HRS India Neg Update

advertisement
India Updates File
Modeling
Yes Modeling Links
India Models U.S. Surveillance structures
Chaulia 9 Sreeram Chaulia is associate professor of world politics at the OP Jindal Global University in
Sonipat, India India caught in a terror tangle http://www.atimes.com/atimes/South_Asia/KL11Df05.html
The ills in India's
intelligence apparatus were highlighted recently when India's Home Minister P Chidambaram announced a new
chief for the proposed National Intelligence Grid (NATGRID) project for counter-terrorism. This is an ambitious venture to pool all
data and information relating to a person - ranging from bank accounts, rail and air travel to income tax, telephone and Internet usage.
Without being obtrusive, NATGRID is mandated to link 21 different databases for the access of 10 security agencies. While it sounds like an
innovate idea that could enable the speedy detection and interception of security threats, NATGRID is symptomatic of the troubles plaguing
India's divided state. It is the brainchild of the Home Ministry, which sees itself as a veteran in competition with the office of the National
Security Advisor (NSA) for the prized position as the lead governmental node handling strategic issues. The NSA, which falls under the allpowerful Prime Minister's Office, already has under its aegis, since 2004, the National Technical Research Organization (NTRO) - a highly
specialized technical intelligence-gathering "super-feeder agency" - to act as a clearing house for all other members of the security
establishment.
Modeled after the US National Security Agency , NTRO had until recently been dubbed "India's newest secret
agency". Now, the Home Ministry's NATGRID, or one or other of the ever-mushrooming pet creations of the vast Indian bureaucracy, might vie
for this honor as they build their own personnel, budgets and images. The
Home Ministry has also just floated the idea of
forming a National Counter-Terrorism Center (NCTC), again borrowing a leaf from the American book ,
although this new body would have major overlaps in terms of technology and processes with the pre-existing NTRO. In May, just after the
ruling Congress-led coalition retained power in general elections, the politically heavyweight Home Ministry began advocating a new
Centralized Lawful Interception and Monitoring System that would "monitor all communication traffic to tighten the country's security and
surveillance set-up" and catch early warning signals of impending terrorist attacks. These tasks, again, were hitherto being managed by a fullfledged department of the NTRO. There have been 20 major terrorist strikes in India since 2001, including attacks by militants in Jammu and
Kashmir and on parliament in New Delhi, as well as bombings throughout the country. Prior to last year's attack in Mumbai, the deadliest
strikes was the bombing of several railway stations and trains in the city in July 2006, with some 180 people killed. In May 2008, bombs
exploded in crowded markets outside Hindu temples in the popular tourist destination of Jaipur, killing at least 60. In August 2008, National
Security Advisor M K Narayanan said that as many as 800 terrorist cells operated in the country. The domestic Intelligence Bureau (IB), which
comes under the purview of the Home Ministry, has also been active in the area of Internet telephony and interception of potential terrorist
conversations, adding to the plethora of trespassing mechanisms over and above the heads of existing entities. The IB is now readying for the
establishment of a new counter-intelligence center under its supervision. NTRO has struggled in other intramural battles with its notionally
allied organization in the labyrinthine state security apparatus, the Research and Analysis Wing (RAW), India's external intelligence
organization. The latter's failures in detecting Pakistani intrusions prior to the brief 1999 Kargil war had elicited criticism of its monopoly over
foreign intelligence-gathering and culminated in calls to detach RAW's Aviation Research Center (ARC) and merge it with NTRO as a single super
agency for technical intelligence. This handover has not been fully accomplished to date and continues to keep the scorebook of bureaucratic
wrangling open with highly wasteful expenditure and possible national security costs. Often mocked as a "soft state" that has failed to rectify
dysfunctional behavior, India can be better understood as a flabby state with far too many agencies, which work at cross-purposes and keep
the structure unprepared and uncoordinated for the next potentially devastating blow of anti-national actors. The gaps and loopholes in the
state's counter-terrorist response system have ironically grown with the proliferation of more and more agencies and projects. So
bureaucratically dense has the web of competing interests and responsibilities within the Indian state become since the Mumbai attacks that
the larger purpose of doing social good by advancing protection of citizens has been subsumed by a "me too" attitude in which everyone and
anyone who has some clout within government will press a finger into the pie. In this game of bureaucratic politics, who gets which piece of the
cake in terms of influence and counterbalancing "pull" (a uniquely Indian term referring to leveraging power) has overshadowed the core
mission of finessing state responses to multifarious threats. Indian's melee of multiplying committees, bodies and agencies scarcely boosts the
average citizen's confidence that he or she can be safer after all the revamps and "shakeups". A state is not a monolith but a vast constellation
of loosely allied institutions, organizations and centers of power. Visualized from the summit or the apex, the state reproduces itself like hydra
into smaller ramifications that carry the seal of sovereignty into the spaces that are inhabited by citizens. The give-and-take between these
state agencies and the public is theoretically based on mutual trust and need. Unfortunately, the one-upmanship games bedeviling the Indian
security structure have not done justice to this quid pro quo, which lies at the heart of contemporary political life. One
pattern
emerging from the mess of the flabby Indian state is the attempt of its top echelons to emulate the United
States in terms of merging, refurbishing or creating anew specialized agencies to tackle emerging security risks. What Indian policymakers
may have missed in the process of learning lessons from the US is that the latter has been historically bogged down with the same severe
symptoms of bureaucratic politicking.
India policy leaders emulate U.S. counterterrorism strategies
Rizvi 8 Dr Hasan-Askari Rizvi is a political and defence analyst, analysis: Imperatives of counterterrorism —Dr Hasan-Askari Rizvi, http://archives.dailytimes.com.pk/editorial/14-Dec-2008/analysisimperatives-of-counter-terrorism-dr-hasan-askari-rizvi
The post-Mumbai strategies of India and Pakistan reflect their immediate political concerns rather than longterm, coherent and shared perspectives on counter-terrorism. India is trying to extract maximum diplomatic dividend against Pakistan
by activating multilateral channels and applying direct pressure. Pakistan is engaged in damage control in an extremely difficult diplomatic
situation created by the Mumbai attacks. Pakistan has banned the Jama'at-ud Dawa, sealed its offices and arrested several of its leaders and
activists. One wonders why the government had to wait for a UN Security Council resolution and prodding by the United States to act.
Pakistan's intelligence agencies must have enough information on the activities of hard-line and militant groups, as well as on their linkages
with the Taliban. It is also well known that a good number of non-Pakhtun Pakistanis are involved in the Pakistani Taliban movement. Similarly,
Pakistani agencies would know if JuD was a front for banned terrorist group Lashkar-e Tayba. The present Pakistani government and military
top brass view the Pakistani Taliban and other militant groups as a major threat to Pakistan's internal political and societal stability. This is a
shift from the past when General Pervez Musharraf's regime pursued a dual policy of taking some action against these groups but leaving them
enough space to continue with their activities in a low-key manner. The present government asked the military to launch the ongoing
operations against the Taliban and Al Qaeda in some tribal agencies, and the operations have made significant gains in Bajaur and Khyber.
Militants were also pushed back in Swat, though they are far from being fully contained. Given that the security forces had their hands full in
the tribal areas, the government did not want to open a new front against militants in mainland Pakistan. However, consensus at the
international level on the involvement of a Pakistan-based group in the Mumbai attacks left Pakistan with no credible option but to take
immediate action against militant groups in the mainland. These groups are transnational and use all possible means, including violence, to
pursue their agenda with total disregard to the imperatives of Pakistan as a nation-state in the comity of nations. They want Pakistan to be
subservient to their agenda, and do not respect Pakistan's sovereign status and territorial boundaries. Should these movements be allowed to
impose precarious foreign policy situations on Pakistan? If Pakistan is to function as a coherent and effective state, it cannot allow non-state
actors to engage in violent and disruptive activities inside or outside its boundaries. Pakistan's policymakers need to do some hard and realistic
thinking on the current situation and terrorism-related issues. Indian policymakers need to do the same. They need not descend into traditional
India-Pakistan polemics to deflect criticism of internal security lapses and the probability of terrorism having domestic roots. The Indian
government has not blamed the Pakistani government of direct involvement in the Mumbai attacks, but maintains that a Pakistan-based group
planned and executed them. This places indirect responsibility on the Pakistani government, given that it is seen to have allowed such a group
to use Pakistani territory for a terrorist attack abroad. However, semi- and non-official Indian circles rarely maintain this distinction and project
Pakistan as an irresponsible terrorist state. They find encouragement to adopt this position in India's official effort to extract the highest
possible diplomatic dividends against Pakistan at the international level. As citizens of a number of states were killed in the attacks, India has
found it easy to mobilise support. It is interesting to note that Indian expats in the US are fully involved in the campaign to get Pakistan
designated as a terrorist state and to get UN approval for Indian airstrikes in Pakistan. A review of this ongoing Indian diplomatic campaign
gives a strong impression that India is more interested in undermining and isolating Pakistan at the international level to further India's wider
regional agenda rather than evolving a shared regional counter-terrorism strategy. The present strategy may meet India's immediate domestic
needs, but it does not serve the long-term need of countering terrorism holistically and effectively. This long-term objective cannot be achieved
without working with Pakistan. A
large number of people in India's official and non-official circles want to
emulate the United States: the argument is that if the US can launch airstrikes in Afghanistan and invade Iraq in response to attacks
on its soil, India can do the same to counter terrorism originating in Pakistan.
India and the U.S. dialogue on counter-terrorism strategies and India seeks to learn
best practices from the U.S.
Kumar 15 Manan Kumar reporter for DNA India India prepares for bigger counter-terrorism
collaboration with US Thursday, 15 January 2015 - 6:45am IST | Place: New Delhi | Agency:
dna,http://www.dnaindia.com/india/report-india-prepares-for-bigger-counter-terrorism-collaborationwith-us-2052633
India prepares to roll out red carpet to president Barack Obama as the chief guest during the Republic Day parade, Prime Minister’s Office
and union home ministry are finalising an elaborate agenda to address Indian concerns in the homeland security dialogue with
their US counterparts. Poised to share wider range of concerns amidst increasing bonhomie, the two countries are looking
forward to hold in-depth exchange of views on common areas of interest and collaboration to further mutual
counterterrorism goals that includes checking the spread of Islamic State of Iraq and Syria (ISIS) and al Qaeda which recently
As
announced its new wing, al Qaeda in Indian Subcontinent (AQIS). Though still better off than western countries in terms of youth traction
towards ISIS, the twin threats are steadily creeping into India and the two countries are eager to learn from each other and develop joint
strategies to check their spread, government sources said. The
union home ministry is keen to learn from their US
counterparts to check proliferation of Jehadi forums in cyberspace that is gaining ground among Urban Indian youth. Recent studies done
by IB revealed thousands of Indian youth hooked to such forum thus giving rise to the fear of self indoctrination as Jehadis and possibility of
lone wolf attacks. US expertise in checking such proliferation and ways to pinpoint the source of such forums and blocking them can help us
tackle this threat in a major way, said sources adding that the talks are at an advanced stage to get the knowhow to get quicker access to block
dangerous uploads on social media sites and import of better cyber forensic techniques to crackdown on virtual Jihadis. India
is also
banking on US for building capacity in cybersecurity and critical infrastructure protection to counter threats
and keep terrorist at bay. The two countries will also hold advanced talk on law enforcement engagement
proposals include sharing lessons learned and best practices in SWAT team training and responding to mass casualty exercises,
improving both nations’ capabilities to respond to terrorist incidents and natural disasters.
India has modeled its counterterrorism model after the U.S.
Raman 12 Bahukutumbi Raman is the additional secretary (retd), cabinet secretariat, Government of
India, New Delhi, and, presently, director, Institute For Topical Studies, Chennai, and Associate of the
Chennai Centre For China Studies), How PC tried to emulate US counter-terrorism centre and failed,
http://www.rediff.com/news/slide-show/slide-show-1-how-pc-tried-to-emulate-us-counter-terrorismcentre-and-failed/20120116.htm
The 26/11 terrorist strikes in Mumbai revealed more or less the same deficiencies in our counter-terrorism architecture as the deficiencies in
the counter-terrorism architecture of the US revealed by the 9/11 terrorist strikes. Namely, inadequate intelligence and lack of co-ordinated
follow-up action even on the intelligence that was available. In his first statement to the Lok Sabha on the 26/11 terrorist strikes after taking
over as the Home
Minister P Chidambaram said that the responsibility for follow-up action on available intelligence was found to be
the US to study the working of the Department of Homeland Security
and the NCTC, both of which came into being after 9/11. He came back a strong votary of two ideas: For the creation of a
separate Ministry of Internal Security patterned after the Department of Homeland Security of the US
diffused. Shortly thereafter, he had visited
and for the creation of an NCTC patterned after its US counterpart.
India modeled their high tech surveillance after U.S. – It was created after the Indian
Home Minister visited the NSA
Indian Express 14
India’s spy agencies more toothless than ever, http://indianexpress.com/article/india/indiaothers/indias-spy-agencies-more-toothless-than-ever/
In the spring of 2009, even as municipal crews in Mumbai were still sifting through the debris of 26/11, India’s newly-appointed home
minister, P Chidambaram, was ushered into the digital heart of the United States’ war against terrorism, its
super-secret National Counter-Terrorism Centre. He gazed intently, an aide recalls, at its giant video-walls, where
information from across the world displayed in real time, and asked searching questions about the dozens of classified
databases that feed them. Later that year, Chidambaram promised a made-in-India NCTC would be up and
running “by the end of 2010”- a third of the time it had taken the United States. “India cannot afford to wait 36 months”, he
declaimed. -
Or Nah Modeling
Their modeling evidence goes the wrong direction—Even if India used the U.S. as a
model for strengthening its counterterrorism strategy they will not reverse model
reductions – India perceives itself as facing very different threats and domestic politics
would block any roll back in surveillance
Kumar 12 Vikas Kumar is Assistant Professor of Economics at Azim Premji University, Bangalore, East Asia Forum, Why the India–US counterterrorism partnership is largely symbolic 11 October 2012, http://www.eastasiaforum.org/2012/10/11/why-the-india-us-counter-terrorismpartnership-is-largely-symbolic/ Zabiuddin Ansari, wanted among other things for the 2008 Mumbai terrorist attack, was recently deported
from Saudi Arabia to India. This has been hailed as a sign of growing convergence among India, the US and Saudi Arabia on terrorism and Iran.
But B. Raman, former head of the counter-terrorism division of India’s external intelligence agency, has convincingly argued that the India–
Saudi Arabia link of the triad will remain weak. And there
are several reasons why even India–US counter-terrorism
cooperation will also continue to be largely symbolic and sporadic for the foreseeable future. Let us begin with demography.
Muslims, mostly immigrants, account for just 0.6 per cent of the US population, whereas Muslims account for more than an eighth of India’s
population and are among the country’s founding fathers and leading public and cultural figures. India
is geographically close to
the nerve centres of Islamic terrorism in South and West Asia. This proximity is a disadvantage as Pakistan-based
transnational terrorists can easily penetrate India’s porous land and maritime borders. Moreover, India,
unlike the US, has only a limited overseas capacity to counter terrorism at its source. But even if it had such a
capacity, it would be largely ineffective against nuclear Pakistan. And irrespective of the incentives India may offer Pakistan’s megalomaniac
and paranoid military-intelligence establishment, the latter will not deliver results because any letting down of the hate campaign against India
would conflict with its raison d’être. In
contrast, the US, which is geographically isolated and has a better counterterrorism capacity, is able to fight terrorism far away from its territory . India and the US also differ in their ability to
influence Islamic countries. India is hugely dependent on Middle Eastern oil and many of its workers are employed in this region. This reduces
India’s bargaining power vis-à-vis the Middle East, which is a major source of financial and ideological support for Islamic terrorist organisations
in South Asia. In contrast, given its influence over international institutions and the global financial system, the US is relatively better placed to
favourably influence the policies of Islamic countries. Last but not the least, since the early 19th century Indian Muslims have been influenced
by developments in West Asia, and since the early 20th century they have been in conflict with the majority Hindus. The Muslim–Hindu conflict
resulted in the bloody partition of India that has left behind unresolved territorial issues, and the West Asian influence has radicalised some
sectors of the Muslim community in India. As a result, the Indian policymaker and common man alike believe that terrorism is to some extent
linked to the Kashmir question and to Indian youth affected by Muslim–Hindu riots, both of which are problems internal to India. These
factors contribute to a number of differences between the counter-terrorism strategies of India and
the US. US policy makers regard terrorism as a foreign and national defence problem. There is no influential domestic lobby that radically
differs from the establishment’s views in this regard. The domestic debate in the US is largely about the logistics of
fighting terrorism and the identification of suitable international partners. Changes in counter-terrorism strategy will
not have a dramatic effect on US domestic politics. So, policymakers have sufficient freedom to
rework strategy in response to changing threat patterns. In contrast, minor changes in strategy can
disproportionately affect domestic politics in India: a strong-arm strategy will radicalise the Muslim masses, whereas a
softer strategy will validate the Hindu right’s claim that Muslims are appeased in the name of secularism. So,
unlike the drone-borne counter-terrorism efforts of the US, India’s fight against terrorism is almost entirely police-driven and backed by
potential soft cultural options. India is similarly constrained on the foreign policy front. There are three reasons for this. First, Indian policy
makers and the public view international counter-terror operations as undesirable insofar as they contribute to internationalising the Kashmir
issue and attracting international jihadi attention to India. Second, India is a net oil importer; Muslims have a much stronger political presence
in India; and mainstream political parties view the Palestine problem through the prism of decolonisation. So, on the one hand, the Indian
government cannot, for example, support Israel on the Palestine issue and benefit from US–Israel counter-terrorism expertise. On the other
hand, India cannot afford to go all out against Saudi Arabia and Iran because of the deep attachment felt by many Sunni and Shia Muslims to
holy places in these countries and because of India’s dependence on oil imports. Third, the US can bargain with countries like Pakistan over,
say, rendering terrorists like David Coleman Headley to third countries and demanding, in exchange, cooperation to detect threats against its
homeland. But India does not have access to such tradable assets. To conclude, India
and the US view Islam differently and
they face very different geo-political and domestic constraints. This in turn implies a divergence
rather than convergence of counter-terrorism strategies. Moreover, belated revision of the US’s Kashmir policy and
procrastination in banning terror groups focused on India ensure that the Indian public and policymakers continue to
distrust the intentions of the US — and a reciprocal feeling exists in this latter country. The two sides, therefore, need to
overcome historical distrust of each other. In the meantime, it is unfair to treat counter-terrorism cooperation as the bellwether of their
relationship. In fact, it would help if existing counter-terror cooperation were downplayed to knock the wind out of jihadi propaganda against
the phantom Judaeo–Christian–Hindu alliance. The India–US relationship should instead build upon common interests like the promotion of
maritime security, free trade, energy security, clean technologies, anti-proliferation regimes, human rights and democracy.
They have no reverse modeling evidence—India has explicitly rejected U.S. privacy
restrictions on surveillance
Bhatia 15 Gautam Bhatia is Advocate, Delhi High Court, STATE SURVEILLANCE AND THE RIGHT TO
PRIVACY IN INDIA: A CONSTITUTIONAL BIOGRAPHY, stsfor.org/content/changing-face-privacy-indiaanalysis
Ever since the explosive Snowden disclosures in May 2013, State surveillance
and citizens’ right to privacy have been at
the forefront of international debate. Even as the Snowden documents were revealing, detail by detail, the American and British
intelligence agencies’ extensive surveillance systems (PRISM and TEMPORA, among others) used to spy both on their own citizens, and upon
communications elsewhere, reports about Indian bulk surveillance began to trickle in. It is now known that there are at least two
surveillance regimes in India, in uncertain stages of preparation: the Central Monitoring System (CMS), which provides for the
collection of telephony metadata by tapping into the telecommunications’ companies records2; and Netra, a dragnet surveillance
system that detects and sweeps up electronic communication that uses certain keywords such as “attack”, “bomb”, “blast” or “kill”. These
programs, wide in their reach and scope, have dubious statutory backing. They also, very clearly, impinge upon basic fundamental rights. A
discussion of the legal and constitutional implications, therefore, is long overdue. This essay presents an analytical and chronological history of
the Indian Supreme Court’s engagement with the right to privacy. While discussions for a privacy statute have stagnated and are presently in
limbo3, the Court has been active for nigh on fifty years. This essay aims to achieve a comprehensive, doctrinal understanding of the
constitutional right to privacy, as evolved, understood and implemented by the judiciary. Such an understanding, indeed, is an essential
prerequisite to embarking upon a legal and constitutional critique of mass State surveillance in India. II. FOUNDATIONS Privacy is not
mentioned in the Constitution. It plays
no part in the Constituent Assembly Debates. Indeed, a proposal to
include a provision akin to the American Fourth Amendment (and the root of American privacy law), prohibiting
‘unreasonable searches and seizures’, was expressly rejected by the Assembly. The place of the right – if it
exists – must therefore be located within the structure of the Constitution, as fleshed out by judicial decisions.
The India system has not modeled existing U.S. restrictions on metadata
Lowenthal 14 Mark M. Lowenthal is the senior specialist in U.S. foreign policy at the Congressional
Research Service Intelligence: From Secrets to Policy
India has a growing cyberspace capability, which, like that of many other nations, appears to have been used against potential foes, such as China and Pakistan, and
more friendly states, like the United States. India is in the midst of deploying a Centralised (or Central) Monitoring System (CMS) that is
designed to
track all communications within India-telephone, computer, landline, mobile, and so on. Unlike the NSA program, CMS
will not have to ask providers' permission for access but will have that built into the technology of the telecom and data service
providers. (IMS will provide intelligence to foreign and domestic agencies, the police, and tax collectors-a list that some believe is too broad. Like the NSA program,
CMS appears to focus on metadata. CMS is being developed and will be run by a government technology development center that is not part of the intelligent
complex. The Ministry for Home Affairs will have the power to determine who is monitored.
India has not modeled restrictions—They have far more surveillance authority than
the U.S.
Mirani 13Leo Mirani is a reporter for Quartz, Think US snooping is bad? Try Italy, India or…Canada,
http://qz.com/92648/think-us-snooping-is-bad-try-italy-india-or-canada/
Just because something is legal doesn’t necessarily make it a good thing. So far, legality is the main rationale US officials have used to defend
the government’s PRISM spying program. It’s all perfectly legal, approved by Congress and the courts. But a more potent argument might be to
compare PRISM with the spying programs of other countries. Compared
to the data-mining that goes on elsewhere, US
intelligence agencies may be relatively constrained. Start with Canada, which many consider to be a cuddlier, saner version
of the US. The Globe and Mail reports today that the Canadian defense minister approved a plan similar to PRISM back in 2005, and renewed it
in 2011. Run by the Communications Security Establishment Canada (CSEC), a signals intelligence agency similar to the US’s NSA or Britain’s
Government Communication Headquarters (GCHQ), the program collects metadata from phone and internet communication. Like PRISM,
CSEC’s primary targets are said to be foreigners. But what makes the Canadian effort somewhat more sinister is that it was instituted through
the executive branch of government without legislative approval. According to the Globe and Mail, “a regime of ministerial directives—decrees
not scrutinized by Parliament—have authorized the broad surveillance programs.” At least PRISM won the approval of Congress, however
clueless the legislature may be about the details. Then there is Italy. According to Italian lawyer Fulvio Sazrana (link in Italian), a law passed
earlier this year by the outgoing Mario Monti government also skipped over court orders and other legal approvals. Instead, Monti issued a
directive laying down guidelines for the protection of cybernetics and national cyber security. In so many words, the directive gives government
agencies what the French call “carte blanche” to raid private data banks in the name of “internet security.” There will be no Italian equivalent of
Twitter, which does not participate in PRISM. In India, internet service providers are “insisting upon Indian users’ privacy to be protected from
any such misadventure of any intelligence departments.” Meanwhile, India’s
government is setting up a vast surveillance
system with the express purpose of spying on its citizens, something the NSA has been at pains to say it does
not do . For instance, the government’s Central Monitoring System gives it access to all telecom traffic,
including calls, text messages and mobile internet. According to the Hindu newspaper, another proposed “national cyber
coordination cell” plans to: Collect, integrate and scan [internet] traffic data from different gateway routers of major ISPs at a centralised
location for analysis, international gateway traffic and domestic traffic will be aggregated separately … The NCCC will facilitate real-time
assessment of cyber security threats in the country and generate actionable reports/alerts for proactive actions by the concerned agencies.
