Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
January 4, 2007
Disclaimer
This document was prepared as an account of work sponsored by an agency of the United States
Government. Neither the United States Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any
specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise,
does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United
States Government or the University of California. The views and opinions of authors expressed herein
do not necessarily state or reflect those of the United States Government or the University of California,
and shall not be used for advertising or product endorsement purposes.
This work was performed under the auspices of the U.S. Department of Energy by University of
California, Lawrence Livermore National Laboratory under Contract W-7405-Eng-48.
UCRL-TR-227068
PREPARED BY:
(831) 647-4154
UCRL-TR-227068 i
Sponsor
Cover: ThecoverphotopicturestheTooeleChemicalAgentDisposalFacilityoutsideofTooele,Utahintheevening.This
publicdomainimageisavailableat:http://ens.lycos.com/ens/sep2001/2001L090406.html.
UCRL-TR-227068 ii
To build and implement a robust strategy to protect our critical
infrastructures and key assets from further terrorist exploitation, we
must understand the motivations of our enemies as well as their
preferredtacticsandtargets.
TheWhiteHouse,
TheNationalStrategyforthePhysicalProtectionof
CriticalInfrastructuresandKeyAssets,2003,pviii.
UCRL-TR-227068 iii
CenterforNonproliferationStudies
TheCenterforNonproliferationStudies(CNS)strivestocombatthespreadofweaponsofmassdestruction
(WMD)bydisseminatingtimelyinformationandanalysisandtrainingthenextgenerationofnonproliferation
specialists.CNSattheMontereyInstituteofInternationalStudiesisthelargestnongovernmentalorganizationin
theUnitedStatesdevotedexclusivelytoresearchandtrainingonnonproliferationissues.
Dr.WilliamPotterestablishedtheCenterin1989withahandfulofInstitutestudents.Today,CNShasafull
timestaffofmorethan65specialistsandover75graduatestudentresearchassistantslocatedinofficesin
Monterey,California,Washington,DCandAlmaty,Kazakhstan.CNSisorganizedintofiveresearchprograms:
theChemicalandBiologicalWeaponsNonproliferationProgram,theEastAsiaNonproliferationProgram,the
InternationalOrganizationsandNonproliferationProgram,theNewlyIndependentStatesNonproliferation
Program,andtheWMDTerrorismResearchProgram(WMDTRP).EachprogramsupportstheCentersmission
bytraininggraduatestudents,buildingaworldwidecommunityofnonproliferationexperts,publishingboth
onlineandprintresourcesonallaspectsofWMD,providingbackgroundmaterialtothemedia,andproducing
analysisforusebyeducationalinstitutions,government,andthegeneralpublic.
TheWMDTerrorismResearchProgramconductsworkontheuseorpotentialuseofchemical,biological,
radiologicalandnuclear(CBRN)weaponsbynonstateactors.TheProgramfocusesonthemotivationalaspects
ofterrorismintheWMDcontext,bringingtogetherterrorismscholarsfromthesocialsciences(historyand
politicalscience)andtechnicalexpertsfromthesciences(microbiology,medicine,chemistry,andphysics)to
approachtheWMDterrorismprobleminaninterdisciplinaryfashion.
ProjectResearchStaff
PrincipalInvestigator:
GaryAckerman,Director,WMDTRP
Investigators:
PraveenAbhayaratne,ResearchAssociate,WMDTRP
JeffreyM.Bale,PhD,SeniorResearchAssociate,WMDTRP
AnjaliBhattacharjee,ResearchAssociate,WMDTRP
CharlesBlair,ResearchAssociate,WMDTRP
LydiaHansell,GraduateResearchAssistant,WMDTRP
AndrewJayne,GraduateResearchAssistant,WMDTRP
MargaretKosal,PhD,PostDoctoralFellow,CBWNP
SeanLucas,GraduateResearchAssistant,WMDTRP
KevinS.Moran,ResearchAssociate,WMDTRP
LindaSeroki,GraduateResearchAssistant,WMDTRP
SundaraVadlamudi,ResearchAssociate,WMDTRP
SupportStaff:
JoelBaker,GraduateResearchAssistant,WMDTRP
ErinFitzpatrick,GraduateResearchAssistant,WMDTRP
LaurenHarrison,GraduateResearchAssistant,WMDTRP
RobertWesley,GraduateResearchAssistant,WMDTRP
UCRL-TR-227068 iv
TABLEOFCONTENTS
ExecutiveSummary vi
Chapter1 Introduction 1
Chapter2 ConceptualBackgroundandLiteratureExtracts 14
Chapter3 HistoricalRecordandSelectedCaseStudies 55
Chapter4 CriticalInfrastructureTerroristIncidentCatalog 86
Bibliography 172
BOXES,FIGURESANDTABLES
REFERENCEDINREPORT
Boxes
Box1.1 CriticalInfrastructureDefinitionsfromthePresidents
CommissiononCriticalInfrastructureProtection 6
Box1.2 CriticalInfrastructureDefinitionsfromExecutiveOrder13228 8
Box1.3 StatementofPolicy:2001CriticalInfrastructureProtectionAct 9
Figures
FigureES1 ContributingFactorsDiagram xvi
Figure1.1 BasicThreatAssessmentSchematic 2
Figure4.1 CrITICTypologies 89
Figure4.2 NumberofCriticalInfrastructureAttacksbyDecade 105
Figure4.3 AttacksonCriticalInfrastructurebyPerpetratorCategory 106
Figure5.1 ContributingFactorsDiagram 110
Figure5.2 ProgressiveRestrictionofTargetSpace 113
Fig.AI1 TotalNumberofMajorandMinorCIAttacksperYear 192
Fig.AI2 TotalNumberofMajorandMinorCIAttacksbyRegion 193
Fig.AI3 AttributableMajorCIAttacksbyPerpetratorCategory 194
Fig.AI4 AttributableMajorandMinorCIAttacksbyPerpetratorCategory 195
Fig.AI5 AttributableMajorCIAttacksbyPerpetratorCategory&Year 196
Fig.AI6 AttributableMajorandMinorCIAttacksbyPerpetratorCategory&Year 197
Fig.AI7 AttributableMajorCIAttacksbyPerpetratorCategory&Region 198
Fig.AI8 AttributableMajorandMinorCIAttacksbyPerpetratorCategory&Region 199
Fig.AI9 AttributableMajorCIAttacksbyPerpetratorCategory&DeliveryMethod 200
Fig.AI10 AttributableMajor&MinorCIAttacksbyPerp.Category&DeliveryMethod 201
Fig.AI11 Casualties:AttributableMajorCIAttacksbyPerpetratorCategory 202
Fig.AI12 Casualties:AttributableMajorandMinorCIAttacksbyPerpetratorCategory 203
Fig.AI13 Injuries:AttributableMajorCIAttacksbyPerpetratorCategory 204
Fig.AI14 Injuries:AttributableMajorandMinorCIAttacksbyPerpetratorCategory 205
Fig.AI15 Fatalities:AttributableMajorCIAttacksbyPerpetratorCategory 206
Fig.AI16 Fatalities:AttributableMajorandMinorCIAttacksbyPerpetratorCategory 207
Fig.AI17 Fatalities:AttributableMajorandMinorCIAttacksbyPerp.SubCategory 208
Fig.AI18 NumberofMajorandMinorCIAttacksAttributabletoSpecificGroups 209
Fig.AI19 FatalitiesbyTypeofAttackforAttributableMajorandMinorCIAttacks 210
Fig.AI20 FatalitiesbyYearforAttributableMajorandMinorCIAttacks 211
Tables
Table5.1 DECIDeFramework:OperationalObjectiveCategories 145
Table5.2 DECIDeFramework:CapabilityRequirementsforAttackingCI 156
UCRL-TR-227068 vi
EXECUTIVESUMMARY*
Tobuildandimplementarobuststrategytoprotectourcriticalinfrastructuresandkeyassetsfromfurtherterrorist
exploitation,wemustunderstandthemotivationsofourenemiesaswellastheirpreferredtacticsandtargets.
2003NationalStrategyforthePhysicalProtection
ofCriticalInfrastructuresandKeyAssets1
ProjectOverview
Certaintypesofinfrastructurecriticalinfrastructure(CI)playvitalrolesinunderpinningoureconomy,
securityandwayoflife.Thesecomplexandofteninterconnectedsystemshavebecomesoubiquitousand
essentialtodaytodaylifethattheyareeasilytakenforgranted.Oftenitisonlywhentheimportantservices
providedbysuchinfrastructureareinterruptedwhenweloseeasyaccesstoelectricity,healthcare,
telecommunications,transportationorwater,forexamplethatweareconsciousofourgreatdependenceon
thesenetworksandofthevulnerabilitiesthatstemfromsuchdependence.
Unfortunately,itmustbeassumedthatmanyterroristsarealltooawarethatCIfacilitiesposehighvaluetargets
that,ifsuccessfullyattacked,havethepotentialtodramaticallydisruptthenormalrhythmofsociety,cause
publicfearandintimidation,andgeneratesignificantpublicity.Indeed,revelationsemergingatthetimeofthis
writingaboutalQaidaseffortstoprepareforpossibleattacksonmajorfinancialfacilitiesinNewYork,New
Jersey,andtheDistrictofColumbiaremindusjusthowrealandimmediatesuchthreatstoCImaybe.Simply
beingawarethatournationscriticalinfrastructurepresentsterroristswithaplethoraoftargets,however,does
littletomitigatethedangersofCIattacks.Inordertopreventandpreemptsuchterroristacts,better
understandingofthethreatsandvulnerabilitiesrelatingtocriticalinfrastructureisrequired.
TheCenterforNonproliferationStudies(CNS)presentsthisdocumentasbothacontributiontothe
understandingofsuchthreatsandaninitialeffortatoperationalizingitsfindingsforusebyanalystswho
workonissuesofcriticalinfrastructureprotection.Specifically,thisstudyfocusesonasubsidiaryaspectofCI
threatassessmentthathasthusfarremainedlargelyunaddressedbycontemporaryterrorismresearch:the
motivationsandrelatedfactorsthatdeterminewhetheraterroristorganizationwillattackcriticalinfrastructure.
Inotherwords,thisresearchinvestigates:1)whyterroristschoosetoattackcriticalinfrastructureratherthan
othertargets;2)howgroupsmakesuchdecisions;3)what,ifany,typesofgroupsaremostinclinedtoattack
criticalinfrastructuretargets;and4)whichtypesofcriticalinfrastructureterroristsprefertoattackandwhy.
Inanefforttoaddresstheabovequestionsascomprehensivelyaspossible,theprojectteamemployedfour
discreteinvestigativeapproachesinitsresearchdesign.Theseinclude:
areviewofexistingterrorismandthreatassessmentliteraturetogleanexpertconsensusregardingterrorist
targetselection,aswellastoidentifytheoreticalapproachesthatmightbevaluabletoanalystsand
decisionmakerswhoareseekingtounderstandsuchterroristgroupdecisionmakingprocesses;
*
TheExecutiveSummarywaspreparedbyKevinS.Moran.
1 TheWhiteHouse,TheNationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets,2003,pviii.
UCRL-TR-227068 vii
thepreparationofseveralconcisecasestudiestohelpidentifyinternalgroupfactorsandcontextual
influencesthathaveplayedsignificantrolesinleadingsometerroristgroupstoattackcritical
infrastructure;
thecreationofanewdatabasetheCriticalInfrastructureTerroristIncidentCatalog(CrITC)tocapturea
largesampleofempiricalCIattackdatathatmightbeusedtoilluminatethenatureofsuchattacksto
date;and
thedevelopmentofanewanalyticalframeworktheDeterminantsEffectingCriticalInfrastructureDecisions
(DECIDe)Frameworkdesignedtomakethefactorsanddynamicsidentifiedbythestudymore
usableinanyfutureeffortstoassessterroristintentionstotargetcriticalinfrastructure.
Althougheachisaddressedseparatelyinthefollowingchapters,noneofthefouraspectsofthisstudywere
developedinisolation.Rather,alltheconstituentelementsoftheprojectinformedandwereinformedbythe
others.Forexample,thereviewoftheavailableliteratureonterroristtargetselectionmadepossiblethe
identificationofseveraltargetselectionfactorsthatwerebothimportantinthedevelopmentoftheanalytical
frameworkandsubsequentlyvalidatedbythecasestudies.Similarly,statisticalanalysisoftheCrITICdata
yieldedmeasurableevidencethatsupportedhypothesesderivedfromtheframework,thecasestudies,andthe
writingsofvariousexperts.Besidesprovidinganimportantmechanismofselfreinforcementandvalidation,the
projectsmultifacetednaturemadeitpossibletodiscernaspectsofCIattackmotivationsthatwouldlikelyhave
beenmissedifanysingleapproachhadbeenadopted.
DefiningtheIssue
Giventhelackofaclear,standarddefinitionforcriticalinfrastructureincontemporarypolicydiscussions,this
studyreviewedallmajorexistingU.S.Governmentdefinitionsofthetermandthencraftedthefollowing:
Criticalinfrastructuresarethosephysicalsystemsthatacommunitydependsontomaintainits
security,governance,publichealthandsafety,economyandpublicconfidence.Theconstituentparts
ofsuchsystemswillvaryaccordingtothecommunitycontextinwhichtheyareviewed.
Thisintentionallybroaddefinitionwasselectedtodepictthefullscopeoftheconceptasitisusedbyofficialsat
thelocal,state,andnationallevels.Itreflectsthreeparticularlyimportantaspectsofcriticalinfrastructurethat
havebeensuggestedinalternativedefinitions;namely:
criticalinfrastructureinvolvesavastanddiversesetofassetsthatvaryfromcommunitytocommunitywhile
standardexamplesofsuchsystemsexistagriculture,power,telecommunications,transportation,and
water,forexampleitisdifficulttoclassifyCIintodiscretecategoriesbecause:1)similarsystemscanbe
comprisedofmanydifferentconstituentparts(consider,forexample,thedifferencesbetweenruraland
urbancriticalinfrastructures);and2)newcategoriesofCIcanemergeandexistingcategoriescanshift,
especiallyastechnologiesandsystemrelationshipschange;
notallcriticalinfrastructuresaresimilarlycriticalCIis,byitsnature,relatedtosystemsandservices
thatareessentialtothefunctioningofnormallife.Itisimportanttorecognize,however,thatwhatis
deemedessentialwillvarydependingonthelevelofthecommunityconcerned;consequently,local,
state,andnationalperceptionsofCIwillvary.Wherelocalcommunitiesmightbeconcernedwiththe
functioningofschoolsasapartofitsCI,anationalcommunitywouldlikelybemoreconcernedwiththe
securityofitsdefenseindustrialbase;
UCRL-TR-227068 viii
allaspectsofcriticalinfrastructurecanbebroadlyrecognizedaseitherphysical(meaningtangible)or
cyber(meaningvirtualandinformationoriented)targetsacknowledgingthisdistinctionandthefact
thatboththecharacteristicsandperpetratorsofcyberandphysicalattacksoftendiffermarkedly
fromoneanother,thisstudyfocusesexclusivelyonmattersrelatingtophysicalcriticalinfrastructuretarget
selection.TerroristmotivationsrelatingtocyberCIissuesareequallyimportant,butareoutsidethe
scopeofthisstudyandwarrantaseparateinvestigation.
LiteratureAssessment
Togroundthiseffortfirmlyinthefoundationsofexistingterrorismandthreatassessmentresearch,morethan
150sourcesrelatingtocriticalinfrastructure,terrorism,andriskanalysisincludinggovernmentreports,
conferencepresentations,privateandquasipublicsectoranalyses,andscholarlybooksandarticleswere
surveyedattheoutsetoftheproject.Thereviewconfirmedinitialexpectationsthatlittletonoexistingwork
focusesspecificallyonthereasonswhyterroristschoosetoattackcriticalinfrastructuretargets.Surprisingly,the
reviewalsorevealedapaucityofmaterialregardingthemoregeneralprocessoftargetselectionbyterrorist
groups.Whilethisdiscoveryenabledourresearchtobeconductedwithoutthepreexistingassumptionsthat
sometimesencumberresearch,italsomeantthattheliteraturereviewedwasofmorevalueforframingthan
directlyinformingtheissuesattheheartofourstudy.
Mostsignificantly,theliteraturehelpedidentifykeyfactorsthatarewidelyacceptedbyoutsideexpertsasbeing
influentialinshapingterroristactions.Theseinclude:
factorsrelatedtothenatureofthegroup,specifically:Ideology;OrganizationalStructure;Organizational
Dynamics;OrganizationalLifecyclestatus(aterroristgroupsmaturity);Demographics;Resources;and
OperationalCapabilities;
factorsexternaltothegroup,specifically:HistoricalContext,Events,andPrecedents;Relationswith
ExternalActors(suchassympathizersandsupporters,themassmedia,thegeneralpublic,other
extremistandcriminalgroups,andthestateapparatus);theSecurityEnvironment;andCritical
Infrastructure(target)Characteristics;and
decisionmakingfactors,specifically:GeneralPlanningCharacteristics(suchasdecisionmakertime
horizonsandriskthresholds);PerceptualFilter(howdecisionmakersperceiveinformationexternalto
thegroup);OperationalObjectives(whataterroristgrouphopestoachievefromitsattacks);andAttack
Modalities(themethodsandtechniquesaterroristgroupemploystoattacktargets).
Whilethesefactorsmaynotbetheonlyonesthataffectterroristtargetingdecisions,theyaretheoneswe
deemedsignificantenoughtofocusonandincludeintheprojectsDECIDeFramework.Anumberofthemes
recurthroughouttheliteratureandofferparticularinsightastowhyandhowvariousfactorsmayexertan
impactonterroristmotivationsforattackingCI.Amongthemoreimportantconclusionsdrawnfromthestudys
literatureanalysisarethefollowing.
Ideologyprovidestheessentialrationaleforaterroristgroupstargetingandidentifieswhatits
permissiblerangeoftargetsisby:1)identifyingclearlywhotheenemy(them)is;and2)providinga
clearexplanationofwhyitislegitimateformembersofthegroup(us)toattackthatenemy.
UCRL-TR-227068 ix
OrganizationalStructure,inparticularaspectssuchasgroupsizeandbureaucraticsophistication,are
oftencorrelateddirectlywithanorganizationslevelsofresources,capabilities,andfunctional
specialization.Larger,morehighlydifferentiatedgroupswillbebothmorelikelytoconsiderandmore
capableofeffectivelyconductingelaborateattacks,because:1)theywillgenerallybeabletoconsider
largerpotentialtargetsets;and2)theywilloftenhavethewherewithaltoconductmoresophisticated
andresourceintensiveattacks.
OrganizationalDynamicshavethepotentialtoplayimportantrolesinsettingtargetpriorities.In
particular,groupleadersespeciallyiftheyarecharismatic,authoritarian,ortotalitarianinnature
maydominatetheirorganizationsdecisionmakingprocessesandplaydecisiverolesintargetselection.
Alternatively,groupsthatundergoschismsandfactionalizationmayexperienceabroadeningoftheir
potentialtargetsetsasvariousfactionscompeteforinfluencewithrivalfactionsbyproposing
increasinglyextreme(i.e.,morebrutalanddestructive)attacks.
TheOrganizationalLifecycleStatusofaterroristgroupcansometimesbeusedtogaininsightintoits
generalbehavior.Forexample,successivegenerationsthatarisewithinparticularterroristgroupsare
sometimeslessidealisticandoftendisplayagreatercapacityforviolence,whichmightwellhaveanimpacton
theiroperationalobjectivesandconsequenttargetselection.Othersdemonstrateapropensityto
degenerateintocriminality,whichwouldoftenprecludecertaintypesofdestructiveacts.Stillothers
eschewthemorelimited,organizationbuildingactionsoftheirforbearersandmovetowardthe
planningofmasscasualty,apocalypticstyleattacks.
Resourcesactasnaturallimitationsonthetargetsterroristgroupscansuccessfullyattack.However
ambitioustheirtargetinggoalsmaybe,groupswithfewmeanswillsimplybeunabletoachievemany
oftheirdesiredoutcomesunlesstheycangainaccesstoadequatefinancial,physical,andlogistical
resources.
OperationalCapabilitiesalsoaffectagroupschoiceoftargets,sincefewgroupsarelikelytoselecttargets
thattheyknowinglylacktheabilitytoattacksuccessfully.Intermsofdevelopingnewcapabilities,
terroristshavetendedtorelyontriedandtrueweaponsandtacticsforthesimplereasonthattheyhave
workedwellinthepastandcontinuetoworkwell.Ascountermeasuresbecomemoreelaborateand
sophisticated,however,terroristsareinevitablyforcedtoexpandtheircapabilitiessothattheycan
adoptnewtechniquesand/oremploynew,moredestructiveweapons.Inthatsense,thereisanongoing
cycleofinnovation,asthosewhoseektoprotecttargetsandthosewhoseektoattackthemtryto
outmaneuveroneanother.
PerceptualFiltersthebiasesthroughwhichallreceiveandinterpretinformationareubiquitouswhen
itcomestodecisionmaking.However,inthecaseofterroristgroups,whichareoftenisolated,under
varyinglevelsofstress,andalreadyhaveradicalandviolentoutlooks,thesefeaturesarebelievedtobe
especiallyprominent.Includingtheperceptualfilterinassessmentsofterroristmotivationstoattack
specifictypesoftargetscanhelptoinformanalysisbyhighlightingtheimpactofperceptiononterrorist
decisionmaking,andspecificallyontargetselection.
HistoricalContext,especiallyasframedbyprecedentsandresonantpriorevents,influencesterrorist
behaviorinimportantways.Noterroristgroupemergeswithanentirelyblankslate,sinceitsmembers
haveinvariablyinternalized,adopted,oradaptedandmodifiedmanypreexistingideas.Similarly,no
terroristgroupisentirelyunawareofthemethodsandtacticsemployedbypriororexistingterrorist
organizations,especiallythosethathaveoperatedwithinitsownpolitical,intellectual,ethnic,religious,
orculturalmilieu.
UCRL-TR-227068 x
ExternalRelationsnecessarilyaffectaterroristgroupsselectionoftargets,andfrequentlyalsothelevelof
violenceitdecidestoemploy.Toensurethattheiractsof violencedonotbecomemeaninglessor
counterproductive,terroristswishingtoachievespecificeffectswiththeirattacksmustcarefullytake
intoaccounttheopinionsofexternalactorswhenselectingtargets.Specifically,theymusttakeinto
accountthereactionsoftheirsupportersandsympathizers,theirpotentialconstituents,otherextremist
groupsintheirarea,sponsoringstates(iftheyhavethem),andaboveallthetargetenemyaudience.
AlthoughthegeneralSecurityEnvironmentmightbeexpectedtoaffectterroristoperations,including
targetselection,dedicatedterroristsarerarelyifeverlikelytoceaseplanningandlaunchingattacks,no
matterhowtoughtheoverallsecurityenvironmentbecomes.
CI[Target]Characteristicsareamongthemostimportantfactorsinaterroristgroupsdecisiontoattack
ornotattackspecifictargets.Themostimportantcharacteristicsofaninfrastructuretargetthattendto
affectterroristtargetingareits:1)levelofprotection;2)whetherornotithasahighprofile(whichisin
partafunctionofhowmuchattentionthemediahaspaidtoit);and3)itsactualfunction.Allthings
beingequal,terroristsaremorelikelytoselecttargetsthatarevulnerable.Atthesametime,theywishto
attackfunctionallyimportant,highprofiletargets,thedamageordestructionofwhichwillbecostlyto
society.Thekeydecisionmakingfactorisusuallytherelationshipbetweenafacilitysvulnerabilityand
itsdesirabilityasatarget.Giventhelargenumberandwiderangeofpotentialtargets,terroristswill
tendtoavoidheavilyfortifiedorheavilyprotectedtargets,unlessthesehaveextraordinarysignificance,
andinsteadattackmorevulnerabletargets.
GeneralPlanningCharacteristicssuchastimehorizonsandriskthresholdscanprovideimportantinsight
intoaterroristgroupsabilityorwillingnesstoattackcertaintargets.Forexample,specificideologicalor
operationalobjectivescanhaveanobviousanddirecteffectonthedecisionmakerstimehorizon,in
thatcertainoftheseobjectivesmaybetimedependent.Thedegreeofriskthatagroupiswillingtotake
inordertoconductanysingleattackisalsoanimportantfactorinthesettingofoperationalobjectives.
Allelsebeingequal,thegreatertherisktoleranceofagroupwhenplanninganattack,thegreaterthe
intendedscaleoftheattackislikelytobe.
OperationalObjectivesincludingdesiredcasualtylevels,levelofpublicitysought,whetherthetarget
shouldbesymbolicorinstrumental,thetypeandextentofthereactionterroristswanttoelicitfrom
variousaudiences,expectedsecondaryeffects,andhopedforscaleofeffectsplayanunambiguous
roleintargetingdecisions.Typicallyagroupsoperationalobjectivesareshapedinlargepartbyits
ideology.Otherdynamicsthatsometimesplayaroleinshapingoperationalobjectivesincludetheneed
toproduceattackresultsthatboostgroupmorale,servetodifferentiatethegroupfromotherterrorist
groups,ordemonstrateleadershipwillandcommitment(thismaybeespeciallyneededifagroupis
facedwithfactionalization).
AttackModalitiesaredeterminedgenerallybythenatureofthetargetitself,althoughtherangeofthose
modalitiesislimitedtosomeextentbytheexistingcapabilitiesandmethodsofthegroup.Insome
situations,however,agroupmayselectaspecifictargetbecauseitisparticularlywellsuitedtoanattack
inwhichcertainpredeterminedweaponsortacticscanbeused.Thismightbeespeciallytrueofattacks
thatinvolvechemicalorbiologicalagents,whichcanbedeployedeffectivelyonlyincertain
environments.
UCRL-TR-227068 xi
CaseStudies
ToshedfurtherlightonwhycertaintypesofterroristgroupsmightbemoreinclinedtotargetCIthanothers,
thisstudypreparedanumberofanalysesofspecificgroupsthathaveconductedmajorattacksagainst
infrastructuraltargets.ThegroupsexaminedintheseanalysestheJaisheMohammed(JEM:Armyof
Mohammad)andLashkareTayyiba(LET:ArmyoftheRighteous),theFrontdeLiberationNationaledela
Corse(FLNC),Chukakuha,andtheMoroIslamicLiberationFront(MILF)arefarfromrepresentativeofthe
fulluniverseofterroristgroups.Theydo,however,provideimportantinsightinsightthatisoftenimpossible
toobtainbymeansofquantitativeresearchmethodsintothemotivationsshapingthetargetselectionofan
ideologicallyandgeographicallydiversesetofterroristgroups.Broadlyspeaking,theconclusionsdrawnfrom
anexaminationofthesereallifecasescomplementandareconsistentwiththefindingsfromthestudys
literatureassessmentandCrITIC.Severalfactors,inparticular,shouldbehighlightedashavingplayed
particularlyimportantrolesininfluencingCItargetselectioninthecasesconsidered.Theseinclude(in
alphabeticalorder):CICharacteristics;ExternalRelations;Factionalization;HistoricalEvents;Ideology;
Innovation;KnowledgeofCI;OperationalObjectives;OrganizationalStructure;andSecurityEnvironment.A
briefcommentregardingeachofthesefactorsclarifieshowthesecasestudieshelpedfurtherrefinethisstudys
understandingofterroristmotivationsrelatingtoCIattacks.
CICharacteristics,inparticularthesymbolicnatureandfunctionalimportanceofsuchtargets,appearto
figureprominentlyintargetselectionasdemonstratedinthecasestudyregardingtheJEM/LETattack
ontheIndianParliamentin2001.Thissamecase,however,alsohighlightstheimportantlongterm
methodologicalchallengeofcategorizingterroristattacksascriticalinfrastructureattacks.Terrorists
generallyhavemultiplemotivesforattackingtargets.InthecaseofCIattacks,interferingwiththe
operationsofavitalinfrastructuremaybeofsecondaryimportancecomparedtoothermotivessuchas
traumatizingapopulationpsychologicallyorkillinglargenumbersofpeople.
Inthecasesconsidered,ExternalRelationsclearlyplayanimportantroleintheprocessoftargetselection.
ChukakuhasavowedsupportforJapanesefarmersandunionmembersandthegroupsdecisionto
championcertainissuesrelatingtotheseconstituenciesaffecteditstargetselectionmoresignificantly
thananyothersinglefactor.Similarly,thetargetsselectedbytheFLNCandMILFreflect,respectively,
theircommitmenttotheadvancementoftherightsofindigenousCorsicansandMoros.Whileexternal
relationsappeartoimpacttargetselectiondirectly,itisimpossibletogeneralizehowsuchrelationships
willimpactcriticalinfrastructuretargetingwithoutundertakingacarefulanalysisofthespecificgroups,
constituencies,andissuesinvolvedineachparticularcase.
Althoughfarfromconclusive,severalofthecasestudiessuggestthatFactionalizationmayimpacttarget
selection.Inparticular,autonomous,localizedcellstructuresandcompetitiveintercelldynamics,such
asthosefoundintheFLNC,mightmakegroupsmorewillingtopursueattacksthatinvolvegreater
violenceorhavemoresevereconsequences.Similarly,intensecompetitionbetweenrivalgroupssharing
similarbutdistinctideologies,asinthecaseofChukakuha,mightencouragegroupstoengagein
particularlyspectacularattacksdesignedtogeneratehighlevelsofpublicityandprestige.Whilesome
CItargetsmaybeparticularlywellsuitedtoachievesuchendsespeciallybecauseoftheircritical
naturetherearecertainlyothertypesofattacksthatmightlikewisebeconductedtoachievesuchaims.
HistoricalEvents,especiallymethodologicalprecedents,arelikelytobekeyfactorsintargetselection.
TheMILFstacticofattackingpowergrids,forexample,wasnotnovel.Atleastthreeothergroupsthat
theMILFwasclearlyawareoftheCommunistNewPeoplesArmy(NPA),theMNLF,andtheAbu
UCRL-TR-227068 xii
SayyafGrouphadconductedsimilarattacks.ItislikelythattheMILFeffortswereatleastinpart
informedbysuchprecedents.
Ideologyappearstobeoneofthesinglemostsignificantfactorsininfluencingaterroristgroupstarget
selection.InthecaseoftheFLNC,forexample,theorganizationsideologycreatedtheparametersforits
OperationalObjectivesandhelpeddeterminethecategoriesoftargetsthatitattacked.Generallyspeaking,
theFLNChassoughttominimizecasualtiesandfocusitseffortsoninfrastructuretypetargets.Asa
directconsequence,althoughithasconductedhundredsofattacks,thegroupappearstohave
intentionallykilledfewerthanfiftypeoplebetween1975and1995.Inasimilarfashion,Chukakuhas
Trotskyistideologyappearstohaveinfluenceditstargetselectionbyemphasizingviolentformsof
protestagainsttargetsthatsymbolicallyrepresentthesystemsagainstwhichthegroupisfighting,or
whicharedirectlyrelatedtoitsstruggletochampionworkersrights.MILFsideologyalsoappearsto
haverestricteditstargetselectiontononMuslimsanditslessreligiousMuslimrivals.
AgroupsPropensitytoInnovateappearstobeanimportantfactorrelatedtoitsabilitytoconsidernew
andunprecedentedtargetsandtoidentifyeffectiveandnoveltypesofattacksthatmayhaveagreater
likelihoodofsuccess.ChukakuhasinitialattackontheJapaneseNationalRailwaysystem,forexample,
wasunprecedentedinscopeandimplementation,whichmayhavebeenoneofthereasonsforits
success.(Thismaybeespeciallytrue,consideringthatthegroupssuccessiveattacksonthesystemwere
lesseffective,becauseJapaneseofficialswerebetterpreparedtodealwithsuchcontingencies.)Similarly,
JEMwasthefirstgrouptointroducefidayeenstyleattacksinJammuandKashmir.Thegrouphad
carriedoutasuccessfulattackagainsttheKashmirStateAssemblyin2001,andattemptedtoreplicate
thesametacticwithlesseffectivenessintheIndianParliamentattack.
Inseveralofthecasestudies,groupKnowledgeofCIplayedaparticularlyimportantroleintarget
selectionandattackimplementation.InthecaseoftheJNRattack,itisclearthatChukakuhasdetailed
knowledgeoftherailsystemallowedittodamageitstargetwithmaximumeffectiveness.Indeed,it
mightbeassumedthatthegroupspriorknowledgeofCIwasthecriticalfactorthatenableditto
conceptualizetheattack.WhiletheFLNCandMILFattacksweresimplerinnature,theirknowledgeof
theirtargetsandtheenvironmentsinwhichthetargetswerelocatedclearlyinfluencedhowtheywent
aboutmakingtheirattacksandmaximizingtheirimpact.
OperationalObjectivesunquestionablyplayasignificantroleintargetselection.TheFLNCis,perhaps,
themostobviousexampleofthewayinwhichoperationalobjectiveslargelyrestrictedthegroupssetof
preferredtargetstothoseinvolvingphysicalassetssuchasCI.SincetheFLNCsprimaryobjectivewas
topreservetheiruniquecultureandestablisheffectivepoliticalandeconomiccontrolovertheir
homeland,theyfocusedmostoftheirattacksontargetsthatwereseenasperpetuatingthesecondclass
statusofthenativeCorsicans.ChukakuhasattacksonJNRfacilitieswerealsolikelydesignedtofulfill
itsoperationalobjectivesofraisingpublicawarenessoftheJapanesegovernmentseffortstoprivatize
therailsystem.Indeed,Chukakuhashighlysuccessful1985attackdirectlyaffectedapproximately
elevenmillionpeopleandmadethempainfullyawareofthegroupsissues.
OrganizationalStructureappearstoaffectaterroristgroupscapabilitytoattackvariouscritical
infrastructuretargets,butitisunclearthatitincreasesagroupspropensitytospecificallyattackCI.
Chukakuhaslargesizeandcellbasedstructure,forexample,provideditwiththemanpower,
operationalcapabilitiesandoperationalsecuritynecessarytoconducthighlyeffectiveguerrillaactsthat
wereespeciallysuccessfulagainstwidelydispersedCItargetssuchastheJapaneserailsystem.
UCRL-TR-227068 xiii
TheMILFsattacksagainstelectricalinfrastructureinthesouthernPhilippinesunderscoretheinfluence
thatthegeneralSecurityEnvironmentcanhaveonmotivatingterroristgroupstoundertakeattacks
againstCI.TheseMILFattackswereaclearresponsetothePhilippineArmysPikitOffensive,which
wasdesignedtooverrunanddestroytheMILFsCampBuliok.TheattacksagainstMindanaospower
gridwerewidelyconsideredtobecounterstrikesinresponsetothismilitaryoffensive.CertainFLNC
attacksagainstCItargetsalsoappeartohavebeentimedtorespondtopoliceeffortsagainstthegroup.
CrITIC
Cognizantofthelackofexistingopensourceempiricaldataconcerningcriticalinfrastructureattacksavailable
forquantitativeanalysis,CNScreatedCrITIC,theCriticalInfrastructureTerroristIncidentCatalog.Thisunique
databaseispopulatedby1,874incidents,allofwhichinvolvecriticalinfrastructureattacks.(Ofthese,188have
beenidentifiedasmajorCIattacksand765asminorCIattacks.)CrITICslargedataset,expansivetimeframe
theincidentsrangechronologicallyfromNovember1933toMarch2004andcarefullydesignedinformation
fieldsmakethedatabasetheonlytoolofitskindforconductingreliablelargeNanalysesofCIattacks.While
CrITICremainsaworkinprogressthatwillbenefitsignificantlyfromadditionalrefinement,furtherincident
identification,andtheclarificationofcaseslackingsufficientinformation,thedatabaseisalreadyvaluablefor
enhancingunderstandingofthehistorictrendsofcriticalinfrastructureattacksconductedbyterrorists.Several
majortrends,inparticular,shouldbehighlighted:
CIattackshaveincreasedsignificantlysincethe1960s.ThenumberofCIattacksthatcouldbeattributed
tospecificperpetratorsincreasedfromonly42inthedecadeofthe1960sto116inthe1970sto471inthe
1980s.Itdecreasedto308inthe1990sandnowstandsat131forthefirstthreeandonehalfyearsofthe
newmillennium.Inshort,therehasbeen,roughly,atenfoldincreaseinthetotalnumberofCIattacks
fromthedecadeofthe1960stothatofthe1990s.Whilethesenumbersmayindicatethatterroristsare
developingagrowinginterestinattackingCI,furtheranalysiscomparingtheincreasesinCIattacksto
theoverallincreasesinallterroristactivityduringthelastseveraldecadesisrequiredbeforemore
definitiveconclusionscanbedrawn.
EnergyandGovernmentrelatedfacilitieshavebeenthemostcommonlyattackedCItargets.Oftheattributable
majorCIattacksbetween1933and2003,oil,gas,powerandgovernmentfacilitiesweretargetedmost
frequently.IfoneconsidersminorattacksagainstCI,attacksagainstembassiesandconsulates
accountedfornearly50%oftheattacks.
Todate,amajorityofallCIattacksinvolvebombings.Upuntilnow,bombings(ofalltypes)appeartobethe
mostfavoredmethodofattackingCI.Ofthe188majorattacksconductedbyknownperpetrators,112
involvedvarioustypesofbombs.WhenbothmajorandminorCIattacksareconsidered,morethan60%
oftheincidentsinvolvedbombs.Followingbombings,sabotageisthemostcommontacticusedinmajor
CIattacks.Whenminorattacksareincluded,projectilessuchasmortarsandrocketpropelledgrenades
constitutethesecondmostfrequentmethodofattack.
TerroristgroupsofareligiousnatureareperpetratingagrowingnumberofCIattacks.Noticeableshiftsin
theproportionofCIattacksconductedbydifferenttypesofterroristgroupsareapparentoverthelast
severaldecades.Duringthe1960s,mostCIattackswerecarriedoutbyEthnoNationalistgroupsandby
SecularUtopiangroups.ReligiousgroupswereresponsibleforonlyasingleCIattackduringthisperiod.
Inthe1970s,thepatternshiftedslightly.SecularUtopiangroupswereresponsiblefor40CIattacks,
EthnoNationalistgroupsfor12,andReligiousgroupsforonlyone.Whilethissamepatternheld
generallyduringthe1980sand1990sSecularUtopiangroupswereresponsiblefor161and62CI
UCRL-TR-227068 xiv
attacks,respectively,andEthnoNationalistgroupsfor80and46Religiousgroupssignificantly
increasedtheirCIattacks,conducting32(7%)identifiableattacksinthe1980sand51(10%)inthe1990s.
Duringthefirstthreeyearsofthenewmillennium,CIattacksattributabletoReligiousgroupstotal26
(20%)CIattacks,ascomparedto30(23%)bySecularUtopiangroupsand11(8%)byEthnoNationalist
groups.Inotherwords,Religiousgroupsarenowamongthemostprolificofallterroristgrouptypesin
carryingoutCIattacks.
LeftWingandIslamistgroupsattackCImorefrequentlythanothertypesofgroups.LeftWinggroups(above
allMarxistLeninistgroups)carriedouttheoverwhelmingmajorityofattacksattributabletogroupsthat
fallwithintheSecularUtopiancategory,asopposedtoAnarchist,NeoFascist,orEcologicalgroups.
Similarly,IslamistgroupswereresponsibleforcarryingoutthemajorityofCIattacksthathavebeen
perpetratedbyReligiousgroupsinthepasttwodecades.Between1980and2004Religiousgroupswere
responsiblefor89incidents,ofwhichIslamistgroupswereresponsiblefor84or94%.
SecularUtopianandReligiousgroupsareresponsibleforamajorityofrecentCIattackfatalities.SecularUtopian
andReligiousgroupsarethemostdeadlygroups,withthelatterbeingresponsiblefor80%ofthe
casualtiesfromattributablemajorattacksand35%ofthefatalitiesinthesamecategory.Thisseemsto
reflectgeneralterrorismattacktrendsinvolvingReligiousterroristgroups.Thesestatisticssuggestthat
ReligiousgroupsmaybemorelikelythanothergroupstomixCIattackswithmasscasualtyattacks.In
contrast,ofthesevenmosthistoricallyactiveterroristgroupsintermsofCIattackstheIRA,theETA,
FARC,ShiningPath,theASALA,theFLNC,andtheRAFnoneisidentifiedinthedatabaseashaving
killedmorethanfourpeopleinasingleCIattack.
DECIDeFramework
Thisstudywasundertakentodevelopagreaterunderstandingofthefactorsanddynamicsthatinduce
terroriststoattackcriticalinfrastructure.Perhapsmoreimportantly,itwasdesignedtooperationalizethe
resultingresearchinaformthatmightenableanalystsandpolicymakerstobettermitigatefuturethreatstoCI.
ItwaswiththisultimateobjectiveinmindthattheDeterminantsEffectingCriticalInfrastructureDecisions
(DECIDe)Frameworkwasdevelopedasatooltoevaluatethelikelihoodthatcertainterroristgroupsmight
attackvarioustypesofcriticalinfrastructure.(SeeChapter5forafullexplanationoftheframeworkandthe
processbywhichitcanbeused.)
TheDECIDeFrameworkisbasedonacontributingfactorsapproachthat:1)laysoutthekeyelements(factors)
thatshapeaterroristgroupstargetingdecision;2)indicatesthemajorrelationshipsandinterplaybetweenthese
factors;and3)makescleartheirdirectinfluencesontargetselection.(SeeFigureES1.)Thefactorsandsub
factorsusedintheframework,aswellastherelationshipsbetweenthem,arebasedupontheconclusionsand
hypothesesdrawnfromtheliteratureassessment,casestudiesanddataanalysisdiscussedpreviously.
Asshouldbeclearfromthefactordiagram,theDECIDeFrameworkisdynamicinmanyrespects,especially
sinceinfluencesondecisionscancirculatethroughseveralfactorsandthenbackagainintheprocessof
contributingtodecisionmaking.Atthisstageoftheframeworksdevelopment,however,theactualdecisionis
regardedassingleeventfocusedandmonadic.Thismeansthattheframeworkrepresentsaoneshotprocess
thegroupisconsideringasingleattack,asopposedtoalongtermcampaign.Therefore,althoughthedecision
makermaytakeintoaccountthereactionsofexternalactors(suchastheresponseofthepublicortheterrorists
constituency),theseactorsarenotregardedatthisstageasdecisionmakingentitiesintheirownright,andtheir
decisionmakingprocessesarenotcapturedintheframework.Nonetheless,theframeworkpresentedherecan
stillserveasapowerfultool(andanimprovementoverexistingmethods)bycapturingthemostimportant
dynamicsoftargetselection,especiallywhenconsideringterroristgroupswithshortplanninghorizonsorad
UCRL-TR-227068 xv
hocgroupsthatcoalesceforthepurposesofconductingasingleattack,suchasthegroupresponsibleforthe
firstWorldTradeCenterbombingin1993.
UCRL-TR-227068
xvi
WhiletheDECIDeFrameworkconstitutesanimportantfirststeptowarddevelopingananalyticaltoolthatcan
bereliablyusedtohelpdiscernterroristmotivationsforattackingCI,muchworkremainstobedonebeforeitis
readyforfielddeployment.Atthisstage,theframeworkremainsbothoverlycomplexandtoocumbersometo
beusedeasily.Whileitspresentiterationmaybesufficientforatheoreticalinvestigationsuchasthis,inwhich
allbackgroundinformationisvital,themodelisnotyetuserfriendly.Additionally,althoughthehypothetical
factorrelationshipsincludedintheframeworkareheldwithahighdegreeofconfidencebytheprojectteam,
theydeserveadditionalinvestigationandvalidationtoensurethattheframeworkisasreliableaspossible.
Finally,theframeworkitselfrequirestesting,validation,anditerativeimprovementideallyinaprocessthat
involvesbothusersanddevelopers.
IntegratingtheResearchStreams
Basedonthemotivationalfactorsidentifiedinthecasestudiesandliteratureassessment,thetrendssuggested
byCrITICdata,andpreliminaryanalysisbasedontheDECIDeFrameworkitmightbeexpectedthatthegroups
thatarecurrentlymostlikelytocarryoutattacksonU.S.infrastructurefallintothreemaincategories:1)Islamist
terroristgroupsespeciallythosewithaglobalagenda;2)domesticrightwingmilitiasinparticularthose
thatbitterlyopposeboththeNewWorldOrderandtheZionistOccupationGovernment,whichthey
believehasusurpedpowerintheU.S.;and3)violentfringesoftheradicalecologymovementespeciallythose
withanuncompromisingantitechnologyorneoLudditeagenda(e.g.,philosophicalprimitivistsandthemost
extremeproponentsofthemystical,technophobic,andantirationalistdeepecologycurrent).Finally,certain
violencepronegroupsthathaveattachedthemselvestotheworldwideandextraordinarilydiverseanti
globalizationmovement,inparticularsmallbutviolentanarchistandneofascistfactions,mayeventually
constituteaninfrastructuralthreat.Thereareanumberofindicationsthatthesearethemilieusfromwhichthe
greatestdangerstems.
NextSteps
Foranareaofterrorismstudyasvitalastargetselection,itissurprisingthatsolittlequalitativeorquantitative
researchhasbeenfocusedspecificallyonhowterroristsmaketargetingdecisions.Thisstudyattemptstofillthis
inexplicableresearchgap,primarilybydemonstratingthetypeofresultsthatcanbeachievedthroughthe
simultaneousutilizationofanumberofparallelapproachesintheexaminationofterroristmotivationsfor
attackingCI.Despitethestudyssignificantfindings,theprojectteamhasidentifiedanumberofareasthat
couldbenefitfromfurtherinvestigationanddevelopment.Suchadditionaleffortswouldservetobroadenand
deepenourunderstandingofterroristmotivationsforattackingCI,aswellasrefinethestudyinwaysthat
wouldmakeitbothmoreaccessibleandusefultothepolicy,security,andresearchcommunities.Threeaspects
oftheproject,inparticular,shouldbehighlightedasareasthatofferopportunitiesforvaluablefuture
development:
CaseStudies.Ashasbeendemonstratedbythecasesincludedinthisreport,qualitativecasestudiesare
uniquelywellsuitedtoenhancingourunderstandingofthesignificantbutfrequentlydifficultto
observeandquantifyfactorsanddynamicsthatinfluenceterroristdecisionmaking.Additional
examinationofprimaryandsecondarysourcessuchasideologicaltreatises,brochures,and
communiqusthathavebeenpublishedanddisseminatedbyparticularterroristgroups;internal
documentsproducedbythosegroups,suchasbulletins,instructions,orthesummariesofstrategy
sessionsthathavebeenrecoveredasaresultoflawenforcementorotherresearchactivities;intelligence
documentsandjudicialmaterialsconcerningtheactivitiesofthesegroups;andinterviewswithformer
membersofthegroupswouldprovidefargreaterinsightintothedecisionmakingprocessesof
terroristgroups,includinginthecontextofCItargeting.
UCRL-TR-227068 xviii
Database.CNSCrITICdatabaseislikelythemostrobustandpossiblyonlydatabaseexclusively
designedtocollectinformationaboutterroristattacksoncriticalinfrastructure.Althoughreasonably
comprehensive,CrITICisstillinitsearlystagesofdevelopmentandcanbefurtherimprovedtoprovide
moreaccurateandinformativedataandanalysis.Fourneartermtaskswouldbeparticularlyvaluable:1)
confirmthevalidityofCrITICbyinvestigatingallidentifiedincidentsfurther;2)conductadditional
researchintoincidentslackingsufficientinformationtoresolveambiguitiesandenhanceCrITICs
dataset;3)useadvancedstatisticaltechniquesincludinglogitandprobitmodelstoassessthe
interplayandrelativesignificanceofeachvariablewithgreateraccuracy;and4)updateCrITICwith
newCIterrorismincidentsonanongoingbasis.
Framework.Asnotedpreviously,theDECIDeFrameworkisnotuserfriendlyinitscurrentform.We
feelthatanurgentnextstepistoconvertthecurrentframeworkintoamorestreamlinedproduct,
preferablyonethatispresentedinaninteractivecomputerbasedformat.Giventhatthetheoretical
underpinningsoftheframeworkhavealreadybeenestablished,itstransitionfrompapertoPCshould
beafairlystraightforwardexercise.Itisalsonotablethattheframeworkstillcontainsanumberof
hypothesesthatrequirefurthervalidation.Additionally,sincetheexistingframeworkisasingleshot
modelthatonlyfocusesonterroristmotivationsfordiscreteattacks,animportantprospectforfurther
researchistoextendthemodelsothatitcanbeusedtoevaluatelongertermterroristcampaigns.
Thisstudyisanimportantfirststepindemonstratingthatthereareusefulwaystogoaboutassessingthe
significantmotivationalelementoftheterroristthreat.Weareconfidentthatespeciallyastheprocessis
improvedandrefinedcontinueduseofthisintegratedmultiprongedresearchapproachwillyieldfurther
significantresultsinthefieldofterroristbehavioranalysisthathavelongbeenunobtainablethroughstrictly
qualitativeandquantitativeefforts.
UCRL-TR-227068 1
Chapter1:INTRODUCTION*
Itisnogreatsurprisethatconcernaboutthesecurityofournationscriticalinfrastructureagainstterrorist
attacksisgrowing.Ontheonehand,globalizationandtheoftendizzyingpaceoftechnologicaladvancement
haveresultedinasocietythatisincreasinglyconnected,interdependentandthereforemorevulnerableto
intentionaldisruptionthaneverbefore.2Atthesametime,terroristsaredisplayingboththedesireandthe
capabilitytocausegreaterdeathanddestructionthantheyhaveinthepast.Sinceoneofthemosteffectiveways
forterrorists,asasymmetriccombatants,toachievethelevelsofpublicityandintimidationtheyseekisto
disruptthenormalrhythmofsociety,theassetsuponwhosecontinuedfunctioningthisrhythmdependshave
naturallybecomeattractivetargetsforattack.Evenasthisresearcheffortneareditscompletion,newrevelations
aboutalQa`idaseffortstoprepareforpossibleattacksonmajorfinancialfacilitiesinNewYork,NewJersey,
andtheDistrictofColumbiaremindusjusthowrealandimmediatesuchthreatsmaybe.
Yetmerelyknowingthatthenationscriticalinfrastructurepresentsourterroristenemieswithaplethoraof
targetsdoeslittletoassuageourconcern.Inordertopreventandpreemptsuchattacks,werequireafull
understandingofthethreats,vulnerabilitiesandopportunitiesforrecoverythatpertaintocriticalinfrastructure.
CNSpresentsthisstudyasapreliminarycontributiontoanunderstandingofthethreat,atthesametime
offeringananalyticalframeworkthatcanquicklybeadaptedforusebyanalystsworkingontheproblemof
criticalinfrastructureprotection.
Thecurrentstudyshouldbeviewedinthecontextofathreatassessment,andassuchsomebriefwordsabout
thegeneralnatureofthreatassessmentmayhelptosituatethestudywithinthebroadercategoryofevaluating
threatandrisk.Thetermriskassessmentencompassestwomainissues,chanceandconsequence.Chance
referstothelikelihoodthatanundesirableincidentwilltakeplace.Consequencereferstotheresultsofsuchan
event.3Thetermthreatassessment4fallswithintheformercategory,whileconsequencemanagementispartof
thelatter.
Threatassessment,thefirststepinanyriskassessmentprogramincludingonerelatedtocriticalinfrastructure
(CI)concernsthreeinterrelatedfacets:identifyingtheassetorclassofassetsonwhichtoperformthe
assessmentanddeterminingtheassetsvalue;thatassetsvulnerabilitytoattack;andthelikelihoodthatitwill
beattacked.InthecaseofCI,suchasanoilrefinery,itsvalueisnotnecessarilyonlyitsobjectivemeasurable
worth.Rather,itistheassetstotalvaluetothoseinterestedinprotectingtheassetfromharm,includingthe
politicalandsocialcostsassociatedwithdisruption,whichareoftenintangiblemeasures.
*
TheintroductiontothischapterwaswrittenbyGaryAckerman.TtheCIDefinitionssectionwaswrittenbyKevinS.Moran.
2ManyexamplesofinfrastructureinmodernAmericansociety,suchastheInternetandtheairtrafficsystemarestructured
asscalefreenetworks,atopologythat,whileresistanttorandomfailures,isespeciallyvulnerabletointentionalattacks.For
moreonthevulnerabilityofdifferenttypesofnetworks,seeAlbertLszlBarabsi,Linked:TheNewScienceofNetworks
(Cambridge:PerseusPublishing,2002).
3Theotherelementofriskassessment,consequencemanagement,isnotafocusofthecurrentstudy.
4Anyseriousanalysisoftermslikeriskassessmentorthreatassessmentcaneasilybecomeboggeddowninamorassof
definitionsthatvariousgovernmentalandnongovernmentalentitiesemployforthem.Inshort,thereisnocommonly
accepteddefinitionforahostoftermsassociatedwithriskassessment.Forexample,oneCongressionalstudyhasdefined
threatassessmentalmostexclusivelyintermsofthecapabilitiesofnonstateactorstoattackcertainhighvaluetargets(Rob
Buschmann,RiskAssessmentinthePresidentsNationalStrategyforHomelandSecurity,CongressionalResearchService,
October31,2002,pp.12).Incontrast,otherthreatassessmentdefinitionshavefocusedmoreonhowafacilitysattributes
mightincreaseatargetsattractivenessintheeyesofanaggressor(NancyARenfroeandJosephL.Smith.Threat/Vulnerability
AssessmentsandRiskAnalysis.WholeBuildingDesignGuide.Accessedon03/11/2004athttp://www/wbdg/org/design/res
print.php?rp=27).Thecurrentstudythereforedefinestheseasitusesthem.
UCRL-TR-227068 2
Incontrast,vulnerabilityanalysisthesecondbroadelementofthreatassessmenttendstobedeterminedby
moreobjectivefactors,suchastheeasewithwhichthetargetsperimetercanbebreached.Relatedtoboththe
valueoftheassetanditsvulnerabilityisthethirdbroadcomponentofthreatassessment:likelihoodofattack.
Thiscomponententailsananalysisofwhopotentialattackersmightbe,howlikelytheyaretoattacktheasset,
thedeterminantsoftheirmotivationtoattack,andhowcapabletheyareofsucceedinginanattack.
Unfortunately,thesefactorsaretoalargeextentdependentonthefirsttwocomponents,ormoreaccurately,on
theattackersperceptionoftheassetsvalueandvulnerabilityandtheircapabilitytoexploitthese.Toattackers,
thecalculususedtodeterminevalueisoftenasubjectiveequationthatincludesthetargetssymbolicvalueand
thepsychologicalimpactanattackuponitwouldhaveonaprospectivetargetaudience,whereasvulnerability
becomesafunctionofhowtheattackerperceivesthetargetsdefenses.Figure1.1illustratesthisstructure,with
dottedlinesrepresentingtheattackersperception.
THREAT
ASSESSMENT
Intention of Capability
Attacker of Attacker
Thisaspectofthreatassessmentisthereforebestundertakenaftertheobjectivevalueandvulnerabilityofthe
assethavebeenestablished,andinasenseisanamalgamofthesubjectiveandobjectiveelementsofthetwo.It
shouldbenotedthatmostopensourcethreatanalysesdealwithvalueonlyimplicitlyorgenericallyandinstead
emphasizetheroleofvulnerability.Inthoseinstanceswherethelikelihoodofattackisevenconsidered,itis
mostlyintermsoftheattackerscapabilitiestoattack,whereastheelementofintentisoftenignored.Itwouldbe
hardtooveremphasizetheimportanceofincludingthemotivationsofpotentialattackersinthecalculusofrisk
analysis.Unfortunately,thevastmajorityofriskanalysisstudiesomitthiscriticalcomponent.5Thereasonsfor
this,nodoubt,includethefactthatthemotivationalaspectsofthreatassessmentareexogenousandhighly
subjectivefactorswhichoftenfallintotherealmofsoftanalysis.
5Forexamplesofthisexclusion,seeU.S.GeneralAccountingOffice,CombatingTerrorism:ThreatAndRiskAssessments
CanHelpPrioritizeandTargetProgramInvestments;GAO/NSIAD9874;Martz,HarryF.andMarkE.Johnson.Risk
AnalysisofTerroristAttacks,RiskAnalysis.Vol.7No.1(1987);Renfroe,NancyA,andJosephL.Smith.Threat/Vulnerability
AssessmentsandRiskAnalysis.WholeBuildingDesignGuide.Accessedon03/11/2004athttp://www/wbdg/org/design/res
print.php?rp=27;andOfficeforDomesticPreparedness(OPD),VulnerabilityAssessmentMethodologiesReport,U.S.
DepartmentofHomelandSecurity,PhaseIFinalReport,July2003.
UCRL-TR-227068 3
Neglectingthemotivationalaspectsofthreatassessmentcanresultinsuboptimaloutcomes,especiallyinthe
formofaninordinatefocusonworstcaseterrorismscenarios.Systematized,analyticallysoundthreat
assessmentscantemperthesedistortionsandgivebothpolicymakersandthegeneralpublicasounderbasis
fromwhichtoaddresstheissue,aswellasallowingformoreeffectiveandwiserallocationsoflimited
governmentalresources.
Admittedly,assessingwhatdrivesaparticulargrouptoselectaCItargetoveranyofthemyriadofalternatives
isnoeasytask,somuchsothatsomecommentatorsalmostdespairaboutthepossibilitiesofdevelopinguseful
analysesinthisarea.AsRobertJervisoncestated,Judgingothersintentionsisnotoriouslydifficult.Any
numberofmethodsofinferencecanbeused,allofthemfallible.6Wemustnot,however,allowthebesttobe
theenemyofthegoodanytoolthatcanassistusindeterminingwhichgroupsposethegreatestthreatto
criticalinfrastructureandwhythisisso,isvaluableifitpushestheenvelopeofexistingunderstanding.
A.MethodologicalOverview
TheCNSprojectteamembarkedonthecurrentstudywithalacrity,onlytofindthisparticularareaofanalysis
largelydevoidofexistingcontent,atleastintermsoftheopensources.Whattoolsdidexisteitherdidnot
addressintentdirectly,orproposedavarietyofthreatassessmentmodelsthatwerefelttolackempiricaland
theoreticaljustification.Infact,theresearchteamidentifiedonlyasinglecomprehensiveanalyticalsource
discussingtargetselection,thatofDrake,7andalthoughthisworkprovedtobeusefulasafoundationforthis
study,itdidnotaddresstheissueofcriticalinfrastructuretargets.Inmanyrespects,then,thecurrentstudy
couldbesaidtohavebegunfresh,whichoffersthedoubleedgedswordofbeingunencumberedbyprevious
patternsofthinkingbuthavingverylittleguidancetofollow.
Intheend,threegoalsappearedtotheprojectteamtobeparamount:
1) Toaccumulateasmuchdataoncriticalinfrastructureattacksaspossiblewithintheprojecttimeframe;
2) Toleveragethisdataintoanalyticalinsightsandformalknowledge;andfinally
3) Toconvertthisknowledgeintoaformthatwouldbeusableinapracticalcontext.8
Theprojectteamdevelopedfourkeyresearchquestionsthatguidedallsubsequentresearchefforts:
1) Whywouldterrorists9attackCriticalInfrastructureratherthanothertargets?
2) WhichtypesofCriticalInfrastructuredoterroristsprefertoattack?
3) WhattypesofgroupsorspecificgroupsaremostlikelytoattackCriticalInfrastructure?
4) HowdogroupsmakedecisionstoattackCriticalInfrastructure?
Afifthquestion,namelyWhatattackmethods(weaponssystems,operationaltechniquesetc.)aremostlikelyto
beusedbygroupsincarryingoutaCriticalInfrastructureattack?wasalsoconsidered,althoughthisquestion
wasnotthefocusoftheprojectandwillonlybedealtwithcursorily.
6RobertJervis,PerceivingandCopingwithThreat,inRobertJervis,RichardNedLebowandJaniceGrossStein,Psychology
andDeterrence(Baltimore,MD:JohnsHopkinsUniversity,1989),p.14
7C.J.MDrake,TerroristsTargetSelection(NewYork:St.Martins,1998).
8SeetheintroductorypassagesinChapter5forthereasonswebelievedthistobeimportant.
9Whilethisstudyusesthetermterroristforconveniencesake,allofitsfindingsapplyequallytootherviolencepronenon
stateextremists.SeethediscussionofterrorisminChapter2.
UCRL-TR-227068 4
Inordertoanswertheabovequestions,theprojectteamadoptedamultifacetedresearchapproachthatincluded
capturingalargesampleofdataoncriticalinfrastructureattacks,conductingseveralindepthcasestudies,
reviewingtheextantliterature,andcombiningtheseresultsinthedevelopmentofananalyticalframeworkto
assistinadeterminationofterroristintentionstotargetcriticalinfrastructure.Theteamremainedfullyaware
thatthisworkwasexploratoryandthatmuchofitconsistedoffeelingthetopicout.Therefore,intheinterests
oftransparency,thisstudyismoremeticulousthanmostindelineatingthespecificsourceofeachobservation,
whetherthisbearesearchershypothesis,apointderivedfromtheliterature,orinformationbasedonempirical
evidence.Throughoutthisreport,hypothesesdevelopedbymembersoftheprojectteamareitalicizedand
coloredinred.
Inaddition,thefollowingschemeisusedtocharacterizeassertionsderivedfromtheliterature:
1Primaryauthorassertiononly
2Multipleauthorsassertion
3Anecdotalevidence
4Theoreticalevidence(e.g.derivedfromagametheoreticmodelorclinicalstudy)
5LargeNstudy(basedonstatisticaldata)
Thehighestdegreeofevidencepresentineachcaseisannotated.
Themostimportantprecursortoanyanalysisisacomprehensiveunderstandingoftheconceptunderstudy.
HencewemustbeginbyexaminingthesometimesthornydefinitionalissuessurroundingCriticalInfrastructure.
B.DefiningCriticalInfrastructure
Publicawarenessofthevitalrolesthatcertaintypesofinfrastructureplayinunderpinningoureconomy,
security,andwayoflifehasincreasedsignificantlyduringthelastdecade.Thisheightenedattentionhas
occurredatatimewhenoursocietyhasbeenshapeddramaticallybythedynamicsofinformationtechnology
andtheaftermathof9/11.Asnotionsofnetworksandterrorismhavebecomemorecommonplacein
popularculture,theU.S.governmenthasreflectedthesedevelopmentsbyfocusingitsattentiononissues
relatingtoboththemyriadofinterconnectedsystemsthatmakeourdaytodaylivespossible,aswellasonthe
vulnerabilitiesthatstemfromsuchcomplexinteractionsandtheirresultingdependencies.Inmanyways,
contemporarypolicydiscussionsregardingcriticalinfrastructuresarethe21stcenturycorollariestotheheated
infrastructuredebatesofthe1980s.10Then,asnowwithCI,infrastructurewasatopicthatinvolved
numerousperspectivesandopinions,butveryfewstandardoragreedupondefinitions.Infrastructurewasa
fluidconceptthatcouldbeusedandinterpretedinawidevarietyofwaysdependinguponthepolicycontext.
Today,thesameholdstrueforthetermcriticalinfrastructure.Intheabsenceofaclear,standarddefinition,
thissectionseekstoidentifythetermsessentialmeaningbyreviewingthemajorfederalpolicies,reports,and
actionsthathaveframedhowcriticalinfrastructureisbestunderstoodinthecontextofcurrentdiscussions
relatingtoterrorism.
10A2003CongressionalResearchServiceReportnotes,Nearly20yearsago,infrastructurewasdebatedbecauseofconcern
thatthenationspublicworksinfrastructurewasbelievedtobesufferingfromsevereproblemsofdeterioration,
technologicalobsolescence,andinsufficientcapacitytoservefuturegrowth.See,JohnMoteffetal.,CriticalInfrastructures:
WhatMakesanInfrastructureCritical?CongressionalResearchService,January29,2003,p.14.
UCRL-TR-227068 5
ExecutiveOrder13010.CriticalinfrastructurebecameanofficialtermofpublicpolicyonJuly17,1996,when
PresidentClintonsignedExecutiveOrder(EO)13010CriticalInfrastructureProtection,therebyestablishinga
jointpublicprivatecommission11todevelopanationalstrategyforprotecting[criticalinfrastructures]and
ensuringtheircontinuedoperation.12AlthoughtheEOdidnotformallydefinetheconcept,itframedtheidea
bynotingthat[c]ertainnationalinfrastructuresaresovitalthattheirincapacityordestructionwouldhavea
debilitatingimpactonthedefenseoreconomicsecurityoftheUnitedStates.13Moreconcretely,theEO
identifiedthefollowingspecificinfrastructuresascritical:
telecommunications;electricalpowersystems;gasandoilstorageandtransportation;banking
andfinance;transportation;watersupplysystems;emergencyservices(includingmedical,
police,fire,andrescue);andcontinuityofgovernment.14
ThelanguageoftheEOprovidesfourimportantinsightsintoearlygovernmentthinkingaboutthematter.First,
itmakesclearthatthenotionofcriticalinfrastructureoriginatedasasecurityconcept.Criticalinfrastructures,
accordingtotheEO,areonlythosethathavethepotentialtocausedebilitatingdamagetothenationifthey
areharmed.Second,theEOcarefullydifferentiatesbetweentwocategoriesofthreatsposedtocritical
infrastructure.Onesetofthreatsphysicalthreatsinvolvesattacksthatimpactaninfrastructurestangible
property.Thesearethetypesofthreatsaddressedinthisstudy.Theothersetcyberthreatsinvolves
electronic,radiofrequency,orcomputerbasedattacksontheinformationorcommunicationscomponentsthat
controlcriticalinfrastructures,15andarenotdealtwithinthecurrentstudy.Third,theEOoffersanindication
ofthegeographicscaleonwhichcriticalinfrastructurethreatswereinitiallyevaluated.Onlythose
infrastructuresthathavethepotentialtocauseregionalornationalimpactifharmedareaddressedbyEO
13010.Andfourth,byemphasizingtheprivatesectorsimportantroleinprotectingCI,theEOmakesclearthat
criticalinfrastructuresaretobeconceivedofmorebroadlythanthepublicgoodsthatwereusuallyconsidered
asinfrastructure.
PresidentsCommissiononCriticalInfrastructureProtection.InOctober1997,thecommissioncreatedbyEO13010
issueditsfinalreport.16Althoughittouchesonboththephysicalandcyberthreatstocriticalinfrastructures,the
bulkofthecommissionsreportfocusesonthepotentiallydevastatingrisksposedtothenationbypoor
informationsecurity.Toaddressthisemergingchallenge,thecommissionconcludedthatenhancedcritical
infrastructureprotectionwasdependentonindustrycooperationandinformationsharing,anational
organizationstructure,arevisedprogramofresearchanddevelopment,abroadprogramofawarenessand
education,andreconsiderationoflawsrelatedtoinfrastructureprotection.17Thecommissionalsoemphasized
thedifficultiesinherentinaccuratelydefiningthenatureofcriticalinfrastructure,statingthatCIspanavast
anddiversesetofindustries,technologies,people,andtraditions.18Inanefforttoconveyacommon
understandingofcriticalinfrastructuresinthecontextofitsreport,thecommissionusedlanguagetakenfrom
EO13010todefinecriticalinfrastructuresas:
11ThecommissionwasofficiallytitledthePresidentsCommissiononCriticalInfrastructureProtection.
12ExecutiveOrder13010CriticalInfrastructureProtection.July15,1996,asfoundat:
http://www.fas.org/irp/offdocs/eo13010.htm.
13Ibid.
14Ibid.
15Ibid.
16See:CriticalFoundations:ProtectingAmericasInfrastructures,October1997,asfoundat:
http://www.dtra.mil/press_resources/publications/deskbook/full_text/Other_Relevant_References/PCCIP_Report.pdf
17GeneralAccountingOffice,CriticalInfrastructureProtection:ChallengesforSelectedAgenciesandIndustrySectors,
ReporttotheCommitteeonEnergyandCommerce,U.S.HouseofRepresentatives,February2003,p.11.
18PresidentsCommissiononCriticalInfrastructureProtection,CriticalFoundations:ProtectingAmericasInfrastructures,
October1997,AppendixII,asfoundat:
http://www.dtra.mil/press_resources/publications/deskbook/full_text/Other_Relevant_References/PCCIP_Report.pdf.
UCRL-TR-227068 6
Infrastructureswhicharesovitalthattheirincapacitationordestructionwouldhavea
debilitatingimpactondefenseoreconomicsecurity.19
Additionally,basedonitsownresearchandprivatesectorinput,thecommissionpresentedmoredetailed
explanationsofeachofthecriticalinfrastructuresitaddressedinitsfinaldocument.(SeeBox1.1.)Thesearethe
firstformalgovernmentdefinitionsthatidentifyparticularphysicalfacilitiesthatmaybeconsideredcritical
infrastructure.Inadditiontoclarifyingthenatureofcriticalinfrastructure,thecommissionsreportprovided
furtherinsightintothetypesofCIthreatsthegovernmentwasconcernedabout.Inparticular,itnotedthatin
termsofphysicalthreats,thetwomostcriticalthreatsinvolve:1)thetargetingofkeylinksandnodeswhose
destructionmightripplethroughinfrastructuresoracrossinfrastructures;and2)coordinatedattackswhich,in
combination,couldseverelyimpactthenationssecurityandeconomiccompetitiveness.20
Box 1.1**
Banking and Finance: A critical infrastructure characterized by entities, such as retail and commercial organizations,
investment institutions, exchange boards, trading houses, and reserve systems, and associated operational
organizations, government operations, and support activities, that are involved in all manner of monetary transactions,
including its storage for saving purposes, its investment for income purposes, its exchange for payment purposes, and
its disbursement in the form of loans and other financial instruments.
Electrical Power Systems: A critical infrastructure characterized by generation stations, transmission and distribution
networks that create and supply electricity to end-users so that end-users achieve and maintain nominal functionality,
including the transportation and storage of fuel essential to that system.
Emergency Services: A critical infrastructure characterized by medical, police, fire, and rescue systems and personnel
that are called upon when an individual or community is responding to emergencies. These services are typically
provided at the local level (county or metropolitan area). In addition, state and Federal response plans define emergency
support functions to assist in response and recovery.
Gas and Oil Production, Storage and Transportation: A critical infrastructure characterized by the production and
holding facilities for natural gas, crude and refined petroleum, and petroleum-derived fuels, the refining and processing
facilities for these fuels and the pipelines, ships, trucks, and rail systems that transport these commodities from their
source to systems that are dependent upon gas and oil in one of their useful forms.
Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the
national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and
airports; roads and highways, trucking and personal vehicles; ports and waterways and the vessels operating thereon;
mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and
long haul passenger rail; and delivery services.
Water Supply Systems: A critical infrastructure characterized by the sources of water, reservoirs and holding facilities,
aqueducts and other transport systems, the filtration, cleaning and treatment systems, the pipelines, the cooling systems
and other delivery mechanisms that provide for domestic and industrial applications, including systems for dealing with
water runoff, waste water, and firefighting.
_________________________
**CriticalFoundations:ProtectingAmericasInfrastructures,October1997,asfoundat:
http://www.dtra.mil/press_resources/publications/deskbook/full_text/Other_Relevant_References/PCCIP_Report.pdf.
19 Ibid.,p.B1.
20 Ibid.,p15.
UCRL-TR-227068 7
PresidentialDecisionDirective63.In1998,inresponsetothecommissionsfindings,PresidentClintonissued
PresidentialDecisionDirective(PDD)63,whichestablishedastrategyforbetterprotectingcritical
infrastructuresandforensuringgreatercooperationbetweenthegovernmentandprivatesectortowardsthat
end.Thedirectivedefinedcriticalinfrastructuresasthosephysicalandcyberbasedsystemsessentialtothe
minimumoperationsoftheeconomyandgovernment.21Italsoopenedthepossibilityofexpandingthenumber
ofpotentialinfrastructuresidentifiedascriticalbystatingthat,theyinclude,butarenotlimitedto,
telecommunications,energy,bankingandfinance,transportation,watersystemsandemergencyservices,both
governmentalandprivate.22(Emphasisadded.)PDD63formalizedtheU.S.governmentspoliciestoward
criticalinfrastructureinthreeparticularlysignificantways.First,itestablishedhighlevelrolesand
responsibilitiesforthemanagementofcriticalinfrastructureissuesbydesignatingleadfederalagencies(known
assectorliaisons),whichwereresponsibleforworkingwithprivatesectorcounterparts(knownassector
coordinators).Second,itclarifiedthepurposeofcriticalinfrastructureprotectioneffortsbysettingthegoalof
preventingormitigatinganyintentionaloraccidentaleventsthatwouldsignificantlydiminishtheabilitiesof:
thefederalgovernmenttoperformessentialnationalsecuritymissionsandtoensurethegeneral
publicshealthandsafety;
stateandlocalgovernmentstomaintainorderandtodeliverminimumessentialpublicservices;
and,theprivatesectortoensuretheorderlyfunctioningoftheeconomyandthedeliveryof
essentialtelecommunications,energy,financialandtransportationservices.23
(ThePDDfurtheremphasizedthat[a]nydisruptionsormanipulationsofthesecriticalfunctionsmustbebrief,
infrequent,manageable,geographicallyisolatedandminimallydetrimentaltothewelfareoftheUnited
States.24)Andthird,thePDDhighlightedthedynamicnatureofcriticalinfrastructureissuesanddeliberately
preparedgovernmentpolicyforfuturechanges.Notingthatmanyofthemostpressingchallengesrelatingto
criticalinfrastructureweredirectlyrelatedtothegrowingroleofinformationtechnologyandautomated,
interlinkedprocesses,thedirectiveemphasizedthataddressingthesevulnerabilitieswillnecessarilyrequire
flexible,evolutionaryapproachesthatspanboththepublicandprivatesectors,andprotectbothdomesticand
internationalsecurity.25
NationalPlanforInformationSystemsProtection.In2000,theWhiteHousereleasedthefirstversionofanational
planforcriticalinfrastructureprotection26thathadbeencalledforinPDD63.Althoughtheplanfocused
exclusivelyoncybersecurityaspectsofcriticalinfrastructureprotection,thedocumentisinterestingbecauseit
presentsaslightlyexpandeddefinitionofcriticalinfrastructure.Specifically,theplanstatesthat:
Criticalinfrastructuresarethosesystemsandassetsbothphysicalandcybersovitaltothe
Nationthattheirincapacityordestructionwouldhaveadebilitatingimpactonnationalsecurity,
nationaleconomicsecurity,and/ornationalpublichealthandsafety.27
21TheWhiteHouse,PresidentialDecisionDirective/NSC63CriticalInfrastructureProtection,May22,1998asfoundat:
http://www.fas.org/irp/offdocs/pdd/pdd63.htm
22Ibid.
23Moteffetal.,CriticalInfrastructures:WhatMakesanInfrastructureCritical?p.15.
24PDD63asfoundat:http://www.fas.org/irp/offdocs/pdd/pdd63.htm.
25Ibid.
26TheWhiteHouse,DefendingAmericasCyberspace:NationalPlanforInformationSystemsProtection.Version1.0.An
InvitationtoaDialogue,(2000),asfoundat:http://clinton4.nara.gov/media/pdf/npispfullreport000112.pdf
27Ibid.,p.vii.
UCRL-TR-227068 8
Thisisnotablebecauseitisthefirstinstanceinwhichaformalpolicydefinitionofcriticalinfrastructurehas
identifiedpublichealthandsafetyascriticalgovernmentfunctionstobesafeguarded.
ExecutiveOrder13228.AfurtherexpansionofthegovernmentsCIdefinitionappearedshortlyafterthe9/11
attacks,whenPresidentBushsignedExecutiveOrder13228EstablishingtheOfficeofHomelandSecurityand
theHomelandSecurityCouncil.Asasignofthereinvigoratedimportancecriticalinfrastructureissueswere
beinggivenintheaftermathofSeptember11,thenewWhiteHouseofficewaschargedwithcoordinate[ing]
effortstoprotecttheUnitedStatesanditscriticalinfrastructurefromtheconsequencesofterroristattacks.28
WhileEO13228didnotspecificallydefinecriticalinfrastructure,itdididentifyanumberofinfrastructure
sectorsrequiringparticularattention.(SeeBox1.2.)Interestingly,theexecutiveorderincludedagricultureand
livestockamongthese.Thisisthefirsttimefoodinfrastructureappearsprominentlyingovernmentpolicies
concerningCI.
Box 1.2***
The Office shall coordinate efforts to protect the United States and its critical infrastructure from the consequences of
terrorist attacks. In performing this function, the Office shall work with Federal, State, and local agencies, and private
entities, as appropriate, to:
strengthen measures for protecting energy production, transmission, and distribution services and critical
facilities; other utilities; telecommunications; facilities that produce, use, store, or dispose of nuclear material; and other
critical infrastructure services and critical facilities within the United States from terrorist attack;
coordinate efforts to protect critical public and privately owned information systems within the United States from
terrorist attack;
coordinate efforts to protect transportation systems within the United States, including railways, highways,
shipping, ports and waterways, and airports and civilian aircraft, from terrorist attack;
coordinate efforts to protect United States livestock, agriculture, and systems for the provision of water and food
for human use and consumption from terrorist attack;
______________________
***ExecutiveOrder13228EstablishingtheOfficeofHomelandSecurityandtheHomelandSecurityCouncil,October8,2001,asfound
at:http://www.whitehouse.gov/news/releases/2001/10/200110082.html.
ExecutiveOrder13231.LittlemorethanaweekaftercreatingtheOfficeofHomelandSecurityandHomeland
SecurityCouncil,PresidentBushsignedExecutiveOrder13231CriticalInfrastructureProtectioninthe
InformationAge,whichestablishedthePresidentsCriticalInfrastructureProtectionBoard.29Despitethe
boardsexpansivetitle,thepurposeofthenewentitywaslimitedtothecoordinationofthecyberrelated
federaleffortsandprogramsassociatedwithprotecting30criticalinformationinfrastructuresystems.Although
thismandateincludedauthorizationfortheboardtocoordinatetheprotectionofphysicalassetsdirectlyrelated
toinformationsystems,itdidnotprovidetheboardwithanyauthoritytoaddressothernoncyberspecific
criticalinfrastructurematters.TheintroductorytextofEO13231,atleast,didemphasizethattheprotectionof
suchsystemsisessentialtothetelecommunications,energy,financialservices,manufacturing,water,
28ExecutiveOrder13228EstablishingtheOfficeofHomelandSecurityandtheHomelandSecurityCouncil,October8,2001,
asfoundat:http://www.whitehouse.gov/news/releases/2001/10/200110082.html.
29TheWhiteHouse,ExecutiveOrder13231CriticalInfrastructureProtectionintheInformationAge,October16,2001,as
foundat:http://www.fas.org/irp/offdocs/eo/eo13231.htm.
30GAO,CriticalInfrastructureProtection:ChallengesforSelectedAgenciesandIndustrySectors,p.15.
UCRL-TR-227068 9
transportation,healthcareandemergencyservicessectors.31ThelanguageinEO13231isindicativeoftwo
interestingtrendsinthegovernmentshandlingofCIissues.First,thetextdemonstratesanongoingfluidity
inthewayinwhichgovernmentusesthetermcriticalinfrastructure.Clearly,manycriticalinfrastructure
securitymattersaredirectlyrelatedtocyberthreats.Byconflatingcyberissueswithotherbroadercritical
infrastructureissues,however,thegovernmentmaybeunintentionallylimitingpublicawarenessofthevery
seriousphysicalCIthreatsthatexist.Second,intheexecutiveorderssinglereferencetotheotherinfrastructure
sectorsthataresupportedbyinformationsystems,itisnotablethatmanufacturingispresent.This,again,
demonstratesagradualexpansionoftheofficiallyrecognizedcriticalinfrastructureswithingovernmentpolicy.
CriticalInfrastructuresProtectionActof2001.OnOctober25,2001,CongresspassedtheUSAPATRIOTAct.
Section1016oftheAct,knownastheCriticalInfrastructuresProtectionAct,specificallydefinescritical
infrastructuresas:
systemsandassets,whetherphysicalorvirtual,sovitaltotheUnitedStatesthatthe
incapacityordestructionofsuchsystemsandassetswouldhaveadebilitatingimpacton
security,nationaleconomicsecurity,nationalpublichealthorsafety,oranycombinationof
thosematters.32
Althoughthelegislationdoesnotcomprehensivelyidentifythediscreteinfrastructuresthatfallintothis
category,itdoesnotethattelecommunications,energy,financialservices,waterandtransportationsectorsare
examplesofthetypesofmoderninterdependentsystemsthatareessentialtothemaintenanceofnational
defense,continuityofgovernment,economicprosperity,andqualityoflifeintheUnitedStates.33Perhapsmore
importantly,theActclearlyarticulatestheU.S.governmentspolicyregardingcriticalinfrastructure.
(SeeBox1.3).Specifically,ithighlightsthegovernmentscommitmenttominimizingtheinterruptionofCI
services,cooperatingwithprivateandpublicsectorpartnerstoachieveitsobjectives,andensurethecontinuity
ofgovernment(CoG)functionsinallcircumstances.34
Box 1.3****
(c) POLICY OF THE UNITED STATES- It is the policy of the United States
(1) that any physical or virtual disruption of the operation of the critical infrastructures of the United States be rare, brief,
geographically limited in effect, manageable, and minimally detrimental to the economy, human and government
services, and national security of the United States;
(2) that actions necessary to achieve the policy stated in paragraph (1) be carried out in a public-private partnership
involving corporate and non-governmental organizations; and
(3) to have in place a comprehensive and effective program to ensure the continuity of essential Federal Government
functions under all circumstances.
___________________________
****H.R.3162130(P.L.10756),Section1016,asfoundat:http://www.epic.org/privacy/terrorism/hr3162.html.
31TheWhiteHouse,ExecutiveOrder13231CriticalInfrastructureProtectionintheInformationAge,October16,2001,as
foundat:http://www.fas.org/irp/offdocs/eo/eo13231.htm.
32H.R.3162130(P.L.10756),Section1016,asfoundat:http://www.epic.org/privacy/terrorism/hr3162.html.
33Ibid.,Sec.1016(b)23.
34Ibid.,Sec.1016(c)13.
UCRL-TR-227068 10
ApublicWhiteHousedocumentoutliningtheadministrationsofficialpositiononthelegislationdescribed
criticalinfrastructuresinslightlydifferentterms,notingthattheyarethoseassets,systems,andfunctionsvital
toournationalsecurity,governance,publichealthandsafety,economy,andnationalmorale.Thedocument
morespecificallyindicatedthattheadministrationconsideredthenationsinfrastructurestoinclude:food,water,
agriculture,healthandemergencyservices,energy(electrical,nuclear,gasandoil,dams),transportation(air,
road,rail,port,waterways),informationandtelecommunications,bankingandfinance,energy,chemical,
defenseindustry,postalandshipping,andnationalmonumentsandicons.35Althoughthislistwasnotincluded
inthefinalUSAPATRIOTActlegislation,itdemonstratesthatatleastsomeelementsofthegovernmentwere
furtherexpandingtheconceptofCItoincludephysicalstructures(suchasnationalmonumentsandicons)
which,ifstruck,couldaffectnationalmorale.
