Home » Education » Effective Counter Terrorism Strategy Challenges

Effective Counter Terrorism Strategy Challenges

by Daniyal
103 views

In the post 9/11 world, the word or phenomenon which seems to have attracted all the limelight to itself is: Terrorism. The magnitude of gravity which is associated with this word has been felt on various occasions and in numerous places over the years. The excruciating impact that it leaves behind, at times leads to such mental and physical changes which are of irrevocable nature. The word terrorism is defined as, “Terrorism is an attempt to achieve (or prevent) political, social, economic or religious change by the actual or threatened use of violence against another person or another persons’ property; the violence (and threat thereof) employed therein is aimed partly at destabilizing (or maintaining) an existing political or social order, but mainly at publicizing the goals or causes espoused by the agents or by those whose behalf the agents acts; often, though not always, terrorism is aimed at provoking extreme counter- measures which will win public support for the terrorists and their goals…” The radicals associated to terrorism are not confined to any particular region or race; rather it entails an extensive influence of drastic nature globally. Due to this very severity, terrorism has caught attention of various bodies globally which aim to reduce this nuisance through counter-terrorism strategies. These strategies can be dully defined as, “Activities which are intended to prevent terrorists acts or to eradicate terrorists groups” (thefreedictionary.com, 2014). Another definition for such methods is as follow; “Operations that include the offensive measures taken to prevent, deter, pre-empt and respond to terrorism. Also called CT” (US Department of Defense, 2005).  Such strategies can be designed and implemented at regional, national and at inter-national levels (UNODC, 2009). Although, these instruments are aimed at enhancing the efforts to exterminate violence but more than often these strategies are often coupled with certain downsides or limitations, particularly the delivery and implementation of such counter terrorism activities in operational practice pose a variety of challenges in balancing security and freedom.

Effective Counter Terrorism Strategy Challenges

A counter terrorism strategy is often designed in collaboration with certain other states or non-state actors, particularly if it is of inter-national level. One of the challenges which arise in such counter terrorism strategies is the conflict of interest. Globalization has increased the likelihood of conflict, involving failed-state and non state actors (The Strategic Defense and Security Review, 2010). What might be a measure of security for one nation might become a source of discomfort for the other. Similarly, the concept of freedom varies from region to region. A lot of cultural and environmental factors come into role when freedom is defined in any nation (ifsw.org, 2012). Therefore, to implement such a counter terrorism strategy which takes into account all the concerned state and non-state actors becomes a challenge. Some of the nations might feel a sense of “imposition” upon them, particularly if their definition of freedom and security varies tremendously from what the counter terrorism strategies aim to render. Another situation which might cause concern is when a nation has to pay a greater price for security and the so-called freedom in the process of implementation of counter terrorism strategy. An example of it is the War on Terror which is currently being carried out in Pakistan. Even though it is supposedly a counter terrorism strategy designed by the United States and also implemented as per her wishes, the hefty price that Pakistan has to pay is a cause of concern for the Pakistani populace (Rustamani, 2013). Following are the official statistics of the killing and injuries incurred in Pakistan due to CIA drone strike from 2004-2013 (thebureauinvestigates.com, 2014);

  • Strikes (total): 381
  • Barrack Obama strikes : 330
  • Killed (total); 2412-3701
  • Children Killed: 168-200
  • Civilians killed: 416-951
  • Injured” 1122-1606

Apart from the above mentioned casualties, the direct and indirect cost of War on Terror incurred by Pakistan amount to $67.93 billion and Rs. 5037 billion respectively (Altaf, 2013). In this case, the general perception prevalent among Pakistani masses is that an American war is being fought on their land and they are paying an unjustified price (Fair, 2009). In this classic case, what appears to a measure of security for America is actually jeopardizing the freedom of Pakistan. The growing tensions within Pakistan have now substantiated this fact that the there exists a conflict of interest between the two nations, a challenge due to which the counter terrorism strategies fail to balance security and freedom in Pakistan particularly.

