Chrymereport.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Chrymereport.Pdf These Papers are published by Agenfor Italia. Founded in 1996 by eminent Italian researchers, Agenfor is an independent think-tank ba- sed in Rome, Rimini, Milano, Como, Lecco, Verona and Rovigo. Its interdisciplinary research on the Middle East and Security Policies is conducted in a spirit of total academic freedom. A platform of quality information, a forum for debate and analysis, a melting pot of ideas in the field of international politics, Agenfor’s ambition – through its publi- cations, seminars and recommendations - is to make a useful contribu- tion to the decisionmaking process. Given the highly sensitive nature of the study, the research teams ob- served the strictest frameworks and security measures to ensure legal, safe and confidential data storage and retrieval. The anonymity of all interviewees was guaranteed, and assurances to this effect given to all who responded to or participated in the study. Disclaimer This study does not necessarily reflect the opinions and views of the European Commission or of Agenfor, nor are they bound by its conclu- sions. Copyright clause Reproduction is authorised, except for commercial purposes, provided the source is acknowledged and the following text accompanies any reproduction: this study has been produced by Agenfor for the Euro- pean Commission - Directorate Generale Justice Freedom and Secu- rity - CRYME JLS/2007/ISEC/551- Acknowledgements This report was authored by dr. Sergio Bianchi. The report also draws on direct contributions from the following indivi- duals: · Dr Issam Mujihed · Dr Nicola Giovannini · Avv.sa Malena Zinconi Fernandez · Dr Paolo Quercia · Dr Sergio de Vita I N D EX INTRODUCTION pag. 6 TERMINOLOGY AND SUMMARY 10 ABSTRACT 18 I. ASSESSMENT OF THE THREAT BETWEEN FRIEND AND FOE 26 I.1 Radicalisation and violence 6 Fact box - The measures taken by the Italian Government after 11/9 56 Fact box - Spanish Legislation 58 Fact box - French Law 62 Fact box - The terrorism act 2006 70 I.2 Radicalisation and Islam 80 I. Jihad and Jihadism 8 II. CASE HISTORIES OF PENITENTIAL RADICALISATION 98 Jeff Fort 100 Nizar Trabelsi 100 Richard Reid and the Great Britain case 102 Josè Padilla 106 Allekma Lamari 106 Abdelrahman Tahriri 108 Gamal Ahmidan 108 Kevin Lamar James 110 Operation Hades 112 Bassam Ayachi 11 III. QUANTITATIVE DATA - RISK INDICATORS 116 III. 1- Italy: from logistics to the practice of terrorism 10 III. 2- Spain 162 III. -England 202 III. - France 28 III. 5- Belgium 256 IV. THE DE-RADICALISATION POLICIES IN THE MUSLIM WORLD 278 V. THE PHENOMENOLOGY OF RADICALISATION 292 VI. RISK ELEMENTS AND NEW MODELS 18 VI 1. Homogeneity of registered data and service standard 18 VI 2. The Imams and Leaders 2 VI . Prisoners accused of crimes connected with terrorism. 6 VI . Inter-Institutional co-ordination 6 VI 5. “PREVENT”: a Good Practice for Europe 5 VII. CONCLUSIONS 60 Bibliography 78 I N D I C E INTRODUZIONE pag. 7 TERMINOLOGIA E SOMMARIO 11 ABSTRACT 19 I. L’ANALISI DELLA MINACCIA FRA AMICO E NEMICO 27 I.1 Radicalizzazione e violenza 7 Fact box - I provvedimenti del Governo Italiano dopo l’11/9 57 Fact box - La Legislazione spagnola 59 Fact box - La Legislazione francese 6 Fact box - Il terrorism act 2006 71 I.2 Radicalizzazione ed Islam 81 I. Jihad e Jihadismo 85 II. CASE HISTORIES DELLA RADICALIZZAZIONE PENITENZIARIA 99 Jeff Fort 101 Nizar Trabelsi 101 Richard Reid e i casi inglesi 10 Josè Padilla 107 Allekma Lamari 107 Abdelrahman Tahriri 109 Gamal Ahmidan 109 Kevin Lamar James 111 Operazione Hades 11 Bassam Ayachi 115 III. I DATI QUANTITATIVI QUALI INDICATORI DI RISCHIO 117 III.1- Italia: dalla logistica alla pratica del terrorismo 11 III.2- Spagna: le radici europee del jiadhismo 16 III.3- Inghilterra: l’integrazione difficile 203 III.- Francia: l’Islam come religione di maggioranza nelle carceri 29 III.5- Belgio: crocevia del radicalismo estremista? 