Assessing the Effectiveness of Current De-Radicalization Initiatives And

Total Page:16

File Type:pdf, Size:1020Kb

Assessing the Effectiveness of Current De-Radicalization Initiatives And Assessing the Effectiveness of Current De‐Radicalization Initiatives and Identifying Implications for the Development of U.S.‐Based Initiatives in Multiple Settings Final Report to Human Factors/Behavioral Sciences Division, Science and Technology Directorate, U.S. Department of Homeland Security September 2009 (revised) National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 3300 Symons Hall • College Park, MD 20742 • 301.405.6600 • www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report This report is part of a series sponsored by the Human Factors/Behavioral Sciences Division in support of the Counter‐IED Prevent/Deter program. The goal of this program is to sponsor research that will aid the intelligence and law enforcement communities in identifying potential terrorist threats and support policymakers in developing prevention efforts. This project officially terminated on June 30th, 2009. The research was carried out by two researchers from the Pennsylvania State University, Dr. John Horgan, the Principal Investigator, and Mr. Kurt Braddock, Research Assistant. Biographical notes on the researchers is contained in Appendix A. This report represents the principal delivery of the findings of the research. A further report on the research findings will be published in an academic journal, to be submitted for review in early‐Fall 2009.This project was conducted over twelve months, and is the result of an analysis of open source, secondarily obtained material. As such, and because neither data collection nor data analysis was part of this effort, this report takes the form of a position paper. It should be stressed that this report is the result of independent research. The research that led to this report was supported with financial assistance from the National Consortium for the Study of Terrorism and Responses to Terrorism (START), at the University of Maryland. This study was not a government research project: it is the work of an independent team of academics and has not been conducted to support or refute any particular policy objective. This material is based upon work supported by the Science and Technology directorate of the U.S. Department of Homeland Security under Grant Award Number 2008‐ST‐061‐ST0004, made to the National Consortium for the Study of Terrorism and Responses to Terrorism (START, www.start.umd.edu). The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security, START, or Pennsylvannia State University. About START The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is supported in part by the Science and Technology Directorate of the U.S. Department of Homeland Security through a Center of Excellence program based at the University of Maryland. START uses state‐of‐the‐art theories, methods and data from the social and behavioral sciences to improve understanding of the origins, dynamics and social and psychological impacts of terrorism. For more information, contact START at [email protected] or visit www.start.umd.edu. Citations To cite this report, please use this format: “Author, Title of Report, College Park, MD, START 2009” National Consortium for the Study of Terrorism and Responses to Terrorism A U.S. Department of Homeland Security Center of Excellence Contents Executive Summary .................................................................................................................................................................. 3 Introduction ................................................................................................................................................................................ 6 This Report ............................................................................................................................................................................. 8 A Note on the Case Studies .............................................................................................................................................. 8 Case Study: Northern Ireland’s Early Release Scheme ...............................................................................................10 Introduction .........................................................................................................................................................................10 Critical Issues: Training and Reintegration as a Means of Risk Reduction .....................................................12 Critical Issues: Restorative Justice for Victims ..........................................................................................................14 Critical Issues: Recidivism ................................................................................................................................................15 Conclusions ..........................................................................................................................................................................16 Case Study: Colombia’s Disengagement and Reincorporation Program ............................................................18 Introduction .........................................................................................................................................................................18 Critical Issues: Victims Rights and the Management of Critique ......................................................................21 Critical Issues: Recidivism ................................................................................................................................................23 Conclusions ..........................................................................................................................................................................24 Case Study: Indonesian’s Disengagement Program ...................................................................................................25 Introduction .........................................................................................................................................................................25 Critical Issues: