Center on Terrorism, Extremism, and Counterterrorism

Total Page:16

File Type:pdf, Size:1020Kb

Center on Terrorism, Extremism, and Counterterrorism Center on Terrorism, Extremism, and Counterterrorism www.middlebury.edu/institute/academics/centers-initiatives/ctec The Center on Terrorism, Extremism, and Counterterrorism (CTEC) conducts in- depth research on terrorism and other forms of extremism. Formerly known as the Monterey Terrorism Research and Education Program, CTEC collaborates with world-renowned faculty and their graduate students in the Middlebury Institute’s Nonproliferation and Terrorism Studies degree program. CTEC’s research informs private, government, and multilateral institutional understanding of and responses to terrorism threats. Middlebury Institute for International Studies at Monterey www.miis.edu The Middlebury Institute for International Studies at Monterey provides international professional education in areas of critical importance to a rapidly changing global community, including international policy and management, translation and interpretation, language teaching, sustainable development, and nonproliferation. We prepare students from all over the world to make a meaningful impact in their chosen fields through degree programs characterized by immersive and collaborative learning, and opportunities to acquire and apply practical professional skills. Our students are emerging leaders capable of bridging cultural, organizational, and language divides to produce sustainable, equitable solutions to a variety of global challenges. Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies 460 Pierce Street Monterey, CA 93940, USA Tel: +1 (831) 647-4634 The views, judgments, and conclusions in this report are the sole representations of the authors and do not necessarily represent either the official position or policy or bear the endorsement of CTEC or the Middlebury Institute of International Studies at Monterey. © The President and Trustees of Middlebury College, 2019 ASSESSING THE RISK OF ISLAMIST TERRORISTS USING HUMAN VECTORS TO DEPLOY CONTAGIOUS PATHOGENS Jeffrey M. Bale Middlebury Institute of International Studies at Monterey Noreen A. Hynes Johns Hopkins University School of Medicine Thomas J. Reidy Independent Forensic Psychologist 3 DEDICATION The authors would like to respectfully dedicate this study to Dr. Raymond A. Zilinskas, our friend and colleague at the Middlebury Institute of International Studies who both initiated the project and obtained the funding. Sadly, he died suddenly and preMaturely shortly after the project received funding. Rest in peace, Ray. TABLE OF CONTENTS I. Introduction: Motivational Factors in CheMical, Biological, Radiological, and Nuclear (CBRN) TerrorisM Threat AssessMent Jeffrey M. Bale Pages 6-57 II. Jihadist Ideological Motivations for Martyrdom, Mass Destruction, and BioterrorisM Jeffrey M. Bale Pages 58-186 III. Psychological and Social-Psychological Factors Relevant to Threat AssessMents of IslaMist Human Vector BioterrorisM Attacks Thomas J. Reidy Pages 187-250 IV. Technical Factors in Assessing the Threat of IslaMist Bioterrorist Attacks Using Human Vectors of Contagious Pathogens Noreen A. Hynes Pages 251-273 V. SumMary and Conclusions Pages 274-283 5 INTRODUCTION: MOTIVATIONAL FACTORS IN CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) TERRORISM THREAT ASSESSMENT Jeffrey M. Bale . There is a now large and ever-growing scholarly and popular literature on the subject of “WMD terrorisM.” However, one of the peculiarities of the existing literature on that subject is the disparity between the relatively sMall aMount of attention paid to terrorist Motivations, on the one hand, and, on the other, the relatively large aMount of attention paid both to a) preventing nefarious actors from getting their hands on CBRN Materials, and b) the technical capabilities of terrorists.1 A good deal of valuable research has been conducted on certain aspects of the CBRN terrorist threat, e.g., on the vulnerability of weapons-usable Materials, on the technical capabilities required to construct CBRN weapons, and