NationalStrategyonHomelandSecurity.IssuedbytheWhiteHouseinJuly2002,thenationalstrategyhighlights
theprotectionofcriticalinfrastructuresasoneofsixcriticalhomelandsecuritymissionareas.ItusestheUSA
PATRIOTActsdefinitionofcriticalinfrastructuretoframediscussionofthetopic,butitalsoexpandsonthe
definitionbypresentingaspecificlistofcriticalinfrastructuresectorsthatincludes:agriculture,food,water,
publicheath,emergencyservices,government,defenseindustrialbase,informationandtelecommunications,
energy,transportation,bankingandfinance,chemicalindustry,postalandshipping.36Althoughthislistdoes
notincludenationalmonumentsandicons,thestrategynotesseparatelythat:
Inadditiontoourcriticalinfrastructure,ourcountrymustalsoprotectanumberofkeyassets
individualtargetswhosedestructionwouldnotendangervitalsystems,butcouldcreatelocal
disasterorprofoundlydamageourNationsmoraleorconfidence.Keyassetsincludesymbols
orhistoricalattractions,suchasprominentnational,state,orlocalmonumentsandicons.In
somecases,theseincludequasipublicsymbolthatareidentifiedstronglywiththeUnitedStates
asaNation,andfallcompletelyunderthejurisdictionofstateandlocalofficialsorevenprivate
foundations.Keyassetsalsoincludeindividualorlocalizedfacilitiesthatdeservespecial
protectionbecauseoftheirdestructivepotentialortheirvaluetothelocalcommunity.37
Besidesaddingtheconceptofkeyassetstothenationscriticalinfrastructurepolicy,the2002strategyclarifies
howthecriticalityofaninfrastructurescomponentpartsshouldbeconsidered.Itrecognizesthattheassets,
function,andsystemswithineachcriticalinfrastructuresectorarenotequallyimportant,andthatlocal
communitieswillconsidersomeinfrastructurescritical(localschoolsandcourthouses,forexample)whichthe
stateorfederalgovernmentmightnot.Giventhissituation,the2002strategycallsforthedevelopmentofa
consistentmethodologyandfundingmechanismsthatwillallowcommunitiesatalllevelsofsocietyto
identifyandprotecttheircriticalassets,systems,andfunctions.38
NationalStrategyforthePhysicalProtectionofCriticalInfrastructureandKeyAssets.Inearly2003,theWhiteHouse
releasedTheNationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets.39The83
35Moteffetal.,CriticalInfrastructures:WhatMakesandInfrastructureCritical?p.7.
36WhiteHouse,NationalStrategyforHomelandSecurity,July16,2002,p.30,asfoundat:
http://www.whitehouse.gov/homeland/book/sect33.pdf
37Ibid,p.30.
38Ibid.
39WhiteHouse,NationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets,February2003,as
foundat:http://www.whitehouse.gov/pcipb/physical.html.
UCRL-TR-227068 11
pagedocumentdetailsthegovernmentspolicytoprotectcriticalinfrastructurefromphysical40terroractsthat
could:
impairthegovernmentsabilitytoperformessentialnationalandhomelandsecuritymissionsand
ensurethegeneralpublicshealthandsafety;
underminestateandlocalgovernmentcapacitiestomaintainorderandtodeliverminimumessential
publicservices;
damagetheprivatesectorscapabilitytoensuretheorderlyfunctioningoftheeconomyandthedelivery
ofessentialservices;or
underminethepublicsmoraleandconfidenceinnationaleconomicandpoliticalinstitutions.41
Withoneminormodification,42the2003strategycategorizesthenationscriticalinfrastructuresintothesame13
categoriesthatwereidentifiedbythe2002NationalStrategyforHomelandSecurityandreferencedpreviously.
Initsdiscussionofeachidentifiedsector,thedocumentfurtherspecifiesfacilitiesandfunctionsthatmightbe
particularlyvulnerabletoterroristattack.Thestrategyiscarefultoemphasize,however,thatsuchexamplesdo
notrepresentanexhaustivelistofpotentialterrortargets.
Itisworthnotingthatthe2003strategyestablishesthreestrategiccriticalinfrastructureprotectionobjectives.
Thefirstistoidentifyandensuretheprotectionofthemostcriticalassets,systems,andfunctionsintermsof
nationallevelpublichealthandsafety,governance,andeconomicandnationalsecurityandpublic
confidenceThesecondobjectiveistoensureprotectionofinfrastructuresandassetsfacingspecific,imminent
threats;andthethirdistopursuecollaborativemeasuresandinitiativestoensuretheprotectionofother
potentialtargetsthatmaybecomeattractiveovertime.43Thedocumentalsospecifiesthreegeneral
classificationsofthreatstocriticalinfrastructurewhichmustbeguardedagainst.Theseinclude:1)direct
infrastructureeffectscascadingdisruptionorarrestofthefunctionsofcriticalinfrastructuresorkeyassets
throughdirectattacksonacriticalnode,system,orfunction;2)indirectinfrastructureeffects:cascadingdisruption
andfinancialconsequencesforgovernment,society,andeconomythroughpublicandprivatesectorreactions
toanattack;and3)exploitationofinfrastructureexploitationofelementsofaparticularinfrastructuretodisrupt
ordestroyanothertarget.44
HomelandSecurityPresidentialDirective7.Themostrecentdevelopmentingovernmentpolicyrelatingtocritical
infrastructureoccurredinDecember2003,whenPresidentBushsignedHomelandSecurityPresidential
Directive(HSPD)7CriticalInfrastructureIdentification,Prioritization,andProtection.45Thisnewdirective
establishesmechanismsbywhichFederaldepartmentsandagenciesaretoidentifyandprioritizeUnitedStates
criticalinfrastructureandkeyresourcesandtoprotectthemfromterroristattacks.46Thedirectivedefines
criticalinfrastructureusingthemeaninggiventothetermbytheUSAPATRIOTAct,whichhasalreadybeen
discussed.Additionally,itusesadefinitionfoundintheHomelandSecurityActof2002todefinethetermkey
40Thestrategydoesnotaddresscyberattacks.CyberissuesareaddressedinaseparateFebruary2003documenttitled,The
NationalStrategytoSecureCyberspace.
41Ibid,p.ix.
42The2003strategybroadenstheChemicalIndustrycategorytoincludeChemicalIndustryandHazardousMaterials.
43NationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets,p.20.
44Ibid,p.viii.
45WhiteHouse,HomelandSecurityPresidentialDirective7CriticalInfrastructureIdentification,Prioritization,and
Protection,December17,2003,asfoundat:http://www.whitehouse.gov/news/releases/2003/12/200312175.html.
46Ibid.
UCRL-TR-227068 12
resourcesaspubliclyorprivatelycontrolledresourcesessentialtotheminimaloperationsoftheeconomyand
government.47Unlikeearlierpolicystatementsconcerningcriticalinfrastructure,HSPD7linksthecritical
infrastructureissuestronglywithkeyresourceswhoseexploitationordestructionbyterroristscouldcause
catastrophichealtheffectsormasscasualtiescomparabletothosefromtheuseofaweaponofmassdestruction,
orcouldprofoundlyaffectournationalprestigeandmorale.48Thisfocusonthepotentialmassdamagethat
couldcomefromterroriststrikesoncriticalinfrastructuresorkeyresourcesisreflectedinamoredetailed
articulationofUSpolicyconcerningitsprotectionefforts:
ItisthepolicyoftheUnitedStatestoenhancetheprotectionofourNationscriticalinfrastructures
andkeyresourcesagainstterroristactsthatcould:
a) causecatastrophichealtheffectsormasscasualtiescomparabletothosefromtheuseofa
weaponofmassdestruction;
b) impairFederaldepartmentsandagenciesabilitiestoperformessentialmissions,ortoensure
thepublicshealthandsafety;
c) undermineStateandlocalgovernmentcapacitiestomaintainorderandtodeliverminimum
essentialpublicservices;
d) damagetheprivatesectorscapabilitytoensuretheorderlyfunctioningoftheeconomyand
deliveryofessentialservices;
e) haveanegativeeffectontheeconomythroughthecascadingdisruptionofothercritical
infrastructureandkeyresources;or
f) underminethepublicsmoraleandconfidenceinournationaleconomicandpolitical
institutions.49
DefiningCriticalInfrastructure.TheprecedingreviewofCIpolicydemonstratesthefluidnatureandongoing
evolutionoftheconceptcriticalinfrastructure.Asyet,thereisnodefinitive,widelyaccepteddefinitionofthe
term.AsPPD63pointsout,however,suchdynamisminpublicconsiderationofthemattershouldcomeaslittle
surprisegiventhenovelnatureofmanyemergingCIthreats.Simplyput,wearecontinuingtodiscovernew
aspectsandrealities(includingvulnerabilities)of21stcenturylife.Indeed,itisfullyappropriatethat
policymakersmaintainadegreeofflexibilitywhenconsideringsuchissuessoastobebestpositionedforfuture
possibilities.Thatsaid,severalgeneralizationsconcerningthenatureofcriticalinfrastructure,especiallyinthe
contextofterrorism,canbemade.
First,criticalinfrastructuresaremadeupofavastanddiversesetofsystemsandassets.Seekingtoenhance
understandingofcriticalinfrastructurebyidentifyingdiscretecategoriesofCIisdesirable,butdifficult,asnew
categoriesemergewithregularfrequency,especiallyastechnologiesandsystemrelationshipschange.Thisis
whymostcurrentdefinitionslistexamplesofcriticalinfrastructuretypes,butemphasizethattheexamples
arebynomeansexhaustive.Second,itisclearthatalmostallaspectsofcriticalinfrastructurecanbevery
broadlyrecognizedaseitherphysicalorcybertargets.Asdemonstratedbyitsissuanceoftwodiscrete
nationalCIstrategiesoneconcerningcyberissuesandtheotherphysicalissuesthecurrentadministration
hasrecognizedthisCIrealityandformulateditspoliciesaccordingly.Acknowledgingthisdistinction,andthe
47HomelandSecurityActof2002(6U.S.C.101(9)).
48HSPD7asfoundat:http://www.whitehouse.gov/news/releases/2003/12/200312175.html.
49Ibid.
UCRL-TR-227068 13
factthatboththecharacteristicsandperpetratorsofcyberandphysicalattacksoftendiffermarkedlyfrom
oneanother,theprojectteamdecidedtofocusthisstudyonphysicalinfrastructure.Moreover,opensource
informationoncyberterrorismis,understandably,relativelysparse,andtheprojectteampreferredtoutilizeits
resourcesasefficientlyaspossible.
Third,itisapparentthatalldefinitionsofCIarerelatedtosystemsandservicesthatareessentialtothe
functioningofnormallife.Itisimportanttorecognize,however,thatwhatisdeemedessentialwillvary
dependingonthelevelofthecommunityconcerned.Consequently,local,state,andnationalperceptionsofCI
willvaryaccordingly.
Basedontheabovediscussion,anditsowndiscussionsonthetopic,CNSoffersthefollowingdefinitionof
criticalinfrastructure,whichwillhenceforthbeusedinthisreport:
Criticalinfrastructuresarethosephysicalsystemsthatacommunitydependsontomaintainits
security,governance,publichealthandsafety,economyandpublicconfidence.Theconstituentparts
ofsuchsystemswillvaryaccordingtothecommunitycontextinwhichtheyareviewed.
C.StructureofReport
Thisreportisstructuredasfollows:
Chapter1:IntroductionandDefinitionofCriticalInfrastructure
Chapter2:ConceptualBackgroundandLiteratureExtracts
Chapter3:HistoricalRecordandSelectedCaseStudies
Chapter4:CriticalInfrastructureTerroristIncidentCatalog
Chapter5:TheDECIDeFramework
Chapter6:FurtherResearchandConclusion
Chapter2introducesreaderstothedifficultiessurroundinganyassessmentinvolvingterrorismandbriefly
outlinesthemaincategoriesofterroristideology.Itthenintroducesanddefinesthevariousfactorsusedto
developtheframeworkpresentedlaterinthereport.Chapter2concludeswiththeoreticaljustificationfromthe
literaturefortheimpactofthesefactorsontargetselection.Chapter3providesabriefoverviewofthehistorical
recordandproceedswithaselectionofcasestudiesexaminingtheperpetratorsandconductofseveral
important,butlesswellknown,attacksagainstcriticalinfrastructure.Basedonthishistoricalanalysis,this
chapterofferssomesuggestionsforthemostlikelysourceoffuturethreatstocriticalinfrastructureintheUnited
States.CrITICtheCriticalInfrastructureTerrorismIncidentCatalogisdescribedinChapter4,followedbya
preliminaryquantitativeanalysisofthedata.ThefindingsofChapters2,3and4arecombinedintheformofthe
DECIDe(DeterminantsEffectingCriticalInfrastructureDecisions)Framework,whichisdescribedanddetailed
inChapter5.Chapter6suggestsavenuesforfurtherdevelopmentoftheframeworkandsummarizesproject
findings.
UCRL-TR-227068 14
Chapter2:CONCEPTUALBACKGROUNDAND
LITERATUREEXTRACTS*
A.ConceptualandMethodologicalIssues
Beforeturningtothetheoreticalunderpinningsandempiricalrecordofterroristgroupsthathaveintentionally
targetedCIinthepast,itisappropriatetomakesomeintroductoryremarksaboutcertainconceptualand
methodologicalissues.Inthissection,CNSsgeneralmethodologicalapproachisdescribed,clarifyingthe
meaningoftheoftmisunderstoodtermterrorism,identifyingtheprincipalcategoriesofnonstateterrorist
groups,andillustratingwhyitisoftendifficulttodeterminewhetherterroristsarespecificallytargetingCI.
BasicFormulaforTerroristThreatAssessment
InordertoassesstheCIthreatposedbyparticulartypesofterroristgroups,onemustconsiderboththeir
ideologicalmotivationsandtheirtechnicalandoperationalcapabilities.Thisanalyticapproachcanberendered
asfollows:
LIKELIHOODOFTHREAT=MOTIVATIONSxCAPABILTIES
Likemostsocialscienceformulae,thisoneistoosimplistictoreflectthecomplexitiesofreality,yetitdoespoint
squarelytotheessentialfactorsthatmustbeconsideredinterroristthreatassessments.Asnotedpreviously,the
focusofthisstudyisalmostexclusivelydirectedtowardthemotivationsofdifferenttypesofterroristgroups.The
questionofaparticularterroristgroupstechnicalcapabilities(inthenarrowestsense)isnotdiscussedatlength,
exceptinsofarastheseplayspecificrolestargetingdecisions.
TheDistinguishingCharacteristicsofTerrorism
Perhapsthefirstdesideratumshouldbetodrawaclearanalyticaldistinctionbetweenterrorisminthestrict
senseofthetermandothertypesofnonstateviolence,adistinctionthatunfortunatelyneedstobemadeatthe
outsetpreciselybecausemostdefinitionsofterrorismincludingthoseemployedbysomeU.S.government
agencies50areimpreciseifnotentirelymisleading.
*
TheintroductionanddefinitionsinthischapterwerewrittenbyJeffreyM.Bale,whoalsocompiled,systematized,and
analyzedtheextracts,exceptforthesectionsonPerceptualFiltersthatwerewrittenbyGaryAckerman.Theextracts
themselveswerepainstakinglygatheredbyallmembersoftheresearchteam,reviewedbyAndrewJayneandLindaSerocki,
andthenstandardizedandformattedbyLindaSerocki.
50Note,e.g.,thedefinitionfromTitle22oftheU.S.Code,Section2656f(d):Terrorismmeanspremeditated,politically
motivatedviolenceperpetratedagainstnoncombatanttargetsbysubnationalgroupsorclandestineagents,usuallyintended
toinfluenceanaudience.Seewww.cia.gov/terrorism/faqs.html.Herethereisoneunnecessaryrestriction(e.g.,terrorismcan
bereligiouslymotivatedaswellaspoliticallymotivated)andtwooutrighterrors(terrorismisnotalwaysperpetrated
againstnoncombatanttargets,anditisnotonlycarriedoutbysubnationalgroupsorclandestineagentstheworst
perpetratorsofterrorism,historicallyspeaking,havebeenstates,whooftenopenlyemploytheirownsecurityforcesinstead
ofclandestineagents),andthequintessentialfeatureofterrorismthecarryingoutofviolenceinordertoinfluencea
widertargetaudienceiswronglyqualifiedwithusually.Seenote2below.
UCRL-TR-227068 15
Withoutspendingtoomuchtimeoncontentiousdefinitionalquestions,itcanbesaidthatthebestwayto
distinguishbetweenterrorismandotherformsofviolenceistorecognizethatmostactsofviolencearedyadic,
i.e.,theyinvolveonlytwopartiesorprotagonists,theperpetrator(s)andthevictim(s):
PerpetratorVictim
Inmarkedcontrast,bonafideactsofterrorismaretriadic,i.e.,theyinvolvethreepartiesorprotagonists,the
perpetrator(s),thevictim(s),andawidertargetaudience(oraudiences):
PerpetratorVictimWiderTargetAudience(s)
Inshort,terrorismisviolencethatisconsciouslycarriedoutbytheperpetrator(s)inordertoinfluencethe
attitudesandbehaviorofawidertargetaudience(ormultipletargetaudiences).Itis,asBrianJenkinsandothers
haveaptlypointedout,violenceforpsychologicaleffect.51Indeed,oneofthemanyperverseironiesofterrorism
isthat,althoughtheactualvictimssufferitseffectsdisproportionatelyandinthemostdirectandbrutalmanner,
theirimportanceisstrictlysecondaryandderivesprincipallyfromthefactthattheyhavebeenspecifically
selectedbecausetheyareviewedassymbolizingsomethinglargerorrepresentingabroadercategoryofpersons.
Toputitanotherway,themostimportantnexusinanyterroristactisbetweentheperpetratorsandthetarget
audience(s)theyaretryingtoinfluence.Itfollowsfromthisthattargetedassassinationsofparticularindividuals
forpurelyinstrumentalreasons(e.g.,murdersofparticularlyeffectiveorbrutalpolicemen)orattacksthatare
solelydesignedtokilllargenumbersofpeople(e.g.,massacres)arenot,strictlyspeaking,actsofterrorism.They
wouldonlyconstituteactsofterrorismiftheirprimarypurposewastotraumatizeandinfluencethebehaviorof
widertargetaudiences.Inmanyrealworldcases,ofcourse,attacksarecarriedoutforbothinstrumentaland
psychologicalreasons,butthelatterwouldhavetopredominateintheeyesoftheperpetratorsifsuchattacksaretobe
regarded,strictlyspeaking,asterrorism.Henceviolentactsthatinadvertentlyenduptraumatizingpeopleother
thantheactualvictim,e.g.,aseriesofrapesinaparticularurbanneighborhood,shouldnotbecharacterizedas
actsofterrorism.
Thusterrorismisnothingmorethanaviolenttechniqueofmanipulation,andlikeothertechniquesitcanbe
usedbyanyone,whatevertheirideologicalorientationorrelationshiptothestate.Itcanbeemployedonbehalf
ofstatepowerorinoppositiontostatepower,byleftwingers,rightwingers,orcentrists,bytheirreligiousor
thereligious,andforaninfinitevarietyofcauses.Onemansterrorististhereforenotanothermansfreedom
fighter,asmanyclaim;rather,onemansterroristshouldinvariablyalsobeanothermansterrorist,since
regardlessoftheunderlyingcauseinvolvedorwhetheronesympathizeswithordeploresitaterroristcanbe
identifiedpurelybythemethodsheorshechoosestoemploy.Itfollowsthatonlythoseorganizedgroupsthat
relyprimarilyonterroristtechniquescanlegitimatelybedescribedasterroristgroups.
However,forthepurposesofthisstudy,allnonstateactorsthathaveattackedCIinthepastwillbeconsidered,
eveniftheydonottechnicallyfallintothecategoryofterroristsinthiscarefullydelimitedsense.Thatisbecause
itseemsobviousthat,forpurposesofhomelandsecurity,theU.S.governmentisinterestedinanyandall
51ThebestcollectionandanalysisofdefinitionsofterrorismcanbefoundinAlexP.SchmidandAlbertJ.Jongman,Political
Terrorism:ANewGuidetoActors,Authors,Concepts,DataBases,TheoriesandLiterature(Amsterdam:NorthHolland,1988),
especiallypp.138.Manyofthebetterdefinitionshighlightedthereinemphasizethecentralityofcarryingoutviolent
actionswiththeconsciousintentionofexertingapsychologicalimpactonawidertargetaudience.Althoughthisworkis
nowoutofdate,westillregarditasthebestsingleintroductiontoterrorism.Theformaldefinitionthatoneoftheauthors
hasusedinhisownclassesonterrorismforseveralyearsisasfollows:Terrorismistheuseorthreateneduseofviolence,
directedagainstvictimsselectedfortheirsymbolicorrepresentativevalue,asameansofinstillinganxietyin,transmitting
oneormoremessagesto,andtherebymanipulatingtheattitudesandbehaviorofawidertargetaudienceoraudiences.
UCRL-TR-227068 16
subnationalgroupsthatmayendupthreateningCIinthiscountry,notsimplythosethatcanlegitimatelybe
characterizedasterrorist.
TheMainCategoriesofNonStateTerroristGroups
Oncethemeaningofthetermterrorismhasbeenclarified,theprincipalcategoriesofnonstateterroristsin
recentdecadesneedtobeidentified.Therearefiveprimarytypesofsubnationalterroristgroupsthathavehad
historicalsignificanceduringandaftertheColdWar:
1. Nationalist/separatist/irredentist(EthnoNationalist)groupsgroupsrelyingheavilyonterrorismthat
seekeithertoestablishanindependentstatefortheethnic,linguistic,cultural,ornationalcommunity
withwhichtheyareaffiliated,or(iftheyalreadyhavetheirownindependentstate)touniteallofthe
membersoftheircommunityincludingthosethatliveinneighboringcountriesundertheaegisof
suchastate.ThemostimportantgroupsinthiscategoryhavebeentheArmenianSecretArmy forthe
LiberationofArmenia(ASALA),EuskaditaAskatasuna(ETA:BasqueFreedomandFatherland),the
FrontdeLibrationNationaledelaCorse(FLNC:NationalLiberationFrontofCorsica),theIrish
RepublicanArmy(IRA),thePalestineLiberationOrganization(PLO),thePartiyeKarkaraneKurdistan
(PKK:KurdistanWorkersParty),theLiberationTigersofTamilEelam(LTTE,alsoknownastheTamil
Tigers),andSikhgroupsseekingtocreateanindependentstateofKhalistan.
2. Secularleftwinggroupsgroupsrelyingheavilyonterrorismthatseektooverthrowthecapitalist
systemandeitherestablishadictatorshipoftheproletariat(MarxistLeninists)or,muchmorerarely,a
decentralized,nonhierarchicalsociopoliticalsystem(anarchists).Themostimportantgroupsinthis
categoryhavebeentheFuerzasArmadasRevolucionariasdeColumbia(FARC:RevolutionaryArmed
ForcesofColumbia),SenderoLuminoso(SL:ShiningPath)inPeru,variousMaoistgroupsinNepal,and
thesocalledfightingcommunistorganizationsinEurope,suchasActionDirecte(AD:DirectAction)
inFrance,theBrigateRosse(BR:RedBrigades)andPrimaLinea(PL:FrontLine)inItaly,theRote
ArmeeFraktion(RAF:RedArmyFaction)andBewegung2.Juni(June2ndMovement)inGermany,the
CellulesCombattantesCommunistes(CCC:FightingCommunistCells)inBelgium,theGruposde
ResistenciaAntifascistaPrimerodeOctubre(GRAPO:October1stAntiFascistResistanceGroups)in
Spain,theEpanastatikOrgans17Noemvr(17N:November17thRevolutionaryOrganization)in
Greece,andDevrimciSol(DEVSOL:RevolutionaryLeft)andothergroupsinTurkey.
3. Secularrightwinggroupsgroupsrelyingheavilyonterrorismthatseektorestorenationalgreatness
(radicalnationalists),suppresssubversiveopponents,expelorsubordinatetroublesomeethnicand
culturalminorities(racists),oroverthrowtheexistingdemocraticandplutocraticcapitalistsystemsin
ordertoestablisharevolutionaryneworder(neofascists).Themostimportantgroupsinthisbroad
categoryhavebeenOrgansisX(theXOrganization)inpostwarGreece,theOrganisationdelArme
Secrte(OAS:SecretArmyOrganization)inFrenchAlgeria,AginterPresseandtheExrcitode
LibertaoPortugus(ELP:PortugueseLiberationArmy)inPortugal,OrdineNuovo(ON:NewOrder)
andAvanguardiaNazionale(AN:NationalVanguard)inItaly,theAktionsfrontNationalerSozialisten
(ANS:NationalSocialistsActionFront)andtheOdfriedHepp/WalterKexelgroupinWestGermany,
WestlandNewPost(WNP)inBelgium,theGruposAntiterroristasdeLiberacin(GAL:AntiTerrorist
LiberationGroups)inSpain,theBozkurtlar(GreyWolves)paramilitarysquadsaffiliatedwiththe
MilliyetilikHaraketPartisi(MHP:NationalistActionParty)inTurkey,theAlianzaAnticomunista
Argentina(AAA:ArgentineAntiCommunistAllianceorTripleA)inArgentina,theFrenteNacionalista
PatriayLibertad(PyL:FatherlandandFreedomNationalistFront)inChile,vigilante(death)squads
UCRL-TR-227068 17
invariousCentralAmericancountries,theAfrikanerWeerstandsbeweging(AWB:AfrikanerResistance
Movement)inSouthAfrica,andtheMinutemenandtheOrderintheU.S.52
4. Religiousterroristgroupsgroupsrelyingheavilyonterrorismthatseektosmitethepurported
enemiesofGodandotherevildoers,imposestrictreligioustenetsorlawsonsociety(fundamentalists),
forciblyinsertreligionintothepoliticalsphere(i.e.,thosewhoseektopoliticizereligion,suchas
Christian ReconstructionistsandIslamists),and/orbringaboutArmageddon(apocalypticmillenarian
cults).Thistypeofterrorismcomesinfivemainvarieties:1)Islamistterrorism;2)Jewishfundamentalist
terrorism,primarilyinsideIsrael;3)Christianterrorism,whichcanbefurthersubdividedinto
fundamentalistterrorismofanOrthodox(mainlyinRussia),Catholic,orProtestantstamp(which,inthe
U.S.,isespeciallyaimedatstoppingtheprovisionofabortions)andterrorisminspiredbythe
idiosyncraticChristianIdentitydoctrine;4)Hindufundamentalist/nationalistterrorism;and5)terrorism
carriedoutbyapocalypticreligiouscults.Themostimportantgroupsinthesesubcategorieshavebeen
IslamistgroupssuchasalQa`ida(theBaseorFoundation),Hizballah(PartyofGod)inLebanon,al
HarakatalMuqawamaalIslamiyya(HAMAS:IslamicResistanceMovement)andalJihadalIslami
(IslamicJihad,alsoknownasPIJ)inthePalestinianoccupiedterritories,alTanzimalJihad(Jihad
Organization,alsoknownasEIJ)andalJama`aalIslamiyya(IslamicGroup)inEgypt,alTakfirwaal
Hijra(ExcommunicationandMigration)inNorthAfrica,theGroupeIslamiqueArme(GIA:Armed
IslamicGroup)andGroupeSalafistepourlaPrdicationetleCombat(GSPC:SalafistGroupfor
PreachingandFighting)inAlgeria,alHizbalTahriralIslami(HT:IslamicLiberationParty)inCentral
Asiaandelsewhere,JemaahIslamiyah(JI:IslamicCommunity)inislandSoutheastAsia,theAbuSayyaf
Group(ASG)inthePhilippines,andvariousorganizationsoperatinginKashmir;TerorNegedTeror
(TNT:TerrorAgainstTerror)inIsrael;thePhineasPriesthood,andtheCovenant,theSword,andthe
ArmoftheLord(CSA)intheU.S.;elementsfromBajrangDal(BD:MightyHanumansArmy),the
youthwingoftheextremistVishvaHinduParishad(VHP:WorldHinduCouncil)inIndia;andAum
Shinrikyo(AumSupremeTruth)inJapan.
5. Singleissuegroupsgroupsrelyingheavilyonterrorismthatobsessivelyfocusonveryspecificor
relativelynarrowlydefinedcausesofvarioussorts.Thiscategoryincludesorganizationsfromallsides
ofthepoliticalspectrum,e.g.,animalrightsgroupssuchastheAnimalLiberationFront(ALF),anti
communistgroupssuchastheCubanexileorganizationOmega7,theComandodeCaaaos
Comunistas(CCC:CommunistsHuntingCommando)inBrazil,orthe[Grupos]AutodefensasUnidas
deColombia(AUC:UnitedSelfDefenseGroupsofColombia),andantiabortiongroupssuchasthe
ArmyofGod(AOG)intheUnitedStates.
Needlesstosay,groupsfromeachofthesefivebroadcategorieshavedistinctideologiesthathelptoexplain
whattheyareforandagainst,whotheirfriendsandenemiesare,andmostimportantlyforthisstudywhat
targetstheybelievetheycanlegitimatelyattack,butitisalsothecasethatevensuperficiallysimilargroups
withineachofthesecategoriesandsubcategorieshavetheirowndistinctivedoctrines.Moreover,itshouldbe
emphasizedthatthesemajorcategoriesofterrorismarenotentirelydiscrete.Someessentiallyethnonationalist
terroristgroupshavehadaMarxistgloss(thePKK,factionsofETA),areligiousgloss(certainSikhgroups),ora
combinationofthetwo(factionsoftheIRA).Inmorerecenttimes,essentiallyreligiousterroristgroupshave
alsodisplayedacutenationalistsentiments(theIslamistgroupsHAMASandIslamicJihadinthePalestinian
occupiedterritories),andessentiallynationalistterroristgroupshaveadoptedanincreasinglyprominent
52Foranoverviewofpostwarrightwingterrorism,whichhasgenerallybeenneglected(especiallyinColdWarEurope),see
JeffreyM.Bale,Terrorism,RightWing,inBernardA.Cook,ed.,Europesince1945:AnEncyclopedia(NewYork:Garland,
2001).
UCRL-TR-227068 18
religiouscoloration(importantproIslamistfactionswithintheChechenseparatistmovement,suchasthatof
ShamilBasayev).53Thesetypesofcomplexitiesneedtobekeptinmindwhenconsideringtheirmotivations.
B.MaterialsExaminedandSourcesUtilized
Inthispreliminaryefforttoelucidateterroristmotivationsforattackingcriticalinfrastructure(CI),oneofthe
strategiesadoptedbytheCNSteamwastoreviewtheexistingscholarlyliteratureonterrorism.Ourgoalsfor
theeffortwereboth1)tolearnwhetherparticularauthorshaddevelopedespeciallyusefulinsightsintothis
question,and2)todiscoverwhetheranygeneralconsensushadalreadybeenreachedaboutthissubject.The
reviewconfirmedinitialexpectationsthatlittletonoexistingliteraturefocusesspecificallyonthereasonswhy
terroristsattackinfrastructuraltargets.Surprisingly,therewasalsoapaucityofmaterialregardingthemore
generalprocessoftargetselectionbyterroristgroups.Whilethisdiscoveryenabledourresearchtobe
conductedwithoutthepreexistingassumptionsthatsometimesencumberterrorismresearch,italsomeantthat
muchoftheliteraturereviewedwasofvaluemoreforframingthandirectlyinformingtheissuesattheheartof
ourstudy.
Morethan120readingsonterrorismandthreatassessmentwereexaminedbyteammembersinordertoobtain
asmuchrelevantinformationaspossiblethatmightbeusefulinthecreationofourCIterroristattack
framework.Thematerialsconsultedforthisprojectwerereasonablydiverse,includinggovernmentreports,
unpublishedconferencepresentations,articlesfoundonwebsitesbutnotyetpublishedinhardcopyformat,
andawiderangeofscholarlybooksandarticles.Mostofthesesourceswereproducedbyrecognizedexpertsin
thefieldsofterrorismstudiesorthreatassessment.Itshouldbenoted,however,thathundredsoffocused
empiricalstudiesonindividualterroristgroupsoroperationswerenotincludedinthecorpusofmaterials,due
totimelimitations.Asaresult,ourfocusthroughoutwasonthegeneralliteratureonterrorism,asopposedto
casestudies,aswellasonthethreatassessmentliteraturethatmayberelevanttothequestionofterroristtarget
selection.Thecompletelistofthematerialswhichwereutilizedforthisphaseoftheprocessisincludedinthe
bibliography.
C.CategorizationandDefinitionsofFactorsInvolvedinTargetSelection
Beforeproceedingtosummarizetheresultsofthescholarlyliteraturedealingwithtargetselectionbyterrorists,
itisfirstnecessarytoidentifyandbrieflydefinethefactorsandsubfactorsweconsideredsignificantenoughto
focusonandultimatelyutilizeinourmodel.Thepurposehereisnottoclaimthatthesearetheonlyimportant
factors,orinsistthatthisistheonlywaythesefactorscanbecategorized,orprovideelaboratedefinitionsof
thesefactors,butsimplytohighlightthosefactorsthatwereconsideredimportantbyotherscholarsandthatwe
ourselvescouldacceptasbeinglegitimate.Asaresult,themainfactorsselectednumberedtwelveinall,eightof
53ThemixedreligiousandnationalistmotivationsofHAMASandIslamicJihadarewidelyrecognized,butitistheformer
thatclearlypredominatesinthesetwogroups(incontradistinctiontothemotivesoftheirpoliticalrivalsinthePLO).Forthe
conversionofcertainkeyChechenseparatistfactionstoIslamismandtheirincreasingresorttoterrorism,seeJeffreyM.
Bale,TheChechenResistanceandRadiologicalTerrorism,unpublishedreport,July2003.Thisparticularpiece,whichwas
originallypreparedfortheDefenseThreatReductionAgency,ispresentlyslatedforinclusioninaforthcomingCNS
publicationonthethreatofradiologicalterrorisminRussia.ByIslamismtheauthorisreferringtoaradicallyantiWestern
Islamicpoliticalideologywithbothrevolutionaryandrestorationistelements.Theprincipalideologicalcharacteristicsof
IslamisminallofitsformsareanoutrightrejectionofWesternsecularvalues,anintransigentresistancetoWesternpolitical,
economic,social,andculturalinfluenceovertheMuslimworld,anextremehostilitytowardslesscommittedandmilitant
Muslims(whoareoftendenouncedasapostates),andanaffirmationoftheimportanceofcreatinganIslamicstate
governedbyarigid,puritanicalapplicationoftheshari`a.FormoreonIslamistdoctrine(s),seeJeffreyM.Bale,Islamism,in
RichardF.PilchandRaymondZilinskas,eds.,EncyclopediaofBioterrorismDefense(NewYork:Wiley,2004),forthcoming.
UCRL-TR-227068 19
whichfallundertherubricofGroupCharacteristicsandfourundertherubricofExternalFactors.
Subsumedundermostofthesegeneralfactorcategoriesarealsoseveralsubfactors.
UCRL-TR-227068 20
FactorsRelatedtotheNatureoftheGroup
Thefollowingarethemainfactorsrelatedtothenatureofthegroupthatwereconsidered:
Ideology:
Ideologyreferstothebasicsetofpolitical,social,cultural,and/orreligiousbeliefsthatmembersofthegroup
hold.Inthemostrudimentarysense,itindicateswhatmembersofthegroupareforandwhattheyare
against.Underthiscategorywehaveincludedanumberofsubfactors,beginningwithWorldView,whichis
moreorlessequivalenttothetermideologyitselfbutcanrefereithertomoregeneralattitudesand
orientationsor,asitdoeshere,morenarrowlytothesubstantivecontentsofthedoctrinesespousedbymembers
ofthegroup.AnothersubfactorisGroupNorms,whichreferstothealmostunconscioussetofvaluesand
behavioralpreceptsthatindividualsabsorbinthecourseoftheprocessofsocialization,boththosecharacteristic
oftheirgeneralnationalandculturalmilieusandthoseassociatedwiththeextremistgroupstowhichthey
belong(whichironicallyoftenreflectandselfconsciouslyrepudiateelementsoftheformer).Finally,thereisthe
GrandStrategyofthegroup,whichrefersnotsomuchtoitsunderlyingdoctrinesastoitsconsciousadoptionof
particularpolitical,social,orreligiousgoalsandobjectives,i.e.,whatexactlydoesitaimtoaccomplishandhow
doesitintendtoaccomplishit.
OrganizationalStructure:
OrganizationalStructurerefersessentiallytotheformalorganizationofthegroup.Justhowisthegroup
organizedonpaper?Whatexactlywoulditlooklikeifonepreparedagraphicdiagramofitsstructure?Within
thiscategorytherearealsoseveralsubfactors,beginningwithGroupSize,whichismoreorlessselfexplanatory.
AnotherisDegreeofCentralization,whichreferstotheextenttowhichthevarioussubdivisionsofthe
organizationarestructurallytiedtoandcontrolledbythecentralcoreleadership.Relatedtothisisits
MechanismsofControl,whichhastodowiththemeansbywhichthoseleader(s)ensurethattheirsubordinates
followtheinstructionsoftheirsuperiorswithintheorganization.Finally,thereisBureaucraticSophistication,
whichhastodowiththeorganizationsdegreeoffunctionalspecializationatvariouslevels.Inshort,allofthe
factorsthatconcerntheformalorganizationofthegroupfallwithinthiscategory.
OrganizationalDynamics:
OrganizationalDynamicsreferstoallthosecharacteristicsoftheorganizationthatarenotembodiedorreflected
initsformalorganizationalstructureandwhichact,behindthescenes,tofacilitateorinterferewithitsactual
functioning.AmongthesubfactorswithinthiscategoryisLeadershipStyle,whichreferstothepersonal
characteristicsoftheleader(s)thatdirectlyinfluencethemannerinwhichheactuallyexercisescontrol,suchas
hisdegreesofcharisma,formality,willingnesstodelegate,orauthoritarianism.AnotherisSocialIsolation,the
degreetowhichthegroupsmembers(includingitsleader[s])arecutofffromorintegratedintothelarger
society.Onepossibleindicatorofthisistheextenttowhichgroupmembersareforcedtoliveclandestinely.
Finally,thereisFactionalization,theextenttowhichcompetingcentrifugalandcentripetalpressuresaffectthe
stabilityof,andtheexerciseofauthoritywithin,theorganization.Extremistgroups,unlikeestablished
bureaucraticorganizations,tendtoundergoakaleidoscopicprocessoffissionandfusionthatresultsin
considerableorganizationalinstability,frequentschisms,andtheperiodicestablishmentofentirelynewgroups
bybreakawayfactions.
UCRL-TR-227068 21
OrganizationalLifecycleStatus:
OrganizationalLifecycleStatusreferstothecurrentstageintheoverallhistoryofthegroup.Tobemoreprecise,
ithastodowiththelongevityoftheorganization,thechangestheorganizationhasundergoneovertime,what
itsconditioncurrentlyisrelativetoitsgeneralpatternofhistoricalevolution,andwhetheritstillseemstobe
vigorousorisinsteadenteringintoatemporaryorpermanentphaseofdecline.Therearenosubfactorswithin
thiscategory.
Demographics:
Demographicsreferstothecollectivecharacteristicsofthegroupsmembershipinvariousspheres.Itincludes
severalsubfactors,mostofwhichareselfexplanatory,includingAge,Gender,(levelof)Education,andSocio
EconomicStatus,aswellasseveralthatrequiremoreclarification.AmongtheseisFamily,whichreferstothe
natureofgroupmembersfamilyrelationships,e.g.,domanycomefrombrokenhomes?AnotherisSymptomsof
Psychosis,whichreferstoindicatorsofthepercentageofgroupmemberswithseriouspsychologicalproblems.
StillanotherisCriminalHistory,whichreferstohowmanygroupmemberspreviouslywereknowntobe
involvedincriminalactivities.Finally,thereisSubstanceAbuse,whichhastodowiththeproportionofmembers
withseriousdrinkingordrugproblems,eitherinthepastorpresent.Unfortunately,itisoftendifficultto
discernkeydemographiccharacteristicsofparticularterroristgroupswithoutaccesstoinsideinformation.
Resources:
Resourcesreferstotheextentanddiversityoftheassetsavailabletoaterroristgroup,sincesuchassetsare
requiredtoenableittosustainitselfovertimeandpermitittoorganizeandcarryoutattacks.Theseresources
fallintoseveralcategories,allofwhicharedesignatedhereassubfactors.TheyincludeFinancialresources,
whichreferstotheamountofmoneythatthegrouphasaccessto,inboththelongandtheshortterms,sothatit
caneffectivelysubsidizeitselfanditsoperations;Logisticalresources,whichreferstothesupportinfrastructure
thatthegrouphascreated(e.g.,toprovidefalsedocumentsorestablishsafehouses)sothatitskeymemberscan
functionasfulltimeterrorists,livinginclandestinity(whichgenerallymeansthattheycannotengageingainful
employment),andcarryingoutdesiredoperations;Physicalresources,whichreferstoalloftheactualgoodsand
piecesofequipmentthegroupneedstoaccomplishitsoperationalobjectives,suchasweapons,explosives,
vehicles,communicationsequipment,etc.;andHumanResources,whichreferstothosepersonswhoarenot
membersofthegrouporanalliedgroup(sincethisisdealtwithunderDemographicsandOtherCriminaland
ExtremistGroups)who,eitherwittinglyorunwittinglyareavailabletoassistthegroupinvariouscapacities.An
exampleofahumanresourcewouldbeadoctorwhotreatswoundedgroupmembers,perhapswithoutbeing
awareofthenatureoftheiractivities.
OperationalCapabilities:
OperationalCapabilitiesrefers,inthemostgeneralsense,toaterroristgroupsabilitytoplan,organize,and
carryoutattacks.Obviously,groupslackingsuchcapabilitieswillgenerallyfinditdifficultorimpossibleto
mountsuccessfulattacks.Inthiscontext,severalsubfactorscanbeidentified,someofwhichcanbe
characterizedasgenerallyapplicableandsomeofwhichcanbeviewedinpartastargetspecific.Intheformer
categoryonecanincludethegroupmemberspossessionofSpecializedSkills(ofanontechnicalsort);their
degreeofTechnicalExpertise,whichallowsthemtodeviseand/ormanufacturesophisticatedweaponsand
equipmentasneeded;theirPropensitytoInnovate,whichreferstotheirwillingnesstoemploynovelweaponsand
attackmodalities;theirNetworkingAbilities,whichcaneitherservetofacilitateorhindertheirforgingofuseful
UCRL-TR-227068 22
alliancesandcontacts;andtheirFamiliaritywiththeTargetEnvironment,whichreferstotheirabilitytoblendinto
theregional,national,social,ethnic,orculturalmilieusinwhichtheyarehopingorplanningtolaunchattacks.
MorespecifictoparticulartargetsisthegroupmembersKnowledgeoftheTarget,whichreferstotheirfamiliarity
withthetypeoftarget(forinstanceagroupmemberfamiliarwiththeoperationofwaterprocessingplantsin
general),orevenwithaspectsofaparticulartarget,suchastheareasurroundingthetarget,thelayoutofthe
targetitself,thesecuritymeasuresinplacethere,potentialinfiltrationandexfiltrationroutes,whoresides
nearby,wherelocalpolicestationsareinrelationtothetarget,etc.
FactorsExternaltotheGroup
Thefollowingarethemainfactorsoutsidethegroupthatwereconsidered:
HistoricalContext,Events,andPrecedents:
HistoricalContextrefersbothtothegeneralhistoricalmilieuwithinwhichthegroupisoperatingandcarrying
outitsactionsandtovarioussubfactorsspecifictothatcontext,allofwhichservetoconditionitsdecision
makingprocessesandtherebyimpactuponitsoperationalactivities.AmongthosesubfactorsarePreExisting
Ideas,theensembleofvalues,norms,ideas,ideologies,anddoctrinescharacteristicofthathistoricalandcultural
contextwhichconsciouslyorunconsciouslyaffecttheattitudesofmembersofthegroup.Fewindeedarethe
extremistandterroristgroupswhoseideasarecreatedsuigeneris,withoutanyreferencetopriorintellectual
traditionsoringrainedlocalattitudes.AnothersubfactorinvolvedhastodowiththeSymbolicEventsviewedas
significantinthatparticularhistoricalcontext,whetherbythemajorityofpeoplewithinit,membersofthe
terroristgroupitself,orboth.Totheextentthatthesymbolicimportanceofthoseeventsisrecognizedandfelt
byboththeterroristsandmembersofthewidersociety,theformerarebetterabletoexploitthem
propagandisticallyandperhapsobtainmorepopularsupport.Symboliceventscanhaveoccurredatanypoint
intime,fromthedistantpast,totherecentpresent,inthelattercasepotentiallyactingastriggerevents.Still
anothersubfactoristhegroupsExistingModusOperandi,which(totheextentthatithasmetwithsuccessinthe
past)isboundtoinfluencethemodalitiesofitsfutureattacks.Finally,PastOperationalSuccessesandFailures,
whetherthoseinvolvingitselforotherterroristorganizations,arelikelytoexertaninfluenceoneveryterrorist
groupsfutureplanning.Priorsuccessesandfailuresserveasusefulexamples,whetherpositiveornegative,and
therebyprovidevaluablelessonsthatterroristgroupsmustlearniftheywishtobesuccessful.
RelationswithExternalActors:
RelationswithExternalActorsreferstoalloftheparties(e.g.,constituencies,organizedgroups,andinstitutions)
outsidetheterroristgroupwhosereactionsmustbetakenintoconsiderationorwithwhichitmustsuccessfully
interactinordertoachieveitsobjectives.Thesepartieshavebeendividedintoseveraltypes,allofwhichare
thereforeidentifiedassubfactors,includingthegroupsownSympathizers,whotheterroristscannotaffordto
alienatewiththeiractions.TwootherpartieswhosereactionsthegroupmustconsideraretheNonTargeted
Public,membersofthepopulacewhoarenotspecificallytargetedbutwhothegrouphopestoinfluenceandnot
alienateentirelybyitsactions,andtheTargetedPublic,membersofwhichareviewedasenemiesthatthe
groupsactionsarespecificallymeanttoexertapsychologicalimpactupon.Otherexternalactorsincludethe
MassMedia,whosecoveragethegrouphopestoexploitinordertopublicizeitscause,transmitmessagesto
targetaudiences,rallyitssupporters,andfrightenitsenemies;OtherExtremistandCriminalGroups,whichthe
groupmayseektoestablishcollaborativerelationshipswithor,iftheyarerivals,overshadowbymeansofits
ownsuccesses;andelementswithintheStateApparatuswhichitiscovertlycolludingwith,seekingtocoopt,or
activelytargeting.Terroristgroupsdonotoperateinavacuumandmustthereforealwaystakeexternalforces
intoconsideration,especiallygiventhattheiractsofviolenceare,bydefinition,specificallyintendedto
manipulateexternalattitudesand/orbehavior.
UCRL-TR-227068 23
SecurityEnvironment:
SecurityEnvironmentreferstotheentirearrayofsecurityforces,measures,andarrangementswithwhichthe
terroristgroupmustcopeinordertooperateandcarryoutitsobjectives.Unlesstheycansuccessfully
circumventorsurmountexistingsecurityarrangements,generallybyrelyingheavilyupontheelementof
surprise,terroristscannothopetoaccomplishtheirgoals.Therearenosubfactorswithinthiscategory.
CriticalInfrastructureCharacteristics:
CriticalInfrastructureCharacteristicsrefers,asthephraseitselfsuggests,tothedistinctivefeaturesofvarious
infrastructuraltargetsthataterroristgroupmightchoosetoattack.Thesubfactorswithinthiscategoryinclude
PhysicalFeatures,whichreferstosuchthingsasthesizeofthefacility,thelayoutofthesite,andthelevelof
protectiononsite,etc.;GeographicalLocation,whichreferstowherethefacilityislocatedinrelationtopopulation
centers,otherstrategiclocalessuchasports,majorroadways,bridges,andairports,andtheterroristgroups
ownoperationalbases;andFunction,whichreferstowhattypeofinfrastructureitis(e.g.,achemicalplant,an
oilpipeline,adam)and,byextension,whateffectdestroyingitwouldbelikelytohaveonthecountrysability
tofunctionnormally(i.e.,woulditdisruptregionalpowertemporarily,destroyanentiresectionofthenations
energyindustryforalongtime,seriouslyinterferewiththefunctioningofthegovernment,and/orproduce
massiveciviliancasualties?).
DecisionMakingFactors
Beforeactuallyturningtothefactorsthatfallunderthisrubric,afewpreliminaryremarksneedtobemade.To
beginwith,bydefinitionterrorismisaformofpurposive,directedviolence,asopposedtounreflective,random
violence.Terroristtargetselectionisthusintimatelyrelatedtothespecificeffectsthatparticularterroristsare
seekingtogenerate,eitherasaresultoforinresponsetotheiractions.Indeed,farfromemployingviolence
senselesslyorpointlessly,terroristsarenormallyacutelyawareoftheoveralleffectstheyhopetoproduceby
carryingoutspecificattacks.54Itfollowsthatifanalystscandeterminewhatitisthataterroristgroupisaiming
toachievethroughtheuseofviolence,theywillbebetterabletoidentifyanddelimittherangeofpotential
targetsthatthatgroupislikelytoconsiderattacking.55
Next,afewwordsshouldbesaidconcerningnomenclature.Severalscholars,includingDrakewhohaswritten
mostextensivelyonthetopic,viewterroriststrategyassomethingthatflowsfromideologyandthenleads
eventuallytotargetselection.However,Drakeemploysthetermstrategyinaveryrestrictedsense,
specificallyasanassessmentofthereactionswhichtheterroristswishtoevokeincertainpsychologicaltargets
inordertopromotetheirpoliticalobjectives.56Thisparticularformulationpresentsatleasttwodistinct
difficulties.First,whilemostgooddefinitionsofterrorismemphasizethatitappliestoactsofviolencethatare
intendedtoinfluencetheperceptionsandbehaviorofanaudiencethatisfarwiderthanthepoolofactual
victims,anditistruethatterroriststypicallyselecttheirvictimssoastocauseadesiredpsychologicalreaction
inamuchbroaderaudience,57therearemanycasesinwhichmembersofterroristgroupshaveconducted
attacksforreasonsthathavelittleornothingtodowithtransmittingmessagestoothersorengagingin
psychologicalintimidation.Thisincludes,forexample,revengekillingsandinstrumentalattacksonmilitary
facilitiesorpersonnel.Onecanofcoursetechnicallyexcludesuchattacksfromthecategoryofterrorism,or
simplyviewthemasnonterroristactionsperpetratedbyterrorists.
54Drake,pp.389.
55Ibid,p.177.
56Ibid,p.177.
57Ibid,p.181.
UCRL-TR-227068 24
Yetthisapproachissingularlyunhelpfulforthepurposesofathreatassessmentwhichseekstoprepareour
countryforanyandallattacksbygroupspopularlyviewedasterrorists,irrespectiveoftheirsubjective
intentionsforlaunchingthoseattacks.Theseconddifficultyarisesfromthefactthatinthecaseofterrorism,the
linebetweenstrategyandtacticsissomewhatblurredterrorists,unlikemilitarycommanders,donot
necessarilymakeacleardistinctionbetweenthetwo.58Indeed,BrianJenkinshasobservedthatmanyterrorist
groupsfailtoprogressfromthetacticalconcernsofplanningspecificoperationstodevisingastrategytoachieve
theirpoliticalobjectives.59Thesetwoproblemscouldbeobviatedbyredefiningthetermstrategyin
connectionwithterrorism,butaswillbecomeclearbelowwehaveinsteadchosentousealessambiguousterm
operationalobjectives.
Inanycase,thefollowingwereselectedasthemainfactorsinvolvedinthedecisionmakingprocessofterrorists:
GeneralPlanningCharacteristics:
GeneralPlanningCharacteristicsreferstothedecisionmakingmechanismsandprocessesofterrorist
organizationsinthebroadestsenseofthoseterms,asopposedtotheirlowerleveloperationalobjectivesand
theirspecificattackmodalities.Therearetwo subfactorswithinthiscategory.OneisDecisionMakerTime
Horizon,whichreferstothegroupsperceptionofhowmuchtimeitsmembersbelievetheyhavebeforethey
mustcarryoutaprojectedaction.Thisfactormaybeaffectedbybothobjectivedevelopments,suchaschanges
inthesecurityenvironment,orsubjectivenotions,suchasaperceiveddoctrinalneedtocarryoutanattackon
theanniversaryofsomeevent,realorsacred,thatthegroupconsidersparticularlysignificant.ThesecondisRisk
Threshold,whichreferstothelevelsofriskthegroupiswillingtotakeinordertoachieveitsobjectives.For
example,woulditriskcarryingoutaspectacularattackeventhoughtheprobabilityofsuccesswaslowerand
thesafetyofitsmemberslesscertain,oropttocarryoutalowerlevelattackwithahigherlikelihoodofsuccess?
Isitmorepronetokeepusingconventionalterroristweaponsortoinnovateandshifttomoreunconventional
butdestructiveweapons,eventhoughacquiringoremployingtheselattermightwellprecipitatemuchhigher
levelsofstaterepression?Inshort,isaparticulargroupboldorcautiouswhenchoosingitsweaponsand
selectingitstargets?
PerceptualFilter:
Althoughtheliteraturesurveyeddoesnotdealexplicitlywithperceptioninthecontextoftargetselection,there
isasignificantbodyofworkthatdiscusseshowinformationisframed(oftenunconsciously)bytheperceptual
filtersofinformationcollectors,disseminatorsandusersinpoliticalmilitaryorganizations.Thesefiltersreflect
cognitiveandaffectbasedbiasesthatexclude,distortandattachidiosyncraticmeaningtoincominginformation
andcanshapedecisionstovaryingdegrees.
58MarkJuergensmeyerquestionsthewisdomofusingtermssuchasstrategyandtacticstorefertothesymbolic
operationscarriedoutbycertaintypesofterroristgroups.Accordingtohim,thetermstrategyimpliesadegreeof
calculationandanexpectationofaccomplishingaclearobjectivethatdoesnotjibewithsuchdramaticdisplaysofpoweras
theWorldTradeCenterbombing.Similarly,hearguesthatthesetypesofactionsarenottacticsdirectedtowardan
immediate,earthly,orstrategicgoal.SeeTerrorintheMindofGod:TheGlobalRiseofReligiousViolence(Berkeley:University
ofCalifornia,2000),p.123.JuergensmeyersobservationseemsapplicabletotheWorldTradeCenterbombing,the
OklahomaCitybombing,andthe1998bombingsoftheU.S.embassiesinAfrica.
59BrianM.Jenkins,SoldiersversusGunmen:TheChallengeofUrbanGuerrillaWarfare(SantaMonica:RAND,1974),p.4.
UCRL-TR-227068 25
OperationalObjectives:
OperationalObjectivesreferstoallofthoseresultsthatterroristsseektoachievebycarryingoutaparticular
attack,bothintheshorttermandinthelongerterm.Itissomewhatakintothetermstrategyinnormal
militaryparlance,butasnotedabovethattermcanbequitemisleadinginregardtoterrorism.Moreover,most
ofthecommentsintheliteraturethatrefertostrategyareequallyapplicabletothetermoperationalobjectives,
whichinourcontexthasasomewhatbroaderconnotationthanstrategy,60whereasthereverseisnotnecessarily
true.Finally,itshouldbeemphasizedthat,incontradistinctiontoideology,whichisrelativelystableinatleast
theshortandmediumterms,theoperationalobjectivesofanattackconstitutesadynamicvariablethatcan
fluctuatedramaticallyaccordingtocircumstancesthatarebothinternalandexternaltotheterroristgroup.
AttackModalities:
AttackModalitiesreferstotheactualmethodsandtechniquesthatterroristschoosetoemploytoattack
particulartargets.Thereareseveralsubfactorsinthiscategory,includingChoiceofWeapons,whichisself
explanatory,andChoiceofTacticalMethods,whichreferstotheactualmechanicsusedtoapproachthetarget,
carryouttheattack,andwithdrawaftertheattackiscarriedout.AnotherisInsidersandOutsiders,whichrefers
towhethertheterroristgrouphasinfiltrateditsownpersonnelintothefacilitysworkforceormanagedtoco
optsomeonewhoalreadyworksthere,i.e.,hasassistancefromaninsider.Forunderstandablereasons,attacks
thatarelaunchedwithinsidehelpmaywellhaveabetterchanceofsuccess.Dependinguponthechoiceof
targets,thepotentialarrayofattackmodalitiescanbequiteextensiveanddiverse.
TargetSelection:
TargetSelectionreferstotheprocessbywhichterroristsfirstidentifyandlaterchoosetargetstoattack.As
experiencedterrorismresearchersknow,differentgroupsmakedecisionssomewhatdifferently,ifnotinan
entirelyidiosyncraticmanner.Thatsaid,thisprocessofselectionisnormallyinvolvesseveralgeneralstages.
First,thereistypicallyapreliminaryplanningphaseinwhichmorethanonepotentialtargetisconsideredfor
attack.Second,thosetargetsareall examinedandevaluated,ifpossibleviadirectreconnaissanceontheground.
Iftheystillseempromising,theymaybebroughtundermoreregularbutdiscreetsurveillance.Lesspromising
targetsareprogressivelyweededoutanddiscarded,leavingonlyone(orahandful)tobedecidedupon.Inthe
end,theactualtargetsareselectedonthebasisoftheirperceivedimportance,vulnerability,andsuitabilityfor
accomplishingthegroupsaims.
These,then,arethefactorsandsubfactorsthathavebeenemployed,bothinouranalysisoftheliteratureandin
ourmodel.
D.LiteratureExtractsRelatedtoTargetSelectionforEachFactor
Itisnowtimetoexaminewhatcanbegleanedfromtheexistingscholarlyliteratureabouteachofthefactors
identifiedaboveasbeingpotentiallysignificantinterroristtargetselection.Theformatadoptedbelowwillbeto
presentthemostvaluableideasfromtheliteratureabouthowthesefactorsmightinfluencetargetselectionina
seriesofbulletpoints.Thosepointswillthenbefollowedbyasummationandbriefanalysis.Onceagain,the
factorswillbedividedintothreebroadcategories:FactorsRelatedtotheNatureoftheGroup,FactorsExternal
totheGroup,andDecisionMakingFactors.
60 Wheretheuseofthetermstrategyisnotapplicabletothediscussionofoperationalobjectives,thiswillbenoted.
UCRL-TR-227068 26
However,afewwordsshouldfirstbesaidaboutthenatureoftheevidenceprofferedbythesourcesthathave
beenconsulted.Mostoftheclaimsconcerningthevariousfactorsinthisliteraturesampleturnedouttobebased
onacombinationofselfevidentrealities,theopinionsofotherexperts,andafewillustrativeexamples.The
authorsgeneralconclusionswererarelyifeverderivedatleastexplicitlyfromacarefulindepthqualitative
studyofspecificterroristgroups,muchlessfromasystematiccomparisonbetweensuchgroups.Largesample
quantitativestudiesofanytypewerealmostcompletelyabsent.Onlyafewauthorswithaninterestingame
theorycarriedoutanytypeofmodeling,andinthathandfulofcasesthereislittleevidenceoftheirclose
familiaritywithreallyexistingterroristgroups.Inshort,mostoftheanalysesofthefactorsandsubfactors
foundhereincanbestbedescribedasimpressionisticoroverlyabstract.Ontheotherhand,theirobservations
generallyconformtotheexistingscholarlyconsensus,sometimescontainusefulinsightsintoparticularissues,
andarerarelyatvariancewiththeactualbehaviorofterroristgroupsasrevealedbythehistoricalrecord.
FactorsRelatedtotheNatureoftheGroup
1)Ideology:
Inthissectionitisusefultodividescholarlyassessmentsintotwocategories:1)generalconclusionsaboutthe
roleplayedbyideologyintargetselection;and2)thosethatarespecifictoparticulartypesofterroristgroups.
Inthegeneralcategory,thefollowingpointsareemphasized:
Ideologyprovidesamotiveandpossiblyaformulaforaction.61
Thetouchstoneforagroupsinitialdecisionsabouttargetselectionisprovidedbythegroups
ideology.62Thisisbecausetheideologyofaterroristgroupidentifiestheenemiesofthegroupby
providingameasureagainstwhichtoassessthegoodnessorbadness,innocenceorguiltofpeople
andinstitutions.63
Terroriststacticalandtargetingchoicescorrespondto,andaredeterminedby,theirrespective
ideologies,attendantmechanismsoflegitimizationandjustificationand,perhapsmostcritically,by
theirrelationshipwiththeintendedaudienceoftheirviolentacts.64
Thetacticsandtargetsofvariousterroristmovements,aswellastheweaponstheyfavour,are
thereforeineluctablyshapedbyagroupsideology,itsinternalorganizationaldynamics,the
personalitiesofitskeymembersandavarietyofinternalandexternalstimuli.Thetargetaudienceat
whomtheactisdirectedisamongthemainfactorstakenintoaccount.65
Whilsttheideologyoftheterroristgroupisnotthesoledeterminantofitstargetselection,itis
importantbecauseithelpstoformtheirviewsastowhoorwhatmaybeseenasalegitimatetarget.By
establishingsuchparameters,ideologyisinfluentialindeterminingtheirinitialrangeofpotential
targets.66However,thisconceptoflegitimacyisseenintermsofthegroupsbeliefsandmayoftenbe
farremovedfromwhatisseenaslegitimateormoralbehaviorbyothers.67
Mostterroristsseemtooperateunderselfimposedmoralandpracticalrestraints,whichmeansthat
theyonlyseecertaintargetsaslegitimate.68
61Drake,TerroristsTargetSelection,p.16.
62Ibid,p.175.
63Ibid,pp.2324.
64BruceHoffman,TheModernTerroristMindset:Tactics,Targets,andTechnologies,Columbia[University]International
AffairsOnline,WorkingPaper,October1997,p.1.
65Ibid,p.1.Alsoimportant,albeitlessso,arethetargetaudiencesonbehalfofwhoseintereststheterroristsclaimtocarryingout
theirattacks.
66Drake,TerroristsTargetSelection,p.34.
67Ibid,p.175.
68Ibid,pp.171172.
UCRL-TR-227068 27
Terroristsseektoidentifytheirvictimsasbeinginsomewayguiltyanddeservingofthetreatment
metedouttothem.Thisabsolvesthematleasttemporarilyoffeelingsofguiltfortheiractions69
Anotherimportanteffectofideologyisthatittransformspeopleorobjectsintorepresentative
symbols.70
Ideologyallowsterroriststodisplacetheblamefortheiractionsontootherpeople,sincetheguiltof
thephysicalorpsychologicaltargetsisheldtomaketheterroristsactionsinevitable.71
Dehumanizationoftheintendedvictims[helpsto]facilitateactionsbyinhibitingthesocialand
emotionalfactorsthatwouldtypicallysuppressanaggressiveresponse.72
Whenoperationsarepreplanned,anumberofpeopleorthingsmaybeselectedonthebasisoftheir
ideologicallegitimacyastargets,withtheintentionofchoosingoneofthemasthefinaltargetafterother
factorshavebeenconsidered.73
Notallterroristattacksareprecededbyadetailedideologicalinquiry.Wherethetargetisreadily
identifiable,andanydecisionsastotheguiltofthetargethavebeenmade,targetselectionisquite
straightforward74
Sometimes,theideologicaljustificationforanattackissuppliedaftertheattackhasoccurredrather
thanhavingbeenworkedoutbeforehand.75Thiscanbedoneforeithernarrowlydoctrinalorcynically
instrumentalpurposes,e.g.,ononeoccasiontheRedBrigadesdevisedanewexplanationtocoverup
thefactthattheyhadmadeanattackonthewrongtarget.
Thephilosophicalandideologicalviewsofagroupincludingboththeespousedphilosophyofthe
organizationandtheactualphilosophyrevealedbythegroupsactionsarealsocriticalin
determiningwhetheritwillseekoutnewtechnology.76
Thegroupsthataremostlikelytopursueandsuccessfullydeploynewtechnologiesarethosethatare
tappedintonewtechnologyoptions,openandhungryfornewideas,willingtotakerisks,notafraidto
fail,anddrivenbyitsenvironmenttopursuenovelty77
Grouptypesandtheirassociatedideologiesareoneofthefivemainvariablesindeterminingwhether
theywillemployCBRNweaponsinactsofterrorism;indeed,weaponsystemselectionisconsiderably
dependentontargetselectionanddesiredoutcomesbecausenotallweaponsystemswillhavethesame
effectonagiventarget.HenceEhudSprinzakspredominantfocusisonthetypesofgroupsmost
likelytobeimplicatedin[different]scenarios78
Inapplyinggametheorytoterrorism,itisimportanttoleavebehindpopularnotionsofrationality,
andtoreturnto[theformalnotion]thatactionsaretakeninaccordancewithspecificpreference
relations.Thereisnorequirementthataterroristspreferencerelationshouldinvolveeconomic
advantageorfinancialgainNorisitnecessarythataterroristspreferencerelationconformwiththose
ofsocietyatlarge.79
69Ibid,p.25.
70Ibid,p.25.
71Ibid,p.28.
72MarisaReddyPynchonandRandyBorum,AssessingThreatsofTargetedGroupViolence:ContributionsfromSocial
Psychology,BehavioralSciencesandtheLaw17(1999),p.353.
73Drake,TerroristsTargetSelection,p.56.
74Ibid,p.28.
75Ibid,p.29.
76BrianA.Jackson,TechnologyAcquisitionbyTerroristGroups:ThreatAssessmentInformedbyLessonsfromPrivate
SectorTechnologyAdoption,StudiesinConflictandTerrorism24(2001),p.193.
77Ibid,p.203.
78ArpadPalfy,WeaponSystemSelectionandMassCasualtyOutcomes,TerrorismandPoliticalViolence15:2(Summer2003),
pp.8384.
79GordonWoo,UnderstandingTerrorismRisk,RiskManagementSolutionsreport,http://www.rms.
com/Publications/UnderstandTerRisk_Woo_RiskReport04.pdf,p.8.
UCRL-TR-227068 28
Asforideologiesspecifictocertaingroups,inparticularreligiousterrorists,hereareafewsampleconclusions:80
Thebeliefsofmanygroupsformideologicalhybrids.81
Theremaybenotabledifferencesintargetingbetweengroupswithapparentlysimilarideologies82
Itremainsusefultodistinguishbetweenrationalistsandexpressionists:betweenthosewhoemploy
terrorismonbehalfofanexternalgoalandthosewhosegoalistocarryoutactsofterror.83
Forreligiousterrorists,violencestillhasaninstrumentalpurposebut,unlike[for]secularterrorists,it
isoftenanendinitself84
Allterroristsliveforafuturewhentheywillassuredlytriumph,butforthereligiousgroups,this
futureisdivinelydecreedandtheterroriststhemselvesspecificallyanointedtoachieveit.85
Whereasinsecularterrorism,therewardsofvictoryarefinite,inreligiousterrorismtheyareinfinite:
nationaldetermination,comparedwithparadise.86
Religiousterroristattacksmaynotbemadetoachievecalculatedstrategicandtacticalgoals,butrather
toserveasdramaticeventsintendedtoimpressfortheirsymbolicsignificance.87
Initsextremeinterpretations,religionappearstobeastrongdrivingforcefortheapplicationof
ruthlessviolencetoachievesupposedlysacredobjectives.88
Areadinesstoresorttounrestrictedviolencespringsfromaconvictionthatoneisactinginthename
andontheorderofthehighest,thatis,divine,authorityFromthis,asharpdemarcationbetweenus
andthem89
Thestrategicobjectives[ofreligiousterrorists]arelongtermandpotentiallyunlimited.90
Terroristsinspiredbyreligionarevirtuallyimpermeabletorationalistcounterarguments,sincetheir
enemiesareidentifiedwiththeforcesofevil.91
Today,religious,ethnic,andnationalmotivationsandbeliefs,notsubjecttocompromiseornegotiation,
formthebasisofanincreasingnumberofterroristactsagainstU.S.personnel,property,andinterests.92
80NotethatthisisaverysmallandunrepresentativesamplederivedfromthegeneralliteratureCNSconsulted.Everysingle
monographorarticledealingwithparticularterroristgroups(orcategoriesofgroups)describestheirideologicalmotivations
and,implicitlyorexplicitly,howthismayaffecttargetselection.
81Drake,TerroristsTargetSelection,p.22.
82Ibid,pp.3233.
83GordonH.McCormick,TerroristDecisionMaking,AnnualReviewsinPoliticalScience6(2003),p.480.Thispointhasalso
beenemphasized,atevengreaterlength,byRalphPeters,WhenDevilsWalktheEarth:TheMentalityandRootsof
Terrorism,andHowtoRespond,reprintedinhisBeyondTerror:StrategyinaChangingWorld(Mechanicsburg,PA:Stackpole,
2002),pp.2265.Petersdividesterroristsintopracticalterroristsandapocalypticterrorists,whichcorrespondroughlyto
McCormicksrationalistsandexpressionists.However,asPetershimselfnotes,itmightbeamistaketodrawa
distinctionthatistoohardandfastbetweenthesetwohypothesizedcategoriesofterrorists,sinceintherealworldthe
bordersbetweenthemsometimesblur.
84Hoffman,ModernTerroristMindset,p.7.
85Ibid,p.8.
86GavinCameron,NuclearTerrorism:AThreatAssessmentforthe21stCentury(NewYork:St.MartinsPress,1999),p.159.
87Juergensmeyer,TerrorintheMindofGod,p.123.
88HaraldMuller,Terrorism,proliferation:aEuropeanthreatassessment,InstituteforSecurityStudies,ChaillotPapers#58
(March2003),p.24.
89Ibid,p.28.
90Ibid,p.30.
91Ibid,pp.2829.
92UnitedStates,HouseofRepresentatives,106thCongress,SecondSession,SubcommitteeonNationalSecurity,Veterans
AffairsandInternationalRelationsoftheCommitteeonGovernmentReform,July26,2000Hearing,CombatingTerrorism:
AssessingThreats,RiskManagementandEstablishingPriorities(Washington,DC:GovernmentPrintingOffice,2000):
http://www.gpo.gov/congress/house.
UCRL-TR-227068 29
Thesearetheprincipalconclusionsfromtheliteratureconcerningtheroleplayedbyideologyinterroristtarget
selection.
Analysis:
Thereisgeneralagreementthatideologyplaysadecisiveroleinthegeneralprocessoftargetselection.By
identifyingclearlywhotheenemy(them)isandthenprovidingaclearexplanationofwhyitislegitimatefor
membersofthegroup(us)toattackthatenemy,ideologyprovidestheessentialrationaleforaterrorist
groupstargetingandidentifiespreciselywhatthepermissiblerangeoftargetsis.However,sinceideologycan
onlyprovideoverallguidelinesconcerningwho(andwhat)shouldandshouldnotbeattacked,theselectionof
specifictargetswithinthatbroadrangeofideologicallyacceptabletargets,includingthosethatcanactuallybe
attacked,isundoubtedlybasedonotherfactorsthatcanbestbedescribedasmorenarrowlystrategicortactical.
ThatiswhyDrakesinsistencethatgroupswithsimilarideologiescanselectdifferenttypesoftargetstoattackis
soimportant.Healsogoessofarastoconcludethatideology,byidentifyingwhichtargetsarelegitimate,
providesterroristgroupswithbothamotiveandaformulafortakingaction.Moreover,byfirstidentifyingthe
rangeofpotentialtargetsandthenprovidingarationaleforselectingthemtoachieveparticularpolitical
objectivesorpsychologicaleffects,includingthetransmittingofmessagestooneormoretargetaudiences,
ideologyalsoindirectlyaffectsthechoiceofweaponsandchoiceoftacticstobeemployed,sinceasPalfypointsout,
notallweaponsystems[and,byextension,notallattackmodalities]willhavethesameeffectonagiven
target.Finally,bydehumanizingtheenemy,ideologycanalsoservetoweakennormalmoralconstraintsthat
mightinhibitrecoursetoextremeviolence.Atthesametime,ideologyalsoplaysaroleininfluencingaterrorist
groupsdegreeoftechnologicalinnovation.Togethertheselasttwofactorsinturnaffectagroupspropensitytocarry
outactsofmasscasualtyandCBRNterrorism.
Thequestionofhowideologiesmightaffecttargetselectioncannoteasilybeansweredinageneralway,but
tendstobedependentuponthespecificnatureofthoseideologies.Moreover,somehavearguedthatthe
terroriststakeactioninaccordancewiththeirowninternallogicorrationality,sincetheirdoctrinaltenetsand
attitudesaregenerallyatvariancewiththoseofthelargersociety.Thismeansthattheirtargetswillnot
necessarilybechosenforthesametypesofpragmaticandinstrumentalreasonsthattendtomotivateothers
withlessextremeideologies,suchasthematerialgainortheachievementoflimited,practicalobjectives.
Accordingtocertainauthors,terroristswilloftenattackhighprofiletargetssolelybecauseoftheirsymbolicvalue
orevencarryoutattacksforpurelyexpressive(i.e.,internalpsychological)reasons,ratherthanonthebasisof
ostensiblyrationalcostbenefitcalculations.Itmaybe,then,thatterroristswillprovetobeimpossibleto
dissuadeordeter,sincetheycouldbeimpervioustonormal,rationalcounterargumentsand/orunwillingto
compromiseornegotiate.
SpecificGroupTypeFactors
Thereferencesinourreadingstospecificgroupideologiesandtheireffectsaregenerallyfewandfarbetween.
Thegeneralconsensusseemstobethat,whereasnationalist/separatistandsecularleftwingterroristgroups
usuallydonotcarryoutactsofindiscriminateormasscasualtyviolencebecausetheywishto maintainthe
supportoftheirconstituents,actualorproclaimed,andthatsecularrightwingterroristgroupsalsohavesome
selfimposedlimits,thisisnotnecessarilythecasewithreligiousterrorists.Indeed,religiousterroristsoftendisplay
areadinesstoresorttounrestrictedviolence,sincetheybelievethattheiractionsarecarriedoutonbehalfof,andare
thereforeallsanctionedby,divineauthorities.Moreover,theirobjectivesarepotentiallyunlimitedandcosmicintheir
scope,asopposedtobeinglimitedtotheachievementofattainable,practical,andshorttermthisworldlygoals,
andasaresulttheyareprobablytheleastlikelytodissuadeanddeter.Intheliteraturesurveyed,therewereno
discussionsofideologythatwerespecificallyrelatedtodecisionstotargetCI.
UCRL-TR-227068 30
2)OrganizationalStructure
Thereareonlyafewreferencesintheliteraturetoaspectsofaterroristgroupsorganizationalstructurethat
mightaffecttargetselection:
Thesizeofthegroupcandeterminethetypesofoperationwhichitcancarryout.93
Largerorganizationscancarryoutmoreactions,includingactionsagainstlessprominenttargets.94
Alargerterroristgroupcanobtainmoreinformationinrelationtopossibletargets95
Intheabsenceofconfoundingfactors,thelargeranorganization,themorelikelyitsmembersareto
possesstheappropriateexplicitandtacitknowledgebasetoefficientlyabsorbnewtechnologyandthe
morelikelyitisthattheorganizationcanaffordtodevotesomeofitsmemberstotechnology
acquisitionactivities.96
GoodtechnologytransferrequiresextensivefacetofaceinteractionsandhandsontrainingIfa
movementchoosestoorganizeitselfusingacellor leaderlessresistancemodelwheresmall
independentgroupsoperateinvaryingdegreesofignoranceabouttheplansandintentions[of]other
groupmemberstechnologyadoptionbytheentiremovementwillbeessentiallyimpossible.97
Insmall,celllikeorganizations,thegroupbecomestheonlysourceofinformationregardingthe
outsideworld,andthesolesourceofsecurityinthefaceofexternalpursuit.Thegroup,ormorelikely
thedominantmembersofthegroup,interpretseventsandideologyfortheindividual,determinesa
collectivemoralcode,determineswhichtargetsarelegitimate,andconfirmstherightnessofthegroups
actions.98
Analysis:
Althoughnoneoftheliteratureexplicitlyaddressestherelationshipbetweengroupstructure(suchasgroupsize,
degreeofcentralization,bureaucraticsophistication,andmechanismsofcontrol)andthemotivationsterrorists
mighthaveforattackingCI,somescholarspointtotheinfluencethatgroupstructurecanhaveonterrorist
targetselectionmoregenerally.Implicitinsuchdiscussionsisthenotionthatgroupsizeisoftencorrelated
directlywithanorganizationslevelsofresources,capabilities,andfunctionalspecialization.Thustheliterature
tacitlysuggeststhatlargergroupswillbebothmorelikelytoconsiderandmorecapableofeffectively
conductingelaborateattacks,because1)theywillgenerallybeabletoconsiderlargerpotentialtargetsets,and2)
theywilloftenhavethewherewithaltoconductmoresophisticatedandresourceintensiveattacks.Itmayalso
bethatanorganizationsdegreeofcentralizationmayaffectitsabilitytocarryoutlargerscaleattacks,although
theexampleofalQa`idasuggestsotherwise.
93Drake,TerroristsTargetSelection,p.80.
94Ibid,p.34.
95Ibid,p.79.
96Jackson,TechnologyAcquisitionbyTerroristGroups,p.202.
97Ibid,p.200.
98Drake,TerroristsTargetSelection,p.168.
UCRL-TR-227068 31
3)OrganizationalDynamics
Therearelimitedreferencesintheliteraturetotheimpactoforganizationaldynamicsontargetselection:
Theresponseofanyorganizationtoexternalstimuliisstronglyaffectedbythecharacteristicsofits
leadersandhowinformationistransmittedfromtheleadershiptotheremainderofthegroupAsa
result,totheextentthatthebackgroundandviewsofindividualterroristleaderscanbeassessed,those
characteristicscanbeusedtohelppredictthedesiretopursueagivencourseofaction.99
Socialidentitytheoryarguesthatgroupsocialidentityinparticulartheingroup/outgroupbias
canplayasignificantroleinframingandbiasingterroristperceptionsoftargetsandotherexternal
factors(suchastargetpopulations,globalevents,etc.).100
Groupswithauthoritarian/totalitarianleadershiparecharacterizedbycloseddecisionmakingbodies
andprocessesthatarerestrictedtotheleaderandpersonneldesignatedbyhim.101
Moreviolentorimpetuousmembersofagroup,canforcetheleadershiptoendorse[moreextreme]
actionsretrospectivelyforfearoflosingthegroupsinternalcohesionorevensplittingthe
organization.102
Thesearetheonlyrelevantreferencesintheliteratureonorganizationaldynamicsthatmightaffectaterrorist
groupstargeting.
Analysis:
Theliteratureidentifiesnospecificrelationshipsbetweengroupdynamics(suchasleadershipstyle,social
isolation,andfactionalization)andthemotivationsterroristsmighthaveforattackingcriticalinfrastructure.
Generallyspeaking,however,theliteraturedoesemphasizetwoimportantpoints.First,itnotesthecriticalrole
thatgroupleadersplayespeciallyiftheyarecharismatic,authoritarian,ortotalitarianinnaturein
establishingtheirorganizationspriorities,includingitstargetselectionpreferencesandpriorities.Second,it
suggeststhatifgroupsundergoschismsandfactionalization,thismaybroadentherangeofpotentialtargetsthe
variousfactionsconsiderattackingandincreasethepressureonrivalfactionstoconductmorebrutaland
destructiveattacks.
4)OrganizationalLifecycleStatus
Thefollowingtwopointshavebeenmentionedintheliteratureabouttherolethatanorganizationslifecycle
statusmightplay,atleastindirectly,intargetselection:
Thestrategicrationaleforconductingterroristattackstypicallyevolvesduringthecourseofthe
fight[Initial]actionsdesignedtoacceleratemobilizationtendtodiminishoncethisprocessis
underwayandthecorrelationofforceshasbeguntoshiftinfavoroftherebelsTheprimaryfunction
ofviolenceatthisstageistoprovoke,disorient,raisepopularconsciousness,andeliminateorcontain
theterror[ist]groups(internalandexternal)rivals.Ifallgoesaccordingtoplan,theimportanceofthese
tacticscanbeexpectedtodeclineastheconflicttakesonthecharacteristicsofaforceonforce
99Jackson,TechnologyAcquisitionbyTerroristGroups,p.193.
100PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.345.
101JerroldM.Post,KevenG.Ruby,andEricD.Shaw,TheRadicalGroupinContext:AnIntegratedFrameworkforthe
AnalysisofGroupRiskforTerrorism,StudiesinConflictandTerrorism25(2002),p.87.
102Drake,TerroristsTargetSelection,p.80.
UCRL-TR-227068 32
competitionbetweenthestateandanincreasinglyregularizedopposition.103Inshort,earliersymbolic
organizationbuildingattacksgraduallygivewaytofullblownguerrillaorsemiconventionalcombat.
AnalmostDarwinianprincipleofnaturalselectionalsoseemstoaffectallterroristgroups,sothat
everynewterroristgenerationlearnsfromitspredecessors,becomingsmarter,tougher,andmore
difficulttocaptureoreliminateNotonlyaresuccessorgenerationssmarterthantheirpredecessors,
buttheyalsotendtobe moreruthlessandlessidealistic.Forsome,infact,violencebecomesalmostan
endinitselfacatharticrelease,aselfsatisfyingblowstruckagainstthehatedsystemratherthan
beingregardedasthedeliberatemeanstoaspecificpoliticalendembracedbypreviousgenerations.104
Analysis:
Thereisnothingintheliteraturethatrelatesaterroristorganizationslifecyclestatusdirectlytoitstarget
selection.Thefirstpointmadeaboveissomewhatproblematic.Thorntonhimselfadmitsthatinmostcaseshis
hypothesizedshiftfromirregulartoregularwarfaredoesnotoccur,mainlybecausemostterroristandinsurgent
groupsneverachievesufficientlevelsofmilitarypowertoenablethemtomakesuchashift.Moreover,today
suchatransitioncanonlybeconsideredapossibilityinaverylimitednumberofcases,specificallythoseof
successfulMarxist(orevennonMarxist)insurgentgroupsthathaveconsciouslyadoptedcertainMaoist
conceptionsofPeoplesWar,suchastheFuerzasArmadasRevolucionariasdeColombia(FARC:Revolutionary
ArmedForcesofColombia),SenderoLuminoso(ShiningPath)inPeru,andMaoistguerrillasinNepal.Onthe
otherhand,Hoffmanspointseemsfarmoreapplicableinthepresentcircumstances.Successivegenerationsthat
arisewithinparticularterroristgroupssometimesarelessidealisticandoftendisplayagreatercapacityforviolence,
whichmightwellhaveanimpactontheiroperationalobjectivesandconsequenttargetselection.Somehave
degeneratedintocriminality,suchastheFARCandtheAbuSayyafGroup(ASG),whereasothershave
eschewedthemorelimited,organizationbuildingactionsoftheirforbearersandmovedtowardtheplanningof
masscasualty,apocalypticstyleattacks.
5)Demographics
Thereisnospecificinformationinthegeneralliteratureconcerningtherolethatdemographicfactorsplayina
groupstargetselectionprocess.Mostofthematerialconcerningthedemographiccharacteristicsofterrorists
involveseffortstodeterminewhetherterroristshaveabnormalpersonalitiesornot.WhileJerroldPosthas
tentativelycharacterizedcertainkindsofterroristsasmarginal,isolatedandinadequateindividualsfrom
troubledfamilybackgrounds,105thegeneralconsensusamongscholarsisthatterroristscannotgenerallybe
consideredpsychologicallyorpathologicallydisturbedindividuals,atleastnotinanyclinicalsense.Indeed,terrorists
exhibitadiversityofpersonalitytraitsandhaveawiderangeofbackgrounds,106makingitalmost
impossibletoassociatethemwithparticularpersonalitytypes.Themostthatonecansayisthatterroriststendto
beprofoundlyalienatedfrommainstreamvaluesand/orinstitutionsintheirownsocieties,andthatyoungermembersof
terroristgroupstendtobemorehotheadedandlessreflectivethanoldermembers,butatmostsuchtendencies
wouldexertanindirecteffectontargeting.
103McCormick,TerroristDecisionMaking,p.485,referringtotheschemeoutlinedbyThomasP.Thornton,Terrorasa
WeaponofPoliticalAgitation,inHarryEckstein,ed.,InternalWar:ProblemsandApproaches(NewYork:FreePressof
Glencoe,1964),especiallypp.8295.
104BruceHoffman,TerroristTargeting:Tactics,Trends,andPotentialities(SantaMonica:RAND,1992),p.5.
105JerroldPost,NotesonaPsychodynamicTheoryofTerroristBehavior,Terrorism7:3(1984),p.241.EvenPost
acknowledges,however,thattheyarenotnormallymentallydisturbed.
106McCormick,TerroristDecisionMaking,p.494.
