25
1 Selected Papers in Security Studies: Volume 6 The Continued War on Terrorism – How to Maintain Long-Range Terrorist Deterrence Technical Report UTDCS-35-11 The University of Texas at Dallas Department of Computer Science November 2011 Jan Kallberg and Bhavani Thuraisingham

Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

1

Selected Papers in Security Studies: Volume 6

The Continued War on Terrorism – How to Maintain Long-Range

Terrorist Deterrence

Technical Report UTDCS-35-11 The University of Texas at Dallas

Department of Computer Science November 2011

Jan Kallberg and Bhavani Thuraisingham

Page 2: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

2

Selected Papers in Security Studies: Volume 6

The Continued War on Terrorism – How to Maintain Long-Range

Terrorist Deterrence

Jan Kallberg, PhD and Bhavani Thuraisingham, PhD

Cyber Security Research Center, Erik Jonsson School of Engineering and Computer

Science, The University of Texas at Dallas, Richardson, United States

Jan Kallberg, Visiting Scholar, Cyber Security Research Center, Erik Jonsson School of Engineering and Computer Science, M/S EC-31, UTD, 800 W Campbell Rd, Richardson TX 75080, United States E-mail: [email protected] Bhavani Thuraisingham is Louis A. Beecherl, Jr. I Distinguished Professor, Department of Computer Science, Director of the Cyber Security Research Center, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas. Jan Kallberg is visiting scientist at the Cyber Security Research Center. This is the sixth in a series of reports we are writing on Security Studies and the application of information technology for providing security and combating terrorism. We will include papers on both cyber security and national security. The purpose of these series of reports is to guide us in the technologies we are developing for both cyber security and national security. The technologies include systems for assured information sharing and assured cloud computing and tools for secure social network analysis and data mining for security applications such as malware detection. Our research to develop these technologies is supported by the Air Force Office of Scientific Research. DISCLAIMER: The Views and Conclusions contained in this report are those of the author and do not reflect the policies and procedures of the University of Texas at Dallas, the United States Government or the Air Force Office of Scientific Research.

Page 3: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

3

The Continued War on Terrorism – How to Maintain Long-Range

Terrorist Deterrence

The American withdrawal from Afghanistan scheduled for 2014 signals an end to the

first phase of the global War on Terrorism. The future global War on Terrorism is

indicated to be focused on intelligence operations, surgical strikes to attack terrorist

groups, increased surveillance and interception of terrorist activity and finally

deterrence. Traditional deterrence requires a mutual understanding of a common

rationality and a mutual interest of survival between the parties. These conditions do

not exist in deterring terrorists. This paper is focused on how to establish and

maintain long-range terrorist deterrence. If traditional deterrence is applied on

terrorism it tends to end up in a tit-for-tat game, strike when struck, and counter value

targeting. Traditional deterrence does not work against groups that operate under a

different rationale. Instead, deterrence could be directed to the first logical layer

surrounding terrorist activity like criminal networks supplying resources paid buy

cash or illicit drugs. If these layers are deterred, terrorists either are denied necessary

means or are forced to take bolder and riskier approaches to acquire their means

exposing them to a far higher likelihood of detection and interception.

Keywords: terrorism, deterrence, irrational actor, cyber warfare, forensics, terror

funding, austerity, war on terrorism, cyber forensics, data mining

1. Introduction

The War on Terrorism (WOT) is entering a new phase when the counterinsurgency

war in Afghanistan comes to an end step by step. After the suppression of terrorist activity

by occupation and military operations the next development in WOT would steer towards

surgical military operations supported by the intelligence agencies without holding larger

territories in foreign lands. This will indirectly reduce the ability to limit terrorist activity

and preparations on foreign soil.

Page 4: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

4

A word that reoccurs in the political debate is deterrence and the quest to deter

terrorist activity. Deterrence requires that there is a semi-rational actor on both ends and

that the actors share a mutual interest of survival.1 Terrorists are irrational actors and tend

to lack the interest of survival or maintaining their freedom.2 The concept of rationality is

normative and the irrationality is seen from the perspective of the deterring party. States

that deploy traditional deterrence against terrorists can fail to reach their goals. 3 The

terrorist deterrence literature is heavily steered towards interpreting these organizations,

their message, and how they are portrayed. Instead of seeking to understand and de-codify

the outlook of al Qaeda and associated groups, we are focused on deterring vital links in

their procurement chain. To a degree, it does not matter if the individuals X, Y, and Z want

to commit terrorist acts if they are unable to do it. There is an inviting lure in the unknown,

the thinking and ideology of al Qaeda, and trying to understand why they want to perpetrate

these acts. In our model the al Qaeda weltanschauung is trespassed, ignored, and the focus

is on the ability to gather resources and perpetrate a high casualty attack. If al Qaeda fails to

be able to commit terrorist acts, deterrence has been effective even if it was targeted

indirectly. This paper investigates and reviews the options to create a functional and

deployable deterrence against terrorism by focusing on the first rational layers in the

terrorist procurement chain to deny the terrorist access to the necessary means to stage

attacks that result in mass casualty events.

