The Owl, Volume 1

Total Page:16

File Type:pdf, Size:1020Kb

The Owl, Volume 1 :&.&/"-2"&%"4/&95 '0353&44 5&33:3:%; Faculty Advisor: Peter Garretson1 2I¿FHRI,QWHUQDWLRQDO$IIDLUV 'HSDUWPHQWRI+LVWRU\1 'PSNBOZ"NFSJDBOT UIF6OJUFE4UBUFTXBSXJUI"M2BFEBCFHBOPO4FQUFNCFS BOEGPDVTFT POUIFNPVOUBJOTPG"GHIBOJTUBOBOE1BLJTUBO)PXFWFS JOUIFFZFTPG"M2BFEB UIFXBSBHBJOTU UIF64TUBSUFEOJOFZFBSTFBSMJFSJO:FNFO"M2BFEBIBTOFWFSMPTUTJHIUPGJUTTUSPOHDPOOFDUJPOUP :FNFOBOEUIF64IBTTMPXMZMFBSOFEBWBMVBCMFMFTTPOGSPNUIJT"M2BFEBJO:FNFOQPTTFTTFTBO FRVBM JGOPUHSFBUFS EJSFDUUISFBUUPUIF64BOEJUTBMMJFTUIBO"M2BFEBJO"GHIBOJTUBOPS1BLJTUBO DVSSFOUMZEPFTćJTQBQFSFYBNJOFTUIFSJTFBOEFWPMVUJPOPG"M2BFEBJO:FNFO4QFDJĕDBMMZ JU JOWFTUJHBUFTUIFDSVNCMJOHTPDJPFDPOPNJDBOEQPMJUJDBMDPOEJUJPOTJOTPVUI:FNFOUIBUIBWFBMMPXFE GPS"M2BFEBUPĘ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ćJTQBQFSFYBNJOFTUIFSJTFBOEFWPMVUJPOPG"M2BFEBJO:FNFO 4QFDJĕDBMMZ JUJOWFTUJHBUFTUIFDSVNCMJOHTPDJPFDPOPNJDBOEQPMJUJDBMDPO- EJUJPOTJOTPVUI:FNFOUIBUIBWFBMMPXFEGPS"M2BFEBUPĘPVSJTIUIFSF BOE SOCIAL SCIENCES SOCIAL 1JDUVSFE8JMMJBN)VETPO3PHFSTMFDUVSJOHJO QSFTFOUTQPUFOUJBMDPVOUFSUFSSPSJTN :FNFO HP CFZPOE #JO -BEFOT QFS- QPMJDJFTUIF64DBOUBLFUPVOEFS- TPOBM TFOUJNFOUBM BUUBDINFOU :F- NJOFUIFHSPVQTBCJMJUZUPGVODUJPO NFOBMTPQMBZTBOJNQPSUBOUTUSBUF- HMPCBMMZPSXJUIJO:FNFOJUTFMG HJDSPMFGPS"M2BFEB*UJTFTUJNBUFE Al-Qaeda’s ties to Yemen UIBU:FNFOJTNBLFVQUIFUIJSEMBSH- *OPSEFSUPHSBTQUIFEFFQBOE FTUDPOUJOHFOUPGBMM"M2BFEBĕHIU- MBZFSFE DPOOFDUJPO CFUXFFO "M FSTHMPCBMMZ 5PEBZ PGBMM 2BFEB BOE :FNFO JU JT OFDFTTBSZ DBQUVSFE "M2BFEB PQFSBUJWFT XIP UP ĕSTU VOEFSTUBOE UIF SPMF :FNFO BSF QSJTPOFST JO (VBOUBOBNP #BZ QMBZTUPUIFGPVOEBUJPOTPG"M2BFEB BSF:FNFOJ #PVDFL ćJTNBLFT:F- JUTFMG%FTQJUFCFJOHCPSOBOESBJTFE NFOBOBUVSBMSFTPVSDFPGQPUFOUJBM JO4BVEJ"SBCJB 0TBNB#JO-BEFOT OFXSFDSVJUTUPKPJOUIFSBOLTPG"M GBUIFSBOEBODFTUSZJT:FNFOJ GSPN 2BFEB 'VSUIFSNPSF UIJT JOEJDBUFT UIF )BESBNBXU QSPWJODF JO 4PVUI UIBU UIFSF JT B TVCTUBOUJBM DIVOL PG :FNFO *U JT B DPOOFDUJPO UIBU #JO :FNFOJ TPDJFUZ UIBU JT TZNQBUIFUJD -BEFOIBTOFWFSMPTU*OBJO- UP"M2BFEBTDBVTF UFSWJFXXJUI"M+B[FFSB XIFOBTLFE 'PS BO PSHBOJ[BUJPO UIBU UBLFT BCPVU "M2BFEBT MJOLT UP :FNFO QVCMJD QSJEF JO JUT WJDUPSJFT :FNFO #JO -BEFO SFQMJFE i*O :FNFO XF IBTDPNFUPSFQSFTFOUGPS"M2BFEB IBWF TUSPOH BOE PME MJOLT CZ UIF UIFQMBDFPGTPNFPGUIFHSPVQTFBSMJ- SOCIAL