Baken Denise.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Baken Denise.Pdf An Analysis of the Potential Direct or Indirect Influence Exerted by an Al Qaeda Social Network Actor on Future Biological Weapon Mission Planning A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Denise N. Baken Master of Science Central Michigan University, 1992 Director: Arnauld Nicogossian, Professor Department of Public Policy Fall Semester, 2007 George Mason University Fairfax, VA Copyright 2007 Denise N. Baken All Rights Reserved ii DEDICATION This is dedicated to my family in recognition of their understanding and support. iii ACKNOWLEDGEMENTS I would like to thank Drs. Arnauld Nicogossian, Maksim Tsvetovat and Susan Tolchin for their invaluable mentoring and guidance. I would also like to extend my appreciation to Dr. Maricela Medina for her constant counsel and encouragement. In addition I would like to thank the many friends, family, coworkers, and supporters who assisted me. My son and daughter, Richard and Christian, aided studying and test preparation. My husband, Tim, provided opportunity for focused dissertation preparation. My sister Carrie Jasper offered sustenance. And a tremendous thank you to the Center for Innovative Technology for providing an extremely supportive environment and work from home capability. iv TABLE OF CONTENTS Page List of Tables ..................................................................................................................... vi List of Figures................................................................................................................... vii Abstract.............................................................................................................................. ix 1. Introduction..................................................................................................................... 1 2. Background..................................................................................................................... 6 Past Declarations of Jihad............................................................................................... 6 The Changing Face of Terrorism.................................................................................. 18 3. Methodology................................................................................................................. 31 Literature Review.......................................................................................................... 31 Survey- External Evaluations ....................................................................................... 36 Social Network Analysis............................................................................................... 36 4. Results........................................................................................................................... 41 Literature Review.......................................................................................................... 41 Business Management Study Results ........................................................................... 51 Social Network Analysis Results.................................................................................. 65 5. Discussion................................................................................................................... 111 Hypothesis: Questions and Answers........................................................................... 111 Rationale for Approach and Implications of Results.................................................. 113 Al Qaeda Terrorism Business Management ............................................................... 114 Terrorism Management Survey Analysis ................................................................... 125 Terrorism Social Network Analysis: Computational Organization............................ 133 Building a Superstruct - Putting It All Together......................................................... 134 Type of WMD Attack ................................................................................................. 137 CI_Index Derived Potential al Qaeda WMD Strategy................................................ 141 Al Qaeda Decision Making......................................................................................... 148 Mission Planning Behavior......................................................................................... 150 6. Conclusion .................................................................................................................. 154 WMD Potential ........................................................................................................... 154 Suggested Pro-Active Approach for United States..................................................... 155 Suggested US Action - Respond Like al Qaeda ......................................................... 157 Contributions of the Study and Suggested Focus of Future Research........................ 158 List Of References .......................................................................................................... 277 v LIST OF TABLES Table Page 1. Al Qaeda Internal/External Audiences ...................................................................... 23 2. Network Meta-Matrix ................................................................................................ 48 3. Agent_CI_Index_WMD Position .............................................................................. 83 4. Agent_CI_Index_WMD_Organizations.................................................................... 88 5. Al Qaeda Value Function......................................................................................... 116 6. Strength -Weakness-Opportunity-Threat Analysis Matrix....................................... 127 7. Strength -Weakness-Opportunity-Threat Analysis Matrix....................................... 129 8. Audience Relationship Matrix ................................................................................. 131 9. Al Qaeda Management Survey SWOT Matrix........................................................ 132 10. Biological Agents Researched by al Qaeda............................................................. 138 11. Chemical Agents Researched by al Qaeda .............................................................. 139 12. Biological Agent Dissemination Criteria................................................................. 