The Sufficiency of Information Privacy Protection in Saudi Arabia

Total Page:16

File Type:pdf, Size:1020Kb

The Sufficiency of Information Privacy Protection in Saudi Arabia Maurer School of Law: Indiana University Digital Repository @ Maurer Law Theses and Dissertations Student Scholarship 2018 The Sufficiency of Information Privacy Protection in Saudi Arabia Abdulaziz Almebrad Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/etd Part of the Privacy Law Commons Recommended Citation Almebrad, Abdulaziz, "The Sufficiency of Information Privacy Protection in Saudi Arabia" (2018). Theses and Dissertations. 56. https://www.repository.law.indiana.edu/etd/56 This Dissertation is brought to you for free and open access by the Student Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. The Sufficiency of Information Privacy Protection in Saudi Arabia Abdulaziz Almebrad Submitted to the faculty of Indiana University Maurer School of Law, Bloomington in partial fulfillment of the requirements for the degree: Doctor of Juridical Science (SJD). November 2018 Accepted by the faculty, Indiana University, Maurer School of Law, in partial fulfillment of the requirements for the degree of Doctor of Juridical Science. Doctoral Committee: ~ Distinguished Professor and C. Ben Dutton Professor of Law "Sara~Hughe University~~ Scholar and Fellow in Commercial Law ~~IC--· Jayanth Krishnan Milt and Judi Stewart Professor of Law Date of the dissertation defense: November 27, 2018 DEDICATION To My Father, Abdullah, for spending great time and effort for my education, and for being a role model as an independent thinker. To My Mother, Jawaher, for being the perfect mother. Words cannot describe my feeling toward the greatest person in my life. To My Lovely Wife, Afnan, for holding my hand all the way to the end of this dissertation. To My Little Boys, Abdullah and Oday, for giving me a hug every day and saying, "good luck". To My family’s great friend, Sydney, for being a family to me and for always being there. ii ACKNOWLEDGMENTS In the first place, I would like to thank Allah for the grace he offered me in my life and for advancing me in my academic career. Second, I would like to express my greatest gratitude to my advisor Prof. Fred Cate for his valuable advice, support, and patience during my L.L.M and SJD degrees. I could receive no greater academic reward than having to write a dissertation under Prof. Fred Cate supervision. My appreciation is also extended to my dissertation committee members, Prof. Sarah Hughes and Prof. Jayanth Krishnan for sharing their insights. I would like also to express my gratitude and appreciation to the Graduate Legal Studies Office— Dean Lesley Davis, Prof. Gabrielle L. Goodwin, and Ms. May Rhea— for their generous and continuous support and advice throughout my LLM and SJD study at the Maurer School of Law on both the personal and the professional level. Lastly, but most importantly, my deep appreciation to my patents for their endless support throughout my life. My very special thanks go to my wife, Afnan, for being supportive and patient throughout my study. iii ABSTRACT Since the technology revolution, the rules of privacy law have rapidly changed in many countries to keep pace with new privacy challenges. Surprisingly, Saudi Arabia has no specific data protection legislation. This does not necessarily mean that people’s personal information is totally unprotected. In fact, the legal system in Saudi Arabia relies on both Islamic jurisprudence and written laws. Sharia law, the paramount body of law in Saudi Arabia, places a high value on an individual's privacy and prohibits any invasions therein, except in very limited circumstances. Moreover, other provisions relating to the sanctity and safety of individuals’ personal data are spread out over several legislative instruments. The dissertation discusses whether the current level of protection of individuals’ rights to privacy—particularly in the digital world— offered by both Sharia law and Saudi regulations is sufficient and effective; and recommends practical steps that can be taken to develop a stronger information privacy system. iv TABLE of CONTENT: Dedication ............... .......... ............................... ............................................................................... ii Acknowledgement .................. ..... .................... .... .......................................................................... iii Abstract ..... .............. ................................................................................................................ ....... iv Introduction .... ............. ......... .............................. .......................................................................... 1 Chapter one: Privacy in Sharia law v Introduction ....... ...................... ........................................... ............................... ..... .............. ..6 v Background ................ .............................. .............................................................................. ..9 Ø Sources of Sharia Law ............................. ....................................... ...... ... ....................... .9 § The Quran ..... ... ..... .............. ....................................................................................... ..9 § The Sunnah .............. ..... .............................................................................................. 10 § Scholars’ consensus (ijma) ............................................................................ ............ 11 § Reasoning by analogy (qiyas) ........................................ .......................................... 12 Ø The School of Law ............................................................................................................ 13 v The primary Islamic principles protecting information privacy ........... ........ ................... 13 Ø The prohibition of spying ............................................................................................... 14 § The general prohibition of spying in Islam .................................. .......................... 14 § Spying at someone’s home ........................... .......................... ............................... .... 15 § The usage of technology to invade someone’s house ...................... ........................ 16 § Private correspondence ........................... .......................... ............................... .... ....20 § Personal letters ..... ..................................................................................................... 21 § Spying on public places ......................................................................................... ...22 • Spying on public places by looking ................................................................... 23 • Listening to private conversations in public places ....................... ................... 24 Ø Seeking Permission .................................................................. ...................................... 26 § Seeking permission before entering someone’s home ...................... ................... ..27 • What is “home”?. .......................................... ...................... .................................27 § The role of General Custom .......................... .............................. ........ ..................... 28 § The purpose of seeking permission ............... .............. ............... ................... .......... 29 § Seeking permission is required .......................... .............................. ..... ....................30 • General permission ............................. ........ ........ .......................... ...................... 30 • Special permission/aggravating circumstances .......................... .......... .............30 § How to seek permission ......................... ... ........ ........ .......................... ...................... 33 • Explicit permission ............................. ........ ........ .......................... ...................... 33 • Implied permission ............................. ........ ........ .......................... ...................... 35 § The scope of the permission ............................. ........ ........ .......................... ............. 36 § The authority to give permission ............................. ........ ........ .......................... ......37 Ø Information pertaining to others ...... ....... ............................. .. ........ .......................... ......38 § Concealing others’ damaging information (sater al-awrat) ...................................39 § Keeping others’ confidential information (kitman alsir) .......................................43 • Professional relationships ...... ....... ............. .. ................ ........ .......................... ....45 • Non-professional relationships . ... ....... ........................ .. ... ..... ........ ............. ...... ..46 v Penalties/ punishment ……….. ............................. ...... ........ .......................... ...................... 48 Ø Material harm. ........ .................... ............................ ........ .......................... ...................... 49 Ø Moral harm ... ........ ....................... .......................... .......
Recommended publications
  • 01-English Annual Report-V19.Indd
    Annual Report 2012 Custodian of The Two Holy Mosques King Abdullah Bin Abdulaziz Al - Saud His Royal Highness Prince Salman bin Abdulaziz Al-Saud Crown Prince & First Deputy Prime Minister & Minister of Defense Contents Background & Introduction 01 Favourable Outlook for Future Growth 02 Our Vision, Mission and Objectives 03 Board of Directors and Executive Management 04 Financial Highlights 06 Milestones in Mobily’s History 07 Chairman’s Report 09 Managing Director’s Review 12 Management Review 15 Operations & Technology 16 Strategic Innovation 18 Customers 19 Sales & Marketing 20 Human Resource 21 Financial 22 Awards 23 Risk Management 24 CSR 24 Corporate Information 25 Financial Statements’ Index 26 Auditors’ Report 27 Consolidated Balance Sheet 28 Consolidated Statement of Income 29 Consolidated Statement of Cash Flows 30 Consolidated Statement of Changes in Shareholders’ Equity 31 Notes to the Consolidated Financial Statements 32 Background and introduction Etihad Etisalat Company (Mobily), is a Saudi joint stock Limited, incorporated in Bangalore, India, which began company, incorporated pursuant to the Council of Ministers’ commercial activities during 2008. In early 2009, the resolution number 189 of August 10, 2004 and Royal Decree remaining 0.01 percent of the subsidiary’s share capital number M/40 dated August 18, 2004. Mobily is registered in was acquired by National Company for Business Solutions, Riyadh under commercial registration number 1010203896 a subsidiary company. dated December 14, 2004. During 2008, the Company acquired 99 percent of The Company is the second authorised provider of mobile the partners’ shares in Bayanat Al-Oula for Network telecommunication services in Saudi Arabia, having begun Services Company, a Saudi limited liability company.
