Leaderless Jihad West Point Ctc Summaries

Total Page:16

File Type:pdf, Size:1020Kb

Leaderless Jihad West Point Ctc Summaries ALL FEl INFflRNITIuII CONTAINED NEPEIN Tl1JCLPSIFIED DATE O1 LI 5l DIm1shn WEST POINT CTC SUMMARIES IC LEADERLESS JIHAD Terror Networks in the Twenty-First Century flivcrsit\ Pclms\ 1\ jnia Press 2015 The Islamist terrorist threat is radicalization Dr Marc Sageman MD global rapidly evolving process Islamic terror networks of the twenty-first century are before it reaches its Ph.D is forensic psychia more fluid and violent end The most effective trist and government coun becoming independent unpredictable than their more structured forebears that conducted countermeasure to tcrtcrrorism consultant He This book builds combat the homegrown holds various academic and die 9/11 attacks The present direat in the West has upon Dr Sagemans terrorist threat is evolved from infiltration outside trained includ by terronsts to the professional positions previous volume interrupt Scholar in Residence against ivhom international cooperation and border radicalization process ing at Understanding Ter before effective it reaches its the York Police protection are to homegrown self-financed New Depart ror 1\Tetlrorks 2004 vioient end Senior Fellow the self-trained terrorists Dr Sageman describes this ment at and utilizes die same scattered network of wannabes Research In global homegrown Porcign Policy approach of apply- as leaderless ihad The that form this stitute and Clinical Assistant groups ing the scientific method to the study of terronsm movement are physically uncoimected from al Qaeda Professor at the University Whereas in his book the author worked from previous of oth and eacb other yet form violent virtual social move Pennsylvania among dataset of 172 terrorist subjects in .LeaderleisJilad ment Ihe most effective countermeasure to combat ers Dr Sageman joined the he has built database of over 501 terrorists from this homegrown terronsm threat is to the Central Intelligence Agency mterrupt which to draw conclusions in 1984 He spent year on UNDERSTANDING THE PATH TO RADICALISM the Afghan Task Force then Dr with anecdotal about he faced second Pakistani went to Islamabad from 1987 Sageman begms an story as generation growmg Ahrned Oniar Saeed the man convicted of in London Whde media accounts of to 1989 where he ran the Sheikh up typically U.S midatcral with kidnapping WinY Street Journal reporter Daniel Pearl fer simplistic model to explain why one chooses programs The author follows his hfe from accounts of his Dr that the trne is the Afghan Muj alacdin and early terrorism Sageman argues story chddhood from and friends later nuanced and different New Delhi from 19899 In famdy to accounts much more complex Despite of Omar Skedebs life from fellow nunates Ins accounts from fellow nid even 1991 he resigned from the dunug fiunily friends nunates Several accounts in the mediahe Omar himself to his toward violence agency to return to medicine impnsonment explain path was such nice the conventional wisdom Oinars reveals the of the radicalization Since 1994 he has been in the gnybetray story centrality that there is with terror In this book Dr seeks to private practice of forensic inherenily something wrong process Sageman develop ists Other accounts Omars terrorist career into this radicalization and devise and clinical psychiatry and explain insights process as the natural result of ahenation and discrimination recommendations to it has had the opportunity to practical interrupt evaluate about 500 murder HOW TO STUDY TERRORISM IN THE TWENTY-FIRST CENTURY ers Afier 9/11 Dr Sageman Dr that the fruitftd method for for that seeks Sageman argues most middle-range analytical approach began collecting biographi the study of terrotism and the radicalization process to bridge the gap between biographical micro-level cal material on about 500 al involves the of the scientific accounts of terrorist and broad Qaeda terrorists to test the rigorous application subjects sociological method using such tools as statistics sampling theory macro level explanations of tcrronsm This middle validity of the conventional survey techniques measurement and data analysis range approach anns to study the relationships of wisdom on terrorism He is The scientific method helps avoid biases inherent in terrorists in context their relationship with each the author of the bestselling several common approaches to