StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Structural Peculiarities of Terrorist Organizations - Essay Example

Cite this document
Summary
The essay "Structural Peculiarities of Terrorist Organizations" analyzes the major issues on the structural peculiarities of terrorist organizations. Terrorist organizations are organizations that directly or indirectly engage themselves in preparing, planning, assisting, and fostering terrorist acts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Structural Peculiarities of Terrorist Organizations
Read Text Preview

Extract of sample "Structural Peculiarities of Terrorist Organizations"

Structures of terrorist organizations Structures of terrorist organizations Introduction Terrorist organizations are organizations that directly or indirectly engage themselves in preparing, planning, assisting and fostering a terrorist act without consideration of its occurrence. A terrorist act is an action or a threat of action where done out of political, religious and ideological reasons or with the intentions of humiliating or coercing or intimidating the government of a particular country, state, territory or even the public. An action by a terrorist organization can constitute a terrorist act if it: Causes physical harm to a person Damages property Causes death of a person Puts a person’s life in danger other than the person committing the action Risks the life or safety of the public Seriously disrupts or destroys systems of information, telecommunication, financial, transport system among others. Decentralization is a type of organizational structure whereby daily operations, responsibilities of decision making and other military logistics are delegated by the top management to other middle level and lower level managers either within the same or different geographical areas. On the other hand, centralization refers to the organizational structure whereby most of the major logistics such as decision-making, resource allocation are conducted at the same office, which is the central head office. Decentralization by terrorist groups offers relatively more advantages than centralization (Rapoport 2004, p. 47). There has been efforts by the United States together with its allies aimed at destabilizing the Al-Qaeda organization but this organization continues to operate as normally and even more stronger and has been big security threat to the US and other western nations. Research has shown that part of Al-Qaeda’s prolific success lies mostly on its ability to function as a decentralized organization. Although the U.S invaded Afghanistan and Iraq, Al-Qaeda still poses serious threats to the national security of the U.S and this has been contributed by the decentralized manner in which they operate. The U.S has targeted this organization both militarily and politically but despite this, Al-Qaeda continues to thrive. Al-Qaeda has conducted several terrors acts even despite the efforts of Global War on Terror (GWOT) by the U.S. (Cronin 2008, p.102). Most modern terrorist organizations are thriving on very well because they function as distributed networks in what is called as decentralized system. The manner in which they operate makes such organizations able to survive better than if they were organized in hierarchical systems. Initially, GWOT actions had significant significances on Al-Qaeda but with the manner in which it operates, it has remained a resilient organization. For example, autonomous individuals and cells and advanced technologies combined with globalization tools and the motivation to undertake terrorist acts just represents “microactors” who are difficult to detect and counter. Ori Brafman and Roy Beckstrom present this phenomenon in the book ‘The Starfish and the Spider: The Unstoppable Power of Leader-less Organizations’. They present a theory, which explains this scenario in detail. In their book, these two authors make comparisons between centralized and decentralized organizations. They state that decentralized institutions base much on completely different principles than the traditional centralized organizations and they are based much on shared ideologies (Brafman & Beckstrom 2006, p129). Decentralized structures such as the Al-Qaeda are very powerful to deal with. On the other hand, centralized governments such as the U.S government are based much on a clear organizational structure thus; it becomes easy and feasible to come up with tactics and strategies that can defeat such force. Al-Qaeda is a well-structured organization with operations well distributed in different regions. It is run around a central ideology and this is one reason it is considered a threat to Western societies. It advocates for unity among the Muslim society whereby it promotes Muslims to take action against the Non-Muslim community. Al-Qaeda uses recruiting and training operations, which creates empathy and confidence among the team for the justice, which they pursue as an organization and to collaborate with allies in coming up with a formidable operating environment. They use adaptive procedures and processes as well as exploiting the current technology when executing their plans and this has enabled them to remain agile