Radicalization in the West
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
The Influence of Terrorism on Discriminatory Attitudes and Behaviors
Shades of Intolerance: The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada. by Chuck Baker A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey In partial fulfillment of the requirements For the degree of Doctor of Philosophy Graduate Program in Global Affairs Written under the direction of Dr. Gregg Van Ryzin and approved by ___________________________________________________ ___________________________________________________ ___________________________________________________ ___________________________________________________ Newark, New Jersey May, 2015 Copyright page: © 2015 Chuck Baker All Rights Reserved ABSTRACT The Influence of Terrorism on Discriminatory Attitudes and Behaviors in the United Kingdom and Canada by Chuck Baker Dissertation Director: Dr. Gregg Van Ryzin, Ph.D. Terrorism has been shown to have a destabilizing impact upon the citizens of the nation- state in which it occurs, causing social distress, fear, and the desire for retribution (Cesari, 2010; Chebel d’Appollonia, 2012). Much of the recent work on 21st century terrorism carried out in the global north has placed the focus on terrorism being perpetuated by Middle East Muslims. In addition, recent migration trends show that the global north is becoming much more diverse as the highly populated global south migrates upward. Population growth in the global north is primarily due to increases in the minority presence, and these post-1960 changes have increased the diversity of historically more homogeneous nations like the United Kingdom and Canada. This research examines the influence of terrorism on discriminatory attitudes and behaviors, with a focus on the United Kingdom in the aftermath of the July 7, 2005 terrorist attacks in London. -
Australian Foreign Fighters: Risks and Responses
Australian foreign fighters: Andrew Zammit Risks and responses April 2015 AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high-quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES EXECUTIVE SUMMARY Conflicts in Syria and Iraq have attracted aspiring jihadists from across the world. Australians have joined the flow of foreign fighters to the region, raising concerns that some will carry out terrorist attacks in Australia should they return home. The record of past jihadist foreign fighter mobilisations, including Australia's own history in this regard, demonstrates that there is a potential threat to Australia’s security. However, a range of factors will shape that threat, including how Australia responds to returning foreign fighters. The Government's response has mainly focused on increased resources and powers for police and intelligence agencies, but also includes an important non-coercive element termed Countering Violent Extremism (CVE) that has received less attention. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
Interfaith Marriage in Islam: an Examination of the Legal Theory Behind the Traditional and Reformist Positions
Interfaith Marriage in Islam: An Examination of the Legal Theory Behind the Traditional and Reformist Positions * ALEX B. LEEMAN INTRODUCTION Leo Barajas was a thirty-four-year-old American contractor from Texas working for the U.S. government managing reconstruction projects in Iraq.1 Though not particularly religious at home, he called on the Almighty often enough during his time in Baghdad. “I had to wake up by faith, sleep by faith and do my job by faith,” he said.2 In August 2003, Leo met a striking young Iraqi woman named Mariam Ghadeer. In a short time, she had stolen his heart. By the end of 2003, wedding plans were underway. It was not until this time that Mariam told Leo he would have to convert to Islam. Leo refused. After many tears, Mariam concluded, “I guess we can’t get married.”3 This Note explores the rules in Islam governing marriage, specifically those restricting marriages in which one spouse is non-Muslim. The rules for Muslim women who wish to marry outside the faith are more restrictive than the rules governing Muslim men wishing to marry a non-Muslim.4 Some modern Islamic scholars and commentators argue that the pluralistic nature of modern society justifies a reevaluation of these rules, and that such action is not precluded by Islamic law. Muslim women, they contend, should have marital choice similar to that of their male counterparts.5 Many Islamic countries are facing the challenges of modernity and social change.6 Interfaith marriage is one of many issues currently pitting staunch traditionalists against modern reformists within the Muslim community. -
Islām and Genesis 17
