The Islamic State Movement
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Metamorphosis-AQI to ISIS
THE METAMORPHOSIS FROM AQI TO THE ISLAMIC STATE OF IRAQ (2006–2011) Excerpted from The Terrorists of Iraq by Malcolm Nance (Taylor and Francis, 2014). 46 The Counter Terrorist ~ February/March 2015 By Malcolm W. Nance As early as 2005 al-Qaeda in Iraq (AQI) had sought to carve out a national entity within Iraq. They went so far as to declare an Islamic Emirate of Iraq. At the time they only occupied a few dozen safe houses in the Western governorates, some in Baghdad and a neighborhood in Anbar Province. he Jolan District in Fallujah had instead of operatives in a terrorist group. been dominated by AQI members Under the protection of the Iraqi Sunni Tand sympathizers starting in the months community, they wanted to carve out a after the invasion. It was quickly lost piece of secure terrain that would allow along with more than 1,000 jihadist foreign fighters to abandon their homes fighters to the U.S. Marines, who rooted and families, come via Syria to the “state” them out in intense house-to-house in their jihadist version of the Prophet combat. Even without occupying any Mohammed’s Hijra (emigration), and land, they understood that the concept start a new life toward an eventual place of appearing to be a virtual entity was a in paradise. They could take on local psychological multiplier for their fighters. wives, train, brag, and fight alongside Better to be considered heroes of a nation other men like themselves. They needed Jihadists traveling in pick up trucks. Photo by: Magharebia The Counter Terrorist ~ February/March 2015 47 a place of their own where they could be involved in something bigger than themselves—they could fight like the companions of the prophet Mohammed in a real, live jihad against the “crusaders” and “apostates.” The best of them would volunteer to die in martyrdom bombings and go straight to heaven! So it was decided that even itinerant “knights” needed a base of operations to call home. -
Impact of International Law on the Application of Islamic Law in Saudi Arabia
Hamzah, Dawood Adesola (2015) Impact of international law on the application of Islamic law in Saudi Arabia. PhD Thesis. SOAS, University of London http://eprints.soas.ac.uk/18432 Copyright © and Moral Rights for this thesis are retained by the author and/or other copyright owners. A copy can be downloaded for personal non‐commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder/s. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. When referring to this thesis, full bibliographic details including the author, title, awarding institution and date of the thesis must be given e.g. AUTHOR (year of submission) "Full thesis title", name of the School or Department, PhD Thesis, pagination. Impact of International Law on the Application of Islamic Law in Saudi Arabia Dawood Adesola Hamzah Thesis Submitted for the Degree of PhD 2015 Department of Law School of Oriental and African Studies University of London Declaration for PhD Thesis I have read and understood regulation 17.9 of the Regulation for student of the SOAS, University of London concerning plagiarism. I undertake that all the material presented for examination is my own work and has not been written for me, in whole or in part, by any other person. I also undertake that any quotation or paraphrase from the published or unpublished work of another person has been duly acknowledged in the work which I present for examination. -
Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P. -
Jihadists and Nuclear Weapons
VERSION: Charles P. Blair, “Jihadists and Nuclear Weapons,” in Gary Ackerman and Jeremy Tamsett, eds., Jihadists and Weapons of Mass Destruction: A Growing Threat (New York: Taylor and Francis, 2009), pp. 193-238. c h a p t e r 8 Jihadists and Nuclear Weapons Charles P. Blair CONTENTS Introduction 193 Improvised Nuclear Devices (INDs) 195 Fissile Materials 198 Weapons-Grade Uranium and Plutonium 199 Likely IND Construction 203 External Procurement of Intact Nuclear Weapons 204 State Acquisition of an Intact Nuclear Weapon 204 Nuclear Black Market 212 Incidents of Jihadist Interest in Nuclear Weapons and Weapons-Grade Nuclear Materials 213 Al-Qa‘ida 213 Russia’s Chechen-Led Jihadists 214 Nuclear-Related Threats and Attacks in