India’s external intelligence agency, the armed forces, and even the local defense research establishment, among others, will have access. It is
debatable whether India, Canada or Italy’s data-acquisition and data-mining technology are as powerful as that of the NSA. But when they are,
these countries will already have laws and systems in place to abuse them.
The U.S. meta data program had legal privacy protections built in even before the
Freedom Act
Perez 13
Evan Perez reporter for Wall Street Journal, Phones Leave a Telltale Trail, Updated June 15, 2013,
http://www.wsj.com/articles/SB10001424127887324049504578545352803220058
Under the NSA phone program, the government collects domestic phone metadata without a specific
investigative lead. Trained analysts only search the database in conjunction with a terrorism investigation, authorities say. Intelligence agencies
"basically reimpose at the level of analysis the standards you might ideally have for collection," said Timothy Edgar, a former top nationalsecurity privacy lawyer in the Bush and Obama administrations. Mr. Edgar said the increasingly specific location data raises concerns about
potential violations of Fourth Amendment protections against unreasonable searches and seizures. Once a person can be located within a
building, the monitoring more closely resembles a search that would traditionally require a warrant. The
NSA program is
accompanied by privacy restrictions, Obama administration officials say. To search the database, the
government must have "reasonable suspicion" that the basis for the query is "associated with a foreign terrorist
organization," they say. Search warrants approved by the secret Foreign Intelligence Surveillance Court are required before the
contents of the calls may be monitored.
No reverse modeling – No restrictions on surveillance that exist in the U.S. have ever
been modeled in India—India has far more access to data then the U.S. does now—
The CMS collects and listens to all calls directly—it is not limited to metadata and they
have not modeled any privacy protections
Prakash 13 Pranesh Prakash is Policy Director, The Centre for Internet and Society, Bangalore, How
Surveillance Works in India July 10, 2013, http://india.blogs.nytimes.com/2013/07/10/how-surveillanceworks-in-india/?_r=0
When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor
telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S.,
commenced in April, the news didn’t receive much attention. After a colleague at the Centre for Internet and Society wrote about the program
and it was lambasted by Human Rights Watch, more reporters started covering it as a privacy issue. But it was ultimately the revelations by
Edward J. Snowden about American surveillance that prompted Indians to ask questions about its own government’s surveillance programs. In
India, we have a strange mix of great amounts of transparency and very little accountability when it comes to
surveillance and intelligence agencies. Many senior officials are happy to anonymously brief reporters about the state of
surveillance, but there is very little that is officially made public, and still less is debated in the national press and in Parliament. This lack of
accountability is seen both in the way the Big-Brother acronyms (C.M.S., Natgrid, T.C.I.S., C.C.T.N.S., etc.) have been rolled out, as well as the
murky status of the intelligence agencies. No
intelligence agency in India has been created under an act of
Parliament with clearly established roles and limitations on powers, and hence there is no public
accountability whatsoever. The absence of accountability has meant that the government has since 2006 been working on the
C.M.S., which will integrate with the Telephone Call Interception System that is also being rolled out. The cost: around 8 billion rupees ($132
million) — more than four times the initial estimate of 1.7 billion — and even more important, our privacy and personal liberty. Under their
licensing terms, all
Internet service providers and telecom providers are required to provide the
government direct access to all communications passing through them. However, this currently happens in a
decentralized fashion, and the government in most cases has to ask the telecoms for metadata, like call detail records, visited Web sites, IP
address assignments, or to carry out the interception and provide the recordings to the government. Apart from this, the government uses
equipment to gain access to vast quantities of raw data traversing the Internet across multiple cities, including the data going through the
undersea cables that land in Mumbai. With
the C.M.S., the government will get centralized access to all
communications metadata and content traversing through all telecom networks in India. This means
that the government can listen to all your calls, track a mobile phone and its user’s location, read all your text
messages, personal e-mails and chat conversations. It can also see all your Google searches, Web site visits, usernames and
passwords if your communications aren’t encrypted. You might ask: Why is this a problem when the government already had the same access,
albeit in a decentralized fashion? To answer that question, one has to first examine the law. There are no laws that allow for mass surveillance
in India. The two laws covering interception are the Indian Telegraph Act of 1885 and the Information Technology Act of 2000, as amended in
2008, and they restrict lawful interception to time-limited and targeted interception.The targeted interception both these laws allow ordinarily
requires case-by-case authorization by either the home secretary or the secretary of the department of information technology. Interestingly,
the colonial government framed better privacy safeguards into communications interception than did the post-independence democratic
Indian state. The Telegraph Act mandates that interception of communications can only be done on account of a public emergency or for public
safety. If either of those two preconditions is satisfied, then the government may cite any of the following five reasons: “the sovereignty and
integrity of India, the security of the state, friendly relations with foreign states, or public order, or for preventing incitement to the commission
of an offense.” In 2008, the Information Technology Act copied much of the interception provision of the Telegraph Act but removed the
preconditions of public emergency or public safety, and expands the power of the government to order interception for “investigation of any
offense.” The IT Act thus very substantially lowers the bar for wiretapping. Apart from these two provisions, which apply to interception, there
are many laws that cover recorded metadata, all of which have far lower standards. Under the Code of Criminal Procedure, no court order is
required unless the entity is seen to be a “postal or telegraph authority” — and generally e-mail providers and social networking sites are not
seen as such. Unauthorized access to communications data is not punishable per se, which is why a private detective who gained access to the
cellphone records of Arun Jaitley, a Bharatiya Janata Party leader, has been charged under the weak provision on fraud, rather than invasion of
privacy. While there is a provision in the Telegraph Act to punish unlawful interception, it carries a far lesser penalty (up to three years of
imprisonment) than for a citizen’s failure to assist an agency that wishes to intercept or monitor or decrypt (up to seven years of
imprisonment). To put the ridiculousness of the penalty in Sections 69 and 69B of the IT Act provision in perspective, an Intelligence Bureau
officer who spills national secrets may be imprisoned up to three years. And under the Indian Penal Code, failing to provide a document one is
legally bound to provide to a public servant, the punishment can be up to one month’s imprisonment. Further, a citizen who refuses to assist an
authority in decryption, as one is required to under Section 69, may simply be exercising her constitutional right against self-incrimination. For
these reasons and more, these provisions of the IT Act are arguably unconstitutional. As bad as the IT Act is, legally the government has done
far worse. In
the licenses that the Department of Telecommunications grants Internet service providers,
cellular providers and telecoms, there are provisions that require them to provide direct access to all
communications data and content even without a warrant, which is not permitted by the existing laws on interception.
The licenses also force cellular providers to have ‘bulk encryption’ of less than 40 bits. (Since G.S.M. network encryption systems like A5/1,
A5/2, and A5/3 have a fixed encryption bit length of 64 bits, providers in India have been known use A5/0, that is, no encryption, thus meaning
any person — not just the government — can use off-the-air interception techniques to listen to your calls.) Cybercafes (but not public
phone operators) are
required to maintain detailed records of clients’ identity proofs, photographs and the
Web sites they have visited, for a minimum period of one year. Under the rules designed as India’s data protection law (oh, the
irony!), sensitive personal data has to be shared with government agencies, if required for “purpose of verification
of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offenses.”
India has not modeled any of the privacy protections that exist in the U.S. – They have
no legislation protecting privacy
Xynou 13 Maria Xynou Maria is a Policy Associate on the Privacy Project at the CIS, FinFisher in India
and the Myth of Harmless Metadata, http://cis-india.org/internet-governance/blog/fin-fisher-in-indiaand-myth-of-harmless-metadata
Furthermore, India
lacks privacy legislation which could safeguard individuals from potential abuse, while
Information Technology (Amendment) Act, 2008, empower Indian authorities
with extensive surveillance capabilites.[28] While it remains unclear if Indian law enforcement agencies are using FinFisher spy
sections 66A and 69 of the
products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they
could potentially have severe consequences on individuals' right to privacy and other human rights.[
AT: CMS Economy “honey pot” scenario
Their scenario makes no sense - CMS is a data base for communication records and
telephone data—It does not connect to the banks or financial markets—Hacking the
CMS does not equal attacks on financial institutions
Cyber attacks can’t crush the economy because India’s economic infrastructure is
compartmentalized and the national data base is protected
Shukla 13 Ajai Shukla reporter for Business Standard, Cyberspace: India's digital battleground, 22nd
Jun 13 http://ajaishukla.blogspot.com/2013/06/cyberspace-indias-digital-battleground.html
India, however, has been slow in fixing its attention on cyber security. This may partly be because much of the country’s critical
infrastructure --- power grids, public transportation, nuclear power plants, defence systems --- is
controlled by manual systems, or by stand-alone computer systems that are not linked over the internet. In
that respect, India’s infrastructural backwardness has proved a useful safeguard against cyber attack. “It is not unusual to find New Delhi’s
central ministry officials using unsecured email systems, sometimes even commercial email accounts on public servers. But India’s
sensitive networks tend to be isolated, with no point of contact with the internet that would render
them vulnerable to on-line hacking. Several agencies have their own, dedicated, secure optic fibre
networks, notably the military; the Defence R&D Organisation (DRDO); and the police’s Crime and Criminal Tracking
Network System (CCTNS), the national database that is being gradually rolled out,” says Praveen Swami, the Strategic
Affairs Editor of Network 18.
Not Unique—Cyber attacks on India’s financial infrastructure are exploding now
before CMS has been completed
Athavale 14 Dileep Athavale, reporter for the Times of India. Cyberattacks on the rise in India , TNN |
Mar 10, 2014, http://timesofindia.indiatimes.com/tech/it-services/Cyberattacks-on-the-rise-inIndia/articleshow/31757791.cms
The ease of online banking and transactions has brought with it a significant rise in malicious attacks
on digital devices and software systems. Most of these attacks, as recent instances of online thefts have demonstrated, have
been in the banking and financial services domain. According to reports by research agencies, the problem has become
more complex with the proliferation of mobile devices and the users' preference towards transactions on the go. In addition, there is also laxity
on the part of the users when it comes to following safe practices during such transactions, coupled with a significant lack of manpower with
skills to handle the rising number of such attacks, the agencies' reports state. Arbor Networks' research report states that 2013
witnessed
a huge rise in attacks against the banking and financial services sector. Government establishments also faced such
attacks. The firm said there was a 136% increase in cyberthreats and attacks against government organizations and 126%
against financial services organizations in India. India has seen significant increase in attacks against
financials and government, with 34% and 43% of them reporting cyberthreats and attacks respectively, up from last year's 15% and 19%,
the report revealed. "From the ISP to the enterprise, IT and security teams are facing a dynamic threat landscape and very skilled and patient
adversaries," Matthew Moynahan, president of Arbor Networks, said. "Multi-layered defenses are clearly needed, but so is a commitment to
best practices for people and process," he added. Another report, from EC-Council Foundation pointed at a major gap in information security
threat handling capabilities in India, thanks mainly to the talent crisis in the country. The report shows talent levels in nine crucial segments of
information security, the implications of which could impact handling of cyberthreats in industries such as banking and economy, defence,
healthcare, information and energy among others. Close to an alarming 75% participants displayed low levels or a lack of skill in error handling,
while 73% participants were not adequately equipped with skills in file handling, the report revealed. Experts have recognized that malicious
file inclusions, malware distribution and distributed denial of service s(DDOS) attacks are known threats that can arise out of improper file
handling and such threats are often used to synchronize attacks on websites or large networks, the report stated. Anshul Abhang, managing
director and chief executive of enterprise security solutions firm Deltaproactive, told ToI that a malicious attacker now looks for high-value
targets that can benefit him financially. "Hacking is no more a satisfaction game but has become serious business. The attackers also look for
indirect financial benefits by targeting particular organizations' services and taking it down eventually. Such service outages result in financial
loss as well as goodwill and image loss in the market."
India’s banking sector is vulnerable to cyber attacks now
Kaushik 14 Ram. K. Kaushik ia a blogger for Cyber Security in India,
http://cybersecurityforindia.blogspot.com/
However, cyber
security in India is in a poor condition. Cyber security of banks in India is also required to
be strengthened. The banks operating in India are not at all serious about maintaining cyber security
of banking related transactions and this is resulting in many cyber and financial crimes in India. In the
absence of appropriate skills development and modernisation of law enforcement agencies of India, police force are finding it really difficult to
solve technology related crimes. Further, cyber security of sensitive databases like National Identity Cards would also require strong privacy
protection and cyber security compliances.
Turn, Only completing the CMS can allow the surveillance necessary to stop cyber
attacks on the financial system
GKT 15 General Knowledge Today: India’s Daily E Magazine, Feb 2015
http://www.gktoday.in/blog/developing-the-cyber-security-architecture/
Cyber warfare is the internet based conflict which arises when the information system of the strategic departments of the country are attacked
in order to get the classified information. In the modern world of digitization such politically motivated snooping is done to interrupt the
strategic affairs of the nation. Sometimes it is aimed at attacking the major infrastructures of the nation. With the shrinking world, the internet
connectivity and heavy dependence of the government functioning on internet, it is imperative to have a cyber securing framework. In
the
world of digitization critical infrastructure like banking system, financial market, power infrastructure,
and hydroelectric projects are prone to such attack. The grid failure like instances can be its consequences. Hydroelectric
projects prone to disaster, may be attacked and create disasters. 'Stuxnet' like malwares which were introduce in the centrifuge of Iran was one
such incidence. NSA's PRISM snooping incidence, Dropmier, Tempora are such other global surveillance programmes which were
operationalised to mine the data strategic to India. Hackers from different countries like Pakistan and china try to deface the Indian website are
the potential attackers. Hence
it is imperative to have in the modern times a properly tucked national
security and monitoring system to have a digital surveillance in the country protecting it from cyber
warfare and cyber espionage. India’s efforts to minimize the cyber threat With the rise of India in last some decades as a
global power and emerging economy it attracted global attention and remains vulnerable with regard to information
protection. India's cyber security architecture as of now do not provide any mass surveillance
mechanism with only few distinguished agencies like RAW, IB get access to such monitoring after the approval. India's effort include CERTIn (Computer Emergency Response Team- India) which was formed in 2002-03 to create awareness on cyber threat, understand vulnerabilities
and devise ways to mitigate them. National Technical Response Organization (N'I'R0) was given responsibility of protecting the critical
infrastructure institution and developing offensive capabilities. Amendments to the IT act 2008, raised the level of awareness about the cyber
crimes. It recognizes various ways of cyber attacks and also provides help to prosecute the cyber criminals. National cyber security policy 2013
was framed to build a secure and resilient cyber space for government, citizen and business to protect the classified information critical to
India's security. Its features include range of provisions including 24X7 mechanisms to deal with cyber threats. India
is following the path of
developing intense surveillance system which not only monitor the cyber threat to the national security but also
seems to compromise the privacy of its citizen in some cases. The Central Monitoring System (CMS) is an ambitious project that is
required to keep the national security and monitoring under surveillance. It would be a centralized mechanism
where the telecommunication and internet connections can be analyzed by Indian government and its agencies. Central and regional
database would help law enforcement agencies to monitor and intercept. Call data recordings and
data mining to identify call details of the targeted numbers. Another such Efforts is NeTRA (Network Traffic Analysis
System) will intercept and examine communication over the internet for keywords like 'attack', 'blast', 'kill'. It appears to be Indian government
first attempt of mass surveillance rather than individual targets. It will scan the activities over the social networking websites like twitter and
would scan the mails and chat transcript and even the voices in the internet traffic. India's cyber security has not only to be effectively
implemented but also to be redrawn in line with growing cvber crimes.
Turn, metadata is key to DETER cyber attacks
Michaels 13 Jim Michaels, is a military writer for USA TODAY and has covered wars around the world. He is a former Marine infantry officer
USA TODAY June 6, 2013, NSA data mining
can help stop cybercrime, analysts say The huge volume of telephone
records turned over to the U.S. government could help investigators identify and deter a range of terrorist acts, including
cyberattacks, analysts say. "Once you have this big chunk of data and you have it forever… you can do all sorts of analytics with it using
other data sources," said Joseph DeMarco, former head of the cybercrime unit in the U.S. attorney's office in New York City. "A data set like this
is the gift that keeps on giving," said DeMarco, a partner at the law firm DeVore & DeMarco.
Turn- NCCC Metadata program for preventing cyber terror attacks is modeled after
U.S. data collection and will prevent cyber attacks
Keck 13 Zachary Keck is assistant editor of The Diplomat, India Sets Up Domestic PRISM-Like Cyber
Surveillance?, http://strategicstudyindia.blogspot.com/2013/06/afghan-lessons-for-arming-syrianrebels.html
Even as the
United States’ PRISM cyber-snooping program is raising alarm across the world, India is in the midst of
setting up a similar program designed to collect intelligence via the internet domestically. The Hindu reports that the India
government is creating a centralized mechanism to coordinate and analyze information gathered from internet accounts throughout the
country. The
mechanism will be called the National Cyber Coordination Centre [NCCC]. “The federal Internet
scanning agency will give law enforcement agencies direct access to all Internet accounts , be it your e-mails, blogs
or social networking data,” the Hindu reported, referring to the NCCC. A classified government “note” that The Hindu obtained explains the
NCCC in this way: “The NCCC will collect, integrate and scan [Internet] traffic data from different gateway routers of major ISPs at a centralised
location for analysis, international gateway traffic and domestic traffic will be aggregated separately … The
NCCC will facilitate realtime assessment of cyber security threats in the country and generate actionable reports/alerts for
proactive actions by the concerned agencies” NDTV, however, reports that the NCCC will not target individuals but rather will seek to
access threats to India’s cyber infrastructure as a whole. “The new system will look for unusual data flow to identify and access cyber threats
and not individual data,” NDTV reported, citing unnamed government officials. But the Hindustan Times reports that Indian
authorities
have long used meta-data to track potential cyber threats inside the country. According to that paper, the program does
not allow Indian authorities to access actual content, but rather look for “patterns in the manner emails, phone calls and SMSes are sent and
delivered.” It’s unclear how much the NCCC would expand this authority and in which ways, if at all. One purpose of the NCCC seems to be
simply trying to coordinate the different activities of government agencies tasked with elements of cybersecurity. During a speech last month,
Prime Minister Singh briefly alluded to the then-forthcoming NCCC, “We are implementing a national architecture for cyber security and have
taken steps to create an office of a national cyber security coordinator.”
Turn, India’s metadata surveillance program will prevent cyber attacks
Jhala 14 Krishna Jhala is an associate attorney at Priti Suri & Associates, India gets ready to set up
cyber snooping agency March 2014, http://www.psalegal.com/FLASH_POPUP.php?flashID=144
India will soon be setting up a federal internet scanning agency called NCCC to spy all internet
accounts and online data. NCCC is to monitor cyber security threats and inform concerned law
enforcement agencies for proactive action to prevent crime . NCCC will collect and integrate internet traffic data from
different gateway routers of major ISPs at a centralized location for analysis. NCCC would be set up at a cost of INR 10 billion and all top
government spy and technical agencies including Department of Telecommunication, Intelligence Bureau, Research and Analysis Wing, Indian
Computer Emergency Response Team, Army, Navy, Air force, National Security Council Secretariat, Defence Research and Development
Organization will play an active role in the functioning of NCCC. PSA view - In the present internet era, cyber
attacks are on an
increase and pose as a huge threat to the safety and security of the nation. Recently, Central Bureau of
Investigation’s website had been defaced by hackers and in another case attempts were made to break into Indian Railway Website. Therefore,
NCCC is need of the hour and a step in the right direction to address the shortcoming in the cyber security.
100% FDI allowed in telecom sector In a meeting of the Department of Policy and Promotion chaired by Prime Minister on July 16, 2013, it was
announced that FDI limit in the telecom sector has been increased to 100%. The earlier limit was 74%. As per latest announcements,
investment up to 49% is allowed to come in through the automatic route and investment above 49% is required to be brought in through the
government route i.e. approval of the Foreign Investment Promotion Board. PSA view - The announcement is seen as a welcome change.
However, the policy and implementation of these announcement is what is most awaited. The increased limits are set to bring in billions of
investments in this sector. Fresh foreign investments would help catalyze growth and the process of proliferation in the telecom sector across
the country. India set to frame new testing norms for telecom equipment The Department of Telecommunications with the Department of
Electronics & IT and National Technical Research Organization are all set to frame new testing standards for telecom gear to shield networks
from potential cyber attacks. The Common Criteria Recognition Arrangement (“CCRA”) clearance will no longer be enough to certify global
telecom gear used in India, announced the National Security Council Secretariat, the apex agency looking into India’s political, economic and
energy and strategic security concerns. PSA view - CCRA was created ten years back by UK, US, Canada, France, Germany and the Netherlands,
Australia and New Zealand, to define a common process to evaluate security-sensitive IT & telecom products and an objective to motivate
global telecom vendors to find common processes to reduce equipment certification costs worldwide. But now India has started creating
country-specific telecom gear testing standards and adopting several measures: (i) mobile phone companies have been mandated to use
equipment deemed “safe” by an authorized testing lab in India from November 1, 2013; (ii) India is preparing a cyber security framework and a
cyber security policy; (iii) India
is setting up a National Cyber Coordination Centre to monitor metadata on
cyber traffic flows; (iv) Establish a pilot lab and a full-fledged certification center and development system; and (v) To adopt global
approaches to its procurement policies, India is reviewing its Preferential Market Access policy designed to compel foreign companies to
manufacture electronic products in India if they want to sell in India.
LeT Disad
LeT stands for Lashkar e Taiba ( sometimes called
Let - Internal Links
VOIP Links
LeT can avoid detection because it relies on VOIP communication that can’t be tracked
Sharwood 12 Simon Sharwood is a reporter for the Register Terrorists 'build secure VoIP over GPRS
network' Secret comms channel eludes Indian spooks,
http://www.theregister.co.uk/2012/05/01/terror_group_voip/
Terror group Lashkar-e-Taiba has developed its own VoIP network that connects its members over GPRS
networks, according to the Times of India. UK and US authorities have both declared Lashkar-e-Taiba a proscribed terror organisation. The
group's aims include India ceding sovereignty over Kashmir. Members of the organisation participated in the 2008 attacks on Mumbai. The
VoIP network is frustrating India's intelligence community, the report says, because it means they can no
longer trace the group's members as it is far harder to spy on than email or commercial VoIP services. “Earlier, we could
intercept conversations on phone or locate Lashkar cadres based on their IP addresses through their
emails,” an intelligence source told the Times. “But now we're finding it tough to gather intelligence because
Lashkar men hold audio or video conferences using private VoIP.” The network even has a name: Ibotel. The report
says Laskar-eTaiba recruited “technicians, engineers and information technology executives … intensify
its operations across India.” Some of those recruits, the report suggests, developed Ibotel as the group sought more secure methods
of communication.
