zenpundit.com » Tactics

Archive for the ‘Tactics’ Category

Farrall in Foreign Affairs:How al Qaida Works

Thursday, February 24th, 2011

Leah Farrall, the Australian former counterterrorism official who blogs at All Things Counterterrorism (and is a friend of Charles Cameron ) has an important analytical article in Foreign Affairs (hat tip to the oratorical Josh Foust):

How al Qaeda Works

Despite nearly a decade of war, al Qaeda is stronger today than when it carried out the 9/11 attacks. Before 2001, its history was checkered with mostly failed attempts to fulfill its most enduring goal: the unification of other militant Islamist groups under its strategic leadership. However, since fleeing Afghanistan to Pakistan’s tribal areas in late 2001, al Qaeda has founded a regional branch in the Arabian Peninsula and acquired franchises in Iraq and the Maghreb. Today, it has more members, greater geographic reach, and a level of ideological sophistication and influence it lacked ten years ago.

Still, most accounts of the progress of the war against al Qaeda contend that the organization is on the decline, pointing to its degraded capacity to carry out terrorist operations and depleted senior leadership as evidence that the group is at its weakest since 9/11. But such accounts treat the central al Qaeda organization separately from its subsidiaries and overlook its success in expanding its power and influence through them. These groups should not be ignored. All have attacked Western interests in their regions of operation. Al Qaeda in the Arabian Peninsula (AQAP) has also long targeted the United States, but its efforts have moved beyond the execution stage only in the last two years, most recently with the foiled plot to bomb cargo planes in October 2010. And although al Qaeda in the Islamic Maghreb (AQIM) has not yet attacked outside its region, al Qaeda in Iraq (AQI) was reportedly involved in the June 2007 London and Glasgow bomb plots.

It is time for an updated conception of al Qaeda’s organization that takes into account its relationships with its subsidiaries. A broader conceptual framework will allow for a greater understanding of how and to what degree it exercises command and control over its expanded structure, the goals driving its expansion strategy, and its tactics.

AL QAEDA’S LOST DECADE

Although al Qaeda had tried to use other groups to further its agenda in the 1980s and early 1990s, Osama bin Laden’s first serious attempts at unification began in the mid-1990s, when the organization was based in Sudan. Bin Laden sought to build an “Islamic Army” but failed. Al Qaeda had no ideology or manhaj (program) around which to build lasting unity, no open front of its own to attract new fighters, and many of its members, dissatisfied with “civilian work,” had left to join the jihad elsewhere. Faced with such circumstances, bin Laden instead relied on doling out financial support to encourage militant groups to join his army. But the international community put pressure on Sudan to stop his activities, and so the Sudanese government expelled al Qaeda from the country in 1996. As a result, the group fled to Afghanistan.

By mid-1996, al Qaeda was a shell of an organization, reduced to some 30 members. Facing irrelevance and fearing that a movement of Islamist militants was rising outside of his control, bin Laden decided a “blessed jihad” was necessary. He declared war on the United States, hoping this would attract others to follow al Qaeda. It did not. A second effort followed in 1998, when bin Laden unsuccessfully used his newly created World Islamic Front for Jihad Against Jews and Crusaders to lobby other groups to join him. Later that year, al Qaeda launched its first large-scale attacks: the bombings of the U.S. embassies in Kenya and Tanzania, which it hoped would boost its fortunes. But these, too, failed to attract other groups to join, with some instead criticizing al Qaeda for the attacks and its lack of a legitimate manhaj.

