Crossing Borders to Target Al-Qaeda and Its Affiliates: Defining Networks as Organized Armed Groups in Non-International Armed Conflicts
© T.M.C. Asser Press and the authors 2015Terry D. Gill, Robin Geiß, Robert Heinsch, Tim McCormack, Christophe Paulussen and Jessica Dorsey (eds.)Yearbook of International Humanitarian Law 2013Yearbook of International Humanitarian Law1610.1007/978-94-6265-038-1_12
12. Crossing Borders to Target Al-Qaeda and Its Affiliates: Defining Networks as Organized Armed Groups in Non-International Armed Conflicts
Roger Williams University, Bristol, RI 02809, UK
Peter Margulies (Corresponding author)
12.3.3 Targeting Networks
Al-Qaeda’s dispersal and the rise of regional terrorist groups such as Al-Shabaab in Somalia have raised the stakes for defining an “organized armed group” (OAG). If an entity fails the OAG test, a state may use only traditional law enforcement methods in responding to the entity’s violence. Both case law and social science literature support a broadly pragmatic reading of the OAG definition. While the International Criminal Tribunal for the former Yugoslavia (ICTY) has cited factors such as existence of a headquarters and imposition of discipline, ICTY decisions have found organization when evidence was at best equivocal. Moreover, terrorist organizations reveal surprisingly robust indicia of organization. Illustrating this organizational turn, a transnational network like Al-Qaeda operates in a synergistic fashion with regional groups. Moreover, recent news reports have suggested that current Al-Qaeda leader Dr. Ayman al-Zawahiri has attempted to assert operational control over the specific targeting decisions of Al-Qaeda affiliates, although that effort has not been uniformly successful. Furthermore, while Al-Qaeda does not micromanage most individual operations, it exercises strategic influence, e.g., through a focus on targeting Western interests. When such strategic influence can be shown, the definition of OAG is sufficiently flexible to permit targeting across borders. In addition, the doctrine of co-belligerency, borrowed from neutrality law, provides a basis for targeting that is not confined by state boundaries. Even when these indicia are absent, individuals within non-Al-Qaeda groups may be targetable if they engage in coordinated activity with Al-Qaeda.
KeywordsTerrorist networksLaw of armed conflictOrganized armed groupAl Qaeda affiliatesAl Qaeda in the Arabian PeninsulaBoko Haram
Peter Margulies professor of Law, Roger Williams University. An earlier version of this piece was published as Networks in Noninternational Armed Conflicts: Crossing Borders and Defining “Organized Armed Group,” 89 Int’l L. Stud. 54–76 (Naval War College 2013). Matthew Sinnott J.D 2014, Roger Williams University School of Law; B.B.A. Hofstra University, 2011; 1st Lt. United States Marine Corps. The views expressed are the author’s own and do not necessarily represent the views of the U.S. Marine Corps/Naval Service or the U.S. Department of Defense.
As Al-Qaeda has dispersed, the precise definition of an “organized armed group” (OAG) under the law of armed conflict (LOAC) has become increasingly vital. The United States currently targets certain members of Al-Qaeda and affiliated organizations not only in Afghanistan, but also in other countries.1 However, while the elements of Al-Qaeda that were present in Afghanistan immediately after September 11 presumably constituted an OAG, it is less clear that supposed affiliates outside Afghanistan are part of the same OAG. The answer to this question raises the stakes of targeting decisions. If affiliated groups are part of an OAG under the Al-Qaeda “umbrella,” then arguably the United States has the right to target them wherever they are.2 But if groups outside Afghanistan are not part of Al-Qaeda, then targeting them requires a separate armed conflict and a separate jus ad bellum justification for the use of force.3 Formulating and applying the OAG criteria is therefore an essential enterprise.
This Article responds to this high-stakes challenge with a pragmatic approach4 along two axes. First, it argues for a broad interpretation of the definition of “organized armed group” framed by the International Criminal Tribunal for the former Yugoslavia (ICTY) in Prosecutor v. Tadic.5 In practice, while the language of the definition appears to be narrow, case law and scholarship have often expanded the concept. Second, the Article shows that terrorist groups generally, and Al-Qaeda in particular, reveal a surprising degree of organization. Some of this organization takes unconventional forms, dictated by the special circumstances of terrorist networks. Yet terrorist groups actually have many of the same needs for organization as state entities, including the pervasive need to control agency costs. Moreover, Al-Qaeda exists in a synergistic relationship with many regional groups, providing training and influencing their choice of targets. Strategic influence of this type is a sufficient justification for targeting affiliates.
