Chronology of Jihadist Plots in Jordan 1994-2018
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mcallister Bradley J 201105 P
REVOLUTIONARY NETWORKS? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by Bradley J. McAllister (Under the Direction of Sherry Lowrance) ABSTRACT This dissertation is simultaneously an exercise in theory testing and theory generation. Firstly, it is an empirical test of the means-oriented netwar theory, which asserts that distributed networks represent superior organizational designs for violent activists than do classic hierarchies. Secondly, this piece uses the ends-oriented theory of revolutionary terror to generate an alternative means-oriented theory of terrorist organization, which emphasizes the need of terrorist groups to centralize their operations. By focusing on the ends of terrorism, this study is able to generate a series of metrics of organizational performance against which the competing theories of organizational design can be measured. The findings show that terrorist groups that decentralize their operations continually lose ground, not only to government counter-terror and counter-insurgent campaigns, but also to rival organizations that are better able to take advantage of their respective operational environments. However, evidence also suggests that groups facing decline due to decentralization can offset their inability to perform complex tasks by emphasizing the material benefits of radical activism. INDEX WORDS: Terrorism, Organized Crime, Counter-Terrorism, Counter-Insurgency, Networks, Netwar, Revolution, al-Qaeda in Iraq, Mahdi Army, Abu Sayyaf, Iraq, Philippines REVOLUTIONARY NETWORK0S? AN ANALYSIS OF ORGANIZATIONAL DESIGN IN TERRORIST GROUPS by BRADLEY J MCALLISTER B.A., Southwestern University, 1999 M.A., The University of Leeds, United Kingdom, 2003 A Dissertation Submitted to the Graduate Faculty of the University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSPHY ATHENS, GA 2011 2011 Bradley J. -
THE JIHAD Different Areas of Research
The Strategic Studies Group (GEES) is the oldest private and independent think- tank of Spain. Since 1987 has produced assessments and analysis and has advised different corporations, governments and media outlets inside as well beyond Spain. The reports, analysis, articles and events are prepared by specialists from THE JIHAD different areas of research. During the more than 30 years of existence, the Strategic Studies Group (GEES) has become an indispensable reference within the world of liberal-conservative ideas, specially in issues related to security and defense. The Strategic Studies AGAINST SPAIN Group (GEES) and its members are active members in several international initiatives and networks of think-tanks across the world, being considered globally as the most influential conservative center in Spain. ORIGIN, EVOLUTION AND FUTURE VISIT THE STRATEGIC STUDIES GROUP: OF THE ISLAMIST THREAT http://www.gees.org ON SOCIAL NETWORKS: https://www.facebook.com/grupoGEES Strategic Studies Group https://twitter.com/grupogees © 2018 GEES – Strategic Studies Group ORIGIN, EVOLUTION AND FUTURE OF THE ISLAMIST THREAT THE JIHAD AGAINST SPAIN SPAIN AGAINST THE JIHAD The Jihad AGAINST SPAIN ORIGIN, EVOLUTION AND FUTURE OF THE ISLAMIST THREAT Strategic Studies Group GEES TABLE OF CONTENTS PREFACE BY IGNACIO COSIDÓ ........................................................................ 5 PRESENTATION ..................................................................................................... 9 1. EUROPE’S FIGHT AGAINST ISLAMIST TERROR ......................................... -
Suicide Terrorists in the Current Conflict
Israeli Security Agency [logo] Suicide Terrorists in the Current Conflict September 2000 - September 2007 L_C089061 Table of Contents: Foreword...........................................................................................................................1 Suicide Terrorists - Personal Characteristics................................................................2 Suicide Terrorists Over 7 Years of Conflict - Geographical Data...............................3 Suicide Attacks since the Beginning of the Conflict.....................................................5 L_C089062 Israeli Security Agency [logo] Suicide Terrorists in the Current Conflict Foreword Since September 2000, the State of Israel has been in a violent and ongoing conflict with the