UCRL-TR-227068 33
6)Resources:
Thissectionhasbeendividedintofinancial,physical,andlogisticalresourcesthatcorrespondtothesubfactors
forthiscategory:
FinancialResources
Unlesstheyhavearichidealistfundingtheiractions,mostterroristsoperateonashoestringbudget.107
Growingstatesponsorshipofterrorismhasseriousconsequences.Itputsmoreresourcesinthehands
oftheterrorists:money,sophisticatedmunitions,intelligence,andtechnicalexpertise.Italsoreducesthe
constraintsonterrorists,permittingthemtocontemplatelargescaleoperationswithoutworryingabout
alienatingperceivedconstituentsorprovokingpublicbacklash,sincetheyneednotdependonthelocal
populationforsupport.Withouttheneedtofinancethemselvesthroughbankrobberiesorransom
kidnappingsandwithouttheneedtocarryoutoperationsjusttomaintaingroupcohesion,state
sponsoredterroristgroupsoperatelessfrequentlythangroupsthatreceivelittleornostatesupport,but
theyaremanytimesmorelethalandhavefargreateroperationalreach.108
Terroristgroupsneedmoneytobuyweaponsandtheircomponents,torentorbuytransportand
accommodation,acquireorforgedocuments,andprovideforthelivingexpensesoftheirmembers.109
PhysicalResources(Equipment,Weapons,Shelter,Transportation,etc.)
Theweaponsavailabletoterroristsareveryimportantindeterminingthetargetswhichtheycanhope
toattacksuccessfully.Theclandestinenatureofterroristoperationsmeansthatsmallerfirearmsare
generallymoresuitablebecausetheycanbeeasilyconcealedwhenbeingmovedandwhenapproaching
thetarget.110
Whenselectingtheirtargets,terroristsoptionsarecircumscribedbytheircapabilities.Theweapons
possessedbyagroupdomuchtodeterminewhichtargetscanbeattacked.However,theterrorists
capabilityisalsoaffectedbytheabilityofagroupsleaderstomotivateordinarymembersandplan
operationswhilstthequalityoftheirordinarymembersdetermineswhethertheirweaponsandother
resourcesareusedeffectively.111
ContemporaryinternationalterrorismiswellsuitedtothetechnologyofoureraWeaponsand
explosivesareincreasinglyavailable,andmodernindustrialsocietypresentsmanyvulnerable
targets.112
LogisticalResources
LogisticsNetworkconsistsofthesupportstructurenecessarytosustain[thegroup]includesthe
meanstotransportweaponsandpersonnel,tohousemembersofthegroupwithoutarousingsuspicion,
andgenerallytoallowthegrouptofunction.113
[S]ometerroristgroupssetupalogisticsnetworkbeforetheystartusingviolenceSettingupa
logisticsnetworkforoneoperationisonlynecessarywhentheoperationitselfiscomplex.114
107BruceSchneier,SecretsandLies:DigitalSecurityintheNetworkedWorld(NewYork:Wiley,2004),p.53.
108BrianM.Jenkins,DefenseAgainstTerrorism,PoliticalScienceQuarterly101:5,ReflectionsonProvidingforThecommon
Good(1986),p.778.
109Drake,TerroristsTargetSelection,p.95.
110Ibid,p.93.
111Ibid,p.97.
112Jenkins,DefenseAgainstTerrorism,p.776.
113Drake,TerroristsTargetSelection,p.54.
UCRL-TR-227068 34
Althoughgroupswithfewfulltimemembersandrelativelyprimitiveweaponscanfunctionwithouta
largebase,moresophisticatedgroupsneedthemoneytopayforweaponsandotherresourcessuchas
IDandtraveldocuments.115
Terrorismstrendtowardincreasinglethalityisalsoareflectionofthefactthatterroriststhemselvesare
moreadeptatkilling.Notonlyaretheirweaponsbecomingsmaller,moresophisticated,and
deadlier...butterroristshavegreateraccesstotheseweaponsthroughtheiralliancewithforeign
governments.116
Accordingly,irrespectiveofcommunistblocaction,terroristsnowareassuredanalmostinexhaustible
internationalstockpileofplasticexplosivesonwhichtodrawforfutureoperations.Moreover,even
thoseorganizationslackingagovernmentpatronorsponsorcaneasilyobtainarangeofsophisticated
weaponsincludingSemtexHontheinternationalblackmarket.117
Analysis:
Thereisusuallyamoreorlessdirectcorrelationbetweentheresourcesavailabletoaterroristgroupandits
abilitytoattackdesiredtargets.Howeverambitioustheirtargetinggoalsmaybe,groupswithveryfewmeans
willsimplybeunabletoachievethemunlesstheycangainaccesstoadditionalfinancial,physical,andlogistical
resources.Anysupportprovidedtothembystates,usuallycovertly,willalmostinvariablycomewithstrings
attached,andthesemayinfactservetoconstrainaterroristgroupfromattackingtargetsthatitwouldotherwise
beinclinedtoattack.
7)OperationalCapabilities
Thereareanumberofreferencesintheliteraturetotheoperationalcapabilitiesofterroristgroups.Thesecanbe
dividedintofourcategories,threeofwhichwereidentifiedassubfactors:
General
Theterroristsstrategicoptionsarealsocircumscribedbytheircapabilitiestheirmaterial
resources[andthe]abilitiesoftheiroperatives.Terroristsmaymakemisjudgmentsastotheir
capabilitiesandoverreachthemselves,118
[T]erroristsconsciouslylearnfromoneanother119
[E]verynewterroristgenerationlearnsfromitspredecessors,becomingsmarter,tougher,andmore
difficulttocaptureoreliminate.120
thereisnormallyarelationshipbetweensimplicityandsuccessbecauseterroristorganizations,
similartomilitaryunitsincombat,becomevulnerabletofactorsoutsidetheirsphereofcontrolassoon
asthemissionentersitsexecutionsphase.121
TechnicalExpertise
114Ibid,p.55.
115Ibid,p.97.
116Hoffman,TerroristTargeting,p.9.
117Ibid,p.11.
118Drake,TerroristsTargetSelection,p.178.
119Hoffman,ModernTerroristMindset,p.7.
120Ibid,p.14.
121Palfy,WeaponsSystemSelection,p.87.
UCRL-TR-227068 35
Thecentralityoftechnologytoallterroristandcounterterroristoperationsrepresentsanimportant
incentiveforindividualgroupstoseekoutandmasternewtechniquesandweapons122
[T]heopportunitiespresentedbythetechnologicaldependenceofsocietywillbeinaccessibleunless
terroristgroupsmasterthetechniquesnecessarytocapitalizeonthem.123
[I]tisrelevanttoreexaminethetopicoftechnologyandterrorismfromadynamicperspectiveby
examiningnotwhathappenswhenterroristsgainanewtechnologybutthestepsandmisstepsthatare
takenaspartoftheacquisitionprocess.124
[A]llindividualsandgroupsdonotabsorbandsuccessfullyapplynewtechnologyatthesame
rate.125
Therearetwogeneralmechanismsthroughwhichanorganizationcanacquirenew
technologyinternalinnovation...[and]externalsourcesofinnovation.126
[E]xplicitknowledge[is]informationthatcanbereadilycodifiedandsetdowninwrittenformor
embodiedinaphysicalobjectitisalsoreadilytransferredbetweenonefirmandanother.Inpractice,
ofcourse,itisoftenthecasethatevenwellunderstoodtechnologiesdonotreadilytransferintoafirm
andarenoteasilyapplied.127
Incontrast,tacitknowledgeismuchmoredifficulttotransferamongindividualsorfirms[forexample,]
evenifthecompanysellingtheequipmentmakeseveryefforttocommunicateitsknowledgeabout
usage,muchofthetacitknowledgeassociatedwiththemachinesoperationwillnotbeeffectively
transferred.Asaresult,thepurchaserofanewtechnologywillalwayshavetogothrougha subsequent
internallearningprocesswherenecessarytacitknowledgeisdiscoveredandthetechnologyis
adaptedtotheusersspecificneeds.128
Agroupwithagreaterknowledgeofexplosivesandtacitunderstandingofwheretoplacethemfor
maximaleffecthasarguablyadoptedthetechnologymorecompletely[this]groupwouldposeafar
greaterthreatandbemoreworthyofcounterterroristattentionvariationsininherentcomplexitywill
affecttheabilityofgroupstosuccessfullyadopttechniquesordevices.129
[E]venofftheshelfweapons,likeanewmachinepurchasedbyacommercialfirm,requirethe
accumulationoftacitandexperientialknowledgeregardingtheiruse.130
Forterroristswishingtocarryoutmorecomplexoperations,trainingintheuseandconstructionof
weaponsisextremelyuseful.131
Forgroupsseekinglegitimacyandrespectintodaystechnologicallyadvancedworld,the
sophisticationofagroupsattackscanbeofutmostimportance.Suchadistinctionisimportantbothfor
publicreactionswhereamoretechnologicalattackmayresultingreaterimpactandintheabilityof
theterroristgrouptogaintheattentionoftheworldpressnecessarytotransmittheirpropagandatoa
broadaudience.132
Thispressuretogainmediaattentionandprominencehasbeensuggestedasoneofthereasonswhy
terroristactsinrecentyearshavegraduallyescalatedintheirscaleandlethality.Newtechnologiesand
weaponsareabsolutelynecessaryintheescalationand,asaresult,theabilityofagrouptoabsorband
deploythemisacriticalfactorindeterminingthesuccessofthisescalationprocess.133
122Jackson,TechnologyAcquisitionbyTerroristGroups,p.184.
123Ibid,p.184.
124Ibid,p.185.
125Ibid,p.186.
126Ibid,p.187.
127Ibid,p.187.
128Ibid,pp.187188.
129Ibid,p.196.
130Ibid,p.197.
131Drake,TerroristsTargetSelection,p.81.
132Jackson,TechnologyAcquisitionbyTerroristGroups,p.185.
133Ibid,p.185.
UCRL-TR-227068 36
Understandingthisfirstlevelofthetechnologyadoptionprocesscontrolledbytheorganizations
desireforinnovationiscriticalforassessingthelikelytechnologytrajectoryofagroupandis
thereforearelevantstartingpointforatechnologybasedterrorismthreatassessmentOrganizations,
whethertheyarelegitimateorunderground,donotinnovateforthesakeofinnovating.Rather,a
companyorterroristgroupwillchoosetopursueanewpieceoftechnologybecauseofthebeliefthat
thereissomethingtobegainedbydoingso.134
[I]nternationalcooperationcanleadtotechnologytransferamongextremistgroupsthedirect
communicationandfacetofacecontactgeneratedbycooperationbetweenfirmshaveproventobe
criticalfortheefficienttransferofexpertiseandtacitknowledge.135
Schneierinsteademphasizestheeasewithwhichsuccessfultechniquescanpropagatethrough
cyberspaceTheInternetisaperfectmediumforpropagatingsuccessfulattacktools.136
PropensitytoInnovate
Terroristtacticshaveremainedrelativelyunchangedovertime.Whenterroristsdoinnovate,itisonly
toovercomeaspecificcountermeasure.Terrorists,unlikearmiesinconventionalwarfare,havevirtually
unlimitedtargets,andthisreducestherequirementfortacticalinnovation.Whenconfrontedwith
securitymeasures,terroristsmerelyaltertheirtacticstoobviatethesecuritymeasuresofshifttheir
sightstoothervulnerabletargets.Becauseterroristscanattackanything,anywhere,anytime,and
governmentscannotprotecteverything,everywhere,allthetime,terroristsalwaysretainacertain
advantage.Overtheyearsthespectrumoftargetsattackedbyterroristshasexpanded.Thisasymmetry
alsomeansaninequalityofeffortbetweenterroristattackersandantiterroristdefenders.Theamountof
resourcesrequiredfordefenseagainstterrorismisdeterminednotbytheverysmallnumberof
terrorists,butratherbythevirtuallyunlimitednumberoftargetstobedefended.Thismakesterrorisma
cheapwaytofightandacostlykindofthreattodefendagainst.137
Terroristsaretacticallyconservative,preferringtheweaponswithwhichtheyarefamiliar.Ratherthan
adoptingentirelynewtechniques,mostterroristsappeartoprefertoadaptandimprovetheirexisting
ones138
Terroristshavedemonstratedrepeatedlythattheirgoalsandobjectivescanbeaccomplishedbyusing
thesametacticsandofftheshelfweapons(thoughcleverlymodifiedoradaptedtotheirneeds)that
theyhavetraditionallyreliedupon.139
Indeeditisnotsurprisingtofindthatthefrequencyofvarioustypesofterroristattacksdecreasesin
directproportiontothecomplexityorsophisticationrequiredThefactthatthesepercentageshave
remainedlargelyunchangedforthepast25years[thisarticlewaswrittenin1992]providescompelling
evidencethatthevastmajorityofterroristorganizationsarenottacticallyinnovative.140
[E]xperiencehasnonethelessdemonstratedrepeatedlythat,whenconfrontedbynewsecurity
measures,terroristswillseektoidentifyandexploitnewvulnerabilities,adjustingtheirmeansofattack
accordinglyandoftencarryingondespitetheobstaclesplacedintheirpath.141
134Ibid,p.189.
135Ibid,p.199.
136Schneier,SecretsandLies,pp.2122.
137Jenkins,DefenseAgainstTerrorism,pp.777778.
138Cameron,NuclearTerrorism,p.156.
139Hoffman,TerroristTargeting,p.15.
140Ibid,p.2.
141Hoffman,ModernTerroristMindset,p.16.
UCRL-TR-227068 37
Successfortheterroristisdependentnotonlyontheirabilitytokeeponestepaheadoftheauthorities
butofthecounterterroristtechnologycurveaswell.Theterroristgroupsfundamentalorganizational
imperativetoactalsodrivesthispersistentsearchfornewwaystoovercome,circumventordefeat
governmentalsecurityandcountermeasures.142
Inhopesofobviating,oratleastreducing,theserisks,theP[rovisional]IRAsbombmakersinventeda
meansofdetonatingbombsfromasafedistanceusingtheradiocontrolsformodelaircraftpurchasedat
hobbyshops.ScientistsandengineersworkingintheBritishMinistryofDefences(MoD)scientific
researchanddevelopment(R&D)divisioninturndevelopedasystemofelectroniccountermeasures
andjammingtechniquesfortheArmythateffectivelythwartedthismeansofattack.However,rather
thanabandonthistacticcompletely,thePIRAbegantosearchforasolution.Incontrasttothestateof
theartlaboratories,hugebudgetsandacademiccredentialsoftheirgovernmentcounterparts,PIRAs
ownR&Ddepartmenttoiledinclearsbeneathcrossbordersafehousesandbackroomsofurban
tenementsforfiveyearsbeforedevisinganetworkofsophisticatedelectronicswitchesfortheirbombs
thatwouldignoreorbypasstheArmyselectroniccountermeasures.143
Butifpastexperienceisanyguide,asairportsecurityandbombdetectiontechnologyclosesoff[one]
avenueofattack,terroristswillnotgiveupattackingairlinersbutmerelyfindanothermeansofdoing
so.Theyarelikelytoturntoreadilyavailableshoulderfired,precisionguidedsurfacetoairmissilesas
theonlypracticalmeanstoattackcommercialaircraft.Asingleterrorist,trainedintheuseofthis
weapon,couldpositionhimselfattheedgeofanyairportsrunwayandfireatincomingordeparting
passengerplanes.Indeed,onthefewoccasionsinthepastwhenguerrillashavetargetednonmilitary
aircraftwithsurfacetoairmissiles,theyhavehadspectacularlydevastatingresults.144
SpecializedSkills
Those[terrorists]whousedconventionalhighexplosiveshadexperienceincombat.145
Thereisnothingintheliteraturethatdealswithothersubfactorssuchasfamiliaritywiththetargetenvironment,
networkingabilities,orknowledgeofthetarget.
Analysis:
Obviously,thedegreetowhichitispossibleforagrouptocarryoutterroristattacksisdependentuponthat
groupsoperationalcapabilities.Theextentofagroupscapabilitiesalsoaffectsitschoiceoftargets,sincefew
groupsknowinglyselecttargetsthattheylacktheabilitiestoattacksuccessfully.Terroristsgenerallytendtorelyon
triedandtrueweaponsforthesimplereasonthattheyhaveworkedsowellinthepastandcontinuetoworkwell,andfor
thatreasonsomeanalystshavecharacterizedterroristsasconservative.Yetthereisnotanurgentneedto
innovateaslongastheemploymentoftraditionaltechniquesandweaponspermittheachievementofones
objectives.Ascountermeasuresbecomemoreelaborateandsophisticated,however,terroristsareinevitablyforcedto
expandtheircapabilitiessothattheycanadoptnewtechniquesand/oremploynew,moreeffectiveweapons.Inthatsense,
thereisanongoingcycleofinnovation,asthosewhoseektoprotecttargetsandthosewhoseektoattackthem
trytooutmaneuvereachother.
142Ibid,p.15.
143Hoffman,TerroristTargeting,p.12.
144Ibid,p.14.
145JohnParachini,ComparingMotivesandOutcomesofMassCasualtyTerrorismInvolvingConventionaland
UnconventionalWeapons,StudiesinConflictandTerrorism24(2001),p.402.
UCRL-TR-227068 38
Moreover,sinceterroristsfeelaperceivedneedtodemonstratetheirprowessandtherebyrallytheirsupporters,
frightentheirenemies,andobtainpublicityfortheircause,theyareonthelookoutfornewtechnologiesthatmight
enablethemtoattackhighprofiletargetssuccessfully.Hencetheymakeanefforttolearnfrompreviousexperience
andfromoneanother,borrowtechniquesdirectlyorindirectly,andacquiremoreknowledgeaboutnew
weaponsandtechniquestododamagetotheiropponents.TheseactivitiesarefacilitatedbytheInternet,which
meansthatitisnolongernecessaryforterroriststoobtainrequisiteknowledgefrompersonalcontactswith
experts.Althoughinmanycasesthereisstillnosubstituteforgettinghandsontraining,itisnowpossibleto
obtainavastamountofusefulinformationonline,whichmakesiteasierforterroriststoadoptandadaptnew
methodsandtechnologies.Totheextentthattheyareabletodoso,theirrangeofpotentialtargetscanonly
increase.
8)PerceptualFilter
Thefollowinginformationdetailsthemajorcategoriesofpotentialbiasmentionedintheliterature:
General
[W]econstructtherealityinwhichweoperate.Wetakeourperceptionoftheworldforgranted.146
Thetransactionalschoolofperceptionhasemphasizedthatperceptionisalwaysachoiceor
guessabouttherealnatureofthestimulus.147
Notethattheperceptionofastimulusisjustasimportantasthestimulusitself.Weneverrespondto
theactualeventorsituationbuttoourviewofit.148
[C]omplexproblemsaremorelikelytobedefinedbythedecisionmakersbeliefs,expectations,and
cognitiveandemotionalpredispositionsthanbytheobjectiveattributesofthesituationin
circumstancesofinformationoverloadonemayalsobemorelikelytoscreeninformationandto
respondintermsofpersonalpredispositions149
[T]heorganizationwillviewasrealitywhateverwillhelpestablishaconsensus.Theindividuals
intheorganizationwillthenhavetorespondintermsofthisconstruction.150
Theneedforpeopletosimplifytheenormousamountofinformationtheyreceiveandthe
psychologicalpressuresthatresultinmotivateddistortionsmeanthattherewillbeserious
discrepanciesbetweentheperceivedandtheactualenvironment.Astheseprocessescontinueover
time,furthermore,errorsarelikelytobecompounded,notcorrected.151
Theexperimentalevidencesuggeststhatthereareanumberofrespectsinwhichpeopledonotbehave
accordingtotheassumptionsandpredictionsofexpectedutilitytheory.152
[W]henmotivatedbiasesareatwork,onecannotpredictthepersonsperceptionsfromhisgeneral
beliefsystem.153
146JosephDeRivera,ThePsychologicalDimensionofForeignPolicy,JamesN.Rosenau,consultant,(Columbus,OH:C.E.Merrill
PublishingCompany,1968),p.21.
147Ibid,p.20.
148Ibid,p.31.
149OleRHolsti,CrisisDecisionMaking:PerspectivefromFourLevelsofAnalysis,Behavior,SocietyandNuclearWar1,
PhilipE.Tetlock,et.al,eds.(NewYork:OxfordUniversityPress,1989),p.33.
150DeRivera,ThePsychologicalDimensionofForeignPolicy,p.60.
151Jervis,Robert,PerceivingandCopingwithThreat,PsychologyandDeterrence(Baltimore,MD:JohnsHopkinsUniversity
Press,1989),p.33.
152JackS.Levy,ProspectTheory,RationalChoice,andInternationalRelations,InternationalStudiesQuarterly41:1(March
1997),p.89.
153RobertJervis,PerceivingandCopingwithThreat,p.32.
UCRL-TR-227068 39
Thefactremainsthathumanbeings,programmedastheyarewithemotionsandunconsciousmotives
aswellaswithcognitiveabilities,seldomcanapproximateastateofdetachedaffectlessnesswhen
makingdecisionsthatimplicatetheirownvitalinterestsorthoseoftheirorganizationornationwecan
saythatthinking aboutvital,affectladenissuesgenerallyinvolveshotcognitions,incontrasttothecold
cognitionsofroutineproblemsolving.154
RiskyShift
Someexperimentssuggestthatgroupsaremoreprone[thanindividuals]tochoosehighriskoptions
andthatgroupdiscussionsarelikelytocauseindividualstoshifttoriskierchoices.155
AmbiguityunderStress
Thesebiasesarisebecausetheproblemofdealingwithcomplexandambiguousinformationleads
peopletoadoptshortcutstorationalitythatsimplifyperceptionsinordertomakemoremanageablethe
taskofmakingsenseoutofenvironments.156
[I]tisnotpracticalfortherealworlddecisionmakertotakethetimeandefforttomakeoptimal
choices157
[A]mbiguityabetsinstinctandallowsintuitiontodriveanalysis.Thegreatertheambiguity,the
greatertheimpactofpreconceptions.158
[W]henstressincreases,problemsolvingtendstobecomemorerigid:theabilitytoimprovise
declines;previouslyestablisheddecisionrulesareadheredtomoretenaciously,whetherappropriateto
thecircumstancesornot159
AnalogyandCognitiveDissonance
Eventsthatareseenfirsthand,thathappenearlyinthepersonsadultlife,andthataffecthimandhis
countryhavegreatimpactonhislaterperceptualpredispositions.
Becauseoutcomesarelearnedwithoutcarefulattentiontodetailsofcausation,lessonsaresuperficial
andovergeneralized.Analogiesareappliedtoawiderangeofeventswithlittlesensitivitytovariations
inthesituation.
Theperceptionthatactuallyoccursistheonethatrequirestheleastreorganizationofthepersons
otherideas.160
[D]ecisionmakersdonotexamineavarietyofanalogiesbeforeselectingtheonethattheybelieve
shedsthemostlightontheirsituation.Instead,becauseoftheirpredispositions,theyseethepresentas
likerecentanddramaticeventswithoutcarefullyconsideringalternativemodelsortheimplicationsof
thiswayof perceiving.Theytherebyfailtoapplyfullytheirintelligencetosomeofthemostimportant
questionstheyface.161
154IrvingL.JanisandLeonMann,DecisionMaking:APsychologicalAnalysisofConflict,Choice,andCommitment(NewYork:The
FreePress,1977),p.45.
155Holsti,CrisisDecisionMaking,p.19
156Jervis,PerceivingandCopingwithThreat,p.18.
157Holsti,CrisisDecisionMaking,p.22.
158RichardKBetts,Analysis,War,andDecision:WhyIntelligenceFailuresAreInevitable,WorldPolitics31:1(Princeton
UniversityPress,October1978),p.70.
159Holsti,CrisisDecisionMaking,p.32.
160DeRivera,ThePsychologicalDimensionofForeignPolicy,p.22.
161Jervis,PerceptionandMisperceptioninInternationalPolitics(N.J.:PrincetonUniversityPress,1976),pp.281282.
UCRL-TR-227068 40
[T]helessonspeoplelearnareusuallyoversimplifiedandovergeneralizedtheyexpectthefutureto
resemblethepast.162
[P]ropensitiestoassimilateandinterpretincominginformationinwaysthatconformto,ratherthan
challenge,existingbeliefs,preferences,hopes,andexpectations;denialof,ratherthanacceptanceof,the
needtoconfronttradeoffs;andpostdecisionrationalizationstobolstertheselectedoptionswhile
denigratingthosethatwererejected163
Bolsteringisaccomplishedpartlybymagnifyingtheattractivenessofthechosenalternativethegains
tobeexpectedareplayedupandthepotentiallossesareplayeddownthechosencourseofaction
comestoberegardedmorehighlyandeachunchosenalternativeisregardedlesshighlyExaggerating
favorableconsequencesMinimizingunfavorableconsequencesMinimizingpersonalresponsibility.164
Groupthink
Groupthinkdefinedasadeteriorationofmentalefficiency,realitytesting,andmoraljudgment
occurswhenconcernforgroupsolidaritysupersedestheeffectiveperformanceofvitaldecisionmaking
tasks.165
Extensiveevidenceindicatesthatinteractionwithingroupsreducesvarianceinbehavior,crystallizes
attitudesandbeliefs,andgenerallyexertspressuresforconformitytogroupnorms.166
[A]primeexampleofconcurrenceseekingtendencythathasbeenobservedamonghighlycohesive
groups.Whenthistendencyisdominant,themembersusetheircollectivecognitiveresourcesto
developrationalizationssupportingsharedillusionsabouttheinvulnerabilityoftheirorganizationor
nationanddisplayothersymptomsofgroupthinkacollectivepatternofdefensiveavoidance.167
Thesymptomsofgroupthinkcanincludeanillusionofinvulnerability,sharedbymostorallofthe
members,whichcreatesexcessiveoptimismandencouragestakingextremerisks;anunquestioned
beliefinthegroupsinherentmorality,incliningthememberstoignoretheethicalormoral
consequencesoftheirdecisions;stereotypedviewsofrivalsandenemiesastooeviltowarrant
genuineattemptstonegotiate,orastooweakorstupidtocounterwhateverriskyattemptsaremadeto
defeattheirpurposes;selfcensorshipofdeviationsfromtheapparentgroupconsensus,reflecting
eachmembersinclinationtominimizetohimselftheimportanceofhisdoubtsand
counterarguments;asharedillusion ofunanimity,partlyresultingfromthisselfcensorshipand
augmentedbythefalseassumptionthatsilenceimpliesconsent.168
AttributionError
[T]hebasicattributionerroratendencytoexplaintheadversarysbehaviorintermsofpersonal
characteristicsinsteadofthecontextorsituation,whileattributingonesownbehaviortothe
latterinsteadoftheformer.169
162RobertJervis,PerceivingandCopingwithThreat,PsychologyandDeterrence(M.D.:JohnsHopkinsUniversityPress,
1989),p.22.
163Holsti,CrisisDecisionMaking,p.23.
164JanisandMann,DecisionMaking,pp.82,91.
165Holsti,CrisisDecisionMaking,p.21.
166Ibid,p.19.
167JanisandMann,DecisionMaking,p.129.
168Ibid,pp.130131.
169Holsti,CrisisDecisionMaking,pp.2324.
UCRL-TR-227068 41
Analysis:
Perceptualbiases(whethercognitiveoraffective)areubiquitouswhenitcomestodecisionmaking.However,in
thecaseofterroristgroups,whichareoftenisolated,undervaryinglevelsofstressandalreadyhaveradicaland
violentoutlooks,thesefeaturesarebelievedtobeespeciallyprominent.Wehaveattemptedtocaptureallthe
abovementionedeffects,byrepresentingthemunderthebroadrubricofaperceptualfilter.Theperceptualfilter
servesasaconstructthatactsonallinformationflowsintoandwithintheterroristgroup.Specificeffectscan
include:
Cognitivedissonance,whereinformationcontrarytodecisionmakerspreconceptionsandbeliefsis
ignoredorunderstated.
Attributionbias,whereenemyactionsareperceivedoneway(suchasbeingtheresultofmalice),while
groupactionsareviewedascomplexandarisingfromnumerousinfluences.Anotherformofattribution
biasisoneinwhichthegroupviewsitspastsuccessesastheresultofitsowncapabilities,whilepast
failuresareattributedtomisfortune.
Maladaptiveanalogizing,wheredecisionmakersinterpretcurrenteventsandstimulibyfittingthem
intoheuristicstheyhavedevelopedovertime,butwhichmaydistorttheobjectivetruthsignificantly.
Groupthink,wherethroughavarietyofmechanisms,groupsconvergeonconsensustopreservegroup
solidarityattheexpenseofoptimaldecisionmaking.
Includingtheperceptualfilterhelpstoinformanalysisbyhighlightingtheimpactofperceptiononterrorist
decisionmaking,andspecificallyontargetselection.Whiletheliteraturedoesnotdiscussthisaspectdirectly,it
isoftenimplicitinthediscussionofotherfactors.
FactorsExternaltotheGroup
9)HistoricalEvents
Thereisnothingintheliteraturespecificallydealingwiththeimpactofhistoricaleventsonterroristgroup
targeting.However,totheextentthathistoricalfactorsplayaroleinconditioningagroupsideologicalviews,
theyareverysignificantindeed,since,ashasbeennotedabove,ideologyisprobablythesinglemostimportant
factorinfluencingtargetselection.Hencethefollowingpointsdeserveemphasis:
[T]erroristgroupsofteninheritoradoptpreexistingscriptsorideasratherthancreatingbrandnew
onessuigeneris.170
[H]istoricalprecedentsandthe(interpreted)experiencesoftheirpredecessorscanserveasattractive
guidestoterroristaction.171
Itmaybe,forexample,thattheanniversaryofaneventwouldbeasufficientdestabilizingfactorto
raisethelevelofconcernbyincreasingagroupssenseofurgencyandtherebyitspropensityfor
violence.Dogroupmembersperceivethiseventtobe[such]aturningpointwithregardtokeypoints
intheirideologythatsomethingneedstobedone,thatthisisthetimetoact?172
Thesearetheonlyreferencestohistoricalfactorsintheliterature,althoughtheyaddressterroristtargetingonly
indirectly.
170McCormick,TerroristDecisionMaking,p.488.
171Ibid,p.488.
172PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.348.
UCRL-TR-227068 42
Analysis:
Theimportanceofexistingideasandhistoricalprecedentsininfluencingterroristbehaviormustberecognized.
Noterroristgroupemergesfromtheetherwithanentirelyblankslate,sinceitsmembershaveinvariably
internalized,adopted,oradaptedandmodifiedmanypreexistingideas.Likewise,nonewlyemergentterrorist
groupisentirelyunawareofthemethodsandtacticsemployedbypriororexistingterroristgroups,especially
thosethathaveoperatedwithinitsownpolitical,intellectual,ethnic,religious,orculturalmilieu.Hencethose
precedents,eveniftheydonotconsciouslyserveasexemplarsormodels,areboundtoexertsomedegreeofinfluenceona
groupstargetselectionandmodusoperandi.Itgoeswithoutsayingthatpasteventsthatareviewedashavinggreat
significancemaywellaffectagroupsdecisionsaboutwhoandwhattotargetandwhentolaunchattacks.The
pastisrarelyentirelyforgottenhoweveridealizedanddistortedeveninthecontextofterroristtargeting.
10)RelationswithExternalActors
Thereareanumberofreferencesintheliteraturetotheimpactofaterroristgroupsrelationswithexternal
actorsonitstargetselection.Theseexternalactorsneedtobedividedintoseveralcategories,includingtheall
importanttargetaudience,possiblestatesponsors,andotherexternalgroups:
General
Theterroristcampaignisthuslikeasharkinthewater:itmustkeepmovingforwardnomatterhow
slowlyorincrementallyordie.Hence,whenthesemoretypicaltargetsfailtosustainthemomentum
ofaterroristcampaignorwhenother,perhapseventotallyunrelatedeventsovershadowtheterrorists
andshunttheircauseoutofthepubliceye,terroristsoftenhavetoresorttomoreviolentactsto
dramaticallyrefocusattentionbackuponthemselves.173
However,forCarlos[theJackal]and[Ramzi]Yousefasformanyotherterrorists,thisequationof
publicityandattentionwithsuccessandselfgratificationhastheeffectoflockingthemontoan
unrelentingupwardspiralofviolenceinordertoretainthemediaandpublicsattention.174
Themoresuccessfulterroristorganization,therefore,willbeabletodetermineaneffectivelevelof
violencethatisatoncetolerableforthelocalpopulace,tacitlyacceptabletointernationalopinionand
sufficientlymodulatedsoasnottoprovokemassivegovernmentalcrackdownandreaction.175
TargetAudience(s)
[Terroristgroups]tacticalandtargetingchoicescorrespondto,andaredeterminedby,theirrespective
ideologies,attendantmechanismsoflegitimizationandjustificationand,perhapsmostcritically,by
theirrelationshipwiththeintendedaudienceoftheirviolentacts.176
AsthePFLPsBassamAbuSharifexplained,Forviolencetobecomefruitful,forittogetustoouraims,
itshouldnotbeundertakenwithoutaproperpoliticalbaseandintention.Whilethelogicinsuchacase
maywellbecontrived,thereisnonethelessaclearappreciationthatviolencehasitlimitsand,moreover,
ifusedproperly,itcanpayvastdividends.Inotherwords,thelevelofviolencemustbekeptwithinthe
boundsofwhattheterroriststargetaudiencewillacceptButactsofterrorism,likebattlesin
conventionalwars,aredifficulttolimitandcontroloncetheyarestarted177
173Hoffman,ModernTerroristMindset,p.4.
174Ibid,p.13.
175Ibid,p.4.Thisparticularcommentwasspecificallymadeinreferencetoethnonationalistandseparatistterrorist
organizations,butitundoubtedlyhasabroaderapplication.
176.Ibid,pp.12.
177Ibid,p.5.
UCRL-TR-227068 43
Maosuggestedthatguerillasmustaimforanddependuponthepoliticalmobilizationofpeoplewho
wouldbemerebystandersinaconventionalmilitaryconflict.Heintroducedarelationshipbetween
militaryactionandtheattitudeandresponseoftheaudiencethataddedanewdimensiontoarmed
conflict:insteadofgaugingsuccessprimarilyintermsofthephysicaleffectthatmilitaryactionhadon
theenemy,strategistscouldnowsaythattheeffectofaviolentactiononthepeoplewatchingmaybe
independentofandmayequalorevenexcelinimportancetheactualphysicaldamageinflictedontheir
forces.Terrorismisthatpropositionpursuedtoitsmostviolentextreme.178
StateSponsors
Theinfluenceofforeignsponsorsontheselectionofterroristtargetshasvaried.179
Growingstatesponsorshipofterrorismhasseriousconsequences.Itputsmoreresourcesinthehands
oftheterrorist:money,sophisticatedmunitions,intelligence,andtechnicalexpertise.Italsoreducesthe
constraintsonterrorists,permittingthemtocontemplatelargescaleoperationswithoutworryingabout
alienatingperceivedconstituentsorprovokingpublicbacklash,sincetheyneednotdependonthelocal
populationforsupportWithouttheneedtofinancethemselvesthroughbankrobberiesorransom
kidnappingsandwithouttheneedtocarryoutoperationsjusttomaintaingroupcohesion,state
sponsoredterroristgroupsoperatelessfrequentlythangroupsthatreceivelittleornostatesupport,but
theyaremanytimesmorelethalandhavefargreateroperationalreach.180
Statesponsorship,inparticular,couldprovideterroristswiththeincentives,capabilities,andresources
theypreviouslylackedforundertakinganambitiousoperationinanyofthesedomains.Combinedwith
intenseethnicenmityofastrongreligiousimperative,thiscouldprovedeadly.181
[T]erroristactsbygroupsthatarestatesponsoredhavebeenshown,onaverage,tobeeighttimes
morelethalthanthosebygroupswithoutsponsors;althoughthisdifferencewasascribedtotheaccess
toarmamentsandtechnologiesmadeavailablebythestatesponsors,itisrelevanttoconsidertheeffects
thatstatesponsorshipcanhaveonthegroupsadoptionofthetechnologiesaswell.182
MiscellaneousExternalActors
Beingfamiliarwithsourcesofsupportisimportantbecausetheyoffercluestothegroupsintentions.
Whenagroupactivelyseeksorreceivesthesupportofregimesororganizationswithaknownviolent
purpose,theriskthattheradicalgroupwillitselfembarkonthepathwaytoviolenceandterrorism
increases.Inaddition,thelikelihoodincreasesthatthetargetsofviolencewillshifttoalignwiththe
goalsofthegroupsbenefactors.183
Furthermore,agroupsconstituentsorsupporterscaneitherdeterorencourageterroristactivity.The
observableindicators[are]:
A. Thegroupreceivessupportfromasourceorsourceswithaknownviolentagenda(e.g.,a
hostilestateoraterroristgroup,suchasIranssupportofHizbullah:
B. Supportersorconstituentsofthegroupexertpressureonthegrouptotakeviolentaction(e.g.,
bythreateningtowithdrawerorshiftsupport).
C. Supportersorconstituentsprovokeviolence,forcingthegrouptoact.
D. Foreignorotherinfluentialsupportersorderthegrouptoundertaketerroristoperations.184
178Jenkins,DefenseAgainstTerrorism,p.776.
179Drake,TerroristsTargetSelection,p.90.
180Jenkins,DefenseAgainstTerrorism,p.778.
181Hoffman,TerroristTargeting,pp.1617.
182Jackson,TechnologyAcquisitionbyTerroristGroups,p.199.
183Post,Ruby,andShaw,RadicalGroupinContext,p.83.
184Ibid,p.83.
UCRL-TR-227068 44
[S]upportcouldstopif[terroristgroups]frequentlyoversteptheboundariesofwhatisdeemedby
theirsupportersorpotentialsympathizerstobeacceptablebehavior.Thus,aswellasprovidingsupport,
therelationshipplaceslimitsontheactivitiesofthegroup.185
Analysis:
Itisclearthatterrorists,iftheywishtoachievetheeffectsthattheirviolentattacksarespecificallyintendedtohave,must
carefullytakeintoaccounttheopinionsofexternalactorswhenselectingtargets.Thisisaboveallthecaseintermsofthe
targetaudienceatwhomtheattacksaredirected,asopposedtothevictimsperse,sincethataudiencemustreceive
themessagethattheperpetratorsintendtoconveyortheiractof violencewillbemeaninglessifnot
counterproductive.However,theymustalsotakeintoaccountthereactionsoftheirsupportersandsympathizers,their
potentialconstituents,otherextremistgroupsintheirarea,andiftheyhavethemsponsoringstates.Needlesstosay,
carryingoutactsofviolencewhichhavetheeffectofalienatingtheterroristsownsupportbasewouldbe
foolish,andtotheextentthattheyaredependentuponexternalsupportfromstates,howevercovertthat
supportmaybe,theycannotaffordtotakeactionsthatthosestatesponsorswillstronglydisapproveof.Inshort,
sinceterrorismisviolenceforpsychologicaleffect,theterroristshavetobeveryconcernedabouttheeffectstheir
actshaveonothers.Thiswillnecessarilyaffecttheirselectionoftargets,andalsooftenthelevelofviolencethey
decidetoemploy.
11)SecurityEnvironment
Thereareveryfewdirectreferencestothesecurityenvironmentintheliteratureandalmostnoneinconnection
withterroristtargetselection:
Terroristsusuallyconsiderseveraltargetsbeforemakingafinaldecision,andhaveoftenmadefinal
decisionsaboutwhomtoattackbecauseanopportunityforattackpresenteditselforbecausethey
perceivedanothertargetwasunapproachable.186
AgroupsuchasalQa`idawillfollowthepathofleastresistanceinitsoperationalplanningand
targetselection,sincetheflowofalQaedaterrorismactivityistowardsweaponmodesandtargets,
againstwhichthetechnical,logisticalandsecuritybarrierstomissionsuccessareleast.187
Advancesintechnologyand,morespecifically,theinterconnectednessandinterdependenciesthey
entailhavemademodernsocietyincreasinglymorevulnerabletoterrorism.Examplesinclude
transportationsystems,tradeandproductdistributionsystems,powergenerationandwaternetworks,
andtheInternet.188
Analysis:
Thereisnodoubtthatthenatureofthesecurityenvironmentwillaffectterroristtargetselection.Afterall,itis
impossiblefortheauthoritiestoprotecteveryconceivabletargetatalltimes,especiallyindemocratic,targetrich
industrializedsocieties,andterroristswilllikelybemonitoringsecurityarrangementscloselytodetermine
whichtargetsofferthemostbangforthebuck,i.e.,thebestcombinationofsymbolicor instrumentalvalue
andvulnerability.Dedicatedterroristswillrarelyifeverceaseplanningandlaunchingattacks,nomatterhowtoughthe
overallsecurityenvironmentbecomes.
185Drake,TerroristsTargetSelection,p.148.
186RobertAFeinandBryanVossekuil,ProtectiveIntelligenceandThreatAssessmentInvestigations:AGuideforStateandLocal
LawEnforcementOfficials(Washington,DC:USDepartmentofJustice,1998),p.20.
187GordonWoo,QuantitativeTerrorismRiskAssessment,RiskManagementSolutionsreport,p.7:
http://www.rms.com/NewsPress/QuantitativeTerrorism_Risk_Assessment.pdf.
188Jackson,TechnologyAcquisitionbyTerroristGroups,p.184.
UCRL-TR-227068 45
However,theymaynotalwaysbeawareofmajororminorchangesinthesecurityenvironmentand,by
extension,maynot correctlyassessthevulnerabilitiesofselectedtargets,whetherasaresultofideological
fanaticism,perceptualblinders,orfaultysurveillance,andifsotheymaywellmakemistakesintheirtargeting.
Moreover,theymaynotalwayshavethenecessaryresourcesorcapabilitiestoattackevenvulnerabletargets
successfully.Yetitistheirperceptionofthesecurityenvironment,whetherornotthisreflectsitstruecondition,
thataffectstargetdecisions.
12)CICharacteristics
Thereareseveralreferencestotheeffectsthattheactualcharacteristicsofthetarget,CIorotherwise,haveon
terroristsdecisionstoattack.Thesefallunderseveralrubricsthat,inmostcases,roughlycorrespondtothe
subfactorsforthiscategory.
General
[A]terroristoraggressorwillanalyzethebuildingortargettodeterminethetypeofattack,type
ofweapon,andtacticstoemploytodefeatthebuildingorcriticalmission/businessfunction.189
LevelofProtection
Schneierusesthetermvulnerabilitylandscapetodescribethelevelofasystemsvulnerabilityto
attack,andsaysthatthisvulnerabilitylandscapecanbeorganizedintothephysicalworld(i.e.,
physicalattacks),thevirtualworld(digitalandcyberattacks),thetrustmodel(insiderproblems),and
thesystemslifecycle.190
Terroristsarelikelytoattacklessprotectedtargetsiftheprotectivemeasuresaroundprimarytargetsare
hardened.191Forexample,thefenceperimeteraroundtheUSconsulateinBaliforcedtheterroriststo
lookforasoftertarget,inthiscaseanightclub,andtheadoptionofprotectivebodyarmorbyBritish
soldierscausedtheIRAtoattackmorevulnerabletargets.192
Theprovisionofbetterprotectionforabuildingwilldecreaseitschancesofbeingattacked,anda
buildingbuilttowithstandattackswilllikelysufferminimaldamageevenifitisattacked.193
SomeCIfacilities,suchasnuclearpowerplants,possessinherenthardnesssincetheyhavestrong
buildings,reinforceddoors,andstructuralstrength.Suchfacilitiesmaywellbelessvulnerableto
terroristattackeventhoughtheymightseemtobeanidealtargetforaterroristattack.194
Increasedprotectionrestrictsaterroristgroupsoptions.Forexample,althoughAumShinrikyowasable
togetawaywithconductingsmallCBWoperationsand tests,increasesinsecurityresultingfroma
greaterawarenessofthethreatwouldhaveposedgreaterrisksforthematalaterdate.195
189FEMA,ReferenceManualtoMitigatePotentialTerroristAttacksAgainstBuildings(Washington,DC:FEMA,2003),
DepartmentofHomelandSecurityRiskManagementSeries,chapter1,p.22.
190Schneier,SecretsandLies,pp.282287.
191GordonWoo,TheevolutionofRiskModeling,JournalofReinsurance(April2003),pp.67.Cf.Drake,TerroristsTarget
Selection,p.117.Cf.PhilipAnderson,ThreatVulnerabilityIntegration:AMethodologyforRiskAssessment(Washington,DC:
CenterforStrategicandInternationalStudies,nodate[2002?]),p.6;andNancyA.RenfroeandJosephL.Smith,
Threat/VulnerabilityAssessmentsandRiskAnalysis,WholeBuildingDesignGuidewebsite,p.2:
http://www/wbdg/org/design/resprint.php?rp=27.
192Woo,UnderstandingTerrorismRisk,pp.89.
193FEMA,ReferenceManualtoMitigatePotentialTerroristAttacks,chapter1,p.21.
194Anderson,ThreatVulnerabilityIntegration,p.6.
195Jackson,TechnologyAcquisitionbyTerroristGroups,p.203.
UCRL-TR-227068 46
Betterprotectionoffacilitiesmayobviatetheneedforgooddetectionandreactionmechanisms.196
Conversely,effectivealarmsystemsandsurveillancemechanismsmightservetodeterterroristsfrom
attackingatarget,sincesuchsystemswillpreventafastandeasypenetrationofitsdefenses.197
Increasedtargetprotectionisunlikely,however,todetersuicideattackers.198
Theleveloftargetprotectioninfluencestheoperationalplanningforanattack.Anincreaseinthe
securitylevelforafacilitymightforceterroriststoinvestmoretimeandmoneysoastoovercomethese
increasedsecuritymeasures.199
Increasedsecuritymeasuresmightalsoleadterroriststoadoptotherhighlydestructivetacticsinorder
toovercomesuchprotectivemechanisms.Forexample,terroristsmightuseaguidedmissiletodestroy
ahighlyprotectedairportwhichseemedimpregnabletoattacksbyvehiclesorhumanagents.200
Thelevelofprotectionofatargetalsoaffectsthedesiredeffectsoftheattack.Aterroristgroupmight
proceedtoattackawellhardenedtargetpreciselyinordertodisplayitsstrengthandcapabilities,garner
increasedpublicity,andadvancethegroupscausebycarryingoutadifficultandsuccessfultask.201
ProfileofTarget
Thepublicprofileofatargetaffectstheselectionoftargets.Drakeobservesthatterroristsarelesslikely
toattacktargetsthatarelessknownamongthepublic.202
Targetswithahighsymbolicvalueorutilityaremoreattractivetoterrorists,andatargets
attractivenessincreasesitslikelihoodofbeingattacked.203
FunctionofTarget
Thefunctionandaffiliationofaparticulartargetinfluencesaterroristgroups targetselection.For
example,apersonopposedtothegovernmentismorelikelytoattackafederalbuildingthanamulti
tenantofficebuilding.204
TargetValue
Theprojectedpolitical,economic,andmilitarycostsanationwillsufferduetothedestructionof,or
damageinflictedon,particulartargetsplaysanimportantroleinterroristtargetselection.Renfroeand
Smithrefertothisasimpactloss,and positthatatargetwithbothahighimpactlossandahigh
degreeofvulnerabilitywouldbeanidealchoiceforterrorists.205
FEMAhasdevelopeda10pointimpactscaletakingintoaccountthehumanandeconomiclossinflicted
asaresultofanattack.Avalueof10signifiesalargenumberofhumancasualtiesandamajorlossof
corefunctionsofthefacility.206
196Schneier,SecretsandLies,p.280.
197Drake,TerroristsTargetSelection,pp.103,108.
198Ibid,p.115.
199Ibid,p.111.
200Jackson,TechnologyAcquisitionbyTerroristGroups,p.208.
201Drake,TerroristsTargetSelection,pp.111112,119.
202Ibid,p.98.
203RenfroeandSmith,Threat/VulnerabilityAssessmentsandRiskAnalysis,p.12.
204Ibid,p.1.
205Ibid,pp.12.
206FEMA,ReferenceManualtoMitigatePotentialTerroristAttacks,chapter1,pp.1314.
UCRL-TR-227068 47
TargetLocation
Thelocationofatargetrelativetotheterroristsbasemightaffecttheoperationalplanningfora
particularattack.Atargetthatisnotinthesameareaasthatoftheterroristsbasemightpromptthe
terroriststouseofftheshelfweaponssystemsanddeliverysystemsforcarryingoutaparticular
attack.207
Analysis:
Thecharacteristicsofparticulartargets,includingCIfacilities,areusuallythemostimportantfactorsinaterroristgroups
decisiontoattackornotattackthosetargets.Nosinglecharacteristicofafacilityislikelytodetermineits
potentialforbeingattacked.Instead,thetotalityofthatfacilityscharacteristicswillnormallyinfluencethe
terroristsdecisionaboutwhetherornottoattackit.Themostimportantcharacteristicsofafacilitythatmay
affectterroristtargetingareitslevelofprotection,whetherornotithasahighprofile(whichisinpartafunction
ofhowmuchmediaattentionithasreceived),anditsactualfunction.Thelevelofsecurityatafacilityisa
particularlyimportantfactor,sinceitnotonlyplaysaroleintheselectionoftargetsbutalsointheattackers
operationalplanning.Allthingsbeingequal,terroristsaremorelikelytoselecttargetsthatarevulnerable.Atthe
sametime,theywishtoattackfunctionallyimportant,highprofiletargetswhosedestructionwillbecostlyto
thehostsociety.Henceakeydecisionmakingfactorisusuallytherelationshipbetweenafacilitysvulnerabilityandits
desirabilityasatarget.Giventhelargenumberandwiderangeofpotentialtargets,terroristswilltendtoavoid
heavilyfortifiedorheavilyprotectedtargetsunlessthesehaveextraordinarysignificance,andinsteadattack
morevulnerabletargets.Thus,ifcertaintargetsareprotectedsowellthattheydiscourageoreffectivelypreventterrorists
fromattackingthem,thenothersthatarelesswellprotectedwillbemorelikelytobeattacked.Thesefactorsare
applicabletoallpotentialterroristtargets,includingthosethatcanbecategorizedasCI.
Afewadditionalobservationscanbemade.First,increasedphysicalprotectionoftargetsincreasesthecosts
ofwouldbeattackersandinsomecasesdetersthemfromlaunchingattacks.Second,thepublicprofileofhighly
criticalCIshould,wheneverpossible,bekeptatverylowlevels,althoughaCIfacilitywhosefunctioning
requiresconstantinterfacewiththepublicunfortunatelycannotescapepublicity.Third,ifitisnotpossibleto
provideprotectiontoparticularfacilitiesallofthetime,randomrotationsoralterationsofsecuritymeasurescan
servetodisrupttheterroristsplansforanattack.Fourth,aCIfacilitywithextraordinarysymbolicvalueismore
likelytobeattackedthanaCIfacilitywithhighutilitybutlesssymbolicvalue.However,targetswithlowsymbolic
valuebutuniqueabilitiestoimpactsociety(suchasachemicalfactorythatcouldreleasehighlytoxicchemicals)
canstillbeattractivetargets.Finally,thelevelofnetworkinganddegreeofembeddednessofaparticular
terroristgroupmightplayanimportantroleinitsabilitytocarryoutattacksonCIfacilitiesthatarenotlocated
closetoitsownoperationalbases.
DecisionMakingFactors
13)GeneralPlanningCharacteristics
Thereisverylittleintheliteraturethatrelatesspecificallytothesubfactorswehaveincludedunderthisrubric.
Themostrelevantpassagessuggestthat:
207 Woo,UnderstandingTerrorismRisk,p.14.
UCRL-TR-227068 48
DecisionMakerTimeHorizon
Terroristdecisionmakersworkinginaccordancewithaspecifictimetableevenifitisaselfimposed
deadline,asinthecaseofcertainapocalypticgroupswhoanticipatetheonsetofArmageddonona
particulardatemayfeeltheneedtoperpetratemoreambitiousattacks,whetherpunitiveorcoercive
innature.Crackdownsbythesecurityforcescanalsoleadtoasenseofurgency:ifagroupfeelsthat
itwillbeindangerinthenearfuture,itmaybemorelikelytoengageinterrorismduetoadecreasein
therangeofperceivedoptions.Agroupmaybemorelikelytoattackifitperceivesathreattogroup
membersorleaders,feelsthattheregimeorotheropponentistryingtodestroyit,orbecomes
paranoidanddefensiveandattackssuspectedtraitors.208
Anincreasedsenseofurgencywithinthegroupmayimpactagroupspropensityforviolence,by(i)
increasingthelikelihoodofanirrationalreaction;(ii)increasingthelikelihoodofflaweddecision
makingregardingtargetedviolence;or,(iii)decreasingthegroupsabilitytoseeanynonviolent
alternativeasaviableoption.209
RiskThreshold
Sophisticated,highimpactconventionalandCBRNattacksgenerallyrequirelongerincubation
periodsthanlowimpactconventionalattacks.Forexample,the1993WorldTradeCenterbombing
wasprecededbyfivemonthsofpreparations;theAumShinrikyoattackin1995wasprecededby
attemptsthatlastedforaboutayear;the1995OklahomaCitybombingplotbegansixmonthsearlier;
theColeattackwasreportedlyplannedforeightortenmonthsandthe9/11attackswerepreceded
byatwoyearincubationperiod.Conventional,lowimpactattacksarepreparedquickly,generallyin
lessthanaweek,sothereisamuchshorterwindowofopportunitytopreemptsuchattacks.210
Incertaincases,onceagroupdecidesonageneralcategoryoftargets,theywillattackassoonasa
specifictargetwithinthatcategorypresentsitself.211
Analysis:
Twolessonscanbedrawnfromtheabove.First,thespecificoperationalobjectivessetbythegroupduringthe
attackplanningprocesscanhaveanobviousanddirecteffectonthedecisionmakerstimehorizon,inthat
certainoftheseobjectivesmaybetimedependent.Anillustrativeexamplecouldbeacaseinwhichaterrorist
decisionmakerwantstoacttoincreasehisgroupsrecruitmentvisvisarivalorganization:ifhedelaystoo
long,hiscompetitorsmaywellendupinductingthebestpersonnelfromamongthepoolofavailablerecruits
andhisgoalofincreasingrecruitmentmayremainunfulfillednomatterhowsuccessfultheattackultimately
turnsouttobe.Second,thedegreeofriskthatagroupiswillingtotakeinordertoconductanysingleattackis
animportantfactorinthesettingofoperationalobjectives.Allelsebeingequal,thegreatertherisktoleranceofa
groupwhenplanninganattack,thegreaterthescaleoftheattackislikelytobe.Acorollarytothisisthatthemore
weddedthegroupistothesuccessofanattackanditsownpreservation(i.e.,theloweritsrisktolerance),the
moreconservativeitsoperationalobjectiveswilltendtobe.Risktoleranceisafunctionofthegroupsideology
andtheexternalenvironment,aswellasothervariables.
208Post,Ruby,andShaw,TheRadicalGroupinContext,pp.9495.
209PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.348.Byextension,asenseofurgencymayalso
promptthegrouptocarryoutmoreextremeviolence.
210TranscriptofPresentationbyDr.JoshuaSinai,inICTConference:ExpertonValue,MethodsofForecastingTerrorist
Incidents,FBIS#GMG20031202000085Israel,9September2003,p.3.
211Drake,TerroristsTargetSelection,p.56.
UCRL-TR-227068 49
14)OperationalObjectives
Thereisagooddealintheliteraturethatdealswithoperationalobjectives.Therelevantmaterialhasbeen
dividedintoseveralsections,including:
General
Operationalobjectiveshelptoprioritizetargets.Drake,whodefinesstrategyasshapingthe
translationofpoliticalobjectivesintoconcreteactions,212maintainsthattherangeoftargetsisrefined
bythestrategyofthegroupconcerned.Thisisimportantbecausebyitsnature,terrorismisamethod
whichwiththeexceptionofexpressiveattacksisintendedtoyieldcertainbenefitsbycausing
peopletoreacttoviolenceorthethreatofviolence.213
Whilstideologysetsouttherangeofpeopleandthingswhichitislegitimatefortheterroriststo
attack,thestrategysetsoutthosetargetswhichtheterroristsbelieveitwillbebeneficialforthemto
attack.Thisdoesnotmeanthattheterroristswillmaketherightdecisionsinthisarea,andwhether
theirstrategicchoicesactuallyprovetobebeneficialisataskforhindsightandhistorians.214
Operationalobjectivesactivelyfurtherideologicalgoals.ThiscanbeinferredfromFeinandVossekuil,
whociteastudycalledtheExceptionalCaseStudyProject(ECSP)thataddressestheissueof
assassinsofpublicfiguresandconcludesthatanindividualsmotivesandselectionofatargetare
directlyconnected.215
Thekeypointisthatterrorismisgrowinginitslethality.Howindividualgroupsachievethatis
partlyaninstrumentaldecision,basedontheobjectivesofthegroup,andpartlyamatterof
opportunism.216
Bothescalatoryandmoderatingfactorsmayaffecttheoperationalobjectivesofterrorists.217
Symbolicvs.Instrumental
Terroristtargetsareoftenchosenfortheirsymbolicvalueratherthanabsolutemilitaryutility.By
symbolicwemeanthatthetargethasaculturalorsocialmeaningbeyonditsfunctionorphysicality
thatcanbeexploitedtopsychologicallyinfluenceaterroristsintendedaudience(s).Terroristtargets
areoftendeliberatelyselectedandmeticulouslytargetedfortheirintrinsicsymbolicvalue.218
Symbolictargetsarethosewheretheprimarymotivefortheattackistopromptareactioninthe
psychologicaltarget.Thiscanbeforanumberofpurposes.Terroristsmayattackatargetsoasto
drawattentiontothegroupandtheircause.However,targetsdonothavetobeprominentinorder
tohaveasymbolicvalue.219
212Ibid,p.176.
213Ibid,p.181.
214Ibid,p.177.
215FeinandVossekuil,ProtectiveIntelligenceandThreatAssessmentInvestigations,p.15.
216Cameron,NuclearTerrorism,p.162.
217Ibid,pp.156157.
218Hoffmann,ModernTerroristMindset,p.2.
219Drake,TerroristsTargetSelection,p.10.
UCRL-TR-227068 50
Publicity
Althoughpublicityisimportant,terroristviolenceisstillcalculatedandcalibratedtoachievepolitical
objectives.Publicityandattentionareofcourseparamountaims;butatthesametimethereisa
consciousrecognitionthatonlyiftheirviolenceisproperlycalculatedandinatleastinsome(however
idiosyncratic)wayregulated,willtheybeabletoachievetheeffect(s)theydesireandthepolitical
objectivestheyseek.220
Aterroristcontemplatinganassaultonnuclearwasteshipmentscouldbelookingfortheactualor
symbolicvalueinattackingsuchmaterials.Theenormousdisruptiontonormalpublicactivities,a
resultingsenseofsocialpanic,and/orthesymbolicvalueofattackingthepowerfulfederal
governmentarebutafewofthepotentialobjectivesforsuchanattack.221
OrganizationBuildingEffects
Highprofileviolencecanbeameansofreshapingpopularperceptionsaboutwhosontop.This,in
turn,hastwoeffectsonmobilization:toboostpopularconfidenceintheoppositionandtodiminish
popularconfidenceinthestate.222
Attackscanbeusedtoacquireorprotectresources,whicharereferredtoaslogisticaltargetsby
Drake.Logisticaltargetsarethosetargetswhichareattackedinordertosafeguardthegroups
resources.223Healsoreferstoendorsementobjectives:Endorsement:attacksaimedatgaining
endorsementarecalculatedtomobilizesupportforthegroupconcerned.224
PunitiveEffects
Punitiveoperationalobjectivessuchasreactionandrevengealsoexist.Terrorismcanbean
emotionalresponsetoasituation,ratherthanapartofanoverallstrategyLubshacitesindignation
asapossiblemotiveforcarryingoutanactofpoliticalviolence.Hedefinesindignationasanattitude
andbehavioralmanifestationsofwrathfulnessbecauseofunworthyorunjusttreatment.Revenge
canalsobeamajormotivationforspecifiedattacks.225
YousefwantedtopunishAmericansfortheirgovernmentssupportofthestateofIsrael.Once
AmericanssufferedinthewayYousefbelievedPalestinianshadsuffered,thentheywouldforcetheir
governmenttostopsupportingIsrael.YousefalsowantedtokillAmericanssotheywouldknowthe
painArabsexperienced.Moreover,hereasoned,maybeAmericanswouldunderstandthattheirlives
arenobetterthanArablives.Andfinally,intheletterthatYousefandhiscoconspiratorssenttoNew
Yorknewspapers,theyclaimedthattheyrepresentedamuchlargermovement,whichhadneverbeen
heardofbeforeandhasneverbeenheardfromsince.RamziYousefwasnotjuststrikingoutattheU.S.
government,buthewasseekingtokillindividualAmericancitizensbecausetheirdeathwouldcause
theAmericanpeopletounderstandtheinjusticethathebelievedArabssufferedfromIsraelandthe
U.S.government.226
220Hoffmann,ModernTerroristMindset,p.8.
221JamesDavidBallard,APreliminaryStudyofSabotageandTerrorismAsTransportationRiskFactorsAssociatedWithThe
ProposedYuccaMountainHighLevelNuclearFacility(CarsonCity,NV:AgencyforNuclearProjects,1998),p.4.
222McCormick,TerroristDecisionMaking,p.485.
223Drake,TerroristsTargetSelection,p.12.
224Ibid,p.42.
225Ibid,pp.1415.
226Parachini,ComparingMotivesandOutcomesofMassCasualtyTerrorism,pp.391392.
UCRL-TR-227068 51
CoerciveEffects
Thestrategicobjectiveswhich[terrorists]setforthemselvesaffectthetargetswhichtheychoose
becausetheyhopethatbyattackingsuchtargets,theywillmaximizethepressureuponthe
psychologicaltargettobehaveinacertainfashion.227
Drakehaspreparedalistofthepsychologicalreactionssoughtbyterrorists,fourofwhichcanbe
consideredcoerciveinnature,whereasthreateliminationlimitstheenemyscapability(butmaybe
inpartcoercive),advertisementislinkedtoobtainingpublicity,andendorsementhastodowith
organizationbuilding.Thefourcoerciveonesarecompliance,disorientation,attrition,and
provocation.Hereishissummarydescriptionofthese:Complianceoccurswhenthephysiological
targetsobeythewilloftheterroristgroupforfearofattacksuponthemselvesoruponpeopleor
objectsofvaluetothemThestrategicobjectiveofdisorientationcanbedifferentiatedfromthatof
complianceinthatwiththelatteronecanobtainrelieffromfearbycomplyingwiththeterrorists
demands,butwiththeformerthereisnocertaincourseofactionwhichwillrelievetheanxietyA
strategicobjectiveofattritionisonewheretheterroristsintendtoerodethewillofthepsychological
targetbyattackingphysicaltargetsonwhichthepsychologicaltargetsetssomevalue.Whilstnot
precludinglargescaleattacks,theemphasisofsuchastrategyisuponacontinualseriesofsmallscale
attacksinthehopethatcumulativelythesewillbreakthepsychologicaltargetsresistance.228
DecreasingEnemyCapabilityEffects
Functionaltargetsarepeopleorobjectswhosedestructionremovesathreattotheterroristgroup.The
mostobviousexamplewouldbethecaseofaterroristbeingconfrontedbyanarmedopponentwhere
hehadtoeitherkilltheopponentorriskbeingkilledorapprehendedthethreatneednotbeso
immediate.Policeorintelligenceofficerswhoareinvolvedwiththeinvestigationofterroristgroups
areaprimetarget.229
PublicityEffects
[T]erroristswishingtogainpublicityfortheircausewillnotprogressfariftheyconfinethemselves
tominoractsofsabotageagainstunimportantbuildingsorinstitutions.Thereforetheywillselect
targetswhereattackswillgainattention.230Indeed,someterroristscarryoutoperationswherethe
primaryaimisthemaximizationofpublicity.231
ProvokingStateRepression
Provocationoccurswheretheterroristgroupcarriesoutattacksinthehopeofmakingthe
psychologicaltargetactinawaywhichwillalienatepeoplewhowerepreviouslyuncommitted,or
possiblyevenunsympathetictowardstheterrorists,aswellaspeoplewhosympathizeswiththem.232
227Drake,TerroristsTargetSelection,p.53.
228Ibid,pp.3943.Thesetermsaremeanttodescribethetypeofreactionsthatthewidertargetaudienceoftheterroristsis
supposedtofeel,anditmaybeveryusefulinsomecontexts.Sincethecurrentframeworkfocusesmoreonthephysicaland
socialeffectsofanattack(seekingcuestoindicateacriticalinfrastructuretarget),weprefertouseaclassificationthat
includesthelatteraspectsandthuswillnotdwellonthedifferencesbetween,say,disorientationandcompliance.
229Ibid,p.11.
230Ibid,p.39.
231Ibid,p.42.
232Ibid,p.41.
UCRL-TR-227068 52
Terrorism,as[Menachem]Beginwellunderstood,canalsobeemployedtoprovoke.Terrorists,asa
generalrule,beginthegamewiththeabilitytoseetheiropponentsbutalimitedabilitytoattackwhat
theysee.Thestate,bycontrast,beginsthegamewithamuchgreaterabilitytoattackwhatitsseesbut
alimitedabilitytoseewhatitwishestoattack.Terroristgroupsenjoyaninformationadvantage;the
stateenjoysaforceadvantage.233
HighProfilevs.LowProfileTargets
Potboilerswhichintherestofthestudyaretermedirritants,arelowlevelattackswheretheaimis
tocauseinconvenienceandaggravationasanigglingremindertothepsychologicaltargetortargets
thattheterroristsareaproblemwhichwillnotgoawayuntiltheyhavegotwhattheywant.Theaim
ofirritantsistokeepupaconstantminimumlevelofaggravationandinconvenience.Spectacularsare
attacksintendedtocauseseriousdamageanddistress.234
Theexposure(andassociatedpoliticalattention)thatagroupreceivesisdirectlyrelatedtotheshock
effectsofitsattacks.Toachievetheseeffects,terroristscontinuetolookforanedge,tacticallyand
technically,thatwillallowthemtocreatethetheatricalkindofeventtheydesire.235
CasualtyLevels
Terrorists,therefore,areattractedtoAmericaninterestsandcitizensabroadpreciselybecauseofthe
plethoraofreadilyavailabletargets;thesymbolicvalueinherentinanyblowstruckagainstU.S.
expansionism,imperialism,oreconomicexploitation,and,notleast,becauseoftheunparalleled
opportunitiesforexposureandpublicityfromperhapstheworldsmostextensivenewsmediathat
anyattackonanAmericantargetespeciallyontheinvolvesciviliancasualtiesassures.236
Themostobviousexplanationforinternationalterrorismsincreasinglethalityisthatpublicattention
isnotasreadilyarousedasitwasinthepast.Thegeneralproliferationofterroristmovementsandthe
consequentincreaseinterroristincidentshavecreatedproblemsforbotholdandespeciallynew
groupswhomustnowcompetewithothersforawideraudienceshare.Terroristshavethereforebeen
forcedtoundertakespectacularandbloodydeedsinordertoachievethesameeffectasmallaction
wouldhavehadtenyouragoandhaveapparentlycometoregardvictimsasanimportant
ingredientofasuccessfulattack.237
TheInfluenceofPreviousAttacks
Avoidstrength,andattackweaknessasymmetricwarfareForAlQaeda,this[idea]maybe
expressedinthesuccinctlanguageofphysicalscienceas:followthepathofleastresistanceresistanceis
adaptivelearning.AlQaedaiseagertolearnfrompastterroristexperiencethesuccessesandfailures
ofattacksperpetratedbyitsownnetwork,andbyotherterroristsaroundtheworld.AlQaedawould
tendtocopycatmethodswhicheitherhaveproventobesuccessful,orareperceivedtohavethe
potentialtobesuccessful.Ifanattackmodehasdemonstratedeffectiveness,orhasthepromiseof
beingeffective,itislikelytobeanattackoption.238
233McCormick,TerroristDecisionMaking,p.484.
234Drake,TerroristsTargetSelection,pp.1011.
235McCormick,TerroristDecisionMaking,p.480.
236Hoffmann,TerroristTargeting,p.17.
237Ibid,p.3.
238Woo,UnderstandingTerrorismRisk,p.7.
UCRL-TR-227068 53
[T]erroristsconsciouslylearnfromoneanother.239
Themoreoftenanattackmodehasbeenused,themorelikelyitistobereusedinanotherterrorist
operation.240
AgentsoverestimatetheirskillsowingtoattributionbiasIndividualsascribetheirpastfailingsto
randomevents,buttheirsuccessestotheirskills.Theconsequenceisthattheirprojectionofthespace
ofeventualitieswillberosyandtheywillunderestimatetheincidenceofpossiblesetbacksPeople
areunawareoftheirowntrackrecordanddonotlearnthattheirpastprojectionsweretoooptimistic
andcorrectforit.241
PsychologicalImpact
Therelationshipbetweenthephysicaltargetwhichisattackedandthepsychologicaltargetwhichis
affectediscentraltounderstandingwhyterroristsattackthetargetswhichtheydoviolenceisnot
necessarilyaimedphysicallyatthepsychologicaltarget,butatmakingitbehaveinaparticularway.
242
Theeventsofthispastautumn[Fall2001]demonstratedthatterroristscoulduseBacillusanthracisto
incitefearandpanicamongthepopulationanddestabilizesocietyslifewithoutcausingalarge
numberofvictims.243
[T]herealimpactofterroristattacksemployingconventionaltacticsandweaponsisoftenmore
psychologicalthanrealbothintermsoflossoflifeanddestructionofinfrastructure.244
PoliticalImpact
Terrorismisactuallyaverydeliberateandplannedapplicationofviolence.Inthisrespect,terrorism
canbeseenasaconcatenationoffiveindividualprocesses,designedtoachievesequentially,the
followingkeyobjectives:
1. Attention.Throughdramatic,attentionrivetingactsofviolence,terroristsseektofocusattention
onthemselvesandtheircausesthroughthepublicitytheyreceive,mostoftenfromnewsmedia
coverage.
2. Acknowledgement.Havingattractedthisattention,andthrustsomeotherwisepreviouslyignored
orhithertoforgottencauseontothestatesor,oftenmoredesirably,theinternational
communitysagenda,terroristsseektoparlaytheirnewfoundnotorietyintowinning
acknowledgement(andperhapsevensympathyandsupport)oftheircause.
3. Recognition.Terroristsattempttocapitalizeontheinterestandacknowledgementtheirviolent
actshavegeneratedbyobtainingrecognitionofboththeirrights(e.g.,acceptanceofthe
justificationoftheircause)andof theirparticularorganizationasthespokesmanofthe
constituencywhomtheterroristspurportto,orinsomecases,actuallydo,represent.
4. Authority.Armedwiththisrecognition,terroristsseektheauthoritytoeffectthechangesin
governmentand/orsocietythatisattheheartoftheir movementsstruggle(e.g.,changein
239Hoffman,ModernTerroristMindset,p.7.
240Woo,EvolutionofRiskModeling,p.6.
241NassimNicholasTaleb,TheBlackSwan:WhydontweLeanthatWeDontLearn?,draftofpaperpreparedfor
HighlandForum#23,January2004,pp.2527.
242Drake,TerroristsTargetSelection,pp.12.
243G.G.Onishchenko,BioterrorismasThreattoBiologicalSecurity:AssessmentofHealthcareInstitutionsPreparednessto
CounteractBioterrorism,CEP20030729000394Moscow,citingVestnikRossiyskoyAkdemiiMeditsinskikhNauk4(April2003),p.
9.
244Anderson,ThreatVulnerabilityIntegration,p.4.
UCRL-TR-227068 54
governmentorintheentirestatestructure,ortheredistributionofwealth,readjustmentof
geographicalboundaries,assertionofminorityrights,etc.).
5. Governance.Havingacquiredauthority,terroristsseektoconsolidatetheirdirectandcomplete
controloverthestate,theirhomelandand/ortheirpeople.
Whilstsometerroristmovementshavebeensuccessfulinachievingthefirstthreeobjectives,rarelyin
moderntimeshasanygroupattainedthelattertwo.Nonetheless,allterroristsexistandfunctionin
hopesofreachingthisultimateend.Forthem,thefutureratherthanthepresentdefinestheirreality.245
Analysis:
Agroupsoperationalobjectivesareshapedbyseveralfactors,chiefamongwhichisthegroupsideology.
Importantelementsagroupmustconsider,inadditiontotheirprimarypurposeforcarryingoutaparticular
attack,are:desiredcasualtylevels,levelofpublicityrequired,whetherthetargetshouldbesymbolicorwhether
aninstrumentaltargetsuffices,thetypeanddegreeofreactionwantedfromvariousaudiences,expected
secondaryeffectsandreactionsofthestateandmembersoftheterroristsperceivedconstituency,andthescale
oftheattack.Competitionwithothergroupscanencouragegreaterattackscale.Intermsofsustainingor
buildinguptheterroristorganizationitself,large,successfulattackscanboostmoraleandexternalsupport.It
maywellbethattoprungterroristgroups(suchasAlQa`ida)havetokeeppushingtheenvelopeintermsof
attackstostayrelevantandontop,whereaslocalgroups,socalledstreetterroristsdonotneedtodo
spectaculars.Inthecontextofunconventionalweapons,theycouldbeusednotonlyasantipersonnelweapon,
butalsotocontaminateandthusmakecertainfacilities/infrastructureunusable,e.g.thepsychologicaleffectsof
RDDs.
15)AttackModalities
Thereareanumberofreferencesintheliteraturetoactivitiesthatfallbroadlyundertheattackmodalitiesrubric.
Mostfallintothegeneralcategory,andonlyafewfallpreciselywithinthevariousidentifiedsubfactors:
General
Thefirstdecisionispoliticaldeterminingappropriateandpossibletargets.Onceasetoftargetsis
decidedon,theymustbereconnoiteredandinformationgatheredonhowtoapproachthetargets,
howtoplacethebomb,howthesecurityoftheindividualsandtheexplosivesneedtobeprotected.
Thenthetimeischosenandthespecifictarget.Nextthere[is]apreliminaryrunthroughinourcase
anumberofpracticesessions246Inshort,determiningtheattackmodalityisgenerallyamultistep
process.
Aterroristgroupschoicesoftargets,tactics,andtimingrepresentitsthreedegreesoffreedom.Itcan
choosewhattargetsitwillattackandwhenandhowitwilldoso.Together,thesechoicesdefinea
groupsoperatingprofile.247
[K]nowledge,weapons,andinformationarenecessaryforasuccessfulattack248
Itisessentialtounderstandweapons,tools,andtactics249
[T]erroristsneedtoknowwhether[atarget]isprotectedinordertogaugethedegreeofforceneeded
toovercomeanyprotectivesecurityReconnaissanceissometimescarriedoutbyaseparateterrorist
unittotheonethatactuallycarriesouttheattack.250
245Hoffman,ModernTerroristMindset,pp.1617.
246Hoffman,ModernTerroristMindset,p.13,directlyquotingaUSleftwingradicalwhospecializedinbombings.
247McCormick,TerroristDecisionMaking,p.496.
248Ballard,PreliminaryStudyofSabotageandTerrorism,p.27.
249FEMA,ReferenceManualtoMitigatePotentialTerroristAttacks,chapter1,p.14.
UCRL-TR-227068 55
Followingthepathofleastresistanceintargetselectionmeansavoidinghardsecure
targetsTelevisionpublicityintheMiddleEastexposingU.S.defensiveweaknessessimplifiesand
shortensthetargetsearchandsurveillanceprocess.251
[M]ost,ifnotall,terroristoperationsrequirealevelofsimplicityandclevernessasfarfromthe
maximumthresholdofcomplexityaspossibleinordertoachievethedesiredoutcomeThis
relationshipbetweensimplicityandsuccessoccursbecauseterroristorganizations,similartomilitary
unitsincombat,becomevulnerabletofactorsoutsidetheirsphereofcontrolassoonasthemission
entersitsexecutionsphase.252
[A]lQaedaterrorismactivityis[directed]towardstheweaponmodesandtargetsagainstwhich
thetechnical,logisticalandsecuritybarrierstomissionsuccessareleast.253
Attributesoftheattackmeanswhichmustbeconsideredinclude:
1. Accuracydegreeofdifficultyindeliveringtheattackmeanstothetarget
2. DestructiveCapacitypayloadsize,weight,speed
3. Flexibilitydegreeofdifficultyinattackcoordinationandpresenceofcontingencyplans
4. Opportunityaccesstothetarget254
ChoiceofWeapons
Themostsignificantconventionalattacksthatproducedmasscasualtiesandmassdestructioninthe
1990sall,unfortunately,demonstratedtheeasewith whichterroristscanprocurethenecessary
materials,fashionthemintopowerfulweapons,anddeliverthemtotargets.255
InsidersandOutsiders
AdversarieshavedifferentlevelsofaccessInsidersmightbelesslikelytoattackasystemthan
outsidersare,butsystemsarefarmorevulnerabletothemAninsiderknowshowthesystemswork
andwheretheweakpointsare.Heknowstheorganizationalstructure,andhowanyinvestigation
againsthisactionswouldbeconducted.Hemayalreadybetrustedbythesystemheisgoingtoattack.
Aninsidercanusethesystemsownresourcesagainstitself.Inextremecasestheinsidermighthave
considerableexpertise,especiallyifhewasinvolvedinthedesignofthesystemsheisnow
attacking.256
Analysis:
Dependinguponthenatureofthattarget,particularweaponsandtacticalapproacheswillbechosenthatseem
mostlikelytoenabletheterroriststoa)carryoutasuccessfulattackandthence,exceptinthecaseofsuicide
bombers,b)escapewithoutbeingkilledorapprehended.Inshort,thenatureofthetargetitselfisthemostdecisive
factorindeterminingthechoiceofmodalitiesusedtoattackit,althoughtherangeofthosemodalitiesisalsolimitedtosome
extentbytheexistingcapabilitiesofthegroup.
E.Conclusion
250Drake,TerroristsTargetSelection,pp.6162.
251Woo,ThealQaedaWarGame,p.1.
252Palfy,WeaponSystemSelection,p.87.
253Ibid,p.1.
254Anderson,ThreatVulnerabilityIntegration,p.5.
255Parachini,ComparingMotivesandOutcomesofMassCasualtyTerrorism,p.391.
256Schneier,SecretsandLies,pp.42,48.
UCRL-TR-227068 56
Giventhattheliteraturesampleexaminedwasrestrictedtogeneraltreatisesonterrorism,anddidnotinclude
studiesofparticularterroristgroups,webelievethatthereismuchofvaluetobefoundinwhatisanadmittedly
preliminaryanalysisofinfluencesonterroristmotivationstoattackCI.Thefollowingchapterattemptsto
informthisanalysiswhichillustrateshistoricalexamplesofterroristattacksagainstCI.
UCRL-TR-227068 57
Chapter3:HISTORICALRECORDAND
SELECTEDCASESTUDIES*
A.Introduction
Theimportanceofcarryingoutindepthqualitativeresearchaspartofanyseriousefforttoassessthe
motivationsofterrorists,whetherforattackingCriticalInfrastructure(CI)orothersortsoftargets,cannotbe
overemphasized.InadditiontoattemptingtodiscernterroristmotivationsforattackingCIbyadoptingamacro
viewpoint,whichamongotherapproachesmayinvolveconsultingtheexistingsecondaryliteraturetodetermine
theconsensusofscholarsworkinginthefieldand/orcreatingmodelstoweighthevariousfactorsthatseemto
indicatetheproclivitiesofterrorists,athoroughanalysisisincompletewithoutamicroapproachbasedonthe
carefulexaminationofwhatreallyexistingterroristgroupshaveactuallydone.Itisonlyafterexaminingthe
actionstakenbydiverseterroristgroupsinconsiderabledetailthatonecanhopetodrawgeneralconclusions
thathaveafirmbasisinreality.
Duetotemporalconstraintstheprojectteamwascompelledtolimitthedepthsofthisapproachinitseffortsto
shedlightonpastandpresentterroristmotivationsforattackingCI.Nonetheless,theprojectteamselectedcase
studiesthatwereassessedtohighlightasmanysalientpointsaspossible.Theprocedureadoptedbelowisfirst
todiscussgeneralhistoricalpatternsofterroristattacksonCI,focusingbothonthetypesofgroupsthathave
madesuchattacksandonthetypesoftargetstheyhaveattacked.Inordertoillustratethesegeneralpatterns,we
thenprovideseveralcasestudieswhichwereselected,notsomuchbecausetheywereconsidered
representativeasbecausetheyservedtoillustratecertainproblemsand/orilluminateimportantfactorsinthe
analysisofterroristmotivationsforattackingCI.Onthebasisofthiscombinationofageneralanalysisofpast
terroristattacksonCIandcasestudies,togetherwithadditionalinformationthatcanbegleanedaboutmore
recentpatternsofterrorismandthreatstoCI,theconclusiontothischapteroffersapreliminaryassessmentof
likelypresentandfuturethreats.
B.HistoricalPatternsofTerroristAttacksonCI
IfonehopestobeabletoforecastpotentialfutureterroristattacksonCIwithanydegreeofaccuracy,itisfirst
necessarytoobtainabetterunderstandingofwhysuchgroupshavepreviouslyoptedtoattackCI.Inthis
sectionananalysisofgeneralpatternsofpriorsubnationalattacksonCIwillbefollowedbyafewselectcase
studiesofgroupsthatconsciouslychosetoattackinfrastructuraltargets.
GeneralPatternsofNonStateActorAttacksonCI
ToshedfurtherlightonwhycertaintypesofterroristgroupsmightbemoreinclinedtocarryoutCIattacksthan
others,itisprobablymostusefultodividethepostWorldWarIIhistoryofterrorisminto1)anearlierera
dominatedbysecular(oratleastsecularized)politicalterroristorganizationsdemandingpoliticalindependence
orespousingutopianrevolutionaryideologies,whetheroftheleftorright;and2)amorerecentperiodinwhich
religiousterrorism,i.e.,terrorisminspiredbyreligiousdoctrinesandimperatives,hascometothefore.257
*
ThischapterwaswrittenbyJeffreyM.Bale,exceptforthesectiononChukakuHa,whichwaswrittenbyKevinS.Moran;
thesectionontheIndianParliamentAttack,whichwaswrittenbySundaraVadlamudi;thesectiononRadicalEcology
Groups,whichwaswrittenbyGaryAckermanandKevinS.Moran;andtheTentativeConclusionssection,whichwas
writtenbyKevinS.MoranandSundaraVadlamudi.
257Cf.BruceHoffman,InsideTerrorism(NewYork:ColumbiaUniversity,1998),pp.8795.
UCRL-TR-227068 58
Duringthislatterperiod,asurgeofreligiousfanaticismhasmanifesteditselfinspectacularactsofterrorismall
acrosstheglobe[a]waveofviolencethatisunprecedented,notonlyinitsscopeandtheselectionoftargets,
butalsoinitslethalityandindiscriminatecharacter.258Itmaywellbethatthefactorsaffectingdecisionsto
attackCIdifferedsomewhat,andincertainrespectsperhapsquitesignificantly,duringthesetwoeras.
Asnotedearlier,thefirstofthesetwoperiods,whichlastedroughlyfromthemid1960stotheearly1980s,was
dominatedontheonehandbynationalist/separatist/irredentistterrorismandontheotherbyideologicalleft
andrightwingterrorism.Onewouldthereforeexpecttofindthatterroristgroupswithinthosecategorieshad
carriedoutmoreattacksagainstCIthantherelativelyfewandinsignificantgroupsofviolentreligious
extremistsduringthatera.Onecouldalsopredictthatasreligiousterrorismresumeditsimportancefromthe
mid1980stothepresentday,theproportionofCIattackscarriedoutbyreligiousterroristswouldalsorise.
Indeed,whenoneexaminesthedescriptivestatisticsconcerningthenumberofCIattackscarriedoutby
differenttypesofterroristgroups(seeChapter4),thesesuppositionsturnouttobequitecorrect.
CaseStudyIllustratingtheMethodologicalProblemsInvolvedinCategorizingTerrorist
AttacksasAttacksonCI
BeforeturningtothreecasestudiesinwhichparticularterroristgroupsspecificallytargetedCI,anexample
shouldbeprovidedthatservestoillustratethemethodologicalproblemsinvolvedincategorizingterrorist
attacksasinfrastructuralinthefirstplace.Intheory,keygovernmentfacilitiesclearlyfallintothecategoryofCI,
butinrealitymostoftheattackslaunchedagainstsuchfacilities,includingoverseasembassies,arenotprimarily
intendedtodisrupttheirfunctioning.Onthecontrary,terroristsgenerallyhavemultiplemotivesforattacking
suchtargets(e.g.,theMurrahFederalBuildinginOklahomaCityortheWorldTradeCenter),theleastofwhich
istointerferewiththeoperationofacountrysvitalinfrastructure.Althoughthismaywellbeoneoftheir
reasonsforlaunchingattacksofthissort,theirprincipalmotiveisnormallyeithertoattackahighprofile
symbolictargetsoastotraumatizeacountryspopulacepsychologically,orsimplytokilllargenumbersof
people,perhapsespeciallygovernmentofficials.Thefollowingcase,theDecember2001attackbyKashmiri
IslamistsontheIndianParliament,isanexcellentexamplewhichperfectlyunderscorestheproblemsinvolved
withidentifyingparticularattacksasinfrastructuralinthenarrowestsenseofthatterm.