    [Show full text]
  • Saudi Arabia Page 1 of 18
    Saudi Arabia Page 1 of 18 Published on Freedom House (https://freedomhouse.org) Home > Saudi Arabia Saudi Arabia Country: Saudi Arabia Year: 2015 Status: Not Free Total Score: 73 (0 = Best, 100 = Worst) Obstacles to Access: 15 (0 = Best, 25 = Worst) Limits on Content: 24 (0 = Best, 35 = Worst) Violations of User Rights: 34 (0 = Best, 40 = Worst) Population: 30.8 million Internet Penetration: 64 percent Social Media/ICT Apps Blocked: Yes Political/Social Content Blocked: Yes Bloggers/ICT Users Arrested: Yes Press Freedom Status: Not Free Key Developments: https://freedomhouse.org/print/47723 12/8/2016 Saudi Arabia Page 2 of 18 June 2014–May 2015 • The Saudi television channel Rotana ordered Google to take down a video of the satirical YouTube show “Fitnah” on copyright grounds, after the show had used footage from Rotana to criticize its owner, Prince Waleed bin Talal. The video was later restored by YouTube (see Content Removal). • Human rights activists Waleed Abu al-Khair and Fowzan al-Harbi have had their prison sentences extended to 15 and 10 years, respectively, upon appeals by the public prosecutor (see Prosecutions and Detentions for Online Activities). • Raif Badawi, who co-founded the website Saudi Arabia Liberals, had his 10-year sentence suspended and later upheld by the Supreme Court and received the first set of 50 lashes in January. He was sentenced to a total 1,000 lashes, to be carried out in public (see Prosecutions and Detentions for Online Activities). • During a funeral for the victims of an attack by Islamic State (IS) militants on a Shiite mosque, political activist Waleed Sulais was beaten by two men who accused him of insulting them on social networks (see Intimidation and Violence).
    [Show full text]
  • A N N U a L R E P O R T F I G U R E S & F a C T S
    2 0 0 7 A n n u A l R e p o R t F i g u R e s & F A c t s Custodian of the Two Holy Mosques King Abdullah Bin Abdulaziz Al Saud His Royal Highness Crown Prince Sultan Bin Abdulaziz Al Saud The Deputy Premier & The Minister of Defence & Aviation & Inspector Table of Contents Chairman’s Statement >>> 7 Appendices Governor’s Statement >>> 9 Appendix (A): Board of Directors Decisions >>> 35 CITC Board >>> 11 Appendix (B): CITC Decisions >>> 36 Vision and Mission >>> 12 Appendix (C): Public Consultations >>> 37 1. Executive Summary >>> 13 Appendix (D): Licenses Issued >>> 38 2. ICT Sector in the Kingdom of Saudi Arabia >>> 14 Appendix (E): Spectrum Activities >>> 46 3. Organizational Structure and Manpower >>> 20 Appendix (F): CITC Financial Accounts >>> 47 4. Major Activities in year 2007 >>> 23 Appendix (G): Excerpts from the Code of Conduct >>> 48 5. Studies undertaken by the CITC >>> 31 6. Strategic Plan and 2008 Key Activities >>> 33 Chairman's Statement The information and communication technology (ICT) regulations and procedures, increase awareness of IT applications and benefits, and sector is a key element of the Saudi economy, with increasing promote its effective usage. impact on productivity and the gross domestic product. Liberalization of the telecommunications sector and the The Year 2007 saw the completion of an important stage towards full liberalization opening of markets to competition have contributed to the of the sector with the granting of the third license to provide mobile telecommunications revitalization of the national economy, increasing efficiency services, and with qualifications of three consortia for the award of new licenses for fixed and productivity, contributing to the higher rates of growth of telecommunications services, thus opening the fixed telephony market for competition for the national income and the development of human resources, first time in Saudi Arabia.
