Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Second Edition
Michael R. Ronczkowski  More Info

Dirty Dealing: The Untold Truth about Global Money Laundering, International Crime and Terrorism
Peter Lilley  More Info

See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
Robert Baer  More Info

The Counter-Terrorism Puzzle: A Guide for Decision Makers
Boaz Ganor  More Info

Countering Terrorism: Dimensions of Preparedness (BCSIA Studies in International Security)
The MIT Press  More Info

Countering the Financing of Terrorism
Routledge  More Info

Innocent Targets: When Terrorism Comes to School
Michael Dorn and Chris Dorn  More Info

Terrorism Financing and State Responses: A Comparative Perspective
Stanford University Press  More Info

The Spirit of Terrorism, New Revised Edition
Jean Baudrillard  More Info

Deadly Connections: States that Sponsor Terrorism
Daniel Byman  More Info

War and Decision: Inside the Pentagon at the Dawn of the War on Terrorism
Douglas J. Feith  More Info

Terrorism and America: A Commonsense Strategy for a Democratic Society (BCSIA Studies in International Security)
Philip B. Heymann  More Info

Countering the New Terrorism
Ian O. Lesser  More Info

Criminal Justice Online

Terrorism Organizational and Communication Strategies

Home | Student Resources | Police Consulting | Police Leadership | Military Leadership | Criminal Justice Resource Directory | Contact Us | Site Map

Terrorism Organizational and Communication Strategies

 

            Intelligence gathering is the first line of defense against terrorism.  Through use of intelligence, law enforcement and military operations can be designed to disrupt terrorist organizations and preempt their operations.  Prior to September 11, 2001, most state and local law enforcement agencies viewed intelligence gathering on global terrorist groups as the purview of the federal government.  Except for large cities like Los Angeles and New York, if state or local agencies gathered intelligence it tended to be on domestic subversive groups.  We have since realized that some terrorist organizations have a global reach, and that state and local law enforcement officials must broaden their view.

            While it is not likely that your agency will send someone to participate in an intelligence operation against the Manuel Rodriguez Patriotic Front in Chile or the Revolutionary Nuclei in Greece, it is likely that you will read and act upon distilled intelligence.  In other words, you are very likely to receive an intelligence report that gives you information and there is an expectation that you act.  By knowing some of the methods by which terrorists organize and communicate, you may be in a better position to judge that information and plan for your community.  Moreover, while our focus is on international terrorist organizations, there are many domestic groups that use similar methods of organizing and communicating.  Understanding some of their organization and communication methods may help you see evidence, information and intelligence you might have otherwise overlooked.

Single Celled Organisms

            Terrorist organizations are often described and constructed using the biological analogy of a cell.  Biologically, a cell is the basic unit of life.  While most of the organisms with which we are familiar are multi-cell units, there are many single cell organisms.  In the realm of terrorism, the single celled organism is referred to as the Lone Wolf terrorist or leaderless resistance.  This can be a critical concept in understanding the development of terrorist organizations.  The Lone Wolf terrorist does not receive direct instructions from a central organization.  Rather, he or she receive inspiration from an idea or perhaps a remote subversive political figure.

            Domestically, Lone Wolf terrorists have included Timothy McViegh (Oklahoma City Bomber), Eric Rudolph (Olympic Park Bomber) and Buford Furrow (firearm attack on a Jewish Daycare center in Los Angeles and murder of a Postal Carrier).  Internationally, there is strong evidence to suggest that some terrorist acts attributed to Al Qaeda were not committed by the group so much as inspired by the group.  Furthermore, domestic terrorist groups such as the Earth Liberation Front (ELF) are probably best categorized as leaderless resistance rather than a cellular organization.  This means that small cells or individual terrorists are motivated by the groups overarching goals but not coordinated by nor in direct communication with the larger group itself.  

            Single celled or disconnected cellular groups have the benefit of maximum operational security because communication is limited or non-existent.  There are few, if any, opportunities for an intelligence service to intercept communications or penetrate the group.  On the other hand, single celled or disconnected cellular groups are also limited in their ability to carry out operations.  While McViegh, Rudolf and Furrow were able to commit horrendous acts of terrorism, their status as Lone Wolves meant they left a long trail of evidence because they had to make all purchases, conduct all reconnaissance, prepare all the equipment and conduct the operation.  Like any mass murder or serial killer, these terrorists did not have the benefit of cellular specialization to mask their trail.  Moreover, Lone Wolves are limited in their ability to sustain long-term terrorist campaigns because the evidence they leave will ultimately lead to their arrest.  It takes a much more complex organization to continue terrorist operations over the long-term.  In the instance of Lone Wolves, state and local law enforcement officials should be aware of purchase of certain materials, suspicious actions of individuals and devise ways to share seemingly low-level suspicious activities with other jurisdictions.

Multi-celled organisms

            As biological organizations become more complex, their cells tend to specialize.  As an example, we have nerve cells, muscle cells and bone cells.  Each of these cells has developed a particular specialization so that the larger organism can be more efficient.  However, for these specialized cells to work together in the larger organism they must communicate.  With terrorist organizations, the purpose of a true cellular organization is to increase the operational security of the larger group and to capitalize on specialization.

            It is a mistake to believe that one member of the cell necessarily leads to other cells. Rather, operational security is enhanced because most of the members of the cell do not know anyone in the organization outside of the cell.  This lack of knowledge of the larger organization is like the cellular membrane that defines and protects the cell.  If the cell is compromised through member arrest or intelligence penetration, only the cell is damaged and not the larger organization.  .  For maximum operational security there may be only blind communication between cells.  In other words, the leader of the cell may simply receive instructions through some blind form of communications and not in any face to face meeting. 