SCIENCES SOCIAL HSBDF PG HPE "MNJHIUZ CFTJEFT UIF FTUTVDDFTTFT*O "M2BFEBEFU- GBDU UIBU NZ SPPUT BOE NZ GBUIFST POBUFEBCPNCNFBOUUPLJMM64TPM- SPPUTHPCBDLUIFSFw -BXSFODF EJFSTXIPIBETUPQQFEJO"EFOPO )PXFWFS "M2BFEBT UJFT UP UIFJSXBZUP4PNBMJBXIFSFUIF64 ]5)&08- XBT MFBEJOH B NVMUJOBUJPOBM 6/ 'JHVSF TUBUJPOFE JO UIF 1PSU PG GPSDF 8IJMF OP "NFSJDBO TPMEJFST "EFO XIJDIMFęTBJMPSTEFBEćJT XFSF IVSU JO UIF BUUBDL #JO -BEFO BUUBDL NBSLFE UIF ĕSTU PG B UISFF TUJMM WJFXFE UIF BUUBDL BT B TVDDFTT TUBHFXBSJO:FNFOCFUXFFOUIF64 )JT SFBTPOJOH CFIJOE UIJT TUFNT BOE"M2BFEB (BSEOFS GSPNUIF64SFBDUJPOUPUIFBUUBDL Stage One: A New Friend In Yemen 8JUIJOEBZTPGUIFCPNCTHPJOHPČ UIF64QSFTFODFJO:FNFORVJDLMZ ćJTĕSTUTUBHFCFHBOJO0DUPCFS FWBQPSBUFE#JO-BEFOUPPLQFSTPO- XJUIUIFBUUBDLPOUIF$PMFBOE OFM QSJEF JO UIJT BOE FYQMBJOFE UP DPOUJOVFE VOUJM "DDPSEJOH UP - UIF OFXTQBQFS The Daily Pakistan (SFH+PIOTPO BOFYQFSUPO"M2BF UIBU iUIF 6OJUFE 4UBUFT XBOUFE UP EBJO:FNFO UIFTFFBSMZZFBSTPGUIF TFU VQ B NJMJUBSZ CBTF GPS 64 TPM- 64XBSPOUFSSPSBSFEFĕOFECZB EJFSTJO:FNFOTPUIBUJUDPVMETFOE IJHI DPPQFSBUJPO CFUXFFO UIF 64 GSFTIUSPPQTUP4PNBMJByUIF6OJUFE BOE:FNFO1SJPSUPUIJTBUUBDL - 4UBUFTSFDFJWFEPVSXBSOJOHBOEHBWF "M2BFEBJO:FNFOPQFSBUFEMBSHF - VQUIFJEFBPGTFUUJOHVQJUTNJMJUBSZ MZ VODIBMMFOHFE BOE XBT QSJNBS CBTFT JO :FNFO ćJT XBT UIF ĕSTU JMZBSFDSVJUJOHDFOUFSGPS"M2BFEB "M2BFEBWJDUPSZTDPSFEBHBJOTUUIF #PVDFL 'PMMPXJOHUIF$PMFBUUBDL - $SVTBEFSTw "OPOZNPVT )PX- UIF64CFHBOUPFYFSUIFBWZQSFT - FWFS "M2BFEBEJEOPUUSVMZHBJOUIF TVSFPO:FNFOJ1SFTJEFOU4BMFI 'JH BUUFOUJPOPGUIF64VOUJMXJUI VSF UPIVOUEPXOUIFQFSQFUSBUPST - JUT NVDI MBSHFS NPSF TPQIJTUJDBUFE PG UIF BUUBDL ćF :FNFOJ HPWFSO TVDDFTTGVMBUUBDLPOUIF644$PMF NFOU BSSFTUFE ĕWF NFO JODMVEJOH SOCIAL SCIENCES SOCIAL "CV+BOEBM+BOEBMXBTBO"M2BFEB BMJGFMJOFJOUIF:FNFOJFDPOPNZ*U MJFVUFOBOU BOE QFSTPOBM CPEZHVBSE JTFTUJNBUFEUIBU4BVEJ"SBCJBESPWF UP#JO-BEFO )FČFMĕOHFS ćF PVUBSPVOENJMMJPO:FNFOJXPSL- FOUJSFPSEFBMXBTBQSFWJFXPGXIBU FST ,BQJT[FXTLJ ćJTTJUVBUJPOEF- XBTUPDPNFJOUIF64:FNFOJSFMB- QSJWFE:FNFOPGTPNFCJMMJPOJO UJPOTJOEFBMJOHXJUI"M2BFEB GPSFJHO FYDIBOHF *O BEEJUJPO UIF 'PMMPXJOHUIF4FQUFNCFSth at- 4BVEJTBOETFWFSBM(VMGTUBUFTFOEFE UBDLT 4BMFIWJTJUFE8BTIJOHUPO %$ CJMMJPOJOGPSFJHOBJEUP:FNFOGPS *OBNFFUJOHXJUI1SFTJEFOU(FPSHF JUT TVQQPSU PG )VTTFJO XIP QPTFE 8#VTI 4BMFIBTTVSFE#VTIUIBUUIF