257 IV. LE POLITICHE DI DE-RADICALIZZAZIONE NEL MONDO MUSULMANO 279 V. FENOMENOLOGIA DELLA RADICALIZZAZIONE 29 VI. FATTORI DI RISCHIO E NUOVI MODELLI 19 VI.1) Omogeneità dei dati di matricola e Standard di servizio 19 VI.2) Gli Imam ed i Leader 25 VI.) I detenuti per reati connessi al terrorismo 7 VI.) Il Coordinamento inter-istituzionale 7 VI.5) ‘PREVENT’: una Buona Prassi per l’Europa 55 VII. CONCLUSIONI 61 Bibliografia 78 5 INTRODUCTION The antidote to the venom of terrorism by Maria Elisabetta Alberti Casellati * Undersecretary of State in the Ministry of Justice The tragedy of September 11th and the historic turning-point in international relations which followed this event has forced the West to start thinking from scratch about the policies of security. At the same time, it has become dramatically obvious that a new approach to the phenomenon of terrorism is needed. Terrorism has caused bloodshed in our history and in that of other European countries too. The last-ditch attempt of Italian ideological extremism is still linked to what is left of the Red Brigade and is now aggravated by the Jihad radicalisation with all its destabilising implications: religious contents based on a distorted and exploited use of the Koran together with its international ramifications of groups and movements. The Agenfor Italia study and the CRYME project (Criminal Rehabilitation of Young Muslim in Europe) sound out the reality of prisons which are revealed as being highly dangerous breeding grounds for fundamentalism and for out-and-out recruitment of new adepts in the army of terror. The global dimension of the phenomenon needs a strategy which is able to transcend national fences. A strategy which must involve not only Governments but all citizens beginning with the Islam community which must be defended from generalisation and dangerous criminalisation of the mass. Our country has contributed to the elaboration of a European policy able to prevent and repress the spreading of the vicious seeds of Jihadism and update this policy with decisive and coherent action. In the Italian penitentiary institutes the risk of proselytism with a final aim of armed combat is a fact, and this is why it is continually monitored. The prisoners who practice the Islamic faith are almost 18% of the whole prison population: 24 thousand out of 65 thousand of which 80 were directly involved in crimes related to terrorism. A problem within a bigger problem is the overcrowding in prisons. To solve this emergency the government has proposed to create 47 sectors and 8 new institutes which all together can hold 80 thousand prisoners. 6 INTRODUZIONE L’antidoto al veleno del terrorismo di Maria Elisabetta Alberti Casellati Sottosegretario di Stato alla Giustizia La tragedia dell’11 settembre e la svolta epocale nelle relazioni inter- nazionali che a quell’evento è seguita ha imposto all’Occidente di ri- pensare dalle fondamenta le politiche per la sicurezza. E, allo stesso tempo, ha reso drammaticamente evidente la necessità di un approc- cio nuovo a un fenomeno come il terrorismo, che pure ha sanguinosa- mente segnato la storia del nostro come di altri Paesi europei. Ai colpi di coda dell’estremismo ideologico, in Italia ancora legati a quel che resta delle Brigate Rosse, si è aggiunta, infatti, la radicalizzazione jihadista con tutte le sue destabilizzanti implicazioni: il contenuto reli- gioso, basato su una lettura distorta e spesso strumentale del Corano insieme con la ramificazione internazionale di gruppi e movimenti. Lo studio dell’Agenfor Italia ed il progetto CRYME (Criminal Rehabili- tation of Young Muslim in Europe) opportunamente scandagliano una realtà, quella carceraria, che si è rivelata pericoloso bacino di coltura per il fondamentalismo e per il vero e proprio reclutamento di nuovi adepti dell’esercito del terrore. La dimensione globale del fenomeno impone una strategia capace di supe- rare gli steccati nazionali. Una strategia che coinvolga non solo i Governi, ma