Embargoed Until 2018 Or Until Further Notice

Total Page:16

File Type:pdf, Size:1020Kb

Embargoed Until 2018 Or Until Further Notice Department of Social Sciences and Security Studies The OODA Loop and Salafi-Jihadi Inspired Home-Grown Terrorism A Tactic of Asymmetric Warfare Jason Thomas This thesis is presented for the Degree of Doctor of Philosophy of Curtin University EMBARGOED UNTIL 2018 OR UNTIL FURTHER NOTICE April 2016 1 Declarations Candidate’s Declaration I, Jason Thomas, hereby confirm that this PhD thesis has been solely written by me, that it is a record of work carried out by me and has not been submitted in any previous application for a higher degree. I was admitted as a candidate for the degree of Doctor of Philosophy in 2012, at Curtin University of Technology. Date: 12 April 2016 Signature of Candidate: Supervisor’s Declaration I hereby certify that the candidate has fulfilled the conditions of the Resolution and Regulations appropriate for the degree of Doctor of Philosophy at the Curtin University of Technology and that the candidate is qualified to submit this thesis in application for that degree. Date: Signature of Supervisor 2 Abstract A central theme in the current terrorism phenomenon has been al Qaeda’s Salafi-Jihadi narrative and its ability to inspire home-grown terrorism. In the minds of generally young, unexceptional Muslim males and some Western converts to Islam, this narrative is recreated in the context of their own personal circumstances and networks. The predominant strategic models of terrorism are inadequate for critically analysing a phenomenon that is adaptable, dynamic, evolving and regenerative. Through the application of Colonel John Boyd’s Observe-Orientate-Decide-Act Loop (OODA Loop) as an adaptable, alternative strategic model of terrorism and case study research methodology, this thesis tested the theory that Salafi-Jihadi inspired home-grown terrorism is a tactic of asymmetric warfare. According to Boyd, defeating an opponent requires penetrating its OODA Loop. The case studies demonstrated al Qaeda’s strategy that transformed from the use of: i) unexceptional individuals from western countries, to avoid detection; ii) western domestic-planned attacks to overcome tactical challenges and to adapt to OODA Loop penetration; and iii) western domestic individuals with no known links to al Qaeda, inspired by the Salafi-Jihadi narrative. These case studies also provided examples of al Qaeda’s evolution into a regenerative brand, in a conflict where the whole world has become the battlefield, including within people’s minds. This includes securing the mindset of a borderless, interconnected community while Governments and their citizens fear the unpredictable, irreconcilable nature of home-grown terrorism emanating from within their society. Significantly, al Qaeda determined that inspiring home-grown terrorism, synthesising its Salafi-Jihadi narrative with the use of the internet to broadcast graphic and brutal acts of violence, and shifting from spectacular terrorism to ‘do-it-yourself’ attacks against soft targets in a Western urban environment, penetrates Western moral principles and its conventional view of warfare within a democratic construct. Penetrating the West’s moral principles is an important aspect of al Qaeda’s broad strategy. This research described the concept of al Qaeda manoeuvring within and exploiting Western moral and mental boundaries while simultaneously inspiring more a new generation of followers, as moral manoeuvrability. Further research could use this concept to understand how to exploit the Salafi-Jihadi narrative to force terrorist organisations such as al Qaeda and now the so-called Islamic State to fold back inside themselves and self-immolate. 3 Acknowledgements Firstly, it is important that I thank my primary supervisor, Associate Professor Anne Aly, for her guidance and patience in overseeing this thesis. I also respect her courage in publicly challenging the current discourse on terrorism. I am also very grateful for the supervision and faith in me from Dr Alexey Muraviev as Head of Department. Thanks must also go to Dr Mark Briskey who worked with me to see this PhD to the end. It was an honour and a privilege to have these academics as my supervisory team. I must also thank my wife, Fiona, and my three children, Alexander, Sophie and Amelia, for enduring this journey with me and helping maintain my belief in being able to complete this work. Thanks to my parents for their life-long encouragement. I also wish to thank my wife’s parents, Mary and David, who are always so supportive in my endeavours, including