Criticism and Recidivism.....................................................................................................................29 Conclusions ..........................................................................................................................................................................30 Case Study: Yemen’s Religious Dialogue Committee .................................................................................................31 Introduction .........................................................................................................................................................................31 Critical Issues: Reactions, Claimed Successes and Recidivism ...........................................................................34 Conclusions ..........................................................................................................................................................................35 Case Study: Saudi Arabia’s Counseling Program ..........................................................................................................37 Introduction .........................................................................................................................................................................37 Conclusions ..........................................................................................................................................................................41 Conclusions ...............................................................................................................................................................................42 Assessing the Effectiveness of Current De-Radicalization Initiatives and Identifying Implications for 1 the Development of U.S.-Based Initiatives in Multiple Settings National Consortium for the Study of Terrorism and Responses to Terrorism A U.S. Department of Homeland Security Center of Excellence Bibliography ..............................................................................................................................................................................47 Appendix - Biographical Information on Research Team .........................................................................................57 Assessing the Effectiveness of Current De-Radicalization Initiatives and Identifying Implications for 2 the Development of U.S.-Based Initiatives in Multiple Settings National Consortium for the Study of Terrorism and Responses to Terrorism A U.S. Department of Homeland Security Center of Excellence Executive Summary In recent years, substantial attention has been paid to how and why terrorism ends. The welcome development of an increase in research on a hitherto neglected area has occurred in parallel with the increasing prevalence of a series of innovative, ambitious yet under-examined approaches to counterterrorism. These are collectively referred
Recommended publications
  • MOE Steve Ijames
    27-CR-20-12953 Filed in District Court State of Minnesota 1/14/2021 1:33 PM Steve Ijames EDUCATION • Bachelor of Science degree in Criminal Justice Administration, Drury University, Springfield, Missouri • Master of Science Degree in Public Administration, City University, Bellevue, Washington • Graduate, Missouri State Highway Patrol Law Enforcement Academy • Graduate, Missouri State Highway Patrol undercover narcotics investigator training program. • Graduate, Drug Enforcement Administration (DEA) undercover narcotics investigator training program. • Graduate, Mid States Organized Crime Information Center (MOCIC) narcotic investigators Criminal Intelligence Techniques training program. • Graduate, Springfield, Missouri Police Department Academy • Graduate, 186th FBI National Academy LAW ENFORCEMENT/PROFESSIONAL EXPERIENCE Poplar Bluff, Missouri Police Department • April 1979 through February 1981-Patrol Officer • February 1981 through August 1982-Narcotics Detective Springfield, Missouri Police Department • August 1982-1000 hour Springfield Police academy training • January 1983-uniformed patrol officer • September 1985-undercover narcotics investigator and Federal Drug Task Force member-Commissioned Deputy Untied States Marshal • October 1987-uniformed patrol • July 1988-Detective-criminal investigations and undercover narcotics investigations • September 1989-Sergeant-criminal investigations • April 1990-Crisis Action Team leader/sergeant (SWAT) • December 1992-Lieutenant, Special Operations Commander-overseeing all SWAT and narcotics
    [Show full text]
  • South Florida Trial Targets Ira 'Agents' Three Accused of Gunrunning
    The Miami Herald April 30, 2000 Sunday FINAL EDITION SOUTH FLORIDA TRIAL TARGETS IRA 'AGENTS' THREE ACCUSED OF GUNRUNNING BY DANIEL DE VISE In dimly lit Irish pubs across South Florida, passionate partisans are selling raffle tickets to pay court costs for the "political prisoners" they call the "Florida Four." Federal prosecutors take a less romantic view of the Florida Four, a quartet they accuse of running guns from Florida to the Irish Republican Army. Trial begins Monday in Fort Lauderdale for three natives of Belfast, Northern Ireland, charged with shipping more than 100 guns to the IRA from post offices in Boca Raton and Deerfield Beach in boxes disguised as baby clothes and toy firetrucks. A Boca Raton woman, Siobhan Browne, who rounds out the Florida Four, will not go to trial. The former stockbroker from Cork, Ireland, pleaded guilty last month as part of a bargain that will likely see her take the stand to testify against the others. All of Great Britain will be watching the case, which threatened to derail a delicate peace in Northern Ireland when it broke last summer. The 2-year-old Good Friday agreement, a bid to end seven centuries of conflict, calls for the disarmament of the IRA. Few could have expected the battle for Northern Ireland to spill over into Broward County, a place unaccustomed to criminal defendants with brogues. "We will demonstrate at trial that this was an official operation of the Provisional Irish Republican Army," said Assistant U.S. Attorney Richard Scruggs, referring to the branch of the IRA linked to a trail of political bombings and assassinations over the past 30 years.
