Internet Radicalization : Actual Threat Or Phantom Menace?

Total Page:16

File Type:pdf, Size:1020Kb

Internet Radicalization : Actual Threat Or Phantom Menace? Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2012-09 Internet Radicalization : Actual Threat or Phantom Menace? Mealer, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/17416 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTERNET RADICALIZATION: ACTUAL THREAT OR PHANTOM MENACE? by Michael J. Mealer September 2012 Thesis Co-Advisors: Anders Strindberg Rodrigo Nieto-Gómez Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2012 Master’s Thesis 4. TITLE AND SUBTITLE Internet Radicalization: Actual Threat or Phantom 5. FUNDING NUMBERS Menace? 6. AUTHOR(S) Michael J. Mealer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number: ___________N/A________ 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited A 13. ABSTRACT (maximum 200 words) Popular opinion expresses fear that accessing radical Islamic content and connecting with extremist networks through Internet functionalities causes radicalization and recruitment to commit terrorist acts. Anecdotal evidence has been used to support this assertion. The opinion assumes the Internet creates a new path that drives radicalization and recruitment. Whether computer-mediated communication (CMC) and Internet functionalities cause individuals to radicalize has not been thoroughly studied. This thesis explores whether a correlation can be found to attribute radicalization to radicalizing content and extremist networks accessed through CMC and Internet functionalities. A framework is used to evaluate vulnerabilities identified by the psychological, sociological and social-psychological elements of radicalization against the radicalization process, personal history, and the presence of radicalizing conventional communication and extremist contact. The analysis finds three cases that may support a conclusion that Internet radicalization is possible; however, the importance of root causes and individual vulnerabilities may have a greater impact. Since some circumstances involving CMC may increase the likelihood of radicalization, the fear of Internet radicalization may be reasonable, but the number of incidents validating that fear makes the threat unlikely, and appears more as a phantom menace than a real threat. 14. SUBJECT TERMS Internet radicalization, radicalization process, radicalization 15. NUMBER OF causation, radicalization, jihad, jihadist, extremist, Islamic extremist, globalization, PAGES causation, correlations, vulnerability, computer-mediated communication, CMC, 109 conventional communication, root causes, recruitment, Internet recruitment and 16. PRICE CODE radicalization 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited INTERNET RADICALIZATION: ACTUAL THREAT OR PHANTOM MENACE? Michael J. Mealer Commander, Chicago Police Department B.A. North Park University, 1982 B.S. North Park University, 1982 J. D., Loyola University of Chicago, School of Law, 1989 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2012 Author: Michael J. Mealer Approved by: Anders Strindberg, PhD Thesis Co-Advisor Rodrigo Nieto-Gómez, PhD Thesis Co-Advisor Daniel Moran, Chair, Department of National Security Affairs iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Popular opinion expresses fear that accessing radical Islamic content and connecting with extremist networks through Internet functionalities causes radicalization and recruitment to commit terrorist acts. Anecdotal evidence has been used to support this assertion. The opinion assumes the Internet creates a new path that drives radicalization and recruitment. Whether computer-mediated communication (CMC) and Internet functionalities cause individuals to radicalize has not been thoroughly studied. This thesis explores whether a correlation can be found to attribute radicalization to radicalizing content and extremist networks accessed through CMC and Internet functionalities. A framework is used to evaluate vulnerabilities identified by the psychological, sociological and social-psychological elements of radicalization against the radicalization process, personal history, and the presence of radicalizing conventional communication and extremist contact. The analysis finds three cases that may support a conclusion that Internet radicalization is possible; however, the importance of root causes and individual vulnerabilities may have a greater impact. Since some circumstances involving CMC may increase the likelihood of radicalization, the fear of Internet radicalization may be reasonable, but the number of incidents validating that fear makes the threat unlikely, and appears more as a phantom menace than a real threat. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION........................................................................................................1 A. OVERVIEW.....................................................................................................1 B. INTERNET PLUS RADICALIZATION ASSUMES “INTERNET RADICALIZATION”......................................................................................2 C. RESEARCH QUESTIONS.............................................................................4 II. LITERATURE REVIEW ...........................................................................................5 A. PERCEPTIONS OF THE IMPACT OF THE INTERNET ON RADICALIZATION, RECRUITMENT AND TERRORISM....................5 B. RECRUITMENT AND RADICALIZATION ............................................13 C. RADICALIZATION CAUSES AND RADICALIZATION PROCESS...14 1. Radicalization Causation...................................................................15 2. Radicalization Process.......................................................................18 3. Self-Radicalization .............................................................................21 III. METHODOLOGY ....................................................................................................25 A. INTRODUCTION..........................................................................................25 B. CASE SELECTION.......................................................................................26 C. OUTCOME PROBLEM AND VARIABLE IDENTIFICATION ............28 1. Variables: Conventional Communication, Computer-Mediated Communication and Vulnerability...................................................28 2. Vulnerability Framework .................................................................29 D. ANALYSIS METHOD ..................................................................................29 IV. FINDINGS..................................................................................................................31 A. CASE REVIEW SUMMARY.......................................................................31 1. Hamaad Munshi.................................................................................32 2. Roshonara Choudhry ........................................................................32 3. Nicky Reilly.........................................................................................33 4. Colleen LaRose aka Jihad Jane:.......................................................34 5. Mohammed Hassan Khalid: .............................................................35 6. Abdul Basheer Abdul Kader.............................................................36 7. Arid Uka aka Abu Reyyan................................................................37 8. Betim Kaziu and Sulejah Hadzovic..................................................38 9. Mohamed Osman Mohamud ............................................................40 B. ANALYSIS .....................................................................................................41
Recommended publications
  • The Internet and the Radicalization of Muslim Women
    The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online.