B SFBM BOE JNNFEJBUF UISFBU UP UIF 64IBEUIFGVMMTVQQPSUPG:FNFO TPWFSFJHOUZPG4BVEJ"SBCJBBOEUIF ćJT XBT B TIJę JO 4BMFIT QPMJDJFT (VMG4UBUFT"TBSFTVMUPGUIFTFGPS- UIBUPęFOUVSOFEBCMJOEFZFUP"M FJHOBJEDVUTVOFNQMPZNFOUJO:F- 2BFEB'PMMPXJOHUIF4FQUFNCFS NFOSFBDIFE :FNFO$PVOUSZ BUUBDLT IPXFWFS 4BMFI EFDJEFE UP 'PMMPXJOH 4BMFIT 8BTIJOH- OPUNBLFUIFTBNFNJTUBLFIFIBEJO UPO %$ WJTJU IF CFHBO CBDLJOH UIF(VMG8BS%VSJOHUIFĕSTU IJTXPSETXJUIBDUJPOT)FIBEBOZ (VMG 8BS 4BMFI TVQQPSUFE 4BEEBN BOEBMMLOPXO"M2BFEBPQFSBUJWFT )VTTFJOćJTMFEUPUIFFYDPNNV- BOE BďMJBUFT JO :FNFO BSSFTUFE *O OJDBUJPOPG:FNFOJNJHSBOUXPSLFST BEEJUJPO 4BMFIXPSLFEDMPTFMZXJUI SOCIAL SCIENCES SOCIAL BDSPTT UIF "SBCJBO 1FOJOTVMB TQF- 64JOUFMMJHFODFPďDJBMTCZTIBSJOH DJĕDBMMZ4BVEJ"SBCJBćJTQPMJUJDBM JOGPSNBUJPOBDRVJSFEGSPNDBQUVSFE NJTDBMDVMBUJPOXBTBIFBWZMPTTGPS BOE JOUFSSPHBUFE PQFSBUJWFT ćJT :FNFO .JHSBOU XPSLFST IBE CFFO 64:FNFOJ BUUBDL PO "M2BFEB ]5)&08- JO :FNFO QJOOBDMFE JO XJUI UIJT DPOUJOVFE VOUJM %VSJOH UIF BTTBTTJOBUJPO PG "M2BFEBT UPQ UIJT HBQ QFSJPE :FNFO CFHBO UP DPNNBOEFS "CV"MJBM)BSJUIJ WJB SFTIJęJUTGPDVTBOESFTPVSDFTGSPN B 64 ESPOF BUUBDL #PVDFL )JT ĕHIUJOH "M2BFEB UP XIBU 4BMFI SFQMBDFNFOU .PIBNNFE )BNEJ EFFNFEUIFSFBMUISFBUTUPIJTHPW- BM"IEBM XBT BMTP TPPO BSSFTUFE FSONFOUB)PVUIJ3FCFMMJPOJOUIF 8JUI UIF FMJNJOBUJPO PG "M2BFEBT OPSUI #PVDFL )PVUIJTBSFB4IJ- UPQUXPDPNNBOEFSTJO:FNFO BOE JUF NJOPSJUZ GPVOE POMZ JO :FNFO JODSFBTFE JOUFMMJHFODF SFQPSUT UIBU UIFZ BSF B NJOPSJUZ JO :FNFO BOE TIPXFE UIBU UIF NBKPSJUZ PG KJIBE- NBLFDPOUJOVPVTDMBJNTPGHPWFSO- JTUJO:FNFOXFSFMFBWJOHUPĕHIUJO NFOU PQQSFTTJPO ćSPVHIPVU UIJT "GHIBOJTUBOBOE*SBRXIFSFUBOHJCMF HBQ ZFBS PG RVFMMJOH UIF SFCFMMJPO "NFSJDBO UBSHFUT XFSF MPDBUFE UIF IPXFWFS 4BMFITVČFSFETFWFSBMNB- 64BOE:FNFOJPďDJBMTDBNFUPCF- KPSTFUCBDLT MJFWFUIBUUIFXBSXJUI"M2BFEBJO *O/PWFNCFS 4BMFIWJTJUFE :FNFOXBTMBSHFMZPWFS #PVDFL 8BTIJOHUPO %$ BHBJO 4BMFI IBE Stage Two: Reversal in Fortunes CFFO FYQFDUJOH BO JODSFBTF JO BJE for Saleh GSPN#VTIJOMJHIUPGUIFTVDDFTTGVM ć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ĕSTUOBUJPOJOUIFXPSMEUPSVOPVUPG #BOLBDDSFEJUFEUIFDVUTUPSBNQBOU DMFBOESJOLJOHXBUFS #PVDFL DPSSVQUJPO JO :FNFO "EEJOH UP 4BMFI SFTQPOEFE UP UIJT MPTT PG 4BMFIT QSPCMFNT XBT B DPOUJOVJOH OBUJPOBM JODPNF CZ JNQMFNFOUJOH EFDSFBTFJOPJMSFWFOVF0JMSFWFOVF HPWFSONFOUBM