Lobos De Occidente

Total Page:16

File Type:pdf, Size:1020Kb

Lobos De Occidente LOBOS DE OCCIDENTE EL TERRORISMO INDIVIDUAL COMO ELEMENTO EMERGENTE Y EVOLUCIÓN TÁCTICA DE AL-QA`IDA. __________ Autor: Mario TOBOSO BUEZO (Barcelona, 1969) es Doctor en Paz y Seguridad Internacional por la UNED, Experto Universitario en Análisis en Violencia Política y Terrorismo por la Universidad de Granada, Licenciado en Derecho y Licenciado en Criminología. Su experiencia profesional se desarrolla especialmente en los ámbitos relacionados con el trabajo de campo y la seguridad. Ha sido conferenciante, como experto en terrorismo, en el European Diversity Expert Meeting (EDPOL) celebrado en el año 2011 y en el XI Seminario Permanente de Estudios sobre Terrorismo organizado por la Fundación Ortega-Marañón y el Real Instituto Elcano celebrado en el año 2012. También ha participado, como experto en el fenómeno del terrorismo individual, en las “Primeras Jornadas sobre Inteligencia ante la Radicalización” celebradas en el año 2012. Periódicamente imparte sesiones académicas sobre el fenómeno del terrorismo en el Instituto de Seguridad Pública de Cataluña. A pesar de haber iniciado su producción académica recientemente ya ha publicado varios artículos de investigación sobre Terrorismo Individual en prestigiosas revistas y su primer libro es un análisis exhaustivo del fenómeno. Mario TOBOSO BUEZO LOBOS DE OCCIDENTE EL TERRORISMO INDIVIDUAL COMO ELEMENTO EMERGENTE Y EVOLUCIÓN TÁCTICA DE AL-QA`IDA INSTITUTO UNIVERSITARIO GENERAL GUTIÉRREZ MELLADO – UNED 2014 © Copyright by Instituto Universitario General Gutiérrez Mellado de Investigación sobre la Paz, la Seguridad y la Defensa c/ Princesa 36 28008 Madrid Teléfono: 91 7580011 Fax: 91 7580030 [email protected] www.iugm.es El IUGM aplica a sus procesos de producción editorial los criterios de calidad establecidos por la ANECA, la CNEAI y la ANEP. La política y la gestión editorial del IUGM garantizan un riguroso proceso de selección y evaluación de los trabajos recibidos. Madrid, 2014 ISBN: 978-84-616-9295-8 Depósito Legal: M-10964-2014 Maquetación e Impresión: Doppel, S.L. c/ Bruselas 46 A - EURÓPOLIS 28232 Las Rozas (Madrid) 91 637 73 49 [email protected] Para ti Mentxu Agradecimientos, Quiero agradecer especialmente el apoyo de Dolors, hijas y familia que han recorrido junto a mí este largo camino que acaba aquí. También me gustaría dar las gracias a todas las instituciones que han colaborado para el desarrollo de este libro como por ejemplo: el Instituto Universitario General Gutiérrez Mellado, el Consulado de los Estados Unidos en Barcelona, el cuerpo de los Mossos d’Esquadra o la buena predisposición y consejos de expertos como Manuel Torres, Javier Jordán, Carlos Echeverría, Luís de la Corte, Juan Avilés, Lorenzo Vidino, Miguel Luparelli y Raffaello Pantucci. Por último, quiero dedicar este libro al profesor José Collado Medina, la persona que hizo plantearme esta aventura y que abrió la puerta de mi curiosidad. ÍNDICE LISTA DE TABLAS .............................................................................. 11 LISTA DE GRÁFICOS ........................................................................... 13 PRÓLOGO ........................................................................................... 15 INTRODUCCIÓN.................................................................................. 19 CAPÍTULO 1: IDEOLOGÍA YIHADISTA ANÁLISIS DE LA FIGURA DEL LOBO SOLITARIO COMO ELEMENTO EMERGENTE EN LA IDEOLOGÍA YIHADISTA ....................................... 27 1. LA YIHAD .................................................................................. 27 1.1. Historia del yihadismo....................................................... 28 1.2. La yihad contemporánea.................................................... 30 1.3. La yihad de al-Qa`ida ........................................................ 31 2. AL-QA`IDA ................................................................................ 32 2.1. Al-Qa`ida como idea ......................................................... 33 2.2. Al-Qa`ida como organización terrorista ............................ 35 2.3. El Salafismo....................................................................... 37 3. IDEOLOGÍA ALQAEDISTA ........................................................... 39 3.1. Aportación de la ideología alqaedista................................ 41 3.2. Agenda de la ideología alqaedista ..................................... 43 3.3. Alcance de la ideología alqaedista..................................... 44 3.4. Estrategia de la ideología alqaedista.................................. 47 3.5. Marcos de acción colectivos en la ideología alqaedista..... 49 3.6. Ideología alqaedista en Occidente ..................................... 