this thesis. I also need to thank some of my friends, in particular Wojciech Ozga, MAJGEN Jim Molan (Ret), Richard Laufmann, Kay Donehue, Neil Grimes, Assistant Commissioner Andrew Crisp, Superintendent Cindy Millen, Anita Addorisio, Paula Davey, Todd Stephenson, Steve Carvajal and Belinda Endress, who at important stages of my life and in the course of writing this thesis challenged me to be a better thinker and a better person. Finally, I would like to thank my friends currently serving or who formerly served in the Australian and United States military, law enforcement and Special Forces communities, whose courage, bravery and unquestioning service to our common goal of freedom, should never be forgotten. 4 Table of Contents Declaration of Original Authorship ii Abstract iii Acknowledgements iv List of Tables & Diagrams 7 Abbreviations 8 Chapter 1 – Introduction 9 1.1 The OODA Loop and Salafi-Jihadi Inspired Home-Grown Terrorism 9 1.2 Definitions and Conceptualisation of Key Themes 11 1.2.1 Terrorism 11 1.2.2 Home-Grown Terrorism 13 1.2.3 Asymmetric Warfare 15 1.2.4 Structure and Organisation of the Research 17 1.2.5 Significance and Contribution of the Research 20 Chapter 2 - The Boyd Cycle - Observe Orientate Decide Act Loop 22 2.1 Introduction 22 2.2 An Overview of COL. John Boyd (1927 – 1997) 25 2.3 Lessons from Others on Boyd 28 2.4 Energy Manoeuvrability, Manoeuvre Warfare and the OODA Loop 33 2.5 A Discourse on Winning and Losing 40 2.6 Deconstructing the OODA Loop 44 2.7 The Origins of the OODA Loop 48 2.8 The Essence of the OODA Loop 53 2.8.1 Observe 56 2.8.2 Orientate 58 2.8.3 Decide 63 2.8.4 Act 68 2.9 Conclusion 72 Chapter 3 -The Strategic Model of Terrorism and AQ’s Methodology 74 3.1 Introduction 74 3.2 A Strategic Model of Terrorism 75 3.3 The OODA Loop as a General Strategic Model 82 3.4 Theoretical Approaches to Salafi-Jihadi Inspired Home-grown Terrorism 85 3.5 AQ - Leaderless Network or Top-Down Direction? 89 3.6 The Strategically Adaptable AQ Brand 93 3.7 Salafi-Jihadism and the Prophetic Brand of AQ 97 3.8 Conclusion 107 Chapter 4 - Application of the OODA Loop & Case Study Methodology 109 4.1 Introduction 109 4.2 Aim of the Research Using Case Study Methodology 110 4.3 The Case Study: Subject of an Inquiry 110 4.4 Single or Multiple Case Studies 113 4.5 Case Study Research in the Field of Terrorism 114 4.6 Criticisms of Case Study Methodology 117 5 4.7 Different Kinds of Case Study 120 4.8 The Application of Case Study Methodology Used for this Research 123 4.9 Case Study Selection Criteria 125 4.9.1 Context 125 4.9.2 Characteristics 129 4.10 The OODA Loop – Unit of Analysis 134 4.11 Three Key Case Studies of Salafi-Jihadi Inspired Home-grown Terrorism 135 4.11.1 Case Study 1 – The Australian Case of Jack Roche 136 4.11.2 Case Study 2 – 7 July 2005 London Transport Network Attack 139 4.11.3 Case Study 3 – 15 April 2013 Boston Marathon Bombing 141 4.12 Conclusion 144 Chapter 5 -The Case Studies 146 5.1 Introduction 146 5.2 Case Study 1 - The Australian Case of Jack Roche 147 5.2.1 Case Analysis using the OODA Loop 152 5.3 Case Study 2 – 7 July 2005 London Transport Network Attack 156 5.3.1 Case Analysis using the OODA Loop 164 5.4 Case Study 3 – 15 April 2013 Boston Marathon Bombing 168 5.4.1 Case Analysis using the OODA Loop 177 5.5 Conclusion 176 Chapter 6 -Case Analysis 180 6.1 Introduction 150 6.2 Inside the OODA Loop and the Mindset of Contemporary Terrorism 180 6.3 OODA Loop and the Current Terrorism Phenomenon 188 6.4 Boyd’s Law and the Concept of Moral Manoeuvrability 193 6.5 The Performative Power of the Single Act of Violence 200 6.6 DIY Home-grown Terrorism and Soft-Targets 203 6.7 Conclusion 206 Chapter 7 – Conclusion 208 7.1 Summary of Research & Discussion 208 7.2 Key Findings and Contributions 213 7.2.1 The OODA Loop as an Adaptable Strategic Model of Terrorism 213 7.2.2 Current Terrorist Phenomenon – A Different View on War 215 7.2.3 Bypassing OODA Loops 217 7.2.4 Moral Manoeuvrability 218 7.2.5 Dynamic Evolving Tactics – The Power of the Single Act 220 7.3 Application of the Research 221 Bibliography 223 6 Tables Table 2.1. Boyd’s Combined Lessons on Winning, re-drawn from slide 7 of Patterns of Conflict 49 Table 4.2. Summary of Military Theorists and Wars from Patterns of Conflict 117 Table 4.3. Summary of Kinds of Case Studies Defined by Academic Authors 121 Table 4.4. Forms of Research 123 Table 4.5. Design for the Case Study Approach Used in this Research 125 Table 4.6: Summary of Selection Criteria 132 Figures Figure 2.1. Boyd’s Drawing of the OODA Loop from The Essence of Winning and Losing 54 Figure 2.2. A Boyd Quiz 71 Figure 6.3.