in their operations (Brafman & Beckstrom 2006, p126). Decentralization Most terrorist organizations have embraced decentralization of operations and have become more adaptive and flexible to their environment and this has been brought about by the increasing involvement of the United States in counter-terror activities all over the world. Centralized and top-down terrorist organizations tend to lack feasibility especially if they have ambitions of targeting the U.S who use the latest military technology and multiple intelligence techniques and can target ant locality within the universe. Thus most successful terrorist organizations are those which embrace decentralization such as the al-Qaeda and the Islamic State of Iraq and Syria (ISIS). The al-Qaeda and the ISIS terrorist organizations The Islamic State of Iraq and Syria (ISIS) represent a good example of a trend of a decentralized terror network. This group started just as a branch from the al-Qaeda but due to its structural advancements, it has grown to a formidable terrorist group with a radical Islamic ideology and research shows that further decentralization will make it more dangerous and adaptable. The use of decentralized, adaptive and flexible terrorist networks limits the capability of the United States to successfully conduct counter-strikes against terrorist groups. It also maximizes the efficiency and unpredictability of terror organizations. ISIS is exceptionally efficient and effective in decentralizing its operations rather than planning and directing operational activities from a centrally located control and command. Through decentralization, ISIS has resulted into a new organizational model that is not easy to target and has created a new counter-terror challenges for the U.S and its allies. Decentralization is crucial for the survival of the leaders of many terrorist organizations. For instance, Osama Bin Laden died, Ayman al Zawahiri is hiding himself somewhere and many other numerous al-Qaeda leaders have been captured and killed since September 11 2001. The reason behind decentralization must be more practical. Apart from protecting the leaders of terrorist organizations, decentralization helps in increasing security for the groups. The ISIS has combined this concept with the increase in communication technology in its operations and this has made it more effective in its operations. Decentralization leads to the establishment of new terrorist organizations whose goals and objectives differ with those of the original. ISIS is no longer termed as a branch of al-Qaeda but a complete terrorist group, which though developed from al-Qaeda, has grown to be a perfect example of decentralization. A BBC news report on 3rd February 2014 asserted that al-Qaeda has no links with the ISIS which has been involved in lethal clashes in Syria. However, it does not insinuate that these groups do not share similar structures, goals, ideologies and targets (Rohan 2002, p234). Decentralization of terrorist organizations leads to innovation and creativity in military decision-making and execution and this prompts further success for such organizations. For instance, Khalid Sheikh Mohammed orchestrated and planned the September 11 attacks and not Osama Bin Laden or any other senior leader of al-Qaeda. Through this, the United States could not easily execute their counter attacks and the al-Qaeda group has considered this as creativity. This type of organizational management approach is what Brafman and Beckstrom precisely advocate for in their book, ‘The Starfish and the Spider’. This book provides managers with tools aimed at fostering creativity and innovation as well as equipping them with leadership attributes. This book also serves as a decentralization draft that describes how al-Qaeda and ISIS operates. In decentralization, there is no central leadership. Ayman al Zawahiri can be claimed as in charge of the al-Qaeda group but the reality is that he is not the commander and just controls a small continent of al-Qaeda bodyguards around him and has restricted communication with the rest of the entire organization. Brafman and Beckstrom call this a catalyst. They argue that a catalyst is different from a centralized leader. For instance, a Chief Executive Officer, CEO who is the overall boss not like a catalyst who interacts with other people as a peer. Catalysts inspire people within organizations (Brafman & Beckstrom 2006, p129) The capability of al Qaeda to instigate attacks is what makes it not easy to combat. Anyone who wishes can become part of al Qaeda, and it is not necessary for them to relocate to Pakistan and secure a training camp to join. Al-Qaeda units are everywhere around the globe. Terrorist attacks are mostly generated from the bottom upwards and are self-organizing and flexible local initiatives and this is what is referred to as decentralization at work. Members are provided with a certain level of autonomy and anonymity and at the same time, they are given the flexibility to carry out attacks in ways that best accomplish their objectives (Brafman & Beckstrom 2006, p127) Decentralization in al Qaeda and ISIS has been one of the success features of the organization. As counter attacks by