Terrorists and Cyberspace: the Digital Battleground

Total Page:16

File Type:pdf, Size:1020Kb

Terrorists and Cyberspace: the Digital Battleground Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2018-06 TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND Urena Figueroa, Alberto Miguel Monterey, CA; Naval Postgraduate School http://hdl.handle.net/10945/59608 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND by Alberto Miguel Urena Figueroa June 2018 Thesis Advisor: Tristan J. Mabry Second Reader: Robert E. Looney Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK Form Approved OMB REPORT DOCUMENTATION PAGE No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave blank) June 2018 Master's thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND 6. AUTHOR(S) Alberto Miguel Urena Figueroa 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT Monterey, CA 93943-5000 NUMBER 9. SPONSORING / MONITORING AGENCY NAME(S) AND 10. SPONSORING / ADDRESS(ES) MONITORING AGENCY N/A REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release. Distribution is unlimited. A 13. ABSTRACT (maximum 200 words) This thesis asks why and how terrorist organizations use the Internet to achieve three strategic goals: 1) the dissemination of propaganda, 2) recruitment, and 3) fundraising. It is immediately apparent that the Internet offers a number of advantages, including low cost, global reach, and anonymity. Nonetheless, terrorist organizations vary in their exploitation of these advantages according to their immediate objectives. To explain these variations, this thesis presents a comparative study of Al Qaeda, the Islamic State of Iraq and Syria (ISIS), and the Taliban. This study considers how different objectives render distinct narratives and thereby affect how those narratives leverage images and information in the dissemination of propaganda. Similarly, targets of recruitment vary according to the objectives of the respective organizations; this primarily affects their use of social media, including Facebook, YouTube, Twitter, and other applications. Fundraising methods also vary, from local means (extortion, narcotics, smuggling) to contemporary exploitation of digital platforms like PayPal and cell phone applications enabling anonymous donations. This thesis concludes that the sophistication of terrorist organizations online requires an equally sophisticated response that is as essential to the fight against violent extremism as kinetic operations. 14. SUBJECT TERMS 15. NUMBER OF cyberspace, social media, terrorist group, Taliban, ISIS, Al Qaida PAGES 113 16. PRICE CODE 113 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release. Distribution is unlimited. TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND Alberto Miguel Urena Figueroa Colonel, Dominican Republic Air Force BS, Academia Militar Batalla de las Carreras, 1998 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (COMBATING TERRORISM: POLICY AND STRATEGY) from the NAVAL POSTGRADUATE SCHOOL June 2018 Approved by: Tristan J. Mabry Advisor Robert E. Looney Second Reader Mohammed M. Hafez Chair, Department of National Security Affairs iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT This thesis asks why and how terrorist organizations use the Internet to achieve three strategic goals: 1) the dissemination of propaganda, 2) recruitment, and 3) fundraising. It is immediately apparent that the Internet offers a number of advantages, including low cost, global reach, and anonymity. Nonetheless, terrorist organizations vary in their exploitation of these advantages according to their immediate objectives. To explain these variations, this thesis presents a comparative study of Al Qaeda, the Islamic State of Iraq and Syria (ISIS), and the Taliban. This study considers how different objectives render distinct narratives and thereby affect how those narratives leverage images and information in the dissemination of propaganda. Similarly, targets of recruitment vary according to the objectives of the respective organizations; this primarily affects their use of social media, including Facebook, YouTube, Twitter, and other applications. Fundraising methods also vary, from local means (extortion, narcotics, smuggling) to contemporary exploitation of digital platforms like PayPal and cell phone applications enabling anonymous donations. This thesis concludes that the sophistication of terrorist organizations online requires an equally sophisticated response that is as essential to the fight against violent extremism as kinetic operations. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION..................................................................................................1 A. SIGNIFICANCE OF THE RESEARCH QUESTION ...........................1 B. LITERATURE REVIEW .........................................................................2 1. Why Do Terrorist Organizations Use the Internet and Social Media? .................................................................................3 2. How Do Terrorist Organizations Use the Internet and Social Media? .................................................................................6 C. POTENTIAL EXPLANATIONS AND HYPOTHESES .....................18 D. RESEARCH DESIGN .............................................................................20 E. THESIS OVERVIEW AND CHAPTER OUTLINE ............................21 II. AL QAEDA...........................................................................................................23 A. THE GENESIS OF AL QAEDA ............................................................23 B. AL QAEDA IDEOLOGY, LEADERSHIP AND STRATEGIC GOAL........................................................................................................25 1. Ideology .........................................................................................25 2. Leadership ....................................................................................26 3. Strategic Goal ...............................................................................29 C. INTERNET STRATEGIES ....................................................................29 1. Information Operations...............................................................30 2. Recruiting on Social Media and Digital Platforms ...................35 3. Fundraising on Social Media and Digital Platforms ................39 III. ISLAMIC STATE OF IRAQ AND SYRIA .......................................................45 A. THE GENESIS OF ISIS ..........................................................................45 B. ISIS IDEOLOGY, LEADERSHIP, AND STRATEGIC GOAL.... .....47 1. Ideology .........................................................................................48 2. Leadership ....................................................................................48 3. Strategic Goal ..............................................................................49 C. INTERNET STRATEGIES ....................................................................51 1. Information Operations on Social Media and Digital Platforms .......................................................................................52 2. Recruiting on Social Media and Digital Platforms ...................60 3. Fundraising on Social Media and Digital Platforms ................64 4. Innovative Methods for Fundraising on the Internet ...............69 IV. TALIBAN .............................................................................................................73 vii A. THE GENESIS OF THE TALIBAN......................................................73 B. TALIBAN IDEOLOGY, LEADERSHIP, AND STRATEGIC GOAL ........................................................................................................74 1. Ideology .........................................................................................74 2. Leadership ....................................................................................75 3. Strategic Goal ...............................................................................77
Recommended publications
  • As Many of You Probably Heard, in April Of
    Sesquicentennial Lecture, University of Memphis, November 9th, 2009 “The Global War on What Exactly? Making Sense of Political Islam” Dr. James L. Gelvin, Professor of Modern Middle East History, UCLA In July of 2008, the New York Times ran an article about the evolution of the Algerian militant group, the Armed Islamic Group (GIA), into a branch of al-Qaeda called “al-Qaeda of the Islamic Maghreb.” The Armed Islamic Group emerged after the Algerian government cancelled the second round of parliamentary elections in 1992. The government did this to prevent a victory by the Islamic Salvation Front, a party led by a broad coalition of Islamic activists. The GIA was not interested in parliamentary politics: its goal was to overthrow the Algerian government by violence and establish an Islamic government in its place. According to the article, in 1994 the group was approached by Osama bin Laden who sought to establish a base in Algeria. The group refused bin Laden‟s request. In an interview obtained by the New York Times, one of the group‟s leaders stated that he told bin Laden, “We don‟t have anything to do with anything outside….We are interested in just Algeria.” Ten years later, in the fall of 2004, a spin-off and successor to the GIA, called the “Salafist Group for Preaching and Struggle” (GSPC) reversed the GIA‟s decision and contacted Abu Muscab al-Zarqawi, the (now deceased) leader of al-Qaeda in Iraq. What caused the group to reverse its predecessor‟s decision? According to one account, immediately following 9/11 the Bush administration changed its designation of the GSPC from a “regional insurgency” to a terrorist group.