TheIndianParliamentAttack
On13December2001,suspectedmembersoftheJaisheMohammed(JEM:ArmyofMuhammad)militants
attackedtheIndianParliament,killing9peoplebeforebeinggunneddownbysecuritypersonnelguardingthe
building.TheattackcouldbeconstruedasanattackagainstCIsincethelegislativebodyinIndiaisinstrumental
inensuringtheContinuityofGovernment(CoG).TheattackontheIndianParliament,asoutlinedinthe
followingsections,wasaimedatwipingouttheIndianpoliticalleadershipanddeliveringamessageofstrength
andresolvebyattackingasymbolictarget.
258MagnusRanstorp,TerrorismintheNameofReligion,inTerrorismandCounterterrorism:UnderstandingtheNewSecurity
Environment,ed.byRussellD.HowardandReidL.Sawyer(Guilford,CT:McGrawHill,2002),p.122.Thisarticleoriginally
appearedintheSummer1996issueoftheJournalofInternationalAffairs.Ofcourse,asDavidRapoportandmanyothershave
pointedout,religiousmotivationshadlongservedastheprimaryinspirationforterrorism,andinthatsensetheirrecent
floweringinvirulentnewguisesisonlysurprisinginsofarastheyhavepartiallydisplacedsecularmotivationsthatwere
oncethoughttosignalthedeclineofreligiosity.Alas,sincethemid1970stherehasbeenanunanticipatedresurgenceof
religiosityinmanypartsoftheworld.See,e.g.,GillesKepel,TheRevengeofGod:TheResurgenceofIslam,Christianityand
JudaismintheModernWorld(UniversityPark:PennsylvaniaStateUniversity,1994).
UCRL-TR-227068 59
ThefollowingsectionswilldiscussthegeneralcharacteristicsoftheJEM,thedetailsoftheattackontheIndian
Parliament,andpresentsomeconclusionsdiscussingthechallengesposedbyattacksagainstCItargetsthatare
notprimarilyaimedatinterferingwiththesocioeconomicactivitiesofthepopulation.Twopointsneedtobe
clarifiedpriortosummarizingtheattackontheIndianParliament.Thefirstistheidentityofthe terroristgroup
involvedintheattack.Intheinitialdaysfollowingtheattack,IndiablamedthemilitantgroupLashkare
Tayyiba(LET:ArmyoftheRighteous)fororchestratingtheattack.IndiasMinisterforExternalAffairsJaswant
Singhsaidthatthereiscredibletechnicalevidencethatyesterdaysterroristattackwasthehandiworkof
terroristorganizationlashkaretoyeba(sic).259TheLET,however,deniedthecharges.260BoththeU.S.State
DepartmentandtheIndianDeputyPrimeMinisterL.K.AdvaniinastatementintheIndianParliamentafterthe
attackindicatedthattheattackwascarriedoutbytheJEMandtheLET.261However,aswillbeoutlinedbelow,
theattackwascarriedoutbyJEMmembersandtheLETonlyprovidedsomelogisticalsupportfortheoperation.
Hence,onlythecharacteristicsoftheJEMwillbedetailedherein.
Second,someconfusionstillexistsabouttheprecisenumberofattackers.Newsreportshaveclaimedthesizeof
theattackteamtobebetweenfiveandseven.262TheofficialstatementissuedbytheHomeMinisterL.K.Advani
indicatesthat5personsattackedtheParliament,andthisfigurewillbeusedasthebasisforouranalysis.
GroupCharacteristicsJaisheMohammed(JEM).JaisheMohammedisanIslamistmilitantgroupbasedin
Pakistan.TheJEMwasformedbyMaulanaMasoodAzharbetweenJanuaryandMarch2000followinghis
releasefromIndiancustodyonDecember31,1999inexchangefor155hostagesinthehijackingofIndian
AirlinesFlightIC814.ThegrouphasmainlycarriedoutattacksinJammu&Kashmir,thesoleexceptionbeing
theattackontheIndianParliament.TheJEMwasincludedinboththeUSTreasuryDepartmentsOfficeof
ForeignAssetControl(OFAC)listinOctober2001andtheUSStateDepartmentForeignTerroristOrganizations
listinDecember2001,andithassincebeenrenamedKhuddamulIslam.Atthetimeoftheattack,however,the
groupwasstillknownasJEM.263
JEMadvocatesaviolentstruggletoliberateKashmirfromIndia.ApartfromliberatingKashmir,JEMalso
propagatesapanIslamicagendaaimedatliberatingMuslimsworldwide.PriortotheattackontheIndian
Parliament,JEMcarriedoutanattackontheKashmirStateAssemblyinOctober2001,killing38people.The
planofattackontheIndianParliamentwassimilartotheattackontheKashmirStateAssembly.JEMclaimed
responsibilityfortheattackontheKashmirStateAssemblybutretractedthatclaimthenextday.However,the
groupdidnotclaimresponsibilityfortheattackontheIndianParliament.
Aclearpictureofthegroupsorganizationalstructureisdifficulttoportrayowingtothesecretivenatureofthe
groupandtheconstantchangesinitshierarchy.MaulanaMasood AzharistheAmirandthefounderoftheJEM.
259IndiaBlamesPakistanbasedMilitantGroupsforAttackonParliament,DeutschePresseAgentur,December14,2001.
260LeTdeniesInvolvementinAttackonIndianParliament,PressTrustofIndia,December14,2001.
261AppendixA:ChronologyofSignificantTerroristIncidents,2001,PatternsofGlobalTerrorism,U.S.DepartmentofState,
http://www.state.gov/s/ct/rls/pgtrpt/2001/html/10252.htm(AccessedonJuly21,2004);IndiaAccusesPakistanof
InvolvementinTerroristAttackonParliament,BBCMonitoringSouthAsia,December18,2001.
262SeveninSuicideAttack,notFive,TheStatesman(India),December15,2001;ConfusionOverPresenceofaSixth
Terrorist,PressTrustofIndia,13December2001;NumbersMystery,TheStatesman(India),December17,2001.
263JaisheMohammed(JEM)(ArmyofMohammed),AppendixB:BackgroundInformationonDesignatedForeignTerrorist
Organizations,PatternsofGlobalTerrorism2001,U.S.DepartmentofState,
http://www.state.gov/s/ct/rls/pgtrpt/2001/html/10252.htm#jem(AccessedonJuly21,2004);JaisheMohammadMujahideen
ETanzeem,SouthAsiaTerrorismPortal(InternetSite),http://www.satp.org.
UCRL-TR-227068 60
Thefollowingdescriptionisanattempttoshedatleastsomelightonthegroupsstructure.
MaulanaMasoodAzharFounderandAmir(Commander)
MaulanaMuhammedYousufLudhianviCoFounder(killedinMay2000)
MaulanaNizamuddinShamzaiCoFounder(killedinMay2004)
MaulanaAbdulJabbarNazim,MilitaryAffairs(wasbannedfromJEM,thenformedasplinter
groupcalledJamaatulFurqan)
MaulanaSajjidUsmanFinanceChief
MaulanaQariMansoorAhmedNazim,Propaganda
OtherorganizationalpostsindicateanorganizationalstructurewithregionalbranchesinPakistanoccupied
Kashmir(POK),Jammu&Kashmir,Punjab,andKarachi.264
TheStateDepartmentsPatternsofGlobalTerrorism2003estimatestheJEMscadrestrengthatseveralhundred
armedmen.265Theactualnumbermaybeseveraltimesasgreat.Thegroupsmembersreportedlycomprise
PakistanisandKashmiris,aswellasAfghansandArabswhofoughtintheAfghanwarduringthe1980s.266
JEMhasrenameditselfseveraltimestoavoidofficialsanctions.Immediatelyfollowingtheattackonthe
KashmirStateAssembly,JEMwasrenamedTehrikulFurqaahtoavoidtherepercussionsofitsinclusiononthe
USlistofForeignTerroristOrganizations.267JEMwasrenamedasKhuddamulIslaminMarch2003.268InJuly
2003,JEMsplintered.Thebreakawaygroup,ledbyMaulanaAbdulJabbar,formedtheJamaatulFuqran.269
JEMadherestotheSunniDeobandiideology,andasaresulttheroleofwomenintheorganizationcanbe
assumedtobelimitedifnotnonexistent.JEMsattackshavenotinvolvedwomen,andinformationontherole
ofwomeninotherorganizationalactivitiesislargelynonexistent.JEMrecruitsmostofitsmembersfromthe
Madrassahs(Islamicseminaries)inPakistan.Theorganizationsseniorpositionsareheldeitherbyveteransof
theAfghanconflictorbyseniorIslamicmullahs.JEMmembersarebelievedtobeproficientintheuseoflight
andheavymachineguns,assaultrifles,mortars,improvisedexplosivedevices,androcketpropelledgrenades.270
JEMwasthefirstmilitantgrouptointroducesuicideattacksinKashmir.271EversinceitinitiatedtheFidayeen
(suicideattack)tacticinKashmirinApril2000,anaverageofone suicideattackpermonthhasoccurredinthe
state.272JEMhadalargetrainingcampintheNorthWestFrontierProvincecapableofhandlingbetween800
1,000volunteers,273anditalsooperatedtrainingcampsinAfghanistanuntiltheAmericanledinvasionof
Afghanistanin2001.274
264JaisheMohammadMujahideenETanzeem,SouthAsiaTerrorismPortal(Website);K.Santhanamet.al.,Jihadisin
JammuandKashmir:APortraitGallery,(NewDelhi,London:SAGEPublications,2003),pp.196197.
265JaisheMohammed(JEM)(ArmyofMohammed)a.k.a.TehrikulFurqaah,KhuddamulIslam,
AppendixB:BackgroundInformationonDesignatedForeignTerroristOrganizations,PatternsofGlobalTerrorism2003,U.S.
DepartmentofState,http://www.state.gov/s/ct/rls/pgtrpt/2003/31711.htm(AccessedJuly21,2004).
266Ibid.
267JaisheMohammedadoptsnewname,Rediff(InternetSite),http://www.rediff.com/us/2001/oct/11ny24.htm(Accessed
July23,2004).
268Jaish,HarkatChangeNames:Report,Rediff(InternetSite),http://www.rediff.com/news/2003/mar/12pak.htm?zcc=rl.
(AccessedJuly23,2004).
269SouthAsiaIntelligenceReview:WeeklyAssessments&Briefings,Vol.1,No.51(July7,2003).
270JaisheMohammed(JEM),AppendixB,PatternsofGlobalTerrorism2003.
271K.Santhanamet.al.,JihadisinJammuandKashmir,p.201.
272PraveenSwami,ProfileofaTerrorOutfit,Frontline,Vol.18,No.26(December22,2001January04,2002).
273K.Santhanamet.al.,JihadisinJammuandKashmir,p.200.
274JaisheMohammed(JEM),AppendixB,PatternsofGlobalTerrorism2003.
UCRL-TR-227068 61
JEMiswellconnectedtothereligiouspoliticalpartiesinPakistan,Islamicorganizations,theTaliban,alQa`ida,
SunnisectariangroupsinPakistan,andothermilitantorganizationsfightingIndiansecurityforcesinIndian
administeredKashmir.JEMsfoundationwassupportedbyMuftiNizamuddinShamzaioftheMajliseTawan
eIslami(MT),MaulanaMuftiRashidAhmedoftheDarulIftaewalIrshadandMaulanaSherAliofthe
SheikhulHadithDarulHaqqania.AmongtheIslamicpoliticalparties,itisassociatedwiththeJamiatUlemae
IslamFazlurRahmanfaction(JUIF).JEMisalsobelievedtopossesslinkstotheSunnisectariangroupsSipahe
SahabaPakistan(SSP:SoldiersoftheCompanionsoftheProphetMuhammad)andtheLashkareJhangvi(LJ:
ArmyofJhangvi).ItsharesresourceswithothermilitantgroupsoperatinginKashmirsuchasHarkatulJihadi
Islami(HUJI:IslamicJihadMovement),HarkatulMujahideen(HUM:MovementofHolyWarriors),andLET.275
JEMssupportersaremainlyPakistanisandKashmiris,withitssupportbaselocatedprimarilyinPakistan,
PakistanadministeredKashmir,theDodadistrictinKashmir,andthesouthernpartsofKashmir.JEMdrawsa
largenumberofsupportersfromthemadrassahsinPakistan.LikeotherterroristgroupsoperatinginKashmir,
JEMcanbeconsideredtobegenerallyfamiliarwiththepopulationintheregion.
JEMissuspectedofreceivingsupportfromPakistansintelligenceservice,theInterServicesIntelligence(ISI)
agency.IndianauthoritieshaveclaimedthatPakistansISIrecruits,trains,andsendsmilitantsacrosstheborder
toconductterroristattacksinIndianadministeredKashmir,butPakistaniauthoritiesdenythecharges.276JEM,
likeothermilitantgroupsfightinginKashmir,enjoyswidespreadsupportamongtheIslamicpartiesand
militantgroupsinPakistan,certainsectionsofthePakistanigovernment,andsomepercentageofthepopulation
inIndianadministeredKashmir.EventhoughspecificinformationonJEMscollaborationwithcriminalgroups
isnotreadilyavailable,suchapossibilitycannotberuledout,sincePakistanssectarianextremistgroupsand
drugtraffickershavehelpedoneanothertoadvancetheirrespectiveinterests.
PhysicalCharacteristicsoftheIndianParliament.TheIndianParliamentestatecoversabout6acresandhas3layers
ofsecurity.Theattackerswereabletobreachthefirstlayerofsecurity,butwerekilledbeforetheycould
penetratethenexttwolayers.The3tieredsecuritysystemconsistsofabout1,250personneldrawnfromthe
DelhiPolice(200),theCentralReservePoliceForce(850),and theParliamentsunarmedWardandWatch
(W&W)staff.277
PlanningandExecution.TheattackwascarriedoutbyfiveJEMmilitantscodenamedMohammad,Rana,
Raja,Tufail,andHamza.ThegroupwasledbyMohammad.Thecollaboratorsintheschemewere
ShaukatAhmadAnsari,AnsariscousinMohammadAfzalAnsari,andSyedAbdulRahmanJeelani,alecturer
attheZakirHussainCollegeinNewDelhi.MohammadAfzalAnsari,aformermemberoftheJammuand
KashmirLiberationFront(JKLF),amilitantorganizationfightingforKashmirsindependence,becameinvolved
intheconspiracyinmidFebruary2001,whenhewasorderedbyJEMsoperationschiefinKashmir,GhaziBaba,
tosetupabaseinNewDelhitofacilitatetheorganizationsactivities.Thefivememberteamwasdispatchedto
Indiainmid2000toidentifypotentialtargetsforattack.MohammadTariq,GhaziBabasdeputy,wasordered
toliaisewiththeteam.ForreasonsunknowntoIndianintelligenceofficials,Mohammad,theteamsleader,is
believedtohavedecidedtoattacktargetsinNewDelhi.HearrivedinNewDelhiinmidNovember(according
tosomereports,October),whereasothermembersoftheteamfollowedlater.TheAnsaricousinsandJeelani
providedassistancebylocatinghousingandhelpingtosetupthebaseinNewDelhi.TheAnsaricousinsalso
assistedintransportingthecellmembersandtheirarmsfromKashmir.
275JaisheMohammadMujahideenETanzeem,SouthAsiaTerrorismPortal;JaisheMohammed(JEM),AppendixB,
PatternsofGlobalTerrorism2003.
276IntheSpotlight:JaisheMohammed(JEM),CenterforDefenseInformation(CDI)TerrorismProject
http://www.cdi.org/terrorism/jempr.cfm(AccessedJuly21,2004).
277SayantanChakravarthyetall,TheDayIndiawasTargeted,IndiaToday,December24,2001.
UCRL-TR-227068 62
ThearmsusedintheattackwerebroughtfromKashmirandincluded4AK47rifles,3pistols,12magazines,1
grenadelauncher,15shells,15handgrenades,2packetsofdetonators,radioactivateddevices,and2wireless
sets.However,materialslikeammoniumnitrate,sulfur,andaluminum,whichwereneededforbuilding
explosives,wereboughtinNewDelhi.Indianinvestigatorsbelievethatthearmswereacquiredandsuppliedby
LashkareTayyiba.Theagreementoncooperation,thoughunconfirmed,isbelievedtohavebeenfinalized
betweenJEMsAmirMasoodAzharandLETsoveralloperationscommanderZakiurRehman.Investigators
believethatthegroupdecidedtoattacktheParliamentinsteadoftheIndiraGandhiInternationalAirport
becausetheParliamentaffordedbetterchancesofpenetrationwithacarresemblingagovernmentowned
vehicle.Indianinvestigatorsalsobelievethatthefinancesfortheoperationwerecoordinatedbycontacting
hawalaoperatorsinGermany.278
JEMhasusedsuicideattackstocausethemaximumnegativeimpactonthesecuritysituationinKashmir.Ina
typicalfidayeenattack,JEMmilitantswouldstormthetargetandthenfortifythemselvesinsideit.Afterthe
membersgainentrytothetarget,JEMmembersattempttokillasmanysecuritypersonnelorciviliansas
possiblebeforetheyarekilledthemselves.Insomeinstances,theattackerscausedmaximumdamageandthen
managedtoescapefromthesecurityforces.279
FivemembersoftheJEMenteredthepremisesoftheIndianParliamentbyposingassecurityescortstoa
parliamentarian.TheattackersusedawhiteAmbassadorcar(commonlyusedbythesecurityagencies)witha
flashingbeaconandastickeridentifyingthevehicleasbelongingtotheHomeMinistry.Thecarwaspacked
with30 kgofRDX,possiblyforcausinganenormousexplosiontogainentryintothebuilding.Afterbreaching
thefirstlayerofsecurity,thecaraccidentallyhitoneoftheescortvehiclesoftheVicePresident,uponwhicha
securityescortfortheVicePresidentengagedtheattackers.Theattackersgotoutofthecarandbeganfiring
indiscriminatelywhilelobbinggrenadesatthesecuritypersonnel.TheParliamentarysecuritypersonnel,
watchingtheunfoldingcommotion,immediatelyorderedtheentrygatestotheParliamenttobeclosed,thereby
blockingtheattackersentryintothemainbuilding.Theattackerstargeted3differentgatesofthebuilding,but
all5militantswerekilledbysecuritypersonnelbeforetheycouldreachthegates.280
TheattackersgatheredinformationregardingthetargetbyconductingsurveillanceoftheParliamentbuilding
andtakingpicturesofthebuildingusingadigitalcamera.Thesepictureswerelaterfedintoalaptopcomputer
togenerateavisualtopographyofthebuilding.Handdrawnmapswerealsousedtoplantheattack.A
ParliamentaryStaffmemberwasarrestedforpassingimportantdocumentstoaPakistaniembassyofficialand
duringtheinvestigationthestaffmemberrevealedthatthisPakistaniembassyofficialhadenquiredaboutthe
securityarrangementsattheParliament.TheroleofthePakistaniembassyofficialintheattackstillremains
unclear.281
278India:InvestigatorsCrackContoursofParliamentAttack,Businessline,December17,2001;inProquest,ProQuest
DocumentID:95558303,December17,2001,http://proquest.umi.com;MohammadAfzal:CandidCanary,IndiaToday,
December31,2001;PraveenSwami,OntheTerroristTrail,Frontline,Vol.18,No.26,(December22,20014January2002);
JeMCarriedoutParliamentAttackwithISIGuidance,PressTrustofIndia,December16,2001;Followingisthe
ChronologyofEventsLeadingtotheAttackonIndianParliamentonDecember13,December16,2001.
279JaisheMohammadMujahideenETanzeem,SouthAsiaTerrorismPortal,http://www.satp.org.
280SuicideAttackonParliament,SixSecuritymenamong12Killed,ThePressTrustofIndia,December13,2001;Nirmala
George,TerroristAttackonIndianParliamentleaves12ConfirmedDead,TheAssociatedPress,December13,2001;A
MinutebyMinuteAccount,TheHindu(India),December14,2001.
281MilitantsPosedasTouriststoTakeSnapsofParliament,PressTrustofIndia,December23,2001.LaptopwasUsedby
TerroriststoGenerateMapofParliament,PressTrustofIndia,December19,2001.PoliceProbingLinkBetweenDec13
AttackandPHCStaffer,PressTrustofIndia,December24,2001,HarbakshSinghNanda,IndiaExpelsPakistaniEmbassy
Staffer,UnitedPressInternational,December24,2001.
UCRL-TR-227068 63
Conclusions.TheattackontheIndianParliamentisindicativeofthedifficultiescommonlyfacinganalystswho
areattemptingtostudyterroristmotivationsforattackingCI.Mostoftheattacksoncriticalinfrastructureare
notsolelyaimedtodisruptordestroythefunctioningofthevitalinfrastructuresneededtoensurethesupplyof
socioeconomicgoodsandservicestothenation.Mostoften,attacksagainsthighprofiletargetshaveseveral
purposesotherthandisruption,destruction,anddistraction.TheattackonCImightalsoserveasasymbolic
attack.TheattackersoftheIndianParliamentplannedtokillasmanyMembersofParliament(MPs)aspossible.
AfzalAnsari,oneofthecollaboratorsfortheattack,informedtheinvestigatorsthatMohammedwas
instructedtocausemaximumkillinginsidetheParliament.282Indianinvestigatorshavealsospeculatedthatthe
terroristsplannedtotakesomehostages,afactborneoutbythepresenceofdryfruitsandropeamongthe
terroristspossessions.283AccordingtoanIndianintelligenceofficer,theterroristsuseofcellphonesuntilthe
veryendcouldbeexplainedbytheirintentiontousethemduringthehostagenegotiations.284
AnyoutcomewouldhaveseverelyaffectedtheabilityoftheIndianParliamenttoconductitsessential
legislativetasks.TheattackontheParliamenthadanimmediateeffectonthenationsstockmarkets.The
BombayStockExchange(BSE)sufferedanintradaylossof132pointsimmediately afterthenewsoftheattack
brokeout.However,thestockmarketrecoveredlaterinthedayandsufferedanetlossofonly23pointsover
thepreviousday.TheIndianrupeefellbyabout6paiseagainsttheUSDollar.285Itishighlyunlikelythatthe
dominantmotivefortheattackwastodisruptthelegislativeprocess.Theattackhadmoretodowiththe
symbolicnatureoftheIndianParliamentthanitslegislativefunction.However,therippleeffectsoftheattack
causedminordisruptionsintheeconomicmarketsandtheattack,ifithadsucceeded,wouldhaveseverely
disruptedthefunctioningofthecountry.TheIndianPrimeMinisterAtalBehariVajpayeerightfullyobserved
that[the]ParliamentHousewasselectedinawellthoughtoutplanbecausetheterroristsalsounderstandthat
theparliamentistheheartoftheIndianRepublic,whichalsorepresentsthewholecountryandistheaxisofthe
nationalunity.286
ThecaseoftheattackontheIndianParliamentindicatesthat,whenassessingattacksagainstCItargets,all
possiblemotivesneedtobeconsidered,notjustthosespecificallyaimedatdisruptingorcripplingthe
functioningofthenationsinfrastructure.
CaseStudiesofTerroristGroupsthathaveFocusedonAttackingCI
InordertofleshoutthebasicstatisticalpicturepaintedbytheCrITICDatabaseanddiscussedinChapter4,a
fewexamplesofspecificterroristgroupsthathavepreviouslyfocusedonCItargetsshouldbebrieflydiscussed.
ThismayhelptoprovidesomeindicationsofvariousmotivesforfocusingonCI,whichmaythenassistanalysts
indeterminingwhattypesofgroupsmaycarryoutfutureattacksofthissort.
282MilitantshadInstructionstoMowdownMPs,PressTrustofIndia,December20,2001.
283WereTerroristsPlanningaProlongedStay,ThePressTrustofIndia,December13,2001;inLexisNexisAcademic
Universe,December13,2001,http://web.lexisnexis.com.
284CeliaW.Dugger,IndiasaysArrestsLinkMilitantsinPakistantoAttack,TheNewYorkTimes,December17,2001;in
LexisNexisAcademicUniverse,December17,2001,http://web.lexisnexis.com.
285SensexDownonBombayStockExchange,XinhuaGeneralNewsService,December13,2001;inLexisNexisAcademic
Universe,December14,2001,http://web.lexisnexis.com;India:StocksShiverbutRecover,BusinessLine,December14,
2001;inLexisNexisAcademicUniverse,December14,2001,http://web.lexisnexis.com.
286IndianPrimeMinisterAdvocatesDiplomacyFirstinWakeofAttackonParliament,BBCMonitoringSouthAsia
Political,December19,2001.
UCRL-TR-227068 64
FrontediLiberazioneNaziunalediaCorsica/FrontdeLibrationNationaledelaCorse
(FLNC)
TheFLNCisoneofseveralnationalist/separatistgroupsthathavefrequentlyattackedCItargets,alongwith
ETA,theLTTE,andtheIRA.GiventhepeculiaritiesoftheCorsicancontext,thisisentirelyunderstandable.Yet
onemustbearinmindthatthoseverypeculiaritiesmaymeanthattheFLNCsmotivesforattackingCIare
neithereasilygeneralizednorentirelyapplicabletoothergroups.
CorsicaisanislandintheMediterraneanSeathatliesoffthewesterncoastofItaly,butsince1768ithas
essentiallybeenadministereddirectlybyFranceasaprovince.ThecontemporarynationaliststruggleinCorsica
datesbacktothemid1950s,andwasfueledbyacombinationofgeneraleconomicunderdevelopmentand
discriminatoryFrenchpoliciesthatencouragedcitizensfromboththemainlandandFrancesformerNorth
Africancoloniestosettleandbuylandandpropertyontheisland,onwhosecoastsFrenchofficialshopedto
establishathrivingtouristindustry.Asaresultbothlandandjobsoftenwenttooutsidersattheexpenseof
Corsicans,manyofwhomwereforcedto emigratetoFranceorothercountriesinordertomakeadecentliving.
Theislandersnaturallyresentedtheinfluxoffavoredandwealthyforeigners,andincreasinglycametothe
conclusionthatFrancewastreatingtheirhomelandasaninternalcolonialpossession.287Theirresistanceinitially
tooktheformofpoliticalactionandpeacefulprotests,butwhenthesefailedtoachievedesiredresultsamore
assertivenationalistmovementemergedwhoseradicalfringestookuparmedstruggleagainsttheFrenchstate
beginninginthemid1970s.InAugust1975,thesparkwasignitedbyaviolentconfrontationonasettlerowned
vineyardinAlriabetweenafewarmedoccupiersfromtheActionRgionalisteCorse(ARC:CorsicanRegional
Action),thentheprimarynationalistpoliticalorganization,and1,200riotpolicefromtheislandsCompagnies
RpublicainesdeScurit(CRS:RepublicanSecurityCompanies).Thisincident,whichresultedinthreedeaths,
wassoonfollowedbythearrestofARCleadersandthebanningoftheirorganization,amovethatconvinced
severalexasperatednationaliststhatviolencehadbecomenecessarytoachievetheirgoals.288Henceforththe
Corsicannationaliststrugglewaswagedontwofronts:1)legalpoliticalactionbythesuccessorsoftheARC
abovealltheUniondiuPopuluCorsu(UPC:CorsicanPeoplesUnion)infavorofculturaldeterminationand
autonomy,and2)clandestinearmedstrugglebymilitantgroupspromotingnationalliberation,i.e.,secession
fromFranceandindependence.InMay1976elementsofthreeearlierarmedgroups,theARCscommandos,the
FrontePaisanuCorsudiLiberazione(FPLC:CorsicanPeasant LiberationFrontorNativeCorsicanLiberation
Front), andGhjustiziaPaolina(GP:PaolineJustice),coalescedintoanewclandestinegroup,theFLNC.289
TheideologicalagendaoftheFLNCwasmadeclearinitsfoundingdocument,theManifestedu5mai[1976],
whichpresentedaprogramwiththefollowinggoals:1)recognitionofthenationalrightsoftheCorsicanpeople;
2)removalofalltheinstrumentsofFrenchcolonialism,includingthearmy,administration,andFrenchcolonists;
3)establishmentofapopulardemocraticgovernmentthatwillexpresstheinterestsofallCorsicanpatriots;4)
thecarryingoutofagrarianreformtofulfilltheaspirationsofpeasants,workers,andintellectuals,aswellasrid
thecountryofallformsofexploitation;and5)ensuringtherightofselfdeterminationfortheCorsicanpeople
287ForabriefhistoryofCorsica,seePaulArrighiandFrancisPomponi,HistoiredelaCorse(Paris:PressesUniversitairesde
France,1978).ForthegeneralpostwarcontextwithinwhichcontemporaryCorsicannationalismemerged,seeXavier
Crettiez,Laquestioncorse(Paris:Complexe,1999),pp.1786;andRobertRamsay,TheCorsicanTimeBomb(Manchester:
ManchesterUniversity,1983),pp.3195.
288ForthisAlriaincidentanditsimpact,seeRamsay,CorsicanTimeBomb,pp.99104;andthepartisanaccountofARC
leaderEdmondSimeoni,LepigedAlria:LesraisonsdelacolredesCorses(Paris:J.C.Latts,1976).
289ForthecreationoftheFLNC,seeespeciallytheinsideaccountofFLNCleaderJeanPierreSantini,FrontdeLibration
NationaledelaCorse:Delombrelalumire(Paris:LHarmattan,2000),pp.737.Cf.Ramsay,CorsicanTimeBomb,pp.11819.
ThePaolinaintheGPsnameisareferencetoCorsicannationalistandconstitutionaltheoristPasqualePaoli(17251807),the
socalledFatheroftheCorsicanNation.FormoreonPaoli,anEnlightenmentfigurewhoalsoinfluencedAmerican
constitutionaldevelopment,seeAntoineMarieGraziani,PascalPaoli:Predelapatriecorse(Paris:Tallandier,2002).
UCRL-TR-227068 65
afterathreeyeartransitionalperiod.290However,thebasicunderlyingaimoftheFLNChadearlierbeen
revealedinaMay1975documentpreparedbytheleftleaningPartitudiuPopuluCorsu(PCS:Corsican
PeoplesParty),thegrouptowhichJeanPierreSantinibelongedbeforebecomingaleaderoftheFLNC:towage
astrugglefornationalliberationandselfdeterminationagainstthecapitalistandcolonialistFrench
state.291However,thereweretwodistinctivefeaturesoftheFLNCsideologythatservetodistinguishitfrom
thoseofmanyothernationalistmovements.Firstofall,theFLNCalwaysrefusedtoprovideanexplicitly
revolutionaryjustificationforitsclandestineviolence,andinsteaddevelopedanonrevolutionarynationalism
baseduponthedefenseoftheCorsicanhomelandandthehistoricrightsoftheCorsicanpeople.Thislackof
revolutionarypretensions,despitetheFLNCsbelated1989advocacyofanoriginalsocialismrootedin
traditionalCorsicancommunalism,inpartexplainswhythegroupneverwagedatotalassaultontheforcesof
orderortheFrenchstate.292Second,thenationalistdoctrinesoftheFLNCanditspredecessorswerefromthe
veryoutsetinfusedwithecologicalconcerns,andindeedthefirstactofnationalistterrorismwascarriedouton
September14,1973againsttheverysameItalianvesselownedbyMontedisonthathadearlierbeenresponsible
forpollutingtheBayofBastia(inthesocalledRedMudaffair).TheFLNCspopulargreenconcernswere
madeexplicitinits1984whitebook,whoseauthorsdenouncedecologicalaggressionandasserted(with
considerablejustification)thatonlyourpoliticalmilitarypresencehasimpededthealmosttotalspoliationof
our landbymajorEuropeancapitalistinterests.293Thisalsohelpstoexplainwhythetouristindustrywasso
frequentlytargetedbytheFLNC.
OnpapertheFLNCsorganizationappearstobeapyramidal,hierarchicalstructureinwhichordersarepassed
fromaleadershipdirectorateondowntolocalunits. AtthetopliestheCunsigliuorCouncil,abodyofbetween
4and15personswhoareintheoryresponsibleforcoordinatingthegroupspoliticalandmilitaryaction.This
Councilisinturndividedintofourfunctionalcommissions,oneconcernedwithmilitaryandlogisticalaffairs,
onewithfinancialandeconomicaffairs,onewithmanagingtheorganizationscounterpowerapparatus(i.e.,
itsfrontgroupsandlinkagestolegalnationalistparties),andthelastwithinternationalpropagandaactivities.
UnderthesebodiesaresixregionalgroupslocatedinBastia,Balagne,Corte,theEasternPlain,Ajaccio,and
PortoVecchio,eachofwhichhavesubsections.Withinthesesubsections,whicharealsoorganizedona
geographicalbasis,aretheactualoperationalcells,3mangroupswhichorganizeandcarryoutattacks.294
However,thisdiagramismisleadinginsofarasitsuggeststhatthedirectorateexercisedtopdowncontrolover
thesections,subsections,andcells,whichinfacthavealwaysoperatedmoreorlessindependently.Indeed,the
realityisthattheFLNChasneverbeenamonolithicorganization,butratheracollectionofautonomous
localizedcellulargroupswhosemembershavegenerallybeenwellintegratedintotheirlocalcommunities.
Furthermore,factionalismhasbeencommononalllevels,somuchsothatitgeneratedseveretensionsand
periodicallyprecipitatedoutrightorganizationalschismsandthesubsequentcreationofnewgroups.For
example,in1987GravonesectorleaderJeanAndrOrsiniandtwoothersbrokeawayfromtheparentbodyand
createdaseparateparallelFLNC,andin1988localgroupsinBalagneandMaranaBastiaestablishedanew
clandestinenationalistgroupknownastheFLNCCanalHistorique(FLNCHistoricChannel)inopposition
tothemainorganization,whichin1990renameditselftheFLNCCanalHabituel(FLNCCustomary
290NotethatthereisanimportantdiscrepancybetweenthecitationsfromthisdocumentinSantini,FrontdeLibrationdela
Corse,pp.301;andRamsay,CorsicanTimeBomb,pp.11819.ThelatterlistsanadditionalandratherradicalgoaloftheFLNC
program[t]heconfiscationofcolonialestatesandthepropertyoftouristindustrytrustswhichisomittedbytheformer.
YetSantiniincludestherestofthemanifesto,includingtheportionthatenumeratesthevariouscrimesallegedlyattributable
toFrenchcolonialisminCorsica,aboveallthedestructionofouridentitywiththehelpoflocalelites.
291Santini,FrontdeLibrationdelaCorse,pp.910,citingthedocumentVerslaLibrationNationaledelaCorse.
292Crettiez,Questioncorse,pp.15961.Utopianformsofsocialism,includingMarxism,wereapparentlynotverypopularin
Corsica.
293Ibid,pp.1635.
294Compareibid,p.116;andJeanMichelRossiandFranoisSantoni,Poursoldedetoutcompte:Lesnationalistescorsesparlent
(Paris:Denol,2000),Appendix1,p.227(fromthereproductionofaclassifiedGendarmerieNationalereportdatedJuly13,
1988.
UCRL-TR-227068 66
Channel).TheFLNCCanalHistoriquelatergavebirthtostillotherfactions,suchastheFronteRibellu(Rebel
Front),whereastheFLNCCanalHabituelresumedthenameFLNCin2000.Inthemeantime,groupsofyoung
toughswhowereattractedbythegroupscultofclandestinitybutlackedtheirpredecessorsideological
commitmenthademerged,whichonlyacceleratedtheprocessofgradualFLNCatomizationand
criminalization.295TheseparticularorganizationalfactorshadtwocontradictoryeffectsonthelevelofFLNC
violence.Ontheonehand,theimmersionofFLNCcellmembers(whowereoftensimultaneouslymembersof
legalnationalistparties)withintheirlocalcommunitiesgenerallyactedasabrakeontheiremploymentoflethal
orindiscriminateviolence.Ontheother,theabovenotedprocessoffactionalizationoftenresultedintemporary
increasesinactsoflethalviolence,sincethenewlyemerginggroupswishedtoestablishtheircredentialsby
demonstratingtheircourageandoperationaleffectiveness.296
Likemostothernonstateactorswhoresorttoviolence,theFLNChastendedtocarryoutattacksontheforces
andentitiesitholdsresponsibleforcreatingandperpetuatingexistingpolitical,economic,andculturalinjustices.
Yetunlikemanyterroristgroups,ithasnotonlygoneoutofitswaytoavoidinjuringorkillinginnocentpeople,
buthasfromtheveryoutsetdevotedmostofitseffortstotargetingeconomicinfrastructure.Theoveralllevelof
violenceinCorsicaduringthepastthirtyyearshasbeenextraordinarilyhigh, especiallygiventherelatively
smallsizeofthepopulationandtheareaitinhabits.Between1975and1999,over8,000actsofpoliticalviolence
havetakenplaceontheisland.Itisthereforenotsurprisingtolearnthat63%oftheviolencethatwascarriedout
onallFrenchterritorybetween1984and1999occurredinCorsica,asopposedtothe5.5%thatwasattributable
toextremist(leftandrightwing)groups,5%toboththeBasquesandtheBretons,andamere1%to
internationalterrorists.Despitethis,andinmarkedcontrasttothe700deathsattributabletoETAandtheover
3,000attributabletotheIRA,theFLNConlyseemstohaveintentionallykilled47peopleinthe20yearperiod
between1975and1995(ofwhom18wererivalnationalists,11wereproFrenchantinationalists,11were
Mafiosi,andamere7werepolicemen);tothesetotals,asmallbutunspecifiednumberofinadvertentvictimsof
FLNCbombingsmustofcoursebeadded.297TheoverwhelmingmajorityofFLNCattackstargetedproperty,
buildings,andothermaterialgoodsratherthantheforcesoforderorindividuals,andthoseattackswere
generallyveryselective.Forexample,ofthe805suchattackslaunchedbetween1976and1978thefirsttwo
yearsoftheorganizationsexistence166targetedgovernmentpropertyand643targetedprivatelyowned
property,andoftheselatterattacks129werelaunchedagainsttouristenterprisesandvacationhomes,100orso
ofwhichwereownedbyforeignersratherthanCorsicans.Overall,themaintargetswerevillasandbusinesses,
especiallythoselinkedtotheeconomicallyvitaltouristandagriculturalindustries.298
AfewexamplesofsuchattacksshouldsufficetoillustrateFLNCtargetingofCI.Itisperhapsnoteworthythat
theFLNCcarriedout21separatebombingsintownsallacrossCorsicaonMay4,1976,thenightbeforethe
officialannouncementofitsformation,sincethesedramaticandnearsimultaneousactsseemtohave
establishedanoperationalpatternthatwasregularlyadoptedthereafterbythegroup.Forexample,onJune18,
1984,theFLNCsetoff17bombsindifferentregions,targetingbanks,taxoffices,gasandelectricitycompanies,
andrealestateoffices.299OnMarch21,1987,thegroupdetonated41bombsinnorthernandsouthernCorsicaon
theeveofregionalbyelections.300Morerecently,onFebruary2,1997theFLNCCanalHistoriquecarriedout
61bombingsofpostofficesandtaxofficesinthenorth,inparttoprotesttherecentarrestofthreeofthegroups
295Forthispatternofinternalfactionalization,seeibid,pp.1267.CompareRossiandSantoni,Poursoldedetoutcompte,pp.29
34.Theyalsoclaim(p.29)thatthegrouponlyconsistedofatotalofabout100operationalmembers.
296Crettiez,Questioncorse,pp.115,122,126,129.Itmayalsobethatthelackoftangibleassistanceandresourcesprovidedby
theleadershipdirectoratecausedlocalcellstoselecteasiertargetstoattack,justasalackofexternalfundingmayhave
forcedthemtoblackmailorattackeconomictargets.Seeibid,pp.119,122123.
297Forthesefigures,seeibid,pp.103,10508.
298Ibid,pp.104,10912.
299CIPDatabase#3374.
300CIPDatabase#3590.
UCRL-TR-227068 67
leaders.301Thefactthattheorganizationregularlycarriedoutaseriesofnearsimultaneousbombings
demonstratesaconsiderabledegreeofbothoperationalsophisticationandcoordination,despiteitsostensibly
localized,fragmented,andfactionalizedcharacter.
Tosumup,theFLNCsregulartargetingofCIhasbeenperfectlyrationalgivenitsideologicaloppositionto
specificFrencheconomicpoliciesthathaveindisputablyharmednativeCorsicans,instrumentalinsofarasitwas
designedtoachievetangibleandpracticalobjectivesbydamagingvitalindustries,carefullycalibratedintermsof
thelevelsofviolenceemployed,andhighlyselective.302Althoughthegroupstargetshavealsooftenbeen
symbolicallyrepresentativeofvariousexternalandinternalforcesitviewsashavingdamagedCorsican
interests,thereisnodoubtthatitsprimarypurpose wastodamagemateriallythoseeconomicindustriesthathad
servedtoperpetuatethesecondclassstatusofnativeCorsicans,aboveallthetouristindustry,agribusinesson
theEasternPlain,andrealestateinvestmentindesirablecoastalregionsbyFrenchsettlers,vacationers,and
otherforeigners.Inplacingsuchahigh priorityonattackingthesetargets,itsaimwasnotonlytodestroyvital
colonialcomponentsoftheislands infrastructure,butalsotoforceresidentspeculatorsandexploitersto
leavetheislandandtowarnfuturewouldbeinvestorsandpurchasersofpropertythattheyshouldlook
elsewhereiftheywishedtoavoidviolentretaliation.Theseparticularobjectivesgrowdirectlyoutoftherather
uniquelocalconditionsexistingonCorsica,and,inthatsense,theFLNCmodelmaynotbeentirelyapplicable
elsewhere.Ontheotherhand,thegeneralobjectivesofthearmednationalistresistancegroupsinCorsicaarenot
radicallydifferentfromthoseofviolentnationalistandseparatistorganizationsinplacesliketheBasque
CountryandGermanspeakingSouthTyrol,inthesensethattheirprimaryaimsaretopreservetheirunique
cultureandestablisheffectivepoliticalandeconomiccontrolovertheirownhomelands.
ChukakuHa
Chukakuha(NucleusFactionorMiddleCoreFaction)isaradicalMarxistorganizationthatoperatesexclusively
inJapan.IttracesitsoriginstotheKakukyodo(RevolutionaryLeagueofCommunists),agroupofleftwing
extremiststhatsplitfromtheJapaneseCommunistParty(JCP)inthelate1950sbecauseofthePartysdecisionto
seeksocialistrevolutionthroughtheexistingJapaneseparliamentarysystemratherthanbymeansofviolence.303
Accordingtoitsownliterature,Chukakuhasultimateaimistoachieveacommunistsocietythroughthe
AntiImperialistAntiStalinistWorldRevolution.Towardsthisend,thegroupofficiallysupportstheviolent
overthrowoftheimperialiststatepowersbyproletarianarmeduprisings.304Bythemid1990s,Chukakuha,
withanestimated3,500members,wasthelargestdomesticexpresslymilitantgroupoperatinginJapan.305
Chukakuhahasanactivepoliticalwing,popularlyreferredtoasitspublicsector,whichisdevotedtothe
developmentofaviableworkerspartyalternativetoboththeJapaneseSocialDemocraticPartyandthe
JapaneseCommunistParty.306Theorganizationalsomaintainsahiddensectorasmall,covertmilitarywing
of200400memberscalledtheKansaiRevolutionaryArmyorRevolutionaryForce.Whileithasnotengaged
inanysignificantterroristactivitysince1996,thismilitantcoreconductedsporadicguerrillaactionsfromthe
1970stomid1990s.ItsactivitieswereoftentimedtocoincidewithovertChukakuhapoliticaldemonstrations
andwereprimarilyaimedatprotestingJapansmonarchysystem,theAmericanJapanesesecurityrelationship,
301CIPDatabase#2581.
302Crettiez,Questioncorse,pp.10818.
303SeePeterJ.KatzensteinandYutakaTsujinaka,DefendingtheJapaneseState:Structures,NormsandthePoliticalResponsesto
TerrorismandViolentSocialProtestinthe1970sand1980s,(Ithaca,NY:CornellUniversity,1991),p.26.
304Chukakuhawebsite,whichcanbefoundat:www.zenshin.org/english_home/nc_intro.htm.
305U.S.DepartmentofState,1996PatternsofGlobalTerrorism(Washington,DC:GovernmentPrintingOffice,1997),asfound
at:http://www.state.gov/www/global/terrorism/annual_reports.html.
306Bytheearly1990s,theorganizationhadfieldedcandidatesinnumerouslocalelectionsandwonseveraldozenseats,
includingontheTokyoMetropolitanAssembly.
UCRL-TR-227068 68
andother,morespecificmatterssuchastheexpansionofTokyoInternationalAirportatNaritathatwere
deemedtobeparticularlyimportanttokeyconstituenciessuchasstudents,farmersandunionmembers.
AlthoughChukakuhasattackshaveinvolvedavarietyofsophisticatedtacticsandweapons,including
automatedflamethrowingvehicles,timedelayedbombs,andcruderockets,themajorityofitsactionshave
targetedpropertyratherthanpeople.Indeed,thegroupsattacksoncommunications,government,and
transportationfacilities, especiallyduringthelate1970sandmid1980s,serveasexamplesofsomeofthemost
carefullycoordinatedandconsequentialCIspecificterrorattackseverconducted.Ofparticularnotearetwo
attacksmadebythegrouponthegovernmentrunJapaneseNationalRailways(JNR)systemin 1985and1986.
Beforeexaminingtheseattacksmoreclosely,itisappropriatetoconsiderChukakuhaanditsorganizational
characteristicsingreaterdetailtounderstandwhysuchtargetsmayhavebeenparticularlyappealingtoit.
Asanorganization,Chukakuhapursuesthreeoverarchinggoals:thesuccessfulinstigationofaworkers
revolutioninJapanand,ultimately,theworld;theendoftheU.S.JapansecurityrelationshipandtheAmerican
militarypresenceonJapanesesoil;andtheendoftheJapanesemonarchy.307Ideologicallygroundedin
Trotskyism,thegroupseekstoengagealllevelsofsocietyinitseffortsandacceptsviolenceasanecessary
aspectofsocialrevolution.Indeed,Chukakuhadoesnottrytohidethefactthatithas,initsownwords,
forgedillegalundergroundorganizations,revolutionarymilitaryforcesandarmedselfdefense.308It
rationalizesitsembraceofviolentprotestbyarguingthattheJapanesegovernmentandcorporationsaretoolsof
Americanimperialism.(TheU.S.militarypresenceisdeemedtobethemostegregiousdemonstrationofthe
AmericansongoingoccupationofJapan.)Chukakuhamembersarguethatsuchexploitationjustifiesthe
employmentofanyandallmeasurestoendsuchacorruptsystem.309
InasmuchascriticalinfrastructurefacilitiessuchasU.S.basesandJapanesegovernmentstructuresaresymbols
ofJapanscurrentpoliticalsystemandsituation,theymaybeconsideredtargetsforChukakuha.Itisimportant
tonote,however,thatthegroupdoesnotappeartohavetargetedsuchCIfacilitiesbecauseitwasideologically
predisposedtoattackcriticalinfrastructurespecifically.Similarly,Chukakuhasattacksontransportation
infrastructure,suchastheNaritaairportandtheJNRrailwaysystem,wereapparentlydrivenprincipallybythe
organizationsproclaimedideologicalcommitmenttochampioninganddefendingworkersinthesetwo
specificcases,thefarmersdisplacedbytheNaritaairportexpansionandthetrainunioniststhreatenedbyJNRs
privatization.Again,thereisnoclearevidencetoindicatethatsuchtargetswerechosenspecificallybecauseof
theirnatureaskeyelementsoftransportationinfrastructure.
Intermsofitsstructure,Chukakuhaisamilitantorganizationwithawelldefinedinternalstructurethatis
uniquelyJapaneseinstyle.Itsinternaldecisionmakingprocessesemphasizetheimportanceofbothpolitical
consensusandsocialrankbybalancingworkgroupautonomy,verticalstructuresandconsensualdecision
making,attentiontodetail,carefulplanning,andaremarkableabilitytolearnfrommistakes.310Inthe1990sthe
organizationsmembershipconsistedofapproximately3,500members,about500ofwhomwereprofessional
activistswhoheldnosteadyjobs.Whenneeded,itwasestimatedthatChukakuhahadtheabilitytomobilize
about5,000people.311
AftertheJapansSubversiveActivityPreventionLawwasinvokedin1969againstChukakuhasleader,
NobuyoshiHonda,theorganizationestablisheditscovertrevolutionaryforcetoconductterroristactivities.This
smallergroupwasmadeupofseveralhundredmembersknownonlytoahandfulofleaders.
307Chukakuhawebsite.
308Ibid.
309GeraldUtting,VeteranSaboteursLeadJapanRailWar,TheTorontoStar,November30,1985.
310KatzensteinandTsujinaka,DefendingtheJapaneseState,p.21.
311Ibid,p.21.
UCRL-TR-227068 69
Accordingtoonedetailedanalysisoftheorganization,membersofChukakuhashiddensectoroperatein
carefullyprotectedcells:
ThesemembersaremostlythehardcoreactivistswhowereinvolvedintheStruggles
of1970.Manyofthemhavearecordofarrestorareonthelistofthosewantedbythe
police.Thesemilitaryorganizationsgivetopprioritytothesecurityoftheir
organizations.Nolateralrelationsamongtheirmembersareestablished,andvertical
relationsarealsominimal.Theentiresystemcannotbedisclosedevenifseveral
membersarearrested.Theseorganizationsadoptthusthoroughdefensivemeasures.
Nomemberofacellknowsoforrecognizesthemembersofanyothercell.Evenwithin
thesamecell,membersusefalsenameswithoneanothertoprotecttheiridentity.312
Themembersofthesecellsarenotedbypoliceforkeepingcompletesilencewhentheyarearrested.313
TheuniquestructureofChukakuhasRevolutionaryForceandthelargesizeoftheentireorganizationmadeit
particularlywellsuitedtoattackcriticalinfrastructuretargetssuchtheJNRrailwaysystem.Theorganization
hadboththeoperationalsecurityandspecializedhumanresourcesnecessarytoconductsophisticatedguerrilla
typeattacks.ItalsohadthemanpowertoattackCIinalargenumberoflocationssimultaneously,thereby
damagingthetargetedinfrastructurefarmoreeffectivelyandsystemicallythanwouldhavebeenpossibleby
meansofasinglelocationattack.
BecauseChukakuhaoperatesexclusivelyinJapan,itsmembershipconsistsofalarge,activeandrelatively
cohesivegroupofindividuals.Themostengagedmemberstendtobestudentsundertheageof30,though
knownmembershavealsoincludedpublicschoolteachersandlocalgovernmentemployees.314Manyofthese
membershavebeenarrestedfortheiractivities.Inthe1980s,duringthetimeoftheJNRattacks,numerous
Chukakuhaseniorleaderswereoriginalmembersoftheorganizationfromthe1960swhoconsidered
themselvesprofessionalrevolutionaries.315Whilesuchdemographicsprovideapopulationofrelativelywell
educatedandcommittedactivistswhoarebothcapableandwillingtoattackCI,thereisnothinginthe
organizationsknowndemographicstosuggestanaturalgroupproclivitytoattackcriticalinfrastructureover
othertargets.
Accordingtoavarietyofestimates,Chukakuhaiswellfinancedandhascorrespondinglysignificantaccessto
physical,logisticalandhumanresources.316Theorganizationdemonstrateditsfinancialstrengthstrikinglyin
1981,whenitbuilttwomultistoryheadquartersbuildingsoneinTokyoandtheotherinOsakaatacostof
500millionyen.AtthetimeofChukakuhasattacksontheJNRrailwaysysteminthemid1980s,thegroupwas
believedbypolicetohaveabudgetofonebillionyenperyear,whichamountedtomorethanfourmillion
dollarsat1985exchangerates.317
312Ibid,p.28.
313KyodoNewsService,RadicalGuerillaAssaultsStopJNRTrainRuns,JapanEconomicNewswire,November29,1985.
314Ibid.
315DavidE.ApterandNagayoSawa,AgainsttheState:PoliticsandSocialProtestinJapan(Cambridge:HarvardUniversity,
1984),pp.1312.
316ApterandSawanote,forexample,thatChukakuhasfinancialresourcesenabledittomaintaina40personsolidarity
hutnearNaritaairportinthemid1980s,whichhadexpendituresestimatedatseveralmillionyenpermonth.Halfamillion
ofthissumwasusedtopurchasegasolineforitsfleetoftwelvecarsandtwentymotorcycles.
317ApterandSawa,AgainsttheState,pp.1312.
UCRL-TR-227068 70
Thegroupsfundingisthoughttocomeprimarilyfrommembershipdues,thesalesofitsthreenewspapers,and
fundraisingcampaigns.318Chukakuhamaintainsa groupofprofessionalorganizerswhohelprallyand
mobilizemembersandcollectfunds.Accordingtosomereports,workers,studentsandevenwealthy
supportersfromallpartsofJapanhelpfundthegroup.Membershipfeesprovideaparticularlyimportant
sourceofincome.Accordingtoonereport,Chukakuhamemberscontributeasignificantpercentageoftheir
monthlysalariesand100%oftheirbonusestotheorganization.Duringthe1980s,suchfinancingenabledthe
grouptosupportsome500ofitsmembersasfulltimemembers,allowingthemtoforgojobsandinstead
focussolelyonorganizationalactivities.319
Chukakuhasabundantresourcesunquestionablyfacilitatedthegroupsabilitytoengageinmoresophisticated
andmorenumerousattacks,especiallyinthecontextofthenumberofmembersavailabletoparticipatein
coordinatedefforts.Itisnotclearorlikelyhowever,thatitsresourceswereakeydeterminantofChukaku
hasdecisiontospecificallytargetcriticalinfrastructure.AstheJNRattacksdemonstrate,atleastsomeof
ChukakuhasCIattacksdependedonlowtechresourcesthatwouldhavebeeneasilyaccessibletoother,less
wellfinancedandwellsuppliedgroups(suchasMolotovcocktailsandsteelpipes).
AlthoughsomeofthetoolsusedinitsJNRattackswererelativelysimple,Chukakuhaisknowntopossess
advancedtechnicalcapabilitiesthatenableittoproduceavarietyofhomemadeweapons.Theorganizationhas
alsodevelopeditsabilitytoconductsophisticatedoperationsthatinvolvetheuseofstolenvehicles,exchanged
licenseplatesandregistrations,andphysicalalterationsofparticipants.Thegroupsuseofsuchtoolsandtactics
hasbeendescribedbysomeasaformofhightechnologyguerrillaterrorism.320Especiallyduringthe1980s
andearly1990s,thesecapabilitiesprovidedChukakuhawithanoperationalflexibilitythatallowedthegroup
toincreasethenumberandtypesoftargetsitwentafter,aswellasthetypesofmethodsitusedforconducting
attacks.
WhileChukakuhahasdemonstratedanimpressiveabilitytoinnovate,especiallyinthecontextofits1985JNR
attack,ithasalsotendedtogravitatetowardparticulartypesofattacksandtactics.Forexample,thegrouptried
toreplicatethe1985railwayattackonseveraldifferentoccasions,eachtimewithlesssuccess.Similarly,it
conductedrepeatedattacksonNaritaairportthattendedtousethesametactics.Chukakuhasabilityto
innovatecertainlyinfluenceditstargetselectionofCI,inasmuchasithashelpedtoexpandthepoolofpossible
targetsandfacilitatethegroupsabilitytosuccessfullyattackdistributedtargetssuchasrailsystems.Thereis
littleevidence,however,thatChukakuhaslevelofinnovationandtechnicalsophisticationweresignificant
reasonsbythemselvesfortheorganizationstargetingCI.
ItisimportanttonotethattheJapanesepoliticallefthasbeenhighlyfactionalizedsincetheJapaneseCommunist
Partyabandoneditspolicyofarmedstruggleinthemid1950s.In1957KakukyodoaTrotskyist,anti
imperialist,andantiStalinistorganizationwasestablishedasamilitantalternativetotheJCP.321Thisgroup
subsequentlysplitintomanysmallersects.Chukakuhaanditsmainrival,Kakumaruha(Revolutionary
MarxistFaction),emergedfromthissplinteringin1963.WhileKakumaruhatendedtoavoidopenconflictand
focusedonthedevelopmentofitsorganizationanditsNewLeftideology,Chukakuhaemphasizedamore
openlymilitantagenda.TheassassinationofChukakuhaschairmanin1975byaKakumaruhaactivistinitiated
severalyearsofintenseviolencebetweenthefactions, includingChukakuhasmurderof43Kakumaruha
members.322
318U.S.DepartmentofState,1996PatternsofGlobalTerrorism.
319KatzensteinandTsujinaka,DefendingtheJapaneseState,p.27;andApterandSawa,AgainsttheState,pp.1312.
320KatzensteinandTsujinaka,DefendingtheJapaneseState,p.26.
321TheJapaneseRedArmy(JRA),whichsoughttooverthrowtheJapanesegovernmentandendtheJapaneseimperial
system,alsoemergedfromthesplitintheJCP.
322EugeneMoosa,HundredsofPoliceHuntfor300RailSaboteurs,AP,November30,1985.
UCRL-TR-227068 71
Althoughthelevelofviolencebetweenthegroupshadsubsidedsignificantlybythe1980s,competitionfor
membershipandpublicsupportbetweenJapanesemilitantleftorganizationsremainedfierce.Intheaftermath
ofthe1985JNRattack,someJapaneseofficialsconjecturedthatChukakuhahadtargetedtherailwaysystemto
produceaspectacularattackthatwouldattractwidespreadattentionandhelpitgainstatureamongother
Japaneseleftistgroups.323
WhilethereisnodefinitiveproofthatChukakuhasdecisionstoattackCIonvariousoccasionsweredeliberate
effortstomaximizepublicimpactandraisetheorganizationsstatureamongpossiblesympathizers,itis
impossibletoignorethefactthat,duetotheirsystemicnature,manycriticalinfrastructureslikelyappearto
terroristorganizationsasparticularlydesirabletargetsbecauseoftheirpotentialtocausebroadpublicimpactif
successfullyattacked.ThiswascertainlytheeffectChukakuhas1985and1986attacksontheJNRrailsystem
hadontheJapanesepopulation.Aftertheevent,eachoftheseattackswaswidelyheraldedasthemost
disruptiveanddamagingattackofitstypeevertooccurinJapan.Giventhehighlyfactionalizednatureofthe
militantJapaneseleftandthelikelyoutcomeoftheattack,theassociatedprestigeChukakuhawouldobtain
fromconductingtheattackmayhavebeenanimportantfactorinthegroupsdecisiontoselectthetarget.
AcriticalfactoraffectingChukakuhastargetselectionwasthegroupsexternalrelations.Chukakuha
maintainsawidevarietyoflinkswithothermilitantleftistorganizations,workerscommunitiesoffarmersand
unionists,andpublicsympathizers.Since1968,theorganizationhasbeenmostcloselyassociatedwithfarmers
fightingtheexpropriationoftheirlandforuseintheconstructionandexpansionofTokyoInternationalAirport
atNarita.Althoughthegroupbeganattackingtheairportevenbeforeitopenedin1978,Chukakuhas
connectionwiththefarmersbecameparticularlywellknownafteritsuccessfullystormedtheairportcontrol
tower,setitonfire,andattackedpolicewithMolotovcocktailsontheairportsopeningday.324Undoubtedly,the
primarymotivationbehindChukakuhasattacksonNaritaairportwasthefacilitiesdirectimpactonthe
farmers,andrelatedlittleifatalltotheairportsintrinsicnatureasacriticalinfrastructure.
Chukakuhamaintainssimilarlycloserelationswiththe1,100memberChibaDoro,theChibabranchofthe
locomotiveunion.ItregularlycitesitscloserelationshipwithChibaDoroasanexampleofitsabilityto
revolutionizeworkers.325Therelationshipwasestablishedinthelate1970s,whenChibaDorosplitfromthe
nationallocomotiveuniontoprotestitsnationalorganizationssupportforNaritaairport.Duringthe1980s,
whentheJapanesegovernmentwasconsideringtheprivatizationoftheJNRsystem,earlyproposalsforthe
railwaybreakupcalledfortheeliminationofasmanyas93,000JNRworkers.Chukakuhapubliclystatedthat
itsattacksontherailwaysystemweredemonstrationsofsolidaritydesignedtocallattentiontotheunion
workerseffortstofighttheprivatizationinitiative.326Again,itwouldappearthatthegroupsselectionofthe
railwaysystemasatargetwasdonelessbecauseofthetargetsspecificnatureasCI,andmorebecauseofits
symbolicimportanceandspecificconnectiontotheconstituencyChukakuhawaschampioning.327
Chukakuhas1985and1986JNRattacksalsodemonstratedtheorganizationsremarkablysophisticated
knowledgeofthetarget.Thegroupclearlyunderstoodwhichspecificrailfacilitiesacrossaverywide
geographicalregionneededtobeattackedtodisruptthesystemsservicemosteffectively.Asonestudynoted,
ratherthanblowinguportamperingwiththephysicaldestructionofonerail,thegroupfocusedonthecritical
323Cf.ibid;andKatzensteinandTsujinaka,DefendingtheJapaneseState,p.26.
324KatzensteinandTsujinaka,DefendingtheJapaneseState,p.25.
325ApterandSawa,AgainsttheState,p.146.
326MasayukiTakagi,AsahiNewsService,December5,1985.
327InRadicalGuerillaAssaultsStopJNRTrainRuns,theJapanEconomicNewswiresuggeststhatasecondgoalofChukaku
hamayhavebeentoinfluencethetrialofHirokoNagata,leaderoftheExtremeLeftistUnitedRedArmy.Herhearingwas
delayedbecausetheattackspreventedherdefenselawyerfromappearingincourt.
UCRL-TR-227068 72
node(controlcircuits)anddisabledtheentiresystem.328Althoughnodefinitivelinkbetweentheattacksand
ChibaDorowaseverestablished,anddespitetheunionsclaimsthatitwasnotinvolvedwiththeincidents,itis
difficulttobelievethatChukakuhasknowledgeoftheCIanditsattackplanswerenotinformedtosomeextent
bysympatheticlocomotiveunionmembers.Thetechnicalexpertisethatsuchinsiderscouldprovidemaywell
haveprovidedChukakuhawithboththeconceptualideafortheattackaswellasthenecessarytactical
informationtoimplementit.Assuch,ChukakuhasknowledgeofitsCItargetmayhavebeenoneofthemost
importantfactorscontributingtotheultimatesuccessofitsJNRattacks.
AreviewofthedetailsoftheseattacksmakesthesignificanceofChukakuhasknowledgeoftherailwaysystem
evenclearer.The1985attackbeganshortlyafter3a.m.onNovember29,whenanestimated200to300
Chukakuhasaboteursparticipatedinsimultaneousraidsonmorethan30JNRrelatedtargetsineight
prefecturesacrossWesternJapan.329Thesecoordinatedattacks,whichwerefocusedinandaroundTokyoand
Osaka,includedthefirebombingofsignalboxes,thesettingoffireswithtimedincendiarydevicesatrail
installations(includingamajordowntownTokyotrainstationandatransformersubstationinOsaka),andthe
cuttingofsignalandcommunicationcables.330Additionally,severalhundredChukakuhamemberswearing
theirtrademarkwhitehelmets,towelmasks,andhomemadebodyarmorvandalizednumeroustrainstationsby
attackingthefacilitieswithsteelpipesandMolotovcocktails.331Topreventtheauthoritiesfromrespondingto
theattackeffectively,thegroupjammedpoliceandrescueradiofrequencies.332
Theimmediateeffectsoftheattacksweredramatic.Thedamagedonetosignalboxesandcommunications
cablesincapacitatedJNRsswitchingsystems,telephonehookups,andcomputerizedbookingoperations,and
forcedtherailauthoritytostopoperatingitscentralizedtrafficcontroloffice.333Nearly3,300trainsonmorethan
twentylinesweredisrupted,effectivelyhaltingfortenhoursJNRsentirenetworkofpubliclyoperated
commutertrains.334(Onanaverageday,atthetimeoftheattack,thesystem carriedapproximatelythirteen
percentofalltravelersinJapan.)335NearlyelevenmilliontravelerstenmillioninTokyoand800,000inOsaka
wereestimatedtohavebeendirectlyaffectedbythecancelledtrainservice.336 ManyoftheseregularJNR
commuterssoughtalternatemeansoftravelandthuscompoundedregionaltransportationproblemsby
overwhelmingthefreeways,privatelyoperatedcommutertrains,andsubways,therebycausingwhatwas
widelyreportedasmassconfusionandhugejamsintheseothersystems.
Whilenoinjuriesweredirectlyattributedtothiscoordinatedattack,337thesabotageresultedinsubstantial,
measurabledamageforJNRandwidespread,lesseasilycalculatedcostsforthebroadercommunity.JNRlost
morethansixmilliondollarsinticketsalesalone,numerousrailwaystationswereleftheavilydamagedbythe
dozensoffiressetbyvandals,andoneTokyostationwasdestroyedentirelybyatimedincendiarydevice.338
ThroughoutTokyoandOsaka,hundredsofthousandsofbusinessesandserviceswereforcedtocloseorreduce
328MatthewJ.Littleton,InformationAgeTerrorism:TowardsCyberterror,NavelPostgraduateSchool,Monterey,CA,
December1995,at:http://www.fas.org/irp/threat/cyber/docs/npgs/ch4.htm#b_japan.
329SeeToshioKojima,TerrorGroupThreatensHirohito,TheAdvertiser,February15,1986;DavidR.Schweisberg,Police
InvestigatingRadicals,UPI,November30,1985;andMoosa,HundredsofPoliceHuntfor300RailSaboteurs.
330ClydeHaberman,SabotageCripplesJapanRailLines,NewYorkTimes,November30,1985.
331CarlaRapoport,SaboteursHitJapanRailways,FinancialTimes,November30,1985.
332Littleton,InformationAgeTerrorism.
333KyodoNewsService,RadicalGuerillaAssaultsStopJNRTrainRuns,JapanEconomicNewswire,November29,1985.
334SeeKyodoNewsService,RadicalGuerillaAssaultsStopJNRTrainRuns;andHaberman,SabotageCripplesJapanRail
Lines.
335DavidSchweisberg,UPI,November29,1985.
336Schweisberg,PoliceInvestigatingRadicals.
337TwelvepoliceofficerswerehurtwhilearrestingChukakuhamemberswhowerevandalizingtrainstations.
338SeeMoosa,HundredsofPoliceHuntfor300RailSaboteurs;andXinhuaGeneralOverseasNewsService,JapaneseRail
TrafficDisruptedbySabotage,November29,1985.
UCRL-TR-227068 73
activitiestolevelsthatcouldbesupportedbyminimalstaff.InTokyo,forexample,420publicandprivate
schoolswereclosed,andeventheStockExchangeoperatedwithonlyathirdofitsnormalforce.339
Thelongtermeffectsoftheattackwerelessremarkable.Despitetheextentofthesabotage,partialtrainservice
onalldisruptedlineswasrestoredbylateafternoonthesameday.Nearly5,000policeweredeployedto
regionaltrainstationstopreventfurtherviolence.GovernmentandJNRofficialsquicklyannouncedplansfor
strongermeasurestoprotecttherailnetworks12,500milesoftracksfromfutureattacks,butacknowledged
thatitwasimpossibletoguardtheentiresystem.340JNR,whichatthetimewastenbilliondollarsindebt,
notedthatburyingorsecuringallofitssignalinstallationswouldbelogisticallydifficultandprohibitively
expensive.
AlthoughpolicearrestedseveraldozenChukakuhamembersincludingtheorganizations32yearold
chairmanand21yearolddeputychairmanwhiletheywerevandalizingrailwayfacilities,thegroupatfirst
remainedofficiallysilentaboutitsroleintheattacks.WhenChukakuhadidclaimresponsibility,itindicated
thatitsactswereintendedasademonstrationofsolidaritywiththeChibaPrefectureLocomotiveUnion(Chiba
Doro),whichhadlauncheda24hourstrikeadayearliertoprotesttheJapanesegovernmentsplantobreakup
andprivatizeJNR.ChibaDororepresentativespubliclydeniedallknowledgeofthesabotage,butpolice
indicatedthattheunionleadershiphadbeenstronglyinfluencedbyChukakuhaandnotedthatatleasttwo
JNRemployeeshadbeenarrestedasparticipantsintheattacks.341
Lessthanayearafterthe1985attack,JNRscommuterrailsystemwasattackedbyChukakuhaagain.On
September24,1986,thegroupseveredsignalandcommunicationcablesintwentyeightlocationsaroundTokyo,
intheprocessaffectingfourteendifferenttransitlines.TheattacksdisruptedtraintravelinmetropolitanTokyo
andstrandedmorethanonemillioncommutersforabrieftime.Investigatorsindicatedthatthemethodsusedto
sabotagethecableswereidenticaltothoseusedinthe1985attack.Theattacksoccurredthedaybeforethe
JapaneseDietwasscheduledtoestablishaspecialcommitteeontheprivatizationofJNR,andinadvanceofa
meetingofthenationallocomotiveuniontodecidewhethertosignanonstrikeaccordwithJNRmanagement
inanefforttoensuregreaterjobsecurityforitsmembers.Besidesaffectingtheoutcomeoftheaforementioned
meetings,JapaneseauthoritiessuggestedthatChakakuhassecondstrikeontherailwaywasdesignedtomore
strongly linktheissueofJNRprivatizationwiththeexpansionofTokyoInternationalAirportatNaritaandto
increasepublicpoliticalpressureonPrimeMinisterYasuhiroNakasonesgovernmenttohaltbothefforts.342
ChukakuhasattacksontheJNRrailwaysystemaredramaticexamplesofitslargerpatternofattacksona
broadrangeofCItargets.Inthe1980s,forexample,Chukakuhawasassociatedwithmorethan250terrorist
incidents.Duringthisperiod,thegroupwasresponsiblefor49%ofallguerrillaattacksand85%ofallbombings
committedthroughoutJapan.343AlthoughmostoftheseincidentsarenotcapturedbytheCrITICDatabasedue
toinsufficientavailabilityofdata,alargenumberoftheseattackswerefocusedoncriticalinfrastructuresuchas
airportfacilities,railwaystations,militarybasesandotherpublicbuildings.344
AsystematicreviewofthekeyfactorsinfluencingChukakuhasattacksontheJNRrailwaysystemsuggests
thattheorganizationselecteditsCItargetslessfortheirintrinsicnatureaselementsofcriticalinfrastructureand
morefortheirspecificrolesastargetssymbolicallyordirectlyrelatedtoissuesthegroupwasseekingto
champion.Seeninsuchlight,Chukakuhasideologyandexternalrelationswereperhapsmostdirectlytiedtoits
339CarlaRapoport,SaboteursHitJapanRailways.
340Moosa,HundredsofPoliceHuntfor300RailSaboteurs.
341ClydeHaberman,SabotageCripplesJapanRailLines.
342AsahiNewsService,PoliceBlameLeftistsforTransitSabotage,September24,1986.
343KatzensteinandTsujinaka,DefendingtheJapaneseState,p25.
344Ibid,p.20.
UCRL-TR-227068 74
targetselectionbyinfluencingitsoperationalobjective.Itisalsoapparentthattheorganizationssize,structure
andknowledgeofCIaideditinconductingitsattackssuccessfully.Notably,itishighlyunlikelythatan
organizationwithoutsomesubstantialunderstandingofarailwaysoperationcouldhaveconductedsimilar
attackswithasmuchultimateeffectiveness,whichwasprobablyduetoinsiderhelp.Finally,despitethelackof
explicitevidence,itisreasonabletobelievethatChukakuhafoundthespectacularimpactofitsfirstJNR
attackvaluableinenhancingitsstatusandreputationasanorganization,especiallywithinthehighlypoliticized
andfactionalizedcommunityofJapanesemilitantleftistorganizations.Itisquiteprobablethataprimary
motivationforChukakuhaslaterattemptsatattackingrailwayrelatedCIwastoduplicateitsfirstsuccess.
TheMoroIslamicLiberationFront(MILF)
TheMILFiscurrentlythelargestMuslimseparatistgroupoperatinginthesouthernPhilippines.Itisnota
terroristgroupperseinthesensethatitisasmallclandestineorganizationthatreliesprimarilyonterrorist
techniques,suchastherivalAbuSayyafGroup(ASG),butratherarelativelylargeguerrillamovementthat
employsterroristtacticsalongwithawidevarietyofothermethodsinordertoachieveitspoliticalandmilitary
objectives.AlthoughtheorganizationisfightingtoestablishanindependentMuslimstate,itspronounced
IslamistideologyandcloselinkstotransnationaljihadistnetworkssuchasalQa`idaandJemaahIslamiyah
placeitprimarilyinthecategoryofanonstatereligiousgroup.
Muslimresistancetoforeigncontrolinthisregiondatesbacknearly500years,whenSpanishforcesfirstarrived
inforceinthemid16thcenturyandthenceinitiatedtheirlongandoftenviolentseriesofcampaignsdesignedto
ChristianizeandHispanizetheentirePhilippineArchipelago.SincethattimetheMoros(PhilippineMuslims)
havebeenstubbornlyresistingtheimpositionofinfidelcontroloverthesouthernPhilippineislandsof
Mindanao,Basilan,andSulu,whichaseeminglyendlesssuccessionofSpanishviceroys,colonialAmerican
governors,andindependentFilipino(PhilippineChristian)leadershavesoughttobringabout.Nevertheless,
Moroland(thepredominantlyMuslimportionsofthesouthernPhilippines)wasincreasinglybroughtintothe
administrativeorbitoftheSpanishempire,theAmericancolonialadministration,andfinallytheindependent,
ChristiandominatedPhilippinegovernment.345NotonlyweretheMorostreatedassecondclasscitizenswithin
thenewPhilippinestate,butofficialsinManilasponsoredpoliciesofinternalmigrationandeconomic
developmentthatquicklyledtothedemographicdisplacementoftheMuslimmajorityinlargeareasof
Mindanao,intheprocesssparkingarenewalofChristianMuslimhostility.346Itwasinthiscontext,whereby
Muslimswhonowconstituteamere5%ofthepopulationofthePhilippinesweresqueezedoutofseveral
ancestralhomelandsandmarginalizedeconomically,thatthemodernMuslimsecessionistmovementarose.The
traumaticpsychologicaleventthatledtoitsrapidemergencewastheJabidahMassacreofMarch1968,in
345ThetermMorohaslongbeenanappellationfortheIslamizedgroupsfromtheverysameMalayracialgroupasboth
theChristianmajorityinthePhilippinesandthebulkoftheinhabitantsofnearbyIndonesiaandMalaysia.Hencethe
divisionbetweenChristianFilipinosandMuslimMorosisneitherethnicnorpredominantlysocialandcultural(inthe
broadestsenseofthatterm),butratherhistoricalandaboveallreligiocultural.Indeed,itisimportanttoemphasizethatthe
termMorowasoriginallyappliedbytheSpaniardstoMuslimoccupantsoftheIberianPeninsula,thedescendantsofa
successionoftribalinvadersfromIslamicNorthAfrica,againstwhomtheyhadfoughtasometimesbrutalsevencentury
struggleforsupremacythesocalledReconquistaculminatinginthecaptureofGranadain1492.Theverysamenamewas
thenlaterappliedtothoserecalcitrantMuslimsthattheSpaniardsencounteredinthePhilippineArchipelago,andit
generallyretainedthesamepejorativesignificanceuntilPhilippineMuslimnationalistsappropriateditproudlyfor
themselves,intheprocesstransformingitintoapositiveappellation.ForanoverviewofthehistoryofIslaminthe
Philippines,seeCesarAdibMajul,TheContemporaryMuslimMovementinthePhilippines(Berkeley:Mizan,1985),pp.930.
346Cf.ibid,pp.302;T.J.S.George,RevoltinMindanao:TheRiseofIslaminPhilippinePolitics(KualaLumpur:Oxford
University,1980),pp.10721;W.K.CheMan,MuslimSeparatism:TheMorosofSouthernPhilippinesandtheMalaysofSouthern
Thailand(Singapore:OxfordUniversity,1990),pp.245.Thelatterprovidesevidence(p.25,chart)thatin1903Muslimsmade
up76%ofthepopulationofMindanao,butby1980thatproportionhadbeenreducedto23%.
UCRL-TR-227068 75
whichseveralMuslimsoldierswhohadbeensecretlyrecruitedintoaPhilippineArmyspecialoperationsunit
wereapparentlymassacred.347
Bytheearly1970stheprincipalMuslimgrouppromotingarmedstruggle,secessionfromthePhilippinerepublic,
andindependenceforMorolandwasNurMisuarisMoroNationalLiberationFront(MNLF),anessentially
nationalistorganizationwithanIslamiccoloringwhichmanagedtoconsolidatemanypreviouslydisparate
MorofightingbandsandforyearsledtheresistancemovementagainsttheArmedForcesofthePhilippines
(AFP)andtheChristianvigilantesquadswithwhomthemilitarycollaborated.AlthoughtheMNLFfoughtthe
Marcosgovernmenttoavirtualstandstillbythemid1970s,Misuarisnegotiationswithgovernmentofficials
concerninganewlycreatedMuslimautonomouszoneinthesouthprecipitatedaseriesofschismswithinthe
organization.Oneofthebreakawayfactions,theNewMNLFheadedbySalamatHashim,accusedMisuariof
deviatingfromIslamicobjectivesandevolvingtowards[a]MarxistMaoistorientation.Itwasthisgroup
thatin1984renameditselftheMILF.348AccordingtoHashim,thereconfigurationoftheNewMNLFintothe
MILFwascarriedouttounderscoreIslamastherallyingpointoftheBangsamorostruggle.Inalettertothe
SecretaryGeneraloftheOrganizationofIslamicConference,heelaboratedfurtheronthistheme:All
MujahideenundertheMoroIslamicLiberationFront(MILF)adoptIslamastheirwayoflife.Theirultimate
objectiveintheirJihadistomakesupremetheWORDofALLAHandestablishIslamintheBangsamoro
homeland.349YetitwasnottheMILFsdeclaredintentionattheoutsettoriseupagainstthePhilippine
governmentandwageanarmedstruggleinordertocreateanindependentstate,albeitperhapsonlyfortactical
reasons.Instead,itsleadersslowlyandcarefullybuiltuptheirforcesandgraduallyIslamizedtheliberated
areasundertheirdirectcontrolinpreparationforthefuturecreationofanIslamicstateinMoroland,whose
establishmenttheyviewedasalongertermprocess.Indeed,inanearly1980sMILFprogrammaticstatement
describingitsfourpointpolicyofIslamization,organizationalstrengthening,militarybuildup,andeconomic
selfreliance,thegroupinitiallyenvisionedathreephasestrategythatitsleadersexpectedwouldlastforfifteen
years,butthisrelativelyshorttimeframewassubsequentlyextendeduntiltheyear2050.350
Howeverthatmaybe,astimeworeonthegroupsunderlyingideologybecameincreasinglyradical.Thismay
havebeendueinlargeparttoexternalinfluencesratherthanspecificresponsestointernaldevelopmentswithin
thePhilippinearchipelago.Intheearly1980s,evenbeforetheformalestablishmentoftheMILF,theNewMNLF
sentthreebatchesofitscarefullyselectedfieldcommanderstoundergomilitarytrainingatcampsin
Afghanistan,ofwhomatleast360underwentayearlongcourseofmilitaryinstructionand180eventually
joinedthemujahidintofight.Partoftheirtrainingapparentlyinvolvedideologicalindoctrinationaswellas
handsonmilitarytraining,andgiventheirexposuretothistransnationaljihadistmilieuitislikelythatmanyof
347AgoodanalysisoftheJabidahMassacreisprovidedbyMaritesDaguilanVitugandGlendaM.Gloria,Underthe
CrescentMoon:RebellioninMindanao(QuezonCity:AteneoCenterforSocialPolicyandPublicAffairs/InstituteforPopular
Democracy,2000),pp.223.Whatmatteredmost,however,waswhattheMoroscollectivelybelievedhadtranspired,not
whatactuallyhappened.
348ForthecircumstancessurroundingtheMNLFMILFsplit,seeibid,pp.1214;Majul,ContemporaryMuslimMovementinthe
Philippines,pp.867;George,RevoltinMindanao,pp.2613.
349TheabovetwoquotesarecitedbyThomasM.McKenna,MuslimRulersandRebels:EverydayPoliticsandArmedSeparatism
intheSouthernPhilippines(Berkeley:UniversityofCalifornia,1998),p.208,whoarguesthatthesehadbeenthegoalsof
HashimandhiscohortseversincetheirstudentdaysatalAzhar,eventhoughforatimetheyhaddeferredtoMisuari
concerningMNLFpolicies.SeealsoVitugandGloria,UndertheCrescentMoon,p.122.Hencethenamechangeappearsnotto
havereflectedashiftintheirfundamentalgoals,butrathertheirrecognitionthatMisuarihadmanagedtoretainfirmcontrol
overtheMNLFeveninthefaceofbitterfactionalchallengestheyhelpedtolaunch.
350VitugandGloria,UndertheCrescentMoon,pp.1245.Cf.SalahJubair,Bangsamoro:ANationUnderEndlessTyranny(Kuala
Lumpur:IQMarin,1999),p.187.NotethatSalahJubairisthepennameofMohagherIqbal,theMILFsViceChairmanfor
Information.
UCRL-TR-227068 76
theseindividualsreturnedwithfarmoreradicalinterpretationsofIslamthantheyhadwhentheydeparted.351
Moreover,bythemid1990skeypersonnelassociatedwithUsamabinLadinslogisticalnetworkinthe
PhilippineswerecollaboratingcloselywithelementsoftheMILF,andbytheendofthedecadeforeignmembers
ofalQa`idawerereportedlytrainingfightersintheprincipalMILFcamps.352TheseIslamistradicalsfrom
overseasmusthaveaffected,whetherdirectlyorindirectly,theviewsoftheMILFmembersandsupporterswith
whomtheywereinteracting.Indeed,moremoderateMuslims,includingtraditionalleaders,manyyounger
professionals,progressives,andthepoor,werehighlycriticaloftheattemptsbyMILFleadersandthe
youngerIslamist`ulamawithwhichtheywerealliedtoimposestricterandmorepuritanicalinterpretationsof
IslamontheMorosresidingintheircampsandliberatedzones,assomePhilippineMuslimsweresecularized
butmoststillpracticedasyncretistictypeoffolkIslamthatincorporatednoticeablepaganandSufi
elements.353
EventheMILFsorganizationalstructure,whichwasconsideredmoreeffectivethanthatofMisuarislooser
group,reflecteditspronouncedIslamicorientation.LiketheMNLFtheMILFestablishedanexecutivebody
knownastheCentralCommittee,but liketheearlierBangsaMoroLiberationOrganization(BMLO)itformed
bothanIslamicjudicialorganinthiscaseonedubbedtheSupremeIslamicRevolutionaryTribunalanda
legislative ConsultativeCouncil(MajlisalShura)wherepoliciescouldbedebatedanddiscussedbythe
organizationsleaders.UndertheadministrativeauthorityoftheCentralCommitteeareaSecretariatsubdivided
intovariousfunctionalofficesandthree(latermore)vicechairmen,oneforPoliticalAffairs,oneforIslamic
Affairs,andoneforMilitaryAffairs.Thislastofficialisresponsibleforoverseeingtheoperationsofthegroups
armedwing,theBangsamoroIslamicArmedForces(BIAF).Asimilarbutsomewhatlesselaborate
organizationalstructurewasalsosetupbytheMILFattheprovinciallevel.354TheBIAFsubsequentlyevolved
fromalooselyorganizedguerrillaforceintoa12,00015,000strongsemiconventionalarmyconsistingofa
regularinfantryforceoperatingunderthedirectionofMILFChiefofStaffAlHajMuradIbrahim;anelite
InternalSecurityForce(ISF)headedbyAbdulAzizMimbantas,whosefunctionsincludepolicingMILFareas
andensuringthattheQur`anisproperlyobserved;andaSpecialOperationsGroup(SOG)headedbySaifullah
MuklisYunosandestablishedin1999,whichinspiteofthepublicdenialsofmovementspokesmenis
generallyconsideredtobetheterroristsectionoftheMILF.355
Ontheground,mainlyontheislandofMindanao,theMILFoperateswhatHashimcharacterizedasaparallel
governmentinoppositiontotheenemyadministration(i.e.,thePhilippinegovernmentbureaucracy)inthe
areasunderitscontrol,anapparatusthatrevolvedaround13majorand33lessercampsinthecountrysideand
alsofunctionedinsideMoroghettosinurbanareas(suchasCampoMusliminCotabatoCity).356Someofthese
351ForthistrainingofMILFcadres,seeZacharyAbuza,MilitantIslaminSoutheastAsia:CrucibleofTerror(Boulder:Lynne
Rienner,2003),pp.901.