Recommended publications
  • Australian Foreign Fighters: Risks and Responses
    Australian foreign fighters: Andrew Zammit Risks and responses April 2015 AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high-quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES EXECUTIVE SUMMARY Conflicts in Syria and Iraq have attracted aspiring jihadists from across the world. Australians have joined the flow of foreign fighters to the region, raising concerns that some will carry out terrorist attacks in Australia should they return home. The record of past jihadist foreign fighter mobilisations, including Australia's own history in this regard, demonstrates that there is a potential threat to Australia’s security. However, a range of factors will shape that threat, including how Australia responds to returning foreign fighters. The Government's response has mainly focused on increased resources and powers for police and intelligence agencies, but also includes an important non-coercive element termed Countering Violent Extremism (CVE) that has received less attention.
    [Show full text]
  • Women Who Run with the Wolves Lemos De Carvalho, Claudia
    Tilburg University Women Who Run With The Wolves Lemos De Carvalho, Claudia Publication date: 2018 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Lemos De Carvalho, C. (2018). Women Who Run With The Wolves: Online stories and roles of Spanish- speaking jihadist women. [s.n.]. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 29. sep. 2021 Women Who Run With The Wolves Online stories and roles of Spanish-speaking jihadist women Women Who Run With The Wolves Online stories and roles of Spanish-speaking jihadist women PROEFSCHRIFT ter verkrijging van de graad van doctor aan Tilburg University op gezag van de rector magnificus, prof. dr. E.H.L. Aarts, in het openbaar te verdedigen ten overstaan van een door het college voor promoties aangewezen commissie in de Ruth First zaal van de Universiteit op dinsdag 19 juni 2018 om 10.00 uur door Claudia Sofia Lemos de Carvalho geboren te Porto, Portugal Promotores: Prof.
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]
  • European Islam Challenges for Public Policy and Society
    EUROPEAN ISLAM CHALLENGES FOR PUBLIC POLICY AND SOCIETY SAMIR AMGHAR, AMEL BOUBEKEUR, MICHAEL EMERSON (EDITORS) CHRIS ALLEN, VALERIE AMIRAUX, TUFYAL CHOUDHURY, BERNARD GODARD, IMANE KARICH, ISABELLE RIGONI OLIVIER ROY AND SARA SILVESTRI CENTRE FOR EUROPEAN POLICY STUDIES BRUSSELS The Centre for European Policy Studies (CEPS) is an independent policy research institute based in Brussels. Its mission is to produce sound analytical research leading to constructive solutions to the challenges facing Europe today. The views expressed in this report are those of the authors writing in a personal capacity and do not necessarily reflect those of CEPS or any other institution with which the authors are associated. This study was carried out in the context of the broader work programme of CEPS on European Neighbourhood Policy, and is generously supported by the Compagnia di San Paolo and the Open Society Institute. The project was initiated at a conference held in Sofia in November 2006, sponsored under International Policy Fellowship programme of the Open Society Institute. Cover photograph: Stockholm Great Mosque ISBN 13: 978-92-9079-710-4 © Copyright 2007, Centre for European Policy Studies. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means – electronic, mechanical, photocopying, recording or otherwise – without the prior permission of the Centre for European Policy Studies. Centre for European Policy Studies Place du Congrès 1, B-1000 Brussels Tel: 32 (0) 2 229.39.11 Fax: 32 (0) 2 219.41.51 e-mail: [email protected] internet: http://www.ceps.eu CONTENTS 1.