140 13. CI_Index-WMD....................................................................................................... 141 vi LIST OF FIGURES Figure Page 1. Example of Key Word Identifiers Used in the Literature Search............................. 34 2. Flowchart of Relevant Data Selection and Bibliography Development................... 35 3. Likert Scale of Business Practice Assessment.......................................................... 57 4. Definitions of Strengths, Weaknesses, Opportunities, Threats................................. 58 5. Criteria for Classifying Analysts as Potential Terror Expert.................................... 59 6. Chi-Square Results for Management Practices Hypothesis...................................... 61 7. Al Qaeda Management Practices by Respondent Business Experience................... 62 8. Events Identified for Study Inclusion ....................................................................... 72 9. Role Identification .................................................................................................... 73 10. Organizations to Which Open Source Documentation Associated Actors............... 74 11. Associates’ Relationship........................................................................................... 75 12. Betweenness of Top 15 out of 232 ........................................................................... 77 13. Closeness of Top 15 out of 232 ................................................................................ 77 14. Betweenness of Top 15 out of 81 Al Qaeda Network Actors................................... 78 15. Closeness of Top 15 out of 81 Al Qaeda Network Actors ....................................... 79 16. Centrality, Eigenvector for 16 Al Qaeda Network Core........................................... 81 17. Centrality, Eigenvector, Geodesic for Al Qaeda Network Core............................... 82 18 . Al Qaeda 16 Node Planners Network ....................................................................... 91 19. Al Qaeda 16 Node Planners’ CI_Index Model......................................................... 91 20. Al Qaeda 16 Node Planner Network CI_Index with Triads..................................... 92 21. 16 Agent Al Qaeda Network CI_Index Minimum Reconnection ............................ 93 22. ORA Generated Stylized Scale Free for Al Qaeda 16 Node Planner Network ........ 94 23. 232 Node Al Qaeda Network.................................................................................... 95 24. 232 Node Al Qaeda Network with Geodesic............................................................ 96 25. 232 Node Al Qaeda Network with Agent-Geodesic Relationship and CI_Index .... 97 26. 81 Node Al Qaeda Network...................................................................................... 98 27. 81 Al Qaeda Node Network with Geodesic.............................................................. 99 28. 81 Node Al Qaeda Network with Geodesic and CI_Index...................................
Recommended publications
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • Gender, Wasser Und Konflikt“
    Integration von Genderperspektiven in der technischen Zusammenarbeit in Konfliktgebieten – das Beispiel der Wasserversorgung im Ramallah Distrikt Natalie Mutlak Dissertation zur Erlangung des Grades eines Doktors der Ingenieurwissenschaften - Dr. Ing. - Vorgelegt im Fachbereich 3 (Mathematik & Informatik) der Universität Bremen im September 2012 Gutachterinnen Prof. Dr. Ines Weller Artec-Forschungszentrum Nachhaltigkeit Universität Bremen Prof. Dr. Susanne Maaß Arbeitsgruppe "Soziotechnische Systemgestaltung und Gender" Fachbereich 3 (Mathematik & Informatik) Universität Bremen Prof. Dr. Christine Eifler Zentrum Gender Studies (ZGS) Universität Bremen Tag des Kollquiums: 1. Februar 2013 ii Danksagung Mein Dank gilt der Heinrich-Böll-Stiftung, die mich in den Genuss eines dreijährigen Promotionsstipendiums kommen ließ, den Leiterinnen des zweiten Gunda-Werner-Kollegs „Genderdynamiken in gewaltförmigen Konflikten“ Christine Eifler und Ruth Seifert sowie dem Zentrum Gender Studies (ZGS) an der Universität Bremen (ZGS), dessen Infrastruktur wir StipendiatInnen nutzen konnten. Mein besonderer Dank gilt meinen Betreuerinnen und Gutachterinnen Ines Weller und Christine Eifler für ihre wertvolle Unterstützung und Geduld. Ohne ihr offenes Ohr, das sie während der gesamten Zeit der Dissertation stets für mich hatten, ihre unzähligen inhaltlichen Anregungen und ihre unschätzbare Unterstützung in organisatorischen Angelegenheiten wäre diese Arbeit nicht möglich gewesen. Ebenso möchte ich meiner Gutachterin Susanne Maaß danken. Meinen Mit-Kollegiatinnen
    [Show full text]
  • Commission Sensitive Memorandu.M for the Record Interview of Hamdan
    Commission Sensitive Memorandu.m for the Record • Subject: Interview of Hamdan Bin Gharib Al- Shalawi Location: Conference Palace, Riyadh Interviewed by: S A Ja eline Ma ire (FBI-Penttbom) 9/11 Law Enforcement Privacy 9-11 Commission) (OS) Interpreter: 9/11 Law Enforcement Privacy Also present: Col. Jaber (Mabahith) Maj. Khalid (Mabahith) Maj. Habib (Mabahith) Interview Date: October 22~231 2003 MFR Date: October 23, 2003 MPR Prepared By: DS The interview commenced at approximately 10:15 pm. It was led by S/A Maguire, pursuant to an agreement between the Commission and the FBI (which had requested to interview Al-Shalawi back in June but had seen no movement on that request until the Commission asked in late September to interview him as well). DS asked questions after BfA Maguire had concluded her questioning. • Although he was made aware of the availability of an interpreter, Al-Shalawi declined that option and the interview was conducted entirely in Englieh, in which he plainly was fluent. He appeared quite relaxed throughout the 3-hour interview and very intelligent, answering questions apprQpriately without any evident comprehension problems. Background After introductions, Al'-Shalaw1 was asked to provide his professional and educational background. He currently is an Assi~tant Professor in Linguistics at the Imam University and is entering his third year in that position. He received his B.A. from the University in 1413 (Hejira) and found his further education delayed by the Gulf War, during which he remained at the University as a teaching assistant .. cONFLD!lftI1tL • Commission Sensitive , 9/11\""::,;,:,;:::::::::::,::""""""""",,Personal Privacy c::==ve .