on the preparations necessary for dealing with the consequences of such attacks. However, far less attention has thus far been paid to the characteristics, Motivations, decision-Making processes, and behavior of the potential perpetrators theMselves. Although this relatively narrow focus on proliferation issues and terrorist capabilities has recently been subjected to pointed criticisM and is being increasingly challenged and compensated for by a long overdue eMphasis on the vital iMportance of terrorist Motivations and intentions, the iMbalances in the literature have only begun to be redressed.2 Indeed, the long-standing focus on the availability of dangerous Materials and terrorist capabilities rather than on terrorist intentions has arguably been seriously Misplaced given that the threat of CBRN terrorisM, including bioterrorisM, is first and foreMost a “deMand-side” probleM 1 Emblematic of this ongoing neglect of terrorist motivations is the book by Barry Kellman, Bioviolence: Preventing Biological Terror and Crime (New York: Cambridge University, 2007), which devotes only two pages to general terrorist motivations for using bioweapons (pp. 71-2), five to al-Qa‘ida’s interest in and justifications for using CBRN weapons (pp. 72-7), and four to the group’s reported attempts to acquire and produce bioweapons (pp. 77- 80); and Daniel M. Gerstein, Bioterror in the 21st Century (Annapolis, MD: Naval Institute Press, 2009), who devotes a mere four pages to terrorist motivations for using biological agents (pp. 173-6). Cf., in connection with nuclear weapons, Michael Levi, On Nuclear Terrorism (Cambridge, MA: Harvard University Press, 2007), which devotes a mere two pages (pp. 11-12) to this crucial matter; and Matthew Bunn, Securing the Bomb 2008, the latest annual report sponsored by the Nuclear Threat Initiative (NTI) and the Belfer Center for Science and International Affairs at Harvard University, pp. 4-6, which devotes only three pages to the subject of whether terrorists actually want to acquire and/or use nuclear weapons. 2 See, e.g., Brian Michael Jenkins, Will Terrorists Go Nuclear? (Amherst, NY: Prometheus Books, 2008), esp. chapters 3-5, 10, 14-15; Jeffrey M. Bale and Gary Ackerman, “How Serious is the ‘WMD Terrorism’ Threat?: Terrorist Motivations and Capabilities for Using Chemical, Biological, Radiological, and Nuclear (CBRN) Weapons,” report prepared by the WMD Terrorism Research Program, Center for Nonproliferation Studies, 2005, Part II on motivations; Brad Roberts, ed., Hype or Reality?: The “New Terrorism” and Mass Casualty AttacKs (Alexandria, VA: Chemical and Biological Arms Control Institute, 2000); Nadine Gurr and Benjamin Cole, The New Face of Terrorism: Threats from Weapons of Mass Destruction (London: I. B. Tauris, 2002), chapters 4-7; and Gavin Cameron, Nuclear Terrorism: A Threat Assessment for the 21st Century (New York: Palgrave Macmillan, 1999), chapters 2-4. rather than a “supply-side” probleM.3 After all, if violence-prone extreMist groups had no interest in acquiring or eMploying such Materials, it would not Matter, insofar as the threat of terrorisM is concerned, whether those Materials were accessible or whether the groups in question had sufficient technical capabilities to be able to deploy theM. As political psychologist Jerrold Post has rightly observed, “absent a clear understanding of the adversary’s intentions, the strategies and tactics developed [to counter theM] are based priMarily on knowledge of terrorists [sic] technological capabilities and give insufficient weight to…motivations.” 