54 4. LA YIHAD INDIVIDUAL .............................................................. 56 4.1. Doctrina de la yihad individual.......................................... 59 4.2. Fuentes de inspiración de la yihad individual.................... 62 5. CONCLUSIONES ......................................................................... 68 CAPÍTULO 2: EL LOBO SOLITARIO ANTECEDENTES HISTÓRICOS, DEFINICIÓN, CONTAMINACIÓN, EVOLUCIÓN, VENTAJAS Y VULNERABILIDADES................................. 69 1. EVOLUCIÓN OPERATIVA DE AL-QA`IDA.................................... 70 1.1. Producto operativo ............................................................. 70 1.2. Producto ideológico........................................................... 74 8 LOBOS DE OCCIDENTE EL TERRORISMO INDIVIDUAL COMO ELEMENTO EMERGENTE Y EVOLUCIÓN TÁCTICA DE AL-QA`IDA 1.3. Difusión del producto ideológico.......................................75 1.3.1. Inspire .....................................................................77 1.3.2. La ideología alqaedista en Inspire...........................78 1.3.3. El Lobo Solitario en Inspire ....................................80 1.3.4. Otras publicaciones online ......................................83 1.4. Evolución de la yihad ........................................................84 1.5. Fase IV: Yihad híbrida.......................................................87 2. EL LOBO SOLITARIO..................................................................89 2.1. Antecedentes de Lobos Solitarios......................................89 2.2. ¿Lobo Solitario o Actor Solitario?.....................................93 2.3. Descontaminación del término Lobo Solitario ..................98 2.3.1. Definición de la Yihad Individual Táctica ..............100 2.4. La saturación mediática del término Lobo Solitario y los episodios réplica .......................................................................102 2.5. Propuesta de definición de Lobo Solitario.........................106 3. ASPECTOS OPERATIVOS DEL LOBO SOLITARIO .........................108 3.1. Ventajas .............................................................................108 3.1.1. Actuación individual ...............................................108 3.1.2. El ciclo del ataque terrorista....................................109 3.1.3. Internet como ventaja táctica...................................112 3.1.4. El “efecto contagio” y la “yihad cool” ....................113 3.1.5. Percepción de la amenaza........................................116 3.2. Vulnerabilidades ................................................................117 3.2.1. Amateurización táctica y austeridad logística .........118 3.2.2. Internet como vulnerabilidad táctica .......................119 3.2.3. Vulnerable a la detección temprana ........................120 3.3. Autoradicalización .............................................................122 3.3.1. Radicalización .........................................................122 3.3.2. Autoradicalización del Lobo Solitario ....................126 3.3.3. La autoradicalización express .................................129 4. CONCLUSIONES..........................................................................130 CAPÍTULO 3: ANÁLISIS DE CASOS INVESTIGACIÓN CUANTITATIVA DE LOS CASOS DE LOBO SOLITARIO Y DE YIHAD INDIVIDUAL TÁCTICA VINCULADOS CON LA IDEOLOGÍA YIHADISTA 133 1. ANTECEDENTES DEL ESTUDIO ...................................................135 2. OBJETO DE ESTUDIO ..................................................................138 2.1. Definición de las variables del estudio ..............................139 2.2. Descripción del análisis de casos.......................................141 3. ANÁLISIS CUANTITATIVO DE CASOS..........................................143 3.1. Estudio de la variable: espacio y tiempo............................144 ÍNDICE 9 3.1.1. Características de los casos estadounidenses.................. 147 3.1.2. Características de los casos europeos ............................. 148 3.2. Estudio de la variable conversión religiosa ....................... 149 3.3. Estudio de la variable amateurización ............................... 152 3.4. Estudio de la variable capacidades .................................... 155 3.5. Estudio de la variable objetivos......................................... 156 3.5.1. Naturaleza de los objetivos complejos.................... 157 3.5.2. Naturaleza de los objetivos blandos........................ 158 3.5.3. El martirio ............................................................... 159 3.6. Estudio de la variable influencia de internet...................... 160 3.6.1. Influencia de las publicaciones online .................... 162 4. INFLUENCIA DE LÍDERES CARISMÁTICOS .................................. 164 4.1.