Palestinians, in which the Palestinian side, including its various organizations, has carried out attacks against Israeli citizens and residents. During this period, over 27,000 attacks against Israeli citizens and residents have been recorded, and over 1000 Israeli citizens and residents have lost their lives in these attacks. Out of these, 155 (May 2007) attacks were suicide bombings, carried out against Israeli targets by 178 (August 2007) suicide terrorists (male and female). (It should be noted that from 1993 up to the beginning of the conflict in September 2000, 38 suicide bombings were carried out by 43 suicide terrorists). Despite the fact that suicide bombings constitute 0.6% of all attacks carried out against Israel since the beginning of the conflict, the number of fatalities in these attacks is around half of the total number of fatalities, making suicide bombings the most deadly attacks. From the beginning of the conflict up to August 2007, there have been 549 fatalities and 3717 casualties as a result of 155 suicide bombings. Over the years, suicide bombing terrorism has become the Palestinians’ leading weapon, while initially bearing an ideological nature in claiming legitimate opposition to the occupation. -
EXTERNAL INTELLIGENCE NOTE (U//LES) Suicide Vest and Belt Improvised Explosive Device Tactics in the Middle Eastern, African, An
UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE EXTERNAL INTELLIGENCE NOTE Terrorism Explosive Device Analytical Center 17 November 2015 (U//LES) Suicide Vest and Belt Improvised Explosive Device Tactics in the Middle Eastern, African, and European Regions Show Minimal Signs of Tactic Migration (U) LAW ENFORCEMENT SENSITIVE: The information marked (U//LES) in this document is the property of FBI and may be distributed within the Federal Government (and its contractors), US intelligence, law enforcement, public safety or protection officials and individuals with a need to know. Distribution beyond these entities without FBI authorization is prohibited. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. Information bearing the LES caveat may not be used in legal proceedings without first receiving authorization from the originating agency. Recipients are prohibited from subsequently posting the information marked LES on a website or an unclassified network. (U//LES) The FBI Terrorism Explosive Device Analytical Center (TEDAC) assesses the tactics used to construct suicide vest and belt improvised explosive devices (IEDs) in the Middle Eastern, African, and European regions likely (see Appendix A) have minimal correlation. Use of these tactics allows suicide bombers to discretely move to a desired target location and make real-time decisions to maximize lethality. The suicide belt design allows the wearer to conceal the device and blend in with their surrounding environment, as well as to position themselves in potentially crowded environments while not raising suspicion.1 This assessment is made with medium confidence (see Appendix B), based upon reliable forensic exploitation and varying degrees of reliability with open source reporting. -
Islamic State of Iraq and the Levant (ISIL), Or Simply the Islamic State, Has Carried out Deadly Terrorist Attacks
BACKGROUND REPORT Patterns of Islamic State-Related Terrorism, 2002--2015 For more than a decade, the organization now known as the Islamic State of Iraq and the Levant (ISIL), or simply the Islamic State, has carried out deadly terrorist attacks. Beginning as a small network led by Jordanian Abu Musab al-Zarqawi, the first terrorist attack attributed to this group was the assassination of American diplomat Laurence Foley in Amman, Jordan in October 2002. Since then, the group initially known as Tawhid and Jihad (Jama’at al-Tawhid w’al-Jihad (the Party of Monotheism and Jihad)) has undergone a complex evolution, including name changes, leadership changes, and shifts in allegiance to other Salafi-jihadist organizations, most notably al-Qaida. In addition, the reach of ISIL’s violence surpasses its own membership, to include attacks carried out by other groups and individuals who have pledged allegiance to ISIL regardless of whether or not formal ties exist. This complexity makes it difficult to comprehensively and systematically place into context the violence of one of the most active and deadly terrorist organizations in recent history. For the purpose of this report, we