the study of terrotism other their relationship with ideas present their Understanding Terror Networks Por example the popular biographical approach as environment and their relationship with people and University of Pennsylvania seen ni the previous chapters stor1 of Aluned Oiuar organizations outside of their group Press 2004 Saeed Sheikh overly emphasizes the individual and In LeaderlessJihad the author limits the scope of his ignores situational factors On the other hand study to what he terms global Islamist terrorists broad root causes approach examining the social of which the is al most recognizable quantity Qaeda conditions that lead individuals to become terrorists and its affiliated social movement As he puts it the is ovedy deterministic and static Dr Sageman calls ACLURM046386 FB1045286 LEADERLESS HOW TO STUDY TERRORISM IN THE TWENTY-FIRST CENTURY CONT 500 in his for the Memorial Institute trir the Prevention of Itirrorisms Itir subjects sample are the men responsible Sep- MIFF tember 11 2001 attacks and all those who like them threaten ronsm Knowledge Base or the National Counterterrorism Centers the United States and the West behalf uf World Incidence these incident-based un larger community NCTC Tracking System the vanguard trying to establish certnn vision of an Islamist tools lend themselves to the stndy of certain general trends in utopia Dr Sageman constructed this data set from scratch utiliz- terrorism such as the frequency of terrorist operarions They ing captured documents court records investigative journalism typically do not offer the appropriate level of granularity to study academic publications and other open source informarion While the radicalizarion process the authors primary goal he could have used an existing open source database such as the THE GLOBALIZATION OF JIHADI TERROR In chapter two Dc Sageman makes distincrion between al Qaeda author also notes that there is tremendous diversity of beliefs and the orgairization and the broader jihadi social movement While doctrines widun fins Salafi movement Must Salafis advocate die he feels that using the term al Qaeda to describe both the social peaceful transformation of society through face-to-face preach movement and the specific organizarion muddles our thinking on ing Otherssuch as the Egyprian Muslim Brotherhoodcall the subject he fears itis too late to overcome popular usage of the for the creation of vanguard polirical party to compete at the term Al Qaeda originally referred to the name of the organization polls Over rime some factions of this movement eschewed the formed by Osama bin Laden whose members swore allegiance ballot box and missionary work beheving the state could never him and his heutenants Dr be These instead chose bqyatin Arabic to designated Sage captured through peaceful means groups man argues that this corewhat he calls al Qaeda Centralhas violence to broadcast their message faded in in result of the of importance recent years as closing Among those who called for violent jihad debate emerged training camps in Afghanistan the halt of financial transfers and in the 970s about whether to focus their efforts on the near the capture or killing of key personnel However while al Qaeda local the far Israeli enemy the ruler or enemy the state at Central is constrained the looser social movement is expanding that time Sayyid Qutb and his main disciple Muhammad Abdcl The al Qaeda social movement consists of informal terrorist Salam Faraj were two of the most eloquent thinkers to advocate networks the that mobihze take violent across globe people to up violent jihadist tacrics at this rime Paraj argued that the move jihad Whdc these groups are not linked organizarionally they ment could not take on the far enemy unril the near enemy was are part of larger terrorist campaign and are linked together by defeated However by die mid-1990s die followers of Qutb and mutual of and feelings sobdarity general ideology had overthrown of their and became Paraj not any governments Dr Sageman contrasts the al Qaeda brand of terronsm with earher frustrated hardline faction emerged from this movement which terrorist that included and that the far this the but movements anarchism anti-colonialism argued enemyin ease \Mist especially Al left-wing radicalism Qaedas terronsm like other fourth wave the United States and Prancewas propping up the near enemy religions terrorist movements is built ou the belief that