Page 5: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

5

2. Current Situation

Downsizing the War on Terrorism

The events of 9/11 in 2001 put an end to a decade of U.S. post-Cold War

realignment and dismantling overseas engagements. A surge of military operations in

foreign countries occurred and in regions that had never been accessed before – mainly

Central Asia. The calm years after the collapse of the Soviet Union were quickly replaced

by the global War on Terrorism after 9/11. To equip, train, and organize the War in

Afghanistan has been an expensive undertaking, especially as this war is fought in remote

locations with limited infrastructure.

The large-scale global WOT is incrementally coming to an end. There are several

drivers in this process. There have not been any major terrorist attacks in the continental

U.S. since 2001.The U.S. has been the geopolitical engine for the WOT so the political

motivation for the rapid expansion of global engagement in 2001-2003 are eroding. Over

the last years the political and popular resistance against a maintained offensive and broad

foreign engagement in the pursuit of WOT has gained momentum. The opposition of

continued large-scale operations exists in both political ends of the spectrum. The U.S.

popular support for continuing fighting a war in Afghanistan is losing ground to other more

pressing issues – unemployment, federal debt, and a lingering economy – in the public

mind. This forms a drastic shift in the perception of how valuable foreign military

engagements are for the interests of the United States. The change of popular sentiment to

foreign engagements is visualized by a poll where 55 % of the adult American population

wants to disengage from Europe as a part of NATO4 and 59 % wants the troops to return

from Afghanistan.5 This is a radical change from a few years ago. Policymakers start to

Page 6: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

6

realize that there is limited, if any, return on investment fighting counter-insurgency land

wars or occupying foreign countries after an expensive land war to suppress and limit

terrorist activity.6 The U.S. even considers a quicker withdrawal from Afghanistan than

previously planned. 7 The terrorists are still active, even if the terrorist groups are

decimated, and the terrorist organizations can within a few years regroup and reorganize in

their regions of permanent presence. Core questions are if groups in Afghanistan in the

future will be an instigator for terrorism or if the future terrorism will originate within the

target regions themselves. The future of Afghanistan after the withdrawal of the

international forces is uncertain and once the U.S. has withdrawn from Afghanistan, it is

unlikely that larger WOT operations would occur in the region.

The result will be limited interception of terrorist activities abroad and increased

reliance on “friendly” nations as proxies for WOT by supporting them in their effort to

combat domestic terrorist activity. Several of these “friendly” nations are plagued by

inefficient government, corruption, tribal cleavage, and limited reach of the security forces

in their societies, which can radically undermine the effort to use regional proxies. This

aggregated development could lead to a stronger operational opportunity especially for

Islamic terrorists when their traditional staging areas are less targeted by the U.S. and its

allies. The WOT focused early on intercepting fund raising and the upper part of the

hierarchy of resource gathering for terrorists. The terrorists adapted and utilized other ways

of raising funds like drug trafficking and illicit activities.8 9This change of modus operandi

and the increased reliance on drugs as terrorist funding could escalate terrorist activity after

a withdrawal from Afghanistan of U.S. forces due to the abundance of opiates available in

the region.

Page 7: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

7

Underlying Military Doctrines

Military engagements are driven by politically defined doctrines and the outlook of the

executive leadership and the legislature, which translates to operations and coalitions to

reach these goals. WOT is to a high degree a product of the most recent U.S. doctrine – the

pre-emptive war. States execute strategies that are derived from doctrine. Two military

doctrines have been visible in the post-Vietnam war U.S. national security: first the

Weinberger doctrine of 1984 that said he U.S. should only fight wars with a certain

outcome, a short duration, and enjoyed popular support and when vital U.S. interests were

at stake, clearly visible in the first Iraq war and the liberation of Kuwait. The second is the

pre-emptive war doctrine and actively using military power overseas to reach political

goals, with George Schultz as a proponent in the 1980s against the Weinberger doctrine. A

pre-emptive war doctrine brings the war to the enemy in an early stage. The pre-emptive

war doctrine became the George W. Bush outlook. Schultz was also an advisor to George

W. Bush in the early 2000s. In Afghanistan and Iraq, 4,000 Al-Qaeda fighters cost $120

billion a year to fight – a cost of $30 million per individual adversary.10 The fiscal reality

forces doctrinal correction. The political reality will pave the way for defense reductions. A

hegemony that retracts can also have a destabilizing effect on the international system.11

The final balancing of the federal budget will determine the level of overseas commitments

the United States are ready to engage in to continue conducting WOT.

