Van Islamitisch Kalifaat Naar Ideologie Zonder Staat

Total Page:16

File Type:pdf, Size:1020Kb

Van Islamitisch Kalifaat Naar Ideologie Zonder Staat Van islamitisch kalifaat naar ideologie zonder staat De transitie van islamitisch fundamentalisme naar jihadisme Lysanne Leeuwenburg 11012692 Masterscriptie MA Midden-Oostenstudies - Eindversie Universiteit van Amsterdam Begeleider: Dr. R.L.A. van Leeuwen Tweede lezer: Dr. R.A.F.L. Woltering Aantal woorden: 22.644 29 juni 2017 2 Inhoudsopgave English Abstract 4 Inleiding 5 Hoofdstuk 1: Koude Oorlog en globalisering 9 §1.1. Koude Oorlog en de Derde Wereld in vogelvlucht 9 §1.2. Globalisering 12 Hoofdstuk 2: Transitie van islamitisch fundamentalisme naar jihadisme 18 §2.1. Samuel Huntington: globalisering en de clash of civilizations 18 §2.2. Faisal Devji en Olivier Roy 21 Hoofdstuk 3: Islamitisch fundamentalisme 26 §3.1. Salafisme 26 §3.2. Kalifaat vs. natiestaat 28 §3.2.1. Ahmad ibn Taymiyya en Ibn al-Qayyim al-Jawziyya 29 §3.2.2. Mohammed `Abduh en Mohammed Rashid Rida 31 §3.2.3. Ali Abd al-Raziq 33 §3.2.4. Abul `Ala’ Mawdudi 35 §3.2.5. Moslimbroederschap 36 §3.2.6. Conclusie debat kalifaat vs. natiestaat 38 §3.3. Islamitische Republiek Iran: sjiitisch fundamentalisme 39 Hoofdstuk 4: Jihadisme en deterritorialisatie 41 §4.1. Abdullah `Azzam: ‘Godfather of the Jihad’ 41 §4.2. E-jihad 44 Hoofdstuk 5: Casus I: Al-Qaeda 46 §5.1. Opkomst en groei van al-Qaeda 46 §5.2. Al-Qaeda’s ideologie: jihadisme 49 Hoofdstuk 6: Casus II: Islamitische Staat 56 §6.1. Opkomst en groei van Islamitische Staat (IS) 56 §6.2.1. IS’ ideologie enerzijds: islamitisch fundamentalisme 58 §6.2.2. IS’ ideologie anderzijds: jihadisme 66 3 Conclusie 71 Bibliografie 74 Afbeeldingenlijst 81 Bijlagen 82 Bijlage 1: Emailcorrespondentie Aymenn Jawwad al-Tamimi 82 Bijlage 2: Tabel benamingen ‘het Westen’ door IS in Dabiq 83 4 English abstract In his book Landscapes of the Jihad, Faisal Devji has argued that since the end of the Cold War a transition is going on from Islamic fundamentalism to jihadism. Because of globalization the idea of an Islamic state as a territory became too weak to perform. Instead of this, deterritorialization occured and the jihad transformed into a more ethical or moral issue. This has resulted in a metaphysical battle between Muslims, Jews and Christians and, according to some radicals of the first group, in the end Islam will be the only monotheistic religion left in the world. In practice we can see this metaphysical battle with lone wolf attacks on the West. Faisal Devji wrote his book in 2005, and it is interesting to investigate whether Landscapes of the Jihad is still usable anno 2017. It seems that al-Qaeda fits the theory of Devji. This organization does not have specific plans for the establishment of an Islamic state and encourages lone wolves in the West to perform attacks on non-Muslims and other non- believers. It is however interesting to look at the most on-news terrorist organization ISIS, or the Islamic State (IS). ISIS contains the jihadist aspect with those terror attacks performed by an individual, but, instead of Devji’s hypothesis, has also created an Islamic State in Syria and Iraq, and thus has a territory to defend. The organization of this State is very strict with the implementation of shari`a and hudud punishments. ISIS also set up public services like schools and healthcare. In their online magazine Dabiq they are calling Muslims in the West to join the Caliphate. On the other hand, when defending the Islamic territory became more and more difficult, ISIS shifted the focus towards the jihadist aspect. In their online magazine Rumiyah, which was published after Dabiq, a transition is notable with calls for lone wolf attacks on the West. A very important aspect of these calls and other propaganda of ISIS is their media strategy, in which it uses social media to reach their followers. With this knowledge in mind I want to argue that the ‘deterritorialization-theory’ of Faisal Devji is still usable these days. Al-Qaeda fits the description of it, and ISIS can be seen as a modern illustration of the theory. They started with Islamic fundamentalism and the creation of a Caliphate, but after some backlashes ISIS turned to jihadism. Therefore Devji’s hypotheses is still applicable on today’s developments, but maybe not in its original form of a transition since the end of the Cold War. 5 Inleiding In oktober 2001 had Tayseer