    [Show full text]
  • The Jihadist Threat in France CLARA BEYLER
    The Jihadist Threat in France CLARA BEYLER INCE THE MADRID AND LONDON BOMBINGS, Europeans elsewhere— fearful that they may become the next targets of Islamist terrorism— are finally beginning to face the consequences of the long, unchecked Sgrowth of radical Islam on their continent. The July bombings in London, while having the distinction of being the first suicide attacks in Western Eu- rope, were not the first time terrorists targeted a major European subway system. Ten years ago, a group linked to the Algerian Armed Islamic Group (Groupe Islamique Armé—GIA) unleashed a series of bombings on the Paris metro system. Since 1996, however, France has successfully avoided any ma- jor attack on its soil by an extremist Muslim group. This is due not to any lack of terrorist attempts—(only last September, France arrested nine members of a radical Islamist cell planning to attack the metro system)—but rather to the efficiency of the French counterterrorist services.1 France is now home to between five to six million Muslims—the sec- ond largest religious group in France, and the largest Muslim population in any Western European country.2 The majority of this very diverse population practices and believes in an apolitical, nonviolent Islam.3 A minority of them, however, are extremists. Islamist groups are actively operating in France to- day, spreading radical ideology and recruiting for future terrorist attacks on French soil and abroad. The purpose of this paper is to provide an overview of France’s Islamist groups, the evolving threats they have posed and continue to pose to French society, and the response of the French authorities to these threats.
    [Show full text]
  • Worldwide Threats to the Homeland
    WORLDWIDE THREATS TO THE HOMELAND HEARING BEFORE THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION SEPTEMBER 17, 2014 Serial No. 113–85 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PUBLISHING OFFICE 93–367 PDF WASHINGTON : 2015 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania FILEMON VELA, Texas RICHARD HUDSON, North Carolina ERIC SWALWELL, California STEVE DAINES, Montana VACANCY SUSAN W. BROOKS, Indiana VACANCY SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina CURTIS CLAWSON, Florida BRENDAN P. SHIELDS, Staff Director JOAN O’HARA, Acting Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director (II) C O N T E N T S Page STATEMENTS The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security: Oral Statement ....................................................................................................
    [Show full text]
  • Ohio Terrorism N=30
    Terry Oroszi, MS, EdD Advanced Technical Intelligence Center ABC Boonshoft School of Medicine, WSU Henry Jackson Foundation, WPAFB The Dayton Think Tank, Dayton, OH Definitions of Terrorism International Terrorism Domestic Terrorism Terrorism “use or threatened use of “violent acts that are “the intent to instill fear, and violence to intimidate a dangerous to human life the goals of the terrorists population or government and and violate federal or state are political, religious, or thereby effect political, laws” ideological” religious, or ideological change” “Political, Religious, or Ideological Goals” The Research… #520 Charged (2001-2018) • Betim Kaziu • Abid Naseer • Ali Mohamed Bagegni • Bilal Abood • Adam Raishani (Saddam Mohamed Raishani) • Ali Muhammad Brown • Bilal Mazloum • Adam Dandach • Ali Saleh • Bonnell (Buster) Hughes • Adam Gadahn (Azzam al-Amriki) • Ali Shukri Amin • Brandon L. Baxter • Adam Lynn Cunningham • Allen Walter lyon (Hammad Abdur- • Brian Neal Vinas • Adam Nauveed Hayat Raheem) • Brother of Mohammed Hamzah Khan • Adam Shafi • Alton Nolen (Jah'Keem Yisrael) • Bruce Edwards Ivins • Adel Daoud • Alwar Pouryan • Burhan Hassan • Adis Medunjanin • Aman Hassan Yemer • Burson Augustin • Adnan Abdihamid Farah • Amer Sinan Alhaggagi • Byron Williams • Ahmad Abousamra • Amera Akl • Cabdulaahi Ahmed Faarax • Ahmad Hussam Al Din Fayeq Abdul Aziz (Abu Bakr • Amiir Farouk Ibrahim • Carlos Eduardo Almonte Alsinawi) • Amina Farah Ali • Carlos Leon Bledsoe • Ahmad Khan Rahami • Amr I. Elgindy (Anthony Elgindy) • Cary Lee Ogborn • Ahmed Abdel Sattar • Andrew Joseph III Stack • Casey Charles Spain • Ahmed Abdullah Minni • Anes Subasic • Castelli Marie • Ahmed Ali Omar • Anthony M. Hayne • Cedric Carpenter • Ahmed Hassan Al-Uqaily • Antonio Martinez (Muhammad Hussain) • Charles Bishop • Ahmed Hussein Mahamud • Anwar Awlaki • Christopher Lee Cornell • Ahmed Ibrahim Bilal • Arafat M.