    [Show full text]
  • IN THIS ISSUE: Briefs
    VOLUME IX, ISSUE 32 uAUGUST 12, 2011 IN THIS ISSUE: BRIEFS..................................................................................................................................1 SOMALIA’S FAMINE CONTRIBUTES TO POPULAR REVOLT AGAINST AL-SHABAAB MILITANTS By Muhaydin Ahmed Roble ......................................................................................3 INDONESIA’S “GHOST BIRDS” TACKLE ISLAMIST TERRORISTS: A PROFILE OF Armed tribesmen work- DENSUS-88 ing with Yemeni Army By Jacob Zenn .........................................................................................................5 THE BATTLE OF ZINJIBAR: THE TRIBES OF YEMEN’S ABYAN GOVERNORATE JOIN Terrorism Monitor is a publication THE FIGHT AGAINST ISLAMIST MILITANCY of The Jamestown Foundation. By Andrew McGregor ..............................................................................................7 The Terrorism Monitor is designed to be read by policy- makers and other specialists QADDAFI ALLY ROBERT MUGABE CALLS NATO “TERRORISTS,” yet be accessible to the general public. The opinions expressed THREATENS TO EXPROPRIATE WESTERN FIRMS IN ZIMBABWE within are solely those of the authors and do not necessarily Mu’ammar Qaddafi’s policy of using Libya’s oil wealth to build stronger ties reflect those of The Jamestown with sub-Saharan African nations through financial aid, investment and arms Foundation. supplies has resulted in a distinct lack of support in many of these nations for NATO’s military intervention in the Libyan rebellion. Among the most Unauthorized reproduction or vociferous of Qaddafi’s supporters has been the long-time ruler of Zimbabwe, redistribution of this or any Robert Mugabe. Zimbabwe has been frequently mentioned as a possible place Jamestown publication is strictly of exile for the Libyan leader and there were rumors earlier this year that prohibited by law. Zimbabwean troops had been sent to Libya, rumors that gained strength within Zimbabwe after the nation’s defense minister declined to issue a straightforward denial (Zimbabwean, February 25).
    [Show full text]
  • Al-Shabaab Attack on Peacekeepers Cannot Hide
    VOLUME XIII, ISSUE 18 u SEPTEMBER 4, 2015 IN THIS ISSUE: BRIEFS ............................................................................................................................1 THE FINNISH FOREIGN FIGHTER CONTINGENT IN SYRIA AND IRAQ By Juha Saarinen ...............................................................................................................3 Detachment 88, Indonesia’s ISLAMIC STATE IN AFGHANISTAN READY TO CAPITALIZE ON MULLAH counter-terrorism unit, inspects a stall after OMAR’S DEATH arresting individuals for By Farhan Zahid ...............................................................................................................6 allegedly planning a terrorist attack with INDONESIA’S NEW COUNTER-TERRORISM CHALLENGES support from Syria. By Andrew Zammit and Muhammad Iqbal ..................................................................7 Terrorism Monitor is a publication of The Jamestown Foundation. AL-SHABAAB ATTACK ON PEACEKEEPERS CANNOT HIDE GROUPS’ The Terrorism Monitor is DISARRAY designed to be read by policy- makers and other specialists James Brandon yet be accessible to the general public. The opinions expressed within are solely those of the The Somali Islamist militant organization al-Shabaab carried out one of its most lethal authors and do not necessarily attacks in years on September 1, when it bombed a Ugandan military base in the Janale reflect those of The Jamestown district of the lower Shabele region, southwest of the capital Mogadishu. Al-Shabaab Foundation. claimed that the attack killed around 50 Ugandan soldiers, who are in the country as part of an African Union (AU) peacekeeping mission, although official AU statements Unauthorized reproduction have not announced the casualty toll (AU, September 1). The attack began when a or redistribution of this or any suicide bomber drove an explosive-packed car into the base’s entrance, after which a Jamestown publication is strictly large number of other militants stormed the facility (Horseed Media, September 1).