4 He was referring specifically to psychological Motivations, but it is even More iMportant, when one is atteMpting to assess the threat posed by violent ideological extreMists, to recognize the centrality of, and to pay close attention to, their ideological beliefs and agendas. Hence a priority in assessing the present and future non-state threat of biological weapons use Must be on the issue of the actor’s Motivations for carrying out acts of violence using such Materials. More generally, Bruce Hoffman has rightly noted that “the need for a better understanding of the Motivations, thought processes, Mindsets and historical consciousness of terrorists…is essential if the [terrorisM] field is to grow in new and beneficial directions, retain its relevance, and provide insightful and thoughtful analysis…”5 This saMe observation is likewise true with respect to the ideological motivations and operational objectives of different types and groups of violent non-state actors. The goal of this section is to highlight the range of opinions about how acute the threat of CBRN terrorisM currently is, and then undertake an analysis of the historical record and specific extreMist ideologies in order to help identify which types of extreMist groups are most likely to be interested in carrying out acts of violence using biological agents. Distinguishing Terrorism from Other Forms of Non-State Violence Before turning to the central topic, however, a few words need to be said about the nature of terrorisM, the iMportance of ideological extreMisM in evaluating terrorist Motivations, and the principal ideological categories of non-state terrorist groups. Perhaps the first desideratum should be to draw a clear analytical distinction between “terrorisM” in the strict sense of the term and other types of non-state violence, a distinction that unfortunately needs to be Made at the outset precisely because Most definitions of terrorisM – including those
Recommended publications
  • Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: an Annotated Bibliography by R
    Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: An Annotated Bibliography by R. Lee Hadden Topographic Engineering Center November 2005 US Army Corps of Engineers 7701 Telegraph Road Alexandria, VA 22315-3864 Adits, Caves, Karizi-Qanats, and Tunnels In Afghanistan Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE 30-11- 2. REPORT TYPE Bibliography 3. DATES COVERED 1830-2005 2005 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER “Adits, Caves, Karizi-Qanats and Tunnels 5b. GRANT NUMBER In Afghanistan: An Annotated Bibliography” 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER HADDEN, Robert Lee 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT US Army Corps of Engineers 7701 Telegraph Road Topographic Alexandria, VA 22315- Engineering Center 3864 9.ATTN SPONSORING CEERD / MONITORINGTO I AGENCY NAME(S) AND ADDRESS(ES) 10.
    [Show full text]
  • A Dirty Little War In
    Air war analysis MozambiqueA dirty little war in espite having total air supremacy, elsewhere, and who has communicated directly – the Wagner Group has undertaken numerous mobility on the ground, excellent with this writer, suggested that by moving into actions against an enemy that is entrenched in D communications and access to a northern Mozambique in force, the so-called the rugged jungle and mountain-clad terrain range of sophisticated hardware – including Islamic State (IS) is only a step away from fringing southern Tanzania. That much we know. drones and some of the best squad weapons becoming fully active in South Africa. He said: What we do not is how many guerrilla fighters on the planet – a sophisticated Russian “This radical movement already has a strong there are, how they are able to bring their mercenary force has been driven out of northern presence that includes military training bases.” weapons – possibly including man-portable Mozambique after only months of mixing it with Having entered the conflict at the behest of air defence systems (MANPADS) – into the a tough jihadist force that has Somali roots. It Russia’s President Putin last October – and country (likely through Tanzania) and how many goes much further. A confidential report by a enjoying complete dominance in the air with foreign fighters there are within their ranks. senior United Nations official who has served an array of Hind helicopter gunships as well as It’s also not clearly understood how this low- in Afghanistan, both Sudans, Yemen and Mi-8/17 Hip medium twin-turbine transporters key insurgency managed to escalate into an efficient, elite combat force under the very nose of the Mozambique Army.