Alouni, correspondent bij Al-Jazeera, een interview met Osama Bin Laden. Een van de vragen in dit interview over de aanslagen op 11 september 2001 in New York luidde: “What is your assessment of the Arabic reaction and the effects on the Islamic world? Some were joyous. Others said, ‘We can’t accept this. This is terrorism, not 1 Islam.” Hierop antwoordde Bin Laden: “The events proved the extent of terrorism that America exercises in the world. Bush stated that the world has to be divided in two: Bush and his supporters, and any country that doesn’t get into the global crusade is with the terrorists. What terrorism is clearer than this? Many governments were forced to support this ‘new terrorism.’ They had to go along with this although they knew that we are defending our brothers and defending our sacred values (…). Just as they're killing us, we have to kill them so that there will be a balance of terror. This is the first time the balance of terror has been close between the two parties, between Muslims and Americans, in the modern age. American politicians used to do whatever they wanted with us.”2 Bin Laden doelde met de ‘global crusade’ op de zogenaamde War on Terror, uitgeroepen door President George W. Bush naar aanleiding van de aanslagen door al-Qaeda op de Twin Towers op 11 september 2001. De War on Terror behelsde de nationale veiligheidspolitiek van de Verenigde Staten en leidde uiteindelijk tot de Amerikaanse invallen in Afghanistan, ‘Operation Enduring Freedom’ in 2001, en in Irak, ‘Operation Iraqi Freedom’, in 2003.3 Irak werd als geografische thuisbasis gezien voor de terroristen achter 11 september.4 Daarnaast was President Bush van mening dat Saddam Hussein al-Qaeda en andere terroristische organisaties zou steunen en zo een bedreiging voor de Amerikaanse veiligheid vormde. Door Irak binnen te vallen en het regime van Hussein ten val te brengen, zou dit gevaar geweken zijn5: “The United States would punish not just the perpetrator of the attacks, but also those who harbored them”, zoals beschreven staat in The 9/11 Commission Report.6 President Bush had met de War on Terror als doel voor ogen elke terroristische organisatie die een bedreiging voor de Verenigde Staten vormde uit te schakelen, te beginnen met al-Qaeda: “Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group 1 http://edition.cnn.com/2002/WORLD/asiapcf/south/02/05/binladen.transcript/index.html. 2 Ibidem. 3 S.D. Reese en S.C. Lewis, ‘Framing the War on Terror: The internationalization of policy in the US press’, in Journalism 10/6 (2009), 777. 4 Ibidem, 779. 5 W.A. Murray en G. Parker, ‘The Post-War World 1945-2007’, in G. Parker, Cambridge Illustrated History of Warfare – Revised and Updated (Cambridge 2012), 378. 6 9/11 Commission, The 9/11 Commission Report: The Attack From Planning To Aftermath, 454. 6 of global reach has been found, stopped, and defeated.”7 Magnus Ranstorp en Graeme P. Herd omschrijven de War on Terror als een schaduwoorlog zonder duidelijke fysieke grenzen. Er zou in plaats daarvan sprake zijn van een ideologisch strijdfront.8 Dit front zou men te lijf willen gaan door de rol van religieuze leiders en figuren die extremisme prediken te beperken, banden tussen deze (sleutel)figuren en de aanhangers te verbreken, en gematigde tegenstanders van deze extremisten te steunen. Ook moest het publiek van het extreme gedachtegoed geïsoleerd worden.9 Volgens Olivier Roy, auteur van het boek Globalized Islam dat in 2004 werd gepubliceerd, wordt de strijd tegen het terrorisme echter nog altijd begrepen in termen van grondgebied en staten. Hoewel internationale terroristische of jihadistische groeperingen geen nationaal gebied te verdedigen hebben, wordt een regulier leger in de War on Terror wel ingezet om een gebied in te nemen of een staat te vernietigen. Dit zou volgens Roy zijn om het gebied om te vormen tot een democratische staat waarmee uiteindelijk door militaire interventie een domino-effect in de regio zou ontstaan. Hiermee zou er in het Midden-Oosten vrede kunnen komen en de steun voor terrorisme ingeperkt worden. Roy betoogt dat in de strategie van de War on Terror het territoriale element ontbreekt: “The concept of a world Muslim ummah10 as a geostrategic actor is nonsense”.11 Doordat er geen territorium voor de strijd is, is het ook lastig om de vijand te verslaan: “It is not an external or territorial foe to be dealt with by military action but rather the object