    [Show full text]
  • Saudi Arabia
    FREEDOM ON THE NET 2016 Saudi Arabia 2015 2016 Population: 31.5 million Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 70 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 15 14 Political/Social Content Blocked: Yes Limits on Content (0-35) 24 24 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 34 34 TOTAL* (0-100) 73 72 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • Internet penetration has risen on the back higher mobile broadband subscriptions (see Availability and Ease of Access). • Authorities throttled Telegram starting in January 2016 in order to prevent users from sharing images and files over the popular messaging app (seeBlocking and Filtering). • The head of Riyadh’s Committee for the Promotion of Virtue and the Prevention of Vice was dismissed after public outrage over a video of committee members harassing a girl outside of a mall (see Digital Activism). • Abdulkareem al-Khadar, Abdelrahman al-Hamid, and Abdulaziz al-Sinedi were respec- tively sentenced to 10, 9 and 8 years in prison for online advocacy against human rights violations. Saudi’s Supreme Court upheld a harsh verdict against liberal blogger Raif Bad- awi in June 2015, who had earlier been sentenced to 10 years in prison and 1,000 public lashes (see Prosecutions and Detentions for Online Activities). • Mobile phone operators are now required to fingerprint customers when selling new SIM cards, limiting the ability of Saudis to use their phones anonymously (see Surveillance, Privacy, and Anonymity).
    [Show full text]
  • Annual Report
    00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 4years 48 months 1460 days 35040 hour 2102400 minutes 126144000 seconds ANNUAL REPORT 2005 2006 2007 01010110101010101010101010101010000001111010101101010101010101010101010100000011110101011010101010101010101010101000000111101010110101010101010101010101010000001112008 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:0000:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: Today we dare to win Tomorrow are countless moments of success ANNUAL REPORT 2008 101010110101010101010101010101010000001111010101101010101010101010110101010101010101010101010000001111010101101010101010101010101010100000011110101011010101010101 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: Life is a succession of moments to live each is to succeed 1010101101010101010101010101010100000011110101011010101010101010101101010101010101010101010100000011110101011010101010101010101010101000000111101010110101010101010101011010101010101010101010101000000111101010110101010101010101010101010000001111010101101010101010101010101010100000011110101011010101010101010101010101000000111 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:0000:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:
    [Show full text]
  • Prospectus of Arabian Internet and Communications Services Co
    Prospectus of Arabian Internet and Communications Services Co. A closed Saudi joint stock company pursuant to Ministry of Commerce is made, the second subscription will be considered void and only the first subscription will Resolution No. 144 dated 08/05/1442H (corresponding to 23/12/2020G) and be accepted. A maximum of two million, four hundred thousand (2,400,000) Offer Shares, rep- registered in Riyadh under Commercial Registration No. 1010183482 dated resenting 10% of the total Offer Shares, will be allocated to Individual Investors, provided that Participating Parties subscribe to all the Offer Shares allocated thereto. In the event that 08/11/1423H (corresponding to 11/01/2003G) Individual Investors subscribe for all the Offer Shares allocated thereto, the Lead Managers Offering of twenty-four million (24,000,000) ordinary shares, representing shall have the right to reduce the number of shares allocated to Individual Investors in pro- 20% of the capital of Arabian Internet and Communications Services Co, for portion to the number of Offer Shares subscribed for thereby. public subscription at an Offer Price of [ • ] Saudi riyals (SAR [ • ]) per share Prior to the Offering, both Saudi Telecom Company (stc) and Telecom Commercial Invest- ment Company Limited (the "Selling Shareholders") own all the shares of the Company. Offering Period: Three (3) days commencing on Sunday, 12/02/1443H The Selling Shareholders will sell the Offer Shares in accordance with Table 5.1 “Ownership (corresponding to 19/09/2021G) and ending on Tuesday, 14/02/1443H Structure of the Company Pre-and Post-Offering” of this Prospectus and listed on page (corresponding to 21/09/2021G) 80 of this Prospectus.
