****The Terrorist’s Dilemma

laptops, soldiers

(photo: wikimedia)

By Jacob N. Shapiro – an academic’s look at the organizational constraints on traditional terrorist organizations—from those in pre-Revolution Russia to the Irish Republican Army to Al Qa’ida to Fatah and Hamas—and how groups manage these difficulties. Princeton professor Shapiro gave a fascinating talk about his research last December and resolved to read his book.

In part, his message is that terrorist organizations face many of the familiar challenges as do other organized human endeavors. They have resource management issues, they have personnel issues, they have issues related to achieving their goal. But operating as covert and violent organizations imposes a number of additional, unique security constraints.

A key factor is the extent to which “management”—the terrorist leaders at the top—and “line” personnel—the people carrying out day-to-day operations are in sync. Often, they are not. A terrorist organization’s leaders typically have a political agenda, which requires compromise, negotiation, a focus on long-term goals and, therefore—in an effort not to alienate national leaders or the populace of the host country—the need to keep a lid on violence, at least to some degree. This is because, as Shapiro says, “the groups that eventually win political power, or even major concessions, do so not on the strength of their violence, but on the back of large-scale political mobilization and participation in normal politics.”

By contrast, people drawn to the front lines of the same terrorist movement, to whom operational decisions may be delegated, are likely to be more extreme and to seek confrontation and heightened violence, “action in its own right,” Shapiro says. Disagreement in the ranks is common, as personal histories and captured documents amply demonstrate. Even Osama bin Laden counseled restraint among the rank-and-file.

However, controlling the troops requires a fair amount of communication, and every communication between underground organization leaders and the field entails a security risk. Thus, control is always imperfect. Similarly, it is the leaders of terrorist organizations who generally are the fundraisers and the people responsible for husbanding the organization’s resources. Closely managing who spends funds for what purposes again leads to security exposure. These two tradeoffs—operational security vs. tactical control and operational security vs. financial efficiency—play out in one underground terrorist organization after another, across time and geography.

Much has been learned about these organizations (via captured documents—and in one case reported here, which would be unbelievable if it were written into a political thriller, Wall Street Journal reporter Alan Cullison purchased a used laptop in Kabul as a quickie replacement and discovered his new machine had been that of Al Qa’ida #2 Ayman al-Zawahiri, turned in for resale without wiping the hard drive.)

Shapiro contends that understanding why terrorist organizations make the choices they do is an essential first step in designing counter-terror policies. For any number of reasons, ISIS may be different than these past organizations and not understanding those differences also will lead to tragedy.