The Article proceeds in two sections. Section 12.2 outlines the lessons of case law and commentary regarding the definition of OAG. This section suggests that the language used may seem narrow, but has often been interpreted in more flexible fashion. Section 12.3 discusses the status as OAGs of terrorist groups in general and Al-Qaeda in particular. It concludes that such groups often possess the degree of organization required for recognition under the laws of armed conflict. Furthermore, Al-Qaeda as a network often exercises strategic influence on its affiliates that justifies targeting. Even when Al-Qaeda does not exercise such influence, U.S. forces can legally target individuals within non-Al-Qaeda groups if such persons coordinate lethal operations, planning, or logistics with Al-Qaeda. However, the approach to targeting outlined here has limits. The U.S. cannot legally target certain groups, such as the Islamic State of Iraq and Syria (ISIS) or Nigeria’s Boko Haram, that lack concrete ties to Al-Qaeda or a demonstrable intent to attack U.S. interests. Targeting such groups would require a legal basis independent of the United States’ non-international armed conflict with Al-Qaeda.
12.2 Organizing the Case Law on OAGs
Both case law and evolving trends on the ground have precipitated the problem of transregional conflicts and organized armed groups. State conflicts with organized non-state actors are considered conflicts not of an international character (NIACs).6 At least at first blush, one would assume that a NIAC can take place only on the territory of a single state; if the territory of more than one state is involved, it seems incongruous to deny the “international character” of the conflict.7 Moreover, treaties and case law have required that each party to an armed conflict be an OAG. Additional Protocol II (AP II) defines OAG in a narrow way. According to AP II, OAGs must be “under responsible command, [and] exercise such control over a part of [a state’s] territory as to enable them to carry out sustained and concerted military operations and to implement this Protocol.”8 Some groups, like Hamas in Gaza or the now-defunct Liberation Tigers of Tamil Eelam (LTTE) of Sri Lanka, might meet this definition, but, a network such as Al-Qaeda will not. Al-Qaeda’s dispersion therefore makes precise definition a priority.
12.2.1 The High Stakes of LOAC Definitions
Much hinges on the breadth of the definition of a NIAC. A narrow definition subjects state forces to the more rigorous demands of international human rights law (IHRL), which permits the use of deadly force only when an individual poses a concrete, imminent threat to the life of a law enforcement officer or other individuals.9 The European Court of Human Rights has defined such threats narrowly, second-guessing the use of lethal force by law enforcement even when the target was a pair of known terrorists whom authorities rightly believed had planted an explosive device that they planned to trigger in the near future.10 Under IHRL, terrorists have a greater opportunity to operate with impunity. Applying the law of armed conflict (LOAC), in contrast, diminishes the non-state actor’s room to maneuver. It allows states to target individuals whom it believes to be performing a continuous combat function (CCF).11 Even narrow definitions of CCF recognize that an individual who performs this role may spend much time in pursuits other than presenting a concrete, imminent threat to the other side. A typical uniformed soldier, for example, may spend time marching, building an encampment, or even sleeping. The soldier can be targeted by an enemy state’s forces in any and all of these activities.12 Just as a state can target an opposing state’s uniformed forces without a showing that an individual soldier faces a specific, imminent threat, LOAC would allow targeting of a member of an organized non-state actor whom the state reasonably believed to be engaged in CCF.
However, the greater latitude allowed states in targeting terrorists makes human rights advocates blanch at the prospect of higher civilian casualties.13 More latitude in targeting may increase the risk of mistakes, in which a state erroneously targets innocents or causes collateral damage among civilians.14 Advocates of greater state latitude will argue that states can and should build in systems that minimize mistakes, such as a lawyer’s review and approval of targeting decisions. However, state advocates would add, opponents of state latitude have a bad case of hindsight bias15 regarding state action. State critics regard all civilian casualties as avoidable, a position that the laws of war have never taken. However, proponents of state latitude would argue, critics fail to consider matters from an ex ante perspective, involving the incentives for violent non-state actors. When violent non-state actors believe they can operate with impunity, risks to civilians increase.16 Curbing violent non-state actors thus reduces net risks for civilians.
