Proximity and Semi-Metric Analysis of Social Networks

Total Page:16

File Type:pdf, Size:1020Kb

Proximity and Semi-Metric Analysis of Social Networks Proximity and Semi-Metric Analysis of Social Networks Advanced Knowledge Integration In Assessing Terrorist Threats LDRD-DR Network Analysis Component LAUR 02-6557 Luis M Rocha1 Modeling, Algorithms, and Informatics Group (CCS-3) Los Alamos National Laboratory, MS B256 1 Eugene Gavrilov and Jim Gattiker participated in the work here described, by producing necessary databases and generating data sets and proximity measures as specified throughout the text. TABLE OF CONTENTS 1. Data Sets ......................................................................... 1 2. Proximity Relations ................................................................. 1 2.1 Mathematical Background .................................................... 1 2.1.1 Crisp Relations .................................................... 1 2.1.2 Fuzzy Relations ................................................... 2 2.1.3 Binary Relations and Graphs ......................................... 2 2.1.4 Properties of Graphs ................................................ 2 2.1.5 Composition of Graphs .............................................. 3 2. 1.6 Transitive Closure ................................................. 3 2.1.7 Similarity Relations ................................................ 3 2.1.8 Proximity Relations ................................................ 4 2.2 Proximity Relations as Co-Occurrence Probabilities ................................ 4 2.3 Extracting Proximity Relations from the Datasets .................................. 6 3. Analysis of Proximity Graphs ......................................................... 7 3.1 NetStat ................................................................... 7 3.2 Comparison with PEOPLE_DOCUMENTS1 Subset used by Lattice Group ................ 10 4. Semi-metric Behavior of Proximity Graphs .............................................. 13 4.1 From Proximity to Distance .................................................. 13 4.2 Semi-metric behavior: latent associations ....................................... 13 4.3 Characterizing Semi-metric behavior .......................................... 14 5 Analysis of Semi-Metric Behavior in Datasets: Capturing Indirect and Latent Associations ......... 15 5.1 Semi-metric behavior of Distance Graphs ....................................... 15 5.2 Identification of Latent Pairs ................................................. 16 5.3 Comparison with Lattice Subset .............................................. 18 6 Confidence in Results: Capturing Latent Knowledge ....................................... 20 ii 6.1 Expert Test ............................................................... 21 6.2 Random Deletions Test ..................................................... 23 7 Conclusions and Future Work ......................................................... 35 References ......................................................................... 35 Appendix A - Proximity Data .......................................................... 36 A1. Pairs of names with PDP1 $3 ................................................ 36 A2. Pairs of names with Transitive Closure of PDP1 $3 .............................. 38 A3. Pairs of cities with CDP1 $3 ................................................. 41 A4. Pairs of cities with transitive closure of CDP1 $3 ................................ 42 A5. Pairs of people names with PDP2 $3 .......................................... 44 A6. Pairs of people names with transitive closure of PDP2 $3 .......................... 50 A7. Pairs of events with EGP $3 ................................................. 68 A8. Pairs of events with transitive closure of EGP $3 ................................. 69 A9. Pairs of group names with GEP $3 ............................................ 70 A10. Pairs of group names with transitive closure of GEP $3 .......................... 71 A11. Pairs of events with EPP $3 ................................................ 71 A12. Pairs of events with transitive closure of EPP $3 ................................ 71 A13. Pairs of people names with PEP $3 .......................................... 72 A14. Pairs of people names with transitive closure of PEP $3 .......................... 79 A15. Pairs of group names with GPP $3 ........................................... 94 A16. Pairs of group names with transitive closure of GPP $3 ........................... 95 A17. Pairs of people names with PGP $3 .......................................... 95 A18. Pairs of people names with transitive closure of PGP $3 .......................... 95 A18. Pairs of people names with PRP $3 .......................................... 95 A20. Pairs of people names with transitive closure of PRP $3 ......................... 