10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lxiv • INTRODUCTIONtraining camp, and receive sophisticated training in scouting, evasion,and bomb-making techniques to become an active terrorist. The aspiringnovice can now acquire bomb-making instructions via the Internetand then, by reading the blogs on successful and unsuccessful bombingoperations as well as other coverage <strong>of</strong> effective counterterrorismmeasures, continually upgrade his terrorist skills. This process <strong>of</strong> learningand improvement through feedback using the information madeavailable through the mass media and the Internet is what intelligenceanalysts now label “emergent intelligence.” The opportunity presentedby this interplay <strong>of</strong> Internet and emergent intelligence is that counterterrorismpr<strong>of</strong>essionals can use the open-source intelligence (OSINT) <strong>of</strong>the Internet to study the same successes and failures <strong>of</strong> this new breed<strong>of</strong> terrorists and, with the help <strong>of</strong> electronic surveillance, to reveal thelinkages and networks that make possible the modern netwars beingconducted by terrorist groups and individuals. In short, the increasedreliance <strong>of</strong> terrorists on the Internet for recruitment, propaganda, andcoordination itself becomes one <strong>of</strong> their vulnerabilities.NEW PLAYERS IN TERRORISMSince the first edition, one <strong>of</strong> the classifications <strong>of</strong> type <strong>of</strong> actor,namely, “entrepreneurial terrorists,” has become increasingly importantfor two reasons. First, the rise <strong>of</strong> nonstate actors in international affairsis increasingly challenging the traditional domination by state actorsin the international order. Increasingly interconnected by the Internet,a wide variety <strong>of</strong> nongovernmental organizations (NGOs) and othernonstate entities are making their own parallel hierarchy to the existingstate order. Second, in a world where large areas consist <strong>of</strong> failed statesor the “gray area” phenomenon <strong>of</strong> ungovernable states, nonstate actorswill fill the political, economic, and social vacuum <strong>of</strong> disorder for theirown purposes. Over time these nonstate entities may engage in moreacts <strong>of</strong> terrorism for mercenary rather than political ends. They can, andwill, hire themselves out to threatened regimes, or seek to corrupt andcontrol them, as in the case <strong>of</strong> narco-terrorists in the Andean nations,or the case <strong>of</strong> the Taliban and al Qa’eda in Afghanistan in the period1996–2001.Furthermore, there will continue to be those with deep pockets ableto support their own terrorist networks to achieve their own goals. The

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!