Terrorism and Globalization Or the Nature of the Struggle

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and Globalization Or the Nature of the Struggle - - - Te rrorism and globalization JAM ES D. Kl RAS • Introduction 358 • Definitions 358 • Te rrorism: from transnational to global phenomenon (1968-2001) 360 • Te rrorism: the impact of globalization 361 • Globalization, technology, and terrorism 364 • Combating terrorism 368 • Conclusion 370 Reader's Guide cultural, economic, and religious terms linked to glo­ balization. However, such terms are not sufficient to Globalization has contributed to the growth of terror­ explain the relationship. Technology associated with ism from a regional phenomenon into a global one. globalization has enabled terrorist groups to conduct Precisely how it has contributed, however, is hard to operations that are more deadly, distributed, and diffi­ determine. The difficulty lies in the complex nature cult to combat than in the past. Technological advan­ of terrorism and disagreements on what constitutes tage is not one-sided and states can use technology to globalization. Global terrorism has been explained in diminish the global impact of terrorism. JAMES D. KIRAS Introduction The relationship between terrorism and globalization or the nature of the struggle. Terrorism is a weapon is difficult to describe accurately. Each phenomenon of the weak, conducted by a minority who promote is complicated and defies simple characterization. It is an extremist ideology-it often fails to create political inaccurate to suggest that globalization is responsible change. Theglobal community is not powerless in the forterrorism, but technologies associated with global­ face of such violence. In order to succeed, the global ization have been exploited by terrorists. In particu­ community must utilize the resources at its disposal lar, technologies have increased the ability of terrorist collaboratively, in a way that is consistent with inter­ groups to work together, share information, and reach national law and human rights, to diminish support for out to previously unavailable audiences. Technology terrorism and demonstrate the illegitimacy of terrorist cannot change the character of the terrorist message messages and aspirations. · ·- · · · Definitions Terrorism and globalization share at least one thing methods is the foremost reason for disagreement (see in common-both are complex phenomena open to Box 23.2). Some view terrorist acts as legitimate only if subjective interpretation. Definitions of terrorism vary they meet the criteria associated with revisionist inter­ widely but all start froma common point of departure. pretations of 'just war' tradition, which focus on the Terrorism is characterized, first and foremost, by the actions of individuals. Thesecriteria, which apply to all use ofviolence. Thistactic of violence takes many forms applications of force, have been expanded to include a and oftenindiscrimi nately targets non-combatants. The just cause, proportional use of violence, and the use of purpose forwhich violence is used, and its root causes, force as a last resort. Realists suggest that the political is where most of the disagreements about terrorism violence used by terrorist groups is illegitimate on the begin. Historically, the term 'terrorism' described state basis that states alone have a monopoly on the legiti­ violence against citizens during the French Revolution. mate use of physical force. Over the past half-century, however, terrorism has come to mean the use of violence by small groups aim­ Box 23.1 Types of terrorist groups ing to achieve political change. Terrorism differs from ... criminal violence in its degree of political legitimacy. Audrey Kurth Cronin has outlined d ifferenttypes of terrorist Thosesympathetic to terrorist causes suggest that vio­ groups and their historical importance in thefollowi ng way : lence is the only remaining option that can draw atten­ tion to the plight of the aggrieved. Such causes have 'There are fourty pes of terrorist organizations currently included ideological, ethnic, and religious exclusion or operating around the world, categorized mainly by their source of motivation: left-wing terrorists, right-wing persecution. terrorists, ethnonationalist/separatist terrorists, and reli­ Defining terrorism can be difficult as groups often gious or 'sacred' terrorists. All fourtypes have enjoyed espouse multiple grievances and compete with one periods of relative prominence in the modern era, with another for resources and support. In addition, the left-wing terrorism intertwined with the Communist relative importance of these grievances within groups movement, right-wing terrorism drawing its inspiration from Fascism, and the bulk of ethnonationalist/separa­ can change over time (see Box 23.1). Those targeted tist terrorism accompanying the wave of decolonization by terrorists are less inclined to see any justification, especially in the immediate post-World War II years. much less legitimacy, behind attacks that are designed Currently, "sacred" terrorism is becoming more significant to spread fe ar by killing and maiming civilians. As a ...many groups have a mix of motivating ideologies­ result, the term 'terrorist' has a pejorative value that is some ethnonationalist