Red Cell Analysis: Hezbollah: a Threat to the United States and its interests.
Red Cell analysis: Hezbollah
In recent years, the threat alert within the United States increased drastically attributed to the increase in the number of terrorist organizations within its borders. However, most terrorist organizations not only target the United States but also co-ordinate other attacks that target other American interests in other countries. One of the biggest organizations that are a threat to the United States and its interest in other countries is the Hezbollah movement, also known as the “Party of God,” which advocates for the rights of Muslims in most parts of the world through terrorism activities. The movement comprises of Shi’a Islamists who advocate for violence as part of spreading their message of fighting “western imperialism” in Muslim controlled states around the world. According to a report released by the Federal Bureau of Investigation (FBI), the Hezbollah movement plans their attacks from South America targeting Americans within the United States and other parts of the world. In 1983, the movement attacked a U.S. marine camp and killed over 250 Americans while also targeting the American embassies in the Arab region (Broxmeyer 2004). In addition, the movement also kidnaps American citizens and demands for ransom before securing their release. The movement employs surveillance methods before attacks whereby members of the movement observe the routine of different planned locations, which creates a clear picture of the most favorable location for an attack.
The Hezbollah movement began in 1982 in Lebanon, attributed to the Iranian Revolution. It blamed the United States for most of the problems facing other countries around the world. It is necessary to note that since the inception of the movement, the leadership positions require religious clerics within Islam, who guide the members of the movement in terms of goals and objectives. The movement also supports the local population in the Arab region through annual donations gained through the attacks carried out around the world. Although the main cell for the movement is in Lebanon, the movement plans and executes its operations and attacks from the United States. The U.S. Department of State included this movement in the foreign terrorist organization (FTO) list in October 1997 as part of controlling their activities in the United States (Slogum 2013). The main ideology associated with this movement is enhancing Islam as a confident religion that promotes the achievement of justice and human rights for every citizen. However, Hezbollah uses violence and terrorist activities in passing on their messages regarding their ideology, which portrays it as one of the most dangerous organizations around the world.
Based on the organization’s ideology, the main objective of Hezbollah is to establish a Muslim controlled territory especially in the Arab region. According to the movement’s spokesperson, the group results in committing acts associated with terrorism due to failure in other means of communication between the countries in the Arab region and other western countries. This shows the organization’s commitment towards the terrorist activities, which include suicide bombing around the United States and other western countries. The FBI also associated Hezbollah with the 11th September 2001 attack carried out within the United States. This promoted initiatives from the U.S. government aimed at stopping terrorism in the country and in the Middle East region, which is the main hub of the terrorism cells (Broxmeyer 2004). Secondly, Hezbollah’s goals and objective within the United States is the moderation of national liberation for Muslim living within America. The group argues that the U.S. government discriminates against the Muslims in the country denying them the right to religion as stated within the constitution. This prompts the movement to advocate for liberation of the Muslim population through terrorism activities, which portray clear messages regarding Islam.
One of the strengths attributed to Hezbollah is the leadership whereby the leaders of different cells around the world meet in South America for the election of their leaders. The main leader of the movement is Sheikh Muhammed Hussein Fadlallah who also acts as the spiritual father for the movement, as well as, the chief Mujtahid by ensuring a clear understanding of the Islamic law by every member of the movement. Based on the goals and objectives of Hezbollah within the Arab region, Sheikh Muhammed ensures support from other organizations and movement, which is a key strength for the movement. This leader controls the organization’s main cell in Lebanon but also helps in the co-ordination of other cells in other countries around the world especially in the United States. Sheikh Muhammed also helps in punishing offenders within the movement, which is a factor that enhances discipline among members of the movement towards the goals and objectives (Koçak 2012). The other main leader of the movement is Hassan Nasrallah, who is the secretary general for the movement. After the assassination of Abbas Musawi by the U.S. government, the leaders of different cells unanimously elected Hassan Nasrallah as the new secretary general.
Based on the leadership structure projected, it is clear that the movement operates in secretive environment with the main decision making organ being the spiritual leader and the secretary general. In addition, it is also clear that the movement draws towards its goals and objectives attributed to the election of the spiritual father in a leadership position within the organization. When focusing on the funding of the movement, it is clear that it plays an important role in the operations, and attacks carried out by the movement. Most of the funding for the movement comes about from donations Shi’a Islamists who offer zakat after prayers. This contributes to 50% of the total funding for the movement most of which is used in securing equipment and weapons used in attacks (Koçak 2012). It is essential to note that this funding comes from the Arab region considering that the United States does not allow such collections towards terrorist activities. On the other hand, the movement also receives funding from the Islamic Republic of Iran through weapons and training sessions with the weapons transported to the United States through underground tunnels and stored in most of the control locations especially in South America.
