Islam, Fundamentalism, Moderation and Terrorism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—And Possible Policy Responses Kumar Ramakrishna S
New England Journal of Public Policy Volume 29 | Issue 1 Article 6 3-20-2017 The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, [email protected] Follow this and additional works at: http://scholarworks.umb.edu/nejpp Part of the International Relations Commons, Peace and Conflict Studies Commons, Public Policy Commons, and the Terrorism Studies Commons Recommended Citation Ramakrishna, Kumar (2017) "The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses," New England Journal of Public Policy: Vol. 29 : Iss. 1 , Article 6. Available at: http://scholarworks.umb.edu/nejpp/vol29/iss1/6 This Article is brought to you for free and open access by ScholarWorks at UMass Boston. It has been accepted for inclusion in New England Journal of Public Policy by an authorized editor of ScholarWorks at UMass Boston. For more information, please contact [email protected]. New England Journal of Public Policy The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore This article examines the radicalization of young Southeast Asians into the violent extremism that characterizes the notorious Islamic State of Iraq and Syria (ISIS). After situating ISIS within its wider and older Al Qaeda Islamist ideological milieu, the article sketches out the historical landscape of violent Islamist extremism in Southeast Asia. There it focuses on the Al Qaeda-affiliated, Indonesian-based but transnational Jemaah Islamiyah (JI) network, revealing how the emergence of ISIS has impacted JI’s evolutionary trajectory. -
The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events
The Importance of Narrative in Responding to Hate Incidents Following ‘Trigger’ Events November 2018 Kim Sadique, James Tangen Anna Perowne Acknowledgements The authors wish to thank all of the participants in this research who provided real insight into this complex area. Researchers: Kim Sadique, Senior Lecturer in Community & Criminal Justice Dr James Tangen, Senior Lecturer (VC2020) in Criminology Anna Perowne, Research Assistant All correspondence about this report should be directed to: Kim Sadique Head of Division of Community and Criminal Justice (Acting) De Montfort University The Gateway, Leicester, LE1 9BH Email: [email protected] | Tel: +44 (0) 116 2577832 To report a hate crime, please contact Tell MAMA Email: [email protected] | Tel: +44 (0) 800 456 1226 www.tellmamauk.org Twitter: @TellMAMAUK Facebook: www.facebook.com/tellmamauk This work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of the license, visit: https://creativecommons.org/licenses/by/4.0/legalcode 1 Contents Foreword ........................................................................................................... 3 Executive Summary .......................................................................................... 4 Recommendations ............................................................................................ 5 Introduction ....................................................................................................... 6 Aims & Objectives ......................................................................................... -
Journal of Terrorism Research, Volume 5, Issue 3 (2014)
ISSN: 2049-7040 This work is licensed under a Creative Commons Attribution 3.0 License. Contents Articles 3 Drones, The US And The New Wars In Africa 3 by Philip Attuquayefio The Central Intelligence Agency’s Armed Remotely Piloted Vehicle-Supported Counter-Insurgency Campaign in Pakistan – a Mission Undermined by Unintended Consequences? 14 by Simon Bennett Human Bombing - A Religious Act 31 by Mohammed Ilyas Entering the Black Hole: The Taliban, Terrorism, and Organised Crime 39 by Matthew D. Phillips, Ph.D. and Emily A. Kamen The Theatre of Cruelty: Dehumanization, Objectification & Abu Ghraib 49 by Christiana Spens Book Review 70 Andrew Silke, et al., (edited by Andrew Silke). Prisons, Terrorism and Extremism: Critical Issues in Management, Radicalisation and Reform.Routledge: Oxon UK, 2014. pp. 282. £28.99. ISBN: 978-0-415- 81038-8. 