Islam, Fundamentalism, Moderation and Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Islam, Fundamentalism, Moderation and Terrorism University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/74064 This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. Incubating Extremist Terrorism: The UK Islamic Fundamentalist Movement 1989-2014 By Lewis Herrington MEng (Computer Science) MA (International Security) MA (Politics) A thesis submitted in partial fulfilment of the requirements for the Degree of Doctor of Philosophy in Politics and International Relations University of Warwick, Department of Politics and International Relations March 2015 Abstract The emergence of Islamist terrorism in the UK has its genesis within an environment socially constructed by the organization of fundamentalist Muslims. Since 1989, Islamic preachers arriving in London from the Middle East have religiously mobilized hundreds of British Muslims drawing them into an extremist milieu termed the “Islamic Fundamentalist Movement” by the author. Followers are encouraged to adopt extreme political narratives and pursue activities designed to re-establish an Islamic Caliphate. Contrary to the prevailing discourse, Islamic fundamentalist Muslims are far from constituting a homogenous set of individuals. Based on age, overseas connections, experience of conflict and religiosity, they each fulfill specific tasks. These include but are not limited to recruitment, preaching, fundraising, facilitating and combative jihad. Through socialisation and participation in this movement, a minority of adherents have crossed the line and developed a mindset in which terrorism has become normalised. For this subgroup of extreme fundamentalists, suicide bombing against fellow citizens is considered a legitimate means in which to defend co-religionists, challenge western interference in Muslim lands and support the recently established Islamic State that now spans Northern Iraq and Syria. This doctoral study draws heavily upon recently obtained court transcripts, interviews with counter terrorism officers, politicians, journalists and counter radicalisation workers in order to provide a unique insight to the environment from which the individuals responsible for major UK terrorism conspiracies witnessed since 2003 have emerged. Keywords Islam, Islamic Fundamentalism, Domestic Terrorism, Extremism, Jihad, Al-Qaeda, Islamic State Acknowledgements The author would very much like to thank Professor Richard Aldrich for his unwavering support, direction and tireless encouragement throughout the duration of this doctoral study. In particular, for reviewing seemingly endless drafts and remaining patient through the many ups and downs, trials and tribulations that we Page 2 of 370 encountered along the way. Thank you Richard, we did it! Many thanks also to Dr Steve Luci Matthews for providing much needed support over the years; the ability to spend time gathering data and networking in London would not have been possible without your kind assistance. To the individuals who afforded their time for interviews, I thank each of you. Amardeep Bassey, David Blunkett, Charles Clarke, Duncan Gardham, Mohammed Khan, Jahan Mahmood, Omar Nasiri, Stuart Osbourne, Raff Pantucci, Chris Sneddon, Richard Walton and Ken McAuley. Thank you also to Allan Dade for proof reading, not an easy task. On a personal note, I would like to conclude by thanking my friends and family but in particular Abigail Thain. I would not have made it without you Abs, thank you for inspiring, encouraging, supporting and generally helping get me get back on track towards the finish line. This thesis is dedicated firstly to my late Grandfather Dr A J Moyes, who inspired me to pursue my doctorate and secondly my daughter Elise. May it inspire her one day to follow in my footsteps, to work hard, to pursue her dreams and to always remember that its not about where you are from, but where you are going that matters. Declaration This thesis is entirely the original work and therefore copyright of Lewis Herrington. It has not been submitted for a degree at any another university. British Prime Minister David Cameron “We must be clear: to defeat the ideology of extremism we need to deal with all forms of extremism – not just violent extremism. We must ban preachers of hate from coming to our countries. We must proscribe organisations that incite terrorism against people at home and abroad. And we must stop the so called non-violent extremists from inciting hatred and intolerance in our schools, our universities and yes, even our prisons. Of course there are some who will argue that this is not compatible with free speech and intellectual inquiry. But I say: would we sit back and allow right-wing extremists, Nazis or Klu Klux Klansmen to recruit on our university campuses? No” David Cameron Speech to the UN General Assembly 25th September 2014 Page 3 of 370 Table of Contents INTRODUCTION ............................................................................................................................... 9 ISLAM, FUNDAMENTALISM, MODERATION AND TERRORISM .................................................................. 13 RISE OF THE ISLAMIC FUNDAMENTALIST MOVEMENT ............................................................................ 14 POLITICS ASSOCIATED WITH ISLAMIC FUNDAMENTALISM ..................................................................... 16 ACTIVITIES CARRIED OUT IN PURSUIT OF A CALIPHATE ........................................................................... 17 TERRORISM BORN FROM ISLAMIC FUNDAMENTALISM ............................................................................. 20 CONCLUSIONS AND POLICY RECOMMENDATIONS ..................................................................................... 21 LITERATURE REVIEW .................................................................................................................. 23 DEFINING TERRORISM .................................................................................................................................... 25 EXPLANATIONS FOR SUICIDE TERRORISM .................................................................................................. 30 Manipulation by radicalising agents ................................................................................................. 