Delegate Research Information

Similar documents
Delegate Research Information

Terrorism in Cyberspace

THE FUTURE OF CYBER TERRORISM

A traditional approach to IS based on maintaining a unified Iraq, while building up the Iraqi Government, the Kurdistan Regional Government

the Middle East (18 December 2013, no ).

(U//FOUO) ISIL Social Media Messaging Resonating with Western Youth

Prime Minister s Foreword

SAUDI ARABIA. and COUNTERTERRORISM FACT SHEET: FIGHTING AND DEFEATING DAESH MAY 2017

Conference on Peaceful Coexistence, Dialogue and Combating Radicalization

Global Affairs May 13, :00 GMT Print Text Size. Despite a rich body of work on the subject of militant Islam, there is a distinct lack of

Integration as a means to prevent extremism and terrorism

A new religious state model in the case of "Islamic State" O Muslims, come to your state. Yes, your state! Come! Syria is not for

Policy Workshop of the EU-Middle East Forum (EUMEF) Middle East and North Africa Program. Deconstructing Islamist Terrorism in Tunisia

November Guidelines for the demilitarization of Gaza and a long-term arrangement in the South. MK Omer Barlev

Efforts to carry out electronic Jihad on the part of the Jihadi online forum members

Summary. Aim of the study, main questions and approach

Jihadist women, a threat not to be underestimated

Intelligence Bulletin

Permanent Mission Of the Kingdom of Saudi Arabia To the United Nation

Executive Summary. by its continued expansion worldwide. Its barbaric imposition of shariah law has:

Remarks of Stuart E. Eizenstat

Islamic Declaration on Safeguarding Cultural Heritage in the Islamic World

«Violent Islamist Extremism : The European Experience» Committee on Homeland Security and Government Affairs U.S. Senate Washington, June 27, 2007

Community Statement on NYPD Radicalization Report

Is Extremist Violence in the West Caused by the Clash of Cultures?

Issue Overview: Jihad

Struggle between extreme and moderate Islam

Tolerance in French Political Life

EU Global Strategy Conference organised by EUISS and Real Institute Elcano, Barcelona

The United States proposed a UN General Assembly resolution condemning Hamas and other terrorist organizations in the Gaza Strip.

Islam, Radicalisation and Identity in the former Soviet Union

St. Petersburg, Russian Federation October Item 2 6 October 2017

Chapter 5 The Peace Process

Overview 1. On June 29, 2014, ISIS leader Abu Bakr al-baghdadi declared the establishment of the

Mitt Romney s secret elitist 47% video Posted by IlluminatiWatcher on September 18, 2012

Lesson 2: Looking deeper into the link between religions, radicalisation and terrorism This session has been prepared by DARTKE, Hungary

NAVAL POSTGRADUATE SCHOOL

ICT Jihadi Monitoring Group. AZAN Magazine Profile Analysis

POLITICAL PROGRAMME OF THE OGADEN NATIONAL LIBERATION FRONT (ONLF)

CHINA AND THE MUSLIM WORLD: THE CASE OF IRAN, SAUDI ARABIA, AND TURKEY. Bambang Cipto University of Muhammadiyah Yogyakarta, Indonesia

138 th IPU ASSEMBLY AND RELATED MEETINGS. Consideration of requests for the inclusion of an emergency item in the Assembly agenda E#IPU138

Fighting the Long War-- Military Strategy for the War on Terrorism

Civil Wars, Violence, and International Responses project The Evolution of Armed Groups: Crafting Effective Responses Workshop 7 November 2017

Understanding Jihadism

Iranian Targets Hit in Syria by the IDF and Responses in Iranian Media

Global View Assessments Fall 2013

PREVENT. Working in Partnership for the Prevention of Terrorism and Violent Extremism

The impact of the withdrawal of the American troops from Syria on the campaign against ISIS (Initial Assessment) Overview

Hizb-ut-Tahrir in Australia: Urgent Need for International Engagement and Counter-Narrative

Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya

Religious extremism in the media

Hillary s leaked s reveal her knowledge of Saudi support of ISIS

Big Data, information and support for terrorism: the ISIS case

Resolved: The United States should adopt a no first strike policy for cyber warfare.

9/11 BEFORE, DAY OF, AND AFTER WHAT HAPPENED AND WHY?

German Islam Conference

Anne Josso, Secretary General of MIVILUDES The French approach to dealing with Salafist/Jihadist radicalisation

QUESTIONS AND ANSWERS ABOUT ISLAM AND ISIS

Does parenting play a role in the development or prevention of radical beliefs? Indonesian case study

Partners, Resources, and Strategies

Grade yourself on the OER. Test Friday on Unit 1

US Iranian Relations

After Mali Comes Niger

The Board of Directors recommends this resolution be sent to a Committee of the General Synod.

