9781108419703 Index.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

9781108419703 Index.Pdf Cambridge University Press 978-1-108-41970-3 — As Terrorism Evolves Philip Seib Index More Information 181 Index Abu Ghraib, 158 “Arab spring”, 67 , 176 Aceh, Indonesia, 70 Arab uprisings 2011, 4 , 57 al- Adnani, Abu Muhammad 103 , 172 Arab world, 56 Afghanistan, 3 , 7 , 24 , 27 , 30 , 35 , 86 , 91 , 103 , Arabic- language countermessaging, 175 105 , 109 , 110 , 112 , 115 , 151 , 158 , 159 , 173 archeological sites, 97 Africa Check, 83 Arquilla, John, 113 African Muslims, 150 As Sahab , 12 , 115 African Union Mission in Somalia Asharq Al- Awsat, 59 (AMISOM), 86 , 106 Ashton Carter, 138 Ahmari, Sohrab, 76 Asma Lamrabet, 164 Ahrar al- Sham (“Free People of the Levant”), 153 Asrar al- Dardashah (Secrets of the Chat), 121 aid programs, 31 , 168 , 169 Assad, 152 airlines’ computer reservation systems, 142 assassination, 113 airplane hijackings, 76 , 88 , 111 assimilation, 43 Ajaka, Nadine, 62 atrocities, 130 al- Ajmi, Hajjaj, 127 attitudes toward IS, 58 Al Arabiya, 22 Atwan, Abdel Bari, 52 , 93 , 97 Al- Assad, Bashar, 79 , 88 auctions, 127 Al Bayan , 119 Austria, 150 Al Jazeera, 67 , 115 al- Awlaki, Anwar 39 , 155 Al Manar, 22 , 89 Al Neda, 112 Babu, Dal, 133 alahednews , 89 Bach- Lombardo, Jordan, 128 Albright, Madeleine 64 , 65 “backdoor” access, 141 Algeria, 105 , 171 Baghdad, 165 algorithm, 140 Al- Baghdadi, Abu Bakr, 26 , 90 Al- Khanssaa Brigade, 99 Bahasa Indonesia, 151 “All Religion Will Be for Allah,” 116 Bakr, Haji, 90 Allison, Graham, 147 Bali, 28 Amaq News Agency, 108 , 119 Bangladesh, 136 , 144 , 169 Amazon, 136 Bangsamoro Islamic Liberation Fighters, 168 American Revolution, 85 Barira, 168 American Sniper , 122 Baton Rouge, Louisiana 7 Amin, Ali, 125 “battlei eld of media”, 118 AMISOM. See African Union Mission in BBC, 41 , 132 Somalia Begin, Menachem, 19 Android, 121 beheading, 102 anti- Arab sentiment, 42 Beirut, 4 , 62 anti- Muslim sentiment. See Islamophobia Belgium, 80 , 146 , 176 antiquities, 126 Ben Ali, Zine el- Abidine, 67 Apple, 141 , 142 Benghazi, 81 AQAP, 30 , 79 Berg, Nicholas, 116 X AQIM, 78 , 81 Bergen, Peter, 37 181 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-108-41970-3 — As Terrorism Evolves Philip Seib Index More Information 182 182 Index Bin Laden, Osama, 3 , 5 , 9 , 11 , 12 , 17 , 19 , 20 , civil liberties, 140 , 141 , 161 26 , 28 , 47 , 78 , 86 , 89 , 91 , 105 , 109 , 112 , Clarke, Colin, 174 115 , 122 , 142 , 152 , 157 “clash of civilizations,” 50 , 62 , 164 biological weapons, 148 The Clash of Civilizations and the Birmingham, UK, 133 Remaking of World Order , 50 Bitcoin, 154 “clash of Islams”, 164 Black September, 75 “clear, hold, and build”, 129 Blinken, Anthony, 176 Cold War, 2 , 17 , 35 , 174 Blue Mosque, 6 U.S.S. Cole , 34 Boko Haram, 7 , 10 , 25 – 27 , 69 , 78 , 82 – 85 , Colorado Springs Planned Parenthood clinic 101 , 102 , 150 , 174 attack, 7 , 37 , 49 borders, 54 combat footage, 116 Borno, 85 Combating Terrorism Center (CTC), 102 Boston Marathon bombing, 1 , 20 , 148 computer worm, 139 Bouazizi, Mohamed, 67 Conrad, Joseph, 75 brand, 77 , 78 , 80 , 174 contractors, 131 , 136 Breivik, Anders, 49 Cook, Tim, 141 Brexit, 51 “copycat” actions, 40 “Bring Back Our Girls”, 82 “countering violent