Paul Springer on the Evolution of the Global Terrorist Threat

Total Page:16

File Type:pdf, Size:1020Kb

Paul Springer on the Evolution of the Global Terrorist Threat Bruce Hoffman, Fernando Reinares, eds.. The Evolution of the Global Terrorist Threat: From 9/11 to Osama bin Laden's Death. Columbia Studies in Terrorism and Irregular Warfare Series. New York: Columbia University Press, 2014. 696 pp. $45.00, cloth, ISBN 978-0-231-16898-4. Reviewed by Paul Springer Published on H-War (April, 2016) Commissioned by Margaret Sankey (Air University) Edited collections that bring together more a lot of very nasty terrorist threats that are active than two dozen authors are always a tricky in the world today. More surprisingly, there is lit‐ prospect. They are hard to coordinate and bal‐ tle coverage devoted to sub-Saharan Africa, in ance, and they run the risk of heading in too particular the dangers represented by Boko many directions to create a useful product. To pull Haram, and Yemen, the home of Al Qaeda in the off this type of a project requires the leadership of Arabian Peninsula. Both of these groups are ma‐ editors with a frm hand, a variety of author back‐ jor regional threats with aspirations toward glob‐ grounds, and a substantial number of diverse per‐ al reach, and neither are recent additions to the spectives. In the current case, all three factors are global terrorism lists. well represented, resulting in a superb fnal prod‐ Part 1 of the book concentrates on attacks uct that belongs on the shelf of any reader inter‐ within and against Western nations, to include ested in the recent history of global terrorism. In North America, Europe, and Australia. Chapter 1 particular, this work is well suited to undergradu‐ explains the central role in Al Qaeda held by ate and graduate courses dealing with this chal‐ Khalid Sheikh Mohammed, both before and after lenging subject, as it is almost tailor written for the September 11 attacks. After examining this classroom adoption. Each of the chapters is a sol‐ pivotal fgure, the work then moves into case id, well-researched effort that could stand alone studies of specific operations against Western tar‐ as a class reading selection. The only caveat to gets, beginning with the 2004 Madrid train bomb‐ this argument is that the book is far more target‐ ings. The chapter dedicated to the Madrid attacks ed than the title might indicate, although this fact makes the claim that these bombings, which oc‐ is clarified in the introduction. This book is about curred on March 11, 2004, happened exactly 911 Islamist violence, mostly that perpetrated and di‐ days after the September 11, 2001, airliner at‐ rected by Al Qaeda, which by definition leaves out tacks. Apparently, either the author or the Al Qae‐ H-Net Reviews da claimants forgot that 2004 was a leap year, and posed a Melbourne terror cell, although it was the hence, the attacks were actually 912 days later. Sydney cell that presented the greater danger due This minor, but strange, error aside, the second to its desire to use chemical or high-explosive chapter does an excellent job walking through the bombs. As yet another counterterrorism success, participants, the operation, the relationship be‐ this operation demonstrates that while terror or‐ tween the attackers and the central leadership of ganizations might claim a global reach, effective Al Qaeda, and the role of the attacks in the overall counterterrorism techniques have also spread Al Qaeda strategic effort. throughout the Western world. The next chapter Chapter 3 examines Operation Crevice, the makes the unfortunate decision to return to the largest counterterrorism operation in British his‐ London bombings of 2005, previously discussed in tory. This chapter underlines the importance of chapter 3, aptly demonstrating some of the diffi‐ monitoring the activities of Al Qaeda affiliates be‐ culty in editing these types of collections. The fore an attack can be launched. In this case, those awkward turning back to Operation Crevice large‐ partners hoped to follow the same pattern as the ly covers the same material without offering any Madrid bombings, but failed thanks to the astute‐ significant new arguments. Chapter 9 examines ness of British officials. The following chapter also the 2006 airline plots that intended to attack details British attempts to foil a terror attack, in Heathrow departures headed to the United States this case focusing on Operation Rhyme and the ac‐ and Canada. The international links and meticu‐ tivities of Dhiren Barot, who largely operated lous planning that undergirded these failed at‐ alone. tacks show the increased sophistication and con‐ tinued danger of airline hijackings, even with the Chapter 5 walks through the murder of Theo massively enhanced security procedures of the Van Gogh, carried out by Mohammed Bouyeri. In post-9/11 world. addition to chronicling this specific attack, it