UUA Strategic Plan. Our Strategic Vision and the FY 2014 Budget. April, 2013

Religious Pluralism in the Palestinian Territories

Comprehensive Plan for the Formation of Catechetical Leaders for the Third Millennium

A People Called Out to Take Responsibility

How Terrorists may be Hiding in Plain Sight. Cindy Casey, Gwynedd Mercy University

DECLARATION OF THE CONTACT GROUP ON ROHINGYA MUSLIMS OF MYANMAR HELD ON THE SIDELINES OF THE ANNUAL COORDINATION MEETING 19 SEPTEMBER 2017

Definition of extremism

Position Description. Minister of Student and Family Ministries. VISION STATEMENT Discipleship Evangelism Service

Global Conflict & Terrorism International Security Influencers in 2012

Supporting the Syrian Opposition

Strategy. International Humanist and Ethical Union

Presentation: TOTAL WAR ON "ISLAM" "A Counter-Jihad Op Design Model" Lt. Col. Matthew A. Do oley's Joint Staff Forces College on (.

Regional Issues. Conflicts in the Middle East. Importance of Oil. Growth of Islamism. Oil as source of conflict in Middle East

COUNTERING VIOLENT EXTREMISM IN SINGAPORE. Muhammad Haniff Hassan, PhD

REPORT ON A SEMINAR REGARDING ARAB/ISLAMIC PERCEPTIONS OF THE INFORMATION CAMPAIGN

Radicalization Process in Prisons. Col. (Res.) Jonathan Fighel- ICT Senior Researcher N.A.T.O. workshop, Eilat, December, 2007

Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S.)

Faithful Citizenship: Reducing Child Poverty in Wisconsin

War on Terrorism Notes

Iranian Responses to Growing Tensions with Israel and an Initial Assessment of Their Implications from an Iranian Standpoint. Dr.

The Fighters Factory: Inside Al-Shabab's Education System

Intelligence and Terrorism Information Center at the Israel Intelligence Heritage & Commemoration Center (IICC)

Circle of Influence Strategy (For YFC Staff)

Hezbollah=s Global Reach

Selected methods of recruiting Islamic terrorists

Playing With Fire: Pitfalls of Egypt s Security Tactics

The Representation of Islam and Muslims in the Media

REQUIRED DOCUMENT FROM HIRING UNIT

Ladies and gentlemen, Thanks for giving me the opportunity to talk to you today. Ladies and gentlemen,

WORKING GROUP: BACK TO THE FUTURE, EUROPEAN JEWRY Moderator: Emanuel Halperin Content prepared by: Dov Maimon

New Strategies for Countering Homegrown Violent Extremism: Preventive Community Policing

Introduction. Special Conference. Combating the rise of religious extremism. Student Officer: William Harding. President of Special Conference

War Has been declared

Why The U.S. Must Stop Supporting Kurdish Forces In Syria BY POLITICAL INSIGHTSApril 3, 2018

MINDS ON ACTIVITY SETTING THE STAGE. News in Review January 2013 Teacher Resource Guide EIGHT DAYS: Israel and Hamas

Overview. As tensions mount between Iran and the United States, the Commander of the Qods

Transcription:

nd MSC 62 Student Conference on National Affairs Against All Enemies, Foreign and Domestic: Securing the Homeland Texas A&M University Delegate Research Information Round Table #16 Capitalizing Security: Mitigating Economic Warfare Facilitator: Lt. Col. Marshall Straus Scantlin This delegate research information is not intended to be a comprehensive assessment of your assigned round table topic but rather a starting point to help launch your own personal investigations into the various associated issues. It is encouraged, if not expected, that your policy proposals will be inclusive of aspects pertaining to your round table topic that are not covered in this research compilation. You, your facilitator, your round table host, and your fellow roundtable delegates are all responsible for crafting a policy proposal that takes this into consideration.

