You are on page 1of 16

Chapter 28

Terrorism and globalization


james d. kir as

Framing Questions
● Is global terrorism the price states pay for entry into and continued access to a
globalized system?
● Why does violent Islamic extremism continue to be the primary motivator for global
terrorist violence?
● Should freedoms be restricted to ensure greater security against the threat of global
terrorism?

Reader’s Guide in cultural, economic, and religious terms linked to


globalization. However, such terms are not sufficient
Globalization has contributed to the growth of terror- to explain the relationship. Technology associated with
ism from a regional phenomenon into a global one. globalization has enabled terrorist groups to conduct
Precisely how it has contributed, however, is hard to operations that are more deadly, distributed, and dif-
determine. The difficulty lies in the complex nature of ficult to combat than in the past. Yet technological
terrorism and in disagreements about what constitutes advantage is not one-sided; states can use technology
globalization. Global terrorism has been explained to diminish the global impact of terrorism.
450 james d. kiras

Introduction
The relationship between terrorism and globalization struggle. Terrorism is a weapon of the weak, conducted
is difficult to describe accurately. Each phenomenon is by a minority who promote an extremist ideology—it
complicated and defies simple characterization. It  is often fails to create political change. The global com-
inaccurate to suggest that globalization is responsible munity is not powerless in the face of such violence.
for terrorism, but terrorists have indeed exploited tech- In order to combat terrorism successfully, the global
nologies associated with globalization. Such technolo- community must utilize the resources at its disposal col-
gies have increased the ability of terrorist groups to work laboratively, in a way that is consistent with international
together, share information, and reach out to previously law and human rights, to diminish support for terrorism
unavailable audiences. Technology cannot change the and demonstrate the illegitimacy of terrorist messages
character of terrorist messages or the nature of terrorist and aspirations.

Definitions
Terrorism and globalization share at least one thing terrorist acts as legitimate only if they meet the criteria
in common—both are complex phenomena open to associated with revisionist interpretations of ‘just war’
subjective interpretation. Definitions of terrorism tradition, which focus on the actions of individuals. These
vary widely but all have a common point of departure. criteria, which apply to all applications of force, have been
Terrorism is characterized, first and foremost, by the expanded to include a just cause, proportional use of vio-
use of violence. This tactic of violence takes many forms lence, and the use of force as a last resort (see Ch. 13).
and often indiscriminately targets non-combatants. The Realists suggest that the political violence used by terror-
purpose for which violence is used, and its root causes, ist groups is illegitimate on the basis that states alone have
are where most of the disagreements about terrorism a monopoly on the legitimate use of physical force.
begin. Historically, the term ‘terrorism’ described state As with other forms of irregular warfare, terrorism
violence against citizens during the French Revolution is designed to achieve political change for the purpose
(1789–99). Over the past half-century, however, ter- of obtaining power in order to right a perceived wrong.
rorism has come to mean the use of violence by small However, terrorism is the weakest form of irregular
groups aiming to achieve political change. Terrorism warfare with which to alter the political landscape. The
differs from criminal violence in its degree of political reason for this weakness is that terrorist groups rarely
legitimacy. Those sympathetic to terrorist causes sug- possess the broader support of the population that char-
gest that violence is the only remaining option by which acterizes insurgency and revolution. Terrorist groups
the aggrieved can draw attention to their plight. Such
causes have included ideological, ethnic, and religious
Box 28.1 Types of terrorist groups
exclusion or persecution.
Defining terrorism is complicated by the fact that Audrey Kurth Cronin has outlined different types of terrorist
terrorist groups often espouse multiple grievances and groups and their historical importance in the following way:
compete with one another for resources and support. There are four types of terrorist organizations currently
In addition, the relative importance of these grievances operating around the world, categorized mainly by their
source of motivation: left-wing terrorists, right-wing ter-
within groups can change over time (see Box 28.1). Those
rorists, ethnonationalist/separatist terrorists, and religious
targeted by terrorists are less inclined to see any justi- or ‘sacred’ terrorists. All four types have enjoyed periods
fication, much less legitimacy, behind attacks that are of relative prominence in the modern era . . . Currently,
designed to spread fear by killing and maiming civilians. ‘sacred’ terrorism is becoming more significant . . . many
As a result, the term ‘terrorist’ has a pejorative value that groups have a mix of motivating ideologies—some eth-
is useful in delegitimizing those who commit such acts. nonationalist groups, for example, have religious char-
acteristics or agendas—but usually one ideology or
Reaching consensus on what constitutes terrorism
motivation dominates.
is difficult. The legitimacy of terrorist means and meth- (Cronin 2002/3: 39)
ods is the foremost reason for disagreement. Some view
Chapter 28 Terrorism and globalization 451
often lack broader support for their objectives because
Box 28.2 The dual nature of globalization
their goals for change are based on radical ideas that do
and its impact on conflict
not have widespread appeal. In order to effect change,
terrorists must provoke drastic responses that catalyse Emile Simpson characterizes the impact of globalization on
change or weaken their opponent’s moral resolve. In a war in the following manner:
few cases, terrorist acts have achieved relatively rapid The speed and extent of inter-connectivity brought about
transformations. The bombings in Madrid in 2004, for by the information revolution is fundamentally changing
example, dramatically influenced the outcome of elec- the world, and war too. People, individuals, and commu-
nities, fragment in each’s other’s image: the intertwining
tions in Spain, and anecdotal evidence suggests that
of all kinds of cultures has huge power to unite people
the attack was designed with just this purpose in mind. through common understanding; conversely, the end-
Many terrorist leaders hope that their actions will elicit less disagreement over the meaning of an event becomes
disproportionate state reactions, which will in turn sour more common, as world audiences are so diverse.
public or international opinion and increase support (Simpson 2018: 243)
for their cause. Other leaders using acts of terrorism
seek immediate impact to demonstrate the weakness
of their opponent and to extend the group’s power and debate, as other chapters in this volume have outlined.
reach by generating fear through media coverage. For These disagreements, in turn, influence discussion of the
example, during the 2008 attack in Mumbai, terrorists extent to which globalization has contributed to the rise
were ordered to tell the media that the attack ‘was just of modern terrorism (see Box 28.2). There is little doubt
the trailer, just wait till you see the rest of the film’ (ABC that the technologies associated with globalization have
News 2009). However, terrorist campaigns often take been used to increase the effectiveness and reach of ter-
years or decades to achieve meaningful results, and the rorist groups. The relationship between globalization and
amount and nature of force used is problematic. Terrorist terrorism is best understood as the next step in the evolu-
groups risk fading into obscurity if they do not cow the tion of political violence since terrorism became a trans-
public or conduct newsworthy attacks. However, attacks national phenomenon in the 1960s.
by terrorists that are horrific, such as the immolation of
a Jordanian pilot by the so-called Islamic State in Syria
Key Points
in February 2015, puts support for terrorist causes at
risk. Therefore terrorism is defined here as the use of
violence by sub-state groups to inspire fear, by attacking
• difficult
Agreement on what constitutes terrorism continues to be
given the range of potential motivations for acts
civilians and/or symbolic targets, for purposes such as involving violence.
drawing widespread attention to a grievance, provok- • distinguished
Terrorism, or acts of violence by sub-state groups, is
from criminal acts on the basis of the
ing a severe response, or wearing down their opponent’s
purpose for which violence is carried out, namely political
moral resolve, in order to effect political change.
change.
As with definitions of terrorism, there is general agree-
ment on at least one aspect of globalization. Technologies • grievances
Terrorist groups succeed when their motivations or
are perceived to be legitimate by a wider
allow the transfer of goods, services, and information audience. Disproportionate or heavy-handed responses by
almost anywhere quickly and efficiently. In the case of states to acts of terrorism often increase support for
information, the transfer can be secure and is nearly terrorist groups.
instantaneous. The extent of social, cultural, and politi- • open
The definition of globalization, like that of terrorism, is
to subjective interpretation, but the technologies
cal change wrought by globalization, including increasing
associated with globalization have undeniably increased
interconnectedness and homogeneity in the international
terrorist capabilities.
system, remains the subject of much disagreement and

