The shift in the radicalization landscape in 2015, especially the ever-changing profile of the “homegrown terrorist,” has become one of the greatest concerns of those who protect our homeland. Notwithstanding the horrific attacks in other parts of the world during the past year, the devastating events in San Bernardino, California and other planned and attempted terrorist activities here in the United States have clearly illustrated that there is no longer a standard “profile” of a homegrown terrorist. In fact, the categorization of a person as “homegrown” belies the fact that the impetus, if not the catalyst, of their radicalization came from beyond this country’s physical borders.
During the past year, terrorists and terrorist “wanna-bes” have ranged from the “lone-wolf” types whose lack of positive personal relationships and self-esteem spur their anti-social and criminal activity, to the small groups of ISIS sympathizers whose twisted beliefs and lack of empathy for others lead them to such actions as killing co-workers and shoot-outs with police. Because these recruits are increasingly different from one another in their attitudes, personalities, and even in their motivation for aligning with radicals, attempting to identify possible offenders solely from the common profile of the young, male, Middle Eastern, radical Muslim makes attempts to thwart attacks considerably harder.
Law enforcement and intelligence agencies have been progressively challenged by the commitment of terrorist networks to the globalization of their destructive goals. In recent years, the use of such techniques as encrypted communication platforms in the “dark web,” clever coding of messages in internet-based gaming, and social media has enabled a radicalization of young men and women in ways that would have been unfathomable just a decade ago. Sadly, no amount of diplomacy, economic intervention, or moral leadership has been able to deter the insidious recruitment of would-be terrorists.
It is difficult to envision what new radicalization techniques may emerge from ISIS or emerging groups in the months and years ahead. As the process of radicalism changes, agency methods must evolve in ways that continually uncover the terrorists’ recruiting and concealment capabilities and undertakings. At the same time, investigators need to recognize that potential terrorists, not unlike some serial killers, may walk among us without drawing any particular attention to their lifestyle or behavior.
Law enforcement and intelligence operatives must also understand the connection between the recruiter and his prey, and develop ways to interrupt the recruiting process. One of the reasons that terrorist recruiters are so effective, is that they appeal to the imagination of the would-be sympathizer. Recruiters draw in men and women (usually youth or immature adults) by determining what motivates them to act. The recruiters make promises that lead the would-be sympathizer to a psychological and emotional mindset wherein the sympathizer believes that he can actually achieve his particular goal—be it destroying the infidel or becoming famous.
The Continuing Need for Intelligence and Cooperation.
Terrorists are quick to find and use the newest technology for their specific purposes, including recruiting. To that end, agencies need to be faster and better than their targets in this realm. The importance of intercepting key messages between terrorists is as vital to protecting America and its allies as is the development of credible human intelligence.
But agencies must also have the proper technical tools and legislative support for hunting terrorists—particularly the ability to view the encrypted messages of suspects wherever they may be found. The unrealistic fear of Big-Brother spying on unsuspecting, innocent citizens has made lawmakers hesitant to advocate for legislation requiring communications companies to assist the government in acquiring evidence of terrorist plans or attacks encrypted by customers using their systems.
Recent investigations of terrorist incidents in the United States and in other countries have underscored the value of collaboration and cooperation among agencies. Information sharing has become the norm between some nations, but the traditional problems of data protection and mistrust still abound. As potential terrorist targets, private companies and non-governmental agencies need to establish ways to work more closely with governments as well.
The key responsibilities of our law enforcement and intelligence agencies in fighting terrorism are to discover and disrupt plans to harm Americans and to identify those persons who plan or carry out attacks. Relying on past thinking about homegrown terrorists, outmoded technology, and failing to engage productively with international partners will not help prevent terrorist acts in 2016 or in the years that follow. With proper support, however, our agencies can overcome the challenges of encryption, international conflict, and especially of identifying the would-be terrorists among us whom we cannot yet see.