Example Policy Proposal - SCONA 61 Winner To: The Honorable Susan Rice Office Held: National Security Advisor From: Spencer Allen, Christopher Beveridge, John Breland, Karch Calkins, Johnny Childers, Rachel Clink, Zachariah Fares, Brian Fuentes, Adel Hussain, Sebastian King, Isaac Lee, Emily Otto, Joni Taylor Facilitator: COL Chris Albus Subject: Counteracting the Allure of Jihad Date: 20 February 2016 Introduction The allure of Jihad is a growing national security problem. There is an increased ability of terrorist groups to inspire those living within the U.S. to commit acts of domestic terrorism. This complex problem requires the development of a counter-narrative policy, based on American values, to limit the allure of Jihad. This is done by partnering with the Muslim community and interest groups and initiating a proactive, timely, and relevant informational campaign. Background Combating Jihad within the United States is a key tenet of the 2015 National Security Strategy (NSS). Key NSS components for combating the allure of Jihad include: collective action with responsible partners, and increased efforts to prevent the growth of violent extremism and radicalization that drives increased threats.... address the underlying conditions that can help foster violent extremism 1... supporting alternatives to extremist messaging. Together, these points offer a foundation to build a feasible, acceptable, and suitable strategy based on partnerships and a comprehensive informational campaign. A 2007 New York Police Department investigation identified a four step process describing how 2 a person progresses from an average citizen to a Jihadist (Figure 1). The progression moves through pre-radicalization, self-identification, indoctrination, and finally into jihadization. Pre-radicalization occurs before the individual is exposed to radical Islam. In self-identification, the individual begins to relate more with the radical Islamic ideology than with an ideology of moderation and peace. Indoctrination occurs when the individual believes their anti-western violent radical Islamic ideology is justified. Finally, jihadization occurs when the individual 1 "National Security Strategy." (2015): 9. The White House. Feb. 2015. Web. 19 Feb. 2016. 2 Precht, Tomas. Home Grown Terrorism and Islamist Radicalisation in Europe. Publication. Danish Ministry of Justice, 2007. Web. 19 Feb. 2016.

3 begins to act on those beliefs. 4 Figure 1: Four-step process of Radicalization. Salafism is a form of radical Islam Supporting Argument Analysis The allure of Islamic inspired homegrown terrorism stems from an exploitation of the human 5 need for personal significance and cognitive closure. Individuals seeking a sense of certainty and the desire to gain a larger-than-life significance are susceptible to an extremist ideology that provides a black and white view of the world. Extremist ideology purports the notion that it holds all the answers. The proponents of such an ideology advertise themselves as heroes and martyrs. Dr. Kruglanski, a professor from the University of Maryland and a social psychologist, has conducted intensive research regarding the psychology behind terrorist recruitment. He concluded that combating terrorism requires replacing the glamour of Jihad with an alternative glamour. This involves enacting a policy that focuses on turning the psychological tables on 6 Islamic-inspired extremism. This research indicates a psychological vulnerability that can be exploited. As such, this policy targets that vulnerability which is located in between the steps of pre-radicalization and self-identification. Through counter-narrative initiatives the U.S. can supplant Jihadist narratives. Recommendations The first step of providing a counter-narrative involves partnerships with Muslim community leaders and interest groups. Political leaders will engage in open dialogue with the Muslim community and build strong working relationships, creating a unified front addressing the issues. Muslim leaders will be invited to address governing bodies and have a role in the 3 ibid. 4 England. Youth Justice Board. Preventing Religious Radicalisation and Violent Extremism. By Kris Christmann. 2012. Web. 19 Feb. 2016. 5 Kruglanski, Arie W. Psychology Not Theology: Overcoming ISIS Secret Appeal. E-International Relations. 28 Oct. 2014. Web. 19 Feb. 2016. 6 Sagl, Lauren. "Dr. Arie Kruglanski Discusses Psychology Behind Terrorist Recruitment." National Consortium of the Study of Terrorism and the Response to Terrorism. 29 Oct. 2014. Web. 19 Feb. 2016.

implementation of counter-narratives strategies. In reaching out to Muslim community leaders, the United States will develop a counter-narrative that builds a stronger position for Muslims in the fabric of the American Story. This will lessen the possibility of those who would feel disenfranchised with society, making them more susceptible to the Jihadist message. Similarly, a partnership with American interest groups for educational outreach should be created to promote public education of the tenets of Islam to the rest of the American public. Doing so mitigates stereotypes and creates a more educated and accepting public that effectively integrates Muslims into American society. The second step of this policy involves implementing a widespread and timely informational campaign to counter the Jihadist message of an inevitable clash between Islam and the West. Using cutting edge social media and other informational vehicles, the U.S. administers an informational campaign which disrupts the Jihadist decision-making process. By getting in front of the news media cycle or beating them to the punch, the U.S. will counter the extremist claim that a cultural and religious war is justified between Islam and the West. In order to defeat the inflammatory rhetoric of extremist ideology, public leaders need to unite and develop a common stance. Socio-cultural differences can be distorted to feed extremist propaganda. This united stance must be communicated early and often at all levels, from federal to local. Furthermore, the United States should exert its influence in the proactive messaging of the American narrative. Extremists use the media to incite fear and project their message. The United States needs to counter these messages by communicating events that highlight success, rather than those that focus on purely negative subjects. Leaders must also reach out to media outlets and project these messages to the public at every possible occasion. In conjunction with news media influence, the United States needs to implement a more prominent presence on social media. Such objectives are achieved through adapting counter-narratives to the specific messages from extremist accounts. By monitoring the public activity of the extremists, the United States ensures the Jihadists do not have an uncontested platform. Lastly, humor is a very powerful tool utilized to present extremist messages and ideology as ridiculous. This helps delegitimize their messages and undermines their ability to influence. There is a degree of risk associated with these options. Table 1 presents several of these risks, prioritized from high to low. These should be taken into consideration by decision makers before implementation.