    [Show full text]
  • TO: Usama Bin Ladin FROM: Abu Musab Al-Suri [Mustafa Setmariam
    TO: Usama bin Ladin FROM: Abu Musab al-Suri [Mustafa Setmariam Nasar] and Abu Khalid al-Suri [Muhammad al-Bahaya] VIA: Ayman al-Zawahiri FOLDER: Incoming Mail—From Afghanistan DATE: July 19, 1999 Noble brother Abu Abdullah [Bin Ladin], Peace upon you, and God’s mercy and blessings. This message [concerns] the problem between you and al-Amir al-Mu’mineen [the Commander of the Faithful, i.e. Taliban leader Muhammad Umar] … The results of this crisis can be felt even here in Kabul and other places. Talk about closing down the camps has spread. Discontent with the Arabs has become clear. Whispers between the Taliban with some of our non-Arab brothers has become customary. In short, our brother Abu Abdullah’s latest troublemaking with the Taliban and the Commander of the Faithful jeopardizes the Arabs, and the Arab presence, today in all of Afghanistan, for no good reason. It provides a ripe opportunity for all adversaries, including America, the West, the Jews, Saudi Arabia, Pakistan, the Mas’ud-Dostum [Northern] Alliance, etc., to serve the Arabs a blow that could end up causing their most faithful allies to kick them out … Our brother [Bin Ladin] will help our enemies reach their goal free of charge! … The strangest thing I have heard so far is Abu Abdullah’s saying that he wouldn’t listen to the Commander of the Faithful when he asked him to stop giving interviews … I think our brother [Bin Ladin] has caught the disease of screens, flashes, fans, and applause … The only solution out of this dilemma is what a number of knowledgeable and experienced people have agreed upon … Abu Abdullah should go to the Commander of the Faithful with some of his brothers and tell them that … the Commander of the Faithful was right when he asked you to refrain from interviews, announcements, and media encounters, and that you will help the Taliban as much as you can in their battle, until they achieve control over Afghanistan.
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Al Qaeda Finances and Funding to Affiliated Groups
    Al Qaeda Finances and Funding to Affiliated Groups Strategic Insights, Volume IV, Issue 1 (January 2005) by Victor Comras Strategic Insights is a monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are those of the author(s) and do not necessarily represent the views of NPS, the Department of Defense, or the U.S. Government. For a PDF version of this article, click here. This paper provides a case study of al Qaeda finances and funding to affiliated groups. It is based in large part on my observations and experience as one of five international monitors charged by the UN Security Council to oversee the effectiveness of the measures adopted by the Security Council against al Qaeda and the Taliban. Some of the material in this paper is drawn directly from the five reports our monitoring group made to the Security Council during my tenure.. Considerable mystery and intrigue still surrounds the al Qaeda terrorist network and its sources of funding. We know more today than we did three years ago about its financial tools and structure, but we still have not identified much of its sources of supply and funding. And much of what we know may only be conjecture. The CIA has estimated, for example, that it cost Al Qaeda’ some $30 million a year to sustain itself during the period preceding 9/11, but the agency is still not sure what al Qaeda needs or expends today. And we still do not know with any precision just how much, and from whom, al Qaeda raises its money, or how it allocates it.[1] The roots of al Qaeda’s financial network, we believe, trace back directly to the extensive recruitment and financing networks established to support anti-Soviet jihad activities in Afghanistan.
