Course Syllabus Georgetownx

Total Page:16

File Type:pdf, Size:1020Kb

Course Syllabus Georgetownx TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Course Syllabus GeorgetownX August 31, 2015 GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 TABLE OF CONTENTS Core Faculty ............................................................................................................................................................ 2 Interviews ............................................................................................................................................................... 4 Faculty Support Team ............................................................................................................................................. 4 What is the course about? ..................................................................................................................................... 5 Key Questions .................................................................................................................................................... 5 What does the course include? .............................................................................................................................. 5 Course Section Outline ....................................................................................................................................... 6 What will I learn in the course? .............................................................................................................................. 8 What should we expect from each other? ............................................................................................................. 8 What you can Expect from Professor Byman and the course team ................................................................... 8 What you can expect from edX .......................................................................................................................... 8 What we expect from you .................................................................................................................................. 8 Appendix A: Detailed Course Section Outline ...................................................................................................... 11 1. What is Terrorism and Who are the Terrorists? (Release: September 24, 2015) ..................................... 11 2. Stratgies, Tactics, and Technology Use (Release: October 1, 2015) ......................................................... 12 3. Al-Qaeda (Release: October 8, 2015) ........................................................................................................ 12 4. Islam (Release: October 15, 2015) ............................................................................................................ 13 5. Area studies: Israel (Release: October 22, 2015) ..................................................................................... 14 6. Area studies: South Asia (Release: October 29, 2015) ............................................................................. 15 7. Counterterrorism and The Rule of Law (Release: November 5, 2015) ..................................................... 15 8. Intelligence and Counterterrorism (Release: November 12, 2015) .......................................................... 16 9. Counterterrorism Instruments (Release: November 19, 2015) ................................................................ 17 Appendix B: Learning Checklist ............................................................................................................................ 19 What is Terrorism and Who are the Terrorists– Section 1: September 24-31 ................................................. 19 Strategies, Tactics, and Technology Use – Section 2: October 1-7 ................................................................... 19 Al-Qaeda – Section 3: October 8-14 ................................................................................................................. 19 Islam – Section 4: October 15-21 ..................................................................................................................... 19 Area studies: The Terrorist Threat to Israel and the Israeli response– Section 5: October 22-28 ................... 20 Area Studies: Terrorism and Counterterrorism in South Asia– Section 6: October 29-November 4 ............... 20 Counterterrorism and the Rule of Law – Week 7: November 5-11 ................................................................. 20 Intelligence and Counterterrorism – Section 8: November 12- 19, 2013 ........................................................ 20 Counterterrorism Instruments – Section 9: November 20- 26, 2013 .............................................................. 