Recommended publications
  • Packaging Inspiration: Al Qaeda's Digital Magazine
    Linfield University DigitalCommons@Linfield Faculty Publications 2013 Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process Susan Currie Sivek Linfield College Follow this and additional works at: https://digitalcommons.linfield.edu/mscmfac_pubs Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Mass Communication Commons, and the Social Influence and oliticalP Communication Commons DigitalCommons@Linfield Citation Sivek, Susan Currie, "Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process" (2013). Faculty Publications. Published Version. Submission 12. https://digitalcommons.linfield.edu/mscmfac_pubs/12 This Published Version is protected by copyright and/or related rights. It is brought to you for free via open access, courtesy of DigitalCommons@Linfield, with permission from the rights-holder(s). Your use of this Published Version must comply with the Terms of Use for material posted in DigitalCommons@Linfield, or with other stated terms (such as a Creative Commons license) indicated in the record and/or on the work itself. For more information, or if you have questions about permitted uses, please contact [email protected]. International Journal of Communication 7 (2013), 584–606 1932–8036/20130005 Packaging Inspiration: Al Qaeda’s Digital Magazine Inspire in the Self-Radicalization Process SUSAN CURRIE SIVEK Linfield College Al Qaeda is today a fragmented organization, and its strategic communication efforts now focus largely on recruiting individuals in the West to carry out “individual jihad” in their home countries. One Al Qaeda–affiliated publication, Inspire, represents an unusual use of the digital magazine format and content for recruitment. This study examines the content and design of Inspire to determine how the magazine may advance the self- radicalization that it seeks to induce in its readers.
    [Show full text]
  • F I L E D August 19, 2013
    Case: 12-50836 Document: 00512345596 Page: 1 Date Filed: 08/19/2013 IN THE UNITED STATES COURT OF APPEALS United States Court of Appeals FOR THE FIFTH CIRCUIT Fifth Circuit F I L E D August 19, 2013 No. 12-50836 Lyle W. Cayce Clerk UNITED STATES OF AMERICA, Plaintiff-Appellee v. NASER JASON JAMAL ABDO, also known as Naser Jason Abdo, Defendant-Appellant Appeals from the United States District Court for the Western District of Texas Before REAVLEY, ELROD, and GRAVES, Circuit Judges. REAVLEY, Circuit Judge: Naser Jason Jamal Abdo was arrested by police before he could carry out a plan to detonate a bomb and shoot service members stationed at Fort Hood, Texas. He was convicted of one count of attempted use of a weapon of mass destruction (Count 1), one count of attempted murder of officers or employees of the United States (Count 2), and four counts of possession of a weapon in furtherance of a federal crime of violence (Counts 3–6). He appeals his conviction and sentence. We AFFIRM. I. On July 26, 2011, Greg Ebert, an employee in a gun store in Killeen, Texas, notified police Sgt. Bradley and Lt. Boone about a suspicious customer Case: 12-50836 Document: 00512345596 Page: 2 Date Filed: 08/19/2013 No. 12-50836 who had come into the store. The customer, later identified as Abdo, purchased six one-pound containers of different types of smokeless gunpowder despite an apparent lack of knowledge about the substance, as well as three boxes of shotgun shells and an extended magazine for a handgun.