Terrorism: from transnational to global phenomenon (1968–2001)


Historically, terrorists have used readily available means the early twentieth, anarchists relied on revolvers and
to permit small numbers of individuals to spread fear as dynamite. Yet terrorists and acts of terrorism, includ-
widely as possible. In the late nineteenth century and ing bombings and assassinations in Austria-Hungary
452 james d. kiras

(Empress Elisabeth of Austria, assassinated in Geneva Black September during the 1972 Munich Olympics.
in 1898), Tsarist Russia (Tsar Alexander II, assassinated Although media coverage was termed the oxygen that
in St Petersburg, 1881), the United States (Wall Street sustains terrorism, terrorists discovered that report-
bombing, 1920), and the United Kingdom (the 1885 ers and audiences lost interest in repeat performances
London Underground bombing), among others, rarely over time. To sustain viewer interest and compete for
had an impact beyond national borders. Three factors coverage, terrorist groups undertook increasingly spec-
led to the emergence of transnational terrorism in 1968: tacular attacks, such as the seizure of Organization of
the expansion of commercial air travel, the availabil- the Petroleum Exporting Countries (OPEC) delegates
ity of televised news coverage, and broad political and by ‘Carlos the Jackal’ in Austria in December 1975.
ideological interests among extremists that intersected Terrorism experts speculated that terrorist leaders
around a common cause. As a result, terrorism grew understood that horrific, mass casualty attacks might
from a local to a transnational threat. cross a threshold of violence. This understanding may
Air travel gave terrorists unprecedented mobility. explain why several terrorist groups have attempted to
For example, the Japanese Red Army trained in one acquire or use weapons of mass destruction (WMD),
country and attacked in another, as in the 1972 Lod including nuclear, chemical, and biological weapons.
Airport massacre in Israel. Air travel appealed to ter- The Iranian ‘Islamic Revolution’ of 1979 was a water-
rorists for multiple reasons. Airport security measures, shed event in transnational terrorism. Although Israeli
including passport control, were almost non-existent interests remained primary targets for attack, due to
when terrorists began hijacking aeroplanes. These continued sympathy for the Palestinian cause, a num-
skyjackings suited terrorist purposes well. Hijacked ber of groups began to target citizens and other sym-
aeroplanes offered a degree of mobility, and therefore bols of the West. The ‘decade of terrorism’ (1980–90)
security, for the terrorists involved. States acquiesced included incidents such as suicide bombings (Lebanon,
to terrorist demands, which encouraged further inci- 1983) and hijackings (TWA Flight 847, 1985). During
dents. The success of this tactic spurred other terrorist this decade, three disturbing trends emerged: fewer
groups, as well as criminals and political refugees, to attacks that were more deadly and indiscriminate; the
follow suit. As a result, incidents of hijacking skyrock- increasing sophistication of attacks; and a greater will-
eted from 5 in to 94 in 1969. Shared political ideologies ingness to perform suicide attacks.
stimulated cooperation and limited exchanges among Transnational Marxist-Leninist groups discovered
groups as diverse as the Irish Republican Army (IRA) that their sources of support disappeared at the end of
and the Basque separatist Euzkadi Ta Askatasuna the cold war. At the same time, state law enforcement
(ETA), and groups demanded the release of imprisoned and paramilitary forces became increasingly effective
‘fellow revolutionaries’ in different countries, giving in combating terrorism. Other terrorist groups discov-
the impression of a coordinated global terrorist net- ered that transnational attacks were counter-produc-
work. The reality was that groups formed relationships tive in achieving local aims. For example, both ETA
of convenience based around weapons, capabilities, and and the IRA sought negotiations but still used terror-
money in order to advance local political objectives. ist attacks as a bargaining ploy and to remain visible
Televised news coverage played a key role in expand- domestically until eventually giving up armed struggle
ing the audience who could witness the theatre of ter- entirely. Although Marxist-Leninist transnational ter-
rorism in their own homes. Individuals who had rorism was decreasing in scale and intensity during
never heard of ‘the plight of the Palestinians’ became the 1990s, militant Islamic terrorism, symbolized by
notionally aware of the issue after incidents such as the group Al Qaeda and enabled by globalization, was
the live coverage of the hostage-taking conducted by growing into a global phenomenon.

Key Points

• disproportionate
Terrorism is a form of political violence that aims to achieve
effects with limited means.
• increasing
Trends in terrorism since 1968 include greater casualties,
sophistication, and suicide attacks.

• onwards targeted Western citizens


The majority of transnational terrorist attacks from 1979
and symbols.
• global militantMarxist-Leninist
Transnational groups have been replaced by
Islamic terrorist groups.
Chapter 28 Terrorism and globalization 453

Terrorism: the impact of globalization


Violent Islamic extremism drew global recognition in a loose network of ‘franchised’ cells and groups
as a result of terrorist attacks conducted by Al Qaeda, (see Fig. 28.1). Others conclude that the focus on vio-
‘The Base’, in New York and Washington, DC, on 11 lent Islamic extremism overlooks other, potentially
September 2001. But what exactly is violent Islamic more problematic forms of terrorism such as right-
extremism? Is it a global movement threatening wing extremism. They point to examples such as the
Western civilization and values, an aggregation of sub- massacre conducted by nationalist and Islamophobe
state groups connected to a common cause, or merely Anders Breivik in Norway (2011) (see Box 28.3) and
an extremist set of beliefs that justifies political vio- more recent statistical analysis as evidence of the per-
lence to fulfil militant Islamic myths? Experts continue vasiveness of right-wing political violence (US General
to debate what violent Islamic extremism is, what it Accounting Office 2017). Regardless of how one views
represents, and the actual threat that it poses. Experts violent Islamic extremism, it remains ‘a polymorphous
disagree, in part because even though Al Qaeda and phenomenon . . . a dynamically heterogenous collection
Islamic State lost their territory and many of their senior of both radicalized individuals and functioning terror-
leaders, both groups continue to have global influence ist organizations’ (Hoffman and Reinares 2014: 628).
and reach. Today violent Islamic extremism appears Efforts to explain the vitality of global terrorism in gen-
less identifiable with any single terrorist group and eral—and violent Islamic extremism in particular—
more as a global movement that markets and exploits focus on three areas linked to aspects of globalization:
its own form of violent and radical religious ideology culture, economics, and religion.