groups, forexam ple, have religious usefulin delegitimizing those who commit such acts. characteristics or agendas-but usually one ideology or motivation dominates.' Reaching consensus on what constitutes terror­ (Cronin 2002/3:39) ism is difficult. The legitimacy of terrorist means and Chapter 23 Terrorism and globalization Terrorist groups risk fadingin to obscurity if they do Box 23.2 Legitimacy not cow the public or conduct newsworthy attacks. Martha Crenshaw provides an approach to determine the However, attacks by terrorists that are so horrific, legitimacy of acts ofterror ism: such as publicized beheadings in Taliban-controlled parts of western frontier Pakistan, puts support for 'The value of the normative approach (to terrorism) is that terrorist causes at risk. Thereforeterrorism is defined it confronts squarely a critical problem in the analysis of here as 'the use of violence by sub-state groups to terrorism, and indeed any form of political violence: the issue of legitimacy ...the need forscholarly objectivity inspire fe ar, by attacking civilians and/or symbolic and abstraction does not excuse us from the obligation targets, for purposes such as drawing widespread to judge the morality of the use of force, whether by the attention to a grievance, provoking a severe response, state or against ...Te rrorism must not, as the terrorists or wearing down their opponent's moral resolve, to can foresee, result in worse injustice than the condition effect political change'. the terrorists oppose ...The targets of terrorism are mor­ ally significant; witness the difference between material As with definitions of terrorism, there is general objects and human casualties.' agreement on at least one aspect of globalization. (Crenshaw 1983: 2-4) Technologies allow the transfer of goods, services, and information almost anywhere quickly and efficiently. In the case of information, the transfer can be secure As with other forms of irregular warfare,terrorism and is nearly instantaneous. The extent of social, cul­ is designed to achieve political change for the pur­ tural, and political change brought on by globalization, poses of obtaining power in order to right a perceived including increasing interconnectedness and homoge­ wrong. Terrorism, however, is the weakest form of neity in the international system, remain the subject irregular warfare with which to alter the political of much disagreement and debate, as other chapters landscape. The reasonfor this weakness is that terror­ in this volume have outlined. These disagreements, in ist groups rarely possess the broader support of the turn, influence discussion of the extent to which global­ population that characterizes insurgency and revolu­ ization has contributed to the rise of modern terrorism. tion. Terrorist groups often lack broader support for There is little doubt that the technologies associated their objectives because their goals for change are with globalization have been used to improve the effec­ based on radical ideas that do not have widespread tiveness and reach of terrorist groups. Therelat ionship appeal. In order to influence change, terrorists must between globalization and terrorism is best understood provoke drastic responses that act as a catalyst for as the next step in the evolution of political violence change or weaken their opponent's moral resolve. In a since terrorism became a transnational phenomenon few cases, terrorist acts have achieved relatively rapid in the 1960s. change. Thebo mbings in Madrid in 2004, forexa m­ ple, influenced the outcome of elections in Spain in Key Points a dramatic fashion, and anecdotal evidence suggests that the attack was designed with just this purpose in • Agreement on what constitutes terrorism continues to be mind. Many terrorist leaders hope that their actions difficult given the range of potential acts involving will lead to disproportionate reactions by a state, violence. which in turn disaffects public or international opin­ • Terrorism, or acts of violence by sub-state groups, has ion and increases support fortheir cause. Other lead­ been separated from criminal acts on the basis of the purpose forwhich violence is applied, namely political ers using acts of terrorism seek immediate impact, change. to demonstrate the weakness of their opponent, and • Te rrorist groups succeed when their motivations
Recommended publications
  • In Their Own Words: Voices of Jihad
    THE ARTS This PDF document was made available from www.rand.org as CHILD POLICY a public service of the RAND Corporation. CIVIL JUSTICE EDUCATION Jump down to document ENERGY AND ENVIRONMENT 6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit research NATIONAL SECURITY POPULATION AND AGING organization providing objective analysis and PUBLIC SAFETY effective solutions that address the challenges facing SCIENCE AND TECHNOLOGY the public and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY Support RAND TRANSPORTATION AND INFRASTRUCTURE Purchase this document WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity. in their own words Voices of Jihad compilation and commentary David Aaron Approved for public release; distribution unlimited C O R P O R A T I O N This book results from the RAND Corporation's continuing program of self-initiated research.