    [Show full text]
  • Packaging Inspiration: Al Qaeda's Digital Magazine
    Linfield University DigitalCommons@Linfield Faculty Publications 2013 Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process Susan Currie Sivek Linfield College Follow this and additional works at: https://digitalcommons.linfield.edu/mscmfac_pubs Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Mass Communication Commons, and the Social Influence and oliticalP Communication Commons DigitalCommons@Linfield Citation Sivek, Susan Currie, "Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process" (2013). Faculty Publications. Published Version. Submission 12. https://digitalcommons.linfield.edu/mscmfac_pubs/12 This Published Version is protected by copyright and/or related rights. It is brought to you for free via open access, courtesy of DigitalCommons@Linfield, with permission from the rights-holder(s). Your use of this Published Version must comply with the Terms of Use for material posted in DigitalCommons@Linfield, or with other stated terms (such as a Creative Commons license) indicated in the record and/or on the work itself. For more information, or if you have questions about permitted uses, please contact [email protected]. International Journal of Communication 7 (2013), 584–606 1932–8036/20130005 Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process SUSAN CURRIE SIVEK Linfield College Al Qaeda is today a fragmented organization, and its strategic communication efforts now focus largely on recruiting individuals in the West to carry out “individual jihad” in their home countries. One Al Qaeda–affiliated publication, Inspire, represents an unusual use of the digital magazine format and content for recruitment. This study examines the content and design of Inspire to determine how the magazine may advance the self- radicalization that it seeks to induce in its readers.
    [Show full text]
  • F I L E D August 19, 2013
    Case: 12-50836 Document: 00512345596 Page: 1 Date Filed: 08/19/2013 IN THE UNITED STATES COURT OF APPEALS United States Court of Appeals FOR THE FIFTH CIRCUIT Fifth Circuit F I L E D August 19, 2013 No. 12-50836 Lyle W. Cayce Clerk UNITED STATES OF AMERICA, Plaintiff-Appellee v. NASER JASON JAMAL ABDO, also known as Naser Jason Abdo, Defendant-Appellant Appeals from the United States District Court for the Western District of Texas Before REAVLEY, ELROD, and GRAVES, Circuit Judges. REAVLEY, Circuit Judge: Naser Jason Jamal Abdo was arrested by police before he could carry out a plan to detonate a bomb and shoot service members stationed at Fort Hood, Texas. He was convicted of one count of attempted use of a weapon of mass destruction (Count 1), one count of attempted murder of officers or employees of the United States (Count 2), and four counts of possession of a weapon in furtherance of a federal crime of violence (Counts 3–6). He appeals his conviction and sentence. We AFFIRM. I. On July 26, 2011, Greg Ebert, an employee in a gun store in Killeen, Texas, notified police Sgt. Bradley and Lt. Boone about a suspicious customer Case: 12-50836 Document: 00512345596 Page: 2 Date Filed: 08/19/2013 No. 12-50836 who had come into the store. The customer, later identified as Abdo, purchased six one-pound containers of different types of smokeless gunpowder despite an apparent lack of knowledge about the substance, as well as three boxes of shotgun shells and an extended magazine for a handgun.