religions Article Islam¯ and Genesis 17: A Study in Scriptural Intertextuality Khaleel Mohammed Department of Religious Studies, San Diego State University, San Diego, CA 92182-6062, USA; [email protected] Received: 25 August 2018; Accepted: 17 September 2018; Published: 28 September 2018 Abstract: Abraham Geiger’s 1833 essay launched a particular genre of research that posits foreign etymology for many terms in the Qur’an.¯ Whereas some work has been erudite, others have posited far-fetched concepts to the point where at least one author opines that Aramaic was the original language of the Qur’an.¯ Muslim exegetes have compounded the problem by seeking to interpret the Qur’an¯ on its own, without reference to other Abrahamic scriptures. I argue that Muhammad’s audience understood him clearly since he was using terms that had become part of the Arabic language long before his time. I examine three terms: islam,¯ iman,¯ and d¯ın, showing that the meaning of these words in the Qur’an¯ can be deciphered by reliance on context of usage and intertextuality. To this end, I refer to several verses of the Qur’an¯ as well as of the Hebrew Bible and Talmudic literature. A proper understanding of these words allows us to see Q3:19 and Q5:3 as pluralistic instead of the particularistic interpretation that most exegetes proffer. Keywords: Islam; Iman; Din; Qur’an;¯ Aramaic; Hebrew; Hebrew Bible; Talmud; Onkelos Abraham Geiger’s 1833 essay Was hat Muhammad aus dem Judenthume aufgenommen postulated that the Qur’an¯ was largely unoriginal: Muhammad had compiled it using at least 14 terms from the Hebrew Bible and rabbinic literature, in addition to several other Jewish concepts (Geiger 1970, p. -
Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux
The Setting Sun : Immigration Policy, Race Relations and Multiculturalism in Post-Colonial Great Britain Flora Macivor Épouse Lamoureux To cite this version: Flora Macivor Épouse Lamoureux. The Setting Sun : Immigration Policy, Race Relations and Multi- culturalism in Post-Colonial Great Britain. History. 2010. dumas-00534579 HAL Id: dumas-00534579 https://dumas.ccsd.cnrs.fr/dumas-00534579 Submitted on 10 Nov 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITE DU SUD TOULON-VAR FACULTE DES LETTRES ET SCIENCES HUMAINES MASTER RECHERCHE : CIVILISATIONS CONTEMPORAINES ET COMPAREES ANNÉE 2009-2010, 1ERE SESSION THE SETTING SUN: IMMIGRATION POLICY, RACE RELATIONS AND MULTICULTURALISM IN POST- COLONIAL GREAT BRITAIN FLORA MACIVOR LAMOUREUX UNDER THE DIRECTION OF PROFESSOR GILLES LEYDIER ii TABLE OF CONTENTS INTRODUCTION ............................................................................................................ 1 THE FIRST BRITISH ASIANS: A HISTORY .............................................................. 8 I. The Colonial -
CTC Sentinel Welcomes Submissions
Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida. -
595 an Empirical Study of Terrorism Prosecutions in Canada
EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA 595 AN EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA: ELUCIDATING THE ELEMENTS OF THE OFFENCES MICHAEL NESBITT* AND DANA HAGG** It has now been over 15 years since Canada enacted the Anti-Terrorism Act, codifying what we think of today as Canada’s anti-terrorism criminal laws. The authors set out to canvass how these provisions have been judicially interpreted since their inception through an empirical analysis of court decisions. After exploring how courts have settled initial concerns about these provisions with respect to religious and expressive freedoms, the authors suggest that courts’ interpretations of Canada’s terrorism offences still leave us with many questions, particularly with respect to the facilitation and financing offences. The authors explore these questions and speculate about future challenges that may or may not be successful with the hopes of providing guidance to prosecutors and defence lawyers working in this area. TABLE OF CONTENTS I. INTRODUCTION ............................................. 595 II. TERRORISM PROSECUTIONS TO DATE ............................ 599 III. JUDICIAL INTERPRETATIONS OF THE ELEMENTS OF TERRORISM OFFENCES .................................... 608 A. DEFINITIONS (SECTION 83.01)............................. 608 B. OFFENCES ............................................ 620 IV. CONCLUSIONS AND FUTURE CONSIDERATIONS ....................... 647 I. INTRODUCTION It has now been over 15 years since Canada expeditiously enacted the Anti-Terrorism -
Western Hemisphere Overview ______