Separating Deterrence and Suppression

The use of land war to fight counterinsurgency operations, as in Afghanistan, is no

deterrent for the terrorist organization but it slows down al Qaeda and associated groups’

ability to operate in foreign countries. The terrorist activities have been suppressed by

Page 8: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

8

attacking their permanent base areas and training grounds and blocks access to resources

needed for terrorist activity. The same factual effect is created by monitoring international

money transfers, bank accounts, and extremist’s fundraising events. Suppression creates

hurdles for extreme groups but they are still operating under adaptive ways to avoid being

intercepted.12 13

The Measurement of Success

Success in fighting terrorism is the absence of terrorist attacks and limiting the

possibility of future attacks. The WOT has currently been successful in protecting the

continental United States. The success for WOT operations in Afghanistan is determined by

the long-term residual effect. A concern is the flow of opium which has not stopped during

the war – but instead the export of illicit drugs has increased compared to during the

Taliban rule.14 The flow of heroin from Afghanistan raises long-range concerns for

increased abilities of terrorist organizations to fund their operations using heroin as a

currency. The importance of opiates as a commodity was shown in October 2011 when

U.S. federal agencies claimed they intercepted a covert assassination attempt on the Saudi

ambassador to the United States orchestrated by Iranian interests. According to U.S.

authorities the payment for the murder was planned to be made with opiates.15 The criminal

network, the drug cartel, accepted to be paid in opiates as a valid currency to provide and

procure support for a murder. As long as the South American and Mexican drug trading

organizations (DTO) can sell more heroin in the United States than they can produce, there

will be a deficit that can be filled by heroin from Central Asia. The Islamist terrorist

organizations in Afghanistan and Pakistan have access to vast quantities of heroin and

opiates produced in the region. This combination creates a risk for U.S. homeland security.

Page 9: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

9

3. Terrorist Deterrence

Semi-rational and interested in survival

The repeated demagogy through the global WOT, in its different shapes depending

on country and politicians, is the notion that terrorists can be deterred. Deterrence requires

that the actors are semi-rational and have a mutual interest in survival. This basic sine

qua non needs to be fulfilled. If one actor acts irrationally and the other acts rationally,

deterrence fails and the equilibrium is broken. The same broken equilibrium occurs when

one or none of the actors has an interest in survival. Deterrence does not change behavior in

an actor who does not care about the consequences.

Terrorists are not rational actors.16 Therefore they cannot be deterred using

traditional deterrence theory targeting the terrorists themselves. As an analogy, a moral

argument only works on an individual that shares the same value system. If the person

targeted with the moral argument does not share the same value system, the person will find

the moral argument either immoral or spurious. The moral argument will not trigger change

in behavior. Those who want to deter terrorists face an identical problem. Terrorist

organizations can be deterred if they are state sponsored as Hezbollah but these threats are

unique to the Middle Eastern environment.17 The Israeli deterrence executed especially

towards Hezbollah is not deterrence of the terrorist organization per se, as they are only a

proxy, but the deterrence is direct from the targeted state towards the sponsoring state or

number of states.18 Western democracies are not targeted by state sponsored terrorism in

the same way as Israel.

Page 10: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

10

WMD as Demarcation

As long as terrorists do not possess weapons of mass destruction (WMD), terrorists

can be politically downplayed and treated as a criminal activity, gang violence or drug

trafficking organizations. The terrorists lose their part of the spotlight. The terrorist activity

becomes a law enforcement issue and is processed through the judiciary system together

with rapists, murderers, and violent criminals. The treatment of terrorists as regular

criminals undermines their imagined legitimacy and projected cause. Government has to

claim the story to tell.19 Terrorism without WMD is a threat to citizens but not the nation

state. Once terrorists have WMD we enter a new realm, as noted by Robert Kehler:

“Operations against a regional adversary either having or presumed to have nuclear

weapons would present problems that have never been directly faced and are not yet fully

understood.”20 Even if terrorists acquired WMD it would not mean the end of the world and

the apocalypse21 but it would have drastic implications on our society and individual

security.22 Deterrence against WMD-holding terrorists has been discussed in the literature

but it directs the deterrence towards a supporting state sponsor which has provided the

WMD to a proxy.23

Terrorists cannot potentially jeopardize the stability and integrity of major nation

without WMD. Even with WMD it is questionable that terrorists are able to threaten the

survival of any stable and constitutionally functional country without violent cleavages.

The economic impact could be more destabilizing when the global financial markets would

react with extreme volatility. So even in several of the darkest scenarios of terrorists using

chemical agents or nuclear arms, a functional democratic state would be able to absorb the

damage.