    [Show full text]
  • Annual Report 1426H / 1427H 2006
    HARVESTING REWARDS DEEPER ROOTS... ANNUAL REPORT 2006 Custodian of the Two Holy Mosques King Abdullah Bin Abdulaziz Al Saud His Royal Highness Crown Prince Sultan Bin Abdulaziz Al Saud The Deputy Premier & The Minister of Defence & Aviation & Inspector General 2 Table of Contents Chairman’s Statement ................................................................................................................................................................................................................................................................5 Governor’s Statement ...............................................................................................................................................................................................................................................................7 CITC Board .................................................................................................................................................................................................................................................................................. 9 Vision and Mission ....................................................................................................................................................................................................................................................................10 1. Executive Summary .............................................................................................................................................................................................................................................................11
    [Show full text]
  • Saudi Arabia
    FREEDOM ON THE NET 2014 Saudi Arabia 2013 2014 Population: 30.1 million Not Not Internet Freedom Status Internet Penetration 2013: 60 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 14 15 Political/Social Content Blocked: Yes Limits on Content (0-35) 24 24 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 32 33 TOTAL* (0-100) 70 72 Press Freedom 2014 Status: Not Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • At least 35 news websites were blocked in December for failing to register with authorities, in the first signs that the government is enforcing e-publishing legislation passed in 2011 (see Limits on Content). • Similarly, the General Commission for Audiovisual Media announced in April that it will begin monitoring YouTube videos produced in the country for compliance with local laws (see Limits on Content). • A new anti-terrorism law criminalizes online expression that promotes atheism, insults the state’s reputation, harms public order, or threatens state security, among other things. Limits on arbitrary detention were also repealed, allowing security forces to detain individuals indefinitely and without charge (seeViolations of User Rights). • Prison sentences related to online activism and free expression have grown over the past year, with prominent human rights activists Mukhlif al-Shammari, Waleed Abu al-Khair, and Fadhel al-Manafes jailed for 5 to 15 years. Seven men from the Eastern province were sentenced to 5 to 10 years under the Anti-Cyber Crime Law for allegedly inciting protest and damaging public order through Facebook.
    [Show full text]
  • Saudi Arabia: Freedom on the Net 2017
    FREEDOM ON THE NET 2017 Saudi Arabia 2016 2017 Population: 32.3 million Not Not Internet Freedom Status Internet Penetration 2016 (ITU): 73.8 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 14 14 Political/Social Content Blocked: Yes Limits on Content (0-35) 24 24 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 34 34 TOTAL* (0-100) 72 72 Press Freedom 2017 Status: Not Free * 0=most free, 100=least free Key Developments: June 2016 – May 2017 • The government outlined plans to significantly increase broadband penetration by 2020 (see Availability and Ease of Access). • An online campaign to end male guardianship caught the attention of the royal court and resulted in gradual reforms (see Digital Activism). • A court increased an activist’s prison sentence for advocating for human rights online from 9 to 11 years on appeal; others were newly detained (see Prosecutions and Detentions for Online Activities). • Public institutions lost critical data in major cyberattacks, including the civil aviation authority, a chemical company, and the labor ministry (see Technical Attacks). 1 www.freedomonthenet.org Introduction FREEDOM SAUDI ARABIA ON THE NET Obstacles to Access 2017 Introduction Availability and Ease of Access Saudi internet freedom remained restricted in 2017, despite effective digital activism for women’s Restrictions on Connectivity rights. Several human rights defenders were jailed for social media posts. Saudi Arabia unveiled its monumental “Vision 2030” reform and development targets in April 2016. ICT Market The plan included measures to increase competitiveness, foreign direct investment, and non-oil government revenue by 2030.1 The government also announced a National Transformation Program in June 2016 which included several ICT specific targets to be achieved by 2020, including increasing Regulatory Bodies fixed-line broadband penetration in densely populated areas from 44 to 80 percent, and increasing wireless broadband penetration in rural areas from 12 to 70 percent.