the world Those jihadis that took up the strategy of expelling the far enemy has decayed into morass of greed and moral depravity While from the Middle East comprise theg/sboillslamist terrorists and are most global jihadists today generally follow Salafist ideology the primary subjects of this book Groups that continue to target referring to revivahst Islamist ideology that blames Western the near enemysuch as Hamas or Hezbollahare beyond the influence for corrnpring the virtuous Muslim communitythe scope of the authors study THE JIHADISTS PROFILE In this chapter Dc Sageinan walks through some of the most invasion generation The most visible portion of this wave arc common myths about what drives individuals to terrorism and second and third generation inamigrants in Europe
Recommended publications
  • 15-L-1645/0 0 0 /194
    (b )( 1) (b)(3) NatSecAct TS::SC'l' Verbatim Transcript of Combatant Status Review Tribunal Hearing for IS'.'1 10024 OPENING REPORTER : On the record RECORDER: All rise. PRESIDENT: Remain seated and come to order. Go nhead. Recorder. RECORDER: This Tribunal is being conducle<l at 1328 March 10, 200 ; on board C.S. Naval Base Guantanamo Bav. Cuba. The following personnel are present: Captain (b)(6) United Slates Navy, President Lieutenant Colonel b) 6) • t..:nited States Air Force. Member Lieutenant Colonel (b)(6) United States Marine Corps. Member Lieutenant Colonel (b)(6) , United States Air F11rce, Personal Re pre sen ta the Language Analysis.+.--,...,..,,.,.---. (b)(6) ......... ..,.... Gunnery Sergeant (b)(6) l nited States Marine Corps. Reporter Lieutenant Colonel'-P!!~~) --"" . United States Anny, Recorder Captain (b)(6) 1:; c ge Advocate member »fthe Tribunal. OATH SESSION 1 RECORDER: All Rise. PRESIDE!\T: The Recorder will be sworn. Do you, Lieutenant Colonel j(b)(6) I solemnly swear that you will faithfully pcrfonn the duties as Recorder assigned in this Tribunai so help you God'' RECORDER: I do. PRESIDENT: The Reponer will now be :;worn. The Recorder will administer the oath. RECORDER: ()o you Gunnery Sergeant l(b)(6) ~wear or affinn that y<•u will faithfully <lis~: harge )'Our duties as Reporter assigned in this Tribunal ro help you God? REPORTER: I do. PRESIDENT: The Translator will be sworn. JSN #10024 Enclosure (3) Page I of27 (b )( 1) (b)(3) NatSecAct 15-L-1645/0 0 0/194 (b }( 1) (b)(3) NatSecAct TS:lSCJt RECORDER: Do you swear or affinn that you will faithrully perform 1he duties ofTranslaror in the case now in hearing so help you God? TRANSLATOR: I do PRESIDEN I': We will take a brief recess now in order in lo bring Detainee into the room.
    [Show full text]
  • Video-Recorded Decapitations - a Seemingly Perfect Terrorist Tactic That Did Not Spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER
    DIIS working paper DIIS WORKING PAPER 2011:08 Video-recorded Decapitations - A seemingly perfect terrorist tactic that did not spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER 1 DIIS WORKING PAPER 2011:08 MARTIN HARROW MSC, PhD, Consulting Analyst at DIIS [email protected] DIIS Working Papers make available DIIS researchers’ and DIIS project partners’ work in progress towards proper publishing. They may include important documentation which is not necessarily published elsewhere. DIIS Working Papers are published under the responsibility of the author alone. DIIS Working Papers should not be quoted without the express permission of the author. DIIS WORKING PAPER 2011:08 © Copenhagen 2011 Danish Institute for International Studies, DIIS Strandgade 56, DK-1401 Copenhagen, Denmark Ph: +45 32 69 87 87 Fax: +45 32 69 87 00 E-mail: [email protected] Web: www.diis.dk Cover Design: Carsten Schiøler Layout: Ellen-Marie Bentsen Printed in Denmark by Vesterkopi AS ISBN: 978-87-7605-449-6 Price: DKK 25.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk 2 DIIS WORKING PAPER 2011:08 CONTENTS Abstract 4 Introduction 5 Decapitation as a weapon 5 Video-recorded decapitations 2002-2009 8 The reproductive dynamics of terrorist tactics 11 The accessibility of video-recorded decapitations as a tactic 12 Effectiveness of terrorism – impacting two different audiences 14 Why not video-recorded decapitations? 18 Iraq 18 Afghanistan 19 The West 20 Conclusion 21 List of References 23 DIIS WORKING PAPER 2011:08 ABSTracT Video-recorded decapitations have an enormous impact, they are cheap and easy, and they allow the terrorists to exploit the potential of the Internet.