Moreover, state critics often fail to acknowledge that while a broader definition of OAG confers advantages on a state in the arena of targeting, with that advantage comes greater accountability for all parties to the NIAC.17 A state in a NIAC must observe the strictures of the Geneva Convention’s Common Article 3, such as humane treatment of captives.18 These provisions are generally considered jus cogens and therefore non-derogable.19 OAGs incur the same duties; one purpose of the requirement that a group have a minimum level of organization is that it would be unfair to require a disorganized group to observe IHL because it lacks the structure to do so. Individuals who target civilians can be made to answer for violations of municipal law, such as the prohibition on murder. In contrast, OAGs who target civilians may be prosecuted in international tribunals for crimes against humanity, instead of merely being answerable in the sometimes-dysfunctional justice systems of their countries of origin. The targeting advantages reaped by states are thus paid for by greater accountability elsewhere in the IHL framework.20
12.2.2 Unpacking the ICTY Formulation
At first blush, state critics may have an edge in the definitional debate regarding OAG. Some passages in case law have propounded a narrow definition of OAG that requires something approaching the attributes of state entities.21 In Prosecutor v. Limaj, the ICTY suggested that to meet its criteria, an OAG should have a headquarters, a unified command, and a military police unit that will arrest malefactors.22 Without these attributes, a group is considered not an OAG, but a criminal band or an assemblage of individuals engaged in civil unrest such as a riot.23 Individuals in such groups cannot be targeted as readily as participants in an armed conflict, but instead are protected by IHRL.
Acts of terrorism sit uneasily within this paradigm. “[I]solated acts of terrorism” probably do not demonstrate the level of organization required for a NIAC.24 Moreover, some commentators have noted that several major nations have addressed significant acts of terrorism through traditional law enforcement.25
If a terrorist entity can elude definition as an OAG within one state, it can even more readily elude such definition in the regional or global context. The United States confronts extremist organizations not merely in one country, but in multiple regions, that feature ties of varying closeness to Al-Qaeda. Some have argued that Al-Qaeda’ relationship to such groups involves only “very loose ties” typical of a “confederation of like-minded fellow travelers, many of whom are fighting separate armed conflicts in different regions of the globe.”26
Treaty law and the ICTY jurisprudence actually permit greater flexibility in the definition of OAGs. While AP II applies to some NIACs, other NIACs are governed by Common Article 3, which contains no requirement that a party control territory.27 The International Committee of the Red Cross (ICRC), a group with special competence regarding LOAC, has also signaled that flexibility is important. In one study, the ICRC observed that to be considered an OAG, an entity should merely have a “minimum of organization.”28 That terminology strongly suggests that a rigid, itemized checklist would be counterproductive.29
Moreover, the ICTY jurisprudence is far more flexible than it may appear.30 In Prosecutor v. Boskoski & Tarculovski,31 a case involving the targeting of civilians by a non-state group, the ICTY noted that terrorist acts could form a pattern that would constitute an armed conflict.32 Boskoski can be read as standing for either one or two eminently pragmatic propositions. First, OAG should not be assessed in a vacuum, but on a sliding scale that also includes the other Tadic criterion—intensity.33 Second, the best proof of OAG is in the operational details of violence that members of the group have caused. A group’s sheer ability to mount sustained terrorist attacks is evidence of a “high level of planning and a coordinated command structure.”34
The ICTY’s treatment of evidence also suggests substantial flexibility in the definition of OAG. In Limaj, for example, the ICTY found that the Kosovo Liberation Army (KLA) was organized even though evidence of discipline was “scant” by the court’s own admission.35 Witnesses differed widely on when the military police cited by the tribunal had been established.36 If the military police were a salient symbol of organizational discipline, this divergence in recollection seems odd. Moreover, as the ICTY acknowledged, there was no record of any imposition of discipline among KLA members.37
The Limaj court sought to buttress this decidedly equivocal evidence of discipline with a proxy: other nations and entities dealt with the KLA in a way that suggested that they regarded the group as organized,38 although evidence for this point was slim. For example, the ICTY acknowledged that representatives of other entities were “sometimes unclear about the KLA’s command structure.”39 Indeed, one report described the KLA’s structure as “a mystery” and “more a matter of diffuse horizontal command.”40 Limaj also noted that the General Staff of the KLA “did not have a consistent…location.”41 While the tribunal made much of the KLA’s governing regulations, it acknowledged that the authorship and date of the regulations were not apparent on the regulations’ face.42 Yet the ICTY brushed past these apparent failures of organization, explaining pragmatically that the KLA was “effectively an underground operation, operating in conditions of secrecy out of concern to preserve its leadership” and “under constant threat of military action” by Serbian forces.43 Therefore, it was “no surprise that the organizational structure and the hierarchy of the KLA was confusing.”44 More than any other factor, the court relied on the KLA’s knack for recruiting new followers.45 Based on this one criterion and modest evidence of others, the court was satisfied that the KLA’s fluid and contingent structure did not undermine its classification as an OAG.