LeT use of VOIP is making them impossible to track down with conventional
intelligence methods
Singh 12 Aarti Tikoo Singh reporter for Times of India, Lashkar’s own Skype frazzles Indian intelligence ,
TNN | Apr 30, 2012, http://timesofindia.indiatimes.com/india/Lashkars-own-Skype-frazzles-Indianintelligence/articleshow/12934037.cms
The increasing use by terror group Lashkar-e-Taiba [LeT] of Voice over Internet Protocol (VoIP) for communication,
and its impenetrability, is proving frustrating for Indian intelligence. In fact, Lashkar supreme commander of
operations, Zaki-ur Rehman Lakhvi, who is in a Rawalpindi jail, has been networking using a private VoIP on his smart phone with Lashkar
cadres. "Lakhvi's compound serves as Lashkar's alternative headquarters," a top intelligence source told TOI. It was his imprisonment, sources
said, that stopped Lashkar cadres from using emails and phones and restrict communication to VoIP. VoIP is a technology that delivers audio
and video messages over the internet. It's distinct from phone as it converts audio signals into binary data. VoIP also allows encryption of data,
which makes it difficult to decode messages. Senior intelligence sources in Kashmir told TOI that Muridke (Lahore) based Lashkar
known
for using technology more than any other terror group in Kashmir, has its own private VoIP, Ibotel, to
communicate with its cadres in Pakistan and Kashmir. Ibotel, Lashkar's exclusive VoIP that runs on GPRS (mobile data service on 2G or 3G
cellular communication system), was created by Lashkar's own tech team. The group began recruiting technicians, engineers and information
technology executives almost a decade ago to intensify its operations across India. Lashkar, which is headed by Hafiz Saeed against whom the
US recently announced a $10 million bounty for his alleged role in the November 2008 Mumbai attacks, started using VoIP as soon as the
technology became common in early 2000s. Lashkar's handlers used VoIP during the Mumbai attacks, intelligence sources said. "Earlier,
we
could intercept conversations on phone or locate Lashkar cadres based on their IP addresses through
their emails. But now we're finding it tough to gather intelligence because Lashkar men hold audio or
video conferences using private VoIP," said intelligence sources. "It's difficult to track their locations .
And even if we know their IP addresses and the time and date of their audio or video calls, we remain technologically handicapped because we
can't intercept what transpired between them," said a senior government official. "There may not be more than 50-odd Lashkar men. Yet, they
are a threat because they have the ability to strike in the Valley or other parts of the country. We
technology to hunt them down," said a senior J&K police officer.
need to catch up with the
CMS is key to tracking VOIP communications
Parbat 13
Kalyan Parbat, ET Bureau Dec 30, 2013, Home Ministry pushes for IB right to screen VoIP services
offered by Skype, Yahoo, GTalk, RediffBol c Dec 30, 2013,
http://articles.economictimes.indiatimes.com/2013-12-30/news/45711413_1_interception-solutionvoip-indian-telegraph-act
Learning from the interception pilot will be used by the government to fine tune the Centralised Monitoring System (CMS), the
muchawaited national surveillance system that will be equipped to track all forms of communications, including
wireless, landline, satellite, internet and VoIP calls from next year.
A comprehensive study demonstrated that disrupting LeT is key to stopping its attacks
Dilegge 12
Dave Dilegge is Editor-in-Chief of Small Wars Journal and serves as a Director at Small Wars
Foundation. ¶ University of Maryland Scientists Develop New Methods to Combat Pakistani Terrorist
Group Lashkar-e-Taiba, http://smallwarsjournal.com/blog/university-of-maryland-scientists-developnew-methods-to-combat-pakistani-terrorist-group-lashk
¶
¶ Effectively reducing the likelihood and intensity of attacks by the Pakistani terrorist group Lashkar-eTaiba (LeT), the perpetrators of the November 2008 assault on Mumbai, India, requires a cocktail of
actions including fostering dissent within LeT, hampering the organization’s ability to conduct
communication campaigns or provide social services, and disrupting the links between LeT and other
Islamist terror groups, says a new study completed by an interdisciplinary research team at the
University of Maryland’s Lab for Computational Cultural Dynamics.¶ ¶ Presented at an international
symposium on Lashkar-e-Taiba held in Washington on Sep 10, 2012, the study also confirms traditional
wisdom that pressuring Pakistan to rein in its terrorist proxies and disrupt LeT terrorist training camps is
also necessary to reduce the scope of LeT attacks. The UMD research further showed that traditional
counter-terror and law-enforcement tools such as arrests, raids, and targeting the group’s field
commanders have only had a limited impact in reducing the likelihood of Lashkar-e-Taiba attacks. The
study also is being published as a book: “Computational Analysis of Terrorist Groups: Lashkar-e-Taiba”
(Springer, released Sep. 10, 2012).¶ ¶ Besides killing hundreds of civilians, LeT threatens the stability of
South Asia because its attacks heighten tensions between nuclear-armed rivals India and Pakistan.
Further, since the assault on Mumbai, information on Lashkar-e-Taiba suggests that it has increasingly
turned its attention towards attacking the West not only in Afghanistan but also in Europe and
Australia.¶ ¶ “Our study of LeT is different,” explains V.S. Subrahmanian, lead author of the study, and
director of the University of Maryland’s Laboratory for Computational Cultural Dynamics, “It is the first
in-depth analysis of a terror group that uses sophisticated data mining algorithms to learn temporal
probabilistic rules as well as new algorithms to automatically suggest set policies which are sets of
actions that should and should not be taken in order to elicit a desired behavior. Companies like Google
and Amazon use these kinds of analytic methodologies to model the behaviors of customers every day.
Decision-makers dealing with deadly threats to national security should have the same kinds of tools
available.”¶ ¶ The findings on how best to deal with LeT are based on systematically gathered monthly
data on 770 variables over a period of over 20 years. The UMD researchers mined this data for
temporal probabilistic rules that not only identify conditions under which different types of terror strikes
are carried out by LeT or its affiliates, but also the time delay with which these actions occur.. Given
these rules about the likelihood of LeT actions, a new Policy Computation Algorithm identifies sets of
actions that reduce the likelihood of LeT attacks.¶ ¶ A typical rule states that two months after 5-24
Lashkar-e-Taiba operatives were arrested and Lashkar-e-Taiba operatives were on trial in either India or
Pakistan, there was an 88 percent probability of Lashkar-e-Taiba engaging in clashes with local security
forces in which Lashkar-e-Taiba operatives are killed. The software generated hundreds of such rules
about a vast range of Lashkar-e-Taiba attacks including their targeting of civilians, professional security
forces, transportation centers, security installations, and symbolic/tourist locations.¶ ¶ Overall the rules
showed that support from Pakistan’s government for LeT (which over the years has included financial,
military, as well as operational support) is strongly correlated with almost every type of Lashkar-e-Taiba
violence, while when Lashkar-e-Taiba is suffering from internal dissension they are less likely to carry
out every type of attack.
Meta data links
India access to Meta data is key to prevent attacks orchestrated through VOIP and to
prevent terrorist attacks in India
Sharma 14
Laveesh Sharma, Graduate Student at Jindal School of International Affairs, Haryana, Changing Face of
Privacy in India: An Analysis, http://stsfor.org/content/changing-face-privacy-india-analysis
In the year of 2012, the National Security Council of India, which was headed by the former Prime Minister Manmohan Singh, planned the
establishment of the National Critical Information Infrastructure Protection Centre (NCIPC) that was to be created by the National Technical
Research Organization (NTRO) (Joseph, 2012). The Standing Committee on Information Technology has recommended the following apart from
the setting up of the NCIPC (Legislative, 2014): * Establishment of a protection centre; * Creation of a single centralised body dealing with
cyber-crimes; * Employment of skilled IT professionals to overcome shortage of manpower and; * Funding as well as conducting extensive
research and development. In the hindsight, the right to privacy has not been granted under the Constitution of India, although the courts
encompass it within the ‘freedom of speech and expression’ under Article 19(1) (a) and ‘right to life and personal liberty’ under Article 21.
Currently there is no dedicated legislation in place aimed at data protection or privacy. The data protection laws are a set of privacy laws and
procedures meant for minimizing intrusion of privacy, owing to surveillance and data collection. Nevertheless the Centre for Internet & Society,
an NGO based in New Delhi has researched extensively and drafted a version of the Privacy Protection Bill, 2013 (Acharya, 2013). Some
characteristics of the bill include: * It seeks to heavily penalize organisations or institutions obtaining personal data under false pretext; * It
authorizes suspension of telecom service provider’s license if it violates conditions of confidentiality mentioned in the bill; * It states that
recommendations shall be made by committee comprising the Cabinet Secretary, Secretaries of Departments of Personnel and Electronics and
IT, as well as two experts of data protection, law and finance to be nominated by the Central government. However, the National Security
Advisor (NSA) seeks to weaken the bill by reducing its scope and introducing provisions that would protect the intelligence agencies. The
current IT Act applies only on entities and persons located in India and not foreign corporations or people located abroad (Kosturi Ghosh, 2014).
It is designed to be incursive. For instance under Section 43A, the IT Act legalizes handling of sensitive personal data, and under Section 69,
the Government of India can “intercept, monitor or decrypt” any information transmitted or
generated from any computer resource in the interest of the sovereignty and integrity, defence, public order, preventing
incitement and for the security of the State (Dalmia, 2011). The impact on privacy will be hard hitting when the Central Monitoring
System (CMS) comes into action. It was fast tracked post 26/11 Mumbai attacks in which the perpetrators used
voice over internet protocol (VoIP). This system would allow the Government to access every digital
communication and telecommunication in the country. The CMS will be capable of covering text messages, online
activities, phone calls, online searches and even social media conversations! (Nandakumar, 2013). According to investigations, about 160
million users are already under the scrutiny of wide-ranging surveillance. They have further revealed that a “Lawful Intercept and Monitoring
Systems” is in place, which has been arranged by the Centre for Development of Telematics for the purpose of monitoring Skype, emails, webbrowsing and of course Internet traffic (Singh, 2013). The surveillance agency in Australia, Defence Signals Directorate (DSD) shared metadata
of its citizens with intelligence allies overseas. Prime Minister Tony Abbott defined meta-data as “essentially the billing data which is different
from the actual content of calls.” A metadata
can paint a “visual rendering” of one’s digital and physical
existence (Laughland, 2013). Owing to the trails of pieces, internet activities of an individual can be linked and
traced back. The NSA’s meta-data surveillance programme compiles the data giving a detailed picture of lives of individuals; these can
provide information about people’s political or religious affiliations and even their relationships. One of the other important phenomena has
been the rise in the number of smart phones in India. The industry has been very successful and has seen spike in the number of smart phone
users, with the market leader Android reportedly holding 62% of the market share according to a 2012 survey (Brindaalakshmi, 2013), followed
by Windows Mobile, RIM, IOS and so on. A rising consumer base for these companies is a cause of concern, as in the past these very firms had
provided direct access to the NSA. The NSA allegedly had access to over 180 million records from Yahoo, Google and Facebook. In 2013, the
percentage of obtained information from Skype rose to 248%, for Facebook, 131% and 63% for Google with DropBox being designed as a PRISM
provider (Glenn Greenwald, 2013). The recent upgrades in the Android software (Kit-Kat) make it the best spying phone that could capture
highly personal data of movements, activities, interests, internet searches and geo-locations. These smart phones use cutting-edge technology,
making them a potential spying weapon (Liss, 2014). The fact remains that such an incident can happen without anyone’s knowledge just like
the NSA snoop-gate, and governments would not even come to know unless there is another Snowden out there. The
mechanisms and
artillery adopted in the IT sector by the Indian Government may all seem too invasive of one’s own privacy but all of
these are absolute a necessity for the fight against cyber terrorism , mass-surveillance, cyber espionage and to prevent
another snoop-gate by a foreign country. The past incidents have shown how powerful and exploitative these instruments are as they hamper
freedom of speech and expression and lead to wrongful arrests for even ‘liking’ a post on Facebook or tweeting. Legal frameworks to tackle
these issues are extremely essential; at the same time amends have to be made in the IT Act.
Sophisticated social network tools can turn metadata into effective intelligence
information
Wheaton & Richey 14 Kristan J. Wheaton is an Associate Professor at Mercyhurst University and
Melonie K. Richey is a graduate student at Mercyhurst University who is currently participating in
IARPA’s Sirius Project. Metadata Analysis as an Intelligence Tool, e-International Relations January 9,
2014 , http://strategicstudyindia.blogspot.com/2014/06/metadata-analysis-as-intelligence-tool.html
The legality of the National Security Agency’s (NSA’s) use
of US citizens’ metadata to identify and track foreign
intelligence organizations and their operatives is currently a subject of much debate. Less well understood (and consequently
routinely misreported) are the capabilities and limitations of social network analysis, the methodology
often used to evaluate this metadata. One of the first causes of confusion is definitional. Social network analysis is often linked
to an inappropriate degree with social media. True, social media such as Facebook and Twitter are frequently used as rich data sources for
social network analysis, but understanding the importance of networks in the affairs of states has been around at least since Machiavelli.[1] In
addition, the first modern version of what would come to be called social network analysis was developed not by an intelligence agency or
computer scientist but by Columbia professor and psychosociologist, Jacob Moreno, in 1934. These “sociograms,” as Moreno called them were
used to graph individual preferences or relations within a small group. Little did Moreno suspect that his method for understanding the
relationships between people, when combined with graph theory and the processing power of computers, would allow for the detailed analysis
of thousands of people or organizations with hundreds of thousands of connections between them (See Fig. 2). [2] Figure 2 – Modern
social network analysis uses powerful computers and graph theory to map out the relationships
between thousands of nodes and hundreds of thousands of links. Shown here is the network of the over 6000 Twitter
users who follow the Twitter handle of the American Nuclear Society along with their over 200,000 connections. (Image Source: Melonie
Richey) Along with the undeniable power of this type of analysis comes the inevitable (and justified) concerns for privacy and constitutionality.
But just how powerful is social network analysis? What can intelligence agencies actually glean from the exabytes of data they are purportedly
collecting? Social Network Analysis, as an analytic method, has inarguable applicability to the field of intelligence and is progressively reshaping
the analytic landscape in terms of how analysts understand networks. For example, analysts
currently use SNA to identify key
people in an organization or social network, develop a strategic agent network, identify new agents
and simulate information flows through a network. Beyond this, SNA can be easily combined with other
analytic practices such as Geographic Information Systems (GIS), gravity model analysis or Intelligence Preparation of the Battlefield (IPB) to
create robust, predictive analyses. Identifying Key People/Organizations in a Network The most obvious use of SNA is its ability to
identify key actors and entities within a network. Centrality measures within a network are means for measuring a node’s relative importance
within the network. [3] It is well-accepted that “the ability to measure centrality in social networks has been a particularly useful development
in social network analysis.” What is more interesting, however, is the number of centrality measures that social network analysts use to reveal
different things about how key actors interact within a network. [4] For example, a node with a high degree centrality is connected to many
other nodes. In Figure 3 below, it is unsurprising that the American Nuclear Society (ANS) has the highest degree centrality in its own Twitter
network. However, a node with a high betweenness centrality is one that connects the cliques in the network. Figure 4 shows the same ANS
network, reconfigured and revisualized with an emphasis on betweenness, with a new node, Nuclear.com, emerging as the most important. For
example, by analyzing the network in accordance with different centrality measures and establishing filtering criteria (and using Carnegie
Mellon’s ORA software), [5] we were able to reduce a network representing the entire nuclear energy and non-proliferation communities on
Twitter (6000+ nodes and 200,000+ links) to the 19 most influential individuals within that network (See Figure 5). These individuals are the
nodes that would be able to disseminate information to the majority of the network within a matter of hours. Identifying New Agents
Another traditional intelligence activity that could benefit from SNA is identifying potential new
“agents” – people or organizations who might be willing or able to provide information to an
intelligence agency. For example, by using Twitter’s list feature, which allows users to establish lists of people to follow for particular
purposes, and some simple cross-referencing techniques, we were able to identify 50 new, highly reputable individuals and organizations
talking about strategic mining and minerals on Twitter. [6] While such a use by intelligence agencies may seem Orwellian, it is similar to
techniques currently used in business to identify potential customers. Likewise, a similar algorithm likely supports various friend/colleague
recommendation engines such as LinkedIn’s “People You May Know” feature. Simulating Information Flows Of all the capabilities of SNA,
simulations are likely one of the most useful. Carnegie Mellon’s ORA, for example, provides four main kinds of simulations in order to
demonstrate how money, information, disease or technology would move through a network. Pathway simulations locate the most direct or
indirect routes from one node to another. Still other simulations also indicate how a network would react to the removal of any particular node
or set of nodes (for example, how a decentralized terrorist network such as the Taliban would function if the leaders from two key cells were
killed). As an example of this feature, Figure 7, shows the effect of providing a highly relevant piece of information to the 19 individuals
identified in the Twitter network of nuclear specialists discussed above. The dots, representing individuals and organizations on Twitter, get
larger and change color as the information flows throughout the system. Variables within the simulation allow researchers to alter the level of
interest the network likely has to a particular piece of information (the information’s “virality”). Combining SNA with Other Methods These
simulations and other features of SNA provide idealized analyses that can then be combined with other techniques, such as GIS. Networks
within ORA and many other SNA tools can be visualized geospatially if coordinates are provided for each node. Running simulations through
these networks can then be represented on a map much like the simulation of Syrian refugee population movement throughout Turkey shown
in Figure 8. This, in turn, allows for powerful predictive analytics. Figure 9 reflects the outcome of the simulation in Figure 8; not only does the
image represent reality (the known locations of Syrian refugees according to the UN), [7] it also predicts where refugees are likely to move
within the next 12 to 24 months. This analysis employed SNA as the cornerstone analytic technique in conjunction with GIS and even includes
ideas from the more traditional intelligence methodology of Intelligence Preparation of the Battlefield.
India has modeled metadata collection—India depends on metadata
Xynou 13 Maria Xynou Maria is a Policy Associate on the Privacy Project at the CIS, FinFisher in India
and the Myth of Harmless Metadata, http://cis-india.org/internet-governance/blog/fin-fisher-in-indiaand-myth-of-harmless-metadata
Over the last months, it has been reported that the
Central Monitoring System (CMS) is being implemented in India,
through which all telecommunications and Internet communications in the country are being centrally
intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the
omission of privacy legislation and Indian authorities are currently capturing the metadata of
communications.[30] Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret National Security
Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported
that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook,
YouTube, PalTalk, AOL and Apple.[31] While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that
the NSA has collected metadata on a global level.[32] Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.
According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that
describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is
“data about data” or “information about information”.[33] Furthermore, metadata is considered valuable due to its following functions:
•Resource discovery •Organizing electronic resources •Interoperability •Digital Identification •Archiving and preservation Metadata can be
used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to
give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and
reformat information for Web applications.
Interoperability is promoted through metadata, as describing a
resource with metadata allows it to be understood by both humans and machines, which means that
data can automatically be processed more effectively. Digital identification is enabled through
metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and
preservation of large volumes of digital data.[34] Surveillance projects, such as PRISM and India's CMS, collect large
volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the
International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.[35] However, the fact that such
surveillance projects may not have access to content data might potentially create a false sense of security.[36] When Microsoft released its
report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the disclosed data was
metadata, while relatively very little content data was allegedly disclosed
India depends on metadata for intelligence
Lowenthal 14 Mark M. Lowenthal is the senior specialist in U.S. foreign policy at the Congressional
Research Service Intelligence: From Secrets to Policy
India has a growing cyberspace capability, which, like that of many other nations, appears to have been used against potential foes, such as
China and Pakistan, and more friendly states, like the United States. India is in the midst of deploying a Centralised (or Central) Monitoring
System (CMS) that is designed to track all communications within India-telephone, computer, landline, mobile, and so
on. Unlike the NSA program, CMS will not have to ask providers' permission for access but will have that built into the technology of the
telecom and data service providers. (IMS will provide intelligence to foreign and domestic agencies, the police, and tax collectors-a list that
some believe is too broad. Like the NSA program, CMS appears to focus on metadata. CMS is being developed and will
be run by a government technology development center that is not part of the intelligent complex. The Ministry for Home Affairs will have the
power to determine who is monitored.
Sleeper Cell Link
Domestic Surveillance in India is key—connections with internal groups in India is key
to its ability to attack
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
Lashkar-e-Tayyiba has always required some level of support from local Indian citizens to facilitate its
operations in Kashmir and India. According to the Indian government, several Indians aided the 2008 Mumbai attacks including Arshad
Ansari, Sabahuddin Ahmad, and Syed Zabiuddin Syed Zakiuddin Ansari. LeT has also connected with local militant
movements in India to extend its operational capabilities and expand its recruiting network. One of these
groups includes the Students Islamic Movement of India (SIMI). While SIMI was formed in 1977, at some point in the late 1990s a militant
movement emerged out of the group. Some commentators suspect that SIMI has acted as a major conduit for LeT activities. Another
movement also associated with LeT known as the Indian Mujahideen (IM) either emerged out of SIMI or taken over its militant elements in
2007. Many analysts consider the two groups as synonymous.184 Ideologically, IM and SIMI reject Hinduism, secularism, democracy, and
nationalism.185 The 2002 Gujarat riots likely has fueled an expansion of LeT’s network into India. LeT has actively exploited the riots to expand
its network in India. Shortly following the riots, Hafiz Saeed called for the Muslims of India to rise up stating that “the riots have proved that the
Hindus are fully armed but the Muslims are badly ill-equipped to cope with such a situation.” Indeed, even some women may have joined LeT
as a result of the riots.186 Indian investigators believe that a Mumbaibased SIMI operative Rahil Sheikh was tasked with aiding the transit of
SIMI volunteers through the Iran-Pakistan border to train at LeT camps following the communal pogrom in Gujarat. Among the volunteers
included Zakiuddin Ansari, the Indian believed to have been in the control room during the 2008 Mumbai attack.187 This example may be
indicative of how LeT has utilized its existing networks with a local Indian militant group to capitalize on Muslim anger at the communal
violence.
Domestic surveillance in India is key to breaking LeT connections to domestic groups
in India and cutting off funding
Bhatia 14 Raashi Bjatia is the Co-Founder of a non-profit organization Business Alternatives for Peace,
Action and Reconstruction (BAPAR) based in New Delhi and a Graduate Student in Security Studies with
the Center of Security Studies, Georgetown University, India?s National Security Policies and the Threat
of Lashkar-e-Taiba: A Forgotten Concern Small Arms Journal Journal Article | Apr 15 2014,
smallwarsjournal.com/printpdf
Proactive steps should be taken to break Lashkar’s alliance with homegrown jihadi outfits like Indian
Mujahidin (IM) and the Student Islamic Movement of India (SIMI) who are known to provide logistical as well as
surveillance services to Lashkar. Not just domestic jihadi organizations but also their links to organized crime and mafia
leaders who provide a safe channel for money laundering should be cracked down upon. One of the
most effective ways to disrupt Lashkar’s operations is to disrupt their money flow. Further even though India
has joined the Financial Action Task Force in 2009 and has with the help of the United States declared Dawood Ibrahim an international
terrorist, but because Lashkar has such an extensive global network for fund raising as well as money laundering, it is difficult for authorities to
move through slow diplomatic channels to fully implement and stop the money flow, especially with regard to Pakistan who seems to be extra
cautious and slow while providing any kind of cooperation against Lashkar.
