Security Think Tank: Exploring the Possibility of Negotiating with Terrorists

During the 1960s and 70s, the UK developed a non-negotiation policy in response to terrorist incidents primarily involving Northern Ireland. This stance was also adopted by the US in the 1970s and 1980s, specifically relating to the Middle East. The famous soundbite, “We do not negotiate with terrorists,” became popular but does not reflect the reality that both countries do negotiate in certain situations. This approach has resulted in missed opportunities, loss of lives, and hypocrisy.

The Good Friday Agreement in 1998 is a clear example of successful negotiations with terrorist groups. The UK and Irish governments, along with multiple political parties from Northern Ireland, brokered an agreement that led to a power-sharing assembly and the decommissioning of weapons. On the other hand, the fate of hostages held by ISIS demonstrates the different outcomes of negotiating and not negotiating. While some captives were released after negotiations and ransom payments, others were executed.

There is an argument against paying ransoms or negotiating, as it can incentivize further criminal activity. However, Joel Simon argues in his book that adhering to a no concessions policy actually puts people at greater risk. Making ransom payments illegal may have negative effects, such as decreased incident reporting and criminalizing victim organizations. It also removes a valuable tool for incident responders, as negotiations can provide intelligence and buy time for investigation and recovery.

To improve company culture and tackle cyber security, boards and executives should be held personally accountable for data security. This could include fines, loss of bonuses, or even imprisonment. Engaging with threat actors and being open to negotiation, as demonstrated in hostage situations, can lead to better outcomes. Targeting the financial systems of threat actors, particularly through the use of ZKPs and scoring transactions, may also discourage transactions with known bad actors while respecting privacy rights.

Overall, a multi-faceted approach is needed to address cyber security concerns, including holding individuals accountable, being open to negotiation, and targeting the financial aspects of cyber crime.

Unlock your business potential with our expert guidance. Get in touch now!

tr_20241223-crm-tips.jpg

7 Key CRM Strategies to Enhance Sales Productivity

tr_20241223-us-bank-business-checking-review.jpg

US Bank Business Checking Review 2025: Advantages, Fees, and Highlights

tr_20241223-career-essentials-generative-ai-review.jpg

Microsoft Launches Its First Free Generative AI Certificate

AdobeStock_584485928.jpeg

Essential Payroll Documents Required for Employee Payments

how-to-set-up-a-virtual-call-center-featured-image-12202024-min.jpg

The Easy Guide to Setting Up an Efficient Virtual Call Center

Robot-bot-chatbot-AI.jpg

A Jobseeker’s Handbook: Leveraging AI and Its Implications for Employers

tr_20241220-top-software-development-technologies.jpg

8 Key Software Development Technologies to Watch in 2025