106 A21. Pairs of related people names with RPP $3 ................................... 107 iii A22. Pairs of related people names with transitive closure of RPP $3 ................... 109 Appendix B: Semi-Metric Pairs ........................................................ 113 B1: PDP1 .................................................................. 113 B1.1: Pairs of people names with s $ 2 .................................... 113 B1.2: Pairs of people names with rs $ 0.25 ................................. 114 B1.3: Pairs of people names with b $ 2 .................................... 114 B2: CDP1 ................................................................. 115 B2.1: Pairs of city names with s $ 2 ...................................... 115 B2.2: Pairs of city names with rs $ 0.25 ................................... 115 B2.3: Pairs of city names with b $ 2 ...................................... 115 B3: PDP2 .................................................................. 116 B3.1: Pairs of people names with s $ 2 .................................... 116 B3.2: Pairs of people names with rs $ 0.25 ................................. 119 B3.3: Pairs of people names with b $ 2 .................................... 121 B4: EGP ................................................................... 132 B4.1: Pairs of events with s $ 2 .......................................... 132 B4.2: Pairs of events with rs $ 0.25 ...................................... 132 B4.3: Pairs of events with b $ 2 ......................................... 132 B5: GEP ................................................................... 132 B5.1: Pairs of group names with s $ 2 ..................................... 132 B5.2: Pairs of group names with rs $ 0.25 ................................. 132 B5.3: Pairs of group names with b $ 2 .................................... 133 B6: EPP ................................................................... 133 B6.1: Pairs of events with s $ 2 .......................................... 133 B6.2: Pairs of events with rs $ 0.25 ...................................... 133 B6.3: Pairs of events with b $ 2 ......................................... 133 iv B7: PEP ................................................................... 133 B7.1: Pairs of people names with s $ 2 .................................... 133 B7.2: Pairs of people names with rs $ 0.25 ................................. 133 B7.3: Pairs of people names with b $ 2 .................................... 133 B8: GPP ................................................................... 133 B8.1: Pairs of group names with s $ 2 ..................................... 133 B8.2: Pairs of group names with rs $ 0.25 ................................. 133 B8.3: Pairs of group names with b $ 2 .................................... 133 B9: PGP ................................................................... 134 B9.1: Pairs of people names with s $ 2 .................................... 134 B9.2: Pairs of people names with rs $ 0.25 ................................. 134 B9.3: Pairs of people names with b $ 2 .................................... 134 B10: PRP .................................................................. 134 B10.1: Pairs of people names with s $ 2 ................................... 134 B10.2: Pairs of people names with rs $ 0.25 ................................ 135 B10.3: Pairs of people names with b $ 2 ................................... 137 B11: RPP .................................................................. 137 B11.1: Pairs of related people names with s $ 2 ............................. 137 B11.2: Pairs of related people names with rs $ 0.25 .......................... 138 B11.3: Pairs of related people names with b $ 2 ............................. 139 v 1. DATA SETS We received several data sets for the Network Analysis component. From the document reports stored in the original Lotus Notes database, Eugene Gavrilov created an SQL database for use by the entire project. From the first load of this database, the relation between people names and documents was deemed of interest. We refer to this as the PEOPLE_DOCUMENTS1 dataset. Another relation between cities and documents was also studied: CITIES_DOCUMENTS1. Later, when new documents and additional relations were added to the Lotus Notes database, Eugene Gavrilov updated the SQL database. From this novel database we again extracted the relation between people names and documents: PEOPLE_DOCUMENTS2. We furthermore extracted four additional relations of interest: 1. EVENTS_GROUPS: A Relation between terrorist events and terrorist organizations. 2. EVENTS_PEOPLE: A Relation between terrorist events and people names. 3. GROUPS_PEOPLE: A Relation between terrorist organizations
Recommended publications
  • Al Qaeda and US Homeland Security After Bin Laden-1