    [Show full text]
  • Pakistan's Terrorism Dilemma
    14 HUSAIN HAQQANI Pakistan’s Terrorism Dilemma For more than a decade, Pakistan has been accused of sup- porting terrorism, primarily due to its support for militants opposing Indian rule in the disputed Himalayan territory of Jammu and Kashmir. Until September 11, 2001, Islamabad was also the principal backer of the Taliban regime in Afghanistan. Although Pakistan has now become a key U.S. ally in the war against terrorism, it is still seen both as a target and staging ground for terrorism. General Pervez Musharraf ’s military regime abandoned its alliance with the Taliban immediately after the terrorist attacks in New York and Washington. U.S. forces were allowed the use of Pakistani air bases for operations in Afghanistan. Pakistani intelligence services provided, and continue to provide, valuable information in hunting down Taliban and al-Qaeda escapees. The Pakistani military is cur- rently working with U.S. law enforcement officials in tracking down terrorists in the lawless tribal areas bordering Afghanistan. In a major policy speech on January 12, 2002, Musharraf announced measures to limit the influence of Islamic militants at home, including those previously described by him as “Kashmiri free- dom fighters.” “No organizations will be able to carry out terrorism 351 352 HUSAIN HAQQANI on the pretext of Kashmir,” he declared. “Whoever is involved with such acts in the future will be dealt with strongly whether they come from inside or outside the country.”1 Musharraf ’s supporters declared his speech as revolutionary.2 He echoed the sentiment of most Pakistanis when he said, “violence and terrorism have been going on for years and we are weary and sick of this Kalashnikov culture … The day of reckoning has come.” After the speech, the Musharraf regime clamped down on domes- tic terrorist groups responsible for sectarian killings.3 But there is still considerable ambivalence in Pakistan’s attitude toward the Kashmiri militants.
    [Show full text]
  • Torture and the Cruel, Inhuman and Degrading Treatment of Detainees: the Effectiveness and Consequences of 'Enhanced
    TORTURE AND THE CRUEL, INHUMAN AND DE- GRADING TREATMENT OF DETAINEES: THE EFFECTIVENESS AND CONSEQUENCES OF ‘EN- HANCED’ INTERROGATION HEARING BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES OF THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION NOVEMBER 8, 2007 Serial No. 110–94 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 38–765 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 15:46 Jul 29, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 H:\WORK\CONST\110807\38765.000 HJUD1 PsN: 38765 COMMITTEE ON THE JUDICIARY JOHN CONYERS, JR., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ROBERT C. ‘‘BOBBY’’ SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California WILLIAM D. DELAHUNT, Massachusetts CHRIS CANNON, Utah ROBERT WEXLER, Florida RIC KELLER, Florida LINDA T. SA´ NCHEZ, California DARRELL ISSA, California STEVE COHEN, Tennessee MIKE PENCE, Indiana HANK JOHNSON, Georgia J. RANDY FORBES, Virginia BETTY SUTTON, Ohio STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona TAMMY BALDWIN, Wisconsin LOUIE GOHMERT, Texas ANTHONY D.
    [Show full text]
  • Global War on Terrorism and Prosecution of Terror Suspects: Select Cases and Implications for International Law, Politics, and Security
    GLOBAL WAR ON TERRORISM AND PROSECUTION OF TERROR SUSPECTS: SELECT CASES AND IMPLICATIONS FOR INTERNATIONAL LAW, POLITICS, AND SECURITY Srini Sitaraman Introduction The global war on terrorism has opened up new frontiers of transnational legal challenge for international criminal law and counterterrorism strategies. How do we convict terrorists who transcend multiple national boundaries for committing and plotting mass atrocities; what are the hurdles in extraditing terrorism suspects; what are the consequences of holding detainees in black sites or secret prisons; what interrogation techniques are legal and appropriate when questioning terror suspects? This article seeks to examine some of these questions by focusing on the Global War on Terrorism (GWOT), particularly in the context of counterterrorism strategies that the United States have pursued towards Afghanistan-Pakistan (Af-Pak) since the September 2001 terror attacks on New York and Washington D.C. The focus of this article is on the methods employed to confront terror suspects and terror facilitators and not on the politics of cooperation between the United States and Pakistan on the Global War on Terrorism or on the larger military operation being conducted in Afghanistan and in the border regions of Pakistan. This article is not positioned to offer definitive answers or comprehensive analyses of all pertinent issues associated with counterterrorism strategies and its effectiveness, which would be beyond the scope of this effort. The objective is to raise questions about the policies that the United States have adopted in conducting the war on terrorism and study its implications for international law and security. It is to examine whether the overzealousness in the execution of this war on terror has generated some unintended consequences for international law and complicated the global judicial architecture in ways that are not conducive to the democratic propagation of human rights.