21 1 of 21 GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 TERRORISM AND COUNTERTERRORISM What is the danger of terrorism, and how can the world respond effectively? NOTE: The course will be archived for the following duration: October 1, 2015 – May 13, 2016. No certificates will be issued for work completed after December 2, 2015. CORE FACULTY • Daniel L. Byman Dr. Byman is a Professor in the Security Studies Program of the Walsh School of Foreign Service at Georgetown University and the Research Director of the Brookings Institution’s Center for Middle East Policy. Dr. Byman served as a Professional Staff Member with the National Commission on Terrorist Attacks on the United States (the “9/11 Commission”) and the Joint 9/11 Inquiry Staff of the House and Senate Intelligence Committees. He also worked as the Research Director of the Center for Middle East Public Policy at the RAND Corporation and as a Middle East analyst for the U.S. intelligence community. Dr. Byman received his B.A. in religion from Amherst College and his Ph.D. in political science from the Massachusetts Institute of Technology. Follow him @dbyman. § Jonathan Brown Dr. Jonathan Brown is a Prince Alwaleed Bin Talal Professor of Islamic Civilization in the Center for Muslim- Christian Understanding at Georgetown University, a term member of the Council on Foreign Relations, Editor- in-Chief of the Oxford Encyclopedia of Islamic Law, and publisher of several books and articles on the Hadith, Islamic law, Sufism, Arabic lexical theory and Pre-Islamic poetry. Dr. Brown's current research interests include the history of forgery and historical criticism in Islamic civilization, comparison with the Western tradition; and modern conflicts between Late Sunni Traditionalism and Salafism in Islamic thought. Dr. Brown received his B.A. in history from Georgetown University and his Ph.D. in near eastern languages and civilizations from the University of Chicago. § John Esposito Founding Director of the Prince Alwaleed Bin Talal Center for Muslim-Christian Understanding, John Esposito specializes in Islamic studies, religion, and international affairs as a Professor at Georgetown University. Esposito's research is published in more than 45 books and monographs, including Unholy War: Terror in the Name of Islam and The Future of Islam, translated into over 35 languages. Past President of the Middle East Studies Association and the American Academy of Religion, a member of the E. C. European Network of Experts on De-Radicalisation, the board of C-1 World Dialogue, an ambassador for the UN Alliance of Civilizations, Esposito is Editor-in-Chief of Oxford Islamic Studies Online, The Oxford Encyclopedia of the Islamic World and other Oxford reference works on the Islamic world and Islamic Studies. § Christine Fair C. Christine Fair is a Georgetown Security Studies Program Assistant Professor, where she focuses on South Asian political and military affairs. Fair previously worked at the RAND Corporation, United Nations Assistance 2 of 21 GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Mission to Afghanistan in Kabul, and at USIP’s Center for Conflict Analysis and Prevention. Fair has as authored, co-authored and co-edited several books, is a member of the Council on Foreign Relations, Women in International Security, International Studies Association, American Political Science Association, and American Institute of Pakistan Studies. She serves on the editorial board of numerous journals, and is a senior fellow with the Combating Terrorism Center at West Point. Fair received her PhD and MA from the University of Chicago. Her most recent book is Fighting to the End: The Pakistan Army’s Way of War (Oxford University Press, 2014). Many of her other publications can be found at christinefair.net § Bruce Hoffman Bruce Hoffman is a Professor and Director of both the Center for Security Studies and the Security Studies Program at Georgetown University. Professor Hoffman is currently a member of the National Security Preparedness Group; a Global Scholar at the Woodrow Wilson International Center for Scholars; a Senior Fellow at the Combating Terrorism Center; a Visiting Professor at the International Institute for Counter- Terrorism, Herzliya, Israel and at the Handa Centre for the Study of Terrorism and Political Violence at St Andrews University, Scotland ; and serves in various editing capacities at The National Interest, Studies in Conflict and Terrorism, and the Columbia University Press Series on Terrorism and Irregular Warfare. Hoffman was awarded the United States Intelligence Community Seal Medallion in 1994 from the Director of Central Intelligence. Follow him @hoffman_bruce.
Recommended publications
  • ISIS Propaganda and United States Countermeasures
    BearWorks MSU Graduate Theses Fall 2015 ISIS Propaganda and United States Countermeasures Daniel Lincoln Stevens As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Stevens, Daniel Lincoln, "ISIS Propaganda and United States Countermeasures" (2015). MSU Graduate Theses. 1503. https://bearworks.missouristate.edu/theses/1503 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES A Masters Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Daniel Stevens December 2015 Copyright 2015 by Daniel Lincoln Stevens ii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES Defense and Strategic studies Missouri State University, December 2015 Master of Science Daniel Stevens ABSTRACT The purpose of this study is threefold: 1. Examine the use of propaganda by the Islamic State in Iraq and al Sham (ISIS) and how its propaganda enables ISIS to achieve its objectives; 2.