Page 11: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

11

National security and individual security

It can be questioned if terrorists are a national security threat for a major

industrialized nation as terrorists are unable to overthrow the government, occupy territory,

and establish a new regime. Terrorists are a threat to the individuals’ security and can create

loss of human lives, destruction, and mayhem. The severest damage that can occur is not

the terrorist attacks but the national self-inflicted damage by the target country. National

security damage can be self-inflicted in two ways. First, the nation overreacts and spends

itself into financial instability in its pursuit to crack down on terrorist activity. Second, the

financial market overreacts to terrorist activity and generates financial instability. In both

examples there is a non-proportional reaction to the event but the state will stabilize after

the extra-ordinary period.

The distortion of seeing terrorism as a high-level threat is the policy outcome where

solutions are at the traditional national security level moves - invasion, occupation,

bombardment, war, and tit-for-tat games by striking when struck. Long-term it is not a

sustainable model because it builds the terrorists’ case by indirectly creating leverage,

presenting terrorists as a tangible risk to the state they target, and terrorism tends to be a

permanent fixture when equivalent retaliation prevails as strategy. Proportionality in

retaliation is an intellectually interesting proposal but ineffective as a deterrent.

If the nation is threatened, then the nation uses its traditional means of defense. The

terrorists have by moving their agenda from obscurity to the global headlines reached their

first checkpoint on their journey of self-defined success. Nations that treat terrorists as main

adversaries uplift terrorists to abilities that they never had or will have. That does not mean

that the nation should ignore or downplay the fact that terrorists’ intent is to kill innocent

Page 12: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

12

civilians – but the approach is more relevant if terrorism is treated as organized crime

instead of a direct threat to national security.

When nation states choose the improper deterrence and engage in tit-for-tat games

using an irrelevant currency, failure is on the horizon. One example is the retaliation for the

attacks on the U.S. embassies in Africa in 1998:

“American cruise missiles struck without warning yesterday at paramilitary training

camps in Afghanistan and a Sudanese pharmaceutical plant that U.S. intelligence

identified as a chemical weapons facility. President Clinton described the synchronized

blows as retaliation for the twin bombings this month of U.S. embassies in Africa and

an effort to pre-empt further terrorist attacks.

"Today, we have struck back," Clinton said in a surprise announcement at the

Massachusetts island resort of Martha's Vineyard, where he cut short his vacation and

returned to Washington for a late afternoon conference with his national security team

in the White House situation room.

Clinton described the training complex in Khost, Afghanistan -- 94 miles southeast of

Kabul and just inside the border with Pakistan -- as "one of the most active terrorist

bases in the world." He said it was "operated by groups affiliated with Osama bin

Laden," a Saudi expatriate whose public declarations and shadowy history have placed

him at the centre of suspicion since the Aug. 7 destruction of U.S. embassies in Kenya

and Tanzania.

Yesterday's use of military force was distinguished not only by its scale, among the

largest of the Clinton presidency, but by the nature of its target: a stateless

confederation of terrorist groups, without strict hierarchy, government or territory. A

high-ranking intelligence official said of bin Laden: "He's a transnational actor in and

of himself."24

In retrospect it is clear that the retaliation for the terrorist attacks on August, 7,

1998, did not pre-empt or deter Osama bin Laden nor did it deter the Taliban to further

Page 13: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

13

house terrorists. The retaliation would maybe have created deterrence for a rational state

actor, that had a shared interest for survival, but al Qaeda was driven by a different

ideology and agenda. Just because a nation has military might does not automatically mean

that the military solution is optimal.

In a free society, freedom of expression and reporting is pivotal as a democratic

safe-guard and is fundamental to the Western democracy. Terrorists exploit the fact that the

Western societies allow free press. In today’s 24-hour media environment, the terrorists

will have the attention of a large audience on TV and the Internet. Government cannot

remove within the democratic framework the media attention terrorists get, but government

can to a degree control the context in which the activity is presented. If terrorist activity is

seen as organized crime with the purpose of driving a political cause through violence,

crime, and drug trafficking, terrorism loses ground as a national threat.

Imperfect Information and Lack of Interface

There are several obstacles for deterrence targeting the terrorists themselves. To

theoretically be able to deter terrorist organizations, without considering their ideological

motivation that nullifies deterrence, it would require that the deterring party has insights

and understanding of the operations and daily agenda setting within these organizations.

The terrorist leadership would have to be known, as well as their internal processes, and the

way they operate on a daily basis. The cultural differences, the different layers of secrecy,

imperfect information, inability to verify who is who in a terrorist organization, and the fact

that many actors within these organizations are not identified removes the prospect of long-

range deterrence of the terrorist organization itself even if it is theoretically possible.25

Page 14: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

14

Another factor is the lack of interface with the terrorist organizations because they

are not structured in a hierarchical order. In the Cold War, the U.S. could send signaling

messages of intent, extent of ability, the will, and doctrine to the Soviet executive leader

and his politburo which was the policy making central committee of the Communist Party

of the Soviet Union.26 The Soviets on the other hand had an interface with the U.S.