    [Show full text]
  • Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman Et Al.; Translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016
    1 The Hashemite Kingdom of Jordan The Deposit Number at the National Library (2016/11/5076) 320 Abu Rumman, Mohammad Suliman et al. Methods of Preventing and Combatting Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman et al.; translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016 (207) p. Deposit No.: 2016/11/5076 Descriptors: / Terrorism// Arab Countries/ ﯾﺘﺤﻤﻞ اﻟﻤﺆﻟﻒ ﻛﺎﻣﻞ اﻟﻤﺴﺆوﻟﯿﺔ اﻟﻘﺎﻧﻮﻧﯿﺔ ﻋﻦ ﻣﺤﺘﻮى ﻣﺼﻨﻔﮫ وﻻ ﯾﻌﺒّﺮ ھﺬا اﻟﻤﺼﻨﻒ ﻋﻦ رأي داﺋﺮة اﻟﻤﻜﺘﺒﺔ اﻟﻮطﻨﯿﺔ أو أي ﺟﮭﺔ ﺣﻜﻮﻣﯿﺔ أﺧﺮى. Published in 2016 by Friedrich-Ebert-Stiftung Jordan and Iraq FES Jordan & Iraq P.O. Box 941876 11194 Amman Jordan Email: [email protected] Website: www.fes-jordan.org © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced, or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original authors. They do not necessarily represent those of the Friedrich- Ebert-Stiftung or the editors. Translation: Banan Malkawi, Samira Kawar Editing: Banan Malkawi, EVS Translations, Anja Wehler-Schoeck Cover: Mu'ath Iseid Printing: Economic Press ISBN: 978-9957-484-71-2 2 Methods of Preventing and Combatting Terrorism in the MENA Region and in the West 3 4 Table of Contents Anja Wehler-Schoeck Foreword: Agree to Disagree? International Efforts in Preventing and Combatting Terrorism .................................................................................................................... 7 Mohammad Abu Rumman Counter-Terrorism Efforts: The Dialectic of Inputs and Outputs ................................ 9 Hassan Abu Hanieh Approaches to the War on Terrorism: Examples of Efforts to Eradicate Extremism ........................................................................................................................................
    [Show full text]
  • National Security Case Studies Special
    National Security Case Studies Special Case-Management Challenges Robert Timothy Reagan Federal Judicial Center June 25, 2013 This Federal Judicial Center publication was undertaken in furtherance of the Center’s statutory mission to develop and conduct research and education programs for the judicial branch. While the Center regards the content as responsible and valuable, it does not reflect policy or recommendations of the Board of the Federal Judicial Center. Contents Table of Challenges .......................................................................................................... xi Table of Judges ............................................................................................................... xiii INTRODUCTION ............................................................................................................ 2 TERRORISM PROSECUTIONS ..................................................................................... 3 First World Trade Center Bombing United States v. Salameh (Kevin Thomas Duffy) and United States v. Abdel Rahman (Michael B. Mukasey) (S.D.N.Y.) ....................................................................... 5 Challenge: Interpreters ............................................................................................. 24 Challenge: Court Security ......................................................................................... 24 Challenge: Pro Se Defendants ................................................................................. 24 Challenge: Jury
    [Show full text]
  • Counter Terrorism Measures in Southeast Asia: How Effective Are They?