With no coherent ideology or manhaj to encourage unification under his leadership, bin Laden instead pursued a predatory approach. He endeavored to buy the allegiance of weaker groups or bully them into aligning with al Qaeda, and he attempted to divide and conquer the stronger groups. In the late 1990s, he tried and failed to gain control over the Khalden training camp, led by the militants Ibn al-Shaykh al-Libi and Abu Zubaydah, and over the activities of Abu Musab al-Suri and Abu Khabab al-Masri, senior militant figures who ran their own training programs. Bin Laden’s attempts in 1997-98 to convince Ibn al-Khattab, a Saudi militant who led an international brigade in Chechnya, to come under al Qaeda’s banner also failed. His efforts in 2000-2001 to gain control over a brigade of foreign fighters in Afghanistan met a similar fate: the Taliban leader Mullah Omar, who had supreme authority over the brigade, instead handed the leadership of it to the Islamic Movement of Uzbekistan, another group bin Laden was attempting to convince to align with al Qaeda. Around the same time, bin Laden also unsuccessfully lobbied the Egyptian Islamic Group and the Libyan Islamic Fighting Group to join al Qaeda’s efforts. And although al Qaeda supported the militant Abu Musab al-Zarqawi in his establishment of an independent training camp in Afghanistan, bin Laden was unable to convince him to formally join the organization.

The only real success during this period was al Qaeda’s mid-2001 merger with Egyptian Islamic Jihad, led by Ayman al-Zawahiri, now al Qaeda’s second-in-command. The merger was possible thanks to Egyptian Islamic Jihad’s weakened position and its reliance on bin Laden for money. The decision was nevertheless contentious within Egyptian Islamic Jihad, and several of its members left rather than join with al Qaeda. In the end, al Qaeda’s only successful merger during its Afghanistan years added just five people to its core membership. Compared to this dismal record, the past decade has been highly successful….

Read the rest here (subscription required) or for a brief time in full, for free, here.

First, I’d like to say congratulations to Ms. Farrall who has been working hard researching the nuances of ideological, theological, tactical and organizational differences and personal rivalries that existed within the mutable and murky subterranean world of professional Islamist revolutionaries. It’s important work. Her recognition in FA is deserved and American terrorism experts should give her arguments close scrutiny.

Secondly, I will say her article shows the extent to which our takfirist enemies, not just al Qaida,  take seriously the ideas behind their global insurgency and that, to them, it is both global and local. The “internationalist” jihadis like Bin Laden seek to weld themselves together with the parochial “Nationalist-Islamists” and David Kilcullen’s local “accidental guerrillas” with a “eucumenical” radical Islamism. As many USG officials seek to ignore or promote an official line of ignoring the ideological and theological motivations of our enemies, they will probably dismiss Farrall unless she gains enough media prominence that this is no longer feasible – at which point, they will make nasty and anonymous criticism about her on background to The New York Times and The Washington Post.

Thirdly, Farrall has a very important point here when she wrote:

….They drew from takfiri thought, which justifies attacking corrupt regimes in Muslim lands, and on materials that outline the Muslim requirement to target the global enemy: in this case, the United States and the West. (This was framed in the context of defensive jihad, the need for which was reinforced by the 2003 U.S. invasion of Iraq.) The hybrid ideology and manhaj that emerged make little distinction between targeting local enemies and targeting global ones and have a one-size-fits-all solution — jihad. Partnering with al Qaeda does not, therefore, require a local group to abandon its own agenda, just broaden its focus. This helped assuage other groups’ fears that merging with al Qaeda would mean a loss of autonomy to pursue their own local goals.

This is what Global Guerrilla theorist John Robb would call “a Plausible Promise“, a required step in building an “open source insurgency” which can attract groups with differing agendas, opportunitic actors and ideologically motivated, socially alienated “lone wolves” to their banner. Al Qaida has tacticians who apparently agree, having formally adopted “Open Source jihad” in late 2010. So far, the executive branch departments of the USG seem to be studiously determined to ignore that as well, a stance that corrupts our analytical integrity and cripples our operational effectiveness. Lying to oneself is rarely a good way to get an advantage over an opponent.

I think I can speak for Charles Cameron in that we here at zenpundit.com hope to see more articles from Ms. Farrall in the near future.