Indian domestic surveillance is key to prevent attacks--The LeT is a massive threat to
India through sleeper cells in India activated through internet communications
Bhatia 14 Raashi Bjatia is the Co-Founder of a non-profit organization Business Alternatives for Peace,
Action and Reconstruction (BAPAR) based in New Delhi and a Graduate Student in Security Studies with
the Center of Security Studies, Georgetown University, India?s National Security Policies and the Threat
of Lashkar-e-Taiba: A Forgotten Concern Small Arms Journal Journal Article | Apr 15 2014,
smallwarsjournal.com/printpdf
Lashkar- e- Taiba which translates into the ‘Army of the Pure’ is the most robust and powerful terrorist group
operating out of Pakistan and a prominent threat to India. Lashkar has proved its capability for planning and executing
highly sophisticated attacks like the one in Mumbai in 2008 where the operatives used maritime insertion, GPS navigation and satellite phones
for real time monitoring and as well as for communication with their leaders in Pakistan. Lashkar-e-Taiba has also been the pioneer for
introducing Fedayeen attacks in India, their first recorded attack was in Kashmir in 1993. LeT has
infiltrated and built an
extensive network of sleeper cells and associations with other jihadi groups in the sub-continent,
which if not dealt with can and most probably will result in more Mumbaistyle attacks. If we look at Lashkar’s expenditure
for the Mumbai attacks, the biggest operation Lashkar has planned and successfully executed, they spent around $200,000 which when
compared with LeT’s overall annual budget (probably in the $50 million or more range), it is evident that terrorism remains a low-cost
endeavor.[i] The
group also has a robust above ground infrastructure that may be used as a first point of
contact for would be jihadists.[ii] It has a sophisticated website named after its social wing- Jamaat-ud-Dawa and has an
active presence on social media like Facebook and Twitter. Despite Lashkar being connected to various other attacks in
Mumbai before November 26, 2008 as well as in other incidents across India which also involved a large number of casualties, the Mumbai
attacks in 2008, which claimed 164 lives and injured 308, brought to attention Lashkar’s global jihad ideology. For the first time after 9/11
foreign tourists, the Jewish community and luxury hotels were specifically targeted in Mumbai and the event forced national security
authorities all across the world to rethink their preparedness as well as the possibility of another ‘Mumbai style attack’. Also, since its formation
Lashkar has shared very special relationship with Al-Qaida. It is widely believed that Osama Bin Laden was the one to provide seed funding for
the establishment of Lashkar’s headquarters in Muridke, Pakistan. The affiliation grew stronger with time especially after 9/11 when it became
impossible for Lashkar to ignore global jihad. Dr. Bruce Hoffman, as RAND Director of the Washington office, said in an interview, “LeT is
increasingly transforming itself from a localized group to one that is not only an al-Qaida surrogate but a global jihadist group. This is part of alQaida’s strength: exploiting a group and getting them to buy into the global jihadist imperative.”[iii] Al-Qaeda’s core strategy aims at distracting
and exhausting adversaries, creating divisions between counter-terrorism allies, forging close ties and assisting local affiliates, planning major
international or global attacks and monitoring western security and defense systems.[iv] The only difference in Lashkar’s core strategy is that
the jihad they wage is directed towards India. Furthermore, not only they share a strong alliance but also similarities can be seen in their tactics
and modus operandi. Many experts believe that the Mumbai attacks showed an uncanny resemblance to attacks carried out by Al- Qaida. The
Mumbai gunmen were well-prepared and trained. The terrorists had done their reconnaissance and planning, which would have taken months
to coordinate. They knew the terrain and locations. They had worked out the internal infrastructure and layout of the buildings and moved with
stealth, combing their way through 10 locations and creating devastation along the way;[v] much like how Al-Qaida likes to conduct their
operations.
LeT is growing a network of cells inside India
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
Furthermore, the
involvement of local Indians in both the attack planning as well as the operation itself
suggest that LeT may have an expanding network of support cells in India. Indian authorities charged two
detained Indian nationals—Fahim Arshad Ansari and Sabahuddin Ahmad— with preparing the maps and videotapes that aided the Lashkar
militants to their targets during the Mumbai attack in February 2009. This marked the first official acknowledgement by the Indian government
that Indians had participated in the attacks.16 Furthermore, the intercepted communications between the Mumbai attackers and their
controllers in Pakistan revealed that one of the controllers spoke Hindi. The Hindi-speaking Lashkar control was later identified by Indian
intelligence agencies as Syed Zabiuddin Syed Zakiuddin Ansari from Maharashtra state in India.17 His role in the control room during the attack
raises the question of whether LeT has begun to concede to greater Indian involvement in its operations. The remainder of this paper will seek
to resolve some of the issues raised by Mumbai attack and discern the factors that have fueled LeT’s evolution leading into the attack.
Uniqueness
India is solving LeT terror threats now
IE 5/13 — Indian Express, 2015. (“Government successful in dealing with terror threats: Kiren Rijiju”,
May 5th, 2015, Available Online at: http://indianexpress.com/article/india/india-others/governmentsuccessful-in-dealing-with-terror-threats-kiren-rijiju/)
Government on Wednesday said it has been successful in dealing with threats to coastal security in
the recent past, but did not disclose details on security grounds. Replying to a question on terrorists
sneaking through the sea route, Minister of State for Home Kiren Rijiju said “I can tell this august House
that in the last 11 months, we have been successful in dealing with all the threats we have. “I don’t
want to claim credit for that. It is the duty of the government to secure the country and we are
committed to that.” He refused to divulge details on grounds of security. To a specific question
regarding Mumbai, Rijiju said besides Lashkar-e-Taiba (LeT), “there are many other terrorist groups
which are working on destroying the peace and tranquility of this country. They are a threat to our
national security. “They have Indian affiliates also, which are banned under the relevant laws. All the
steps are being taken and I am very confident that it is paying dividend also. There is no need to really
worry and say that we are not taking enough steps to secure Mumbai.” He also listed out the steps to
beef up security in the coastal areas of the country and added that whole security system has been
“synergised”. To another question, Rijiju’s ministerial colleague Haribhai Parathibhai Chaudhary said the
government receives intelligence inputs relating to attack plans by LeT on targets in the coastal areas
from time to time and shares it with respective state governments. “However, further details in this
matter cannot be disclosed in the interest of national security,” he said in a written reply. He was asked
whether it is a fact that according to an intelligence report, Pakistan-based LeT terrorists might sneak
into Mumbai via the sea route to carry out terror attacks.
We control uniqueness, India is preventing LeT attacks now but continued vigilance is
essential
Bhatia 14 Raashi Bjatia is the Co-Founder of a non-profit organization Business Alternatives for Peace,
Action and Reconstruction (BAPAR) based in New Delhi and a Graduate Student in Security Studies with
the Center of Security Studies, Georgetown University, India?s National Security Policies and the Threat
of Lashkar-e-Taiba: A Forgotten Concern Small Arms Journal Journal Article | Apr 15 2014,
smallwarsjournal.com/printpdf
The most successful of all countermeasures though has been the arrest of key Lashkar-e-Taiba
operatives. In 2013, Indian security officials arrested Abdul Karim Tunda- an expert bomb maker for the
terrorist outfit. In 2012 approximately 61 operatives were killed in encounters with Indian security
forces including Lashkar Division and District Commanders. Around 48 were arrested and 8 sleeper cells
were neutralized. [xxiv] The arrests included key recruiter for Lashkar from India and Nepal Mohammad
Omar Madni and Chief Coordinator for Jammu and Kashmir Manzoor. Looking at the numbers, it
certainly seems like the intelligence community is successful in gathering critical information as well as
preventing further attacks but in my opinion they still have a long way to go. In 2013 itself, there has
been a record of 254 infiltration bids made by terrorists along the India- Pakistan border. In 133 cases,
the terrorists were made to ‘return’ to Pakistan territory, while they successfully crossed over in 84
cases.[xxv] The operatives that crossed over in these 84 cases could well be planning another Mumbai.
India has prevented LeT attacks designed to crush the economy
Press Trust of India 12
Fake currency pushed at behest of Pak intel agencies, Lashkar-e-Taiba: Cops Delhi | Press Trust of India |
Updated: April 15, 2012, http://www.ndtv.com/delhi-news/fake-currency-pushed-at-behest-of-pakintel-agencies-lashkar-e-taiba-cops-476737
The Delhi police has told a court here that a consignment of over Rs. 1.18 crore fake currency notes, seized by it in
January, had been sent from Pakistan at the behest of its intelligence agency and banned terror outfit Lashkar-e-Taiba (LeT)
to destabilise the Indian economy. The police made this claim in its charge sheet, filed in the court of Chief Metropolitan
Magistrate Vinod Yadav and indicting five Indians, arrested along with the fake currency note consignment on January 12. The seizure of the
counterfeit notes with a face value of over Rs. 1.18 crore, concealed in 33 cloth bundles and loaded in two tempos, was made from near a
godown at Dabri in West Delhi. The police has named Zeeshan Khan, a resident of Dabri, Ash Mohammad of Uttar Pradesh, Ghulam Ahmed,
Yakoob Ali and Mohd Rafiq from Jammu and Kashmir as accused. All of them are presently in judicial custody.
Impacts
India/Pakistan War
Future LeT attacks are the most likely trigger for a nuclear war between India and
Pakistan
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
A better understanding of LeT’s evolution carries major implications for U.S. policy since the group poses major challenges to U.S. security
interests. First and foremost, stability in South Asia is a key U.S. security interest and will continue to remain so as long as it remains entrenched
in Afghanistan. LeT
attacks have, on occasion, brought India and Pakistan to the brink of war and the group
remains one of the most likely catalysts to war between the two nuclear-armed countries. At the very
least,
LeT acts as a major source of contention between the two countries and keeps Pakistan’s national security
establishment focused on India. This, in turn, distracts Pakistan from stabilizing its tribal regions on its border with Afghanistan complicating
U.S. and NATO operations in that country. At worst, a
future LeT attack could precipitate in a major war between the
two countries that would carry the frightening risk of becoming the world’s first nuclear war . Second, LeT
has targeted U.S. forces in both Iraq and Afghanistan. While its foray into Iraq was relatively short-lived, since at least 2006, it has begun to
actively support and participate in the insurgency in 2 Afghanistan. The group has been implicated in several attacks against U.S. forces in
Afghanistan and coalition forces consider Lashkar militants among the most effective fighters in the region.1 Though the group has had little
impact on the insurgency thus far, its presence in Afghanistan will likely continue to expand.
Future LeT attack triggers nuclear war
Zarete 11 Juan Zarete, senior adviser at the Center for Strategic and International Studies, An
alarming South Asia powder keg Sunday, February 20, 2011, http://www.washingtonpost.com/wpdyn/content/article/2011/02/18/AR2011021807465.html
In 1914, a terrorist assassinated Archduke Franz Ferdinand in Sarajevo - unleashing geopolitical forces and World War I. Today, while the United
States rightly worries about al-Qaeda targeting the homeland, the most dangerous threat may be another terrorist flash point on the horizon.
Lashkar-i-Taiba holds the match that could spark a conflagration between nuclear-armed historic
rivals India and Pakistan. Lashkar-i-Taiba is a Frankenstein's monster of the Pakistani government's creation 20 years ago. It has
diverse financial networks and well-trained and well-armed cadres that have struck Indian targets from Mumbai to Kabul. It collaborates with
the witches' brew of terrorist groups in Pakistan, including al-Qaeda, and has demonstrated global jihadist ambitions. It
is merely a
matter of time before Lashkar-i-Taiba attacks again. Significant terrorist attacks in India, against Parliament
in 2001 and in Mumbai in 2008, brought India and Pakistan to the brink of war. The countries remain deeply distrustful of
each other. Another major strike against Indian targets in today's tinderbox environment could lead to a broader,
more devastating conflict. The United States should be directing political and diplomatic capital to prevent such a conflagration. The
meeting between Indian and Pakistani officials in Bhutan this month - their first high-level sit-down since last summer - set the stage for
restarting serious talks on the thorny issue of Kashmir. Washington has only so much time. Indian officials are increasingly dissatisfied with
Pakistan's attempts to constrain Lashkar-i-Taiba and remain convinced that Pakistani intelligence supports the group. An Indian intelligence
report concluded last year that Pakistan's Inter-Services Intelligence Directorate was involved in the 2008 Mumbai attacks, and late last year the
Indian government raised security levels in anticipation of strikes. India is unlikely to show restraint in the event of another attack. Lashkar-iTaiba may also feel emboldened since the assassination in early January of a moderate Punjabi governor muted Pakistani moderates and
underscored the weakness of the government in Islamabad. The group does not want peace talks to resume, so it might act to derail progress.
Elements of the group may see conflict with India as in their interest, especially after months of unrest in Kashmir. And the Pakistani
government may not be able to control the monster it created. A war in South Asia would be disastrous not just for the United States. In
addition to the human devastation, it would destroy efforts to bring stability to the region and to disrupt terrorist havens in western Pakistan.
Many of the 140,000 Pakistani troops fighting militants in the west would be redeployed east to battle Indian ground forces. This would
effectively convert tribal areas bordering Afghanistan into a playing field for militants. Worse, the Pakistani government might be induced to
make common cause with Lashkar-i-Taiba, launching a proxy fight against India. Such a war would also fuel even more destructive violent
extremism within Pakistan. In the worst-case scenario, an
attack could lead to a nuclear war between India and
Pakistan . India's superior conventional forces threaten Pakistan, and Islamabad could resort to nuclear weapons were a serious conflict to
erupt. Indeed, The Post reported that Pakistan's nuclear weapons and capabilities are set to surpass those of India.
A future LeT attack will force India to attack Pakistan destabilizing all of Southeast
Asia
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
Second, India will need to vastly improve its anti-terrorism measures as indicated by the effectiveness of the 2008 Mumbai attacks in which its
security forces were clearly ill-prepared. India will need to invest heavily in its internal security including training, human capital, and
equipment. Since stability in South Asia is a key U.S. priority, the U.S. might also assist India in these efforts through the provision of funds and
anti-terrorism equipment and training. Domestic
opinion in India may force India to respond much more harshly
against Pakistan should a future devastating terrorist attack occur potentially destabilizing the whole
of South Asia. Thus, it would be beneficial to both U.S. and Indian interest to limit the impact from a future mass casualty terrorist attack.
LeT terrorism is the unique threat of India Pakistan war risking a nuclear conflict
Blank 13 Jonah Blank1 The RAND Corporation Lashkar-e Taiba and the Threat to the United States of a
Mumbai-Style Attack* Before the Committee on Homeland Security Subcommittee on Counterterrorism
and Intelligence House of Representatives June 12, 2013
http://www.rand.org/content/dam/rand/pubs/testimonies/CT300/CT390/RAND_CT390.pdf
Fourth, LeT has a unique potential to precipitate a major war between India and Pakistan. Due to its
traditional sponsorship by Pakistan's military, an attack by LeT is regarded by India as nearly
synonymous with an attack by the state of Pakistan. At least twice in the recent past- after the 2008
Mumbai attack, and after the 2001 attack on India's Parliament- New Delhi came very close to
launching a military strike across the border in response to an attack attributed to LeT. As the 1999
Indo-Pakistani combat at Kargil demonstrated, any serious military engagement between these two
rivals runs the risk of nuclear escalation: During the Kargil episode, the Pakistani military began
mobilizing the nation's nuclear assets without the knowledge of the civilian prime minister.10 Apart
from the risk to tens of thousands of American citizens in India and Pakistan, the threat of a nuclear
exchange anywhere in the world would obviously have a monumental impact on US strategic and
economic interests.
Future terror attacks on India risk Indo Pak nuclear war
Markey 10 Daniel Markey is adjunct senior fellow for India, Pakistan, and South Asia at the Council on
Foreign Relations, Terrorism and Indo-Pakistani Escalation, www.cfr.org/.../CPA_contingencymemo_6
India faces the real prospect of another major terrorist attack by Pakistan-based terrorist organizations in the near
future. Unlike the aftermath of the November 2008 attack on Mumbai, in which 166 people died, Indian military
restraint cannot be taken for granted if terrorists strike again. An Indian retaliatory strike against
terrorist targets on Pakistani soil would raise Indo-Pakistani tensions and could even set off a spiral of
violent escalation between the nuclear-armed rivals. Given Washington’s effort to intensify pressure on al-Qaeda, the
Taliban, and associated militants operating from Pakistani territory, increased tensions between India and Pakistan would harm U.S. interests
even if New Delhi and Islamabad stop well short of the nuclear threshold because it would distract Pakistan from counterterror and
counterinsurgency operations, jeopardize the U.S. mission in Afghanistan, and place new, extreme stresses on Islamabad.
Future LeT attack will lead to Indo-Pak war
Indian Express 15 3/6/15 Talking terms India and Pakistan have broken their silence. But it will
require focused effort to break the impasse http://indianexpress.com/article/opinion/columns/talkingterms/
The short-term purpose of these talks, it doesn’t take much to see, isn’t to solve intractable problems. Instead, the fact of diplomatic
engagement adds a crisis-management cushion to the arsenals of both governments. For months now, Pakistan
has feared that a
terrorist attack against India could lead Prime Minister Narendra Modi to order military counter-strikes
— catching it at a moment of special vulnerability, when a large part of its armed forces are tied down fighting terrorists in its northwest. Now,
it hopes, Delhi will first address its problems through diplomatic channels, making rapid escalation of conflict less likely. For both countries, this
is a pragmatic step. In the throes of severe economic challenges, India can ill afford a conflict, and near-bankrupt Pakistan can do so even less.
But it would be dangerous to mistake this diplomatic breathing space for bedtime. Islamabad has scaled back jihadist operations in Kashmir,
and placed restraints on organisations
targeting India. It hasn’t, however, dismantled the infrastructure of groups like the
Lashkar-e-Toiba — leaving open the prospect of a future attack sparking off a crisis . The last two years have,
notably, seen the first uptick of violence in Kashmir in over a decade. Delhi, for its part, has not unveiled just what it is willing to bring to the
diplomatic table. The engagement of Kashmiri secessionists in dialogue, the demilitarisation of Siachen, and the settlement of the Sir Creek
issue — the government’s position on all these remains unclear. Barring focused effort, this latest engagement could also end in that
depressing place both know so well — impasse.
Collapse Indian Economy
LeT attacks would target IT sector and crush India’s economy
Saxena 5 Sudhir Saxena Institute for Defense Studies and Analysis, The rise of fiscal terror March 25,
2005 http://www.idsa.in/idsastrategiccomments/Theriseoffiscalterror_SSaxena_250305.html
By targetting the IT industry, terrorists are revealing that the Indian economy may increasingly be
their target, The elimination of the Delhi based Lashkar-e-Tayyiba (LeT) cell on 6 March 2005, could possibly
indicate a new trend in Pakistan-based terror operations in India. Preliminary reports indicate that these terrorists
were intending to strike against the Indian Military Academy (IMA) and the IT infrastructure especially in Bangalore
using the network of the banned Students Islamic Movement of India (SIMI). A couple of issues emerge from the episode. First, is this an
indication of widening of the area of operations by the LeT and similar groups away from Jammu and Kashmir and North India to relatively untouched peninsular India? Secondly, do the plans of the captured terrorist suggest a change in the nature of targets from tactical to strategic,
indicating increasing complexity of conceptual planning and hence institutional involvement? Jammu and Kashmir is undergoing a rather harsh
and prolonged winter snow fall season. Like the tsunami, unpredictable mother nature seems to have purged any possibility of an escalation of
terrorist activity. Further, the Indo-Pak Composite Dialogue Process (CDP) process (agreed to in January 2004) has shrunk the political space for
high-intensity, high-frequency terror operations. It is quite possible that the political and geo-climactic factors may have forced the terrorists to
shift areas of operation southwards and if possible perform a repeat of the 12/13 attack on the Parliament. Though, there have been sporadic
incidents involving J&K terrorist (like LeT) operating in areas like Hyderabad, the phenomenon could not be termed as wide spread, possibly
due to logistical reasons. The
planned future intentions of the LeT cell captured in Delhi may indicate just such a
spread. The choice of targets certainly raises a new warning. It is known that the IT industry has been one of the success
stories contributing to the growing vitality of the Indian economy. The amount of RDX captured (10.5 kgs along with
detonators) provides clues to the nature and explosive power of the planned operation. However, a pertinent question needs to be answered was blowing up few buildings of the Polaris company the only aim of the now failed operation, or was there a larger objective? A
strike
against a leading IT company and its aftermath would have no doubt lead to many tactical counter-operational and intelligence
measures. But it would have also left a certain wariness in the investor market, particularly in the FDI sector, which is very
sensitive about security of its assets give the experience in Iraq, Afghanistan and certain African locations. A planned strike at IMA, Dehradun is
indicative of similar operations by the Zarqawi group in Iraq.
LeT attacks can collapse Indian democracy
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
Since 2002, LeT has also begun to shift its focus increasingly into the Indian hinterland. Several factors may
account for this. To begin with, the Indian government completed a 700- kilometer border fence along the Jammu and Kashmir border in 2004
making infiltration increasingly difficult. The Indian army claimed the fence reduced infiltration of militants by 80%.123 In addition, militants
stopped receiving cover fire and infiltration support from the Pakistani army following the ceasefire between the two countries in 2003. These
factors have made it much more difficult to infiltrate into Kashmir and has made infiltration through transit by third countries more attractive
which also increases access to the other parts of India. In addition, the predominantly Punjabi militants of LeT could likely blend in much easier
in the larger and more cosmopolitan cities of the hinterland where they would not stand out among the more diverse population of these
areas. Furthermore, the effectiveness of Fidayeen attacks in Kashmir may have also had diminishing returns as the Jammu and Kashmir Police
developed more effective tactics to counter them. According to the Indian journalist Praveen Swami who has followed LeT closely for years,
between 1999 and 2002, the worst years of LeT fidayeen attacks, less than 200 people died in them.124 Finally, Kashmiris may simply have
becoming increasingly exhausted from the militancy and bloodshed in the region and may have become to harder to recruit for support. The
2002 Gujarat riots—in which Muslims bore the greater brunt of the bloodshed— generated willing volunteers for LeT and provided new
opportunities to expand its network into India. During the riots, LeT put images of the riot victims on its website and called for jihad to avenge
the bloodshed. Recruiting Muslims from outside Pakistan and Kashmir could also persuade Kashmir residents that they have no future in
India.125 By
stoking the flames of Hindu-Muslim violence, LeT could discredit India as a democracy and
reinforce its belief that Hindus cannot justly govern Muslims. Indeed, Hindu-Muslim violence tears at the very fabric of
Indian society and has the potential to destabilize large swathes of India. In September of 2002, only a few months
after the Gujarat riots ravaged the province, two heavily armed fighters carried out a fidayeen attack on the Akshardham temple in
Gandhinagar, Gujarat. The attack turned into a nearly 14 hour hostage siege and the resulted in 33 dead including a commando and a state
police officer along with 70 others wounded. Given the sophisticated nature of the attack and the heavy firepower the attackers carried, the
attack contained the hallmarks of a typical LeT attack and made it unlikely the attack resulted as retaliation by local Muslims for the earlier
communal violence—at least without external support.126 Indeed, shortly following the Gujarat riots, Indian intelligence officials had
estimated at least as many as 40 local Gujarati Muslims may have travelled to train in Lashkar camps as a result of the communal violence and
LeT may have viewed an attack on the Akshardham temple attack as an opportunity to provoke further communal violence if they indeed did
carry out the attack.127 Given the timing and target of the attack, the objective was clearly to provoke Hindu-Muslim violence.
LeT seeks collapse of India
Karim 12 Maj Gen Afsir Karim War against Lashkar-e-Taiba
http://www.indiandefencereview.com/news/war-against-lashkar-e-taiba/
The LeT follows the radical Wahhabi ideology, which advocates global jihad against all infidels and moderate
Muslims. Although the primary area of operations of the LeT in India is Kashmir, its main aim is the destabilisation of India
and it has not confined its disruptive activities only to Jammu and Kashmir. The LeT has repeatedly claimed through its
journals and websites that its main aim is to destroy the Indian republic and to annihilate Hinduism and Judaism.