CVEHFU DVUT ćFTF BDDPVOUT GPS PG :FNFOT UPUBM DVUTIBWFBOEDPOUJOVFUPDFOUFSPO HSPTTEPNFTUJDQSPEVDU (%1 BQ- UIF NJMJUBSZ BOE NPSF TQFDJĕDBMMZ QSPYJNBUFMZPGHPWFSONFOUSFW- 4PVUI:FNFOćFSFBTPOGPSUIJTJT FOVF BOENPSFUIBOPGGPSFJHO MBSHFMZCBTFEPOUIFGBDUUIBU4BMFI FYDIBOHFFBSOJOHT"DDPSEJOHUPUIF IJNTFMGJTGSPN/PSUI:FNFO1SJPS 64 &OFSHZ *OGPSNBUJPO "ENJOJT- UP UIFOBUJPOPGXIBUJTUPEBZ USBUJPOT$PVOUSZ#SJFGPO:FNFO JO :FNFOXBTUXPTFQBSBUFOBUJPOTPG PJM QSPEVDUJPO QFBLFE BU BQ- /PSUIBOE4PVUI:FNFOćFEFDJ- QSPYJNBUFMZ CC*E CBSSFMT TJPO GPS UIF UXP OBUJPOT UP VOJUF QFSEBZ "DDPSEJOHUP:FNFOT.JO- DBNFBMNPTUTPMFMZGSPNUIFEJTDPW- JTUSZPG0JMBOE.JOFSBMT PJMQSPEVD- FSZPGPJMBMPOHUIF/PSUI4PVUI#PS- UJPOJOXBTQSPKFDUFEBU EFS 4QFODFS 4BMFI ĕSFE SOCIAL SCIENCES SOCIAL CC*E $PVOUSZ ćJTOVNCFSJTFY- NBOZ4PVUI:FNFOJNJMJUBSZPďDFST QFDUFEUPDPOUJOVFEFDSFBTJOHFWFSZ BOE IBT DVU UIF QFOTJPOT PG UIPTF ZFBS BOEJOPJMQSPEVDUJPOJO XIP SFNBJO 4JODF UBLJOH PďDF JO :FNFO JT FYQFDUFE UP CF OP MPOHFS 4BMFIIBTEJWFSUFEUIFNBKPSJUZ ]5)&08- PG QSPĕUT BXBZ GSPN UIF TPVUI BOE SFWJUBMJ[JOH "M2BFEB PQFSBUJPOT JO UPXBSETUIFDBQJUPMJOUIF/PSUI*O :FNFO #PVDFL) .BOZ PG UIF FT- BOJOUFSWJFXXJUIUIFChristian Sci- DBQFFT IBE DMPTF UJFT UP #JO -BEFO ence Monitor B GPSNFS DPMPOFM JO IJNTFMGBOEXFSFFYQFSJFODFEĕHIU- UIF :FNFOJ BSNZ UPME UIF SFQPSUFS FSTGSPN"GHIBOJTUBO.PSFJNQPS- i.PTU PG XIBU XF IBWF JT XIBU UIF UBOUMZ IPXFWFS UIJT OFX HSPVQ PG #SJUJTI CVJMU XIFO UIFZ XFSF IFSF DPNNBOEFST IBT CSPVHIU XJUI JU B 8F IBWFOU HBJOFE BOZUIJOH GSPN OFXJEFPMPHZ QFSUBJOJOHUPIPX"M VOJĕDBUJPO*XPVMESBUIFSIBWFIBE 2BFEBTIPVMECFPSHBOJ[FEBOEDPO- UIF#SJUJTIIFSFGPSZFBSTUIBOCF EVDUJUTPQFSBUJPOT SVMFECZ4BMFIw )PSUPO ćF QSFWJPVT "M2BFEB MFBE- Stage Three: The Resurgence of FST JO :FNFO IBE CFFO PSHBOJ[FE Al-Qaeda JO B UPQEPXO DPSQPSBUFUIFNFE ćFUIJSETUBHFJOUIFĕHIUXJUI
Recommended publications
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • How Anwar Al-Awlaki Became the Face of Western Jihad
    As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and
    [Show full text]
  • Counter-Terrorism Reference Curriculum
