Volume VI, Issue 1 March 2012 PERSPECTIVES on TERRORISM Volume 6, Issue 1
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—And Possible Policy Responses Kumar Ramakrishna S
New England Journal of Public Policy Volume 29 | Issue 1 Article 6 3-20-2017 The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, [email protected] Follow this and additional works at: http://scholarworks.umb.edu/nejpp Part of the International Relations Commons, Peace and Conflict Studies Commons, Public Policy Commons, and the Terrorism Studies Commons Recommended Citation Ramakrishna, Kumar (2017) "The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses," New England Journal of Public Policy: Vol. 29 : Iss. 1 , Article 6. Available at: http://scholarworks.umb.edu/nejpp/vol29/iss1/6 This Article is brought to you for free and open access by ScholarWorks at UMass Boston. It has been accepted for inclusion in New England Journal of Public Policy by an authorized editor of ScholarWorks at UMass Boston. For more information, please contact [email protected]. New England Journal of Public Policy The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore This article examines the radicalization of young Southeast Asians into the violent extremism that characterizes the notorious Islamic State of Iraq and Syria (ISIS). After situating ISIS within its wider and older Al Qaeda Islamist ideological milieu, the article sketches out the historical landscape of violent Islamist extremism in Southeast Asia. There it focuses on the Al Qaeda-affiliated, Indonesian-based but transnational Jemaah Islamiyah (JI) network, revealing how the emergence of ISIS has impacted JI’s evolutionary trajectory. -
Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S. -
Invasive Weeds of the Appalachian Region
$10 $10 PB1785 PB1785 Invasive Weeds Invasive Weeds of the of the Appalachian Appalachian Region Region i TABLE OF CONTENTS Acknowledgments……………………………………...i How to use this guide…………………………………ii IPM decision aid………………………………………..1 Invasive weeds Grasses …………………………………………..5 Broadleaves…………………………………….18 Vines………………………………………………35 Shrubs/trees……………………………………48 Parasitic plants………………………………..70 Herbicide chart………………………………………….72 Bibliography……………………………………………..73 Index………………………………………………………..76 AUTHORS Rebecca M. Koepke-Hill, Extension Assistant, The University of Tennessee Gregory R. Armel, Assistant Professor, Extension Specialist for Invasive Weeds, The University of Tennessee Robert J. Richardson, Assistant Professor and Extension Weed Specialist, North Caro- lina State University G. Neil Rhodes, Jr., Professor and Extension Weed Specialist, The University of Ten- nessee ACKNOWLEDGEMENTS The authors would like to thank all the individuals and organizations who have contributed their time, advice, financial support, and photos to the crea- tion of this guide. We would like to specifically thank the USDA, CSREES, and The Southern Region IPM Center for their extensive support of this pro- ject. COVER PHOTO CREDITS ii 1. Wavyleaf basketgrass - Geoffery Mason 2. Bamboo - Shawn Askew 3. Giant hogweed - Antonio DiTommaso 4. Japanese barberry - Leslie Merhoff 5. Mimosa - Becky Koepke-Hill 6. Periwinkle - Dan Tenaglia 7. Porcelainberry - Randy Prostak 8. Cogongrass - James Miller 9. Kudzu - Shawn Askew Photo credit note: Numbers in parenthesis following photo captions refer to the num- bered photographer list on the back cover. HOW TO USE THIS GUIDE Tabs: Blank tabs can be found at the top of each page. These can be custom- ized with pen or marker to best suit your method of organization. Examples: Infestation present On bordering land No concern Uncontrolled Treatment initiated Controlled Large infestation Medium infestation Small infestation Control Methods: Each mechanical control method is represented by an icon. -
RANGE ROBBERS Vaidedetaide R4et9e Peapted
RANGE ROBBERS VAidedetaide R4et9e Peapted FEDERAL COOPERATIVE EXTENSION SERVICE OREGON STATE COLLEGE,CORVALLIS Cooperative Extension work in Agriculture and Home Economics, F. E. Price, director. Oregon State College and the United States Department of Agriculture cooperating. Printed and distributed in furtherance Of Acts of Congress of May 8 and June 30, 1914. Extension Bulletin 780 December 1958 IS THE THIRD in a series of Oregon Extension bulle- THIS1 tins on ranges and range management. The first was Ex- tension Bulletin 770, "Grass is the Wealth." It covered prin- ciples of grass growth. The second was "Extension Bulletin 772, "Ranchers, Ranges and Cows." It concerned livestock in relation to range feed. The principles listed applied to sheep as well as cattle. This bulletin, "Range Robbers," tells of the effects of sagebrush and other range weeds that steal moisture and plant food from useful range plants. Contents Page The Losses From Weeds 5 In former years the cattle thief was the villain of the range ; today weeds are stealing profit from the ranchers. I've Been Robbed 6 The rancher can organize his own system to get rid of the thieving weeds. What Tools Do the Robbers Use? 6 Weeds are encouraged and spread in many ways. Who Is Guilty? 7 Ranch owners may be innocent accomplices of thieving weeds. Make the Punishment Fit the Crime 8 Corrective measures vary for different weeds. Criminals Are Hard to Manage Keeping livestock off the range helps the situation, but other10 methods can speed up the improvement program. Rebuild Without Heavy Investment 10 Seven suggestions are given for range rebuilding. -
