Homegrown Terrorism”—Extremist Violence Perpetrated by U.S
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Internet and the Radicalization of Muslim Women
The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online. -
Framing 'Jihadjane'
What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press Maura Conway Dublin City University, Ireland Lisa McInerney University of Limerick, Ireland Abstract The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts. Keywords: female, framing, gender, jihadi, Colleen LaRose, newspapers, press, terrorism, women __________________________________________________________________________________ Introduction This article analyses US press reports on a woman and two men arrested in the US in 2009 and 2010 for their parts in three separate jihadi terrorist plots. The female plotter is widely known as ‘JihadJane’, which was an online pseudonym for Colleen LaRose, an American woman charged with four terrorism-related offences and taken into custody by US law enforcement at Philadelphia International Airport on her return from Europe in October 2009 (Shiffman, 2011).[1] LaRose is accused of using the internet to recruit individuals for the purpose of engaging in violent jihad, to include the murder of Swedish cartoonist Lars Vilks. -
Current and Projected National Security Threats to the United States
S. HRG. 111–557 CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES HEARING BEFORE THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS SECOND SESSION FEBRUARY 2, 2010 Printed for the use of the Select Committee on Intelligence ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 56–434 PDF WASHINGTON : 2010 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:49 Aug 02, 2010 Jkt 055045 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\DOCS\56434.TXT SHAUN PsN: DPROCT SELECT COMMITTEE ON INTELLIGENCE [Established by S. Res. 400, 94th Cong., 2d Sess.] DIANNE FEINSTEIN, California, Chairman CHRISTOPHER S. BOND, Missouri, Vice Chairman JOHN D. ROCKEFELLER IV, West Virginia ORRIN G. HATCH, Utah RON WYDEN, Oregon OLYMPIA J. SNOWE, Maine EVAN BAYH, Indiana SAXBY CHAMBLISS, Georgia BARBARA A. MIKULSKI, Maryland RICHARD BURR, North Carolina RUSSELL D. FEINGOLD, Wisconsin TOM COBURN, Oklahoma BILL NELSON, Florida JAMES E. RISCH, Idaho SHELDON WHITEHOUSE, Rhode Island HARRY REID, Nevada, Ex Officio MITCH MCCONNELL, Kentucky, Ex Officio CARL LEVIN, Michigan, Ex Officio JOHN MCCAIN, Arizona, Ex Officio DAVID GRANNIS, Staff Director LOUIS B. TUCKER, Minority Staff Director KATHLEEN P. MCGHEE, Chief Clerk (II) VerDate Nov 24 2008 14:49 Aug 02, 2010 Jkt 055045 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 C:\DOCS\56434.TXT SHAUN PsN: DPROCT CONTENTS FEBRUARY 2, 2010 OPENING STATEMENTS Feinstein, Hon. -
How Anwar Al-Awlaki Became the Face of Western Jihad
As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and -
News Digest, Mumbai : Wednesday, November 18, 2009
NEWS DIGEST, MUMBAI : WEDNESDAY, NOVEMBER 18, 2009 International Security- DAVID HEADLEY CHASE Strong Headley links to 26/11. LeT operative called up contact in Pakistan ahead of terror attack. NIA gives Rahul Bhatt a clean chit, says he is a ‘witness’ and not a ‘suspect’. ( DNA, Mumbai) There is evidence to prove that Pakistan High Commission officials were in touch with David Headley and Rana ( Navbharat Times, Hindi ) Headley’s ‘meditation’ in Pune. The Osho Ashram in Pune has bungled by not sharing information about its foreign guests with the local police as per the law. ( Sakaal, Marathi) David Headley’s Bollywood connection being probed. Besides Rahul Bhatt, the terror suspect was also friendly with Imran Hashmi and Vivek Oberoi. He had also met Kangana Ranaut ( Lokmat, Marathi ) US -CHINA Obama’s Chin Chin Chu: In a major shift in its stand, United States has said Tibet is very much a part of China and called for talks between Beijing and Dalai Lama (Saamana / Loksatta, Marathi ) FINANCE SEBI to insist on margins upfront in cash - India’s capital markets regulator plans to make it mandatory for brokers to collect money upfront as margin from all investors before initiating trades in cash segment. SEBI’s Senior official said ,”It is not very transparent how brokers manage risk if client default is there, to avoid it we want to make client –level margin compulsory in the cash segment”.( Mint ) ENVIRONMENT Like US, government denies climate change” Environment activist Vandana Shiva has accused the Indian Government of toeing the US line on Climate change. -