tutti i cittadini, a partire dalla comunità islamica che va messa al riparo da generalizzazioni e pericolose criminalizzazioni di massa. Il nostro Paese ha dato un importante contributo all’elaborazione di una politica europea capa- ce di prevenire e reprimere il diffondersi della mala pianta del jihadismo ed a quella politica oggi informa la propria azione con coerenza e decisione. Negli istituti penitenziari italiani il rischio di un proselitismo finalizzato alla lotta armata è concreto e, proprio per questo, costantemente mo- nitorizzato. Basti pensare che i detenuti di fede islamica sono quasi il 18% dell’intera popolazione carceraria: 24 mila su circa 65 mila, ottan- ta dei quali per reati direttamente associati al terrorismo. Un problema all’interno di un problema più vasto, quello del sovraffollamento del sistema carcerario. A questa emergenza risponde il piano straordinario varato dal governo che si propone di creare 47 padiglioni e 8 nuovi istituti in modo da portare a 80 mila unità la capienza complessiva. 7 However, as the in-depth report of Agentor Italia illustrates, it would be a mistake to face fundamentalism solely with repression. What our country is doing and the innovative experience already gained in other European States which are documented in this report, are based on the knowledge that the fake Jihad prophets must be singled out and fought by all of us, a duty which must involve society and the moderate Islam with which there has always been productive dialogue. This is the main road to take if we want to achieve reciprocal respect, peaceful religious and different cultural co-existence which have always belonged to the genetic code of European history. 8 Ma, come documenta in modo esaustivo il rapporto dell’Agenfor Italia, sarebbe sbagliato ricondurre la questione del fondamentalismo ad una dimensione esclusivamente repressiva. Il lavoro che si va facendo nel nostro Paese e le esperienze innovative già avviate in altri Stati europei e documentate in questo studio, muovono dalla consapevolezza che i falsi profeti della Jihad vanno individuati e combattuti con un impegno collettivo; impegno che sempre più coinvolga la società civile e quel- l’Islam moderato col quale è in atto da sempre un dialogo fecondo.
Recommended publications
  • N:\Spaul\Newsrel\Anti-Terrorism\Finton Release
    Acting United States Attorney Jeffrey B. Lang Central District of Illinois FOR IMMEDIATE RELEASE CONTACT: SHARON PAUL THURSDAY, SEPTEMBER 24, 2009 PHONE: (217) 492-4450 www.usdoj.gov/usao/ilc/ ILLINOIS MAN ARRESTED IN PLOT TO BOMB COURTHOUSE AND MURDER FEDERAL EMPLOYEES -- Vehicle Bomb Placed at Scene Was Inactive and Posed No Danger to Public -- SPRINGFIELD – Acting U.S. Attorney Jeffrey B. Lang of the Central District of Illinois and Karen E. Spangenberg, Special Agent in Charge of the FBI, Springfield Division, today announced that Michael C. Finton, a.k.a., “Talib Islam,” has been arrested on charges of attempted murder of federal employees and attempted use of a weapon of mass destruction (explosives) in connection with a plot to detonate a vehicle bomb at the federal building in Springfield, Ill. In his alleged efforts to carry out the plot, Finton ultimately dealt with undercover FBI agents and confidential sources who continuously monitored his activities up to the time of the arrest. Further, in his alleged efforts, Finton drove a vehicle containing inactive explosives to the Paul Findley Federal Building and Courthouse in Springfield and attempted to detonate them, according to a criminal complaint filed today in the Central District of Illinois. The arrest of Finton is not in any way related to the ongoing terror investigation in New York and Colorado. Finton, 29, a resident of Decatur, Ill., is charged in the criminal complaint with one count of attempted murder of federal officers or employees and attempted use a weapon of mass destruction. If convicted, he faces a maximum penalty of life in prison.