Survey of Terrorist Groups and Their Means of Financing
SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M. -
I TABLE of CONTENTS Page TABLE OF
TABLE OF CONTENTS Page TABLE OF AUTHORITIES……………………………………………………….v JURISDICTIONAL STATEMENT………………………………………………..1 ISSUES PRESENTED……………………………………………………………..2 PRELIMINARY STATEMENT…………………………………………………...4 STATEMENT OP FACTS…………………………………………………………4 PRE-TRIAL PROCEEDINGS………………………………………………6 The CIPA Motions……………………………………………………6 The Rule 15 Deposition………………………………………………6 Motions In Limine…………………………………………………….7 THE TRIAL…………………………………………………………………7 The Government’s Case………………………………………………7 Appellant as a Student at the University of Manitoba…………7 Cooperating Witnesses………………………………………..13 The FOB Chapman Incident and Forensic Evidence……….....20 The Handwritten Letters………………………………………25 Opinion Evidence……………………………………………..26 Lorenzo Vidino………………………………………...26 Evan Kohlmann………………………………………..29 i The Defense Case……………………………………………………32 Jury Deliberations and Motion for Mistrial…………………………..32 The Verdict…………………………………………………………..33 POST-TRIAL PROCEEDINGS The Presentence Report……………………………………………...33 Defense Sentencing Submission……………………………………..34 THE SENTENCING……..………………………………………………...34 SUMMARY OF ARGUMENT…………………………………………………..35 ARGUMENT POINT I: REVERSIBLE ERROR WAS COMMITTED WHEN THE LOWER COURT ADJUDICATED THE GOVERNMENT’S CIPA MOTIONS EX PARTE…………………………………………………………..36 POINT II: THE PHOTO IDENTIFICATION OF APPELLANT BY THE WITNESS SHOULD HAVE BEEN SUPPRESSED AS THE PRODUCT OF A SUGGESTIVE PROCEDURE……………………………………40 POINT III: REVERSIBLE ERROR WAS COMMITTED WHEN THE LOWER COURT ADMITTED, OVER APPELLANT’S RELEVANCE AND HEARSAY OBJECTIONS, THE OUT OF COURT STATEMENTS -
Hostile Intent and Counter-Terrorism Human Factors Theory and Application
Hostile Intent and Counter-Terrorism Human Factors Theory and Application Edited by ALEX STEDMON Coventry University, UK GLYN LAWSON The University of Nottingham, UK ASHGATE ©Alex Stedmon, Glyn Lawson and contributors 2015 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Alex Stedmon and Glyn Lawson have asserted their rights under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Famham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. The Library of Congress has cataloged the printed edition as follows: The Library of Congress Cataloging-in-Publication Data has been applied for. ISBN: 9781409445210 (hbk) ISBN: 9781409445227 (ebk-PDF) ISBN: 9781472402103 (ebk-ePUB) MIX Paper from FSC rasponalbla tourcea Printed in the United Kingdom by Henry Ling Limited, wwvii.te«ro FSC* C013985 at the Dorset Press, Dorchester, DTI IHD Chapter 12 Competitive Adaptation in Militant Networks: Preliminary Findings from an Islamist Case Study Michael Kenney Graduate School o f Public and International Affairs, University o f Pittsburgh, USA John Horgan International Center for the Study o f Terrorism, Pennsylvania State University, USA Cale Home Covenant College, Lookout Mountain, USA Peter Vining International Center for the Study o f Terrorism, Pennsylvania State University, USA Kathleen M. -
CTC Sentinel Welcomes Submissions
Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida. -
New Terrorism and New Media
research series vol 2 New Terrorism and New Media by Gabriel Weimann About the Author Gabriel Weimann is a Full Professor of Communication at the Department of Communication at Haifa University, Israel. His research interests include the study of media effects, political campaigns, new media technologies and their social impact, persuasion and influence, media and public opinion, modern terrorism and the mass media. He published eight books: Communicating Unreality (Los Angeles: Sage Publications, 2000); The Influentials: People Who Influence People (State University of New York Press, 1995); The Theater of Terror (New York: Longman, 1994); Hate on Trial (Toronto: Mosaic, 1986); The Singaporean Enigma (Jerusalem: Tzivonim, 2001); Terror on the Internet (Washington, DC: USIP Press, 2006); Freedom and Terror (London: Routledge, 2011); and Social Research in Israel (Jerusalem: Tzivonim). His papers and research reports (7 monographs and more than 160 publications), have been published in scientific journals and books. He received numerous grants and awards from international foundations and was a Visiting Professor at various universities including University of Pennsylvania, Stanford University, Hofstra University, American University DC, University of Maryland, Lehigh University (USA), University of Mainz (Germany), Carleton University (Canada) and the National University of Singapore. http://www.wilsoncenter.org/staff/gabriel-weimann. © 2014 Gabriel Weimann The report content may be reproduced in whole, or in part, for educational and non- commercial uses, pursuant to the Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported License found at http://creativecommons.org/licenses/by-nc- sa/3.0/deed.en_US and provided this copyright notice and the following attribution is given: Weimann, Gabriel. -
True and False Confessions: the Efficacy of Torture and Brutal
