Time for a Comprehensive Strategy Against Islamic Terrorism in 2016

Time for a Comprehensive Strategy Against Islamic Terrorism in 2016

Jamsheed K. Choksy & Carol E. B. Choksy

Introduction

The White House acknowledges many at home and abroad feel that President Barack Obama has failed to craft and implement a coherent plan of action against Islamic terrorism. Yet rather than reassess policy, in the wake of the globalization of terrorists groups and their most recent attacks in Paris and San Bernardino, Obama believes it necessary to focus on better explaining the existing one to the pubic.[[1]]

On 6 December 2015, the US president outlined a four-part counter-terrorism strategy during a primetime address: “First, our military will continue to hunt down terrorist plotters … taking out ISIL leaders … Second, we will continue to provide training and equipment to … Iraqi and Syrian forces fighting ISIL on the ground … Third, we’re working with friends and allies to stop ISIL’s operations … Fourth, with American leadership, the international community has begun to establish a process—and timeline—to pursue ceasefires and a political resolution to the Syrian war … to focus on … destroying ISIL.”[[2]]

A Failing Strategy

Granted, the so-called Islamic State (IS, aka ISIL and ISIS) is experiencing some loss of key personnel and territory under US and EU bombardment and Iraqi army advances.[[3]] But those extremists are adapting to the changing conditions. Not surprisingly, after the US president’s strategy speech, IS Caliph Abu Bakr al-Baghdadi alerted followers around the globe, through social media, about the coming long haul: “Be patient … we should not let mobilization of the nations of unbelievers … break our resolve, for we will be the victors … with Allah’s power.”[[4]]

President Obama’s plan targets a single fanatical organization. IS, however, is one of several groups who seek to impose Islamic religious extremism through violence. Consequently, despite the president’s earnest words, subsequent mid-December 2015 polls indicated people continue to feel less safe even though terrorism is a significant cause of death only in a few countries of the developing world.[[5]]

The basic problem, which the White House’s communication spin cannot surmount, is that Islamic terrorism is growing in scope rather than being tamped down.[[6]] So it’s time for a comprehensive strategy against those who resort to violence allegedly for Islam.

A Revised Approach

First, the war on terror must stop focusing upon one group at a time. Organizations such as Al-Qaeda, the Taliban, Al-Shabaab, and Boko Haram share commonality with IS through Arabian funding sources, extremist interpretation of Islam, intolerance of moderate Muslims and members of other faiths, and reliance on violence.[[7]] The Taliban and Al-Qaeda are resurgent in northern Afghanistan, overrunning Kunduz city last October. Boko Haram is killing more people than IS and Al-Qaeda, albeit regionally. Zealous fighters and financiers switch fielty to whichever extremist group is succeeding, wanting their way to prevail everywhere. So, all these organizations need to be eradicated.

Second, military actions should be expanded. Bombardment from the air, special forces on the ground, and training to establish indigenous troops should not be limited to countering IS in Syria and Iraq, but also demolish IS offshoots, Al-Qaeda, and other groups in Libya, the Sinai, Afghanistan, and elsewhere. IS, Al-Qaeda, and others spread in parallel manners, by sending charismatic recruiters to set up regional command posts and incorporate resident radicals.[[8]] Systematically eliminating the traveling ideologues and the local gangs they organize also must become a priority for breaking the global jihad.

Third, the non-military counter-offensive against Islamic extremism needs to be taken worldwide. Better intelligence collection and more effective preemptive operations must prevent attacks by terror cell members and wannabes. Reasonable compromises, balancing privacy rights and security concerns, could find solutions to the communication and application encryption which law enforcement agencies fear.[[9]] Extremist-affiliated media portals providing attack techniques should be taken down as soon as they appear. Internet sites portraying Islamic terror organizations as principled should be taken over and redeployed with vivid images of how they distort Islam’s doctrines and practices to achieve radical goals. Susceptible populations need to be ideologically inoculated via internet outreach against Islamist propaganda being trendy and Islamic terrorism being appropriate.[[10]]

Fourth, while much success has been achieved in cutting off external funds especially from the Middle East to IS and Al-Qaeda, cash flows within terrorist-controlled areas must be shut down too.[[11]] IS’s smuggling in Syria and Iraq includes oil, natural gas, human organs, and antiquities. The Taliban and Al-Qaeda are active in narcotics and human trafficking. Boko Haram generates millions through ransoms. They cannot be permitted to become self-sustaining through such activities. In tandem, tax collection offices run by terrorists must be destroyed within Iraq, Syria, and elsewhere—for the groups should not gain durability through state-like functions.