30 Religion ........................................................................................................................................................... 34 Occupation .................................................................................................................................................... 39 Strategic outbidding ................................................................................................................................. 43 Trauma ........................................................................................................................................................... 47 METHODOLOGY ............................................................................................................................. 54 RESEARCH DESIGN .......................................................................................................................................... 54 CENTRAL DISSERTATION QUESTION ........................................................................................................... 62 Sub Research Questions ........................................................................................................................... 63 RESEARCH METHODS ..................................................................................................................................... 64 SAMPLING ......................................................................................................................................................... 67 PROCEDURE ...................................................................................................................................................... 68 DATA ANALYSIS ............................................................................................................................................... 68 ETHICS ............................................................................................................................................................... 69 CONTRIBUTION TO LITERATURE .................................................................................................................. 69 CHAPTER ONE - ISLAM, FUNDAMENTALISM, MODERATION AND TERRORISM ...... 72 THE RELATIONSHIP BETWEEN ISLAM AND TERRORISM ........................................................................... 73 AN IDEA OF ISLAM ........................................................................................................................................... 79 Unity of God (Monotheism) .................................................................................................................... 80 Five Pillars ..................................................................................................................................................... 81 Sunni & Shia ................................................................................................................................................
Recommended publications
  • The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—And Possible Policy Responses Kumar Ramakrishna S
    New England Journal of Public Policy Volume 29 | Issue 1 Article 6 3-20-2017 The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, [email protected] Follow this and additional works at: http://scholarworks.umb.edu/nejpp Part of the International Relations Commons, Peace and Conflict Studies Commons, Public Policy Commons, and the Terrorism Studies Commons Recommended Citation Ramakrishna, Kumar (2017) "The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses," New England Journal of Public Policy: Vol. 29 : Iss. 1 , Article 6. Available at: http://scholarworks.umb.edu/nejpp/vol29/iss1/6 This Article is brought to you for free and open access by ScholarWorks at UMass Boston. It has been accepted for inclusion in New England Journal of Public Policy by an authorized editor of ScholarWorks at UMass Boston. For more information, please contact [email protected]. New England Journal of Public Policy The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore This article examines the radicalization of young Southeast Asians into the violent extremism that characterizes the notorious Islamic State of Iraq and Syria (ISIS). After situating ISIS within its wider and older Al Qaeda Islamist ideological milieu, the article sketches out the historical landscape of violent Islamist extremism in Southeast Asia. There it focuses on the Al Qaeda-affiliated, Indonesian-based but transnational Jemaah Islamiyah (JI) network, revealing how the emergence of ISIS has impacted JI’s evolutionary trajectory.
    [Show full text]
  • The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events
    The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events November 2018 Kim Sadique, James Tangen Anna Perowne Acknowledgements The authors wish to thank all of the participants in this research who provided real insight into this complex area. Researchers: Kim Sadique, Senior Lecturer in Community & Criminal Justice Dr James Tangen, Senior Lecturer (VC2020) in Criminology Anna Perowne, Research Assistant All correspondence about this report should be directed to: Kim Sadique Head of Division of Community and Criminal Justice (Acting) De Montfort University The Gateway, Leicester, LE1 9BH Email: [email protected] | Tel: +44 (0) 116 2577832 To report a hate crime, please contact Tell MAMA Email: [email protected] | Tel: +44 (0) 800 456 1226 www.tellmamauk.org Twitter: @TellMAMAUK Facebook: www.facebook.com/tellmamauk This work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of the license, visit: https://creativecommons.org/licenses/by/4.0/legalcode 1 Contents Foreword ........................................................................................................... 3 Executive Summary .......................................................................................... 4 Recommendations ............................................................................................ 5 Introduction ....................................................................................................... 6 Aims & Objectives .........................................................................................