    CERI STRATEGY PAPERS N° 12 – Rencontre Stratégique du 10 novembre 2011 Al Qaeda and U.S. Homeland Security after Bin Laden Rick “Ozzie” NELSON The author is the Director of the Homeland Security and Counterterrorism Program at the Center for Strategic and International Studies, Washington, D.C. Portions of this paper relating to al Qaeda and its affiliates are drawn from The Al Qaeda and Associate Movements (AQAM) Futures Project, a collaboration between the CSIS Homeland Security and Counterterrorism Program and the CSIS Transnational Threats Project. More information on The AQAM Futures Project can be found at http://csis.org/program/future- al-qaeda-and-associated-movements-aqam. Introduction In the past year al Qaeda has suffered a series of staggering blows that have severely damaged the group and will irrevocably alter the way it operates. Last spring, Osama bin Laden was killed in a dramatic raid on his compound in Pakistan, followed by strikes on a number of other prominent al Qaeda leaders, including Anwar al-Awlaki in Yemen, Atiyah Abd al-Rahman in Pakistan, and Fazul Abdullah Mohammed in Somalia, among others1. Further, al Qaeda was caught off-guard by the “Arab Spring” revolutions that broke out across the Middle East and North Africa. These revolutions have since succeeded in toppling several regional strongmen, an avowed goal of al Qaeda that it has been unable to accomplish through terrorism. With al Qaeda’s leaders on the defensive and the efficacy of its ideology threatened by a new generation of political activists, many policymakers are increasingly questioning the future of the group2.
    [Show full text]
  • Al Shabaab's American Recruits
    Al Shabaab’s American Recruits Updated: February, 2015 A wave of Americans traveling to Somalia to fight with Al Shabaab, an Al Qaeda-linked terrorist group, was described by the FBI as one of the "highest priorities in anti-terrorism." Americans began traveling to Somalia to join Al Shabaab in 2007, around the time the group stepped up its insurgency against Somalia's transitional government and its Ethiopian supporters, who have since withdrawn. At least 50 U.S. citizens and permanent residents are believed to have joined or attempted to join or aid the group since that time. The number of Americans joining Al Shabaab began to decline in 2012, and by 2014, the Islamic State of Iraq and Syria (ISIS) replaced Al Shabaab as the terrorist group of choice for U.S. recruits. However, there continue to be new cases of Americans attempting to join or aid Al Shabaab. These Americans have received weapons training alongside recruits from other countries, including Britain, Australia, Sweden and Canada, and have used the training to fight against Ethiopian forces, African Union troops and the internationally-supported Transitional Federal Government in Somalia, according to court documents. Most of the American men training with Al Shabaab are believed to have been radicalized in the U.S., especially in Minneapolis, according to U.S. officials. The FBI alleges that these young men have been recruited by Al Shabaab both on the Internet and in person. One such recruit from Minneapolis, 22-year-old Abidsalan Hussein Ali, was one of two suicide bombers who attacked African Union troops on October 29, 2011.
    [Show full text]
  • Chapter 7 War on Terror
    Chapter 7 War on Terror Thou shall not kill – But we will. In July 2005, Ahmed Ressam was sentenced to 22 years of impris- onment after a jury convicted him of an attempt to bomb Los Angeles International Airport on the eve of the millennium. Emphasizing the rule of law in punishing terrorists, US District Judge John C. Coughenour made the following comments during the sentencing hearing: I would like to convey the message that our system works. We did not need to use a secret military tribunal, or detain the defendant indefinitely as an enemy combatant, or deny him the right to coun- sel, or invoke any proceedings beyond those guaranteed by or con- trary to the US Constitution...Despite the fact that Mr. Ressam is not an American citizen and despite the fact that he entered this country intent upon killing American citizens, he received an effec- tive, vigorous defense, and the opportunity to have his guilt or inno- cence determined by a jury of 12 ordinary citizens. Most importantly, all of this occurred in the sunlight of a public trial. There were no secret proceedings, no indefinite detention, no denial of counsel. The tragedy of September 11th shook our sense of security and made us realize that we, too, are vulnerable to acts of terrorism. Unfortunately, some believe that this threat renders our Constitution obsolete. The war on terror is the antithesis of the criminal justice system that Judge Coughenour describes above. The criminal justice sys- tem is the peacetime legal infrastructure to arrest, indict, prose- War on Terror 249 cute, and punish persons accused of committing terrorists acts.