    [Show full text]
  • No Torture. No Exceptions
    NO TORTURE. NO EXCEPTIONS. The above sketch by Thomas V. Curtis, a former Reserve M.P. sergeant, is of New York Times an Afghan detainee, Dilawar, who was taken into U.S. custody on December 5, 2002, and died five days later. Dilawar was deprived of sleep and chained to the ceiling of his cell—techniques that the Bush administration has refused to outlaw for use by the CIA. Further, his legs were, according to a coroner, “pulpified” by repeated blows. Later evidence showed that Dilawar had no connection to the rocket attack for which he’d been apprehended. A sketch by Thomas Curtis, V. a Reserve M.P./The 16 January/February/March 2008 Introduction n most issues of the Washington Monthly, we favor ar- long-term psychological effects also haunt patients—panic ticles that we hope will launch a debate. In this issue attacks, depression, and symptoms of post-traumatic-stress Iwe seek to end one. The unifying message of the ar- disorder. It has long been prosecuted as a crime of war. In our ticles that follow is, simply, Stop. In the wake of Septem- view, it still should be. ber 11, the United States became a nation that practiced Ideally, the election in November would put an end to torture. Astonishingly—despite the repudiation of tor- this debate, but we fear it won’t. John McCain, who for so ture by experts and the revelations of Guantanamo and long was one of the leading Republican opponents of the Abu Ghraib—we remain one. As we go to press, President White House’s policy on torture, voted in February against George W.
    [Show full text]
  • An Analysis of the Confession of Khalid Sheikh Muhammad in the Development of Themes for the Interrogation of Islamic Fundamentalist Terrorist Suspects
    An Analysis of the Confession of Khalid Sheikh Muhammad An Analysis of the Confession of Khalid Sheikh Muhammad in the Development of Themes for the Interrogation of Islamic Fundamentalist Terrorist Suspects Louis C. Senese and Philip A. Mullenix The evolution of strategies for the By definition, interrogation themes are interrogation of Islamic fundamentalist the arguments (when presented in monologue terrorists has been a challenge to United fashion by the interrogator to the subject) States military and intelligence case officers which provide reasons and excuses to for multiple reasons. Traditional doctrines psychologically (not legally) justify a subject’s covering the interrogation of criminals and behavior. By rationalizing a subject’s behavior military prisoners do not apply well enough to within the framework of that subject’s the unconventional and extremist enemy mentality and beliefs, the interrogator encountered in Iraq and Afghanistan. facilitates the subject’s task of self incrimination. Effective interrogation is complicated by Al Qaeda’s proactive education of its An exceptional opportunity has terrorist agents on countermeasures which emerged to study the conduct, motives, are detailed within the Al Qaeda Jihad mentality, and beliefs of the Islamic Training Manual. The Manual is a fundamentalist terrorist from the words of one combination of political/religious indoctrina- of Al Qaeda’s most prolific terrorists. On 10 tion as well as a tactical handbook on matters March 2007, during his Combatant Status ranging from
    [Show full text]
  • The Pearl Project the Truth Left Behind
    The Pearl Project The Truth Left Behind Inside the Kidnapping and Murder of Daniel Pearl THE INTERNAtiONAL CONSORtiUM THE CENTER FOR ICIJ OF INVEStiGAtiVE JOURNALISTS PUBLIC INTEGRITY SHOW CONTENTS The Pearl Project The Truth Left Behind Inside the Kidnapping and Murder of Daniel Pearl 4 Author’s Note 12 Key Findings The Pearl Project spent more than three years investigating the roles of 27 men linked to the 2002 kidnapping and murder of Wall Street Journal reporter Daniel Pearl 16 Part 1: Finishing Danny’s Work Pakistani and U.S. officials are led to the remains of Daniel Pearl four months after his kidnapping by a miltant arrested for an unrelated hotel bombing. 