The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan. -
David Coleman Headley: Tinker, Tailor, American, Lashkar-E-Taibah, ISI Spy
David Coleman Headley: Tinker, Tailor, American, Lashkar-e-Taibah, ISI Spy Introduction David Coleman Headley, the monstrous Lashkar-e-Taibah (LeT) terrorist who played a vital role on behalf of the LeT and its patron, the Pakistani intelligence agency the Inter-Services Intelligence (ISI), in carrying out the November 2008 Mumbai terrorist attacks and is presently serving a 35-year prison term in the US, has been in the news on multiple accounts in the last few weeks. Reports in the media in late July claimed that Headley had been brutally attacked by two prison inmates and had suffered grievous injuries. He had been rushed to the critical care unit of North Evanston hospital in Chicago, where he was battling for his life. However, a day after they appeared, Headley's lawyer John Theis refuted these media reports saying that "I am in regular communication with Headley. There is no basis for the reports…. Although I cannot disclose his location, he is neither in Chicago nor in a hospital". It therefore transpires that either the media have been patently ill-informed or Headley's lawyer is very keen to keep the attack under wraps. Why the media would want to waste valuable print space on an incident that never occurred is as baffling as any effort by Headley's lawyer to hush up a beating that his client was subjected to. That said, there is really little about Headley that is not intriguing. Headley again figured in the news in the third week of August when the Pakistan government took the daft and highly insensitive decision to include Headley's half-brother, Daniyal Gilani, in the official four-member delegation that it sent to New Delhi to attend the last rites of former Indian Prime Minister Atal Bihari Vajpayee. -
Style Attacks and the Threat from Lashkar-E-Taiba
PROTECTING THE HOMELAND AGAINST MUMBAI- STYLE ATTACKS AND THE THREAT FROM LASHKAR-E-TAIBA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JUNE 12, 2013 Serial No. 113–21 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–686 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T. -
Jihadist Violence: the Indian Threat
JIHADIST VIOLENCE: THE INDIAN THREAT By Stephen Tankel Jihadist Violence: The Indian Threat 1 Available from : Asia Program Woodrow Wilson International Center for Scholars One Woodrow Wilson Plaza 1300 Pennsylvania Avenue NW Washington, DC 20004-3027 www.wilsoncenter.org/program/asia-program ISBN: 978-1-938027-34-5 THE WOODROW WILSON INTERNATIONAL CENTER FOR SCHOLARS, established by Congress in 1968 and headquartered in Washington, D.C., is a living national memorial to President Wilson. The Center’s mission is to commemorate the ideals and concerns of Woodrow Wilson by providing a link between the worlds of ideas and policy, while fostering research, study, discussion, and collaboration among a broad spectrum of individuals concerned with policy and scholarship in national and interna- tional affairs. Supported by public and private funds, the Center is a nonpartisan insti- tution engaged in the study of national and world affairs. It establishes and maintains a neutral forum for free, open, and informed dialogue. Conclusions or opinions expressed in Center publications and programs are those of the authors and speakers and do not necessarily reflect the views of the Center staff, fellows, trustees, advisory groups, or any individuals or organizations that provide financial support to the Center. The Center is the publisher of The Wilson Quarterly and home of Woodrow Wilson Center Press, dialogue radio and television. For more information about the Center’s activities and publications, please visit us on the web at www.wilsoncenter.org. BOARD OF TRUSTEES Thomas R. Nides, Chairman of the Board Sander R. Gerber, Vice Chairman Jane Harman, Director, President and CEO Public members: James H. -
CTX Vol 2 No 4