India and Pakistan 215 Overall Likelihood of Jihadists Obtaining Nuclear Capability 215 Notes 216 Appendix: Toward a Nuclear Weapon: Principles of Nuclear Energy 232 Discovery of Radioactive Materials 232 Divisibility of the Atom 232 Atomic Nucleus 233 Discovery of Neutrons: A Pathway to the Nucleus 233 Fission 234 Chain Reactions 235 Notes 236 INTRODUCTION On December 1, 2001, CIA Director George Tenet made a hastily planned, clandestine trip to Pakistan. Tenet arrived in Islamabad deeply shaken by the news that less than three months earlier—just weeks before the attacks of September 11, 2001—al-Qa‘ida and Taliban leaders had met with two former Pakistani nuclear weapon scientists in a joint quest to acquire nuclear weapons. Captured documents the scientists abandoned as 193 AU6964.indb 193 12/16/08 5:44:39 PM 194 Charles P. Blair they fled Kabul from advancing anti-Taliban forces were evidence, in the minds of top U.S. -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
Reforming U.S. Drone Strike Policies
Reforming U.S. Strike Policies Drone Reforming Cover photo: A U.S. Air Force MQ-9 Reaper from the 62nd Expeditionary Reconnaissance Squadron takes o! from Kandahar Air Base, Afghanistan, on March 13, 2009, in support of Operation Enduring Freedom (Sta! Sgt. James L. Harper Jr./U.S. Air Force). Council Special Report No. 65 Council on Foreign Relations January 2013 58 East 68th Street Council No. 65 Special Report New York, NY 10065 tel 212.434.9400 Micah Zenko fax 212.434.9800 1777 F Street, NW Washington, DC 20006 Reforming U.S. tel 202.509.8400 fax 202.509.8490 www.cfr.org Drone Strike Policies Reforming U.S. Drone Strike Policies Council Special Report No. !" January #$%& Micah Zenko Reforming U.S. Drone Strike Policies The Council on Foreign Relations (CFR) is an independent, nonpartisan membership organization, think tank, and publisher dedicated to being a resource for its members, government o'cials, business execu- tives, journalists, educators and students, civic and religious leaders, and other interested citizens in order to help them better understand the world and the foreign policy choices facing the United States and other countries. Founded in %(#%, CFR carries out its mission by maintaining a diverse membership, with special programs to promote interest and develop expertise in the next generation of foreign policy leaders; con- vening meetings at its headquarters in New York and in Washington, DC, and other cities where senior government o'cials, members of Congress, global leaders, and prominent thinkers come together with CFR members to discuss and debate major international issues; supporting a Studies Program that fosters independent research, enabling CFR scholars to produce articles, reports, and books and hold roundtables that analyze foreign policy issues and make concrete policy recommendations; publishing Foreign A!airs, the preeminent journal on international a)airs and U.S. -
Recruitment and Radicalization of School-Aged Youth by International
HOMELAND SECURITY INSTITUTE The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the Homeland Security Act of 2002. Analytic Services Inc. operates HSI under contract number W81XWH-04-D-0011. HSI’smiiission istoassist the Secretary of HldHomeland SiSecurity, the UdUnder Secretary for Science and Technology, and the Department of Homeland Security (DHS) operating elements in addressing national policy and security issues where scientific, technical, and analytical expertise is required. HSI also consults with other government agencies, nongovernmental organizations, institutions of higher education, and nonprofit organizations. HSI delivers independent and objective analyses and advice to support policy developp,ment, decision making, alternative approaches, and new ideas on significant issues. HSI’s research is undertaken by mutual consent with DHS and is organized by Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under Task 08-37, Implications for U.S. Educators on the Prevalence and Tactics Used to Recruit Youth for Violent or Terrorist Activities Worldwide of HSI’s Fiscal Year 2008 Research Plan. The purpose of the task is to look at the phenomenon of school-aged individuals being recruited by individuals or groups that promote violence or terrorissm. The results presented in this report do not necessarily reflect official DHS opinion or policy. Homeland Security Institute Catherine Bott Task lead, Threats Analysis Division W. James Castan Robertson Dickens Thomas Rowley Erik Smith Rosemary Lark RECRUITMENT AND Fellow & Division Manager, Threats Analysis Division RADICALIZATION OF George Thompson, SCHOOL-AGED YOUTH Deputy Director, HSI BY INTERNATIONAL TERRORIST GROUPS Final Report 23 April 2009 Prepared for U.S. -