have classified the terrorist attacks in the Global Terrorism Database (GTD) into four ISIL-related perpetrator categories: ISIL Predecessor: attacks by organizations that were part of the ISIL lineage prior to adoption of the ISIL name in 2013 ISIL: attacks by operatives of the “core” of the organization, based in and primarily active in Iraq and Syria ISIL Affiliate: attacks by organizations that have declared allegiance to ISIL1 ISIL-Inspired: attacks by individuals who have indicated that they were motivated by allegiance to ISIL ISIL-Related: any of the above This report presents data that illustrate the dynamics of ISIL-related terrorism over time and place, from 2002 to 2015. -
The Literature on Jihadism in Jordan Henrik Gråtrud
When Insularity Becomes a Problem: the Literature on Jihadism in Jordan Henrik Gråtrud Address: Norwegian Defence Research Establishment/FFI Postboks 25, 2027 Kjeller, Norway Email: [email protected] Henrik Gråtrud is a research fellow at the Norwegian Defence Research Establishment (FFI) and a doctoral candidate at the University of Oslo. Acknowledgment: I would like to thank my colleagues at the Norwegian Defence Research Establishment and the University of Oslo, the editor, as well as the anonymous reviewers for excellent input and advice. 1 Dette er en postprint-versjon/This is a postprint version. Publisert versjon/Publised version: http://dx.doi.org/10.1080/1057610X.2020.1723282 When Insularity Becomes a Problem: the Literature on Jihadism in Jordan ABSTRACT This article offers a review of the literature on Jordanian jihadism. While excellent work has been done, particularly on the phenomenon’s history and ideologues such as Abu Muhammad al-Maqdisi, several topics remain unexplored. The main explanation for the literature’s shortcomings is that it has been too inward-looking. I argue that this insularity has led to three problems: first, the literature sometimes recycles observations already made; second, it fails to show how Jordan presents specificities in terms of jihadism; and third and most importantly, it misses insights from the literature on political violence about radicalization and terrorist attack activity. As a result, it fails to address key questions about Jordanian jihadism, such as why, when, and how terrorist attacks happen. Keywords: jihadism; terrorism; Jordan; review; radicalization Introduction After the outbreak of war in Syria, Jordan witnessed an unprecedented jihadist mobilization in the early 2010s. -
Overcoming Failure: How Extremist Organizations Leverage Setbacks with Powerful Propaganda
THE INSTITUTE FOR MIDDLE EAST STUDIES IMES CAPSTONE PAPER SERIES Overcoming Failure: How Extremist Organizations Leverage Setbacks with Powerful Propaganda Rachel N. Ridley Mattisan S. Rowan May 2017 THE INSTITUTE FOR MIDDLE EAST STUDIES THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS THE GEORGE WASHINGTON UNIVERSITY © Rachel N. Ridley and Mattisan S. Rowan, 2017 1 ACKNOWLEDGEMENTS We would like to give our sincere thanks to our advisor, Ms. Rhea Siers, for providing expert guidance and research assistance throughout our capstone process. We would also like to thank Laura Wrubel for assisting us through the process of collecting social media data and guiding our use of the Social Feed Manager through the Gelman Library. 2 TABLE OF CONTENTS 1. Introduction …………………………………………………………………………………………….3 2. Methodology ...………………………………………………………………………………………….4 2.1 Defining Extremism …………………………………………………………………………...4 2.2 Defining Operational and Military Failures …………………………………………………...5 2.3 Research Methods ……………………………………………………………………………..7 2.4 Limitations …………………………………………………………………………………….7 3. Literature Review ……………………………………………………………………………………...8 3.1 Violent Extremism versus Terrorism …………………………………………………………8 3.2 Theories of Violent Extremism ……………………………………………………………....10 3.3 Extremist Organizations and Propaganda …………………………………………………....12 3.4 Contribution to the Literature ………………………………………………………………..15 4. A Historical Framework: Hamas and Hezbollah as Case Studies ………………………………...15 4.1 Hamas: History and Propaganda Tactics …………………………………………………….15 4.2 Hamas -
Routledge Handbook of U.S. Counterterrorism and Irregular