    [Show full text]
  • FIGHT BACK the INVADERS 1.0.1 Italian Right Wing Tentacles on the Struggle for Animals and Environment INDEX Intro
    FIGHT BACK THE INVADERS 1.0.1 Italian right wing tentacles on the struggle for animals and environment INDEX Intro ......................................................................................................... pag. 3 ANARCHO-NATIONALISTS....................................................................... pag. 5 RESISTENZA NAZIONALE and AUTONOMI NAZIONALISTI National Resistance and Autonomous Nationalist ....................................... pag. 6 I LUPI DANNO LA ZAMPA Wolves landing the paw .............................................................................. pag. 7 MASSIMO TURCI ..................................................................................... pag. 10 ROBERTA CAPOTOSTI ............................................................................ pag. 11 MICHELA VITTORIA BRAMBILLA ............................................................ pag. 12 IL ROSSOBRUNISMO Redbrownism ............................................................................................ pag. 13 LA FORESTA CHE AVANZA The forrest moving forward .................. pag. 20 MEMENTO NATURAE ........ ................. pag. 23 100% ANIMALISTI AND DERIVATES ..... pag. 26 RECOGNIZED AND ISOLATED in the No Muos movement ........................ pag. 31 PAE - European Animal-rights Party ....... pag. 35 Sources ................................................ pag. 39 2 ANTISPEFA – Antispeciecists Antifa- In this first work, we start exami- scist Milan wants to be a counter- ning some of these movements, information archive
    [Show full text]
  • Ba'ath Propaganda During the Iran-Iraq War Jennie Matuschak [email protected]
    Bucknell University Bucknell Digital Commons Honors Theses Student Theses Spring 2019 Nationalism and Multi-Dimensional Identities: Ba'ath Propaganda During the Iran-Iraq War Jennie Matuschak [email protected] Follow this and additional works at: https://digitalcommons.bucknell.edu/honors_theses Part of the International Relations Commons, and the Near and Middle Eastern Studies Commons Recommended Citation Matuschak, Jennie, "Nationalism and Multi-Dimensional Identities: Ba'ath Propaganda During the Iran-Iraq War" (2019). Honors Theses. 486. https://digitalcommons.bucknell.edu/honors_theses/486 This Honors Thesis is brought to you for free and open access by the Student Theses at Bucknell Digital Commons. It has been accepted for inclusion in Honors Theses by an authorized administrator of Bucknell Digital Commons. For more information, please contact [email protected]. iii Acknowledgments My first thanks is to my advisor, Mehmet Döşemeci. Without taking your class my freshman year, I probably would not have become a history major, which has changed my outlook on the world. Time will tell whether this is good or bad, but for now I am appreciative of your guidance. Also, thank you to my second advisor, Beeta Baghoolizadeh, who dealt with draft after draft and provided my thesis with the critiques it needed to stand strongly on its own. Thank you to my friends for your support and loyalty over the past four years, which have pushed me to become the best version of myself. Most importantly, I value the distractions when I needed a break from hanging out with Saddam. Special shout-out to Andrew Raisner for painstakingly reading and editing everything I’ve written, starting from my proposal all the way to the final piece.
    [Show full text]
  • Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
    PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P.
    [Show full text]
  • Fi Zilal Al-Qur'an
    International Journal of Humanities and Social Science Vol. 1 No. 8; July 2011 From Religious Realism to Social Criticism: Sayyid Qutb’s Approach in Fi Zilal al Qur’an Nooraihan Ali (Corresponding author) Faculty of Islamic Contemporary Studies Universiti Sultan Zainal Abidin E-mail: [email protected] Asyraf Hj. Ab. Rahman Faculty of Social Development Universiti Malaysia Terengganu E-mail: [email protected] Wan Ibrahim Wan Ahmad UUM College of Arts and Sciences Universiti Utara Malaysia E-mail: [email protected] Mohd Yusoff Mohamad Faculty of Social Development Universiti Malaysia Terengganu, Malaysia E-mail:: [email protected] Abstract This paper deals with Qutb’s approaches which are in some ways differ from other Mufassirun’s way of the Quranic interpretation, thus making his Zilal so relevant to the modern and contemporary society as it attempts to give consistent answers to the social and political problems facing Muslims. In Qutb’s view, the establishment of a society in which Islamic teachings could be properly applied, was inevitable. Some distinctive characteristics that made Zilal so special are also discussed. Keywords: Muslim society, Qur‟an, Modern Tafsir 1. Introduction This paper deals with Sayyid Qutb‟s approaches in Zilal and how they resulted in conflicting opinions between the author and other Mufassirun on certain issues mentioned in the Qur‟an. Qutb‟s interpretation of the Qur‟an began with the conviction that the Qur‟an was the true guidance for all human beings and thus the only valid source to direct their affairs. This belief emerged only after his progress through several stages of his career coupled with the strong influence of the current environment surrounding the Egyptian society of his time.