70 reviewed by Robert W. Hand About JTR 74 JTR, Volume 5, Issue 3 – September 2014 Articles Drones, The US And The New Wars In Africa by Philip Attuquayefio This work is licensed under a Creative Commons Attribution 3.0 License. Introduction ince the early 20th Century, Africa has witnessed varying degrees of subversion from the Mau Mau nationalist campaigners in Kenya in the 1950s to acts by rebel groups in the infamous intrastate wars Sof Sub-Saharan Africa. While the first movement evolved mainly from political acts geared towards the struggle for independence, the latter was mostly evident in attempts to obtain psychological or strategic advantages by combatants in the brutal civil wars of Liberia, Sierra Leone, the African Great Lakes region and a number of such civil war theatres in Africa. -
How Terrorist Attacks Influence the Stock Markets in France — an Event Study from Different Industrial Perspectives
How terrorist attacks influence the stock markets in France — an event study from different industrial perspectives Author: Said Khaled Schakib Student Number: 10841288 Supervisor: Jens Martin University of Amsterdam Msc. Business Economics – Track Finance Thesis credits: 15 ECTS Date: June 30 th , 2017 Statement of Originality This document is written by Student Said Khaled Schakib who declares to take full responsibility for the contents of this document. I declare that the text and the work presented in this document is original and that no sources other than those mentioned in the text and its references have been used in creating it. The Faculty of Economics and Business is responsible solely for the supervision of completion of the work, not for the contents . Abstract This thesis aims to investigate the effect of domestic terrorism on the stock market in France. After an extensive analysis of considerable literature six potential industries were identified, which are believed to show significant response towards terrorist events. Based on the event study analysis, evidence is provided that terror attacks with high number of fatalities mostly have a short-term effect on excess stock returns. French stocks associated with the airline industry and leisure & tourism industry show the most negative decline in excess stock returns, while the results suggest that stocks associated with the defence industry respond with positive returns towards terrorist events Table of Content 1. Introduction ..................................................................................................................... -
The Future of Airports a Vision of 2040 and 2070
The Future of Airports A Vision of 2040 and 2070 Topic No. 4: Security Threats and Unlawful Activities White Paper ENAC Alumni – Airport Think Tank Version 2 of April 2020 The Future of Airports: A Vision of 2040 and 2070 Disclaimer The materials of The Future of Airports are being provided to the general public for information purposes only. The information shared in these materials is not all-encompassing or comprehensive and does not in any way intend to create or implicitly affect any elements of a contractual relationship. Under no circumstances ENAC Alumni, the research team, the panel members, and any participating organizations are responsible for any loss or damage caused by the usage of these contents. ENAC Alumni does not endorse products, providers or manufacturers. Trade or manufacturer’s names appear herein solely for illustration purposes. ‘Participating organization’ designates an organization that has brought inputs to the roundtables and discussions that have been held as part of this research initiative. Their participation is not an endorsement or validation of any finding or statement of The Future of Airports. ENAC Alumni 7 Avenue Edouard Belin | CS 54005 | 31400 Toulouse Cedex 4 | France https://www.alumni.enac.fr/en/ | [email protected] | +33 (0)5 62 17 43 38 2 Topic No. 4: Security Threats and Unlawful Activities Research Team • Gaël Le Bris, C.M., P.E., Principal Investigator | Senior Aviation Planner, WSP, Raleigh, NC, USA • Loup-Giang Nguyen, Data Analyst | Aviation Planner, WSP, Raleigh, NC, USA • Beathia Tagoe, Assistant Data Analyst | Aviation Planner, WSP, Raleigh, NC, USA Panel Members • Eduardo H. -
Detainee Assessment