Hezbollah places significant importance on some of the major capabilities that contribute to the success of the attacks carried out by the organization. Based on the ban by the U.S. government on the movement, Hezbollah moved most of the physical bases from the western countries in the Arab region with most countries supporting the movement. However, the cells within the United States also act as support locations whereby members of the movement seek help in case of need. Hezbollah portrays an image of participating in Jihad, which is a Holy war within the Muslims, which has helped in the attraction of more people towards the movement (Goll 2011). This is clear from the number of personnel in the cell in the United States containing over 30,000 people, most of whom act as Jihadists for the Islam religion. As mentioned earlier, the main decision body the movement is the spiritual leader and the secretary general, who control the training programs for the movement. During the recruitment of new members of the movement, the leaders move to the physical bases where the training programs occur as a way of ensuring total commitment in the part of the recruits.
According to a report released by the United Nations, Hezbollah receives donations of over $200 million annually and spends over $50 million in the acquisition of new communication technologies. However, the communication methods used during attacks depends on the priority of the attacks with the movement using complex communication methods in some of the high priority attack such as the 11th September 2001 attack against the United States. The complexities of the communication methods create a significant disadvantage for the U.S. government in terms of preventing the planned attacks. It is important to point out that most of the attacks carried out by the group target highly populated areas and military bases, which creates tension among people living within the United States (Goll 2011). Based on the training carried out in the physical bases, the U.S. Department of State argues that the movement uses suicide bombing in carrying out terrorist activities in the countries, which makes it hard for the prevention. Hezbollah also employs the use of gun attacks whereby members of the movement, attack different planned venues and shoot innocent victims, as part of the mission towards passing on the message of liberation.
Terror group’s operations are mainly dependent on minimizing risks with the aim of achieving the greatest success. Terrorists evade a challenger’s strong point and focus on their weaknesses and their stress on exploiting security measure. This generally means the involvement of the smallest possible number of attackers to complete the operation with the most effective weapons at their disposal. The Hezbollah movement practices a detailed scheduling which can be adjusted depending on the operations requirements. For instance, the determination of the potential targets can continue for years before the operation is carried out. Some targets may be vulnerable enough to warrant shorter periods of observation. However, the information and data collection must be strong. Similarly, depending on the nature of the operation, operations in progress may be improved, deferred or annulled so that the operation does not fail. Under the Hezbollah movement’s planning and data collection strategies, tactical missions interlink so that operational objectives and strategic goals are realized.
A detailed understanding of the target population is studied through psychological measures where informants are sent to the target site with the aim of getting the experiences of the populace. In case the targeted location involves experts, field agents are recruited and trained to work with companies and organizations operating from that target site. This helps the terrorist agents to be acquainted with the environment and identify the weak points, spare times and surveillance of security measures employed by the firms in the target area. In this light, the most practiced data collection programs include; physical surveillance, involvement of professionals working in the target areas, hacking into data storages of the government through agents in such agencies, practice/ routines/ procedures, not to mention transportation and route travel study.
For a mission to be successfully completed and executed by the Hezbollah movement, collected data must be evaluated and studied by a group of strategists in the movement. This group includes professionals in various fields such as security, programming, finance and accounting management, logistics experts, and analysts. The process of data collection is entirely left to the low ranking recruits who, however, must be supervised by a senior ranking member. In most cases, the supervisor is only known by a few recruits for security reasons. The Hezbollah movement has recruited all over and in all fields. The movements target young workers in organizations and government agencies. The main reason for this choice is that such workers are desperate to earn extra money for their leisure activities, and the fact that they are easy to manipulate and blackmail. Given the fact that data collection does not require much experience or expertise, low ranking and new recruits are the most suitable candidates to collect data and information regarding the operation. In most cases, the recruits are not aware of the real deal of the operation, they will innocently collect and deliver the information. In addition, where surveillance can be done through observation, for instance information regarding logistics and transportation routes and schedules, the organization may use more experienced informants since they are able to survey without leaving a trail or being noticed. Lastly, the pre-attack surveillance and data gathering should be collected by highly trained intelligence and surveillance personnel or members supportive of the terrorist cell. The pre-attack phase involves gathering information relating to the target’s current patterns whereby the attacking team approves information gathered from previous surveillance activities. This is very important as it helps in the identification of presumed and probable vulnerabilities. The Hezbollah movement practices a hierarchical decision making structure with the leader being the highest. Presently, the leader of the movement is Sheikh Muhammed Hussein Fadlallah, who is not only a leader, but also the spiritual father of the movement. Under this structure, major decisions are made from one end while the day to day running of operations is carried from the other end. At one end of this internal scale of accountabilities, execution of operational tasks is clearly the role assigned to terror cells and operation groups. The other extreme consists of the executive group that has the primary responsibility for the development of the movement’s strategies and direction proclamations that map the overall direction of the movement. The executive group plays an essential part of the process of developing and appraising the movement’s policies and strategies in the continuing provision of updated knowledge and forecasting of future operation.