illus‐ trates the issues of homegrown terrorists, lone- Chapters 10 through 14 constitute a series of wolf actors, and the efforts by Al Qaeda and other short case studies, including an examination of groups to get sympathizers to pledge allegiance to groups and plots active in Italy, Germany, Den‐ the group and carry out attacks without formal mark, Spain, and France. Each serves to bolster training or membership. It also spends some time the overall theme of the work, that Al Qaeda and analyzing the poor track record of Dutch courts its offshoots represent a global terrorism threat regarding counterterrorism prosecutions, which that can only be countered by a truly global re‐ the author argues makes the Netherlands an at‐ sponse. The individual efforts of single nations tractive target for terror attacks. The next chapter might serve to spoil or mitigate the effects of one examines the case of the Toronto 18, who had no attack, but they can do little to disrupt the group technical connection to Al Qaeda but still felt as a whole, particularly because Al Qaeda has the some allegiance to the group and followed its advantage of choosing where and when to launch lead. The fact that this group failed to carry out its its attacks, and can operate with greater coordina‐ attacks is presented as a good example of effective tion than the governments it seeks to damage and counterterrorism, in that the Canadian govern‐ destroy. ment was able to identify and apprehend these Part 2 of the book concentrates on areas out‐ actors before they could cause mass casualties. side of the West. By breaking the work into two Chapter 7 shifts the focus to Australia, where major sections, the editors essentially ease the lay Operation Pendennis exposed the frst Australian reader into the concepts of global terrorism, be‐ suicide bomber. An intercepted telephone call ex‐ ginning with attacks that are likely more familiar 2 H-Net Reviews to Western readers and then broadening their dis‐ although it is by far the largest and most danger‐ cussion to encompass non-Western events. Chap‐ ous organization to date. ter 15 provides an examination of Al Qaeda in Chapter 21 points out that the myth of Moroc‐ Afghanistan, where the group is not very popular, can exceptionalism was punctured by Al Qaeda in in part due to its direct support toward insurgent the Islamic Maghreb’s attacks of 2003 and 2007. groups. The next chapter, an extremely short These attacks caused little damage but provoked a group overview of al-Jemaah al-Islamiyah in legislative response that included religious re‐ Southeast Asia, is an examination with so little forms. Because the government reacted strongly depth as to be almost worthless and ultimately is and the population demonstrated support for the the most disappointing chapter of the book. reforms, Al Qaeda found little sympathy among Chapter 17 returns to the case study model of the citizens of Morocco, and the government saw examining a single attack while drawing larger little need to appease religious radicals. The lessons about Al Qaeda’s activities. In this case, round of 2007 suicide bombings in Algiers also the study analyzes a series of missile attacks in met with a strong government response, forcing Mombasa against El Al airliners. While the attacks Al Qaeda to minimize civilian deaths and focus its failed, they demonstrated a renewed focus on soft efforts on kidnapping tourists for ransom. In com‐ targets that might cause mass casualties. The fol‐ parison, the attacks launched by Al Qaeda in the lowing chapter looks at the same general concept Arabian Peninsula, carried out in 2003 in Riyadh in Iraq, specifically examining the sectarian terror and 2008 in Sanaa, showed that this group re‐ created by Abu Musab al-Zarqawi in his attempts tained its primary focus against the United States, to trigger a civil war. Most of the attacks carried and as a result, provoked a far weaker govern‐ out by his group, Al Qaeda in Iraq, were aimed at ment response. civilian groups with little or no government pro‐ Chapter 24 provides an overview of Pakistani tection, assuming it would cause massive retalia‐ terrorist organizations, with a focus on the 2008 tory measures. The larger point is that terror Mumbai attacks. It argues that Lashkar-e-Taibi op‐ groups, even those with enormous resources and erates under the direction of Pakistani intelli‐ long reach like Al Qaeda, cannot achieve their ob‐ gence officers, and because it does not target Pak‐ jectives on their own—they require massive assis‐ istanis, it has garnered little official response be‐ tance from larger groups or unforced errors, usu‐ yond a pro forma condemnation of its violent ac‐ ally in the form of overreactions, from the target‐ tivities. The last case study chapter analyzes the ed states. 2010 suicide attacks in Kampala, Uganda, which Chapter 19 analyzes the Istanbul attacks of targeted watchers of the World Cup.