    COUNTER-TERRORISM REFERENCE CURRICULUM CTRC Academic Project Leads & Editors Dr. Sajjan M. Gohel, International Security Director Asia Pacific Foundation Visiting Teacher, London School of Economics & Political Science [email protected] & [email protected] Dr. Peter Forster, Associate Professor Penn State University [email protected] PfPC Reference Curriculum Lead Editors: Dr. David C. Emelifeonwu Senior Staff Officer, Educational Engagements Canadian Defence Academy Associate Professor Royal Military College of Canada Department of National Defence [email protected] Dr. Gary Rauchfuss Director, Records Management Training Program National Archives and Records Administration [email protected] Layout Coordinator / Distribution: Gabriella Lurwig-Gendarme NATO International Staff [email protected] Graphics & Printing — ISBN XXXX 2010-19 NATO COUNTER-TERRORISM REFERENCE CURRICULUM Published May 2020 2 FOREWORD “With guns you can kill terrorists, with education you can kill terrorism.” — Malala Yousafzai, Pakistani activist for female education and Nobel Prize laureate NATO’s counter-terrorism efforts have been at the forefront of three consecutive NATO Summits, including the recent 2019 Leaders’ Meeting in London, with the clear political imperative for the Alliance to address a persistent global threat that knows no border, nationality or religion. NATO’s determination and solidarity in fighting the evolving challenge posed by terrorism has constantly increased since the Alliance invoked its collective defence clause for the first time in response to the terrorist attacks of 11 September 2001 on the United States of America. NATO has gained much experience in countering terrorism from its missions and operations. However, NATO cannot defeat terrorism on its own. Fortunately, we do not stand alone.
    [Show full text]
  • Building a Global Terrorism Database
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Building a Global Terrorism Database Author(s): Gary LaFree ; Laura Dugan ; Heather V. Fogg ; Jeffrey Scott Document No.: 214260 Date Received: May 2006 Award Number: 2002-DT-CX-0001 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. BUILDING A GLOBAL TERRORISM DATABASE Dr. Gary LaFree Dr. Laura Dugan Heather V. Fogg Jeffrey Scott University of Maryland April 27, 2006 This project was supported by Grant No. 2002-DT-CX-0001 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Excutive Summary.................................................................................................. 1 Building a Global Terrorism Database ................................................................... 4 The Original PGIS Database.......................................................................... 6 Methods..................................................................................................................