ADDENDUM:

SWJ BlogThe Hasan Slide Presentation A Preliminary Commentary by Charles Cameron

Gene Sharp

Monday, February 21st, 2011

[ by Charles Cameron ]

I was impressed by him in London in the early sixties.

Okay, I was young and impressionable. But others have noticed him more recently, too: Hugo Chavez accused him of being a conspirator with the CIA, and the Iranians thought he, George Soros and John McCain were in cahoots.

gene-sharp.jpg

Gene Sharp has been in the news quite a bit recently [1, 2, 3, 4], because he pretty literally wrote the book on non-violent resistance.

The young leaders of the Egyptian revolt that toppled Mubarak studied tactics with members of the Serbian Otpor youth resistance who topped Milosevic, Otpor studied tactics in the writings of Gene Sharp, specifically his 90-page pamphlet From Dictatorship to Democracy [download as .pdf]. Sharp wrote that handbook for use in Burma, where it was apparently translated at the request of Aung San Suu Kyi — who once cautioned her readers that that phrase they kept hearing wasn’t “jeans shirt”, it was “Gene Sharp”.

And before that, he’d penned his masterful 900-page, three-volume work, The Politics of Nonviolent Action

I told you he was impressive.

Recommended reading:

From Dictatorship to Democracy is now available in Amharic, Arabic, Azeri, Belarusian, Burmese, Chin (Burma), Jing-paw (Burma), Karen (Burma), Mon (Burma), Chinese (Simplified Mandarin), Chinese (Traditional Mandarin), English, Farsi, French, Indonesian, Khmer (Cambodia), Kyrgyz, Pashto, Russian, Serbian, Spanish, Ukrainian, Tibetan, Tigrigna, and Vietnamese.

The colors of hope

Thursday, February 10th, 2011

[ by Charles Cameron — cross-posted from Brainstormers on the Web ]

You know, we talk a lot about Facebook and Twitter as technologies for change, but how about painted fingers?

Sources: Iraq — and she was too young to vote! — Iran

Egypt: Réfléchissons

Thursday, February 10th, 2011

[ by Charles Cameron — cross-posted from Brainstormers on the Web ]

One thing leads to another, and building that DoubleQuote made me want to include another picture of a man with a tank — from a somewhat but by no means entirely similar situation a couple of decades back…

which led me in turn to this:

But then, you know, this is the web, and while searching for some URLs to give you so you could look at these images full size and with the appropriate attributions, I stumbled across yet one more image for my peaceful uses tanks can be put to collection, and realized there’s more than one way to relax with a tank while you decide what to do next…

In any case: here are the sources:

PrayerReflection
Tienanmen SquareTahrir Square #23
ReadDream

NSDD-32 as Ronald Reagan’s Grand Strategy

Wednesday, February 9th, 2011

 

[Cross-posted to the Ronald Reagan Roundtable at Chicago Boyz]

Big Peace blogger Sun Tzu has dug into the historical archives to post NSDD-32, the cornerstone document for coordinating the Reagan administration’s foreign, defense and intelligence policies ( Hat tip to Col. Dave).

“NSDD” stands for “National Security Decision Directive”. In essence, the document is an executive order issued through the National Security Council to executive branch agencies represented or under the supervision of the NSC. A NSDD (or “PDD” in Democratic administrations) carries the force of law and is often highly classified, frequently being used for presidential “findings” for approving covert operations, as well as to set national security policy.

NSDD-32: Ronald Reagan’s Secret Grand Strategy

CLASSIFIED:  TOP SECRETTHE WHITE HOUSE
WASHINGTON

May 20, 1982

National Security Decision
Directive Number 32

U.S. NATIONAL SECURITY STRATEGY

I have carefully reviewed the NSSD 1-82 study in its component parts, considered the final recommendations of the National Security Council, and direct that the study serve as guidance for U.S. National Security Strategy.

Our national security requires development and integration of a set of strategies, including diplomatic, informational economic/political, and military components.  NSSD 1-82 begins that process. Part I of the study provides basic U.S. national objectives, both global and regional, and shall serve as the starting point for all components of our national security strategy.