    [Show full text]
  • Strengthening Tourism Business Resilience Against the Impact of Terrorist Attack
    Strengthening Tourism Business Resilience against the Impact of Terrorist Attack Report on the APEC Counter-Terrorism Working Group’s Workshop on 9-10 May 2017, Bali, Indonesia APEC Counter-Terrorism Working Group September 2017 APEC Project: APEC CTWG 01/2016A Produced by: Project Overseer National Counter Terrorism Agency of Indonesia Komplek IPSC Jl. Anyar Desa Tangkil, Sentul, Bogor, INDONESIA Email : [email protected] Website : https://www.bnpt.go.id/ Editor Fitriani, Gilang Kembara and Rebekha Adriana Centre for Strategic and International Studies (CSIS) Jakarta Jalan Tanah Abang 3 No. 23, Gedung Pakarti Center, Tanah Abang, RT.3/RW.3, Petojo Selatan, Gambir, Jakarta Pusat, 10260, INDONESIA Telephone : (62-21) 386 5532 Fax : (62-21) 384 7517 Email : [email protected] Website : http://www.csis.or.id/ Produced for: APEC Secretariat 35 Heng Mui Keng Terrace Singapore 119616 Telephone: (65) 68919600 Fax: (65) 68919690 Email: [email protected] Website: www.apec.org APEC#217-CO-04.1 © 2017 APEC Secretariat ii Strengthening Tourism Business Resilience against the Impact of Terrorist Attack Report on the APEC Counter-Terrorism Working Group’s Workshop on 9-10 May 2017, Bali, Indonesia APEC Counter Terrorism Working Group September 2017 iii LIST OF CONTENT List of Content ...................................................................................................................................... iv List of Abbreviations ..........................................................................................................................
    [Show full text]
  • Asian Conflicts Reports
    Asian Conflicts Reports Recent Terrorism Developments in Indonesia China, North Korea-Iran Nuclear Axis Muscular Secularism in Singapore Wahhabism in Sri Lanka Privately Armed Groups in the Philippines ISSUE 12 | JULY-AUGUST, 2010 Counter-Terrorism in Indonesia: Recent Developments and Challenges A=Nelson Rand Indonesia‟s counter-terrorism forces have made significant gains in the first half of 2010, but their success also highlights some crucial shortfalls in the country‟s counter-terrorism program and reveals a new transformation of Islamic militancy in the country. The first major success of the year came in late February when police discovered a jihadi training camp in the jungles of northwest Aceh. A cache of M-16s, revolvers and thousands of rounds of ammunition were found, along with Malaysian Army uniforms and a large amount of cash. Subsequent investigations revealed that the group was planning gun attacks on hotels frequented by tourists and high-profile assassinations, including on President Susilo Bambang Yudhoyono. Over 60 suspected cell members have since been arrested and just over a dozen killed. The group called itself al-Qaeda Serambi Mekkah (al-Qaeda in Aceh), and its discovery in late February was unique in two main ways. First, it was the first known time that Indonesia‟s jihadists set up a base in Aceh, the country‟s westernmost province on the tip of Sumatra. Although the province was engaged in a separatist insurgency against Jakarta for over 30 years, radical Islamic militancy had never taken root in the province and it had always remained outside the influence and operational area of Indonesian Jihadist groups, including Jemaah Islamiyah (JI), Southeast Asia‟s largest terrorist network.
    [Show full text]
  • The Brisbane Line
    The Brisbane Line VOL 6; ISSUE 2, July 2018 RAAF is going though “an incredible transition” – especially at Amberley Below, left: The Growler electronic attack platform for which A$300 million is being spent on new hangers at Amberley. Below: A Boeing C-17 Globemaster III based at Amberley. Left: The F35 Joint Strike Fighter, which will be based at Williamtown in December 2018. Australia’s Royal Australian Air Force (RAAF) was now going through an incredible transition according to Air Comodore Kenneth Robinson, pictured right, CSC, Commander Combat Support Group and Senior Australian Defence Force Officer - Amberley. RAAF Base Amberley is also going through a major development. It is to be maintained as one of Australia’s leading defence facilities, he said. Much is being spent on new RAAF aircraft to make Amberley Australia’s “centre of air mobility”. Spending of about A$1.3 billion over four years was soon expected to equip RAAF Base Amerberly with 63 aircraft instead of 38. AIR CDRE Robinson gave a talk on these RAAF changes to a luncheon meeting of RUSIQ members on May 16, 2018. He has 4,500 personnel under his command, or close to one- quarter of the RAAF’s trained workforce. These include 2,500 or so RAAF people at Amberley and about 1,500 others – including reservists. About 8,000 people currently go through the front gate each day at Amberley - working on construction as well as defence. About 900 of them are Australian Army soldiers – who are involved in engineering and logistics. and defence dog training.
