Jihad, Crime, and the Internet: Content Analysis of Jihadist Forum

Total Page:16

File Type:pdf, Size:1020Kb

Jihad, Crime, and the Internet: Content Analysis of Jihadist Forum Jihad, Crime, and the Internet Content Analysis of Jihadist Forum Discussions Edna Erez, LL.B., Ph.D., University of Illinois at Chicago Gabriel Weimann, Ph.D., University of Haifa A. Aaron Weisburd, M.A., University of Illinois at Chicago October 31, 2011 Report submitted to the National Institute of Justice in fulfillment of requirements for Award Number 2006-IJ-CX-0038. Points of view expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. Jihad, Crime, and the Internet Page i Abstract It is common knowledge that terrorists, and Jihadists in particular, make extensive use of the Internet. But the Internet also provides a window into the full range of Jihadist activities. Previous research has identified the various uses of the Internet by Jihadists; however, little research has focused on forum discussions in Jihadist web sites that are of most concern to U.S. counterterrorism efforts. The purpose of the study is twofold: to provide quantitative and qualitative assessments of the content of communications in the forums. Special attention is paid to the nexus between crime and terrorism as it unfolds in the discussions. The data comprise 2112 discussion threads downloaded over two years from over 15 different prominent Arabic-language Jihadist forums and randomized for distribution to coders who are Arab and Sunni Muslims, whose native language is Arabic, and who grew up in Arab speaking countries. The results suggest that most discussions are short lived, involve a small number of participants from among the pool of registered forum members, and include few entries and pages. Participants often refer readers to approved web sites and share authentic Jihadist multimedia. References and quotes from religious sources are common. Over a third of the discussions include calls for Jihad, and 3% of the communications discuss non-terrorist illegal activities, particularly computer- and software-related offenses. Content analysis of the discussion summaries identified four groups: information dissemination, religious preaching, instruction or training, and social interactions. These groups all support three central activity pillars in the terrorist organization: ideological foundation, organizational structure, and operational means. In addition to traditional methods of waging Jihad, participation in forum discussions is itself considered a form of Jihad. Policy recommendations include making use of the fleeting nature of forum discussions to get inside the loop of Jihadist attention and interest; responding to threats by adding interference at any touchpoint along the communication process; mitigating the harm done by exposure to violent imagery, and understanding the context of the Arab, Muslim, and Jihadist milieu in which the studied social interactions take place. Recommendations for further research include examination of the content of links authenticated through the forums, an analysis of the rate of acceptance and adoption of views and behavior promoted by those in control of the forums, and a comparison of what is known about terrorists’ behavior from prosecution data to what is observed in their forums. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Jihad, Crime, and the Internet Page ii Table of Contents Abstract ................................................................................................................................................................. i Table of Contents ............................................................................................................................................. ii Executive Summary ....................................................................................................................................... iv I. Background ........................................................................................................................................... iv II. Purpose ................................................................................................................................................. vi III. Research design and methods .................................................................................................. vii IV. Findings ............................................................................................................................................ viii A. Quantitative findings ................................................................................................................................................ viii B. Qualitative findings ...................................................................................................................................................... xi V. Conclusions ....................................................................................................................................... xiii A. Implications for policy and practice ................................................................................................................... xiii B. Implications for further research ......................................................................................................................... xiv Acknowledgments ........................................................................................................................................ xvi Jihad, Crime, and the Internet .................................................................................................................... 1 I. Introduction ........................................................................................................................................... 1 A. Statement of the Problem ........................................................................................................................................... 1 B. Literature review ............................................................................................................................................................ 3 1. The Internet as research site ................................................................................................................................. 3 2. The aims and uses of Jihadist web sites ............................................................................................................ 4 3. The presence of Jihadists online ........................................................................................................................... 7 4. Forums as a center for terrorist activity online ............................................................................................ 9 5. Analyses and assessments of Jihadist content online .............................................................................. 13 6. The presence of al-Qaida leadership online ................................................................................................ 16 7. eJihad/Media Jihad ................................................................................................................................................. 