    [Show full text]
  • Terrorism in the Indo-Pacific: the Year Gone by and the Road Ahead
    FEATURE Terrorism in the Indo-Pacific * The Year Gone By and the Road Ahead DR. SAM MULLINS lobally, terrorism has been on the decline since peaking in 2014, the year that the Islamic State (ISIS) declared its “caliphate” in the Middle East. Nevertheless, terrorism levels are still approximately double what they Gwere a decade ago and around five times what they were in 2001.1 The Indo- Pacific region, which encompasses most of Asia, as well as North America, Aus- tralasia, Oceania, and parts of South America, consistently experiences some of the highest rates of terrorism in the world, and 2019 was no exception.2 This ar- ticle, though by no means an exhaustive account, provides a roughly chronological overview of significant terrorist activities in the Indo-Pacific during the past year, with a particular focus on South and Southeast Asia. This is followed by several important advances in counterterrorism (CT). The article concludes by consider- ing what these, and other developments, may portend for the future. An Evolving Threat: Significant Developments in 2019 Suicide Bombing in the Philippines The year began with a deadly, twin suicide bombing of the Cathedral of Our Lady of Mount Carmel in Jolo in the southern Philippines, in which 23 people lost their lives and scores more were injured. Executed by 35-year-old Rullie Rian Zeke and his 32-year- old wife, Ulfah Handayani Saleh, both from Indonesia, the attack was demonstrative of the enduring potency of the Abu Sayyaf Group (ASG), which orchestrated it, as well as Jamaah Ansharut Daulah ( JAD), which the two perpetrators had been members of in Indonesia.3 It furthermore under- scored the continuing influence of ISIS (with which both ASG and JAD are aligned), the threat of foreign fighters, the heightened popularity of sectarian targets, and the importance of family ties between militants in the region.
    [Show full text]
  • How Isis Uses Social Media for Recruitment
    HOW ISIS USES SOCIAL MEDIA FOR RECRUITMENT Major Ata AlSarayreh JCSP 46 PCEMI 46 Solo Flight Solo Flight Disclaimer Avertissement Opinions expressed remain those of the author and do Les opinons exprimées n’engagent que leurs auteurs et not represent Department of National Defence or ne reflètent aucunement des politiques du Ministère de Canadian Forces policy. This paper may not be used la Défense nationale ou des Forces canadiennes. Ce without written permission. papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as represented by the © Sa Majesté la Reine du Chef du Canada, représentée par le Minister of National Defence, 2020. ministre de la Défense nationale, 2020. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 46 – PCEMI 46 2019-2020 SOLO FLIGHT HOW ISIS USES SOCIAL MEDIA FOR RECRUITMENT By Maj Ata. AlSarayreh “This paper was written by a candidate “La présente étude a été rédigée par attending the Canadian Forces College un stagiaire du Collège des Forces in fulfillment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is exigences du cours. L'étude est un an academic document, and thus document qui se rapporte au cours et contains facts and opinions which the contient donc des faits et des opinions author alone considered appropriate que seul l'auteur considère appropriés and correct for the subject. It does not et convenables au sujet. Elle ne reflète necessarily reflect the policy or the pas nécessairement la politique ou opinion of any agency, including the l'opinion d'un organisme quelconque, y Government of Canada and the compris le gouvernement du Canada et Canadian Department of National le ministère de la Défense nationale du Defense.
    [Show full text]
  • Course Syllabus Georgetownx
    TERRORISM AND COUNTERTERRORISM: AN INTRODUCTION SELF-PACED COURSE THROUGH MARCH 24, 2018 Course Syllabus GeorgetownX Self-Paced Course through March 24, 2018 GeorgetownX: Terrorism and Counterterrorism: An Introduction SELF-PACED COURSE THROUGH MARCH 24, 2018 TABLE OF CONTENTS Core Faculty ............................................................................................................................................................ 2 Interviews ............................................................................................................................................................... 3 Faculty Support Team ............................................................................................................................................ 3 What is the course about? ..................................................................................................................................... 3 Key Questions .................................................................................................................................................... 4 What does the course include? .............................................................................................................................. 4 Course Section Outline ...................................................................................................................................... 5 What will I learn in the course? .............................................................................................................................