            In cellular terrorist organizations there tend to be two types of cells operational and support.  An operational cell is a self-contained, often single mission entity designed to carry out an operation and then likely be killed or captured.  The 9/11 terrorist were a single-mission operational cell. 

Many terrorist organizations also have support cells.  These cells are designed to support long-term, sustained, terrorist operations.  A homicide bomber who is part of a larger, sustained terror campaign can be supported by many types of support cells.  For a homicide bomber there could be a recruitment cell, minder cell, reconnaissance cell, bomb-making cell and a delivery cell.  Additionally, there are likely planning and coordination cells assisting the other supportive cells.  Sustained terror campaigns like those conducted in the Middle East require this type of specialization.  Consider that bomb makers are a terrorist resource that is not easy to replace.  Because they are so difficult to replace, the bomb maker is often insulated from operations in their own, tightly control support cell.  Bomb makers rarely deliver or detonate their own devices.  They don't recruit the bomber, survey the target nor take on the role of a minder (the person(s) who monitor the bomber between the period of recruitment and employment).  Bomb makers may not even procure their own components. 

Complexity and Chatter

            As a terrorist organization becomes more specialized and cellular, its communications scheme becomes more complex.  Think about a law enforcement operation that was planned in advance.  Perhaps a major convention was coming to your community.  Six months prior to the event there were telephone calls, memos and meetings to begin the planning process.  As the convention neared, the communications between participants likely increased in their frequency and intensity.   Then, the communication likely peaked the day or so before and operational communications began.  There was a natural build-up, peak and then operational drop in communications. 

            Intelligence reports that speak of an increase in chatter are reflecting the same build-up, peak and then drop.  In the intelligence world this is referred to as signals intelligence or SIGNIT.   Because of the natural cycle of pre-operational communications, SIGNIT does not necessarily have to understand the signals.  As a predictor, SIGNIT doesn't necessarily have to know what is being said; only that a predictable pattern of communications is increasing.  Moreover, because the location of likely command and control, support, and operational cells is known or can be presumed, the increasing cycle and the flow of communications between geographic regions provides additional evidence that a terrorist operation is likely.

They Know What We Know

            Like many complex, multi-cell organisms, terrorist organizations are learning organizations.  Indeed, to survive over the long-term they must adapt their methods and there is some evidence to suggest that they modify their message as they age and change.  As learning organizations, they know about the predictive value of chatter and are likely developing new methods of communication that reduces the raw SIGNIT value.  One way to reduce the susceptibility of their communications to interception and interpretation is to disguise their communications.

            In the last few years there has been talk about the use of Stenography as a means of disguising communications.  Stenography is the hiding of a message, particularly an image, within another message or image.  In the digital world a photograph is transmitted by reducing it to a computer code.  You have seen this computer code files of photographs JPEG, GIF, etc.  At its simplest, inside those files there is room to insert other lines of code which could contain a message.  However, to-date, there have been no public reports of terrorists using this technique.

            The terrorists are well-aware of the United States capability to intercept cellular telephone traffic.  In addition to reducing their use of this mode of communications, they are likely taking advantage of pre-paid cellular telephones.  This allows greater anonymity and the flexibility to change cellular numbers and service providers easily.  While there have been no confirmed reports of terrorist using pre-paid cellular, there is significant information to suggest that other criminal organizations, like gangs and narcotics traffickers are taking advantage of this technology.  Law enforcement officials should be sensitive to any reports of suspicious or large purchases of pre-paid cellular telephones.

An interesting place to see how terrorists are using the Internet is the Search for International Terrorist Entities, or the SITE Institute.  This organization monitors terrorist websites and communications. 

            The Internet has provided global and instantaneous communications.  There has been quite a bit of news about how the government can monitor Internet communications.  If you sent an email with certain key words you could expect the message to be flagged for human review.  Indeed, it is very likely that if you sent an email from certain geographic regions, through certain Internet Service Providers and it contained certain key words it would be monitored. 

            Terrorists have tried to mask or disguise their use of email by having relatively anonymous accounts provided free by various services.  But, any message you send over the email account is susceptible to interception.  Terrorists devised a way to minimize detection by using anonymous email accounts not for transmission, but as holding files.  As an example, Terrorist A wants to send a message to Terrorist Cell B.  Terrorist A logs onto an email account, drafts a message and saves it as a draft.  Terrorist Cell B is told through some other means that an email account will be established and the password.  Terrorist Cell B periodically logs onto the same account and reads the drafts and changes them with a confirmation message.  The draft is saved and never sent.  This logging on and drafting prevents interception because the message is never sent.  It remains one of millions of unsent messages.

            While terrorist are using technology to communicate it is likely that they are mostly relying on time-tested spy tradecraft like dead drops.  A dead drop is a pre-determined location where messages or material are left so that cell members do not have to meet face to face.  Or, in areas where there is significant social support for their movements, face-to-face meetings.  Whatever their means of communication, as the complexity of their cellular structure grows, so does the complexity of their communication schemes and the likelihood of interception.  As learning organizations we can expect terrorist cellular groups to learn how law enforcement discovers them and then devise new means of covert, secure communications.


Copyright 2003 - 2017 Hi Tech Criminal Justice