S E C R E T / / NOFORN / / 20330609 DEPARTMENT OF DEFENSE HEADQUARTERS, JOINT TASK FORCE GUANTANAMO U.S. NAVAL STATION, GUANTANAMO BAY, CUBA APO AE 09360 JTF-GTMO-CDR 9 June 2008 MEMORANDUM FOR Commander, United States Southern Command, 3511 NW 9lst Avenue, Miami, FL 33172 SUBJECT: Recommendation for Continued Detention Under DoD Control (CD) for Guantanamo Detainee, ISN US9PK-001460DP (S) JTF-GTMO Detainee Assessment 1. (S//NF) Personal Information: ○ JDIMS/NDRC Reference Name: Abdul Rabbani Abu Rahman ○ Current/True Name and Aliases: Abdul Rahim Gulam Rabbani, Abu Rahim Moulana Gulam Rabbani, Khalid al- Pakistan, Sayyid Amin, Abu Rahama ○ Place of Birth: Mecca, Saudi Arabia (SA) ○ Date of Birth: 1969 ○ Citizenship: Pakistan (PK) ○ Internment Serial Number (ISN): US9PK-00001460DP 2. (U//FOUO) Health: Detainee is in overall good health. 3. (U) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommends this detainee for Continued Detention Under DoD Control (CD). JTF-GTMO previously recommended detainee for Continued Detention Under DoD Control (CD) on 9 August 2007. b. (S//NF) Executive Summary: Detainee admitted working directly for Khalid Shaykh Muhammad, ISN US9KU-010024DP (KU-10024), as an al-Qaida facilitator from early 2000 to September 2002. Detainee’s duties included managing several Karachi, Pakistan (PK),safe houses. Detainee had direct access with many high-level al-Qaida members, CLASSIFIED BY: MULTIPLE SOURCES REASON: E.O. 12958, AS AMENDED, SECTION 1.4(C) DECLASSIFY ON: 20330609 S E C R E T / / NOFORN / / 20330609 Downloaded from The Rendition Project www.therenditionproject.org.uk Source: the New York Times S E C R E T / / NOFORN / / 20330609 JTF-GTMO-CDR SUBJECT: Recommendation for Continued Detention Under DoD Control (CD) for Guantanamo Detainee, ISN US9PK-001460DP (S) including Usama Bin Laden (UBL); Ayman al-Zawahiri; Muhammad Atef, aka (Abu Hafs al-Masri); and Nashwan Abd al-Razzaq Abd al-Baqi, aka (Abdul Hadi al-Iraqi), ISN US9IZ- 010026DP (IZ-10026). -
South Africans Offering Foreign Military Assistance Abroad
South AfricansSJ BOSCH offering Foreign MilitaryPER / PELJ Assistance 2018 (21) 1 Abroad: How real is the Risk of Domestic Prosecution? SJ Bosch* Abstract Pioneer in peer -reviewed, open access online law publications This article discusses the efficacy of the existing Regulation of Foreign Military Assistance Act 15 of 1998, and the proposed Author Prohibition of Mercenary Activities and Regulation of Certain Activities in the Country of Armed Conflict Act 27 of 2006, in Shannon Joy Bosch regulating the private security industry and prosecuting those in contravention of the legislation. It discusses the motivations Affiliation behind recent attempts to deny the citizenship of South African University of KwaZulu-Natal nationals who had taken up employment abroad in the private South Africa security industry. The article gives some guidance regarding the likelihood of prosecution for the new school of South African Email [email protected] fighters taking up arms for foreign causes like ISIS, the IDF, and Date of submission Nigeria. 31 January 2017 Date published Keywords 13 March 2018 Foreign military assistance; private security; domestic prosecution; ISIS. Editor Prof W Erlank How to cite this article ………………………………………………………. Bosch SJ "South Africans offering Foreign Military Assistance Abroad: How real is the Risk of Domestic Prosecution?" PER / PELJ 2018(21) - DOI http://dx.doi.org/10.17159/1727- 3781/2018/1721 Copyright DOI http://dx.doi.org/10.17159/1727- 3781/2018/v21i0a1721 SJ BOSCH PER / PELJ 2018 (21) 2 1 Introduction This article is a sequel to one published in 2011 PER entitled "South African Private Security Contractors Active in Armed Conflicts: Citizenship, Prosecution and the Right to Work". -
Counterterrorism CHAPTER 13 the Options
Counterterrorism CHAPTER 13 The Options OPENING VIEWPOINT: THE DEATH OF OSAMA BIN LADEN Al-Qa’ida founder Osama bin Laden was killed during a individual. Based on other surveillance and circumstantial intel- raid by United States naval special forces on May 2, 2011, in ligence information, officials surmised that Osama bin Laden Abbottabad, Pakistan. The successful attack by a unit popularly resided at the compound with his couriers and their families. known as SEAL Team Six ended an intensive manhunt for the Options for assaulting thedistribute compound included a surgi- most wanted terrorist leader in the world. cal strike by special forces, deploying strategic bombers to The successful hunt for Osama bin Laden originated from