    [Show full text]
  • TO: Usama Bin Ladin FROM: Abu Musab Al-Suri [Mustafa Setmariam
    TO: Usama bin Ladin FROM: Abu Musab al-Suri [Mustafa Setmariam Nasar] and Abu Khalid al-Suri [Muhammad al-Bahaya] VIA: Ayman al-Zawahiri FOLDER: Incoming Mail—From Afghanistan DATE: July 19, 1999 Noble brother Abu Abdullah [Bin Ladin], Peace upon you, and God’s mercy and blessings. This message [concerns] the problem between you and al-Amir al-Mu’mineen [the Commander of the Faithful, i.e. Taliban leader Muhammad Umar] … The results of this crisis can be felt even here in Kabul and other places. Talk about closing down the camps has spread. Discontent with the Arabs has become clear. Whispers between the Taliban with some of our non-Arab brothers has become customary. In short, our brother Abu Abdullah’s latest troublemaking with the Taliban and the Commander of the Faithful jeopardizes the Arabs, and the Arab presence, today in all of Afghanistan, for no good reason. It provides a ripe opportunity for all adversaries, including America, the West, the Jews, Saudi Arabia, Pakistan, the Mas’ud-Dostum [Northern] Alliance, etc., to serve the Arabs a blow that could end up causing their most faithful allies to kick them out … Our brother [Bin Ladin] will help our enemies reach their goal free of charge! … The strangest thing I have heard so far is Abu Abdullah’s saying that he wouldn’t listen to the Commander of the Faithful when he asked him to stop giving interviews … I think our brother [Bin Ladin] has caught the disease of screens, flashes, fans, and applause … The only solution out of this dilemma is what a number of knowledgeable and experienced people have agreed upon … Abu Abdullah should go to the Commander of the Faithful with some of his brothers and tell them that … the Commander of the Faithful was right when he asked you to refrain from interviews, announcements, and media encounters, and that you will help the Taliban as much as you can in their battle, until they achieve control over Afghanistan.
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman Et Al.; Translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016
    1 The Hashemite Kingdom of Jordan The Deposit Number at the National Library (2016/11/5076) 320 Abu Rumman, Mohammad Suliman et al. Methods of Preventing and Combatting Terrorism in the MENA Region and the West/ Mohammad Suleiman Abu Rumman et al.; translated by Banan Fathi Malkawi.– Amman: Friedrich-Ebert-Stiftung, 2016 (207) p. Deposit No.: 2016/11/5076 Descriptors: / Terrorism// Arab Countries/ ﯾﺘﺤﻤﻞ اﻟﻤﺆﻟﻒ ﻛﺎﻣﻞ اﻟﻤﺴﺆوﻟﯿﺔ اﻟﻘﺎﻧﻮﻧﯿﺔ ﻋﻦ ﻣﺤﺘﻮى ﻣﺼﻨﻔﮫ وﻻ ﯾﻌﺒّﺮ ھﺬا اﻟﻤﺼﻨﻒ ﻋﻦ رأي داﺋﺮة اﻟﻤﻜﺘﺒﺔ اﻟﻮطﻨﯿﺔ أو أي ﺟﮭﺔ ﺣﻜﻮﻣﯿﺔ أﺧﺮى. Published in 2016 by Friedrich-Ebert-Stiftung Jordan and Iraq FES Jordan & Iraq P.O. Box 941876 11194 Amman Jordan Email: [email protected] Website: www.fes-jordan.org © FES Jordan & Iraq All rights reserved. No part of this publication may be reprinted, reproduced, or utilized in any form or by any means without prior written permission from the publishers. The views and opinions expressed in this publication are solely those of the original authors. They do not necessarily represent those of the Friedrich- Ebert-Stiftung or the editors. Translation: Banan Malkawi, Samira Kawar Editing: Banan Malkawi, EVS Translations, Anja Wehler-Schoeck Cover: Mu'ath Iseid Printing: Economic Press ISBN: 978-9957-484-71-2 2 Methods of Preventing and Combatting Terrorism in the MENA Region and in the West 3 4 Table of Contents Anja Wehler-Schoeck Foreword: Agree to Disagree? International Efforts in Preventing and Combatting Terrorism .................................................................................................................... 7 Mohammad Abu Rumman Counter-Terrorism Efforts: The Dialectic of Inputs and Outputs ................................ 9 Hassan Abu Hanieh Approaches to the War on Terrorism: Examples of Efforts to Eradicate Extremism ........................................................................................................................................