    [Show full text]
  • CTX Vol 2 No 4
    Vol. 2, No. 4 | CTX EDITORIAL STAFF From the Editor MICHAEL FREEMAN Executive Editor Welcome to our first special issue of CTX, “Social Media in Jihad and ANNA SIMONS Executive Editor Counterterrorism,” which is devoted to a wide-ranging exploration of social ELIZABETH SKINNER Managing Editor media and counterterrorism. Social media have become valuable tools for RYAN STUART Design & Layout combating crime and terrorism. According to LexisNexis® Risk Solutions, four out of five respondents to their survey of law enforcement professionals EDITORIAL REVIEW BOARD reported using social media, particularly Facebook and YouTube, to aid VICTOR ASAL investigations. One officer said he believed his department’s use of social University at Albany SUNY media allowed personnel to defuse a terrorist threat involving students at a ALEJANDRA BOLANOS local high school. Two-thirds said they thought access to social media helps National Defense University solve crimes more quickly. LAWRENCE CLINE Naval Postgraduate School To better understand the role of social media in combating terrorism, the Naval Postgraduate School (NPS) in Monterey, California held a small STEPHEN DI RIENZO workshop on Social Media and Counterterrorism this past June. Sponsored National Intelligence University by the Combating Terrorism Fellowship Program, the workshop brought SAJJAN GOHEL together a diverse group of people, including researchers, law enforcement Asia Pacific Foundation and military officers, and media experts from the United States, Ireland, and SEBASTIAN GORKA the Philippines. Participants were invited to submit papers for inclusion in National Defense University this special issue of CTX. JAKUB GRYGIEL School of Advanced International We are delighted to present here six papers that we received from partici- Studies pants of the workshop.
    [Show full text]
  • Borderless World, Boundless Threat:Online Jihadists and Modern
    BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Spencer O. Hayne, B.A. Washington, DC November 19, 2010 Copyright © 2010 by Spencer O. Hayne All Rights Reserved ii BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM Spencer O. Hayne, B.A. Thesis Advisor: Justine A. Rosenthal, Ph.D. ABSTRACT The online jihadist community represents a new phenomenon in the global spread of Islamic radicalism. Many terrorism experts largely ignore the fact that the Internet is more than just a tool for established terrorist organizations—it can be a platform for the evolution of the jihadist social movement itself. While the majority of this movement’s members are casual supporters of a global Islamist jihad against the West, a number of the community’s members have already proven willing to take their virtual beliefs into the real world through terrorist acts. Many of these terrorists have attracted significant media attention—Jihad Jane, the Christmas Day Bomber, the Fort Hood Shooter, the attack on CIA agents in Afghanistan, the Times Square Bomber, and a number of other “homegrown” terrorists. The individuals perpetrating these terrorist acts are as diverse as they are dangerous, presenting a significant challenge to counterterrorism officials and policymakers. This study profiles 20 recent cases of online jihadists who have made the transition to real-world terrorism along a number of characteristics: age, ethnicity, immigration status, education, religious upbringing, socio-economic class, openness about beliefs, suicidal tendencies, rhetoric focus, location, target, terrorist action, offline and online activity, and social isolation or the presence of an identity crisis.
    [Show full text]
  • Terrorism Risk: a Constant Threat
    TERRORISM RISK: A CONSTANT THREAT Impacts for Property/Casualty Insurers MARCH 2014 Robert P. Hartwig, Ph.D., CPCU President (212) 346-5520 [email protected] Claire Wilkinson Consultant (917) 459-6497 [email protected] Insurance Information Institute 110 William Street New York, NY 10038 212.346.5500 INTRODUCTION With just months to go until the year-end 2014 expiration of the government-backed Terrorism Risk Insurance Program Reauthorization Act (TRIPRA), the debate between industry and government over terrorism risk is intensifying. The discussion comes in a year that marks the one-year anniversary of the Boston Marathon bombing—the first successful terrorist attack on United States soil in more than a decade. The April 15, 2013, attack left three dead and 264 injured. Industry data shows that the proportion of businesses buying property terrorism insurance (the take-up rate for terrorism coverage) has increased since the enactment of TRIA in 2002, and for the last five years has held steady at around 60 percent, as businesses across the U.S. have had the opportunity to purchase terrorism coverage, usually at a reasonable cost. However, should TRIPRA not be extended, brokers have warned that the availability of terrorism insurance would be greatly reduced in areas of the U.S. that have the most need for coverage, such as central business districts. Uncertainty around TRIPRA’s future is already creating capacity and pricing issues for insurance buyers in early 2014, reports suggest.1 New Aon data shows that retail and transportation sectors face the highest risk of terrorist attack in 2014.2 Both sectors were significantly affected in 2013, as highlighted by the September 21, 2013, attack by gunmen on the upscale Westgate shopping mall in Nairobi, Kenya, as well as the Boston bombing.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat /name redacted/ Specialist in Organized Crime and Terrorism February 19, 2014 Congressional Research Service 7-.... www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, lawful permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001
