might incorrectly discern is that there are fewer instances of Islamist violence, or planned violence, than other sorts of terrorism, or suspected terrorism.

A more appropriate set of conclusions to be drawn are two-fold.  First, terrorism abroad has been hindered in the Middle East as a result of a broad offensive against its primary perpetrators.  Much of the IS-related attacks in the region have been carried out as operational-level strikes that support the ongoing insurgency.  The second conclusion is that domestically, terrorism has been on the rise, but Islamist-inspired terrorist plots have been disrupted far more frequently as a result of law enforcement’s due diligence.

Although Mr. Flowers mentions “the killing of three Muslims in Chapel Hill, North Carolina” as the “fourth-deadliest attack in the U.S. last year,” he doesn’t mention that even the GTD doubts it was motivated by anti-Muslim hate.  Absent in many discussions of global terrorism trends (including the piece under review here) is that of the 10 most deadly terrorist organizations in 2015 a full 90% were Islamists (mostly allied with IS and a couple with al-Qaeda).  This is, of course, obscured by focusing on the extremely rare instances in which Muslims are killed by non-Muslims and ignoring the patent fact that most Muslims (and many non-Muslims; especially in the Middle East and Europe) are victims of Islamist terror.

David Firester is the founder and CEO of TRAC Intelligence (Threat, Reporting, and Analysis Consultants), which is a premier threat analysis firm. TRAC Intelligence provides threat assessment in the private sector.

 

 

 

Syrian Penetration of the Southern European Front: Observations and Implications

19 Apr

Syrian Penetration of the Southern European Front: Observations and Implications

Recently, I had occasion to travel to southern Europe.  Specifically, I was on the border of Greece and its northern neighbor, Macedonia.  I was rather interested in gauging the Syrian refugee issue from the standpoint of a passerby.  What I noticed was that all along the road leading from the border toward Thessaloniki one could see gas stations filled with tents, kids playing soccer, women cooking on open fires and men walking along the road; a few of whom were hitchhiking (shown below).

What stood out to me was the sheer number of military age males, many of whom were equipped with cell phones.  The experience generated two questions.  First, where do desperate refugees acquire the funds to purchase cell phones and data/voice plans that would work in Europe?  Secondly, is it possible that the men were merely innocent victims in Syria’s half decade of civil war?

One can only surmise that the first question could be answered with the discovery of additional evidence.  Nonetheless, it is curious.  The second question, however, seems to be more thought-provoking and the answer is partially known.  As anyone keeping up with the news can plainly see, the latest source of attacks in Europe have come from the Arabic-speaking conflict zones.  The Islamists who carried out assaults on Western Europe apparently mixed in with the majority of innocent refugees.  What the men have in common with each other is that they are all fighting age.  What they also have in common is an allegiance to the latest (and most powerful) iteration of political Islam: The so-called Islamic State (IS/ISIS/ISIL/Da’esh).

One may be inclined to believe that the presence of military age males with cellphones among women and children is insufficient evidence of the potential for terrorism to materialize as they move into central and Western Europe.  That is a fair guess.  Yet guessing incorrectly has deadly consequences.  To wit, if one casually peruses YouTube for Syrian war videos, one will notice that not only are there no moderate forces, but nearly all interviewed fighters espouse some degree of Islamist sentiment.  In fact, most videos are posted by various Islamist elements; be they IS, Jabhat al Nusra (the al-Qa’ida branch in Syria), or any of the dozens of other smaller fighting units.

Hence, military age males coming from Syria (and other regional conflict zones of a similar sort) could not entirely be dismissed as mere victims of violence.  With the exception of a number of non-Arab Kurdish factions, it would be counter to the Arab men’s survival instincts to imagine that they fought alongside moderate Arab militias.  This is plausible for one important reason: there are none.  The Free Syrian Army has patently been shown to be a farce and, oddly enough, the Syrian government forces are the only Arab moderates, if the term could be applied at all.