‘A unique, exceptional volume of compelling, thoughtful, and informative essays on the subjects of irregular warfare, counter-insurgency, and counter-terrorism – endeavors that will, unfortunately, continue to be unavoidable and necessary, even as the U.S. and our allies and partners shift our focus to Asia and the Pacific in an era of renewed great power rivalries. The co-editors – the late Michael Sheehan, a brilliant comrade in uniform and beyond, Liam Collins, one of America’s most talented and accomplished special operators and scholars on these subjects, and Erich Marquardt, the founding editor of the CTC Sentinel – have done a masterful job of assembling the works of the best and brightest on these subjects – subjects that will continue to demand our attention, resources, and commitment.’ General (ret.) David Petraeus, former Commander of the Surge in Afghanistan, U.S. Central Command, and Coalition Forces in Afghanistan and former Director of the CIA ‘Terrorism will continue to be a featured security challenge for the foreseeable future. We need to be careful about losing the intellectual and practical expertise hard-won over the last twenty years. This handbook, the brainchild of my late friend and longtime counter-terrorism expert Michael Sheehan, is an extraordinary resource for future policymakers and CT practitioners who will grapple with the evolving terrorism threat.’ General (ret.) Joseph Votel, former commander of US Special Operations Command and US Central Command ‘This volume will be essential reading for a new generation of practitioners and scholars. Providing vibrant first-hand accounts from experts in counterterrorism and irregular warfare, from 9/11 until the present, this book presents a blueprint of recent efforts and impending challenges. -
Al Qaeda’S Command- And-Control Structure
Testimony of Steven Emerson Before the United States House of Representatives Permanent Select Committee on Intelligence April 9, 2008 Steven Emerson Executive Director Investigative Project on Terrorism www.investigativeproject.org email:[email protected] Introduction: The 2001 invasion of Afghanistan was successful in obliterating much of al Qaeda’s command- and-control structure. Due to a robust and successful counter-terrorist policy made up of good intelligence gathered by the FBI, asset forfeitures and designations by the Department of the Treasury, and other good work by the Department of Homeland Security and other agencies within the intelligence community, the U,S. has fortunately not been hit with another attack since 9-11. Moreover, in the six and a half years since the those horrible, al Qaeda’s direct orchestration of acts of terrorism on the operational level has been somewhat constrained. This is not to say that al Qaeda has not been involved in terrorist attacks and plots since 2001 (training and guidance provided by al Qaeda in the 2005 London transit bombings and foiled 2006 Heathrow plot prove otherwise), but the group’s leaders have relied largely on the power of self- anointed franchises and recognized the power of spreading its message and ideology via the Internet. Extremist Muslims throughout the world have responded to this message and have sought to execute a number of attacks. While most have been stopped, some have been successful, killing hundreds and injuring thousands more, resulting in propaganda coups for al Qaeda and its leadership. Parallel to franchising the al Qaeda ideology, the group has successfully regenerated its operational capabilities in the sanctuary of the Federally Administered Tribal Areas (FATA) in Pakistan. -
From Caliphate to Civil State: the Young Face of Political Islam In
From Caliphate to Civil State: The Young Face of Political Islam in Jordan after the Arab Spring 2 From Caliphate to Civil State: The Young Face of Political Islam in Jordan after the Arab Spring The Hashemite Kingdom of Jordan The Deposit Number at The National Library (2018/6/2327) 277 AbuRumman, Mohammad Suliman From Caliphate to Civil State: The Young Face of Political Islam in Jordan after the Arab Spring/ Mohammad Suliman AbuRumman, Niven "Mohammad Sufoh" Bondokji; translated by William Joseph Ward. - 2018 ﻋﲈﻥ: ﻣﺆﺳﺴﺔ ﻓﺮﻳﺪرﻳﺶ اﻳﱪت, (224) p. Deposit No.: 2018/5/2327 Descriptors: /Islam//Politics/ ﻳﺘﺤﻤﻞ اﳌﺆﻟﻒ ﻛﺎﻣﻞ اﳌﺴﺆﻭﻟﻴﺔ اﻟﻘﺎﻧﻮﻧﻴﺔ ﻋﻦ ﳏﺘﻮ ﻣﺼﻨﻔﻪ ﻭﻻ ﹼﻳﻌﱪ ﻫﺬا اﳌﺼﻨﻒ ﻋﻦ رأﻱ داﺋﺮة اﳌﻜﺘﺒﺔ اﻟﻮﻃﻨﻴﺔ أﻭ أﻱ ﺟﻬﺔ ﺣﻜﻮﻣﻴﺔ أﺧﺮ. Published in 2018 by Friedrich-Ebert-Stiftung Jordan & Iraq FES Jordan & Iraq P.O. Box 941876 Amman11194 Jordan Email: [email protected] Website: www.fes-jordan.org Not for Sale © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original author. They do not necessarily represent those of the Friedrich-Ebert- Stiftung or the editor. Translation: Industry Arabic Cover design: Yousef Saraireh Lay-out: Eman Khattab Printing: Economic Press ISBN: 978-9957-484-82-8 Table of Contents 3 Dr. Mohammed Abu Rumman Dr. Neven Bondokji From Caliphate to Civil State: The Young Face of Political Islam in Jordan after the Arab Spring 4 From Caliphate to Civil State: The Young Face of Political Islam in Jordan after the Arab Spring FOREWORD Tim Petschulat, Resident Director Friedrich Ebert Stiftung, Jordan and Iraq The “Arab Spring” brought change to most Arab countries in one way or another. -