    [Show full text]
  • Internet Radicalization : Actual Threat Or Phantom Menace?
    Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2012-09 Internet Radicalization : Actual Threat or Phantom Menace? Mealer, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/17416 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTERNET RADICALIZATION: ACTUAL THREAT OR PHANTOM MENACE? by Michael J. Mealer September 2012 Thesis Co-Advisors: Anders Strindberg Rodrigo Nieto-Gómez Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2012 Master’s Thesis 4. TITLE AND SUBTITLE Internet Radicalization: Actual Threat or Phantom 5. FUNDING NUMBERS Menace? 6. AUTHOR(S) Michael J. Mealer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10.
    [Show full text]
  • DOJ Public/Unsealed Terrorism and Terrorism-Related Convictions 9/11
    DOJ Public/Unsealed Terrorism and Terrorism-Related Convictions 9/11/01-12/31/14 Date of Initial Terrorist Country or If Parents Are Defendant's Immigration Status If a U.S. Citizen, Entry or Immigration Status Current Organization Conviction Current Territory of Origin, Citizens, Natural- Number Charge Date Conviction Date Defendant Age at Conviction Offenses Sentence Date Sentence Imposed Last U.S. Residence at Time of Natural-Born or Admission to at Time of Initial Immigration Status Affiliation or District Immigration Status If Not a Natural- Born or Conviction Conviction Naturalized? U.S., If Entry or Admission of Parents Inspiration Born U.S. Citizen Naturalized? Applicable 243 months 18/2339B; 18/922(g)(1); 1 5/27/2014 10/30/2014 Donald Ray Morgan 44 ISIS 5/13/15 imprisonment; 3 years MDNC NC U.S. Citizen U.S. Citizen Natural-Born N/A N/A N/A 18/924(a)(2) SR 3 years imprisonment; Unknown. Mother 2 8/29/2013 10/28/2014 Robel Kidane Phillipos 19 2x 18/1001(a)(2) 6/5/15 3 years SR; $25,000 DMA MA U.S. Citizen U.S. Citizen Naturalized Ethiopia came as a refugee fine from Ethiopia. 3 4/1/2014 10/16/2014 Akba Jihad Jordan 22 ISIS 18/2339A EDNC NC U.S. Citizen U.S. Citizen 4 9/24/2014 10/3/2014 Mahdi Hussein Furreh 31 Al-Shabaab 18/1001 DMN MN 25 years Lawful Permanent 5 11/28/2012 9/25/2014 Ralph Kenneth Deleon 26 Al-Qaeda 18/2339A; 18/956; 18/1117 2/23/15 CDCA CA N/A Philippines imprisonment; life SR Resident 18/2339A; 18/2339B; 25 years 6 12/12/2012 9/25/2014 Sohiel Kabir 37 Al-Qaeda 18/371 (1812339D 2/23/15 CDCA CA U.S.