Although the Macedonian government gets it right in not allowing the undocumented to transit through their country without papers that carry them to the other side, this country of limited size and wealth will likely suffer the fate that awaits them when a few bad actors unlawfully slip through the cracks.  As I left Macedonia, it was relayed to me by some civilians that they encountered two Arab men approximately 8.5 miles inside of Macedonia, in a mountainous area that is inaccessible by vehicular means.  The Arab men asked in English where the road to Serbia could be found.  Startled, the civilians pointed in the opposite direction, toward Greece.  Hopefully the Macedonian border guards have since scooped them up.

Beyond Macedonia

While I was at a major train station, Praterstern, in Vienna a few days after my Macedonia/Greece border observation, I noticed something else.  When the sun went down, young Arab males were hanging out at the main exit/entry point to the station.  What they were doing was staring folks down, playing loud Arabic music and generally being rowdy and rude.  For someone to imagine that they are merely displaced and alienated by Austrian society one could easily, yet incorrectly, conclude that their behavior is a result of their isolation; shifting the blame to Austrian society.  This is precisely the sort of tactic that (Leftist) refugee sympathizers typically employ: blame the nation to which an external and unyielding population has sought to establish itself.

Promoting narrative fallacies is bad enough, but the policy implications are far worse.  As I saw pro and anti-immigration protesters gathering in Thessaloniki (Greece) I wondered why it was that anyone would intentionally invite potential terrorists, along with the poor and destitute, that an economically failing country could not afford to absorb.  The myth that poverty causes terrorism has been debunked time and again, as is clearly evident by the billions of poor folks around the world that never choose the strategy as a viable option.  Indeed, even if it were true, it would run counter to one’s own argument to willfully welcome large numbers of poor immigrants who have nothing in common (language, religion, culture, and national experience) with the host country’s inhabitants. Rather, terrorism is caused by those who see fit to employ it as a tool.

At present, terrorism isn’t being used by Swedish Christians, Chinese Buddhists, or Israeli Jews.  Everyone knows who is doing it, but too many are afraid to utter the words describing the faction: Islamist Supremacists/Jihadist Ideologues.

 

Photographic Evidence:

 The Gas Stations in Which Refugees Were Readily Observed:

The Gas Stations in Which Refugees Were Readily Observed

 

The Scene from the Northern Location:

The Scene from the Northern Location

 

 The Scene from the Southern Location:

The Scene from the Southern Location

Military Age Males Walking Roadside:

Military Age Males Walking Roadside

David Firester, Expertise Sought and Offered

7 Apr

Recently, I was cited by Metro News as a terrorism expert.  They had asked me to comment on the new terrorism laws that recently passed in the New York State Senate and were headed to the assembly for a vote.  The paper did an excellent job of quoting me in context.  I thought, however, that I would offer my full sentiments on the matter for which I was contacted.  What follows is a more robust and complete statement of my expert opinion on the topic.  I hope you enjoy!

I was asked two fundamental questions and my answers were as follows:

  1. Do you think that Inc. Penalties for crimes relating to aiding terrorism, using social media to further terror recruitment/cyber terror/, as well prosecuting those who would remain silent with knowledge of terror plots, such as happened in San Bernardino, will have any impact on our ability to combat terrorism here? 

These proposed laws seem to serve two important goals.  First, some would enable citizens to alert the authorities when it appears that another is engaged in advancing terrorist aims either by inciting violence, or condoning it for terrorism’s sake.  Secondly, the bills appear to horizontally extend the impact of laws, which are already on the books, while adapting them to meet the changing threat landscape.  Some examples follow.

Extant laws covering larceny and money laundering may cover traditional crimes that center on personal greed, but terrorists seem to be motivated by a different set of incentives.  Certainly, traditional crime may involve a cyber component, but crafting legislation to go beyond mere criminality is a responsible means by which to deal with someone who is serving broader terrorist aims.  A specific example would be one who steals a credit card and goes online to fraudulently purchase, say, a laptop or pressure cooker, but if it turns out that one has purchased the components of a homemade bomb it is worth having a law that addresses this unique circumstance.