obliterate the compound, or a joint operation with Pakistani fragments of information gleaned during interrogations of pris- security forces. Theor latter two options were rejected because oners over several years beginning in 2002. Believing that bin of the possibility of killing innocent civilians and distrust of Laden retained couriers to communicate with other operatives, Pakistani security agencies. Approximately two dozen SEAL interrogators focused their attention on questioning high-value commandos practiced intensely for the assault, and were targets about the existence and identities of these couriers. temporarily detailed to the CIA for the mission. A nighttime This focus was adopted with an assumption that bin Laden and helicopter-borne attack was commenced on May 2, 2011. other Al-Qa’ida leaders would rarely communicate using cellpost, The courier al-Kuwaiti and several others were killed during phone technology as a precaution against being intercepted by the assault, and women and children found in the compound Western intelligence agencies. -
Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com. -
India’S Disputed Borderland Regions: Xinjiang, Tibet, Kashmir and the Indian Northeast
COMPARING CHINA AND INDIA’S DISPUTED BORDERLAND REGIONS: XINJIANG, TIBET, KASHMIR AND THE INDIAN NORTHEAST INTRODUCTION: India and China are seen as the rising giants on the Asiatic mainland today. After the East Asian miracle or miracle of the Asian Tiger economies of the mid-nineties, attention has shifted from the peripheral parts of the Asia Pacific, towards the Asiatic mainland, mainly towards India and China. Both countries have been experiencing impressive economic growth rates since they opened up their economies and exposed their domestic markets to international competition. China opened up its markets in the late seventies, and India opened up its markets in the early nineties. Before the seventies, both economies were by and large protectionist, and had a sluggish economic growth rate. Now, of course, both countries are seen as exciting economic destinations for international investors due to their adventurous markets, which western investors feel the need to tap into and exploit. India, of course, also has the additional prestige of being the world’s largest democracy. However, one area that still remains quite under researched, or at least gets side-lined due to all the talk on economic growth and development is the political situation and the on-going conflicts in the borderland regions of these two emerging powers. Having an understanding of the political situation in the borderland regions is important because if the situation ever blows out of proportion, this could potentially have an adverse impact on the economy, which indirectly impacts on our lives in the west, since western governments have invested so much money in these two countries. -
Read the Full PDF
Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews. -
Hostile Intent and Counter-Terrorism Human Factors Theory and Application
Hostile Intent and Counter-Terrorism Human Factors Theory and Application Edited by ALEX STEDMON Coventry University, UK GLYN LAWSON The University of Nottingham, UK ASHGATE ©Alex Stedmon, Glyn Lawson and contributors 2015 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Alex Stedmon and Glyn Lawson have asserted their rights under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Famham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. The Library of Congress has cataloged the printed edition as follows: The Library of Congress Cataloging-in-Publication Data has been applied for. ISBN: 9781409445210 (hbk) ISBN: 9781409445227 (ebk-PDF) ISBN: 9781472402103 (ebk-ePUB) MIX Paper from FSC rasponalbla tourcea Printed in the United Kingdom by Henry Ling Limited, wwvii.te«ro FSC* C013985 at the Dorset Press, Dorchester, DTI IHD Chapter 12 Competitive Adaptation in Militant Networks: Preliminary Findings from an Islamist Case Study Michael Kenney Graduate School o f Public and International Affairs, University o f Pittsburgh, USA John Horgan International Center for the Study o f Terrorism, Pennsylvania State University, USA Cale Home Covenant College, Lookout Mountain, USA Peter Vining International Center for the Study o f Terrorism, Pennsylvania State University, USA Kathleen M.