352Ibid,pp.9599;RohanGunaratna,InsideAlQaeda:GlobalNetworkofTerror(NewYork:Berkley,2002),pp.2438.
353SeveralauthorshavenotedthatmoderateMuslimswereoftencritical,atleastprivately,oftheMILFsrestrictivedoctrines.
CompareVitugandGloria,UndertheCrescentMoon,pp.12831;andMcKenna,MuslimRulersandRebels,pp.21329.Forthe
folkIslamoftheMoros,seePeterGordonGowing,MuslimFilipinosHeritageandHorizon(QuezonCity:NewDay,1973),
especiallypp.44102.
354CheMan,MuslimSeparatism,pp.1945(Appendix4).TheBIAFwasoriginallycalledtheBangsamoroMujahideenArmy
(BMA).
355FortheMILFsmilitaryforces,seeVitugandGloria,UndertheCrescentMoon,pp.11112.FortheSOG,seePeterChalk,
AlQaedaanditsLinkstoTerroristGroupsinAsia,inTheNewTerrorism:Anatomy,TrendsandCounterStrategies,ed.by
AndrewTanandKumarRamakrishna(Singapore:EasternUniversitiesPress,2002),pp.11213;andidem,MilitantIslamic
ExtremismintheSouthernPhilippines,inJasonF.IsaacsonandColinRubenstein,eds.,IslaminAsia:ChangingPolitical
Realities(NewBrunswick:Transaction,2002),p.197.
356Thisshadowgovernmentwasmoreorlessclandestine,dependingonthelocale.SeeMcKenna,MuslimRulersandRebels,
p.209,wherehealsoquotesaletterwrittenbyHashim.ForthenumberofMILFcampsasof1998,whichapparentlyshifted
overtime,seeJubair,Bangsamoro,p.216.
UCRL-TR-227068 77
werearmedcampsthatfunctionedexclusivelyasmilitaryandlogisticalbases,suchasCampOmarin
Maguindanao,butthetwolargestCampAbubakarinNorthCotabatoandCampBushrainLanaodelSur
wereextensive,economicallyselfsufficiententitiesthathousedentireMuslimcommunitiesandwereintended
toserveasexemplarsandlivingmodelsoftheIslamicstateandIslamizedsocietythattheMILFeventually
hopedtoestablishthroughoutMoroland.357Forexample,priortoitspartialJuly2000capturebytheAFP,Camp
Abubakarhaddevelopedintoavast5,00010,000hectarecomplexthatextendedforfortymilesandincluded
partsofsevenvillages,andwithinitsconfinestheMILFhadgatheredtogetheraselfcontainedIslamic
communitywithamosque,areligiousschool,aprison,amilitarytrainingacademy,anarmsfactory,asolar
powersource,sophisticatedtelecommunicationsequipment,familyhousing,markets,afruitnursery,and
agriculturalplots.358Ironically,someoftheseamenitieswerefinancedwithdevelopmentfundsprovidedbythe
Philippinegovernment,inparttocoopttheMILFandinparttohelpthesecurityagenciesmonitoractivities
insidethecampitself.
Indeed,theMILFhashadalong,complex,andshiftinghistoryofinteractionswiththegovernment.Attimesthe
twosideshavemanagedtoestablishatemporarybutunstabletruce,butonotheroccasionsveryheavyfighting
hasbrokenoutbetweenthem. Forexample,theMILFwasunhappyaboutthetermsofthe1996peace
agreementthatthegovernmenthadbrokeredwiththeMNLFandevenmoresoaboutitssubsequent
implementation.Asaresult,certainelementswithintheMILFbeganopenlypromotingthewagingofanarmed
struggleagainstthegovernmentandthecreationofaseparateBangsamoroIslamicstateassoonasthiswas
feasible.Therelationshipbetweenthetwopartieswasfurthercomplicatedandstrainedduetothegrowing
impactofradicalIslamistdoctrinesontheMILFsleadershipcadre,aprocessthatwasonlyacceleratedby
growingcollaborationwithalQa`idaandregionalSoutheastAsianIslamistnetworkslikeJemaahIslamiyah(JI:
IslamicCommunity).AlthoughtheAFPhasperiodicallylaunchedseveralpartiallysuccessfulmajoroffensives
againsttheMILFinrecentyears,atpresentanuneasymodusvivendiexistsbetweenthegovernmentofPresident
GloriaMacapagalArroyoandtheorganizationsleaders,whohaveprudentlymoderatedtheirpolitical
demands,curtailedtheSpecialOperationsGroupsviolentactions,andpubliclysoughttodistancethemselves
fromalQa`idaandotherforeignIslamistterroristgroupsinthewakeoftheSeptember11,2001assaultsonthe
UnitedStates.Indeed,aspartofherongoingeffortstoreachanegotiatedsettlementwiththeMILF,the
PhilippineheadofstatehassofarsuccessfullylobbiedPresidentGeorgeW.BushnottohavetheMILFaddedto
theU.S.StateDepartmentslistofForeignTerroristOrganizations.359DuringanOctober2003visittothe
Philippines,theAmericanpresidentevenwentsofarastopraisetheleadersoftheMILFfortheirresponsible
behavior,inmarkedcontrasttohisovertlybelligerentandhostileremarksabouttheASG.360
Thiswasallthemoresurprisinggiventhatearlierthatsameyeartherehadbeenadramaticupsurgeofviolence
bytheMILF,includingoutrightterroristattacks(suchasthebloodyMarch4,2003bombingattheDavaoairport)
andacampaigntargetingregionalCI,afterseveralyearsofhavingconductedmainlylowleveloperationsinthe
midstofcarryingondifficultnegotiationswiththegovernment.InFebruary2003,underthepretextthatthey
weregoingaftermembersofacriminalkidnappingforransomgroupknownasthePentagonGang,5,000
PhilippinetroopslaunchedthesocalledPikitOffensiveinNorthCotabatoinanefforttooverrunanddestroy
theMILFsCampBuliok,whereboththesekidnappersandforeignterroristsweresaidtohavetakenrefuge.361
357CheMan,MuslimSeparatism,pp.924;MariaA.Ressa,SeedsofTerror:AnEyewitnessAccountofAlQaedasNewestCenterof
OperationsinSoutheastAsia(NewYork:FreePress,2003),pp.710;VitugandGloria,UndertheCrescentMoon,pp.11314
(Abubakaronly).
358Ibid,pp.10611.
359Abuza,MilitantIslaminSoutheastAsia,p.99.
360RemarksbythePresidenttothePhilippineCongress,fulltextonWhiteHousewebsite,October18,2003:
www.whitehouse.gov/news/releases/2003/10/print/2003101812.html.
361See,e.g.,ZoharAbdoolcarim,ThePhilippinesTerroristRefuge,Time[Asia],February17,2003;AnthonySpaeth,First
Bali,nowDavao,Time[Asia],March10,2003.
UCRL-TR-227068 78
InreactiontothismajorAFPoffensive,whichkilleddozensofrebelsandendedupdisplacinghundredsof
thousandsofpeoplewholivedintheregion,theMILFlaunchedmilitarycounterstrikesthatincludedseveral
majorandminorattacksonthepowergridofMindanao.TypicalofsuchattackswastheFebruary12,2003
topplingoftwoNationalPowerCorporation(Napocor)electricaltransmissiontowersinPagagawantown,
whichcausedpoweroutagesintheentireprovinceofMaguindanaoandpartsofnearbyNorthCotabato.362Still
moreseriousweretheattacksonseveralelectricalfacilitiesinLanaodelNorteonFebruary26,2003,which
resultedinacompleteblackoutinmostpartsofMindanaoforseveralhoursandaffectedmajorurbancenters
suchasDavaoCity,GeneralSantos City,CagayandeOro,Cotabato,Butuan,andMalaybalay.363Perhaps
becauseseveraloftheseattacksadverselyaffectedtheveryMoroinhabitantsoftheregionwhosesupportthe
organizationsoughttorally,MILFspokesmenofficiallydeniedanyresponsibilityforcarryingoutthese
infrastructuralattacksinspiteoftheevidenceindicatingthatitsfightersweredirectlyinvolved.Hencethey
offerednopublicexplanationoftheirreasonsforattackingsuchtargets.
However,itiseasytoinferthattheseattacksonCIweresimplypartandparceloftheextensivearrayof
standardguerrillatacticsthattheMILFemployedagainstthePhilippinemilitaryandsecurityforces.Inthat
sense,thecaseoftheMILFalargeIslamistseparatistgroupthatexercisesdirectadministrativecontrolover
sizeableterritoriesandenjoysconsiderablepopularsupportinMorolanddiffersconsiderablyfromthecasesof
tinyselfstyledpoliticalorreligiousvanguardswithlittleornopopularsupportthatresortprimarilyto
terrorisminthestrictsenseofthatterm,i.e.,terroristgroupsproper.TheMILFisinsteadmoreakintobroad
basednationalliberationorganizationsliketheformerNationalLiberationFront(NLF)inSouthVietnam,the
FARCinColombia,andtheFrontdeLibrationNationale(FLN:NationalLiberationFront)inAlgeria,not
(obviously)fromanideologicalstandpointbutratherfromthestandpointofitsmethodsandtechniquesof
struggle.MILFattacksonCIappeartoconformtotheoveralllogicofwagingamultifacetedguerrillaorsemi
conventionalwarwithinaboundedterritory,andinthatsensetheiractionsmaynotrepresentthereasonswhy
transnationalIslamistterroristnetworkssuchasalQa`idamightdecidetomakeinfrastructuralattacksonU.S.
soil.Despitethis,theMILFsrecentwaveofCIattacksmaywellbeindicativeofagrowingIslamistinterestin
attackinginfrastructure.
C.TheRecordofthePastandLikelyFutureCIThreats
Thecasestudiesabovewereselectedinpartbecausetheyservedtoillustratethebroaderpatternsalready
identifiedregardingthetypesofnonstategroupsthataremostlikelytocarryoutattacksonCI.Asnotedabove,
nationalistandseparatistgroupswereresponsibleformostoftheinfrastructuralattacksinthe1960s,whereas
leftwinggroupscarriedoutmostoftheCIattacksinthe1970sand1980s.Inthe1990s,andthusfarinthenew
millennium,religiousterroristshavesurpassedallothertypesofgroupsincarryingoutCIattacks.
362Atleast63peoplekilledinfightinginSouthernPhilippines,DeutschePresseAgentur,February12,2003;AFP:70
reporteddead,ThousandsfleeasPhilippineMuslimRebels,ArmyClash,WorldNewsConnection,February12,2003;
SouthernPhilippineClashonasRebelsBlastPowerRelayGears,XinhuaGeneralNewsService,February12,2003;AllenV.
Estabillo,FiveNapocorTowersinC.MindanaoBombed,Businessworld(Philippines),February18,2003.
363LuzBaguioro,MindanaoBlackout:18mPeopleontheIslandinSouthernPhilippinesareLeftintheDarkAfterMuslim
GuerillasBombaPowerStation,TheStraitsTimes(Singapore),February28,2003;MILFRebelsBombPowerStattion,
TopplePylonsinSouthPhilippines,ChannelNewsAsia,February27,2003;PhilippineMilitaryHighlyAlertonMindanao
PowerStations,XinhuaGeneralNewsService,February27,2003;MoslemRebelAttacksTriggerBlackoutinSouthern
Philippines,DeutschePresseAgentur,February27,2003;PhilippineTranscoExpectstoRestorePowerinMindanaoby
Today/EarlyFriday,AFXAsia,February27,2003;SouthernPhilippinesinBrownoutDuetoDestroyedPowerGears,
XinhuaGeneralNewsService,February27,2003;MilitantsAttackPhilippinesPowerStation,JapanEconomicNewswire,
February26,2003;FelipeF.Salvosaetall,MILFAttackCausesMindanaoBlackout(NapocorTowerToppledDown,
Businessworld,February28,2003;MILFRebelsStepUpAttacks,DestroyPowerTowersinPhilippines,BBCWorldwide
Monitoring,February27,2003.ItisunclearwhetherthisattackwascarriedoutusingImprovisedExplosiveDevicesor
mortars.
UCRL-TR-227068 79
Fortunately,thereislittlereasontosupposethatviolencepronenationalistandorthodoxMarxistgroupswillbe
inclinedtoattackAmericanCIintheforeseeablefuture,especiallyinsidetheU.S.itself.Nationalistgroups,
almostbydefinition,tendtoattackinfrastructuraltargetswithintheirownhomelandsorwithinthewider
territoriesattimesincludingthegroundsofforeignembassiesofthegovernmentstheybelieveare unjustly
occupyingand/orexploitingthem,asthecasesoftheFLNC,LTTE,ETA,andIRAclearlydemonstrate.Themain
exceptionstothisgeneralpatternhavebeenfactionsandoffshootsofthePLO,whichcarriedoutlethalattacks,
seizuresofhostages,andhijackingsallovertheworldforovertwodecadesinordertopublicizetheircause.
OldstyleMarxistterroristgroupshavealsotypicallyattackedCIwithintheirownnations,oratmostontheir
owncontinents,despitetheirprofessedinternationalistorientation.Heretheprimaryexceptionwasthe
JapaneseRedArmy(JRA),whichcarriedoutseveralattacksintheMiddleEastonbehalfoffraternal
Palestinianorganizations.MoretypicalaretheEuropeanfightingcommunistorganizations,whichalmost
alwaysattackedCIintheirowncountriesorwithintheconfinesofWesternEurope,andMarxistgroupsinthe
ThirdWorld,whichhavealsotendedtocarryoutsuchattacksintheirownorneighboringcountries.Thishas
certainlybeentrueoftheFARCinColombiaandSLinPeru,anditislikewisetrueoftheMaoistterroristgroups
operatinginNepal,thePhilippines,andIndia.Moreover,thesetypesoforthodoxleftwinggroupsare
increasinglyrare,nottomentionunpopular,sincethecollapseofthecommunistbloc,theendoftheColdWar,
andtheperhapsfataldiscreditingoftheentireMarxistrevolutionaryproject.Whatthissummarysuggestsis
that,ratherthantraditionalMarxistrevolutionarygroups,certainnewstyleextremistgroupsthathaveemerged
andgrowninimportanceinrecentdecadesarethemostlikelytocarryoutattacksonAmericasCI.
Suchgroupsfallmainlyintothreemaincategories:1)Islamistterroristgroupswithaglobalratherthana
narrowlynationalorregionalagenda;2)domesticrightwingmilitiaswhosemembersbitterlyopposeboth
theNewWorldOrderandtheZionistOccupationGovernmentthathasallegedlyusurpedpowerinthe
U.S.;and3)violentfringesoftheradicalecologymovement,especiallythosewithanuncompromisinganti
technologyorneoLudditeagenda(e.g.,philosophicalprimitivistsandthemostextremeproponentsofthe
mystical,technophobic,andantirationalistdeepecologycurrent).Inaddition,certainviolencepronegroups
thathaveattachedthemselvestotheworldwideandextraordinarilydiverseantiglobalizationmovement,in
particularsmallbutviolentanarchistandneofascistfactions,mayeventuallyconstituteaninfrastructuralthreat.
Thereareanumberofindicationsthatthesearethemilieusfromwhichthegreatestdangerstems.
IslamistGroups
TherearemultipleindicatorsthatviolentIslamistorganizationsareincreasinglyfocusingboththeirattention
andactualattacksoninfrastructuraltargets.ThiswaspubliclyacknowledgedbyAlgerianterroristAhmad
RassaminhisJuly2,2001courttestimonyafterhewasarrestedinconnectionwiththefailedmillennium
bombingplot,whosetargetappearstohavebeenthecontroltoweratLosAngelesairport:
[U.S.AttorneyJoseph]Bianco:Whatdidthesabotagepartofthetraining[inoneofalQa`idas
campsinAfghanistan]consistof?
Ressam[sic]:Howtoblowuptheinfrastructureofacountry.
Bianco:Whattypesoftargetswereyoutrainedon?
UCRL-TR-227068 80
Ressam:Theenemies[sic]installations,specialinstallationsandmilitaryinstallations,such
installationssuchaselectricplants,gasplants,airports, railroads,largecorporations,gas,gas
installationsandmilitaryinstallationsalso.364
OtherinfrastructuraltargetswereexplicitlylistedinthealQa`idatrainingmanualfoundbyBritishpoliceinan
apartmentinManchester.InthesectionlistingthemissionsrequiredofalQa`idasMilitaryOrganization,the
followingitemswerelisted,allofwhichinpartconcernCI:
1.Gatheringinformationabouttheenemy,theland,theinstallationsandtheneighbors
7.Blastinganddestroyingembassiesandattackingvitaleconomiccenters.
8.Blastinganddestroyingbridgesleadingintoandoutofthecities.365
BinLadinhimselfhasrepeatedlyurgedhisfollowersandotherjihadiststoattacktheU.S.economic
infrastructure.Forexample,inoneundatedstatement,hesaid:
JihadagainstAmericawillcontinue,economicallyandmilitarily.BythegraceofAllah,
Americaisinretreatanditseconomyisdevelopingcrackseverincreasingly.Butmoreattacks
arerequired.Iadvisetheyouthtofindmoreoftheir[Americas]economichubs.Theenemycan
bedefeatedbyattackingits[sic]economiccenters.366
Perhapsmostdisturbingly,alQa`idaspokesmenandoperativeshavespecificallydiscussedattackingnuclear
plants.AsKhalidShaykhMuhammadputit,nuclearfacilitieswereconsideredakeyoptionforattacksbythe
group.367Needlesstosay,manyotherreferencestotheimportanceofattackingCIcanbefoundinIslamist
sources.368
Norhasthisallbeenloosetalkorbluster.OnseveraloccasionsIslamistterroristshaveeithercarefullyplottedor
actuallycarriedoutsignificantattacksagainstinfrastructuraltargets.EvenifoneexcludestheFebruary4,1993
WorldTradeCenterbombing,RamziYusufssubsequentBojinkaplottoblowupseveralAmericanjetlinersin
flightonthesameday,the1998bombingsofU.S.embassiesinAfrica,andthedevastatingSeptember11,2001
attacksonthegroundsthatalQa`idasoperativeshadmultiplemotivesforcarryingthemout,itshouldnever
beforgottenthatmembersofaNewJerseybasedIslamistcellinspiredbyShaykhUmaribnalRahman,an
erstwhileleaderofthetwodeadliestEgyptianterroristorganizations,wereconvictedinthemid1990sof
planningtobombtheGeorgeWashingtonbridgeandtheHollandandLincolntunnels,amongstotherhigh
profiletargets.369Hadthisseriesofplannednear simultaneousattacksbeensuccessfullycarriedout,theresults
couldhavebeencatastrophic.InrecentyearsIslamistterroristshaveoftenspecificallytargetedCI,andindeed
therehavebeenseveralreportsofincidentsofthistypeinjustthelastfewmonths. Forexample,intheSpringof
2004,IslamistsmadetwocoordinatedsuicideboatattacksonenergyrelatedinfrastructuresinSaudiArabia,
oneattheADBLummusGlobalpetroleumfacilityonMay1andoneattheArabPetroleumInvestments
CorporationonMay29.Theseevents,togetherwithaseriesofIslamistattacksonthehousingcomplexesof
Westernersworkinginthecountrysoilindustry,promptedSaudiofficialstoreassureforeignenergyfirmsthat
364CitedinBenVenzkeandAimeeIbrahim,ThealQaedaThreat:AnAnalyticalGuidetoalQaedasTacticsandTargets
(Alexandria,VA:Tempest,2003),p.97.
365[alQ`ida],IalnalJihdalaalTawghtalBild(nopublicationinformation),p.12oftranslatedversion(emphasesours).
366VenzkeandIbrahim,ThealQaedaThreat,p.118.
367Ibid,pp.1445.
368See,e.g.,ibid,pp.967,99103,11230,1335,1468,1536.
369UnitedStatesDistrictCourt,SouthernDistrict,UnitedStatesofAmericav.OmarAhmadAliAbdelRahman.Forashort
summary,seeSimonReeve,TheNewJackals:RamziYousef,OsamabinLadinandtheFutureofTerrorism(Boston:Northeastern
University,1999),pp.602.
UCRL-TR-227068 81
theirgovernmentwouldbeabletoprotectthemfromfuturealQa`idaattacks.370Similarattackshavebeenmade,
bothbyBa`thisthardlinersandjihadists,againsttheIraqioilinfrastructure,suchastheJuly1,2004maritime
attackcarriedoutbythreesuicideboatsontheKhural`AmayaoilterminalnearBasra.371Stillmorerecently,
HonduransecurityofficialsinitiallyreportedthatawantedalQa`idaterroristnamedAdnanalShukrijumaor
Ja`afaralTayyarhadplannedtoplantexplosivesinthePanamaCanalinordertohampertheflowofshiptraffic,
anactionthat,ifsuccessfullycarriedout,couldhavehadveryseriousconsequences.Althoughtheseinitial
mediareportswerelaterrevised,thePanamaCanalAuthoritynonethelesswarnedshipstotightentheirsecurity
againstpossibleterroristattackorriskbeingrefusedpassagethroughthecanal.372Moreover,onJune21,2004
membersoftheGroupeSalafistepourlaPrdicationetleCombat(GSPC),anAlgerianIslamistterroristgroup
closelylinkedtoalQa`ida,detonatedalargecarbombatthemainelectricityplantinthecapitalAlgiers,killing
11peopleanddoingconsiderabledamagetothefacility.Althoughtheblastwasoriginallyportrayedasan
accident,thissuccessfulattackgreatlyconcernedtheAlgerianauthoritiesandWesterndiplomats,sinceit
indicatedthattheGSPCmightalsobeabletopenetratesecurityatthecountrysvitaloilandgasproduction
installations,uponwhichitseconomyheavilydepends.373Inshort,alltheindicationsarethatIslamistterrorists
370ElaineShannon,LearningfromTerrorAlerts,Time,July14,2004;Saudismovetoreassureforeignoilfirms,World
Tribune,May31,2004.
371JamesGlanz,15MilesOffshore,SafeguardingIraqsOilLifeline,NewYorkTimes,July6,2004.Thissamearticlenotes
thatmanyattackshavealsobeenmaderecentlyonIraqsoilpipelines,whichinterimPrimeMinisterIyadAlawiestimated
hascostthenation$200millioninlostoilrevenue.Theseattacks,however,arepartoftherepertoireofhitandrunguerrilla
tacticsbeingemployedbyantiCoalitioninsurgentgroups,asopposedtoexamplesofIslamistterrorism.
372PanamaCanaltargeted,TheAustralian,July1,2004;SherrieGossett,PanamaCanaltargetofalQaidasuspect?,
WorldNetDaily,30June2004;Panamatellscanalshipstotightensecurity,Reuters,July7,2004.
373Cf.BlasthitsAlgerianpowerstation,CNN,June21,2004;AlgeriasaysJuneblastwascarbomb,Reuters,6July2004;
StephanieIrvine,Algiersblastwascarbombing,BBCNews,July7,2004.Apparently,oneofthegroupsmotivesfor
perpetratingthisattackwastoretaliatefortherecentkillingofGSPCleaderNabilSahrawibyAlgeriansecurityforces.This
incidentsuggeststhatcertainotherdisastrousexplosionsatindustrialfacilitieswhichwereinitiallylabeledaccidentsmay
alsohavebeenintentionallycaused.OneofthemostworrisomeincidentsoccurredonSeptember21,2001tendaysafter
the11SeptemberattacksintheU.S.whenamassiveexplosiondestroyedmuchofthehugeAzotedeFrance(AZF)
chemicalplantcomplexnearToulouse.ThisAZFplantwasthelargestmanufacturerofphosphateandnitrogenfertilizersin
France,andtheblastkilled30people,injured3000,damaged10,000buildings,andresultedin2.3billionEurosworthof
damage.SeeFrenchfactoryblastkills17,CNN,September21,2001(foraninitialreport);andAmmoniumNitrate
ExplosionatAZFToulouse,UtilityEngineeringwebsite,April4,2003(foramorecomprehensiveone):
www.saunalahti/fi/ility/AZF.htm.AlthoughtheFrenchgovernmentofficiallyconcludedthattheexplosionthatdestroyed
thefacilitywastheresultofanindustrialaccident,therearecertainsuspiciousaspectsofthecasethatsuggestthatIslamist
extremistsmighthavebeenresponsible.HasanJandubi,aFrenchnationalborninTunisiawhohadbeenhiredtoworkatthe
plantfivedaysbeforethedisasterandhad,theverydaybefore,yelledatFrenchtruckdriversdisplayingAmericanflagsin
sympathywiththe9/11victims,wasfounddeadatthescenedressedintwopairsoftrousersandfourpairsofunderpants,
inthemannerofkamikazefundamentalists.AnLCITVinvestigationlaterrevealedthatJandubiwasamemberofasmall
localcellofalTakfirwaalHijra(ExcommunicationandMigration),oneofthemostradicalofallIslamistterroristgroups,
andthattwofellowcellmembershadpreviouslyspenttimeinAfghanistan.WhenFrenchpolicefinallywenttosearch
Jandubisapartment,theydiscoveredthatithadalreadybeencompletelyclearedoutandcleaned.Cf.DanielPipes,Terror
andDenial,NewYorkPost,July9,2002;andWorstFrenchIndustrialAccidentProbablyTerrorism,IsraelNow,July9,
2002.FormoreontheoriginalEgyptianTakfirwaalHijragroup,seeEgypt,inBarryRubin,ed.,Revolutionariesand
Reformers:ContemporaryIslamistMovementsintheMiddleEast(Albany,NY:StateUniversityofNewYork,2003).Curiously,
duringtheWinterof2004amysteriousnewgroupcallingitselfAZFsentaseriesofblackmailletterstotheFrench
governmentthreateningtodetonatetenexplosivedevicesthatitsmembersclaimedtohaveplacedontraintracksiftheydid
notreceivea5milliondollarransom.OnerathersophisticateddevicewassubsequentlylocatedbyFrenchpolicealonga
vitaltrainline,butnoransomwaseverpaidandintheendnoseriousdamagewasdone.SeeFrenchrailterrorthreat,AFP,
March3,2004;NowordfromFrenchbombgroup,Reuters,March5,2004;ExplosivefoundunderFrenchrailwayafter
threatsfrommysteriousgroup,AssociatedPress,March24,2004.Accordingtothislastsource,thelettersweresentto
FrenchembassiesinMuslimcountriesthroughouttheworldandexplicitlythreatenedtopunishFranceforbanningIslamic
headscarvesinpublicschools.
UCRL-TR-227068 82
areincreasinglyfocusingtheirattentiononinfrastructuraltargets,bothintheirowncountriesandbeyond.For
thisveryreason,membersofthetransnationaljihadistnetworkscanbeexpectedtoattackU.S.CIatsomepoint
inthefuture.
UCRL-TR-227068 83
DomesticAmericanRightWingGroups
MembersofrightwingAmericanparamilitaryorganizationsalsoposeasignificantpotentialthreattoCIinthis
country.SuchpeoplehavealreadyattackedinfrastructuraltargetsintheU.S.,althoughinmostcasesthose
attackshavehithertobeencrudeandnotparticularlydestructive.Themostsignificantattackthatfallsbroadly
withintheinfrastructuralcategorywasTimothyMcVeighsApril19,1995bombingoftheAlfredC.Murrah
federalbuildinginOklahomaCity,butliketheperpetratorsofthe9/11attacksandtheDecember2001attackon
theIndianParliament,thedisgruntledformersoldierhadmultipleandrathergrandiosemotivesforcarrying
outthisaction,theleastofwhichwastotemporarilydisruptthefunctioningofthefederalgovernmentinone
Midwesterncity.374Onseveralotheroccasionsdomesticmilitiashavecarriedoutattacksonlocalofficesofthe
InternalRevenueService(IRS)orothergovernmentagencies,aswellasfilingahostofspuriouscommonlaw
legalsuitsagainstofficialsandrepeatedlythreateningtoharmfederal,state,county,andmunicipalemployees
soastopreventthemfromcarryingoutcertaindutiestheyviewasinimicaltotheirinterests.
SomeindividualsaffiliatedwiththeAmericanfarrightandmilitiamilieushaveopenlydiscussedtargeting
infrastructure,bothinworksoffictionandinmanualsdesignedforinternaldistributiononly.Forinstance,in
therecentlydeceasedNationalAllianceleaderWilliamL.Piercesapocalyptic1978novelTheTurnerDiaries,
groupsofracistpatriotsmanagetodestroytheWashington,DC,headquartersoftheFederalBureauof
Investigation(FBI)withanammoniumnitratetruckbomb,makeamortar attackontheCapitolBuildingduring
ajointsessionofCongress,destroytheshippingandindustrialcapacityofHoustonwithaseriesof14major
bombings,destroyanuclearplantoutsideChicago,knockoutwaterand powerutilities inLosAngeles,
eradicatethecityofCharleston,SouthCarolinawithanuclearbomb,anddestroythePentagonwithasmall
airplaneloadedwithanucleardevice,tonameonlyafewofthemostsignificantinfrastructuralattacks.375This
bookmayhavereflectedlittlemorethanfantasticwishfulthinking,butitnonethelessprovidesawindowinto
thethinkingofcertainsegmentsoftheAmericanfarright.
Potentiallymoreworrisomeisa6pageFebruary1997documententitledIntelligenceGatheringGuidelines
thatwasissuedbyBillLacy,theselfdescribedNationalCommanderofCentralIntelligenceOperationsforthe
AmericanConstitutionalMilitiaNetwork(ACMN),adiversecoalitionofparamilitaryorganizationsfrom
fourteenstates.Thisinternalbulletin,whichwasinitiallydistributedalongwithcopiesoftheMilitiaof
Montanas(MOM)monthlymagazineTakingAim,discussesbothpassiveintelligencegatheringmethods
suchastalkingtomilitaryandlawenforcementpersonnel,observingtroopmovementsandlawenforcement
activities,andscrutinizingmediareportsandovertmethodssuchasthedevelopmentofassetswhocan
providesensitiveinformationabouttargetedfacilitiesandorganizations.Accordingtothedocument,
374FortheOKCbombing,seeespeciallyUnitedStatesDistrictCourt,DistrictofColorado,UnitedStatesofAmericav.Timothy
JamesMcVeighandTerryLynnNichols.AccordingtothetestimonyofhiserstwhilefriendMichaelFortier,McVeighsmotives
forcarryingoutthisattackweretokillasmanypeopleaspossible,aboveallthosewhohebelievedweredirectlyresponsible
forprecipitatingtheApril19,1993conflagrationattheBranchDavidiancompoundinWaco,andtocauseageneral
uprisinginAmerica,sincehefeltthatsuchanactionmightknocksomepeopleoffthefenceandurgethemintotaking
actionagainstthefederalgovernment.CitedbyCaptainRobertL.Snow,TheMilitiaThreat:TerroristsAmongUs(NewYork
andLondon:PlenumTrade,1999),pp.978.
375AndrewMacdonald(pseudonymforPierce),TheTurnerDiaries:ANovel(Hillsboro,WV:NationalVanguard,1999[1980]),
passim.
UCRL-TR-227068 84
Your[unitintelligenceofficer]mayaskyourassetstoseekoutcertainprofessionalstobefriend,
andthroughthisfriendshipextractcriticalinformation.Hemayaskyourassetstodoaphysical
reconofvariousfacilitiesinordertodeterminefloorplansorsecurityprocedures.376
Thesametextalsoencouragedmilitiamemberswhoworkedforgas,electric,telephone,orwaterservicesto
disclosecompanysecurityproceduressothattheywouldbeinapositiontotargetkeyinstallationsforthe
purposesofharassment,disruptionanddisablingofenemyfieldcommunications,watersupplies,fuelsupplies
andmakeoccupationbytheseenemytroopsmoredifficult.377Thespecificinformationsoughtinthese
intelligencegatheringeffortswaslistedinasheetappendedtotheaforementioneddocumentandpresentedin
theformofthemilitarystyleacronymSALUTE,signifyingSize,Activity,Location,Unit,Time,andEquipment.
ThisSALUTEschemewasidenticaltoonealsodistributedin1995bytheMOMinconnectionwithitsinitiation
oftheUnAmericanActivitiesIntelligenceCommittee,yetanotherintelligencegatheringprojectthatMOMhad
undertakenjointlywithaNewHampshiremilitiagroup.ItthenreappearedagaininMay1997,inasimilar
venturesponsoredbytheThirdContinentalCongress.
Anothermilitiadocumentthatspecificallyreferstotargetinginfrastructureisa68pagephotocopiedpamphlet
datedJune6,1994andentitledOPLANAmericanViper,whichwasdistributedfreethroughouttherightwing
paramilitaryundergroundduringtheperiodpriortotheOklahomaCitybombing.Apartfromprovidingan
apocalypticChristiannationalistjustificationforlaunchinganinsurgencyagainstthehiddensocialist
infrastructureofthefederalgovernment,itcontainsanannexdealingwithtacticsthatsuggestsgraduating
fromattacksonsofttargetssuchasunguardedraillines, unguardedtelephoneandradiocommunications
linesandtowers,unguardedwatersupplies,lightlyguardedsupplypointsandstorageareas,andothertargets
ofopportunity.378Thistreatisewassubsequentlyrepublishedwithacoversometimebetween1995and1997as
MilitiaOperationPlanAmericanViperbyaPosseComitatus(PoweroftheCounty)affiliatedenterpriseinDelCity,
Oklahoma,allegedlyinordertosupportanddefendtheConstitutionfromallenemies,bothforeignand
domestic[andto]informGodspeopleandtrueAmericansthatloveAmerica.Thesepamphletsclearly
demonstratethatvariousdomesticrightwinggroupshavehadaninterestinattackinginfrastructure.
Moreover,asiftounderscorethefactthatthesepublicationswerenotmeantsolelyforentertainment
purposes,twoindividualspreviouslyassociatedwiththeThirdContinentalCongresswerearrestedonJuly4,
1997,astheypreparedtoattackFortHoodduringanIndependenceDayopenhousebeingheldontheKilleen,
Texasmilitarybase.Atthetimeoftheirarrest,thegroupwasfoundwithKevlarvests,rifles,pistols,1,600
roundsofammunition,improvisedexplosivedevices(IEDs),andamanualknownastheMilitiaSoldiers
OperationsHandbook.379Indeed,inrecentyearstherehavebeenseveralabortiveplotsandafewactualattacks
carriedoutagainstinfrastructuraltargetsfromthisquarter.Forexample,onOctober9,1995anunknowngroup
callingitselftheSonsoftheGestapoleftnotesatthesceneexcoriatingthegovernmentandclaiming
responsibilityforthederailmentofanAmtrakpassengertrainnearHyder,Arizona,whichkilledoneperson
andinjured78others.380OnJuly1,1996severalmembersofanArizonamilitiaorganizationcalledtheViper
Teamwerearrestedandconvictedonfederalconspiracy,weapons,andpossessionofexplosiveschargesafter
theywerecaughtconductingsurveillanceongovernmentofficestheywereconsideringtargeting,including
376CitedbyMichaelReynolds,PreparingforWar,SPLCIntelligenceReport86(Spring1997),pp.89.Iwouldliketothank
theauthorofthisarticle,aspecialistontheAmericanradicalright,fortheprovisionofactualcopiesandbackground
informationaboutthismanualandtheothertextsdiscussedbelow.
377Ibid.
378MilitiaOperationPlanAmericanViper(DelCity,OK:UnitedSovereigns,nodate),Annex2,pp.301.
379AttackonU.S.basesthwarted,DallasMorningNews,April17,1997.Fiveothermembersofthegroupwerealsoarrested
inthreeotherstatesforplottingtoattackothermilitaryinstallationsthattheybelievedwerebeingusedtotrainUnited
Nationstroops.
380JimHill,Sabotagesuspectedinterroristderailment,CNN,October10,1995.
UCRL-TR-227068 85
thosehousingtheFBI,IRS,SecretService,BureauofAlcohol,TobaccoandFirearms(BATF),Immigrationand
NaturalizationService(INS),NationalGuard,andPhoenixPoliceDepartment.381OnApril27,1997threeoutof
fourmembersofaKuKluxKlanfactionwerearrestedinaplottoblowupanaturalgasrefineryoutsideFort
Worth,Texas,intheprocesspotentiallykillinghundredsofpeople,inthehopesofcreatingadiversionfora
plannedarmoredcarrobbery.382OnApril18,1998threemembersoftheNorthAmericanMilitiaof
SouthwesternMichigan,oneofwhomwasalsoamemberoftheAryanNations,werearrestedandconvictedon
firearmsandotherchargesafteritwasdiscoveredthattheywereplanningtobombfederalbuildingsandan
interstatehighwayinterchangeaswellasdestroyaircraftataNationalGuardbase.383Perhapsmostinteresting
ofallwastheplothatchedbyDonaldL.Beauregard,headofamilitiacoalitiongroupknownasthe
SoutheasternStatesAlliance,todestroyenergyfacilitiespossiblyincludinganuclearpowerplantand
therebycausepoweroutagesinFloridaandGeorgia,creategeneralchaos,andprecipitatemartiallawinthe
hopesthatrepressiveoverreactionsbythegovernmentwouldcatalyzeapopularrevolt.384
Thereseemstobelittledoubt,then,thatdomesticrightwingextremistshavedisplayedanongoinginterestin
targetinginfrastructure,andthereisnoreasontosupposethatthissituationwillchangeintheforeseeable
future.Fortunately,mostoftheplotstheyhavesofarhatchedhavebeenhamfistedandineffective,andtheir
organizationalandoperationalsecuritymeasureshavegenerallybeeninadequatetopreventtheinfiltrationof
governmentinformants.Evenso,anddespitethefactthattheprincipalthreattoAmericasCIundoubtedly
stemsfromtransnationaljihadistnetworks,TexasCityhomelandsecuritydirectorBruceClawsonwasrightto
emphasizethatwestillhavetocontendwithplentyofhomegrownidiotswhomightwanttodosomething
[toharmourinfrastructure].385
RadicalEcologyGroups
Radicalecologygroupsmaysimilarlyemergeasperpetratorsthatposeaparticularthreattocritical
infrastructures.Manyofthesegroupsviewtheenvironmentasintrinsicallyjustasvaluableashuman
civilizationandthemselvesasavatarsdefendingthenaturalworldagainstthegreedypredationsofindustry.
Theyseethestateanditsorgans(particularlylawenforcementofficials)astoolsofcorporateinterests.Radical
ecologygroups,suchastheEarthLiberationFront,haveinthepastdecadealsobecomeinfusedwithstrandsof
anarchist,antiCapitalistandvariousothersocialrevolutionaryideologies,whichhasbroadenedtheirtargets
andarguablyincreasedtheirradicalism.Atleastupuntilthepresenttime(althoughtherearesignsthatthese
groupsmaybebecomingmoreviolent)386thesegroupshaveclaimedtoavoidcausinganyphysicalharmto
humanbeings.Consequently,almostalltheiroperationshaveinvolvedattacksagainstpropertyandthesehave
onoccasionincludedtargetsthatfallwithintherubricofcritical infrastructure.
Publicawarenessofthisemergingthreatwasheightenedintheearly1990s.In1989,fiveactivistswerecharged
withthefirstofficiallydesignatedactofenvironmentalterrorismintheUnitedStates.Theseindividuals
includingEarthFirst!cofounderDaveForemanbecameknownastheArizonaFivefortheireffortsto
381PatriciaKing,VipersintheBurbs,Newsweek,July15,1996.
382TheSouthernPovertyLawCenter,agroupthatmonitorsfarrightactivitiesintheU.S.,lists30orsorightwingterrorist
plotsinchronologicalorderbetween1995and2001inTerrorfromtheRight,SPLCIntelligenceReport102(Summer2001),
includingthisKlanplot.
383Ibid.
384AccusedMilitiaLeaderindictedonConspiracy,TerroristandFirearmsCharges,AP,December8,1999;MilitiaLeader
ArrestedinNuclearPlot,ABCNewsline,December9,1999;andLarryDougherty,Leaderofmilitiawilladmitrolein
plot,St.PetersburgTimes,March10,2000.
385MansoughtforPhotographingTexasOilRefineries,Reuters,July19,2004.
386Forafulldiscussionofthethreatofradicalenvironmentalism,seeGaryAckerman,BeyondArson?AThreatAssessment
oftheEarthLiberationFrontTerrorismandPoliticalViolence15:4(Winter2004).
UCRL-TR-227068 86
sabotagepowerlinesassociatedwithnuclearpowerplantsandwaterprojectsinthestate.387Lessthanayear
later,onEarthDay1990,agroupidentifyingitselfastheEarthNightActionGrouptoppleda100foot
transmissiontowerandtwowoodenpowerpolesleadingfromtheMossLandingpowerplantoutsideofSanta
Cruz,California.388Theattackinterruptedelectricitytonearly95,000customersinSantaCruzfortwodaysand
nearlycausedthedeathofanindividualsufferingfromLouGehrigsdiseaseaftertheblackoutcausedher
respiratortofail.389Acommuniqufromthegroupclaimedresponsibilityfortheattack,butauthoritiesfailedto
identifyanysuspectsinthecase.
Theescalatingrhetoricandscopeofactionofthesegroups,togetherwithacontinueddisavowalofhuman
casualtiesamongmanyoftheiractivistsandtheirdisdainforgovernmentinstitutions,makelargescaleattacks
againstcriticalinfrastructurefromthisquarteradefinitepossibility.
D.TentativeConclusions
Thecasestudiespresentedinthissectionhighlightanumberofclearlyidentifiablefactorsthatseemtohave
influencedterroristmotivationstoattackcriticalinfrastructure.Althoughbynomeansexhaustiveordefinitive,
theinsightsprovidedbytheanalysisofthesereallifesituationsbroadlycomplementandareconsistentwith
theconclusionsderivedfromtheDECIDeFrameworkoutlinedinChapter5.Severalfactors,inparticular,
deserverecognitionashavingplayedparticularlysignificantrolesinthecasesconsideredhere.Theseinclude
(inalphabeticalorder):CICharacteristics;ExternalRelations;Factionalization;HistoricalEvents;Ideology;
Innovation;KnowledgeofCI;OperationalObjectives;OrganizationalStructure;andSecurityEnvironment.
CICharacteristics,inparticularthesymbolicnatureandfunctionalimportanceofsuchtargets,appearstofigure
prominentlyintargetselection.TheattackontheIndianParliament,inparticular,reflectstheimportancesome
terroristsplaceonattackingtargetsthataremeaningfultothebroaderpublic.390Asawidelyrecognizedsymbol
ofIndiasdemocracy,theparliamentwasseenbyJEMandLETasanidealtargetthatthegroupcouldattackto
showitsabilitytostrikeattheheartoftheIndiangovernment.Theterrorists,however,weremoreinterestedin
killingalargenumberofparliamentariansthaninactuallydisruptingthefunctioningoftheIndiangovernment.
Inthecasesconsideredhere,RelationswithExternalActorsclearlyplayanimportantroleintheprocessoftarget
selection.Themostimportantexternalactor,ofcourse,isthetargetaudiencewhoseperceptionsandbehavior
theterroristshopetoinfluencebycarryingoutaparticularattack.Itisalsonecessaryforterroriststoconsider
theeffectsofsuchanattackontheirsupporters,sympathizers,andproclaimedconstituencies.Forexample,
ChukakuhasavowedsupportforJapanesefarmersandunionmembers,andthegroupsdecisiontochampion
certainissuesrelatingtotheseconstituencies,probablyaffecteditstargetselectionmoresignificantlythanany
othersinglefactor.Similarly,thetargetsselectedbytheFLNCandMILFgenerallyreflectedtheirsupposed
commitmenttotheadvancementoftheinterestsof,respectively,indigenousCorsicansandreligiouslyinclined
Moros.Otherexternalactorswhoseinterestsmustbeconsideredaretherivalextremistandterroristgroups
whichareusuallyviewedascompetitorsbutwithwhomaterroristorganizationmightwishtocollaborate,at
leasttemporarily.Forexample,thejointattackbyJEMandLETontheIndianparliamentdemonstrateshow
387BronTaylor,Religion,Violence,andEnvironmentalism,TerrorismandPoliticalViolence10:4,(Winter1998),pp.142,as
foundat:http://www.religionandnature.com/bron/TPV%20article.htm.
388Littletonasfoundat:http://www.fas.org/irp/threat/cyber/docs/npgs/ch4.htm#b_japan.
389BrianAnderson,EarthFirstcaseagainstFBI,policeabouttobegin,ContraCostaTimes,April7,2002,asfoundat:
http://www.fortwayne.com/mld/fortwayne/3018137.htm;andBryanDensonandJamesLong,EcoTerrorismSweepsthe
AmericanWest,TheOregonian,September26,1999,asfoundat:
http://www.oregonlive.com/special/series/ecocrime.ssf?/special/series/ecocrime_story1.frame.
390Althoughnotcoveredinthissection,theSeptember11attacksareworthnotingasaparticularlydramaticexamplein
whichterroristscarefullyselectedCItargetsthatwerebothsymbolicallyaswellasfunctionallyimportant.
UCRL-TR-227068 87
cooperationbetweenterroristgroupscansignificantlyaffecttheabilityofgroupstoattackcertaintargets.JEM
hadneverconductedanattackoutsideJammuandKashmir,anditislikelythatLETslogisticaldivisionwas
utilizedtohelpovercomecertainoperationalobstaclesthatmightotherwisehavepreventedJEMfromattacking
theparliamentbuilding.Inthislattercase,bothgroupshadtoconsiderhowtheattackmightaffecttheir
relationswiththePakistanimilitaryandintelligenceservicesfromwhomtheyhadreceivedcovert
encouragementandsupport.However,althoughexternalrelationscanattimesdirectlyinfluencetarget
selection,itisimpossibletogeneralizepreciselyhowsuchrelationshipsmightaffectCItargetingwithout
undertakinganindepthanalysisofthespecificgroups,constituencies,andissuesinvolvedineachparticular
case.
SeveralofthecasestudiesalsosuggestthatagroupsdegreeofFactionalizationmayexertanimpactontarget
selection.Inparticular,autonomous,localizedcellstructuresandcompetitiveintercelldynamics,suchasthose
characteristicoftheFLNC,mightinducecertaincellstolaunchattacksthatinflictmoredamageorcausemore
casualties.Similarly,intensecompetitionbetweendifferentbreakawaygroupsfromthesameparent
organization,asinthecaseofChukakuhaanditsrivals,mightencouragethemtoengageinparticularly
spectacularattacksthattheyhopewillgeneratehigherlevelsofpublicityandprestige.WhilesomeCItargets
maybeparticularlywellsuitedtoachievesuchendsespeciallybecauseoftheircriticalnaturethereis
generallyabroadarrayofhighprofilenonCItargetsavailablethatmightjustaseasilybeattackedtoachieve
thosesameresults.
HistoricalEvents,especiallytacticalprecedents,arelikelytobekeyfactorsintargetselection.Forexample,the
MILFtacticofattackingpowergridswasneitherunprecedentednorentirelynovel.Atleastthreeother
insurgentgroupswhichtheMILFwaseitherawareoforincontactwiththeMoroNationalLiberationFront
(MNLF),theAbuSayyafGroup(ASG),andthecommunistNewPeoplesArmy(NPA)hadalsoconducted
similarattacks.ItisverylikelythattheseMILFeffortswereinpartinfluencedbysuchprecedents.
Ideologyappearstobeoneofthesinglemostsignificantfactorsininfluencingaterroristgroupstargetselection.
InthecaseoftheFLNC,forexample,theorganizationsideology,byidentifyingthecategoriesoftargetsthatit
couldandcouldnotlegitimatelyattack,establishedtheparameterswithinwhichitsOperationalObjectiveswere
determined.Generallyspeaking,theFLNChassoughttominimizecasualtiesandfocusitseffortsprimarilyon
infrastructuraltargets.Asadirectconsequence,althoughithasconductedhundredsofattacks,thegroup
appearstohaveintentionallykilledfewerthan50peoplebetween1975and1995.Inasimilarfashion,Chukaku
hasTrotskyistideologyappearstohaveinfluenceditstargetselectionbyemphasizingviolentformsofprotest
againsttargetsthatitviewedassymbolicallyrepresentativeofthecapitalistinterestswhichthegroupopposed,
orwhichweredirectlyrelatedtoitspurportedchampioningofworkersandfarmersrights.TheMILFs
ideology,too,generallyappearstohavegenerallylimiteditsselectionoftargetstoChristianswhowere
perceivedtobeharmingMuslims,alongwithitsMuslimrivalsandlessreligiousMuslimswhoovertlyopposed
itspuritanicalreligiousdoctrines.
AgroupslevelofInnovationappearstobeanimportantfactorrelatedtoitsabilitybothtoattacknewand
unprecedentedtypesoftargetsandtoplanmoreeffectiveandnoveltypesofattackswhichhadagreater
likelihoodofsuccess.ChukakuhasinitialattackontheJNRsystem,forexample,wasunprecedentedinits
scopeandimplementation,whichmayhavebeenoneofthereasonsunderlyingitssuccess.(Thismaybe
especiallytrue,consideringthatthegroupssuccessiveattacksonthesystemwerelesseffectivebecause
Japaneseofficialswerethereafterbetterpreparedtodealwithsuchcontingencies.)Similarly,JEMwasthefirst
grouptointroducefidayeenstyleattacksinJammuandKashmir.Thegrouphadcarriedoutasuccessfulattack
againsttheKashmirStateAssemblyin2001,anditattemptedtoreplicatethissametacticwithlesseffectiveness
intheIndianParliamentattack.
UCRL-TR-227068 88
Inseveralofthecasestudies,thegroupspriorKnowledgeofCIplayedasignificantroleinitstargetselectionand
attackmodalities.InthecaseoftheJNRattack,itisclearthatChukakuhasdetailedpreexistingknowledgeof
therailsystemallowedittoinflictmaximumdamageonitstarget.Indeed,itcanbehypothesizedthatthe
groupsforeknowledgeofthetransportationinfrastructure,whichclearlyderivedinlargepart frominsidersin
theformofunionizedJNRemployees,mayhaveactuallyenabledittoconceptualizetheattackinthefirstplace.
WhiletheFLNCandMILFattacksonCIweretypicallymuchlesscomplex,thetwogroupsfirsthand
knowledgeofboththeenvironmentsinwhichtheirtargetswerelocatedandthetargetsthemselvesclearly
facilitatedtheirabilitytocarryoutthoseattackssuccessfully.
AterroristgroupsoverallOperationalObjectivesalsounquestionablyplayasignificantroleinitsselectionofCI
targets.TheFLNCmayprovidetheclearestexampleofthewayinwhichoperationalobjectivescanexerta
directimpactontheselectionofinfrastructuraltargets.SincetheFLNCsannouncedobjectivesweretopreserve
CorsicasuniquecultureandmakeitpossiblefornativeCorsicanstoestablishagreaterdegreeofpoliticaland
economiccontrolovertheirhomeland,thegroupfocusedmostofitsattacksonsymbolicinfrastructuraltargets
thatitviewedassomehowcomplicitintheperpetuationofthesecondclassstatusoftheislandsindigenous
inhabitants.ChukakuhasattacksonJNRfacilitieswerealsoclearlydesignedtofulfillitsoperationalobjectives
ofraisingthepublicsawarenessoftheJapanesegovernmentseffortstoprivatizetherailsystem.Indeed,the
organizationshighlysuccessful1985attackadverselyanddirectlyimpactedapproximatelyelevenmillion
people,therebymakingthosecommutersand,byextension,therestoftheJapanesepublicawareofits
politicalaims.
OrganizationalStructureappearstoaffectaterroristorganizationscapabilitytoattackvariousinfrastructural
targets,butitisunclearwhetheritactuallyincreasesagroupspropensitytoattackCI.Chukakuhaslargesize
andcellbasedstructure,forexample,provideditwiththemanpower,operationalcapabilities,andoperational
securitynecessarytoconducthighlyeffectiveguerrillaactionsthatwereespeciallysuccessfulagainstwidely
dispersedCItargetssuchastheJapaneserailsystem.
Finally,MILFattacksontheelectricalinfrastructureinthesouthernPhilippinesunderscorethefactthatchanges
intheSecurityEnvironmentcanservetomotivateterroristgroupstoundertakeattacksagainstCI.Those2003
attackswereinlargepartintendedtobeacalculatedresponsetothePhilippineArmysdamagingPikit
Offensive.CertainFLNCattacksagainstCItargetsalsoappeartohavebeenconsciouslytimedtoforestallor
respondtopolicecrackdownsonthegroup.
Insum,itshouldbeapparentfromboththeabovecasestudiesandfromourpreliminaryassessmentsoffuture
threatsthatawiderangeofterroristgroupshaveattackedCIinthepastseveraldecades,andthattheinterest
withincertainextremistmilieusincarryingoutsuchattacksonU.S.soilseemstobegrowing.However,since
terroristorganizationsineverycategoryhaveattackedinfrastructuraltargets,albeittypicallyinresponsetovery
specificlocalornationalcircumstances,itremainsdifficulttogeneralizeaboutwhichtypesofgroupswillbemost
likelytodosointhefuture.ThatIslamistterroristgroupshavedisplayedanincreasinginterestinattackingCI
maysimplybeareflectionofthefactthattheyhavealsoperpetratedaneverincreasingnumberofterrorist
attacksofalltypes,asopposedtohavingaperverseobsessionwithinfrastructuraltargetsperse.Moreover,
sincealQa`idaremainsinterestedincarryingoutspectacularterroristattacksinthebellyoftheGreatSatanin
ordertohighlighttheU.Ssvulnerabilities,frightenitsdecadentpopulace,andkillsignificantnumbersof
Americans,itisonlynaturalthatitsleaderswouldconsiderattackingvulnerableCItargetsherethatwouldbe
likelytofacilitatetheirachievementofthoseobjectives.Thismaybeallthemoretrue,giventheincreasing
concernsaboutsuchattacksexpressedpubliclybyhomelandsecurityofficialsandthemedia.
UCRL-TR-227068 89
Chapter4:CRITICALINFRASTRUCTURE
TERRORISTINCIDENTCATALOG*
A.Introduction
Whileareviewoftheliteratureandcasestudiesarecriticalcomponentsinthecreationofouranalytic
framework,ananalysisofavailablestatisticaldataisalsoessentialforastudyofthistype.Indeed,anyserious
effortatrealworldinquiry,especiallyinthebehavioralsciences,isstrengthenedbyarobustdatasetthatis
representativeofthebehaviorbeingstudiedinordertosupporthypothesesandvalidatethefindingsofthe
moreindepthempiricalstudy.391Thus,inordertodevelopanaccurateanalyticalframeworkforterroristattacks
againstcriticalinfrastructure,adatasetthatisrepresentativeoftheseparticulartypesofattacksisrequired.To
meetthisneedCNScreatedCrITIC,theCriticalInfrastructureTerroristIncidentCatalog.Thissectionexplores
sixaspectsofCrITIC:1)thepurposeandneedforsuchadatabase;2)thecollectionprocessusedtocreateit;3)
thedatabasesstructure;4)themethodologyusedforinclusionofdatawithinit;5)futurepossibledevelopment
ofthedatabase;and6)initialanalysisoftheexistingCrITICdataset.
B.Purpose
Thereisanunfortunateabsenceofterrorismdatasetsinmostacademic,scientific,andlawenforcement
circles.392Inordertosupporttheanalyticalframeworkbeingdeveloped,adatasetthatcanserveasa
representativesampleofterroristattacksagainstinfrastructureoverameasurableandcomparableperiodof
timewasrequired.Suchadatasetwouldthenbeusedtoanalyze,onvariouslevels,terroristcapabilityand
motivation,suchasoperationaltechniquesandthedesiredeffectsofattack.Therequireddatasetalso
demandedthecategorizationofrelevantinformationintotypologies,suchasspecificmotive,claimsof
responsibility,perpetratorconfirmation,thetypeofinfrastructureattacked,andtheeffectsofattacks.Such
detailed,codedinformationcouldthengeneratedescriptivestatisticsfromwhichcomprehensivestatistical
analysisoftheattacksagainstinfrastructurecouldbeconducted.Moreover,suchadatasetcouldalsoserveto
identifyfuturequalitativecasestudiesthatmightbeneededtosupportanycompleteempiricalstudy.Inshort,
aneffectivedatasetofterroristattacksagainstinfrastructurewasneeded,whichwouldbeasqualitativelyand
quantitativelycomprehensiveasresourcesallowed.
AlthoughtheanalyticalframeworkbeingdevelopedismeanttobeapplicableprimarilytoattacksagainstU.S.
infrastructure,duetotherelativelackofsuchattacks,projectresearchersneededtocreatearepresentative
samplefromtheinformationavailableconcerningterroristattacksoninfrastructureworldwide.Thisdataset
couldthenbeusedtoprovidethebroadest393possibleunderstandingofterroristmotivations,tactics,andtrends
inattackinginfrastructure.Havingidentifiedtheneedforsuchadatabase,theprojectteamnextexamined
extantterrorismdatabasestoseewhattheyofferedinresponse.
*
ThischapterwaspreparedbyPraveenAbhayaratne,CharlesBlair,SundaraVadlamudi,andSeanLucas.
391ColinRobson,RealWorldResearch:AResourceforSocialScientistsandPractitionerResearchers(Oxford:BlackwellPublishers,
1993),pp.35.
392RaymondA.Zilinskas,BioterrorismThreatAssessmentandRiskManagementsWorkshop:FinalReportand
Commentary,PresentedtotheU.S.DepartmentofEnergy,MontereyInstituteofInternationalStudies,June24th2003.
393Asopposedtodeepest.
UCRL-TR-227068 90
C.DataCollectionProcess
Attheoutset,theprojectteamidentifiedaninitiallistofsourcesthatcouldbeminedforpotentialdataon
terroristattacksagainstcriticalinfrastructure.Eightrelevantsourceswereidentified:1)theRANDSt.Andrews
TerrorismChronology;2)theRANDMIPTTerrorismIncidentDatabase;3)theCenterforDefenseand
InternationalSecurityStudies(CDISS)TerrorismDatabase;3944)theterrorismchronologiespreparedbyEdward
F.Mickolus;3955)theInternationalPolicyInstituteforCounterTerrorism(ICT)TerrorAttackDatabase;3966)the
UnitedStatesDepartmentofStateReportsonPatternsofGlobalTerrorism;3977)theCNSWMDterrorism
database;and8)theCNSConventionalTerrorismDatabase.Followingtheidentificationofthesesources,
projectresearchersthencarefullyexaminedeachsource,usingavarietyofcriteria.
First,thecomprehensivenessofeachsourcewasassessedinrelationtoreportingactsofterrorismagainst
infrastructure,thetimeperiodcovered,andthelevelofdetailoftheinformationprovided.Second,theproject
teamwasmindfulthatallterroristoperationscaninvolvefourbroadlevels:blueprintsandplots;aborted
operations;thwartedoperations;andsuccessfuloperations.Whileideallydatafromallfourarenecessaryto
attempttoforecastterroristevents,mostnongovernmentalagenciesdonothaveaccesstoinformationregarding
thefirstthree.398Intheend,eachofthesourceswasscrutinizedintermsofhowwellitidentifiedthefollowing
keytargettypesinitsaccountsofincidentsofterrorism.Thesewereasfollows:airports,banks,chemicalplants,
communicationsfacilities,damsandwaterways,foodproduction/storagefacilities,hospitals,militarybasesandpolice
stations,oilandgasfacilities,powerplants(electricandnuclear),publicservice/governmentoffices,roadways,railways,
schools,orwatertreatmentfacilities.
Itwasimmediatelyevidentthatmostsourcesdidnotprovidethedetailed,categorized,orcomprehensive
informationneededforthecurrentstudy.Forexample,theRANDSt.AndrewsTerrorismChronologyandthe
ICTTerrorismDatabasedidnotidentifyterroristmotivations(i.e.,religiously,politically)ortheimpactsofthe
attack.Moreover,thelatteronlycoveredincidentsfrom1986tothepresentand,whileupdatedonamonthly
basis,didnothavetherequisiteincidentdetailforourpurposes.TheCDISSTerrorismDatabaseofferedonly
snapshotsofterroristincidentsasitwasnotdesignedtobecomprehensive.EveninhousesourcesCNSWMD
TerrorismResearchProjectConventionalTerrorismDatabaseanditsWMDterrorismdatabasehadtheirlimits
intermsofinfrastructurerelatedattacks.
Notallsources,however,wereinadequate.TheaforementionedCNSConventionalDatabase,while
chronologicallylimited(sinceitcoversonly2001and2002),wasthoroughandwellcategorized.TheMonterey
WMDTerrorismDatabasedocumentedinformationregardingterrorismattacksinvolvingchemical,biological,
radiologicalandnuclearmaterialsfrom1900tothepresent,fromwhichtheprojectresearcherswereableto
gleanrelevantinformation.TheMickolusbooksalsooffereddatathatwascomprehensiveandhistoricallybroad.
394Locatedat:http://www.cdiss.org/terror.htm.
395ThesocalledMickoluschronologiesarecomprisedoffourbooks:
1)EdwardF.Mickolus,TransnationalTerrorism:AChronicleofEvents,19681979(London:AldwychPress,1980).(NoEdition);
2.)EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:AChronologyofEvents(Iowa
StateUniversityPress/Ames,1989),Vol.1,19801983.FirstEdition;
3.)EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:AChronologyofEvents(Iowa
StateUniversityPress/Ames,1989),Vol.2,18941987.FirstEdition;
4.)EdwardF.Mickolus,Terrorism,19881991:AChronologyofEventsandaSelectivelyAnnotatedBibliography,Bibliographies
andIndexesinMilitaryStudies,Number6(GreenwoodPress,1993).
396http://www.ict.org.il/.
397http://www.state.gov/s/ct/rls/pgtrpt/.
398JoshuaSinaiICTConference:ExpertonValue,MethodsofForecastingTerroristIncidents,FBISReport,DocumentID:
GMG20031202000085,September9,2003.
UCRL-TR-227068 91
Yetnosinglesourcewasadequate.Consequently,thedecisionwastakentobuildourowndatabaseofcritical
infrastructureattackshereafterreferredtoasCrITIC(theCriticalInfrastructureTerrorismIncidentCatalog).
Duringitscreation,theprojectteamreliedmostheavilyontheMickolusterroristchronologies.Whilethese
chronicleincidentsfrom19482001involvingviolentnonstateactors,oursecondsource,theCNSConventional
TerrorismDatabase,provideddetailedincidentdatafortheyears2001and2002.However,asistypicalof
terrorismdatabases,thesedatasourcesuseddifferentcriteriafortheinclusionofincidentsandinformation.
Moreover,theywerenotcreatedspecificallywithcriticalinfrastructureattacksinmind.Therefore,eachincident
neededtobeevaluatedbeforebeingenteredintoCrITIC.Whenconfrontedwithinformationdeficiencieswith
respecttoparticularincidents,projectresearchersresortedtoCNSresearchandarchivalresourcestoconduct
furtherinvestigation.Unfortunately,formostincidentsoccurringpriorto1980,therewaslittlefurther
informationavailableinopensources.Inthesecases,projectresearcherswereasinclusiveaspossiblewith
availabledata.TheinitialpopulationofCrITIC,frompreliminarysearchtofinalentry,spannedtheperiodfrom
March9,2004toJune15,2004.
CrITICisuniqueinthatitbringstogethercriticalelementsthat,whenusedsynergistically,allowforthereliable
interpretationofdataregardingCIandterrorism.Threefundamentalelementsofthedatabaseshouldbe
mentioned.First,CrITICispopulatedwithalargedatasetofspecificinformationconsistentwiththeneedsofa
studyaddressingthemotivationalaspectsofterrorism.Suchanexpansivedatasetallowsforthecreationof
cogentandreliablelargeNstudies.Second,CrITICcoversanexpansivetimeframeusingdatafrom1933to
2004.Thirdandmostimportantly,CrITICispopulatedwithincidentsthatspecificallyinvolvedCI.
D.DatabaseMethodology
Havingobtainedtheappropriatedata,theprojectteamthensoughttostructureitinanoptimallyusefulfashion.
Giventheneedtoallowforquantitativesystematicobservationsofthedata,itwasnecessarytoemploytheuse
ofacategorizationthatwouldallowresearcherstogeneratestatisticalanalysesfromtheempiricalrecord.In
ordertodothis,codingschemesthatcontainedpredeterminedcategoriesforrecordingwhatwasobservedhad
tobecreated.399CNSsexperiencewithdesigningandpopulatingdatabasesforsimilarpurposesproved
advantageousinthisregard.400Consequently,theprojectteamwasabletoemploytheuseofexistingcoding
schemes(e.g.terroristcategories,typesofattack,deliverymethod)usedinthesedatabasesandeffectively
developthoseneededspecificallyforthecurrentstudy.Theseadditionalcodingschemesordatabasecategories
weredeterminedandstandardizedaftercarefulanalysisanddiscussionbyCNSstafftoresolveambiguityas
clearlyandconsistentlyaspossiblefortheareasofenquirythattheprojectcovered.
Asaresultofthiscodingscheme,atypicalrecordinthedatabasehasthefollowingeighteenfieldsof
information(SeeFigure4.1):
1. Dateofincident:Exactdateoftheincident.Inthecaseofongoingincidents(e.g.,hostagesituationsor
kidnappings),thestartingdateoftheeventisused.
2. Location:City,regionorprovincewheretheincidentoccurred.
Robson,RealWorldResearch,p.206.
399
BothCNSConventionalTerrorismDatabaseanditsWMDTerrorismDatabasehavebeenspecificallydesignedforthe
400
purposeofquantitativeanalysisoftheempiricalrecord.
UCRL-TR-227068
3. Country:Countrywheretheincidentoccurred.ThisincludesonlycountriesrecognizedbytheUnited
Nations.Whenanincidentoccurredininternationalwatersorairspace,thecountryofdepartureis
listedasthecountryoftheincident.Inthecaseofanairplanebombing,thecountrywheretheplane
crashedislistedasthecountryoftheincident.Incaseswherehostagesweretaken,thecountrywhere
theincidentconcludedislisted.
4. Region:Theregionoftheincident.Regionsaredividedintothefollowingcategories:USA/Canada,
LatinAmerica&Caribbean,Asia,Europe,MiddleEast&NorthAfrica,SubSaharanAfrica,Russia&
theNewlyIndependentStates(NIS),Australia&Oceania.
5. Target:Specificinfrastructure(target)attacked.
6. Infrastructureattacked:Financialinstitutions,schools,militarybaseandpolicestations,embassies&
consulates,vehicles,publicservice/governmentoffices,watertreatmentfacilities,dams&waterways,
foodstoragefacilities,chemicalplants,hospitals,aviationinfrastructure,train/busstations,subways,
roadways,railways/roadways/raillines,communicationinfrastructure,oil/gasinfrastructure,power
infrastructure,andother.
7. Typeofattack:Projectiles(grenades,mortars,missiles);sniping;shooting;sabotage(e.g.,arson);
hijacking;siege&hostagetaking;firebombing(Molotovcocktails,etc.);bombing(landmine,letter,
vehicle,timefuse,pressure,remotetriggered,suicide,unknown);combination;andunknown.
8. Fatalities:Numberofconfirmedfatalities.
9. Injuries:Numberofconfirmednonfatalinjuries.
10. Natureofincident:Domesticorinternationalinnatureinrelationtotheperpetrator.Determinationof
thenatureofaspecificincidentrelatesdirectlytoitsintendedtargetaudience.Forexample,didthe
terroristshaveadomesticaudienceinmind,ordidtheyseektoaddressaninternationalaudience.
11. PerpetratorGroup:Nameofgroup,ifknown.
12. PerpetratorCategories:EthnoNationalist(EthnoNationalist);SecularUtopian;Religious;SingleIssue;
StateSponsored;Criminal;Personal/Idiosyncratic;IdentifiablebutOutsideExistingCategories;
Unidentifiable.
13. PerpetratorSubcategories:Socialist/Communist;Anarchist/Radical;Libertarian/AntiAuthoritarian;
Fascist;RacialSupremacist/RacialSeparatist;Generic(NonReligious)AntiGovernment,etc;Buddhist;
Christian;Hindu;Islamic;Jewish;Occult;Pagan/Polytheist;Sikh;Cults;Ecological/Animal
Liberation/Primitivist;AntiNuclear;AntiAbortion;TaxProtest;GunRights;AntiCommunist;Anti
Immigrant;AntiSemitic;AntiHomosexual/SexualDeviance/Prostitution;RightWing;None.
14. ClaimResponsibility(Checkbox):Checkediftheperpetratorclaimedresponsibilityfortheattack.
15. Suspected/Unconfirmed(Checkbox):Checkedifaperpetratorissuspectedbyeitherexternalobservers
orprojectresearchersofcarryingouttheattack,butthereisnoevidencetodefinitivelysubstantiatethis.
UCRL-TR-227068 94
16. SummaryofIncident:Concisesummaryofevent,includingthedateoftheincident.Thesummaryalso
includesinformationcoveringthewhere,what,why,whom,andhowoftheincident.Unusualfactors,
suchasashiftintactics,thereappearanceofanorganization,theemergenceofaneworganization,
attackcarriedoutonahistoricaldate,oranescalationofaviolentcampaignarenoted,ifavailable.
17. OptionalComments:Supplementalinformationofimportance,suchasmultipleattacksinthesame
areaorbythesameperpetrator.
18. InfrastructureImpact(Checkboxes):Major,Minor,Uncertain,N/A.
CodingScheme
CriteriaforInclusionofData
CrITICincludesincidentsbasedonthefollowingcriteria:
1) Theincidenthadaneffectoncriticalinfrastructure(intentionallyorinadvertently);or
2) Theincidentcouldhavehadaneffectoncriticalinfrastructure(eitherintentionallyorinadvertently)but
didnot;or
3) Theperpetrator(s)intendedtheincidenttohaveamajorimpactoncriticalinfrastructure.
Becauseopensourcesareunabletoprovidearepresentativesampleofattacks,cyberinfrastructureattacksare
notrecordedinthedatabase.401
DefinitionofCriticalInfrastructure
ThefollowingdefinitionofcriticalinfrastructurewasusedforinclusionofincidentsinCrITIC.Thisdefinition
wasdevelopedbasedonitsinclusivenatureascomparedtootherdefinitions,theuseofwhichwouldhave
excludedincidentstheprojectteamthoughtworthrecording.
Criticalinfrastructuresarethosephysicalsystemsthatacommunitydependsontomaintainits
security,governance,publichealthandsafety,economyandpublicconfidence.Theconstituentparts
ofsuchsystemswillvaryaccordingtothecommunitycontextinwhichtheyareviewed.402
CategorizationofInfrastructureAttacks
Infrastructurecategoriesweredevelopedbytheprojectteambasedontherequirementsofthestudy.Incertain
casesanincreaseddegreeofgranularity,ascomparedtoexistinggovernmentinfrastructurecategories,was
deemednecessaryinordertobetterclarifytherangeofinfrastructuretargetsthathavebeenattackedby
terrorists.Forexample,transportationinfrastructurewasbrokendownintomultiplecategoriesbecausethe
attackmethodsneededtoattackaviationinfrastructure,forexample,arequitedifferentthanthosethatcanbe
usedtoattackatrainorbusstation.Inaddition,attacksonvehiclesweredifferentiatedfromattackson
stationarytransportationfacilities.Similarly,militarybasesandpolicestationswerecombinedintoasingle
category,giventhatthecurrentstudyisprimarilymotivationalinnatureandfromaterroristsperspectiveboth
typesofinstallationarelikelytoberegardedaselementsofthesecurityapparatus.
401Inaddition,cyberterrorism,whichexistslargelyonthevirtualplane,differsinmanyrespectsfromphysicalinfrastructure
attacks.Consequentlythesamedatabasewouldhavedifficultyrecordingthesalientinformationfrombothtypesofattacks.
However,wherecyberbasedattackshadphysicaleffectsonaphysicalinfrastructure,theincidentwasrecordedunderthe
categoryofthephysicalinfrastructure.
402SeeChapter1:DefiningCriticalInfrastructure.
UCRL-TR-227068 95
TerroristCategorieswithCorrespondingSubCategories
Forthepurposesofthedatabase,thefollowingcategorieswereemployedforterroristgrouptypes.Webelieve
thattheschemewehaveemployedisconsiderablymorerefinedthanthestandarddivisioninto
nationalist/separatist,leftwing,rightwing,andreligiousterrorists.403Evenso,mostofthecategoriesweuseare
clear,ifnotentirelyselfexplanatory.Theonemajorexceptionisthatdiversegroupsthatarenormallylabeled
rightwinginthebroadestandmostcasualsenseofthattermareheredividedamongseveraldifferent
categories.Forexample,neofascistandneoNazigroups,whichincorporatebothrightandleftwing
ideologicalcomponentsintotheirworldviewsandhaveanundeniablyrevolutionarypoliticalagenda,arelisted
undertheSecularUtopian(revolutionary)Groupscategory.DomesticUSmilitiagroupsthatareessentially
secularfallintotheGeneric(NonReligious)AntiGovernmentsubcategorywithinthisSecularUtopian
Groupscategory,whereasthoseespousingidiosyncraticChristianorpaganOdinistdoctrinesappearunderthe
ReligiousGroupscategory.Rightwinggroupswhosefocusisalmostexclusivelyonsingleissues,suchas
oppositiontoabortion,oppositiontocommunism,oroppositiontoimmigrants,fallwithintheSingleIssue
Groupcategory.Finally,thosethatcannotbeclearlyplacedintoanyoftheseothercategoriesareplacedinthe
RightWingsubcategoryoftheOthercategory.Forexample,membersofLatinAmericandeathsquads
arenotutopianrevolutionaries(likefascists),arenotusuallymotivatedbyreligion(likeCatholicTraditionalists
orProtestantEvangelicals,althoughtheymaywellbeCatholicorProtestant),andarenotconcernedsolelywith
asingleissue(althoughanticommunismhasinthepastbeenoneoftheirprincipalmotivations);thus,thereis
essentiallynootherclearcategoryinwhichtoplacethem.Thisparticularfacetofourschememayseemunduly
complicated,butifonegenuinelywishestodistinguishbetweengroupswithquitedistinctworldviews,itis
necessarytoplacetheminseparatecategories.Finally,itshouldalsobekeptinmindthatmanyexistingterrorist
groups(orsaboteurs)fallintomorethanoneofthesebroadcategories,whichintherealworldarebynomeans
entirelydiscrete.Insuchcases,theperpetratorspredominantideologicalorientationwasusedfor
categorizationpurposes.
Theprimarycategoriesareasfollows:
EthnoNationalistgroups:Thiscategorycomprisesgroupsrelyingheavilyonterrorismthatseekeitherto
establishanindependentstatefortheethnic,linguistic,cultural,ornationalcommunitywithwhichtheyare
affiliated,or(especiallyiftheyalreadyhavetheirownindependentstate)touniteallofthemembersoftheir
communityincludingthosethatliveinneighboringcountries.
SecularUtopianGroups:Thiscategorycomprisesrevolutionarygroupswithsecularideologieswhichrely
heavilyonterrorism,seektooverthrowtheexistingorder,andpromotetheestablishmentofalargely
impossibletocreaterevolutionarynewsociety,eitherontheinternationalornationallevel,inwhichinternal
strife,injustice,oppression,anddomesticorforeignexploitationwillbeeliminated.Thismayentailthe
overthrowoftheglobalcapitalistsystemandeithertheestablishmentofadictatorshipoftheproletariat
(MarxistLeninists)or,muchmorerarely,adecentralized,nonhierarchicalsociopoliticalsystem(anarchists)in
whicheveryoneworkstogetherforthecommongood,oritmayentailtheoverthrowoftheexistingbourgeois
democraticorder,theexpulsionofparasiticantinationalcapitalists,andthecreationofanorganicnational
communityinwhicheveryoneworkstogetherforthecommongood(fascists),theestablishmentofamono
ethnicenclaveinwhichallmembersofthatgroupworktogetherforthecommongood(racialseparatists),orthe
eradicationoftheworldsevilrulers(antigovernmentradicals).
Thisdecisionwaslargelyaresultofthefactthatoneoftheseniorauthorsofthisreporthasbeenstudyingextremist
403
ideologiesforseveraldecadesandbelievesmostcommonlyusedcategorizationsserveonlytoobfuscateanalysis.
UCRL-TR-227068 96
UCRL-TR-227068 97
Withinthiscategoryarethefollowingsubcategories:
Socialist/Communist(includingMarxist,MarxistLeninist,Stalinist,Maoist,NewLeft,etc.)
Anarchist/RadicalLibertarian/AntiAuthoritarian
Fascist(includingNazi)
(NonReligious)RacialSupremacist/RacialSeparatist
Generic(NonReligious)AntiGovernment/AntiNewWorldOrder/AntiUnitedNations/Anti
Imperialist/AntiCapitalist/AntiEstablishment(includingmilitias)
ReligiousGroups:Thiscategorycomprisesgroupsthatrelyheavilyonterrorismandseektosmitethe
purportedenemiesofGodandotherevildoers,imposestrictreligioustenetsorlawsonsociety
(fundamentalists),forciblyinsertreligionintothepoliticalsphere(i.e.,thosewhoseektopoliticizereligion,
suchasChristianReconstructionistsandIslamists),and/orbringaboutArmageddon(apocalypticmillenarian
cults).Thistypeofterrorismcomesinfivemainvarieties:1)Islamistterrorism;2)Jewishfundamentalist
terrorism,primarilyinsideIsrael;3)Christianterrorism,whichcanbefurthersubdividedintofundamentalist
terrorismofanOrthodox(mainlyinRussia),Catholic,orProtestantstamp(which,intheUS,isespeciallyaimed
atstoppingtheprovisionofabortions)andterrorisminspiredbytheidiosyncraticChristianIdentitydoctrine;4)
Hindufundamentalist/nationalistterrorism;and5)terrorismcarriedoutbyapocalypticreligiouscults.Within
thiscategoryarethefollowingsubcategories:
Buddhist(Ultranationalist,Apocalyptic)
Christian(Fundamentalist,ChristianIdentity,ChristianReconstruction,CatholicTraditionalist,Eastern
Orthodox,ProtestantEvangelical,LiberationTheology,etc.)
Hindu(HinduNationalist,Fundamentalist)
Islamic(Islamist,Fundamentalist)
Jewish(Orthodox,Fundamentalist)
Occult(includingSatanist)
Pagan/Polytheist(Odinist,etc.)
Sikh(Fundamentalist)
Cults(alltypes)
SingleIssueGroups:Thiscategorycomprisesgroupsthatrelyheavilyonterrorismandareoverwhelmingly
obsessedwithonemainissue,suchasdefendinganimalrights,endingabortion,orprotectingtheenvironment.
Althoughtheirmembersoftenhavebroader(andoftenfairlyextreme)politicalviewsandothermattersontheir
minds,theirviolenceisprimarilydirectedataffectingtheoneissueuponwhichtheyareobsessivelyfocused.
Withinthiscategoryarethefollowingsubcategories:
Ecological/AntiTechnology/Primitivist/AnimalLiberation
Pacifist/AntiWar
AntiNuclear
AntiAbortion
TaxProtest
GunRights
AntiCommunist
AntiImmigrant
AntiSemitic/Racist
AntiHomosexual/AntiSexualDeviance/AntiProstitution
AntiEcology/ProDevelopment
UCRL-TR-227068 98
CriminalGroups:Thiscategorycomprisesgroupsthatrelyinpartonterrorism,lackdiscernablepolitical
motives,andareprincipallymotivatedbycriminalgoalssuchasextortion,blackmail,robbery,orperpetrating
insurancescams.
Personal/IdiosyncraticPerpetrators:Thiscategorycomprisesindividuals(orpossiblymorethanone)whorely
inpartonterrorismbutaremotivatedbyquintessentiallypersonaloridiosyncraticmotivesthatdonotconform
tostandardideologicalcategoriesandareusuallylostoneveryoneelse.Anexamplemightbesomeonewho
carriedoutaviolentattackonneighborsbecausetheperpetratorfalselybelievedthattheyweresomehow
conspiringagainsthimorher.
OtherGroups:Thiscategorycomprisesanyoneelsewhocarriesoutactsofterrorismbutcannotfitintoany
othercategory.Thereisonlyonesubcategorywithinthiscategory,forthereasonslistedabove:
RightWing
Combined:Thiscategoryisusedwhentwogroupsofdifferenttypesarejointlyinvolvedincarryingouta
terroristattack.
StateSponsored:Thiscategoryisusedwhenaterroristattackwouldnothavebeencarriedoutinlieuofstate
involvement.
Unknown:Thiscategoryisusedwhenitisnotknownwhocarriedoutaparticularterroristattack.
TypeofAttack/Delivery
AttacktypesforCrITICwereselectedafterreviewofvarioussourcesonterroristweaponsandtactics.404Only
thosedeliverytypesthatarenotselfexplanatoryhavebeenincludedinthislist.
Hijacking:Hijackingofairplanes,motorvehicles,etc.Thesemayinvolvehostagetaking.
Siege&hostagetaking:Attacksconductedforthesespecificpurposes,i.e.todenyentrytoanarea,andthe
takingofhostages,nottoincludehostagestakenasaresultofhijacking.Thus,incertainincidents,ahijacking
waspartoftheprocessoftakinghostages.
Firebombing(Molotovcocktails,etc.):Crudelyimprovisedfirebombscontaininghighlyflammableor
explosivematerials,suchasgasoline,thatareeasilyacquired.
Bombing(landmine):Pressureortimeractivateddevicethatisburiedintheground.
Bombing(letter):Letterandparcelbombsdeliveredtotarget.
Bombing(vehicle):Theuseofavehicletodeliveranexplosivedevice.
Bombing(timefuse):Explosivedeviceplacedatthesceneofattackthatisactivatedbypresettimingdevice
suchasaclock.
404AmongothersourcesthelistofConventionalTerroristWeaponsfromtheUnitedNationsOfficeofDrugsandCrime.
Locatedathttp://undoc.org/unodc/terrorism_weapons_conventionalandChristopherDobsonandRonalPayne,TheWeapons
ofTerror(London:McMillan,1979).
UCRL-TR-227068 99
Bombing(pressure):Physical,water,oratmosphericallyactivatedexplosivedevicesplacedatthesceneof
attack.Nottoincludepressureactivatedlandmines.
Bombing(remotetriggered):Deviceplacedatthesceneofattackthatisactivatedremotelyusingelectronic
pulseorsignalsuchasradio,cellularphone,orremotecontrol.
Bombing(suicide):Devicedeliveredbyahumanthatintentionallyblowshim/herselfupintheprocess.
Bombing(unknown):Unidentifieddeliverymethodusedforexplosivedevice.
Combination:Attackusingacombinationofthemethodslistedinthiscategory.
Unknown:Unidentifieddeliverymethod.
Other:Identifiedbutuncategorizeddeliverymethod.
MajorandMinorImpact
Whileinformationregardingmajorinfrastructureattacksismostpertinent,thereisalsoconsiderablevaluein
tabulatingandassessingminorinfrastructureattacks,sincethiscanhelpdiscernterroristmotivationsfor
attackinginfrastructure.Consequently,infrastructureattacksneededtobedividedintomajorandminor.
Therefore,inthecontextofcategorizingtheattacksinCrITIC,theexistingentrieshavebeendividedintofour
separatecategories:1)majorinfrastructureattacks;2)minorinfrastructureattacks;3)uncertaincases;and4)
noninfrastructureattacks(N/A).