Fifth, ending Islamic terrorism requires focusing not merely on current troublemakers but emerging ones as well. Recent history demonstrates that groups, while being cut down, spawn more violent offspring—such as IS from Al-Qaeda. Consequently, nascent terror cells need to be eradicated. Not responding to IS prior to its taking over strategic areas in Syria during 2013 and then using resources from there to springboard into Iraq in 2014, like the failure to halt the Taliban from seizing Afghanistan in 1996 and using that country to harbor Al-Qaeda in 2001, were miscalculations that cannot be permitted to repeat anywhere.

Sixth, the countries that contributed most ideologically, fiscally, and socio-politically to the rise and spread of Islamic fanaticism must become central to ending it. The coalition of thirty-four predominantly Sunni Muslim nations established in late December calls extremism “a disease.”[[12]] But its power players Saudi Arabia, the Persian Gulf Emirates, Turkey, and Egypt are busy quashing neighboring Muslims like the Houthis who do not follow Sunni tenets, thwarting potential separatists like the Kurds, and subduing internal dissidents ranging from the Muslim Brotherhood to democracy activists. Without serious pushback from those nations, the real terrorists will not be defeated.

Seventh, the US and its western partners need to persuade Middle East rivals Saudi Arabia and Iran that inflaming sectarian tensions for religio-political goals is detrimental. The White House is correct in worrying that rivalries and deteriorating relations between leaders in Riyadh and Tehran are continuing to both fuel terrorism and impede effective counter-actions.[[13]] Violence is returning to the forefront as a tool in the almost fourteen centuries long intra-religious struggle between the two largest Muslim sects, with suicide bombings and summary executions directed most often against noncombatants in each community. As local communities of Sunnis and Shiites square off, Islamic terror-mongers pick off both sides.

Eighth, solutions to civil wars in the Middle East must tackle not only military dimensions but religious ones in order to endure. A workable political resolution for Syria has to accommodate all that country’s communities, including Alawites and other Shiites. Likewise for Iraq to stabilize, mechanisms to prevent revenge extraction between Shiite and Sunni citizens have to be established. Power-sharing and revenge foregoing are both needed to end the struggle in Yemen. After all, Islamic terrorists are most active, destructive, and lethal in countries where Muslims comprise a substantial portion of the citizenry.[[14]] Though Sunnis and Shiites may never fully trust each other due to theological differences, working together they can strip away any notion that Allah sides with extremists and thereby provide the entire Muslim community and the world with security.

The Overall Aim

Islamic terrorism, while striking fear among westerners, is ravaging third world nations which are much in need of political stability, social harmony, and economic progress.[[15]] From there, it is spilling over to first world nations as people, ideology, tactics, and weapons move across the globe. The dissemination of Islamic terrorism from its original repositories and its taking hold within new populations can be compared to the spread of diseases, with rates of transfer increasing exponentially due to the very same modern technologies—like air travel and the internet—that bolster positive aspects of globalization.[[16]]

Eradicating permutations of global jihad, accordingly, should be approached akin to stopping epidemics. It will only be accomplished by a concerted, international, coalition of nations. Both hard and soft power have to be deployed consistently from the air, on the ground, and through physical and virtual networks to take out terrorist hotbeds and remove pro-terrorist sympathies. The strategy must be multifaceted, adaptable, involve Muslims as fully-contributive partners alongside non-Muslims, and demonstrate unambiguous clarity of goals and premeditated allocation of resources.

End Notes

[[1]] Karen DeYoung, “Obama thinks His Syria Strategy is Right—and Folks Just don’t Get It,” Washington Post, 31 December 2015, https://www.washingtonpost.com/world/national-security/to-explain-his-syria-strategy-obama-wants-messaging-that-is-loud-and-clear/2015/12/31/fbdc5a76-aa65-11e5-9b92-dea7cd4b1a4d_story.html.

[[2]] Barack Obama, “Address to the Nation by the President,” White House, 6 December 2015, https://www.whitehouse.gov/the-press-office/2015/12/06/address-nation-president.

[[3]] Terri M. Cronk, “Coalition Killed 10 Senior ISIL Leaders in December,” DoD News, 29 December 2015, http://www.defense.gov/News-Article-View/Article/639489/coalition-killed-10-senior-isil-leaders-in-december and “Iraqi Flag Waves Over Ramadi; Security Forces Control Key City,” DoD News, 29 December 2015, http://www.defense.gov/News-Article-View/Article/639491/iraqi-flag-waves-over-ramadi-security-forces-control-key-city.