    [Show full text]
  • Violent Extremism in Bangladesh: Analysing the Interplay Between Online and Offline Worlds
    Violent Extremism in Bangladesh: Analysing the Interplay Between Online and Offline Worlds Presented by Saimum Parvez Doctoral Candidate Govt. and IR Research Question RQs: How do online and offline interactions influence an individual towards violent extremism in Bangladesh? How do the online and offline contents produced by the violent extremists in Bangladesh construct the narrative that justifies violent Jihad? 2 Holey Artisan Twenty people, most of them foreigners, have been Attack killed in an attack on a cafe in Bangladesh by Islamic State. Most of the suspected Holey Artisan attackers were from well-off families and attended English medium private institutions. NIBRAS ISLAM • Turkish Hope School • Monash University • A soccer player, music fan • 22 years old Holey Artisan Attack ROHAN IMTIAZ • Scholastica School • Monash University • Son of a ruling party leader Najibullah Ansari VE in Bangladesh • Although militant groups have been present in Bangladesh since the 1990s and the country experienced a serious surge in attacks in 2005-6, the situation began to take a turn for the worst in mid-2013. • Various transnational terrorist groups, such as the Islamic State of Iraq and the Levant (ISIS) and Al Qaeda in Indian Subcontinent (AQIS), claimed responsibility for ghastly attacks upon religious and ethnic minorities, foreigners, liberal activists, authors and publishers. • The attack on 1 July, 2016 by a group of youths connected to the IS on a café in the upscale neighbourhood of the capital Dhaka sent a shockwave through the country and drew international attention. • Very few evidence-based discussions about who are these violent extremists and what is driving Bangladeshis to militancy.
    [Show full text]
  • CHEMICAL and BIOLOGICAL DIMENSIONS of JIHADI TERRORISM Animesh Roul
    P a g e | 0 SSPC RESEARCH PAPER February 2016 APOCALYPTIC TERROR: CHEMICAL AND BIOLOGICAL DIMENSIONS OF JIHADI TERRORISM Animesh Roul The threat of chemical and biological terrorism emanating from non-state actors, including the Islamic Jihadi organisations, which control large swathes of territories and resources, remains a major concern for nation states today. Over the years, the capability and intentions of Islamic jihadist groups have changed. They evidently prefer for more destructive and spectacular methods. This can be very well argued that if these weapons systems, materials or technologies were made available to them, they probably would use it against their enemy to maximize the impact and fear factor. Even though no terrorist group, including the Al Qaeda, so far has achieved success in employing these destructive and disruptive weapons systems or materials, in reality, various terrorist groups have been seeking to acquire WMD (Weapons of Mass Destruction/Disruption) materials and its know-how. Apocalyptic Terror: Chemical and Biological Dimensions of Jihadi Terrorism The threat of chemical and biological terrorism emanating from non-state actors, including the Islamic Jihadi organisations, which control large swathes of territories and resources, remains a major concern for nation states today. Historically, no organised terrorist groups have perpetrated violent attacks using biological or chemical agents so far. Over the years, the capability and intentions of Islamic jihadist groups have changed. They are evidently preferring for more destructive and spectacular methods. This can be very well argued that if these weapons systems, materials or technologies were made available to them, they probably would use it against their enemy to maximize the impact and fear factor.