Bioweapons
LeT has ability and will use bioweapons
Nanjappa 13
Vicky Nanjappa reporter for Refiff India Abroad, India faces real threat of biological warfare
January 01, 2013 http://www.rediff.com/news/report/india-faces-real-threat-of-biologicalwarfare/20130101.htm
As far as India is concerned, a possible bioterrorism tactic would appeal to Pakistan based Lashkar-eTayiba and other Kashmir centric groups. LeT is aware about the potential utility of bio weapon
pathogen as it had observed the large-scale disruptions during the US anthrax letter cases. Also, it does
not have to recruit or employ microbiologists or life scientists to carry out bioterrorist attacks. ¶ As a
matter of fact it has the most robust medical and path lab network in Pakistan and many of its
activists are trained medical professionals. (eg Ad Dawa medical missions, Taiba Hospitals and Path
Labs in Lahore, Karachi and number of mobile dispensaries). ¶ Potentially the infrastructures and the
manpower at the disposal of LeT/ Jamaat ud Dawa (JuD) can be modified to develop bio weapon
pathogens without any large investments or at least spreading bioscare if the leadership wish to resort
to the tactic.
LeT has ability and motive to use bioweapons
Nanjappa 9 Vicky Nanjappa reporter for Refiff India Abroad Bio weapons could be the next big terror
threat: IB | March 27, 2009, http://www.rediff.com/news/2009/mar/27bio-weapons-could-be-the-nextbig-terror-threat-ib.htm
Rogue outfits such as the Lashkar-e-Tayiba [Images] and the Al Qaeda are constantly planning various
ways to attack India. While there were intelligence intercepts following the Mumbai [Images] attack that
the next attack could be from the sea, reports now point to the fact that the next on the agenda of
terror outfits would be biological warfare.¶ Intelligence Bureau officials say that the Inter-Services
Intelligence has helped these terror outfits set up bases in Afghanistan way back in the late 1990s to
build laboratories to manufacture biological weapons. ¶ The first of such labs was established in 1998 in
Kandahar where chemical and radiological weapons were being manufactured. ¶ There is also a
laboratory set up to manufacture biological weapons in Muzzafarabad in Pakistan Occupied Kashmir.
This lab which belongs to the Lashkar-e-Tayiba is known as the electronics laboratory. Apart from
manufacturing detonators for bombs and weapons, this laboratory has also a full fledged unit to
manufacture biological weapons.¶ Several scientists were recruited exclusively for this purpose and
have been working on the manufacture of these weapons since the past ten years. Intelligence Bureau
sources they expect that terror groups would try and use biological warfare when all other means are
exhausted.
LeT will use bioweapons
Chandran 05 D Suba Chandran Assistant Director, Institute of Peace and Conflict Studies, Looking
Beyond Bio-Weapons and Bio-Terrorism in South Asia http://www.ipcs.org/article/terrorism/lookingbeyond-bio-weapons-and-bio-terrorism-in-south-asia-1750.html
Militant groups fighting for non-political purposes are more likely to use biological weapons in South
Asia, especially the Lashkar-e-Toiba and the Jaish-e-Mohammad. Both these organizations are fighting
for a religious cause and are not bothered about popular support in India. The radical right wing
groups are more likely to use such weapons. The fact that the Aum Shinrikyo, a religious cult group, used
biological weapons in the past need to be reckoned with. Al Qaeda search for chemical and biological
weapons also need to be taken into account from this perspective.
Nuclear weapons
A close study of LeT reveals it has the ability and will to use nuclear weapons and will
use any means to annihilate India
Sharma 12 Surinder Kumar Sharma consultant for Institute for Defense Studies and Analyses LeT:
Terror incorporated The Caliphate's Soldiers: The Lashkar-e-Tayyeba's Long War by Wilson John
http://www.atimes.com/atimes/South_Asia/NB04Df04.html
LeT is likely the world's most powerful and resourceful multinational terror consultancy firm, keeping
a rolodex of multinational terrorists, trainers and a massive support network. ¶ The author documents
LeT's expansion extensively in the book. David Headley, a Pakistani-American who pleaded guilty in the
US for his role in the Mumbai attacks, was working closely with the LeT commanders and facilitators in
India, Pakistan, Bangladesh, Saudi Arabia, US and Muscat. Then, attacks were being planned on three
different countries simultaneously - India, Bangladesh and Denmark - in a clear indication of the LeT's
growing capability to organize transnational attacks independent of al-Qaeda networks. ¶ This book also
details how the LeT has become a hub for training terrorists in using the latest weapons, explosives and
communications devices. The emergence of the Salafi group in the Maldives has considerably helped the
LeT expand its recruitment drive in the country. The author warns that what makes the LeT's growing
influence on the Maldives more worrisome is the possibility that the group will use the island nation
for attacks against India, or block strategic sea communication lines in the Indian Ocean. ¶ The LeT has
also been using Nepal as a transit point for terrorists travelling to and from Bangladesh and Pakistan
while routing money and weapons for attacks in India. Instead of operating its own units in Nepal, as has
done in the past, the ISI has been keen on establishing networks with Maoist and Muslim organizations
for anti-India operations. ¶ A closer study of Hafiz Saeed's speeches and writings and other published
works complied by the author lay out a roadmap of global jihad with surprising clarity: once Kashmir is
liberated, the group plans to work towards disintegrating India in whatever manner possible. ¶
Interestingly, the book also reveals that the LeT is not averse to using nuclear weapons to achieve its
goals. LeT has not only trained cadres in chemical and radiological weapons (dirty bombs), it also has
links with nuclear scientist Dr Abdul Qadeer Khan, who is a frequent visitor to the LeT's annual
congregation in Muridke. ¶
LeT with nuclear weapons could not be deterred
Yingling 11 PAUL L. YINGLING: An Absence of Strategic Thinking – On the Multitude of Lessons Not
Learned in Afghanistan, http://cpost.uchicago.edu/blog/
The future of Pakistan is more difficult to predict. It could limp along as a failing state, or suddenly fail
with little warning. The West knows so little about the internal dynamics of the country that virtually any
significant change will come as a surprise. Although the exact timing and extent of state failure in
Pakistan is difficult to predict, the consequences of such failure are not. Partial or total state failure of a
nuclear Pakistan would pose a grave threat to the United States. In such a scenario, the White House
would not know who controlled Pakistan’s nuclear arsenal. A nuclear-armed al Qaeda, Lashkar-e-Taiba,
or other extremist group would be difficult if not impossible to deter.
AT: No ability for high tech weapons
LeT has ability to access science and technology and pull off complex attacks
Tellis 12
Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the Carnegie
Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menace-that-islashkar-e-taiba/a2hn
Seventh, LeT is an effective terrorist group that is adept at exploiting science and technology, extranational social links, and state vulnerabilities in order to advance its political aims. The attacks in
Mumbai unambiguously demonstrated LeT’s sophistication in a way that few previous attacks had
done. The meticulous planning, the enormous resources committed to a complex mission across great
distances and long periods of time, and the burdens of a difficult sea-land operation all confirmed
LeT’s capacity to execute increasingly difficult terrorist attacks. This mission involved months of
training in Pakistan and extensive reconnaissance of targets in Mumbai; after these tasks were
complete, the terrorists left Karachi on local craft, hijacked a fishing trawler on the high seas, and, upon
reaching India’s territorial waters, transferred to inflatable
General threat evidence
LeT is a global threat that risks terror attacks on India and the United States
Tellis 12 Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the
Carnegie Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menacethat-is-lashkar-e-taiba/a2hn
It is clear that after al-Qaeda, LeT is the most dangerous terrorist group operating in South Asia
because of its:¶ 1.Global vision and international ambitions ¶ ¶ 2.Distinct ideology that underwrites
Islamic revanchism, justifying collaboration with other terrorist groups ¶ ¶ 3.Loyalty to Pakistan and
willingness to protect its patron state against domestic opponents ¶ ¶ 4.Diversified network for
mobilizing resources, promoting its international presence, and recruiting members, which minimizes its
dependence on the state ¶ ¶ 5.Involvement in terrorism and social development concurrently, which
limits Pakistan’s ability to target the group even if it were so inclined ¶ ¶ 6.Cohesive and hierarchic
organizational structure that is effective at both the conduct of violence and the delivery of social
programs ¶ ¶ 7.Proficiency at exploiting science and technology, extra-national social links, and state
vulnerabilities in order to advance its political aims¶ ¶ LeT is a formidable and highly adaptable
adversary with a genuinely global reach and the ability to grow roots and sustain operations in
countries far removed from its primary theater of activity in South Asia. Though India’s proximity to
Pakistan has resulted in New Delhi absorbing most of the blows unleashed by LeT, the carnage in
Mumbai demonstrates that the terrorism facing India is not simply a problem for New Delhi alone. An
attack could even reach U.S. soil.¶ ¶ The only reasonable objective for the United States is the
permanent evisceration of LeT and other vicious South Asian terrorist groups—with Pakistani
cooperation if possible, but without it if necessary.
The LeT is a massive global threat to India and the U.S.
Tellis 12 Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the
Carnegie Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menacethat-is-lashkar-e-taiba/a2hn
Given the interaction of LeT’s ideology and its sources of Pakistani state support, it is not surprising
that Hafiz Mohammed Saeed, LeT’s emir, wholeheartedly endorsed the objective of destroying India
writ large. Asserting in a 1999 interview that “jihad is not about Kashmir only,” he went on to declare
that “about fifteen years ago, people might have found it ridiculous if someone told them about the
disintegration of the USSR. Today, I announce the break-up of India, Insha-Allah. We will not rest until
the whole [of] India is dissolved into Pakistan.” In a later 2001 statement he reaffirmed the proposition
that “our struggle will continue even if Kashmir is liberated. We still have to take revenge for East
Pakistan.” In accordance with his declaration that Kashmir was merely a “gateway to capture India,”
Saeed then directed his LeT cadres to focus their attention on capturing the Muslim-dominated areas
outside of Jammu and Kashmir, such as Hyderabad, Junagadh, Munabao, and West Bengal, which he
argued were forcibly occupied by India in 1947.¶ ¶ Judging from LeT’s operational record, Saeed has
¶
been as good as his word. The earliest LeT presence in India was detected in 1993, when a cohort of the
group’s Punjabi cadres crossed the Line of Control that separates the Pakistan-controlled from the
Indian-controlled portions of Jammu and Kashmir. The organization’s presence, however, was not
publicly recognized until early 1996 when a group of LeT terrorists massacred sixteen Hindus in Barshalla
in Kashmir’s Doda District. Since then, hundreds of terrorist attacks involving LeT militants have
occurred throughout India. LeT was implicated in plots like the terrorist attacks in New Delhi in October
2005; in Bangalore in December 2005; in Varanasi in March 2006; in Nagpur in June 2006; and in the July
2007 train bombings in Mumbai.¶ ¶ Through these myriad efforts, LeT has attempted—consistent with
both its own ideology and the interests of its state supporters—to cripple India’s economic growth,
destroy national confidence in its political system, attack its open society, and provoke destabilizing
communal rivalries. All the while, the group has tried to send a message that India will remain an
adversary because its successes make it a hindrance to LeT’s larger cause.¶ ¶ It took, however, the
devastating November 2008 Mumbai attacks—a bloodbath that claimed the lives of over 150 people,
including 26 foreigners of fifteen nationalities—for the international community to recognize that LeT’s
ambitions, transcending India, were actually part of a larger war with the West and with liberal
democracies more generally. The barbarity in Mumbai thus represents the ugly face of a brand of
Islamist terrorism that threatens India, the United States and its allies, the larger international system,
and, though often missed, Pakistan as well.¶ ¶ ¶ LeT’s universal ambitions simply do not permit the group
to confine itself only to South Asia. As Saeed has unequivocally declared, LeT intends to “plant the flag
of Islam in Washington, Tel Aviv and New Delhi.” Such statements are not simply grandiose. That LeT
has by no means restricted itself to keeping only India in its sights, even if it has focused on the latter
disproportionately thus far—thanks to ISI objectives and support—is now acknowledged even by those
who were initially skeptical of the group’s larger ambitions.¶ ¶ ¶ Like many other radical Islamist groups,
the LeT leadership has on numerous occasions singled out the Jewish community and the United
States as being among the natural enemies of Islam. Saeed warned, for example, that although his
outfit may be presently consumed by the conflict with India, “Our struggle with the Jews is always
there.” This enmity with the Jewish people is supposedly eternal and ordained by God himself. When
Saeed was asked in the aftermath of the tragic 2005 earthquake in Pakistan whether then-president
Pervez Musharraf’s solicitation of aid from Israel was appropriate, he had no hesitation in declaring
forthrightly that Pakistan “should not solicit help from Israel. It is the question of Muslim honor and selfrespect. The Jews can never be our friends. This is stated by Allah.”¶ ¶ This twisted worldview found
grotesque expression during the November 2008 atrocities when the group deliberately targeted the
Jewish Chabad center at Nariman House in Mumbai. Justifying this attack as reprisal for Israeli security
cooperation with India, LeT did not simply murder the Jewish hostages at Nariman House but
humiliated and brutally tortured them before finally killing them during the three-day siege.¶ ¶ Outside
of al-Qaeda, LeT today therefore represents the most important South Asian terrorist group of “global
reach.” Indian intelligence currently estimates that LeT maintains some kind of terrorist presence in 21
countries worldwide with the intention of either supporting or participating in what Saeed has called the
perpetual “jihad against the infidels.” LeT has declared that it would provide free training to any Muslim
desirous of joining the global jihad, and the group has since delivered on that promise, as now
corroborated by the testimony in the cases involving the “Virginia paintball jihad network.” In that
instance, a group of ¶ extremists played paintball in anticipation of the launch of a global jihad against
the West. After offering support to LeT, several members of the group attended an LeT camp and
received combat training to prepare for war against American soldiers in Afghanistan. Rather than being
an isolated incident, the Virginia paintball jihad network is emblematic of LeT’s larger ambitions. LeT’s
operatives have now been identified as engaging in:¶ •liaison and networking with numerous terrorist
groups abroad, particularly in Central and Southeast Asia and the Middle East; ¶ ¶ •the facilitation of
terrorist acts, including in, but not restricted to, Chechnya and Iraq; ¶ ¶ •fundraising in the Middle East,
Europe, Australia, and the United States; ¶ •the procurement of weapons, explosives, and
communications equipment for terrorist operations from both the international arms markets and
Pakistani state organizations such as the ISI; ¶ ¶ •the recruitment of volunteers for suicidal missions in
South Asia as well as the Middle East; ¶ ¶ •the creation of sleeper cells for executing or supporting
future terrorist acts in Europe, Australia, and likely the United States; and ¶ ¶ •actual armed combat
in at least India, Afghanistan, Pakistan, and Iraq.
Al Qaida Impact
India breaking the LeT is key to breaking Al Qaeda as well
Bhatia 14 Raashi Bjatia is the Co-Founder of a non-profit organization Business Alternatives for Peace,
Action and Reconstruction (BAPAR) based in New Delhi and a Graduate Student in Security Studies with
the Center of Security Studies, Georgetown University, India?s National Security Policies and the Threat
of Lashkar-e-Taiba: A Forgotten Concern Small Arms Journal Journal Article | Apr 15 2014,
smallwarsjournal.com/printpdf
India also proactively needs to end the cycle of radicalization and recruitment of youth by building strong confidence building programs and
programs which counter jihadi propaganda. Further, India also needs to invest in technology which helps the security agencies combat
terrorism and secure porous borders. Moreover, Lashkar
has always shared a very special relationship with Al-Qaida
and destroying Lashkar’s strength is not only an important step for India’s national security but also a
step towards limiting Al- Qaida’s brand name and the global jihad phenomenon. Hence, how the Indian
authorities respond to Lashkar plays a very critical role.
AT: Empirically denied-Mubai
In a future attack India will be forced to retaliate—The restraint shown after Mubai
won’t happen again
Yusef 14 Moeed W. Yusuf is director of South Asia programs at the U.S. Institute of Peace. , Pakistan's
Counterterrorism Challenge p, 16-7
Compounding these internal dynamics, Pakistan's delicate and dysfunctional relationship with its traditional rival, India, allows militant groups
to register a significant threat to Pakistan’s regional security. As was the case in the December 2001 attack on the Indian parliament by the
Pakistan-based militant outfit ]aish-E-Mohammed (]eM), and again in the November 2008 Mumbai carnage orchestrated by Lashkar-e-Taiba
(LeT), such episodes cause Pakistan to be the object of tremendous international condemnation.' They also risk escalating
IndiaPakistan tensions. Should a similar, future attack in India occur, some Indian strategists argue that the
government in New Delhi will face too much public pressure to be able to exercise the restraint it
showed following the 2008 Mubai attacks.' Indeed, armed nonstate organizations based in Pakistan are in the unusual, and
perilous, position of being able to undermine peace between two nuclear armed neighbors.
Future attacks will trigger war – Past restraint won’t be repeated
Jan 11 Reza Jan was an Analyst and the Pakistan Team Lead for the Critical Threats Project at the
American Enterprise Institute, Indo-Pak Talks Survive Mumbai Attack July 28, 2011,
http://www.criticalthreats.org/pakistan/jan-india-pakistan-talks-survive-mumbai-attack-july-28-2011
Yesterday, the foreign ministers of Pakistan and India met as part of a series of talks between the two nuclear-armed neighbors five months
after they officially resumed bilateral dialogue. Relations between the two countries appear to be well on the mend following the devastating
2008 Mumbai attacks in which 166 people were killed by the Pakistan-based terrorist organization, Lashkar-e-Taiba (LeT). The two sides
discussed “confidence-building measures, including cross-border trade and visa protocols.” Yet the talks could just as easily have been
scuppered before they began by the recent terrorist attack in Mumbai. On July 13, a series of deadly bomb blasts ripped through India’s
financial capital, killing 23 people and wounding over 130. Unlike in the case of many previous attacks, however, there were no verbal barbs
hurled across the border, no wild speculation from official sources regarding Pakistani involvement and no cancellation or delay of talks. Given
the history of Indian reactions to terrorist attacks on its soil, this “non-reaction” is, by itself, noteworthy. Indian authorities and official
functionaries have exhibited uncharacteristic restraint so far in declaring who they believe to have been behind the recent bomb attacks in
Mumbai. Whereas in the past, authorities have been quick to point the finger at groups based in Pakistan, such as LeT, or Indian organizations
with links to Pakistani terror groups, such as the Indian Mujahideen (IM), top officials in India have stated that they do not want to speculate on
who might be responsible until investigations of the attacks are complete and more is known. Part of this hesitancy may be due to the fact that
they are simply unsure of who is responsible. Monsoon rains on the night of the attack have complicated efforts to gather forensic evidence at
the bomb sites. Then again, even though the pattern of the attack closely resembles that of previous attacks by IM, speculation to the fact
remains muted. This is likely for two reasons. First, in
the aftermath of the 2008 Mumbai attacks, any indicators that
inside Pakistan had some role to play in a future attack would put tremendous
pressure on the Indian government to take some sort of action. Indian Prime Minister Manmohan Singh
and India’s ruling Congress party were able to stave off such pressure in 2008 by a hair’s breadth. They are
highly unlikely to be able to do so a second time, especially if they are seen to be soft on a threat to which they themselves
Pakistan or groups
draw attention. Avoiding the pressure to take risky or uncomfortable action will only benefit the government.
U.S. Attack scenario
The LeT will use sleeper cells to attack the U.S.
Tellis 12 Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the
Carnegie Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menacethat-is-lashkar-e-taiba/a2hn
¶ Given the interaction of LeT’s ideology and its sources of Pakistani state support, it is not surprising
that Hafiz Mohammed Saeed, LeT’s emir, wholeheartedly endorsed the objective of destroying India
writ large. Asserting in a 1999 interview that “jihad is not about Kashmir only,” he went on to declare
that “about fifteen years ago, people might have found it ridiculous if someone told them about the
disintegration of the USSR. Today, I announce the break-up of India, Insha-Allah. We will not rest until
the whole [of] India is dissolved into Pakistan.” In a later 2001 statement he reaffirmed the proposition
that “our struggle will continue even if Kashmir is liberated. We still have to take revenge for East
Pakistan.” In accordance with his declaration that Kashmir was merely a “gateway to capture India,”
Saeed then directed his LeT cadres to focus their attention on capturing the Muslim-dominated areas
outside of Jammu and Kashmir, such as Hyderabad, Junagadh, Munabao, and West Bengal, which he
argued were forcibly occupied by India in 1947.¶ ¶ Judging from LeT’s operational record, Saeed has
been as good as his word. The earliest LeT presence in India was detected in 1993, when a cohort of the
group’s Punjabi cadres crossed the Line of Control that separates the Pakistan-controlled from the
Indian-controlled portions of Jammu and Kashmir. The organization’s presence, however, was not
publicly recognized until early 1996 when a group of LeT terrorists massacred sixteen Hindus in Barshalla
in Kashmir’s Doda District. Since then, hundreds of terrorist attacks involving LeT militants have
occurred throughout India. LeT was implicated in plots like the terrorist attacks in New Delhi in October
2005; in Bangalore in December 2005; in Varanasi in March 2006; in Nagpur in June 2006; and in the July
2007 train bombings in Mumbai.¶ ¶ Through these myriad efforts, LeT has attempted—consistent with
both its own ideology and the interests of its state supporters—to cripple India’s economic growth,
destroy national confidence in its political system, attack its open society, and provoke destabilizing
communal rivalries. All the while, the group has tried to send a message that India will remain an
adversary because its successes make it a hindrance to LeT’s larger cause.¶ ¶ It took, however, the
devastating November 2008 Mumbai attacks—a bloodbath that claimed the lives of over 150 people,
including 26 foreigners of fifteen nationalities—for the international community to recognize that LeT’s
ambitions, transcending India, were actually part of a larger war with the West and with liberal
democracies more generally. The barbarity in Mumbai thus represents the ugly face of a brand of
Islamist terrorism that threatens India, the United States and its allies, the larger international system,
and, though often missed, Pakistan as well.¶ ¶ ¶ LeT’s universal ambitions simply do not permit the group
to confine itself only to South Asia. As Saeed has unequivocally declared, LeT intends to “plant the flag
of Islam in Washington, Tel Aviv and New Delhi.” Such statements are not simply grandiose. That LeT
has by no means restricted itself to keeping only India in its sights, even if it has focused on the latter
disproportionately thus far—thanks to ISI objectives and support—is now acknowledged even by those
who were initially skeptical of the group’s larger ambitions.¶ ¶ ¶ Like many other radical Islamist groups,
the LeT leadership has on numerous occasions singled out the Jewish community and the United
States as being among the natural enemies of Islam. Saeed warned, for example, that although his
outfit may be presently consumed by the conflict with India, “Our struggle with the Jews is always
there.” This enmity with the Jewish people is supposedly eternal and ordained by God himself. When
Saeed was asked in the aftermath of the tragic 2005 earthquake in Pakistan whether then-president
Pervez Musharraf’s solicitation of aid from Israel was appropriate, he had no hesitation in declaring
forthrightly that Pakistan “should not solicit help from Israel. It is the question of Muslim honor and selfrespect. The Jews can never be our friends. This is stated by Allah.”¶ ¶ This twisted worldview found
grotesque expression during the November 2008 atrocities when the group deliberately targeted the
Jewish Chabad center at Nariman House in Mumbai. Justifying this attack as reprisal for Israeli security
cooperation with India, LeT did not simply murder the Jewish hostages at Nariman House but
humiliated and brutally tortured them before finally killing them during the three-day siege.¶ ¶ Outside
of al-Qaeda, LeT today therefore represents the most important South Asian terrorist group of “global
reach.” Indian intelligence currently estimates that LeT maintains some kind of terrorist presence in 21
countries worldwide with the intention of either supporting or participating in what Saeed has called the
perpetual “jihad against the infidels.” LeT has declared that it would provide free training to any Muslim
desirous of joining the global jihad, and the group has since delivered on that promise, as now
corroborated by the testimony in the cases involving the “Virginia paintball jihad network.” In that
instance, a group of ¶ extremists played paintball in anticipation of the launch of a global jihad against
the West. After offering support to LeT, several members of the group attended an LeT camp and
received combat training to prepare for war against American soldiers in Afghanistan. Rather than being
an isolated incident, the Virginia paintball jihad network is emblematic of LeT’s larger ambitions. LeT’s
operatives have now been identified as engaging in:¶ •liaison and networking with numerous terrorist
groups abroad, particularly in Central and Southeast Asia and the Middle East; ¶ ¶ •the facilitation of
terrorist acts, including in, but not restricted to, Chechnya and Iraq; ¶ ¶ •fundraising in the Middle East,
Europe, Australia, and the United States; ¶ •the procurement of weapons, explosives, and
communications equipment for terrorist operations from both the international arms markets and
Pakistani state organizations such as the ISI; ¶ ¶ •the recruitment of volunteers for suicidal missions in
South Asia as well as the Middle East; ¶ ¶ •the creation of sleeper cells for executing or supporting
future terrorist acts in Europe, Australia, and likely the United States; and ¶ ¶ •actual armed combat
in at least India, Afghanistan, Pakistan, and Iraq.