Apart from the conflict of interests, another major challenge which arises in delivering an effective counter terrorism strategy is the reconciliation of human rights with counter terrorism.  In the contemporary times, all the developed nations are faced with threats of terrorism, be it from home-grown terrorists or from foreign elements (Mueller, 2012). This scenario provides a major challenge for democratic and developing countries to adequately react to looming terrorism attacks without jeopardizing basic human rights, which are considered hallmarks of all democratic countries. Nations that fail to strike a balance between human rights and national security jeopardize the effectiveness of the counter terrorism strategies and also pose a problem for the perpetual maintenance of the tolerant and autonomous ideals of the society. Even though, the importance of human rights is widely accepted and also, it remains the most frequently quoted concept yet, the prevalent climate often fails to take into account the compatibility of human rights with counter terrorism strategies(Cooper). No one denies the right and duty of governments to protect its citizens but the outright abandonment of freedom and democratic rights appears to be embedded in the legal systems of certain countries. Doussa (2006) accuses Australian legal system of such practices in his lecture and suggests in his lecture that those individuals who show their concern for human rights compatibility of the counter terrorism strategies are blamed for “defending terrorists or failing to take the threat of terrorism seriously”. Neglecting fundamental human rights implies an over-emphasis on security which ultimately leads to restriction in freedom of the individuals. Doussa has proposed a solution to curb this challenge. He says in this lecture, “An essential strategy in countering the extremism that breeds terrorism is to win the ‘contest of ideas’ by rigorously defending the basic human rights and freedoms which form the ‘bedrock of dignity and democracy that make our societies worth protecting”. If one’s own human rights credentials are undermined, then the task of balancing security and freedom becomes tough. Kofi Anan, former United Nations Secretary General, has rightly said that, “…compromising human rights…facilitates achievement of the terrorists objective – by ceding to (them) the moral high ground, and provoking tension, hatred and mistrust of government among precisely those parts of the population where he is most likely to find recruits. Upholding human rights is not merely compatible with successful counter-terrorism strategy. It is an essential element.” (United Nations Secretary General Kofi Annan, 2005). Recently, China has issued a report, after the State Department issued its annual Human Rights report, in which it has heavily criticized the United States for denouncing human rights while pursuing its counter-terrorism strategies.  The report claims that the US government- run intelligence program, called PRISM, “seriously infringes on human rights”. The report further criticizes US for the drone attacks in Pakistan, which have led to severe casualties among civilians as well (geo.tv, 2014). Such aggressive counter terrorism strategies which create an imbalance between security and freedom are often highly regarded by the general masses, because apart from sufferings caused by the terrorist threats they also have to bear the curtailment of their fundamental rights. If this challenge is not properly addressed and handled, then any government can face strong opposition from the populace.

Another area of concern which is associated with counter terrorism strategies is the consideration of ethics while formulating and delivering such programs. Counterterrorism professionals are often faced with ethical dilemmas, particularly when decision-making comes under the spotlight (Reding, Van Gorp & et al., 2014). Certain key characteristics of ethical decision-making might be ignored or taken lightly. Some of the policy makers are so driven to eradicate terrorism that develop a tendency to be insensitive to certain issues, for instance towards any particular region, race or ethnicity. This can also lead to stereotyping and subjective biases can creep in if ethical issues are not addresses in due time. For instance, nowadays Muslims are largely labelled as terrorists and are considered to be a threat. In the words of Um and Pisoiu (2011), in Western countries the main area of focus has shifted upon “fight against terrorism, in particular of ‘Islamist’ nature”. Labelling a religion and use of such terms can be offensive to Muslims who are peace loving and support the counter terrorism strategies whole heartedly (Elawawadh, 2013). In this case, although the balance between security and freedom might be rightly achieved but the cost of freedom might incur emotional thrashing to some. The policy- makers should be aware to use such methods and measures which should be aimed at debasing any group but should rather be focused upon eliminating violence.

Furthermore, the growing role of media and internet has also become a source of challenge. Many argue that when media flashes the same shots of violence over and over again, it ‘publicizes’ the terrorists’ aim and also projects their ‘success’. Similarly, internet-based activism has also led many terrorists to disseminate their ideologies which have initiated strong social and political movements across the globe (Weimann, 2005). Not only internet facilitates recruitment of disgruntled citizens by these terrorist groups (Magnuson, 2010). Also, it helps in indoctrination of naïve minds (Stanley Foundation, 2007). The use of internet and media, in general, has become a part of modern man’s lifestyle and also a necessity of contemporary times. When such means become infected, their impact is hard to manage and measure and thus, the security which is supposedly provided by counter terrorism strategies becomes questionable. Also, if terrorists have succeeded to control media and internet, then the freedom of a lay man becomes highly endangered.  As long the implementation of counter measures does not involve a check of media and internet, their effectiveness becomes uncertain. 

Also, modern critical infra-structure is known to be highly inter-dependent, which implies that if one facility is attacked then it can render severe problems for other critical structures as well (Parfomak, 2008). On September 3rd 2013, a group of tribesmen disconnected water supply from a river named Sebha in Libya, and threatened to disconnect the supply permanently if Anoud Senussi was not returned within 72 hours (Essul and Elraqubi, 2013). Although, the water supply was restored on September 12th 2013, as mentioned in a news article in Libya Herald (Westcott, 2013), but by disabling the water supply, the terrorists were able to cripple and endanger multiple infra-structures and also, the locals had to face water shortage as well. Not only this, but the oil exports also suffered due to this incident. Since, the water supply was cut, therefore, the ships could not operate and Libya had to incur serious economic and business losses. This example explains that the extent to which inter-dependence of critical infra-structures poses an acute problem for counter terrorist strategies, because they fundamentally do not address this issue. Critical infra-structures are easy targets for terrorists (terrorismstudies.com, 2010). Since, this inter-dependency cannot be eliminated entirely; therefore, security and freedom of individuals remain under constant threat.