of police action and internal security.”12 Al lang vóór het uitroepen van de War on Terror was er sprake van een soort strijd tussen de islam en ‘het Westen’. Samuel Huntington beschreef deze strijd aan het einde van de Koude Oorlog als een clash of civilizations. De traditionele conventionele manier van oorlogvoering, waarbij twee legers op een slagveld tegenover elkaar stonden, ging hierbij niet meer op; in plaats daarvan was er geen vast conflictgebied, noch een uitgesproken en herkenbare vijand waartegen gevochten werd. Bepaalde fundamentele islamitische groeperingen, waaronder al-Qaeda, voerden al langer zo’n metafysische strijd, ook wel de ‘geglobaliseerde jihad’ genoemd. In het boek Landscapes of the Jihad beschrijft Faisal Devji (1964-) op een kernachtige manier het concept van deze geglobaliseerde jihad.
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • The Use of the Internet for Terrorist Purposes
    The use of the Internet for terrorist purposes In collaboration with the UNITED NATIONS COUNTER-TERRORISM IMPLEMENTATION TASK FORCE UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED NATIONS New York, 2012 © United Nations, September 2012. All rights reserved. The designations employed and the presentation of material in the present publica- tion do not imply the expression of any opinion whatsoever on the part of the Sec- retariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are cor- rect at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban Ki-moon Secretary-General of the United Nations Foreword Executive Director United Nations Office on Drugs and Crime The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role inproviding assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the international legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards.
    [Show full text]
  • University of Groningen Jihadism and Suicide Attacks Nanninga
    University of Groningen Jihadism and Suicide Attacks Nanninga, Pieter IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2014 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Nanninga, P. (2014). Jihadism and Suicide Attacks: al-Qaeda, al-Sahab and the Meanings of Martyrdom. s.n. Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. Download date: 29-09-2021 Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom Pieter Nanninga Cover design: Anna Woldring Cover photograph: still from al-Sahab, Winds of Paradise: Part 1, 20" Printing: CPI Koninklijke Wöhrmann ISBN 978-90-367-7040-8 (printed version) ISBN 978-90-367-7045-3 (electronic version) © Copyright 2014 Pieter Gerhardus Theodorus Nanninga Jihadism and Suicide Attacks al-Qaeda, al-Sahab and the Meanings of Martyrdom PhD thesis to obtain the degree of PhD at the University of Groningen on the authority of the Rector Magnificus Prof.
    [Show full text]
  • The Internet and the Iraq Conflict
    The Internet and the Iraq Conflict Dorothy E. Denning July 2008 On blogs and Web sites, by e-mail and video, the Iraq war is fought on the Internet Associated Press, Baghdad, March 16, 2008. In recent years, the Internet has come to play a part in every major conflict, for example, Kosovo in 1999, the ongoing Israeli-Palestinian conflict, particularly since the second Intifada in 2000, and now Iraq. While the net’s role in the Iraq conflict may seem insignificant compared to events on the ground, it cannot be ignored. At the very least, it has affected support for the war and for al-Qa’ida’s insurgency, both within Iraq and globally. This chapter examines how the Internet has been and continues to be used in the Iraq conflict. This use is manifest in a range of activity from the dissemination of information to cyber attacks. The chapter describes who is engaging in these activities and some of the effects. It also considers how the Internet might be used more effectively to counter al-Qa’ida in Iraq and the al-Qa’ida/global Salafi jihad social movement. First, however, the chapter briefly summarizes the state of the Internet. The Internet According to Internet World Stats, approximately 1.3 billion people, about 20% of the world’s population, were connected to the Internet as of December 2007.1 1 Connectivity varies by region, with North America having the highest penetration rate at 71%, compared with Africa’s lowest at 5%. The Middle East, at 17%, is a little below average, but some countries within the region, including Iraq, are well below that.