    [Show full text]
  • Terrorism Risk: a Constant Threat
    TERRORISM RISK: A CONSTANT THREAT Impacts for Property/Casualty Insurers MARCH 2014 Robert P. Hartwig, Ph.D., CPCU President (212) 346-5520 [email protected] Claire Wilkinson Consultant (917) 459-6497 [email protected] Insurance Information Institute 110 William Street New York, NY 10038 212.346.5500 INTRODUCTION With just months to go until the year-end 2014 expiration of the government-backed Terrorism Risk Insurance Program Reauthorization Act (TRIPRA), the debate between industry and government over terrorism risk is intensifying. The discussion comes in a year that marks the one-year anniversary of the Boston Marathon bombing—the first successful terrorist attack on United States soil in more than a decade. The April 15, 2013, attack left three dead and 264 injured. Industry data shows that the proportion of businesses buying property terrorism insurance (the take-up rate for terrorism coverage) has increased since the enactment of TRIA in 2002, and for the last five years has held steady at around 60 percent, as businesses across the U.S. have had the opportunity to purchase terrorism coverage, usually at a reasonable cost. However, should TRIPRA not be extended, brokers have warned that the availability of terrorism insurance would be greatly reduced in areas of the U.S. that have the most need for coverage, such as central business districts. Uncertainty around TRIPRA’s future is already creating capacity and pricing issues for insurance buyers in early 2014, reports suggest.1 New Aon data shows that retail and transportation sectors face the highest risk of terrorist attack in 2014.2 Both sectors were significantly affected in 2013, as highlighted by the September 21, 2013, attack by gunmen on the upscale Westgate shopping mall in Nairobi, Kenya, as well as the Boston bombing.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat /name redacted/ Specialist in Organized Crime and Terrorism February 19, 2014 Congressional Research Service 7-.... www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, lawful permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • CTC Sentinel 4:2 7666999329321&Oid=211220622244900
    AUGUST 2011 . VOL 4 . ISSUE 8 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINel OBJECTIVE . RELEVANT . RIGOROUS Contents AQAP’s ‘Great Expectations’ FEATURE ARTICLE 1 AQAP’s ‘Great Expectations’ for for the Future the Future By Bruce Riedel By Bruce Riedel REPORTS 4 The Revival of Shi`a Militancy in Iraq By Ramzy Mardini 8 Al-Qa`ida’s Confused Messaging on Libya By Barak Barfi 12 Germany Increasingly a Center for Terrorism in Europe By Sajjan M. Gohel 16 Islamic Activism in Europe: The Role of Converts By Emmanuel Karagiannis 19 The Rise of Salafists in Tunisia After the Fall of Ben Ali By Aaron Y. Zelin 21 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts merican counterterrorism in the face of adversity is a model for officials recently warned other al-Qa`ida units now threatened. that al-Qa`ida in the Arabian In particular, with al-Qa`ida’s core in Peninsula (AQAP) is trying Pakistan under severe pressure due to Ato produce the lethal poison ricin to be Usama bin Ladin’s death in May 2011, packed around small bombs for use in AQAP provides insights into the jihad’s attacks against the U.S. homeland.1 This capacity to rally back from defeat. latest development is further evidence of AQAP’s growing threat to the United AQAP has done far more than just About the CTC Sentinel States. The group has demonstrated survive. In the last two years, it has The Combating Terrorism Center is an remarkable resiliency and adaptability in emerged as a potent al-Qa`ida threat to independent educational and research its history, surviving several leadership the U.S.
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]
  • Homegrown Terrorism” and the Preventive Approach to Investigations
    ILLUSION OF JUSTICE Human Rights Abuses in US Terrorism Prosecutions HUMAN RIGHTS WATCH Illusion of Justice Human Rights Abuses in US Terrorism Prosecutions Copyright © 2014 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 978-1-62313-1555 Cover design by Rafael Jimenez Human Rights Watch defends the rights of people worldwide. We scrupulously investigate abuses, expose the facts widely, and pressure those with power to respect rights and secure justice. Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Sydney, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org The Human Rights Institute at Columbia Law School The Human Rights Institute sits at the heart of human rights teaching, practice and scholarship at Columbia Law School. Founded in 1998 by the late Professor Louis Henkin, the Institute draws on the law school’s deep human rights tradition to support and influence human rights practice in the United States and throughout the world. The Institute focuses its work in three main substantive areas: Counterterrorism and Human Rights; Human Rights in the United States; and Human Rights in the Global Economy. We have developed distinct approaches to our work, building bridges between scholarship and activism, developing capacity within the legal community, engaging governments, and modeling new strategies for progress.