Onlythoseincidentsthata)didhave,b)couldhavehad,orc)wereintendedtohavealargescale(i.e.,regional
ornational,notlocal)social,political,and/oreconomicimpactwereconsideredmajor.Therest,bydefault,fell
intotheminorcategory.
Incidentsinvolvingcriticalinfrastructureentailingpurelyeconomicorpsychologicaleffectswereincluded,but
onlyiftheseaffectedthefunctioningofthecriticalinfrastructureitself.Thatis,evenifanattackhada
widespreadpsychologicalimpact,ifthisimpactdidnotaffectthecriticalinfrastructureitwouldnotbeincluded.
Insomecasestheimpactofanattackmaybeunknownbecauseofalackofevidenceinthesourcedocuments.In
suchcasestheprojectresearchersprocessedinformationaccordingtothefollowingcriteria:
a) ifinvestigatorswerereasonablycertainthattheincidentcausednomajorimpact,andtherewasnoevidence
tothecontrary,theincidentwasnotlabeledamajorincident;
b) if (based on general investigator knowledge or the scale/nature of the incident) there was reasonable
certaintythattherewasamajorimpact,theincidentwasincludedasamajorincident;
c) iftherewasuncertaintyofthemagnitudeoftheimpact,thecasewasresearchedfurther;
d) if there was still insufficient information after research to make a determination, and (b) above did not
apply,thentheincidentwasregardedasnothavinghadamajorimpact.
Theentiredatasetandcategorizationswerereviewedandcorrected(whereneeded)bytwoseniorresearchers
attheculminationofthedataentryprocessbeforeanystatisticalanalysiswasconducted.
UCRL-TR-227068 100
E.PreliminaryData
Thedatabaserecords1,874incidentsfromNovember1933toMarch2004.Ofthese,188incidentsrepresented
majorattacksoncriticalinfrastructure,whileonly168ofthissubsetwereconfirmedashavingbeenperpetrated
bythegroup(s)/individualinvolved.Therewere895minorattacksagainstinfrastructure,ofwhichonly765
wereconfirmedattacks.
F.FurtherCrITICDevelopment
Owingtolimitedavailableopensourceinformationoncertainincidentsandfiniteresources,theprojectteam
realizesthatforcertainincidentsthedetailscontainedthereinmaybeuncorroboratedorlacktherequisitedetail
forproperanalysis.Forinstance,thedifficultyindeterminingtheexactimpactofanattackresultedinanumber
ofcasesbeingcategorizedintheuncertaincategoryofimpacttype.Thedifficultyoftenliesindeterminingthe
natureoftheattack,andwhethertheattackswereperpetratedtomakeasymbolicstatement,todestroy
property,ortokilllargenumbersofpeople.Therefore,weregardCrITICasaworkinprogress,anecessary
foundationuponwhichfurtherdevelopmentcanoccur.Toachievethis,furtherindepthresearchonselect
incidentswillberequired.Whilepreparingcasestudiesforthisdeliverable,projectresearchersdidconduct
furtherresearchonselectedincidentsandwereabletosupplementtheoriginaldata.However,thisalsoproved
tobeatimeintensiveprocess,whichmustbetakenintoaccountinmakingfurtherimprovementstothe
database.
DatabaseStatisticalAnalysis
Introduction
ThissectionoffersabroadoverviewofthepreliminaryCrITICfindings,examiningfiveareasatthenexus
betweenterrorismandCI.First,isaninvestigationofthegeneralnumberofattacks,specifically,anoverviewof
thetotalnumberofattacksrecordedinthedatabaseinrelationtothevariouscategories.Thesecondsubsection
isadiscussionofthedifferentkindsofinfrastructureattacked.IdentifiedarethekindsofCImostfrequently
targetedandhowthishaschangedovertime.Third,isanexplorationofwhotheattackersofCIhavebeen.
DetaileddescriptionsaregivenofthedifferentPerpetratorcategories,howincidentsinvolvingthesegroups
havechangedovertime,andwhichtargetstheyhavechosentoattack.Thefourthsubsectionisananalysisof
thedifferentmethodsofattack:withwhichweaponsanddeliverysystemshasCIbeenattacked?Thefifth
subsectionexaminescasualtiesinrelationtoCIattacks.Attentionhereisgiventotheoverallnumbersandhow
thesehavechangedovertime,whichattackmethodshaveresultedinthehighestcasualties,whichgroupshave
engagedinattacksthatstatisticallyresultedinthehighestnumberofcasualties,andtheroleplayedbythetype
ofinfrastructureattackedincasualtyrates.Finally,thechapterconcludeswithasummaryofgeneral
implicationsconcerningmotivationsforattackingCI.
Priortoexploringthissection,thereadershouldkeepseveralpointsinmind.1)Itshouldbenotedthat,unless
otherwisespecified,onlymajorandminorattackswillbediscussed.2)Inordertoavoidintroducingresearcher
biasintothedata,onlyconfirmedperpetratorshavebeendiscussedwhenanalyzingPerpetratorCategoryand
GroupNamecategories.3)ThechemicalincidentinBhopalandtheSeptember11attacksintheUnitedStates
havebeenexcludedfromcasualtycountsgiventheambiguityincategorizingtheseincidentsandthe
exceptionallylargenumberofcasualties.4054)Becausethesestatisticsweredrawnfrominternationalincidentsof
ItisstillcontestedwhethertheincidentinBhopalwasduetoinsidersabotageoranaccidentresultingfromnegligence.If
405
thelatterwerethecase,theincidentwouldnotbeincludedinthedatabase.Additionally,theextenttowhichalQa`idas
UCRL-TR-227068 101
terroristattacksonCI,theextenttowhichtheyreflectU.S.domestictrendsisdebatable.5)Forthereasons
mentionedearlier,itisbeyondthescopeofthisstudytocomparetrendsinterrorismingeneralwithspecific
attacksonCI.Lackingthiscontrast,thereisthedangerthattheconclusionsdrawnbelowcouldbe
misinterpreted.Forexample,thelethalityofCIattacksgrewdramaticallyinthe1990s,yetsodidterrorist
attacksingeneral.Inshort,strikingtrendsinattacksonCImightnotappearsodramaticifoneismindfulof
terroristattacktrendsingeneral.
Aseriesoffiguresarereferencedthroughoutthissection.Theyprovideavisualsnapshotofsometimes
reconditetrends.ThefiguresarelocatedinAppendixI(AI).
GeneralAttackFigures
TotalNumber
CrITICcontainsatotalof1,084incidentscategorizedaseithermajororminorattacks.Theseincidentsaccount
for58%ofalltheincidentscapturedinCrITIC.406Ofthistotal,thenumberofattacksoninfrastructurethathada
majorimpactwas188(or17%ofthoseincidentsthatwereidentifiedashavingmajororminorimpact).Of
these,only168attackscouldbeattributedtospecificperpetrators.407Therewere896attacksthathadaminor
impactoninfrastructure,ofwhich766couldbeattributedtospecificperpetrators.Outofthe1,083incidentthat
hadsomesignificantimpactonCI,934involvedattacksthatcouldbeattributedtospecificterroristgroups.
FrequencyofAttacks
CrITICcoveredattacksagainstinfrastructurefromNovember1933toMarch2004.Thepaltrynumberofattacks
between1933and1970donotrevealanysignificanttrends.Thiscanbeattributedpartlytotherelativeabsence
ofopensourcereportingascomparedwiththepost1970speriod.Itwasnotuntilthelate1960sand1970sthat
themediabeganfocusingonincidentsofterrorism.Itisnotable,however,thatthenumberofterroristattacks
againstinfrastructureincreasedsignificantlyintheyearsafter1980.The1980saloneaccountedfor471incidents,
or43%ofallmajorandminorattacksagainstinfrastructure,and25%ofallrecordedincidents.The1990s
accountedfor308incidentsor28%ofallmajorandminorincidents,and16%ofallincidents.Although
incidentsforonly3.3yearsofthe2000decadeareintheCrITIC,the132recordedincidentsrepresent12%ofall
majorandminorattacks.(SeeFigureAI1.)
Region
Thelargestpercentageofattacksagainstinfrastructure,29%,hasbeencarriedoutinEurope.Thenextlargest
percentageofattackshasoccurredintheLatinAmericaandCaribbeanregion,accountingfor26%ofallattacks.
Almostalloftheincidentsinbothregionsareattributabletonationalistorsecularutopian(especiallyextreme
left)terroristgroups.(SeeFigureAI2.)
targetsintheSeptember11thattacksweredesignedtospecificallyattackinfrastructureandtheextenttowhichtheywere
intendedtokillalargenumberofpeopleisnotcertain.Thelargecasualtynumbersfortheseproblematiccaseswouldinany
eventskewstatisticalanalysis.
406
Most of the remaining incidents were classified as Uncertain and require further investigation before they can be included in
statistical analysis.
407Unconfirmedattacksarethoseinwhichtheperpetratorissuspectedofcarryingouttheattack,butthereisno
corroboratingevidence.
UCRL-TR-227068 102
TypeofInfrastructureAttacked
Analysisofthetypeofinfrastructuretargeted(whilecontrollingforvariousotherparametersliketheregionof
attack,thenumberofcasualties,thetypeofattack,andthecategoryoftheterroristgroupthatperpetratedthe
attack)revealsseveralsalientpoints.Generallyspeaking,withregardstomajorandminorattacks,thedata
revealsthatattacksagainstEmbassies/Consulatesconstitutedthebulkofattacks,with45%ofthetotalnumber.
TheattacksagainstPublicService/GovernmentOfficesrepresented14%,withattacksagainstFinancial
Institutionsconstituting11%.Additionally,Oil/GasInfrastructurefor9%oftheattacks.
RestrictingthecategorizationtoincludeonlymajorCIattacksperpetratedbetween1933and2004,50%were
againstOil/GasInfrastructure.Withregardstootherinfrastructuressufferingmajorattacks,Power
Infrastructuretargetscomprised15%,followedbyPublicService/GovernmentOffices,Railways,andDamsand
Waterwaysat8%,5.3%,and3.7%respectively.
PerpetratorCategoriesandTypeofInfrastructureAttacked
Amongtheterroristcategorieswheremembersperpetratedthelargestnumberoftheattributablemajorattacks
againstCI,SecularUtopiangroupscometotheforewith47attacks.ThiscategoryiscloselyfollowedbyEthno
NationalistandReligiousgroupswith43and19attacksrespectively.ThesetoptwogrouptypesSecular
UtopianandEthnoNationalisthavedisplayedapropensitytoattackOil&Gasinfrastructurefacilities,
comprisingmorethan50%ofthesegroupstotalnumberofmajorattacksonCI.Incontrast,Religiousgroups
haveevenlydistributedtheirmajorattacksovervarioustypesofinfrastructure.
Whenthedataanalyzedincludedbothmajorandminorattacks,SecularUtopianperpetratorsagainleadthe
waywith227attacks.Similarly,Ethnic/Nationalist/Separatist/Irredentistgroupsfollowwith142attacks,and
Religiousgroupsagaincomeinthirdwith64attacks.Thelargestportionofthemajorandminorattacksby
thesethreetopcategorieswasagainstEmbassies/Consulates.SecularUtopiangroupsconducted37%oftheir
attacksagainstEmbassies/ConsulatesandEthnoNationalistgroupsandReligiousgroupsconducted29%and
39%oftheirattacksagainstEmbassies/Consulatesrespectively.Clearly,thesenumbersindicateconsistency
betweentargetingandtheantiWesternandanticolonialbentofideologiesinthesetopcategories.TheSecular
Utopiangroupsconducted16.7%,16.3%,and10.6%oftheirattacksagainstPublicService/GovernmentOffices,
FinancialInstitutions,andOil/GasInfrastructurerespectively.TheEthnoNationalistgroupsconducted18.3%,
16.9%,and10.6%oftheirattacksagainstOil/GasInfrastructure,PublicService/GovernmentOffices,and
Railways/Railroads/Raillinesrespectively.Religiousgroupsconducted15.6%,6.3%,and4.7%oftheirattacks
againstPublicService/GovernmentOffices,FinancialInstitutions,andPowerInfrastructurerespectively.The
varianceinthesepercentagesshowsthatPublicService/GovernmentOfficeswereapreferredtargetbetweenall
threecategoriesbutnosignificantpreferenceofinfrastructuretargetselectionwithingroupscanbeidentified.
RegionsandTypeofInfrastructureAttacked
Attacks on Oil/Gas Infrastructure contributed to more than 50% of the attacks in Europe and Latin
America/Caribbean.Significantly,intheMiddleEast/NorthAfricaregion,theattacksonOil/GasInfrastructure
accounted for 85% of the attacks on CI. The high percentage of attacks on CI in this region could be partly
attributedtothevastnumberofoilandgasinfrastructuretargetsintheregion,andthevulnerabilityofthose
targets visvis other CI. In contrast, in Asia the attacks on Oil/Gas Infrastructure constituted approximately
30%ofthemajorattacksonCI.
UCRL-TR-227068 103
TimePeriodandTypeofInfrastructureAttacked
ThedataformajorattacksonCIindicatethatterroristshavetargetedOil/GasInfrastructureconsistentlysince
1960.Foreverydecadesince1960,thenumberofattacksonOil/GasInfrastructurehasbeenhigherthanthe
numberofattacksonothertypesofCI.Aspreviouslynoted,alargepercentageoftheattacksagainst
Embassies/ConsulateswerecategorizedasminorattacksandappearasthemostfrequentlyattackedCIin
general(45%)whenincludingbothmajorandminorincidents.Moreover,thenumberofattacksagainst
Embassies/Consulatespeakedinthe1980s,accountingfor50%ofattacks.
TypeofInfrastructureAttackedandCasualties
MajorattacksonCIproducedatotalof1,814deaths.ThenumberoffatalitiescausedbyattacksonOil&Gas
Infrastructureconstituted36%ofthistotal,whileattacksonPublicService/GovernmentOfficesrepresent25%.
MajorattacksonMilitaryBasesandPoliceStationsrepresent12%,whileEmbassies/Consulatesaccountedfor
10%ofthetotalnumberoffatalities.ThesetheredidnotincludetheBhopalgastragedyandtheSeptember11
attacks.
ThetotalnumberoffatalitiescausedbybothmajorandminorattackswithaconfirmedperpetratoronCIwas
2,446.TheattacksintheOil/GasinfrastructurecategoryandthePublicService/GovernmentOfficeinfrastructure
categoryledwith26%and24%ofthetotalnumberoffatalitiesrespectively.Thenumberofdeathsresulting
fromattacksonEmbassies/Consulates,andPublicService/GovernmentOfficeeachcontributedabout10%ofthe
totalnumberoffatalities.MilitaryBasesandPoliceStationsaccountedfor11%.
Similarly,outofthe14,099casualties(afigurethatincludesnonlethalinjuries)producedbymajorterrorist
attacksonCI,theattacksonEmbassies/ConsulatesandPublicService/GovernmentOfficeeachproduced31%
and25%ofthetotalnumberrespectively.UponconsideringthedataforbothmajorandminorattacksonCI,the
attacksonEmbassies/ConsulatesandPublicService/GovernmentOfficeproduced26%and25%respectivelyof
the18,066casualtiesthatresultedfromtheseattacks.
PreliminarystatisticalanalysisofthemajorandminorcasesinCrITICindicatesthatthenumberofcasualties
variesaccordingtothetypeofthetargetedinfrastructure.However,thevariationoffatalities,injuries,and
casualtiesbetweendifferenttypesofinfrastructurewasnotsignificantwhenthedatafortheBhopalgastragedy
andtheterroristattacksonSeptember11,2004wereexcludedfromtheanalysis.408
PerpetratorCategories
Thetotalnumberofmajorattacksattributabletospecificgroupswas168.SecularUtopiangroupscarriedout
27%oftheseattacksfollowedbyEthnoNationalistgroupsthatcarriedout26%oftheseattacks.Amongother
identifiablegroupcategories,Religiousgroupswereresponsiblefor11%oftheattacks.(SeeFigureAI3.)
Thedataforattributablemajorandminorattacksrevealsthatoutofthetotalnumberof933incidents,Secular
Utopiangroupsremainthemostactivewith24%oftheattacks.EthnoNationalistgroupsfollow,responsiblefor
15%ofattacks.(SeeFigureAI4.)
AonewayANOVAtestwasconductedbetweenthetypesofinfrastructureattackedandthemeannumberoffatalities,
408
injuriesandtotalcasualties.SeeFigure5inAppendixIII(TheSPSSoutputindicatesthetestresultsafterexcludingthecases
oftheBhopalchemicalincidentandthe9/11terroristattacks)
UCRL-TR-227068 104
FrequencyofAttacksoverTimeandPerpetratorCategories
OfmajorattacksbyEthnoNationalistgroups,incidentsfollowneitherasteadilyincreasingnoradecreasing
pattern.Theattacksarealsonotconcentratedwithinanyparticulartimeperiod.Similarly,attacksconductedby
SecularUtopiangroupsaredistributedevenly,althoughanincreaseinthenumberofattacksisevidentbetween
1983and1987.ThedistributionofattacksbyReligiousgroupsdoesnotfollowasteadilyincreasingor
decreasingpatternuntilthelate1990swhenthiscategorybecomesresponsibleforanincreasingnumberof
incidents.(SeeFigureAI5.)
ThedistributionofmajorandminorattacksconductedbyEthnoNationalistgroupsdoesnotfollowanyclear
trend;however,aperceptibleincreaseinthenumberofattackscarriedoutbythesegroupsbetween1980and
1987isevident.(SeeFigureAI6.)TheattackscarriedoutbyReligiousgroupssimilarlydonotfollowanysteady
patternandthedataindicatesanapparentlyrandomlyvaryingdistributionofattacks.Thedistributionof
attacksbySecularUtopiangroupsshowsanincreaseinthenumberofattacksbetween1980and1988,after
whichadecreasingpatternofattacksisobserved.Recently,however,thatthenumberofattacksbySecular
Utopiangroupsshowedanincreasein2002.
PreliminarystatisticalanalysisofdataforallthecasesinCrITICrevealsthatthedifferenceinthemeannumber
ofattacksoverdecadesbydifferenttypesofterroristgroupsisstatisticallysignificant.409
RegionWhereAttackOccurredandPerpetratorCategories
ThedistributionofattributablemajorattacksbyPerpetratorcategoryovervariousworldregionsrevealsseveral
interestingdetails.InAsia,therewereatotalof27incidents.AttacksbyReligiousandSecularUtopiangroups
ledtheway,constituting29%and26%ofallattacksrespectively,whileattacksbyEthnoNationalistgroups
accountedfor18.5%ofattacks.Incontrast,ofthe36attacksinEurope,thevastmajority,47%,wereconducted
byEthnoNationalistgroups.SecularUtopiangroupsconducted19%oftheattacks.ComparethistotheLatin
America/Caribbeanregion,whereSecularUtopiangroupsconducted81%ofattacks.IntheMiddleEast/North
Africa,therewereatotalof25majorincidents.TheEthnoNationalistgroupsconducted32%oftheattacksand
Religiousgroupswereresponsiblefor12%oftheattacks.InSubSaharanAfrica,EthnoNationalistgroups
conducted57%ofthe21majorattacksintheregionandReligiousgroupsconducted9.5%oftheattacks.Finally,
intheUnitedStatesandCanada,therewereatotalof19majorattacks.Interestingly,Religiousgroups
conducted26%oftheattacks(afigureequaledonlybytheReligiousgroupattacksinAsia).SecularUtopian
groupsconducted5%oftheattacks.Significantly,individualsinthePersonal/Idiosyncraticcategorywere
responsiblefor31.5%oftheattacksagainstCIintheUnitedStates.Thisfigureisfarhigherthananyotherregion.
(SeeFigureAI7)
Whenweconsiderbothmajorandminorconfirmedperpetratorincidents,thepictureislargelysimilar.InAsia,
wefindtotalattacksnumbering114.SecularUtopiangroupsconducted26%ofattacksandReligiousgroups
carriedout16%ofattacks.EthnoNationalistgroupsaccountedfor11%oftheattacks.InEurope,Ethno
Nationalistgroupsaccountedfor31%ofthe278majorandminorattacksagainstCI.
AtwowayAnalysisofVariance(ANOVA)testwasconductedtoexaminethedistributionofattacksbyvariousgroups
409
overseveraldecades.SeeFigure1inAppendixIII.
UCRL-TR-227068 105
SecularUtopiangroupscarriedout24%oftheattacksandReligiousgroupsconductedonly2%oftheattacks.
TherelativescarcityofattacksbyReligiousgroupsinEuropepresumablyreflectsthefactthathistoricallythe
regionhasnotbeenhometomanygroupswhoseprimaryorientationwasreligious.IntheLatin
America/Caribbeanregion,outof235incidents,SecularUtopiangroupscarriedout49%and42.5%ofattacks
fellintheUnknowncategory.ReligiousandEthnoNationalistgroupsaccountedforonly0.42%and0.85%of
thetotalnumberofattacksrespectively.However,intheMiddleEast/NorthAfricaregion,Religiousgroups
rebounded,accountingfor19%ofthe155majorandminorattacks.EthnoNationalistgroupsandtheSecular
Utopiangroupsconductedabout10%andabout5%ofthetotalnumberofattacksrespectively.InSubSaharan
Africa,EthnoNationalistgroupsandReligiousgroupsaccountfor41%and4%respectivelyofthe49majorand
minorincidents.IntheUnitedStates/Canadaregion,therewere77majorandminorincidents.EthnoNationalist
groupscarriedoutabout8%oftheattacksandReligiousgroupsconducted10%oftheattacks.Aswasthecase
whenexaminingmajoronlyattacksbygroupsandindividualswithPersonal/Idiosyncraticmotivations,major
andminorattackswerehigherinthisregionthananywhereelseglobally,accountingfor13%ofthetotal
numberofattacks.Themajorityofattackswereperpetratedbyunidentifiableperpetrators.(SeeFigureAI8.)
Astatisticalmodelwascreatedtodeterminewhetherarelationshipexistsbetweentheterroristcategoriesand
thedayofattack,themonthofattack,andthegeographicalregionofattack.Thestatisticalmodelutilizedthe
dataforallthecasespresentinCrITICandconcludedonlythatacorrelationexistsbetweenthetypeofterrorist
groupandtheregionoftheterroristincident.410
AttackMethodandPerpetratorCategories
Allthedifferentcategoriesofterroristgroupsutilizedvarioustypesofbombingtocarryoutthevastmajorityof
majorattacksagainstCI.(SeeFigureAI9.)Thedataforbothmajorandminorattacksrevealssimilarlythatall
groupsusevarioustypesofbombingtocarryoutmostattacksagainstCI.TheEthnoNationalistgroupsused
bombingtoconduct68%oftheirattacksandusedProjectilesandSabotagetocarryout9%and5%ofthetotal
numberofattacksrespectively.Religiousgroupshaveusedbombingstocarryoutabout58%oftheirattacks,
withProjectilesaccountingfor14%.SecularUtopiangroupshavecarriedout59%oftheirattacksutilizing
bombings.Likeothergroups,theyhavealsoreliedonProjectilesandSabotage,whichconstitute11%and5%of
theirattacksrespectively.(SeeFigureAI10.)
PerpetratorCategory/SubCategoryandCasualties
Formajorattackswithaconfirmedperpetrator,attacksbyReligiousgroupshaveaccountedfor73%ofall
casualties.EthnoNationalistandSecularUtopiangroupshaveaccountedfor16%and11%respectivelyofthe
totalnumberofcasualties(fatalitiesandinjuries).Forattributablemajorandminorattacks,Religiousgroups
haveaccountedfor67%ofallcasualties,thevastmajorityappearingundertheIslamicsubcategory.Secular
UtopianandEthnoNationalistgroupshaveaccountedfor11%andabout17%ofallcasualtiesrespectively.(See
FigureAI11&FigureAI12.)
Preliminarystatisticaltestingofallmajorandminorterroristattacksrevealsthatdifferenttypesofterrorist
groupsdonotproducethesamenumberofcasualtiesandthattheReligiousgroupshaveshownthemselvesto
bethemostlethal,thoughnotresponsibleforthelargesttotalnumberoffatalities.Thenumberofcasualties
variessignificantlyacrossdifferenttypesofterroristgroups.411
410MultipleDiscriminantAnalysiswasusedtoevaluatetherelationshipbetweentheterroristgrouptypesandthemonth
andregionofattack.
411AonewayANOVAtestwasusedtostudythevariationofcasualtylevelsacrossdifferenttypesofterroristgroups.See
Figure4inAppendixIII.
UCRL-TR-227068 106
Forallconfirmedperpetratormajorattacks,Religiousgroupshaveaccountedfor80%ofallinjuriesandEthno
Nationalistgroupshaveproduced17%ofallinjurycases.Forallattributablemajorandminorcases,Religious
groupshaveaccountedfor69%ofallinjuriesandEthnoNationalistgroupsareresponsiblefor16%ofall
injuries.(SeeFigureAI13&FigureAI14.)
Whenexaminingfatalitiesonlyinattributablemajorattacks,thefiguresshowSecularUtopiangroupsleading
with57%ofalldeaths.Religiousgroupsaccountedfor35%ofallfatalities.Finally,EthnoNationalistgroups
haveproduced7%ofallfatalitiescausedbymajorattacksagainstCI.(SeeFigureAI15.)
Forallfatalitiesinattributablemajorandminorattacks,attacksbySecularUtopiangroupssimilarlyreflectthe
mostfatalities,44.5%,withReligiousgroupsresponsiblefor31%ofallfatalities.TheEthnoNationalistgroups
accountedfor11%ofallfatalities.(SeeFigureAI16.)
Whensubcategoriesoftheperpetratortypesareconsidered,itisclearthatIslamistgroupshavethedistinction
ofbeingthemostlethal,causinganaverageof12deathsperattack.Intermsofnonlethalcasualtyproducing
attacks,IslamistgroupsalsotopthelistwithCultsandRightwinggroupsresponsibleforsignificant,yetfar
smaller,numbersoffatalities.(SeeFigureAI17.)
PerpetratorGroups
Ofallattacksagainstinfrastructure,theShiningPath,theEuskaditaAskatasuna(ETA),theIrishRepublican
Army(IRA),theRevolutionaryArmedForcesofColombia(FARC),theNationalLiberationArmy(ELN),the
ArmenianSecretArmyfortheLiberationofArmenia(ASALA),theNationalLiberationFrontofCorsica(FLNC),
andtheRedArmyFaction(RAF)accountforthegreatestnumberofattacks.Ofthesegroups,theShiningPath,
theIRA,andtheFARCareresponsibleforthehighestnumberofmajorandminorattacks.(SeeFigureAI18.)
SpecificGroupsandCasualties
OfthosespecificgroupsidentifiedasmostactiveinattackingCItheIRA,theETA,FARC,ShiningPath,the
ASALA,theFLNC,andtheRAFnonehasconductedaCIattackthathaskilledmorethanfourpeople.
However,whentheanalysisisexpandedtoincludegroupsthathavebeenlessprolificinattackingCI,casualty
ratesarefarhigher.HereAlQa`idaisthemostlethalwith435412fatalitieswhiletheLTTEissecondwith187.
TypeofAttack/Delivery
TheanalysisofdataformajorattacksonCIrevealsthatvariousmethodsofbombingseemtobethepreferred
modeofassault.Ofthe188majorattacks,about112wereimplementedusingvarioustypesofbombing.
However,asmostofthebombingtypeswereintheUnknowncategory,nousefulanalysiscanbedrawnabout
theprevalenceofdifferenttypesofbomb.Followingbombings,sabotagewasthenextmostpreferredmethod
forattackingCIseemstobeemployingsabotagetactics.About22attacksemployedsuchstrategies.
Thedataforbothmajorandminorattacksindicatesthatalmost63%ofincidentsinvolvedvarioustypesof
bombing.About9%ofattacksusedprojectilessuchasmortarsandrocketpropelledgrenades.
412 ThisfigureexcludestheattacksofSeptember11.
UCRL-TR-227068 107
RegionandAttackMethod
Varioustypesofbombingarethemostfavoredtypeofattackinallregions,accountingfor62%ofallattacks.
Projectileswerethenextfavoredmeansofattackinallregions,yettheyaccountedfor9%ofattacks.InEurope,
bombingsaloneaccountedfor69%ofallattacks.Interestingly,Molotovcocktailshavebeenpopulartypesof
attacksinEuropeaccountingfor10%ofattacks.Giventhecrudenessandlimitedeffectofthisweapon,mostof
theseattackscanbeconsideredtohavehadaminoreffectoninfrastructure.IntheMiddleEastandNorthAfrica
region,bombingswereused66%ofthetime,andprojectileswereused17.5%ofthetime.IntheLatinAmerica
andCaribbeanregion,bombingswereused63%ofthetime.ProjectilesandSniping/Shootingwerethenext
importantcategoriesinthisregionaccountingfor7.8%and9%respectively.
Astatisticalmodelwascreatedtodeterminewhetherarelationshipexistsbetweentheattacksoccurringina
regionandthetypeofattack,thetypeofinfrastructureattacked,andwhethertheattackemployedsuicide
tacticsornot.Thestatisticalmodelutilizedthedataforallmajorandminorcasespresentinthedatabaseand
concludedthatacorrelationexistsbetweentheterroristincidentinaregionandthemethodofattack
employed.413
GroupNameandAttackMethod
OfthespecificgroupsidentifiedearlierasthemostprolificinattackingCI,onlytheFARChaspreferred
SabotageandSiegeandHostagetakingasatypeofattackoverbombingswhenattackingCI.Thisisconsistent
withknownandrecordedattacksbytheFARC,mostofwhichwereagainstOil/Gasinfrastructure.TheETAhas
consistentlyfavoredusingbombingsandprojectilesintheirtactics.TheShiningPathisrecordedasusing
SabotageandCombinationtacticsintheirattacksinadditiontobombings.TheonlytypeofattacktheFLNCis
recordedashavingusedarebombings.ApartfromoneisolatedattackusingProjectiles,theIRAhasalmost
exclusivelyusedBombingastheirpreferredmethodofattackagainstCI.
TypeofAttack/DeliveryandCasualties
Notsurprisingly,thetypeofattackvisiteduponCIhasadirectbearingonthecasualtiesthatfollow.Bombings
(eitheroftheUnknownorVehicletype)accountfor82%ofalldeaths,reflectingtheefficacyofthismeansof
attackforterrorists.IfoneexcludesCombinationattacks(whichaccountfor13%offatalities),allothertypesof
attacksShooting,Grenades,Firebombings,Sabotage,etc.accountforonly7%ofalldeathscombined.(See
FigureAI19.)Asomewhatanalogouspatternemergesifallcasualties,notjustdeaths,arereviewed.Bombings
(eitheroftheUnknownorVehicletype)accountfor75%ofallcasualties,whileCombinationandOther
constitute17%.SiegeandHostageTaking,Sabotage,Projectiles(grenadesandmortars),andShootingsalmost
entirelyaccountforwhatremains.
Preliminarystatisticalanalysisofthemajorandminorcasesinthedatabaseindicatesthatthenumberof
casualtiesvariesaccordingtothetypeofattackused.However,thevariationoffatalities,injuries,andcasualties
betweendifferenttypesofattackmethodswasnotsignificantwhenthedatafortheBhopalgastragedyandthe
terroristattacksonSeptember11,2004wereexcludedfromtheanalysis.414
413MultipleDiscriminantAnalysiswasusedtoevaluatetherelationshipbetweenthetypeofinfrastructureattacked,thetype
ofattack,thesuicide/nonsuicidenatureofattackandtheregioninwhichanincidentoccurred.SeeFigure2inAppendixIII.
414AonewayANOVAtestwasconductedbetweenthetypesofattacksandthemeannumberoffatalities,casualties,andthe
injuries.SeeFigure3inAppendixIII(TheSPSSoutputindicatesthetestresultsafterexcludingthecasesoftheBhopal
chemicalincidentandtheterroristattacksonSeptember11,2001intheU.S.)
UCRL-TR-227068 108
Casualties
Thenumberoffatalitiesforterroristattacksagainstcriticalinfrastructureintotalwas9,034.However,whenthe
fatalitiesfortheincidentsinBhopal,India,andtheSeptember11attacks(whichaccountfor6,820fatalitiesand
skewthedatasignificantly)havebeenremoved,thetotaldropsto2,214.Fatalitieswerehighestinthedecade
19901999.Thenumberofinjuriesfollowsasimilartrend.
Untilthe1980s,CIattacksthatresultedinfatalitieswereexceptionallyrare.Sincethattime,however,attacks
havebecomefarmorelethalwith1998beingacrescendoofsortswithwellover1,000deaths.Indeed,the1990s
wasthemostlethaldecadeknown,fareclipsingallotherdecades.Thecurrentdecadeisontracktobeless
deadlythatthe1990sbyafactoroftwo,althoughifthecasualtiesofSeptember11areincludedthecurrent
decadewouldbethemostlethal.(SeeFigureAI20.)Whenoneincludesnonlethalcasualtiesaswell,asimilar
patternemerges.Againthe1990sledalldecadesincasualties,reachingjustunder11,000.The1980shadfewer
casualtiesbyafactorofalmostsix.
Conclusions
Betweenthe1960sandtoday,thetotalnumberofattacksbysubnationalgroupsagainstCItargetsappearsto
haverisendramatically.Evenifoneacknowledgesthatthesenumbersmaybecorruptedsomewhatbythe
relativepaucityofinformationgatheredduringearlierdecades,seriousgapsintheexistingdatabasesthat
attempttorecordterroristattacksandincidents,andtheincreasinglyextensivemediacoverageofterrorist
incidentsthathasmarkedsuccessivedecades,severalpatternsclearlyemergefromeventhemostcursory
examinationofCrITICcompiledbyCNSforthisproject,threeofwhicharereviewedbelow.
First,withregardtothegeneralattacknumbers,thetotalnumberofattacksonCIincreasedfromonly42inthe
decadeofthe1960sto116inthe1970sto471inthe1980s.Significantly,itdecreasedto308inthe1990sandnow
standsat131forthefirstthreeandonehalfyearsofthenewmillennium.Inshort,therehasbeennearlyaten
foldincreaseinthetotalnumberofCIattacksfromthedecadeofthe1960stothatofthe1990s.(SeeFigure4.2.)
ThisseemstosuggestthatviolencepronenonstateactorshavedevelopedagrowinginterestinattackingCI
overtime,althoughthepercentageofincreasesinCIattackswouldhavetobecomparedtothepercentageof
increasesinthetotalnumberofterroristattacksoverthepastfourdecadesinordertodeterminewhetherthat
numberis1)asimplereflectionoftheoverallincreaseinterroristattacks,or2)astrongindicatorofincreasing
interestinattackingCIperse.ThedifficultywiththisisthelackofcomparabledataonnonCIrelatedincidents.
Ineitherevent,theinterestofterroristsincarryingoutsuchattacksisscarcelylikelytodeclineinthenearfuture,
especiallygiventhegrowingattentionpaidbyWesternandinternationalmediatoCIvulnerabilities.
Second,withregardstothetypeofinfrastructureattackedandmethodofattack,oftheattributablemajorCI
attacksbetween1933and2003,Oil/Gas,Power,andPublicService/GovernmentOfficefacilitiesweretargeted
mostfrequently.Asisdiscussedinmoredetailbelow,theOil/GasInfrastructurecategoryalsoaccountedforthe
mostnumberofcasualtiesfromtheCIattacked.However,whenfactoringinminorattacksagainstCI,
Embassies/Consulatesweretargetedcloseto50%ofthetime,incurringanegligiblenumberoffatalities
comparedtootherCIcategories.InattackingCI,bombinghasbeenthemostfavoredmethodofattack,however,
giventhatmostofthebombingtypesareunknownadditionalinvestigationisrequiredtomorefullyunderstand
thesenumbers.
UCRL-TR-227068 109
800
Number of Incidents 700
600
471
500
400 308
300
200 116 131
100 42
3 8 4
0
9
4
-3
-4
-5
-6
-7
-8
-9
-0
30
40
50
60
70
80
90
00
19
19
19
19
19
19
19
20
Decades
Figure4.2
Third,apartfromthisextraordinaryapparentincreaseinthenumberofCIattacks,whichinpartundoubtedly
parallelsthedramaticincreaseinthenumberofterroristattacksofalltypes,therehavealsobeennoticeable
shiftsintheproportionofsuchattacksthathavebeencarriedoutbydifferenttypesofterroristgroups.
AlthoughthemajorityoftheperpetratorsofCIattacksineachdecadefallintotheUnknowncategory,of
thosethatcanbeidentifiedonediscoversthefollowingbreakdowns.Duringthe1960s,therelativelysmall
numberofCIattackswerecarriedoutbyEthnoNationalistgroups(8)andSecularUtopiangroups(7).
(ReligiousgroupswereonlyresponsibleforasingleCIattackduringthisperiod.)Fromthe1970sonwards,itis
notablethatthenumberofCIattacksincrease,andthatthoseattacksinwhichtheperpetratorsareidentifiable
canbeattributedmainlytoSecularUtopiangroups,EthnoNationalistgroups,andReligiousgroups.
Specifically,inthe1970s,SecularUtopiangroupswereresponsiblefor40CIattacks,EthnoNationalistgroups
for12,andReligiousgroupsresponsibleforoneattack.Thissamepatterngenerallyholdstrueforthe1980sand
1990s,inwhichSecularUtopiangroupswereresponsiblefor161and62CIattacks,respectively,whereasEthno
Nationalistgroupswereresponsiblefor80and46,alsorespectively.However,duringthesetwodecadesthere
wasasignificantincreaseinthenumberandpercentageofCIattackscarriedoutbyReligiousgroupscompared
topreviousdecades,32(7%)attacksinthe1980sand31(10%)inthe1990s.ThetrendingrowingnumbersofCI
attacksconductedbyReligiousgroupscontinuesinthenewmillennium.Indeed,duringthefirstthreeyearsof
thisdecade,Religiousgroupshavecarriedout26or20%ofallCIattackscomparabletothe30(23%)
conductedbySecularUtopiangroupsandsurpassingthe11(8%)conductedbyEthnoNationalistgroups.In
otherwords,ReligiousgroupsarenowamongthemostprolificincarryingoutCIattacks.
Ifwebreakthesegeneralcategoriesdownfurther,itbecomesclearthatLeftWinggroups(aboveallMarxist
Leninistgroups)carriedouttheoverwhelmingmajorityofattacksattributabletogroupsthatfallwithinthe
SecularUtopiancategory,asopposedtoAnarchist,NeoFascist,andEcologicalgroups.Similarly,Islamist
groupswereresponsibleforcarryingoutthemajorityofCIattacksthathavebeenperpetratedbyReligious
groupsinthepasttwodecades.Between1980and2004Religiousgroupswereresponsiblefor89incidentsof
which,Islamistgroupswereresponsiblefor84or94%oftheincidents.(SeeFigure4.3.)
UCRL-TR-227068 110
Ethnic /Nationalist/Separatist/Irredentist
140
Number of Attacks
Other
120
Personal/Idiosyncratic
100 Religious
80 Secular Utopian
60 Single Issue
State Sponsored
40
Unknown
20
0
- 39 - 49 - 59 - 69 - 79 - 89 - 99 - 04
30 40 50 60 70 80 90 00
19 19 19 19 19 19 19 20
Decades
Figure4.3
Finally,withregardstocasualties,bombingshaveaccountedforalmost80%ofallCIattackdeathsand75%of
allcasualtieswhennonlethalinjuriesareincluded.SecularUtopianandReligiousgroupsarethemostdeadly
withthelatterresponsiblefor80%ofcasualtiesofattributablemajorattacksand35%ofthefatalitiesinthesame
category.Thisseemstoechothetrendsseeningeneralinattacksinvolvingreligiousterroristgroups.These
statisticssuggestahypothesisproposingthatreligiousgroupsaremorelikelythanothergroupstomixCI
attackswithmasscasualtyattacks.Incontrast,ofthesevenmostactivegroupstheIRA,theETA,FARC,
ShiningPath,theASALA,theFLNC,andtheRAFnonehaskilledmorethanfourpeopleinasingleattack.
These,then,arethegeneralpatternsthatemergefromthedescriptivestatisticsgeneratedfromCNSsCrITIC.
Timeconstraintslimitedtheamountofdataverificationthatcouldbedone,aswellasthenumberofstatistical
teststhatcouldberun,andsoallresultsareprovisional.However,evenafairlycursorylookatdescriptive
statisticsyieldsmoreinsightthanhasheretoforebeenavailableregardingattacksagainstcriticalinfrastructure.
UCRL-TR-227068 111
Chapter5:THEDECIDeFRAMEWORK*
A.Introduction
Thereusedtobeatimeinthenotsodistantpastwhenacertaindistancebetweenconceptionandapplication
waspossible,evenlaudable.Scientists,bothofthephysicalandsocialvariety,coulddevelophypothesesat
leisure,thesehypothesescouldbetestedandrefinedovertimetoproducetheories,andeventually,iftheystood
uptothescrutinyofpeersandpoliticians,otherswouldcomealongandengineerthesetheoriesintotoolsand
productsusefulindailylife.Unfortunately,thedevastatingpotentialofcontemporaryterrorismandthe
urgencywithwhichadequatetoolstounderstandandcounterterroristsarerequiredmakeituntenable,inthis
domainatleast,fortheoriststositbackandwaitforthisorthodoxprogression.Basicresearchneedstobe
operationalizedassoonaspossibleinaformthatanalysts,investigatorsandpolicymakerscandeployinthe
field.Itiswiththisinmindthatanattemptismadeheretocombinetheempiricalresearch(bothofthelargeN
andcasestudyvarieties)onterroristmotivationsforattackingcriticalinfrastructurewiththeexistingbodyof
literaturerelatingtoterroristtargetselectioninordertoproduceausableandusefulanalyticaltool.Those
fastidiousaboutthescientificmethodwillbequicktopointouttheinherentdangersinhastyexecution.The
currentworkismerelythefirstforayintoanalyticalterritorythathasthusfarbeenonlycursorilyexplored,and
itiseagerlyanticipatedthatotherswillverifyandbuildonourideas.Wefeelthatinthiscase,however,
rigoroustestingmustnotholdupassistancetothoseworkinginthetrenches,wherethereisadearthof
analyticaltoolsavailableinareassuchasthisone.Instead,weproposeasynchronic,incrementalapproach,in
whichhypothesis,theory,andapplicationremainlinked,andastheoryisrefined,sotooarethetoolsbased
uponthattheory.Wehopethereforethatthiswillinitiateaninteractivediscourseinordertoconstantlyimprove
whatisadmittedlyapreliminarytool.WehavetermedourconstructiontheDECIDe(DeterminantsEffecting
CriticalInfrastructureDecisions)Frameworkanditsgoalistoassistintheassessmentofwhetheraparticular
terroristgroupisrelativelymoreorlessinclinedtoattackcriticalinfrastructureasopposedtosomeothertarget.
Afewwordsarenecessarybeforedelvingintotheframeworkitself.First,wedonotcallourconstructiona
model415forthesimplereasonthatmanypotentialusersofourtoolinthepolicyandintelligencecommunities
mayalreadybewaryofnumericalmodelsofterroristthoughtprocesses.Wehavetriedtoavoidasfaras
possibleanythingresemblingamathematicalformulaorsuccinctalgorithm416andfirmlyleavetheultimate
conclusionsinanyparticularcasetotheanalyststhemselves.Therefore,wepreferthetermanalytical
frameworkandwillrefertoourconstructionassuch.
Second,whilethegoalofmuchcounterterrorismanalysisisprediction,onemustfirstgainathorough
understandingofthetopicinquestionbeforereachinganypredictiveinsight.Thecurrentframeworkwhichis
focusedonterroristdecisionmakingisprimarilydescriptiveinitsorientation,withanypredictivecapability
flowingfromthedescriptiveaspect.Thiscomplicatesmatterssomewhatintermsoftheavailabilityof
methodologicalreferents,inthatmanyoftheexistingtoolsrelatedtodecisionmakingweredevelopedwiththe
aimofoptimizingthedecisionmakingprocess(inbusiness,policymaking,andsoforth)andarethus
prescriptive417innatureandoflittleuseinthecurrentproblemcontext.
*
ThischapterwaswrittenbyGaryAckerman.
415Eventhough,technicallyspeaking,ourtoolfallsintotheAmericanHeritageDictionarysdefinitionofaschematic
descriptionofasystem,theory,orphenomenonthataccountsforitsknownorinferredpropertiesandmaybeusedfor
furtherstudyofitscharacteristics.
416Theremay,however,besomesuperficialsimilaritiesinpresentation.
417See,forexample,theworksofsuchauthorsasRalphL.KeeneyandHowardRaiffa,including,Keeny,R.andRaiffa,H.
DecisionsWithMultipleObjectives:PreferencesandValueTradeOffs(Cambridge:CambridgeUniversityPress,1976).
UCRL-TR-227068 112
Third,anyusefulframeworkmustattheveryleasttakeintoaccountthelevelofanalysisprobleminherentin
decisionmakingresearch.Therehasbeenmuchdebateovertherelativemeritsandshortcomingsinherentin
choosingbetween:1)asystemicapproachinwhichterroristsdecisionsareviewedprimarilyintermsof
environmentalconstraintsorstimuliandaninitialsetofvariablevalues(whichusuallyleadstosomevariantof
arationalactorexpectedutilityapproach);4182)anorganizationalapproachthatconcentratesongroup
dynamics,powerrelationshipsandbureaucraticinfluences;and3)apsychologicalapproachthatexamines
thebiasesandotherdistortionsindecisionmakingattheindividuallevel.Noneoftheseapproacheshavebeen
showntobeuniversallymoresuccessfulovertheothersindescribingterroristdecisionmaking.Itisonethingto
saythatterroristsattempttomaximizegainsandreducecosts,justasallgoodrationaldecisionmakersdo.419
Thisisbothtrueanddeceptive,inthatthedeterminationofthebenefitsandcosts,asperceivedbytheterrorist
group,istheoutstandingproblem.Here,thedevil,astheysay,iscertainlyinthedetails.Modelsthatfocuson
onelevelofanalysisovertheothersareoftensuccessfulinlimiteddomainsorwhenappliedtocertainterrorist
groupsatspecificpointsintime.However,theyarefarfromgeneralizabletoallcontexts,eventhoughtheyare
oftenportrayedassuch,andcanbiasanalysis.Ourmethoddoesnotadoptanydogmaticstanceregardingthe
levelofanalysisandincludesaspectsfromallthreelevelsbyhavingdifferentfactorsinfluenceultimatedecision
outcomes.
Fourth,unliketherepresentationsinseveralpreviousmodelsofterroristdecisionmaking,decisionsoftendo
notfollowastrictsuccession(forinstance,ideology=>targetselection=>weaponselection)butcanbemore
fluidintheirordering.Indeed,recentworkinthecognitivesciencessuggeststhatdecisionsareoftentheresult
ofnumerousmentalprocessesoccurringinparallel.420Wehavetakengreatpainstoavoidfallingintothetrapof
imposingafixedprocessbycreatingaframeworkthatisasflexibleaspossibleandonlyordinalwhere
obviouslyandlogicallyrequired.Moreover,inarealworldsocialcontext,decisionmakingisadynamicprocess
withnumerousopportunitiesforfeedback.Inthedomainofterroristtargetselection,thisplacesthe
phenomenonofdecisionmakinginthelanguageofSnowdensCynefinframework421eitherintherealmof
theknowable(sincedatamayexistbutoftencannotbeobservedduetotheclandestinityofterrorists)orthe
realmofthecomplex(owingtofundamentallyunpredictableconvergencesofindividualinteractions)
dependingontheparticularcircumstances.Assuch,pointprediction(basedontheideasofcomplexityscience)
mayinmanyinstancesbetheoreticallyimpossible,andthecorrectstrategyistoimplementprobestoexplore
thecomplexpossibilityspace.UnlikeDrakestargetselectionmodel,422whichtendstobesomewhatrigidand
cybernetic,wehavestructuredourframeworktoincorporatetheaboveideasbybothallowingforbidirectional
factorinfluencesandremainingamenabletothegenerationofprobestoexplorethosepartsofterroristdecision
makingthatareunknowable.
418Eveninthisrelativelysimpleapproach,thereareusuallyseriousdatalacunae.
419See,forexample,BruceSchneier,SecretsandLies:DigitalSecurityintheNetworkedWorld(NewYork:WileyPublishing,Inc.,
2004),p.43.Therationaladversarynotalladversariesaresane,butmostarerationalwithintheirframesofreference
willchooseanattackthatgiveshimagoodreturnoninvestment,consideringhisbudgetconstraints:expertise,access,
manpower,time,andrisk.Someattacksrequirealotofaccessbutnotmuchexpertise:acarbomb,forexample.Each
adversaryisgoingtohaveasetofattacksthatisaffordabletohim,andasetofattacksthatisnt.Iftheadversaryispaying
attention,hewillchoosetheattackthatminimizeshiscostandmaximizeshisbenefits.
420SeethetheoryofconceptualblendinginFauconnier,GillesandTurner,Mark.TheWayWeThink(NewYork:BasicBooks,
2002).
421DavidSnowden,aninnovatorinthefieldofknowledgeengineering,hasdevelopedtheCynefinframework,whichplaces
problemsandissuesinvariousdomains(theknown,theknowable,thecomplexandthechaotic)andprescribes
differentstrategiesfordealingwithelementsineachdomain.SeeKurtz,C.F.andSnowden,D.J.TheNewDynamicsof
Strategy:SensemakinginaComplexandComplicatedWorld,IBMSystemsJournalVol.42,Number3,(2003),accessed
onlineonJuly27,2004athttp://www.findarticles.com/p/articles/mi_m0ISJ/is_3_42/ai_108049867.
422SeeC.J.M.Drake,TerroristsTargetSelection(NewYork:St.MartinsPress,Inc,1998),p.180.
UCRL-TR-227068 113
Finally,havingexposedourselvestothevastmajorityofavailableopensourcedataandliteratureonthetopic,
wehavegrownnaturallymindfulthatothermodelingapproachesmaybeusefulinaddressingthiscriticalissue.
Giventherelativelylimitedscopeofthisstudy,however,weareunabletopursuethesemethodologiesindepth.
Consequently,AppendixIV(PossibleModelExtensions)offersavignetteofotherpotentiallypromising
threatmodelingandassessmentmethodsthatmeritfurtherconsiderationaspossibletoolsforunderstanding
thenexusbetweenterrorismandCI.
B.ContributingFactorDiagram
Ourframeworkisbasedonacontributingfactorsapproach423thatlaysoutthevariouselementsthatcomprisea
terroristgroupstargetingdecisionandindicatesthemajorrelationshipsandinterplaybetweenthesefactors,as
wellasthedirectinfluencesontargetselection.Thisapproachwaspreferredsince,unlikethetraditional
flowchart,decisionelementsarenotpresentedsequentiallybutmerelyindicateacontributingeffect(orpossible
contributingeffect)onotherfactors.424Althoughitmayappearasifwearedividinguptheelementsofthe
decisionmakingprocessintodiscretefactors,werealizethatwithindecisionmakersmindstherearerarely
suchstrictdelineationsbetweenthevariouselementsofdecisionmaking.Thus,whilebearinginmindthatthese
factorsmayinfactintersectandpossessfuzzyborders,forthepurposesofpresentationitismoreusefulto
depictthemasseparableandtolinkfactorstogether,ratherthanendupwithafactorsoup.Thecomplete
factordiagramthatformsthebasisofourframeworkisshownonthefollowingpageasFigure5.1.
Themostreadilyapparentqualityofthefactordiagramisthatitisextremelycomplicated(somemightargue
needlesslyso),butwefeelthatcapturingthemajorityofthedynamicsinvolvedismoreimportantthan
parsimonyinthiscase.Partofthepurposeofourframeworkistomakesenseofthesemyriadfactorinfluences
sotheycanbeusedtoreachaconclusionabouttheprobabilityofaterroristdesiringtoattackcritical
infrastructure.
Thefactorsandsubfactorsusedintheframeworkwerearrivedatasaresultofaprocessofstructuredinquiry
combinedwithareviewoftheliterature,andhavealreadybeendefinedinChapter2.Theremaybediffering
opinionsoverwhetheraparticularelementshouldstandaloneasaseparatefactororwhetheritfallswithinthe
rubricofanotherfactorandshouldserveasasubfactor.Wedonotarguethattheconstructionweputforwardis
unique,ornecessarilythemostaccuraterepresentationofdecisionmaking.Whatisimportant,however,isthat
thestructureisabletoreflecttheimportantdynamicsandinteractionsinvolvedinterroristtargetselectionand
encompassesalllevelsofanalysis.Thisissomethingwefeelthatourconstructioniscapableofcapturing.The
variousrelationshipsbetweenthefactorsarebaseduponacombinationofinformationfoundintheliterature,
theresultsofourempiricalresearch,andinformedhypotheses,andaredetailedaspartoftheframework
discussionbelow.
Sincemostofthefactors(atleastthoseinternaltotheterroristgroup)bothinfluenceandareinfluencedby
numerousotherfactors,causationcan,acrossdifferentgroups,andevenwiththesamegroupunderdifferent
circumstances,flowineitherorbothdirections.Foraestheticpurposes,wehaveendeavoredwherepossibleto
situateinarrowsenteringatthetopofeachfactor;outarrowsoriginatingfromthebottomofeachfactor
andbidirectionalarrowsattheside.Also,arrowscanbelinkedtotheoverallfactorsthemselves(i.e.,indicating
aninfluenceonallaspectsofthefactor),inwhichcasethearrowsterminateatthefactorboxorinothercases
arrowscanbelinkedtospecificsubfactors.
423SeeKoller,Glenn,RiskModelingforDeterminingValueandDecisionMaking(BocaRaton,FL:Chapman&Hall/CRC,2000),
althoughKollersuseofthisapproachtomodelterrorismispartialatbest.
424OnlythebottomcenterportionofadiagrammaticrepresentationoftheDECIDeframeworkcontainssomedegreeof
sequentialordering,reflectingthesomewhatorderedfinalstagesofthetargetselectionprocess,viz.PrimaryTargetSelection
SurveillanceandAssessmentDecisiontoAttackCriticalInfrastructure.
UCRL-TR-227068
ThePerceptualFilterdifferssomewhatfromtheotherelementsofthediagraminthatitportraysbothafactor
andafield.Whileafactorinitsownrightthatcanbeinfluencedbyotherfactors,itservestwoadditional
purposes.First,itgraphicallyseparatesinageneralwayfactorsinternaltotheterroristgroupfromthose
externaltothegroup,425andseconditservesasafieldthatactsoninformationflowinginfromcertain
externalfactors(whichonthediagrampassTHROUGHtheperceptualfilterinsteadofaroundit)tointernal
frameworkfactorsandindicatesthepossibilityforperceptualdistortionsofinformation.
Althoughallthefactorsandrelationshipsshownareconsideredintheframework,projectresearchershave
indicatedthoserelationshipstheyfeeltobemostimportantinthemajorityofcontextsbyusingaheavierline.
However,wemustcautionthatthissimplificationshouldnotberelieduponbecausethevaried,andoften
unique,natureofeachterroristgroupmeansthatincertaincasesaparticularrelationshipthathasminimal
influenceondecisionselsewhereplaysalargeroleinaspecificterroristgroupataspecifictime.Additionally,it
shouldbenotedthattheframeworkoftenreferstoterroristgroupsordecisionmakerswithingroups.Thisdoes
notdetractfromitsutilityinthespecificcaseofanindividualterroristoraunitarydecisionmaker.Theseshould
beviewedasexamplesofthemoregeneralcase,andtheframeworkisconsiderablysimplifiedinthesecases.
TwomorepreliminarynotesshouldsufficetoconcludetheintroductiontotheDECIDeframework.Theauthors
understandthatterroristsdonotbasetheirdecisionsonabinaryquestion:doweattackacriticalinfrastructure
targetorsomethingelse?Instead,terroristswillinallprobabilitysimplyconsiderspecifictypesoftargetsthat
mayormaynotfallwithinthecriticalinfrastructurecategoryasdefinedbyacademicsandgovernments.Our
primaryfocusofinquiry,however,isdistinguishingtargetselectiononthebasisofwhethertheultimatetarget
selectedbyaterroristgroupisonethatisregardedaspartofthenationscriticalinfrastructure,aswellasthe
processbywhichsuchdecisionsaremade.ThereforewehavestructuredtheframeworkonthebasisofCI
versusnonCItargets,eventhoughweunderstandthateachcategoryismadeupofmanyindividualtarget
types.Theframeworkmayinsomecasesrevealthespecifictypeofcriticalinfrastructurethatcouldbeattacked,
butthisisacorollarytotheprimaryresearchquestionaddressedbytheframework.
Asshouldbeclearfromthefactordiagram,theDECIDeframeworkisdynamicinmanyrespects,since
influencesondecisionscancirculatethroughseveralfactorsandbackagainintheprocessofcontributingto
decisionmaking.However,atthisstageoftheframeworksdevelopment,theactualdecisionisregardedas
singleeventfocusedandmonadic.Thismeansthattheframeworkrepresentsaoneshotprocessthegroupis
consideringasingleattack,asopposedtoalongtermcampaign.Therefore,althoughthedecisionmakermay
takeintoaccountthereactionsofexternalactors(suchastheresponseofthepublicortheterrorists
constituency),theseactorsarenotregardedatthisstageasdecisionmakingentitiesintheirownright,andtheir
decisionmakingprocessesarenotcapturedintheframework.Inordertoaccuratelymodelaterroristcampaign,
oneneedstotakeintoaccounttheactualdecisionsmadebyexternalactorsaftereachactionperpetratedbythe
terrorists.Thiswouldrequireconvolutedgametheoretictypesofanalysisandwouldonlyfurthercomplicate
whatisanalreadycomplexframework.Theprojectteamthereforedecidedtobeginbyconsideringanisolated
attackprocess,whichhastheaddedbenefit(fromasimplificationstandpoint)ofmakingseveralfactors
invariantunderthissingleattackplanningprocess.426Nonetheless,wefeelthattheframeworkpresentedhere
canstillprovideapowerfultool(andanimprovementoverexistingmethods)bycapturingthemostimportant
dynamicsoftargetselection,especiallywhenconsideringterroristgroupswithshortplanninghorizonsorad
hocgroupsthatcoalesceforthepurposesofconductingasingleattack,suchasthegroupresponsibleforthe
firstWorldTradeCenterbombingin1993.
425Sincetheentirediagramrepresentsaninternaldecisionmakingprocess,thereareinactualitynoexternalfactors.
However,totheextentthatdecisionmakersperceiveitemsthatexistintheexternalenvironment,theseareherereferredto
asexternalfactorsforthesakeofconvenience.
426Furtherplannediterationsoftheframeworkwilladdresstheseaspectsofmultipleactorsandanaddedtemporal
dimension.
UCRL-TR-227068 116
C.DECIDeBasics
Thefollowingisageneralguideforusingtheframework,followedbytheelementsoftheframeworkitself.The
initialstepinusingtheframeworkistrivialandisincludedhereonlyforthesakeofcompleteness.Itmustbe
stressedthatthistoolisdesignedtoexploretheintentofaterroristgroup(orotherviolentnonstateactor)to
attackcriticalinfrastructure;theotherpartsofacompletethreatassessment(enemycapabilityandasset
vulnerability)requiredifferentanalyticaltools.427
TheDECIDeframeworkoperatesthroughtwoseparatemechanisms:
a) Detectingincreasesintherelativeattractivenessofcriticalinfrastructuretargetstotheterroristgroupandits
perceivedcapabilitytoattackthesetargets.
Withintheframework,Aisusedtodenotetheattractivenesstothegroupofattackingacriticalinfrastructure
targetandCtodenotetheterroristsperceivedcapabilitytoengageinaseriousattackagainstcritical
infrastructuretargets.Increasesordecreasesarerepresentedby+andsignsasfollows:
Someincrease : + Somedecrease :
Significantincrease : ++ Significantdecrease :
Largeincrease : +++ Largedecrease :
Varyingincrease : + Varyingdecrease :
(dependentoncharacteristicsofthevariable) (dependentoncharacteristicsofthevariable)
TheanalysisbeginswithbothAandCneutral.
b) Identifyingprogressiverestrictionsonthetargetspaceavailabletoterrorists.
FollowingtheleadofDrakeandothersitispossibletoelucidateamechanismbywhichonelooksattheentire
rangeoffeasibletargetsopentoterroristattack,andthenusesknowledgeaboutthegroupspreferencesand
abilitiestoprogressivelyrestrictthesetoftargetsthatthegroupcanorwouldattack.Thisapproach
supplements(a)theaboveinthatitcreatesboundariesbetweentheprobableandimprobabletargetsets.We
regard(a)asabottomupapproachinthatittracestheindividualfactorsthatincreaseordecreasethe
motivationandperceivedcapabilityspecificallytoattackcriticalinfrastructure.Yetthedangerhereisthatthe
analystwillfailtoseetheforestforthetrees,sotospeak,andcouldbecomesoenmeshedindetailsthat
obviouslimitationsontheterroristsfreedomoftargetselectionareoverlooked.Inthatrespect,thistopdown
approachprovidesavaluablecheckon(a)byprogressivelylimitingthedecisionspace.Thereis,however,an
obviouslimitationtousingthissecondapproachinisolation.Whileitcanhelpverifywhetherornotcritical
infrastructuretargetsfallwithinthefeasibleattackspace,itdoesnotspeaktothefactorsthatmaydraw
terroriststocriticalinfrastructureinparticular.Acombinationofthetwoapproachesthereforeresultsinan
accumulationofattractorstowardscriticalinfrastructureattacksontheonehand(through(a)),anda
circumscriptionoftargetingoptionsontheother(through(b)),thusyieldingmutuallysupportiveanalysis.
427
Capability and vulnerability are therefore only important in so much as they affect motivations. We are primarily
interested in terrorists perceptions of their capabilities and target vulnerability, even if these differ considerably from the
objective values of these variables.
UCRL-TR-227068 117
Inthemostgeneralsense,perhapsthebestwaytodepicttheprocessoftargetselectionisasaseriesof
concentriccircles.(SeeFigure5.2).Aterroristgroupsideologyestablishestheboundariesofthelargestand
mostallencompassingofthesecircles,sinceitessentiallyidentifiesthefullrangeoftargetsthatcanlegitimately
beattacked.Withinthatrange,whichisnormallyquitewide,agroupsspecificoperationalobjectivesfor
carryingoutanattackwillthennecessarilyleadtofurtherreductionsinthescopeoftargetingpossibilities.Once
theboundariesofallofthetargetsthatmightpermitthegrouptoaccomplishitsparticularobjectivesaredrawn,
thegroupsexistinglevelofoperationalcapabilitieswillthenlikelyimposefurtherlimitationsonthenumberof
potentialtargetswhichcanreasonablybeexpectedtobeattackedsuccessfully.Atthatpointpreliminary
surveillanceofthoseremainingtargetsistypicallyundertakeninordertodeterminepreciselywhichonesare
mostvulnerabletoattack.Afterthissurveillanceprocesshasbeencompleted,afinaltargetisnormallyselected,
andoperationalplanningthenbeginsinearnest.428
Owingtothepaucityofliteratureorinformationpertainingtoseveralareasoftheframework,itwasdecidedto
includeauthorhypotheses.Thesehypotheseswerederivedfromtheextensiveexperienceandempirical
knowledgeofteammemberswiththesubjectmatter.Whileinvestigatingandverifyingextanthypothesesisa
necessaryandurgenttask,itisbeyondthescopeofthecurrentproject.Attheveryleast,thesehypotheses
providefodderforfutureresearchefforts,andvariousapproachesthatmayproveusefulinthisregardare
describedattheendofthischapter.
Total Range of
Possible Targets
1) Ideology
2) Operational Objectives
3) Perceived
4) Post-surveillance Capabilities
5) Final
Target
Selection
Cf.thetestimonyofanAmericanleftwingradicalwhospecializedinbombings,citedinBruceHoffman,Modern
428
TerroristMindset:Tactics,Targets,andTechnologies,TheCenterfortheStudyofTerrorismandPoliticalViolence,(October
1997),pp.1314.
UCRL-TR-227068 118
The framework can be used by analysts working in both the open and classified realms all that differs
is access to data sources. Examples of sources that whenever possible should be consulted are given
below:
Unclassified:
manifestos, communiqus and other publications produced by the group to communicate to their
perceived constituency;
interviews given by group members;
internal group documents that have become public;
court transcripts (including witness testimony and prosecution evidence);
scholarly work;
news reports;
personal interviews with experts and investigative journalists
Classified:
visual surveillance;
communications intercepts;
prisoner interrogation;
reliable informant reports;
confiscated materials (documents, computer files, etc.)
An integral part of this step is obviously a determination by the analyst of the credibility of sources and
evidence, but this is a separate topic beyond the scope of this paper.
UCRL-TR-227068 119
a) The analysis of each factor begins with a list of the data requirements that need to be met to
complete the analysis of that factor. These requirements are drawn from the master list of
questions discussed in Step 2. Where information is available, it should be included. If all the
requirements are met, analysts can proceed directly to step c) below.
b) Where the required information is unavailable, analysts then proceed to the Factor Influences
List for the current factor, which details all the influences on the current factor that this study has
been able to discern.431 After reading and considering these influences, analysts can combine
these guidelines with the broader data set regarding the group (collected in Step 2) and their
existing knowledge base and produce inferences about the unanswered questions.432
Illustrative example: In considering the resources factor, I need to find information on
the groups level of financial resources. This information is unavailable, so I proceed to
the Factor Influences List: Resources. After reading this list, I note that groups that have
state sponsors usually have relatively high financial resources available. Since I know
from my general research of the group that this group has a state sponsor, I can infer
that their financial resources are considerable.
c) Once an answer or inference has been obtained for as many of the listed questions as possible,
analysts can proceed to the flowchart section of the factor analysis. The flowchart section
supplies guidance for proceeding, depending on the data. For example, the flowchart might
recommend increasing or decreasing A or C, restarting the analysis under different initial
conditions or limiting the target space. The flowcharts have been produced using a combination
of the results in Chapters 2, 3 and 4, and will only be annotated where results are particularly
speculative or counterintuitive.
d) The analyst should record on the worksheet any changes suggested by the analysis of that
factor and move on to the next factor.
429Factorsthathavenodirectinfluenceontargetselectionandarenotinfluencedbyotherfactorsinthemodeldonotneedto
appearinthefactoranalysis(althoughrelevantdatarequirementsrelatingtothesefactorsstillappearintheMasterData
RequirementsListandshouldbeansweredifpossible).Thefactorsthusexcludedare:SecurityEnvironment,Organizational
LifeCycle,andHistoricalEvents.
430Wheretimeforanalysisistruncated,analystsmaywanttoconcentrateonthefactorsforwhichthemostdataisavailable,
althoughthiscanleadtoanunderestimationofvitaldeterminantsofdecisionmakingandshouldbeavoidedwherever
possible.Also,theOperationalObjectivesandTargetSelectionsectionscannotbeexcluded.
431Thesecorrespondwiththeconnectinglinesinthefactordiagram.Hypothesesarenotedinredandareitalicized,giving
analyststhechoicetoincludeordiscardthemfromtheanalysis.Althoughallpossiblefactorrelationshipswereconsidered,
wherenosignificantordirectrelationshipwasidentifiedorhypothesized,thesefactorsareexcludedfromthefactor
influencelistinordertoconservespace.
432Theanalysiscaninfactresembleaninferentialjigsawpuzzle,sinceinferencesarrivedatlateronintheprocesscan
actuallybeusedtoaddresssomeunansweredquestionsassociatedwithfactorsconsideredpreviously.
UCRL-TR-227068 120
Wedonotclaimthatourframeworkleadstoacorrectanswer,oreventoauniqueone.Thefinaldetermination
isverymuchdependentontheanalystsexpertiseanddifferentanalystsmaywellreachdifferingconclusions.
Wefeelthatthisisastrengthratherthanaweaknessofourapproachwedonotseektoreplaceanalysis,which
isbothanartandscience,withformulaicexpressionsbasedonarbitraryquantifications.Manyanalysts
probablyalreadyfollowsimilarframeworkstoDECIDe,albeitusuallyintuitively.Intuitiveanalyses,however,
holdseveralshortcomings.Amongthesearethelackoftransparency(ofteneventotheanalystherself,whomay
processmanyelementsunconsciously),whichcanobstructacceptanceandadoptionoftheanalysisbyother
partiessuchaspolicymakers,andalsotheimperfectinformationprocessingcapabilitiesinherenttoanyhuman
being,whichoftenresultinavarietyofbiases433and,occasionally,glaringanalyticalomissions.Wepresenta
toolherethatencouragesthebasingofanalysisonavailabletheoryandempiricalevidence,434aswellas
transparencyaboutassumptionsandevidence.Italsoenablesthesimultaneousconsiderationofmultiple
influencesonthetargetselectionprocess,somethingthatisquitedifficultusingtraditionalanalytical
approaches.
TerroristsarehardlytheonlyactorspronetotheperceptualdistortionsdescribedinChapter2.
433
AsdiscussedinChapter1,thefollowingschemeisusedtocategorizeevidencetypeswithinintheDECIDeFramework:
434
thefollowingschemeisusedtocharacterizeassertionsderivedfromtheliterature:
1Primaryauthorassertiononly
2Multipleauthorsassertion
3Anecdotalevidence
4Theoreticalevidence(e.g.derivedfromagametheoreticmodelorclinicalstudy)
5LargeNStudy(basedonstatisticaldata)
Thehighestdegreeofevidencepresentineachcaseisannotated.
UCRL-TR-227068 121
Data Requirements:
Is there evidence that the group is planning to attack critical infrastructure in the short
to medium term? This could include a communiqu expressly announcing such
intentions or intelligence (from an informant, intercepted signal etc.) indicating active
planning to attack critical infrastructure.
Has the group attacked or made serious attempts to attack critical infrastructure in
the recent past?
If the answer to either of these questions is affirmative, there is a presumption of intent, and the rest of the
framework becomes unnecessary.
In the majority of cases, however, there will be no direct evidence indicating the intent to attack critical
infrastructure; in fact, one of the difficulties of counterterrorism is that often little is known about a groups
planning beyond they are dangerous and want to hurt us.
Data Requirements:
If data exists for the above questions, proceed to flowchart. Otherwise, derive inferences from Factor Influences
List (following page) and then return to the flowchart.
*ThisboxisderivedfromresultscontainedinChapters2,3and4,andisshowninthecontextofattacksinthe
UnitedStates.
UCRL-TR-227068 125
435BruceHoffman,TheModernTerroristMindset:Tactics,Targets,andTechnologies,TheCenterfortheStudyof
TerrorismandPoliticalViolence,St.AndrewsUniversity,Scotland(October1997),p.12.
436GavinCameron,NuclearTerrorism:AThreatAssessmentforthe21stCentury(NewYork:St.MartinsPress,1999),p.159.
437JohnParachini,ComparingMotivesandOutcomesofMassCasualtyTerrorismInvolvingConventionaland
UnconventionalWeapons,StudiesinConflictandTerrorism,No.24(2001),p.397.
438Cameron,NuclearTerrorism,pp.156157.
439GordonH.McCormick,TerroristDecisionMaking,AnnualReviewsinPoliticalScience6,(2003),p.488.
UCRL-TR-227068 126
Data Requirements:
If data exists for the above questions, proceed to flowchart. Otherwise, derive inferences from Factor Influences
List (following page) and then return to the flowchart.
*Drakestatesthatagroupssizeaffectsitstargetingstrategy.Specificallyhearguesthatlargerorganizations
withmorememberscancarryoutmoreattacks,includingonesagainstlessprominenttargets(andtheyperceive
this).440[EvidenceType:3]Drakealsosuggeststhatorganizationsizecanimpactagroupsknowledgeoftargets.
Specifically,largergroupswillhavethemanpowertocollectmoreinformationaboutpotentialtargets,
enhancingtheirabilitytoselectgoodtargetsthatcanbeeffectivelyattacked.441[EvidenceType:1]
**Hypothesis:Therearebenefitsthatresultfromacentralizedstructure,intermsoforganizationallearningand
exploitationofspecializationopportunities.Acellisolatedfromthemaingroupwillbeunabletoleverageanyofthese
benefitsand,unlessitsmembershavebeenspecificallyselectedfortheirexpertiseorhaveothercapabilitiesindependentof
theparentorganization,itcanbeexpectedtoexperienceadiminutioninoverallcapabilitiesovertime.Thismaybemore
thanoffset,however,bythebenefitsofadiffusestructure,suchastheincreasedabilitytoavoiddetectionbysecurityforces.
440C.J.M.Drake,TerroristsTargetSelection(NewYork:St.MartinsPress,Inc,1998),p.80.
441Ibid.
UCRL-TR-227068 127
442Drake,TerroristsTargetSelection,p.77.
443Ibid.
444JerroldM.Post,KevenG.Ruby,andEricD.Shaw,TheRadicalGroupinContext:AnIntegratedFrameworkforthe
AnalysisofGroupRiskforTerrorism,StudiesinConflictandTerrorism,25(2002),p.8588.
445JoshuaSinai,AnalyticalModelofTerrorismForecasting,InternationalConferenceonPostModernTerrorism,
September2003.
446AndrewSilke,BeatingtheWater:TheTerroristSearchforPower,Control,andAuthority,TerrorismandPoliticalViolence,
12:2(Summer2000),p.77.
447HaraldMuller,Terrorism,proliferation:aEuropeanthreatassessment,InstituteforSecurityStudies,ChaillotPapers#58
(March2003),p.3435.
UCRL-TR-227068 128
448BrianA.Jackson,TechnologyAcquisitionByTerroristGroups:ThreatAssessmentInformedbyLessonsfromPrivate
SectorTechnologyAdoption,StudiesinConflictandTerrorism,24(2001),p.202.
449TroyS.Thomas,Maj.,USAFandWilliamD.Casebeer,Maj.,USAF,ViolentNonStateActors:CounteringDynamic
Systems,StrategicInsights,3:3(March2004),p.12.
UCRL-TR-227068 129
Data Requirements:
Note: Organizational dynamics, while important in many areas of terrorist study, have very little direct impact on
analyzing target selection, and even less impact on the decision between a CI and non-CI target. Organizational
dynamics are, however, extremely relevant in determining the structure of the analysis. If data exists for the
above questions, proceed to flowchart. Otherwise, derive inferences from Factor Influences List (following page)
and return to the flowchart.
UCRL-TR-227068 130
450McCormick,TerroristDecisionMaking,p.491.
451Ibid,p.491.
452Silke,BeatingtheWater,p.77.
UCRL-TR-227068 131
Data Requirements:
Note: The literature neither posited nor implied a direct link between any specific demographic factors and
attacks on critical infrastructure. However, the following hypothesis is offered.
Hypothesis: If a key decision maker has a background or expertise related to any type of critical infrastructure
(for instance, if the leader is a civil engineer), this increases the attractiveness of that critical infrastructure as a
target.
If data exists for the above questions, proceed to flowchart. Otherwise, derive inferences from Factor Influences
List (following page) and return to the flowchart.
UCRL-TR-227068 132
453BruceHoffman,TerroristTargeting:Tactics,Trends,andPotentialities(SantaMonica:RAND,1992),p.5.
UCRL-TR-227068 133
Data Requirements:
If data exists for the above questions, proceed to the general capabilities framework in target selection.
Otherwise, derive inferences to inform the above questions from the Factor Influences List (following page) and
then proceed.
UCRL-TR-227068 134
454Drake,TerroristsTargetSelection,p.7398
455Jackson,TechnologyAcquisitionbyTerroristGroups,p.202
456ThomasandCasebeer,ViolentNonStateActors,p.2.
457Drake,TerroristsTargetSelection,pp.5455.
458Ibid,pp8897.
459BrianJenkins,DefenseAgainstTerrorism,PoliticalScienceQuarterly,101:5(1986),p.778.
460Jackson,TechnologyAcquisitionbyTerroristGroups,p.199.
461Ibid.
462Hoffman,TerroristTargeting,p.16.
463U.S.HouseofRepresentatives,106thCongress,SecondSession,SubcommitteeonNationalSecurity,VeteransAffairs,and
InternationalRelationsoftheCommitteeonGovernmentReform,July26,2000Hearing,CombatingTerrorism:Assessing
Threats,RiskManagementandEstablishingPriorities(Washington,DC:GovernmentPrintingOffice,2000):
http://www.gpo.gov/congress/house,p.27.
464Ibid,p.23.
UCRL-TR-227068 135
465Jackson,TechnologyAcquisitionbyTerroristGroups,p.195.
466However,forterroristswishingtocarryoutmorecomplexoperations,trainingintheuseandconstructionofweaponsis
extremelyuseful,Drake,TerroristsTargetSelection,p.81.[EvidenceType:3]
467Ibid,pp.5455,8797.
UCRL-TR-227068 136
Data Requirements:
If data exists for the above questions, proceed to flowchart. Otherwise, derive inferences from Factor Influences
List (following page) and then return to the flowchart. The flowchart must be approached from each side in turn.
UCRL-TR-227068 137
468Jackson,TechnologyAcquisitionbyTerroristGroups,p.193.
469Ibid,p.200.
470Ibid,p.202
471Drake,TerroristsTargetSelection,p.7980.
472Ibid.
473Jackson,TechnologyAcquisitionbyTerroristGroups,p.193.
474Hoffman,TheModernTerroristMindset,pp.7,14;Drake,TerroristsTargetSelection,pp.8788.
475Hoffman,TerroristTargeting,pp.911.
476Ibid,p.15.
477Ibid,p.11.
UCRL-TR-227068 138
Internal and external motivations to innovate increase the technological resources an organization has at its
disposal.478 [Evidence Type: 1] This increases the technical expertise of an organization, which is part of its
operational capability.
Experience, tacit knowledge, and training of members have an effect on the efficiency and effectiveness of the
groups operational capability.479 [Evidence Type: 3]
State-sponsorship gives terrorist groups access to resources that allows them greater operational
capabilities.480 [Evidence Type: 1]
The logistics network and support systems that an organization sets up for long term as well as short term
(attack specific) operations influence the operational capabilities as well as the resources of the group. This
relationship is fundamental in understanding the transference of resources to operational capability. 481
[Evidence Type: 2,3,4]
478Jackson,TechnologyAcquisitionbyTerroristGroups,pp.185187.
479Hoffman,TheModernTerroristMindset,pp.7,14;Drake,TerroristsTargetSelection,pp.8788.
480Jenkins,DefenseAgainstTerrorism,p.778.
481ThomasandCasebeer,ViolentNonStateActors,p.2;Drake,TerroristsTargetSelection,pp.5455.
482Hoffman,TerroristTargeting,pp.1617.
483Jenkins,DefenseAgainstTerrorism,p.778.
484Jackson,TechnologyAcquisitionbyTerroristGroups,p.199.
485Ibid.
486BruceSchneier,SecretsandLies:DigitalSecurityintheNetworkedWorld(NewYork:WileyPublishing,Inc.,2004),pp.2022.
487HouseofRepresentativesHearing,CombatingTerrorism,p.23.
488Drake,TerroristsTargetSelection,pp.121,123,178.
489BruceHoffman,AlQaeda,TrendsinTerrorismandFuturePotentialities:AnAssessment.StudiesinConflictandTerrorism
26:6(NovemberDecember2003),p.437.
490Hoffman,TheModernTerroristMindset,p.16.
491Jackson,TechnologyAcquisitionbyTerroristGroups,p.184;Hoffman,TheModernTerroristMindset,p.15.
UCRL-TR-227068 139
492Hoffmanstatesthat,[T]erroriststraditionalarsenalofthebombandthegunstillsufficetoexactorwinfrom
governmentstheconcessionsthatterroriststypicallyseek.Hoffman,TerroristTargeting,p.16,whileJacksoncontendsthat
Organizations,whethertheyarelegitimateorunderground,donotinnovateforthesakeofinnovating.Jackson,
TechnologyAcquisitionbyTerroristGroups,p.189.
493Hoffman,TerroristTargeting,p.15.[EvidenceType:3]
494Jackson,TechnologyAcquisitionbyTerroristGroups,p.185.
495Increasingthetechnologicalortacticalsophisticationofanattackmay,forinstance,beusefultobolstergroupmorale,
recruitsupportersandcompetewithrivalgroups.AsJacksonmaintains,groupsthatareunabletotakeadvantageof
opportunitiesmadeavailablebynewtechnologiesriskbeingdisplacedfromtheworldstageandsurpassedbycompetitor
groupsthatcan.Ibid.
496Drake,TerroristsTargetSelection,pp.5455,8797.
UCRL-TR-227068 140
If data exists for the above questions, proceed to the flowchart. Otherwise, derive inferences from Factor
Influences List (following the figures on the next page) and then return to the flowchart. Each segment of the
flowchart should be visited, where possible.
*Groupsupporterscanexertbothadirect(bythreateningtowithdrawactivefinancialandothersupport)and
indirect(byinducingthegrouptoattempttopleaseitsconstituency)influenceontargetselection;ifavalued
supporterwishestoattackCItargets,thegroupmaycomply,allelsebeingequal.Post497[EvidenceType:1]
statesthatwhenregimesororganizationswithknownviolentaimslendsupporttoterroristgroupsthereisa
greaterlikelihoodofaligningwiththegoalsofthesympathizersorsupporters.Cf.alsotheChukakuhacase
studyinChapter3.
**Thehistoryofterrorismislitteredwithexamplesofstatesponsorsutilizingterroristproxiestoadvance
foreignpolicygoals.Inthiscase,thestatesponsor,especiallyifitperceivesstrategicgaininadisputewiththe
targetstate,mayputpressureonthegrouptoinflicttangibleeconomicorotherdamageonthetargetstate.The
effectofthispressuredependsonseveralfactors,primarilythedegreeofdependenceonthestatesponsor.
Thereisofcoursealwaystheriskofdiscovery. Continue
497Post,Ruby,andShaw,TheRadicalGroupinContext,p.84.[EvidenceType1]
UCRL-TR-227068 141
* Stemming from the imitative nature of terrorist attacks, terrorists may be spurred on by the success of a similar attack by
another group. The strength of the increase in attractiveness will depend on several factors, including the degree of success
of the previous attack and whether the group under consideration feels it must compete or outdo the perpetrators of the
earlier attack. There is a widely shared expectation that terrorists will return to targets whose importance (and vulnerability)
has already been demonstrated (Baruch Fischhoff, Roxana M. Gonzalez, Deborah A. Small, Jennifer S. Lerner, Judged
Terror Risk and Proximity to the World Trade Center, Journal of Risk and Uncertainty 26:2/3 (2003), p. 138).
** By drawing attention to critical infrastructure, the media makes this target more attractive to the group. It may also
increase the groups perceived capability by imparting information about the infrastructure that the group perceives as
useful in conducting a successful attack. Drake observes that terrorists are less likely to attack targets that are less known
among the public. (Drake, Terrorists Target Selection, p. 98).
UCRL-TR-227068 142
498ThomasandCasebeer,ViolentNonStateActors,p.2.
UCRL-TR-227068 143
Data Requirements:
What is the level of protection decision makers perceive CI targets in general
(relative to other targets) or particular CI targets of interest, to have?
What does the group perceive the functionality of the target to be and the
consequences they expect from a successful attack against the CI target?*
What is the level of publicity they expect to receive by attacking that particular
target?**
This is a vital element of the analysis. If data exists for the above questions, proceed to further factor analyses.
Otherwise, derive inferences from Factor Influences List (following page) and then move on.
*Theextentofthepolitical,economic,andmilitarycostssufferedbyatargetsocietyorgroupduetothelossor
disruptionofatargetplaysanimportantroleintheterroristselectionoftarget.Suchdamage,termedimpact
lossbyRenfroeandSmith,constitutesanimportantfactorintheselectionoftargets.RenfroeandSmithposit
thatatargetthathasahighimpactlossandahighdegreeofvulnerabilitywillbeanidealchoiceforterrorists.499
Wearguethatthisappliesmoreaccuratelytotheimpactlossandvulnerabilityassociatedwithatargetas
perceivedbytheterroristgroup,whichinmost,butnotall,caseswillreflectthetrueimpactlossand
vulnerability.Targetsthatterroristsperceivetohaveacascadingorknockoneffectthatspreadsfarbeyondthe
siteofattackarethereforepresumedtobeespeciallyattractivetoaterroristgroupseekingdisruptionona
massivescale.