    [Show full text]
  • Borderless World, Boundless Threat:Online Jihadists and Modern
    BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Spencer O. Hayne, B.A. Washington, DC November 19, 2010 Copyright © 2010 by Spencer O. Hayne All Rights Reserved ii BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM Spencer O. Hayne, B.A. Thesis Advisor: Justine A. Rosenthal, Ph.D. ABSTRACT The online jihadist community represents a new phenomenon in the global spread of Islamic radicalism. Many terrorism experts largely ignore the fact that the Internet is more than just a tool for established terrorist organizations—it can be a platform for the evolution of the jihadist social movement itself. While the majority of this movement’s members are casual supporters of a global Islamist jihad against the West, a number of the community’s members have already proven willing to take their virtual beliefs into the real world through terrorist acts. Many of these terrorists have attracted significant media attention—Jihad Jane, the Christmas Day Bomber, the Fort Hood Shooter, the attack on CIA agents in Afghanistan, the Times Square Bomber, and a number of other “homegrown” terrorists. The individuals perpetrating these terrorist acts are as diverse as they are dangerous, presenting a significant challenge to counterterrorism officials and policymakers. This study profiles 20 recent cases of online jihadists who have made the transition to real-world terrorism along a number of characteristics: age, ethnicity, immigration status, education, religious upbringing, socio-economic class, openness about beliefs, suicidal tendencies, rhetoric focus, location, target, terrorist action, offline and online activity, and social isolation or the presence of an identity crisis.
    [Show full text]
  • STINGS, STOOLIES, and AGENTS PROVOCATEURS: EVALUATING FBI UNDERCOVER COUNTERRORISM OPERATIONS a Thesis Submitted to the Faculty
    STINGS, STOOLIES, AND AGENTS PROVOCATEURS: EVALUATING FBI UNDERCOVER COUNTERRORISM OPERATIONS A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Joseph Bertini, B.A. Washington, DC April 15, 2011 Copyright 2011 by Joseph Bertini All Rights Reserved ii TABLE OF CONTENTS Introduction ...................................................................................................................... 1 Literature Review............................................................................................................. 3 Background Information .................................................................................................. 4 Data and Methods .......................................................................................................... 13 Analysis.......................................................................................................................... 17 Conclusions and Recommendations .............................................................................. 30 Appendix ........................................................................................................................ 36 Bibliography ................................................................................................................... 44 iii I. Introduction After the September 11, 2001 terrorist attacks, the Federal Bureau of Investigation (FBI) dramatically
    [Show full text]
  • Combating Terrorism: the Role of Law Enforcement
    Disclaimer The authors, editors, and the research staff cannot be held responsible for errors or any consequences arising from the use of information contained in this publication. The views expressed do not necessarily reflect those of the institutions associated with this report. Copyright © 2016 by the Inter-University Center for Terrorism Studies directed by Professor Yonah Alexander. All rights reserved. No part of this report may be reproduced, stored, or distributed without the prior written consent of the copyright holder. Please contact the Inter-University Center for Terrorism Studies at the Potomac Institute for Policy Studies, 901 North Stuart Street, Suite 200, Arlington, VA 22203 Tel. 703-562-4513, 703-525-0770 ext. 237 Fax 703-525-0299 [email protected] www.potomacinstitute.org www.terrorismelectronicjournal.org www.iucts.org Cover Design by Alex Taliesen THE INTER-UNIVERSITY CENTER FOR TERRORISM STUDIES Combating Terrorism: The Role of Law Enforcement Table of Contents Professor Yonah Alexander................................................................................................................... 1 Michael Braun ........................................................................................................................................... 9 Sgt. Mark Landahl .................................................................................................................................. 14 Captain Dave Martin ...........................................................................................................................