Recommended publications
  • Between Islamization and Secession: the Contest for Northern Mali
    JULY 2012 . VOL 5 . ISSUE 7 Contents Between Islamization and FEATURE ARTICLE 1 Between Islamization and Secession: Secession: The Contest for The Contest for Northern Mali By Derek Henry Flood Northern Mali REPORTS By Derek Henry Flood 6 A Profile of AQAP’s Upper Echelon By Gregory D. Johnsen 9 Taliban Recruiting and Fundraising in Karachi By Zia Ur Rehman 12 A Biography of Rashid Rauf: Al-Qa`ida’s British Operative By Raffaello Pantucci 16 Mexican DTO Influence Extends Deep into United States By Sylvia Longmire 19 Information Wars: Assessing the Social Media Battlefield in Syria By Chris Zambelis 22 Recent Highlights in Terrorist Activity 24 CTC Sentinel Staff & Contacts An Islamist fighter from the Movement for Unity and Jihad in West Africa in the city of Gao on July 16, 2012. - AFP/Getty Images n january 17, 2012, a rebellion 22, disgruntled Malian soldiers upset began in Mali when ethnic about their lack of support staged a coup Tuareg fighters attacked a d’état, overthrowing the democratically Malian army garrison in the elected government of President Amadou Oeastern town of Menaka near the border Toumani Touré. with Niger.1 In the conflict’s early weeks, the ethno-nationalist rebels of the By April 1, all Malian security forces had National Movement for the Liberation evacuated the three northern regions of of Azawad (MNLA)2 cooperated and Kidal, Gao and Timbuktu. They relocated About the CTC Sentinel sometimes collaborated with Islamist to the garrisons of Sévaré, Ségou, and The Combating Terrorism Center is an fighters of Ansar Eddine for as long as as far south as Bamako.4 In response, independent educational and research the divergent movements had a common Ansar Eddine began to aggressively institution based in the Department of Social enemy in the Malian state.3 On March assert itself and allow jihadists from Sciences at the United States Military Academy, regional Islamist organizations to West Point.
    [Show full text]
  • The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
    New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan.
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • Intelligence and Security Committee – Annual Report
    Intelligence and Security Committee – Annual Report 2011–2012 Intelligence and Security Committee – Intelligence and Security Committee Annual Report 2011–2012 Chairman: The Rt. Hon. Sir Malcolm Rifkind, MP Published by TSO (The Stationery Office) and available from: Online www.tsoshop.co.uk Mail, Telephone, Fax & E-mail TSO PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 Email: [email protected] Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square London SW1A 2JX Telephone orders/General enquiries: 020 7219 3890 INSERT Fax orders: 020 7219 3866 BARCODE Email: [email protected] Internet: www.bookshop.parliament.uk TSO@Blackwell and other accredited agents Intelligence and Security Committee Annual Report 2011–2012 Chairman: The Rt. Hon. Sir Malcolm Rifkind, MP Intelligence Services Act 1994 Chapter 13 Presented to Parliament by the Prime Minister By Command of Her Majesty July 2012 Cm 8403 £21.25 © Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit www.nationalarchives.gov.uk/doc/open-government-licence/ or email [email protected] Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us at [email protected] This publication is available for download at www.official-documents.gov.uk ISBN: 9780101840323 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID P002500979 07/12 21937 19585 Printed on paper containing 75% recycled fibre content minimum.