    CORPORATION THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • CTC Sentinel 4:2 7666999329321&Oid=211220622244900
    AUGUST 2011 . VOL 4 . ISSUE 8 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINel OBJECTIVE . RELEVANT . RIGOROUS Contents AQAP’s ‘Great Expectations’ FEATURE ARTICLE 1 AQAP’s ‘Great Expectations’ for for the Future the Future By Bruce Riedel By Bruce Riedel REPORTS 4 The Revival of Shi`a Militancy in Iraq By Ramzy Mardini 8 Al-Qa`ida’s Confused Messaging on Libya By Barak Barfi 12 Germany Increasingly a Center for Terrorism in Europe By Sajjan M. Gohel 16 Islamic Activism in Europe: The Role of Converts By Emmanuel Karagiannis 19 The Rise of Salafists in Tunisia After the Fall of Ben Ali By Aaron Y. Zelin 21 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts merican counterterrorism in the face of adversity is a model for officials recently warned other al-Qa`ida units now threatened. that al-Qa`ida in the Arabian In particular, with al-Qa`ida’s core in Peninsula (AQAP) is trying Pakistan under severe pressure due to Ato produce the lethal poison ricin to be Usama bin Ladin’s death in May 2011, packed around small bombs for use in AQAP provides insights into the jihad’s attacks against the U.S. homeland.1 This capacity to rally back from defeat. latest development is further evidence of AQAP’s growing threat to the United AQAP has done far more than just About the CTC Sentinel States. The group has demonstrated survive. In the last two years, it has The Combating Terrorism Center is an remarkable resiliency and adaptability in emerged as a potent al-Qa`ida threat to independent educational and research its history, surviving several leadership the U.S.
    [Show full text]
  • American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic”
    American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” American Self- Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” By Caroline Joan “Kay” S. Picart American Self-Radicalizing Terrorists and the Allure of “Jihadi Cool/Chic” By Caroline Joan “Kay” S. Picart This book first published 2017 Cambridge Scholars Publishing Lady Stephenson Library, Newcastle upon Tyne, NE6 2PA, UK British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Copyright © 2017 by Caroline Joan “Kay” S. Picart All rights for this book reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN (10): 1-4438-9889-9 ISBN (13): 978-1-4438-9889-8 For my husband, Jerry Rivera, whose love and loyalty are powerfully enduring, and the Picart, Terrell, and Rivera families, whose devotion and support help ease many of life’s storms and contingencies TABLE OF CONTENTS Acknowledgments .................................................................................... viii Chapter I ...................................................................................................... 1 The Rise of American Self-Activating/Radicalizing Terrorists Chapter II ................................................................................................... 41 Colleen LaRose: From Victim of Incest to Aspiring
    [Show full text]
  • Lobos De Occidente
    LOBOS DE OCCIDENTE EL TERRORISMO INDIVIDUAL COMO ELEMENTO EMERGENTE Y EVOLUCIÓN TÁCTICA DE AL-QA`IDA. __________ Autor: Mario TOBOSO BUEZO (Barcelona, 1969) es Doctor en Paz y Seguridad Internacional por la UNED, Experto Universitario en Análisis en Violencia Política y Terrorismo por la Universidad de Granada, Licenciado en Derecho y Licenciado en Criminología. Su experiencia profesional se desarrolla especialmente en los ámbitos relacionados con el trabajo de campo y la seguridad. Ha sido conferenciante, como experto en terrorismo, en el European Diversity Expert Meeting (EDPOL) celebrado en el año 2011 y en el XI Seminario Permanente de Estudios sobre Terrorismo organizado por la Fundación Ortega-Marañón y el Real Instituto Elcano celebrado en el año 2012. También ha participado, como experto en el fenómeno del terrorismo individual, en las “Primeras Jornadas sobre Inteligencia ante la Radicalización” celebradas en el año 2012. Periódicamente imparte sesiones académicas sobre el fenómeno del terrorismo en el Instituto de Seguridad Pública de Cataluña. A pesar de haber iniciado su producción académica recientemente ya ha publicado varios artículos de investigación sobre Terrorismo Individual en prestigiosas revistas y su primer libro es un análisis exhaustivo del fenómeno. Mario TOBOSO BUEZO LOBOS DE OCCIDENTE EL TERRORISMO INDIVIDUAL COMO ELEMENTO EMERGENTE Y EVOLUCIÓN TÁCTICA DE AL-QA`IDA INSTITUTO UNIVERSITARIO GENERAL GUTIÉRREZ MELLADO – UNED 2014 © Copyright by Instituto Universitario General Gutiérrez Mellado de Investigación sobre la Paz, la Seguridad y la Defensa c/ Princesa 36 28008 Madrid Teléfono: 91 7580011 Fax: 91 7580030 [email protected] www.iugm.es El IUGM aplica a sus procesos de producción editorial los criterios de calidad establecidos por la ANECA, la CNEAI y la ANEP.
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]