    [Show full text]
  • Islamist Terrorism Analysis of Offences and Attacks in the Uk (1998-2015)
    ISLAMIST TERRORISM ANALYSIS OF OFFENCES AND ATTACKS IN THE UK (1998-2015) Hannah Stuart Islamist Terrorism Analysis of Offences and Attacks in the UK (1998-2015) Hannah Stuart Previous editions by Robin Simcox | Hannah Stuart | Houriya Ahmed | Douglas Murray Research assistance by Andrew Day | Lewis Barton | Emma Webb | Rupert Sutton Published in 2017 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London, SW1P 4QP Registered charity no. 1140489 Tel: +44 (0) 20 7340 4520 www.henryjacksonsociety.org ©The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees Islamist Terrorism: Analysis of Offences and Attacks in the UK (1998–2015) By Hannah Stuart ISBN 978-1-909035-27-0 All rights reserved About the author Hannah Stuart is a Senior Research Fellow at The Henry Jackson Society where her work focuses on Islamism- inspired extremism, terrorism and jihadist ideology as well as religious law and the role of religion in the public sphere. Hannah has advised government officials, MPs and other relevant stakeholders and has given evidence to relevant Home Affairs Select Committee inquiries, and her research and ideas have informed counter- radicalisation policy. She has extensive broadcast media experience and has written analysis for the Wall Street Journal, The Times, Foreign Policy, Current Trends in Islamist Ideology and the Guardian, among others. Hannah has a MA in International Studies and Diplomacy (with Distinction) from the School of Oriental and African Studies, and a BA in English Literature from the University of Bristol.
    [Show full text]
  • Terror on Facebook, Twitter, and Youtube
    Terror on Facebook, Twitter, and Youtube Gabriel Weimann Professor Haifa University “My dear brothers in Jihad,” wrote a man who identified himself as Abu Jendal, “I have a kilo of Acetone Peroxide. I want to know how to make a bomb from it in order to blow up an army jeep; I await your quick response.” About an hour later the answer came: “My dear brother Abu Jendal,” answered a Hamas supporter who called himself Abu Hadafa, “I understand that you have 1,000 grams of Om El Abad. Well done! There are several ways to change it into a bomb.”Om El Abad—the mother of Abad—is the Hamas nickname for the improvised explosive TATP—triacetone triperoxide. Abu Hadafa then explained, in detail, how to change the homemade explosive into a 45 deadly roadside bomb, and even attached a file that teaches how to make detonators for the bomb.1 Abu Jendal and Abu Hadafa are two anonymous Palestinians who, it seems, never met one another. The exchange was not encoded or concealed, but was published completely openly on the website of the Izz al din al Kassam Brigades, the military faction of the Hamas. This online form of exchanging of guidance, advice, and instructions has become commonplace in various terrorist chatrooms and online forums. Post-modern terror- ists are taking advantage of the fruits of globalization and modern technology—espe- cially advanced online communication technologies that are used to plan, coordinate and execute their deadly campaigns. No longer geographically constrained within a particular territory, or politically or financially dependent on a particular state, they rely on technologically modern forms of communication—including the internet.
    [Show full text]
  • Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom Sajjan Gohel 1
    Chapter 2 Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom Sajjan Gohel 1 Some time ago, before the death of Osama bin Laden, I gave a run-down of the intelligence cycle, the different intelligence and security agencies, how they op- erate and how they cooperate. To briefly reiterate, the British intelligence cycle consists of four main phases: direction, collection, analysis, and dissemination. To achieve greater effectiveness in identifying and disrupting international ter- rorist networks, the UK’s current approach necessitates an unprecedented level of inter-agency cooperation and, most importantly, information sharing. After all, as an island nation we are alone. For the UK, the significance of intelli- gence in counter-terrorism stems from three main drivers: • Its role in pre-emption and disruption of terrorist activity • Its role in post-incident investigations • Its contribution to preventive/protective security measures. Since we met in Albania, there have been significant developments in the UK. In fact mostly within the last six weeks. Fortunately, there was not a ter- rorist attack but two major terrorist trials which gave great insight to the way intelligence agencies cooperate, share information and ultimately foil and dis- rupt plots and save lives. I want to look at this in more detail which hopefully will illustrate the level of intelligence cooperation—not just internally but also with foreign partners—and look at the benefits and advantages as well as the weakness and challenges that still exist. Certainly controversy has emerged from both the trial of three men accused of conspiring with the 7/7 bombers and the Liquid Bomb Plot trial which was allegedly about bringing down an airliner.