    [Show full text]
  • RSCAS 2017/28 Islamic Terrorism in the West and International Migrations
    RSCAS 2017/28 Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena European University Institute Robert Schuman Centre for Advanced Studies Islamic Terrorism in the West and International Migrations: The “Far” or “Near” Enemy Within? What is the Evidence Maria do Céu Pinto Arena EUI Working Paper RSCAS 2017/28 This text may be downloaded only for personal research purposes. Additional reproduction for other purposes, whether in hard copies or electronically, requires the consent of the author(s), editor(s). If cited or quoted, reference should be made to the full name of the author(s), editor(s), the title, the working paper, or other series, the year and the publisher. ISSN 1028-3625 © Maria do Céu Pinto Arena, 2017 Printed in Italy, May 2017 European University Institute Badia Fiesolana I – 50014 San Domenico di Fiesole (FI) Italy www.eui.eu/RSCAS/Publications/ www.eui.eu cadmus.eui.eu Robert Schuman Centre for Advanced Studies The Robert Schuman Centre for Advanced Studies (RSCAS), created in 1992 and directed by Professor Brigid Laffan, aims to develop inter-disciplinary and comparative research and to promote work on the major issues facing the process of integration and European society. The Centre is home to a large post-doctoral programme and hosts major research programmes and projects, and a range of working groups and ad hoc initiatives. The research agenda is organised around a set of core themes and is continuously evolving, reflecting the changing agenda of European integration and the expanding membership of the European Union.
    [Show full text]
  • Jonathan Evans, Former Director General, MI5 Raffaello Pantucci EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D
    OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYMARCH 2020 2018 · VOLUME · VOLUME 13, 11,ISSUE ISSUE 3 6 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE The TheJihadi Hanau Threat LTC(R)Jonathan Bryan Price Terrorist Attack toHow race Indonesia hate and conspiracy theories Evans are fueling global far-right violence Former Director, Former Director General, MI5 Blyth CrawfordKirsten E.and Schulze Florence Keen Combating Terrorism Center FEATURE ARTICLE Editor in Chief 1 The Hanau Terrorist Attack: How Race Hate and Conspiracy Theories Are Fueling Global Far-Right Violence Paul Cruickshank Blyth Crawford and Florence Keen Managing Editor INTERVIEW Kristina Hummel 9 A View from the CT Foxhole: Jonathan Evans, Former Director General, MI5 Raffaello Pantucci EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head 16 The Pensacola Terrorist Attack: The Enduring Influence of al-Qa`ida and its Dept. of Social Sciences (West Point) Affiliates Colin P. Clarke Brian Dodwell Director, CTC 24 Dollars for Daesh: The Small Financial Footprint of the Islamic State's American Supporters Don Rassler Lorenzo Vidino, Jon Lewis, and Andrew Mines Director of Strategic Initiatives, CTC 30 Addressing the Enemy: Al-Shabaab's PSYOPS Media Warfare Christopher Anzalone CONTACT Combating Terrorism Center Far-right terror is going global, propelled to a significant degree by an on- line ecosystem of extremists posting in English. Since 2018, attackers U.S. Military Academy have targeted synagogues in Pittsburgh, Pennsylvania; the towns of Poway, 607 Cullum Road, Lincoln Hall California, and Halle, Germany; mosques in Christchurch, New Zealand; and a Walmart in El Paso, Texas. In this month’s feature article, Blyth Crawford and Florence Keen examine the February 19, West Point, NY 10996 2020, far-right terrorist attack that targeted shisha bar customers in the German town of Hanau and Phone: (845) 938-8495 led to the death of nine victims.
    [Show full text]
  • Understanding Why Terrorist Operations Succeed Or Fail
    HOMELAND SECURITY PROGRAM Project supported by a RAND Investment in People and Ideas THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Homeland Security Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress.