Table 1: Risk Assessment Risk Context Risk Level Ineffective anti-jihad campaign Mixing Church and State Negative connotation of propaganda Reduction of legitimacy of Muslim Leaders Public Backlash Inadequate screening for leadership An ethnocentric anti-jihad campaign may become counterproductive and lead to an attraction towards Jihad. Developing programs that deal with educating the public or developing relations within a specific sect of Islam may be infringing on the separation of church and state. An information campaign could be misconstrued as negative propaganda which may lower public opinion of those who are distrustful of government influence. Liberal Muslim leaders cooperating with US strategy may be seen as being overly-influenced or controlled by government An emphasis of pro-muslim programs may create an upset by some Americans which may lead to public unrest. Sponsoring an improper Muslim community leader may create a platform for him/her to exploit for personal gain. High Medium Medium Medium Low-Medium Low Conclusion With this strategy, the United States Government can begin to counteract the allure of Jihad, a rising issue in Western society. This policy is feasible because the required informational and relational platforms are already in place, acceptable due to the potential benefits outweighing the risks determined in Table 1, and suitable due to the interconnectedness of the target audience via social networks, community ties, and other mediums. Partnering with Muslim communities and interest groups, as well as initiating an information campaign, will build an effective counter-narrative policy based on American values to limit the allure of Jihad.

Actors, Terms, Concepts Terms Critical Infrastructure : systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. Commentary/Definition (pg. 130-132): https://www.gpo.gov/fdsys/pkg/plaw-107publ56/pdf/plaw-107publ56.pdf PATRIOT Act : An act passed 45 days after the attacks on September 11, 2001. Designed to expand the scope and power of the federal government when it comes to surveilling and thwarting potential terrorist attacks on American soil. http://people.howstuffworks.com/patriot-act.htm Embargo : An official ban on trade or other commercial activity with a particular country. Definition: https://en.oxforddictionaries.com/definition/embargo http://blogs.wsj.com/washwire/2014/06/09/the-pros-and-cons-of-economic-sancti ons/ Sanction : Measures taken by a state to coerce another to conform to an international agreement or norms of conduct, typically in the form of restrictions on trade or official sporting participation. Often described as a partial embargo. Definition: https://en.oxforddictionaries.com/definition/sanction http://www.exportcompliancematters.com/2014/07/22/prohibited-country-sanctio ns-and-embargoes-make-sure-you-know-the-difference-when-drafting-contract-la nguage-and-evaluating-export-markets/ Specifically Designated Nationals List : As part of its enforcement efforts, OFAC publishes a list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Actors https://www.law.cornell.edu/wex/specially_designated_nationals_and_blocked_p ersons_list https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx https://sanctionssearch.ofac.treas.gov/default.aspx Secretary of State : The Secretary of State, appointed by the President with the advice and consent of the Senate, is the President's chief foreign affairs adviser. The Secretary