President, the national security community, and Congress. Messages and communication

could be verified and validated by a controlled level of “healthy” espionage conducted by

CIA and KGB. In the United Nations, the U.S. envoy could walk down the hallway for an

informal meeting with the Soviet envoy. In case all that failed, a clearly marked red

telephone was installed in both leaders’ offices which did not receive any other calls that

would block the line. There existed during the Cold War an interface that could transmit

and receive messages between the parties.

Strategic deterrence needs a counterpart and an interface. In counterterrorism, a

deterring party lacks both an identifiable target organization for deterrence to which

deterrence can be tailored and there is an absence of interface. The level of imperfect

information nullifies the ability to fully comprehend the actions of the terrorist

organization, their leadership, agenda setting, and internal power structure. If there is no

hierarchy, then coordination is intermittent and dependent on interaction between leaders

that consider themselves as equals within the terrorist organization.

Instead of trying to deter at the strategic level, deterrence has to be focused on

creating individual deterrence. Once deterrence shifts it is important to identify who is

receptive to deterrence and who is likely not to be receptive. By deterring at the individual

level primarily instead of the strategic level, terrorist activity is given less attention as a

“national threat”.

Page 15: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

15

4. Deter at First Logical Level

Terrorists need resources, contacts, and information to be able to conduct terrorist

acts. Every acquisition of resources and request for material requires a human interaction

and on the other end there will individuals who have formed their own agenda

independently from the terrorists. The first logical level is where actors care about

repercussions, life, and personal liberty. This is likely not the terrorists themselves but

instead their criminal providers (figure 1). The supporters are not targeted by deterrence

strategy because of their limited impact on the actual risk level. A strategy that included

supporters would be broad and less targeted. During the duration of WOT, after the events

of 9/11 until today, massive federal resources in the United States have been used to

identify who are the financiers of terrorist networks. This work was primarily focused on

the upper echelon of supporters that aggregated and collected resources on behalf of

organizations based overseas.27 Ten years later, these supporters are no longer able to

gather resources as these activities are likely to be intercepted and detected leading to

prosecution. Instead, the terrorist groups in many cases have to self-finance their activity by

criminal and illicit activity which includes fraud, theft, identity theft28, and illicit drug

dealing. The absence of financiers and fund raising is evidence that targeting deterrence

towards individuals is effective.

The main providers of materials that can be used for high casualty terrorist attacks

are criminals. It is important to keep in mind that these resources are hard to obtain without

connections to criminal networks and these networks are not accessible without an

introduction. It is the criminal’s decision if he wants to sell or not and that is based on the

criminal’s self-interest.

Page 16: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

16

Accumulated Hindrance

Terrorists need to connect and organize numerous pieces and people to be able to

commit terrorist acts. They need documents, access, safe houses, weapons, transportation,

explosives, detonators, and other support functions. These functions and resources create a

chain that is dependent on every link. The more complex operation, or if the terrorists are

not natives of the target country and society, the more numerous are the links. A chain is as

strong as its weakest link. The terrorists will also lack the social interface, the language, and

the contacts to be effective in the planning and organization if they are on foreign soil.

Even domestic terrorists, who are born and raised in the target country, will have

difficulties to acquire materials for projects that have a potential for high lethality and mass

casualty outcome because of the need of criminal connections. Even if the domestic

terrorists have been incarcerated it does not automatically give them the opportunity to

acquire military-grade explosives as most serve prison time in county jails with felons that

committed traditional crimes. Military-grade explosives are not for sale and connections to

illicit trade routes are necessary. The number of contacts needed to be able to find a willing

seller adds up the probability for failure, detection, and law enforcement interception.

Creating Uncertainty by Technical Superiority

The technical abilities of the nations that seek to detect terrorist activity and break

up the terrorist infrastructure are far superior to the criminal networks technical

understanding, especially as it is not shared among criminals except for basic understanding

of forensics. Any criminal selling illicit goods does an assessment what is the probability to

get caught, the effects of getting caught which is then put in relation to the opportunity.

Even if the perpetrator does not sit down and tabulate the pros and cons, there is a process

Page 17: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

17

in the potential perpetrator’s mind to determine if the risk is worth it. Forensic technology

creates uncertainty and the actual extent of the forensic ability within law enforcement and

security agencies is unknown to the individual that is a target for deterrence. A relevant

analogy is the introduction of forensic DNA testing which radically changed the probability

for obtaining evidence and prosecute perpetrators. The federal DNA Initiative29 describes

on their website what the innovation of DNA forensics meant for criminal justice:

“DNA typing, since it was introduced in the mid-1980s, has revolutionized forensic

science and the ability of law enforcement to match perpetrators with crime scenes.