    [Show full text]
  • Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001
    CORPORATION THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • Drones: the Power to Kill
    Drones: The Power to Kill Alberto R. Gonzales* ABSTRACT After the terrorist attacks on September 11th, 2001, the Bush Administra- tion began the use of unmanned armed aerial drones to pursue targets in Af- ghanistan and Pakistan. The Obama Administration has continued this policy, expanding it to pursue substantially more targets in Yemen and new ones in Pakistan. This Article analyzes the Obama Administration’s proce- dures for placing American citizens on the list of targets for drone strikes and proposes additional measures that Congress and the President can take to en- sure that the procedures comply with constitutional guarantees of due process. This Article uses Supreme Court precedents on enemy combatant designations and trials as a source of due process standards. It argues for the following steps: (1) the establishment of an “enemy combatant” definition specific to drone targets; (2) a requirement that the President notify Congress of any po- tential U.S. citizen target and of any executed strike; (3) verification, immedi- ately before the strike, that the American target continues to meet the definition of enemy combatant; and (4) the opportunity for an advocate of the target to challenge the classification before a neutral decisionmaker. TABLE OF CONTENTS INTRODUCTION ................................................. 2 I. A BACKGROUND ON DRONE STRIKES AND AL-AULAQI ............................................. 4 A. Use of Drones as Weapons Against Terrorism ...... 4 B. The Case of Anwar Al-Aulaqi ...................... 8 II. THE LEGAL FRAMEWORK FOR DRONE STRIKES ........ 17 A. Defining “Enemy Combatant” ...................... 17 B. The President’s Authority in Times of War .......... 19 C. Due Process Rights of American Citizens in Times of War .............................................
    [Show full text]
  • SIGINT for Anyone
    THE ORIGINS OF AMERICA’S JIHADISTS THE ORIGINS OF AMERICA’S About This Perspective The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results. No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war. The United States has invested significant resources in THE ORIGINS OF preventing terrorist attacks, and authorities have been able to uncover and thwart most of the terrorist plots. This Perspective identifies 86 plots to carry out terrorist attacks and 22 actual attacks since 9/11 involving 178 planners and perpetrators. Eighty-seven percent of those planners and perpetrators had long residencies in the United States. Only four of them had come to the United States illegally, all as minors. Nationality is a poor predictor of later terrorist activity, and vetting people coming to the United States, no matter how rigorous, cannot identify those who radicalize here. Determining whether a young teenager might, more than 12 years later, turn out to be a jihadist AMERICA’S terrorist would require the bureaucratic equivalent of divine foresight. Jenkins JIHADISTS Brian Michael Jenkins $21.00 ISBN-10 0-8330-9949-3 ISBN-13 978-0-8330-9949-5 52100 C O R P O R A T I O N www.rand.org Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE C O R P O R A T I O N 9 780833 099495 R PE-251-RC (2017) barcode_template_CC15.indd 1 10/17/17 12:00 PM Contents Summary of Key Judgments ..................................................................................1 The Origins of America’s Jihadists .........................................................................3 Appendix .............................................................................................................
    [Show full text]
  • Confronting an Uncertain Threat: the Future of Al Qaeda and Associated
    Confonting an Uncertain Threat an Uncertain Confonting a report of the csis homeland security and counterterrorism program and the csis transnational threats project Confronting an Uncertain Threat the future of al qaeda and associated movements 1800 K Street, NW | Washington, DC 20006 Project Directors Tel: (202) 887-0200 | Fax: (202) 775-3199 Rick “Ozzie” Nelson E-mail: [email protected] | Web: www.csis.org Thomas M. Sanderson Nelson and Sanderson Nelson Project Coordinators Ben Bodurian David Gordon Project Senior Advisers Arnaud de Borchgrave Juan C. Zarate September 2011 ISBN 978-0-89206-667-4 Ë|xHSKITCy066674zv*:+:!:+:! a report of the csis homeland security and counterterrorism program and the csis transnational threats project Confronting an Uncertain Threat the future of al qaeda and associated movements Project Directors Rick “Ozzie” Nelson Thomas M. Sanderson Project Coordinators Ben Bodurian David Gordon Project Senior Advisers Arnaud de Borchgrave Juan C. Zarate September 2011 About CSIS At a time of new global opportunities and challenges, the Center for Strategic and International Studies (CSIS) provides strategic insights and bipartisan policy solutions to decisionmakers in government, international institutions, the private sector, and civil society. A bipartisan, nonprofit organization headquartered in Washington, D.C., CSIS conducts research and analysis and devel- ops policy initiatives that look into the future and anticipate change. Founded by David M. Abshire and Admiral Arleigh Burke at the height of the Cold War, CSIS was dedicated to finding ways for America to sustain its prominence and prosperity as a force for good in the world. Since 1962, CSIS has grown to become one of the world’s preeminent international policy institutions, with more than 220 full-time staff and a large network of affiliated scholars focused on defense and security, regional stability, and transnational challenges ranging from energy and climate to global development and economic integration.