    [Show full text]
  • Journal of Terrorism Research, Volume 5, Issue 3 (2014)
    ISSN: 2049-7040 This work is licensed under a Creative Commons Attribution 3.0 License. Contents Articles 3 Drones, The US And The New Wars In Africa 3 by Philip Attuquayefio The Central Intelligence Agency’s Armed Remotely Piloted Vehicle-Supported Counter-Insurgency Campaign in Pakistan – a Mission Undermined by Unintended Consequences? 14 by Simon Bennett Human Bombing - A Religious Act 31 by Mohammed Ilyas Entering the Black Hole: The Taliban, Terrorism, and Organised Crime 39 by Matthew D. Phillips, Ph.D. and Emily A. Kamen The Theatre of Cruelty: Dehumanization, Objectification & Abu Ghraib 49 by Christiana Spens Book Review 70 Andrew Silke, et al., (edited by Andrew Silke). Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalisation and Reform.Routledge: Oxon UK, 2014. pp. 282. £28.99. ISBN: 978-0-415- 81038-8. 70 reviewed by Robert W. Hand About JTR 74 JTR, Volume 5, Issue 3 – September 2014 Articles Drones, The US And The New Wars In Africa by Philip Attuquayefio This work is licensed under a Creative Commons Attribution 3.0 License. Introduction ince the early 20th Century, Africa has witnessed varying degrees of subversion from the Mau Mau nationalist campaigners in Kenya in the 1950s to acts by rebel groups in the infamous intrastate wars Sof Sub-Saharan Africa. While the first movement evolved mainly from political acts geared towards the struggle for independence, the latter was mostly evident in attempts to obtain psychological or strategic advantages by combatants in the brutal civil wars of Liberia, Sierra Leone, the African Great Lakes region and a number of such civil war theatres in Africa.
    [Show full text]
  • How Terrorist Attacks Influence the Stock Markets in France — an Event Study from Different Industrial Perspectives
    How terrorist attacks influence the stock markets in France — an event study from different industrial perspectives Author: Said Khaled Schakib Student Number: 10841288 Supervisor: Jens Martin University of Amsterdam Msc. Business Economics – Track Finance Thesis credits: 15 ECTS Date: June 30 th , 2017 Statement of Originality This document is written by Student Said Khaled Schakib who declares to take full responsibility for the contents of this document. I declare that the text and the work presented in this document is original and that no sources other than those mentioned in the text and its references have been used in creating it. The Faculty of Economics and Business is responsible solely for the supervision of completion of the work, not for the contents . Abstract This thesis aims to investigate the effect of domestic terrorism on the stock market in France. After an extensive analysis of considerable literature six potential industries were identified, which are believed to show significant response towards terrorist events. Based on the event study analysis, evidence is provided that terror attacks with high number of fatalities mostly have a short-term effect on excess stock returns. French stocks associated with the airline industry and leisure & tourism industry show the most negative decline in excess stock returns, while the results suggest that stocks associated with the defence industry respond with positive returns towards terrorist events Table of Content 1. Introduction .....................................................................................................................
    [Show full text]
  • The Future of Airports a Vision of 2040 and 2070
    The Future of Airports A Vision of 2040 and 2070 Topic No. 4: Security Threats and Unlawful Activities White Paper ENAC Alumni – Airport Think Tank Version 2 of April 2020 The Future of Airports: A Vision of 2040 and 2070 Disclaimer The materials of The Future of Airports are being provided to the general public for information purposes only. The information shared in these materials is not all-encompassing or comprehensive and does not in any way intend to create or implicitly affect any elements of a contractual relationship. Under no circumstances ENAC Alumni, the research team, the panel members, and any participating organizations are responsible for any loss or damage caused by the usage of these contents. ENAC Alumni does not endorse products, providers or manufacturers. Trade or manufacturer’s names appear herein solely for illustration purposes. ‘Participating organization’ designates an organization that has brought inputs to the roundtables and discussions that have been held as part of this research initiative. Their participation is not an endorsement or validation of any finding or statement of The Future of Airports. ENAC Alumni 7 Avenue Edouard Belin | CS 54005 | 31400 Toulouse Cedex 4 | France https://www.alumni.enac.fr/en/ | [email protected] | +33 (0)5 62 17 43 38 2 Topic No. 4: Security Threats and Unlawful Activities Research Team • Gaël Le Bris, C.M., P.E., Principal Investigator | Senior Aviation Planner, WSP, Raleigh, NC, USA • Loup-Giang Nguyen, Data Analyst | Aviation Planner, WSP, Raleigh, NC, USA • Beathia Tagoe, Assistant Data Analyst | Aviation Planner, WSP, Raleigh, NC, USA Panel Members • Eduardo H.