Nichols and Sense a Blog from Dr. Dawn Nichols Convent of the Visitation School
Nichols and Sense A Blog from Dr. Dawn Nichols Convent of the Visitation School www.visitation.net/blog Book Ideas for Christmas (or Any Time) Last year, I asked my colleagues to share book recommendations with the broader Visitation community in the hopes that you could give books as gifts or simply find a good read for yourself. The resulting list ended up being very popular, so we have decided to once again share our recommendations. Following is a list of my colleagues’ book choices, broken into various categories, in their own words. Children and Young Adults: All of a Kind Family by Sydney Taylor: When I was a child, I read this series of books over and over and over again. How I loved the story of a Jewish family – two parents and five girls – living in the lower East Side of Manhattan in the early 1900s. Taylor made the family come to life through her writing about their relationships, daily lives, holidays, and the struggles they faced trying to make ends meet. The second book in the series – More All of a Kind Family – is still one of my favorite books of all time. Highly recommended for girls age 7-11. Elizabeth Arnstein Anne of Green Gables by Lucy Maud Montgomery: This wonderful story about a feisty, talkative, redheaded orphan girl who comes to live with an elderly brother and sister at a farm on Canada’s Prince Edward Island was first published in 1908, and more than 50 million copies have been sold since. The previously lonely and much-neglected Anne, who had in the past created imaginary companions, blossoms in the warmth and love provided by Marilla and Matthew Cuthbert, and they in turn are warmed by her affection, talkativeness and imagination. -
“Don't Borrow from Me Argentina” the Aftermath of the Largest Sovereign
Final Draft: 20 March 2008 “Don’t Borrow From Me Argentina” The Aftermath of the Largest Sovereign Default in International Finance MARIANO SOTO GAJARDO∗ "We are going to take the bull by the horns. We are going to speak of the foreign debt. First, I announce that the Argentine state will suspend payment on the foreign debt.” (Inauguration speech of President Adolfo Rodriguez Saá, December 24, 2001) INTRODUCTION This is the story of a country that has learned how not to honour its contractual obligations. A country that has behaved opportunistically in restructuring its debt. A country that has claimed to negotiate in good faith with its creditors when its efforts to do so have been dubious to say the least. A country that has exploited every legal mechanism available to prevent its creditors from recovering their claims in court. This is the story of Argentina and its most recent sovereign debt restructuring. Argentina has a long history of defaulting on its obligations. After selling bonds listed on the London Stock Exchange in the early 1820s, the country defaulted on the bonds just a few years later and did not settle with the bondholders until ∗ LL.B. Universidad de Chile. LL.M. The University of Chicago and the London School of Economics & Political Science. 1 Final Draft: 20 March 2008 1857.1 Argentina defaulted on its obligations again in 1890, causing a financial panic in England as Argentina’s primary creditor, Baring Brothers, experienced a liquidity crisis as a result of Argentina’s default.2 In 1956, Argentina’s threatened -
From Exclusivism to Accommodation: Doctrinal and Legal Evolution of Wahhabism