Broad surveillance under patriot has been key to stopping LeT attacks on the U.S.
Carafano et al 12 James Jay Carafano, PhD, is Deputy Director of the Kathryn and Shelby Cullom Davis Institute for International
Studies and Director of the Douglas and Sarah Allison Center for Foreign Policy Studies, a division of the Davis Institute, at The Heritage
Foundation. Steve Bucci, PhD, is a Senior Research Fellow for Defense and Homeland Security in the Allison Center for Foreign Policy at the
Heritage Foundation. Jessica Zuckerman is a Research Associate in the Allison Center for Foreign Policy Studies at The Heritage FoundationFifty
Terror Plots Foiled Since 9/11: The Homegrown Threat and the Long War on Terrorism Fifty Terror Plots Foiled Since 9/11: The Homegrown
Threat and the Long War on Terrorism, http://www.heritage.org/research/reports/2012/04/fifty-terror-plots-foiled-since-9-11-thehomegrown-threat-and-the-long-war-on-terrorism?lfa=Protect-America%2CProtect-America%2CProtect-America%2CProtect-America In 2007,
The Heritage Foundation became the first and only organization to track thwarted terrorist attacks against the United States. That year,
Heritage reported that at least 19 publicly known terrorist attacks against the United States had been foiled since 9/11. Today, that number
stands at 50. The
fact that the United States has not suffered a large-scale attack since 9/11 speaks to the
country’s counterterrorism successes. But, one year after the death of Osama bin Laden, the long war on terrorism is far from
over. Reviewing the terrorist plots that have been foiled since 9/11 can provide valuable information
for understanding the nature of the threat, as well as best practices for preventing the next attack. The
U.S. must also be ready to adapt its security strategies—such as to counter terror attacks by an increasing number of homegrown terrorists.
After the death of Osama bin Laden on May 2, 2011, many worried that al-Qaeda would try to carry out another large-scale attack against the United States as an act of revenge. Indeed since bin Laden’s
death, at least nine publicly known Islamist-inspired terror plots against the United States have been foiled, bringing the total number of foiled plots since 9/11 to at least 50. Ultimately, none of the plots foiled since bin Laden’s
death proved to be of the scale that many feared, with the vast majority of the plots lacking major international connections. Instead, many of these plots could be categorized as homegrown terror plots—planned by American
citizens, legal permanent residents, or visitors radicalized predominately in the United States.[1] Combating this continued threat of homegrown terrorism requires not only continued reliance on existing counterterrorism and
intelligence tools, such as the PATRIOT Act, but also enhancing cooperation among federal, state, and local authorities as well as mutual trust and partnerships with Muslim communities throughout the United States. Likewise, the
Department of Homeland Security (DHS) and Congress must continue to plug gaps to halt terrorist travel, and create a lawful detainment framework for the incapacitation and interrogation of suspected terrorists. Continued
Threat of Homegrown Terrorism Since 9/11, terrorist networks have been dismantled, training camps have been dispersed, and the terrorist leadership largely decimated. Internationally, al-Qaeda has become more decentralized,
leading to a greater dependence on its affiliates and allies. At the same time, since increased domestic security has made it harder for terrorists to plan and carry out attacks, terrorists must increase their baseline skills and
capabilities needed for a successful attack in the United States.[2] With the global operating environment for terrorist networks having become increasingly hostile, homegrown terrorism has become more appealing to al-Qaeda
and other terrorist networks. Homegrown terrorist actors can often bridge the divide between the United States and the other regions of the world in which terrorist networks operate, frequently possessing the cultural and
linguistic skills to easily move between the two. It is this “duality” for instance, that served Najibullah Zazi in his attempt to bomb the New York City subway system, with Zazi “being able to operate with facility in environments as
starkly different as New York and Peshawar.”[3] The value
for terrorist networks also often lies in the ability of
homegrown terrorists to more easily travel back and forth and work within the United States without
raising suspicion. Of course, it is also these same abilities that can make it more challenging for U.S. intelligence
and law enforcement to detect homegrown terrorist plots. Similarly, difficulties in detecting attempted homegrown
attacks are also present in the fact that homegrown terror plots tend to involve significantly fewer actors and connections to terrorist networks
at home and abroad. The frequency of lone wolf actors, radicalized independent of direct connections to terrorist networks either through the Internet or social
circles, can further elevate these challenges. Yet, lacking the support of broader terrorist networks, violent extremists may lack a profound understanding of such specialized skills as bomb making, as well as financing, support
networks, and training, causing them to be reluctant or even unable to carry out a large-scale, highly destructive attack independently.[4] This same lack of training and resources may also open up homegrown terror plots for
detection by U.S. intelligence and law enforcement by affording more room for error on the part of the terrorist. Ultimately, while some signals of homegrown terror plots have gone unnoticed—most notably in the cases of Major
Nidal Hasan’s 2009 deadly attack on Fort Hood, the near-successful attempts in 2009 of Christmas Day bomber Umar Farouk Abdulmutallab, and in 2010 of Times Square bomber Faisal Shahzad—the vast majority of attempted
attacks against the United States have been thwarted in their early stages through the concerted efforts of U.S. law enforcement and intelligence. For the individual homegrown terrorist, personal motives may vary greatly. It could
be a desire for collective revenge against the U.S. for the purported “war on Islam,” poverty or social alienation, or brainwashing. There is no one path to radicalization. As DHS’s Office of Intelligence and Analysis has indicated,
motives and paths to radicalization can vary significantly depending on one’s ideology and religious beliefs, geographic location, or socioeconomic condition.[5] Nevertheless, trends do seem to exist among those attempted
homegrown terror plots thwarted since 9/11, most significantly a seeming aversion to suicide or martyrdom.[6] 50 Plots Foiled Since 9/11 Compiled by The Heritage Foundation since 2007, the following list outlines those publicly
known terrorist plots against the U.S. that have been foiled since 9/11.[7] Based on Heritage’s research, at least 50 publicly known Islamist-inspired terror plots targeting the United States have been foiled since 9/11. Of these, at
least 42 could be considered homegrown terror plots. While three of the 50 known plots were foiled by luck or the quick action of the American public, the remaining 47 were thwarted due to the concerted efforts of intelligence
and law enforcement. 1. Richard Reid—December 2001. A British citizen and self-professed follower of Osama bin Laden who trained in Afghanistan, Richard Reid hid explosives inside his shoes before boarding a flight from Paris to
Miami on which he attempted to light the fuse with a match. Reid was caught in the act and apprehended aboard the plane by passengers and flight attendants. FBI officials took Reid into custody after the plane made an
emergency landing at Boston’s Logan International Airport.[8] In 2003, Reid was found guilty on charges of terrorism, and a U.S. federal court sentenced him to life in prison.[9] He is currently incarcerated at a federal maximumsecurity prison in Colorado. Saajid Badat, a supporter to Reid, has been sentenced to 13 years in jail for planning to blow up a passenger plane. The 26-year-old, a religious teacher from Gloucester, England, was sentenced after he
admitted conspiring with fellow Briton Reid. Badat pled guilty in February 2005 to the plot to blow up the transatlantic flight on its way to the U.S. in 2001.[10] 2. Jose Padilla—May 2002. U.S. officials arrested Jose Padilla in May
2002 at Chicago’s O’Hare airport as he returned to the United States from Pakistan, where he met with 9/11 mastermind Khalid Sheikh Mohammed and received al-Qaeda training and instructions.[11] Upon his arrest, he was
initially charged as an enemy combatant, and for planning to use a dirty bomb (an explosive laced with radioactive material) in an attack in the U.S.[12] Along with Padilla, Adham Amin Hassoun and Kifah Wael Jayyousi were
convicted in August 2007 of terrorism conspiracy and material support. It was found that the men supported cells that sent recruits, money, and supplies to Islamic extremists worldwide, including al-Qaeda members. Hassoun was
the recruiter and Jayyousi served as a financier and propagandist in the cell. Before his conviction, Padilla had brought a case against the federal government claiming that he had been denied the right of habeas corpus (the right of
an individual to petition his unlawful imprisonment). In a five-to-four decision, the U.S. Supreme Court found that the case against him had been filed improperly.[13] In 2005, the government indicted Padilla for conspiring against
the U.S. with Islamic terrorist groups. In August 2007, Padilla was found guilty by a civilian jury after a three-month trial. He was later sentenced by the U.S. District Court for the Southern District of Florida to 17 years and four
months in prison.[14] In September 2011, an appellate court ruling deemed Padilla’s original sentence to be too lenient.[15] Padilla is being held at the same penitentiary as Richard Reid and is awaiting resentencing. 3. Lackawanna
Six—September 2002. When the FBI arrested Sahim Alwan, Yahya Goba, Yasein Taher, Faysal Galab, Shafal Mosed, and Mukhtar al-Bakri in Upstate New York, the press dubbed them the “Lackawanna Six,” the “Buffalo Six,” and the
“Buffalo Cell.” Five of the six had been born and raised in Lackawanna, New York.[16] All six are American citizens of Yemeni descent, and stated that they were going to Pakistan to attend a religious camp, but attended an alQaeda training camp in Afghanistan instead. The six men pled guilty in 2003 to providing support to al-Qaeda. Goba and al-Bakri were sentenced to 10 years in prison, Taher and Mosed to eight years, Alwan to nine and a half years,
and Galab to seven years.[17] Goba’s sentence was later reduced to nine years after he, Alwan, and Taher testified at a Guantanamo Bay military tribunal in the case against Osama bin Laden’s chief propagandist, Ali Hamza alBahlul.[18] Recent reports indicate that Jaber Elbaneh, one of the FBI’s most wanted and often considered to be a seventh member of the Lackawanna cell, has been captured in Yemen. It remains to be seen whether he will be
tried in the U.S., since the U.S. does not have an extradition treaty with Yemen.[19] 4. Uzair and Saifullah Paracha—March 2003. Uzair Paracha, a Pakistani citizen with permanent residency status in the U.S., was arrested in March
2003 and charged with five counts of providing material and financial support to al-Qaeda. Uzair attempted to help another Pakistani, Majid Khan, an al-Qaeda operative, gain access to the United States via immigration fraud. Khan
is said to have been in contact with 9/11 mastermind Khalid Sheik Mohammed and planned to bomb underground storage tanks at Maryland gas stations.[20] Uzair was convicted and sentenced to 30 years in prison. Saifullah
Paracha, Uzair’s father, a 64-year-old citizen of Pakistan and resident alien of the U.S., is currently being held at Guantánamo Bay awaiting trial. Paracha was arrested in Bangkok, Thailand, in July 8, 2003, through the efforts of the
FBI and information provided by his son. He is believed to have had close ties to Khalid Sheik Mohammed, and Mohammed’s nephew Ammar al-Baluchi. Saifullah is said to have used his international business connections to help
al-Qaeda procure chemical and biological explosives and assist in their shipment to the U.S., along with the shipment of ready-made explosives.[21] 5. Iyman Faris—May 2003. Iyman Faris is a naturalized U.S. citizen, originally from
Kashmir, who was living in Columbus, Ohio. He was arrested for conspiring to use blowtorches to collapse the Brooklyn Bridge, a plot devised after meetings with al-Qaeda leadership, including Khalid Sheikh Mohammed.[22] The
New York City Police Department learned of the plot and increased police surveillance around the bridge. Faced with the additional security, Faris and his superiors called off the attack.[23] Faris pled guilty to conspiracy and
providing material support to al-Qaeda and was later sentenced in federal district court to 20 years in prison, the maximum allowed under his plea agreement.[24] 6. Ahmed Omar Abu Ali—June 2003. Ahmed Omar Abu Ali is an
American citizen of Jordanian descent who was arrested in Saudi Arabia on charges that he conspired to kill President George W. Bush, hijack airplanes, and provide support to al-Qaeda. He was arrested while attending Medina
University, where he had joined an al-Qaeda cell. His plans, according to authorities, were to kill President Bush and then establish an al-Qaeda cell in the United States, with himself as the head.[25] He was convicted by an
American
court on November 22, 2005, and sentenced to life in prison on July 27, 2009, overturning a 2006 sentence of 30 years that was ruled to
be too lenient.[26] 7. Virginia Jihad Network—June 2003. Eleven men were arrested in Alexandria, Virginia, for weapons counts
and for violating the Neutrality Acts, which prohibit U.S. citizens and residents from attacking countries with which the United States is at
peace. Four of the 11 men pled guilty. Upon further investigation, the remaining seven were indicted on additional charges of conspiring to
support terrorist organizations. They
were found to have connections with al-Qaeda, the Taliban, and Lashkar-e-
Tayyiba, a terrorist organization that targets the Indian government. The authorities stated that the Virginia men had used paintball games
to train and prepare for battle. The group had also acquired surveillance and night vision equipment and wireless video cameras.[27] Two more
men were later indicted in the plot: Ali al-Timimi, the group’s spiritual leader, and Ali Asad Chandia. Ali al-Timimi was found guilty of soliciting individuals to assault the
United States and was sentenced to life in prison. Ali Asad Chandia received 15 years for supporting Lashkar-e-Tayyiba.[28] Randall Todd Royer, Ibrahim al-Hamdi, Yong Ki Kwon, Khwaja Mahmood Hasan, Muhammed Aatique, and
Donald T. Surratt pled guilty and were sentenced to prison terms ranging from three years and 10 months to 20 years. Masoud Khan, Seifullah Chapman, and Hammad Abdur-Raheem were found guilty and later sentenced to
prison terms ranging from 52 months to life.[29] Both Caliph Basha Ibn Abdur-Raheem and Sabri Benkhala were acquitted at trial.[30] 8. Nuradin M. Abdi—November 2003. Nuradin M. Abdi, a Somali citizen living in Columbus,
Ohio, was arrested and charged in a plot to bomb a local shopping mall. Abdi was an associate of convicted terrorists Christopher Paul and Iyman Faris and admitted to conspiring with the two to provide material support to
terrorists. Following his arrest, Abdi admitted to traveling overseas to seek admittance to terrorist training camps, as well as meeting with a Somali warlord associated with Islamists. Abdi has since pled guilty to conspiracy to
provide material support to terrorists, one of the four counts for which he was indicted. He was subsequently sentenced to 10 years in jail per the terms of a plea agreement.[31] 9. Dhiren Barot—August 2004. Seven members of a
terrorist cell led by Dhiren Barot were arrested for plotting to attack the New York Stock Exchange and other financial institutions in New York, Washington, D.C., and Newark, New Jersey. They were later accused of planning
attacks in England. The plots included a “memorable black day of terror” that would have included detonating a dirty bomb. A July 2004 police raid on Barot’s house in Pakistan yielded a number of incriminating files on a laptop
computer, including instructions for building car bombs.[32] Barot pled guilty and was convicted in the United Kingdom for conspiracy to commit mass murder and sentenced to 40 years.[33] However, in May 2007, his sentence
was reduced to 30 years.[34] His seven co-conspirators were sentenced to terms ranging from 15 to 26 years on related charges of conspiracy to commit murder and conspiracy to cause explosion.[35] 10. James Elshafay and
Shahawar Matin Siraj—August 2004. James Elshafay and Shahawar Matin Siraj, both reportedly self-radicalized, were arrested for plotting to bomb a subway station near Madison Square Garden in New York City before the
Republican National Convention.[36] An undercover detective from the New York City Police Department’s Intelligence Division infiltrated the group, providing information to authorities, and later testified against Elshafay and
Siraj.[37] Siraj was convicted and sentenced to 30 years in prison. Elshafay, a U.S. citizen, pled guilty and received a lighter, five-year sentence for testifying against his co-conspirator.[38] 11. Yassin Aref and Mohammad Hossain—
August 2004. Two leaders of a mosque in Albany, New York, were charged with plotting to purchase a shoulder-fired grenade launcher to assassinate a Pakistani diplomat.[39] An investigation by the FBI, the Bureau of Alcohol,
Tobacco, Firearms and Explosives, and local police contributed to the arrest. With the help of an informant, the FBI set up a sting that lured Mohammad Hossain into a fake terrorist conspiracy. Hossain brought Yassin Aref, a
Kurdish refugee, as a witness. The informant offered details of a fake terrorist plot, claiming that he needed the missiles to murder a Pakistani diplomat in New York City. Both Aref and Hossain agreed to help.[40] Aref and Hossain
were found guilty of money laundering and conspiracy to conceal material support for terrorism and were sentenced to 15 years in prison.[41] 12. Hamid Hayat—June 2005. Hamid Hayat, a Pakistani immigrant, was arrested in
Lodi, California, after allegedly lying to the FBI about his attendance at an Islamic terrorist training camp in Pakistan. Hamid was found guilty of providing himself as “material support” to terrorists and three counts of providing false
statements to the FBI.[42] In interviews with the FBI, he stated (correctly) that he specifically requested to come to the United States after receiving training in order to carry out jihad.[43] He was sentenced to 24 years in
prison.[44] 13. Levar Haley Washington, Gregory Vernon Patterson, Hammad Riaz Samana, and Kevin James—August 2005. The members of the group were arrested in Los Angeles and charged with conspiring to attack National
Guard facilities, synagogues, and other targets in the Los Angeles area. Kevin James allegedly founded Jamiyyat ul-Islam Is-Saheeh (JIS), a radical Islamic prison group, and converted Levar Washington and others to the group’s
mission. The JIS allegedly planned to finance its operations by robbing gas stations. After Washington and Patterson were arrested for robbery, police and federal agents began a terrorist investigation, and a search of Washington’s
apartment revealed a target list.[45] James and Washington pled guilty in December 2007. James was sentenced to 16 years in prison and Washington to 22 years. Patterson received 151 months, while Samana was found unfit to
stand trial and was initially detained in a federal prison mental facility. He was later sentenced to 70 months in jail.[46] 14. Michael C. Reynolds—December 2005. Michael C. Reynolds was arrested by the FBI and charged with
involvement in a plot to blow up a Wyoming natural gas refinery; the Transcontinental Pipeline, a natural-gas pipeline from the Gulf Coast to New York and New Jersey; and a Standard Oil refinery in New Jersey.[47] He was
arrested while trying to pick up a $40,000 payment for planning the attack.[48] Shannen Rossmiller, his purported contact, was a Montana judge and private citizen working with the FBI. Rossmiller posed as a jihadist, tricking
Reynolds into revealing his plan. The FBI later found explosives in a storage locker in Reynolds’s hometown of Wilkes–Barre, Pennsylvania.[49] Reynolds claimed that he was doing much the same as Rossmiller, and was working as a
private citizen to find terrorists.[50] Reynolds was convicted of providing material support to terrorists, soliciting a crime of violence, unlawful distribution of explosives, and unlawful possession of a hand grenade. He was
sentenced to 30 years in prison.[51] 15. Mohammad Zaki Amawi, Marwan Othman El-Hindi, and Zand Wassim Mazloum—February 2006. Amawi, El-Hindi, and Mazloum were arrested in Toledo, Ohio, for conspiring to kill people
outside the United States, including U.S. Armed Forces personnel serving in Iraq.[52] The men also conspired to train and arm for a violent jihad against the United States, both domestically and abroad.[53] Training involved use of
materials including those found on secure and exclusive jihadist websites, downloaded and copied training videos, and materials for jihad training sessions. The men also were found to have provided material support to terrorist
organizations and to have verbally threatened attacks on President George W. Bush.[54] The investigation was begun with the help of an informant who was approached to help train the group.[55] In June 2008, the three men
were convicted of conspiring to commit acts of terrorism against Americans overseas, including U.S. military personnel in Iraq, and other terrorism-related violations. Amawi was sentenced to 20 years, El-Hindi to 13 years, and
Mazloum to approximately eight years.[56] 16. Syed Haris Ahmed and Ehsanul Islam Sadequee—April 2006. Ahmed and Sadequee, from Atlanta, Georgia, were accused of conspiracy, having discussed terrorist targets with alleged
terrorist organizations. They allegedly met with Islamic extremists in the U.S. and gathered video surveillance of potential targets in the Washington, D.C., area, including the U.S. Capitol and the World Bank headquarters, and sent
the videos to a London Islamist group. Ahmed is said also to have traveled to Pakistan with the goal of joining Lashkar-e-Tayyiba.[57] Both men were indicted for providing material support to terrorist organizations and pled not
guilty.[58] In June 2009, a federal district judge found Ahmed “guilty of conspiring to provide material support to terrorists here and overseas.”[59] Ahmed was subsequently sentenced to 13 years in jail. Sadequee was also found
guilty and sentenced to 17 years.[60] 17. Narseal Batiste, Patrick Abraham, Stanley Grant Phanor, Naudimar Herrera, Burson Augustin, Lyglenson Lemorin, and Rotschild Augustine—June 2006. Seven men were arrested in Miami
and Atlanta for plotting to blow up the Sears Tower in Chicago, FBI offices, and other government buildings around the country. The arrests resulted from an investigation involving an FBI informant. Allegedly, Batiste was the
leader of the group and first suggested attacking the Sears Tower in December 2005.[61] All of the suspects pled not guilty. On December 13, 2007, Lemorin was acquitted of all charges, but the jury failed to reach a verdict on the
other six.[62] The second trial ended in a mistrial in April 2008.[63] In the third trial, the jury convicted five of the men on multiple conspiracy charges and acquitted Herrera on all counts. On November 20, 2009, the five were
sentenced to prison terms ranging from six to 13.5 years, with Batiste receiving the longest sentence.[64] 18. Assem Hammoud—July 2006. Conducting online surveillance of chat rooms, the FBI discovered a plot to attack
underground transit links between New York City and New Jersey. Eight suspects, including Assem Hammoud, an al-Qaeda loyalist living in Lebanon, were arrested for plotting to bomb New York City train tunnels. Hammoud, a selfproclaimed operative for al-Qaeda, admitted to the plot.[65] He was held by Lebanese authorities but was not extradited because the U.S. does not have an extradition treaty with Lebanon. In June 2008, Lebanese authorities
released him on bail.[66] In February 2012, Hammoud was convicted in a Lebanese court. He was sentenced to two years in prison, which he had already served.[67] 19. Liquid Explosives Plot—August 2006. British law enforcement
stopped a terrorist plot to blow up 10 U.S.-bound commercial airliners with liquid explosives.[68] Twenty-four suspects were arrested in the London area. The style of the plot raised speculation that al-Qaeda was behind it, but no
concrete evidence has established a link. The United Kingdom initially indicted 15 of the 24 arrested individuals on charges ranging from conspiring to commit murder to planning to commit terrorist acts.[69] Eventually, in April
2008, only eight men were brought to trial. In September, the jury found none of the defendants guilty of conspiring to target aircraft, but three guilty of conspiracy to commit murder.[70] The jury was unable to reach verdicts on
four of the men. One man was found not guilty on all counts.[71] 20. Derrick Shareef—December 2006. Derrick Shareef was arrested on charges of planning to set off hand grenades in a shopping mall outside Chicago. Shareef
reportedly acted alone and was arrested after meeting with an undercover Joint Terrorism Task Force agent. FBI reports indicated that the mall was one of several potential targets, including courthouses, city halls, and government
facilities. Shareef, however, settled on attacking a mall in the days immediately preceding Christmas because he believed it would cause the greatest amount of chaos and damage.[72] Shareef was also found to have connections
to convicted terrorist Hassan Agujihaad, who was charged with attempted use of a weapon of mass destruction and later sentenced to 35 years in prison.[73] 21. Khalid Sheikh Mohammed—March 2007. Khalid Sheikh Mohammed,
captured in Pakistan in 2003, was involved in a number of terrorist plots and is one of the most senior bin Laden operatives ever captured.[74] He is being held at the U.S. military detention facility in Guantanamo Bay. In March
2007, Mohammed admitted to helping plan, organize, and run the 9/11 attacks. He also claimed responsibility for planning the 1993 bombing of the World Trade Center and the 2002 bombings of nightclubs in Bali and a Kenyan
hotel. He has stated that he was involved in the decapitation of Wall Street Journal reporter Daniel Pearl and took responsibility for helping to plan the failed shoe-bomb attack by Richard Reid, along with plots to attack Heathrow
Airport, Canary Wharf, Big Ben, various targets in Israel, the Panama Canal, Los Angeles, Chicago, the Empire State building, and U.S. nuclear power stations. He had also plotted to assassinate Pope John Paul II and former President
Bill Clinton. In December 2008, Mohammed and his four co-defendants (Ramzi Binalshibh, Mustafa Ahmad al-Hawsawi, Ali Abd al-Aziz Ali, and Walid Bin Attash) told the military tribunal judge that they wanted to confess and
pleaded guilty to all charges.[75] The judge has approved the guilty plea of Mohammed and two co-defendants but has required mental competency hearings before allowing the other two conspirators to plead guilty. In
November 2009, U.S. Attorney General Eric Holder announced that Mohammed would be relocated to the United States to face a civilian trial in the U.S. District Court for the Southern District of New York.[76] That decision has
now been reversed and the Administration announced that Khalid Sheikh Mohammed and the other Guantanamo Bay detainees would be prosecuted in military tribunals at Guantanamo.[77] The date for the arraignment of Khalid
Sheikh Mohammed and his co-defendants has been set for May 5, 2012, beginning the long-awaited legal proceedings for the five men.[78] 22. Fort Dix Plot—May 2007. Six men were arrested in a plot to attack Fort Dix, a U.S.