    [Show full text]
  • Detainee Assessment
    S E C R E T / / NOFORN / / 20330609 DEPARTMENT OF DEFENSE HEADQUARTERS, JOINT TASK FORCE GUANTANAMO U.S. NAVAL STATION, GUANTANAMO BAY, CUBA APO AE 09360 JTF-GTMO-CDR 9 June 2008 MEMORANDUM FOR Commander, United States Southern Command, 3511 NW 9lst Avenue, Miami, FL 33172 SUBJECT: Recommendation for Continued Detention Under DoD Control (CD) for Guantanamo Detainee, ISN US9PK-001460DP (S) JTF-GTMO Detainee Assessment 1. (S//NF) Personal Information: ○ JDIMS/NDRC Reference Name: Abdul Rabbani Abu Rahman ○ Current/True Name and Aliases: Abdul Rahim Gulam Rabbani, Abu Rahim Moulana Gulam Rabbani, Khalid al- Pakistan, Sayyid Amin, Abu Rahama ○ Place of Birth: Mecca, Saudi Arabia (SA) ○ Date of Birth: 1969 ○ Citizenship: Pakistan (PK) ○ Internment Serial Number (ISN): US9PK-00001460DP 2. (U//FOUO) Health: Detainee is in overall good health. 3. (U) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommends this detainee for Continued Detention Under DoD Control (CD). JTF-GTMO previously recommended detainee for Continued Detention Under DoD Control (CD) on 9 August 2007. b. (S//NF) Executive Summary: Detainee admitted working directly for Khalid Shaykh Muhammad, ISN US9KU-010024DP (KU-10024), as an al-Qaida facilitator from early 2000 to September 2002. Detainee’s duties included managing several Karachi, Pakistan (PK),safe houses. Detainee had direct access with many high-level al-Qaida members, CLASSIFIED BY: MULTIPLE SOURCES REASON: E.O. 12958, AS AMENDED, SECTION 1.4(C) DECLASSIFY ON: 20330609 S E C R E T / / NOFORN / / 20330609 Downloaded from The Rendition Project www.therenditionproject.org.uk Source: the New York Times S E C R E T / / NOFORN / / 20330609 JTF-GTMO-CDR SUBJECT: Recommendation for Continued Detention Under DoD Control (CD) for Guantanamo Detainee, ISN US9PK-001460DP (S) including Usama Bin Laden (UBL); Ayman al-Zawahiri; Muhammad Atef, aka (Abu Hafs al-Masri); and Nashwan Abd al-Razzaq Abd al-Baqi, aka (Abdul Hadi al-Iraqi), ISN US9IZ- 010026DP (IZ-10026).
    [Show full text]
  • South Africans Offering Foreign Military Assistance Abroad
    South AfricansSJ BOSCH offering Foreign MilitaryPER / PELJ Assistance 2018 (21) 1 Abroad: How real is the Risk of Domestic Prosecution? SJ Bosch* Abstract Pioneer in peer -reviewed, open access online law publications This article discusses the efficacy of the existing Regulation of Foreign Military Assistance Act 15 of 1998, and the proposed Author Prohibition of Mercenary Activities and Regulation of Certain Activities in the Country of Armed Conflict Act 27 of 2006, in Shannon Joy Bosch regulating the private security industry and prosecuting those in contravention of the legislation. It discusses the motivations Affiliation behind recent attempts to deny the citizenship of South African University of KwaZulu-Natal nationals who had taken up employment abroad in the private South Africa security industry. The article gives some guidance regarding the likelihood of prosecution for the new school of South African Email [email protected] fighters taking up arms for foreign causes like ISIS, the IDF, and Date of submission Nigeria. 31 January 2017 Date published Keywords 13 March 2018 Foreign military assistance; private security; domestic prosecution; ISIS. Editor Prof W Erlank How to cite this article ………………………………………………………. Bosch SJ "South Africans offering Foreign Military Assistance Abroad: How real is the Risk of Domestic Prosecution?" PER / PELJ 2018(21) - DOI http://dx.doi.org/10.17159/1727- 3781/2018/1721 Copyright DOI http://dx.doi.org/10.17159/1727- 3781/2018/v21i0a1721 SJ BOSCH PER / PELJ 2018 (21) 2 1 Introduction This article is a sequel to one published in 2011 PER entitled "South African Private Security Contractors Active in Armed Conflicts: Citizenship, Prosecution and the Right to Work".