Precedent from elsewhere also argues against a narrow definition of organization. Consider Abella v. Argentina (Tablada Case),46 involving an attack on an Argentinean army base by rebels, followed by alleged state mistreatment of the attackers that the plaintiffs characterized as a violation of Common Article 3. The Inter-American Commission on Human Rights (IAHCR) first ruled that AP II did not limit the situations in which armed conflict existed. The tribunal observed that armed conflicts “not of an international character” that trigger Common Article 3 need not be “large-scale and generalized hostilities or a situation comparable to a civil war in which dissident armed groups exercise control over parts of national territory.”47 Suggesting the need for flexibility, the IAHCR noted that NIACs could also involve “confrontations between relatively organized armed forces.”48 The tribunal’s use of the term, “relatively,” to modify the requirement of an OAG suggests that a narrow or rigid definition would be counterproductive. While the tribunal added that an armed conflict must be something more than “riots, mere acts of banditry or an unorganized and short-lived rebellion,”49 its analysis indicated that requiring a significantly more elaborate showing would merely allow parties to escape accountability. Turning to the specific facts, the IAHCR found it sufficient that the rebels’ attack on the base was “carefully planned, coordinated and executed.”50
Tribunals have also expansively defined a non-state actor’s capacity to comply with IHL. Terrorist groups generally do not comply with IHL; often their standard operating procedure involves fundamental violations such as the targeting of civilians. But tribunals have viewed terrorist groups as able to comply with IHL, even if those groups are disinclined to do so.51 A contrary view would create perverse incentives, allowing a group to free itself from the risk of targeting by increasing its violations of otherwise applicable norms.52
Buttressing this flexible approach, the ICTY has also broadly interpreted the Tadic requirement that violence be “protracted.” Interpreting the term “protracted” narrowly would again create perverse incentives. Violent non-state actors could strike first and then claim that the conflict was not yet a protracted one, thereby precluding a state from utilizing the full range of responses permissible under LOAC. Instead, the state would be limited to the far narrower repertoire of force permissible under a law enforcement paradigm. To avoid creating this perverse incentive, the ICTY has viewed the term “protracted armed violence” in a pragmatic fashion, as referring generally to the intensity of the violence, not its timing per se.53
12.3 More Than Meets the Eye: The Organization of Terrorist Networks
Just as a deeper look at case law suggests that the definition of OAG is more flexible than it initially appears, terrorist groups are more organized than their historical image suggests. Although some scholars have viewed earlier acts of terror as the product of individual discontent, they actually involved careful planning.54 Today’s terrorist groups, including Al-Qaeda, also display far more organization than is commonly understood.
12.3.1 Terrorist Groups, Organization, and Agency Costs
Terrorist groups require organization because they wish to influence actors who are often organized. Terrorist groups play a multi-level game of the kind made famous by Robert Putnam, involving internal and external actors.55 Internal actors include people within the organization and within the community that the group purports to represent—Al-Qaeda purports to represent a particular religious vision, while a group like Hamas purports to represent Palestinians and the Kurdistan Workers’ Party (PKK), Kurds. External actors include states where the terrorist group is principally located, other states where the group wishes to extend its influence, groups of states such as Western nations or states in the Middle East, international organizations, and other terrorist groups.56
Terrorist groups use violence for both expressive and instrumental ends. Violence expresses their commitment to a distinctive vision that the mundane corruption of other parties obscures.57 Certain kinds of violence, such as suicide attacks, express this commitment in an even clearer form—sending messages about the group’s commitment to its cause.58 Instrumentally, violence serves as a spoiler, derailing negotiations between states and moderate members of their own community.59 On occasion, terrorist groups find it expedient to mitigate violence, to avoid alienating key constituencies or to gain time to regroup from state pressure.60 Managing violence to maximize both expressive and instrumental goals requires organization. Maintaining fidelity to these goals in the face of state pressure and internal disagreement requires a particular agility in organizational form.