Thousands of cases have been closed and innocent suspects freed with guilty ones

punished because of the power of a silent biological witness at the crime scene.”

DNA changed the balance between unlikely detection of who committed specific

crimes to likely detection. Indirectly the new DNA forensic science invented in the

1980s not only solved cases but it also restrained and deterred potential perpetrators.

Today the forensic abilities have increased dramatically and many artifacts surrounding

perpetrators and potential terrorist are silent witnesses that can become evidence

against any attempt to organize terrorist attack.

5. Methods to Reach Deterrence

The criminal supporting networks consist of individuals that have an interest in

maintaining their freedom and survival. These actors in criminal networks also have a

rational or at least semi-rational behavior. These criminals conduct their business in trading

drugs, weapons, stolen goods, counterfeit, human trafficking, extortion, gambling, and

other illicit goods or activities because for the actors it is a “quick” way to make money

with limited risks.

Page 18: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

18

Criminological literature has shown that very few criminals consider the factual

consequences after they get caught as a deterrent but are focused on the notion that they

will not get arrested.30 These surveys are based on traditional criminal behavior like

burglars and thieves. Criminal sellers have the same behavior but the difference with

burglars and thieves is the level of premeditated action where criminal sellers are less

spontaneous to the opportunity and instead more planners of their activities. This difference

would support deterrence. Forensics is used to deter by conveying to potential illicit sellers

that it is unlikely that whatever business they engage in with terrorists, or their affiliates,

will go undetected from the authorities.

Cyber Forensics

Cyber forensics is a newly established science that started with the mass

introduction of computers in the 1980s and has grown in importance. The field covers

several angles for the digital paths individuals create by their usage on the Internet,

computers, and electronic devices. 31 The developments in the field the last ten years have

been accelerating, driven by not only WOT but also financial, compliance, and police

investigations. Digital devices, from embedded software in everyday life to digital

communication, capture information and are silent witnesses to the activities conducted by

the user. Cyber forensics makes it harder for the seller to fully understand what traces are

left in the interaction with the buyer and what digital evidence the buyer created in the

staging of the purchase and after the purchase.

Governments are now actively mass-storing digital data from the Internet and other

venues. Unprecedented ability to collect data is inviting but terabytes of data will not

provide accurate information unless this data collection is matched by equal resources in

Page 19: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

19

interpretation and analysis. The amount of data is increasing but the question is if the ability

to analyze is following at the same pace. Data mining will only have a deterring effect if

the data stored are available to analysis and there are tools able to congest the data volume.

Chips, computers, and data recording devices embedded in products in combination

with data collected by GPS and cell phone traffic create a new realm of cyber forensics.

One example is the EDR (Event Data Recorder) in new cars which incrementally creates a

“black box” in the car that over time will collect even broader data.32 For a perpetrator who

decades ago could intimidate persons surrounding the event to not cooperate with law

enforcement, the control is lost. Digital devices collect data and become the prosecutors’

star witnesses. This uncertainty, especially as it is beyond a person to fully comprehend

how and where data is collected, and as it is collected at a remove secure location in many

cases, the perpetrator cannot after the event erase or manipulate the collected information.

The massive amount of data collected by a myriad of services and devices make it

impossible for a perpetrator to avoid leaving a digital trail.

Traditional Forensics

Traditional forensics has developed dramatically in ability, precision, and technique

the last thirty years. The message from law enforcement, homeland security assets, federal

agencies, and the people is straight forward – if you sell and provide for terrorists we will

hold you accountable. It is important that law enforcement and the spokespersons for the

homeland security agencies clearly show the abilities. As an example, the commercial TV

shows, “CSI-Miami” and “CSI-NY”, project the ability that it is just a matter of time before

the forensic experts are able to connect the dots. The notion in the public mind that forensic

experts are the wizards of our age supports the deterring effect.

Page 20: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

20

Human Intelligence

Human intelligence, the use of informants, increases the uncertainty who a terrorist

is dealing with and if the person is an informant or not. If criminal networks are deterred to

deliver necessary material for a terrorist attack, the intended perpetrating terrorists are

forced to seek resources in wider circles and take the risk dealing with potential sellers that

they cannot verify through contacts or associates. Informants, who already serve a purpose

in law enforcement against DTO and organized crime, would be able to identify and trigger

interception of terrorists in the process of perpetrating terrorist acts.