19 8. Exposure to violence/conditioning ................................................................................................................. 21 9. Training and tradecraft ....................................................................................................................................... 22 10. Social networks and computer mediated communications (CMC) effects ................................... 25 11. Virtuality and presence: Internet as space or place ............................................................................... 28 12. Recruitment, operations, and cases ............................................................................................................... 30 13. Fundraising and crime ........................................................................................................................................ 34 C. Rationale for the study .............................................................................................................................................. 34 II. Methods .............................................................................................................................................. 40 A. Characteristics of forum discussions .................................................................................................................. 40 B. Sampling considerations and procedures ........................................................................................................ 41 1. Jihadist web sites sampling frame ................................................................................................................... 41 2. Sampling forum discussions ............................................................................................................................... 45 3. Preparation of forum discussions for delivery to coders ....................................................................... 47 4. Coding instrument development ...................................................................................................................... 48 5. Coder selection
Recommended publications
  • Interliminal Tongues: Self-Translation in Contemporary Transatlantic
    INTERLIMINAL TONGUES: SELF-TRANSLATION IN CONTEMPORARY TRANSATLANTIC BILINGUAL POETRY by MICHAEL BRANDON RIGBY A DISSERTATION Presented to the Department of Romance Languages and the Graduate School of the University of Oregon in partial fulfillment of the requirements for the degree of Doctor of Philosophy June 2017 DISSERTATION APPROVAL PAGE Student: Michael Brandon Rigby Title: Interliminal Tongues: Self-translation in Contemporary Transatlantic Bilingual Poetry This dissertation has been accepted and approved in partial fulfillment of the requirements for the Doctor of Philosophy degree in the Department of Romance Languages by: Cecilia Enjuto Rangel Chairperson Amalia Gladhart Core Member Pedro García-Caro Core Member Monique Balbuena Institutional Representative and Scott L. Pratt Dean of the Graduate School Original approval signatures are on file with the University of Oregon Graduate School. Degree awarded June 2017 ii © 2017 Michael Brandon Rigby iii DISSERTATION ABSTRACT Michael Brandon Rigby Doctor of Philosophy Department of Romance Languages June 2017 Title: Interliminal Tongues: Self-translation in Contemporary Transatlantic Bilingual Poetry In this dissertation, I argue that self-translators embody a borderline sense of hybridity, both linguistically and culturally, and that the act of translation, along with its innate in-betweenness, is the context in which self-translators negotiate their fragmented identities and cultures. I use the poetry of Urayoán Noel, Juan Gelman, and Yolanda Castaño to demonstrate that they each uniquely use the process of self- translation, in conjunction with a bilingual presentation, to articulate their modern, hybrid identities. In addition, I argue that as a result, the act of self-translation establishes an interliminal space of enunciation that not only reflects an intercultural exchange consistent with hybridity, but fosters further cultural and linguistic interaction.
    [Show full text]
  • BOKO HARAM Emerging Threat to the U.S
    112TH CONGRESS COMMITTEE " COMMITTEE PRINT ! 1st Session PRINT 112–B BOKO HARAM Emerging Threat to the U.S. Homeland SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES December 2011 FIRST SESSION U.S. GOVERNMENT PRINTING OFFICE 71–725 PDF WASHINGTON : 2011 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota JACKIE SPEIER, California JOE WALSH, Illinois CEDRIC L. RICHMOND, Louisiana PATRICK MEEHAN, Pennsylvania HANSEN CLARKE, Michigan BEN QUAYLE, Arizona WILLIAM R. KEATING, Massachusetts SCOTT RIGELL, Virginia KATHLEEN C. HOCHUL, New York BILLY LONG, Missouri VACANCY JEFF DUNCAN, South Carolina TOM MARINO, Pennsylvania BLAKE FARENTHOLD, Texas MO BROOKS, Alabama MICHAEL J. RUSSELL, Staff Director & Chief Counsel KERRY ANN WATKINS, Senior Policy Director MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director (II) C O N T E N T S BOKO HARAM EMERGING THREAT TO THE U.S. HOMELAND I. Introduction .......................................................................................................... 1 II. Findings ..............................................................................................................
    [Show full text]
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • Good Muslim, Bad Muslim: a Political Perspective on Culture and Terrorism
    MAHMOOD MAMDANI Good Muslim, Bad Muslim: A Political Perspective on Culture and Terrorism ABSTRACT The link between Islam and terrorism became a central media concern following September 11, resulting in new rounds of "culture talk. This talk has turned religious experience into a political category, differentiating 'good Muslims" from "bad Mus- lims, rather than terrorists from civilians. The implication is undisguised: Whether in Afghanistan, Palestine, or Pakistan, Islam must be quarantined and the devil must be exorcized from it by a civil war between good Muslims and bad Muslims. This article suggests that we lift the quarantine and turn the cultural theory of politics on its head. Beyond the simple but radical suggestion that if there are good Muslims and bad Muslims, there must also be good Westerners and bad Westerners, I question the very tendency to read Islamist poli- tics as an effect of Islamic civilization—whether good or bad—and Western power as an effect of Western civilization. Both those poli- tics and that power are born of an encounter, and neither can be understood outside of the history of that encounter. Cultural explanations of political outcomes tend to avoid history and issues. Thinking of individuals from "traditional" cultures in authentic and original terms, culture talk dehistoricizes the construction of political identities. This article places the terror of September 11 in a his- torical and political context. Rather than a residue of a premodern culture in modern politics, terrorism is best understood as a modern construction. Even when it harnesses one or another aspect of tradition and culture, the result is a modern ensemble at the service of a modern project.