    [Show full text]
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • Jihadism in Africa Local Causes, Regional Expansion, International Alliances
    SWP Research Paper Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Guido Steinberg and Annette Weber (Eds.) Jihadism in Africa Local Causes, Regional Expansion, International Alliances RP 5 June 2015 Berlin All rights reserved. © Stiftung Wissenschaft und Politik, 2015 SWP Research Papers are peer reviewed by senior researchers and the execu- tive board of the Institute. They express exclusively the personal views of the authors. SWP Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Ludwigkirchplatz 3­4 10719 Berlin Germany Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org [email protected] ISSN 1863-1053 Translation by Meredith Dale (Updated English version of SWP-Studie 7/2015) Table of Contents 5 Problems and Recommendations 7 Jihadism in Africa: An Introduction Guido Steinberg and Annette Weber 13 Al-Shabaab: Youth without God Annette Weber 31 Libya: A Jihadist Growth Market Wolfram Lacher 51 Going “Glocal”: Jihadism in Algeria and Tunisia Isabelle Werenfels 69 Spreading Local Roots: AQIM and Its Offshoots in the Sahara Wolfram Lacher and Guido Steinberg 85 Boko Haram: Threat to Nigeria and Its Northern Neighbours Moritz Hütte, Guido Steinberg and Annette Weber 99 Conclusions and Recommendations Guido Steinberg and Annette Weber 103 Appendix 103 Abbreviations 104 The Authors Problems and Recommendations Jihadism in Africa: Local Causes, Regional Expansion, International Alliances The transnational terrorism of the twenty-first century feeds on local and regional conflicts, without which most terrorist groups would never have appeared in the first place. That is the case in Afghanistan and Pakistan, Syria and Iraq, as well as in North and West Africa and the Horn of Africa.
    [Show full text]
  • Combating Al Qaeda and the Militant Islamic Threat TESTIMONY
    TESTIMONY Combating Al Qaeda and the Militant Islamic Threat BRUCE HOFFMAN CT-255 February 2006 Testimony presented to the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities on February 16, 2006 This product is part of the RAND Corporation testimony series. RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. is a registered trademark. Published 2006 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 201 North Craig Street, Suite 202, Pittsburgh, PA 15213-1516 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Dr. Bruce Hoffman1 The RAND Corporation Before the Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities United States House of Representatives February 16, 2006 Four and a half years into the war on terrorism, the United States stands at a crossroads. The sustained successes of the war’s early phases appear to have been stymied by the protracted insurgency in Iraq and our inability either to kill or capture Usama bin Laden and his chief lieutenant, Ayman al-Zawahiri.
    [Show full text]
  • The Sight of Blood and the Apocalypse: the Motivations of Daesh’S Recruits
    The Sight of Blood and the Apocalypse: the Motivations of Daesh’s Recruits Jean-Paul Azam Toulouse School of Economics, UT1-Capitole Silvaplana Workshop in Political Economy, Pontresina (Switzerland): July 24, 2017. Road Map • This is mainly an extended literature review that traces to Saint Augustine the analysis of the impact of the sight of blood on human behavior. • It shows that this “loyalty filter” was used already for recruiting crusaders to send to the Middle East in the Middle Ages. • But the main focus is on the rise of Daesh in recent times, which relied both on the display of brutal blood spilling and on the Apocalyptic mythology. • A simple model is then used to provide a synthesis and derive some policy-relevant comparative statics. 2 Saint Augustine on the Sight of Blood • I first met an analysis of the impact of the sight of blood on people’s behavior in Saint Augustine, as the Dominican monks were having us read crazy things when I was locked up at Sorèze boarding school (I was 14 or 15). • Augustine was one of the doctors of the Church, writing in about 400 CE. • Born in Hippo Regius, in what is eastern Algeria now, close to the current Tunisian border, he studied in Carthage (north of Tunis). • His mother tongue was Punic, suggesting Phoenician descent, i.e., from what is Lebanon nowadays. • He was voted as a bishop even before he had converted to Christianity. 3 Hippo Carthage Oujda, where I was born 4 Alypius and the Gladiators • One of Augustine’s friends, Alypius, had been reluctantly dragged by his pals to watch gladiators fighting at the circus.