    [Show full text]
  • Volume XIII, Issue 5 October 2019 PERSPECTIVES on TERRORISM Volume 13, Issue 5
    ISSN 2334-3745 Volume XIII, Issue 5 October 2019 PERSPECTIVES ON TERRORISM Volume 13, Issue 5 Table of Contents Welcome from the Editors...............................................................................................................................1 Articles Islamist Terrorism, Diaspora Links and Casualty Rates................................................................................2 by James A. Piazza and Gary LaFree “The Khilafah’s Soldiers in Bengal”: Analysing the Islamic State Jihadists and Their Violence Justification Narratives in Bangladesh...............................................................................................................................22 by Saimum Parvez Islamic State Propaganda and Attacks: How are they Connected?..............................................................39 by Nate Rosenblatt, Charlie Winter and Rajan Basra Towards Open and Reproducible Terrorism Studies: Current Trends and Next Steps...............................61 by Sandy Schumann, Isabelle van der Vegt, Paul Gill and Bart Schuurman Taking Terrorist Accounts of their Motivations Seriously: An Exploration of the Hermeneutics of Suspicion.......................................................................................................................................................74 by Lorne L. Dawson An Evaluation of the Islamic State’s Influence over the Abu Sayyaf ...........................................................90 by Veera Singam Kalicharan Research Notes Countering Violent Extremism
    [Show full text]
  • 'British Jihad' and the Curves of Religious Violence Bhatt, Chetan
    www.ssoar.info The 'British jihad' and the curves of religious violence Bhatt, Chetan Postprint / Postprint Zeitschriftenartikel / journal article Zur Verfügung gestellt in Kooperation mit / provided in cooperation with: www.peerproject.eu Empfohlene Zitierung / Suggested Citation: Bhatt, C. (2010). The 'British jihad' and the curves of religious violence. Ethnic and Racial Studies, 33(1), 39-59. https:// doi.org/10.1080/01419870903082245 Nutzungsbedingungen: Terms of use: Dieser Text wird unter dem "PEER Licence Agreement zur This document is made available under the "PEER Licence Verfügung" gestellt. Nähere Auskünfte zum PEER-Projekt finden Agreement ". For more Information regarding the PEER-project Sie hier: http://www.peerproject.eu Gewährt wird ein nicht see: http://www.peerproject.eu This document is solely intended exklusives, nicht übertragbares, persönliches und beschränktes for your personal, non-commercial use.All of the copies of Recht auf Nutzung dieses Dokuments. Dieses Dokument this documents must retain all copyright information and other ist ausschließlich für den persönlichen, nicht-kommerziellen information regarding legal protection. You are not allowed to alter Gebrauch bestimmt. Auf sämtlichen Kopien dieses Dokuments this document in any way, to copy it for public or commercial müssen alle Urheberrechtshinweise und sonstigen Hinweise purposes, to exhibit the document in public, to perform, distribute auf gesetzlichen Schutz beibehalten werden. Sie dürfen dieses or otherwise use the document in public. Dokument nicht in irgendeiner Weise abändern, noch dürfen By using this particular document, you accept the above-stated Sie dieses Dokument für öffentliche oder kommerzielle Zwecke conditions of use. vervielfältigen, öffentlich ausstellen, aufführen, vertreiben oder anderweitig nutzen. Mit der Verwendung dieses Dokuments erkennen Sie die Nutzungsbedingungen an.