[[4]] Sam Prince, “Full English Translation of ISIS ‘Caliph’ Abu Bakr al-Baghdadi’s New Speech,” Heavy, 28 December 2015, http://heavy.com/news/2015/12/new-isis-islamic-state-news-pictures-videos-so-wait-indeed-we-along-with-you-are-waiting-abu-bakr-al-baghdadi-speech-english-translation/.

[[5]] “CNN/OCR International Poll,” CNN, 28 December 2015, http://i2.cdn.turner.com/cnn/2015/images/12/25/terrorpoll.pdf.

[[6]] “The Plague of Global Terrorism,” Economist, 18 November 2015, http://www.economist.com/blogs/graphicdetail/2015/11/daily-chart-12.

[[7]] Carol E. B. Choksy and Jamsheed K. Choksy, “The Saudi Connection: Wahhabism and Global Jihad,” World Affairs Journal, vol. 78, no. 1, pp. 23–34, http://www.worldaffairsjournal.org/article/saudi-connection-wahhabism-and-global-jihad; and John A. Turner, Religious Ideology and the Roots of the Global Jihad: Salafi Jihadism and International Order, New York: Palgrave Macmillan, 2015, http://www.amazon.com/dp/B00NC4R4BY/ref=rdr_kindle_ext_tmb#reader_B00NC4R4BY.

[[8]] Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, and Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network,” Intelligence and Security Informatics, Lecture Notes in Computer Science, vol. 3495, 2005, pp 287–304,

http://link.springer.com/chapter/10.1007%2F11427995_24#page-2.

[[9]] Raphael Cohen-Almagor, Confronting the Internet's Dark Side: Moral and Social Responsibility on the Free Highway, Cambridge: Cambridge University Press, 2015, pp. 180–189, https://books.google.com/books?id=SvgKCgAAQBAJ&pg=PA182&lpg=PA182&dq=encryption+and+jihad&source=bl&ots=H2zABeiOKx&sig=C50girqrw_kKEIB1M3MnHQ7dIFc&hl=en&sa=X&ved=0ahUKEwigtvnb_ZjKAhUO3WMKHbFPDxIQ6AEITTAI#v=onepage&q=encryption%20and%20jihad&f=false; Annie Sneed, “Weakening Encrypted Communications Would Do Little to Stop Terrorist Attacks, Experts Say,” Scientific American, 17 November 2015, http://www.scientificamerican.com/article/weakening-encrypted-communications-would-do-little-to-stop-terrorist-attacks-experts-say/.

[[10]] Simon Cottee, “The Challenge of Jihadi Cool,” Atlantic, 24 December 2015, http://www.theatlantic.com/international/archive/2015/12/isis-jihadi-cool/421776/.

[[11]] Carol E. B. Choksy and Jamsheed K. Choksy, “How to Turn off The ISIS Tap,” Yale Global, 8 July 2014, http://yaleglobal.yale.edu/content/how-turn-isis-tap.

[[12]] Ed Payne and Salma Abdelaziz, “Muslim Nations form Coalition to Fight Terror,” CNN, 22 December 2015, http://www.cnn.com/2015/12/14/middleeast/islamic-coalition-isis-saudi-arabia/index.html. See also Emma Ashford, “Sectarianism and Saudi Arabia’s Half-Baked Counter-Terrorism Alliance,” War on the Rocks, 6 January 2016, http://warontherocks.com/2016/01/sectarianism-and-saudi-arabias-half-baked-counter-terrorism-alliance/.

[[13]] Karen DeYoung, “U.S. Fears Saudi tensions with Iran could Affect Fight against ISIS,” Washington Post, 3 January 2015, https://www.washingtonpost.com/world/national-security/us-fears-saudi-tensions-with-iran-could-affect-fight-against-isis/2016/01/03/bb71eff4-b268-11e5-a842-0feb51d1d124_story.html.

[[14]] Annex of Statistical Information: Country Reports on Terrorism 2014, Washington, DC: US Department of State, 2015, http://www.state.gov/documents/organization/239628.pdf.

[[15]] Global Terrorism Index 2015, Sydney: Institute for Economics and Peace, 2015, http://economicsandpeace.org/wp-content/uploads/2015/11/Global-Terrorism-Index-2015.pdf.

[[16]] Jeff Victoroff, ed., Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Amsterdam: IOS Press, 2006, p. 15, https://books.google.com/books?id=F9XvAgAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false.

 

0
Your rating: None

Comments

"Reasonable compromises, balancing privacy rights and security concerns, could find solutions to the communication and application encryption which law enforcement agencies fear." I think this is what we're trying to, in a public forum, argue right now. What are those "reasonable compromises" though?