Chapter 7 True and False Confessions The Efficacy of Torture and Brutal Interrogations Central to the debate on the use of “enhanced” interrogation techniques is the question of whether those techniques are effective in gaining intelligence. If the techniques are the only way to get actionable intelligence that prevents terrorist attacks, their use presents a moral dilemma for some. On the other hand, if brutality does not produce useful intelligence — that is, it is not better at getting information than other methods — the debate is moot. This chapter focuses on the effectiveness of the CIA’s enhanced interrogation technique program. There are far fewer people who defend brutal interrogations by the military. Most of the military’s mistreatment of captives was not authorized in detail at high levels, and some was entirely unauthorized. Many military captives were either foot soldiers or were entirely innocent, and had no valuable intelligence to reveal. Many of the perpetrators of abuse in the military were young interrogators with limited training and experience, or were not interrogators at all. The officials who authorized the CIA’s interrogation program have consistently maintained that it produced useful intelligence, led to the capture of terrorist suspects, disrupted terrorist attacks, and saved American lives. Vice President Dick Cheney, in a 2009 speech, stated that the enhanced interrogation of captives “prevented the violent death of thousands, if not hundreds of thousands, of innocent people.” President George W. Bush similarly stated in his memoirs that “[t]he CIA interrogation program saved lives,” and “helped break up plots to attack military and diplomatic facilities abroad, Heathrow Airport and Canary Wharf in London, and multiple targets in the United States.” John Brennan, President Obama’s recent nominee for CIA director, said, of the CIA’s program in a televised interview in 2007, “[t]here [has] been a lot of information that has come out from these interrogation procedures. -
Radicalization”
Policing “Radicalization” Amna Akbar* Introduction ..................................................................................................................... 810 I. Radicalization Briefly Historicized ........................................................................... 818 II. Radicalization Defined and Deconstructed ........................................................... 833 III. Policing the New Terrorism ................................................................................... 845 A. Standards ........................................................................................................ 846 B. Tactics ............................................................................................................. 854 1. Mapping .................................................................................................. 855 2. Voluntary Interviews ............................................................................ 859 3. Informants .............................................................................................. 861 4. Internet Monitoring .............................................................................. 865 5. Community Engagement ..................................................................... 866 IV. Radical Harms ........................................................................................................... 868 A. Religion, Politics, and Geography .............................................................. 869 B. A Fundamental Tension -
Islamic Radicalization in the Uk: Index of Radicalization
ISLAMIC RADICALIZATION IN THE UK: INDEX OF RADICALIZATION Anna Wojtowicz, (Research Assistant, ICT) Sumer 2012 ABSTRACT The purpose of this paper is to analyze the process of radicalization amongst British Muslims in the United Kingdom. It begins with a review of the Muslim population, demographics and community structure. Further presenting several internal and external indicators that influenced and led to radicalization of Muslim youth in Britain. The paper concludes that there is no one certainty for what causes radicalization amongst Muslims in United Kingdom. However, it is certain that Islamic radicalization and the emergence of a homegrown threat is a growing trend that jeopardizes the countries security, peace and stability. Radicalization in the United Kingdom is an existing concern that needs to be addressed and acted upon immediately. Misunderstanding or underestimating the threat may lead to further and long term consequences. * The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 I. Introduction 4 II. Background 5 History of the Muslim Community in the United Kingdom 5 Population 7 Geographical Concentration of Muslims 8 Ethnic Background 10 Age Estimate 11 Occupation and Socio-Economic Conditions 11 Religious and Cultural Aspects 13 Multiculturalism 17 Islamophobia 20 Converts 21 Case Studies –London, Birmingham, Bradford, Leeds, Leicester 22 III. Organizations 28 Organizations within the United Kingdom 28 Mosques, Koranic Schools and Islamic Centers 34 Student Groups 40 Islamic Websites and TV 43 IV. Radicalization in Britain 43 Theoretical Background and Causes of Radicalization 43 Recruitment and Radicalization: Overlook 47 Radicalization Process 49 Forms of Financing 51 Radical Groups and Movements in the UK 53 Influential Leaders in the UK 60 Inspiration and Influence from Abroad 67 Sunni 67 Shia 70 3 V.