    [Show full text]
  • Counterterrorism CHAPTER 13 the Options
    Counterterrorism CHAPTER 13 The Options OPENING VIEWPOINT: THE DEATH OF OSAMA BIN LADEN Al-Qa’ida founder Osama bin Laden was killed during a individual. Based on other surveillance and circumstantial intel- raid by United States naval special forces on May 2, 2011, in ligence information, officials surmised that Osama bin Laden Abbottabad, Pakistan. The successful attack by a unit popularly resided at the compound with his couriers and their families. known as SEAL Team Six ended an intensive manhunt for the Options for assaulting thedistribute compound included a surgi- most wanted terrorist leader in the world. cal strike by special forces, deploying strategic bombers to The successful hunt for Osama bin Laden originated from obliterate the compound, or a joint operation with Pakistani fragments of information gleaned during interrogations of pris- security forces. Theor latter two options were rejected because oners over several years beginning in 2002. Believing that bin of the possibility of killing innocent civilians and distrust of Laden retained couriers to communicate with other operatives, Pakistani security agencies. Approximately two dozen SEAL interrogators focused their attention on questioning high-value commandos practiced intensely for the assault, and were targets about the existence and identities of these couriers. temporarily detailed to the CIA for the mission. A nighttime This focus was adopted with an assumption that bin Laden and helicopter-borne attack was commenced on May 2, 2011. other Al-Qa’ida leaders would rarely communicate using cellpost, The courier al-Kuwaiti and several others were killed during phone technology as a precaution against being intercepted by the assault, and women and children found in the compound Western intelligence agencies.
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • India’S Disputed Borderland Regions: Xinjiang, Tibet, Kashmir and the Indian Northeast
    COMPARING CHINA AND INDIA’S DISPUTED BORDERLAND REGIONS: XINJIANG, TIBET, KASHMIR AND THE INDIAN NORTHEAST INTRODUCTION: India and China are seen as the rising giants on the Asiatic mainland today. After the East Asian miracle or miracle of the Asian Tiger economies of the mid-nineties, attention has shifted from the peripheral parts of the Asia Pacific, towards the Asiatic mainland, mainly towards India and China. Both countries have been experiencing impressive economic growth rates since they opened up their economies and exposed their domestic markets to international competition. China opened up its markets in the late seventies, and India opened up its markets in the early nineties. Before the seventies, both economies were by and large protectionist, and had a sluggish economic growth rate. Now, of course, both countries are seen as exciting economic destinations for international investors due to their adventurous markets, which western investors feel the need to tap into and exploit. India, of course, also has the additional prestige of being the world’s largest democracy. However, one area that still remains quite under researched, or at least gets side-lined due to all the talk on economic growth and development is the political situation and the on-going conflicts in the borderland regions of these two emerging powers. Having an understanding of the political situation in the borderland regions is important because if the situation ever blows out of proportion, this could potentially have an adverse impact on the economy, which indirectly impacts on our lives in the west, since western governments have invested so much money in these two countries.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Hostile Intent and Counter-Terrorism Human Factors Theory and Application
    Hostile Intent and Counter-Terrorism Human Factors Theory and Application Edited by ALEX STEDMON Coventry University, UK GLYN LAWSON The University of Nottingham, UK ASHGATE ©Alex Stedmon, Glyn Lawson and contributors 2015 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Alex Stedmon and Glyn Lawson have asserted their rights under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Famham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. The Library of Congress has cataloged the printed edition as follows: The Library of Congress Cataloging-in-Publication Data has been applied for. ISBN: 9781409445210 (hbk) ISBN: 9781409445227 (ebk-PDF) ISBN: 9781472402103 (ebk-ePUB) MIX Paper from FSC rasponalbla tourcea Printed in the United Kingdom by Henry Ling Limited, wwvii.te«ro FSC* C013985 at the Dorset Press, Dorchester, DTI IHD Chapter 12 Competitive Adaptation in Militant Networks: Preliminary Findings from an Islamist Case Study Michael Kenney Graduate School o f Public and International Affairs, University o f Pittsburgh, USA John Horgan International Center for the Study o f Terrorism, Pennsylvania State University, USA Cale Home Covenant College, Lookout Mountain, USA Peter Vining International Center for the Study o f Terrorism, Pennsylvania State University, USA Kathleen M.
    [Show full text]