Evolution of Terrorism and Revolution in Counter-Terrorism

Evolution of Terrorism

Terrorism has evolved from localized, politically motivated actions to a complex, global phenomenon.

  • Early Terrorism: Small groups used assassinations and bombings to achieve political goals.

  • Modern Terrorism: The 20th century saw the rise of ideologically driven terrorism, including nationalist, separatist, and religiously motivated groups.

  • Global Terrorism: The late 20th and early 21st centuries marked the emergence of global terrorist networks like Al-Qaeda and ISIS, which employ sophisticated methods and technology for large-scale attacks.

The phenomenon of terrorism, particularly from fundamentalist Islamic groups against Western states, is a long-term consequence of the collapse of the bipolar international system and destabilization in the Middle East and Central Asia.

Contemporary terrorism results from transformations after the Cold War. Many terrorist organizations lost state sponsors (USSR, Eastern Bloc) and ceased operations due to lack of funding, logistics, and political support. The disruption of the balance of power led to the thawing of local conflicts. States were unable to control their territories, leading to collapsed or criminalized state structures that served as tools for non-state actors to control revenues and resources.

These issues created optimal conditions for ideologies centered on violence and the spread of transnational organized crime, including terrorism. Some terrorist organizations acquired assets independently through criminal means (drug/arms trafficking) and legal economic activity. Modern terrorist groups operate without direct state support, functioning as decentralized networks of loosely connected cells, making them difficult to detect and capable of executing effective attacks.

Terrorist organizations have shifted from vertical, military-style hierarchies to more horizontal, decentralized networks. While a core leadership may exist, its role is limited to coordinating activities of individual cells. These cells communicate sporadically with central command, often only once to receive instructions for a specific attack. This multi-cellular structure grants significant flexibility and autonomy, making the organization more resilient to counterterrorism efforts and complicating detection and dismantling.

A significant shift is the emergence of “lone wolf” attackers as a serious threat. These individuals act alone, without direct affiliation with terrorist organizations. They are often citizens or residents of the countries they attack and may disseminate their views anonymously online. While they commit acts of violence on behalf of a group, movement, or ideology, they operate independently, making it difficult for law enforcement and intelligence services to identify and apprehend them.

Both terrorist groups and lone actors exploit globalization and the information society. Widespread availability of information technologies, open borders, freer movement of capital, and advances in communication and transportation allow modern terrorists to coordinate attacks globally. The interconnectedness of political and economic systems means an attack on one part can produce ripple effects throughout. Access to advanced weaponry amplifies the lethality of attacks. Innovations in armaments and technologically advanced weapons on the black market have modernized terrorist tools, but haven't resulted in a major technological revolution in their operations yet.

Globalization has also facilitated faster and more widespread indoctrination through information and communication technologies. Many terrorist groups operate online for communication, propaganda, and recruitment, and also treat the internet as a target. Cyberterrorism includes attacks on key national infrastructures (military, economic, telecommunications, energy, transport, etc.) that threaten the sovereignty of the targeted state. This includes attacks on power plants and hijacking weapon systems (e.g., drones). Terrorists use the internet for intimidation (e.g., posting execution videos), intelligence gathering, internal communication, operational planning, recruitment, and fundraising.

The Islamic State (ISIS) has skillfully exploited the internet to wage “war online,” using mobile devices and social media for propaganda and recruitment, making it a vital tool for their communication.

The rising cost of planning and executing attacks has compelled terrorist groups to develop independent logistical and financial systems. Terrorism is financed through illegal (money laundering, links with transnational criminal networks; drug production/smuggling, counterfeiting, theft, extortion, armed robbery) and legal channels (donations, profits from legitimate businesses, takeover of legal institutions like foundations, fundraising through social networks, establishment of parallel public service institutions).

A new method of financing is the theft and sale of cultural artifacts (“artnapping”). ISIS taxed the transit of artifacts through territory under its control, deriving funding from illicit exploitation of occupied territory.

ISIS, initially affiliated with Al-Qaeda, operated independently from 2014. It seized control of parts of Syria and Iraq, established quasi-state structures, proclaimed a caliphate, and announced ambitions for global expansion. It demonstrated operational capabilities in terrorism and subversive activities, with operatives present in Afghanistan, Jordan, Morocco, and Turkey, and conducted attacks in Iraq, Syria, and Europe (Brussels, Nice, Paris). While not a new form of terrorism, it was distinguished by unprecedented cruelty.

ISIS is also associated with foreign terrorist fighters, defined by the UN Security Council as individuals traveling to a country other than their residence to commit, plan, or prepare terrorist acts, or undergo training. A coalition of eighty-three countries combatted ISIS over five years.

Revolution in Counter-Terrorism

Counter-terrorism strategies have undergone significant changes:

  • Legislation and Policy: Governments worldwide have enacted stringent laws and policies to prevent and respond to terrorist activities.

  • International Cooperation: Increased intelligence sharing and joint operations to combat terrorism more effectively.

  • Technological Advancements: Use of surveillance systems, cybersecurity measures, and data analytics to identify and thwart terrorist plots.

  • Community Engagement: Efforts to counter radicalization and promote community resilience to prevent the spread of extremist ideologies.

President George W. Bush's declaration of a global “war on terror” on September 20, 2001, marked a watershed moment. The September 11 attacks catalyzed revolutionary changes in addressing terrorism, framing it as a war against all terrorist actors worldwide.