Army post in New Jersey. The plan involved using assault rifles and grenades to attack and kill U.S. soldiers. Five of the alleged conspirators had conducted training missions in the nearby Pocono Mountains. The sixth helped to
obtain weapons. The arrests were made after a 16-month FBI operation that included infiltrating the group. The investigation began after a store clerk alerted authorities after discovering a video file of the group firing weapons
and calling for jihad. The group has no known direct connections to any international terrorist organization.[79] In December 2008, five of the men were found guilty on conspiracy charges but were acquitted of charges of
attempted murder.[80] Four were also convicted on weapons charges. The five men received sentences ranging from 33 years to life plus 30 years. The sixth co-defendant pled guilty to aiding and abetting the others in illegal
possession of weapons and was sentenced to 20 months in jail.[81] 23. JFK Airport Plot—June 2007. Four men plotted to blow up “aviation fuel tanks and pipelines at the John F. Kennedy International Airport” in New York City.
They believed that such an attack would cause “greater destruction than in the Sept. 11 attacks.” Authorities stated that the attack “could have caused significant financial and psychological damage, but not major loss of life.”[82]
Russell Defreitas, the leader of the group, was arrested in Brooklyn. The other three members of the group—Abdul Kadir, Kareem Ibrahim, and Abdel Nur—were detained in Trinidad and extradited in June 2008. Kadir and Nur have
links to Islamic extremists in South America and the Caribbean. Kadir was an imam in Guyana, a former member of the Guyanese Parliament, and mayor of Linden, Guyana. Ibrahim is a Trinidadian citizen and Nur is a Guyanese
citizen.[83] In 2010, Kadir was found guilty on five counts and sentenced to life in prison. In February, both Defreitas and Nur were also found guilty. Defreitas was sentenced to life in prison, while Nur was sentenced to 15
years.[84] The final conspirator, Kareem Ibrahim, was convicted in May 2011 and has been sentenced to life in prison.[85] 24. Hassan Abujihaad—March 2008. Hassan Abujihaad, a former U.S. Navy sailor from Phoenix, Arizona,
was convicted of supporting terrorism and disclosing classified information, including the location of Navy ships and their vulnerabilities, to Babar Ahmad and Syed Talha Ahsan, the alleged administrators of Azzam Publication
websites (the London organization that provided material support and resources to terrorists). Abujihaad was arrested in March 2007 and pled not guilty to charges of supporting terrorism in April 2007. In May 2008, he was
convicted by a jury and sentenced to 10 years in prison.[86] In 2010, his conviction was upheld in a federal court of appeals.[87] Both Babar Ahmad and Syed Talha Ahsan are being held in Britain on anti-terrorism charges and are
fighting extradition to the U.S.[88] 25. Christopher Paul—June 2008. Christopher Paul is a U.S. citizen from Columbus, Ohio. He joined al-Qaeda in the 1990s and was involved in conspiracies to target Americans in the United States
and overseas. In 1999, he became connected to an Islamic terrorist cell in Germany, where he was involved in a plot to target Americans at foreign vacation resorts. He later returned to Ohio and was subsequently arrested for
conspiracy to use a weapon of mass destruction—specifically, explosive devices—“against targets in Europe and the United States.” Paul pled guilty to the charges and was sentenced to 20 years in prison.[89] 26. Bryant Neal
Vinas—November 2008. Bryant Neal Vinas is an American citizen of Hispanic descent who converted to Islam in 2004.[90] In 2007, Vinas left home telling his parents he wanted to study Islam and Arabic. He then traveled to
Pakistan where he was trained by and joined the Taliban. During his time in Pakistan, Vinas assisted with unsuccessful attacks on American forces and provided al-Qaeda with extensive information regarding the Long Island Rail
Road for a potential attack.[91] He was arrested by Pakistani forces and sent back to the United States, where he pleaded guilty and began cooperating with authorities. He is currently in the custody of the U.S. Marshals and is
awaiting sentencing.[92] 27. Synagogue Terror Plot—May 2009. On May 20, 2009, the New York Police Department announced the arrest of James Cromitie, David Williams, Onta Williams, and Laguerre Payen for plotting to blow
up New York-area Jewish centers and shoot down planes at a nearby Air National Guard Base.[93] The four had attempted to gain access to Stinger missiles and were caught in the act of placing bombs in the buildings and in a car.
(The bombs were duds, because undercover agents sold the four defendants fake explosives as part of an ongoing sting operation). All four men were found guilty. In June 2011, James Cromitie, David Williams, and Onta Williams
were sentenced to 25 years in prison.[94] In September 2011, Laguerre Payen received the same sentence.[95] 28. Raleigh Jihad Group—July 2009. A group of seven men in North Carolina were arrested on charges of conspiring to
support terrorist groups abroad, engage in terror attacks abroad and plotting an attack on the U.S. Marine base at Quantico, Virginia.[96] Their ringleader, Daniel Patrick Boyd, is believed to have a long association with radical
groups, dating from his time living in Pakistan. In Pakistan, he is believed to have been an active member of Hezb-e-Islami (Party of Islam). The Raleigh group also raised funds and trained extensively in preparation to wage attacks
both at home and abroad. [97] The men were denied bail and are awaiting trial.[98] 29. Najibullah Zazi—September 2009 . Najibullah Zazi, a 24-year-old Afghan, was arrested after purchasing large quantities of chemicals used to
make a TATP bomb, the same type of weapon used in the 2005 bombing of the London Underground and the 2001 shoe-bomb plot. Zazi had traveled to Pakistan, where he received instruction in bomb making and attended an alQaeda training camp. Zazi allegedly planned to detonate TATP bombs on the New York City subway.[99] It has since been found that the plot was directed by senior al-Qaeda leadership in Pakistan.[100] Najibullah Zazi’s father,
Mohammed Wali Zazi, was also indicted for obstructing justice, witness tampering, and lying to the FBI in attempts to help his son cover up plans for his attack.[101]A cousin of Zazi, Amanullah Zazi, also publicly admitted that he
played a role in Zazi’s 2009 plot. Amanullah pled guilty in secret and agreed to become a government witness in federal court in Brooklyn against Najibullah’s father.[102] The father has since been found guilty and sentenced to
four and a half years in prison.[103] Najibullah Zazi pled guilty, as the result of a plea bargain, and remains in jail. He is currently awaiting sentencing.[104] At least three other individuals have since been arrested on allegations of
conspiring to carry out the attack with Zazi. One of them, New York religious leader Ahmad Afzali, has pled guilty to charges of lying to federal agents about informing Zazi that he was being investigated by authorities. [105] As part
of a plea deal, Afzali was sentenced to time served and ordered to leave the country within 90 days.[106] A second man, Zarein Ahmedzay has also pled guilty to conspiring to use weapons of mass destruction in the foiled plot and
lying to investigators. Adis Medunjanin has pled not guilty to conspiracy to commit murder in a foreign country and to receiving terrorist training.[107] Ahmedzay and Medunjanin are thought to have traveled to Pakistan with Zazi,
and to have met with wanted al-Qaeda operative Adnan El Shukrijumah, who has also been charged in the plot.[108] A fourth individual, Abid Nasser, has also been implicated in the plot led by Zazi, as well as other plots in England
and Norway. He is currently in the United Kingdom facing extradition to the United States.[109] Also charged in the plot are, Tariq Ur Rehman, and a fifth defendant known as “Ahmad,” “Sohaib,” or “Zahid.” Both El Shukrijumah
and Rehman are not in custody.[110] 30. Hosam Maher Husein Smadi —September 2009. Smadi, a 19-year-old Jordanian, was apprehended in an attempt to plant a bomb in a Dallas skyscraper. Originally identified through FBI
monitoring of extremist chat rooms, Smadi was arrested and charged after agents posing as terrorist cell members gave Smadi a fake bomb, which he later attempted to detonate.[111] Smadi was found guilty and sentenced to 24
years in prison.[112] 31. Michael Finton —September 2009. Michael Finton, an American citizen, was arrested on September 23, 2009, by undercover FBI agents after attempting to detonate a car bomb filled with what he believed
to be close to one ton of explosives outside the Paul Findley Federal Building and Courthouse in downtown Springfield, Illinois. The blast was also intended to destroy the nearby office of Representative Aaron Schock (R–IL).[113]
Evidence presented against Finton has shown that he expressed a desire to become a jihadist fighter and was aware that his planned attack would cause civilian injuries. He has been arrested on charges of attempted murder of
federal employees and attempted use of a weapon of mass destruction. Finton pled guilty and was sentenced to 28 years in prison.[114] 32. Tarek Mehanna and Ahmad Abousamra—October 2009. Tarek Mehanna, previously
indicted for lying to the FBI about the location of terrorist suspect Daniel Maldonado, was arrested on October 21, 2009, on allegations of conspiracy to kill two U.S. politicians, American troops in Iraq, and civilians in local shopping
malls, as well as conspiracy to provide material support to a terrorist organization.[115] Mehenna and Ahmad Abousamra, his co-conspirator, were indicted on charges of providing and conspiring to provide material support to
terrorists, conspiracy to kill Americans in a foreign country, and conspiracy to provide false information to law enforcement.[116] The two men are not believed to be associated with any known terrorist organization.[117]
Mehanna has pled not guilty to charges held against him and has since been convicted, while Abousamra remains at large in Syria.[118] 33. The Christmas Day Bomber—2009. Umar Farouk Abdulmutallab, a 23-year-old Nigerian
engineering student living in London, boarded a plane from Nigeria to Amsterdam and then flew from Amsterdam to the U.S. It was on this second flight when he attempted to detonate a bomb hidden in his underwear as the
plane began to land. The device ignited but did not detonate, and passengers quickly stopped Abdulmutallab from trying again, leading to his arrest by U.S. authorities upon landing in Detroit. The bomb, containing the explosives
PETN and TATP, was similar to the failed device used by Richard Reid in his shoe in 2001. Media accounts following the plot indicate that Abdulmutallab admits involvement with al-Qaeda in Yemen and has pleaded not guilty to
charges including conspiracy to commit an act of terrorism and attempting to use a weapon of mass destruction.[119] In February 2012, Adulmutallab was sentenced to life in prison following his conviction.[120] 34. Raja Lahrasib
Khan—March 2010. Chicago taxi driver Raja Lahrasib Khan, a naturalized U.S. citizen from Pakistan, was arrested by the Chicago FBI’s Joint Terrorism Task Force on two counts of providing material support to a foreign terrorist
organization. According to the charges, Khan was affiliated with Ilyas Kashmiri, leader of the al-Qaeda-linked extremist group Harakat ul-Jihad-I-Islami in Kashmir, and has previously been indicted in the U.S. on terrorism
charges.[121] Khan originally transferred $950 to Pakistan, to be delivered to Kashmiri, and later attempted to send around $1,000 provided to him by an undercover agent to Kashmiri by having his son carry the money to England,
where Khan then planned to rendezvous with him and carry the money the rest of the way to Pakistan. His son was stopped by government agents at Chicago’s O’Hare airport before leaving the country. The criminal complaint
filed against Khan also alleges that he had discussed plans to bomb an unnamed sports stadium in the United States. Khan has since pleaded guilty as part of a plea deal recommending a sentence of five to eight years. His
sentencing has been scheduled for May 30, 2012.[122] 35. Faisal Shahzad—May 2010. Faisal Shahzad, a naturalized citizen from Pakistan, attempted to detonate explosives in an SUV parked in Times Square. After explosives
training in Pakistan, he is said to have received $12,000 from entities affiliated with the terrorist organization Tehrik-e-Taliban to fund the attack. Following the failed bombing attempt, Shahzad attempted to flee the country to
Dubai, but was arrested before the flight was able to leave New York’s JFK airport.[123] Shahzad pled guilty to 10 counts, including conspiracy to commit an act of terrorism and to use a weapon of mass destruction.[124] He was
sentenced to life in prison and is being held at the same Colorado maximum-security prison as Richard Reid and Jose Padilla.[125] 36. Paul G. Rockwood, Jr., and Nadia Piroska Maria Rockwood—July 2010. Paul G. Rockwood, Jr., an
American citizen, became an adherent to Anwar al-Awlaki’s ideology of violent jihad after converting to Islam. In studying al-Awlaki’s teachings, Rockwood came to believe it was his religious responsibility to seek revenge against
anyone who defiled Islam. He created a list of 15 individuals to be targeted for assassination, including several members of the U.S. military. Rockwood is said to have researched explosive techniques and discussed the possibility of
killing his targets with a gunshot to the head or through mail bombs. Nadia Piroska Maria Rockwood, Paul’s wife, knowingly transported the list to Anchorage, Alaska, to share with an unnamed individual who apparently shared
Rockwood’s ideology. The list then made it into the hands of the FBI’s Joint Terrorism Task Force in Anchorage. Paul was charged with making false statements to the FBI in a domestic terrorism charge, while Nadia was charged
with making false statements to the FBI in connection to the case against her husband. Paul was sentenced to eight years in prison, while his wife was sentenced to five years probation.[126] 37. Farooque Ahmed—October 2010.
Pakistani-American Farooque Ahmed was arrested following an FBI investigation into plots to attack the Washington, D.C., subway. Ahmed is said to have conducted surveillance on the D.C. Metrorail system on multiple occasions,
and was in contact with undercover FBI agents whom he believed to be individuals affiliated with al-Qaeda.[127] According to an unsealed affidavit, Ahmed wanted to receive terrorist training overseas and become a martyr. The
affidavit also indicates that he sought to specifically target military personnel in his bombing attempt.[128] Ahmed pled guilty to charges of material support and collecting information for a terrorist attack on a transit facility. He
was then immediately sentenced to 23 years in prison.[129] 38. Air Cargo Bomb Plot—October 2010. Two packages shipped from Yemen to Chicago-area synagogues were discovered to contain explosive materials of the same type
used by Richard Reid and Umar Farouk Abdulmutallab in previously thwarted bombing attempts.[130] The packages contained printer cartridges filled with the explosive material and were identified with the help of intelligence
tips from Saudi Arabian authorities while in transit on cargo planes in the United Kingdom and Dubai.[131] While no arrests have been made, the Yemen-based Al-Qaeda in the Arabian Peninsula (AQAP) has claimed responsibility
for the failed attack. 39. Mohamed Osman Mohamud—November 2010. Mohamed Osman Mohamud, a 19-year-old Somali-American, was arrested after attempting to detonate a car bomb at a Christmas tree lighting ceremony in
Portland, Oregon. The bomb was composed of inert explosives given to him by undercover FBI agents. Mohamud had previously sought to travel overseas to obtain training in violent jihad. Having failed in that attempt, he wanted
to commit an attack that would cause mass casualties to individuals and their families.[132] Mohamud has pled not guilty to the charges.[133] 40. Antonio Martinez—December 2010. Antonio Martinez, a 21-year-old American
citizen also known as Muhammad Hussain, planned to bomb a military recruiting center in Maryland. The FBI learned of the plot from an unnamed informant. Martinez was arrested after attempting to detonate a fake explosive
device supplied by FBI agents. He has been charged with attempted murder of federal officers and employees, as well as attempted use of a weapon of mass destruction.[134] He has pled not guilty and awaits further trial.[135] 41.
Khalid Ali-M Aldawsari—February 2011. Khalid Ali-M Aldawsari, a Saudi citizen studying in Lubbock, Texas, was arrested by the FBI after placing an order for the toxic chemical phenol. Both the chemical supplier and the freight
shipping company became suspicious of the order, which could be used to make an improvised explosive device (IED), and alerted the FBI and local police. Surveillance of Aldawsari’s e-mail turned up a list of potential “nice
targets” including dams, nuclear power plants, military targets, a nightclub, and the Dallas residence of former President George W. Bush. The search also recovered plans to acquire a forged U.S. birth certificate and multiple
driver’s licenses. Aldawsari seems to have considered using these documents to obtain rental cars for use in vehicle bombings. He has pled not guilty to charges of attempted use of a weapon of mass destruction and faces up to life
in prison.[136] 42. Ahmed Ferhani and Mohamed Mamdouh—May 2011. Ahmed Ferhani of Algeria, and Moroccan-born Mohamed Mamdouh, a U.S. citizen, were arrested by the New York Police Department after attempting to
purchase a hand grenade, guns, and ammunition to attack an undetermined Manhattan synagogue. The men planned on disguising themselves as Orthodox Jews in order to sneak into the synagogue.[137] Reports have also cited
the Empire State Building as a possible second target.[138] Both men face charges of conspiracy to commit a crime of terrorism and conspiracy to commit a hate crime, as well as criminal possession of a weapon.[139] 43. Yonathan
Melaku—June 2011. On June 17, 2011, Yonathan Melaku, an Ethiopian and a naturalized U.S. citizen and former Marine Corp reservist, was arrested at Fort Myer near Arlington National Cemetery, where he was found with a
backpack filled with ammonium nitrate, spray paint, and spent ammunition rounds. The discovery led authorities to unravel a series of mysterious events from the fall of 2010, when shots had been fired at night from the street at
various military buildings, including the Pentagon, causing over $100,000 in damages. After searching his bag and house, authorities found video of Melaku shooting at the buildings and providing commentary, a series of notebooks
written in Arabic with references to terrorism, and a list of equipment needed to make a timed explosive device. He has since pleaded guilty and was sentenced to 25 years in prison.[140] 44. Abu Khalid Abdul-Latif and Walli
Mujahidh—June 2011. In a raid on a warehouse in Seattle, the FBI arrested Abu Khalid Abdul-Latif and Walli Mujahidh. The two suspects had arranged to purchase weapons from an anonymous informant in contact with the Seattle
Police Department. They were seeking to purchase automatic machine guns and grenades in preparation for an attack on a military recruiting station in Seattle. Since the arrests have been made, authorities have learned that
Abdul-Latif, a felon and Muslim convert, had initially planned to attack the Joint Base Lewis–McChord with his friend, Los Angeles resident Mujahidh. The target was later changed to the Seattle Military Entrance Processing Station
for undisclosed reasons.[141] The men have been charged with conspiracy to murder officers and employees of the United States government, conspiracy to use a weapon of mass destruction, and possession of firearms in
furtherance of crimes of violence. Abdul-Latif has also been charged with two counts of illegal possession of firearms and is awaiting further trial.[142] Mujahidh has pled guilty and faces up to 32 years in prison.[143] 45. Emerson
Winfield Begolly—August 2011. Begolly, a moderator and supporter for the internationally known Islamic extremist Web forum Ansar al-Mujahideen English Forum (AMEF), was arrested on charges of terrorist actions involving
solicitation to commit a crime of violence and distribution of information in relation to explosives, destructive devices, and weapons of mass destruction. Through his profile on AMEF, the Pennsylvania-born man solicited others to
engage in violent acts of terrorism against post offices, water plants, military facilities, bridges, train lines, and Jewish schools. Begolly also used the website to post a downloadable 101-page document that contains information on
how to create, conduct, and manufacture chemical explosives. The instructional document is loosely linked to al-Qaeda’s former top chemical and biological weapons expert Abu Khabbab al Misri. Begolly pled guilty to counts of
soliciting others to engage in acts of terrorism within the U.S., and attempting to use a 9-mm semi-automatic handgun during an assault upon inquiring FBI agents. He is currently awaiting further trial.[144] 46. Rezwan Ferdaus—
September 2011. Ferdaus, a self-radicalized 26-year-old U.S. citizen, was arrested for trying to provide material support to terrorist organizations when he gave a modified cell phone to someone he believed to be an al-Qaeda
operative.[145] He did so believing the man would use the cell phone to detonate improvised explosive devices against American soldiers. The alleged al-Qaeda operative was an undercover FBI agent. Ferdaus also sought to use
small drone aircraft laden with explosives to attack the Pentagon and U.S. Capitol, followed by a ground attack carried out by armed men with automatic rifles. He had already purchased some items, including C4 and AK-47s,
toward this goal from an undercover agent.[146] He is being held awaiting trial.[147] 47. Iranian Terror Plot -October 2011. On October 11, 2011, Manssor Arbabsiar, an Iranian-born U.S. citizen, was arrested for plotting to
assassinate the Saudi Arabian ambassador to the U.S., as well as bomb the Saudi and Israeli embassies in Washington, D.C. He claims he was working for the Iranian Quds Forces, a special unit of the Iranian Revolutionary Guard. On
behalf of the Quds Forces, Arbabsiar is said to have contacted members of a Mexican drug cartel with the goal of hiring them to assassinate the Saudi ambassador. The two parties allegedly agreed on a payment of $1.5 million,
with a down payment of $100,000 that Arbabsiar wired to members of the cartel, supposedly from the Iranian government. The plot was uncovered because the supposed members of the cartel he approached were informants for
the Drug Enforcmeent Agency.[148] He was arrested at JFK airport in New York, has pleaded not guilty, and is currently awaiting trial.[149] Another man, Gholam Shakuri, is an Iranian citizen who is wanted in connection with the
plot; he is believed to be in Iran.[150] This is the first publicly known post-9/11 Islamist-inspired terror plot aimed at the United States specifically linked to state-sponsored terrorism. 48. Jose Pimentel -November 2011. On
November 20, 2011, Jose Pimentel, a naturalized U.S. citizen from the Dominican Republic, was arrested on charges of planning to use pipe bombs to attack targets throughout New York City. His proposed targets included police
stations, post offices, and U.S. soldiers. He was a homegrown radical inspired by Anwar al-Awlaki. Pimentel also managed his own radical website espousing his beliefs in violent jihad.[151] The plot was uncovered by an informant
and Pimentel was arrested by the NYPD. He has pleaded not guilty and awaits trial.[152] 49. Sami Osmakac—January 2012. On January 7, 2012, Sami Osmakac, a naturalized U.S. citizen from the Kosovo region of the former
Republic of Yugoslavia, was arrested on charges of planning attacks against night clubs, businesses, and a sheriff’s office.[153] He came to the attention of the authorities when a source alerted them that Osmakac had asked how
to locate an al-Qaeda flag. He planned to conduct a multi-pronged attack against his proposed targets with vehicle-born explosives. He also wished to take hostages. He was introduced to an undercover FBI agent who he believed
was an arms dealer and procured disabled AK-47s and explosives from him.[154] He was arrested by the FBI’s Tampa office and has since pleaded not guilty.[155] 50. Amine El Khalifi—February 2012. Amine El Khalifi, a Moroccan
citizen illegally in the United States, was arrested on charges of plotting to attack the U.S. Capitol. He was arrested as he left his parked car with guns and a bomb. He did not know that the weapons had already been rendered
inoperable, as they had been provided to him by FBI agents he believed to be al-Qaeda operatives. Before choosing the Capitol building as a target, El Khalifi had proposed targets including D.C. office buildings, restaurants, and
synagogues.[156] He is currently being held in federal custody in Alexandria, Virginia, awaiting trial. 50 Terrorist Plots Foiled Since 9/11Preventing the Next Terrorist Attack The death of Osama bin Laden marked an important
victory in the long war on terrorism. The war, however, is not won. Terrorists, including those radicalized in the United States, continue to seek to harm the U.S. and its people.