Another example would be grand larceny in the second degree, which is a class C felony.  All that is required in this instance is that the value of the sum stolen equals $50,000 or more.  Money laundering in support of terrorism in the second degree is already a class C felony and the monetary threshold is merely $25,000; the same charge in the first degree is a class B felony and the threshold in that instance is $125,000.  Most of the bills under consideration by the New York State Assembly either propose new, or enhance current, legislation that might result in a C felony conviction.  Only one, cyber terrorism, proposes that an A felony be charged and in that instance it deals with mass injury as a result of terrorist activity.

With regard to making a terroristic threat against a police officer, one must bear in mind that offenses, such as assault, are already treated as more serious when they are committed against a law enforcement officer.  This specific bill codifies, and increases the penalties for, combining threats that one directs at both civilians and police officers.

  1. What types of approaches would work? Is there a best strategy to help keep people safe? 

Of late, there has been an increase in cases in which Americans with no prior connection to jihadist terror have somehow demonstrated an ability to radicalize rather quickly.  Although it is difficult to know if the new laws would deter would-be terrorists, it is important to convey to jihadist aspirants that their nefarious intentions can result in more serious punitive measures.

In order to successfully fight terrorism, both at home and abroad, the law is an important tool for police and prosecutors, but also for civilians determined prevent attacks such as the Boston bombing or San Bernardino combined assault.  This proposed legislation enables our frontline law enforcement officers the ability to defend the citizenry, which is their primary function.  However, there are some significant gaps in our defenses.  Specifically, there is no national database of jihadist identifiers, which enable law enforcement to quickly and accurately connect the dots that would raise suspicion levels to a degree worth pursuing in the criminal realm.

Detecting a genuine jihadist threat is important for law enforcement.  So is establishing whether a new threat has emerged and whether it has been detected elsewhere.  As a nongovernmental entity, Jihad Intel seeks to provide law enforcement with the ability to ameliorate the natural shortcomings of the law as it is written.  It lends assistance to those whose job it is to do the dot-connecting, by serving as an open source clearinghouse for jihadist Symbology.  The tool itself may also be used by civilians, who notice something that appears to be associated with terrorism.

Your question specifically asks what approaches and strategy are appropriate.  The answer is that laws by themselves are insufficient.  A “whole of society” approach is needed.  Many crimes are solved when citizens feel comfortable speaking with the police, who then determine whether a criminal or terrorist act is afoot.  The private sector can enhance the speed and efficiency of the public sector where budgetary constraints inhibit progress.  The bills under consideration do seem to serve a more holistic strategy to combating terrorism.

The Islamic State and al-Qa’ida have specifically called for the targeting of both civilians and the police.  In some instances they have been successful.  It is wise to adopt legislation that meets the threats emanating from our enemies abroad.  A major component of their strategy is to penetrate our society and generate terror from within our borders.  The best strategy seeks to neutralize one’s adversary’s strengths.  This legislation is a means by which to do so.

Obama’s Foreign Policy Challenge in the Arab World

25 Nov

Obama’s Foreign Policy Challenge in the Arab World.

Timing is Everything in Politics; No Exceptions for National Security

10 Nov

One of America’s most favorite general officers is in hot water.  Ho hum, right?  Not so fast.  Like many before him, his career has ended because of his sexual misdeeds.  David Petraeus is finished.  The most striking feature of his demise is not so much his alleged extramarital affair.  Rather, it is the timeline in which this event’s revelation has come to light that seems to generate more questions than it does answers.  Closure is not an accurate verb to describe this event.  Rather, it is looking more like sabotage.

It is most troubling that Director of Central Intelligence (DCI) Petraeus’s resignation comes just after the 6 November election, yet just prior to his forthcoming congressional testimony in the Benghazi debacle.  The Washington Post has reported that the FBI “investigators first interviewed Petraeus about two weeks ago.”  That’s funny.  Two weeks ago was precisely when Director Petraeus had claimed his agency’s immunity regarding the 11 September 2012 Benghazi terrorist assault and assassination.  So, why did Petraeus wait until the end of the election to resign, consequently revealing what had likely already been known about his affair?  Simply stated: damage control.  For whom, you ask?  For everyone.