Al Qaeda core & affiliates


IS & affiliates
Related groups & lone wolves

IMU
CE

Al Qaeda LeT
IS HuJI
TTP

HuM

AQIM ANF
Abu Sayyef
AQAP

Al Shabaab
ANF Al Nusrah Front
AQAP Al Qaeda in the Arabian Peninsula
JI AQIM Al Qaeda in the Islamic Maghreb
Boko Haram CE Caucasus Emirate
HuJI Harkat-ul-Jihad al-Islami
HuM Harkat-ul-Mujahideen
IMU Islamic Movement of Uzbekistan
IS Islamic State
JI Jemaah Islamiyah
LeT Lashkar-e-Taiba
TTP Tehrik-i-Taliban Pakistan

Figure 28.1 The terrorist nebula and regional clusters


Source: modified from Rabasa et al. 2006
454 james d. kiras

Box 28.3 Anders Behring Breivik


Anders Behring Breivik represents the new wave of right-wing quarter in Oslo. While the bomb detonated and first respond-
terrorism. He is a Norwegian citizen, born in 1979, who had a ers rushed to the scene, Breivik travelled to Utøya Island, where
troubled, but relatively comfortable upbringing. He spent time in he posed as a policeman. The island is the site of a Labour Party
London as a child and travelled repeatedly to France to visit his summer youth camp. Breivik proceeded to shoot teenagers and
father. Breivik had several encounters with the law as a teenager adults on the island for over an hour-and-a-half, until a heavily
but turned his energy towards a computer business and then armed Norwegian police response unit arrived. He surrendered
farming. According to Breivik, he developed a decade-long plan to police. His attacks claimed the lives of 77 people and injured
to commit an attack against elements within Norwegian society more than 300.
he was convinced were undermining it from within. He grouped Breivik’s worldview and attack were shaped by a number of
various socially progressive elements under the banner of ‘cul- elements associated with globalization. He styled himself as a
tural Marxists’ and also singled out Muslims as erosive influences modern-day European Knight Templar and claimed to be part
on Western culture. He outlined his worldview in a rambling of an organization of like-minded individuals spread across
1,500-page manifesto entitled ‘2083: A European Declaration of England, France, Germany, the Netherlands, Greece, Russia, and
Independence’, written under the pseudonym ‘Andrew Berwick’. Serbia. Despite living in a remote part of Norway, Breivik used
Breivik carried out his attack plan on 22 July 2011. After travel- the internet as a research tool, a method of connecting with like-
ling from his remote farm, Breivik parked his vehicle filled with minded individuals, and as a means for promoting his nationalist
950 pounds of ammonium nitrate, a fertilizer-based explosive, and Islamophobic ideology through his blog posts, manifesto,
near the Regjeringskvartalet, or Norwegian government offices and YouTube videos.

Cultural explanations
‘civilization’ contains a number of deep fault-lines that
Culture offers one way to explain why violent Islamic impede the cooperation required to challenge the West.
extremism’s call for armed struggle has been successful The extremely bloody sectarian violence between Sunni
in underdeveloped countries. It may appear that vio- and Shi’a in Iraq is only one example of these very real
lence is the only method of preserving traditions and fissures. Violent Islamic extremist calls to kill indi-
values against a cultural tsunami of Western products viduals including non-combatants, non-believers, and
and materialism. Once sought after as an entry method fellow Muslims represent another internal fault-line.
to economic prosperity, Western secular, material- Non-believers fall into the categories of infidels (those
ist values are increasingly rejected by those seeking to of different religion) and apostates (those Muslims who
regain or preserve their own unique cultural identity. do not share their interpretation of the Koran). Osama
The social changes associated with globalization and bin Laden gave unequivocal sanction to Abu Musab al-
the spread of free market capitalism appear to over- Zarqawi to kill Muslim Shi’a in Iraq. Such actions call
whelm the identity or values of groups who perceive into question the morality of the means, and therefore
themselves as the losers in the new international sys- the legitimacy of bin Laden and militant Islam as the
tem. In an attempt to preserve their threatened iden- champions of Muslim values among the wider and
tity and values, groups actively distinguish themselves moderate Islamic community. The victims of violent
from despised ‘others’. At the local level, this cultural Islamic extremist terrorist violence largely have been
friction may translate into conflicts divided along reli- other Muslims and not Western ‘others’, a fact bin Laden
gious or ethnic lines that aim to safeguard identity. acknowledged in 2011 (Lahoud et al. 2011: 21–42).
According to one influential explanation, the num-
ber of distinct civilizations is limited globally. Samuel
Economic explanations
Huntington suggests that a major fault-line exists
between the liberal Western civilization and an Islamic Not everyone agrees that defence of culture or identity
one ‘humiliated and resentful of the West’s military is the primary motivation for globalized terrorist vio-
presence in the Persian Gulf, the West’s overwhelming lence. Others see economic considerations as the crucial
military dominance, and . . . [unable] to shape their own motivating factor in the use of violence to effect politi-
destiny’ (Huntington 1993: 32). Critics of Huntington cal change. Although globalization provides access to
argue, among other things, that he ascribes a degree a world market for goods and services, the net result
of homogeneity within the Islamic world that simply has also been perceived as a form of Western economic
does not exist. Theologically and socially, the Islamic imperialism. The United States and the post-industrial
Chapter 28 Terrorism and globalization 455
states of Western Europe form the Global North, or eco- extremist terrorists in Europe and the United States
nomic ‘core’, which dominates international economic have employment rates and salaries that are close to the
institutions such as the World Bank, sets exchange rates, averages for their age groups. The changing character
and determines fiscal policies. These actions and poli- of militant Islamic violence, and its ebbs and flows in
cies can be unfavourable to the underdeveloped coun- Yemen, Nigeria, Iraq, Syria, and elsewhere, suggests
tries, or Global South, that comprise the periphery or that while the ideology, leadership, and facilitation are
gap. Political decisions by the leaders of underdeveloped still the purview of the relatively privileged within ter-
countries to deregulate or privatize industries to be com- rorist groups, economic and ethnic factors may increas-
petitive globally may lead to significant domestic social ingly become the means by which the next generation
and economic upheaval. The citizenry may shift loyalties of terrorists are recruited.
to illegal activities such as terrorism if the state breaks
its social contract with them. Such activities outside of
Religion and ‘new’ terrorism
state control include engaging through global shadow
economies such as ‘System D’, using alternative curren- In the decade prior to 9/11, a number of scholars and
cies (BitCoin), and frequenting alternative websites on experts perceived that fundamental changes were taking
the ‘Deep Web’ accessible through browsers such as Tor. place in the character of terrorism. The use of violence for
Wealth is also linked to personal security and violence. political purposes, to change state ideology or the repre-
With little possible opportunity to obtain wealth locally, sentation of ethnic minority groups, had failed in its aims
individuals will leave to pursue opportunities elsewhere. and a new trend was emerging (see Ch. 15). Postmodern
Paradoxically, rising standards of living and greater access or ‘new’ terrorism was conducted for different reasons
to education associated with globalization may lead to altogether. Motivated by promises of rewards in the
increased individual expectations. If these expectations afterlife, some terrorists are driven by religious reasons
are unrealized, individuals may turn to extreme politi- to kill as many non-believers and unfaithful as possible
cal views and action against ‘the system’ that denies them (Laqueur 1996: 32–3). Although suicide tactics had been
the opportunity to realize their ambitions, as Ted Robert observed in Lebanon as early as 1983, militant Islam had
Gurr hypothesized in 1970 (Gurr 1970: 46). Some suggest previously been viewed as a state-sponsored, regional
that a sense of alienation and lack of opportunity among phenomenon (Wright 1986: 19–21).
some Muslim males is a contributing factor in their New terrorism, which some authors use to explain
decision to turn to violence globally. In violent Islamic the global jihad, is seen as a reaction to the perceived
extremist groups, however, most leaders and senior opera- oppression of Muslims worldwide and the spiritual
tives attended graduate schools around the globe in fields bankruptcy of the West. As globalization spreads and
as diverse as engineering and theology, and were neither societies become increasingly interconnected, some
poor nor downtrodden (Sageman 2004: 73–4, 95–6). Muslims feel they have only one choice: accept Western
Other views offer a broader explanation. In par- beliefs to better integrate, or preserve spiritual purity by
ticular, the writings of the revolutionary Frantz Fanon rebelling. Believers in the global jihad view the rulers of
provide insights in the use of political violence to right ‘Islamic’ countries such as Pakistan, Saudi Arabia, or
economic wrongs. In the 1960s, Fanon suggested that Iraq as apostates who have compromised their values
violent struggle would continue until economic and in the pursuit and maintenance of secular, state-based
power imbalances were removed (Fanon 1990: 74). power. The only possible response is to fight against
Terrorist violence is motivated by inequalities in the such influences through jihad. Most Islamic schol-
global economy. Therefore terrorist attacks against ars and imams understand jihad to mean the inter-
the World Trade Center in 1993 and 2001 were not nal struggle for purity spiritually, although it has also
reactions against the policies of the United States per been interpreted historically as a method to establish
se, but rather a blow against an icon of global capital- the basis for just war. Extremists who espouse militant
ism. Statements by fringe groups, including neo-Nazis, Islam, including Ayman al-Zawahiri and Abu Bakr al-
anarchists, and the ‘New, New Left’, are additional evi- Baghdadi, understand jihad in a different way. For the
dence that globalization might be a stimulus for politi- jihadi terrorist, there can be no compromise with either
cal violence (Rabasa et al. 2006: 86–93). infidels or apostates. Al-Zawahiri and al-Baghdadi may
The links between terrorism and poverty also vary die but the ideology and the ‘cosmic struggle’ can and
considerably among regions. Many violent Islamic must continue.
456 james d. kiras