    Yuchengco Center – De La Salle University-Manila Counter Terrorism Measures in Southeast Asia: How Effective Are They? Rommel C. Banlaoi Yuchengco Center De La Salle University Manila i Counter Terrorism Measures in Southeast Asia: How Effective Are They? © Copyright 2009 by the Yuchengco Center Printed in the Philippines. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without the permission in writing from the Center. ISBN: 978-971-94089-2-5 Please address all inquiries to: Yuchengco Center 2nd Floor, Don Enrique T. Yuchengco Hall De La Salle University 2401 Taft Avenue, Manila 1004 Philippines email: [email protected] fax: (632) 525-3457 url: http://yc.dlsu.edu.ph ii Yuchengco Center – De La Salle University-Manila TABLE OF CONTENTS List of Figures …………………………………………….….………………… iv List of Tables …………………………………………….…..………………… v List of Acronyms …………………………...…………….…..……………… vi Acknowledgement …………………………………………....……………… xi Foreword …………………………………………………….………………… xiii Abstract ………………………………………………………………………… xix Introduction …………………………………….……….……………………… 1 Chapter I: Conceptualizing Terrorism in Southeast Asia: Definition, Evolution and Causes ………………………..……………… 5 Chapter II: Terrorist Groups in Southeast Asia and Modes of Operation ……………….………………….….…....………… 31 Chapter III: Impact of Terrorism on Socio-Economic Development in the Region
    [Show full text]
  • Islamic State Vs. Al-Qaeda
    NEW INTERNATIONAL AMERICA SECURITY DAVEED GARTENSTEIN-ROSS, JASON FRITZ, BRIDGET MORENG AND NATHANIEL BARR ISLAMIC STATE VS. AL-QAEDA STRATEGIC DIMENSIONS OF A PATRICIDAL CONFLICT DECEMBER 2015 About the Authors Daveed Gartenstein-Ross’s academic Nathaniel Barr is an analyst at Valens and professional work has focused on Global whose work focuses on violent non- understanding the evolving role of violent state actors in North Africa, the Sahel, and non-state actors in the world, with a the Horn of Africa. Barr has co-authored concentration in al-Qaeda and the Islamic four monographs, including a report State. He is a senior fellow at the Foundation for Defense examining the Islamic State’s propaganda strategy, and of Democracies and the chief executive officer of the has been published in Foreign Affairs, Foreign Policy, and consulting firm Valens Global. An adjunct professor Jamestown Foundation’s Militant Leadership Monitor. at Georgetown University and lecturer at the Catholic Before coming to Valens Global, Barr worked as a research University of America, Gartenstein-Ross is the author assistant with the Western Jihadism Project, a research or volume editor of nineteen books and monographs, project funded by the National Institute of Justice that including Bin Laden’s Legacy, which Georgetown explores radicalization and salafi jihadist networks in the University terrorism scholar Bruce Hoffman described West. Barr received his bachelor’s degree from Brandeis as “one of the few books to probe systematically [al- University. Qaeda’s] strategy and its effect on the U.S. and its allies.” Gartenstein-Ross has also been published widely in the academic and popular press, including in The New Jason Fritz is a senior researcher at York Times, The Washington Post, The Atlantic, Foreign Valens Global and a doctoral student in the Policy, and the peer-reviewed journals Studies in Conflict Department of Justice, Law and Criminology and Terrorism and Terrorism and Political Violence.
    [Show full text]
  • Demographic Jihad by the Numbers
    Demographic Jihad by the Numbers: Getting a Handle on the True Scope 2 June 2007 ©Yoel Natan HTML PDF (<2 MB) Author of the book Moon-o-theism I. Introduction A. Countering the Inevitable Charge of Islamophobia ► Case #1: A Pew Research Poll in 2007 Says 26% of Young Adult Muslim-Americans Support Suicide Bombing ► Case #2: Infidels Supposedly Have Nothing to Fear from Muslims, Yet Muslims Inexplicably Fear Being Takfired, That Is, Being Declared Infidels B. Demographic Jihad Explained C. Why This Study Is Important ► The Size of the Minority of Muslims and the Quality of Life Index D. Arriving at Accurate Demographic Snapshots and Projections E. The Politics of Demographic Numbers II. Global Demographics and Projections Countries discussed in some detail (if a country is not listed here, it likely is mentioned in passing, and can be found using the browser Search function): Afghanistan Africa Albania Algeria Argentina Australia Austria Azerbaijan Bangladesh Belgium Belize Benin Bosnia-Herzegovina & the Republika Srpska Britain (United Kingdom) Canada Chechnya China Cote d'Ivoire (Ivory Coast) Cyprus Czech Republic Denmark East Timor Egypt Eritrea Estonia Ethiopia Europe France French Guiana Germany Global Greece Greenland Guyana Horn of Africa/Somalia India Indonesia Iran Iraq Ireland & North Ireland (UK) Islamdom Israel Italy Japan Jordan Kosovo Lebanon Macedonia Malaysia Mexico Mideast Mongolia Montenegro Morocco Netherlands Nigeria North America Norway Oman Pakistan Palestine (West Bank and Gaza) Philippines Russia Saudi Arabia Serbia Singapore South Africa South America South Asia Spain Sri Lanka Sudan Suriname Sweden Switzerland Syria Tajikistan Thailand Tri-Border Region, aka Triple Frontier, Trinidad & Tobago Islands Turkey Ukraine United States Western Sahara Yemen Note: For maps and population information, see Yoel Natan’s “Christian and Muslim Demographics,” May 2007 PDF (>8MB).
    [Show full text]