**RenfroeandSmithalsomaintainthatatargetwithahighsymbolicvalueorutilityincreasesitsattractiveness
toaterrorist.500
499NancyARenfroeandJosephL.Smith,Threat/VulnerabilityAssessmentsandRiskAnalysis,WholeBuildingDesignGuide.
Accessedon03/11/2004athttp://www/wbdg/org/design/resprint.php?rp=27,pp.23.
500Ibid.
UCRL-TR-227068 144
Since the characteristics of critical infrastructure are exogenous factors, rarely dependent on anything
the group does DURING the decision process, there are no direct group factors that can influence target
selection. However, the general security environment can affect the critical infrastructure directly, and
of course, several factors influence the terrorist groups perception of these CI characteristics. These
latter factors are dealt with during the target selection phase of the analysis.
Data Requirements:
Do group decision makers have a set timetable for action?
How tolerant are decision makers about risk (in terms of operational success, group
survivability and the welfare of group members)?
This element of the analysis has no direct effect on target selection, but may influence other factors. If data
exists for the above questions, nothing need be done. If not, inferences from the Factor Influences List (following)
can be derived in order to inform other areas of the framework.
UCRL-TR-227068 146
501Post,Ruby,andShaw,TheRadicalGroupinContext,p.98.
502MarisaReddyPynchonandRandyBorum,AssessingThreatsofTargetedGroupViolence:ContributionsfromSocial
Psychology,BehavioralSciencesandtheLaw17,(1999),p.348.[EvidenceType:1]
503SeethediscussionofthePerceptualFilterinChapter2fordetails.
UCRL-TR-227068 147
504Sinaicitesthefollowingexamples:the1993WorldTradeCenterbombingwasprecededbyfivemonthsofpreparations;
theAumShinrikyoattackin1995wasprecededbyattemptsthatlastedforaboutayear;the1995OklahomaCitybombing
plotbegansixmonthsearlier;theColeattackwasreportedlyplannedforeightortenmonthsandthe9/11attackswere
precededbyatwoyearincubationperiod.Conventional,lowimpactattacksarepreparedquickly,generallyinthreetofive
daysorless,sothereisamuchshorterwindowofopportunitytopreemptsuchattacks.[Sinai,AnalyticalModelof
TerrorismForecasting,#75p.3]
505Drake,TerroristsTargetSelection,p.56.
UCRL-TR-227068 148
Data Requirements:
Do any key group decision makers exhibit clear symptoms of psychopathologies
that could lead to perceptual impairment?
Is there evidence that group decision makers habitually exhibit particular cognitive
or affect-based biases? If so, which biases dominate and how do these tend to
manifest?*
* See discussion of the perceptual filter in Chapter 2 for details of possible biases.
Thiselementoftheanalysishasnodirecteffectontargetselection,butcertainlyinfluencesotherfactors,the
extentdependentonthestrengthoftheperceptualimpairment.Ifdataexistsfortheabovequestions,proceedto
theTargetSelectionsection.Ifnot,deriveinferencesfromtheFactorInfluencesList(below)andthenproceedto
TargetSelection.
UCRL-TR-227068 149
PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.348.[EvidenceType:1]
506
Notonlyaresuccessorgenerationssmarterthantheirpredecessors,buttheyalsotendtobemoreruthlessandless
507
idealistic.Forsome,infact,violencebecomesalmostanendinitselfacatharticrelease,aselfsatisfyingblowstruckagainst
thehatedsystemratherthanbeingregardedasthedeliberatemeanstoaspecificpoliticalendembracedbyprevious
generations.Hoffman,TerroristTargeting,p.5.[EvidenceType:3]
UCRL-TR-227068 150
NotesonTable5.1
a) AttackTypes:Forpurposesofthisproject,attacktypesaredividedintofourcategories:thoseattacks
directedtowardsharmingpeople;thosethatthreatentoharmpeople(suchashostagetakings);those
intendedtodestroyinfrastructure(e.g.todestroyapowerplantutterly);andthoseintendedtodisrupt
infrastructure(foralimitedamountoftime).Notethatinfrastructureattacksinthiscasearenot
necessarilyagainstcriticalinfrastructure,butagainstanytypesofinfrastructure.Theattacktypeslisted
ineachcolumnarethosethatcanbeusedtofulfilltheobjectivesinthatcolumn.
b) Thelowhighannotationintheattacktypeportionofthetablereferstothescaleofattack/impactthat
wouldberequiredforeachattacktypeinordertofulfillthatobjectivetype.So,forexample,looking
undertheheadingofOrganizationBuildingthescaleoftheattacktypetoharmpopulationcanrun
fromhightolow,dependingoncircumstances,while,underthePunitivecategory,aninfrastructure
attackwouldneedtohaveahighimpactinordertofulfilltheanobjectivelikerevenge.
c) Publicitycanberegardedasacorollaryoperationalobjectivecategoryitisnotusefulinandofitself
butmaybeanecessaryadjuncttootherpurposes.Rationalesforattackwherepublicityislikelytobe
mostimportantareindicatedbyaP.
d) CategoriesmarkedwithanIindicatethattheyrequireanInstrumentaltargetonly(i.e.asymbolic
elementisnotneeded).Allothercategoriesgenerallyrequireasymbolicelementorsomeothermeans
togainpublicitysuchasattacknoveltyorscale508.Publicityisimportantforallsymbolicattacks.
Manyofthefactorsrelatedtothemotivationtoattackacriticalinfrastructuretargethavealreadybeen
addressedearlierintheanalysis.ThosethathavenotbeenaredealtwithbelowasaspectsofAttractiveness
andTargetSet.
Attractiveness
Oneimportantaspecttoconsiderintermsoftheattractivenessofcriticalinfrastructureasatargetsetisthe
desiredimpactoftheattack;ifthereisanyevidenceindicatingthescaleorimpactthattheparticulargroup
intends,thiscanaffecttheattractivenessofaCItarget.
Isthereevidencetosuggestthatthegroupwillspecificallyseektoperpetrateahighimpactattack?
IftheanswerisNO,andalowimpactattackissufficienttofulfillgroupgoals,thenanattackdirectedtowards
cripplingcriticalinfrastructureinadevelopedcountryliketheUnitedStatesislessnecessaryandthe
attractivenessofahighimpactcriticalinfrastructuretargetdecreases,509i.e.,[A].
TargetSet
Webeginthetargetsetlimitationexerciseattheoperationalobjectivesstage,insteadofbeginningbylookingat
ideologyexplicitly,duetotheobservationmadebyDrake510thatonoccasionterroristgroupshavebeenknown
tostepoutsidetheboundariesoftheirideologicalconstraintsifthestrategicbenefitsofanattackoutweighthe
boundariessetbyideology.Whilethismayhappenonlyrarely,onecannotthereforesetarigidboundary
conditionattheideologystage;theframeworkhowevertakesintoaccountthestronginfluenceofideology
508Ofcourse,anycategoryCANhaveadesiredsymboliceffect,evenifitisnotnecessary.
509Ofcourse,asmallscaleattackagainstcriticalinfrastructuretargetsoralargescaleattackagainstordinary(noncritical)
infrastructuretargetsisstillfeasible,butthetime,risk,andresourcesassociatedwithanattackdesignedtohaveahigh
impactoncriticalinfrastructurecanbeexpectedtomakesuchanattacklessappealing.
510Drake,TerroristsTargetSelection,p.181.
UCRL-TR-227068 152
implicitlythroughthefactorinfluencesonoperationalobjectivesandexplicitlythroughtheattractiveness
indicator,whereideologicalfactorshaveasignificant(althoughnotdeterminative)influence.
Thefollowingprocedurebuildsonpreviousanalysis,withtheexpresspurposeofverifyingthatCIattacksare
notexcludedorprescribed.
1. Answerthefollowingquestionsusingyouranswers(bothinferredorknown)tothequestionsintheMaster
DataRequirementsList,orbyfurtherinferencefromtheFactorInfluenceList(seepageafternext):
General:
a) Isthereanyevidenceofaspecificdominantoutcomeobjective511[foundinthesecondsectionofTable5.1]?
Ifso,notethisoutcomeobjective.
b) Ifthereisinsufficientevidenceofaspecificdesiredoutcome,isthereanyevidencethatthegroupis
currentlyseekingaspecifictypeofobjective(orsetofobjectivetypes)?[i.e.isthegroupprimarilyoriented
towardsapunitive,coercive,organizationbuilding,orenemycapabilitydiminishingtypeofattack?]
Ifso,notetheobjectivetypeorsetofobjectivetypes.
Hypothesis:allelsebeingequal,attackswithprimarilypunitiveobjectives,wherethedegreeofenmityisgreat,are
generallylesslikelytobeagainstcriticalinfrastructurealone(i.e.withoutsubstantialcasualtiesinvolved).
Casualties:
Arehighcasualtylevelsdesired?
Ifso,thenacriticalinfrastructureattackisstillpossible,butanycriticalinfrastructuretargetmustincludelarge
numbersofpotentialhumanvictims.
Arehighcasualtylevelstolerated512?[Remembertoalsotakeintoaccountthetoleranceofgroupsupportersand
itsperceivedconstituency,whichmostgroupswillpayattentionto.]
IftheanswerisNO,thenthetargetsetissubstantiallylimited.
MitigatingFactors:
Isthegroupdependentuponordoesitperceivebenefitsfromcertaintypesofcriticalinfrastructureinitstarget
area513?
Ifso,thenthoseparticulartypesofcriticalinfrastructurewilllikelybeexcludedfromthetargetset.
ImpactType:
Isthereanyevidencethatthegroupspecificallywantstocauseeconomicdamagetoitsenemies?
Ifso,thefeasibletargetsetisfurtherlimited,andtherestrictedsetdoesincludecriticalinfrastructuretargets.
511Thisassumes,sincetheanalysthasproceededpastStep1oftheframework,thattheanalystdoesnotknowthatthegroup
specificallyintendstoattackcriticalinfrastructure.
512Althoughthisquestionhasalreadybeenconsideredpreviously,theearliercontextwasanexclusionofcasualtiesdueto
ideology;theremaybeseveralnonideologicalreasons,includingnotwantingtoalienatesupporters,whygroupsmayfind
highcasualtiesintolerable.
513Forinstance,ifthegroupishighlydependentforitscommunicationsontheInternet,andtherearenospecificreasonsfor
disruptingtheInternetandothertargetsareplentiful,thegroupwouldtendtoexcludetheInternetfromitstarget
considerations.
UCRL-TR-227068 153
Publicity:
Whatscaleofpublicitydoesthegroupneedordesire(e.g.,local;national;global)?[Table5.1indicateswhere
publicityismostimportant.]
Ifthegroupneedsorseeksalargeamountofpublicity,aretherecriticalinfrastructuretargetsthatgroup
decisionmakerscouldperceiveasgeneratinganespeciallyhighdegreeofpublicity?
IfYES,thismeansthatcriticalinfrastructureisintherestrictedtargetset.Anattacktrulyintendedtocripple
criticalinfrastructureisautomaticallyaterroristspectacular.
2. Bearinginmindtheprogressiverestrictionoftargetspaceprocess(seeFigure5.2),useTable5.1andyour
answerstotheabovequestionstolimittherangeofoperationalobjectivesandtherebythetargetset.Evenif
infrastructure(asshowninthetable)remainswithinthetargetset,onestillneedstotakeintoaccountthe
desiredSCALEoftheattack,sincecriticalinfrastructureattacksarebydefinitionhighimpactattacks.This
process,togetherwiththeinformationcollectedandanalyzedduringtheindividualfactoranalysesshould
verifywhetherornotcriticalinfrastructuretargetsremaininthetargetsetand,insomecases,informthe
analystwhetherornotcriticalinfrastructureistheonlyelementleftinthelikelytargetset.
Examples:
a) Agroupwantingtopunitivelyeliminatethepopulationofitsenemyisunlikelytotargetcritical
infrastructureaboveamasscasualtytargetsuchasbombingamusicconcert514.
b) Agroupwiththedesiretoshowtheiropponentasimpotentandvulnerable,seekingahighimpact
attack,butwhosesupportersareintolerantofcasualties,isleftwithfewtargetoptionsinthe
restrictedtargetspacebesidesacriticalinfrastructuretarget.
514Attacksoncertaincriticalinfrastructuretargetscouldresultinmasscasualties(forinstancechemicalplants),althoughthe
motivationherewouldnotbeanattackontheinfrastructureitself(todisableordisruptitsfunctioning)asmuchasusingthe
plantasameansofcausingmasscasualties.
UCRL-TR-227068 154
515Drake,TerroristsTargetSelection,p.36.
516Ibid,pp.178,181.Drakepositsthatitmightbethecasethattheterroristsconcernedcouldgainstrategicbenefitsby
attackingatargetwhichisnotseenasbeingalegitimatetarget.Fortheterroriststhemselvesthismayormaynotrepresenta
dilemma.Someterroristsmaydecidethatattackscannotbemadeagainsttargetswhichdonotbearsomeformofguiltin
termsoftheideologyoftheterroristgroupconcerned,whilstothersmayfeelthattheveryfactthatattackingaparticular
targetfulfillsastrategicobjectivemakesitalegitimatetarget.p.178.
517Parachini,ComparingMotivesandOutcomesofMassCasualtyTerrorism,p.403.
518Drake,TerroristsTargetSelection,p.181.
519McCormick,TerroristDecisionMaking,p.480.
520Drake,TerroristsTargetSelection,p.35.
521Ibid,p.37.
522Post,Ruby,andShaw,TheRadicalGroupinContext,p.85.
UCRL-TR-227068 155
violent or impetuous members of a group, can force the leadership to endorse such actions retrospectively for
fear of losing the groups internal cohesion or even splitting the organization. 523 [Evidence Type: 1].
Hypothesis: in groups where FACTIONALIZATION occurs or is imminent, a challenger faction may push for
greater scale or more extreme desired effects than otherwise as part of a power play. Also, a status quo
faction may feel the need to increase the scale or effects of an attack in order to bolster their position within the
group and undermine challengers.
523Drake,TerroristsTargetSelection,p.171
524Strategyistakentobetheplanbywhichaterroristgroupseekstodeployanduseitsresourceswiththeaimofachieving
itspoliticalobjectives,Ibid,p.35.[EvidenceType:2]
525Jenkins,DefenseAgainstTerrorism,p.776.
526Hoffman,TheModernTerroristMindset,p.13
527Ibid.
528Ibid,p.4.
529Sinai,AnalyticalModelofTerrorismForecasting,p.2.
530Jackson,TechnologyAcquisitionbyTerroristGroups,p.185.
UCRL-TR-227068 156
531MichaelCorcoranandJamesS.Cawood.ViolenceAssessmentandIntervention:ThePractitionersHandbook(BocaRaton:CRC
Press,2003).
532RobertA.Fein,Ph.D;BryanVossekuil;andGwenA.Holden,ThreatAssessment:AnApproachtoPreventTargeted
Violence,NIJResearchInAction(September1995),pp.34.
533Theideaofthecalculusbehindthe911attacksservingasamodelforfutureterrorismisnotfarfetched,iftheoperation
wasandcontinuestobedeemedsuccessfulbygroupandindividualsalreadyinvolvedinorponderingpoliticalviolence.
BrigitteL.Nacos,TheTerroristCalculusbehind911:AModelforFutureTerrorism;StudiesinConflictandTerrorism26
(2003),p.2.[EvidenceType:1]
534Themoreoftenanattackmodehasbeenused,themorelikelyitistobereusedinanotherterroristoperation.Gordon
Woo,TheevolutionofTerrorismRiskModeling,TheJournalofReinsurance(April22,2003)p.6.[EvidenceType:1]
535[T]erroristsconsciouslylearnfromoneanotherHoffman,TheModernTerroristMindset,p.7.[EvidenceType:3]
536Avoidstrength,andattackweaknessasymmetricwarfareForAlQaeda,thismaybeexpressedinthesuccinct
languageofphysicalscienceas:followthepathofleastresistanceadaptivelearning.AlQaedaiseagertolearnfrompast
terroristexperiencethesuccessesandfailuresofattacksperpetratedbyitsownnetwork,andbyotherterroristsaroundthe
world.AlQaedawouldtendtocopycatmethodswhicheitherhaveproventobesuccessful,orareperceivedtohavethe
potentialtobesuccessful.Ifanattackmodehasdemonstratedeffectiveness,orhasthepromiseofbeingeffective,itislikely
tobeanattackoption.GordonWoo,UnderstandingTerrorismRisk,RiskManagementSolutions,http://www.
rms.com/Publications/UnderstandTerRisk_Woo_RiskReport04.pdf,p.7.[EvidenceType:1]
537AgentsoverestimatetheirskillsowingtoattributionbiasIndividualsascribetheirpastfailingstorandomevents,but
theirsuccessestotheirskills.Theconsequenceisthattheirprojectionofthespaceofeventualitieswillberosyandtheywill
underestimatetheincidenceofpossiblesetbacksPeopleareunawareoftheirowntrackrecordanddonotlearnthattheir
pastprojectionsweretoooptimisticandcorrectforit.NassimNicholasTaleb,TheBlackSwan:WhyDontWeLeanthat
WeDontLearn?draftofpaperpreparedforHighlandForum#23,January2004,pp.2527.
[EvidenceType:1]
538TheHouseofRepresentativesHearing,CombatingTerrorism,p.23.
UCRL-TR-227068 157
Trigger Events:
o Post describes trigger events as events that lead a group to believe that the only course of
action involves violence. An example of a triggering event is when group members or leaders
are harmed by a regime or other opponent.539 [Evidence Type:0 2]
o Hypothesis: the nature of the trigger event can lead to specific operational objectives, for
example, the desire to regain legitimacy by causing casualties, or an increase in the desired
scale of an attack.
539Post,Ruby,andShaw,TheRadicalGroupinContext,p.98.
540Hoffman,AlQaeda,TrendsinTerrorismandFuturePotentialities,p.437.
541PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.348
542Drake,TerroristsTargetSelection,p.35.[EvidenceType:1]
543Thesetofalloptimaloperatingpointsoveragiventimeperioddefinesitstacticalpath.Aterroristgroup,bydefinition,
cannotimproveitsperformanceaslongasitcanidentifyandstayonitstacticalpath.Anyefforttoimproveitspolitical
positionbyincreasingitsoperatingprofile,atthispoint,willbemorethanoffsetbyalossinsecurity.McCormick,
TerroristDecisionMaking,p.497.[EvidenceType:4]
544Postmaintainsthat,ifagroupfeelsthatitwillbeindangerinthenearfuture,itmaybemorelikelytoengagein
terrorismduetoadecreaseintherangeofperceivedoptions.Agroupmaybemorelikelytoattackifitperceivesathreatto
groupmembersorleaders,feelsthattheregimeorotheropponentistryingtodestroyit,orbecomesparanoidanddefensive
andattackssuspectedtraitors.Post,Ruby,andShaw,TheRadicalGroupinContext,pp.9495.[EvidenceType:2]
545PynchonandBorum,AssessingThreatsofTargetedGroupViolence,p.348.[EvidenceType:1]
UCRL-TR-227068 158
Risk Tolerance
o Hypothesis: The degree of risk that a group is willing to take to conduct any single attack is an
important factor in the setting of operational objectives. All else being equal, the greater the risk
tolerance of a group when planning an attack, the greater the scale of the attack is likely to be. A
corollary to this is that the more wedded the group is to the success of an attack and group
preservation (i.e., the lower its risk tolerance), the more conservative its operational objectives
become. Risk tolerance is a function of the groups ideology and the external environment,
among other variables.
546ArpadPalfy,WeaponsSystemSelectionandMassCasualtyOutcomes,TerrorismandPoliticalViolence,15:2(Summer
2003),pp.8788.
547Thornton(1964),forexample,suggestedthatactionsdesignedtoacceleratemobilizationtendtodiminishoncethis
processisunderwayandthecorrelationofforceshasbeguntoshiftinfavoroftherebels.Agitationalterror,hesuggested,
isparticularlyattractive(forthereasonswehavejustdiscussed)duringtheinitialperiodoftheconflict,whentheopposition
istryingtoestablishitsbonafidesIfallgoesaccordingtoplan,theimportanceofthesetacticscanbeexpectedtodeclineas
theconflicttakesonthecharacteristicsofaforceonforcecompetitionbetweenthestateandanincreasinglyregularized
opposition.McCormick,TerroristDecisionMaking,p.485.Isitenoughtoarguethatterroristgroupsmaynotalways
makethebestchoicesbutthattheyatleastattempttodoso?Theanswertothesequestionsistypicallyno.Ifalldoesnot
goaccordingtoplan,whichistypicallythecase,thegroupinquestionmayneversucceedinevolvingbeyonditsuseof
agitationalterrorismIbid.[EvidenceType:1]
548Notonlyaresuccessorgenerationssmarterthantheirpredecessors,buttheyalsotendtobemoreruthlessandless
idealistic.Forsome,infact,violencebecomesalmostanendinitselfacatharticrelease,aselfsatisfyingblowstruckagainst
thehatedsystemratherthanbeingregardedasthedeliberatemeanstoaspecificpoliticalendembracedbyprevious
generations.Hoffman,TerroristTargeting,p.5.[EvidenceType:3]
549Seediscussionoftheperceptualfilter.
UCRL-TR-227068 159
Capabilities Analysis550
Thepreviouslookatoperationalobjectivesprovidedtheinitiallimitationofthetargetset.Thefollowing
capabilitiesthresholdanalysisdetermineswhetherthegrouppossessesorcanobtainaccesstotheresources
andoperationalcapabilitiesrequiredtosuccessfullyperpetrateamajorattackagainstcriticalinfrastructure(as
wellasothertypesofattacks).Itmustbeemphasized,however,thatatthisstageofthetargetselectionprocess,
theterroristgrouphasnotyetnarroweditsfocustoanyparticulartarget,551andsowillevaluatetheir
capabilitiesinageneralsense.Inotherwords,atthisstageintheprocesstheywillbeaskingthemselvesDowe
havethecapabilitytoevenconsiderattackingtargettypeX?ratherthanevaluatingtheircapabilitytoattacka
specificsiteorfacility.
Thisstageoftheanalysisisparticularlydemandingfortworeasons:
1) Thereisnosinglesetofcapabilitiesrequiredtoattackcriticalinfrastructure;indeed,theoperationalcapabilitiesand
resourcesneededtoinflictseriousdamagemaydiffersignificantlyfromonetypeofinfrastructuretothenext(andof
coursefromonespecifictargettothenext),makinganygeneralizationdifficult.
Thisisdealtwithbylisting(totheextentpossible)theminimumrequirementsforeachspecificinfrastructure
type,basedonthehistoricalrecord552.Iftheotherareasoftheanalysishavegivenanyindicationofaparticular
typeofinfrastructurethatthegroupmaybedrawntowards(forexample,ifthegroupleaderhasabackground
inaviation)orifonlycertaintypesofinfrastructureareavailableinthegroupsareaofoperation,the
capabilitiesassessmentcanbelimitedtothesespecificinfrastructuretypes.SeeTable5.2onthepageafternext
andtheaccompanyingexplanationofvariablesforalistingoftherequiredcapabilitylevelsneededhistorically
toachieveahighimpact.
Sinceoneoftheprimarydeterminantsofrequiredresourcesisthelevelofprotectionoftheinfrastructure,the
tableliststheresultsforbothhighandlowlevelsofprotection.Inmanycases,therearenorecordsofattacks
againstsiteswithacertainlevelofprotection:theseareexcluded.Inothercases,therewerenohighimpact
attacksrecorded,andthereforetherequirementsforlowimpactattackshavebeensubstituted(andindicatedin
thetablebyitalics).
If,however,thereisnoindicationthatanyparticularinfrastructureismorevulnerableormoreattractivetothe
groupunderconsideration,thenthemostthatcanbedoneistocomparethegroupscapabilitiesagainstthe
lowestcommondenominator553ofallCItargettypes,whichsetsabaselineforrequiredlevelsofcapabilities
andresources.ThisisindicatedinTable5.2underthecategoryGENERAL.Ofcourse,ifoneisevaluatinga
specifictarget,oneshouldusethedataforthatparticulartarget,whichcanbedeterminedfromavulnerability
study.
550Inthissectioncapabilitiesreferstobothresourcesandoperationalcapabilities.
551Thisoccursatalaterstageoftheprocess,andisnotthefocusoftheframework,whichistoassesstheintentofterroriststo
attackgeneralcriticalinfrastructuretargets,andifpossiblethetypeofinfrastructureselected,butnotthespecifictargetitself.
552TheprojectteamlookedatallhighimpactcasesinCrITICineachinfrastructurecategory,notedorestimatedtherequired
levelsofcapabilitiesandresourcesused,andaveragedthese.Thecompletelistofcaseanalysesisavailablefromtheauthors.
553SincetherequiredoperationalcapabilitiesandresourcesforattackingtheOil/Gasinfrastructureareuniformlylow,this
wasexcludedinordernottobiastheresults(withthecaveatthatiftheOilorGasinfrastructureisapotentialtarget,special
attentionneedstobegiventothisarea).
UCRL-TR-227068 160
2) Analystsdonotonlyhavetoconsiderwhetherthegroupcouldactuallyattackcriticalinfrastructure(althoughthisis
asignificantpartofthelargerthreatassessment),butratherwhetherornotthegroupitselfperceivesthattheyhave
thiscapability.Evenwhereagroupdoespossesstherequisitecapability,ifitdoesnotperceivethistobethecase,it
willrefrainfromattacking.Ontheotherhand,evenunsuccessfulattacksbygroupswhobelievedthemselvescapable
havesometimesproventohavedeleteriousconsequences.
Thiscomplicationissomewhatmoredifficulttoaddressinthatitdealswiththeeffectofgroupperceptions,
which(asmentionedpreviously)isanextremelydifficultelementtoassess.Wefeelthatthebestwaytodeal
withthisgivencurrenttoolsistoassume,atleastinthisaspectofdecisionmaking,thatanymoderately
competentterroristgroupwillbeabletoevaluateitscapabilitiesmoreorlessaccurately,andthatanygroup
consideringalargescaleattackwilldoenoughhomeworktohaveatleastsomeideaofthecapabilitylevels
requiredtoattackvarioustargets.Thosegroupswhoseevaluationisconsistentlyoffthemarkwillprobablynot
remainviableforlong.Thatbeingsaid,theanalystshouldusewhateverinformationshehasaboutthegroups
perceptualbiasesinordertoattempttodeterminehowfarandinwhatdirectionthegroupsperceptionoftheir
owncapabilitiesandthoserequiredtoperpetrateanattackcanbeexpectedtodifferfrommoreobjective
evaluationsofthesemeasures.
Oncetherequiredcapabilitieshavebeendetermined,thefollowingflowchartcanbeconsultedusingTable5.2
togetherwithallinformationcollectedorinferredthusfar.Tosavespace,thephraseinthegroupsperception
hasbeenomitted,butappliestotheentirechart554.
Thechartreflectsthenotionthatonceterroristshavedeterminedtheirgeneraloperationalobjectives,orperhapsoncethey
554
havedecidedthatacertaintargetorclassoftargetsisattractive,theymayfindthattheylacktherequisiteresourcesto
engageinthetypeofattackthatwouldgivethemtheeffectstheyseek.Thiscan,undercertaincircumstances,promptthe
grouptobuilduptheirresourcestothelevelsandtypesrequiredtoperpetratethedesiredtypeofattack.Theextraresources
canbeachievedthrough,interalia,purchase,theft,indigenousdevelopmentortransferfromanexternalsupporter.The
circumstancesunderwhichthiswillapplyaregovernedbysuchfactorsasthedecisionmakerstimehorizon,their
ideologicaloridiosyncraticattractiontoaparticulartarget,orthelackofalternativetargetsyieldingthesamelevelof
perceivedgains(aselucidatedinotherpartsofthemodel).
UCRL-TR-227068 161
Table 5.2 Capability Requirements for Attacking Specific CI
Infrastructure Type Protection Physical Weapons Financial Logistical Ability to Technology Skill set (esp. Familiarity Communications
Resources Resources Resources innovate level military-type with Target
Level
skills) Environment
Aviation Infrastructure High High Medium Low Medium Medium Medium High High Medium
Low Medium Medium Low Medium Low Medium Medium Medium Unknown
Chemical Plant Low Medium Low-Medium Low Medium Medium Medium Medium High Medium
Communication Infrastructure Low Low Low-Medium Low Low High High Medium High Unknown
Dams and Waterways Low Medium Unknown Low Unknown Unknown Medium Medium High Unknown
Embassies/Consulates Low Low Medium Low High High Medium High Medium High
Financial Institutions High Medium Medium Low Medium Medium Medium Medium High Medium
Low-
Low Medium Medium Low Medium Medium Medium Medium High Medium
Police Stations (low impact
only) High Medium Medium Low Unknown Unknown Medium Medium Unknown Medium
Oil/Gas Infrastructure Low Low Low Low Low Low Low Low High Low
Power Infrastructure Low Medium Medium Low Medium Medium Medium Medium Medium-High Medium
Public Service/ Government High Medium Medium Low Medium Medium Medium Medium High Medium
Office
Low Medium Low-Medium Low Medium Medium Medium Medium-High Medium-High Unknown
Military Bases High High Medium High Medium Medium Medium Medium High Medium
Railways/Railroads/Rail lines Low Medium Low-Medium Low Medium Medium Medium Medium High Medium
Roadways (low impact only) Low Medium Unknown Low Unknown Unknown Medium Unknown Medium Unknown
Subways Low Medium Medium-High Low-High Medium-High Medium-High Medium-High High High Medium
Train/Bus Stations Low Medium Medium Medium Medium Medium Medium High High Medium
Water Treatment/ Storage
Facility (low impact only) Low Low Low Low Unknown Unknown Low Unknown Unknown Unknown
HIGH MEDIUM MEDIUM LOW MEDIUM MEDIUM MEDIUM MEDIUM HIGH MEDIUM
GENERAL
LOW LOW LOW-MEDIUM LOW LOW LOW MEDIUM MEDIUM MEDIUM MEDIUM
Physical Resources (equipment, vehicles, etc.): Medium: Competent at adopting new technologies and techniques, although not a particular
High: Plentiful vehicles, sophisticated equipment strength
Medium: Standard equipment, some vehicles Low: Difficulty adopting new technologies or techniques
Low: Basic, minimal equipment Technology level:
Weapons: High: High technical skill; aware of and capable of using newest technologies
High: Sophisticated conventional explosives, WMD Medium: Standard technological level commercial off-the-shelf technologies
Medium: Large-scale simple conventional explosives Low: Only rudimentary equipment and techniques low-tech only
Low: Small-scale IEDs, guns, mortars, grenades Skill set (esp. military-type skills):
Financial Resources: High: Highly trained members with diverse relevant skills (e.g. explosives production, electronics)
High: >$50,000 available to carry out any attack. Medium: Some paramilitary type training, basic tradecraft
Medium: $10,000 $50,000 available to carry out single attack Low: Amateurish, little to no formal training
Low: <$10,000 available to carry out attack Familiarity with Target Environment:
Logistical Resources (safehouses; fake passports etc.): High: Intimately familiar with target environment, can blend in easily
High: Vast: Competent logistical network with high redundancy Medium: Some familiarity with target environment, but not perfect
Medium: Some safehouses and logistical competence Low: Unfamiliar with target environment easily noticeable
Low: Minimal support network; difficulty coordinating anything other than basic attack Communications:
Ability to innovate: High: Robust and extensive communications networks
High: Easily embraces new technologies and techniques; quickly gains tacit knowledge Medium: Workmanlike communications capabilities but no redundancy
Low: only primitive, limited-channel communications possible
UCRL-TR-227068
* This is determined by comparing the relevant row (either a specific infrastructure or General) in Table 5.2
with the known resources and capabilities of the group (collected from intelligence or inferred previously in
the framework)
Theaboveanalysisshouldenabletheanalysttoprovideatleastaninitialassessmentofthe
groupsperceivedcapabilitiesvisvisalargescaleattackoncriticalinfrastructure.
Inordertoconfirmthisanalysis,orincaseswhereinformationisjusttoosparsetoutilizethe
abovetools,theanalystshouldnowrevisittheirearlieranalysisandcollectalltheC(capability)
indicatorsyieldedbythefactoranalysisprocess.Thesearemuchmoregeneralthantheabove
analysisandcapturefactorsthatareexpectedtoincreaseordecreasetheterroristsperceived
capabilitiestoattackcriticalinfrastructure.TheCindicatorscanbeamalgamated(bytheprocess
describedbelow)toyieldpreliminaryindicationsofperceivedcapabilitiesderivedfroman
alternativeavenueofanalysisandcaneitherconfirmtheaboveperceivedcapabilitiesthreshold,
argueforanalystreevaluation(ifitcontradictstheaboveresults),orprovideanalternative
explanatorymechanismifthereisinsufficientdatatoconducttheaboveanalysis.
163
TheSpecialCaseofInsiders
Insiderscandramaticallyaltertheoperationoftheabovesectionoftheframework.Therearetwo
caseswhereaninsiderisused:
a) Oncethetargethasbeenselected,thegroupinsertsaninsiderintothetargetfacilityin
thiscase,theuseofaninsiderformspartoftheattackmodalities(roughlythetactics
used)anddoesnotaffecttheaboveperceivedcapabilityanalysisportionofthe
motivationassessment.Insidersinthiscasefalloutsidethisframework.
b) Beforethetargethasbeenchosen,thegroupalreadyhasaninsiderinafacility,or
expectstobeabletoreliablyinsertoneinthiscase,theavailabilityofaninsidercan
havealargeimpactontargetselection,tosomeextentobviatingtheabovementioned
capabilityandresourcerequirementsandmakingitespeciallylikelythatthegroupwill
selectthattargetoveronewheregainingaccessismoredifficult.AsSchneierremarks,
Insidersmightbelesslikelytoattackasystemthanoutsidersare,butsystemsarefar
morevulnerabletothem.Aninsiderknowshowthesystemsworkandwheretheweak
pointsare.Heknowstheorganizationalstructure,andhowanyinvestigationagainsthis
actionswouldbeconducted.Hemayalreadybetrustedbythesystemheisgoingto
attack.Aninsidercanusethesystemsownresourcesagainstitself.Inextremecasesthe
insidermighthaveconsiderableexpertise,especiallyifhewasinvolvedinthedesignof
thesystemsheinnowattacking.555
Ourframeworkdividesthetargetselectionprocessintothethreestages556:
1) PreliminaryTargetSelection:Theterroristschooseatypeoftarget(orperhapsaspecific
target)thattheywouldliketoattack(basedonallthefactorsdiscussedthusfarandtheir
generalperceivedcapabilities).Inprinciple,theterroristsperceivethemembersofthis
targetset557asequallyattractiveatthispoint,andtheyconsiderthemselvescapableof
attackinganyoneofthem.Itisatthisstage,forexample,thattheterroristsmightdecide
toattackanoilrefinery,orabankinacitycenter,oracrowdedmarketplace.
555Schneier,SecretsandLies,p.48.
556Anecdotally,thesestagesaredescribedbyanunidentifiedAmericanleftwingradicalwhodescribesthe
processasfollows:Thefirstdecision,hesaidispoliticaldeterminingappropriateandpossible
targets.Onceasetoftargetsisdecidedon,theymustbereconnoiteredandinformationgatheredonhowto
approachthetargets,howtoplacethebomb,howthesecurityoftheindividualsandtheexplosivesistobe
protected.Thenthetimeischosenandaspecifictarget.
557Inmanycases,thetargetsetmaycontainonlyasinglemember.Hoffman,TheModernTerrorist
Mindset:Tactics,Targets,andtechnologies,p.13.
164
2) SurveillanceandIntelligenceGathering:Theterroristsproceedtoactivelybeginto
gatherintelligenceonaspecifictargetorsetoftargetsthatfallwithintheirdesiredtarget
andattacktype.
3) FinalTargetSelection:Aftercollectingonthegrounddataaboutthetargetsofinterest,
suchasspecificsecurityarrangementssurroundingthetargetoraccessroutestoand
fromthetarget,theterroristsselectorconfirmthesingletargetthatoffersthemthe
greatestchanceofsuccess.Ifthetargetsreconnoiteredinstage2areallunsuitable
becauseoftacticallevelconstraints,theterroristsmustbegintheirdecisionprocessagain
(oratleastseveralfactorsoftheprocess)inordertoselectanalternativetarget.558
Sincethesurveillanceandfinaltargetselectionstagesdependonavarietyoftacticallevel
observablesandcriteriathatarealmostwhollydependentonspecifictargetsitecharacteristics,
theydonotlendthemselvestoageneralmotivationalanalysissuchasthistoanyappreciable
degree.Thesurveillanceandfinaltargetselectionstagesinvolveawholenewsetoffactorsand
indicatorsthatmovebeyondthecurrentframework.Thecurrentanalysiswillthereforeconclude
atthepreliminarytargetselectionstage,whichwefeelstillyieldsasignificantoperational
advanceoverpreviousattemptstoelucidatetargetingdecisions.
AtthisfinalstageofthejourneythroughtheDECIDeframework,theanalystmustconsider
carefullythenexusbetweentheterroristgroupsoperationalobjectives,theirperceived
capabilities559andtheattractivenesstokeydecisionmakersofattackingacriticalinfrastructure
target.
Thesemustallbeconsideredrelativetothecharacteristicsofcriticalinfrastructuretargets.In
realitythereisnosimplerelationshiphere.560Forinstance,inthecaseoftheinfluenceoftarget
characteristicssuchaslevelofprotection,targetsthataregenerallyperceivedtobemore
vulnerableandhaveahigherimpactlossarelikelytobemoreattractivetoterroristgroups,all
elsebeingequal.However,allelseisnotalwaysequal.Agroupseekingthesimplestwaytogain
attentionfortheircausemaybedeterredbythelevelofprotectionsurroundinganuclearpower
plant.However,anothergroupthathashightechnicalcapabilityandresources,highrisk
toleranceandisincompetitionwitharivalgroupforsupporters,mayparticularlyseekoutsuch
wellprotectedtargetsasanopportunitytodemonstrateitsstrengthandcapabilitiestopotential
recruits(orperhapsjustitscommitmentandcourage,inwhichcasethesuccessoftheattackin
termsofphysicaldisruptionordestructionbecomeslesscrucial).
Inthiscase,analystsshouldcompareandweighthecharacteristicsofthetarget(orclassof
targets)withbothoperationalobjectivesandgeneralcapabilitiesandthenconsiderthe
attractivenessofacriticalinfrastructuretargetinrelationtothesefactors.
558Theirdecisionmakingwouldnownecessarilyincludearevisedestimateoftheircapabilitiestoattack
certaintargets,followingtheirinabilitytoattackanyoftheirpreferredtargetsfromthepreliminarytarget
selectionstage.
559Itmustberemembered,however,thatevenifagroupknowsitlacksthecapabilitytocarryouta
successfulattack,forcertainobjectives,evenanunsuccessfulattackmaysuffice.Forexample,aleader
whosemembersarebecomingrestlessmay,fororganizationbuildingpurposes,plananattacksimplyfor
thepurposeofgivingthemsomethingtodo.Itcanbeassumedthatattacksbasedsolelyonthese
considerationswouldbefairlyrare.
560SeeChapter2foradetaileddiscussionoftheeffectoftargetcharacteristicsontargetselection.
165
Thefollowingstepselucidatethisprocessandutilizebothanalyticalmechanismsfoundinthe
framework:
1) Evaluatetherestrictedtargetsetdeterminedduringthepreviousstageintheanalysis
(reflectingbothoperationalobjectivesandperceivedcapabilities).Areanycritical
infrastructuretargetsstillwithinthistruncatedset?Ifnot,thechancesofthegroup
selectingacriticalinfrastructuretargetareextremelyslim.
2) Assumingcriticalinfrastructuretargetsarestillwithintherestrictedtargetset,arethere
anyfactorsthatmakeattackingacriticalinfrastructuretargetespeciallyattractive?This
canbeansweredbycollectingupalltheA(attractiveness)indicatorsyieldedduringthe
factoranalysisprocess.Onemaybetemptedheretouseasimplearithmeticapproach,to
listalltheplusesandminuses,determinewhichcanceleachotheroutandarriveata
simplemathematicalsolution.Thisisnotatalltheintendedapproachofthisframework.
Rather,analystsareurgedtolookateachAindicator,understandtheconditionsin
whichitarose,i.e.whichparticularfactorledtoitsvalueandunderwhatcircumstances
andtowhatextentthatfactorholds,andthereaftertoevaluatethecollectionoffactorsin
thecontextofalltheknowngroupinformation.Also,theattractivenessvaluesneedtobe
considered,notinisolation,butrelativetotheattractivenessofothertargetandattack
types561.Carefulandthoroughconsiderationoftheattractivenessindicatorscanleadto
conclusionsaboutwhethercriticalinfrastructuretargetswouldbemoreattractiveto
terroristdecisionmakersthanothertargetsataparticularpointintime.
3) Thefinalelementoftheanalysisisfortheanalysttoassesswhetheranyinfluencesnot
alreadytakenintoaccountcouldmodifytheconclusionsreachedinthepreviousstep.
Thesecouldincludespecificgroupdynamicsorperceptualdistortionsthatoccur
specificallyatthetargetselectionstageandthathavenotalreadybeenaccountedforat
otherstagesoftheanalysis.
Uponcompletionoftheabovesteps,theanalystshouldattheveryleastbeabletoarticulatethe
variousreasonswhyagroupwouldorwouldnotselectacriticalinfrastructuretargetandhow
theyviewthesetargetsinrelationtoothers.Asmentionedpreviously,wearenotassertingthat
terroristdecisionmakersfollowthisframeworkintheirdecisionmakinginfact,manyofthe
interveningfactorsmayoperateunconsciouslyanditisdoubtfulthatthementalprocessesofany
humandecisionmaker,letaloneaterrorist,willexplicitlyresembletheaboveframework.Rather,
theframeworkisanaidtoorganizingandelucidatingthecomplexandintricateprocessinvolved
intargetselection,withspecificapplicationtothequestionofhowlikelytheultimatetargetisto
fallwithinthecategoryofcriticalinfrastructure.
The worksheet provided as Appendix II can be used to aid analysts as they work through
the DECIDe Framework.
MostoftheAfactorsintheframeworkhavebeenconsciouslyconstructedtoimplicitlyassesscritical
561
infrastructurerelativetoothertargetandattacktypes.However,thisaspectshouldstillbeborneinmind
duringthefinalevaluation.
166
Attackmodalitiesaredirectlyrelevanttoansweringthequestionofhowterroristswould
conductanattackoncriticalinfrastructure.Whilethefocusofthisstudyissquarelyonthewhy
asopposedtothehow,andtheDECIDeFrameworkdoesnotdealatallwiththedecisions
takensubsequenttotargetselection,severalnotableobservationsrelatingtoattackmodalities
emergedduringtheresearchforthisstudyandarementionedhereinpassinginthehopeof
stimulatingfurtherresearch.Firstly,thecasestudiesofChukakuhaandtheIndianParliament
attackgavesomeideaoftheapproachestakenbyterroristsinattackingCriticalInfrastructure,
whiletheCrITICDatabaseconfirmedthecommonsensenotionthatmostattacksagainstCI
wouldmakeuseofexplosives.Lastly,theinfluenceofvariousfactorsonattackmodalitieswas
extractedfromtheliterature,themostimportantofwhicharelistedbelow.
562Specificattacksrangefromsubtlymodifyingsystemssothattheydontwork(ordontworkcorrectly)
toblowingupsystemscompletely.Theattackscouldbecovert,inwhichcasetheymightresembleterrorist
attacks(althoughagoodinfowarriorcareslessaboutpublicitythanresults).Schneier,p.57.
563[M]issionsandgroupsspecificallyseekingtoproducelargeamountsofcasualtieswillprefer
employingconventionalweaponssystems,whileotherspredominantlyfocusingonincitingfear,panicand
generaldisruptionregardlessoftheamountofresultantcasualties,maybemoretemptedtouse
unconventionalweapons,andtheuseofunconventionalweaponsislargelydependentonthe
terroristsdesiredmissionoutcome.Thatistosay,missionsspecificallyseekingtocauselargeamountsof
casualties,evenifonlyasameanstoadesiredend,willtendtoemployweaponsofamoreconventional
nature,thoughwillperhapsdosoinmoreelaborateways.Conversely,terroristmissionsseekingtodisrupt,
intimidate,orotherwiseinterrupttheregularfunctioningofastate,irrespectiveoftotalcasualtiesorfatalities
produced,maybetemptedtoemploychemicalandbiologicaltypeweaponsandseekingagreater
numberofcasualtiesperincidentmayinciteanalterationinthetypesoftargetsandtacticsselected,butnot
necessarilyinanalterationoftheweaponsystemsemployedagainstthem(i.e.,CBRNtypeweaponsinstead
ofconventionalones).Palfy,p.8182,p.91.[EvidenceType:1]
564Palfy,p.82.[EvidenceType:1]
565Palfy,pp.8687.[EvidenceType:1]
167
destruction for the benefit of a divine audience would likely conclude such
destructive weapons would be appropriate to their goals.566
In addition to escalating the lethality and scale of attack, another way in which a group
could garner more media attention is to conduct a particularly sophisticated or
technologically complex operation.
Jackson argues that the sophistication of terrorist operations increase as they strive to
escalate the scale and lethality of attacks in order to gain attention and influence target
audiences.567(Evidence Type: 1)
566Jackson,TechnologyAcquisitionbyTerroristGroups,p.190.[EvidenceType:1]
567Jackson,TechnologyAcquisitionbyTerroristGroups,p.185.
568Hoffman,TheModernTerroristMindset,p.1
569Schneier,SecretsandLies,pp.2022.
570Drake,TerroristsTargetSelection,p.88.
571GordonWoo,ThealQaedaWarGame:FollowingthePathofLeastResistance,RiskManagement
Solutions,Inc.,(December2002).
572Hoffman,TerroristTargeting,p.2
573Hoffman,TheModernTerroristMindset,pp.1314.
574Drake,TerroristsTargetSelection.p.111.
575Ibid.
168
Jackson points out that increased security measures might lead terrorists to adopt highly
damaging tactics to overcome such protective mechanisms. As an example, Jackson cites
that terrorists might use a guided missile to destroy a highly protected airport which is
impregnable by vehicles or human agents.576 [Evidence Type: 1]
The location of a target relative to the terrorists base might affect the operational planning
for a particular attack. According to Woo, the location of a target that is not in the same
area as that of the terrorists base might lead the terrorists to use off-the shelf weapons
systems and delivery systems for carrying out a particular attack.577 [Evidence Type: 1]
According to Palfy, terrorist techniques become less complex when operating in an unfamiliar
theater. Thus, the need for operations to be simple in unfamiliar environments.578
[Evidence Type: 4]
576Jackson,TechnologyAcquisitionbyTerroristGroups,p.183213.
577Woo,UnderstandingTerrorismRisk,p.14.
578Palfy,WeaponsSystemSelectionandMassCasualtyOutcomes,p.87.
169
Chapter6:CONCLUSION*
A.Approach
Thisresearcheffortsetabouttryingtoanswersomebasicbutcomplexquestionsaboutterrorist
targetselection,specificallyinthecontextofpotentialfutureattacksagainstthenationscritical
infrastructure.TheCNSresearchteamemployedanumberofdifferentinvestigativeapproaches
inthisstudy,andsoughttoexploitthesynergybetweentheminordertooperationalizeits
findings.Amongthemethodsthatwereadoptedtoshedlightonthistopicwere:1)areviewof
existingterrorismandthreatassessmentliteraturetobothgleanexpertconsensusregarding
terroristtargetselectionandidentifytheoreticalapproachesthatmightbevaluabletoanalysts
anddecisionmakerswhoareseekingtounderstandsuchterroristgroupdecisionmaking
processes;2)thepreparationofseveralconcisecasestudiestohelpidentifyinternalgroupfactors
andcontextualinfluencesthathaveplayedsignificantrolesinleadingsometerroristgroupsto
attackcriticalinfrastructure;3)thecreationofanewdatabasetheCriticalInfrastructure
TerroristIncidentCatalog(CrITIC)tocapturealargesampleofempiricalCIattackdatathat
mightbeusedtoilluminatethenatureofsuchattackstodate;and4)thedevelopmentofanew
analyticalframeworktheDeterminantsEffectingCriticalInfrastructureDecisions(DECIDe)
Frameworkdesignedtomakethefactorsanddynamicsidentifiedbythestudymoreusable
futureeffortstoassessterroristintentionstotargetcriticalinfrastructure.
Eventhoughthesefourcomponentsofthestudyarepresentedseparatelyinthisreport,noneof
themweredevelopedinisolation.Rather,alltheconstituentelementsoftheprojectinformed
andwereinformedbytheothers.Forexample,thereviewoftheavailableliteratureonterrorist
targetselectionmadepossibletheidentificationofseveralfactorsthatwerelatervalidatedbythe
casestudyanalyses.Similarly,statisticalanalysisoftheCrITICdatayieldedmeasurableevidence
thatsupportedtheconclusionsutilizedintheanalyticalframework.
Besidesprovidinganimportantmechanismofselfreinforcementandvalidation,theprojects
multifacetednaturemadeitpossibletodiscernaspectsofCIattackmotivationsthatwouldlikely
havebeenmissedifanysingleapproachhadbeenadopted.Forexample,CrITICwhichwas
createdspecificallyforthisprojectrevealsimportantmacroscopicinformationaboutthenature
andgeneralpatternsofCIattacksduringthelastseveraldecades.Sincethisinformationisnot
availableinanyothersinglesourceoutsidetheclassifiedrealm,CrITICfacilitatedabetter
understandingofhistoricaltrendsinattacksonCI,suchastherelativefrequencywithwhich
differentcategoriesofterroristgroupshaveattackedcriticalinfrastructure;therelativefrequency
withwhichdifferentcategoriesofcriticalinfrastructurehavebeenattacked;therelative
frequencywithwhichdifferenttacticsandtools(e.g.,weapons)havebeenemployedtoattack
criticalinfrastructure;andtherelativeimpactintermsofcasualtiesassociatedwithdifferent
attacktypes,differentterroristgrouptypes,anddifferentCItargettypes.BycatalogingpastCI
terroristattacksandcontrollingthedatafordifferentvariables,wewereabletoaskincreasingly
sophisticatedresearchquestionsandthencedeterminepreliminaryanswerstothemusing
statisticalmethods.
* ThischapterwaswrittenbyGaryAckerman,JeffreyM.Bale,andKevinS.Moran.
170
Thecasestudycomponentoftheproject,ontheotherhand,enabledtheresearchteamto
consideraselectnumberofdistinctbutincertainrespectsrepresentativeexamplesofcritical
infrastructureattacksinmuchgreaterdetailandwithmuchmorespecificity.Whileouranalyses
ofthesecasesyieldedconclusionsthatbroadlyconformedtothosegeneratedbyotherpartsof
thestudy,italsoprovidedinsightintothehardertoquantifyfactorsanddynamicsinfluencing
terroristtargetselection.Hencethecasestudiesofferedamuchbetterunderstanding,bothofthe
contextsinwhichsuchattacksweremadeandthewaysinwhichterroristmotivationshavebeen
shapedbypowerfulinternalforcessuchasideology,operationalobjectives,operational
capabilities,organizationalstructure,socialdynamics,andperceptionsofexternalrealities(e.g.,
theoverallsecurityenvironmentandthespecificcharacteristicsofpotentialtargets).
Althoughthesurveyoftheexistingliteratureuncoveredlittlethatspecificallyaddressedterrorist
motivationsforattackingcriticalinfrastructure,itprovidedawiderangeofcontextualandgenre
specificmaterialthatenabledustomorefirmlyrelatethisprojecttothebroaderbodyof
contemporaryterrorismresearch.Theliteratureassessmentprovedtobeparticularlyvaluablein
aidingeffortstoproduceadecisionmakingframeworkthatcapturesasfullyaspossiblethe
factorsanddynamicsintegraltoterroristtargetselection.Similarly,theframeworkdevelopment
processconsistentlyraisedvitalresearchquestionsthatweresubsequentlyexploredinthe
studysotherresearchtracks.
B.KeyFindings
Thestudyskeyconclusionsarebesthighlightedandunderstoodintheframeworkoftheoriginal
fourresearchquestionsthatwereposedattheoutsetofthisstudy,inChapter1.
I.Whydoterroristsattackcriticalinfrastructureratherthanothertargets?
ThereisanynumberofpossiblereasonswhyterroristgroupsmaydecidetoattackCI,someof
whicharethesameastheirreasonsforattackingothertypesoftargetsandsomeofwhichare
duetotheintrinsicorpeculiarcharacteristicsofCI.Thesimplestandmostobviousreason,which
clearlyfallsintotheintrinsiccategory,isthatterroristgroupswillattackCIforstrictlypragmatic
infrastructuralreasons,i.e.,inordertodisruptorinterruptthefunctioningofcertainkey
facilities,thedamageordestructionofwhichwillseriouslyimpingeuponthenormaloperation
ofagivensociety.AlQa`idamembershaveexplicitlylistedthisasbeingoneoftheirgroups
primaryobjectives,allthemoresowhenattackingindustrializedcountriesliketheU.S.andthose
inEurope,whereattacksoncriticalfacilitiesarelikelytohavebothatangible,cascadingeffecton
integratedinfrastructuralsystemsandatremendouspsychologicalimpactonpopulations
accustomedtoenjoyingtheirconveniencesandcreaturecomforts.
AsecondreasonisthatcertainterroristgroupsmayhaveanideologicalpredilectiontoattackCI
becausetheyseevariousinfrastructuralentitiesasembodyingtheveryinjusticestheyare
tryingtoredress.ThisisthemainreasonwhytheFLNCattackedinfrastructuraltargetson
Corsica.Third,othergroupsmayattackCIbecauseinfrastructuraltargetshaveaparticularly
resonantsymbolicvalueaswellasapotentiallyextensiveimpact.Forexample,themainreason
thattheFARCattackedpowergeneratingfacilitiesandoilpipelineswastointerruptbasic
servicessoastodisplaytheimpotenceoftheColombiangovernment.Fourth,stillothergroups
maydosoinordertorallyorexpresstheirsolidaritywiththeirproclaimedconstituents,in
particularthoseonwhosebehalftheypurporttobefighting.Thisisclearlyoneoftheprimary
171
reasonswhyChukakuhaattackedtheJNR.Fifth,somegroupsmaydosobecausetheyare
seekingtoobtainmaximumpublicitywithoutcausinglargenumbersofcasualties,asisprobably
thecasewiththeMILF,whereasothersmayattackcertainCIpreciselybecausetheywishto
inflictmasscasualtiesontheirenemies,asissurelythecasewithvariousglobaljihadistnetworks.
However,inmanyifnotmostcases,itisprobablethatterroristgroupswilldecidetoattack
infrastructuraltargetsforamultiplicityofreasonsratherthanforonlyonereason,asthe
examplesofthe9/11attacks,the1993WorldTradeCenterbombing,andtheassaultontheIndian
Parliamentsuggest.Insum,itisprobablysafetoconcludethatterroristsgenerallyattack
infrastructurebecause:1)theywanttodestroycertainimportantfacilities;2)theyfeelthatthey
canobtainmorepublicityorexternalsupportthaniftheyhadattackednoninfrastructural
targets;3)theycancauseevenlargernumberofcasualtiesoravoidcausingcasualties
altogetherbyattackingsuchfacilities;4)thesymbolicvalueofinfrastructuraltargetsisgreater
thanthatofothertargets;or5)foracomplexcombinationofgeneralandveryspecificreasons.
Asonewouldexpect,thereisnosingleexplanationthatisapplicabletoallthepriorcasesof
attacksonCI.
II.Whichtypesofcriticalinfrastructuredoterroristsprefertoattack?
Withregardstothetypesofinfrastructureattackedandthemethodsofattack,oftheconfirmed
majorCIattacksbetween1933and2003,Oil/Gas,Power,andPublicService/GovernmentOffice
infrastructurefacilitiesweretargetedmostfrequently.Asisdiscussedinmoredetailbelow,
attacksonOil/GasInfrastructuraltargetsalsoaccountedforthelargestnumberofcasualties.
However,ifoneincludesminorattacksagainstCI,attacksonEmbassies/Consulatesaccounted
foralmost50%ofthetotal,eventhoughtheyincurredanegligiblenumberoffatalitieswhen
comparedtoattacksonotherCIcategories.Bombinghasbeenthemostfavoredmethodof
attackingCI,butgiventhatmostofthebombingtypesareunknown,furtherresearchwouldbe
requiredtogivethesenumbersmorespecificity.
Between1933and2004,50%ofthemajorattacksagainstCIwereagainstOil/GasInfrastructure.
Asfarasothermajorattacksareconcerned,PowerInfrastructuretargetsamountedtoabout15%,
followedbyPublicService/GovernmentOffices(8%),Railways/Railroads/Raillines(5.3%),and
DamsandWaterways(3.7%).
AsforterroristgrouptypesinvolvedinCIattacks,thelargestnumberofconfirmedmajorattacks
againstCIwascarriedoutbySecularUtopiangroups,with47attacks,almostallofwhichwere
Marxistgroups.Duringthesameperiod,EthnoNationalistgroupscarriedout43majorCI
attacks,andReligiousgroupscarriedout19.However,theoverallpercentageofReligiousgroup
attacksoninfrastructurehasincreasedsignificantlyinthepastdecadeandahalf.Secular
UtopianandEthnoNationalistgroupshavebothdisplayedapropensitytoattackOil&Gas
infrastructurefacilities,whichconstitutedmorethan50%oftheirtotalnumberofmajor
infrastructureattacks.Incontrast,Religiousgroupsmademajorattacksagainstvarioustypesof
infrastructure.
Morethan50%ofthemajorattacksonCIinEuropeandLatinAmerica/Caribbeanwerecarried
out against Oil/Gas Infrastructure. Significantly, in the Middle East/North Africa region, the
attacks on Oil/Gas Infrastructure accounted for almost 85% of the attacks on CI. The high
percentageofattacksonCIinthisregioncouldbepartlyattributedtothevastnumberofoiland
172
gas infrastructure targets in the region, as well as to the vulnerability of those targets visvis
otherCI.Incontrast,inAsiatheattacksonOil/GasInfrastructureamountedtoonly30%ofthe
majorattacksonCI.
ThedataformajorattacksonCIindicatethatterroristshavetargetedOil/GasInfrastructuremost
consistentlysince1960.Ineverydecadebeginningwiththe1960s,thenumberofattackson
Oil/GasInfrastructurehasbeenhigherthanthenumberofattacksonothertypesofCI.
III.WhattypesofgroupsaremostlikelytoattackU.S.criticalinfrastructure?
Onthebasisofpasttrends,othercategoriesofterrorists(suchasnationalistandsecularutopian
groups)haveconductedthemajorityofattacksagainstCIworldwide.Theabsenceofmanyof
thesegrouptypesintheU.S.,however,andtheincreasingincidenceofattacksbyreligious
groupssuggestthatthreemaincategoriesofterroristgroupsmayhavethehighestdispositionto
attackU.S.criticalinfrastructuretargetsinthefuture:1)transnationalIslamistterroristgroups,2)
domesticrightwingmilitias,and3)themostviolentfringesoftheradicalecologymovement.
GlobalJihadistGroups.Amongthethreegroupsthataremostlikelytowanttoconductattacks
againstCI,Islamistterroristgroupspossessboththeideologicalproclivitiesandthenecessary
operationalcapabilitiestoperpetratelargescaleCIattacks.AnalysisofCrITICDatabase
incidentsrevealsthatIslamistterroristgroupshavesignificantlyincreasedboththevolumeand
lethalityoftheirCIattacksduringthepasttwodecades.Intermsofabsolutenumbers,groups
generallyclassifiedasReligioushaveaccountedforroughly73%ofallcasualtiesand35%ofall
fatalitiesforconfirmedmajorCIattacks.Ifbothmajorandminorattacksareincluded,thedata
revealthatthesegroupshaveaccountedfor62%ofallcasualties,thevastmajorityofwhichfall
intotheIslamicsubcategory.Thesestatisticssupportafrighteninghypothesisthatreligious
terroristgroupsaremorelikelythanothergroupstomixCIattackswithmasscasualtyattacks.
RightWingMilitiaGroups.Asdiscussedinthecasestudychapter,criticalinfrastructuremightbe
expectedtobeanattractivetargetforcertaindomesticrightwingmilitiagroupsgiventheir
ideologicalandoperationalobjectives.Severalgroupsofthistypehavepubliclyexpressedan
interestinattackingCIaspartoftheirstruggleagainsttheNewWorldOrderandtheZionist
OccupationGovernment,andsomehaveevenpublishedtreatisesadvocatingthetargetingof
certaingovernmentfacilities.AlthoughmilitiatypegroupshavealreadyattackedCIintheUS,
mostoftheirattackshavenotbeenparticularlysuccessful.Therelativelyunsophisticated
organizationalandoperationalcapabilitiesofmostoftheseparamilitarycells,alongwiththeir
frequentinfiltrationbylawenforcementoperatives,havethusfargenerallyinhibitedtheirability
tocarryoutlargescaleattacksonCI.(Theonlyexceptionhasbeenthe1995OklahomaCity
bombing,whichforthereasonsnotedabovedoesnotclearlyfallintotheinfrastructuralcategory.)
However,theiroftexpressedinterestinattackinginfrastructuraltargets,andtheeasewithwhich
certaintypesofCIattackscanbemade,meansthatanalystsandpolicymakersshouldnot
discountthethreatthatthesegroupsmightposeinthefuture.
RadicalEcologyGroups.Fringeelementsfromcertainradicalecologygroupsposeathreatto
particulartypesofCIthataredirectlylinkedtotheirspecificideologicalagendas,suchas
scientificlaboratoriesthatengageingeneticorbiotechnologyresearch.Moreover,thegrowing
intermixtureandinteractionbetweenradicalecologistsandanticapitalist,antiglobalization,
andothersocialrevolutionaryactivistspresentsalatentbutpotentiallysignificantthreatto
173
criticalinfrastructureintheU.S.Althoughsuchgroupshaveoftenproclaimedtheirintentto
avoidcausinghumancasualties,theweakeningofsuchrestraintscannotberuledoutinthe
future.
Insum,althoughforeignnationalistandMarxistgroupswerethemostpronetoattackingCI
fromthe1960sthroughthe1980s,theyarefarlesslikelytoattackinfrastructuraltargetsonU.S.
soilinthenearfuturethanthetypesofgroupsenumeratedabove.If,however,Marxistor
nationalistterroristgroupsweretobecomeactiveintheU.S.inthefuture,thesewouldmightbe
expectedtoposeasignificantthreattoCI.
IV.Howdoterroristsmakedecisionsandplantoattackcriticalinfrastructure?
Themannerbywhichterroristgroupsmaketargetingdecisionsisaninvolvedprocesswhich
necessarilyvariessomewhatfromgrouptogroup,butingeneralonecancharacterizeitas
follows.First,agroupsideology,byexplicitlyindicatingwhatthegroupisforandagainst,
essentiallyestablishestherangeofpossiblehumanandnonhumantargetsthatitsmemberscan
legitimatelyattack.Thismaximalrangeoftargetsis,inmostcases,furtherlimitedbythegroups
specificoperationalobjectivesforlaunchingaparticularattack.Oncethoseobjectiveshavebeen
determined,severaltargetswillbeidentifiedthatmightenablethegrouptoachieveitsobjectives.
Atthatpointthegroupwillconsiderwhichofthosetargetscanbesuccessfullyattackedgivenits
ownoperationalcapabilities.AvarietyoffactorsthatmakeCItargetsparticularlyattractivemay
alsobepresented.Afterthepotentialrangeoftargetshasbeenfurtherreducedandvarious
specifictargetshavebeenidentifiedinapreliminaryway,thegroupwillthenconductclose
surveillancetodeterminewhichofthesearemostvulnerable,i.e.,whichcanlikelybeattacked
successfully.Afterthatdeterminationhasbeenmade,afinaltargetwillbeselectedand
additionalinformationwillbecollectedonthelayoutofthesite,theconfigurationofthefacility,
itslevelsofprotection,itspeculiarvulnerabilities,approachestoandfromthesite,etc.Whenthe
groupfeelsthatithasacquiredenoughinformationonthetarget,itwilldevelopaspecificplan
ofattackandthenlaunchtheattack.
Obviously,thisisahighlyschematicoverviewofthegeneralprocess,manyphasesofwhichare
infactlikelycarriedoutsimultaneously.Moreover,insomeinstancescertainphaseswillbe
telescopedoreliminatedaltogether,andtherearealsonodoubtmanycasesinwhichdecisions
aremadeinafarmoreimpulsive,informal,andhaphazardmanner.Alloftheseprocesseswillbe
determinedinindividualcasesbothbythenatureofthegroupanditsdynamics,aboveallthe
characteristicsofitsleadersandtheirstyleandmethodofmakingdecisions,aswellasby
externalfactorssuchaschangesinthesecurityenvironment,thegroupslinkswithotheractors
whoseassistancemaybenecessary,andavarietyofotherfactorselucidatedinourreport.In
short,intherealworldtherearemanypossiblepathsthatmayleadfromideological
proclivitiestooperationalobjectivestofinaltargetselection,butthesecanonlybedetermined
withmorespecificityafterindepthqualitativestudiesofparticulargroupshavebeencarriedout.
Ouradmittedlypreliminaryframeworkendeavorstotakewhatisclearlyacomplextangleof
factorinfluencesandshapethemintosomethingthatisusableatoncebyanalystsandsecurity
officialswhosetaskitistoprotecttheU.S.homeland.
174
C.LimitationsandFutureOpportunities
Despitethestudyssignificantfindings,theprojectteamhasidentifiedanumberofareasthat
couldbenefitfromfurtherinvestigationanddevelopment.Suchadditionaleffortswouldserve
bothtobroadenanddeepenourunderstandingofterroristmotivationsforattackingCI,aswell
asrefinethestudyinwaysthatwouldmakeitmoreaccessibleandusefultothepolicy,security,
andresearchcommunities.Threeaspectsoftheproject,inparticular,shouldbehighlightedas
areasthatofferopportunitiesforvaluablefuturedevelopment:
CaseStudies.Ashasbeendemonstratedbythecasesincludedinthisreport,qualitativecase
studiesareuniquelywellsuitedtoenhancingourunderstandingofthesignificantbut
frequentlydifficulttoobserveandquantifyfactorsanddynamicsthatinfluenceterrorist
decisionmaking.Unfortunately,theproperpreparationofsuchcasestudiesrequiresa
considerableinvestmentintimeand/ormanpower,andusuallyrequirestheinvolvementof
researcherswhopossesssomespecializedknowledgeabouttheparticularterroristgroupsbeing
considered.Indeed,informationcollectionismoreoftenconstrainedbytightdeadlinesthanbya
lackofavailablesourcematerial,especiallywhenworkisbeingproposedontopicsthathave
rarelybeenexaminedbyscholars,suchasthisone.Amorecompleteunderstandingofterrorist
motivationsforattackingcriticalinfrastructurecouldundoubtedlybegleanedfromadditional
researchintoinstancesinwhichreallyexistingterroristgroupsintentionallycarriedoutsuch
attacks.Inordertodosuchresearchproperly,itwouldbenecessarytoexamineamuchwider
corpusofprimaryandsecondarysourcesthanistypicallyconsulted,including1)ideological
treatises,brochures,andcommuniqusthathavebeenpublishedanddisseminatedbyparticular
terroristgroups;2)internaldocumentsproducedbythosegroups,suchasbulletins,instructions,
orthesummariesofstrategysessionsthathavebeenrecoveredasaresultoflawenforcementor
otherresearchactivities;3)intelligencedocumentsandjudicialmaterialsconcerningtheactivities
ofthesegroups;and4)interviews,wherepossible,withformermembersofthegroups,aboveall
theirleaders.Aftercarefullyexaminingthesetypesofsourcematerials,itwouldbepossibleto
providefargreaterinsightintothedecisionmakingprocessesofterroristgroups,includingin
thecontextofCItargeting.
Database.CNSCrITICDatabaseislikelythemostrobustdatabaseandapparentlytheonlyopen
sourcedatabasethathasbeenexclusivelydesignedtocollectinformationaboutterroristattacks
oncriticalinfrastructure.Althoughreasonablycomprehensivegiventhelimitationsofthe
sourcesfromwhichitwascompiledtheonlyonespresentlyavailableCrITICisstillinitsearly
stagesofdevelopmentandcanbefurtherimprovedinanefforttoprovidemoreaccurateand
informativedataandanalysis.CNSconsiderstheCrITICdatabasetobeaworkinprogress,a
necessaryfoundationuponwhichevenmorefruitfulworkcanbebuiltinthefuture.Tothisend,
itwouldbeusefultobeabletocarryoutthreeadditionaltasksinthenearterm.First,inorderto
confirmthevalidityofCrITICandthusensureitscredibilityeachcaseinthedatabaseshould
ideallybeinvestigatedfurtherinordertoconfirmthedetails.(Suchinvestigationswerenot
possiblegiventhescopeandtimeconstraintsofthecurrentproject.)Second,itwasapparentthat
sufficientdatawasnotreadilyavailablefordeterminingfactorssuchasTypeofAttack,
TerroristGroupType,orScaleofImpact,evenformanyofthemorerecentincidents.Asa
directconsequence,hundredsofcasesinthedatabasehadtobeclassifiedasUncertainand
excludedfrommoredetailedanalysis.Additionalresearchwouldhelpresolvesuchambiguities
andenhanceCrITICsdatasetsignificantly.
175
Third,itshouldbenotedthattheinitialquantitativeanalysisofCrITICsinformationwaslimited
bydataandresourceconstraints.Withadditionaltime,moreadvancedstatisticaltechniques
includinglogitandprobitmodelscouldbeusedtoassesstheinterplayandrelativesignificance
ofeachvariablewithgreateraccuracy.Becausethesestatisticsweredrawnlargelyfrom
internationalincidentsofterroristattacksonCI,theextenttowhichtheyreflectU.S.domestic
trendsisdebatable.Ashasalreadybeenmentioned,moreover,itwasbeyondthescopeofthis
studytocomparetrendsinterrorismingeneralwiththetrendsinattackingCIinparticular.Asa
result,thereisadangerthattheconclusionsdrawnhereincouldbemisinterpreted.Forexample,
althoughthelethalityofCIattacksgrewdramaticallyinthe1990s,sotoodidthelethalityof
terroristattacksingeneral.Moreover,theseeminglystrikingincreaseinthenumberofrecent
attacksonCImightnotappearsodramaticifoneismindfulofthedramaticincreaseinthe
overallnumberofterroristattacksduringthatsameperiod.Asisclearfromthemediascoverage
ofrecentinsurgentactivitiesinIraq,attacksoncriticalinfrastructurearebecomingan
increasinglyprominentaspectofcontemporarynonstateviolence.Presently,theCrITIC
DatabaseonlyincludesincidentsupthroughMarch2004.Anactive,ongoingefforttocatalogue
newCIterrorismincidentswouldbeespeciallyworthwhileinanefforttodeterminewhetherthe
increasingpublicitygiventoCIvulnerabilitiesisinfactinfluencingterroristtargetselection.
Framework.TheDECIDeFrameworkconstitutesanimportantfirststeptowarddevelopingan
analyticaltoolthatcanbereliablyusedtohelpdiscernterroristmotivationsforattackingCI.
Evenso,muchworkremainstobedone.Atthisstage,theframeworkremainsbothoverly
complexandtoocumbersometobeusedeasily.Whileitspresentiterationmaybesufficientfora
theoreticalinvestigationsuchasthis,inwhichallbackgroundinformationisvital,themodelis
bynomeansuserfriendlyinitscurrentform.Wefeelthatanurgentnextstepistoconvertthe
currentframeworkintoamorestreamlinedproduct,preferablyonethatispresentedinan
interactivecomputerbasedformat.Giventhatthetheoreticalunderpinningsoftheframework
havealreadybeenestablished,itstransitionfrompapertoPCshouldbeafairlystraightforward
exercise.Itisalsonotablethattheframeworkstillcontainsanumberofhypotheses.Those
hypothesesthatwereincludedareheldwithahighdegreeofconfidencebytheprojectteam.Still,
theydeserveadditionalscientificinvestigationandvalidationtoensurethattheframeworkisas
reliableaspossible.Additionally,theframeworkitselfrequirestesting,validation,anditerative
improvement.Thiswouldoptimallyinvolvecasesrelatingtocurrentlyactiveterroristgroups,
andwouldprovideanopportunityforfurtherinteractionbetweentheproductsusersand
developers.Finally,asignificantlimitationoftheDECIDeFrameworkisthatitisasingleshot
modelthatonlyfocusesonterroristmotivationsfordiscreetattacks.Animportantprospectfor
furtherresearchistoextendthemodelsothatitcanbeusedtoevaluatelongertermterrorist
campaigns.Severallayersofcomplexityareaddedwhensimilaranalyticalapproachesare
adoptedforcasesinvolvingmultipleattacks,includingthestrategicanticipationoftheactionsof
externalactorsandmorevarianceininternalgroupfactors.Theprojectteamalreadyhas
thoughtsonhowmultipleattackcasesmightbebestaddressedintermsoftheevolutionofthe
currentproject.
176
D.FinalThoughts
Ithasjustlybeennotedthat[m]osthumanbeingsformulatedecisionsbasedonpastor
perceivedfuturepatternsratherthanthroughrationalchoicesbetweenalternatives.579Inan
endeavorsuchasthis,wheretheultimategoalistogainpredictiveinsightintotheinternal
decisionmakingprocessesofterrorists,suchwordsserveasawisereminderthatpeople,
whetheroperatingasindividualsorasapartoflargergroups,usuallymakedecisionsonthe
basisofvariouscontextual,historicallycontingent,implicit,andindeednonrationalfactors
ratherthanbycarefullyweighingcostsandbenefitsviasomeformallogicalprocess.Itfollows
thatstatistics,models,andabstractframeworkswilllikelyneverbeabletofullycapturethe
complexityortheidiosyncrasiesofthehumanmind.Suchtools,however,canprovide
researchersandanalystswithimportantwaystationsonthepathtowardsabettergraspofhow
terroristsmightapproachdifficult,multifacetedchoicessuchastargetselection.
Foranareaofterrorismstudyasvitalastargetselection,itissurprisingthatsolittlequalitativeor
quantitativeresearchhasbeenfocusedspecificallyonhowterroristsmaketargetingdecisions.
Wehaveattemptedtofillthisinexplicablegapintheliterature,primarilybydemonstratingthe
typeofresultsthatcanbeachievedthroughthesimultaneousutilizationofanumberofparallel
approachesintheexaminationoftheproblemofterroristmotivationsforattackingCI.Hopefully
wehaveatleastsucceededinshowingthatthereareusefulwaystogoaboutassessingthis
crucialmotivationalelementoftheterroristthreat,eventhoughourpreliminaryframework
requiresfurtherdevelopment.Moreover,onceithasbeendevelopedfurther,webelievethat
similarapproachesandframeworkswillbeapplicabletoseveralotherareasofterroristbehavior
analysis.
Thankfully,ifoneexcludestheOklahomaCitybombingandthe9/11attacks,notruly
devastatingterroristattackshaveyetbeencarriedoutagainstU.S.criticalinfrastructure.
However,thefrequentpublicdiscussionofexistinginfrastructuralvulnerabilitiesbyboth
governmentofficialsandjournalistscanonlyservetofocustheattentionofwouldbeattackers
oninfrastructuraltargets,ifnottoinducethemtolaunchactualattacksonthem.Moreover,there
isnodoubtthatonceaseriesofsuccessfulattackshasbeenmadeonourhomelandsCI,thiswill
beboundtoencouragefurtherattacksofthistype.Inshort,thethreattoinfrastructuraltargetsis
clearlygrowing,evenifitmightbeanoverstatementtodescribeitasomnipresentorimminent.
Ifsecurityofficialsandanalystshopetoprepareforandcopeeffectivelywithsuchaneventuality,
themostimportantpreliminarytaskistounderstandwhichgroupsaremostlikelytoattackCI
andwhattheirobjectivesarelikelytobefordoingso.Thesequestionscanonlybeanswered
whenthespecificmotivationsofdifferenttypesofterroristgroupsarebetterunderstood,andit
wasthiscrucialtaskthatourreporthassoughttoadvance.
GaryKlein,SourcesofPower:HowPeopleMakeDecisions(Cambridge,MA:MIT,1998).
579
177
MasterBibliography*
ZoharAbdoolcarim,ThePhilippinesTerroristRefuge,Time[Asia],February17,2003.
ZacharyAbuza,MilitantIslaminSoutheastAsia:CrucibleofTerror(Boulder:LynneRienner,
2003).
GaryAckerman,BeyondArson?AThreatAssessmentoftheEarthLiberationFront,
TerrorismandPoliticalViolence,Volume15,Number4(Winter2004).
GaryAckerman,ModificationstoRationalChoiceModels:ProspectTheory&Integrative
Complexity,Unpublishedworkingpaper,1999.
MikhailA.Alexseev,WithoutWarning:ThreatAssessment,Intelligence,andGlobalStruggle
(NewYork:St.MartinsPress,1997).
AmmoniumNitrateExplosionatAZFToulouse,ilityEngineeringwebsite,April4,2003.
PhilipAnderson,ThreatVulnerabilityIntegration:AMethodologyforRiskAssessment,
CenterforStrategicandInternationalStudies,WashingtonD.C.
DavidE.ApterandNagayoSawa,AgainsttheState:PoliticsandSocialProtestinJapan
(Cambridge:HarvardUniversity,1984).
PaulArrighiandFrancisPomponi,HistoiredelaCorse(Paris:PressesUniversitairesde
France,1978).
NormanR.Augustine,ManagingtheCrisisYouTriedtoPrevent,HarvardBusinessReview,
NovemberDecember1995.
JeffreyM.Bale,Islamism,inRichardF.PilchandRaymondZilinskas,eds.,Encyclopediaof
BioterrorismDefense(NewYork:Wiley,2004),forthcoming.
JeffreyM.Bale,TheChechenResistanceandRadiologicalTerrorism,unpublishedreport,
July2003.
JeffreyM.Bale,Terrorism,RightWing,inBernardA.Cook,ed.,Europesince1945:An
Encyclopedia(NewYork:Garland,2001)pp.123840.
JamesDavidBallard,APreliminaryStudyofSabotageandTerrorismasTransportation
RiskFactorsAssociatedWiththeProposedYuccaMountainHighLevelNuclearFacility,
July1998.Accessedon04/27/2004at:http://www.state.nv.us/nucwaste/trans/jballard.htm
AlbertLszlBarabsi,Linked:TheNewScienceofNetworks(Cambridge:PerseusPublishing,
2002).
*
ThisbibliographywaspreparedbyAndrewJayne.
178
JosephA.Barbera,MD,AnthonyG.Macintyre,MDandCraigA.DeAtley,PAC,
AmbulancestoNowhere:AmericanCriticalShortfallinMedicalPreparednessfor
CatastrophicTerrorism,BelferCenterforScienceandInternationalAffairs,Discussion
Paper200115,Accessedon03/11/2004at:
http://www.homelandsecurity.org/journal/articles/Ambulancesbarbera.htm
RichardK.Betts,Analysis,War,andDecision:WhyIntelligenceFailuresAre
Inevitable,WorldPolitics31,PrincetonUniversityPress,(October1978),pp.6189.
RandyBorum,RobertFein,BryanVossekuil,andJohnBerglund,ThreatAssessment:
DefininganApproachforEvaluatingRiskofTargetedViolence,BehavioralSciencesandthe
Law17,(1999),pp.323337.
TerrF.BottandStephenEisenhower,EvaluatingComplexSystemsWhenNumerical
InformationisSparse,LosAlamosNationalLaboratory.
TerryF.Bott,StephenW.Eisenhower,JonathanKingson,andBrianP.Key,ANew
GraphicalToolforBuildingLogicGateTrees,LosAlamosNationalLaboratoryand
InnovativeTechnicalSolutions,Inc.
WilliamJ.Broad,ExpertsCallforBetterAssessmentofThreats,NewYorkTimes(ontheweb),
October2,2001.Accessed10/2/2001.
RobBuschmann,RiskAssessmentinthePresidentsNationalStrategyforHomeland
Security,CongressionalResearchServiceReportforCongress,October31,2002.
GavinCameron,NuclearTerrorism:AThreatAssessmentforthe21stCentury(NewYork:St.
MartinsPress,1999).
PeterChalk,AlQaedaanditsLinkstoTerroristGroupsinAsia,inAndrewTanand
KumarRamakrishna,eds.,TheNewTerrorism:Anatomy,TrendsandCounterStrategies
(Singapore:EasternUniversitiesPress,2002).
PeterChalk,MilitantIslamicExtremismintheSouthernPhilippines,inJasonF.Isaacson
andColinRubenstein,eds.,IslaminAsia:ChangingPoliticalRealities(NewBrunswick:
Transaction,2002).
Chukakuhawebsite,whichcanbefoundat:www.zenshin.org/english_home/nc_intro.htm.
CodexAlimentariusCommission,PrinciplesandGuidelinesfortheConductof
MicrobiologicalRiskAssessment,CAC/GL30,1999.
MichaelCorcoran,ThreatAssessmentandViolenceIntervention:APractitionersHandbook(Boca
Raton:CRCPress,2003).
XavierCrettiez,Laquestioncorse(Paris:Complexe,1999).
179
PaulK.Davis,JamesH.Bigelow,andJimmieMcEver,ExploratoryAnalysisandaCase
HistoryofMultiresolution,MultiperspectiveModeling,ReprintedfromProceedingsofthe
2002WinterSimulationConference,JeffreyA.Joines,RussellR.Barton,K.Kang,andPaulA.
Fishwick(editors),December2000andProceedingsoftheSPIE,Vol.4026,2000.
RobertF.Dacey,CriticalInfrastructureProtection:ChallengesinSecuringControlSystems,
InformationSecurityIssues,TestimonybeforetheSubcommitteeonTechnology,Information
Policy,IntergovernmentalRelations,andtheCensus,HouseCommitteeonGovernment
Reform,October1,2003.
DepartmentofDefenseCriticalInfrastructureProtection(CIP)Plan,APlaninResponseto
PresidentialDecisionDirective63CriticalInfrastructureProtection,PreparedbyDASD
(SecurityandInformationOperations)CriticalInfrastructureProtectionDirectorate,
November18,1998.
DepartmentofDefense,DoDResponsestoTransnationalThreats,TheDefenseScienceBoard
1997SummerStudyTaskForce,Volume1,FinalReport,(OfficeoftheUnderSecretaryof
DefenseforAcquisitionandTechnology,Washington,DC)October1997.
DepartmentofEnergy,EnergyInfrastructureVulnerabilityandRiskAssessmentChecklists
forStateGovernments,December4,2001.http://www.appanet.org/operations/checklist.pdf
DepartmentofHomelandSecurity,OfficeforDomesticPreparedness,StateHomeland
SecurityAssessmentandStrategyProgram.
http://www.shsasresources.com/documents/state_handbook.pdf
DepartmentofJustice,AssessmentoftheIncreasedRiskofTerroristorOtherCriminal
ActivityAssociatedwithPostingOffSiteConsequenceAnalysisInformationonthe
Internet,April18,2000.
JosephDeRivera,Chapter2:TheConstructionofReality,andChapter3:TheProjectionof
theFuture,JamesN.Rosenau,consultant,ThePsychologicalDimensionofForeignPolicy
(Columbus,OH:C.E.MerrillPublishingCompany,1968),pp.19104.
ChristopherDobsonandRonalPayne,TheWeaponsofTerror(London:McMillan,1979).
SunilDonald,TerryF.Bott,andStephenW.Eisenhower,RepresentingSubjective
KnowledgeinEngineeringSystemsusingPossibilityTrees,LosAlamosNationalLaboratory,
(July2004).
C.J.MDrake,TerroristsTargetSelection(NewYork:St.MartensPress,Inc,1998).
DTRA,CooperativeThreatReduction(CTR)GuideforConductingVulnerability
Assessments.
S.W.Eisenhower,T.F.Bott,M.R.Sorokach,F.P.Jones,andJ.R.Foggia,RiskBased
PrioritizationofResearchforAviationSecurityUsingLogicEvolvedDecisionAnalysis,Los
AlamosNationalLaboratory.