    [Show full text]
  • Church of Scientology
    Church of Scientology By Kurt Van Gorden Founder: Lafayette Ronald Hubbard; a.k.a., L. Ron Hubbard (1911-1986) Current Leader: David Miscavige, Chairman of the Board for the Religious Technology Center. Founding Date: 1953 Official Publications: All of L. Ron Hubbard’s books, publications, and audio messages that were produced under the auspices of Dianetics and Scientology have been officially proclaimed as scripture in the Church of Scientology. Organization Structure: Scientology church members belong to the International Association of Scientologists. The Continental Liaison Offices oversee the local missions and churches, also referred to as Ideal Churches or Ideal Orgs (organizations). The supreme church corporation is the Church of Scientology International headquarters in Los Angeles, California. Scientology’s new spiritual headquarters is located in Clearwater, Florida. Known as the Flag Building, it also serves as a land base for the highest staff positions, the maritime Sea Org, whose members wear naval-style uniforms with officer ranks. Other Organizational Names: Scientology Celebrity Centers, Citizens Commission on Human Rights, Association for Better Living and Education—ABLE, Applied Scholastics, Bridge Publications, Criminon, Narconon, Foundation for Religious Tolerance, Sterling Management, Worldwide Institute of Scientology Enterprises—WISE, and The Way to Happiness Campaign. Unique Terms: Dianetics (through the mind or soul), Scientology (knowing how to know), Thetan, Engram, Auditing, Clear, E-Meter, and Operating Thetan (OT). HISTORY L. Ron Hubbard was a successful science fiction writer who published over 15,000,000 words between 1932 and 1950 under 20 pen names. Some critics believe that Hubbard may have predicted his forthcoming church. While speaking at a 1949 New Jersey science fiction convention, Hubbard reportedly stated, “Writing for a penny a word is ridiculous.
    [Show full text]
  • Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization
    International Journal of Communication 14(2020), 1849–1867 1932–8036/20200005 Theologians, Poets, and Lone Wolves: Mapping Medium-Specific Epistemologies of Radicalization BRIAN T. HUGHES American University, USA Examinations into the roots of Islamist terrorism have frequently presented the phenomenon as a result of either perverting political–religious epistemologies into distorted, caricatured fundamentalisms, or, alternatively, as a return to form, whereby a pure, root ideology/metaphysic is rediscovered. The former approach reflects a discourse rooted in print media and characterized by logical argumentation, linear chronology, and deference to the text. The latter approach reflects a discourse rooted in modes of secondary orality, which posit a font of ideal essence that precedes expression. The figure of the digitally engaged lone wolf undermines these discourses. His violent extremism appears only Islamically inflected through an accretion of contradictory mediated encounters linking representations of violence, Islam, and the lone wolf himself. This article argues that a new approach and discourse should therefore emerge, specific to the hypertextual and rhizomatic qualities of multiplicity and contradiction that characterize the digitally engaged lone wolf. Keywords: terrorism, extremism, ISIS, Islamophobia, radicalization, discourse, medium theory, hypermedia, affect Scholars have identified successive waves of terrorist tactics and ideological pretexts in both the contemporary Islamist domain (Esposito, 2003b; Kepel, 2002;
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • The American Mosque Report
    The American Mosque 2020: Growing and Evolving Report 1 of the US Mosque Survey 2020: Basic Characteristics of the American Mosque Dr. Ihsan Bagby Research Team Dr. Ihsan Bagby, Primary Investigator and Report Table of Contents Author Research Advisory Committee Dr. Ihsan Bagby, Associate Professor of Islamic Introduction ......................................................... 3 Studies, University of Kentucky Dalia Mogahed, Director of Research, ISPU Major Findings ..................................................... 4 Dr. Besheer Mohamed, Senior Researcher, Pew Research Center Dr. Scott Thumma, Professor of Sociology of Mosque Essential Statistics ................................ 7 Religion, Hartford Seminary Number of Mosques .............................................. 7 Dr. Shariq Siddiqui, Director, Muslim Philanthropy Initiative, Indiana University Location of Mosques ............................................. 8 Riad Ali, President and Founder, American Muslim Mosque Buildings .................................................. 9 Research and Data Center Dr. Zahid Bukhari, Director, ICNA Council for Social Year Mosque Moved to Its Present Location ........ 10 Justice City/Neighborhood Resistance to Mosque Development ....................................... 10 ISPU Publication Staff Mosque Concern for Security .............................. 11 Dalia Mogahed, Director of Research Erum Ikramullah, Research Project Manager Mosque Participants ......................................... 12 Katherine Coplen, Director of Communications
    [Show full text]