    [Show full text]
  • Terrorism and Ideology: Cracking the Nut by Donald Holbrook and John Horgan
    PERSPECTIVES ON TERRORISM Volume 13, Issue 6 Terrorism and Ideology: Cracking the Nut by Donald Holbrook and John Horgan Abstract An enduring bugbear in the study of terrorism is conceptualizing the role ideology plays for individuals involved in such activities. Explanations range from presenting ideology as a key determinant to those who argue that it is often barely relevant at all. In this article we seek to reconcile competing notions of ideology in the emergence of terrorism by making the case for a non-binary conceptualization of ideology. Our approach here emphasizes interpretations of social identity over depictions of the doctrinal. We divide key concerns about ideology in individual processes to terrorism into three related arguments: ‘cognition’, ‘causation’ and ‘exposure’ and explore how these can be reconciled. This more nuanced conceptual understanding of ideology in processes leading to terrorism, we suggest, will aid our analysis of terrorism and the way in which we may approach ideological variables in its context. Keywords: terrorism, ideology, cognition, belief, violence. Introduction The question ‘what causes terrorism?’ is perhaps both the most frequent and inevitable response to violent extremist events today. Though the search for satisfactory answers continues to elude even the most dedicated researchers, one common assumption centers around the role of ideology. That is to say, despite not necessarily knowing much about the precise mechanisms involved, we might safely assume that when it comes to explaining terrorism (as opposed to other kinds of illicit violent activities), that ideology plays at least some role in the development of violent extremist activity. However, there is no consensus in discussions about terrorism of what the role of ideology in these processes may look like.
