• Home
  • About RSIS
    • Introduction
    • Building the Foundations
    • Welcome Message
    • Board of Governors
    • Staff Profiles
      • Executive Deputy Chairman’s Office
      • Dean’s Office
      • Management
      • Distinguished Fellows
      • Faculty and Research
      • Associate Research Fellows, Senior Analysts and Research Analysts
      • Visiting Fellows
      • Adjunct Fellows
      • Administrative Staff
    • Honours and Awards for RSIS Staff and Students
    • RSIS Endowment Fund
    • Endowed Professorships
    • Career Opportunities
    • Getting to RSIS
  • Research
    • Research Centres
      • Centre for Multilateralism Studies (CMS)
      • Centre for Non-Traditional Security Studies (NTS Centre)
      • Centre of Excellence for National Security (CENS)
      • Institute of Defence and Strategic Studies (IDSS)
      • International Centre for Political Violence and Terrorism Research (ICPVTR)
    • Research Programmes
      • National Security Studies Programme (NSSP)
      • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
    • Future Issues and Technology Cluster
    • [email protected] Newsletter
    • Other Research
      • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
    • Graduate Programmes Office
    • Overview
    • MSc (Asian Studies)
    • MSc (International Political Economy)
    • MSc (International Relations)
    • MSc (Strategic Studies)
    • NTU-Warwick Double Masters Programme
    • PhD Programme
    • Exchange Partners and Programmes
    • How to Apply
    • Financial Assistance
    • Meet the Admissions Team: Information Sessions and other events
    • RSIS Alumni
  • Alumni & Networks
    • Alumni
    • Asia-Pacific Programme for Senior Military Officers (APPSMO)
    • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
    • International Strategy Forum-Asia (ISF-Asia)
    • SRP Executive Programme
    • Terrorism Analyst Training Course (TATC)
  • Publications
    • RSIS Publications
      • Annual Reviews
      • Books
      • Bulletins and Newsletters
      • Commentaries
      • Counter Terrorist Trends and Analyses
      • Commemorative / Event Reports
      • IDSS Paper
      • Interreligious Relations
      • Monographs
      • NTS Insight
      • Policy Reports
      • Working Papers
      • RSIS Publications for the Year
    • Glossary of Abbreviations
    • External Publications
      • Authored Books
      • Journal Articles
      • Edited Books
      • Chapters in Edited Books
      • Policy Reports
      • Working Papers
      • Op-Eds
      • External Publications for the Year
    • Policy-relevant Articles Given RSIS Award
  • Media
    • Great Powers
    • Sustainable Security
    • Other Resource Pages
    • Media Highlights
    • News Releases
    • Speeches
    • Vidcast Channel
    • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
Facebook
Twitter
YouTube
RSISVideoCast RSISVideoCast rsis.sg
Linkedin
instagram instagram rsis.sg
RSS
  • Home
  • About RSIS
      • Introduction
      • Building the Foundations
      • Welcome Message
      • Board of Governors
      • Staff Profiles
        • Executive Deputy Chairman’s Office
        • Dean’s Office
        • Management
        • Distinguished Fellows
        • Faculty and Research
        • Associate Research Fellows, Senior Analysts and Research Analysts
        • Visiting Fellows
        • Adjunct Fellows
        • Administrative Staff
      • Honours and Awards for RSIS Staff and Students
      • RSIS Endowment Fund
      • Endowed Professorships
      • Career Opportunities
      • Getting to RSIS
  • Research
      • Research Centres
        • Centre for Multilateralism Studies (CMS)
        • Centre for Non-Traditional Security Studies (NTS Centre)
        • Centre of Excellence for National Security (CENS)
        • Institute of Defence and Strategic Studies (IDSS)
        • International Centre for Political Violence and Terrorism Research (ICPVTR)
      • Research Programmes
        • National Security Studies Programme (NSSP)
        • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      • Future Issues and Technology Cluster
      • [email protected] Newsletter
      • Other Research
        • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      • Graduate Programmes Office
      • Overview
      • MSc (Asian Studies)
      • MSc (International Political Economy)
      • MSc (International Relations)
      • MSc (Strategic Studies)
      • NTU-Warwick Double Masters Programme
      • PhD Programme
      • Exchange Partners and Programmes
      • How to Apply
      • Financial Assistance
      • Meet the Admissions Team: Information Sessions and other events
      • RSIS Alumni
  • Alumni & Networks
      • Alumni
      • Asia-Pacific Programme for Senior Military Officers (APPSMO)
      • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
      • International Strategy Forum-Asia (ISF-Asia)
      • SRP Executive Programme
      • Terrorism Analyst Training Course (TATC)
  • Publications
      • RSIS Publications
        • Annual Reviews
        • Books
        • Bulletins and Newsletters
        • Commentaries
        • Counter Terrorist Trends and Analyses
        • Commemorative / Event Reports
        • IDSS Paper
        • Interreligious Relations
        • Monographs
        • NTS Insight
        • Policy Reports
        • Working Papers
        • RSIS Publications for the Year
      • Glossary of Abbreviations
      • External Publications
        • Authored Books
        • Journal Articles
        • Edited Books
        • Chapters in Edited Books
        • Policy Reports
        • Working Papers
        • Op-Eds
        • External Publications for the Year
      • Policy-relevant Articles Given RSIS Award
  • Media
      • Great Powers
      • Sustainable Security
      • Other Resource Pages
      • Media Highlights
      • News Releases
      • Speeches
      • Vidcast Channel
      • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
  • instagram instagram rsis.sg
Connect