The difference in value structures between secular provides terrorist groups with a crucial advantage:
and religious terrorists makes the responses to the lat- the mandate and sanction of the divine to commit
ter difficult. Religious terrorists will kill themselves and otherwise illegal or immoral acts. There is a substan-
others to secure rewards in the afterlife. Differences tial difference between religious motivation as the
in value structures make the deterrence of religious single driving factor for individuals to commit acts
terrorism difficult if not impossible, as secular states of terrorism and the ultimate purpose for which vio-
cannot credibly threaten materially that which the ter- lence is being used. A common theme among jihadi
rorists value spiritually. Secular terrorism has had as statements is the purpose of overthrowing apos-
its goal the pursuit of power in order to correct flaws tate regimes and assuming political power. Political
in society but retain the overarching system. Religious power, in turn, is necessary to impose the militant
terrorists, in contrast, do not seek to modify, but rather Islamic form of Sharia law in a state and restore the
to replace the normative structure of society (Cronin just and pure society of the caliphate, as the June 2014
2002/3: 41). Terrorists may be unable or unwilling to declaration by so-called Islamic State to establish one
compromise on what they see as a ‘sacred value’ (Atran in Iraq and Syria suggests.
2010: 400).
The use of religion as a reaction to and an explana-
Key Points
tion for the phenomenon of global terrorism contains
some of the same incongruities as accounts focused
on cultural and economic factors. For Western
• precisely
Experts disagree on what violent Islamic extremism
represents.
observers, religious reasons appear to explain how
individual terrorists are convinced to take their own
• explanations
Cultural, economic, and religious factors provide necessary
for globalized terrorist violence, but they are
lives and kill others. Personal motivations can include insufficient individually.

promises of financial rewards for family members, • the


‘New’ terrorism uses religion as a motivator and to provide
justification for killing non-combatants.
achieving fame within a community, taking revenge
for some grievance, or simply achieving a form of self- • extremism
The ultimate purpose for modern violent Islamic
is obtaining political power in order to conduct
actualizing. Yet few religious terrorist leaders, plan- wide-scale reform according to Sharia law.
ners, and coordinators martyr themselves. Religion

Globalization, technology, and terrorism


Few challenge the point that terrorism has become of insurgents. For example, land reform, government
much more pervasive worldwide due to the processes corruption, or foreign occupation motivates larger
and technologies of globalization. The technological numbers of individuals to support or join insurgen-
advances associated with globalization have improved cies, whereas the radical political ideology espoused by
the capabilities of terrorist groups to plan and conduct groups such as the Japanese Red Army or the Weather
operations with far more devastation and coordination Underground had little appeal in largely prosperous
than their predecessors could have imagined. In par- and stable democratic societies. States have tradition-
ticular, technologies have improved the capability of ally had an advantage in their ability to control infor-
groups and cells in the following areas: proselytizing, mation flows and use their resources to win the battle of
coordination, security, mobility, and lethality. hearts and minds against terrorist groups. But terrorist
leaders understand how the internet has changed this
dynamic. One stated that ‘we are in a battle, and that
Proselytizing
more than half of this battle is taking place in the bat-
Terrorist groups have traditionally sought sympathy tlefield of the media. And that we are in a media battle
and support within national boundaries or in neigh- in a race for the hearts and minds of our Umma’ (Office
bouring countries as a means to sustain their efforts. of the Director of National Intelligence 2005: 10).
Sustaining terrorist causes has traditionally been dif- The continued expansion of the number of inter-
ficult as terrorist messages, goals, and grievances tend net service providers, especially in states with relaxed
to be extreme, and therefore less appealing, than those or ambivalent content policies or laws, combined with
Chapter 28 Terrorism and globalization 457
increasingly sophisticated and inexpensive mobile the downing of helicopters. Individuals and small
devices, laptops, tablets, software, applications, and groups have produced music and videos to inspire
wireless technologies, have empowered individuals and potential recruits and seek donations. Messages, files,
groups to post tracts on or send messages throughout and polemics can be dispatched almost instantaneously
the internet and social media. One form of empow- to almost anywhere on the globe via Facebook, Twitter,
erment is the virtual presence that individuals have. or instant messaging. Brenton Tarrant, who was inspired
Although prominent jihadi terrorists’ physical pres- by Anders Breivik’s online manifesto (see Box 28.3),
ence can be removed through imprisonment or death, live-streamed on Facebook his attack in Christchurch,
their virtual presence and influence is immortalized on New Zealand (2019) in a manner that resembled a first-
the internet, as the case of Mustafa Setmariam Nasar person shooter video game to spur others into action.
suggests (see Case Study 28.1). Although media content is generated by individuals,
Globalization has also empowered terrorist groups that is not to say it is simple or crude. YouTube videos
by enabling increases in the volume, range, and sophis- with slick production values and electronic publica-
tication of propaganda materials. Terrorist groups tions, such as Inspire, Dabiq, and Rumiyah, combine
were once limited to mimeographed manifestos and graphics and well-produced content, including tech-
typed communiqués. Today, terrorist supporters and nical advice (see Fig. 28.2). Various lone wolves, such
sympathizers now build their own websites and boast as the Boston Marathon bombers (2013) and Sayfullo
thousands of followers on social media. An early exam- Saipov (2017), have been inspired by such means, as
ple was a website of the Tupac Amaru Revolutionary were the estimated 35,000 foreign fighters who flocked
Movement, which posted the group’s communiqués and to Syria and Iraq to fight for Islamic State.
videos during the seizure of the Japanese embassy in To spread messages to the widest possible
Lima in 1997. Since then, terrorist groups in Chechnya audience—including those without online or text mes-
and the Middle East have made increasing use of video saging capabilities—and where speed of communica-
cameras to record the preparations for and results of tion is not a requirement or a possibility for security
attacks, including successful roadside bombings and reasons, terrorists need not rely exclusively on virtual