carries out the President's foreign policies through the State Department, which includes the Foreign Service, Civil Service, and U.S. Agency for International Development. Definition: https://www.state.gov/secretary/ United States Department of Defense : An executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces. https://www.thebalance.com/department-of-defense-what-it-does-and-its-impact- 3305982 https://www.defense.gov/about-dod United States Department of Energy : The Department of Energy manages the United States' nuclear infrastructure and administers the country's energy policy. The Department of Energy also funds scientific research in the field. http://www.globalresearch.ca/energy-new-front-in-economic-warfare/5306958 United States Department of Homeland Security : Formed in 2002 from the combination of 22 departments and agencies, the Department of Homeland Security works to improve the security of the United States. The Department's work includes customs, border, and immigration enforcement; emergency response to natural and manmade disasters; antiterrorism work; and cybersecurity. https://www.gpo.gov/fdsys/pkg/gaoreports-gao-08-80/html/gaorepor TS-GAO-08-80.htm United States Department of the Treasury : The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainable economic growth, and fostering improved governance in financial institutions. https://www.treasury.gov/about/role-of-treasury/pages/default.aspx Office of Foreign Assets Control: Administers and enforces economic and trade sanctions based on US foreign policy and national security goals against targeted foreign countries and regimes, terrorists, international narcotics traffickers, those engaged in activities related to the proliferation of weapons of mass destruction, and other threats to the national security, foreign policy or economy of the United States. https://www.treasury.gov/resource-center/sanctions/pages/default.aspx Office of Terrorism and Financial Intelligence : Marshals the department's intelligence and enforcement functions with the twin aims of safeguarding the financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction (WMD) proliferators, money launderers, drug kingpins, and other national security threats. https://www.treasury.gov/resource-center/terrorist-illicit-finance/pages/default.as px

Concepts Homeland Security : the protection of US sovereignty, territory, domestic population, and critical infrastructure against external threats and aggression, or other threats as directed by the President (1). The national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive to the national effort to prevent terrorist attacks within the United States, reduce the vulnerability of the U.S. to terrorism, and minimize the damage from attacks that do occur (2). Definition 1 (pg. 16): http://www.dtic.mil/doctrine/new_pubs/jp3_27.pdf Definition 2 (pg. 11): https://fas.org/sgp/crs/homesec/r42462.pdf https://www.wired.com/2013/01/homeland-security-definition/ State Sponsors of Terrorism: Countries determined by the Secretary of State to have repeatedly provided support for acts of international terrorism. The four main categories of sanctions resulting from designation under these authorities include restrictions on U.S. foreign assistance; a ban on defense exports and sales; certain controls over exports of dual use items; and miscellaneous financial and other restrictions. Definition: https://www.state.gov/j/ct/list/c14151.htm http://www.npr.org/sections/thetwo-way/2015/04/15/399809412/whos-on-the-listof-state-sponsors-of-terrorism-and-why Economic Warfare : State sponsored action taken against another state s economy to coerce its government into a certain activity. http://tinyurl.com/goqn6og http://securityobserver.org/the-missing-doctrine-of-economic-warfare/ Financial Terrorism: Behind the scenes manipulation of a nation s economy by state or non-state actors. http://www.washingtontimes.com/news/2011/feb/28/financial-terrorism-suspected -in-08-economic-crash/ https://www.scribd.com/document/49755779/economic-warfare-risks-and-resp onses-by-kevin-d-freeman Cyber Warfare : Include[s] cybercrime (such as cyber fraud against banking and payment platforms), cyber espionage (such as trade secret and intellectual property theft), cyber sabotage (such as the malware attack on the Saudi Aramco oil company in 2012), and cyberterrorism (attacks involving the convergence of cyberspace and terrorism that cause violence against persons or property and generate fear so far mostly theoretical, although the recent North Korean sponsored cyberattack on Sony Pictures Entertainment began to cross that line with the threats that followed the attack). https://www.chathamhouse.org/sites/files/chathamhouse/0611wp_cornish.pdf

Academic Articles, Journals - The Vulnerability of Developed States to Cyber Economic Warfare https://www.chathamhouse.org/sites/files/chathamhouse/0611wp_cornish.pdf - Economic Warfare: Sanctions and Trade Wars https://issuu.com/voxjournal/docs/economicwarfare6 - Financial Warfare http://www.fpri.org/article/2007/09/financial-warfare/ Mixed Media - Economic Warfare Institute Super Panel https://www.youtube.com/watch?v=sfhm0rd9cx8 - History of America s Cuba Embargo https://www.youtube.com/watch?v=muus0rinpb - Reality Check: Economic Sanctions Can Kill Too https://www.youtube.com/watch?v=h30wemrqoa8 - Countries Sanctioned by the United States https://en.wikipedia.org/wiki/united_states_embargoes#/media/file:us_sanctions_2.pn g

Current Events, Newsmedia Articles - China Is Crushing the US In Economic Warfare http://money.cnn.com/2016/06/30/news/economy/china-us-war-by-other-means/ - Arms Embargo on South Sudan Fails Vote http://www.npr.org/sections/thetwo-way/2016/12/23/506740713/arms-embargo-on-south -sudan-fails-u-n-vote - Obama Administration Prepares Sanctions, Retaliation for Russian Election Hacking http://www.cnn.com/2016/12/28/politics/russian-election-meddling-sanctions-hacking/