Al Qaeda Electronic: a Sleeping Dog?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Jihadism: Online Discourses and Representations
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de. -
How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated. -
Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
Lessons From Colombia For Curtailing The Boko Haram Insurgency In Nigeria BY AFEIKHENA JEROME igeria is a highly complex and ethnically diverse country, with over 400 ethnic groups. This diversity is played out in the way the country is bifurcated along the lines of reli- Ngion, language, culture, ethnicity and regional identity. The population of about 178.5 million people in 2014 is made up of Christians and Muslims in equal measures of about 50 percent each, but including many who embrace traditional religions as well. The country has continued to experience serious and violent ethno-communal conflicts since independence in 1960, including the bloody and deadly thirty month fratricidal Civil War (also known as the Nigerian-Biafran war, 1967-70) when the eastern region of Biafra declared its seces- sion and which claimed more than one million lives. The most prominent of these conflicts recently pitch Muslims against Christians in a dangerous convergence of religion, ethnicity and politics. The first and most dramatic eruption in a series of recent religious disturbances was the Maitatsine uprising in Kano in December 1980, in which about 4,177 died. While the exact number of conflicts in Nigeria is unknown, because of a lack of reliable sta- tistical data, it is estimated that about 40 percent of all conflicts have taken place since the coun- try’s return to civilian rule in 1999.1 The increasing wave of violent conflicts across Nigeria under the current democratic regime is no doubt partly a direct consequence of the activities of ethno- communal groups seeking self-determination in their “homelands,” and of their surrogate ethnic militias that have assumed prominence since the last quarter of 2000. -
Kamikazes! When Japanese Planes Attacked the U.S. Submarine Devilfish
KAMIKAZES! When Japanese Planes Attacked the U.S. Submarine Devilfish by NATHANIEL PATCH he image of desperate Japanese pilots purposely flying their Tplanes into American warships in the closing months of World War II figures prominently in American popular culture. When most people hear the term kamikaze, they think Fortunately, the Devilfish was close to the surface when of swarms of planes flying through a torrent of antiaircraft the explosion occurred, and the submarine took only mi fire and plowing into the decks of aircraft carriers, battle nor damage that the crew could control. ships, cruisers, and destroyers, taking the lives of sailors and The officers and crew in the control room took quick ac damaging or sinking the ships in this desperate act. tion to prevent the submarine from sinking and to mitigate Out of the hundreds of these attacks, one was quite un the damage done by the incoming saltwater. They leveled usual: the only kamikaze attack on an American subma off the submarine at 80 feet, and the drain pumps were rine, the USS Devilfish (SS 292). barely keeping up with the incoming water. The bilges of Why was this submarine attacked, and why was there the conning tower filled rapidly, and water began pouring only one attacker? The story of the attack on the Devilfish into the control room. A constant spray of saltwater from seems to be a fragment of a larger story, separated by time the conning tower splashed onto the electrical panels and and distance, occurring on March 20, 1945. If kamikazes consoles in the control room. -
Foreign Military Interventions and Suicide Attacks
Article Journal of Conflict Resolution 2017, Vol. 61(2) 271-297 ª The Author(s) 2015 Foreign Military Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0022002715576575 Interventions journals.sagepub.com/home/jcr and Suicide Attacks Seung-Whan Choi1, and James A. Piazza2 Abstract This study examines the effect of foreign military interventions on the incidence of suicide attacks. It presents three theoretical explanations. Foreign military inter- ventions may boost insurgent use of suicide attacks by (a) fomenting a nationalist backlash that sanctions the use of more extreme and unconventional tactics like suicide attacks, (b) providing more and better targets against which suicide attacks can be launched, or (c) prompting insurgents