    [Show full text]
  • National Strategy for Countering Domestic Terrorism
    NATIONAL STRATEGY FOR COUNTERING DOMESTIC TERRORISM JUNE2021 NATIONAL SEC COUNCIL THEWHITEHOUSE WASHINGTON Too often over the past several years , American communities have felt the wrenching pain of domestic terrorism . Black church members slaughtered during their bible study in Charleston . A synagogue in Pittsburgh targeted for supporting immigrants . A gunman spraying bullets at an El Paso Walmart to target Latinos. It goes against everything our country strives to stand for in the world , and it poses a direct challenge to America's national security, our democracy, and our national unity. This National Strategy for Countering Domestic Terrorism lays out a comprehensive approach to addressing the threat while safeguarding bedrock American civil rights and civil liberties values that makeuswho we are as a nation. Americans hold a wide array ofbeliefs. That is partofwhat makes the United States such a diverse and extraordinary nation. Preservingandsafeguarding constitutionallyprotectedexpression andfreedom of association are national security priorities. Our rights and our historic liberties are an intrinsic part ofwhat makesAmerica strong. So this Strategy is narrowlytailoredto focus specifically on addressing violence and the factors that lead to violence violence that violates the law , PLURIBUS UNUM threatens public safety , and infringes on the free expression of ideas. We cannot ignore this threat or wish it away . Preventing domestic terrorism and reducing the factors that fuel it demand a multifaceted response across THIS IS A the Federal Government and beyond. That includes PROJECT THAT SHOULD working with our critical partners in state, local, tribal, UNITE ALL and territorial governments and incivil society, the private sector, academia , and local communities , as well AMERICANS as with our allies and foreign partners .
    [Show full text]
  • Sovereign Immunity and Jus Cogens: Is There a Terrorism Exception for Conduct-Based Immunity?
    Sovereign Immunity and Jus Cogens: Is There A Terrorism Exception for Conduct-Based Immunity? SOFIE G. SYED* This Note addresses the implications of jus cogens for sovereign immunity, in particular regarding the act of supporting terrorism. Jus cogens norms are peremptory norms of international law — fundamental principles which cannot be abrogated by international agreement, judicial opinion or custom. Terrorism might be considered the type of violation of interna- tional law that falls outside existing immunity protections, under a fidu- ciary theory of jus cogens and a definition of terrorism that takes its cen- tral feature as violence that targets citizens in an attempt to dissuade them from exercising their lawful rights. However, because international actors have not reached a consensus on a workable definition of either jus cogens or terrorism, it is unlikely courts will adopt this approach. This Note con- siders alternative approaches to enable suits to go forward against indi- vidual officials who allegedly sponsored terrorism, including an addition to the statutory tort scheme. I. INTRODUCTION On November 26, 2008, members of the terrorist group Lash- kar-e-Taiba carried out a series of coordinated attacks throughout Mumbai, India’s highly populated financial capital. Armed with guns and explosives, ten men targeted the Taj Mahal and Oberoi luxury hotels, the Chhatrapati Shivaji train station, Leopold’s restaurant, the Nariman House Jewish center, and the Cama and * Digital Editor, Colum. J.L. & Soc. Probs.; Executive Editor, The Common Law 2014–2015. J.D. Candidate 2015, Columbia Law School. The author would like to thank Professor Gillian Metzger for her guidance, and the Journal staff for their hard work on this piece.