The “war on terror” can be interpreted metaphorically, like the “war on poverty” or “war on drugs,” as a call to mobilize resources against a societal ill. Counterterrorism often resembles law enforcement activities, including preventing financing and prosecuting acts through investigation, arrest, extradition, and judicial processes. However, the U.S. administration interpreted it literally, launching military operations against terrorist groups in Afghanistan and other regions. Consequently, counterterrorism evolved into an armed conflict of unprecedented scale.

The U.S. declaration of war signified a shift where terrorist acts were no longer treated as criminal offenses but as acts of war necessitating military force. The distinction between armed conflict governed by international humanitarian law and terrorism as a criminal phenomenon became blurred. Legal categories, such as terrorism being a tactic rather than a distinct adversary, lost clarity.

The “war on terror” can be conceptualized as a military campaign against transnational organizations, waged by armed forces under international humanitarian law, but the appropriateness of this framework is debatable.

Key aspects of GWOT:

  1. Encompasses a wide spectrum of actions, many non-military: intelligence operations, asset freezes, law enforcement, abductions, detention, torture, covert missions, targeted killings, and military interventions.

  2. It’s a “global” war, transcending geographic boundaries – the battlefield can be anywhere.

  3. Involves all nations, suggesting universal engagement.

  4. Implicates the entire security apparatus: armed forces, intelligence agencies, special operations units, police, bounty hunters, and private military contractors.

  5. Indefinite in duration, concluding only when every terrorist group worldwide has been “tracked down, stopped, and defeated.”

Some individuals suspected of Al-Qaeda affiliation found refuge in states unwilling or unable to prosecute them (e.g., Yemen). The U.S. administration employed drone strikes – missile attacks delivered by unmanned aerial vehicles. This tactic, “targeted killing,” denotes the intentional use of lethal force by a subject of international law to eliminate specifically identified individuals who have not been detained. While targeted killings may involve various methods (sniper fire, poisoning, car bombs), drone strikes across borders have become emblematic of the global war on terror.

The United States, followed by countries such as Israel, the United Kingdom, and Russia, adopted this tactic not only within the context of armed conflicts (e.g., in Afghanistan or Iraq), but also outside recognized battlefields or in legally ambiguous contexts (e.g., Pakistan, the Philippines, Somalia, Syria, Yemen). Troublingly, some drone strikes occurred in states not party to any armed conflict at the time. Legally, this practice is highly controversial. Critics argue it violates the prohibition on political assassinations, while others contend the targets are “enemy combatants” and thus lawful military objectives. From an ethical standpoint, some scholars suggest that targeted killing may be morally preferable to full-scale warfare, as it minimizes collateral damage among civilians and avoids the escalation inherent in total war.

The legal and ethical uncertainties surrounding GWOT have prompted criticism from governments not directly threatened by terrorism and from international and non-governmental human rights organizations. These actors have challenged framing counterterrorism within the paradigm of armed conflict, arguing it risks eroding individual rights and encourages excessive zeal in pursuing and punishing suspected terrorists. This critique does not imply that the use of military force should be categorically ruled out. Military operations against Al-Qaeda in Afghanistan or the Islamic State in Syria and Iraq have significantly weakened or dismantled those organizations’ cells. However, it is important to stress that these operations were conducted in the context of active armed conflicts, in regions affected by such hostilities. In legal terms, the targeted terrorist groups were regarded as non-state parties to the conflicts – as organized armed groups under international humanitarian law. In such circumstances, the use of military force against these entities is permissible, provided it complies with applicable humanitarian norms.

The most effective approach to counterterrorism likely lies in finding a balance – a calibrated strategy that harmonizes military actions with operations conducted by intelligence and law enforcement services. A proper assessment of the situation is crucial to applying the most appropriate response to the threat at hand. In most cases, responses to terrorist groups will involve intelligence gathering, disrupting and preventing terrorist financing, traditional law enforcement and judicial processes (e.g., investigations, arrests, extraditions, trials), and broad preventive measures addressing the root causes of terrorism. As for the use of military force, legal analysis and classification of each situation must be conducted on a case-by-case basis. Every instance of organized armed violence should be evaluated based on its timing, location, and factual context, and ultimately classified as either an armed conflict or a situation below that threshold. To date, some situations under GWOT have been recognized as international armed conflicts, others as non-international conflicts, while many terrorist attacks and counterterrorist operations have not met the legal criteria of armed conflict.

Combating terrorism requires the application of diverse tools—investigative, legal, judicial, diplomatic, financial, economic, social, and educational – across the full spectrum of peacetime and wartime activities. Therefore, the concept of a “war on terror” is best understood in its metaphorical sense, rather than being equated solely with military endeavors.

Faced with the dilemma of prioritizing the speed and efficacy of counterterrorist measures on the one hand, and the protection of human rights and fair trial guarantees on the other, states have not always favored the rule of law. Especially in the post-9/11 context, this normative balance has been disrupted, with many governments showing a tendency to subordinate human rights to the perceived imperatives of the war on terror.

However, it would be inaccurate to claim that this war universally undermined the development of human rights norms. Not all states followed the same path, nor did they uniformly regard internal security as a justification for sweeping restrictions on individual freedoms. Some adhered to constitutional principles and the rule of law by prioritizing criminal justice responses over military engagement. These states also recognized the critical importance of prevention in counterterrorism. The broader and deeper the preventive measures targeting the roots of terrorism, the less likely that military force will become the primary response.