25 Part 2: Baiting the Trap After “shoe bomber” Richard Reid tries to blow up a jet in late 2001, Pearl investigates if Reid had ties to a radical Pakistani cleric, Sheik Mubarak Ali Shah Gilani, and tries to arrange a meeting with him. 31 Part 3: Trapping the Journalist British-born Omar Sheikh, once jailed for allegedly kidnapping Western tourists, offers to introduce Pearl to the extremist Muslim leader Sheik Mubarak Ali Shah as part of a trap to kidnap the journalist. 38 Part 4: Finding a Safehouse Omar Sheikh recruits a team to kidnap Pearl, finds a Karachi safe house to keep Pearl in captivity, and hires messengers to tell the world of the kidnapper’s demands. 46 Part 5: Kidnapping the Journalist Pearl is picked up on Jan. 23, 2002, for a promised introduction to a radical cleric, but is instead taken to a remote area where guards chain him to an old car engine in a small building.
    [Show full text]
  • IMAGINE a WORLD Without Hate™
    IMAGINE A WORLD without hate™ VIDEO EDUCATOR’S GUIDE The Anti-Defamation League Honoring 100 Years. Fighting Hate. Building a Better World. Barry Curtiss-Lusher, National Chair Barbara B. Balser, Centennial Chair Abraham H. Foxman, National Director Kenneth Jacobson, Deputy National Director Clifford Schechter, Director, National Development Esta Gordon Epstein, Chair, Education Committee David Waren, Director, Education Division Lorraine Tiven, Director of Education Programs Jennifer E. Smith, Director, National Special Projects Beth Yohe, Associate Director, Training and Curriculum © 2013 Anti-Defamation League All rights reserved Printed in the United States of America No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and recording, or by an information storage and retrieval system for any purposes other than intended and described in this publication without permission in writing from the publisher. Anti-Defamation League 605 Third Avenue New York, NY 10158-3560 (212) 885-7700/885-7800 (212) 867-0779/490-0187 (Fax) www.adl.org IMAGINE A WORLD WITHOUT HATE™ VIDEO EDUCATOR’S GUIDE ABOUT THIS GUIDE In honor of its Centennial Year in 2013, the Anti-Defamation League (ADL) launched the Imagine a World Without Hate video and action campaign, and we invite you and your classroom to participate. After 100 years of fighting bigotry and fostering respect, we are celebrating our successes, while at the same time recognizing that there is still much more work to be done. The theme for our Centennial is Imagine a World Without Hate—a dream we hope to make a reality.
    [Show full text]
  • On Assignment: a Guide to Reporting in Dangerous Situations
    On Assignment: A Guide to Reporting in Dangerous Situations The publication of this handbook was made possible by the following contributors: Andrews McMeel Publishing CNN The Ethics and Excellence in Journalism Foundation The Gannett Foundation The Poynter Institute Table of Contents On Assignment: A Guide to Reporting in Dangerous Situations I. Introduction.......................................................................1 II. Who is at Risk?................................................................ 5 III. Covering Conflict............................................................7 Training.................................................................................................... 8 How do you decide whether it is best to blend in or be clearly identified as a journalist while working in a combat zone? by Charles Hanley..............................................................................8 Security Training Courses.................................................................8 Biochemical Courses.......................................................................10 Security Training Firms....................................................................10 Security Literature............................................................................14 Funding for Security Courses..........................................................14 Protective Gear......................................................................................15 Body Armor......................................................................................15