Although much evidence may never become known as to the actual events that brought the CIA Chief down, I’m going to offer what in its skeletal form appears to be a conspiracy theory.  Here it goes:

On or about 24 October 2012 it was revealed by Reuters, and eventually USA Today, that the e-mails sent to the White House Situation Room did reveal the nature and character of the terrorist attacks on 11 September 2012.  That very same article documented White House spokesperson Jay Carney’s attempt to deflect blame toward the Intelligence Community.  As this is a common tactic during the post mortem phase of national crises, Director Petraeus had taken the appropriate step of ensuring that his agency was insulated from blame that did not fall squarely on their shoulders; effectively, the blame was tossed back to the Executive branch.  At almost this exact time, the FBI had “discovered” Petraeus’s affair.  So far, all of this is known to be true.

When attempting to fill in the blanks left by imperfect information it is useful to have an intelligence analyst available to perform the task.  Well, here I am.  So, here comes the fictional element that strives to lessen the gap in knowledge.  The FBI informs Petraeus that they’re aware of his affair.  They inform him that since it is less than two weeks from the election and the President is already taking hits on the Benghazi incident he should remain silent.  He is told that if he resigns after the election the details of the affair (audio, video, pictures?) will be limited.  This would account for the period of two weeks until the Election Day, when Petraeus had reportedly informed Director of National Intelligence James Clapper that he had cheated on his wife.

Conspiratorial per se?  Perhaps.  Something just seems woefully deficient in this story.  Maybe that something is the truth.  As the well-known epitaph is written at the entryway to CIA headquarters, “And ye shall know the truth, and the truth shall make you free.”

Timing is Everything in Politics; No Exceptions for National Security

10 Nov

One of America’s most favorite general officers is in hot water.  Ho hum, right?  Not so fast.  Like many before him, his career has ended because of his sexual misdeeds.  David Petraeus is finished.  The most striking feature of his demise is not so much his alleged extramarital affair.  Rather, it is the timeline in which this event’s revelation has come to light that seems to generate more questions than it does answers.  Closure is not an accurate verb to describe this event.  Rather, it is looking more like sabotage.

It is most troubling that Director of Central Intelligence (DCI) Petraeus’s resignation comes just after the 6 November election, yet just prior to his forthcoming congressional testimony in the Benghazi debacle.  The Washington Post has reported that the FBI “investigators first interviewed Petraeus about two weeks ago.”  That’s funny.  Two weeks ago was precisely when Director Petraeus had claimed his agency’s immunity regarding the 11 September 2012 Benghazi terrorist assault and assassination.  So, why did Petraeus wait until the end of the election to resign, consequently revealing what had likely already been known about his affair?  Simply stated: damage control.  For whom, you ask?  For everyone.

Although much evidence may never become known as to the actual events that brought the CIA Chief down, I’m going to offer what in its skeletal form appears to be a conspiracy theory.  Here it goes:

On or about 24 October 2012 it was revealed by Reuters, and eventually USA Today, that the e-mails sent to the White House Situation Room did reveal the nature and character of the terrorist attacks on 11 September 2012.  That very same article documented White House spokesperson Jay Carney’s attempt to deflect blame toward the Intelligence Community.  As this is a common tactic during the post mortem phase of national crises, Director Petraeus had taken the appropriate step of ensuring that his agency was insulated from blame that did not fall squarely on their shoulders; effectively, the blame was tossed back to the Executive branch.  At almost this exact time, the FBI had “discovered” Petraeus’s affair.  So far, all of this is known to be true.

When attempting to fill in the blanks left by imperfect information it is useful to have an intelligence analyst available to perform the task.  Well, here I am.  So, here comes the fictional element that strives to lessen the gap in knowledge.  The FBI informs Petraeus that they’re aware of his affair.  They inform him that since it is less than two weeks from the election and the President is already taking hits on the Benghazi incident he should remain silent.  He is told that if he resigns after the election the details of the affair (audio, video, pictures?) will be limited.  This would account for the period of two weeks until the Election Day, when Petraeus had reportedly informed Director of National Intelligence James Clapper that he had cheated on his wife.