extremism” (CVE), British Council, 167 3 , 21 , 32 British government, 25 , 131 , 132 counterinsurgency, 83 , 129 British Muslims, 131 , 132 countermessaging, 137 Brussels, 4 , 41 , 76 , 108 , 120 , 146 , 165 counter- narratives, 137 Buddhists, 49 counterterrorism, x , 2 , 3 , 21 , 22 , 31 , 43 , 50 , “burkini”, 56 74 , 78 , 81 , 84 , 128 , 131 , 133 , 135 – 37 , 146 , Burundi, 86 148 , 149 , 154 , 155 , 161 , 162 , 166 Bush,George W., 21 , 30 , 47 , 55 , 146 , 178 couriers, 122 courts, 93 Call of Duty , 122 covert propaganda, 131 Callimachi, Rukmini, 124 credit card fraud, 127 Cameron, David, 130 credibility, 131 , 134 , 166 Cameroon, 27 , 83 Crenshaw, Martha, 23 Camstoll Group, 126 crowdfunding, 127 Catholicism, 49 , 60 Crusades, 46 , 47 cellphones, 121 , 138 , 141 Cuba, 158 censorship, 141 Cuban Missile Crisis, 174 Central Asia, 145 , 151 CVE. See countering violent extremism Central Intelligence Agency (CIA), 146 , 147 cyber warfare, 138 , 139 , 148 Chad, 27 , 83 cybersecurity, 114 Chad Basin, 82 cyberspace, 119 , 120 , 129 , 138 Charleston, South Carolina, 37 chat apps, 120 Da’esh. See Islamic State Chatham House, 170 Dabiq , 56 , 119 , 122 Chechnya, 151 Dallas, 7 chemical weapons, 148 Dar es Salaam, 34 Cheney, Dick, 158 , 159 “dark web”, 154 , 175 Chibok, Nigeria, 82 , 101 “dead drop”, 113 children, 56 , 100 , 101 “deep web”, 154 China, 139 , 174 Democratic Republic of Congo, 42 Christianity, 46 , 49 , 52 , 53 , 88 Der Sturmer , 156 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-108-41970-3 — As Terrorism Evolves Philip Seib Index More Information 183 Index 183 desertions, 123 Ford, Theresa, 49 designated foreign terrorist organizations, 25 Foreign Affairs , 50 diaspora, 119 foreign aid, See aid programs “dirty bomb”, 146 foreign i ghters, 102 , 104 Doel- 4 nuclear power reactor, 146 foreign investment, 111 Domestic Terrorists, 7 , 36 Fort Hood, Texas, 1 Dreazan, Yochi, 81 framing, 23 , 60 drones, 31 , 32 , 39 , 52 , 107 , 139 , 147 , 150 , France, 28 , 42 , 51 , 56 , 62 , 80 – 82 , 104 , 155 , 159 , 160 144 , 153 Druze, 88 fundraising, 126 East Africa, 169 Gall, Carlotta, 27 Eastern Europe, 151 gatekeepers, 112 , 115 eBay, 127 Gaza, 7 Economic Council, 93 Geneva Conventions, 158 The Economist , 24 , 96 geocodes, 149 education, 74 , 103 geo- proi ling, 148 Education Council, 93 George Washington University, 125 Egypt, 110 , 130 , 171 Germany, 40 , 42 , 75 , 103 , 104 electrical and communications grids, 148 Ghannouchi, Rached, 73 “electronic communication transactional Ghattas, Kim, 66 records”, 160 Global Coalition to Counter ISIL, 96 email, 161 Global Engagement Center, 133 Emont, Jon, 70 Global Islamic Media Front, 113 , 121 encryption, 120 , 121 , 138 , 141 Global Positioning System (GPS), 149 entertainment media, 20 Global Terrorism Database, 82 Estonia, 150 “Global War on Terror”, 3 , 21 Ethiopia, 86 Goebbels, Joseph, 156 Europe, 53 , 153 , 164 Google, 123 , 136 , 154 European Union, 142 Graham, David, 62 European views of Muslims, 58 Graham, Lindsey, 62 executing prisoners, 52 , 71 , 100 , 104 Guantanamo, 158 execution images, 122 The Guardian , 61 , 131 “extremist behavior”, 162 Gulf Cooperation Council, 130 Gulf States, 79 , 99 Facebook, 38 , 62 , 126 , 127 , 132 , 136 , 155 Fahmy, Nabil, 176 Habila, Helon, 85 Fahmy, Shahira, 122 hackers, 