The national security policy of the United States shall be guided by the following global objectives:

  • To deter military attack by the USSR and its allies against the U.S., its allies, and other important countries across the spectrum of conflict; and to defeat such attack should deterrence fail.
  • To strengthen the influence of the U.S. throughout the world by strengthening existing alliances, by improving relations with other nations, by forming and supporting coalitions of states friendly to U.S. interests, and by a full range of diplomatic, political, economic, and information efforts.
  • To contain and reverse the expansion of Soviet control and military presence throughout the world, and to increase the costs of Soviet support and the use of proxy, terrorist, and subversive forces.
  • To neutralize the efforts of the USSR to increase its influence through its use of diplomacy, arms transfers, economic pressure, political action, propaganda, and disinformation.
  • To foster, if possible in concert with our allies, restraint in Soviet military spending, discourage Soviet adventurism, and weaken the Soviet alliance system by forcing the USSR to bear the brunt of its economic shortcomings, and to encourage long-term liberalizing and nationalist tendencies within the Soviet Union and allied countries.
  • To limit Soviet military capabilities by strengthening the U.S. military, by pursuing equitable and verifiable arms control agreements, and by preventing the flow of militarily significant technologies and resources to the Soviet Union.
  • To ensure the U.S. access to foreign markets, and to ensure the U.S. and its allies and friends access to foreign energy and mineral resources.
  • To ensure U.S. access to space and the oceans.
  • To discourage further proliferation of nuclear weapons.
  • To encourage and strongly support aid, trade, and investment programs that promote economic development and the growth of humane social and political orders in the Third World.
  • To promote a well-functioning international economic system with minimal distortions to trade and investment and broadly agreed and respected rules for managing and resolving differences.

In addition to the foregoing, U.S. national security policy will be guided by the operational objectives in specific regions as identified in Parts I and III of the study.

Read the rest here.

Normally, for important NSDD, there will be several preliminary meetings of principals (the statutory members of the NSC) or their key deputies, before the text of the NSDD is prepared by the NSC adviser or executive director (sort of the chief of staff of the NSC) and the White House Counsel before it is formally approved by the NSC and signed by the President. This however, is not set in stone. Presidents are free to determine the NSC procedures of their administrations or ignore them if it suits their purpose. It is hard to imagine Richard Nixon fully briefing his SECSTATE William Rogers on anything of importance, much less doing it through Kissinger’s NSC, or JFK permitting any kind of bureaucratic structure to constrain his prerogatives.

NSDD-32 was prepared under the auspices of Reagan’s second NSC Adviser, “Judge” William P. Clark, who succeeded the hapless William V. Allen. Clark was the most conservative of Reagan’s many NSC Advisers and, as a California political crony of the president, the only Washington outsider. As a result, Clark was in tune with DCI William Casey and UN Ambassador Jeanne Kirkpatrick, hostile toward the views of State Department Soviet experts and far more interventionist than the top officials at Cap Weinberger’s OSD (Office of the Secretary of Defense). Clark had previously served at State as Deputy Secretary under Al Haig, an experience that did not leave him with a good impression of the loyalty of senior State Department officials to the administration’s foreign policy goals.

The activist “we win, they lose” strategy laid out NSDD-32 reflects Clark’s alignment with William Casey and it is very hard to credit Reagan’s national security strategy looking like NSDD-32 if it had been concocted by Colin Powell, Frank Carlucci and George Schultz, making Clarks brief tenure of critical historical importance. Powell, Carlucci and Schultz are all fine public servants but were disinclined by temperment and institutional loyalty to have articulated a strategy that “went on offense”; though, in fairness to Schultz, as SECSTATE he made very effective diplomatic use of Reagan Doctrine programs that State consistently opposed ( Contra aid, covert aid to the Afghan Mujahedin, UNITA and RENAMO) to extract concessions from the Soviets at the bargaining table.


Switch to our mobile site