Getting to RSIS

Map

Address

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

View location on Google maps Click here for directions to RSIS

Get in Touch

    Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
    RSISVideoCast RSISVideoCast rsisvideocast
      school/rsis-ntu
    instagram instagram rsis.sg
      RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    RSIS Intranet

    S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
    Nanyang Technological University Nanyang Technological University

    Skip to content

     
    • RSIS
    • Publication
    • RSIS Publications
    • CO07007 | The Tyranny of the Tactical
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • Commentaries
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • IDSS Paper
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers
    • RSIS Publications for the Year

    CO07007 | The Tyranny of the Tactical
    Richard Dearlove, Tom Quiggin

    01 February 2007

    download pdf
    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Commentary

    THE priority in the struggle against political extremism and terrorism is to escape from the tyranny of the day-to-day tactical fight and develop an obtainable and defensible strategic- level set of objectives. To develop such a strategic approach, it is necessary to define your goals. This is, of course, vital for building a whole-of-government approach to security measures.

    What are you trying to achieve with your strategic goals? Is it the elusive goal of the eradication of terrorism by military means? With terrorism and extremism having been a part of political life for more than 2,500 years, eradication at this point seems unlikely. Or is your strategic aim the more pragmatic one of denying terrorists what they seek – which is to disrupt our way of life? Terrorism itself is an extreme act of political communication, which aims to draw governments into over-reaction. This can cause further radicalization and recruitment for more extremism and terrorism. It is critical to understand your own aims and objectives before launching into action.

    Need for new approaches

    It is easy to talk of change, but implementation of a new policy is never easy. Bureaucratic organizational change, the most common government response, is unlikely to work in most cases. However, organizational change plus new methods and working habits may produce results. But no government gets to start with a blank canvas. We have to adapt and build around existing institutions and their people. At this point, however, there are, frequently, gaps between new policies and getting them to work. The resources required for training and development are often scarce or slow in coming.

    While the events of 9/11 were a shock and they re-ordered many priorities, all of the elements required for change were in place before 2001. Globalization, new technology, new means of communication (the internet in particular), the disappearance of the bipolar power bloc system, the diffusion of state power and control, a rising influence of sub-governmental organizations, the rise of political Islam, and the growing threat of terror are not new-found problems.

    One other factor that confuses policy thinking is the frequent misunderstandings between “threats” and actual “risks”. We are often given laundry lists of vulnerabilities that could be exploited by nefarious terrorists. Frequently, governments have not done a national level risk assessment to weed out potential threats from actual risks, which are based on probability and impact factors. As such, policymakers are often trying to react to low probability threats which may have little impact while more probable risks may not get addressed at all.

    Many of the risks that do face us are asymmetric in nature and dealing with them can be challenging. Asymmetric attack perpetrators avoid attacking the strongest points of their adversaries while seeking to exploit vulnerabilities. There is an implicit element of surprise in the timing of the attack; the perpetrators expect that many attacks will be required over time to break down the will of the stronger power.

    It should be clear at the outset of any policy discussion that the primary weapon for prevailing in the face of asymmetric threats is knowledge. While raw power does have its place, power alone cannot buy freedom from fear. Some of the world’s most powerful nations are currently its most fearful. Knowledge derived from broad studies and good intelligence work is the requirement.