    [Show full text]
  • Terrorism Risk: a Continuing Threat
    TERRORISM RISK: A CONTINUING THREAT Impacts for Property/Casualty Insurers SEPTEMBER 2012 Robert P. Hartwig, Ph.D., CPCU President & Economist (212) 346-5520 [email protected] Claire Wilkinson (917) 459-6497 [email protected] Insurance Information Institute 110 William Street New York, NY 10038 212.346.5500 INTRODUCTION International terrorism—starting with the terrorist attack of September 11, 2001, and followed by the 2002 Bali bombings, the 2004 Russian aircraft and Madrid train bombings, the London transportation bombings of 2005 and the Mumbai bombings of 2008—had a profound influence on the 2001 to 2010 decade. Then came 2011, a landmark year, which simultaneously saw the death of al-Qaida founder Osama bin Laden and the 10-year anniversary of September 11. The changing nature of the global terrorism threat is highlighted in a report from the U.S. Department of State, which notes that the total number of worldwide terrorist attacks in 2011 was more than 10,000 in 70 countries, resulting in more than 12,500 deaths.1 While large, that figure represents a drop of 12 percent from 2010. More than 75 percent of the world’s attacks occurred in South Asia and the Near East, and 85 percent of attacks in these regions occurred in just three countries: Afghanistan, Iraq and Pakistan. Bin Laden was not the only top al-Qaida leader removed from the battlefield in 2011. Other key terrorist figures killed in 2011 included: Ilyas Kashmiri, a terrorist operative in South Asia; Harun Fazul, an architect of the 1998 U.S. Embassy bombings in Kenya and Tanzania; Atiya Abdul Rahman, al-Qaida’s second-in- command after bin Laden’s death; and Anwar al-Aulaqi, al-Qaida’s chief of external operations in the Arabian Peninsula.
    [Show full text]
  • American Jihadist Terrorism: Combating a Complex Threat
    American Jihadist Terrorism: Combating a Complex Threat Jerome P. Bjelopera Specialist in Organized Crime and Terrorism January 23, 2013 Congressional Research Service 7-5700 www.crs.gov R41416 CRS Report for Congress Prepared for Members and Committees of Congress American Jihadist Terrorism: Combating a Complex Threat Summary This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. There is an “executive summary” at the beginning that summarizes the report’s findings. Congressional
    [Show full text]
  • CTC Sentinel Objective
    AUGUST 2011 . VOL 4 . ISSUE 8 COMBATING TERRORISM CENTER AT WEST POINT CTC SENTINel OBJECTIVE . RELEVANT . RIGOROUS Contents AQAP’s ‘Great Expectations’ FEATURE ARTICLE 1 AQAP’s ‘Great Expectations’ for for the Future the Future By Bruce Riedel By Bruce Riedel REPORTS 4 The Revival of Shi`a Militancy in Iraq By Ramzy Mardini 8 Al-Qa`ida’s Confused Messaging on Libya By Barak Barfi 12 Germany Increasingly a Center for Terrorism in Europe By Sajjan M. Gohel 16 Islamic Activism in Europe: The Role of Converts By Emmanuel Karagiannis 19 The Rise of Salafists in Tunisia After the Fall of Ben Ali By Aaron Y. Zelin 21 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts merican counterterrorism in the face of adversity is a model for officials recently warned other al-Qa`ida units now threatened. that al-Qa`ida in the Arabian In particular, with al-Qa`ida’s core in Peninsula (AQAP) is trying Pakistan under severe pressure due to Ato produce the lethal poison ricin to be Usama bin Ladin’s death in May 2011, packed around small bombs for use in AQAP provides insights into the jihad’s attacks against the U.S. homeland.1 This capacity to rally back from defeat. latest development is further evidence of AQAP’s growing threat to the United AQAP has done far more than just About the CTC Sentinel States. The group has demonstrated survive. In the last two years, it has The Combating Terrorism Center is an remarkable resiliency and adaptability in emerged as a potent al-Qa`ida threat to independent educational and research its history, surviving several leadership the U.S.
    [Show full text]