    [Show full text]
  • Sunni – Shi`A Relations and the Implications for Belgium and Europe
    FEARING A ‘SHIITE OCTOPUS’ SUNNI – SHI`A RELATIONS AND THE IMPLICATIONS FOR BELGIUM AND EUROPE EGMONT PAPER 35 FEARING A ‘SHIITE OCTOPUS’ Sunni – Shi`a relations and the implications for Belgium and Europe JELLE PUELINGS January 2010 The Egmont Papers are published by Academia Press for Egmont – The Royal Institute for International Relations. Founded in 1947 by eminent Belgian political leaders, Egmont is an independent think-tank based in Brussels. Its interdisciplinary research is conducted in a spirit of total academic freedom. A platform of quality information, a forum for debate and analysis, a melting pot of ideas in the field of international politics, Egmont’s ambition – through its publications, seminars and recommendations – is to make a useful contribution to the decision- making process. *** President: Viscount Etienne DAVIGNON Director-General: Marc TRENTESEAU Series Editor: Prof. Dr. Sven BISCOP *** Egmont - The Royal Institute for International Relations Address Naamsestraat / Rue de Namur 69, 1000 Brussels, Belgium Phone 00-32-(0)2.223.41.14 Fax 00-32-(0)2.223.41.16 E-mail [email protected] Website: www.egmontinstitute.be © Academia Press Eekhout 2 9000 Gent Tel. 09/233 80 88 Fax 09/233 14 09 [email protected] www.academiapress.be J. Story-Scientia NV Wetenschappelijke Boekhandel Sint-Kwintensberg 87 B-9000 Gent Tel. 09/225 57 57 Fax 09/233 14 09 [email protected] www.story.be All authors write in a personal capacity. Lay-out: proxess.be ISBN 978 90 382 1538 9 D/2010/4804/17 U 1384 NUR1 754 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the permission of the publishers.
    [Show full text]
  • The Layha for the Mujahideen: an Analysis of the Code of Conduct for the Taliban Fighters Under Islamic Law
    Volume 93 Number 881 March 2011 The Layha for the Mujahideen:an analysis of the code of conduct for the Taliban fighters under Islamic law Muhammad Munir* Dr.Muhammad Munir is Associate Professor and Chairman,Department of Law, Faculty of Shari‘a and Law, International Islamic University, Islamabad. Abstract The following article focuses on the Islamic Emirate of Afghanistan Rules for the Mujahideen** to determine their conformity with the Islamic jus in bello. This code of conduct, or Layha, for Taliban fighters highlights limiting suicide attacks, avoiding civilian casualties, and winning the battle for the hearts and minds of the local civilian population. However, it has altered rules or created new ones for punishing captives that have not previously been used in Islamic military and legal history. Other rules disregard the principle of distinction between combatants and civilians and even allow perfidy, which is strictly prohibited in both Islamic law and international humanitarian law. The author argues that many of the Taliban rules have only a limited basis in, or are wrongly attributed to, Islamic law. * The help of Andrew Bartles-Smith, Prof. Brady Coleman, Major Nasir Jalil (retired), Ahmad Khalid, and Dr. Marty Khan is acknowledged. The quotations from the Qur’an in this work are taken, unless otherwise indicated, from the English translation by Muhammad Asad, The Message of the Qur’an, Dar Al-Andalus, Redwood Books, Trowbridge, Wiltshire, 1984, reprinted 1997. ** The full text of the Layha is reproduced as an annex at the end of this article. doi:10.1017/S1816383111000075 81 M. Munir – The Layha for the Mujahideen: an analysis of the code of conduct for the Taliban fighters under Islamic law Do the Taliban qualify as a ‘non-state armed group’? Since this article deals with the Layha,1 it is important to know whether the Taliban in Afghanistan, as a fighting group, qualify as a ‘non-state Islamic actor’.