    [Show full text]
  • The Kurdistan Workers Party
    EXPLANATORY STATEMENT Issued by the authority of the Minister for Home Affairs Criminal Code Act 1995 Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulations 2018 The purpose of the Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulations 2018 (the Regulations) is to specify Lashkar-e-Tayyiba for the purposes of paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1) of the Criminal Code.1 Lashkar-e-Tayyiba is currently specified for this purpose by the Criminal Code (Terrorist Organisation—Lashkar-e-Tayyiba) Regulation 2015, which is repealed by the Regulations. Details of the Regulations are set out in Attachment A. Section 5 of the Criminal Code Act 1995 (the Act) provides that the Governor-General may make regulations prescribing matters required or permitted by the Act to be prescribed, or necessary or convenient to be prescribed for carrying out or giving effect to the Act. The Schedule to the Act sets out the Criminal Code. Paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1) of the Criminal Code provides that regulations can specify organisations for the purposes of the definition of ‘terrorist organisation’. Subsection 102.1(2) of the Criminal Code provides that before the Governor-General makes regulations specifying an organisation for the purposes of paragraph (b) of the definition of ‘terrorist organisation’ in subsection 102.1(1), the Minister must be satisfied on reasonable grounds that the organisation is directly or indirectly engaged in, preparing, planning, assisting in or fostering the doing of a terrorist act or advocates the doing of a terrorist act.
    [Show full text]
  • Al Qaeda in the West As a Youth Movement: the Power of a Narrative Olivier Roy
    No. 168 y August 2008 Al Qaeda in the West as a Youth Movement: The Power of a Narrative Olivier Roy hy do we bother, in Europe, about ‘Islamic Any counter-terrorist policy has to be based on an radicalisation’? The answer seems obvious. analysis of the roots of terrorism. If not, such a policy WThere are at least two good reasons: one is could not only be ineffective, but also counter- terrorism, with its security implications; the other is the productive, by inducing some of the phenomena it claims issue of integrating second-generation migrants in to combat. Europe, apparently the most fertile ground for recruiting Roughly speaking, there are two approaches: one vertical, terrorists. For most observers, the link between terrorism one horizontal. The vertical approach involves and integration is a given fact. Al Qaeda-type terrorist establishing a genealogy of radicalisation from the Koran activities carried out either in Europe, or by European and the first Islamic community to the present Islamist residents and citizens abroad, are seen as the extreme radicals, going through radical theology (Ibn Taymiyya), form, and hence as a logical consequence, of Islam- ideologisation (Hassan al Banna and the Muslim related radicalisation. There is a teleological approach brothers) and the history of Middle Eastern conflicts, consisting of looking in retrospect at every form of from Bonaparte’s campaign in Egypt to the present radicalisation and violence associated with the Muslim conflicts in Palestine, Iraq and Afghanistan. This population in Europe as a harbinger of terrorism. approach tends to lump together all kind of violence This approach is problematic, not so much because it linked with Muslim populations, for example ethno- casts a shadow of suspicion and opprobrium on Islam as cultural tensions affecting migrants (crimes of honour), a religion and on Muslims in general, but because it fails petty delinquency and terrorism.