    [Show full text]
  • A Theory of ISIS
    A Theory of ISIS A Theory of ISIS Political Violence and the Transformation of the Global Order Mohammad-Mahmoud Ould Mohamedou First published 2018 by Pluto Press 345 Archway Road, London N6 5AA www.plutobooks.com Copyright © Mohammad-Mahmoud Ould Mohamedou 2018 The right of Mohammad-Mahmoud Ould Mohamedou to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 978 0 7453 9911 9 Hardback ISBN 978 0 7453 9909 6 Paperback ISBN 978 1 7868 0169 2 PDF eBook ISBN 978 1 7868 0171 5 Kindle eBook ISBN 978 1 7868 0170 8 EPUB eBook This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental standards of the country of origin. Typeset by Stanford DTP Services, Northampton, England Simultaneously printed in the United Kingdom and United States of America Contents List of Figures vii List of Tables viii List of Abbreviations ix Acknowledgements x Introduction: The Islamic State and Political Violence in the Early Twenty-First Century 1 Misunderstanding IS 6 Genealogies of New Violence 22 Theorising IS 28 1. Al Qaeda’s Matrix 31 Unleashing Transnational Violence 32 Revenge of the ‘Agitated Muslims’ 49 The McDonaldisation of Terrorism 57 2. Apocalypse Iraq 65 Colonialism Redesigned 66 Monstering in American Iraq 74 ‘I will see you in New York’ 83 3.
    [Show full text]
  • Religious Radicalism After the Arab Uprisings JON B
    Religious Religious Radicalism after the Arab Uprisings JON B. ALTERMAN, EDITOR Radicalism The Arab uprisings of 2011 created unexpected opportunities for religious radicals. Although many inside and outside the region initially saw the uprisings as liberal triumphs, illiberal forces have benefitted after the Arab disproportionately. In Tunisia, formally marginalized jihadi-salafi groups appealed for mainstream support, and in Egypt, the Muslim Brotherhood triumphed in Jon B. Alterman Uprisings elections. Even in Saudi Arabia, not known for either lively politics or for Jon B. Alterman political entrepreneurship, a surprising array of forces praised the rise of “Islamic democracy” under a Muslim Brotherhood banner. Yet, at the same time, the Arab uprisings reinforced regional governments’ advantages. The chaos engulfing parts of the region convinced some citizens that they were better off with the governments they had, and many governments successfully employed old and new tools of repression to reinforce the status quo. Religious Radicalism after the Arab Uprisings In the Middle East, conflicts that many thought were coming to an end Religious Radicalism after the Arab Uprisings will continue, as will the dynamism and innovation that have emerged among radical and opposition groups. To face the current threats, governments will need to use many of their existing tools skillfully, but they will also need to judge what tools will no longer work, and what new tools they have at their disposal. The stakes could not be higher. 1616 Rhode Island Avenue NW Washington, DC 20036 t. 202.887.0200 | f. 202.775.3199 www.csis.org EDITOR Jon B. Alterman Religious Radicalism after the Arab Uprisings Religious Radicalism after the Arab Uprisings Editor Jon B.
    [Show full text]
  • Allison and Barnes
    THE INSTITUTE FOR MIDDLE EAST STUDIES IMES CAPSTONE PAPER SERIES THE ISLAMIC STATE OF IRAQ AND THE LEVANT’S STRATEGIC TREATMENT AND USE OF WOMEN JESSICA ALLISON LOGAN BARNES MAY 2015 THE INSTITUTE FOR MIDDLE EAST STUDIES THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS THE GEORGE WASHINGTON UNIVERSITY © OF JESSICA ALLISON AND LOGAN BARNES, 2015 Table of Contents Introduction ................................................................................................................................... 1 Our Research ................................................................................................................................. 2 Methodology ............................................................................................................................... 4 Complications ............................................................................................................................. 5 Significance ................................................................................................................................. 6 Background: Women and Terrorism ....................................................................................... 11 ISIL’s Historical Use of Women as Suicide Bombers.............................................................. 16 Bureaucratizing Women’s Affairs............................................................................................. 18 Recruitment Policies ................................................................................................................