6. Conclusions

Cyber forensics, traditional forensics, and human intelligence combined are an

effective deterrence for terrorism because together these methodologies deny access to

military grade explosives and other means of high lethality. Forensics are seen in a

prosecution supporting role and post event but forensics can also have a strong deterring

impact by making the providers less sure that they can sell illicit goods undetected. The

denial forces terrorists to try new venues and contact assumed criminal connections that

expose them to detection by either cyber investigations or human intelligence. The criminal

enterprise to sell illicit goods is driven by the perceived opportunity of manageable risks

and high profits. By changing the equilibrium and increasing the risks, the seller has to

dramatically increase the price of the commodities to offset the increased risk or restrain

from selling. If forensics can convey that it is almost certain that the seller will face

prosecution and repercussions, the price becomes extremely high which makes it unlikely

to be sold because self-funded terrorists does not have unlimited financial means. The seller

Page 21: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

21

is indirectly selling ten – fifteen years, or more, of his life if arrest is assumed certain. In

reality, the seller would restrain from selling because the risk makes it uninviting.

If deterrence increases the likelihood for denial of sale from criminals to terrorists

then the terrorists have three options. First, to restrain from terrorist activity, then to

continue searching for a criminal organization that will sell these commodities and by

doing so likely to contact and interact with a law enforcement informant and intercepted,

and last, to try to manufacture the explosives themselves with crude technology and less

effective chemical ingredients. Even the last option becomes a point of detection because

excessive purchases of bomb making material can draw the attention of law enforcement.

If the terrorists are able to create homemade bombs, these bombs have some

embedded flaws as any product that is built by novice unskilled labor. These homemade

explosive is less stabile which nullifies the intended effect by detonating too early, and

often killing only the perpetrator33, never detonating and provideing a complete device that

can be investigated by forensics experts, or detonating too late with marginal effect, if any.

The probability for a failed attack has increased dramatically.

If terrorists only alternative is to produce their own homemade device, the chance

for their plans to succeed is drastically reduced. Several recent attempts at terrorist attacks

used homemade devices that failed. 34 Once the attempt has failed, the unattended explosive

device becomes a direct link to the perpetrator in the hands of forensic experts.35 A failed

bomb would provide finger prints, chemical leads, a track of where it was purchased, DNA

trace, and even if the perpetrator has been cautious it is likely that the parcel will be a trace

back to where it originated. After the Madrid bombing in March 2004, it only took one

fingerprint from a cell phone in an unexploded bomb to unwind the whole terrorist ring and

their suppliers.36 These successes establish deterrence to suppliers and the opportunity to

Page 22: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

22

deter providers using forensics has increased with the increasing number of digital devices

and cyber forensics. If deterrence has denied terrorists access to military and commercial

grade of detonators and explosives, and firearms if applicable, by resetting the risk and

opportunity calculation for criminal networks and the illicit trade, then it reduces the risk

for terrorist attacks and if an attack happens, it minimizes the actual damage inflicted.

Retargeting deterrence from the terrorist groups to the first logical layer in the terrorists’

perimeter is likely a viable way to limit terrorists’ opportunity.

Figure 1. If the criminal suppliers are deterred and terrorists are denied materials needed to organize attacks, it is of less importance if the terrorists or their following are deterred. The effect will be the absence of terrorist attacks which is the overarching goal for the deterring party.

Acknowledgement: This material is based in part upon work supported by The Air Force Office of Scientific Research under Award No. FA-9550-09-1-0468. We thank Dr. Robert Herklotz for his support.

Terrorists

First rational layer ‐ criminal 

networks

Supporters with limited 

impact

Page 23: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

23

1 John M Collins, Military Strategy (Dulles, VA: Brassey’s, 2002) see ch.7. 2 Lawrence Freedman, Deterrence (Malden, MA: Polity), see page 24. 3 John M Collins, “Principles of deterrence”, Air university review, November-December 1979. 4 Rasmussen Reports, ”55% Want U.S. Troops Out of Europe,”

http://www.rasmussenreports.com/public_content/politics/general_politics/october_2011/55_

want_u_s_troops_out_of_europe (accessed 8 November 2011). 5 Rasmussen Reports, ”59% Want Troops Home from Afghanistan,”

http://www.rasmussenreports.com/public_content/politics/current_events/afghanistan/59_want_troo

ps_home_from_afghanistan (accessed 9 November 2011). 6 James Wood Forsyth Jr, “The Past as Prologue Realist Thought and the Future of American

Security Policy,” Strategies Studies Quarterly 5, no.3 7 Wall Street Journal Online, U.S. Explores Faster Afghan Handover,

http://online.wsj.com/article/SB10001424052970204621904577014303354145714.html

(accessed 8 November 2011). 8 Paul Rexton Kan, Drugs and contemporary warfare (Dulles, VA: Potomac Books, 2009) 9 Washington Post Foreign Service, Al-Qaeda Masters Terrorism On the Cheap By Craig Whitlock,