As the first anniversary of the
death of bin Laden approaches, Congress and the Administration should be mindful of what is needed to continue to combat the threat of
terrorism at home and abroad. In
order to prevent the next terrorist attack, lawmakers should: · Preserve
existing counterterrorism and intelligence tools, such as the PATRIOT Act. Support for important
investigative tools, such as the PATRIOT Act, is essential to maintaining the security of the United States and
combating terrorist threats. Key provisions in the act, such as the roving surveillance authority and business
records provisions, have proven essential in thwarting numerous terror plots. For instance, the PATRIOT Act’s
information-sharing provisions were essential for investigating and prosecuting homegrown terrorists, such as the Lackawanna Six. This case,
along with others, demonstrates that national
security investigators continue to require the authorities provided
by the PATRIOT Act to track leads and dismantle plots before the public is put in danger. Bearing this fact in
mind, Congress should not let key provisions of the PATRIOT Act expire, and instead, should make them permanent.
LeT attack on the U.S. would trigger U.S. war with Pakistan
Tellis 12
Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the Carnegie
Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menace-that-islashkar-e-taiba/a2hn
This is because the most vicious entities now engaged in attacks on India, like LeT, have objectives that
go way beyond Kashmir itself. They seek to destroy what is perhaps the most successful example of a
thriving democracy in the non-Western world, one that has prospered despite the presence of crushing
poverty, incredible diversity, and a relatively short history of self-rule. India’s existence as a secular and
liberal-democratic state that protects political rights and personal freedoms—despite all its failures and
imperfections—thus remains a threat to groups such as LeT, with their narrow, blighted, and destructive
worldviews. It is also a threat to other praetorian and antidemocratic institutions such as the Pakistan
Army and the ISI. India, accordingly, becomes an attractive target, while its mistakes, inadequacies, and
missteps only exacerbate the opportunities for violence directed at its citizenry.
It would be a gross error, however, to treat the terrorism facing India as simply a problem for New Delhi
alone. When viewed from the perspective of the United States, it is safe to say that LeT has long
undermined U.S. interests in the global war on terror. It threatens U.S. soldiers and civilians in
Afghanistan and has now killed U.S. citizens in Mumbai. Thus far it has not mounted any direct attacks
on the American homeland, but that is not for want of motivation. Given the juicier and far more
vulnerable U.S. targets in South Asia, LeT has simply found it more convenient to attack these (and U.S.
allies) in situ rather than overextend itself in reaching out to the continental United States, especially
when al-Qaeda still remains focused on that task. An LeT attack on the U.S. homeland would also lead
Washington to target the ISI and the Pakistani state directly, problems that the Pakistani military can
do without at a time when groups like LeT and its regional partners are more than amply successful in
advancing the Pakistan Army’s aims by undermining larger U.S. and coalition investments in
Afghanistan.
LeT operatives have been stopped in the U.S.
Adlakha 10 Joshua Adlakha, Graduate Student in Security Studies at Georgetown University, THE
EVOLUTION OF LASHKAR-E-TAYYIBA AND THE ROAD TO MUMBAI,
https://repository.library.georgetown.edu/bitstream/.../adlakhajoshua.pdf.
Several LeT operatives have also been arrested in the United States. These include a network of
jihadists in northern Virginia known as the Virginia Jihad Network. Ali al-Timimi, an American born Islamic scholar popular among a
group of young Muslim men in Virginia, was convicted of advocating war against the U.S. He exhorted his followers to join the Taliban following
the U.S. invasion of Afghanistan. While none of them ever did join the Taliban, four of them ended up receiving training from LeT.195 Ali Asad
Chandia, a resident of College Park, Maryland and third grade teacher, was convicted of aiding a British member of LeT, Mohammed Ajmal
Khan, with acquiring military equipment for LeT.196 Nine other members of the network were convicted in 2003 and 2004 variously for
providing material support to LeT, assisting others in gaining entry into LeT training camps, and for obtaining training to wage war against the
United States.197 The most notable American operative of LeT is David Headley. As previously noted, the American-born Headley had legally
changed his name from Daoud Gilani to make travel easier and moved effortlessly between the U.S., Pakistan, and India for nearly seven
years.198 According to Headley’s plea agreement, he made at least five trips to Mumbai between 2006 and 2008 to scout locations for attacks
and scouted targets in Pune and Goa in India. While in Mumbai, he made videos of the targets, collected coordinates with a GPS device, and
scouted the landing site for the attackers. Between 2002 and 2005, Headley had trained at Lashkar camps on at leave five occasions. During this
training he learned the use of explosives, small arms and countersurveillance techniques.199
U.S. has been preventing domestic LeT attacks on U.S. homeland
Jones 11 Seth G. Jones is director of the International Security and Defense Policy Center at the RAND
Corporation, The Future of Al Qa’ida CT-362 May 2011,
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=0CCUQFjABOApqFQoTC
KrvpZ-H-MYCFcc4iAod78KHw&url=http%3A%2F%2Farchives.republicans.foreignaffairs.house.gov%2F112%2Fjon052411.pdf&ei
=E20VeqZN8fxoATv36v4AQ&usg=AFQjCNH28hzNYeUrTDQ2grEJvGW46_6aRQ&sig2=OwaEnNRKOptgEs7Kiw
Qs3Q
In September 2009, for example, Najibullah Zazi was arrested for planning attacks on the New York City subway.
Zazi pleaded guilty in U.S. District Court to “conspiracy to use weapons of mass destruction” and “providing material support for a foreign
terrorist organization” based in Pakistan.11 Several al Qa’ida operatives, including Saleh al-Somali and Adnan el Shukrijumah, were involved in
the plot. According to U.S. government documents, Zazi’s travels to Pakistan and his contacts with individuals there were pivotal in helping him
build an improvised explosive device using triacetone triperoxide (TATP), the same explosive used effectively in the 2005 London subway
bombings. In October 2009, Chicago-based David Coleman Headley (aka Daood Sayed Gilani) was arrested for involvement in terrorist activity.
He is a Pakistani-American who had cooperated with Lashkar-e Tayyiba and senior al Qa’ida leaders to conduct a
series of attacks, including the November 2008 Mumbai attack and a plot to attack a newspaper in Copenhagen that had published a cartoon of
the Prophet Muhammad. His
base in Chicago made him ideally suited for a future attack in the U.S.
homeland.
LeT is a global threat that risks terror attacks on India and the United States
Tellis 12 Ashley J. Tellis¶ Senior Associate¶ South Asia Program¶ Tellis is a senior associate at the
Carnegie Endowment for International Peace, http://carnegieendowment.org/2012/03/13/menacethat-is-lashkar-e-taiba/a2hn
It is clear that after al-Qaeda, LeT is the most dangerous terrorist group operating in South Asia
because of its:¶ 1.Global vision and international ambitions ¶ ¶ 2.Distinct ideology that underwrites
Islamic revanchism, justifying collaboration with other terrorist groups ¶ ¶ 3.Loyalty to Pakistan and
willingness to protect its patron state against domestic opponents ¶ ¶ 4.Diversified network for
mobilizing resources, promoting its international presence, and recruiting members, which minimizes its
dependence on the state ¶ ¶ 5.Involvement in terrorism and social development concurrently, which
limits Pakistan’s ability to target the group even if it were so inclined ¶ ¶ 6.Cohesive and hierarchic
organizational structure that is effective at both the conduct of violence and the delivery of social
programs ¶ ¶ 7.Proficiency at exploiting science and technology, extra-national social links, and state
vulnerabilities in order to advance its political aims¶ ¶ LeT is a formidable and highly adaptable
adversary with a genuinely global reach and the ability to grow roots and sustain operations in
countries far removed from its primary theater of activity in South Asia. Though India’s proximity to
Pakistan has resulted in New Delhi absorbing most of the blows unleashed by LeT, the carnage in
Mumbai demonstrates that the terrorism facing India is not simply a problem for New Delhi alone. An
attack could even reach U.S. soil.¶ ¶ The only reasonable objective for the United States is the
permanent evisceration of LeT and other vicious South Asian terrorist groups—with Pakistani
cooperation if possible, but without it if necessary.
AT: HUMINT Turn
Human intel can’t work for India—They have massive shortages of human spy
personnel and don’ have the ability to train enough human spys
Indian Express 14
India’s spy agencies more toothless than ever, http://indianexpress.com/article/india/indiaothers/indias-spy-agencies-more-toothless-than-ever/
Indians waited that, and longer-and while they did, the foundations on which India’s
intelligence services have been rotting. The
Intelligence Bureau, highly-placed government sources said, is over 30% short of staff-particularly critical mid-level executive
positions. For its part, the Research and Analysis Wing (R&AW), tasked with securing Indian interests across the world, has
desperate shortages of specialists in languages and the sciences-deficits that are running as high as 40% in
critical departments. Later this year, Prime Minister Narendra Modi is expected to make his first appointment to lead the Intelligence
Bureau. He is expected to choose from among Ashok Prasad, who helped build the organisation’s counter-terrorism data-hub, the Multi-Agency
Centre, D P Sinha, a veteran of anti-terror operations, and Dineshwar Sharma, a quiet but highly respected analyst, who won his spurs when he
volunteered to serve in Jammu and Kashmir in the early 1990s. The Prime Minister will also have to find a leader to rebuild R&AW-devastated
by internal feuds, staff shortages and technology deficits. He is expected to choose between Rajinder Khanna, the leader of R&AW’s counterterrorism efforts in recent years, and Arvind Saxena, a veteran with long experience of Pakistan, the United States and organisational
management. Too few spies Figures released to Parliament by the United Progressive Alliance government show that even as Chidambaram’s
efforts to create new institutions became the focus of official efforts, staffing
deficits became endemic across the
intelligence services. In March 2013, then Minister of State for Home R P N Singh told Parliament that the IB had 18,795 personnel on
its rolls, against a sanctioned strength of 26,867 – in other words, a shortfall of over 30 per cent, and that based on manpower
requirements drawn up in the 1970s. The effects are evident across the states: dedicated counterterrorism groups set up by National Security Advisor Ajit Doval, while he was Intelligence Bureau chief, have been sucked into routine
duties. The Intelligence Bureau’s operations hub in New Delhi has just 30-odd executive staff. Intelligence Bureau chief Asif Ibrahim has cut the
shortfall to some 7,000 people-taking in as many as the service’s overstretched training facility can handle. It’s proved just too little though and
not because of lack of trying. In 2009, Chidambaram authorised the hiring of 6,000 personnel. However, the
IB’s existing training
facilities can process just 600 to 700 staff in a year, which barely -covers attrition from retirements
and resignations. “There’s another problem, too”, notes a senior Intelligence Bureau officer. “Let’s say we, by some miracle, find the
6,000-odd people we need in one go. They’ll need to be promoted from time to time-and there just won’t be positions for them. The
government needs to do a thoroughgoing review of staffing, and the last one just wasn’t interested”. R&AW, estimated to have some 5,000
personnel, faces a similar shortage. The organisation is short of some 130 management-level staff, the sources said, particularly cutting-edge
under-secretaries and deputy secretaries. R&AW is also short of personnel with specialist language and area knowledge, particularly Arabic,
Chinese and minor Pakistani languages. –
They no longer have a pool to recruit sufficient human intelligence—Indian states
won’t let their best police get recruited intelligence
Indian Express 14
India’s spy agencies more toothless than ever, http://indianexpress.com/article/india/indiaothers/indias-spy-agencies-more-toothless-than-ever/
Long years of neglect, intelligence officials said, had contributed to the staffing crisis at the R&AW and the IB.
“The intelligence services,” a senior officer said, “had always relied on young Indian Police Service officers,
recruited early in their careers, to serve in middle and senior-management roles. The overall shortfall in the IPS’s
strength, though, has meant states are loath to allow their best officers to serve in - New Delhi on
deputation.” The R&AW’s internal cadre, the Research and Analysis Service, for its part, froze recruitment from the 2004-2005 batch to the
2009-2010 batch, and in other years, cut hiring to a trickle. Last year, bulk recruitment to fill the deficits was agreed on, but a debate about
whether needs would be best met through Union Public Service Commission-run examinations or campus recruitment rages on. –
Answers to LeT
Even if India gets intelligence data it won’t be effectively used to stop terrorism
because of inaction and corruption
Bhatia 14 Raashi Bjatia is the Co-Founder of a non-profit organization Business Alternatives for Peace,
Action and Reconstruction (BAPAR) based in New Delhi and a Graduate Student in Security Studies with
the Center of Security Studies, Georgetown University, India?s National Security Policies and the Threat
of Lashkar-e-Taiba: A Forgotten Concern Small Arms Journal Journal Article | Apr 15 2014,
smallwarsjournal.com/printpdf
Actionable intelligence is the first thing that comes to mind when one thinks about disrupting a terrorist plot. Although its primary function is
strategic intelligence, the Indian Intelligence Bureau has an excellent record in providing tactical support to state police forces- within
reasonable limits. Between 1998 and 2003, it reportedly neutralized 250 ISI- backed jihadist cells across India, excluding Jammu and Kashmir
and the North Eastern states. This neutralization rate of approximately one terrorist cell per week has been maintained even after the current
spate of jihadist violence erupted in 2005. Where problems have arisen is not so much in the IB’s response to pan-Islamist terrorism, but in that
of the political leadership. Put simply, there
has been no policy response to ample warnings from the intelligence
community since 2002 that Pakistan planned to target the Indian heartland.[xxxvi] Before the Mumbai attacks there
were reports of at least 20 intelligence reports provided to the Mumbai Police Department specially warning them
about Fedayeen attacks or sea borne infiltrations. The Intelligence Bureau of India had also received two specific warnings about the
Taj hotel. One concerned a possible attack on 24 May and the other on 11 August, both prompted by tip offs from a source in Pakistan said to
be inside Lashkar. [xxxvii] The hotel was made aware of the tip offs but nothing was really done to beef up security or improve the current
measures in place, like CCTV cameras and security guards on the front gate. Prem Mahadevan writes in his book ‘The Politics of
Counterterrorism in India’, “Such inaction (failure
to act on intelligence) stems from four factors, two of which are political
lack of political consistency and consensus, and a lack of operational
capacity and coordination. Between them, these constraints ensure that decision- makers in the Indian
political and security establishments fail to act on initial warnings provided by intelligence
agencies.”[xxxviii] Additionally, the security agencies as well as the people in the position of responsibility have an attitude problem. Till the
time everything is right and nothing goes wrong the attitude is simply ‘Chalta hai’ – Everything works. Any amount of intelligence is
of no use till the time it is taken seriously and acted upon. Despite such specific intelligence inputs, as mentioned before,
and two operational. The factors are: a
Mumbai’s Joint Police Commissioner Rakesh Maria said in an interview that it was a ‘failure of imagination’ on the part of the police
department. This clearly shows the lack of seriousness attributed to the importance of intelligence in counterterrorism. To overcome this,
personnel in state police departments need to go through rigorous training for intelligence gathering as well as to deal with the gathered
intelligence inputs. A committee set up to find the loopholes in the response to the Mumbai attacks, The Pradhan Committee, found out that
“well set out procedures for handling intelligence and ‘crisis management’ were overlooked and the Commissioner of Police Mumbai Hasan
Gafoor did not exhibit adequate initiative in handling the multi-pronged attack and remained at one spot near Trident Hotel throughout the
operations.[xxxix] There is an urgent need for proper Standard Operating Procedures in place and not just on paper but for them to be enforced
through drills and simulation games. There is also a need a for a centralized command and control, so that in an event of an attack, forces on
the ground know who they are taking orders from and remain coordinated in their efforts. Most importantly, it is necessary to be practical
about countermeasures being put in place, most
of the steps taken by Indian authorities remain non-operational
and useless. In the end everything boils down to resource allocation and in India where every official must have his ‘cut’
at every step of the process, it becomes increasingly difficult to implement any policies. It is
imperative that a strong anti-corruption system comes in place, especially where authorities are working for
national or state security for a speedy and proper implementation of counter terrorism policies.
Analysis tools for meta data empirically fail
Wheaton & Richey 14 Kristan J. Wheaton is an Associate Professor at Mercyhurst University and
Melonie K. Richey is a graduate student at Mercyhurst University who is currently participating in
IARPA’s Sirius Project. Metadata Analysis as an Intelligence Tool, e-International Relations January 9,
2014 , http://strategicstudyindia.blogspot.com/2014/06/metadata-analysis-as-intelligence-tool.html
Caveat Emptor Like
all analytic techniques, SNA is imperfect and comes with a number of caveats for researchers new to the
of the authors sought
to use SNA to locate terrorists using social media. SNA and social media seemed like a good place to start, even though it
seemed unlikely that many such individuals would self identify as a “radical extremist” or “Al-Qaeda affiliate.” Ultimately though, the effort
failed because there was just too much of what social network analysts like to call “white noise,” or extraneous
method. SNA, while widely applicable, is by no means universally applicable. For example, in early 2013, one
information picked up through a comprehensive scraping of the Internet. Our search for radical extremists returned journalists, university
students of international relations and politics, and a slew of ordinary people just keeping up with current events and Tweeting about it.
Another issue with SNA has to do with the nature of relationships. In the real world, they are often messy and convoluted. Just because two
people work together and do so often, does not necessarily mean that they like each other. Similarly, the best way to describe the relationship
between two businesses might not be the number of contracts the two have signed together. SNA works best, however, with clearly definable
relationships and where one factor in the relationship correlates well with other factors important in a relationship. Modern intelligence
problems, which often contain, political, economic, military, tribal, geographic, personal, and historical relationship data require the application
of advanced SNA techniques and, even then, may yield little of real use to decisionmakers. Finally, SNA is fundamentally a mathematical tool
but is most useful in the decisionmaking process when the networks are visualized. It is, without doubt, the visualization of these networks that
tends to capture the most attention from the policymakers that intelligence units typically support. This is both a blessing and a curse. While it
is easy to capture attention, explaining why the charts and graphs look the way they do is an art. All too often, the initial excited reaction to
these diagrams turns to boredom and confusion as analysts bog the decisionmakers down with the arcana of SNA. In addition, creating these
complex visualizations often stresses even the most powerful personal computers (the images of the simulation in Figure 8 above took
approximately 2 hours to produce using a powerful desktop PC with two high end graphics cards). Like every analytic technique, SNA has great
utility for the right question. Within its limits, SNA is unmatched and can be usefully applied to identify key individuals or organizations within a
network, generate new leads and simulate the flows of information or money throughout a network. SNA, however, remains just ana nswer,
not the answer. Used inappropriately or without a full understanding of the limits of the method and analysts will only be finding new and more
technically sophisticated ways to fail. That, then, is the primary job of the modern day analyst: making the judgment call of which techniques to
use and when. Equally as important as knowing when to use SNA is knowing when not to use it.
Surveillance fails — even if countries have the data, it doesn’t translate into
preemptive polities
NYT 14 — New York Times, 2014. (“In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted
Puzzle”, James Glanz, December 21st, 2014, Available Online at:
http://www.nytimes.com/2014/12/22/world/asia/in-2008-mumbai-attacks-piles-of-spy-data-but-anuncompleted-puzzle.html Accessed 7-22-15)
In the fall of 2008, a
30-year-old computer expert named Zarrar Shah roamed from outposts in the northern
mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial
gem. Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow
conspirators used Google Earth to show militants the routes to their targets in the city. He set up an
Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an
assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury
hotels, all sites of the eventual carnage. But he did not know that by September, the British were
spying on many of his online activities, tracking his Internet searches and messages , according to former
American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They
were not the only spies watching. Mr.
Shah drew similar scrutiny from an Indian intelligence agency, according
to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American
officials say, but had picked up signs of a plot through other electronic and human sources, and warned
Indian security officials
several times in the months before the attack.
Indian domestic surveillance not key — US international solves
ET 14 — The Economic Times, 2014. (“US alerts India of possible terror attack by Lashkar-e-Taiba,
capital on high-alert”, Aman Sharma, Decemeber 12th, 2014, Available Online at:
http://articles.economictimes.indiatimes.com/2014-12-12/news/56990498_1_delhi-police-terror-strikerepublic-day-function)
It was the
United States which alerted India of an impending major terror strike in Delhi by Pakistanbased Lashkar-e-Taiba, triggering a comprehensive security review of the national capital by the Delhi
Police and Intelligence Bureau. "The alert came directly from US intelligence agencies...it was not a
pin-pointed information and did not specify any place or time of attack but the input said there was
clear intelligence with the US of a big terror strike somewhere in Delhi by LeT," a senior Home Ministry official
told ET. The government has decided to take no chances as the said tip-off from the US came shortly
after the visit of US President Barack Obama to India was confirmed for being the chief guest at the Republic Day. Sources
in the home ministry said that besides taking extra steps to secure Delhi, IB has also begun a "coordination
exercise" with neighbouring states like UP and Rajasthan, sensitising them of the terror threat and asking them to be on alert for any terror
module in their jurisdictions which may target Delhi. "Many meetings have been held between state authorities and IB since. Delhi Police
Commissioner BS Bassi has also met National Security Advisor Ajit Doval to brief him of the security measures taken for Delhi.
Download