    [Show full text]
  • Terrorism and the Internet Should Web Sites That Promote 6 Terrorism Be Shut Down? Barbara Mantel
    Terrorism and the Internet Should Web Sites That Promote 6 Terrorism Be Shut Down? Barbara Mantel n March 2008 a participant on the pro al-Qaeda online forum ek-Is.org posted six training sessions for aspiring terrorists. The Ifirst was entitled: “Do you want to form a terror cell?” Using the name Shamil al-Baghdadi, the instructor described how to choose a leader, recruit members and select initial assassination targets. The second lesson outlined assassination techniques.1 “Although the first two training lessons often contain very basic instructions that may be less significant for experienced jihadis, they provide essential training for novices,” said Abdul Hameed Bakier, a Jordanian terrorism expert who translated and summarized the training manual.2 AP Photo/Ellis County Sheriff’s Department AP Photo/Ellis County Sheriff’s The sessions then progressed to more sophisticated topics. Hosam Maher Husein Smadi, a Jordanian teenager in the United States illegally, pleaded not guilty on Oct. 26 Lesson three explained in more detail how to carry out assassina- of trying to blow up a 60-story Dallas skyscraper. tions, including: suicide attacks using booby-trapped vehicles or Smadi reportedly parked a vehicle in the building’s explosive belts; sniper attacks using Russian, Austrian and American garage on Sept. 24 hoping to detonate explosives with rifles and direct attacks through strangling, poison and booby- a cellphone. FBI agents, posing as al-Qaeda trapped cellular phones.3 Lesson four explained how to steal funds, operatives, had been keeping tabs on Smadi after discovering him on an extremist Web site earlier this and the final two lessons gave detailed instructions on how to con- year where he stood out for “his vehement intention to duct “quality terror attacks,” including strikes against U.S.
    [Show full text]
  • United Nations • Nations Unies HEADQUARTERS • SIEGE NEW YORK
    J .. ........... "". - -- -... - [J I I 1/-jl) '87-T- United Nations • Nations Unies HEADQUARTERS • SIEGE NEW YORK. NY 10017 TEL. : I (212) 457. 12 65 • FAX: I ( 212) 457. 4041 COUNTER-TERRORISM COMMITTEE EXECUTIVE DIRECTORATE 11 November 2011 Dear Mr Nambiar, Please find attached a document passed to me by the Secretary-General on 9 November regarding a petition related to an individual who is on the resolution 1267 list. As discussed yesterday, I suggest that this matter be referred to the resolution 1267 Ombudsperson, Ms Kimberley Prost. With best regards Mike Smith Executive Director Counter-Terrorism Committee Executive Directorate UNITED NATIONS • NATIONS UNIES Kimberly Prost Ombudsperson AI Qaidaffaliban Security Council Committee United Nations Headquarters Tel : (212) 963 2671 Office of the Ombudsperson Fax: (212) 963 1300/3778 TB-08041D email: [email protected] New York, NY 10017 USA or [email protected] Web address: http://www.un.org/en/sc/ombudsperson/ SUMMARY AND CASE HISTORY IN THE MATTER OF: YASSIN ABDULLAH KADI AND UNITED STATES OF AMERICA EXTANT 19 SEPTEMBER 2011 Case History Summary File 1- Updated Excerpts by Masood after 22 Jun 2007 below. 2 - From the Katz Rebuttal # 1 report, Page 11 to 34, CHRONOLOGY A brief history of the allegations against Mr Kadi is provided as follows: Date Description 11 Terrorists attacked the World Trade Centre (Twin Towers) in September New York and other prominent US targets. 2001 15 The Office of the Attorney General of Switzerland ("OAGS") September opened a criminal investigation against ''persons unknown" 2001 (inconnus) arising out of the September the 11th attacks because a number of Swiss nationals were victims of the attacks.