    [Show full text]
  • Islamic State Vs. Al-Qaeda
    NEW INTERNATIONAL AMERICA SECURITY DAVEED GARTENSTEIN-ROSS, JASON FRITZ, BRIDGET MORENG AND NATHANIEL BARR ISLAMIC STATE VS. AL-QAEDA STRATEGIC DIMENSIONS OF A PATRICIDAL CONFLICT DECEMBER 2015 About the Authors Daveed Gartenstein-Ross’s academic Nathaniel Barr is an analyst at Valens and professional work has focused on Global whose work focuses on violent non- understanding the evolving role of violent state actors in North Africa, the Sahel, and non-state actors in the world, with a the Horn of Africa. Barr has co-authored concentration in al-Qaeda and the Islamic four monographs, including a report State. He is a senior fellow at the Foundation for Defense examining the Islamic State’s propaganda strategy, and of Democracies and the chief executive officer of the has been published in Foreign Affairs, Foreign Policy, and consulting firm Valens Global. An adjunct professor Jamestown Foundation’s Militant Leadership Monitor. at Georgetown University and lecturer at the Catholic Before coming to Valens Global, Barr worked as a research University of America, Gartenstein-Ross is the author assistant with the Western Jihadism Project, a research or volume editor of nineteen books and monographs, project funded by the National Institute of Justice that including Bin Laden’s Legacy, which Georgetown explores radicalization and salafi jihadist networks in the University terrorism scholar Bruce Hoffman described West. Barr received his bachelor’s degree from Brandeis as “one of the few books to probe systematically [al- University. Qaeda’s] strategy and its effect on the U.S. and its allies.” Gartenstein-Ross has also been published widely in the academic and popular press, including in The New Jason Fritz is a senior researcher at York Times, The Washington Post, The Atlantic, Foreign Valens Global and a doctoral student in the Policy, and the peer-reviewed journals Studies in Conflict Department of Justice, Law and Criminology and Terrorism and Terrorism and Political Violence.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • Exhibits Attached to Arguments on Admissibility, Declaration of Mohammed Abdullah Saleh Al-Asad, and Declaration of Zahra Ahmed Mohamed
    BEFORE THE AFRICAN COMMISSION FOR HUMAN & PEOPLES’ RIGHTS 49th ORDINARY SESSION: APRIL-MAY 2011 COMMUNICATION NO. 383/2010 In the matter between: MOHAMMED ABDULLAH SALEH AL-ASAD and DJIBOUTI EXHIBITS ATTACHED TO ARGUMENTS ON ADMISSIBILITY, DECLARATION OF MOHAMMED ABDULLAH SALEH AL-ASAD, AND DECLARATION OF ZAHRA AHMED MOHAMED EXHIBITS The United Republic of Tanzania Departure Declaration Card, 27 December 2003…….A Center for Human Rights and Global Justice, On the Record: U.S. Disclosures on Rendition, Secret Detention, and Coercive Interrogation (New York: NYU School of Law, 2008)………………………………………………………………………………..B Letter to the Attorney General of Djibouti, 31 March 2009…….….…..…….…….….…C United Nations Human Rights Council, 13th Session, Joint Study on Global Practices in Relation to Secret Detention in the Context of Countering Terrorism, U.N. Doc. A/HRC/13/42 (19 February 2010)………………………………………………………. D Republic v. Director of Immigration Services, ex parte Mohammed al-Asad (Habeas Corpus petition), High Court of Tanzania, 17 June 2004………………………………...E Amnesty International, United States of America: Below the radar- Secret flights to torture and ‘disappearance,’ 5 April 2006……………………………………………….F Prepared Remarks of Treasury Secretary John Snow to Announce Joint U.S. and Saudi Action Against Four Branches of Al-Haramain in the Financial War on Terror, JS-1107, 22 January 2004…………………………………………………………………………..G Henry Lyimo, Guardian (Dar es Salaam), Yemenis, Italians Expelled, 30 December 2003…………………………………………………………………………………...….H Roderick Ndomba, Daily News (Dar es Salaam), Dar Deports 2,367 Aliens, 30 December 2003……...……………………………..………………………………………………….I International Committee of the Red Cross, ICRC Report on the Treatment of Fourteen “High Value Detainees” in CIA Custody, 2007…………………………..……….……...J International Seismological Centre Earthquake Data…………………………………….K U.S.