    [Show full text]
  • Jemaah Islamiyah After the Recent Wave of Arrests: How Much Danger Remains? Tomsa, Dirk
    www.ssoar.info Jemaah Islamiyah after the Recent Wave of Arrests: How Much Danger Remains? Tomsa, Dirk Veröffentlichungsversion / Published Version Zeitschriftenartikel / journal article Zur Verfügung gestellt in Kooperation mit / provided in cooperation with: GIGA German Institute of Global and Area Studies Empfohlene Zitierung / Suggested Citation: Tomsa, D. (2007). Jemaah Islamiyah after the Recent Wave of Arrests: How Much Danger Remains? Südostasien aktuell : journal of current Southeast Asian affairs, 26(5), 73-84. https://nbn-resolving.org/urn:nbn:de:0168- ssoar-336137 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer CC BY-NC-ND Lizenz This document is made available under a CC BY-NC-ND Licence (Namensnennung-Nicht-kommerziell-Keine Bearbeitung) zur (Attribution-Non Comercial-NoDerivatives). For more Information Verfügung gestellt. Nähere Auskünfte zu den CC-Lizenzen finden see: Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0/deed.de 73 73 Südostasien aktuell 5/2007 73 Im Fokus Jemaah Islamiyah after the Recent Wave of Arrests: How Much Danger Remains? Jemaah Islamiyah nach der jüngsten Verhaftungswelle: Wie viel Gefahr besteht noch? Dirk Tomsa Abstract In June 2007, the Indonesian police arrested two top leaders and a number of other alleged members of Southeast Asia’s most prominent terrorist organization Jemaah Islamiyah (JI). The arrests were the latest in a whole series of successful police operations that has weakened JI over the last few years. Some observers now believe that JI no longer poses an immediate threat to Indonesian security, but others disagree, arguing that JI is merely in a temporary consolidation phase.
    [Show full text]
  • Numbers 1 to 100
    Numbers 1 to 100 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 02:36:24 UTC Contents Articles −1 (number) 1 0 (number) 3 1 (number) 12 2 (number) 17 3 (number) 23 4 (number) 32 5 (number) 42 6 (number) 50 7 (number) 58 8 (number) 73 9 (number) 77 10 (number) 82 11 (number) 88 12 (number) 94 13 (number) 102 14 (number) 107 15 (number) 111 16 (number) 114 17 (number) 118 18 (number) 124 19 (number) 127 20 (number) 132 21 (number) 136 22 (number) 140 23 (number) 144 24 (number) 148 25 (number) 152 26 (number) 155 27 (number) 158 28 (number) 162 29 (number) 165 30 (number) 168 31 (number) 172 32 (number) 175 33 (number) 179 34 (number) 182 35 (number) 185 36 (number) 188 37 (number) 191 38 (number) 193 39 (number) 196 40 (number) 199 41 (number) 204 42 (number) 207 43 (number) 214 44 (number) 217 45 (number) 220 46 (number) 222 47 (number) 225 48 (number) 229 49 (number) 232 50 (number) 235 51 (number) 238 52 (number) 241 53 (number) 243 54 (number) 246 55 (number) 248 56 (number) 251 57 (number) 255 58 (number) 258 59 (number) 260 60 (number) 263 61 (number) 267 62 (number) 270 63 (number) 272 64 (number) 274 66 (number) 277 67 (number) 280 68 (number) 282 69 (number) 284 70 (number) 286 71 (number) 289 72 (number) 292 73 (number) 296 74 (number) 298 75 (number) 301 77 (number) 302 78 (number) 305 79 (number) 307 80 (number) 309 81 (number) 311 82 (number) 313 83 (number) 315 84 (number) 318 85 (number) 320 86 (number) 323 87 (number) 326 88 (number)
    [Show full text]
  • Conflict, Community, and Criminality in Southeast Asia and Australia
    Conflict, Community, and Criminality in Southeast Asia and Australia CENTER FOR STRATEGIC & CSIS INTERNATIONAL STUDIES Assessments from the Field A Report of the CSIS Transnational Threats Project 1800 K Street, NW | Washington, DC 20006 editors Tel: (202) 887-0200 | Fax: (202) 775-3199 Arnaud de Borchgrave E-mail: [email protected] | Web: www.csis.org Thomas Sanderson David Gordon foreword Marc Sageman June 2009 ISBN 978-0-89206-583-7 CENTER FOR STRATEGIC & Ë|xHSKITCy065837zv*:+:!:+:! CSIS INTERNATIONAL STUDIES Conflict, Community, and Criminality in Southeast Asia and Australia Assessments from the Field A Report of the CSIS Transnational Threats Project editors Arnaud de Borchgrave Thomas Sanderson David Gordon foreword Marc Sageman June 2009 About CSIS In an era of ever-changing global opportunities and challenges, the Center for Strategic and International Studies (CSIS) provides strategic insights and practical policy solutions to decisionmakers. CSIS conducts research and analysis and develops policy initiatives that look into the future and anticipate change. Founded by David M. Abshire and Admiral Arleigh Burke at the height of the Cold War, CSIS was dedicated to the simple but urgent goal of finding ways for America to survive as a nation and prosper as a people. Since 1962, CSIS has grown to become one of the world’s preeminent public policy institutions. Today, CSIS is a bipartisan, nonprofit organization headquartered in Washington, DC. More than 220 full-time staff and a large network of affiliated scholars focus their expertise on defense and security; on the world’s regions and the unique challenges inherent to them; and on the issues that know no boundary in an increasingly connected world.