Case Study 28.1 Three generations of violent Islamic extremists


The first generation of violent Islamic extremists who coalesced and different types of cells’ rather than a first-generation organiza-
under the banner of Al Qaeda shared several traits. A number fought tion (or tanzim) (Lia 2008: 315). He transferred his knowledge and
in Afghanistan against the Soviet Union and aligned with Osama skills to next-generation militant Islamic terrorists virtually. Despite
bin Laden over disagreements in 1994 about who to fight next. Bin Nasar’s capture in Pakistan in November 2005, both the manual and
Laden believed it was necessary to fight the ‘far’ enemy, the United the videos are available online, realizing part of Nasar’s ambition.
States (and by extension, the West), which was responsible for a Ardit Ferizi represents the new generation of terrorists who
number of perceived injustices against Islam. Others advocated the support violent Islamic extremism. Ferizi, a Kosavar, led a group
overthrow of ‘near’ enemies who ruled over secular Islamic states. known as Kosava Hacker’s Security. He achieved notoriety in
To fight the far enemy, bin Laden moved to Afghanistan in 1998. jihadist circles for hacking a company located in the United States,
One of those who also migrated was Mustafa Setmariam Nasar. stealing data, and sharing it with ISIS’s hacking division. The data
Nasar is better known as ‘Abu Musab al-Suri’ or ‘The Syrian’. comprised the names, home addresses, and other personally
He fought the Soviets in Afghanistan and supported local jihadist identifiable information of over 1,300 US service members. ISIS
groups in Spain, Algeria, and elsewhere. Prior to 9/11, Nasar ran a subsequently released the information as one of its dozen ‘hit
training camp in Afghanistan tied to bin Laden. Like his peers, Nasar lists’ online and encouraged its members in the United States
is well educated and this is apparent in his writings. His works are to ‘kill the dogs’. Cooperation between Malaysian and American
numerous and include various interviews and pamphlets, as well officials led to Ferizi’s arrest in Malaysia in late 2015. Ferizi is one
as a 1,600-page tract and detailed training manual entitled Global of the first individuals convicted in the US on hacking and terror-
Islamic Resistance Call. In addition, Nasar videotaped a number of ism charges. He was sentenced to 20 years’ imprisonment.
his lectures based on the manual. Nasar foresaw the effectiveness
of US and partner nation efforts against the traditional hierarchi-
Question 1: What qualities characterize the three different gen-
cal organization of Al Qaeda; he decried the ‘Tora Bora mental-
erations of violent Islamic extremists?
ity’ of fighting fixed battles against forces that dominate air and
space. Nasar argued for moving to something more secure, elusive, Question 2: Will violent Islamic extremism increasingly become a
and difficult to defeat: a system of jihad comprising ‘a method of virtual phenomenon, or does it need a tangible, physical presence
secret guerrilla war consisting of unconnected cells, numerous to succeed?
458 james d. kiras

Figure 28.2 Covers of Inspire and Rumiyah magazines

methods. Any computer of modest capabilities can be The technologies associated with globalization,
used by terrorist groups and their sympathizers to cre- including commercially available handheld radios and
ate propaganda leaflets, posters, and even magazines in phones, have allowed terrorist cell members and groups
large quantities at very low cost. Whereas offset print- to operate independently at substantial distances from
ing machines and photocopiers are difficult to move, a one another and network together. The Global System
laptop or tablet and printer can be packed in a suitcase, for Mobile Communications (GSM) standard, for
increasing the mobility of the terrorist cells generating example, ensures that any compliant phone will work
the material and making them more difficult to locate. anywhere in the world where a GSM network has been
established. Email and mobile phone contact among
geographically separated group members allows them
Coordination
to conduct their attacks in separate locations or con-
During the era of transnational terrorism, groups verge on a specific target area. For example, the 9/11
planned and conducted individual attacks or mounted hijackers used cheap and readily available prepaid
multiple attacks from a single staging base. The tech- phone cards to communicate between cell leaders and
nologies associated with globalization have enabled ter- senior leadership. In Mumbai in 2008, cell leaders
rorist cells and groups to mount coordinated attacks in maintained regular contact with operational control-
different countries. Indeed, a hallmark of violent Islamic lers in Pakistan via mobile phone and satellite phone
extremist groups is their ability to conduct multiple throughout the three days of the attack. Twitter and
attacks in different locations, such as the simultaneous Instagram provide means to spread messages and pic-
bombings of the US embassies in Kenya and Tanzania tures in easily accessible and digestible chunks.
in 1998, synchronized detonation of 10 of 13 bombs on Under pressure from aggressive countermeasures,
packed commuter trains in Madrid in March 2004, and terrorist groups have utilized technologies and other
six separate gun and bomb attacks by Islamic State oper- innovations to maintain their activities tactically and
atives in central Paris and St Denis in November 2015. strategically. On a tactical level, Irish Republican Army
Chapter 28 Terrorism and globalization 459
(IRA) and Al Qaeda bomb manufacturers have dem- Terrorist groups have been able to leverage techno-
onstrated the ability to respond rapidly to electronic logical developments designed to shield a user’s identity
countermeasures. Press reports suggested that Shi’ite from unauthorized commercial or private exploitation.
groups in Iraq were able to intercept and download Concerns about infringements on civil liberties and
Predator drone video feeds using commercially avail- privacy during the early years of the internet led to the
able software. At the strategic level, so-called Islamic development of 128- and 256-bit encryption freeware
State has assumed the mantle from Al Qaeda over a that is extremely costly and time-consuming to crack.
virtual global violent Islamic extremist ‘community In addition, access to hardware such as mobile phones
of practice’, characterized by individuals exchanging and computers can be restricted via the use of lock-
information and discussing the best ways to coordinate outs. The use of internet protocol address generators,
and conduct attacks. Cells form around individuals anonymity protection programs, peer-to-peer applica-
sympathetic to violent Islamic extremist goals, acces- tions such as Telegram, Signal, and Surespot, as well as
sible via webcast or online jihadi discussion forums. chat rooms and content sites such as JustPaste.it, also
The volume of propaganda can be staggering. At its provide a degree of security. Within the virtual jihadist
height, Islamic State was producing and posting 38.2 community, youth sympathetic to the violent Islamic
unique propaganda items, including YouTube vid- extremist cause post information in discussion groups
eos, every day (Winter 2015: 5). Thousands of Twitter on ways to circumvent electronic surveillance through
and Facebook accounts of so-called Islamic State sup- awareness of phishing and mobile phone monitoring
porters have been shut down, only to spring up again, techniques and the use of electronic ‘dead letters’—
largely by crowdsourcing propaganda. The watchword saving draft messages in shared third-party email
for such violence can be thought of as a variation on the accounts, such as Gmail, without sending anything that
activist motto ‘think globally, act locally’, which rein- could be intercepted.
forces the perception of militant Islam’s global depth,
power, and reach.
Mobility
The reduced size and increased capabilities of per-
Security
sonal electronics also give terrorists mobility advan-
Terrorist cells without adequate security precautions tages. Mobility has always been a crucial consideration
are vulnerable to discovery and detection. For example, for terrorists and insurgents alike, given the superior
translations of captured Al Qaeda manuals demonstrate resources that states have been able to bring to bear
the high value its writers place on security, including against them. In open societies with well-developed
surveillance and counter-surveillance techniques. The infrastructure, terrorists have been able to move rap-
technological enablers of globalization assist terrorist idly within and across borders; this complicates efforts
cells and leaders in preserving their security in a num- to track them. The globalization of commerce has also
ber of ways, including distributing elements in a coordi- improved terrorist mobility. Globalization has expo-
nated network, remaining mobile (see ‘Mobility’), and nentially increased the volume of air travel and goods
using clandestine and/or encrypted communications. that pass through ports and across borders. Measures
The security of terrorist organizations has been have been taken to ease the flow of goods, services, and
preserved historically by limiting communication and ideas among states to improve efficiency and reduce
information exchanges among cells. This ensures that costs. The European Schengen Agreement was a shin-
if one cell is compromised, its members only know ing example of such a measure among EU member
each other’s identities and not those of other cells. states, although the Syrian refugee crisis and the 2015
Therefore the damage done to the organization is mini- terrorist attacks in Paris have led to a revisiting of this
mized. Security is even more important to clandestine concept.
cells operating on their own without central direction. The use of international air travel by terrorists has
Technological advancements, including faster process- been well documented. Carlos the Jackal evaded arrest
ing speeds and software developments, now mean that through air travel, and two of the London 2005 bomb-
those sympathetic to terrorist causes can contribute to ers travelled to Pakistan before the attack, allegedly
the cause virtually through servers located hundreds or to film their ‘martyrdom videos’ and receive bomb-
thousands of miles away. making instruction. Terrorist use of transportation
460 james d. kiras