    [Show full text]
  • The "Home Game": Countering Violent Extremism Within NATO
    Research Paper Research Division – NATO Defense College, Rome – No. 104 – September 2014 The “Home Game” Countering Violent Extremism within NATO by Jacqueline Page1 “NATO’s role, which is to provide security to its member countries, includes responding to the threat of homegrown terrorism that relies on radicalized individuals.”2 The Research Division (RD) of the NATO De- fense College provides NATO’s senior leaders with sound and timely analyses and recommendations on current issues of particular concern for the Al- As the complex global security environment faced by NATO members liance. Papers produced by the Research Division convey NATO’s positions to the wider audience continues to evolve in the coming years, terrorism – waged by actors of the international strategic community and con- tribute to strengthening the Transatlantic Link. both in and outside of their borders – will remain a vexing challenge. The RD’s civil and military researchers come from For over a decade, NATO’s counterterrorism strategy has been built a variety of disciplines and interests covering a on taking the fight abroad. Member nations have been intimately broad spectrum of security-related issues. They conduct research on topics which are of interest to involved in this effort as contributors to the International Security the political and military decision-making bodies of the Alliance and its member states. Assistance Force (ISAF) in Afghanistan, to the Multi-National Force in Iraq and in a variety of smaller missions around the globe. In recent The opinions expressed are those of the authors and do not necessarily reflect the opinions of the times, however, there has been growing attention to the threat posed North Atlantic Treaty Organization or the NATO Defense College.
    [Show full text]
  • A Case Study of Post Saddam-Hussein Iraq Kellie Rourke Walden University
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2017 Resisting Democratic Transition Through Terrorism: A Case Study of Post Saddam-Hussein Iraq Kellie Rourke Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Kellie Rourke has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Joyce Haines, Committee Chairperson, Public Policy and Administration Faculty Dr. Kevin Fandl, Committee Member, Public Policy and Administration Faculty Dr. Morris Bidjerano, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract Resisting Democratic Transition Through Terrorism: Case Study of Post-Saddam Hussein Iraq by Kellie S. Rourke MPA, Troy University, 2004 BS, Austin Peay State University, 1998 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University March 2017 Abstract Democracy building operations in foreign nations in Iraq and Afghanistan have been met with resistance and at great cost in terms of dollars and lives. Reducing these costs requires understanding why individuals choose to resist the transition to democracy, yet current research in the field does not address the issues of a previously nonviolent population turning to terrorism to resist transition to democracy.
    [Show full text]
  • How Terrorism Affects Oil Rents
    OIL & TERRORISM: HOW TERRORISM AFFECTS OIL RENTS DILLON F. FARRELL A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE RIDGE COLLEGE OF INTELLIGENCE STUDIES AND APPLIED SCIENCES MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA MAY 2016 RIDGE COLLEGE OF INTELLIGENCE STUDIES AND APPLIED SCIENCES MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA OIL & TERRORISM: HOW TERRORISM AFFECTS OIL RENTS A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: Dillon F. Farrell Certificate of Approval: ___________________________________ Orlandrew Danzell, Ph.D. Assistant Professor Ridge College of Intelligence Studies and Applied Sciences ___________________________________ Dawn Wozneak, Ph.D. Assistant Professor Ridge College of Intelligence Studies and Applied Sciences ___________________________________ David J. Dausey, Ph.D. Provost and Vice President for Academic Affairs Mercyhurst University May 2016 Copyright © 2016 by Dillon F. Farrell All rights reserved. iii DEDICATION I would like to dedicate this thesis to my family, for all their love and support throughout my life. I would also like to especially note my father, who has always been a strong proponent of graduate school and the lessons learned there. iv ACKNOWLEDGEMENTS I would like to acknowledge my advisor for this thesis endeavor, Dr. Orlandrew Danzell. He has been a tremendous teacher and mentor for me and has expanded my knowledge and understanding of terrorism and national security. I would also like to acknowledge Dr. Dawn Wozneak. She has been great for assisting me in structuring my thesis and assisting any questions I have in my time as a graduate student at Mercyhurst.
    [Show full text]