    Getting this knowledge can be a major challenge, especially in the face of the barriers that have been built in the past. It is still a common habit in many quarters to think of intelligence as being either foreign or domestic. While this model may have been useful in the Cold War period, it is questionable now unless the intelligence gained from both is thoroughly integrated as close to the front lines as possible.

    Another barrier that still needs more attention is the division between human sources of intelligence and technical forms. Traditionally, these two major fields of intelligence have been separated. But with increasingly complex intelligence demands and shorter time periods involved, getting the initial fine grains of intelligence is tougher. To facilitate this analysis work, human intelligence and technical intelligence have to work hand in hand at the operational level.

    In order to break down barriers and achieve a whole-of-government approach, the relationships between the security and intelligence services and law enforcement must be closely examined. In many countries, the newer forms of terrorism tend to operate in the areas which are more noted for their gaps between these agencies rather than their overlap. Until these gaps are closed off, they are naturally existing vulnerabilities which will be exploited.

    The Future

    What of the future? If we continue to adapt and meet the present threats, are we secure? This remains a debatable point, as the latent threats in the future may be more serious than the conventional terrorist threats we face now. What about nuclear, biological, chemical and the radiological threats? In order to prepare for the longer term threats, it is essential to start thinking about the “unthinkable” now. A vital role exists for the scientific and academic communities in thinking about these problems without being alarmist. But to be clear, the threat will change and we will face new challenges in coping. The most likely “unthinkable” event at the moment is a radiological dispersal device causing contamination in a widespread urban area, but future terrorism threats may entail something as unusual as the genetic manipulation of a virus. In other words, a terrorist event without a blast.

    Louise Richardson, author of The Roots of Terrorism, spells out six rules for countering terrorism to which we can add a seventh. They are:

    • Have a defensible and achievable goal;

    • Live by your principles – don’t be goaded by the terrorist into behaving differently;

    • Know your enemy, intimately;

    • Isolate terrorists within their own communities;

    • Engage others in countering terrorism with you;

    • Have patience and keep your perspective – be prepared for the long-term;

    • Build a process which is unambiguous and can function strategically and operationally and in is open-ended.

    Governments need to establish national strategic aims which require the clearest lines of authority and levels of competence for decision-taking. Above all, it is about enabling middle-management to work in an imaginative, flexible and lateral fashion. This will require training and practice exercises, as well as scenario planning and building capacity. Little point exists for working in stove pipes which merely come together, if at all, at the top level. Stated another way, we need to escape from the tyranny of the tactical and advance to a strategic, whole-of-government approach.

    About the Authors

    Sir Richard Dearlove is Master of Pembroke College, Cambridge University and former Head of the UK Secret Intelligence Service (MI-6). Tom Quiggin is a Senior Fellow at the Centre of Excellence for National Security (CENS), a unit of RSIS and is a court qualified expert on jihadism. 

    Categories: Commentaries / International Politics and Security / Global

    Last updated on 07/10/2014

    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Commentary

    THE priority in the struggle against political extremism and terrorism is to escape from the tyranny of the day-to-day tactical fight and develop an obtainable and defensible strategic- level set of objectives. To develop such a strategic approach, it is necessary to define your goals. This is, of course, vital for building a whole-of-government approach to security measures.

    What are you trying to achieve with your strategic goals? Is it the elusive goal of the eradication of terrorism by military means? With terrorism and extremism having been a part of political life for more than 2,500 years, eradication at this point seems unlikely. Or is your strategic aim the more pragmatic one of denying terrorists what they seek – which is to disrupt our way of life? Terrorism itself is an extreme act of political communication, which aims to draw governments into over-reaction. This can cause further radicalization and recruitment for more extremism and terrorism. It is critical to understand your own aims and objectives before launching into action.

    Need for new approaches

    It is easy to talk of change, but implementation of a new policy is never easy. Bureaucratic organizational change, the most common government response, is unlikely to work in most cases. However, organizational change plus new methods and working habits may produce results. But no government gets to start with a blank canvas. We have to adapt and build around existing institutions and their people. At this point, however, there are, frequently, gaps between new policies and getting them to work. The resources required for training and development are often scarce or slow in coming.