need not necessarily be overt in nature, as the volume apostates as possible. Globalized media may play a role
of goods transported in support of a globalized econ- in shaping terrorist plans, as violent Islamic extremist
omy is staggering and difficult to monitor effectively. leaders are alleged to have been inspired by the spectac-
For example, customs officials cannot inspect all of the ular special effects of Hollywood blockbuster movies.
vehicles or containers passing through border points or Globalization has also facilitated access to the weap-
ports. To illustrate the scale of the problem, the United ons, resources, and proficiency required to conduct
States receives 10 million containers per year; one port, smaller, but more lethal attacks. Terrorist groups from
Los Angeles, processes the equivalent of 12,000 20-foot Chechnya to Pakistan have shared their expertise in the
containers daily. Western government officials fear that manufacturing of lethal bombs triggered by increas-
terrorist groups will use containers as a convenient and ingly sophisticated and globally available remote con-
cheap means to ship WMD. trol devices. In Iraq, Syria, and Afghanistan, insurgent
and terrorist groups have built sophisticated ‘impro-
vised explosive devices’ (IEDs). IEDs vary in lethality
Lethality
and complexity, and state sponsorship may no longer
Globalization has undoubtedly already had a troubling be required for their construction given globalization.
influence on terrorism, but counter-terrorism experts Digital videos suggest that terrorists conduct distance
and practitioners are most concerned about the pos- and blended learning through a ‘virtual jihad acad-
sibility of future catastrophic attacks using WMD. emy’ in which prospective terrorists study everything
During the transnational era, terrorists could obtain from conducting ambush attacks to making and using
advanced weapons to conduct more lethal attacks, IEDs, to increase their effectiveness and lethality. As
including rudimentary WMD, but on the whole they did further evidence that state sponsorship is unnecessary
not. Few tried to acquire them and fewer still, includ- in a globalized world, Islamic State has developed and
ing the Weather Underground, threatened their use. fielded its own air power, in the form of drones. While
The precise reasons why terrorists did not acquire and relatively crude and improvised, Islamic State drones
use such weapons during this era are unclear. Experts began dropping bombs from the air in 2015, leading
have speculated that terrorist leaders understood that to widespread concern among defence officials world-
the more lethal their attacks were, the greater the likeli- wide that such attacks are only the beginning of a new,
hood that a state or the international community would frightening era of terrorist reach and lethality.
focus their entire efforts on hunting them down and
eradicating them. Key Points
Since the end of the cold war, however, some ter-
rorist leaders have expressed both the desire and the • ofElements of globalization that permit the rapid exchange
ideas and goods are also exploited by terrorist groups.
will to use WMD. US troops recovered evidence in
Afghanistan in 2001 that outlined plans by Al Qaeda • influence
The internet and social media allow terrorists to reach and
audiences instantaneously and recruit new
to produce and test biological and chemical weapons followers.
under a plan code-named zabadi (curdled milk). A raid
on a suspected Al Qaeda flat in London in 2004 revealed • terrorists
The technologies associated with globalization allow
to operate in a highly distributed global ‘network’
quantities of ricin, a toxin, and Islamic State has used to share information, conduct highly coordinated, lethal
mustard and chlorine gas in attacks in Syria and Iraq attacks, and permit a high degree of mobility and security.
(2015–18). Violent Islamic extremist statements have • manufacture,
Globalization may allow some terrorist groups to acquire,
and use weapons of mass of destruction to
mentioned—and one fatwa supports—the use of any
conduct catastrophic attacks in the future.
means, including WMD, to kill as many infidels and

Combating terrorism
States plagued by transnational terrorism responded measures at airports, and creating special operations
individually and collectively to combat the phenom- counter-terrorism forces such as the West German
enon during the cold war. Responses included pass- Grenzschutzgruppe–9 (GSG–9). Successful rescues
ing anti-terrorism laws, taking preventative security in Entebbe (1976), Mogadishu (1977), Prince’s Gate,
Chapter 28 Terrorism and globalization 461
London (1980), and Singapore (1991) demonstrated for the Suppression of Unlawful Seizure of Aircraft
that national counter-terrorism forces could respond (1970). Another collective response was the creation
effectively both domestically and abroad. A normative of the Public Safety and Terrorism Sub-Directorate
and multilateral approach to tackling the problem, in Interpol in 1985. However, most initiatives and
founded on the principles of international law and col- responses throughout this decade were largely uni-
lective action, was less successful. Attempts to define lateral, regional, or ad hoc in nature. More recent
and proscribe transnational terrorism in the United efforts, such as the UN’s ISIL (Da’esh) and Al-Qaida
Nations (UN) bogged down in the General Assembly Sanctions Committee, have had some degree of suc-
over semantics, but other cooperative initiatives were cess in sanctioning specific global terrorist groups (see
successfully implemented. These included the conven- Case Study 28.2).
tions adopted through the International Civil Aviation State leaders disagree on how best to deal with
Organization (ICAO) to improve information-sharing the current form of global terrorist violence. Some
and legal cooperation, such as the Hague Convention national leaders view violent Islamic extremism as an