138 Fallujah, 144 Hadith, 49 Farook, Syed Rizwan, 37 Hamas, 7 , 25 , 40 Farr, Thomas, 65 handwritten messages, 122 Federal Bureau of Investigation (FBI), 38 , Haqqani network, 7 141 , 142 , 160 , 161 “hate rock”, 156 federal hate crime, 37 Hehir, Bryan, 64 Fidler, David, 129 Help for Syria, 132 i lmmakers, 136 “Heroes of Fallujah”, 116 i ltering, 126 Hezbollah, 22 , 62 , 78 , 88 , 89 “i nancial jihad”, 126 hijacking airplanes, 34 , 76 First World War, 54 , 80 Hindu- Muslim tensions, 53 Ford, Robert, 152 Hindus, 27 , 80 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-108-41970-3 — As Terrorism Evolves Philip Seib Index More Information 184 184 Index “Hijrah [Emigrate] to the Islamic State: Islam, 7 , 8 , 46 – 53 , 55 , 57 , 61 , 66 – 68 , 71 , 112 , What to Pack, Who to Contact, Where to 124 , 151 , 155 , 157 , 163 – 165 , 173 , 178 Go”, 124 Islamic law, 29 Hitler, Adolf, 156 Islamic Services Council, 93 Hizb ut- Tahrir, 71 Islamic State (IS), ix , x , 1 , 4 , 5 , 7 , 9 – 12 , 15 , Hoffman, Bruce, 114 18 , 22 , 25 , 26 , 35 , 39 , 44 , 50 , 55 , 56 , 58 , “Holy war”, 16 59 , 66 , 69 , 71 , 77 – 79 , 82 , 89 , 90 , 92 , 93 , “Homegrown Violent Extremists,” 36 95 , 102 – 105 , 108 , 117 – 119 , 122 , 123 , 126 , “home- grown” terrorist, 12 128 , 129 , 131 , 132 , 134 , 136 , 138 , 139 , Hooper, Robert, 136 143 – 147 , 149 , 151 , 154 – 156 , 160 , 165 , 166 , Horton, Michael, 29 168 , 169 , 171 – 175 , 177 hostage- takers, 15 Islamic State of Iraq and the Levant (ISIL). How to Survive in the West: A Mujahid See Islamic State Guide , 39 Islamic State of Iraq and Syria (ISIS). See Huffington Post , 156 Islamic State Huntington, Samuel P., 50 , 51 , 54 Islamic State’s GDP, 96 Hussein, Saddam, 5 , 36 , 90 , 93 , 101 Islamic teaching, 71 Islamic University of Medina, 69 “identity drift”, 44 Islamophobia, x , 42 , 55 , 56 , 69 , 74 , 177 immigration, 51 , 66 , 81 isotopes, 147 Impl.Project, 167 , 168 Israel, 35 , 40 , 49 , 75 , 88 , 110 , 112 Independent University, Bangladesh, 136 Istanbul, 4 , 6 , 151 , 165 India, 26 , 49 , 53 , 80 , 150 Italy’s Red Brigade, 60 Indonesia, 7 , 14 , 25 , 26 , 28 , 69 – 71 , 73 , 151 Jabado, May, 165 information and communication Jabhat al- Nusra, 78 , 79 , 103 technologies (ICTs), 139 Jabhat Fatah al- Sham (Front for the infrastructure, 93 Conquest of the Levant), 152 Instagram, 126 , 127 , 136 Jabhat Fateh al- Sham, 79 Institution for Public Information, 93 “Jack Bauer”, 63 insurgency, ix , 5 , 7 , 84 , 85 Jakarta, Indonesia, 28 “insurgent journalism.”, 87 Japan, 158 intelligence, 90 , 103 , 104, 121 , 135 , 137 , 154 Jemaah Anshorut Tauhid, 25 International Center for Religion and Jemaah Islamiya, 7 , 28 Diplomacy (ICRD), 72 Jenkins, Brian Michael, 24 International Crisis Group, 77 Jerusalem, 19 , 46 , 157 “internet of things”, 157 jihad , 48 , 113 , 114 iPhone, 141 , 142 “ Jihad , Martyrdom, and the Killing iPhone operating system, 141 of Innocents”, 49 Iran, 10 , 13 , 88 , 89 , 139 , 174 jihadism, 174 Iraq, 4 , 5 , 13 , 15 , 24 , 35 , 36 , 63 , 77 , 80 , 90 , jihadist , 48 , 156 94 , 105 , 108 , 112 , 144 , 145 , 149 , 152 , jihadist chants, 119 159 , 172 Johns Hopkins University, 83 Iraq War, 4 , 48 Johnston, Douglas, 72 Irgun, 19 Jordan, 42 , 123 , 164 , 171 Irish Republican Army (IRA), 60 journalists, 112 IS.