    [Show full text]
  • Assessing the Terrorist Threat
    REPORT OF THE NATIONAL SECURITY PREPAREDNESS GROUP i PETER BERGEN AND BRUCE HOFFMAN SEPTEMBER 10, 2010 ASSESSING THE TERRORIST THREAT Executive Summary Al-Qaeda and allied groups continue to pose a threat to the United States. Although it is less severe than the catastrophic proportions of a 9/11-like attack, the threat today is more complex and more diverse than at any time over the past nine years. Al-Qaeda or its allies continue to have the capacity to kill dozens, or even hundreds, of Americans in a single attack. A key shift in the past couple of years is the increasingly prominent role in planning and operations that U.S. citizens and residents have played in the leadership of al-Qaeda and aligned groups, and the higher numbers of Americans attaching themselves to these groups. Another development is the increasing diversification of the types of U.S.-based jihadist militants, and the groups with which those militants have affiliated. Indeed, these jihadists do not fit any particular ethnic, economic, educational, or social profile. Al-Qaeda‟s ideological influence on other jihadist groups is on the rise in South Asia and has continued to extend into countries like Yemen and Somalia; al-Qaeda‟s top leaders are still at large, and American overreactions to even unsuccessful terrorist attacks arguably have played, however inadvertently, into the hands of the jihadists. Working against al-Qaeda and allied groups are the ramped-up campaign of drone attacks in Pakistan, increasingly negative Pakistani attitudes and actions against the militants based on their territory, which are mirrored by increasingly hostile attitudes toward al-Qaeda and allied groups in the Muslim world in general, and the fact that erstwhile militant allies have now also turned against al-Qaeda.
    [Show full text]
  • Anti- Terror Lessons of Muslim-Americans
    Anti- Terror Lessons of Muslim-Americans DAVID SCHANZER SANFORD SCHOOL OF PUBLIC POLICY DUKE UNIVERSITY CHARLES KURZMAN DEPARTMENT OF SOCIOLOGY UNIVERSITY OF NORTH CAROLINA, CHAPEL HILL EBRAHIM MOOSA DEPARTMENT OF RELIGION DUKE UNIVERSITY JANUARY 6, 2010 Project Supported by the National Institute of Justice This project was supported by grant no. 2007-IJ-CX-0008, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. — 2 — Table of Contents Executive Summary.......1 Introduction.......4 Part 1. Homegrown Terrorism: Rhetoric and Reality.... ..6 Part 2. Muslim-Americans’ Anti-Radicalization Activities.....18 Part 3. Conclusions and Recommendations.....40 About the Authors.....46 Acknowledgments.....47 Endnotes.....48 Appendix: Muslim-American Terrorism Offenders, 2001-2009.....53 Sidebars Research Site Profiles.....12-16 North Carolina Terrorism Arrests.....17-18 “I Called the FBI”.....23-24 “Venting Sessions”..........26 “We Monitor Our Masjids”..........27 “What Will Harm Them, Will Harm Us”..........35 “We Are Not Against America”..........36 Charts Age..... 10 Citizenship Status.... .11 EtEthnicity.... .11 Incidents..........11 Executive Summary PURPOSE OF THE PROJECT Low Numbers of Radicalized Muslim-Americans. Although the vast majority of Muslim-Americans reject In the aftermath of the attacks on September 11, radical extremist ideology and violence, a small number 2001, and subsequent terrorist attacks elsewhere of Muslim-Americans have radicalized since 9/11. In around the world, a key counterterrorism concern the eight years following 9/11, according to our project’s is the possible radicalization of Muslims living in count, 139 Muslim-Americans committed acts of ter- the United States.