Case Study 28.2 The 2016 Lahore terrorist attack


This attack and others by JuA highlight several aspects of
globalization. The social networking company Facebook sent
a notification to a number of its users after the attack. Users in
Egypt, Canada, Belgium, China, the United States, and elsewhere
received a message as part of the company’s ‘Safety Check’ fea-
ture. The cryptic message provided no specific details, but rather
asked if an unspecified explosion had affected them. The mes-
sage immediately led to a level of confusion and panic among
many Facebook users across the globe.
Another element of globalization relates to the leadership split
that led to the formation of JuA. On 1 November 2013, a drone
strike killed the leader, or emir, of the TTP, Hakimullah Mehsud.
Although the TTP elected a new emir after Mehsud’s death, his
decision to engage in peace talks with the government of Pakistan
© Dinodia Photos / Alamy Stock Photo
enraged some members, who split off into two different fac-
tions, including JuA. According to news reports, the strike was
On the evening of 27 March 2016, the Gulshan-e-Iqbal park was conducted by an armed Central Intelligence Agency drone. Such
teeming with families picnicking and relaxing. The park, spread drones are often controlled and flown from halfway around the
out over 67 acres in a western suburb of Lahore, is a popular world, guided by advanced satellite and information technologies.
meeting and gathering place and open space, akin to New York’s A third and final element of globalization is associated with
Central Park, the Boston Commons, or London’s Hyde Park. The actions taken by the member states of the United Nations.
park was even more popular than usual that evening, as mem- The UN’s ISIL (Da’esh) and Al-Qaida Sanctions Committee for-
bers of Pakistan’s Christian minority community were celebrating mally sanctioned, or ‘blacklisted’, JuA on 6 July 2017, in part for
Easter with families and friends. At 6:30 p.m., a lone individual its attack, but mostly for its connections to the global terrorist
made his way through the packed crowds and detonated a sui- groups Al Qaeda and the Islamic State. The sanctioning resulted
cide bomb. His suicide vest contained an estimated 25–35 kilo- in JuA’s split into two groups in November 2017, as well as leader-
grammes of explosives. The effect of the explosive was further ship losses through Pakistani government crackdowns and other
augmented by objects embedded in it, nuts, bolts, or nails, which drone strikes.
became flying shrapnel. Seventy-five individuals, almost half of
whom were children, were killed immediately or succumbed to
Question 1: What responsibilities should social media companies
their wounds. Another 340 people were injured.
accept when it comes to terrorism? Are they just conveyors of
A Pakistani group, Jamaat-ul-Ahrar ( JuA, roughly translated as
content or should they accept responsibility for the nature of the
‘Assembly of the Free’), immediately claimed responsibility for
content they provide, including terrorist propaganda?
the attack. Jamaat-ul-Ahrar formed in the wake of a leadership
split in the Tehrik-i-Taliban Pakistan (TTP), or Pakistani Taliban, in Question 2: Who benefits most from the technologies associated
2014. JuA’s short history has been a violent one. In seven attacks, with globalization: the terrorist groups who can coordinate epi-
including one, prior to the park attack, on a Roman Catholic sodic attacks, or the states who respond to them individually and
church during services, the group has claimed almost 200 lives. collectively?
462 james d. kiras

intractable problem in which there can be no negotia- To do little against domestic or global terrorism, in
tion. The stakes in ‘the Long War’ consist of the pres- the name of upholding the rule of law, risks offering
ervation of basic freedoms and a way of life. In order to terrorist groups a sanctuary and the security of rights
defeat terrorism, individual states have a responsibility and laws.
to protect civilian populations while dealing with ter- The opinions of a number of non-governmental
rorist cells, supporters, and sympathizers within their organizations (NGOs), expressed online, and those of
own borders. Given the global, elusive, and adaptive blog writers and their followers have also been criti-
character of the violent Islamic extremist threat, the cal of the ‘war’ on terrorism. Those suspicious of the
best approach for dealing with global terrorism is to motives of the political elite of the United States range
pool resources together in a coalition of the willing: the widely in their opinions. Conspiracy theorists online
Global North improving the capabilities of the Global suggest that wars in Iraq, Afghanistan, and elsewhere
South. The end result will be the development of a are the first stage in the establishment of an Orwellian
Global Counter-Terrorism Network (GCTN) of states system that is constantly in conflict with the terrorist
able to detect, track, and eliminate terrorist threats ‘other’ to justify continued violation of personal rights
while non-military efforts address the root causes of and privacy. Communities of practice and NGOs, such
terrorism. One example of globalization in practice as Human Rights Watch, routinely provide monitoring
has been the United States’ use of unarmed and armed and online reporting of suspected government human
Global Hawk, Predator, and Reaper drones to con- rights and civil liberties abuses. One example is the per-
duct surveillance and strikes against terrorist targets. sistent attention paid to the status of terrorist detainees
The drones are flown remotely, their video feeds are held in US custody at Guantanamo Bay.
disseminated to operations centres and users locally, Although disagreements still exist over how best
regionally, and globally, and attacks are authorized, to deal with terrorism philosophically (see Opposing
conducted, and monitored without US forces having Opinions 28.1), pragmatically the largest problems are
to engage in direct combat. While the United States locating terrorists and isolating them from their means
claims these operations have succeeded in gathering of support. Locating and identifying terrorists is tedious
intelligence and attacking terrorist operations, the use and time-consuming and requires collecting, assess-
of drones has also prompted claims of ‘extrajudicial’ or ing, and analysing information. Information technolo-
‘targeted killing’ by others. gies associated with globalization have been useful in
Other national leaders are less comfortable with assisting this process. Such technologies allow identi-
the concept of ‘war’ against terrorism. In their view, fication of terrorist patterns before and after attacks,
military actions can only lead to terrorist reprisals, with systems capable of performing calculations mea-
or worse—the return of terrorism to its original con- sured in the trillions per second (floating point opera-
notation, the sanctioned use of terror by the state to tions, or ‘flops’). Terrorist finances and organizations
repress its own citizens. In their eyes, terrorism is can be evaluated through link analysis to construct a
a crime that is best dealt with through law enforce- more comprehensive picture of how terrorist elements
ment methods. By dealing with terrorism as a police interact. In addition, algorithms and nascent forms
problem, states uphold the rule of law, maintain the of artificial intelligence may prove their value in data
moral high ground, preserve democratic principles, analysis and pattern recognition, although the ethical
and prevent the establishment of martial law. Military aspects of being associated with targeting terrorists led
force should only be used in extreme circumstances some Google employees to protest. However, discovery
and even then its use may have negative consequences. of terrorist cells has much to do with luck and pursuing
Terrorism is best dealt with inside state borders and non-technical leads. States’ bureaucracies can impede
through cooperative international law enforcement or negate technical and resource advantages over ter-
efforts to arrest suspects and provide them with due rorist groups.
process. The law enforcement approach to terrorism In order to deal with global terrorism, the interna-
must balance taking enough measures against terrorist tional community must address its most problematic
groups without crossing over into the realm of ‘“polit- modern aspects: the appeal of messages that inspire
ical justice”, where the rules and rights enshrined in terrorists to commit horrific acts of violence. Killing
the principle of due process are either wilfully misin- or capturing individuals does little to halt the spread
terpreted or completely disregarded’ (Chalk 1996: 98). of extremist viewpoints that can occur under the guise
Chapter 28 Terrorism and globalization 463