Western Hemisphere Overview ___________________________________________________________________________ “We stand firm in the fight against terrorism and firm in our conviction that a sustained and permanent victory depends upon the success of each individual country in the struggle for social cohesion. In projecting our security policy to become an axiom of the State, we conceive it to be inexorably linked to the constant improvement of the social conditions of our people.” Álvaro Uribe Vélez, President of Colombia 60th Session of the United Nations General Assembly September 17, 2005 ___________________________________________________________________________ Terrorism in the Western Hemisphere was primarily perpetrated in by narcoterrorist organizations based in Colombia and by the remnants of radical leftist Andean groups. With the exception of the United States and Canada, there are no known operational cells of Islamic terrorists in the hemisphere, although scattered pockets of ideological supporters and facilitators in South America and the Caribbean lent financial, logistical, and moral support to terrorist groups in the Middle East. Cuba remained a state sponsor of terrorism, while Venezuela virtually ceased its cooperation in the global war on terror, tolerating terrorists in its territory and seeking closer relations with Cuba and Iran, both state sponsors of terrorism. The threat of terrorist attack remained low in for most countries. Overall, governments took modest steps to improve their counterterrorism (CT) capabilities and tighten border security, but corruption, weak government institutions, ineffective or lacking interagency cooperation, weak or non-existent legislation, and reluctance to allocate sufficient resources limited the progress of many. Some countries, like Panama, Trinidad and Tobago, Jamaica, Mexico, and El Salvador, made serious prevention and preparedness efforts. -
The Al Qaeda Network a New Framework for Defining the Enemy
THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 THE AL QAEDA NETWORK A NEW FRAMEWORK FOR DEFINING THE ENEMY KATHERINE ZIMMERMAN SEPTEMBER 2013 A REPORT BY AEI’S CRITICAL THREATS PROJECT ABOUT US About the Author Katherine Zimmerman is a senior analyst and the al Qaeda and Associated Movements Team Lead for the Ameri- can Enterprise Institute’s Critical Threats Project. Her work has focused on al Qaeda’s affiliates in the Gulf of Aden region and associated movements in western and northern Africa. She specializes in the Yemen-based group, al Qaeda in the Arabian Peninsula, and al Qaeda’s affiliate in Somalia, al Shabaab. Zimmerman has testified in front of Congress and briefed Members and congressional staff, as well as members of the defense community. She has written analyses of U.S. national security interests related to the threat from the al Qaeda network for the Weekly Standard, National Review Online, and the Huffington Post, among others. Acknowledgments The ideas presented in this paper have been developed and refined over the course of many conversations with the research teams at the Institute for the Study of War and the American Enterprise Institute’s Critical Threats Project. The valuable insights and understandings of regional groups provided by these teams directly contributed to the final product, and I am very grateful to them for sharing their expertise with me. I would also like to express my deep gratitude to Dr. Kimberly Kagan and Jessica Lewis for dedicating their time to helping refine my intellectual under- standing of networks and to Danielle Pletka, whose full support and effort helped shape the final product. -
Download Thepdf
Volume 59, Issue 5 Page 1395 Stanford Law Review KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker © 2007 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 59 STAN. L. REV. 1395 (2007). For information visit http://lawreview.stanford.edu. KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker* INTRODUCTION: THE DYNAMICS OF COUNTER-TERRORISM POLICIES AND LAWS................................................................................................ 1395 I. CONTROL ORDERS ..................................................................................... 1403 A. Background to the Enactment of Control Orders............................... 1403 B. The Replacement System..................................................................... 1408 1. Control orders—outline................................................................ 1408 2. Control orders—contents and issuance........................................ 1411 3. Non-derogating control orders..................................................... 1416 4. Derogating control orders............................................................ 1424 5. Criminal prosecution.................................................................... 1429 6. Ancillary issues............................................................................. 1433 7. Review by Parliament and the Executive...................................... 1443 C. Judicial Review..................................................................................