    [Show full text]
  • Battleground 2016: New Game
    Battleground 2016: new game June 30, 2016 Methodology Battleground Survey of 2700 Likely 2016 Voters in 9 competitive presidential battleground states. This survey took place June 11 - 20. Respondents who voted in the 2012 election, 2014 election, or registered since the 2014 election were selected from the national voter file. Likely voters were determined based on stated intention of voting in 2016. Data shown in this deck is among all 2016 likely voters unless otherwise noted. Margin of error for the full sample = +/-1.89 percentage points at 95% confidence. Margin of error will be higher among subgroups. Respondents were divided equally among states (n=300) of Arizona, Florida, Michigan, North Carolina, New Hampshire, Nevada, Ohio, Pennsylvania and Wisconsin. Margin of error for each state sample= +/- 5.66 percentage points at 95% confidence. Margin of error will be higher among subgroups. Forty-nine percent of respondents were reached by cell phone, in order to account for ever-changing demographics and accurately sample the full electorate in each state. Regression analysis. A series of fractional logistic regressions were conducted to obtain the marginal effects of the explanatory variable (presidential vote) on outcome variables (associations, statement pairs), representing the change in outcome probabilities estimated for the explanatory variable, all else held equal. No causation is implied by these results. 1 State Breakdowns Senate Battleground: Arizona Diverse Target States: Florida* Arizona Florida Nevada Nevada North Carolina North Carolina Rustbelt Target States: Ohio Ohio New Hampshire New Hampshire Pennsylvania Pennsylvania Wisconsin Michigan Wisconsin *The Senate vote results were excluded in Florida where Senator Rubio had not yet announced his candidacy.
    [Show full text]
  • Cubed Circle Newsletter 241 – Consistency Is Hard
    Cubed Circle Newsletter 241 – Consistency is Hard As many of probably noticed, we have been posting late and sporadically for the last month. This was, obviously, not our intention, but with the second semester eating into my free time, staying up to date is a tall order. Even without the newsletter itself seeing weekly publication the site has still remained up to date on a weekly basis, thanks primarily to co-author Ben Carass, as well as guest writers Paul Cooke and Leslie Lee III. But, the newsletter has survived for well over 241 weeks, and will hopefully thrive in the years to come. I have attempted to make provisions for publishing related tasks which should minimize the risk of major delays (obviously there will be some regular delays, as this late issue can attest), but we have some fail safes in place in order to keep this to a minimum. With all of this said, we have a great issue for everyone this week with Paul Cooke discussing the Pro-Wrestling Only Greatest Wrestler Ever project and his personal experience with the poll, Ben covers the news including tons of results from Japan and the Lesnar USADA violation, the Mixed Bag returns with a look at comedy wrestling, Ricochet/Ospreay, and a potential WWE match of the year -- plus Ben also looks at last Sunday's Battleground show and the first RAW of the brand split (a very good show). Also, for those unaware, we now have an official Twitter account @CubedCircleWres allowing the banger to unprecedented highs at @BenCarass and @RyanClingman.
    [Show full text]
  • Al-Qaeda's “Single Narrative” and Attempts to Develop Counter
    Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter- Narratives: The State of Knowledge Alex P. Schmid ICCT Research Paper January 2014 This Research Paper seeks to map efforts to counter the attraction of al Qaeda’s ideology. The aim is to bring together and synthesise current insights in an effort to make existing knowledge more cumulative. It is, however, beyond the scope of this paper to test existing counter-narratives on their impact and effectiveness or elaborate in detail a new model that could improve present efforts. However, it provides some promising conceptual elements for a new road map on how to move forward, based on a broad review and analysis of open source literature. About the Author Alex P. Schmid is a Visiting Research Fellow at the International Centre for Counter Terrorism – The Hague, and Director of the Terrorism Research Initiative (TRI), an international network of scholars who seek to enhance human security through collaborative research. He was co-editor of the journal Terrorism and Political Violence and is currently editor-in-chief of Perspectives on Terrorism, the online journal of TRI. Dr. Schmid held a chair in International Relations at the University of St. Andrews (Scotland) where he was, until 2009, also Director of the Centre for the Study of Terrorism and Political Violence (CSTPV). From 1999 to 2005 he was Officer-in-Charge of the Terrorism Prevention Branch at the UN Office on Drugs and Crime (UNODC) in the rank of a Senior Crime Prevention and Criminal Justice Officer. From 1994 to 1999, Dr. Schmid was an elected member of the Executive Board of ISPAC (International Scientific and Professional Advisory Council) of the United Nations' Crime Prevention and Criminal Justice Programme.