Report on Incidents of Terrorism 2005
National Counterterrorism Center Report on Incidents of Terrorism 2005 11 April 2006 NCTC Report on Incidents of Terrorism 2005 This page intentionally left blank i NCTC Report on Incidents of Terrorism 2005 FOREWORD: Consistent with its statutory mission to serve as the U.S. Government's knowledge bank on international terrorism, the National Counterterrorism Center (NCTC) is providing this report and statistical information to assist academics, policy makers and the public in understanding the data. The statistical information included in this report is drawn from the data NCTC maintains on the www.nctc.gov website. The report includes the following: -- this Foreword, which provides important context for the contents of this report; -- a methodology section that explains how the data was compiled and the inherent limitations of the data; -- NCTC observations related to the terrorism incident statistical material; -- statistical charts and graphs; and -- summaries of high fatality incidents during 2005 Section 2656f(b) of Title 22 of the U.S. Code requires the State Department to include in its annual report on terrorism "to the extent practicable, complete statistical information on the number of individuals, including United States citizens and dual nationals, killed, injured, or kidnapped by each terrorist group during the preceding calendar year." While NCTC keeps statistics on the annual number of incidents of "terrorism," its ability to track the specific groups responsible for each incident involving killings, kidnappings, and injuries is significantly limited by the availability of reliable open source information, particularly for events involving small numbers of casualties. The statistical material compiled in this report, therefore, is drawn from the number of incidents of "terrorism" that occurred in 2005, which is the closest figure that is practicable for NCTC to supply in satisfaction of the above-referenced statistical requirements. -
Palestinian Female Suicide Bombers: Virtuous Heroines Or Damaged Goods?1
Palestinian Female Suicide Bombers: Virtuous Heroines or Damaged Goods?1 Yoram Schweitzer Introduction Although not a new phenomenon, suicide bombings by women attract a disproportionately large amount of media scrutiny and academic study in relation to suicide bombing as a whole. Possible explanations for the disproportionate attention that female suicide bombers receive include the seeming incongruity of women, symbols of fertility and the gift of life, intentionally taking the lives of others. Palestinian female suicide bombers, in particular, have received extensive coverage in the global media due to the relative ease of accessing their families for interviews following a bombing. Israeli policies, which allow media to obtain interviews with suicide bombers imprisoned after failing to complete their missions, have also increased their exposure.2 To date, approximately seventy Palestinian women are numbered as having been involved in suicide bombing attempts in Israel--ten of whom actually carried out an attack and died in the process. Indeed, notwithstanding the decline in Palestinian suicide bombings in Israel since the tahadiya (the unilateral temporary restraint that was announced in March 2005), two of the eleven suicide attacks were carried out by women. Both of these women were dispatched from Gaza in the span of less than a month. On November 6, 2006, Marwa Masoud, an eighteen year old student from the Islamic College in Gaza, blew herself up near a group of soldiers, killing herself and slightly wounding one soldier. A few weeks later, on November 23, another female 1 Originally published in the anthology: Female Terrorism and Militancy: Agency, Utility, and Organization.