the United States and its allies against the terrorist groups increase, the trend of decentralization among the groups and their command and control makes them more difficult to find and detect. This is precisely hoe Brafman and Beckstrom describe how decentralized organizations work. They assert that in decentralized organizations, anyone can be involved in any action. Decentralization is what allows ISIS and al-Qaeda to continue growing and adapting to change despite the measures by powerful governments such as the United States to combat them (Brafman & Beckstrom 2006, p132). Al-Qaeda has many cells, which are geographically distributed, and with local level leadership and this enhances autonomy in decision-making and execution. Al-Qaeda’s members are readily identifiable and it displays a self-organizing system during recruitment of new members, which is bound by ideology. In addition, training for the members is always conducted in ad hoc and decentralized means using virtual resources. This reduces financial requirements and the susceptibility of members as targeted by GWOT as well as the capability to reach a larger audience. The use of ad hoc and decentralized ways of training came after the U. S launched the QWOT campaigns targeting the Al-Qaeda who were initially using organized training camps, which were easily noticed by the U.S soldiers. The endurance of terrorist organizations varies considerably depending on the structure whether centralized or decentralized. Most terrorist groups tend to last longer than others do. This much depends on the structure and leadership of the group. For instance, centralized organizations tend to fail more easily than decentralized because they are concentrated in one place and can easily be attacked and their structures destroyed by organizations and agencies fighting against them. On e the leadership has been killed, the group ends up terminating operations. When negotiating with centralized terrorist organizations that have a clear leader, it can be worthy noted that decapitation of the leadership would have a significant impact on the entire group. However, decentralized and well-networked terrorist organizations are designed to fight and execute terrorist activities without specific leadership thus attacking a single leader would mean nothing since they have several other leaders in several geographical areas (Rohan 2002, p. 67). With the emergence of War on terror, most terrorist organizations such as the al-Shabaab and the al-Qaeda have adopted the decentralized form of terrorism. Out of this, it has been proved difficult to fight against such terrorist groups due to minimal direct contact as well as the mitigation of the state-terrorist relationship. On the other hand, hierarchical and centralized terrorist groupings such as Hezbollah and Hamas have far much different style of leadership than those of al-Qaeda and al-Shabaab. They are more easily targeted making war on terror campaigns to perform better (Rohan 2002, p. 69). Centralization A terrorist organization’s structure determines its capability and reach. Hamas and the Hezbollah terrorist groups tend operate in a centralized control and hierarchical structure (Asal & Rethemeyer 2006, p.73). Another dangerous network model has also emerged among terrorist groups and that is the centralized hierarchy that directly controls a group of social, political, and military cells of an institution. This to combines and strengthen support, military capability as well as consolidating political capital while emerging as a regional and global actor. Good examples of such terrorist organizations are the Hezbollah and the Hamas who have become more recognized with international legitimacy and a broad national support. The centralized control has been a prerequisite factor for the Hezbollah when initiating plans of political discourse, armed resistance campaigns and other social services engagement. The Hezbollah terrorist organization Hezbollah has been a diverse organization, which simultaneously provides huge social services. This organization is recognized in the Lebanese National Assembly and has been an illegal armed militia that has executed several criminal terrorist attacks around the world. However, a review of the organizational structure and development shows that its control has been centralized in terms of operations and resources. Hezbollah relies on global network of cells and institutions throughout Europe, South America, the Middle East as well as the South East Asia to raise funds, disseminate propaganda, prepare logistically for attacks and ensuring that this organization remains robust and strong. However, these cells cannot allocate resources, make decisions or plan to conduct terrorist operations autonomously; instead, they carry out operations under the control of a single main cell, which is the central office for other smaller cells. The pro-Iranian Hezbollah of southern Lebanon is very good example of an umbrella organization comprising of radical Shiite groups and mostly it is a mixture of both hierarchical and network organization. However, in most cases, this group tends to operate in a hierarchical arrangement, which is the centralized nature (Ranstorp, 1994, p. 304). Although the Hezbollah group has remained tight-lipped as far as its organizational structure is concerned, various research activities have confirmed that its structure is a hierarchical pyramid, which is headed by Majlis Shura al-Qarar which the decision is making advisory Council. Sheikh Hassan Sayyid Nasrallah has been presiding as the secretary general of the group (Nasrallah, 2007p.398). The Advisory council comprises of nine members among them two Iranian representatives whose presence indicates that the Iranian government is an influential figure in the management of the organization. Below the Advisory council are various subordinate councils, which are the judicial council, the Executive council, the Political advisor, the Political council and the Jihad/military council. Each functional council is responsible for various operational ‘desks’ each of which is in charge of specific topics. Nasrallah says that Hezbollah is composed of four levels of organization in which the top levels are more visible to the public whereas the last levels are just represented by guerrilla fighters (Nasrallah, 2007p.399). Hezbollah terrorist group embraces a centralized, hierarchical structure because of its non-violent natural state of existence and their reputation as well. Initially, their main objective as a group was to remain successful in politics. Their non-violent nature has helped them to this far since they pose very little risk especially from the United States because of their non-violent nature. As long as the existing political environment is the same, Hezbollah will not change its calculus: it won’t be of any benefit to if they attack Israel. Even if they are given nuclear weapons by the Iranian government, their nature will not change. They would not consider attacking Israel because the likelihood of destroying them is minimal. The group’s reason for existence is not destruction rather it’s winning the minds and hearts of the Lebanese people so as to solidify their implications in the political system. This calls for non-violence within the group. Nonetheless, it may involve some minor domestic political violence at times and that is why it has been termed as a terrorist organization. They engage in terrorist attacks, violence only when their political stance is threatened thus a proper, and ideal way of avoiding engagement in attacks is to allow them to grow and evolve their political wing (Alagha 2006, p. 214). The Hamas terrorist organization The Hamas Terrorist group, which was, formed in 1987 concentrates its operations in the Gaza strip and some areas of the West Bank. Decisions and other logistics are conducted in one central office rather than being distributed in several regions. Its origin is in the Muslim brotherhood, Palestinian branch, and it is supported by a very strong social and political structure within the Palestinian territories. This group is independent though it receives support from other foreign countries and movements. After the two co-founders of Hams were assassinated in 2004 (Sheikh Ahmed Yassin and Abdel Aaziz Rantisi), the organization made a strategy of refraining from exposing its leadership structure to the public. As for now, it is unclear of who controls the Hamas policies and strategies and other financial decisions. Research has showed that Hamas follows a centralized, hierarchical structure in which a 15-member political bureau ultimately controls the rest of the group (Walter 2004, p. 65). When orders come from an outside leadership, local committees and other branches deal with them in Gaza. Hamas leadership structures, which were based in Damascus between 2001 and 2012, are now increasingly becoming widespread into various countries across Middle East due to the Arab Uprising in Syria. Due to this, the hierarchical structure of Hamas may be changing and reports indicate that its structure is becoming more networked and decentralized ( Michael, 2011). Conclusion Many successful terrorist organizations such as the al-Qaeda tend to be highly decentralized and are highly networked rather than working through an organizational hierarchy. Such organizations have downsized their core competencies by outsourcing their core functions that were initially done in a central place. One major advantage of networked structures is that such organizations are much flexible and can become more competitive and successful in the global world. In addition, such organizations do not require many resources such as fighters, office space, and even financing (Rapoport 2004, p. 50). Decentralization still has several disadvantages. Decentralized terrorist organizations often find it difficult to control quality of operations since they have to depend on partners working in the various networks to deliver the desired quality. Other forms of control and coordination may also need to be developed to manage the integration of the various networks in place (Sageman 2004, p. 124). Reference List “Terrorist Threats Target Asia,” Jane’s Intelligence Review, Vol. 12, No. 7, July 1, 2000. Alagha, J. E. 2006. The Shifts in Hizbullah’s Ideology: Religious Ideology, Political Ideology, and Political Program. Leiden. Amsterdam