    [Show full text]
  • Report on the Operation in 2010 of the Terrorism Act 2000 and of Part 1 of the Terrorism Act 2006
    REPORT ON THE OPERATION IN 2010 OF THE TERRORISM ACT 2000 AND OF PART 1 OF THE TERRORISM ACT 2006 BY DAVID ANDERSON Q.C. JULY 2011 REPORT ON THE OPERATION IN 2010 OF THE TERRORISM ACT 2000 AND OF PART 1 OF THE TERRORISM ACT 2006 BY DAVID ANDERSON Q.C. Presented to Parliament pursuant to Section 36 of the Terrorism Act 2006 July 2011 LONDON: The Stationery Office Price: £16.75 © Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to the Independent Reviewer at [email protected] or by post to 7-8 Essex Street, London WC2R 3LD. This publication is available for download at www.official-documents.gov.uk This document is also available from the Independent Reviewer‟s website at http://terrorismlegislationreviewer.independent.gov.uk. ISBN: 9780108510885 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty‟s Stationery Office ID P002441932 07/11 Printed on paper containing 75% recycled fibre content minimum. CONTENTS EXECUTIVE SUMMARY 1 INTRODUCTION page 9 Scope of this report 1.1 9 Resources and methodology 1.17 12 Recommendations 1.32 16 2 OPERATIONAL BACKGROUND
    [Show full text]
  • Inside the Crevice
    Inside the Crevice Islamist terror networks and the 7/7 intelligence failure PARLIAMENTARY BRIEFING PAPER Nafeez Mosaddeq Ahmed August 2007 © INSTITUTE FOR POLICY RESEARCH & DEVELOPMENT Suite 301, 20 Harewood Avenue, London, NW1 6JX www.globalcrisis.org.uk Sponsored by Garden Court Chambers 57- 60 Lincoln’s Inn Fields, London WC2A www.gardencourtchambers.co.uk THE IPRD The Institute for Policy Research & Development (IPRD) is an independent think- tank for interdisciplinary security studies, analyzing international terrorism, military interventions, as well as national and international conflicts, in the context of global ecological, energy and economic crises. Founded in April 2001 in Brighton, a UN “Peace Messenger” City for 20 years, the Institute now runs from the heart of London as an informal, non-profit international network of specialist scholars, experts and analysts. The opinions published by the Institute do not necessarily represent those of the members of the IPRD Board. IPRD International Academic Advisory Board Dr M Shahid Alam , Professor, Department of Economics, Northeastern University, Boston Dr Ruth Blakeley , Lecturer, Department of Politics & International Relations, University of Kent Dr Brett Bowden , Research Fellow, Centre for International Governance & Justice, Australian National University; former Lecturer in Political Science, Australian Defence Force Academy, University of New South Wales Dr Johan Galtung , Professor of Peace Studies, University of Hawaii; founder, Journal of Peace Research and International
    [Show full text]
  • The Radicalization of Diasporas and Terrorism
    ZÜRCHER BEITRÄGE ZUR SICHERHEITSPOLITIK NR. 80 ZB NR. 80 Doron Zimmermann and William Rosenau (eds.) CSS ETH Zurich The Center for Security Studies (CSS) at ETH Zurich is a Swiss academic center of competence that specializes in research, teaching, and information services in the fields THE RADICALIZATION OF DIASPORAS of international relations and security policy. The CSS also acts as a consultant to vari- ous political bodies and the general public. The CSS is engaged in research projects AND TERRORISM with a number of Swiss and international partners. The Center’s research focus is on new risks, European and transatlantic security, strategy and doctrine, state failure and state building, and Swiss foreign and security policy. The CSS runs the International Relations and Security Network (ISN), and in cooperation with partner institutes man- ages the Crisis and Risk Network (CRN), the Parallel History Project on Cooperative Security (PHP), the Swiss Foreign and Security Policy Network (SSN), and the Russian and Eurasian Security (RES) Network. The Center for Security Studies is a member of the Center for Comparative and International Studies (CIS), which is a joint initiative between ETH Zurich and the University of Zurich specializing in comparative politics and international relations. Zürcher Beiträge zur Sicherheitspolitik. This publication series comprises individual monographs and edited volumes that cover international security policy, and Swiss foreign and security policy. The publications are based on a broad understanding of security that encompasses military, political, economic, social, and ecological dimen- sions. They are published in German, English, or French. Electronic full-text versions of the publications are available at www.css.ethz.ch.
    [Show full text]