    [Show full text]
  • Assessing the Threat to the Homeland from Al-Qaeda Operations in Iran and Syria Hearing Subcommittee on Counterterrorism And
    ASSESSING THE THREAT TO THE HOMELAND FROM AL-QAEDA OPERATIONS IN IRAN AND SYRIA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION MAY 22, 2013 Serial No. 113–19 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–684 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania VACANCY GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T.
    [Show full text]
  • The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015 Author(s): Jytte Klausen Document Number: 250416 Date Received: November 2016 Award Number: 2012-ZA-BX-0006 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. FINAL REPORT The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015. Principal Investigator: Jytte Klausen, Brandeis University. June 2016. This project was supported by Award No. 2012-ZA-BX-0006, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this report are those of the author and do not necessarily reflect those of the U.S. Department of Justice. This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice Contents EXECUTIVE SUMMARY ........................................................................................................... I 1. INTRODUCTION....................................................................................................................
    [Show full text]
  • Harmony and Disharmony: Exploiting Al-Qa'ida's Organizational
    Harmony and Disharmony Exploiting al-Qa’ida’s Organizational Vulnerabilities February 14, 2006 Combating Terrorism Center Department of Social Sciences United States Military Academy 1 Executive Summary This study, conducted by the faculty and research fellows of the Combating Terrorism Center (CTC) at West Point, serves multiple purposes, the most important of which is contributing to the depth of knowledge about the al-Qa’ida movement. Evidence supporting the conclusions and recommendations provided in this report is drawn from a collection of newly-released al-Qa’ida documents captured during recent operations in support of the Global War on Terror and maintained in the Department of Defense’s Harmony database. In the text of these documents, readers will see how explicit al-Qa’ida has been in its internal discussions covering a range of organizational issues, particularly regarding the internal structure and functioning of the movement as well as with tensions that emerged within the leadership. In the first part of the report, we provide a theoretical framework, drawing on scholarly approaches including organization and agency theory, to predict where we should expect terrorist groups to face their greatest challenges in conducting operations. The framework is informed as much as possible by the captured documents, and provides a foundation upon which scholars can build as more of these documents are declassified and released to the public. Our analysis stresses that, by their nature, terrorist organizations such as al-Qa’ida face difficulties in almost any operational environment, particularly in terms of maintaining situational awareness, controlling the use of violence to achieve specified political ends, and of course, preventing local authorities from degrading the group’s capabilities.
    [Show full text]
  • CRO Feb08.Qxp
    February 2008 ARE SANCTIONS LISTS ENOUGH? Are Compliance Professionals Developing a False Sense of Security? John Solomon and Jay Jhaveri The international financial (OFAC), the UK’s HM Treasury keeping their institutions safe community now stands on the (formerly the Bank of England from terrorist financing when, in frontlines in the war against issued sanctions), and the fact, they are nearly flying blind. terrorists and their supporters. European Union (EU) are the four Too often, the official sanctions Efforts to counter the financing of most authoritative sanctions only identify a sole terrorist leader terrorism centres on an issuing bodies. Taken together, or only a terrorist movement’s international regulatory the four most authoritative paramilitary apparatus when these framework have grown to reflect terrorism sanctions bodies list organisations actually comprise the intensified terrorist threat in 845 unique terrorism related vast global networks of people, the post-9/11 era. Compliance entries. World-Check, a political organisations, and with official blacklists of comprehensive ‘know your charitable and business fronts. designated terrorist individuals customer’ (KYC) database that and entities has become the monitors terrorist networks For a more detailed illustration, principal mechanism used to globally, by contrast, contains this report will drill down into only safeguard the global financial over 25,200 unique terrorism eight of the most dangerous system from the risks of terrorist related entries. In other words, terrorist
    [Show full text]