University Press. Arquilla, J. 2008. The Reluctant Transformation of the American Military: Worst Enemy. Chicago: Ivan R. Dee. Asal, V & Rethemeyer, R. 2006. Researching Terrorist Networks. Journal of Security Education, 1(4):65–74, 2006. Atassi, B. 2014. “Iraqi al Qaeda Chief Rejects Zawahiri Orders”. Aljazeera. June 15, 2013. Accessed at: http://www.aljazeera.com/news/middleeast/2013/06/2013615172217827810.html on October 19, 2014. Ayoob, M. 1995. The Third World Security Predicament: State Making, Regional Conflict, and the International System. Boulder. Lynne Rienner Publishers, Inc. Azani, E.2009. Hezbollah: The Story of the Party of God, From Revolution to Institutionalization. Palgrave MacMillan. BBC News. Al Qaeda Disavows ISIS Militants in Syria. February 3, 2014. Accessed at: Benford, R, D. & David A. 2000. “Framing Processes and Social Movements: An Overview and Assessment.” Annual Review of Sociology 26 (2000): 611-639. Bergen, Peter L. Holy War, Inc.: 2002.Inside the Secret World of Osama Bin Laden. Touchstone. Blanchard, Christopher. “Al Qaeda: Statements and Evolving Ideology”. CRS Report for Congress, Updated June 20, 2005. Brafman, O & Beckstrom, R. 2006. The Starfish and the Spider: The Unstoppable Power of Broning, M. 2011. The Politics of Change in Palestine. Pluto Press. Chapter 2. Bruce, H. 2006. Inside Terrorism. Columbia University Press, Byman, D. 2006. “Should Hezbollah Be Next?” Foreign Affairs Vol. 82, Number 6 (November/December 2006): 53-66. Carley, K. 2004. “Estimating Vulnerabilities in Large Covert Networks.” Pittsburgh: Carnegie Mellon University Institute for Software Research International (2004). Available on-line from http://www.dtic.mil. CIA Factbook. “Lebanon.” Available on-line at https://www.cia.gov/library/publications/the-world-factbook/geos/le.html. Crenshaw, M. 2007. The organization of terrorism. National Memorial Institute for the Prevention of Terrorism. Wesleyan University. Cronin, A, K. 2008. Ending Terrorism: Lessons for defeating al-Qaeda. Routledge for the International Institute for Strategic Studies. Cronin, A,. K. 2006. How al-Qaida ends: The decline and demise of terrorist groups. International Security, 31(1):7–48, 2006. Dibeh, G. 2005. “The Political Economy of Postwar Reconstruction in Lebanon.” Research Paper No. 2005/44. United Nations University – World Institute for Development Economics Research (July 25, 2005). Available on-line at http://works.bepress.com/ghassan_dibeh/1.http://www.bbc.com/news/world-middle-east-26016318 on October 19, 2014. Jason, B. 2006. Al-Qaeda: The True Story of Radical Islam, I.B. TaurisLeaderless Organizations. Penguin Group. Marc, S. 2004. Understanding Terror Networks. University of Pennsylvania Press McMahon, Capital Interview: Al-Qaeda Crippled But Resilient, August 21, 2006 Nasrallah H, 2007. Voice of Hezbollah: The Statements of Sayyed Hassan Nasrallah. Verso, pp. 398-399. of a grand strategy, pages 46–73, 2004. Porter, Patrick. “Long Wars and Long Telegrams: Containing al Qaeda”. International Affairs: Ranstorp, M. 1994., “Hizbollah’s Command Leadership: Its Structure, Decision-Making and Relationship with Iranian Clergy and Institutions,” Terrorism and Political Violence, Vol. 6, No. 3, Autumn 1994. Rapoport, D.C. 2004. The four waves of modern terrorism. Attacking terrorism: Elements Rich, E. 1983. Artificial Intelligence. McGrawHill. Roggio, B. 2013. “Prominet al Qaeda Leader Killed in Drone Strike in 2012” in The Long War Journal. February 6, 2013. Accessed at http://www.longwarjournal.org/archives/2013/02/prominent_al_qaeda_l.php on October 19, 2014. Rohan, G. 2002. Inside al-Qaeda—Global Network of Terror, Berkley Books, New York NY, Stanton, J. 2000., “A Typical Pentagon Agency Waging War on Terrorism,” National Defense, May 2000. Stillman, J.P. 1989. "On Heuristics for Finding Loop Cutsets in Multiply Connected Belief Networks." Technical Report, General Electric Research and Development Centre, September, 1989. Walter, L. 2004. Voices of Terror: Manifestos, Writings, and Manuals of al-Qaeda, Hamas, and Other Terrorists from Around the World and Throughout the Ages. Reed Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Why do terrorist organisations have different structures Use examples Essay”, n.d.)
Why do terrorist organisations have different structures Use examples Essay. Retrieved from https://studentshare.org/miscellaneous/1672838-why-do-terrorist-organisations-have-different-structures-use-examples-of-at-least-one-decentralised-and-one-centralised-structure-to-illustrate-your-arguments
(Why Do Terrorist Organisations Have Different Structures Use Examples Essay)
Why Do Terrorist Organisations Have Different Structures Use Examples Essay. https://studentshare.org/miscellaneous/1672838-why-do-terrorist-organisations-have-different-structures-use-examples-of-at-least-one-decentralised-and-one-centralised-structure-to-illustrate-your-arguments.
“Why Do Terrorist Organisations Have Different Structures Use Examples Essay”, n.d. https://studentshare.org/miscellaneous/1672838-why-do-terrorist-organisations-have-different-structures-use-examples-of-at-least-one-decentralised-and-one-centralised-structure-to-illustrate-your-arguments.
  • Cited: 0 times