    While the events of 9/11 were a shock and they re-ordered many priorities, all of the elements required for change were in place before 2001. Globalization, new technology, new means of communication (the internet in particular), the disappearance of the bipolar power bloc system, the diffusion of state power and control, a rising influence of sub-governmental organizations, the rise of political Islam, and the growing threat of terror are not new-found problems.

    One other factor that confuses policy thinking is the frequent misunderstandings between “threats” and actual “risks”. We are often given laundry lists of vulnerabilities that could be exploited by nefarious terrorists. Frequently, governments have not done a national level risk assessment to weed out potential threats from actual risks, which are based on probability and impact factors. As such, policymakers are often trying to react to low probability threats which may have little impact while more probable risks may not get addressed at all.

    Many of the risks that do face us are asymmetric in nature and dealing with them can be challenging. Asymmetric attack perpetrators avoid attacking the strongest points of their adversaries while seeking to exploit vulnerabilities. There is an implicit element of surprise in the timing of the attack; the perpetrators expect that many attacks will be required over time to break down the will of the stronger power.

    It should be clear at the outset of any policy discussion that the primary weapon for prevailing in the face of asymmetric threats is knowledge. While raw power does have its place, power alone cannot buy freedom from fear. Some of the world’s most powerful nations are currently its most fearful. Knowledge derived from broad studies and good intelligence work is the requirement.

    Getting this knowledge can be a major challenge, especially in the face of the barriers that have been built in the past. It is still a common habit in many quarters to think of intelligence as being either foreign or domestic. While this model may have been useful in the Cold War period, it is questionable now unless the intelligence gained from both is thoroughly integrated as close to the front lines as possible.

    Another barrier that still needs more attention is the division between human sources of intelligence and technical forms. Traditionally, these two major fields of intelligence have been separated. But with increasingly complex intelligence demands and shorter time periods involved, getting the initial fine grains of intelligence is tougher. To facilitate this analysis work, human intelligence and technical intelligence have to work hand in hand at the operational level.

    In order to break down barriers and achieve a whole-of-government approach, the relationships between the security and intelligence services and law enforcement must be closely examined. In many countries, the newer forms of terrorism tend to operate in the areas which are more noted for their gaps between these agencies rather than their overlap. Until these gaps are closed off, they are naturally existing vulnerabilities which will be exploited.

    The Future

    What of the future? If we continue to adapt and meet the present threats, are we secure? This remains a debatable point, as the latent threats in the future may be more serious than the conventional terrorist threats we face now. What about nuclear, biological, chemical and the radiological threats? In order to prepare for the longer term threats, it is essential to start thinking about the “unthinkable” now. A vital role exists for the scientific and academic communities in thinking about these problems without being alarmist. But to be clear, the threat will change and we will face new challenges in coping. The most likely “unthinkable” event at the moment is a radiological dispersal device causing contamination in a widespread urban area, but future terrorism threats may entail something as unusual as the genetic manipulation of a virus. In other words, a terrorist event without a blast.

    Louise Richardson, author of The Roots of Terrorism, spells out six rules for countering terrorism to which we can add a seventh. They are:

    • Have a defensible and achievable goal;

    • Live by your principles – don’t be goaded by the terrorist into behaving differently;

    • Know your enemy, intimately;

    • Isolate terrorists within their own communities;

    • Engage others in countering terrorism with you;

    • Have patience and keep your perspective – be prepared for the long-term;

    • Build a process which is unambiguous and can function strategically and operationally and in is open-ended.

    Governments need to establish national strategic aims which require the clearest lines of authority and levels of competence for decision-taking. Above all, it is about enabling middle-management to work in an imaginative, flexible and lateral fashion. This will require training and practice exercises, as well as scenario planning and building capacity. Little point exists for working in stove pipes which merely come together, if at all, at the top level. Stated another way, we need to escape from the tyranny of the tactical and advance to a strategic, whole-of-government approach.

    About the Authors

    Sir Richard Dearlove is Master of Pembroke College, Cambridge University and former Head of the UK Secret Intelligence Service (MI-6). Tom Quiggin is a Senior Fellow at the Centre of Excellence for National Security (CENS), a unit of RSIS and is a court qualified expert on jihadism. 

    Categories: Commentaries / International Politics and Security

    Last updated on 07/10/2014

    Back to top

    Terms of Use | Privacy Statement
    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
    OK
    Latest Book
    CO07007 | The Tyranny of the Tactical

    Commentary

    THE priority in the struggle against political extremism and terrorism is to ...
    more info