Wednesday, January 20, 2010

Profiling: Sketching the Face of Jihadism

Via STRATFOR (Global Security & Intelligence Report) -

On Jan. 4, 2010, the U.S. Transportation Security Administration (TSA) adopted new rules that would increase the screening of citizens from 14 countries who want to fly to the United States as well as travelers of all nationalities who are flying to the United States from one of the 14 countries. These countries are: Afghanistan, Algeria, Cuba, Iran, Iraq, Lebanon, Libya, Nigeria, Pakistan, Saudi Arabia, Somalia, Sudan, Syria and Yemen.

Four of the countries — Cuba, Iran, Sudan and Syria — are on the U.S. government’s list of state sponsors of terrorism. The other 10 have been labeled “countries of interest” by the TSA and appear to have been added in response to jihadist attacks in recent years. Nigeria was almost certainly added to the list only as a result of the Christmas Day bombing attempt aboard a Detroit-bound U.S. airliner by Umar Farouk Abdulmutallab, a 23-year-old Nigerian man.

As reflected by the large number of chain e-mails that swirl around after every attack or attempted attack against the United States, the type of profiling program the TSA has instituted will be very popular in certain quarters. Conventional wisdom holds that such programs will be effective in protecting the flying public from terrorist attacks because profiling is easy to do. However, when one steps back and carefully examines the historical face of the jihadist threat, it becomes readily apparent that it is very difficult to create a one-size-fits-all profile of a jihadist operative. When focusing on a resourceful and adaptive adversary, the use of such profiles sets a security system up for failure by causing security personnel and the general public to focus on a threat that is defined too narrowly.

Sketching the face of jihadism is simply not as easy as it might seem.

[...]

The following individuals, among many others, were involved in jihadist activity but did not fit what most people would consider the typical jihadist profile:

As reflected by the list above, jihadists come from many ethnicities and nationalities, and they can range from Americans named Daniel, Victor and John to a Macedonian nicknamed “Elvis,” a Tanzanian called “Foopie” (who smuggled explosives by bicycle) and an Indonesian named Zulkarnaen. There simply is not one ethnic or national profile that can be used to describe them all.

[...]

One of the big reasons we’ve witnessed men with names like Richard and Jose used in jihadist plots is because jihadist planners are adaptive and innovative. They will adjust the operatives they select for a mission in order to circumvent new security measures. In the wake of the 9/11 attacks, when security forces began to focus additional scrutiny on people with Muslim names, they dispatched Richard Reid on his shoe-bomb mission. And it worked — Reid was able to get his device by security and onto the plane. If he hadn’t fumbled the execution of the attack, it would have destroyed the aircraft. Moreover, when Khalid Sheikh Mohammed wanted to get an operative into the United States to conduct attacks following 9/11, he selected U.S. citizen Jose Padilla. Padilla successfully entered the country, and it was only Mohammed’s arrest and interrogation that alerted authorities to Padilla’s mission.

[...]

Jihadist planners have now heard about the list of 14 countries and, demonstrating their adaptability, will undoubtedly try to use operatives who are not from one of those countries and choose flights that originate from other places as well. They may even follow the lead of Chechen militants and the Islamic State of Iraq by employing female suicide bombers. They will also likely instruct operatives to “lose” their passports so that they can obtain new documents that contain no traces of travel to one of the 14 countries on the list. Jihadists have frequently used this tactic to hide operatives’ travel to training camps in places like Afghanistan and Pakistan.

[...]

In an environment where the potential threat is hard to identify, it is doubly important to profile individuals based on their behavior rather than their ethnicity or nationality — what we refer to as focusing on the “how” rather than the “who”. Instead of relying on pat profiles, security personnel should be encouraged to exercise their intelligence, intuition and common sense. A U.S. citizen named Robert who shows up at the U.S. Embassy in Nairobi or Amman claiming to have lost his passport may be far more dangerous than some random Pakistani or Yemeni citizen, even though the American does not fit the profile requiring extra security checks.

The difficulty of creating a reliable and accurate physical profile of a jihadist, and the adaptability and ingenuity of the jihadist planners, means that any attempt at profiling is doomed to fail. In fact, profiling can prove counterproductive to good security by blinding people to real threats. They will dismiss potential malefactors who do not fit the specific profile they have been provided.

No comments:

Post a Comment