    [Show full text]
  • Terrorism and the Internet: Finding a Profile of the Islamic “Cyber Terrorist”
    Countering Terrorism, Preventing Radicalization and Protecting Cultural Heritage 103 A. Niglia et al. (Eds.) IOS Press, 2017 © 2017 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-61499-755-9-103 Terrorism and the Internet: Finding a Profile of the Islamic “Cyber Terrorist” 1 Dr. Stefano MELE Director of “Information Warfare and Emerging Technologies” Observatory, Italian Institute of Strategic Studies “Niccolò Machiavelli” Abstract. The number of terrorist attacks that have brought about bloodshed and left a mark on recent history have spotlighted once again the need to stem the at- tempts by terrorist organizations to conduct attacks within the EU, forestalling the intentions of the martyrs-to-be. The Islamic State of Iraq and Syria (ISIS) is un- doubtedly the terrorist group that, more than others, has taken advantage of Internet, not only as a tactical means of coordination, but also as a tool to carry out proselyt- ism, recruitment, propaganda, and fundraising. As one could imagine, constantly monitoring the Internet for these activities is an extremely complex and time-con- suming activity, requiring a huge amount of money and manpower, and resulting in very poor – and only temporary – outcomes. To stem this rapidly spreading phe- nomenon, it can be useful to focus the attention of decision-makers, intelligence and law enforcement on a possible profile of a “cyber terrorist”. This paper aims at tracing the identikit of a possible “cyber terrorist” that is as broad and consistent as possible. Keywords. Al-Qaeda, cyber terrorist, Internet, ISIS, Islamic State, profiling, prop- aganda, proselytism, recruiting, terrorist organizations 1.
    [Show full text]
  • Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning Ari Weil Pomona College
    Claremont Colleges Scholarship @ Claremont Pomona Senior Theses Pomona Student Scholarship 2018 Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning Ari Weil Pomona College Recommended Citation Weil, Ari, "Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning" (2018). Pomona Senior Theses. 206. https://scholarship.claremont.edu/pomona_theses/206 This Open Access Senior Thesis is brought to you for free and open access by the Pomona Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in Pomona Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning By Ari Weil In Partial Fulfillment of the Requirements for the Degree of Bachelor of Arts in International Relations Submitted To Professor Jennifer Morrison Taw Pomona College Claremont, California April 27, 2018 Weil 2 Table of Contents Abstract ................................................................................................................................................... 4 Acknowledgements ................................................................................................................................. 5 Chapter One: Introduction ....................................................................................................................... 6 Literature Review ...............................................................................................................................
    [Show full text]
  • The Global Expansion of the Al Qaeda Franchise Benjamin S
    Claremont Colleges Scholarship @ Claremont CMC Senior Theses CMC Student Scholarship 2011 The Global Expansion of the Al Qaeda Franchise Benjamin S. Forster Claremont McKenna College Recommended Citation Forster, Benjamin S., "The Global Expansion of the Al Qaeda Franchise" (2011). CMC Senior Theses. Paper 178. http://scholarship.claremont.edu/cmc_theses/178 This Open Access Senior Thesis is brought to you by Scholarship@Claremont. It has been accepted for inclusion in this collection by an authorized administrator. For more information, please contact [email protected]. CLAREMONT MCKENNA COLLEGE THE GLOBAL EXPANSION OF THE AL QAEDA FRANCHISE SUBMITTED TO PROFESSOR JENNIFER TAW AND DEAN GREGORY HESS BY BENJAMIN FORSTER FOR SENIOR THESIS FALL 2010/ SPRING 2011 APRIL 25, 2011 In Loving Memory of My Grandmother Betty A. Forster, and Grandfather Robert H. Forster CONTENTS Introduction……………………………………………………………………………....1 Organization……………………………………………………………………………….4 Chapter 1: Networking Theories and the Conditions that are Conducive to the Presence of Terrorist Groups…………………………………………………………...7 Networks…………………………………………………………………………………..7 Types of Networks………………………………………………………………...7 The Role of the Internet in Facilitating Communication within Decentralized Networks..................................................................................................................9 Applying Business Models to Terrorist Groups…………………………………11 Social Networking Theory and Diffuse Networks……………………………….13 Dynamic Networks………………………………………………………………15
    [Show full text]