NEW YORK UNIVERSITY LAW REVIEW VOLUME 79 MAY 2004 NUMBER 2 COMMENTARY FROM EXCLUSIVISM TO ACCOMMODATION: DOCTRINAL AND LEGAL EVOLUTION OF WAHHABISM ABDULAZIZ H. AL-FAHAD*t INTRODUCTION On August 2, 1990, Iraq attacked Kuwait. For several days there- after, the Saudi Arabian media was not allowed to report the invasion and occupation of Kuwait. When the Saudi government was satisfied with the U.S. commitment to defend the country, it lifted the gag on the Saudi press as American and other soldiers poured into Saudi Arabia. In retrospect, it seems obvious that the Saudis, aware of their vulnerabilities and fearful of provoking the Iraqis, were reluctant to take any public position on the invasion until it was ascertained * Copyright © 2004 by Abdulaziz H. AI-Fahad. B.A., 1979, Michigan State University; M.A., 1980, Johns Hopkins University School of Advanced International Studies; J.D., 1984, Yale Law School. Mr. Al-Fahad is a practicing attorney in Riyadh, Saudi Arabia. Earlier versions of this paper were presented at the Conference on Transnational Connec- tions: The Arab Gulf and Beyond, at St. John's College, Oxford University, September 2002, and at the Yale Middle East Legal Studies Seminar in Granada, Spain, January 10-13, 2003. t Editors' note: Many of the sources cited herein are available only in Arabic, and many of those are unavailable in the English-speaking world; we therefore have not been able to verify them in accordance with our normal cite-checking procedures. Because we believe that this Article represents a unique and valuable contribution to Western legal scholarship, we instead have relied on the author to provide translations or to verify the substance of particular sources where possible and appropriate. -
Download/Hearing 03-05-14-A., P
University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/66906 This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. The Fractured Consensus How competing visions of grand strategy challenge the geopolitical identity of American leadership under the Obama presidency Author: Georg Löfflmann Thesis submitted for awarding of academic degree of Doctor of Philosophy (PhD) University of Warwick Department of Politics and International Studies Date of Submission: 30 September 2014 Table of Contents List of Tables and Illustrations i. Acknowledgements ii. Inclusion of Published Work iii Abstract iv. Introduction p. 1 A critical research perspective of grand strategy p. 9 Research question p. 12 Research statement p. 12 Theoretical background p. 14 Methodology p. 16 Chapter Outline p. 21 1. Reimagining grand strategy: From Clausewitz to critical geopolitics p. 25 Part I Grand strategy p. 26 Strategy and grand strategy p. 26 Grand strategy in International Relations: Realists vs. the rest p. 29 A critical security studies perspective of grand strategy: Power/knowledge, discourse and intertextuality p. 36 Basic discourses of grand strategy: Hegemony, engagement and restraint p. 44 Part II Geopolitics p. 51 Geopolitics - Past and present p. 51 Classical geopolitics from Mackinder to Haushofer: Heartland, sea power and Lebensraum p. -
The Destructive Legacy of Abu Muhammad Al-Adnani
International Journal of Political Science (IJPS) Volume 2, Issue 4, 2016, PP 86-94 ISSN 2454-9452 http://dx.doi.org/10.20431/2454-9452.0204009 www.arcjournals.org More than the Voice of the Caliphate: The Destructive Legacy of Abu Muhammad Al-Adnani Anthony N. Celso Professor, Department of Security Studies, Angelo State University Abstract: The August 2016 killing of Abu Muhammad al-Adnani in a U.S. drone attack is an important step in degrading the Islamic State (IS). His symbolic and strategic importance as a propagandist and as an overseer of the caliphate's external terror operations cannot be doubted. Adnani was in the forefront in exhorting and directing IS operations to kill Westerners. The Paris, Brussels, Munich, San Bernardino, Orlando and Nice attacks can be linked to his impressive oratorical and organizational abilities. Adnani’s September 2014 audio address urged IS supporters in North America and Europe to kill Westerners by any means possible. Adnani’s propaganda express a Salafi-jihadist world view composed of three core principles al-wala’ al- bara’, jihad and takfir. This essay examines Adnani’s propaganda messaging and his role in the caliphate’s organization. First, it examines Adnani’s audio addresses built around al- wala’ al- bara’, jihad and takfir. Second, it examines his role in the caliphate’s external terror operations. Finally, it assesses the significance of his death. Keywords: [Islamic Extremism] [Jihadism] [Caliphate] [terrorism] 1. INTRODUCTION The August 2016 killing of Abu Muhammad al-Adnani in a U.S. drone attack is an important step in degrading the Islamic State (IS).