            Conspiratorial per se?  Perhaps.  Something just seems woefully deficient in this story.  Maybe that something is the truth.  As the well-known epitaph is written at the entryway to CIA headquarters, “And ye shall know the truth, and the truth shall make you free.”

The Obama Administration Must Reinforce Words with Deeds

9 Sep

In a recent Huffington Post Op-Ed (29 August 2012), Alan Dershowitz had opined that although President Obama is committed to the “preventive military option” he faces a credibility gap between his declaratory statements and what the Iranian regime believes will transpire.  The “faction” within the Obama camp that sees little use for military action sustains this gap, according to Dershowitz.  In their view, “saber rattling” is an impediment to peace.  Intuitively, they are correct.  In reality, they are not.  Here is why: credibility hinges on demonstrable force factors.

If Iran (and even Israel) believe that the force of the American President’s bellicose words are sapped by domestic ideological opposition, both are inclined to disbelieve what they hear.  The only way to mend such a fissure is to act with more credibility than one’s target state is hearing in one’s rhetoric.  To supplement words with deeds grants one’s opponent the opportunity to reassess their own message decoder.  If, however, words and deeds are in stark contradiction then the ambiguity (whether accidental or intentional) may be perceived as domestic dissonance, consequently revealing a potential noncommittal posture.

So, what is the United States actually doing (or failing to do)?  Perhaps it is best to view purely military actions as either helpful or unhelpful in reinforcing the credibility of one’s attendant verbal expression.  On the former, it has recently been reported that the American Navy is increasing its presence in both the Mediterranean Sea and the Persian Gulf.  This fact would be a clear example of American resolve.  The Iranian response of an intent to deploy its own naval forces to the Atlantic is not (“Iran Reiterates Resolve to Anchor Off US Coasts.” FARS News Agency 5 September 2012).

On the other side of the U.S. credibility ledger, a recent U.S.-Israeli joint naval operation, Reliant Mermaid (reported by the BBC and Jerusalem Post 20 August 2012), was focused on “search and rescue.”  As this was not specifically geared in the direction of offensive action, it should not be counted as credibility enhancing.  Another recent American-Israeli venture, Operation Austere Challenge 12, might have been a more credibility-boosting maneuver if the American headcount hadn’t been severely reduced by the U.S. Pentagon (as reported on 31 August 2012 in Time online, “Exclusive: U.S. Scales Back Military Exercise with Israel, Affecting Potential Iran Strike”).  This is an unfortunate exercise in credibility diminution.

Perhaps the disparity between word and deed are part of a conscious effort to de-couple American and Israeli action versus Iran.  Whatever the merits of such a policy preference, there are sure to be signals and indices that suggest that a chasm between allies is open for exploitation.  Further, a degraded U.S. commitment is tantamount to wavering.  For deterrence to work the Iranian regime must conclude that the cost of developing nuclear weapons far outweighs their purported benefits.  In order to influence their calculus the regime’s survival must be in jeopardy.

Kenneth Waltz believes that deterrence would stick if Iran became a nuclear state in his recent article, “Why Iran Should Get the Bomb” (Foreign Affairs, Jul/Aug2012, Vol. 91 Issue 4, p2-5).  His assertion rests on a history of U.S.-Soviet nuclear peace.  Unfortunately, he conflates the logic of states that already possess the doomsday weapons with that of those who are fixated on procuring them for messianic and annihilative purposes.

The most plausible American fear likely consists of a nuclear-armed Iran forcing the U.S. to remove its military from the region, thus having the effect of Iranian regional domination.  The impact of this potentiality does not rest well with Iran’s Arab adversaries.  For Israel, this scenario presents a palpable existential threat, as they are a ‘one-bomb country’ (as Charles Krauthammer has recently pointed out in his 30 August 2012 Washington Post opinion article, “The ‘Deterrence Works’ Fantasy”).

In order to deter an Israeli preemptive/preventive attack, the Obama administration must combine both words and deeds in an effort to convince both friend and foe of American steadfastness.  To fail in this regard is to welcome misinterpretation, misperception and possibly grave misfortune.