Therefore, it is recommended to the policy-makers of the counter terrorism strategies to take note of these challenges and to ensure that the methods adopted to fight against violence and crimes are capable of handling these issues. The challenges are of severe nature and have the tendency to emerge as hard core predicaments in future that is why they cannot be ignored. The policy makers should evaluate and access the counter terrorism strategies and should not be blinded by them. The strategies need to be flexible in order to cater to the dynamic atmosphere of the global landscape, where terrorism is one of the biggest problems. While designing counter terrorism measures the interests of various stake-holders, human rights compatibility, influence of internet and media and inter-dependence of critical infra-structure must be given due importance, because only then the balance between security and freedom can be achieved.

Bibliography
  • Altaf, A. (2013). Impact of Terrorism on the Economy of Pakistan. Available: http://www.slideshare.net/AA422/akhlaq-altaf. 
  •  Available: http://www.humanrights.gov.au/news/speeches/reconciling-human-rights-and-counter-terrorism-crucial-challenge. 
  • Available: http://www.osce.org/odihr/29103.
  • Available: http://www.rand.org/pubs/research_reports/RR251.html.
  • Cooper,  J.(N.D.)Countering Terrorism, Protecting Human Rights
  • Corlett, J. A. (2003)Terrorism: A Philosophical Analysis. Netherlands: Springer. p.120
  • Doussa, J.V. (2006). Reconciling human rights and counter-terrorism – a crucial challenge
  • Elawawadh,  H. (2013).Why are so many innocent Muslims labelled as terrorists?. Available: http://chicagomonitor.com/2013/04/not-all-muslims-are-terrorists/. 
  • Essul, S. and Elraqubi, E. (2013). Man-Made River “cut”; western Libya could face water shortage  Available: Available: http://www.libyaherald.com/2013/09/03/man-made-river-cut-western-libya-could-face-water-shortage/#axzz2mMdg69x0
  • Fair, C. C. (2009)Pakistan & Afghanistan: Domestic Pressures and Regional Threats : Pakistan’s Own War on Terror: What the Pakistani Public Thinks Available: http://jia.sipa.columbia.edu/pakistan%E2%80%99s-own-war-terror-what-pakistani-public-thinks.
  • Handling ethical problems in counterterrorism An inventory of methods to support ethical decision-making
  • ifsw.org (2012). Globalization and the environment. Available: http://ifsw.org/policies/globalisation-and-the-environment/. 
  • Magnuson, S. (2010). Futile to Control Internet Terrorist Recruitment, Witnesses Say . Available:http://www.nationaldefensemagazine.org/archive/2010/July/Pages/FutiletoControlInternetTerroristRecruitment.aspx
  • Mueller, J. (2012). Evaluating the Homegrown Terrorist Threat. Available: http://www.cato.org/events/evaluating-homegrown-terrorist-threat. 
  • Paul, P. (2008)Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options, CRS Report for Congress, updated September 12
  • Reding, Van Gorp & et. al. (2014)
  • Rustamani, I. (2013). A Story of Journey of Terrorism to Pakistan. Available: http://thecapitalpost.com/story-journey-terrorism-pakistan-p-24679.html. 
  • The Strategic Defence and Security Review (2010). Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review. Available:http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191634.pdf
  • Um E.V. and Pisoiu, D.(2011).Effective counterterrorism: What have we learned so far?. Available:https://www.diw.de/documents/publikationen/73/diw_01.c.386651.de/diw_econsec0055.pdf
  • United Nations Secretary General Kofi Annan. Address to the closing plenary of the International Summit on Democracy, Terrorism and Security, delivered in Madrid, Spain, 10 March 2005. Press Release
  • US Department of Defense (2005). Counterterrorism . Dictionary of Military and Associated Terms.
  • Weimann, G.(2005). How Modern Terrorism Uses the Internet. Available: http://www.securityaffairs.org/issues/2005/08/weimann.php
  • Westcott, T. T. (2013) Running water – coming back to a tap near you Available: http://www.libyaherald.com/2013/09/12/running-water-coming-back-to-a-tap-near-you/#ixzz2mrhmm57f. Available: http://www.libyaherald.com/2013/09/12/running-water-coming-back-to-a-tap-near-you/#axzz2mMdg69xO
  • www.geo.tv (2014). China lashes out at US over drone attacks in Pakistan. Available: http://www.geo.tv/article-139527-China-lashes-out-at-US-over-drone-attacks-in-Pakistan. 
  • www.stanleyfoundation.org (2007). Implementation of the UN Global Counterterrorism Strategy. Available: http://www.stanleyfoundation.org/publications/report/UNND807.pdf. 
  • www.terrorismstudies.com (2010). Terrorism Studies: Critical Infrastructure Protection. Available: http://www.terrorismstudies.com/page/terrorism_critical_infrastructure. 
  • www.thebureauinvestigates.com (2014). Drone strikes in Pakistan. Available:http://www.thebureauinvestigates.com/category/projects/drones/drones-pakistan/.
  • www.thefreedictionary.com (2014). Counterterrorism. Available: http://www.thefreedictionary.com/counterterrorism. 
  • www.unodc.org (2009)International Workshop of National Counter-Terrorism Focal Points: Better linking national and global counter-terrorism efforts. Available: http://www.unodc.org/documents/terrorism/Publications/International_WS_National_CT_FocalPoints/English.pdf

You may also like

Leave a Comment