    [Show full text]
  • Ba'ath Propaganda During the Iran-Iraq War Jennie Matuschak [email protected]
    Bucknell University Bucknell Digital Commons Honors Theses Student Theses Spring 2019 Nationalism and Multi-Dimensional Identities: Ba'ath Propaganda During the Iran-Iraq War Jennie Matuschak [email protected] Follow this and additional works at: https://digitalcommons.bucknell.edu/honors_theses Part of the International Relations Commons, and the Near and Middle Eastern Studies Commons Recommended Citation Matuschak, Jennie, "Nationalism and Multi-Dimensional Identities: Ba'ath Propaganda During the Iran-Iraq War" (2019). Honors Theses. 486. https://digitalcommons.bucknell.edu/honors_theses/486 This Honors Thesis is brought to you for free and open access by the Student Theses at Bucknell Digital Commons. It has been accepted for inclusion in Honors Theses by an authorized administrator of Bucknell Digital Commons. For more information, please contact [email protected]. iii Acknowledgments My first thanks is to my advisor, Mehmet Döşemeci. Without taking your class my freshman year, I probably would not have become a history major, which has changed my outlook on the world. Time will tell whether this is good or bad, but for now I am appreciative of your guidance. Also, thank you to my second advisor, Beeta Baghoolizadeh, who dealt with draft after draft and provided my thesis with the critiques it needed to stand strongly on its own. Thank you to my friends for your support and loyalty over the past four years, which have pushed me to become the best version of myself. Most importantly, I value the distractions when I needed a break from hanging out with Saddam. Special shout-out to Andrew Raisner for painstakingly reading and editing everything I’ve written, starting from my proposal all the way to the final piece.
    [Show full text]
  • Violent Jihad in the Netherlands
    Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat 2 Contents Foreword 5 Introduction 7 The murder of Theo van Gogh: consequences and effects 7 General trends in the development of jihadism 9 Framework of terms and definitions 10 1 From exogenous threat to home-grown terrorism 13 1.1 What is a jihadist network? 13 1.2 Historical development of network formation 15 1.2.1 The traditional phase: migration of jihadists 15 1.2.2 The proliferation phase: recruitment 16 1.2.3 The ‘home-grown’ phase: radicalisation and jihadisation 17 1.3 Three types of jihadist networks 17 2 Decentralisation and local implantation of international jihad19 2.1Al-Qaeda: from ‘network of gynetworks’ 19 to trademark and ideolo 2.2 Ideology of global violent jihad 21 2.3 Decentralisation of international jihad 22 2.4 Local implantation of international jihad 26 3 Radicalisation and the emergence of local networks 29 3.1Radicalisation, recruitment and jihadisation 29 3.2 The religious context of radicalisation 30 3.3 The socio-political context of radicalisation 33 3.4 The cultural and socio-psychological context of radicalisation 35 3.5 Emergence of local autonomous cells and networks 37 3.6 Backgrounds and functioning of local autonomous networks 38 3.7 The significance of the Hofstad network 39 4 Virtualisation of jihad 43 4.1The Internet as a propulsion of the jihad movement 43 4.2 Al-Qaeda as a virtual database (top-down) 44 4.3 The virtual umma (grass
    [Show full text]
  • WAHHABISM and POWER in SAUDI ARABIA: a PRACTICAL TEST of WEBERIAN THEORY by Abdullah Alrebh
    WAHHABISM AND POWER IN SAUDI ARABIA: A PRACTICAL TEST OF WEBERIAN THEORY By Abdullah Alrebh A THESIS Submitted to Michigan State University in partial fulfilment of the requirements for the degree of MASTER OF ARTS Sociology 2011 ABSTRACT WAHHABISM AND POWER IN SAUDI ARABIA: A PRACTICAL TEST OF WEBERIAN THEORY By Abdullah Alrebh Weber‘s theory of authority is an important tool when studying power and its relationship to human collectives, especially religious groups. Weber focused on the rise of Protestants‘ power in the West and how this group created and maintained economic power which helped them gain political control in various countries, including the U.S. In this paper, I incorporate Weber‘s insights about the Protestant ethic, bureaucracies, and types of authority to examine Wahhabism in Saudi Arabia. I compare Saudi Wahhabism with Protestantism, analyzing the rise of the Saud family as controllers of the economy and politics. The role of bureaucracies in these processes will also be discussed. The similarities and differences between Protestantism and Wahhabism are used to investigate power inside their respective societies. These comparisons will highlight the types of authority which allowed each sect to enhance power and how those processes of creating, consolidating, and maintaining power relate to the larger social climates in both Saudi Arabia and the Western world. Finally, I investigate images of the Saudi State in the The London Times between 1927 and 1937 to explain how power in the hands of a Wahhabi king was presented to Western readers. Copyright by Abdullah Alrebh 2011 ACKNOWLEDGEMENTS Special thanks go to my helpful advisor, Dr.