Vol. 2, No. 4 | CTX EDITORIAL STAFF From the Editor MICHAEL FREEMAN Executive Editor Welcome to our first special issue of CTX, “Social Media in Jihad and ANNA SIMONS Executive Editor Counterterrorism,” which is devoted to a wide-ranging exploration of social ELIZABETH SKINNER Managing Editor media and counterterrorism. Social media have become valuable tools for RYAN STUART Design & Layout combating crime and terrorism. According to LexisNexis® Risk Solutions, four out of five respondents to their survey of law enforcement professionals EDITORIAL REVIEW BOARD reported using social media, particularly Facebook and YouTube, to aid VICTOR ASAL investigations. One officer said he believed his department’s use of social University at Albany SUNY media allowed personnel to defuse a terrorist threat involving students at a ALEJANDRA BOLANOS local high school. Two-thirds said they thought access to social media helps National Defense University solve crimes more quickly. LAWRENCE CLINE Naval Postgraduate School To better understand the role of social media in combating terrorism, the Naval Postgraduate School (NPS) in Monterey, California held a small STEPHEN DI RIENZO workshop on Social Media and Counterterrorism this past June. Sponsored National Intelligence University by the Combating Terrorism Fellowship Program, the workshop brought SAJJAN GOHEL together a diverse group of people, including researchers, law enforcement Asia Pacific Foundation and military officers, and media experts from the United States, Ireland, and SEBASTIAN GORKA the Philippines. Participants were invited to submit papers for inclusion in National Defense University this special issue of CTX. JAKUB GRYGIEL School of Advanced International We are delighted to present here six papers that we received from partici- Studies pants of the workshop. -
The Homegrown Terrorist Threat to the US Homeland (ARI)
Area: International Terrorism ARI 171/2009 Date: 18/12/2009 The Homegrown Terrorist Threat to the US Homeland (ARI) Lorenzo Vidino * Theme: Radicalisation into violence affects some small segments of the American Muslim population and recent events show that a threat from homegrown terrorism of jihadist inspiration does exist in the US. Summary: The wave of arrests and thwarted plots recently seen in the US has severely undermined the long-held assumption that American Muslims, unlike their European counterparts, are virtually immune to radicalisation. In reality, as argued in this ARI, evidence also existed before the autumn of 2009, highlighting how radicalisation affected some small segments of the American Muslim population exactly like it affects some fringe pockets of the Muslim population of each European country. After putting forth this argument, this paper analyses the five concurring reasons traditionally used to explain the divergence between the levels of radicalisation in Europe and the US: better economic conditions, lack of urban ghettoes, lower presence of recruiting networks, different demographics and a more inclusive sense of citizenship. While all these characteristics still hold true, they no longer represent a guarantee, as other factors such as perception of discrimination and frustration at US foreign policies could lead to radicalisation. Finally, the paper looks at the post-9/11 evolution of the homegrown terrorist threat to the US homeland and examines possible future scenarios.1 Analysis: The American authorities and public have been shocked by the tragic events of 5 November 2009, when Army Major Nidal Malik Hasan allegedly opened fire against fellow soldiers inside the Fort Hood military base, killing 13 people and wounding 30 others. -
Internet Radicalization : Actual Threat Or Phantom Menace?
Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2012-09 Internet Radicalization : Actual Threat or Phantom Menace? Mealer, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/17416 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTERNET RADICALIZATION: ACTUAL THREAT OR PHANTOM MENACE? by Michael J. Mealer September 2012 Thesis Co-Advisors: Anders Strindberg Rodrigo Nieto-Gómez Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2012 Master’s Thesis 4. TITLE AND SUBTITLE Internet Radicalization: Actual Threat or Phantom 5. FUNDING NUMBERS Menace? 6. AUTHOR(S) Michael J. Mealer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10.