    [Show full text]
  • CBS News 2016 Battleground Tracker Pennsylvania
    CBS News 2016 Battleground Tracker Pennsylvania Sample 1091 Likely Voters⇤ Conducted October 26-28, 2016 Margin of Error 3.7% ± 1. How likely is it that you will vote in the 2016 Presidential election in November? Already voted early or by mail . 4% Definitely will vote . .91% Probably will vote . 4% Maybe will vote . 1% Probably will not vote . 0% Definitely will not vote . 0% Don’tknow ...............................................................0% 2. When you vote, how do you think you will cast your ballot? Asked of respondents who have not yet voted In person on election day November 8th . 98% By mail ballot/absentee . 2% 3. Have you gotten the ballot but not yet returned it, or have you not received it yet? Asked of respondents intending to cast a ballot by mail Have not yet returned it . 32% Have not yet received it . 66% Already mailed it or dropped it off . .2% 4. How motivated do you feel to vote this year? Asked of respondents who have not already voted Very motivated, can’t wait to vote . .72% Somewhat motivated . 16% Not too motivated . 6% Not motivated, but I’ll do it anyway . .6% ⇤1100 registered voters total were interviewed. 1091 likely voters are included. 1 CBS News 2016 Battleground Tracker Pennsylvania 5. If the 2016 presidential election were being held today and the candidates were Hillary Clinton, the Democrat, and Donald Trump, the Republican, who would you vote for? Voters selecting someone else in the initial question were given a choice of a selection of third party candidates Hillary Clinton . .48% Donald Trump .
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • Funding Report
    PROGRAMS I STATE CASH FLOW * R FED CASH FLOW * COMPARE REPORT U INTRASTATE * LOOPS * UNFUNDED * FEASIBILITY * DIVISION 7 TYPE OF WORK / ESTIMATED COST IN THOUSANDS / PROJECT BREAK TOTAL PRIOR STATE TRANSPORTATION IMPROVEMENT PROGRAM PROJ YEARS 5 YEAR WORK PROGRAM DEVELOPMENTAL PROGRAM "UNFUNDED" LOCATION / DESCRIPTION COST COST FUNDING ID (LENGTH) ROUTE/CITY COUNTY NUMBER (THOU) (THOU) SOURCE FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 FY 2014 FY 2015 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020 FUTURE YEARS 2011-2020 Draft TIP (August 2010) I-40/85 ALAMANCE I-4714 NC 49 (MILE POST 145) TO NC 54 (MILE 7551 7551 IMPM CG 479 CG 479 CG 479 CG 479 CG 479 CG 479 CG 479 CG 479 POST 148). MILL AND RESURFACE. (2.8 MILES) 2009-2015 TIP (June 2008) PROJECT COMPLETE - GARVEE BOND FUNDING $4.4 MILLION; PAYBACK FY 2007 - FY 2018 I-40/85 ALAMANCE I-4714 NC 49 (MILEPOST 145) TO NC 54 (MILEPOST 5898 869 IMPM CG 479 CG 479 CG 479 CG 479 CG 479 CG 479 CG 479 CG 1676 148). MILL AND RESURFACE. (2.8 MILES) PROJECT COMPLETE - GARVEE BOND FUNDING $4.4 MILLION; PAYBACK FY 2007 - FY 2018 2011-2020 Draft TIP (August 2010) I-40/I-85 ALAMANCE I-4918 NC 54 (MILE POST 148) IN ALAMANCE COUNTY 9361 9361 IMPM CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 TO WEST OF SR 1114 (BUCKHORN ROAD) IN ORANGE ORANGE COUNTY. MILL AND RESURFACE. (8.3 MILES) 2009-2015 TIP (June 2008) PROJECT COMPLETE - GARVEE BOND FUNDING $12.0 MILLION; PAYBACK FY 2007 - FY 2018 I-40/I-85 ALAMANCE I-4918 NC 54 (MILEPOST 148) IN ALAMANCE COUNTY 15906 2120 IMPM CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 1313 CG 4595 TO WEST OF SR 1114 (BUCKHORN ROAD) IN ORANGE ORANGE COUNTY.
    [Show full text]