    [Show full text]
  • Fi Zilal Al-Qur'an
    International Journal of Humanities and Social Science Vol. 1 No. 8; July 2011 From Religious Realism to Social Criticism: Sayyid Qutb’s Approach in Fi Zilal al Qur’an Nooraihan Ali (Corresponding author) Faculty of Islamic Contemporary Studies Universiti Sultan Zainal Abidin E-mail: [email protected] Asyraf Hj. Ab. Rahman Faculty of Social Development Universiti Malaysia Terengganu E-mail: [email protected] Wan Ibrahim Wan Ahmad UUM College of Arts and Sciences Universiti Utara Malaysia E-mail: [email protected] Mohd Yusoff Mohamad Faculty of Social Development Universiti Malaysia Terengganu, Malaysia E-mail:: [email protected] Abstract This paper deals with Qutb’s approaches which are in some ways differ from other Mufassirun’s way of the Quranic interpretation, thus making his Zilal so relevant to the modern and contemporary society as it attempts to give consistent answers to the social and political problems facing Muslims. In Qutb’s view, the establishment of a society in which Islamic teachings could be properly applied, was inevitable. Some distinctive characteristics that made Zilal so special are also discussed. Keywords: Muslim society, Qur‟an, Modern Tafsir 1. Introduction This paper deals with Sayyid Qutb‟s approaches in Zilal and how they resulted in conflicting opinions between the author and other Mufassirun on certain issues mentioned in the Qur‟an. Qutb‟s interpretation of the Qur‟an began with the conviction that the Qur‟an was the true guidance for all human beings and thus the only valid source to direct their affairs. This belief emerged only after his progress through several stages of his career coupled with the strong influence of the current environment surrounding the Egyptian society of his time.
    [Show full text]
  • Information to Users
    INFORMATION TO USERS This manuscript has been reproduced firom the microfilm master. UMT films the text directly fi’om the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter 6ce, while others may be fi’om any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing fi’om left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6” x 9” black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A Bell & Ifowell Information Company 300 North Zeeb Road, Ann Arbor MI 48106-1346 USA 313/761-4700 800/521-0600 THE EMERGENCE AND DEVELOPMENT OF ARABIC RHETORICAL THEORY. 500 C £.-1400 CE. DISSERTATION Presented m Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University By Khaiid Alhelwah, M.A.
    [Show full text]
  • Trends in Southeast Asia
    ISSN 0219-3213 2016 no. 9 Trends in Southeast Asia THE EXTENSIVE SALAFIZATION OF MALAYSIAN ISLAM AHMAD FAUZI ABDUL HAMID TRS9/16s ISBN 978-981-4762-51-9 30 Heng Mui Keng Terrace Singapore 119614 http://bookshop.iseas.edu.sg 9 789814 762519 Trends in Southeast Asia 16-1461 01 Trends_2016-09.indd 1 29/6/16 4:52 PM The ISEAS – Yusof Ishak Institute (formerly Institute of Southeast Asian Studies) was established in 1968. It is an autonomous regional research centre for scholars and specialists concerned with modern Southeast Asia. The Institute’s research is structured under Regional Economic Studies (RES), Regional Social and Cultural Studies (RSCS) and Regional Strategic and Political Studies (RSPS), and through country- based programmes. It also houses the ASEAN Studies Centre (ASC), Singapore’s APEC Study Centre, as well as the Nalanda-Sriwijaya Centre (NSC) and its Archaeology Unit. 16-1461 01 Trends_2016-09.indd 2 29/6/16 4:52 PM 2016 no. 9 Trends in Southeast Asia THE EXTENSIVE SALAFIZATION OF MALAYSIAN ISLAM AHMAD FAUZI ABDUL HAMID 16-1461 01 Trends_2016-09.indd 3 29/6/16 4:52 PM Published by: ISEAS Publishing 30 Heng Mui Keng Terrace Singapore 119614 [email protected] http://bookshop.iseas.edu.sg © 2016 ISEAS – Yusof Ishak Institute, Singapore All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission. The author is wholly responsible for the views expressed in this book which do not necessarily reflect those of the publisher.
    [Show full text]