Like any other entity, a terrorist group needs some form of discipline. Without discipline, agency costs proliferate, as undisciplined members pursue their own impulses or agendas to the detriment of the organization’s goals.61 However, discipline requires institutional memory, as leaders monitor, document, and assess the performance of subordinates. Documentation can be exploited by the group’s foes, providing information about operatives and planned attacks. Terrorist groups including Al-Qaeda grapple with the conflict between uniform messaging and secrecy.
Al-Qaeda has coped with this dilemma by cultivating a portfolio approach that maximizes versatility in structure and decision-making, as well as in operational plans.62 Wise investors use portfolio theory to diversify risk. The careful and prudent investor never entrusts all of her resources to one company or even one sector. Rather, the investor pursues some measure of risk diversification. If one investment fails to bring returns, others can pick up the slack.
Al-Qaeda employs a portfolio approach to operations. Officials have recognized that Al-Qaeda needs to be right only once to achieve its expressive and instrumental goals, while security officials must be right every time.63 Running several plots simultaneously keeps state adversaries guessing, lodging the initiative with Al-Qaeda. Even if the vast majority of attacks are prevented, one catastrophic attack sends the message that Al-Qaeda is still on the map. That message encourages further attacks and distorts government policies. Al-Qaeda uses a similar approach to organizational form. It varies its structure, as the need requires, equipping its personnel to leverage “evolving relationships” rather than being wed to a particular organizational structure.64 Sticking with one organizational form would also give an advantage to Al-Qaeda’s adversaries.65 Al-Qaeda has adopted an approach to structure that minimizes this risk, mixing command decisions with subordinates’ operational initiative. While some have argued that most terrorist acts are the product of independent, grass-roots efforts,66 that picture is decidedly incomplete. According to terrorism expert Bruce Hoffman, Al-Qaeda is a “remarkably agile and flexible organization that exercises both top-down and bottom-up planning and operational capabilities.”67
Accounts of terrorist groups as creatures of chaos are inaccurate. It turns out that terrorist groups breed bureaucracy. Like lawful organizations, terrorist groups wrestle with the ubiquitous problem of agency costs. Al-Qaeda, like a state military unit, uses personnel drawn from a variety of backgrounds it expects to fulfill the group’s mission.68 However, operatives may have agendas of their own. For example, they may have an interest in looting civilian property or skimming money from the group and enriching themselves.69 Alternatively, terrorist operatives may engage in more violence than the group’s leaders find optimal, because the operatives have developed habits of violence while leaders sometimes believe that relative restraint enhances the organizational brand.70 Bureaucratic rules and procedures can help the terrorist group address these problems.
Consider the case of Al-Qaeda in Iraq (AQI). AQI was a “cohesive organization with shared personnel across ‘official’ names, institutional memory, embedded management practices, and permanent salaried employees.”71 Both AQI and its successor organization, the Islamic State of Iraq (ISI) took steps to enforce discipline among members.72 For example, terrorist groups such as AQI keep copious records of the success and failure of operations, even though maintaining such records greatly enhances the risk that adversaries will obtain custody of this information and use it against these groups.73 Groups such as AQI clearly believe that committing rules and communications to writing tightens the organization of the group, making defection or shirking more difficult. AQI required signed pledges by fighters who consented to conditions on various activities.74 For example, AQI threatened to expel members who engaged in ordinary criminal conduct, such as looting, which would distract from the group’s ideological agenda.75 ISI instituted controls that would bring a glow to the most austere of accountants, decreeing that, “[f]or every amount paid out of [organizational] funds, the recipient is required to provide two signatures…one for receiving the money and another one to show how the money was spent.”76 Another ISI pronunciamento declared that, “[a]ll properties, small and large, will be inventoried.”77 The ISI also required operatives to upload information on flash drive, to be “sent every week to the [group’s] administrator.”78 The proliferation of flash drives and memory sticks obviously ratchets up the risk that some of the information contained in these devices will end up in the hands of the group’s adversaries.79 However, ISI apparently determined that the benefits of such a structure to group discipline outweighed those risks.