    [Show full text]
  • A B C Chd Dhe FG Ghhi J Kkh L M N P Q RS Sht Thu V WY Z Zh
    Arabic & Fársí transcription list & glossary for Bahá’ís Revised September Contents Introduction.. ................................................. Arabic & Persian numbers.. ....................... Islamic calendar months.. ......................... What is transcription?.. .............................. ‘Ayn & hamza consonants.. ......................... Letters of the Living ().. ........................ Transcription of Bahá ’ı́ terms.. ................ Bahá ’ı́ principles.. .......................................... Meccan pilgrim meeting points.. ............ Accuracy.. ........................................................ Bahá ’u’llá h’s Apostles................................... Occultation & return of th Imám.. ..... Capitalization.. ............................................... Badı́‘-Bahá ’ı́ week days.. .............................. Persian solar calendar.. ............................. Information sources.. .................................. Badı́‘-Bahá ’ı́ months.. .................................... Qur’á n suras................................................... Hybrid words/names.. ................................ Badı́‘-Bahá ’ı́ years.. ........................................ Qur’anic “names” of God............................ Arabic plurals.. ............................................... Caliphs (first ).. .......................................... Shrine of the Bá b.. ........................................ List arrangement.. ........................................ Elative word
    [Show full text]
  • Freedom on the Net 2019
    Saudi Arabia Not Free 25 100 A Obstacles to Access 11 25 B Limits on Content 10 35 C Violations of User Rights 440 Last Year's Score & Status 27 100 Not Free Overview While internet access is widespread and relatively affordable, Saudi Arabia’s restrictive absolute monarchy places extensive limits on the range of information and services available online. Authorities operate extensive censorship and surveillance systems, and regime critics, activists, and others perceived as voicing dissent online are subject to severe punishment. Dissidents outside the country are increasingly becoming targets of state repression. Mounting evidence indicates that prominent journalist Jamal Khashoggi was murdered by Saudi security agents at the country’s consulate in Istanbul. In the aftermath of his death, reports emerged of coordinated efforts by the government to suppress online discussion of the killing and associated criticism of authorities, and to smear government opponents. The absolute monarchy restricts almost all political rights and civil liberties. No officials at the national level are elected. The regime relies on extensive surveillance, the criminalization of dissent, appeals to sectarianism and ethnicity, and public spending supported by oil revenues to maintain power. Key Developments June 1, 2018 – May 31, 2019 Mounting evidence indicates that Jamal Khashoggi, a prominent journalist, was tortured and murdered by Saudi security agents in October 2018 at the Saudi consulate in Istanbul. Moreover, human rights groups reported that a Yemeni writer and online activist was forcibly disappeared by Saudi authorities in September of the same year, while a number of women activists testified that they faced torture and sexual abuse while in detention (see C7).
    [Show full text]
  • Terrorism & Political Islam Origins, Ideologies, And
    TERRORISM & POLITICAL ISLAM ORIGINS, IDEOLOGIES, AND METHODS A Counterterrorism Textbook 2nd Edition EDITORS: ERICH IVIARQUARDT CHRISTOPHER HEFFELFINGER. The views expressed in this book are solely those of the authors and not of the U.S. Military Academy the Department of the Army the Federal Bureau of Investigation or any other agency of the U.S. Government. ACLURM000540 Table of Contents Foreword iii FBI Counterterrorism Division ix Preface b6 b7C Copyright and Permissions Information xi 1. Modern Terror: The Four Waves 1 David Rapoport Understanding Islam 2. Understanding Islam and Islamism 29 3. Growth of the Muslim Brotherhood and its Offshoots 43 b6 b7C 4. Assessing unni Activism 71 5. From Ali to Khomeini: The Development of Shiite Islamism 75 6. When the Shiites Rise 95 Vali Nasr Cultural and Regional Studies 7. Arabic Familiarization: History and Background 107 `1WWWW/filT7IN rmation and Name Construction 112 8. Terrorism and Islamist Militancy in Southeast Asia 125 b6 b7C 9. uI ramivaramrn • • in South Asia: An Overview 147 10. n erstan in i audi Arabia 181 iii ACLURM000541 11. Understandin North Africa 197 b6 12.The 217 b7C t 13. Europe's Angry Muslims 243 Robert Leiken 14. Jihadism in the US: Creatipg an Ideological Profile 255 b6 b7C Terror Groups 15. Eight Phases to Restoring the Caliphate: Al Qa'ida's Long-Term Strategy Against the West 271 b6 16. Unraveling Al Qa'ida's Target Selection Calculus 291 b7C 17. Hamas Social Welfare: In the Service of Terror 303 Matthew Levitt 18. Lebanon, Hizbollah, and the Patrons of Terrorism 323 Richard Wrona, Jr.
    [Show full text]