    [Show full text]
  • Ghailani, Ahmed Khalfan Verdict
    United States Attorney Southern District of New York FOR IMMEDIATE RELEASE CONTACT: U.S. ATTORNEY'S OFFICE NOVEMBER 17, 2010 ELLEN DAVIS, EDELI RIVERA, JESSIE ERWIN PUBLIC INFORMATION OFFICE (212) 637-2600 AHMED KHALFAN GHAILANI FOUND GUILTY IN MANHATTAN FEDERAL COURT OF CONSPIRING IN THE 1998 DESTRUCTION OF UNITED STATES EMBASSIES IN EAST AFRICA RESULTING IN DEATH Al Qaeda Terrorist And First Guantanamo Detainee To Be Tried In Civilian Court Faces Possible Life Sentence In January PREET BHARARA, the United States Attorney for the Southern District of New York, announced that AHMED KHALFAN GHAILANI was found guilty today for his role in the 1998 bombings of the United States Embassies in Kenya and Tanzania that took the lives of 224 people, including 12 Americans. GHAILANI, 36, a Tanzanian national and the first detainee held at the Guantanamo Bay Naval Base in Cuba to be tried in a civilian court, was found guilty of conspiring to destroy property and buildings of the United States, following a five week trial before U.S. District Judge LEWIS A. KAPLAN. GHAILANI faces a mandatory minimum sentence of 20 years in prison and a maximum sentence of life on this count. GHAILANI was acquitted of the remaining counts against him. "Ahmed Ghailani was today convicted of conspiring in the 1998 destruction of the United States Embassies in Kenya and Tanzania, causing death as a result," said United States Attorney PREET BHARARA. "He will face, and we will seek, the maximum sentence of life without parole when he is sentenced in January. I want to express my deep appreciation for the unflagging commitment, dedication, and talent of the agents who so thoroughly investigated this case and the prosecutors who so ably tried it." According to the evidence presented at trial, previous court proceedings in this case, and documents filed in Manhattan federal court: GHAILANI was first indicted on December 16, 1998, by a federal grand jury in the Southern District of New York.
    [Show full text]
  • Download Legal Document
    Case 1:10-cv-00436-RMC Document 49-3 Filed 08/09/13 Page 1 of 48 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) AMERICAN CIVIL LIBERTIES ) UNION, et al., ) ) Plaintiffs, ) ) v. ) Civil Action No. 1:1 0-cv-00436 RMC ) CENTRAL INTELLIGENCE AGENCY, ) ) Defendant. ) -----------------------J DECLARATION OF AMY E. POWELL I, Amy E. Powell, declare as follows: 1. I am a trial attorney at the United States Department of Justice, representing the Defendant in the above-captioned matter. I am competent to testify as to the matters set forth in this declaration. 2. Attached to this declaration as Exhibit A is a true and correct copy of a document entitled "Attorney General Eric Holder Speaks at Northwestern University School of Law," dated March 5, 2012, as retrieved on August 9, 2013 from http://www.justice.gov/iso/opa/ag/speeches/ 2012/ag-speech-1203051.html. 3. Attached to this declaration as Exhibit B is a true and correct copy of a Transcript of Remarks by John 0. Brennan on April30, 2012, as copied on August 9, 2013 from http://www.wilsoncenter.org/event/the-efficacy-and-ethics-us-counterterrorism-strategy/ with some formatting changes by the undersigned in order to enhance readability. Case 1:10-cv-00436-RMC Document 49-3 Filed 08/09/13 Page 2 of 48 4. Attached to this declaration as Exhibit C is a true and correct copy of a letter to the Chairman of the Senate Judiciary Committee dated May 22, 2013, as retrieved on August 9, 2013 from http://www.justice.gov/slideshow/AG-letter-5-22-13 .pdf.