    [Show full text]
  • Fields V. Twitter
    Case 3:16-cv-00213 Document 1 Filed 01/13/16 Page 1 of 17 1 BURSOR & FISHER, P.A. L. Timothy Fisher (State Bar No. 191626) 2 Julia A. Luster (State Bar No. 295031) 1990 North California Boulevard, Suite 940 3 Walnut Creek, CA 94596 Telephone: (925) 300-4455 4 Facsimile: (925) 407-2700 E-Mail: [email protected] 5 [email protected] 6 BURSOR & FISHER, P.A. Scott A. Bursor (State Bar No. 276006) 7 888 Seventh Avenue New York, NY 10019 8 Telephone: (212) 989-9113 Facsimile: (212) 989-9163 9 E-Mail: [email protected] 10 UNITED STATES DISTRICT COURT 11 NORTHERN DISTRICT OF CALIFORNIA 12 13 14 TAMARA FIELDS, on behalf of herself, as a Case No. representative of the ESTATE OF LLOYD 15 FIELDS, JR., COMPLAINT 16 Plaintiff, JURY TRIAL DEMANDED 17 v. 18 TWITTER, INC., 19 Defendants. 20 21 22 23 24 25 26 27 28 COMPLAINT Case 3:16-cv-00213 Document 1 Filed 01/13/16 Page 2 of 17 1 Plaintiff Tamara Fields (“Plaintiff”), by and through her attorneys, allege the following 2 against Defendant Twitter, Inc. (“Twitter” or “Defendant”): 3 NATURE OF ACTION 4 1. For years, Twitter has knowingly permitted the terrorist group ISIS to use its social 5 network as a tool for spreading extremist propaganda, raising funds and attracting new recruits. 6 This material support has been instrumental to the rise of ISIS and has enabled it to carry out 7 numerous terrorist attacks, including the November 9, 2015 shooting attack in Amman, Jordan in 8 which Lloyd “Carl” Fields, Jr.
    [Show full text]
  • Middle East Disinformation: 2020 Prospects & Solutions
    Middle East Disinformation: 2020 Prospects & Solutions Social media has transformed the information landscape in the Middle East over the past decade. The 2009 Green Revolution and the 2011 Arab Spring demonstrated the enormous power of platforms like Twitter and Facebook for political organizing. Popular perception in the U.S. at the time was that these services would democratize a region notorious for its strongman governments. But it also showed governments and militants in the Middle East how powerful social media campaigns can be, if coopted for their own purposes. “Like any technological innovation, social media initially favored asymmetric actors — a tool of the weak against the strong. In the Middle East, it was democratic activists who first embraced social media, and terrorist groups soon after them. With time, however, national governments have learned how to harness social media to their own ends. By using their vast resources and economies of scale, these governments can exploit the platforms in ways that loose networks of activists never could.” — Emerson Brooking, Resident Fellow, Digital Forensics Research Lab In Israel’s 2012 Operation Pillar of Defense against Hamas in Gaza, supporters of both the Israel Defense Forces (IDF) and Hamas took to Twitter to support their own sides. Official IDF Twitter accounts would share videos of civilians fleeing to bomb shelters and warn of Israel’s determination to bring terrorists to justice, while accounts aligned with Hamas would share gruesome images of civilian casualties and threats of righteous retaliation. When ISIS rose to power in 2014, it unleashed the most sophisticated and disturbing terrorist propaganda campaign in history, driving Americans’ fear of terrorism higher than it was in the immediate aftermath of 9/11.
    [Show full text]
  • Analysis and Evolution of the Global Jihadist Movement Propaganda
    Terrorism and Political Violence, 18:399–421, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0954-6553 print=1556-1836 online DOI: 10.1080/09546550600751990 Analysis and Evolution of the Global Jihadist Movement Propaganda MANUEL R. TORRES Department of Public Law, University Pablo Olavide, Seville, Spain JAVIER JORDA´ N Department of Political Science, University of Granada, Spain NICOLA HORSBURGH International Policy Institute King’s College, London, England The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. Keywords Al Qaeda, communication, Jihad, propaganda, terrorism Introduction Al Qaeda and the various other associated groups that form what we will here label the Global Jihadist Movement (GJM), have, as is true of any terrorist organization, a pronounced need for public communication. Violence in and of itself, despite the magnitude and spectacular levels it can reach, is never sufficient to achieve the ulti- mate aims of terrorists. Violence has as its purpose destroying that which it considers the enemy and spreading fear in the affected population. However, at the same time it is a mechanism that permits transmission of content. On said occasions this mess- age is transmitted via symbols used in communique´s or through the interpretation the population will ‘‘read into’’ the attacks themselves. Nevertheless, on most occasions this act of communication does not occur so subtly, and murder, threats, or kidnappings convert themselves into macabre remin- ders that permit the terrorist group to concentrate public opinion so its message is heard.
    [Show full text]