to use suicide tactics in order to overcome their power asymmetries and to confront better defended targets that are enhanced by interventions. We test these competing explanations using a bat- tery of statistical tests on cross-national, time-series data for 138 countries during the period from 1981 to 2005. We find that only foreign interventions with specific features—pro-government interventions involving larger numbers of ground troops—boost suicide attacks in countries experiencing interventions. This finding suggests that by tipping the balance of power against insurgents and hardening targets in the context of assisting a local government, foreign military interventions are likely to increase the use of suicide attacks by regime challengers. Keywords terrorism, suicide bombings, military intervention, international security 1Department of Political Science (MC 276), University of Illinois at Chicago, Chicago, IL, USA 2Department of Political Science, Pennsylvania State University, University Park, PA, USA Corresponding Author: James A. -
Symbols of Islam
Symbols of Islam Calligraphic representation of the word Allah A troop of spectators on horseback and with inscribed banners Designs used as symbols of Islam include calligraphy watching a procession. Illustration from the seventh Maqama of of important concepts or phrases, such as the shahada, al-Hariri of Basra in a 13th-century manuscript (BNF ms. arabe takbir, basmala, etc.; besides this the colour green is often 5847). used as symbolising Islam. The star and crescent symbol was the emblem of the Ottoman Empire in the 19th cen- tury, and gradually became associated with Islam in late • The Abbasids chose black (blue) and fought under 19th-century Orientalism. black banners. • The Fatimids used a green standard, as well as white with gold. 1 Colour • Various countries on the Persian Gulf have chosen red flags Further information: Black Standard Further information: Green in Islam • The Fatimas used the colour purple to symbolise Early Islamic armies and caravans flew simple solid- humming birds. coloured flags (generally black or white) for identifica- tion purposes. In later generations, the Muslim lead- These four Pan-Arab colours, white, black, green and red, ers continued to use a simple black, white, or green flag dominate the flags of Arab states.[1][2] with no markings, writings, or symbolism on it. Muham- The color brown is often believed to symbolize purity and mad used flags of different colours in different Ghazwat peace. Many Muslims wear the color white when they at- (or campaigns commanded by Muhammad himself) and tend Friday prayers. The color black is considered the Saraya (or campaigns commanded by Sahabah, the com- colour of mourning in Western and Mediterranean coun- panions of Muhammad). -
Homeland Security Implications of Radicalization
THE HOMELAND SECURITY IMPLICATIONS OF RADICALIZATION HEARING BEFORE THE SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 20, 2006 Serial No. 109–104 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PRINTING OFFICE 35–626 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman DON YOUNG, Alaska BENNIE G. THOMPSON, Mississippi LAMAR S. SMITH, Texas LORETTA SANCHEZ, California CURT WELDON, Pennsylvania EDWARD J. MARKEY, Massachusetts CHRISTOPHER SHAYS, Connecticut NORMAN D. DICKS, Washington JOHN LINDER, Georgia JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DEFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of JIM GIBBONS, Nevada Columbia ROB SIMMONS, Connecticut ZOE LOFGREN, California MIKE ROGERS, Alabama SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BILL PASCRELL, JR., New Jersey KATHERINE HARRIS, Florida DONNA M. CHRISTENSEN, U.S. Virgin Islands BOBBY JINDAL, Louisiana BOB ETHERIDGE, North Carolina DAVE G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island MICHAEL MCCAUL, Texas KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania GINNY BROWN-WAITE, Florida SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California MARK E. -
Public Diplomacy, New Media, and Counterterrorism Philip Seib