    [Show full text]
  • Frans Osinga, Science, Strategy, And
    Science, Strategy and War The Strategic Theory of John Boyd Frans Osinga The cover illustration depicts the comprehensive rendering of the OODA loop which features in John Boyd’s final presentation titled The Essence of Winning and Losing. Cover design: Hermkens Design, Amsterdam ISBN 90 5972 058 X Eburon Academic Publishers P.O. Box 2867 2601 CW Delft The Netherlands Phone: +31 (0)15-2131484 / Fax: +31 (0)15-2146888 [email protected] / www.eburon.nl © 2005 F. Osinga. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission in writing from the proprietor. Science, Strategy and War The Strategic Theory of John Boyd Proefschrift ter verkrijging van de graad van Doctor aan de Universiteit Leiden, op gezag van de Rector Magnificus Prof. Dr. D.D. Breimer, hoogleraar in de faculteit der Wiskunde en Natuurwetenschappen en die der Geneeskunde, volgens besluit van het College voor Promoties te verdedigen op dinsdag 11 januari 2005 klokke 14.15 uur door Frans Osinga geboren te Leeuwarden in 1963 PROMOTIECOMMISSIE Promotor Prof. Dr. A. van Staden Referent Prof. Dr. R. de Wijk Overige leden Prof. Dr. G.T. Hammond Prof. Dr. Ir. G. Ooms Prof. Dr. J.J.C. Voorhoeve De totstandkoming van dit proefschrift werd financieel mogelijk gemaakt door de Koninklijke Luchtmacht. We are survival machines. Richard Dawkins Strategy is the mode of survival of a society. Henry Kissinger First Lt. John Boyd in the cockpit of an F-86 during the Korean War (USAF photograph) CONTENTS 1.
    [Show full text]
  • Islamic State War Documentaries
    International Journal of Communication 14(2020), 1808–1829 1932–8036/20200005 Islamic State War Documentaries NATHANIEL GREENBERG George Mason University, USA Amid the bloodshed of the U.S. invasion of Iraq, the Al-Qaeda affiliate known as the Islamic State of Iraq (ISI) introduced into their repertoire a new tool of war: the handheld camera. Tracing the evolution of the ghazwa, or military expedition aesthetic, in ISI and later ISIS filmmaking, this article explores the way in which the organization’s primary organ of communication, Al-Furqan Media Foundation, expanded from its origins as a documentary film unit to become one of the world’s most potent vehicles of performative violence. Drawing on a comparative frame of reference with other active media units within the greater sphere of Al-Qaeda communications, including the Al-Andalus Establishment for Media Production of Al-Qaeda in the Islamic Maghreb and Al-Furqan Media in the Egyptian Sinai, this article examines the manner in which aesthetic prerogatives, intertwined with religious mythology, served to transcend and unite disparate political factions around a common “narrative identity,” one that preceded and will outlast the reign of the Islamic State caliphate. Keywords: Al-Qaeda, Al-Furqan AQIM, aesthetics documentaries, Islamic State, jihad In his 2015 memoir, Yousri Fawdah recalls the morning after his arrival at the Al-Qaeda safe house in Karachi, Pakistan, in April 2002. Seated for morning prayer amid the so-called ahl al-dar (people of the house), he is joined by Khaled Shaykh Mohammad, head of Al-Qaeda’s military council, and Ramzi Bin al- Shiba, the coordinator of “Tuesday’s blessed operation (as Shaykh Mohammad describes the attack on 9/11; Fawdah, 2015, pp.
    [Show full text]
  • Isis in the West
    NEW INTERNATIONAL AMERICA SECURITY PETER BERGEN, COURTNEY SCHUSTER, AND DAVID STERMAN ISIS IN THE WEST THE NEW FACES OF EXTREMISM NOVEMBER 2015 About New America About the International Security Program New America is dedicated to the renewal of American The International Security Program aims to provide politics, prosperity, and purpose in the Digital Age. We evidence-based analysis of some of the thorniest carry out our mission as a nonprofit civic enterprise: an questions facing American policymakers and the public. intellectual venture capital fund, think tank, technology The program is largely focused on South Asia and the laboratory, public forum, and media platform. Our Middle East, al-Qaeda and allied groups, the rise of hallmarks are big ideas, impartial analysis, pragmatic political Islam, the proliferation of weapons of mass policy solutions, technological innovation, next destruction (WMD), homeland security, and the activities generation politics, and creative engagement with broad of U.S. Special Forces and the CIA. The program is also audiences. Find out more at newamerica.org/our-story. examining how warfare is changing because of emerging technologies, such as drones, cyber threats, and space- based weaponry, and asking how the nature and global About The Authors spread of these technologies is likely to change the very definition of what war is. Peter Bergen is a print, television and web journalist, documentary producer and the The authors would like to thank Emily Schneider and author or editor of six books, three of which Justin Lynch for their assistance with this research. were New York Times bestsellers and three of which were named among the best non- fiction books of the year by The Washington Post.
    [Show full text]