The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World

Abstract : Shortly after the September 11, 2001, terrorist attacks on the United States, Air Force Chief of Staff General John Jumper asked the RAND Corporation to conduct a study entitled "Thinking Strategically about Combating Terrorism." The year-long project was divided into four research tasks, each undertaking different yet complementary aspects of the counterterrorism problem: 1. Threat assessment -- identifying the character and boundaries of the threat; 2. The international dimension -- assessing the impact of coalition and other international actors on U.S. options; 3. Strategy -- designing an overarching counterterrorism approach; 4. Implications for the Air Force -- identifying promising applications of air and space power. The research for this report was conducted as part of the first task on threat assessment. It assesses the threat that terrorist groups pose to the United States and to its interests overseas by proposing a framework for evaluating their relative motivations and capabilities. The report describes the tools that various terrorist groups use to maintain group cohesion and to conduct successful terrorist attacks. Also, after identifying the potential vulnerabilities of terrorist groups, it discusses how these groups adapt and change and concludes with implications for the ongoing struggle against terrorism. This report therefore should be of interest to policymakers confronted with the task of reducing the threat that terrorism poses to the United States today. But terrorist threats change over time, so the authors have attempted to present a framework of use to decisionmakers and academics involved in terrorism analyses and counterterrorism responsibilities in the future as well.

[1]  W. H. Mallock,et al.  The New Republic , 1877 .

[2]  J. M. Long Islamic Fundamentalism in the West Bank and Gaza. By Ziad Abu-Amr. Bloomington, Ind.: Indiana University Press, 1994. $29.95 cloth, $10.95 paper , 1997 .

[3]  M. el-Nawawy,et al.  Al-Jazeera : how the free Arab news network scooped the world and changed the Middle East , 2002 .

[4]  C. L. Stansifer Comparative Peace Processes in Latin America , 2000 .

[5]  L. Brown,et al.  Hamas: Political Thought and Practice , 2000 .

[6]  R. Gunaratna Inside Al Qaeda: Global Network of Terror , 2002 .

[7]  Richard A. Falkenrath,et al.  America's Achilles' Heel: Nuclear, Biological, and Chemical Terrorism and Covert Attack , 1998 .

[8]  J. Bowyer Bell Revolutionary dynamics: The inherent inefficiency of the underground , 1990 .

[9]  A. Sela,et al.  The Palestinian Hamas , 2000 .

[10]  D. Relles,et al.  A Conceptual Framework for Analyzing Terrorist Groups , 1985 .

[11]  Gordon H. McCormick,et al.  Security and coordination in a clandestine organization , 2000 .

[12]  K. Maxwell,et al.  The Shining Path: A History of the Millenarian War in Peru , 1999 .

[13]  Martha Crenshaw,et al.  The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice , 1998 .

[14]  Andrew R. Molnar,et al.  Human Factors Considerations of Undergrounds in Insurgencies , 1966 .

[15]  Amal Saad-Ghorayeb Hizbu'llah: Politics and Religion , 2001 .

[16]  Andrew T. H. Tan Armed Muslim Separatist Rebellion in Southeast Asia: Persistence, Prospects, and Implications , 2000 .

[17]  S. Tarrow,et al.  Power in Movement: Social Movements, Collective Action and Politics , 1994 .

[18]  Cynthia McClintock Revolutionary Movements in Latin America: El Salvador's Fmln and Peru's Shining Path , 1998 .

[19]  Peter Chalk,et al.  Colombian Labyrinth: The Synergy of Drugs and Insurgency and Its Implications for Regional Stability , 2001 .

[20]  T. P. Coogan The Ira: A History , 1993 .

[21]  D. Trimble The Belfast Agreement , 1998 .

[22]  Gordon H. McCormick,et al.  From the Sierra to the Cities: The Urban Campaign of the Shining Path , 1992 .

[23]  John Arquilla,et al.  COUNTERING NEW TERRORISM , 1998 .

[24]  Peter Chalk,et al.  Terrorism and Development: Using Social and Economic Development to Inhibit a Resurgence of Terrorism , 2003 .

[25]  Andrew R. Molnar,et al.  UNDERGROUNDS IN INSURGENT, REVOLUTIONARY, AND RESISTANCE WARFARE , 1963 .

[26]  G. Abdo No God but God: Egypt and the Triumph of Islam , 2000 .

[27]  Andrew J. Pierre,et al.  Origins of Terrorism , 1990 .

[28]  Kirk Kraeutler,et al.  Shining Path of Peru , 1992 .

[29]  T. Hadden The troubles: Ireland's ordeal 1966–1995 and the search for peace , 1996 .

[30]  Gordon H. McCormick The Shining Path and the Future of Peru , 1990 .

[31]  Carl Bartz,et al.  The Department of State , 1989 .

[32]  Jessica Stern,et al.  The Ultimate Terrorists , 1999 .

[33]  Hala Jaber,et al.  Hezbollah: Born with a Vengeance , 1997 .

[34]  Billy I. Ross,et al.  The Red Terror. , 1942 .

[35]  Jackie Green,et al.  Cambio , 2006 .

[36]  Lawrence Corey,et al.  The danger within. , 2004, The New England journal of medicine.

[37]  James Dingley The Bombing of Omagh, 15 August 1998: The Bombers, Their Tactics, Strategy, and Purpose Behind the Incident , 2001 .

[38]  J. Bowyer Bell The IRA, 1968-2000: An Analysis of a Secret Army , 2000 .

[39]  Peter L. Bergen Holy War, Inc.: Inside the Secret World of Osama bin Laden , 2001 .

[40]  D. Kruijt,et al.  Societies of Fear: The Legacy of Civil War, Violence and Terror in Latin America , 1999 .