Public Diplomacy, New Media, and Counterterrorism Philip Seib March 2011 Figueroa Press Los Angeles Public Diplomacy, New Media, and Counterterrorism Philip Seib Published by FIGUEROA PRESS 840 Childs Way, 3rd Floor Los Angeles, CA 90089 Phone: (213) 743-4800 Fax: (213) 743-4804 www.figueroapress.com Figueroa Press is a division of the USC Bookstore Copyright © 2011 all rights reserved Notice of Rights All rights reserved. No part of this book may be reproduced or transmit- ted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission from the author, care of Figueroa Press. Notice of Liability The information in this book is distributed on an “As is” basis, without warranty. While every precaution has been taken in the preparation of this book, neither the author nor Figueroa nor the USC Bookstore shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by any text contained in this book. Figueroa Press and the USC Bookstore are trademarks of the University of Southern California ISBN 13: 978-1-932800-81-4 ISBN 10: 1-932800-81-6 For general inquiries or to request additional copies of this paper please contact: USC Center on Public Diplomacy at the Annenberg School University of Southern California 3502 Watt Way, G4 Los Angeles, CA 90089-0281 Tel: (213) 821-2078; Fax: (213) 821-0774 [email protected] www.uscpublicdiplomacy.org CPD Perspectives on Public Diplomacy CPD Perspectives is a periodic publication by the USC Center on Public Diplomacy, and highlights scholarship intended to stimulate critical thinking about the study and practice of public diplomacy. -
Variations in Naevi Poetry (MSR XVII, 2013)
Woven Together as Though Randomly Strung: Variation in Collections of Naevi Poetry Compiled by al-Nuwayrī and al-Sarī al-Raffāʾ AAda TAdam Adam Talib American University in Cairo Woven Together as Though Randomly Strung: Variation in Collections of Naevi Poetry Compiled by al-Nuwayrī and al-Sarī al-Raffāʾ Naevi, commonly known as birthmarks or moles, are a recurring theme in pre- modern Arabic erotic poetry. 1 Like other bodily features, birthmarks (Arabic: Woven Together as Though Randomly Strung khāl, pl. khīlān; also shāmah, pl. shāmāt) are a topos of erotic poetry that allows poets to amplify a mark of beauty through allusion, simile, and metaphor into a poetic statement (maʿná). 2 The trope seems to have emerged in the early Abbasid period and soon became ubiquitous. 3 As with other poetic figures, anthologists collected many of these verses together into stand-alone chapters. The objectives of these collections differed; some brought these poems together as an introduc- © The Middle East Documentation Center. The University of Chicago. I was very fortunate to benefit from the detailed attention and criticism of several leading schol- ars in preparing this piece. To Thomas Bauer, Marlé Hammond, Elias Muhanna, Nadia Jamil, Wilferd Madelung, Julia Bray, Hilary Kilpatrick, and—above all—to Geert Jan van Gelder, I ex- press my thanks. Nevertheless, I am solely responsible for any errors or shortcomings here. 1 This theme is common in Arabic’s sister literary traditions Persian and Ottoman as well. Per- haps the most famous line of poetry on this topic in any language is by Ḥāfiẓ (d. -
Hidden Battlefields
HIDDEN BATTLEFIELDS: REHABILITATING ISIS AFFILIATES AND BUILDING A DEMOCRATIC CULTURE IN THEIR FORMER TERRITORIES DECEMBER 2020 HIDDEN BATTLEFIELDS: REHABILITATING ISIS AFFILIATES AND BUILDING A DEMOCRATIC CULTURE IN THEIR FORMER TERRITORIES DECEMBER 2020 CONTENTS ABSTRACT 04 — 05 DEFINITIONS AND METHODOLOGY 06 — 07 AUTHORS 07 1. INTRODUCTION 08 — 12 1.1 TERRITORIAL DEFEAT OF ISIS 08 1.2 DETENTION FACILITIES 08 1.3 DEFUSING THE TIME-BOMB: THE NEED FOR REHABILITATION 11 2. ISIS’ LEGACY IN NORTH AND EAST SYRIA (NES) 12 — 22 2.1. ISIS’ IDEOLOGY IN NES 12 — 16 2.1.1 THEOLOGICAL, POLITICAL AND SOCIAL ASPECTS 12 2.1.2 INDOCTRINATION METHODS UNDER ISIS 14 2.1.3 IMPLICATIONS FOR REHABILITATION PROGRAMS 16 FACTBOX: DETENTION CENTERS HOLDING ISIS AFFILIATES IN NES: AN OVERVIEW 17 — 19 2.2 NON-IDEOLOGICAL MOTIVES FOR JOINING ISIS 19 — 21 2.2.1 IMPLICATIONS FOR REHABILITATION PROGRAMS 21 — 22 3. NES’ POLITICAL FRAMEWORK AND THE POLITICS OF AMNESTIES 22 — 30 3.1 DEMOCRACY, DECENTRALIZATION AND SECULARISM IN NES 22 — 23 3.2 JUSTICE REFORM IN NES 24 3.3 EDUCATION AND WOMEN’S EMPOWERMENT IN NES 25 3.4 RELOCATIONS, RETURNS AND AMNESTIES 25 — 30 3.4.1 AMNESTY FOR HOL CAMP RESIDENTS AND ISIS PRISONERS 26 — 27 3.4.2 TRANSFERS FROM AND EXPANSION OF HOL CAMP 28 3.4.3 AMNESTIES AND TRANSFERS IN THE CONTEXT OF 29 — 30 REHABILITATION AND REFORM 2 HIDDEN BATTLEFIELDS: REHABILITATING ISIS AFFILIATES AND BUILDING A DEMOCRATIC CULTURE IN THEIR FORMER TERRITORIES DECEMBER 2020 CONTENTS 4. REHABILITATION INITIATIVES IN DETENTION FACILITIES AND BEYOND 30 — 45 4.1 REHABILITATING