    [Show full text]
  • Video-Recorded Decapitations - a Seemingly Perfect Terrorist Tactic That Did Not Spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER
    DIIS working paper DIIS WORKING PAPER 2011:08 Video-recorded Decapitations - A seemingly perfect terrorist tactic that did not spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER 1 DIIS WORKING PAPER 2011:08 MARTIN HARROW MSC, PhD, Consulting Analyst at DIIS [email protected] DIIS Working Papers make available DIIS researchers’ and DIIS project partners’ work in progress towards proper publishing. They may include important documentation which is not necessarily published elsewhere. DIIS Working Papers are published under the responsibility of the author alone. DIIS Working Papers should not be quoted without the express permission of the author. DIIS WORKING PAPER 2011:08 © Copenhagen 2011 Danish Institute for International Studies, DIIS Strandgade 56, DK-1401 Copenhagen, Denmark Ph: +45 32 69 87 87 Fax: +45 32 69 87 00 E-mail: [email protected] Web: www.diis.dk Cover Design: Carsten Schiøler Layout: Ellen-Marie Bentsen Printed in Denmark by Vesterkopi AS ISBN: 978-87-7605-449-6 Price: DKK 25.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk 2 DIIS WORKING PAPER 2011:08 CONTENTS Abstract 4 Introduction 5 Decapitation as a weapon 5 Video-recorded decapitations 2002-2009 8 The reproductive dynamics of terrorist tactics 11 The accessibility of video-recorded decapitations as a tactic 12 Effectiveness of terrorism – impacting two different audiences 14 Why not video-recorded decapitations? 18 Iraq 18 Afghanistan 19 The West 20 Conclusion 21 List of References 23 DIIS WORKING PAPER 2011:08 ABSTracT Video-recorded decapitations have an enormous impact, they are cheap and easy, and they allow the terrorists to exploit the potential of the Internet.
    [Show full text]
  • Pakistan / Alan Wachtel
    ALAN WACHTEL © 2009 Rourke Publishing LLC All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical including photocopying, recording, or by any information storage and retrieval system without permission in writing from the publisher. www.rourkepublishing.com PHOTO CREDITS: ARIF ALI/AFP/Getty Images: pp. 11, 35; Terry Ashe/Time Life Pictures/Getty Images: p. 26; Bernard Bisson/Sygma/Corbis: p. 25; Margaret Bourke-White/Times Life Pictures/Getty Images: p. 18; Getty Images: pp. 24, 37; ASIF HASSAN/AFP/Getty Images: p. 7; Aman Khan/istock: p. 19; Banaras Khan/AFP/Getty Images: p. 40; Danish Khan/istock: p. 14; Saeed Khan/AFP/Getty Images: pp. 28, 31; Library of Congress: pp. 13, 17; John Moore/Getty Images: p. 8; narvikk/istock: p. 29; Daniel Pearl Foundation: p. 34; AAMIR QURESHI/AFP/Getty Images: pp. 5, 39; Christian Simonpietri/Sygma/Corbis: p. 22; Ron Summers/istock: p. 21; Transport Security Administration: p. 32; U.S. Marine Corps: p. 33; Wojclech Zwierzynski/istock: p. 12. Cover picture shows supporters of opposition leader, Benazir Bhutto, during an anti-government protest in November 2007. (Mohsin Raza/Reuters/Corbis) Produced for Rourke Publishing by Discovery Books Editor: Gill Humphrey Designer: Keith Williams Map: Stefan Chabluk Photo researcher: Rachel Tisdale Library of Congress Cataloging-in-Publication Data Wachtel, Alan, 1968- Pakistan / Alan Wachtel. p. cm. -- (Countries in crisis) ISBN 978-1-60472-352-6 1. Pakistan--Juvenile literature. I. Title. DS376.9.W33 2009 954.91--dc22 2008025141 Printed in the USA CONTENTS Chapter 1: Return of the Exiles 4 Chapter 2: Land and Early History 10 Chapter 3: Independent Pakistan 16 Chapter 4: The Bhuttos 24 Chapter 5: The Musharraf Years 30 Chapter 6: A Dangerous Place 36 Timeline 43 Pakistan Fact File 44 Glossary 46 Further Information 47 Index 48 3 CHAPTER ONE RETURN OF THE EXILES n the fall of 2007, Pakistan’s Pakistan’s Supreme Court Igovernment was getting ready opposed Musharraf’s wish to remain for elections.
    [Show full text]