    [Show full text]
  • Al Qaeda's Struggling Campaign in Syria: Past, Present, and Future
    COVER PHOTO FADI AL-HALABI/AFP/GETTY IMAGES APRIL 2018 1616 Rhode Island Avenue NW Al Qaeda’s Struggling Washington, DC 20036 202 887 0200 | www.csis.org Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT Blank APRIL 2018 Al Qaeda’s Struggling Campaign in Syria Past, Present, and Future AUTHORS Seth G. Jones Charles Vallee Maxwell B. Markusen A Report of the CSIS TRANSNATIONAL THREATS PROJECT About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in November 2015. Former U.S. deputy secretary of defense John J.
    [Show full text]
  • Consolidated UN Security Council Sanctions List Last Updated on 14 October 2015
    The Consolidated UN Security Council Sanctions List Last updated on 14 October 2015 Consolidated United Nations Security Council Sanctions List Generated on: 14 October 2015 Composition of the List The list consists of the two sections specified below: A. Individuals B. Entities and other groups Information about de-listing may be found on the Committee's website at: http://www.un.org/sc/committees /dfp.shtml and http://www.un.org/sc/committees/1267/delisting.shtml . A. Individuals TAi.155 Name: 1: ABDUL AZIZ 2: ABBASIN 3: na 4: na 56 ا:Name (original script): 123456 879 Title: na Designation: na DOB: 1969 POB: Sheykhan Village, Pirkowti Area, Orgun District, Paktika Arovince, Afghanistan Good quality a.k.a.: Abdul ABiB Mahsud Low quality a.k.a.: na Nationality: na Passport no.: na National identification no.: na Address: na Listed on: 4 Oct. 2011 (amended on 22 Apr. 2013 ) Other information: Fey commander in the Haqqani Net ork (TAe.012) under SiraIuddin Jallaloudine Haqqani (TAi.144). Taliban Shadow Governor for Orgun District, Paktika Province as of early 2010. Operated a training camp for non-Afghan fighters in Paktika Province. Has been involved in the transport of weapons to Afghanistan. QDi.012 Name: 1: NASHWAN 2: A-. AL-RA//AM 3: A-. AL--AMI 4: na TUVاﻥ 56 ا:Rﺯاق 56 ا:Name (original script): NO45 Title: na Designation: na DOB: 1961 POB: Cosul, IraH Good quality a.k.a.: a) Abdal Al-Hadi Al-Iraqi b) Abd Al-Hadi Al-Iraqi Low quality a.k.a.: Abu Abdallah Nationality: Iraqi Passport no.: na National identification no.: na Address: na Listed on: 6 Oct.
    [Show full text]
  • My Life with the Taliban
    MY LIFE WITH THE TALIBAN Courtesy of www.pdfbooksfree.pk ABDUL SALAM ZAEEF My Life with the Taliban Edited by Alex Strick van Linschoten and Felix Kuehn Courtesy of www.pdfbooksfree.pk Columbia University Press Publishers Since 1893 New York Chichester, West Sussex Copyright © Abdul Salam Zaeef 2010 Editors’ introduction and translation Copyright © Alex Strick van Linschoten and Felix Kuehn, 2010 Foreword Copyright © Barnett R. Rubin, 2010 All rights reserved Library of Congress Cataloging-in-Publication Data Za’if, ‘Abd al-Salam, 1967 or 8– My life with the Taliban / Abdul Salam Zaeef. p. cm. Includes bibliographical references and index. ISBN 978-0-231-70148-8 (alk. paper) 1. Za’if, ‘Abd al-Salam, 1967 or 8– 2. Taliban—Biography. 3. Afghan War, 2001—Biography. 4. Prisoners of war—Afghanistan—Biography. 5. Prisoners of war—United States—Biography. 6. Guantánamo Bay Detention Camp—Biography. I. Title. DS371.33.Z34A3 2010 958.104'7—dc22 [B] 2009040865 ∞ Columbia University Press books are printed on permanent and durable acid-free paper. This book is printed on paper with recycled content. Printed in USA c 10 9 8 7 6 5 4 3 2 1 References to Internet Web sites (URLs) were accurate at the time of writing. Neither the author nor Columbia University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Courtesy of www.pdfbooksfree.pk CONTENTS Kandahar: Portrait of a City ix Editors’ Acknowledgements xxv Editors’ Notes xxvii Character List xxix Foreword by Barnett R. Rubin xxxvii Preface by Abdul Salam Zaeef xli Maps xlviii–xlix 1.