Opposing Opinions 28.1 States targeted by terrorism should pre-empt or attack threats beyond
their national borders

For Against
Modern terrorism represents a paradigm shift. Terrorist Interventions never work. The record of foreign states inter-
groups are extra-legal and extra-normative by their very actions. vening to address security threats, especially terrorism, has been
The combination of ideology, mobility, access to information, abysmal. US, French, and Israeli interventions in Lebanon from
and lethality gives modern terrorists capabilities close to those of 1983 until 2000 failed to achieve stability. The same is true of
states without the latter’s restraint. Terrorists used to act in order more recent interventions in Afghanistan, Iraq, and Libya.
to coerce and strengthen their bargaining position; now they kill Interventions buy limited time before future attacks but do not
others who do not conform to their beliefs. address the root causes of terrorism.

Globalization renders national boundaries irrelevant. Interventions create more problems than they solve. Actions
Information and commodity flows make ‘national boundaries’ a by states outside their borders have unintended consequences
quaint, unrealistic way of framing responses to terrorist threats. and create unanticipated effects. The likelihood that those inter-
Few states can enforce or protect their borders; the measures vening elsewhere understand the complex political, economic,
they undertake are largely ‘security theatre’ to reassure domestic and cultural terrain into which they are embarking is slim to
populations. Sovereignty is not an inviolable concept when states zero. Those who previously had no grievance against the inter-
are unable or unwilling to address the global threats within them. vener will have one as a result of altered local or regional power
dynamics. Interventions create more terrorists than they remove.
Pressure on terrorist groups abroad keeps the homeland
safer. A proactive approach that engages terrorist groups in State responses that overreact to the threat of terrorism are
‘ungoverned’ or ‘undergoverned’ geographic spaces denies them more damaging than terrorist attacks themselves. Terrorists
sanctuary and restricts their ability to act freely. Efforts by group deliberately target non-combatants and conduct outrageous
leaders and facilitators to ensure their personal safety and sur- attacks to draw attention and provoke a response. Aggressive
vival sap energy from terrorist groups and prevent them from responses to terrorism only validate the status groups seek to
husbanding resources and attacking the homeland. Novel threats achieve. Leaders’ temptation to respond to extra-normative
require novel, aggressive responses. Better to take action else- violence with extraordinary measures can only undermine their
where, or the result will be attacks on the scale of New York City, states’ credibility and legitimacy. Existing responses may be
Paris, Brussels, or worse. imperfect and take time, but they preserve the moral authority
of the state.

1. Is the adage of ‘the strong do what they will, and the weak suffer what they must’ the best method of dealing with the phenomenon
of globalized terrorism?

2. Should state leaders cede the initiative to terrorists, and be willing to accept their attacks, as the cost of doing business in a glo-
balized world?

3. What matters most when confronting terrorism: protection of the domestic population or preservation of national reputation?

For advice on how to answer these questions, see the pointers www.oup.com/he/baylis8e

of discussion and education. In the case of Islam, for


Key Points
example, radical mullahs and imams twist the tenets of
the religion into a doctrine of action and hatred, where
spiritual achievement occurs through destruction
• alone.
Globalization does not convey advantages to terrorists

rather than personal enlightenment. In other words, • individually


States should utilize their advantages against terrorists
and collectively.
suicide attacks offer the promise of private goods (spiri-
tual reward) as a public good (positive contributions to • and
Differences among states regarding the threat of terrorism,
how best to respond to it, reflect subjective
the community over a lifetime). Precisely how the pro-
characterizations based on national biases and
cesses and technologies of globalization can assist in
experiences.
delegitimizing the pedagogy that incites terrorists will
remain one of the most vexing challenges for the inter- • crucial.
Combating the appeal of ideas that inspire terrorism is

national community.
464 james d. kiras

Conclusion
The onset of the ‘Arab Spring’ and the ‘Twitter scope of terrorism but not its nature. The benefits that
Revolution’, combined with the deaths of Osama bin globalization provides terrorists are neither one-sided
Laden and Anwar al-Awlaki and the collapse of the nor absolute. The same technologies and processes
Islamic State, suggest to some that militant Islamic ter- also enable more effective means for states to com-
rorism is in its final throes. However, the wide range bat them. Global terrorists can only succeed through
of lone wolf terrorist attacks at home and continuing popular uprising or the psychological or physical col-
conflicts abroad serve as a reminder that such terrorism lapse of their state-based adversary. Neither outcome
will be with us for years to come. Terrorism remains is likely given the limitations of terrorist messages and
a complex phenomenon in which violence is used to capabilities. Terrorist and counter-terrorist campaigns
obtain political power to redress grievances that the are characterized by prolonged struggle to maintain
process of globalization may have rendered more acute. advantages in legitimacy domestically and internation-
Globalization has increased the technical capabili- ally. The challenge for the global community will be in
ties of terrorists and given them global reach, but it has utilizing its advantages to support a ‘clear, countervail-
not altered the fundamental fact that terrorism repre- ing vision’ as an alternative to the ideas that motivate
sents the extreme views of a minority of the global pop- and sustain the on-going wave of terrorist violence
ulation. In other words, globalization has changed the (Fishman 2016: 259).

Questions

1. Why is linking terrorism with globalization so difficult to do theoretically?


2. When did terrorism become a truly global phenomenon and what enabled it to do so?
3. In what ways are the technologies and processes associated with globalization more beneficial
to states or terrorists?
4. Given that terrorism has been both a transnational and a global phenomenon, why has it not
been more successful in effecting change?
5. Of all of the factors that motivate terrorists, is any one more important than others, and if so, why?
6. What has changed in terrorism over the past half-century and have any factors remained the
same? If so, what are they and why have they remained constant?
7. What is the role that technology plays in terrorism and how will it change the way terrorists
operate in the future?
8. What are the dilemmas that terrorist groups face with respect to WMD?
9. What is the primary challenge that individual states and the international community as a whole
face in confronting terrorism?
10. How has the concept of security in personal, societal, and international life changed as a result
of globalized terrorism—and how will it change in the future?

Test your knowledge and understanding further by trying this chapter’s Multiple Choice
Questions www.oup.com/he/baylis8e

Further Reading

Atran, S. (2010), Talking to the Enemy: Faith, Brotherhood, and the (Un)Making of Terrorists (New York:
Ecco, HarperCollins). Argues that kinship—or blood and belonging—explains contemporary
terrorism better than organizational causes.

You might also like