180
SteveEisenhower,TerryBott,andD.V.Rao,AssessingtheRiskofNuclearTerrorismUsing
LogicEvolvedDecisionAnalysis,LosAlamosNationalLaboratory(LAUR033467).
EPICsTestimonytotheHouseSubcommitteeonOversightandInvestigationsonCreating
theDepartmentofHomelandSecurity:ConsiderationoftheAdministrationsProposal,July
9,2002.
EPICsTestimonytotheSenateCommitteeonGovernmentalAffairsonSecuringOur
Infrastructure:Private/PublicInformationSharing,May8,2002.
EPICsLettertotheHouseJudiciaryCommittee,SubcommitteeonCrime,onH.R.3482,The
CyberSecurityEnhancementActof2002,February26,2002.
EPICsTestimonytotheHouseGovernmentReformCommitteeonH.R.4246,TheCyber
SecurityInformationAct,June22,2000.
EPICsTestimonytotheSenateJudiciaryCommitteeonCyberAttack:TheNational
ProtectionPlananditsPrivacyImplications,February1,2000.
EPICPressReleaseonNationalPlanforInformationSystemsProtection,February1,2000.
ExecutiveOrder13010CriticalInfrastructureProtection,FederalRegister,Vol.6,No.138,July17,
1996.
ExecutiveSummaryofNationalPlanforInformationSystemsProtection,January7,2000.
JonathanDavidFarley,BreakingAlQaedaCells:AMathematicalAnalysisof
CounterterrorismOperations(AGuideforRiskAssessmentandDecisionMaking),Studiesin
Conflict&Terrorism26,(2003),pp.399411.
GillesFauconnierandMarkTurner,TheWayWeThink(NewYork:BasicBooks,2002).
FederalEmergencyManagementAgency(FEMA),UnderstandingYourRisks:Identifying
HazardsandEstimatingLosses,StateandLocalMitigationPlanningGuide,August2001.
RobertA.FeinandBryanVossekuil.ProtectiveIntelligenceandThreatAssessmentInvestigations:
AGuideforStateandLocalLawEnforcementOfficials,U.S.DepartmentofJustice,Officeof
JusticePrograms,NationalInstituteofJustice,(Washington,DC)July1998.
RobertA.Fein,BryanVossekuil,andGwenA.Holden,Threatassessment:AnApproachto
PreventTargetedViolence,U.S.DepartmentofJustice,OfficeofJusticePrograms,National
InstituteofJustice,July1995.
JoeFiorill,U.S.TerrorismCommisionPushesRiskAssessmentasKeytoSpending,Global
SecurityNewswire,Monday,December15,2003.
181
BaruchFischhoff,RoxanaM.Gonzalez,DeborahA.Small,andJenniferS.Lerner,Judged
TerrorRiskandProximitytotheWorldTradeCenter,JournalofRiskandUncertainty26:2/3,
(2003)pp.137151.
GeneralAccountingOffice,CriticalInfrastructureProtection:ChallengesforSelected
AgenciesandIndustrySectors,ReporttotheCommitteeonEnergyandCommerce,U.S.
HouseofRepresentatives,February2003.
T.J.S.George,RevoltinMindanao:TheRiseofIslaminPhilippinePolitics(KualaLumpur:
OxfordUniversity,1980).
PeterGordonGowing,MuslimFilipinosHeritageandHorizon(QuezonCity:NewDay,1973).
AntoineMarieGraziani,PascalPaoli:Predelapatriecorse(Paris:Tallandier,2002).
RohanGunaratna,InsideAlQaeda:GlobalNetworkofTerror(NewYork:Columbia
UniversityPress,2002).
KarenGuttieri,MichaelD.Wallace,PeterSuedfeld,UniversityofBritishColumbia,The
IntegrativeComplexityofAmericanDecisionMakersintheCubanMissileCrisis,Journalof
ConflictResolution39,No.4,(BeverlyHills:SagePublications,Inc.,1995).
H.R.3162130(P.L.10756),Section1016,asfoundat:
http://www.epic.org/privacy/terrorism/hr3162.html
ChrisHawley,GregoryG.Noll,andMichaelS.Hildebrand,OperationsSecurityforPublic
SafetyAgencies:SpecialOperationsforTerrorismandHazmatCrimes,Interagency
OperationsSecurity(OPSEC)SupportStaff,OperationsSecurity,MonographSeries.
BruceHoffman,AlQaeda,TrendsinTerrorismandFuturePotentialities:AnAssessment,
StudiesinConflictandTerrorism26(NovemberDecember2003),pp.429442.
BruceHoffman,InsideTerrorism(NewYork:ColumbiaUniversity,1998).
BruceHoffman,TerroristTargeting:Tactics,Trends,andPotentialities,RAND,Santa
Monica,California,1992.
BruceHoffman,TheModernTerroristMindset:Tactics,Targets,andTechnologies,Center
fortheStudyofTerrorismandPoliticalViolenceSt.AndrewsUniversity,Scotland,October
1997.http://www.ciaonet.org/wps/hob03/
OleR.Holsti,CrisisDecisionMaking:PerspectivefromFourLevelsofAnalysis,Behavior,
SocietyandNuclearWar1,PhilipE.Tetlock,et.al,ed.,(NewYork:OxfordUniversityPress,
1989).
BruceK.Hope,ARiskAssessmentPerspectiveonBioterroristThreatstotheU.S.Food
Supply,unpublishedpaper.
182
BruceK.Hope,UsingFaultTreeAnalysistoAssessBioterroristRiskstotheU.S.Food
Supply,OregonDepartmentofEnvironmentalQuality,LandQualityDivision.
DavidPatrickHoughton,TheRoleofAnalogicalReasoninginNovelForeignPolicy
Situations,BritishJournalofPoliticalScience26,(October1996).
JeffreyHunker,CIAO,memotoCICGMembersregardingOffsiteMaterials.Obtainedby
EPICundertheFreedomofInformationAct.
InternationalAssociationofChiefsofPolice,Section3:ThreatAssessment,
http://www.theiacp.org/pubinfo/pubs/pslc/svthreat.htm
BrianA.Jackson,TechnologyAcquisitionbyTerroristGroups:ThreatAssessmentInformed
byLessonsfromPrivateSectorTechnologyAdoption,StudiesinConflictandTerrorism24,
(2001)pp.183213.
JaisheMohammadMujahideenETanzeem,SouthAsiaTerrorismPortal,
http://www.satp.org
IrvingL.JanisandLeonMann,Chapter3:AConflictModelofDecisionMaking,and
Chapter4:DefectiveSearchandAppraisalunderHighConflict,DecisionMaking:A
PsychologicalAnalysisofConflict,Choice,andCommitment,(NewYork:TheFreePress,1977),pp.
45133.
BrianJenkins,DefenseAgainstTerrorism,PoliticalScienceQuarterly101,Reflectionson
ProvidingforThecommonGood,(1986),pp.773786.
RobertJervis,PerceivingandCopingwithThreat,PsychologyandDeterrence(Baltimore,
MD:JohnsHopkinsUniversityPress,1989).
RobertJervis,PerceptionandMisperceptioninInternationalPolitics(Princeton,NJ:Princeton
UniversityPress,1976).
SalahJubair,Bangsamoro:ANationUnderEndlessTyranny(KualaLumpur:IQMarin,1999).
PeterJ.KatzensteinandYutakaTsujinaka,DefendingtheJapaneseState:Structures,Normsand
thePoliticalResponsestoTerrorismandViolentSocialProtestinthe1970sand1980s,(Ithaca,NY:
CornellUniversity,1991).
RalphL.KeeneyandHowardRaiffa,DecisionswithMultipleObjectives:PreferencesandValue
Tradeoffs(Cambridge:CambridgeUniversityPress,1993).
GillesKepel,TheRevengeofGod:TheResurgenceofIslam,ChristianityandJudaismintheModern
World(UniversityPark:PennsylvaniaStateUniversity,1994).
PatriciaKing,VipersintheBurbs,Newsweek,July15,1996.
183
GlennKoller,RiskModelingforDeterminingValueandDecisionMaking(BocaRaton,FL:
Chapman&Hall/CRC,2000).
C.F.KurtzandD.J.Snowden,TheNewDynamicsofStrategy:SensemakinginaComplex
andComplicatedWorld,IBMSystemsJournal42,Number3,(2003),accessedonlineonJuly
27,2004athttp://www.findarticles.com/p/articles/mi_m0ISJ/is_3_42/ai_108049867.
RonaldD.Lee,AssociateDeputyAttorneyGeneral,DepartmentofJustice,memotoJeffrey
Hunker,Director,CriticalInfrastructureAssuranceOfficeregardingtheNational
InformationSystemsProtectionPlan,March8,1999.ObtainedbyEPICundertheFreedomof
InformationAct.
JackS.Levy,ProspectTheory,RationalChoice,andInternationalRelationsInternational
StudiesQuarterly41,(March1997),pp.87112.
MarkIrvingLichbach,TheRebelsDilemma(AnnArbor:UniversityofMichiganPress,1998),
pp.ixxiv,5099,and16777.
MatthewJ.Littleton,InformationAgeTerrorism:TowardCyberterror,NavelPostgraduate
School,Monterey,CA,December1995,asfoundat:
http://www.fas.org/irp/threat/cyber/docs/npgs/terror.htm
AndrewMacdonald,TheTurnerDiaries:ANovel(Hillsboro,WV:NationalVanguard,1999
[1980]),passim.
Cesar Adib Majul, The Contemporary Muslim Movement in the Philippines (Berkeley: Mizan,
1985).
W.K.CheMan,MuslimSeparatism:TheMorosofSouthernPhilippinesandtheMalaysofSouthern
Thailand(Singapore:OxfordUniversity,1990).
NaomiMandelandStevenJ.Heine,TerrorManagementandMarketing:HeWhoDiesWith
theMostToysWins,WhartonSchoolofBusiness,UniversityofPennsylvania.
BiancaMarkram,Aninsolubleproblem?,Reactions24,July2002.www.reactionsnet.com
HarryF.MartzandMarkE.Johnson,RiskAnalysisofTerroristAttacks,RiskAnalysis7,
(1987).
GordonH.McCormick,TerroristDecisionMaking,AnnualReviewsinPoliticalScience6
(2003)pp.473507.
ThomasM.McKenna,MuslimRulersandRebels:EverydayPoliticsandArmedSeparatisminthe
SouthernPhilippines(Berkeley:UniversityofCalifornia,1998).
EdwardF.Mickolus,Terrorism,19881991:AChronologyofEventsandaSelectivelyAnnotated
Bibliography,BibliographiesandIndexesinMilitaryStudies,Number6(GreenwoodPress,
1993).
184
EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:A
ChronologyofEvents,Vol.2,19841987,FirstEdition,(Ames:IowaStateUniversityPress,
1989).
EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:A
ChronologyofEvents,Vol.1,19801983,FirstEdition,(Ames:IowaStateUniversityPress,
1989).
EdwardF.Mickolus,TransnationalTerrorism:AChronicleofEvents,19681979,(London:
ALDWYCHPress,1980).
EdwardF.Mickolus,HowDoWeKnowWereWinningtheWarAgainstTerrorists?Issues
inMeasurement,StudiesinConflictandTerrorism25,(2002),pp.151160.
MilitiaOperationPlanAmericanViper(DelCity,OK:UnitedSovereigns,nodate).
IanI.Mitroff,MuratC.Alpaslan,PreparingforEvil,HarvardBusinessReview,April2003.
JohnMonohan,et.al.,RethinkingRiskAssessment:TheMacArthurStudyofMentalDisorderand
Violence(Oxford:OxfordUniversityPress,2001).
JohnMoteff,CriticalInfrastructure:APrimer,CongressionalResearchService,Received
ThroughCRSWeb,August13,1998.
JohnMoteff,CriticalInfrastructures:Background,PolicyandImplementation,
CongressionalResearchService,ReceivedThroughCRSWeb,February4,2002.
HaraldMuller,Terrorism,Proliferation:AEuropeanThreatAssessment,Institutefor
SecurityStudies,ChaillotPapers#58,March2003.
BrigitteL.Nacos,TheTerroristCalculusbehind911:AModelforFutureTerrorism;
StudiesinConflictandTerrorism26,(2003)pp.116.
NationalInfrastructureProtectionCenter,RiskManagement:AnEssentialGuideto
ProtectingCriticalAssets,November2002.http://www.nipc.gov/publications/nipcpub/P
Risk%20Management.pdf
NationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets,
February2003.
OfficeforDomesticPreparedness(OPD),VulnerabilityAssessmentMethodologiesReport,
U.S.DepartmentofHomelandSecurity,PhaseIFinalReport,July2003.
G.G.Onishchenko,BioterrorismasThreattoBiologicalSecurity:AssessmentofHealthcare
InstitutionsPreparednesstoCounteractBioterrorism,MoscowVestnikRossiyskoyAkdemii
MeditsinskikhNauk,No.4,DocumentID:CEP20030729000394,VersionNumber:1,April4,
2003.
185
ArpadPalfy,WeaponsSystemSelectionandMassCasualtyOutcomes,Terrorismand
PoliticalViolence15,No.2(Summer2003),pp.8195.
JohnParachini,CombatingTerrorism:AssessingThreats,RiskManagement,andEstablishing
Priorities,TestimonybeforetheHouseSubcommitteeonNationalSecurity,VeteransAffairs,
andInternationalRelations,July26,2000.http://cns/pubs/reports/paraterror.htm
EricPianin,StudyAssessesRiskofAttackonChemicalPlant,TheWashingtonPost,Mar12,
2002,p.A.08.
JerroldM.Post,KevenG.Ruby;andEricD.Shaw,TheRadicalGroupinContext:An
IntegratedFrameworkfortheAnalysisofGroupRiskforTerrorism,StudiesinConflictand
Terrorism25(2002),p.73126.
PresidentsCommissiononCriticalInfrastructureProtection,CriticalFoundations:
ProtectingAmericasInfrastructures,October1997,asfoundat:
http://www.dtra.mil/press_resources/publications/deskbook/full_text/Other_Relevant_Refere
nces/PCCIP_Report.pdf
MarisaReddyPynchonandRandyBorum,AssessingThreatofTargetedGroupViolence:
ContributionsfromSocialPsychology,BehavioralSciencesandtheLaw17(1999),pp.339355.
[alQ`ida],IalnalJihdalaalTawghtalBild(nopublicationinformation)
ChrisQuillen,AHistoricalAnalysisofMassCasualtyBombers,StudiesinConflictand
Terrorism25,(SeptemberOctober2002),pp.279292.
KevinM.Quinley,DonaldL.Schumidt,BusinessatRisk;HowtoAssess,Mitigate,andrespondto
TerroristThreats,TheNationalUnderwriterCompany,Cincinnati,Ohio,2002.
RobertRamsay,TheCorsicanTimeBomb(Manchester:ManchesterUniversity,1983).
RemarksbythePresidenttothePhilippineCongress,fulltextonWhiteHousewebsite,18
October2003.www.whitehouse.gov/news/releases/2003/10/print/2003101812.html
MagnusRanstorp,TerrorismintheNameofReligion,inRussellD.HowardandReidL.
Sawyereds.,TerrorismandCounterterrorism:UnderstandingtheNewSecurityEnvironment
(Guilford,CT:McGrawHill,2002).
SimonReeve,TheNewJackals:RamziYousef,OsamabinLadinandtheFutureofTerrorism
(Boston:NortheasternUniversity,1999).
NancyA.Renfroe,andJosephL.Smith,Threat/VulnerabilityAssessmentsandRisk
Analysis,WholeBuildingDesignGuide,Accessedon03/11/2004at:
http://www/wbdg/org/design/resprint.php?rp=27
186
ReportofthePresidentsCommissiononCriticalInfrastructureProtection,Protecting
AmericasInfrastructures,October1997.
VladimirP.ReshetinandJamesL.Regens,SimulationModelingofAnthraxSpore
DispersioninaBioterrorismIncident,RiskAnalysis23,December1,2003.
MariaA.Ressa,SeedsofTerror:AnEyewitnessAccountofAlQaedasNewestCenterofOperations
inSoutheastAsia(NewYork:FreePress,2003).
ColinRobson,RealWorldResearch:AResourceforSocialScientistsandPractitionerResearchers
(Oxford:BlackwellPublishers,1993).
JeanMichelRossiandFranoisSantoni,Poursoldedetoutcompte:Lesnationalistescorsesparlent
(Paris:Denol,2000).
BarryRubin,ed., RevolutionariesandReformers:ContemporaryIslamistMovementsintheMiddle
East(Albany,NY:StateUniversityofNewYork,2003).
ToddSandlerandDanielG.ArceM.,Terrorism&GameTheory,SimulationandGaming34,
(September2003),pp.319337.
JeanPierreSantini,FrontdeLibrationNationaledelaCorse:Delombrelalumire(Paris:
LHarmattan,2000).
LindaJoSchierow,ChemicalPlantSecurity,ReportforCongress,CongressionalResearch
Service,ReceivedThroughCRSWeb,UpdatedJanuary23,2003.
LindaJoSchierow,TheRoleofRiskAnalysisandRiskManagementinEnvironmental
Protection,CongressionalResearchServiceIssueBriefforCongress,September4,2003.
AlexP.SchmidandAlbertJ.Jongman,PoliticalTerrorism:ANewGuidetoActors,Authors,
Concepts,DataBases,TheoriesandLiterature(Amsterdam:NorthHolland,1988).
BruceSchneier,SecretsandLies:DigitalSecurityintheNetworkedWorld(WileyPublishing,Inc.,
2004).
ElaineShannon,LearningfromTerrorAlerts,Time,July14,2004.
AndrewSilke,BeatingtheWater:TheTerroristSearchforPower,Control,andAuthority,
FrankCassJournalsTerrorismandPoliticalViolence12,(Summer2000),pp.7696.
EdmondSimeoni,LepigedAlria:LesraisonsdelacolredesCorses(Paris:J.C.Latts,1976).
JoshuaSinai,AnalyticalModelofTerrorismForecasting,paper,InternationalConference
onPostModernTerrorism,September2003.
http://cnsinfo.miis.edu/search97cgi/s97_cgi?action...l&queryzip=%22threat+assessment%22&
Collection=FBIS
187
JoshuaSinai,ICTConference:ExpertonValue,MethodsofForecastingTerroristIncidents,
FBISReport,DocumentID:GMG20031202000085,September9,2003.
CaptainRobertL.Snow,TheMilitiaThreat:TerroristsAmongUs(NewYorkandLondon:
PlenumTrade,1999).
AnthonySpaeth,FirstBali,nowDavao,Time[Asia],March10,2003.
PaulC.SternandHarveyV.Fineberg.Eds.UnderstandingRisk:InformingDecisionsina
DemocraticSociety(WashingtonD.C.:NationalAcademyPress,1996).
PeterSt.John,AirPiracy,AirportSecurity,andInternationalTerrorism:WinningtheWaragainst
Hijackers(NewYork:QuorumBooks,1991),pp.5,4366,Appendices2,3,and7.
CassR.Sunstein,TerrorismandProbabilityNeglect,JournalofRiskandUncertainty26:2/3;
(2003)pp.137151.
NassimNicholasTaleb,TheBlackSwan:WhyDontWeLeanthatWeDontLearn?,
HighlandForum23,LasVegas,November2003,FirstDraft,January2004.
BronTaylor,Religion,Violence,andEnvironmentalism,TerrorismandPoliticalViolence,Vol.
10,#4,Winter1998.http://www.religionandnature.com/bron/TPV%20article.htm.
TerrorfromtheRight,SPLCIntelligenceReport102(Summer2001).
TheAmericanHeritageDictionaryoftheEnglishLanguage,WilliamMorris,(editor),New
CollegeEdition,(Boston:HoughtonMifflinCo.,1981).
TroyS.Thomas,Maj.,USAFandWilliamD.Casebeer,Maj.,USAF,ViolentNonState
Actors:CounteringDynamicSystems,StrategicInsights3,(March2004).
U.S.DepartmentofHomelandSecurity:OfficeforDomesticPreparedness(OPD),
VulnerabilityAssessmentMethodologiesReport,PhaseIFinalReport,July2003.
U.S.DepartmentofHomelandsecurity,FEMA,RiskManagementSeries,ReferenceManual
toMitigatePotentialTerroristAttacksAgainstBuildings,December2003.
U.S.DepartmentofState,1996PatternsofGlobalTerrorism(Washington,DC:Government
PrintingOffice,1997),asfoundat:
http://www.state.gov/www/global/terrorism/annual_reports.html
U.S.GeneralAccountingOffice,HomelandSecurity:VoluntaryInitiativesAreUnderWay
atChemicalFacilities,buttheExtentofSecurityPreparednessisUnknown,March2003.
U.S.GeneralAccountingOffice,CombatingTerrorism:ActionsNeededtoGuideServices
AntiterrorismEffortsatInstallations,November2002.
188
U.S.GeneralAccountingOffice,CombatingTerrorism:EvaluationofSelected
CharacteristicsinNationalStrategiesRelatedtoTerrorism,February2004.
U.S.GeneralAccountingOffice,CombatingTerrorism:NeedforComprehensiveThreatand
RiskAssessmentsofChemicalandBiologicalAttacks,September1999.
U.S.GeneralAccountingOffice.CombatingTerrorism:ThreatAndRiskAssessmentsCan
HelpPrioritizeandTargetProgramInvestments.GAO/NSIAD9874.
U.S.GeneralAccountingOffice,CriticalInfrastructureProtection:ChallengesforSelected
AgenciesandIndustrySectors,ReporttotheCommitteeonEnergyandCommerce,House
ofRepresentatives,February2003.
U.S.GeneralAccountingOffice,CriticalInfrastructureProtection:SignificantChallengesin
DevelopingNationalCapabilities,ReporttotheSubcommitteeonTechnology,Terrorism,
andGovernmentInformation,CommitteeontheJudiciary,U.S.Senate,April2001.
U.S.GeneralAccountingOffice,TransportationSecurityResearch:CoordinationNeededin
SelectingandImplementingInfrastructureVulnerabilityAssessments,May2003.
U.S.HouseofRepresentatives,CommitteeonGovernmentReform,Subcommitteeon
NationalSecurity,VeteransAffairs,andInternationalRelations,HearingonCombating
Terrorism:AssessingThreats,RiskManagementandEstablishingPriorities,OneHundred
SixthCongress,SecondSession,July26,2000,SerialNo.106253.
http://www.gpo.gov/congress/houseorhttp://www.house.gov/reform
U.S.DistrictCourt,DistrictofColorado,UnitedStatesofAmericav.TimothyJamesMcVeighand
TerryLynnNichols.
U.S.DistrictCourt,SouthernDistrict,UnitesStatesofAmericav.OmarAhmadAliAbdel
Rahman.
U.S.GeneralAccountingOffice,ReporttoCongressionalRequesters,CombatingTerrorism:
ThreatAndRiskAssessmentsCanHelpPrioritizeandTargetProgramInvestments,(Washington,
DC,NationalSecurityandInternationalAffairsDivision,April1998)GAO/NSIAD9874
BenVenzkeandAimeeIbrahim,ThealQaedaThreat:AnAnalyticalGuidetoalQaedasTactics
andTargets(Alexandria,VA:Tempest,2003).
W.KipViscusiandRichardJ.Zeckhauser,SacrificingCivilLibertiestoReduceTerrorism
Risks,JournalofRiskandUncertainty26,MarchMay2003.
MaritesDaguilanVitugandGlendaM.Gloria,UndertheCrescentMoon:Rebellionin
Mindanao,(QuezonCity:AteneoCenterforSocialPolicyandPublicAffairs/Institutefor
PopularDemocracy,2000).
MichaelD.Watkins,MaxH.Bazerman,PredictableSurprises:DisastersYouShouldHave
SeenComing,HarvardBusinessReview,March2003.
189
RobertW.White,IssuesintheStudyofPoliticalViolence:UnderstandingtheMotivesof
ParticipantsinSmallGroupPoliticalViolence,TerrorismandPoliticalViolence12,(Spring
2000),pp.95108.
TranscriptofWhiteHousePressBriefingonCyberSecurity,January7,2000.
WhiteHouse,DefendingAmericasCyberspace:NationalPlanforInformationSystems
Protection,Version1.0,2000.
WhiteHouse,ExecutiveOrder13010CriticalInfrastructureProtection,July15,1996,as
foundat:http://www.fas.org/irp/offdocs/eo13010.htm
WhiteHouse,ExecutiveOrder13228EstablishingtheOfficeofHomelandSecurityandthe
HomelandSecurityCouncil,October8,2001,asfoundat:
http://www.whitehouse.gov/news/releases/2001/10/200110082.html.
WhiteHouse,ExecutiveOrder13231CriticalInfrastructureProtectionintheInformation
Age,October16,2001,asfoundat:http://www.fas.org/irp/offdocs/eo/eo13231.htm.
WhiteHouse,HomelandSecurityPresidentialDirective7CriticalInfrastructure
Identification,Prioritization,andProtection,December17,2003,asfoundat:
http://www.whitehouse.gov/news/releases/2003/12/200312175.html
WhiteHouseNationalPlanforInformationSystemsProtection,January7,2000.
WhiteHouse,NationalStrategyforHomelandSecurity,July16,2002,asfoundat:
http://www.whitehouse.gov/homeland/book/sect33.pdf
WhiteHouse,PresidentialDecisionDirective/NSC63CriticalInfrastructureProtection,
May22,1998,asfoundat:http://www.fas.org/irp/offdocs/pdd/pdd63.htm
WhiteHousePressReleaseonCyberSecurity,January7,2000.
RickWhiting,CompaniesBoostSalesEffortswithPredictiveAnalysis,InformationWeek,
Accessedon6/7/2002.
http://www.informationweek.com/story/IWK20020221s0018
Dr.GordonWoo,ThealQaedaWarGame:FollowingthePathofLeastResistance,Risk
ManagementSolutions.http://www.rms.com/Publications/AlQaedaWarGame_Woo.asp
Dr.GordonWoo,TheevolutionofTerrorismRiskModeling,RiskManagementSolutions.
http://www.rms.com/Publications/EvolutionTerRiskMod_Woo_JournalRe.pdf
Dr.GordonWoo,MathematicalAspectsofTerrorismHazard,RiskManagementSolutions.
http://www.rms.com/Publications/MathematicalAspectsOfTerrorHaz_Woo.asp
Dr.GordonWoo,QuantitativeTerrorismRiskAssessment,RiskManagementSolutions,
http://www.rms.com/NewsPress/Quantitative_Terrorism_Risk_Assessment.pdf
190
Dr.GordonWoo,UnderstandingTerrorismRisk,RiskManagementSolutions,
http://www.rms.com/Publications/UnderstandTerRisk_Woo_RiskReport04.pdf
DonWynegar,CommunicationsandInformationInfrastructureAssuranceProgram(CIIAP)
FY2000,PresentationtoCommunicationsandInformationSectorWorkingGroup,May30,
2000.(PowerPointpresentation)
RaymondA.Zilinskas,BioterrorismThreatAssessmentandRiskManagementsWorkshop,
FinalReportandCommentaryfrombioterrorismthreatassessmentandriskmanagement
workshopNovember1213,2001,WashingtonD.C.officeofCenterForNonproliferation
Studies,MontereyInstituteofInternationalStudies,June24,2003.
RaymondA.Zilinskas,BioterrorismThreatAssessmentandRiskManagementsWorkshop:
Final Report and Commentary, Presented to the U.S. Department of Energy, Monterey
InstituteofInternationalStudies,No.17,June24,2003.
191
CaseStudyBibliography*
ZoharAbdoolcarim,ThePhilippinesTerroristRefuge,Time[Asia],17February2003
ZacharyAbuza,MilitantIslaminSoutheastAsia:CrucibleofTerror(Boulder:LynneRienner,
2003).
DavidE.ApterandNagayoSawa,AgainsttheState:PoliticsandSocialProtestinJapan,
(Cambridge:HarvardUniversity,1984).
AmmoniumNitrateExplosionatAZFToulouse,ilityEngineeringwebsite,4April2003.
PaulArrighiandFrancisPomponi,HistoiredelaCorse(Paris:PressesUniversitairesde
France,1978).
JeffreyM.Bale,Islamism,inRichardF.PilchandRaymondZilinskas,eds.,Encyclopediaof
BioterrorismDefense(NewYork:Wiley,2004),forthcoming.
JeffreyM.Bale,TheChechenResistanceandRadiologicalTerrorism,unpublishedreport,
July2003.
JeffreyM.Bale,Terrorism,RightWing,inBernardA.Cook,ed.,Europesince1945:An
Encyclopedia(NewYork:Garland,2001)pp.123840.
PeterChalk,AlQaedaanditsLinkstoTerroristGroupsinAsia,inAndrewTanand
KumarRamakrishna,eds.,TheNewTerrorism:Anatomy,TrendsandCounterStrategies,
(Singapore:EasternUniversitiesPress,2002).
PeterChalk,MilitantIslamicExtremismintheSouthernPhilippines,inJasonF.Isaacson
andColinRubenstein,eds.,IslaminAsia:ChangingPoliticalRealities(NewBrunswick:
Transaction,2002).
Chukakuhawebsite,whichcanbefoundat:www.zenshin.org/english_home/nc_intro.htm.
XavierCrettiez,Laquestioncorse,(Paris:Complexe,1999).
T.J.S.George,RevoltinMindanao:TheRiseofIslaminPhilippinePolitics(KualaLumpur:
OxfordUniversity,1980).
PeterGordonGowing,MuslimFilipinosHeritageandHorizon(QuezonCity:NewDay,1973).
AntoineMarieGraziani,PascalPaoli:Predelapatriecorse(Paris:Tallandier,2002).
RohanGunaratna,InsideAlQaeda:GlobalNetworkofTerror(NewYork:Berkley,2002).
*
ThisbibliographywaspreparedbyAndrewJayne.
192
BruceHoffman,InsideTerrorism(NewYork:ColumbiaUniversity,1998).
SalahJubair,Bangsamoro:ANationUnderEndlessTyranny(KualaLumpur:IQMarin,1999).
PeterJ.KatzensteinandYutakaTsujinaka,DefendingtheJapaneseState:Structures,Normsand
thePoliticalResponsestoTerrorismandViolentSocialProtestinthe1970sand1980s(Ithaca,NY:
CornellUniversity,1991).
GillesKepel,TheRevengeofGod:TheResurgenceofIslam,ChristianityandJudaismintheModern
World(UniversityPark:PennsylvaniaStateUniversity,1994).
PatriciaKing,VipersintheBurbs,Newsweek,15July1996
MatthewJ.Littleton,InformationAgeTerrorism:TowardCyberterror,NavelPostgraduate
School,Monterey,CA,December1995,asfoundat:
http://www.fas.org/irp/threat/cyber/docs/npgs/terror.htm.
AndrewMacdonald(pseudonymforPierce),TheTurnerDiaries:ANovel(Hillsboro,WV:
NationalVanguard,1999[1980]),passim.
Cesar Adib Majul, The Contemporary Muslim Movement in the Philippines (Berkeley: Mizan,
1985).
ThomasM.McKenna,MuslimRulersandRebels:EverydayPoliticsandArmedSeparatisminthe
SouthernPhilippines(Berkeley:UniversityofCalifornia,1998).
W.K.CheMan,MuslimSeparatism:TheMorosofSouthernPhilippinesandtheMalaysofSouthern
Thailand(Singapore:OxfordUniversity,1990).
MilitiaOperationPlanAmericanViper(DelCity,OK:UnitedSovereigns,nodate).
[alQ`ida],IalnalJihdalaalTawghtalBild(nopublicationinformation)
RobertRamsay,TheCorsicanTimeBomb(Manchester:ManchesterUniversity,1983).
MagnusRanstorp,TerrorismintheNameofReligion,inRussellD.HowardandReidL.
Sawyereds.,TerrorismandCounterterrorism:UnderstandingtheNewSecurityEnvironment
(Guilford,CT:McGrawHill,2002).
RemarksbythePresidenttothePhilippineCongress,fulltextonWhiteHousewebsite,18
October2003:www.whitehouse.gov/news/releases/2003/10/print/2003101812.html
SimonReeve,TheNewJackals:RamziYousef,OsamabinLadinandtheFutureofTerrorism
(Boston:NortheasternUniversity,1999).
MariaA.Ressa,SeedsofTerror:AnEyewitnessAccountofAlQaedasNewestCenterofOperations
inSoutheastAsia(NewYork:FreePress,2003).
193
JeanMichelRossiandFranoisSantoni,Poursoldedetoutcompte:Lesnationalistescorsesparlent
(Paris:Denol,2000).
BarryRubin,ed., RevolutionariesandReformers:ContemporaryIslamistMovementsintheMiddle
East(Albany,NY:StateUniversityofNewYork,2003).
JeanPierreSantini,FrontdeLibrationNationaledelaCorse:Delombrelalumire(Paris:
LHarmattan,2000).
AlexP.SchmidandAlbertJ.Jongman,PoliticalTerrorism:ANewGuidetoActors,Authors,
Concepts,DataBases,TheoriesandLiterature(Amsterdam:NorthHolland,1988).
ElaineShannon,LearningfromTerrorAlerts,Time,14July2004.
EdmondSimeoni,LepigedAlria:LesraisonsdelacolredesCorses(Paris:J.C.Latts,1976).
CaptainRobertL.Snow,TheMilitiaThreat:TerroristsAmongUs(NewYorkandLondon:
PlenumTrade,1999).
AnthonySpaeth,FirstBali,nowDavao,Time[Asia],10March2003.
BronTaylor,Religion,Violence,andEnvironmentalism,TerrorismandPoliticalViolence,Vol.
10,#4,Winter1998.http://www.religionandnature.com/bron/TPV%20article.htm.
TerrorfromtheRight,SPLCIntelligenceReport102,(Summer2001).
U.S.DepartmentofState,1996PatternsofGlobalTerrorism(Washington,DC:Government
PrintingOffice,1997),asfoundat:
http://www.state.gov/www/global/terrorism/annual_reports.html
UnitedStatesDistrictCourt,DistrictofColorado,UnitedStatesofAmericav.TimothyJames
McVeighandTerryLynnNichols.
UnitedStatesDistrictCourt,SouthernDistrict,UnitedStatesofAmericav.OmarAhmadAli
AbdelRahman.
BenVenzkeandAimeeIbrahim,ThealQaedaThreat:AnAnalyticalGuidetoalQaedasTactics
andTargets(Alexandria,VA:Tempest,2003).
Marites Daguilan Vitug and Glenda M. Gloria, Under the Crescent Moon: Rebellion in
Mindanao (Quezon City: Ateneo Center for Social Policy and Public Affairs/Institute for
PopularDemocracy,2000).
194
CriticalInfrastructureBibliography*
RobertF.Dacey,CriticalInfrastructureProtection:ChallengesinSecuringControlSystems,
InformationSecurityIssues,TestimonybeforetheSubcommitteeonTechnology,Information
Policy,IntergovernmentalRelations,andtheCensus,HouseCommitteeonGovernment
Reform,October1,2003.
DepartmentofDefenseCriticalInfrastructureProtection(CIP)Plan,APlaninResponseto
PresidentialDecisionDirective63CriticalInfrastructureProtection,PreparedbyDASD
(SecurityandInformationOperations)CriticalInfrastructureProtectionDirectorate,November
18,1998.
DepartmentofJustice,AssessmentoftheIncreasedRiskofTerroristorOtherCriminalActivity
AssociatedwithPostingOffSiteConsequenceAnalysisInformationontheInternet,April18,
2000.
ExecutiveOrder13010CriticalInfrastructureProtection,FederalRegister,Vol.6,No.138,July17,
1996.
EPICsTestimonytotheHouseSubcommitteeonOversightandInvestigationsonCreatingthe
DepartmentofHomelandSecurity:ConsiderationoftheAdministrationsProposal,July9,
2002.
EPICsTestimonytotheSenateCommitteeonGovernmentalAffairsonSecuringOur
Infrastructure:Private/PublicInformationSharing,May8,2002.
EPICsLettertotheHouseJudiciaryCommittee,SubcommitteeonCrime,onH.R.3482,The
CyberSecurityEnhancementActof2002,February26,2002.
EPICsTestimonytotheHouseGovernmentReformCommitteeonH.R.4246,TheCyber
SecurityInformationAct,June22,2000.
EPICsTestimonytotheSenateJudiciaryCommitteeonCyberAttack:TheNationalProtection
PlananditsPrivacyImplications,February1,2000.
EPICPressReleaseonNationalPlanforInformationSystemsProtection,February1,2000.
ExecutiveSummaryofNationalPlanforInformationSystemsProtection,January7,2000.
JeffreyHunker,CIAO,memotoCICGMembersregardingOffsiteMaterials.Obtainedby
EPICundertheFreedomofInformationAct.
RonaldD.Lee,AssociateDeputyAttorneyGeneral,DepartmentofJustice,memotoJeffrey
Hunker,Director,CriticalInfrastructureAssuranceOfficeregardingtheNationalInformation
*
ThisbibliographywaspreparedbyAndrewJayne.
195
SystemsProtectionPlan,March8,1999.ObtainedbyEPICundertheFreedomofInformation
Act.
JohnMoteff,CriticalInfrastructure:APrimer,CongressionalResearchService,Received
ThroughCRSWeb,August13,1998.
JohnMoteff,CriticalInfrastructures:Background,PolicyandImplementation,Congressional
ResearchService,ReceivedThroughCRSWeb,February4,2002.
NationalStrategyforthePhysicalProtectionofCriticalInfrastructuresandKeyAssets,
February2003.
ReportofthePresidentsCommissiononCriticalInfrastructureProtection,Protecting
AmericasInfrastructures,October1997.
LindaJoSchierow,ChemicalPlantSecurity,ReportforCongress,CongressionalResearch
Service,ReceivedThroughCRSWeb,UpdatedJanuary23,2003.
TranscriptofWhiteHousePressBriefingonCyberSecurity,January7,2000.
UnitedStatesGeneralAccountingOffice,CriticalInfrastructureProtection:Challengesfor
SelectedAgenciesandIndustrySectors,ReporttotheCommitteeonEnergyandCommerce,
HouseofRepresentatives,February2003.
UnitedStatesGeneralAccountingOffice,CriticalInfrastructureProtection:Significant
ChallengesinDevelopingNationalCapabilities,ReporttotheSubcommitteeonTechnology,
Terrorism,andGovernmentInformation,CommitteeontheJudiciary,U.S.Senate,April2001.
UnitedStatesGeneralAccountingOffice,TransportationSecurityResearch:Coordination
NeededinSelectingandImplementingInfrastructureVulnerabilityAssessments,May2003.
WhiteHouse,DefendingAmericasCyberspace:NationalPlanforInformationSystems
Protection,Version1.0,2000.
WhiteHouseNationalPlanforInformationSystemsProtection,January7,2000.
WhiteHouse,PresidentialDecisionDirective(PDD)/NSC63:CriticalInfrastructureProtection,
May22,1998.
WhiteHousePressReleaseonCyberSecurity,January7,2000.
CrITICDatabaseBibliography
ChristopherDobsonandRonalPaynes,TheWeaponsofTerror(London:McMillan,1979).
EdwardF.Mickolus,Terrorism,19881991:AChronologyofEventsandaSelectivelyAnnotated
Bibliography,BibliographiesandIndexesinMilitaryStudies,Number6(GreenwoodPress,1993).
EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:A
ChronologyofEvents,(Ames:IowaStateUniversityPress,1989).Vol.2,19841987.FirstEdition.
EdwardF.Mickolus,ToddSandler,JeanM.Murdock,InternationalTerrorisminthe1980s:A
ChronologyofEvents,(Ames:IowaStateUniversityPress,1989).Vol.1,19801983.FirstEdition.
EdwardF.Mickolus,TransnationalTerrorism:AChronicleofEvents,19681979,(London:
ALDWYCHPress,1980).
ColinRobson,RealWorldResearch:AResourceforSocialScientistsandPractitionerResearchers
(Oxford:BlackwellPublishers,1993).
Dr.JoshuaSinai,ICTConference:ExpertonValue,MethodsofForecastingTerroristIncidents,
FBISReport,DocumentID:GMG20031202000085,September9,2003.
AppendixI:CHARTSDERIVEDFROMCrITIC*
90
80 79 79
77
70
60
54
53
52
50
40 40
40 38
39
37
35
33 33
32
31
30
30
24
23
21
20
20 19
18
16
15
14
13
12
11 11 11
10 8
9
8
9
7
6
5
4
3
2 2 2 2
1 1 1 1 1 1 1
0
1990
1992
1994
1996
1998
2000
2002
1933
1939
1946
1951
1958
1964
1966
1968
1970
1972
1974
1976
1978
1980
1982
1984
1986
1988
2004
*
ThisappendixwaspreparedbyPraveenAbhayaratne,CharlesBlair,andSundaraVadlamudi.
0
50
100
150
200
250
300
350
324
Europe
282
Latin America & Carribbean
171
Asia
141
85
USA & Canada
53
Sub-Saharan Africa
18
Australia & Oceania
AI-2. Total Number of Major and Minor CI Attacks by Region
10
Russia & NIS
198
199
State Sponsored
1%
Single Issue
2%
Personal/Idiosyncratic
4%
Other
5%
Secular Utopian
27%
Religious
11%
Unknown
24%
Ethno-Nationalist
26%
200
State Sponsored
1%
Criminal
1%
Single Issue
1%
Personal/Idiosyncratic
2%
Other
6%
Religious
7%
Unknown
43%
Ethno-Nationalist
15%
Secular Utopian
24%
201
9
Ethnic/Nationalist/Separatist/Irre
dentist
Other
8
Personal/Idiosyncratic
Religious
Secular Utopian
7
Single Issue
0
1930 1940 1950 1960 1970 1980 1990 2000 2010
202
Criminal
16 Ethnic/Nationalist/Separatist/Irred
entist
Other
Personal/Idiosyncratic
14
Religious
Secular Utopian
12
Single Issue
10
0
1920 1930 1940 1950 1960 1970 1980 1990 2000 2010
203
30
25
20
15
10 Sub-Saharan Africa
Russia & NIS
Middle East & North Africa
5 Latin America & Carribbean
Europe
Australia & Oceania
0
Asia
Ethno-Nationalist
Other
Personal/Idiosyncratic
Secular Utopian
Single Issue
State Sponsored
204
120
100
80
60
40
Criminal
20 Ethno-Nationalist
Other
Personal/Idiosyncratic
0
Religious
Asia
Secular Utopian
Australia & Oceania
Europe
Single Issue
Latin America & Carribbean
State Sponsored
Middle East & North Africa
Unknown
Sub-Saharan Africa
Hijacking
Other
Sniping, Shooting
Unknown
Delivery Method
Ethno-Nationalist
Other
Personal/Idiosyncratic
Religious
Secular Utopian
Single Issue
State Sponsored
AI-9. Attributable Major CI Attacks by Perpetrator Category and
0
5
10
15
20
25
30
205
Bombing (Landmines)
Bombing (Pressure)
Bombing (Suicide)
Bombing (Unknown)
Combination
Firebombing (Molotov cocktails, etc)
Other
Other (Sticks and Stones)
Other (Styrofoam balls)
Projectiles (Grenades, Mortars, Missiles)
Unknown
Criminal
Ethnic/Nationalist/Separatist/Irredentist
Other
Personal/Idiosyncratic
Religious
Perpetrator Category & Delivery Method
Secular Utopian
AI-10. Confirmed Major & Minor Attacks by
Single Issue
State Sponsored
Unknown
0
50
100
150
200
250
206
207
Single Issue
0%
State Sponsored
0%
Secular Utopian
11% Ethno-Nationalist
16%
Other
0%
Personal/Idiosyncratic
0%
Religious
73%
208
State Sponsored
2%
Criminal
Single Issue 1%
0%
Secular Utopian
Ethno-Nationalist
11%
17%
Personal/Idiosyncratic
1%
Other
1%
Religious
67%
209
Unknown
1% Personal/Idiosyncratic
Secular Utopian 0%
2%
Ethno-Nationalist
17%
Religious
80%
210
Single Issue
0%
Other
1%
Personal/Idiosyncratic
1%
Criminal
1%
State Sponsored
2%
Secular Utopian
3%
Unknown
7%
Ethno-Nationalist
16%
Religious
69%
211
Unknown
1%
Personal/Idiosyncratic
State Sponsored 0%
0%
Ethno-Nationalist
7%
Single Issue
0% Other
0%
Religious
35%
Secular Utopian
57%
212
Criminal
Unknown Ethno-Nationalist 11%
1%
8%
State Sponsored Other
4% 1%
Religious
31%
Secular Utopian
44%
213
1200
1032
1000
818
800
600
400
200 169
12
0
Socialist/Communist Islamic Right-Wing Cults
A
rm
en
i an
Se Po
Re cr pu
vo et la M
Tu 1
lu A N rF pa 7 N
iot rm at r
oz cA o
na y i on Li am m vem
ry f o ona t f be b ar M Re
A rt lL or ra ica u ber or
he ib A th tio n Re R
Pe
o Ch Co o vo
Sh rm N L er f N v e p u m P e I s lu
in e r eL n at ol v o le ka m o l a t io
in Eu Ir d F atio ibe atio ic a i b
Ti
g i o u t lu ' s k u n p l m
g i r n er er na io t i i s N e' s i c
na
Pa ska sh R orc nal atio n F Na at R o Re u-
vo ha t C w e Li Li Re ry P
th di e es io s of l Re e d nary nar l ( o P b b v o
(S ta pu of be of
Li n ron tio
n n ut M e er
A t of a l of Tam sist Arm M y O
a o io id mba eop rat Di at Mu olut pula
en As bli Co ra
c t i rm C C P i n y v r g n d l t a l e i o r e i o j a i o r
de k al
es l Ee c e Fa em a ni ar
y e C nt 's A n F ct A n
ro ata an A lom on A en ors ong
L su b i a i c r t i l a (R c t e n za A o C rm o r c I p
Fr hed nary Stru
o e
In r ia r a e n m io t t rm re e c n e C g
di umi na ( my Fa lls ( y ( es tion arre t (M n-e ell gle
vi n E (
(F my (AS (F ss ( Al-Q e (P (L ENA n ( (M ion Om y
A ( A L A F R R ( e ( c C N ( F ( t a - K s (
du os T IR R E N N a L TT MO AF TA 17N ga ER tio CC PA PL AD rra ILF ha (R ELA
a l o) A) A) C ) LN ) LA) C) C ) `ida P) E) ) ) ) ) -7 P ) n) ) ) ) ) k ) lq Z) )
0
4
4
4
4
4
4
5
5
5
5
6
6
6
7
7
7
7
8
8
8
9
9
10
13
15
16
17
20
Attributable to Specific Groups
AI-18. Number of Major & Minor CI Attacks
25
40
214
215
Unknown
Other 0%
0%
Sabotage (Arson,
Siege & Hostage Taking Electrical Failure, etc.)
1% 0%
Sniping, Shooting
1% Bombing (Remote
Triggered)
Projectiles (Grenades,
0%
Mortars, Missiles)
1% Bombing (Letter)
0%
Bombing (Timefuse)
2%
Combination
13% Bombing (Unknown)
45%
Bombing (Vehicle)
37%
216
2010
2000
1990
1980
1970
Decade
1960
1950
1940
1930
1920
0 200 400 600 800 1000 1200 1400
Number of Fatalities
217
AppendixII:DECIDeFRAMEWORKWORKSHEET*
*Note to User: This worksheet is designed to be used in conjunction with the analytical framework
outlined in Chapter 5.
Step 1
Step 2
DIRECTIONS: Collect additional information on group and its environment. Refer to Figure 5.3
for questions to guide data collection. When data is gathered proceed to Step 3.
Step 3
DIRECTIONS: Follow the DECIDe Framework analysis process detailed in Chapter 5. Insight or
information gained from consideration of each factor may be recorded in the spaces provided
below. Where Attractiveness or Capability is measured, record identified values in spaces on
the left-hand side of the page. To facilitate final Determination of Intent at the conclusion of the
framework, it is recommended that a brief note justifying each value determination be recorded.
For consistency, [A] is used to denote the Attractiveness to the group of attacking critical
infrastructure targets and [C] to denote the terrorists perceived Capability to engage in a
serious attack against critical infrastructure targets. Increases or decreases are represented by
+ or - signs as follows:
*
TheDECIDeFrameworkworksheetwasdevelopedbyKevinS.MoranandAndrewJayne.
218
3.1 Ideology
1. ____ __________________________________________________________
__________________________________________________________
2. ____ __________________________________________________________
__________________________________________________________
3. ____ __________________________________________________________
__________________________________________________________
1. ____ __________________________________________________________
__________________________________________________________
2. ____ __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
219
3.4 Demographics
1. ____ __________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
3.5 Resources
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
1. ____ __________________________________________________________
__________________________________________________________
2. ____ __________________________________________________________
__________________________________________________________
3. ____ __________________________________________________________
__________________________________________________________
4. ____ __________________________________________________________
__________________________________________________________
220
1. ____ __________________________________________________________
__________________________________________________________
__________________________________________________________
Attractiveness
__________________________________________________________
1. ____ __________________________________________________________
__________________________________________________________
1. ____ __________________________________________________________
__________________________________________________________
Capability
__________________________________________________________
221
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
222
Step 4
DIRECTIONS: Evaluate groups operational objectives using the data recorded above and the
process found on pages 145 148. Record identified operational objectives in the space below.
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
Infrastructure:________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
226
AppendixIII:STATISTICALANALYSISRESULTS*
ThisappendixcontainsoutputfromthestatisticalanalysisperformedontheCrITICdataset.
ThesefindingsarethebasisforthediscussionfoundinChapter4.
A.TwoWayANOVATestbetweentheTypesofTerrorist
CategoriesandtheNumberofAttacksoverDecades
Between-Subjects Factors
Value
Label N
PERPCAT 1 Criminal 51
2 Ethnic/Nati
onalist/Sep 51
aratist
3 Other 51
4 Personal/I
diosyncrati 51
c
5 Religious 51
6 Secular/Ut
51
opian
7 Single
51
Issue
8 State
51
Sponsored
9 Unknown 51
YEAR 1 1960s and
144
before
2 1970s 90
3 1980s 90
4 1990s 90
5 2000s 45
*
ThisappendixwaspreparedbySeanLucasandSundaraVadlamudi.
227
Descriptive Statistics
B.MultipleDiscriminantAnalysis
Discriminant
Group Statistics
Wilks'
Lambda F df1 df2 Sig.
infrastructure
attacked(perpcat) major .955 5.076 10 1069 .000
confirmed cases
SUCATT .986 1.533 10 1069 .122
claim of responsibility all
.972 3.128 10 1069 .001
cases
YEAR .939 6.955 10 1069 .000
BoxsTestofEqualityofCovarianceMatrices
Log Determinants
Log
ATTTYPE Rank Determinant
1 4 -3.150
2 4 -1.848
3 .a .b
4 3 .c
5 .a .b
6 3 .c
7 3 .c
8 4 -2.538
9 3 .c
10 3 .c
11 3 .c
Pooled within-groups 4 -3.513
The ranks and natural logarithms of determinants printed are
those of the group covariance matrices.
a. Rank < 1
b. Too few cases to be non-singular
c. Singular
232
Test Resultsa
Box's M 87.038
F Approx. 4.133
df1 20
df2 16220.583
Sig. .000
Tests null hypothesis of equal population covariance matrices.
a. Some covariance matrices are singular and the usual
procedure will not work. The non-singular groups will
be tested against their own pooled within-groups
covariance matrix. The log of its determinant is -2.959.
SummaryofCanonicalDiscriminantFunctions
Eigenvalues
% of Cumulative Canonical
Function Eigenvalue Variance % Correlation
1 .077a 49.6 49.6 .268
2 .052a 33.4 83.1 .223
3 .023a 14.6 97.6 .149
4 .004a 2.4 100.0 .061
a. First 4 canonical discriminant functions were used in the
analysis.
Wilks' Lambda
Wilks'
Test of Function(s) Lambda Chi-square df Sig.
1 through 4 .859 162.400 40 .000
2 through 4 .926 82.495 27 .000
3 through 4 .974 28.040 16 .031
4 .996 3.983 7 .782
233
Function
1 2 3 4
infrastructure
attacked(perpcat) major .529 .608 -.650 -.023
confirmed cases
SUCATT .251 .120 .439 .866
claim of responsibility all
.302 .366 .702 -.536
cases
YEAR -.880 .518 .144 .028
Structure Matrix
Function
1 2 3 4
YEAR -.729* .677 .037 .099
infrastructure
attacked(perpcat) major .369 .768* -.521 .050
confirmed cases
claim of responsibility all
.339 .414 .680* -.501
cases
SUCATT .243 .254 .406 .843*
Pooled within-groups correlations between discriminating variables and
standardized canonical discriminant functions
Variables ordered by absolute size of correlation within function.
*. Largest absolute correlation between each variable and any
discriminant function
Function
ATTTYPE 1 2 3 4
1 .173 1.541E-02 -3.31E-02 -9.62E-03
2 .211 .442 .702 .245
3 -1.200 1.302 -.858 .236
4 -.127 -.487 -3.66E-02 6.990E-02
5 -1.069 1.453 -1.019 .230
6 -.720 .125 -.145 .109
7 -.330 -.244 .114 -1.75E-02
8 3.851E-02 .502 5.348E-04 -2.81E-02
9 -.625 .198 .476 -.240
10 -.275 -.125 2.495E-02 -2.62E-02
11 -.614 .564 -.272 7.088E-03
Unstandardized canonical discriminant functions evaluated at
group means
234
C.OneWayANOVATestbetweentheNumberofCasualtiesand
theDifferentTypesofAttack
Descriptives
5% Confidence Interva
for Mean
Std. Lower Upper
N Mean Deviation Std. Error Bound Bound MinimumMaximum
fatalities 1 680 3.6691 34.1291 1.3088 1.0994 6.2389 .00 741.00
2 24 16.3750 57.6382 11.7653 -7.9635 40.7135 .00 275.00
3 1 .0000 . . . . .00 .00
4 80 .1125 .7115 954E-024.583E-02 .2708 .00 6.00
5 1 .0000 . . . . .00 .00
6 42 5.7857 29.5045 4.5526 -3.4085 14.9800 .00 188.00
7 101 .3960 2.1311 .21212.467E-02 .8167 .00 20.00
8 41 .1707 .5875 175E-02 .470E-02 .3562 .00 3.00
9 24 1.4167 4.8357 .9871 -.6253 3.4586 .00 22.00
10 57 .6140 1.8685 .2475 .1183 1.1098 .00 9.00
11 29 .3103 .8906 .16542.841E-02 .6491 .00 4.00
Total 1080 3.0231 29.0644 .8844 1.2878 4.7585 .00 741.00
injuries 1 680 17.3118 180.8109 6.9338 3.6975 30.9260 .00 4000.00
2 24 67.3750 293.1098 59.8308 -56.3944 191.1444 .00 1440.00
3 1 .0000 . . . . .00 .00
4 80 1.1125 6.9099 .7725 -.4252 2.6502 .00 60.00
5 1 .0000 . . . . .00 .00
6 42 27.1429 160.2252 24.7233 -22.7868 77.0726 .00 1038.00
7 101 .7624 2.7682 .2754 .2159 1.3089 .00 18.00
8 41 3.3902 13.3321 2.0821 -.8179 7.5984 .00 78.00
9 24 6.2500 24.6140 5.0243 -4.1436 16.6436 .00 120.00
10 57 1.3509 3.5076 .4646 .4202 2.2816 .00 17.00
11 29 1.5172 3.8043 .70647.015E-02 2.9643 .00 17.00
Total 1080 13.9861 153.3913 4.6675 4.8276 23.1446 .00 4000.00
total number of casu 1 680 20.9809 198.0152 7.5935 6.0713 35.8905 .00 4213.00
2 24 83.7500 315.4252 64.3859 -49.4424 216.9424 .00 1523.00
3 1 .0000 . . . . .00 .00
4 80 1.2250 7.5624 .8455 -.4579 2.9079 .00 66.00
5 1 .0000 . . . . .00 .00
6 42 32.9286 165.9151 25.6013 -18.7742 84.6314 .00 1050.00
7 101 1.1584 4.2420 .4221 .3210 1.9958 .00 34.00
8 41 3.5610 13.5979 2.1236 -.7310 7.8530 .00 79.00
9 24 7.6667 29.0960 5.9392 -4.6195 19.9528 .00 142.00
10 57 1.9649 4.8512 .6426 .6777 3.2521 .00 23.00
11 29 1.8276 4.0889 .7593 .2722 3.3829 .00 17.00
Total 1080 17.0093 167.5169 5.0974 7.0074 27.0112 .00 4213.00
235
Levene
Statistic df1 df2 Sig.
fatalities 2.628 10 1069 .004
injuries 1.831 10 1069 .051
total number of casualties 2.318 10 1069 .011
ANOVA
Sum of Mean
Squares df Square F Sig.
fatalities Between Groups 7215.674 10 721.567 .853 .577
Within Groups 904258.748 1069 845.892
Total 911474.421 1079
injuries Between Groups134159.353 10 13415.935 .568 .841
Within Groups 25253513 1069 23623.492
Total 25387673 1079
total number of casualtie Between Groups203254.956 10 20325.496 .722 .704
Within Groups 30075547 1069 28134.282
Total 30278802 1079
236
D.OneWayANOVATestbetweentheTypesofTerroristGroups
andtheNumberofCasualties
Descriptives
% Confidence Inte
for Mean
Std. Lower Upper
N Mean Deviation
Std. Erro Bound Bound MinimumMaximum
fatalities Criminal 7 2.4286 6.4254 2.4286 -3.5139 8.3711 .00 17.00
Ethnic/Nationalist/ 162 2.3580 12.3417 .9697 .4431 4.2729 .00 115.00
Other 66 3.1667 20.9847 2.5830 -1.9920 8.3253 .00 169.00
Personal/Idiosync 19 .3684 1.3829 .3172 -.2981 1.0349 .00 6.00
Religious 91 3.7143 48.4661 5.0806 3.6207 23.8078 .00 317.00
Secular/Utopian 300 3.6667 45.5886 2.6321 -1.5130 8.8464 .00 741.00
Single Issue 15 67E-02 .2582 67E-02632E-02 .2097 .00 1.00
State Sponsored 9 0.8889 31.9235 0.6412 13.6497 35.4275 .00 96.00
Unknown 411 .4939 2.7125 .1338 .2309 .7569 .00 32.00
Total 1080 3.0231 29.0644 .8844 1.2878 4.7585 .00 741.00
injuries Criminal 7 6.4286 43.4659 6.4286 23.7707 56.6278 .00 115.00
Ethnic/Nationalist/ 162 4.0556 14.9014 9.0275 -3.7720 31.8832 .00 440.00
Other 66 9.0758 61.6133 7.5841 -6.0707 24.2222 .00 500.00
Personal/Idiosync 19 5.1053 17.9811 4.1252 -3.5614 13.7719 .00 78.00
Religious 91 4.7912 92.7062 1.6496 12.1802 17.4022 .00 000.00
Secular/Utopian 300 1.5367 8.5247 .4922 .5681 2.5052 .00 100.00
Single Issue 15 1.2000 2.3664 .6110 -.1105 2.5105 .00 7.00
State Sponsored 9 6.5556 76.7123 5.5708 32.4107 85.5219 .00 231.00
Unknown 411 2.0754 10.4102 .5135 1.0660 3.0848 .00 150.00
Total 1080 3.9861 53.3913 4.6675 4.8276 23.1446 .00 000.00
total number of c Criminal 7 8.8571 49.8913 8.8571 27.2846 64.9989 .00 132.00
Ethnic/Nationalist/ 162 6.4136 23.0849 9.6705 -2.6837 35.5109 .00 523.00
Other 66 2.2424 82.5078 0.1560 -8.0405 32.5254 .00 669.00
Personal/Idiosync 19 5.4737 18.2006 4.1755 -3.2987 14.2461 .00 79.00
Religious 91 8.5055 28.2251 5.3730 18.4973 38.5137 .00 213.00
Secular/Utopian 300 5.2033 52.9590 3.0576 -.8138 11.2205 .00 841.00
Single Issue 15 1.2667 2.3745 .6131827E-02 2.5816 .00 7.00
State Sponsored 9 7.4444 08.6337 6.2112 46.0588 20.9477 .00 327.00
Unknown 411 2.5693 12.1864 .6011 1.3877 3.7510 .00 175.00
Total 1080 7.0093 67.5169 5.0974 7.0074 27.0112 .00 213.00
237
Levene
Statistic df1 df2 Sig.
fatalities 5.471 8 1071 .000
injuries 18.502 8 1071 .000
total number of casualties 18.379 8 1071 .000
ANOVA
Sum of Mean
Squares df Square F Sig.
fatalities Between Groups14052.090 8 1756.511 2.096 .034
Within Groups 897422.332 1071 837.929
Total 911474.421 1079
injuries Between Groups1036521.3 8 29565.157 5.698 .000
Within Groups 24351152 1071 22736.836
Total 25387673 1079
total number of casualtie Between Groups1270355.6 8 58794.454 5.863 .000
Within Groups 29008446 1071 27085.384
Total 30278802 1079
238
E.OneWayANOVATestbetweentheTypeofInfrastructure
AttackedandthenumberofFatalities,Injuries,andCasualties.
Descriptives
Levene
Statistic df1 df2 Sig.
fatalities 3.534 19 1060 .000
injuries 3.063 19 1060 .000
total number of casualties 3.125 19 1060 .000
ANOVA
Sum of Mean
Squares df Square F Sig.
fatalities Between Groups 18229.851 19 959.466 1.139 .305
Within Groups 893244.570 1060 842.684
Total 911474.421 1079
injuries Between Groups 606108.292 19 31900.436 1.365 .135
Within Groups 24781564 1060 23378.834
Total 25387673 1079
total number of casualties Between Groups 713513.705 19 37553.353 1.346 .145
Within Groups 29565288 1060 27891.781
Total 30278802 1079
AppendixIV:POSSIBLEMODELEXTENSIONS*
Alargenumberofthreatassessmentmodelswerereviewed,analyzed,andtakenintoaccountduringthedevelopmentoftheDECIDeFramework.Manyof
theseapproachesmaystillofferadditionalwaystoextendandenhancetheworkpresentedinthisstudy.(Alternatively,someoftheseapproachesmaybe
enhancedorextendedbytheDECIDeFramework.)Thisappendixbrieflydescribesthekeymodelsthatmeritfurtherconsideration.
Risk DoD U.S. General Accounting Office. "Combating Terrorism: Threat And Risk A multidisciplinary team of experts is used to identify and evaluate
Management Assessments Can Help Prioritize and Target Program Investments". threats, assets criticality, vulnerabilities, and countermeasures to
Approach GAO/NSIAD-98-74. manage or reduce risk. This information is used to generate specific
threat scenarios from valid intelligence and threat data that are then
U.S. General Accounting Office, Combating Terrorism: Actions Needed to paired against vulnerabilities in critical assets. Weights or values are
Guide Services Antiterrorism Efforts at Installations, November 2002. assigned to these threat-asset vulnerability pairings according to the
likelihood of such events occurring and the consequences of assets
National Infrastructure Protection Center, Risk Management: An Essential being compromised or attacked.
Guide to Protecting Critical Assets, November 2002.
http://www.nipc.gov/publications/nipcpub/P-Risk%20Management.pdf The required assessments of threat, vulnerability and criticality of
assets form the foundation of each installations antiterrorism plan and
support a risk management approach to resource allocation. These
three assessments are designed to assess (1) the threats to the
installation, (2) the installations vulnerabilities, and (3) the installations
critical assets.
*
ThisappendixwaspreparedbyCharlesBlair,AndrewJayneandKevinS.Moran.
241
Wheel of Crises Ian I. Mitroff & Murat Ian I. Mitroff, Murat C. Alpaslan, Preparing for Evil, Harvard Business Two executives think more broadly about potential crises, a wheel is
C. Alpaslan Review, April 2003. spun on which a variety of categories of crises are listed. After each
spin, executives are required to consider and discuss all the normal and
abnormal crises of that particular kind they can imagine. The categories
on the wheel are: 1) Criminal Crises such as product tampering,
kidnapping or hostage taking, and acts of terrorism; 2) Information
Crises such as theft of proprietary information, tampering with official
records, and cyber attacks; 3) Reputation Crises such as rumors and
logo tampering.
Bioterrorism Bruce Hope Bruce K. Hope, A Risk Assessment Perspective on Bioterrorist Threats to the Hope proposes a five part assessment method to evaluate, anticipate
Threat U.S. Food Supply, unpublished paper. and manage various bio-threat scenarios. The five parts include:
Assessment
1) Problem Formulation- Defining the attack scenario (target and
exposure mode) and target (an asset and one or more of its attributes
potentially at risk, considering the bioterrorists motivations and
objectives);
answer to the risk question posed here, and (c) identifying data needed
for an empirically more robust model.
Brief Adversary Sandia National Harry F. Martz and Mark E. Johnson, Risk Analysis of Terrorist Attacks, Risk This model is designed to be a simple, flexible, low resolution model
Threat Loss Laboratories (SNL) Analysis 7, (1987). which can be readily used to assess the security of many different kinds
Estimator of systems. The model provides analytical probabilistic output of the
(BATLE) outcome of a small-scale engagement between an adversary and
security force. It uses a semi-Markov probability model to represent the
engagement and considers such combatant characteristic as force size,
posture, proficiency, delay tactics, weapons type, and defense or
assault tactics. Site parameters include cover, illumination intensity,
security reinforcements, and range of the engagement. In calculating
P(Ws) no security response force reinforcements are incorporated,
because only the guard force is involved in the engagement. The output
consists of both transient and steady state probability distributions of the
surviving number of adversaries and guards.
SILENT Center for Strategic Philip Anderson, Threat-Vulnerability Integration: A Methodology for Risk The Threat-Vulnerability Integration Analysis depicts a level of risk that
VECTOR: and International Assessment, Center for Strategic and International Studies, Washington D.C. takes into consideration known or implied terrorist capabilities against
Recommended Studies (CSIS) the vulnerabilities of selected targets. Along the horizontal axis, it
Threat- assumes input that results from a systematic, continuous process of
Vulnerability analyzing terrorist intent, capabilities, tactics and the environment in
Integration which he will operate a view from the terrorist perspective. Along the
Analysis vertical axis, the methodology assumes input that results from a
systematic, continuous process of analyzing the vulnerability of targets
within the United States including target attractiveness again, from
the terrorist perspective.
Federal Security General Services Nancy A. Renfroe, and Joseph L. Smith, Threat/Vulnerability Assessments A combination of the impact of loss rating and the vulnerability rating
Risk Administration (GSA) and Risk Analysis, Whole Building Design Guide, Accessed on 03/11/2004 can be used to evaluate the potential risk to the facility from a given
Management at: http://www/wbdg/org/design/res-print.php?rp=27 threat.
(FSRM)
OPSEC Interagency OPSEC Chris Hawley, Gregory G. Noll, and Michael S. Hildebrand, Operations The OPSEC process consists of five different steps: 1) identifying
PROCESS Support Staff Security for Public Safety Agencies: Special Operations for Terrorism and critical information; 2) conducting a threat analysis; 3) performing a
Hazmat Crimes, Interagency Operations Security (OPSEC) Support Staff, vulnerability analysis; 4) assessing risks; and 5) applying
Operations Security, Monograph Series. countermeasures.
And / Or Attack Bruce Schneier Bruce Schneier, Secrets and Lies: Digital Security in the Networked World Attack trees provide a methodical way of describing threats against,
Tree (Wiley Publishing, Inc., 2004). and countermeasures protecting, a system. () Basically, you
represent attacks against a system in a tree structure, with the goal as
the root node and different ways of achieving the goal as leaf nodes. By
assigning values to the nodes, you can do some basic calculations with
the tree to make statements about different attacks against the goal.
Exploratory Paul K. Davis, James Paul K. Davis, James H. Bigelow, and Jimmie McEver, Exploratory Analysis A key to treating uncertainty well is exploratory analysisThe
Analysis H. Bigelow, & Jimmie and a Case History of Multiresolution, Multiperspective Modeling, Reprinted objectives of exploratory analysis include understanding the implications
McEver from Proceedings of the 2002 Winter Simulation Conference, Jeffrey A. of uncertainty for the problem at hand and informing the choice of
Joines, Russell R. Barton, K. Kang, and Paul A. Fishwick (editors), December strategy and subsequent modifications. To do so, input uncertainties
2000 and Proceedings of the SPIE, Vol.4026, 2000. (i.e., parametric uncertainties) and structural uncertainty must be
identified. Input uncertainty relates to imprecise knowledge of the
models input values. Structural uncertainty relates to questions about
the form of the model itself: Does it reflect all the variables on which the
real-world phenomenon purportedly described by the model depends?
Is the analytical form correct? Input exploration, which can help address
some of these uncertainties, involves conducting model runs across the
space of cases defined by discrete values of the parameters within their
plausible domains. Probabilistic exploration represents uncertainty
about the input parameters through distribution functions representing
the totality of ones so-called objective and subjective knowledge. The
preferred approach treats some uncertainties parametrically and others
with uncertainty distributions. That is, it is hybrid exploration.
244
ITERATE Edward F. Mickolus, How Do We Know Were Winning the War Against Taking an events approach, one assumes that the behaviors of
Database: Terrorists? Issues in Measurement, Studies in Conflict and Terrorism 25, terrorists are patterned, and that the discovery of these patterns through
Events Approach (2002), pp. 151-160. even the simplest of statistical procedures can be helpful in combating
terrorism. With ITERATE, we code for circa 150 variables in the overall
categories of COMMON aspects and the FATE of terrorists. We also
examine variables that are common to HOSTAGE and HIJACKING
incidents. We look at such things as date and location of the incident,
type of attack, locations of the start and end of the incident (particularly
useful in looking at hijackings), the scene of the crime, characteristics of
the terrorists (who was responsible, number and nationality of the
perpetrators), victim characteristics (number, type, and nationality),
numbers of killed and wounded (separating out by nationality of victim,
terrorists, and response forces), dollar amount of property damage and
type of property damaged, and some information on logistics (was there
an accident or logistic error involved in the terrorists actions, weapons
used, did the terrorists appear to succeed in their logistic aims, i.e., did
the bomb go off, as opposed to did they get publicity?).
Longitudinal Charles Tilly Robert W. White, Issues in the Study of Political Violence: Understanding the Longitudinal Research is a holistic approach in exploring the motives of
Research Motives of Participants in Small Group Political Violence, Frank Cass people who engage in terrorism. Its research is in depth and accounts
Journals Terrorism and Political Violence 12, (Spring 2000), pp. 95-108. for the general political arena that influences, and is influenced by, such
actors. The best research on small-group political violence is
undertaken by researchers who, on some level, interact with the people
being researched.
Predictive Rick Whiting, Companies Boost Sales Efforts with Predictive Analysis, Predictive analysis is a technique that models historical data with
Analysis Information Week, Accessed on 6/7/2002. assumptive future conditions to predict outcomes or events. Predictive
analysis includes forecasting and propensity analysis. Forecasting
identifies trends and predicts future sales, for example. Propensity
analysis uses data-mining algorithms such as regression analysis,
decision trees, clustering, and neural networks to calculate predilections
for certain activities.
Preference Ralph L. Keeney & Ralph L. Keeney and Howard Raiffa, Decisions with Multiple Objectives: The following approach suggests how preference aspects of analysis
Analysis Howard Raiffa Preferences and Value Tradeoffs (Cambridge: Cambridge University Press, might be used more constructively. It involves the following major steps:
1993).
PREANALYSIS. A unitary decision maker is assumed who is undecided
about the course of action he or she should take in a particular problem.
The problem has been identified and the viable action alternatives are
given.
Collective Action Mark Irving Lichbach, The Rebels Dilemma (Ann Arbor: University of As a rational dissident comes to believe that his or her contribution
Modeler Michigan Press, 1998), pp. ix-xiv, 50-99, and 167-77. makes a difference in the likelihood that the primary goal (PG) will be
obtained, his or her participation in collective dissent increases. A basic
corollary follows: participants in collective dissent will report higher
expectations of their personal efficacy than non-participants. Intensity of
demand (zealotry, sect. 3.1) may therefore substitute for personal
efficacy. Thus, the greater a rational dissidents intensity of demand for
a PG, the smaller his or her probability of making a difference needs to
be before he or she participates in collective dissent. Similarly, personal
efficacy may substitute for intensity of demand. Thus, more powerful
dissidents (i.e., those with a greater probability of making a difference)
require less utility differential to participate in collective dissent.
Multiple Model John Monohan et al. John Monohan, et. al., Rethinking Risk Assessment: The MacArthur Study of Multiple models can be combined to produce risk assessments that are
Approach Mental Disorder and Violence (Oxford: Oxford University Press, 2001). much more accurate than any single risk assessment model taken
alone. Crucial is grasping the concept that by combining a large number
of models, each of which contains a different combination of risk factors,
the stability of the risk assessments for each individual is increased
dramatically. Using this multiple model approach, we ultimately
combined the results of five prediction models generated by the Iterative
Classification Tree methodology. The multiple model approach
minimizes the problem of data over-fitting that can result when a single
best prediction model is used.
Game Theory Todd Sandler and Daniel G. Arce M., Terrorism & Game Theory, Simulation Game theory is an appropriate tool for examining terrorism for a
and Gaming 34, (September 2003), pp. 319-337. number of reasons. First, game theory captures the strategic
interactions between terrorists and a targeted government, where
actions are interdependentSecond, strategic interactions among
rational actors, who are trying to act according to how they think their
counterparts will act and react, characterize the interface between
terroristsThird, in terrorist situations, each side issues threats and
promises to gain a strategic advantage. Fourth, terrorists and
246
Qualitative DOE Department of Energy, Energy Infrastructure Vulnerability and Risk To identify and evaluate the threat environment to which an
Adversary Intent Assessment Checklists for State Governments, December 4, 2001. organization may be exposed the following questions should be
Criteria http://www.appanet.org/operations/checklist.pdf answered: What are the specific goals and objectives of the adversary?
What does the adversary gain by achieving these goals? How will the
adversary achieve its goals through exploiting our assets? Is the
adversary aware that the asset exists?
Does the adversary know enough about the asset to plan an attack? Is
the adversary willing to risk being caught? Are there other, less risky
means for an adversary to attain his/her goals? What is the probability
that the adversary will choose one method of attack over another?
What specific events might provoke the adversary to act? What might
the adversary lose in attempting to exploit our assets?
Would that loss be a rational trade-off, from the adversarys
perspective? To what degree is the adversary motivated?
Individual Threat US Secret Service Randy Borum, Robert Fein, BryanVossekuil, and John Berglund, Threat Threat assessment is a set of investigative and operational activities
Assessment Assessment: Defining an Approach for Evaluating Risk of Targeted Violence, designed to identify, assess, and manage persons who may pose a
Behavioral Sciences and the Law 17, (1999), pp. 323-337. threat of violence to identifiable targets. Conceptually, this approach is
innovative in two ways: (1) it does not rely on descriptive, demographic,
or psychological profiles and (2) it does not rely on verbal or written
threats as a threshold for risk. Instead of looking at demographic and
psychological characteristics, the threat assessment approach focuses
on a subject's thinking and behaviors as a means to assess his/her
progress on a pathway to violent action. The question in a threat
assessment is not `What does the subject `look like'? but Has the
subject engaged in recent behavior that suggests that he/she is moving
on a path toward violence directed toward a particular target(s)? To
accurately conduct such a threat assessment, three types of information
about the subject are typically collected; identifying information,
background information, and information about the subject's current
situation and circumstances.
Order Theory Jonathan David Jonathan David Farley, Breaking Al Qaeda Cells: A Mathematical Analysis of Order theory provides a framework for not only breaking up terrorist
Farley Counterterrorism Operations (A Guide for Risk Assessment and Decision networks into disconnected (non-communicating) parts, but also cutting
Making), Studies in Conflict & Terrorism 26, (2003), pp. 399411. the leaders off from the followers. One criterion might be to say that a
terrorist cell has been broken if it is no longer able to pass orders down
247
from the leaders to the foot soldiersthe men and women who,
presumably, will carry out the attacks. This is by no means the only
possible criterion, but it enables us to make precise estimates of the
possibility that our operations have successfully disabled a terrorist cell.
Markov Chain Gordon Woo Dr. Gordon Woo, The evolution of Terrorism Risk Modeling, Risk A Markov chain is defined by the series of states that Al Qaeda
Management Solutions. occupies, and makes transitions to and from. This is a controlled
http://www.rms.com/Publications/EvolutionTerRiskMod_Woo_JournalRe.pdf Markov chain because, whatever state Al Qaeda occupies, the police
and security forces counter the prevailing threat with actions which aim
ton control terrorism... In mathematical terms, these counter-actions are
termed the Markov feedback policy.
Pre-Incident Joshua Sinai Dr. Joshua Sinai, "ICT Conference: Expert on Value, Methods of Forecasting This model creates pre-incident attack observables during the crucial
Attack Terrorist Incidents," FBIS Report, Document ID: GMG20031202000085, incubation period that can be identified, monitored, preempted, and
Observables September 9, 2003. disrupted at the earliest possible phases. The pre-incident incubation
process can be broken into four phases: the formation of a group;
planning an attack; developing a capability; and executing the operation.
This model uses 31 indicator categories to enable the user to
understand all the indicators that need to be looked at in figuring out the
warfare proclivity of a terrorist group.
Game Theory Gordon Woo Dr. Gordon Woo, Mathematical Aspects of Terrorism Hazard, Risk Game theory predicts that, as prime targets are hardened, rational
which Management Solutions. terrorists will tend to substitute lesser softer targetsTarget substitution,
Incorporates http://www.rms.com/Publications/MathematicalAspectsOfTerrorHaz_Woo.asp as this is called, is a prediction about the rational behavior of terrorists,
Ideology affirmation of which must ultimately come from the mouths of terrorists
Dr. Gordon Woo, Understanding Terrorism Risk, Risk Management themselves.
Solutions,
http://www.rms.com/Publications/UnderstandTerRisk_Woo_RiskReport04.pdf If paradise is the payoff for martyrdom, then an Islamic militant would
wish to be maximally sure of hitting the target, and would tend to attack
later (i.e. closer to the target). Taking sufficient time to achieve mission
success is a trait of al-Qaeda. The patience and diligence with which al-
Qaeda operations are planned to reflect underlying fundamentalist belief
in the high payoff of a suicide mission. Not just the preparation time, but
also the swarm attack is a feature of al-Qaeda strategy which is
comprehensible in game theory terms.
248
Microbiological Codex Alimentarius Commission, Principles and Guidelines for the Conduct There are seven steps to follow in conducting a Microbiological Risk
Risk Assessment of Microbiological Risk Assessment, CAC/GL-30, 1999. Assessment: 1) Statement of Purpose of Risk Assessment; 2) Hazard
Identification; 3) Exposure Assessment; 4) Hazard Characterization; 5)
Risk Characterization; 6) Documentation; 7) Reassessment.
Vulnerability Office of Domestic U.S. Department of Homeland Security: Office for Domestic Preparedness Risk [R] = Consequences [C] times Likelihood [L] or C x L. Likelihood
Assessment Preparedness, DHS (OPD), Vulnerability Assessment Methodologies Report, Phase I Final can be further defined in terms of a specific vulnerability [V] that is
Methodologies Report, July 2003. exploited by a specific adversary or threat [T]. Each of these events is a
probability. Hence, Likelihood is a conditional probability expressed as:
249
Game Theory Los Alamos National Steve Eisenhower, Terry Bott, and D.V. Rao, Assessing the Risk of Nuclear The model proposed here is based on a game theoretic perspective
and Approximate Laboratory (LANL) Terrorism Using Logic Evolved Decision Analysis, Los Alamos National where the set of attackers and the defender play an extensive game
Reasoning Laboratory (LA-UR-03-3467). with imperfect information. We perform the risk evaluation using
approximate reasoning (AR). AR uses a series of forward-chained rule
bases to emulate expert judgment. It is particularly well suited to
decision problems where much of the data is qualitative and many of the
relevant factors and their importance are perceptual in nature.
Two process trees are essential for decision analysis: a possibility tree
that represents a comprehensive set of alternatives, in this case terrorist
attack scenarios and an inference tree that defines how a metric is to be
inferred.
Logic Evolved Los Alamos National Terr F. Bott and Stephen Eisenhower, Evaluating Complex Systems When A system behavior of interest is modeled with a deductive logic model
Decision-Making Laboratory (LANL) Numerical Information is Sparse, Los Alamos National Laboratory. called a system process tree, which gives us an organized list of
(LED) Terry F. Bott, Stephen W. Eisenhower, Jonathan Kingson, and Brian P. Key, possible paths leading to the final system state of interest. A forward-
A New Graphical Tool for Building Logic-Gate Trees, Los Alamos National chaining implication structure that combines individual factors using
Laboratory and Innovative Technical Solutions, Inc. approximate reasoning (AR) techniques produces a Figure of Merit
250
Cognitive Karen Guttieri, Michael D. Wallace, Peter Suedfeld, University of British The policy-maker considers a number of dimensions of the problem or
Manager Model Columbia, The Integrative Complexity of American Decision Makers in the perspectives on it and searches for alternative solutions (i.e.,
Cuban Missile Crisis, Journal of Conflict Resolution 39, No. 4, (Beverly Hills: differentiation), weighs the alternatives in light of their probabilities of
Sage Publications, Inc., 1995). success, and chooses a course of action designed to maximize positive
values and minimize losses, based on theoretical beliefs about the
effects of those actions and other considerations such as morality,
tradition, and values (i.e., integration).
Contributing Glenn Koller, Risk Modeling for Determining Value and Decision Making The CFD is an outgrowth of the influence diagram. It is particularly
Factor Diagram (Boca Raton, FL: Chapman & Hall/CRC, 2000). useful for outlining work processes and to delineate logical and
251
Bayesian Glenn Koller, Risk Modeling for Determining Value and Decision Making Bayesian Model Averaging is a technique designed to help account for
Analysis (Boca Raton, FL: Chapman & Hall/CRC, 2000). the uncertainty inherent in the model selection process, something
which traditional statistical analysis often neglects. By averaging over
many different competing models, BMA incorporates model uncertainty
into conclusions about parameters and prediction. BMA has been
applied successfully to many statistical model classes including linear
regression, generalized linear models, Cox regression models, and
discrete graphical models, in all cases improving predictive
performance.
Probabilistic Glenn Koller, Risk Modeling for Determining Value and Decision Making Solving decision trees probabilistically simply replaces the leaf-node
Branching Model (Boca Raton, FL: Chapman & Hall/CRC, 2000). deterministic values with distributions, and the tree is solved many
times. On each solution of the tree, a random grab is made from each
leaf-node distribution and the expected value is calculated in the usual
way. Repeated random grabs and solutions of the tree result in a
distribution of expected values.
Monte Carlo Glenn Koller, Risk Modeling for Determining Value and Decision Making Monte Carlo analysis uses the process of simulation to achieve a range
Analysis (Boca Raton, FL: Chapman & Hall/CRC, 2000). of solutions to a problem. The technique is generally used to solve
problems for which the definition of specific solution equations to
calculate a specific answer is either too complex or too cumbersome to
be practical. The term can be applied to any procedure that uses
distribution-based random sampling to approximate solutions to
probabilistic or deterministic problems. The most common application
involves determining the probability that a certain event (or result) will
occur and predicting the magnitude of the event.
Time Series Glenn Koller, Risk Modeling for Determining Value and Decision Making Time-series analysis is a function that helps risk modelers better
Analysis (Boca Raton, FL: Chapman & Hall/CRC, 2000). emulate actual situations, because it allows such analysis to break free
of the single period assessment and to project the analysis through time.
This can be done by transforming single values into previously identified
distributions or by establish one or more expansion distributions.
Sensitivity Glenn Koller, Risk Modeling for Determining Value and Decision Making Sensitivity analysis aids in identifying the elements of a risk model that
Analysis (Boca Raton, FL: Chapman & Hall/CRC, 2000). were most and least important to the calculation of the answer. Most
comprehensive risk studies are composed of many input and output
variables. Sensitivity analysis is used to determine which risk-model
input parameters contribute most to the relative outcomes of various
measured scenarios.
Relative Risk Glenn Koller, Risk Modeling for Determining Value and Decision Making Model used to relatively rank and compare contenders concerning
Model (Boca Raton, FL: Chapman & Hall/CRC, 2000). particularly risk. It is designed from consensus by experts and is
252