The strategic intelligence applied by the Hezbollah movement is a very specific application of principles, and its main role is to assist the movement with operational decision making as well as strategizing on operations requirements. The main role of strategic intelligence in the Hezbollah movement is the need for support to understand and be able to counter the challenges and barriers enacted by various government agencies. Other strategies are; helping in the realization and development of successful operations, development of goals, objectives and operation matrices, the provision of open-sources as well as intelligence collection support and analysis. The movement has a wide network of intelligence analyst fetched from all probable professions. This makes the organization very effective when analyzing any operation not only for security but also for finance, logistics, and human power management. The team of experts also helps in the planning of emergency and fallback plans in case the operation fails when being executed.
In conclusion, the collection of data and information by the Hezbollah movement is a very organized operation that is very secretive and well organized. This task is mainly conducted by low ranking personnel, but under the watch of experienced and trained experts. Once the primary data is collected a group of experts organizes it with the aim of identifying the strengths and weaknesses of their target. Once this is done, the movement rehearses the operation and at times this may be done on similar locations and target sites with the objective of further identifying any enforceable weak points in the operation. Prior to the operation, strategic intelligence surveillance is also practiced where a team of experts evaluates the plan in relation to the available information. This may lead to approval, delay or termination of the operation depending on the existing facts about the intelligence gathered about the operation. Lastly, the group practices the hierarchical management structure, where information is handled through the top-bottom flow. This structure plays a very significant role in enhancing security and protection of sensitive information.
The recommendation for a policy maker is for the United States’ ideal objective in Lebanon should be to help them enhance and set up a free media that is reluctant to work with terrorists, facilities able to provide the primary needs for its people, and an audio financial system separate from Hezbollah’s “fraudulent taxation”.
Secondly, they should determine a plan to help Lebanon develop a powerful financial system and discuss with Israel to reduce any stress. If army skirmishes do no quit, the risk of terrorism and financial growth will be unproductive to a flourishing Lebanese upcoming.
Lastly, it is sensible to know that Hezbollah has started growing in the Southern United States and is economically cheering itself nearer to United States boundaries.
Our plan creators need to be eager to the fact that Hezbollah is growing and getting its feet nearer to the United States’ boundary. Improving boundary protection is going to be a necessary countermeasure that stops enemy from falling though known factors of entries.
The U.S. needs to be cautious to not to straight take part in an issue with Hezbollah. The last factor the U. S. Declares should do is worsening Hezbollah into a retaliatory condition. Instead the U.S. should ultimately use Southern United States and Center Southern nations to battle them for us.
Additionally, for military performance enhancement and improvement, Hezbollah handled their community assistance and authenticity through the use of non-military indicates, with the supply of social services and governmental contribution probably playing an important role Hezbollah’s huge strategy. Most significantly for Hezbollah, the new approach led the Party of God out of their difficult ideal position in the late 1980’s. The result of these connections between enhanced army and non-military indicates was an ideal success for Hezbollah. Israeli community assistance for the war decreased, eventually resulting in the Israeli drawback from Southeast Lebanon.
Bibliography
Broxmeyer, Eric. “The Problems of Security and Freedom: Procedural Due Process and the Designation of Foreign Terrorist Organizations Under the Anti-Terrorism and Effective Death Penalty Act.” Berkeley Journal of International Law 22, no. 3 (2004): 439-488.
Dr. Habash, George . “Terrorist Planning Cycle.” A Military Guide to Terrorism in the Twenty-First Century. August 15, 2007. http://www.au.af.mil/au/awc/awcgate/army/guidterr/app_a.pdf (accessed March 15, 2014).
Goll, Irene. “Environmental Jolts, Clocks, and Strategic Change in the U.S. Airline Industry: The Effects of Deregulation and the 9/11/2001 Terrorist Attacks.” Business & Politics 13, no. 4 (2011): 1-37.
Kang, Youn-ah , and John Stasko . “Characterizing the Intelligence Analysis Process: Informing Visual Analytics Design through a Longitudinal Field Study .” IEEE Symposium on Visual Analytics Science and Technology. October 28, 2011. http://users.soe.ucsc.edu/~pang/visweek/2011/vast/papers/kang.pdf (accessed March 15, 2014).
Koçak, Murat. “Threat assessment of terrorist organizations: the application of Q methodology.” Journal of Risk Research 15, no. 1 (2012): 85-105.
Slogum, Louisa. “OFAC, the Department Of State, and the Terrorist Designation Process: A Comparative Analysis of Agency Discretion.” Administrative Law Review 65, no. 2 (2013): 387-425.
Sheehan, Ivan Sascha. “Assessing and Comparing Data Sources for Terrorism Research.” Springer Series on Evidence-Based Crime Policy 3, DOI 10.1007/978-1-4614-0953-3_2, 2012: 13-35.
Straus , Susan G., Andrew M. Parker, James B. Bruce , And Jacob W. Dembosky. “The Group Matters: A Review of the Effects of Group Interaction on Processes and Outcomes in Analytic Teams.” National Security Research Division. April 2009. http://www.rand.org/content/dam/rand/pubs/working_papers/2009/RAND_WR580.pdf (accessed March 15, 2014).
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more