Recommended publications
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • Jihadism: Online Discourses and Representations
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Studying Jihadism 2 3 4 5 6 Volume 2 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 38 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 Rüdiger Lohlker (ed.) 2 3 4 5 6 7 Jihadism: Online Discourses and 8 9 Representations 10 11 12 13 14 15 16 17 With many figures 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 & 37 V R unipress 38 39 Vienna University Press 40 41 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; 24 detailed bibliographic data are available online: http://dnb.d-nb.de.
    [Show full text]
  • Combating Al Qaeda and the Militant Islamic Threat TESTIMONY
    TESTIMONY Combating Al Qaeda and the Militant Islamic Threat BRUCE HOFFMAN CT-255 February 2006 Testimony presented to the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities on February 16, 2006 This product is part of the RAND Corporation testimony series. RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. is a registered trademark. Published 2006 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 201 North Craig Street, Suite 202, Pittsburgh, PA 15213-1516 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Dr. Bruce Hoffman1 The RAND Corporation Before the Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities United States House of Representatives February 16, 2006 Four and a half years into the war on terrorism, the United States stands at a crossroads. The sustained successes of the war’s early phases appear to have been stymied by the protracted insurgency in Iraq and our inability either to kill or capture Usama bin Laden and his chief lieutenant, Ayman al-Zawahiri.
    [Show full text]
  • Lessons from Others for Future U.S. Army Operations in and Through the Information Environment CASE STUDIES
    C O R P O R A T I O N Lessons from Others for Future U.S. Army Operations in and Through the Information Environment CASE STUDIES Christopher Paul, Colin P. Clarke, Michael Schwille, Jakub P. Hlávka, Michael A. Brown, Steven S. Davenport, Isaac R. Porche III, Joel Harding For more information on this publication, visit www.rand.org/t/RR1925z2 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9997-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Cover photos (clockwise from top left): Giorgio Montersino via Flickr (CC BY-SA 2.0); U.S. Air Force photo by Airman 1st Class Adawn Kelsey; U.S. Air Force photo by Tech Sgt John Gordinier; U.S. Air National Guard photo by Master Sgt Andrew J. Moseley; Russian Ministry of Defence (CC BY 4.0); North Korean national media Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous.
    [Show full text]
  • Terrorists and Cyberspace: the Digital Battleground
    Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2018-06 TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND Urena Figueroa, Alberto Miguel Monterey, CA; Naval Postgraduate School http://hdl.handle.net/10945/59608 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND by Alberto Miguel Urena Figueroa June 2018 Thesis Advisor: Tristan J. Mabry Second Reader: Robert E. Looney Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK Form Approved OMB REPORT DOCUMENTATION PAGE No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED (Leave blank) June 2018 Master's thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS TERRORISTS AND CYBERSPACE: THE DIGITAL BATTLEGROUND 6. AUTHOR(S) Alberto Miguel Urena Figueroa 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT Monterey, CA 93943-5000 NUMBER 9. SPONSORING / MONITORING AGENCY NAME(S) AND 10.