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS
    XI: 2014 nr 3 Marcin Styszyński PRESENT TRENDS AMONG JIHADISTS AFTER THE ARAB SPRING Post-revolutionary environment The Arab Spring created three main trends in current political Islam. The fi rst fi eld concerns offi cial Muslim parties declaring implementation of some Islamic values in legal, constitutional and social life. They resign from violence and accept politi- cal dialogue and mechanisms such as free elections, referendum or parliamentary activities. The second factor refl ects Salafi preaching and radical ideas preserving conservative traditions from the period of the Prophet Mohammad. Salafi groups are focused on their theological teaching, charity work and popularization of moral values among societies. The third category concerns jihadist organizations that dec- lare violence and fi ght against authorities and societies. They refer to the concept of takfīr (excommunication), which considers the state and the society as a sinful and atheistic group supporting immoral and corrupted governments. Moreover, the idea of takfīr is close to Al-Qaeda activities regarding violent renaissance of historic caliphate and implementation of strict sharia rules. Al-Qaeda also adapts defensive and off ensive sense of jihad to modern political context related to Western policy in the Muslim world. The victory of the Muslim Brotherhood and Salafi groups in parliamentary elections in Egypt and Tunisia in 2011, the presidency of Mohammad Mursi as 26 MARCIN STYSZYŃSKI well as control of main regions in Libya and Syria by extremist militias increased infl uences of radical Islam in post-revolutionary countries.1 However, after three years of the transition process Arab societies have changed their attitude to the crucial values of the Arab revolution such as democra- cy, freedom, liberalism or fi ght against authoritarianism.
    [Show full text]
  • Leveraging the Taliban's Quest for International Recognition
    Leveraging the Taliban’s Quest for International Recognition Afghan Peace Process Issues Paper March 2021 By Barnett R. Rubin Summary: As the United States tries to orchestrate a political settlement in conjunction with its eventual military withdrawal from Afghanistan, it has overestimated the role of military pressure or presence and underestimated the leverage that the Taliban’s quest for sanctions relief, recognition and international assistance provides. As the U.S. government decides on how and when to withdraw its troops, it and other international powers retain control over some of the Taliban’s main objectives — the removal of both bilateral and United Nations Security Council sanctions and, eventually, recognition of and assistance to an Afghan government that includes the Taliban. Making the most of this leverage will require coordination with the Security Council and with Afghanistan’s key neighbors, including Security Council members China, Russia and India, as well as Pakistan and Iran. In April 2017, in a meeting with an interagency team on board a military aircraft en route to Afghanistan, U.S. President Donald J. Trump’s new national security advisor, retired Army Lt. Gen. H.R. McMaster, dismissed the ongoing effort to negotiate a settlement with the Taliban: “The first step, the national security adviser said, was to turn around the trajectory of the conflict. The United States had to stop the Taliban’s advance on the battlefield and force them to agree to concessions in the process .... US talks with the Taliban would only succeed when the United States returned to a position of strength on the battlefield and was ‘winning’ against the insurgency.”1 1 Donati, Jessica.
    [Show full text]