(August 24 2008) http://www.washingtonpost.com/wp-

dyn/content/article/2008/08/23/AR2008082301962.html (accessed 7 November 2011). 10 Office of the Under Secretary for Defense, National defense budget estimates for FY 2012,

http://comptroller.defense.gov/defbudget/fy2012/FY12_Green_Book.pdf (accessed 7

November 2011). 11 Robert O. Keohane, “The theory of hegemonic stability and changes in international economic

regimes, 1967-1977,” in Change in the international system, eds Ole R Holsti et al. (Boulder,

CO: Westview Press 1980) 12 Washington Post Foreign Service Sunday, Al-Qaeda Masters Terrorism On the Cheap. 13 Paul Rexton Kan, Drugs and contemporary warfare. 14 Paul Rexton Kan, Drugs and contemporary warfare. 15 MSNBC Online, “Sources: Would-be assassin linked elite Iran military unit to drug trade,”

http://openchannel.msnbc.msn.com/_news/2011/10/13/8308097-sources-would-be-assassin-

linked-elite-iran-military-unit-to-drug-trade (accessed 8 November 2011).

Page 24: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

24

16 John M Collins, “Principles of deterrence” 17 Schmuel Bar, “Deterring terrorist – what have Israel learnt”, Policy Review, June-July 2008. 18 Daniel Whiteneck, “Deterring Terrorists: Thoughts on a Framework”, The Washington Quarterly,

Vol. 28:3 19 Mary Crannell and Ben Sheppard, “Preparing to Lead with a Compelling Narrative If You Don't

Frame the Narrative, Someone Else Will”, Strategy Studies Quarterly, Fall 2011. 20 C. Robert Kehler, “Nuclear-Armed Adversaries and the Joint Commander,” Naval War College

Review, Winter 1996. 21 Kenneth N Waltz. Nuclear myths and political realities. American Political Science Review 84,

Vol. 3. 22 Daniel Byman, “Al qaeda as an adversary”, World Politics 56, Vol.1. 23 Daniel Whiteneck, “Deterring Terrorists: Thoughts on a Framework”. 24 Washington Post, “U.S. Strikes Terrorist-Linked Sites In Afghanistan, Factory in Sudan,”

(August 21, 1998) http://www.washingtonpost.com/wp-

srv/inatl/longterm/eafricabombing/stories/strikes082198.htm (accessed 8 November 2011). 25 Robert F Trager and Dessislava P. Zagorcheva, "Deterring Terrorism: It Can Be Done."

International Security 30, no. 3. 26 Robert H Reed, “On Deterrence”, Air university review, May-June 1975. 27 University of Texas at Dallas, Technical Reports Erik Jonsson School of Engineering and

Computer Science, UTDCS-25-10 Selected Topics in Terrorism Studies, “Volume 2: Al

Qaeda Terrorist Financing and Technologies to Track the Finance Network”. 28 Shift4, commercial information, http://www.shift4.com/pdf/s4-wp0806_terrorism-and-credit-

card-information-theft.pdf (accessed 7 November 2011). 29 The DNA Project. http://www.dna.gov/basics/analysishistory (accessed 7 November 2011). 30 Bradley R. E. Wright, Avshalom Caspi, Terrie E. Moffitt and Ray Paternoster,

“Does the Perceived Risk of Punishment Deter Criminally Prone Individuals? Rational Choice,

Self-Control, and Crime”, Crime and Delinquency 41:180. 31 Ashley Brinson, Abigail Robinson, and Marcus Rogers, “A cyber forensics ontology: Creating a

new approach”, to studying cyber forensics http://dfrws.org/2006/proceedings/5-Brinson.pdf

(accessed 7 November 2011). 32 MSBNC, “Digital evidence becoming central in criminal cases”,

http://openchannel.msnbc.msn.com/_news/2011/11/11/8743687-digital-evidence-becoming-central-in-criminal-cases (accessed 19 November 2011).

Page 25: Selected Papers in Security Studies: Volume 6bxt043000/... · information sharing and assured cloud computing and tools for secure social network ... to lack the interest of survival

25

33 New York Times, “Police Say Early Detonation of Bomb Averted Disaster in Sweden”,

http://www.nytimes.com/2010/12/15/world/europe/15sweden.html?ref=taimourabdaly

(accessed 7 November 2011). 34 New York Times, “Arrest Made in Times Square Bomb Case”

http://www.nytimes.com/2010/05/04/nyregion/04bomb.html (accessed 7 November 2011). 35 New York Times, “Unexploded Car Bomb Left Trove of Evidence. New York Times. May 3,

2010,” http://www.nytimes.com/2010/05/04/nyregion/04evidence.html?ref=nyregion

(accessed 8 November 2011). 36 James E. Girard, Criminalistics: Forensic Science, Crime, and Terrorism (Burlington, MA: Jones

& Bartlett Publishers)