    [Show full text]
  • WORLDWIDE STRATEGIES for COUNTER-TERRORISM Anne Aldis and Graeme P
    THE IDEOLOGICAL WAR ON TERROR This volume is the fi rst to examine current attempts to counter ideological support for terrorism (CIST) worldwide. While terrorist groups legitimize and justify their use of violence and terror and gain new recruits and supporters through the use of ideology, the book asks and strives to answer the following questions: to what extent do existing CT strategies de-legitimize ideological support for terrorists? What further measures might be undertaken? How might we understand and measure sucess and, on the basis of the case studies, what policy recommendations can be made? To answer these questions and to assess CIST activities objectively the editors have put together a wealth of case studies covering Europe and Eurasia, the Middle East, the Asia Pacifi c region, South Africa and South and Latin America. Examining the relationship between terrorists, political extremists and ideology, each chapter highlights effective policies to counter that support and suggests how CIST might be located more closely within a counter-terrorism strategy. This volume thus re-examines terrorists’ strategic goals and sources of legitimacy and the nature of their ideological support, examines current US and regional CT strategies and assesses their success in de-legitimizing terrorists and undermining their support, and fi nally provides a strategic synthesis and policy recommendations in light of the research fi ndings. This book will be of much interest to students and analysts of political violence and terrorism, security studies and politics in general. Anne Aldis is Head of the UK Defence Academy’s Confl ict Studies Research Centre. She is co-editor of Russian Regions and Regionalism (2003), Russian Military Reform 1992–2002 (2003) and Soft Security Threats and European Security (2005).
    [Show full text]
  • Contre-Insurrections
    Les thématiques du Thématique N° 21 – Novembre 2009 Stratégies et politiques de communication des belligérants non-étatiques Marc Hecker et Thomas Rid 1 Centre d’études en sciences sociales de la défense Thématique – No21 Stratégies et politiques de communication des belligérants non-étatiques Introduction La logique stratégique des belligérants non-étatiques Les principaux conflits actuels dans lesquels sont engagés des Etats occidentaux – du théâtre afghan à l‘Irak – sont souvent qualifiés d‘ « asymétriques ». Qu‘on les appelle « guérilla », « insurrection » ou « jihad », ils opposent au moins deux adversaires aux caractéristiques très différentes. D‘un côté, une armée occidentale moderne, formée et équipée principalement pour des affrontements militaires classiques. De l‘autre, un adversaire matériellement plus faible, disposant parfois uniquement de quelques dizaines d‘hommes armés de kalachnikovs et de RPG. Le paradoxe de la guerre asymétrique est que le « fort » ne gagne pas toujours. Les exemples historiques ne manquent pas, à l‘instar de la guerre d‘Algérie ou de l‘intervention américaine en Somalie en 1993. Pour comprendre la façon dont, dans une confrontation armée, le « faible » peut réussir à battre le « fort », il convient d‘analyser les mécanismes sous- tendant les affrontements asymétriques. Ceux-ci sont, schématiquement, de trois ordres. Le « faible » doit tout d‘abord prendre conscience de sa faiblesse. 2 Il lui faut ensuite en tirer les conséquences stratégiques et tactiques en développant une conception de la confrontation différente de celle des théoriciens de la guerre classique. Il doit enfin établir un rapport particulier avec la population afin de tenir jusqu‘à la victoire. Et qui dit rapport à la population sous-tend nécessité de communiquer avec elle.
    [Show full text]
  • Combating Al Qaeda and the Militant Islamic Threat
    TESTIMONY THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Testimony View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. TESTIMONY Combating Al Qaeda and the Militant Islamic Threat BRUCE HOFFMAN CT-255 February 2006 Testimony presented to the House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities on February 16, 2006 This product is part of the RAND Corporation testimony series. RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world.
    [Show full text]
  • The State of Global Jihad Online a Qualitative, Quantitative, and Cross-Lingual Analysis
    New America Foundation The State of Global Jihad Online A Qualitative, Quantitative, and Cross-Lingual Analysis Aaron Y. Zelin, Richard Borow Fellow, Washington Institute for Near East Policy January 2013 It is only a matter of time before terrorists begin routinely using Twitter, Instagram, and other services in ongoing operations. We have already seen this in a limited manner from al-Shabaab, which tweets its #JihadDispatches on recent battles. But those delivery mechanisms are unlikely to replace the forums as the main environment for conversation and information distribution among jihadis. Twitter and the like provide a more public platform than a password-protected forum, but one critical utility of forums for jihadis is the ability to have relatively private conversations. Introduction More than 11 years after the attacks of 9/11 and nearly a This paper begins to fill that gap. First, it quantifies the use decade since the rise of popular online jihadi Internet of English-language jihadi forums, which rose in forums, there is strikingly little empirical research on the prominence with the emergence of American-born Sheikh manner in which jihadi activists use the Web to propagate Anwar al-Awlaki within the jihadi propaganda enterprise. their cause. Whereas researchers and policy analysts have Second, it measures the use of Twitter by online jihadis. systematically collected and analyzed the primary source This baseline is limited; it would also have been fruitful to material produced by al-Qaeda and its allies, very little work systematically assess the activity in other virtual spaces used has been done on the conduits through which that by jihadis, such as YouTube, Facebook, and Archive.org, information is distributed—and even to what extent anyone and to do so over a longer period.