ISI also kept careful track of all of its operatives, cataloguing incoming fighters, ongoing staff, and “exiting brothers.”80 These internal records distinguished between the assignments of new staff, who might be suicide bombers or perform other roles.81 This record keeping, like the ban on looting, served strategic and ideological purposes. Operatives in Iraq were often foreign nationals who had entered Iraq because ISI’s practice of violence resonated with their preconceived beliefs or habits.82 Left to their own devices, these recruits might engage in violence “for its own sake.”83 However, indiscriminate violence, like looting, could impair the group’s messaging. Record keeping also enhances the propaganda capabilities of terrorist groups. In most groups, claiming credit for an attack is as important as the attack itself.84 Claiming credit announces to the world and to other terrorist groups that the organization has “arrived.” Claiming credit for violence also enhances the group’s commitment: a suicide attack, for example, signals the sincerity of the attacker’s beliefs and those of the organization.
One can also view a strategy relying on suicide attacks as a decision about the costs of internal monitoring. Suppose that a terrorist leader orders a conventional (non-suicide) attack. For whatever reason, the attack fizzles. The group’s leadership then has a difficult time in evaluating the causes for the attack’s failure in a “noisy” environment,85 where many factors can impede optimal execution. An attacker who survives a suboptimal attack will likely have many excuses for why the operation failed to go as planned. The leader will need to weigh those excuses before deciding on the staffing for the next attack. A suicide attack dispenses with the excuse-sifting phase, and also gives the suicide operative no exit strategy apart from outright desertion. Since that path leads to disgrace,86 a suicide attack is often a good way of ensuring discipline. However, making sure that the operative has sufficient ties to the organization and a “track record” of violence and ideological commitment requires some degree of organization.
12.3.2 Terrorist Networks and Global Reach
Al-Qaeda displays this mix of organizational forms in its relationships with affiliated groups.87 While Al-Qaeda’s core remains in Pakistan, its lack of geographic proximity to other groups is not necessarily a weakness. Network theory teaches us that physical proximity is less important when knowledge and values can be shared in other ways.88
Links between Al-Qaeda and regional groups are synergistic along a number of axes. The Taliban/Al-Qaeda link has been durable and effective because it combined the embedded localism of the Afghan Taliban with the extreme Islamist network of schools and camps based in Pakistan.89 In other situations, regional organizations seek out Al-Qaeda when state pressure has weakened the organization.90 Allied with Al-Qaeda, groups can share information on effective strategies and learn from their mistakes.91 Al-Qaeda has historically welcomed such overtures, since they assist the global group in extending its brand.92 More sophisticated technology, including improvement in transportation and communications, has made it far easier to coordinate activities across regions.93
Experts have identified a number of characteristics of the relationship between Al-Qaeda and its regional affiliates. According to Thomas Joscelyn, a Senior Fellow at the Foundation for Defense of Democracies, affiliates often swear a loyalty oath or bayat to Al-Qaeda’s leadership.94 Affiliates swearing the bayat include Jabhat al Nusra in Syria, which is currently one of a number of groups seeking to topple the Assad regime.95 Joscelyn, speaking to Congress in July, 2013, noted that Al-Qaeda and its affiliates “form an international terrorist network that is focused on both acquiring territory and executing terrorist attacks against the West.” According to Joscelyn, “Al-Qaeda’s general command guides the overall strategy pursued by the affiliates and even sometimes gets involved in specific tactical matters.”
