Page 125 - Encyclopedia Of Terrorism
P. 125

C-Kushner.qxd  26-10-02 10:37 AM  Page 99



                                                                                         Counterterrorism———99


                terrorists and their support networks. Counterterrorism  who walked into the U.S. Embassy in Pakistan and
                is inherently an offensive, as opposed to defensive,  told U.S. diplomats where  Yousef was staying.
                approach to the threat, involving diplomacy, intelli-  Elements of several U.S. government agencies were
                gence operations, law enforcement, military opera-  involved in vetting the information provided by the
                tions, and counterterrorism training.              source and putting in place an operation to apprehend
                                                                   Yousef. In addition, the United States asked for and
                                                                   received the full assistance of the government of
                DIPLOMACY                                          Pakistan to arrest and remove Yousef from Pakistan.
                                                                   This type of coordination and cooperation is charac-
                The diplomatic dimension of counterterrorism tradi-  teristic of what happens when things go well. But
                tionally is associated with foreign relations and interna-  these events do not happen of their own accord; it
                tional terrorism, but it is also applicable when fighting  takes preparation and often years of work to put the
                domestic terrorism. Diplomacy is the art of persuad-
                                                                   mechanisms in place. Securing cooperation is the
                ing others to do things that serve mutual interests. The
                                                                   nuts and bolts of diplomacy.
                diplomatic component of counterterrorism encom-
                passes activities such as persuading Lebanon to close  INTELLIGENCE OPERATIONS
                down terrorist training camps, securing Pakistan’s
                permission to arrest and render Ramzi Ahmed Yousef  Accurate intelligence also is a critical element in an
                to U.S. authorities, or the FBI sharing information with  effective counterterrorism policy. Intelligence, as a
                local police to prevent a terrorist attack.  The use of  tool of counterterrorism, has several dimensions—
                diplomacy involves reaching international consensus  field operations, covert action, technical collection,
                on how to handle issues ranging from aviation security  and analysis. In field operations the objective of intel-
                to tagging explosives to imposing sanctions on state  ligence is to identify the members of terrorist groups,
                sponsors. Most important, it involves developing and  learn how they get their money, locate where they do
                implementing policy responses to terrorism or the  their training and operational planning, and ultimately
                threat of it.                                      obtain access to the decision makers.  This kind of
                  Diplomacy has been used more frequently and with  information is essential for mounting operations to
                more success on the international front. Domestically,  disrupt or preempt terrorist attacks. Obtaining such
                it is another story. Interactions between federal, state,  intelligence, however, is a daunting task.
                and local officials can be just as complicated and   Another facet of intelligence activities, covert
                sensitive as any operation conducted overseas. Proper  action, is similar to diplomacy only done in secret.
                coordination among the different law enforcement   Covert action is the use of information and/or disin-
                agencies can play a critical role in whether a prose-  formation to attack and weaken the opponent.  The
                cutable case against a terrorist can be built. Law  ultimate goal of such efforts is to help create an envi-
                enforcement officials across the United States fre-  ronment that supports the overall counterterrorism
                quently complain that federal officials, particularly  policy. For example, when employed against a terror-
                the FBI, work in a vacuum, ignore local police, and  ist group covert action could encompass planting
                refuse to share information.  The newly established  stories in the media that are designed to undermine
                cabinet-level Homeland Security department man-    support for that group and/or build support within a
                dates that the FBI and CIA share information with  country for taking action against the terrorists.
                each other and with the department itself; it is hoped  The technical dimension of intelligence activities
                that this top-level coordination will translate into  includes efforts to intercept or monitor all communi-
                better interdepartment cooperation at all levels.  cations by terrorists. This includes actions such as an
                  Finding and arresting terrorists outside the United  old-fashioned wiretap to penetration of a terrorist
                States is a significant undertaking. It requires the  computer.  Technical intelligence activities also can
                permission of foreign governments and coordination  be employed to disrupt terrorist communications or
                among a variety of agencies. The arrest of the master-  interfere with the transfer of financial resources.
                mind of the 1993 World Trade Center bombing, Ramzi   Intelligence analysis plays an important role in
                Ahmed Yousef, is a case in point. The U.S. government  identifying the structure and plans of terrorists. After
                first learned of his whereabouts thanks to an informant  field operatives gather raw data, someone has to make
   120   121   122   123   124   125   126   127   128   129   130