    [Show full text]
  • American Muslim Extremists: a Continuing Threat to Jews
    American Muslim Extremists: A Continuing Threat to Jews Updated: April 24, 2013 Introduction Since the September 11 terrorist attacks, an alarming number of Americans motivated by radical interpretations of Islam have been involved in terrorist plots and conspiracies in which Jews and Jewish institutions have been targeted or considered for attack. Many other American Muslim extremists arrested or convicted of a wide-range of terror-related charges have expressed similar hatred of Jews and Israel. Approximately 250 American Muslim extremists, including legal residents, have been arrested on various terror-related charges, ranging from bomb plots to providing material support to terrorists, since 9/11. About half of those arrested are U.S.-born, and roughly one quarter are converts to Islam. While most of the plots in the U.S. have been foiled by law enforcement before they were carried out, the number of conspiracies and plots targeting Jews and Jewish institutions demonstrates the ongoing threat posed by American Muslim extremists motivated by hatred of Jews and Israel. For example, Ahmed Ferhani, a legal resident from Algeria, and Mohammad Mamdouh, a naturalized U.S. citizen awaiting trial, were arrested in May 2011 for plotting to attack a synagogue in New York City. According to authorities, the two targeted Jews in order to advance their radical ideological goals. Reading a prepared statement in Manhattan Supreme Court, Ferhani declared “I repeatedly discussed…my anger towards Jews based on what I believed and perceived to be their mistreat- ment of Muslims throughout the world. I intended to create chaos and send a message of intimida- tion and coercion to the Jewish population of New York City, warning them to stop mistreating Muslims.” Two years earlier, three American Muslim converts and one Haitian national allegedly plotted to attack synagogues in the Bronx and to shoot down airplanes at a military base in Newburgh, New York.
    [Show full text]
  • Restricting Presidential War Powers
    Presidential War Powers 1 Restoring the Balance: Restricting Presidential War Powers A controversy paper proposal for the 2013-14 CEDA season Dr. Kelly Young, Wayne State (OSOs) John Koch, Wayne State (Drones/UAV) Bruce Najor, Wayne State (Detention) Al Hiland, Minnesota (Covert Ops) Jacob Justice, Wayne State (Wiretapping) Brad Meloche, Wayne State (Preventive Intervention) Talya Slaw, Wayne State (UN/NATO Operations) Presidential War Powers 2 Table of Contents Executive Summary…………………………………………………………………………………………………………………………………3 I. Introduction……………………………………………………………………………..…………………………………………………5 II. The Status Quo and the Central Controversy A. The Status Quo & Uniqueness……………………………………………………………………………………….7 B. Stakes of the Controversy………………………………………………………………………………………………9 III. Mainstream options for policy change –Limitations/Restrictions on War Powers A. Statutory Limitations or Restrictions as a Mechanism……………………………………………………………….12 B. Broad Statutory Approaches to Restrict the Use of War Powers………………………………….16 C. Specific Approaches to Restrict the Use of War Powers 1. UAV/Drone Strikes…………………………………………………………………………………………..17 2. Offense Cyber Operations……………………………………………………………………………….25 3. Indefinite Detention………………………………………………………………………………………..29 4. Warrantless Wiretapping…………………………………………………………………………………39 5. DOD Covert Operations…………………………………………………………………………………..46 6. Approval for UN/NATO Action…………………………………………………………………………52 7. Unilateral Preventive Military Operations……………………………………………………….57 D. Critical Approaches to Limiting Presidential
    [Show full text]