    [Show full text]
  • Analysis and Evolution of the Global Jihadist Movement Propaganda
    Terrorism and Political Violence, 18:399–421, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0954-6553 print=1556-1836 online DOI: 10.1080/09546550600751990 Analysis and Evolution of the Global Jihadist Movement Propaganda MANUEL R. TORRES Department of Public Law, University Pablo Olavide, Seville, Spain JAVIER JORDA´ N Department of Political Science, University of Granada, Spain NICOLA HORSBURGH International Policy Institute King’s College, London, England The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. Keywords Al Qaeda, communication, Jihad, propaganda, terrorism Introduction Al Qaeda and the various other associated groups that form what we will here label the Global Jihadist Movement (GJM), have, as is true of any terrorist organization, a pronounced need for public communication. Violence in and of itself, despite the magnitude and spectacular levels it can reach, is never sufficient to achieve the ulti- mate aims of terrorists. Violence has as its purpose destroying that which it considers the enemy and spreading fear in the affected population. However, at the same time it is a mechanism that permits transmission of content. On said occasions this mess- age is transmitted via symbols used in communique´s or through the interpretation the population will ‘‘read into’’ the attacks themselves. Nevertheless, on most occasions this act of communication does not occur so subtly, and murder, threats, or kidnappings convert themselves into macabre remin- ders that permit the terrorist group to concentrate public opinion so its message is heard.
    [Show full text]
  • Downloading of Radical Content Does Not Only Serve to Entrench Ideologies
    1 Studying Jihadism 2 3 4 5 6 Volume 1 7 8 9 10 11 Edited by Rüdiger Lohlker 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 The volumes of this series are peer-reviewed. 37 Editorial Board: Farhad Khosrokhavar (Paris), Hans Kippenberg 38 39 (Erfurt), Alex P. Schmid (Vienna), Roberto Tottoli (Naples) 40 41 Rüdiger Lohlker (ed.) New Approaches to the Analysis of Jihadism Online and Offline With 34 figures V&R unipress Vienna University Press Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de. ISBN 978-3-89971-900-0 ISBN 978-3-86234-900-5 (E-Book) Publications of Vienna University Press are published by V&R unipress GmbH. Copyright 2012 by V&R unipress GmbH, D-37079 Goettingen All rights reserved, including those of translation into foreign languages. No part of this work may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, microfilm and recording, or by any information storage and retrieval system, without permission in writing from the publisher. Printing and binding: CPI Buch Bücher.de GmbH, Birkach Printed in Germany Contents Rüdiger Lohlker Introduction . ................................ 7 Philipp Holtmann Virtual Jihad: A Real Danger . ................... 9 Orhan Elmaz Jihadi-Salafist Creed: Abu Muhammad al-Maqdisi’s Imperatives of Faith 15 Thomas K. Gugler From Kalashnikov to Keyboard: Pakistan’s Jihadiscapes and the Transformation of Lashkar-e Tayba .
    [Show full text]
  • 1 Terrorism and the Making of the 'New Middle East'
    Terrorism and the Making of the ‘New Middle East’: New Media Strategies of Hizbollah and al Qaeda Maura Conway Introduction When US Defense Secretary Donald Rumsfeld was asked about soft power in 2003, he replied “I don’t know what it means.”1 In February 2006, in a speech at the Council on Foreign Relations in New York, however, Rumsfeld was forced to concede: Our enemies have skillfully adapted to fighting wars in today’s media age, but for the most part we, our country, our government, has not adapted. Consider that the violent extremists have established media relations committees—these are terrorists and they have media relations committees that meet and talk about strategy, not with bullets but with words. They’ve proven to be highly successful at manipulating the opinion elites of the world. They plan and design their headline-grabbing attacks using every means of communication to intimidate and break the collective will of free people…They know that communications transcend borders and that a single news story handled skillfully can be as damaging to our cause and helpful to theirs as any other method of military attack. And they’re doing it. They’re able to act quickly. They have relatively few people. They have modest resources compared to the vast and expensive bureaucracies of Western governments. Our federal government is really only beginning to adapt our operations to the 21st 1 As quoted in Joseph Nye, “Think Again: Soft Power,” Foreign Policy , vol. 26, February 2006. 1 century. For the most part, the U.S.
    [Show full text]