    [Show full text]
  • Terrorism and Counter-Terrorism in Indonesia
    Terrorism and Counter-Terrorism in Indonesia Written by: Angel Damayanti Universitas Kristen Indonesia, Jakarta 2010 Contents I. Introduction I.1 Background 2 I.2 Question Research 6 I.3 Limitation of Research 7 I.4 Goals and Purposes of Research 7 I.5 Theories 8 I.6 Methodology 12 I.7 Writing Arrangement 12 II. The Chronological Terrorism in Indonesia 1. Chronological of Terrorist actions in Indonesia 14 2. The Evolution of Terrorism in Indonesia 23 2.1 The Method 24 2.2 The Target 28 2.3 The Motives 29 III. The Development of Terrorism in Indonesia and Counter Terrorism 1. Background 33 2. Terrorism and Counter-Terrorism 36 3. Soft and Hard Aprroaches 39 4. The Achievement of Counter Terrorism in Indonesia 41 5. Future Challenges of Counter-Terrorism Strategy in Indonesia 44 IV. Conclusion and Recommendation 49 References 1 I Introduction I.1 Background In midst of March 2011, the people and the government of Indonesia were once again shocked by some acts of terrorist in this country. But this time, the terrorist used a different way to terror the people. They put bombs in a book. This book parcel bombs then delivered to some people. They are Ulil Abshar Abdala, an activist of Jaringan Islam Liberal (JIL), the musician Ahmad Dhani, General Komisaris Pol Gorries Mere, Yapto S. Soerjosoemarno, a member of Pancasila Youth, and previous Chief of West Java District Police.1 Previously, at the end of February 2010, the government also found some terrorist did their paramilitary training in Aceh, a place where a conflict once had occurred between the government of Indonesia and Gerakan Aceh Merdeka (GAM), a movement to freed Aceh that had been existed for almost 30 years.
    [Show full text]
  • The New Terrorism the Nature of the War on Terrorism
    The New Terrorism The Nature of the War on Terrorism MICHAEL W. KOMETER, Major, USAF School of Advanced Airpower Studies THESIS PRESENTED TO THE FACULTY OF THE SCHOOL OF ADVANCED AIRPOWER STUDIES, MAXWELL AIR FORCE BASE, ALABAMA, FOR COMPLETION OF GRADUATION REQUIREMENTS, ACADEMIC YEAR 2001–2. Air University Press Maxwell Air Force Base, Alabama 36112-6615 July 2004 This School of Advanced Air and Space Studies thesis and others in this series are available electronically at the Air University Research Web site http://research. maxwell.af.mil and the AU Press Web site http://aupress.maxwell.af.mil. Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: dis- tribution unlimited. ii Contents Chapter Page DISCLAIMER . ii ABSTRACT . v ABOUT THE AUTHOR . vii ACKNOWLEDGMENTS . ix 1 INTRODUCTION . 1 2 NATURE OF TERRORISM . 5 3 HOW TO ANALYZE TERRORIST STRATEGIES . 19 4 “OLD” TERRORISM . 27 5 “NEW” TERRORISM . 49 6 CONCLUSIONS AND IMPLICATIONS . 71 Table 1 Comparison of Analytical Frameworks . 21 iii Abstract This study defines the nature of the war on terrorism by assessing the chang- ing nature of terrorism itself and develops an analytical framework within which to assess the strategies of terrorist groups. It compares the strategies of old ter- rorist groups—Red Army Faction, Palestinian Liberation Organization, and Irish Republican Army—to the new terrorism, the militant Islamic movement. This study concludes that there is a “new terrorism” that is not merely terrorism but a global insurgency.
    [Show full text]