CHECK THESE SAMPLES OF Structural Peculiarities of Terrorist Organizations

Global operations management - multiculturalism and diversity management

Social organizations in America and China are entirely different because of the cultural differences.... Global operations management - multiculturalism and diversity management Global operations management - multiculturalism and diversity management According to McNamara (2010), operations management is managing the processes to produce and distribute products and services (McNamara, 2010)....
4 Pages (1000 words) Essay

Social Engineering Attacks and Counterintelligence

“Counterintelligence (CI) can be defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities” (Office Of Counterintelligence, 2011).... At times, the workforce can sense patterns and peculiarities in routine activities....
5 Pages (1250 words) Essay

Computer Systems Management

This essay "Computer Systems Management" is about the benefits are speed and accuracy, which the advantage is that with Electronic transmissions the information involved is exchanged elec¬tronically instead of on pieces of paper.... ... ... ... The emergence of the Internet has changed the understanding of a value chain model proposed by M....
14 Pages (3500 words) Essay

Logistics of Humanitarian Aid in Iraq and Afghanistan

Though humanitarian aids coming from both public and private organizations, because of the heavy damages caused by the fights, nothing seems to be enough for the affected people.... and international aid organizations such as the International Committee of the Red Cross (ICRC), including nongovernmental organizations (NGOs), are coordinating and providing humanitarian assistance to the Iraqi people....
14 Pages (3500 words) Essay

The Master and the Disciple - Who is Who in the World of the Counterintelligence

'Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.... The two intelligence communities have been working in close cooperation with each other since the first timid steps of the FBI in counter-espionage, and are still working together, even closer than ever, due to a set of reasons their paths followed in many ways different directions, in the meaning of strategic goals, budgetary constraints with the ensuing structural features, staffing, and efficiency, with all the consequences that stemmed from it....
10 Pages (2500 words) Research Paper

Mosques in America

Thus, this paper will show mosques in the United States of America feature a considerable number of peculiarities which can be explained by the relationship between this country and the Arab world.... If one takes a close look at the civilization that was formed by humans, one can not help noticing that religion plays an extremely important role in it....
17 Pages (4250 words) Research Paper

Are Religious Fundamentalism and Violence Always Intertwined

If one takes a close look at the role that religion has played in the history of the development of the human civilization, one cannot help noticing that has shaped not only spiritual values, but also the very fabric of the social environment.... Indeed, as the humanity evolved old.... ... ... Nevertheless, nowadays the world has adopted the principle of separation of Church and State, making religious institution less important and This gave rise to various interpretation of formerly established beliefs and also contributed to counter-action, often known under a broad term of fundamentalism....
12 Pages (3000 words) Essay

Introduction to Criminal justice

This paper presents the Criminal Justice System which is no doubt one of the most integral components of a functioning government.... The criminal justice system is thus a whole made up of three components: the law enforcement, the courts, and corrections.... ... ... ... According to the paper, criminal offenders' initial contact with the criminal justice system comes via the police or rather law enforcement agencies whose mandate in and to the system is to investigate the nature of the crime committed and make arrests, should they be deemed necessary....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us