Al-Qaeda often sends key operatives into the field to assist affiliates. For example, Al-Qaeda in the Arabian Peninsula (AQAP) is run by Nasir al Wuhayshi, who was Osama bin Laden’s aide-de-camp for several years before 9/11.96 According to a Defense Department report, “Al-Qaeda in Libya: A Profile” published by LOC in August 2012, core Al-Qaeda sent senior operatives to Libya. There are also credible reports that key Al-Qaeda members have gone to Syria to aid extremist rebels’ efforts to topple the Assad regime.97 Dr. Ayman al-Zawahiri, Al-Qaeda’s current leader, has ongoing contacts with extremists among the rebel forces.98 Most recently, Zawahiri has sought to unify disparate extremist elements in Syria under the core Al-Qaeda banner,99 although one such group, ISIS, has defied Zawahiri’s attempts.100
Other examples of this sponsor-affiliate relationship abound. For example, AQAP, which operates primarily in Yemen, began as a result of “direct orders” from Osama bin Laden to Al-Qaeda members on the ground in that region.101 Today, AQAP is both more “professional” in its operations and more linked to the Al-Qaeda “core.”102 Indeed, the U.S. recently closed many embassies around the world because of credible reports that Dr. Zawahiri had sent a letter to AQAP leaders ordering attacks on US diplomatic facilities.103
The Al-Qaeda sponsor-affiliate relationship is also alive and well in North and East Africa. In North Africa, Al-Qaeda of the Islamic Maghreb (AQIM) enjoys a partnership with Al-Qaeda.104 Dr. Zawahiri announced a “blessed union” with AQIM, leading both groups to focus on attacking French interests.105 In Somalia, the terrorist group Al-Shabaab publicly pledged its loyalty to Al-Qaeda.106 Operatives trained in Afghanistan camps transferred to Somalia to provide training to Shabab members.107 The two organizations now cooperate on a host of matters, from ideological instruction to advanced tactics.108 Zarqawi’s AQI “willingly merged” with bin Laden’s group, although the latter had been weakened by the erosion of its base in Afghanistan after September 11.109 Credible evidence indicates that members of Al-Qaeda in Iraq have been assigned to “establish cells in other countries.”110
Al-Qaeda provides training for operations elsewhere. For example, the perpetrators of the London subway suicide attacks obtained training from Al-Qaeda branches in Pakistan.111 Indeed, Al-Qaeda provided training in Afghanistan, Pakistan, and Yemen to as many as 3,000 violent extremists from the United Kingdom, who subsequently returned there, “embedding themselves” in communities and developing plans for further attacks.112 While discrimination and alienation from the mainstream in the United Kingdom and elsewhere may have facilitated additional recruitment, “much of the terrorist threat in the United Kingdom today stems from deliberate, long-standing subversion by Al-Qaeda.”113 Al-Qaeda–linked networks released videotaped martyr’s wills by the attackers.114 Other plots, such as the conspiracy to target trans-Atlantic passenger aircraft in 2006, also have ties to Al-Qaeda networks in Pakistan or Yemen.115 Groups such as Hezbollah have global networks that attract financing and recruit new members.116 Moreover, some terrorist groups have strong ties to transnational criminal enterprises that share the proceeds of drug trafficking, kidnapping, and prostitution.117
Groups partnering with Al-Qaeda buy into a distinctive operational focus. While many groups have local agendas, groups under the Al-Qaeda umbrella must agree to pursue attacks on Western interests.118 The attacks on Western interests are a signature element of Al-Qaeda; perpetuating these attacks allows groups under the Al-Qaeda umbrella to “stay on message.”119 Moreover, Al-Qaeda insists on specific approval for attacks outside a subsidiary’s regional base.120 For example, when a Danish newspaper published caricatures of the Prophet Muhammad, Al-Qaeda asked its Iraqi branch to carry out attacks on Danish interests.121 United States officials believe that Hezbollah operatives played a significant role in the July 2012 attack in Bulgaria on a bus carrying Israeli tourists.122 In addition, Al-Qaeda requires certain operational modalities for attacks outside a branch’s region. Al-Qaeda pushes suicide attacks and patterned attacks on particular kinds of targets, such as public transportation, government structures, and infrastructure.123 This layer of specific operational control demonstrates Al-Qaeda’s organizational contours and confirms its existence and functioning as a “united front.”124 Al-Qaeda also has structural mechanisms that ensure communication and guidance. It uses information committees that are tied to senior leadership and operational planners.125
A networked approach driven by an anti-Western strategic focus has many advantages for Al-Qaeda. Shared ideology lessens the likelihood of deterring the group through ordinary law enforcement or negotiation. Suicide bombers will not blink at the prospect of arrest and trial. Rather, involvement with the legal system confers another opportunity for the attackers to brand themselves as martyrs.126 In addition, networks such as Al-Qaeda and its affiliates are far less amenable to negotiation than territory-based groups. Groups that control territory within a single state may on occasion be a party to successful negotiations, as the IRA demonstrated.127 Such movements may gain a stake in negotiations, as they seek to ease state pressure on their territorial base.128 In contrast, the disaggregation of territory and operations in transnational networks mean that those groups lack a “return address.” Since transnational groups can readily shift their operations,129 state pressure is not an effective deterrent. The absence of an effective general deterrent only exacerbates the risk of armed conflict from transnational groups, and makes specific deterrence or incapacitation of the group’s operatives all the more imperative.130